It looks like you have done pretty much all you can at the moment with the vanilla (or ElRepo) kernels.
The distribution kernels, although they may be nominally older version, might well include more security patches - ones that have not yet made their way into the vanilla kernel. In particular, the enterprise distributions are currently hard at work with probably insider information from the CPU manufacturers and their own development resources, getting the fixes into working shape and released. In this situation, the latest vanilla kernel is not necessarily the best choice.
According to the script output on 4.14.13 kernel, your processor could benefit from a microcode update. An updated microcode would enable IBRS, which is one way to mitigate Spectre Variant 2. To actually use the IBRS would require further kernel patches, which are currently under review and might or might not be included to the 4.15 kernel (and then likely backported to older kernel versions)..
With the 4.14.14, the kernel provides the CONFIG_RETPOLINE option, which can be used to mitigate Spectre Variant 2 with or without IBRS, but with the current compiler version it cannot yet implement retpolines for full effect. But although the current retpoline status is still vulnerable, it's better than nothing.
The mitigation of Spectre Variant 1 also requires compiler modifications.
So, you are now primarily waiting for a C compiler update that would enable you (or ElRepo) to compile a kernel with more LFENCE instructions in appropriate locations, and with a more stringent retpoline implementation. Those would mitigate both Spectre variants, although full retpolines for Variant 2 can eat up some CPU performance.
Secondarily, you're waiting for a (bug-free) microcode update for your CPU that would enable IBRS and a kernel update to actually use it. That could come along a BIOS/firmware update, or you could have Linux install the updated microcode at boot.
Update:
Debian has provided updated compiler packages with the full retpoline functionality integrated. For Debian 8 (jessie), gcc-4.9 with retpoline backports was released in 2018-02-17, and for Debian 9 (stretch), gcc-6 with retpoline backports was released in 2018-02-22.
Also on 2018-02-22, Debian released a kernel update for Debian 9 with full retpoline mitigation for Spectre Variant 2 and an array_index_mask_nospec mitigation for Spectre Variant 1. So a full set of Spectre mitigations is now available on Debian 9, with no need for BIOS/microcode updates.
Some tests suggest that this retpoline mitigation actually has significantly less performance impact than the microcode-based one offered by Intel.
So the backport effort for the required compiler features is proceeding. Unfortunately the standard compiler version for RHEL/CentOS 7 is gcc-4.8.5: the availability of backport patches for gcc-4.9 might be of some assistance, but still more work is required to get the necessary compiler features backported all the way to gcc-4.8.5.
On 2018-02-20, Intel published a set of recommendations on microcode updates for various processor models. It also lists the microcode versions released in January that have been since then found to be buggy and accordingly recommends that any deployment of those specific microcode versions should be stopped.