Package Details: spectre-meltdown-checker 0.45-1

Git Clone URL: https://aur.archlinux.org/spectre-meltdown-checker.git (read-only, click to copy)
Package Base: spectre-meltdown-checker
Description: Spectre, Meltdown, Foreshadow, Fallout, RIDL, ZombieLoad vulnerability/mitigation checker
Upstream URL: https://github.com/speed47/spectre-meltdown-checker
Licenses: GPL3
Submitter: simon04
Maintainer: iyanmv
Last Packager: iyanmv
Votes: 71
Popularity: 1.21
First Submitted: 2018-01-15 14:36 (UTC)
Last Updated: 2022-03-29 10:47 (UTC)

Dependencies (0)

Required by (0)

Sources (1)

Latest Comments

merlock commented on 2019-12-08 15:27 (UTC) (edited on 2019-12-08 15:27 (UTC) by merlock)

Flagged as out-of date.

https://github.com/speed47/spectre-meltdown-checker/releases/tag/v0.43]v0.43

mags commented on 2019-12-03 08:07 (UTC)

When building in clean chroot:

spectre-meltdown-checker E: Dependency bash detected and not included (programs ['sh'] needed in scripts ['usr/bin/spectre-meltdown-checker'])

AlexParkhomenko commented on 2019-09-04 17:54 (UTC)

Linux 5.2.11-arch1-1-ARCH #1 SMP PREEMPT Thu Aug 29 08:09:36 UTC 2019 x86_64

SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:OK CVE-2018-3639:OK CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK CVE-2018-12126:OK CVE-2018-12130:OK CVE-2018-12127:OK CVE-2019-11091:OK

0000000011111111 commented on 2019-05-26 08:42 (UTC)

  • Vulnerable to Variant 1: YES
  • Vulnerable to Variant 2: YES
  • Vulnerable to Variant 3: YES

Lovely. It's like winning a trophy in reverse.

justinkb commented on 2019-05-15 08:53 (UTC)

Looks like upstream RETAGGED 0.41 because of a version number oversight https://github.com/speed47/spectre-meltdown-checker/commit/ae56ec0bc597fa451cf0502c591c637cf17e420e

simona commented on 2019-05-15 08:33 (UTC)

==> Validazione di source file con sha256sums... spectre-meltdown-checker-0.41.tar.gz ... NON RIUSCITO

simon04 commented on 2018-03-29 07:29 (UTC)

Updated to 0.36, dropped .sh in executable name

sekret commented on 2018-03-26 20:02 (UTC)

You could have removed the .sh ending on the executable, looks nicer on the commandline ;-)

Kakashi-sensei commented on 2018-02-20 23:10 (UTC) (edited on 2018-02-20 23:10 (UTC) by Kakashi-sensei)

Actually, running as super user was the fix. And I got all No's, which I expected.

qrwteyrutiyoup commented on 2018-02-20 20:35 (UTC)

@Kakashi-sensei: tried "modprobe msr" yet?

Kakashi-sensei commented on 2018-02-10 06:45 (UTC) (edited on 2018-02-10 06:46 (UTC) by Kakashi-sensei)

What can I do to resolve the following (I have an AMD FX 8350):

* SPEC_CTRL MSR is available:  UNKNOWN  (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)

* CPU indicates IBRS capability:  UNKNOWN  (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)
  • Indirect Branch Prediction Barrier (IBPB)

    • PRED_CMD MSR is available: UNKNOWN (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)

    • CPU indicates IBPB capability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)

  • Single Thread Indirect Branch Predictors (STIBP)

    • SPEC_CTRL MSR is available: UNKNOWN (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)

    • CPU indicates STIBP capability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)

  • Enhanced IBRS (IBRS_ALL)

    • CPU indicates ARCH_CAPABILITIES MSR availability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)