Package Details: spectre-meltdown-checker 0.42-1

Git Clone URL: https://aur.archlinux.org/spectre-meltdown-checker.git (read-only)
Package Base: spectre-meltdown-checker
Description: Spectre & Meltdown vulnerability/mitigation checker (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754, CVE-2018-3640, CVE-2018-3639, CVE-2018-3615, CVE-2018-3620, CVE-2018-3646, CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, CVE-2019-11091)
Upstream URL: https://github.com/speed47/spectre-meltdown-checker
Licenses: GPL3
Submitter: simon04
Maintainer: simon04
Last Packager: simon04
Votes: 48
Popularity: 1.100741
First Submitted: 2018-01-15 14:36
Last Updated: 2019-05-26 06:16

Dependencies (0)

Required by (0)

Sources (1)

Latest Comments

AlexParkhomenko commented on 2019-09-04 17:54

Linux 5.2.11-arch1-1-ARCH #1 SMP PREEMPT Thu Aug 29 08:09:36 UTC 2019 x86_64

SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:OK CVE-2018-3639:OK CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK CVE-2018-12126:OK CVE-2018-12130:OK CVE-2018-12127:OK CVE-2019-11091:OK

0000000011111111 commented on 2019-05-26 08:42

  • Vulnerable to Variant 1: YES
  • Vulnerable to Variant 2: YES
  • Vulnerable to Variant 3: YES

Lovely. It's like winning a trophy in reverse.

justinkb commented on 2019-05-15 08:53

Looks like upstream RETAGGED 0.41 because of a version number oversight https://github.com/speed47/spectre-meltdown-checker/commit/ae56ec0bc597fa451cf0502c591c637cf17e420e

simona commented on 2019-05-15 08:33

==> Validazione di source file con sha256sums... spectre-meltdown-checker-0.41.tar.gz ... NON RIUSCITO

simon04 commented on 2018-03-29 07:29

Updated to 0.36, dropped .sh in executable name

sekret commented on 2018-03-26 20:02

You could have removed the .sh ending on the executable, looks nicer on the commandline ;-)

Kakashi-sensei commented on 2018-02-20 23:10

Actually, running as super user was the fix. And I got all No's, which I expected.

qrwteyrutiyoup commented on 2018-02-20 20:35

@Kakashi-sensei: tried "modprobe msr" yet?

Kakashi-sensei commented on 2018-02-10 06:45

What can I do to resolve the following (I have an AMD FX 8350):

* SPEC_CTRL MSR is available:  UNKNOWN  (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)

* CPU indicates IBRS capability:  UNKNOWN  (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)
  • Indirect Branch Prediction Barrier (IBPB)

    • PRED_CMD MSR is available: UNKNOWN (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)

    • CPU indicates IBPB capability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)

  • Single Thread Indirect Branch Predictors (STIBP)

    • SPEC_CTRL MSR is available: UNKNOWN (couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?)

    • CPU indicates STIBP capability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)

  • Enhanced IBRS (IBRS_ALL)

    • CPU indicates ARCH_CAPABILITIES MSR availability: UNKNOWN (couldn't read /dev/cpu/0/cpuid, is cpuid support enabled in your kernel?)