https://github.com/speed47/spectre-meltdown-checker

classic Classic list List threaded Threaded
3 messages Options
Reply | Threaded
Open this post in threaded view
|

https://github.com/speed47/spectre-meltdown-checker

Richmond
Has anyone tried https://github.com/speed47/spectre-meltdown-checker

Is it recommended? I am reluctant to start running things without having
them vouched for, as they could exploit the vulnerability.


  Spectre & Meltdown Checker

A simple shell script to tell if your Linux installation is vulnerable
against the 3 "speculative execution" CVEs that were made public early 2018.


--
To unsubscribe, e-mail: [hidden email]
To contact the owner, e-mail: [hidden email]

Reply | Threaded
Open this post in threaded view
|

Re: https://github.com/speed47/spectre-meltdown-checker

Knurpht-openSUSE
Op vrijdag 12 januari 2018 18:58:02 CET schreef Richmond:

> Has anyone tried https://github.com/speed47/spectre-meltdown-checker
>
> Is it recommended? I am reluctant to start running things without having
> them vouched for, as they could exploit the vulnerability.
>
>
>   Spectre & Meltdown Checker
>
> A simple shell script to tell if your Linux installation is vulnerable
> against the 3 "speculative execution" CVEs that were made public early 2018.
Yup, I did. After checking what the script was doing.

--
Gertjan Lettink, a.k.a. Knurpht

openSUSE Board Member
openSUSE Forums Team



--
To unsubscribe, e-mail: [hidden email]
To contact the owner, e-mail: [hidden email]

Reply | Threaded
Open this post in threaded view
|

Re: https://github.com/speed47/spectre-meltdown-checker

Andrei Borzenkov
In reply to this post by Richmond
12.01.2018 20:58, Richmond пишет:
> Has anyone tried https://github.com/speed47/spectre-meltdown-checker
>
> Is it recommended?

https://bugzilla.opensuse.org/show_bug.cgi?id=1068032#c159

> I am reluctant to start running things without having
> them vouched for, as they could exploit the vulnerability.
>
>
>   Spectre & Meltdown Checker
>
> A simple shell script to tell if your Linux installation is vulnerable
> against the 3 "speculative execution" CVEs that were made public early 2018.
>
>


--
To unsubscribe, e-mail: [hidden email]
To contact the owner, e-mail: [hidden email]