How To Check Linux For Meltdown And Spectre Vulnerability

0

How to check if my Linux is still vulnerable to Spectre and Meltdown CPU bugs? Spectre and Meltdown allows attacker to read virtual memory arbitrarily in modern processors. Attacker can steal your passwords and other sensitive data by reading memory of computer systems.

  1. CVE-2017-5753: bounds check bypass (Spectre Variant 1). You need to recompile software and kernel with a modified compiler that introduces the LFENCE opcode at the proper positions in the resulting code. The performance impact of the mitigation is negligible.
  2. CVE-2017-5715: branch target injection (Spectre Variant 2). The performance impact of the mitigation depending on your CPU.
  3. CVE-2017-5754: rogue data cache load (Meltdown). You must install updated kernel version with PTI/KPTI patches. Updating the kernel is enough. The performance impact of the mitigation is low to medium.

There’s a simple shell script which finds out if your Linux kernel is vulnerable to “Speculative Execution”. You can use this script to check if your still vulnerable to Spectre and Meltdown CPU bugs.

Installation: 

OR

How To Check Linux For Meltdown And Spectre Vulnerability

This will be the output yours can be different it will let you know if your vulnerable.

Download spectre-meltdown-checker