20180109

How do I check if my Linux server is still vulnerable to Spectre and Meltdown CPU bugs?

【外部リンク】
https://www.cyberciti.biz/faq/check-linux-server-for-spectre-meltdown-vulnerability/
Meltdown vulnerability
Posted on January 8, 2018in Categories CentOS, Debian / Ubuntu, Linux, RedHat and Friends, Security, Suse last updated January 8, 2018
How do I check if my Linux server is still vulnerable to Spectre and Meltdown CPU bugs?

Installation
The script must be run as root user. You can view source code here. Use the wget command or curl command to grab the source code on your Linux box:
$ cd /tmp/
$ wget https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh

OR
$ git clone https://github.com/speed47/spectre-meltdown-checker.git

Sample outputs:

Cloning into 'spectre-meltdown-checker'...

Run the script as root user using sudo command or su command:
$ sudo sh spectre-meltdown-checker.sh

Sample outputs from Ubuntu Linux desktop:

[sudo] password for vivek:


Another output from my CentOS 7.x server where Meltdown/Spectre v1 was patched with Kernel:
$ sudo sh spectre-meltdown-checker.sh

【外部リンク】

https://github.com/speed47/spectre-meltdown-checker
Spectre & Meltdown Checker
--

注目の投稿

Shadowserver Foundation http://65.49.1.117/

Shadowserver Foundation port 14491 discarded for LINK-FRMWRK: NO ENTRY IN LOOKUP TABLE TO COMPLETE OPERATION, GigaEthernet2.0 Wistron Neweb ...

人気の投稿