Stéphane Lesimple

Results 167 comments of Stéphane Lesimple

Can you try the `arm` branch? Detection works as I could test in cross-compilation and cross-check, but I'd like to be sure it also works in native mode (running the...

This is normal, csdb is seen for ARM64 instructions, not for ARM32. Did you try the new arm branch ? (https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/arm/spectre-meltdown-checker.sh), it should detect the ARM32 case now, in the...

This has been included in the v0.38 release, to avoid delaying it further. Please comment if you can confirm it works as expected under a native ARM 32 system (not...

@bprout93 if you still have said system around, I've added an experimental way of detecting raw binary arm images and adjusting `objdump`'s options when this is the case. Could you...

Intel seems to say that there will not be additional mitigation for those variants, so at the moment there's no mitigation to check for. I'll still keep this ticket open...

Those flags are interesting indeed, even if we have no official information yet that they are SPOILER-related. I'll probably add checks for them at least in a dev branch for...

Yep. First detection version is already merged, I'm still currently refining it, `master` will be noisy tonight. Btw, it wasn't SPOILER after all.

AFAICT, there is no SPOILER mitigation on OS or firmware level, as it's just a way to enhance a Rowhammer attack. So, there's no existing mitigation for the script to...

This CVE points out a bad backport of a fix on stable kernels, the diff fixing it is as follows: ``` diff --git a/arch/x86/kernel/ptrace.c b/arch/x86/kernel/ptrace.c index 1ca929767a1b..0b6d27dfc234 100644 --- a/arch/x86/kernel/ptrace.c...

I won't code a GUI for the tool myself, I prefer using my scarce free time to work on the actual script itself, enhancing detection, adding support of new vulnerabilities...