spectre-meltdown-checker
spectre-meltdown-checker copied to clipboard
Reptar, Downfall, Zenbleed, ZombieLoad, RIDL, Fallout, Foreshadow, Spectre, Meltdown vulnerability/mitigation checker for Linux & BSD
Original publication: https://cacheoutattack.com/ CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549 Intel Security Advisory: https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling
A new way to mess with the SGX secure enclave if you have OS access has been reported, and Intel has released microcode that fixes the issue by locking down...
What about the **Jump Conditional Code (JCC) Erratum**? Some pointers: - Intel: [Mitigations for Jump Conditional Code Erratum](https://www.intel.com/content/dam/support/us/en/documents/processors/mitigations-jump-conditional-code-erratum.pdf) whitepaper (pdf) - Red Hat: [Intel November 2019 Microcode Update ](https://access.redhat.com/solutions/2019-microcode-nov) -...
Is there any way to check Spectre Variant 1 on ARM 32 bit processor ? Now I am using kernel version 4.14 and applied spectre variant 1 patch for arm....
https://arxiv.org/abs/1811.05441 > In this paper, we present a sound and extensible systematization > of transient execution attacks. Our systematization > uncovers 7 (new) transient execution attacks that have > been...
Found information about "the Orc attack" in [an article](https://www.eetimes.com/author.asp?section_id=36&doc_id=1334783). Sharing it here in case it may be useful for this project: https://arxiv.org/pdf/1812.04975.pdf
https://grsecurity.net/teardown_of_a_failed_linux_lts_spectre_fix.php
The other methods reference the path `/dev/cpu/$_cpu/msr`, but the wrmsr method passes only the msr number and the value 0 to be written: ```shell # for Linux # convert to...
Not an issue, just info: https://tech.slashdot.org/story/18/07/12/0023211/new-spectre-11-and-spectre-12-cpu-flaws-disclosed