spectre-meltdown-checker icon indicating copy to clipboard operation
spectre-meltdown-checker copied to clipboard

Reptar, Downfall, Zenbleed, ZombieLoad, RIDL, Fallout, Foreshadow, Spectre, Meltdown vulnerability/mitigation checker for Linux & BSD

Results 88 spectre-meltdown-checker issues
Sort by recently updated
recently updated
newest added

Original publication: https://cacheoutattack.com/ CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549 Intel Security Advisory: https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling

A new way to mess with the SGX secure enclave if you have OS access has been reported, and Intel has released microcode that fixes the issue by locking down...

What about the **Jump Conditional Code (JCC) Erratum**? Some pointers: - Intel: [Mitigations for Jump Conditional Code Erratum](https://www.intel.com/content/dam/support/us/en/documents/processors/mitigations-jump-conditional-code-erratum.pdf) whitepaper (pdf) - Red Hat: [Intel November 2019 Microcode Update ](https://access.redhat.com/solutions/2019-microcode-nov) -...

Is there any way to check Spectre Variant 1 on ARM 32 bit processor ? Now I am using kernel version 4.14 and applied spectre variant 1 patch for arm....

waiting-feedback

https://arxiv.org/abs/1811.05441 > In this paper, we present a sound and extensible systematization > of transient execution attacks. Our systematization > uncovers 7 (new) transient execution attacks that have > been...

information

Will it handle also SPOILER defect?

information

Found information about "the Orc attack" in [an article](https://www.eetimes.com/author.asp?section_id=36&doc_id=1334783). Sharing it here in case it may be useful for this project: https://arxiv.org/pdf/1812.04975.pdf

information

https://grsecurity.net/teardown_of_a_failed_linux_lts_spectre_fix.php

information

The other methods reference the path `/dev/cpu/$_cpu/msr`, but the wrmsr method passes only the msr number and the value 0 to be written: ```shell # for Linux # convert to...

Not an issue, just info: https://tech.slashdot.org/story/18/07/12/0023211/new-spectre-11-and-spectre-12-cpu-flaws-disclosed

new-vulnerability