

{"id":2204,"date":"2018-01-12T20:46:32","date_gmt":"2018-01-12T19:46:32","guid":{"rendered":"http:\/\/www.fabionline.net\/aaaaaaa\/?p=2204"},"modified":"2025-03-31T20:44:14","modified_gmt":"2025-03-31T18:44:14","slug":"spectre-meltdown-checker-linux","status":"publish","type":"post","link":"https:\/\/www.fabionline.net\/blog\/linux\/spectre-meltdown-checker-linux\/","title":{"rendered":"Spectre &#8211; Meltdown checker (linux)"},"content":{"rendered":"<p>I have just tried on my not so new pc this interesting script:\u00a0<a href=\"https:\/\/github.com\/speed47\/spectre-meltdown-checker\" target=\"_blank\" rel=\"noopener\">Specter-Meltdown-Checker<\/a> , as specified also in instructions, it is not a bible, but surely it is something could give you very useful informations &#8211; this script give you the possibility to check your pc vulnerability to \u00a0Spectre (2 variants) and Meltdown.<br>\n<strong>Pc features:<\/strong><br>\nIntel I5-3470 (ivy bridge) 3.20 GHz<br>\nKernel: 4.14.13-1-ARCH<br>\n8 GB ram<br>\nArch Linux<br>\nNvidia Geforce Gt-630<br>\nfull Hardware details are <a href=\"http:\/\/www.fabionline.net\/aaaaaaa\/wp-content\/uploads\/lshw.png\" target=\"_blank\" rel=\"noopener\">here<\/a>\u00a0, (i have used <span style=\"color: #0000ff;\">lshw<\/span> command)<br>\ni downloaded \u00a0and extracted .zip file ,<br>\nthen i applied execute permission to .sh file through chmod +x<br>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2205\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spectre-meltdown-chmodh.png\" alt=\"\" width=\"576\" height=\"18\" \/><br>\nThen\u00a0i have executed the script (Is recommended to execute script being root)<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2224\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdcommandroot.png\" alt=\"\" width=\"562\" height=\"17\" \/><br>\nafter password insertion, the script can run:<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2219\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdchecking.png\" alt=\"\" width=\"906\" height=\"21\" srcset=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdchecking.png 906w, https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdchecking-768x18.png 768w\" sizes=\"(max-width: 906px) 100vw, 906px\">below results:<br>\n<strong style=\"font-size: 12pt;\">Spectre Variant 1 (CVE-2017-5753 bounds check bypass)<\/strong><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2226\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spectre1root.png\" alt=\"\" width=\"417\" height=\"29\" \/><br>\nfinal result is<br>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2228\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdVuln.png\" alt=\"\" width=\"146\" height=\"16\" \/>\u00a0<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2231\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spectre1res-1.png\" alt=\"\" width=\"745\" height=\"16\" \/><br>\n<strong><span style=\"font-size: 10pt;\"><strong><span style=\"font-size: 12pt; color: #000000;\">Spectre Variant 2 (CVE-2017-5715 branch target\u00a0injection)<\/span><br>\n<\/strong><\/span><\/strong><span style=\"font-size: 12pt;\">as you can see, script try to check if in my machine are some mitigations\u00a0<\/span><strong><span style=\"font-size: 10pt;\"><strong><br>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2233\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spectre2res.png\" alt=\"\" width=\"441\" height=\"136\" \/><br>\n<\/strong><\/span><\/strong><span style=\"font-size: 10pt;\"><span style=\"font-size: 12pt;\">final result is<br>\n<\/span>\u00a0<\/span><strong><span style=\"font-size: 10pt;\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2228\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdVuln.png\" alt=\"\" width=\"146\" height=\"16\" \/>\u00a0<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2236\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spectre2res2.png\" alt=\"\" width=\"696\" height=\"16\" \/><\/span><\/strong><br>\n<strong><span style=\"font-size: 10pt;\"><span style=\"font-size: 12pt; color: #000000;\">Meltdown (CVE-2017-5754 rogue data cache load)<br>\n<\/span><\/span><\/strong><span style=\"font-size: 10pt;\"><span style=\"font-size: 12pt; color: #000000;\">In that case result was positive, thanks Kernel \ud83d\ude42<br>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2239\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/meltdown-res.png\" alt=\"\" width=\"480\" height=\"59\" \/><br>\n<\/span><\/span><br>\n<strong>\u00a0<\/strong>Just for curiosity i have also executed script without root permission (i know, have no sense but i wanted see differences)\u00a0below you can see what happens:<br>\nObviously script will warn you, then will start<br>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2217\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdccommandnoroot.png\" alt=\"\" width=\"529\" height=\"20\" \/><br>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2218\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdcwarn.png\" alt=\"\" width=\"628\" height=\"48\" \/><br>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2219\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdchecking.png\" alt=\"\" width=\"906\" height=\"21\" srcset=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdchecking.png 906w, https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spmdchecking-768x18.png 768w\" sizes=\"(max-width: 906px) 100vw, 906px\"><br>\n<strong><span style=\"font-size: 10pt;\"><span style=\"font-size: 12pt;\">Spectre (Variant 1)<\/span><br>\n<\/span><\/strong><span style=\"font-size: 12pt;\">only differences are<strong>\u00a0<\/strong>B^B^B^checking LFENCE while outcome (UNKNOWN) and especially final result (VULNERABLE) are exactly the same you can see executing script as root<\/span><strong><span style=\"font-size: 10pt;\"><br>\n<\/span><\/strong><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2225\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spectre1noroot.png\" alt=\"\" width=\"472\" height=\"30\" \/><br>\n<strong><span style=\"font-size: 10pt;\"><span style=\"font-size: 12pt;\">Spectre (Variant 2)<\/span><br>\n<\/span><\/strong><span style=\"font-size: 12pt;\">during mitigation 1 check there is a read permission error (predictable considering we don&#8217;t have root permission) on\u00a0\/dev\/cpu\/0\/msr , so script can&#8217;t check cpu microcode<\/span><strong><span style=\"font-size: 10pt;\"><br>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2240\" src=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spectre2resnoroot.png\" alt=\"\" width=\"938\" height=\"30\" srcset=\"https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spectre2resnoroot.png 938w, https:\/\/www.fabionline.net\/blog\/wp-content\/uploads\/spectre2resnoroot-768x25.png 768w\" sizes=\"(max-width: 938px) 100vw, 938px\"><br>\n<\/span><\/strong><span style=\"font-size: 12pt;\">Rest of other checks (IBRS kernel support,kernel space,user space etc) were identical as reported above , included final result (VULNERABLE)<\/span><br>\n<strong><span style=\"font-size: 10pt;\"><span style=\"font-size: 12pt;\">Meltdown<br>\n<\/span><\/span><\/strong>Identical result as reported above (NOT VULNERABLE)<\/p>","protected":false},"excerpt":{"rendered":"<p>I have just tried on my not so new pc this interesting script:\u00a0Specter-Meltdown-Checker , as specified also in instructions, it is not a bible, but surely it is something could give you very useful informations &#8211; this script give you &hellip; <a href=\"https:\/\/www.fabionline.net\/blog\/linux\/spectre-meltdown-checker-linux\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[5,8],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fabionline.net\/blog\/wp-json\/wp\/v2\/posts\/2204"}],"collection":[{"href":"https:\/\/www.fabionline.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fabionline.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fabionline.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fabionline.net\/blog\/wp-json\/wp\/v2\/comments?post=2204"}],"version-history":[{"count":1,"href":"https:\/\/www.fabionline.net\/blog\/wp-json\/wp\/v2\/posts\/2204\/revisions"}],"predecessor-version":[{"id":2611,"href":"https:\/\/www.fabionline.net\/blog\/wp-json\/wp\/v2\/posts\/2204\/revisions\/2611"}],"wp:attachment":[{"href":"https:\/\/www.fabionline.net\/blog\/wp-json\/wp\/v2\/media?parent=2204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fabionline.net\/blog\/wp-json\/wp\/v2\/categories?post=2204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fabionline.net\/blog\/wp-json\/wp\/v2\/tags?post=2204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}