Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
systems:meltdown-spectre [2018/01/11 08:06]
eServices Greece
systems:meltdown-spectre [2018/03/05 05:31] (current)
eServices Greece
Line 1: Line 1:
 +{{tag>OS cve security}}
 ====== CVE List ====== ====== CVE List ======
   * [[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715|CVE-2017-5715]]   * [[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715|CVE-2017-5715]]
Line 6: Line 7:
   * [[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754|CVE-2017-5754]]   * [[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754|CVE-2017-5754]]
     * Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.     * Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
 +
 +===== Microcode Updates =====
 +Check how to apply Microcode [[systems:microcode|Microcode]]
 +==== Intel ====
 +[[https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File|Processor Microcode Data File]]
  
 ===== Check for Patches in Kernel ===== ===== Check for Patches in Kernel =====
 <sxh bash> <sxh bash>
-grep "cpu_insecure\|cpu_meltdown\|kaiser/proc/cpuinfo && echo "Patched " || echo "Unpatched"+dmesg | grep "cpu_insecure\|cpu_meltdown\|kaiser\|x86/pti" && echo "Patched " || echo "Unpatched"
 </sxh> </sxh>