spectre-meltdown-checker
safeside
Our great sponsors
spectre-meltdown-checker | safeside | |
---|---|---|
14 | 2 | |
3,803 | 452 | |
- | - | |
7.4 | 6.9 | |
2 months ago | over 3 years ago | |
Shell | C++ | |
- | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
spectre-meltdown-checker
- Linux Mint: It use mitigation of intel cpu bug?
- Package to Notify/check for Kernel Vulns?
-
Spectre Meltdown Checker gives summary of 1 red in Debian but 0 red in Fedora 36.
I tried the latest SMC from https://github.com/speed47/spectre-meltdown-checker and all were in green. :-)
-
AutoPWN Suite | I've created a python script you can use to scan your systems for vulnerabilities.
How is this project different spectre-meltdown-checker?
-
Can a laptop from 2012 be a viable home server?
OpenBSD will disable all but the first thread on any Intel processor by default. I'm assuming that these models are too old to have microcode updates addressing the Spectre exploits (Meltdown, Foreshadow, Fallout, Zombieload, RIDL etc.), and disabling SMT/HT might be the most secure thing to do by default.
This script produces a good assessment of Spectre problems for a wide variety of CPUs. I know that they are difficult to exploit, and the mitigations are disabled by many because of their performance impact.
-
Intel Finds Bug in AMD's Spectre Mitigation, AMD Issues Fix
You can confirm the status of the mitigations using InSpectre for Windows, or Spectre & Meltdown Checker if you're on a unix based system.
-
What kernel parameters do you use?
You can run https://github.com/speed47/spectre-meltdown-checker
-
Any opinion about NUC as home server?
He's probably referring to the class of vulnerabilities checked by this script: https://github.com/speed47/spectre-meltdown-checker. It's not just Intel CPUs that were affected, AMD and ARM also have some vulnerabilities (I just ran it on an ARM v7 to see) although maybe not as many.
-
How can secure the host from the guest using virt manager?
utilise microcode updates (should be by default, check)
- Spectre and Meltdown Checker
safeside
-
Trying to find information about spectre and Meltdown. (Security)
You are looking for 'side channel attacks on ARM'. Looks like Google has some code, and at least the ARM V8-A appears to be vulnerable. https://github.com/google/safeside
-
Spectre Exploits in the “Wild”
Google's SafeSide project published a number of practical demonstrations of leaking data through side-channels.
What are some alternatives?
intel-undervolt - Intel CPU undervolting and throttling configuration tool
Brace - Toolkit compatible with multiple Linux distros that allows for installation of handpicked applications, along with corresponding configs that have been tuned for reasonable privacy and security.
awesome-unix - All the UNIX and UNIX-Like: Linux, BSD, macOS, Illumos, 9front, and more.
systemd - The systemd System and Service Manager
KTweak - A no-nonsense kernel tweak script for Linux and Android systems, backed by evidence.
mg - Micro (GNU) Emacs-like text editor ❤️ public-domain
vm-bhyve - Shell based, minimal dependency bhyve manager
Metasploit - Metasploit Framework
wikiman - Wikiman is an offline search engine for manual pages, Arch Wiki, Gentoo Wiki and other documentation.
linux - Linux kernel source tree
Tokmannin-ESP8266-Wifi-topseli - Tokmannin 13 euron wifi-töpselissä on ESP8266-kortti, jossa ohjelmointiliitin kivasti esillä