How To Check For Meltdown And Spectre Vulnerabilities And Patch Them In Linux

5 Responses

  1. Todd says:

    Thank you for the update, however, we patched our systems using:
    -> sudo apt-get update && sudo apt-get dist-upgrade
    and we continue to get the “unpatched 🙁 ” prompt
    -> grep cpu_insecure /proc/cpuinfo && echo “patched :)” || echo “unpatched :(”
    -> dmesg | grep “Kernel/User page tables isolation: enabled” && echo “patched :)” || echo “unpatched :(”
    -> grep CONFIG_PAGE_TABLE_ISOLATION=y /boot/config-`uname -r` && echo “patched :)” || echo “unpatched :(”

    We are running:
    Distributor ID: Ubuntu
    Description: Ubuntu 16.04.3 LTS
    Release: 16.04
    Codename: xenial

    Don’t know if you have run into this issue, but let me know if there is something from a kernel rebuild or is there something that we have missed

    By the way, just ran apt-get update && apt-get dist-upgrade again and it still says “unpatched 🙁 ”

    Let me know if you run across something.


  2. Todd says:

    Ran the spectre-meltdown-checker, it seems there is a Mitigation 1 vulnerability (IBRS hardware + kernel support), installed the patch on this as well (before this was run).

  3. Todd says:

    What we have identified in the Linux and Windows world, it seems that the patches are not comprehensive. We went through extensive tests and kernel distribution updates with no remedy for all of the issues experienced. Oh well, we have to wait for the distros and the CPU Mfg to provide a patch that is comprehensive. Anyway, thank you for your insight.

  4. pooky2483 says:

    Does NOT work.
    I am running kernel 4.15.0-34-generic and ran the command to check for the vulnerability and it came up “unpatched :(“.
    My processor is an AMD Phenom II x4 965

    There’s something wrong with the checker!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.