mirror of
https://github.com/speed47/spectre-meltdown-checker.git
synced 2025-07-15 23:31:22 +02:00
Compare commits
19 Commits
c1c1ac4dbb
...
master
Author | SHA1 | Date | |
---|---|---|---|
34c6095912 | |||
e806e4bc41 | |||
388d44edbd | |||
bd0c7c94b5 | |||
d70e4c2974 | |||
4e29fb5a21 | |||
0f2edb1a71 | |||
8ac2539a2a | |||
97f4d5f2bc | |||
9b7b09ada3 | |||
c94811e63d | |||
3e67047c73 | |||
ecee75716e | |||
fb6933dc64 | |||
dc6921a1ac | |||
3167762cfd | |||
44223c5308 | |||
dbe208fc48 | |||
aca4e2a9b1 |
12
.github/workflows/check.yml
vendored
12
.github/workflows/check.yml
vendored
@ -24,7 +24,7 @@ jobs:
|
|||||||
fi
|
fi
|
||||||
- name: check direct execution
|
- name: check direct execution
|
||||||
run: |
|
run: |
|
||||||
expected=17
|
expected=19
|
||||||
nb=$(sudo ./spectre-meltdown-checker.sh --batch json | jq '.[]|.CVE' | wc -l)
|
nb=$(sudo ./spectre-meltdown-checker.sh --batch json | jq '.[]|.CVE' | wc -l)
|
||||||
if [ "$nb" -ne "$expected" ]; then
|
if [ "$nb" -ne "$expected" ]; then
|
||||||
echo "Invalid number of CVEs reported: $nb instead of $expected"
|
echo "Invalid number of CVEs reported: $nb instead of $expected"
|
||||||
@ -32,11 +32,11 @@ jobs:
|
|||||||
else
|
else
|
||||||
echo "OK $nb CVEs reported"
|
echo "OK $nb CVEs reported"
|
||||||
fi
|
fi
|
||||||
- name: check docker-compose run execution
|
- name: check docker compose run execution
|
||||||
run: |
|
run: |
|
||||||
expected=17
|
expected=19
|
||||||
docker-compose build
|
docker compose build
|
||||||
nb=$(docker-compose run --rm spectre-meltdown-checker --batch json | jq '.[]|.CVE' | wc -l)
|
nb=$(docker compose run --rm spectre-meltdown-checker --batch json | jq '.[]|.CVE' | wc -l)
|
||||||
if [ "$nb" -ne "$expected" ]; then
|
if [ "$nb" -ne "$expected" ]; then
|
||||||
echo "Invalid number of CVEs reported: $nb instead of $expected"
|
echo "Invalid number of CVEs reported: $nb instead of $expected"
|
||||||
exit 1
|
exit 1
|
||||||
@ -45,7 +45,7 @@ jobs:
|
|||||||
fi
|
fi
|
||||||
- name: check docker run execution
|
- name: check docker run execution
|
||||||
run: |
|
run: |
|
||||||
expected=17
|
expected=19
|
||||||
docker build -t spectre-meltdown-checker .
|
docker build -t spectre-meltdown-checker .
|
||||||
nb=$(docker run --rm --privileged -v /boot:/boot:ro -v /dev/cpu:/dev/cpu:ro -v /lib/modules:/lib/modules:ro spectre-meltdown-checker --batch json | jq '.[]|.CVE' | wc -l)
|
nb=$(docker run --rm --privileged -v /boot:/boot:ro -v /dev/cpu:/dev/cpu:ro -v /lib/modules:/lib/modules:ro spectre-meltdown-checker --batch json | jq '.[]|.CVE' | wc -l)
|
||||||
if [ "$nb" -ne "$expected" ]; then
|
if [ "$nb" -ne "$expected" ]; then
|
||||||
|
21
README.md
21
README.md
@ -21,7 +21,9 @@ CVE
|
|||||||
[CVE-2018-12207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207) | Machine Check Exception on Page Size Changes | MCEPSC, No eXcuses, iTLB Multihit
|
[CVE-2018-12207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207) | Machine Check Exception on Page Size Changes | MCEPSC, No eXcuses, iTLB Multihit
|
||||||
[CVE-2020-0543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543) | Special Register Buffer Data Sampling | SRBDS
|
[CVE-2020-0543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543) | Special Register Buffer Data Sampling | SRBDS
|
||||||
[CVE-2022-40982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982) | Gather Data Sampling | GDS, Downfall
|
[CVE-2022-40982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982) | Gather Data Sampling | GDS, Downfall
|
||||||
|
[CVE-2023-20569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569) | Return Address Security | Inception, RAS, SRSO
|
||||||
[CVE-2023-20593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593) | Cross-Process Information Leak | Zenbleed
|
[CVE-2023-20593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593) | Cross-Process Information Leak | Zenbleed
|
||||||
|
[CVE-2023-23583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23583) | Redundant Prefix issue | Reptar
|
||||||
|
|
||||||
Supported operating systems:
|
Supported operating systems:
|
||||||
- Linux (all versions, flavors and distros)
|
- Linux (all versions, flavors and distros)
|
||||||
@ -74,10 +76,13 @@ sudo ./spectre-meltdown-checker.sh
|
|||||||
#### With docker-compose
|
#### With docker-compose
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
docker-compose build
|
docker compose build
|
||||||
docker-compose run --rm spectre-meltdown-checker
|
docker compose run --rm spectre-meltdown-checker
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Note that on older versions of docker, `docker-compose` is a separate command, so you might
|
||||||
|
need to replace the two `docker compose` occurences above by `docker-compose`.
|
||||||
|
|
||||||
#### Without docker-compose
|
#### Without docker-compose
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
@ -187,8 +192,20 @@ docker run --rm --privileged -v /boot:/boot:ro -v /dev/cpu:/dev/cpu:ro -v /lib/m
|
|||||||
- Mitigation: either microcode update or disabling AVX feature
|
- Mitigation: either microcode update or disabling AVX feature
|
||||||
- Performance impact of the mitigation: TBD
|
- Performance impact of the mitigation: TBD
|
||||||
|
|
||||||
|
**CVE-2023-20569** Return Address Security (Inception)
|
||||||
|
|
||||||
|
- Impact: Kernel & all software
|
||||||
|
- Mitigation: updated kernel & microcode
|
||||||
|
- Performance impact of the mitigation: low to significant depending on the mitigation
|
||||||
|
|
||||||
**CVE-2023-20593** Cross-Process Information Leak (Zenbleed)
|
**CVE-2023-20593** Cross-Process Information Leak (Zenbleed)
|
||||||
|
|
||||||
- Impact: Kernel & all software
|
- Impact: Kernel & all software
|
||||||
- Mitigation: either kernel mitigation by disabling a CPU optimization through an MSR bit, or CPU microcode mitigation
|
- Mitigation: either kernel mitigation by disabling a CPU optimization through an MSR bit, or CPU microcode mitigation
|
||||||
- Performance impact of the mitigation: TBD
|
- Performance impact of the mitigation: TBD
|
||||||
|
|
||||||
|
**CVE-2023-23583** Redundant Prefix issue (Reptar)
|
||||||
|
|
||||||
|
- Impact: All software
|
||||||
|
- Mitigation: microcode update for the affected CPU
|
||||||
|
- Performance impact of the mitigation: low
|
||||||
|
@ -1,5 +1,3 @@
|
|||||||
version: '2'
|
|
||||||
|
|
||||||
services:
|
services:
|
||||||
spectre-meltdown-checker:
|
spectre-meltdown-checker:
|
||||||
build:
|
build:
|
||||||
|
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user