On Tue, Jan 23, 2018 at 3:16 PM, Sven Hartge <s...@svenhartge.de> wrote: > Nicholas Geovanis <nickgeova...@gmail.com> wrote: > >> I've installed the patch for CVE-2017-5754 as well as the microcode update: > > So, right now, unless you have the latest bleeding edge kernel, compiled > with a repoline-aware pre-release GCC, you will be vulnerable for > CVE-2017-5753 (Spectre#1) and CVE-2017-5715 (Spectre#2) for quite some > time. >
Correct. But the installed fixes were for CVE-2017-5754 as I mentioned, not for those two. >> And yet, the widely-recommended test script at >> https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh > > Did you run the script as root? Yes. > Did you use the most recent version of > it? Yes. > It gets developed quite rapidly, maybe you got a version which was > not correctly functioning at that moment, giving that you download the > script from the master-branch instead of one of the tagged releases. OK, I'll do that again to ensure that I have the right one. Thanks very much. > S° > > -- > Sigmentation fault. Core dumped. >