Spectre & Meltdown Checker is A simple shell script to tell if your Linux installation is vulnerable against the 3 “speculative execution” CVEs:
CVE-2017-5753 bounds check bypass (Spectre Variant 1)
+ Impact: Kernel & all software
+ Mitigation: recompile software and kernel with a modified compiler that introduces the LFENCE opcode at the proper positions in the resulting code
+ Performance impact of the mitigation: negligible
CVE-2017-5715: branch target injection (Spectre Variant 2)
+ Impact: Kernel
+ Mitigation 1: new opcode via microcode update that should be used by up to date compilers to protect the BTB (by flushing indirect branch predictors)
+ Mitigation 2: introducing “retpoline” into compilers, and recompile software/OS with it
+ Performance impact of the mitigation: high for mitigation 1, medium for mitigation 2, depending on your CPU
CVE-2017-5754: rogue data cache load (Meltdown)
+ Impact: Kernel
+ Mitigation: updated kernel (with PTI/KPTI patches), updating the kernel is enough
+ Performance impact of the mitigation: low to medium
Usage:
git clone https://github.com/speed47/spectre-meltdown-checker && cd spectre-meltdown-checker ./spectre-meltdown-checker.sh (must root user)
Source: https://github.com/speed47