meltdown-exploit icon indicating copy to clipboard operation
meltdown-exploit copied to clipboard

Meltdown Exploit PoC

Results 24 meltdown-exploit issues
Sort by recently updated
recently updated
newest added

### Linux kernel version any ### CPU ``` processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 28 model name : Intel(R) Atom(TM) CPU 330 @ 1.60GHz...

[root@archlinux meltdown-exploit]# ./run.sh looking for linux_proc_banner in /proc/kallsyms cached = 21, uncached = 262, threshold 74 read ffffffffaf6009a0 = ff (score=0/1000) read ffffffffaf6009a1 = ff (score=0/1000) read ffffffffaf6009a2 = ff...

NOT VULNERABLE ON 5.14.12-zen1-1-zen #1 ZEN SMP PREEMPT Wed, 13 Oct 2021 16:58:18 +0000 unknown processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 55 model name...

It will be hard to merge all the vulnerable CPUs into README.md. Please, report them here instead.

The string of linux_proc_banner is already in memory,Why do I need to read the data before each detection。Reading data from other programs has no effect on the meltdown program,what is...

looking for linux_proc_banner in /proc/kallsyms protected. requires root + find_linux_proc_banner /proc/kallsyms sudo + sudo sed -n -re s/^([0-9a-f]*[1-9a-f][0-9a-f]*) .* linux_proc_banner$/\1/p /proc/kallsyms + linux_proc_banner=ffffffffab600060 + set +x cached = 23, uncached...

NOT VULNERABLE ON 5.9.1 #1 SMP Sat Oct 24 10:15:01 EDT 2020 x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 61 model name : Intel...

VULNERABLE ON 5.5.0 #1.linuxlite SMP Mon Jan 27 20:13:21 NZDT 2020 x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 15 model name : Intel(R) Celeron(R)...

processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 142 model name : Intel(R) Core(TM)2 i7-7500U CPU @ 2.70GHz stepping : 9 microcode : 0xb4 cpu MHz...