How to check Linux for Spectre and Meltdown vulnerability; check and patch Meltdown CPU vulnerability in Linux Ubuntu Systems. Intel Processor Patch for Meltdown and Spectre in Ubuntu Linux. USN-3531-1: Intel Microcode update; Information Leak via speculative execution side channel attacks (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 aka Spectre and Meltdown)
It was discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5715) This update provides the microcode updates required for the corresponding Linux kernel updates.
Check Linux for Spectre and Meltdown vulnerability
To check Linux for Spectre and Meltdown vulnerability, simply download the scrip and execute in Terminal. Run the following commands in Terminal to do so:
$ git clone https://github.com/speed47/spectre-meltdown-checker.git
$ cd spectre-meltdown-checker/
$ sudo ./spectre-meltdown-checker.sh
Also, don’t forget to update the system:
$ sudo apt-get update
$ sudo apt-get dist-upgrade
$ sudo shutdown -r 0
Install Update
Run the following commands to install Intel Processor Patch for Meltdown & Spectre in Ubuntu Linux:
sudo apt-get update
sudo cp -r ~/Downloads/microcode-*/intel-ucode /lib/firmware/
sudo -i && echo 1 > /sys/devices/system/cpu/microcode/reload
sudo restart