spectre-meltdown-checker-0.44-lp152.2.3.1<>,3a)/=„^ +gRÇ yQ*8?C=} G!$s&65&2YRw*fA0<_RT A8EO( 13΁z8N^lؙ^[ا4EwC$Ul=^;d~,XtX#pW#}d>?D[;TkSZ{);P+ͨtu;*&ּ(ՠ%YEfF0!Ae|f}ڻs>>?d  , U$(;DQ j     DX(088 9l : FGHIXY\]$^b,cdwe|fluvw0xDyXz\lpvCspectre-meltdown-checker0.44lp152.2.3.1Spectre & Meltdown Vulnerability CheckerA shell script to tell if your Linux installation is vulnerable against the three "speculative execution" CVEs that were made public in early 2018. Without options, the script inspects the currently running kernel. Alternatively, a kernel image can be specify on the command line to analyze a non-running kernel. The script tries to detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number.a)lamb20openSUSE Leap 15.2openSUSEGPL-3.0-onlyhttp://bugs.opensuse.orgProductivity/Securityhttps://github.com/speed47/spectre-meltdown-checkerlinuxx86_64[#=A큤A큤a)a)_Wa)a)acee3af632a94358eaf723ec818b9e203e59547428d6c4643131d74c495cab195d6fbd2c1681b967be21e7f1982e5f7e359a6e31d6d1e41871c0bb8c8645031af20948605b5d8e349977579aae01357e50f9fe4d158fc044d33c35b5fab41684rootrootrootrootrootrootrootrootrootrootspectre-meltdown-checker-0.44-lp152.2.3.1.src.rpmspectre-meltdown-checkerspectre-meltdown-checker(x86-64)@    /bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1aS@]@]^@\\P\e\e[/[[ @[@Z\ZYZX@Marcus Meissner Marcus Meissner Pavol Cupka Marcus Meissner Pavol Cupka Jan Engelhardt Marcus Meissner sean@suspend.netjengelh@inai.demeissner@suse.comadrian@suse.deadrian@suse.deadrian@suse.de- version 0.44 (bsc#1189477) - feat: add support for SRBDS related vulnerabilities - feat: add zstd kernel decompression (#370) - enh: arm: add experimental support for binary arm images - enh: rsb filling: no longer need the 'strings' tool to check for kernel support in live mode - fix: fwdb: remove Intel extract tempdir on exit - fix: has_vmm: ignore kernel threads when looking for a hypervisor (fixes #278) - fix: fwdb: use the commit date as the intel fwdb version - fix: fwdb: update Intel's repository URL - fix: arm64: CVE-2017-5753: kernels 4.19+ use a different nospec macro - fix: on CPU parse info under FreeBSD - chore: github: add check run on pull requests - chore: fwdb: update to v165.20201021+i20200616- version 0.43 - feat: implement TAA detection (CVE-2019-11135 bsc#1139073) - feat: implement MCEPSC / iTLB Multihit detection (CVE-2018-12207 bsc#1117665) - feat: taa: add TSX_CTRL MSR detection in hardware info - feat: fwdb: use both Intel GitHub repo and MCEdb to build our firmware version database - feat: use --live with --kernel/--config/--map to override file detection in live mode - enh: rework the vuln logic of MDS with --paranoid (fixes #307) - enh: explain that Enhanced IBRS is better for performance than classic IBRS - enh: kernel: autodetect customized arch kernels from cmdline - enh: kernel decompression: better tolerance against missing tools - enh: mock: implement reading from /proc/cmdline - fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a - fix: lockdown: detect Red Hat locked down kernels (impacts MSR writes) - fix: lockdown: detect locked down mode in vanilla 5.4+ kernels - fix: sgx: on locked down kernels, fallback to CPUID bit for detection - fix: fwdb: builtin version takes precedence if the local cached version is older - fix: pteinv: don't check kernel image if not available - fix: silence useless error from grep (fixes #322) - fix: msr: fix msr module detection under Ubuntu 19.10 (fixes #316) - fix: mocking value for read_msr - chore: rename mcedb cmdline parameters to fwdb, and change db version scheme - chore: fwdb: update to v130.20191104+i20191027 - chore: add GitHub check workflow - upstream tarball no longer includes license, use the gpl 3 standalone html for it- version 0.42 * add FreeBSD MDS mitigation detection * add mocking functionality to help debugging, dump data to mock the behavior of your CPU with --dump-mock-data * AMD, ARM and CAVIUM are not vulnerable to MDS * RDCL_NO bit wasn't taking precedence for L1TF check on some newer Intel CPUs * The MDS_NO bit on newer Intel CPUs is now recognized and used * remove libvirtd from hypervisor detection to avoid false positives (#278) * under BSD, the data returned when reading MSR was incorrectly formatted * update builtin MCEdb from v110 to v111- noarch does not work on older distros, removed- version 0.41 * add support for the 4 MDS CVEs * add Spectre and Meltdown mitigation detection for Hygon CPU * for SSBD, report whether the mitigation is active * and other fixes and enhancements- Use Source URL. Remove services, just run `osc service lr download_files` for updating.- disable the services, just run "osc service disabledrun" for upadating.- version 0.40 * add support for L1TF CVEs (aka Foreshadow and Foreshadow-NG) * add summary of vulnerabilities at the end of script execution- Compact and wrap description.- version 0.37 * lots of improvements * spectre v4 and v3a added- update to version 0.31 * meltdown: detecting Xen PV, reporting as not vulnerable * is_cpu_vulnerable: add check for old Atoms * ibrs: check for spec_ctrl_ibrs in cpuinfo- update to version 0.29 * AMD updates- initial package of version 0.27lamb20 16300806880.44-lp152.2.3.10.44-lp152.2.3.1spectre-meltdown-checker.shspectre-meltdown-checkerREADME.mdspectre-meltdown-checkergpl-3.0-standalone.html/usr/bin//usr/share/doc/packages//usr/share/doc/packages/spectre-meltdown-checker//usr/share/licenses//usr/share/licenses/spectre-meltdown-checker/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:16877/openSUSE_Leap_15.2_Update/e5d4d8bc8f7da306b7ea12f1536aa182-spectre-meltdown-checker.openSUSE_Leap_15.2_Updatedrpmxz5x86_64-suse-linuxPOSIX shell script, ASCII text executable, with very long linesdirectoryASCII text, with very long linesHTML document, ASCII textR~MUWOl/utf-82782f4d8f583eb726914b30df2b09f1cc0f74aaeee7b9ca3ae8224a8136e8a9e? 7zXZ !t/@]"k%%JCn_b Vx&R@1^Gs3BUw]&R$R4; $p‘*0bR@\@ܠ\1U@?P$ݳDHY2 M0H|d+JpC4Z-TJS_(̛!ufn?0#ߋ8?LeX3&ܨ j"Z!- XD=,uϢg)Aaskk|s?t.`CPm37G:|ש j񚒸@gRr; !ҭ+8P#"//7 ك|,qVNanA֭1E3didcәGˣ!=0_S=: ƘpϜAnskĻ>bR.[!UMP]Pm䣜4f#%:,\tZ'cU>|L,S)U{wSf(вKk9wve7(4Q[ &LeG1` r9ayloacQ*uk_)@ړik(OydaʈA]mro5s+:y7ك2Y*$EYY)Njxqd>*':p? _2>D>mփis)^= @"EX7vzIPHK˭5|"<}:3j6 `g)]]<9q9YDgs!HpjJ]yWrFn}rL;sSוZ6C{ҫ2+%ӢFq jT^sa$.(a!C[ >G6Jᘀ -ԹJ t>E1⯺>) 9)I=1(z( Q%O,bDǂ,R.I C&vL:4fBZXo]&QJ_O܍?+e"n%y 32x~C8Q>0P炑)vE j6ه[*[bU3!(%u :dGC^|r֩l0xWrԮWLk$$2+]JWP eH䙃on9mm7fMbw3ID٭}Q$wJyΓĺ7VL?> <3`a;-taT%0'%s־Sʐ^UxޮY>s1p:0GGpߍ[ëT$-:L` ٗQ6DwEh؞9\,qYˈ%yAСz9,"@2hG_@ɄwH2FgʢrAH(OMp[@ǂp (g>|T*`MkLi `]3mX_9 *!dy}[2aJs 8m|NDJ>? }[_Z ӧjfNޙuwbC;{_w'AzEoM%^g__(x \gهruw]s/g k8~NL(ڻoU: bڅ jR K͝8𴒭{ag9 MQsј^&m'MYϫ`m)kBS5]H}šɈϫz(p.EhQh IغtX7U asבxuPWqsGM6a|{Ĭlq0 7H}f_Ly)AH9OӦPS?y0Y(N?򠗇 ?SQ- QDi0"p,ո}Tӂ@$sD( ht0#:z8iz^I>Bm͠< B3N|zHSg3\&B5̾-;RJXIƩi1ӻ<bQbio%7f1iGJher},6 KW9Nl יF^D9-@lxr+MWe^WgmT@PNcB61d5c3q NRQyŸEkӐ[۽@gϥA"\^otpêGp$-bʝXzޓ)~1ݣedz}>S֨7i jcѶ0 ,7 GP ˤ0ϸ&d>:|=gH: 8G*uLK1b9jyy:YD{{y3"}P ٺLbFszY&(%P::%e}AvnYޡl^*,ц UD򻘎zY1Z9ԅ{y )|BY"e0,U5AH :1gjYW)gSL;b;X!6R E_P>hx>D̲.wz Tu6LsO%k>yIJqw4}"#b,PnryŤ G( P1ܵZE8>!A۶@Cw# tbG cLF:.m>Ve'+9sYMOX0F|02ag]`ESKsrc>)|uRoݨj4/@K3ߪ p0^FfL,3pQ-:Blح&P!;|n% d"% blNG^aAjB ɮJPSٸF&ʁ}cw?If4{L=@˼ZhgCݽ^=)qJ U뇗]Tִј n9T4 'N*TSBi]R_#LoE1*cLS;"p~1RjQ8Y wcHb<'w?sT)2gjB} 49䎹} l띂ϐKJgBЯ'e$YfE Y?Lq>{tt;^gI^Ëpk %EK o4IcG̩7pZo I-›ќ,'t~7P}!Wh=AP|emEDi#hnl^ G e)uK Cs#L![uu !2w!U(ay-V8ce#Bٟ YWBY]I v+I\&\b*N$v !j! ()pn7պ4 /f;,1^\MV6Om+P١] {lu`И)g6 '`lJ>')lZ oH4zE_l%Gfd]B@"-+]Y!]ADL@(pաG;V+gyQ&Rۯk4o#I Cqu2V`E3 $eß02 g3auJq|Ä`Y>ME%cX9O6anF `}m  d춅['Ü#l34xhf{fxr;c34#;z1GYպXTt9Kb׹5M B؟B)iUJ<,'Ph~zkc,4}{܂'lg)p d@r/B6쌖hs7ЁFWmdAak>90dTReJ)?ZBziJ$3ӉZ&#c\N䰩%g}SYz8 nW(X0ʮIsӡ3/5vx#iah Q&%#nyʇs9G{[8455[M%pJ\Am-0:i‰;!;9-g#xG G~Š$ : }gmc =gl0 u慒sG b,ԻZUv wߒ/-cH w~`cu|>sPGڌaj*7L]q~[P]nypvKdlߦ%|8s7$ ܱpBQ(v%=3 Ҟвzտ=f{u%ͅsԘ*hmzwq|j~Syv M) Ԉ15(/1̡)=m?ZKxF݁TһO\,@Hl(m:ִD*RL[rzQӥY8P~IZ 8PC[)8Ďa=(hZTހLz?]xOKNC:R=߿"p z(fMLJXhwRްۢ~e]Ri2\e2>,W̒ڲeDuJM 3Mu ! įC'+aZDu,Im7.z?5gv0FC7jX{UTIo4ȷEnqbR}PL*iS*ӁwiW YZ