spectre-meltdown-checker-0.46-150100.3.9.1;>+`e p9|7Mmx{ dJ E ǿ5 PC Vp-mbXF`PH7ɍo 6AЬ1౏]+~U~??9hp},uL6B]GT%<*%3$ x ]ԉ M7gb޷O/(1X#1G N Vh7j  NSYޭȕ5T?׹?W"&3a_)>>$?$d  - V(,Efs      .dx@(^8h9:FG H I 4X <Y D\ h] |^ b!c"-d"e"f"l"u"v"w#xx#y#z####$Cspectre-meltdown-checker0.46150100.3.9.1Spectre & Meltdown Vulnerability CheckerA shell script to tell if your Linux installation is vulnerable against the three "speculative execution" CVEs that were made public in early 2018. Without options, the script inspects the currently running kernel. Alternatively, a kernel image can be specify on the command line to analyze a non-running kernel. The script tries to detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number.e h01-ch3dvSUSE Linux Enterprise 15SUSE LLC GPL-3.0-onlyhttps://www.suse.com/Productivity/Securityhttps://github.com/speed47/spectre-meltdown-checkerlinuxx86_641%\A큤A큤e e dDe e e4a9329bed4d659c6487554b16559f7234264c3f893adb31253192d2cf696185faccf1e416eaa88e4eb6ef32904f8cbc4b3bb3e5e3247008d3e719eab0c7ac31516b57be4cea010520785c0961caec746850c2a9162add17475abb0924acc8d2rootrootrootrootrootrootrootrootrootrootspectre-meltdown-checker-0.46-150100.3.9.1.src.rpmspectre-meltdown-checkerspectre-meltdown-checker(x86-64)@    /bin/shbinutilsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1d/@bF@`+^*@^ P@]@]^@\\P\e\e[/[[ @[@Z\ZYZX@meissner@suse.commeissner@suse.commeissner@suse.comdimstar@opensuse.orgmeissner@suse.commeissner@suse.compalica@liguros.netmeissner@suse.compalica@liguros.netjengelh@inai.demeissner@suse.comsean@suspend.netjengelh@inai.demeissner@suse.comadrian@suse.deadrian@suse.deadrian@suse.de- updated to 0.46 This release mainly focuses on the detection of the new Zenbleed (CVE-2023-20593) vulnerability, among few other changes that were in line waiting for a release: - feat: detect the vulnerability and mitigation of Zenbleed (CVE-2023-20593) - feat: add the linux-firmware repository as another source for CPU microcode versions - feat: arm: add Neoverse-N2, Neoverse-V1 and Neoverse-V2 - fix: docker: adding missing utils (#433) - feat: add support for Guix System kernel - fix: rewrite SQL to be sqlite3 >= 3.41 compatible (#443) - fix: a /devnull file was mistakenly created on the filesystem - fix: fwdb: ignore MCEdb versions where an official Intel version exists (fixes #430)- updated to 0.45 - arm64: phytium: Add CPU Implementer Phytium - arm64: variant 4: detect ssbd mitigation from kernel img, system.map or kconfig - chore: ensure vars are set before being dereferenced (set -u compat) - chore: fix indentation - chore: fwdb: update to v220+i20220208 - chore: only attempt to load msr and cpuid module once - chore: read_cpuid: use named constants - chore: readme: framapic is gone, host the screenshots on GitHub - chore: replace 'Vulnerable to' by 'Affected by' in the hw section - chore: speculative execution -> transient execution - chore: update fwdb to v222+i20220208 - chore: update Intel Family 6 models - chore: wording: model not vulnerable -> model not affected - doc: add an FAQ entry about CVE support - doc: add an FAQ.md and update the README.md accordingly - doc: more FAQ and README - doc: readme: make the FAQ entry more visible - feat: add --allow-msr-write, no longer write by default (#385), detect when writing is denied - feat: add --cpu, apply changes to (read|write)_msr, update fwdb to v221+i20220208 - feat: add subleaf != 0 support for read_cpuid - feat: arm: add Cortex A77 and Neoverse-N1 (fixes #371) - feat: bsd: for unimplemented CVEs, at least report when CPU is not affected - feat: hw check: add IPRED, RRSBA, BHI features check - feat: implement detection for MCEPSC under BSD - feat: set default TMPDIR for Android (#415) - fix: extract_kernel: don't overwrite kernel_err if already set - fix: has_vmm false positive with pcp - fix: is_ucode_blacklisted: fix some model names - fix: mcedb: v191 changed the MCE table format - fix: refuse to run under MacOS and ESXi - fix: retpoline: detection on 5.15.28+ (#420) - fix: variant4: added case where prctl ssbd status is tagged as 'unknown'- updated to 0.44 - feat: add support for SRBDS related vulnerabilities - feat: add zstd kernel decompression (#370) - enh: arm: add experimental support for binary arm images - enh: rsb filling: no longer need the 'strings' tool to check for kernel support in live mode - fix: fwdb: remove Intel extract tempdir on exit - fix: has_vmm: ignore kernel threads when looking for a hypervisor (fixes #278) - fix: fwdb: use the commit date as the intel fwdb version - fix: fwdb: update Intel's repository URL - fix: arm64: cve-2017-5753: kernels 4.19+ use a different nospec macro - fix: on CPU parse info under FreeBSD - chore: github: add check run on pull requests - chore: fwdb: update to v165.20201021+i20200616- Fix typo (s/Require:/Requires:/).- added requires binutils, as the script calls "readelf"- version 0.43 - feat: implement TAA detection (CVE-2019-11135 bsc#1139073) - feat: implement MCEPSC / iTLB Multihit detection (CVE-2018-12207 bsc#1117665) - feat: taa: add TSX_CTRL MSR detection in hardware info - feat: fwdb: use both Intel GitHub repo and MCEdb to build our firmware version database - feat: use --live with --kernel/--config/--map to override file detection in live mode - enh: rework the vuln logic of MDS with --paranoid (fixes #307) - enh: explain that Enhanced IBRS is better for performance than classic IBRS - enh: kernel: autodetect customized arch kernels from cmdline - enh: kernel decompression: better tolerance against missing tools - enh: mock: implement reading from /proc/cmdline - fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a - fix: lockdown: detect Red Hat locked down kernels (impacts MSR writes) - fix: lockdown: detect locked down mode in vanilla 5.4+ kernels - fix: sgx: on locked down kernels, fallback to CPUID bit for detection - fix: fwdb: builtin version takes precedence if the local cached version is older - fix: pteinv: don't check kernel image if not available - fix: silence useless error from grep (fixes #322) - fix: msr: fix msr module detection under Ubuntu 19.10 (fixes #316) - fix: mocking value for read_msr - chore: rename mcedb cmdline parameters to fwdb, and change db version scheme - chore: fwdb: update to v130.20191104+i20191027 - chore: add GitHub check workflow - upstream tarball no longer includes license, use the gpl 3 standalone html for it- version 0.42 * add FreeBSD MDS mitigation detection * add mocking functionality to help debugging, dump data to mock the behavior of your CPU with --dump-mock-data * AMD, ARM and CAVIUM are not vulnerable to MDS * RDCL_NO bit wasn't taking precedence for L1TF check on some newer Intel CPUs * The MDS_NO bit on newer Intel CPUs is now recognized and used * remove libvirtd from hypervisor detection to avoid false positives (#278) * under BSD, the data returned when reading MSR was incorrectly formatted * update builtin MCEdb from v110 to v111- noarch does not work on older distros, removed- version 0.41 * add support for the 4 MDS CVEs * add Spectre and Meltdown mitigation detection for Hygon CPU * for SSBD, report whether the mitigation is active * and other fixes and enhancements- Use Source URL. Remove services, just run `osc service lr download_files` for updating.- disable the services, just run "osc service disabledrun" for upadating.- version 0.40 * add support for L1TF CVEs (aka Foreshadow and Foreshadow-NG) * add summary of vulnerabilities at the end of script execution- Compact and wrap description.- version 0.37 * lots of improvements * spectre v4 and v3a added- update to version 0.31 * meltdown: detecting Xen PV, reporting as not vulnerable * is_cpu_vulnerable: add check for old Atoms * ibrs: check for spec_ctrl_ibrs in cpuinfo- update to version 0.29 * AMD updates- initial package of version 0.27h01-ch3d 17083353520.46-150100.3.9.10.46-150100.3.9.1spectre-meltdown-checker.shspectre-meltdown-checkerREADME.mdspectre-meltdown-checkergpl-3.0-standalone.html/usr/bin//usr/share/doc/packages//usr/share/doc/packages/spectre-meltdown-checker//usr/share/licenses//usr/share/licenses/spectre-meltdown-checker/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32638/SUSE_SLE-15-SP1_Update/8cf2017aa488feeb19862bff46ba34ff-spectre-meltdown-checker.SUSE_SLE-15-SP1_Updatedrpmxz5x86_64-suse-linuxPOSIX shell script, ASCII text executable, with very long linesdirectoryASCII text, with very long linesHTML document, ASCII textR}DD?32ߤutf-86bc2ed0b997160fe168d8fdecd6468f7740cad10f9e6bde6be57d6433661424f? 7zXZ !t/I8b]"k%:JCn_b Vx&R@1yxG7}V#rHW85!Wv/'Iy مr~K1ơDl3|*.pO>ͷ3H<&6(uza)-÷qu =7+ښ]7j W1?QVO 1@L `[3H8^pYʭ_dbKv hk]r !F%s3q|#\klƿ:Ϡt28zBIET7p ;Ya@<uy*ɈMhB]V2Ȏ`1RfbCZF!] B$d?ZAPc.CϱfܽNr.$!8:>KqNBhKפG:\=+-Y3@|U@T'jo| # )+s36޶mVho@cbF /'23Xd ,Y ^ۛ\e;qFn&XȏV1F_)I@If瞼z?n.jA^'VBjXS +d?;us*'̴cfbfJ꠴ 0?a[K`|W};Ug]I"ž} IIsٰl̄.u1HC u_14\wHt@?8x]GJ*-cZZ\bNHVG9N[s)0uB"9rKA8rM-H{ !Dǭf:f W FSJsgֲ^-Ce\ uR?f[ۮER),B> >+W:P[m*B:AAbcO`FD7_pݧ ]<*/}=kiKw"W,<+fAVe|vZ~(*gq/w*[5'tT`$l#9ϨŽ.x>//E=jL:ґ;uУh[ϥe,V++p܇.TvK.I}.;%!0SN81_f4߈2'|ksY 7H_/Yp~" C>YXscI5SNcW%9΅ΊԔč̍-cMneG{JΫoQHL6:DBJt\5%I3 neNwa$ Sw|PfwGv7 =a5 㛨THُI23'6?622^A%ar5q1e~Vt_<*nT W>Ơ_!_/% H&)(IxgV`F)huc=+aN:m^f=u_/ثR۶AńJ9Bi9)3X;?bxٹ_kC=rC޳YDip7A!KKy6P]Fc)T0' i'(k;jUܻ_m9(pZh;NIYgߗ;_sZf`[^λ>Y;֊Y(O|% uzU'q_5RT/ J1KϏwNүmtĴ: ¼}lRi)0hDܔԚ(m;b24ss Ѫ]io=iU򸽴fr݀(\æS ڑjNszquhkQe$3SxԐҗ>#XP!Y(|? H#]?YzN>tc^aLOTxQ){c}d,IϠ@k'Gz1J:QK5_mvӚ ֫kёZiSi[pS#TgUNO8Z$PDT+旀?XDVof®}9>8S4.>(sHCATa11YsŚ$il&Ip]~

#vr^);p%SHRY&@Ù ]BСbh5aΥ,'c=7hWߧfUc~'4NQ` ?RJ 9`n&GO7?i7m:^+D7"Q[S)Hi$D^'.C`9<;;"9vlPfSeԥ+R45+]d-ŒKIvx0(sP..ZbJA&H= tGqQU~Xrɝ~ ]HsVx&(n4Mmbp"#GGatn8A(izE>g sYׇv^4?x̘'%ƚ;̀z1>JJ«A97vK0`H0ˀ=3XQܩUZC^/^Қe\,j l:o+0 p'F!u%E^}#+;V# u?;Α0sp} -m*&wF5|d]*@Ɲx=_C܈nTvX5-+hJNe()yWM̱ 8OSxʹ;oQ0ϝ[ /xiۊ6)Oi7a]GA $@*P~ͭü OZLu~ O)hҸLo|i|o68vO;~i1%80+C2ϭx>Ğ*,|sUB$>&5xML%@_r9Junhܼ',@ݽR\Ļn#9 bDxqD|~*1 QT  o -8ܯ!ؠboi=gc$HF Nzwqd^g*!HI!H*@7T&r3n{nLnSv-D_HF}0ǽxm#k>S+<< crDU-[g"5õv,bQ]TPKJv6D+tYM;/Cܫ|#^pf?gNPR:_‘Luaw H#@+ }ƶ΋,tMU)қĨO--+|u~ػS40# 6ppyU|52f_a+\:u./1@ox\#pE"4̓~]c8 kVĉC{QBNe6ܷ1 ~Q֓i8/| `-D} ͙$dh],-Cy_*t!3\?ΗPb&J>^ e_v -јj!%^.'AMn;Ymvܪ^rwcهr\/؃T+l $VjtؑLɛJIY>U릞Y䤃MB>#J)8ƭ!7X#eP+:[Cn`B>3/pTh8G6ܤ JF)b++Md&wlADWKR$dxJ)mxmd,O2d5EjIF\wHVIJmw!lFƦ*jz> z!sM֮V?Ә?NHrPEa|9E%o9U+z{uIdG렙d;.Q.z ihq͸8l2uݻۛQaMS-:q S8?([#xkSy&,~bIKYtR{oevG "4G(\^<|^yA!w{n૧0k\y-PwCaeג;r5ݶ` ptä:׍7o{8Ϋq(5g'K4$>cc6$n;|`=Tvglvdf/N(\}PF8wJZtyF;\ְFWy6r:Nd:*:*Ȝ1tKG^@y )=pٸHN!2)Pѓ䛲 D2edfwEE|8a#Z0[H; 4 ;( 6 椲6DzuY|ֺne=GNz!G6Nf]t&Ck3N"Ͽ ԃ `Y*$45^q60-! TGX"IhlM+?AėY;-Y!#\ɒVlC[ =([/(+^E#IA± ;o>"L,)3gBnZQd!dp_O x (ayEW.G_n 1Z=e၁,Im9wV%& ga`ݐSnlV"ߗt`k!X8,4_Q9mcqD)?6m5AbkBI[$ER-#"԰I;-ŷW K6e¨"& 3+h2X1ۮ2Jdթ򍫼MȢs*zz j'.R|q BCT`0?| Yo3enrŔc6[Il>T"9(g:nUՀu%gs'[I $>ҕϭ}-;Ѫ~q"f07.j7Ui`xZJB]zBЩe'FDBTkdaUD9'l3.Ŕ_LKUيtP^Y ?%g9g̔Cbc/"ՃFZZ7|N7oW?ߤ)M< ?4x (D =kEg7j}iyQ${H~NZeO&mi2IuS5'g>?Aqn Xez7.p `Sʺ-R:8@VNve4:,4lkP}ViBm;纱Ӄ։tZbpl&h햐,%g5-`bJRaJxT2~+IbBUMN/7y1#@"TЍô҄UJ p%MiE=."sX(&APXt>n}Tl\FMq4!"  rX~8"Q̅2\ȑL,5b SU[RSa055 Jb]K_\ ν ,aZzo1v f`VT )IWV*uogJ;7U>%"S$x.[q ͊emF&`Y}gj[²`tLNO,0__m2r&P,)j6{ZкrH aN7مdFiDꑑAfU 5u J[Bp|f+wRl0h-|aAN2*zA>h!v}%$i8OI =t}„ΡTWD2X­Wۘa-*4cOvo`'3;FN Aêufw69sLJz$'$,G(wb=mT縍j& Q `.9}luլ)IB([mY먌e0C#AS~lٿds3ffS:v? &+ji"n;[J]L=mno<\e*+KQowmO}ĄT%lj@9rmh*ʌnģpI@  T]. ?b7#'#3 +{ kx0/$g0\5IrEmRѮ&{APƗ,$uY-nnYc&tpP̆U*j@ŦO~mdT>JMMVf xY`矲+"Oki .3dQba)Q 2Tc%8$f*_}K+&| yp$OeUr66i-2y}Q~4 ,4o+[Y`GÎg+|yJJ6u&^`0yiW0SI+3ZAQ%o<;)A{y![;]O#™R1˦oS=X0q-l՚5gr0E@-wӎX>MJFu;BmtSmQ{a\U ANn0bЉY%l nq̣AAuq*­6t[P)vTaMhs]EB]n2f8nL='G}(^ h9r';Y沆3m.5I Op qwbvD̍M$5D)KEz4y*yl4V=Ό >L,[ ^q[%4a H3 i8 j`;lF{Y}_g09&_^4?$'EägL볦3p& $SYvO+f,şX(z^@)2,  p+9cwRh>Dޓ߄[:sgiݵwKSޤ߄c`iï]^MH^>t@Fؙ(% q hj%Q[nr,bsԔ5t%W+*Q߫k^B1TSJ/ͧ~ c胃k$<7E(Ir:8iפӏ%C2w#躸LzXCO_1Eb NOF9u*k z0Wn]pD j]cچgcѢ)6<)z>9.m At!_34^ z\*|TqlRPE@tԠ\}}rJ;{iG-8Sh]^_PU褈,ӛk6 3PAGqh(cVH.a]h{BZDIPI;m %-i6sұ?!龋.>t.( *F<ȓD99PYw_9u) x<~k &fPӶ=V<ĿDG0߈WuU !a2 }!0-WJL7&:b9ܰVLV^f+s9|Ug7d`dY8I̚wWj `Hbpm!9k1HP1!6Jb?UCWHE:%4F6zhx3o4""Gq0BG6yJ k?rN GWD6+;A)@{Twx٠; dj)M0"G!u쎤3Weqirq5' >Ҙ'[gԵZ,/ 1omKDS T5_\FKNfQIr2.Mg\ a^9$ȗp>bZ$Q-u%|6XcN|~bd|M<7}A;ATf?r9櫧S|>f#Ya[Swj:8WϨb2nOMZ[-#L::hdVxKM[I2_LWq?VH$ϡ13+:X:&6w#l$qNw'\,PecSe#F 5`(2SR#͇۫"Oݞ.nQ R# Anv*ɐ 'H&܃PkFuB+9*;PiX+\Hj H$+:kbc8Ci\~58Pqv|dox(LHbaUl\Z B`f4b|yc |W9NkTJ~P:셲ޚ"Wц;>ΆrGT9U]w8h!?VC- tky`hpI'7 |; tP3wq_} 1KRFͱ'쐢oi aj ABm4ƕ.C0\L+M7'+k'.zX FsD+v ellM~cV}F3rփs[ڞd . ٶҦ5)̂t@(:VVS"2H IKNɕ(?TTDT lt9CmNsQ_ QfjIWmsdY/LG8=Hl?"vݦSi^E5A}zMqMȓ1`x>]c |-;_Ng 3Wff.Թdx@7qjJrESs ~$'HAb>ys7 "՛Qz%=s[KS>߰h=#X1[Pzn񏂭87l603w$Ǹy5xm2!qΥ` gӗ+D0:SY@sxhpx;Pi\dǁy"w4#k >` r$~*2e4gއF;y13h.`)gӥ&kC"ۼZ1 [bvbrP)̓K(/*)@T9 _ q4KbN50:$= ڧWg"`vݠ:"*gy(u@c?KY  H9!믠nMhb;x@cޮ)*pVzc@*gu- FV-,: 1L_'v\P)U>OR9ihrUHۮ| Əy ?޷Z%NI _5v<2ư-Z_Ų'6c`q<1ǿw%cԚK#GA}t50ZOh9L-hS}y~}s)#u!#ʚdlfF-e;Ϛ"3,О[$TkBSexpkvZK\Ռ6g !X,R ӜN)#o5 VuAd?0Tb3>O Ej,^?M6PJ~k_̖e\\qW v:Ͳexuؔ0|i/ O㋚H4dɻ{䵅*5.GwsfsϬ@6ZmN,UQPkPPqH+q†^ze=|:7#kC)jP=$dP3ĸA ĢݸEzXt*Q 3F˴9 ߰O9">!ˮ|M*g;FNa%⸼%HtM2HU~`B g-gE"uӱtm>q-cLޛM /U}N^rPKD]tzo4yڎq{#fIj )#\ &aְݲ~"hm!=AA;)%I_4/Ю{e: Hj U[E J #Ďz&2'Uhg٪q$ b ]VIW3g6fcLRȸ#6 \y _ +|=?M^jtlCD(4AcAc85B#9A + PnObnC,1n\8hrH̕.{V""n޲t,nikŵfisVD^Th3l'zfŌ%כɵ8!qBcYiײە.W `R:.AxLTb$%߇ddpT˲YV\ ^DCdR&̤ hbZ}\*VH?Y'Só 3MP!_!xrpA8Z=.X{tm|>MlWOTn/VWCDž_(@DD]tE.rlgTcصWc@]㨥h+aLٞ\3hnZص7r}V Q)ZbלS2nVbm3Q=-f62|J;/ISCڿԙ".cop%޵YHY_g 2zU\A)iR;q8RPTGJנ z AذcFXo)GQUEI:6k-^+2՟E H芇em ufxn"VQi^[lީש m-$HiLluS/$<64de1o>@|)~jxS ѵ9(o+aaY rA0f$}6FRjKvS;AL.lL{W6AVK[i-Au tL3I 9Xk~(oMY§\㉏y,2-tk.+aRMk +M 2[$᜵NF*2qA{|=f5yM<Ә;G`J嵬q0b-jZXQoܔW2ji aqp2U**cl(0MFGL8H0pHU_@Mp|hrJGa6cH S ϶+ I96-QomneZO`OfH%:+ZJ@M鐺NwgHF>pF+BL|҄ew(4^*n42ԼA9߯d$; 9  .$4Q6AS(r*($i=j̀Ʋ8,]o#x?4MoTxO|شP},-,iۛ=Sޗb}dىdOqx-b͚#g! ==~*BLf0  a@/5;%BT! -K埭 /<{fP`}%%ڠ%6@e-p/ϊJ;JD!ߢں5*8Ǭ[]߰!֛,a-A1UC(^F?}Pl8 jH3=X{X2zApy ]1qce LHs]R. ][С{쒣8t1K1LJDlƷ04 hg0GPl9ZjHĩ6IvN^]ճ6k/I)CDiԷiuŔ| *V> N,1|E_e)) kjEЗWl5GHV 46!z;&I(~E Eq~WV YZ