Source: spectre-meltdown-checker
Section: kernel
Priority: optional
Maintainer: Steven Pusser <stevep@mxlinux.org>
XSBC-Original-Maintainer: Sylvestre Ledru <sylvestre@debian.org>
Uploaders: Holger Levsen <holger@debian.org>
Build-Depends: debhelper (>= 10), help2man
Standards-Version: 4.2.1
Homepage: https://github.com/speed47/spectre-meltdown-checker
Vcs-Git: https://salsa.debian.org/debian/spectre-meltdown-checker.git
Vcs-Browser: https://salsa.debian.org/debian/spectre-meltdown-checker

Package: spectre-meltdown-checker
Architecture: all
Depends: ${shlibs:Depends}, ${misc:Depends}
Description: Spectre & Meltdown vulnerability/mitigation checker
 A shell script to tell if your system is vulnerable against the several
 "speculative execution" CVEs that were made public in 2018.
 .
    CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
    CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
    CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
    CVE-2018-3640 [rogue system register read] aka 'Variant 3a'
    CVE-2018-3639 [speculative store bypass] aka 'Variant 4'
    CVE-2018-3615 [L1 terminal fault] aka 'Foreshadow (SGX)'
    CVE-2018-3620 [L1 terminal fault] aka 'Foreshadow-NG (OS)'
    CVE-2018-3646 [L1 terminal fault] aka 'Foreshadow-NG (VMM)'
