How to Install and Uninstall spectre-meltdown-checker Package on openSUSE Leap
Last updated: December 24,2024
1. Install "spectre-meltdown-checker" package
This guide covers the steps necessary to install spectre-meltdown-checker on openSUSE Leap
$
sudo zypper refresh
Copied
$
sudo zypper install
spectre-meltdown-checker
Copied
2. Uninstall "spectre-meltdown-checker" package
Please follow the steps below to uninstall spectre-meltdown-checker on openSUSE Leap:
$
sudo zypper remove
spectre-meltdown-checker
Copied
3. Information about the spectre-meltdown-checker package on openSUSE Leap
Information for package spectre-meltdown-checker:
-------------------------------------------------
Repository : Main Repository
Name : spectre-meltdown-checker
Version : 0.44-3.6.1
Arch : x86_64
Vendor : SUSE LLC
Installed Size : 260.1 KiB
Installed : No
Status : not installed
Source package : spectre-meltdown-checker-0.44-3.6.1.src
Upstream URL : https://github.com/speed47/spectre-meltdown-checker
Summary : Spectre & Meltdown Vulnerability Checker
Description :
A shell script to tell if your Linux installation is vulnerable
against the three "speculative execution" CVEs that were made public
in early 2018.
Without options, the script inspects the currently running kernel.
Alternatively, a kernel image can be specify on the command line to
analyze a non-running kernel.
The script tries to detect mitigations, including backported
non-vanilla patches, regardless of the advertised kernel version
number.
-------------------------------------------------
Repository : Main Repository
Name : spectre-meltdown-checker
Version : 0.44-3.6.1
Arch : x86_64
Vendor : SUSE LLC
Installed Size : 260.1 KiB
Installed : No
Status : not installed
Source package : spectre-meltdown-checker-0.44-3.6.1.src
Upstream URL : https://github.com/speed47/spectre-meltdown-checker
Summary : Spectre & Meltdown Vulnerability Checker
Description :
A shell script to tell if your Linux installation is vulnerable
against the three "speculative execution" CVEs that were made public
in early 2018.
Without options, the script inspects the currently running kernel.
Alternatively, a kernel image can be specify on the command line to
analyze a non-running kernel.
The script tries to detect mitigations, including backported
non-vanilla patches, regardless of the advertised kernel version
number.