How to Install and Uninstall spectre-meltdown-checker Package on openSuSE Tumbleweed
Last updated: December 24,2024
1. Install "spectre-meltdown-checker" package
Learn how to install spectre-meltdown-checker on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
spectre-meltdown-checker
Copied
2. Uninstall "spectre-meltdown-checker" package
Learn how to uninstall spectre-meltdown-checker on openSuSE Tumbleweed:
$
sudo zypper remove
spectre-meltdown-checker
Copied
3. Information about the spectre-meltdown-checker package on openSuSE Tumbleweed
Information for package spectre-meltdown-checker:
-------------------------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : spectre-meltdown-checker
Version : 0.46-2.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 285.5 KiB
Installed : No
Status : not installed
Source package : spectre-meltdown-checker-0.46-2.1.src
Upstream URL : https://github.com/speed47/spectre-meltdown-checker
Summary : Spectre & Meltdown Vulnerability Checker
Description :
A shell script to tell if your Linux installation is vulnerable
against the three "speculative execution" CVEs that were made public
in early 2018.
Without options, the script inspects the currently running kernel.
Alternatively, a kernel image can be specify on the command line to
analyze a non-running kernel.
The script tries to detect mitigations, including backported
non-vanilla patches, regardless of the advertised kernel version
number.
-------------------------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : spectre-meltdown-checker
Version : 0.46-2.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 285.5 KiB
Installed : No
Status : not installed
Source package : spectre-meltdown-checker-0.46-2.1.src
Upstream URL : https://github.com/speed47/spectre-meltdown-checker
Summary : Spectre & Meltdown Vulnerability Checker
Description :
A shell script to tell if your Linux installation is vulnerable
against the three "speculative execution" CVEs that were made public
in early 2018.
Without options, the script inspects the currently running kernel.
Alternatively, a kernel image can be specify on the command line to
analyze a non-running kernel.
The script tries to detect mitigations, including backported
non-vanilla patches, regardless of the advertised kernel version
number.