{"id":2554,"date":"2023-02-01T13:19:23","date_gmt":"2023-02-01T07:49:23","guid":{"rendered":"https:\/\/trysiteprice.com\/blog\/?p=2554"},"modified":"2023-02-01T13:19:23","modified_gmt":"2023-02-01T07:49:23","slug":"howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux","status":"publish","type":"post","link":"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/","title":{"rendered":"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux"},"content":{"rendered":"<p>The Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715) is a hardware-based vulnerability that affects modern microprocessors and can be exploited by attackers to access sensitive information, such as passwords and encryption keys. To patch the Spectre vulnerability on Linux, you will need to install the latest microcode update from your processor vendor and update your operating system.<\/p>\n<p>For example, on Red Hat Enterprise Linux (RHEL) and CentOS, you can check the installed microcode version by using the dmesg command. To update the microcode, you can run the following command as root:<\/p>\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans\"><\/div>\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs language-sql\">yum <span class=\"hljs-keyword\">update<\/span> microcode_ctl<br \/>\n<\/code><\/div>\n<\/div>\n<p>You will also need to update your Linux kernel to a version that contains the necessary patches to address the Spectre vulnerability. This can be done by using the following command on RHEL\/CentOS:<\/p>\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans\"><\/div>\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs language-sql\">yum <span class=\"hljs-keyword\">update<\/span> kernel<br \/>\n<\/code><\/div>\n<\/div>\n<p>After updating the microcode and kernel, you should reboot your system for the changes to take effect. To verify if your system is protected against Spectre, you can use the spectre-meltdown-checker script, which is a shell script that checks for the presence of the Spectre and Meltdown vulnerabilities on Linux systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715) is a hardware-based vulnerability that affects modern microprocessors and can be exploited by attackers to access sensitive information, such as passwords and encryption keys. To patch the Spectre vulnerability on Linux, you will need to install the latest microcode update from your processor vendor and update your operating system. &#8230; <a title=\"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux\" class=\"read-more\" href=\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/\" aria-label=\"Read more about Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2554","post","type-post","status-publish","format-standard","hentry","category-best-tutorial"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux - TrySitePrice<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux - TrySitePrice\" \/>\n<meta property=\"og:description\" content=\"The Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715) is a hardware-based vulnerability that affects modern microprocessors and can be exploited by attackers to access sensitive information, such as passwords and encryption keys. To patch the Spectre vulnerability on Linux, you will need to install the latest microcode update from your processor vendor and update your operating system. ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"TrySitePrice\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-01T07:49:23+00:00\" \/>\n<meta name=\"author\" content=\"Rahul Sahu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/\"},\"author\":{\"name\":\"Rahul Sahu\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4\"},\"headline\":\"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux\",\"datePublished\":\"2023-02-01T07:49:23+00:00\",\"dateModified\":\"2023-02-01T07:49:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/\"},\"wordCount\":186,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#organization\"},\"articleSection\":[\"Best\/Tutorial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/\",\"url\":\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/\",\"name\":\"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux - TrySitePrice\",\"isPartOf\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#website\"},\"datePublished\":\"2023-02-01T07:49:23+00:00\",\"dateModified\":\"2023-02-01T07:49:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trysiteprice.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#website\",\"url\":\"https:\/\/trysiteprice.com\/blog\/\",\"name\":\"TrySitePrice\",\"description\":\"Free Website Value Calculator Tool\",\"publisher\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trysiteprice.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#organization\",\"name\":\"TrySitePrice\",\"url\":\"https:\/\/trysiteprice.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png\",\"contentUrl\":\"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png\",\"width\":395,\"height\":268,\"caption\":\"TrySitePrice\"},\"image\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4\",\"name\":\"Rahul Sahu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g\",\"caption\":\"Rahul Sahu\"},\"sameAs\":[\"https:\/\/trysiteprice.com\/blog\"],\"url\":\"https:\/\/trysiteprice.com\/blog\/author\/rsahu4242_trysiteprice\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux - TrySitePrice","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/","og_locale":"en_US","og_type":"article","og_title":"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux - TrySitePrice","og_description":"The Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715) is a hardware-based vulnerability that affects modern microprocessors and can be exploited by attackers to access sensitive information, such as passwords and encryption keys. To patch the Spectre vulnerability on Linux, you will need to install the latest microcode update from your processor vendor and update your operating system. ... Read more","og_url":"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/","og_site_name":"TrySitePrice","article_published_time":"2023-02-01T07:49:23+00:00","author":"Rahul Sahu","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/#article","isPartOf":{"@id":"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/"},"author":{"name":"Rahul Sahu","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4"},"headline":"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux","datePublished":"2023-02-01T07:49:23+00:00","dateModified":"2023-02-01T07:49:23+00:00","mainEntityOfPage":{"@id":"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/"},"wordCount":186,"commentCount":0,"publisher":{"@id":"https:\/\/trysiteprice.com\/blog\/#organization"},"articleSection":["Best\/Tutorial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/","url":"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/","name":"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux - TrySitePrice","isPartOf":{"@id":"https:\/\/trysiteprice.com\/blog\/#website"},"datePublished":"2023-02-01T07:49:23+00:00","dateModified":"2023-02-01T07:49:23+00:00","breadcrumb":{"@id":"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/trysiteprice.com\/blog\/howto-patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-on-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trysiteprice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Howto patch Spectre Vulnerability CVE-2017-5753\/CVE-2017-5715 on Linux"}]},{"@type":"WebSite","@id":"https:\/\/trysiteprice.com\/blog\/#website","url":"https:\/\/trysiteprice.com\/blog\/","name":"TrySitePrice","description":"Free Website Value Calculator Tool","publisher":{"@id":"https:\/\/trysiteprice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trysiteprice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/trysiteprice.com\/blog\/#organization","name":"TrySitePrice","url":"https:\/\/trysiteprice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png","contentUrl":"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png","width":395,"height":268,"caption":"TrySitePrice"},"image":{"@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4","name":"Rahul Sahu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g","caption":"Rahul Sahu"},"sameAs":["https:\/\/trysiteprice.com\/blog"],"url":"https:\/\/trysiteprice.com\/blog\/author\/rsahu4242_trysiteprice\/"}]}},"_links":{"self":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts\/2554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/comments?post=2554"}],"version-history":[{"count":2,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts\/2554\/revisions"}],"predecessor-version":[{"id":2556,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts\/2554\/revisions\/2556"}],"wp:attachment":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/media?parent=2554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/categories?post=2554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/tags?post=2554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}