security output

Published on January 6th, 2018 | Post Views: 1,045  Hits Post Views

Simple script to check if your Linux machine is vulnerable to #Meltdown

Checks whether the system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.

*** Only works on Linux for now ***

How does it work?

It works by using /proc/kallsyms to find system call table and checking whether the address of a system call found by exploiting MELTDOWN match the respective one in /proc/kallsyms.

What to do when you face this error “Unable to read /proc/kallsyms…”

That’s because your system may be preventing the program from reading kernel symbols in /proc/kallsyms due to /proc/sys/kernel/kptr_restrict set to 1. The following command will do the trick:

sudo sh -c “echo 0 > /proc/sys/kernel/kptr_restrict”

Please open an issue if you have an idea on how to fall back to another approach in this scenario.

Getting started

git clone
cd Am-I-affected-by-Meltdown

Copyright (c) 2018 Raphael S. Carvalho <>


Leave a Reply

Back to Top ↑

Read previous post:
Instagram-Py – Simple Instagram Brute Force Script

Instagram-Py is a simple python script to perform basic brute force attack against Instagram , this script can bypass login limiting on wrong passwords , so basically...