[estudio@Dell ~]$ sudo spectre-meltdown-checker [sudo] password for estudio: Spectre and Meltdown mitigation detection tool v0.31 Checking for vulnerabilities against running kernel Linux 4.14.14-1-MANJARO #1 SMP PREEMPT Wed Jan 17 22:34:54 UTC 2018 x86_64 CPU is Intel(R) Core(TM) i7-6500U CPU @ 2.50GHz CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1' * Checking whether we're safe according to the /sys interface: NO (kernel confirms your system is vulnerable) > STATUS: **VULNERABLE** (Vulnerable) CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2' * Checking whether we're safe according to the /sys interface: NO (kernel confirms your system is vulnerable) > STATUS: **VULNERABLE** (Vulnerable: Minimal generic ASM retpoline) CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3' * Checking whether we're safe according to the /sys interface: YES (kernel confirms that the mitigation is active) > STATUS: **NOT VULNERABLE** (Mitigation: PTI) A false sense of security is worse than no security at all, see --disclaimer [estudio@Dell ~]$
I am not concerned about it, thanks for another update and the tool checker