{"height":"190","categories":[],"url":"https://intrajp-computer.hatenadiary.jp/entry/2018/01/15/203041","image_url":null,"author_url":"https://blog.hatena.ne.jp/intrajp/","provider_name":"Hatena Blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fintrajp-computer.hatenadiary.jp%2Fentry%2F2018%2F01%2F15%2F203041\" title=\"spectre_meltdown_checker \u3092\u304b\u3051\u3066\u307f\u305f - computer\u306e\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","blog_title":"computer\u306e\u65e5\u8a18","description":"\u30ce\u30fc\u30c8PC # ./spectre_meltdown_checker.sh Spectre and Meltdown mitigation detection tool v0.31 Checking for vulnerabilities against running kernel Linux 4.14.13-300.fc27.x86_64 #1 SMP Thu Jan 11 04:00:01 UTC 2018 x86_64CPU is Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz CVE-2017-5753 [bounds check bypass] \u2026","provider_url":"https://hatena.blog","published":"2018-01-15 20:30:41","version":"1.0","author_name":"intrajp","title":"spectre_meltdown_checker \u3092\u304b\u3051\u3066\u307f\u305f","width":"100%","type":"rich","blog_url":"https://intrajp-computer.hatenadiary.jp/"}