[ { "id": 135628428, "name": "ssbd-tools", "full_name": "tyhicks\/ssbd-tools", "owner": { "login": "tyhicks", "id": 1051156, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1051156?v=4", "html_url": "https:\/\/github.com\/tyhicks" }, "html_url": "https:\/\/github.com\/tyhicks\/ssbd-tools", "description": "Tools to exercise the Linux kernel mitigation for CVE-2018-3639 (aka Variant 4) using the Speculative Store Bypass Disable (SSBD) feature of x86 processors", "fork": false, "created_at": "2018-05-31T19:48:18Z", "updated_at": "2023-09-04T16:39:56Z", "pushed_at": "2018-06-01T16:53:36Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2018-3639", "side-channel", "speculation", "ssbd", "variant4" ], "visibility": "public", "forks": 2, "watchers": 5, "score": 0, "subscribers_count": 2 }, { "id": 137829375, "name": "Intel-CVE-2018-3639-Mitigation_RegistryUpdate", "full_name": "malindarathnayake\/Intel-CVE-2018-3639-Mitigation_RegistryUpdate", "owner": { "login": "malindarathnayake", "id": 9443796, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9443796?v=4", "html_url": "https:\/\/github.com\/malindarathnayake" }, "html_url": "https:\/\/github.com\/malindarathnayake\/Intel-CVE-2018-3639-Mitigation_RegistryUpdate", "description": null, "fork": false, "created_at": "2018-06-19T02:19:26Z", "updated_at": "2018-06-19T02:57:22Z", "pushed_at": "2018-06-19T02:57:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 186128549, "name": "CVE-2018-3639", "full_name": "mmxsrup\/CVE-2018-3639", "owner": { "login": "mmxsrup", "id": 19609323, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19609323?v=4", "html_url": "https:\/\/github.com\/mmxsrup" }, "html_url": "https:\/\/github.com\/mmxsrup\/CVE-2018-3639", "description": "Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux", "fork": false, "created_at": "2019-05-11T12:11:05Z", "updated_at": "2023-04-25T16:54:42Z", "pushed_at": "2021-10-22T16:05:33Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2018-3639", "spectre", "spectreexploit-poc" ], "visibility": "public", "forks": 3, "watchers": 9, "score": 0, "subscribers_count": 2 }, { "id": 193920426, "name": "CVE-2018-3639-specter-v4-", "full_name": "Shuiliusheng\/CVE-2018-3639-specter-v4-", "owner": { "login": "Shuiliusheng", "id": 12653519, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12653519?v=4", "html_url": "https:\/\/github.com\/Shuiliusheng" }, "html_url": "https:\/\/github.com\/Shuiliusheng\/CVE-2018-3639-specter-v4-", "description": "spectre v4 : Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux", "fork": false, "created_at": "2019-06-26T14:26:13Z", "updated_at": "2022-06-09T13:28:22Z", "pushed_at": "2019-06-26T14:34:46Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 } ]