mirror of
https://github.com/speed47/spectre-meltdown-checker
synced 2025-01-03 18:15:57 +01:00
add kernel version information to the output
This commit is contained in:
parent
d1498fe03f
commit
c792fa35bf
@ -1,7 +1,7 @@
|
|||||||
#! /bin/sh
|
#! /bin/sh
|
||||||
# Spectre & Meltdown checker
|
# Spectre & Meltdown checker
|
||||||
# Stephane Lesimple
|
# Stephane Lesimple
|
||||||
VERSION=0.11
|
VERSION=0.12
|
||||||
|
|
||||||
# print status function
|
# print status function
|
||||||
pstatus()
|
pstatus()
|
||||||
@ -84,12 +84,15 @@ extract_vmlinux()
|
|||||||
# root check
|
# root check
|
||||||
|
|
||||||
if [ "$(id -u)" -ne 0 ]; then
|
if [ "$(id -u)" -ne 0 ]; then
|
||||||
/bin/echo -e "\033[31mNote that you should launch this script with root privileges to get accurate information."
|
/bin/echo -e "\033[31mNote that you should launch this script with root privileges to get accurate information.\033[0m"
|
||||||
/bin/echo -e "\033[31mWe'll proceed but you might see permission denied errors."
|
/bin/echo -e "\033[31mWe'll proceed but you might see permission denied errors.\033[0m"
|
||||||
/bin/echo -e "\033[31mTo run it as root, you can try the following command: sudo $0"
|
/bin/echo -e "\033[31mTo run it as root, you can try the following command: sudo $0\033[0m"
|
||||||
/bin/echo
|
/bin/echo
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
/bin/echo -e "Checking vulnerabilities against \033[35m"$(uname -s) $(uname -r) $(uname -m)"\033[0m"
|
||||||
|
/bin/echo
|
||||||
|
|
||||||
###########
|
###########
|
||||||
# SPECTRE 1
|
# SPECTRE 1
|
||||||
/bin/echo -e "\033[1;34mCVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'\033[0m"
|
/bin/echo -e "\033[1;34mCVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'\033[0m"
|
||||||
|
Loading…
Reference in New Issue
Block a user