mirror of
https://github.com/speed47/spectre-meltdown-checker
synced 2025-01-03 18:15:57 +01:00
add kernel version information to the output
This commit is contained in:
parent
d1498fe03f
commit
c792fa35bf
@ -1,7 +1,7 @@
|
||||
#! /bin/sh
|
||||
# Spectre & Meltdown checker
|
||||
# Stephane Lesimple
|
||||
VERSION=0.11
|
||||
VERSION=0.12
|
||||
|
||||
# print status function
|
||||
pstatus()
|
||||
@ -84,12 +84,15 @@ extract_vmlinux()
|
||||
# root check
|
||||
|
||||
if [ "$(id -u)" -ne 0 ]; then
|
||||
/bin/echo -e "\033[31mNote that you should launch this script with root privileges to get accurate information."
|
||||
/bin/echo -e "\033[31mWe'll proceed but you might see permission denied errors."
|
||||
/bin/echo -e "\033[31mTo run it as root, you can try the following command: sudo $0"
|
||||
/bin/echo -e "\033[31mNote that you should launch this script with root privileges to get accurate information.\033[0m"
|
||||
/bin/echo -e "\033[31mWe'll proceed but you might see permission denied errors.\033[0m"
|
||||
/bin/echo -e "\033[31mTo run it as root, you can try the following command: sudo $0\033[0m"
|
||||
/bin/echo
|
||||
fi
|
||||
|
||||
/bin/echo -e "Checking vulnerabilities against \033[35m"$(uname -s) $(uname -r) $(uname -m)"\033[0m"
|
||||
/bin/echo
|
||||
|
||||
###########
|
||||
# SPECTRE 1
|
||||
/bin/echo -e "\033[1;34mCVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'\033[0m"
|
||||
|
Loading…
Reference in New Issue
Block a user