mirror of
https://github.com/speed47/spectre-meltdown-checker
synced 2024-12-22 20:33:56 +01:00
chore: remove warning in README, fix display indentation
This commit is contained in:
parent
39c778e3ac
commit
e54e8b3e84
@ -2,16 +2,12 @@ Spectre & Meltdown Checker
|
||||
==========================
|
||||
|
||||
A shell script to tell if your system is vulnerable against the several "speculative execution" CVEs that were made public in 2018.
|
||||
|
||||
This includes:
|
||||
- CVE-2017-5753 aka Spectre Variant 1
|
||||
- CVE-2017-5715 aka Spectre Variant 2
|
||||
- CVE-2017-5754 aka Meltdown or Variant 3
|
||||
- CVE-2018-3640 aka Variant 3a
|
||||
- CVE-2018-3639 aka Variant 4
|
||||
|
||||
**Note: as CVE-2018-3639 and CVE-2018-3640 are extremely recent (published on May 21th 2018), expect frequent changes of the script in the next days to adjust detection.**
|
||||
|
||||
Supported operating systems:
|
||||
- Linux (all versions, flavors and distros)
|
||||
- BSD (FreeBSD, NetBSD, DragonFlyBSD)
|
||||
|
@ -2920,7 +2920,7 @@ check_variant3a()
|
||||
sys_interface_available=0
|
||||
msg=''
|
||||
|
||||
_info_nol " * CPU microcode mitigates the vulnerability: "
|
||||
_info_nol "* CPU microcode mitigates the vulnerability: "
|
||||
if [ -n "$cpuid_ssbd" ]; then
|
||||
# microcodes that ship with SSBD are known to also fix variant3a
|
||||
# there is no specific cpuid bit as far as we know
|
||||
@ -2953,7 +2953,7 @@ check_variant4()
|
||||
sys_interface_available=1
|
||||
fi
|
||||
if [ "$opt_sysfs_only" != 1 ]; then
|
||||
_info_nol " * Kernel supports speculation store bypass: "
|
||||
_info_nol "* Kernel supports speculation store bypass: "
|
||||
if [ "$opt_live" = 1 ]; then
|
||||
if grep -Eq 'Speculation.?Store.?Bypass:' /proc/self/status 2>/dev/null; then
|
||||
kernel_ssb='found in /proc/self/status'
|
||||
|
Loading…
Reference in New Issue
Block a user