diff options
author | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-09 18:52:21 +0100 |
---|---|---|
committer | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-09 18:52:21 +0100 |
commit | 7222367f04a7c4257228e48b74be8a19facc5991 (patch) | |
tree | 07102da80d06809ff0acddf74c54af8bf59a915e | |
parent | ab512687cfcc6856c0f6690097d6435c231bc30a (diff) | |
download | spectre-meltdown-checker-7222367f04a7c4257228e48b74be8a19facc5991.tar.lz spectre-meltdown-checker-7222367f04a7c4257228e48b74be8a19facc5991.tar.xz spectre-meltdown-checker-7222367f04a7c4257228e48b74be8a19facc5991.zip |
add disclaimer and bump to 0.21
-rwxr-xr-x | spectre-meltdown-checker.sh | 37 |
1 files changed, 36 insertions, 1 deletions
diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 7d38263..82b9a34 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -8,7 +8,7 @@ # # Stephane Lesimple # -VERSION=0.20 +VERSION=0.21 # Script configuration show_usage() @@ -36,6 +36,35 @@ show_usage() -v, --verbose Increase verbosity level --batch Produce machine readable output + IMPORTANT: + A false sense of security is worse than no security at all. + Please use the --disclaimer option to understand exactly what this script does. + +EOF +} + +show_disclaimer() +{ + cat <<EOF +Disclaimer: + +This tool does its best to determine whether your system is immune (or has proper mitigations in place) for the +collectively named "speculative execution" vulnerabilities. It doesn't attempt to run any kind of exploit, and can't guarantee +that your system is secure, but rather helps you verifying whether your system has the known correct mitigations in place. +However, some mitigations could also exist in your kernel that this script doesn't know (yet) how to detect, or it might +falsely detect mitigations that in the end don't work as expected (for example, on backported or modified kernels). + +Your system exposure also depends on your CPU. As of now, AMD and ARM processors are marked as immune to some or all of these +vulnerabilities (except some specific ARM models). All Intel processors manufactured since circa 1995 are thought to be vulnerable. +Whatever processor one uses, one might seek more information from the manufacturer of that processor and/or of the device +in which it runs. + +The nature of the discovered vulnerabilities being quite new, the landscape of vulnerable processors can be expected +to change over time, which is why this script makes the assumption that all CPUs are vulnerable, except if the manufacturer +explicitely stated otherwise in a verifiable public announcement. + +This tool has been released in the hope that it'll be useful, but don't use it to jump to conclusions about your security. + EOF } @@ -214,6 +243,10 @@ while [ -n "$1" ]; do show_header show_usage exit 0 + elif [ "$1" = "--disclaimer" ]; then + show_header + show_disclaimer + exit 0 else show_header show_usage @@ -689,4 +722,6 @@ fi _info +_info "A false sense of security is worst than no security at all, see --disclaimer" + [ -n "$dumped_config" ] && rm -f "$dumped_config" |