diff options
author | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-08 12:14:12 +0100 |
---|---|---|
committer | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-08 12:14:12 +0100 |
commit | c792fa35bf27faed0b033c01d7d996e43d815e15 (patch) | |
tree | e9a9e9d148beec65a9ce3f77711d36aabb963269 | |
parent | d1498fe03f23e1e19ed98eda3149c132718feefe (diff) | |
download | spectre-meltdown-checker-c792fa35bf27faed0b033c01d7d996e43d815e15.tar.lz spectre-meltdown-checker-c792fa35bf27faed0b033c01d7d996e43d815e15.tar.xz spectre-meltdown-checker-c792fa35bf27faed0b033c01d7d996e43d815e15.zip |
add kernel version information to the output
-rwxr-xr-x | spectre-meltdown-checker.sh | 11 |
1 files changed, 7 insertions, 4 deletions
diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 3186c4e..7477f63 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -1,7 +1,7 @@ #! /bin/sh # Spectre & Meltdown checker # Stephane Lesimple -VERSION=0.11 +VERSION=0.12 # print status function pstatus() @@ -84,12 +84,15 @@ extract_vmlinux() # root check if [ "$(id -u)" -ne 0 ]; then - /bin/echo -e "\033[31mNote that you should launch this script with root privileges to get accurate information." - /bin/echo -e "\033[31mWe'll proceed but you might see permission denied errors." - /bin/echo -e "\033[31mTo run it as root, you can try the following command: sudo $0" + /bin/echo -e "\033[31mNote that you should launch this script with root privileges to get accurate information.\033[0m" + /bin/echo -e "\033[31mWe'll proceed but you might see permission denied errors.\033[0m" + /bin/echo -e "\033[31mTo run it as root, you can try the following command: sudo $0\033[0m" /bin/echo fi +/bin/echo -e "Checking vulnerabilities against \033[35m"$(uname -s) $(uname -r) $(uname -m)"\033[0m" +/bin/echo + ########### # SPECTRE 1 /bin/echo -e "\033[1;34mCVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'\033[0m" |