diff options
author | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-07 15:02:59 +0100 |
---|---|---|
committer | Stéphane Lesimple <speed47_github@speed47.net> | 2018-01-07 15:02:59 +0100 |
commit | 0c4591f8ec0a5dfd7b7c22ef6c14f8b637d33f5d (patch) | |
tree | fb6290487b810040c3aaa4eeaffd600c24fca976 /README.md | |
parent | 4211178b3a9327c42ae0f8d2c69748ced06e3014 (diff) | |
download | spectre-meltdown-checker-0c4591f8ec0a5dfd7b7c22ef6c14f8b637d33f5d.tar.lz spectre-meltdown-checker-0c4591f8ec0a5dfd7b7c22ef6c14f8b637d33f5d.tar.xz spectre-meltdown-checker-0c4591f8ec0a5dfd7b7c22ef6c14f8b637d33f5d.zip |
fix readme
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 2 |
1 files changed, 2 insertions, 0 deletions
@@ -24,6 +24,7 @@ Example of the output of the script: Spectre and Meltdown mitigation detection tool v0.01 +``` CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1' * Kernel recompiled with LFENCE opcode insertion: UNKNOWN (check not yet implemented) > STATUS: UNKNOWN (not implemented, but real answer is most probably VULNERABLE at this stage) @@ -42,3 +43,4 @@ CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3' * Kernel supports Page Table Isolation (PTI): YES * PTI enabled and active: YES > STATUS: NOT VULNERABLE (PTI mitigates the vulnerability) +``` |