aboutsummaryrefslogtreecommitdiffstats
path: root/README.md
diff options
context:
space:
mode:
authorStéphane Lesimple <speed47_github@speed47.net>2018-01-07 20:12:24 +0100
committerStéphane Lesimple <speed47_github@speed47.net>2018-01-07 20:13:10 +0100
commit9def0c949ab9f4a903ca29f3ad7d0ee04336226d (patch)
treec28a4f094fb8aaba3cf369022027e87ca2fac7c6 /README.md
parent64eb1d005c29996896b9fde2461f34a1e1a4ec71 (diff)
downloadspectre-meltdown-checker-9def0c949ab9f4a903ca29f3ad7d0ee04336226d.tar.lz
spectre-meltdown-checker-9def0c949ab9f4a903ca29f3ad7d0ee04336226d.tar.xz
spectre-meltdown-checker-9def0c949ab9f4a903ca29f3ad7d0ee04336226d.zip
update readme
Diffstat (limited to 'README.md')
-rw-r--r--README.md24
1 files changed, 12 insertions, 12 deletions
diff --git a/README.md b/README.md
index 97a6873..fa1562f 100644
--- a/README.md
+++ b/README.md
@@ -28,24 +28,24 @@ Example of the output of the script:
```
$ sudo ./spectre-meltdown-checker.sh
-Spectre and Meltdown mitigation detection tool v0.02
+Spectre and Meltdown mitigation detection tool v0.07
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
-* Kernel compiled with LFENCE opcode inserted at the proper places: NO (only 38 opcodes found, should be >= 60)
-> STATUS: VULNERABLE
+* Kernel compiled with LFENCE opcode inserted at the proper places: NO (only 38 opcodes found, should be >= 60)
+> STATUS: VULNERABLE
CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigation 1
-* Hardware (CPU microcode) support for mitigation: NO
-* Kernel support for IBRS: NO
-* IBRS enabled for Kernel space: NO
-* IBRS enabled for User space: NO
+* Hardware (CPU microcode) support for mitigation: NO
+* Kernel support for IBRS: NO
+* IBRS enabled for Kernel space: NO
+* IBRS enabled for User space: NO
* Mitigation 2
-* Kernel recompiled with retpolines: UNKNOWN (check not yet implemented)
-> STATUS: VULNERABLE (IBRS hardware + kernel support OR retpolines-compiled kernel are needed to mitigate the vulnerability)
+* Kernel compiled with retpolines: NO
+> STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpolines are needed to mitigate the vulnerability)
CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
-* Kernel supports Page Table Isolation (PTI): YES
-* PTI enabled and active: YES
-> STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)
+* Kernel supports Page Table Isolation (PTI): YES
+* PTI enabled and active: YES
+> STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)
```