aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--README.md4
-rwxr-xr-xspectre-meltdown-checker.sh2
2 files changed, 3 insertions, 3 deletions
diff --git a/README.md b/README.md
index 42e3715..2089d4f 100644
--- a/README.md
+++ b/README.md
@@ -63,7 +63,7 @@ CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
> STATUS: VULNERABLE (PTI is needed to mitigate the vulnerability)
```
-## #First patched kernel of RHEL6
+### First patched kernel of RHEL6
```
$ sudo ./spectre-meltdown-checker.sh --kernel /tmp/vmlinuz-2.6.32-696.18.7.el6.x86_64 --config /tmp/config-2.6.32-696.18.7.el6.x86_64 --map /tmp/System.map-2.6.32-696.18.7.el6.x86_64
@@ -74,7 +74,7 @@ Will use vmlinux image /tmp/vmlinuz-2.6.32-696.18.7.el6.x86_64
Will use kconfig /tmp/config-2.6.32-696.18.7.el6.x86_64
Will use System.map file /tmp/System.map-2.6.32-696.18.7.el6.x86_64
-CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'm
+CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Kernel compiled with LFENCE opcode inserted at the proper places: YES (84 opcodes found, which is >= 70)
> STATUS: NOT VULNERABLE
diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
index 46ed23e..b84804b 100755
--- a/spectre-meltdown-checker.sh
+++ b/spectre-meltdown-checker.sh
@@ -1,7 +1,7 @@
#! /bin/sh
# Spectre & Meltdown checker
# Stephane Lesimple
-VERSION=0.16
+VERSION=0.17
# print status function
pstatus()