From 789734f39553b74dfa5be6056a689fd4b7ccc3e1 Mon Sep 17 00:00:00 2001 From: Sylvestre Ledru Date: Sun, 8 Apr 2018 17:56:55 +0200 Subject: [PATCH] Fix some user facing typos with codespell -w -q3 . --- README.md | 2 +- spectre-meltdown-checker.sh | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 82fb80b..4a9c718 100644 --- a/README.md +++ b/README.md @@ -83,6 +83,6 @@ Your system exposure also depends on your CPU. As of now, AMD and ARM processors The nature of the discovered vulnerabilities being quite new, the landscape of vulnerable processors can be expected to change over time, which is why this script makes the assumption that all CPUs are vulnerable, except if the manufacturer explicitly stated otherwise in a verifiable public announcement. -Please also note that for Spectre vulnerabilities, all software can possibly be exploited, this tool only verifies that the kernel (which is the core of the system) you're using has the proper protections in place. Verifying all the other software is out of the scope of this tool. As a general measure, ensure you always have the most up to date stable versions of all the softwares you use, especially for those who are exposed to the world, such as network daemons and browsers. +Please also note that for Spectre vulnerabilities, all software can possibly be exploited, this tool only verifies that the kernel (which is the core of the system) you're using has the proper protections in place. Verifying all the other software is out of the scope of this tool. As a general measure, ensure you always have the most up to date stable versions of all the software you use, especially for those who are exposed to the world, such as network daemons and browsers. This tool has been released in the hope that it'll be useful, but don't use it to jump to conclusions about your security. diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 8ff056d..e044a70 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -65,7 +65,7 @@ show_usage() --variant [1,2,3] specify which variant you'd like to check, by default all variants are checked, can be specified multiple times (e.g. --variant 2 --variant 3) - --hw-only only check for CPU informations, don't check for any variant + --hw-only only check for CPU information, don't check for any variant --no-hw skip CPU information and checks, if you're inspecting a kernel not to be run on this host Return codes: @@ -101,7 +101,7 @@ explicitly stated otherwise in a verifiable public announcement. Please also note that for Spectre vulnerabilities, all software can possibly be exploited, this tool only verifies that the kernel (which is the core of the system) you're using has the proper protections in place. Verifying all the other software is out of the scope of this tool. As a general measure, ensure you always have the most up to date stable versions of all -the softwares you use, especially for those who are exposed to the world, such as network daemons and browsers. +the software you use, especially for those who are exposed to the world, such as network daemons and browsers. This tool has been released in the hope that it'll be useful, but don't use it to jump to conclusions about your security. @@ -1700,12 +1700,12 @@ check_variant1_linux() else perl -ne '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$? if [ $ret -gt 0 ]; then - pstatus green YES "$ret occurence(s) found of 64 bits array_index_mask_nospec()" + pstatus green YES "$ret occurrence(s) found of 64 bits array_index_mask_nospec()" v1_mask_nospec="64 bits array_index_mask_nospec" else perl -ne '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$? if [ $ret -gt 0 ]; then - pstatus green YES "$ret occurence(s) found of 32 bits array_index_mask_nospec()" + pstatus green YES "$ret occurrence(s) found of 32 bits array_index_mask_nospec()" v1_mask_nospec="32 bits array_index_mask_nospec" else pstatus yellow NO