From 94857c983d627f6b452ac5182d4ba2281c5bbebb Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Lesimple?= Date: Tue, 3 Apr 2018 14:48:47 +0200 Subject: [PATCH] update readme --- README.md | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 4873eea..82fb80b 100644 --- a/README.md +++ b/README.md @@ -3,11 +3,15 @@ Spectre & Meltdown Checker A shell script to tell if your system is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018. -Supported systems: -- Linux (all versions and flavors) -- FreeBSD -- NetBSD -- DragonFlyBSD +Supported operating systems: +- Linux (all versions, flavors and distros) +- BSD (FreeBSD, NetBSD, DragonFlyBSD) + +Supported architectures: +- x86 (32 bits) +- amd64/x86_64 (64 bits) +- ARM and ARM64 +- other architectures will work, but mitigations (if they exist) might not always be detected For Linux systems, the script will detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number and the distribution (such as Debian, Ubuntu, CentOS, RHEL, Fedora, openSUSE, Arch, ...), it also works if you've compiled your own kernel.