mirror of
				https://github.com/speed47/spectre-meltdown-checker.git
				synced 2025-11-04 07:40:56 +01:00 
			
		
		
		
	missed version bump + README typofix
This commit is contained in:
		@@ -63,7 +63,7 @@ CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
 | 
			
		||||
> STATUS:  VULNERABLE  (PTI is needed to mitigate the vulnerability)
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
## #First patched kernel of RHEL6
 | 
			
		||||
### First patched kernel of RHEL6
 | 
			
		||||
 | 
			
		||||
```
 | 
			
		||||
$ sudo ./spectre-meltdown-checker.sh --kernel /tmp/vmlinuz-2.6.32-696.18.7.el6.x86_64 --config /tmp/config-2.6.32-696.18.7.el6.x86_64 --map /tmp/System.map-2.6.32-696.18.7.el6.x86_64
 | 
			
		||||
@@ -74,7 +74,7 @@ Will use vmlinux image /tmp/vmlinuz-2.6.32-696.18.7.el6.x86_64
 | 
			
		||||
Will use kconfig /tmp/config-2.6.32-696.18.7.el6.x86_64
 | 
			
		||||
Will use System.map file /tmp/System.map-2.6.32-696.18.7.el6.x86_64
 | 
			
		||||
 | 
			
		||||
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'm
 | 
			
		||||
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
 | 
			
		||||
* Kernel compiled with LFENCE opcode inserted at the proper places:  YES  (84 opcodes found, which is >= 70)
 | 
			
		||||
> STATUS:  NOT VULNERABLE 
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -1,7 +1,7 @@
 | 
			
		||||
#! /bin/sh
 | 
			
		||||
# Spectre & Meltdown checker
 | 
			
		||||
# Stephane Lesimple
 | 
			
		||||
VERSION=0.16
 | 
			
		||||
VERSION=0.17
 | 
			
		||||
 | 
			
		||||
# print status function
 | 
			
		||||
pstatus()
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user