diff --git a/README.md b/README.md index 81948ed..346162f 100644 --- a/README.md +++ b/README.md @@ -57,10 +57,15 @@ CVE-2024-36350 (TSA-SQ) | 💥 | 💥 (1) | 💥 | 💥 (1) | Microcode + kernel CVE-2024-36357 (TSA-L1) | 💥 | 💥 (1) | 💥 | 💥 (1) | Microcode + kernel update > 💥 Data can be leaked across this boundary. + > ✅ Not affected in this scenario. + > ☠️ Denial of service (system crash or unpredictable behavior), no data leak. + > (1) Cross-process leakage requires SMT (Hyper-Threading) to be active — attacker and victim must share a physical core. + > (2) Only leaks RDRAND/RDSEED output, not arbitrary memory; still allows recovering cryptographic material from any victim. + > (3) CVE-2018-3615 (Foreshadow SGX) inverts the normal trust model: the OS reads SGX enclave data. It is irrelevant unless the system runs SGX enclaves, and the attacker must already have OS-level access.
diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index cc04061..bfbe126 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -13,7 +13,7 @@ # # Stephane Lesimple # -VERSION='26.21.0331915' +VERSION='26.21.0331917' # --- Common paths and basedirs --- readonly VULN_SYSFS_BASE="/sys/devices/system/cpu/vulnerabilities"