mirror of
				https://github.com/speed47/spectre-meltdown-checker.git
				synced 2025-10-31 20:50:55 +01:00 
			
		
		
		
	doc(disclaimer): Spectre affects all software
Add a paragraph in the disclaimer stating that this tool focuses on the kernel side of things, and that for Spectre, any software might be vulnerable.
This commit is contained in:
		| @@ -65,14 +65,19 @@ However, some mitigations could also exist in your kernel that this script doesn | ||||
| falsely detect mitigations that in the end don't work as expected (for example, on backported or modified kernels). | ||||
|  | ||||
| Your system exposure also depends on your CPU. As of now, AMD and ARM processors are marked as immune to some or all of these | ||||
| vulnerabilities (except some specific ARM models). All Intel processors manufactured since circa 1995 are thought to be vulnerable. | ||||
| Whatever processor one uses, one might seek more information from the manufacturer of that processor and/or of the device | ||||
| in which it runs. | ||||
| vulnerabilities (except some specific ARM models). All Intel processors manufactured since circa 1995 are thought to be vulnerable, | ||||
| except some specific/old models, such as some early Atoms. Whatever processor one uses, one might seek more information | ||||
| from the manufacturer of that processor and/or of the device in which it runs. | ||||
|  | ||||
| The nature of the discovered vulnerabilities being quite new, the landscape of vulnerable processors can be expected | ||||
| to change over time, which is why this script makes the assumption that all CPUs are vulnerable, except if the manufacturer | ||||
| explicitly stated otherwise in a verifiable public announcement. | ||||
|  | ||||
| Please also note that for Spectre vulnerabilities, all software can possibly be exploited, this tool only verifies that the | ||||
| kernel (which is the core of the system) you're using has the proper protections in place. Verifying all the other software | ||||
| is out of the scope of this tool. As a general measure, ensure you always have the most up to date stable versions of all | ||||
| the softwares you use, especially for those who are exposed to the world, such as network daemons and browsers. | ||||
|  | ||||
| This tool has been released in the hope that it'll be useful, but don't use it to jump to conclusions about your security. | ||||
|  | ||||
| EOF | ||||
|   | ||||
		Reference in New Issue
	
	Block a user