mirror of
https://github.com/speed47/spectre-meltdown-checker.git
synced 2025-07-15 15:21:23 +02:00
Compare commits
42 Commits
Author | SHA1 | Date | |
---|---|---|---|
b6fd69a022 | |||
7adb7661f3 | |||
c7892e3399 | |||
aa74315df4 | |||
0b8a09ec70 | |||
b42d8f2f27 | |||
f191ec7884 | |||
28da7a0103 | |||
ece25b98a1 | |||
889172dbb1 | |||
37ce032888 | |||
701cf882ad | |||
6a94c3f158 | |||
2d993812ab | |||
4961f8327f | |||
ecdc448531 | |||
12ea49fe0c | |||
053f1613de | |||
bda18d04a0 | |||
2551295541 | |||
d5832dc1dc | |||
d2f46740e9 | |||
2f6a6554a2 | |||
30842dd9c0 | |||
b4ac5fcbe3 | |||
fef380d66f | |||
55a6fd3911 | |||
35c8a63de6 | |||
5f914e555e | |||
66dce2c158 | |||
155cac2102 | |||
22cae605e1 | |||
eb75e51975 | |||
253e180807 | |||
5d6102a00e | |||
a2dfca671e | |||
36bd80d75f | |||
1834dd6201 | |||
3d765bc703 | |||
07afd95b63 | |||
b7a10126d1 | |||
6346a0deaa |
35
README.md
35
README.md
@ -1,12 +1,39 @@
|
||||
Spectre & Meltdown Checker
|
||||
==========================
|
||||
|
||||
A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
|
||||
A shell script to tell if your system is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
|
||||
|
||||
Without options, it'll inspect your currently running kernel.
|
||||
You can also specify a kernel image on the command line, if you'd like to inspect a kernel you're not running.
|
||||
Supported systems:
|
||||
- Linux (all versions and flavors)
|
||||
- FreeBSD
|
||||
- NetBSD
|
||||
- DragonFlyBSD
|
||||
|
||||
The script will do its best to detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number.
|
||||
For Linux systems, the script will detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number and the distribution (such as Debian, Ubuntu, CentOS, RHEL, Fedora, openSUSE, Arch, ...), it also works if you've compiled your own kernel.
|
||||
|
||||
For BSD systems, the detection will work as long as the BSD you're using supports `cpuctl` and `linprocfs` (this is not the case of OpenBSD for example).
|
||||
|
||||
## Easy way to run the script
|
||||
|
||||
- Get the latest version of the script using `curl` *or* `wget`
|
||||
|
||||
```bash
|
||||
curl -L https://meltdown.ovh -o spectre-meltdown-checker.sh
|
||||
wget https://meltdown.ovh -O spectre-meltdown-checker.sh
|
||||
```
|
||||
|
||||
- Inspect the script. You never blindly run scripts you downloaded from the Internet, do you?
|
||||
|
||||
```bash
|
||||
vim spectre-meltdown-checker.sh
|
||||
```
|
||||
|
||||
- When you're ready, run the script as root
|
||||
|
||||
```bash
|
||||
chmod +x spectre-meltdown-checker.sh
|
||||
sudo ./spectre-meltdown-checker.sh
|
||||
```
|
||||
|
||||
## Example of script output
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user