projects
/
kconfig-hardened-check.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
|
inline
| side by side (parent:
0a728e1
)
Add a Q&A about spectre-meltdown-checker maintained by @speed47
author
Alexander Popov
<alex.popov@linux.com>
Thu, 29 Oct 2020 08:03:24 +0000
(11:03 +0300)
committer
Alexander Popov
<alex.popov@linux.com>
Thu, 29 Oct 2020 08:09:43 +0000
(11:09 +0300)
README.md
patch
|
blob
|
history
diff --git
a/README.md
b/README.md
index 5f9ef196e3b9bae155c25a6ee5b09de66185b6ea..3eb5ee5f5ae6453bfb2bfbc668a8a29dda6ede27 100644
(file)
--- a/
README.md
+++ b/
README.md
@@
-266,6
+266,13
@@
__A:__ Linux kernel usermode helpers can be used for privilege escalation in ker
requires the corresponding support in the userspace: see the [example implementation][11] by
Tycho Andersen [@tych0][12].
requires the corresponding support in the userspace: see the [example implementation][11] by
Tycho Andersen [@tych0][12].
+<br />
+
+__Q:__ Does my kernel have all those mitigations of Transient Execution Vulnerabilities in my hardware?
+
+__A:__ Checking the kernel config is not enough to answer this question.
+I highly recommend using [spectre-meltdown-checker][13] tool maintained by Stéphane Lesimple [@speed47][14].
+
[1]: http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
[2]: https://docs.clip-os.org/clipos/kernel.html#configuration
[1]: http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
[2]: https://docs.clip-os.org/clipos/kernel.html#configuration
@@
-279,3
+286,5
@@
Tycho Andersen [@tych0][12].
[10]: https://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html
[11]: https://github.com/tych0/huldufolk
[12]: https://github.com/tych0
[10]: https://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html
[11]: https://github.com/tych0/huldufolk
[12]: https://github.com/tych0
+[13]: https://github.com/speed47/spectre-meltdown-checker
+[14]: https://github.com/speed47