From: Alexander Popov Date: Thu, 29 Oct 2020 08:03:24 +0000 (+0300) Subject: Add a Q&A about spectre-meltdown-checker maintained by @speed47 X-Git-Tag: v0.5.9~2 X-Git-Url: https://jxself.org/git/?a=commitdiff_plain;h=6cf7b9bedf2c91060b7c9287ca41a02e824819da;p=kconfig-hardened-check.git Add a Q&A about spectre-meltdown-checker maintained by @speed47 --- diff --git a/README.md b/README.md index 5f9ef19..3eb5ee5 100644 --- a/README.md +++ b/README.md @@ -266,6 +266,13 @@ __A:__ Linux kernel usermode helpers can be used for privilege escalation in ker requires the corresponding support in the userspace: see the [example implementation][11] by Tycho Andersen [@tych0][12]. +
+ +__Q:__ Does my kernel have all those mitigations of Transient Execution Vulnerabilities in my hardware? + +__A:__ Checking the kernel config is not enough to answer this question. +I highly recommend using [spectre-meltdown-checker][13] tool maintained by Stéphane Lesimple [@speed47][14]. + [1]: http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings [2]: https://docs.clip-os.org/clipos/kernel.html#configuration @@ -279,3 +286,5 @@ Tycho Andersen [@tych0][12]. [10]: https://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html [11]: https://github.com/tych0/huldufolk [12]: https://github.com/tych0 +[13]: https://github.com/speed47/spectre-meltdown-checker +[14]: https://github.com/speed47