mirror of
https://github.com/speed47/spectre-meltdown-checker
synced 2024-11-07 06:33:38 +01:00
feat(bsd): implement CVE-2018-3620 and CVE-2018-3646 mitigation detection
This commit is contained in:
parent
fbbb19f244
commit
0252e74f94
@ -3609,10 +3609,27 @@ check_CVE_2018_3620_linux()
|
|||||||
|
|
||||||
check_CVE_2018_3620_bsd()
|
check_CVE_2018_3620_bsd()
|
||||||
{
|
{
|
||||||
|
_info_nol "* Kernel reserved the memory page at physical address 0x0: "
|
||||||
|
if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
|
||||||
|
# https://security.FreeBSD.org/patches/SA-18:09/l1tf-11.2.patch
|
||||||
|
# this is very difficult to detect that the kernel reserved the 0 page, but this fix
|
||||||
|
# is part of the exact same patch than the other L1TF CVE, so we detect it
|
||||||
|
# and deem it as OK if the other patch is there
|
||||||
|
pstatus green YES
|
||||||
|
bsd_zero_reserved=1
|
||||||
|
else
|
||||||
|
pstatus yellow NO
|
||||||
|
bsd_zero_reserved=0
|
||||||
|
fi
|
||||||
|
|
||||||
if ! is_cpu_vulnerable "$cve"; then
|
if ! is_cpu_vulnerable "$cve"; then
|
||||||
pvulnstatus $cve OK "your CPU vendor reported your CPU model as not vulnerable"
|
pvulnstatus $cve OK "your CPU vendor reported your CPU model as not vulnerable"
|
||||||
else
|
else
|
||||||
pvulnstatus $cve UNK "check not implemented yet under BSD"
|
if [ "$bsd_zero_reserved" = 1 ]; then
|
||||||
|
pvulnstatus $cve OK "kernel mitigates the vulnerability"
|
||||||
|
else
|
||||||
|
pvulnstatus $cve VULN "your kernel needs to be updated"
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -3784,10 +3801,34 @@ check_CVE_2018_3646_linux()
|
|||||||
|
|
||||||
check_CVE_2018_3646_bsd()
|
check_CVE_2018_3646_bsd()
|
||||||
{
|
{
|
||||||
|
_info_nol "* Kernel supports L1D flushing: "
|
||||||
|
if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
|
||||||
|
pstatus green YES
|
||||||
|
kernel_l1d_supported=1
|
||||||
|
else
|
||||||
|
pstatus yellow NO
|
||||||
|
kernel_l1d_supported=0
|
||||||
|
fi
|
||||||
|
|
||||||
|
_info_nol "* L1D flushing is enabled: "
|
||||||
|
kernel_l1d_enabled=$(sysctl -n hw.vmm.vmx.l1d_flush 2>/dev/null)
|
||||||
|
case "$kernel_l1d_enabled" in
|
||||||
|
0) pstatus yellow NO;;
|
||||||
|
1) pstatus green YES;;
|
||||||
|
"") pstatus yellow NO;;
|
||||||
|
*) pstatus yellow UNKNOWN;;
|
||||||
|
esac
|
||||||
|
|
||||||
if ! is_cpu_vulnerable "$cve"; then
|
if ! is_cpu_vulnerable "$cve"; then
|
||||||
pvulnstatus $cve OK "your CPU vendor reported your CPU model as not vulnerable"
|
pvulnstatus $cve OK "your CPU vendor reported your CPU model as not vulnerable"
|
||||||
else
|
else
|
||||||
pvulnstatus $cve UNK "check not implemented yet under BSD"
|
if [ "$kernel_l1d_enabled" = 1 ]; then
|
||||||
|
pvulnstatus $cve OK "L1D flushing mitigates the vulnerability"
|
||||||
|
elif [ "$kernel_l1d_supported" = 1 ]; then
|
||||||
|
pvulnstatus $cve VULN "L1D flushing is supported by your kernel but is disabled"
|
||||||
|
else
|
||||||
|
pvulnstatus $cve VULN "your kernel needs to be updated"
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user