mirror of
https://github.com/speed47/spectre-meltdown-checker
synced 2025-01-03 10:05:44 +01:00
feat: bsd: for unimplemented CVEs, at least report when CPU is not affected
This commit is contained in:
parent
6682d72ada
commit
3ac36669d9
@ -5369,8 +5369,8 @@ check_CVE_2019_11135()
|
||||
_info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
|
||||
if [ "$os" = Linux ]; then
|
||||
check_CVE_2019_11135_linux
|
||||
#elif echo "$os" | grep -q BSD; then
|
||||
# check_CVE_2019_11135_bsd
|
||||
elif echo "$os" | grep -q BSD; then
|
||||
check_CVE_2019_11135_bsd
|
||||
else
|
||||
_warn "Unsupported OS ($os)"
|
||||
fi
|
||||
@ -5452,6 +5452,16 @@ check_CVE_2019_11135_linux()
|
||||
fi
|
||||
}
|
||||
|
||||
check_CVE_2019_11135_bsd()
|
||||
{
|
||||
if ! is_cpu_vulnerable "$cve" ; then
|
||||
# override status & msg in case CPU is not vulnerable after all
|
||||
pvulnstatus "$cve" OK "your CPU vendor reported your CPU model as not affected"
|
||||
else
|
||||
pvulnstatus "$cve" UNK "your CPU is affected, but mitigation detection has not yet been implemented for BSD in this script"
|
||||
fi
|
||||
}
|
||||
|
||||
#######################
|
||||
# iTLB Multihit section
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user