1
0
mirror of https://github.com/speed47/spectre-meltdown-checker synced 2024-12-22 04:13:38 +01:00

fix: don't test SGX again in check_CVE_2018_3615, already done by is_cpu_vulnerable

This commit is contained in:
Stéphane Lesimple 2018-09-17 22:28:04 +02:00
parent ae1206288f
commit e589ed7f02

View File

@ -3448,14 +3448,10 @@ check_CVE_2018_3615()
if ! is_cpu_vulnerable "$cve"; then
# override status & msg in case CPU is not vulnerable after all
pvulnstatus $cve OK "your CPU vendor reported your CPU model as not vulnerable"
elif [ "$cpuid_sgx" = 1 ]; then
if [ "$cpu_flush_cmd" = 1 ]; then
pvulnstatus $cve OK "your CPU microcode mitigates the vulnerability"
else
pvulnstatus $cve VULN "your CPU supports SGX and the microcode is not up to date"
fi
elif [ "$cpu_flush_cmd" = 1 ]; then
pvulnstatus $cve OK "your CPU microcode mitigates the vulnerability"
else
pvulnstatus $cve UNK "couldn't tell if your CPU supports SGX"
pvulnstatus $cve VULN "your CPU supports SGX and the microcode is not up to date"
fi
}