From 5698711b3d0f72480f2d72c2b796e96a6719186a Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Sun, 5 Apr 2026 23:00:02 +0000 Subject: [PATCH] fix: CVE-2020-0543 (SRBDS): microcode mitigation misdetected (#492) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit built from commit 41251d8e51ec7fcff6025bf772ae8b6778d0c641 dated 2026-04-06 00:58:49 +0200 by Stéphane Lesimple (speed47_github@speed47.net) --- spectre-meltdown-checker.sh | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index aa40ba3..06fa1ac 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -13,7 +13,7 @@ # # Stephane Lesimple # -VERSION='26.28.0405949' +VERSION='26.28.0405957' # --- Common paths and basedirs --- readonly VULN_SYSFS_BASE="/sys/devices/system/cpu/vulnerabilities" @@ -4586,11 +4586,11 @@ check_cpu() { read_msr $MSR_IA32_MCU_OPT_CTRL ret=$? if [ $ret = $READ_MSR_RET_OK ]; then - if [ "$ret_read_msr_value" = "0000000000000000" ]; then - #SRBDS mitigation control exists and is enabled via microcode + if [ "$((ret_read_msr_value_lo >> 0 & 1))" = 0 ]; then + #SRBDS mitigation control exists and is enabled via microcode (RNGDS_MITG_DIS bit is 0) cap_srbds_on=1 else - #SRBDS mitigation control exists but is disabled via microcode + #SRBDS mitigation control exists but is disabled via microcode (RNGDS_MITG_DIS bit is 1) cap_srbds_on=0 fi else