From b4f4d111067b311c90fbe35c71163d8173b60e92 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Lesimple?= Date: Wed, 1 Apr 2026 00:41:32 +0200 Subject: [PATCH] fix: CVE-2018-3620: false 'VULN' status on kernels reporting CPU as unaffected and RDCL_NO can't be parsed --- src/vulns/CVE-2018-3620.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/src/vulns/CVE-2018-3620.sh b/src/vulns/CVE-2018-3620.sh index 773d85b..4361450 100644 --- a/src/vulns/CVE-2018-3620.sh +++ b/src/vulns/CVE-2018-3620.sh @@ -14,6 +14,7 @@ check_CVE_2018_3620_linux() { # this kernel has the /sys interface, trust it over everything sys_interface_available=1 status=$ret_sys_interface_check_status + msg=$ret_sys_interface_check_fullmsg fi if [ "$opt_sysfs_only" != 1 ]; then pr_info_nol "* Kernel supports PTE inversion: "