diff --git a/README.md b/README.md index 0f9206b..8b173de 100644 --- a/README.md +++ b/README.md @@ -18,7 +18,7 @@ CVE [CVE-2018-12127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127) | Microarchitectural Load Port Data Sampling | MLPDS, RIDL [CVE-2019-11091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091) | Microarchitectural Data Sampling Uncacheable Memory | MDSUM, RIDL [CVE-2019-11135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135) | TSX asynchronous abort | TAA, ZombieLoad V2 -[CVE-2018-12207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207) | Machine Mheck Exception on Page Size Changes | MCEPSC, No eXcuses, iTLB Multihit +[CVE-2018-12207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207) | Machine Check Exception on Page Size Changes | MCEPSC, No eXcuses, iTLB Multihit [CVE-2020-0543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543) | Special Register Buffer Data Sampling | SRBDS [CVE-2023-20593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593) | Cross-Process Information Leak | Zenbleed diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 64840f5..343da13 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -5967,10 +5967,10 @@ check_CVE_2023_20593_linux() fi if [ "$zenbleed_print_vuln" = 1 ]; then pvulnstatus $cve VULN "Your kernel is too old to mitigate Zenbleed and your CPU microcode doesn't mitigate it either" - explain "Your CPU vendor may have a new microcode for your CPU model that mitigates this issue (refer to the hardware section above)." - explain "Otherwise, the Linux kernel is able to mitigate this issue regardless of the microcode version you have, but in this case" - explain "your kernel is too old to support this, your Linux distribution vendor might have a more recent version you should upgrade to." - explain "Note that either having an up to date microcode OR an up to date kernel is enough to mitigate this issue." + explain "Your CPU vendor may have a new microcode for your CPU model that mitigates this issue (refer to the hardware section above).\n " \ +"Otherwise, the Linux kernel is able to mitigate this issue regardless of the microcode version you have, but in this case\n " \ +"your kernel is too old to support this, your Linux distribution vendor might have a more recent version you should upgrade to.\n " \ +"Note that either having an up to date microcode OR an up to date kernel is enough to mitigate this issue." fi unset zenbleed_print_vuln else