42a57dd980
add kern.log as another backend of dmesg output
2018-01-17 17:17:39 +01:00
5ab95f3656
fix(atom): don't use a pcre regex, only an extended one
2018-01-17 12:01:13 +01:00
5b6e39916d
fix(atom): properly detect Nxxx Atom series
2018-01-17 11:07:47 +01:00
556951d5f0
Add Support for Slackware.
...
Signed-off-by: Willy Sudiarto Raharjo <willysr@gmail.com >
2018-01-16 11:55:03 +01:00
7a88aec95f
Implement CoreOS compatibility mode ( #84 )
...
* Add special CoreOS compatibility mode
* CoreOS: refuse --coreos if we're not under CoreOS
* CoreOS: warn if launched without --coreos option
* is_coreos: make stderr silent
* CoreOS: tiny adjustments
2018-01-16 10:33:01 +01:00
bd18323d79
bump to v0.31 to reflect changes
v0.31
2018-01-14 22:34:09 +01:00
b89d67dd15
meltdown: detecting Xen PV, reporting as not vulnerable
2018-01-14 22:31:21 +01:00
704e54019a
is_cpu_vulnerable: add check for old Atoms
2018-01-14 21:32:56 +01:00
d96093171a
verbose: add PCID check for performance impact of PTI
2018-01-14 17:18:34 +01:00
dcc4488340
Merge pull request #80 from speed47/cpuid_spec_ctrl
...
v0.30, cpuid spec ctrl and other enhancements
v0.30
2018-01-14 16:48:02 +01:00
32e3fe6c07
bump to v0.30 to reflect changes
2018-01-14 16:45:59 +01:00
f488947d43
Merge pull request #79 from andir/add-nixos
...
add support for NixOS kernel
2018-01-14 16:40:10 +01:00
71213c11b3
ibrs: check for spec_ctrl_ibrs in cpuinfo
2018-01-14 16:36:51 +01:00
2964c4ab44
add support for NixOS kernel
...
this removes the need to specify the kernel version manually on NixOS
2018-01-14 16:18:29 +01:00
749f432d32
also check for spec_ctrl flag in cpuinfo
2018-01-14 15:47:51 +01:00
a422b53d7c
also check for cpuinfo flag
2018-01-14 15:47:51 +01:00
c483a2cf60
check spec_ctrl support using cpuid
2018-01-14 15:47:51 +01:00
dead0054a4
fix: proper detail msg in vuln status
2018-01-14 15:47:22 +01:00
8ed7d465aa
Merge pull request #77 from speed47/exitcode
...
proper return codes regardless of the batch mode
2018-01-14 14:25:12 +01:00
e5e4851d72
proper return codes regardless of the batch mode
2018-01-14 14:24:31 +01:00
7f92717a2c
add info about accuracy when missing kernel files
2018-01-13 13:59:17 +01:00
b47d505689
AMD now vuln to variant2 (as per their stmt)
v0.29
2018-01-13 13:35:31 +01:00
4a2d051285
minor is_cpu_vulnerable() changes ( #71 )
...
* correct is_cpu_vulnerable() comment
As far as I can tell, the function and usage are correct for the comment
to be inverted.
Add a clarifying note as to why the value choice makes sense.
* exit on invalid varient
If this happens, it's a bug in the script. None of the calling code
checks for status 255, so don't let a scripting bug cause a false
negative.
* no need to set vulnerable CPUs
According to comment above this code:
'by default, everything is vulnerable, we work in a "whitelist" logic here.'
2018-01-13 13:16:37 +01:00
f3551b9734
Only show the name of the script, not the full path ( #72 )
2018-01-13 13:14:19 +01:00
45b98e125f
fix some typos ( #73 )
2018-01-13 13:13:40 +01:00
dce917bfbb
add --version, bump to v0.28
v0.28
2018-01-12 19:10:44 +01:00
8f18f53aba
add cpu model in output
2018-01-12 19:08:12 +01:00
d3f102b3b3
Typofix in readme ( #61 )
2018-01-12 13:58:04 +01:00
8bd093173d
Fixed a few spelling errors ( #60 )
2018-01-12 11:46:36 +01:00
bfe5a3b840
add some debug
2018-01-12 10:53:19 +01:00
6a0242eea3
bump to v0.27
v0.27
2018-01-11 15:36:41 +01:00
bc4e39038a
fix(opcodes): fix regression introduced in previous commit
...
We were saying unknown instead of vulnerable when the count of lfence opcodes was low
This was not impacting batch mode or the final decision, just the human-readable output of the script.
2018-01-11 15:35:57 +01:00
62f8ed6f61
adding support for new /sys interface ( #55 )
...
* adding support for new /sys interface
* fix(objdump): prefer -d instead of -D, some kernels crash objdump otherwise
v0.26
2018-01-11 12:23:16 +01:00
56b67f8082
Typo in README ( #54 )
2018-01-11 12:01:31 +01:00
52a8f78885
send warning to stderr. ( #53 )
...
With --batch json there must not be any other output on stdout, so redirect warnings to stderr will show the warning on the console and only the json output is on stdout.
2018-01-11 09:55:43 +01:00
a09a5ba38f
bump to v0.25 to reflect changes
v0.25
2018-01-11 09:08:29 +01:00
5a7d8d7edf
Produce JSON output formatted for Puppet, Ansible, Chef... ( #50 )
...
Produce JSON output formatted for Puppet, Ansible, Chef...
2018-01-11 09:04:13 +01:00
49fdc6c449
Merge pull request #51 from cowanml/file_read_check_fixup
...
fixed file read test
2018-01-10 21:39:09 +01:00
af3de2a862
fixed file read test
2018-01-10 15:17:14 -05:00
c6e1b0ac8a
feat(kernel): add support for LZ4 decompression
v0.24
2018-01-10 20:10:57 +01:00
b913dacc1b
Merge pull request #48 from speed47/opensuse
...
fix(opensuse): add specific location for ibrs_enabled file
2018-01-10 18:41:30 +01:00
eb0ebef5a8
fix(opensuse): add specific location for ibrs_enabled file
2018-01-10 17:40:33 +01:00
e0254025e8
Merge pull request #47 from speed47/readme
...
update readme
2018-01-10 17:12:54 +01:00
bd010340e6
update readme
2018-01-10 17:12:33 +01:00
a658de2f01
fix(kernel): fix detection for separate /boot partitions
2018-01-10 16:27:16 +01:00
4aed5589fe
Merge pull request #44 from speed47/bootimage
...
feat(kernel): check the BOOT_IMAGE info from cmdline before trying th…
2018-01-10 16:13:00 +01:00
8ed1f5e3af
feat(kernel): check the BOOT_IMAGE info from cmdline before trying the default names
2018-01-10 15:46:29 +01:00
ffc542eb82
bump to v0.23 to reflect changes
v0.23
2018-01-10 15:25:55 +01:00
74bc7ba637
add --variant to specify what check we want to run
v0.22
2018-01-10 15:22:30 +01:00
5389ac6844
Merge pull request #41 from bang-communications/master
...
NRPE mode
2018-01-10 15:11:45 +01:00