mirror of
https://github.com/speed47/spectre-meltdown-checker.git
synced 2025-07-15 15:21:23 +02:00
Compare commits
26 Commits
Author | SHA1 | Date | |
---|---|---|---|
dcc4488340 | |||
32e3fe6c07 | |||
f488947d43 | |||
71213c11b3 | |||
2964c4ab44 | |||
749f432d32 | |||
a422b53d7c | |||
c483a2cf60 | |||
dead0054a4 | |||
8ed7d465aa | |||
e5e4851d72 | |||
7f92717a2c | |||
b47d505689 | |||
4a2d051285 | |||
f3551b9734 | |||
45b98e125f | |||
dce917bfbb | |||
8f18f53aba | |||
d3f102b3b3 | |||
8bd093173d | |||
bfe5a3b840 | |||
6a0242eea3 | |||
bc4e39038a | |||
62f8ed6f61 | |||
56b67f8082 | |||
52a8f78885 |
@ -3,7 +3,7 @@ Spectre & Meltdown Checker
|
|||||||
|
|
||||||
A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
|
A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
|
||||||
|
|
||||||
Without options, it'll inspect you currently running kernel.
|
Without options, it'll inspect your currently running kernel.
|
||||||
You can also specify a kernel image on the command line, if you'd like to inspect a kernel you're not running.
|
You can also specify a kernel image on the command line, if you'd like to inspect a kernel you're not running.
|
||||||
|
|
||||||
The script will do its best to detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number.
|
The script will do its best to detect mitigations, including backported non-vanilla patches, regardless of the advertised kernel version number.
|
||||||
@ -40,6 +40,6 @@ However, some mitigations could also exist in your kernel that this script doesn
|
|||||||
|
|
||||||
Your system exposure also depends on your CPU. As of now, AMD and ARM processors are marked as immune to some or all of these vulnerabilities (except some specific ARM models). All Intel processors manufactured since circa 1995 are thought to be vulnerable. Whatever processor one uses, one might seek more information from the manufacturer of that processor and/or of the device in which it runs.
|
Your system exposure also depends on your CPU. As of now, AMD and ARM processors are marked as immune to some or all of these vulnerabilities (except some specific ARM models). All Intel processors manufactured since circa 1995 are thought to be vulnerable. Whatever processor one uses, one might seek more information from the manufacturer of that processor and/or of the device in which it runs.
|
||||||
|
|
||||||
The nature of the discovered vulnerabilities being quite new, the landscape of vulnerable processors can be expected to change over time, which is why this script makes the assumption that all CPUs are vulnerable, except if the manufacturer explicitely stated otherwise in a verifiable public announcement.
|
The nature of the discovered vulnerabilities being quite new, the landscape of vulnerable processors can be expected to change over time, which is why this script makes the assumption that all CPUs are vulnerable, except if the manufacturer explicitly stated otherwise in a verifiable public announcement.
|
||||||
|
|
||||||
This tool has been released in the hope that it'll be useful, but don't use it to jump to conclusions about your security.
|
This tool has been released in the hope that it'll be useful, but don't use it to jump to conclusions about your security.
|
||||||
|
@ -8,21 +8,20 @@
|
|||||||
#
|
#
|
||||||
# Stephane Lesimple
|
# Stephane Lesimple
|
||||||
#
|
#
|
||||||
VERSION=0.25
|
VERSION=0.30
|
||||||
|
|
||||||
# Script configuration
|
|
||||||
show_usage()
|
show_usage()
|
||||||
{
|
{
|
||||||
cat <<EOF
|
cat <<EOF
|
||||||
Usage:
|
Usage:
|
||||||
Live mode: $0 [options] [--live]
|
Live mode: `basename $0` [options] [--live]
|
||||||
Offline mode: $0 [options] [--kernel <vmlinux_file>] [--config <kernel_config>] [--map <kernel_map_file>]
|
Offline mode: `basename $0` [options] [--kernel <vmlinux_file>] [--config <kernel_config>] [--map <kernel_map_file>]
|
||||||
|
|
||||||
Modes:
|
Modes:
|
||||||
Two modes are available.
|
Two modes are available.
|
||||||
|
|
||||||
First mode is the "live" mode (default), it does its best to find information about the currently running kernel.
|
First mode is the "live" mode (default), it does its best to find information about the currently running kernel.
|
||||||
To run under this mode, just start the script without any option (you can also use --live explicitely)
|
To run under this mode, just start the script without any option (you can also use --live explicitly)
|
||||||
|
|
||||||
Second mode is the "offline" mode, where you can inspect a non-running kernel.
|
Second mode is the "offline" mode, where you can inspect a non-running kernel.
|
||||||
You'll need to specify the location of the vmlinux file, and if possible, the corresponding config and System.map files:
|
You'll need to specify the location of the vmlinux file, and if possible, the corresponding config and System.map files:
|
||||||
@ -33,13 +32,15 @@ show_usage()
|
|||||||
|
|
||||||
Options:
|
Options:
|
||||||
--no-color Don't use color codes
|
--no-color Don't use color codes
|
||||||
-v, --verbose Increase verbosity level
|
--verbose, -v Increase verbosity level
|
||||||
|
--no-sysfs Don't use the /sys interface even if present
|
||||||
--batch text Produce machine readable output, this is the default if --batch is specified alone
|
--batch text Produce machine readable output, this is the default if --batch is specified alone
|
||||||
--batch json Produce JSON output formatted for Puppet, Ansible, Chef...
|
--batch json Produce JSON output formatted for Puppet, Ansible, Chef...
|
||||||
--batch nrpe Produce machine readable output formatted for NRPE
|
--batch nrpe Produce machine readable output formatted for NRPE
|
||||||
--variant [1,2,3] Specify which variant you'd like to check, by default all variants are checked
|
--variant [1,2,3] Specify which variant you'd like to check, by default all variants are checked
|
||||||
Can be specified multiple times (e.g. --variant 2 --variant 3)
|
Can be specified multiple times (e.g. --variant 2 --variant 3)
|
||||||
|
|
||||||
|
|
||||||
IMPORTANT:
|
IMPORTANT:
|
||||||
A false sense of security is worse than no security at all.
|
A false sense of security is worse than no security at all.
|
||||||
Please use the --disclaimer option to understand exactly what this script does.
|
Please use the --disclaimer option to understand exactly what this script does.
|
||||||
@ -65,7 +66,7 @@ in which it runs.
|
|||||||
|
|
||||||
The nature of the discovered vulnerabilities being quite new, the landscape of vulnerable processors can be expected
|
The nature of the discovered vulnerabilities being quite new, the landscape of vulnerable processors can be expected
|
||||||
to change over time, which is why this script makes the assumption that all CPUs are vulnerable, except if the manufacturer
|
to change over time, which is why this script makes the assumption that all CPUs are vulnerable, except if the manufacturer
|
||||||
explicitely stated otherwise in a verifiable public announcement.
|
explicitly stated otherwise in a verifiable public announcement.
|
||||||
|
|
||||||
This tool has been released in the hope that it'll be useful, but don't use it to jump to conclusions about your security.
|
This tool has been released in the hope that it'll be useful, but don't use it to jump to conclusions about your security.
|
||||||
|
|
||||||
@ -86,22 +87,23 @@ opt_variant1=0
|
|||||||
opt_variant2=0
|
opt_variant2=0
|
||||||
opt_variant3=0
|
opt_variant3=0
|
||||||
opt_allvariants=1
|
opt_allvariants=1
|
||||||
|
opt_no_sysfs=0
|
||||||
|
|
||||||
nrpe_critical=0
|
global_critical=0
|
||||||
nrpe_unknown=0
|
global_unknown=0
|
||||||
nrpe_vuln=""
|
nrpe_vuln=""
|
||||||
|
|
||||||
__echo()
|
__echo()
|
||||||
{
|
{
|
||||||
opt="$1"
|
opt="$1"
|
||||||
shift
|
shift
|
||||||
msg="$@"
|
_msg="$@"
|
||||||
if [ "$opt_no_color" = 1 ] ; then
|
if [ "$opt_no_color" = 1 ] ; then
|
||||||
# strip ANSI color codes
|
# strip ANSI color codes
|
||||||
msg=$(/bin/echo -e "$msg" | sed -r "s/\x1B\[([0-9]{1,2}(;[0-9]{1,2})?)?[m|K]//g")
|
_msg=$(/bin/echo -e "$_msg" | sed -r "s/\x1B\[([0-9]{1,2}(;[0-9]{1,2})?)?[m|K]//g")
|
||||||
fi
|
fi
|
||||||
# explicitely call /bin/echo to avoid shell builtins that might not take options
|
# explicitly call /bin/echo to avoid shell builtins that might not take options
|
||||||
/bin/echo $opt -e "$msg"
|
/bin/echo $opt -e "$_msg"
|
||||||
}
|
}
|
||||||
|
|
||||||
_echo()
|
_echo()
|
||||||
@ -122,7 +124,7 @@ _echo_nol()
|
|||||||
|
|
||||||
_warn()
|
_warn()
|
||||||
{
|
{
|
||||||
_echo 0 "\033[31m${@}\033[0m"
|
_echo 0 "\033[31m${@}\033[0m" >&2
|
||||||
}
|
}
|
||||||
|
|
||||||
_info()
|
_info()
|
||||||
@ -140,23 +142,30 @@ _verbose()
|
|||||||
_echo 2 "$@"
|
_echo 2 "$@"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
_verbose_nol()
|
||||||
|
{
|
||||||
|
_echo_nol 2 "$@"
|
||||||
|
}
|
||||||
|
|
||||||
_debug()
|
_debug()
|
||||||
{
|
{
|
||||||
_echo 3 "(debug) $@"
|
_echo 3 "\033[34m(debug) $@\033[0m"
|
||||||
}
|
}
|
||||||
|
|
||||||
is_cpu_vulnerable()
|
is_cpu_vulnerable()
|
||||||
{
|
{
|
||||||
# param: 1, 2 or 3 (variant)
|
# param: 1, 2 or 3 (variant)
|
||||||
# returns 1 if vulnerable, 0 if not vulnerable, 255 on error
|
# returns 0 if vulnerable, 1 if not vulnerable
|
||||||
|
# (note that in shell, a return of 0 is success)
|
||||||
# by default, everything is vulnerable, we work in a "whitelist" logic here.
|
# by default, everything is vulnerable, we work in a "whitelist" logic here.
|
||||||
# usage: is_cpu_vulnerable 2 && do something if vulnerable
|
# usage: is_cpu_vulnerable 2 && do something if vulnerable
|
||||||
variant1=0
|
variant1=0
|
||||||
variant2=0
|
variant2=0
|
||||||
variant3=0
|
variant3=0
|
||||||
|
|
||||||
if grep -q AMD /proc/cpuinfo; then
|
if grep -q AMD /proc/cpuinfo; then
|
||||||
variant1=0
|
# AMD revised their statement about variant2 => vulnerable
|
||||||
variant2=1
|
# https://www.amd.com/en/corporate/speculative-execution
|
||||||
variant3=1
|
variant3=1
|
||||||
elif grep -qi 'CPU implementer\s*:\s*0x41' /proc/cpuinfo; then
|
elif grep -qi 'CPU implementer\s*:\s*0x41' /proc/cpuinfo; then
|
||||||
# ARM
|
# ARM
|
||||||
@ -171,28 +180,26 @@ is_cpu_vulnerable()
|
|||||||
# arch 7? 7? 7 7 7 8 8 8 8
|
# arch 7? 7? 7 7 7 8 8 8 8
|
||||||
if [ "$cpuarch" = 7 ] && echo "$cpupart" | grep -Eq '^0x(c09|c0f|c0e)$'; then
|
if [ "$cpuarch" = 7 ] && echo "$cpupart" | grep -Eq '^0x(c09|c0f|c0e)$'; then
|
||||||
# armv7 vulnerable chips
|
# armv7 vulnerable chips
|
||||||
variant1=0
|
:
|
||||||
variant2=0
|
|
||||||
elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -Eq '^0x(d07|d08|d09|d0a)$'; then
|
elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -Eq '^0x(d07|d08|d09|d0a)$'; then
|
||||||
# armv8 vulnerable chips
|
# armv8 vulnerable chips
|
||||||
variant1=0
|
:
|
||||||
variant2=0
|
|
||||||
else
|
else
|
||||||
variant1=1
|
variant1=1
|
||||||
variant2=1
|
variant2=1
|
||||||
fi
|
fi
|
||||||
# for variant3, only A75 is vulnerable
|
# for variant3, only A75 is vulnerable
|
||||||
if [ "$cpuarch" = 8 -a "$cpupart" = 0xd0a ]; then
|
if ! [ "$cpuarch" = 8 -a "$cpupart" = 0xd0a ]; then
|
||||||
variant3=0
|
|
||||||
else
|
|
||||||
variant3=1
|
variant3=1
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
[ "$1" = 1 ] && return $variant1
|
[ "$1" = 1 ] && return $variant1
|
||||||
[ "$1" = 2 ] && return $variant2
|
[ "$1" = 2 ] && return $variant2
|
||||||
[ "$1" = 3 ] && return $variant3
|
[ "$1" = 3 ] && return $variant3
|
||||||
return 255
|
echo "$0: error: invalid variant '$1' passed to is_cpu_vulnerable()" >&2
|
||||||
|
exit 255
|
||||||
}
|
}
|
||||||
|
|
||||||
show_header()
|
show_header()
|
||||||
@ -231,17 +238,17 @@ parse_opt_file()
|
|||||||
while [ -n "$1" ]; do
|
while [ -n "$1" ]; do
|
||||||
if [ "$1" = "--kernel" ]; then
|
if [ "$1" = "--kernel" ]; then
|
||||||
opt_kernel=$(parse_opt_file kernel "$2")
|
opt_kernel=$(parse_opt_file kernel "$2")
|
||||||
[ $? -ne 0 ] && exit $?
|
[ $? -ne 0 ] && exit 255
|
||||||
shift 2
|
shift 2
|
||||||
opt_live=0
|
opt_live=0
|
||||||
elif [ "$1" = "--config" ]; then
|
elif [ "$1" = "--config" ]; then
|
||||||
opt_config=$(parse_opt_file config "$2")
|
opt_config=$(parse_opt_file config "$2")
|
||||||
[ $? -ne 0 ] && exit $?
|
[ $? -ne 0 ] && exit 255
|
||||||
shift 2
|
shift 2
|
||||||
opt_live=0
|
opt_live=0
|
||||||
elif [ "$1" = "--map" ]; then
|
elif [ "$1" = "--map" ]; then
|
||||||
opt_map=$(parse_opt_file map "$2")
|
opt_map=$(parse_opt_file map "$2")
|
||||||
[ $? -ne 0 ] && exit $?
|
[ $? -ne 0 ] && exit 255
|
||||||
shift 2
|
shift 2
|
||||||
opt_live=0
|
opt_live=0
|
||||||
elif [ "$1" = "--live" ]; then
|
elif [ "$1" = "--live" ]; then
|
||||||
@ -250,6 +257,9 @@ while [ -n "$1" ]; do
|
|||||||
elif [ "$1" = "--no-color" ]; then
|
elif [ "$1" = "--no-color" ]; then
|
||||||
opt_no_color=1
|
opt_no_color=1
|
||||||
shift
|
shift
|
||||||
|
elif [ "$1" = "--no-sysfs" ]; then
|
||||||
|
opt_no_sysfs=1
|
||||||
|
shift
|
||||||
elif [ "$1" = "--batch" ]; then
|
elif [ "$1" = "--batch" ]; then
|
||||||
opt_batch=1
|
opt_batch=1
|
||||||
opt_verbose=0
|
opt_verbose=0
|
||||||
@ -259,9 +269,9 @@ while [ -n "$1" ]; do
|
|||||||
--*) ;; # allow subsequent flags
|
--*) ;; # allow subsequent flags
|
||||||
'') ;; # allow nothing at all
|
'') ;; # allow nothing at all
|
||||||
*)
|
*)
|
||||||
echo "$0: error: unknown batch format '$1'"
|
echo "$0: error: unknown batch format '$1'" >&2
|
||||||
echo "$0: error: --batch expects a format from: text, nrpe, json"
|
echo "$0: error: --batch expects a format from: text, nrpe, json" >&2
|
||||||
exit 1 >&2
|
exit 255
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
elif [ "$1" = "-v" -o "$1" = "--verbose" ]; then
|
elif [ "$1" = "-v" -o "$1" = "--verbose" ]; then
|
||||||
@ -270,7 +280,7 @@ while [ -n "$1" ]; do
|
|||||||
elif [ "$1" = "--variant" ]; then
|
elif [ "$1" = "--variant" ]; then
|
||||||
if [ -z "$2" ]; then
|
if [ -z "$2" ]; then
|
||||||
echo "$0: error: option --variant expects a parameter (1, 2 or 3)" >&2
|
echo "$0: error: option --variant expects a parameter (1, 2 or 3)" >&2
|
||||||
exit 1
|
exit 255
|
||||||
fi
|
fi
|
||||||
case "$2" in
|
case "$2" in
|
||||||
1) opt_variant1=1; opt_allvariants=0;;
|
1) opt_variant1=1; opt_allvariants=0;;
|
||||||
@ -278,13 +288,18 @@ while [ -n "$1" ]; do
|
|||||||
3) opt_variant3=1; opt_allvariants=0;;
|
3) opt_variant3=1; opt_allvariants=0;;
|
||||||
*)
|
*)
|
||||||
echo "$0: error: invalid parameter '$2' for --variant, expected either 1, 2 or 3" >&2;
|
echo "$0: error: invalid parameter '$2' for --variant, expected either 1, 2 or 3" >&2;
|
||||||
exit 1;;
|
exit 255
|
||||||
|
;;
|
||||||
esac
|
esac
|
||||||
shift 2
|
shift 2
|
||||||
elif [ "$1" = "-h" -o "$1" = "--help" ]; then
|
elif [ "$1" = "-h" -o "$1" = "--help" ]; then
|
||||||
show_header
|
show_header
|
||||||
show_usage
|
show_usage
|
||||||
exit 0
|
exit 0
|
||||||
|
elif [ "$1" = "--version" ]; then
|
||||||
|
opt_no_color=1
|
||||||
|
show_header
|
||||||
|
exit 0
|
||||||
elif [ "$1" = "--disclaimer" ]; then
|
elif [ "$1" = "--disclaimer" ]; then
|
||||||
show_header
|
show_header
|
||||||
show_disclaimer
|
show_disclaimer
|
||||||
@ -293,7 +308,7 @@ while [ -n "$1" ]; do
|
|||||||
show_header
|
show_header
|
||||||
show_usage
|
show_usage
|
||||||
echo "$0: error: unknown option '$1'"
|
echo "$0: error: unknown option '$1'"
|
||||||
exit 1
|
exit 255
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
|
|
||||||
@ -325,12 +340,6 @@ pvulnstatus()
|
|||||||
if [ "$opt_batch" = 1 ]; then
|
if [ "$opt_batch" = 1 ]; then
|
||||||
case "$opt_batch_format" in
|
case "$opt_batch_format" in
|
||||||
text) _echo 0 "$1: $2 ($3)";;
|
text) _echo 0 "$1: $2 ($3)";;
|
||||||
nrpe)
|
|
||||||
case "$2" in
|
|
||||||
UKN) nrpe_unknown="1";;
|
|
||||||
VULN) nrpe_critical="1"; nrpe_vuln="$nrpe_vuln $1";;
|
|
||||||
esac
|
|
||||||
;;
|
|
||||||
json)
|
json)
|
||||||
case "$1" in
|
case "$1" in
|
||||||
CVE-2017-5753) aka="SPECTRE VARIANT 1";;
|
CVE-2017-5753) aka="SPECTRE VARIANT 1";;
|
||||||
@ -338,20 +347,29 @@ pvulnstatus()
|
|||||||
CVE-2017-5754) aka="MELTDOWN";;
|
CVE-2017-5754) aka="MELTDOWN";;
|
||||||
esac
|
esac
|
||||||
case "$2" in
|
case "$2" in
|
||||||
UKN) is_vuln="unknown";;
|
UNK) is_vuln="null";;
|
||||||
VULN) is_vuln="true";;
|
VULN) is_vuln="true";;
|
||||||
OK) is_vuln="false";;
|
OK) is_vuln="false";;
|
||||||
esac
|
esac
|
||||||
json_output="${json_output:-[}{\"NAME\":\""$aka"\",\"CVE\":\""$1"\",\"VULNERABLE\":$is_vuln,\"INFOS\":\""$3"\"},"
|
json_output="${json_output:-[}{\"NAME\":\""$aka"\",\"CVE\":\""$1"\",\"VULNERABLE\":$is_vuln,\"INFOS\":\""$3"\"},"
|
||||||
;;
|
;;
|
||||||
|
|
||||||
|
nrpe) [ "$2" = VULN ] && nrpe_vuln="$nrpe_vuln $1";;
|
||||||
esac
|
esac
|
||||||
fi
|
fi
|
||||||
|
|
||||||
_info_nol "> \033[46m\033[30mSTATUS:\033[0m "
|
# always fill global_* vars because we use that do decide the program exit code
|
||||||
|
case "$2" in
|
||||||
|
UNK) global_unknown="1";;
|
||||||
|
VULN) global_critical="1";;
|
||||||
|
esac
|
||||||
|
|
||||||
|
# display info if we're not in quiet/batch mode
|
||||||
vulnstatus="$2"
|
vulnstatus="$2"
|
||||||
shift 2
|
shift 2
|
||||||
|
_info_nol "> \033[46m\033[30mSTATUS:\033[0m "
|
||||||
case "$vulnstatus" in
|
case "$vulnstatus" in
|
||||||
UNK) pstatus yellow UNKNOWN "$@";;
|
UNK) pstatus yellow 'UNKNOWN' "$@";;
|
||||||
VULN) pstatus red 'VULNERABLE' "$@";;
|
VULN) pstatus red 'VULNERABLE' "$@";;
|
||||||
OK) pstatus green 'NOT VULNERABLE' "$@";;
|
OK) pstatus green 'NOT VULNERABLE' "$@";;
|
||||||
esac
|
esac
|
||||||
@ -438,8 +456,8 @@ extract_vmlinux()
|
|||||||
if [ "$opt_live_explicit" = 1 ]; then
|
if [ "$opt_live_explicit" = 1 ]; then
|
||||||
if [ -n "$opt_kernel" -o -n "$opt_config" -o -n "$opt_map" ]; then
|
if [ -n "$opt_kernel" -o -n "$opt_config" -o -n "$opt_map" ]; then
|
||||||
show_usage
|
show_usage
|
||||||
echo "$0: error: incompatible modes specified, use either --live or --kernel/--config/--map"
|
echo "$0: error: incompatible modes specified, use either --live or --kernel/--config/--map" >&2
|
||||||
exit 1
|
exit 255
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -452,7 +470,8 @@ if [ "$opt_live" = 1 ]; then
|
|||||||
_warn "To run it as root, you can try the following command: sudo $0"
|
_warn "To run it as root, you can try the following command: sudo $0"
|
||||||
_warn
|
_warn
|
||||||
fi
|
fi
|
||||||
_info "Checking for vulnerabilities against live running kernel \033[35m"$(uname -s) $(uname -r) $(uname -v) $(uname -m)"\033[0m"
|
_info "Checking for vulnerabilities against running kernel \033[35m"$(uname -s) $(uname -r) $(uname -v) $(uname -m)"\033[0m"
|
||||||
|
_info "CPU is\033[35m"$(grep '^model name' /proc/cpuinfo | cut -d: -f2 | head -1)"\033[0m"
|
||||||
|
|
||||||
# try to find the image of the current running kernel
|
# try to find the image of the current running kernel
|
||||||
# first, look for the BOOT_IMAGE hint in the kernel cmdline
|
# first, look for the BOOT_IMAGE hint in the kernel cmdline
|
||||||
@ -473,6 +492,7 @@ if [ "$opt_live" = 1 ]; then
|
|||||||
[ -e /boot/kernel-$( uname -r) ] && opt_kernel=/boot/kernel-$( uname -r)
|
[ -e /boot/kernel-$( uname -r) ] && opt_kernel=/boot/kernel-$( uname -r)
|
||||||
[ -e /boot/bzImage-$(uname -r) ] && opt_kernel=/boot/bzImage-$(uname -r)
|
[ -e /boot/bzImage-$(uname -r) ] && opt_kernel=/boot/bzImage-$(uname -r)
|
||||||
[ -e /boot/kernel-genkernel-$(uname -m)-$(uname -r) ] && opt_kernel=/boot/kernel-genkernel-$(uname -m)-$(uname -r)
|
[ -e /boot/kernel-genkernel-$(uname -m)-$(uname -r) ] && opt_kernel=/boot/kernel-genkernel-$(uname -m)-$(uname -r)
|
||||||
|
[ -e /run/booted-system/kernel ] && opt_kernel=/run/booted-system/kernel
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# system.map
|
# system.map
|
||||||
@ -494,10 +514,12 @@ if [ "$opt_live" = 1 ]; then
|
|||||||
else
|
else
|
||||||
_info "Checking for vulnerabilities against specified kernel"
|
_info "Checking for vulnerabilities against specified kernel"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ -n "$opt_kernel" ]; then
|
if [ -n "$opt_kernel" ]; then
|
||||||
_verbose "Will use vmlinux image \033[35m$opt_kernel\033[0m"
|
_verbose "Will use vmlinux image \033[35m$opt_kernel\033[0m"
|
||||||
else
|
else
|
||||||
_verbose "Will use no vmlinux image (accuracy might be reduced)"
|
_verbose "Will use no vmlinux image (accuracy might be reduced)"
|
||||||
|
bad_accuracy=1
|
||||||
fi
|
fi
|
||||||
if [ -n "$dumped_config" ]; then
|
if [ -n "$dumped_config" ]; then
|
||||||
_verbose "Will use kconfig \033[35m/proc/config.gz\033[0m"
|
_verbose "Will use kconfig \033[35m/proc/config.gz\033[0m"
|
||||||
@ -505,11 +527,17 @@ elif [ -n "$opt_config" ]; then
|
|||||||
_verbose "Will use kconfig \033[35m$opt_config\033[0m"
|
_verbose "Will use kconfig \033[35m$opt_config\033[0m"
|
||||||
else
|
else
|
||||||
_verbose "Will use no kconfig (accuracy might be reduced)"
|
_verbose "Will use no kconfig (accuracy might be reduced)"
|
||||||
|
bad_accuracy=1
|
||||||
fi
|
fi
|
||||||
if [ -n "$opt_map" ]; then
|
if [ -n "$opt_map" ]; then
|
||||||
_verbose "Will use System.map file \033[35m$opt_map\033[0m"
|
_verbose "Will use System.map file \033[35m$opt_map\033[0m"
|
||||||
else
|
else
|
||||||
_verbose "Will use no System.map file (accuracy might be reduced)"
|
_verbose "Will use no System.map file (accuracy might be reduced)"
|
||||||
|
bad_accuracy=1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ "$bad_accuracy" = 1 ]; then
|
||||||
|
_info "We're missing some kernel info (see -v), accuracy might be reduced"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ -e "$opt_kernel" ]; then
|
if [ -e "$opt_kernel" ]; then
|
||||||
@ -548,46 +576,84 @@ umount_debugfs()
|
|||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
sys_interface_check()
|
||||||
|
{
|
||||||
|
[ "$opt_live" = 1 -a "$opt_no_sysfs" = 0 -a -r "$1" ] || return 1
|
||||||
|
_info_nol "* Checking whether we're safe according to the /sys interface: "
|
||||||
|
if grep -qi '^not affected' "$1"; then
|
||||||
|
# Not affected
|
||||||
|
status=OK
|
||||||
|
pstatus green YES "kernel confirms that your CPU is unaffected"
|
||||||
|
elif grep -qi '^mitigation' "$1"; then
|
||||||
|
# Mitigation: PTI
|
||||||
|
status=OK
|
||||||
|
pstatus green YES "kernel confirms that the mitigation is active"
|
||||||
|
elif grep -qi '^vulnerable' "$1"; then
|
||||||
|
# Vulnerable
|
||||||
|
status=VULN
|
||||||
|
pstatus red NO "kernel confirms your system is vulnerable"
|
||||||
|
else
|
||||||
|
status=UNK
|
||||||
|
pstatus yellow UNKNOWN "unknown value reported by kernel"
|
||||||
|
fi
|
||||||
|
msg=$(cat "$1")
|
||||||
|
_debug "sys_interface_check: $1=$msg"
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
###################
|
###################
|
||||||
# SPECTRE VARIANT 1
|
# SPECTRE VARIANT 1
|
||||||
check_variant1()
|
check_variant1()
|
||||||
{
|
{
|
||||||
_info "\033[1;34mCVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'\033[0m"
|
_info "\033[1;34mCVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'\033[0m"
|
||||||
_info_nol "* Checking count of LFENCE opcodes in kernel: "
|
|
||||||
|
|
||||||
status=0
|
status=UNK
|
||||||
|
sys_interface_available=0
|
||||||
|
msg=''
|
||||||
|
if sys_interface_check "/sys/devices/system/cpu/vulnerabilities/spectre_v1"; then
|
||||||
|
# this kernel has the /sys interface, trust it over everything
|
||||||
|
sys_interface_available=1
|
||||||
|
else
|
||||||
|
# no /sys interface (or offline mode), fallback to our own ways
|
||||||
|
_info_nol "* Checking count of LFENCE opcodes in kernel: "
|
||||||
if [ -n "$vmlinux_err" ]; then
|
if [ -n "$vmlinux_err" ]; then
|
||||||
pstatus yellow UNKNOWN "$vmlinux_err"
|
msg="couldn't check ($vmlinux_err)"
|
||||||
|
status=UNK
|
||||||
|
pstatus yellow UNKNOWN
|
||||||
else
|
else
|
||||||
if ! which objdump >/dev/null 2>&1; then
|
if ! which objdump >/dev/null 2>&1; then
|
||||||
pstatus yellow UNKNOWN "missing 'objdump' tool, please install it, usually it's in the binutils package"
|
msg="missing 'objdump' tool, please install it, usually it's in the binutils package"
|
||||||
|
status=UNK
|
||||||
|
pstatus yellow UNKNOWN
|
||||||
else
|
else
|
||||||
# here we disassemble the kernel and count the number of occurences of the LFENCE opcode
|
# here we disassemble the kernel and count the number of occurrences of the LFENCE opcode
|
||||||
# in non-patched kernels, this has been empirically determined as being around 40-50
|
# in non-patched kernels, this has been empirically determined as being around 40-50
|
||||||
# in patched kernels, this is more around 70-80, sometimes way higher (100+)
|
# in patched kernels, this is more around 70-80, sometimes way higher (100+)
|
||||||
# v0.13: 68 found in a 3.10.23-xxxx-std-ipv6-64 (with lots of modules compiled-in directly), which doesn't have the LFENCE patches,
|
# v0.13: 68 found in a 3.10.23-xxxx-std-ipv6-64 (with lots of modules compiled-in directly), which doesn't have the LFENCE patches,
|
||||||
# so let's push the threshold to 70.
|
# so let's push the threshold to 70.
|
||||||
# TODO LKML patch is starting to dump LFENCE in favor of the PAUSE opcode, we might need to check that (patch not stabilized yet)
|
nb_lfence=$(objdump -d "$vmlinux" | grep -wc lfence)
|
||||||
nb_lfence=$(objdump -D "$vmlinux" | grep -wc lfence)
|
|
||||||
if [ "$nb_lfence" -lt 70 ]; then
|
if [ "$nb_lfence" -lt 70 ]; then
|
||||||
pstatus red NO "only $nb_lfence opcodes found, should be >= 70"
|
msg="only $nb_lfence opcodes found, should be >= 70, heuristic to be improved when official patches become available"
|
||||||
status=1
|
status=VULN
|
||||||
|
pstatus red NO
|
||||||
else
|
else
|
||||||
pstatus green YES "$nb_lfence opcodes found, which is >= 70"
|
msg="$nb_lfence opcodes found, which is >= 70, heuristic to be improved when official patches become available"
|
||||||
status=2
|
status=OK
|
||||||
|
pstatus green YES
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if ! is_cpu_vulnerable 1; then
|
# if we have the /sys interface, don't even check is_cpu_vulnerable ourselves, the kernel already does it
|
||||||
pvulnstatus CVE-2017-5753 OK "your CPU vendor reported your CPU model as not vulnerable"
|
if [ "$sys_interface_available" = 0 ] && ! is_cpu_vulnerable 1; then
|
||||||
else
|
# override status & msg in case CPU is not vulnerable after all
|
||||||
case "$status" in
|
msg="your CPU vendor reported your CPU model as not vulnerable"
|
||||||
0) pvulnstatus CVE-2017-5753 UNK "impossible to check ${vmlinux}";;
|
status=OK
|
||||||
1) pvulnstatus CVE-2017-5753 VULN 'heuristic to be improved when official patches become available';;
|
|
||||||
2) pvulnstatus CVE-2017-5753 OK 'heuristic to be improved when official patches become available';;
|
|
||||||
esac
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# report status
|
||||||
|
pvulnstatus CVE-2017-5753 "$status" "$msg"
|
||||||
}
|
}
|
||||||
|
|
||||||
###################
|
###################
|
||||||
@ -595,11 +661,21 @@ check_variant1()
|
|||||||
check_variant2()
|
check_variant2()
|
||||||
{
|
{
|
||||||
_info "\033[1;34mCVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'\033[0m"
|
_info "\033[1;34mCVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'\033[0m"
|
||||||
|
|
||||||
|
status=UNK
|
||||||
|
sys_interface_available=0
|
||||||
|
msg=''
|
||||||
|
if sys_interface_check "/sys/devices/system/cpu/vulnerabilities/spectre_v2"; then
|
||||||
|
# this kernel has the /sys interface, trust it over everything
|
||||||
|
sys_interface_available=1
|
||||||
|
else
|
||||||
_info "* Mitigation 1"
|
_info "* Mitigation 1"
|
||||||
_info_nol "* Hardware (CPU microcode) support for mitigation: "
|
_info "* Hardware (CPU microcode) support for mitigation"
|
||||||
|
_info_nol "* The SPEC_CTRL MSR is available: "
|
||||||
if [ ! -e /dev/cpu/0/msr ]; then
|
if [ ! -e /dev/cpu/0/msr ]; then
|
||||||
# try to load the module ourselves (and remember it so we can rmmod it afterwards)
|
# try to load the module ourselves (and remember it so we can rmmod it afterwards)
|
||||||
modprobe msr 2>/dev/null && insmod_msr=1
|
modprobe msr 2>/dev/null && insmod_msr=1
|
||||||
|
_debug "attempted to load module msr, insmod_msr=$insmod_msr"
|
||||||
fi
|
fi
|
||||||
if [ ! -e /dev/cpu/0/msr ]; then
|
if [ ! -e /dev/cpu/0/msr ]; then
|
||||||
pstatus yellow UNKNOWN "couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?"
|
pstatus yellow UNKNOWN "couldn't read /dev/cpu/0/msr, is msr support enabled in your kernel?"
|
||||||
@ -618,6 +694,50 @@ check_variant2()
|
|||||||
if [ "$insmod_msr" = 1 ]; then
|
if [ "$insmod_msr" = 1 ]; then
|
||||||
# if we used modprobe ourselves, rmmod the module
|
# if we used modprobe ourselves, rmmod the module
|
||||||
rmmod msr 2>/dev/null
|
rmmod msr 2>/dev/null
|
||||||
|
_debug "attempted to unload module msr, ret=$?"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# CPUID test
|
||||||
|
_info_nol "* The SPEC_CTRL CPUID feature bit is set: "
|
||||||
|
if [ ! -e /dev/cpu/0/cpuid ]; then
|
||||||
|
# try to load the module ourselves (and remember it so we can rmmod it afterwards)
|
||||||
|
modprobe cpuid 2>/dev/null && insmod_cpuid=1
|
||||||
|
_debug "attempted to load module cpuid, insmod_cpuid=$insmod_cpuid"
|
||||||
|
fi
|
||||||
|
if [ ! -e /dev/cpu/0/cpuid ]; then
|
||||||
|
pstatus yellow UNKNOWN "couldn't read /dev/cpu/0/cpuidr, is cpuid support enabled in your kernel?"
|
||||||
|
else
|
||||||
|
# from kernel src: { X86_FEATURE_SPEC_CTRL, CPUID_EDX,26, 0x00000007, 0 },
|
||||||
|
if [ "$opt_verbose" -ge 3 ]; then
|
||||||
|
dd if=/dev/cpu/0/cpuid bs=16 skip=7 iflag=skip_bytes count=1 >/dev/null 2>/dev/null
|
||||||
|
_debug "cpuid: reading leaf7 of cpuid on cpu0, ret=$?"
|
||||||
|
_debug "cpuid: leaf7 eax-ebx-ecd-edx: "$(dd if=/dev/cpu/0/cpuid bs=16 skip=7 iflag=skip_bytes count=1 2>/dev/null | od -x -A n)
|
||||||
|
_debug "cpuid: leaf7 edx higher-half is: "$(dd if=/dev/cpu/0/cpuid bs=16 skip=7 iflag=skip_bytes count=1 2>/dev/null | dd bs=1 skip=15 count=1 2>/dev/null | od -x -A n)
|
||||||
|
fi
|
||||||
|
# getting high byte of edx on leaf7 of cpuinfo in decimal
|
||||||
|
edx_hb=$(dd if=/dev/cpu/0/cpuid bs=16 skip=7 iflag=skip_bytes count=1 2>/dev/null | dd bs=1 skip=15 count=1 2>/dev/null | od -t u -A n | awk '{print $1}')
|
||||||
|
_debug "cpuid: leaf7 edx higher byte: $edx_hb (decimal)"
|
||||||
|
edx_bit26=$(( edx_hb & 8 ))
|
||||||
|
_debug "cpuid: edx_bit26=$edx_bit26"
|
||||||
|
if [ "$edx_bit26" -eq 8 ]; then
|
||||||
|
pstatus green YES
|
||||||
|
else
|
||||||
|
pstatus red NO
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
# hardware support according to kernel
|
||||||
|
if [ "$opt_verbose" -ge 2 ]; then
|
||||||
|
_verbose_nol "* The kernel has set the spec_ctrl flag in cpuinfo: "
|
||||||
|
if [ "$opt_live" = 1 ]; then
|
||||||
|
if grep -qw spec_ctrl /proc/cpuinfo; then
|
||||||
|
pstatus green YES
|
||||||
|
else
|
||||||
|
pstatus red NO
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
pstatus blue N/A "not testable in offline mode"
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
_info_nol "* Kernel support for IBRS: "
|
_info_nol "* Kernel support for IBRS: "
|
||||||
@ -635,14 +755,30 @@ check_variant2()
|
|||||||
pstatus green YES
|
pstatus green YES
|
||||||
ibrs_supported=1
|
ibrs_supported=1
|
||||||
ibrs_enabled=$(cat "$ibrs_file" 2>/dev/null)
|
ibrs_enabled=$(cat "$ibrs_file" 2>/dev/null)
|
||||||
|
_debug "ibrs: found $ibrs_file=$ibrs_enabled"
|
||||||
break
|
break
|
||||||
|
else
|
||||||
|
_debug "ibrs: file $ibrs_file doesn't exist"
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
|
# on some newer kernels, the spec_ctrl_ibrs flag in /proc/cpuinfo
|
||||||
|
# is set when ibrs has been administratively enabled (usually from cmdline)
|
||||||
|
# which in that case means ibrs is supported *and* enabled for kernel & user
|
||||||
|
# as per the ibrs patch series v3
|
||||||
|
if [ "$ibrs_supported" = 0 ]; then
|
||||||
|
if grep -qw spec_ctrl_ibrs /proc/cpuinfo; then
|
||||||
|
_debug "ibrs: found spec_ctrl_ibrs flag in /proc/cpuinfo"
|
||||||
|
ibrs_supported=1
|
||||||
|
# enabled=2 -> kernel & user
|
||||||
|
ibrs_enabled=2
|
||||||
|
fi
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
if [ "$ibrs_supported" != 1 -a -n "$opt_map" ]; then
|
if [ "$ibrs_supported" != 1 -a -n "$opt_map" ]; then
|
||||||
if grep -q spec_ctrl "$opt_map"; then
|
if grep -q spec_ctrl "$opt_map"; then
|
||||||
pstatus green YES
|
pstatus green YES
|
||||||
ibrs_supported=1
|
ibrs_supported=1
|
||||||
|
_debug "ibrs: found '*spec_ctrl*' symbol in $opt_map"
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
if [ "$ibrs_supported" != 1 ]; then
|
if [ "$ibrs_supported" != 1 ]; then
|
||||||
@ -683,6 +819,7 @@ check_variant2()
|
|||||||
if grep -q '^CONFIG_RETPOLINE=y' "$opt_config"; then
|
if grep -q '^CONFIG_RETPOLINE=y' "$opt_config"; then
|
||||||
pstatus green YES
|
pstatus green YES
|
||||||
retpoline=1
|
retpoline=1
|
||||||
|
_debug "retpoline: found "$(grep '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
|
||||||
else
|
else
|
||||||
pstatus red NO
|
pstatus red NO
|
||||||
fi
|
fi
|
||||||
@ -725,10 +862,15 @@ check_variant2()
|
|||||||
else
|
else
|
||||||
pstatus yellow UNKNOWN "couldn't find your kernel image or System.map"
|
pstatus yellow UNKNOWN "couldn't find your kernel image or System.map"
|
||||||
fi
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
if ! is_cpu_vulnerable 2; then
|
# if we have the /sys interface, don't even check is_cpu_vulnerable ourselves, the kernel already does it
|
||||||
|
if [ "$sys_interface_available" = 0 ] && ! is_cpu_vulnerable 2; then
|
||||||
|
# override status & msg in case CPU is not vulnerable after all
|
||||||
pvulnstatus CVE-2017-5715 OK "your CPU vendor reported your CPU model as not vulnerable"
|
pvulnstatus CVE-2017-5715 OK "your CPU vendor reported your CPU model as not vulnerable"
|
||||||
elif [ "$retpoline" = 1 -a "$retpoline_compiler" = 1 ]; then
|
elif [ -z "$msg" ]; then
|
||||||
|
# if msg is empty, sysfs check didn't fill it, rely on our own test
|
||||||
|
if [ "$retpoline" = 1 -a "$retpoline_compiler" = 1 ]; then
|
||||||
pvulnstatus CVE-2017-5715 OK "retpoline mitigate the vulnerability"
|
pvulnstatus CVE-2017-5715 OK "retpoline mitigate the vulnerability"
|
||||||
elif [ "$opt_live" = 1 ]; then
|
elif [ "$opt_live" = 1 ]; then
|
||||||
if [ "$ibrs_enabled" = 1 -o "$ibrs_enabled" = 2 ]; then
|
if [ "$ibrs_enabled" = 1 -o "$ibrs_enabled" = 2 ]; then
|
||||||
@ -743,6 +885,9 @@ check_variant2()
|
|||||||
pvulnstatus CVE-2017-5715 VULN "IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability"
|
pvulnstatus CVE-2017-5715 VULN "IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability"
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
else
|
||||||
|
pvulnstatus CVE-2017-5715 "$status" "$msg"
|
||||||
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
########################
|
########################
|
||||||
@ -750,12 +895,21 @@ check_variant2()
|
|||||||
check_variant3()
|
check_variant3()
|
||||||
{
|
{
|
||||||
_info "\033[1;34mCVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'\033[0m"
|
_info "\033[1;34mCVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'\033[0m"
|
||||||
|
|
||||||
|
status=UNK
|
||||||
|
sys_interface_available=0
|
||||||
|
msg=''
|
||||||
|
if sys_interface_check "/sys/devices/system/cpu/vulnerabilities/meltdown"; then
|
||||||
|
# this kernel has the /sys interface, trust it over everything
|
||||||
|
sys_interface_available=1
|
||||||
|
else
|
||||||
_info_nol "* Kernel supports Page Table Isolation (PTI): "
|
_info_nol "* Kernel supports Page Table Isolation (PTI): "
|
||||||
kpti_support=0
|
kpti_support=0
|
||||||
kpti_can_tell=0
|
kpti_can_tell=0
|
||||||
if [ -n "$opt_config" ]; then
|
if [ -n "$opt_config" ]; then
|
||||||
kpti_can_tell=1
|
kpti_can_tell=1
|
||||||
if grep -Eq '^(CONFIG_PAGE_TABLE_ISOLATION|CONFIG_KAISER)=y' "$opt_config"; then
|
if grep -Eq '^(CONFIG_PAGE_TABLE_ISOLATION|CONFIG_KAISER)=y' "$opt_config"; then
|
||||||
|
_debug "kpti_support: found option "$(grep -E '^(CONFIG_PAGE_TABLE_ISOLATION|CONFIG_KAISER)=y' "$opt_config")" in $opt_config"
|
||||||
kpti_support=1
|
kpti_support=1
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
@ -764,6 +918,7 @@ check_variant3()
|
|||||||
# so we try to find an exported symbol that is part of the PTI patch in System.map
|
# so we try to find an exported symbol that is part of the PTI patch in System.map
|
||||||
kpti_can_tell=1
|
kpti_can_tell=1
|
||||||
if grep -qw kpti_force_enabled "$opt_map"; then
|
if grep -qw kpti_force_enabled "$opt_map"; then
|
||||||
|
_debug "kpti_support: found kpti_force_enabled in $opt_map"
|
||||||
kpti_support=1
|
kpti_support=1
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
@ -775,6 +930,7 @@ check_variant3()
|
|||||||
pstatus yellow UNKNOWN "missing 'strings' tool, please install it, usually it's in the binutils package"
|
pstatus yellow UNKNOWN "missing 'strings' tool, please install it, usually it's in the binutils package"
|
||||||
else
|
else
|
||||||
if strings "$vmlinux" | grep -qw nopti; then
|
if strings "$vmlinux" | grep -qw nopti; then
|
||||||
|
_debug "kpti_support: found nopti string in $vmlinux"
|
||||||
kpti_support=1
|
kpti_support=1
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
@ -791,22 +947,31 @@ check_variant3()
|
|||||||
mount_debugfs
|
mount_debugfs
|
||||||
_info_nol "* PTI enabled and active: "
|
_info_nol "* PTI enabled and active: "
|
||||||
if [ "$opt_live" = 1 ]; then
|
if [ "$opt_live" = 1 ]; then
|
||||||
|
dmesg_grep="Kernel/User page tables isolation: enabled"
|
||||||
|
dmesg_grep="$dmesg_grep|Kernel page table isolation enabled"
|
||||||
|
dmesg_grep="$dmesg_grep|x86/pti: Unmapping kernel while in userspace"
|
||||||
if grep ^flags /proc/cpuinfo | grep -qw pti; then
|
if grep ^flags /proc/cpuinfo | grep -qw pti; then
|
||||||
# vanilla PTI patch sets the 'pti' flag in cpuinfo
|
# vanilla PTI patch sets the 'pti' flag in cpuinfo
|
||||||
|
_debug "kpti_enabled: found 'pti' flag in /proc/cpuinfo"
|
||||||
kpti_enabled=1
|
kpti_enabled=1
|
||||||
elif grep ^flags /proc/cpuinfo | grep -qw kaiser; then
|
elif grep ^flags /proc/cpuinfo | grep -qw kaiser; then
|
||||||
# kernel line 4.9 sets the 'kaiser' flag in cpuinfo
|
# kernel line 4.9 sets the 'kaiser' flag in cpuinfo
|
||||||
|
_debug "kpti_enabled: found 'kaiser' flag in /proc/cpuinfo"
|
||||||
kpti_enabled=1
|
kpti_enabled=1
|
||||||
elif [ -e /sys/kernel/debug/x86/pti_enabled ]; then
|
elif [ -e /sys/kernel/debug/x86/pti_enabled ]; then
|
||||||
# RedHat Backport creates a dedicated file, see https://access.redhat.com/articles/3311301
|
# RedHat Backport creates a dedicated file, see https://access.redhat.com/articles/3311301
|
||||||
kpti_enabled=$(cat /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
|
kpti_enabled=$(cat /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
|
||||||
elif dmesg | grep -Eq 'Kernel/User page tables isolation: enabled|Kernel page table isolation enabled'; then
|
_debug "kpti_enabled: file /sys/kernel/debug/x86/pti_enabled exists and says: $kpti_enabled"
|
||||||
|
elif dmesg | grep -Eq "$dmesg_grep"; then
|
||||||
# if we can't find the flag, grep dmesg output
|
# if we can't find the flag, grep dmesg output
|
||||||
|
_debug "kpti_enabled: found hint in dmesg: "$(dmesg | grep -E "$dmesg_grep")
|
||||||
kpti_enabled=1
|
kpti_enabled=1
|
||||||
elif [ -r /var/log/dmesg ] && grep -Eq 'Kernel/User page tables isolation: enabled|Kernel page table isolation enabled' /var/log/dmesg; then
|
elif [ -r /var/log/dmesg ] && grep -Eq "$dmesg_grep" /var/log/dmesg; then
|
||||||
# if we can't find the flag in dmesg output, grep in /var/log/dmesg when readable
|
# if we can't find the flag in dmesg output, grep in /var/log/dmesg when readable
|
||||||
|
_debug "kpti_enabled: found hint in /var/log/dmesg: "$(grep -E "$dmesg_grep" /var/log/dmesg)
|
||||||
kpti_enabled=1
|
kpti_enabled=1
|
||||||
else
|
else
|
||||||
|
_debug "kpti_enabled: couldn't find any hint that PTI is enabled"
|
||||||
kpti_enabled=0
|
kpti_enabled=0
|
||||||
fi
|
fi
|
||||||
if [ "$kpti_enabled" = 1 ]; then
|
if [ "$kpti_enabled" = 1 ]; then
|
||||||
@ -817,22 +982,31 @@ check_variant3()
|
|||||||
else
|
else
|
||||||
pstatus blue N/A "can't verify if PTI is enabled in offline mode"
|
pstatus blue N/A "can't verify if PTI is enabled in offline mode"
|
||||||
fi
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
if ! is_cpu_vulnerable 3; then
|
# if we have the /sys interface, don't even check is_cpu_vulnerable ourselves, the kernel already does it
|
||||||
pvulnstatus CVE-2017-5754 OK "your CPU vendor reported your CPU model as not vulnerable"
|
cve='CVE-2017-5754'
|
||||||
elif [ "$opt_live" = 1 ]; then
|
if [ "$sys_interface_available" = 0 ] && ! is_cpu_vulnerable 3; then
|
||||||
|
# override status & msg in case CPU is not vulnerable after all
|
||||||
|
pvulnstatus $cve OK "your CPU vendor reported your CPU model as not vulnerable"
|
||||||
|
elif [ -z "$msg" ]; then
|
||||||
|
# if msg is empty, sysfs check didn't fill it, rely on our own test
|
||||||
|
if [ "$opt_live" = 1 ]; then
|
||||||
if [ "$kpti_enabled" = 1 ]; then
|
if [ "$kpti_enabled" = 1 ]; then
|
||||||
pvulnstatus CVE-2017-5754 OK "PTI mitigates the vulnerability"
|
pvulnstatus $cve OK "PTI mitigates the vulnerability"
|
||||||
else
|
else
|
||||||
pvulnstatus CVE-2017-5754 VULN "PTI is needed to mitigate the vulnerability"
|
pvulnstatus $cve VULN "PTI is needed to mitigate the vulnerability"
|
||||||
fi
|
fi
|
||||||
else
|
else
|
||||||
if [ "$kpti_support" = 1 ]; then
|
if [ "$kpti_support" = 1 ]; then
|
||||||
pvulnstatus CVE-2017-5754 OK "offline mode: PTI will mitigate the vulnerability if enabled at runtime"
|
pvulnstatus $cve OK "offline mode: PTI will mitigate the vulnerability if enabled at runtime"
|
||||||
else
|
else
|
||||||
pvulnstatus CVE-2017-5754 VULN "PTI is needed to mitigate the vulnerability"
|
pvulnstatus $cve VULN "PTI is needed to mitigate the vulnerability"
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
else
|
||||||
|
pvulnstatus $cve "$status" "$msg"
|
||||||
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
# now run the checks the user asked for
|
# now run the checks the user asked for
|
||||||
@ -863,11 +1037,13 @@ if [ "$opt_batch" = 1 -a "$opt_batch_format" = "nrpe" ]; then
|
|||||||
else
|
else
|
||||||
echo "OK"
|
echo "OK"
|
||||||
fi
|
fi
|
||||||
[ "$nrpe_critical" = 1 ] && exit 2 # critical
|
|
||||||
[ "$nrpe_unknown" = 1 ] && exit 3 # unknown
|
|
||||||
exit 0 # ok
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ "$opt_batch" = 1 -a "$opt_batch_format" = "json" ]; then
|
if [ "$opt_batch" = 1 -a "$opt_batch_format" = "json" ]; then
|
||||||
_echo 0 ${json_output%?}]
|
_echo 0 ${json_output%?}']'
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# exit with the proper exit code
|
||||||
|
[ "$global_critical" = 1 ] && exit 2 # critical
|
||||||
|
[ "$global_unknown" = 1 ] && exit 3 # unknown
|
||||||
|
exit 0 # ok
|
||||||
|
Reference in New Issue
Block a user