Commit Graph

  • f9c3d19f72 enh: CVE-2017-5715; check for unprivileged eBPF for paranoid mode master v26.21.0401891 github-actions[bot] 2026-04-01 21:23:47 +00:00
  • 8389d9593c chore: prepare for dev-build renaming to test-build github-actions[bot] 2026-03-31 20:20:46 +00:00
  • d664f404c3 enh: CVE-2017-5715; check for unprivileged eBPF for paranoid mode source-build github-actions[bot] 2026-04-01 21:23:47 +00:00
  • fe376887ab enh: CVE-2017-5715; check for unprivileged eBPF for paranoid mode test-build github-actions[bot] 2026-04-01 20:39:36 +00:00
  • e5c6d2d905 enh: CVE-2017-5715; check for unprivileged eBPF for paranoid mode test source Stéphane Lesimple 2026-04-01 20:37:54 +00:00
  • 7b41bcca2b chore: shellcheck fixes github-actions[bot] 2026-04-01 20:11:58 +00:00
  • ac327ce7c5 chore: shellcheck fixes Stéphane Lesimple 2026-04-01 20:10:29 +00:00
  • 03f63714b5 fix: CVE-2023-20569: logic errors with kernel_sro type change (bool => str) Stéphane Lesimple 2026-04-01 19:58:20 +00:00
  • 08702b07c9 fix: bad kernel/config var names Stéphane Lesimple 2026-04-01 19:53:34 +00:00
  • 4718134427 chore: cap_ipred unused for now, make shellcheck happy Stéphane Lesimple 2026-04-01 21:37:56 +02:00
  • e23712129d enh: rework is_cpu_affected() to enhance maintainability Stéphane Lesimple 2026-04-01 21:36:45 +02:00
  • 43c515ac74 enh: CVE-2017-5715 (spectre v2): make vuln assessment cap_bhi-aware Stéphane Lesimple 2026-04-01 21:34:12 +02:00
  • 8c3fb7b2cc enh: CVE-2024-36357 CVE-2024-36350 (TSA): inventory of sysfs strings + consider vuln if TSA mitigation forced to user/kernel on hypervisors Stéphane Lesimple 2026-04-01 21:00:48 +02:00
  • d05601ed3f feat: add CVE-2023-20593 (Zenbleed) mitigation detection for BSD Stéphane Lesimple 2026-03-31 23:11:55 +02:00
  • 690725ccc1 enh: add BSD stubs for CVE-2022-40982 CVE-2023-20569 CVE-2023-23583, detecting unaffected CPUs Stéphane Lesimple 2026-03-31 22:57:37 +02:00
  • 4875b4c71c feat: add CVE-2020-0543 (SRBDS) mitigation detection under BSD Stéphane Lesimple 2026-03-31 22:47:19 +02:00
  • 2b603c68ce feat: add CVE-2019-11135 (TAA) mitigation detection under BSD Stéphane Lesimple 2026-03-31 22:35:27 +02:00
  • 0628a3e565 enh: vmm detection has been greatly enhanced Stéphane Lesimple 2026-03-31 22:22:25 +02:00
  • 536dfb8701 enh: massive update for Spectre v2 (CVE-2017-5715) Stéphane Lesimple 2026-03-31 22:14:35 +02:00
  • e09d0cf221 enh: check_cpu: look for cap_stibp and cap_autoibrs Stéphane Lesimple 2026-03-31 22:08:02 +02:00
  • b062fe2184 enh: CVE-2017-5715: inventory of all sysfs strings, fix --sysfs-only path Stéphane Lesimple 2026-03-31 21:55:16 +02:00
  • dfe48d67ce enh: CVE-2018-3646: document all sysfs variations, fix --sysfs-only path Stéphane Lesimple 2026-03-31 21:44:51 +02:00
  • 35d83e19a8 fix: --sysfs-only path for CVE-2018-12207 CVE-2018-3620 Stéphane Lesimple 2026-03-31 21:35:18 +02:00
  • 123ad1c8e6 CVE-2023-20569: detect old kernels sysfs saying mitigations are correct whereas they are not Stéphane Lesimple 2026-03-31 21:28:16 +02:00
  • b9e7f7cb8a docs: update development guidelines Stéphane Lesimple 2026-03-31 21:17:11 +02:00
  • 151dd12e3e fix: cap_rdcl_no, cap_gds_no, cap_tsa_*_no were not setting the current CPU status as immune for their respective vulns github-actions[bot] 2026-03-31 22:48:56 +00:00
  • 278989d550 fix: cap_rdcl_no, cap_gds_no, cap_tsa_*_no were not setting the current CPU status as immune for their respective vulns Stéphane Lesimple 2026-04-01 00:47:41 +02:00
  • b4f4d11106 fix: CVE-2018-3620: false 'VULN' status on kernels reporting CPU as unaffected and RDCL_NO can't be parsed Stéphane Lesimple 2026-04-01 00:41:32 +02:00
  • 15ea90f312 enh: draft rework of CVE-2017-5753 aka spectre v1 github-actions[bot] 2026-03-31 22:23:17 +00:00
  • 4738e8f0ad enh: draft rework of CVE-2017-5753 aka spectre v1 Stéphane Lesimple 2026-04-01 00:22:07 +02:00
  • b32f05b8d2 chore: readme: add a second table one about impact/mitigation, rework sections Stéphane Lesimple 2026-03-31 22:57:00 +02:00
  • 5fd6a20ebb chore: readme: add a second table one about impact/mitigation, rework sections github-actions[bot] 2026-03-31 22:09:49 +00:00
  • e7df6a3e30 chore: readme: add a second table one about impact/mitigation github-actions[bot] 2026-03-31 22:05:17 +00:00
  • ba24551c56 chore: readme: add a second table one about impact/mitigation github-actions[bot] 2026-03-31 22:02:37 +00:00
  • 7c2699c01a chore: readme: add a second table one about impact/mitigation github-actions[bot] 2026-03-31 21:53:12 +00:00
  • 6663b6422e chore: readme: add a second table one about impact/mitigation github-actions[bot] 2026-03-31 21:43:28 +00:00
  • fe55c70658 chore: clearer CVE table in README.md github-actions[bot] 2026-03-31 21:01:37 +00:00
  • 3f171e301b chore: prepare for dev-build renaming to test-build github-actions[bot] 2026-03-31 20:20:46 +00:00
  • 3a822fdcf2 chore: master: remove obsolete workflow Stéphane Lesimple 2026-03-31 19:53:57 +02:00
  • d0822e1f9d chore: prepare for dev-build renaming to test-build github-actions[bot] 2026-03-31 17:53:45 +00:00
  • 295324a545 chore: prepare for dev-build renaming to test-build Stéphane Lesimple 2026-03-31 19:34:52 +02:00
  • 10e5b5749e chore: set VERSION when building github-actions[bot] 2026-03-30 22:22:20 +00:00
  • efa07e7fd9 chore: set VERSION when building Stéphane Lesimple 2026-03-30 23:46:13 +02:00
  • 4f7f83a40e chore: set VERSION when building github-actions[bot] 2026-03-30 21:51:45 +00:00
  • 4bbbd71564 update dev docs and refactor CVE list in readme github-actions[bot] 2026-03-30 21:39:55 +00:00
  • eabddf3d72 update dev docs and refactor CVE list in readme Stéphane Lesimple 2026-03-30 23:24:18 +02:00
  • c174a8b754 update dev docs and readme github-actions[bot] 2026-03-30 21:28:20 +00:00
  • 0f36203b5f chore: adjust workflow for dev-build github-actions[bot] 2026-03-30 21:08:41 +00:00
  • 04221cf8c8 chore: add .gitignore Stéphane Lesimple 2026-03-30 23:06:18 +02:00
  • a0032a44ef chore: adjust workflow for dev-build Stéphane Lesimple 2026-03-30 21:24:34 +02:00
  • 6eb70ab52d chore: move dist files to the dist/ subdir Stéphane Lesimple 2026-03-30 21:21:37 +02:00
  • 05e09bb7f4 feat: implement CVE-2024-36350 CVE-2024-36357 (Transient Scheduler Attack) Stéphane Lesimple 2026-03-30 21:13:21 +02:00
  • 5a0c391b06 doc: update development guidelines Stéphane Lesimple 2026-03-30 21:12:15 +02:00
  • ebc9e91d78 chore: shfmt Stéphane Lesimple 2026-03-30 21:09:29 +02:00
  • c2542e9940 dev-build workflow Stéphane Lesimple 2026-03-30 21:04:21 +02:00
  • 994608a90a use MSR names for read_msr for readability Stéphane Lesimple 2026-03-30 21:01:13 +02:00
  • 3d6acc460e fix: rework read_msr for values > INT32_MAX (#507) Stéphane Lesimple 2026-03-30 20:53:13 +02:00
  • 72824deea5 doc: add a note about the mandatory POSIX compliance of used tools Stéphane Lesimple 2026-03-30 20:48:10 +02:00
  • a7cf525b6e POSIX compatibility fix: replace sort -V by a manual comparison Stéphane Lesimple 2026-03-30 20:39:05 +02:00
  • 70d531ba09 BSD compatibility fix: stat -f and date -r fallbacks Stéphane Lesimple 2026-03-30 20:30:29 +02:00
  • cd79597e9a POSIX compatibility fix: sed -r => sed -E Stéphane Lesimple 2026-03-30 20:24:04 +02:00
  • b8477d0e4d POSIX compatibility fix: cut -w => awk Stéphane Lesimple 2026-03-30 20:15:21 +02:00
  • cebda01d05 split script in multiple files, reassembled through build.sh Stéphane Lesimple 2026-03-30 20:04:16 +02:00
  • 7e660812e9 standardize function naming and add doc headers to all of them Stéphane Lesimple 2026-03-30 19:55:15 +02:00
  • 45b26322c4 refactor functions that record/output results Stéphane Lesimple 2026-03-30 19:40:26 +02:00
  • a74111bfcd use global readonly vars for common paths/basedirs Stéphane Lesimple 2026-03-30 19:31:22 +02:00
  • 5a3362a7ed factorize/standardize check_CVE_*() funcs Stéphane Lesimple 2026-03-30 19:22:57 +02:00
  • 76a6d476ae factorize CVE metadata into a single CVE_REGISTRY global var Stéphane Lesimple 2026-03-30 19:15:10 +02:00
  • 80a31d25cc second vars renaming pass Stéphane Lesimple 2026-03-30 01:04:33 +00:00
  • 34c7b221f0 chore: rename status_* to affected_* Stéphane Lesimple 2026-03-30 00:25:49 +00:00
  • 2029fe10ef chore: apply variables naming convention Stéphane Lesimple 2026-03-30 00:25:27 +00:00
  • c34517dc99 chore: add variables naming convention documentation Stéphane Lesimple 2026-03-29 23:03:33 +00:00
  • 61cc0f3a35 update: fwdb from v347+i20251110+615b to v349+i20260227+615b, 50 microcode changes speed47 2026-03-23 10:03:09 +00:00
  • a20641fbad fix: handle non-numeric ARM CPU architecture values Stéphane Lesimple 2026-01-25 12:16:56 +01:00
  • d550ea8c85 fix: harmless 'dmesg: write error' that could happen on some systems Stéphane Lesimple 2026-01-25 11:49:17 +01:00
  • 8e33a1dbf2 fix: set cpu_* vars to a default value Stéphane Lesimple 2026-01-25 11:18:23 +01:00
  • 68b4617fd4 update: fwdb from v345+i20251110+4df2 to v347+i20251110+615b, 2 microcode changes speed47 2025-12-23 09:47:48 +00:00
  • 9fed5ceb33 update: fwdb from v344+i20250811+1523 to v345+i20251110+4df2, 45 microcode changes speed47 2025-11-17 09:47:03 +00:00
  • 72bce72fe8 chore: really fix autoupdate workflow to avoid useless PRs Stéphane Lesimple 2025-10-31 19:47:22 +01:00
  • 5f18e67f6f chore: fix autoupdate workflow Stéphane Lesimple 2025-10-30 23:51:10 +01:00
  • a8466b74fe fix CVE-2017-5715 reporting when IBRS_FW is enabled Gabriel Francisco 2025-10-27 00:30:14 +01:00
  • b99be2363c update: fwdb from v296+i20240514+988c to v344+i20250811+1523, 128 microcode changes speed47 2025-10-26 09:44:55 +00:00
  • ee4cfd00b8 chore: add autoupdate workflow for fwdb Stéphane Lesimple 2025-10-25 20:29:52 +02:00
  • c2c60e0161 chore: fix recent shellcheck warnings Stéphane Lesimple 2025-10-25 20:29:43 +02:00
  • bae43d8370 Replace head -1 by head -n1 Jörg Sommer 2025-01-11 07:39:54 +01:00
  • 34c6095912 fix: Linux 6.9+ changed some config options names (#490) Stéphane Lesimple 2024-08-04 14:13:52 +02:00
  • e806e4bc41 chore: docker compose v2 Stéphane Lesimple 2024-08-04 13:45:29 +02:00
  • 388d44edbd Fix Retpoline detection for Linux 6.9+ (issue #490) Ivan Zahariev 2024-07-26 14:12:57 +03:00
  • bd0c7c94b5 fix: typo introduced by #483, fixes #486 Stéphane Lesimple 2024-05-18 12:56:07 +02:00
  • d70e4c2974 fwdb: update to v296+i20240514+988c Stéphane Lesimple 2024-05-18 12:55:43 +02:00
  • 4e29fb5a21 fix: ucode_platformid_mask is hexa (fixes #485) Stéphane Lesimple 2024-01-17 16:55:24 +01:00
  • 0f2edb1a71 feat: blacklist some more microcodes (fixes #475) Stephane Lesimple 2024-01-09 18:50:26 +01:00
  • 8ac2539a2a fix: microcode check now supports pf_mask (fixes #482) Stephane Lesimple 2024-01-09 16:56:16 +01:00
  • 97f4d5f2bc feat(reptar): add detection and mitigation of Reptar Stéphane Lesimple 2023-11-17 12:17:12 +01:00
  • 9b7b09ada3 fix(inception): continued mitigation detection Stéphane Lesimple 2023-08-25 11:42:57 +02:00
  • c94811e63d fix(inception): Zen1/2 results based on kernel mitigations Sébastien Mériot 2023-08-16 15:54:13 +00:00
  • 3e67047c73 feat(inception): README Sébastien Mériot 2023-08-14 16:43:10 +00:00
  • ecee75716e feat(inception): kernel checks + sbpb support detection Sébastien Mériot 2023-08-14 16:37:51 +00:00
  • fb6933dc64 feat(inception): Zen1/2 IBPB and SMT checks Sébastien Mériot 2023-08-14 09:34:48 +00:00
  • dc6921a1ac feat(inception): handle sysfs interface Stéphane Lesimple 2023-08-12 11:32:32 +02:00