Commit Graph

  • d18d9df21f Added support for SRBDS related vulnerabilities #364 Agata Gruza 2020-04-16 03:59:28 -0700
  • ae91f278b8 Added support for SRBDS related vulnerabilities #363 Agata Gruza 2020-04-16 03:59:28 -0700
  • b6c1898bce
    Update spectre-meltdown-checker.sh #361 Agata Gruza 2020-06-09 10:13:18 -0700
  • 4ea74c2d19 Added support for SRBDS related vulnerabilities Agata Gruza 2020-04-16 03:59:28 -0700
  • e5b79d8622 arm64: variant 4: detect ssbd mitigation from kernel img, system.map or kconfig #397 Stéphane Lesimple 2020-06-06 18:27:29 +0200
  • c71e189ea3 fix: variant4: added case where prctl ssbd status is tagged as 'unknown' Stéphane Lesimple 2020-06-06 17:39:07 +0200
  • 33cf1cde79 enh: arm: add experimental support for binary arm images Stéphane Lesimple 2019-11-24 22:45:38 +0100
  • 4a3006e196 fix: arm64: cve-2017-5753: kernels 4.19+ use a different nospec macro Stéphane Lesimple 2019-11-23 18:01:36 +0100
  • 36f98eff95 fwdb: update MCEdb to v147 & Intel firmwares to 2020-04-27 Stéphane Lesimple 2020-05-31 12:55:59 +0200
  • fb5f01de4d fwdb: update MCEdb to v147 & Intel firmwares to 2020-04-27 #358 Stéphane Lesimple 2020-05-31 12:55:59 +0200
  • b869849f52
    Update built-in MCEDB to v145 #355 Dylan M. Taylor 2020-05-20 21:43:10 -0400
  • fa7b8f9567 Typo xaitax 2020-04-03 10:19:25 +0200
  • e40967ce52
    Typo #352 xaitax 2020-04-03 10:19:25 +0200
  • 3beefc2587 enh: rsb filling: no longer need the 'strings' tool to check for kernel support in live mode Stéphane Lesimple 2020-03-10 22:13:55 +0100
  • 27c36fdb80 fwdb: update to v135.20200303+i20200205 Stéphane Lesimple 2020-03-10 22:17:22 +0100
  • 8e2e5f0e91 fwdb: update to v135.20200303+i20200205 #345 Stéphane Lesimple 2020-03-10 22:17:22 +0100
  • 75501ac8f5 enh: rsb filling: no longer need the 'strings' tool to check for kernel support in live mode #346 Stéphane Lesimple 2020-03-10 22:13:55 +0100
  • 3d21dae168 Fixes for FreeBSD to parse CPU info. Matt Christian 2020-02-06 19:54:27 +0100
  • 73ca60e1cb Fixes for FreeBSD to parse CPU info. #305 Matt Christian 2020-02-06 19:54:27 +0100
  • 7d2a510146 chore: update fwdb to v132.20200108+i20191124 Stéphane Lesimple 2020-02-01 18:57:59 +0100
  • a1a35c9b35 chore: github: add check run on pull requests Stéphane Lesimple 2020-01-10 13:19:36 +0100
  • c423ebef45 Support with busybox's ps command #338 Nobuhiro Iwamatsu 2020-01-10 13:36:55 +0900
  • eec77e1ab9 fix: fwdb update: remove Intel extract tempdir on exit Stéphane Lesimple 2019-12-10 19:16:58 +0100
  • 6c206088e0 fix: fwdb update: remove Intel extract tempdir on exit #334 Stéphane Lesimple 2019-12-10 19:16:58 +0100
  • 5633d374de fix: has_vmm: ignore kernel threads when looking for a hypervisor (fixes #278) Stéphane Lesimple 2019-12-09 23:17:37 +0100
  • c495307557 fix: has_vmm: ignore kernel threads when looking for a hypervisor (fixes #278) #333 Stéphane Lesimple 2019-12-09 23:17:37 +0100
  • a343bccb49 bump to v0.43 v0.43 Stéphane Lesimple 2019-12-08 15:25:20 +0100
  • 9b53af8ed9 bump to v0.43 #332 Stéphane Lesimple 2019-12-08 15:25:20 +0100
  • 1f604c119b fix var typo Stéphane Lesimple 2019-12-08 15:25:54 +0100
  • bfed3187a6 fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a Stéphane Lesimple 2019-11-24 20:19:21 +0100
  • 0cd7e1164f feat: detect vanilla 5.4+ locked down mode Stéphane Lesimple 2019-12-06 23:03:36 +0100
  • 71129d6b48 fix: tsx: rtm feature bit is in EBX(11) Stéphane Lesimple 2019-12-02 19:07:10 +0100
  • 6e799e8b01 fix: mcepsc: fix logic error on non-speculative CPUs that prevented detection of MCEPSC immunity Stéphane Lesimple 2019-11-25 23:03:04 +0100
  • 4993b04922 fix: taa: CPUs having TAA_NO bit set are not vulnerable Stéphane Lesimple 2019-11-25 21:14:54 +0100
  • 4fc2afe1bc feat: add TSX_CTRL MSR detection in hardware info Stéphane Lesimple 2019-11-25 20:58:49 +0100
  • bd47275501 feat: add detection of iTLB Multihit vuln/mitigation (CVE-2018-12207) Stéphane Lesimple 2019-11-24 19:25:56 +0100
  • 38deb0083d enh: arm: add experimental support for binary arm images #359 Stéphane Lesimple 2019-11-24 22:45:38 +0100
  • 552228339b fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a #328 Stéphane Lesimple 2019-11-24 20:19:21 +0100
  • 7cdf174499 feat: add detection of iTLB Multihit vuln/mitigation (CVE-2018-12207) #327 Stéphane Lesimple 2019-11-24 19:25:56 +0100
  • 2a2bec47e2 fix: arm64: cve-2017-5753: kernels 4.19+ use a different nospec macro Stéphane Lesimple 2019-11-23 18:01:36 +0100
  • 8ddf6b2d6d enh: replace shell wildcard by a find to avoid potiental error (list of args too long) Stéphane Lesimple 2019-11-24 16:47:53 +0100
  • 16b6490ffc chore: avoid ${var:-]} syntax, badly confusing vim's syntax highlighter Stéphane Lesimple 2019-11-23 16:02:00 +0100
  • 18df38fae6 fix: sgx: on locked down kernels, fallback to CPUID bit for detection Stéphane Lesimple 2019-11-24 17:21:20 +0100
  • a306757c22 fix: detect Red Hat locked down kernels (impacts MSR writes) Stéphane Lesimple 2019-09-22 00:45:02 +0200
  • e01f97ee75 fix: fwdb: don't use local db if it's older than our builtin version Stéphane Lesimple 2019-11-23 22:02:49 +0100
  • fa7f814f4f chore: rename mcedb cmdline parameters to fwdb Stéphane Lesimple 2019-11-23 13:39:51 +0100
  • bb32a16a86 update fwdb to v130.20191104+i20191027 Stéphane Lesimple 2019-11-23 13:33:55 +0100
  • 8c84c0ba17 enh: fwdb: use both Intel GitHub repo and MCEdb to build our database Stéphane Lesimple 2019-11-23 12:39:59 +0100
  • 3a512573fc fix: sgx: on locked down kernels, fallback to CPUID bit for detection #326 Stéphane Lesimple 2019-11-24 17:21:20 +0100
  • eadbffbc00 enh: replace shell wildcard by a find to avoid potiental error (list of args too long) #325 Stéphane Lesimple 2019-11-24 16:47:53 +0100
  • d519cc42c7 chore: avoid ${var:-]} syntax, badly confusing vim's syntax highlighter Stéphane Lesimple 2019-11-23 16:02:00 +0100
  • cc6d1d47e1 fix: fwdb: don't use local db if it's older than our builtin version #323 Stéphane Lesimple 2019-11-23 22:02:49 +0100
  • 2e1a97c1af chore: rename mcedb cmdline parameters to fwdb Stéphane Lesimple 2019-11-23 13:39:51 +0100
  • e7e219ce79 update fwdb to v130.20191104+i20191027 Stéphane Lesimple 2019-11-23 13:33:55 +0100
  • 82d595cfdd enh: fwdb: use both Intel GitHub repo and MCEdb to build our database Stéphane Lesimple 2019-11-23 12:39:59 +0100
  • 1d5ad65dee fix: detect Red Hat locked down kernels (impacts MSR writes) Stéphane Lesimple 2019-09-22 00:45:02 +0200
  • 6abe1bc62b enh: kernel decompression: better tolerance over missing tools Stéphane Lesimple 2019-11-23 16:28:08 +0100
  • 0d36e5e055 enh: kernel decompression: better tolerance over missing tools #324 Stéphane Lesimple 2019-11-23 16:28:08 +0100
  • 5ca7fe91ff fix: pteinv: don't check kernel image if not available Stéphane Lesimple 2019-11-23 14:01:56 +0100
  • 4ba68fba74 fix: silence useless error from grep (fixes #322) Stéphane Lesimple 2019-11-23 13:51:00 +0100
  • 59ad312773 fix: msr: fix msr module detection under Ubuntu 19.10 (fixes #316) Stéphane Lesimple 2019-11-19 22:35:08 +0100
  • 418533c47e chore: remove LICENSE file, SPDX id is enough Stéphane Lesimple 2019-11-18 20:26:38 +0100
  • 3e757b6177 chore: add github check workflow Stéphane Lesimple 2019-11-18 10:48:52 -0800
  • 61cd0c0079 chore: remove LICENSE file, SPDX id is enough #319 Stéphane Lesimple 2019-11-18 20:26:38 +0100
  • ca8187b0a0 chore: add github check workflow Stéphane Lesimple 2019-11-18 10:48:52 -0800
  • f724f94085 enh: kernel: autodetect customized arch kernels from cmdline Stéphane Lesimple 2019-11-17 18:36:57 +0100
  • dcf540888d enh: mock: implement reading from /proc/cmdline Stéphane Lesimple 2019-11-17 18:36:08 +0100
  • 9911c243b2 feat: use --live with --kernel/--config/--map to override file detection in live mode Stéphane Lesimple 2019-11-17 14:29:32 +0100
  • 9ffa54dd79 enh: kernel: autodetect customized arch kernels from cmdline #318 Stéphane Lesimple 2019-11-17 18:36:57 +0100
  • 6c5f032f41 enh: mock: implement reading from /proc/cmdline Stéphane Lesimple 2019-11-17 18:36:08 +0100
  • 32376c4bf1 feat: use --live with --kernel/--config/--map to override file detection in live mode Stéphane Lesimple 2019-11-17 14:29:32 +0100
  • cb279a49ec enh(taa): more complete version Stéphane Lesimple 2019-11-13 01:07:10 +0100
  • c100ce4c0d mcedb: update from v112 to v130 Stéphane Lesimple 2019-11-12 21:19:03 +0100
  • 4741b06160 fix: batch mode for TAA Stéphane Lesimple 2019-11-12 21:16:21 +0100
  • e0a1c2ec77 fix shellcheck warnings Stéphane Lesimple 2019-11-12 20:06:12 +0100
  • c18b88d745 Fixing typo Agata Gruza 2019-11-12 09:34:43 -0800
  • d623524342 Added support for TAA related vulnerabilities Agata Gruza 2019-11-12 09:30:36 -0800
  • 09b73b4ed8
    Fixing typo #312 Agata Gruza 2019-11-12 09:34:43 -0800
  • d9bf960d2d Added support for TAA related vulnerabilities Agata Gruza 2019-11-12 09:30:36 -0800
  • f5ec320fe5 enh: rework the vuln logic of MDS with --paranoid (fixes #307) Stéphane Lesimple 2019-09-22 04:02:22 +0200
  • cc224c0522 fix: mocking value for read_msr Stéphane Lesimple 2019-09-21 18:50:08 +0200
  • 0518604fe6 Use kernel_err to avoid misreporting missing Linux kernel image Corey Wright 2019-06-29 19:56:11 -0500
  • d57fecec91 spectre-meltdown-checker.sh: fix typos Erik Zettel 2019-09-19 12:06:04 +0200
  • 97722bda84
    spectre-meltdown-checker.sh: fix typos #306 Erik Zettel 2019-09-19 12:06:04 +0200
  • f835f4d07d Explain that Enhanced IBRS is better for performance than classic IBRS Stéphane Lesimple 2019-08-14 12:42:27 +0200
  • 482d6c200a Enhanced IBRS capabilities There are two flavors of IBRS: plain and enhanced. This patch tells which flavor of IBRS is in use. Agata Gruza 2019-07-29 16:56:54 -0700
  • 82e1c36ce4 Explain that Enhanced IBRS is better for performance than classic IBRS #300 Stéphane Lesimple 2019-08-14 12:42:27 +0200
  • 5f5875d6e4 Enhanced IBRS capabilities There are two flavors of IBRS: plain and enhanced. This patch tells which flavor of IBRS is in use. Agata Gruza 2019-07-29 16:56:54 -0700
  • 8304b33f0a Use kernel_err to avoid misreporting missing Linux kernel image #295 Corey Wright 2019-06-29 19:56:11 -0500
  • 91d0699029 update MCEdb from v111 to v112 David Guglielmi 2019-05-29 14:55:08 +0200
  • 272a02ae41
    update MCEdb from v111 to v112 #290 David Guglielmi 2019-05-29 14:55:08 +0200
  • fcc4ff4de2 update MCEdb from v110 to v111, bump to v0.42 v0.42 Stéphane Lesimple 2019-05-24 22:49:45 +0200
  • 0bd38ddda0 enh: -v -v now implies --dump-mock-data Stéphane Lesimple 2019-05-24 11:36:39 +0200
  • e83dc818cd feat(mds): implement FreeBSD mitigation detection Stéphane Lesimple 2019-05-15 20:45:28 +0200
  • d69ea67101 feat(mock): add --dump-mock-data Stéphane Lesimple 2019-05-24 10:15:02 +0200
  • dfe0d10f2a fix(mds): remove useless display of MD_CLEAR info in non-hw section Stéphane Lesimple 2019-05-24 10:20:48 +0200
  • 58a5acfdbb fix(bsd): read_msr returned data in an incorrect format Stéphane Lesimple 2019-05-24 09:33:42 +0200
  • ccb4dbef7c enh(mock): avoid reading the sysfs interface outside sys_interface_check() for higher mocking coverage Stéphane Lesimple 2019-05-23 14:27:50 +0200
  • afbb26277f feat(mock): add mocking functionality to help reproducing issues under specific CPUs Stéphane Lesimple 2019-05-23 14:26:40 +0200
  • 77b34d48c6 fix(mds): check MDS_NO bit in is_cpu_mds_free() Stéphane Lesimple 2019-05-23 14:25:13 +0200