diff options
author | Jesús <heckyel@hyperbola.info> | 2018-02-14 15:44:27 -0500 |
---|---|---|
committer | Jesús <heckyel@hyperbola.info> | 2018-02-14 15:44:27 -0500 |
commit | 3b7f25550cb5d7871f7796e4c8d4ced870a2e80e (patch) | |
tree | 28ee3419f7c065934cd5a74f1fba916276caef42 | |
parent | 3ecd26826cef2357ec1025a6468b24a768cfa4f1 (diff) | |
download | spectre-meltdown-checker-3b7f25550cb5d7871f7796e4c8d4ced870a2e80e.tar.lz spectre-meltdown-checker-3b7f25550cb5d7871f7796e4c8d4ced870a2e80e.tar.xz spectre-meltdown-checker-3b7f25550cb5d7871f7796e4c8d4ced870a2e80e.zip |
fix(xen): declare Xen's PTI patch as a valid mitigation for variant3
-rwxr-xr-x | spectre-meltdown-checker.sh | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 7a3d9a6..0878f45 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -1793,7 +1793,7 @@ check_variant3() elif [ "$xen_pv_domo" = 1 ]; then pvulnstatus $cve OK "Xen Dom0s are safe and do not require PTI" elif [ "$xen_pv_domu" = 1 ]; then - pvulnstatus $cve VULN "Xen PV DomUs are vulnerable and need to be run in HVM, PVHVM or PVH mode" + pvulnstatus $cve VULN "Xen PV DomUs are vulnerable and need to be run in HVM, PVHVM, PVH mode, or the Xen hypervisor must have the Xen's own PTI patch" else pvulnstatus $cve VULN "PTI is needed to mitigate the vulnerability" fi |