aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJesús <heckyel@hyperbola.info>2018-02-14 15:44:27 -0500
committerJesús <heckyel@hyperbola.info>2018-02-14 15:44:27 -0500
commit3b7f25550cb5d7871f7796e4c8d4ced870a2e80e (patch)
tree28ee3419f7c065934cd5a74f1fba916276caef42
parent3ecd26826cef2357ec1025a6468b24a768cfa4f1 (diff)
downloadspectre-meltdown-checker-3b7f25550cb5d7871f7796e4c8d4ced870a2e80e.tar.lz
spectre-meltdown-checker-3b7f25550cb5d7871f7796e4c8d4ced870a2e80e.tar.xz
spectre-meltdown-checker-3b7f25550cb5d7871f7796e4c8d4ced870a2e80e.zip
fix(xen): declare Xen's PTI patch as a valid mitigation for variant3
-rwxr-xr-xspectre-meltdown-checker.sh2
1 files changed, 1 insertions, 1 deletions
diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
index 7a3d9a6..0878f45 100755
--- a/spectre-meltdown-checker.sh
+++ b/spectre-meltdown-checker.sh
@@ -1793,7 +1793,7 @@ check_variant3()
elif [ "$xen_pv_domo" = 1 ]; then
pvulnstatus $cve OK "Xen Dom0s are safe and do not require PTI"
elif [ "$xen_pv_domu" = 1 ]; then
- pvulnstatus $cve VULN "Xen PV DomUs are vulnerable and need to be run in HVM, PVHVM or PVH mode"
+ pvulnstatus $cve VULN "Xen PV DomUs are vulnerable and need to be run in HVM, PVHVM, PVH mode, or the Xen hypervisor must have the Xen's own PTI patch"
else
pvulnstatus $cve VULN "PTI is needed to mitigate the vulnerability"
fi