|
11 | 11 | # |
12 | 12 | # Stephane Lesimple |
13 | 13 | # |
14 | | -VERSION='0.42' |
| 14 | +VERSION='0.43' |
15 | 15 |
|
16 | 16 | trap 'exit_cleanup' EXIT |
17 | 17 | trap '_warn "interrupted, cleaning up..."; exit_cleanup; exit 1' INT |
@@ -84,14 +84,14 @@ show_usage() |
84 | 84 | --batch prometheus produce output for consumption by prometheus-node-exporter |
85 | 85 |
|
86 | 86 | --variant VARIANT specify which variant you'd like to check, by default all variants are checked |
87 | | - VARIANT can be one of 1, 2, 3, 3a, 4, l1tf, msbds, mfbds, mlpds, mdsum, taa |
| 87 | + VARIANT can be one of 1, 2, 3, 3a, 4, l1tf, msbds, mfbds, mlpds, mdsum, taa, mcepsc |
88 | 88 | can be specified multiple times (e.g. --variant 2 --variant 3) |
89 | 89 | --cve [cve1,cve2,...] specify which CVE you'd like to check, by default all supported CVEs are checked |
90 | 90 | --hw-only only check for CPU information, don't check for any variant |
91 | 91 | --no-hw skip CPU information and checks, if you're inspecting a kernel not to be run on this host |
92 | | - --vmm [auto,yes,no] override the detection of the presence of a hypervisor (for CVE-2018-3646), default: auto |
93 | | - --update-fwdb update our local copy of the CPU microcodes versions database (using the awesome MCExtractor project |
94 | | - and the Intel firmwares GitHub repository) |
| 92 | + --vmm [auto,yes,no] override the detection of the presence of a hypervisor, default: auto |
| 93 | + --update-fwdb update our local copy of the CPU microcodes versions database (using the awesome |
| 94 | + MCExtractor project and the Intel firmwares GitHub repository) |
95 | 95 | --update-builtin-fwdb same as --update-fwdb but update builtin DB inside the script itself |
96 | 96 | --dump-mock-data used to mimick a CPU on an other system, mainly used to help debugging this script |
97 | 97 |
|
@@ -1040,8 +1040,9 @@ while [ -n "$1" ]; do |
1040 | 1040 | mdsum) opt_cve_list="$opt_cve_list CVE-2019-11091"; opt_cve_all=0;; |
1041 | 1041 | l1tf) opt_cve_list="$opt_cve_list CVE-2018-3615 CVE-2018-3620 CVE-2018-3646"; opt_cve_all=0;; |
1042 | 1042 | taa) opt_cve_list="$opt_cve_list CVE-2019-11135"; opt_cve_all=0;; |
| 1043 | + mcepsc) opt_cve_list="$opt_cve_list CVE-2018-12207"; opt_cve_all=0;; |
1043 | 1044 | *) |
1044 | | - echo "$0: error: invalid parameter '$2' for --variant, expected either 1, 2, 3, 3a, 4, msbds, mfbds, mlpds, mdsum, taa or l1tf" >&2; |
| 1045 | + echo "$0: error: invalid parameter '$2' for --variant, expected either 1, 2, 3, 3a, 4, l1tf, msbds, mfbds, mlpds, mdsum, taa or mcepsc" >&2; |
1045 | 1046 | exit 255 |
1046 | 1047 | ;; |
1047 | 1048 | esac |
|
0 commit comments