| skipped 65 lines |
66 | 66 | | debian) |
67 | 67 | | # get debian upstream kernel version |
68 | 68 | | kernel=$(uname -v | cut -d' ' -f4 | cut -d- -f1) |
69 | | - | if lse_is_version_bigger "$kernel" "5.10.92"; then |
70 | | - | # Not vulnerable |
71 | | - | exit 1 |
72 | | - | fi |
| 69 | + | lse_is_version_bigger "$kernel" "5.10.92" && exit 1 |
73 | 70 | | ;; |
74 | 71 | | ubuntu) |
75 | | - | if lse_is_version_bigger "$kernel_distro" "5.13.0-35.39"; then |
76 | | - | # Not vulnerable |
77 | | - | exit 1 |
78 | | - | fi |
| 72 | + | lse_is_version_bigger "$kernel_distro" "5.13.0-35.39" && exit 1 |
| 73 | + | ;; |
| 74 | + | redhat) |
| 75 | + | [ -r "/etc/os-release" ] && distro_release=$(grep -E '^VERSION_ID=' /etc/os-release | cut -f2 -d=) |
| 76 | + | kernel_package=$(lse_get_pkg_version kernel) |
| 77 | + | case "$distro_release" in |
| 78 | + | 8.1) |
| 79 | + | lse_is_version_bigger 4.18.0-147.64.1.el8_1 "$kernel_package" || exit 1 |
| 80 | + | ;; |
| 81 | + | 8.2) |
| 82 | + | lse_is_version_bigger 4.18.0-193.79.1.el8_2 "$kernel_package" || exit 1 |
| 83 | + | ;; |
| 84 | + | 8.4) |
| 85 | + | lse_is_version_bigger 4.18.0-305.40.2.el8_4 "$kernel_package" || exit 1 |
| 86 | + | ;; |
| 87 | + | 8.*) |
| 88 | + | lse_is_version_bigger 4.18.0-348.20.1.el8_5 "$kernel_package" || exit 1 |
| 89 | + | ;; |
| 90 | + | *) |
| 91 | + | lse_is_version_bigger "$distro_release" 8 && exit 1 |
| 92 | + | ;; |
| 93 | + | esac |
79 | 94 | | ;; |
80 | 95 | | esac |
81 | 96 | | |
82 | 97 | | # Vulnerable |
83 | | - | echo "$kernel_distro" |
| 98 | + | echo "Vulnerable! kernel version: $kernel_distro" |
84 | 99 | | } #) |
85 | 100 | | |
86 | 101 | | # Uncomment this line for testing the lse_cve_test function |
| skipped 2 lines |