mirror of
https://github.com/speed47/spectre-meltdown-checker.git
synced 2026-04-09 10:13:18 +02:00
chore: add proper header to all src/vulns/* files
This commit is contained in:
@@ -1,14 +1,12 @@
|
||||
# vim: set ts=4 sw=4 sts=4 et:
|
||||
###################
|
||||
# SPECTRE 1 SECTION
|
||||
###############################
|
||||
# CVE-2017-5753, Spectre V1, Bounds Check Bypass
|
||||
|
||||
# CVE-2017-5753 Spectre Variant 1 (bounds check bypass) - entry point
|
||||
# Sets: (none directly, delegates to check_cve)
|
||||
check_CVE_2017_5753() {
|
||||
check_cve 'CVE-2017-5753'
|
||||
}
|
||||
|
||||
# CVE-2017-5753 Spectre Variant 1 (bounds check bypass) - Linux mitigation check
|
||||
# Sets: g_redhat_canonical_spectre (via check_redhat_canonical_spectre)
|
||||
check_CVE_2017_5753_linux() {
|
||||
local status sys_interface_available msg v1_kernel_mitigated v1_kernel_mitigated_err v1_mask_nospec ret explain_text
|
||||
@@ -279,7 +277,6 @@ check_CVE_2017_5753_linux() {
|
||||
fi
|
||||
}
|
||||
|
||||
# CVE-2017-5753 Spectre Variant 1 (bounds check bypass) - BSD mitigation check
|
||||
check_CVE_2017_5753_bsd() {
|
||||
if ! is_cpu_affected "$cve"; then
|
||||
pvulnstatus "$cve" OK "your CPU vendor reported your CPU model as not affected"
|
||||
|
||||
Reference in New Issue
Block a user