mirror of
https://github.com/speed47/spectre-meltdown-checker.git
synced 2026-04-07 09:13:20 +02:00
chore: shellcheck fixes
This commit is contained in:
@@ -9,11 +9,10 @@ check_CVE_2023_20569() {
|
||||
|
||||
# CVE-2023-20569 Inception (SRSO, speculative return stack overflow) - Linux mitigation check
|
||||
check_CVE_2023_20569_linux() {
|
||||
local status sys_interface_available msg kernel_sro kernel_sro_err kernel_srso kernel_ibpb_entry smt_enabled kernel_srso_accurate_reporting
|
||||
local status sys_interface_available msg kernel_sro kernel_sro_err kernel_srso kernel_ibpb_entry smt_enabled
|
||||
status=UNK
|
||||
sys_interface_available=0
|
||||
msg=''
|
||||
kernel_srso_accurate_reporting=0
|
||||
|
||||
if sys_interface_check "$VULN_SYSFS_BASE/spec_rstack_overflow"; then
|
||||
# this kernel has the /sys interface, trust it over everything
|
||||
@@ -83,7 +82,6 @@ check_CVE_2023_20569_linux() {
|
||||
if [ -n "$g_kernel_err" ]; then
|
||||
pstatus yellow UNKNOWN "$g_kernel_err"
|
||||
elif grep -q 'Vulnerable: Safe RET, no microcode' "$g_kernel"; then
|
||||
kernel_srso_accurate_reporting=1
|
||||
pstatus green YES
|
||||
elif [ -n "$kernel_sro" ]; then
|
||||
pstatus yellow NO "your kernel reports partial SRSO mitigations as fully mitigated, upgrade recommended"
|
||||
|
||||
Reference in New Issue
Block a user