From 19be8f79ebb46a742d53cf84bd96319207013dad Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Lesimple?= Date: Tue, 22 May 2018 09:43:29 +0200 Subject: [PATCH] doc: update README with some info about variant3 and variant4 --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index e139f18..2948a12 100644 --- a/README.md +++ b/README.md @@ -86,13 +86,13 @@ sudo ./spectre-meltdown-checker.sh **CVE-2018-3640** rogue system register read (Variant 3a) - Impact: TBC - - Mitigation: TBC + - Mitigation: microcode update only - Performance impact of the mitigation: negligible **CVE-2018-3639** speculative store bypass (Variant 4) - Impact: software using JIT (no known exploitation against kernel) - - Mitigation: TBC + - Mitigation: microcode update + kernel update making possible for affected software to protect itself - Performance impact of the mitigation: low to medium ## Understanding what this script does and doesn't