doc: update README with some info about variant3 and variant4

This commit is contained in:
Stéphane Lesimple 2018-05-22 09:43:29 +02:00
parent f75cc0bb6f
commit 19be8f79eb

View File

@ -86,13 +86,13 @@ sudo ./spectre-meltdown-checker.sh
**CVE-2018-3640** rogue system register read (Variant 3a) **CVE-2018-3640** rogue system register read (Variant 3a)
- Impact: TBC - Impact: TBC
- Mitigation: TBC - Mitigation: microcode update only
- Performance impact of the mitigation: negligible - Performance impact of the mitigation: negligible
**CVE-2018-3639** speculative store bypass (Variant 4) **CVE-2018-3639** speculative store bypass (Variant 4)
- Impact: software using JIT (no known exploitation against kernel) - Impact: software using JIT (no known exploitation against kernel)
- Mitigation: TBC - Mitigation: microcode update + kernel update making possible for affected software to protect itself
- Performance impact of the mitigation: low to medium - Performance impact of the mitigation: low to medium
## Understanding what this script does and doesn't ## Understanding what this script does and doesn't