From a55378d439671469a74ec2939b1d56689bfe0e8b Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?S=C3=A9bastien=20M=C3=A9riot?= Date: Mon, 14 Aug 2023 16:43:10 +0000 Subject: [PATCH] feat(inception): README --- README.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/README.md b/README.md index bbb08b3..4f56a0f 100644 --- a/README.md +++ b/README.md @@ -21,6 +21,7 @@ CVE [CVE-2018-12207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207) | Machine Check Exception on Page Size Changes | MCEPSC, No eXcuses, iTLB Multihit [CVE-2020-0543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543) | Special Register Buffer Data Sampling | SRBDS [CVE-2022-40982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982) | Gather Data Sampling | GDS, Downfall +[CVE-2023-20569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569) | Return Address Security | Inception, RAS, SRSO [CVE-2023-20593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593) | Cross-Process Information Leak | Zenbleed Supported operating systems: @@ -187,6 +188,12 @@ docker run --rm --privileged -v /boot:/boot:ro -v /dev/cpu:/dev/cpu:ro -v /lib/m - Mitigation: either microcode update or disabling AVX feature - Performance impact of the mitigation: TBD +**CVE-2023-20569** Return Address Security (Inception) + + - Impact: Kernel & all software + - Mitigation: updated kernel & microcode + - Performance impact of the mitigation: low to significant depending on the mitigation + **CVE-2023-20593** Cross-Process Information Leak (Zenbleed) - Impact: Kernel & all software