mirror of
https://github.com/speed47/spectre-meltdown-checker.git
synced 2026-04-03 13:47:08 +02:00
doc: unsupported CVE list
This commit is contained in:
@@ -1,6 +1,6 @@
|
|||||||
# Unsupported CVEs
|
# Unsupported CVEs
|
||||||
|
|
||||||
This document lists transient execution CVEs that have been evaluated and determined to be **out of scope** for this tool. See the "CVE Inclusion Criteria" section in [DEVELOPMENT.md](DEVELOPMENT.md) for the general policy.
|
This document lists transient execution CVEs that have been evaluated and determined to be **out of scope** for this tool. See the [Which rules are governing the support of a CVE in this tool?](dist/FAQ.md#which-rules-are-governing-the-support-of-a-cve-in-this-tool) section in the FAQ for the general policy.
|
||||||
|
|
||||||
## CVE-2024-36348 — AMD Transient Scheduler Attack (UMIP bypass)
|
## CVE-2024-36348 — AMD Transient Scheduler Attack (UMIP bypass)
|
||||||
|
|
||||||
|
|||||||
7
dist/README.md
vendored
7
dist/README.md
vendored
@@ -167,6 +167,13 @@ On AMD Zen 3 and Zen 4 processors, the CPU's transient scheduler may speculative
|
|||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
## Unsupported CVEs
|
||||||
|
|
||||||
|
Several transient execution CVEs are not covered by this tool, for various reasons (duplicates, only
|
||||||
|
affecting non-supported hardware or OS, theoretical with no known exploitation, etc.).
|
||||||
|
The complete list along with the reason for each exclusion is available in the
|
||||||
|
[UNSUPPORTED_CVE_LIST.md](https://github.com/speed47/spectre-meltdown-checker/blob/source/UNSUPPORTED_CVE_LIST.md) file.
|
||||||
|
|
||||||
## Scope
|
## Scope
|
||||||
|
|
||||||
Supported operating systems:
|
Supported operating systems:
|
||||||
|
|||||||
Reference in New Issue
Block a user