X-Git-Url: https://gerrit.fd.io/r/gitweb?p=csit.git;a=blobdiff_plain;f=docs%2Freport%2Fintroduction%2Ftest_environment_sut_meltspec_skx.rst;h=443a7fd48476f02c9f4111675cf86fa605e0b4f8;hp=517ab3a0bc633ac75de517e87c167e5a01312ccd;hb=b659ab3d2638652de0357d29be1ec7704df97555;hpb=455dd6483d66705ce78e60ce6ee22c73db80230b diff --git a/docs/report/introduction/test_environment_sut_meltspec_skx.rst b/docs/report/introduction/test_environment_sut_meltspec_skx.rst index 517ab3a0bc..443a7fd484 100644 --- a/docs/report/introduction/test_environment_sut_meltspec_skx.rst +++ b/docs/report/introduction/test_environment_sut_meltspec_skx.rst @@ -1,5 +1,5 @@ -SPECTRE - MELTDOWN Checks - Skylake ------------------------------------ +Spectre and Meltdown Checks +~~~~~~~~~~~~~~~~~~~~~~~~~~~ Following section displays the output of a running shell script to tell if system is vulnerable against the several "speculative execution" CVEs that were @@ -123,4 +123,3 @@ made public in 2018. Script is available on `Spectre & Meltdown Checker Github Need more detailed information about mitigation options? Use --explain A false sense of security is worse than no security at all, see --disclaimer -