Skip to content

Commit 3e67047

Browse files
PandiPanda69speed47
authored andcommitted
feat(inception): README
1 parent ecee757 commit 3e67047

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

README.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ CVE
2121
[CVE-2018-12207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207) | Machine Check Exception on Page Size Changes | MCEPSC, No eXcuses, iTLB Multihit
2222
[CVE-2020-0543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543) | Special Register Buffer Data Sampling | SRBDS
2323
[CVE-2022-40982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982) | Gather Data Sampling | GDS, Downfall
24+
[CVE-2023-20569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569) | Return Address Security | Inception, RAS, SRSO
2425
[CVE-2023-20593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593) | Cross-Process Information Leak | Zenbleed
2526

2627
Supported operating systems:
@@ -187,6 +188,12 @@ docker run --rm --privileged -v /boot:/boot:ro -v /dev/cpu:/dev/cpu:ro -v /lib/m
187188
- Mitigation: either microcode update or disabling AVX feature
188189
- Performance impact of the mitigation: TBD
189190

191+
**CVE-2023-20569** Return Address Security (Inception)
192+
193+
- Impact: Kernel & all software
194+
- Mitigation: updated kernel & microcode
195+
- Performance impact of the mitigation: low to significant depending on the mitigation
196+
190197
**CVE-2023-20593** Cross-Process Information Leak (Zenbleed)
191198

192199
- Impact: Kernel & all software

0 commit comments

Comments
 (0)