Commit 07d4efea authored by Thomas Gleixner's avatar Thomas Gleixner Committed by Stefan Bader

Documentation/l1tf: Remove Yonah processors from not vulnerable list

Dave reported, that it's not confirmed that Yonah processors are
unaffected. Remove them from the list.
Reported-by: default avatarave Hansen <dave.hansen@intel.com>
Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>

CVE-2018-3620
CVE-2018-3646

[smb: Adjusted document path]
Signed-off-by: default avatarStefan Bader <stefan.bader@canonical.com>
parent 3e50244e
......@@ -19,8 +19,6 @@ vulnerability is not present on:
- A range of Intel ATOM processors (Cedarview, Cloverview, Lincroft,
Penwell, Pineview, Silvermont, Airmont, Merrifield)
- The Intel Core Duo Yonah variants (2006 - 2008)
- The Intel XEON PHI family
- Intel processors which have the ARCH_CAP_RDCL_NO bit set in the
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment