aboutsummaryrefslogtreecommitdiffstats
path: root/docs
diff options
context:
space:
mode:
Diffstat (limited to 'docs')
-rw-r--r--docs/report/introduction/test_environment_sut_meltspec_clx.rst4
-rw-r--r--docs/report/introduction/test_environment_sut_meltspec_dnv.rst2
-rw-r--r--docs/report/introduction/test_environment_sut_meltspec_hsw.rst2
-rw-r--r--docs/report/introduction/test_environment_sut_meltspec_skx.rst2
-rw-r--r--docs/report/introduction/test_environment_sut_meltspec_tsh.rst2
5 files changed, 6 insertions, 6 deletions
diff --git a/docs/report/introduction/test_environment_sut_meltspec_clx.rst b/docs/report/introduction/test_environment_sut_meltspec_clx.rst
index a715971c5b..826e6d37b4 100644
--- a/docs/report/introduction/test_environment_sut_meltspec_clx.rst
+++ b/docs/report/introduction/test_environment_sut_meltspec_clx.rst
@@ -1,5 +1,5 @@
Spectre and Meltdown Checks
-~~~~~~~~~~~~~~~~~~~~~~~~~~~
+^^^^^^^^^^^^^^^^^^^^^^^^^^^
Following section displays the output of a running shell script to tell if
system is vulnerable against the several speculative execution CVEs that were
@@ -332,4 +332,4 @@ made public in 2018. Script is available on `Spectre & Meltdown Checker Github
* iTLB Multihit mitigation enabled and active: YES (KVM: Mitigation: Split huge pages)
> STATUS: NOT VULNERABLE (this system is not running a hypervisor)
- > SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:OK CVE-2018-3639:OK CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK CVE-2018-12126:OK CVE-2018-12130:OK CVE-2018-12127:OK CVE-2019-11091:OK CVE-2019-11135:OK CVE-2018-12207:OK \ No newline at end of file
+ > SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:OK CVE-2018-3639:OK CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK CVE-2018-12126:OK CVE-2018-12130:OK CVE-2018-12127:OK CVE-2019-11091:OK CVE-2019-11135:OK CVE-2018-12207:OK
diff --git a/docs/report/introduction/test_environment_sut_meltspec_dnv.rst b/docs/report/introduction/test_environment_sut_meltspec_dnv.rst
index a83869ba03..616449efd7 100644
--- a/docs/report/introduction/test_environment_sut_meltspec_dnv.rst
+++ b/docs/report/introduction/test_environment_sut_meltspec_dnv.rst
@@ -1,5 +1,5 @@
Spectre and Meltdown Checks
-~~~~~~~~~~~~~~~~~~~~~~~~~~~
+^^^^^^^^^^^^^^^^^^^^^^^^^^^
Following section displays the output of a running shell script to tell if
system is vulnerable against the several "speculative execution" CVEs that were
diff --git a/docs/report/introduction/test_environment_sut_meltspec_hsw.rst b/docs/report/introduction/test_environment_sut_meltspec_hsw.rst
index fd66a8dfa3..092bfb3ca1 100644
--- a/docs/report/introduction/test_environment_sut_meltspec_hsw.rst
+++ b/docs/report/introduction/test_environment_sut_meltspec_hsw.rst
@@ -1,5 +1,5 @@
Spectre and Meltdown Checks
-~~~~~~~~~~~~~~~~~~~~~~~~~~~
+^^^^^^^^^^^^^^^^^^^^^^^^^^^
Following section displays the output of a running shell script to tell if
system is vulnerable against the several "speculative execution" CVEs that were
diff --git a/docs/report/introduction/test_environment_sut_meltspec_skx.rst b/docs/report/introduction/test_environment_sut_meltspec_skx.rst
index abba5804b3..e242e19b7e 100644
--- a/docs/report/introduction/test_environment_sut_meltspec_skx.rst
+++ b/docs/report/introduction/test_environment_sut_meltspec_skx.rst
@@ -1,5 +1,5 @@
Spectre and Meltdown Checks
-~~~~~~~~~~~~~~~~~~~~~~~~~~~
+^^^^^^^^^^^^^^^^^^^^^^^^^^^
Following section displays the output of a running shell script to tell if
system is vulnerable against the several "speculative execution" CVEs that were
diff --git a/docs/report/introduction/test_environment_sut_meltspec_tsh.rst b/docs/report/introduction/test_environment_sut_meltspec_tsh.rst
index 059f0f99a3..f7d385061c 100644
--- a/docs/report/introduction/test_environment_sut_meltspec_tsh.rst
+++ b/docs/report/introduction/test_environment_sut_meltspec_tsh.rst
@@ -1,5 +1,5 @@
Spectre and Meltdown Checks
-~~~~~~~~~~~~~~~~~~~~~~~~~~~
+^^^^^^^^^^^^^^^^^^^^^^^^^^^
Following section displays the output of a running shell script to tell if
system is vulnerable against the several "speculative execution" CVEs that were