mirror of
https://github.com/linuxkit/linuxkit.git
synced 2025-07-19 09:16:29 +00:00
doc: Remove security notice from README
We had the relevant fixes in all kernels for quite some time, so no need to call it out explicitly at the top level. Signed-off-by: Rolf Neugebauer <rolf.neugebauer@gmail.com>
This commit is contained in:
parent
28cd642798
commit
641603957b
19
README.md
19
README.md
@ -2,25 +2,6 @@
|
||||
|
||||
[](https://circleci.com/gh/linuxkit/linuxkit)
|
||||
|
||||
**Security Update 17/01/2018: All current LinuxKit `x86_64` kernels
|
||||
have KPTI/KAISER enabled by default. This protects against
|
||||
[Meltdown](https://meltdownattack.com/meltdown.pdf). Defences against
|
||||
[Spectre](https://spectreattack.com/spectre.pdf) are work in progress
|
||||
upstream and some have been incorporated into 4.14.14/4.9.77 onwards
|
||||
but work is still ongoing. The kernels 4.14.14/4.9.77 onwards also
|
||||
include various eBPF and KVM fixes to mitigate some aspects of
|
||||
Spectre. The `arm64` kernels are not yet fixed. See [Greg KH's
|
||||
excellent
|
||||
blogpost](http://kroah.com/log/blog/2018/01/06/meltdown-status/) and
|
||||
this [LWN.net
|
||||
article](https://lwn.net/SubscriberLink/744287/1fc3c18173f732e7/) for
|
||||
details.**
|
||||
|
||||
**If you run LinuxKit kernels on x86 baremetal we also strongly
|
||||
recommend to add `ucode: intel-ucode.cpio` to the kernel section of
|
||||
your YAML if you are using Intel CPUs and `linuxkit/firmware:<hash>` if
|
||||
you are using AMD CPUs.**
|
||||
|
||||
LinuxKit, a toolkit for building custom minimal, immutable Linux distributions.
|
||||
|
||||
- Secure defaults without compromising usability
|
||||
|
Loading…
Reference in New Issue
Block a user