The support status of 32-bit guests doesn't seem particularly useful.
Signed-off-by: George Dunlap <george.dunlap@citrix.com>
---
NB this patch should be considered a proposal to the community, as a
follow-on to XSA-370. As mentioned in the advisory, we will wait
until 25 May for comments before checking it in.
---
SUPPORT.md | 9 +--------
1 file changed, 1 insertion(+), 8 deletions(-)
diff --git a/SUPPORT.md b/SUPPORT.md
index d0d4fc6f4f..a29680e04c 100644
--- a/SUPPORT.md
+++ b/SUPPORT.md
@@ -86,14 +86,7 @@ No hardware requirements
Status, x86_64: Supported
Status, x86_32, shim: Supported
- Status, x86_32, without shim: Supported, with caveats
-
-Due to architectural limitations,
-32-bit PV guests must be assumed to be able to read arbitrary host memory
-using speculative execution attacks.
-Advisories will continue to be issued
-for new vulnerabilities related to un-shimmed 32-bit PV guests
-enabling denial-of-service attacks or privilege escalation attacks.
+ Status, x86_32, without shim: Supported, not security supported
### x86/HVM
--
2.30.2