Treat "spectre/meltdown" as one vuln, and stay away from parsing which
CVE is which.
The advisory is that the kernel must be updated, which CVEs are fixed
(or not) are not really the issue.
This advisory covers the following 3 CVEs, Variant 1 and 3 are currently
resolved.
Variant 1: bounds check bypass (CVE-2017-5753)
Variant 2: branch target injection (CVE-2017-5715)
Variant 3: rogue data cache load (CVE-2017-5754)