mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-16 01:24:27 +00:00
docs(security): update security advisory for CVE-2022-23960
Update advisory document following Spectre-BHB mitigation support for additional CPUs. Signed-off-by: Bipin Ravi <bipin.ravi@arm.com> Change-Id: I4492397f18882f514beff4da06afe973acecf1f0
This commit is contained in:
parent
100da90ca8
commit
37200ae08b
1 changed files with 19 additions and 1 deletions
|
@ -57,20 +57,38 @@ revisions of Cortex-A73 and Cortex-A75 that implements FEAT_CSV2).
|
|||
+----------------------+
|
||||
| Cortex-A76 |
|
||||
+----------------------+
|
||||
| Cortex-A76AE |
|
||||
+----------------------+
|
||||
| Cortex-A77 |
|
||||
+----------------------+
|
||||
| Cortex-A78 |
|
||||
+----------------------+
|
||||
| Cortex-A78AE |
|
||||
+----------------------+
|
||||
| Cortex-A78C |
|
||||
+----------------------+
|
||||
| Cortex-X1 |
|
||||
+----------------------+
|
||||
| Cortex-X2 |
|
||||
+----------------------+
|
||||
| Cortex-A710 |
|
||||
+----------------------+
|
||||
| Cortex-Makalu |
|
||||
+----------------------+
|
||||
| Cortex-Makalu-ELP |
|
||||
+----------------------+
|
||||
| Cortex-Hunter |
|
||||
+----------------------+
|
||||
| Neoverse-N1 |
|
||||
+----------------------+
|
||||
| Neoverse-N2 |
|
||||
+----------------------+
|
||||
| Neoverse-V1 |
|
||||
+----------------------+
|
||||
| Neoverse-Demeter |
|
||||
+----------------------+
|
||||
| Neoverse-Poseidon |
|
||||
+----------------------+
|
||||
|
||||
For all other cores impacted by Spectre-BHB, some of which that do not implement
|
||||
FEAT_CSV2 and some that do e.g. Cortex-A73, the recommended mitigation is to
|
||||
|
@ -90,7 +108,7 @@ in the `SMCCC Calling Convention specification`_. The specification and
|
|||
implementation also enables the normal world to discover the presence of this
|
||||
firmware service. This patch also implements ``SMCCC_ARCH_WORKAROUND_3`` for
|
||||
Cortex-A57, Coxtex-A72, Cortex-A73 and Cortex-A75 using the existing workaround.
|
||||
for CVE-2017-5715.
|
||||
for CVE-2017-5715. Cortex-A15 patch extends Spectre V2 mitigation to Spectre-BHB.
|
||||
|
||||
The above workaround is enabled by default (on vulnerable CPUs only). Platforms
|
||||
can choose to disable them at compile time if they do not require them.
|
||||
|
|
Loading…
Add table
Reference in a new issue