| c64e6591 | 05-Dec-2025 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
docs(security): update CVE-2024-7881 affected CPU revisions
This patch updates the affected versions for the following CPUs - Cortex-X3 [1], Cortex-X4 [2], Cortex-X925 [3], Neoverse-V2 [4], Neoverse
docs(security): update CVE-2024-7881 affected CPU revisions
This patch updates the affected versions for the following CPUs - Cortex-X3 [1], Cortex-X4 [2], Cortex-X925 [3], Neoverse-V2 [4], Neoverse-V3 [5] and Neoverse-V3AE [6]. Errata IDs for reference in the respective SDENs
Cortex-X3 - 3692984 Cortex-X4 - 3692983 Cortex-X925 - 3692980 Neoverse-V2 - 3696445 Neoverse-V3/V3AE - 3696307
[1] https://developer.arm.com/documentation/SDEN-2055130/latest/ [2] https://developer.arm.com/documentation/SDEN-2432808/latest [3] https://developer.arm.com/documentation/109180/latest/ [4] https://developer.arm.com/documentation/SDEN-2332927/latest [5] https://developer.arm.com/documentation/SDEN-2891958/latest/ [6] https://developer.arm.com/documentation/SDEN-2615521/latest/
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: Iad109561a144169fd3805c179a4f8e3bfdd59a65
show more ...
|
| a2e22acf | 27-Oct-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): remove CVE_2022_23960 Neoverse V3
Neoverse V3 has ECBHB implemented and is protected against X-Context attacks.
Ref: https://developer.arm.com/documentation/110280/latest/ TRM: https
fix(security): remove CVE_2022_23960 Neoverse V3
Neoverse V3 has ECBHB implemented and is protected against X-Context attacks.
Ref: https://developer.arm.com/documentation/110280/latest/ TRM: https://developer.arm.com/documentation/107734/0002/The-Neoverse--V3--core/Supported-standards-and-specifications?lang=en
Remove WORKAROUND_CVE_2022_23960 to avoid accidental enabling of this workaround and using loop workaround.
This was accidentally added with commit@c2a15217c3053117f4d39233002cb1830fa96670
Change-Id: I13b27c04c3da5ec80fa79422b4ef4fee64738caa Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|