Lines Matching refs:_
8 | CVE ID | `CVE-2017-5753`_ / `CVE-2017-5715`_ / `CVE-2017-5754`_ / |
9 | | `CVE-2018-3640`_ / `CVE-2018-3639`_ / `CVE-2022-23960`_ |
22 | Fix Version | `Pull Request #1214`_, `Pull Request #1228`_, |
23 | | `Pull Request #1240`_ and `Pull Request #1405`_ |
30 `Google Project Zero`_. To understand the background and wider impact of these
32 Update`_.
34 Variant 1 (`CVE-2017-5753`_)
40 Variant 2 (`CVE-2017-5715`_)
66 `Pull Request #1240`_ and `Pull Request #1405`_ optimise the earlier fixes by
67 implementing a specified `CVE-2017-5715`_ workaround SMC
71 mitigation specification`_. The specification and implementation also enable
106 compile time if they do not require them. `Pull Request #1240`_ disables the
121 Payload, ``SP_MIN`` is provided in `Pull Request #1228`_.
123 Refer to `Arm CPU Security Bulletin-Spectre/Meltdown`_ for list of impacted CPUs.
127 Variant 3 (`CVE-2017-5754`_)
137 Refer to `Arm CPU Security Bulletin-Spectre/Meltdown`_ for list of impacted CPUs.
139 Variant 3a (`CVE-2018-3640`_)
143 Variant 4 (`CVE-2018-3639`_)
147 Spectre-BHB (`CVE-2022-23960`_)