Browse Source

docs(security): update security advisory for CVE-2022-23960

Update advisory document following Spectre-BHB mitigation support for
additional CPUs.

Signed-off-by: Bipin Ravi <bipin.ravi@arm.com>
Change-Id: I4492397f18882f514beff4da06afe973acecf1f0
pull/1986/head
Bipin Ravi 2 years ago
parent
commit
37200ae08b
  1. 20
      docs/security_advisories/security-advisory-tfv-9.rst

20
docs/security_advisories/security-advisory-tfv-9.rst

@ -57,20 +57,38 @@ revisions of Cortex-A73 and Cortex-A75 that implements FEAT_CSV2).
+----------------------+
| Cortex-A76 |
+----------------------+
| Cortex-A76AE |
+----------------------+
| Cortex-A77 |
+----------------------+
| Cortex-A78 |
+----------------------+
| Cortex-A78AE |
+----------------------+
| Cortex-A78C |
+----------------------+
| Cortex-X1 |
+----------------------+
| Cortex-X2 |
+----------------------+
| Cortex-A710 |
+----------------------+
| Cortex-Makalu |
+----------------------+
| Cortex-Makalu-ELP |
+----------------------+
| Cortex-Hunter |
+----------------------+
| Neoverse-N1 |
+----------------------+
| Neoverse-N2 |
+----------------------+
| Neoverse-V1 |
+----------------------+
| Neoverse-Demeter |
+----------------------+
| Neoverse-Poseidon |
+----------------------+
For all other cores impacted by Spectre-BHB, some of which that do not implement
FEAT_CSV2 and some that do e.g. Cortex-A73, the recommended mitigation is to
@ -90,7 +108,7 @@ in the `SMCCC Calling Convention specification`_. The specification and
implementation also enables the normal world to discover the presence of this
firmware service. This patch also implements ``SMCCC_ARCH_WORKAROUND_3`` for
Cortex-A57, Coxtex-A72, Cortex-A73 and Cortex-A75 using the existing workaround.
for CVE-2017-5715.
for CVE-2017-5715. Cortex-A15 patch extends Spectre V2 mitigation to Spectre-BHB.
The above workaround is enabled by default (on vulnerable CPUs only). Platforms
can choose to disable them at compile time if they do not require them.

Loading…
Cancel
Save