Skip to content

Commit 32e280c

Browse files
committed
Add table of affected implementations
1 parent 1c216ab commit 32e280c

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

README.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,24 @@ Infoleaks of potentially sensitive data from the OS, hypervisor or secure monito
1515
3) obtaining valid addresses of software running in EL1-EL3 (from the registers containing pointers to the page tables, the exception vector, etc) - potentially useful in developing or deploying exploits for other vulnerabilities in this software
1616

1717

18+
Affected implementations
19+
------------------------
20+
21+
Only showing AArch64 implementations.
22+
23+
| Core | Vulnerable according to vendor | Tested with this exploit |
24+
|--------------|----------------------------------------------------------|--------------------------|
25+
| Cortex-A35 | [no](https://developer.arm.com/support/security-update) | no |
26+
| Cortex-A53 | [no](https://developer.arm.com/support/security-update) | yes, not vulnerable |
27+
| Cortex-A57 | [yes](https://developer.arm.com/support/security-update) | yes, vulnerable |
28+
| Cortex-A72 | [yes](https://developer.arm.com/support/security-update) | yes, vulnerable |
29+
| Cortex-A73 | [no](https://developer.arm.com/support/security-update) | no |
30+
| Cortex-A75 | [no](https://developer.arm.com/support/security-update) | no |
31+
| APM X-Gene 2 | N/A | yes, not vulnerable |
32+
33+
Please open a pull request if you've tested on any other implementations.
34+
35+
1836
Running it
1937
----------
2038

0 commit comments

Comments
 (0)