ARM Cortex-A77

CPE Details

ARM Cortex-A77
-
2021-06-24
15h35 +00:00
2021-06-30
11h29 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*

Informations

Vendor

arm

Product

cortex-a77

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-34320 2023-12-08
20h54 +00:00
Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412 where software, under certain circumstances, could deadlock a core due to the execution of either a load to device or non-cacheable memory, and either a store exclusive or register read of the Physical Address Register (PAR_EL1) in close proximity.
5.5
Medium
CVE-2022-48251 2023-01-09
23h00 +00:00
The AES instructions on the ARMv8 platform do not have an algorithm that is "intrinsically resistant" to side-channel attacks. NOTE: the vendor reportedly offers the position "while power side channel attacks ... are possible, they are not directly caused by or related to the Arm architecture."
7.5
High
CVE-2022-23960 2022-03-12
22h57 +00:00
Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow the attacker to obtain sensitive information.
5.6
Medium
CVE-2022-25368 2022-03-09
17h17 +00:00
Spectre BHB is a variant of Spectre-v2 in which malicious code uses the shared branch history (stored in the CPU BHB) to influence mispredicted branches in the victim's hardware context. Speculation caused by these mispredicted branches can then potentially be used to cause cache allocation, which can then be used to infer information that should be protected.
4.7
Medium
CVE-2017-5753 2018-01-04
13h00 +00:00
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
5.6
Medium