Security Advisory
● The vulnerability identified by Google’s Safeside project is based on the same root cause as found in the January 2018 disclosure from Marvell (then Cavium) of “Spectre v2”(CVE-2017-5715). At that time, Marvell (Cavium) in collaboration with Arm and industry partners worked to make software (firmware and OS) mitigations available and ThunderX® customers were informed of their options. At the time the software mitigations were released,validation was incomplete since the developers did not have an attack example they could validate against. Google’s recent researchhas exposed that the software mitigation had shortcomings. Updated versions of the software mitigation patch are available and any customers that need it should reach out to Marvell.
|
|
|
|
Development Environment(Software/Firmware) |
|
|
|
Please see the document for details |
|
|
|
|
|
|
|
English Chinese Chinese and English Japanese |
|
January 2018 |
|
|
|
|
|
77 KB |
- +1 Like
- Add to Favorites
Recommend
All reproduced articles on this site are for the purpose of conveying more information and clearly indicate the source. If media or individuals who do not want to be reproduced can contact us, which will be deleted.