From 32e280cfe08983bf5ffc64321eea936aa5ac6edb Mon Sep 17 00:00:00 2001 From: Cosmin Gorgovan Date: Sun, 7 Jan 2018 16:18:29 +0000 Subject: [PATCH] Add table of affected implementations --- README.md | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/README.md b/README.md index d04bbc1..7817fcf 100644 --- a/README.md +++ b/README.md @@ -15,6 +15,24 @@ Infoleaks of potentially sensitive data from the OS, hypervisor or secure monito 3) obtaining valid addresses of software running in EL1-EL3 (from the registers containing pointers to the page tables, the exception vector, etc) - potentially useful in developing or deploying exploits for other vulnerabilities in this software +Affected implementations +------------------------ + +Only showing AArch64 implementations. + +| Core | Vulnerable according to vendor | Tested with this exploit | +|--------------|----------------------------------------------------------|--------------------------| +| Cortex-A35 | [no](https://developer.arm.com/support/security-update) | no | +| Cortex-A53 | [no](https://developer.arm.com/support/security-update) | yes, not vulnerable | +| Cortex-A57 | [yes](https://developer.arm.com/support/security-update) | yes, vulnerable | +| Cortex-A72 | [yes](https://developer.arm.com/support/security-update) | yes, vulnerable | +| Cortex-A73 | [no](https://developer.arm.com/support/security-update) | no | +| Cortex-A75 | [no](https://developer.arm.com/support/security-update) | no | +| APM X-Gene 2 | N/A | yes, not vulnerable | + +Please open a pull request if you've tested on any other implementations. + + Running it ----------