Added |
CVSS V3.1 |
|
NIST AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
|
Added |
CVSS V2 |
|
NIST (AV:L/AC:M/Au:N/C:P/I:N/A:N)
|
Added |
CWE |
|
NIST NVD-CWE-noinfo
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a65_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a65:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a65ae_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a65ae:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a710_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a710:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a76ae_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a76ae:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:cortex-x2_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-x2:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:neoverse-e1_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:neoverse-e1:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:neoverse-v1_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:neoverse-v1:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a65:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a65ae:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a710:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a76ae:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-x2:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:neoverse-e1:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:neoverse-v1:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*
|
Changed |
Reference Type |
http://www.openwall.com/lists/oss-security/2022/03/18/2 No Types Assigned
|
http://www.openwall.com/lists/oss-security/2022/03/18/2 Mailing List, Patch, Third Party Advisory
|
Changed |
Reference Type |
https://developer.arm.com/support/arm-security-updates No Types Assigned
|
https://developer.arm.com/support/arm-security-updates Vendor Advisory
|
Changed |
Reference Type |
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability No Types Assigned
|
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Mitigation, Patch, Vendor Advisory
|