<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ARM security Vulnerability .... in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/ARM-security-Vulnerability/m-p/778172#M120873</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;you are asking in a very general way, and in regards to ARM´s statements about vulnerabilities, you indeed need to monitor the information they are releasing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using a NXP processor, currently the following statement is relevant for you and the next steps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NXP advises customers to write an email to the NXP Product Security Incident Response Team at psirt[@]nxp.com. It is required that you indicate the specific part and operating system that your question refers to in order to be able providing support in the best way.&lt;BR /&gt;For end users using NXP processors but not buying semiconductors from NXP directly or through distributors, we have to refer to the original equipment manufacturer (OEM) as any security analysis needs to be done on a system level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Have a great day,&lt;/P&gt;&lt;P&gt;Toni&lt;BR /&gt;TIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;Note: If this post answers your question, please click the Correct Answer button. Thank you!&lt;BR /&gt;-----------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Jan 2018 10:05:05 GMT</pubDate>
    <dc:creator>ToniZollikofer</dc:creator>
    <dc:date>2018-01-12T10:05:05Z</dc:date>
    <item>
      <title>ARM security Vulnerability ....</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/ARM-security-Vulnerability/m-p/778171#M120872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do we have any solution or work around for the below issue.&lt;BR /&gt; ARM security Vulnerability ....&lt;BR /&gt; &lt;STRONG&gt;&lt;A class="" href="https://developer.arm.com/support/security-update"&gt;https://developer.arm.com/support/security-update&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;Best Regards&lt;/P&gt;&lt;P&gt;Nagamahesh Gamidi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jan 2018 16:34:46 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/ARM-security-Vulnerability/m-p/778171#M120872</guid>
      <dc:creator>nagamaheshg</dc:creator>
      <dc:date>2018-01-10T16:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: ARM security Vulnerability ....</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/ARM-security-Vulnerability/m-p/778172#M120873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;you are asking in a very general way, and in regards to ARM´s statements about vulnerabilities, you indeed need to monitor the information they are releasing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using a NXP processor, currently the following statement is relevant for you and the next steps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NXP advises customers to write an email to the NXP Product Security Incident Response Team at psirt[@]nxp.com. It is required that you indicate the specific part and operating system that your question refers to in order to be able providing support in the best way.&lt;BR /&gt;For end users using NXP processors but not buying semiconductors from NXP directly or through distributors, we have to refer to the original equipment manufacturer (OEM) as any security analysis needs to be done on a system level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Have a great day,&lt;/P&gt;&lt;P&gt;Toni&lt;BR /&gt;TIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;Note: If this post answers your question, please click the Correct Answer button. Thank you!&lt;BR /&gt;-----------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jan 2018 10:05:05 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/ARM-security-Vulnerability/m-p/778172#M120873</guid>
      <dc:creator>ToniZollikofer</dc:creator>
      <dc:date>2018-01-12T10:05:05Z</dc:date>
    </item>
  </channel>
</rss>

