Hello,
Trusted Firmware-A LTS version 2.12.1 is now available. This release contains the following patches:
850389f4a chore(deps): bump micromatch [1] 11e5f92d3 build(deps): bump setuptools in the pip group across 1 directory [2] b4530565c chore(deps): bump the pip group across 2 directories with 1 update [3] 87f3125a0 chore(deps): bump jinja2 in the pip group across 1 directory [4] 65762d7b4 chore(deps): bump jinja2 [5] ea1b816b1 chore(deps): update pytest for cot-dt2c [6] d1c3a5d8b fix(build): do not force PLAT in plat_helpers.mk [7] a6f639631 fix(cpus): workaround for Cortex-X4 erratum 2923985 [8] b8e111c72 fix(cpus): workaround for CVE-2024-5660 for Cortex-X4 [9] 2898088f8 fix(cpus): workaround for CVE-2024-5660 for Neoverse-V3 [10] ef378713f fix(cpus): workaround for CVE-2024-5660 for Cortex-X3 [11] b23f5da61 fix(cpus): workaround for CVE-2024-5660 for Neoverse-V2 [12] 6041f0723 fix(cpus): workaround for CVE-2024-5660 for Cortex-A710 [13] 632422080 fix(cpus): workaround for CVE-2024-5660 for Neoverse-N2 [14] b9766da96 fix(cpus): workaround for CVE-2024-5660 for Cortex-X1 [15] eda09acd1 fix(cpus): workaround for CVE-2024-5660 for Cortex-A78 [16] 3bd6531a5 fix(cpus): workaround for CVE-2024-5660 for Cortex-A78C [17] d52c52a5f fix(cpus): workaround for CVE-2024-5660 for Cortex-A78_AE [18] 193370e1c fix(cpus): workaround for CVE-2024-5660 for Neoverse-V1 [19] 0b2d22097 fix(cpus): workaround for CVE-2024-5660 for Cortex-A77 [20] 41b64fe36 fix(cpus): workaround for CVE-2024-5660 for Cortex-X2 [21] 70a7d3f2d fix(cpus): workaround for CVE-2024-5660 for Cortex-X925 [22] 2f09b9f3c fix(security): enable WORKAROUND_CVE_2024_7881 build option [23] 41a52efd6 fix(security): add CVE-2024-7881 mitigation to Cortex-X4 [24] 3e4d94c43 fix(security): add CVE-2024-7881 mitigation to Cortex-X925 [25] 192a15244 fix(security): add CVE-2024-7881 mitigation to Neoverse-V2 [26] 427c33bc0 fix(security): add CVE-2024-7881 mitigation to Neoverse-V3 [27] 16b87247e fix(security): add CVE-2024-7881 mitigation to Cortex-X3 [28] bea64fd52 fix(security): add support in cpu_ops for CVE-2024-7881 [29] 9427c061e fix(security): apply SMCCC_ARCH_WORKAROUND_4 to affected cpus [30] 7e4bf042a chore(cpus): fix incorrect header macro [31] 9d6143ec8 fix(cpus): workaround for accessing ICH_VMCR_EL2 [32] d48268822 fix(cpus): workaround for Cortex-A710 erratum 3701772 [33] a7b322706 fix(cpus): workaround for Cortex-A715 erratum 3699560 [34] 24526273f fix(cpus): workaround for Cortex-A720 erratum 3699561 [35] ae6edfd5b fix(cpus): workaround for Cortex-A720-AE erratum 3699562 [36] 4e78288fd fix(cpus): workaround for Cortex-A725 erratum 3699564 [37] fa6c98744 fix(cpus): workaround for Cortex-X2 erratum 3701772 [38] 8299c1274 fix(cpus): workaround for Cortex-X3 erratum 3701769 [39] 6e0efc7fe fix(cpus): workaround for Cortex-X4 erratum 3701758 [40] 15300ac30 fix(cpus): workaround for Cortex-X925 erratum 3701747 [41] 7e41b706e fix(cpus): workaround for Neoverse-N2 erratum 3701773 [42] 4a9ff092c fix(cpus): workaround for Neoverse-N3 erratum 3699563 [43] 3809359e2 fix(cpus): workaround for Neoverse-V3 erratum 3701767 [44] 2ffe181a3 refactor(mbedtls): rename default mbedtls confs [45] a46d6a132 docs(prerequisites): update mbedtls to version 3.6.2 [46] 8e4bb69c7 feat(mbedtls): mbedtls config update for v3.6.2 [47] 8e4240779 feat(rd1ae): add support for OP-TEE SPMC [48] 551dc4c09 docs(rd1ae): update documentation to include BL32 [49] 34f10e7d9 feat(rd1ae): add Generic Timer in device tree [50] b19ce90a9 fix(rd1ae): fix rd1-ae device tree [51] f00f71efc docs: add inital lts doc [52] baab55315 docs: updates to LTS [53] 56472775f docs(maintainers): update LTS maintainers [54]
[1] https://review.trustedfirmware.org/q/I783a6838616c570a41a5a0f58db3e6430c43c3... [2] https://review.trustedfirmware.org/q/Ibd4e4730bfc5cce8d85ec55021983d6f748ffc... [3] https://review.trustedfirmware.org/q/I368cd2a93d5e682f6117170d8cd8c7fa696a38... [4] https://review.trustedfirmware.org/q/I4502ed17a6ce37f53ac64370a5d7fe756875fe... [5] https://review.trustedfirmware.org/q/Ib7988c4ee21d6125c073d5b27241921b53a6ca... [6] https://review.trustedfirmware.org/q/I2959da88d3d0422e15d25df5820dfd91f474d6... [7] https://review.trustedfirmware.org/q/Iadf8bc7fc831a728a9688d0afdd163c8dda737... [8] https://review.trustedfirmware.org/q/I9207802ad479919a7f77c1271019fa2479e076... [9] https://review.trustedfirmware.org/q/I378cb4978919cced03e7febc2ad431c572eac7... [10] https://review.trustedfirmware.org/q/I9ed2590bf1215bf6a692f01dfd351e469ff072... [11] https://review.trustedfirmware.org/q/Ibe90313948102ece3469f2cfe3faccc7f4beea... [12] https://review.trustedfirmware.org/q/If66687add52d16f68ce54fe5433dd3b3f067ee... [13] https://review.trustedfirmware.org/q/I10feea238600dcceaac7bb75a59db7913ca65c... [14] https://review.trustedfirmware.org/q/I2b9dea78771cc159586a03ff563c0ec79591ea... [15] https://review.trustedfirmware.org/q/I3124db3980f2786412369a010ca6abbbbaa3b6... [16] https://review.trustedfirmware.org/q/I4e40388bef814481943b2459fe35dd7267c625... [17] https://review.trustedfirmware.org/q/Ieb8d7b122320d16bf8987a43dc683ca41227be... [18] https://review.trustedfirmware.org/q/I33ac653fcb45f687fe9ace1c76a3eb20004597... [19] https://review.trustedfirmware.org/q/Ia59452ea38c66b291790956d7f2880bfcd56d4... [20] https://review.trustedfirmware.org/q/Ic71b163883ea624e9f2f77deb8b30c69612938... [21] https://review.trustedfirmware.org/q/If28804e154617a39d7d52c40b3a00a14a39df9... [22] https://review.trustedfirmware.org/q/I9d5a07ca6b89b27d8876f4349eff2af26c962d... [23] https://review.trustedfirmware.org/q/Id77f82a4dfaa4422729f7e3f2429f47cc90d97... [24] https://review.trustedfirmware.org/q/I0bec96d4f71a08a89c6612e272ecfb173f80da... [25] https://review.trustedfirmware.org/q/I53e72e4dbc8937cea3c344a5ba04664c50a079... [26] https://review.trustedfirmware.org/q/I129814eb3494b287fd76a3f7dbc50f76553b25... [27] https://review.trustedfirmware.org/q/Ib5c644895b8c76d3c7e8b5e6e98d7b9afef7f1... [28] https://review.trustedfirmware.org/q/I410517d175a80fc6f459fa6ce5c30c0a38db9e... [29] https://review.trustedfirmware.org/q/I417389f040c6ead7f96f9b720d29061833f43d... [30] https://review.trustedfirmware.org/q/I1b1ffaa1f806f07472fd79d5525f81764d99bc... [31] https://review.trustedfirmware.org/q/I6a4a8ec6546adb41e24d8885cb445fa8be8301... [32] https://review.trustedfirmware.org/q/I9f0403601c6346276e925f02eab55908b009d9... [33] https://review.trustedfirmware.org/q/I997c9cfaa75321f22b4f690c4d3f234c0b51c6... [34] https://review.trustedfirmware.org/q/I183aa921b4b6f715d64eb6b70809de2566017d... [35] https://review.trustedfirmware.org/q/I7ea3aaf3e7bf6b4f3648f6872e505a41247b14... [36] https://review.trustedfirmware.org/q/Ib830470747822cac916750c01684a65cb5efc1... [37] https://review.trustedfirmware.org/q/Ifad1f6c3f5b74060273f897eb5e4b79dd9f088... [38] https://review.trustedfirmware.org/q/I2ffc5e7d7467f1bcff8b895fea52a1daa7d144... [39] https://review.trustedfirmware.org/q/Ifd722e1bb8616ada2ad158297a7ca80b19a337... [40] https://review.trustedfirmware.org/q/I4ee941d1e7653de7a12d69f538ca05f7f9f996... [41] https://review.trustedfirmware.org/q/I080296666f89276b3260686c2bdb8de63fc174... [42] https://review.trustedfirmware.org/q/If95bd67363228c8083724b31f630636fb27f3b... [43] https://review.trustedfirmware.org/q/I77aaf8ae0afff3adde9a85f4a1a13ac9d1daf0... [44] https://review.trustedfirmware.org/q/I5be0de881f408a9e82a07b8459d79490e9065f... [45] https://review.trustedfirmware.org/q/I1f665c2471877ecc833270c511749ff845046f... [46] https://review.trustedfirmware.org/q/Ibc4a8712c92019648fe0e75390cd3540d86b73... [47] https://review.trustedfirmware.org/q/I79027f6c741ab3f419f7b555321507e6a78b97... [48] https://review.trustedfirmware.org/q/If29f56bb19fe7f370208ef5a6f60bfff4346ea... [49] https://review.trustedfirmware.org/q/I25fdc114bb71d3ad7e1bb2d845f758d6af037e... [50] https://review.trustedfirmware.org/q/I3e63a5ecfd8c6211f917ca3844b8b7bda208d8... [51] https://review.trustedfirmware.org/q/Ib0840db45d32f0c8f1eb7dc74dc7d9b4ca6de0... [52] https://review.trustedfirmware.org/q/I1434c29f0236161d2a127596e2cc528bf4cc3e... [53] https://review.trustedfirmware.org/q/Iafc606a66ea3ea69c51b433867b5025b8debeb... [54] https://review.trustedfirmware.org/q/Ibf087c6b0e24d6faa9dafb6f8a0955a47f583f...
Alternatively, Change Log is available in the documentation section: https://trustedfirmware-a.readthedocs.io/en/lts-v2.12.1/change-log.html
Thanks, TF-A LTS team
tf-a@lists.trustedfirmware.org