[pushed] wwwdocs: gcc-11: Update arm "Straight-line Speculation vulnerability" link

Message ID 20230202215018.0691B33E77@hamza.pair.com
State Committed
Headers
Series [pushed] wwwdocs: gcc-11: Update arm "Straight-line Speculation vulnerability" link |

Commit Message

Gerald Pfeifer Feb. 2, 2023, 9:50 p.m. UTC
  Pushed.

Gerald
---
 htdocs/gcc-11/changes.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
  

Patch

diff --git a/htdocs/gcc-11/changes.html b/htdocs/gcc-11/changes.html
index 4787fc26..cc0fdc19 100644
--- a/htdocs/gcc-11/changes.html
+++ b/htdocs/gcc-11/changes.html
@@ -807,7 +807,7 @@  You may also want to check out our
   <li>The AArch64 Armv8-R architecture is now supported through the
   <code>-march=armv8-r</code> option.</li>
   <li>Mitigation against the
-  <a href="https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation">Straight-line Speculation vulnerability</a>
+  <a href="https://developer.arm.com/documentation/102587/0102/Straight-line-speculation-frequently-asked-questions">Straight-line Speculation vulnerability</a>
   is supported with the <code>-mharden-sls=</code> option.  Please refer to the
   documentation for usage instructions.</li>
   <li>The availability of Advanced SIMD intrinsics available through the