Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
|
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html - Mailing List, Third Party Advisory | |
References | () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Vendor Advisory | |
References | () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation - Vendor Advisory | |
References | () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions - Vendor Advisory | |
References | () https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html - Patch, Third Party Advisory |
Information
Published : 2020-06-08 23:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13844
Mitre link : CVE-2020-13844
CVE.ORG link : CVE-2020-13844
JSON object : View
Products Affected
arm
- cortex-a35
- cortex-a35_firmware
- cortex-a57_firmware
- cortex-a57
- cortex-a34_firmware
- cortex-a73_firmware
- cortex-a72_firmware
- cortex-a34
- cortex-a32
- cortex-a53_firmware
- cortex-a73
- cortex-a53
- cortex-a32_firmware
- cortex-a72
opensuse
- leap
CWE
CWE-203
Observable Discrepancy