CVE-2020-13844

Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
References
Link Resource
http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html Mailing List Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Vendor Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation Vendor Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions Vendor Advisory
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html Patch Third Party Advisory
http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html Mailing List Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Vendor Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation Vendor Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions Vendor Advisory
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:arm:cortex-a32_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a32:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:arm:cortex-a35_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a35:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:arm:cortex-a53_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a53:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:arm:cortex-a34_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a34:-:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html - Mailing List, Third Party Advisory () http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html - Mailing List, Third Party Advisory
References () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Vendor Advisory () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Vendor Advisory
References () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation - Vendor Advisory () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation - Vendor Advisory
References () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions - Vendor Advisory () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions - Vendor Advisory
References () https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html - Patch, Third Party Advisory () https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html - Patch, Third Party Advisory

Information

Published : 2020-06-08 23:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13844

Mitre link : CVE-2020-13844

CVE.ORG link : CVE-2020-13844


JSON object : View

Products Affected

arm

  • cortex-a35
  • cortex-a35_firmware
  • cortex-a57_firmware
  • cortex-a57
  • cortex-a34_firmware
  • cortex-a73_firmware
  • cortex-a72_firmware
  • cortex-a34
  • cortex-a32
  • cortex-a53_firmware
  • cortex-a73
  • cortex-a53
  • cortex-a32_firmware
  • cortex-a72

opensuse

  • leap
CWE
CWE-203

Observable Discrepancy