CVE-2020-13844
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/06/2020
Last modified:
28/04/2022
Description
Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:arm:cortex-a32_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arm:cortex-a32:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arm:cortex-a35_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arm:cortex-a35:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arm:cortex-a53_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arm:cortex-a53:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:arm:cortex-a34_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arm:cortex-a34:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
- https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
- https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
- https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
- https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html



