Unrated severityNVD Advisory· Published Jun 8, 2020· Updated Aug 4, 2024
CVE-2020-13844
CVE-2020-13844
Description
Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
Affected products
68- Arm/Armv8-A core implementationsdescription
- osv-coords67 versionspkg:rpm/opensuse/cross-nvptx-gcc10&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/cross-nvptx-gcc10&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/gcc10&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/gcc10&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/gcc10&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/gcc7&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/gcc7&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/gcc7&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/nvptx-tools&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/nvptx-tools&distro=openSUSE%20Leap%2015.2pkg:rpm/suse/cross-nvptx-gcc10&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/cross-nvptx-gcc10&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/cross-nvptx-gcc10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/cross-nvptx-gcc10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/cross-nvptx-gcc10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Toolchain%2012pkg:rpm/suse/cross-nvptx-gcc10&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/cross-nvptx-gcc10&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/cross-nvptx-gcc7&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/cross-nvptx-gcc7&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/cross-nvptx-gcc7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/cross-nvptx-gcc7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/cross-nvptx-gcc7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Toolchain%2012pkg:rpm/suse/cross-nvptx-gcc7&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/cross-nvptx-gcc7&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/gcc10&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/gcc10&distro=SUSE%20Enterprise%20Storage%205pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Toolchain%2012pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/gcc10&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/gcc10&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/gcc10&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/gcc10&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/gcc10&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/gcc10&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Toolchain%2012pkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/nvptx-tools&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/nvptx-tools&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/nvptx-tools&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/nvptx-tools&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/nvptx-tools&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/nvptx-tools&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015
< 10.2.1+git583-lp151.2.1+ 66 more
- (no CPE)range: < 10.2.1+git583-lp151.2.1
- (no CPE)range: < 10.2.1+git583-lp152.2.1
- (no CPE)range: < 10.2.1+git583-lp151.2.2
- (no CPE)range: < 10.2.1+git583-lp152.2.2
- (no CPE)range: < 10.3.1+git1893-2.8
- (no CPE)range: < 7.5.0+r278197-lp151.2.15.1
- (no CPE)range: < 7.5.0+r278197-lp152.3.3.1
- (no CPE)range: < 7.5.0+r278197-10.1
- (no CPE)range: < 1.0-lp151.3.3.2
- (no CPE)range: < 1.0-lp152.4.3.2
- (no CPE)range: < 10.2.1+git583-1.3.2
- (no CPE)range: < 10.2.1+git583-1.3.2
- (no CPE)range: < 10.2.1+git583-1.3.2
- (no CPE)range: < 10.2.1+git583-1.3.2
- (no CPE)range: < 10.2.1+git583-1.3.1
- (no CPE)range: < 10.2.1+git583-1.3.2
- (no CPE)range: < 10.2.1+git583-1.3.2
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-13.1
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.4
- (no CPE)range: < 10.2.1+git583-1.3.4
- (no CPE)range: < 10.2.1+git583-1.3.4
- (no CPE)range: < 10.2.1+git583-1.3.4
- (no CPE)range: < 10.2.1+git583-1.3.4
- (no CPE)range: < 10.2.1+git583-1.3.4
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.4
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.4
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 10.2.1+git583-1.3.5
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-13.1
- (no CPE)range: < 7.5.0+r278197-13.1
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 7.5.0+r278197-13.1
- (no CPE)range: < 7.5.0+r278197-4.19.2
- (no CPE)range: < 1.0-4.3.2
- (no CPE)range: < 1.0-4.3.2
- (no CPE)range: < 1.0-4.3.2
- (no CPE)range: < 1.0-4.3.2
- (no CPE)range: < 1.0-4.3.2
- (no CPE)range: < 1.0-4.3.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.llvm.org/pipermail/llvm-dev/2020-June/142109.htmlmitrex_refsource_CONFIRM
- developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilitymitrex_refsource_CONFIRM
- developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculationmitrex_refsource_MISC
- developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questionsmitrex_refsource_CONFIRM
- gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.htmlmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.