First published: Mon Jun 08 2020(Updated: )
Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Arm Cortex-a32 Firmware | ||
Arm Cortex-a32 | ||
Arm Cortex-a35 Firmware | ||
Arm Cortex-a35 | ||
Arm Cortex-a53 Firmware | ||
Arm Cortex-a53 | ||
Arm Cortex-a57 Firmware | ||
Arm Cortex-a57 | ||
Arm Cortex-a72 Firmware | ||
Arm Cortex-a72 | ||
Arm Cortex-a73 Firmware | ||
Arm Cortex-a73 | ||
Arm Cortex-a34 Firmware | ||
Arm Cortex-a34 | ||
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13844 refers to Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
The Arm Cortex-a32 Firmware, Arm Cortex-a35 Firmware, Arm Cortex-a53 Firmware, Arm Cortex-a57 Firmware, Arm Cortex-a72 Firmware, Arm Cortex-a73 Firmware, Arm Cortex-a34, openSUSE Leap 15.1, and openSUSE Leap 15.2 are affected by CVE-2020-13844.
The severity of CVE-2020-13844 is medium with a CVSS score of 5.5.
You can find more information about CVE-2020-13844 at the following references: [http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html](http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html), [http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html), [http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html).
CVE-2020-13844 is associated with CWE-203.