{ "schema_version": "1.4.0", "id": "GHSA-jwjh-w2wp-2gvv", "modified": "2022-05-24T17:19:36Z", "published": "2022-05-24T17:19:36Z", "aliases": [ "CVE-2020-13844" ], "details": "Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka \"straight-line speculation.\"", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13844" }, { "type": "WEB", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "type": "WEB", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation" }, { "type": "WEB", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions" }, { "type": "WEB", "url": "https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html" }, { "type": "WEB", "url": "http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" } ], "database_specific": { "cwe_ids": [ "CWE-200", "CWE-203" ], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-06-08T23:15:00Z" } }