{"id":"CVE-2020-13844","details":"Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka \"straight-line speculation.\"","aliases":["A-216607118","PUB-A-216607118"],"modified":"2026-03-14T14:44:03.159186Z","published":"2020-06-08T23:15:10.047Z","related":["SUSE-SU-2020:2947-1","SUSE-SU-2020:3263-1","SUSE-SU-2020:3749-1","SUSE-SU-2023:3662-1","openSUSE-SU-2020:1692-1","openSUSE-SU-2020:1693-1","openSUSE-SU-2020:2300-1","openSUSE-SU-2020:2301-1","openSUSE-SU-2024:10702-1","openSUSE-SU-2024:10703-1"],"references":[{"type":"ADVISORY","url":"http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html"},{"type":"ADVISORY","url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"},{"type":"ADVISORY","url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation"},{"type":"ADVISORY","url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions"},{"type":"FIX","url":"https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13844.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}