2.1 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
0.001 Low
EPSS
Percentile
20.0%
Arm Armv8-A core implementations utilizing speculative execution past
unconditional changes in control flow may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis, aka “straight-line speculation.”
Author | Note |
---|---|
sbeattie | gcc-3.3 only provides libstdc++5 |
mdeslaur | Fixing this in stable release would likely require rebuilding the whole archive using the fixed compiler. Deferring CVE for now until further information is available. |
sbeattie | fixed upstream in 10.3.0 and 9.4.0 |
rodrigo-zaiden | backport to older versions of llvm-toolchain is risky and is likely to introduce regressions. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | gcc-10 | < 10.2.0-5ubuntu1~20.04 | UNKNOWN |
ubuntu | 18.04 | noarch | gcc-3.3 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | gcc-3.3 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | gcc-3.3 | < any | UNKNOWN |
ubuntu | 23.10 | noarch | gcc-3.3 | < any | UNKNOWN |
ubuntu | 24.04 | noarch | gcc-3.3 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | gcc-3.3 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | gcc-4.7 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | gcc-4.7-armel-cross | < any | UNKNOWN |
ubuntu | 16.04 | noarch | gcc-4.7-armhf-cross | < any | UNKNOWN |
lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
launchpad.net/bugs/cve/CVE-2020-13844
nvd.nist.gov/vuln/detail/CVE-2020-13844
security-tracker.debian.org/tracker/CVE-2020-13844
www.cve.org/CVERecord?id=CVE-2020-13844
2.1 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
0.001 Low
EPSS
Percentile
20.0%