Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| arm | cortex-a32_firmware | - | - |
| arm | cortex-a35_firmware | - | - |
| arm | cortex-a53_firmware | - |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
9
Affected Products
14
References
arm / cortex-a32_firmware
| - |
| arm | cortex-a57_firmware | - | - |
| arm | cortex-a72_firmware | - | - |
| arm | cortex-a73_firmware | - | - |
| arm | cortex-a34_firmware | - | - |
| opensuse | leap | - | - |
| opensuse | leap | - | - |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Exploitability
Impact