A new novel spectulative side channel vulnerability that affects ARM processors code named "Straight line speculation" has been discovered. Some versions of the ARM processors may speculative execute instructions after a branch in control flow (such as RET, BR, BLR assembly instructions). If the codepath contains a "Speculative Revelation" style gadget which can affect internal core cache states which lead to the ability to infer cache contents similar to previous spectre attacks through analysing instruction execution time.
External References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844 http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1848390]
This is an ARM specific flaw, which means only affects RHEL-8 and kernel-alt only.
Mitigation: Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.