Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
3.20160316.33.20171205.13.20180524.1~ubuntu0.18.04.11.20120910-32.20131007.1+really20130710.13.20180524.1~ubuntu0.14.04.12.20141028.12.20160316.13.20180524.1~ubuntu0.16.04.124.0+build1-0ubuntu125.0+build3-0ubuntu0.13.10.128.0+build1-0ubuntu128.0+build2-0ubuntu128.0+build2-0ubuntu228.0~b2+build1-0ubuntu229.0+build1-0ubuntu0.14.04.230.0+build1-0ubuntu0.14.04.331.0+build1-0ubuntu0.14.04.132.0+build1-0ubuntu0.14.04.1+55 more57.0.4+build1-0ubuntu0.14.04.156.0+build6-0ubuntu157.0.1+build2-0ubuntu159.0.1+build1-0ubuntu141.0.2+build2-0ubuntu142.0+build2-0ubuntu144.0+build3-0ubuntu244.0.1+build1-0ubuntu144.0.2+build1-0ubuntu145.0+build2-0ubuntu145.0.1+build1-0ubuntu145.0.2+build1-0ubuntu146.0+build5-0ubuntu0.16.04.246.0.1+build1-0ubuntu0.16.04.2+24 more57.0.4+build1-0ubuntu0.16.04.11.20130906.1ubuntu21.20130906.1ubuntu32.20140122.12.20140430.1ubuntu12.20140624-t-1ubuntu23.20180108.0+really20170707ubuntu14.04.13.20180108.0~ubuntu14.04.23.20180312.0~ubuntu14.04.13.20170707.13.20171117.13.20180108.13.20150121.13.20151106.13.20170707.1~ubuntu16.04.03.20180108.0+really20170707ubuntu16.04.13.20180108.0~ubuntu16.04.23.20180312.0~ubuntu16.04.11.2.16-2ubuntu111.2.16-2ubuntu121.2.16-2ubuntu131.2.16-2ubuntu141.2.21-2ubuntu11.2.21-2ubuntu101.2.21-2ubuntu31.2.21-2ubuntu41.2.21-2ubuntu51.2.21-2ubuntu7+22 more1.3.1-1ubuntu10.17Exploitability
AV:LAC:HPR:LUI:NScope
S:CImpact
C:HI:NA:NCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N