Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
41.0.2+build2-0ubuntu142.0+build2-0ubuntu144.0+build3-0ubuntu244.0.1+build1-0ubuntu144.0.2+build1-0ubuntu145.0+build2-0ubuntu145.0.1+build1-0ubuntu145.0.2+build1-0ubuntu146.0+build5-0ubuntu0.16.04.246.0.1+build1-0ubuntu0.16.04.2+24 more57.0.4+build1-0ubuntu0.16.04.156.0+build6-0ubuntu157.0.1+build2-0ubuntu159.0.1+build1-0ubuntu124.0+build1-0ubuntu125.0+build3-0ubuntu0.13.10.128.0+build1-0ubuntu128.0+build2-0ubuntu128.0+build2-0ubuntu228.0~b2+build1-0ubuntu229.0+build1-0ubuntu0.14.04.230.0+build1-0ubuntu0.14.04.331.0+build1-0ubuntu0.14.04.132.0+build1-0ubuntu0.14.04.1+55 more57.0.4+build1-0ubuntu0.14.04.14.13.0-16.194.13.0-17.204.13.0-25.294.13.0-32.353.11.0-12.193.12.0-1.33.12.0-2.53.12.0-2.73.12.0-3.83.12.0-3.93.12.0-4.103.12.0-4.123.12.0-5.133.12.0-7.15+126 more3.13.0-157.2075.3.0-18.195.3.0-24.265.4.0-9.126.8.0-31.314.2.0-16.194.2.0-17.214.2.0-19.234.3.0-1.104.3.0-2.114.3.0-5.164.3.0-6.174.3.0-7.184.4.0-10.254.4.0-101.124+58 more4.4.0-112.1356.5.0-9.95.13.0-19.19Exploitability
AV:LAC:HPR:LUI:NScope
S:CImpact
C:HI:NA:NCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N