Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
1.20130906.1ubuntu21.20130906.1ubuntu32.20140122.12.20140430.1ubuntu12.20140624-t-1ubuntu23.20180108.0+really20170707ubuntu14.04.13.20180108.0~ubuntu14.04.23.20180312.0~ubuntu14.04.13.20180425.1~ubuntu0.14.04.13.20180425.1~ubuntu0.14.04.23.20180807a.0ubuntu0.14.04.13.20150121.13.20151106.13.20170707.1~ubuntu16.04.03.20180108.0+really20170707ubuntu16.04.13.20180108.0~ubuntu16.04.23.20180312.0~ubuntu16.04.13.20180425.1~ubuntu0.16.04.13.20180425.1~ubuntu0.16.04.23.20180807a.0ubuntu0.16.04.13.20170707.13.20171117.13.20180108.13.20180108.1+really20171117.13.20180312.0~ubuntu18.04.13.20180425.1~ubuntu0.18.04.13.20180425.1~ubuntu0.18.04.23.20180807a.0ubuntu0.18.04.1Exploitability
AV:LAC:HPR:LUI:NScope
S:CImpact
C:HI:NA:NCVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N