Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
57.0.4+build1-0ubuntu0.14.04.13.13.0-139.1884.4.0-1009.94.4.0-108.131~14.04.157.0.4+build1-0ubuntu0.16.04.14.4.0-108.1314.4.0-1047.564.13.0-1005.74.4.0-9021.224.13.0-1006.9Exploitability
AV:LAC:HPR:LUI:NScope
S:CImpact
C:HI:NA:NCVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N