5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.1 Medium
AI Score
Confidence
High
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
60.4%
Jann Horn and Ken Johnson discovered that microprocessors utilizing
speculative execution of a memory read may allow unauthorized memory
reads via a sidechannel attack. This flaw is known as Spectre
Variant 4. A local attacker could use this to expose sensitive
information, including kernel memory.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1008-gcp | < 4.15.0-1008.8 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-gcp-headers-4.15.0-1008 | < 4.15.0-1008.8 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-gcp-tools-4.15.0-1008 | < 4.15.0-1008.8 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-gcp-tools-4.15.0-1008-dbgsym | < 4.15.0-1008.8 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-headers-4.15.0-1008-gcp | < 4.15.0-1008.8 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1008-gcp-dbgsym | < 4.15.0-1008.8 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-modules-4.15.0-1008-gcp | < 4.15.0-1008.8 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-modules-extra-4.15.0-1008-gcp | < 4.15.0-1008.8 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-tools-4.15.0-1008-gcp | < 4.15.0-1008.8 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1009-aws | < 4.15.0-1009.9 | UNKNOWN |
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.1 Medium
AI Score
Confidence
High
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
60.4%