{"id":"ALPINE-CVE-2017-5754","details":"Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.","modified":"2026-03-09T01:09:14.746818Z","published":"2018-01-04T13:29:00.303Z","upstream":["CVE-2017-5754"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2017-5754"}],"affected":[{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.13","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.14","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.15","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.16","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.17","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.18","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.19","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"intel-ucode","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/intel-ucode?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20190514a-r0"}]}],"versions":["20130222-r0","20170511-r0","20180108-r0","20180312-r0","20180807a-r0","20180807a-r1","20180807a-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"xen","ecosystem":"Alpine:v3.5","purl":"pkg:apk/alpine/xen?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.7.3-r4"}]}],"versions":["4.0.1-r0","4.0.1-r1","4.0.1-r2","4.0.1-r3","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.1.1-r0","4.1.1-r1","4.1.1-r2","4.1.2-r10","4.1.2-r11","4.1.2-r12","4.1.2-r3","4.1.2-r4","4.1.2-r5","4.1.2-r6","4.1.2-r7","4.1.2-r8","4.1.2-r9","4.1.3-r0","4.2.0-r0","4.2.0-r1","4.2.0-r2","4.2.0-r3","4.2.0-r4","4.2.0-r5","4.2.0-r6","4.2.0-r7","4.2.1-r0","4.2.1-r1","4.2.1-r10","4.2.1-r11","4.2.1-r2","4.2.1-r3","4.2.1-r4","4.2.1-r5","4.2.1-r6","4.2.1-r7","4.2.1-r8","4.2.1-r9","4.2.2-r0","4.2.2-r10","4.2.2-r11","4.2.2-r2","4.2.2-r3","4.2.2-r4","4.2.2-r5","4.2.2-r6","4.2.2-r7","4.2.2-r8","4.2.2-r9","4.3.0-r0","4.3.0-r1","4.3.0-r2","4.3.0-r3","4.3.0-r4","4.3.0-r5","4.3.0-r6","4.3.0-r7","4.3.0-r8","4.3.1-r0","4.3.1-r1","4.3.1-r2","4.3.1-r3","4.3.2-r0","4.3.2-r1","4.3.2-r2","4.3.2-r3","4.3.2-r4","4.3.3-r0","4.4.1-r0","4.4.1-r1","4.4.1-r2","4.4.1-r3","4.4.1-r4","4.4.1-r5","4.4.1-r6","4.4.1-r7","4.4.1-r8","4.4.2-r0","4.4.2-r1","4.5.0-r0","4.5.0-r1","4.5.1-r0","4.5.1-r1","4.5.1-r2","4.5.1-r3","4.6.0-r0","4.6.0-r1","4.6.0-r2","4.6.0-r3","4.6.0-r4","4.6.0-r5","4.6.1-r0","4.6.1-r1","4.6.1-r2","4.6.3-r0","4.6.3-r1","4.7.0-r0","4.7.0-r1","4.7.0-r2","4.7.0-r3","4.7.0-r4","4.7.0-r5","4.7.1-r0","4.7.1-r1","4.7.1-r2","4.7.1-r3","4.7.1-r4","4.7.1-r5","4.7.2-r0","4.7.2-r1","4.7.2-r2","4.7.2-r3","4.7.2-r4","4.7.3-r0","4.7.3-r1","4.7.3-r2","4.7.3-r3"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}},{"package":{"name":"xen","ecosystem":"Alpine:v3.6","purl":"pkg:apk/alpine/xen?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.8.2-r4"}]}],"versions":["4.0.1-r0","4.0.1-r1","4.0.1-r2","4.0.1-r3","4.1.0-r0","4.1.0-r1","4.1.0-r2","4.1.1-r0","4.1.1-r1","4.1.1-r2","4.1.2-r10","4.1.2-r11","4.1.2-r12","4.1.2-r3","4.1.2-r4","4.1.2-r5","4.1.2-r6","4.1.2-r7","4.1.2-r8","4.1.2-r9","4.1.3-r0","4.2.0-r0","4.2.0-r1","4.2.0-r2","4.2.0-r3","4.2.0-r4","4.2.0-r5","4.2.0-r6","4.2.0-r7","4.2.1-r0","4.2.1-r1","4.2.1-r10","4.2.1-r11","4.2.1-r2","4.2.1-r3","4.2.1-r4","4.2.1-r5","4.2.1-r6","4.2.1-r7","4.2.1-r8","4.2.1-r9","4.2.2-r0","4.2.2-r10","4.2.2-r11","4.2.2-r2","4.2.2-r3","4.2.2-r4","4.2.2-r5","4.2.2-r6","4.2.2-r7","4.2.2-r8","4.2.2-r9","4.3.0-r0","4.3.0-r1","4.3.0-r2","4.3.0-r3","4.3.0-r4","4.3.0-r5","4.3.0-r6","4.3.0-r7","4.3.0-r8","4.3.1-r0","4.3.1-r1","4.3.1-r2","4.3.1-r3","4.3.2-r0","4.3.2-r1","4.3.2-r2","4.3.2-r3","4.3.2-r4","4.3.3-r0","4.4.1-r0","4.4.1-r1","4.4.1-r2","4.4.1-r3","4.4.1-r4","4.4.1-r5","4.4.1-r6","4.4.1-r7","4.4.1-r8","4.4.2-r0","4.4.2-r1","4.5.0-r0","4.5.0-r1","4.5.1-r0","4.5.1-r1","4.5.1-r2","4.5.1-r3","4.6.0-r0","4.6.0-r1","4.6.0-r2","4.6.0-r3","4.6.0-r4","4.6.0-r5","4.6.1-r0","4.6.1-r1","4.6.1-r2","4.6.3-r0","4.6.3-r1","4.7.0-r0","4.7.0-r1","4.7.0-r2","4.7.0-r3","4.7.0-r4","4.7.0-r5","4.7.1-r0","4.7.1-r1","4.7.1-r2","4.7.1-r3","4.7.1-r4","4.7.1-r5","4.7.2-r0","4.8.1-r0","4.8.1-r1","4.8.1-r2","4.8.1-r3","4.8.1-r4","4.8.2-r0","4.8.2-r1","4.8.2-r2","4.8.2-r3"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-5754.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}