It was discovered that speculative execution performed by modern CPUs could leak information through a timing side-channel attack, and that this could be exploited in web browser JavaScript engines. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information from other domains, bypassing same-origin restrictions. (CVE-2017-5753, CVE-2017-5715)
{ "availability": "No subscription required", "binaries": [ { "libwebkit2gtk-4.0-37-gtk2-dbgsym": "2.18.5-0ubuntu0.16.04.1", "gir1.2-webkit2-4.0": "2.18.5-0ubuntu0.16.04.1", "libwebkit2gtk-4.0-dev": "2.18.5-0ubuntu0.16.04.1", "libjavascriptcoregtk-4.0-18-dbgsym": "2.18.5-0ubuntu0.16.04.1", "libjavascriptcoregtk-4.0-dev": "2.18.5-0ubuntu0.16.04.1", "gir1.2-javascriptcoregtk-4.0": "2.18.5-0ubuntu0.16.04.1", "libwebkit2gtk-4.0-37-gtk2": "2.18.5-0ubuntu0.16.04.1", "libjavascriptcoregtk-4.0-18": "2.18.5-0ubuntu0.16.04.1", "libjavascriptcoregtk-4.0-bin-dbgsym": "2.18.5-0ubuntu0.16.04.1", "libwebkit2gtk-4.0-doc": "2.18.5-0ubuntu0.16.04.1", "libwebkit2gtk-4.0-37": "2.18.5-0ubuntu0.16.04.1", "libwebkit2gtk-4.0-37-dbgsym": "2.18.5-0ubuntu0.16.04.1", "libjavascriptcoregtk-4.0-bin": "2.18.5-0ubuntu0.16.04.1" } ] }