ID

VAR-201805-0963


CVE

CVE-2018-3639


TITLE

CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks

Trust: 0.8

sources: CERT/CC: VU#180049

DESCRIPTION

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is firmware that runs in the central processor for managing and controlling the CPU. Multiple CPUHardware information disclosure vulnerabilities. The vulnerability is caused by a race condition in the CPU cache processing. Local attackers can exploit vulnerabilities to obtain sensitive information through side channel analysis. AMD, ARM, and Intel CPUs are all CPU (central processing unit) products from different manufacturers. AMD, ARM, and Intel CPUs have security vulnerabilities. Relevant releases/architectures: RHV-M 4.2 - noarch 3. Description: The org.ovirt.engine-root is a core component of oVirt. 7) - x86_64 3. Description: Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Once all virtual machines have shut down, start them again for this update to take effect. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:1854-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1854 Issue date: 2018-06-19 CVE Names: CVE-2012-6701 CVE-2015-8830 CVE-2016-8650 CVE-2017-2671 CVE-2017-6001 CVE-2017-7308 CVE-2017-7616 CVE-2017-7889 CVE-2017-8890 CVE-2017-9075 CVE-2017-9076 CVE-2017-9077 CVE-2017-12190 CVE-2017-15121 CVE-2017-18203 CVE-2018-1130 CVE-2018-3639 CVE-2018-5803 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC) * kernel: net/packet: overflow in check for priv area size (CVE-2017-7308) * kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access (CVE-2012-6701) * kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830) * kernel: Null pointer dereference via keyctl (CVE-2016-8650) * kernel: ping socket / AF_LLC connect() sin_family race (CVE-2017-2671) * kernel: Race condition between multiple sys_perf_event_open() calls (CVE-2017-6001) * kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c (CVE-2017-7616) * kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism (CVE-2017-7889) * kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c (CVE-2017-8890) * kernel: net: sctp_v6_create_accept_sk function mishandles inheritance (CVE-2017-9075) * kernel: net: IPv6 DCCP implementation mishandles inheritance (CVE-2017-9076) * kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance (CVE-2017-9077) * kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190) * kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121) * kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203) * kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash (CVE-2018-1130) * kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service (CVE-2018-5803) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat). Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.10 Release Notes and Red Hat Enterprise Linux 6.10 Technical Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 869942 - Kernel crashes on reading an ACL containing 190 ACEs over NFSv4 1314275 - CVE-2015-8830 kernel: AIO write triggers integer overflow in some protocols 1314288 - CVE-2012-6701 kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access 1395187 - CVE-2016-8650 kernel: Null pointer dereference via keyctl 1422825 - CVE-2017-6001 kernel: Race condition between multiple sys_perf_event_open() calls 1436649 - CVE-2017-2671 kernel: ping socket / AF_LLC connect() sin_family race 1437404 - CVE-2017-7308 kernel: net/packet: overflow in check for priv area size 1441088 - CVE-2017-7616 kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c 1444493 - CVE-2017-7889 kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism 1448170 - RHEL6.9: sunrpc reconnect logic now may trigger a SYN storm when a TCP connection drops and a burst of RPC commands hit the transport 1450972 - CVE-2017-8890 kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c 1452688 - CVE-2017-9076 kernel: net: IPv6 DCCP implementation mishandles inheritance 1452691 - CVE-2017-9075 kernel: net: sctp_v6_create_accept_sk function mishandles inheritance 1452744 - CVE-2017-9077 kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance 1495089 - CVE-2017-12190 kernel: memory leak when merging buffers in SCSI IO vectors 1497152 - systool causes panic on 2.6.32-696.6.3.el6.x86_64 using be2iscsi 1520893 - CVE-2017-15121 kernel: vfs: BUG in truncate_inode_pages_range() and fuse client 1550811 - CVE-2017-18203 kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service 1551051 - CVE-2018-5803 kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service 1560494 - i686: Using invpcid_flush_all_nonglobals() can cause user-space panic on .i686 1566890 - CVE-2018-3639 hw: cpu: speculative store bypass 1576419 - CVE-2018-1130 kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: kernel-2.6.32-754.el6.src.rpm i386: kernel-2.6.32-754.el6.i686.rpm kernel-debug-2.6.32-754.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.el6.i686.rpm kernel-debug-devel-2.6.32-754.el6.i686.rpm kernel-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.el6.i686.rpm kernel-devel-2.6.32-754.el6.i686.rpm kernel-headers-2.6.32-754.el6.i686.rpm perf-2.6.32-754.el6.i686.rpm perf-debuginfo-2.6.32-754.el6.i686.rpm python-perf-debuginfo-2.6.32-754.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-754.el6.noarch.rpm kernel-doc-2.6.32-754.el6.noarch.rpm kernel-firmware-2.6.32-754.el6.noarch.rpm x86_64: kernel-2.6.32-754.el6.x86_64.rpm kernel-debug-2.6.32-754.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.el6.i686.rpm kernel-debug-devel-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.el6.x86_64.rpm kernel-devel-2.6.32-754.el6.x86_64.rpm kernel-headers-2.6.32-754.el6.x86_64.rpm perf-2.6.32-754.el6.x86_64.rpm perf-debuginfo-2.6.32-754.el6.i686.rpm perf-debuginfo-2.6.32-754.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.el6.i686.rpm python-perf-debuginfo-2.6.32-754.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.el6.i686.rpm perf-debuginfo-2.6.32-754.el6.i686.rpm python-perf-2.6.32-754.el6.i686.rpm python-perf-debuginfo-2.6.32-754.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.el6.x86_64.rpm perf-debuginfo-2.6.32-754.el6.x86_64.rpm python-perf-2.6.32-754.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: kernel-2.6.32-754.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-754.el6.noarch.rpm kernel-doc-2.6.32-754.el6.noarch.rpm kernel-firmware-2.6.32-754.el6.noarch.rpm x86_64: kernel-2.6.32-754.el6.x86_64.rpm kernel-debug-2.6.32-754.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.el6.i686.rpm kernel-debug-devel-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.el6.x86_64.rpm kernel-devel-2.6.32-754.el6.x86_64.rpm kernel-headers-2.6.32-754.el6.x86_64.rpm perf-2.6.32-754.el6.x86_64.rpm perf-debuginfo-2.6.32-754.el6.i686.rpm perf-debuginfo-2.6.32-754.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.el6.i686.rpm python-perf-debuginfo-2.6.32-754.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: kernel-debug-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.el6.x86_64.rpm perf-debuginfo-2.6.32-754.el6.x86_64.rpm python-perf-2.6.32-754.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: kernel-2.6.32-754.el6.src.rpm i386: kernel-2.6.32-754.el6.i686.rpm kernel-debug-2.6.32-754.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.el6.i686.rpm kernel-debug-devel-2.6.32-754.el6.i686.rpm kernel-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.el6.i686.rpm kernel-devel-2.6.32-754.el6.i686.rpm kernel-headers-2.6.32-754.el6.i686.rpm perf-2.6.32-754.el6.i686.rpm perf-debuginfo-2.6.32-754.el6.i686.rpm python-perf-debuginfo-2.6.32-754.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-754.el6.noarch.rpm kernel-doc-2.6.32-754.el6.noarch.rpm kernel-firmware-2.6.32-754.el6.noarch.rpm ppc64: kernel-2.6.32-754.el6.ppc64.rpm kernel-bootwrapper-2.6.32-754.el6.ppc64.rpm kernel-debug-2.6.32-754.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-754.el6.ppc64.rpm kernel-debug-devel-2.6.32-754.el6.ppc64.rpm kernel-debuginfo-2.6.32-754.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-754.el6.ppc64.rpm kernel-devel-2.6.32-754.el6.ppc64.rpm kernel-headers-2.6.32-754.el6.ppc64.rpm perf-2.6.32-754.el6.ppc64.rpm perf-debuginfo-2.6.32-754.el6.ppc64.rpm python-perf-debuginfo-2.6.32-754.el6.ppc64.rpm s390x: kernel-2.6.32-754.el6.s390x.rpm kernel-debug-2.6.32-754.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-754.el6.s390x.rpm kernel-debug-devel-2.6.32-754.el6.s390x.rpm kernel-debuginfo-2.6.32-754.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-754.el6.s390x.rpm kernel-devel-2.6.32-754.el6.s390x.rpm kernel-headers-2.6.32-754.el6.s390x.rpm kernel-kdump-2.6.32-754.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-754.el6.s390x.rpm kernel-kdump-devel-2.6.32-754.el6.s390x.rpm perf-2.6.32-754.el6.s390x.rpm perf-debuginfo-2.6.32-754.el6.s390x.rpm python-perf-debuginfo-2.6.32-754.el6.s390x.rpm x86_64: kernel-2.6.32-754.el6.x86_64.rpm kernel-debug-2.6.32-754.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.el6.i686.rpm kernel-debug-devel-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.el6.x86_64.rpm kernel-devel-2.6.32-754.el6.x86_64.rpm kernel-headers-2.6.32-754.el6.x86_64.rpm perf-2.6.32-754.el6.x86_64.rpm perf-debuginfo-2.6.32-754.el6.i686.rpm perf-debuginfo-2.6.32-754.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.el6.i686.rpm python-perf-debuginfo-2.6.32-754.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.el6.i686.rpm perf-debuginfo-2.6.32-754.el6.i686.rpm python-perf-2.6.32-754.el6.i686.rpm python-perf-debuginfo-2.6.32-754.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-754.el6.ppc64.rpm kernel-debuginfo-2.6.32-754.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-754.el6.ppc64.rpm perf-debuginfo-2.6.32-754.el6.ppc64.rpm python-perf-2.6.32-754.el6.ppc64.rpm python-perf-debuginfo-2.6.32-754.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-754.el6.s390x.rpm kernel-debuginfo-2.6.32-754.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-754.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-754.el6.s390x.rpm perf-debuginfo-2.6.32-754.el6.s390x.rpm python-perf-2.6.32-754.el6.s390x.rpm python-perf-debuginfo-2.6.32-754.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.el6.x86_64.rpm perf-debuginfo-2.6.32-754.el6.x86_64.rpm python-perf-2.6.32-754.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: kernel-2.6.32-754.el6.src.rpm i386: kernel-2.6.32-754.el6.i686.rpm kernel-debug-2.6.32-754.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.el6.i686.rpm kernel-debug-devel-2.6.32-754.el6.i686.rpm kernel-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.el6.i686.rpm kernel-devel-2.6.32-754.el6.i686.rpm kernel-headers-2.6.32-754.el6.i686.rpm perf-2.6.32-754.el6.i686.rpm perf-debuginfo-2.6.32-754.el6.i686.rpm python-perf-debuginfo-2.6.32-754.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-754.el6.noarch.rpm kernel-doc-2.6.32-754.el6.noarch.rpm kernel-firmware-2.6.32-754.el6.noarch.rpm x86_64: kernel-2.6.32-754.el6.x86_64.rpm kernel-debug-2.6.32-754.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.el6.i686.rpm kernel-debug-devel-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.el6.x86_64.rpm kernel-devel-2.6.32-754.el6.x86_64.rpm kernel-headers-2.6.32-754.el6.x86_64.rpm perf-2.6.32-754.el6.x86_64.rpm perf-debuginfo-2.6.32-754.el6.i686.rpm perf-debuginfo-2.6.32-754.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.el6.i686.rpm python-perf-debuginfo-2.6.32-754.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-2.6.32-754.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.el6.i686.rpm perf-debuginfo-2.6.32-754.el6.i686.rpm python-perf-2.6.32-754.el6.i686.rpm python-perf-debuginfo-2.6.32-754.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.el6.x86_64.rpm perf-debuginfo-2.6.32-754.el6.x86_64.rpm python-perf-2.6.32-754.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2012-6701 https://access.redhat.com/security/cve/CVE-2015-8830 https://access.redhat.com/security/cve/CVE-2016-8650 https://access.redhat.com/security/cve/CVE-2017-2671 https://access.redhat.com/security/cve/CVE-2017-6001 https://access.redhat.com/security/cve/CVE-2017-7308 https://access.redhat.com/security/cve/CVE-2017-7616 https://access.redhat.com/security/cve/CVE-2017-7889 https://access.redhat.com/security/cve/CVE-2017-8890 https://access.redhat.com/security/cve/CVE-2017-9075 https://access.redhat.com/security/cve/CVE-2017-9076 https://access.redhat.com/security/cve/CVE-2017-9077 https://access.redhat.com/security/cve/CVE-2017-12190 https://access.redhat.com/security/cve/CVE-2017-15121 https://access.redhat.com/security/cve/CVE-2017-18203 https://access.redhat.com/security/cve/CVE-2018-1130 https://access.redhat.com/security/cve/CVE-2018-3639 https://access.redhat.com/security/cve/CVE-2018-5803 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/ssbd https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/6/html/6.10_release_notes/index.html https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/6/html/6.10_technical_notes/index.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBWyiNN9zjgjWX9erEAQgn7g/8DeDvxkh3SCpVN2ma5SLYXBnG5pss2Qp7 P5a5zLae8g0OjnZMg2LoCC+Qk0Fe4mpXKB3Wu4yZmRNs7Y5WRWa4imP7ZYvLiSKa KMXLcJhZBMN16ICFw2YX9rN3+wnRC94XY9cW5x0x2uJXoBOMb0MvccLE9z5DIZ7s KI03p2JEHLMt60oZVK6Vdcs+RbfoKLgh3Z2C2ryybjl3LGO+YcqCLvDgsvXnOJl8 TBZRBBd/X6V3xld3x0N3qgPOc4uRXQuqH/QmELZAhcc0MdyhTDQV6JZsYBMV2w5n T0lo71xuPJxLZvMt8UXkQwsCWIuFMQk8uyV6mV+peXxUS0y2LUY2uwWs1AXWOUxx FfYm0jAsZW8kTLZfag9w2zWREib8bs0sx44Etz0HBs+dMHLZc7j6PvTk3zyFijSC qqk+AFGnvM76cQmP8m/SxzEr0YV5FH1wp0eJ/mdn4tl42OBu7Zu7joTI04n6DFsg 1tP5a+46eb8bFLI3FjvoN/Z3Qyaln27tVhFpTY88f3lonDDlFo8BkWNG038JxGRk R6Wjln6724pFfBT9vj+/RQFpSptFKXL3h4Fd/x+XNTFbx1dqpnVaVsstRDxOaqPO ugnRxLgzybXC1UQO0ExMu85jUM3QYLKFSv/G1dHhSsbfbOfnfbPaazpoAvClfWw5 FIbNr61v/A8= =BnkQ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2018-10-30-9 Additional information for APPLE-SA-2018-9-24-1 macOS Mojave 10.14 macOS Mojave 10.14 addresses the following: Bluetooth Available for: iMac (21.5-inch, Late 2012), iMac (27-inch, Late 2012) , iMac (21.5-inch, Late 2013), iMac (21.5-inch, Mid 2014), iMac (Retina 5K, 27-inch, Late 2014), iMac (21.5-inch, Late 2015), Mac mini (Mid 2011), Mac mini Server (Mid 2011), Mac mini (Late 2012) , Mac mini Server (Late 2012), Mac mini (Late 2014), Mac Pro (Late 2013), MacBook Air (11-inch, Mid 2011), MacBook Air (13-inch, Mid 2011), MacBook Air (11-inch, Mid 2012), MacBook Air (13-inch, Mid 2012), MacBook Air (11-inch, Mid 2013), MacBook Air (13-inch, Mid 2013), MacBook Air (11-inch, Early 2015), MacBook Air (13-inch, Early 2015), MacBook Pro (13-inch, Mid 2012), MacBook Pro (15-inch, Mid 2012), MacBook Pro (Retina, 13-inch, Early 2013), MacBook Pro (Retina, 15-inch, Early 2013), MacBook Pro (Retina, 13-inch, Late 2013), and MacBook Pro (Retina, 15-inch, Late 2013) Impact: An attacker in a privileged network position may be able to intercept Bluetooth traffic Description: An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. CVE-2018-5383: Lior Neumann and Eli Biham The updates below are available for these Mac models: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013, Mid 2010, and Mid 2012 models with recommended Metal-capable graphics processor, including MSI Gaming Radeon RX 560 and Sapphire Radeon PULSE RX 580) afpserver Impact: A remote attacker may be able to attack AFP servers through HTTP clients Description: An input validation issue was addressed with improved input validation. CVE-2018-4295: Jianjun Chen (@whucjj) from Tsinghua University and UC Berkeley Entry added October 30, 2018 App Store Impact: A malicious application may be able to determine the Apple ID of the owner of the computer Description: A permissions issue existed in the handling of the Apple ID. This issue was addressed with improved access controls. CVE-2018-4324: Sergii Kryvoblotskyi of MacPaw Inc. AppleGraphicsControl Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4417: Lee of the Information Security Lab Yonsei University working with Trend Micro's Zero Day Initiative Entry added October 30, 2018 Application Firewall Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A configuration issue was addressed with additional restrictions. CVE-2018-4353: Abhinav Bansal of LinkedIn Inc. APR Impact: Multiple buffer overflow issues existed in Perl Description: Multiple issues in Perl were addressed with improved memory handling. CVE-2017-12613: Craig Young of Tripwire VERT CVE-2017-12618: Craig Young of Tripwire VERT Entry added October 30, 2018 ATS Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend Micro's Zero Day Initiative Entry added October 30, 2018 ATS Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4308: Mohamed Ghannam (@_simo36) Entry added October 30, 2018 Auto Unlock Impact: A malicious application may be able to access local users AppleIDs Description: A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. CVE-2018-4321: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc. CFNetwork Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018 CoreFoundation Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4412: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018 CoreFoundation Impact: An application may be able to gain elevated privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4414: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018 CoreText Impact: Processing a maliciously crafted text file may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2018-4347: an anonymous researcher Entry added October 30, 2018 Crash Reporter Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4333: Brandon Azad CUPS Impact: In certain configurations, a remote attacker may be able to replace the message content from the print server with arbitrary content Description: An injection issue was addressed with improved validation. CVE-2018-4153: Michael Hanselmann of hansmi.ch Entry added October 30, 2018 CUPS Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A denial of service issue was addressed with improved validation. CVE-2018-4406: Michael Hanselmann of hansmi.ch Entry added October 30, 2018 Dictionary Impact: Parsing a maliciously crafted dictionary file may lead to disclosure of user information Description: A validation issue existed which allowed local file access. This was addressed with input sanitization. CVE-2018-4346: Wojciech ReguAa (@_r3ggi) of SecuRing Entry added October 30, 2018 Grand Central Dispatch Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4426: Brandon Azad Entry added October 30, 2018 Heimdal Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-3646: Baris Kasikci, Daniel Genkin, Ofir Weisse, and Thomas F. Wenisch of University of Michigan, Mark Silberstein and Marina Minkin of Technion, Raoul Strackx, Jo Van Bulck, and Frank Piessens of KU Leuven, Rodrigo Branco, Henrique Kawakami, Ke Sun, and Kekai Hu of Intel Corporation, Yuval Yarom of The University of Adelaide Entry added October 30, 2018 iBooks Impact: Parsing a maliciously crafted iBooks file may lead to disclosure of user information Description: A configuration issue was addressed with additional restrictions. CVE-2018-4355: evi1m0 of bilibili security team Entry added October 30, 2018 Intel Graphics Driver Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4396: Yu Wang of Didi Research America CVE-2018-4418: Yu Wang of Didi Research America Entry added October 30, 2018 Intel Graphics Driver Impact: An application may be able to read restricted memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2018-4351: Appology Team @ Theori working with Trend Micro's Zero Day Initiative Entry added October 30, 2018 Intel Graphics Driver Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4350: Yu Wang of Didi Research America Entry added October 30, 2018 Intel Graphics Driver Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4334: Ian Beer of Google Project Zero Entry added October 30, 2018 IOHIDFamily Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation CVE-2018-4408: Ian Beer of Google Project Zero Entry added October 30, 2018 IOKit Impact: A malicious application may be able to break out of its sandbox Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4341: Ian Beer of Google Project Zero CVE-2018-4354: Ian Beer of Google Project Zero Entry added October 30, 2018 IOKit Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2018-4383: Apple Entry added October 30, 2018 IOUserEthernet Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4401: Apple Entry added October 30, 2018 Kernel Impact: A malicious application may be able to leak sensitive user information Description: An access issue existed with privileged API calls. This issue was addressed with additional restrictions. CVE-2018-4399: Fabiano Anemone (@anoane) Entry added October 30, 2018 Kernel Impact: An attacker in a privileged network position may be able to execute arbitrary code Description: A memory corruption issue was addressed with improved validation. CVE-2018-4407: Kevin Backhouse of Semmle Ltd. Entry added October 30, 2018 Kernel Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4336: Brandon Azad CVE-2018-4337: Ian Beer of Google Project Zero CVE-2018-4340: Mohamed Ghannam (@_simo36) CVE-2018-4344: The UK's National Cyber Security Centre (NCSC) CVE-2018-4425: cc working with Trend Micro's Zero Day Initiative, Juwei Lin (@panicaII) of Trend Micro working with Trend Micro's Zero Day Initiative Entry added October 30, 2018 LibreSSL Impact: Multiple issues in libressl were addressed in this update Description: Multiple issues were addressed by updating to libressl version 2.6.4. CVE-2015-3194 CVE-2015-5333 CVE-2015-5334 CVE-2016-702 Entry added October 30, 2018 Login Window Impact: A local user may be able to cause a denial of service Description: A validation issue was addressed with improved logic. CVE-2018-4348: Ken Gannon of MWR InfoSecurity and Christian Demko of MWR InfoSecurity Entry added October 30, 2018 mDNSOffloadUserClient Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4326: an anonymous researcher working with Trend Micro's Zero Day Initiative, Zhuo Liang of Qihoo 360 Nirvan Team Entry added October 30, 2018 MediaRemote Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with additional sandbox restrictions. This ensures that older data read from recently-written-to addresses cannot be read via a speculative side-channel. CVE-2018-3639: Jann Horn (@tehjh) of Google Project Zero (GPZ), Ken Johnson of the Microsoft Security Response Center (MSRC) Entry added October 30, 2018 Security Impact: A local user may be able to cause a denial of service Description: This issue was addressed with improved checks. CVE-2018-4395: Patrick Wardle of Digita Security Entry added October 30, 2018 Security Impact: An attacker may be able to exploit weaknesses in the RC4 cryptographic algorithm Description: This issue was addressed by removing RC4. CVE-2016-1777: Pepi Zawodsky Spotlight Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4393: Lufeng Li Entry added October 30, 2018 Symptom Framework Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4203: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018 Text Impact: Processing a maliciously crafted text file may lead to a denial of service Description: A denial of service issue was addressed with improved validation. CVE-2018-4304: jianan.huang (@Sevck) Entry added October 30, 2018 Wi-Fi Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4338: Lee @ SECLAB, Yonsei University working with Trend Micro's Zero Day Initiative Entry added October 30, 2018 Additional recognition Accessibility Framework We would like to acknowledge Ryan Govostes for their assistance. Core Data We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance. CoreDAV We would like to acknowledge an anonymous researcher for their assistance. CoreGraphics We would like to acknowledge Nitin Arya of Roblox Corporation for their assistance. CoreSymbolication We would like to acknowledge Brandon Azad for their assistance. IOUSBHostFamily We would like to acknowledge an anonymous researcher for their assistance. Kernel We would like to acknowledge Brandon Azad for their assistance. Mail We would like to acknowledge Alessandro Avagliano of Rocket Internet SE, John Whitehead of The New York Times, Kelvin Delbarre of Omicron Software Systems, and Zbyszek A>>A3Akiewski for their assistance. Quick Look We would like to acknowledge Wojciech ReguAa (@_r3ggi) of SecuRing and Patrick Wardle of Digita Security and lokihardt of Google Project Zero for their assistance. Security We would like to acknowledge Christoph Sinai, Daniel Dudek (@dannysapples) of The Irish Times and Filip KlubiAka (@lemoncloak) of ADAPT Centre, Dublin Institute of Technology, Istvan Csanady of Shapr3D, Omar Barkawi of ITG Software, Inc., Phil Caleno, Wilson Ding, and an anonymous researcher for their assistance. SQLite We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance. Terminal We would like to acknowledge an anonymous researcher for their assistance. WindowServer We would like to acknowledge Patrick Wardle of Digita Security for their assistance. Installation note: macOS Mojave 10.14 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlvYkgYpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3GrtxAA iVBcAdusz88zFzkT05EIxb9nSp4CGOlhKlChK4N7Db17o2fNT0hNpQixEAC0wC/A zqIzsXEzZlPobI4OnwiEVs7lVBsvCW+IarrRZ8pgSllKs1VlbNfOO3z9vB5BqJMr d9PjPvtHyG3jZmWqQPIjvJb3l3ZjHAt+HAvTItNMkhIUjqV80JI8wP3erzIf3tAt VoLIw5iL5w4HAYcWsn9DYcecXZdv39MnKL5UGzMX3bkee2U7kGYtgskU+mdPa1Wl WzquIPlLeKL2KNSXEfbkPtcKM/fvkURsNzEDvg+PBQLdI3JeR1bOeN24aiTEtiEL TecGm/kKMMJWmDdhPhFvZVD+SIdZd4LgbTawR1UE1JJg7jnEZKCvZ45mXd2eBwn/ rpEKCLBsgA59GILs3ZjZSIWskRJPzZrt463AKcN2wukkTUUkY1rhRVdOf6LZMs9Z w9iJOua3vt+HzCCxTEaH53WUeM6fn/Yeq+DGIS5Fk0G09pU7tsyJVwj3o1nJn0dl e2mcrXBJeSmi6bvvkJX45y/Y8E8Qr+ovS4uN8wG6DOWcCBQkDkugabng8vNh8GST 1wNnV9JY/CmYbU0ZIwKbbSDkcQLQuIl7kKaZMHnU74EytcKscUqqx1VqINz1tssu 1wZZGLtg3VubrZOsnUZzumD+0nI8c6QAnQK3P2PSZ0k= =i9YR -----END PGP SIGNATURE----- . Description: The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fix(es): * Previously, using device passthrough for a SCSI-2 device failed and returned an "Illegal Request" error. With this update, the QEMU emulator checks the SCSI version of the device when performing passthrough. As a result, the described problem no longer occurs. (BZ#1571370) * Under certain circumstances, resuming a paused guest generated redundant "VIR_DOMAIN_PAUSED_UNKNOWN" error messages in the libvirt log. This update corrects the event sending order when resuming guests, which prevents the errors being logged. (BZ#1588001) 4. (CVE-2018-3639) Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system might be required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact. In this update, mitigation for PowerPC architecture is provided. Bug Fix(es): These updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3449601 4. Description: The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. (CVE-2018-3639) Note: This is the OpenJDK side of the CVE-2018-3639 mitigation. Bugs fixed (https://bugzilla.redhat.com/): 1566890 - CVE-2018-3639 hw: cpu: speculative store bypass 6

Trust: 3.51

sources: NVD: CVE-2018-3639 // CERT/CC: VU#180049 // CNVD: CNVD-2018-13391 // VULHUB: VHN-133670 // PACKETSTORM: 147739 // PACKETSTORM: 147759 // PACKETSTORM: 147930 // PACKETSTORM: 148244 // PACKETSTORM: 147769 // PACKETSTORM: 150116 // PACKETSTORM: 150075 // PACKETSTORM: 147749 // PACKETSTORM: 148330 // PACKETSTORM: 147938 // PACKETSTORM: 150079 // PACKETSTORM: 150073 // PACKETSTORM: 147779 // PACKETSTORM: 151288

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-13391

AFFECTED PRODUCTS

vendor:intelmodel:atom cscope:eqversion:c3808

Trust: 1.6

vendor:intelmodel:atom cscope:eqversion:c3508

Trust: 1.6

vendor:intelmodel:atom cscope:eqversion:c3538

Trust: 1.6

vendor:intelmodel:atom cscope:eqversion:c3558

Trust: 1.6

vendor:intelmodel:atom cscope:eqversion:c3708

Trust: 1.6

vendor:intelmodel:atom cscope:eqversion:c3750

Trust: 1.6

vendor:intelmodel:atom cscope:eqversion:c3758

Trust: 1.6

vendor:intelmodel:atom cscope:eqversion:c2308

Trust: 1.6

vendor:intelmodel:atom cscope:eqversion:c3308

Trust: 1.6

vendor:intelmodel:atom cscope:eqversion:c3338

Trust: 1.6

vendor:intelmodel:xeon e5 2650l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610_v4

Trust: 1.0

vendor:intelmodel:xeon e3 1240l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4627_v4

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4660_v3

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:6.6

Trust: 1.0

vendor:intelmodel:xeon e5 2430lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8860_v3

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3736g

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8893_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4860_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:45nm

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3775

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1809

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86130t

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3850

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86126t

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1545m_v5

Trust: 1.0

vendor:intelmodel:xeon e5 2637scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4807

Trust: 1.0

vendor:armmodel:cortex-ascope:eqversion:15

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3480

Trust: 1.0

vendor:siemensmodel:simatic ipc827dscope:ltversion:19.02.11

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3745

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3580

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:x3480

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870_v3

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e5504

Trust: 1.0

vendor:intelmodel:xeon e3 1278l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830

Trust: 1.0

vendor:siemensmodel:simatic ipc427escope:ltversion:21.01.09

Trust: 1.0

vendor:microsoftmodel:windows 7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880l_v2

Trust: 1.0

vendor:nvidiamodel:jetson tx2scope:ltversion:r28.3

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160

Trust: 1.0

vendor:intelmodel:xeon e3 1265l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2430 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4109t

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4667_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8860_v4

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8891_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2603 v4scope:eqversion: -

Trust: 1.0

vendor:armmodel:cortex-ascope:eqversion:57

Trust: 1.0

vendor:intelmodel:xeon e5 2620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e5507

Trust: 1.0

vendor:intelmodel:xeon e3 1281 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660

Trust: 1.0

vendor:intelmodel:xeon e5 2450l v2scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8893_v2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:17.10

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735d

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8867l

Trust: 1.0

vendor:intelmodel:xeon e5 2630 v3scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows server 2012scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8180

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2650l_v4

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690_v2

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:intelmodel:xeon e5 2648lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850_v3

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j3455

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:w5580

Trust: 1.0

vendor:mitelmodel:mivoice border gatewayscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86134m

Trust: 1.0

vendor:microsoftmodel:surfacescope:eqversion: -

Trust: 1.0

vendor:mitelmodel:mivoic mx-onescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2438l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2480

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86144

Trust: 1.0

vendor:intelmodel:xeon e5 2470 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x5-e3930scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547escope:ltversion:r1.30.0

Trust: 1.0

vendor:microsoftmodel:windows server 2016scope:eqversion:1803

Trust: 1.0

vendor:intelmodel:xeon e5 2407 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2450 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2609 v4scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:microsoftmodel:windows server 2008scope:eqversion:sp2

Trust: 1.0

vendor:intelmodel:xeon e5 2609 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650_v3

Trust: 1.0

vendor:siemensmodel:simatic ipc647cscope:ltversion:15.01.14

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690_v3

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:l5508_

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1515m_v5

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86126

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86132

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640

Trust: 1.0

vendor:intelmodel:xeon e3 1245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2418l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2643 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86142m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660_v2

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1535m_v5

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w_v2

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:85120

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:3600

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86134

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:85120t

Trust: 1.0

vendor:intelmodel:pentium silverscope:eqversion:n5000

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3785

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:x5550

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4114

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3827

Trust: 1.0

vendor:siemensmodel:simatic ipc827cscope:ltversion:15.02.15

Trust: 1.0

vendor:intelmodel:xeon e5 1428lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2670_v3

Trust: 1.0

vendor:intelmodel:xeon e5 2430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870_v2

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4890_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2428lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2640 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667

Trust: 1.0

vendor:intelmodel:xeon e5 2618l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2643 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4603_v2

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j4105

Trust: 1.0

vendor:siemensmodel:simatic ipc427dscope:ltversion:17.0x.14

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.7

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4880_v2

Trust: 1.0

vendor:siemensmodel:itc1500 proscope:ltversion:3.1

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8176f

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1565l_v5

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4648_v3

Trust: 1.0

vendor:intelmodel:xeon e5 1660 v4scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:ruggedcom apescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8857_v2

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8837

Trust: 1.0

vendor:intelmodel:xeon e5 2620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1505l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4628l_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2618l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:85115

Trust: 1.0

vendor:oraclemodel:solarisscope:eqversion:11

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4603

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2665

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:32nm

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w_v4

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2630 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830_v4

Trust: 1.0

vendor:intelmodel:xeon e3 1265l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650_v2

Trust: 1.0

vendor:intelmodel:pentium silverscope:eqversion:j5005

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3570

Trust: 1.0

vendor:intelmodel:xeon e5 1680 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3560

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2850

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.2

Trust: 1.0

vendor:sonicwallmodel:sonicosvscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8890_v2

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e5520

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160f

Trust: 1.0

vendor:sonicwallmodel:email securityscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8891_v4

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4624l_v2

Trust: 1.0

vendor:intelmodel:xeon e5 1650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1268l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650_v4

Trust: 1.0

vendor:redhatmodel:openstackscope:eqversion:9

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2520

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:85119t

Trust: 1.0

vendor:intelmodel:xeon e5 2608l v3scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:itc2200scope:ltversion:3.1

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2803

Trust: 1.0

vendor:intelmodel:xeon e5 2643 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4607_v2

Trust: 1.0

vendor:intelmodel:xeon e5 1620 v3scope:eqversion: -

Trust: 1.0

vendor:sonicwallmodel:secure mobile accessscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2637 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3770

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4607

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3955

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3530

Trust: 1.0

vendor:intelmodel:xeon e5 2630l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2460

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86146

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e5506

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8158

Trust: 1.0

vendor:siemensmodel:simatic ipc677dscope:ltversion:19.02.11

Trust: 1.0

vendor:sonicwallmodel:cloud global management systemscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:32nm

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1585l_v5

Trust: 1.0

vendor:intelmodel:xeon e5 2408l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4116t

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.7

Trust: 1.0

vendor:intelmodel:xeon e5 1650 v3scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:surface pro with lte advancedscope:eqversion:1807

Trust: 1.0

vendor:microsoftmodel:windows server 2016scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477escope:ltversion:21.01.09

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680_v2

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4655_v4

Trust: 1.0

vendor:siemensmodel:simatic ipc847cscope:ltversion:15.01.14

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:x5560

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667_v2

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.5

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3845

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v6scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650

Trust: 1.0

vendor:intelmodel:xeon e5 2637 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4627_v2

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667_v4

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2820

Trust: 1.0

vendor:mitelmodel:mivoice businessscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4870_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2630l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8168

Trust: 1.0

vendor:intelmodel:xeon e3 1241 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86142

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160m

Trust: 1.0

vendor:intelmodel:xeon e3 1230l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1260l v5scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:virtualization managerscope:eqversion:4.3

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4655_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1225scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1709

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1271 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1260lscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:itc2200 proscope:ltversion:3.1

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:l5506

Trust: 1.0

vendor:intelmodel:xeon e5 1650 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2760

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:l3406

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1230scope:eqversion: -

Trust: 1.0

vendor:nvidiamodel:jetson tx1scope:ltversion:r28.3

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:l3403

Trust: 1.0

vendor:intelmodel:xeon e5 2623 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620_v2

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2695_v2

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658

Trust: 1.0

vendor:intelmodel:xeon e3 1285 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:x3440

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w_v3

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:x3460

Trust: 1.0

vendor:intelmodel:xeon e5 2628l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2698_v3

Trust: 1.0

vendor:intelmodel:xeon e5 2630 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86128

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86148f

Trust: 1.0

vendor:oraclemodel:local service management systemscope:gteversion:13.0

Trust: 1.0

vendor:intelmodel:pentiumscope:eqversion:n4000

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:45nm

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3590

Trust: 1.0

vendor:intelmodel:xeon e5 1428l v3scope:eqversion: -

Trust: 1.0

vendor:mitelmodel:micloud management portalscope:eqversion:*

Trust: 1.0

vendor:microsoftmodel:surface proscope:eqversion:1796

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8890_v3

Trust: 1.0

vendor:intelmodel:xeon e5 2448lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2428l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3745d

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:schneider electricmodel:struxureware data center expertscope:ltversion:7.6.0

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2560

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2860

Trust: 1.0

vendor:intelmodel:xeon e5 2637 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1285l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3958

Trust: 1.0

vendor:siemensmodel:simatic ipc547gscope:ltversion:r1.23.0

Trust: 1.0

vendor:intelmodel:xeon e5 2418lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3805

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3825

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3770d

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1607

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2850_v2

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8153

Trust: 1.0

vendor:intelmodel:xeon e5 2603 v2scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.6

Trust: 1.0

vendor:mitelmodel:micollabscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8170

Trust: 1.0

vendor:intelmodel:xeon e3 1286l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1660 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentiumscope:eqversion:n4100

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5115

Trust: 1.0

vendor:intelmodel:xeon e3 12201 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1280scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2640 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2643scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2620 v2scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows server 2008scope:eqversion:r2

Trust: 1.0

vendor:redhatmodel:virtualizationscope:eqversion:4.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8893_v4

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e5503

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830_v2

Trust: 1.0

vendor:intelmodel:xeon e3 1285 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j4005

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3826

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658_v4

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v3scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1703

Trust: 1.0

vendor:intelmodel:xeon e3 1240l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3460

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2670

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2695_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4809_v2

Trust: 1.0

vendor:intelmodel:atom x7-e3950scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2430l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667_v3

Trust: 1.0

vendor:redhatmodel:openstackscope:eqversion:12

Trust: 1.0

vendor:intelmodel:xeon e5 2448l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2407scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820_v3

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640_v2

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:x3430

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8867_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1268l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86138f

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1501m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2618l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2670_v2

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:x3470

Trust: 1.0

vendor:intelmodel:xeon e5 2603 v3scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477e proscope:ltversion:21.01.09

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2450lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4860

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160t

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1620 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4112

Trust: 1.0

vendor:intelmodel:xeon e3 1276 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1558l_v5

Trust: 1.0

vendor:intelmodel:xeon e3 1505m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4108

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.6

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:sonicwallmodel:web application firewallscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699r_v4

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3815

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2698_v4

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:l5518_

Trust: 1.0

vendor:intelmodel:xeon e5 1620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:w5590

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610

Trust: 1.0

vendor:intelmodel:xeon e3 1220l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1235l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1578l_v5

Trust: 1.0

vendor:intelmodel:xeon e3 1226 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1535m_v6

Trust: 1.0

vendor:intelmodel:xeon e5 1428l v2scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3740d

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:45nm

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697_v4

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:125c_

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86142f

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86154

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870_v4

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8164

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658a_v3

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690

Trust: 1.0

vendor:intelmodel:xeon e5 2648l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2603scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640_v3

Trust: 1.0

vendor:siemensmodel:sinema remote connectscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86140

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.7

Trust: 1.0

vendor:intelmodel:xeon e5 2628l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4116

Trust: 1.0

vendor:intelmodel:xeon e3 1285 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4669_v4

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86138

Trust: 1.0

vendor:redhatmodel:openstackscope:eqversion:8

Trust: 1.0

vendor:intelmodel:xeon e3 12201scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2418l v3scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m5scope:ltversion:22.01.06

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680_v3

Trust: 1.0

vendor:siemensmodel:simatic ipc677cscope:ltversion:15.02.15

Trust: 1.0

vendor:microsoftmodel:surface proscope:eqversion:3

Trust: 1.0

vendor:intelmodel:xeon e5 1630 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:45nm

Trust: 1.0

vendor:intelmodel:xeon e5 2450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86136

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699a_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2403scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:openstackscope:eqversion:13

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e6550

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.3

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 1.0

vendor:microsoftmodel:windows server 2016scope:eqversion:1709

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v3scope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1585_v5

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735g

Trust: 1.0

vendor:intelmodel:xeon e5 2403 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1501l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2440scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610_v2

Trust: 1.0

vendor:intelmodel:pentium jscope:eqversion:j4205

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2580

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735e

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8830

Trust: 1.0

vendor:microsoftmodel:surface bookscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1220_

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880_v4

Trust: 1.0

vendor:microsoftmodel:surface studioscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3950

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697a_v4

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2870_v2

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4870

Trust: 1.0

vendor:siemensmodel:simatic ipc847dscope:ltversion:19.01.14

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658_v3

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:7500

Trust: 1.0

vendor:intelmodel:xeon e5 1630 v3scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.4

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3736f

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4667_v4

Trust: 1.0

vendor:siemensmodel:itc1900 proscope:ltversion:3.1

Trust: 1.0

vendor:intelmodel:xeon e5 2470scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:openstackscope:eqversion:10

Trust: 1.0

vendor:microsoftmodel:surface proscope:eqversion:4

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4809_v3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2648l v4scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:sinumerik pcu 50.5scope:ltversion:15.02.15

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2683_v3

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:l5530

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-1105cscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:sinumerik 840 d slscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1258l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620_v4

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4669_v3

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3740

Trust: 1.0

vendor:siemensmodel:simatic itp1000scope:ltversion:23.01.04

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3858

Trust: 1.0

vendor:intelmodel:xeon e3 1235scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650l

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v6scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4escope:ltversion:17.0x.14

Trust: 1.0

vendor:intelmodel:xeon e5 2640 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1575m_v5

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8890_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2609 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:x3450

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8860

Trust: 1.0

vendor:siemensmodel:simatic ipc477cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:l3426

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86152

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:5.9

Trust: 1.0

vendor:intelmodel:xeon e5 1620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1275_

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e5540

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4110

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2890_v2

Trust: 1.0

vendor:intelmodel:xeon e5 1660 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699_v4

Trust: 1.0

vendor:mitelmodel:open integration gatewayscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v6scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477dscope:ltversion:17.0x.14

Trust: 1.0

vendor:siemensmodel:simatic et 200 spscope:ltversion:2.6

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8891_v3

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.4

Trust: 1.0

vendor:intelmodel:xeon e5 2420 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86130

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion:1803

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8850_v2

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8176m

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86140m

Trust: 1.0

vendor:intelmodel:xeon e3 1265l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3775d

Trust: 1.0

vendor:intelmodel:xeon e3 1246 v3scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:virtualization managerscope:eqversion:4.2

Trust: 1.0

vendor:oraclemodel:local service management systemscope:lteversion:13.3

Trust: 1.0

vendor:intelmodel:xeon e3 1275l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86148

Trust: 1.0

vendor:intelmodel:xeon e5 2623 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4809_v4

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4657l_v2

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690_v4

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2420

Trust: 1.0

vendor:redhatmodel:openstackscope:eqversion:7.0

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880l_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8850

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x5-e3940scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1285l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8867_v4

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86138t

Trust: 1.0

vendor:siemensmodel:simatic ipc427cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:32nm

Trust: 1.0

vendor:siemensmodel:simatic ipc347escope:ltversion:1.5

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e6510

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3830

Trust: 1.0

vendor:intelmodel:xeon e5 1660scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2428l v3scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:sinumerik tcu 30.3scope:eqversion: -

Trust: 1.0

vendor:mitelmodel:mivoice connectscope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windows 8.1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627dscope:ltversion:19.02.11

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850_v4

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:microsoftmodel:windows server 2012scope:eqversion:r2

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic s7-1500scope:ltversion:2.6

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2695_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2440 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850_v2

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680_v4

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 1.0

vendor:mitelmodel:mivoice 5000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1505m_v6

Trust: 1.0

vendor:siemensmodel:itc1500scope:ltversion:3.1

Trust: 1.0

vendor:intelmodel:xeon e5 2648l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:85122

Trust: 1.0

vendor:intelmodel:xeon e3 1290 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1680 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1125c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8170m

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820_v4

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8156

Trust: 1.0

vendor:intelmodel:xeon e3 1231 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8176

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2830

Trust: 1.0

vendor:intelmodel:xeon e3 1505l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2628l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870

Trust: 1.0

vendor:armmodel:cortex-ascope:eqversion:72

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8894_v4

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2609scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2870

Trust: 1.0

vendor:siemensmodel:simatic ipc3000 smartscope:ltversion:1.5

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680

Trust: 1.0

vendor:intelmodel:xeon e5 2640scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e5502

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4617

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e6540

Trust: 1.0

vendor:siemensmodel:simatic ipc647dscope:ltversion:19.01.14

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentiumscope:eqversion:n4200

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:e5530

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1105c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4114t

Trust: 1.0

vendor:siemensmodel:simatic field pg m4scope:ltversion:18.01.09

Trust: 1.0

vendor:siemensmodel:itc1900scope:ltversion:3.1

Trust: 1.0

vendor:siemensmodel:simatic ipc627cscope:ltversion:15.02.15

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:32nm

Trust: 1.0

vendor:sonicwallmodel:global management systemscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1286 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1290scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3450

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658_v2

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4660_v4

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:x5570

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86150

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:l5520

Trust: 1.0

vendor:redhatmodel:mrg realtimescope:eqversion:2.0

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2880_v2

Trust: 1.0

vendor:microsoftmodel:windows 10scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697_v2

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4627_v3

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:5600

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3795

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.7

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2683_v4

Trust: 1.0

vendor:intelmodel:xeon e3 1240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2620 v3scope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:surface bookscope:eqversion:2

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86130f

Trust: 1.0

vendor:intelmodel:xeon e5 2608l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735f

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:86126f

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:85118

Trust: 1.0

vendor:amdmodel: - scope: - version: -

Trust: 0.8

vendor:armmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:dellmodel: - scope: - version: -

Trust: 0.8

vendor:dell emcmodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:hpmodel: - scope: - version: -

Trust: 0.8

vendor:hitachimodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:qualcomm incorporatedmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:synologymodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:armmodel:cortex a57scope: - version: -

Trust: 0.6

vendor:intelmodel:5th generation core processorsscope: - version: -

Trust: 0.6

vendor:armmodel:cortex a72scope: - version: -

Trust: 0.6

vendor:intelmodel:6th generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:5th generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:4th generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:3rd generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:2nd generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:8th generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:7th generation core processorsscope:eqversion:0

Trust: 0.6

vendor:intelmodel:atom processor a seriesscope:eqversion:0

Trust: 0.6

vendor:intelmodel:atom processor c seriesscope:eqversion:0

Trust: 0.6

vendor:intelmodel:atom processor e seriesscope:eqversion:0

Trust: 0.6

vendor:intelmodel:atom processor t seriesscope:eqversion:0

Trust: 0.6

vendor:intelmodel:atom processor seriesscope:eqversion:x0

Trust: 0.6

vendor:intelmodel:atom processor z seriesscope:eqversion:0

Trust: 0.6

vendor:intelmodel:core x-series processor family for intel platformsscope:eqversion:x990

Trust: 0.6

vendor:intelmodel:celeron processor j seriesscope:eqversion:0

Trust: 0.6

vendor:intelmodel:celeron processor n seriesscope:eqversion:0

Trust: 0.6

vendor:intelmodel:core m processor familyscope:eqversion:0

Trust: 0.6

vendor:intelmodel:core x-series processor family for intel platformsscope:eqversion:x2990

Trust: 0.6

vendor:intelmodel:pentium processor n seriesscope:eqversion:0

Trust: 0.6

vendor:intelmodel:pentium processor silver seriesscope:eqversion:0

Trust: 0.6

vendor:intelmodel:xeon processor seriesscope:eqversion:34000

Trust: 0.6

vendor:intelmodel:xeon processor seriesscope:eqversion:36000

Trust: 0.6

vendor:intelmodel:xeon processor seriesscope:eqversion:55000

Trust: 0.6

vendor:intelmodel:xeon processor seriesscope:eqversion:56000

Trust: 0.6

vendor:intelmodel:xeon processor seriesscope:eqversion:75000

Trust: 0.6

vendor:intelmodel:xeon processor seriesscope:eqversion:65000

Trust: 0.6

vendor:intelmodel:pentium processor j seriesscope:eqversion:0

Trust: 0.6

vendor:intelmodel:xeon processor e3 familyscope:eqversion:0

Trust: 0.6

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v20

Trust: 0.6

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v3

Trust: 0.6

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v40

Trust: 0.6

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v50

Trust: 0.6

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v60

Trust: 0.6

vendor:intelmodel:xeon processor e5 familyscope:eqversion:0

Trust: 0.6

vendor:intelmodel:xeon processor e5 familyscope:eqversion:v20

Trust: 0.6

vendor:intelmodel:xeon processor e5 familyscope:eqversion:v3

Trust: 0.6

vendor:intelmodel:xeon processor e5 familyscope:eqversion:v40

Trust: 0.6

vendor:intelmodel:xeon processor e7 familyscope:eqversion:0

Trust: 0.6

vendor:intelmodel:xeon processor e7 familyscope:eqversion:v20

Trust: 0.6

vendor:intelmodel:xeon processor e7 familyscope:eqversion:v3

Trust: 0.6

vendor:intelmodel:xeon processor e7 familyscope:eqversion:v40

Trust: 0.6

sources: CERT/CC: VU#180049 // CNVD: CNVD-2018-13391 // CNNVD: CNNVD-201805-749 // NVD: CVE-2018-3639

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-3639
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2018-13391
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201805-749
value: MEDIUM

Trust: 0.6

VULHUB: VHN-133670
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-3639
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2018-13391
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-133670
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-3639
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2018-13391 // VULHUB: VHN-133670 // CNNVD: CNNVD-201805-749 // NVD: CVE-2018-3639

PROBLEMTYPE DATA

problemtype:CWE-203

Trust: 1.1

problemtype:CWE-200

Trust: 0.1

sources: VULHUB: VHN-133670 // NVD: CVE-2018-3639

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201805-749

TYPE

bypass

Trust: 1.1

sources: PACKETSTORM: 147759 // PACKETSTORM: 147930 // PACKETSTORM: 147769 // PACKETSTORM: 151288 // PACKETSTORM: 150075 // PACKETSTORM: 147749 // PACKETSTORM: 148330 // PACKETSTORM: 147938 // PACKETSTORM: 150079 // PACKETSTORM: 150073 // PACKETSTORM: 147779

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-133670

PATCH

title:Patches for multiple CPUHardware information disclosure vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/134555

Trust: 0.6

sources: CNVD: CNVD-2018-13391

EXTERNAL IDS

db:NVDid:CVE-2018-3639

Trust: 3.7

db:USCERTid:TA18-141A

Trust: 2.5

db:CERT/CCid:VU#180049

Trust: 2.5

db:SECTRACKid:1040949

Trust: 2.3

db:BIDid:104232

Trust: 2.3

db:OPENWALLid:OSS-SECURITY/2020/06/10/5

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2020/06/10/1

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2020/06/10/2

Trust: 1.7

db:LENOVOid:LEN-22133

Trust: 1.7

db:EXPLOIT-DBid:44695

Trust: 1.7

db:SIEMENSid:SSA-505225

Trust: 1.7

db:SIEMENSid:SSA-268644

Trust: 1.7

db:SIEMENSid:SSA-608355

Trust: 1.7

db:SECTRACKid:1042004

Trust: 1.7

db:CERT/CCid:VU#584653

Trust: 0.8

db:PACKETSTORMid:152767

Trust: 0.7

db:CNVDid:CNVD-2018-13391

Trust: 0.6

db:AUSCERTid:ESB-2020.2340

Trust: 0.6

db:AUSCERTid:ESB-2021.3058

Trust: 0.6

db:AUSCERTid:ESB-2020.2798

Trust: 0.6

db:AUSCERTid:ESB-2020.3052

Trust: 0.6

db:AUSCERTid:ESB-2019.0077.2

Trust: 0.6

db:AUSCERTid:ESB-2019.1025.2

Trust: 0.6

db:AUSCERTid:ESB-2019.4343

Trust: 0.6

db:AUSCERTid:ESB-2019.0854

Trust: 0.6

db:AUSCERTid:ESB-2021.4156

Trust: 0.6

db:AUSCERTid:ESB-2019.0726

Trust: 0.6

db:LENOVOid:LEN-30550

Trust: 0.6

db:CNNVDid:CNNVD-201805-749

Trust: 0.6

db:PACKETSTORMid:147749

Trust: 0.2

db:PACKETSTORMid:147769

Trust: 0.2

db:PACKETSTORMid:150073

Trust: 0.2

db:PACKETSTORMid:148330

Trust: 0.2

db:PACKETSTORMid:147779

Trust: 0.2

db:PACKETSTORMid:150079

Trust: 0.2

db:PACKETSTORMid:147938

Trust: 0.2

db:PACKETSTORMid:150075

Trust: 0.2

db:PACKETSTORMid:151288

Trust: 0.2

db:PACKETSTORMid:147759

Trust: 0.2

db:PACKETSTORMid:147930

Trust: 0.2

db:PACKETSTORMid:147739

Trust: 0.2

db:PACKETSTORMid:148581

Trust: 0.1

db:PACKETSTORMid:148151

Trust: 0.1

db:PACKETSTORMid:147743

Trust: 0.1

db:PACKETSTORMid:148318

Trust: 0.1

db:PACKETSTORMid:148731

Trust: 0.1

db:PACKETSTORMid:148817

Trust: 0.1

db:PACKETSTORMid:150097

Trust: 0.1

db:PACKETSTORMid:147932

Trust: 0.1

db:PACKETSTORMid:148484

Trust: 0.1

db:PACKETSTORMid:150076

Trust: 0.1

db:PACKETSTORMid:147839

Trust: 0.1

db:PACKETSTORMid:148324

Trust: 0.1

db:PACKETSTORMid:147746

Trust: 0.1

db:PACKETSTORMid:147765

Trust: 0.1

db:PACKETSTORMid:147762

Trust: 0.1

db:PACKETSTORMid:147748

Trust: 0.1

db:PACKETSTORMid:147770

Trust: 0.1

db:PACKETSTORMid:147754

Trust: 0.1

db:PACKETSTORMid:147756

Trust: 0.1

db:PACKETSTORMid:147931

Trust: 0.1

db:PACKETSTORMid:148323

Trust: 0.1

db:PACKETSTORMid:147751

Trust: 0.1

db:PACKETSTORMid:147747

Trust: 0.1

db:PACKETSTORMid:147764

Trust: 0.1

db:PACKETSTORMid:147755

Trust: 0.1

db:PACKETSTORMid:147873

Trust: 0.1

db:PACKETSTORMid:148699

Trust: 0.1

db:PACKETSTORMid:147763

Trust: 0.1

db:PACKETSTORMid:148656

Trust: 0.1

db:PACKETSTORMid:147744

Trust: 0.1

db:PACKETSTORMid:150077

Trust: 0.1

db:PACKETSTORMid:147734

Trust: 0.1

db:PACKETSTORMid:147750

Trust: 0.1

db:PACKETSTORMid:148370

Trust: 0.1

db:PACKETSTORMid:147767

Trust: 0.1

db:PACKETSTORMid:147719

Trust: 0.1

db:PACKETSTORMid:150090

Trust: 0.1

db:PACKETSTORMid:147737

Trust: 0.1

db:PACKETSTORMid:147742

Trust: 0.1

db:PACKETSTORMid:147796

Trust: 0.1

db:PACKETSTORMid:147720

Trust: 0.1

db:PACKETSTORMid:149127

Trust: 0.1

db:PACKETSTORMid:149390

Trust: 0.1

db:PACKETSTORMid:148614

Trust: 0.1

db:PACKETSTORMid:147738

Trust: 0.1

db:PACKETSTORMid:148818

Trust: 0.1

db:PACKETSTORMid:147752

Trust: 0.1

db:PACKETSTORMid:150096

Trust: 0.1

db:PACKETSTORMid:147745

Trust: 0.1

db:PACKETSTORMid:147753

Trust: 0.1

db:PACKETSTORMid:148751

Trust: 0.1

db:PACKETSTORMid:147780

Trust: 0.1

db:PACKETSTORMid:148842

Trust: 0.1

db:PACKETSTORMid:147733

Trust: 0.1

db:PACKETSTORMid:147778

Trust: 0.1

db:PACKETSTORMid:147758

Trust: 0.1

db:PACKETSTORMid:147866

Trust: 0.1

db:PACKETSTORMid:147740

Trust: 0.1

db:PACKETSTORMid:147757

Trust: 0.1

db:PACKETSTORMid:147741

Trust: 0.1

db:PACKETSTORMid:150078

Trust: 0.1

db:PACKETSTORMid:148853

Trust: 0.1

db:PACKETSTORMid:147735

Trust: 0.1

db:PACKETSTORMid:147766

Trust: 0.1

db:PACKETSTORMid:148695

Trust: 0.1

db:PACKETSTORMid:147933

Trust: 0.1

db:PACKETSTORMid:147721

Trust: 0.1

db:PACKETSTORMid:147760

Trust: 0.1

db:PACKETSTORMid:148975

Trust: 0.1

db:PACKETSTORMid:150095

Trust: 0.1

db:PACKETSTORMid:150074

Trust: 0.1

db:PACKETSTORMid:147736

Trust: 0.1

db:PACKETSTORMid:147761

Trust: 0.1

db:PACKETSTORMid:148317

Trust: 0.1

db:PACKETSTORMid:147904

Trust: 0.1

db:PACKETSTORMid:148507

Trust: 0.1

db:PACKETSTORMid:147851

Trust: 0.1

db:PACKETSTORMid:147934

Trust: 0.1

db:VULHUBid:VHN-133670

Trust: 0.1

db:PACKETSTORMid:148244

Trust: 0.1

db:PACKETSTORMid:150116

Trust: 0.1

sources: CERT/CC: VU#180049 // CNVD: CNVD-2018-13391 // VULHUB: VHN-133670 // PACKETSTORM: 147739 // PACKETSTORM: 147759 // PACKETSTORM: 147930 // PACKETSTORM: 148244 // PACKETSTORM: 147769 // PACKETSTORM: 150116 // PACKETSTORM: 151288 // PACKETSTORM: 150075 // PACKETSTORM: 147749 // PACKETSTORM: 148330 // PACKETSTORM: 147938 // PACKETSTORM: 150079 // PACKETSTORM: 150073 // PACKETSTORM: 147779 // CNNVD: CNNVD-201805-749 // NVD: CVE-2018-3639

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html

Trust: 3.3

url:https://bugs.chromium.org/p/project-zero/issues/detail?id=1528

Trust: 2.5

url:https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

Trust: 2.5

url:https://www.us-cert.gov/ncas/alerts/ta18-141a

Trust: 2.5

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel

Trust: 2.5

url:http://www.securityfocus.com/bid/104232

Trust: 2.3

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 2.3

url:https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html

Trust: 2.3

url:https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

Trust: 2.3

url:https://access.redhat.com/security/vulnerabilities/ssbd

Trust: 2.0

url:https://access.redhat.com/errata/rhsa-2018:1633

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1636

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1638

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1647

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1658

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1676

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1738

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:1854

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:2060

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3396

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3398

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3402

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:0148

Trust: 1.8

url:https://seclists.org/bugtraq/2019/jun/36

Trust: 1.7

url:https://www.kb.cert.org/vuls/id/180049

Trust: 1.7

url:http://support.lenovo.com/us/en/solutions/len-22133

Trust: 1.7

url:http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html

Trust: 1.7

url:http://xenbits.xen.org/xsa/advisory-263.html

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

Trust: 1.7

url:https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0

Trust: 1.7

url:https://nvidia.custhelp.com/app/answers/detail/a_id/4787

Trust: 1.7

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180012

Trust: 1.7

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0004

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20180521-0001/

Trust: 1.7

url:https://support.citrix.com/article/ctx235225

Trust: 1.7

url:https://support.oracle.com/knowledge/sun%20microsystems/2481872_1.html

Trust: 1.7

url:https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006

Trust: 1.7

url:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Trust: 1.7

url:https://www.synology.com/support/security/synology_sa_18_23

Trust: 1.7

url:https://www.debian.org/security/2018/dsa-4210

Trust: 1.7

url:https://www.debian.org/security/2018/dsa-4273

Trust: 1.7

url:https://www.exploit-db.com/exploits/44695/

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2020/06/10/2

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2020/06/10/5

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2020/06/10/1

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1629

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1630

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1632

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1635

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1637

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1639

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1640

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1641

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1642

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1643

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1644

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1645

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1646

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1648

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1649

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1650

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1651

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1652

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1653

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1654

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1655

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1656

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1657

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1659

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1660

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1661

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1662

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1663

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1664

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1665

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1666

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1667

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1668

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1669

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1674

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1675

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1686

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1688

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1689

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1690

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1696

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1710

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1711

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1737

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1826

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1965

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1967

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:1997

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2001

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2003

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2006

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2161

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2162

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2164

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2171

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2172

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2216

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2228

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2246

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2250

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2258

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2289

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2309

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2328

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2363

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2364

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2387

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2394

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2396

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2948

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:3397

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:3399

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:3400

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:3401

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:3407

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:3423

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:3424

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:3425

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2019:1046

Trust: 1.7

url:http://www.securitytracker.com/id/1040949

Trust: 1.7

url:http://www.securitytracker.com/id/1042004

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html

Trust: 1.7

url:https://usn.ubuntu.com/3651-1/

Trust: 1.7

url:https://usn.ubuntu.com/3652-1/

Trust: 1.7

url:https://usn.ubuntu.com/3653-1/

Trust: 1.7

url:https://usn.ubuntu.com/3653-2/

Trust: 1.7

url:https://usn.ubuntu.com/3654-1/

Trust: 1.7

url:https://usn.ubuntu.com/3654-2/

Trust: 1.7

url:https://usn.ubuntu.com/3655-1/

Trust: 1.7

url:https://usn.ubuntu.com/3655-2/

Trust: 1.7

url:https://usn.ubuntu.com/3679-1/

Trust: 1.7

url:https://usn.ubuntu.com/3680-1/

Trust: 1.7

url:https://usn.ubuntu.com/3756-1/

Trust: 1.7

url:https://usn.ubuntu.com/3777-3/

Trust: 1.7

url:https://support.apple.com//ht208394

Trust: 1.6

url:http://www.dell.com/support/speculative-store-bypass

Trust: 1.6

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03850en_us

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-3639

Trust: 1.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.3

url:https://access.redhat.com/security/cve/cve-2018-3639

Trust: 1.3

url:https://bugzilla.redhat.com/):

Trust: 1.3

url:https://access.redhat.com/security/team/key/

Trust: 1.3

url:https://access.redhat.com/articles/11258

Trust: 1.3

url:https://access.redhat.com/security/team/contact/

Trust: 1.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 1.3

url:https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution

Trust: 0.8

url:https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf

Trust: 0.8

url:https://www.kb.cert.org/vuls/id/584653

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/208.html

Trust: 0.8

url:https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf

Trust: 0.8

url:https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf

Trust: 0.8

url:https://fortiguard.com/psirt/fg-ir-18-002

Trust: 0.8

url:https://support.hp.com/us-en/document/c06001626

Trust: 0.8

url:http://www.hitachi.com/hirt/publications/hirt-pub18001/

Trust: 0.8

url:https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/

Trust: 0.8

url:https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution

Trust: 0.8

url:https://www.suse.com/support/kb/doc/?id=7022937

Trust: 0.8

url:https://www.synology.com/en-global/support/security/synology_sa_18_23

Trust: 0.8

url:https://wiki.ubuntu.com/securityteam/knowledgebase/variant4

Trust: 0.8

url:https://kb.vmware.com/s/article/54951

Trust: 0.8

url:https://aws.amazon.com/security/security-bulletins/aws-2018-015/

Trust: 0.8

url:https://securitytracker.com/id/1040949

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190049-1/

Trust: 0.6

url:http://www.ibm.com/support/docview.wss

Trust: 0.6

url:https://security.business.xerox.com/wp-content/uploads/2019/11/cert_xrx19-029_ffpsv2_win10_securitybulletin_nov2019.pdf

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77958

Trust: 0.6

url:https://www.auscert.org.au/bulletins/73854

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20180615-01-cpu-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2340/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76682

Trust: 0.6

url:https://packetstormsecurity.com/files/152767/red-hat-security-advisory-2019-1046-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4343/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2798/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3052/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4156

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3058

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10872470

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77246

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-30550

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10879093

Trust: 0.6

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03850en_us

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/6.10_technical_notes/index.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5803

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2671

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-6701

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-7308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-2671

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-8890

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-7889

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1130

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-15121

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8830

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/6.10_release_notes/index.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-12190

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-9077

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18203

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-6001

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-5803

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2012-6701

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-9076

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-9076

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8830

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-9075

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-7616

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-9075

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-6001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-9077

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-15121

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1130

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-8890

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8650

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7616

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18203

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-8650

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12190

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12618

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4203

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4336

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4334

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4338

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4332

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4326

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4153

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4340

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4304

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4126

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4324

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4331

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5334

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4310

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1777

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4295

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5333

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4333

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4341

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-3646

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4321

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4337

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12613

Trust: 0.1

url:https://access.redhat.com/articles/3449601

Trust: 0.1

sources: CERT/CC: VU#180049 // CNVD: CNVD-2018-13391 // VULHUB: VHN-133670 // PACKETSTORM: 147739 // PACKETSTORM: 147759 // PACKETSTORM: 147930 // PACKETSTORM: 148244 // PACKETSTORM: 147769 // PACKETSTORM: 150116 // PACKETSTORM: 151288 // PACKETSTORM: 150075 // PACKETSTORM: 147749 // PACKETSTORM: 148330 // PACKETSTORM: 147938 // PACKETSTORM: 150079 // PACKETSTORM: 150073 // PACKETSTORM: 147779 // CNNVD: CNNVD-201805-749 // NVD: CVE-2018-3639

CREDITS

Red Hat

Trust: 1.3

sources: PACKETSTORM: 147739 // PACKETSTORM: 147759 // PACKETSTORM: 147930 // PACKETSTORM: 148244 // PACKETSTORM: 147769 // PACKETSTORM: 151288 // PACKETSTORM: 150075 // PACKETSTORM: 147749 // PACKETSTORM: 148330 // PACKETSTORM: 147938 // PACKETSTORM: 150079 // PACKETSTORM: 150073 // PACKETSTORM: 147779

SOURCES

db:CERT/CCid:VU#180049
db:CNVDid:CNVD-2018-13391
db:VULHUBid:VHN-133670
db:PACKETSTORMid:147739
db:PACKETSTORMid:147759
db:PACKETSTORMid:147930
db:PACKETSTORMid:148244
db:PACKETSTORMid:147769
db:PACKETSTORMid:150116
db:PACKETSTORMid:151288
db:PACKETSTORMid:150075
db:PACKETSTORMid:147749
db:PACKETSTORMid:148330
db:PACKETSTORMid:147938
db:PACKETSTORMid:150079
db:PACKETSTORMid:150073
db:PACKETSTORMid:147779
db:CNNVDid:CNNVD-201805-749
db:NVDid:CVE-2018-3639

LAST UPDATE DATE

2026-03-25T22:17:59.037000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#180049date:2018-06-19T00:00:00
db:CNVDid:CNVD-2018-13391date:2018-07-18T00:00:00
db:VULHUBid:VHN-133670date:2020-09-02T00:00:00
db:CNNVDid:CNNVD-201805-749date:2021-12-08T00:00:00
db:NVDid:CVE-2018-3639date:2024-11-21T04:05:48.867

SOURCES RELEASE DATE

db:CERT/CCid:VU#180049date:2018-05-21T00:00:00
db:CNVDid:CNVD-2018-13391date:2018-07-18T00:00:00
db:VULHUBid:VHN-133670date:2018-05-22T00:00:00
db:PACKETSTORMid:147739date:2018-05-23T06:55:41
db:PACKETSTORMid:147759date:2018-05-23T07:02:14
db:PACKETSTORMid:147930date:2018-05-30T19:46:19
db:PACKETSTORMid:148244date:2018-06-19T22:22:22
db:PACKETSTORMid:147769date:2018-05-23T07:06:00
db:PACKETSTORMid:150116date:2018-10-31T16:10:50
db:PACKETSTORMid:151288date:2019-01-23T21:29:07
db:PACKETSTORMid:150075date:2018-10-31T01:13:27
db:PACKETSTORMid:147749date:2018-05-23T06:59:24
db:PACKETSTORMid:148330date:2018-06-27T13:56:46
db:PACKETSTORMid:147938date:2018-05-30T19:50:22
db:PACKETSTORMid:150079date:2018-10-31T01:14:01
db:PACKETSTORMid:150073date:2018-10-31T01:13:10
db:PACKETSTORMid:147779date:2018-05-23T07:09:47
db:CNNVDid:CNNVD-201805-749date:2018-05-23T00:00:00
db:NVDid:CVE-2018-3639date:2018-05-22T12:29:00.250