ID

VAR-201808-0957


CVE

CVE-2018-3646


TITLE

Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)

Trust: 0.8

sources: CERT/CC: VU#982149

DESCRIPTION

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. These attacks are known as L1 Terminal Fault: SGX, L1 Terminal Fault: OS/SMM, and L1 Terminal Fault: VMM. Multiple Intel Processors are prone to a multiple information-disclosure vulnerabilities. Local attackers can exploit these issues to obtain sensitive information. This may aid in further attacks. Intel Core i3 processor, etc. are all CPU (central processing unit) products of Intel Corporation of the United States. The following products are affected: Intel Core i3 processor; Intel Core i5 processor; Intel Core i7 processor; Intel Core M processor family; 2nd generation Intel Core processors; 3rd generation Intel Core processors; 4th generation Intel Core processors; 5th generation Intel Core processors, etc. Issue date: 2018-08-14 Updated on: 2018-08-14 (Initial Advisory) CVE number: CVE-2018-3646 1. Summary VMware vSphere, Workstation, and Fusion updates enable Hypervisor- Specific Mitigations for L1 Terminal Fault - VMM vulnerability. The mitigations in this advisory are categorized as Hypervisor- Specific Mitigations described by VMware Knowledge Base article 55636. Relevant Products VMware vCenter Server (VC) VMware vSphere ESXi (ESXi) VMware Workstation Pro / Player (WS) VMware Fusion Pro / Fusion (Fusion) 3. Problem Description vCenter Server, ESXi, Workstation, and Fusion updates include Hypervisor-Specific Mitigations for L1 Terminal Fault - VMM. This issue may allow a malicious VM running on a given CPU core to effectively read the hypervisoras or another VMas privileged information that resides sequentially or concurrently in the same coreas L1 Data cache. CVE-2018-3646 has two currently known attack vectors which will be referred to as "Sequential-Context" and "Concurrent-Context." Attack Vector Summary Sequential-context attack vector: a malicious VM can potentially infer recently accessed L1 data of a previous context (hypervisor thread or other VM thread) on either logical processor of a processor core. Concurrent-context attack vector: a malicious VM can potentially infer recently accessed L1 data of a concurrently executing context (hypervisor thread or other VM thread) on the other logical processor of the Hyper-Threading-enabled processor core. Mitigation Summary The Sequential-context attack vector is mitigated by a vSphere update to the product versions listed in table below. This mitigation is dependent on Intel microcode updates (provided in separate ESXi patches for most Intel hardware platforms) also listed in the table below. This mitigation is enabled by default and does not impose a significant performance impact. The Concurrent-context attack vector is mitigated through enablement of a new feature known as the ESXi Side-Channel-Aware Scheduler. This feature may impose a non-trivial performance impact and is not enabled by default. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ======= ======= ======= ========= ===================== ========== VC 6.7 Any Important 6.7.0d None VC 6.5 Any Important 6.5u2c None VC 6.0 Any Important 6.0u3h None VC 5.5 Any Important 5.5u3j None ESXi 6.7 Any Important ESXi670-201808401-BG* None ESXi670-201808402-BG** None ESXi670-201808403-BG* None ESXi 6.5 Any Important ESXi650-201808401-BG* None ESXi650-201808402-BG** None ESXi650-201808403-BG* None ESXi 6.0 Any Important ESXi600-201808401-BG* None ESXi600-201808402-BG** None ESXi600-201808403-BG* None ESXi 5.5 Any Important ESXi550-201808401-BG* None ESXi550-201808402-BG** None ESXi550-201808403-BG* None WS 14.x Any Important 14.1.3* None Fusion 10.x Any Important 10.1.3* None *These patches DO NOT mitigate the Concurrent-context attack vector previously described by default. For details on the three-phase vSphere mitigation process please see KB55806 and for the mitigation process for Workstation and Fusion please see KB57138. **These patches include microcode updates required for mitigation of the Sequential-context attack vector. This microcode may also be obtained from your hardware OEM in the form of a BIOS or firmware update. Details on microcode that has been provided by Intel and packaged by VMware is enumerated in the patch KBs found in the Solution section of this document. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vCenter 6.7.0d Downloads: https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/6_7 Documentation: https://docs.vmware.com/en/VMware-vSphere/6.7/rn/vsphere-vcenter-server-670d-release-notes.html vCenter 6.5u2c Downloads: https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/6_5 Documentation: https://docs.vmware.com/en/VMware-vSphere/6.5/rn/vsphere-vcenter-server-65u2c-release-notes.html vCenter 6.0u3h Downloads: https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/6_0 Documentation: https://docs.vmware.com/en/VMware-vSphere/6.0/rn/vsphere-vcenter-server-60u3h-release-notes.html vCenter 5.5u3j Downloads: https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/5_5 Documentation: https://docs.vmware.com/en/VMware-vSphere/5.5/rn/vsphere-vcenter-server-55u3j-release-notes.html ESXi 6.7 Downloads: https://my.vmware.com/group/vmware/patch Documentation: ESXi670-201808401-BG (esx-base): https://kb.vmware.com/kb/56537 ESXi670-201808402-BG (microcode): https://kb.vmware.com/kb/56538 ESXi670-201808403-BG (esx-ui):(https://kb.vmware.com/kb/56897 ESXi 6.5 Downloads: https://my.vmware.com/group/vmware/patch Documentation: ESXi650-201808401-BG (esx-base): https://kb.vmware.com/kb/56547 ESXi650-201808402-BG (microcode): https://kb.vmware.com/kb/56563 ESXi650-201808403-BG (esx-ui): https://kb.vmware.com/kb/56896 ESXi 6.0 Downloads: https://my.vmware.com/group/vmware/patch Documentation: ESXi600-201808401-BG (esx-base): https://kb.vmware.com/kb/56552 ESXi600-201808402-BG (microcode): https://kb.vmware.com/kb/56553 ESXi600-201808403-BG (esx-ui): https://kb.vmware.com/kb/56895 ESXi 5.5 Downloads: https://my.vmware.com/group/vmware/patch Documentation: ESXi550-201808401-BG (esx-base): https://kb.vmware.com/kb/56557 ESXi550-201808402-BG (microcode): https://kb.vmware.com/kb/56558 ESXi550-201808403-BG (esx-ui): https://kb.vmware.com/kb/56894 VMware Workstation Pro 14.1.3 Downloads: https://www.vmware.com/go/downloadworkstation Documentation: https://docs.vmware.com/en/VMware-Workstation-Pro/index.html VMware Workstation Player 14.1.3 Downloads: https://www.vmware.com/go/downloadplayer Documentation: https://docs.vmware.com/en/VMware-Workstation-Player/index.html VMware Fusion Pro / Fusion 10.1.3 Downloads: https://www.vmware.com/go/downloadfusion Documentation: https://docs.vmware.com/en/VMware-Fusion/index.html 5. References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646 https://kb.vmware.com/kb/55636 https://kb.vmware.com/kb/55806 https://kb.vmware.com/kb/57138 - ------------------------------------------------------------------------ 6. Change log 2018-08-14: Initial security advisory in conjunction with vSphere, Workstation, and Fusion updates and patches released on 2018-08-14. Contact E-mail list for product security notifications and announcements: https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com bugtraq@securityfocus.com fulldisclosure@seclists.org E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2018 VMware Inc. All rights reserved. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. (CVE-2018-3620, CVE-2018-3646) * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). Bug Fix(es): * The kernel-rt packages have been upgraded to the 3.10.0-693.37.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1599860) 4. To fully resolve these vulnerabilities it is also necessary to install updated CPU microcode (only available in Debian non-free). Common server class CPUs are covered in the update released as DSA 4273-1. For the stable distribution (stretch), these problems have been fixed in version 4.9.110-3+deb9u3. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlt6p8ZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TBJg//VmtxfP6VLm5Q2hHuOlUejrc2W4hOcNRR0Ud7DjJ0B5Gfb9y/u1k+RXBj akX5/Csi6l+kLOWs4/amX3VAxdQRYFL6eEJBNZzlCkBasu1DpkvJdL9F0EP9gru7 Xd/StpSQs8GaBAlklQsckHtKqPzhB5D56gLosLupfmdNovlRKPhX282Ae5JCgjyf BjQv7Oa5K+pUw7F4sZUsdTPZHvl3bZ14u2SDzkIYX6K0KSRi3r4kBNGlRkCnRUTd AW8LpC2uWFX584LhVqJhnKhtd2lveadkwjX9TTRDJkJJOW88Yf2hDSyvWRAKS90D 65SEB2SIrgYiOTqCW4TQXPv5cNSn+LPimrkPus4likNyxJajbck5lB5GVLTTd0dp X0WPp4uhNsISHERZzdJpT8Y3uu5VrPzgSxPay/aPh+n7vy/wFknliZ4IfBSZtOri J5OrlN+Dal0M7eli1ojoByMLsH5Tzzd6/pfmOtWH/wNUFuMPdNwM/KuzcZRn+aMY FZ6jk6Ge0UNgFoQQPb6ddu0YBlPQGK5t+jPS47qR8fEqV7VxBDFVQYKK5Lni9iwi bIarRFTWQNj3nYZ44VOsk95QuyKe2Gw5NkjzlsEhQdQ318urQ6tpAAvjet/xbaHv 6SO/0r3APr5jxH2GGrLUvRRezbXYkBhEVhWOtcOQryXEzPAbcGc= =Cd8P -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================ FreeBSD-SA-18:09.l1tf Security Advisory The FreeBSD Project Topic: L1 Terminal Fault (L1TF) Kernel Information Disclosure Category: core Module: Kernel Announced: 2018-08-14 Affects: All supported versions of FreeBSD. Corrected: 2018-08-14 17:51:12 UTC (stable/11, 11.1-STABLE) 2018-08-15 02:30:11 UTC (releng/11.2, 11.2-RELEASE-p2) 2018-08-15 02:30:11 UTC (releng/11.1, 11.1-RELEASE-p13) CVE Name: CVE-2018-3620, CVE-2018-3646 Special Note: Speculative execution vulnerability mitigation remains a work in progress. This advisory addresses the issue in FreeBSD 11.1 and later. We expect to update this advisory to include 10.4 at a later time. For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:https://security.FreeBSD.org/>. I. Background When a program accesses data in memory via a logical address it is translated to a physical address in RAM by the CPU. Accessing an unmapped logical address results in what is known as a terminal fault. II. The CPU may speculatively access the level 1 data cache (L1D). Data which would otherwise be protected may then be determined by using side channel methods. This issue affects bhyve on FreeBSD/amd64 systems. III. Impact An attacker executing user code, or kernel code inside of a virtual machine, may be able to read secret data from the kernel or from another virtual machine. IV. Workaround No workaround is available. V. Solution Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date, and reboot. Perform one of the following: 1) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install # shutdown -r +30 "Rebooting for security update" 2) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 11.2] # fetch https://security.FreeBSD.org/patches/SA-18:09/l1tf-11.2.patch # fetch https://security.FreeBSD.org/patches/SA-18:09/l1tf-11.2.patch.asc # gpg --verify l1tf-11.2.patch.asc [FreeBSD 11.1] # fetch https://security.FreeBSD.org/patches/SA-18:09/l1tf-11.1.patch # fetch https://security.FreeBSD.org/patches/SA-18:09/l1tf-11.1.patch.asc # gpg --verify l1tf-11.1.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in <URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the system. VI. Correction details CVE-2018-3620 (L1 Terminal Fault-OS) - ------------------------------------ FreeBSD reserves the the memory page at physical address 0, so it will not contain secret data. FreeBSD zeros the paging data structures for unmapped addresses, so that speculatively executed L1 Terminal Faults will access only the reserved, unused page. The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/11/ r337794 releng/11.1/ r337828 releng/11.2/ r337828 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: <URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> VII. The latest revision of this advisory is available at <URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc> -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.2.9 (FreeBSD) iQIzBAEBCgAdFiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAltztc8ACgkQ05eS9J6n 5cLwEhAAos2Bnilthrbd+uQr1IGASD96aZZ5iXvn1Ibls03Vtd0kG9EcU30gFVG0 HSg47qT7r5qJQUdhuSYxspgS9ZxXpRez1vnAz7cSGHL9FdecyfHWmHvGor5tz84/ CgX4jCCAZfqDBquYD+ioqiLX7p1ZTRKfHBQOHcGgMfMq8UQUsg1YriXabEqnavU6 W0h/eCGBo/Dbvl7004Gx0hKmDO2YQxt9aPWfInXWx1VOMf+wNWpcrvU6rJ4kOnL9 7BXi+c5+vwlVXDvjrTwP9X+9DDa0MJcMoy2JCyCa/0W7lQ9nADLfUiXLsTvLDo6V 6/sooFbqlO+Qz37XHlXOXaoVGZGw+NtJRcnD+w8ueP9ts02SsECoxofN8tPOzGsT T285qAwv8D8uuBLU3dc9y+assEe3j/4Aqb1Eil6Eh1MsHypEvyN5z9+PIpbN2tWK qqCtzgqx037Jvjo6DwjwMUd+DikObGjZyK4pwP8KIeccOIBrUAA1Xel7Xr74xuwq LwqtcHb2MWeFD0Mw+oW9viuJKrxyu6aiQfU6FsuGVmHjtXGxi+aWyGQqed+q8FcU w/J6fq4kmBVVqNNrAMc/bWKU3IXAj4c48H0CSiCoX4dE4waRQ+cEetKkSWVGYnXj 3QdoyPsiqo8Goo34Cn0Ipf9GWDeNVv32iz0fXtr4LtoVZKCx9oc=G5SD -----END PGP SIGNATURE----- . ========================================================================== Kernel Live Patch Security Notice 0044-1 October 05, 2018 linux vulnerability ========================================================================== A security issue affects these releases of Ubuntu: | Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | lowlatency | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | generic | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | lowlatency | Summary: Several security issues were fixed in the kernel. Note that due to a client issue, this livepatch may report that it failed to load. You can verify that the patch has successfully loaded by looking in /sys/kernel/livepatch for a directory starting with the name "lkp_Ubuntu," followed by your kernel version, and ending with the version number, "44." The next client update should correct this problem. (CVE-2018-3620) It was discovered that the paravirtualization implementation in the Linux kernel did not properly handle some indirect calls, reducing the effectiveness of Spectre v2 mitigations for paravirtual guests. A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-6555) It was discovered that a stack-based buffer overflow existed in the iSCSI target implementation of the Linux kernel. A remote attacker could use this to cause a denial of service (system crash). (CVE-2018-14633) It was discovered that microprocessors utilizing speculative execution and prediction of return addresses via Return Stack Buffer (RSB) may allow unauthorized memory reads via sidechannel attacks. (CVE-2018-15572) Jann Horn discovered that the vmacache subsystem did not properly handle sequence number overflows, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2018-17182) Update instructions: The problem can be corrected by updating your livepatches to the following versions: | Kernel | Version | flavors | |--------------------------+----------+--------------------------| | 4.4.0-133.159 | 44.1 | generic, lowlatency | | 4.4.0-133.159~14.04.1 | 44.1 | lowlatency, generic | | 4.4.0-134.160 | 44.1 | generic, lowlatency | | 4.4.0-134.160~14.04.1 | 44.1 | lowlatency, generic | | 4.4.0-135.161~14.04.1 | 44.1 | lowlatency, generic | | 4.15.0-32.35 | 44.1 | lowlatency, generic | | 4.15.0-32.35~16.04.1 | 44.1 | generic, lowlatency | | 4.15.0-33.36 | 44.1 | lowlatency, generic | | 4.15.0-33.36~16.04.1 | 44.1 | lowlatency, generic | | 4.15.0-34.37 | 44.1 | generic, lowlatency | | 4.15.0-34.37~16.04.1 | 44.2 | lowlatency, generic | References: CVE-2018-3620, CVE-2018-15594, CVE-2018-3646, CVE-2018-6555, CVE-2018-14633, CVE-2018-15572, CVE-2018-17182 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . 5 ELS) - i386, noarch, s390x, x86_64 3. These CVEs are security vulnerabilities caused by flaws in the design of speculative execution hardware in the computer's CPU. Details on the vulnerability and our response can be found here: https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/L1TF Due to the high complexity of the fixes and the need for a corresponding CPU microcode update for a complete fix, we are unable to livepatch these CVEs. Please plan to reboot into an updated kernel as soon as possible. Users running Ubuntu 16.04 LTS or 14.04 LTS should upgrade to kernel version 4.4.0-133.159 or later. References: CVE-2018-3620, and CVE-2018-3646 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.5) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901. Bugs fixed (https://bugzilla.redhat.com/): 1585005 - CVE-2018-3646 Kernel: hw: cpu: L1 terminal fault (L1TF) 1601849 - CVE-2018-10901 kernel: kvm: vmx: host GDT limit corruption 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.5): Source: kernel-2.6.32-431.91.3.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.91.3.el6.noarch.rpm kernel-doc-2.6.32-431.91.3.el6.noarch.rpm kernel-firmware-2.6.32-431.91.3.el6.noarch.rpm x86_64: kernel-2.6.32-431.91.3.el6.x86_64.rpm kernel-debug-2.6.32-431.91.3.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.91.3.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.91.3.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.91.3.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.91.3.el6.x86_64.rpm kernel-devel-2.6.32-431.91.3.el6.x86_64.rpm kernel-headers-2.6.32-431.91.3.el6.x86_64.rpm perf-2.6.32-431.91.3.el6.x86_64.rpm perf-debuginfo-2.6.32-431.91.3.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.91.3.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.5): Source: kernel-2.6.32-431.91.3.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.91.3.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.91.3.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.91.3.el6.x86_64.rpm perf-debuginfo-2.6.32-431.91.3.el6.x86_64.rpm python-perf-2.6.32-431.91.3.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.91.3.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201810-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Xen: Multiple vulnerabilities Date: October 30, 2018 Bugs: #643350, #655188, #655544, #659442 ID: 201810-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Xen, the worst of which could cause a Denial of Service condition. Background ========== Xen is a bare-metal hypervisor. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-emulation/xen < 4.10.1-r2 >= 4.10.1-r2 2 app-emulation/xen-tools < 4.10.1-r2 >= 4.10.1-r2 ------------------------------------------------------------------- 2 affected packages Description =========== Multiple vulnerabilities have been discovered in Xen. Please review the referenced CVE identifiers for details. Resolution ========== All Xen users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.10.1-r2" All Xen tools users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.10.1-r2" References ========== [ 1 ] CVE-2017-5715 https://nvd.nist.gov/vuln/detail/CVE-2017-5715 [ 2 ] CVE-2017-5753 https://nvd.nist.gov/vuln/detail/CVE-2017-5753 [ 3 ] CVE-2017-5754 https://nvd.nist.gov/vuln/detail/CVE-2017-5754 [ 4 ] CVE-2018-10471 https://nvd.nist.gov/vuln/detail/CVE-2018-10471 [ 5 ] CVE-2018-10472 https://nvd.nist.gov/vuln/detail/CVE-2018-10472 [ 6 ] CVE-2018-10981 https://nvd.nist.gov/vuln/detail/CVE-2018-10981 [ 7 ] CVE-2018-10982 https://nvd.nist.gov/vuln/detail/CVE-2018-10982 [ 8 ] CVE-2018-12891 https://nvd.nist.gov/vuln/detail/CVE-2018-12891 [ 9 ] CVE-2018-12892 https://nvd.nist.gov/vuln/detail/CVE-2018-12892 [ 10 ] CVE-2018-12893 https://nvd.nist.gov/vuln/detail/CVE-2018-12893 [ 11 ] CVE-2018-15468 https://nvd.nist.gov/vuln/detail/CVE-2018-15468 [ 12 ] CVE-2018-15469 https://nvd.nist.gov/vuln/detail/CVE-2018-15469 [ 13 ] CVE-2018-15470 https://nvd.nist.gov/vuln/detail/CVE-2018-15470 [ 14 ] CVE-2018-3620 https://nvd.nist.gov/vuln/detail/CVE-2018-3620 [ 15 ] CVE-2018-3646 https://nvd.nist.gov/vuln/detail/CVE-2018-3646 [ 16 ] CVE-2018-5244 https://nvd.nist.gov/vuln/detail/CVE-2018-5244 [ 17 ] CVE-2018-7540 https://nvd.nist.gov/vuln/detail/CVE-2018-7540 [ 18 ] CVE-2018-7541 https://nvd.nist.gov/vuln/detail/CVE-2018-7541 [ 19 ] CVE-2018-7542 https://nvd.nist.gov/vuln/detail/CVE-2018-7542 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201810-06 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 3.06

sources: NVD: CVE-2018-3646 // CERT/CC: VU#982149 // BID: 105080 // VULHUB: VHN-133677 // VULMON: CVE-2018-3646 // PACKETSTORM: 148896 // PACKETSTORM: 148941 // PACKETSTORM: 148903 // PACKETSTORM: 149010 // PACKETSTORM: 148936 // PACKETSTORM: 149718 // PACKETSTORM: 149142 // PACKETSTORM: 148934 // PACKETSTORM: 148946 // PACKETSTORM: 148906 // PACKETSTORM: 150083

AFFECTED PRODUCTS

vendor:intelmodel:core i7scope:eqversion:930

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6400

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:720qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2655le

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y31

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:550

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6585r

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8550u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4150t

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10c

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4150

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:740qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4350t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6300hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:920xm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3630qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4720hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4000m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2405s

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:8100

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2435m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3380m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4360

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5350u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2410m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6400t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3317u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700ec

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4160t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3339y

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:460m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2620m

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:7y32

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:950

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2960xm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:840qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8700k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4330m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2400s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4500u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4160

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4400e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6300t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5750hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8350u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2760qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:650

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6685r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4130

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:970

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5550u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3225

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6260u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2310

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:875k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:680

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5350h

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3840qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4308u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2920xm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2340ue

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3240

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4712mq

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:7y30

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3230m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2720qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4130t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5775c

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3227u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:760

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5700eq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5675c

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702mq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5557u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5157u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3517u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2629m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2380p

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5257u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700mq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4005u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:560um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640lm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600t

Trust: 1.0

vendor:intelmodel:core m5scope:eqversion:6y57

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:820qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2675qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2310m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5300u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:8350k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3220

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3475s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4340te

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4310u

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2860qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2637m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3120m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5200u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:580m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4260u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:560

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5675r

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3612qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4750hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4785t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3610qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4722hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5500u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8650u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2120

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4600m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2375m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4340m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2540m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5600u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:430um

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3720qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4860hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2820qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2310e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3210

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770te

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3217u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820eq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:670

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:960

Trust: 1.0

vendor:intelmodel:core m7scope:eqversion:6y75

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2102

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4170t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6440eq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3610me

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3610qe

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2700k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2330e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:470um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2649m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3550

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4370t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6402p

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:610e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4950hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:540um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2300

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:530

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660lm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:860

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4402e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:870

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2390t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2617m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2515e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:560m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3667u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4600u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2467m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4850hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5775r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2557m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570te

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620le

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4440s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4578u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4800mq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:350m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4030u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4430

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:540

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4350

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:870s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2550k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3689y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5700hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4910mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820hk

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4440

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6287u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3350p

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4202y

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3437u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100h

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700eq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7500u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8250u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2320

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6157u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4110e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4370

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4610m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4550u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3520m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7660u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4410e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:750

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:980x

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2670qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4340

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y51

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4250u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:370m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:540m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4360t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2430m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2357m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3550s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:940

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3330

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6006u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4158u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3217ue

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3360m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4112e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2348m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4012y

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y70

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4771

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2120t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3229y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702ec

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5650u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:980

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620ue

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:480m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620lm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2100

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:430m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3330s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4278u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3130m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6200u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:380m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4510u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2640m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200m

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y71

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2125

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2370m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3427u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5575r

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3250t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4558u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4710mq

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:6y30

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2630qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3517ue

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4422e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3320m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3245

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2510e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2312m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4310m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3632qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4710hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:660

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200y

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5015u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6267u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3687u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3635qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6167u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330te

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:860s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7567u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4765t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3240t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:965

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3450

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3115c

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5287u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:940xm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100te

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660ue

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:975

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2635qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2450m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670r

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3615qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6300

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4712hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4760hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:655k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200h

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:990x

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2450p

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4102e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8700

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8600k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3615qe

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4960hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4810mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7600u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3450s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8400

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5950hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4030y

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210h

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4360u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6442eq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3210m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3439y

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6300u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2365m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5850eq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6098p

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3120me

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7560u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3110m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4288u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:750s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3612qe

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3540m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7y75

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4900mq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2537m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6102e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3250

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3555le

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4350u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5020u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3220t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:661

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2677m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4302y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4258u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3337u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2100t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4010y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4610y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2657m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2330m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5010u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5250u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4010u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2377m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2115c

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2710qe

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2400

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:880

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:920

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4170

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3820qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2520m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4120u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2350m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4220y

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500te

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4650u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2367m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4110m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3740qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6350hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4430s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4980hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6320

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5005u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4402ec

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:680um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2715qe

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4020y

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2130

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:450m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5850hq

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10a

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2610ue

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:390m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2328m

Trust: 1.0

vendor:intelmodel:core m5scope:eqversion:6y54

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:380um

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2105

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4025u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6360u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7920hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4870hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6440hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3537u

Trust: 1.0

vendor:intelmodel: - scope: - version: -

Trust: 0.8

vendor:xenmodel:xenscope:eqversion:2.0

Trust: 0.3

vendor:hpmodel:proliant dl560 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:synologymodel:dsmscope:eqversion:5.2

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:6.7

Trust: 0.3

vendor:hpmodel:proliant ml350e gen8 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant m710p server cartridgescope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl170h g6 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant xl260a gen9 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant ml330 g6 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:core x-series processor family for intel platformsscope:eqversion:x990

Trust: 0.3

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.2

Trust: 0.3

vendor:hpmodel:cloudline cl5800 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon processor e7 familyscope:eqversion:v40

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:18030

Trust: 0.3

vendor:redhatmodel:enterprise linux server tusscope:eqversion:-6.6

Trust: 0.3

vendor:vmwaremodel:vsphere data protectionscope:eqversion:6.1.6

Trust: 0.3

vendor:hpmodel:proliant ml150 g6 serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:esxiscope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endian extended update supportscope:eqversion:-7.5

Trust: 0.3

vendor:hpmodel:proliant xl170r gen9 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant sl160z g6 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl560 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:-6.5

Trust: 0.3

vendor:hpmodel:proliant xl190r gen10 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.3

Trust: 0.3

vendor:hpmodel:proliant xl750f gen9 serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.4

Trust: 0.3

vendor:hpmodel:sgi uvscope:eqversion:20000

Trust: 0.3

vendor:intelmodel:xeon processor scalable familyscope:eqversion:0

Trust: 0.3

vendor:hpmodel:cloudline cl2100 g3 807s 12g 8sffscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon processor d-2100scope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl180 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon processor e5 familyscope:eqversion:v20

Trust: 0.3

vendor:vmwaremodel:fusionscope:eqversion:10.0

Trust: 0.3

vendor:redhatmodel:virtualization hostscope:eqversion:4

Trust: 0.3

vendor:hpmodel:proliant sl170z g6 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant m710 server cartridgescope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl370 g6 serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:proliant dl180 g6 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.2.2

Trust: 0.3

vendor:hpmodel:proliant dl360p gen8 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant ml310e gen8 serverscope:eqversion:v20

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.0.3

Trust: 0.3

vendor:hpmodel:proliant bl280c g6 server bladescope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.4.3

Trust: 0.3

vendor:hpmodel:proliant ml370 g6 serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.3.1

Trust: 0.3

vendor:hpmodel:proliant bl460c g7 server bladescope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vsphere data protectionscope:eqversion:6.0.6

Trust: 0.3

vendor:hpmodel:proliant bl460c g6 server bladescope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant thin micro tm200 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl380e gen8 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant bl620c g7 server bladescope:eqversion:0

Trust: 0.3

vendor:hpmodel:cloudline cl4100 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.0.1

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:7.5

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2

Trust: 0.3

vendor:redhatmodel:enterprise linux eus compute nodescope:eqversion:6.7

Trust: 0.3

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:-7.3

Trust: 0.3

vendor:hpmodel:proliant ml350 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.6

Trust: 0.3

vendor:hpmodel:proliant dl120 g6 serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:esxiscope:eqversion:6.5

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:20120

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.5.3

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.2.3

Trust: 0.3

vendor:synologymodel:skynasscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl160 gen8 serverscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1017030

Trust: 0.3

vendor:intelmodel:core x-series processor family for intel platformsscope:eqversion:x2990

Trust: 0.3

vendor:hpmodel:proliant xl250a gen9 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.0

Trust: 0.3

vendor:redhatmodel:enterprise linux for armscope:eqversion:647

Trust: 0.3

vendor:vmwaremodel:vsphere data protectionscope:eqversion:6.1.4

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:17090

Trust: 0.3

vendor:ciscomodel:c880 m5 serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.0

Trust: 0.3

vendor:hpmodel:proliant ws460c gen9 workstationscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vsphere data protectionscope:eqversion:6.0.5

Trust: 0.3

vendor:hpmodel:proliant dl120 g7 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl380 g6 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:cloudline cl2100 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant bl685c g7 server bladescope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.4.0

Trust: 0.3

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:-7.

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1018030

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.0.4

Trust: 0.3

vendor:intelmodel:2nd generation core processorsscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.1

Trust: 0.3

vendor:redhatmodel:enterprise linux for real timescope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux eus compute nodescope:eqversion:7.5

Trust: 0.3

vendor:hpmodel:cloudline cl5200 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon processor seriesscope:eqversion:56000

Trust: 0.3

vendor:hpmodel:proliant ml110 g6 serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-7.4

Trust: 0.3

vendor:hpmodel:proliant bl490c g7 server bladescope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:fusion proscope:eqversion:10.1.1

Trust: 0.3

vendor:hpmodel:proliant dl385 g7 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon processor seriesscope:eqversion:36000

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.0

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:20120

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:7

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.11

Trust: 0.3

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v20

Trust: 0.3

vendor:intelmodel:xeon processor seriesscope:eqversion:55000

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-6.7

Trust: 0.3

vendor:intelmodel:xeon processor e5 familyscope:eqversion:v40

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.3.2

Trust: 0.3

vendor:vmwaremodel:fusion proscope:eqversion:10.1.2

Trust: 0.3

vendor:hpmodel:synergy gen9 compute modulescope:eqversion:4800

Trust: 0.3

vendor:hpmodel:proliant dl580 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.5

Trust: 0.3

vendor:synologymodel:dsmscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:synergy gen9 compute modulescope:eqversion:6200

Trust: 0.3

vendor:vmwaremodel:vsphere data protectionscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:synergy gen10 compute modulescope:eqversion:4800

Trust: 0.3

vendor:hpmodel:proliant dl160 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:cloudline cl3100 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant ml150 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 0.3

vendor:intelmodel:5th generation core processorsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:c880 m4 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:apollo gen9 serverscope:eqversion:42000

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.4.2

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.3

Trust: 0.3

vendor:hpmodel:proliant dl580 g7 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:7th generation core processorsscope:eqversion:0

Trust: 0.3

vendor:intelmodel:3rd generation core processorsscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.0.3

Trust: 0.3

vendor:vmwaremodel:vsphere integrated containersscope:eqversion:1.2

Trust: 0.3

vendor:microsoftmodel:windows server r2 for x64-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:hpmodel:cloudline cl2200 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vsphere integrated containersscope:eqversion:1.3.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.8

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:2016

Trust: 0.3

vendor:hpmodel:sgi uvscope:eqversion:3000

Trust: 0.3

vendor:vmwaremodel:esxiscope:eqversion:6.7

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endian extended update suppscope:eqversion:-7.5

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endianscope:eqversion:7

Trust: 0.3

vendor:hpmodel:integrity superdome with bl920s gen9 server bladescope:eqversion:x0

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.7

Trust: 0.3

vendor:hpmodel:cloudline cl2100 g3 806r 8sffscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:-6.6

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.3.0

Trust: 0.3

vendor:intelmodel:operating systemscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endian extended update suppscope:eqversion:-7.4

Trust: 0.3

vendor:hpmodel:proliant dl980 g7 serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux server tusscope:eqversion:-7.4

Trust: 0.3

vendor:intelmodel:xeon processor e5 familyscope:eqversion:v30

Trust: 0.3

vendor:hpmodel:proliant sl210t gen8 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:sgi uvscope:eqversion:10000

Trust: 0.3

vendor:hpmodel:cloudline cl2100 g3 407s 12g 4lffscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon processor e7 familyscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.0.2

Trust: 0.3

vendor:intelmodel:core i3 processorscope:eqversion:0

Trust: 0.3

vendor:intelmodel:6th generation core processorsscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.5

Trust: 0.3

vendor:hpmodel:superdome flex serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vsphere integrated containersscope:eqversion:1.3

Trust: 0.3

vendor:redhatmodel:enterprise linux eus compute nodescope:eqversion:7.3

Trust: 0.3

vendor:synologymodel:virtual machine managerscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v40

Trust: 0.3

vendor:hpmodel:proliant ml110 g7 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.2

Trust: 0.3

vendor:hpmodel:proliant dl580 gen8 serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:identity managerscope:eqversion:3.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.1

Trust: 0.3

vendor:hpmodel:proliant ml30 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm system zscope:eqversion:7

Trust: 0.3

vendor:hpmodel:integrity mc990 serverscope:eqversion:x0

Trust: 0.3

vendor:hpmodel:proliant ml110 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.10

Trust: 0.3

vendor:hpmodel:proliant bl490c g6 server bladescope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl360 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant m710x server cartridgescope:eqversion:0

Trust: 0.3

vendor:redhatmodel:virtualization elsscope:eqversion:-7

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1017090

Trust: 0.3

vendor:hpmodel:proliant ml350 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl320 g6 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:integrity superdome with bl920s gen8 server bladescope:eqversion:x0

Trust: 0.3

vendor:vmwaremodel:fusion proscope:eqversion:10.0

Trust: 0.3

vendor:hpmodel:proliant xl270d gen10 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant bl660c gen9 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:8th generation core processorsscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant xl190r gen9 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant xl450 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-7.5

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.1.4

Trust: 0.3

vendor:hpmodel:proliant bl680c g7 server bladescope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.6.1

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1018030

Trust: 0.3

vendor:intelmodel:4th generation core processorsscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl180 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant xl450 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux for power little endian extended update suppscope:eqversion:-7.3

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:8.10

Trust: 0.3

vendor:hpmodel:proliant sl160s g6 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl380 g7 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl170e g6 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant bl460c gen8 server bladescope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 0.3

vendor:redhatmodel:enterprise linux server tusscope:eqversion:-7.3

Trust: 0.3

vendor:hpmodel:proliant dl380 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:8.10

Trust: 0.3

vendor:intelmodel:system management modescope:eqversion:0

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:7.1

Trust: 0.3

vendor:intelmodel:xeon processor seriesscope:eqversion:75000

Trust: 0.3

vendor:citrixmodel:xenserver ltsr cu1scope:eqversion:7.1

Trust: 0.3

vendor:hpmodel:cloudline cl5200 g3 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.4.1

Trust: 0.3

vendor:hpmodel:proliant dl360 g7 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v30

Trust: 0.3

vendor:redhatmodel:rhev hypervisor for rhel-6scope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl360 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.4.4

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systems extended update supportscope:eqversion:-7.5

Trust: 0.3

vendor:vmwaremodel:vsphere integrated containersscope:eqversion:1.0

Trust: 0.3

vendor:vmwaremodel:vsphere data protectionscope:eqversion:6.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.3.1

Trust: 0.3

vendor:hpmodel:proliant dl360 g6 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v50

Trust: 0.3

vendor:redhatmodel:virtualization elsscope:eqversion:-6

Trust: 0.3

vendor:hpmodel:proliant sl2x170z g6 serverscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systems sp1scope:eqversion:7

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systems sp1scope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systems extended update supportscope:eqversion:-7.4

Trust: 0.3

vendor:redhatmodel:management agent for rhelscope:eqversion:70

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1016070

Trust: 0.3

vendor:hpmodel:proliant dl360e gen8 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:core i7 processorscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.3.1

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systems sp2scope:eqversion:2008

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systems extended update supportscope:eqversion:-6.7

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.0.0

Trust: 0.3

vendor:hpmodel:proliant bl2x220c g7 server bladescope:eqversion:0

Trust: 0.3

vendor:synologymodel:dsmscope:eqversion:6.2

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:virtualizationscope:eqversion:4

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4.1

Trust: 0.3

vendor:hpmodel:synergy gen9 compute modulescope:eqversion:6600

Trust: 0.3

vendor:hpmodel:cloudline cl2200 g3 1211r lffscope:eqversion:120

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.9

Trust: 0.3

vendor:microsoftmodel:windows version for 32-bit systemsscope:eqversion:1017090

Trust: 0.3

vendor:redhatmodel:enterprise linux server extended update supportscope:eqversion:-7.3

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.0.2

Trust: 0.3

vendor:hpmodel:proliant ml350p gen8 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:synergy gen10 compute modulescope:eqversion:6600

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.0.4

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endianscope:eqversion:7

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.2.0

Trust: 0.3

vendor:hpmodel:proliant bl460c gen10 server bladescope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl320e gen8 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant ml110 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant bl420c gen8 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.4.0

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.4

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:7.4

Trust: 0.3

vendor:hpmodel:proliant ml350 g6 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant microserver gen8scope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl580 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.1

Trust: 0.3

vendor:intelmodel:xeon processor d-1500scope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:-7.4

Trust: 0.3

vendor:hpmodel:sgi uvscope:eqversion:30000

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endian extended update supportscope:eqversion:-7.4

Trust: 0.3

vendor:vmwaremodel:vsphere integrated containersscope:eqversion:1.1

Trust: 0.3

vendor:hpmodel:proliant sl170s g6 serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ucs e-series serversscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:-7.2

Trust: 0.3

vendor:redhatmodel:enterprise linux for scientific computingscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.3

vendor:intelmodel:xeon processor e3 familyscope:eqversion:v60

Trust: 0.3

vendor:hpmodel:proliant bl660c gen8 server bladescope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endian extended update supportscope:eqversion:-6.7

Trust: 0.3

vendor:hpmodel:300hscope:eqversion:0

Trust: 0.3

vendor:intelmodel:core i5 processorscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl560 gen8 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl380p gen8 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.1.3

Trust: 0.3

vendor:redhatmodel:enterprise linux for ibm z systems extended update supportscope:eqversion:-7.3

Trust: 0.3

vendor:microsoftmodel:windows rtscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.3.0

Trust: 0.3

vendor:hpmodel:proliant xl270d gen9 accelerator tray 2u configure-to-order servscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux eus compute nodescope:eqversion:7.4

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.3.0

Trust: 0.3

vendor:vmwaremodel:vcenter serverscope:eqversion:6.5

Trust: 0.3

vendor:vmwaremodel:fusionscope:eqversion:10.1.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.4.1

Trust: 0.3

vendor:hpmodel:proliant sl390s g7 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant xl230a gen9 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:xeon processor e3 familyscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant xl730f gen9 serverscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux extended update supportscope:eqversion:7.3

Trust: 0.3

vendor:intelmodel:virtual machine managerscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant bl460c gen9 server bladescope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl60 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vsphere data protectionscope:eqversion:6.1.5

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.6.3

Trust: 0.3

vendor:intelmodel:xeon processor e7 familyscope:eqversion:v20

Trust: 0.3

vendor:intelmodel:xeon processor seriesscope:eqversion:34000

Trust: 0.3

vendor:hpmodel:proliant dl120 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.1

Trust: 0.3

vendor:vmwaremodel:fusionscope:eqversion:10.1.2

Trust: 0.3

vendor:intelmodel:xeon processor e7 familyscope:eqversion:v30

Trust: 0.3

vendor:intelmodel:software guard extensionsscope:eqversion:0

Trust: 0.3

vendor:hpmodel:synergy gen9 special compute modulescope:eqversion:6200

Trust: 0.3

vendor:hpmodel:proliant bl2x220c g6 server bladescope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant xl740f gen9 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:cloudline cl3100 g3 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:cloudline cl2100 g3 807s sffscope:eqversion:80

Trust: 0.3

vendor:hpmodel:proliant xl230k gen10 serverscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:100

Trust: 0.3

vendor:hpmodel:cloudline cl2200 g3 12g 1211r 12lffscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.1

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:7.0

Trust: 0.3

vendor:vmwaremodel:vsphere data protectionscope:eqversion:6.0.7

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.2.1

Trust: 0.3

vendor:redhatmodel:enterprise linux for powerscope:eqversion:97

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:-7.3

Trust: 0.3

vendor:redhatmodel:enterprise linux for power big endian extended update supportscope:eqversion:-7.3

Trust: 0.3

vendor:hpmodel:cloudline cl3150 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.2

Trust: 0.3

vendor:hpmodel:proliant xl170r gen10 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl380 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:intelmodel:core m processor familyscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:fusionscope:eqversion:10.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.5.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.2

Trust: 0.3

vendor:hpmodel:proliant dl120 gen10 serverscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1016070

Trust: 0.3

vendor:intelmodel:xeon processor e5 familyscope:eqversion:0

Trust: 0.3

vendor:hpmodel:300rlscope:eqversion:0

Trust: 0.3

vendor:hpmodel:cloudline cl2100 g3 407s lffscope:eqversion:40

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.6

Trust: 0.3

vendor:intelmodel:xeon processor seriesscope:eqversion:65000

Trust: 0.3

vendor:hpmodel:proliant dl80 gen9 serverscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1017030

Trust: 0.3

vendor:hpmodel:proliant ml310e gen8 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant dl160 g6 serverscope:eqversion:0

Trust: 0.3

vendor:hpmodel:proliant bl465c g7 server bladescope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#982149 // BID: 105080 // NVD: CVE-2018-3646

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-3646
value: MEDIUM

Trust: 1.0

VULHUB: VHN-133677
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-3646
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-3646
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-133677
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-3646
baseSeverity: MEDIUM
baseScore: 5.6
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.1
impactScore: 4.0
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-133677 // VULMON: CVE-2018-3646 // NVD: CVE-2018-3646

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-200

Trust: 0.1

sources: VULHUB: VHN-133677 // NVD: CVE-2018-3646

THREAT TYPE

local

Trust: 0.4

sources: BID: 105080 // PACKETSTORM: 149718

TYPE

Design Error

Trust: 0.3

sources: BID: 105080

PATCH

title:The Registerurl:https://www.theregister.co.uk/2018/08/15/foreshadow_sgx_software_attestations_collateral_damage/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2018/08/14/intel_l1_terminal_fault_bugs/

Trust: 0.2

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182387 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182388 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182389 - Security Advisory

Trust: 0.1

title:Red Hat: Important: rhev-hypervisor7 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182404 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182391 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182603 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182602 - Security Advisory

Trust: 0.1

title:Red Hat: Important: rhvm-appliance security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182402 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182392 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182396 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182393 - Security Advisory

Trust: 0.1

title:Red Hat: Important: redhat-virtualization-host security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182403 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182394 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-4274-1 xen -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=2129055bb51ebf11b86d56acef7f5da1

Trust: 0.1

title:Debian Security Advisories: DSA-4279-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=dac4eea76febd76490afc049b9aa11cb

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182384 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3823-1

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182395 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2018-3646

Trust: 0.1

title:Red Hat: CVE-2018-3646url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2018-3646

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182390 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3740-1

Trust: 0.1

title:Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3740-2

Trust: 0.1

title:Ubuntu Security Notice: intel-microcode vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3756-1

Trust: 0.1

title:Ubuntu Security Notice: linux regressionsurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-3

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-2

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2018-1058url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2018-1058

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty regressionsurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-3

Trust: 0.1

title:Amazon Linux 2: ALAS2-2018-1058url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2018-1058

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=831545c255e00dbde24c93b2cf2135d6

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Foreshadow Spectre Variant vulnerabilities affect IBM OS Image for Red Hat Linux Systems in IBM PureApplication System (CVE-2018-3615 CVE-2018-3620 CVE-2018-3646)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=f295531b3aa99d37dbc53693639947d9

Trust: 0.1

title:HP: HPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)url:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=HPSBHF03590

Trust: 0.1

title:HP: SUPPORT COMMUNICATION- SECURITY BULLETIN HPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)url:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=ba953f0879f87a755234bc0818c99c6d

Trust: 0.1

title:HP: SUPPORT COMMUNICATION- SECURITY BULLETIN HPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)url:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=deca5f6210b098f58ce384c28747b82c

Trust: 0.1

title:Huawei Security Advisories: Security Advisory - CPU Side Channel Vulnerability "L1TF"url:https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=28eb43a14c12e8c070afa60d55f86b55

Trust: 0.1

title:Cisco: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180814-cpusidechannel

Trust: 0.1

title:Forcepoint Security Advisories: Meltdown and Spectre Vulnerability CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2018-3640, CVE-2018-3639, CVE-2018-3615, CVE-2018-3620, CVE-2018-3646url:https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories&qid=459877525c31ac6029f4be4a6ea97e17

Trust: 0.1

title:Citrix Security Bulletins: XenServer Multiple Security Updatesurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=89d06253986d1cdae0f8d9ffbff97d18

Trust: 0.1

title:IBM: Potential Impact on Processors in the POWER Familyurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=cf9e1e42799edbda36ec7415288ad7f0

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Security Guardium is affected by Red Hat kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=75b9d198a73a91d81765c8b428423224

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=621cdbb127d953e0d9d06eff7dd10106

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=204a1aa9ebf7b5f47151e8b011269862

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=f655264a6935505d167bbf45f409a57b

Trust: 0.1

title:Palo Alto Networks Security Advisory: PAN-SA-2018-0011 Information about L1 Terminal Fault findingsurl:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=74b853f8cd89b12964ff841924244a71

Trust: 0.1

title:Fortinet Security Advisories: Meltdown and Spectre class vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories&qid=FG-IR-18-002

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=05b5bbd6fb289370b459faf1f4e3919d

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=55ea315dfb69fce8383762ac64250315

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM API Connect has addressed multiple vulnerabilities in Developer Portal’s dependencies – Cumulative list from June 28, 2018 to December 13, 2018url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=43da2cd72c1e378d8d94ecec029fcc61

Trust: 0.1

title:vmware-esxi-67url:https://github.com/casagency/vmware-esxi-67

Trust: 0.1

title:711552870_surl:https://github.com/Qwhqfmmx/711552870_s

Trust: 0.1

title: - url:https://github.com/teusink/Home-Security-by-OS-Hardening

Trust: 0.1

title:Network_research_reporturl:https://github.com/dongminkim0220/Network_research_report

Trust: 0.1

title:Home-Security-by-W10-Hardeningurl:https://github.com/teusink/Home-Security-by-W10-Hardening

Trust: 0.1

title:l1tf-pocurl:https://github.com/gregvish/l1tf-poc

Trust: 0.1

title:arch_linux_installation_guideurl:https://github.com/kyberdrb/arch_linux_installation_guide

Trust: 0.1

title:711552870_surl:https://github.com/yoobao55/711552870_s

Trust: 0.1

title:l1tf-demourl:https://github.com/blitz/l1tf-demo

Trust: 0.1

title:lx-port-dataurl:https://github.com/omniosorg/lx-port-data

Trust: 0.1

title:win10-regtweakurl:https://github.com/interlunar/win10-regtweak

Trust: 0.1

title:cpu-reporturl:https://github.com/rosenbergj/cpu-report

Trust: 0.1

title:specter---meltdown--checkerurl:https://github.com/vurtne/specter---meltdown--checker

Trust: 0.1

title:TEApoturl:https://github.com/github-3rr0r/TEApot

Trust: 0.1

title:TEApoturl:https://github.com/Mashiro1995/TEApot

Trust: 0.1

title: - url:https://github.com/kali973/spectre-meltdown-checker

Trust: 0.1

title:puppet-meltdownurl:https://github.com/timidri/puppet-meltdown

Trust: 0.1

title:cSpeculationControlFixesurl:https://github.com/poshsecurity/cSpeculationControlFixes

Trust: 0.1

title: - url:https://github.com/es0j/hyperbleed

Trust: 0.1

title:Linux-Toolsurl:https://github.com/minutesinch/Linux-Tools

Trust: 0.1

title:spectre-meltdownurl:https://github.com/edsonjt81/spectre-meltdown

Trust: 0.1

title:spectre-meltdown-checkerurl:https://github.com/speed47/spectre-meltdown-checker

Trust: 0.1

title: - url:https://github.com/merlinepedra25/spectre-meltdown-checker

Trust: 0.1

title: - url:https://github.com/merlinepedra/spectre-meltdown-checker

Trust: 0.1

title: - url:https://github.com/kin-cho/my-spectre-meltdown-checker

Trust: 0.1

title:Hardware-and-Firmware-Security-Guidanceurl:https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance

Trust: 0.1

title:Firmware-Securityurl:https://github.com/virusbeeE/Firmware-Security

Trust: 0.1

title:hardware-attacks-state-of-the-arturl:https://github.com/codexlynx/hardware-attacks-state-of-the-art

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/microsoft-rolls-out-new-intel-microcode-for-windows-10-server-2016/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/

Trust: 0.1

sources: VULMON: CVE-2018-3646

EXTERNAL IDS

db:NVDid:CVE-2018-3646

Trust: 2.6

db:CERT/CCid:VU#982149

Trust: 2.3

db:BIDid:105080

Trust: 1.5

db:SIEMENSid:SSA-608355

Trust: 1.2

db:SIEMENSid:SSA-254686

Trust: 1.2

db:SECTRACKid:1041451

Trust: 1.2

db:SECTRACKid:1042004

Trust: 1.2

db:LENOVOid:LEN-24163

Trust: 1.2

db:PACKETSTORMid:148896

Trust: 0.2

db:PACKETSTORMid:148991

Trust: 0.1

db:VULHUBid:VHN-133677

Trust: 0.1

db:VULMONid:CVE-2018-3646

Trust: 0.1

db:PACKETSTORMid:148941

Trust: 0.1

db:PACKETSTORMid:148903

Trust: 0.1

db:PACKETSTORMid:149010

Trust: 0.1

db:PACKETSTORMid:148936

Trust: 0.1

db:PACKETSTORMid:149718

Trust: 0.1

db:PACKETSTORMid:149142

Trust: 0.1

db:PACKETSTORMid:148934

Trust: 0.1

db:PACKETSTORMid:148946

Trust: 0.1

db:PACKETSTORMid:148906

Trust: 0.1

db:PACKETSTORMid:150083

Trust: 0.1

sources: CERT/CC: VU#982149 // VULHUB: VHN-133677 // VULMON: CVE-2018-3646 // BID: 105080 // PACKETSTORM: 148896 // PACKETSTORM: 148941 // PACKETSTORM: 148903 // PACKETSTORM: 149010 // PACKETSTORM: 148936 // PACKETSTORM: 149718 // PACKETSTORM: 149142 // PACKETSTORM: 148934 // PACKETSTORM: 148946 // PACKETSTORM: 148906 // PACKETSTORM: 150083 // NVD: CVE-2018-3646

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html

Trust: 3.1

url:https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault

Trust: 2.0

url:https://foreshadowattack.eu/

Trust: 2.0

url:https://www.kb.cert.org/vuls/id/982149

Trust: 1.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180814-cpusidechannel

Trust: 1.5

url:http://xenbits.xen.org/xsa/advisory-273.html

Trust: 1.5

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180018

Trust: 1.5

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03874en_us

Trust: 1.4

url:https://security.gentoo.org/glsa/201810-06

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2387

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2393

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2396

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2403

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2404

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2602

Trust: 1.3

url:http://www.securityfocus.com/bid/105080

Trust: 1.2

url:http://support.lenovo.com/us/en/solutions/len-24163

Trust: 1.2

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en

Trust: 1.2

url:http://www.vmware.com/security/advisories/vmsa-2018-0020.html

Trust: 1.2

url:https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf

Trust: 1.2

url:https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

Trust: 1.2

url:https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0

Trust: 1.2

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0010

Trust: 1.2

url:https://security.netapp.com/advisory/ntap-20180815-0001/

Trust: 1.2

url:https://support.f5.com/csp/article/k31300402

Trust: 1.2

url:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Trust: 1.2

url:https://www.synology.com/support/security/synology_sa_18_45

Trust: 1.2

url:https://www.debian.org/security/2018/dsa-4274

Trust: 1.2

url:https://www.debian.org/security/2018/dsa-4279

Trust: 1.2

url:https://security.freebsd.org/advisories/freebsd-sa-18:09.l1tf.asc

Trust: 1.2

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 1.2

url:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Trust: 1.2

url:https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html

Trust: 1.2

url:https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2384

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2388

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2389

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2390

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2391

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2392

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2394

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2395

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2402

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2603

Trust: 1.2

url:http://www.securitytracker.com/id/1041451

Trust: 1.2

url:http://www.securitytracker.com/id/1042004

Trust: 1.2

url:https://usn.ubuntu.com/3740-1/

Trust: 1.2

url:https://usn.ubuntu.com/3740-2/

Trust: 1.2

url:https://usn.ubuntu.com/3741-1/

Trust: 1.2

url:https://usn.ubuntu.com/3741-2/

Trust: 1.2

url:https://usn.ubuntu.com/3742-1/

Trust: 1.2

url:https://usn.ubuntu.com/3742-2/

Trust: 1.2

url:https://usn.ubuntu.com/3756-1/

Trust: 1.2

url:https://usn.ubuntu.com/3823-1/

Trust: 1.2

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/xrfkqwyv2h4bv75cungcge5tnvqclbgz/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/v4uwgorqwcencif2bhwuef2odbv75qs2/

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-3646

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-3620

Trust: 1.0

url:https://www.usenix.org/conference/usenixsecurity18/presentation/bulck

Trust: 0.8

url:https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html

Trust: 0.8

url:https://www.intel.com/content/dam/www/public/us/en/documents/sa00115-microcode-update-guidance.pdf

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2018-3620

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2018-3646

Trust: 0.8

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://access.redhat.com/security/vulnerabilities/l1tf

Trust: 0.4

url:http://www.intel.com/content/www/us/en/homepage.html

Trust: 0.3

url:http://www.microsoft.com

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1585005

Trust: 0.3

url:http://xenbits.xenproject.org/xsa/advisory-289.html

Trust: 0.3

url:https://www.synology.com/en-global/support/security/synology_sa_18_45

Trust: 0.3

url:https://www.vmware.com/in/security/advisories/vmsa-2018-0020.html

Trust: 0.3

url:https://www.vmware.com/in/security/advisories/vmsa-2018-0021.html

Trust: 0.3

url:http://xenbits.xenproject.org/xsa/advisory-289.txt

Trust: 0.3

url:https://support.citrix.com/article/ctx236548

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/articles/2974891

Trust: 0.2

url:https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

Trust: 0.2

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03874en_us

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/xrfkqwyv2h4bv75cungcge5tnvqclbgz/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/v4uwgorqwcencif2bhwuef2odbv75qs2/

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://github.com/casagency/vmware-esxi-67

Trust: 0.1

url:https://github.com/teusink/home-security-by-w10-hardening

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://docs.vmware.com/en/vmware-fusion/index.html

Trust: 0.1

url:https://kb.vmware.com/kb/57138

Trust: 0.1

url:https://www.vmware.com/go/downloadfusion

Trust: 0.1

url:https://kb.vmware.com/kb/56895

Trust: 0.1

url:https://twitter.com/vmwaresrc

Trust: 0.1

url:https://docs.vmware.com/en/vmware-vsphere/6.5/rn/vsphere-vcenter-server-65u2c-release-notes.html

Trust: 0.1

url:https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/5_5

Trust: 0.1

url:https://docs.vmware.com/en/vmware-workstation-player/index.html

Trust: 0.1

url:https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:https://blogs.vmware.com/security

Trust: 0.1

url:https://kb.vmware.com/kb/55806

Trust: 0.1

url:https://kb.vmware.com/kb/56537

Trust: 0.1

url:https://kb.vmware.com/kb/1055

Trust: 0.1

url:https://kb.vmware.com/kb/56552

Trust: 0.1

url:https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/6_5

Trust: 0.1

url:https://kb.vmware.com/kb/56896

Trust: 0.1

url:https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/6_0

Trust: 0.1

url:https://docs.vmware.com/en/vmware-workstation-pro/index.html

Trust: 0.1

url:https://docs.vmware.com/en/vmware-vsphere/5.5/rn/vsphere-vcenter-server-55u3j-release-notes.html

Trust: 0.1

url:https://kb.vmware.com/kb/56547

Trust: 0.1

url:https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/6_7

Trust: 0.1

url:https://kb.vmware.com/kb/55636

Trust: 0.1

url:https://docs.vmware.com/en/vmware-vsphere/6.0/rn/vsphere-vcenter-server-60u3h-release-notes.html

Trust: 0.1

url:https://kb.vmware.com/kb/56558

Trust: 0.1

url:https://kb.vmware.com/kb/56897

Trust: 0.1

url:https://www.vmware.com/go/downloadplayer

Trust: 0.1

url:https://kb.vmware.com/kb/56538

Trust: 0.1

url:https://kb.vmware.com/kb/56557

Trust: 0.1

url:https://kb.vmware.com/kb/56894

Trust: 0.1

url:https://kb.vmware.com/kb/56563

Trust: 0.1

url:https://docs.vmware.com/en/vmware-vsphere/6.7/rn/vsphere-vcenter-server-670d-release-notes.html

Trust: 0.1

url:https://kb.vmware.com/kb/56553

Trust: 0.1

url:https://my.vmware.com/group/vmware/patch

Trust: 0.1

url:https://www.vmware.com/support/policies/lifecycle.html

Trust: 0.1

url:https://www.vmware.com/go/downloadworkstation

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3646

Trust: 0.1

url:https://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:https://www.vmware.com/security/advisories

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-5390

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5390

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-3639

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-3639

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://security.freebsd.org/>.

Trust: 0.1

url:https://security.freebsd.org/patches/sa-18:09/l1tf-11.1.patch

Trust: 0.1

url:https://security.freebsd.org/patches/sa-18:09/l1tf-11.2.patch

Trust: 0.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html>

Trust: 0.1

url:https://security.freebsd.org/advisories/freebsd-sa-18:09.l1tf.asc>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-18:09/l1tf-11.2.patch.asc

Trust: 0.1

url:https://security.freebsd.org/patches/sa-18:09/l1tf-11.1.patch.asc

Trust: 0.1

url:https://www.freebsd.org/handbook/kernelconfig.html>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3620>

Trust: 0.1

url:https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3646>

Trust: 0.1

url:https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15572

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-6555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14633

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15594

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-17182

Trust: 0.1

url:https://wiki.ubuntu.com/securityteam/knowledgebase/l1tf

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10901

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5244

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7542

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12892

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10471

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12891

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5753

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12893

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10982

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15469

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10472

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5754

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10981

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5715

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15468

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15470

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7541

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7540

Trust: 0.1

sources: CERT/CC: VU#982149 // VULHUB: VHN-133677 // VULMON: CVE-2018-3646 // BID: 105080 // PACKETSTORM: 148896 // PACKETSTORM: 148941 // PACKETSTORM: 148903 // PACKETSTORM: 149010 // PACKETSTORM: 148936 // PACKETSTORM: 149718 // PACKETSTORM: 149142 // PACKETSTORM: 148934 // PACKETSTORM: 148946 // PACKETSTORM: 148906 // PACKETSTORM: 150083 // NVD: CVE-2018-3646

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 148941 // PACKETSTORM: 148903 // PACKETSTORM: 149142 // PACKETSTORM: 148946 // PACKETSTORM: 148906

SOURCES

db:CERT/CCid:VU#982149
db:VULHUBid:VHN-133677
db:VULMONid:CVE-2018-3646
db:BIDid:105080
db:PACKETSTORMid:148896
db:PACKETSTORMid:148941
db:PACKETSTORMid:148903
db:PACKETSTORMid:149010
db:PACKETSTORMid:148936
db:PACKETSTORMid:149718
db:PACKETSTORMid:149142
db:PACKETSTORMid:148934
db:PACKETSTORMid:148946
db:PACKETSTORMid:148906
db:PACKETSTORMid:150083
db:NVDid:CVE-2018-3646

LAST UPDATE DATE

2025-06-19T20:05:51.733000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#982149date:2018-09-10T00:00:00
db:VULHUBid:VHN-133677date:2020-08-24T00:00:00
db:VULMONid:CVE-2018-3646date:2023-11-07T00:00:00
db:BIDid:105080date:2019-01-24T11:00:00
db:NVDid:CVE-2018-3646date:2024-11-21T04:05:50.020

SOURCES RELEASE DATE

db:CERT/CCid:VU#982149date:2018-08-15T00:00:00
db:VULHUBid:VHN-133677date:2018-08-14T00:00:00
db:VULMONid:CVE-2018-3646date:2018-08-14T00:00:00
db:BIDid:105080date:2018-08-14T00:00:00
db:PACKETSTORMid:148896date:2018-08-15T04:36:40
db:PACKETSTORMid:148941date:2018-08-15T17:16:28
db:PACKETSTORMid:148903date:2018-08-15T04:39:03
db:PACKETSTORMid:149010date:2018-08-20T17:06:29
db:PACKETSTORMid:148936date:2018-08-15T17:09:03
db:PACKETSTORMid:149718date:2018-10-08T23:55:14
db:PACKETSTORMid:149142date:2018-08-30T23:36:28
db:PACKETSTORMid:148934date:2018-08-14T19:02:22
db:PACKETSTORMid:148946date:2018-08-15T17:17:34
db:PACKETSTORMid:148906date:2018-08-15T04:40:04
db:PACKETSTORMid:150083date:2018-10-31T01:14:40
db:NVDid:CVE-2018-3646date:2018-08-14T19:29:00.920