ID

VAR-201801-0826


CVE

CVE-2017-5715


TITLE

CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks

Trust: 0.8

sources: CERT/CC: VU#180049

DESCRIPTION

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Has speculative execution function and out-of-order execution function CPU Several researchers have reported methods of performing side-channel attacks against Has speculative execution function and out-of-order execution function CPU side-channel attack method against (Spectre and Meltdown) has been reported. For more information, Google Project Zero blog post in ("Reading privileged memory with a side-channel") or Graz University of Technology (TU Graz) information from researchers in ("Meltdown and Spectre") Please refer to. "Reading privileged memory with a side-channel"https://googleprojectzero.blogspot.jp/2018/01/reading-privileged-memory-with-side.html"Meltdown and Spectre"https://meltdownattack.com/Sensitive information can be obtained from processes running with user privileges. Spectre As for the attack, crafted Javascript by the code Javascript cannot be obtained from web It has been reported that data can be obtained during the browser process. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \"melts\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \"cross-border\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Intel Xeon CPU E5-1650 v3, v2, v4 versions; Xeon E3-1265l v2, v3, v4 Version; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. By now, we're sure most everyone have heard of the Meltdown and Spectre attacks. If not, head over to https://meltdownattack.com/ and get an overview. https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html The FreeBSD Security Team was notified of the issue in late December and received a briefing under NDA with the original embargo date of January 9th. Since we received relatively late notice of the issue, our ability to provide fixes is delayed. Meltdown (CVE-2017-5754) ~~~~~~~~~~~~~~~~~~~~~~~~ In terms of priority, the first step is to mitigate against the Meltdown attack (CVE-2017-5754, cited as variant 3 by Project Zero). Work for this is ongoing, but due to the relatively large changes needed, this is going to take a little while. We are currently targeting patches for amd64 being dev complete this week with testing probably running into next week. From there, we hope to give it a short bake time before pushing it into the 11.1-RELEASE branch. Additional work will be required to bring the mitigation to 10.3-RELEASE and 10.4-RELEASE. The code will be selectable via a tunable which will automatically turn on for modern Intel processors and off for AMD processors (since they are reportedly not vulnerable). Since the fix for Meltdown does incur a performance hit for any transition between user space and kernel space, this could be rather impactful depending on the workload. As such, the tunable can also be overridden by the end-user if they are willing to accept the risk. Initial work can be tracked at https://reviews.freebsd.org/D13797. Please note this is a work in progress and some stuff is likely to be broken. Spectre (CVE-2017-5753 and CVE-2017-5715) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ When it comes to the Spectre vulnerabilities, it is much harder to sort these out. Variant 1 (CVE-2017-5753) is going to require some static analysis to determine vulnerable use cases that will require barriers to stop speculation from disclosing information it shouldn't. While we haven't done the analysis to determine where we are vulnerable, the number of cases here are supposed to be pretty small. Apparently there have been some Coverity rules developed to help look for these, but we are still evaluating what can be done here. The other half of Spectre, variant 2 (CVE-2017-5715) is a bit trickier as it affects both normal processes and bhyve. There is a proposed patch for LLVM (https://reviews.llvm.org/D41723) that introduces a concept called 'retpoline' which mitigates this issue. We are likely to pull this into HEAD and 11-STABLE once it hits the LLVM tree. Unfortunately, the currently supported FreeBSD releases are using older versions of LLVM for which we are not sure the LLVM project will produce patches. We will be looking at the feasibility to backport these patches to these earlier versions. There are CPU microcode fixes coming out when in concert with OS changes would also help, but that's a bit down the road at the moment. If anything significantly changes I will make additional posts to clarify as the information becomes available. Best regards, Gordon Tetlow with security-officer hat on . ========================================================================== Ubuntu Security Notice USN-3582-1 February 22, 2018 linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS Summary: Several security issues were fixed in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2017-17712) Laurent Guerby discovered that the mbcache feature in the ext2 and ext4 filesystems in the Linux kernel improperly handled xattr block caching. A local attacker could use this to cause a denial of service. (CVE-2015-8952) Vitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel did not properly track reference counts when merging buffers. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2017-12190) ChunYu Wang discovered that a use-after-free vulnerability existed in the SCTP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code, (CVE-2017-15115) Mohamed Ghannam discovered a use-after-free vulnerability in the DCCP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-8824) USN-3540-1 mitigated CVE-2017-5715 (Spectre Variant 2) for the amd64 architecture in Ubuntu 16.04 LTS. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5715) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: linux-image-4.4.0-1019-kvm 4.4.0-1019.24 linux-image-4.4.0-1052-aws 4.4.0-1052.61 linux-image-4.4.0-1085-raspi2 4.4.0-1085.93 linux-image-4.4.0-1087-snapdragon 4.4.0-1087.92 linux-image-4.4.0-116-generic 4.4.0-116.140 linux-image-4.4.0-116-generic-lpae 4.4.0-116.140 linux-image-4.4.0-116-lowlatency 4.4.0-116.140 linux-image-4.4.0-116-powerpc-e500mc 4.4.0-116.140 linux-image-4.4.0-116-powerpc-smp 4.4.0-116.140 linux-image-4.4.0-116-powerpc64-emb 4.4.0-116.140 linux-image-4.4.0-116-powerpc64-smp 4.4.0-116.140 linux-image-aws 4.4.0.1052.54 linux-image-generic 4.4.0.116.122 linux-image-generic-lpae 4.4.0.116.122 linux-image-kvm 4.4.0.1019.18 linux-image-lowlatency 4.4.0.116.122 linux-image-powerpc-e500mc 4.4.0.116.122 linux-image-powerpc-smp 4.4.0.116.122 linux-image-powerpc64-emb 4.4.0.116.122 linux-image-powerpc64-smp 4.4.0.116.122 linux-image-raspi2 4.4.0.1085.85 linux-image-snapdragon 4.4.0.1087.79 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. Relevant releases/architectures: Management Agent for RHEL 7 Hosts - ppc64le, x86_64 3. 6) - i386, x86_64 3. Description: Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm package provides the user-space component for running virtual machines that use KVM. Once all virtual machines have shut down, start them again for this update to take effect. Ubuntu is working with Intel and AMD to provide future microcode updates that implement IBRS and IBPB as they are made available. Ubuntu users with a processor from a different vendor should contact the vendor to identify necessary firmware updates. Ubuntu will provide corresponding QEMU updates in the future for users of self-hosted virtual environments in coordination with upstream QEMU. Ubuntu users in cloud environments should contact the cloud provider to confirm that the hypervisor has been updated to expose the new CPU features to virtual machines. CVE-2017-5715 Multiple researchers have discovered a vulnerability in various processors supporting speculative execution, enabling an attacker controlling an unprivileged process to read memory from arbitrary addresses, including from the kernel and all other processes running on the system. CVE-2017-5754 Multiple researchers have discovered a vulnerability in Intel processors, enabling an attacker controlling an unprivileged process to read memory from arbitrary addresses, including from the kernel and all other processes running on the system. This specific attack has been named Meltdown and is addressed in the Linux kernel on the powerpc/ppc64el architectures by flushing the L1 data cache on exit from kernel mode to user mode (or from hypervisor to kernel). This works on Power7, Power8 and Power9 processors. CVE-2017-13166 A bug in the 32-bit compatibility layer of the v4l2 IOCTL handling code has been found. Memory protections ensuring user-provided buffers always point to userland memory were disabled, allowing . This bug could be exploited by an attacker to overwrite kernel memory from an unprivileged userland process, leading to privilege escalation. The acpi_smbus_hc_add() prints a kernel address in the kernel log at every boot, which could be used by an attacker on the system to defeat kernel ASLR. Additionnaly to those vulnerability, some mitigations for CVE-2017-5753 are included in this release. CVE-2017-5753 Multiple researchers have discovered a vulnerability in various processors supporting speculative execution, enabling an attacker controlling an unprivileged process to read memory from arbitrary addresses, including from the kernel and all other processes running on the system. This specific attack has been named Spectre variant 1 (bounds-check bypass) and is mitigated in the Linux kernel architecture by identifying vulnerable code sections (array bounds checking followed by array access) and replacing the array access with the speculation-safe array_index_nospec() function. More use sites will be added over time. For the stable distribution (stretch), these problems have been fixed in version 4.9.82-1+deb9u2. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlqO5kYACgkQ3rYcyPpX RFtjkgf9HK7sq/xNOFjZsc3iaVNdzDhDEth8ql/Q9WsbDP9JmlrwmlTsD/QAgXgx m9zIIJzyI9Dry60bVvYZHFrtYhQXX5zp9DYa89oinHv+1UxzaYHTHsNoh326k86n QUcDLYe2+JJgi/2KjLqfFfa5zgMqUNj3C6iBDezs0tCfE/QZAmAX7aA7A3mTJYLB 3v2tSoEeW0fb9M5Ic2QHJD1TW6NU+j6zaUeJRyhj7lthmyOcNxwTIrt2CswDnLUI tCMtzdce6OWAW5xXQxHwzzf5+vRvmm/f+wM2V3WTcA1Q0tfA5cZGFe2SMOhyGKtf KG1ziLYIY0OdCtdxj0K/wEzpe6cikg== =B81o -----END PGP SIGNATURE----- . X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 04 Jan 2018 21:59:52 +0000 (UTC) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libvirt security update Advisory ID: RHSA-2018:0029-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:0029 Issue date: 2018-01-04 ===================================================================== 1. Summary: An update for libvirt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) Note: This is the libvirt side of the CVE-2017-5715 mitigation. Red Hat would like to thank Google Project Zero for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the updated packages, libvirtd will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libvirt-3.2.0-14.el7_4.7.src.rpm x86_64: libvirt-3.2.0-14.el7_4.7.x86_64.rpm libvirt-client-3.2.0-14.el7_4.7.i686.rpm libvirt-client-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-libs-3.2.0-14.el7_4.7.i686.rpm libvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-devel-3.2.0-14.el7_4.7.i686.rpm libvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm libvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm libvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm libvirt-nss-3.2.0-14.el7_4.7.i686.rpm libvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libvirt-3.2.0-14.el7_4.7.src.rpm x86_64: libvirt-client-3.2.0-14.el7_4.7.i686.rpm libvirt-client-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-libs-3.2.0-14.el7_4.7.i686.rpm libvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libvirt-3.2.0-14.el7_4.7.x86_64.rpm libvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-devel-3.2.0-14.el7_4.7.i686.rpm libvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm libvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm libvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm libvirt-nss-3.2.0-14.el7_4.7.i686.rpm libvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libvirt-3.2.0-14.el7_4.7.src.rpm ppc64: libvirt-3.2.0-14.el7_4.7.ppc64.rpm libvirt-client-3.2.0-14.el7_4.7.ppc.rpm libvirt-client-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.ppc64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc64.rpm libvirt-devel-3.2.0-14.el7_4.7.ppc.rpm libvirt-devel-3.2.0-14.el7_4.7.ppc64.rpm libvirt-docs-3.2.0-14.el7_4.7.ppc64.rpm libvirt-libs-3.2.0-14.el7_4.7.ppc.rpm libvirt-libs-3.2.0-14.el7_4.7.ppc64.rpm ppc64le: libvirt-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-client-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-kvm-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-devel-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-docs-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-libs-3.2.0-14.el7_4.7.ppc64le.rpm s390x: libvirt-3.2.0-14.el7_4.7.s390x.rpm libvirt-client-3.2.0-14.el7_4.7.s390.rpm libvirt-client-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.s390x.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.s390.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.s390x.rpm libvirt-devel-3.2.0-14.el7_4.7.s390.rpm libvirt-devel-3.2.0-14.el7_4.7.s390x.rpm libvirt-docs-3.2.0-14.el7_4.7.s390x.rpm libvirt-libs-3.2.0-14.el7_4.7.s390.rpm libvirt-libs-3.2.0-14.el7_4.7.s390x.rpm x86_64: libvirt-3.2.0-14.el7_4.7.x86_64.rpm libvirt-client-3.2.0-14.el7_4.7.i686.rpm libvirt-client-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-devel-3.2.0-14.el7_4.7.i686.rpm libvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm libvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm libvirt-libs-3.2.0-14.el7_4.7.i686.rpm libvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: libvirt-admin-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.ppc64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc64.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.ppc64.rpm libvirt-login-shell-3.2.0-14.el7_4.7.ppc64.rpm libvirt-nss-3.2.0-14.el7_4.7.ppc.rpm libvirt-nss-3.2.0-14.el7_4.7.ppc64.rpm ppc64le: libvirt-admin-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-login-shell-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-nss-3.2.0-14.el7_4.7.ppc64le.rpm s390x: libvirt-admin-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.s390x.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.s390.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.s390x.rpm libvirt-login-shell-3.2.0-14.el7_4.7.s390x.rpm libvirt-nss-3.2.0-14.el7_4.7.s390.rpm libvirt-nss-3.2.0-14.el7_4.7.s390x.rpm x86_64: libvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm libvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm libvirt-nss-3.2.0-14.el7_4.7.i686.rpm libvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libvirt-3.2.0-14.el7_4.7.src.rpm x86_64: libvirt-3.2.0-14.el7_4.7.x86_64.rpm libvirt-client-3.2.0-14.el7_4.7.i686.rpm libvirt-client-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-devel-3.2.0-14.el7_4.7.i686.rpm libvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm libvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm libvirt-libs-3.2.0-14.el7_4.7.i686.rpm libvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm libvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm libvirt-nss-3.2.0-14.el7_4.7.i686.rpm libvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/speculativeexecution https://access.redhat.com/security/cve/CVE-2017-5715 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFaTqHGXlSAg2UNWIIRAqU0AJ4kW5jfB1/d31je9rJnSEYgTU0AkACePaGb JMcjV72SLzcYR7FMBsK/U/k= =AU7P -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact. In this update mitigations for x86-64 architecture are provided. (CVE-2017-5715, Important) Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. (CVE-2017-5754, Important) Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Software Description: - intel-microcode: Processor microcode for Intel CPUs Details: USN-3531-1 updated Intel microcode to the 20180108 release. Regressions were discovered in the microcode updates which could cause system instability on certain hardware platforms. At the request of Intel, we have reverted to the previous packaged microcode version, the 20170707 release. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] Slackware 14.2 kernel (SSA:2018-037-01) New kernel packages are available for Slackware 14.2 to mitigate the speculative side channel attack known as Spectre variant 2. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/linux-4.4.115/*: Upgraded. This kernel includes full retpoline mitigation for the Spectre (variant 2) speculative side channel attack. Please note that this kernel was compiled with gcc-5.5.0, also provided as an update for Slackware 14.2. You'll need to install the updated gcc in order to compile kernel modules that will load into this updated kernel. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated packages for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.115/kernel-firmware-20180201_2aa2ac2-noarch-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.115/kernel-generic-4.4.115-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.115/kernel-generic-smp-4.4.115_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.115/kernel-headers-4.4.115_smp-x86-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.115/kernel-huge-4.4.115-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.115/kernel-huge-smp-4.4.115_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.115/kernel-modules-4.4.115-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.115/kernel-modules-smp-4.4.115_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.115/kernel-source-4.4.115_smp-noarch-1.txz Updated packages for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.115/kernel-firmware-20180201_2aa2ac2-noarch-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.115/kernel-generic-4.4.115-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.115/kernel-headers-4.4.115-x86-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.115/kernel-huge-4.4.115-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.115/kernel-modules-4.4.115-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.115/kernel-source-4.4.115-noarch-1.txz MD5 signatures: +-------------+ Slackware 14.2 packages: 1ea8df1a6e5a76e8cb875aba9f42993b kernel-firmware-20180201_2aa2ac2-noarch-1.txz 65ae3758100bf107ff3c23897ef1b5f9 kernel-generic-4.4.115-i586-1.txz c683178111756209c6dc1755e525e833 kernel-generic-smp-4.4.115_smp-i686-1.txz 0c5cca7eb08d4887f88b615a4a832e6e kernel-headers-4.4.115_smp-x86-1.txz 45397272b94b844c25ae3d13b9409f91 kernel-huge-4.4.115-i586-1.txz b326f2b6d30671f5917f7d1e9a00511b kernel-huge-smp-4.4.115_smp-i686-1.txz 6a1a72436299fdd149fabd67e5db9a00 kernel-modules-4.4.115-i586-1.txz bd1e7630fb6dd94f84d317fa55cb60f5 kernel-modules-smp-4.4.115_smp-i686-1.txz 74e80a52b163efde642a826e12f3ee0a kernel-source-4.4.115_smp-noarch-1.txz Slackware x86_64 14.2 packages: 1ea8df1a6e5a76e8cb875aba9f42993b kernel-firmware-20180201_2aa2ac2-noarch-1.txz be30a72f8fda706d0a36e11e71652301 kernel-generic-4.4.115-x86_64-1.txz 2e6dd637df1bbc83dab278c0fb9a1ffc kernel-headers-4.4.115-x86-1.txz 8d00477072ed624b4000e5ff9f260d57 kernel-huge-4.4.115-x86_64-1.txz e60a0f4aa1a8cc031db89b1d68b4e366 kernel-modules-4.4.115-x86_64-1.txz c4f92ddedc88105adcf4eafe863c2de6 kernel-source-4.4.115-noarch-1.txz Installation instructions: +------------------------+ Upgrade the packages as root: # upgradepkg kernel-*.txz If you are using an initrd, you'll need to rebuild it. For a 32-bit SMP machine, use this command (substitute the appropriate kernel version if you are not running Slackware 14.2): # /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.115-smp | bash For a 64-bit machine, or a 32-bit uniprocessor machine, use this command (substitute the appropriate kernel version if you are not running Slackware 14.2): # /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.115 | bash Please note that "uniprocessor" has to do with the kernel you are running, not with the CPU. Most systems should run the SMP kernel (if they can) regardless of the number of cores the CPU has. If you aren't sure which kernel you are running, run "uname -a". If you see SMP there, you are running the SMP kernel and should use the 4.4.115-smp version when running mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit systems should always use 4.4.115 as the version. If you are using lilo or elilo to boot the machine, you'll need to ensure that the machine is properly prepared before rebooting. If using LILO: By default, lilo.conf contains an image= line that references a symlink that always points to the correct kernel. No editing should be required unless your machine uses a custom lilo.conf. If that is the case, be sure that the image= line references the correct kernel file. Either way, you'll need to run "lilo" as root to reinstall the boot loader. If using elilo: Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish to use, and then run eliloconfig to update the EFI System Partition. +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address

Trust: 4.05

sources: NVD: CVE-2017-5715 // JVNDB: JVNDB-2018-001001 // CERT/CC: VU#180049 // CNVD: CNVD-2018-00302 // VULHUB: VHN-113918 // PACKETSTORM: 145710 // PACKETSTORM: 145769 // PACKETSTORM: 146526 // PACKETSTORM: 145656 // PACKETSTORM: 145663 // PACKETSTORM: 146014 // PACKETSTORM: 146530 // PACKETSTORM: 145678 // PACKETSTORM: 145654 // PACKETSTORM: 145655 // PACKETSTORM: 146009 // PACKETSTORM: 146283

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-00302

AFFECTED PRODUCTS

vendor:intelmodel:core i3scope:eqversion:550

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2516

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100e

Trust: 1.0

vendor:intelmodel:xeon e5 2608l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697_v2

Trust: 1.0

vendor:intelmodel:xeon e5 1680 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium jscope:eqversion:j2900

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3405

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2620m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3610me

Trust: 1.0

vendor:intelmodel:xeon e5 2618l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4158u

Trust: 1.0

vendor:intelmodel:xeon e3 1275l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3245

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5618

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6146

Trust: 1.0

vendor:intelmodel:xeon e5 2637scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4360u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2400

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4720hq

Trust: 1.0

vendor:intelmodel:xeon e3 1125cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5540

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2558

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3827

Trust: 1.0

vendor:intelmodel:xeon e5 2620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640_v3

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7230

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8170

Trust: 1.0

vendor:intelmodel:xeon e5 2448lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:w3680

Trust: 1.0

vendor:intelmodel:xeon e3 1278l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:8350k

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3570

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2550

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8860_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2830

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4308u

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4860_v2

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6142

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7290

Trust: 1.0

vendor:intelmodel:xeon e3 1505l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m7scope:eqversion:6y75

Trust: 1.0

vendor:intelmodel:xeon e5 2403scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7295

Trust: 1.0

vendor:intelmodel:xeon e3 1235l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4610y

Trust: 1.0

vendor:intelmodel:xeon e5 1630 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6287u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2430lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:840qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5350h

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2520m

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5649

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4030y

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4657l_v2

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:ec5549

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4603_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3840qm

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3958

Trust: 1.0

vendor:intelmodel:xeon e5 1660 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6260u

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2420

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:470um

Trust: 1.0

vendor:intelmodel:xeon e5 2650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3689y

Trust: 1.0

vendor:intelmodel:xeon e3 1245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830_v4

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j1850

Trust: 1.0

vendor:intelmodel:xeon e5 2418lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658a_v3

Trust: 1.0

vendor:intelmodel:xeon e5 2630 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3150

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6006u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2683_v4

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3805

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3210

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2300

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2508

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2629m

Trust: 1.0

vendor:intelmodel:xeon e5 2407 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5607

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2467m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2637m

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4607

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4600u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620ue

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770t

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8850

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3250t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3520m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2115c

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x7550

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4160t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4710mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4765t

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2718

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n4000

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4660_v4

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2435m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3120me

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1585_v5

Trust: 1.0

vendor:intelmodel:xeon e5 2450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2609 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:w3690

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2102

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2807

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5557u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4005u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3820qm

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830_v2

Trust: 1.0

vendor:intelmodel:xeon e3 1265l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5530

Trust: 1.0

vendor:intelmodel:xeon e5 2430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7230f

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5287u

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3000

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2655le

Trust: 1.0

vendor:intelmodel:xeon e3 1240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2675qm

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3775d

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658_v2

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3240t

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4807

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850_v3

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4669_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4890_v2

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4108

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8176

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:540m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4110e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3230m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520m

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3235rk

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3615qe

Trust: 1.0

vendor:intelmodel:xeon e3 1290 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2348m

Trust: 1.0

vendor:intelmodel:xeon e5 2438l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2440 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1585l_v5

Trust: 1.0

vendor:intelmodel:xeon e3 1260lscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:ltversion:5.2.6

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4910mq

Trust: 1.0

vendor:intelmodel:xeon e5 2428l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5scope:eqversion:6y57

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3210m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790s

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3745

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:430um

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j1750

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2840

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2715qe

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2670_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880l_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:990x

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:380m

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8156

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2810

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:17.10

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6126t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5250u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2400s

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5680

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160f

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4950hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e6540

Trust: 1.0

vendor:intelmodel:xeon e3 1286l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4010y

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2125

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:w3670

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4440s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4710hq

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2760

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2330m

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2730

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y31

Trust: 1.0

vendor:intelmodel:xeon e5 2428l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697_v4

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3775

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4880_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4220y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3227u

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j3455

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:w5590

Trust: 1.0

vendor:intelmodel:xeon e5 2620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:390m

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5630

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3825

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2830

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2695_v4

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4250u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5775r

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8700

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5675c

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:661

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8164

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4012y

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:530

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2870

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8176f

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:560

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4850hq

Trust: 1.0

vendor:intelmodel:xeon e3 1275scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2608l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4712mq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690t

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5630

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5500u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4422e

Trust: 1.0

vendor:intelmodel:xeon e5 2440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2695_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3115c

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4860hq

Trust: 1.0

vendor:intelmodel:xeon e3 1220l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650_v3

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7235

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340m

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3010

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7285

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3050

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1545m_v5

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3338

Trust: 1.0

vendor:intelmodel:xeon e3 1235scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4430s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6300u

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n4200

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2510e

Trust: 1.0

vendor:intelmodel:xeon e3 1268l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4170

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4410e

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:7y30

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j1800

Trust: 1.0

vendor:intelmodel:xeon e5 1660 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1285 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2870_v2

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4628l_v4

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2628l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4160

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3736g

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5350u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2410m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5020u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:940

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3380m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2820qm

Trust: 1.0

vendor:intelmodel:xeon e5 1620 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2628l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2330e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3517ue

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690_v2

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8890_v2

Trust: 1.0

vendor:intelmodel:xeon e5 1680 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5scope:eqversion:6y54

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4800mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700hq

Trust: 1.0

vendor:intelmodel:xeon e3 1105c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4760hq

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6130f

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3826

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:560m

Trust: 1.0

vendor:intelmodel:xeon e3 1260l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1578l_v5

Trust: 1.0

vendor:intelmodel:xeon e5 1428l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4114

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4110

Trust: 1.0

vendor:intelmodel:xeon e3 1505m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3437u

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2890_v2

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1505m_v6

Trust: 1.0

vendor:intelmodel:xeon e5 2630 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4400e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6150

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6140

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2930

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6267u

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v3scope:eqversion: -

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6440hq

Trust: 1.0

vendor:intelmodel:xeon e5 2470 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e7520

Trust: 1.0

vendor:intelmodel:xeon e5 2403 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8891_v3

Trust: 1.0

vendor:intelmodel:xeon e3 12201 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2365m

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4340m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:860

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2430m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4258u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:380um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500t

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4627_v2

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j3160

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4430

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4310m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5575r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702ec

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4360t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6400

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670k

Trust: 1.0

vendor:intelmodel:xeon e3 1505l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5700hq

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2418l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5502

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8890_v3

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4350t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3250

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3750

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640lm

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2648l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735g

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:670

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6200u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:980x

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3610qm

Trust: 1.0

vendor:intelmodel:xeon bronze 3104scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520um

Trust: 1.0

vendor:intelmodel:xeon e5 1428lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2428lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1240l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6300

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870_v4

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4116

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4025u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4260u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100te

Trust: 1.0

vendor:intelmodel:xeon e3 1290scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4860

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3815

Trust: 1.0

vendor:intelmodel:xeon e5 1620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2670_v2

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2695_v3

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4655_v4

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7210f

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:lc5518

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8891_v2

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3708

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6132

Trust: 1.0

vendor:intelmodel:xeon e5 2620 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3808

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5675r

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4114t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3537u

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735d

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:880

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700mq

Trust: 1.0

vendor:intelmodel:xeon e3 1241 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5850hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3667u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3120m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:540um

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3740

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880l_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:750

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3460

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2760qm

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2803

Trust: 1.0

vendor:armmodel:cortex-ascope:eqversion:57

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1565l_v5

Trust: 1.0

vendor:intelmodel:xeon e3 1501m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2430l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1630 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2648lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4809_v2

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5675

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520e

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5520

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470s

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3480

Trust: 1.0

vendor:intelmodel:xeon e3 1125c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5667

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4750hq

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5504

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3558

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6144

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6400t

Trust: 1.0

vendor:armmodel:cortex-ascope:eqversion:15

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w_v2

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8830

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4809_v4

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3555le

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690

Trust: 1.0

vendor:intelmodel:xeon e5 2450lscope:eqversion: -

Trust: 1.0

vendor:armmodel:cortex-ascope:eqversion:17

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6140m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3229y

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7250f

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2640m

Trust: 1.0

vendor:intelmodel:xeon e3 1240l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2537m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2670

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3517u

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3785

Trust: 1.0

vendor:intelmodel:xeon e3 1225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500k

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4112

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600k

Trust: 1.0

vendor:intelmodel:xeon e5 1660 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4109t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4610m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:820qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5550u

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5645

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6130

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4785t

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620_v3

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2100t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6300hq

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6128

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4116t

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:eqversion:8.2

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2338

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610_v4

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6148

Trust: 1.0

vendor:intelmodel:xeon e5 2640scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6148f

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2308

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2630qm

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3770d

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1558l_v5

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6157u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3225

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2815

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8650u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790k

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2316

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697_v3

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:750s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702mq

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4607_v2

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:450m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200m

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3858

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x7560

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4660_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2850_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3450s

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1535m_v6

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3330s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:610e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3475s

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5520

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3630qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3350p

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:760

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5850eq

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690_v4

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:560um

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5506

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5640

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2710qe

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3632qm

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5687

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5119t

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2665

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460t

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2650l_v4

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5118

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j3060

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6138f

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1501l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3615qm

Trust: 1.0

vendor:intelmodel:pentium jscope:eqversion:j4205

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3265rk

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5503

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4603

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6685r

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6138

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6350hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4360

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8180

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4627_v4

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3480

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:950

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4550u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5157u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570s

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l3406

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6440eq

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5660

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:370m

Trust: 1.0

vendor:intelmodel:xeon e5 2650lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300y

Trust: 1.0

vendor:intelmodel:xeon e3 1220scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3460

Trust: 1.0

vendor:intelmodel:xeon e5 2618l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3450

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2550k

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4624l_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3550s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8400

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2635qm

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4655_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2860

Trust: 1.0

vendor:intelmodel:xeon e5 2628l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l7555

Trust: 1.0

vendor:intelmodel:xeon e5 2420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6126f

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7660u

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j4005

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:920

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4350u

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4870_v2

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n4100

Trust: 1.0

vendor:intelmodel:xeon e5 2620 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8867_v3

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2340ue

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4130

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4510u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4440

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2557m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4288u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658_v4

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3439y

Trust: 1.0

vendor:siemensmodel:simatic winac rtx \scope:eqversion:2010

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3740d

Trust: 1.0

vendor:intelmodel:xeon e5 2448l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7210

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3580

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5600u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6585r

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5672

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660ue

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5015u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660lm

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8890_v4

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4667_v3

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2375m

Trust: 1.0

vendor:intelmodel:xeon e5 2408l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610_v3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3530

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590t

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3710

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2357m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2310e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8600k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3220t

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3560

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6320

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2540m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:970

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:intelmodel:xeon e3 1285l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:6y30

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2450m

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3955

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210h

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3160

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4648_v3

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6098p

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:655k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500te

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3538

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2758

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620_v4

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5120t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3110m

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6142f

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:lc5528

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6134

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2860qm

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3230rk

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3510

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:eqversion:8.1

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j3355

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8891_v4

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5507

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l3426

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820_v4

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e7540

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3200rk

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3060

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3612qm

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3850

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3736f

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:980

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4870hq

Trust: 1.0

vendor:intelmodel:xeon e5 2650l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702hq

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660

Trust: 1.0

vendor:armmodel:cortex-ascope:eqversion:75

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:480m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:680um

Trust: 1.0

vendor:intelmodel:pentium jscope:eqversion:j2850

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2105

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3217u

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8153

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4120u

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5690

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4617

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w_v4

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2560

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2820

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5603

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8550u

Trust: 1.0

vendor:intelmodel:xeon e5 1428l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6134m

Trust: 1.0

vendor:intelmodel:xeon e5 2407scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:940xm

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5506

Trust: 1.0

vendor:intelmodel:xeon e3 1276 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8860_v4

Trust: 1.0

vendor:intelmodel:xeon e3 1286 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880_v3

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4667_v4

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2518

Trust: 1.0

vendor:intelmodel:xeon e5 1620 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2603 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5620

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8867_v4

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3350

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2610ue

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4558u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620_v2

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3440

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y51

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3205rk

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2130

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3360m

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5677

Trust: 1.0

vendor:intelmodel:xeon e3 1226 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:680

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4350

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650_v4

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5115

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4627_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:660

Trust: 1.0

vendor:intelmodel:xeon e5 2603 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2698_v3

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j1900

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330te

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3130

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3530

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3745d

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3845

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7290f

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6402p

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8867l

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3830

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y70

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1515m_v5

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5700eq

Trust: 1.0

vendor:intelmodel:xeon e5 2470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3540

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5560

Trust: 1.0

vendor:intelmodel:xeon e5 1650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2603 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2418l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3450

Trust: 1.0

vendor:intelmodel:xeon e5 2648l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3740qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:920xm

Trust: 1.0

vendor:intelmodel:xeon e5 2637 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870_v3

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7250

Trust: 1.0

vendor:intelmodel:xeon e5 2650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570te

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670r

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3430

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:875k

Trust: 1.0

vendor:intelmodel:xeon e3 1270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2640 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5518

Trust: 1.0

vendor:intelmodel:xeon e3 12201scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100t

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:intelmodel:xeon e5 2603scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2806

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2920

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5640

Trust: 1.0

vendor:intelmodel:xeon e5 2618l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2670qm

Trust: 1.0

vendor:intelmodel:atom x7-e3950scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3450

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4330m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3317u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4578u

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10a

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2367m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3550

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2120t

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8894_v4

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100u

Trust: 1.0

vendor:intelmodel:pentium jscope:eqversion:j3710

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7920hq

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8158

Trust: 1.0

vendor:intelmodel:xeon e5 2623 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6126

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2350

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6300t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:870

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3540m

Trust: 1.0

vendor:armmodel:cortex-ascope:eqversion:9

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3427u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5010u

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x6550

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3770

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6138t

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10c

Trust: 1.0

vendor:intelmodel:xeon e3 1258l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850_v2

Trust: 1.0

vendor:intelmodel:atom x5-e3930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4650u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4402ec

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6136

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3308

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3795

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5609

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5005u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699a_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2630scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650 v2scope:eqversion: -

Trust: 1.0

vendor:netappmodel:hci management nodescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1650 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j4105

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880_v4

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2700k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770s

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100h

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:580m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4202y

Trust: 1.0

vendor:intelmodel:xeon e3 1265l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5570

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667_v4

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620lm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4110m

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2850

Trust: 1.0

vendor:armmodel:cortex-ascope:eqversion:72

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3330

Trust: 1.0

vendor:intelmodel:xeon e3 1285 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330um

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8860

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2940

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2350m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699r_v4

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4810mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2720qm

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4010u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:870s

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4000m

Trust: 1.0

vendor:intelmodel:xeon e5 2623 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3687u

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3295rk

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6360u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4722hq

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6142m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4340te

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700eq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7500u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697a_v4

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x7542

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6130t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3337u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658_v3

Trust: 1.0

vendor:intelmodel:xeon e5 2640 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3612qe

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4370

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:350m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2390t

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2520

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7560u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8250u

Trust: 1.0

vendor:intelmodel:xeon e3 1246 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4980hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:8100

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4102e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2617m

Trust: 1.0

vendor:intelmodel:xeon e3 1268l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w_v3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6442eq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700k

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2530

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4960hq

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4900mq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:720qm

Trust: 1.0

vendor:intelmodel:xeon e5 2609 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2657m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2677m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6167u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500t

Trust: 1.0

vendor:intelmodel:xeon e5 2643 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850_v4

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500

Trust: 1.0

vendor:intelmodel:xeon e5 2643 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2100

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770s

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5530

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3635qm

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3700

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5550

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6152

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735f

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5257u

Trust: 1.0

vendor:intelmodel:xeon e5 2609 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4112e

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699_v4

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8857_v2

Trust: 1.0

vendor:intelmodel:atom x5-e3940scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4150

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3950

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:460m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:860s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5200u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770te

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3470

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700ec

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7600u

Trust: 1.0

vendor:intelmodel:xeon e5 2643scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:975

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4130t

Trust: 1.0

vendor:intelmodel:xeon e-1105cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2683_v3

Trust: 1.0

vendor:intelmodel:xeon e5 2609scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620le

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2820

Trust: 1.0

vendor:intelmodel:xeon e3 1281 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1271 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650l

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2808

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667_v2

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500s

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4870

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:430m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820eq

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8837

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4500u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8350u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7567u

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:ltversion:5.1.32

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l7545

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4809_v3

Trust: 1.0

vendor:armmodel:cortex-ascope:eqversion:73

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4302y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2649m

Trust: 1.0

vendor:intelmodel:xeon e3 1230scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680_v4

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3339y

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3445

Trust: 1.0

vendor:intelmodel:xeon e3 1231 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8850_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4600m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2310

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:930

Trust: 1.0

vendor:intelmodel:xeon e3 1280scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770hq

Trust: 1.0

vendor:intelmodel:xeon e5 2643 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770k

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5638

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4030u

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:eqversion:8.0.0

Trust: 1.0

vendor:intelmodel:xeon e3 1285 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460s

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:ec5509

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2738

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2310m

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e6510

Trust: 1.0

vendor:intelmodel:xeon bronze 3106scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200h

Trust: 1.0

vendor:intelmodel:xeon e3 1285l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1575m_v5

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2320

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4669_v4

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5120

Trust: 1.0

vendor:intelmodel:xeon e5 1650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1230l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8168

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2515e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5750hq

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5647

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8700k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700hq

Trust: 1.0

vendor:intelmodel:xeon e5 2630lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2640 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2358

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3758

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:ec5539

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4771

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2450p

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3130m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4150t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770t

Trust: 1.0

vendor:intelmodel:xeon e3 1265l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820hk

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8893_v4

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6154

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2920xm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5950hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2960xm

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3590

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:960

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2805

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2377m

Trust: 1.0

vendor:intelmodel:xeon e5 2450l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4712hq

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8170m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3320m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4310u

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2538

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y71

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:17.04

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8176m

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4278u

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2480

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5650

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4020y

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2580

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1535m_v5

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3220

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2120

Trust: 1.0

vendor:intelmodel:xeon e5 2637 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2312m

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e7530

Trust: 1.0

vendor:intelmodel:xeon e5 2430 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4340

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4170t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:540

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8893_v3

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5650u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:650

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640_v4

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2370m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2450 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8893_v2

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3217ue

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5300u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2405s

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5122

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2750

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:965

Trust: 1.0

vendor:intelmodel:xeon e5 2648l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4402e

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:gteversion:5.2.0

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4370t

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:7y32

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2460

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2698_v4

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3520

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2328m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5775c

Trust: 1.0

vendor:intelmodel:xeon e5 2637 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5606

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:w5580

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:740qm

Trust: 1.0

vendor:intelmodel:xeon e5 2420 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5508

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3508

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5670

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3720qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2380p

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2910

Trust: 1.0

vendor:intelmodel:xeon e5 1660scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2880_v2

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:eqversion:8.3

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7y75

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3610qe

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6102e

Trust: 1.0

vendor:intelmodel:xeon e5 1620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3240

Trust: 1.0

vendor:amdmodel: - scope: - version: -

Trust: 0.8

vendor:armmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:dellmodel: - scope: - version: -

Trust: 0.8

vendor:dell emcmodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:hpmodel: - scope: - version: -

Trust: 0.8

vendor:hitachimodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:qualcomm incorporatedmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:synologymodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:複数のベンダmodel:(複数の製品)scope:eqversion: -

Trust: 0.8

vendor:複数のベンダmodel:(複数の製品)scope:eqversion:(multiple products)

Trust: 0.8

vendor:複数のベンダmodel:(複数の製品)scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows sp1scope:eqversion:7

Trust: 0.6

vendor:microsoftmodel:internet explorerscope:eqversion:11

Trust: 0.6

vendor:microsoftmodel:windowsscope:eqversion:8.1

Trust: 0.6

vendor:googlemodel: - scope:eqversion:v8

Trust: 0.6

vendor:microsoftmodel:windowsscope:eqversion:10

Trust: 0.6

vendor:microsoftmodel:edgescope:eqversion:0

Trust: 0.6

vendor:intelmodel:xeon cpu e5-1650scope:eqversion:v3

Trust: 0.6

vendor:armmodel:cortex a57scope: - version: -

Trust: 0.6

vendor:amdmodel:pro a8-9600 r7scope: - version: -

Trust: 0.6

vendor:amdmodel:compute cores 4c+6gscope:eqversion:10

Trust: 0.6

vendor:amdmodel:fx -8320 eight-core processorscope: - version: -

Trust: 0.6

sources: CERT/CC: VU#180049 // CNVD: CNVD-2018-00302 // JVNDB: JVNDB-2018-001001 // NVD: CVE-2017-5715

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-5715
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2018-001001
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2018-00302
value: MEDIUM

Trust: 0.6

VULHUB: VHN-113918
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-5715
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2018-001001
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:S/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2018-00302
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-113918
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-5715
baseSeverity: MEDIUM
baseScore: 5.6
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.1
impactScore: 4.0
version: 3.1

Trust: 1.0

IPA: JVNDB-2018-001001
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-00302 // VULHUB: VHN-113918 // JVNDB: JVNDB-2018-001001 // NVD: CVE-2017-5715

PROBLEMTYPE DATA

problemtype:CWE-203

Trust: 1.0

problemtype:information leak (CWE-200) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-200

Trust: 0.1

sources: VULHUB: VHN-113918 // JVNDB: JVNDB-2018-001001 // NVD: CVE-2017-5715

THREAT TYPE

local

Trust: 0.3

sources: PACKETSTORM: 146526 // PACKETSTORM: 146014 // PACKETSTORM: 146009

TYPE

arbitrary

Trust: 0.1

sources: PACKETSTORM: 146526

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-113918

PATCH

title:“With speculative execution function  CPU  side-channel attacks againsturl:https://www.amd.com/en/corporate/speculative-execution

Trust: 0.8

sources: JVNDB: JVNDB-2018-001001

EXTERNAL IDS

db:NVDid:CVE-2017-5715

Trust: 4.5

db:CERT/CCid:VU#584653

Trust: 2.7

db:CERT/CCid:VU#180049

Trust: 1.9

db:BIDid:102376

Trust: 1.7

db:PACKETSTORMid:155281

Trust: 1.1

db:PACKETSTORMid:145645

Trust: 1.1

db:SECTRACKid:1040071

Trust: 1.1

db:LENOVOid:LEN-18282

Trust: 1.1

db:EXPLOIT-DBid:43427

Trust: 1.1

db:CERT@VDEid:VDE-2018-003

Trust: 1.1

db:CERT@VDEid:VDE-2018-002

Trust: 1.1

db:SIEMENSid:SSA-608355

Trust: 1.1

db:USCERTid:TA18-141A

Trust: 0.8

db:JVNid:JVNVU98137233

Trust: 0.8

db:JVNid:JVNVU94630516

Trust: 0.8

db:JVNid:JVNVU93823979

Trust: 0.8

db:JVNid:JVNVU99752892

Trust: 0.8

db:ICS CERTid:ICSA-23-075-01

Trust: 0.8

db:ICS CERTid:ICSA-23-257-04

Trust: 0.8

db:CERT/CCid:VU#155143

Trust: 0.8

db:ICS CERT ALERTid:ICS-ALERT-18-011-01A

Trust: 0.8

db:USCERTid:TA18-004A

Trust: 0.8

db:JVNDBid:JVNDB-2018-001001

Trust: 0.8

db:CNVDid:CNVD-2018-00302

Trust: 0.6

db:PACKETSTORMid:146014

Trust: 0.2

db:PACKETSTORMid:146009

Trust: 0.2

db:PACKETSTORMid:145769

Trust: 0.2

db:PACKETSTORMid:146283

Trust: 0.2

db:PACKETSTORMid:146019

Trust: 0.1

db:PACKETSTORMid:145844

Trust: 0.1

db:PACKETSTORMid:146026

Trust: 0.1

db:PACKETSTORMid:146298

Trust: 0.1

db:PACKETSTORMid:145767

Trust: 0.1

db:PACKETSTORMid:146301

Trust: 0.1

db:PACKETSTORMid:146018

Trust: 0.1

db:PACKETSTORMid:149917

Trust: 0.1

db:PACKETSTORMid:146556

Trust: 0.1

db:PACKETSTORMid:148260

Trust: 0.1

db:PACKETSTORMid:146016

Trust: 0.1

db:PACKETSTORMid:150083

Trust: 0.1

db:PACKETSTORMid:145852

Trust: 0.1

db:PACKETSTORMid:145801

Trust: 0.1

db:PACKETSTORMid:146315

Trust: 0.1

db:PACKETSTORMid:148446

Trust: 0.1

db:PACKETSTORMid:146771

Trust: 0.1

db:PACKETSTORMid:146167

Trust: 0.1

db:PACKETSTORMid:146762

Trust: 0.1

db:PACKETSTORMid:147179

Trust: 0.1

db:PACKETSTORMid:145800

Trust: 0.1

db:PACKETSTORMid:147582

Trust: 0.1

db:PACKETSTORMid:146308

Trust: 0.1

db:PACKETSTORMid:145768

Trust: 0.1

db:PACKETSTORMid:145964

Trust: 0.1

db:PACKETSTORMid:146772

Trust: 0.1

db:PACKETSTORMid:146017

Trust: 0.1

db:PACKETSTORMid:146957

Trust: 0.1

db:PACKETSTORMid:145853

Trust: 0.1

db:PACKETSTORMid:146015

Trust: 0.1

db:PACKETSTORMid:145762

Trust: 0.1

db:PACKETSTORMid:146714

Trust: 0.1

db:PACKETSTORMid:145809

Trust: 0.1

db:PACKETSTORMid:146501

Trust: 0.1

db:CNNVDid:CNNVD-201801-152

Trust: 0.1

db:VULHUBid:VHN-113918

Trust: 0.1

db:PACKETSTORMid:145710

Trust: 0.1

db:PACKETSTORMid:146526

Trust: 0.1

db:PACKETSTORMid:145656

Trust: 0.1

db:PACKETSTORMid:145663

Trust: 0.1

db:PACKETSTORMid:146530

Trust: 0.1

db:PACKETSTORMid:145678

Trust: 0.1

db:PACKETSTORMid:145654

Trust: 0.1

db:PACKETSTORMid:145655

Trust: 0.1

sources: CERT/CC: VU#180049 // CNVD: CNVD-2018-00302 // VULHUB: VHN-113918 // JVNDB: JVNDB-2018-001001 // PACKETSTORM: 145710 // PACKETSTORM: 145769 // PACKETSTORM: 146526 // PACKETSTORM: 145656 // PACKETSTORM: 146283 // PACKETSTORM: 145663 // PACKETSTORM: 146014 // PACKETSTORM: 146530 // PACKETSTORM: 145678 // PACKETSTORM: 145654 // PACKETSTORM: 145655 // PACKETSTORM: 146009 // NVD: CVE-2017-5715

REFERENCES

url:http://www.kb.cert.org/vuls/id/584653

Trust: 2.7

url:https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

Trust: 1.9

url:http://www.securityfocus.com/bid/102376

Trust: 1.7

url:https://access.redhat.com/security/vulnerabilities/speculativeexecution

Trust: 1.7

url:https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution

Trust: 1.6

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html

Trust: 1.6

url:https://support.apple.com//ht208394

Trust: 1.6

url:http://www.dell.com/support/speculative-store-bypass

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2017-5715

Trust: 1.4

url:https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html

Trust: 1.2

url:https://seclists.org/bugtraq/2019/jun/36

Trust: 1.1

url:https://seclists.org/bugtraq/2019/nov/16

Trust: 1.1

url:https://www.kb.cert.org/vuls/id/180049

Trust: 1.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180104-cpusidechannel

Trust: 1.1

url:http://nvidia.custhelp.com/app/answers/detail/a_id/4609

Trust: 1.1

url:http://nvidia.custhelp.com/app/answers/detail/a_id/4611

Trust: 1.1

url:http://nvidia.custhelp.com/app/answers/detail/a_id/4613

Trust: 1.1

url:http://nvidia.custhelp.com/app/answers/detail/a_id/4614

Trust: 1.1

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2018-001.txt

Trust: 1.1

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

Trust: 1.1

url:http://xenbits.xen.org/xsa/advisory-254.html

Trust: 1.1

url:https://aws.amazon.com/de/security/security-bulletins/aws-2018-013/

Trust: 1.1

url:https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

Trust: 1.1

url:https://cert.vde.com/en-us/advisories/vde-2018-002

Trust: 1.1

url:https://cert.vde.com/en-us/advisories/vde-2018-003

Trust: 1.1

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.1

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180002

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20180104-0001/

Trust: 1.1

url:https://security.paloaltonetworks.com/cve-2017-5715

Trust: 1.1

url:https://support.citrix.com/article/ctx231399

Trust: 1.1

url:https://support.f5.com/csp/article/k91229003

Trust: 1.1

url:https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us

Trust: 1.1

url:https://support.lenovo.com/us/en/solutions/len-18282

Trust: 1.1

url:https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001

Trust: 1.1

url:https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/

Trust: 1.1

url:https://www.synology.com/support/security/synology_sa_18_01

Trust: 1.1

url:https://www.vmware.com/security/advisories/vmsa-2018-0007.html

Trust: 1.1

url:https://www.vmware.com/us/security/advisories/vmsa-2018-0002.html

Trust: 1.1

url:https://www.vmware.com/us/security/advisories/vmsa-2018-0004.html

Trust: 1.1

url:https://www.debian.org/security/2018/dsa-4120

Trust: 1.1

url:https://www.debian.org/security/2018/dsa-4187

Trust: 1.1

url:https://www.debian.org/security/2018/dsa-4188

Trust: 1.1

url:https://www.debian.org/security/2018/dsa-4213

Trust: 1.1

url:https://www.exploit-db.com/exploits/43427/

Trust: 1.1

url:https://security.freebsd.org/advisories/freebsd-sa-18:03.speculative_execution.asc

Trust: 1.1

url:https://security.freebsd.org/advisories/freebsd-sa-19:26.mcu.asc

Trust: 1.1

url:https://security.gentoo.org/glsa/201810-06

Trust: 1.1

url:http://packetstormsecurity.com/files/145645/spectre-information-disclosure-proof-of-concept.html

Trust: 1.1

url:http://packetstormsecurity.com/files/155281/freebsd-security-advisory-freebsd-sa-19-26.mcu.html

Trust: 1.1

url:https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html

Trust: 1.1

url:https://spectreattack.com/

Trust: 1.1

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2018:0292

Trust: 1.1

url:http://www.securitytracker.com/id/1040071

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html

Trust: 1.1

url:https://usn.ubuntu.com/usn/usn-3516-1/

Trust: 1.1

url:https://usn.ubuntu.com/3531-1/

Trust: 1.1

url:https://usn.ubuntu.com/3531-3/

Trust: 1.1

url:https://usn.ubuntu.com/3540-2/

Trust: 1.1

url:https://usn.ubuntu.com/3541-2/

Trust: 1.1

url:https://usn.ubuntu.com/3542-2/

Trust: 1.1

url:https://usn.ubuntu.com/3549-1/

Trust: 1.1

url:https://usn.ubuntu.com/3560-1/

Trust: 1.1

url:https://usn.ubuntu.com/3561-1/

Trust: 1.1

url:https://usn.ubuntu.com/3580-1/

Trust: 1.1

url:https://usn.ubuntu.com/3581-1/

Trust: 1.1

url:https://usn.ubuntu.com/3581-2/

Trust: 1.1

url:https://usn.ubuntu.com/3582-1/

Trust: 1.1

url:https://usn.ubuntu.com/3582-2/

Trust: 1.1

url:https://usn.ubuntu.com/3594-1/

Trust: 1.1

url:https://usn.ubuntu.com/3597-1/

Trust: 1.1

url:https://usn.ubuntu.com/3597-2/

Trust: 1.1

url:https://usn.ubuntu.com/3620-2/

Trust: 1.1

url:https://usn.ubuntu.com/3690-1/

Trust: 1.1

url:https://usn.ubuntu.com/3777-3/

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5754

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5753

Trust: 1.0

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088&languageid=en-fr

Trust: 1.0

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03871en_us

Trust: 1.0

url:https://meltdownattack.com/

Trust: 0.9

url:https://bugs.chromium.org/p/project-zero/issues/detail?id=1528

Trust: 0.8

url:https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf

Trust: 0.8

url:https://www.us-cert.gov/ncas/alerts/ta18-141a

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/208.html

Trust: 0.8

url:https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf

Trust: 0.8

url:https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel

Trust: 0.8

url:https://fortiguard.com/psirt/fg-ir-18-002

Trust: 0.8

url:https://support.hp.com/us-en/document/c06001626

Trust: 0.8

url:http://www.hitachi.com/hirt/publications/hirt-pub18001/

Trust: 0.8

url:https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/

Trust: 0.8

url:https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution

Trust: 0.8

url:https://access.redhat.com/security/vulnerabilities/ssbd

Trust: 0.8

url:https://www.suse.com/support/kb/doc/?id=7022937

Trust: 0.8

url:https://www.synology.com/en-global/support/security/synology_sa_18_23

Trust: 0.8

url:https://wiki.ubuntu.com/securityteam/knowledgebase/variant4

Trust: 0.8

url:https://kb.vmware.com/s/article/54951

Trust: 0.8

url:https://aws.amazon.com/security/security-bulletins/aws-2018-015/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu93823979/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94630516/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99752892/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98137233/

Trust: 0.8

url:https://www.us-cert.gov/ncas/alerts/ta18-004a

Trust: 0.8

url:https://kb.cert.org/vuls/id/155143

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-257-04

Trust: 0.8

url:https://ics-cert.us-cert.gov/alerts/ics-alert-18-011-01a

Trust: 0.8

url:http://blog.cyberus-technology.de/posts/2018-01-03-meltdown.html

Trust: 0.8

url:https://googleprojectzero.blogspot.jp/2018/01/reading-privileged-memory-with-side.html

Trust: 0.8

url:https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2017-5715

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2017-5753

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2017-5754

Trust: 0.2

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088&amp;languageid=en-fr

Trust: 0.1

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03871en_us

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2018:0056

Trust: 0.1

url:https://access.redhat.com/solutions/3307851

Trust: 0.1

url:https://reviews.llvm.org/d41723)

Trust: 0.1

url:https://reviews.freebsd.org/d13797.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-8824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8952

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3582-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1087.92

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1085.93

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17712

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-116.140

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-15115

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1019.24

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12190

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1052.61

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2018:0025

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5715

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2018:0024

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1049.58

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-euclid/4.4.0-9023.24

Trust: 0.1

url:https://wiki.ubuntu.com/securityteam/knowledgebase/spectreandmeltdown

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-112.135

Trust: 0.1

url:https://www.ubuntu.com/usn/usn-3540-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5750

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13166

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2018:0029

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2018:0020

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2018:0021

Trust: 0.1

url:https://launchpad.net/bugs/1742933

Trust: 0.1

url:https://www.ubuntu.com/usn/usn-3531-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu16.04.1

Trust: 0.1

url:https://www.ubuntu.com/usn/usn-3531-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu17.10.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu14.04.1

Trust: 0.1

sources: CERT/CC: VU#180049 // CNVD: CNVD-2018-00302 // VULHUB: VHN-113918 // JVNDB: JVNDB-2018-001001 // PACKETSTORM: 145710 // PACKETSTORM: 145769 // PACKETSTORM: 146526 // PACKETSTORM: 145656 // PACKETSTORM: 146283 // PACKETSTORM: 145663 // PACKETSTORM: 146014 // PACKETSTORM: 146530 // PACKETSTORM: 145678 // PACKETSTORM: 145654 // PACKETSTORM: 145655 // PACKETSTORM: 146009 // NVD: CVE-2017-5715

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 145710 // PACKETSTORM: 145656 // PACKETSTORM: 145663 // PACKETSTORM: 145678 // PACKETSTORM: 145654 // PACKETSTORM: 145655

SOURCES

db:CERT/CCid:VU#180049
db:CNVDid:CNVD-2018-00302
db:VULHUBid:VHN-113918
db:JVNDBid:JVNDB-2018-001001
db:PACKETSTORMid:145710
db:PACKETSTORMid:145769
db:PACKETSTORMid:146526
db:PACKETSTORMid:145656
db:PACKETSTORMid:146283
db:PACKETSTORMid:145663
db:PACKETSTORMid:146014
db:PACKETSTORMid:146530
db:PACKETSTORMid:145678
db:PACKETSTORMid:145654
db:PACKETSTORMid:145655
db:PACKETSTORMid:146009
db:NVDid:CVE-2017-5715

LAST UPDATE DATE

2024-10-18T22:33:10.676000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#180049date:2018-06-19T00:00:00
db:CNVDid:CNVD-2018-00302date:2018-01-11T00:00:00
db:VULHUBid:VHN-113918date:2020-05-05T00:00:00
db:JVNDBid:JVNDB-2018-001001date:2024-04-11T06:49:00
db:NVDid:CVE-2017-5715date:2021-08-16T09:15:06.987

SOURCES RELEASE DATE

db:CERT/CCid:VU#180049date:2018-05-21T00:00:00
db:CNVDid:CNVD-2018-00302date:2018-01-04T00:00:00
db:VULHUBid:VHN-113918date:2018-01-04T00:00:00
db:JVNDBid:JVNDB-2018-001001date:2018-01-04T00:00:00
db:PACKETSTORMid:145710date:2018-01-06T17:59:52
db:PACKETSTORMid:145769date:2018-01-09T15:55:55
db:PACKETSTORMid:146526date:2018-02-22T10:13:00
db:PACKETSTORMid:145656date:2018-01-04T17:51:49
db:PACKETSTORMid:146283date:2018-02-06T19:19:00
db:PACKETSTORMid:145663date:2018-01-04T17:52:51
db:PACKETSTORMid:146014date:2018-01-23T04:31:47
db:PACKETSTORMid:146530date:2018-02-22T12:22:00
db:PACKETSTORMid:145678date:2018-01-05T00:37:59
db:PACKETSTORMid:145654date:2018-01-04T17:51:10
db:PACKETSTORMid:145655date:2018-01-04T17:51:43
db:PACKETSTORMid:146009date:2018-01-22T03:17:00
db:NVDid:CVE-2017-5715date:2018-01-04T13:29:00.227