ID

VAR-201801-1712


CVE

CVE-2017-5753


TITLE

CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks

Trust: 0.8

sources: CERT/CC: VU#180049

DESCRIPTION

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". Has speculative execution function and out-of-order execution function CPU Several researchers have reported methods of performing side-channel attacks against Has speculative execution function and out-of-order execution function CPU side-channel attack method against (Spectre and Meltdown) has been reported. For more information, Google Project Zero blog post in ("Reading privileged memory with a side-channel") or Graz University of Technology (TU Graz) information from researchers in ("Meltdown and Spectre") Please refer to. "Reading privileged memory with a side-channel"https://googleprojectzero.blogspot.jp/2018/01/reading-privileged-memory-with-side.html"Meltdown and Spectre"https://meltdownattack.com/Sensitive information can be obtained from processes running with user privileges. Spectre As for the attack, crafted Javascript by the code Javascript cannot be obtained from web It has been reported that data can be obtained during the browser process. CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \"melts\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \"cross-border\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Xeon CPU E5-1650 v3, v2, v4; Xeon E3-1265l v2, v3, v4 ; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. Relevant releases/architectures: Image Updates for RHV-H - noarch 3. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4187-1 security@debian.org https://www.debian.org/security/ Ben Hutchings May 01, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : linux CVE ID : CVE-2015-9016 CVE-2017-0861 CVE-2017-5715 CVE-2017-5753 CVE-2017-13166 CVE-2017-13220 CVE-2017-16526 CVE-2017-16911 CVE-2017-16912 CVE-2017-16913 CVE-2017-16914 CVE-2017-18017 CVE-2017-18203 CVE-2017-18216 CVE-2017-18232 CVE-2017-18241 CVE-2018-1066 CVE-2018-1068 CVE-2018-1092 CVE-2018-5332 CVE-2018-5333 CVE-2018-5750 CVE-2018-5803 CVE-2018-6927 CVE-2018-7492 CVE-2018-7566 CVE-2018-7740 CVE-2018-7757 CVE-2018-7995 CVE-2018-8781 CVE-2018-8822 CVE-2018-1000004 CVE-2018-1000199 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2015-9016 Ming Lei reported a race condition in the multiqueue block layer (blk-mq). On a system with a driver using blk-mq (mtip32xx, null_blk, or virtio_blk), a local user might be able to use this for denial of service or possibly for privilege escalation. CVE-2017-0861 Robb Glasser reported a potential use-after-free in the ALSA (sound) PCM core. We believe this was not possible in practice. CVE-2017-5715 Multiple researchers have discovered a vulnerability in various processors supporting speculative execution, enabling an attacker controlling an unprivileged process to read memory from arbitrary addresses, including from the kernel and all other processes running on the system. This specific attack has been named Spectre variant 2 (branch target injection) and is mitigated for the x86 architecture (amd64 and i386) by using the "retpoline" compiler feature which allows indirect branches to be isolated from speculative execution. CVE-2017-5753 Multiple researchers have discovered a vulnerability in various processors supporting speculative execution, enabling an attacker controlling an unprivileged process to read memory from arbitrary addresses, including from the kernel and all other processes running on the system. This specific attack has been named Spectre variant 1 (bounds-check bypass) and is mitigated by identifying vulnerable code sections (array bounds checking followed by array access) and replacing the array access with the speculation-safe array_index_nospec() function. More use sites will be added over time. CVE-2017-13166 A bug in the 32-bit compatibility layer of the v4l2 ioctl handling code has been found. Memory protections ensuring user-provided buffers always point to userland memory were disabled, allowing destination addresses to be in kernel space. On a 64-bit kernel a local user with access to a suitable video device can exploit this to overwrite kernel memory, leading to privilege escalation. CVE-2017-13220 Al Viro reported that the Bluetooth HIDP implementation could dereference a pointer before performing the necessary type check. A local user could use this to cause a denial of service. CVE-2017-16526 Andrey Konovalov reported that the UWB subsystem may dereference an invalid pointer in an error case. A local user might be able to use this for denial of service. CVE-2017-16911 Secunia Research reported that the USB/IP vhci_hcd driver exposed kernel heap addresses to local users. This information could aid the exploitation of other vulnerabilities. CVE-2017-16912 Secunia Research reported that the USB/IP stub driver failed to perform a range check on a received packet header field, leading to an out-of-bounds read. A remote user able to connect to the USB/IP server could use this for denial of service. CVE-2017-16913 Secunia Research reported that the USB/IP stub driver failed to perform a range check on a received packet header field, leading to excessive memory allocation. A remote user able to connect to the USB/IP server could use this for denial of service. CVE-2017-16914 Secunia Research reported that the USB/IP stub driver failed to check for an invalid combination of fields in a received packet, leading to a null pointer dereference. A remote user able to connect to the USB/IP server could use this for denial of service. CVE-2017-18017 Denys Fedoryshchenko reported that the netfilter xt_TCPMSS module failed to validate TCP header lengths, potentially leading to a use-after-free. If this module is loaded, it could be used by a remote attacker for denial of service or possibly for code execution. CVE-2017-18203 Hou Tao reported that there was a race condition in creation and deletion of device-mapper (DM) devices. A local user could potentially use this for denial of service. CVE-2017-18216 Alex Chen reported that the OCFS2 filesystem failed to hold a necessary lock during nodemanager sysfs file operations, potentially leading to a null pointer dereference. A local user could use this for denial of service. CVE-2017-18232 Jason Yan reported a race condition in the SAS (Serial-Attached SCSI) subsystem, between probing and destroying a port. This could lead to a deadlock. A physically present attacker could use this to cause a denial of service. CVE-2017-18241 Yunlei He reported that the f2fs implementation does not properly initialise its state if the "noflush_merge" mount option is used. A local user with access to a filesystem mounted with this option could use this to cause a denial of service. CVE-2018-1066 Dan Aloni reported to Red Hat that the CIFS client implementation would dereference a null pointer if the server sent an invalid response during NTLMSSP setup negotiation. This could be used by a malicious server for denial of service. CVE-2018-1068 The syzkaller tool found that the 32-bit compatibility layer of ebtables did not sufficiently validate offset values. On a 64-bit kernel, a local user with the CAP_NET_ADMIN capability (in any user namespace) could use this to overwrite kernel memory, possibly leading to privilege escalation. Debian disables unprivileged user namespaces by default. CVE-2018-1092 Wen Xu reported that a crafted ext4 filesystem image would trigger a null dereference when mounted. A local user able to mount arbitrary filesystems could use this for denial of service. CVE-2018-5332 Mohamed Ghannam reported that the RDS protocol did not sufficiently validate RDMA requests, leading to an out-of-bounds write. A local attacker on a system with the rds module loaded could use this for denial of service or possibly for privilege escalation. CVE-2018-5333 Mohamed Ghannam reported that the RDS protocol did not properly handle an error case, leading to a null pointer dereference. A local attacker on a system with the rds module loaded could possibly use this for denial of service. CVE-2018-5750 Wang Qize reported that the ACPI sbshc driver logged a kernel heap address. This information could aid the exploitation of other vulnerabilities. CVE-2018-5803 Alexey Kodanev reported that the SCTP protocol did not range-check the length of chunks to be created. A local or remote user could use this to cause a denial of service. CVE-2018-6927 Li Jinyue reported that the FUTEX_REQUEUE operation on futexes did not check for negative parameter values, which might lead to a denial of service or other security impact. CVE-2018-7492 The syzkaller tool found that the RDS protocol was lacking a null pointer check. A local attacker on a system with the rds module loaded could use this for denial of service. CVE-2018-7566 Fan LongFei reported a race condition in the ALSA (sound) sequencer core, between write and ioctl operations. This could lead to an out-of-bounds access or use-after-free. A local user with access to a sequencer device could use this for denial of service or possibly for privilege escalation. CVE-2018-7740 Nic Losby reported that the hugetlbfs filesystem's mmap operation did not properly range-check the file offset. A local user with access to files on a hugetlbfs filesystem could use this to cause a denial of service. CVE-2018-7757 Jason Yan reported a memory leak in the SAS (Serial-Attached SCSI) subsystem. A local user on a system with SAS devices could use this to cause a denial of service. CVE-2018-7995 Seunghun Han reported a race condition in the x86 MCE (Machine Check Exception) driver. This is unlikely to have any security impact. CVE-2018-8781 Eyal Itkin reported that the udl (DisplayLink) driver's mmap operation did not properly range-check the file offset. A local user with access to a udl framebuffer device could exploit this to overwrite kernel memory, leading to privilege escalation. CVE-2018-8822 Dr Silvio Cesare of InfoSect reported that the ncpfs client implementation did not validate reply lengths from the server. An ncpfs server could use this to cause a denial of service or remote code execution in the client. CVE-2018-1000004 Luo Quan reported a race condition in the ALSA (sound) sequencer core, between multiple ioctl operations. This could lead to a deadlock or use-after-free. A local user with access to a sequencer device could use this for denial of service or possibly for privilege escalation. CVE-2018-1000199 Andy Lutomirski discovered that the ptrace subsystem did not sufficiently validate hardware breakpoint settings. Local users can use this to cause a denial of service, or possibly for privilege escalation, on x86 (amd64 and i386) and possibly other architectures. For the oldstable distribution (jessie), these problems have been fixed in version 3.16.56-1. We recommend that you upgrade your linux packages. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlron61fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Rtqw//Xf/L4bP65wU9M59Ef6xBt+Eph+yxeMsioGhu80ODdMemlmHzASMtfZjY AXxyt9l8lbHn8MmwDA4aLhhwHYXwvKATdpHSy1SILrRfb4s9P9uV1vsHaIeZ649E hDyNon9hP2tPso6BwqiYHZZy9Xxtd+T8vTBeBZwUKOLBkBRvV/gyNSUdJWp6L8WH aF4D1hHl9ZotDkyIvkubbx77aqbJ88I4R0n69x7L9udFbuXa+U7hV6dJdnpzyl/7 OukJfEtnkaUgWu0MdOfFss6iH5OQISn/y/ricRi29oKQiEp3YwnT5J9pFwSQeJJS H8ABVt251UoS0J+of3QWw0muOT/6UAF8SNpPKMJXC7Euq8pTmYVPSIeUYf4eqn65 UHZSCKXaszItq+uzVNYdkj504BJ4cG1lFxZtlrFWwKE8p7QOETN0GKvTRdu/SvDd Hl2nb4HouLpBYS518Th2/MGgzhXXAuO12MH3smenptZbqxKn9Z0XSTJYzFupgJk/ kKF2xkDFBE4toTLVE+6XdUKwYk4vkeDZyOGOwRYThSkKAzrUh5zThgal4HnknD2A 5ye4XLhjgSIT47/nmor6lhxd7WGXGkV33GF0azYlHr/sclfzxcU2Ev3NUBWQ8M3s CxfIO0FNCzO0WIUf40md7MlIAnDBIRGyYgNIIe7AnSRKKPykEx8= =wNQS -----END PGP SIGNATURE----- . Software Description: - webkit2gtk: Web content engine library for GTK+ Details: It was discovered that speculative execution performed by modern CPUs could leak information through a timing side-channel attack, and that this could be exploited in web browser JavaScript engines. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information from other domains, bypassing same-origin restrictions. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Security Fix(es): An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact. In this update initial mitigations for IBM Power (PowerPC) and IBM zSeries (S390) architectures are provided. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. This fix specifically addresses S390 processors. (CVE-2017-5715, Important) * Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. This fix specifically addresses S390 and PowerPC processors. (CVE-2017-5753, Important) * Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. This fix specifically addresses PowerPC processors. (CVE-2017-5754, Important) Red Hat would like to thank Google Project Zero for reporting CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754. This update also fixes the following security issues and bugs: Space precludes documenting all of the bug fixes and enhancements included in this advisory. To see the complete list of bug fixes and enhancements, refer to the following KnowledgeBase article: https://access.redhat.com/articles/3327131. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1284450 - CVE-2015-8539 kernel: local privesc in key management 1442086 - CVE-2017-7472 kernel: keyctl_set_reqkey_keyring() leaks thread keyrings 1493435 - CVE-2017-12192 kernel: NULL pointer dereference due to KEYCTL_READ on negative key 1501215 - CVE-2017-12193 kernel: Null pointer dereference due to incorrect node-splitting in assoc_array implementation 1504574 - CVE-2017-15649 kernel: Use-after-free in the af_packet.c 1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass 1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection 1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-693.17.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.17.1.el7.noarch.rpm kernel-doc-3.10.0-693.17.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.17.1.el7.x86_64.rpm kernel-devel-3.10.0-693.17.1.el7.x86_64.rpm kernel-headers-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.17.1.el7.x86_64.rpm perf-3.10.0-693.17.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm python-perf-3.10.0-693.17.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.17.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-693.17.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.17.1.el7.noarch.rpm kernel-doc-3.10.0-693.17.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.17.1.el7.x86_64.rpm kernel-devel-3.10.0-693.17.1.el7.x86_64.rpm kernel-headers-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.17.1.el7.x86_64.rpm perf-3.10.0-693.17.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm python-perf-3.10.0-693.17.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.17.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-693.17.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.17.1.el7.noarch.rpm kernel-doc-3.10.0-693.17.1.el7.noarch.rpm ppc64: kernel-3.10.0-693.17.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-693.17.1.el7.ppc64.rpm kernel-debug-3.10.0-693.17.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-693.17.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-693.17.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-693.17.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-693.17.1.el7.ppc64.rpm kernel-devel-3.10.0-693.17.1.el7.ppc64.rpm kernel-headers-3.10.0-693.17.1.el7.ppc64.rpm kernel-tools-3.10.0-693.17.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-693.17.1.el7.ppc64.rpm perf-3.10.0-693.17.1.el7.ppc64.rpm perf-debuginfo-3.10.0-693.17.1.el7.ppc64.rpm python-perf-3.10.0-693.17.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.ppc64.rpm ppc64le: kernel-3.10.0-693.17.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-693.17.1.el7.ppc64le.rpm kernel-debug-3.10.0-693.17.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-693.17.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.17.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.17.1.el7.ppc64le.rpm kernel-devel-3.10.0-693.17.1.el7.ppc64le.rpm kernel-headers-3.10.0-693.17.1.el7.ppc64le.rpm kernel-tools-3.10.0-693.17.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-693.17.1.el7.ppc64le.rpm perf-3.10.0-693.17.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.17.1.el7.ppc64le.rpm python-perf-3.10.0-693.17.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.ppc64le.rpm s390x: kernel-3.10.0-693.17.1.el7.s390x.rpm kernel-debug-3.10.0-693.17.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-693.17.1.el7.s390x.rpm kernel-debug-devel-3.10.0-693.17.1.el7.s390x.rpm kernel-debuginfo-3.10.0-693.17.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-693.17.1.el7.s390x.rpm kernel-devel-3.10.0-693.17.1.el7.s390x.rpm kernel-headers-3.10.0-693.17.1.el7.s390x.rpm kernel-kdump-3.10.0-693.17.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-693.17.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-693.17.1.el7.s390x.rpm perf-3.10.0-693.17.1.el7.s390x.rpm perf-debuginfo-3.10.0-693.17.1.el7.s390x.rpm python-perf-3.10.0-693.17.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.s390x.rpm x86_64: kernel-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.17.1.el7.x86_64.rpm kernel-devel-3.10.0-693.17.1.el7.x86_64.rpm kernel-headers-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.17.1.el7.x86_64.rpm perf-3.10.0-693.17.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm python-perf-3.10.0-693.17.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-693.17.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-693.17.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-693.17.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-693.17.1.el7.ppc64.rpm perf-debuginfo-3.10.0-693.17.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-693.17.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-693.17.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-693.17.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-693.17.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-693.17.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-693.17.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.17.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-693.17.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-693.17.1.el7.noarch.rpm kernel-doc-3.10.0-693.17.1.el7.noarch.rpm x86_64: kernel-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.17.1.el7.x86_64.rpm kernel-devel-3.10.0-693.17.1.el7.x86_64.rpm kernel-headers-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-693.17.1.el7.x86_64.rpm perf-3.10.0-693.17.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm python-perf-3.10.0-693.17.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-693.17.1.el7.x86_64.rpm perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-693.17.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8539 https://access.redhat.com/security/cve/CVE-2017-7472 https://access.redhat.com/security/cve/CVE-2017-12192 https://access.redhat.com/security/cve/CVE-2017-12193 https://access.redhat.com/security/cve/CVE-2017-15649 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/speculativeexecution https://access.redhat.com/security/cve/CVE-2017-5753 https://access.redhat.com/security/cve/CVE-2017-5715 https://access.redhat.com/security/cve/CVE-2017-5754 https://access.redhat.com/articles/3327131 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFaab47XlSAg2UNWIIRAgi2AKDDW6z/9di3aoNQMX6PaIOzYTu39gCgncrF n+VQu/CVEmiUW8aXZCnplaM= =Km2i -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesbhf03805en_us Version: 4 HPESBHF03805 rev.4 - Certain HPE products using Microprocessors from Intel, AMD, and ARM, with Speculative Execution, Elevation of Privilege and Information Disclosure. NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2018-01-10 Last Updated: 2018-01-09 Potential Security Impact: Local: Disclosure of Information, Elevation of Privilege Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY On January 3 2018, side-channel security vulnerabilities involving speculative execution were publicly disclosed. These vulnerabilities may impact the listed HPE products, potentially leading to information disclosure and elevation of privilege. Mitigation and resolution of these vulnerabilities may call for both an operating system update, provided by the OS vendor, and a system ROM update from HPE. **Note:** * This issue takes advantage of techniques commonly used in many modern processor architectures. * For further information, microprocessor vendors have provided security advisories: - Intel: <https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088&langu geid=en-fr> - AMD: <http://www.amd.com/en/corporate/speculative-execution> - ARM: <https://developer.arm.com/support/security-update> References: - PSRT110634 - PSRT110633 - PSRT110632 - CVE-2017-5715 - aka Spectre, branch target injection - CVE-2017-5753 - aka Spectre, bounds check bypass - CVE-2017-5754 - aka Meltdown, rogue data cache load, memory access permission check performed after kernel memory read SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HPE ProLiant DL380 Gen10 Server prior to v1.28 - HPE ProLiant DL180 Gen10 Server prior to v1.28 - HPE ProLiant DL160 Gen10 Server prior to v1.28 - HPE ProLiant DL360 Gen10 Server prior to v1.28 - HPE ProLiant ML110 Gen10 Server prior to v1.28 - HPE ProLiant DL580 Gen10 Server prior to v1.28 - HPE ProLiant DL560 Gen10 Server prior to v1.28 - HPE ProLiant DL120 Gen10 Server prior to v1.28 - HPE ProLiant ML350 Gen10 Server prior to v1.28 - HPE ProLiant XL450 Gen10 Server prior to v1.28 - HPE ProLiant XL170r Gen10 Server prior to v1.28 - HPE ProLiant BL460c Gen10 Server Blade prior to v1.28 - HPE ProLiant XL230a Gen9 Server prior to v2.54 - HPE ProLiant XL230k Gen10 Server prior to v1.28 - HPE ProLiant XL730f Gen9 Server prior to v2.54 - HPE ProLiant XL740f Gen9 Server prior to v2.54 - HPE ProLiant XL750f Gen9 Server prior to v2.54 - HPE ProLiant XL170r Gen9 Server prior to v2.54 - HP ProLiant DL60 Gen9 Server prior to v2.54 - HPE ProLiant XL450 Gen9 Server prior to v2.54 - HP ProLiant DL160 Gen9 Server prior to v2.54 - HPE Apollo 4200 Gen9 Server prior to v2.54 - HP ProLiant BL460c Gen9 Server Blade prior to v2.54 - HP ProLiant ML110 Gen9 Server prior to v2.54 - HP ProLiant ML150 Gen9 Server prior to v2.54 - HPE ProLiant ML350 Gen9 Server prior to v2.54 - HP ProLiant DL380 Gen9 Server prior to v2.54 - HP ProLiant DL120 Gen9 Server prior to v2.54 - HPE ProLiant DL560 Gen9 Server prior to v2.54 - HPE ProLiant XL270d Gen9 Special Server prior to v2.54 - HP ProLiant BL660c Gen9 Server prior to v2.54 - HPE ProLiant m710x Server Cartridge prior to v1.60 - HPE ProLiant DL20 Gen9 Server prior to v2.52 - HPE ProLiant DL385 Gen10 Server prior to v1.04 - HPE Synergy 660 Gen9 Compute Module prior to v2.54 - HPE Synergy 480 Gen10 Compute Module prior to v1.28 - HPE Synergy 480 Gen9 Compute Module prior to v2.54 - HPE ProLiant ML30 Gen9 Server prior to v2.52 - HPE ProLiant XL190r Gen10 Server prior to v1.28 - HPE ProLiant XL250a Gen9 Server prior to v2.54 - HPE ProLiant XL190r Gen9 Server prior to v2.54 - HP ProLiant DL80 Gen9 Server prior to v2.54 - HPE ProLiant DL180 Gen9 Server prior to v2.54 - HPE ProLiant XL270d Gen9 Accelerator Tray 2U Configure-to-order Server prior to v2.54 - HPE ProLiant WS460c Gen9 Workstation prior to v2.54 - HPE ProLiant DL580 Gen9 Special Server prior to v2.54 - HPE Synergy 680 Gen9 Compute Modules prior to v2.54 - HPE ProLiant XL260a Gen9 Server prior to 1/22/2018 - HPE ProLiant m510 Server Cartridge prior to 1/22/2018 - HPE ProLiant m710p Server Cartridge prior to 12/12/2017 - HP ProLiant m350 Server Cartridge prior to 12/12/2017 - HP ProLiant m300 Server Cartridge prior to 12/12/2017 - HP ProLiant ML350e Gen8 Server prior to 12/12/2017 - HPE ProLiant ML350e Gen8 v2 Server prior to 12/12/2017 - HP ProLiant BL460c Gen8 Server prior to 12/12/2017 - HP ProLiant BL660c Gen8 Server prior to 12/12/2017 - HPE ProLiant SL4540 Gen8 1 Node Server prior to 12/12/2017 - HP ProLiant DL380e Gen8 Server prior to 12/12/2017 - HP ProLiant DL360e Gen8 Server prior to 12/12/2017 - HP ProLiant ML350p Gen8 Server prior to 12/12/2017 - HP ProLiant DL360p Gen8 Server prior to 12/12/2017 - HP ProLiant DL380p Gen8 Server prior to 12/12/2017 - HP ProLiant DL320e Gen8 Server prior to 12/12/2017 - HPE ProLiant DL320e Gen8 v2 Server prior to 12/12/2017 - HP ProLiant ML310e Gen8 Server prior to 12/12/2017 - HPE ProLiant ML310e Gen8 v2 Server prior to 12/12/2017 - HP ProLiant DL160 Gen8 Server prior to 12/12/2017 - HP ProLiant SL270s Gen8 Server prior to 12/12/2017 - HP ProLiant SL250s Gen8 Server prior to 12/12/2017 - HP ProLiant SL230s Gen8 Server prior to 12/12/2017 - HP ProLiant DL560 Gen8 Server prior to 12/12/2017 - HPE ProLiant SL210t Gen8 Server prior to 12/12/2017 - HP ProLiant DL580 Gen8 Server prior to 12/12/2017 (v1.98) - HP ProLiant ML10 Server prior to 12/12/2017 - HP ProLiant m710 Server Cartridge prior to 12/12/2017 (v1.60) - HPE Synergy Composer prior to 12/12/2017 - HPE Integrity Superdome X with BL920s Blades prior to 8.8.6 - HPE Superdome Flex Server prior to 2.3.110 - HP ProLiant DL360 Gen9 Server prior to v2.54 - HPE Synergy 620 Gen9 Compute Module prior to v2.54 - HPE ProLiant Thin Micro TM200 Server prior to 1/16/2017 - HPE ProLiant ML350 Gen10 Server prior to v1.28 - HP ProLiant BL420c Gen8 Server prior to 12/12/2017 - HPE ProLiant ML10 v2 Server prior to 12/12/2017 - HPE ProLiant MicroServer Gen8 prior to 12/12/2017 - HPE Synergy 660 Gen10 Compute Module prior to v1.28 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2017-5715 8.2 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N 6.8 (AV:A/AC:L/Au:N/C:C/I:P/A:N) CVE-2017-5753 5.0 CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L 5.4 (AV:A/AC:M/Au:N/C:P/I:P/A:P) CVE-2017-5754 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has made the following system ROM updates which include an updated microcode to resolve the vulnerability: * HPE has provided a customer bulletin <https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us> with specific instructions to obtain the udpated sytem ROM - Note: + CVE-2017-5715 requires that the System ROM be updated and a vendor supplied operating system update be applied as well. + For CVE-2017-5753, CVE-2017-5754 require only updates of a vendor supplied operating system. + HPE will continue to add additional products to the list. Not all listed products have updated system ROMs yet. Impacted products awaiting system ROM updates are marked TBS (to be supplied). HISTORY Version:1 (rev.1) - 4 January 2018 Initial release Version:2 (rev.2) - 5 January 2018 Added additional impacted products Version:3 (rev.3) - 10 January 2018 Added more impacted products Version:4 (rev.4) - 9 January 2018 Fixed product ID Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Summary VMware Virtual Appliance updates address side-channel analysis due to speculative execution Note: This document will focus on VMware Virtual Appliances which are affected by the known variants of CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754. For more information please see Knowledge Base article 52264. These mitigations are part of the Operating System-Specific Mitigations category described in VMware Knowledge Base article 52245. Relevant Products vCloud Usage Meter (UM) Identity Manager (vIDM) vCenter Server (vCSA) vSphere Data Protection (VDP) vSphere Integrated Containers (VIC) vRealize Automation (vRA) 3. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2017-5753 (Bounds Check bypass), CVE-2017-5715 (Branch Target Injection), CVE-2017-5754 (Rogue data cache load) to these issues. Column 5 of the following table lists the action required to mitigate the observed vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ========= ============= ========== UM 3.x VA Important Patch Pending KB52467 vIDM 3.x, 2.x VA Important Patch Pending KB52284 vCSA 6.5 VA Important Patch Pending KB52312 vCSA 6.0 VA Important Patch Pending KB52312 vCSA 5.5 VA N/A Unaffected None VDP 6.x VA Important Patch Pending None VIC 1.x VA Important 1.3.1 None vRA 7.x VA Important Patch Pending KB52377 vRA 6.x VA Important Patch Pending KB52497 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vSphere Integrated Containers 1.3.1 Downloads and Documentation: https://my.vmware.com/group/vmware/get-download?downloadGroup=VIC131 5. Change log 2018-02-08: VMSA-2018-0007 Initial security advisory in conjunction with the release of vSphere Integrated Containers 1.3.1 on 2018-02-08. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com bugtraq@securityfocus.com fulldisclosure@seclists.org E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2018 VMware Inc. All rights reserved. In this update mitigations for x86-64 architecture are provided. ========================================================================== Ubuntu Security Notice USN-3542-2 January 23, 2018 linux-lts-trusty vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: Several security issues were addressed in the Linux kernel. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu 12.04 ESM. This flaw is known as Spectre. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: linux-image-3.13.0-140-generic 3.13.0-140.189~precise1 linux-image-generic-lts-trusty 3.13.0.140.131 Please note that fully mitigating CVE-2017-5715 (Spectre Variant 2) requires corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. On i386 and amd64 architectures, the IBRS and IBPB features are required to enable the kernel mitigations. Ubuntu is working with Intel and AMD to provide future microcode updates that implement IBRS and IBPB as they are made available. Ubuntu users with a processor from a different vendor should contact the vendor to identify necessary firmware updates. Ubuntu will provide corresponding QEMU updates in the future for users of self-hosted virtual environments in coordination with upstream QEMU. Ubuntu users in cloud environments should contact the cloud provider to confirm that the hypervisor has been updated to expose the new CPU features to virtual machines. References: - CVE-2017-5753 - CVE-2017-5715 - CVE-2017-5754 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HP Virtualization Performance Viewer Software - v2.20, v3.0, v3.01, v3.02, v3.03 - HPE Cloud Optimizer - v2.20, v3.0, v3.01, v3.02, v3.03 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector RESOLUTION Micro Focus is actively working with its vendors to address any systems-level Spectre and Meltdown impacts.However, if you have immediate concerns or questions regarding CentOS and its approach to Spectre or Meltdown, please contact them directly. Please note that you will need to sign in using a Passport account. 3P = 3rd Party Software GN = Micro Focus General Software MU = Multi-Platform Software System management and security procedures must be reviewed frequently to maintain system integrity. Micro Focus is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "Micro Focus is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected Micro Focus products the important security information contained in this Bulletin. Micro Focus recommends that all users determine the applicability of this information to their individual situations and take appropriate action. Micro Focus does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, Micro Focus will not be responsible for any damages resulting from user's use or disregard of the information provided in this Security Bulletin. To the extent permitted by law, Micro Focus disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." Copyright 2017 EntIT Software LLC Micro Focus shall not be liable for technical or editorial errors or omissions contained herein

Trust: 3.96

sources: NVD: CVE-2017-5753 // CERT/CC: VU#180049 // JVNDB: JVNDB-2018-001001 // CNVD: CNVD-2018-00304 // VULHUB: VHN-113956 // PACKETSTORM: 145718 // PACKETSTORM: 145964 // PACKETSTORM: 147451 // PACKETSTORM: 145852 // PACKETSTORM: 146098 // PACKETSTORM: 145809 // PACKETSTORM: 146308 // PACKETSTORM: 145651 // PACKETSTORM: 146018 // PACKETSTORM: 145654 // PACKETSTORM: 147582

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-00304

AFFECTED PRODUCTS

vendor:intelmodel:xeon e5 2450l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5550

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4340

Trust: 1.0

vendor:phoenixcontactmodel:vl2 ppc 2000scope:eqversion: -

Trust: 1.0

vendor:phoenixcontactmodel:dl ppc15 1000scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:synologymodel:virtual machine managerscope:ltversion:6.2-23739

Trust: 1.0

vendor:intelmodel:xeon e5 2430scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic itc2200 proscope:ltversion:3.1

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880_v3

Trust: 1.0

vendor:phoenixcontactmodel:vl2 ppc12 1000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2677m

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:ec5509

Trust: 1.0

vendor:intelmodel:core m5scope:eqversion:6y57

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4110

Trust: 1.0

vendor:intelmodel:xeon e3 1246 v3scope:eqversion: -

Trust: 1.0

vendor:synologymodel:router managerscope:ltversion:1.1.7-6941-1

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4108

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2670qm

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2750

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8176m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210u

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1585l_v5

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8860

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2300

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2760

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3830

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:7y32

Trust: 1.0

vendor:oraclemodel:local service management systemscope:eqversion:13.3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2850_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:965

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4650u

Trust: 1.0

vendor:phoenixcontactmodel:vl2 ppc 1000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3958

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8894_v4

Trust: 1.0

vendor:siemensmodel:simatic itc1900 proscope:ltversion:3.1

Trust: 1.0

vendor:vmwaremodel:esxiscope:eqversion:6.0

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:940

Trust: 1.0

vendor:intelmodel:xeon e5 2470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2657m

Trust: 1.0

vendor:pepperl fuchsmodel:btc12scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4360

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4308u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500te

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5200u

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8176f

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j3455

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460s

Trust: 1.0

vendor:intelmodel:xeon e3 1240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2640 v2scope:eqversion: -

Trust: 1.0

vendor:synologymodel:diskstation managerscope:gteversion:5.2

Trust: 1.0

vendor:intelmodel:xeon e3 1505l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7230

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8170

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2310

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5010u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6400

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3010

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4010y

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680_v2

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3445

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10c

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3740d

Trust: 1.0

vendor:oraclemodel:solarisscope:eqversion:11.3

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4617

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200y

Trust: 1.0

vendor:intelmodel:xeon e5 2448l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1260l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4558u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520e

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6267u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660ue

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3338

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5750hq

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:42.2

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3150

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:430m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:655k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5775r

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3217ue

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6126t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3520m

Trust: 1.0

vendor:intelmodel:xeon e3 1285 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770k

Trust: 1.0

vendor:intelmodel:xeon e3 1240l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3200rk

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3537u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700ec

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5120

Trust: 1.0

vendor:phoenixcontactmodel:bl2 ppc 1000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1575m_v5

Trust: 1.0

vendor:intelmodel:xeon e5 2648lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4116

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6102e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2520m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3320m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667_v3

Trust: 1.0

vendor:synologymodel:vs960hdscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2830

Trust: 1.0

vendor:armmodel:cortex-a12scope:eqversion: -

Trust: 1.0

vendor:armmodel:neoverse n2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3229y

Trust: 1.0

vendor:intelmodel:xeon e5 1660 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2560

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8857_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2630 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6136

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830_v2

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8168

Trust: 1.0

vendor:intelmodel:xeon e3 1265l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2377m

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3845

Trust: 1.0

vendor:armmodel:cortex-a78scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:650

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4330m

Trust: 1.0

vendor:intelmodel:xeon e5 1650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j3060

Trust: 1.0

vendor:intelmodel:xeon e3 1280scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:820qm

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160f

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620um

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620_v2

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3826

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5700hq

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5504

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735f

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4302y

Trust: 1.0

vendor:intelmodel:xeon e5 2448lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8891_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5850eq

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5650

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2637m

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1535m_v5

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4750hq

Trust: 1.0

vendor:oraclemodel:local service management systemscope:eqversion:13.1

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n4200

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5506

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5119t

Trust: 1.0

vendor:synologymodel:vs360hdscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470

Trust: 1.0

vendor:intelmodel:xeon e5 2623 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850

Trust: 1.0

vendor:phoenixcontactmodel:vl ipc p7000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1680 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5118

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6138t

Trust: 1.0

vendor:phoenixcontactmodel:vl ppc 2000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667_v4

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699_v4

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770s

Trust: 1.0

vendor:siemensmodel:simatic winac rtx \ 2010scope:ltversion:2010

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100te

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3339y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4960hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590s

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4870

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:880

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2310e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:960

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6320

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690s

Trust: 1.0

vendor:intelmodel:xeon e5 1620 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4430s

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3110m

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8850_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2643 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2518

Trust: 1.0

vendor:phoenixcontactmodel:vl2 ppc7 1000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5630

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700mq

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3430

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160m

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y70

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4603_v2

Trust: 1.0

vendor:phoenixcontactmodel:bl bpc 7001scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2320

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:750s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4950hq

Trust: 1.0

vendor:intelmodel:xeon e5 2430 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8860_v4

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2515e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4430

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:875k

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6138f

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8867_v4

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:920xm

Trust: 1.0

vendor:vmwaremodel:workstationscope:ltversion:12.5.8

Trust: 1.0

vendor:phoenixcontactmodel:bl bpc 3001scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:470um

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:w3680

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697_v4

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3740

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4610m

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2308

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3630qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570te

Trust: 1.0

vendor:intelmodel:xeon e3 1286 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700eq

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2683_v4

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6126

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2460

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820_v4

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2820

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4020y

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5005u

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4116t

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5649

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:42.3

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4607

Trust: 1.0

vendor:phoenixcontactmodel:vl2 ppc 9000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5557u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6400t

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3825

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2340ue

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2538

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:930

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:430um

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3240

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100h

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2830

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2430m

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2930

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2803

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6440hq

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3775d

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3580

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600t

Trust: 1.0

vendor:oraclemodel:local service management systemscope:eqversion:13.2

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2810

Trust: 1.0

vendor:intelmodel:xeon e5 2623 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2628l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5020u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210y

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3950

Trust: 1.0

vendor:phoenixcontactmodel:vl2 bpc 7000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1285 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4102e

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3508

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3230m

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3815

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7210

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5606

Trust: 1.0

vendor:intelmodel:xeon e3 1501l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2350m

Trust: 1.0

vendor:phoenixcontactmodel:vl2 ppc9 1000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4712mq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8350u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610_v4

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8893_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6360u

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735d

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2312m

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e7530

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5506

Trust: 1.0

vendor:intelmodel:xeon e5 2440 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j1900

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2640m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4112e

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2670_v3

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2330m

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330t

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2430l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4350u

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8850

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658_v4

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4628l_v4

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3337u

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1535m_v6

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2805

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2718

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3708

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4402ec

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4870hq

Trust: 1.0

vendor:intelmodel:xeon e5 2630scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2580

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w_v3

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4667_v4

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1505m_v6

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4260u

Trust: 1.0

vendor:intelmodel:xeon e5 2650l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600k

Trust: 1.0

vendor:intelmodel:xeon e5 2438l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:540um

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2730

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4440s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2760qm

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4655_v4

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7600u

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4809_v2

Trust: 1.0

vendor:phoenixcontactmodel:bl bpc 2001scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:740qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4910mq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2467m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4130t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3360m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:460m

Trust: 1.0

vendor:intelmodel:xeon e3 1501m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6585r

Trust: 1.0

vendor:intelmodel:xeon e3 1265l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2470 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2608l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4578u

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:7y30

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3635qm

Trust: 1.0

vendor:intelmodel:xeon e3 1220scope:eqversion: -

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:11

Trust: 1.0

vendor:intelmodel:xeon e3 12201scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5675

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2130

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3330

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8550u

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5560

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4870_v2

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3795

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4860hq

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735g

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640_v2

Trust: 1.0

vendor:phoenixcontactmodel:bl2 bpc 1000scope:eqversion: -

Trust: 1.0

vendor:phoenixcontactmodel:vl2 bpc 3000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300u

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6152

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:380um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7560u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4660_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4288u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699r_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2618l v2scope:eqversion: -

Trust: 1.0

vendor:phoenixcontactmodel:bl ppc17 3000scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:17.10

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8176

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570s

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x6550

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3470

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5530

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6134m

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3235rk

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3475s

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j1750

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3230rk

Trust: 1.0

vendor:intelmodel:xeon e3 1505m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2698_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6287u

Trust: 1.0

vendor:intelmodel:xeon e5 1428l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330te

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210h

Trust: 1.0

vendor:intelmodel:xeon e5 2648l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8830

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2550

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300y

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870_v2

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6130t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6300u

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3758

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4370

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8893_v2

Trust: 1.0

vendor:armmodel:cortex-a15scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2860qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500t

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3440

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4667_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1285 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3550

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6132

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4170

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8156

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4370t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3615qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2375m

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8890_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820hk

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2667_v2

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5638

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2400s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:970

Trust: 1.0

vendor:intelmodel:xeon e5 2428l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3858

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4340te

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5518

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6154

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7210f

Trust: 1.0

vendor:phoenixcontactmodel:vl2 ppc 3000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697_v3

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y71

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3775

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4360t

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5570

Trust: 1.0

vendor:intelmodel:xeon e5 2408l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1278l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:w5580

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10a

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6142f

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7567u

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6098p

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2617m

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2910

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3000

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670r

Trust: 1.0

vendor:siemensmodel:simatic itc1500scope:ltversion:3.1

Trust: 1.0

vendor:intelmodel:xeon e5 2650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3120m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4025u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470s

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6126f

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2418l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7230f

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l7555

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2316

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2655le

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2643 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4720hq

Trust: 1.0

vendor:intelmodel:xeon e5 2403scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4000m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2115c

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7290f

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3550s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2920xm

Trust: 1.0

vendor:intelmodel:xeon e5 1680 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4980hq

Trust: 1.0

vendor:phoenixcontactmodel:bl bpc 2000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5675r

Trust: 1.0

vendor:intelmodel:xeon e3 1231 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2890_v2

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:550

Trust: 1.0

vendor:intelmodel:pentium jscope:eqversion:j3710

Trust: 1.0

vendor:phoenixcontactmodel:vl bpc 2000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:990x

Trust: 1.0

vendor:intelmodel:xeon e5 1630 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4350t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330e

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:480m

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3480

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3460

Trust: 1.0

vendor:intelmodel:xeon e3 1225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2870_v2

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3538

Trust: 1.0

vendor:synologymodel:router managerscope:gteversion:1.1

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100e

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3700

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1545m_v5

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3530

Trust: 1.0

vendor:intelmodel:xeon e3 1285l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4220y

Trust: 1.0

vendor:armmodel:cortex-a75scope:eqversion: -

Trust: 1.0

vendor:phoenixcontactmodel:bl ppc15 3000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700k

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5603

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3612qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:870

Trust: 1.0

vendor:intelmodel:xeon e5 1620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690_v4

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4010u

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660um

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5680

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3745d

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3517ue

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5257u

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6130

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670s

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:w5590

Trust: 1.0

vendor:intelmodel:xeon e3 1271 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4712hq

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4657l_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3610me

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:540m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:720qm

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697a_v4

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3740qm

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3808

Trust: 1.0

vendor:intelmodel:xeon e3 1125c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:950

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8153

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770t

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5607

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5520

Trust: 1.0

vendor:intelmodel:xeon e3 1226 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4410e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2390t

Trust: 1.0

vendor:phoenixcontactmodel:bl bpc 7000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3850

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6300

Trust: 1.0

vendor:intelmodel:xeon e5 1620 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:540

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j1800

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2650l_v4

Trust: 1.0

vendor:phoenixcontactmodel:dl ppc18.5m 7000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4120u

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2510e

Trust: 1.0

vendor:intelmodel:xeon e3 1286l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5690

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3217u

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4830_v4

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:370m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6167u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4250u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:980x

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2665

Trust: 1.0

vendor:phoenixcontactmodel:bl ppc12 1000scope:eqversion: -

Trust: 1.0

vendor:phoenixcontactmodel:vl2 bpc 1000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5015u

Trust: 1.0

vendor:intelmodel:xeon e3 1275scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:450m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820hq

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l7545

Trust: 1.0

vendor:phoenixcontactmodel:el ppc 1000\/wtscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3820qm

Trust: 1.0

vendor:intelmodel:xeon e5 2609scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x5-e3930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1258l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8891_v3

Trust: 1.0

vendor:phoenixcontactmodel:bl ppc 7000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:760

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3205rk

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6006u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3439y

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2557m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2357m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4627_v4

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4669_v3

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:840qm

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3308

Trust: 1.0

vendor:intelmodel:xeon e5 2603 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4500u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5700eq

Trust: 1.0

vendor:intelmodel:xeon e5 1650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8867l

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4340m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620le

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4550u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820eq

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:6y30

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1281 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7660u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4158u

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2880_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:860s

Trust: 1.0

vendor:intelmodel:xeon e-1105cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:ec5539

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2630qm

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2840

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200h

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4400e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4850hq

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2870

Trust: 1.0

vendor:intelmodel:pentium jscope:eqversion:j4205

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3520

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4130

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3115c

Trust: 1.0

vendor:intelmodel:xeon e3 1220 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6148

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2435m

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2807

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3120me

Trust: 1.0

vendor:intelmodel:xeon e5 2609 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2407 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820_v3

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2100t

Trust: 1.0

vendor:intelmodel:xeon e5 2430lscope:eqversion: -

Trust: 1.0

vendor:phoenixcontactmodel:bl2 ppc 7000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3295rk

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:870s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:975

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2808

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4765t

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:phoenixcontactmodel:vl2 bpc 9000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2365m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3220t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5650u

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1558l_v5

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100e

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4114

Trust: 1.0

vendor:armmodel:cortex-a77scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6260u

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:660

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2610ue

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2758

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3615qe

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5502

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870_v3

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5645

Trust: 1.0

vendor:intelmodel:xeon e5 2620 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic itc2200scope:ltversion:3.1

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2330e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5675c

Trust: 1.0

vendor:armmodel:cortex-a72scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1660 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3770

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5640

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5647

Trust: 1.0

vendor:intelmodel:xeon bronze 3106scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3689y

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:w3670

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y31

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3710

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5157u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:560um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2620m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4771

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x7542

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3770d

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4607_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2637scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5667

Trust: 1.0

vendor:intelmodel:xeon e5 2640 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4860_v2

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3736g

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590t

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2648l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3785

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7250f

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850_v4

Trust: 1.0

vendor:armmodel:cortex-a73scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4809_v3

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4150

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7295

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3750

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4807

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6140

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4810mq

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3558

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e6540

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660_v3

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4660_v4

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3590

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680_v3

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3050

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w_v4

Trust: 1.0

vendor:intelmodel:xeon bronze 3104scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3610qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4600u

Trust: 1.0

vendor:phoenixcontactmodel:dl ppc21.5m 7000scope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100m

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j3160

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5687

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:661

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4258u

Trust: 1.0

vendor:intelmodel:xeon e5 2620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3805

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:intelmodel:xeon e3 1105c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2609 v3scope:eqversion: -

Trust: 1.0

vendor:phoenixcontactmodel:bl rackmount 4uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5620

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2348m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:390m

Trust: 1.0

vendor:phoenixcontactmodel:el ppc 1000\/mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:380m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6442eq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:920

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8600k

Trust: 1.0

vendor:phoenixcontactmodel:bl2 bpc 7000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom escope:eqversion:e3827

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700t

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4648_v3

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2125

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2550k

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880l_v2

Trust: 1.0

vendor:vmwaremodel:esxiscope:eqversion:5.5.0

Trust: 1.0

vendor:intelmodel:xeon e3 1265l v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic itc1500 proscope:ltversion:3.1

Trust: 1.0

vendor:vmwaremodel:fusionscope:gteversion:8.0.0

Trust: 1.0

vendor:armmodel:cortex-a8scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2609 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2720qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4610y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8650u

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870_v4

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n4100

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2520

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670k

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6685r

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4785t

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2670_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4809_v4

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5618

Trust: 1.0

vendor:intelmodel:xeon e5 1650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2675qm

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e6510

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2450m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3555le

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2450p

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c3955

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4278u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2629m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640m

Trust: 1.0

vendor:synologymodel:diskstation managerscope:ltversion:6.2.2-24922

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3840qm

Trust: 1.0

vendor:siemensmodel:simatic itc1900scope:ltversion:3.1

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4760hq

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2820

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2649m

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6130f

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4510u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5600u

Trust: 1.0

vendor:intelmodel:xeon e5 2630l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3530

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3220

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3450s

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4030y

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5609

Trust: 1.0

vendor:intelmodel:xeon e5 1428lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3460

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3130

Trust: 1.0

vendor:phoenixcontactmodel:vl2 ppc 7000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4440

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4114t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3380m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4627_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4310u

Trust: 1.0

vendor:intelmodel:xeon e3 1268l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2400

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v3scope:eqversion: -

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2820qm

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5630

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4655_v3

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5670

Trust: 1.0

vendor:intelmodel:xeon e5 2637 v4scope:eqversion: -

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3517u

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l3426

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2380p

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500t

Trust: 1.0

vendor:intelmodel:xeon e3 1225 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2530

Trust: 1.0

vendor:armmodel:cortex-r8scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3632qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4350

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5503

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3060

Trust: 1.0

vendor:intelmodel:xeon e5 1660 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5120t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2715qe

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8893_v4

Trust: 1.0

vendor:phoenixcontactmodel:vl bpc 3000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7y75

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620lm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:610e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:980

Trust: 1.0

vendor:intelmodel:xeon e5 2618l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702ec

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3130m

Trust: 1.0

vendor:phoenixcontactmodel:bl ppc15 1000scope:eqversion: -

Trust: 1.0

vendor:armmodel:cortex-a78aescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702mq

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880_v4

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8158

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658_v3

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3265rk

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600s

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4627_v3

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1578l_v5

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n4000

Trust: 1.0

vendor:intelmodel:xeon e5 2643 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3427u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:8350k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3612qe

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6140m

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7285

Trust: 1.0

vendor:vmwaremodel:workstationscope:gteversion:12.0.0

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2697_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2700k

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2660

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5575r

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8891_v4

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4112

Trust: 1.0

vendor:intelmodel:xeon e5 2428lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2640 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3687u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3245

Trust: 1.0

vendor:intelmodel:xeon e3 1125cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5508

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7235

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2370m

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5677

Trust: 1.0

vendor:netappmodel:hciscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8250u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4600m

Trust: 1.0

vendor:intelmodel:pentium jscope:eqversion:j2850

Trust: 1.0

vendor:intelmodel:xeon e3 1220l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2698_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2650lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2105

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8700k

Trust: 1.0

vendor:intelmodel:xeon e5 2407scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2450lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2640scope:eqversion: -

Trust: 1.0

vendor:pepperl fuchsmodel:btc14scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2310m

Trust: 1.0

vendor:intelmodel:pentium jscope:eqversion:j2900

Trust: 1.0

vendor:intelmodel:xeon e5 2650l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6350hq

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5520

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8700

Trust: 1.0

vendor:armmodel:cortex-a17scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3227u

Trust: 1.0

vendor:intelmodel:xeon e3 1235l v5scope:eqversion: -

Trust: 1.0

vendor:armmodel:cortex-a9scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4110e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670t

Trust: 1.0

vendor:intelmodel:xeon e3 1260lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5122

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3250t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660lm

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610_v3

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2738

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770te

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5672

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3317u

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3570

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5950hq

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4610

Trust: 1.0

vendor:intelmodel:xeon e5 1660scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 12201 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2618l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2806

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6157u

Trust: 1.0

vendor:phoenixcontactmodel:bl2 bpc 2000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500k

Trust: 1.0

vendor:intelmodel:xeon e3 1275 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2860

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:560

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4202y

Trust: 1.0

vendor:intelmodel:xeon e3 1240 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6300t

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2338

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:350m

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6146

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e7520

Trust: 1.0

vendor:armmodel:cortex-x1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4160

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:2850

Trust: 1.0

vendor:intelmodel:atom x5-e3940scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1505l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3510

Trust: 1.0

vendor:intelmodel:xeon e3 1290scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4800mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620ue

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3480

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2350

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2699a_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2643scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2410m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650_v3

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5550u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4710mq

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5640

Trust: 1.0

vendor:phoenixcontactmodel:bl ppc17 1000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8164

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4620

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2537m

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8860_v3

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4850_v3

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3350p

Trust: 1.0

vendor:intelmodel:xeon e3 1230l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880l_v3

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640lm

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5540

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y51

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340m

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4710hq

Trust: 1.0

vendor:intelmodel:xeon e3 1245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4860

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8890_v3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:17.04

Trust: 1.0

vendor:intelmodel:xeon e5 2608l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8170m

Trust: 1.0

vendor:phoenixcontactmodel:bl rackmount 2uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:560m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6440eq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702hq

Trust: 1.0

vendor:intelmodel:core m5scope:eqversion:6y54

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4603

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2670

Trust: 1.0

vendor:armmodel:neoverse n1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2683_v3

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5775c

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5500u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:940xm

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j4005

Trust: 1.0

vendor:intelmodel:xeon e5 2450 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200m

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8880_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790s

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4650l

Trust: 1.0

vendor:intelmodel:atom x7-e3950scope:eqversion: -

Trust: 1.0

vendor:phoenixcontactmodel:bl ppc17 7000scope:eqversion: -

Trust: 1.0

vendor:armmodel:cortex-r7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340

Trust: 1.0

vendor:vmwaremodel:esxiscope:eqversion:6.5

Trust: 1.0

vendor:intelmodel:xeon e3 1276 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3450

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:8100

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6128

Trust: 1.0

vendor:intelmodel:xeon e5 2403 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640_v4

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2558

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3210

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3720qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4310m

Trust: 1.0

vendor:intelmodel:xeon e5 2603 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:680

Trust: 1.0

vendor:intelmodel:xeon silverscope:eqversion:4109t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e5507

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2420

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2508

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4012y

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l5530

Trust: 1.0

vendor:phoenixcontactmodel:vl ppc 3000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x3scope:eqversion:c3405

Trust: 1.0

vendor:intelmodel:xeon e3 1280 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5350h

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5250u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770r

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8180

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2120t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3210m

Trust: 1.0

vendor:intelmodel:xeon e5 2648l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1630 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690k

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6142

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7250

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3250

Trust: 1.0

vendor:phoenixcontactmodel:bl bpc 3000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2603scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2603 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3736f

Trust: 1.0

vendor:intelmodel:xeon e5 2637 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4820_v2

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3225

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700hq

Trust: 1.0

vendor:intelmodel:xeon e5 1650 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4030u

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8890_v4

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:lc5518

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2695_v3

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x5660

Trust: 1.0

vendor:intelmodel:xeon e3 1240l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x3450

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3560

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5287u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:860

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3610qe

Trust: 1.0

vendor:intelmodel:xeon e5 2637 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6134

Trust: 1.0

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:580m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4170t

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6138

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j4105

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570t

Trust: 1.0

vendor:phoenixcontactmodel:bl2 ppc 2000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3450

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2690_v2

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7500u

Trust: 1.0

vendor:intelmodel:xeon e3 1268l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2367m

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2695_v4

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2540m

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x7550

Trust: 1.0

vendor:intelmodel:xeon e3 1235scope:eqversion: -

Trust: 1.0

vendor:phoenixcontactmodel:vl2 bpc 2000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2658a_v3

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:e7540

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4624l_v2

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3745

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:lc5528

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z3735e

Trust: 1.0

vendor:intelmodel:xeon platinumscope:eqversion:8160

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:530

Trust: 1.0

vendor:intelmodel:xeon e5 2628l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700hq

Trust: 1.0

vendor:intelmodel:xeon e5 1620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100u

Trust: 1.0

vendor:intelmodel:xeon e5 2630 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4422e

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8870

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2960xm

Trust: 1.0

vendor:intelmodel:xeon e5 2418l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6142m

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:5115

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:ec5549

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2940

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3350

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2100

Trust: 1.0

vendor:intelmodel:xeon e3 1290 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340s

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j1850

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n3160

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3437u

Trust: 1.0

vendor:phoenixcontactmodel:dl ppc15m 7000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1241 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2516

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1585_v5

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600

Trust: 1.0

vendor:intelmodel:xeon e3 1230scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4640_v3

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570r

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2120

Trust: 1.0

vendor:intelmodel:xeon e5 2428l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2628l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1245 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6300hq

Trust: 1.0

vendor:intelmodel:atom zscope:eqversion:z2480

Trust: 1.0

vendor:phoenixcontactmodel:bl ppc 1000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3667u

Trust: 1.0

vendor:armmodel:cortex-a57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom cscope:eqversion:c2358

Trust: 1.0

vendor:intelmodel:celeron jscope:eqversion:j3355

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:4669_v4

Trust: 1.0

vendor:pepperl fuchsmodel:visunet rm shellscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4160t

Trust: 1.0

vendor:vmwaremodel:fusionscope:ltversion:8.5.9

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5850hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5300u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2635qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2102

Trust: 1.0

vendor:intelmodel:xeon e5 2440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2630l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1285l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4900mq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4005u

Trust: 1.0

vendor:phoenixcontactmodel:el ppc 1000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6150

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6148f

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4722hq

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2695_v2

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5350u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:670

Trust: 1.0

vendor:siemensmodel:simatic winac rtx \ 2010scope:eqversion:2010

Trust: 1.0

vendor:armmodel:cortex-a76scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1565l_v5

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200u

Trust: 1.0

vendor:phoenixcontactmodel:vl bpc 1000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3 1275l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 1428l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:w3690

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2405s

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3240t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:680um

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2687w_v2

Trust: 1.0

vendor:intelmodel:xeon e3 1230 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5 2420 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6200u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4402e

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4880_v2

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:4890_v2

Trust: 1.0

vendor:intelmodel:xeon e5 2620 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8867_v3

Trust: 1.0

vendor:intelmodel:xeon phiscope:eqversion:7290

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2920

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4150t

Trust: 1.0

vendor:phoenixcontactmodel:bl ppc15 7000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7scope:eqversion:8837

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6402p

Trust: 1.0

vendor:intelmodel:core m7scope:eqversion:6y75

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:x7560

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:l3406

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7920hq

Trust: 1.0

vendor:intelmodel:celeron nscope:eqversion:n2815

Trust: 1.0

vendor:synologymodel:skynasscope:eqversion: -

Trust: 1.0

vendor:phoenixcontactmodel:valueline ipcscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4360u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2710qe

Trust: 1.0

vendor:intelmodel:pentium nscope:eqversion:n3540

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3540m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2328m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3330s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8400

Trust: 1.0

vendor:intelmodel:xeon e3scope:eqversion:1515m_v5

Trust: 1.0

vendor:intelmodel:xeon e3 1270 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680

Trust: 1.0

vendor:intelmodel:xeon e5scope:eqversion:2680_v4

Trust: 1.0

vendor:intelmodel:xeon e5 2418lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon goldscope:eqversion:6144

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:750

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4110m

Trust: 1.0

vendor:amdmodel: - scope: - version: -

Trust: 0.8

vendor:armmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:dellmodel: - scope: - version: -

Trust: 0.8

vendor:dell emcmodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:hpmodel: - scope: - version: -

Trust: 0.8

vendor:hitachimodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:qualcomm incorporatedmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:synologymodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:複数のベンダmodel:(複数の製品)scope:eqversion: -

Trust: 0.8

vendor:複数のベンダmodel:(複数の製品)scope:eqversion:(multiple products)

Trust: 0.8

vendor:複数のベンダmodel:(複数の製品)scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows sp1scope:eqversion:7

Trust: 0.6

vendor:microsoftmodel:internet explorerscope:eqversion:11

Trust: 0.6

vendor:microsoftmodel:windowsscope:eqversion:8.1

Trust: 0.6

vendor:googlemodel: - scope:eqversion:v8

Trust: 0.6

vendor:microsoftmodel:windowsscope:eqversion:10

Trust: 0.6

vendor:microsoftmodel:edgescope:eqversion:0

Trust: 0.6

vendor:intelmodel:xeon cpu e5-1650scope:eqversion:v3

Trust: 0.6

vendor:armmodel:cortex a57scope: - version: -

Trust: 0.6

vendor:amdmodel:pro a8-9600 r7scope: - version: -

Trust: 0.6

vendor:amdmodel:compute cores 4c+6gscope:eqversion:10

Trust: 0.6

vendor:amdmodel:fx -8320 eight-core processorscope: - version: -

Trust: 0.6

vendor:microsoftmodel:windows serverscope: - version: -

Trust: 0.6

sources: CERT/CC: VU#180049 // CNVD: CNVD-2018-00304 // JVNDB: JVNDB-2018-001001 // NVD: CVE-2017-5753

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-5753
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2018-001001
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2018-00304
value: MEDIUM

Trust: 0.6

VULHUB: VHN-113956
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-5753
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2018-001001
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:S/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2018-00304
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-113956
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-5753
baseSeverity: MEDIUM
baseScore: 5.6
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.1
impactScore: 4.0
version: 3.1

Trust: 1.0

IPA: JVNDB-2018-001001
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-00304 // VULHUB: VHN-113956 // JVNDB: JVNDB-2018-001001 // NVD: CVE-2017-5753

PROBLEMTYPE DATA

problemtype:CWE-203

Trust: 1.1

problemtype:information leak (CWE-200) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-200

Trust: 0.1

sources: VULHUB: VHN-113956 // JVNDB: JVNDB-2018-001001 // NVD: CVE-2017-5753

THREAT TYPE

local

Trust: 0.2

sources: PACKETSTORM: 146018 // PACKETSTORM: 147582

TYPE

info disclosure

Trust: 0.2

sources: PACKETSTORM: 145964 // PACKETSTORM: 145809

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-113956

PATCH

title:“With speculative execution function  CPU  side-channel attacks againsturl:https://www.amd.com/en/corporate/speculative-execution

Trust: 0.8

sources: JVNDB: JVNDB-2018-001001

EXTERNAL IDS

db:NVDid:CVE-2017-5753

Trust: 4.4

db:CERT/CCid:VU#584653

Trust: 2.7

db:CERT/CCid:VU#180049

Trust: 1.9

db:BIDid:102371

Trust: 1.7

db:SECTRACKid:1040071

Trust: 1.1

db:SIEMENSid:SSA-505225

Trust: 1.1

db:SIEMENSid:SSA-608355

Trust: 1.1

db:PACKETSTORMid:145645

Trust: 1.1

db:LENOVOid:LEN-18282

Trust: 1.1

db:EXPLOIT-DBid:43427

Trust: 1.1

db:CERT@VDEid:VDE-2018-003

Trust: 1.1

db:CERT@VDEid:VDE-2018-002

Trust: 1.1

db:USCERTid:TA18-141A

Trust: 0.8

db:JVNid:JVNVU98137233

Trust: 0.8

db:JVNid:JVNVU94630516

Trust: 0.8

db:JVNid:JVNVU93823979

Trust: 0.8

db:JVNid:JVNVU99752892

Trust: 0.8

db:ICS CERTid:ICSA-23-075-01

Trust: 0.8

db:ICS CERTid:ICSA-23-257-04

Trust: 0.8

db:CERT/CCid:VU#155143

Trust: 0.8

db:ICS CERT ALERTid:ICS-ALERT-18-011-01A

Trust: 0.8

db:USCERTid:TA18-004A

Trust: 0.8

db:JVNDBid:JVNDB-2018-001001

Trust: 0.8

db:CNVDid:CNVD-2018-00304

Trust: 0.6

db:PACKETSTORMid:145837

Trust: 0.1

db:PACKETSTORMid:145774

Trust: 0.1

db:PACKETSTORMid:150863

Trust: 0.1

db:PACKETSTORMid:145715

Trust: 0.1

db:CNNVDid:CNNVD-201801-150

Trust: 0.1

db:VULHUBid:VHN-113956

Trust: 0.1

db:PACKETSTORMid:145718

Trust: 0.1

db:PACKETSTORMid:145964

Trust: 0.1

db:PACKETSTORMid:147451

Trust: 0.1

db:PACKETSTORMid:145852

Trust: 0.1

db:PACKETSTORMid:146098

Trust: 0.1

db:PACKETSTORMid:145809

Trust: 0.1

db:PACKETSTORMid:146308

Trust: 0.1

db:PACKETSTORMid:145651

Trust: 0.1

db:PACKETSTORMid:146018

Trust: 0.1

db:PACKETSTORMid:145654

Trust: 0.1

db:PACKETSTORMid:147582

Trust: 0.1

sources: CERT/CC: VU#180049 // CNVD: CNVD-2018-00304 // VULHUB: VHN-113956 // JVNDB: JVNDB-2018-001001 // PACKETSTORM: 145718 // PACKETSTORM: 145964 // PACKETSTORM: 147451 // PACKETSTORM: 145852 // PACKETSTORM: 146098 // PACKETSTORM: 145809 // PACKETSTORM: 146308 // PACKETSTORM: 145651 // PACKETSTORM: 146018 // PACKETSTORM: 145654 // PACKETSTORM: 147582 // NVD: CVE-2017-5753

REFERENCES

url:http://www.kb.cert.org/vuls/id/584653

Trust: 2.7

url:https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

Trust: 1.9

url:http://www.securityfocus.com/bid/102371

Trust: 1.7

url:https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution

Trust: 1.6

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html

Trust: 1.6

url:https://support.apple.com//ht208394

Trust: 1.6

url:http://www.dell.com/support/speculative-store-bypass

Trust: 1.6

url:https://access.redhat.com/security/vulnerabilities/speculativeexecution

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2017-5715

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2017-5753

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2017-5754

Trust: 1.2

url:https://seclists.org/bugtraq/2019/jun/36

Trust: 1.1

url:https://www.kb.cert.org/vuls/id/180049

Trust: 1.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180104-cpusidechannel

Trust: 1.1

url:http://nvidia.custhelp.com/app/answers/detail/a_id/4609

Trust: 1.1

url:http://nvidia.custhelp.com/app/answers/detail/a_id/4611

Trust: 1.1

url:http://nvidia.custhelp.com/app/answers/detail/a_id/4613

Trust: 1.1

url:http://nvidia.custhelp.com/app/answers/detail/a_id/4614

Trust: 1.1

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2018-001.txt

Trust: 1.1

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

Trust: 1.1

url:http://xenbits.xen.org/xsa/advisory-254.html

Trust: 1.1

url:https://aws.amazon.com/de/security/security-bulletins/aws-2018-013/

Trust: 1.1

url:https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/

Trust: 1.1

url:https://cdrdv2.intel.com/v1/dl/getcontent/685359

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

Trust: 1.1

url:https://cert.vde.com/en-us/advisories/vde-2018-002

Trust: 1.1

url:https://cert.vde.com/en-us/advisories/vde-2018-003

Trust: 1.1

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.1

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180002

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20180104-0001/

Trust: 1.1

url:https://support.citrix.com/article/ctx231399

Trust: 1.1

url:https://support.f5.com/csp/article/k91229003

Trust: 1.1

url:https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us

Trust: 1.1

url:https://support.lenovo.com/us/en/solutions/len-18282

Trust: 1.1

url:https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001

Trust: 1.1

url:https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/

Trust: 1.1

url:https://www.synology.com/support/security/synology_sa_18_01

Trust: 1.1

url:https://www.vmware.com/us/security/advisories/vmsa-2018-0002.html

Trust: 1.1

url:https://www.debian.org/security/2018/dsa-4187

Trust: 1.1

url:https://www.debian.org/security/2018/dsa-4188

Trust: 1.1

url:https://www.exploit-db.com/exploits/43427/

Trust: 1.1

url:https://security.gentoo.org/glsa/201810-06

Trust: 1.1

url:http://packetstormsecurity.com/files/145645/spectre-information-disclosure-proof-of-concept.html

Trust: 1.1

url:https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html

Trust: 1.1

url:https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html

Trust: 1.1

url:https://spectreattack.com/

Trust: 1.1

url:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2018:0292

Trust: 1.1

url:http://www.securitytracker.com/id/1040071

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html

Trust: 1.1

url:https://usn.ubuntu.com/usn/usn-3516-1/

Trust: 1.1

url:https://usn.ubuntu.com/3540-1/

Trust: 1.1

url:https://usn.ubuntu.com/3540-2/

Trust: 1.1

url:https://usn.ubuntu.com/3541-1/

Trust: 1.1

url:https://usn.ubuntu.com/3541-2/

Trust: 1.1

url:https://usn.ubuntu.com/3542-1/

Trust: 1.1

url:https://usn.ubuntu.com/3542-2/

Trust: 1.1

url:https://usn.ubuntu.com/3549-1/

Trust: 1.1

url:https://usn.ubuntu.com/3580-1/

Trust: 1.1

url:https://usn.ubuntu.com/3597-1/

Trust: 1.1

url:https://usn.ubuntu.com/3597-2/

Trust: 1.1

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03871en_us

Trust: 1.0

url:https://bugs.chromium.org/p/project-zero/issues/detail?id=1528

Trust: 0.8

url:https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf

Trust: 0.8

url:https://www.us-cert.gov/ncas/alerts/ta18-141a

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/208.html

Trust: 0.8

url:https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf

Trust: 0.8

url:https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel

Trust: 0.8

url:https://fortiguard.com/psirt/fg-ir-18-002

Trust: 0.8

url:https://support.hp.com/us-en/document/c06001626

Trust: 0.8

url:http://www.hitachi.com/hirt/publications/hirt-pub18001/

Trust: 0.8

url:https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/

Trust: 0.8

url:https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution

Trust: 0.8

url:https://access.redhat.com/security/vulnerabilities/ssbd

Trust: 0.8

url:https://www.suse.com/support/kb/doc/?id=7022937

Trust: 0.8

url:https://www.synology.com/en-global/support/security/synology_sa_18_23

Trust: 0.8

url:https://wiki.ubuntu.com/securityteam/knowledgebase/variant4

Trust: 0.8

url:https://kb.vmware.com/s/article/54951

Trust: 0.8

url:https://aws.amazon.com/security/security-bulletins/aws-2018-015/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu93823979/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94630516/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99752892/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98137233/

Trust: 0.8

url:https://www.us-cert.gov/ncas/alerts/ta18-004a

Trust: 0.8

url:https://kb.cert.org/vuls/id/155143

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-257-04

Trust: 0.8

url:https://ics-cert.us-cert.gov/alerts/ics-alert-18-011-01a

Trust: 0.8

url:http://blog.cyberus-technology.de/posts/2018-01-03-meltdown.html

Trust: 0.8

url:https://meltdownattack.com/

Trust: 0.8

url:https://googleprojectzero.blogspot.jp/2018/01/reading-privileged-memory-with-side.html

Trust: 0.8

url:https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2017-5753

Trust: 0.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2017-5754

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2017-5715

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-a00039267en_us>

Trust: 0.2

url:https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088&langu

Trust: 0.2

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us

Trust: 0.2

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.2

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.2

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.2

url:https://developer.arm.com/support/security-update>

Trust: 0.2

url:http://www.amd.com/en/corporate/speculative-execution>

Trust: 0.2

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.2

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03871en_us

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2018:0047

Trust: 0.1

url:https://access.redhat.com/solutions/3307851

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5803

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18241

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1066

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16911

Trust: 0.1

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-6927

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1068

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-9016

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5750

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5332

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-0861

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5333

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16914

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16526

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7492

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16913

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1092

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18216

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13220

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16912

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18203

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000004

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkit2gtk/2.18.5-0ubuntu0.17.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkit2gtk/2.18.5-0ubuntu0.17.10.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkit2gtk/2.18.5-0ubuntu0.16.04.1

Trust: 0.1

url:https://www.ubuntu.com/usn/usn-3530-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7472

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8539

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12192

Trust: 0.1

url:https://access.redhat.com/articles/3327131

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8539

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-12193

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-15649

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-7472

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12193

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2018:0151

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-12192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-15649

Trust: 0.1

url:https://access.redhat.com/articles/3327131.

Trust: 0.1

url:https://twitter.com/vmwaresrc

Trust: 0.1

url:https://my.vmware.com/group/vmware/get-download?downloadgroup=vic131

Trust: 0.1

url:https://kb.vmware.com/kb/52284

Trust: 0.1

url:https://blogs.vmware.com/security

Trust: 0.1

url:http://www.vmware.com/security/advisories

Trust: 0.1

url:https://kb.vmware.com/kb/1055

Trust: 0.1

url:https://kb.vmware.com/kb/52377

Trust: 0.1

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5753

Trust: 0.1

url:https://kb.vmware.com/kb/52467

Trust: 0.1

url:https://kb.vmware.com/kb/52312

Trust: 0.1

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5754

Trust: 0.1

url:https://lists.vmware.com/mailman/listinfo/security-announce

Trust: 0.1

url:https://kb.vmware.com/kb/52264

Trust: 0.1

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5715

Trust: 0.1

url:https://kb.vmware.com/kb/52245

Trust: 0.1

url:https://www.vmware.com/support/policies/lifecycle.html

Trust: 0.1

url:https://kb.vmware.com/kb/52497

Trust: 0.1

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:https://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2018:0018

Trust: 0.1

url:https://wiki.ubuntu.com/securityteam/knowledgebase/spectreandmeltdown

Trust: 0.1

url:https://www.ubuntu.com/usn/usn-3542-1

Trust: 0.1

url:https://www.ubuntu.com/usn/usn-3542-2

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2018:0020

Trust: 0.1

url:https://www.microfocus.com/support-and-services/report-security

Trust: 0.1

url:https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification

Trust: 0.1

url:https://cf.passport.softwaregrp.com/hppcf/createuser.do

Trust: 0.1

url:https://softwaresupport.hpe.com/security-vulnerability

Trust: 0.1

url:https://softwaresupport.hpe.com/document/-/facetsearch/document/km03158629

Trust: 0.1

sources: CERT/CC: VU#180049 // CNVD: CNVD-2018-00304 // VULHUB: VHN-113956 // JVNDB: JVNDB-2018-001001 // PACKETSTORM: 145718 // PACKETSTORM: 145964 // PACKETSTORM: 147451 // PACKETSTORM: 145852 // PACKETSTORM: 146098 // PACKETSTORM: 145809 // PACKETSTORM: 146308 // PACKETSTORM: 145651 // PACKETSTORM: 146018 // PACKETSTORM: 145654 // PACKETSTORM: 147582 // NVD: CVE-2017-5753

CREDITS

Red Hat

Trust: 0.4

sources: PACKETSTORM: 145718 // PACKETSTORM: 146098 // PACKETSTORM: 145651 // PACKETSTORM: 145654

SOURCES

db:CERT/CCid:VU#180049
db:CNVDid:CNVD-2018-00304
db:VULHUBid:VHN-113956
db:JVNDBid:JVNDB-2018-001001
db:PACKETSTORMid:145718
db:PACKETSTORMid:145964
db:PACKETSTORMid:147451
db:PACKETSTORMid:145852
db:PACKETSTORMid:146098
db:PACKETSTORMid:145809
db:PACKETSTORMid:146308
db:PACKETSTORMid:145651
db:PACKETSTORMid:146018
db:PACKETSTORMid:145654
db:PACKETSTORMid:147582
db:NVDid:CVE-2017-5753

LAST UPDATE DATE

2025-03-12T20:11:12.409000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#180049date:2018-06-19T00:00:00
db:CNVDid:CNVD-2018-00304date:2018-01-08T00:00:00
db:VULHUBid:VHN-113956date:2021-11-23T00:00:00
db:JVNDBid:JVNDB-2018-001001date:2024-04-11T06:49:00
db:NVDid:CVE-2017-5753date:2025-01-14T19:29:55.853

SOURCES RELEASE DATE

db:CERT/CCid:VU#180049date:2018-05-21T00:00:00
db:CNVDid:CNVD-2018-00304date:2018-01-04T00:00:00
db:VULHUBid:VHN-113956date:2018-01-04T00:00:00
db:JVNDBid:JVNDB-2018-001001date:2018-01-04T00:00:00
db:PACKETSTORMid:145718date:2018-01-06T18:01:06
db:PACKETSTORMid:145964date:2018-01-18T20:41:22
db:PACKETSTORMid:147451date:2018-05-03T01:31:56
db:PACKETSTORMid:145852date:2018-01-12T01:15:52
db:PACKETSTORMid:146098date:2018-01-25T21:47:22
db:PACKETSTORMid:145809date:2018-01-11T02:31:24
db:PACKETSTORMid:146308date:2018-02-08T23:33:33
db:PACKETSTORMid:145651date:2018-01-04T17:50:36
db:PACKETSTORMid:146018date:2018-01-23T04:32:15
db:PACKETSTORMid:145654date:2018-01-04T17:51:10
db:PACKETSTORMid:147582date:2018-05-10T23:27:00
db:NVDid:CVE-2017-5753date:2018-01-04T13:29:00.257