ID

VAR-201808-0957


CVE

CVE-2018-3646


TITLE

Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)

Trust: 0.8

sources: CERT/CC: VU#982149

DESCRIPTION

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. These attacks are known as L1 Terminal Fault: SGX, L1 Terminal Fault: OS/SMM, and L1 Terminal Fault: VMM. Intel Core i3 processor, etc. are all CPU (central processing unit) products of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products that use speculative execution and address translation. The following products are affected: Intel Core i3 processor; Intel Core i5 processor; Intel Core i7 processor; Intel Core M processor family; 2nd generation Intel Core processors; 3rd generation Intel Core processors; 4th generation Intel Core processors; 5th generation Intel Core processors, etc. (CVE-2018-3620) Andrey Konovalov discovered an out-of-bounds read in the POSIX timers subsystem in the Linux kernel. Description: The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal. (CVE-2018-3620, CVE-2018-3646) * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2018-10-30-2 macOS Mojave 10.14.1, Security Update 2018-001 High Sierra, Security Update 2018-005 Sierra macOS Mojave 10.14.1, Security Update 2018-001 High Sierra, and Security Update 2018-005 Sierra are now available and address the following: afpserver Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: A remote attacker may be able to attack AFP servers through HTTP clients Description: An input validation issue was addressed with improved input validation. CVE-2018-4295: Jianjun Chen (@whucjj) from Tsinghua University and UC Berkeley AppleGraphicsControl Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4410: an anonymous researcher working with Trend Micro's Zero Day Initiative AppleGraphicsControl Available for: macOS High Sierra 10.13.6 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4417: Lee of the Information Security Lab Yonsei University working with Trend Micro's Zero Day Initiative APR Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: Multiple buffer overflow issues existed in Perl Description: Multiple issues in Perl were addressed with improved memory handling. CVE-2017-12613: Craig Young of Tripwire VERT CVE-2017-12618: Craig Young of Tripwire VERT ATS Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend Micro's Zero Day Initiative ATS Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4308: Mohamed Ghannam (@_simo36) CFNetwork Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative CoreAnimation Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4415: Liang Zhuo working with Beyond Security's SecuriTeam Secure Disclosure CoreCrypto Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: An attacker may be able to exploit a weakness in the Miller-Rabin primality test to incorrectly identify prime numbers Description: An issue existed in the method for determining prime numbers. This issue was addressed by using pseudorandom bases for testing of primes. CVE-2018-4398: Martin Albrecht, Jake Massimo and Kenny Paterson of Royal Holloway, University of London, and Juraj Somorovsky of Ruhr University, Bochum CoreFoundation Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4412: The UK's National Cyber Security Centre (NCSC) CUPS Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: In certain configurations, a remote attacker may be able to replace the message content from the print server with arbitrary content Description: An injection issue was addressed with improved validation. CVE-2018-4153: Michael Hanselmann of hansmi.ch CUPS Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A denial of service issue was addressed with improved validation. CVE-2018-4406: Michael Hanselmann of hansmi.ch Dictionary Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: Parsing a maliciously crafted dictionary file may lead to disclosure of user information Description: A validation issue existed which allowed local file access. This was addressed with input sanitization. CVE-2018-4346: Wojciech ReguAa (@_r3ggi) of SecuRing Dock Available for: macOS Mojave 10.14 Impact: A malicious application may be able to access restricted files Description: This issue was addressed by removing additional entitlements. CVE-2018-4403: Patrick Wardle of Digita Security dyld Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: A malicious application may be able to elevate privileges Description: A logic issue was addressed with improved validation. This ensures that older data read from recently-written-to addresses cannot be read via a speculative side-channel. CVE-2018-3639: Jann Horn (@tehjh) of Google Project Zero (GPZ), Ken Johnson of the Microsoft Security Response Center (MSRC) EFI Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: A local user may be able to modify protected parts of the file system Description: A configuration issue was addressed with additional restrictions. CVE-2018-4342: Timothy Perfitt of Twocanoes Software Foundation Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: Processing a maliciously crafted text file may lead to a denial of service Description: A denial of service issue was addressed with improved validation. CVE-2018-4304: jianan.huang (@Sevck) Grand Central Dispatch Available for: macOS High Sierra 10.13.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4426: Brandon Azad Heimdal Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-3646: Baris Kasikci, Daniel Genkin, Ofir Weisse, and Thomas F. Wenisch of University of Michigan, Mark Silberstein and Marina Minkin of Technion, Raoul Strackx, Jo Van Bulck, and Frank Piessens of KU Leuven, Rodrigo Branco, Henrique Kawakami, Ke Sun, and Kekai Hu of Intel Corporation, Yuval Yarom of The University of Adelaide Hypervisor Available for: macOS Sierra 10.12.6 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption vulnerability was addressed with improved locking. CVE-2018-4242: Zhuo Liang of Qihoo 360 Nirvan Team ICU Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: Processing a maliciously crafted string may lead to heap corruption Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4394: an anonymous researcher Intel Graphics Driver Available for: macOS Sierra 10.12.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4334: Ian Beer of Google Project Zero Intel Graphics Driver Available for: macOS High Sierra 10.13.6 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4396: Yu Wang of Didi Research America CVE-2018-4418: Yu Wang of Didi Research America Intel Graphics Driver Available for: macOS High Sierra 10.13.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4350: Yu Wang of Didi Research America IOGraphics Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4422: an anonymous researcher working with Trend Micro's Zero Day Initiative IOHIDFamily Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation CVE-2018-4408: Ian Beer of Google Project Zero IOKit Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4402: Proteas of Qihoo 360 Nirvan Team IOKit Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: A malicious application may be able to break out of its sandbox Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4341: Ian Beer of Google Project Zero CVE-2018-4354: Ian Beer of Google Project Zero IOUserEthernet Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4401: Apple IPSec Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: An application may be able to gain elevated privileges Description: An out-of-bounds read was addressed with improved input validation. CVE-2018-4371: Tim Michaud (@TimGMichaud) of Leviathan Security Group Kernel Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed by removing the vulnerable code. CVE-2018-4420: Mohamed Ghannam (@_simo36) Kernel Available for: macOS High Sierra 10.13.6 Impact: A malicious application may be able to leak sensitive user information Description: An access issue existed with privileged API calls. This issue was addressed with additional restrictions. CVE-2018-4399: Fabiano Anemone (@anoane) Kernel Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4340: Mohamed Ghannam (@_simo36) CVE-2018-4419: Mohamed Ghannam (@_simo36) CVE-2018-4425: cc working with Trend Micro's Zero Day Initiative, Juwei Lin (@panicaII) of Trend Micro working with Trend Micro's Zero Day Initiative Kernel Available for: macOS Sierra 10.12.6 Impact: Mounting a maliciously crafted NFS network share may lead to arbitrary code execution with system privileges Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2018-4259: Kevin Backhouse of Semmle and LGTM.com CVE-2018-4286: Kevin Backhouse of Semmle and LGTM.com CVE-2018-4287: Kevin Backhouse of Semmle and LGTM.com CVE-2018-4288: Kevin Backhouse of Semmle and LGTM.com CVE-2018-4291: Kevin Backhouse of Semmle and LGTM.com Kernel Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: An application may be able to read restricted memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2018-4413: Juwei Lin (@panicaII) of TrendMicro Mobile Security Team Kernel Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An attacker in a privileged network position may be able to execute arbitrary code Description: A memory corruption issue was addressed with improved validation. CVE-2018-4407: Kevin Backhouse of Semmle Ltd. Kernel Available for: macOS Mojave 10.14 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow was addressed with improved size validation. CVE-2018-4424: Dr. Silvio Cesare of InfoSect Login Window Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: A local user may be able to cause a denial of service Description: A validation issue was addressed with improved logic. CVE-2018-4348: Ken Gannon of MWR InfoSecurity and Christian Demko of MWR InfoSecurity Mail Available for: macOS Mojave 10.14 Impact: Processing a maliciously crafted mail message may lead to UI spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2018-4389: Dropbox Offensive Security Team, Theodor Ragnar Gislason of Syndis mDNSOffloadUserClient Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4326: an anonymous researcher working with Trend Micro's Zero Day Initiative, Zhuo Liang of Qihoo 360 Nirvan Team MediaRemote Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with additional sandbox restrictions. This ensures that implementation specific system registers cannot be leaked via a speculative execution side-channel. CVE-2018-3640: Innokentiy Sennovskiy from BiZone LLC (bi.zone), Zdenek Sojka, Rudolf Marek and Alex Zuepke from SYSGO AG (sysgo.com) NetworkExtension Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: Connecting to a VPN server may leak DNS queries to a DNS proxy Description: A logic issue was addressed with improved state management. CVE-2018-4369: an anonymous researcher Perl Available for: macOS Sierra 10.12.6 Impact: Multiple buffer overflow issues existed in Perl Description: Multiple issues in Perl were addressed with improved memory handling. CVE-2018-6797: Brian Carpenter Ruby Available for: macOS Sierra 10.12.6 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: Multiple issues in Ruby were addressed in this update. CVE-2017-898 CVE-2017-10784 CVE-2017-14033 CVE-2017-14064 CVE-2017-17405 CVE-2017-17742 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780 Security Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: Processing a maliciously crafted S/MIME signed message may lead to a denial of service Description: A validation issue was addressed with improved logic. CVE-2018-4400: Yukinobu Nagayasu of LAC Co., Ltd. Security Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: A local user may be able to cause a denial of service Description: This issue was addressed with improved checks. CVE-2018-4395: Patrick Wardle of Digita Security Spotlight Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4393: Lufeng Li Symptom Framework Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4203: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative WiFi Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A denial of service issue was addressed with improved validation. CVE-2018-4368: Milan Stute and Alex Mariotto of Secure Mobile Networking Lab at Technische UniversitA$?t Darmstadt Additional recognition Calendar We would like to acknowledge an anonymous researcher for their assistance. iBooks We would like to acknowledge Sem VoigtlA$?nder of Fontys Hogeschool ICT for their assistance. Kernel We would like to acknowledge Brandon Azad for their assistance. LaunchServices We would like to acknowledge Alok Menghrajani of Square for their assistance. Quick Look We would like to acknowledge lokihardt of Google Project Zero for their assistance. Security We would like to acknowledge Marinos Bernitsas of Parachute for their assistance. Terminal We would like to acknowledge an anonymous researcher for their assistance. Installation note: macOS Mojave 10.14.1, Security Update 2018-001 High Sierra, and Security Update 2018-005 Sierra may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlvYkgYpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3EcGQ// QbUbTOZRgxcStGZjs+qdXjeaXI6i1MKaky7o/iYCXf87crFu79PCsXyPU1jeMvoS tgDxz7ornlyaxR4wcSYzfcuIeY2ZH+dkxc7JJHQbKTW1dWYHpXUUzzNm+Ay/Gtk+ 2EIAgJ9oUf8FARR5cmcKBZfLFVdc40vpM3bBCV4m2Kr5KiDsqZKdZTujBQRccAsO HKRbhDecw0WX/CfEbLprs86uIXFMIoifhmh8LMebjzIQn2ozoFG6R31vMMHeDpir zf0xlVCJrJy/XywmkodhBWWrUWcM0hfsJ8EmyIBwFEYUxFhOV3D+x3rStd2kjyNL LG9oWclxDkjImQXdrL8IRAQfZvcVQFZK2vSGCYfRN0LY105sxjPjeIsJ0RORzcSN 2mlDR1UuTosk0GleDbmhv/ornfOc537UebwuHVWU5LpPNFkvY1Cv8zPrQAHewuod TmktkNuv2x2fgw9g7ntE88UBF9JMC+Ofs/FgJ67RkoT4R39P7VvaztHlmxmr/rIw TrSs7TDVqciz+DOMRKxyNPI1cpXM5ITCTvgbY4+RWwaFJzfgY+Gc+sldvVcb1x9I LlsI19MA0bsvi+ReOcLbWYuEHaVhVqZ7LndxR9m2gJ39L9jff+dOsSlznF4OLs+S t7Rz6i2mOpe6vXobkTUmml3m3zYIhL3XcdcYpw3U0F8= =uhgi -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2018:2391-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2391 Issue date: 2018-08-14 CVE Names: CVE-2018-3620 CVE-2018-3646 CVE-2018-10901 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux HPC Node EUS (v. 6.7) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7) - x86_64 Red Hat Enterprise Linux Server EUS (v. 6.7) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.7) - i386, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1585005 - CVE-2018-3646 Kernel: hw: cpu: L1 terminal fault (L1TF) 1601849 - CVE-2018-10901 kernel: kvm: vmx: host GDT limit corruption 6. Package List: Red Hat Enterprise Linux HPC Node EUS (v. 6.7): Source: kernel-2.6.32-573.60.4.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-573.60.4.el6.noarch.rpm kernel-doc-2.6.32-573.60.4.el6.noarch.rpm kernel-firmware-2.6.32-573.60.4.el6.noarch.rpm x86_64: kernel-2.6.32-573.60.4.el6.x86_64.rpm kernel-debug-2.6.32-573.60.4.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.60.4.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.60.4.el6.i686.rpm kernel-debug-devel-2.6.32-573.60.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.60.4.el6.i686.rpm kernel-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.60.4.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.60.4.el6.x86_64.rpm kernel-devel-2.6.32-573.60.4.el6.x86_64.rpm kernel-headers-2.6.32-573.60.4.el6.x86_64.rpm perf-2.6.32-573.60.4.el6.x86_64.rpm perf-debuginfo-2.6.32-573.60.4.el6.i686.rpm perf-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.i686.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7): x86_64: kernel-debug-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.60.4.el6.x86_64.rpm perf-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm python-perf-2.6.32-573.60.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.7): Source: kernel-2.6.32-573.60.4.el6.src.rpm i386: kernel-2.6.32-573.60.4.el6.i686.rpm kernel-debug-2.6.32-573.60.4.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.60.4.el6.i686.rpm kernel-debug-devel-2.6.32-573.60.4.el6.i686.rpm kernel-debuginfo-2.6.32-573.60.4.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.60.4.el6.i686.rpm kernel-devel-2.6.32-573.60.4.el6.i686.rpm kernel-headers-2.6.32-573.60.4.el6.i686.rpm perf-2.6.32-573.60.4.el6.i686.rpm perf-debuginfo-2.6.32-573.60.4.el6.i686.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-573.60.4.el6.noarch.rpm kernel-doc-2.6.32-573.60.4.el6.noarch.rpm kernel-firmware-2.6.32-573.60.4.el6.noarch.rpm ppc64: kernel-2.6.32-573.60.4.el6.ppc64.rpm kernel-bootwrapper-2.6.32-573.60.4.el6.ppc64.rpm kernel-debug-2.6.32-573.60.4.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-573.60.4.el6.ppc64.rpm kernel-debug-devel-2.6.32-573.60.4.el6.ppc64.rpm kernel-debuginfo-2.6.32-573.60.4.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-573.60.4.el6.ppc64.rpm kernel-devel-2.6.32-573.60.4.el6.ppc64.rpm kernel-headers-2.6.32-573.60.4.el6.ppc64.rpm perf-2.6.32-573.60.4.el6.ppc64.rpm perf-debuginfo-2.6.32-573.60.4.el6.ppc64.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.ppc64.rpm s390x: kernel-2.6.32-573.60.4.el6.s390x.rpm kernel-debug-2.6.32-573.60.4.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-573.60.4.el6.s390x.rpm kernel-debug-devel-2.6.32-573.60.4.el6.s390x.rpm kernel-debuginfo-2.6.32-573.60.4.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-573.60.4.el6.s390x.rpm kernel-devel-2.6.32-573.60.4.el6.s390x.rpm kernel-headers-2.6.32-573.60.4.el6.s390x.rpm kernel-kdump-2.6.32-573.60.4.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-573.60.4.el6.s390x.rpm kernel-kdump-devel-2.6.32-573.60.4.el6.s390x.rpm perf-2.6.32-573.60.4.el6.s390x.rpm perf-debuginfo-2.6.32-573.60.4.el6.s390x.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.s390x.rpm x86_64: kernel-2.6.32-573.60.4.el6.x86_64.rpm kernel-debug-2.6.32-573.60.4.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.60.4.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.60.4.el6.i686.rpm kernel-debug-devel-2.6.32-573.60.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.60.4.el6.i686.rpm kernel-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.60.4.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.60.4.el6.x86_64.rpm kernel-devel-2.6.32-573.60.4.el6.x86_64.rpm kernel-headers-2.6.32-573.60.4.el6.x86_64.rpm perf-2.6.32-573.60.4.el6.x86_64.rpm perf-debuginfo-2.6.32-573.60.4.el6.i686.rpm perf-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.i686.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.7): i386: kernel-debug-debuginfo-2.6.32-573.60.4.el6.i686.rpm kernel-debuginfo-2.6.32-573.60.4.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.60.4.el6.i686.rpm perf-debuginfo-2.6.32-573.60.4.el6.i686.rpm python-perf-2.6.32-573.60.4.el6.i686.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-573.60.4.el6.ppc64.rpm kernel-debuginfo-2.6.32-573.60.4.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-573.60.4.el6.ppc64.rpm perf-debuginfo-2.6.32-573.60.4.el6.ppc64.rpm python-perf-2.6.32-573.60.4.el6.ppc64.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-573.60.4.el6.s390x.rpm kernel-debuginfo-2.6.32-573.60.4.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-573.60.4.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-573.60.4.el6.s390x.rpm perf-debuginfo-2.6.32-573.60.4.el6.s390x.rpm python-perf-2.6.32-573.60.4.el6.s390x.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.60.4.el6.x86_64.rpm perf-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm python-perf-2.6.32-573.60.4.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.60.4.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-3620 https://access.redhat.com/security/cve/CVE-2018-3646 https://access.redhat.com/security/cve/CVE-2018-10901 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/L1TF 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW3M8SNzjgjWX9erEAQiErBAAory8VPCGcEBtHB0jRsK9iY0i33l5jvM6 09Vt3g4R1+9kswOpuqtLjRtKKQdfSUHwD/OIm/OAxGTIi7icYruLGJVYEkInd/0/ 7dTA6YsNVWYfJFRyRwsfHJ0Ux26dtflis5c1uiGxSwuNaqupNwgmZQ+8KeH5idvR bUzJjNkwkvTLINylqLmYx1rsrDlJI5TwkAPs/XuMoXmcrsPFsyNt8LOOKxMhTKDu GslVRYIVZB+66n8RrpfxoBMw7lgWKRo3QMHCcpaIVf6GMHu082pZd6gx6MzqmAPH Ypei9YcRo+OFdhxBV8RmpEsTIOD6ENd0QwjLDAEIrYID7vCyrHWWPczpO4R+QMgX Hxn0XSdLLgf7RtC4/BxpxUdhfR2hMAUDjQELE01c0LkXx/AtdRWps7+wWHbyPj54 +N13v9qCX1ES3guYoG3zAueWT9P+NPpNrqqrpojyRwwWgsznVx28GCQnzjhRCItW 1g3CRcJ5QlrBgP9fDCMbnXXnZxbl8YiM6Lv1Bn/IC4h2QpgiFEZrmBli5Px8yDyu M/uRe5PIcZnxmeYHNvmZBN3g035QJv8TWm6C+QgDZGEcKgUHy2xBe4wr5oIQxZHM Us3kU5PKvkf2T1Y5jcFi5+ys5sSaa03MtKhfPJJJ8t4fKt0WEuUkoHAkTOHRDhrJ uO6i334Y8pM=HCvN -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). Bug Fix(es): * The kernel-rt packages have been upgraded to the 3.10.0-693.37.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1599860) 4. ========================================================================== Ubuntu Security Notice USN-3741-3 August 17, 2018 linux regressions ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS Summary: Several security issues were fixed in the Linux kernel. Unfortunately, the update introduced regressions that caused kernel panics when booting in some environments as well as preventing Java applications from starting. This update fixes the problems. We apologize for the inconvenience. Original advisory details: It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). (CVE-2018-3646) It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. A remote attacker could use this to cause a denial of service. (CVE-2018-5390) Juha-Matti Tilli discovered that the IP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packet fragments. A remote attacker could use this to cause a denial of service. (CVE-2018-5391) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: linux-image-3.13.0-156-generic 3.13.0-156.206 linux-image-3.13.0-156-generic-lpae 3.13.0-156.206 linux-image-3.13.0-156-lowlatency 3.13.0-156.206 linux-image-3.13.0-156-powerpc-e500 3.13.0-156.206 linux-image-3.13.0-156-powerpc-e500mc 3.13.0-156.206 linux-image-3.13.0-156-powerpc-smp 3.13.0-156.206 linux-image-3.13.0-156-powerpc64-emb 3.13.0-156.206 linux-image-3.13.0-156-powerpc64-smp 3.13.0-156.206 linux-image-generic 3.13.0.156.166 linux-image-generic-lpae 3.13.0.156.166 linux-image-lowlatency 3.13.0.156.166 linux-image-powerpc-e500 3.13.0.156.166 linux-image-powerpc-e500mc 3.13.0.156.166 linux-image-powerpc-smp 3.13.0.156.166 linux-image-powerpc64-emb 3.13.0.156.166 linux-image-powerpc64-smp 3.13.0.156.166 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. 6.5) - x86_64 3

Trust: 2.61

sources: NVD: CVE-2018-3646 // CERT/CC: VU#982149 // VULHUB: VHN-133677 // VULMON: CVE-2018-3646 // PACKETSTORM: 148915 // PACKETSTORM: 148952 // PACKETSTORM: 150108 // PACKETSTORM: 148909 // PACKETSTORM: 148903 // PACKETSTORM: 149143 // PACKETSTORM: 148913 // PACKETSTORM: 148991 // PACKETSTORM: 148906

AFFECTED PRODUCTS

vendor:intelmodel:core i3scope:eqversion:550

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3615qm

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6685r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6350hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4360

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2620m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3610me

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4158u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:950

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4550u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5157u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3245

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6440eq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:370m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4360u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2400

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4720hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3450

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2550k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3550s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8400

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2635qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:8350k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7660u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:920

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4350u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4308u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2340ue

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4130

Trust: 1.0

vendor:intelmodel:core m7scope:eqversion:6y75

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4510u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4440

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2557m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4288u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3439y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4610y

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6287u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:840qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6585r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5350h

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5600u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2520m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660ue

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4030y

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5015u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660lm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2375m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3840qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6260u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:470um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2357m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3689y

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2310e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8600k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3220t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6006u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3210

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2300

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6320

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2540m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:970

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2629m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770k

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:6y30

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2450m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2467m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210h

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2637m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4600u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620ue

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6098p

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:655k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500te

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3110m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3250t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3520m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2115c

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2860qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4160t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4710mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4765t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2435m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3120me

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3612qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2102

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:980

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4870hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5557u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4005u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3820qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:480m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:680um

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2105

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3217u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4120u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5287u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2655le

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2675qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3240t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8550u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:540m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4110e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3230m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:940xm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3615qe

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2348m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4910mq

Trust: 1.0

vendor:intelmodel:core m5scope:eqversion:6y57

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2610ue

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4558u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3210m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:430um

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2130

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3360m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2715qe

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y51

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:680

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4350

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:990x

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:380m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:660

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5250u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2400s

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330te

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4950hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6402p

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4010y

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y70

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2125

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5700eq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4440s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4710hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2330m

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y31

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3740qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:920xm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4220y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570te

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3227u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670r

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:390m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:875k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4250u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5775r

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8700

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5675c

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:661

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2670qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4012y

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4330m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4578u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3317u

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10a

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:530

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2367m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2120t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3550

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7920hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6300t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3540m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:870

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:560

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3427u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5010u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4850hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4712mq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5500u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4422e

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y10c

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4650u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3115c

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4402ec

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4860hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5005u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3570t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4430s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2700k

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6300u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:580m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4202y

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100h

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2510e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620lm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4110m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4170

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4410e

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:7y30

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3330

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330um

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2350m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4810mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2720qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4160

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5350u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2410m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4010u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:5020u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:870s

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4000m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3380m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:940

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2820qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6360u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2330e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3517ue

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4340te

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3687u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4722hq

Trust: 1.0

vendor:intelmodel:core m5scope:eqversion:6y54

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4800mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700eq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4760hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7500u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:560m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3337u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3612qe

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4370

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3437u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:350m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6600t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2390t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4400e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7560u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8250u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4980hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:8100

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6267u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4102e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2617m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6440hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6442eq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4960hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4900mq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:720qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2657m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2677m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6167u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2365m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4340m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:860

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2430m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4258u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:380um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6500t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2100

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4430

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4310m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:660um

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5575r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3635qm

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4360t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6400

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5257u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4112e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4330t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4150

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:460m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:860s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5700hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5200u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770te

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700ec

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7600u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4350t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:975

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4130t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3250

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640lm

Trust: 1.0

vendor:intelmodel:xeonscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:670

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570r

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6200u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:620le

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:980x

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3610qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520um

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6300

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:430m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820eq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4025u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4260u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6100te

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4500u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:8350u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7567u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4570

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4302y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2649m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3339y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3340

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5675r

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4600m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3537u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2310

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:880

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4300m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:930

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4700mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5850hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3667u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3120m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:540um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4030u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:750

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2310m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200h

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2760qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2320

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4210m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2515e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5750hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8700k

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200y

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4771

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:520e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2450p

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3130m

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4150t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3470s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3770t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820hk

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:330m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2920xm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4750hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5950hq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2960xm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6400t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:960

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2377m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3555le

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4690

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4712hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3229y

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3320m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4310u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2640m

Trust: 1.0

vendor:intelmodel:core mscope:eqversion:5y71

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4100u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2537m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3517u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4278u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4020y

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2500k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3220

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2120

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2600k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2312m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4610m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:820qm

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5550u

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4340

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4170t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:540

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5650u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4785t

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2100t

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:650

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2370m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:6300hq

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3217ue

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:5300u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2630qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2405s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:965

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:640m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4590s

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6157u

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4402e

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:4370t

Trust: 1.0

vendor:intelmodel:core m3scope:eqversion:7y32

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3225

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:8650u

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4790k

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:2328m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7820hq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:750s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5775c

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702mq

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:740qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:450m

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4200m

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3720qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3450s

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:2380p

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3330s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:610e

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3475s

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4770r

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3630qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:3350p

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:760

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4670

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:5850eq

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:560um

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:2710qe

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3632qm

Trust: 1.0

vendor:intelmodel:core i5scope:eqversion:4460t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7700t

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:7y75

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:3610qe

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:6102e

Trust: 1.0

vendor:intelmodel:core i7scope:eqversion:4702ec

Trust: 1.0

vendor:intelmodel:core i3scope:eqversion:3240

Trust: 1.0

vendor:intelmodel: - scope: - version: -

Trust: 0.8

sources: CERT/CC: VU#982149 // NVD: CVE-2018-3646

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-3646
value: MEDIUM

Trust: 1.0

VULHUB: VHN-133677
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-3646
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-3646
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-133677
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-3646
baseSeverity: MEDIUM
baseScore: 5.6
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.1
impactScore: 4.0
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-133677 // VULMON: CVE-2018-3646 // NVD: CVE-2018-3646

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-200

Trust: 0.1

sources: VULHUB: VHN-133677 // NVD: CVE-2018-3646

THREAT TYPE

local

Trust: 0.2

sources: PACKETSTORM: 148915 // PACKETSTORM: 148913

TYPE

overflow, code execution

Trust: 0.1

sources: PACKETSTORM: 150108

PATCH

title:The Registerurl:https://www.theregister.co.uk/2018/08/15/foreshadow_sgx_software_attestations_collateral_damage/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2018/08/14/intel_l1_terminal_fault_bugs/

Trust: 0.2

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182387 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182388 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182389 - Security Advisory

Trust: 0.1

title:Red Hat: Important: rhev-hypervisor7 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182404 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182391 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182603 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182602 - Security Advisory

Trust: 0.1

title:Red Hat: Important: rhvm-appliance security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182402 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182392 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182396 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182393 - Security Advisory

Trust: 0.1

title:Red Hat: Important: redhat-virtualization-host security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182403 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182394 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-4274-1 xen -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=2129055bb51ebf11b86d56acef7f5da1

Trust: 0.1

title:Debian Security Advisories: DSA-4279-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=dac4eea76febd76490afc049b9aa11cb

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182384 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3823-1

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182395 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2018-3646

Trust: 0.1

title:Red Hat: CVE-2018-3646url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2018-3646

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182390 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3740-1

Trust: 0.1

title:Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3740-2

Trust: 0.1

title:Ubuntu Security Notice: intel-microcode vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3756-1

Trust: 0.1

title:Ubuntu Security Notice: linux regressionsurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-3

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-2

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3741-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2018-1058url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2018-1058

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty regressionsurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3742-3

Trust: 0.1

title:Amazon Linux 2: ALAS2-2018-1058url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2018-1058

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=831545c255e00dbde24c93b2cf2135d6

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Foreshadow Spectre Variant vulnerabilities affect IBM OS Image for Red Hat Linux Systems in IBM PureApplication System (CVE-2018-3615 CVE-2018-3620 CVE-2018-3646)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=f295531b3aa99d37dbc53693639947d9

Trust: 0.1

title:HP: HPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)url:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=HPSBHF03590

Trust: 0.1

title:HP: SUPPORT COMMUNICATION- SECURITY BULLETIN HPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)url:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=ba953f0879f87a755234bc0818c99c6d

Trust: 0.1

title:HP: SUPPORT COMMUNICATION- SECURITY BULLETIN HPSBHF03590 rev. 2 - L1 Terminal Fault (L1TF)url:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=deca5f6210b098f58ce384c28747b82c

Trust: 0.1

title:Huawei Security Advisories: Security Advisory - CPU Side Channel Vulnerability "L1TF"url:https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=28eb43a14c12e8c070afa60d55f86b55

Trust: 0.1

title:Cisco: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180814-cpusidechannel

Trust: 0.1

title:Forcepoint Security Advisories: Meltdown and Spectre Vulnerability CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2018-3640, CVE-2018-3639, CVE-2018-3615, CVE-2018-3620, CVE-2018-3646url:https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories&qid=459877525c31ac6029f4be4a6ea97e17

Trust: 0.1

title:Citrix Security Bulletins: XenServer Multiple Security Updatesurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=89d06253986d1cdae0f8d9ffbff97d18

Trust: 0.1

title:IBM: Potential Impact on Processors in the POWER Familyurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=cf9e1e42799edbda36ec7415288ad7f0

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Security Guardium is affected by Red Hat kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=75b9d198a73a91d81765c8b428423224

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=621cdbb127d953e0d9d06eff7dd10106

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=204a1aa9ebf7b5f47151e8b011269862

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=f655264a6935505d167bbf45f409a57b

Trust: 0.1

title:Palo Alto Networks Security Advisory: PAN-SA-2018-0011 Information about L1 Terminal Fault findingsurl:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=74b853f8cd89b12964ff841924244a71

Trust: 0.1

title:Fortinet Security Advisories: Meltdown and Spectre class vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories&qid=FG-IR-18-002

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=05b5bbd6fb289370b459faf1f4e3919d

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=55ea315dfb69fce8383762ac64250315

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM API Connect has addressed multiple vulnerabilities in Developer Portal’s dependencies – Cumulative list from June 28, 2018 to December 13, 2018url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=43da2cd72c1e378d8d94ecec029fcc61

Trust: 0.1

title:vmware-esxi-67url:https://github.com/casagency/vmware-esxi-67

Trust: 0.1

title:711552870_surl:https://github.com/Qwhqfmmx/711552870_s

Trust: 0.1

title: - url:https://github.com/teusink/Home-Security-by-OS-Hardening

Trust: 0.1

title:Network_research_reporturl:https://github.com/dongminkim0220/Network_research_report

Trust: 0.1

title:Home-Security-by-W10-Hardeningurl:https://github.com/teusink/Home-Security-by-W10-Hardening

Trust: 0.1

title:l1tf-pocurl:https://github.com/gregvish/l1tf-poc

Trust: 0.1

title:arch_linux_installation_guideurl:https://github.com/kyberdrb/arch_linux_installation_guide

Trust: 0.1

title:711552870_surl:https://github.com/yoobao55/711552870_s

Trust: 0.1

title:l1tf-demourl:https://github.com/blitz/l1tf-demo

Trust: 0.1

title:lx-port-dataurl:https://github.com/omniosorg/lx-port-data

Trust: 0.1

title:win10-regtweakurl:https://github.com/interlunar/win10-regtweak

Trust: 0.1

title:cpu-reporturl:https://github.com/rosenbergj/cpu-report

Trust: 0.1

title:specter---meltdown--checkerurl:https://github.com/vurtne/specter---meltdown--checker

Trust: 0.1

title:TEApoturl:https://github.com/github-3rr0r/TEApot

Trust: 0.1

title:TEApoturl:https://github.com/Mashiro1995/TEApot

Trust: 0.1

title: - url:https://github.com/kali973/spectre-meltdown-checker

Trust: 0.1

title:puppet-meltdownurl:https://github.com/timidri/puppet-meltdown

Trust: 0.1

title:cSpeculationControlFixesurl:https://github.com/poshsecurity/cSpeculationControlFixes

Trust: 0.1

title: - url:https://github.com/es0j/hyperbleed

Trust: 0.1

title:Linux-Toolsurl:https://github.com/minutesinch/Linux-Tools

Trust: 0.1

title:spectre-meltdownurl:https://github.com/edsonjt81/spectre-meltdown

Trust: 0.1

title:spectre-meltdown-checkerurl:https://github.com/speed47/spectre-meltdown-checker

Trust: 0.1

title: - url:https://github.com/merlinepedra25/spectre-meltdown-checker

Trust: 0.1

title: - url:https://github.com/merlinepedra/spectre-meltdown-checker

Trust: 0.1

title: - url:https://github.com/kin-cho/my-spectre-meltdown-checker

Trust: 0.1

title:Hardware-and-Firmware-Security-Guidanceurl:https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance

Trust: 0.1

title:Firmware-Securityurl:https://github.com/virusbeeE/Firmware-Security

Trust: 0.1

title:hardware-attacks-state-of-the-arturl:https://github.com/codexlynx/hardware-attacks-state-of-the-art

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/microsoft-rolls-out-new-intel-microcode-for-windows-10-server-2016/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/

Trust: 0.1

sources: VULMON: CVE-2018-3646

EXTERNAL IDS

db:NVDid:CVE-2018-3646

Trust: 2.1

db:CERT/CCid:VU#982149

Trust: 2.0

db:SIEMENSid:SSA-608355

Trust: 1.2

db:SIEMENSid:SSA-254686

Trust: 1.2

db:SECTRACKid:1041451

Trust: 1.2

db:SECTRACKid:1042004

Trust: 1.2

db:BIDid:105080

Trust: 1.2

db:LENOVOid:LEN-24163

Trust: 1.2

db:PACKETSTORMid:148991

Trust: 0.2

db:PACKETSTORMid:148896

Trust: 0.1

db:VULHUBid:VHN-133677

Trust: 0.1

db:VULMONid:CVE-2018-3646

Trust: 0.1

db:PACKETSTORMid:148915

Trust: 0.1

db:PACKETSTORMid:148952

Trust: 0.1

db:PACKETSTORMid:150108

Trust: 0.1

db:PACKETSTORMid:148909

Trust: 0.1

db:PACKETSTORMid:148903

Trust: 0.1

db:PACKETSTORMid:149143

Trust: 0.1

db:PACKETSTORMid:148913

Trust: 0.1

db:PACKETSTORMid:148906

Trust: 0.1

sources: CERT/CC: VU#982149 // VULHUB: VHN-133677 // VULMON: CVE-2018-3646 // PACKETSTORM: 148915 // PACKETSTORM: 148952 // PACKETSTORM: 150108 // PACKETSTORM: 148909 // PACKETSTORM: 148903 // PACKETSTORM: 149143 // PACKETSTORM: 148913 // PACKETSTORM: 148991 // PACKETSTORM: 148906 // NVD: CVE-2018-3646

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html

Trust: 2.8

url:https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault

Trust: 2.0

url:https://foreshadowattack.eu/

Trust: 2.0

url:https://www.kb.cert.org/vuls/id/982149

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2387

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2391

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2393

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2396

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2402

Trust: 1.3

url:https://access.redhat.com/errata/rhsa-2018:2603

Trust: 1.3

url:http://www.securityfocus.com/bid/105080

Trust: 1.2

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180814-cpusidechannel

Trust: 1.2

url:http://support.lenovo.com/us/en/solutions/len-24163

Trust: 1.2

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en

Trust: 1.2

url:http://www.vmware.com/security/advisories/vmsa-2018-0020.html

Trust: 1.2

url:http://xenbits.xen.org/xsa/advisory-273.html

Trust: 1.2

url:https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf

Trust: 1.2

url:https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

Trust: 1.2

url:https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0

Trust: 1.2

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180018

Trust: 1.2

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0010

Trust: 1.2

url:https://security.netapp.com/advisory/ntap-20180815-0001/

Trust: 1.2

url:https://support.f5.com/csp/article/k31300402

Trust: 1.2

url:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Trust: 1.2

url:https://www.synology.com/support/security/synology_sa_18_45

Trust: 1.2

url:https://www.debian.org/security/2018/dsa-4274

Trust: 1.2

url:https://www.debian.org/security/2018/dsa-4279

Trust: 1.2

url:https://security.freebsd.org/advisories/freebsd-sa-18:09.l1tf.asc

Trust: 1.2

url:https://security.gentoo.org/glsa/201810-06

Trust: 1.2

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 1.2

url:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Trust: 1.2

url:https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html

Trust: 1.2

url:https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2384

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2388

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2389

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2390

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2392

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2394

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2395

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2403

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2404

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2018:2602

Trust: 1.2

url:http://www.securitytracker.com/id/1041451

Trust: 1.2

url:http://www.securitytracker.com/id/1042004

Trust: 1.2

url:https://usn.ubuntu.com/3740-1/

Trust: 1.2

url:https://usn.ubuntu.com/3740-2/

Trust: 1.2

url:https://usn.ubuntu.com/3741-1/

Trust: 1.2

url:https://usn.ubuntu.com/3741-2/

Trust: 1.2

url:https://usn.ubuntu.com/3742-1/

Trust: 1.2

url:https://usn.ubuntu.com/3742-2/

Trust: 1.2

url:https://usn.ubuntu.com/3756-1/

Trust: 1.2

url:https://usn.ubuntu.com/3823-1/

Trust: 1.2

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03874en_us

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/xrfkqwyv2h4bv75cungcge5tnvqclbgz/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/v4uwgorqwcencif2bhwuef2odbv75qs2/

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-3646

Trust: 0.9

url:https://www.usenix.org/conference/usenixsecurity18/presentation/bulck

Trust: 0.8

url:https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html

Trust: 0.8

url:https://www.intel.com/content/dam/www/public/us/en/documents/sa00115-microcode-update-guidance.pdf

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-3620

Trust: 0.7

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2018-3646

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2018-3620

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://access.redhat.com/security/vulnerabilities/l1tf

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://wiki.ubuntu.com/securityteam/knowledgebase/l1tf

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-5391

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-5390

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-3639

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-10901

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-10901

Trust: 0.2

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03874en_us

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/xrfkqwyv2h4bv75cungcge5tnvqclbgz/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/v4uwgorqwcencif2bhwuef2odbv75qs2/

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://github.com/casagency/vmware-esxi-67

Trust: 0.1

url:https://github.com/teusink/home-security-by-w10-hardening

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3742-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18344

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/3.13.0-155.205

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-5390

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12618

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14064

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4203

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10784

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4334

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4288

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4326

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17405

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-3640

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4291

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4340

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4304

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4286

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4126

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14033

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4331

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4310

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4259

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4295

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4242

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17742

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12613

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4287

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-3639

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1017.18~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-32.35~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1021.21~16.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3740-2

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3740-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/3.13.0-156.206

Trust: 0.1

url:https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787258

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3741-1

Trust: 0.1

url:https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787127,

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3741-3

Trust: 0.1

sources: CERT/CC: VU#982149 // VULHUB: VHN-133677 // VULMON: CVE-2018-3646 // PACKETSTORM: 148915 // PACKETSTORM: 148952 // PACKETSTORM: 150108 // PACKETSTORM: 148909 // PACKETSTORM: 148903 // PACKETSTORM: 149143 // PACKETSTORM: 148913 // PACKETSTORM: 148991 // PACKETSTORM: 148906 // NVD: CVE-2018-3646

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 148952 // PACKETSTORM: 148909 // PACKETSTORM: 148903 // PACKETSTORM: 149143 // PACKETSTORM: 148906

SOURCES

db:CERT/CCid:VU#982149
db:VULHUBid:VHN-133677
db:VULMONid:CVE-2018-3646
db:PACKETSTORMid:148915
db:PACKETSTORMid:148952
db:PACKETSTORMid:150108
db:PACKETSTORMid:148909
db:PACKETSTORMid:148903
db:PACKETSTORMid:149143
db:PACKETSTORMid:148913
db:PACKETSTORMid:148991
db:PACKETSTORMid:148906
db:NVDid:CVE-2018-3646

LAST UPDATE DATE

2024-11-20T20:47:21.526000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#982149date:2018-09-10T00:00:00
db:VULHUBid:VHN-133677date:2020-08-24T00:00:00
db:VULMONid:CVE-2018-3646date:2023-11-07T00:00:00
db:NVDid:CVE-2018-3646date:2023-11-07T02:58:08.630

SOURCES RELEASE DATE

db:CERT/CCid:VU#982149date:2018-08-15T00:00:00
db:VULHUBid:VHN-133677date:2018-08-14T00:00:00
db:VULMONid:CVE-2018-3646date:2018-08-14T00:00:00
db:PACKETSTORMid:148915date:2018-08-15T04:42:52
db:PACKETSTORMid:148952date:2018-08-16T14:16:41
db:PACKETSTORMid:150108date:2018-10-31T15:50:04
db:PACKETSTORMid:148909date:2018-08-15T04:41:25
db:PACKETSTORMid:148903date:2018-08-15T04:39:03
db:PACKETSTORMid:149143date:2018-08-29T20:32:22
db:PACKETSTORMid:148913date:2018-08-15T04:42:40
db:PACKETSTORMid:148991date:2018-08-18T20:21:00
db:PACKETSTORMid:148906date:2018-08-15T04:40:04
db:NVDid:CVE-2018-3646date:2018-08-14T19:29:00.920