var-201801-0826
Vulnerability from variot
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". Has speculative execution function and out-of-order execution function CPU Several researchers have reported methods of performing side-channel attacks against Has speculative execution function and out-of-order execution function CPU side-channel attack method against (Spectre and Meltdown) has been reported. For more information, Google Project Zero blog post in ("Reading privileged memory with a side-channel") or Graz University of Technology (TU Graz) information from researchers in ("Meltdown and Spectre") Please refer to. "Reading privileged memory with a side-channel"https://googleprojectzero.blogspot.jp/2018/01/reading-privileged-memory-with-side.html"Meltdown and Spectre"https://meltdownattack.com/Sensitive information can be obtained from processes running with user privileges. Spectre As for the attack, crafted Javascript by the code Javascript cannot be obtained from web It has been reported that data can be obtained during the browser process. CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \"melts\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \"cross-border\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Intel Xeon CPU E5-1650 v3, v2, v4 versions; Xeon E3-1265l v2, v3, v4 Version; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. Relevant releases/architectures:
RHEV-M 3.6 ELS - noarch
- It includes the configuration of the Red Hat Support plugin, copying downstream-only artifacts to the ISO domain, and links to the knowledgebase and other support material.
The following packages have been upgraded to a later upstream version: rhevm-setup-plugins (3.6.6).
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. Description:
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm package provides the user-space component for running virtual machines that use KVM. Once all virtual machines have shut down, start them again for this update to take effect. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
============================================================================ FreeBSD-SA-19:26.mcu Security Advisory The FreeBSD Project
Topic: Intel CPU Microcode Update
Category: 3rd party Module: Intel CPU microcode Announced: 2019-11-12 Credits: Intel Affects: All supported versions of FreeBSD running on certain Intel CPUs. CVE Name: CVE-2019-11135, CVE-2019-11139, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2018-11091, CVE-2017-5715
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
I. Background
- From time to time Intel releases new CPU microcode to address functional issues and security vulnerabilities. Such a release is also known as a Micro Code Update (MCU), and is a component of a broader Intel Platform Update (IPU). FreeBSD distributes CPU microcode via the devcpu-data port and package.
II. Problem Description
Starting with version 1.26, the devcpu-data port/package includes updates and mitigations for the following technical and security advisories (depending on CPU model).
Intel TSX Updates (TAA) CVE-2019-11135 Voltage Modulation Vulnerability CVE-2019-11139 MD_CLEAR Operations CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-11091 TA Indirect Sharing CVE-2017-5715 EGETKEY CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-11091 JCC SKX102 Erratum
Updated microcode includes mitigations for CPU issues, but may also cause a performance regression due to the JCC erratum mitigation. Please visit http://www.intel.com/benchmarks for further information.
Please visit http://www.intel.com/security for detailed information on these advisories as well as a list of CPUs that are affected.
III. Impact
Operating a CPU without the latest microcode may result in erratic or unpredictable behavior, including system crashes and lock ups. Certain issues listed in this advisory may result in the leakage of privileged system information to unprivileged users. Please refer to the security advisories listed above for detailed information.
IV. Workaround
To determine if TSX is present in your system, run the following:
-
kldload cpuctl
-
cpucontrol -i 7 /dev/cpuctl0
If bits 4 (0x10) and 11 (0x800) are set in the second response word (EBX), TSX is present.
In the absence of updated microcode, TAA can be mitigated by enabling the MDS mitigation:
- sysctl hw.mds_disable=1
Systems must be running FreeBSD 11.3, FreeBSD 12.1, or later for this to work.
IMPORTANT If your use case can tolerate leaving the CPU issues unmitigated and cannot tolerate a performance regression, ensure that the devcpu-data package is not installed or is locked at 1.25 or earlier.
pkg delete devcpu-data
or
pkg lock devcpu-data
Later versions of the LLVM and GCC compilers will include changes that partially relieve the peformance impact.
V. Solution
Install the latest Intel Microcode Update via the devcpu-data port/package, version 1.26 or later.
Updated microcode adds the ability to disable TSX. With updated microcode the issue can still be mitigated by enabling the MDS mitigation as described in the workaround section, or by disabling TSX instead:
-
kldload cpuctl
-
cpucontrol -i 7 /dev/cpuctl0
If bit 29 (0x20000000) is set in the fourth response word (EDX), then the 0x10a MSR is present.
- cpucontrol -m 0x10a /dev/cpuctl0
If bit 8 (0x100) of the response word is set, your CPU is not vulnerable to TAA and no further action is required.
If bit 7 (0x80) is cleared, then your CPU does not have updated microcode that facilitates TSX to be disabled. The only remedy available is to enable the MDS mitigation, as documented above.
- cpucontrol -m 0x122=3 /dev/cpuctl0
Repeat step 4 for each numbered CPU that is present.
A future kernel change to FreeBSD will provide automatic detection and mitigation for TAA.
LLVM 9.0 will be updated in FreeBSD 13-current to address the JCC peformance impact. Updates to prior versions of LLVM are currently being evaluated.
VI. Correction details
There are currently no changes in FreeBSD to address this issue.
VII. References
The latest revision of this advisory is available at
iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl3LArVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n 5cJGQQ//ad41YWDAdgBMTWiF56qeySqElIOHt/mLt06s2WW9ceUoJpKW8rKwA4hi sjuDlj4vg8ohdiFaZhTxX/smQi3BS+M0xi40fFFgMRR7HuVh11l6bPr+DoUH/Zi+ E5aiAilOlv/WUAxIrdx0ZlHPkjZ9vfSIPbiqmIkdlFEl4QCuusMRqXKNxaIzzk/K rzabCN4NsQPk0SYIZ9l+tZ6JxOOeRaYn+aCjzlbkiYR+wttIaH9nTECx2Rj7XvSw 9Ng/Mq0M6QsTV/jKfQDRMxRnNfnzF7865uBQYxZNFY9VP5Z21CcqMT54ia5NgcG8 8Bn2fnM3HcK5LUW3DRnsLhAi6XX0EuX5VMdYvx20aQUj/k8f6a0cPmtSqUVkpU/K ZcmLd4X+YS/o3UZnRY9OZOEb+kmZE/Yr8f/hR8tmle6FCPS1YLtkwDn3qg/oQA03 B5rLmzc+x32XZC0dn/HRZTLc4TXQLij0kZpuxiDmbEJmdARDWsl+e0VdBuQdD3Hr Q2QvhSVvQgwue8vclfIQVElSZpW93HuyyR8O8ugofwcOt7XwI7k+8ZfrjkjHMPGZ QW/i0FQJx4Kup70bzOubb3VEQ7cwAJtE1dvY55oaulDexq3RVMW7oEsvd84X2K8O G3+YOZLMrvM1kFskRt067rttbJfMXvstMSHCCfGSqA7fdth6VNQ=KAsu -----END PGP SIGNATURE----- . On amd64 and i386, new CPU models that match the updated microcode features were added with an -IBRS suffix. Certain environments will require guests to be switched manually to the new CPU models after microcode updates have been applied to the host. X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 04 Jan 2018 21:59:52 +0000 (UTC)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: libvirt security update Advisory ID: RHSA-2018:0029-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:0029 Issue date: 2018-01-04 =====================================================================
- Summary:
An update for libvirt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Security Fix(es):
- An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715)
Note: This is the libvirt side of the CVE-2017-5715 mitigation.
Red Hat would like to thank Google Project Zero for reporting this issue. Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, libvirtd will be restarted automatically. Bugs fixed (https://bugzilla.redhat.com/):
1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: libvirt-3.2.0-14.el7_4.7.src.rpm
x86_64: libvirt-3.2.0-14.el7_4.7.x86_64.rpm libvirt-client-3.2.0-14.el7_4.7.i686.rpm libvirt-client-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-libs-3.2.0-14.el7_4.7.i686.rpm libvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: libvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-devel-3.2.0-14.el7_4.7.i686.rpm libvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm libvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm libvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm libvirt-nss-3.2.0-14.el7_4.7.i686.rpm libvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: libvirt-3.2.0-14.el7_4.7.src.rpm
x86_64: libvirt-client-3.2.0-14.el7_4.7.i686.rpm libvirt-client-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-libs-3.2.0-14.el7_4.7.i686.rpm libvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: libvirt-3.2.0-14.el7_4.7.x86_64.rpm libvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-devel-3.2.0-14.el7_4.7.i686.rpm libvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm libvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm libvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm libvirt-nss-3.2.0-14.el7_4.7.i686.rpm libvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: libvirt-3.2.0-14.el7_4.7.src.rpm
ppc64: libvirt-3.2.0-14.el7_4.7.ppc64.rpm libvirt-client-3.2.0-14.el7_4.7.ppc.rpm libvirt-client-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.ppc64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc64.rpm libvirt-devel-3.2.0-14.el7_4.7.ppc.rpm libvirt-devel-3.2.0-14.el7_4.7.ppc64.rpm libvirt-docs-3.2.0-14.el7_4.7.ppc64.rpm libvirt-libs-3.2.0-14.el7_4.7.ppc.rpm libvirt-libs-3.2.0-14.el7_4.7.ppc64.rpm
ppc64le: libvirt-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-client-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-kvm-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-devel-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-docs-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-libs-3.2.0-14.el7_4.7.ppc64le.rpm
s390x: libvirt-3.2.0-14.el7_4.7.s390x.rpm libvirt-client-3.2.0-14.el7_4.7.s390.rpm libvirt-client-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.s390x.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.s390.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.s390x.rpm libvirt-devel-3.2.0-14.el7_4.7.s390.rpm libvirt-devel-3.2.0-14.el7_4.7.s390x.rpm libvirt-docs-3.2.0-14.el7_4.7.s390x.rpm libvirt-libs-3.2.0-14.el7_4.7.s390.rpm libvirt-libs-3.2.0-14.el7_4.7.s390x.rpm
x86_64: libvirt-3.2.0-14.el7_4.7.x86_64.rpm libvirt-client-3.2.0-14.el7_4.7.i686.rpm libvirt-client-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-devel-3.2.0-14.el7_4.7.i686.rpm libvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm libvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm libvirt-libs-3.2.0-14.el7_4.7.i686.rpm libvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: libvirt-admin-3.2.0-14.el7_4.7.ppc64.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.ppc64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc64.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.ppc64.rpm libvirt-login-shell-3.2.0-14.el7_4.7.ppc64.rpm libvirt-nss-3.2.0-14.el7_4.7.ppc.rpm libvirt-nss-3.2.0-14.el7_4.7.ppc64.rpm
ppc64le: libvirt-admin-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-login-shell-3.2.0-14.el7_4.7.ppc64le.rpm libvirt-nss-3.2.0-14.el7_4.7.ppc64le.rpm
s390x: libvirt-admin-3.2.0-14.el7_4.7.s390x.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.s390x.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.s390.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.s390x.rpm libvirt-login-shell-3.2.0-14.el7_4.7.s390x.rpm libvirt-nss-3.2.0-14.el7_4.7.s390.rpm libvirt-nss-3.2.0-14.el7_4.7.s390x.rpm
x86_64: libvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm libvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm libvirt-nss-3.2.0-14.el7_4.7.i686.rpm libvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: libvirt-3.2.0-14.el7_4.7.src.rpm
x86_64: libvirt-3.2.0-14.el7_4.7.x86_64.rpm libvirt-client-3.2.0-14.el7_4.7.i686.rpm libvirt-client-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-devel-3.2.0-14.el7_4.7.i686.rpm libvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm libvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm libvirt-libs-3.2.0-14.el7_4.7.i686.rpm libvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: libvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm libvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm libvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm libvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm libvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm libvirt-nss-3.2.0-14.el7_4.7.i686.rpm libvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/speculativeexecution https://access.redhat.com/security/cve/CVE-2017-5715
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201804-08
https://security.gentoo.org/
Severity: Normal Title: QEMU: Multiple vulnerabilities Date: April 08, 2018 Bugs: #629348, #638506, #643432, #646814, #649616 ID: 201804-08
Synopsis
Multiple vulnerabilities have been found in QEMU, the worst of which may allow an attacker to execute arbitrary code.
Background
QEMU is a generic and open source machine emulator and virtualizer.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulation/qemu < 2.11.1-r1 >= 2.11.1-r1
Description
Multiple vulnerabilities have been discovered in QEMU. Please review the CVE identifiers referenced below for details.
Impact
An attacker could execute arbitrary code, cause a Denial of Service condition, or obtain sensitive information.
Workaround
There is no known workaround at this time.
Resolution
All QEMU users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.11.1-r1"
References
[ 1 ] CVE-2017-13672 https://nvd.nist.gov/vuln/detail/CVE-2017-13672 [ 2 ] CVE-2017-15124 https://nvd.nist.gov/vuln/detail/CVE-2017-15124 [ 3 ] CVE-2017-16845 https://nvd.nist.gov/vuln/detail/CVE-2017-16845 [ 4 ] CVE-2017-17381 https://nvd.nist.gov/vuln/detail/CVE-2017-17381 [ 5 ] CVE-2017-18030 https://nvd.nist.gov/vuln/detail/CVE-2017-18030 [ 6 ] CVE-2017-18043 https://nvd.nist.gov/vuln/detail/CVE-2017-18043 [ 7 ] CVE-2017-5715 https://nvd.nist.gov/vuln/detail/CVE-2017-5715 [ 8 ] CVE-2018-5683 https://nvd.nist.gov/vuln/detail/CVE-2018-5683 [ 9 ] CVE-2018-5748 https://nvd.nist.gov/vuln/detail/CVE-2018-5748 [ 10 ] CVE-2018-7550 https://nvd.nist.gov/vuln/detail/CVE-2018-7550
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201804-08
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-3541-2 January 23, 2018
linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were addressed in the Linux kernel.
Software Description: - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe: Linux hardware enablement (HWE) kernel - linux-oem: Linux kernel for OEM processors
Details:
USN-3541-1 addressed vulnerabilities in the Linux kernel for Ubuntu 17.10. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04 LTS. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. This update provides mitigations for the i386 (CVE-2017-5753 only), amd64, ppc64el, and s390x architectures. (CVE-2017-5715, CVE-2017-5753)
USN-3523-2 mitigated CVE-2017-5754 (Meltdown) for the amd64 architecture in the Linux Hardware Enablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04 LTS. This update provides the corresponding mitigations for the ppc64el architecture. This flaw is known as Meltdown. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5754)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: linux-image-4.13.0-1006-azure 4.13.0-1006.8 linux-image-4.13.0-1007-gcp 4.13.0-1007.10 linux-image-4.13.0-1017-oem 4.13.0-1017.18 linux-image-4.13.0-31-generic 4.13.0-31.34~16.04.1 linux-image-4.13.0-31-lowlatency 4.13.0-31.34~16.04.1 linux-image-azure 4.13.0.1006.7 linux-image-gcp 4.13.0.1007.9 linux-image-generic-hwe-16.04 4.13.0.31.51 linux-image-gke 4.13.0.1007.9 linux-image-lowlatency-hwe-16.04 4.13.0.31.51 linux-image-oem 4.13.0.1017.21
Please note that fully mitigating CVE-2017-5715 (Spectre Variant 2) requires corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. On i386 and amd64 architectures, the IBRS and IBPB features are required to enable the kernel mitigations. Ubuntu is working with Intel and AMD to provide future microcode updates that implement IBRS and IBPB as they are made available. Ubuntu users with a processor from a different vendor should contact the vendor to identify necessary firmware updates. Ubuntu will provide corresponding QEMU updates in the future for users of self-hosted virtual environments in coordination with upstream QEMU. Ubuntu users in cloud environments should contact the cloud provider to confirm that the hypervisor has been updated to expose the new CPU features to virtual machines.
Software Description: - intel-microcode: Processor microcode for Intel CPUs
Details:
USN-3531-1 updated Intel microcode to the 20180108 release. Regressions were discovered in the microcode updates which could cause system instability on certain hardware platforms
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0826", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "550" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2516" }, { "model": "xeon e3 1270 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100e" }, { "model": "xeon e5 2608l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v2" }, { "model": "xeon e5 1680 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2900" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3405" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2620m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610me" }, { "model": "xeon e5 2618l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4158u" }, { "model": "xeon e3 1275l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3245" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5618" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6146" }, { "model": "xeon e5 2637", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400" }, { "model": "xeon e3 1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4720hq" }, { "model": "xeon e3 1125c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5540" }, { "model": "xeon e3 1220 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2558" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3827" }, { "model": "xeon e5 2620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v3" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170" }, { "model": "xeon e5 2448l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3680" }, { "model": "xeon e3 1278l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3570" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2550" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2830" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4308u" }, { "model": "xeon e3 1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860_v2" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290" }, { "model": "xeon e3 1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y75" }, { "model": "xeon e5 2403", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7295" }, { "model": "xeon e3 1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610y" }, { "model": "xeon e5 1630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6287u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v2" }, { "model": "xeon e5 2430l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "840qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350h" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v3" }, { "model": "xeon e3 1240 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2520m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5649" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030y" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4657l_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5549" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3840qm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3958" }, { "model": "xeon e5 1660 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6260u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2420" }, { "model": "solidfire", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "470um" }, { "model": "xeon e5 2650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3689y" }, { "model": "xeon e3 1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v4" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1850" }, { "model": "xeon e5 2418l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658a_v3" }, { "model": "xeon e5 2630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3150" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6006u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v4" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3805" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2300" }, { "model": "xeon e3 1225 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2508" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2629m" }, { "model": "xeon e5 2407 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5607" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2467m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2637m" }, { "model": "xeon e3 1275 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620ue" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770t" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3520m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2115c" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7550" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710mq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4765t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2718" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4000" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2435m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120me" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585_v5" }, { "model": "xeon e5 2450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2609 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3690" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2102" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2807" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5557u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4005u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3820qm" }, { "model": "xeon e3 1220 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v2" }, { "model": "xeon e3 1265l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5530" }, { "model": "xeon e5 2430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5287u" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3000" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2655le" }, { "model": "xeon e3 1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2675qm" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775d" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v2" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240t" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4807" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4890_v2" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4108" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3230m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520m" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3235rk" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qe" }, { "model": "xeon e3 1290 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2348m" }, { "model": "xeon e5 2438l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2440 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585l_v5" }, { "model": "xeon e3 1260l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "vm virtualbox", "scope": "lt", "trust": 1.0, "vendor": "oracle", "version": "5.2.6" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4910mq" }, { "model": "xeon e5 2428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y57" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790s" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430um" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1750" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2840" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2715qe" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "990x" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380m" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8156" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2810" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.10" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5250u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5680" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6540" }, { "model": "xeon e3 1286l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2125" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3670" }, { "model": "xeon e3 1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710hq" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2760" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2730" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y31" }, { "model": "xeon e5 2428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v4" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775" }, { "model": "xeon e3 1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4880_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4220y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3227u" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3455" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5590" }, { "model": "xeon e5 2620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "390m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5630" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3825" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2830" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4250u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675c" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "661" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8164" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4012y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "530" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850hq" }, { "model": "xeon e3 1275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2608l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712mq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5630" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4422e" }, { "model": "xeon e5 2440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3115c" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860hq" }, { "model": "xeon e3 1220l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v3" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7235" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340m" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3010" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7285" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3050" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1545m_v5" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3338" }, { "model": "xeon e3 1235", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300u" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4200" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2510e" }, { "model": "xeon e3 1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4410e" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y30" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1800" }, { "model": "xeon e5 1660 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1285 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4628l_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v2" }, { "model": "xeon e5 2628l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736g" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2410m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5020u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3380m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820qm" }, { "model": "xeon e5 1620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2628l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517ue" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v2" }, { "model": "xeon e5 1680 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y54" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4800mq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700hq" }, { "model": "xeon e3 1105c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4760hq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130f" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3826" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560m" }, { "model": "xeon e3 1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1578l_v5" }, { "model": "xeon e5 1428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110" }, { "model": "xeon e3 1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3437u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2890_v2" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1505m_v6" }, { "model": "xeon e5 2630 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4400e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6150" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2930" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6267u" }, { "model": "xeon e3 1225 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "hci compute node", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440hq" }, { "model": "xeon e5 2470 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7520" }, { "model": "xeon e5 2403 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v3" }, { "model": "xeon e3 12201 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2365m" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2430m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4258u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v2" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5575r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702ec" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670k" }, { "model": "xeon e3 1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700hq" }, { "model": "xeon e3 1270 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2418l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5502" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3750" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640lm" }, { "model": "xeon e3 1245 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2648l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735g" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "670" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6200u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980x" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qm" }, { "model": "xeon bronze 3104", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520um" }, { "model": "xeon e5 1428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1240l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v4" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4025u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4260u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100te" }, { "model": "xeon e3 1290", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3815" }, { "model": "xeon e5 1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210f" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5518" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3708" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6132" }, { "model": "xeon e5 2620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3808" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675r" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3537u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735d" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "880" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700mq" }, { "model": "xeon e3 1241 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3667u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540um" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3460" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2760qm" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2803" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "57" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1565l_v5" }, { "model": "xeon e3 1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2430l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2648l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5675" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5520" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3480" }, { "model": "xeon e3 1125c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5667" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4750hq" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5504" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3558" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6144" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400t" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "15" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8830" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3555le" }, { "model": "xeon e3 1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690" }, { "model": "xeon e5 2450l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "17" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3229y" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2640m" }, { "model": "xeon e3 1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2537m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3785" }, { "model": "xeon e3 1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500k" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600k" }, { "model": "xeon e5 1660 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4109t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "820qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5550u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5645" }, { "model": "xeon e3 1245 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4785t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300hq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6128" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116t" }, { "model": "communications diameter signaling router", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2338" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v4" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148" }, { "model": "xeon e5 2640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148f" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2308" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2630qm" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770d" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1558l_v5" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6157u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3225" }, { "model": "xeon e3 1240 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2815" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8650u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790k" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2316" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v3" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702mq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607_v2" }, { "model": "xeon e3 1230 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "450m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3858" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7560" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450s" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v6" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770r" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "610e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3475s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5520" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3630qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3350p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850eq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560um" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5506" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5640" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2710qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3632qm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5687" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5119t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2665" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2650l_v4" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5118" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3060" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138f" }, { "model": "xeon e3 1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qm" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4205" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3265rk" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5503" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6685r" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6350hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8180" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v4" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3480" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4550u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5157u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3406" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440eq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5660" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "370m" }, { "model": "xeon e5 2650l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300y" }, { "model": "xeon e3 1220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3460" }, { "model": "xeon e5 2618l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2550k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4624l_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2635qm" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860" }, { "model": "xeon e5 2628l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7555" }, { "model": "xeon e5 2420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7660u" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4005" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870_v2" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4100" }, { "model": "xeon e5 2620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2340ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130" }, { "model": "xeon e3 1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4510u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2557m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4288u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3439y" }, { "model": "simatic winac rtx \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "2010" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740d" }, { "model": "xeon e5 2448l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3580" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5600u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6585r" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5672" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660ue" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5015u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660lm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v4" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2375m" }, { "model": "xeon e5 2408l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v3" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590t" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3710" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2357m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8600k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220t" }, { "model": "xeon e3 1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3560" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6320" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "970" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "xeon e3 1285l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y30" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3955" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210h" }, { "model": "xeon e3 1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3160" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4648_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6098p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "655k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500te" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3538" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2758" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v4" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3110m" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142f" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5528" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860qm" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3230rk" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3510" }, { "model": "communications diameter signaling router", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.1" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3355" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v4" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5507" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3426" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v4" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7540" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3200rk" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3850" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870hq" }, { "model": "xeon e5 2650l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "75" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "480m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680um" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2850" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2105" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8153" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4120u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5690" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4617" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v4" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2560" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2820" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5603" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8550u" }, { "model": "xeon e5 1428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134m" }, { "model": "xeon e5 2407", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940xm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5506" }, { "model": "xeon e3 1276 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v4" }, { "model": "xeon e3 1286 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v4" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2518" }, { "model": "xeon e5 1620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5620" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v4" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3350" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2610ue" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4558u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3440" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y51" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3205rk" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2130" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3360m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5677" }, { "model": "xeon e3 1226 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v4" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5115" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660" }, { "model": "xeon e5 2603 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v3" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1900" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330te" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3130" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745d" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3845" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6402p" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867l" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3830" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y70" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1515m_v5" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700eq" }, { "model": "xeon e5 2470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3540" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5560" }, { "model": "xeon e5 1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2418l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3450" }, { "model": "xeon e5 2648l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3740qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920xm" }, { "model": "xeon e5 2637 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v3" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250" }, { "model": "xeon e5 2650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570te" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670r" }, { "model": "xeon e3 1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3430" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "875k" }, { "model": "xeon e3 1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2640 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5518" }, { "model": "xeon e3 12201", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100t" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "xeon e5 2603", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2806" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2920" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5640" }, { "model": "xeon e5 2618l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670qm" }, { "model": "atom x7-e3950", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3450" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3317u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4578u" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10a" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2367m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120t" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8894_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100u" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3710" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7920hq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8158" }, { "model": "xeon e5 2623 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2350" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3540m" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "9" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3427u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5010u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x6550" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138t" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10c" }, { "model": "xeon e3 1258l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v2" }, { "model": "atom x5-e3930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402ec" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6136" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3308" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3795" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5609" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5005u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699a_v4" }, { "model": "xeon e5 2630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "hci management node", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "xeon e5 1650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4105" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2700k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100h" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "580m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4202y" }, { "model": "xeon e3 1265l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5570" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620lm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "72" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330" }, { "model": "xeon e3 1285 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330um" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2940" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2350m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699r_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4810mq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2720qm" }, { "model": "xeon e3 1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870s" }, { "model": "xeon e3 1280 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4000m" }, { "model": "xeon e5 2623 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3687u" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3295rk" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6360u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4722hq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700eq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7500u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697a_v4" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7542" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3337u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v3" }, { "model": "xeon e5 2640 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qe" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "350m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2390t" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7560u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8250u" }, { "model": "xeon e3 1246 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4980hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8100" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4102e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2617m" }, { "model": "xeon e3 1268l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v3" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6442eq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700k" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2530" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4960hq" }, { "model": "xeon e3 1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4900mq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "720qm" }, { "model": "xeon e5 2609 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2657m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2677m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6167u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500t" }, { "model": "xeon e5 2643 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500" }, { "model": "xeon e5 2643 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100" }, { "model": "xeon e3 1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5530" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3635qm" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3700" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5550" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6152" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5257u" }, { "model": "xeon e5 2609 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112e" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8857_v2" }, { "model": "atom x5-e3940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3950" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "460m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5200u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770te" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3470" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7600u" }, { "model": "xeon e5 2643", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "975" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130t" }, { "model": "xeon e-1105c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v3" }, { "model": "xeon e5 2609", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620le" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820" }, { "model": "xeon e3 1281 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1271 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650l" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2808" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820eq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8837" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4500u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7567u" }, { "model": "vm virtualbox", "scope": "lt", "trust": 1.0, "vendor": "oracle", "version": "5.1.32" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7545" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v3" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "73" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4302y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2649m" }, { "model": "xeon e3 1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3339y" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3445" }, { "model": "xeon e3 1231 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "930" }, { "model": "xeon e3 1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770hq" }, { "model": "xeon e5 2643 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5638" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030u" }, { "model": "communications diameter signaling router", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.0.0" }, { "model": "xeon e3 1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5509" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2738" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6510" }, { "model": "xeon bronze 3106", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200h" }, { "model": "xeon e3 1285l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1575m_v5" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2320" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v4" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120" }, { "model": "xeon e5 1650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8168" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2515e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5750hq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5647" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700hq" }, { "model": "xeon e5 2630l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2640 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2358" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3758" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5539" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4771" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3130m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770t" }, { "model": "xeon e3 1265l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hk" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v4" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6154" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2920xm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5950hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2960xm" }, { "model": "xeon e3 1230 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3590" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "960" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2805" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2377m" }, { "model": "xeon e5 2450l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712hq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3320m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2538" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y71" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.04" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4278u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2480" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5650" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4020y" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2580" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v5" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120" }, { "model": "xeon e5 2637 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2312m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7530" }, { "model": "xeon e5 2430 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5650u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "650" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2370m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v4" }, { "model": "xeon e5 2450 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v2" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217ue" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5300u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2405s" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5122" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2750" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "965" }, { "model": "xeon e5 2648l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402e" }, { "model": "vm virtualbox", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "5.2.0" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370t" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y32" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2460" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v4" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3520" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2328m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775c" }, { "model": "xeon e5 2637 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5606" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5580" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "740qm" }, { "model": "xeon e5 2420 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5508" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3508" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5670" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3720qm" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2380p" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2910" }, { "model": "xeon e5 1660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2880_v2" }, { "model": "communications diameter signaling router", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y75" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qe" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6102e" }, { "model": "xeon e5 1620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "amd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "arm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell emc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "qualcomm incorporated", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "synology", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u8907\u6570\u306e\u30d9\u30f3\u30c0", "version": null }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u8907\u6570\u306e\u30d9\u30f3\u30c0", "version": "(multiple products)" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": null, "trust": 0.8, "vendor": "\u8907\u6570\u306e\u30d9\u30f3\u30c0", "version": null }, { "model": "windows sp1", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "7" }, { "model": "internet explorer", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "11" }, { "model": "windows", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "8.1" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "google", "version": "v8" }, { "model": "windows", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "10" }, { "model": "edge", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "0" }, { "model": "xeon cpu e5-1650", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "cortex a57", "scope": null, "trust": 0.6, "vendor": "arm", "version": null }, { "model": "pro a8-9600 r7", "scope": null, "trust": 0.6, "vendor": "amd", "version": null }, { "model": "compute cores 4c+6g", "scope": "eq", "trust": 0.6, "vendor": "amd", "version": "10" }, { "model": "fx -8320 eight-core processor", "scope": null, "trust": 0.6, "vendor": "amd", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "JVNDB", "id": "JVNDB-2018-001001" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu", "sources": [ { "db": "PACKETSTORM", "id": "146772" }, { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "146301" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146009" } ], "trust": 0.5 }, "cve": "CVE-2017-5715", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2017-5715", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "Single", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.4, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2018-001001", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:S/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CNVD-2018-00302", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-113918", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2017-5715", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Local", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2018-001001", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-5715", "trust": 1.0, "value": "MEDIUM" }, { "author": "IPA", "id": "JVNDB-2018-001001", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2018-00302", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-113918", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" }, { "db": "JVNDB", "id": "JVNDB-2018-001001" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Two vulnerabilities are identified, known as \"Variant 3a\" and \"Variant 4\". Has speculative execution function and out-of-order execution function CPU Several researchers have reported methods of performing side-channel attacks against Has speculative execution function and out-of-order execution function CPU side-channel attack method against (Spectre and Meltdown) has been reported. For more information, Google Project Zero blog post in (\"Reading privileged memory with a side-channel\") or Graz University of Technology (TU Graz) information from researchers in (\"Meltdown and Spectre\") Please refer to. \"Reading privileged memory with a side-channel\"https://googleprojectzero.blogspot.jp/2018/01/reading-privileged-memory-with-side.html\"Meltdown and Spectre\"https://meltdownattack.com/Sensitive information can be obtained from processes running with user privileges. Spectre As for the attack, crafted Javascript by the code Javascript cannot be obtained from web It has been reported that data can be obtained during the browser process. CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \\\"melts\\\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \\\"cross-border\\\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Intel Xeon CPU E5-1650 v3, v2, v4 versions; Xeon E3-1265l v2, v3, v4 Version; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. Relevant releases/architectures:\n\nRHEV-M 3.6 ELS - noarch\n\n3. It includes the configuration of the Red Hat Support plugin,\ncopying downstream-only artifacts to the ISO domain, and links to the\nknowledgebase and other support material. \n\nThe following packages have been upgraded to a later upstream version:\nrhevm-setup-plugins (3.6.6). \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. Description:\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm package provides the\nuser-space component for running virtual machines that use KVM. Once\nall virtual machines have shut down, start them again for this update to\ntake effect. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n============================================================================\nFreeBSD-SA-19:26.mcu Security Advisory\n The FreeBSD Project\n\nTopic: Intel CPU Microcode Update\n\nCategory: 3rd party\nModule: Intel CPU microcode\nAnnounced: 2019-11-12\nCredits: Intel\nAffects: All supported versions of FreeBSD running on certain\n\t\tIntel CPUs. \nCVE Name: CVE-2019-11135, CVE-2019-11139, CVE-2018-12126,\n CVE-2018-12127, CVE-2018-12130, CVE-2018-11091,\n CVE-2017-5715\n\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:https://security.FreeBSD.org/\u003e. \n\nI. Background\n\n- From time to time Intel releases new CPU microcode to address functional\nissues and security vulnerabilities. Such a release is also known as a\nMicro Code Update (MCU), and is a component of a broader Intel Platform\nUpdate (IPU). FreeBSD distributes CPU microcode via the devcpu-data port\nand package. \n\nII. Problem Description\n\nStarting with version 1.26, the devcpu-data port/package includes updates and\nmitigations for the following technical and security advisories (depending\non CPU model). \n\nIntel TSX Updates (TAA) CVE-2019-11135\nVoltage Modulation Vulnerability CVE-2019-11139\nMD_CLEAR Operations CVE-2018-12126\n CVE-2018-12127\n CVE-2018-12130\n CVE-2018-11091\nTA Indirect Sharing CVE-2017-5715\nEGETKEY CVE-2018-12126\n CVE-2018-12127\n CVE-2018-12130\n CVE-2018-11091\nJCC SKX102 Erratum\n\nUpdated microcode includes mitigations for CPU issues, but may also cause a\nperformance regression due to the JCC erratum mitigation. Please visit\nhttp://www.intel.com/benchmarks for further information. \n\nPlease visit http://www.intel.com/security for detailed information on\nthese advisories as well as a list of CPUs that are affected. \n\nIII. Impact\n\nOperating a CPU without the latest microcode may result in erratic or\nunpredictable behavior, including system crashes and lock ups. Certain\nissues listed in this advisory may result in the leakage of privileged\nsystem information to unprivileged users. Please refer to the security\nadvisories listed above for detailed information. \n\nIV. Workaround\n\nTo determine if TSX is present in your system, run the following:\n\n1. kldload cpuctl\n\n2. cpucontrol -i 7 /dev/cpuctl0\n\nIf bits 4 (0x10) and 11 (0x800) are set in the second response word (EBX),\nTSX is present. \n\nIn the absence of updated microcode, TAA can be mitigated by enabling the\nMDS mitigation:\n\n3. sysctl hw.mds_disable=1\n\nSystems must be running FreeBSD 11.3, FreeBSD 12.1, or later for this to\nwork. \n\n*IMPORTANT*\nIf your use case can tolerate leaving the CPU issues unmitigated and cannot\ntolerate a performance regression, ensure that the devcpu-data package is\nnot installed or is locked at 1.25 or earlier. \n\n# pkg delete devcpu-data\n\nor\n\n# pkg lock devcpu-data\n\nLater versions of the LLVM and GCC compilers will include changes that\npartially relieve the peformance impact. \n\nV. Solution\n\nInstall the latest Intel Microcode Update via the devcpu-data port/package,\nversion 1.26 or later. \n\nUpdated microcode adds the ability to disable TSX. With updated microcode\nthe issue can still be mitigated by enabling the MDS mitigation as\ndescribed in the workaround section, or by disabling TSX instead:\n\n1. kldload cpuctl\n\n2. cpucontrol -i 7 /dev/cpuctl0\n\nIf bit 29 (0x20000000) is set in the fourth response word (EDX), then the\n0x10a MSR is present. \n\n3. cpucontrol -m 0x10a /dev/cpuctl0\n\nIf bit 8 (0x100) of the response word is set, your CPU is not vulnerable to\nTAA and no further action is required. \n\nIf bit 7 (0x80) is cleared, then your CPU does not have updated microcode\nthat facilitates TSX to be disabled. The only remedy available is to\nenable the MDS mitigation, as documented above. \n\n4. cpucontrol -m 0x122=3 /dev/cpuctl0\n\nRepeat step 4 for each numbered CPU that is present. \n\nA future kernel change to FreeBSD will provide automatic detection and\nmitigation for TAA. \n\nLLVM 9.0 will be updated in FreeBSD 13-current to address the JCC\npeformance impact. Updates to prior versions of LLVM are currently being\nevaluated. \n\nVI. Correction details\n\nThere are currently no changes in FreeBSD to address this issue. \n\nVII. References\n\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135\u003e\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11139\u003e\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126\u003e\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127\u003e\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130\u003e\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11091\u003e\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715\u003e\n\u003cURL:https://blogs.intel.com/technology/2019/11/ipas-november-2019-intel-platform-update-ipu/\u003e\n\u003cURL:https://software.intel.com/security-software-guidance/software-guidance/intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort\u003e\n\u003cURL:https://www.intel.com/content/www/us/en/support/articles/000055650.html\u003e\n\nThe latest revision of this advisory is available at\n\u003cURL:https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc\u003e\n-----BEGIN PGP SIGNATURE-----\n\niQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl3LArVfFIAAAAAALgAo\naXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD\nMEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n\n5cJGQQ//ad41YWDAdgBMTWiF56qeySqElIOHt/mLt06s2WW9ceUoJpKW8rKwA4hi\nsjuDlj4vg8ohdiFaZhTxX/smQi3BS+M0xi40fFFgMRR7HuVh11l6bPr+DoUH/Zi+\nE5aiAilOlv/WUAxIrdx0ZlHPkjZ9vfSIPbiqmIkdlFEl4QCuusMRqXKNxaIzzk/K\nrzabCN4NsQPk0SYIZ9l+tZ6JxOOeRaYn+aCjzlbkiYR+wttIaH9nTECx2Rj7XvSw\n9Ng/Mq0M6QsTV/jKfQDRMxRnNfnzF7865uBQYxZNFY9VP5Z21CcqMT54ia5NgcG8\n8Bn2fnM3HcK5LUW3DRnsLhAi6XX0EuX5VMdYvx20aQUj/k8f6a0cPmtSqUVkpU/K\nZcmLd4X+YS/o3UZnRY9OZOEb+kmZE/Yr8f/hR8tmle6FCPS1YLtkwDn3qg/oQA03\nB5rLmzc+x32XZC0dn/HRZTLc4TXQLij0kZpuxiDmbEJmdARDWsl+e0VdBuQdD3Hr\nQ2QvhSVvQgwue8vclfIQVElSZpW93HuyyR8O8ugofwcOt7XwI7k+8ZfrjkjHMPGZ\nQW/i0FQJx4Kup70bzOubb3VEQ7cwAJtE1dvY55oaulDexq3RVMW7oEsvd84X2K8O\nG3+YOZLMrvM1kFskRt067rttbJfMXvstMSHCCfGSqA7fdth6VNQ=KAsu\n-----END PGP SIGNATURE-----\n. On amd64 and i386, new CPU models that match the updated\nmicrocode features were added with an -IBRS suffix. Certain environments\nwill require guests to be switched manually to the new CPU models after\nmicrocode updates have been applied to the host. X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11\nX-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 04 Jan 2018 21:59:52 +0000 (UTC)\n\n\n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: libvirt security update\nAdvisory ID: RHSA-2018:0029-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:0029\nIssue date: 2018-01-04\n=====================================================================\n\n1. Summary:\n\nAn update for libvirt is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe libvirt library contains a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems. \n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a commonly\nused performance optimization). There are three primary variants of the\nissue which differ in the way the speculative execution can be exploited. \nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nand guest/host boundaries and read privileged memory by conducting targeted\ncache side-channel attacks. (CVE-2017-5715)\n\nNote: This is the libvirt side of the CVE-2017-5715 mitigation. \n\nRed Hat would like to thank Google Project Zero for reporting this issue. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted\nautomatically. Bugs fixed (https://bugzilla.redhat.com/):\n\n1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nlibvirt-3.2.0-14.el7_4.7.src.rpm\n\nx86_64:\nlibvirt-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-client-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-client-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nlibvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nlibvirt-3.2.0-14.el7_4.7.src.rpm\n\nx86_64:\nlibvirt-client-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-client-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nlibvirt-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nlibvirt-3.2.0-14.el7_4.7.src.rpm\n\nppc64:\nlibvirt-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-client-3.2.0-14.el7_4.7.ppc.rpm\nlibvirt-client-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-config-network-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-interface-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-network-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-secret-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-storage-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.ppc.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.ppc.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-docs-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.ppc.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.ppc64.rpm\n\nppc64le:\nlibvirt-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-client-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-config-network-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-interface-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-network-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-secret-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-storage-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-kvm-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-docs-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.ppc64le.rpm\n\ns390x:\nlibvirt-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-client-3.2.0-14.el7_4.7.s390.rpm\nlibvirt-client-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-config-network-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-interface-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-network-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-secret-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-storage-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.s390.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.s390.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-docs-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.s390.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.s390x.rpm\n\nx86_64:\nlibvirt-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-client-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-client-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nlibvirt-admin-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-daemon-lxc-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.ppc.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-lock-sanlock-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-login-shell-3.2.0-14.el7_4.7.ppc64.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.ppc.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.ppc64.rpm\n\nppc64le:\nlibvirt-admin-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-daemon-lxc-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-lock-sanlock-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-login-shell-3.2.0-14.el7_4.7.ppc64le.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.ppc64le.rpm\n\ns390x:\nlibvirt-admin-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-daemon-lxc-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.s390.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-login-shell-3.2.0-14.el7_4.7.s390x.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.s390.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.s390x.rpm\n\nx86_64:\nlibvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nlibvirt-3.2.0-14.el7_4.7.src.rpm\n\nx86_64:\nlibvirt-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-client-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-client-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nlibvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-debuginfo-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.i686.rpm\nlibvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/speculativeexecution\nhttps://access.redhat.com/security/cve/CVE-2017-5715\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201804-08\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: QEMU: Multiple vulnerabilities\n Date: April 08, 2018\n Bugs: #629348, #638506, #643432, #646814, #649616\n ID: 201804-08\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in QEMU, the worst of which\nmay allow an attacker to execute arbitrary code. \n\nBackground\n==========\n\nQEMU is a generic and open source machine emulator and virtualizer. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-emulation/qemu \u003c 2.11.1-r1 \u003e= 2.11.1-r1 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in QEMU. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nAn attacker could execute arbitrary code, cause a Denial of Service\ncondition, or obtain sensitive information. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll QEMU users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-emulation/qemu-2.11.1-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2017-13672\n https://nvd.nist.gov/vuln/detail/CVE-2017-13672\n[ 2 ] CVE-2017-15124\n https://nvd.nist.gov/vuln/detail/CVE-2017-15124\n[ 3 ] CVE-2017-16845\n https://nvd.nist.gov/vuln/detail/CVE-2017-16845\n[ 4 ] CVE-2017-17381\n https://nvd.nist.gov/vuln/detail/CVE-2017-17381\n[ 5 ] CVE-2017-18030\n https://nvd.nist.gov/vuln/detail/CVE-2017-18030\n[ 6 ] CVE-2017-18043\n https://nvd.nist.gov/vuln/detail/CVE-2017-18043\n[ 7 ] CVE-2017-5715\n https://nvd.nist.gov/vuln/detail/CVE-2017-5715\n[ 8 ] CVE-2018-5683\n https://nvd.nist.gov/vuln/detail/CVE-2018-5683\n[ 9 ] CVE-2018-5748\n https://nvd.nist.gov/vuln/detail/CVE-2018-5748\n[ 10 ] CVE-2018-7550\n https://nvd.nist.gov/vuln/detail/CVE-2018-7550\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201804-08\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2018 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. \n==========================================================================\nUbuntu Security Notice USN-3541-2\nJanuary 23, 2018\n\nlinux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were addressed in the Linux kernel. \n\nSoftware Description:\n- linux-azure: Linux kernel for Microsoft Azure Cloud systems\n- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems\n- linux-hwe: Linux hardware enablement (HWE) kernel\n- linux-oem: Linux kernel for OEM processors\n\nDetails:\n\nUSN-3541-1 addressed vulnerabilities in the Linux kernel for Ubuntu\n17.10. This update provides the corresponding updates for the\nLinux Hardware Enablement (HWE) kernel from Ubuntu 17.10 for Ubuntu\n16.04 LTS. This flaw is known as Spectre. A\nlocal attacker could use this to expose sensitive information,\nincluding kernel memory. This update provides mitigations for the\ni386 (CVE-2017-5753 only), amd64, ppc64el, and s390x architectures. \n(CVE-2017-5715, CVE-2017-5753)\n\nUSN-3523-2 mitigated CVE-2017-5754 (Meltdown) for the amd64\narchitecture in the Linux Hardware Enablement (HWE) kernel from Ubuntu\n17.10 for Ubuntu 16.04 LTS. This update provides the corresponding\nmitigations for the ppc64el architecture. This flaw is known as Meltdown. A local\n attacker could use this to expose sensitive information, including\n kernel memory. (CVE-2017-5754)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n linux-image-4.13.0-1006-azure 4.13.0-1006.8\n linux-image-4.13.0-1007-gcp 4.13.0-1007.10\n linux-image-4.13.0-1017-oem 4.13.0-1017.18\n linux-image-4.13.0-31-generic 4.13.0-31.34~16.04.1\n linux-image-4.13.0-31-lowlatency 4.13.0-31.34~16.04.1\n linux-image-azure 4.13.0.1006.7\n linux-image-gcp 4.13.0.1007.9\n linux-image-generic-hwe-16.04 4.13.0.31.51\n linux-image-gke 4.13.0.1007.9\n linux-image-lowlatency-hwe-16.04 4.13.0.31.51\n linux-image-oem 4.13.0.1017.21\n\nPlease note that fully mitigating CVE-2017-5715 (Spectre Variant 2)\nrequires corresponding processor microcode/firmware updates or,\nin virtual environments, hypervisor updates. On i386 and amd64\narchitectures, the IBRS and IBPB features are required to enable the\nkernel mitigations. Ubuntu is working with Intel and AMD to provide\nfuture microcode updates that implement IBRS and IBPB as they are made\navailable. Ubuntu users with a processor from a different vendor should\ncontact the vendor to identify necessary firmware updates. Ubuntu\nwill provide corresponding QEMU updates in the future for users of\nself-hosted virtual environments in coordination with upstream QEMU. \nUbuntu users in cloud environments should contact the cloud provider\nto confirm that the hypervisor has been updated to expose the new\nCPU features to virtual machines. \n\nSoftware Description:\n- intel-microcode: Processor microcode for Intel CPUs\n\nDetails:\n\nUSN-3531-1 updated Intel microcode to the 20180108 release. Regressions\nwere discovered in the microcode updates which could cause system\ninstability on certain hardware platforms", "sources": [ { "db": "NVD", "id": "CVE-2017-5715" }, { "db": "CERT/CC", "id": "VU#180049" }, { "db": "JVNDB", "id": "JVNDB-2018-001001" }, { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" }, { "db": "PACKETSTORM", "id": "145705" }, { "db": "PACKETSTORM", "id": "146772" }, { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "145660" }, { "db": "PACKETSTORM", "id": "145999" }, { "db": "PACKETSTORM", "id": "155281" }, { "db": "PACKETSTORM", "id": "146301" }, { "db": "PACKETSTORM", "id": "145678" }, { "db": "PACKETSTORM", "id": "147100" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146009" } ], "trust": 3.96 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-113918", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-113918" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5715", "trust": 4.4 }, { "db": "CERT/CC", "id": "VU#584653", "trust": 2.7 }, { "db": "CERT/CC", "id": "VU#180049", "trust": 1.9 }, { "db": "BID", "id": "102376", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "155281", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "145645", "trust": 1.1 }, { "db": "SECTRACK", "id": "1040071", "trust": 1.1 }, { "db": "LENOVO", "id": "LEN-18282", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "43427", "trust": 1.1 }, { "db": "CERT@VDE", "id": "VDE-2018-003", "trust": 1.1 }, { "db": "CERT@VDE", "id": "VDE-2018-002", "trust": 1.1 }, { "db": "SIEMENS", "id": "SSA-608355", "trust": 1.1 }, { "db": "USCERT", "id": "TA18-141A", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU98137233", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU94630516", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU93823979", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU99752892", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-23-075-01", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-23-257-04", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#155143", "trust": 0.8 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-18-011-01A", "trust": 0.8 }, { "db": "USCERT", "id": "TA18-004A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-001001", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-00302", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "146019", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "146301", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "146009", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "146772", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "146015", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "145844", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146026", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146014", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146298", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145767", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146018", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149917", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146556", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148260", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145769", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146016", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150083", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145852", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145801", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146315", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148446", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146771", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146167", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146762", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147179", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145800", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147582", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146308", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145768", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145964", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146283", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146017", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146957", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145853", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145762", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146714", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145809", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146501", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-201801-152", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-113918", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145705", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145660", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145999", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145678", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147100", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" }, { "db": "JVNDB", "id": "JVNDB-2018-001001" }, { "db": "PACKETSTORM", "id": "145705" }, { "db": "PACKETSTORM", "id": "146772" }, { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "145660" }, { "db": "PACKETSTORM", "id": "145999" }, { "db": "PACKETSTORM", "id": "155281" }, { "db": "PACKETSTORM", "id": "146301" }, { "db": "PACKETSTORM", "id": "145678" }, { "db": "PACKETSTORM", "id": "147100" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146009" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "id": "VAR-201801-0826", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" } ], "trust": 1.3670634874999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00302" } ] }, "last_update_date": "2024-09-19T20:34:36.511000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u201cWith speculative execution function \u00a0CPU\u00a0 side-channel attacks against", "trust": 0.8, "url": "https://www.amd.com/en/corporate/speculative-execution" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-001001" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-203", "trust": 1.0 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-113918" }, { "db": "JVNDB", "id": "JVNDB-2018-001001" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.kb.cert.org/vuls/id/584653" }, { "trust": 1.9, "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/102376" }, { "trust": 1.6, "url": "https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution" }, { "trust": 1.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "trust": 1.6, "url": "https://support.apple.com//ht208394" }, { "trust": 1.6, "url": "http://www.dell.com/support/speculative-store-bypass" }, { "trust": 1.5, "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5715" }, { "trust": 1.1, "url": "https://seclists.org/bugtraq/2019/jun/36" }, { "trust": 1.1, "url": "https://seclists.org/bugtraq/2019/nov/16" }, { "trust": 1.1, "url": "https://www.kb.cert.org/vuls/id/180049" }, { "trust": 1.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180104-cpusidechannel" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "trust": 1.1, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2018-001.txt" }, { "trust": 1.1, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "trust": 1.1, "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "trust": 1.1, "url": "https://aws.amazon.com/de/security/security-bulletins/aws-2018-013/" }, { "trust": 1.1, "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "trust": 1.1, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "trust": 1.1, "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "trust": 1.1, "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "trust": 1.1, "url": "https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes" }, { "trust": 1.1, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180002" }, { "trust": 1.1, "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "trust": 1.1, "url": "https://security.paloaltonetworks.com/cve-2017-5715" }, { "trust": 1.1, "url": "https://support.citrix.com/article/ctx231399" }, { "trust": 1.1, "url": "https://support.f5.com/csp/article/k91229003" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us" }, { "trust": 1.1, "url": "https://support.lenovo.com/us/en/solutions/len-18282" }, { "trust": 1.1, "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "trust": 1.1, "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "trust": 1.1, "url": "https://www.synology.com/support/security/synology_sa_18_01" }, { "trust": 1.1, "url": "https://www.vmware.com/security/advisories/vmsa-2018-0007.html" }, { "trust": 1.1, "url": "https://www.vmware.com/us/security/advisories/vmsa-2018-0002.html" }, { "trust": 1.1, "url": "https://www.vmware.com/us/security/advisories/vmsa-2018-0004.html" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4120" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4187" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4188" }, { "trust": 1.1, "url": "https://www.debian.org/security/2018/dsa-4213" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/43427/" }, { "trust": 1.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-18:03.speculative_execution.asc" }, { "trust": 1.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-19:26.mcu.asc" }, { "trust": 1.1, "url": "https://security.gentoo.org/glsa/201810-06" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/145645/spectre-information-disclosure-proof-of-concept.html" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/155281/freebsd-security-advisory-freebsd-sa-19-26.mcu.html" }, { "trust": 1.1, "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "trust": 1.1, "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "trust": 1.1, "url": "https://spectreattack.com/" }, { "trust": 1.1, "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html" }, { "trust": 1.1, "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2018:0292" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1040071" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3531-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3531-3/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3540-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3541-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3542-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3549-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3560-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3561-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3580-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3581-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3581-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3582-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3582-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3594-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3597-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3597-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3620-2/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3690-1/" }, { "trust": 1.1, "url": "https://usn.ubuntu.com/3777-3/" }, { "trust": 1.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5754" }, { "trust": 1.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5753" }, { "trust": 1.0, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026languageid=en-fr" }, { "trust": 1.0, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03871en_us" }, { "trust": 0.8, "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "trust": 0.8, "url": "https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ncas/alerts/ta18-141a" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/208.html" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf" }, { "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel" }, { "trust": 0.8, "url": "https://fortiguard.com/psirt/fg-ir-18-002" }, { "trust": 0.8, "url": "https://support.hp.com/us-en/document/c06001626" }, { "trust": 0.8, "url": "http://www.hitachi.com/hirt/publications/hirt-pub18001/" }, { "trust": 0.8, "url": "https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/" }, { "trust": 0.8, "url": "https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution" }, { "trust": 0.8, "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "trust": 0.8, "url": "https://www.suse.com/support/kb/doc/?id=7022937" }, { "trust": 0.8, "url": "https://www.synology.com/en-global/support/security/synology_sa_18_23" }, { "trust": 0.8, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/variant4" }, { "trust": 0.8, "url": "https://kb.vmware.com/s/article/54951" }, { "trust": 0.8, "url": "https://aws.amazon.com/security/security-bulletins/aws-2018-015/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu93823979/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu94630516/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu99752892/index.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98137233/" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ncas/alerts/ta18-004a" }, { "trust": 0.8, "url": "https://kb.cert.org/vuls/id/155143" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-01" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-257-04" }, { "trust": 0.8, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-18-011-01a" }, { "trust": 0.8, "url": "http://blog.cyberus-technology.de/posts/2018-01-03-meltdown.html" }, { "trust": 0.8, "url": "https://meltdownattack.com/" }, { "trust": 0.8, "url": "https://googleprojectzero.blogspot.jp/2018/01/reading-privileged-memory-with-side.html" }, { "trust": 0.6, "url": "https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates" }, { "trust": 0.4, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2017-5715" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/spectreandmeltdown" }, { "trust": 0.2, "url": "https://www.ubuntu.com/usn/usn-3541-1" }, { "trust": 0.1, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00088\u0026amp;languageid=en-fr" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03871en_us" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0052" }, { "trust": 0.1, "url": "https://access.redhat.com/solutions/3307851" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3541-2," }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3523-2," }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.13.0-37.42~16.04.1" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3597-1," }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3597-2," }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.13.0-31.34" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0023" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0106" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-12126\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11091\u003e" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11139" }, { "trust": 0.1, "url": "https://software.intel.com/security-software-guidance/software-guidance/intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-12130\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-12127\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5715\u003e" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12126" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12127" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11139\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/\u003e." }, { "trust": 0.1, "url": "https://blogs.intel.com/technology/2019/11/ipas-november-2019-intel-platform-update-ipu/\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11135\u003e" }, { "trust": 0.1, "url": "https://www.intel.com/content/www/us/en/support/articles/000055650.html\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-19:26.mcu.asc\u003e" }, { "trust": 0.1, "url": "http://www.intel.com/benchmarks" }, { "trust": 0.1, "url": "http://www.intel.com/security" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11091" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11135" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12130" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libvirt/1.2.2-0ubuntu13.1.25" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3561-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libvirt/3.6.0-1ubuntu6.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libvirt/1.3.1-1ubuntu10.17" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0029" }, { "trust": 0.1, "url": "https://security.gentoo.org/glsa/201804-08" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16845" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5683" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13672" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15124" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18030" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7550" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18043" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5748" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17381" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3541-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.13.0-1006.8" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oem/4.13.0-1017.18" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.13.0-31.34~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.13.0-1007.10" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1742933" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3531-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu16.04.1" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3531-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu17.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu14.04.1" } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" }, { "db": "JVNDB", "id": "JVNDB-2018-001001" }, { "db": "PACKETSTORM", "id": "145705" }, { "db": "PACKETSTORM", "id": "146772" }, { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "145660" }, { "db": "PACKETSTORM", "id": "145999" }, { "db": "PACKETSTORM", "id": "155281" }, { "db": "PACKETSTORM", "id": "146301" }, { "db": "PACKETSTORM", "id": "145678" }, { "db": "PACKETSTORM", "id": "147100" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146009" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00302" }, { "db": "VULHUB", "id": "VHN-113918" }, { "db": "JVNDB", "id": "JVNDB-2018-001001" }, { "db": "PACKETSTORM", "id": "145705" }, { "db": "PACKETSTORM", "id": "146772" }, { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "145660" }, { "db": "PACKETSTORM", "id": "145999" }, { "db": "PACKETSTORM", "id": "155281" }, { "db": "PACKETSTORM", "id": "146301" }, { "db": "PACKETSTORM", "id": "145678" }, { "db": "PACKETSTORM", "id": "147100" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146009" }, { "db": "NVD", "id": "CVE-2017-5715" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-21T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-01-04T00:00:00", "db": "CNVD", "id": "CNVD-2018-00302" }, { "date": "2018-01-04T00:00:00", "db": "VULHUB", "id": "VHN-113918" }, { "date": "2018-01-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001001" }, { "date": "2018-01-06T17:59:19", "db": "PACKETSTORM", "id": "145705" }, { "date": "2018-03-15T15:54:52", "db": "PACKETSTORM", "id": "146772" }, { "date": "2018-01-23T04:31:56", "db": "PACKETSTORM", "id": "146015" }, { "date": "2018-01-04T17:52:11", "db": "PACKETSTORM", "id": "145660" }, { "date": "2018-01-22T03:06:00", "db": "PACKETSTORM", "id": "145999" }, { "date": "2019-11-12T21:46:17", "db": "PACKETSTORM", "id": "155281" }, { "date": "2018-02-08T04:23:47", "db": "PACKETSTORM", "id": "146301" }, { "date": "2018-01-05T00:37:59", "db": "PACKETSTORM", "id": "145678" }, { "date": "2018-04-09T16:31:30", "db": "PACKETSTORM", "id": "147100" }, { "date": "2018-01-23T04:32:21", "db": "PACKETSTORM", "id": "146019" }, { "date": "2018-01-22T03:17:00", "db": "PACKETSTORM", "id": "146009" }, { "date": "2018-01-04T13:29:00.227000", "db": "NVD", "id": "CVE-2017-5715" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-19T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-01-11T00:00:00", "db": "CNVD", "id": "CNVD-2018-00302" }, { "date": "2020-05-05T00:00:00", "db": "VULHUB", "id": "VHN-113918" }, { "date": "2024-04-11T06:49:00", "db": "JVNDB", "id": "JVNDB-2018-001001" }, { "date": "2021-08-16T09:15:06.987000", "db": "NVD", "id": "CVE-2017-5715" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "146015" }, { "db": "PACKETSTORM", "id": "146019" }, { "db": "PACKETSTORM", "id": "146009" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks", "sources": [ { "db": "CERT/CC", "id": "VU#180049" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "arbitrary", "sources": [ { "db": "PACKETSTORM", "id": "147100" } ], "trust": 0.1 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.