CVE-2018-3640

Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
References
Link Resource
http://support.lenovo.com/us/en/solutions/LEN-22133 Third Party Advisory
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html Third Party Advisory
http://www.securityfocus.com/bid/104228 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040949 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042004
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013 Patch Third Party Advisory Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0005
https://security.netapp.com/advisory/ntap-20180521-0001/ Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel Third Party Advisory
https://usn.ubuntu.com/3756-1/
https://www.debian.org/security/2018/dsa-4273
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html Vendor Advisory
https://www.kb.cert.org/vuls/id/180049 Third Party Advisory US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
https://www.synology.com/support/security/Synology_SA_18_23 Third Party Advisory
https://www.us-cert.gov/ncas/alerts/TA18-141A Third Party Advisory US Government Resource
http://support.lenovo.com/us/en/solutions/LEN-22133 Third Party Advisory
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html Third Party Advisory
http://www.securityfocus.com/bid/104228 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040949 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042004
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013 Patch Third Party Advisory Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0005
https://security.netapp.com/advisory/ntap-20180521-0001/ Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel Third Party Advisory
https://usn.ubuntu.com/3756-1/
https://www.debian.org/security/2018/dsa-4273
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html Vendor Advisory
https://www.kb.cert.org/vuls/id/180049 Third Party Advisory US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
https://www.synology.com/support/security/Synology_SA_18_23 Third Party Advisory
https://www.us-cert.gov/ncas/alerts/TA18-141A Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*

History

21 Nov 2024, 04:05

Type Values Removed Values Added
References () http://support.lenovo.com/us/en/solutions/LEN-22133 - Third Party Advisory () http://support.lenovo.com/us/en/solutions/LEN-22133 - Third Party Advisory
References () http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html - Third Party Advisory () http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html - Third Party Advisory
References () http://www.securityfocus.com/bid/104228 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104228 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040949 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040949 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1042004 - () http://www.securitytracker.com/id/1042004 -
References () https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf -
References () https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf -
References () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Vendor Advisory () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html - () https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html -
References () https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html - () https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html -
References () https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013 - Patch, Third Party Advisory, Vendor Advisory () https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013 - Patch, Third Party Advisory, Vendor Advisory
References () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0005 - () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0005 -
References () https://security.netapp.com/advisory/ntap-20180521-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20180521-0001/ - Third Party Advisory
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us - Third Party Advisory () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us - Third Party Advisory
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel - Third Party Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel - Third Party Advisory
References () https://usn.ubuntu.com/3756-1/ - () https://usn.ubuntu.com/3756-1/ -
References () https://www.debian.org/security/2018/dsa-4273 - () https://www.debian.org/security/2018/dsa-4273 -
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html - Vendor Advisory () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html - Vendor Advisory
References () https://www.kb.cert.org/vuls/id/180049 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/180049 - Third Party Advisory, US Government Resource
References () https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 - () https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 -
References () https://www.synology.com/support/security/Synology_SA_18_23 - Third Party Advisory () https://www.synology.com/support/security/Synology_SA_18_23 - Third Party Advisory
References () https://www.us-cert.gov/ncas/alerts/TA18-141A - Third Party Advisory, US Government Resource () https://www.us-cert.gov/ncas/alerts/TA18-141A - Third Party Advisory, US Government Resource

Information

Published : 2018-05-22 12:29

Updated : 2024-11-21 04:05


NVD link : CVE-2018-3640

Mitre link : CVE-2018-3640

CVE.ORG link : CVE-2018-3640


JSON object : View

Products Affected

intel

  • xeon_e5_2620
  • xeon_e5_2630_v2
  • xeon_e3_1505l_v6
  • xeon_e5_2628l_v2
  • xeon_e5_2637
  • xeon_e3_1225
  • xeon_e3_1235
  • xeon_e5_2608l_v3
  • xeon_e5_1620_v4
  • xeon_e5_2640_v2
  • xeon_e5_2620_v3
  • pentium
  • xeon_e3_1265l_v2
  • xeon_e5_2630
  • xeon_e5_2609
  • xeon_e5_2448l_v2
  • xeon_e5_2440
  • xeon_e3_1240_v6
  • xeon_e3_1245_v3
  • xeon_e5_2430l
  • xeon_e5_1650_v3
  • xeon_e5_1630_v3
  • xeon_e3_1225_v2
  • xeon_e5_1680_v4
  • xeon_e5_2603_v4
  • xeon_e5_2630_v3
  • xeon_e3_1270_v3
  • xeon_e5_2643_v2
  • xeon_e3_1265l_v4
  • xeon_e5_2609_v2
  • xeon_e5_2643_v3
  • xeon_e3_1240l_v5
  • xeon_e3_1501l_v6
  • xeon_e5_2630_v4
  • xeon_e5_2640_v3
  • atom_z
  • xeon_e3_1280_v5
  • xeon_e5_2650
  • xeon_platinum
  • xeon_e3_1220_v5
  • xeon_e5_2650l_v2
  • xeon_e3_1268l_v3
  • xeon_e5_2648l_v4
  • xeon_e3_1275_v6
  • xeon_e5
  • xeon_e3_1230_v2
  • xeon_e3_1270_v6
  • xeon_e5_1660
  • xeon_e5_2450l_v2
  • xeon_e5_2428l
  • xeon_e3_1501m_v6
  • xeon_e5_2609_v3
  • xeon_e3_1235l_v5
  • xeon_e3_1270_v2
  • atom_c
  • xeon_e3_1280_v2
  • xeon_e3_1505l_v5
  • xeon_e5_2643_v4
  • xeon_e5_2618l_v4
  • xeon_e3_1276_v3
  • xeon_e3_1290_v2
  • xeon_silver
  • xeon_e5_2609_v4
  • xeon_e3_12201
  • xeon_e5_2637_v2
  • xeon_e5_2640
  • xeon_e3_1505m_v5
  • xeon_e3_1240l_v3
  • xeon_e5_2630l_v2
  • xeon_e3_1240_v2
  • xeon_e3_1265l_v3
  • xeon_e3_1270
  • xeon_e5_2603_v3
  • xeon_e5_2430_v2
  • xeon_e5_1620_v3
  • xeon_e5_2450_v2
  • xeon_e5_1680_v3
  • xeon_e5_2420_v2
  • xeon_e5_2418l
  • xeon_e3_1225_v3
  • xeon_e5_2428l_v3
  • xeon_e5_2403_v2
  • pentium_silver
  • xeon_e3_1271_v3
  • xeon_e5_1650
  • xeon_e5_1428l_v3
  • xeon_e3_1281_v3
  • xeon_e5_1630_v4
  • xeon_e5_2470_v2
  • xeon_e5_1660_v4
  • xeon_e3_1245_v5
  • xeon_e3_1245
  • xeon_e5_2650_v3
  • xeon_e-1105c
  • xeon_e5_2450
  • xeon_e3_1230l_v3
  • xeon_e5_2640_v4
  • xeon_e5_1650_v4
  • xeon_e5_2650l_v3
  • xeon_e3_1230_v6
  • xeon_e5_2403
  • xeon_e3_1241_v3
  • xeon_e5_2628l_v4
  • xeon_e3_1275_v3
  • core_i5
  • xeon_e3_1220_v2
  • xeon_e3_1125c_v2
  • xeon_e5_2623_v4
  • xeon_e5_2603
  • xeon_e3_1245_v2
  • xeon_e5_2618l_v2
  • xeon_e3_1220_v6
  • xeon_e5_2650l
  • xeon_e3_1230
  • xeon_e5_2643
  • xeon_e3_1290
  • xeon_e3_1270_v5
  • xeon_e3_1240_v3
  • xeon_e5_2440_v2
  • atom_e
  • xeon_e5_2637_v4
  • xeon_e7
  • xeon_e5_2470
  • xeon_e3_1231_v3
  • xeon_e3_1260l_v5
  • xeon_e3
  • xeon_e5_2630l
  • xeon_e5_2630l_v3
  • xeon_e5_2637_v3
  • xeon_e5_2438l_v3
  • xeon_e5_2428l_v2
  • xeon_e5_2407_v2
  • xeon_e5_1650_v2
  • xeon_e3_1268l_v5
  • xeon_e3_1280
  • xeon_e3_1280_v6
  • xeon_e5_1660_v3
  • xeon_gold
  • xeon_e3_1285l_v4
  • core_m
  • xeon_e5_2650_v2
  • xeon_e5_2628l_v3
  • xeon_e3_1245_v6
  • xeon_e3_1275_v2
  • xeon_e3_1225_v6
  • xeon_e3_1286_v3
  • xeon_e5_2407
  • xeon_e5_2448l
  • xeon_e5_2648l_v2
  • xeon_e3_1285_v4
  • xeon_e3_1258l_v4
  • xeon_e3_1275l_v3
  • xeon_e5_2603_v2
  • celeron_n
  • xeon_e5_1620
  • xeon_e5_2650_v4
  • xeon_e5_1428l
  • xeon_e3_1220_v3
  • xeon_e3_12201_v2
  • xeon_e5_2420
  • xeon_e5_2648l
  • xeon_e5_2418l_v3
  • xeon_e3_1230_v3
  • xeon_e3_1246_v3
  • xeon_e3_1286l_v3
  • xeon_e5_1660_v2
  • xeon_e3_1230_v5
  • xeon_e5_2408l_v3
  • xeon_e3_1285_v3
  • xeon_e3_1240
  • xeon_e3_1260l
  • xeon_e5_1428l_v2
  • xeon_e3_1278l_v4
  • xeon_e5_2620_v2
  • xeon_e5_2620_v4
  • xeon_e3_1275_v5
  • xeon_e3_1285l_v3
  • xeon_e3_1226_v3
  • xeon_e5_2630l_v4
  • celeron_j
  • xeon_e5_2618l_v3
  • xeon_e5_1620_v2
  • pentium_j
  • core_i7
  • xeon_e5_2608l_v4
  • xeon_e3_1225_v5
  • xeon_e5_2430l_v2
  • xeon_e3_1105c_v2
  • xeon_e3_1220l_v3
  • xeon_e5_2418l_v2
  • xeon_e3_1285_v6
  • xeon_e5_2450l
  • xeon_e5_2623_v3
  • xeon_e3_1280_v3
  • xeon_e5_2648l_v3
  • xeon_e5_2430
  • core_i3
  • xeon_e3_1240_v5

arm

  • cortex-a
CWE
CWE-203

Observable Discrepancy