-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2019.0313
       INTEL-SA-00210 - Intel Processor Machine Check Error Advisory
                             13 November 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Intel Core Processor
                      Intel Core X-series Processor
                      Intel Pentium Gold Processor
                      Intel Celeron Processor
                      Intel Xeon Processor
                      Intel Xeon Scalable Processor
Impact/Access:        Denial of Service -- Existing Account
Resolution:           Patch/Upgrade
CVE Names:            CVE-2018-12207  
Member content until: Friday, December 13 2019
Reference:            ESB-2019.4247
                      ESB-2019.4246

OVERVIEW

        Intel has discovered vulnerabilities in the following products:
          o Intel Core Processors
          o Intel Core X-series Processor 
          o Intel Pentium Gold Processor 
          o Intel Celeron Processor
          o Intel Xeon Processor 
          o Intel Xeon Scalable Processors [1]


IMPACT

        Intel has provided the folllowing information regarding the 
        vulnerabilities:
        
        "Intel ID:                INTEL-SA-00210 
        Advisory Category:        Firmware, Software 
        Impact of vulnerability : Denial of Service 
        Severity rating :         MEDIUM
        Original release:         11/12/2019 
        Last revised:             11/12/2019" [1]
        
        "CVEID: CVE-2018-12207
        Description: Improper invalidation for page table updates by a 
        virtual guest operating system for multiple Intel(R) Processors may
        allow an authenticated user to potentially enable denial of service
        of the host system via local access.
        CVSS Base Score: 6.5 Medium
        CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" [1]


MITIGATION

        Intel recommends:
        
        "To mitigate this vulnerability, operating system and hypervisor 
        vendors will be providing software updates. Please contact your 
        operating system vendor for additional details" [1]


REFERENCES

        [1] INTEL-SA-00210 - Intel Processor Machine Check Error Advisory
            https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=6qP0
-----END PGP SIGNATURE-----