kernel is vulnerable to denial of service. Due to the way found in which Intel CPUs handle inconsistency between virtual to physical memory address translations in CPU’s local cache and system software’s Paging structure entries, a privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.
lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html
access.redhat.com/errata/RHSA-2019:3832
access.redhat.com/errata/RHSA-2019:3916
access.redhat.com/errata/RHSA-2019:3936
access.redhat.com/errata/RHSA-2019:3941
access.redhat.com/errata/RHSA-2020:0026
access.redhat.com/errata/RHSA-2020:0028
access.redhat.com/errata/RHSA-2020:0204
access.redhat.com/security/updates/classification/#important
access.redhat.com/security/vulnerabilities/ifu-page-mce
access.redhat.com/solutions/i915-graphics
access.redhat.com/solutions/tsx-asynchronousabort
lists.fedoraproject.org/archives/list/[email protected]/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/
lists.fedoraproject.org/archives/list/[email protected]/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/
seclists.org/bugtraq/2020/Jan/21
security.gentoo.org/glsa/202003-56
support.f5.com/csp/article/K17269881?utm_source=f5support&utm_medium=RSS
usn.ubuntu.com/4186-2/
www.debian.org/security/2020/dsa-4602
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html
www.oracle.com/security-alerts/cpujul2020.html