RED HAT VULNERABILITY RESPONSE
Red Hat Product Security is aware of a series of vulnerabilities - CVE-2018-12207 - Machine Check Error on Page Size Change, CVE-2019-11135 - TSX Asynchronous Abort, and CVE-2019-0155, CVE-2019-0154 - i915 graphics driver.
Today, a series of three Common Exposures and Vulnerabilities (CVE-2018-12207 - Machine Check Error on Page Size Change, CVE-2019-11135 - TSX Asynchronous Abort, and CVE-2019-0155, CVE-2019-0154 - i915 graphics driver) affecting Intel CPUs were made public. If exploited, these CVEs could potentially allow malicious actors to gain read access to sensitive data. To help provide more context around this vulnerability from an open source technology perspective, Red Hat Product Security is providing several resources around the impact of these three CVEs on our customers and the enterprise IT community.
Severity: • Red Hat rates CVE-2018-12207, Machine Check Error on Page Size Change, as having a security impact of
IMPORTANT severity.
• Red Hat rates CVE-2019-11135, TSX Asynchronous Abort, as having a security impact of
MODERATE severity.
• Red Hat rates CVE-2019-0155 as
IMPORTANT and CVE-2019-0154, both i915 graphics driver, as having a security impact of
MODERATE .
More detailed overviews of these vulnerabilities have been published by Red Hat and are available publicly via the Red Hat Customer Portal:
•
https://access.redhat.com/security/vulnerabilities/ifu-page-mce •
https://access.redhat.com/solutions/tsx-asynchronousabort •
https://access.redhat.com/solutions/i915-graphicsCustomer Action:Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as the erratas are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate. Customers running Red Hat products with our Certified Cloud Provider Partners should contact their Cloud provider for further details.
АПД починил ссылки