A flaw was found in Intel microprocessors implementation of packed byte shuffle AVX instructions (SHUF*). The defect can be exploited to cause stability problems in the processor. This is mitigated through a microcode update. This could allow an attacker with a local account to possibly crash the system or the host within a guest on a virtual environment. A system will need to reload updated microcode to correctly fix this issue. Additional references: https://software.intel.com/sites/default/files/managed/39/c5/325462-sdm-vol-1-2abcd-3abcd.pdf
Acknowledgements: Red Hat thanks Intel for reporting this issue and collaborating on the mitigations for the same.
Statement: Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/2019-microcode-nov
External References: https://access.redhat.com/solutions/2019-microcode-nov
Mitigation: As of this time there are no known mitigations. Please install relevant updated packages to address this flaw.
Created microcode_ctl tracking bugs for this issue: Affects: fedora-all [bug 1771653]