Processors Affected: Machine Check Error Avoidance on Page Size Change

ID 660251
Updated 11/12/2019
Version Latest



Intel expects the following processors are affected by the Machine Check Error Avoidance on Page Size Change issue. Refer to Machine Check Error Avoidance on Page Size Change for further details.

List of Processors Affected by Machine Check Error Avoidance on Page Size Change (CVE-2018-12207)
Family_Model Affected Processor Families / Processor Number Series
06_2EH Intel® Xeon® processor 7500, 6500 series (Nehalem-EX)
06_1EH, 06_1FH Intel® Core™ i7 and i5 Processors (Nehalem, Nehalem-G)
06_1AH Intel Core i7 Processor, Intel Xeon processor 3400, 3500, 5500 series (Nehalem-EP)
06_2FH Intel Xeon Processor E7 Family (Westmere-EX)
06_25H, 06_2CH Intel Xeon processors 3600, 5600 series, Intel Core i7, i5 and i3 Processors (Westmere, Westmere-EP)
06_2AH 2nd generation Intel Core Processors (Sandy Bridge)
06_2DH Intel Xeon processor E5 Family based on Intel microarchitecture code name Sandy Bridge, Intel Core i7-39xx Processor Extreme Edition
06_2DH Intel Xeon processor E3-1200 product family; 2nd Generation Intel Core i7, i5, i3 Processors 2xxx Series (Sandy Bridge)
06_3AH 3rd generation Intel® Core™ Processors (Ivy Bridge)
06_3EH Intel Xeon processor E7-8800/4800/2800 v2 product families based on Ivy Bridge-E microarchitecture
06_3EH Intel Xeon processor E5-2600/1600 v2 product families and Intel Xeon processor E5-2400 v2 product family based on Ivy Bridge-E microarchitecture, Intel Core i7-49xx Processor Extreme Edition
06_9EH Intel Xeon-E 2100
06_3AH 3rd Generation Intel Core Processor and Intel Xeon processor E3-1200 v2 product family based on Ivy Bridge microarchitecture
06_3FH Intel Xeon processor E5-4600/2600/1600 v3 product families, Intel Xeon processor E7 v3 product families based on Haswell-E microarchitecture, Intel Core i7-59xx Processor Extreme Edition
06_3CH, 06_45H, 06_46H 4th Generation Intel Core processor and Intel Xeon processor E3-1200 v3 product family based on Haswell microarchitecture
06_3FH, 06_4FH Intel Core X-series Processor family for Intel® X99 platforms
06_56H Intel Xeon processor D-1500 product family based on Broadwell microarchitecture
06_4FH Intel Xeon processor E5 v4 Family based on Broadwell microarchitecture, Intel Xeon processor E7 v4 Family, Intel Core i7-69xx Processor Extreme Edition
06_47H 5th generation Intel Core processors, Intel Xeon processor E3-1200 v4 product family based on Broadwell microarchitectur
06_3DH Intel Core M-5xxx Processor, 5th generation Intel Core processors based on Broadwell microarchitecture
06_55H Intel Xeon Processor Scalable Family based on Skylake microarchitecture
06_55H Skylake-D
06_9EH, 06_55H Intel® Core™ X-series Processor family for Intel® X299 platforms
06_4EH, 06_5EH 6th generation Intel Core processors and Intel Xeon processor E3-1500m v5 product family and E3- 1200 v5 product family based on Skylake microarchitecture
06_9EH Kaby Lake E3-1200 v6
06_8EH, 06_9EH 7th/8th generation Intel® Core™ processors based on Kaby/Coffee Lake microarchitecture
06_9EH Coffee Lake
06_8EH Whiskey Lake(ULT)
06_8EH Whiskey Lake (ULT refresh)
06_9EH Whiskey Lake (Desktop)
06_55H Cascade Lake

Unaffected Processors

The following is a list of unaffected processors in Family 0x6 that may not have IA32_ARCH_CAPABILITIES[IF_PSCHANGE_MC_NO] enumeration.

Instead of checking the list of the affected CPU list, a software algorithm can use the following unaffected CPU list to determine a mitigation is necessary. The pseudocode below describes a modified algorithm.

 	CPU is not vulnerable; no mitigation needed
} else if ( == 0x6 && CPUID == Not_in_unaffected_list)
 	CPU is vulnerable
Use SW mitigation if needed

Unaffected processors

Family_Model Unaffected Processor Families / Processor Number Series
Atom (Bonnell, Saltwell, Silvermont, Airmont Goldmont, GoldmontPlus)
Knights family


Software Security Guidance Home | Advisory Guidance | Technical Documentation | Best Practices | Resources