Potential security vulnerabilities in Intel® Graphics Driver for Windows* and Linux may allow denial of service.** **Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2019-11112
Description: Memory corruption in Kernel Mode Driver in Intel® Graphics Driver before 26.20.100.6813 (DCH) or 26.20.100.6812 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 8.8 High
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2019-0155
Description: Insufficient access control in a subsystem for Intel ® processor graphics in 6th, 7th, 8th and 9th Generation Intel® Core™ Processor Families; Intel® Pentium® Processor J, N, Silver and Gold Series; Intel® Celeron® Processor J, N, G3900 and G4900 Series; Intel® Atom® Processor A and E3900 Series; Intel® Xeon® Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel® Graphics Driver for Windows* before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel® Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 8.8 High
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2019-11111
Description: Pointer corruption in the Unified Shader Compiler in Intel® Graphics Drivers before 10.18.14.5074 (aka 15.36.x.5074) may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.3 High
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2019-14574
Description: Out of bounds read in a subsystem for Intel® Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access.
CVSS Base Score: 6.5 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVEID: CVE-2019-14590
Description: Improper access control in the API for the Intel® Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable information disclosure via local access.
CVSS Base Score: 6.5 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVEID: CVE-2019-14591
Description: Improper input validation in the API for Intel® Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access.
CVSS Base Score: 6.5 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVEID: CVE-2019-11089
Description: Insufficient input validation in Kernel Mode module for Intel® Graphics Driver before version 25.20.100.6519 may allow an authenticated user to potentially enable denial of service via local access.
CVSS Base Score: 5.9 Medium
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H
CVEID: CVE-2019-11113
Description: Buffer overflow in Kernel Mode module for Intel® Graphics Driver before version 25.20.100.6618 (DCH) or 21.20.x.5077 (aka15.45.5077) may allow a privileged user to potentially enable information disclosure via local access.
CVSS Base Score: 4.0 Medium
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
6th, 7th, 8th, and 9th Gen Intel® Core™ processor family & 6th Gen Intel® Core™ processor family systems running Windows* 7 or Windows* 8.1 with Intel® Graphics Driver for Windows* before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077).
4th Generation Intel® Core™/ Pentium®/ Xeon® (E3 v3 only) Processors systems running Windows* 7 or Windows* 8.1 with Intel® Graphics Driver for Windows* before versions 10.18.14.5074 (aka 15.36.x.5074).
Intel recommends updating the Intel® Graphics Driver for Windows* and i915 Linux Driver to the latest version.
Windows* Driver updates are available for download at this location: <https://downloadcenter.intel.com/product/80939/Graphics-Drivers>
For i915 Linux Driver updates to mitigate CVE-2019-0155, contact your Linux OS Vendor.
Intel would like to thank Piotr Bania of Cisco TALOS (CVE-2019-14574),
SSD Secure Disclosure / Ori Nimron / @orinimron123 (CVE-2019-11112) and Rancho Han of Tencent Security ZhanluLab (CVE-2019-11111) for reporting these issues and working with us on coordinated disclosure.
The additional issues were found internally by Intel employees. Intel would like to thank Artem Shishkin, Edgar Barbosa, Gabriel Barbosa, Gustavo Scotti, Kekai Hu, Rodrigo Axel Monroy, and Rodrigo Branco.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.