A flaw was found in the Linux kernelās implementation of GVT-g which allowed an attacker with access to a āpassed throughā Intel i915 graphics card to possibly access resources allocated to other virtual machines, crash the host, or possibly corrupt memory leading to privilege escalation.