7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
kernel is vulnerable to privilege escalation. A local attacker with the ability to issue commands to the GPU could inadvertently lead to memory corruption and possible privilege escalation due to a flaw in the Intel graphics hardware (GPU). The attacker could use the GPU blitter to perform privilege MMIO operations, not limited to the address space required to function correctly.
packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
access.redhat.com/errata/RHSA-2019:3841
access.redhat.com/errata/RHSA-2019:3871
access.redhat.com/errata/RHSA-2019:3887
access.redhat.com/errata/RHSA-2019:3889
access.redhat.com/errata/RHSA-2019:3908
access.redhat.com/errata/RHSA-2020:0204
access.redhat.com/security/updates/classification/#important
access.redhat.com/solutions/i915-graphics
seclists.org/bugtraq/2019/Nov/26
security.netapp.com/advisory/ntap-20200320-0005/
support.f5.com/csp/article/K73659122?utm_source=f5support&utm_medium=RSS
usn.ubuntu.com/4186-2/
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C