vulnerability
Red Hat OpenShift: CVE-2019-0155: hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Nov 14, 2019 | Dec 29, 2020 | Apr 11, 2025 |
Description
Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
Solution
References
- CVE-2019-0155
- https://attackerkb.com/topics/CVE-2019-0155
- REDHAT-RHSA-2019:3841
- REDHAT-RHSA-2019:3870
- REDHAT-RHSA-2019:3871
- REDHAT-RHSA-2019:3872
- REDHAT-RHSA-2019:3873
- REDHAT-RHSA-2019:3877
- REDHAT-RHSA-2019:3878
- REDHAT-RHSA-2019:3883
- REDHAT-RHSA-2019:3887
- REDHAT-RHSA-2019:3889
- REDHAT-RHSA-2019:3908
- REDHAT-RHSA-2020:0204

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.