CVE-2019-0155
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/11/2019
Last modified:
07/11/2023
Description
Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:* | 26.20.100.6813 (excluding) | |
cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:extreme:*:*:* | ||
cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:extreme:*:*:* | ||
cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://access.redhat.com/errata/RHSA-2019:3841
- https://access.redhat.com/errata/RHSA-2019:3887
- https://access.redhat.com/errata/RHSA-2019:3889
- https://access.redhat.com/errata/RHSA-2019:3908
- https://access.redhat.com/errata/RHSA-2020:0204
- https://seclists.org/bugtraq/2019/Nov/26
- https://security.netapp.com/advisory/ntap-20200320-0005/
- https://support.f5.com/csp/article/K73659122?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4186-2/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html