A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue commands to the GPU which could inadvertently lead to memory corruption and possibly privilege escalation. The attacker could use the GPU blitter to perform privilege MMIO operations not limited to the address space required to function correctly. This would expose the blitter to access kernel memory with a specially crafted request to the blitter. Affected hardware: - Ivy Bridge(Gen 7) and later, - Cherry Trail (Gen8) and newer mobile, desktop and embedded processors. - Intel Xeon E3-1200 v4 and later product families.
Mitigation: Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article( https://access.redhat.com/solutions/41278 ) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.
Statement: Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/i915-graphics
Acknowledgments: Name: Intel
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1771644]
External References: https://access.redhat.com/solutions/i915-graphics https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:3870 https://access.redhat.com/errata/RHSA-2019:3870
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:3871 https://access.redhat.com/errata/RHSA-2019:3871
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2019:3873 https://access.redhat.com/errata/RHSA-2019:3873
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-0155
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:3872 https://access.redhat.com/errata/RHSA-2019:3872
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2019:3877 https://access.redhat.com/errata/RHSA-2019:3877
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:3878 https://access.redhat.com/errata/RHSA-2019:3878
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Telco Extended Update Support Red Hat Enterprise Linux 7.3 Advanced Update Support Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions Via RHSA-2019:3883 https://access.redhat.com/errata/RHSA-2019:3883
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:3887 https://access.redhat.com/errata/RHSA-2019:3887
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2019:3889 https://access.redhat.com/errata/RHSA-2019:3889
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2019:3908 https://access.redhat.com/errata/RHSA-2019:3908
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:0204 https://access.redhat.com/errata/RHSA-2020:0204