Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2019-11089

Published: 14 November 2019

Insufficient input validation in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6519 may allow an authenticated user to potentially enable denial of service via local access.

Notes

AuthorNote
mdeslaur
windows driver

Priority

High

Cvss 3 Severity Score

5.5

Score breakdown

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Not vulnerable
(windows driver)
eoan Not vulnerable
(windows driver)
trusty Not vulnerable
(windows driver)
upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-aws
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Not vulnerable
(windows driver)
eoan Not vulnerable
(windows driver)
trusty Not vulnerable
(windows driver)
upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-aws-5.0
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Does not exist

linux-aws-hwe
Launchpad, Ubuntu, Debian
bionic Does not exist

disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-azure
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Not vulnerable
(windows driver)
eoan Not vulnerable
(windows driver)
trusty Not vulnerable
(windows driver)
upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-azure-5.3
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Does not exist

linux-azure-edge
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-gcp
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Not vulnerable
(windows driver)
eoan Not vulnerable
(windows driver)
trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-gcp-5.3
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Does not exist

linux-gcp-edge
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Does not exist

linux-gke-4.15
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Does not exist

linux-gke-5.0
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Does not exist

linux-hwe
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-hwe-edge
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-kvm
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Not vulnerable
(windows driver)
eoan Not vulnerable
(windows driver)
trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-lts-trusty
Launchpad, Ubuntu, Debian
bionic Does not exist

disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Does not exist

linux-lts-xenial
Launchpad, Ubuntu, Debian
bionic Does not exist

disco Does not exist

eoan Does not exist

trusty Not vulnerable
(windows driver)
upstream Not vulnerable
(windows driver)
xenial Does not exist

linux-oem
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Not vulnerable
(windows driver)
eoan Not vulnerable
(windows driver)
trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-oem-osp1
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Not vulnerable
(windows driver)
eoan Not vulnerable
(windows driver)
trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Does not exist

linux-oracle
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Not vulnerable
(windows driver)
eoan Not vulnerable
(windows driver)
trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-oracle-5.0
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Does not exist

eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Does not exist

linux-raspi2
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Not vulnerable
(windows driver)
eoan Not vulnerable
(windows driver)
trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)
linux-snapdragon
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(windows driver)
disco Not vulnerable
(windows driver)
eoan Does not exist

trusty Does not exist

upstream Not vulnerable
(windows driver)
xenial Not vulnerable
(windows driver)

Severity score breakdown

Parameter Value
Base score 5.5
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H