Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction Required
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.00312.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Canonical
Subscribe
|
Ubuntu Linux
Subscribe
|
|
Netapp
Subscribe
|
Aff 8300
Subscribe
Aff 8300 Firmware
Subscribe
Aff 8700
Subscribe
Aff 8700 Firmware
Subscribe
Aff A220
Subscribe
Aff A220 Firmware
Subscribe
Aff A320
Subscribe
Aff A320 Firmware
Subscribe
Aff A400
Subscribe
Aff A400 Firmware
Subscribe
Aff A700s
Subscribe
Aff A700s Firmware
Subscribe
Aff C190
Subscribe
Aff C190 Firmware
Subscribe
Cloud Backup
Subscribe
Fas2720
Subscribe
Fas2720 Firmware
Subscribe
Fas2750
Subscribe
Fas2750 Firmware
Subscribe
Fas8300
Subscribe
Fas8300 Firmware
Subscribe
Fas8700
Subscribe
Fas8700 Firmware
Subscribe
Fas Baseboard Management Controller A220
Subscribe
Fas Baseboard Management Controller A220 Firmware
Subscribe
Fas Baseboard Management Controller A320
Subscribe
Fas Baseboard Management Controller A320 Firmware
Subscribe
Fas Baseboard Management Controller A400
Subscribe
Fas Baseboard Management Controller A400 Firmware
Subscribe
Fas Baseboard Management Controller A800
Subscribe
Fas Baseboard Management Controller A800 Firmware
Subscribe
Fas Baseboard Management Controller C190
Subscribe
Fas Baseboard Management Controller C190 Firmware
Subscribe
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410c
Subscribe
H410c Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H610c
Subscribe
H610c Firmware
Subscribe
H610s
Subscribe
H610s Firmware
Subscribe
H615c
Subscribe
H615c Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Solidfire \& Hci Management Node
Subscribe
Solidfire Baseboard Management Controller
Subscribe
Solidfire Baseboard Management Controller Firmware
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-29675 | The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacker could use this vulnerability to expose sensitive information. |
Ubuntu USN |
USN-4302-1 | Linux kernel vulnerabilities |
Solution
Update to linux kernel 4.15.0-91.92 or newer, or apply the following commits: (20ccd4d3f689ac14dce8632d76769be0ac952060) drm/i915: Use same test for eviction and submitting kernel context (1803fcbca2e444f7972430c4dc1c3e98c6ee1bc9) drm/i915: Define an engine class enum for the uABI (ae6c4574782dbfebcbf1f7e3620bcaf58ceb69e3) drm/i915: Force the switch to the i915->kernel_context (f58d13d5717938d4dfcc82a2eeba0a6d7644f6e5) drm/i915: Move GT powersaving init to i915_gem_init() (cc6a818ad6bdb0d3008314cbd0fc9c9a2cd02695) drm/i915: Move intel_init_clock_gating() to i915_gem_init() (d378a3efb819e6d1992127122d957337571b4594) drm/i915: Inline intel_modeset_gem_init() (f4e15af7e21861445821d5f09922ef7e695269a1) drm/i915: Mark the context state as dirty/written (d2b4b97933f5adacfba42dc3b9200d0e21fbe2c4) drm/i915: Record the default hw state after reset upon load
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-17T02:51:41.129Z
Reserved: 2020-02-10T00:00:00
Link: CVE-2020-8832
No data.
Status : Modified
Published: 2020-04-10T00:15:11.990
Modified: 2024-11-21T05:39:31.790
Link: CVE-2020-8832
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN