Intel Linux Graphics Driver Affected By Privilege Escalation Vulnerability
Intel today published 38 new security advisories in their first Patch Tuesday roundabout since February. Among the new disclosures today are CVE-2023-28410 as an i915 Linux kernel graphics driver vulnerability that could lead to local privilege escalation.
Intel's new security advisories today are mostly software-related ranging from their RISC-V Pathfinder to NUC software to QAT drivers. Of the 38, the only one to really catch my attention was CVE-2023-28410. This is a CVSS 8.8 "High" score for a potential security vulnerability within the Linux i915 kernel driver that with local access could lead to escalation of privileges. The problem stems from an improper restriction of operations within the bounds of a memory buffer.
Fortunately, the issue has been fixed upstream since Linux 6.2.10 when it was quietly resolved. So upgrade past that point if you are making use of Intel Linux graphics and concerned about local users potentially gaining elevated privileges.
The other new security advisories today from Intel can be found via the Intel Security Center.
Intel's new security advisories today are mostly software-related ranging from their RISC-V Pathfinder to NUC software to QAT drivers. Of the 38, the only one to really catch my attention was CVE-2023-28410. This is a CVSS 8.8 "High" score for a potential security vulnerability within the Linux i915 kernel driver that with local access could lead to escalation of privileges. The problem stems from an improper restriction of operations within the bounds of a memory buffer.
Fortunately, the issue has been fixed upstream since Linux 6.2.10 when it was quietly resolved. So upgrade past that point if you are making use of Intel Linux graphics and concerned about local users potentially gaining elevated privileges.
The other new security advisories today from Intel can be found via the Intel Security Center.
12 Comments