First published: Wed Feb 17 2021(Updated: )
Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.31.1.rt56.1169.el7 | 0:3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel | <0:3.10.0-1160.31.1.el7 | 0:3.10.0-1160.31.1.el7 |
redhat/kernel-rt | <0:4.18.0-305.rt7.72.el8 | 0:4.18.0-305.rt7.72.el8 |
redhat/kernel | <0:4.18.0-305.el8 | 0:4.18.0-305.el8 |
redhat/linux-firmware | <0:20201218-102.git05789708.el8 | 0:20201218-102.git05789708.el8 |
Intel Graphics Drivers for Windows | <26.20.100.7212 | |
Intel Graphics Drivers for Windows | <26.20.100.7212 | |
Linux kernel | <5.5 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-12364 has a severity rating that indicates it may lead to a denial of service for privileged users.
To fix CVE-2020-12364, update your Intel Graphics Drivers for Windows to version 26.20.100.7212 or later, or apply the relevant kernel updates for Red Hat Enterprise Linux.
CVE-2020-12364 affects Intel Graphics Drivers for Windows prior to version 26.20.100.7212.
CVE-2020-12364 impacts certain versions of Intel Graphics Drivers for Windows and specific kernel versions on Red Hat-based systems.
CVE-2020-12364 requires local access to exploit, thereby limiting the scope of potential attack.