A flaw was found in the Linux kernelโs implementation of GVT-g which allowed an attacker with access to a โpassed throughโ Intel i915 graphics card to possibly access resources allocated to other virtual machines, crash the host, or possibly corrupt memory leading to privilege escalation.