First published: Thu Nov 14 2019(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-abi-whitelists | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-debug | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-debug-devel | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-debuginfo | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-devel | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-doc | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-headers | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-tools | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-tools-libs | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/perf | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/perf-debuginfo | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/python-perf | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/python-perf-debuginfo | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-bootwrapper | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-debug | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-debug-devel | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-debuginfo | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-debuginfo-common-ppc64le | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-devel | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-headers | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-tools | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-tools-libs | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/perf | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/perf-debuginfo | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/python-perf | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
redhat/python-perf-debuginfo | <3.10.0-514.70.3.el7 | 3.10.0-514.70.3.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:3883 is categorized as moderate due to the potential for arbitrary kernel memory write vulnerabilities.
To fix RHSA-2019:3883, update the kernel package to version 3.10.0-514.70.3.el7 or later.
RHSA-2019:3883 addresses the CVE-2019-0155 vulnerability related to Intel GPU blitter manipulation.
RHSA-2019:3883 affects various systems running the kernel package versions prior to 3.10.0-514.70.3.el7.
You can verify the impact of RHSA-2019:3883 by checking your current kernel version and comparing it to the patched version.