First published: Thu Nov 14 2019(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-abi-whitelists | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debug | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debug-devel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-devel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-doc | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-headers | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools-libs | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/perf | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/perf-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/python-perf | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/python-perf-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debug | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debug-devel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debuginfo-common-s390x | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-devel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-headers | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-kdump | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-kdump-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-kdump-devel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/perf | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/perf-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/python-perf | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/python-perf-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-bootwrapper | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debuginfo-common-ppc64 | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools-libs | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-bootwrapper | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debug | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debug-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debug-devel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-debuginfo-common-ppc64le | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-devel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-headers | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools-libs | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/kernel-tools-libs-devel | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/perf | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/perf-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/python-perf | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
redhat/python-perf-debuginfo | <3.10.0-862.43.3.el7 | 3.10.0-862.43.3.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:3889 is classified as important due to the potential for arbitrary kernel memory write via Intel GPU blitter manipulation.
To fix RHSA-2019:3889, update your kernel to version 3.10.0-862.43.3.el7 or later.
RHSA-2019:3889 affects systems running the kernel package version prior to 3.10.0-862.43.3.el7 on Red Hat Enterprise Linux.
RHSA-2019:3889 addresses CVE-2019-0155, which allows for arbitrary kernel memory writes through manipulation of Intel GPU blitter.
Using the affected kernel versions is not safe, as it exposes your system to potential exploitation through CVE-2019-0155.