Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:3297 - Security Advisory
Issued:
2020-08-04
Updated:
2020-08-04

RHSA-2020:3297 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)
  • kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)
  • kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 1845840 - CVE-2020-10766 kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.
  • BZ - 1845867 - CVE-2020-10767 kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.
  • BZ - 1845868 - CVE-2020-10768 kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.

CVEs

  • CVE-2020-10766
  • CVE-2020-10767
  • CVE-2020-10768

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1

SRPM
kpatch-patch-4_18_0-147-1-16.el8.src.rpm SHA-256: b121f848a94de086f89c7ce12086d797e7a495ef5ab75616ce2315948c8a6aeb
kpatch-patch-4_18_0-147_0_2-1-12.el8.src.rpm SHA-256: 03a5acf8676502967e2e8af8c7084e0c66bae878f3eecab5e2cce0630ee2e02b
kpatch-patch-4_18_0-147_0_3-1-12.el8.src.rpm SHA-256: c48dcf6223b035716364dab93f977907f9a2c708086311d796513b236923a261
kpatch-patch-4_18_0-147_13_2-1-3.el8_1.src.rpm SHA-256: 9469cded44cf9f6f3f960135384e1f04930877baddf09b0d389165afe30a0175
kpatch-patch-4_18_0-147_20_1-1-2.el8_1.src.rpm SHA-256: f3ca166c1e9d201835c32aedb45030dc2528a27ed0f0c0b8d56627a9b2b86f18
kpatch-patch-4_18_0-147_3_1-1-12.el8_1.src.rpm SHA-256: 5ba9c298bb720d56ccfa56dae26b0447da995dca0979b02ec7b5a2a7e4679b18
kpatch-patch-4_18_0-147_5_1-1-7.el8_1.src.rpm SHA-256: 2c2ac0b98f1e719d917da617b033ef527d082094674a503d8ef32d70e860f32b
kpatch-patch-4_18_0-147_8_1-1-5.el8_1.src.rpm SHA-256: 52015b50f9865b67b6fc99875df880ef0fb05be8af19c53b2f879daa3d25e054
x86_64
kpatch-patch-4_18_0-147-1-16.el8.x86_64.rpm SHA-256: 03d9579859b83081422204e00dbd8c8221d56a4a7e8ecb27731bdb3e2e91c621
kpatch-patch-4_18_0-147-debuginfo-1-16.el8.x86_64.rpm SHA-256: ad5e0fc3fcfe5ee69d41c4bba16d9905da604d2bb28e08b34d23c0762e6e1f6b
kpatch-patch-4_18_0-147-debugsource-1-16.el8.x86_64.rpm SHA-256: c193f6caab5d40160b21c1feb8f0309f54877c1297e71fb7650eabf24ca6df28
kpatch-patch-4_18_0-147_0_2-1-12.el8.x86_64.rpm SHA-256: 1561f3ddbe5df515e0a3acb2220acdfb681437d0e00c5dc5f52877a3862183b9
kpatch-patch-4_18_0-147_0_2-debuginfo-1-12.el8.x86_64.rpm SHA-256: bb56ccacba6aeca5833ec7f2c3aa2a3a4ad9cfd9845519ef21de9350bcaec180
kpatch-patch-4_18_0-147_0_2-debugsource-1-12.el8.x86_64.rpm SHA-256: beae9b31ad23d8631cac2c0bf746de35735008930b8a125f53a40ce432941125
kpatch-patch-4_18_0-147_0_3-1-12.el8.x86_64.rpm SHA-256: c7f19fd1fbc32c37b7758f2837fb14255491d886119782d20532657a5f94e3d8
kpatch-patch-4_18_0-147_13_2-1-3.el8_1.x86_64.rpm SHA-256: 96a992c38d8ec60e8f5ebac07bd64edb4bbb1a0ac95248299903ff9fc8820f27
kpatch-patch-4_18_0-147_13_2-debuginfo-1-3.el8_1.x86_64.rpm SHA-256: 366426390d523a73cffa93afe4986a0a55e544768fe41dad252ba38705d8da1c
kpatch-patch-4_18_0-147_13_2-debugsource-1-3.el8_1.x86_64.rpm SHA-256: eb9d587b80302e615fb27d722696627accca3a8668c0373e6a56251fc6bd7b54
kpatch-patch-4_18_0-147_20_1-1-2.el8_1.x86_64.rpm SHA-256: 2b687f7d5961e3f4d02f0a929ae788c23cac997e78c2ad9c47ac55238b57b198
kpatch-patch-4_18_0-147_20_1-debuginfo-1-2.el8_1.x86_64.rpm SHA-256: da4fc8a323a1639ea48d150dcb2a36f168535e589e463971683d76e26c03555c
kpatch-patch-4_18_0-147_20_1-debugsource-1-2.el8_1.x86_64.rpm SHA-256: cb4e82e7ecc11779de8781f7c67d8c54bd5a5099603feea63aca0065db10c613
kpatch-patch-4_18_0-147_3_1-1-12.el8_1.x86_64.rpm SHA-256: 856ccef51780c9768deb258f40c85308359786cf536f396c847be3c0da3f2389
kpatch-patch-4_18_0-147_5_1-1-7.el8_1.x86_64.rpm SHA-256: d55dfa207e3e7d6aa8626ec5748a4adb7cadf33f7f524a8e57481524e55bcb48
kpatch-patch-4_18_0-147_8_1-1-5.el8_1.x86_64.rpm SHA-256: 5094960454d41410050e8737d934183f2628d58ab098f0acdeb9b412d197d1ff

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1

SRPM
kpatch-patch-4_18_0-147-1-16.el8.src.rpm SHA-256: b121f848a94de086f89c7ce12086d797e7a495ef5ab75616ce2315948c8a6aeb
kpatch-patch-4_18_0-147_0_2-1-12.el8.src.rpm SHA-256: 03a5acf8676502967e2e8af8c7084e0c66bae878f3eecab5e2cce0630ee2e02b
kpatch-patch-4_18_0-147_0_3-1-12.el8.src.rpm SHA-256: c48dcf6223b035716364dab93f977907f9a2c708086311d796513b236923a261
kpatch-patch-4_18_0-147_13_2-1-3.el8_1.src.rpm SHA-256: 9469cded44cf9f6f3f960135384e1f04930877baddf09b0d389165afe30a0175
kpatch-patch-4_18_0-147_20_1-1-2.el8_1.src.rpm SHA-256: f3ca166c1e9d201835c32aedb45030dc2528a27ed0f0c0b8d56627a9b2b86f18
kpatch-patch-4_18_0-147_3_1-1-12.el8_1.src.rpm SHA-256: 5ba9c298bb720d56ccfa56dae26b0447da995dca0979b02ec7b5a2a7e4679b18
kpatch-patch-4_18_0-147_5_1-1-7.el8_1.src.rpm SHA-256: 2c2ac0b98f1e719d917da617b033ef527d082094674a503d8ef32d70e860f32b
kpatch-patch-4_18_0-147_8_1-1-5.el8_1.src.rpm SHA-256: 52015b50f9865b67b6fc99875df880ef0fb05be8af19c53b2f879daa3d25e054
ppc64le

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM
kpatch-patch-4_18_0-147-1-16.el8.src.rpm SHA-256: b121f848a94de086f89c7ce12086d797e7a495ef5ab75616ce2315948c8a6aeb
kpatch-patch-4_18_0-147_0_2-1-12.el8.src.rpm SHA-256: 03a5acf8676502967e2e8af8c7084e0c66bae878f3eecab5e2cce0630ee2e02b
kpatch-patch-4_18_0-147_0_3-1-12.el8.src.rpm SHA-256: c48dcf6223b035716364dab93f977907f9a2c708086311d796513b236923a261
kpatch-patch-4_18_0-147_13_2-1-3.el8_1.src.rpm SHA-256: 9469cded44cf9f6f3f960135384e1f04930877baddf09b0d389165afe30a0175
kpatch-patch-4_18_0-147_20_1-1-2.el8_1.src.rpm SHA-256: f3ca166c1e9d201835c32aedb45030dc2528a27ed0f0c0b8d56627a9b2b86f18
kpatch-patch-4_18_0-147_3_1-1-12.el8_1.src.rpm SHA-256: 5ba9c298bb720d56ccfa56dae26b0447da995dca0979b02ec7b5a2a7e4679b18
kpatch-patch-4_18_0-147_5_1-1-7.el8_1.src.rpm SHA-256: 2c2ac0b98f1e719d917da617b033ef527d082094674a503d8ef32d70e860f32b
kpatch-patch-4_18_0-147_8_1-1-5.el8_1.src.rpm SHA-256: 52015b50f9865b67b6fc99875df880ef0fb05be8af19c53b2f879daa3d25e054
ppc64le

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM
kpatch-patch-4_18_0-147-1-16.el8.src.rpm SHA-256: b121f848a94de086f89c7ce12086d797e7a495ef5ab75616ce2315948c8a6aeb
kpatch-patch-4_18_0-147_0_2-1-12.el8.src.rpm SHA-256: 03a5acf8676502967e2e8af8c7084e0c66bae878f3eecab5e2cce0630ee2e02b
kpatch-patch-4_18_0-147_0_3-1-12.el8.src.rpm SHA-256: c48dcf6223b035716364dab93f977907f9a2c708086311d796513b236923a261
kpatch-patch-4_18_0-147_13_2-1-3.el8_1.src.rpm SHA-256: 9469cded44cf9f6f3f960135384e1f04930877baddf09b0d389165afe30a0175
kpatch-patch-4_18_0-147_20_1-1-2.el8_1.src.rpm SHA-256: f3ca166c1e9d201835c32aedb45030dc2528a27ed0f0c0b8d56627a9b2b86f18
kpatch-patch-4_18_0-147_3_1-1-12.el8_1.src.rpm SHA-256: 5ba9c298bb720d56ccfa56dae26b0447da995dca0979b02ec7b5a2a7e4679b18
kpatch-patch-4_18_0-147_5_1-1-7.el8_1.src.rpm SHA-256: 2c2ac0b98f1e719d917da617b033ef527d082094674a503d8ef32d70e860f32b
kpatch-patch-4_18_0-147_8_1-1-5.el8_1.src.rpm SHA-256: 52015b50f9865b67b6fc99875df880ef0fb05be8af19c53b2f879daa3d25e054
x86_64
kpatch-patch-4_18_0-147-1-16.el8.x86_64.rpm SHA-256: 03d9579859b83081422204e00dbd8c8221d56a4a7e8ecb27731bdb3e2e91c621
kpatch-patch-4_18_0-147-debuginfo-1-16.el8.x86_64.rpm SHA-256: ad5e0fc3fcfe5ee69d41c4bba16d9905da604d2bb28e08b34d23c0762e6e1f6b
kpatch-patch-4_18_0-147-debugsource-1-16.el8.x86_64.rpm SHA-256: c193f6caab5d40160b21c1feb8f0309f54877c1297e71fb7650eabf24ca6df28
kpatch-patch-4_18_0-147_0_2-1-12.el8.x86_64.rpm SHA-256: 1561f3ddbe5df515e0a3acb2220acdfb681437d0e00c5dc5f52877a3862183b9
kpatch-patch-4_18_0-147_0_2-debuginfo-1-12.el8.x86_64.rpm SHA-256: bb56ccacba6aeca5833ec7f2c3aa2a3a4ad9cfd9845519ef21de9350bcaec180
kpatch-patch-4_18_0-147_0_2-debugsource-1-12.el8.x86_64.rpm SHA-256: beae9b31ad23d8631cac2c0bf746de35735008930b8a125f53a40ce432941125
kpatch-patch-4_18_0-147_0_3-1-12.el8.x86_64.rpm SHA-256: c7f19fd1fbc32c37b7758f2837fb14255491d886119782d20532657a5f94e3d8
kpatch-patch-4_18_0-147_13_2-1-3.el8_1.x86_64.rpm SHA-256: 96a992c38d8ec60e8f5ebac07bd64edb4bbb1a0ac95248299903ff9fc8820f27
kpatch-patch-4_18_0-147_13_2-debuginfo-1-3.el8_1.x86_64.rpm SHA-256: 366426390d523a73cffa93afe4986a0a55e544768fe41dad252ba38705d8da1c
kpatch-patch-4_18_0-147_13_2-debugsource-1-3.el8_1.x86_64.rpm SHA-256: eb9d587b80302e615fb27d722696627accca3a8668c0373e6a56251fc6bd7b54
kpatch-patch-4_18_0-147_20_1-1-2.el8_1.x86_64.rpm SHA-256: 2b687f7d5961e3f4d02f0a929ae788c23cac997e78c2ad9c47ac55238b57b198
kpatch-patch-4_18_0-147_20_1-debuginfo-1-2.el8_1.x86_64.rpm SHA-256: da4fc8a323a1639ea48d150dcb2a36f168535e589e463971683d76e26c03555c
kpatch-patch-4_18_0-147_20_1-debugsource-1-2.el8_1.x86_64.rpm SHA-256: cb4e82e7ecc11779de8781f7c67d8c54bd5a5099603feea63aca0065db10c613
kpatch-patch-4_18_0-147_3_1-1-12.el8_1.x86_64.rpm SHA-256: 856ccef51780c9768deb258f40c85308359786cf536f396c847be3c0da3f2389
kpatch-patch-4_18_0-147_5_1-1-7.el8_1.x86_64.rpm SHA-256: d55dfa207e3e7d6aa8626ec5748a4adb7cadf33f7f524a8e57481524e55bcb48
kpatch-patch-4_18_0-147_8_1-1-5.el8_1.x86_64.rpm SHA-256: 5094960454d41410050e8737d934183f2628d58ab098f0acdeb9b412d197d1ff

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility