Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:0862 - Security Advisory
Issued:
2021-03-16
Updated:
2021-03-16

RHSA-2021:0862 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)
  • kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le

Fixes

  • BZ - 1899804 - CVE-2020-28374 kernel: SCSI target (LIO) write to any block on ILO backstore
  • BZ - 1906525 - CVE-2020-29661 kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free

CVEs

  • CVE-2020-28374
  • CVE-2020-29661

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
kpatch-patch-3_10_0-1160-1-3.el7.src.rpm SHA-256: 90470ca1afed1bdef8fbd08204f01b05f7427d07f0dbb3cd45c00c4281ea18dc
kpatch-patch-3_10_0-1160_11_1-1-2.el7.src.rpm SHA-256: 981c15999ee76f5d074b7100f0a51adbf536801b0b600d7cb804e382fad84517
kpatch-patch-3_10_0-1160_15_2-1-2.el7.src.rpm SHA-256: 95053ed7ce313349aef27bc085e3f67beec0b75b19b3b94d8dd0346bae554adf
kpatch-patch-3_10_0-1160_2_1-1-3.el7.src.rpm SHA-256: 0a096f083ddecec7addad9f549091dba80512f4066cbf32bb04634a68b754a7a
kpatch-patch-3_10_0-1160_2_2-1-3.el7.src.rpm SHA-256: d7003b6c8e962ae0761f8f11b6e8a3fb30465ccd5b525edac38d14c0a632de60
kpatch-patch-3_10_0-1160_6_1-1-3.el7.src.rpm SHA-256: ada87810a4ba8161004442566c78b396c5b66f6fea999968a158aa31ae2e0cfa
x86_64
kpatch-patch-3_10_0-1160-1-3.el7.x86_64.rpm SHA-256: 3ebb915c1bc55a58436faf038c45e8c2dc9969f3cbff8b628e2d02a44464d8a8
kpatch-patch-3_10_0-1160-debuginfo-1-3.el7.x86_64.rpm SHA-256: 37556d3ffe4c42df2fa76a87c038b89a085f5774aa8c314b05ba749b51e5f6ba
kpatch-patch-3_10_0-1160_11_1-1-2.el7.x86_64.rpm SHA-256: b6888806d2e3b3767cc2daf371c55cfb95630ef4e5d18c612a74031c4eec9399
kpatch-patch-3_10_0-1160_11_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: d70635112da2bac03ba389098e58b0f35ea8460d0fab694b281e9ae14862053e
kpatch-patch-3_10_0-1160_15_2-1-2.el7.x86_64.rpm SHA-256: 40dccef3a8cc3c5ed53f390178a273ae6e65d761fdddd13c694712dab9655db9
kpatch-patch-3_10_0-1160_15_2-debuginfo-1-2.el7.x86_64.rpm SHA-256: c98f397d5cd5b9ced255f908b32988c495ef68eb3d4acb62ae42865f67cdacc0
kpatch-patch-3_10_0-1160_2_1-1-3.el7.x86_64.rpm SHA-256: 97948ce8b6e1daed0cb012af3c95c30ad0c89c9447b55ca071d5e786cbd18e59
kpatch-patch-3_10_0-1160_2_1-debuginfo-1-3.el7.x86_64.rpm SHA-256: ff9ab31466942b7f98d130cfa8735822795959327c0671d4a7d1714150e910a1
kpatch-patch-3_10_0-1160_2_2-1-3.el7.x86_64.rpm SHA-256: e35f37844d76f05ab679cb69f37c425593ab128811c24a419bcb346d666b6e28
kpatch-patch-3_10_0-1160_2_2-debuginfo-1-3.el7.x86_64.rpm SHA-256: 801cf7fd2ff19cd5747c48c4f8e086c8fe6181489062cf54de7867aae288112b
kpatch-patch-3_10_0-1160_6_1-1-3.el7.x86_64.rpm SHA-256: 039261011424440f786b36682eb96e43860962a1f978cde9e38aea78c8535a1e
kpatch-patch-3_10_0-1160_6_1-debuginfo-1-3.el7.x86_64.rpm SHA-256: 70f2c970d4cd9b0a18d2b0bcf55f952a31597063926293b74e5b5efa563745fa

Red Hat Enterprise Linux Server - Extended Life Cycle Support 7

SRPM
kpatch-patch-3_10_0-1160-1-3.el7.src.rpm SHA-256: 90470ca1afed1bdef8fbd08204f01b05f7427d07f0dbb3cd45c00c4281ea18dc
kpatch-patch-3_10_0-1160_11_1-1-2.el7.src.rpm SHA-256: 981c15999ee76f5d074b7100f0a51adbf536801b0b600d7cb804e382fad84517
kpatch-patch-3_10_0-1160_15_2-1-2.el7.src.rpm SHA-256: 95053ed7ce313349aef27bc085e3f67beec0b75b19b3b94d8dd0346bae554adf
kpatch-patch-3_10_0-1160_2_1-1-3.el7.src.rpm SHA-256: 0a096f083ddecec7addad9f549091dba80512f4066cbf32bb04634a68b754a7a
kpatch-patch-3_10_0-1160_2_2-1-3.el7.src.rpm SHA-256: d7003b6c8e962ae0761f8f11b6e8a3fb30465ccd5b525edac38d14c0a632de60
kpatch-patch-3_10_0-1160_6_1-1-3.el7.src.rpm SHA-256: ada87810a4ba8161004442566c78b396c5b66f6fea999968a158aa31ae2e0cfa
x86_64
kpatch-patch-3_10_0-1160-1-3.el7.x86_64.rpm SHA-256: 3ebb915c1bc55a58436faf038c45e8c2dc9969f3cbff8b628e2d02a44464d8a8
kpatch-patch-3_10_0-1160-debuginfo-1-3.el7.x86_64.rpm SHA-256: 37556d3ffe4c42df2fa76a87c038b89a085f5774aa8c314b05ba749b51e5f6ba
kpatch-patch-3_10_0-1160_11_1-1-2.el7.x86_64.rpm SHA-256: b6888806d2e3b3767cc2daf371c55cfb95630ef4e5d18c612a74031c4eec9399
kpatch-patch-3_10_0-1160_11_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: d70635112da2bac03ba389098e58b0f35ea8460d0fab694b281e9ae14862053e
kpatch-patch-3_10_0-1160_15_2-1-2.el7.x86_64.rpm SHA-256: 40dccef3a8cc3c5ed53f390178a273ae6e65d761fdddd13c694712dab9655db9
kpatch-patch-3_10_0-1160_15_2-debuginfo-1-2.el7.x86_64.rpm SHA-256: c98f397d5cd5b9ced255f908b32988c495ef68eb3d4acb62ae42865f67cdacc0
kpatch-patch-3_10_0-1160_2_1-1-3.el7.x86_64.rpm SHA-256: 97948ce8b6e1daed0cb012af3c95c30ad0c89c9447b55ca071d5e786cbd18e59
kpatch-patch-3_10_0-1160_2_1-debuginfo-1-3.el7.x86_64.rpm SHA-256: ff9ab31466942b7f98d130cfa8735822795959327c0671d4a7d1714150e910a1
kpatch-patch-3_10_0-1160_2_2-1-3.el7.x86_64.rpm SHA-256: e35f37844d76f05ab679cb69f37c425593ab128811c24a419bcb346d666b6e28
kpatch-patch-3_10_0-1160_2_2-debuginfo-1-3.el7.x86_64.rpm SHA-256: 801cf7fd2ff19cd5747c48c4f8e086c8fe6181489062cf54de7867aae288112b
kpatch-patch-3_10_0-1160_6_1-1-3.el7.x86_64.rpm SHA-256: 039261011424440f786b36682eb96e43860962a1f978cde9e38aea78c8535a1e
kpatch-patch-3_10_0-1160_6_1-debuginfo-1-3.el7.x86_64.rpm SHA-256: 70f2c970d4cd9b0a18d2b0bcf55f952a31597063926293b74e5b5efa563745fa

Red Hat Enterprise Linux for Power, little endian 7

SRPM
kpatch-patch-3_10_0-1160-1-3.el7.src.rpm SHA-256: 90470ca1afed1bdef8fbd08204f01b05f7427d07f0dbb3cd45c00c4281ea18dc
kpatch-patch-3_10_0-1160_11_1-1-2.el7.src.rpm SHA-256: 981c15999ee76f5d074b7100f0a51adbf536801b0b600d7cb804e382fad84517
kpatch-patch-3_10_0-1160_15_2-1-2.el7.src.rpm SHA-256: 95053ed7ce313349aef27bc085e3f67beec0b75b19b3b94d8dd0346bae554adf
kpatch-patch-3_10_0-1160_2_1-1-3.el7.src.rpm SHA-256: 0a096f083ddecec7addad9f549091dba80512f4066cbf32bb04634a68b754a7a
kpatch-patch-3_10_0-1160_2_2-1-3.el7.src.rpm SHA-256: d7003b6c8e962ae0761f8f11b6e8a3fb30465ccd5b525edac38d14c0a632de60
kpatch-patch-3_10_0-1160_6_1-1-3.el7.src.rpm SHA-256: ada87810a4ba8161004442566c78b396c5b66f6fea999968a158aa31ae2e0cfa
ppc64le
kpatch-patch-3_10_0-1160-1-3.el7.ppc64le.rpm SHA-256: a3fc390e77d4120b431fc608afedd5f0eaf8b1c34fa720e30dd5af4692e48c49
kpatch-patch-3_10_0-1160-debuginfo-1-3.el7.ppc64le.rpm SHA-256: 4c8eeee239ecd30c94f4facd27b0a17a1e9442eb23a753f8d9af930bf17320d0
kpatch-patch-3_10_0-1160_11_1-1-2.el7.ppc64le.rpm SHA-256: 2a9c8e45ab6a7427e972f37ba65258c425ec1527676f170d9b07f0ba95149d07
kpatch-patch-3_10_0-1160_11_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: 14e53a1b438507b0f515750ce8609c6a47afdd761ffcf4bd59a15a66f4870272
kpatch-patch-3_10_0-1160_15_2-1-2.el7.ppc64le.rpm SHA-256: e11e97f74aff8679cffd57caf2d71ed452fe1e67cfc21c2ed7a736f44cbc4338
kpatch-patch-3_10_0-1160_15_2-debuginfo-1-2.el7.ppc64le.rpm SHA-256: d41b27ab467c8e50926425eb3e920112fb8a2700c4bc50faf6fd045348d380df
kpatch-patch-3_10_0-1160_2_1-1-3.el7.ppc64le.rpm SHA-256: d549e83ce8021aedeecef5b9ab91b0076b0989f5c320aff7f7ec11e474674f54
kpatch-patch-3_10_0-1160_2_1-debuginfo-1-3.el7.ppc64le.rpm SHA-256: 3bac72fc64af45a2aac11b6176545a46078d8f740a8c953973218852c4448622
kpatch-patch-3_10_0-1160_2_2-1-3.el7.ppc64le.rpm SHA-256: 075cf2bcdae12d3b4376199f8eebc7b3f9f15c492f9785a3d6757e97b7ccd500
kpatch-patch-3_10_0-1160_2_2-debuginfo-1-3.el7.ppc64le.rpm SHA-256: d4ee20a6ac7d9343df9df11b74f8206317a56985fb2baf61eb214e169ea18783
kpatch-patch-3_10_0-1160_6_1-1-3.el7.ppc64le.rpm SHA-256: aff7a2854feaf5c76d9875dfb39181cf77116826a1964b4b09eee055b3a0adb1
kpatch-patch-3_10_0-1160_6_1-debuginfo-1-3.el7.ppc64le.rpm SHA-256: 5d4f340f8701891b0460446dc7333750134c144c1c567068c1930c8f5ffe4328

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7

SRPM
kpatch-patch-3_10_0-1160-1-3.el7.src.rpm SHA-256: 90470ca1afed1bdef8fbd08204f01b05f7427d07f0dbb3cd45c00c4281ea18dc
kpatch-patch-3_10_0-1160_11_1-1-2.el7.src.rpm SHA-256: 981c15999ee76f5d074b7100f0a51adbf536801b0b600d7cb804e382fad84517
kpatch-patch-3_10_0-1160_15_2-1-2.el7.src.rpm SHA-256: 95053ed7ce313349aef27bc085e3f67beec0b75b19b3b94d8dd0346bae554adf
kpatch-patch-3_10_0-1160_2_1-1-3.el7.src.rpm SHA-256: 0a096f083ddecec7addad9f549091dba80512f4066cbf32bb04634a68b754a7a
kpatch-patch-3_10_0-1160_2_2-1-3.el7.src.rpm SHA-256: d7003b6c8e962ae0761f8f11b6e8a3fb30465ccd5b525edac38d14c0a632de60
kpatch-patch-3_10_0-1160_6_1-1-3.el7.src.rpm SHA-256: ada87810a4ba8161004442566c78b396c5b66f6fea999968a158aa31ae2e0cfa
ppc64le
kpatch-patch-3_10_0-1160-1-3.el7.ppc64le.rpm SHA-256: a3fc390e77d4120b431fc608afedd5f0eaf8b1c34fa720e30dd5af4692e48c49
kpatch-patch-3_10_0-1160-debuginfo-1-3.el7.ppc64le.rpm SHA-256: 4c8eeee239ecd30c94f4facd27b0a17a1e9442eb23a753f8d9af930bf17320d0
kpatch-patch-3_10_0-1160_11_1-1-2.el7.ppc64le.rpm SHA-256: 2a9c8e45ab6a7427e972f37ba65258c425ec1527676f170d9b07f0ba95149d07
kpatch-patch-3_10_0-1160_11_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: 14e53a1b438507b0f515750ce8609c6a47afdd761ffcf4bd59a15a66f4870272
kpatch-patch-3_10_0-1160_15_2-1-2.el7.ppc64le.rpm SHA-256: e11e97f74aff8679cffd57caf2d71ed452fe1e67cfc21c2ed7a736f44cbc4338
kpatch-patch-3_10_0-1160_15_2-debuginfo-1-2.el7.ppc64le.rpm SHA-256: d41b27ab467c8e50926425eb3e920112fb8a2700c4bc50faf6fd045348d380df
kpatch-patch-3_10_0-1160_2_1-1-3.el7.ppc64le.rpm SHA-256: d549e83ce8021aedeecef5b9ab91b0076b0989f5c320aff7f7ec11e474674f54
kpatch-patch-3_10_0-1160_2_1-debuginfo-1-3.el7.ppc64le.rpm SHA-256: 3bac72fc64af45a2aac11b6176545a46078d8f740a8c953973218852c4448622
kpatch-patch-3_10_0-1160_2_2-1-3.el7.ppc64le.rpm SHA-256: 075cf2bcdae12d3b4376199f8eebc7b3f9f15c492f9785a3d6757e97b7ccd500
kpatch-patch-3_10_0-1160_2_2-debuginfo-1-3.el7.ppc64le.rpm SHA-256: d4ee20a6ac7d9343df9df11b74f8206317a56985fb2baf61eb214e169ea18783
kpatch-patch-3_10_0-1160_6_1-1-3.el7.ppc64le.rpm SHA-256: aff7a2854feaf5c76d9875dfb39181cf77116826a1964b4b09eee055b3a0adb1
kpatch-patch-3_10_0-1160_6_1-debuginfo-1-3.el7.ppc64le.rpm SHA-256: 5d4f340f8701891b0460446dc7333750134c144c1c567068c1930c8f5ffe4328

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility