Oracle Linux 6154 Published by

The following updates has been released for Oracle Linux 6:

ELBA-2019-2472 Oracle Linux 6 samba bug fix update
ELBA-2019-2475 Oracle Linux 6 rear bug fix update
ELSA-2019-2471 Moderate: Oracle Linux 6 openssl security update
ELSA-2019-2473 Important: Oracle Linux 6 kernel security and bug fix update



ELBA-2019-2472 Oracle Linux 6 samba bug fix update

Oracle Linux Bug Fix Advisory ELBA-2019-2472

http://linux.oracle.com/errata/ELBA-2019-2472.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
libsmbclient-3.6.23-52.0.1.el6_10.i686.rpm
libsmbclient-devel-3.6.23-52.0.1.el6_10.i686.rpm
samba-3.6.23-52.0.1.el6_10.i686.rpm
samba-client-3.6.23-52.0.1.el6_10.i686.rpm
samba-common-3.6.23-52.0.1.el6_10.i686.rpm
samba-doc-3.6.23-52.0.1.el6_10.i686.rpm
samba-domainjoin-gui-3.6.23-52.0.1.el6_10.i686.rpm
samba-swat-3.6.23-52.0.1.el6_10.i686.rpm
samba-winbind-3.6.23-52.0.1.el6_10.i686.rpm
samba-winbind-clients-3.6.23-52.0.1.el6_10.i686.rpm
samba-winbind-devel-3.6.23-52.0.1.el6_10.i686.rpm
samba-winbind-krb5-locator-3.6.23-52.0.1.el6_10.i686.rpm

x86_64:
libsmbclient-3.6.23-52.0.1.el6_10.i686.rpm
libsmbclient-3.6.23-52.0.1.el6_10.x86_64.rpm
libsmbclient-devel-3.6.23-52.0.1.el6_10.i686.rpm
libsmbclient-devel-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-client-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-common-3.6.23-52.0.1.el6_10.i686.rpm
samba-common-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-doc-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-domainjoin-gui-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-glusterfs-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-swat-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-winbind-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-winbind-clients-3.6.23-52.0.1.el6_10.i686.rpm
samba-winbind-clients-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-winbind-devel-3.6.23-52.0.1.el6_10.i686.rpm
samba-winbind-devel-3.6.23-52.0.1.el6_10.x86_64.rpm
samba-winbind-krb5-locator-3.6.23-52.0.1.el6_10.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/samba-3.6.23-52.0.1.el6_10.src.rpm



Description of changes:

[3.6.23-52.0.1]
- Remove use-after-free talloc_tos() inlined function problem (John
Haxby) [orabug 18253258]

[3.6.24-52]
- resolves: #1638774 - Fix winbind crash in wb_lookupsid_send()


ELBA-2019-2475 Oracle Linux 6 rear bug fix update

Oracle Linux Bug Fix Advisory ELBA-2019-2475

http://linux.oracle.com/errata/ELBA-2019-2475.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
rear-1.17.2-8.0.1.el6_10.i686.rpm

x86_64:
rear-1.17.2-8.0.1.el6_10.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/rear-1.17.2-8.0.1.el6_10.src.rpm



Description of changes:

[1.17.2-8.0.1]
- Change OS_VENDOR to OracleServer

[1.17.2-8]
- Apply upstream PR2034 (multipath optimizations for lots of devices)
Resolves: #1680484

ELSA-2019-2471 Moderate: Oracle Linux 6 openssl security update

Oracle Linux Security Advisory ELSA-2019-2471

http://linux.oracle.com/errata/ELSA-2019-2471.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
openssl-1.0.1e-58.0.1.el6_10.i686.rpm
openssl-devel-1.0.1e-58.0.1.el6_10.i686.rpm
openssl-perl-1.0.1e-58.0.1.el6_10.i686.rpm
openssl-static-1.0.1e-58.0.1.el6_10.i686.rpm

x86_64:
openssl-1.0.1e-58.0.1.el6_10.i686.rpm
openssl-1.0.1e-58.0.1.el6_10.x86_64.rpm
openssl-devel-1.0.1e-58.0.1.el6_10.i686.rpm
openssl-devel-1.0.1e-58.0.1.el6_10.x86_64.rpm
openssl-perl-1.0.1e-58.0.1.el6_10.x86_64.rpm
openssl-static-1.0.1e-58.0.1.el6_10.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/openssl-1.0.1e-58.0.1.el6_10.src.rpm



Description of changes:

[1.0.1e-58.0.1]
- Oracle bug 28730228: backport CVE-2018-0732
- Oracle bug 28758493: backport CVE-2018-0737
- Merge upstream patch to fix CVE-2018-0739
- Avoid out-of-bounds read. Fixes CVE 2017-3735. By Rich Salz
- sha256 is used for the RSA pairwise consistency test instead of sha1

[1.0.1e-58]
- fix CVE-2019-1559 - 0-byte record padding oracle

ELSA-2019-2473 Important: Oracle Linux 6 kernel security and bug fix update

Oracle Linux Security Advisory ELSA-2019-2473

http://linux.oracle.com/errata/ELSA-2019-2473.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
kernel-2.6.32-754.18.2.el6.i686.rpm
kernel-abi-whitelists-2.6.32-754.18.2.el6.noarch.rpm
kernel-debug-2.6.32-754.18.2.el6.i686.rpm
kernel-debug-devel-2.6.32-754.18.2.el6.i686.rpm
kernel-devel-2.6.32-754.18.2.el6.i686.rpm
kernel-doc-2.6.32-754.18.2.el6.noarch.rpm
kernel-firmware-2.6.32-754.18.2.el6.noarch.rpm
kernel-headers-2.6.32-754.18.2.el6.i686.rpm
perf-2.6.32-754.18.2.el6.i686.rpm
python-perf-2.6.32-754.18.2.el6.i686.rpm

x86_64:
kernel-2.6.32-754.18.2.el6.x86_64.rpm
kernel-abi-whitelists-2.6.32-754.18.2.el6.noarch.rpm
kernel-debug-2.6.32-754.18.2.el6.x86_64.rpm
kernel-debug-devel-2.6.32-754.18.2.el6.i686.rpm
kernel-debug-devel-2.6.32-754.18.2.el6.x86_64.rpm
kernel-devel-2.6.32-754.18.2.el6.x86_64.rpm
kernel-doc-2.6.32-754.18.2.el6.noarch.rpm
kernel-firmware-2.6.32-754.18.2.el6.noarch.rpm
kernel-headers-2.6.32-754.18.2.el6.x86_64.rpm
perf-2.6.32-754.18.2.el6.x86_64.rpm
python-perf-2.6.32-754.18.2.el6.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-2.6.32-754.18.2.el6.src.rpm



Description of changes:

[2.6.32-754.18.2.el6.OL6]
- Update genkey [bug 25599697]

[2.6.32-754.18.2.el6]
- [x86] x86/speculation: Enable Spectre v1 swapgs mitigations (Waiman
Long) [1724512] {CVE-2019-1125}
- [x86] x86/speculation: Prepare entry code for Spectre v1 swapgs
mitigations (Waiman Long) [1724512] {CVE-2019-1125}

[2.6.32-754.18.1.el6]
- [virt] xenbus: don't look up transaction IDs for ordinary writes
(Vitaly Kuznetsov) [1663262]
- [virt] xenbus: don't BUG() on user mode induced condition (Vitaly
Kuznetsov) [1663262]
- [virt] xenbus: Add proper handling of XS_ERROR from Xenbus for
transactions (Vitaly Kuznetsov) [1663262]
- [fs] proc: restrict kernel stack dumps to root (Denys Vlasenko)
[1638193] {CVE-2018-17972}
- [crypto] salsa20 - fix blkcipher_walk API usage (Bruno Eduardo de
Oliveira Meneguele) [1543984]
- [mm] vmscan: do not loop on too_many_isolated for ever (Rafael Aquini)
[1658254]
- [x86] spec_ctrl: Don't report the use of retpoline on Skylake as
vulnerable (Waiman Long) [1666102]
- [mm] try harder to allocate vmemmap blocks (Rafael Aquini) [1591394]
- [v4l] dvb: revert spectre v1 mitigation (Josh Poimboeuf) [1647975]
- [fs] binfmt_misc.c: do not allow offset overflow (Bill O'Donnell)
[1710149]
- [x86] pti: Don't use PCID and INVPCID in x86-32 (Waiman Long) [1702782]
- [mm] mincore.c: make mincore() more conservative (Rafael Aquini)
[1664197] {CVE-2019-5489}
- [x86] spec: Move retp_compiler() inline function to bugs.c (Waiman
Long) [1722185]