Oracle Linux 6162 Published by

The following updates has been released for Oracle Linux 6:

ELBA-2018-0513 Oracle Linux 6 gcc bug fix update
ELSA-2018-0512 Important: Oracle Linux 6 kernel security and bug fix update



ELBA-2018-0513 Oracle Linux 6 gcc bug fix update

Oracle Linux Bug Fix Advisory ELBA-2018-0513

http://linux.oracle.com/errata/ELBA-2018-0513.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
cpp-4.4.7-18.0.7.el6_9.2.i686.rpm
gcc-4.4.7-18.0.7.el6_9.2.i686.rpm
gcc-c++-4.4.7-18.0.7.el6_9.2.i686.rpm
gcc-gfortran-4.4.7-18.0.7.el6_9.2.i686.rpm
gcc-gnat-4.4.7-18.0.7.el6_9.2.i686.rpm
gcc-java-4.4.7-18.0.7.el6_9.2.i686.rpm
gcc-objc++-4.4.7-18.0.7.el6_9.2.i686.rpm
gcc-objc-4.4.7-18.0.7.el6_9.2.i686.rpm
libgcc-4.4.7-18.0.7.el6_9.2.i686.rpm
libgcj-4.4.7-18.0.7.el6_9.2.i686.rpm
libgcj-devel-4.4.7-18.0.7.el6_9.2.i686.rpm
libgcj-src-4.4.7-18.0.7.el6_9.2.i686.rpm
libgfortran-4.4.7-18.0.7.el6_9.2.i686.rpm
libgnat-4.4.7-18.0.7.el6_9.2.i686.rpm
libgnat-devel-4.4.7-18.0.7.el6_9.2.i686.rpm
libgomp-4.4.7-18.0.7.el6_9.2.i686.rpm
libmudflap-4.4.7-18.0.7.el6_9.2.i686.rpm
libmudflap-devel-4.4.7-18.0.7.el6_9.2.i686.rpm
libobjc-4.4.7-18.0.7.el6_9.2.i686.rpm
libstdc++-4.4.7-18.0.7.el6_9.2.i686.rpm
libstdc++-devel-4.4.7-18.0.7.el6_9.2.i686.rpm
libstdc++-docs-4.4.7-18.0.7.el6_9.2.i686.rpm

x86_64:
cpp-4.4.7-18.0.7.el6_9.2.x86_64.rpm
gcc-4.4.7-18.0.7.el6_9.2.x86_64.rpm
gcc-c++-4.4.7-18.0.7.el6_9.2.x86_64.rpm
gcc-gfortran-4.4.7-18.0.7.el6_9.2.x86_64.rpm
gcc-gnat-4.4.7-18.0.7.el6_9.2.x86_64.rpm
gcc-java-4.4.7-18.0.7.el6_9.2.x86_64.rpm
gcc-objc++-4.4.7-18.0.7.el6_9.2.x86_64.rpm
gcc-objc-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libgcc-4.4.7-18.0.7.el6_9.2.i686.rpm
libgcc-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libgcj-4.4.7-18.0.7.el6_9.2.i686.rpm
libgcj-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libgcj-devel-4.4.7-18.0.7.el6_9.2.i686.rpm
libgcj-devel-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libgcj-src-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libgfortran-4.4.7-18.0.7.el6_9.2.i686.rpm
libgfortran-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libgnat-4.4.7-18.0.7.el6_9.2.i686.rpm
libgnat-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libgnat-devel-4.4.7-18.0.7.el6_9.2.i686.rpm
libgnat-devel-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libgomp-4.4.7-18.0.7.el6_9.2.i686.rpm
libgomp-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libmudflap-4.4.7-18.0.7.el6_9.2.i686.rpm
libmudflap-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libmudflap-devel-4.4.7-18.0.7.el6_9.2.i686.rpm
libmudflap-devel-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libobjc-4.4.7-18.0.7.el6_9.2.i686.rpm
libobjc-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libstdc++-4.4.7-18.0.7.el6_9.2.i686.rpm
libstdc++-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libstdc++-devel-4.4.7-18.0.7.el6_9.2.i686.rpm
libstdc++-devel-4.4.7-18.0.7.el6_9.2.x86_64.rpm
libstdc++-docs-4.4.7-18.0.7.el6_9.2.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/gcc-4.4.7-18.0.7.el6_9.2.src.rpm



Description of changes:

[4.4.7-18.0.7.2]
- [Orabug: 27557686] (Egeyar Bagcioglu)
Introduce 'oracle_release' into .spec file. Echo it to gcc/DEV-PHASE.
- [Orabug: 27539947] (Egeyar Bagcioglu)
- The partial backport in the revision 159308 in redhat/gcc-4_4-branch is
causing the above orabug. Revert the patch to be fully backported
later.(Egeyar Bagcioglu)
- The test case for pr18134 is failing on 4.4.7-18.0.1. However, it is a
false
positive. The revision 159308 of vanilla redhat release had caused a
change
of format in the out of this test case. The test case was modified to
accept
the new format by revision 159479. To complement the previous
reversion of
revision 159308, this patch is reverting revision 159479.

[4.4.7-18.2]
- Fix indirect_jump/tablejump patters for retpolines (#1535656)

[4.4.7-18.1]
- Retpoline support (#1535656)

ELSA-2018-0512 Important: Oracle Linux 6 kernel security and bug fix update

Oracle Linux Security Advisory ELSA-2018-0512

http://linux.oracle.com/errata/ELSA-2018-0512.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
kernel-2.6.32-696.23.1.el6.i686.rpm
kernel-abi-whitelists-2.6.32-696.23.1.el6.noarch.rpm
kernel-debug-2.6.32-696.23.1.el6.i686.rpm
kernel-debug-devel-2.6.32-696.23.1.el6.i686.rpm
kernel-devel-2.6.32-696.23.1.el6.i686.rpm
kernel-doc-2.6.32-696.23.1.el6.noarch.rpm
kernel-firmware-2.6.32-696.23.1.el6.noarch.rpm
kernel-headers-2.6.32-696.23.1.el6.i686.rpm
perf-2.6.32-696.23.1.el6.i686.rpm
python-perf-2.6.32-696.23.1.el6.i686.rpm

x86_64:
kernel-2.6.32-696.23.1.el6.x86_64.rpm
kernel-abi-whitelists-2.6.32-696.23.1.el6.noarch.rpm
kernel-debug-2.6.32-696.23.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-696.23.1.el6.i686.rpm
kernel-debug-devel-2.6.32-696.23.1.el6.x86_64.rpm
kernel-devel-2.6.32-696.23.1.el6.x86_64.rpm
kernel-doc-2.6.32-696.23.1.el6.noarch.rpm
kernel-firmware-2.6.32-696.23.1.el6.noarch.rpm
kernel-headers-2.6.32-696.23.1.el6.x86_64.rpm
perf-2.6.32-696.23.1.el6.x86_64.rpm
python-perf-2.6.32-696.23.1.el6.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-2.6.32-696.23.1.el6.src.rpm



Description of changes:

[2.6.32-696.23.1.el6.OL6]
- Update genkey [bug 25599697]

[2.6.32-696.23.1.el6]
- [scsi] avoid a permanent stop of the scsi device's request queue (Ewan
Milne) [1519857 1513455]
- [x86] retpoline/hyperv: Convert assembler indirect jumps (Waiman Long)
[1543022 1535645]
- [x86] spec_ctrl: Upgrade GCC retpoline warning to an error for brew
builds (Waiman Long) [1543022 1535645]
- [x86] retpoline: Don't use kernel indirect thunks in vsyscalls (Waiman
Long) [1543022 1535645]
- [x86] spec_ctrl: Add a read-only retp_enabled debugfs knob (Waiman
Long) [1543022 1535645]
- [x86] spec_ctrl: detect unretpolined modules (Waiman Long) [1543022
1535645]
- [x86] retpoline/ACPI: Convert indirect jump in wakeup code (Waiman
Long) [1543022 1535645]
- [x86] retpoline/efi: Convert stub indirect calls & jumps (Waiman Long)
[1543022 1535645]
- [watchdog] hpwdt: remove indirect call in drivers/watchdog/hpwdt.c
(Waiman Long) [1543022 1535645]
- [x86] spec_ctrl: cleanup __ptrace_may_access (Waiman Long) [1543022
1535645]
- [x86] bugs: Drop one "mitigation" from dmesg (Waiman Long) [1543022
1535645]
- [x86] spec_ctrl: fix ptrace IBPB optimization (Waiman Long) [1543022
1535645]
- [x86] spec_ctrl: Avoid returns in IBRS-disabled regions (Waiman Long)
[1543022 1535645]
- [x86] spectre/meltdown: avoid the vulnerability directory to weaken
kernel security (Waiman Long) [1543022 1535645]
- [x86] spec_ctrl: Update spec_ctrl.txt and kernel-parameters.txt
(Waiman Long) [1543022 1535645]
- [x86] Use IBRS for firmware update path (Waiman Long) [1543022 1535645]
- [x86] spec_ctrl: stuff RSB on context switch with SMEP enabled (Waiman
Long) [1543022 1535645]
- [x86] spec_ctrl: use upstream RSB stuffing function (Waiman Long)
[1543022 1535645]
- [x86] spec_ctrl: add ibrs_enabled=3 (ibrs_user) (Waiman Long) [1543022
1535645]
- [x86] spec_ctrl: Integrate IBRS with retpoline (Waiman Long) [1543022
1535645]
- [x86] spec_ctrl: print features changed by microcode loading (Waiman
Long) [1543022 1535645]
- [x86] spec_ctrl: refactor the init and microcode loading paths (Waiman
Long) [1543022 1535645]
- [x86] spec_ctrl: move initialization of X86_FEATURE_IBPB_SUPPORT
(Waiman Long) [1543022 1535645]
- [x86] spec_ctrl: remove SPEC_CTRL_PCP_IBPB bit (Waiman Long) [1543022
1535645]
- [x86] spec_ctrl: remove ibrs_enabled variable (Waiman Long) [1543022
1535645]
- [x86] spec_ctrl: add ibp_disabled variable (Waiman Long) [1543022 1535645]
- [x86] spec_ctrl: add X86_FEATURE_IBP_DISABLE (Waiman Long) [1543022
1535645]
- [x86] spec_ctrl: remove IBP disable for AMD model 0x16 (Waiman Long)
[1543022 1535645]
- [x86] spec_ctrl: remove performance measurements from documentation
(Waiman Long) [1543022 1535645]
- [x86] spec_ctrl: make ipbp_enabled read-only (Waiman Long) [1543022
1535645]
- [x86] spec_ctrl: remove ibpb_enabled=2 mode (Waiman Long) [1543022
1535645]
- [x86] spec_ctrl: Enable spec_ctrl functions for x86-32 (Waiman Long)
[1543022 1535645]
- [x86] spec_ctrl: move vmexit rmb in the last branch before IBRS
(Waiman Long) [1543022 1535645]
- [x86] spec_ctrl: satisfy the barrier like semantics of IBRS (Waiman
Long) [1543022 1535645]
- [x86] spectre_v1: Mark it as mitigated (Waiman Long) [1543022 1535645]
- [x86] pti: Do not enable PTI on CPUs which are not vulnerable to
Meltdown (Waiman Long) [1543022 1535645]
- [x86] mce: Make machine check speculation protected (Waiman Long)
[1543022 1535645]
- [x86] retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
(Waiman Long) [1543022 1535645]
- [x86] retpoline: Fill return stack buffer on vmexit (Waiman Long)
[1543022 1535645]
- [x86] retpoline/irq32: Convert assembler indirect jumps (Waiman Long)
[1543022 1535645]
- [x86] retpoline/checksum32: Convert assembler indirect jumps (Waiman
Long) [1543022 1535645]
- [x86] retpoline/entry: Convert entry assembler indirect (Waiman Long)
[1543022 1535645]
- [x86] retpoline/crypto: Convert crypto assembler indirect jumps
(Waiman Long) [1543022 1535645]
- [x86] spectre: Add boot time option to select Spectre v2 mitigation
(Waiman Long) [1543022 1535645]
- [x86] retpoline: Add initial retpoline support (Waiman Long) [1543022
1535645]
- [x86] cpu: Implement CPU vulnerabilites sysfs functions (Waiman Long)
[1543022 1535645]
- [base] sysfs/cpu: Add vulnerability folder (Waiman Long) [1543022 1535645]
- [x86] cpufeatures: Add X86_BUG_SPECTRE_V[12] (Waiman Long) [1543022
1535645]
- [x86] pti: Add the pti= cmdline option and documentation (Waiman Long)
[1543022 1535645]
- [x86] cpufeatures: Add X86_BUG_CPU_MELTDOWN (Waiman Long) [1543022
1535645]
- [x86] pti: Rename CONFIG_KAISER to CONFIG_PAGE_TABLE_ISOLATION (Waiman
Long) [1543022 1535645]
- [x86] cpu: Expand cpufeature facility to include cpu bugs (Waiman
Long) [1543022 1535645]
- [x86] cpu: Merge bugs.c and bugs_64.c (Waiman Long) [1543022 1535645]
- [x86] cpu/intel: Introduce macros for Intel family numbers (Waiman
Long) [1543022 1535645]
- [x86] alternatives: Add missing '\n' at end of ALTERNATIVE inline asm
(Waiman Long) [1543022 1535645]
- [x86] alternatives: Fix alt_max_short macro to really be a max()
(Waiman Long) [1543022 1535645]
- [x86] asm: Make asm/alternative.h safe from assembly (Waiman Long)
[1543022 1535645]
- [x86] alternatives: Document macros (Waiman Long) [1543022 1535645]
- [x86] alternatives: Fix ALTERNATIVE_2 padding generation properly
(Waiman Long) [1543022 1535645]
- [x86] alternatives: Add instruction padding (Waiman Long) [1543022
1535645]
(Waiman Long) [1543022 1535645]
- [x86] alternative: Use .pushsection/.popsection (Waiman Long) [1543022
1535645]
- [x86] copy_user_generic: Optimize copy_user_generic with CPU erms
feature (Waiman Long) [1543022 1535645]
- [x86] Make .altinstructions bit size neutral (Waiman Long) [1543022
1535645]
- [x86] pti: Rework the trampoline stack switching code (Waiman Long)
[1543022 1535645]
- [x86] pti: Disable interrupt before trampoline stack switching (Waiman
Long) [1543022 1535645]

[2.6.32-696.22.1.el6]
- [mm] add cpu_relax() to "dont return 0 too early" patch (Ian Kent)
[1527811 988988]
- [mm] don't return 0 too early from find_get_pages() (Ian Kent)
[1527811 988988]
- [crypto] cryptd: Add cryptd_max_cpu_qlen module parameter (Jon
Maxwell) [1527802 1503322]
- [powerpc] spinlock: add gmb memory barrier (Mauricio Oliveira)
[1531720 1538543]
- [powerpc] Prevent Meltdown attack with L1-D$ flush (Mauricio Oliveira)
[1531720 1538543]
- [s390] vtime: turn BP on when going idle (Hendrik Brueckner) [1532733
1538542]
- [s390] cpuinfo: show facilities as reported by stfle (Hendrik
Brueckner) [1532733 1538542]
- [s390] kconfigs: turn off SHARED_KERNEL support for s390 (Hendrik
Brueckner) [1532733 1538542]
- [s390] add ppa to system call and program check path (Hendrik
Brueckner) [1532733 1538542]
- [s390] spinlock: add gmb memory barrier (Hendrik Brueckner) [1532733
1538542]
- [s390] introduce CPU alternatives (Hendrik Brueckner) [1532733 1538542]

[2.6.32-696.21.1.el6]
- [fs] sunrpc: Revert "sunrpc: always treat the invalid cache as
unexpired" (Thiago Becker) [1535938 1532786]