Oracle Linux 6264 Published by

The following updates has been released for Oracle Linux 6 and 7:

ELSA-2018-0093 Important: Oracle Linux 6 microcode_ctl security update
ELSA-2018-0093 Important: Oracle Linux 7 microcode_ctl security update
ELSA-2018-0095 Important: Oracle Linux 6 java-1.8.0-openjdk security update
ELSA-2018-0095 Important: Oracle Linux 7 java-1.8.0-openjdk security update



ELSA-2018-0093 Important: Oracle Linux 6 microcode_ctl security update

Oracle Linux Security Advisory ELSA-2018-0093

http://linux.oracle.com/errata/ELSA-2018-0093.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
microcode_ctl-1.17-25.4.0.1.el6_9.i686.rpm

x86_64:
microcode_ctl-1.17-25.4.0.1.el6_9.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/microcode_ctl-1.17-25.4.0.1.el6_9.src.rpm



Description of changes:

[1:1.17-25.4.0.1]
- Enable early microcode load to allow updating Broadwell model 79
- Make sure "modprobe microcode" is not executed on Broadwell model 79
- Run dracut upon microcode update
- Add updated Intel 20180108 microcode for CPUIDs: {CVE-2017-5715}
306c3 (06-3c-03 rev 0x23, Haswell);
306d4 (06-3d-04 rev 0x28, Broadwell);
306f2 (06-3f-02 rev 0x3b, Haswell);
306f4 (06-3f-04 rev 0x10, Haswell);
306e4 (06-3e-04 rev 0x42a, Ivy Bridge);
40651 (06-45-01 rev 0x21, Haswell);
40661 (06-46-01 rev 0x18, Haswell);
40671 (06-47-01 rev 0x1b, Broadwell);
406e3 (06-4e-03 rev 0xc2, Skylake);
406f1 (06-4f-01 rev 0xb000025, Broadwell);
50654 (06-55-04 rev 0x200003c, Skylake);
50662 (06-56-02 rev 0x14, Broadwell);
50663 (06-56-03 rev 0x7000011, Broadwell);
506e3 (06-5e-03 rev 0xc2, Skylake);
706a1 (06-7a-01 rev 0x22);
806e9 (06-8e-09 rev 0x80, Kaby Lake);
806ea (06-8e-0a rev 0x80);
906e9 (06-9e-09 rev 0x80, Kaby Lake)
906ea (06-9e-0a rev 0x80);
906eb (06-9e-0b rev 0x80)

[1:1.17-25.4]
- Use right upstream source for revert
- Resolves: #1533978

[1:1.17-25.3]
- Revert Microcode from Intel and AMD for Side Channel attack
- Resolves: #1533978

ELSA-2018-0093 Important: Oracle Linux 7 microcode_ctl security update

Oracle Linux Security Advisory ELSA-2018-0093

http://linux.oracle.com/errata/ELSA-2018-0093.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

x86_64:
microcode_ctl-2.1-22.5.0.2.el7_4.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/microcode_ctl-2.1-22.5.0.2.el7_4.src.rpm



Description of changes:

[2.1-22.5.0.2]
- Add updated Intel 20180108 microcode for CPUIDs: {CVE-2017-5715}
306c3 (06-3c-03 rev 0x23, Haswell);
306d4 (06-3d-04 rev 0x28, Broadwell);
306f2 (06-3f-02 rev 0x3b, Haswell);
306f4 (06-3f-04 rev 0x10, Haswell);
306e4 (06-3e-04 rev 0x42a, Ivy Bridge);
40651 (06-45-01 rev 0x21, Haswell);
40661 (06-46-01 rev 0x18, Haswell);
40671 (06-47-01 rev 0x1b, Broadwell);
406e3 (06-4e-03 rev 0xc2, Skylake);
406f1 (06-4f-01 rev 0xb000025, Broadwell);
50654 (06-55-04 rev 0x200003c, Skylake);
50662 (06-56-02 rev 0x14, Broadwell);
50663 (06-56-03 rev 0x7000011, Broadwell);
506e3 (06-5e-03 rev 0xc2, Skylake);
706a1 (06-7a-01 rev 0x22);
806e9 (06-8e-09 rev 0x80, Kaby Lake);
806ea (06-8e-0a rev 0x80);
906e9 (06-9e-09 rev 0x80, Kaby Lake)
906ea (06-9e-0a rev 0x80);
906eb (06-9e-0b rev 0x80)

[2.1-22.5]
- Use right upstream source for revert
- Resolves: #1533971

[2.1-22.4]
- Revert Microcode from Intel for Side Channel attack
- Resolves: #1533971

[2.1-22.3]
- Don't run dracut if not on a live system
- Resolves: #1531453

ELSA-2018-0095 Important: Oracle Linux 6 java-1.8.0-openjdk security update

Oracle Linux Security Advisory ELSA-2018-0095

http://linux.oracle.com/errata/ELSA-2018-0095.html

The following updated rpms for Oracle Linux 6 have been uploaded to the
Unbreakable Linux Network:

i386:
java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.i686.rpm
java-1.8.0-openjdk-debug-1.8.0.161-3.b14.el6_9.i686.rpm
java-1.8.0-openjdk-demo-1.8.0.161-3.b14.el6_9.i686.rpm
java-1.8.0-openjdk-demo-debug-1.8.0.161-3.b14.el6_9.i686.rpm
java-1.8.0-openjdk-devel-1.8.0.161-3.b14.el6_9.i686.rpm
java-1.8.0-openjdk-devel-debug-1.8.0.161-3.b14.el6_9.i686.rpm
java-1.8.0-openjdk-headless-1.8.0.161-3.b14.el6_9.i686.rpm
java-1.8.0-openjdk-headless-debug-1.8.0.161-3.b14.el6_9.i686.rpm
java-1.8.0-openjdk-javadoc-1.8.0.161-3.b14.el6_9.noarch.rpm
java-1.8.0-openjdk-javadoc-debug-1.8.0.161-3.b14.el6_9.noarch.rpm
java-1.8.0-openjdk-src-1.8.0.161-3.b14.el6_9.i686.rpm
java-1.8.0-openjdk-src-debug-1.8.0.161-3.b14.el6_9.i686.rpm

x86_64:
java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.x86_64.rpm
java-1.8.0-openjdk-debug-1.8.0.161-3.b14.el6_9.x86_64.rpm
java-1.8.0-openjdk-demo-1.8.0.161-3.b14.el6_9.x86_64.rpm
java-1.8.0-openjdk-demo-debug-1.8.0.161-3.b14.el6_9.x86_64.rpm
java-1.8.0-openjdk-devel-1.8.0.161-3.b14.el6_9.x86_64.rpm
java-1.8.0-openjdk-devel-debug-1.8.0.161-3.b14.el6_9.x86_64.rpm
java-1.8.0-openjdk-headless-1.8.0.161-3.b14.el6_9.x86_64.rpm
java-1.8.0-openjdk-headless-debug-1.8.0.161-3.b14.el6_9.x86_64.rpm
java-1.8.0-openjdk-javadoc-1.8.0.161-3.b14.el6_9.noarch.rpm
java-1.8.0-openjdk-javadoc-debug-1.8.0.161-3.b14.el6_9.noarch.rpm
java-1.8.0-openjdk-src-1.8.0.161-3.b14.el6_9.x86_64.rpm
java-1.8.0-openjdk-src-debug-1.8.0.161-3.b14.el6_9.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/java-1.8.0-openjdk-1.8.0.161-3.b14.el6_9.src.rpm



Description of changes:

[1:1.8.0.161-3.b14]
- Update to b14 with updated Zero fix for 8174962 (S8194828)
- Resolves: rhbz#1528233

[1:1.8.0.161-2.b13]
- Update to b13 including Zero fix for 8174962 (S8194739) and restoring
tzdata2017c update
- Resolves: rhbz#1528233

[1:1.8.0.161-1.b12]
- Bump release due to successful build of previous version.
- Resolves: rhbz#1528233

[1:1.8.0.161-1.b12]
- Add new file cmsalpha.c to %{name}-remove-intree-libraries.sh
- Resolves: rhbz#1528233

[1:1.8.0.161-1.b12]
- Replace tarballs with version including AArch64 fix for 8174962 (S8194686)
- Resolves: rhbz#1528233

[1:1.8.0.161-1.b12]
- Drop pr3286-no_fp_contract.patch as flag no longer used on ppc64.
- Resolves: rhbz#1528233

[1:1.8.0.161-0.b12]
- Update to aarch64-jdk8u161-b12 and aarch64-shenandoah-jdk8u161-b12
(mbalao)
- Drop upstreamed patches of:
patch561 8075484-pr3473-rh1490713.patch
patch532 8162384-pr3122-rh1358661.patch
patch547 8173941-pr3326.patch
patch554 8175887-pr3415.patch
patch550 8180048-pr3411-rh1449870.patch
- adapted pr3286-no_fp_contract.patch, CFLAGS_linux_ppc64 no longer have
-ffp-contract=off so was dropped from hunk
- Resolves: rhbz#1528233

ELSA-2018-0095 Important: Oracle Linux 7 java-1.8.0-openjdk security update

Oracle Linux Security Advisory ELSA-2018-0095

http://linux.oracle.com/errata/ELSA-2018-0095.html

The following updated rpms for Oracle Linux 7 have been uploaded to the
Unbreakable Linux Network:

x86_64:
java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4.noarch.rpm
java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4.noarch.rpm
java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4.noarch.rpm
java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4.noarch.rpm
java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4.x86_64.rpm
java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4.i686.rpm
java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm



Description of changes:

[1:1.8.0.161-0.b14]
- Update to b14 with updated Zero fix for 8174962 (S8194828)
- Resolves: rhbz#1528233

[1:1.8.0.161-0.b13]
- Update to b13 including Zero fix for 8174962 (S8194739) and restoring
tzdata2017c update
- Resolves: rhbz#1528233

[1:1.8.0.161-0.b12]
- Add new file cmsalpha.c to %{name}-remove-intree-libraries.sh
- Resolves: rhbz#1528233

[1:1.8.0.161-0.b12]
- Replace tarballs with version including AArch64 fix for 8174962 (S8194686)
- Resolves: rhbz#1528233

[1:1.8.0.161-0.b12]
- Switch bootstrap back to java-1.7.0-openjdk on all architectures,
depending on RH1482244 fix
- Resolves: rhbz#1528233

[1:1.8.0.161-0.b12]
- Update to aarch64-jdk8u161-b12 and aarch64-shenandoah-jdk8u161-b12
(mbalao)
- Drop upstreamed patches for 8075484 (RH1490713), 8153711 (RH1284948),
8162384 (RH1358661), 8164293 (RH1459641), 8173941, 8175813 (RH1448880),
8175887 and 8180048 (RH1449870).(mbalao)
- Resolves: rhbz#1528233