RHEL minor version update from version # 6.9 to 6.10
Last week, almost 2 months after initially announced, Red Hat has released 6.10 version of RHEL OS.
As mentioned by Red Hat: ... Red Hat Enterprise Linux 6.10 marks the transition from the Maintenance Support 1 lifecycle phase to the Maintenance Support 2 phase. In order to help provide customers with a stable environment for the remainder of the Red Hat Enterprise Linux 6 lifecycle, only critical security fixes and business-impacting urgent issues have been addressed. Examples include the addition of retpoline-based mitigations for the Spectre/Meltdown vulnerabilities, an updated GNU Compiler Collection (GCC) ...
Red Hat defines the "Maintenance Support 2 Phase" as "... Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available. Other errata advisories may be delivered as appropriate. New functionality and new hardware enablement are not planned for availability in the Maintenance Support 2 Phase. Minor releases with updated installation images may be made available in this Phase. ..."
This means that it is about the time to upgrade to RHEL v7.x, but about this some other time.
In short, on VMware hypervisor, we are running RHEL guest systems with Oracle databases (and other products).
We've implemented provided updates on our systems and no issues were experienced.
We do all updates on non-prod systems first and, once when confirmed to be working / no issues experienced, we implement them in to production systems.
Procedure
Here is our procedure:
- Stop running services (/etc/init.d/[custom service control script] stop)
- RHEL update (yum -y update)
Check if some of the config files (/etc/*.rpmnew) were changed. In our case none were changed.
- Ensure that Oracle service is down and relink all Oracle products/homes ($ORACLE_HOME/bin/relink all)
Check alert and relink logs.
- Update VMware tools (./vmware-install.pl -d default)
NOTE: the latest available is VMware Tools version 10.2.5 (2018-03-29)
- Reboot
Check dmesg, /var/log/boot.log, /var/log/messages for problems.
- Review os and applications logs for errors/warnings/failures/exceptions
- Test your custom services
The OS patching itself takes ~10 mins. We allocate 1 (up to 2) hours for the 1st upgrade. This depends very much on how detailed are your review of logs and procedure for testing of services.
This time there were no suprises and everything has worked w/o problems.
References
Red Hat
- Red Hat Enterprise Linux 6.10 Beta now available, URL: https://www.redhat.com/en/blog/red-hat-enterprise-linux-610-beta-now-available
25-Apr-2018
- Red Hat Drives Mission-Critical Stability with Latest Update to Red Hat Enterprise Linux 6, URL: https://www.redhat.com/en/about/press-releases/red-hat-drives-mission-critical-stability-latest-update-red-hat-enterprise-linux-6
- Red Hat Enterprise Linux Release Dates, URL: https://access.redhat.com/articles/3078
- Product Documentation for Red Hat Enterprise Linux 6, URL: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/
- Red Hat Enterprise Linux Life Cycle, URL: https://access.redhat.com/support/policy/updates/errata
- Red Hat Enterprise Linux - Top Support Policies, URL: https://access.redhat.com/articles/rhel-top-support-policies
- Red Hat Software Collections Product Life Cycle, URL: https://access.redhat.com/support/policy/updates/rhscl
Oracle
- Is It Necessary To Relink Oracle Following OS Upgrade? [ID 444595.1]
- How to Relink Oracle Database Software on UNIX [ID 131321.1]
VMware
- URL: https://my.vmware.com
N: Quick Links > All downloads > All products > Datacenter & Cloud Infrastructure > VMware vSphere with Operations Management > Drivers and Tools > VMware Tools > VMware Tools # > Go to downloads
Changes
Security Fixes
* [Security Advisory] RHSA-2018:1883 Low: samba4 security and bug fix update; URL: https://access.redhat.com/errata/RHSA-2018:1883
CVEs
- CVE-2018-1050 : Score & Metrics : 4.3 / CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
NOTE: Due to the low CVSS3 score, we've prioritized this one to be resolved within a month.
* [Security Advisory] RHSA-2018:1854 Important: kernel security and bug fix update; URL: https://access.redhat.com/errata/RHSA-2018:1854
CVEs
- CVE-2017-2671 : Score & Metrics : 7.8 / CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (https://www.redhat.com/security/data/cve/CVE-2017-2671.html)
- CVE-2017-7889 : Score & Metrics : 7.8 / CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (https://access.redhat.com/security/cve/cve-2017-7889)
- CVE-2017-6001 : Score & Metrics : 7 / CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H (https://access.redhat.com/security/cve/cve-2017-6001)
- CVE-2017-7308 : Score & Metrics : 7 / CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H (https://access.redhat.com/security/cve/cve-2017-7308)
- CVE-2017-8890 : Score & Metrics : 6.5 / CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H (https://access.redhat.com/security/cve/cve-2017-8890)
- CVE-2017-9075 : Score & Metrics : 6.5 / CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H (https://access.redhat.com/security/cve/cve-2017-9075)
- CVE-2017-9076 : Score & Metrics : 6.5 / CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H (https://access.redhat.com/security/cve/cve-2017-9076)
- CVE-2017-9077 : Score & Metrics : 6.5 / CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H (https://access.redhat.com/security/cve/cve-2017-9077)
- CVE-2017-12190 : Score & Metrics : 6.2 / CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H (https://access.redhat.com/security/cve/cve-2017-12190)
- CVE-2018-3639 : Score & Metrics : 5.6 / CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N (https://access.redhat.com/security/cve/cve-2018-3639)
- CVE-2017-7616 : Score & Metrics : 5.5 / CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N (https://access.redhat.com/security/cve/cve-2017-7616)
- CVE-2017-15121 : Score & Metrics : 5.5 / CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (https://access.redhat.com/security/cve/cve-2017-15121)
- CVE-2018-1130 : Score & Metrics : 5.5 / CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (https://access.redhat.com/security/cve/cve-2018-1130)
- CVE-2018-5803 : Score & Metrics : 5.5 / CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (https://access.redhat.com/security/cve/cve-2018-5803)
- CVE-2015-8830 : Score & Metrics : 4.9 / AV:L/AC:L/Au:N/C:N/I:N/A:C (https://www.redhat.com/security/data/cve/CVE-2015-8830.html)
- CVE-2016-8650 : Score & Metrics : 4.9 / AV:L/AC:L/Au:N/C:N/I:N/A:C (https://www.redhat.com/security/data/cve/CVE-2016-8650.html)
- CVE-2017-18203 : Score & Metrics : 4.7 / CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H (https://access.redhat.com/security/cve/cve-2017-18203)
- CVE-2012-6701 : Score & Metrics : 3.6 / AV:L/AC:L/Au:N/C:P/I:P/A:N (https://www.redhat.com/security/data/cve/CVE-2012-6701.html)
NOTE: Due to the high CVSS3 score (7.8), we've prioritized this one to be resolved within 2 weeks.
Bugs
- [Bug Fix Advisory] RHBA-2018:1871 selinux-policy bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1871
- [Bug Fix Advisory] RHBA-2018:1856 redhat-release-server bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1856
- [Bug Fix Advisory] RHBA-2018:1887 microcode_ctl bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1887
- [Bug Fix Advisory] RHBA-2018:1855 nfs-utils bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1855
- [Bug Fix Advisory] RHBA-2018:1872 sg3_utils bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1872
- [Bug Fix Advisory] RHBA-2018:1873 jasper bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1873
- [Bug Fix Advisory] RHBA-2018:1868 gnutls bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1868
- [Bug Fix Advisory] RHBA-2018:1878 rhn-client-tools bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1878
- [Bug Fix Advisory] RHBA-2018:1867 iproute bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1867
- [Bug Fix Advisory] RHBA-2018:1889 man-pages-overrides bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1889
- [Bug Fix Advisory] RHBA-2018:1875 cups bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1875
- [Bug Fix Advisory] RHBA-2018:1881 ORBit2 bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1881
- [Bug Fix Advisory] RHBA-2018:1874 gcc bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1874
- [Bug Fix Advisory] RHBA-2018:1888 gdm bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1888
- [Bug Fix Advisory] RHBA-2018:1876 libtirpc bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1876
- [Bug Fix Advisory] RHBA-2018:1864 systemtap bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1864
- [Bug Fix Advisory] RHBA-2018:1866 bind bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1866
- [Bug Fix Advisory] RHBA-2018:1891 httpd bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1891
- [Bug Fix Advisory] RHBA-2018:1884 dhcp bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1884
- [Bug Fix Advisory] RHBA-2018:1892 abrt bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1892
- [Bug Fix Advisory] RHBA-2018:1893 device-mapper-multipath bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1893
- [Bug Fix Advisory] RHBA-2018:1896 irqbalance bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1896
- [Bug Fix Advisory] RHBA-2018:1858 binutils bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1858
- [Bug Fix Advisory] RHBA-2018:1895 kexec-tools bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1895
- [Bug Fix Advisory] RHBA-2018:1901 rpcbind bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1901
- [Bug Fix Advisory] RHBA-2018:1903 upstart bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1903
- [Bug Fix Advisory] RHBA-2018:1898 glib2 bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1898
- [Bug Fix Advisory] RHBA-2018:1859 iptables bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1859
- [Bug Fix Advisory] RHBA-2018:1911 hwdata bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1911
- [Bug Fix Advisory] RHBA-2018:1899 xorg-x11-server, xorg-x11-drv-ati, and xorg-x11-drv-mga bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1899
- [Bug Fix Advisory] RHBA-2018:1915 virt-who bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1915
- [Bug Fix Advisory] RHBA-2018:1910 dracut bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1910
- [Bug Fix Advisory] RHBA-2018:1917 autofs bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1917
- [Bug Fix Advisory] RHBA-2018:1909 rpm bug fix and enhancement update; URL: https://access.redhat.com/errata/RHBA-2018:1909
- [Bug Fix Advisory] RHBA-2018:1908 initscripts bug fix and enhancement update; URL: https://access.redhat.com/errata/RHBA-2018:1908
- [Bug Fix Advisory] RHBA-2018:1913 device-mapper-persistent-data bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1913
- [Bug Fix Advisory] RHBA-2018:1904 libnih bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1904
- [Bug Fix Advisory] RHBA-2018:1914 yum-utils bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1914
- [Bug Fix Advisory] RHBA-2018:1905 gmp bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1905
- [Bug Fix Advisory] RHBA-2018:1916 subscription-manager bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1916
- [Bug Fix Advisory] RHBA-2018:1862 coreutils bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1862
- [Bug Fix Advisory] RHBA-2018:1931 createrepo bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1931
- [Bug Fix Advisory] RHBA-2018:1861 libcgroup bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1861
- [Bug Fix Advisory] RHBA-2018:1925 python-dmidecode bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1925
- [Bug Fix Advisory] RHBA-2018:1920 sos bug fix and enhancement update; URL: https://access.redhat.com/errata/RHBA-2018:1920
- [Bug Fix Advisory] RHBA-2018:1924 java-1.7.0-openjdk enhancement update; URL: https://access.redhat.com/errata/RHBA-2018:1924
- [Bug Fix Advisory] RHBA-2018:1921 e2fsprogs bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1921
- [Bug Fix Advisory] RHBA-2018:1863 rsyslog bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1863
- [Bug Fix Advisory] RHBA-2018:1928 dbus bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1928
- [Bug Fix Advisory] RHBA-2018:1930 crash bug fix update; URL: https://access.redhat.com/errata/RHBA-2018:1930
- [Bug Fix Advisory] RHBA-2018:1938 Red Hat Enterprise Linux 6.10 Init Container Image Update; URL: https://access.redhat.com/errata/RHBA-2018:1938
- [Bug Fix Advisory] RHBA-2018:1937 Red Hat Enterprise
Linux 6.10 Container Image Update; URL: https://access.redhat.com/errata/RHBA-2018:1937
Enhancements
- [Enhancement Advisory] RHEA-2018:1865 nspr, nss, and nss-util bug fix update; URL: https://access.redhat.com/errata/RHEA-2018:1865
- [Enhancement Advisory] RHEA-2018:1922 ca-certificates bug fix update; URL: https://access.redhat.com/errata/RHEA-2018:1922
- [Enhancement Advisory] RHEA-2018:1934 microcode_ctl bug fix and enhancement update; URL: https://access.redhat.com/errata/RHEA-2018:1934
Changes packages
Removed:
kernel.x86_64 0:2.6.32-696.23.1.el6 kernel-devel.x86_64 0:2.6.32-696.23.1.el6
Installed:
kernel.x86_64 0:2.6.32-754.el6
kernel-devel.x86_64 0:2.6.32-754.el6
subscription-manager-rhsm.x86_64 0:1.20.10-7.el6
subscription-manager-rhsm-certificates.x86_64 0:1.20.10-7.el6
Dependency Installed:
copy-jdk-configs.noarch 0:3.3-9.el6
Updated:
ORBit2.x86_64 0:2.14.17-7.el6
abrt.x86_64 0:2.0.8-44.el6
abrt-addon-ccpp.x86_64 0:2.0.8-44.el6
abrt-addon-kerneloops.x86_64 0:2.0.8-44.el6
abrt-addon-python.x86_64 0:2.0.8-44.el6
abrt-cli.x86_64 0:2.0.8-44.el6
abrt-libs.x86_64 0:2.0.8-44.el6
abrt-python.x86_64 0:2.0.8-44.el6
abrt-tui.x86_64 0:2.0.8-44.el6
autofs.x86_64 1:5.0.5-139.el6
bind-libs.x86_64 32:9.8.2-0.68.rc1.el6
bind-utils.x86_64 32:9.8.2-0.68.rc1.el6
binutils.x86_64 0:2.20.51.0.2-5.48.el6
ca-certificates.noarch 0:2018.2.22-65.1.el6
coreutils.x86_64 0:8.4-47.el6
coreutils-libs.x86_64 0:8.4-47.el6
cpp.x86_64 0:4.4.7-23.el6
crash.x86_64 0:7.1.0-8.el6
createrepo.noarch 0:0.9.9-28.el6
cups.x86_64 1:1.4.2-79.el6
cups-libs.x86_64 1:1.4.2-79.el6
dbus.x86_64 1:1.2.24-9.el6
dbus-libs.x86_64 1:1.2.24-9.el6
dbus-x11.x86_64 1:1.2.24-9.el6
device-mapper-multipath.x86_64 0:0.4.9-106.el6
device-mapper-multipath-libs.x86_64 0:0.4.9-106.el6
device-mapper-persistent-data.x86_64 0:0.6.2-0.2.rc7.el6
dhclient.x86_64 12:4.1.1-60.P1.el6
dhcp-common.x86_64 12:4.1.1-60.P1.el6
dracut.noarch 0:004-411.el6
dracut-kernel.noarch 0:004-411.el6
e2fsprogs.x86_64 0:1.41.12-24.el6
e2fsprogs-libs.x86_64 0:1.41.12-24.el6
gcc.x86_64 0:4.4.7-23.el6
gcc-c++.x86_64 0:4.4.7-23.el6
gdm.x86_64 1:2.30.4-69.el6
gdm-libs.x86_64 1:2.30.4-69.el6
gdm-plugin-fingerprint.x86_64 1:2.30.4-69.el6
gdm-user-switch-applet.x86_64 1:2.30.4-69.el6
glib2.x86_64 0:2.28.8-10.el6
glibc.i686 0:2.12-1.212.el6
glibc.x86_64 0:2.12-1.212.el6
glibc-common.x86_64 0:2.12-1.212.el6
glibc-devel.i686 0:2.12-1.212.el6
glibc-devel.x86_64 0:2.12-1.212.el6
glibc-headers.x86_64 0:2.12-1.212.el6
gmp.x86_64 0:4.3.1-13.el6
gnutls.x86_64 0:2.12.23-22.el6
gnutls-utils.x86_64 0:2.12.23-22.el6
httpd.x86_64 0:2.2.15-69.el6
httpd-tools.x86_64 0:2.2.15-69.el6
hwdata.noarch 0:0.233-20.1.el6
initscripts.x86_64 0:9.03.61-1.el6
iproute.x86_64 0:2.6.32-57.el6
iptables.x86_64 0:1.4.7-19.el6
iptables-ipv6.x86_64 0:1.4.7-19.el6
irqbalance.x86_64 2:1.0.7-9.el6
jasper-libs.x86_64 0:1.900.1-22.el6
java-1.7.0-openjdk.x86_64 1:1.7.0.181-2.6.14.10.el6
kernel-doc.noarch 0:2.6.32-754.el6
kernel-firmware.noarch 0:2.6.32-754.el6
kernel-headers.x86_64 0:2.6.32-754.el6
kexec-tools.x86_64 0:2.0.0-310.el6
kpartx.x86_64 0:0.4.9-106.el6
libbasicobjects.x86_64 0:0.1.1-13.el6
libcgroup.x86_64 0:0.40.rc1-26.el6
libcollection.x86_64 0:0.6.2-13.el6
libcom_err.x86_64 0:1.41.12-24.el6
libcom_err-devel.x86_64 0:1.41.12-24.el6
libdhash.x86_64 0:0.4.3-13.el6
libgcc.i686 0:4.4.7-23.el6
libgcc.x86_64 0:4.4.7-23.el6
libgfortran.x86_64 0:4.4.7-23.el6
libgomp.x86_64 0:4.4.7-23.el6
libini_config.x86_64 0:1.1.0-13.el6
libipa_hbac.x86_64 0:1.13.3-60.el6
libnih.x86_64 0:1.0.1-8.el6
libpath_utils.x86_64 0:0.2.1-13.el6
libref_array.x86_64 0:0.1.4-13.el6
libreport.x86_64 0:2.0.9-34.el6
libreport-cli.x86_64 0:2.0.9-34.el6
libreport-compat.x86_64 0:2.0.9-34.el6
libreport-filesystem.x86_64 0:2.0.9-34.el6
libreport-gtk.x86_64 0:2.0.9-34.el6
libreport-newt.x86_64 0:2.0.9-34.el6
libreport-plugin-kerneloops.x86_64 0:2.0.9-34.el6
libreport-plugin-logger.x86_64 0:2.0.9-34.el6
libreport-plugin-mailx.x86_64 0:2.0.9-34.el6
libreport-plugin-reportuploader.x86_64 0:2.0.9-34.el6
libreport-plugin-rhtsupport.x86_64 0:2.0.9-34.el6
libreport-plugin-ureport.x86_64 0:2.0.9-34.el6
libreport-python.x86_64 0:2.0.9-34.el6
libsmbclient.x86_64 0:3.6.23-51.el6
libss.x86_64 0:1.41.12-24.el6
libsss_idmap.x86_64 0:1.13.3-60.el6
libstdc++.i686 0:4.4.7-23.el6
libstdc++.x86_64 0:4.4.7-23.el6
libstdc++-devel.i686 0:4.4.7-23.el6
libstdc++-devel.x86_64 0:4.4.7-23.el6
libtirpc.x86_64 0:0.2.1-15.el6
libvirt-client.x86_64 0:0.10.2-64.el6
libvirt-python.x86_64 0:0.10.2-64.el6
man-pages-overrides.noarch 0:6.10.0-1.el6
microcode_ctl.x86_64 1:1.17-33.1.el6
nfs-utils.x86_64 1:1.2.3-78.el6
nspr.x86_64 0:4.19.0-1.el6
nss.x86_64 0:3.36.0-8.el6
nss-sysinit.x86_64 0:3.36.0-8.el6
nss-tools.x86_64 0:3.36.0-8.el6
nss-util.x86_64 0:3.36.0-1.el6
perf.x86_64 0:2.6.32-754.el6
python-dmidecode.x86_64 0:3.10.15-2.el6
python-libipa_hbac.x86_64 0:1.13.3-60.el6
python-sss-murmur.x86_64 0:1.13.3-60.el6
python-sssdconfig.noarch 0:1.13.3-60.el6
redhat-release-server.x86_64 0:6Server-6.10.0.12.el6
rhn-check.noarch 0:1.0.0.1-45.el6
rhn-client-tools.noarch 0:1.0.0.1-45.el6
rhn-setup.noarch 0:1.0.0.1-45.el6
rhn-setup-gnome.noarch 0:1.0.0.1-45.el6
rhnsd.x86_64 0:4.9.3-6.el6
rpcbind.x86_64 0:0.2.0-16.el6
rpm.x86_64 0:4.8.0-59.el6
rpm-libs.x86_64 0:4.8.0-59.el6
rpm-python.x86_64 0:4.8.0-59.el6
rsyslog.x86_64 0:5.8.10-12.el6
samba.x86_64 0:3.6.23-51.el6
samba-client.x86_64 0:3.6.23-51.el6
samba-common.x86_64 0:3.6.23-51.el6
samba-winbind.x86_64 0:3.6.23-51.el6
samba-winbind-clients.x86_64 0:3.6.23-51.el6
samba4-libs.x86_64 0:4.2.10-15.el6
selinux-policy.noarch 0:3.7.19-312.el6
selinux-policy-targeted.noarch 0:3.7.19-312.el6
sg3_utils.x86_64 0:1.28-13.el6
sg3_utils-libs.x86_64 0:1.28-13.el6
sos.noarch 0:3.2-63.el6
sssd.x86_64 0:1.13.3-60.el6
sssd-ad.x86_64 0:1.13.3-60.el6
sssd-client.x86_64 0:1.13.3-60.el6
sssd-common.x86_64 0:1.13.3-60.el6
sssd-common-pac.x86_64 0:1.13.3-60.el6
sssd-ipa.x86_64 0:1.13.3-60.el6
sssd-krb5.x86_64 0:1.13.3-60.el6
sssd-krb5-common.x86_64 0:1.13.3-60.el6
sssd-ldap.x86_64 0:1.13.3-60.el6
sssd-proxy.x86_64 0:1.13.3-60.el6
subscription-manager.x86_64 0:1.20.10-7.el6
subscription-manager-firstboot.x86_64 0:1.20.10-7.el6
subscription-manager-gui.x86_64 0:1.20.10-7.el6
systemtap-runtime.x86_64 0:2.9-9.el6
upstart.x86_64 0:0.6.5-17.el6
virt-who.noarch 0:0.21.6-1.el6
xorg-x11-drv-ati.x86_64 0:7.6.1-4.el6
xorg-x11-drv-ati-firmware.noarch 0:7.6.1-4.el6
xorg-x11-drv-mga.x86_64 0:1.6.3-12.el6
xorg-x11-server-Xorg.x86_64 0:1.17.4-17.el6
xorg-x11-server-common.x86_64 0:1.17.4-17.el6
yum-plugin-security.noarch 0:1.1.30-41.el6
yum-utils.noarch 0:1.1.30-41.el6
Replaced:
python-rhsm.x86_64 0:1.18.7-1.el6_9
python-rhsm-certificates.x86_64 0:1.18.7-1.el6_9