![]() | Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition | ||
|
|
![]() |
||||||||||||||||||||||||||||||||||
Solution Type Predictive Self-Healing Sure Solution 2377658.1 : Oracle Database Appliance Patch Availability Document for CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754
Status of Oracle Database Appliance with respect to the publicly disclosed CVE-2017-5753 (Spectre v1), CVE-2017-5715 (Spectre v2), and CVE-2017-5754 (Meltdown) Intel processor vulnerabilities. In this Document
Applies to:Oracle Database Appliance - Version All Versions to All Versions [Release All Releases]Linux x86-64 PurposeThis document lists the status of Oracle Database Appliance with respect to the publicly disclosed CVE-2017-5753 (Spectre v1), CVE-2017-5715 (Spectre v2), and CVE-2017-5754 (Meltdown) Intel processor vulnerabilities. DetailsOracle recommends that you prevent as much as possible the execution of discretionary code from an untrusted source, which is a condition for the exploitation of vulnerabilities CVE-2017-5753 (Spectre v1), CVE-2017-5715 (Spectre v2), and CVE-2017-5754 (Meltdown). Oracle recommends that you review the privileges associated with your systems, and periodically review your security logs in light of these vulnerabilities (e.g., to identify newly-created accounts or newly-installed applications). Oracle will continue to investigate these vulnerabilities, and will produce additional patches to respond to these processor issues, if applicable, and in accordance with Oracle’s security update policies. Oracle recommends that customers keep up with security patches for relevant operating systems, virtualization technologies, and related hardware when their respective vendors or maintainers release updated security patches. The following table lists the minimum versions of Oracle Database Appliance Software required to resolve the vulnerabilities specified below. If you already have a higher version of the patch installed on your system, no further action is required. Oracle Database Appliance Patch Availability Table
Note 1. ODA X7-2S/M/HA - Skypass CPU does not support retpoline, but does include microcode mitigation for CVE-2017-571 Verifying the MitigationFor Bare Metal and ODA_BASE of ODA virtualized deployments# cat /sys/devices/system/cpu/vulnerabilities/meltdown # cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 Dom0 of ODA virtualized deployments:# xm dmesg|grep -A3 "Speculative mitigation facilities" /*
Additional References:
Attachments This solution has no attachment |
||||||||||||||||||||||||||||||||||
|