![]() | Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition | ||
|
|
![]() |
||||||||||||||||||||||||||||||||||||||||||||
Solution Type Predictive Self-Healing Sure Solution 2386256.1 : Oracle SuperCluster — Spectre (CVE-2017-5753, CVE-2017-5715) and Meltdown (CVE-2017-5754) Vulnerabilities
In this Document
Applies to:Oracle SuperCluster M8 HardwareOracle SuperCluster M7 Hardware Oracle SuperCluster M6-32 Hardware Oracle SuperCluster T5-8 Hardware SPARC SuperCluster T4-4 Information in this document applies to any platform. PurposeInformation Document for Oracle SuperCluster — Spectre (CVE-2017-5753, CVE-2017-5715) and Meltdown (CVE-2017-5754) Vulnerabilities. DetailsLast updated: 13-Apr-2018 (v0.6) SPARC Systems in Oracle SuperClusterSpectre Variant 1 (CVE-2017-5753)Oracle has determined that certain SPARC systems are affected by the Spectre Variant 1 (CVE-2017-5753) vulnerability, including SPARC systems used in all SuperCluster platform releases.
Spectre Variant 2 (CVE-2017-5715)Oracle has determined that certain SPARC systems are affected by the Spectre Variant 2 (CVE-2017-5715) vulnerability, including SPARC systems used in all SuperCluster platform releases.
Meltdown (CVE-2017-5754)Based on current information, Oracle believes that Oracle Solaris versions running on SPARCv9 hardware are not impacted by the Meltdown (CVE-2017-5754) vulnerability. This includes all SPARC systems used in all SuperCluster platform releases.
Other Systems in Oracle SuperClusterExadata Storage ServersOracle has developed changes to address the Spectre (CVE-2017-5753, CVE-2017-5715) and Meltdown (CVE-2017-5754) vulnerabilities for all firmware and software running on Exadata Storage Servers.
ZFS Storage ApplianceFor information about the ZFS Storage Appliance, refer to the following MOS document: Oracle Solaris on x86 — Spectre (CVE-2017-5753, CVE-2017-5715) and Meltdown (CVE-2017-5754) Vulnerabilities (Doc ID 2383531.1). Cisco Management SwitchesThe Cisco Nexus 9000 (C93108TC-EX) management switch used in the Oracle SuperCluster M8 platform is vulnerable to the Spectre (CVE-2017-5753, CVE-2017-5715) and Meltdown (CVE-2017-5754) vulnerabilities. Cisco has advised that it will release software updates that address these vulnerabilities. Other SuperCluster ComponentsBased on current information, Oracle believes that other components used in Oracle SuperCluster are not impacted by the Spectre (CVE-2017-5753, CVE-2017-5715) and Meltdown (CVE-2017-5754) vulnerabilities. These Oracle SuperCluster components include the following:
Addressing Vulnerabilities on Oracle SuperClusterNew InstallsNew Oracle SuperCluster M8 installs will be based on Oracle SuperCluster Release 2.6, which incorporates the latest System Firmware and Operating System updates required to address Spectre and Meltdown vulnerabilities for SPARC servers and for Exadata Storage Servers. Existing InstallsFor existing customers, the April 2018 Quarterly Full Stack Download Patch (QFSDP) includes the latest System Firmware and Operating System updates required to address Spectre and Meltdown vulnerabilities for T5, M6, M7, and M8 based SPARC servers and for Exadata Storage Servers. For more details on the SuperCluster QFSDP, refer to the following MOS document: Contents of each SuperCluster Quarterly Full Stack Download Patch (QFSDP) (Doc ID 2056975.1) Performance ImplicationsIt has been widely reported that the mitigation measures associated with these processor vulnerabilities can negatively affect system performance.
General RecommendationsOracle further recommends that customers prevent as much as possible the execution of untrusted code, which is a condition for the exploitation of vulnerabilities CVE-2017-5753 (Spectre v1), CVE-2017-5715 (Spectre v2), and CVE-2017-5754 (Meltdown). Oracle recommends that you review the privileges associated with your systems, and periodically review your security logs in light of these vulnerabilities. Attachments This solution has no attachment |
||||||||||||||||||||||||||||||||||||||||||||
|