Oracle has developed several patches in response to the CVE-2017-5715 (Spectre v2), CVE-2017-5753 (Spectre v1), and CVE-2017-5754 (Meltdown) vulnerabilities. Oracle will deploy some patches during the scheduled maintenance window below. Please note that mitigating vulnerability CVE-2017-5715 (Spectre v2) may require both software changes and microcode updates against the affected processors. Oracle will notify you if additional maintenance activities are required.
During patching, customers will not be able to upload, edit, or create new content. It may also be necessary to reboot servers, and your systems may not be available for a period of time. If rebooting is required, Oracle will verify that services and applications have resumed. Please contact Oracle Support and/or your Oracle account manager if you have questions.
Addendum to the January 2018 Critical Patch Advisory for Spectre and Meltdown (Doc ID 2347948.1)
Oracle Linux Patch Availability Document for CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754 (Doc ID 2348448.1)
Our monitoring tools detected an issue with your environment. This will result in sub-optimal performance or downtime of your service. We apologize for any inconvenience and want you to know that we have assigned the appropriate resources to identify and resolve this issue. Our estimated time to resolve this and summary of the event is provided below.
Event Type: Unplanned Outage
Service(s) Impacted: Oracle Responsys
Start Time: 2017-12-27 08:00 UTC
Estimated End Time: TBD
Summary: Campaign launches and Programs have been paused