Skip to Main Content

Oracle Database Discussions

Announcement

For appeals, questions and feedback about Oracle Forums, please email oracle-forums-moderators_us@oracle.com. Technical questions should be asked in the appropriate category. Thank you!

Interested in getting your voice heard by members of the Developer Marketing team at Oracle? Check out this post for AppDev or this post for AI focus group information.

extended support for 10.2.0.3 & 10.2.0.4

730939Jan 19 2011 — edited Jan 19 2011
Hi,

we are using Oracle 10.2.0.3 and 10.2.0.4 databases in windows server.

I want to know when is the extended support date for 10.2.0.3 & 10.2.0.4.


Thanks & Regards,

Comments

"Oracle is aware of these reports and is engaged with Intel.  Oracle will produce necessary fixes, if applicable, in accordance with Oracle's security fixing policies."

jilabaca_olinux

But at least they could get some statement about it, Red Hat, Microsoft, etc, are already releasing patches, meanwhile I keep trying to find official Oracle Linux information on the problem.

j.

elcarO-Oracle

Exactly. I came across oracle pages and found totally nothing.

MatthewLinux

I would also like to know what the timeframe for release of the OL patches for Spectre/Meltdown is, as well as what impact this will have on Oracle DB running on OL with UEK.

Thanks.

Dude!

A potential risk isn't necessarily a problem and it's not the first or last time computer technology is doomed. And as usual, it's a publicity show and making a big deal and fuss about it. It's very likely going to be in the news to the disadvantage of some vendors, while others will see a marketing opportunity.

From what I understand, the problem exists for many years already and does not mean anyone can connect to your server and destroy your system or obtain confidential data. It's not like the Ping of Death in the late 90's. As with any problem of such perceived magnitude and type, I think it's best to remain skeptical, research the actual problem to determine your own potential risk and approach the solution with caution.

MatthewLinux

This is a rather flippant response. The user was asking brief questions about these vulnerabilities and where they can find more information from Oracle on them. You've not answered them, rather you've told everyone to calm down.

Dude!

I simply expressed my personal opinion about the problem and suggest to be realistic and to evaluate the situation. Public knowledge about the problem hit the mainstream media as of yesterday.

Court_

Now I am curious about the UEK kernels, more specifically UEKR4.

Dude!

UEK4 is based on the mainline Linux kernel 4.1.12.

You can subscribe to the Oracle Linux errata mailing list to receive notifications:

https://linux.oracle.com/pls/apex/f?p=105:21

or https://oss.oracle.com/mailman/listinfo/el-errata

and review https://twitter.com/orcl_uln

From what I understand, patches will provide a work-around at the cost of performance. A permanent fix will require more low level changes and possibly CPU re-engineering. To exploit the problem however requires to install and run some malicious software.

https://meltdownattack.com/

Court_

UEKR4 patched kernel is out today. We use ksplice, but I am not sure that You can splice this in. I haven not seen a package for it yet.

Avi Miller-Oracle

There will not be Ksplice patches for this, in part due to the microcode update required for the processors. A reboot will be required for mitigation.

Court_

Thanks Avi! I figured that would be the case, but one could hope.

Steffen Busch

Do you know if/when UEK3 is patched for Oracle Linux 7?

EdStevens

user13051959 wrote:

Do you know if/when UEK3 is patched for Oracle Linux 7?

I don't know about UEK3 for OL7 (?!/1?) but just today my SA installed.

pastedImage_1.png

1679702

Do you know if/when UEK3 is patched for Oracle Linux 6.5?

user10174131

When running the RHCK, the individual patches can be viewed and en/disabled:

# cat /proc/version

Linux version 3.10.0-693.11.6.el7.x86_64 (mockbuild@x86-ol7-builder-03.us.oracle.com) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-16) (GCC) ) #1 SMP Wed Jan 3 18:59:47 PST 2018

# cat /sys/kernel/debug/x86/pti_enabled

1

# cat /sys/kernel/debug/x86/ibpb_enabled

0

# cat /sys/kernel/debug/x86/ibrs_enabled

0

This interface is not entirely present in the patched UEK:

# cat /proc/version

Linux version 4.1.12-112.14.10.el7uek.x86_64 (mockbuild@) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-11) (GCC) ) #2 SMP Mon Jan 8 18:26:37 PST 2018

# ls -l /sys/kernel/debug/x86

total 0

-rw-------. 1 root root 0 Jan  9 09:35 ibrs_enabled

-rw-r--r--. 1 root root 0 Jan  9 09:35 nmi_longest_ns

-r--------. 1 root root 0 Jan  9 09:35 pat_memtype_list

-rw-------. 1 root root 0 Jan  9 09:35 tlb_single_page_flush_ceiling

Can we get documentation on how the controls differ between the RHCK and the UEK?

Avi Miller-Oracle

Please submit an SR as that needs to be reviewed by Oracle Global Product Security.

Avi Miller-Oracle

Because this is a security vulnerability, information cannot be provided here on the forum. If you have any questions, please open an SR with Oracle Support as that is the only way Oracle Global Product Security can be engaged to provide the appropriate response.

This thread will now be locked (as will any subsequent threads regarding this issue) as all questions must be submitted via an SR.

1 - 19
Locked Post
New comments cannot be posted to this locked post.

Post Details

Locked on Feb 16 2011
Added on Jan 19 2011
6 comments
851 views