473,408 Members | 1,867 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,408 software developers and data experts.

security holes that have been found.

Hello,

I was given a heads-up about some security flaws in DB2, which are
"documented" at :

http://searchdatabase.techtarget.com...0,289142,sid13
_gci1013055,00.html
My question is ... has anyone had any experience with these "flaws" ???

We are using 8.2, so the article implies that we are safe, as it does not
mention 8.2 in its brief.

The "patch" for this is supposedly at :

http://www-306.ibm.com/software/data...ownloadv8.html

But that's just a fixpack page for the whole product.
This article was generated on 7 October, so I would think that FP 5, say,
is not compliant with the "fix" ???

TIA

Mairhtin O'Feannag

Nov 12 '05 #1
4 1275
LE
The security patches are in fp6a and fp7a. Fp7 is 8.2, so if you are 8.2
and you are still on fp7 or installed 8.2 without any fixpacks, you need
to install fp7a.

Larry Edelstein

mairhtin o'feannag wrote:
Hello,

I was given a heads-up about some security flaws in DB2, which are
"documented" at :

http://searchdatabase.techtarget.com...0,289142,sid13
_gci1013055,00.html
My question is ... has anyone had any experience with these "flaws" ???

We are using 8.2, so the article implies that we are safe, as it does not
mention 8.2 in its brief.

The "patch" for this is supposedly at :

http://www-306.ibm.com/software/data...ownloadv8.html

But that's just a fixpack page for the whole product.
This article was generated on 7 October, so I would think that FP 5, say,
is not compliant with the "fix" ???

TIA

Mairhtin O'Feannag


Nov 12 '05 #2
The security patches are in fp6a and fp7a. Fp7 is 8.2, so if you are 8.2
and you are still on fp7 or installed 8.2 without any fixpacks, you need
to install fp7a.

Larry Edelstein

mairhtin o'feannag wrote:
Hello,

I was given a heads-up about some security flaws in DB2, which are
"documented" at :

http://searchdatabase.techtarget.com...0,289142,sid13
_gci1013055,00.html
My question is ... has anyone had any experience with these "flaws" ???

We are using 8.2, so the article implies that we are safe, as it does not
mention 8.2 in its brief.

The "patch" for this is supposedly at :

http://www-306.ibm.com/software/data...ownloadv8.html

But that's just a fixpack page for the whole product.
This article was generated on 7 October, so I would think that FP 5, say,
is not compliant with the "fix" ???

TIA

Mairhtin O'Feannag


Nov 12 '05 #3
OK,

I want to be VERY VERY CERTAIN of this. No kidding, it's not clear at
ALL.

I have 8.2 installed, no fixpacks. All of the documentation on the 7a
fixpack states that it applies to 8.l, and makes no mention of 8.2 .

Also, the Linux version of the fixpack is less than half the size of the
other fixpacks, and uses the designation of MI00086 rather than the
usual U or WR designations. Why would the fixpack be so small when I
understand that it is a full product refresh?

Getting this wrong is not an option. The folks here are extraordinarily
wary, due to a recent break-in.

Thanks in advance,

Mairhtin


"mairhtin o'feannag" <ir**********@rocketmaildot.com> wrote in
news:Xn**********************************@64.164.9 8.29:
Hello,

I was given a heads-up about some security flaws in DB2, which are
"documented" at :

http://searchdatabase.techtarget.com...0,289142,sid13
_gci1013055,00.html
My question is ... has anyone had any experience with these "flaws"
???

We are using 8.2, so the article implies that we are safe, as it does
not mention 8.2 in its brief.

The "patch" for this is supposedly at :

http://www-306.ibm.com/software/data...ownloadv8.html

But that's just a fixpack page for the whole product.
This article was generated on 7 October, so I would think that FP 5,
say, is not compliant with the "fix" ???

TIA

Mairhtin O'Feannag


Nov 12 '05 #4
I strongly recommend contacting IBM support for an answer to your
question. You state that you've installed 8.2 with no fixpacks. 8.2 can
be "in use" by installing 8.1 and FP7. FP7 was retired an replaced with
FP7a, which fixes an number of issues. I believe that 8.2 was released
equivalent to 8.1 + FP7 but don't really know if it was FP7 or FP7a.

IBM's support site for LUW makes no mention of UDB 8.2. Since you've
installed it directly; I believe the only place you should get the
definitive answer you seek is directly from IBM support. You'll need the
output from the command:
db2level
when you contact support. A new install at 8.2 implies that you've
obtained a new product and should, therefore, have new product support.

Phil Sherman
mairhtin o'feannag wrote:
OK,

I want to be VERY VERY CERTAIN of this. No kidding, it's not clear at
ALL.

I have 8.2 installed, no fixpacks. All of the documentation on the 7a
fixpack states that it applies to 8.l, and makes no mention of 8.2 .

Also, the Linux version of the fixpack is less than half the size of the
other fixpacks, and uses the designation of MI00086 rather than the
usual U or WR designations. Why would the fixpack be so small when I
understand that it is a full product refresh?

Getting this wrong is not an option. The folks here are extraordinarily
wary, due to a recent break-in.

Thanks in advance,

Mairhtin


"mairhtin o'feannag" <ir**********@rocketmaildot.com> wrote in
news:Xn**********************************@64.164.9 8.29:

Hello,

I was given a heads-up about some security flaws in DB2, which are
"documented" at :

http://searchdatabase.techtarget.com...0,289142,sid13
_gci1013055,00.html
My question is ... has anyone had any experience with these "flaws"
???

We are using 8.2, so the article implies that we are safe, as it does
not mention 8.2 in its brief.

The "patch" for this is supposedly at :

http://www-306.ibm.com/software/data...ownloadv8.html

But that's just a fixpack page for the whole product.
This article was generated on 7 October, so I would think that FP 5,
say, is not compliant with the "fix" ???

TIA

Mairhtin O'Feannag



Nov 12 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Dom Leonard | last post by:
Hi all, I occasionally use the javascript protocol in window.open to retrieve a window property of the opener for use as HTML source: window.htmlSrc="<html>...blah ....<\/html>";...
12
by: A.M. | last post by:
Hi at all, how can I do to insert into a HTML page a file .txt stored in the same directory of the server where is the html file that must display the text file.txt? Thank you very much P.Pietro
116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
13
by: Peter L Reader | last post by:
I have to say, from a practical standpoint I'm not all that impressed with the security built into Office 2K3. I'm a small-scale developer building Access apps for a few non-profits locally; I...
3
by: nicholas | last post by:
I use asp.NET dll components on my website. These are managed components, not like asp components that are un-managed. Those who sell these components say that having an asp.Net component in the...
4
by: tony | last post by:
I'm designing a survey form page that will be fairly complex and am becoming confident enough with PHP now to tackle most things. (Thanks to everyone here who has helped) Before I go too far...
8
by: Matt Kruse | last post by:
http://news.zdnet.com/2100-1009_22-6121608.html Hackers claim zero-day flaw in Firefox 09 / 30 / 06 | By Joris Evers SAN DIEGO--The open-source Firefox Web browser is critically flawed in...
1
by: =?iso-8859-1?B?QW5kcuk=?= | last post by:
A security hole has been uncovered in Crunchy (version 0.9.1.1 and earlier). Anyone using Crunchy to browse web tutorials should only visit sites that are trustworthy. We are working hard at...
4
by: Bjorn Sagbakken | last post by:
Hi. This might not be the right forum for my question, but still I throw it out: I have just succeeded in publishing my ASP.NET web application on my own PC, opening port 80 in/out in my...
1
by: Keith G Hicks | last post by:
Does anyone know of any good software out there that can be used for testing websites for security holes such (but not only) as sql injection? I know MS has a tool for asp that can find sql...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.