{"id":7408,"date":"2018-10-17T11:01:02","date_gmt":"2018-10-17T09:01:02","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=7408"},"modified":"2022-06-26T12:54:42","modified_gmt":"2022-06-26T10:54:42","slug":"oracle-critical-patch-update-october-16-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/10\/17\/oracle-critical-patch-update-october-16-2018\/","title":{"rendered":"Oracle Critical Patch Update October 16, 2018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\">[<a href=\"https:\/\/web.archive.org\/web\/20201205220630\/https:\/\/www.borncity.com\/blog\/2018\/10\/17\/kritische-patches-von-oracle-16-oktober-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Oracle has released a number of critical updates for its products as of October 16, 2018. Here is an overview of these updates.<\/p>\n<p><!--more--><\/p>\n<h2>Oracle: Critical Patch Update October 2018<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/66374a27bf344ba6a0621db75d2688bc\" width=\"1\" height=\"1\">The Critical Patch Update from Oracle is not a single update, but a list of critical security updates. I got aware of the new release through @PhantomofMobile via Twitter.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p lang=\"en\" dir=\"ltr\">ORACLE <a href=\"https:\/\/twitter.com\/Oracle?ref_src=twsrc%5Etfw\">@Oracle<\/a> CRITICAL PATCH UPDATE EMAIL FOR OCTOBER 2018:<\/p>\n<p>ICYMI: <a href=\"https:\/\/twitter.com\/SBSDiva?ref_src=twsrc%5Etfw\">@SBSDiva<\/a> <a href=\"https:\/\/twitter.com\/woodyleonhard?ref_src=twsrc%5Etfw\">@woodyleonhard<\/a> <a href=\"https:\/\/twitter.com\/AdminKirsty?ref_src=twsrc%5Etfw\">@AdminKirsty<\/a> <a href=\"https:\/\/twitter.com\/thurrott?ref_src=twsrc%5Etfw\">@thurrott<\/a> <a href=\"https:\/\/twitter.com\/maryjofoley?ref_src=twsrc%5Etfw\">@maryjofoley<\/a> <a href=\"https:\/\/twitter.com\/bdsams?ref_src=twsrc%5Etfw\">@bdsams<\/a> <a href=\"https:\/\/twitter.com\/mehedih_?ref_src=twsrc%5Etfw\">@mehedih_<\/a> <a href=\"https:\/\/twitter.com\/ruthm?ref_src=twsrc%5Etfw\">@ruthm<\/a> <a href=\"https:\/\/twitter.com\/etguenni?ref_src=twsrc%5Etfw\">@etguenni<\/a> <a href=\"https:\/\/twitter.com\/SwiftOnSecurity?ref_src=twsrc%5Etfw\">@SwiftOnSecurity<\/a> <a href=\"https:\/\/twitter.com\/pcper?ref_src=twsrc%5Etfw\">@pcper<\/a> <a href=\"https:\/\/twitter.com\/MalwareJake?ref_src=twsrc%5Etfw\">@MalwareJake<\/a> <a href=\"https:\/\/twitter.com\/GossiTheDog?ref_src=twsrc%5Etfw\">@GossiTheDog<\/a> <a href=\"https:\/\/twitter.com\/ryanshrout?ref_src=twsrc%5Etfw\">@ryanshrout<\/a> <a href=\"https:\/\/twitter.com\/JobCacka?ref_src=twsrc%5Etfw\">@JobCacka<\/a><a href=\"https:\/\/t.co\/8geVpNL9l6\">https:\/\/t.co\/8geVpNL9l6<\/a><\/p>\n<p>1\/2<\/p>\n<p>\u2014 Crysta T. Lacey (@PhantomofMobile) <a href=\"https:\/\/twitter.com\/PhantomofMobile\/status\/1052326568310099973?ref_src=twsrc%5Etfw\">16. Oktober 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<p>The notifications can be found on this Oracle page &#8211; a list of previous Critical Patch Updates can be found <a href=\"https:\/\/www.oracle.com\/technetwork\/topics\/security\/alerts-086861.html?source=:em:gbc:ie:cpo:RC_SPPT160711P00036C0002:SEV100752337\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. <\/p>\n<h2>Updates for many Oracle products<\/h2>\n<p>Details of critical updates for each Oracle product can be found <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. Oracle recommends that you install the updates as soon as possible.<\/p>\n<ul>\n<li>There are critical vulnerabilities in Oracle's E-Business Suite <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html#AppendixEBS\" target=\"_blank\" rel=\"noopener noreferrer\">Application Management Pack for Oracle E-Business Suite, versions 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7<\/a>\n<li>Vulnerabilities in the Enterprise Manager were identified in the <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixEM\" target=\"_blank\" rel=\"noopener noreferrer\">Base Platform<\/a> (V12.1.0.5, 13.2), the <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixEM\" target=\"_blank\" rel=\"noopener noreferrer\">Enterprise Manager f\u00fcr den SQL-Server<\/a> (V12.2.2, 12.3.3) and the <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixEM\" target=\"_blank\" rel=\"noopener noreferrer\">OPS Center<\/a> (V12.2.2, 12.3.3).\n<li>Fixes for Fusion Middleware for <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixHYP\" target=\"_blank\" rel=\"noopener noreferrer\">Hyperion BI+, version 11.1.2.4<\/a>, <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixHYP\" target=\"_blank\" rel=\"noopener noreferrer\">Hyperion Common Events, version 11.1.2.4<\/a>, <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixHYP\" target=\"_blank\" rel=\"noopener noreferrer\">Hyperion Data Relationship Management, version 11.1.2.4.345<\/a>, and <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixHYP\" target=\"_blank\" rel=\"noopener noreferrer\">Hyperion Essbase Administration Services, version 11.1.2.4<\/a> are available.<\/li>\n<\/ul>\n<p>Further fixes refer to <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixFMW\" target=\"_blank\" rel=\"noopener noreferrer\">Oracle Business Intelligence Enterprise Edition, versions 11.1.1.7.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0<\/a>, to MySQL, to MICROS PC Workstation and more Oracle products.<\/p>\n<h2>Update for Java SE<\/h2>\n<p>For the Java Standard Edition (Java SE) updates for versions 6, 7, 8 and 11 have been provided. Here are the links to the relevant documents:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixJAVA\" target=\"_blank\" rel=\"noopener noreferrer\">Oracle Java SE, versions 6u201, 7u191, 8u182, 11<\/a>\n<li><a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixJAVA\">Oracle Java SE Embedded, versions 8u18, 8u181<\/a>\n<li><a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html?source=:em:gbc:ie::RC_SPPT160711P00036C0002:SEV100752337#AppendixJAVA\">Oracle JRockit, version R28.3.19<\/a><\/li>\n<\/ul>\n<p>This critical patch update includes 12 new security fixes for Oracle Java SE.&nbsp; Eleven (11) of these vulnerabilities can be remotely exploited without authentication &#8211; i.e. the vulnerabilities can be exploited over a network (Internet) without requiring user credentials. The English overview with the fixed vulnerabilities can be <a href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/cpuoct2018-4428296.html#AppendixJAVA\" target=\"_blank\" rel=\"noopener noreferrer\">found here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Oracle has released a number of critical updates for its products as of October 16, 2018. Here is an overview of these updates.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,22],"tags":[488,777,69,195],"class_list":["post-7408","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-update","tag-java","tag-oracle","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/7408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=7408"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/7408\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=7408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=7408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=7408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}