Alert GCSA-17042 - Oracle Critical Patch Update Advisory July (2017)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-17042
Data : 20 Aprile 2017
Titolo : Oracle Critical Patch Update Advisory July (2017)
******************************************************************
:: Descrizione del problema
Oracle ha rilasciato la Critical Patch Update July 2017.
L'aggiornamento e' una collezione di patch che risolvono difetti di
sicurezza e non, presenti in vari prodotti e componenti Oracle.
Oracle raccomanda di applicare gli aggiornamenti appena possibile.
:: Software interessato
Oracle Database
Oracle REST Data Services
Oracle API Gateway
Oracle BI Publisher
Oracle Business Intelligence Enterprise
Oracle Data Integrator
Oracle Endeca Server
Oracle Enterprise Data Quality
Oracle Enterprise Repository
Oracle Fusion Middleware
Oracle OpenSSO
Oracle Outside in Technology
Oracle Secure Enterprise Search
Oracle Service Bus
Oracle Traffic Director
Oracle Tuxedo
Oracle Tuxedo System and Application Monitor
Oracle WebCenter Content
Oracle WebLogic Server
Hyperion Essbase
Enterprise Manager Base Platoform
Enterprise Manager Ops Center
Oracle Application Testing Suite
Oracle Business Transiction Manager
Oracle Configuration Manager
Application Management Pack for Oracle E-Business Suite
Oracle E-Business Suite
Oracle Agile PLM
Oracle Transportation Management
PeopleSoft Enterprise FSCM
Siebel Applications
Oracle Commerce Guided Search / Oracle Commerce Experience Manager
Oralce iLearning
Oracle Fusion Applications
Oracle Communications
Oracle Enterprise Communications Broker
Oracle Enterprise Session Border Controller
Oracle Financial Services
Oracle FLEXCUBE
Hospitality
MICROS
Oracle Hospitality
Oracle Payment Interface
Oracle Retail
Oracle Policy Automation
Primavera
Java Advanced Management Console
Oracle Java SE
Oracle JRockit
Solaris
Solaris Cluster
Sun ZFS Storage Appliance Kit (AK)
Oracle VM VirtualBox
MySQL
Oracle Explorer
:: Impatto
L'impatto di queste vulnerabilita' varia a seconda del prodotto,
della componente e della configurazione del sistema.
:: Soluzioni
Applicare le patch appropriate o procedere all'opportuno
aggiornamento secondo le istruzioni rilasciate da Oracle
(vedere link nei Riferimenti)
:: Riferimenti
Oracle Critical Patch Update Advisory - July 2017
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin
http://www.oracle.com/technetwork/topics/security/alerts-086861.html
SecurityTracker
http://www.securitytracker.com/id/1038923
http://www.securitytracker.com/id/1038926
http://www.securitytracker.com/id/1038928
http://www.securitytracker.com/id/1038929
http://www.securitytracker.com/id/1038930
http://www.securitytracker.com/id/1038931
http://www.securitytracker.com/id/1038932
http://www.securitytracker.com/id/1038934
http://www.securitytracker.com/id/1038936
http://www.securitytracker.com/id/1038937
http://www.securitytracker.com/id/1038938
http://www.securitytracker.com/id/1038939
http://www.securitytracker.com/id/1038940
http://www.securitytracker.com/id/1038914
I riferimenti CVE sono disponibili nell'advisory originale.
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAllvFuMACgkQwZxMk2USYEJD+wCfU+oCP/OE19lF8zzNZm44qgue
2EEAn3wZTg5TLZMS8TwvBhwFGMwjvedX
=hywD
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-17042
Data : 20 Aprile 2017
Titolo : Oracle Critical Patch Update Advisory July (2017)
******************************************************************
:: Descrizione del problema
Oracle ha rilasciato la Critical Patch Update July 2017.
L'aggiornamento e' una collezione di patch che risolvono difetti di
sicurezza e non, presenti in vari prodotti e componenti Oracle.
Oracle raccomanda di applicare gli aggiornamenti appena possibile.
:: Software interessato
Oracle Database
Oracle REST Data Services
Oracle API Gateway
Oracle BI Publisher
Oracle Business Intelligence Enterprise
Oracle Data Integrator
Oracle Endeca Server
Oracle Enterprise Data Quality
Oracle Enterprise Repository
Oracle Fusion Middleware
Oracle OpenSSO
Oracle Outside in Technology
Oracle Secure Enterprise Search
Oracle Service Bus
Oracle Traffic Director
Oracle Tuxedo
Oracle Tuxedo System and Application Monitor
Oracle WebCenter Content
Oracle WebLogic Server
Hyperion Essbase
Enterprise Manager Base Platoform
Enterprise Manager Ops Center
Oracle Application Testing Suite
Oracle Business Transiction Manager
Oracle Configuration Manager
Application Management Pack for Oracle E-Business Suite
Oracle E-Business Suite
Oracle Agile PLM
Oracle Transportation Management
PeopleSoft Enterprise FSCM
Siebel Applications
Oracle Commerce Guided Search / Oracle Commerce Experience Manager
Oralce iLearning
Oracle Fusion Applications
Oracle Communications
Oracle Enterprise Communications Broker
Oracle Enterprise Session Border Controller
Oracle Financial Services
Oracle FLEXCUBE
Hospitality
MICROS
Oracle Hospitality
Oracle Payment Interface
Oracle Retail
Oracle Policy Automation
Primavera
Java Advanced Management Console
Oracle Java SE
Oracle JRockit
Solaris
Solaris Cluster
Sun ZFS Storage Appliance Kit (AK)
Oracle VM VirtualBox
MySQL
Oracle Explorer
:: Impatto
L'impatto di queste vulnerabilita' varia a seconda del prodotto,
della componente e della configurazione del sistema.
:: Soluzioni
Applicare le patch appropriate o procedere all'opportuno
aggiornamento secondo le istruzioni rilasciate da Oracle
(vedere link nei Riferimenti)
:: Riferimenti
Oracle Critical Patch Update Advisory - July 2017
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin
http://www.oracle.com/technetwork/topics/security/alerts-086861.html
SecurityTracker
http://www.securitytracker.com/id/1038923
http://www.securitytracker.com/id/1038926
http://www.securitytracker.com/id/1038928
http://www.securitytracker.com/id/1038929
http://www.securitytracker.com/id/1038930
http://www.securitytracker.com/id/1038931
http://www.securitytracker.com/id/1038932
http://www.securitytracker.com/id/1038934
http://www.securitytracker.com/id/1038936
http://www.securitytracker.com/id/1038937
http://www.securitytracker.com/id/1038938
http://www.securitytracker.com/id/1038939
http://www.securitytracker.com/id/1038940
http://www.securitytracker.com/id/1038914
I riferimenti CVE sono disponibili nell'advisory originale.
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAllvFuMACgkQwZxMk2USYEJD+wCfU+oCP/OE19lF8zzNZm44qgue
2EEAn3wZTg5TLZMS8TwvBhwFGMwjvedX
=hywD
-----END PGP SIGNATURE-----