Alert GCSA-19108 - Oracle Critical Patch Update Advisory October 2019
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-19108
Data : 17 Ottobre 2019
Titolo : Oracle Critical Patch Update Advisory October 2019
******************************************************************
:: Descrizione del problema
Oracle ha rilasciato la Critical Patch Update October 2019.
L'aggiornamento risolve 219 vulnerabilita', alcune sfruttabili
da un attaccante remoto per provocare condizioni di denial of service,
rivelare informazioni sensibili, manomettere e oltrepassare restrizioni
di sicurezza su un sistema che ne sia affetto.
Oracle raccomanda di applicare gli aggiornamenti appena possibile.
:: Software interessato
Agile Recipe Management for Pharmaceuticals, versioni 9.3.3, 9.3.4
Diagnostic Assistant, versione 2.12.36
Enterprise Manager Base Platform, versioni 13.2, 13.3
Enterprise Manager for Exadata, versioni 12.1.0.5.0, 13.2.2.0.0,
13.3.1.0.0, 13.3.2.0.0
Enterprise Manager Ops Center, versioni 12.3.3, 12.4.0
Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers, versioni
precedenti a XCP2361, precedenti a XCP3071
Hyperion Data Relationship Management, versione 11.1.2.4
Hyperion Enterprise Performance Management Architect, versione 11.1.2.4
Hyperion Financial Reporting, versione 11.1.2.4
Instantis EnterpriseTrack, versioni 17.1, 17.2, 17.3
JD Edwards EnterpriseOne Tools, versione 4.0.1.0
MICROS Relate CRM Software, versioni 7.1.0, 11.4, 15.0.0, 16.0.0,
17.0.0, 18.0.0
MICROS Retail XBRi Loss Prevention, versione 10.8.3
MySQL Connectors, versioni 5.3.13 e precedenti, 8.0.17 e precedenti
MySQL Enterprise Monitor, versioni 8.0.17 e precedenti
MySQL Server, versioni 5.6.45 e precedenti, 5.7.27 e precedenti, 8.17 e
precedenti
MySQL Workbench, versioni 8.0.17 e precedenti
Oracle Agile PLM, versioni 9.3.3-9.3.6
Oracle Agile Product Lifecycle Management for Process, versioni 6.2.0.0,
6.2.1.0, 6.2.2.0, 6.2.3.0
Oracle API Gateway, versione 11.1.2.4.0
Oracle Application Testing Suite, versioni 13.2, 13.3
Oracle Banking Digital Experience, versioni 18.1, 18.2, 18.3, 19.1
Oracle Banking Platform, versioni 2.4.0, 2.4.1, 2.5.0, 2.6.0, 2.6.1,
2.7.0, 2.7.1
Oracle BI Publisher, versioni 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0
Oracle Business Intelligence Enterprise Edition, versioni 11.1.1.9.0,
12.2.1.3.0, 12.2.1.4.0
Oracle Clusterware, versione 19.0.0.0.0
Oracle Data Integrator, versione 12.2.1.3.0
Oracle Database Server, versioni 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, 19c
Oracle E-Business Suite, versioni 12.1.1-12.1.3, 12.2.3-12.2.9
Oracle Enterprise Repository, versione 12.1.3.0.0
Oracle Financial Services Analytical Applications Infrastructure,
versioni 8.0.2-8.0.8
Oracle Financial Services Enterprise Financial Performance Analytics,
versioni 8.0.6, 8.0.7
Oracle Financial Services Retail Performance Analytics, versioni 8.0.6,
8.0.7
Oracle FLEXCUBE Direct Banking, versioni 12.0.2, 12.0.3
Oracle Forms, versione 12.2.1.3.0
Oracle GoldenGate Application Adapters, versione 12.3.2.1.0
Oracle GraalVM Enterprise Edition, versione 19.2.0
Oracle Healthcare Foundation, versioni 7.1.1, 7.2.2
Oracle Healthcare Translational Research, versioni 3.1.0, 3.2.1, 3.3.1
Oracle Hospitality Cruise Dining Room Management, versione 8.0.80
Oracle Hospitality Guest Access, versioni 4.2.0, 4.2.1
Oracle Hospitality Materials Control, versione 18.1
Oracle Hospitality Reporting and Analytics, versione 9.1.0
Oracle Hospitality RES 3700, versione 5.7
Oracle Java SE, versioni 7u231, 8u221, 11.0.4, 13
Oracle Java SE Embedded, versione 8u221
Oracle JDeveloper and ADF, versioni 11.1.1.9.0, 11.1.2.4.0, 12.1.3.0.0,
12.2.1.3.0
Oracle NoSQL Database, versioni prior to 19.3.12
Oracle Outside In Technology, versione 8.5.4
Oracle Policy Automation, versioni 10.4.7, 12.1.0, 12.1.1, 12.2.0-12.2.15
Oracle Policy Automation Connector for Siebel, versione 10.4.6
Oracle Policy Automation for Mobile Devices, versioni 12.2.0-12.2.15
Oracle Retail Customer Insights, versioni 15.0, 16.0
Oracle Retail Customer Management and Segmentation Foundation, versione 17.0
Oracle Retail Integration Bus, versioni 15.0, 16.0
Oracle Retail Xstore Office, versione 7.1
Oracle Retail Xstore Point of Service, versioni 7.1, 15.0, 16.0, 17.0,
17.0.3, 18.0, 18.0.1, 19.0.0
Oracle Service Bus, versioni 11.1.1.9.0, 12.1.3.0.0, 12.2.1.3.0
Oracle SOA Suite, versione 12.2.1.3.0
Oracle Solaris, versioni 10, 11
Oracle Virtual Directory, versione 11.1.1.9.0
Oracle VM VirtualBox, versioni precedenti a 5.2.34, precedenti a 6.0.14
Oracle Web Services, versione 12.2.1.3.0
Oracle WebCenter Portal, versione 12.2.1.3.0
Oracle WebLogic Server, versioni 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0
PeopleSoft Enterprise HCM Human Resources, versione 9.2
PeopleSoft Enterprise PeopleTools, versioni 8.56, 8.57
PeopleSoft Enterprise SCM eProcurement, versione 9.2
Primavera Gateway, versioni 15.2, 16.2, 17.12, 18.8
Primavera P6 Enterprise Project Portfolio Management, versioni
15.1.0-15.2.18, 16.1.0-16.2.18, 17.1.0-17.12.14, 18.1.0-18.8.13
Primavera Unifier, versioni 16.1, 16.2, 17.7-17.12, 18.8
Siebel Applications, versioni 19.8 e precedenti
:: Impatto
Denial of Service
Escalation di privilegi
Esecuzione di codice arbitrario da remoto
Compromissione di un sistema
Accesso a dati sensibili
:: Soluzioni
Applicare le patch appropriate o procedere all'opportuno aggiornamento
secondo le istruzioni rilasciate da Oracle (vedere link nei Riferimenti)
:: Riferimenti
Oracle Critical Patch Update Advisory - October 2019
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Oracle Critical Patch Updates, Security Alerts and Bulletins
https://www.oracle.com/technetwork/topics/security/alerts-086861.html
US-CERT
https://www.us-cert.gov/ncas/current-activity/2019/10/15/oracle-releases-october-2019-security-bulletin
CERT Nazionale
https://www.certnazionale.it/news/2019/10/16/aggiornamenti-di-sicurezza-critici-per-prodotti-oracle-ottobre-2019/
CERT-PA
https://www.cert-pa.it/notizie/oracle-rilascia-219-patch-di-sicurezza/
Mitre CVE
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2015-5180
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2015-9251
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2016-0729
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2016-1000031
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2016-4000
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2016-6814
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2016-7103
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2017-12626
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2017-17558
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2017-5645
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2017-6056
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-0732
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-1000007
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-11784
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-12404
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-14721
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-15756
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-18066
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-19362
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-2875
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-3300
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-7185
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-8037
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-0188
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-0211
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-0227
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-0232
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-10072
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-10247
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-11068
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-11358
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-12086
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-12814
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-14379
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-1543
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-1547
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-1549
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-1559
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-17091
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2734
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2765
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2872
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2883
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2884
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2886
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2887
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2888
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2889
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2890
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2891
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2894
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2895
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2896
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2897
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2898
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2899
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2900
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2901
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2902
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2903
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2904
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2905
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2906
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2907
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2909
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2910
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2911
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2913
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2914
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2915
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2920
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2922
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2923
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2924
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2925
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2926
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2927
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2929
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2930
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2931
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2932
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2933
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2934
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2935
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2936
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2937
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2938
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2939
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2940
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2941
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2942
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2943
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2944
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2945
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2946
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2947
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2948
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2949
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2950
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2951
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2952
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2953
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2954
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2955
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2956
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2957
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2958
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2959
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2960
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2961
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2962
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2963
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2964
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2965
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2966
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2967
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2968
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2969
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2970
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2971
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2972
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2973
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2974
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2975
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2976
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2977
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2978
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2979
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2980
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2981
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2982
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2983
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2984
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2985
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2986
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2987
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2988
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2989
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2990
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2991
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2992
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2993
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2994
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2995
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2996
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2997
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2998
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2999
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3000
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3001
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3002
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3003
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3004
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3005
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3008
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3009
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3010
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3011
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3012
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3014
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3015
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3017
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3018
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3019
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3020
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3021
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3022
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3023
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3024
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3025
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3026
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3027
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3028
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3031
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3862
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-5443
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-6109
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-8457
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-9511
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-9517
GARR CERT Security Alert - subscribe/unsubscribe:
https://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCXahO2QAKCRDBnEyTZRJg
Qi9sAKCeo8CGrLMgnT9XyAlkrhIqn9ZpcACdGuyCI+88MLWPLkAnSU3ffRNH6YM=
=YIUC
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-19108
Data : 17 Ottobre 2019
Titolo : Oracle Critical Patch Update Advisory October 2019
******************************************************************
:: Descrizione del problema
Oracle ha rilasciato la Critical Patch Update October 2019.
L'aggiornamento risolve 219 vulnerabilita', alcune sfruttabili
da un attaccante remoto per provocare condizioni di denial of service,
rivelare informazioni sensibili, manomettere e oltrepassare restrizioni
di sicurezza su un sistema che ne sia affetto.
Oracle raccomanda di applicare gli aggiornamenti appena possibile.
:: Software interessato
Agile Recipe Management for Pharmaceuticals, versioni 9.3.3, 9.3.4
Diagnostic Assistant, versione 2.12.36
Enterprise Manager Base Platform, versioni 13.2, 13.3
Enterprise Manager for Exadata, versioni 12.1.0.5.0, 13.2.2.0.0,
13.3.1.0.0, 13.3.2.0.0
Enterprise Manager Ops Center, versioni 12.3.3, 12.4.0
Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers, versioni
precedenti a XCP2361, precedenti a XCP3071
Hyperion Data Relationship Management, versione 11.1.2.4
Hyperion Enterprise Performance Management Architect, versione 11.1.2.4
Hyperion Financial Reporting, versione 11.1.2.4
Instantis EnterpriseTrack, versioni 17.1, 17.2, 17.3
JD Edwards EnterpriseOne Tools, versione 4.0.1.0
MICROS Relate CRM Software, versioni 7.1.0, 11.4, 15.0.0, 16.0.0,
17.0.0, 18.0.0
MICROS Retail XBRi Loss Prevention, versione 10.8.3
MySQL Connectors, versioni 5.3.13 e precedenti, 8.0.17 e precedenti
MySQL Enterprise Monitor, versioni 8.0.17 e precedenti
MySQL Server, versioni 5.6.45 e precedenti, 5.7.27 e precedenti, 8.17 e
precedenti
MySQL Workbench, versioni 8.0.17 e precedenti
Oracle Agile PLM, versioni 9.3.3-9.3.6
Oracle Agile Product Lifecycle Management for Process, versioni 6.2.0.0,
6.2.1.0, 6.2.2.0, 6.2.3.0
Oracle API Gateway, versione 11.1.2.4.0
Oracle Application Testing Suite, versioni 13.2, 13.3
Oracle Banking Digital Experience, versioni 18.1, 18.2, 18.3, 19.1
Oracle Banking Platform, versioni 2.4.0, 2.4.1, 2.5.0, 2.6.0, 2.6.1,
2.7.0, 2.7.1
Oracle BI Publisher, versioni 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0
Oracle Business Intelligence Enterprise Edition, versioni 11.1.1.9.0,
12.2.1.3.0, 12.2.1.4.0
Oracle Clusterware, versione 19.0.0.0.0
Oracle Data Integrator, versione 12.2.1.3.0
Oracle Database Server, versioni 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, 19c
Oracle E-Business Suite, versioni 12.1.1-12.1.3, 12.2.3-12.2.9
Oracle Enterprise Repository, versione 12.1.3.0.0
Oracle Financial Services Analytical Applications Infrastructure,
versioni 8.0.2-8.0.8
Oracle Financial Services Enterprise Financial Performance Analytics,
versioni 8.0.6, 8.0.7
Oracle Financial Services Retail Performance Analytics, versioni 8.0.6,
8.0.7
Oracle FLEXCUBE Direct Banking, versioni 12.0.2, 12.0.3
Oracle Forms, versione 12.2.1.3.0
Oracle GoldenGate Application Adapters, versione 12.3.2.1.0
Oracle GraalVM Enterprise Edition, versione 19.2.0
Oracle Healthcare Foundation, versioni 7.1.1, 7.2.2
Oracle Healthcare Translational Research, versioni 3.1.0, 3.2.1, 3.3.1
Oracle Hospitality Cruise Dining Room Management, versione 8.0.80
Oracle Hospitality Guest Access, versioni 4.2.0, 4.2.1
Oracle Hospitality Materials Control, versione 18.1
Oracle Hospitality Reporting and Analytics, versione 9.1.0
Oracle Hospitality RES 3700, versione 5.7
Oracle Java SE, versioni 7u231, 8u221, 11.0.4, 13
Oracle Java SE Embedded, versione 8u221
Oracle JDeveloper and ADF, versioni 11.1.1.9.0, 11.1.2.4.0, 12.1.3.0.0,
12.2.1.3.0
Oracle NoSQL Database, versioni prior to 19.3.12
Oracle Outside In Technology, versione 8.5.4
Oracle Policy Automation, versioni 10.4.7, 12.1.0, 12.1.1, 12.2.0-12.2.15
Oracle Policy Automation Connector for Siebel, versione 10.4.6
Oracle Policy Automation for Mobile Devices, versioni 12.2.0-12.2.15
Oracle Retail Customer Insights, versioni 15.0, 16.0
Oracle Retail Customer Management and Segmentation Foundation, versione 17.0
Oracle Retail Integration Bus, versioni 15.0, 16.0
Oracle Retail Xstore Office, versione 7.1
Oracle Retail Xstore Point of Service, versioni 7.1, 15.0, 16.0, 17.0,
17.0.3, 18.0, 18.0.1, 19.0.0
Oracle Service Bus, versioni 11.1.1.9.0, 12.1.3.0.0, 12.2.1.3.0
Oracle SOA Suite, versione 12.2.1.3.0
Oracle Solaris, versioni 10, 11
Oracle Virtual Directory, versione 11.1.1.9.0
Oracle VM VirtualBox, versioni precedenti a 5.2.34, precedenti a 6.0.14
Oracle Web Services, versione 12.2.1.3.0
Oracle WebCenter Portal, versione 12.2.1.3.0
Oracle WebLogic Server, versioni 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0
PeopleSoft Enterprise HCM Human Resources, versione 9.2
PeopleSoft Enterprise PeopleTools, versioni 8.56, 8.57
PeopleSoft Enterprise SCM eProcurement, versione 9.2
Primavera Gateway, versioni 15.2, 16.2, 17.12, 18.8
Primavera P6 Enterprise Project Portfolio Management, versioni
15.1.0-15.2.18, 16.1.0-16.2.18, 17.1.0-17.12.14, 18.1.0-18.8.13
Primavera Unifier, versioni 16.1, 16.2, 17.7-17.12, 18.8
Siebel Applications, versioni 19.8 e precedenti
:: Impatto
Denial of Service
Escalation di privilegi
Esecuzione di codice arbitrario da remoto
Compromissione di un sistema
Accesso a dati sensibili
:: Soluzioni
Applicare le patch appropriate o procedere all'opportuno aggiornamento
secondo le istruzioni rilasciate da Oracle (vedere link nei Riferimenti)
:: Riferimenti
Oracle Critical Patch Update Advisory - October 2019
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Oracle Critical Patch Updates, Security Alerts and Bulletins
https://www.oracle.com/technetwork/topics/security/alerts-086861.html
US-CERT
https://www.us-cert.gov/ncas/current-activity/2019/10/15/oracle-releases-october-2019-security-bulletin
CERT Nazionale
https://www.certnazionale.it/news/2019/10/16/aggiornamenti-di-sicurezza-critici-per-prodotti-oracle-ottobre-2019/
CERT-PA
https://www.cert-pa.it/notizie/oracle-rilascia-219-patch-di-sicurezza/
Mitre CVE
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2015-5180
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2015-9251
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2016-0729
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2016-1000031
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2016-4000
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2016-6814
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2016-7103
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2017-12626
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2017-17558
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2017-5645
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2017-6056
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-0732
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-1000007
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-11784
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-12404
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-14721
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-15756
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-18066
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-19362
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-2875
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-3300
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-7185
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2018-8037
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-0188
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-0211
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-0227
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-0232
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-10072
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-10247
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-11068
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-11358
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-12086
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-12814
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-14379
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-1543
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-1547
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-1549
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-1559
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-17091
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2734
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2765
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2872
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2883
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2884
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2886
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2887
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2888
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2889
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2890
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2891
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2894
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2895
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2896
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2897
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2898
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2899
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2900
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2901
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2902
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2903
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2904
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2905
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2906
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2907
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2909
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2910
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2911
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2913
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2914
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2915
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2920
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2922
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2923
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2924
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2925
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2926
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2927
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2929
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2930
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2931
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2932
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2933
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2934
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2935
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2936
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2937
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2938
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2939
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2940
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2941
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2942
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2943
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2944
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2945
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2946
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2947
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2948
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2949
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2950
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2951
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2952
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2953
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2954
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2955
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2956
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2957
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2958
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2959
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2960
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2961
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2962
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2963
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2964
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2965
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2966
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2967
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2968
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2969
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2970
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2971
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2972
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2973
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2974
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2975
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2976
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2977
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2978
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2979
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2980
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2981
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2982
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2983
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2984
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2985
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2986
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2987
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2988
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2989
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2990
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2991
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2992
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2993
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2994
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2995
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2996
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2997
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2998
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-2999
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3000
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3001
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3002
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3003
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3004
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3005
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3008
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3009
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3010
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3011
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3012
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3014
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3015
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3017
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3018
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3019
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3020
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3021
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3022
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3023
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3024
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3025
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3026
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3027
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3028
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3031
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-3862
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-5443
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-6109
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-8457
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-9511
http://cve.mitre.prg/cgi-bin/cvename.cgi?name=CVE-2019-9517
GARR CERT Security Alert - subscribe/unsubscribe:
https://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCXahO2QAKCRDBnEyTZRJg
Qi9sAKCeo8CGrLMgnT9XyAlkrhIqn9ZpcACdGuyCI+88MLWPLkAnSU3ffRNH6YM=
=YIUC
-----END PGP SIGNATURE-----