-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2013-0058 Title: Oracle Critical Patch Update Advisory Version history: 02.08.2013 Initial publication Summary ======= The Oracle Critical Patch Update for July 2013 [1] were released. Oracle strongly recommends applying the patches as soon as possible. Vulnerable systems ================== Oracle Database 11g Release 2, versions 11.2.0.2, 11.2.0.3 Oracle Database 11g Release 1, version 11.1.0.7 Oracle Database 10g Release 2, versions 10.2.0.4, 10.2.0.5 Oracle Access Manager, versions 11.1.1.5.0, 11.1.1.7.0, 11.1.2.0.0 Oracle Endeca Server, versions 7.4.0, 7.5.1.1 Oracle HTTP Server, versions 10.1.3.5.0 Oracle JRockit, versions R27.7.5 and earlier, R28.2.7 and earlier Oracle Outside In Technology, versions 8.3.7, 8.4.0, 8.4.1 Oracle WebCenter Content, versions 10.1.3.5.1, 11.1.1.6.0, 11.1.1.7.0 Oracle Hyperion BI, versions 11.1.1.3, 11.1.1.4.107 and earlier, 11.1.2.1.129 and earlier, 11.1.2.2.305 and earlier Enterprise Manager Plugin for Database 12c Release 1, versions 12.1.0.2, 12.1.0.3 Enterprise Manager Grid Control 11g Release 1, version 11.1.0.1 Enterprise Manager Grid Control 10g Release 1, version 10.2.0.5 Oracle E-Business Suite Release 12i, versions 12.0.6, 12.1.1, 12.1.2, 12.1.3 Oracle E-Business Suite Release 11i, version 11.5.10.2 Oracle Agile Collaboration Framework, version 9.3.1 Oracle Agile PLM Framework, version 9.3.1 Oracle Agile Product Framework, version 9.3.1 Oracle PeopleSoft Enterprise Portal, version 9.1 Oracle PeopleSoft HRMS, version 9.1 Oracle PeopleSoft PeopleTools, versions 8.51, 8.52, 8.53 Oracle iLearning, versions 5.2.1, 6.0 Oracle Policy Automation, versions 10.2.0, 10.3.0, 10.3.1, 10.4.0, 10.4.1, 10.4.2 Oracle Solaris versions 8, 9, 10, 11.1 Oracle Solaris Cluster versions 3.2, 3.3, 4 prior to 4.1 SRU 3 Oracle SPARC Enterprise M Series Servers Firmware version XCP 1114 and earlier Oracle Secure Global Desktop, versions 4.6 prior to 4.63, 4.7 prior to 4.71 Oracle MySQL Server, versions 5.1, 5.5, 5.6 What can you do? ================ Patches are available in [1]. What to tell your users? ======================== N/A More information ================ [1] http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html Best regards, CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 Privacy Statement: http://cert.europa.eu/cert/plainedition/en/cert_privacy.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJR+3wIAAoJEPpzpNLI8SVoX10P/iNcK+FUk1OtLYkObJDXWlDN flaQBS2nKPwkhwISzydyZpWETIY5rlRtcq79YbMCQT55w6f81YApHn3OTRzKHd6x Qy3cKGhGrZeBa6vGSivhuRvY9ntj+4qQHReQpv1kLBJ0SWCCOtlgnBrOXPp/tLY8 UX5oBMYevB1k2jjxE3ibQEzbRlat61u9Pof+FpNScUDh37v2I3QnwwcnmNO1ieEo qkVebcTXUiDDaNEwcDVz5cPXi26CYsw0SsadpoKb0YIyA2avkPTUZvsv1SbPdp57 IMXbS3F2oZylnYrh9SeJSwtfMhl3BkOKFLnT50xgYDcw/4UZZd0TzlYvZm6gBavL ietdPFAc4tQfiHzQJ0VQOT6x8wn+geYjekq5BSnI7QNLN/PvXqa8UyXdoAq9dRLv kY6vAi2goRHQe3PPql5zO5HZC+hBo6O+DhOTSKvdim31jHwOY6YJ3BYK7tI6rqk5 SAEaZOBCrIbD7ONYgaXr0cQKN5FFIo70cCwJtFYoU9lRTfoIxEInTYFZVT3WjNfd bS5QoUvBMebP4xvFodjxfnUIgItRCWSx/KQW2k9SKlOAqpCe4oj3HIxlCgYgU264 NFRnuYRrCPulcIPbjM+XTXMGnaQl28E+OV88daA+Mi+asBbbmusLSdkfs1mFC86f yn807u8HNzqTvuEn0OCL =OU7s -----END PGP SIGNATURE-----