CERT mailing list archives

Current Activity - Oracle Releases January 2013 Security Advisory


From: Current Activity <us-cert () us-cert gov>
Date: Wed, 16 Jan 2013 09:43:02 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System

US-CERT Current Activity
Oracle Releases January 2013 Security Advisory

Original release date: January 16, 2013
Last revised: --

Oracle has released its Critical Patch Update for January 2013 to
address 86 vulnerabilities across multiple products. This update
contains the following security fixes:

 * 6 for Oracle Database Server
 * 7 for Oracle Fusion Middleware
 * 13 for Oracle Enterprise Manager Grid Control
 * 9 for Oracle E-Business Suite
 * 1 for Oracle Supply Chain Products Suite
 * 12 for Oracle PeopleSoft Products
 * 1 for Oracle JD Edwards Products
 * 10 for Oracle Siebel CRM
 * 8 for Oracle Sun Products Suite
 * 1 for Oracle Visualization
 * 18 for Oracle MySQL

US-CERT encourages users and administrators to review the January 2013
Critical Patch Update and follow best-practice security policies to
determine which updates should be applied.

Relevant URL(s):
<http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html>


____________________________________________________________________

   Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/current/#oracle_releases_january_2013_security

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBUPa8a3dnhE8Qi3ZhAQKGFAgAjS4jqCcbYBRWvbxAlznmnHUXxZU0p7Kq
RDEe4VJ3sIXtF3es2VLSEpeoUWwJIsX5vg6EdXqCokhmV16do8oIdstqXlzJDUj1
EDd8IpeG4vV41nRYAhYx2U2Ko/NGgqjPCHFAFlk0Z/Z5m48TVL7kyclsytNxFUEx
KGYdwYP0qcUbkx0Vy3GJ63ROhEHgj5p052DPXr7frX+ouGxdSMYN6D6UhXfPW5Xt
4Xasluz523pIOwTLn49O5uVF95sfgcen7qIEd70xBypA1iAJV6y58Ci+zx14fd1T
KcTktcpoDN+x99wFHyeuSxKdkzY38H2ridoSEWaLKNablaJBPpRt+g==
=H6le
-----END PGP SIGNATURE-----


Current thread: