技术开发 频道

2009年4月甲骨文重要安全补丁更新建议

Patch Availability Table and Risk Matrices

Products with Cumulative Patches

The Oracle Database, Oracle Application Server, Oracle Enterprise Manager Grid Control, Oracle E-Business Suite Applications (Release 12 only), JD Edwards EnterpriseOne, JD Edwards OneWorld Tools, PeopleSoft Enterprise Portal Applications, PeopleSoft Enterprise PeopleTools and Siebel Enterprise patches in the Updates are cumulative; patches for any of these products included in a Critical Patch Update will include all fixes for that product from the previous Critical Patch Updates.

Products with Non-Cumulative Patches

Oracle E-Business Suite Applications Release 11i patches are not cumulative, so Oracle E-Business Suite Applications customers should refer to previous Critical Patch Updates to identify previous security fixes they want to apply. Oracle Collaboration Suite patches were cumulative up to and including the fixes provided in the July 2007 Critical Patch Update. From the July 2007 Critical Patch Update on, Oracle Collaboration Suite security fixes are delivered using the one-off patch infrastructure normally used by Oracle to deliver single bug fixes to customers. Patches for BEA products are not cumulative (unless otherwise stated), so BEA customers should refer to previous Security Advisories to identify previous security fixes they want to apply.

For each administered Oracle product, consult the documentation for patch availability information and installation instructions referenced from the following table. For an overview of the Oracle product documentation related to this Critical Patch Update, please refer to the Oracle Critical Patch Update April 2009 Documentation Map, My Oracle Support Note 798344.1.

ProductRisk MatrixPatch Availability and Installation Information
Oracle DatabaseAppendix - Oracle Database Risk MatrixCritical Patch Update April 2009 Patch Availability Document for Oracle Products, My Oracle Support Note 786800.1
Oracle Application ServerAppendix - Oracle Application Server Risk MatrixCritical Patch Update April 2009 Patch Availability Document for Oracle Products, My Oracle Support Note 786800.1
Oracle Collaboration Suite
Beehive Collaboration Software
Oracle Enterprise Manager
No security fixes for CPU Apr 2009.
See Appendix - Product Dependencies to apply patches for dependent products.
Critical Patch Update April 2009 Patch Availability Document for Oracle Products, My Oracle Support Note 786800.1
Oracle E-Business Suite and ApplicationsAppendix - Oracle E-Business Suite and Applications Risk MatrixOracle E-Business Suite Critical Patch Update Note for April 2009 My Oracle Support Note 787703.1
Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOneAppendix - Oracle PeopleSoft and JD Edwards Applications Risk MatrixOracle PeopleSoft Enterprise and JD Edwards EnterpriseOne Advisories
Oracle Siebel EnterpriseNo security fixes for CPU Apr 2009.Oracle Siebel Enterprise Support
Oracle WebLogic Server, Portal, Data Service Integrator/AquaLogic Data Services Platform, JRockitAppendix - BEA Product Suite Risk MatrixCritical Patch Update April 2009 Patch Availability Document for Oracle Products, My Oracle Support Note 786800.1



 

 

Risk Matrix Content

 

Risk matrices list only security vulnerabilities that are newly fixed by the patches associated with this advisory. Risk matrices for previous security fixes can be found in previous Critical Patch Update advisories.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. The same vulnerability appears with the same Vuln # in all risk matrices. Italics indicate vulnerabilities in code included from other product areas.

Security vulnerabilities are scored using CVSS version 2.0 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS 2.0). Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update (CPU). Oracle does not disclose information about the security analysis, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential result of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. As a matter of policy, Oracle does not disclose detailed information about an exploit condition or results that can be used to conduct a successful exploit. Oracle will not provide additional information about the specifics of vulnerabilities beyond what is provided in the CPU or Security Alert notification, the Patch Availability Matrix, the readme files, and FAQs. Oracle does not provide advance notification on CPUs or Security Alerts to individual customers. Finally, Oracle does not distribute exploit code or “proof-of-concept” code for product vulnerabilities.

    详情:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2009.html

0
相关文章