{"id":1255,"date":"2013-07-23T07:57:52","date_gmt":"2013-07-23T05:57:52","guid":{"rendered":"http:\/\/www.oradba.ch\/?p=1255"},"modified":"2013-10-16T09:12:08","modified_gmt":"2013-10-16T07:12:08","slug":"oracle-released-cpu-psu-july-2013","status":"publish","type":"post","link":"https:\/\/www.oradba.ch\/wordpress\/2013\/07\/oracle-released-cpu-psu-july-2013\/","title":{"rendered":"Oracle released CPU \/ PSU July 2013"},"content":{"rendered":"<p>About a week ago Oracle has released the July Critical Patch Updates. Overall this CPU contains 89 new security fixes across several Oracle products like Database Server, MySQL Server, Sun Product Suite, WebLogic Server etc. For Oracle Database Server it does contain 6 fixes, but none of them is for client-only installation. 1 of these vulnerabilities may be remotely exploitable without authentication. According the Database risk matrix all supported versions are affected. Since the critical patch update does mainly fix vulnerabilities in the core RDBMS and Oracle executables, it is worth to have a closer look. I&#8217;ll test the critical patch update on my test systems as usual. But I do not expect problems, since MOS Note <a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=1546428.1\">1546428.1<\/a> does not yet list any known issues. Be aware that Critical Patch Update (CPU) are usually cumulative and do contain previous security fixes. If you do not regularly apply Critical Patch Updates, it is essential to check previous patch notes.<\/p>\n<h3>First Testing<\/h3>\n<p>The Critical Patch Update could easily be installed on Linux x86-64bit, but opatch does fail with a few warnings. None of them prevents a successful installation. According to the <a href=\"https:\/\/updates.oracle.com\/Orion\/Services\/download?type=readme&#038;aru=16430195#CHDECEJC\">Known Issues<\/a> section in the Patch ReadMe and the two Metalink Notes <a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=1448337.1\">1448337.1<\/a> and <a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=854711.1\">854711.1<\/a> the output can be safely ignored.<\/p>\n<h3>First Findings<\/h3>\n<p>After installing the patch and run catbundle I could identify a few changes on the hidden parameters. The following hidden parameters have been updated on my test system<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"sql\">\nSQL&gt; @hip _db_flash_cache_keep_limit\n\nParameter                  Session Instance   S I D Description\n-------------------------- ------- ---------- - - - --------------------------------------------------\n_db_flash_cache_keep_limit         217751120        Flash cache keep buffer upper limit in percentage\n\nSQL&gt; @hip _fastpin_enable\n\nParameter                 Session Instance   S I D Description\n------------------------- ------- ---------- - - - --------------------------------------------------\n_fastpin_enable                   217827585        enable reference count based fast pins\n<\/pre>\n<p>The following hidden parameter has been removed<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"sql\">\nSQL&gt; @hip _db_flash_cache_keep_limit\n\nParameter                   Session Instance   S I D Description\n--------------------------- ------- ---------- - - - --------------------------------------------------\n_thirteenth_spare_parameter                          thirteenth spare parameter - string\n<\/pre>\n<p>But the strange thing is, the following new hidden parameters.<\/p>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"sql\">\nSQL&gt; @hip _july2013_cpu_admin_user_fix\n\nParameter                    Session Instance   S I D Description\n---------------------------- ------- ---------- - - - --------------------------------------------------\n_july2013_cpu_admin_user_fix                          july2013 cpu admin user fix\n<\/pre>\n<p>So far I could not figure out the purpose of <em>_july2013_cpu_admin_user_fix<\/em> parameter. It look&#8217;s somehow like a temporary fix for something. I assume it will disappear in the next Critical Patch Update on october 2014. <\/p>\n<h3>CPU Release Dates<\/h3>\n<p>The next four Critical Patch Updates will be released at the following dates:<\/p>\n<ul>\n<li>15 October 2013<\/li>\n<li>14 January 2014<\/li>\n<li>15 April 2014<\/li>\n<li>15 July 2014<\/li>\n<\/ul>\n<h3>References<\/h3>\n<p>Links all around Critical Patch Update:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.oracle.com\/technetwork\/topics\/security\/alerts-086861.html\">Oracle Critical Patch Update Advisory &#8211; July 2013<\/a><\/li>\n<li>Patch Set Update and Critical Patch Update July 2013 Availability Document [<em><a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=1548709.1\">1548709.1<\/a><\/em>]<\/li>\n<li>Critical Patch Update July 2013 Database Known Issues [<em><a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=1546428.1\">1546428.1<\/a><\/em>]<\/li>\n<li>Opatch warning: overriding commands for target xxxx [<em><a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=1448337.1\">1448337.1<\/a><\/em>]<\/li>\n<li>Oracle Critical Patch Update July 2013 Documentation Map [<em><a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=1563067.1\">1563067.1<\/a><\/em>]<\/li>\n<li>Use of Common Vulnerability Scoring System (CVSS) by Oracle [<em><a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=394487.1\">394487.1<\/a><\/em>]<\/li>\n<li>Risk Matrix Glossary &#8212; terms and definitions for Critical Patch Update risk matrices [<em><a href=\"https:\/\/support.oracle.com\/epmos\/faces\/DocumentDisplay?id=394486.1\">394486.1<\/a><\/em>]<\/li>\n<li>Oracle Critical Patch Updates and Security Alerts on <a href=\"http:\/\/www.oracle.com\/technetwork\/topics\/security\/alerts-086861.html\">OTN<\/a> including links to Critical Patch Update since january 2005<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>About a week ago Oracle has released the July Critical Patch Updates. Overall this CPU contains 89 new security fixes across several Oracle products like Database Server, MySQL Server, Sun Product Suite, WebLogic Server etc. For Oracle Database Server it does contain 6 fixes, but none of them is for client-only installation. 1 of these [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6,7,8,46,5,114,11,116],"tags":[18],"class_list":["post-1255","post","type-post","status-publish","format-standard","hentry","category-10gr2","category-11gr1","category-11gr2","category-cpu","category-oracle-database","category-psu-2","category-security","category-spu","tag-trivadiscontent"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1aErb-kf","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2168,"url":"https:\/\/www.oradba.ch\/wordpress\/2016\/07\/oracle-cpu-psu-pre-release-announcement-july-2016\/","url_meta":{"origin":1255,"position":0},"title":"Oracle CPU \/ PSU Pre-Release Announcement July 2016","author":"Stefan","date":"15. July 2016","format":false,"excerpt":"Oracle has published the Pre-Release Announcement for the July 2016 Critical Patch Update. It's quite a huge update with not less than 276 security vulnerability fixes across the Oracle products. For the Oracle Database itself are 9 security fixes available. Dies ist wiederum eines der gr\u00f6\u00dferen Critical Patch Update for\u2026","rel":"","context":"In &quot;11gR2&quot;","block_context":{"text":"11gR2","link":"https:\/\/www.oradba.ch\/wordpress\/category\/oracle-database\/11gr2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2686,"url":"https:\/\/www.oradba.ch\/wordpress\/2018\/07\/oracle-cpu-psu-pre-release-announcement-july-2018\/","url_meta":{"origin":1255,"position":1},"title":"Oracle CPU \/ PSU Pre-Release Announcement July 2018","author":"Stefan","date":"13. July 2018","format":false,"excerpt":"Today Oracle has published the Pre-Release Announcement for the July 2018 Critical Patch Update. It's quite a heavy update with not less than 334 security vulnerability fixes across the Oracle products. The Oracle database is relatively prominently represented with 3 security vulnerabilities and a maximal CVSS rating of 9.8. Of\u2026","rel":"","context":"In &quot;11gR2&quot;","block_context":{"text":"11gR2","link":"https:\/\/www.oradba.ch\/wordpress\/category\/oracle-database\/11gr2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1806,"url":"https:\/\/www.oradba.ch\/wordpress\/2014\/07\/oracle-cpu-psu-pre-release-announcement-july-2014\/","url_meta":{"origin":1255,"position":2},"title":"Oracle CPU \/ PSU Pre-Release Announcement July 2014","author":"Stefan","date":"11. July 2014","format":false,"excerpt":"Oracle has published the Pre-Release Announcement for the July 2014 Critical Patch Update. It looks like that the next Critical Patch Update is somewhat more extensive from the database point of view. It does contain six bug fix for some major security issues. Some of the vulnerabilities may be remotely\u2026","rel":"","context":"In &quot;11gR2&quot;","block_context":{"text":"11gR2","link":"https:\/\/www.oradba.ch\/wordpress\/category\/oracle-database\/11gr2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":788,"url":"https:\/\/www.oradba.ch\/wordpress\/2012\/05\/important-links-around-the-oracle-cpu-psu-april-2012\/","url_meta":{"origin":1255,"position":3},"title":"Important links around the Oracle CPU \/ PSU April 2012","author":"Stefan","date":"8. May 2012","format":false,"excerpt":"A few weeks ago oracle officially released the CPU \/ PSU Patches for April 2012. The Critical Patch Updates contains 88 security fixes across all products. But only 6 out of this 88 fixes are for Oracle databases. This post will summarize a bit the information and links around this\u2026","rel":"","context":"In &quot;Critical Patch Update&quot;","block_context":{"text":"Critical Patch Update","link":"https:\/\/www.oradba.ch\/wordpress\/category\/patches\/cpu\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":683,"url":"https:\/\/www.oradba.ch\/wordpress\/2011\/10\/oracle-cpu-psu-pre-release-announcement-october-2011\/","url_meta":{"origin":1255,"position":4},"title":"Oracle CPU \/ PSU Pre-Release Announcement October 2011","author":"Stefan","date":"14. October 2011","format":false,"excerpt":"Oracle has recently published the Pre-Release Announcement for the CPU Patch. This Critical Patch Update contains 56 new security vulnerability fixes for several Oracle products. 4 of these fixes are just for the Oracle Database Server.","rel":"","context":"In &quot;10gR2&quot;","block_context":{"text":"10gR2","link":"https:\/\/www.oradba.ch\/wordpress\/category\/oracle-database\/10gr2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":757,"url":"https:\/\/www.oradba.ch\/wordpress\/2012\/01\/update-oracle-released-cpu-psu-january-2012\/","url_meta":{"origin":1255,"position":5},"title":"Update: Oracle released CPU \/ PSU January 2012","author":"Stefan","date":"24. January 2012","format":false,"excerpt":"Oracle has officially released the CPU \/ PSU Patches for january 2012. The Critical Patch Updates contains 78 security fixes across all products. But only two out of this 78 fixes are for Oracle databases.","rel":"","context":"In &quot;11gR1&quot;","block_context":{"text":"11gR1","link":"https:\/\/www.oradba.ch\/wordpress\/category\/oracle-database\/11gr1\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/1255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/comments?post=1255"}],"version-history":[{"count":4,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/1255\/revisions"}],"predecessor-version":[{"id":1513,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/posts\/1255\/revisions\/1513"}],"wp:attachment":[{"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/media?parent=1255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/categories?post=1255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oradba.ch\/wordpress\/wp-json\/wp\/v2\/tags?post=1255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}