Re: java exploits
From: Seth Miller <sethmiller.sm_at_gmail.com>
Date: Thu, 16 Oct 2014 22:06:58 -0500
Message-ID: <CAEueRAX8uDJWH=kmeKJPNQ9GmMo5TY0VHDTCXAXzNuqBn=2o4Q_at_mail.gmail.com>
Unfortunately, this latest PSU is not RAC-rolling capable so plan accordingly.
https://blogs.oracle.com/security/entry/october_2014_critical_patch_update
Date: Thu, 16 Oct 2014 22:06:58 -0500
Message-ID: <CAEueRAX8uDJWH=kmeKJPNQ9GmMo5TY0VHDTCXAXzNuqBn=2o4Q_at_mail.gmail.com>
Unfortunately, this latest PSU is not RAC-rolling capable so plan accordingly.
https://blogs.oracle.com/security/entry/october_2014_critical_patch_update
Seth Miller
On Wed, Oct 15, 2014 at 11:21 AM, Ls Cheng <exriscer_at_gmail.com> wrote:
> great!
>
> We were looking into applying the first OJVM PSU and we found nowhere
> about the fixes
>
> Thanks for the link
>
>
> On Wed, Oct 15, 2014 at 3:43 PM, Ray Stell <stellr_at_vt.edu> wrote:
>
>> "Java exploits make it in particular easy to elevate privileges to an
>> administrator role in the environment of Oracle Database software."
>>
>> "Oracle Oct 2014 CPU addresses 22 security issues affecting Java VM
>> implementation embedded in Oracle Database software."
>>
>> http://www.securityfocus.com/archive/1/533693/30/0/threaded
>>
>
>
-- http://www.freelists.org/webpage/oracle-lReceived on Fri Oct 17 2014 - 05:06:58 CEST