Oracle Critical Patch Update Advisory - October 2013

Number: AV13-038
Date: 17 October 2013


The purpose of this advisory is to bring attention to the following critical patch update released for Oracle.


Oracle has issued a Critical Patch Update (CPU) which addresses 127 new security fixes (including 51 Java fixes) across multiple Oracle products.

Affected products and versions:

Oracle Database 11g Release 1, version
Oracle Database 11g Release 2, versions,
Oracle Database 12c Release 1, version
Oracle Fusion Middleware 11g Release 1, versions,
Oracle Access Manager, versions,
Oracle Forms and Reports 11g, Release 2, version
Oracle GlassFish Server, versions 2.1.1, 3.0.1, 3.1.2
Oracle HTTP Server 12c, version 12.1.2
Oracle Identity Analytics, version; Sun Role Manager, versions 4.1, 5.0
Oracle Identity Manager, versions,
Oracle JDeveloper, versions,,
Oracle Outside In Technology, versions 8.4.0, 8.4.1
Oracle Portal, version
Oracle Web Cache, versions,
Oracle WebCenter Content, versions,,,
Oracle WebLogic Server, versions,
Oracle Web Services, versions,
Oracle Enterprise Manager Grid Control 10g Release 1, version
Oracle Enterprise Manager Grid Control 11g Release 1, version
Oracle Enterprise Manager Plugin for Database 12c Release 1, versions,,
Oracle E-Business Suite Release 12i, version 12.1
Oracle Agile PLM Framework, version 9.3.2
Oracle Transportation Management, versions 6.2, 6.3, 6.3.1, 6.3.2
Oracle PeopleSoft HRMS, version 9.1
Oracle PeopleSoft HRMS eCompensation, versions 9.1, 9.2
Oracle PeopleSoft PeopleTools, versions 8.51, 8.52, 8.53
Oracle Siebel Core, versions 8.1.1, 8.2.2
Oracle Siebel Server Remote, versions 8.1.1, 8.2.2
Oracle Siebel UI Framework, versions 8.1.1, 8.2.2
Oracle iLearning, versions 5.2.1, 6.0
Oracle Health Sciences InForm, versions 4.5.x, 4.6.x, 5.0.x, 5.5.x and 6.0.0
Oracle Siebel CTMS, version 8.1.1.x
Oracle Retail Invoice Matching, versions 10.2, 11.0, 12.0, 12.0IN, 12.1, 13.0, 13.1, 13.2
Oracle FLEXCUBE Private Banking, versions 1.7, 2.0, 2.0.1,, 3.0, 12.0.1
Oracle Instantis EnterpriseTrack, versions 8.0.6, 8.5
Oracle Primavera P6 Enterprise Project Portfolio Management, versions 8.1, 8.2, 8.3
Oracle JavaFX, versions 2.2.40 and earlier
Oracle Java JDK and JRE, versions 5.0u51 and earlier, 6u60 and earlier, 7u40 and earlier
Oracle Java SE Embedded, versions 7u40 and earlier
Oracle JRockit, versions R27.7.6 and earlier, R28.2.8 and earlier
Oracle Solaris versions 10, 11.1
Oracle SPARC Enterprise T series and M Series Servers Firmware versions prior to 6.7.13, 7.4.6.c, 8.3.0.b, 9.0.0.d, 9.0.1.e
Oracle Sun Blade 6000 10GBE switched NEM 1.2, Sun Network 10GBE Switch 72P 1.2, Oracle Switch ES1-24 1.3
Oracle Secure Global Desktop, version 5
Oracle VM VirtualBox, versions prior to 3.2.18, 4.0.20, 4.1.28, 4.2.18
Oracle MySQL Server, versions 5.1, 5.5, 5.6
Oracle MySQL Enterprise Monitor, version 2.3

Suggested action

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible.

CCIRC recommends that system administrators identify their affected assets and potential interdependencies with their organization's critical services, and follow their patch management process accordingly.


Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589

Date modified: