We’re sorry. We could not find a match for your search.

We suggest you try the following to help find what you’re looking for:

  • Check the spelling of your keyword search.
  • Use synonyms for the keyword you typed, for example, try "application" instead of "software."
  • Start a new search.
  • Oracle Critical Patch Update Advisory - October 2022

    Description

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.

    Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.

    This Critical Patch Update contains 370 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at October 2022 Critical Patch Update: Executive Summary and Analysis .

    Affected Products and Patch Information

    Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.

    Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.

    Application Management Pack for Oracle E-Business Suite, version 13.4.1.0.0 Oracle E-Business Suite Big Data Spatial and Graph Database Enterprise Manager Base Platform, versions 13.4.0.0, 13.5.0.0 Enterprise Manager Enterprise Manager for Virtualization, versions 13.4.0.0, 13.5.0.0 Enterprise Manager Enterprise Manager Ops Center, version 12.4.0.0 Enterprise Manager JD Edwards EnterpriseOne Orchestrator, versions 9.2.6.4 and prior JD Edwards JD Edwards EnterpriseOne Tools, versions 9.2.6.4 and prior JD Edwards MySQL Connectors, versions 8.0.30 and prior MySQL MySQL Enterprise Backup, versions 4.1.4 and prior MySQL MySQL Enterprise Monitor, versions 8.0.31 and prior MySQL MySQL Installer, versions 1.6.3 and prior MySQL MySQL Server, versions 5.7.39 and prior, 8.0.30 and prior MySQL MySQL Shell, versions 8.0.30 and prior MySQL MySQL Workbench, versions 8.0.30 and prior MySQL Oracle Access Manager, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle Agile Engineering Data Management, version 6.2.1.0 Oracle Supply Chain Products Oracle Agile PLM, version 9.3.6 Oracle Supply Chain Products Oracle Airlines Data Model Oracle Airlines Data Model Oracle Application Express Database Oracle AutoVue, version 21.0.2 Oracle Supply Chain Products Oracle Autovue for Agile Product Lifecycle Management, version 21.0.2 Oracle Supply Chain Products Oracle Banking Enterprise Default Management, version 2.12.0 Oracle Banking Platform Oracle Banking Loans Servicing, versions 2.8.0, 2.12.0 Contact Support Oracle Banking Party Management, version 2.7.0 Oracle Banking Platform Oracle Banking Platform, versions 2.7.1, 2.9.0, 2.12.0 Oracle Banking Platform Oracle BI Publisher, versions 5.9.0.0, 6.4.0.0.0, 12.2.1.3.0, 12.2.1.4.0 Oracle Analytics Oracle Business Activity Monitoring(Oracle BAM), versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle Business Intelligence Enterprise Edition, versions 5.9.0.0, 6.4.0.0 Oracle Analytics Oracle Business Process Management Suite, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle Coherence, versions 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware Oracle Commerce Platform, versions 11.3.0-11.3.2 Oracle Commerce Oracle Communications Billing and Revenue Management, versions 12.0.0.4.0-12.0.0.7.0 Oracle Communications Billing and Revenue Management Oracle Communications Cloud Native Core Binding Support Function, version 22.3.0 Oracle Communications Cloud Native Core Binding Support Function Oracle Communications Cloud Native Core Console, version 22.2.0 Oracle Communications Cloud Native Core Console Oracle Communications Cloud Native Core Network Exposure Function, versions 22.2.1, 22.3.0 Oracle Communications Cloud Native Core Network Exposure Function Oracle Communications Cloud Native Core Network Function Cloud Native Environment, versions 1.9.0, 22.1, 22.1.0, 22.2, 22.2.0, 22.2.1 Oracle Communications Cloud Native Core Network Function Cloud Native Environment Oracle Communications Cloud Native Core Network Repository Function, version 22.2.2 Oracle Communications Cloud Native Core Network Repository Function Oracle Communications Cloud Native Core Policy, version 22.3.0 Oracle Communications Cloud Native Core Policy Oracle Communications Cloud Native Core Security Edge Protection Proxy, versions 22.1.1, 22.2.0, 22.2.1, 22.3.0 Oracle Communications Cloud Native Core Security Edge Protection Proxy Oracle Communications Cloud Native Core Service Communication Proxy, versions 22.2.3, 22.3.1, 22.4.0 Oracle Communications Cloud Native Core Service Communication Proxy Oracle Communications Cloud Native Core Unified Data Repository, versions 22.1.1, 22.2.1, 22.3.0 Oracle Communications Cloud Native Core Unified Data Repository Oracle Communications Converged Application Server - Service Controller, version 6.2 Oracle Communications Converged Application Server - Service Controller Oracle Communications Convergence, version 3.0.3.0 Oracle Communications Convergence Oracle Communications Convergent Charging Controller, versions 6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0 Oracle Communications Convergent Charging Controller Oracle Communications Data Model, version 12.2.0.1 Oracle Communications Data Model Oracle Communications Design Studio, version 7.4.2 Oracle Communications Design Studio Oracle Communications Diameter Signaling Router, version 8.6.0.0 Oracle Communications Diameter Signaling Router Oracle Communications Element Manager, version 9.0 Oracle Communications Element Manager Oracle Communications Evolved Communications Application Server, version 7.1 Oracle Communications Evolved Communications Application Server Oracle Communications Instant Messaging Server, version 10.0.1.6.0 Oracle Communications Instant Messaging Server Oracle Communications Interactive Session Recorder, version 6.4 Oracle Communications Interactive Session Recorder Oracle Communications Messaging Server, version 8.1 Oracle Communications Messaging Server Oracle Communications MetaSolv Solution, version 6.3.1 Oracle Communications MetaSolv Solution Oracle Communications Network Charging and Control, versions 6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0 Oracle Communications Network Charging and Control Oracle Communications Order and Service Management, versions 7.3, 7.4 Oracle Communications Order and Service Management Oracle Communications Policy Management, version 12.6.0.0.0 Oracle Communications Policy Management Oracle Communications Pricing Design Center, versions 12.0.0.4.0-12.0.0.7.0 Oracle Communications Pricing Design Center Oracle Communications Services Gatekeeper, version 7.0.0.0.0 Oracle Communications Services Gatekeeper Oracle Communications Session Border Controller, versions 8.4, 9.0, 9.1 Oracle Communications Session Border Controller Oracle Communications Session Report Manager, version 9.0 Oracle Communications Session Report Manager Oracle Communications Unified Assurance, versions prior to 5.5.7.0.0, 6.0.0.0.0 Oracle Communications Unified Assurance Oracle Communications User Data Repository, versions 12.4.0, 12.6.0, 12.6.1 Oracle Communications User Data Repository Oracle Communications WebRTC Session Controller, versions 7.2.0, 7.2.1 Oracle Communications WebRTC Session Controller Oracle Data Integrator, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle Database Server, versions 19c, 21c Database Oracle Documaker Enterprise Edition, versions 12.6-12.7 Oracle Insurance Applications Oracle E-Business Suite, versions 12.2.3-12.2.11 Oracle E-Business Suite Oracle Enterprise Data Quality, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle Enterprise Operations Monitor, versions 4.4, 5.0 Oracle Enterprise Operations Monitor Oracle Essbase, version 21.3 Database Oracle Financial Services Analytical Applications Infrastructure, versions 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1 Oracle Financial Services Analytical Applications Infrastructure Oracle Financial Services Behavior Detection Platform, versions 8.0.7.2, 8.0.8.1, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2 Oracle Financial Services Behavior Detection Platform Oracle Financial Services Enterprise Case Management, versions 8.0.7.3, 8.0.8.2, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2 Oracle Financial Services Enterprise Case Management Oracle Financial Services Model Management and Governance, versions 8.0.8.0, 8.1.0.0, 8.1.1.0 Oracle Financial Services Model Management and Governance Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition, versions 8.0.7.0, 8.0.8.0 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition Oracle GoldenGate, version 19c Database Oracle GraalVM Enterprise Edition, versions 20.3.7, 21.3.3, 22.2.0 Java SE Oracle Healthcare Data Repository, versions 8.1.1, 8.1.2, 8.1.3 HealthCare Applications Oracle Healthcare Foundation, versions 8.1, 8.2 HealthCare Applications Oracle Healthcare Master Person Index, versions 5.0.0-5.0.3 HealthCare Applications Oracle Healthcare Translational Research, version 4.1 HealthCare Applications Oracle Hospitality Cruise Fleet Management System, version 9.1.5 Oracle Hospitality Cruise Fleet Management Oracle Hospitality Cruise Shipboard Property Management System, versions 20.2.0, 20.2.2 Oracle Hospitality Cruise Shipboard Property Management System Oracle Hospitality Suite8, versions 8.10.2, 8.11.0, 8.12.0, 8.13.0, 8.14.0 Oracle Hospitality Suite8 Oracle HTTP Server, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle Hyperion Infrastructure Technology, version 11.2.9 Oracle Enterprise Performance Management Oracle Identity Management Suite, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle Insurance Insbridge Rating and Underwriting, versions 5.2.0, 5.4.0-5.6.2 Oracle Insurance Applications Oracle Java SE, versions 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19 Java SE Oracle MapViewer, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle Middleware Common Libraries and Tools, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle NoSQL Database NoSQL Database Oracle Outside In Technology, version 8.5.6 Fusion Middleware Oracle Retail Assortment Planning, version 16.0.3 Retail Applications Oracle Retail Back Office, version 14.1 Retail Applications Oracle Retail Central Office, version 14.1 Retail Applications Oracle Retail Customer Insights, versions 15.0.2, 15.2, 16.0.2 Retail Applications Oracle Retail Customer Management and Segmentation Foundation, versions 17.0, 18.0, 19.0 Retail Applications Oracle Retail EFTLink, versions 20.0.1, 21.0.0 Retail Applications Oracle Retail Fiscal Management, version 14.2 Retail Applications Oracle Retail Merchandising System, versions 14.1.3.2, 15.0.3.1, 19.0.1 Retail Applications Oracle Retail Point Of Service, version 14.1 Retail Applications Oracle Retail Predictive Application Server, versions 14.1.3.47, 15.0.3.116, 16.0.3.260 Retail Applications Oracle Retail Returns Management, version 14.1 Retail Applications Oracle Retail Sales Audit, version 19.0.1 Retail Applications Oracle Retail Service Backbone, versions 14.1.3.2, 15.0.3.1, 16.0.3 Retail Applications Oracle SD-WAN Aware, version 9.0.1.3.0 Oracle SD-WAN Aware Oracle SD-WAN Edge, versions 7.0.7, 9.1.1.2.0 Oracle SD-WAN Edge Oracle Secure Backup, versions prior to 18.1.0.2.0 Oracle Secure Backup Oracle SOA Suite, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle Solaris, version 11 Systems Oracle Solaris Cluster, version 4 Systems Oracle SQL Developer Database Oracle TimesTen In-Memory Database Database Oracle Transportation Management, versions 6.4.3, 6.5.1 Oracle Supply Chain Products Oracle Utilities Testing Accelerator, versions 6.0.0.1.3, 6.0.0.2.4, 6.0.0.3.3, 7.0.0.0.0 Oracle Utilities Applications Oracle VM VirtualBox, versions prior to 6.1.40 Virtualization Oracle WebCenter Content, version 12.2.1.3.0 Fusion Middleware Oracle WebCenter Portal, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle WebCenter Sites, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware Oracle WebLogic Server, versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware PeopleSoft Enterprise Common Components, version 9.2 PeopleSoft PeopleSoft Enterprise PeopleTools, versions 8.58, 8.59, 8.60 PeopleSoft Primavera Gateway, versions 18.8.0-18.8.15, 19.12.0-19.12.14, 20.12.0-20.12.9, 21.12.0-21.12.7 Oracle Construction and Engineering Suite Primavera Unifier, versions 18.8, 19.12, 20.12, 21.12 Oracle Construction and Engineering Suite Siebel Applications, versions 22.8 and prior Siebel

    Note:

  • Vulnerabilities affecting Oracle Solaris may affect Oracle ZFSSA so Oracle customers should refer to the Oracle and Sun Systems Product Suite Critical Patch Update Knowledge Document, My Oracle Support Note 2160904.1 for information on minimum revisions of security patches required to resolve ZFSSA issues published in Critical Patch Updates and Solaris Third Party bulletins.
  • Solaris Third Party Bulletins are used to announce security patches for third party software distributed with Oracle Solaris. Solaris 10 customers should refer to the latest patch-sets which contain critical security patches detailed in Systems Patch Availability Document. Please see Reference Index of CVE IDs and Solaris Patches ( My Oracle Support Note 1448883.1 ) for more information.
  • Users running Java SE with a browser can download the latest release from https://java.com . Users on the Windows and Mac OS X platforms can also use automatic updates to get the latest release.
  • Risk Matrix Content

    Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts . An English text version of the risk matrices provided in this document is here .

    Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# . A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices.

    Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).

    Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies .

    Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product's risk matrix.

    The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.

    Workarounds

    Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible . Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

    Skipped Critical Patch Updates

    Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.

    Critical Patch Update Supported Products and Versions

    Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy . Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

    Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

    Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1 . Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

    Credit Statement

    The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:

  • 4ra1n of Chaitin Tech: CVE-2022-21598, CVE-2022-21616, CVE-2022-21622, CVE-2022-21623
  • Anonymous researcher working with Trend Micro's Zero Day Initiative: CVE-2022-39412
  • Billy Jheng Bing-Jhong (st424204) working with Trend Micro Zero Day Initiative: CVE-2022-39422, CVE-2022-39423
  • Christine Joy Infante of Vantage Point Security Pte. Ltd: CVE-2022-21612, CVE-2022-21613, CVE-2022-21614, CVE-2022-21615
  • Dohyun Lee (l33d0hyun) of SecuriTeam Secure Disclosure Labs: CVE-2022-39421
  • Eddie Zhu of Beijing DBSEC Technology Co., Ltd: CVE-2022-21596
  • Exist (exist91240480) working with Trend Micro Zero Day Initiative: CVE-2022-39427
  • George R: CVE-2022-21592
  • Hangfan Zhang: CVE-2022-21594
  • Houssam Sahli of Red Canari: CVE-2022-21629, CVE-2022-21630, CVE-2022-21631
  • kn32 working with Trend Micro Zero Day Initiative: CVE-2022-39424, CVE-2022-39425, CVE-2022-39426
  • Kun Yang of Chaitin Security Research Lab: CVE-2022-21620, CVE-2022-21621, CVE-2022-21627
  • l1k3beef: CVE-2022-21587
  • Lu Yu of Chaitin Security Research Lab: CVE-2022-21620, CVE-2022-21621, CVE-2022-21627
  • Ninad from bugcrowd ASG team: CVE-2022-21606
  • Ruhai Zhang of Beijing DBSEC Technology Co., Ltd: CVE-2022-21608
  • Rui Zhong: CVE-2022-21594
  • Samuel Tan of Vantage Point Security Pte. Ltd: CVE-2022-21612, CVE-2022-21613, CVE-2022-21614, CVE-2022-21615
  • Y4tacker: CVE-2022-21616
  • ycdxsb of VARAS@IIE: CVE-2022-39402, CVE-2022-39403, CVE-2022-39404
  • Yongheng Chen: CVE-2022-21594
  • Zu-Ming Jiang: CVE-2022-21607
  • Security-In-Depth Contributors

    Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.

    In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:

  • 4ra1n of Chaitin Tech
  • Emad Al-Mousa of Saudi Aramco [3 reports]
  • John Jiang of Tencent
  • Matt Luscombe
  • Motasim Taha
  • Nikhil Rathore
  • Sai Gopal
  • Xuelei Fan
  • ycdxsb of VARAS@IIE
  • On-Line Presence Security Contributors

    Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.

    For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:

  • Abdalrahman Ali
  • Abdlallah Mohammed
  • Ahmed Al-Saleem
  • Chester van den Bogaard
  • Dexter Rim
  • Hassam
  • Jan Kopřiva of Nettles Consulting
  • Jil Hirenkumar Shah
  • Parag Bagul
  • Pratik Shetty
  • Raguraman R
  • Rasel Mir (araselmir)
  • Secure Web
  • Yagnik Bhuva
  • Critical Patch Update Schedule

    Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:

  • 17 January 2023
  • 18 April 2023
  • 18 July 2023
  • 17 October 2023
  • References

  • Oracle Critical Patch Updates, Security Alerts and Bulletins
  • Critical Patch Update - October 2022 Documentation Map
  • Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions
  • Risk Matrix Definitions
  • Use of Common Vulnerability Scoring System (CVSS) by Oracle
  • English text version of the risk matrices
  • CVRF XML version of the risk matrices
  • CSAF JSON version of the risk matrices
  • Map of CVE to Advisory/Alert
  • Oracle Lifetime support Policy
  • JEP 290 Reference Blocklist Filter
  • Modification History

    Oracle Database Products Risk Matrices

    This Critical Patch Update contains 14 new security patches for Oracle Database Products divided as follows:

  • 8 new security patches for Oracle Database Products
  • No new security patches for Oracle Airlines Data Model , but third party patches are provided
  • No new security patches for Oracle Big Data Graph , but third party patches are provided
  • 1 new security patch for Oracle Communications Data Model
  • 2 new security patches for Oracle Essbase
  • 2 new security patches for Oracle GoldenGate
  • No new security patches for Oracle NoSQL Database , but third party patches are provided
  • 1 new security patch for Oracle Secure Backup
  • No new security patches for Oracle SQL Developer , but third party patches are provided
  • No new security patches for Oracle TimesTen In-Memory Database , but third party patches are provided
  • Oracle Database Server Risk Matrix

    This Critical Patch Update contains 8 new security patches plus additional third party patches noted below for Oracle Database Products.  1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  None of these patches are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.

    Oracle has released client Database fixes for CVEs which we believe are not exploitable in the context of the Database. The Database server includes a full copy of all the client bits, so any patch that is client applicable, also has to be applied on the server side.

    Additional CVEs addressed are:

  • The patch for CVE-2021-41495 also addresses CVE-2021-41496.
  • The patch for CVE-2022-1587 also addresses CVE-2022-1586.
  • Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • GraalVM Multilingual Engine: CVE-2022-34169, CVE-2022-21540, CVE-2022-21541, CVE-2022-21549 and CVE-2022-25647.
  • Oracle Application Express (Moment.js): CVE-2022-31129.
  • Oracle Database (Apache HttpClient): CVE-2020-13956.
  • Oracle Database (Apache Tomcat): CVE-2022-34305.
  • Oracle Database - Fleet Patching (Apache Tomcat): CVE-2021-25122 and CVE-2021-25329.
  • Oracle Database - RDBMS (OpenBLAS): CVE-2021-4048.
  • Oracle Database - RDBMS (Python): CVE-2021-3737.
  • Oracle Database - RDBMS Security (Apache MINA SSHD): CVE-2021-30129.
  • Oracle Database - Workload Manager (Eclipse Jetty): CVE-2022-2048 and CVE-2022-2047.
  • Oracle Database - ZFSSAADM (Google Gson): CVE-2022-25647.
  • Oracle Database Configuration Assistant: CVE-2019-2904.
  • Oracle Retail Data Model (Apache Log4j): CVE-2021-4104.
  • Oracle Airlines Data Model Risk Matrix

    This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Airlines Data Model.  Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Airlines Data Model.  The English text form of this Risk Matrix can be found here.

    Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Airlines Data Model
  • Installation (Apache Commons BeanUtils): CVE-2019-10086.
  • Installation (Apache Commons IO): CVE-2021-29425.
  • Installation (Apache Groovy): CVE-2020-17521.
  • Installation (Apache Log4j): CVE-2021-4104.
  • Installation (Nimbus JOSE+JWT): CVE-2019-17195.
  • Installation (Spring Framework): CVE-2021-22118 and CVE-2020-5421.
  • Installation (jackson-databind): CVE-2020-9546, CVE-2020-10650, CVE-2020-10672, CVE-2020-10673, CVE-2020-10968, CVE-2020-10969, CVE-2020-11111, CVE-2020-11112, CVE-2020-11113, CVE-2020-14195, CVE-2020-25649, CVE-2020-36189, CVE-2020-9547 and CVE-2020-9548.
  • Oracle Big Data Graph Risk Matrix

    This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Big Data Graph.  Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Big Data Graph.  The English text form of this Risk Matrix can be found here.

    Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Big Data Spatial and Graph
  • Big Data Graph (Apache Tomcat): CVE-2022-34305.
  • Oracle Communications Data Model Risk Matrix

    This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Communications Data Model.  This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    Additional CVEs addressed are:

  • The patch for CVE-2020-11987 also addresses CVE-2019-17566.
  • Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Communications Data Model
  • Utilities (Apache Axis): CVE-2019-0227 and CVE-2018-8032.
  • Utilities (Apache Commons BeanUtils): CVE-2019-10086.
  • Additional CVEs addressed are:

  • The patch for CVE-2021-22946 also addresses CVE-2021-22947.
  • The patch for CVE-2021-44832 also addresses CVE-2021-44228.
  • Oracle GoldenGate Risk Matrix

    This Critical Patch Update contains 2 new security patches plus additional third party patches noted below for Oracle GoldenGate.  1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    CVE-2020-35169 Oracle GoldenGate Oracle GoldenGate Microservices (Dell BSAFE Micro Edition Suite) HTTPS Network changed CVE-2018-18893 Oracle Goldengate Stream Analytics (JinJava) Network changed

    Additional CVEs addressed are:

  • The patch for CVE-2020-35169 also addresses CVE-2020-29508, CVE-2020-35163, CVE-2020-35164, CVE-2020-35166, CVE-2020-35167, and CVE-2020-35168.
  • Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle GoldenGate
  • Stream Analytics (Apache Tomcat): CVE-2022-23181.
  • Oracle NoSQL Database Risk Matrix

    This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle NoSQL Database.  Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle NoSQL Database.  The English text form of this Risk Matrix can be found here.

    Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle NoSQL Database
  • Administration (Google Gson): CVE-2022-25647.
  • Administration (jackson-databind): CVE-2020-36518.
  • Oracle Secure Backup Risk Matrix

    This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Secure Backup.  This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    Additional CVEs addressed are:

  • The patch for CVE-2022-31813 also addresses CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404, CVE-2022-30522, and CVE-2022-30556.
  • Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Secure Backup
  • Oracle Secure Backup (PHP): CVE-2021-21708.
  • Oracle SQL Developer Risk Matrix

    This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle SQL Developer.  Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle SQL Developer.  The English text form of this Risk Matrix can be found here.

    Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle SQL Developer
  • Install (Apache Batik): CVE-2020-11987.
  • Install (Apache Kafka): CVE-2021-38153 and CVE-2021-26291.
  • Oracle TimesTen In-Memory Database Risk Matrix

    This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle TimesTen In-Memory Database.  Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle TimesTen In-Memory Database.  The English text form of this Risk Matrix can be found here.

    Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle TimesTen In-Memory Database
  • Kubernetes Operator (Golang Go): CVE-2022-28327 and CVE-2022-24675.
  • Oracle Communications Applications Risk Matrix

    This Critical Patch Update contains 27 new security patches for Oracle Communications Applications.  21 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    CVE-2018-1311 Oracle Communications Convergent Charging Controller Common (Apache Xerces-C) Network changed 6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0 CVE-2018-1311 Oracle Communications Network Charging and Control Gateway (Apache Xerces-C) Network changed 6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0 CVE-2022-31129 Oracle Communications Billing and Revenue Management Billing Care (Moment.js) Network changed 12.0.0.4.0-12.0.0.6.0 CVE-2022-35737 Oracle Communications Convergent Charging Controller Common (SQLite) Network changed 6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0 CVE-2022-31129 Oracle Communications Design Studio PSR Designer (Moment.js) Network changed 7.4.2 CVE-2020-36518 Oracle Communications Instant Messaging Server PresenceAPI (jackson-databind) Network changed 10.0.1.6.0 CVE-2022-35737 Oracle Communications Network Charging and Control Common (SQLite) Network changed 6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0 CVE-2022-25857 Oracle Communications Pricing Design Center REST Service Manager (SnakeYAML) Network changed 12.0.0.5.0-12.0.0.7.0 CVE-2020-36518 Oracle Communications Pricing Design Center REST Service Manager (jackson-databind) Network changed 12.0.0.4.0-12.0.0.7.0 CVE-2022-2048 Oracle Communications Unified Assurance Message Bus (Eclipse Jetty) Network changed Prior to 5.5.7.0.0, 6.0.0.0.0 CVE-2022-23181 Oracle Communications Instant Messaging Server Installation (Apache Tomcat) Local changed 10.0.1.6.0 CVE-2021-44832 Oracle Communications Instant Messaging Server Installation (Apache Log4j) Network changed 10.0.1.6.0 CVE-2021-44832 Oracle Communications MetaSolv Solution Framework (Apache Log4j) Network changed 6.3.1 CVE-2021-44832 Oracle Communications Order and Service Management Installer (Apache Log4j) Network changed 7.3, 7.4 CVE-2022-21601 Oracle Communications Billing and Revenue Management Connection Manager Network changed 12.0.0.4.0-12.0.0.7.0 CVE-2022-23437 Oracle Communications MetaSolv Solution Framework (Apache Xerces-J) Network Required changed 6.3.1 CVE-2022-23437 Oracle Communications Order and Service Management Installer (Apache Xerces-J) Network Required changed 7.3, 7.4 CVE-2022-34305 Oracle Communications Unified Assurance REST API (Apache Tomcat) Network Required Changed Prior to 5.5.7.0.0, 6.0.0.0.0 CVE-2021-21295 Oracle Communications Pricing Design Center REST Service Manager (Netty) Network changed 12.0.0.4.0-12.0.0.6.0 CVE-2022-24823 Oracle Communications Design Studio PSR Designer (Netty) Local changed 7.4.2 CVE-2022-24823 Oracle Communications Pricing Design Center Rest Service Manager (Netty) Local changed 12.0.0.4.0-12.0.0.6.0

    Additional CVEs addressed are:

  • The patch for CVE-2021-21295 also addresses CVE-2021-21409, and CVE-2021-43797.
  • The patch for CVE-2021-44832 also addresses CVE-2021-44228.
  • The patch for CVE-2022-23181 also addresses CVE-2020-9484.
  • The patch for CVE-2022-24823 also addresses CVE-2021-21290.
  • The patch for CVE-2022-25857 also addresses CVE-2022-38749, CVE-2022-38750, CVE-2022-38751, and CVE-2022-38752.
  • The patch for CVE-2022-31813 also addresses CVE-2022-26377, CVE-2022-28330, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404, CVE-2022-30522, and CVE-2022-30556.
  • Oracle Communications Risk Matrix

    This Critical Patch Update contains 74 new security patches plus additional third party patches noted below for Oracle Communications.  64 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    CVE-2022-22978 Oracle Communications Cloud Native Core Security Edge Protection Proxy Signaling (Spring Security) Network changed 22.2.0 CVE-2022-1292 Oracle Communications Cloud Native Core Security Edge Protection Proxy Installer (OpenSSL) HTTPS Network changed 22.2.1 CVE-2022-23218 Oracle Communications Cloud Native Core Unified Data Repository Signaling (glibc) Network changed 22.1.1 CVE-2022-31813 Oracle Communications Diameter Signaling Router Platform (Apache HTTP Server) Network changed 8.6.0.0 CVE-2021-21708 Oracle Communications Diameter Signaling Router Platform (PHP) Network changed 8.6.0.0 CVE-2022-31813 Oracle Communications Element Manager FEServer (Apache HTTP Server) Network changed CVE-2022-22978 Oracle Communications Element Manager Authentication (Spring Security) Network changed CVE-2022-22978 Oracle Communications Interactive Session Recorder Platform (Spring Security) Network changed CVE-2021-31805 Oracle Communications Policy Management Configuration Management Platform (Apache Struts) Network changed 12.6.0.0.0 CVE-2021-21783 Oracle Communications User Data Repository Platform (gSOAP) GSOAP Network changed 12.4.0 CVE-2022-31813 Oracle Communications User Data Repository Platform (Apache HTTP Server) Network changed 12.4.0 CVE-2021-43527 Oracle Communications User Data Repository Platform (NSS) HTTPS Network changed 12.4.0 CVE-2021-23450 Oracle Communications WebRTC Session Controller Platform (dojo) Network changed 7.2.0, 7.2.1 CVE-2022-31813 Oracle Enterprise Operations Monitor User Login (Apache HTTP Server) Network changed 4.4, 5.0 CVE-2021-44790 Oracle SD-WAN Edge Management (Apache HTTP Server) Network changed 7.0.7 CVE-2022-22978 Oracle SD-WAN Edge Management (Spring Security) Network changed 9.1.1.2.0 CVE-2022-1586 Oracle Communications Cloud Native Core Security Edge Protection Proxy Signaling (PCRE2) Network changed 22.2.1 CVE-2022-1586 Oracle Communications Cloud Native Core Unified Data Repository Signaling (PCRE2) Network changed 22.3.0 CVE-2019-3862 Oracle Communications User Data Repository Platform (libssh2) SSH-2 Network changed 12.4.0 CVE-2020-13936 Oracle Communications User Data Repository Platform (Apache Velocity Engine) Network changed 12.6.1 CVE-2020-10878 Oracle Communications User Data Repository Platform (PERL) Network changed 12.4.0 CVE-2021-2351 Oracle Communications User Data Repository Security (OJDBC) Oracle Net Network Required Changed 12.4.0 CVE-2022-1154 Oracle Communications Cloud Native Core Network Function Cloud Native Environment DBTier (vim) Local Required changed 22.1.0, 22.2.0 CVE-2021-4034 Oracle SD-WAN Edge Platform (Polkit) Local changed 7.0.7 CVE-2022-25647 Oracle Communications Cloud Native Core Binding Support Function Signaling (Google Gson) Network changed 22.3.0 CVE-2022-25647 Oracle Communications Cloud Native Core Console Installer (Google Gson) Network changed 22.2.0 CVE-2022-25857 Oracle Communications Cloud Native Core Console Installer (SnakeYAML) Network changed 22.2.0 CVE-2022-2191 Oracle Communications Cloud Native Core Network Exposure Function Platform (Eclipse Jetty) Network changed 22.2.1 CVE-2022-25857 Oracle Communications Cloud Native Core Network Exposure Function Platform (SnakeYAML) Network changed 22.3.0 CVE-2022-24785 Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration (Moment.js) Network changed 22.1, 22.2 CVE-2022-27782 Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration (cURL) Network changed 22.1.0, 22.2.0 CVE-2022-24761 Oracle Communications Cloud Native Core Network Function Cloud Native Environment DBTier (waitress) Network changed 22.1.0, 22.2.0 CVE-2018-25032 Oracle Communications Cloud Native Core Network Function Cloud Native Environment DBTier (zlib) Network changed 22.1.0, 22.2.0 CVE-2022-2191 Oracle Communications Cloud Native Core Network Repository Function Installation (Eclipse Jetty) Network changed 22.2.2 CVE-2022-25647 Oracle Communications Cloud Native Core Policy Signaling (Google Gson) Network changed 22.3.0 CVE-2022-25857 Oracle Communications Cloud Native Core Security Edge Protection Proxy Signaling (SnakeYAML) Network changed 22.3.0 CVE-2018-25032 Oracle Communications Cloud Native Core Security Edge Protection Proxy Installer (zlib) Network changed 22.1.1 CVE-2022-25857 Oracle Communications Cloud Native Core Service Communication Proxy Signaling (SnakeYAML) Network changed 22.2.3, 22.3.1, 22.4.0 CVE-2022-25857 Oracle Communications Cloud Native Core Unified Data Repository Security (SnakeYAML) Network changed 22.2.1,22.3.0 CVE-2022-2191 Oracle Communications Cloud Native Core Unified Data Repository Signaling (Eclipse Jetty) Network changed 22.3.0 CVE-2021-28165 Oracle Communications Converged Application Server - Service Controller Platform (Eclipse Jetty) Network changed CVE-2018-25032 Oracle Communications Diameter Signaling Router Platform (zlib) Network changed 8.6.0.0 CVE-2022-29885 Oracle Communications Element Manager BEServer (Apache Tomcat) Network changed CVE-2022-2048 Oracle Communications Element Manager GEN (Eclipse Jetty) Network changed CVE-2020-36518 Oracle Communications Evolved Communications Application Server Platform (jackson-databind) Network changed CVE-2020-36518 Oracle Communications Policy Management Configuration Management Platform (jackson-databind) Network changed 12.6.0.0.0 CVE-2020-36518 Oracle Communications Services Gatekeeper Core (jackson-databind) Network changed 7.0.0.0.0 CVE-2021-40690 Oracle Communications Services Gatekeeper OAuth (Apache Santuario XML Security for Java) Network changed 7.0.0.0.0 CVE-2018-25032 Oracle Communications Session Border Controller System (zlib) Network changed 8.4, 9.0, 9.1 CVE-2022-25647 Oracle Communications WebRTC Session Controller Platform (Google Gson) Network changed 7.2.0, 7.2.1 CVE-2022-23219 Oracle Communications Session Border Controller Routing (glibc) Network changed 8.4, 9.0, 9.1 CVE-2021-44832 Oracle Communications Cloud Native Core Binding Support Function Signaling (Apache Log4j) Network changed 22.3.0 CVE-2021-44832 Oracle Communications Cloud Native Core Policy Signaling (Apache Log4j) Network changed 22.3.0 CVE-2022-32206 Oracle Communications Cloud Native Core Network Exposure Function Oracle Linux (cURL) Network Required changed 22.3.0 CVE-2022-29824 Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration (libxml2) Network Required changed 22.2.1, 22.2.0 CVE-2022-32206 Oracle Communications Cloud Native Core Security Edge Protection Proxy Configuration (cURL) Network Required changed 22.2.1 CVE-2022-32206 Oracle Communications Cloud Native Core Unified Data Repository Signaling (cURL) Network Required changed 22.3.0 CVE-2022-22971 Oracle Communications Element Manager Security (Spring Framework) Network changed CVE-2022-22971 Oracle Communications Interactive Session Recorder Platform (Spring Framework) HTTPS Network changed CVE-2020-6950 Oracle Communications User Data Repository Platform (Eclipse Mojarra) Network Required changed 12.4.0 CVE-2022-22971 Oracle SD-WAN Edge Management (Spring Framework) Network changed 9.1.1.2.0 CVE-2022-36033 Oracle Communications Cloud Native Core Console Installer (jsoup) Network Required Changed 22.2.0 CVE-2022-34305 Oracle Communications Diameter Signaling Router Platform (Apache Tomcat) Network Required Changed 8.6.0.0 CVE-2022-34305 Oracle Communications Session Report Manager BEServer (Apache Tomcat) Network Required Changed CVE-2022-34305 Oracle Communications User Data Repository Platform (Apache Tomcat) Network Required Changed 12.4.0 CVE-2020-11022 Oracle Communications User Data Repository Platform (HTTP) Network Required Changed 12.4.0 CVE-2021-41184 Oracle SD-WAN Aware Management (jQueryUI) Network Required Changed 9.0.1.3.0 CVE-2021-3597 Oracle Communications Cloud Native Core Binding Support Function Signaling (undertow) Network changed 22.3.0 CVE-2021-40528 Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration (GnuPG Libgcrypt) Network changed 22.1.0,22.2.0 CVE-2021-3597 Oracle Communications Cloud Native Core Policy Signaling (undertow) Network changed 22.3.0 CVE-2021-3426 Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration (Python) Adjacent
    Network changed 1.9.0 CVE-2022-21123 Oracle Communications Diameter Signaling Router Platform (Microcode Controller) Local changed 8.6.0.0 CVE-2020-29582 Oracle Communications User Data Repository Platform (JetBrains Kotlin) Network changed 12.6.0 CVE-2021-21707 Oracle Communications User Data Repository Platform (PHP) Network changed 12.4.0

    Additional CVEs addressed are:

  • The patch for CVE-2019-3862 also addresses CVE-2019-3855, CVE-2019-3856, CVE-2019-3857, CVE-2019-3858, CVE-2019-3859, CVE-2019-3860, CVE-2019-3861, and CVE-2019-3863.
  • The patch for CVE-2020-10878 also addresses CVE-2020-10543, and CVE-2020-12723.
  • The patch for CVE-2020-11022 also addresses CVE-2019-1543, and CVE-2020-11023.
  • The patch for CVE-2021-28165 also addresses CVE-2021-28163, and CVE-2021-28164.
  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
  • The patch for CVE-2021-44790 also addresses CVE-2021-26690, CVE-2021-26691, CVE-2021-34798, and CVE-2021-39275.
  • The patch for CVE-2022-1292 also addresses CVE-2022-2068, and CVE-2022-2097.
  • The patch for CVE-2022-2048 also addresses CVE-2022-2047, and CVE-2022-2191.
  • The patch for CVE-2022-21123 also addresses CVE-2022-21125, CVE-2022-21127, and CVE-2022-21166.
  • The patch for CVE-2022-2191 also addresses CVE-2022-2048.
  • The patch for CVE-2022-22971 also addresses CVE-2022-22970.
  • The patch for CVE-2022-22978 also addresses CVE-2022-22976.
  • The patch for CVE-2022-23218 also addresses CVE-2022-23219.
  • The patch for CVE-2022-23219 also addresses CVE-2021-38604, CVE-2021-43396, and CVE-2022-23218.
  • The patch for CVE-2022-27782 also addresses CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, and CVE-2022-30115.
  • The patch for CVE-2022-31813 also addresses CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404, CVE-2022-30522, and CVE-2022-30556.
  • The patch for CVE-2022-32206 also addresses CVE-2022-32208.
  • Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Communications Cloud Native Core Security Edge Protection Proxy
  • Signaling (Kubernetes Client): CVE-2021-4178.
  • Oracle Construction and Engineering Risk Matrix

    This Critical Patch Update contains 5 new security patches plus additional third party patches noted below for Oracle Construction and Engineering.  2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Primavera Unifier
  • Document Management (Apache ZooKeeper): CVE-2020-7712.
  • Platform, User Interface (Apache Velocity Engine): CVE-2020-13936.
  • Oracle E-Business Suite Risk Matrix

    This Critical Patch Update contains 5 new security patches for Oracle E-Business Suite.  4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the October 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (October 2022), My Oracle Support Note 2484000.1 .

    CVE-2022-23305 Application Management Pack for Oracle E-Business Suite EBS EM Plugin (Apache Log4j) Network changed 13.4.1.0.0 See Note 1 CVE-2022-21587 Oracle Web Applications Desktop Integrator Upload Network changed 12.2.3-12.2.11 CVE-2022-39428 Oracle Web Applications Desktop Integrator Upload Network changed 12.2.3-12.2.11 CVE-2019-10086 Oracle Human Resources Common Modules (Apache Commons BeanUtils) Network changed 12.2.3-12.2.11 CVE-2022-21636 Oracle Applications Framework Session Management Network changed 12.2.6-12.2.11

    Oracle Enterprise Manager Risk Matrix

    This Critical Patch Update contains 5 new security patches for Oracle Enterprise Manager.  4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.

    Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the October 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2888514.1 .

    CVE-2018-1285 Enterprise Manager Base Platform Application Service Level Management (Apache log4net) Network changed 13.4.0.0 CVE-2021-23450 Enterprise Manager Ops Center Networking (dojo) Network changed 12.4.0.0 CVE-2022-21623 Enterprise Manager Base Platform Application Config Console Network changed 13.4.0.0, 13.5.0.0 CVE-2021-4104 Enterprise Manager Base Platform Application Service Level Management (Apache Log4j) Network changed 13.4.0.0 CVE-2020-36518 Enterprise Manager for Virtualization Plug-In Lifecycle (jackson-databind) Network changed 13.4.0.0, 13.5.0.0

    Oracle Financial Services Applications Risk Matrix

    This Critical Patch Update contains 24 new security patches for Oracle Financial Services Applications.  16 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    CVE-2022-23457 Oracle Financial Services Analytical Applications Infrastructure Others (Enterprise Security API) Network changed 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1 CVE-2020-36518 Oracle Banking Enterprise Default Management Collections (jackson-databind) Network changed 2.12.0 CVE-2020-36518 Oracle Banking Loans Servicing Web UI (jackson-databind) Network changed 2.8.0, 2.12.0 CVE-2020-36518 Oracle Banking Party Management Web UI (jackson-databind) Network changed 2.7.0 CVE-2022-25647 Oracle Banking Platform Security (Google Gson) Network changed 2.9.0 CVE-2020-36518 Oracle Banking Platform Security (jackson-databind) Network changed 2.7.1, 2.9.0, 2.12.0 CVE-2022-31129 Oracle Financial Services Analytical Applications Infrastructure Others (Moment.js) Network changed 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1 CVE-2022-31129 Oracle Financial Services Behavior Detection Platform User Interface (Moment.js) Network changed 8.0.7.2, 8.0.8.1, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2 CVE-2022-31129 Oracle Financial Services Enterprise Case Management Installer (Moment.js) Network changed 8.0.7.3, 8.0.8.2, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2 CVE-2021-40690 Oracle Financial Services Model Management and Governance Installer & Configuration (Apache Santuario XML Security For Java) Network changed 8.1.1.0 CVE-2022-25647 Oracle Financial Services Model Management and Governance Installer & Configuration (Google Gson) Network changed 8.0.8.0, 8.1.0.0, 8.1.1.0 CVE-2022-31129 Oracle Financial Services Model Management and Governance Installer (Moment.js) Network changed 8.0.8.0, 8.1.0.0 CVE-2022-31129 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition User Interface (Moment.js) Network changed 8.0.7.0, 8.0.8.0 CVE-2022-23181 Oracle Financial Services Model Management and Governance Installer & Configuration (Apache Tomcat) Local changed 8.0.8.0, 8.1.0.0, 8.1.1.0 CVE-2021-44832 Oracle Financial Services Model Management and Governance Installer & Configuration (Apache Log4j) Network changed 8.0.8.0, 8.1.0.0, 8.1.1.0 CVE-2022-22971 Oracle Financial Services Analytical Applications Infrastructure Others (Spring Framework) Network changed 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1 CVE-2022-22971 Oracle Financial Services Behavior Detection Platform User Interface (Spring Framework) Network changed 8.0.7.2, 8.0.8.1, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2 CVE-2022-22971 Oracle Financial Services Enterprise Case Management Installer (Spring Framework) Network changed 8.0.7.3, 8.0.8.2, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2 CVE-2022-22971 Oracle Financial Services Model Management and Governance Installer & Configuration (Spring Framework) Network changed 8.0.8.0, 8.1.0.0, 8.1.1.0 CVE-2022-22971 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition User Interface (Spring Framework) Network changed 8.0.7.0, 8.0.8.0 CVE-2022-29577 Oracle Banking Enterprise Default Management Collections (AntiSamy) Network Required Changed 2.12.0 CVE-2022-29577 Oracle Banking Party Management Web UI (AntiSamy) Network Required Changed 2.7.0 CVE-2022-29577 Oracle Banking Platform Security (AntiSamy) Network Required Changed 2.9.0 CVE-2022-24823 Oracle Financial Services Model Management and Governance Installer & Configuration (Netty) Local changed 8.0.8.0, 8.1.0.0, 8.1.1.0

    Additional CVEs addressed are:

  • The patch for CVE-2022-22971 also addresses CVE-2022-22970.
  • The patch for CVE-2022-23457 also addresses CVE-2022-24891.
  • Oracle Fusion Middleware Risk Matrix

    This Critical Patch Update contains 56 new security patches for Oracle Fusion Middleware.  43 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update October 2022 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2899414.2 .

    CVE-2022-33980 Oracle Business Intelligence Enterprise Edition BI Application Archive (Apache Commons Configuration) Network changed 5.9.0.0, 6.4.0.0 CVE-2019-17195 Oracle Data Integrator WLS Configuration Template (Nimbus JOSE+JWT) Network changed 12.2.1.4.0 CVE-2022-23943 Oracle HTTP Server SSL Module (Apache HTTP Server) HTTPS Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-23305 Oracle Middleware Common Libraries and Tools Third Party Patch (Apache Log4j) Network changed 12.2.1.3.0 CVE-2022-25315 Oracle Outside In Technology Outside In Filters (LibExpat) HTTPS Network changed 8.5.6 CVE-2022-23305 Oracle WebCenter Content Web Content Management (Apache Log4j) Network changed 12.2.1.3.0 CVE-2021-23450 Oracle WebCenter Portal Security Framework (dojo) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2021-23450 Oracle WebCenter Sites Centralized Thirdparty Jars (dojo) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-32532 Oracle WebCenter Sites WebCenter Sites (Apache Shiro) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-21613 Oracle Enterprise Data Quality Dashboard Network Required Changed 12.2.1.3.0, 12.2.1.4.0 CVE-2020-13936 Oracle Identity Management Suite Installer (Apache Velocity Engine) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2020-28052 Oracle Business Process Management Suite Installer (Bouncy Castle Java Library) HTTPS Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-21612 Oracle Enterprise Data Quality Dashboard Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2020-28052 Oracle WebLogic Server Centralized Thirdparty Jars (Bouncy Castle Java Library) Network changed 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 CVE-2022-21590 Oracle BI Publisher Core Formatting API Network changed 5.9.0.0, 6.4.0.0.0, 12.2.1.3.0, 12.2.1.4.0 CVE-2021-40690 BI Publisher Web Server (Apache CXF) Network changed 5.9.0.0, 6.4.0.0.0 CVE-2022-39412 Oracle Access Manager Admin Console Network changed 12.2.1.4.0 CVE-2022-25647 Oracle BI Publisher Security (Google Gson) Network changed 5.9.0.0, 6.4.0.0.0, 12.2.1.3.0, 12.2.1.4.0 CVE-2021-43859 Oracle Business Activity Monitoring(Oracle BAM) General (XStream) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-24729 Oracle Business Intelligence Enterprise Edition Analytics Server (CKEditor) Network changed 5.9.0.0, 6.4.0.0 CVE-2020-36518 Oracle Business Intelligence Enterprise Edition Analytics Server (jackson-databind) Network changed 6.4.0.0 CVE-2021-36090 Oracle Business Intelligence Enterprise Edition Analytics Web ADF Integration (Apache Commons Compress) Network changed 5.9.0.0 CVE-2022-25647 Oracle Data Integrator Runtime Java agent for ODI (Google Gson) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-21614 Oracle Enterprise Data Quality Dashboard Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-25647 Oracle Middleware Common Libraries and Tools Thirdparty Patch (Google Gson) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2018-25032 Oracle Outside In Technology Outside In Filters (Python) Network changed 8.5.6 CVE-2022-21622 Oracle SOA Suite Adapters Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2021-40690 Oracle WebCenter Portal Security Framework (Apache Santuario XML Security For Java) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-24729 Oracle WebCenter Portal Security Framework (CKEditor) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2021-43859 Oracle WebCenter Portal Security Framework (XStream) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2020-36518 Oracle WebCenter Portal Security Framework (jackson-databind) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-24729 Oracle WebCenter Sites WebCenter Sites (CKEditor) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2021-43859 Oracle WebCenter Sites WebCenter Sites (XStream) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-21615 Oracle Enterprise Data Quality Dashboard Network Required Changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-21593 Oracle HTTP Server OHS Config MBeans Network Required changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-22971 Oracle Data Integrator Runtime Java agent for ODI (Spring Framework) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2020-24977 Oracle HTTP Server Web Listener (libxml2) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-22971 Oracle Middleware Common Libraries and Tools Thirdparty Patch (Spring Framework) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-23437 Oracle WebCenter Portal Security Framework (Apache Xerces-J) Network Required changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-23437 Oracle WebLogic Server Centralized Thirdparty Jars (Apache Xerces-J) Network Required changed 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 CVE-2022-22971 Oracle WebLogic Server Centralized Thirdparty Jars (Spring Framework) Network changed 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 CVE-2021-41184 Oracle MapViewer Oracle Maps (jQueryUI) Network Required Changed 12.2.1.3.0, 12.2.1.4.0 CVE-2021-3537 Oracle HTTP Server SSL Module (libxml2) HTTPS Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-21609 Oracle Business Intelligence Enterprise Edition Analytics Server Network Required changed 5.9.0.0 CVE-2022-24823 Oracle Coherence Configuration and Parsing (Netty) Local changed 12.2.1.4.0, 14.1.1.0.0 CVE-2020-17521 Oracle Data Integrator Runtime Java agent for ODI (Apache Groovy) Local changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-30126 Oracle WebCenter Portal Security Framework (Apache Tika) Local Required changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-24823 Oracle WebCenter Portal Security Framework (Netty) Local changed 12.2.1.3.0, 12.2.1.4.0 CVE-2020-17521 Oracle WebLogic Server Centralized Thirdparty Jars (Apache Groovy) Local changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-39405 Oracle Access Manager Authentication Engine Network changed 12.2.1.3.0 CVE-2021-34429 Oracle Data Integrator Runtime Java agent for ODI (Eclipse Jetty) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2020-14155 Oracle HTTP Server SSL Module (PCRE) HTTPS Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2022-22968 Oracle WebLogic Server Samples (Spring Framework) Network changed 12.2.1.4.0, 14.1.1.0.0 CVE-2022-21616 Oracle WebLogic Server Web Container Local changed 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 CVE-2021-29425 Oracle Data Integrator Runtime Java agent for ODI (Apache Commons IO) Network changed 12.2.1.3.0, 12.2.1.4.0 CVE-2021-29425 Oracle WebLogic Server Centralized Thirdparty Jars (Commons IO) Network changed 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0

    Additional CVEs addressed are:

  • The patch for CVE-2020-14155 also addresses CVE-2019-20838.
  • The patch for CVE-2020-24977 also addresses CVE-2019-19956.
  • The patch for CVE-2021-3537 also addresses CVE-2019-20388, CVE-2020-24977, CVE-2020-7595, CVE-2021-3517, and CVE-2021-3518.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516, and CVE-2021-35517.
  • The patch for CVE-2022-22971 also addresses CVE-2022-22970.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.
  • The patch for CVE-2022-23943 also addresses CVE-2019-10092, CVE-2020-1934, and CVE-2022-22720.
  • The patch for CVE-2022-24729 also addresses CVE-2022-24728.
  • The patch for CVE-2022-24823 also addresses CVE-2021-21290.
  • The patch for CVE-2022-25315 also addresses CVE-2022-23990, CVE-2022-25235, CVE-2022-25236, CVE-2022-25313, and CVE-2022-25314.
  • The patch for CVE-2022-30126 also addresses CVE-2022-25169.
  • Oracle HealthCare Applications Risk Matrix

    This Critical Patch Update contains 5 new security patches for Oracle HealthCare Applications.  4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    Oracle Hospitality Applications Risk Matrix

    This Critical Patch Update contains 4 new security patches for Oracle Hospitality Applications.  2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    CVE-2022-22971 Oracle Hospitality Cruise Shipboard Property Management System Next-Gen SPMS (Spring Boot) Network changed 20.2.0 CVE-2022-34305 Oracle Hospitality Cruise Shipboard Property Management System Next-Gen SPMS (Apache Tomcat) Network Required Changed 20.2.2 CVE-2022-33980 Oracle Hyperion Infrastructure Technology Installation and Configuration (Apache Commons Configuration) Network changed 11.2.9

    Oracle Insurance Applications Risk Matrix

    This Critical Patch Update contains 5 new security patches for Oracle Insurance Applications.  3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    CVE-2022-22971 Oracle Documaker Enterprise Edition Interactive Docupresentment Server (Spring Framework) Network changed 12.6-12.7 CVE-2019-12415 Oracle Insurance Insbridge Rating and Underwriting Framework Administrator IBFA (Apache POI) Local changed 5.2.0, 5.4.0-5.6.2 CVE-2021-29425 Oracle Insurance Insbridge Rating and Underwriting Framework Administrator IBFA (Apache Commons IO) Network changed 5.2.0, 5.4.0-5.6.2 Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3, 22.2.0 See Note 1 CVE-2022-21626 Oracle Java SE, Oracle GraalVM Enterprise Edition Security HTTPS Network changed Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3, 22.2.0 See Note 2 CVE-2022-21618 Oracle Java SE, Oracle GraalVM Enterprise Edition Kerberos Network changed Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3, 22.2.0 See Note 2 CVE-2022-39399 Oracle Java SE, Oracle GraalVM Enterprise Edition Networking Network changed Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3, 22.2.0 See Note 1 CVE-2022-21624 Oracle Java SE, Oracle GraalVM Enterprise Edition Multiple Network changed Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3, 22.2.0 See Note 2 CVE-2022-21619 Oracle Java SE, Oracle GraalVM Enterprise Edition Security Multiple Network changed Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3, 22.2.0 See Note 2

    Notes:

  • This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
  • This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.
  • Additional CVEs addressed are:

  • The patch for CVE-2022-32215 also addresses CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32222, CVE-2022-32223, CVE-2022-35255, and CVE-2022-35256.
  • Oracle JD Edwards Risk Matrix

    This Critical Patch Update contains 10 new security patches for Oracle JD Edwards.  9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    CVE-2020-36518 JD Edwards EnterpriseOne Orchestrator E1 IOT Orchestrator Security (jackson-databind) Network changed 9.2.6.4 and prior CVE-2020-36518 JD Edwards EnterpriseOne Tools Monitoring and Diagnostics SEC (jackson-databind) Network changed 9.2.6.4 and prior CVE-2020-36518 JD Edwards EnterpriseOne Tools Web Runtime SEC (jackson-databind) Network changed 9.2.6.4 and prior CVE-2022-23437 JD Edwards EnterpriseOne Orchestrator E1 IOT Orchestrator Security (Apache Xerces-J) Network Required changed 9.2.6.2 and prior CVE-2022-23437 JD Edwards EnterpriseOne Tools Interoperability SEC (Apache Xerces-J) Network Required changed 9.2.6.3 and prior CVE-2022-21631 JD Edwards EnterpriseOne Tools Design Tools SEC Network Required Changed 9.2.6.4 and prior CVE-2022-21630 JD Edwards EnterpriseOne Tools Web Runtime SEC Network Required Changed 9.2.6.4 and prior CVE-2022-21629 JD Edwards EnterpriseOne Tools Web Runtime SEC Network Required Changed 9.2.6.4 and prior

    Oracle Retail Applications Risk Matrix

    This Critical Patch Update contains 27 new security patches for Oracle Retail Applications.  21 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    CVE-2021-28490 Oracle Retail Customer Management and Segmentation Foundation Segment (OWASP CSRFGuard) Network Required changed 18.0, 19.0 CVE-2021-43859 Oracle Retail Customer Insights Other (XStream) Network changed 15.0.2, 16.0.2 CVE-2022-25647 Oracle Retail Customer Management and Segmentation Foundation Security (Google Gson) Network changed 17.0, 18.0, 19.0 CVE-2022-25647 Oracle Retail EFTLink Installation (Google Gson) Network changed 20.0.1, 21.0.0 CVE-2022-2048 Oracle Retail EFTLink Other (Eclipse Jetty) Network changed 20.0.1, 21.0.0 CVE-2020-36518 Oracle Retail Merchandising System Foundation (jackson-databind) Network changed 15.0.3.1 CVE-2020-36518 Oracle Retail Service Backbone RSB Installation (jackson-databind) Network changed 14.1.3.2, 15.0.3.1, 16.0.3 CVE-2022-22971 Oracle Retail Assortment Planning Application Core (Spring Framework) Network changed 16.0.3 CVE-2022-23437 Oracle Retail Back Office Security (Apache Xerces-J) Network Required changed CVE-2022-23437 Oracle Retail Central Office Security (Apache Xerces-J) Network Required changed CVE-2020-6950 Oracle Retail Customer Insights Other (Eclipse Mojarra) Network Required changed 15.0.2, 16.0.2 CVE-2022-22971 Oracle Retail Customer Insights Other (Spring Framework) Network changed 15.0.2, 16.0.2 CVE-2022-23437 Oracle Retail Fiscal Management OTHERS (Apache Xerces-J) Network Required changed CVE-2022-22971 Oracle Retail Merchandising System Foundation (Spring Framework) Network changed 19.0.1 CVE-2022-23437 Oracle Retail Point Of Service Security (Apache Xerces-J) Network Required changed CVE-2022-22971 Oracle Retail Predictive Application Server RPAS Server (Spring Framework) Network changed 14.1.3.47, 15.0.3.116, 16.0.3.260 CVE-2022-23437 Oracle Retail Returns Management Security (Apache Xerces-J) Network Required changed CVE-2022-29577 Oracle Retail Back Office Security (AntiSamy) Network Required Changed CVE-2021-41184 Oracle Retail Back Office Security (jQueryUI) Network Required Changed CVE-2022-29577 Oracle Retail Central Office Security (AntiSamy) Network Required Changed CVE-2021-41184 Oracle Retail Central Office Security (jQueryUI) Network Required Changed CVE-2022-29577 Oracle Retail Returns Management Security (AntiSamy) Network Required Changed CVE-2021-41184 Oracle Retail Returns Management Security (jQueryUI) Network Required Changed CVE-2021-36374 Oracle Retail Merchandising System Installation (Apache Ant) Local Required changed 14.1.3.2 CVE-2021-36374 Oracle Retail Sales Audit others (Apache Ant) Local Required changed 19.0.1 CVE-2021-29425 Oracle Retail Customer Insights Other (Apache Commons IO) Network changed 15.02, 16.0.2

    Additional CVEs addressed are:

  • The patch for CVE-2021-36374 also addresses CVE-2021-36373.
  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
  • The patch for CVE-2022-2048 also addresses CVE-2022-2047, and CVE-2022-2191.
  • The patch for CVE-2022-22971 also addresses CVE-2022-22970.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.
  • Oracle Siebel CRM Risk Matrix

    This Critical Patch Update contains 14 new security patches for Oracle Siebel CRM.  12 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    CVE-2022-22971 Siebel Engineering - Installer & Deployment Siebel Approval Manager (Spring Framework) Network changed 22.8 and prior CVE-2022-34305 Siebel UI Framework EAI (Apache Tomcat) Network Required Changed 22.8 and prior CVE-2021-41182 Siebel UI Framework Open UI (jQueryUI) Network Required Changed 22.8 and prior CVE-2021-29425 Siebel Apps - Marketing Marketing (Apache Commons IO) Network changed 22.8 and prior

    Additional CVEs addressed are:

  • The patch for CVE-2020-16856 also addresses CVE-2020-16874.
  • The patch for CVE-2021-41182 also addresses CVE-2021-41183, and CVE-2021-41184.
  • The patch for CVE-2022-22971 also addresses CVE-2022-22970.
  • The patch for CVE-2022-24729 also addresses CVE-2022-24728.
  • Oracle Supply Chain Risk Matrix

    This Critical Patch Update contains 13 new security patches for Oracle Supply Chain.  9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    CVE-2022-2048 Oracle Autovue for Agile Product Lifecycle Management Autovue Client (Eclipse Jetty) Network changed 21.0.2 CVE-2020-36518 Oracle Autovue for Agile Product Lifecycle Management Autovue Client (jackson-databind) Network changed 21.0.2 CVE-2022-23437 Oracle Transportation Management XML Parser (Apache Xerces-J) Network Required changed 6.4.3, 6.5.1 CVE-2022-39420 Oracle Transportation Management Data, Functional Security Network changed 6.4.3, 6.5.1 CVE-2022-21591 Oracle Transportation Management UI Infrastructure Network changed 6.4.3, 6.5.1 CVE-2022-39411 Oracle Transportation Management Business Process Automation Network changed 6.4.3, 6.5.1 CVE-2022-39409 Oracle Transportation Management Business Process Automation Network changed 6.4.3, 6.5.1

    Notes:

  • This vulnerability applies to Oracle AutoVue Office, Oracle AutoVue 2D Professional, Oracle AutoVue 3D Professional Advanced, Oracle AutoVue EDA Professional and Oracle AutoVue Electro-Mechanical Professional. Please refer to Patch Availability Document for more details.
  • Additional CVEs addressed are:

  • The patch for CVE-2022-2048 also addresses CVE-2022-2047, and CVE-2022-2191.
  • The patch for CVE-2022-23305 also addresses CVE-2022-23302, and CVE-2022-23307.
  • The patch for CVE-2022-24729 also addresses CVE-2022-24728.
  • Oracle Systems Risk Matrix

    This Critical Patch Update contains 8 new security patches for Oracle Systems.  4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    Oracle Utilities Applications Risk Matrix

    This Critical Patch Update contains 6 new security patches for Oracle Utilities Applications.  4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

    Additional CVEs addressed are:

  • The patch for CVE-2022-22971 also addresses CVE-2022-22970.
  • The patch for CVE-2022-22978 also addresses CVE-2022-22976.
  • Oracle Virtualization Risk Matrix

    This Critical Patch Update contains 10 new security patches for Oracle Virtualization.  3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.