Exploitable Patches - Double Check, Triple Check ~ The NIMDA and Anthrax Fraud

site-outer-wrapper ..
header-wrapper

The untold story Cyberterrorism event as told by former AT&T (SBC Global) Programmer. Unpaid, beaten, set on fire, family murdered, linked to Anthrax, San Bruno Explosion, and the deadly #campfire. AT&T has buried a domestic terrorism story - the question is why. Through this portal we'll ask them why

Exploitable Patches - Double Check, Triple Check

Getting Inside Your Organaztion

She brings some Captain or similar delight so you'll fast asleep for the night

You fall asleep

Your systems are operational, your screen saver didn't save the last thing you remember is her hemline as you blackout. You wakeup your both naked, her phone rings and she has too leave. You get back to work applying security patches and then log off from your superuser account. 

A few days later your wife finds her business card in your jacket. 

 You're litterally Pukin when you the same address. A month your nephews appear on CNN saying a family of five dead from poison. Then you start getting arrested even though you've done nothing wrong.

Years later you be to begin to see the connections 

. Then you discover your adversaries, oddly terminated projects and clients who fired you have common connections to each other via energy,banking, law and banking.

 Exploitable Server Hacks left open in purpose - see vault 7 



Critical Patch Updates, Security Alerts and Bulletins Security Alerts Chicklet

This page lists announcements of security fixes made in Critical Patch Update Advisories, Security Alerts and Bulletins, and it is updated when new Critical Patch Update Advisories, Security Alerts and Bulletins are released.

This page contains the following sections:

Critical Patch Updates

Critical Patch Updates are collections of security fixes for Oracle products. They are available to customers with valid support contracts. They are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:

  • 19 January 2021
  • 20 April 2021
  • 20 July 2021
  • 19 October 2021

A pre-release announcement will be published on the Thursday preceding each Critical Patch Update release.

The Critical Patch Updates released since 2015 are listed in the following table. Critical Patch Updates released before 2015 are available here.

Security Alerts

Oracle will issue Security Alerts for vulnerability fixes deemed too critical to wait for distribution in the next Critical Patch Update. The Security Alerts released since 2015 are listed in the following table. Security Alerts released before 2015 are available here.

Security Alert Number And DescriptionLatest Version/Date
Alert for CVE-2019-2729Rev 4, 11 July 2019
Alert for CVE-2019-2725Rev 4, 29 May 2019
Alert for CVE-2018-11776Rev 1, 31 August 2018
Alert for CVE-2018-3110Rev 1, 10 August 2018
Alert for CVE-2017-10269Rev 2, 16 November 2017
Alert for CVE-2017-10151Rev 3, 04 November 2017
Alert for CVE-2017-9805Rev 1, 22 September 2017
Alert for CVE-2017-3629Rev 2, 20 June 2017
Alert for CVE-2016-0636Rev 1, 23 March 2016
Alert for CVE-2016-0603Rev 1, 05 February 2016
Alert for CVE-2015-4852Rev 2, 12 November 2015
Alert for CVE-2015-3456 QEMU "Venom"Rev 1, 15 May 2015

Solaris Third Party Bulletins

Solaris Third Party Bulletins are used to announce security patches for third party software distributed with Oracle Solaris. Solaris Third Party Bulletins are published on the same day as Oracle Critical Patch Updates are released. These bulletins are be updated on the Tuesday closest to the 17th of the following two months after their release (i.e., the two months between the normal quarterly Critical Patch Update publication dates). In addition, Solaris Third Party Bulletins may also be updated for vulnerability patches deemed too critical to wait for the next scheduled publication date. Bulletins published before January 20, 2015 are available here.

Solaris Third Party BulletinLatest Version/Date
Solaris Third Party Bulletin - October 2020Rev 1, 20 October 2020
Solaris Third Party Bulletin - July 2020Rev 3, 15 September 2020
Solaris Third Party Bulletin - April 2020Rev 3, 16 June 2020
Solaris Third Party Bulletin - January 2020Rev 3, 16 March 2020
Solaris Third Party Bulletin - October 2019Rev 3, 17 December 2019
Solaris Third Party Bulletin - July 2019Rev 4, 03 October 2019
Solaris Third Party Bulletin - April 2019Rev 3, 25 June 2019
Solaris Third Party Bulletin - January 2019Rev 4, 16 April 2019
Solaris Third Party Bulletin - October 2018Rev 3, 14 December 2018
Solaris Third Party Bulletin - July 2018Rev 3, 24 September 2018
Solaris Third Party Bulletin - April 2018Rev 3, 15 June 2018
Solaris Third Party Bulletin - January 2018Rev 3, 20 March 2018
Solaris Third Party Bulletin - October 2017Rev 3, 18 December 2017
Solaris Third Party Bulletin - July 2017Rev 4, 18 September 2017
Solaris Third Party Bulletin - April 2017Rev 4, 19 June 2017
Solaris Third Party Bulletin - January 2017Rev 4, 28 March 2017
Solaris Third Party Bulletin - October 2016Rev 5, 11 January 2017
Solaris Third Party Bulletin - July 2016Rev 6, 10 April 2017
Solaris Third Party Bulletin - April 2016Rev 8, 16 October 2017
Solaris Third Party Bulletin - January 2016Rev 5, 12 April 2016
Solaris Third Party Bulletin - October 2015Rev 5, 14 January 2016
Solaris Third Party Bulletin - July 2015Rev 6, 15 September 2015
Solaris Third Party Bulletin - April 2015Rev 3, 15 June 2015
Solaris Third Party Bulletin - January 2015Rev 5, 01 April 2015

Oracle Linux Bulletins

Oracle releases security advisories for Oracle Linux as patches become available. Security advisories (ELSA) are published at https://linux.oracle.com/security/.

Starting October 20, 2015, Oracle will also publish Oracle Linux Bulletins which list all CVEs that had been resolved and announced in Oracle Linux Security Advisories in the last one month prior to the release of the bulletin. The Oracle Linux Bulletin will be published on the same day as Oracle Critical Patch Updates are released. These bulletins will also be updated for following two months after their release (i.e., the two months between the normal quarterly Critical Patch Update publication dates) to cover all CVEs that had been resolved in those two months following the bulletin's publication. In addition, Oracle Linux Bulletins may also be updated for vulnerability patches deemed too critical to wait for the next scheduled bulletin publication date.

Oracle Linux BulletinLatest Version/Date
Oracle Linux Bulletin - October 2020Rev 1, 20 October 2020
Oracle Linux Bulletin - July 2020Rev 3, 21 September 2020
Oracle Linux Bulletin - April 2020Rev 3, 15 June 2020
Oracle Linux Bulletin - January 2020Rev 3, 17 March 2020
Oracle Linux Bulletin - October 2019Rev 3, 18 December 2019
Oracle Linux Bulletin - July 2019Rev 3, 19 September 2019
Oracle Linux Bulletin - April 2019Rev 3, 18 June 2019
Oracle Linux Bulletin - January 2019Rev 3, 18 March 2019
Oracle Linux Bulletin - October 2018Rev 3, 17 December 2018
Oracle Linux Bulletin - July 2018Rev 3, 18 September 2018
Oracle Linux Bulletin - April 2018Rev 3, 18 June 2018
Oracle Linux Bulletin - January 2018Rev 3, 16 March 2018
Oracle Linux Bulletin - October 2017Rev 3, 18 December 2017
Oracle Linux Bulletin - July 2017Rev 3, 18 September 2017
Oracle Linux Bulletin - April 2017Rev 3, 19 June 2017
Oracle Linux Bulletin - January 2017Rev 3, 17 March 2017
Oracle Linux Bulletin - October 2016Rev 3, 19 December 2016
Oracle Linux Bulletin - July 2016Rev 3, 19 September 2016
Oracle Linux Bulletin - April 2016Rev 3, 20 June 2016
Oracle Linux Bulletin - January 2016Rev 3, 21 March 2016
Oracle Linux Bulletin - October 2015Rev 3, 21 December 2015

Oracle VM Server for x86 Bulletins

Oracle releases security advisories for Oracle VM Server for x86 as patches become available. Security advisories (OVMSA) are published at https://linux.oracle.com/errata/.

Starting July 19, 2016, Oracle will also publish Oracle VM Server for x86 Bulletins which will list all CVEs that had been resolved and announced in Oracle VM Server for x86 Security Advisories in the last one month prior to the release of the bulletin. The Oracle VM Server for x86 Bulletin will be published on the same day as Oracle Critical Patch Updates are released. These bulletins will also be updated for following two months after their release (i.e., the two months between the normal quarterly Critical Patch Update publication dates) to cover all CVEs that had been resolved in those two months following the bulletin's publication. In addition, Oracle VM Server for x86 Bulletins may also be updated for vulnerability patches deemed too critical to wait for the next scheduled bulletin publication date.

Map of CVE to Advisory/Alert

The Map of CVE to Advisory/Alert indicates which CVEs are fixed in each Critical Patch Update and Security Alert. The Map of CVE to Solaris Third Party Bulletin indicates which CVEs are fixed in each Solaris Third Party Bulletin.

Policy on Information Provided in Critical Patch Updates and Security Alerts

As a matter of policy, Oracle will not provide additional information about the specifics of vulnerabilities beyond what is provided in the Critical Patch Update or Security Alert notification, the pre-installation notes, the readme files, and FAQs. Oracle provides all customers with the same information in order to protect all customers equally. Oracle will not provide advance notification or "insider information" on Critical Patch Update or Security Alerts to individual customers. Finally, Oracle does not develop or distribute active exploit code (or "proof of concept code") for vulnerabilities in our products.

Applicability of Critical Patch Updates and Security Alerts to Oracle Cloud

The Oracle Cloud operations and security teams regularly evaluate Oracle’s Critical Patch Updates and Security Alert fixes as well as relevant third-party fixes as they become available and apply the relevant patches in accordance with applicable change management processes.

Customers requiring additional information that is not addressed in the Critical Patch Update Advisory may obtain additional information as follows:

  • Oracle Cloud (IaaS, PaaS, and SaaS) customers should submit a SR within their designated support system
  • Oracle Managed Cloud Services (OMCS) customers should contact their Service Delivery Manager (SDM). CRM On Demand customers should request status via a Service Request (SR).
  • Global Business Units/Industry Cloud Services and Micros Cloud customers should submit a SR within their designated support system or, if applicable, contact their Customer Success Manager.
  • Oracle Data Cloud (ODC) customers should contact their Client Partner.
  • Oracle NetSuite customers should submit an Oracle NetSuite Support Case from within their Oracle NetSuite account.

References

Share:

No comments:

Post a Comment

Advertisement

Popular Posts

No one has ever become poor by giving, Please Donate

Blog Archive

Labels

Recent Posts

Recent Posts

Popular Posts

Powered by Blogger.

Search This Blog

Blog Archive

sss

open all | close all

Recent Posts

Pages

-->