Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Oracle Issues Massive Collection of Critical Security Updates
Newest First  |  Oldest First  |  Threaded View
ThomasMaloney
50%
50%
ThomasMaloney,
User Rank: Apprentice
12/21/2018 | 4:00:25 AM
Do not take the risk
Some users are to complacent when it comes to system updates. Since these updates often take a lot of time to complete, users become reluctant to complete them. This opens up the opportunity for their systems to be come vulnerable and they are letting themselves become exposed to threats.
markgrogan
50%
50%
markgrogan,
User Rank: Strategist
12/18/2018 | 10:13:58 PM
Fix and Patch
I wonder if it's a better idea to release the patches or just blast them all out at one shot so that people can download all the fixes at one shot. It makes for  a shorter down time I reckon? But honestly, the amount of patches that are being released by Oracle right now, it sort of puts a bit of a dampener if you think about just how secure your system has been... Well.. At least they are doing something about it and fixing it and letting their users know I suppose! 
KellimWorthington
50%
50%
KellimWorthington,
User Rank: Apprentice
11/29/2018 | 12:47:53 AM
update
i didn't know much detail about this issues in oracle i am new database this i didn't have much knowledge this is why i don't know what is the issue if anyone full then tells me about this because i wanted to do my university assignment for me on any topic related to database and its features.


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19740
PUBLISHED: 2019-12-12
Octeth Oempro 4.7 allows SQL injection. The parameter CampaignID in Campaign.Get is vulnerable.
CVE-2019-19746
PUBLISHED: 2019-12-12
make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type.
CVE-2019-19748
PUBLISHED: 2019-12-12
The Work Time Calendar app before 4.7.1 for Jira allows XSS.
CVE-2017-18640
PUBLISHED: 2019-12-12
The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
CVE-2019-19726
PUBLISHED: 2019-12-12
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from th...