www.oracle.com Open in urlscan Pro
2a02:26f0:1700:388::a15  Public Scan

Submitted URL: http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
Effective URL: https://www.oracle.com/security-alerts/bulletinoct2015.html
Submission: On November 27 via api from HU — Scanned from DE

Form analysis 1 forms found in the DOM

Name: u30searchFormGET https://search.oracle.com/results

<form name="u30searchForm" id="u30searchForm" data-contentpaths="/content/Web/Shared/Auto-Suggest Panel Event" method="get" action="https://search.oracle.com/results">
  <div class="u30s1">
    <button id="u30closesearch" aria-label="Close Search" type="button">
      <span>Close Search</span>
      <svg width="9" height="14" viewBox="0 0 9 14" fill="none" xmlns="http://www.w3.org/2000/svg">
        <path d="M8 13L2 7L8 1" stroke="#161513" stroke-width="2"></path>
      </svg>
    </button>
    <span class="u30input">
      <div class="u30inputw1">
        <input id="u30input" name="q" value="" type="text" placeholder="Search" autocomplete="off" aria-autocomplete="both" aria-label="Search Oracle.com" role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-controls="u30searchw3">
      </div>
      <input type="hidden" name="size" value="10">
      <input type="hidden" name="page" value="1">
      <input type="hidden" name="tab" value="all">
      <span id="u30searchw3title" class="u30visually-hidden">Search Oracle.com</span>
      <div id="u30searchw3" data-pagestitle="SUGGESTED LINKS" data-autosuggesttitle="SUGGESTED SEARCHES" data-allresultstxt="All results for" data-allsearchpath="https://search.oracle.com/results?q=u30searchterm&amp;size=10&amp;page=1&amp;tab=all"
        role="listbox" aria-labelledby="u30searchw3title" style="margin-left: 0px;">
        <ul id="u30quicklinks" class="autocomplete-items" role="group" aria-labelledby="u30quicklinks-title">
          <li role="presentation" class="u30auto-title" id="u30quicklinks-title">QUICK LINKS</li>
          <li role="option"><a href="/cloud/" data-lbl="quick-links:oci">Oracle Cloud Infrastructure</a>
          </li>
          <li role=" option"><a href="/applications/" data-lbl="quick-links:applications">Oracle Fusion Cloud Applications</a></li>
          <li role="option"><a href="/database/technologies/" data-lbl="quick-links:database">Oracle Database</a></li>
          <li role="option"><a href="/java/technologies/downloads/" data-lbl="quick-links:download-java">Download Java</a>
          </li>
          <li role="option"><a href="/careers/" data-lbl="quick-links:careers">Careers at Oracle</a></li>
        </ul>
      </div>
      <span class="u30submit">
        <input class="u30searchbttn" type="submit" value="Submit Search">
      </span>
      <button id="u30clear" type="reset" aria-label="Clear Search">
        <svg width="20" height="20" viewBox="0 0 20 20" aria-hidden="true" fill="none" xmlns="http://www.w3.org/2000/svg">
          <path d="M7 7L13 13M7 13L13 7M19 10C19 14.9706 14.9706 19 10 19C5.02944 19 1 14.9706 1 10C1 5.02944 5.02944 1 10 1C14.9706 1 19 5.02944 19 10Z" stroke="#161513" stroke-width="2"></path>
        </svg>
      </button>
    </span>
  </div>
</form>

Text Content

 * Skip to content
 * Accessibility Policy

 * Products
   
 * Industries
   
 * Resources
   
 * Customers
   
 * Partners
   
 * Developers
   
 * Company
   

Close Search

Search Oracle.com
 * QUICK LINKS
 * Oracle Cloud Infrastructure
 * Oracle Fusion Cloud Applications
 * Oracle Database
 * Download Java
 * Careers at Oracle


Search
Country
Close

Would you like to visit an Oracle country site closer to you?



Visit Oracle Germany
No thanks, I'll stay here
See this page for a different country/region
View Accounts
Back
Cloud Account Sign in to Cloud Sign Up for Free Cloud Tier
Oracle Account
 * Sign-In
 * Create an Account

 * Help
 * Sign Out

Contact Sales
Menu Menu

 * Security Alerts


ORACLE SOLARIS THIRD PARTY BULLETIN - OCTOBER 2015




ORACLE SOLARIS THIRD PARTY BULLETIN - OCTOBER 2015


DESCRIPTION

The Oracle Solaris Third Party Bulletin announces patches for one or more
security vulnerabilities fixed in third party software that is included in
Oracle Solaris distributions. Starting January 20, 2015, Third Party Bulletins
are released on the same day when Oracle Critical Patch Updates are released.
These bulletins will also be updated on the Tuesday closest to the 17th of the
following two months after their release (i.e. the two months between the normal
quarterly Critical Patch Update publication dates). In addition, Third Party
Bulletins may also be updated for vulnerability fixes deemed too critical to
wait for the next monthly update.

Due to the threat posed by a successful attack, Oracle strongly recommends that
customers apply Third Party Bulletin fixes as soon as possible.


PATCH AVAILABILITY

Please see My Oracle Support Note 1448883.1


THIRD PARTY BULLETIN SCHEDULE

Third Party Bulletins are released on the Tuesday closest to the 17th day of
January, April, July and October. The next four dates are:

 * 19 January 2016
 * 19 April 2016
 * 19 July 2016
 * 18 October 2016


REFERENCES

 * Oracle Critical Patch Updates and Security Alerts main page [ Oracle
   Technology Network ]
 * Oracle Critical Patch Updates and Security Alerts - Frequently Asked
   Questions [ CPU FAQ ]
 * Risk Matrix definitions [ Risk Matrix Definitions ]
 * Use of Common Vulnerability Scoring System (CVSS) by Oracle [ Oracle CVSS
   Scoring ]


MODIFICATION HISTORY

2016-January-14 Rev 5. Added OpenSSH CVE-2016-0777 and CVE-2016-0778
2015-December-15 Rev 4. Added all CVEs fixed in Solaris 11.3SRU3.6
2015-November-16 Rev 3. Added all CVEs fixed in Solaris 11.3SRU2.4
2015-October-26 Rev 2. Added all CVEs fixed in Solaris 11.3 and 11.3SRU1.5
2015-October-20 Rev 1. Initial Release

2016-January-14 Rev 5. Added OpenSSH CVE-2016-0777 and CVE-2016-0778
2015-December-15 Rev 4. Added all CVEs fixed in Solaris 11.3SRU3.6
2015-November-16 Rev 3. Added all CVEs fixed in Solaris 11.3SRU2.4
2015-October-26 Rev 2. Added all CVEs fixed in Solaris 11.3 and 11.3SRU1.5
2015-October-20 Rev 1. Initial Release


ORACLE SOLARIS EXECUTIVE SUMMARY

This Third Party Bulletin contains 51 new security fixes for the Oracle Solaris.
41 of these vulnerabilities may be remotely exploitable without authentication,
i.e., may be exploited over a network without the need for a username and
password.


ORACLE SOLARIS RISK MATRIX

REVISION 5: PUBLISHED ON 2016-01-14

CVE# Product Protocol Third Party component Remote Exploit without Auth.? CVSS
VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen­tication Confid­entiality
Inte­grity Avail­ability
CVE-2016-0778SolarisSSHOpenSSHYes5.1NetworkHighNonePartialPartialPartial11.3
CVE-2016-0777SolarisSSHOpenSSHYes4.3NetworkMediumNonePartialNoneNone11.3

CVE# Product Protocol Third Party component Remote Exploit without Auth.? CVSS
VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen­tication Confid­entiality
Inte­grity Avail­ability
CVE-2016-0778SolarisSSHOpenSSHYes5.1NetworkHighNonePartialPartialPartial11.3
CVE-2016-0777SolarisSSHOpenSSHYes4.3NetworkMediumNonePartialNoneNone11.3

REVISION 4: PUBLISHED ON 2015-12-15

CVE# Product Protocol Third Party component Remote Exploit without Auth.? CVSS
VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen­tication Confid­entiality
Inte­grity Avail­ability CVE-2015-8000SolarisBindBind/Postinstall script for
Bind packageYes7.1NetworkMediumNoneNoneNoneComplete11.3, 10
CVE-2015-4491SolarisMultiplegdk-pixbufYes6.8NetworkMediumNonePartialPartialPartial11.3,
10 CVE-2013-1438SolarisMultipleDcrawYes4.3NetworkMediumNoneNoneNonePartial11.3
CVE-2014-3566SolarisSSL/TLSCommon Unix Printing System
(CUPS)Yes4.3NetworkMediumNonePartialNoneNone11.3
CVE-2015-7830SolarisMultipleWiresharkYes4.3NetworkMediumNoneNoneNonePartial11.3

CVE# Product Protocol Third Party component Remote Exploit without Auth.? CVSS
VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen­tication Confid­entiality
Inte­grity Avail­ability CVE-2015-8000SolarisBindBind/Postinstall script for
Bind packageYes7.1NetworkMediumNoneNoneNoneComplete11.3, 10
CVE-2015-4491SolarisMultiplegdk-pixbufYes6.8NetworkMediumNonePartialPartialPartial11.3,
10 CVE-2013-1438SolarisMultipleDcrawYes4.3NetworkMediumNoneNoneNonePartial11.3
CVE-2014-3566SolarisSSL/TLSCommon Unix Printing System
(CUPS)Yes4.3NetworkMediumNonePartialNoneNone11.3
CVE-2015-7830SolarisMultipleWiresharkYes4.3NetworkMediumNoneNoneNonePartial11.3

REVISION 3: PUBLISHED ON 2015-11-16

CVE# Product Protocol Third Party component Remote Exploit without Auth.? CVSS
VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen­tication Confid­entiality
Inte­grity Avail­ability CVE-2015-1270SolarisNoneLocalization
(L10N)No1.5LocalMediumSingleNoneNonePartial11.3
CVE-2015-4760SolarisNoneLocalization
(L10N)No1.5LocalMediumSingleNoneNonePartial11.3
CVE-2015-2632SolarisNoneLocalization
(L10N)No1.0LocalHighSingleNoneNonePartial11.3

CVE# Product Protocol Third Party component Remote Exploit without Auth.? CVSS
VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen­tication Confid­entiality
Inte­grity Avail­ability CVE-2015-1270SolarisNoneLocalization
(L10N)No1.5LocalMediumSingleNoneNonePartial11.3
CVE-2015-4760SolarisNoneLocalization
(L10N)No1.5LocalMediumSingleNoneNonePartial11.3
CVE-2015-2632SolarisNoneLocalization
(L10N)No1.0LocalHighSingleNoneNonePartial11.3

REVISION 2: PUBLISHED ON 2015-10-26

CVE# Product Protocol Third Party component Remote Exploit without Auth.? CVSS
VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen­tication Confid­entiality
Inte­grity Avail­ability
CVE-2015-2731SolarisMultipleFirefoxYes10.0NetworkLowNoneCompleteCompleteComplete11.3See
Note 13CVE-2015-5600SolarisSSHOpenSSHYes8.5NetworkLowNonePartialNoneComplete11.3
CVE-2014-6507SolarisMultipleMySQLNo8.0NetworkLowSinglePartial+Partial+Complete11.3See
Note
4CVE-2014-6507SolarisMultipleMySQLNo8.0NetworkLowSinglePartial+Partial+Complete11.3See
Note
6CVE-2014-3634SolarisMultipleRSYSLOGYes7.5NetworkLowNonePartialPartialPartial11.3See
Note
2CVE-2014-6052SolarisMultipleVNCYes7.5NetworkLowNonePartialPartialPartial11.3See
Note
10CVE-2015-0411SolarisMultipleMySQLYes7.5NetworkLowNonePartialPartialPartial11.3See
Note
5CVE-2014-3564SolarisMultipleGnuPGYes6.8NetworkMediumNonePartialPartialPartial11.3
CVE-2014-8097SolarisNoneXsun
serverNo6.8LocalLowSingleCompleteCompleteComplete10See Note
8CVE-2014-9512SolarisMultipleRSYNCYes6.4NetworkLowNoneNonePartialPartial11.3, 10
CVE-2014-2653SolarisSSHOpenSSHYes5.8NetworkMediumNoneNonePartialPartial11.3
CVE-2014-9365SolarisMultiplePython
3.4Yes5.8NetworkMediumNonePartialPartialNone11.3
CVE-2013-6371SolarisMultipleJSON-CYes5.0NetworkLowNoneNoneNonePartial11.3See
Note 3CVE-2014-3566SolarisSSL/TLSBitTorrent
ClientYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSGnome-VFSYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSOpenSSLYes5.0NetworkLowNonePartialNoneNone11.3, 10
CVE-2014-3566SolarisSSL/TLSVNCYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSPidginYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSLibTLSYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSEjabberdYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSIrssiYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSLibSoupYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2015-0248SolarisMultipleApache
SubversionYes5.0NetworkLowNoneNoneNonePartial11.3
CVE-2015-1819SolarisMultiplelibxml2Yes5.0NetworkLowNoneNoneNonePartial11.3
CVE-2015-3200SolarisMultipleLighttpdYes5.0NetworkLowNoneNonePartialNone11.3
CVE-2015-4020SolarisMultipleRubyYes5.0NetworkLowNoneNonePartialNone11.3See Note
18CVE-2015-5143SolarisMultipleDjango Python web
frameworkYes5.0NetworkLowNoneNoneNonePartial11.3
CVE-2015-4651SolarisMultipleWiresharkYes5.0NetworkLowNoneNoneNonePartial11.3See
Note 14CVE-2015-3183SolarisHTTPApache HTTP
serverYes5.0NetworkLowNoneNonePartialNone11.3 CVE-2015-0253SolarisHTTPApache
HTTP serverYes5.0NetworkLowNoneNoneNonePartial11.3See Note
7CVE-2015-5963SolarisMultipleDjango Python web
frameworkYes5.0NetworkLowNoneNoneNonePartial11.3See Note
16CVE-2014-0032SolarisMultipleApache
SubversionYes4.3NetworkMediumNoneNoneNonePartial11.3See Note
1CVE-2015-5144SolarisMultipleDjango Python web
frameworkYes4.3NetworkMediumNoneNonePartialNone11.3
CVE-2015-6241SolarisMultipleWiresharkYes4.3NetworkMediumNoneNoneNonePartial11.3See
Note 17CVE-2015-0251SolarisMultipleApache
SubversionNo4.0NetworkLowSingleNonePartialNone11.3
CVE-2015-2922SolarisMultipleNetwork ConfigurationNo3.3Adjacent
NetworkLowNoneNoneNonePartial11.3See Note 9CVE-2013-1569SolarisNoneLocalization
(L10N)No1.5LocalMediumSingleNoneNonePartial11.3See Note
11CVE-2014-8146SolarisNoneLocalization
(L10N)No1.0LocalHighSingleNoneNonePartial11.3See Note 12

CVE# Product Protocol Third Party component Remote Exploit without Auth.? CVSS
VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen­tication Confid­entiality
Inte­grity Avail­ability
CVE-2015-2731SolarisMultipleFirefoxYes10.0NetworkLowNoneCompleteCompleteComplete11.3See
Note 13CVE-2015-5600SolarisSSHOpenSSHYes8.5NetworkLowNonePartialNoneComplete11.3
CVE-2014-6507SolarisMultipleMySQLNo8.0NetworkLowSinglePartial+Partial+Complete11.3See
Note
4CVE-2014-6507SolarisMultipleMySQLNo8.0NetworkLowSinglePartial+Partial+Complete11.3See
Note
6CVE-2014-3634SolarisMultipleRSYSLOGYes7.5NetworkLowNonePartialPartialPartial11.3See
Note
2CVE-2014-6052SolarisMultipleVNCYes7.5NetworkLowNonePartialPartialPartial11.3See
Note
10CVE-2015-0411SolarisMultipleMySQLYes7.5NetworkLowNonePartialPartialPartial11.3See
Note
5CVE-2014-3564SolarisMultipleGnuPGYes6.8NetworkMediumNonePartialPartialPartial11.3
CVE-2014-8097SolarisNoneXsun
serverNo6.8LocalLowSingleCompleteCompleteComplete10See Note
8CVE-2014-9512SolarisMultipleRSYNCYes6.4NetworkLowNoneNonePartialPartial11.3, 10
CVE-2014-2653SolarisSSHOpenSSHYes5.8NetworkMediumNoneNonePartialPartial11.3
CVE-2014-9365SolarisMultiplePython
3.4Yes5.8NetworkMediumNonePartialPartialNone11.3
CVE-2013-6371SolarisMultipleJSON-CYes5.0NetworkLowNoneNoneNonePartial11.3See
Note 3CVE-2014-3566SolarisSSL/TLSBitTorrent
ClientYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSGnome-VFSYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSOpenSSLYes5.0NetworkLowNonePartialNoneNone11.3, 10
CVE-2014-3566SolarisSSL/TLSVNCYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSPidginYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSLibTLSYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSEjabberdYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSIrssiYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2014-3566SolarisSSL/TLSLibSoupYes5.0NetworkLowNonePartialNoneNone11.3
CVE-2015-0248SolarisMultipleApache
SubversionYes5.0NetworkLowNoneNoneNonePartial11.3
CVE-2015-1819SolarisMultiplelibxml2Yes5.0NetworkLowNoneNoneNonePartial11.3
CVE-2015-3200SolarisMultipleLighttpdYes5.0NetworkLowNoneNonePartialNone11.3
CVE-2015-4020SolarisMultipleRubyYes5.0NetworkLowNoneNonePartialNone11.3See Note
18CVE-2015-5143SolarisMultipleDjango Python web
frameworkYes5.0NetworkLowNoneNoneNonePartial11.3
CVE-2015-4651SolarisMultipleWiresharkYes5.0NetworkLowNoneNoneNonePartial11.3See
Note 14CVE-2015-3183SolarisHTTPApache HTTP
serverYes5.0NetworkLowNoneNonePartialNone11.3 CVE-2015-0253SolarisHTTPApache
HTTP serverYes5.0NetworkLowNoneNoneNonePartial11.3See Note
7CVE-2015-5963SolarisMultipleDjango Python web
frameworkYes5.0NetworkLowNoneNoneNonePartial11.3See Note
16CVE-2014-0032SolarisMultipleApache
SubversionYes4.3NetworkMediumNoneNoneNonePartial11.3See Note
1CVE-2015-5144SolarisMultipleDjango Python web
frameworkYes4.3NetworkMediumNoneNonePartialNone11.3
CVE-2015-6241SolarisMultipleWiresharkYes4.3NetworkMediumNoneNoneNonePartial11.3See
Note 17CVE-2015-0251SolarisMultipleApache
SubversionNo4.0NetworkLowSingleNonePartialNone11.3
CVE-2015-2922SolarisMultipleNetwork ConfigurationNo3.3Adjacent
NetworkLowNoneNoneNonePartial11.3See Note 9CVE-2013-1569SolarisNoneLocalization
(L10N)No1.5LocalMediumSingleNoneNonePartial11.3See Note
11CVE-2014-8146SolarisNoneLocalization
(L10N)No1.0LocalHighSingleNoneNonePartial11.3See Note 12

REVISION 1: PUBLISHED ON 2015-10-20

CVE# Product Protocol Third Party component Remote Exploit without Auth.? CVSS
VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen­tication Confid­entiality
Inte­grity Avail­ability
CVE-2015-5600SolarisSSHSSHYes8.5NetworkLowNonePartialNoneComplete11.2, 10
CVE-2014-0230SolarisHTTPApache TomcatYes5.0NetworkLowNoneNoneNonePartial11.2,
10See Note 15CVE-2014-8111SolarisHTTPApache HTTP
serverYes5.0NetworkLowNonePartialNoneNone11.2, 10

CVE# Product Protocol Third Party component Remote Exploit without Auth.? CVSS
VERSION 2.0 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base Score Access Vector Access Complexity Authen­tication Confid­entiality
Inte­grity Avail­ability
CVE-2015-5600SolarisSSHSSHYes8.5NetworkLowNonePartialNoneComplete11.2, 10
CVE-2014-0230SolarisHTTPApache TomcatYes5.0NetworkLowNoneNoneNonePartial11.2,
10See Note 15CVE-2014-8111SolarisHTTPApache HTTP
serverYes5.0NetworkLowNonePartialNoneNone11.2, 10

NOTES:

 1.  This fix also addresses CVE-2013-4262 CVE-2013-7393 CVE-2014-3504
     CVE-2014-3522 CVE-2014-3528.
 2.  This fix also addresses CVE-2014-3683.
 3.  This fix also addresses CVE-2013-6370.
 4.  This fix also addresses CVE-2012-5615 CVE-2013-1511 CVE-2013-3793
     CVE-2014-2432 CVE-2014-2440 CVE-2014-2494 CVE-2014-4243 CVE-2014-4260
     CVE-2014-4274 CVE-2014-4287 CVE-2014-6464 CVE-2014-6484 CVE-2014-6494
     CVE-2014-6496 CVE-2014-6505 CVE-2014-6507 CVE-2014-6520 CVE-2014-6530
     CVE-2014-6551 CVE-2014-6555 CVE-2014-6559 CVE-2014-6568 CVE-2015-0391
     CVE-2015-0432 CVE-2015-0433 CVE-2015-0499 CVE-2015-0505 CVE-2015-2573.
 5.  This fix also addresses CVE-2013-2376 CVE-2013-5807 CVE-2014-0384
     CVE-2014-2438 CVE-2015-0411 CVE-2015-0441.
 6.  This fix also addresses CVE-2013-1502 CVE-2013-1511 CVE-2013-3794
     CVE-2013-3801 CVE-2013-3805 CVE-2013-3809 CVE-2013-3812 CVE-2013-5891
     CVE-2014-0420 CVE-2014-2419 CVE-2014-2430 CVE-2014-2431 CVE-2014-2432
     CVE-2014-2436 CVE-2014-2440 CVE-2014-2494 CVE-2014-4207 CVE-2014-4243
     CVE-2014-4258 CVE-2014-4260 CVE-2014-4287 CVE-2014-6463 CVE-2014-6464
     CVE-2014-6469 CVE-2014-6478 CVE-2014-6484 CVE-2014-6491 CVE-2014-6494
     CVE-2014-6495 CVE-2014-6496 CVE-2014-6500 CVE-2014-6505 CVE-2014-6507
     CVE-2014-6520 CVE-2014-6530 CVE-2014-6555 CVE-2014-6559 CVE-2014-6568
     CVE-2015-0374 CVE-2015-0381 CVE-2015-0382 CVE-2015-0391 CVE-2015-0432
     CVE-2015-0433 CVE-2015-0499 CVE-2015-0505 CVE-2015-2568 CVE-2015-2571.
 7.  This fix also addresses CVE-2015-0228 CVE-2015-3183 CVE-2015-3185.
 8.  This fix also addresses CVE-2014-8091 CVE-2014-8092 CVE-2014-8095
     CVE-2014-8096 CVE-2014-8100 CVE-2014-8102 CVE-2015-3418.
 9.  This fix also addresses CVE-2015-2923.
 10. This fix also addresses CVE-2014-6051 CVE-2014-8240 CVE-2014-8241.
 11. This fix also addresses CVE-2013-2383 CVE-2013-2384 CVE-2013-2419.
 12. This fix also addresses CVE-2014-8147.
 13. This fix also addresses CVE-2015-2721 CVE-2015-2722 CVE-2015-2724
     CVE-2015-2725 CVE-2015-2726 CVE-2015-2728 CVE-2015-2729 CVE-2015-2730
     CVE-2015-2733 CVE-2015-2734 CVE-2015-2735 CVE-2015-2736 CVE-2015-2737
     CVE-2015-2738 CVE-2015-2739 CVE-2015-2740 CVE-2015-2741 CVE-2015-2742
     CVE-2015-2743.
 14. This fix also addresses CVE-2015-4652.
 15. This fix also addresses CVE-2014-7810.
 16. This fix also addresses CVE-2015-5964.
 17. This fix also addresses CVE-2015-6242 CVE-2015-6243 CVE-2015-6244
     CVE-2015-6245 CVE-2015-6246 CVE-2015-6247 CVE-2015-6248 CVE-2015-6249.
 18. This fix also addresses CVE-2015-3900.

RESOURCES FOR

 * Careers
 * Developers
 * Investors
 * Partners
 * Researchers
 * Students and Educators

WHY ORACLE

 * Analyst Reports
 * Best cloud-based ERP
 * Cloud Economics
 * Social Impact
 * Culture and Inclusion
 * Security Practices

LEARN

 * What is cloud computing?
 * What is CRM?
 * What is Docker?
 * What is Kubernetes?
 * What is Python?
 * What is SaaS?

NEWS AND EVENTS

 * News
 * Oracle CloudWorld
 * Oracle CloudWorld Tour
 * Oracle Health Summit
 * Oracle DevLive
 * Search all events

CONTACT US

 * DE Sales +49 6103 397 003
 * US Sales: +1.800.633.0738
 * How can we help?
 * Subscribe to emails
 * Integrity Helpline
 * Accessibility

--------------------------------------------------------------------------------

 * 
 * © 2024 Oracle
 * Privacy/Do Not Sell My Info
 * Cookie-Einstellungen
 * Ad Choices
 * Careers

 * 
 * 
 * 
 *