PaaS Community Blog


Home | Pages | Archives


Oracle Critical Patch Update for October 2018 is Released

November 3, 2018 08:44

imageThe Critical Patch Update for October 2018 is released today. Oracle strongly recommends applying the patches as soon as possible. The Critical Patch Update Advisory is the starting point for finding relevant information. It includes the list of products affected, pointers to obtain the patches, a summary of the security vulnerabilities for each product suite, and links to other important documents. Supported products that are not listed in the "Affected Products and Components" section of the advisory do not require new patches to be applied. It is also essential to review the Critical Patch Update supporting documentation referenced in this Advisory before applying patches, as this is where you can find important pertinent information.

More information about Critical Patch Update Advisories are available at the following location:

Oracle Fusion Middleware Risk Matrix– Oracle Technology Network
Oracle Critical Patch Update Advisory – October 2018– Oracle Technology Network:
Critical Patch Updates, Security Alerts and Bulletins – Oracle Technology Network:
► Oracle Knowledge Management Document – October 2018 Critical Patch Update: Executive Summary and Analysis (Doc ID 2456979.1)
► Important information can also be found at: https://blogs.oracle.com/security/

PaaS Partner Community

For regular information on Oracle PaaS become a member in the SOA & BPM Partner Community for registration please visit www.oracle.com/goto/emea/soa (OPN account required) If you need support with your account please contact the Oracle Partner Business Center.

Blog Twitter LinkedIn image[7][2][2][2] Facebook clip_image002[8][4][2][2][2] Wiki

Technorati Tags: SOA Community,Oracle SOA,Oracle BPM,OPN,Jürgen Kress

Rate this:

Posted by Jürgen Kress

Categories: SOA

Tags: , , , ,

Leave a Reply



Mobile Site | Full Site


Get a free blog at WordPress.com Theme: WordPress Mobile Edition by Alex King.