Know the Risk: Digital Transformation's Impact on Your Business-Critical Applications REGISTER >
Oracle has patched 36 security bugs across various products. This is one of the lowest bug counts the company has reported in its quarterly Critical Patch Update (CPU) cycle, the 10th since the company began the CPU process.
Not all the bugs that Oracle is fixing in this update are new, however. Among the bugs it addresses is one that dates back to 2003, according to security firm Red Database Security.
Oracle's database products get the lion's share of fixes with 14 in total. Oracle E-Business suite is close behind with 11 new security fixes, two of which the company said can be remotely exploited over a network without the need for a username and password.
There are also single fixes for J.D. Edwards' EnterpriseOne and OneWorld Tools, as well as PeopleSoft Enterprise Human Capital Management.
The company first began detailing which flaws were remotely exploitable without authentication in the October CPU in which 56 such flaws were identified.
The 36 flaws in this update match the number that Oracle reported in its April 2006 CPU one year ago.
Eric Maurice, manager for security in Oracle's global technology business unit, praised the CPU process as something that is working out well for customers.
"The predictability provided by the Critical Patch Update mechanism is very important to Oracle customers," Maurice wrote on the Oracle Global Product Security blog. "It results in enabling customers to plan for the Critical Patch Updates and install them in their normal maintenance windows to avoid undue interruptions in their business-critical systems."
Though Oracle's CPU process may well be making security updates easier for customers, that is not to say the process isn't easy for Oracle.
"Even as we reach our tenth Critical Patch Update milestone, the effort required to produce and test the patches for all products and platforms combinations in time for our quarterly release dates remains significant," Maurice continued on the blog.