Oracle on Tuesday announced the release of its latest quarterly Critical Patch Update (CPU), which includes a total of 419 security patches for vulnerabilities across the company’s portfolio.
Just over half of the patches address vulnerabilities that could be exploited remotely without authentication, Oracle announced.
Of the 419 new security patches in the October 2021 CPU, 36 deal with critical vulnerabilities, with one of them featuring a CVSS score of 10. The CPU also addresses 60 vulnerabilities that feature a CVSS score between 8 and 9.
Oracle Communications received the largest number of patches in this CPU, at 71. Of these, 56 vulnerabilities could be exploited remotely without authentication.
MySQL also received a large number of fixes, namely 66. Exploitation of 10 of the addressed issues can be done remotely, without authentication.
Financial Services Applications received 44 security patches (26 of the vulnerabilities could be exploited by remote, unauthenticated attackers), while Fusion Middleware received 38 (30 security holes remotely exploitable without authentication).
Other Oracle software to have received more than ten security fixes includes Retail Applications (26 patches – including 9 flaws remotely exploitable without authentication), Communications Applications (19 – 14), E-Business Suite (18 – 4), PeopleSoft (17 – 8), Insurance Applications (16 – 11), Java SE (15 – 13), Construction and Engineering (12 – 7), and JD Edwards (11 – 8).
Oracle also released security patches for Commerce, Database Server, Essbase, Enterprise Manager, GoldenGate, Graph Server and Client, Health Sciences Applications, Hospitality Applications, Hyperion, REST Data Services, Secure Backup, Siebel CRM, Supply Chain, Systems, Utilities Applications, and Virtualization.
The company announced that, while no new patches were released for Global Lifecycle Management, NoSQL, Spatial Studio, and SQL Developer, updates rolling out for them address third-party vulnerabilities.
Some of the security patches released for other Oracle software address additional vulnerabilities as well, including in third-party components.
As usual, Oracle urges users and administrators to apply the newly released patches in a timely manner, warning that attackers are constantly targeting known vulnerabilities in its products, for which fixes are available.
“In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay,” the company says.
Oracle plans to release the next quarterly CPU on January 18, 2022.