SlideShare a Scribd company logo
1 of 43
Oracle RDBMS Patching
Brian Hitchcock
OCP 8, 8i, 9i DBA
Sun Microsystems
brian.hitchcock@sun.com
brhora@aol.com
NoCOUG
Brian Hitchcock May 6, 2004 Page 1
NoCOUG
Brian Hitchcock May 6, 2004 Page 2
Why Patch the RDBMS?
 To upgrade
– For example 8.1.7.0 to 8.1.7.4
 One-off patch
– Fix a specific bug
 Security patches
– Fix specific security issues for specific products
– This is the focus here…
– But notice that I end up patching to 8.1.7.4 as
well…
NoCOUG
Brian Hitchcock May 6, 2004 Page 3
Patching In General
 Is becoming a bigger issue
– More patches more often
– More patches for more products
– Think this is bad?
– Oracle apps patching makes this look easy
– Apps 11i patching is more complex
 Many more modules, interactions
NoCOUG
Brian Hitchcock May 6, 2004 Page 4
Patching In General
 And, more fun…
– No way to back out of a patch
 In general
 Specific patches may say you can deinstall…
 But what if that patch required 8.1.7.4?
– Once applied, only one way to go back…
 Full restore of ORACLE_HOME from backup
– No way to tell what patch level a database is at
 Other than version such as 8.1.7.4
 You must manually keep track of patches applied
NoCOUG
Brian Hitchcock May 6, 2004 Page 5
Patching In General
 How often do you patch?
– Every time a new security patch is available?
– Quarterly?
 Security risk until latest patch(es) applied?
– Testing for each patch?
 For bug fix patch, testing is clear
 For other types of patches
- None?
- Complete?
- In between?
NoCOUG
Brian Hitchcock May 6, 2004 Page 6
Patch Testing Details
 What is your policy?
– Apply all needed patches, test?
– Apply one patch and test?
– If testing shows problems, what to do?
– Need to test
 Your app software
 Vendor app software
 OS issues
 Security, chroot, other software components
NoCOUG
Brian Hitchcock May 6, 2004 Page 7
How Do You Know…?
 What patch(es) do you need to apply?
– Security alerts from Oracle
 Must review each one manually
– Metalink
– Your environment has hit a specific bug
– Need specific functionality
 Feature isn’t available until 9.2.0.4
NoCOUG
Brian Hitchcock May 6, 2004 Page 8
How Do You Know…?
 For security patches
– Oracle sends out security alerts
 Each alert applies to specific products
 Your site doesn’t need all of them
 No source for a single list of which patches you
need
– I like to file a TAR to confirm the patches I need
 Some patches require other patches
 Fun, fun, fun!
NoCOUG
Brian Hitchcock May 6, 2004 Page 9
Example, for 8.1.7.0
 Get current with all security alerts
– Political
– Nothing was done for a long time
– A manager read about a recent oracle alert
– Suddenly we have to apply lots of patches
NoCOUG
Brian Hitchcock May 6, 2004 Page 10
Why Discuss 8.1.7.0?
 8.1.7.0 is not cool!
 Cool DBAs only talk about 10g!
 But real world has 8.1.7.X databases
 The older a db version becomes the more
patches you will need to stay current
 Same issues are happening for 9i
– Will happen for 10g
 Process is the same, starting version doesn’t
matter
NoCOUG
Brian Hitchcock May 6, 2004 Page 11
Finding Security Alerts
 Metalink
 FAQ for security alerts
– Doc id 237007.1
– Item I, generic questions
 Number 10, what security patches do I need for
my database?
 Points to number 13, security patch matrix
- 8.1.7.4 doesn’t need patches below #48
- 9.2.0.4 doesn’t need patches below #59
– When I did this I needed 48, 49, 50, 51, 54
 Security alert #62 hadn’t been issued at that time
– Today I would need #62 as well…
NoCOUG
Brian Hitchcock May 6, 2004 Page 12
Finding Security Alerts
 FAQ for security alerts (cont’d)
– Item II, list of security alerts and notes
 Lists security alerts #18 through #66
 Review each security alert for patch #
– Security alert #66 is most recent as of today
 Check Metalink frequently
– 237007.1 changed may 07, 2004 while I was
creating the previous slide
– Note that more products means more patches
 Database plus app server etc.
NoCOUG
Brian Hitchcock May 6, 2004 Page 13
Security Alerts
 Listing of security alerts from doc id 237007.1
II. List of Security Alerts and Notes (since Nov 2001)
II.1. Security Alerts:
Doc 265308.1 Security Alert #66: Vulnerabilities in Oracle Application Server Web Cache
Doc 258997.1 Security Alert #65: Security Vulnerability in Oracle9i Application and Database Servers
Doc 263508.1 Security Alert #64: Buffer Overflow in Oracle9i Database Server
Doc 263509.1 Security Alert #63: Security Vulnerabilities in Oracle9i Lite
Doc 258996.1 Security Alert #62: SSL Update for CERT CA-2003-26 and older SSL issues
Doc 253982.1 Security Alert #61: SQL Injection Vulnerability in Oracle9i Application Server
Doc 252706.1 Security Alert #60: Unauthorized Access to Restricted Content in Oracle Files
Doc 251910.1 Security Alert #59: Buffer Overflow in Oracle Binaries
Doc 246202.1 Security Alert #58: Buffer Overflow in the XML Database of Oracle9i Database Server
Doc 244523.1 Security Alert #57: Buffer Overflows in EXTPROC of Oracle Database Server
Doc 244335.1 Security Alert #56: Buffer Overflow Vulnerability in Oracle E-Business Suite
Doc 244294.1 Security Alert #55: Unauthorized Disclosure of Information in Oracle E-Business Suite
Doc 237172.1 Security Alert #54: Buffer Overflow in Oracle Net Services for Oracle Database Server
Doc 235262.1 Security Alert #53: Report Review Agent (RRA/FNDFS) Vulnerability in Oracle E-Business Suite
Doc 229288.1 Security Alert #52: Two Vulnerabilities in Oracle9i Application Server
Doc 229287.1 Security Alert #51: Buffer Overflow in the Oracle Executable of Oracle Database Server
Doc 229286.1 Security Alert #50: Buffer Overflow in Oracle Database
NoCOUG
Brian Hitchcock May 6, 2004 Page 14
Security Alerts
Doc 229285.1 Security Alert #49: Buffer Overflow in Oracle Database
Doc 229284.1 Security Alert #48: Buffer Overflow in Oracle Database
Doc 224215.1 Security Alert #47: Vulnerabilities in Oracle 9i Application Server
Doc 216775.1 Security Alert #46: Buffer Overflow in iSQL*Plus (Oracle9i Database Server)
Doc 214356.1 Security Alert #45: Security Release of Apache 1.3.27
Doc 213415.1 Security Alert #44: Unauthorized Access Vulnerability in the Oracle E-Business
Doc 213413.1 Security Alert #43: Oracle9i Application Server - Web Cache Administration Tool Crash on Malformed Request
Doc 213411.1 Security Alert #42: Security Vulnerability in Oracle Net
Doc 207272.1 Security Alert #41: Oracle9i Application Server Oracle Java Server Page Demos Vulnerability
Doc 207269.1 Security Alert #40: Oracle Net Listener Vulnerabilities
Doc 207271.1 Security Alert #39: Oracle9i Application Server - Web Cache Administrator Password Not Encrypted
Doc 207268.1 Security Alert #38: Security vulnerability in Oracle Net
Doc 206034.1 Security Alert #37: OpenSSL Security Vulnerability
Doc 200873.1 Security Alert #36: Security Vulnerability in Apache HTTP Server of Oracle9iAS
Doc 198531.1 Security Alert #35: Buffer Overflow Vulnerability in Oracle9iAS Reports
Doc 198544.1 Security Alert #34: Security Vulnerability in Oracle Net (Oracle9i Database Server)
Doc 185074.1 Security Alert #33: User Privileges Vulnerability in Oracle9i Database Server
Doc 185073.1 Security Alert #32: Unauthorized Access Vulnerability in the Oracle E-Business Suite
Doc 182244.1 Security Alert #31: Oracle Configurator Security Issue: Potential Cross-site Scripting Attacks
Doc 183556.1 Security Alert #30: SNMP Vulnerability in Oracle Enterprise Manager, Master_Peer Agent
Doc 175429.1 Security Alert #29: ALERT: Oracle PL/SQL extproc in Oracle 9i, Oracle 8i and Oracle8 Database
NoCOUG
Brian Hitchcock May 6, 2004 Page 15
Security Alerts
Doc 175428.1 Security Alert #28: Vulnerabilities in Oracle mod_plsql and JSP in Oracle 9iAS V1.0.2.x
Doc 169628.1 Security Alert #27: Vulnerabilities in Oracle 9i Application Server Web Cache
Doc 168862.1 Security Alert #26: Potential DoS Vulnerability in Oracle9i Application Server
Doc 168863.1 Security Alert #25: Vulnerabilities in MODPLSQL
No Doc Security Alert #24: Skipped
Multiple Doc (Security Alert #23 is split into 3 documents on MetaLink)
Doc 167001.1 Security Alert #23: Oracle Home Environment Variable Buffer Overflow
Doc 167004.1 Security Alert #23: CHOWN Path Environment Variable Vulnerability
Doc 167007.1 Security Alert #23: Oracle Home Environment Variable Validation Vulnerability
Doc 166869.1 Security Alert #22: Security Implications of the Oracle9iAS v.1.0.2.2 Default SOAP Configuration
Doc 163726.1 Security Alert #21: Oracle Label Security Mandatory Security Patch
Doc 163727.1 Security Alert #20: Oracle File Overwrite Security Vulnerability
Doc 163728.1 Security Alert #19: Oracle Trace Collection Security Vulnerability
Doc 163729.1 Security Alert #18: Oracle9iAS Web Cache Overflow Vulnerability
NoCOUG
Brian Hitchcock May 6, 2004 Page 16
Patches Needed
 For security alerts
– 48, 49, 50, 51, 54
– Review each alert to find needed patch info
 Need patches
– 2376472 (8.1.7.4)
– 2642117 (alert 48) 8.1.7.4 required
– 2642267 (alert 49) 8.1.7.0 required
– 2642439 (alert 50) 8.1.7.0 required
– 2620726 (alert 51) 8.1.7.4 required
– 2784635 (alert 54) 8.1.7.4 required
NoCOUG
Brian Hitchcock May 6, 2004 Page 17
Patches Needed
 Create stage directory for each patch
 Ftp from oracle
 Patches require patches
– To apply some of these security patches
 You must be at 8.1.7.4
 Patch to 8.1.7.4 before applying these patches
 Note that I had no plan to patch to 8.1.7.4
– One patch leads to other patches…
NoCOUG
Brian Hitchcock May 6, 2004 Page 18
Getting Patches
 Metalink
– Patches
– Simple Search
 Enter specific patch number
 Specify platform
– Download
 Patch zip file
 Readme file
NoCOUG
Brian Hitchcock May 6, 2004 Page 19
Getting Patches
 What is patch number for 8.1.7.4 patch?
– Should be simple to find…
– Metalink
 Patches
 Simple search
- Product: Oracle Database Family
- Release: 8.1.7
- Patch type: Patchset/Minipack
- Platform: Solaris Sparc 32-bit
- 24 results
– Correct patch?
– 2376472 8.1.7.4 Patch set for oracle data server
NoCOUG
Brian Hitchcock May 6, 2004 Page 20
Patching Process
 What does it take to apply a patch?
– Dot release
 8.1.7.4
 Oracle installer (OUI)
– One-off, security patches
 README shows steps to install patch
 Example, security patch
- Shutdown database, listener
- Execute patch.sh supplied as part of patch
NoCOUG
Brian Hitchcock May 6, 2004 Page 21
Patching Process
 Production
– Must backup ORACLE_HOME
– Full backup of database
– Document the db
 This will come up later
 I use dbdoc script, see Managing Multiple
Databases… on NoCOUG website
– If patch fails
 Restore ORACLE_HOME from backup
NoCOUG
Brian Hitchcock May 6, 2004 Page 22
Patching Process
 Development
– Full export
– Document the db
– If patch fails
 Reinstall Oracle software
 Import export
– However,
 If practicing prod patching on dev db
 Should practice the prod db process
NoCOUG
Brian Hitchcock May 6, 2004 Page 23
Fresh Install?
 Before creating any databases
– Install Oracle software
– Apply all needed patches
– Much quicker
– Many post patch steps only apply if database
already exists
NoCOUG
Brian Hitchcock May 6, 2004 Page 24
Patch Install Steps
 Can be simple
 Can be complex
– Example, 8.1.7.4 patch
– May require use of Oracle Installer
 May require use of OUI that is part of the patch
– Patch may require certain patch level
 Example, patch can only be applied to 8.1.7.4
 You must review the README file for each
patch
– Script the steps for each patch
NoCOUG
Brian Hitchcock May 6, 2004 Page 25
Cases
 1) OraInventory not in place
 2) Installer not in place
 3) 64-bit oracle
 4) chroot
 5) not following instructions
NoCOUG
Brian Hitchcock May 6, 2004 Page 26
Case1 -- OraInventory
 Existing 8.1.7.0 database
 Patch to latest security alert
– At the time, this was security alert 54
– Downloaded all needed patches
 8.1.7.4
– 2642117 (alert 48)
– 2642267 (alert 49)
– 2642439 (alert 50)
– 2620726 (alert 51)
– 2784635 (alert 54)
NoCOUG
Brian Hitchcock May 6, 2004 Page 27
Case 1 -- OraInventory
 Review 8.1.7.4 readme
– Existing database
– Many post patch tasks
– Before applying 8.1.7.4
 Backup db
 Shutdown db
 Shutdown listener
NoCOUG
Brian Hitchcock May 6, 2004 Page 28
Case 1 -- OraInventory
– Script the steps
 Patch readme file README_8174.html
 How to install this patch set
 Steps 6 through 18
- Oracle Label Security
- Disabling system triggers
- Check JIS
- Catalog.sql, catproc.sql
- Set 10520 trace
- Java objects
- Enable system triggers
- Recompile invalid objects
NoCOUG
Brian Hitchcock May 6, 2004 Page 29
Case 1 -- OraInventory
 Start installer
– Installer not installed
– Find original cpio files from 8.1.7.0 install
– Run installer (OUI) from there
– Script inputs for installer
 File locations
- Source
- Destination
- UNIX group name
NoCOUG
Brian Hitchcock May 6, 2004 Page 30
Case 1 -- OraInventory
 And now?
– Dependencies
– There are no patches that need to be applied
from the patch set Oracle 8i 8.1.7.4.0
 Huh?
 Off to Metalink
– Doc ID 115236.1
– OraInventory is missing
NoCOUG
Brian Hitchcock May 6, 2004 Page 31
Case 1 -- OraInventory
 What is OraInventory?
– Documents exactly what was installed
– Created as part of software installation
– Created by the installer
 What does it do?
– When installing a patch
– Installer checks OraInventory
– Verifies that patch should be applied
 Example, 8.1.7.4 patch on 8.1.7.0 Oracle_home
NoCOUG
Brian Hitchcock May 6, 2004 Page 32
Case 1 -- OraInventory
 Where does it live?
– Installer creates in Oracle_base
 (my experience)
 What happened here?
– oraInventory didn’t exist
– Installer couldn’t tell what had been installed
– Installer decided it couldn’t install anything
 No inventory, can’t apply any patches
NoCOUG
Brian Hitchcock May 6, 2004 Page 33
Case 1 -- OraInventory
 Ok, but what caused this?
– To save time, copy existing oracle installation
 Tar up oracle_home
 Move to new machine
 Untar
– Lovingly referred to as “Tar&Toss”
 my manager came up with that
– This isn’t supported by Oracle
– This saves time initially
 Wastes time later
NoCOUG
Brian Hitchcock May 6, 2004 Page 34
Case 1 -- OraInventory
 OK, that’s weird, but what now?
 How to re-create the inventory?
– There is only one way
– Reinstall the Oracle software
– In this case, a full reinstall of 8.1.7.0
 Reinstall will over-write oracle_home
– Anything you can’t lose?
 Tnsnames.ora, password file
– Don’t place anything of your own in oracle_home
– Document your database before patching
NoCOUG
Brian Hitchcock May 6, 2004 Page 35
Case 1 -- OraInventory
 How to be sure
– Nothing unique in oracle_home?
– Can’t be sure
– Make backup
 I had enough disk space
– Copy oracle_home to another filesystem
 Now need to reinstall 8.1.7.0
– Disk space to stage the software?
NoCOUG
Brian Hitchcock May 6, 2004 Page 36
Case 1 -- OraInventory
 After software reinstalled
– Install 8.1.7.4 patch
 Works this time!
– Apply the 5 patches in order
– Startup the database
– Test application
– Everyone is happy!
 But this took much longer than we planned
NoCOUG
Brian Hitchcock May 6, 2004 Page 37
Case 2 -- Installer Not In Place
 Applying same patches to another machine
– Installer not installed
– Base software (8.1.7.0) not on disk
– Not enough disk space for software CD image
– Have to free up disk space just to
 Copy the CD image to get the installer on disk
– Proceed with the patching process
 Saves disk space in the short term
– Wastes time later
NoCOUG
Brian Hitchcock May 6, 2004 Page 38
Case 3 - 64-bit Oracle
 Different scenario
– No security patches
– Simple patch from 8.1.7.0 to 8.1.7.4
 No problem
– Stage the 8.1.7.4 patch to the db machine
– Downtime for patching is almost here
– Reviewing dbdoc output
 Select * from v$version shows
 Oracle 8i … - 64bit Production
NoCOUG
Brian Hitchcock May 6, 2004 Page 39
Case 3 - 64-bit Oracle
 64-bit Oracle?
– This is a development db
– Production is 32-bit
– I assumed dev would be 32-bit
– I staged the 32-bit 8.1.7.4 patch
 20 minutes to
– Download 64-bit patch from Oracle web site
– Check README for 64-bit, same as 32-bit
– Calm down
 No one can explain why…
NoCOUG
Brian Hitchcock May 6, 2004 Page 40
Case 4 -- chroot
 Yet another environment
– All set to apply patches
– Shutdown database, listener
– Start installer
 Can’t display OUI GUI back to my workstation
 Chroot
– Removes many OS libraries
– Have to manually identify which are needed
– Copy from another system
NoCOUG
Brian Hitchcock May 6, 2004 Page 41
Case 5 – Complete the Patch
 User calls
– Dev db doesn’t work
– Error is ‘blah blah blah’
 Metalink
– Error seen when patch partially applied
 Call user
– “Did you apply a patch?”
– “Yes”
– “Did you complete all the post patch steps?”
– “Oh, umh, ok, thanks!”
– Didn’t hear from the user again
NoCOUG
Brian Hitchcock May 6, 2004 Page 42
Lessons Learned
 Verify
– OraInventory exists
 If not, enough disk space to backup oracle_home?
– Installer is installed
 If not, disk space for source CDs?
– Correct patch(es)
 32-bit versus 64-bit
– Installer GUI can display to your workstation
– Finish all patch install steps
 Document this
NoCOUG
Brian Hitchcock May 6, 2004 Page 43
Lessons Learned
 For a new install
– Oracle_home not a top level directory
– Oracle_base /u01/app/oracle
– Oracle_home $ORACLE_BASE/product/<version>
– Oracle_home /u01/app/oracle/product/8.1.7.0
– Install the installer
 A 10 minute patch can become a 5 hour mess
 Verify things before the scheduled patch time
 Document all the steps
– Takes time the first time
– Saves time on all the other servers
– Saves time when you have to redo things

More Related Content

What's hot

Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Jim Gilsinn
 
Solving the Open Source Security Puzzle
Solving the Open Source Security PuzzleSolving the Open Source Security Puzzle
Solving the Open Source Security PuzzleVic Hargrave
 
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
DFIR Austin Training (Feb 2020): Remote Access & Deploying AgentsDFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
DFIR Austin Training (Feb 2020): Remote Access & Deploying AgentsChristopher Gerritz
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Kuniyasu Suzaki
 
1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Softwaredefconmoscow
 
The Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSThe Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSTripwire
 
November Patch Tuesday Analysis
November Patch Tuesday AnalysisNovember Patch Tuesday Analysis
November Patch Tuesday AnalysisIvanti
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CanSecWest
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiKuniyasu Suzaki
 
There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806Ivanti
 
Scada strange love uwn-stuxnet
Scada strange love   uwn-stuxnetScada strange love   uwn-stuxnet
Scada strange love uwn-stuxnetPositive Hack Days
 
Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities
Bruh! Do you even diff?—Diffing Microsoft Patches to Find VulnerabilitiesBruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities
Bruh! Do you even diff?—Diffing Microsoft Patches to Find VulnerabilitiesPriyanka Aash
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...EnergySec
 
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara
 
January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018Ivanti
 
February 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisFebruary 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisIvanti
 

What's hot (18)

Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
Solving the Open Source Security Puzzle
Solving the Open Source Security PuzzleSolving the Open Source Security Puzzle
Solving the Open Source Security Puzzle
 
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
DFIR Austin Training (Feb 2020): Remote Access & Deploying AgentsDFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
 
1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Software
 
Avc prot 2012b_en
Avc prot 2012b_enAvc prot 2012b_en
Avc prot 2012b_en
 
The Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSThe Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICS
 
November Patch Tuesday Analysis
November Patch Tuesday AnalysisNovember Patch Tuesday Analysis
November Patch Tuesday Analysis
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806
 
Scada strange love uwn-stuxnet
Scada strange love   uwn-stuxnetScada strange love   uwn-stuxnet
Scada strange love uwn-stuxnet
 
Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities
Bruh! Do you even diff?—Diffing Microsoft Patches to Find VulnerabilitiesBruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities
Bruh! Do you even diff?—Diffing Microsoft Patches to Find Vulnerabilities
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
 
January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018
 
February 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisFebruary 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday Analysis
 

Viewers also liked

Liderzy czy spamerzy
Liderzy czy spamerzyLiderzy czy spamerzy
Liderzy czy spamerzyAnna Miotk
 
The anatomy of a successful web project
The anatomy of a successful web projectThe anatomy of a successful web project
The anatomy of a successful web projectBank of Ireland
 
第八章解答
第八章解答第八章解答
第八章解答jiannrong
 
第三章解答
第三章解答第三章解答
第三章解答jiannrong
 
презентация к уроку русского языка
презентация к уроку русского языкапрезентация к уроку русского языка
презентация к уроку русского языкаОльга Климантова
 
MA in International Translation Project Management/Who are our partners
MA in International Translation Project Management/Who are our partnersMA in International Translation Project Management/Who are our partners
MA in International Translation Project Management/Who are our partnersCelia Rico
 
การประยุกต์ใช้โอเพนซอร์สซอฟต์แวร์ในองค์กร Open source software & Freeware
การประยุกต์ใช้โอเพนซอร์สซอฟต์แวร์ในองค์กร Open source software & Freewareการประยุกต์ใช้โอเพนซอร์สซอฟต์แวร์ในองค์กร Open source software & Freeware
การประยุกต์ใช้โอเพนซอร์สซอฟต์แวร์ในองค์กร Open source software & FreewareSatapon Yosakonkun
 
2.2 el sistema cliente proveedor
2.2 el sistema cliente proveedor2.2 el sistema cliente proveedor
2.2 el sistema cliente proveedorHILARION MUÑOZ
 
изменение прилагательных по числам и родам
изменение прилагательных по числам и родамизменение прилагательных по числам и родам
изменение прилагательных по числам и родамОльга Климантова
 

Viewers also liked (20)

Liderzy czy spamerzy
Liderzy czy spamerzyLiderzy czy spamerzy
Liderzy czy spamerzy
 
The Ethics Of Compliance
The Ethics Of ComplianceThe Ethics Of Compliance
The Ethics Of Compliance
 
празднование масленицы
празднование масленицыпразднование масленицы
празднование масленицы
 
The anatomy of a successful web project
The anatomy of a successful web projectThe anatomy of a successful web project
The anatomy of a successful web project
 
Angela in pics
Angela in picsAngela in pics
Angela in pics
 
第八章解答
第八章解答第八章解答
第八章解答
 
第三章解答
第三章解答第三章解答
第三章解答
 
презентация к уроку русского языка
презентация к уроку русского языкапрезентация к уроку русского языка
презентация к уроку русского языка
 
MA in International Translation Project Management/Who are our partners
MA in International Translation Project Management/Who are our partnersMA in International Translation Project Management/Who are our partners
MA in International Translation Project Management/Who are our partners
 
город торжок
город торжокгород торжок
город торжок
 
создание фильма в Movie Maker
создание фильма в Movie Makerсоздание фильма в Movie Maker
создание фильма в Movie Maker
 
Elektricni Auto
Elektricni AutoElektricni Auto
Elektricni Auto
 
CompletaOrdenada-v2
CompletaOrdenada-v2CompletaOrdenada-v2
CompletaOrdenada-v2
 
празднование масленицы
празднование масленицыпразднование масленицы
празднование масленицы
 
การประยุกต์ใช้โอเพนซอร์สซอฟต์แวร์ในองค์กร Open source software & Freeware
การประยุกต์ใช้โอเพนซอร์สซอฟต์แวร์ในองค์กร Open source software & Freewareการประยุกต์ใช้โอเพนซอร์สซอฟต์แวร์ในองค์กร Open source software & Freeware
การประยุกต์ใช้โอเพนซอร์สซอฟต์แวร์ในองค์กร Open source software & Freeware
 
2.2 el sistema cliente proveedor
2.2 el sistema cliente proveedor2.2 el sistema cliente proveedor
2.2 el sistema cliente proveedor
 
масленица
масленицамасленица
масленица
 
ER_model
ER_modelER_model
ER_model
 
Компьютер друг или враг
Компьютер  друг  или  врагКомпьютер  друг  или  враг
Компьютер друг или враг
 
изменение прилагательных по числам и родам
изменение прилагательных по числам и родамизменение прилагательных по числам и родам
изменение прилагательных по числам и родам
 

Similar to 香港六合彩-六合彩

香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharehitsvrxk
 
六合彩,香港六合彩
六合彩,香港六合彩六合彩,香港六合彩
六合彩,香港六合彩mncsmy
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharerjwahnup
 
Ioug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentationIoug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentationmaclean liu
 
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...Wouter Bloeyaert
 
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...Minh237839
 
Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...
Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...
Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...Amine Barrak
 
January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019Ivanti
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfICS
 
X41-TUF-Audit-2022-Final-Report-PUBLIC.pdf
X41-TUF-Audit-2022-Final-Report-PUBLIC.pdfX41-TUF-Audit-2022-Final-Report-PUBLIC.pdf
X41-TUF-Audit-2022-Final-Report-PUBLIC.pdfnattamailru
 
AnsibleFest 2020 - Automate cybersecurity solutions in a cloud native scenario
AnsibleFest 2020 - Automate cybersecurity solutions in a cloud native scenarioAnsibleFest 2020 - Automate cybersecurity solutions in a cloud native scenario
AnsibleFest 2020 - Automate cybersecurity solutions in a cloud native scenarioRoberto Carratala
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
1. What are some risks, threats, and vulnerabilities commonly foun.docx
1. What are some risks, threats, and vulnerabilities commonly foun.docx1. What are some risks, threats, and vulnerabilities commonly foun.docx
1. What are some risks, threats, and vulnerabilities commonly foun.docxelliotkimberlee
 
obiee 12c installation guidelines
obiee 12c installation guidelinesobiee 12c installation guidelines
obiee 12c installation guidelineskumud thakur
 
June Patch Tuesday 2018
June Patch Tuesday 2018June Patch Tuesday 2018
June Patch Tuesday 2018Ivanti
 
October 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday AnalysisOctober 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday AnalysisIvanti
 
September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018Ivanti
 
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyAccenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyHoneywell
 

Similar to 香港六合彩-六合彩 (20)

香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
六合彩,香港六合彩
六合彩,香港六合彩六合彩,香港六合彩
六合彩,香港六合彩
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
Ioug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentationIoug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentation
 
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
JSCONF 2018 - Baking security into DevOps - a tale of hunting down bugs befor...
 
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...
 
Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...
Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...
Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...
 
January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
 
X41-TUF-Audit-2022-Final-Report-PUBLIC.pdf
X41-TUF-Audit-2022-Final-Report-PUBLIC.pdfX41-TUF-Audit-2022-Final-Report-PUBLIC.pdf
X41-TUF-Audit-2022-Final-Report-PUBLIC.pdf
 
AnsibleFest 2020 - Automate cybersecurity solutions in a cloud native scenario
AnsibleFest 2020 - Automate cybersecurity solutions in a cloud native scenarioAnsibleFest 2020 - Automate cybersecurity solutions in a cloud native scenario
AnsibleFest 2020 - Automate cybersecurity solutions in a cloud native scenario
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
1. What are some risks, threats, and vulnerabilities commonly foun.docx
1. What are some risks, threats, and vulnerabilities commonly foun.docx1. What are some risks, threats, and vulnerabilities commonly foun.docx
1. What are some risks, threats, and vulnerabilities commonly foun.docx
 
obiee 12c installation guidelines
obiee 12c installation guidelinesobiee 12c installation guidelines
obiee 12c installation guidelines
 
05 160723204945
05 16072320494505 160723204945
05 160723204945
 
June Patch Tuesday 2018
June Patch Tuesday 2018June Patch Tuesday 2018
June Patch Tuesday 2018
 
October 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday AnalysisOctober 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday Analysis
 
September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018
 
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyAccenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
 

香港六合彩-六合彩

  • 1. Oracle RDBMS Patching Brian Hitchcock OCP 8, 8i, 9i DBA Sun Microsystems brian.hitchcock@sun.com brhora@aol.com NoCOUG Brian Hitchcock May 6, 2004 Page 1
  • 2. NoCOUG Brian Hitchcock May 6, 2004 Page 2 Why Patch the RDBMS?  To upgrade – For example 8.1.7.0 to 8.1.7.4  One-off patch – Fix a specific bug  Security patches – Fix specific security issues for specific products – This is the focus here… – But notice that I end up patching to 8.1.7.4 as well…
  • 3. NoCOUG Brian Hitchcock May 6, 2004 Page 3 Patching In General  Is becoming a bigger issue – More patches more often – More patches for more products – Think this is bad? – Oracle apps patching makes this look easy – Apps 11i patching is more complex  Many more modules, interactions
  • 4. NoCOUG Brian Hitchcock May 6, 2004 Page 4 Patching In General  And, more fun… – No way to back out of a patch  In general  Specific patches may say you can deinstall…  But what if that patch required 8.1.7.4? – Once applied, only one way to go back…  Full restore of ORACLE_HOME from backup – No way to tell what patch level a database is at  Other than version such as 8.1.7.4  You must manually keep track of patches applied
  • 5. NoCOUG Brian Hitchcock May 6, 2004 Page 5 Patching In General  How often do you patch? – Every time a new security patch is available? – Quarterly?  Security risk until latest patch(es) applied? – Testing for each patch?  For bug fix patch, testing is clear  For other types of patches - None? - Complete? - In between?
  • 6. NoCOUG Brian Hitchcock May 6, 2004 Page 6 Patch Testing Details  What is your policy? – Apply all needed patches, test? – Apply one patch and test? – If testing shows problems, what to do? – Need to test  Your app software  Vendor app software  OS issues  Security, chroot, other software components
  • 7. NoCOUG Brian Hitchcock May 6, 2004 Page 7 How Do You Know…?  What patch(es) do you need to apply? – Security alerts from Oracle  Must review each one manually – Metalink – Your environment has hit a specific bug – Need specific functionality  Feature isn’t available until 9.2.0.4
  • 8. NoCOUG Brian Hitchcock May 6, 2004 Page 8 How Do You Know…?  For security patches – Oracle sends out security alerts  Each alert applies to specific products  Your site doesn’t need all of them  No source for a single list of which patches you need – I like to file a TAR to confirm the patches I need  Some patches require other patches  Fun, fun, fun!
  • 9. NoCOUG Brian Hitchcock May 6, 2004 Page 9 Example, for 8.1.7.0  Get current with all security alerts – Political – Nothing was done for a long time – A manager read about a recent oracle alert – Suddenly we have to apply lots of patches
  • 10. NoCOUG Brian Hitchcock May 6, 2004 Page 10 Why Discuss 8.1.7.0?  8.1.7.0 is not cool!  Cool DBAs only talk about 10g!  But real world has 8.1.7.X databases  The older a db version becomes the more patches you will need to stay current  Same issues are happening for 9i – Will happen for 10g  Process is the same, starting version doesn’t matter
  • 11. NoCOUG Brian Hitchcock May 6, 2004 Page 11 Finding Security Alerts  Metalink  FAQ for security alerts – Doc id 237007.1 – Item I, generic questions  Number 10, what security patches do I need for my database?  Points to number 13, security patch matrix - 8.1.7.4 doesn’t need patches below #48 - 9.2.0.4 doesn’t need patches below #59 – When I did this I needed 48, 49, 50, 51, 54  Security alert #62 hadn’t been issued at that time – Today I would need #62 as well…
  • 12. NoCOUG Brian Hitchcock May 6, 2004 Page 12 Finding Security Alerts  FAQ for security alerts (cont’d) – Item II, list of security alerts and notes  Lists security alerts #18 through #66  Review each security alert for patch # – Security alert #66 is most recent as of today  Check Metalink frequently – 237007.1 changed may 07, 2004 while I was creating the previous slide – Note that more products means more patches  Database plus app server etc.
  • 13. NoCOUG Brian Hitchcock May 6, 2004 Page 13 Security Alerts  Listing of security alerts from doc id 237007.1 II. List of Security Alerts and Notes (since Nov 2001) II.1. Security Alerts: Doc 265308.1 Security Alert #66: Vulnerabilities in Oracle Application Server Web Cache Doc 258997.1 Security Alert #65: Security Vulnerability in Oracle9i Application and Database Servers Doc 263508.1 Security Alert #64: Buffer Overflow in Oracle9i Database Server Doc 263509.1 Security Alert #63: Security Vulnerabilities in Oracle9i Lite Doc 258996.1 Security Alert #62: SSL Update for CERT CA-2003-26 and older SSL issues Doc 253982.1 Security Alert #61: SQL Injection Vulnerability in Oracle9i Application Server Doc 252706.1 Security Alert #60: Unauthorized Access to Restricted Content in Oracle Files Doc 251910.1 Security Alert #59: Buffer Overflow in Oracle Binaries Doc 246202.1 Security Alert #58: Buffer Overflow in the XML Database of Oracle9i Database Server Doc 244523.1 Security Alert #57: Buffer Overflows in EXTPROC of Oracle Database Server Doc 244335.1 Security Alert #56: Buffer Overflow Vulnerability in Oracle E-Business Suite Doc 244294.1 Security Alert #55: Unauthorized Disclosure of Information in Oracle E-Business Suite Doc 237172.1 Security Alert #54: Buffer Overflow in Oracle Net Services for Oracle Database Server Doc 235262.1 Security Alert #53: Report Review Agent (RRA/FNDFS) Vulnerability in Oracle E-Business Suite Doc 229288.1 Security Alert #52: Two Vulnerabilities in Oracle9i Application Server Doc 229287.1 Security Alert #51: Buffer Overflow in the Oracle Executable of Oracle Database Server Doc 229286.1 Security Alert #50: Buffer Overflow in Oracle Database
  • 14. NoCOUG Brian Hitchcock May 6, 2004 Page 14 Security Alerts Doc 229285.1 Security Alert #49: Buffer Overflow in Oracle Database Doc 229284.1 Security Alert #48: Buffer Overflow in Oracle Database Doc 224215.1 Security Alert #47: Vulnerabilities in Oracle 9i Application Server Doc 216775.1 Security Alert #46: Buffer Overflow in iSQL*Plus (Oracle9i Database Server) Doc 214356.1 Security Alert #45: Security Release of Apache 1.3.27 Doc 213415.1 Security Alert #44: Unauthorized Access Vulnerability in the Oracle E-Business Doc 213413.1 Security Alert #43: Oracle9i Application Server - Web Cache Administration Tool Crash on Malformed Request Doc 213411.1 Security Alert #42: Security Vulnerability in Oracle Net Doc 207272.1 Security Alert #41: Oracle9i Application Server Oracle Java Server Page Demos Vulnerability Doc 207269.1 Security Alert #40: Oracle Net Listener Vulnerabilities Doc 207271.1 Security Alert #39: Oracle9i Application Server - Web Cache Administrator Password Not Encrypted Doc 207268.1 Security Alert #38: Security vulnerability in Oracle Net Doc 206034.1 Security Alert #37: OpenSSL Security Vulnerability Doc 200873.1 Security Alert #36: Security Vulnerability in Apache HTTP Server of Oracle9iAS Doc 198531.1 Security Alert #35: Buffer Overflow Vulnerability in Oracle9iAS Reports Doc 198544.1 Security Alert #34: Security Vulnerability in Oracle Net (Oracle9i Database Server) Doc 185074.1 Security Alert #33: User Privileges Vulnerability in Oracle9i Database Server Doc 185073.1 Security Alert #32: Unauthorized Access Vulnerability in the Oracle E-Business Suite Doc 182244.1 Security Alert #31: Oracle Configurator Security Issue: Potential Cross-site Scripting Attacks Doc 183556.1 Security Alert #30: SNMP Vulnerability in Oracle Enterprise Manager, Master_Peer Agent Doc 175429.1 Security Alert #29: ALERT: Oracle PL/SQL extproc in Oracle 9i, Oracle 8i and Oracle8 Database
  • 15. NoCOUG Brian Hitchcock May 6, 2004 Page 15 Security Alerts Doc 175428.1 Security Alert #28: Vulnerabilities in Oracle mod_plsql and JSP in Oracle 9iAS V1.0.2.x Doc 169628.1 Security Alert #27: Vulnerabilities in Oracle 9i Application Server Web Cache Doc 168862.1 Security Alert #26: Potential DoS Vulnerability in Oracle9i Application Server Doc 168863.1 Security Alert #25: Vulnerabilities in MODPLSQL No Doc Security Alert #24: Skipped Multiple Doc (Security Alert #23 is split into 3 documents on MetaLink) Doc 167001.1 Security Alert #23: Oracle Home Environment Variable Buffer Overflow Doc 167004.1 Security Alert #23: CHOWN Path Environment Variable Vulnerability Doc 167007.1 Security Alert #23: Oracle Home Environment Variable Validation Vulnerability Doc 166869.1 Security Alert #22: Security Implications of the Oracle9iAS v.1.0.2.2 Default SOAP Configuration Doc 163726.1 Security Alert #21: Oracle Label Security Mandatory Security Patch Doc 163727.1 Security Alert #20: Oracle File Overwrite Security Vulnerability Doc 163728.1 Security Alert #19: Oracle Trace Collection Security Vulnerability Doc 163729.1 Security Alert #18: Oracle9iAS Web Cache Overflow Vulnerability
  • 16. NoCOUG Brian Hitchcock May 6, 2004 Page 16 Patches Needed  For security alerts – 48, 49, 50, 51, 54 – Review each alert to find needed patch info  Need patches – 2376472 (8.1.7.4) – 2642117 (alert 48) 8.1.7.4 required – 2642267 (alert 49) 8.1.7.0 required – 2642439 (alert 50) 8.1.7.0 required – 2620726 (alert 51) 8.1.7.4 required – 2784635 (alert 54) 8.1.7.4 required
  • 17. NoCOUG Brian Hitchcock May 6, 2004 Page 17 Patches Needed  Create stage directory for each patch  Ftp from oracle  Patches require patches – To apply some of these security patches  You must be at 8.1.7.4  Patch to 8.1.7.4 before applying these patches  Note that I had no plan to patch to 8.1.7.4 – One patch leads to other patches…
  • 18. NoCOUG Brian Hitchcock May 6, 2004 Page 18 Getting Patches  Metalink – Patches – Simple Search  Enter specific patch number  Specify platform – Download  Patch zip file  Readme file
  • 19. NoCOUG Brian Hitchcock May 6, 2004 Page 19 Getting Patches  What is patch number for 8.1.7.4 patch? – Should be simple to find… – Metalink  Patches  Simple search - Product: Oracle Database Family - Release: 8.1.7 - Patch type: Patchset/Minipack - Platform: Solaris Sparc 32-bit - 24 results – Correct patch? – 2376472 8.1.7.4 Patch set for oracle data server
  • 20. NoCOUG Brian Hitchcock May 6, 2004 Page 20 Patching Process  What does it take to apply a patch? – Dot release  8.1.7.4  Oracle installer (OUI) – One-off, security patches  README shows steps to install patch  Example, security patch - Shutdown database, listener - Execute patch.sh supplied as part of patch
  • 21. NoCOUG Brian Hitchcock May 6, 2004 Page 21 Patching Process  Production – Must backup ORACLE_HOME – Full backup of database – Document the db  This will come up later  I use dbdoc script, see Managing Multiple Databases… on NoCOUG website – If patch fails  Restore ORACLE_HOME from backup
  • 22. NoCOUG Brian Hitchcock May 6, 2004 Page 22 Patching Process  Development – Full export – Document the db – If patch fails  Reinstall Oracle software  Import export – However,  If practicing prod patching on dev db  Should practice the prod db process
  • 23. NoCOUG Brian Hitchcock May 6, 2004 Page 23 Fresh Install?  Before creating any databases – Install Oracle software – Apply all needed patches – Much quicker – Many post patch steps only apply if database already exists
  • 24. NoCOUG Brian Hitchcock May 6, 2004 Page 24 Patch Install Steps  Can be simple  Can be complex – Example, 8.1.7.4 patch – May require use of Oracle Installer  May require use of OUI that is part of the patch – Patch may require certain patch level  Example, patch can only be applied to 8.1.7.4  You must review the README file for each patch – Script the steps for each patch
  • 25. NoCOUG Brian Hitchcock May 6, 2004 Page 25 Cases  1) OraInventory not in place  2) Installer not in place  3) 64-bit oracle  4) chroot  5) not following instructions
  • 26. NoCOUG Brian Hitchcock May 6, 2004 Page 26 Case1 -- OraInventory  Existing 8.1.7.0 database  Patch to latest security alert – At the time, this was security alert 54 – Downloaded all needed patches  8.1.7.4 – 2642117 (alert 48) – 2642267 (alert 49) – 2642439 (alert 50) – 2620726 (alert 51) – 2784635 (alert 54)
  • 27. NoCOUG Brian Hitchcock May 6, 2004 Page 27 Case 1 -- OraInventory  Review 8.1.7.4 readme – Existing database – Many post patch tasks – Before applying 8.1.7.4  Backup db  Shutdown db  Shutdown listener
  • 28. NoCOUG Brian Hitchcock May 6, 2004 Page 28 Case 1 -- OraInventory – Script the steps  Patch readme file README_8174.html  How to install this patch set  Steps 6 through 18 - Oracle Label Security - Disabling system triggers - Check JIS - Catalog.sql, catproc.sql - Set 10520 trace - Java objects - Enable system triggers - Recompile invalid objects
  • 29. NoCOUG Brian Hitchcock May 6, 2004 Page 29 Case 1 -- OraInventory  Start installer – Installer not installed – Find original cpio files from 8.1.7.0 install – Run installer (OUI) from there – Script inputs for installer  File locations - Source - Destination - UNIX group name
  • 30. NoCOUG Brian Hitchcock May 6, 2004 Page 30 Case 1 -- OraInventory  And now? – Dependencies – There are no patches that need to be applied from the patch set Oracle 8i 8.1.7.4.0  Huh?  Off to Metalink – Doc ID 115236.1 – OraInventory is missing
  • 31. NoCOUG Brian Hitchcock May 6, 2004 Page 31 Case 1 -- OraInventory  What is OraInventory? – Documents exactly what was installed – Created as part of software installation – Created by the installer  What does it do? – When installing a patch – Installer checks OraInventory – Verifies that patch should be applied  Example, 8.1.7.4 patch on 8.1.7.0 Oracle_home
  • 32. NoCOUG Brian Hitchcock May 6, 2004 Page 32 Case 1 -- OraInventory  Where does it live? – Installer creates in Oracle_base  (my experience)  What happened here? – oraInventory didn’t exist – Installer couldn’t tell what had been installed – Installer decided it couldn’t install anything  No inventory, can’t apply any patches
  • 33. NoCOUG Brian Hitchcock May 6, 2004 Page 33 Case 1 -- OraInventory  Ok, but what caused this? – To save time, copy existing oracle installation  Tar up oracle_home  Move to new machine  Untar – Lovingly referred to as “Tar&Toss”  my manager came up with that – This isn’t supported by Oracle – This saves time initially  Wastes time later
  • 34. NoCOUG Brian Hitchcock May 6, 2004 Page 34 Case 1 -- OraInventory  OK, that’s weird, but what now?  How to re-create the inventory? – There is only one way – Reinstall the Oracle software – In this case, a full reinstall of 8.1.7.0  Reinstall will over-write oracle_home – Anything you can’t lose?  Tnsnames.ora, password file – Don’t place anything of your own in oracle_home – Document your database before patching
  • 35. NoCOUG Brian Hitchcock May 6, 2004 Page 35 Case 1 -- OraInventory  How to be sure – Nothing unique in oracle_home? – Can’t be sure – Make backup  I had enough disk space – Copy oracle_home to another filesystem  Now need to reinstall 8.1.7.0 – Disk space to stage the software?
  • 36. NoCOUG Brian Hitchcock May 6, 2004 Page 36 Case 1 -- OraInventory  After software reinstalled – Install 8.1.7.4 patch  Works this time! – Apply the 5 patches in order – Startup the database – Test application – Everyone is happy!  But this took much longer than we planned
  • 37. NoCOUG Brian Hitchcock May 6, 2004 Page 37 Case 2 -- Installer Not In Place  Applying same patches to another machine – Installer not installed – Base software (8.1.7.0) not on disk – Not enough disk space for software CD image – Have to free up disk space just to  Copy the CD image to get the installer on disk – Proceed with the patching process  Saves disk space in the short term – Wastes time later
  • 38. NoCOUG Brian Hitchcock May 6, 2004 Page 38 Case 3 - 64-bit Oracle  Different scenario – No security patches – Simple patch from 8.1.7.0 to 8.1.7.4  No problem – Stage the 8.1.7.4 patch to the db machine – Downtime for patching is almost here – Reviewing dbdoc output  Select * from v$version shows  Oracle 8i … - 64bit Production
  • 39. NoCOUG Brian Hitchcock May 6, 2004 Page 39 Case 3 - 64-bit Oracle  64-bit Oracle? – This is a development db – Production is 32-bit – I assumed dev would be 32-bit – I staged the 32-bit 8.1.7.4 patch  20 minutes to – Download 64-bit patch from Oracle web site – Check README for 64-bit, same as 32-bit – Calm down  No one can explain why…
  • 40. NoCOUG Brian Hitchcock May 6, 2004 Page 40 Case 4 -- chroot  Yet another environment – All set to apply patches – Shutdown database, listener – Start installer  Can’t display OUI GUI back to my workstation  Chroot – Removes many OS libraries – Have to manually identify which are needed – Copy from another system
  • 41. NoCOUG Brian Hitchcock May 6, 2004 Page 41 Case 5 – Complete the Patch  User calls – Dev db doesn’t work – Error is ‘blah blah blah’  Metalink – Error seen when patch partially applied  Call user – “Did you apply a patch?” – “Yes” – “Did you complete all the post patch steps?” – “Oh, umh, ok, thanks!” – Didn’t hear from the user again
  • 42. NoCOUG Brian Hitchcock May 6, 2004 Page 42 Lessons Learned  Verify – OraInventory exists  If not, enough disk space to backup oracle_home? – Installer is installed  If not, disk space for source CDs? – Correct patch(es)  32-bit versus 64-bit – Installer GUI can display to your workstation – Finish all patch install steps  Document this
  • 43. NoCOUG Brian Hitchcock May 6, 2004 Page 43 Lessons Learned  For a new install – Oracle_home not a top level directory – Oracle_base /u01/app/oracle – Oracle_home $ORACLE_BASE/product/<version> – Oracle_home /u01/app/oracle/product/8.1.7.0 – Install the installer  A 10 minute patch can become a 5 hour mess  Verify things before the scheduled patch time  Document all the steps – Takes time the first time – Saves time on all the other servers – Saves time when you have to redo things