X

Proactive insights, news and tips from Oracle Hyperion EPM and BI Support. Learn Oracle from Oracle.

  • January 21, 2016

Fusion MiddleWare Proactive Patches - January 2016

Guest Author

Oracle Product Management have announced the release of Fusion MiddleWare (FMW) Proactive patches. The below listing are the Bundle Patches, Patch Set Updates, and Critical Patch Updates within this release for 19th January, 2016.

Bundle Patches :

Bundle patches are collections of controlled, well tested critical bug fixes for a specific product which may include security contents and occasionally minor enhancements. These are cumulative in nature meaning the latest bundle patch in a particular series includes the contents of the previous bundle patches released.  A suite bundle patch is an aggregation of multiple product  bundle patches that are part of a product suite.

  • Oracle Business Intelligence Enterprise Edition (OBIEE)

    11.1.1.9.160119 and 11.1.1.7.160119 suites.
  • Oracle Data Integrator (ODI) 11.1.1.9.7
  • Oracle Internet Directory(OID) 11.1.1.9.3
  • Oracle GlassFish Server (OGFS) 3.1.2.12 and 3.0.1.12
  • Oracle Identity Management Suite Bundle Patch 11.1.2.3.3 consisting of
    • Oracle Access Manager (OAM) 11.1.2.3.5
    • Oracle Identity Manager (OIM) 11.1.2.3.5
    • Oracle Mobile Security Suite (OMSS) 11.1.2.3.5
    • Oracle Unified Directory (OUD) 11.1.2.3.1
  • Oracle Identity Management Suite Bundle Patch 11.1.2.2.8 consisting of
    • Oracle Access Manager (OAM) 11.1.2.2.8
    • Oracle Identity Manager (OIM) 11.1.2.2.9
    • Oracle Adaptive Access Manager (OAAM) 11.1.2.2.1
    • Oracle Unified Directory (OUD) 11.1.2.2.3
  • Oracle Platform Security for Java (OPSS) 11.1.1.9.160105
  • Oracle SOA Suite (SOA) 12.1.3.0.5 and 11.1.1.9.160119
  • Oracle Service Bus (OSB) 12.1.3.0.1
  • Oracle WebCenter Content (WCC) 11.1.1.8.15 and 11.1.1.9.160119
  • Oracle WebCenter Portal (WCP) 11.1.1.9.160119
  • Oracle Web Services Manager (OWSM) 12.1.3.0.4

Patch Set Updates:

Patch Set Updates (PSU)  are collections of well controlled, well tested critical bug fixes for a specific product  that have been proven in customer environments. PSUs  may include security content but no  enhancements are included. These are cumulative in nature meaning the latest PSU  in a particular series includes the contents of the previous PSUs  released. 

  • Oracle WebLogic Server 12.2.1.0.1, 12.1.3.0.6, 12.1.2.0.8 and 10.3.6.0.13
  • Oracle Exalogic
    • 2.0.6.2.4 Physical Linux x86-64 (for all X2-2, X3-2, X4-2, X5-2)
    • 2.0.6.2.4 Physical Solaris x86-64 (for all X2-2, X3-2, X4-2, X5-2)
    • 2.0.6.2.4 Virtual Oracle VM Server x86-64 (for all X2-2, X3-2, X4-2, X5-2)

Critical Patch Update:

The Critical Patch Update program is Oracle's quarterly release of security fixes.

Additional patches were released as part of Oracle's Critical Patch Update program for the following products and versions

  • Oracle Business Intelligence 12.2.1.0.0
  • Oracle Endeca Server DE 7.6,7.5,7.4 and 7.3.
  • Oracle Identity Federation (OIF) 11.1.1.7.0
  • Oracle Outside In Technology (OIT) 8.5.2, 8.5.1 and 8.5.0.
  • Oracle Tuxedo 12.1.1.0
  • Oracle WebCache 11.1.1.9.0 and 11.1.1.7.0.
  • Oracle WebCenter Sites 11.1.1.8.0  and 7.6.2.
  • Oracle WebLogic Portal 10.3.6.0

For more information :

Critical Patch Update Advisory -  January 2016
Doc ID 1488475.1 - OBIEE 11g: Required & Recommended Bundle Patches & Patch Sets
Doc ID 2070465.1 - OBIEE 12c - Required & Recommended Bundle Patches & Patch Sets
Doc ID 1494151.1 - Master Note on Fusion Middleware Proactive Patching

- Patch Set Updates (PSUs) & Bundle Patches (BPs)
Doc ID 2074802.1 - Patch Set Update & Critical Patch Update January 2016 Availability
Doc ID 2061926.1 - Oracle Database, Enterprise Manager and Middleware

- Change to Patch Numbering from Nov 2015 onwards

Note: Some of the bundles released are using the New Bundle Patch Version Numbering - refer to our previous Blog post "Patch Numbering for Oracle DB, Enterprise Manager and Middleware".

Be the first to comment

Comments ( 0 )
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.