Oracle Database patches are primarily released as quarterly Release Updates (RUs) in every quarter during the year, however oracle releases post-patches called MRPs that fix some bugs that appears after the base patches (on top of RU’s).
Unfortunately, you can’t view/list the installed patches (MRPs) on your Oracle database binaries using OPatch utility, instead you will need to use AHF (Autonomous Health Framework).
Oracle Autonomous Health Framework (AHF) is a free, integrated suite of tools that autonomously monitors, diagnoses, and resolves potential availability and performance issues in Oracle Database systems. And, it get released on regular basis…so you will need to download the latest version.
The following command will list MRP’s installed on your Oracle database binaries:
In Oracle database system, a “schema” account is actually a user and this user will be associated with a dedicated tablespace where database objects will be stored in. Having said that…there is a SQL command in Oracle called “create schema” but it actually doesn’t create the schema account (user)….it creates the objects and permissions associated with it.
Let us me first demonstrate how to create a schema account:
Will first create a tablespace and will call it “TS_HR” in pluggable database FREEPDB1:
Database table called “dept” created under HR schema and granted permission to pre-exisiting HR_APP account as shown above.
Important remark: oracle introduced “schema only” account concept which will prevent the account/user from being directly authenticated and can be accessed through proxy setup.
SQL> exec DBMS_STATS.FLUSH_DATABASE_MONITORING_INFO; BEGIN DBMS_STATS.FLUSH_DATABASE_MONITORING_INFO; END;
* ERROR at line 1: ORA-00600: internal error code, arguments: [qosdExpStatRead: expcnt mismatch], [65562], [26], [1144616], [1], [], [], [], [], [], [], [] ORA-06512: at “SYS.DBMS_STATS”, line 2141 ORA-06512: at “SYS.DBMS_STATS”, line 43486 ORA-06512: at line 1
Oracle database export datapump fails with below errors:
DDE: Problem Key ‘ORA 600 [qosdExpStatRead: expcnt mismatch]’ was flood controlled (0x4) (incident: 2017148) ORA-00600: internal error code, arguments: [qosdExpStatRead: expcnt mismatch], [65562], [26], [1144616], [1], [], [], [], [], [], [], [] 2025-07-29T11:33:58.617971+03:00 Incident 2017643 created, dump file: /oraclex/oradbp25/diag/rdbms/oradbp25/oradbp25/incident/incdir_2017643/oradbp25_dw00_3988067_i2017643.trc ORA-00600: internal error code, arguments: [qosdExpStatRead: expcnt mismatch], [65562], [26], [1144616], [1], [], [], [], [], [], [], [] ORA-06512: at “SYS.DBMS_STATS”, line 2141 ORA-06512: at “SYS.DBMS_STATS”, line 57633 ORA-06512: at “SYS.DBMS_STATS”, line 57866 ORA-06512: at “SYS.KUPW$WORKER”, line 30029 ORA-06512: at “SYS.KUPW$WORKER”, line 3503 ORA-06512: at “SYS.KUPW$WORKER”, line 13746 ORA-06512: at “SYS.KUPW$WORKER”, line 2439 ORA-06512: at line 2
SOLUTION/FIX:
SQL> alter system set “_fix_control”=’31143146:on’,’32005394:on’ scope=both;
of course, its highly recommended to open a case with ORACLE.
To illustrate and simulate locking and blocking let me first prepare a dummy table and two database accounts for simulation:
create table SH1.purchase_orders ( product varchar2(20), sales number (5));
SQL> insert into SH1.purchase_orders values (‘milk’, 20);
SQL> insert into SH1.purchase_orders values (‘corn_flakes’, 40);
SQL> insert into SH1.purchase_orders values (‘cheese’, 16);
SQL> create user jerry identified by jerry;
SQL> grant create session to jerry;
SQL> grant select,update on SH1.purchase_orders to jerry;
SQL> create user donald identified by donald;
SQL> grant create session to donald;
SQL> grant select,update on SH1.purchase_orders to donald;
// as shown below both max_idle_time, max_idle_blocker_time are set to “0” which means unlimited
SQL> show parameter idle
NAME TYPE VALUE
———————————— ———– ——————————
max_idle_blocker_time integer 0
max_idle_time integer 0
In the first session as user jerry and auto-commit is to “FALSE” as shown below so you will need to explicitly end the transaction either by “commit” or “rollback”:
In the second session as user donald [ donald session is hanging because there is already shared row lock on the table]
To find blocking session:
SQL> select * from v$lock where block >0;
SQL> select SID,USERNAME,STATUS,PROGRAM from v$session where SID=290;
To find locking:
SQL> select * from V$SESSION_EVENT where WAIT_CLASS=’Application’ and EVENT like ‘enq: TX – row lock contention’;
SID 283 is for account “donald”
So, based on the above scenario lock/block will remain unless jerry’s session commit or rollback.
Let us now explore max_idle_blocker_time parameter and set to 1 minute at the pluggable database level:
sqlplus / as sysdba
SQL> alter session set container=ORCLPDB1;
Session altered.
SQL> alter system set max_idle_blocker_time=1;
System altered.
SQL> show parameter idle
NAME TYPE VALUE
———————————— ———– ——————————
max_idle_blocker_time integer 1
max_idle_time integer 0
Repeat the scenario again….
After 1 minute in jerry’s session:
The session is terminated as expected after 1 minute
And, blocking disappears however locking from “donald” session will remain so it will require either “commit” or “rollback” for the transaction being executed.
A very interesting case I have faced in an Oracle database environment patched with 19.27 RU, I tried dropping an AWR snapshot and it failed as shown below:
ERROR at line 1: ORA-13516: AWR Operation failed: AWR Schema is unavailable due maintenance ORA-06512: at “SYS.DBMS_WORKLOAD_REPOSITORY”, line 193 ORA-06512: at line 2
Solution:
Its unfortunately a bug !
// Index WRH$_SGASTAT_U in “WRH$_SGASTAT” table was in UNUSABLE state:
select * from dba_indexes where index_name=’WRH$_SGASTAT_U’;
// Drop the constraint: alter table wrh$_sgastat drop constraint wrh$_sgastat_u;
// Turn off partition check:
alter session set events ‘14524 trace name context forever, level 1’;
// Add the constraint back: alter table wrh$_sgastat add constraint wrh$_sgastat_u unique (dbid, snap_id, instance_number, name, pool, con_dbid, stattype) using index local tablespace SYSAUX;
// Turn on partition check: alter session set events ‘14524 trace name context off’;
Then, Try dropping the AWR Snapshot again….should work.
Oracle has just released their quarterly Oracle database security patches (july 2025). This quarter 6 security vulnerabilities were patched and new features and enhancements were introduced.
Lately (for the last few quarters) Oracle has introduced many good and new features in 19c [ so far the long term release] !
After Applying 19.28 RU a new set of system parameter were introduced:
Another new enhancement is in Unified Auditing where a set of “Real Application Security” Audit actions were added to multiple pre-configured audit policies such as ORA_CIS_RECOMMENDATIONS
in 19.27 :
select * from AUDIT_UNIFIED_POLICIES where policy_name=’ORA_CIS_RECOMMENDATIONS’ and AUDIT_OPTION_TYPE=’XS ACTION’;
in 19.28:
select * from AUDIT_UNIFIED_POLICIES where policy_name=’ORA_CIS_RECOMMENDATIONS’ and AUDIT_OPTION_TYPE=’XS ACTION’;
A very intresting parameter unified_audit_trail_exclude_columns is introduced in 23.6 release. This parameter has no official documentation about it so I played with it to understand what is used for.
The parameter by default is set to “none”. However, the parameter can accept one of the following values: none, dp_clob_parameters1, rls_info, sql_binds, sql_text
Not sure why this parameter is introduced, what is the objective this parameter will serve.
I have set the parameter to sql_text as shown below:
SQL> alter system set unified_audit_trail_exclude_columns=’sql_text’;
If you create a dumy user and checking the unified audit log after setting the parameter unified_audit_trail_exclude_columns to “sql_text”:
SQL> create user c##dummy99 identified by dummy123;
Then, checking audit logs:
SQL> select OS_USERNAME,DBUSERNAME,action_name,SQL_TEXT,OBJECT_NAME from unified_audit_trail where ACTION_NAME=’CREATE USER’ order by event_timestamp desc;
So, the parameter effectively took place and the SQL_TEXT column is empty and not showing the SQL statement for the user creation, the event itself is of course recorded as shown in the above picture.
In Oracle January 2025 RU patches, a new and good change has been introduced. The default parameter DB_LOST_WRITE_PROTECT value changed from none to “AUTO” after applying the RU. This is a good move to ensure data protection and detecting problems early. I have talked about database lost write issue in an old blog post: https://geodatamaster.com/2020/09/04/oracle-database-lost-write-detection-recovery-options/