描述:
Oracle 发布了重要修补程式更新公告,包括一系列应对 Java SE 和不同 Oracle 产品中多个安全漏洞的修补程式。有关安全性更新的列表,请参考以下网址:
https://www.oracle.com/security-alerts/cpujul2025.html
受影响的系统:
- Oracle Java SE
- Database
- Fusion Applications and Middleware
- Oracle MySQL Product Suite
- NoSQL Database
- Oracle Linux and Virtualization
有关受影响产品的完整列表,请参阅以下网址:
https://www.oracle.com/security-alerts/cpujul2025.html
影响:
成功利用漏洞可以导致受影响的系统发生远端执行程式码、服务被拒绝、权限提升、泄漏资讯、绕过保安限制或篡改,视乎攻击者利用哪个漏洞而定。
建议:
现已有适用于受影响系统的修补程式。受影响系统的用户应遵从产品供应商的建议,立即採取行动以降低风险。
Oracle Java SE 产品的修补程式可从以下连结下载:
Java Platform SE 8u451 (JDK 及 JRE)
Java Platform SE 11.0.27 (JDK 及 JRE)
Java Platform SE 17.0.15 (JDK 及 JRE)
Java Platform SE 21.0.7 (JDK 及 JRE)
Java Platform SE 24.0.1 (JDK 及 JRE)
https://www.oracle.com/java/technologies/javase-downloads.html
OpenJDK 的修补程式可从以下连结下载:
https://jdk.java.net/
用户也可通过以下安全公告,以获取其他 Oracle 产品安全更新方面的资讯:
https://www.oracle.com/security-alerts/cpujul2025.html
用户可联络其产品支援供应商,以取得修补程式及相关支援。
进一步资讯:
- https://www.oracle.com/security-alerts/cpujul2025.html
- https://www.hkcert.org/tc/security-bulletin/oracle-products-multiple-vulnerabilities_20250716
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13936
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42575
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27349
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44483
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49582
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6763
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7254
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8006
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8184
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12801
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22201
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25638
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28168
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28182
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31744
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34517
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35195
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38356
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38827 (to CVE-2024-38828)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47072
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47554
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47561
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49767
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56128
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56406
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0624
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1974
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4598
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5399
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23084 (to CVE-2025-23085)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23166
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23184
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24813 (to CVE-2025-24814)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24855
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24970
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26791
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27516
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27533
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27553
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27636
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27817
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27820
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29482
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30739
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30743 (to CVE-2025-30754)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30756
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30758 (to CVE-2025-30762)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31651
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31672
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32415
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48988
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49146
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059 (to CVE-2025-50073)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50076 (to CVE-2025-50108)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53023 (to CVE-2025-53032)