描述:
Oracle 發布了重要修補程式更新公告,包括一系列應對 Java SE 和不同 Oracle 產品中多個安全漏洞的修補程式。有關安全性更新的列表,請參考以下網址:
https://www.oracle.com/security-alerts/cpujan2026.html
有報告指遠端執行程式碼的漏洞 (CVE-2025-27363) 正受到攻擊及概念驗證 (PoC) 程式碼的多個漏洞 (CVE-2024-57699、CVE-2025-4949、CVE-2025-6021、CVE-2025-7425、CVE-2025-25193、CVE-2025-26791、CVE-2025-30065、CVE-2025-47219、CVE-2025-53864、CVE-2025-54571、CVE-2025-54874、CVE-2025-59419、CVE-2025-65018、CVE-2025-66516 及 CVE-2025-67735) 已被公開。系統管理員應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
- Oracle Java SE
- Database
- Fusion Applications and Middleware
- Oracle MySQL Product Suite
- NoSQL Database
- Oracle and Sun Systems Products Suite
- Oracle Linux and Virtualization
有關受影響產品的完整列表,請參閱以下網址:
https://www.oracle.com/security-alerts/cpujan2026.html
影響:
成功利用漏洞可以導致受影響的系統發生遠端執行程式碼、服務被拒絕、權限提升、泄漏資訊、繞過保安限制或篡改。
建議:
現已有適用於受影響系統的修補程式。受影響系統的用戶應遵從產品供應商的建議,立即採取行動以降低風險。
Oracle Java SE 產品的修補程式可從以下連結下載:
Java Platform SE 8u471 (JDK 及 JRE)
Java Platform SE 11.0.29 (JDK 及 JRE)
Java Platform SE 17.0.17 (JDK 及 JRE)
Java Platform SE 21.0.9 (JDK 及 JRE)
Java Platform SE 25.0.1 (JDK 及 JRE)
https://www.oracle.com/java/technologies/javase-downloads.html
OpenJDK 的修補程式可從以下連結下載:
https://jdk.java.net
用戶也可通過以下安全公告,以獲取其他 Oracle 產品安全更新方面的資訊:
https://www.oracle.com/security-alerts/cpujan2026.html
用戶可聯絡其產品支援供應商,以取得修補程式及相關支援。
進一步資訊:
- https://www.oracle.com/security-alerts/cpujan2026.html
- https://www.hkcert.org/tc/security-bulletin/oracle-products-multiple-vulnerabilities_20260121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23926
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23395
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13009
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23807
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42516
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46901
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47252
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47554
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56406
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4575
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4949
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5115
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5318
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5987
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7425
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7962
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8916
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9086
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9900
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12183
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12383
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25193
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26333
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26791
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27210
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27533
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27817
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31672
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-41248 (to CVE-2025-41249)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43967
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46727
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47219
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48924
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48976
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48989
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49844
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52999
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53864
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54571
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54874
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54988
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55039
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55163
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59250
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59419
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61755
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66418
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66516
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66566
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68161
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21923 (to CVE-2026-21952)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21955 (to CVE-2026-21957)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21959 (to CVE-2026-21975)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21977 (to CVE-2026-21978)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21980 (to CVE-2026-21990)