Oracle Java Security Patch Download

Oracle Critical Patch. Users running Java SE with a browser can download the. This Critical Patch Update contains 21 new security fixes for Oracle Java. Installing the Oracle Java Critical Patch Update Can. An integral part of Oracle’s strategy to improve the security of their software is the. Download My Free.

Oracle has rushed out a new Java security patch designed to plug up a range of holes in the software.

The February Critical Patch Update for Java SE addresses 50 security vulnerabilities, 44 of which affect the use of Java as a plug-in for Web browers, according to an Oracle blog posted Friday. If not properly patched, the plug-in could open the door for attackers to remotely execute code on a PC or Mac by directing users to malicious Web sites.

'The popularity of the Java Runtime Environment in desktop browsers, and the fact that Java in browsers is OS-independent, makes Java an attractive target for malicious hackers,' Eric Maurice, director for Oracle's Software Security Assurance, said in the blog.

Security experts have warned about holes in the Java plug-in, with some going so far as to suggest that users uninstall or disable Java until its security can be tightened.

Oracle had issued an emergency security update on January 13. But that update left some flaws still unpatched, prompting Homeland Security to recommend that users still disable Java.

Friday's fix was originally scheduled for release on February 19. But Oracle said it decided to ramp up the schedule after finding that one of the flaws affecting the Java Runtime Environment was actively being exploited. The new update addresses that specific flaw and includes all of the fixes from January's update.

'Oracle felt that, releasing this Critical Patch Update two weeks ahead of our intended schedule, instead of releasing a one-off fix through a Security Alert, would be more effective in helping preserve the security posture of Java customers,' Maurice noted.

Related stories

Oracle has also been criticized in the past for not keeping Java properly protected or updated to guard against security exploits. The company gained custody of Java after it acquired Sun Microsystems in 2009.

Security

Users already running Java should receive a notice that an update is available.

Oracle Java Security Patch Download

The latest version can also be manually installed or updated from Oracle's Java product page. Java users can ensure that the latest version is active through Oracle's Java verification page. An FAQ on Java and its use is available online as well.

Price drops on our favorite products

This page lists announcements of security fixes made in Critical Patch Update Advisories, Security Alerts and Bulletins, and it is updated when new Critical Patch Update Advisories, Security Alerts and Bulletins are released.

Instructions for subscribing to email notifications of Critical Patch Update Advisories and Security Alerts.
Oracle Corporate Security Blog
Guidelines for reporting security vulnerabilities

This page contains the following sections:

Critical Patch Updates

Critical Patch Updates are collections of security fixes for Oracle products. They are available to customers with valid support contracts. They are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:

  • 15 October 2019
  • 14 January 2020
  • 14 April 2020
  • 14 July 2020

A pre-release announcement will be published on the Thursday preceding each Critical Patch Update release.

The Critical Patch Updates released since 2015 are listed in the following table. Critical Patch Updates released before 2015 are available here.

Critical Patch UpdateLatest Version/Date
Critical Patch Update - July 2019
Rev 5, 16 August 2019
Critical Patch Update - April 2019
Rev 6, 28 May 2019
Critical Patch Update - January 2019
Rev 6, 18 April 2019
Critical Patch Update - October 2018
Rev 6, 18 December 2018
Critical Patch Update - July 2018
Rev 8, 12 October 2018
Critical Patch Update - April 2018
Rev 4, 10 December 2018
Critical Patch Update - January 2018
Rev 8, 20 March 2018
Critical Patch Update - October 2017
Rev 10, 15 February 2018
Critical Patch Update - July 2017
Rev 6, 20 March 2018
Critical Patch Update - April 2017
Rev 5, 20 June 2017
Critical Patch Update - January 2017
Rev 5, 18 May 2017
Critical Patch Update - October 2016
Rev 5, 16 May 2019
Critical Patch Update - July 2016
Rev 2, 18 October 2016
Critical Patch Update - April 2016
Rev 3, 20 December 2016
Critical Patch Update - January 2016
Rev 2, 12 February 2016
Critical Patch Update - October 2015
Rev 6, 27 October 2015
Critical Patch Update - July 2015
Rev 4, 30 July 2015
Critical Patch Update - April 2015
Rev 3, 28 April 2015
Critical Patch Update - January 2015
Rev 2, 10 March 2015

Security Alerts

Oracle will issue Security Alerts for vulnerability fixes deemed too critical to wait for distribution in the next Critical Patch Update. The Security Alerts released since 2015 are listed in the following table. Security Alerts released before 2015 are available here.


Security Alert Number And DescriptionLatest Version/Date
Alert for CVE-2019-2729Rev 4, 11 July 2019
Alert for CVE-2019-2725Rev 4, 29 May 2019
Alert for CVE-2018-11776Rev 1, 31 August 2018
Alert for CVE-2018-3110Rev 1, 10 August 2018
Alert for CVE-2017-10269Rev 2, 16 November 2017
Alert for CVE-2017-10151Rev 3, 04 November 2017
Alert for CVE-2017-9805Rev 1, 22 September 2017
Alert for CVE-2017-3629Rev 2, 20 June 2017
Alert for CVE-2016-0636Rev 1, 23 March 2016
Alert for CVE-2016-0603Rev 1, 05 February 2016
Alert for CVE-2015-4852Rev 2, 12 November 2015
Alert for CVE-2015-3456 QEMU 'Venom'Rev 1, 15 May 2015

Solaris Third Party Bulletins

Solaris Third Party Bulletins are used to announce security fixes for third party software distributed with Oracle Solaris. Solaris Third Party Bulletins are published on the same day as Oracle Critical Patch Updates are released. These bulletins are be updated on the Tuesday closest to the 17th of the following two months after their release (i.e., the two months between the normal quarterly Critical Patch Update publication dates). In addition, Solaris Third Party Bulletins may also be updated for vulnerability fixes deemed too critical to wait for the next scheduled publication date. Bulletins published before January 20, 2015 are available here.


Solaris Third Party BulletinLatest Version/Date
Solaris Third Party Bulletin - July 2019
Rev 2, 20 August 2019
Solaris Third Party Bulletin - April 2019
Rev 3, 25 June 2019
Solaris Third Party Bulletin - January 2019
Rev 4, 16 April 2019
Solaris Third Party Bulletin - October 2018
Rev 3, 14 December 2018
Solaris Third Party Bulletin - July 2018
Rev 3, 24 September 2018
Solaris Third Party Bulletin - April 2018
Rev 3, 15 June 2018
Solaris Third Party Bulletin - January 2018
Rev 3, 20 March 2018
Solaris Third Party Bulletin - October 2017
Rev 3, 18 December 2017
Solaris Third Party Bulletin - July 2017
Rev 4, 18 September 2017
Solaris Third Party Bulletin - April 2017
Rev 4, 19 June 2017
Solaris Third Party Bulletin - January 2017
Rev 4, 28 March 2017
Solaris Third Party Bulletin - October 2016
Rev 5, 11 January 2017
Solaris Third Party Bulletin - July 2016
Rev 6, 10 April 2017
Solaris Third Party Bulletin - April 2016
Rev 8, 16 October 2017
Solaris Third Party Bulletin - January 2016
Rev 5, 12 April 2016
Solaris Third Party Bulletin - October 2015
Rev 5, 14 January 2016
Solaris Third Party Bulletin - July 2015
Rev 6, 15 September 2015
Solaris Third Party Bulletin - April 2015
Rev 3, 15 June 2015
Solaris Third Party Bulletin - January 2015
Rev 5, 01 April 2015

Oracle Linux Bulletins

Oracle releases security advisories for Oracle Linux as patches become available. Security advisories (ELSA) are published at https://linux.oracle.com/security/.

Starting October 20, 2015, Oracle will also publish Oracle Linux Bulletins which list all CVEs that had been resolved and announced in Oracle Linux Security Advisories in the last one month prior to the release of the bulletin. The Oracle Linux Bulletin will be published on the same day as Oracle Critical Patch Updates are released. These bulletins will also be updated for following two months after their release (i.e., the two months between the normal quarterly Critical Patch Update publication dates) to cover all CVEs that had been resolved in those two months following the bulletin's publication. In addition, Oracle Linux Bulletins may also be updated for vulnerability fixes deemed too critical to wait for the next scheduled bulletin publication date.


Oracle Linux BulletinLatest Version/Date
Oracle Linux Bulletin - July 2019
Rev 2, 16 August 2019
Oracle Linux Bulletin - April 2019
Rev 3, 18 June 2019
Oracle Linux Bulletin - January 2019
Rev 3, 18 March 2019
Oracle Linux Bulletin - October 2018
Rev 3, 17 December 2018
Oracle Linux Bulletin - July 2018
Rev 3, 18 September 2018
Oracle Linux Bulletin - April 2018
Rev 3, 18 June 2018
Oracle Linux Bulletin - January 2018
Rev 3, 16 March 2018
Oracle Linux Bulletin - October 2017
Rev 3, 18 December 2017
Oracle Linux Bulletin - July 2017
Rev 3, 18 September 2017
Oracle Linux Bulletin - April 2017
Rev 3, 19 June 2017
Oracle Linux Bulletin - January 2017
Rev 3, 17 March 2017
Oracle Linux Bulletin - October 2016
Rev 3, 19 December 2016
Oracle Linux Bulletin - July 2016
Rev 3, 19 September 2016
Oracle Linux Bulletin - April 2016
Rev 3, 20 June 2016
Oracle Linux Bulletin - January 2016
Rev 3, 21 March 2016
Oracle Linux Bulletin - October 2015
Rev 3, 21 December 2015

Oracle VM Server for x86 Bulletins

Oracle releases security advisories for Oracle VM Server for x86 as patches become available. Security advisories (OVMSA) are published at https://linux.oracle.com/errata/.

Starting July 19, 2016, Oracle will also publish Oracle VM Server for x86 Bulletins which will list all CVEs that had been resolved and announced in Oracle VM Server for x86 Security Advisories in the last one month prior to the release of the bulletin. The Oracle VM Server for x86 Bulletin will be published on the same day as Oracle Critical Patch Updates are released. These bulletins will also be updated for following two months after their release (i.e., the two months between the normal quarterly Critical Patch Update publication dates) to cover all CVEs that had been resolved in those two months following the bulletin's publication. In addition, Oracle VM Server for x86 Bulletins may also be updated for vulnerability fixes deemed too critical to wait for the next scheduled bulletin publication date.


Oracle VM Server for x86 BulletinLatest Version/Date
Oracle VM Server for x86 Bulletin - July 2019
Rev 2, 16 August 2019
Oracle VM Server for x86 Bulletin - April 2019
Rev 3, 18 June 2019
Oracle VM Server for x86 Bulletin - January 2019
Rev 3, 18 March 2019
Oracle VM Server for x86 Bulletin - October 2018
Rev 3, 17 December 2018
Oracle VM Server for x86 Bulletin - July 2018
Rev 3, 18 September 2018
Oracle VM Server for x86 Bulletin - April 2018
Rev 3, 18 June 2018
Oracle VM Server for x86 Bulletin - January 2018
Rev 3, 16 March 2018
Oracle VM Server for x86 Bulletin - October 2017
Rev 3, 18 December 2017
Oracle VM Server for x86 Bulletin - July 2017
Rev 3, 18 September 2017
Oracle VM Server for x86 Bulletin - April 2017
Rev 3, 19 June 2017
Oracle VM Server for x86 Bulletin - January 2017
Rev 3, 17 March 2017
Oracle VM Server for x86 Bulletin - October 2016
Rev 3, 19 December 2016
Oracle VM Server for x86 Bulletin - July 2016
Rev 3, 19 September 2016

Oracle Java Plugin

Map of CVE to Advisory

The Map of CVE to Advisory/Alert indicates which CVEs are fixed in each Critical Patch Update and Security Alert. The Map of CVE to Solaris Third Party Bulletin indicates which CVEs are fixed in each Solaris Third Party Bulletin.


Policy on Information Provided in Critical Patch Updates and Security Alerts

As a matter of policy, Oracle will not provide additional information about the specifics of vulnerabilities beyond what is provided in the Critical Patch Update or Security Alert notification, the pre-installation notes, the readme files, and FAQs. Oracle provides all customers with the same information in order to protect all customers equally. Oracle will not provide advance notification or 'insider information' on Critical Patch Update or Security Alerts to individual customers. Finally, Oracle does not develop or distribute active exploit code (or 'proof of concept code') for vulnerabilities in our products.


Sun Java Security Patch

Applicability of Critical Patch Updates and Security Alerts to Oracle Cloud

The Oracle Cloud operations and security teams regularly evaluate Oracle’s Critical Patch Updates and Security Alert fixes as well as relevant third-party fixes as they become available and apply the relevant patches in accordance with applicable change management processes.

Customers requiring additional information that is not addressed in the Critical Patch Update Advisory may obtain additional information as follows:

Oracle Patch

  • Oracle Cloud (IaaS, PaaS, and SaaS) customers should submit a SR within their designated support system
  • Oracle Managed Cloud Services (OMCS) customers should contact their Service Delivery Manager (SDM). CRM On Demand customers should request status via a Service Request (SR).
  • Global Business Units/Industry Cloud Services and Micros Cloud customers should submit a SR within their designated support system or, if applicable, contact their Customer Success Manager.
  • Oracle Data Cloud (ODC) customers should contact their Client Partner.
  • Oracle NetSuite customers should submit an Oracle NetSuite Support Case from within their Oracle NetSuite account.

Oracle Java Download Jdk

References