Jump to content


Oracle Java™ Critical Security Updates Released


  • Please log in to reply
No replies to this topic

#1 OFFLINE   Corrine

Corrine

    The Mystical Rose

  • Forum Admins
  • 4,096 posts

Posted 18 October 2017 - 11:15 AM

Oracle released the scheduled critical security updates for its Java SE Runtime Environment software.  The update contains 22 new security fixes for Oracle Java SE.  Twenty-two (22) of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials

Update

If Java is still installed on your computer, it is recommended that this update be applied as soon as possible due to the threat posed by a successful attack.

Download Information Java SE 8u151/ 8u152

Java™ SE Development Kit 8, Update 151 Release Notes

Java™ SE Development Kit 8, Update 152 Release Notes
Java SE Runtime Environment 8 - Downloads

Java SE 9.0.1  (x64-bit only)

Java™ SE Development Kit 9.0.1 Release Notes
Java SE Runtime Environment 9 - Downloads

Notes:
  • UNcheck any pre-checked toolbar and/or software  options   presented with  the update. They are not part of the software  update   and are completely  optional.  Preferably, see the instructions below on   how to handle "Unwanted Extras".
  • Oracle does not plan to migrate desktops from Java 8 to Java 9  through  the auto  update feature.  Therefore, it is strongly  recommended that  you uninstall JRE 8 prior to updating.
  • Verify your version:  http://www.java.com/...ad/testjava.jsp.   Note: The Java version verification page will only work if your browser has    NPAPI support.  In that case, to check the version, open a cmd window   and enter the  following (note the space following Java):   java -version

Critical Patch Updates and Security Alerts
Posted Image

Take a walk through the "Security Garden" -- Where Everything is Coming up Roses!

Remember - A day without laughter is a day wasted.
May the wind sing to you and the sun rise in your heart.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users