-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0290
       Low: Oracle Java SE 6 - notification of end of public updates
                             28 February 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Oracle Java SE 6
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
                   Red Hat Enterprise Linux Server 5
                   Red Hat Enterprise Linux WS/Desktop 5
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2013-0570.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: Oracle Java SE 6 - notification of end of public updates
Advisory ID:       RHSA-2013:0570-01
Product:           Red Hat Enterprise Linux Extras
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2013-0570.html
Issue date:        2013-02-26
=====================================================================

1. Summary:

Oracle Java SE 6 will no longer receive updates after February 28, 2013.
The java-1.6.0-sun packages on the Red Hat Enterprise Linux 5 and 6
Supplementary media and Supplementary Red Hat Network (RHN) channels are
affected.

2. Description:

Oracle Java SE 6 will no longer receive updates after February 28, 2013.
The Oracle Java SE 6 packages on the Red Hat Enterprise Linux 5 and 6
Supplementary media and Red Hat Network (RHN) channels will continue to be
available after February 28, 2013.

Red Hat will continue to provide these packages only as a courtesy to
customers. Red Hat will not provide updates to these packages after this
date.

3. Solution:

Red Hat recommends that customers using Oracle Java SE 6 choose one of the
following alternative Java implementations:

* OpenJDK 6, which is available and supported in Red Hat Enterprise
  Linux 5 and 6.

* IBM's Java SE 6, which is available on the Red Hat Enterprise Linux 5
  and 6 Supplementary media and Supplementary RHN channels through
  September 2017.

* OpenJDK 7, which is available and supported in Red Hat Enterprise
  Linux 5 and 6.

* IBM's Java SE 7, which is available on the Red Hat Enterprise Linux 5
  and 6 Supplementary media and Supplementary RHN channels.

* Oracle Java SE 7, which is available today on the Red Hat Enterprise
  Linux 5 and 6 Supplementary media and Supplementary RHN channels.

In the near future, Red Hat will provide updated packages for these
alternative Java implementations and detailed instructions describing how
to configure a new default Java runtime environment.

4. References:

https://access.redhat.com/security/updates/classification/#low
http://www.ibm.com/developerworks/java/jdk/lifecycle/index.html

5. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2013 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFRLSgQXlSAg2UNWIIRAh1eAKCJvwhFTILOC0EvqwRCDvjQ5IvPLwCgncuX
xPNoNxvUq7wARAuAfk1XWAE=
=PXIW
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=WOHU
-----END PGP SIGNATURE-----