Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.0687 Low: Oracle Java SE - Notification of Removal from Supplementary Channel 8 May 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Oracle Java SE Publisher: Red Hat Operating System: Red Hat Impact/Access: Reduced Security -- Unknown/Unspecified Resolution: Mitigation Original Bulletin: https://rhn.redhat.com/errata/RHSA-2014-0477.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: Oracle Java SE - Notification of Removal from Supplementary Channel Advisory ID: RHSA-2014:0477-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0477.html Issue date: 2014-05-07 ===================================================================== 1. Summary: Oracle Java SE packages will be moved from the Red Hat Enterprise Linux 5 and 6 Supplementary Red Hat Network (RHN) channels to the Oracle Java for Red Hat Enterprise Linux 5 and 6 RHN channels. 2. Description: Oracle Java SE development (JDK) and runtime (JRE) software packages will be removed from the Red Hat Enterprise Linux Supplementary media and RHN channels. These packages will be relocated to a new set of channels that are dedicated to delivering Oracle Java software. Customers are advised to reconfigure their systems to use the new channels to ensure that they are receiving the latest updates to Oracle Java software. Oracle Java software packages will be removed from Red Hat Enterprise Linux Supplementary media and RHN channels on May 8, 2014. Oracle Java will be available for online download via the new RHN channels. This change affects the following packages: * Oracle Java SE 5 (java-1.5.0-sun) * Oracle Java SE 6 (java-1.6.0-sun) * Oracle Java SE 7 (java-1.7.0-oracle) Red Hat Enterprise Linux includes OpenJDK as the default Java development and runtime environment. Java development and runtime is also available from IBM via the Supplementary media and RHN channels. Access to OpenJDK and IBM JDK are not affected by this change. 3. Solution: Users are required to enable the new repository on their systems to access Oracle Java software. Refer to Red Hat Customer Portal Knowledgebase Solution 732883, linked to in the References section, for instructions on how to subscribe your systems to the new Oracle Java RHN channels. 4. References: https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/site/solutions/732883 5. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTaow+XlSAg2UNWIIRAviRAKCEtjepe2cn2MeQMMdJk6XZ1LlTcQCfcla1 wTwT4xQP+QAua6U/ObXN454= =+87V - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU2seNBLndAQH1ShLAQLB/A//Z00m7SizIqf2yWnmIfz4AiClxbmeAQbC iWawKF8BUoK51Gg2+GkUwQc5U0PkeTGKAYyuHP9cpRd6DOCaxoYj0tit8cAHNyfm KfGAXyxCiQYfLmC/SOBP0XFyqDuAuVDiz8ekSbOamEaMl9wS1uQpWIUWZr9zWq0f GKHr1c5BHJDzGt2t6wGuPSRD/ErPbB5hVq1muu3rS9xKq6HzNU32L8orOtR5jqot YU7AWe7e5Juw26UMZSqSouA1IB2l4WcqvZzhTo8grKXrh+ZNzUg4qfwDBowmby/U zdjugcX7PD1/o5wuGuIrp/5h6ib3y4952aYZAtCYrkPM6BcFJx0boDkYPBtAk2Rv 6jt4IErTlkZ4ptxSKodvMZUOug2biAcCpwr6FZLGfgn9rQMCkxHHipMbDqDKTXfF zht/RPxRt+/WdIsEVQjyaAj/O6S2juP2xDkIj55ftbb/3LH1rl9lcNfA1ckuW5W5 iFg88EAIKl6ViHU7yDC2FRJyXn0p2OAL7z+g5RgFvba18MyP6Rbib98p3L+2TtWn rcdK1bN2xoaB/cvh8nWT5YwTM99YRdpURF0wSyY10Odf/b6xMJt95hC5M5S1ZYSA ECfJ2Wow5uQCrt46GhOL2zuIliTA4l4/m4097zQ0a6QukasbzjLOKZTMvApE8FEJ kHLwY5gyTGU= =wMz9 -----END PGP SIGNATURE-----