RHSA-2014:0477
Vulnerability from csaf_redhat - Published: 2014-05-07 19:37 - Updated: 2024-05-02 15:50Summary
Red Hat Security Advisory: Oracle Java SE - Notification of Removal from Supplementary Channel
Notes
Topic
Oracle Java SE packages will be moved from the Red Hat Enterprise Linux 5
and 6 Supplementary Red Hat Network (RHN) channels to the Oracle Java for
Red Hat Enterprise Linux 5 and 6 RHN channels.
Details
Oracle Java SE development (JDK) and runtime (JRE) software packages will
be removed from the Red Hat Enterprise Linux Supplementary media and RHN
channels. These packages will be relocated to a new set of channels that
are dedicated to delivering Oracle Java software. Customers are advised to
reconfigure their systems to use the new channels to ensure that they are
receiving the latest updates to Oracle Java software.
Oracle Java software packages will be removed from Red Hat Enterprise Linux
Supplementary media and RHN channels on May 8, 2014. Oracle Java will be
available for online download via the new RHN channels.
This change affects the following packages:
* Oracle Java SE 5 (java-1.5.0-sun)
* Oracle Java SE 6 (java-1.6.0-sun)
* Oracle Java SE 7 (java-1.7.0-oracle)
Red Hat Enterprise Linux includes OpenJDK as the default Java development
and runtime environment. Java development and runtime is also available
from IBM via the Supplementary media and RHN channels. Access to OpenJDK
and IBM JDK are not affected by this change.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_informational_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Oracle Java SE packages will be moved from the Red Hat Enterprise Linux 5\nand 6 Supplementary Red Hat Network (RHN) channels to the Oracle Java for\nRed Hat Enterprise Linux 5 and 6 RHN channels.",
"title": "Topic"
},
{
"category": "general",
"text": "Oracle Java SE development (JDK) and runtime (JRE) software packages will\nbe removed from the Red Hat Enterprise Linux Supplementary media and RHN\nchannels. These packages will be relocated to a new set of channels that\nare dedicated to delivering Oracle Java software. Customers are advised to\nreconfigure their systems to use the new channels to ensure that they are\nreceiving the latest updates to Oracle Java software.\n\nOracle Java software packages will be removed from Red Hat Enterprise Linux\nSupplementary media and RHN channels on May 8, 2014. Oracle Java will be\navailable for online download via the new RHN channels.\n\nThis change affects the following packages:\n* Oracle Java SE 5 (java-1.5.0-sun)\n* Oracle Java SE 6 (java-1.6.0-sun)\n* Oracle Java SE 7 (java-1.7.0-oracle)\n\nRed Hat Enterprise Linux includes OpenJDK as the default Java development\nand runtime environment. Java development and runtime is also available\nfrom IBM via the Supplementary media and RHN channels. Access to OpenJDK\nand IBM JDK are not affected by this change.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:0477",
"url": "https://access.redhat.com/errata/RHSA-2014:0477"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/solutions/732883",
"url": "https://access.redhat.com/site/solutions/732883"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/data/csaf/v2/advisories/2014/rhsa-2014_0477.json"
}
],
"title": "Red Hat Security Advisory: Oracle Java SE - Notification of Removal from Supplementary Channel",
"tracking": {
"current_release_date": "2024-05-02T15:50:28+00:00",
"generator": {
"date": "2024-05-02T15:50:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "3.29.2"
}
},
"id": "RHSA-2014:0477",
"initial_release_date": "2014-05-07T19:37:31+00:00",
"revision_history": [
{
"date": "2014-05-07T19:37:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-05-07T19:37:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-05-02T15:50:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Supplementary",
"product": {
"name": "Red Hat Enterprise Linux Supplementary",
"product_id": "Red Hat Enterprise Linux Supplementary"
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…