-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2010.0116
                   FreeBSD 6.3 has reached end of life.
                              5 February 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          FreeBSD 6.3
Publisher:        FreeBSD
Operating System: FreeBSD 6.3
Impact/Access:    Reduced Security -- Unknown/Unspecified
Resolution:       Patch/Upgrade

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello Everyone,

The branches supported by the FreeBSD Security Officer have been updated
to reflect the EoL (end-of-life) of FreeBSD 6.3.  The new list is below
and at <URL: http://security.freebsd.org/ >.

Users of FreeBSD 6.3 are advised to upgrade promptly to a newer release,
either by downloading an updated source tree and building updates manually,
or (for i386 and amd64 systems) using the FreeBSD Update utility as
described in the relevant release announcement.

[Excerpt from http://security.freebsd.org/ follows]

FreeBSD Security Advisories

   The FreeBSD Security Officer provides security advisories for
   several branches of FreeBSD development. These are the -STABLE
   Branches and the Security Branches. (Advisories are not issued for
   the -CURRENT Branch.)

     * The -STABLE branch tags have names like RELENG_7. The
       corresponding builds have names like FreeBSD 7.0-STABLE.

     * Each FreeBSD Release has an associated Security Branch. The
       Security Branch tags have names like RELENG_7_0. The
       corresponding builds have names like FreeBSD 7.0-RELEASE-p1.

   Isses affecting the FreeBSD Ports Collection are covered in the
   FreeBSD VuXML document.

   Each branch is supported by the Security Officer for a limited
   time only, and is designated as one of `Early adopter', `Normal',
   or `Extended'.  The designation is used as a guideline for
   determining the lifetime of the branch as follows.

   Early adopter
       Releases which are published from the -CURRENT branch will be
       supported by the Security Officer for a minimum of 6 months
       after the release.

   Normal
       Releases which are published from a -STABLE branch will be
       supported by the Security Officer for a minimum of 12 months
       after the release, and for sufficient additional time (if
       needed) to ensure that there is a newer release for at least
       3 months before the older Normal release expires.

   Extended
       Selected releases (normally every second release plus the last
       release from each -STABLE branch) will be supported by the
       Security Officer for a minimum of 24 months after the release,
       and for sufficient additional time (if needed) to ensure that
       there is a newer Extended release for at least 3 months before
       the older Extended release expires.

   The current designation and estimated lifetimes of the currently
   supported branches are given below.  The Estimated EoL (end-of-life)
   column gives the earliest date on which that branch is likely to be
   dropped.  Please note that these dates may be extended into the
   future, but only extenuating circumstances would lead to a branch's
   support being dropped earlier than the date listed.

   +--------------------------------------------------------------------+
   |  Branch   |  Release  |  Type  |  Release date   |  Estimated EoL  |
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_6   |n/a        |n/a     |n/a              |November 30, 2010|
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_6_4 |6.4-RELEASE|Extended|November 28, 2008|November 30, 2010|
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_7   |n/a        |n/a     |n/a              |last release + 2y|
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_7_1 |7.1-RELEASE|Extended|January 4, 2009  |January 31, 2011 |
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_7_2 |7.2-RELEASE|Normal  |May 4, 2009      |May 31, 2010     |
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_8   |n/a        |n/a     |n/a              |last release + 2y|
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_8_0 |8.0-RELEASE|Extended|November 25, 2009|November 30, 2010|
   +--------------------------------------------------------------------+

[End excerpt]

The upcoming FreeBSD 7.3-RELEASE will receive Extended support, i.e., it
will be supported until early 2012.

- - --
Colin Percival
Security Officer, FreeBSD | freebsd.org | The power to serve
Founder / author, Tarsnap | tarsnap.com | Online backups for the truly paranoid
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (FreeBSD)

iEYEARECAAYFAktrGFwACgkQFdaIBMps37JxjACfcgWacpfcPj94zP4NtsvF6rWp
TiUAmwbfcPuFiKaSsZvxkncYo/DNXzpm
=yIFR
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://www.auscert.org.au/1967

iD8DBQFLa6A+/iFOrG6YcBERAofvAJwKN9Z0d0QuB39Obz1EKIJaS2NxvgCeLl/a
qzTz4EXkpfqMq49rAKzZz2M=
=isYM
-----END PGP SIGNATURE-----