ESB-2017.3264 - [RedHat] Red Hat Enterprise MRG Version 2: Reduced security: 6-month notice 2017-12-22

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.3264
   Red Hat Enterprise MRG for Red Hat Enterprise Linux 6 6-month Notice
                             22 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Enterprise MRG Version 2
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux 6
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2017:3493

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: Red Hat Enterprise MRG for Red Hat Enterprise Linux 6 6-month Notice
Advisory ID:       RHSA-2017:3493-01
Product:           Red Hat Enterprise MRG for RHEL-6
Advisory URL:      https://access.redhat.com/errata/RHSA-2017:3493
Issue date:        2017-12-21
=====================================================================

1. Summary:

This is the 6-month notification for the retirement of Red Hat Enterprise
MRG Version 2 for Red Hat Enterprise Linux 6.

This notification applies only to those customers subscribed to Red Hat
Enterprise MRG Version 2 for Red Hat Enterprise Linux 6.

2. Relevant releases/architectures:

Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2 - noarch
Red Hat MRG Grid Execute Node for RHEL 6 Server v.2 - noarch
Red Hat MRG Grid for RHEL 6 Server v.2 - noarch
Red Hat MRG Management for RHEL 6 ComputeNode v.2 - noarch
Red Hat MRG Management for RHEL 6 Server v.2 - noarch
Red Hat MRG Messaging for RHEL 6 Server v.2 - noarch
Red Hat MRG Realtime for RHEL 6 Server v.2 - noarch

3. Description:

In accordance with the Red Hat Enterprise MRG Life Cycle policy, Red Hat
Enterprise MRG Version 2 for Red Hat Enterprise Linux 6 will be retired as
of June 30, 2018, and active support will no longer be provided.

Accordingly, Red Hat will no longer provide updated packages, including
Critical Impact security patches or Urgent Priority bug fixes, for Red Hat
Enterprise MRG Version 2 for Red Hat Enterprise Linux 6 after June 30,
2018. In addition, on-going technical support through Red Hat's Customer
Experience and Engagement will be limited as described under "non-current
minor releases" in the Knowledge Base article located here
https://access.redhat.com/articles/3234591 after this date.

Red Hat Enterprise MRG-Realtime customers are advised to migrate to Red Hat
Enterprise Linux for Real Time 7 at this time. Red Hat Enterprise Linux for
Real Time 7 is available with most Red Hat Enterprise MRG-Realtime
subscriptions to allow customers to plan their migration. Red Hat
Enterprise Linux for Real Time 7 is the most current version of our real
time offering and is actively supported today.

Details of the Red Hat Enterprise MRG life cycle can be found here:
https://access.redhat.com/support/policy/updates/mrg

Additional information on Red Hat Enterprise Linux for Real Time can be
found here (see "Red Hat Enterprise Linux Portfolio"):
https://access.redhat.com/products/red-hat-enterprise-linux/

4. Solution:

This erratum contains an updated mrg-release package, which provides a copy
of this retirement notice in the "/usr/share/doc/" directory.

5. Package List:

Red Hat MRG Grid Execute Node for RHEL 6 ComputeNode v.2:

Source:
mrg-release-2.5.0-2.el6.src.rpm

noarch:
mrg-release-2.5.0-2.el6.noarch.rpm

Red Hat MRG Management for RHEL 6 ComputeNode v.2:

Source:
mrg-release-2.5.0-2.el6.src.rpm

noarch:
mrg-release-2.5.0-2.el6.noarch.rpm

Red Hat MRG Grid for RHEL 6 Server v.2:

Source:
mrg-release-2.5.0-2.el6.src.rpm

noarch:
mrg-release-2.5.0-2.el6.noarch.rpm

Red Hat MRG Grid Execute Node for RHEL 6 Server v.2:

Source:
mrg-release-2.5.0-2.el6.src.rpm

noarch:
mrg-release-2.5.0-2.el6.noarch.rpm

Red Hat MRG Management for RHEL 6 Server v.2:

Source:
mrg-release-2.5.0-2.el6.src.rpm

noarch:
mrg-release-2.5.0-2.el6.noarch.rpm

Red Hat MRG Messaging for RHEL 6 Server v.2:

Source:
mrg-release-2.5.0-2.el6.src.rpm

noarch:
mrg-release-2.5.0-2.el6.noarch.rpm

Red Hat MRG Realtime for RHEL 6 Server v.2:

Source:
mrg-release-2.5.0-2.el6.src.rpm

noarch:
mrg-release-2.5.0-2.el6.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

6. References:

https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/articles/3234591
https://access.redhat.com/support/policy/updates/mrg/
https://access.redhat.com/products/red-hat-enterprise-linux/

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFaO9sIXlSAg2UNWIIRAn2/AJ937kbPB3Ic5xROJC+d5Ql+AU5gAwCgkcXH
nwNKB/o/EM8/JA4TO0D0qm4=
=k2b9
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=aQVT
-----END PGP SIGNATURE-----

« Back to bulletins