-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0153
        Low: Red Hat Enterprise Linux 3 Extended Life Cycle Support
                             Retirement Notice
                              5 February 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Enterprise Linux 3
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux AS/ES/WS 3
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2014-0131.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: Red Hat Enterprise Linux 3 Extended Life Cycle Support Retirement Notice
Advisory ID:       RHSA-2014:0131-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2014-0131.html
Issue date:        2014-02-04
=====================================================================

1. Summary:

This is the final notification for the retirement of Red Hat Enterprise
Linux 3 Extended Life Cycle Support (ELS). This notice applies only to
those customers subscribed in the Customer Portal to the Extended Life
Cycle Support (ELS) channel for Red Hat Enterprise Linux 3.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (v. 3 ELS) - i386
Red Hat Enterprise Linux ES (v. 3 ELS) - i386

3. Description:

In accordance with the Red Hat Enterprise Linux Errata Support Policy,
Extended Life Cycle Support (ELS) for Red Hat Enterprise Linux 3 was
retired on January 30, 2014, and support is no longer provided.
Accordingly, Red Hat will no longer provide updated packages, including
critical impact security patches or urgent priority bug fixes, for Red Hat
Enterprise Linux 3 ELS after January 30, 2014. In addition, technical
support through Red Hat's Global Support Services will no longer be
provided after this date.

In order to provide customers with a final opportunity to migrate their
systems to a supported version of Red Hat Enterprise Linux, the retirement
process for Red Hat Enterprise Linux 3 ELS will complete on March 31, 2014.
On that date, the Red Hat Enterprise Linux 3 ELS channels will be moved to
the "Retired" channels area (under the "Retired" tab) on the Customer
Portal, and customers will be unsubscribed from the Red Hat Enterprise
Linux 3 Extended Life Cycle Support channels.

For Red Hat Enterprise Linux 3 only, customers may continue to run Red Hat
Enterprise Linux 3 ELS on their systems without consuming a subscription.
However, customers wishing to access Red Hat Enterprise Linux 3 ELS
content (now under the "Retired" tab) on the Customer Portal will need an
active RHEL Server subscription. Also, customers who choose to resubscribe
a system to the retired Red Hat Enterprise Linux 3 ELS channels will
consume a RHEL Server subscription. Note again that the contents of
Retired channels are frozen, and no further security patches or bug fixes
are provided.

We encourage customers to plan their migration from Red Hat Enterprise
Linux 3 to a more recent version of Red Hat Enterprise Linux. As a benefit
of the Red Hat subscription model, customers can use active subscriptions
to entitle any system on a currently supported Red Hat Enterprise Linux
release.

Details of the Red Hat Enterprise Linux life cycle can be found here:
https://access.redhat.com/site/support/policy/updates/errata/

Additional information can also be found at:
https://access.redhat.com/site/solutions/690063

4. Solution:

This erratum contains an updated redhat-release package, that provides a
copy of this retirement notice in the "/usr/share/doc/" directory.

5. Package List:

Red Hat Enterprise Linux AS (v. 3 ELS):

Source:
redhat-release-3AS-13.9.20.src.rpm

i386:
redhat-release-3AS-13.9.20.i386.rpm
redhat-release-debuginfo-3AS-13.9.20.i386.rpm

Red Hat Enterprise Linux ES (v. 3 ELS):

Source:
redhat-release-3ES-13.9.20.src.rpm

i386:
redhat-release-3ES-13.9.20.i386.rpm
redhat-release-debuginfo-3ES-13.9.20.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

6. References:

https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/site/support/policy/updates/errata/
https://access.redhat.com/site/solutions/690063

7. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFS8U0TXlSAg2UNWIIRAkhrAJ9wQekC/Y0VNpl7NvagU5nmj9F9jgCffU0n
ADL3gt37axPJgWybPO0OyM4=
=ekMo
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUvGf2BLndAQH1ShLAQKUUQ//U3u3L+GYLmuAvdc4fb2w7wjwD2RfpeCc
YD00KHBTdaDByDJhSswJOIynYc3l1fjFyiQgV73uftLaY3Pl1U/yhkMMUmcyEMAW
ig/Hbb4TmALbGiIF63pzuRGCrr7Ljup+EzdfDSF4p+IUbj7lqUU8M341z4W6biY4
rUEEcDrgTFiahX75EteW4LvrYccZkUULDC5Bls08McvLst1i3b8BGGYkmj+IJjsP
wyJCfkvSNvBKwDcHPcDUNmDhrEG6dXl8dEP2+mnQPCBM1ZKDv2R+eHcFYpPYu3cd
eAN3uvnr0aVOO/8+P8lJVirEktBhXaW52t6Wxwv141rwaZ2mHWRcbqAiGZ/fqSna
gqZ5j1srxYzxMGPhVBtobBCdoMw+/z+6rvTKiycL8wsJxI2D4T77680Kko5qk6Nf
cQKmlMPcW7tFiBQt/e8aTSoxOX2hbs7tT53NeHoePNG8r68J3lIPLLuHWj9VCHln
u+3P+8hLRfqQSnyYJw8rstSUj69vSmv+4AMe7YPeEp4D95CEerBrWAPOqWP1nVC2
EstR35wLB2OQRGe8efbkQEeKDgAojzCFu3FfUJhZnsu3E/BdhCaykK5h1tN5FCSA
yZCoo37auTeDOjltZ4SMgqH1MpdRKbpxJUdWO8Zjislwcv3RpbuKC6tfPA77JnMa
ZRCmUyldr94=
=lnSz
-----END PGP SIGNATURE-----