Operating System:

[RedHat]

Published:

11 December 2018

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3827
         Low: Red Hat Enterprise Linux 6.7 Extended Update Support
                        One-Month Retirement Notice
                             11 December 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           RHEL 6.7 Extended Update Support
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2018:3805

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: Red Hat Enterprise Linux 6.7 Extended Update Support One-Month Retirement Notice
Advisory ID:       RHSA-2018:3805-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:3805
Issue date:        2018-12-10
=====================================================================

1. Summary:

This is the one-Month notification for the retirement of Red Hat Enterprise
Linux 6.7 Extended Update Support (EUS). This notification applies only to
those customers subscribed to the Extended Update Support (EUS) channel for
Red Hat Enterprise Linux 6.7.

2. Relevant releases/architectures:

Red Hat Enterprise Linux HPC Node EUS (v. 6.7) - x86_64
Red Hat Enterprise Linux Server EUS (v. 6.7) - i386, ppc64, s390x, x86_64

3. Description:

In accordance with the Red Hat Enterprise Linux Errata Support Policy,
Extended Update Support (EUS) for Red Hat Enterprise Linux 6.7 will be
retired as of December 31, 2018, and active support will no longer be
provided. Accordingly, Red Hat will no longer provide updated packages,
including Critical Impact security patches or Urgent Priority bug fixes,
for Red Hat Enterprise Linux 6.7 EUS after December 31, 2018. In addition,
on-going technical support through Red Hat's Customer Experience and
Engagement will be limited as described under "non-current minor releases"
in the Knowledge Base article located here
https://access.redhat.com/articles/64664 after this date.

We encourage customers to migrate from Red Hat Enterprise Linux 6.7 to a
more recent version of Red Hat Enterprise Linux. As a benefit of the Red
Hat subscription model, customers can use their active subscriptions to
entitle any system on any currently supported Red Hat Enterprise Linux
release.

Details of the Red Hat Enterprise Linux life cycle can be found here:
https://access.redhat.com/support/policy/updates/errata/

4. Solution:

This erratum contains an updated redhat-release-server package that
provides a copy of this retirement notice in the "/usr/share/doc/"
directory.

5. Bugs fixed (https://bugzilla.redhat.com/):

1647218 - Send out RHEL 6.7 Extended Update Support 1 Month Retirement Notice

6. Package List:

Red Hat Enterprise Linux HPC Node EUS (v. 6.7):

Source:
redhat-release-computenode-6ComputeNode-6.7.0.5.el6_7.3.src.rpm

x86_64:
redhat-release-computenode-6ComputeNode-6.7.0.5.el6_7.3.x86_64.rpm

Red Hat Enterprise Linux Server EUS (v. 6.7):

Source:
redhat-release-server-6Server-6.7.0.5.el6_7.2.src.rpm

i386:
redhat-release-server-6Server-6.7.0.5.el6_7.2.i686.rpm

ppc64:
redhat-release-server-6Server-6.7.0.5.el6_7.2.ppc64.rpm

s390x:
redhat-release-server-6Server-6.7.0.5.el6_7.2.s390x.rpm

x86_64:
redhat-release-server-6Server-6.7.0.5.el6_7.2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=cXmi
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXA8HVGaOgq3Tt24GAQidwA/9FTDChlwbo9+MzNaKpn0DNGZS3tFoCsTT
v5/tPlyUbMhlEhXQ6XE9ujIiH9TlSu+n7qlQtraAK8dYrDuC9IlUN+1XypUqilkC
DbXsLT+rVs25+/Eds44Xpzezaty53D8lOsa0XxUVZJuc+yQmmglz7SaY2dL/H5kJ
4DgOA3O/SUCWIvUU6NMG4+GbbVOSjICSNGnY74UzRb68eWnQ81SLFSHatPP2/maG
H6aK2pcJolldhVswd1uT8s/73rxvxIyyH0ivgj+4l1qJyMfbJVlO1AIAladRji93
ZCsHgznts9zK7zaC8Rn6TpdrXAd94Y5wpYXDY8b8LYk7wHlZeYZ/VJF5AITZaFfi
Uc3hIaDzi4Rp8+pGFyPnVNTORalL6VObmS4aUiC255DTSeySTfyjURBhdj74SH7c
mfCmpuFrTeZsu+DfxqCew0VHaS870uAeycLwKk0whP0BAMwv3kd/hZLdoznEoGIC
9oSaTv4vo17ulD+4LtQnK7IfjF4/NOqNB8IwmqIol+2qoNzTPgpDm4aTbsETVGiw
goBJlziKyLloGGWH9A4FQ9dyB5HbuVU8SuWrxWGmnFvwzpm/L3Cal06/6uDGyfF0
+Hf6Iyw9DSO6hw8NonbOYvq7FV8nBSptUJbOTwTzok208xO/l47o7HE3v/j3BevJ
M52UgIR1Pqs=
=De2A
-----END PGP SIGNATURE-----