what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2016-1991-01

Red Hat Security Advisory 2016-1991-01
Posted Oct 3, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1991-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Advanced Mission Critical for Red Hat Enterprise Linux 5.6 will be retired as of March 31, 2017, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or Urgent priority bug fixes, for Red Hat Enterprise Linux 5.6 AMC after March 31, 2017.

tags | advisory
systems | linux, redhat
SHA-256 | 8d3a1d93791f09ea024307ab2653b8e590b3f23387c6dfc437798d10f6b94c14

Red Hat Security Advisory 2016-1991-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Low: Red Hat Enterprise Linux 5.6 Advanced Mission Critical (AMC) Six-Month Notice
Advisory ID: RHSA-2016:1991-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1991.html
Issue date: 2016-10-03
=====================================================================

1. Summary:

This is the Six-Month notification for the retirement of Red Hat Enterprise
Linux 5.6 Advanced Mission Critical (AMC). This notification applies only
to those customers subscribed to the Advanced Mission Critical (AMC)
channel for Red Hat Enterprise Linux 5.6.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Long Life (v. 5.6 server) - i386, ia64, x86_64

3. Description:

In accordance with the Red Hat Enterprise Linux Errata Support Policy,
Advanced Mission Critical for Red Hat Enterprise Linux 5.6 will be retired
as of March 31, 2017, and active support will no longer be provided.
Accordingly, Red Hat will no longer provide updated packages, including
Critical impact security patches or Urgent priority bug fixes, for Red Hat
Enterprise Linux 5.6 AMC after March 31, 2017. In addition, technical
support through Red Hat's Global Support Services will be limited as
described under "non-current minor releases" in the Knowledge Base article
located at https://access.redhat.com/articles/64664 after this date.

We encourage customers to migrate from Red Hat Enterprise Linux 5.6 to a
more recent version of Red Hat Enterprise Linux. As a benefit of the Red
Hat subscription model, customers can use their active subscriptions to
entitle any system on any currently supported Red Hat Enterprise Linux
release.

Details of the Red Hat Enterprise Linux life cycle can be found here:
https://access.redhat.com/support/policy/updates/errata/

4. Solution:

This erratum contains an updated redhat-release package, that provides a
copy of this notice in the "/usr/share/doc/" directory.

5. Package List:

Red Hat Enterprise Linux Long Life (v. 5.6 server):

Source:
redhat-release-5Server-5.6.0.11.src.rpm

i386:
redhat-release-5Server-5.6.0.11.i386.rpm

ia64:
redhat-release-5Server-5.6.0.11.ia64.rpm

x86_64:
redhat-release-5Server-5.6.0.11.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

6. References:

https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/support/policy/updates/errata/
https://access.redhat.com/articles/64664

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFX8rQeXlSAg2UNWIIRAi9EAKCxWkPN0yxEoZM8ComVKlJK919ClQCfTICU
GXztUPXQUYmyWDK4yi+ZCPI=
=SC/y
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close