RedHat: RHSA-2019-2947:01 Low: Red Hat Enterprise Linux 5.9 Advanced

    Date 01 Oct 2019
    711
    Posted By LinuxSecurity Advisories
    This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 5.9 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 5.9.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Low: Red Hat Enterprise Linux 5.9 Advanced Mission Critical (AMC) Six-Month Notice
    Advisory ID:       RHSA-2019:2947-01
    Product:           Red Hat Enterprise Linux
    Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2947
    Issue date:        2019-10-01
    =====================================================================
    
    1. Summary:
    
    This is the Six-Month notification for the retirement of Red Hat Enterprise
    Linux 5.9 Advanced Mission Critical (AMC). This notification applies only
    to those customers subscribed to the Advanced Mission Critical (AMC)
    channel for Red Hat Enterprise Linux 5.9.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux Long Life (v. 5.9 server) - i386, x86_64
    
    3. Description:
    
    In accordance with the Red Hat Enterprise Linux Errata Support Policy,
    Advanced Mission Critical for Red Hat Enterprise Linux 5.9 will be retired
    as of March 31, 2020, and active support will no longer be provided.
    Accordingly, Red Hat will no longer provide updated packages, including
    Critical Impact security patches or Urgent Priority bug fixes, for Red Hat
    Enterprise Linux 5.9 AMC after March 31, 2020. In addition, on-going
    technical support through Red Hat's Customer Experience and Engagement will
    be limited as described under "non-current minor releases" in the Knowledge
    Base article located here https://access.redhat.com/articles/64664​ after
    this date.
    
    We encourage customers to migrate from Red Hat Enterprise Linux 5.9 to a
    more recent version of Red Hat Enterprise Linux. As a benefit of the Red
    Hat subscription model, customers can use their active subscriptions to
    entitle any system on any currently supported Red Hat Enterprise Linux
    release.
    
    Details of the Red Hat Enterprise Linux life cycle can be found here:
    https://access.redhat.com/support/policy/updates/errata/
    
    4. Solution:
    
    This erratum contains an updated redhat-release-server package that
    provides a copy of this retirement notice in the "/usr/share/doc/"
    directory.
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1750975 - RHEL 5.9 AMC 6 Month Retirement Notice
    
    6. Package List:
    
    Red Hat Enterprise Linux Long Life (v. 5.9 server):
    
    Source:
    redhat-release-5Server-5.9.0.5.2.src.rpm
    
    i386:
    redhat-release-5Server-5.9.0.5.2.i386.rpm
    
    x86_64:
    redhat-release-5Server-5.9.0.5.2.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/updates/classification/#low
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2019 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXZMuatzjgjWX9erEAQhBoRAApLDsZYtSgm2/PqOrdHAwoHJEOAfSOUrT
    vufPj0RxSCzpM3jiQVGQVQVypnEHBcxvk/tX9ggEXS5tps07Gz7wgKnIZjyFzGss
    vSzKYN48gXIbbrX5onL74PNOaVa/gYwccIT/vzFS8tFGToHprL7l53PWICkSglkm
    wQkBGvo9EhMfqRzfxi25uoQUJ9C2EV+JPpxl//annXl1LLe6nAos3FClfkOfrUxa
    xoalKRhsMVVBRH08LlEYaJ62y+kzXxotIn/XPgY6oz5ODMd6rImmC4TB7mNpGbkt
    JciHlfhTbQMansZG/olVh2jgwk9Ktr4p+KxZonmdnTmKbIrJtrZ1w7GPepADn578
    qFtKod5Wd9iigcQluBNczDJNgqsh9eqtn5fUWEily9nqx/Mao/caDCZ4Qnr+kb3V
    +dMZ/93FFcLZtYrFlNkrMgB5ZhQ+RD9pNWVlNTccBAYZGSSHyyK33HwUBXy+oN5Y
    5dYFHmSyJHJuRaYet5vBAGRV5ZqTh85z+/bW+/4VrT1uWeVpvnIK6TmllxYhgir/
    S32iZd850kl3pOkng7Vxz1hJpjMZUBav1lIfJ9VlxIEy3LW8D4IZz5VUMa1hDhH9
    BaiCihPIiGRVDxRleemm8TYHCBFUajeWMsi7x3NtP0ilEpMTR7Ogz+zxe1WKPezf
    J+Ot2pnh3ho=
    =Zvxx
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"3","type":"x","order":"1","pct":42.86,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"2","type":"x","order":"3","pct":28.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.