-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                        ESB-2008.0576 -- [FreeBSD]
    FreeBSD 5.5, FreeBSD 6.1, and FreeBSD 6.2 end-of-life notification
                                4 June 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              FreeBSD 5.5
                      FreeBSD 6.1
                      FreeBSD 6.2
Publisher:            FreeBSD
Operating System:     FreeBSD

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello Everyone,

The branches supported by the FreeBSD Security Officer have been updated
to reflect recent EoL (end-of-life) events.  The new list is below and
at <URL: http://security.freebsd.org/ >.  FreeBSD 5.5, FreeBSD 6.1, and
FreeBSD 6.2 have `expired' and are no longer supported effective June 1,
2008.  Users of these releases are advised to upgrade promptly to FreeBSD
6.3 or FreeBSD 7.0, either by downloading an updated source tree and
building updates manually, or (for i386 and amd64 systems) using the
FreeBSD Update utility as described in the FreeBSD 6.3 and FreeBSD 7.0
release announcements.

This marks the end of support by the FreeBSD Security Team for the
FreeBSD 5-STABLE branch, and at this time support for running software
from the ports tree on FreeBSD 5.x is also ceasing:  Packages for binary
installations will no longer be built for FreeBSD 5.5, building ports
from source on FreeBSD 5.x will no longer be supported, and the ports
INDEX will no longer be built and made available via portsnap or the
'make fetchindex' target.  Patches for individual ports specific for
their functioning on FreeBSD 5.5 may still be accepted at the discretion
of the port maintainer.

[Excerpt from http://security.freebsd.org/ follows]

FreeBSD Security Advisories

   The FreeBSD Security Officer provides security advisories for
   several branches of FreeBSD development. These are the -STABLE
   Branches and the Security Branches. (Advisories are not issued for
   the -CURRENT Branch.)

     * There is usually only a single -STABLE branch, although during
       the transition from one major development line to another
       (such as from FreeBSD 5.x to 6.x), there is a time span in
       which there are two -STABLE branches. The -STABLE branch tags
       have names like RELENG_6. The corresponding builds have names
       like FreeBSD 6.1-STABLE.

     * Each FreeBSD Release has an associated Security Branch. The
       Security Branch tags have names like RELENG_6_1. The
       corresponding builds have names like FreeBSD 6.1-RELEASE-p1.

   Isses affecting the FreeBSD Ports Collection are covered in the
   FreeBSD VuXML document.

   Each branch is supported by the Security Officer for a limited
   time only, and is designated as one of `Early adopter', `Normal',
   or `Extended'.  The designation is used as a guideline for
   determining the lifetime of the branch as follows.

   Early adopter
       Releases which are published from the -CURRENT branch will be
       supported by the Security Officer for a minimum of 6 months
       after the release.

   Normal
       Releases which are published from a -STABLE branch will be
       supported by the Security Officer for a minimum of 12 months
       after the release.

   Extended
       Selected releases will be supported by the Security Officer
       for a minimum of 24 months after the release.

   The current designation and estimated lifetimes of the currently
   supported branches are given below.  The Estimated EoL (end-of-life)
   column gives the earliest date on which that branch is likely to be
   dropped.  Please note that these dates may be extended into the
   future, but only extenuating circumstances would lead to a branch's
   support being dropped earlier than the date listed.

   +--------------------------------------------------------------------+
   |  Branch   |  Release  |  Type  |  Release date   |  Estimated EoL  |
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_6   |n/a        |n/a     |n/a              |January 31, 2010 |
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_6_3 |6.3-RELEASE|Extended|January 18, 2008 |January 31, 2010 |
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_7   |n/a        |n/a     |n/a              |last release + 2y|
   |-----------+-----------+--------+-----------------+-----------------|
   |RELENG_7_0 |7.0-RELEASE|Normal  |February 27, 2008|February 28, 2009|
   +--------------------------------------------------------------------+

[End excerpt]

Colin Percival
FreeBSD Security Officer
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (FreeBSD)

iEYEARECAAYFAkhEe5MACgkQFdaIBMps37IXoQCbB3RkY/s2CA+o/OFkuC/1YvUV
rY8An1JawL1x8DdUOlVUL0b2+9N4XZ2v
=X+Zm
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSEXV4yh9+71yA2DNAQKZfwP+OnjS+emGtoRGAAA47n/WiU9AWhTycydA
sY++aDoXk18quDR8bEWyvpOhKDeF4GPzkHmfaNGtJkqzGTdZIpz04q1lmpWecC1D
Vs/h7N7WT4iPnxGG3lzAUVBGwFF3JuUmaLS/hUkhZZwj/+fFD72fq+Ma2MvMrsfv
JxioF7ak2NI=
=QJaT
-----END PGP SIGNATURE-----