-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.0240
Low: Red Hat Enterprise Linux 4 - Transition to Extended Life Phase Notice
                               2 March 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Enterprise Linux 4
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux AS/ES/WS 4
                   Red Hat Enterprise Linux Desktop 4
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Alternate Program

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2012-0349.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: Red Hat Enterprise Linux 4 - Transition to Extended Life Phase Notice
Advisory ID:       RHSA-2012:0349-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-0349.html
Issue date:        2012-03-01
=====================================================================

1. Summary:

Red Hat Enterprise Linux 4 reaches end of Production Phase and transitions
to Extended Life Phase.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Description:

On March 01, 2012, all Red Hat Enterprise Linux 4-based products listed
below transition from the Production Phase to the Extended Life Phase:

Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux ES 4
Red Hat Enterprise Linux WS 4
Red Hat Desktop 4
Red Hat Global File System 4
Red Hat Cluster Suite 4

Red Hat offers support and services for each major release of Red Hat
Enterprise Linux throughout four phases: Production 1, 2, and 3, and
Extended Life Phase. For Red Hat Enterprise Linux 4, the Production Phase
spans seven years, followed by a three-year Extended Life Phase. Together,
these four phases constitute the "life cycle". The specific support and
services provided during each phase is described in detail at:
http://redhat.com/rhel/lifecycle

On March 01, 2012, Red Hat Enterprise Linux 4 systems continue to be
subscribed to Red Hat Enterprise Linux 4 channels on Red Hat Network
(RHN), continue to require a Red Hat Enterprise Linux entitlement, and
continue to have access to:

* Limited technical support for existing Red Hat Enterprise Linux 4
  deployments (for customers with Basic, Premium, or Standard support).

* Previously released bug fixes (RHBAs), security errata (RHSAs), and
  product enhancements (RHEAs) via RHN. Software maintenance (new bug fix
  and security errata) are no longer provided for the Red Hat Enterprise
  Linux 4 product family.

* Red Hat Knowledgebase and other content (white papers, reference
  architectures, etc.) found in the Red Hat Customer Portal.

* Red Hat Enterprise Linux 4 documentation.

Please also note that new bug fix, security, or product enhancements
advisories (RHBAs, RHSAs, and RHEAs) are no longer provided for the Red
Hat Enterprise Linux 4 Add-Ons after March 01.

After March 01, you have several options. Your Red Hat subscription gives
you continuous access to all active versions of the Red Hat software in
both binary and source form, including all security updates and bug fixes.
As Red Hat Enterprise Linux 4 transitions out of the Production Phase, we
strongly recommend that you take full advantage of your subscription
services and upgrade to Red Hat Enterprise Linux 5 or 6, which contain
compelling new features and enablement for modern hardware platforms and
ISV applications.

If you must remain on Red Hat Enterprise Linux 4, we recommend that you
add the Red Hat Enterprise Linux Extended Life Cycle Support (ELS) Add-On
subscription to your current Red Hat Enterprise Linux subscription. The
ELS Add-On complements your Red Hat Enterprise Linux subscription and
provides software maintenance services not otherwise available in the
Extended Life Phase. Customers who purchase the ELS Add-On continue to
receive software maintenance (critical impact security and urgent priority
bug fixes) and technical support as provided in the Production 3 Phase.
ELS is available for up to three years and requires that you have an
existing Red Hat Enterprise Linux subscription with equivalent
subscription terms and support level.

For more information on the Red Hat Enterprise Linux ELS Add-On, visit:
http://www.redhat.com/products/enterprise-linux-add-ons/extended-lifecycle-support/

4. Solution:

This advisory contains an updated redhat-release package, that provides a
copy of this end of life notice in the "/usr/share/doc/" directory.

5. Bugs fixed (http://bugzilla.redhat.com/):

786375 - Send Out RHEL 4 Transition to Extended Life Phase Notice

6. Package List:

Red Hat Enterprise Linux AS version 4:

Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/redhat-release-4AS-10.10.src.rpm

i386:
redhat-release-4AS-10.10.i386.rpm

ia64:
redhat-release-4AS-10.10.ia64.rpm

ppc:
redhat-release-4AS-10.10.ppc.rpm

s390:
redhat-release-4AS-10.10.s390.rpm

s390x:
redhat-release-4AS-10.10.s390x.rpm

x86_64:
redhat-release-4AS-10.10.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/redhat-release-4Desktop-10.10.src.rpm

i386:
redhat-release-4Desktop-10.10.i386.rpm

x86_64:
redhat-release-4Desktop-10.10.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/redhat-release-4ES-10.10.src.rpm

i386:
redhat-release-4ES-10.10.i386.rpm

ia64:
redhat-release-4ES-10.10.ia64.rpm

x86_64:
redhat-release-4ES-10.10.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/redhat-release-4WS-10.10.src.rpm

i386:
redhat-release-4WS-10.10.i386.rpm

ia64:
redhat-release-4WS-10.10.ia64.rpm

x86_64:
redhat-release-4WS-10.10.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://access.redhat.com/security/updates/classification/#low
http://www.redhat.com/products/enterprise-linux-add-ons/extended-lifecycle-support/
http://redhat.com/rhel/lifecycle

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFPT5ScXlSAg2UNWIIRAkagAKDCtqoZIIXEohr4SM2Bj9+hqjUzrACfWUE4
XDaLoNJcxGb2rD48E+aBJr8=
=5k7N
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=GTcm
-----END PGP SIGNATURE-----