-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0853
         Low: Red Hat SatelliteProxy 5 - day of End Of Life Notice
                               31 March 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat SatelliteProxy 5
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2017:0854

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: Red Hat SatelliteProxy 5 - day of End Of Life Notice
Advisory ID:       RHSA-2017:0854-01
Product:           Red Hat Satellite Proxy
Advisory URL:      https://access.redhat.com/errata/RHSA-2017:0854
Issue date:        2017-03-30
=====================================================================

1. Summary:

This is the day of notification of the End Of Life (EOL) plans for the
following versions of Red Hat Satellite Proxy 5:

* Red Hat Satellite Proxy 5.6 on Red Hat Enterprise Linux 5

2. Relevant releases/architectures:

Red Hat Satellite Proxy 5.6 (RHEL v.5) - noarch

3. Description:

After March 31, 2017, as per the life-cycle support policy for Red Hat
Satellite, Red Hat will discontinue technical support services as well as
software maintenance services for all Red Hat Satellite and Proxy versions
5.6 or older on Red Hat Enterprise Linux 5. The listed versions will exit
the existing Limited Maintenance Release phase. This means that new bug
fixes, security updates, and product enhancements will no longer be
provided for the following product versions:

* Red Hat Satellite 5.6 and Proxy 5.6 on Red Hat Enterprise Linux 5

Details of the Satellite support policy can be found at:

https://access.redhat.com/support/policy/updates/satellite/

Notes:

1) Red Hat will continue to support Red Hat Satellite and Proxy on Red Hat
Enterprise Linux 6 and later.

2) Red Hat Satellite 5.6 and Proxy 5.6 on Red Hat Enterprise Linux 5 will
be EOL on March 31 2017.

How to proceed:

* All affected Satellite and Proxy users must plan to upgrade to a newer
version prior to March 31 2017.

* Find an overview of various aspects for this upcoming EOL date at

https://access.redhat.com/articles/2868391

* If you have a Technical Account Manager, contact that person immediately
to discuss upgrade plans.

* Otherwise, contact Red Hat support for assistance at

https://www.redhat.com/en/services/support

* Alternatively, Red Hat Consulting can be engaged to assist with a smooth
migration, see https://www.redhat.com/en/services/consulting

More information on Red Hat Consulting for Satellite can be found in the
PDF document linked to in the References section.

It is critical to ensure you have a plan to migrate to Red Hat Enterprise
Linux 6 prior to March 31, 2017.

Customers who choose to continue to deploy on Red Hat Enterprise Linux 5
will continue to have access via Red Hat Network (RHN) to the following
content as part of their active Red Hat Satellite subscription:

* Previously released bug fixes, security updates, and product
enhancements.

* Red Hat Knowledgebase and other content (whitepapers, reference
architectures, etc.) found in the Red Hat Customer Portal.

* All Red Hat Satellite documentation.

Customers are strongly encouraged to take the advantage of the upgrade
benefits of their active Red Hat Satellite subscription, and migrate to
anactive version of Red Hat Satellite such as version 5.6 or 5.7.

Details of the Red Hat Satellite life-cycle can be found at:

https://access.redhat.com/support/policy/updates/satellite/

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1414221 - Satellite Proxy 5.6 on RHEL 5 day of EoL

6. Package List:

Red Hat Satellite Proxy 5.6 (RHEL v.5):

Source:
spacewalk-certs-tools-2.0.1-4.el5sat.src.rpm

noarch:
spacewalk-certs-tools-2.0.1-4.el5sat.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/updates/classification/#low
https://www.redhat.com/f/pdf/consulting/RHNSatelliteImplementation-Brochure.pdf

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFY3W6mXlSAg2UNWIIRAoNLAJ9p/JtPdFVCXSV6mKIw9+HPX3qGDACfbO1i
XGh5EK0SYPQAxWKfEzu+Dks=
=1gWf
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9s8O
-----END PGP SIGNATURE-----