-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2817
      Low: Red Hat OpenShift Enterprise one-month end-of-life notice
                               29 July 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat OpenShift Enterprise
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux Server 8
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2019:1862

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: Red Hat OpenShift Enterprise one-month end-of-life notice
Advisory ID:       RHSA-2019:1862-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:1862
Issue date:        2019-07-26
=====================================================================

1. Summary:

This is the one-month notification for the end of the maintenance phase for
Red Hat OpenShift Enterprise 3.6 and 3.7. This notification applies only to
customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and 3.7.

2. Description:

As part of the maintenance phase, qualified security patches of Critical or
Important impact, as well as select mission-critical bug-fix patches, were
released for Red Hat OpenShift Enterprise 3.6 and 3.7.

After July 31st, 2019, customers will not receive those updates.

Red Hat OpenShift Container Platform Life Cycle Policy can be found under:

https://access.redhat.com/support/policy/updates/openshift

3. Solution:

For important instructions on how to install or upgrade to the latest
version of OpenShift Container Platform, see the following documentation:

https://access.redhat.com/products/red-hat-openshift-container-platform/

4. Bugs fixed (https://bugzilla.redhat.com/):

1727259 - Send 1 month notice EOL notice for OCP 3.6 and 3.7

5. References:

https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/articles/3532971

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=G9dr
- -----END PGP SIGNATURE-----

- --
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=/V/F
-----END PGP SIGNATURE-----