rhsa-2011_0001
Vulnerability from csaf_redhat
Published
2011-01-03 18:09
Modified
2024-11-05 17:25
Summary
Red Hat Security Advisory: RHN Satellite Server 4 - End Of Life
Notes
Topic
This is the End Of Life notification for RHN Satellite Server 4.
Details
On December 31st, 2010, per the life-cycle support policy, the version 4
series of Satellite and Proxy products exited Production Phase 2 marking
the end of their support by Red Hat. Please reference the support policy
here:
https://access.redhat.com/support/policy/updates/satellite/
Though we are committed to the December 31st date for beginning the
process of decommissioning Satellite and Proxy 4.x support, we recognize
that our customers have woven these products very deeply into their
processes and may need some time to migrate.
For migration purposes, please note the following dates:
- December 31st, 2010 - Satellite and Proxy 4.x ceased to be supported.
Official support ended. Only Severity 1 issues and migration assistance
will be addressed. Satellite and Proxy will continue to operate, but all
customers are encouraged to migrate in a timely manner.
- April 30th, 2011 - Satellite and Proxy 4.x active status will be
terminated. Satellite and Proxy version 4.x will enter an inactive
state. Satellite and Proxy communication to RHN Hosted will cease to
function (for example, the satellite-sync command will no longer work).
The Satellite Upgrade process starting point is outlined here:
http://docs.redhat.com/docs/en-US/Red_Hat_Network_Satellite/5.4/html/Installation_Guide/s1-upgrades.html
How to proceed:
- All Satellite and Proxy 4.x users must plan to migrate to a newer version
prior to April 30th, 2011.
- If you have a Technical Account Manager, contact that person immediately
to discuss migration plans.
- Otherwise, contact support for assistance:
https://www.redhat.com/apps/support/
- Alternatively, Red Hat Consulting can be engaged to assist with a smooth
migration: http://www.redhat.com/consulting/
More information on Red Hat Consulting for Satellite can be found here:
http://www.redhat.com/f/pdf/consulting/RHNSatelliteImplementation-Brochure.pdf
It is critical to ensure you have a plan to migrate off of Satellite and
Proxy 4.x prior to April 30th, 2011.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_informational_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "This is the End Of Life notification for RHN Satellite Server 4.",
"title": "Topic"
},
{
"category": "general",
"text": "On December 31st, 2010, per the life-cycle support policy, the version 4\nseries of Satellite and Proxy products exited Production Phase 2 marking\nthe end of their support by Red Hat. Please reference the support policy\nhere:\n\nhttps://access.redhat.com/support/policy/updates/satellite/\n\nThough we are committed to the December 31st date for beginning the\nprocess of decommissioning Satellite and Proxy 4.x support, we recognize\nthat our customers have woven these products very deeply into their\nprocesses and may need some time to migrate.\n\nFor migration purposes, please note the following dates:\n- December 31st, 2010 - Satellite and Proxy 4.x ceased to be supported.\n Official support ended. Only Severity 1 issues and migration assistance\n will be addressed. Satellite and Proxy will continue to operate, but all\n customers are encouraged to migrate in a timely manner.\n- April 30th, 2011 - Satellite and Proxy 4.x active status will be\n terminated. Satellite and Proxy version 4.x will enter an inactive\n state. Satellite and Proxy communication to RHN Hosted will cease to\n function (for example, the satellite-sync command will no longer work).\n\nThe Satellite Upgrade process starting point is outlined here:\n\nhttp://docs.redhat.com/docs/en-US/Red_Hat_Network_Satellite/5.4/html/Installation_Guide/s1-upgrades.html\n\nHow to proceed:\n- All Satellite and Proxy 4.x users must plan to migrate to a newer version\n prior to April 30th, 2011.\n- If you have a Technical Account Manager, contact that person immediately\n to discuss migration plans.\n- Otherwise, contact support for assistance:\n https://www.redhat.com/apps/support/\n- Alternatively, Red Hat Consulting can be engaged to assist with a smooth\n migration: http://www.redhat.com/consulting/\n More information on Red Hat Consulting for Satellite can be found here:\n http://www.redhat.com/f/pdf/consulting/RHNSatelliteImplementation-Brochure.pdf\n\nIt is critical to ensure you have a plan to migrate off of Satellite and\nProxy 4.x prior to April 30th, 2011.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0001",
"url": "https://access.redhat.com/errata/RHSA-2011:0001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://access.redhat.com/support/policy/updates/satellite/",
"url": "https://access.redhat.com/support/policy/updates/satellite/"
},
{
"category": "external",
"summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Network_Satellite/5.4/html/Installation_Guide/s1-upgrades.html",
"url": "http://docs.redhat.com/docs/en-US/Red_Hat_Network_Satellite/5.4/html/Installation_Guide/s1-upgrades.html"
},
{
"category": "external",
"summary": "https://www.redhat.com/apps/support/",
"url": "https://www.redhat.com/apps/support/"
},
{
"category": "external",
"summary": "http://www.redhat.com/consulting/",
"url": "http://www.redhat.com/consulting/"
},
{
"category": "external",
"summary": "http://www.redhat.com/f/pdf/consulting/RHNSatelliteImplementation-Brochure.pdf",
"url": "http://www.redhat.com/f/pdf/consulting/RHNSatelliteImplementation-Brochure.pdf"
},
{
"category": "external",
"summary": "654659",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654659"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0001.json"
}
],
"title": "Red Hat Security Advisory: RHN Satellite Server 4 - End Of Life",
"tracking": {
"current_release_date": "2024-11-05T17:25:32+00:00",
"generator": {
"date": "2024-11-05T17:25:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.1.1"
}
},
"id": "RHSA-2011:0001",
"initial_release_date": "2011-01-03T18:09:00+00:00",
"revision_history": [
{
"date": "2011-01-03T18:09:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-01-03T13:13:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-05T17:25:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)",
"product": {
"name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)",
"product_id": "3AS-RHNSAT4.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:4.2::el3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)",
"product": {
"name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT4.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:4.2::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "rhn-satellite-config-0:4.2.3-2.noarch",
"product": {
"name": "rhn-satellite-config-0:4.2.3-2.noarch",
"product_id": "rhn-satellite-config-0:4.2.3-2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhn-satellite-config@4.2.3-2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhn-satellite-config-0:4.2.3-3.noarch",
"product": {
"name": "rhn-satellite-config-0:4.2.3-3.noarch",
"product_id": "rhn-satellite-config-0:4.2.3-3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhn-satellite-config@4.2.3-3?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhn-satellite-config-0:4.2.3-2.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)",
"product_id": "3AS-RHNSAT4.2:rhn-satellite-config-0:4.2.3-2.noarch"
},
"product_reference": "rhn-satellite-config-0:4.2.3-2.noarch",
"relates_to_product_reference": "3AS-RHNSAT4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhn-satellite-config-0:4.2.3-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT4.2:rhn-satellite-config-0:4.2.3-3.noarch"
},
"product_reference": "rhn-satellite-config-0:4.2.3-3.noarch",
"relates_to_product_reference": "4AS-RHNSAT4.2"
}
]
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…