rhsa-2014_0131
Vulnerability from csaf_redhat
Published
2014-02-04 19:24
Modified
2024-11-05 18:19
Summary
Red Hat Security Advisory: Red Hat Enterprise Linux 3 Extended Life Cycle Support Retirement Notice

Notes

Topic
This is the final notification for the retirement of Red Hat Enterprise Linux 3 Extended Life Cycle Support (ELS). This notice applies only to those customers subscribed in the Customer Portal to the Extended Life Cycle Support (ELS) channel for Red Hat Enterprise Linux 3.
Details
In accordance with the Red Hat Enterprise Linux Errata Support Policy, Extended Life Cycle Support (ELS) for Red Hat Enterprise Linux 3 was retired on January 30, 2014, and support is no longer provided. Accordingly, Red Hat will no longer provide updated packages, including critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 3 ELS after January 30, 2014. In addition, technical support through Red Hat's Global Support Services will no longer be provided after this date. In order to provide customers with a final opportunity to migrate their systems to a supported version of Red Hat Enterprise Linux, the retirement process for Red Hat Enterprise Linux 3 ELS will complete on March 31, 2014. On that date, the Red Hat Enterprise Linux 3 ELS channels will be moved to the "Retired" channels area (under the "Retired" tab) on the Customer Portal, and customers will be unsubscribed from the Red Hat Enterprise Linux 3 Extended Life Cycle Support channels. For Red Hat Enterprise Linux 3 only, customers may continue to run Red Hat Enterprise Linux 3 ELS on their systems without consuming a subscription. However, customers wishing to access Red Hat Enterprise Linux 3 ELS content (now under the "Retired" tab) on the Customer Portal will need an active RHEL Server subscription. Also, customers who choose to resubscribe a system to the retired Red Hat Enterprise Linux 3 ELS channels will consume a RHEL Server subscription. Note again that the contents of Retired channels are frozen, and no further security patches or bug fixes are provided. We encourage customers to plan their migration from Red Hat Enterprise Linux 3 to a more recent version of Red Hat Enterprise Linux. As a benefit of the Red Hat subscription model, customers can use active subscriptions to entitle any system on a currently supported Red Hat Enterprise Linux release. Details of the Red Hat Enterprise Linux life cycle can be found here: https://access.redhat.com/site/support/policy/updates/errata/ Additional information can also be found at: https://access.redhat.com/site/solutions/690063
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_informational_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "This is the final notification for the retirement of Red Hat Enterprise\nLinux 3 Extended Life Cycle Support (ELS). This notice applies only to\nthose customers subscribed in the Customer Portal to the Extended Life\nCycle Support (ELS) channel for Red Hat Enterprise Linux 3.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "In accordance with the Red Hat Enterprise Linux Errata Support Policy,\nExtended Life Cycle Support (ELS) for Red Hat Enterprise Linux 3 was\nretired on January 30, 2014, and support is no longer provided.\nAccordingly, Red Hat will no longer provide updated packages, including\ncritical impact security patches or urgent priority bug fixes, for Red Hat\nEnterprise Linux 3 ELS after January 30, 2014. In addition, technical\nsupport through Red Hat\u0027s Global Support Services will no longer be\nprovided after this date.\n\nIn order to provide customers with a final opportunity to migrate their\nsystems to a supported version of Red Hat Enterprise Linux, the retirement\nprocess for Red Hat Enterprise Linux 3 ELS will complete on March 31, 2014.\nOn that date, the Red Hat Enterprise Linux 3 ELS channels will be moved to\nthe \"Retired\" channels area (under the \"Retired\" tab) on the Customer\nPortal, and customers will be unsubscribed from the Red Hat Enterprise\nLinux 3 Extended Life Cycle Support channels.\n\nFor Red Hat Enterprise Linux 3 only, customers may continue to run Red Hat\nEnterprise Linux 3 ELS on their systems without consuming a subscription.\nHowever, customers wishing to access Red Hat Enterprise Linux 3 ELS\ncontent (now under the \"Retired\" tab) on the Customer Portal will need an\nactive RHEL Server subscription. Also, customers who choose to resubscribe\na system to the retired Red Hat Enterprise Linux 3 ELS channels will\nconsume a RHEL Server subscription. Note again that the contents of\nRetired channels are frozen, and no further security patches or bug fixes\nare provided.\n\nWe encourage customers to plan their migration from Red Hat Enterprise\nLinux 3 to a more recent version of Red Hat Enterprise Linux. As a benefit\nof the Red Hat subscription model, customers can use active subscriptions\nto entitle any system on a currently supported Red Hat Enterprise Linux\nrelease.\n\nDetails of the Red Hat Enterprise Linux life cycle can be found here:\nhttps://access.redhat.com/site/support/policy/updates/errata/\n\nAdditional information can also be found at:\nhttps://access.redhat.com/site/solutions/690063",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2014:0131",
        "url": "https://access.redhat.com/errata/RHSA-2014:0131"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/site/support/policy/updates/errata/",
        "url": "https://access.redhat.com/site/support/policy/updates/errata/"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/site/solutions/690063",
        "url": "https://access.redhat.com/site/solutions/690063"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0131.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Enterprise Linux 3 Extended Life Cycle Support Retirement Notice",
    "tracking": {
      "current_release_date": "2024-11-05T18:19:02+00:00",
      "generator": {
        "date": "2024-11-05T18:19:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2014:0131",
      "initial_release_date": "2014-02-04T19:24:11+00:00",
      "revision_history": [
        {
          "date": "2014-02-04T19:24:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2014-02-04T19:24:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-05T18:19:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
                  "product_id": "3AS-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:3::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
                  "product_id": "3ES-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:3::es"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-0:3AS-13.9.20.i386",
                "product": {
                  "name": "redhat-release-0:3AS-13.9.20.i386",
                  "product_id": "redhat-release-0:3AS-13.9.20.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release@3AS-13.9.20?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-debuginfo-0:3AS-13.9.20.i386",
                "product": {
                  "name": "redhat-release-debuginfo-0:3AS-13.9.20.i386",
                  "product_id": "redhat-release-debuginfo-0:3AS-13.9.20.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-debuginfo@3AS-13.9.20?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-debuginfo-0:3ES-13.9.20.i386",
                "product": {
                  "name": "redhat-release-debuginfo-0:3ES-13.9.20.i386",
                  "product_id": "redhat-release-debuginfo-0:3ES-13.9.20.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-debuginfo@3ES-13.9.20?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-0:3ES-13.9.20.i386",
                "product": {
                  "name": "redhat-release-0:3ES-13.9.20.i386",
                  "product_id": "redhat-release-0:3ES-13.9.20.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release@3ES-13.9.20?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-0:3AS-13.9.20.src",
                "product": {
                  "name": "redhat-release-0:3AS-13.9.20.src",
                  "product_id": "redhat-release-0:3AS-13.9.20.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release@3AS-13.9.20?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-release-0:3ES-13.9.20.src",
                "product": {
                  "name": "redhat-release-0:3ES-13.9.20.src",
                  "product_id": "redhat-release-0:3ES-13.9.20.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release@3ES-13.9.20?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-0:3AS-13.9.20.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:redhat-release-0:3AS-13.9.20.i386"
        },
        "product_reference": "redhat-release-0:3AS-13.9.20.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-0:3AS-13.9.20.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:redhat-release-0:3AS-13.9.20.src"
        },
        "product_reference": "redhat-release-0:3AS-13.9.20.src",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-debuginfo-0:3AS-13.9.20.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
          "product_id": "3AS-ELS:redhat-release-debuginfo-0:3AS-13.9.20.i386"
        },
        "product_reference": "redhat-release-debuginfo-0:3AS-13.9.20.i386",
        "relates_to_product_reference": "3AS-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-0:3ES-13.9.20.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:redhat-release-0:3ES-13.9.20.i386"
        },
        "product_reference": "redhat-release-0:3ES-13.9.20.i386",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-0:3ES-13.9.20.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:redhat-release-0:3ES-13.9.20.src"
        },
        "product_reference": "redhat-release-0:3ES-13.9.20.src",
        "relates_to_product_reference": "3ES-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-debuginfo-0:3ES-13.9.20.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
          "product_id": "3ES-ELS:redhat-release-debuginfo-0:3ES-13.9.20.i386"
        },
        "product_reference": "redhat-release-debuginfo-0:3ES-13.9.20.i386",
        "relates_to_product_reference": "3ES-ELS"
      }
    ]
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…