Rapid7 Vulnerability & Exploit Database

RHSA-2009:0297: Red Hat Enterprise Linux 2.1 - 3 Month End Of Life Notice

Back to Search

RHSA-2009:0297: Red Hat Enterprise Linux 2.1 - 3 Month End Of Life Notice

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/02/2009
Created
07/25/2018
Added
09/12/2009
Modified
07/12/2017

Description

This is the 3-month notification of the End Of Life plans for Red Hat Enterprise Linux 2.1.

In accordance with the Red Hat Enterprise Linux Errata Support Policy, the 7 years life-cycle of Red Hat Enterprise Linux 2.1 will end on May 31 2009. After that date, Red Hat will discontinue the technical support services, bugfix, enhancement and security errata updates for the following products: * Red Hat Enterprise Linux AS 2.1 * Red Hat Enterprise Linux ES 2.1 * Red Hat Enterprise Linux WS 2.1 * Red Hat Linux Advanced Server 2.1 * Red Hat Linux Advanced Workstation 2.1 Customers running production workloads on Enterprise Linux 2.1 should plan to migrate to a later version before May 31, 2009. One benefit of a Red Hat subscription is the right to upgrade to never versions of Enterprise Linux for no extra cost. As an Enterprise Linux subscriber, you have the option of migrating to the following supported versions: * version 3 (Generally Available: Oct 2003, End-Of-Life: Oct 2010) * version 4 (GA: Feb 2005, EOL: Feb 2012) * version 5 (GA: Mar 2007, EOL: Mar 2014) These supported versions of Enterprise Linux are available for download from Red Hat Network. For those customers who cannot migrate from Enterprise Linux 2.1 before its end-of-life date, Red Hat will offer limited extended support contracts. For more information, contact your Red Hat sales representative. Details of the Red Hat Enterprise Linux life-cycle can be found on the Red Hat website: http://www.redhat.com/security/updates/errata/

Solution(s)

  • redhat-upgrade-redhat-release-as
  • redhat-upgrade-redhat-release-aw
  • redhat-upgrade-redhat-release-es
  • redhat-upgrade-redhat-release-ws

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;