Low: Red Hat Enterprise Linux 5.6 Advanced Mission Critical (AMC) Retirement Notice
|Last updated on:||2017-04-03|
|Affected Products:||Red Hat Enterprise Linux Long Life (v. 5.6 server)|
This is the final notification for the retirement of Red Hat Enterprise Linux
5.6 Advanced Mission Critical (AMC). This notification applies only to those
customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat
Enterprise Linux 5.6.
In accordance with the Red Hat Enterprise Linux Errata Support Policy, Advanced
Mission Critical for Red Hat Enterprise Linux 5.6 was retired on March 31, 2017,
and active support is no longer provided. Accordingly, Red Hat will no longer
provide updated packages, including Critical Impact security patches or Urgent
Priority bug fixes, for Red Hat Enterprise Linux 5.6 AMC after March 31, 2017.
In addition, on-going technical support through Red Hat's Customer Experience
and Engagement will be limited as described under "non-current minor releases"
in the Knowledge Base article located here
https://access.redhat.com/articles/64664 after this date.
We encourage customers to migrate from Red Hat Enterprise Linux 5.6 to a more
recent version of Red Hat Enterprise Linux. As a benefit of the Red Hat
subscription model, customers can use their active subscriptions to entitle any
system on any currently supported Red Hat Enterprise Linux release.
Details of the Red Hat Enterprise Linux life cycle can be found here:
this retirement notice in the "/usr/share/doc/" directory.
|Red Hat Enterprise Linux Long Life (v. 5.6 server)|
|redhat-release-5Server-18.104.22.168.src.rpm|| MD5: a32daab35c797f9da9e7a0de285df2d5
|redhat-release-5Server-22.214.171.124.i386.rpm|| MD5: b1db2f6289f19a063cd8a06a24dcc047
|redhat-release-5Server-126.96.36.199.ia64.rpm|| MD5: d06f1fe78917b390021d840fbbc2518a
|redhat-release-5Server-188.8.131.52.x86_64.rpm|| MD5: 6e21022eb283fb876db819dd8e2ad174
|(The unlinked packages above are only available from the Red Hat Network)|
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: