Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2010:0845 - Bug Fix Advisory
Issued:
2010-11-10
Updated:
2010-11-10

RHBA-2010:0845 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

selinux-policy bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated selinux-policy packages that fix various bugs are now available.

Description

The selinux-policy packages contain the rules that govern how confined processes
run on the system.

These updated selinux-policy packages fix the following bugs:

  • Due to incorrect SELinux policy, attempting to use the guest operating system

customization in vCenter failed. With this update, the relevant policy code has
been added, and SELinux no longer prevents users from customizing guest
operating systems. (BZ#637081)

  • When SELinux was enabled, suspending VMware virtual machines was either slowed

down, or failed. With this update, the relevant policy has been corrected, and
VMware virtual machines are now suspended as expected. (BZ#637082)

  • When the cluster was configured to use fence_scsi, running the cman startup

script or using the "fence_node -U <nodename>" command failed. These updated
selinux-policy packages contain updated SELinux rules and add the security file
context for the /var/lib/cluster directory, which allows the cluster with
fence_scsi enabled to work properly. (BZ#636489)

  • Previously, the "allow_corosync_rw_tmpfs" boolean allowed third party

applications to create, write and read generic tmpfs files. To prevent this, the
boolean has been removed, and unless the unconfined policy is disabled, generic
tmpfs files can now be managed using Corosync. (BZ#636488)

  • Due to SELinux policies, certmonger was not permitted to search through

directories that contain certificates. This error has been fixed, and
selinux-policy packages now contain updated SELinux rules, which allow
certmonger to access these directories. (BZ#642607)

  • When SELinux was enabled, users were unable to mount GFS2 file systems listed

in /etc/fstab. With this update, SELinux rules have been added to allow the
mount process to communicate with gfs_controld, so that such file systems can
now be mount as expected. (BZ#642609)

  • Due to incorrect SELinux policy, smbcontrol, a utility that sends messages to

the smbd, nmbd, or winbindd service, did not work properly. This error has been
fixed, the relevant policy code has been added, and SELinux no longer prevents
smbcontrol from working. (BZ#644807)

  • With SELinux running in the enforcing mode, resuming the system from the

Suspend mode failed, because the /etc/resolv.conf file did not have the correct
security context. This was caused by NetworkManager, which was running under
wrong SELinux domain, "devicekit_power_t". With this update, the proper SELinux
domain transition from DeviceKit-power to NetworkManager has been added, and
resuming from the Suspend mode now works as expected. (BZ#644808)

  • Prior to this update, running the passwd command in the single user mode (that

is, runlevel 1) failed when SELinux was enabled. To address this issue, the
SELinux rules have been updated, so that passwd can now access the console, as
well as all terminals (TTYs) and pseudo terminals (PTYs). (BZ#644820)

  • Due to SELinux policy rules, certain iptables commands such as "iptables-save"

or "iptables -L" were unable to write to files with output redirection. With
this update, the SELinux domain transition from "unconfined_t" to the
"iptables_t" domain has been removed, and such commands now work as expected.
(BZ#645658)

All users of selinux-policy are advised to upgrade to these updated packages,
which resolve these issues.

Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 636488 - remove boolean for corosync to remove potential for selinux avcs with enforcing mode
  • BZ - 636489 - fence_scsi fails to unfence with selinux AVC denials
  • BZ - 637081 - Guest OS customization cannot work with the current SELinux policy setting
  • BZ - 637082 - Suspending VMware virtual machines is slow or fails when selinux is enabled.
  • BZ - 642607 - SELinux is preventing /usr/sbin/certmonger "search" access on /etc/httpd.
  • BZ - 642609 - unable to mount gfs2 filesystems that exist in fstab with selinux on
  • BZ - 644807 - smbcontrol doesn't work because selinux denies it access to pid files
  • BZ - 644808 - NetworkManager writing out resolv.conf with wrong context
  • BZ - 644820 - SELinux prevents passwd from working in runlevel 1
  • BZ - 645658 - avc: denied { write } for comm="iptables-save" path="/etc/sysconfig/iptables"

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
selinux-policy-3.7.19-54.el6_0.3.src.rpm SHA-256: b49ed61330095df2ebdf5ec48ff3e491a164d68bc54689b92298cacd94ee7508
x86_64
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964
i386
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964

Red Hat Enterprise Linux Workstation 6

SRPM
selinux-policy-3.7.19-54.el6_0.3.src.rpm SHA-256: b49ed61330095df2ebdf5ec48ff3e491a164d68bc54689b92298cacd94ee7508
x86_64
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964
i386
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964

Red Hat Enterprise Linux Desktop 6

SRPM
selinux-policy-3.7.19-54.el6_0.3.src.rpm SHA-256: b49ed61330095df2ebdf5ec48ff3e491a164d68bc54689b92298cacd94ee7508
i386
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964
x86_64
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
selinux-policy-3.7.19-54.el6_0.3.src.rpm SHA-256: b49ed61330095df2ebdf5ec48ff3e491a164d68bc54689b92298cacd94ee7508
s390x
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964

Red Hat Enterprise Linux for Power, big endian 6

SRPM
selinux-policy-3.7.19-54.el6_0.3.src.rpm SHA-256: b49ed61330095df2ebdf5ec48ff3e491a164d68bc54689b92298cacd94ee7508
ppc64
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
selinux-policy-3.7.19-54.el6_0.3.src.rpm SHA-256: b49ed61330095df2ebdf5ec48ff3e491a164d68bc54689b92298cacd94ee7508
x86_64
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964

Red Hat Enterprise Linux Server from RHUI 6

SRPM
selinux-policy-3.7.19-54.el6_0.3.src.rpm SHA-256: b49ed61330095df2ebdf5ec48ff3e491a164d68bc54689b92298cacd94ee7508
x86_64
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964
i386
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
selinux-policy-3.7.19-54.el6_0.3.src.rpm SHA-256: b49ed61330095df2ebdf5ec48ff3e491a164d68bc54689b92298cacd94ee7508
x86_64
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964
i386
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
selinux-policy-3.7.19-54.el6_0.3.src.rpm SHA-256: b49ed61330095df2ebdf5ec48ff3e491a164d68bc54689b92298cacd94ee7508
s390x
selinux-policy-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 9b948da3af52dcd9b91a0c3102efad12c9de14da0da6d9eb3637ec35488d5766
selinux-policy-doc-3.7.19-54.el6_0.3.noarch.rpm SHA-256: bf6f20bbe4755438708d288f9eef9105b58167e7b722a421c204f90287a6f4b0
selinux-policy-minimum-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 181311bd8858a154cdc0272970379209eb77b220f86570b03e8929a19e38b74e
selinux-policy-mls-3.7.19-54.el6_0.3.noarch.rpm SHA-256: 0d2bc7686c82fb8ff89746e3dc7e3b36742d6cdfd60ceac6e46166cc1bd6b7ec
selinux-policy-targeted-3.7.19-54.el6_0.3.noarch.rpm SHA-256: b16863eb2b37d99a8770e5b5f7bdd6da100fbaca6c6b0bf63d6f58618a463964

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter