Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2014:1588 - Bug Fix Advisory
Issued:
2014-10-13
Updated:
2014-10-13

RHBA-2014:1588 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

openswan bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated openswan packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 6.

Description

Openswan is a free implementation of Internet Protocol Security (IPsec) and
Internet Key Exchange (IKE). IPsec uses strong cryptography to provide both
authentication and encryption services that allow to build secure tunnels
through untrusted networks.

This update fixes the following bugs:

  • When using the protoport option in combination with the type=passthrough

setting to exclude traffic from encryption, an incorrect inverse policy was
installed and the exclusion was not successful. Now, the correct policy is
installed in the described situation. (BZ#739949)

  • Starting multiple connections with the leftsubnets= or auto=start options led

to a crypto overload and subsequent restart of Openswan. The pluto cryptohelper
has been fixed to prevent the overload. (BZ#834397)

  • The ikev2=insist setting was not enforced on the responder side, allowing an

IKEv1 connection to be established instead. This bug has been fixed and
ikev2=insist is no longer ignored. (BZ#970279)

  • This update fixes multiple lingering states after reestablishing IKEv2 keys.

(BZ#970349)

  • This update enforces the limits set with esp, phase1alg, and andphase2alg

options. Previously, any algorithm of the default set (aes, 3des, sha1, md5) was
always allowed, regardless of the above options. (BZ#988106)

  • IKEv2 delete payloads were not always properly delivered to the remote

peer, leaving the remote endpoint with lingering unused connections. Now, IKEv2
delete payloads are delivered as expected. (BZ#993124)

  • This update modifies the rightid=%fromcert option to load IDs from the local

certificate when set for the local end, and from the certificate delivered by
the remote peer when set for the peer end. (BZ#1002708)

  • The "ipsec ikeping" command did not recognize the --exchangenum option. This

option is now recognized correctly. (BZ#1019746)

  • This update fixes a crash of the IKE pluto daemon when using the SHA2

encryption family with the ike= option with IKEv2. (BZ#1021961)

  • Openswan no longer drops various privileges too soon, which prevented it from

reading configuration files in directories not owned by root. (BZ#1041576)

  • The IKE pluto daemon occasionally crashed and restarted when referencing

missing IKEv2 payloads. The Openswan's state machine has been updated to reject
packets with missing payloads. (BZ#1050340)

  • This update fixes the compatibility problems with older versions of Cisco VPN

introduced in the previous update of the openswan packages. (BZ#1070356)

  • After restarting the remote endpoint, the sourceip option was not properly

reset in the local route entry. This bug has been fixed. (BZ#1088656)

  • If there was no NSS database available, the IKE pluto daemon

created a nonfunctional replacement. A missing NSS database is now created
before the pluto daemon starts and in the %post phase of the package install,
which fixes this bug. (BZ#1092913)

  • The "ipsec newhostkey" command did not return a correct non-zero exit code in

case of failure, for example when generating keys of insufficient strength. Now,
ipsec newhostkey returns the correct exit code. (BZ#1098473)

  • Configuring an AH algorithm for IKEv2, or various non-standard ESP algorithms

for IKEv1 or IKEv2 (such as CAST, RIPEMD160 or CAMELLIA) caused the IKE pluto
daemon to terminate unexpectedly and restart. This bug has been fixed and pluto
no longer crashes when AH or ESP algorithms are configured. (BZ#1114683)

  • Using the "force_busy=yes" developer option to force anti-DDOS mode in IKEv2

caused the IKE pluto daemon to crash and restart. This bug has been fixed and
pluto no longer crashes in the described situation.
(BZ#1126066)

In addition, this update adds the following enhancements:

  • This update enhances and clarifies man pages shipped with the openswan

packages. (BZ#730975, BZ#1018327, BZ#1099871, BZ#1105179)

Users of openswan are advised to upgrade to these updated packages, which fix
these bugs and add these enhancements.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 730975 - Openswan doesn't work with ike=modp1536 option
  • BZ - 739949 - Openswan net-to-net not work with unencrypted connection on specific port, when all other connections are encrypt.
  • BZ - 834397 - ikev2 crashes when firing up a few conns at once
  • BZ - 1018327 - ipsec.conf man page lacks example for AES-GCM configuration
  • BZ - 1019746 - ipsec ikeping does not recognize --exchangenum parameter
  • BZ - 1021961 - pluto abort when using SHA2_{384,512} IKE encryption algorithm
  • BZ - 1041576 - Due to lack of CAP_DAC_OVERRIDE, pluto cannot write to directories not owned by root
  • BZ - 1070356 - openswan breaks NAT-T draft clients (and possibly ike fragmentation)
  • BZ - 1092913 - The default nss database created by ipsec can not be used
  • BZ - 1098473 - ipsec newhostkey returns 0 even if it fails and allows new RSA keys < 2048
  • BZ - 1099871 - Missing man-page ipsec_whack
  • BZ - 1105179 - ipsec_auto --ready doesn't work properly
  • BZ - 1114683 - configuring a non-standard AH / ESP algorithm (like CAST) cause a restart of pluto
  • BZ - 1126066 - dcookie code enabled with force_busy=yes uses bad pointer causing restart

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
openswan-2.6.32-37.el6.src.rpm SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb
x86_64
openswan-2.6.32-37.el6.x86_64.rpm SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d
openswan-2.6.32-37.el6.x86_64.rpm SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-doc-2.6.32-37.el6.x86_64.rpm SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1
openswan-doc-2.6.32-37.el6.x86_64.rpm SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1
i386
openswan-2.6.32-37.el6.i686.rpm SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-doc-2.6.32-37.el6.i686.rpm SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
openswan-2.6.32-37.el6.src.rpm SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb
x86_64
openswan-2.6.32-37.el6.x86_64.rpm SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-doc-2.6.32-37.el6.x86_64.rpm SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1
i386
openswan-2.6.32-37.el6.i686.rpm SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-doc-2.6.32-37.el6.i686.rpm SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9

Red Hat Enterprise Linux Workstation 6

SRPM
openswan-2.6.32-37.el6.src.rpm SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb
x86_64
openswan-2.6.32-37.el6.x86_64.rpm SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-doc-2.6.32-37.el6.x86_64.rpm SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1
i386
openswan-2.6.32-37.el6.i686.rpm SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-doc-2.6.32-37.el6.i686.rpm SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9

Red Hat Enterprise Linux Desktop 6

SRPM
openswan-2.6.32-37.el6.src.rpm SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb
x86_64
openswan-2.6.32-37.el6.x86_64.rpm SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-doc-2.6.32-37.el6.x86_64.rpm SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1
i386
openswan-2.6.32-37.el6.i686.rpm SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-doc-2.6.32-37.el6.i686.rpm SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
openswan-2.6.32-37.el6.src.rpm SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb
s390x
openswan-2.6.32-37.el6.s390x.rpm SHA-256: 498bbf4886d3816b830a86b001a7d73e9e62cec5820349f79480affd87080631
openswan-debuginfo-2.6.32-37.el6.s390x.rpm SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266
openswan-debuginfo-2.6.32-37.el6.s390x.rpm SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266
openswan-doc-2.6.32-37.el6.s390x.rpm SHA-256: 79b3da9fb554c6403e76915c7fb83264b88647d07a434f07010c5e8d4076a0a5

Red Hat Enterprise Linux for Power, big endian 6

SRPM
openswan-2.6.32-37.el6.src.rpm SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb
ppc64
openswan-2.6.32-37.el6.ppc64.rpm SHA-256: 711e9c7044441a785145b024ac025c286bdb05b81281e326ce34e97235b003ae
openswan-debuginfo-2.6.32-37.el6.ppc64.rpm SHA-256: 296d784f8faddce5693d12c2b9c1212e2f0ac3b8a506e40543c23ab01b4e49df
openswan-debuginfo-2.6.32-37.el6.ppc64.rpm SHA-256: 296d784f8faddce5693d12c2b9c1212e2f0ac3b8a506e40543c23ab01b4e49df
openswan-doc-2.6.32-37.el6.ppc64.rpm SHA-256: c0fd038b5d21ae01eed69669fdfc615bd87099af38f0a9a3af411b6033f60843

Red Hat Enterprise Linux Server from RHUI 6

SRPM
openswan-2.6.32-37.el6.src.rpm SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb
x86_64
openswan-2.6.32-37.el6.x86_64.rpm SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-doc-2.6.32-37.el6.x86_64.rpm SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1
i386
openswan-2.6.32-37.el6.i686.rpm SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-doc-2.6.32-37.el6.i686.rpm SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
openswan-2.6.32-37.el6.src.rpm SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb
s390x
openswan-2.6.32-37.el6.s390x.rpm SHA-256: 498bbf4886d3816b830a86b001a7d73e9e62cec5820349f79480affd87080631
openswan-debuginfo-2.6.32-37.el6.s390x.rpm SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266
openswan-debuginfo-2.6.32-37.el6.s390x.rpm SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266
openswan-doc-2.6.32-37.el6.s390x.rpm SHA-256: 79b3da9fb554c6403e76915c7fb83264b88647d07a434f07010c5e8d4076a0a5

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
openswan-2.6.32-37.el6.src.rpm SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb
x86_64
openswan-2.6.32-37.el6.x86_64.rpm SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368
openswan-doc-2.6.32-37.el6.x86_64.rpm SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1
i386
openswan-2.6.32-37.el6.i686.rpm SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-debuginfo-2.6.32-37.el6.i686.rpm SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa
openswan-doc-2.6.32-37.el6.i686.rpm SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
openswan-2.6.32-37.el6.src.rpm SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb
s390x
openswan-2.6.32-37.el6.s390x.rpm SHA-256: 498bbf4886d3816b830a86b001a7d73e9e62cec5820349f79480affd87080631
openswan-debuginfo-2.6.32-37.el6.s390x.rpm SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266
openswan-debuginfo-2.6.32-37.el6.s390x.rpm SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266
openswan-doc-2.6.32-37.el6.s390x.rpm SHA-256: 79b3da9fb554c6403e76915c7fb83264b88647d07a434f07010c5e8d4076a0a5

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility