Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0517 - Security Advisory
Issued:
2012-04-24
Updated:
2012-04-24

RHSA-2012:0517 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A flaw was found in the Linux kernel in the way splitting two extents in

ext4_ext_convert_to_initialized() worked. A local, unprivileged user with
the ability to mount and unmount ext4 file systems could use this flaw to
cause a denial of service. (CVE-2011-3638, Moderate)

Red Hat would like to thank Zheng Liu for reporting this issue.

This update also fixes the following bug:

  • Starting with Red Hat Enterprise Linux 5.6, all devices that used the

ixgbe driver would stop stripping VLAN tags when the device entered
promiscuous mode. Placing a device in a bridge group causes the device to
enter promiscuous mode. This caused various issues under certain
configurations of bridging and VLANs. A patch has been provided to address
this issue and the devices now properly strip VLAN tags in the driver
whether in promiscuous mode or not. (BZ#809790)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386

Fixes

  • BZ - 747942 - CVE-2011-3638 kernel: ext4: ext4_ext_insert_extent() kernel oops

CVEs

  • CVE-2011-3638

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.37.1.el5.src.rpm SHA-256: 4f6271bb274de9909e0ce85943076e0776b970cc60d1f288277384f44ec57b56
x86_64
kernel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 0caa7a0b755386b821055a4d18987915b5d51488b60613ec0b31e1d11b90c20a
kernel-debug-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: f5045ba9df589715a07764f6a0c3b6ba466450cf85bfb63d4e7da3096fc4f3a2
kernel-debug-devel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 558451ffcd6f71d38edb72b38fc2bee895127b9f3d3361ef42b00487ccadffd1
kernel-devel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 8698e7f6341fd3d4429b32a585ed7956965307cb244111333cd8281650d5c858
kernel-doc-2.6.18-238.37.1.el5.noarch.rpm SHA-256: 8bd50c0c6fb5ab5242c7ff5748e59c3d916f8b1c6433987d36563bd2c3a02439
kernel-headers-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 12aaa4a578cd7f64dac9acf457eb46e8d378322a1421a440abe32b33580b10f6
kernel-xen-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: a67dace19d44aa141f4ea24c217644e9ccbfc5b297b8a309a9e3b01f50365188
kernel-xen-devel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: d3432636e2b9c317e587a9c3472718ad814339db3a60f10475eb91fdcca43f3e
ia64
kernel-2.6.18-238.37.1.el5.ia64.rpm SHA-256: ce3708d333e40a373da83cfb5f2e1ebb6aad3e3d9642450f8c8715b43b507c53
kernel-debug-2.6.18-238.37.1.el5.ia64.rpm SHA-256: 2cac6279f74da00b4806c80c13a99d5cd2a53cb4b8fbca623bb0be942156eb3c
kernel-debug-devel-2.6.18-238.37.1.el5.ia64.rpm SHA-256: b507a030f29cacff6bbed6189c7031c111ae90869baa14ce49e675cd29dc4d3c
kernel-devel-2.6.18-238.37.1.el5.ia64.rpm SHA-256: 726d6499b7a9b2f92942579cd5a9266967acd1e9470c77a86cd881120cdcd89a
kernel-doc-2.6.18-238.37.1.el5.noarch.rpm SHA-256: 8bd50c0c6fb5ab5242c7ff5748e59c3d916f8b1c6433987d36563bd2c3a02439
kernel-headers-2.6.18-238.37.1.el5.ia64.rpm SHA-256: b2f3597c86aa7264a9cf3465e93af9492e51c93ddddcc1a7fcf343b99500153f
kernel-xen-2.6.18-238.37.1.el5.ia64.rpm SHA-256: cab01f03a71edf7cf02d4b77aca91bdf35a08fac69be8242776a6e1dd6b91622
kernel-xen-devel-2.6.18-238.37.1.el5.ia64.rpm SHA-256: b9300bb36903d0ca482fe5aa687eb54cd69f2a6808ac3fd7a6f10cc1d029c935
i386
kernel-2.6.18-238.37.1.el5.i686.rpm SHA-256: ffbe4b442aa4a7695ef3ae42c1eb8a7dde980f8cbd7329df29afb978ec36d724
kernel-PAE-2.6.18-238.37.1.el5.i686.rpm SHA-256: e1d8d73e41dc3f34d1a7a4a47d52384f04542ff7ae73628f2e3df589af03987c
kernel-PAE-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: 4cb0e0e247b25453ba4e43bf95b57867c4e1c2b230b6851cf7d58d0562f405bf
kernel-debug-2.6.18-238.37.1.el5.i686.rpm SHA-256: 548de9f63dab6f3ee75941527088ae30c5d5b4eb4de6d818fe222f584f5a3b21
kernel-debug-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: f28f1f19b40d7ef32eb5249fbcb681c42edb1d230be878cc05b2fdd61f10f837
kernel-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: c05e89000ce6aad1f72d7a211700f1a1aefa91625a66116c791f48afebeb9473
kernel-doc-2.6.18-238.37.1.el5.noarch.rpm SHA-256: 8bd50c0c6fb5ab5242c7ff5748e59c3d916f8b1c6433987d36563bd2c3a02439
kernel-headers-2.6.18-238.37.1.el5.i386.rpm SHA-256: 8a0c4e487840ad9fbf235cb7c8c91aab8f61e1cb534708900f7365b08d307e0d
kernel-xen-2.6.18-238.37.1.el5.i686.rpm SHA-256: 77e459df9aca4a56b6f6c75743dee58bc4df1589ee45eda5a61de8eea3842e7d
kernel-xen-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: 078fbcdf1567b6c8c5ea12b6409e12e29e0e1c4d8b7c87d58d462d4ffa38862f

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.37.1.el5.src.rpm SHA-256: 4f6271bb274de9909e0ce85943076e0776b970cc60d1f288277384f44ec57b56
x86_64
kernel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 0caa7a0b755386b821055a4d18987915b5d51488b60613ec0b31e1d11b90c20a
kernel-debug-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: f5045ba9df589715a07764f6a0c3b6ba466450cf85bfb63d4e7da3096fc4f3a2
kernel-debug-devel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 558451ffcd6f71d38edb72b38fc2bee895127b9f3d3361ef42b00487ccadffd1
kernel-devel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 8698e7f6341fd3d4429b32a585ed7956965307cb244111333cd8281650d5c858
kernel-doc-2.6.18-238.37.1.el5.noarch.rpm SHA-256: 8bd50c0c6fb5ab5242c7ff5748e59c3d916f8b1c6433987d36563bd2c3a02439
kernel-headers-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 12aaa4a578cd7f64dac9acf457eb46e8d378322a1421a440abe32b33580b10f6
kernel-xen-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: a67dace19d44aa141f4ea24c217644e9ccbfc5b297b8a309a9e3b01f50365188
kernel-xen-devel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: d3432636e2b9c317e587a9c3472718ad814339db3a60f10475eb91fdcca43f3e
ia64
kernel-2.6.18-238.37.1.el5.ia64.rpm SHA-256: ce3708d333e40a373da83cfb5f2e1ebb6aad3e3d9642450f8c8715b43b507c53
kernel-debug-2.6.18-238.37.1.el5.ia64.rpm SHA-256: 2cac6279f74da00b4806c80c13a99d5cd2a53cb4b8fbca623bb0be942156eb3c
kernel-debug-devel-2.6.18-238.37.1.el5.ia64.rpm SHA-256: b507a030f29cacff6bbed6189c7031c111ae90869baa14ce49e675cd29dc4d3c
kernel-devel-2.6.18-238.37.1.el5.ia64.rpm SHA-256: 726d6499b7a9b2f92942579cd5a9266967acd1e9470c77a86cd881120cdcd89a
kernel-doc-2.6.18-238.37.1.el5.noarch.rpm SHA-256: 8bd50c0c6fb5ab5242c7ff5748e59c3d916f8b1c6433987d36563bd2c3a02439
kernel-headers-2.6.18-238.37.1.el5.ia64.rpm SHA-256: b2f3597c86aa7264a9cf3465e93af9492e51c93ddddcc1a7fcf343b99500153f
kernel-xen-2.6.18-238.37.1.el5.ia64.rpm SHA-256: cab01f03a71edf7cf02d4b77aca91bdf35a08fac69be8242776a6e1dd6b91622
kernel-xen-devel-2.6.18-238.37.1.el5.ia64.rpm SHA-256: b9300bb36903d0ca482fe5aa687eb54cd69f2a6808ac3fd7a6f10cc1d029c935
i386
kernel-2.6.18-238.37.1.el5.i686.rpm SHA-256: ffbe4b442aa4a7695ef3ae42c1eb8a7dde980f8cbd7329df29afb978ec36d724
kernel-PAE-2.6.18-238.37.1.el5.i686.rpm SHA-256: e1d8d73e41dc3f34d1a7a4a47d52384f04542ff7ae73628f2e3df589af03987c
kernel-PAE-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: 4cb0e0e247b25453ba4e43bf95b57867c4e1c2b230b6851cf7d58d0562f405bf
kernel-debug-2.6.18-238.37.1.el5.i686.rpm SHA-256: 548de9f63dab6f3ee75941527088ae30c5d5b4eb4de6d818fe222f584f5a3b21
kernel-debug-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: f28f1f19b40d7ef32eb5249fbcb681c42edb1d230be878cc05b2fdd61f10f837
kernel-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: c05e89000ce6aad1f72d7a211700f1a1aefa91625a66116c791f48afebeb9473
kernel-doc-2.6.18-238.37.1.el5.noarch.rpm SHA-256: 8bd50c0c6fb5ab5242c7ff5748e59c3d916f8b1c6433987d36563bd2c3a02439
kernel-headers-2.6.18-238.37.1.el5.i386.rpm SHA-256: 8a0c4e487840ad9fbf235cb7c8c91aab8f61e1cb534708900f7365b08d307e0d
kernel-xen-2.6.18-238.37.1.el5.i686.rpm SHA-256: 77e459df9aca4a56b6f6c75743dee58bc4df1589ee45eda5a61de8eea3842e7d
kernel-xen-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: 078fbcdf1567b6c8c5ea12b6409e12e29e0e1c4d8b7c87d58d462d4ffa38862f

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.37.1.el5.src.rpm SHA-256: 4f6271bb274de9909e0ce85943076e0776b970cc60d1f288277384f44ec57b56
s390x
kernel-2.6.18-238.37.1.el5.s390x.rpm SHA-256: 80f3c52072c69ff238cca21c9701916f361f55c8e68e9694fc40dc73ebbede55
kernel-debug-2.6.18-238.37.1.el5.s390x.rpm SHA-256: 4fd8a25328695a70f922513630eb071d57b66165602bc75aa4430dbd780facd1
kernel-debug-devel-2.6.18-238.37.1.el5.s390x.rpm SHA-256: 31602a9cb25c11a8533e4e15c710ef8e14b744612032209017ab7eda77636ece
kernel-devel-2.6.18-238.37.1.el5.s390x.rpm SHA-256: fff41a8de6c27f16ee52e5ebaab4c40fe3a8100759815642a99fdc6559e607f6
kernel-doc-2.6.18-238.37.1.el5.noarch.rpm SHA-256: 8bd50c0c6fb5ab5242c7ff5748e59c3d916f8b1c6433987d36563bd2c3a02439
kernel-headers-2.6.18-238.37.1.el5.s390x.rpm SHA-256: 0d795e3f1f4bdda4da230da0eee44268e8cae7970f074da56264c136bd8f82d0
kernel-kdump-2.6.18-238.37.1.el5.s390x.rpm SHA-256: 2af5f59f0bd556aa5356692a5bf5e7bcfe3c3290cca7ceda8394555167f4516b
kernel-kdump-devel-2.6.18-238.37.1.el5.s390x.rpm SHA-256: 22b67a26503263c6259a8f067b7b99fcde25524df8363a7482cae65f121709d3

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.37.1.el5.src.rpm SHA-256: 4f6271bb274de9909e0ce85943076e0776b970cc60d1f288277384f44ec57b56
ppc
kernel-2.6.18-238.37.1.el5.ppc64.rpm SHA-256: e29f38d96d23311a01c5d29c4778f8360e53c58cf8b52d19a4a9483c10d512c9
kernel-debug-2.6.18-238.37.1.el5.ppc64.rpm SHA-256: 0c8b271ed028f84c4bb1f57979b3237ba96b6416ce554d1957b82a13bb3e9f08
kernel-debug-devel-2.6.18-238.37.1.el5.ppc64.rpm SHA-256: 7714780391f6e440f175c068ff266f8842bb5edf034c2bbba394762500ac491c
kernel-devel-2.6.18-238.37.1.el5.ppc64.rpm SHA-256: e215ca72536731c072f7055a8ec3fcdd38e47afecab322a5b03a1ba91ad68020
kernel-doc-2.6.18-238.37.1.el5.noarch.rpm SHA-256: 8bd50c0c6fb5ab5242c7ff5748e59c3d916f8b1c6433987d36563bd2c3a02439
kernel-headers-2.6.18-238.37.1.el5.ppc.rpm SHA-256: adb69cf40b29ce706d693e9f24e047d5e19bd15f24f61d9557b00f39d01fc170
kernel-headers-2.6.18-238.37.1.el5.ppc64.rpm SHA-256: 953e485e84a30998be35d651f0c5113aa95f73f398a100d5678ae85ff95011fc
kernel-kdump-2.6.18-238.37.1.el5.ppc64.rpm SHA-256: f5a192e1c401cec2f0d247485c410dce543dabf44ffd76efb7e8b2f158877db7
kernel-kdump-devel-2.6.18-238.37.1.el5.ppc64.rpm SHA-256: eec0edf47a03aa57b1db04d34e16d23f017fd4293b5047538d9faa351df58f14

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.37.1.el5.src.rpm SHA-256: 4f6271bb274de9909e0ce85943076e0776b970cc60d1f288277384f44ec57b56
x86_64
kernel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 0caa7a0b755386b821055a4d18987915b5d51488b60613ec0b31e1d11b90c20a
kernel-debug-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: f5045ba9df589715a07764f6a0c3b6ba466450cf85bfb63d4e7da3096fc4f3a2
kernel-debug-devel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 558451ffcd6f71d38edb72b38fc2bee895127b9f3d3361ef42b00487ccadffd1
kernel-devel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 8698e7f6341fd3d4429b32a585ed7956965307cb244111333cd8281650d5c858
kernel-doc-2.6.18-238.37.1.el5.noarch.rpm SHA-256: 8bd50c0c6fb5ab5242c7ff5748e59c3d916f8b1c6433987d36563bd2c3a02439
kernel-headers-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: 12aaa4a578cd7f64dac9acf457eb46e8d378322a1421a440abe32b33580b10f6
kernel-xen-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: a67dace19d44aa141f4ea24c217644e9ccbfc5b297b8a309a9e3b01f50365188
kernel-xen-devel-2.6.18-238.37.1.el5.x86_64.rpm SHA-256: d3432636e2b9c317e587a9c3472718ad814339db3a60f10475eb91fdcca43f3e
i386
kernel-2.6.18-238.37.1.el5.i686.rpm SHA-256: ffbe4b442aa4a7695ef3ae42c1eb8a7dde980f8cbd7329df29afb978ec36d724
kernel-PAE-2.6.18-238.37.1.el5.i686.rpm SHA-256: e1d8d73e41dc3f34d1a7a4a47d52384f04542ff7ae73628f2e3df589af03987c
kernel-PAE-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: 4cb0e0e247b25453ba4e43bf95b57867c4e1c2b230b6851cf7d58d0562f405bf
kernel-debug-2.6.18-238.37.1.el5.i686.rpm SHA-256: 548de9f63dab6f3ee75941527088ae30c5d5b4eb4de6d818fe222f584f5a3b21
kernel-debug-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: f28f1f19b40d7ef32eb5249fbcb681c42edb1d230be878cc05b2fdd61f10f837
kernel-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: c05e89000ce6aad1f72d7a211700f1a1aefa91625a66116c791f48afebeb9473
kernel-doc-2.6.18-238.37.1.el5.noarch.rpm SHA-256: 8bd50c0c6fb5ab5242c7ff5748e59c3d916f8b1c6433987d36563bd2c3a02439
kernel-headers-2.6.18-238.37.1.el5.i386.rpm SHA-256: 8a0c4e487840ad9fbf235cb7c8c91aab8f61e1cb534708900f7365b08d307e0d
kernel-xen-2.6.18-238.37.1.el5.i686.rpm SHA-256: 77e459df9aca4a56b6f6c75743dee58bc4df1589ee45eda5a61de8eea3842e7d
kernel-xen-devel-2.6.18-238.37.1.el5.i686.rpm SHA-256: 078fbcdf1567b6c8c5ea12b6409e12e29e0e1c4d8b7c87d58d462d4ffa38862f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility