Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2017:1104 - Security Advisory
Issued:
2017-04-20
Updated:
2017-04-20

RHSA-2017:1104 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: firefox security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for firefox is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Mozilla Firefox is an open source web browser.

This update upgrades Firefox to version 52.1.0 ESR.

Security Fix(es):

  • Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5429, CVE-2017-5432, CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5437, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5448, CVE-2017-5449, CVE-2017-5459, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5469)

Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Mozilla developers and community, Nils, Holger Fuhrmannek, Atte Kettunen, Huzaifa Sidhpurwala, Nicolas Grégoire, Chamal De Silva, Chun Han Hsiao, Ivan Fratric of Google Project Zero, Anonymous working with Trend Micro's Zero Day Initiative, and Petr Cerny as the original reporters.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, Firefox must be restarted for the changes to take effect.

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 1443298 - CVE-2017-5442 Mozilla: Use-after-free during style changes (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443299 - CVE-2017-5443 Mozilla: Out-of-bounds write during BinHex decoding (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443301 - CVE-2017-5429 Mozilla: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1 (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443303 - CVE-2017-5464 Mozilla: Memory corruption with accessibility and DOM manipulation (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443304 - CVE-2017-5465 Mozilla: Out-of-bounds read in ConvolvePixel (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443308 - CVE-2017-5460 Mozilla: Use-after-free in frame selection (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443310 - CVE-2017-5448 Mozilla: Out-of-bounds write in ClearKeyDecryptor (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443311 - CVE-2017-5449 Mozilla: Crash during bidirectional unicode manipulation with animation (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443312 - CVE-2017-5446 Mozilla: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443313 - CVE-2017-5447 Mozilla: Out-of-bounds read during glyph processing (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443314 - CVE-2017-5444 Mozilla: Buffer overflow while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443315 - CVE-2017-5445 Mozilla: Uninitialized values used while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443317 - CVE-2017-5469 Mozilla: Potential Buffer overflow in flex-generated code (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443322 - CVE-2017-5440 Mozilla: Use-after-free in txExecutionState destructor during XSLT processing (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443323 - CVE-2017-5441 Mozilla: Use-after-free with selection during scroll events (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443324 - CVE-2017-5439 Mozilla: Use-after-free in nsTArray Length() during XSLT processing (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443325 - CVE-2017-5438 Mozilla: Use-after-free in nsAutoPtr during XSLT processing (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443326 - CVE-2017-5437 Mozilla: Vulnerabilities in libevent library (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443327 - CVE-2017-5436 Mozilla: Out-of-bounds write with malicious font in Graphite 2 (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443328 - CVE-2017-5435 Mozilla: Use-after-free during transaction processing in the editor (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443329 - CVE-2017-5434 Mozilla: Use-after-free during focus handling (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443330 - CVE-2017-5433 Mozilla: Use-after-free in SMIL animation functions (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443332 - CVE-2017-5432 Mozilla: Use-after-free in text input selection (MFSA 2017-11, MFSA 2017-12)
  • BZ - 1443333 - CVE-2017-5459 Mozilla: Buffer overflow in WebGL (MFSA 2017-11, MFSA 2017-12)

CVEs

  • CVE-2016-10195
  • CVE-2016-10196
  • CVE-2016-10197
  • CVE-2017-5429
  • CVE-2017-5432
  • CVE-2017-5433
  • CVE-2017-5434
  • CVE-2017-5435
  • CVE-2017-5436
  • CVE-2017-5438
  • CVE-2017-5439
  • CVE-2017-5440
  • CVE-2017-5441
  • CVE-2017-5442
  • CVE-2017-5443
  • CVE-2017-5444
  • CVE-2017-5445
  • CVE-2017-5446
  • CVE-2017-5447
  • CVE-2017-5448
  • CVE-2017-5449
  • CVE-2017-5459
  • CVE-2017-5460
  • CVE-2017-5464
  • CVE-2017-5465
  • CVE-2017-5469

References

  • https://access.redhat.com/security/updates/classification/#critical
  • https://www.mozilla.org/en-US/security/advisories/mfsa2017-08
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
firefox-52.1.0-2.el6_9.src.rpm SHA-256: 15fd0fc5e56be4e80602fff7f38a0dbe68b29c93e2aea90bae715440364a8a08
x86_64
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-52.1.0-2.el6_9.x86_64.rpm SHA-256: fb2dd0f0693150e2cd5f6ecf5c21f700dca0440b79baadac43223705b45354c0
firefox-52.1.0-2.el6_9.x86_64.rpm SHA-256: fb2dd0f0693150e2cd5f6ecf5c21f700dca0440b79baadac43223705b45354c0
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6
firefox-debuginfo-52.1.0-2.el6_9.x86_64.rpm SHA-256: a526a358b25415baac9e3f92b061a5646e72d9bf1d6a94bc5e7f908ff63367e4
firefox-debuginfo-52.1.0-2.el6_9.x86_64.rpm SHA-256: a526a358b25415baac9e3f92b061a5646e72d9bf1d6a94bc5e7f908ff63367e4
i386
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
firefox-52.1.0-2.el6_9.src.rpm SHA-256: 15fd0fc5e56be4e80602fff7f38a0dbe68b29c93e2aea90bae715440364a8a08
x86_64
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-52.1.0-2.el6_9.x86_64.rpm SHA-256: fb2dd0f0693150e2cd5f6ecf5c21f700dca0440b79baadac43223705b45354c0
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6
firefox-debuginfo-52.1.0-2.el6_9.x86_64.rpm SHA-256: a526a358b25415baac9e3f92b061a5646e72d9bf1d6a94bc5e7f908ff63367e4
i386
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6

Red Hat Enterprise Linux Workstation 6

SRPM
firefox-52.1.0-2.el6_9.src.rpm SHA-256: 15fd0fc5e56be4e80602fff7f38a0dbe68b29c93e2aea90bae715440364a8a08
x86_64
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-52.1.0-2.el6_9.x86_64.rpm SHA-256: fb2dd0f0693150e2cd5f6ecf5c21f700dca0440b79baadac43223705b45354c0
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6
firefox-debuginfo-52.1.0-2.el6_9.x86_64.rpm SHA-256: a526a358b25415baac9e3f92b061a5646e72d9bf1d6a94bc5e7f908ff63367e4
i386
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6

Red Hat Enterprise Linux Desktop 6

SRPM
firefox-52.1.0-2.el6_9.src.rpm SHA-256: 15fd0fc5e56be4e80602fff7f38a0dbe68b29c93e2aea90bae715440364a8a08
x86_64
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-52.1.0-2.el6_9.x86_64.rpm SHA-256: fb2dd0f0693150e2cd5f6ecf5c21f700dca0440b79baadac43223705b45354c0
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6
firefox-debuginfo-52.1.0-2.el6_9.x86_64.rpm SHA-256: a526a358b25415baac9e3f92b061a5646e72d9bf1d6a94bc5e7f908ff63367e4
i386
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
firefox-52.1.0-2.el6_9.src.rpm SHA-256: 15fd0fc5e56be4e80602fff7f38a0dbe68b29c93e2aea90bae715440364a8a08
s390x
firefox-52.1.0-2.el6_9.s390.rpm SHA-256: 422d6a9504100e1792e3e855cd715f8f72f0e695febbf1866dab896f3002015b
firefox-52.1.0-2.el6_9.s390x.rpm SHA-256: 620d5e554dcc318ee12f48d441b81e52d324096aee6173d1d69b09ce4370f1f7
firefox-debuginfo-52.1.0-2.el6_9.s390.rpm SHA-256: 25032640d663251bb57170a9fa99f529b0c5634a3685402c72a4b8111521b5e1
firefox-debuginfo-52.1.0-2.el6_9.s390x.rpm SHA-256: 5ff8304238b62ee25bc3dc579a47143a98c9bdd64f7e1e64dd4f9303f0513c20

Red Hat Enterprise Linux for Power, big endian 6

SRPM
firefox-52.1.0-2.el6_9.src.rpm SHA-256: 15fd0fc5e56be4e80602fff7f38a0dbe68b29c93e2aea90bae715440364a8a08
ppc64
firefox-52.1.0-2.el6_9.ppc.rpm SHA-256: b40ec5e13385a298f21443b55c2ded0d865e07b1a8347f0624b5ad1e3cce45de
firefox-52.1.0-2.el6_9.ppc64.rpm SHA-256: 6cfbed3f5a5e9786b9d8d108c33fef8cf940eb6a515e81df857824d2586126aa
firefox-debuginfo-52.1.0-2.el6_9.ppc.rpm SHA-256: 3fa611efbc2dfe04cb7e9f52a55e104694f78615bce7d4b072ac097587db0a86
firefox-debuginfo-52.1.0-2.el6_9.ppc64.rpm SHA-256: ecb6b926c5b2af6204f3dc67e44025b3ec2aa9735e6491b7516f86c2ebff4835

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
firefox-52.1.0-2.el6_9.src.rpm SHA-256: 15fd0fc5e56be4e80602fff7f38a0dbe68b29c93e2aea90bae715440364a8a08
x86_64
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-52.1.0-2.el6_9.x86_64.rpm SHA-256: fb2dd0f0693150e2cd5f6ecf5c21f700dca0440b79baadac43223705b45354c0
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6
firefox-debuginfo-52.1.0-2.el6_9.x86_64.rpm SHA-256: a526a358b25415baac9e3f92b061a5646e72d9bf1d6a94bc5e7f908ff63367e4

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
firefox-52.1.0-2.el6_9.src.rpm SHA-256: 15fd0fc5e56be4e80602fff7f38a0dbe68b29c93e2aea90bae715440364a8a08
s390x
firefox-52.1.0-2.el6_9.s390.rpm SHA-256: 422d6a9504100e1792e3e855cd715f8f72f0e695febbf1866dab896f3002015b
firefox-52.1.0-2.el6_9.s390x.rpm SHA-256: 620d5e554dcc318ee12f48d441b81e52d324096aee6173d1d69b09ce4370f1f7
firefox-debuginfo-52.1.0-2.el6_9.s390.rpm SHA-256: 25032640d663251bb57170a9fa99f529b0c5634a3685402c72a4b8111521b5e1
firefox-debuginfo-52.1.0-2.el6_9.s390x.rpm SHA-256: 5ff8304238b62ee25bc3dc579a47143a98c9bdd64f7e1e64dd4f9303f0513c20

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
firefox-52.1.0-2.el6_9.src.rpm SHA-256: 15fd0fc5e56be4e80602fff7f38a0dbe68b29c93e2aea90bae715440364a8a08
x86_64
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-52.1.0-2.el6_9.x86_64.rpm SHA-256: fb2dd0f0693150e2cd5f6ecf5c21f700dca0440b79baadac43223705b45354c0
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6
firefox-debuginfo-52.1.0-2.el6_9.x86_64.rpm SHA-256: a526a358b25415baac9e3f92b061a5646e72d9bf1d6a94bc5e7f908ff63367e4
i386
firefox-52.1.0-2.el6_9.i686.rpm SHA-256: 608b631e62c3b70257786e53091a3a6c6cfe7eafd604db65345f78554ce400f9
firefox-debuginfo-52.1.0-2.el6_9.i686.rpm SHA-256: 6408eb3d7d92d94dfed3e8eb114bb1fc758074a2cb12ef2f429ba08cca2cb9c6

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
firefox-52.1.0-2.el6_9.src.rpm SHA-256: 15fd0fc5e56be4e80602fff7f38a0dbe68b29c93e2aea90bae715440364a8a08
s390x
firefox-52.1.0-2.el6_9.s390.rpm SHA-256: 422d6a9504100e1792e3e855cd715f8f72f0e695febbf1866dab896f3002015b
firefox-52.1.0-2.el6_9.s390x.rpm SHA-256: 620d5e554dcc318ee12f48d441b81e52d324096aee6173d1d69b09ce4370f1f7
firefox-debuginfo-52.1.0-2.el6_9.s390.rpm SHA-256: 25032640d663251bb57170a9fa99f529b0c5634a3685402c72a4b8111521b5e1
firefox-debuginfo-52.1.0-2.el6_9.s390x.rpm SHA-256: 5ff8304238b62ee25bc3dc579a47143a98c9bdd64f7e1e64dd4f9303f0513c20

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility