Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:5533 - Security Advisory
Issued:
2023-10-09
Updated:
2023-10-09

RHSA-2023:5533 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: nodejs security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for nodejs is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The package has been upgraded to a later upstream version: nodejs (16.20.2).

Security Fix(es):

  • nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)
  • c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
  • http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)
  • Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936)
  • nodejs: mainModule.proto bypass experimental policy mechanism (CVE-2023-30581)
  • nodejs: process interuption due to invalid Public Key information in x509 certificates (CVE-2023-30588)
  • nodejs: HTTP Request Smuggling via Empty headers separated by CR (CVE-2023-30589)
  • nodejs: DiffieHellman do not generate keys after setting a private key (CVE-2023-30590)
  • nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)
  • nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)
  • Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)
  • Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • nodejs: Rebase to the latest Nodejs 16 release [rhel-9] (BZ#2236435, BZ#2178078, BZ#2223335)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
  • BZ - 2168631 - CVE-2022-4904 c-ares: buffer overflow in config_sortlist() due to missing string length check
  • BZ - 2172190 - CVE-2023-23936 Node.js: Fetch API did not protect against CRLF injection in host headers
  • BZ - 2172204 - CVE-2023-24807 Node.js: Regular Expression Denial of Service in Headers fetch API
  • BZ - 2172217 - CVE-2023-23920 Node.js: insecure loading of ICU data through ICU_DATA environment variable
  • BZ - 2178078 - nodejs: Rebase to the latest Nodejs 16 release [rhel-9] [rhel-9.0.0.z]
  • BZ - 2219824 - CVE-2023-30581 nodejs: mainModule.proto bypass experimental policy mechanism
  • BZ - 2219838 - CVE-2023-30588 nodejs: process interuption due to invalid Public Key information in x509 certificates
  • BZ - 2219841 - CVE-2023-30589 nodejs: HTTP Request Smuggling via Empty headers separated by CR
  • BZ - 2219842 - CVE-2023-30590 nodejs: DiffieHellman do not generate keys after setting a private key
  • BZ - 2223335 - nodejs: Rebase to the latest Nodejs 16 release [rhel-9] [rhel-9.0.0.z]
  • BZ - 2230948 - CVE-2023-32002 nodejs: Permissions policies can be bypassed via Module._load
  • BZ - 2230955 - CVE-2023-32006 nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()
  • BZ - 2230956 - CVE-2023-32559 nodejs: Permissions policies can be bypassed via process.binding
  • BZ - 2236435 - nodejs: Rebase to the latest Nodejs 16 release [rhel-9] [rhel-9.0.0.z]

CVEs

  • CVE-2022-4904
  • CVE-2022-25881
  • CVE-2023-23920
  • CVE-2023-23936
  • CVE-2023-24807
  • CVE-2023-30581
  • CVE-2023-30588
  • CVE-2023-30589
  • CVE-2023-30590
  • CVE-2023-32002
  • CVE-2023-32006
  • CVE-2023-32559

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM
nodejs-16.20.2-1.el9_0.src.rpm SHA-256: 3fe1dc896a179a91e6ca068897b944d0eceadd5894de4ba4987d640745ee00db
x86_64
nodejs-16.20.2-1.el9_0.x86_64.rpm SHA-256: b5a13e502622a8d32e46386bca372fece22382e4d1498ca38adc9d3e41c2caf4
nodejs-debuginfo-16.20.2-1.el9_0.i686.rpm SHA-256: 2a462fd1878c5e740c82b53c73aa693649d13fe87940c2bf057d85f0ffddb2d8
nodejs-debuginfo-16.20.2-1.el9_0.x86_64.rpm SHA-256: 6a67738b41276ae37098f3869a174bc47d98818bdb6cce7717b761f8fa77475e
nodejs-debugsource-16.20.2-1.el9_0.i686.rpm SHA-256: dc3146f8555e9b0df986ba8cd4805fe9cdb34a8fa8bf0cd0196e8c8d9c08cd97
nodejs-debugsource-16.20.2-1.el9_0.x86_64.rpm SHA-256: ddfc71f41e6f21818033cf1399aaa5387c7891f30ba087ea159fb1a9447599e4
nodejs-docs-16.20.2-1.el9_0.noarch.rpm SHA-256: 2f129207f6471c374db85ff56a2791bf51f84190364cedf5f7f32178fda1b87f
nodejs-full-i18n-16.20.2-1.el9_0.x86_64.rpm SHA-256: 8a72330f67afd574c7ce72c8e0aa28d85a927391da9c46f02a2b8a13b28dcf68
nodejs-libs-16.20.2-1.el9_0.i686.rpm SHA-256: 7ed562aeec058d557abf094efb6ceb71db422763c77bb897c9110e9bb8dc419b
nodejs-libs-16.20.2-1.el9_0.x86_64.rpm SHA-256: 056b48d763332c5851aa12808c229695b4a5d91bb32e99fbf83b43058b916801
nodejs-libs-debuginfo-16.20.2-1.el9_0.i686.rpm SHA-256: 7c92581ecea79d293ecbfeae3f4b40b6bb6fe0295bfc4cb66935a1957ab12eae
nodejs-libs-debuginfo-16.20.2-1.el9_0.x86_64.rpm SHA-256: addcd40423ac4bfcef7c9b81e521d630df2dfe999fbf1e51269722c198b5dc75
npm-8.19.4-1.16.20.2.1.el9_0.x86_64.rpm SHA-256: f4d9c779fbfb426ce85cb8605eda5feb2642190525d24f5574f859f30bcfa946

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM
nodejs-16.20.2-1.el9_0.src.rpm SHA-256: 3fe1dc896a179a91e6ca068897b944d0eceadd5894de4ba4987d640745ee00db
s390x
nodejs-16.20.2-1.el9_0.s390x.rpm SHA-256: cf464f0a455f294b7561707e1524fa7c784fc79f6b94b7314e6a31e01ab05685
nodejs-debuginfo-16.20.2-1.el9_0.s390x.rpm SHA-256: aac87cfd477389a31f7345e53f99828a3a6f419e66baf3ff42b805f4bc7ddb1a
nodejs-debugsource-16.20.2-1.el9_0.s390x.rpm SHA-256: dcb76b67b8673700d06fb2063d5765bb7c725096310350f471de5311b40a2b74
nodejs-docs-16.20.2-1.el9_0.noarch.rpm SHA-256: 2f129207f6471c374db85ff56a2791bf51f84190364cedf5f7f32178fda1b87f
nodejs-full-i18n-16.20.2-1.el9_0.s390x.rpm SHA-256: f8a3b85881258f27d33bff73d4a08c59963f91bcca3e35a301b9a459cbab7e8c
nodejs-libs-16.20.2-1.el9_0.s390x.rpm SHA-256: 3ac18ff7a7c14ecd75b2d99e9e99f44491511273c23e0b2960c2464de111a4ac
nodejs-libs-debuginfo-16.20.2-1.el9_0.s390x.rpm SHA-256: a1f4c5e99bfd7a7068559d6a3f012e8c464d418f8e0546e2471198cec4ac6dbf
npm-8.19.4-1.16.20.2.1.el9_0.s390x.rpm SHA-256: 7b69ea615e4e73f0f6f7c62308f8b18d2e2b4f49772945520650e6726917bcc7

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM
nodejs-16.20.2-1.el9_0.src.rpm SHA-256: 3fe1dc896a179a91e6ca068897b944d0eceadd5894de4ba4987d640745ee00db
ppc64le
nodejs-16.20.2-1.el9_0.ppc64le.rpm SHA-256: bc82cea101c1c6d9a0120fe984fffc2573e6c198627d51da8a2d622f66497e53
nodejs-debuginfo-16.20.2-1.el9_0.ppc64le.rpm SHA-256: fdee3fa1464f873c6209eab2af70019d899474879e0c5a2853aab6548ca827b0
nodejs-debugsource-16.20.2-1.el9_0.ppc64le.rpm SHA-256: b47f4a1ffe609fd8f756a95a8b736c95bf18474416da3f6bc67875ea42737ffd
nodejs-docs-16.20.2-1.el9_0.noarch.rpm SHA-256: 2f129207f6471c374db85ff56a2791bf51f84190364cedf5f7f32178fda1b87f
nodejs-full-i18n-16.20.2-1.el9_0.ppc64le.rpm SHA-256: 3763def39abdfb9c073c76712f332530251c96da878f9c9847276a17145ee2bd
nodejs-libs-16.20.2-1.el9_0.ppc64le.rpm SHA-256: 3b385c4411a684c4eddf66b7e5e52b92d5a822cb8708020b53972911a68b6aca
nodejs-libs-debuginfo-16.20.2-1.el9_0.ppc64le.rpm SHA-256: 9dcbe000e2cc16f657de85c70d4a66f62bc59e4926226b3551c4810283240794
npm-8.19.4-1.16.20.2.1.el9_0.ppc64le.rpm SHA-256: 8a126794e6189bcddb9bd1f9d5346517091d0170df3b8c096f9ba86064c60253

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM
nodejs-16.20.2-1.el9_0.src.rpm SHA-256: 3fe1dc896a179a91e6ca068897b944d0eceadd5894de4ba4987d640745ee00db
aarch64
nodejs-16.20.2-1.el9_0.aarch64.rpm SHA-256: 1a56726cd196ad92a01c451fff74f6150d316a0daa830c3537871b225f226dd4
nodejs-debuginfo-16.20.2-1.el9_0.aarch64.rpm SHA-256: 40e54933835c736b95855e194cb87acae546b19d89d3c88a9d9a843f6faeac17
nodejs-debugsource-16.20.2-1.el9_0.aarch64.rpm SHA-256: c8874c554ddbbba5f0e9c21c1ad84e6975ed02cba9190f0c8ad269f5c238e6c1
nodejs-docs-16.20.2-1.el9_0.noarch.rpm SHA-256: 2f129207f6471c374db85ff56a2791bf51f84190364cedf5f7f32178fda1b87f
nodejs-full-i18n-16.20.2-1.el9_0.aarch64.rpm SHA-256: 5e045ebdcdd684e9e3de2d9a3802d2a08abcd650ca00b607dd17df659e6fc2aa
nodejs-libs-16.20.2-1.el9_0.aarch64.rpm SHA-256: f03966b1dcda2d9a7d64af1c498d951b917a5a57140b9719a588fa266e980a0a
nodejs-libs-debuginfo-16.20.2-1.el9_0.aarch64.rpm SHA-256: 540b33a993aaf68b68aa6a9d20800a2dffd87a174912812c14a3c0c2e8babb4f
npm-8.19.4-1.16.20.2.1.el9_0.aarch64.rpm SHA-256: 90131a91c8bb4e8ec57793a64daa8bc3e87fc5d85d11aacf4ba29a770e030c0f

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM
nodejs-16.20.2-1.el9_0.src.rpm SHA-256: 3fe1dc896a179a91e6ca068897b944d0eceadd5894de4ba4987d640745ee00db
ppc64le
nodejs-16.20.2-1.el9_0.ppc64le.rpm SHA-256: bc82cea101c1c6d9a0120fe984fffc2573e6c198627d51da8a2d622f66497e53
nodejs-debuginfo-16.20.2-1.el9_0.ppc64le.rpm SHA-256: fdee3fa1464f873c6209eab2af70019d899474879e0c5a2853aab6548ca827b0
nodejs-debugsource-16.20.2-1.el9_0.ppc64le.rpm SHA-256: b47f4a1ffe609fd8f756a95a8b736c95bf18474416da3f6bc67875ea42737ffd
nodejs-docs-16.20.2-1.el9_0.noarch.rpm SHA-256: 2f129207f6471c374db85ff56a2791bf51f84190364cedf5f7f32178fda1b87f
nodejs-full-i18n-16.20.2-1.el9_0.ppc64le.rpm SHA-256: 3763def39abdfb9c073c76712f332530251c96da878f9c9847276a17145ee2bd
nodejs-libs-16.20.2-1.el9_0.ppc64le.rpm SHA-256: 3b385c4411a684c4eddf66b7e5e52b92d5a822cb8708020b53972911a68b6aca
nodejs-libs-debuginfo-16.20.2-1.el9_0.ppc64le.rpm SHA-256: 9dcbe000e2cc16f657de85c70d4a66f62bc59e4926226b3551c4810283240794
npm-8.19.4-1.16.20.2.1.el9_0.ppc64le.rpm SHA-256: 8a126794e6189bcddb9bd1f9d5346517091d0170df3b8c096f9ba86064c60253

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM
nodejs-16.20.2-1.el9_0.src.rpm SHA-256: 3fe1dc896a179a91e6ca068897b944d0eceadd5894de4ba4987d640745ee00db
x86_64
nodejs-16.20.2-1.el9_0.x86_64.rpm SHA-256: b5a13e502622a8d32e46386bca372fece22382e4d1498ca38adc9d3e41c2caf4
nodejs-debuginfo-16.20.2-1.el9_0.i686.rpm SHA-256: 2a462fd1878c5e740c82b53c73aa693649d13fe87940c2bf057d85f0ffddb2d8
nodejs-debuginfo-16.20.2-1.el9_0.x86_64.rpm SHA-256: 6a67738b41276ae37098f3869a174bc47d98818bdb6cce7717b761f8fa77475e
nodejs-debugsource-16.20.2-1.el9_0.i686.rpm SHA-256: dc3146f8555e9b0df986ba8cd4805fe9cdb34a8fa8bf0cd0196e8c8d9c08cd97
nodejs-debugsource-16.20.2-1.el9_0.x86_64.rpm SHA-256: ddfc71f41e6f21818033cf1399aaa5387c7891f30ba087ea159fb1a9447599e4
nodejs-docs-16.20.2-1.el9_0.noarch.rpm SHA-256: 2f129207f6471c374db85ff56a2791bf51f84190364cedf5f7f32178fda1b87f
nodejs-full-i18n-16.20.2-1.el9_0.x86_64.rpm SHA-256: 8a72330f67afd574c7ce72c8e0aa28d85a927391da9c46f02a2b8a13b28dcf68
nodejs-libs-16.20.2-1.el9_0.i686.rpm SHA-256: 7ed562aeec058d557abf094efb6ceb71db422763c77bb897c9110e9bb8dc419b
nodejs-libs-16.20.2-1.el9_0.x86_64.rpm SHA-256: 056b48d763332c5851aa12808c229695b4a5d91bb32e99fbf83b43058b916801
nodejs-libs-debuginfo-16.20.2-1.el9_0.i686.rpm SHA-256: 7c92581ecea79d293ecbfeae3f4b40b6bb6fe0295bfc4cb66935a1957ab12eae
nodejs-libs-debuginfo-16.20.2-1.el9_0.x86_64.rpm SHA-256: addcd40423ac4bfcef7c9b81e521d630df2dfe999fbf1e51269722c198b5dc75
npm-8.19.4-1.16.20.2.1.el9_0.x86_64.rpm SHA-256: f4d9c779fbfb426ce85cb8605eda5feb2642190525d24f5574f859f30bcfa946

Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0

SRPM
nodejs-16.20.2-1.el9_0.src.rpm SHA-256: 3fe1dc896a179a91e6ca068897b944d0eceadd5894de4ba4987d640745ee00db
aarch64
nodejs-16.20.2-1.el9_0.aarch64.rpm SHA-256: 1a56726cd196ad92a01c451fff74f6150d316a0daa830c3537871b225f226dd4
nodejs-debuginfo-16.20.2-1.el9_0.aarch64.rpm SHA-256: 40e54933835c736b95855e194cb87acae546b19d89d3c88a9d9a843f6faeac17
nodejs-debugsource-16.20.2-1.el9_0.aarch64.rpm SHA-256: c8874c554ddbbba5f0e9c21c1ad84e6975ed02cba9190f0c8ad269f5c238e6c1
nodejs-docs-16.20.2-1.el9_0.noarch.rpm SHA-256: 2f129207f6471c374db85ff56a2791bf51f84190364cedf5f7f32178fda1b87f
nodejs-full-i18n-16.20.2-1.el9_0.aarch64.rpm SHA-256: 5e045ebdcdd684e9e3de2d9a3802d2a08abcd650ca00b607dd17df659e6fc2aa
nodejs-libs-16.20.2-1.el9_0.aarch64.rpm SHA-256: f03966b1dcda2d9a7d64af1c498d951b917a5a57140b9719a588fa266e980a0a
nodejs-libs-debuginfo-16.20.2-1.el9_0.aarch64.rpm SHA-256: 540b33a993aaf68b68aa6a9d20800a2dffd87a174912812c14a3c0c2e8babb4f
npm-8.19.4-1.16.20.2.1.el9_0.aarch64.rpm SHA-256: 90131a91c8bb4e8ec57793a64daa8bc3e87fc5d85d11aacf4ba29a770e030c0f

Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0

SRPM
nodejs-16.20.2-1.el9_0.src.rpm SHA-256: 3fe1dc896a179a91e6ca068897b944d0eceadd5894de4ba4987d640745ee00db
s390x
nodejs-16.20.2-1.el9_0.s390x.rpm SHA-256: cf464f0a455f294b7561707e1524fa7c784fc79f6b94b7314e6a31e01ab05685
nodejs-debuginfo-16.20.2-1.el9_0.s390x.rpm SHA-256: aac87cfd477389a31f7345e53f99828a3a6f419e66baf3ff42b805f4bc7ddb1a
nodejs-debugsource-16.20.2-1.el9_0.s390x.rpm SHA-256: dcb76b67b8673700d06fb2063d5765bb7c725096310350f471de5311b40a2b74
nodejs-docs-16.20.2-1.el9_0.noarch.rpm SHA-256: 2f129207f6471c374db85ff56a2791bf51f84190364cedf5f7f32178fda1b87f
nodejs-full-i18n-16.20.2-1.el9_0.s390x.rpm SHA-256: f8a3b85881258f27d33bff73d4a08c59963f91bcca3e35a301b9a459cbab7e8c
nodejs-libs-16.20.2-1.el9_0.s390x.rpm SHA-256: 3ac18ff7a7c14ecd75b2d99e9e99f44491511273c23e0b2960c2464de111a4ac
nodejs-libs-debuginfo-16.20.2-1.el9_0.s390x.rpm SHA-256: a1f4c5e99bfd7a7068559d6a3f012e8c464d418f8e0546e2471198cec4ac6dbf
npm-8.19.4-1.16.20.2.1.el9_0.s390x.rpm SHA-256: 7b69ea615e4e73f0f6f7c62308f8b18d2e2b4f49772945520650e6726917bcc7

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility