Security Contacts and Procedures
Red Hat takes security very seriously, and we aim to take immediate action to address serious security-related problems that involve our products or services.
When to Contact Red Hat Product Security
You should contact Red Hat Product Security if:
- You think there might be a security vulnerability in a Red Hat product or service.
- You want to provide feedback about our standards of service and performance. If you feel your comment or complaint is not dealt with in a satisfactory manner, please contact the customer service manager at email@example.com.
In all other cases, you should contact Red Hat Global Support Services.
You should contact Red Hat Global Support Services if:
- You are unsure about how a known vulnerability affects a Red Hat product or service.
- You wish to report an issue in a language other than English.
- You require technical assistance for a security function (for example, "How do I configure my firewall?").
- You need help upgrading packages due to security alerts. (Refer to "How do I apply package updates from the Red Hat Network?" for information on upgrading packages.)
- Your issue is not security related.
In any of these cases, please contact Red Hat Global Support Services instead.
Who Reads Email Sent to firstname.lastname@example.org?
Only members of Red Hat Product Security, a restricted and carefully chosen group of Red Hat employees, will have access to material sent to the email@example.com address. No outside users can subscribe to this list.
What to Send to firstname.lastname@example.org
Please provide as much information about your system and the issue as possible when contacting the list.
How to Contact Us Securely
Red Hat Product Security uses a GNU Privacy Guard (GnuPG or GPG) key to secure communications. Mail sent to email@example.com can be encrypted with this public key. We expect to change the key we use from time to time. Should we change the key, the previous keys will be revoked and the rhsa-announce mailing list will be notified of the change.
650d5882: Red Hat, Inc. (Security Response Team) <firstname.lastname@example.org>
This key is used for communicating securely with Red Hat Product Security and for signing the security advisories posted to mailing lists.
Download: Red Hat
Fingerprint: 9273 2337 E5AD 3417 5265 64AB 5E54 8083 650D 5882
Please do not send messages encrypted with this public key to any address other than email@example.com and firstname.lastname@example.org. We are unable to accept any non–security-related email which is encrypted with this public key.
How We Respond
Email sent to email@example.com is read and acknowledged with a non-automated response within three working days. For issues that are complicated and require significant attention, we will open an investigation and will provide you with a mechanism to check the status of our progress at any time.
Any information you share with us about security issues that are not public knowledge is kept confidential within Red Hat. It is not passed on to any third-party without your permission.