Red Hat Product Security provides the guidance, stability and security needed to confidently deploy enterprise solutions.
An Open Approach to Vulnerability Management
Over the years, Red Hat has published a large number of articles, blogs and other resources that describe different facets of how we handle security vulnerabilities in our products. Here we have provided a document that builds on those efforts with the aim to bring it all together and help our customers and communities better understand how Red Hat categorizes, addresses and responds to security vulnerabilities.
Last updated: September 20, 2022