
Red Hat
External Program
Submit bugs directly to this organization
To report an issue in any Red Hat product or service please contact [email protected]. Red Hat Information Security, in its sole discretion, will make the final decision about granting, refusing, and publishing credits, as well as their form and content, and applying the rules listed below. We will refuse credits where researchers breach the rules below or do not otherwise behave responsibly and ethically:
Reports we do not class as security issues are not eligible for an acknowledgement on this page; these include but are not limited to:
Some Red Hat branded services are operated by third parties. If you notify us about security issues on such sites we will coordinate fixes with the affected vendors and acknowledgements maybe given by those vendors or under their rules.
Some security issues may be due to underlying vulnerabilities in third-party applications that we use. In these cases we will coordinate fixes with the application vendor and acknowledgements maybe given by those vendors or on our CVE dictionary pages.
We expect you to make a good faith effort to avoid privacy violations, destruction of data, or degradation to our service during your research. Please avoid using tools that are likely to automatically generate significant volumes of traffic or otherwise cause operational problems for our sites.