Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHBA-2011:1604 - Bug Fix Advisory
Issued:
2011-12-06
Updated:
2011-12-06

RHBA-2011:1604 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

lldpad bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated lldpad package that fixes several bugs and adds various enhancements
is now available for Red Hat Enterprise Linux 6.

Description

The lldpad package provides the Linux user space daemon and configuration tool
for Intel's Link Layer Discovery Protocol (LLDP) agent with Enhanced Ethernet
support.

The lldpad package has been upgraded to upstream version 0.9.43, which provides
a number of bug fixes and enhancements over the previous version. (BZ#731407)

This update fixes the following bugs:

  • The Brocade 8000 Fibre Channel Forwarder (FCF) switch with FabOs 6.4.2b failed

to process the CEE TLV frame on fabric session startup (started by the llpad).
As a consequence, the Brocade 8000 Fibre Channel Forwarder (FCF) switch with
FabOs 6.4.2b terminated the connection and subsequent fabric logins failed when
IEEE 802.1Qaz DCBX was enabled. With this update, the llptool utility can
configure lldpad not to use the CEE TLV frame for the fabric session initiation
(for the eth3 device, the initiator should issue the "lldptool -T -i eth3 -V
IEEE-DCBX mode=reset" command) and the problem no longer occurs. (BZ#749057)

  • The lldpad service triggered excessive timeout events every second. This

caused the service to consume excess resources. Now, the lldpad service has been
switched from polling-based to a demand-based model. This prevents excessive
timeout event generation and ensures that the service consumes only the expected
resources. (BZ#694639)

  • The lldpad utility did not detect the maximum number of traffic classes

supported by a device correctly. This resulted in an invalid or incorrect
hardware configuration. Now, the utility detects the maximum number of traffic
classes correctly. (BZ#733123)

  • The Edge Control Protocol (ECP) could not verify whether a port lookup was

successful when running Virtual Discovery and Configuration Protocol (VDP) on
bonded devices because VDP does not support bonded devices. As a consequence,
the LLDP agent terminated unexpectedly with a segmentation fault. With this
update, VDP is no longer initialized on bonded devices and the crash no longer
occurs. (BZ#720825, BZ#744133)

  • The lldpad utility failed to initialize correctly on the Intel 82599ES 10

Gigabit Ethernet Controller (Niantic) with virtual functions enabled and
returned a message that there were too many neighbors. With this update, lldpad
initializes correctly and the problem no longer occurs. (BZ#647211)

  • Prior to this update, a user with non-superuser permissions could start the

lldpad service. With this update the lldpad init scripts have been modified and
a user with non-superuser permissions can no longer start the service.
(BZ#735313)

  • The init script did not perform a line feed when returning the output of a

service command. With this update, the init script has been recoded and the
output of the service command is correct. (BZ#683837)

  • The get_bcn() function returned without freeing the nlh variable, which caused

a memory leak. The function has been modified and the memory leak no longer
occurs. (BZ#720730)

  • The lldpad daemon failed to detect that a NIC (Network Interface Card) had the

offloaded DCBX (Data Center Bridging eXchange) stack implemented in its
firmware. As a consequence, the lldp packets were send by both, the daemon and
the NIC. With this update, the lldpad daemon no longer sends the packets if a
NIC driver implements the offloaded DCBX stack. (BZ#741359)

  • The lldpad utility incorrectly accessed memory. With this update, the utility

accesses the memory correctly. (BZ#749943)

This update also adds the following enhancement:

  • The lldpad package now supports the 802.1Qaz standard (Enhanced Transmission

Selection for Bandwidth Sharing Between Traffic Classes). (BZ#695550)

Users are advised to upgrade to this updated lldpad package, which fixes these
bugs and adds these enhancements.

Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 694639 - lldpad has frequent timeouts on selects
  • BZ - 695550 - [Intel 6.2 Feature] lldpad - IEEE 802.1Qaz support
  • BZ - 720730 - Resource leaks revealed by Coverity scan
  • BZ - 728169 - Coverity scan revealed defects
  • BZ - 735313 - lldpad init scripts , stopping with nonprivileged user

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
lldpad-0.9.43-12.el6.src.rpm SHA-256: 69ac744a176d0bb7f1c729f51356c3733a84c75754681cdcc7dbfa7c6f87ac3f
x86_64
lldpad-0.9.43-12.el6.x86_64.rpm SHA-256: 790557d8e837a689aed8664c378c5600d147ea5e085f8dbd01d0dc5977c09b24
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-debuginfo-0.9.43-12.el6.x86_64.rpm SHA-256: 01a769e60d65f68d005ce75d7164b69bdae4bbef66b67aa85c3e1df4393ff08f
lldpad-debuginfo-0.9.43-12.el6.x86_64.rpm SHA-256: 01a769e60d65f68d005ce75d7164b69bdae4bbef66b67aa85c3e1df4393ff08f
lldpad-devel-0.9.43-12.el6.i686.rpm SHA-256: 6b783dbd9b360907c7ad2577b6b7d9dc6bda6ad29e56f1cfd5ce5836abc22ddc
lldpad-devel-0.9.43-12.el6.x86_64.rpm SHA-256: 99d31c131ddc2875e5f7601c3cb9ccbc7c48a0566b1a30ab785647983151cfc7
i386
lldpad-0.9.43-12.el6.i686.rpm SHA-256: f2efb7c7eaee22f9a9596a801ee328bc5262ef3620c47305dcb318f6019302c0
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-devel-0.9.43-12.el6.i686.rpm SHA-256: 6b783dbd9b360907c7ad2577b6b7d9dc6bda6ad29e56f1cfd5ce5836abc22ddc

Red Hat Enterprise Linux Workstation 6

SRPM
lldpad-0.9.43-12.el6.src.rpm SHA-256: 69ac744a176d0bb7f1c729f51356c3733a84c75754681cdcc7dbfa7c6f87ac3f
x86_64
lldpad-0.9.43-12.el6.x86_64.rpm SHA-256: 790557d8e837a689aed8664c378c5600d147ea5e085f8dbd01d0dc5977c09b24
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-debuginfo-0.9.43-12.el6.x86_64.rpm SHA-256: 01a769e60d65f68d005ce75d7164b69bdae4bbef66b67aa85c3e1df4393ff08f
lldpad-debuginfo-0.9.43-12.el6.x86_64.rpm SHA-256: 01a769e60d65f68d005ce75d7164b69bdae4bbef66b67aa85c3e1df4393ff08f
lldpad-devel-0.9.43-12.el6.i686.rpm SHA-256: 6b783dbd9b360907c7ad2577b6b7d9dc6bda6ad29e56f1cfd5ce5836abc22ddc
lldpad-devel-0.9.43-12.el6.x86_64.rpm SHA-256: 99d31c131ddc2875e5f7601c3cb9ccbc7c48a0566b1a30ab785647983151cfc7
i386
lldpad-0.9.43-12.el6.i686.rpm SHA-256: f2efb7c7eaee22f9a9596a801ee328bc5262ef3620c47305dcb318f6019302c0
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-devel-0.9.43-12.el6.i686.rpm SHA-256: 6b783dbd9b360907c7ad2577b6b7d9dc6bda6ad29e56f1cfd5ce5836abc22ddc

Red Hat Enterprise Linux Desktop 6

SRPM
lldpad-0.9.43-12.el6.src.rpm SHA-256: 69ac744a176d0bb7f1c729f51356c3733a84c75754681cdcc7dbfa7c6f87ac3f
i386
lldpad-0.9.43-12.el6.i686.rpm SHA-256: f2efb7c7eaee22f9a9596a801ee328bc5262ef3620c47305dcb318f6019302c0
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-devel-0.9.43-12.el6.i686.rpm SHA-256: 6b783dbd9b360907c7ad2577b6b7d9dc6bda6ad29e56f1cfd5ce5836abc22ddc
x86_64
lldpad-0.9.43-12.el6.x86_64.rpm SHA-256: 790557d8e837a689aed8664c378c5600d147ea5e085f8dbd01d0dc5977c09b24
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-debuginfo-0.9.43-12.el6.x86_64.rpm SHA-256: 01a769e60d65f68d005ce75d7164b69bdae4bbef66b67aa85c3e1df4393ff08f
lldpad-debuginfo-0.9.43-12.el6.x86_64.rpm SHA-256: 01a769e60d65f68d005ce75d7164b69bdae4bbef66b67aa85c3e1df4393ff08f
lldpad-devel-0.9.43-12.el6.i686.rpm SHA-256: 6b783dbd9b360907c7ad2577b6b7d9dc6bda6ad29e56f1cfd5ce5836abc22ddc
lldpad-devel-0.9.43-12.el6.x86_64.rpm SHA-256: 99d31c131ddc2875e5f7601c3cb9ccbc7c48a0566b1a30ab785647983151cfc7

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
lldpad-0.9.43-12.el6.src.rpm SHA-256: 69ac744a176d0bb7f1c729f51356c3733a84c75754681cdcc7dbfa7c6f87ac3f
s390x
lldpad-0.9.43-12.el6.s390x.rpm SHA-256: 848868f5d75de02fdb53d29895814bcf180c6b69934fd09a7bf087271f4129a7
lldpad-debuginfo-0.9.43-12.el6.s390.rpm SHA-256: 859dffc5b97a936f6ba5c41619fb942732d7f7338aef59c721ca910c11c2ef5b
lldpad-debuginfo-0.9.43-12.el6.s390x.rpm SHA-256: 02e3d33bc97ba548ced2a29e75490a619ff397f2bf9a7773a2d1d86d436d208f
lldpad-debuginfo-0.9.43-12.el6.s390x.rpm SHA-256: 02e3d33bc97ba548ced2a29e75490a619ff397f2bf9a7773a2d1d86d436d208f
lldpad-devel-0.9.43-12.el6.s390.rpm SHA-256: c15d6f72a2c969ea40954e0837353b99f64eea6bee14b8313524e84b8077cfd1
lldpad-devel-0.9.43-12.el6.s390x.rpm SHA-256: fd32c4a55ae0c3030fa3c74a16bc1f53335f90d2fd448589a4023b1230661612

Red Hat Enterprise Linux for Power, big endian 6

SRPM
lldpad-0.9.43-12.el6.src.rpm SHA-256: 69ac744a176d0bb7f1c729f51356c3733a84c75754681cdcc7dbfa7c6f87ac3f
ppc64
lldpad-0.9.43-12.el6.ppc64.rpm SHA-256: 409884054c62c77dca19add01d5b3a4c486620549adb6936277653ca6eb5e305
lldpad-debuginfo-0.9.43-12.el6.ppc.rpm SHA-256: ceae4ec3a199ef2174ff5d9564f37eee8ed73739d23b3d14c06e62898ae63720
lldpad-debuginfo-0.9.43-12.el6.ppc64.rpm SHA-256: f6ead0e8d24accc53cab3f6ad68b88e702e899918d2a7865e9827577610f4419
lldpad-debuginfo-0.9.43-12.el6.ppc64.rpm SHA-256: f6ead0e8d24accc53cab3f6ad68b88e702e899918d2a7865e9827577610f4419
lldpad-devel-0.9.43-12.el6.ppc.rpm SHA-256: 4c2f4fcdd1955f5993d45f51ee780fb906fd0a65bba88a4685a4c7652ebad6c2
lldpad-devel-0.9.43-12.el6.ppc64.rpm SHA-256: 9294547da40a91cf8c15d62e0af37502345c4e5d32714a375a8381a1971b28a7

Red Hat Enterprise Linux Server from RHUI 6

SRPM
lldpad-0.9.43-12.el6.src.rpm SHA-256: 69ac744a176d0bb7f1c729f51356c3733a84c75754681cdcc7dbfa7c6f87ac3f
x86_64
lldpad-0.9.43-12.el6.x86_64.rpm SHA-256: 790557d8e837a689aed8664c378c5600d147ea5e085f8dbd01d0dc5977c09b24
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-debuginfo-0.9.43-12.el6.x86_64.rpm SHA-256: 01a769e60d65f68d005ce75d7164b69bdae4bbef66b67aa85c3e1df4393ff08f
lldpad-debuginfo-0.9.43-12.el6.x86_64.rpm SHA-256: 01a769e60d65f68d005ce75d7164b69bdae4bbef66b67aa85c3e1df4393ff08f
lldpad-devel-0.9.43-12.el6.i686.rpm SHA-256: 6b783dbd9b360907c7ad2577b6b7d9dc6bda6ad29e56f1cfd5ce5836abc22ddc
lldpad-devel-0.9.43-12.el6.x86_64.rpm SHA-256: 99d31c131ddc2875e5f7601c3cb9ccbc7c48a0566b1a30ab785647983151cfc7
i386
lldpad-0.9.43-12.el6.i686.rpm SHA-256: f2efb7c7eaee22f9a9596a801ee328bc5262ef3620c47305dcb318f6019302c0
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-devel-0.9.43-12.el6.i686.rpm SHA-256: 6b783dbd9b360907c7ad2577b6b7d9dc6bda6ad29e56f1cfd5ce5836abc22ddc

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
lldpad-0.9.43-12.el6.src.rpm SHA-256: 69ac744a176d0bb7f1c729f51356c3733a84c75754681cdcc7dbfa7c6f87ac3f
x86_64
lldpad-0.9.43-12.el6.x86_64.rpm SHA-256: 790557d8e837a689aed8664c378c5600d147ea5e085f8dbd01d0dc5977c09b24
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-debuginfo-0.9.43-12.el6.x86_64.rpm SHA-256: 01a769e60d65f68d005ce75d7164b69bdae4bbef66b67aa85c3e1df4393ff08f
lldpad-debuginfo-0.9.43-12.el6.x86_64.rpm SHA-256: 01a769e60d65f68d005ce75d7164b69bdae4bbef66b67aa85c3e1df4393ff08f
lldpad-devel-0.9.43-12.el6.i686.rpm SHA-256: 6b783dbd9b360907c7ad2577b6b7d9dc6bda6ad29e56f1cfd5ce5836abc22ddc
lldpad-devel-0.9.43-12.el6.x86_64.rpm SHA-256: 99d31c131ddc2875e5f7601c3cb9ccbc7c48a0566b1a30ab785647983151cfc7
i386
lldpad-0.9.43-12.el6.i686.rpm SHA-256: f2efb7c7eaee22f9a9596a801ee328bc5262ef3620c47305dcb318f6019302c0
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-debuginfo-0.9.43-12.el6.i686.rpm SHA-256: 4eb9dbab4710faad875c74fa681097a4546310f02c163928c5f3a7c6fa9dbd42
lldpad-devel-0.9.43-12.el6.i686.rpm SHA-256: 6b783dbd9b360907c7ad2577b6b7d9dc6bda6ad29e56f1cfd5ce5836abc22ddc

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
lldpad-0.9.43-12.el6.src.rpm SHA-256: 69ac744a176d0bb7f1c729f51356c3733a84c75754681cdcc7dbfa7c6f87ac3f
s390x
lldpad-0.9.43-12.el6.s390x.rpm SHA-256: 848868f5d75de02fdb53d29895814bcf180c6b69934fd09a7bf087271f4129a7
lldpad-debuginfo-0.9.43-12.el6.s390.rpm SHA-256: 859dffc5b97a936f6ba5c41619fb942732d7f7338aef59c721ca910c11c2ef5b
lldpad-debuginfo-0.9.43-12.el6.s390x.rpm SHA-256: 02e3d33bc97ba548ced2a29e75490a619ff397f2bf9a7773a2d1d86d436d208f
lldpad-debuginfo-0.9.43-12.el6.s390x.rpm SHA-256: 02e3d33bc97ba548ced2a29e75490a619ff397f2bf9a7773a2d1d86d436d208f
lldpad-devel-0.9.43-12.el6.s390.rpm SHA-256: c15d6f72a2c969ea40954e0837353b99f64eea6bee14b8313524e84b8077cfd1
lldpad-devel-0.9.43-12.el6.s390x.rpm SHA-256: fd32c4a55ae0c3030fa3c74a16bc1f53335f90d2fd448589a4023b1230661612

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter