Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0504 - Security Advisory
Issued:
2008-06-11
Updated:
2008-06-11

RHSA-2008:0504 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: xorg-x11-server security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated xorg-x11-server packages that fix several security issues are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

X.Org is an open source implementation of the X Window System. It provides
basic low-level functionality that full-fledged graphical user interfaces
are designed upon.

An input validation flaw was discovered in X.org's Security and Record
extensions. A malicious authorized client could exploit this issue to cause
a denial of service (crash) or, potentially, execute arbitrary code with
root privileges on the X.Org server. (CVE-2008-1377)

Multiple integer overflow flaws were found in X.org's Render extension. A
malicious authorized client could exploit these issues to cause a denial of
service (crash) or, potentially, execute arbitrary code with root
privileges on the X.Org server. (CVE-2008-2360, CVE-2008-2361,
CVE-2008-2362)

An input validation flaw was discovered in X.org's MIT-SHM extension. A
client connected to the X.org server could read arbitrary server memory.
This could result in the sensitive data of other users of the X.org server
being disclosed. (CVE-2008-1379)

Users of xorg-x11-server should upgrade to these updated packages, which
contain backported patches to resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 445403 - CVE-2008-1377 X.org Record and Security extensions memory corruption
  • BZ - 445414 - CVE-2008-1379 X.org MIT-SHM extension arbitrary memory read
  • BZ - 448783 - CVE-2008-2360 X.org Render extension AllocateGlyph() heap buffer overflow
  • BZ - 448784 - CVE-2008-2361 X.org Render extension ProcRenderCreateCursor() crash
  • BZ - 448785 - CVE-2008-2362 X.org Render extension input validation flaw causing memory corruption

CVEs

  • CVE-2008-1379
  • CVE-2008-2361
  • CVE-2008-2360
  • CVE-2008-1377
  • CVE-2008-2362

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
xorg-x11-server-1.1.1-48.41.el5_2.1.src.rpm SHA-256: 9c584ed888e5c20f176cbd825958f647e5c0e8778bca2fc7068b057f387d1106
x86_64
xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 47f31a80b6facdb274ecf970ab76eba9697dae07ba7f5c19836f03354e314e9b
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 67a374490f84647d0157dbcc156b756bea338c33d53ef889ed3624ba936dee60
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 94de19e608bfa08838376a30b2a5f3bfc2e0e280ba18a57a36e91301ac50067c
xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 945abd4d3bda3178538ee82a96d9ea49efdc0ebd8147ed3da99d3f501351c569
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 1c837f35c73a3b4fcc9525d797e61732e98c8d48425f3d9cbabfa85b28bcdeb0
xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: dceadd5b81837dbb4096267573bd7cada92012973d0d20f8436333ad7b0ccb53
xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 0e646b83fbed436af85440c2c8f724a9b7ffc3f30fef2712918a75859d9262c3
ia64
xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.ia64.rpm SHA-256: a847e3108d19e40d2860387ef9ad37ee01a5f0868df40792446fe23e584d0569
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.ia64.rpm SHA-256: 56da6a42f24a476cc8e14f76c0be8c21c0653fbddec0db24129436f1b822c692
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.ia64.rpm SHA-256: e8a123a27f6d42596a897aecf23dcbd286e982b2adec7cc7ff74b5d46b308b34
xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.ia64.rpm SHA-256: 750e3d24e4c067aaf3b4b8a43ff842fb7e567b14eb22d5a9a86b48a88067d345
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.ia64.rpm SHA-256: 5201a34dd18ad032671111166dd0ff5d39c0cacb9a15bd4c2fdb0dd85ca94671
xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.ia64.rpm SHA-256: 042e9fce690a3f875a591b50a07aad3e13e8b01f2219ca03b8a5ea0ebb52eade
xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.ia64.rpm SHA-256: 145024d10774efd790581a2b6863e7e2b2cd77055af2fc12011a7cee713aebd5
i386
xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: 91b38d4a8bdd4e48b76819e4b4bfed53c58beee868f5241eb4c36631e6c2ce1f
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: 2b4376fb8eac14add8dd307bcda6b3b6ca6f4c9344f36a8bb6d2fc6ee2a6ae4b
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: b1dc8cd859c45eb2fc96fcb468701765a9dae6cbeb48cec90db114e7610752e0
xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: dbe7ae5a70afa03f5aeca6088d4925c7aecf468f63106e0b87f632a67b110d09
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: fa7cd0deeaf22f81bb74c19c5584ff0e44725a00f37bd2041c568f3a67ccac85
xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: cb70975c4232c16ed530fff4a6839fd9e896d915c31380b57f6792166f8e154f
xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: b457b3e2836cc103828804567693f9f0eb4a94f9798e239f324df59021307a1b

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
xorg-x11-server-1.1.1-48.41.el5_2.1.src.rpm SHA-256: 9c584ed888e5c20f176cbd825958f647e5c0e8778bca2fc7068b057f387d1106
x86_64
xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 47f31a80b6facdb274ecf970ab76eba9697dae07ba7f5c19836f03354e314e9b
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 67a374490f84647d0157dbcc156b756bea338c33d53ef889ed3624ba936dee60
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 94de19e608bfa08838376a30b2a5f3bfc2e0e280ba18a57a36e91301ac50067c
xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 945abd4d3bda3178538ee82a96d9ea49efdc0ebd8147ed3da99d3f501351c569
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 1c837f35c73a3b4fcc9525d797e61732e98c8d48425f3d9cbabfa85b28bcdeb0
xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: dceadd5b81837dbb4096267573bd7cada92012973d0d20f8436333ad7b0ccb53
xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 0e646b83fbed436af85440c2c8f724a9b7ffc3f30fef2712918a75859d9262c3
i386
xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: 91b38d4a8bdd4e48b76819e4b4bfed53c58beee868f5241eb4c36631e6c2ce1f
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: 2b4376fb8eac14add8dd307bcda6b3b6ca6f4c9344f36a8bb6d2fc6ee2a6ae4b
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: b1dc8cd859c45eb2fc96fcb468701765a9dae6cbeb48cec90db114e7610752e0
xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: dbe7ae5a70afa03f5aeca6088d4925c7aecf468f63106e0b87f632a67b110d09
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: fa7cd0deeaf22f81bb74c19c5584ff0e44725a00f37bd2041c568f3a67ccac85
xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: cb70975c4232c16ed530fff4a6839fd9e896d915c31380b57f6792166f8e154f
xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: b457b3e2836cc103828804567693f9f0eb4a94f9798e239f324df59021307a1b

Red Hat Enterprise Linux Desktop 5

SRPM
xorg-x11-server-1.1.1-48.41.el5_2.1.src.rpm SHA-256: 9c584ed888e5c20f176cbd825958f647e5c0e8778bca2fc7068b057f387d1106
x86_64
xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 47f31a80b6facdb274ecf970ab76eba9697dae07ba7f5c19836f03354e314e9b
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 67a374490f84647d0157dbcc156b756bea338c33d53ef889ed3624ba936dee60
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 94de19e608bfa08838376a30b2a5f3bfc2e0e280ba18a57a36e91301ac50067c
xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 945abd4d3bda3178538ee82a96d9ea49efdc0ebd8147ed3da99d3f501351c569
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 1c837f35c73a3b4fcc9525d797e61732e98c8d48425f3d9cbabfa85b28bcdeb0
xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: dceadd5b81837dbb4096267573bd7cada92012973d0d20f8436333ad7b0ccb53
i386
xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: 91b38d4a8bdd4e48b76819e4b4bfed53c58beee868f5241eb4c36631e6c2ce1f
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: 2b4376fb8eac14add8dd307bcda6b3b6ca6f4c9344f36a8bb6d2fc6ee2a6ae4b
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: b1dc8cd859c45eb2fc96fcb468701765a9dae6cbeb48cec90db114e7610752e0
xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: dbe7ae5a70afa03f5aeca6088d4925c7aecf468f63106e0b87f632a67b110d09
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: fa7cd0deeaf22f81bb74c19c5584ff0e44725a00f37bd2041c568f3a67ccac85
xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: cb70975c4232c16ed530fff4a6839fd9e896d915c31380b57f6792166f8e154f

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
xorg-x11-server-1.1.1-48.41.el5_2.1.src.rpm SHA-256: 9c584ed888e5c20f176cbd825958f647e5c0e8778bca2fc7068b057f387d1106
s390x
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.s390x.rpm SHA-256: a4ba8a5e40569276bb15ff5829e8722a439e33661bbff431205c78cac0573ae4
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.s390x.rpm SHA-256: f0b842a897b4339f64b963753c8e7824ddf850840997ee5d63f1cc90016a6198
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.s390x.rpm SHA-256: 072f0aa5015a767208052a358bc18c32aef41bc8aa0675fe75f6273f83b2f9d5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
xorg-x11-server-1.1.1-48.41.el5_2.1.src.rpm SHA-256: 9c584ed888e5c20f176cbd825958f647e5c0e8778bca2fc7068b057f387d1106
ppc
xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.ppc.rpm SHA-256: 2c30ccfb368817dee85d706b8df2293f13cb8c45b77b053c74343c0a0f23ebc1
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.ppc.rpm SHA-256: 8d9f3f0e8dca4f73057b7628529025a6e391b90d23c1d59d96075cf916435011
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.ppc.rpm SHA-256: f796cc8bc2b66d1742ffb13ee35f5b11a8248a97e0c9c7aaf3c6edf45f9a5fb9
xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.ppc.rpm SHA-256: 776d3f71c372123adcc294fe27f02277accb409d1331a82397d435d4ce4077d1
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.ppc.rpm SHA-256: 5ab42f459f4a32a67b0dfae5baeefc7d88f9ceffc58159f4c3bc4a1adea7ab89
xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.ppc.rpm SHA-256: 1631a1e0cea2519cb5472df7abe50f4a4fa58c37e394a2a19f16782c778b9af8
xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.ppc.rpm SHA-256: 18c7e682b0d2fffbdddc64f12adf6d23d9b5398e5dc4b90393cd2a5980d3ff6e

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
xorg-x11-server-1.1.1-48.41.el5_2.1.src.rpm SHA-256: 9c584ed888e5c20f176cbd825958f647e5c0e8778bca2fc7068b057f387d1106
x86_64
xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 47f31a80b6facdb274ecf970ab76eba9697dae07ba7f5c19836f03354e314e9b
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 67a374490f84647d0157dbcc156b756bea338c33d53ef889ed3624ba936dee60
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 94de19e608bfa08838376a30b2a5f3bfc2e0e280ba18a57a36e91301ac50067c
xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 945abd4d3bda3178538ee82a96d9ea49efdc0ebd8147ed3da99d3f501351c569
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 1c837f35c73a3b4fcc9525d797e61732e98c8d48425f3d9cbabfa85b28bcdeb0
xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: dceadd5b81837dbb4096267573bd7cada92012973d0d20f8436333ad7b0ccb53
xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.x86_64.rpm SHA-256: 0e646b83fbed436af85440c2c8f724a9b7ffc3f30fef2712918a75859d9262c3
i386
xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: 91b38d4a8bdd4e48b76819e4b4bfed53c58beee868f5241eb4c36631e6c2ce1f
xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: 2b4376fb8eac14add8dd307bcda6b3b6ca6f4c9344f36a8bb6d2fc6ee2a6ae4b
xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: b1dc8cd859c45eb2fc96fcb468701765a9dae6cbeb48cec90db114e7610752e0
xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: dbe7ae5a70afa03f5aeca6088d4925c7aecf468f63106e0b87f632a67b110d09
xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: fa7cd0deeaf22f81bb74c19c5584ff0e44725a00f37bd2041c568f3a67ccac85
xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: cb70975c4232c16ed530fff4a6839fd9e896d915c31380b57f6792166f8e154f
xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.i386.rpm SHA-256: b457b3e2836cc103828804567693f9f0eb4a94f9798e239f324df59021307a1b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility