Red Hat Enterprise Linux 7.7 to be Available

New version of popular Linux discributive brings a lot of updates and innovations
07 August 2019   670

Red Hat has released the Red Hat Enterprise Linux 7.7 distribution. The installed RHEL 7.7 images are available for download only for registered users of the Red Hat Client Portal and are prepared for the x86_64, IBM POWER7 +, POWER8 architecture (with direct byte order and direct byte order) and IBM System z. Source text packages can be downloaded from the CentOS project's Git repository.

With Red Hat Enterprise Linux 7.7, we show our continued commitment to the 10-year Red Hat Enterprise Linux lifecycle while also introducing key new features, like image builder and Red Hat Insights, to help IT organizations get the most from their existing Red Hat Enterprise Linux 7 investments.
 

Stefanie Сhirasvice

President and general manager, Red Hat Enterprise Linux, Red Hat

The RHEL 7.x branch is followed by the RHEL 8.x branch and will be supported until June 2024. The release of RHEL 7.7 is the latest in the main full support phase, which includes functional improvements. RHEL 7.8 Transition to the maintenance stage, bug fixes and security related to the support of important hardware systems.

New version has a lot of updates and changes. Among the:

  • Provided full support for the use of the mechanism of Live-patches (kpatch) to eliminate vulnerabilities in the Linux kernel without restarting the system and without stopping work. Previously, kpatch was an experimental feature;
  • Added python3 packages with Python 3.6 interpreter. Previously, Python 3 was only shipped with Red Hat Software Collections. By default, Python 2.7 is still offered (the transition to Python 3 was done in RHEL 8);
  • Screen presets (/etc/xdg/monitors.xml) have been added to the Mutter window manager for all users in the system (you no longer need to separately configure screen settings for each user;

Learn about them on the official website.

Suricata 5.0 to be Available

Suricata is a cybersecurity solution, an intrusion detection system and intrusion prevention system with opened source code
16 October 2019   115

OISF (Open Information Security Foundation) has published the release of Suricata 5.0, a network intrusion detection and prevention system that provides inspection tools for various types of traffic. In Suricata configurations, it is permissible to use the signature database developed by the Snort project, as well as the Emerging Threats and Emerging Threats Pro rule sets. The source code for the project is distributed under the GPLv2 license.

Some of the major changes:

  • New log parsing and logging modules for RDP, SNMP and SIP protocols written in Rust are introduced;
  • In addition to support for the JA3 TLS client authentication method that appeared in the previous release, support for the JA3S method is added, which allows to determine which software is used to establish the connection based on the connection negotiation features and parameters that are set (for example, it allows you to determine the use of Tor and other typical applications);
  • An experimental ability to compare with a selection from large data sets has been added, implemented using the new dataset and datarep operations. For example, the feature is applicable for searching masks in large blacklists with millions of entries;

Get more info at official website.