Enterprise Linux Log

Jan 18 2011   1:56AM GMT

RHEL 5.6 boasts new bug and security fixes



Posted by: Ryan Arsenault
Tags:
Linux
Linux security
open source
Red Hat
Red Hat Enterprise Linux

Though Red Hat Enterprise Linux (RHEL) 6 may have just been released in November, RHEL 5 still has a lot left in the tank: Red Hat just announced version 5.6 of the platform with a host of new bug and security fixes.

Overall fixes in RHEL 5.6 number approximately 2,000, and there are 340 individual enhancements. Some of the security enhancements include updated Domain Name Service (DNS) packages – RHEL 5.6 improves the cryptographic signatures that are good for high-security installations such as in government organizations.

There is also now support for sVirt (SELinux virtualization), which allows Mandatory Access Control (MAC) profiles to be applied to virtual guests, enhancing the system’s security. In addition, ebtables, a Layer 2 firewall application, is introduced in RHEL 5.6. With this application, those using RHEL for large virtualized deployments can securely partition guest traffic with the application while configuring using multiple software bridges within RHEL.

Security enhancements aside, there is also a wealth of other improvements in Red Hat Enterprise Linux 5.6, including support for new processors and chipsets. RHEL 5 will continue to be updated until 2014 by Red Hat. For more on the update, check out SearchDataCenter.com’s news brief and Red Hat’s blog.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: