Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Servers

    Red Hat Releases New Linux Update

    Written by

    Steven J. Vaughan-Nichols
    Published September 7, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Red Hat Inc. Tuesday released its latest patch, Update 3, to its flagship server operating system, Red Hat Enterprise Linux 3.

      RHEL(Red Hat Enterprise Linux)subscribers can download this latest update from the Red Hat Network. This latest Red Hat update features several security enhancements, which had originally been targeted for delivery in early 2005.

      The new updates security features includes Exec-shield and PIE (Position Independent Executable) features. These provide protection against stack, buffer or function pointer overflows, and against other types of security exploits that rely on overwriting data structures in memory.

      Exec-shield works by having the kernel transparently track how programs map their memory, and maintains a maximum executable address value for each application, the exec-limit. Exec-shield works transparently, so there is no need to rewrite or recompile any applications for it to work.

      PIE works with Exec-shield by randomly selecting where a particular program will reside in main memory. This way, attacks that depend on insider knowledge of how an application normally allocates its memory, will fail.

      In addition, Red Hat has extended NX (No Execute) support from the Intel Corp. Itanium2 processor family to include other chips that can be made to support it such as the Intel x86, Intel EM64T (Extended Memory 64 Technology) and the AMD64 processors.

      NX prevents programs from executing in specific areas of memory, such as the stack or the heap, which shouldnt be used. The use of NX prevents many common buffer overflow vulnerabilities. Microsoft Corp. also uses NX in XP SP2.

      “Everything thats old is new again. This was an important part of the [Digital Equipment Corp.] VAX architecture back in the early 1980s. Closing openings to malicious code is a very important part of the evolution of Linux,” said Dan Kusnetzky, IDCs system software program vice president.

      Update 3 also includes Ximians Evolution Connector for Microsoft Exchange. This enables Linux e-mail clients, specifically Ximian Evolution, to log into Microsoft Exchange servers as if they were Outlook clients.

      In addition, Update 3 includes many smaller improvements to existing programs, more and improved device drivers and support for additional IBMs POWER5 platforms.

      “The early release of several security enhancements with RHEL 3 Update 3 highlights the talent of Red Hat engineering and the pressure to integrate innovative security services,” said Stacey Quandt, open source practice leader for the Robert Frances Group.

      “Fundamental changes in the security capabilities of Linux are vital since it is positioned as the No. 2 operating system based on new server shipments after Microsoft Windows.” Quandt continued. “However, advances in operating system security are only as good as the users who take advantage of them. How secure an IT infrastructure is will not only vary based on the Linux distribution and Microsoft product and service pack deployed, but also by what customers choose to implement.”

      Check out eWEEK.coms Linux & Open Source Center for the latest open-source news, reviews and analysis.

      Be sure to add our eWEEK.com Linux news feed to your RSS newsreader or My Yahoo page

      Steven J. Vaughan-Nichols
      Steven J. Vaughan-Nichols
      I'm editor-at-large for Ziff Davis Enterprise. That's a fancy title that means I write about whatever topic strikes my fancy or needs written about across the Ziff Davis Enterprise family of publications. You'll find most of my stories in Linux-Watch, DesktopLinux and eWEEK. Prior to becoming a technology journalist, I worked at NASA and the Department of Defense on numerous major technological projects.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×