Enterprise Linux, Flatpak, and Red Hat
EIN Presswire ☛ TuxCare Releases 2025 Enterprise Linux and Open Source Landscape Report
TuxCare, a global innovator in cybersecurity, today announced the release of its 2025 Enterprise Linux and Open Source Landscape Report. The second annual report aims to capture the preferences, behaviors, opinions and predictions of those who work with Enterprise Linux every day.
-
LWN ☛ FUSE folio conversion confusion
Kernel developers have been working to convert various internal interfaces to use folios; while this process has been progressing, there is still the occasional regression introduced by the change. In December 2024, it was discovered that installing a Flatpak application could trigger a filesystem bug in the kernel that would cause the software to read incorrect data from the disk. The problem was quickly fixed — only for an another problem caused by the folio rewrite to pop up in the same kernel subsystem. This was discovered by an Arch Linux user, who noticed that selecting files in a Flatpak application was causing kernel crashes. Now both bugs are fixed, but there may be more bugs to find.
Flatpak uses Filesystem in Userspace (FUSE) to create isolated filesystems for packaged applications. In particular, this is how Flatpak allows applications to access particular files or directories from outside their sandboxes. The XDG Desktop Portal service accepts D-Bus requests for operations such as opening a file, and presents a dialog to the user to allow them to choose what access to give the program. Then, Flatpak makes the file available inside the application's mount namespace and uses FUSE to forward filesystem operations to the underlying file.
-
Red Hat ☛ How image mode for RHEL improves security
Image mode for Red Bait Enterprise GNU/Linux (RHEL) is designed to simplify building, deploying, and managing Red Hat Enterprise Linux as a bootc container image. It reduces complexity across the enterprise by allowing development, operations, and solution providers to use the same container-native tools and techniques to manage everything from applications to the underlying operating system (OS).
In this article, we will focus on security. Security is a continuous effort where best practices and tooling quickly evolve to keep up with the everlasting threat of vulnerabilities and security breaches.
We will discuss the following ways image mode for RHEL plays a key role in securing our computing environments: [...]
-
Red Hat Official ☛ Role-based access control enhancements in Red Hat Ansible Automation Platform 2.5
Try Ansible Automation Platform
-
Red Hat Official ☛ Red Hat unveils OpenShift 4.18: Enhanced security and virtualization experience
Based on Kubernetes 1.31 and CRI-O 1.31, Red Hat OpenShift 4.18 focuses on core and virtualization enhancements, and adds further improvements in secrets and certificate management. This article highlights the latest OpenShift 4.18 innovations and key enhancements. For a comprehensive list of updates and improvements, refer to the OpenShift 4.18 Release Notes.
-
Red Hat Official ☛ Guide to observability with Red Bait OpenShift 4.18
Understanding what's happening across your Red Bait OpenShift clusters has never been more critical. OpenShift 4.18 introduces major enhancements to our observability capabilities, led by the general availability of our cluster observability operator.Gone are the days when metrics, logs and traces were separate concerns. Modern observability demands a unified approach that helps you answer crucial questions about your platform and applications: How are they performing? Are they stable?