Security

Featured image for: SCTP over UDP in the Linux kernel.
Article

How SELinux deny rules improve system security

Petr Lautrbach

Learn how you can now use deny rules to remove SELinux permissions from the base SELinux policy or a module with the new SELinux userspace release 3.6.

A code editor with four icons symbolizing DevOps, developers, a gear, and a cluster.
Article

How we use software provenance at Red Hat

Ralph Bean

Learn about attestations from a neutral observer and how to make meaningful decisions about artifacts at release time, enabling flexibility and safety.

Featured image for: Value range propagation in GCC with Project Ranger.
Article

GCC and gcc-toolset versions in RHEL: An explainer

Benjamin Blasco

Red Hat Enterprise Linux strategically utilizes different GNU Compiler Collection (GCC) versions to ensure both stability and access to new compiler features.

containers
Article

My advice on SELinux container labeling

Daniel Walsh

Dan Walsh dives into how container engines Podman and Docker handle SELinux, a crucial security solution for file system protection.