HTTP/2 200 cache-control: max-age=900, public content-language: en content-type: text/html; charset=UTF-8 etag: W/"1561130475" expires: Sun, 19 Nov 1978 05:00:00 GMT last-modified: Fri, 21 Jun 2019 15:21:15 GMT link: ; rel="canonical" link: ; rel="shortlink" link: ; rel="revision" server: nginx x-content-type-options: nosniff x-drupal-cache: HIT x-drupal-dynamic-cache: HIT x-frame-options: SAMEORIGIN x-generator: Drupal 8 (https://www.drupal.org) x-pantheon-styx-hostname: styx-fe2-a-5757c8d457-fn9lp x-styx-req-id: 57e8715c-b8b8-459f-ad93-0ba4f1256ddf x-ua-compatible: IE=edge via: 1.1 varnish accept-ranges: bytes date: Fri, 21 Jun 2019 17:25:02 GMT via: 1.1 varnish age: 40 x-served-by: cache-mdw17348-MDW, cache-yul8925-YUL x-cache: HIT, HIT x-cache-hits: 1, 1 x-timer: S1561137903.902435,VS0,VE1 vary: Accept-Encoding, Cookie, Cookie, Cookie content-length: 51230 GNOME 3.33.3 Released, Kernel Security Updates for RHEL and CentOS, Wine Developers Concerned with Ubuntu 19.10 Dropping 32-Bit Support, Bzip2 to Get an Update and OpenMandriva Lx 4.0 Now Available | Linux Journal Skip to main content [1]
Synaptic Web News
GNOME 3.33.3 Released, Kernel Security Updates for RHEL and CentOS, Wine Developers Concerned with Ubuntu 19.10 Dropping 32-Bit Support, Bzip2 to Get an Update and OpenMandriva Lx 4.0 Now Available
- Written by: J D
- Category: News
- Hits: 360
News briefs for June 21, 2019.
GNOME 3.33.3 was released[2] yesterday. Note that this release is development code and is intended for testing purposes. Go here[3] to see the list of modules and changes, get the BuildStream project snapshot here[4] or get the source packages here[5].
Red Hat Enterprise Linux and CentOS Linux have received new kernel security updates to address the recent TCP vulnerabilities. Softpedia News reports[6] that "The new Linux kernel security updates patch an integer overflow flaw (CVE-2019-11477[7]) discovered by Jonathan Looney in Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments, which could allow a remote attacker to cause a so-called SACK Panic attack (denial of service) by sending malicious sequences of SACK segments on a TCP connection