Tuesday, December 30, 2025
OpenBGPD 9.0 released
OpenBGPD directory of your local OpenBSD mirror soon.
This release includes the following changes to the previous release:
* Rewrite the Adj-RIB-Out handling to be more memory efficent
and faster. For large IXP route server deployments a reduction
in memory usage of more than 50% should be feasible.
* Process UPDATE messages in two phases: first update Adj-RIB-In,
Loc-RIB, and FIB, then process all the Adj-RIB-Out tables.
This significantly reduces the latency since updating all the
Adj-RIB-Out tables could take a fair amount of time.
* Introduce CH hash tables - a scalable hash map implementation
that boosts performance through improved cache locality.
* Introduce new metrics that track the amount of time spent in
various parts of the main event loop of the route decision engine.
* Fix various non-criticial things uncovered by Coverity scanner.
OpenBGPD-portable is known to compile and run on FreeBSD and the
Linux distributions Alpine, Debian, Fedora, RHEL/CentOS and Ubuntu.
It is our hope that packagers take interest and help adapt OpenBGPD-portable
to more distributions.
We welcome feedback and improvements from the broader community.
Thanks to all of the contributors who helped make this release
possible.
Tuesday, December 23, 2025
F44 System-Wide Changes Submission Deadline is Today
Hi Folks,
If you are thinking of submitting a System Wide[1] change for Fedora Linux 44 today is the last day to submit. The deadline for Self Contained changes is January 13, 2026.
While your changes do not need to be complete by the submission deadlines, please bear in mind that all changes are required to be in a 'testable'[2] state by February 3, 2026, and 'complete' by February 17, 2026.
For a full list of key dates in this release cycle, please refer to our schedule[3].
Kind regards,
Allison
[1] https://docs.fedoraproject.org/en-US/program_management/changes_policy/#_change_categories
[2] https://docs.fedoraproject.org/en-US/program_management/changes_policy/#_change_process_milestones
[3] https://fedorapeople.org/groups/schedule/f-44/f-44-key-tasks.html
Saturday, December 20, 2025
Inactive packagers removed from the packager group
Today, 2025-12-20, we have removed inactive packagers
from the packager group.
This is in accordance with the FESCo policy on inactive packagers:
https://docs.fedoraproject.org/en-US/fesco/Policy_for_inactive_packagers/
If the removed user is 'main admin' for a package, this package
will be orphaned. If there are co-maintainers for the package,
one of them should take the role of 'main admin',
by clicking "✋ Take" on
`https://src.fedoraproject.org/rpms/<package>`".
Otherwise any packager may take the package while it's orphaned.
After 6 weeks, the package will be retired.
After another 8 weeks, a new review is needed to unretire it.
see https://docs.fedoraproject.org/en-US/fesco/Policy_for_orphan_and_retired_packages/
for more details.
More details available in
https://pagure.io/fedora-infrastructure/issue/12891
Packages that have been orphaned are:
flatpaks/libreoffice
rpms/bashmount
rpms/btrfs-progs
rpms/ccache
rpms/ceres-solver
rpms/cl-asdf
rpms/cockpit-composer
rpms/common-lisp-controller
rpms/cvsps
rpms/deco
rpms/deco-archive
rpms/et
rpms/fctxpd
rpms/geany
rpms/gecode
rpms/golang-github-alibabacloud-debug
rpms/golang-github-alibabacloud-tea
rpms/golang-github-aliyun-cli
rpms/golang-github-aliyun-credentials
rpms/golang-github-aliyun-ossutil
rpms/golang-github-alyu-configparser
rpms/golang-github-droundy-goopt
rpms/golang-github-dustinkirkland-petname
rpms/golang-github-gehirninc-crypt
rpms/golang-github-haproxytech-client-native
rpms/golang-github-haproxytech-config-parser
rpms/golang-github-haproxytech-logger
rpms/golang-github-lestrrat-apache-logformat
rpms/golang-github-lestrrat-envload
rpms/golang-github-lestrrat-strftime
rpms/golang-github-nathanaelle-syslog5424-2
rpms/golang-github-rodaine-hclencoder
rpms/golang-github-shulhan-bindata
rpms/ikona
rpms/java-jd-decompiler
rpms/libfaketime
rpms/libstatgrab
rpms/lxsplit
rpms/mingw-jansson
rpms/mingw-speexdsp
rpms/mingw-yaml-cpp
rpms/multimedia-menus
rpms/muse
rpms/nodejs-rhea
rpms/nodejs-underscore
rpms/openjdk-asmtools
rpms/perl-Alien-Packages
rpms/perl-Log-Any
rpms/perl-MooX-Log-Any
rpms/perl-MooX-Roles-Pluggable
rpms/perl-Net-Twitter
rpms/perl-Unix-Statgrab
rpms/perl-WWW-Shorten
rpms/phototonic
rpms/python3-gql
rpms/python-novaclient-os-networks
rpms/python-octaviaclient
rpms/python-pyvat
rpms/qclib
rpms/qt5-qtwebchannel
rpms/qt5-qtwebsockets
rpms/rcs
rpms/rubygem-bacon-colored_output
rpms/rubygem-codeclimate-test-reporter
rpms/rubygem-diffy
rpms/rubygem-generator_spec
rpms/rubygem-ipaddress
rpms/rubygem-minitest-around
rpms/rubygem-mixlib-cli
rpms/rubygem-mixlib-config
rpms/rubygem-mixlib-shellout
rpms/rubygem-nifti
rpms/rubygem-powerpack
rpms/rubygem-systemu
rpms/serafettin-cartoon-fonts
rpms/smaclient
rpms/systemd-bootchart
rpms/twirssi
rpms/uchardet
rpms/vera++
rpms/ws-commons-util
tests/scap-security-guide
tests/scap-workbench
--
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[arch-announce] NVIDIA 590 driver drops Pascal support; main packages switch to Open Kernel Modules
**Impact:** Updating the NVIDIA packages on systems with Pascal, Maxwell, or older cards will fail to load the driver, which may result in a broken graphical environment.
**Intervention required for Pascal/older users:** Users with GTX 10xx series and older cards must switch to the legacy proprietary branch to maintain support:
* Uninstall the official `nvidia`, `nvidia-lts`, or `nvidia-dkms` packages.
* Install `nvidia-580xx-dkms` from the AUR
Users with Turing (20xx and GTX 1650 series) and newer GPUs will automatically transition to the open kernel modules on upgrade and require no manual intervention.
URL: https://archlinux.org/news/nvidia-590-driver-drops-pascal-support-main-packages-switch-to-open-kernel-modules/
Friday, December 19, 2025
F44 Change Proposal: StopCreatingDefaultNetworkProfilesByAnaconda [SystemWide]
Discussion Thread: https://discussion.fedoraproject.org/t/177637
**This is a proposed Change for Fedora Linux.**
This document represents a proposed Change. As part of the Changes process, proposals are publicly announced in order to receive community feedback. This proposal will only be implemented if approved by the Fedora Engineering Steering Committee.
== Summary ==
Traditionally Anaconda installer used to create default network profiles (NetworkManager ifcfg files or keyfiles) on the installed sytem for each wired device. With the change only ... [truncated]
== Owner ==
* Name: [[User:rvykydal| Radek Vykydal]]
* Email: rvykydal@redhat.com
== Detailed Description ==
The reasons for the current behavior - creating of the default profiles for each wired network device - were from large part technical, imposed by the architecture of the installer network configuration module. The Anaconda default profiles were created at the initial stage of installation from NetworkManager connections where possible - either by dumping a connection (for example 'Wired Connection' created in initramfs) - or cloning a default connection ('Wired Connection 1' created after switchroot) with connection id updated to the interface name. In cases where reusing the connection created by NM was not possible Anaconda created new connection on its own via NetworkManager API. In some cases Anaconda was also updating some values of the connections like addr-gen-mode.
Over the years there were requests from the users to stop creating the profiles for unconfigured devices - only the devices configured in installer should have persistent profile created on the installed system. The updates in the NewtworkManager backend and its integration in the installer, together with improved CI coverage, now allows to drop the default connections and by this also to address several long term issues:
* There were bugs reported related to the default connections present on the installed system unexpectedly by the users (https://bugzilla.redhat.com/show_bug.cgi?id=2031385#c8, https://bugzilla.redhat.com/show_bug.cgi?id=2115783, https://issues.redhat.com/browse/RHEL-100200). In some cases the profiles prevented proper activation of virtual connections configured by the user. The issues were usually addressed by installer by updating already complex logic for management of the profiles by the installer. For port devices installer already stopped to create the profiles recently (https://github.com/rhinstaller/anaconda/pull/5703).
* On the Live ISO installations (as Fedora Workstation) the installer network configuration UI and the connection management had to be disabled because it was conflicting with the Gnome configuration tools present in the environment. In scope of the ongoing move towards the WebUI graphical user interface the installer team aims to provide UI that can seamlessly integrate with other tools, usable both in Live ISO environment and installer image environment (for example Server variant using Netinst ISO or DVD ISO), preferably reusing Cockpit network configuration module. This requires dropping some parts of installer network connections management - with this change being an important step (see https://issues.redhat.com/browse/INSTALLER-3088).
* Significant part of installer users work around the current behavior by removing the default connections created by installer in their custom kickstart '%post' scripts or other installation post-processing ([https://pagure.io/fedora-kickstarts/blob/f43/f/fedora-cloud-base.ks#_146 fedora-cloud-base.ks] for example).
* There was already a request from NetworkManager side for installer team to drop creating of default profiles: https://github.com/rhinstaller/anaconda/pull/1588. Installer team was not able to prioritize it to be addressed yet.
== Feedback ==
The feedback we were getting from the community over the past years was asking for removing of the default Anaconda profiles, as pointed out in the **Detailed Description**.
On the other hand we may expect negative feedback triggered by potential need for adaptation to the new behavior.
== Benefit to Fedora ==
* Improved consistency - persistent profiles exist only for configured devices.
* Single point of truth for defaults - installer steps out of the business of creating default network profiles (name, id, binding) and even setting its default values.
* User perspective: no unexpected network configuration produced by installation. Workarounds for removing undesired profiles in post installation steps are no more needed.
* More flexibility for network configuration tooling choices in the installer environment (like LiveISO).
* Makes shared use of Cockpit network configuration module in installer WebUI for non-live ISO variants feasible.
== Scope ==
* Proposal owners: replace the DumpMissingConfigFiles API with API for just persisting initramfs configuration. The work is in advanced progress in https://github.com/rhinstaller/anaconda/pull/6787.
* Other developers: potentially adapt scripts and tools assuming existence of the persistent profiles for non-configured devices
* Release engineering: [https://pagure.io/releng/issues #Releng issue number]
* Policies and guidelines: N/A (not needed for this Change)
* Trademark approval: N/A (not needed for this Change)
* Alignment with the Fedora Strategy:
== Upgrade/compatibility impact ==
Upgrades impact: none, the change is applied only to newly installed systems.
Compatibility impact: automation tools used to post process network configuration of systems after installation might need adjustments if they are working with network profiles without verifying its existence
== Early Testing (Optional) ==
Do you require 'QA Blueprint' support? Y/N
== How To Test ==
The change can be tested by installing Fedora variants which are using installer environment iso (boot.iso, netinst or DVD, for example Fedora Server) on various installation scenarios with or without network configuration in installer:
* via boot options (for example 'ip=dhcp', 'ip=enp1s0:dhcp')
* via kickstart ('network' command)
* via text UI
* via Gtk UI
The devices not configured by any of these means should not have persistent configuration profile on installed system (in '/etc/NetworkManager/system-connecitons'). See also the examples in the **User Experience** section.
== User Experience ==
**Example 1**: Fedora Server Network Installation, no network configuration during installation.
*Without the change* - state after installed system reboot:
root@ibm-p8-kvm-03-guest-02:~# nmcli con
NAME UUID TYPE DEVICE..
enp0s22 2c4fb9f7-feab-3c4e-a4d5-549b34feab67 ethernet enp0s22.
lo eff6e9ee-ffe6-4cd8-8d91-a131d75ccdaf loopback lo......
root@ibm-p8-kvm-03-guest-02:~# ls /etc/NetworkManager/system-connections/
enp0s22.nmconnection
root@ibm-p8-kvm-03-guest-02:~# cat /etc/NetworkManager/system-connections/enp0s22.nmconnection.
[connection]
id=enp0s22
uuid=2c4fb9f7-feab-3c4e-a4d5-549b34feab67
type=ethernet
autoconnect-priority=-999
interface-name=enp0s22
timestamp=1765956677
[ethernet]
[ipv4]
method=auto
[ipv6]
addr-gen-mode=eui64
method=auto
[proxy]
*With the change* - state after installed system reboot:
root@ibm-p8-kvm-03-guest-02:~# nmcli con
NAME UUID TYPE DEVICE..
Wired connection 1 3500649e-c341-3a36-bb89-02e29d6f6f4f ethernet enp0s22.
lo 4147084d-dedd-4513-aed2-bb8ecbe0b26e loopback lo......
root@ibm-p8-kvm-03-guest-02:~# ls /etc/NetworkManager/system-connections/
root@ibm-p8-kvm-03-guest-02:~# ls /run/NetworkManager/system-connections/
lo.nmconnection 'Wired connection 1.nmconnection'
root@ibm-p8-kvm-03-guest-02:~# cat /run/NetworkManager/system-connections/Wired\ connection\ 1.nmconnection.
[connection]
id=Wired connection 1
uuid=3500649e-c341-3a36-bb89-02e29d6f6f4f
type=ethernet
autoconnect-priority=-999
interface-name=enp0s22
timestamp=1765959194
[ethernet]
[ipv4]
method=auto
[ipv6]
addr-gen-mode=default
method=auto
[proxy]
[.nmmeta]
nm-generated=true
**Example 2**: Fedora Server DVD installation with network device unplugged during installation and plugged in before booting installed system. No network configuration during installation.
*Without the change* - state after installed system reboot:
root@dhcp193:~# nmcli con
NAME UUID TYPE DEVICE.
lo 60c2b452-c923-44b7-b119-484f1fc119dc loopback lo.....
enp1s0 f986e267-90bc-4e3a-bc89-d16ffa581246 ethernet --.....
root@dhcp193:~# ls /etc/NetworkManager/system-connections/
enp1s0.nmconnection
root@dhcp193:~# ls /run/NetworkManager/system-connections/
lo.nmconnection
root@dhcp193:~# cat /run/NetworkManager/system-connections/enp1s0.nmconnection
[connection]
id=enp1s0
uuid=f986e267-90bc-4e3a-bc89-d16ffa581246
type=ethernet
autoconnect=false
interface-name=enp1s0
[ethernet]
[ipv4]
method=auto
[ipv6]
addr-gen-mode=eui64
method=auto
[proxy]
*With the change* - state after installed system reboot (is the same as in Example 1):
root@dhcp193:~# nmcli con
NAME UUID TYPE DEVICE
Wired connection 1 9196327c-a909-3cda-8733-06d6c77546f9 ethernet enp1s0
lo 64f89f2c-85c8-40eb-92bf-b6712e3162d5 loopback lo
root@dhcp193:~# ls /etc/NetworkManager/system-connections/
root@dhcp193:~# ls /run/NetworkManager/system-connections/
lo.nmconnection 'Wired connection 1.nmconnection'
root@dhcp193:~# cat /run/NetworkManager/system-connections/Wired\ connection\ 1.nmconnection
[connection]
id=Wired connection 1
uuid=9196327c-a909-3cda-8733-06d6c77546f9
type=ethernet
autoconnect-priority=-999
interface-name=enp1s0
timestamp=1765961287
[ethernet]
[ipv4]
method=auto
[ipv6]
addr-gen-mode=default
method=auto
[proxy]
[.nmmeta]
nm-generated=true
== Dependencies ==
It is possible that some Anaconda installer clients performing installed system post processing will need to adapt to the change, expecting the Anaconda default profiles existing (for their modification, removal, etc).
Regarding system management / configuration tools, I think the risk they may assume the profiles existing on the installed system is reasonably small, and the tools should be able to handle their removing without issues.
== Contingency Plan ==
* Contingency mechanism: Reverting the change.
* Contingency deadline: Beta freeze
* Blocks release? No
== Documentation ==
I am not aware of the current behavior being documented anywhere else then in the [https://anaconda-installer.readthedocs.io/en/latest/autoapi/pyanaconda/modules/network/network_interface/index.html#pyanaconda.modules.network.network_interface.NetworkInterface.DumpMissingConfigFilesWithTask DumpMissingConfigFiles API].
The new behavior should be the one users would expected by default, so no explicit documentation is required.
The change of behavior will be documented in release notes.
== Release Notes ==
F44 Change Proposal: Java21RemovedEarlierThenScheduled [SelfContained]
Discussion Thread: https://discussion.fedoraproject.org/t/177636
**This is a proposed Change for Fedora Linux.**
This document represents a proposed Change. As part of the Changes process, proposals are publicly announced in order to receive community feedback. This proposal will only be implemented if approved by the Fedora Engineering Steering Committee.
== Summary ==
Remove java-21-openjdk already from F44, rather then F45 as was originally announced
[[Changes/ThirdPartyLegacyJdks| here]] and
[[Changes/Java25AndNoMoreSystemJdk#Detailed_Description| here]]
== Owner ==
* Name: [[User:jvanek| Jiri Vanek]]
* Email: jvanek@redhat.com
== Detailed Description ==
Short preliminary [https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/thread/FSRDMFKF6VK5HIBXLMO3I72H2WSIEWAX/#V4ZMJ5S5ZISVPF7RZICCTMW3RJOIYMEP discussion] happened in early December without any strong opposition but with several good ideas. but From total java-stack(546 packages), only 26 requires jdk21 for build:
* apache-commons-modeler-0:2.0.1-43.fc42.src
* apache-commons-text-0:1.10.0-8.fc42.src
* apache-sshd-1:2.11.0-2.fc41.src
* decentxml-0:1.4-36.fc41.src
* fop-0:2.9-9.fc41.src
* Java-WebSocket-0:1.6.0-4.fc43.src
* l10n-maven-plugin-0:1.1.0-2.fc43.src
* maven-archetype-0:3.2.1.0.8b3bdb6-14.fc41.src
* resteasy-0:3.0.26-32.fc42.src
* xmlgraphics-commons-0:2.11-1.fc43.src
* javapoet-0:1.7.0-27.fc43.src
* java-runtime-decompiler-0:10.0-6.fc43.src
* jol-0:0.17-10.fc43.src
* juniversalchardet-0:2.4.0-16.fc43.src
* plexus-velocity-0:2.2.1-2.fc43.src
* stringtemplate4-0:4.3.4-9.fc43.src
* xbean-0:4.24-8.fc43.src
* xbean-0:4.24-9.fc43.src
* icedtea-web-0:1.8.8-10.fc43.src
* ldapjdk-0:5.6.0-0.1.alpha1.fc43.3.src
* ldapjdk-0:5.6.0-1.fc43.src
* mecab-java-0:0.996-14.fc43.src
* openjdk-asmtools-0:9.0.0.b12.ea.eb1979669-0.fc43.src
* mecab-java-0:0.996-14.fc43.src
* fop-0:2.9-9.fc41.src
* nekohtml-0:1.9.22-29.fc42.src
* jedit-0:5.6.0-8.fc43.src
From those aprox 10 is FTBFs even with java-21-openjdk, and the rest seems to be ok to switch to java-25-openjdk. This part will be elaborated on.
Once those packages are resolved, jdk21 will be removed from rawhide and the [https://src.fedoraproject.org/rpms/adoptium-temurin-java-repository/blob/rawhide/f/adoptium-temurin-java-repository.spec#_54 adoptium-temurin-java-repository package] will obsolete jdk21 in f44, and will warn about jdk21 being deprecated in f43 and down.
== Feedback ==
For now the headless subpakcage was rebuked as priority to fix on temurin side. Others may pop up.
== Benefit to Fedora ==
Benefit to distribution itself is controversial. A lot of development is focussed to Eclispe Temurins, but we failed to prepare proper 1:1 replacement in past.
Main benefit will be the spared cycles of developers who will maintain one less jdk for one less cycle. Main focus of saved cycles should be the 1:1 compatibility of Temurins with our RPMs.
Note, that side benefit of this is, that Temurin JDK rpms will become more like Fedora rpms, rather then "more like Debian" or similarly.
== Scope ==
* Proposal owners:
** We will help to migrate remaining packages to jdk25
** we will deprecate and remove jdk21
** we should improve temurin rpms to fit more
* Other developers:
** No work is expected
* Release engineering: N/A
* Policies and guidelines: N/A (not needed for this Change)
* Trademark approval: N/A (not needed for this Change)
* Alignment with the Fedora Strategy: ok, I think
== Upgrade/compatibility impact ==
User which was used to have several system JDKs will have one system JDK (25) and one rolling future jdk java-latest-openjdk (26 in that time) if applicable.
== Early Testing (Optional) ==
Do you require 'QA Blueprint' support? Y/N
== How To Test ==
todo
== User Experience ==
Change should be transparent to all users and power users.
Users will have latest JDK as soon as possible, as usual, and all Java packages should remain fully operational.
== Dependencies ==
* adoptium-temurin-java-repository as per schedule and description
* java-21-openjdk as per schedule and description
* remaining packages in javastack as per schedule and description
== Contingency Plan ==
* Return java-21-openjdk as it is
* Contingency deadline: beta freeze
* Blocks release? No
== Documentation ==
N/A for now
== Release Notes ==
\n
F44 Change Proposal: SplitRubyBuild [SelfContained]
Discussion Thread: https://discussion.fedoraproject.org/t/177635
**This is a proposed Change for Fedora Linux.**
This document represents a proposed Change. As part of the Changes process, proposals are publicly announced in order to receive community feedback. This proposal will only be implemented if approved by the Fedora Engineering Steering Committee.
== Summary ==
The `ruby-build` package will be split into a main package and several subpackages (`ruby-build-jruby`, `ruby-build-truffleruby`, ...). This allows users to install only the build dependencies required for their specific Ruby implementation, significantly reducing the default installation size and dependency footprint.
== Owner ==
* Name: [[User:mikelo2| Mikel Olasagasti]]
* Email: mikel@olasagasti.info
== Detailed Description ==
=== Motivation ===
Currently, the `ruby-build` spec file utilizes a comprehensive list of `Recommends` to ensure all possible Ruby implementations can be built. This monolithic approach forces the package manager to pull in a massive dependency chain by default.
For example, a default installation of `ruby-build` (which is a 323 KiB package) currently results in a transaction of 146 packages, requiring 404 MiB of downloads and occupying 2 GiB of disk space.
<pre>
# dnf install ruby-build
Updating and loading repositories:
Repositories loaded.
Package Arch Version Repository Size
Installing:
ruby-build x86_64 0:20251023-1.fc44 rawhide 323.4 KiB
Installing dependencies:
alsa-lib x86_64 0:1.2.15-4.fc44 rawhide 1.5 MiB
avahi-libs x86_64 0:0.9~rc2-6.fc43 rawhide 171.6 KiB
binutils x86_64 0:2.45.50-9.fc44 rawhide 27.0 MiB
clang-libs x86_64 0:21.1.7-1.fc44 rawhide 114.9 MiB
clang-resource-filesystem x86_64 0:21.1.7-1.fc44 rawhide 15.3 KiB
cmake-filesystem x86_64 0:3.31.10-3.fc44 rawhide 0.0 B
cpp x86_64 0:15.2.1-5.fc44 rawhide 38.0 MiB
cups-filesystem noarch 1:2.4.16-4.fc44 rawhide 0.0 B
cups-libs x86_64 1:2.4.16-4.fc44 rawhide 618.4 KiB
dbus-libs x86_64 1:1.16.0-4.fc43 rawhide 345.5 KiB
ed x86_64 0:1.22.3-1.fc44 rawhide 148.9 KiB
elfutils-debuginfod-client x86_64 0:0.194-2.fc44 rawhide 84.0 KiB
expat x86_64 0:2.7.3-1.fc44 rawhide 301.1 KiB
gcc x86_64 0:15.2.1-5.fc44 rawhide 111.9 MiB
gcc-c++ x86_64 0:15.2.1-5.fc44 rawhide 41.4 MiB
glibc-devel x86_64 0:2.42.9000-16.fc44 rawhide 2.3 MiB
groff-base x86_64 0:1.23.0-11.fc44 rawhide 3.8 MiB
info x86_64 0:7.2-7.fc44 rawhide 357.9 KiB
jansson x86_64 0:2.14-3.fc43 rawhide 89.1 KiB
javapackages-filesystem noarch 0:6.4.1-4.fc44 rawhide 2.0 KiB
kernel-headers x86_64 0:6.19.0-0.rc1.15.fc44 rawhide 6.9 MiB
libedit x86_64 0:3.1-57.20251016cvs.fc44 rawhide 240.2 KiB
libedit-devel x86_64 0:3.1-57.20251016cvs.fc44 rawhide 59.4 KiB
libmpc x86_64 0:1.3.1-8.fc43 rawhide 160.6 KiB
libpkgconf x86_64 0:2.3.0-3.fc43 rawhide 78.1 KiB
libstdc++-devel x86_64 0:15.2.1-5.fc44 rawhide 37.2 MiB
libxcrypt-devel x86_64 0:4.5.2-2.fc44 rawhide 31.0 KiB
libzstd-devel x86_64 0:1.5.7-3.fc44 rawhide 217.6 KiB
lksctp-tools x86_64 0:1.0.21-2.fc44 rawhide 251.0 KiB
llvm x86_64 0:21.1.7-1.fc44 rawhide 89.3 MiB
llvm-filesystem x86_64 0:21.1.7-1.fc44 rawhide 0.0 B
llvm-googletest x86_64 0:21.1.7-1.fc44 rawhide 2.4 MiB
llvm-libs x86_64 0:21.1.7-1.fc44 rawhide 138.6 MiB
llvm-static x86_64 0:21.1.7-1.fc44 rawhide 377.5 MiB
llvm-test x86_64 0:21.1.7-1.fc44 rawhide 2.3 MiB
make x86_64 1:4.4.1-11.fc43 rawhide 1.8 MiB
mpdecimal x86_64 0:4.0.1-2.fc43 rawhide 217.2 KiB
ncurses x86_64 0:6.5-8.20250614.fc44 rawhide 609.8 KiB
ncurses-c++-libs x86_64 0:6.5-8.20250614.fc44 rawhide 153.6 KiB
nspr x86_64 0:4.38.2-1.fc44 rawhide 315.5 KiB
nss x86_64 0:3.119.0-1.fc44 rawhide 1.9 MiB
nss-softokn x86_64 0:3.119.0-1.fc44 rawhide 2.0 MiB
nss-softokn-freebl x86_64 0:3.119.0-1.fc44 rawhide 990.8 KiB
nss-sysinit x86_64 0:3.119.0-1.fc44 rawhide 18.1 KiB
nss-util x86_64 0:3.119.0-1.fc44 rawhide 204.8 KiB
perl-AutoLoader noarch 0:5.74-520.fc43 rawhide 20.6 KiB
perl-B x86_64 0:1.89-520.fc43 rawhide 501.3 KiB
perl-Carp noarch 0:1.54-520.fc43 rawhide 46.6 KiB
perl-Class-Struct noarch 0:0.68-520.fc43 rawhide 25.4 KiB
perl-Data-Dumper x86_64 0:2.191-521.fc43 rawhide 115.6 KiB
perl-Digest noarch 0:1.20-520.fc43 rawhide 35.3 KiB
perl-Digest-MD5 x86_64 0:2.59-520.fc43 rawhide 59.7 KiB
perl-DynaLoader x86_64 0:1.57-520.fc43 rawhide 32.1 KiB
perl-Encode x86_64 4:3.21-520.fc43 rawhide 4.7 MiB
perl-Errno x86_64 0:1.38-520.fc43 rawhide 8.4 KiB
perl-Exporter noarch 0:5.79-520.fc43 rawhide 54.3 KiB
perl-Fcntl x86_64 0:1.20-520.fc43 rawhide 48.8 KiB
perl-File-Basename noarch 0:2.86-520.fc43 rawhide 14.0 KiB
perl-File-Path noarch 0:2.18-521.fc44 rawhide 63.5 KiB
perl-File-Temp noarch 1:0.231.200-1.fc44 rawhide 163.7 KiB
perl-File-stat noarch 0:1.14-520.fc43 rawhide 12.5 KiB
perl-FileHandle noarch 0:2.05-520.fc43 rawhide 9.4 KiB
perl-Getopt-Long noarch 1:2.58-520.fc43 rawhide 144.5 KiB
perl-Getopt-Std noarch 0:1.14-520.fc43 rawhide 11.2 KiB
perl-HTTP-Tiny noarch 0:0.090-521.fc43 rawhide 154.4 KiB
perl-IO x86_64 0:1.55-520.fc43 rawhide 147.4 KiB
perl-IO-Socket-IP noarch 0:0.43-521.fc43 rawhide 100.3 KiB
perl-IO-Socket-SSL noarch 0:2.095-2.fc43 rawhide 714.5 KiB
perl-IPC-Open3 noarch 0:1.24-520.fc43 rawhide 27.7 KiB
perl-MIME-Base32 noarch 0:1.303-24.fc43 rawhide 30.7 KiB
perl-MIME-Base64 x86_64 0:3.16-520.fc43 rawhide 42.0 KiB
perl-Net-SSLeay x86_64 0:1.94-11.fc43 rawhide 1.3 MiB
perl-POSIX x86_64 0:2.23-520.fc43 rawhide 231.4 KiB
perl-PathTools x86_64 0:3.94-520.fc43 rawhide 180.0 KiB
perl-Pod-Escapes noarch 1:1.07-520.fc43 rawhide 24.9 KiB
perl-Pod-Perldoc noarch 0:3.28.01-521.fc43 rawhide 163.7 KiB
perl-Pod-Simple noarch 1:3.47-3.fc43 rawhide 565.3 KiB
perl-Pod-Usage noarch 4:2.05-520.fc43 rawhide 86.3 KiB
perl-Scalar-List-Utils x86_64 5:1.70-1.fc43 rawhide 144.9 KiB
perl-SelectSaver noarch 0:1.02-520.fc43 rawhide 2.2 KiB
perl-Socket x86_64 4:2.040-2.fc43 rawhide 120.3 KiB
perl-Storable x86_64 1:3.37-521.fc43 rawhide 231.2 KiB
perl-Symbol noarch 0:1.09-520.fc43 rawhide 6.8 KiB
perl-Term-ANSIColor noarch 0:5.01-521.fc43 rawhide 97.5 KiB
perl-Term-Cap noarch 0:1.18-520.fc43 rawhide 29.3 KiB
perl-Text-ParseWords noarch 0:3.31-520.fc43 rawhide 13.6 KiB
perl-Text-Tabs+Wrap noarch 0:2024.001-520.fc43 rawhide 22.6 KiB
perl-Time-Local noarch 2:1.350-520.fc43 rawhide 69.0 KiB
perl-URI noarch 0:5.34-2.fc44 rawhide 268.0 KiB
perl-base noarch 0:2.27-520.fc43 rawhide 12.6 KiB
perl-constant noarch 0:1.33-521.fc43 rawhide 26.2 KiB
perl-if noarch 0:0.61.000-520.fc43 rawhide 5.8 KiB
perl-interpreter x86_64 4:5.42.0-520.fc43 rawhide 118.6 KiB
perl-libnet noarch 0:3.15-521.fc43 rawhide 289.4 KiB
perl-libs x86_64 4:5.42.0-520.fc43 rawhide 11.5 MiB
perl-locale noarch 0:1.13-520.fc43 rawhide 6.1 KiB
perl-mro x86_64 0:1.29-520.fc43 rawhide 41.6 KiB
perl-overload noarch 0:1.40-520.fc43 rawhide 71.6 KiB
perl-overloading noarch 0:0.02-520.fc43 rawhide 4.9 KiB
perl-parent noarch 1:0.244-520.fc43 rawhide 10.3 KiB
perl-podlators noarch 1:6.0.2-520.fc43 rawhide 317.5 KiB
perl-vars noarch 0:1.05-520.fc43 rawhide 3.9 KiB
pkgconf x86_64 0:2.3.0-3.fc43 rawhide 88.5 KiB
pkgconf-m4 noarch 0:2.3.0-3.fc43 rawhide 14.4 KiB
pkgconf-pkg-config x86_64 0:2.3.0-3.fc43 rawhide 989.0 B
python-pip-wheel noarch 0:25.3-1.fc44 rawhide 1.2 MiB
python3 x86_64 0:3.14.2-1.fc44 rawhide 28.9 KiB
python3-libs x86_64 0:3.14.2-1.fc44 rawhide 43.1 MiB
ruby-default-gems noarch 0:3.4.7-28.fc44 rawhide 66.1 KiB
ruby-libs x86_64 0:3.4.7-28.fc44 rawhide 15.1 MiB
rubygem-io-console x86_64 0:0.8.1-28.fc44 rawhide 33.2 KiB
rubygem-irb noarch 0:1.14.3-28.fc44 rawhide 290.3 KiB
rubygem-json x86_64 0:2.15.1-1.fc44 rawhide 222.3 KiB
rubygem-psych x86_64 0:5.2.2-28.fc44 rawhide 132.6 KiB
rubygem-rbs x86_64 0:3.8.0-28.fc44 rawhide 5.0 MiB
rubygem-rdoc noarch 0:6.14.2-201.fc44 rawhide 1.9 MiB
rubygems noarch 0:3.6.9-28.fc44 rawhide 1.4 MiB
rubypick noarch 0:1.1.1-23.fc43 rawhide 4.4 KiB
rust-std-static x86_64 0:1.92.0-1.fc44 rawhide 165.6 MiB
tzdata-java noarch 0:2025c-1.fc44 rawhide 100.2 KiB
Installing weak dependencies:
clang x86_64 0:21.1.7-1.fc44 rawhide 65.5 MiB
compiler-rt x86_64 0:21.1.7-1.fc44 rawhide 41.0 MiB
gdbm-devel x86_64 1:1.23-10.fc43 rawhide 82.0 KiB
java-25-openjdk-headless x86_64 1:25.0.1.0.8-1.fc44 rawhide 236.3 MiB
libatomic x86_64 0:15.2.1-5.fc44 rawhide 36.7 KiB
libffi-devel x86_64 0:3.5.2-1.fc44 rawhide 33.9 KiB
libomp x86_64 0:21.1.7-1.fc44 rawhide 2.8 MiB
libomp-devel x86_64 0:21.1.7-1.fc44 rawhide 1.5 MiB
libyaml-devel x86_64 0:0.2.5-17.fc43 rawhide 1.1 MiB
llvm-devel x86_64 0:21.1.7-1.fc44 rawhide 33.5 MiB
ncurses-devel x86_64 0:6.5-8.20250614.fc44 rawhide 893.4 KiB
openssl-devel x86_64 1:3.5.4-1.fc44 rawhide 4.6 MiB
patch x86_64 0:2.8-3.fc44 rawhide 226.6 KiB
perl-File-Compare noarch 0:1.100.800-520.fc43 rawhide 5.6 KiB
perl-FindBin noarch 0:1.54-520.fc43 rawhide 6.8 KiB
perl-NDBM_File x86_64 0:1.18-520.fc43 rawhide 28.5 KiB
python-unversioned-command noarch 0:3.14.2-1.fc44 rawhide 23.0 B
readline-devel x86_64 0:8.3-2.fc43 rawhide 595.8 KiB
ruby x86_64 0:3.4.7-28.fc44 rawhide 85.5 KiB
ruby-bundled-gems x86_64 0:3.4.7-28.fc44 rawhide 2.2 MiB
rubygem-bigdecimal x86_64 0:3.1.8-28.fc44 rawhide 134.7 KiB
rubygem-bundler noarch 0:2.6.9-28.fc44 rawhide 1.5 MiB
rubygem-rake noarch 0:13.3.0-101.fc43 rawhide 134.1 KiB
rust x86_64 0:1.92.0-1.fc44 rawhide 93.5 MiB
zlib-ng-compat-devel x86_64 0:2.3.2-2.fc44 rawhide 107.0 KiB
Transaction Summary:
Installing: 146 packages
Total size of inbound packages is 404 MiB. Need to download 404 MiB.
After this operation, 2 GiB extra will be used (install 2 GiB, remove 0 B).
</pre>
This includes heavy dependencies like `java-headless`, `rust`, `llvm`, and `clang`, even if the user only intends to build a standard MRI Ruby version.
This is the content of the spec that pulls all those dependencies:
<pre>
# ruby-build can build various ruby interpreters from source, which in turn can
# require additional dependencies
Recommends: bzip2
Recommends: clang
Recommends: gdbm-devel
Recommends: java-headless
Recommends: libffi-devel
Recommends: libyaml-devel
Recommends: llvm-devel
Recommends: make
Recommends: ncurses-devel
Recommends: openssl-devel
Recommends: patch
Recommends: perl-File-Compare
Recommends: perl-FindBin
Recommends: readline-devel
Recommends: ruby
Recommends: rubygem-rake
Recommends: rust
Recommends: zlib-devel
</pre>
=== Proposed Solution ===
The `ruby-build` package works by providing a collection of build definition files (simple text files) located in `/usr/share/ruby-build`. Each file defines how to download and compile a specific version of a Ruby interpreter like `3.2.2`, `jruby-9.4.0.0` or `truffleruby-22.3`.
This proposal changes the packaging structure to split `ruby-build` into modular subpackages based on these definition types. Each subpackage will provide the necessary build dependencies for a specific subset of definition files, matched by naming patterns. This ensures that if a user only intends to build standard MRI Ruby, they are not forced to install the build chain for JRuby or TruffleRuby.
The new package structure will be as follows:
* **ruby-build (Main Package)**
** Would be a meta-package requiring `ruby-build-core` and recommending `ruby-build-ruby`.
* **ruby-build-core**
** Contains the core binary (`/usr/bin/ruby-build`) and the man page.
** All target subpackages require this package and not `ruby-build` meta-package to avoid pulling `ruby-build-ruby` and its dependencies as recommended package.
* **ruby-build-ruby**
** Targets standard MRI/CRuby versions (definitions matching `^[0-9]*`).
** Requires: `gcc`, `perl-interpreter`, `perl(FindBin)`, `perl(lib)`, `perl(IPC::Cmd)`, `perl(File::Compare)`, `perl(File::Copy)`, `zlib-ng-compat-devel`, `libffi-devel`, `libyaml-devel`.
* **ruby-build-jruby**
** Targets JRuby versions (definitions matching `^jruby`).
** Requires: `java-latest-openjdk-headless`, `make`, `gcc-c++`.
* **ruby-build-mruby**
** Targets mruby versions (definitions matching `^mruby`).
** Requires: `ruby`, `rubygem-rake`.
* **ruby-build-picoruby**
** Targets PicoRuby versions (definitions matching `^pico`).
** Requires: `ruby`, `rubygem-rake`, `gcc`, `git-core`.
* **ruby-build-truffleruby**
** Targets TruffleRuby versions (definitions matching `^truffle`).
** Requires: `gcc`, `libyaml-devel`.
* **ruby-build-others**
** Targets less common implementations available via `rbenv install -L` (such as rbx, ree, etc.).
** Keeps the main dependency set clean.
* **ruby-build-all**
** Metapackage to install all subpackages
* **ruby-build-rbenv**
** Already exists
** Contains the ruby-build plugin for rbenv
The dependency lists are optimized for modern releases of these Ruby implementations.
== Feedback ==
== Benefit to Fedora ==
* Bloat Reduction: A default installation of `ruby-build` will drop from ~2 GiB to a few megabytes, respecting user resources.
* Modularity: Users and CI/CD systems can install exactly what they need without pulling in the entire Java ecosystem or Rust toolchain unnecessarily.
* Security: Reduces the attack surface on systems that do not need the JVM or legacy build tools.
== Scope ==
* Proposal owners: Change the spec to create the subpackages.
* Other developers: Nothing
* Release engineering: Nothing
* Policies and guidelines: N/A (not needed for this Change)
* Trademark approval: N/A (not needed for this Change)
* Alignment with the Fedora Strategy:
== Upgrade/compatibility impact ==
* The new package `ruby-build-ruby` would be installed and multiple dependencies could be removed from the system automatically as nothing else may depend on them.
* For users wanting to build a Ruby implementation other than CRuby would need to install the required subpackage to get the definitions.
== Early Testing (Optional) ==
Test package available in Copr at https://copr.fedorainfracloud.org/coprs/mikelo2/split-ruby-build/ and code at https://src.fedoraproject.org/fork/mikelo2/rpms/ruby-build/commits/split-rubybuild
== How To Test ==
1. Install the package:
`dnf copr enable mikelo2/split-ruby-build`
`dnf install ruby-build`
*Verify that it does NOT pull in `java-headless` or `rust` by default.*
2. Test Standard Ruby:
`dnf install rbenv`
`rbenv install 3.4.8`
*This should work out of the box (via `ruby-build-ruby`).*
3. Test JRuby (Optional):
`rbenv install jruby-9.4.0.0`
*This should fail initially.*
`dnf install ruby-build-jruby`
`rbenv install jruby-9.4.0.0`
*This should now succeed.*
== User Experience ==
- Users will notice a significantly faster and smaller installation process for `ruby-build`.
- Advanced users may need to manually install specific subpackages (like `ruby-build-truffleruby`) if they are working with non-standard Ruby implementations, but the vast majority of users (MRI Ruby) will see no change in workflow, only in disk savings.
== Dependencies ==
N/A
== Contingency Plan ==
* Contingency mechanism: Revert the changes to the spec file to the monolithic dependency list
* Contingency deadline: Beta Freeze
* Blocks release? No
== Documentation ==
N/A (not a System Wide Change)
== Release Notes ==
\n
F45 Change Proposal: ModernizeBootISO [SystemWide]
Discussion Thread: https://discussion.fedoraproject.org/t/177634
**This is a proposed Change for Fedora Linux.**
This document represents a proposed Change. As part of the Changes process, proposals are publicly announced in order to receive community feedback. This proposal will only be implemented if approved by the Fedora Engineering Steering Committee.
== Summary ==
We will switch over production of the boot.iso from using `lorax` to `image-builder` modernizing the build of the deliverable while keeping functional parity.
== Owner ==
* Name: [[User:supakeen| Simon de Vlieger]], [[User:ngompa| Neal Gompa]]
* Email: cmdr@supakeen.com, ngompa13@gmail.com
== Detailed Description ==
Over the past few Fedora releases we have slowly been moving deliverable production over to new image build tooling. Package based live media has moved onto `kiwi`. ostree-, and bootc-based artifacts have moved onto `image-builder` though some deliverables remain to be migrated in this area.
One of the important artifacts in Fedora is the boot.iso. This is the network installer that is shipped as the "Everything" network installer, or the "Server" network installer for Fedora Server edition.
This artifact is used in pungi and processed further into the dvd.iso (by embedding a compose's repositories into the boot.iso) and the Fedora Atomic installers (by embedding a compose's ostree commit into the boot.iso).
We would like to start producing the boot.iso with modern image build tooling.
`image-builder` is currently deployed in Fedora's Koji build system and can produce both the Everything and Fedora Server Edition boot.iso's. Thus for this effort we would like to switch over the pungi configuration to start using `image-builder` for these deliverables.
While `image-builder` definitions currently provide a boot.iso that is at parity we would like to also use this switch to address several concerns with the boot.iso media while keeping functional parity. This includes (less|no) usage of Lorax in the build process which might necessitate changes to packages and/or configuration (mostly in Anaconda).
Since the boot.iso media is used in many workflows both internal to Fedora and by users we have explicitly targeted Fedora 45 to give us enough time to discover any dragons that might appear.
We plan to switch over as early as possible after rawhide becomes Fedora 45 to give users and ourselves the maximum amount of time to find any regressions and address them.
Separately, any work on the Pungi side of things and the investigative work that will go into this will benefit other image build tooling such as `kiwi` to also be able to produce these deliverables in the future as these parts are shared. Having redundancy in our tooling (both `image-builder` and `kiwi` being able to build the same artifacts) is a great thing to have as it allows us to switch over the build backend when one or the other is having issues and reduces the risk of any complications affecting all deliverables.
== Feedback ==
== Benefit to Fedora ==
Changing the production of the boot.iso over to `image-builder` brings infrastructural benefits. It also allows users to easily build (customized) boot.iso's locally that match official Fedora deliverables and provides an easier way to produce derivatives and Fedora remixes that want to create boot.iso media using `image-builder` or `kiwi`.
Aside from this the process on how these deliverables are produced becomes more linear and simpler to understand.
## Scope [📖](https://fedoraproject.org/wiki/Changes/ModernizeBootISO#Scope)
* Proposal owners: implement definitions (`image-builder`) and descriptions (`kiwi`) to build modernized boot.iso media. Update pungi configuration to make use of this (might imply changes to pungi itself as well).
* Other developers: None.
* Release engineering: https://forge.fedoraproject.org/releng/tickets/issues/13140
* Policies and guidelines: N/A (not needed for this Change)
* Trademark approval: N/A (not needed for this Change)
* Alignment with the Fedora Strategy:
== Upgrade/compatibility impact ==
== Early Testing (Optional) ==
Users can test the current state of these artifacts by installing `image-builder` and building the deliverables as they are now:
$ sudo dnf install image-builder
$ sudo image-builder build everything-network-installer
Note that several changes need to land upstream and thus these installers do not properly reflect the state that we want in Fedora, yet.
== How To Test ==
Once the pungi configuration for rawhide has been changed to produce these deliverables with `image-builder` OpenQA will start testing these automatically.
Users can also start testing after this point. The tests would involve the usual requirements and criteria for the boot.iso.
Once the new deliverables are testable an announcement will be made on the mailinglist and discussion forum to get as many eyes on this as possible.
== User Experience ==
The user experience of using the boot.iso media should not change in any functional way.
== Dependencies ==
There are no dependencies on other changes. The owners of this proposal will likely need to perform work in pungi, the pungi configuration, and perhaps Anaconda.
We have explicitly targeted Fedora 45 to give us enough time to make these changes as they might have long(er) timeframes to land in Fedora.
If any critical changes are not able to land before Fedora 45 we will have the option to either pave over them in `image-builder` (for example, if configuration files need to be moved around, or directories need to be removed) or to trigger the contigency and defer to Fedora 46.
== Contingency Plan ==
* Contingency mechanism: Revert pungi configuration changes
* Contingency deadline: Beta Freeze
* Blocks release: Yes
== Documentation ==
Notes will be written and kept as the implementation progresses.
== Release Notes ==
\n
[USN-7931-4] Linux kernel (Xilinx) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmlFZhgFAwAAAAAACgkQZ0GeRcM5nt17
PQf/bwWWEddt+p4fsJbu905KgkCXfdAA3VVkX8lAwTzFc26IpFRKhlX9qk+HC552gr71d9+e/Sl7
oSNXVrGKo1ecqJsPamVNZySF0g69qHQOC5Da7PQdxAvS7jy1fhtPKA4qo4lOw+8OaWv3t4HxbSQE
26gm/At7s7tZwa2K7GZYfmy5fwcwSksV+gXM3+cFdCZfnlR5eYg6lfm9vhVrxucHN7sz1q0gJsdZ
5v4ItzrytZ1hdxW87NHVKLQ34LRwb3cGlLfyP1XiL0GYGyD3X3cMZ98C0zFfL4T8hv9s/3vnh30K
Su38wrscg7EwPwS/SEz7F8IW5UC67NWIdYk6ygFfIw==
=kxr/
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7931-4
December 19, 2025
linux-xilinx vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-xilinx: Linux kernel for Xilinx systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Media drivers;
- Memory management;
- Appletalk network protocol;
- Netfilter;
(CVE-2025-37958, CVE-2025-38666, CVE-2025-39964, CVE-2025-39993,
CVE-2025-40018)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1021-xilinx 6.8.0-1021.22
linux-image-xilinx 6.8.0.1021.22
linux-image-xilinx-6.8 6.8.0.1021.22
linux-image-xilinx-zynqmp 6.8.0.1021.22
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7931-4
https://ubuntu.com/security/notices/USN-7931-3
https://ubuntu.com/security/notices/USN-7931-2
https://ubuntu.com/security/notices/USN-7931-1
CVE-2025-37958, CVE-2025-38666, CVE-2025-39964, CVE-2025-39993,
CVE-2025-40018
Package Information:
https://launchpad.net/ubuntu/+source/linux-xilinx/6.8.0-1021.22
[USN-7921-2] Linux kernel (Real-time) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmlFZeIFAwAAAAAACgkQZ0GeRcM5nt2g
Rwf/dSi/9TY61BDk3oUTPPtv7c4vOOV+hZkb/Ih0jMlaeVSclEACmMVlxNdjOLE9llTp7QYQfxLn
kBGekB1bwwHxSyTBCcO/XQxIb4ZyLAJHRb8pY73gNAuI+TRrscfb5UaxbkYEi8FFEUDKOG0tzS40
94cITMMh2qcQKyiloSs+5RlwTHE0i98wxPixC1HT5pkjR+zOnxTVOzQiwxk5MOLvlnz9Je4gITMV
7uxRExQco6swNFT/A6AakPG2H7mWOqhcvkcpfSEGqk6BSTqLbDHWsbJMs9fMIjD15CrUtv6MNqgm
kPEh+yBVMAyAv2+Lje8YolOPCKTiRqdeciH1fLm8zw==
=fd8q
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7921-2
December 19, 2025
linux-realtime-6.14 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-realtime-6.14: Linux kernel for Real-time systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Media drivers;
- Netfilter;
- TLS protocol;
(CVE-2025-39946, CVE-2025-39964, CVE-2025-39993, CVE-2025-40018)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.14.0-1017-realtime 6.14.0-1017.17~24.04.1
Available with Ubuntu Pro
linux-image-realtime-6.14 6.14.0-1017.17~24.04.1
Available with Ubuntu Pro
linux-image-realtime-hwe-24.04 6.14.0-1017.17~24.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7921-2
https://ubuntu.com/security/notices/USN-7921-1
CVE-2025-39946, CVE-2025-39964, CVE-2025-39993, CVE-2025-40018
Package Information:
https://launchpad.net/ubuntu/+source/linux-realtime-6.14/6.14.0-1017.17~24.04.1
[USN-7928-4] Linux kernel (Raspberry Pi) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmlFZgUFAwAAAAAACgkQZ0GeRcM5nt34
nAf/fH2Tw/35NHqtSuTwphaHmXr0atXgTaEj/1RvP9puG2f+k7Pwwfcdsq8JjKCkXaF5KoWFzqaR
tlrRV4COOvbCe5fb1NFgLzJku0fZXurwO8KLLHLRYu+mGOG0/hr/M7irvpSZtu4gZbILH0S28yLo
Zp2B0Oxax/MU71nbPUhyS55witaKAuhIl1OFeWhXhyEIne4uGxykMvWQeISsIblYqGWFQ7YMTmb1
wp++y3IEu9KlLLBa3/hFyZKtauq7I3aBvazwy4d8fpGP9tI+DUpIO60BOy/9GSYdcNd4lk+CQwmS
8JknDSIKXMhvYqtQCZFDQH+QZcwKPZVSLHnEy6lNbw==
=xitJ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7928-4
December 19, 2025
linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi: Linux kernel for Raspberry Pi systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- Media drivers;
- Network drivers;
- AFS file system;
- F2FS file system;
- Tracing infrastructure;
- Netfilter;
(CVE-2022-49390, CVE-2024-47691, CVE-2024-50067, CVE-2024-53090,
CVE-2024-53218, CVE-2025-21855, CVE-2025-39964, CVE-2025-39993,
CVE-2025-40018)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1092-raspi 5.15.0-1092.95
linux-image-raspi 5.15.0.1092.90
linux-image-raspi-5.15 5.15.0.1092.90
linux-image-raspi-nolpae 5.15.0.1092.90
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7928-4
https://ubuntu.com/security/notices/USN-7928-3
https://ubuntu.com/security/notices/USN-7928-2
https://ubuntu.com/security/notices/USN-7928-1
CVE-2022-49390, CVE-2024-47691, CVE-2024-50067, CVE-2024-53090,
CVE-2024-53218, CVE-2025-21855, CVE-2025-39964, CVE-2025-39993,
CVE-2025-40018
Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1092.95
[USN-7922-3] Linux kernel (Oracle) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmlFZfMFAwAAAAAACgkQZ0GeRcM5nt3V
qQgAlDNG6fv+OFfii1oOA/2gAltmJ6XIKYGrqzrEdWsReaspPmQjdFBuTZf5neI7rIQJ4VmdYreq
QdDLxzT4mV3xvQ4GG2rQl8eh+8taLx/LKcVhLtPu7k44qeExVWDY9LfWuTQMlXGc3j3ul8/YN9BI
mw0t/bATar+A/UKkE4Grc3SsLOA4OTLpiEoHgL3KdEDpfKT8yzmwmHcafp3xHi87BmZ3HDCsE9cj
5K2bIiGhmsx4EZiFZ8csk1pYnXmGou9KMq5qvblFAqZ6zQ04gkokoMCLFp8hkwDOaKdP8KYl+IqN
iYD/zcjpeboB4Em4OlSlAAL+2juOXUhDYqRAqSXNdg==
=QHk6
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7922-3
December 19, 2025
linux-oracle-5.4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- ACPI drivers;
- InfiniBand drivers;
- Media drivers;
- Network drivers;
- Pin controllers subsystem;
- AFS file system;
- F2FS file system;
- Tracing infrastructure;
- Memory management;
- Appletalk network protocol;
- Netfilter;
(CVE-2022-49026, CVE-2022-49390, CVE-2024-47691, CVE-2024-49935,
CVE-2024-50067, CVE-2024-50095, CVE-2024-50196, CVE-2024-53090,
CVE-2024-53218, CVE-2025-21855, CVE-2025-37958, CVE-2025-38666,
CVE-2025-39964, CVE-2025-39993, CVE-2025-40018)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
linux-image-5.4.0-1151-oracle 5.4.0-1151.161~18.04.1
Available with Ubuntu Pro
linux-image-oracle 5.4.0.1151.161~18.04.1
Available with Ubuntu Pro
linux-image-oracle-5.4 5.4.0.1151.161~18.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7922-3
https://ubuntu.com/security/notices/USN-7922-2
https://ubuntu.com/security/notices/USN-7922-1
CVE-2022-49026, CVE-2022-49390, CVE-2024-47691, CVE-2024-49935,
CVE-2024-50067, CVE-2024-50095, CVE-2024-50196, CVE-2024-53090,
CVE-2024-53218, CVE-2025-21855, CVE-2025-37958, CVE-2025-38666,
CVE-2025-39964, CVE-2025-39993, CVE-2025-40018
Wednesday, December 17, 2025
Mass retirement of golang library leaves
As per Changes/GolangPackagesVendoredByDefault [1], all golang libraries
that are currently leaves (as defined in [2]) will be mass retired. This
will happen in the coming days. The full list of packages is available
at [3].
Note that golang libraries that current packages depend on will not be
retired as part of this process. However, non-leaf golang libraries may
still be retired as part of Orphaned Packages Process and FTI/FTBFS
processes, so this may affect your package(s) if you did not/do not take
action before these processes' respective deadlines.
Existing packages are recommended to migrate to the new vendored
dependency approach, and the updated Guidelines that mandate vendoring
apply to all new Golang applications packages added to the distribution [4].
Thank you for your cooperation and let me know if you have any questions!
Happy holidays and happy new year,
Maxwell
[1]
https://fedoraproject.org/wiki/Changes/GolangPackagesVendoredByDefault#Plan
[2] https://gitlab.com/fedora/sigs/go/package-data/-/blob/main/README.md
[3]
https://gitlab.com/fedora/sigs/go/package-data/-/blob/f6aad6bb0b54760f2e7a4b71f719b78e773a9fe8/leaves
[4] https://docs.fedoraproject.org/en-US/packaging-guidelines/Golang
--
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
[USN-7940-1] Linux kernel (Azure FIPS) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmlDGhsFAwAAAAAACgkQZ0GeRcM5nt16
YggAknU5J6OlBIWniMfFCEHR/GO5xNWiLb8iK4gArp4eDV0h4n/NHXD6NYphK038XH1/HZEhU3T3
6yCLEQNxYpSy+HOq28DQeugt/gnQu64jSgPQKDw/rcc6/hNKHivY8OPWs3VdiKDuFnfSKRNpIUHd
tzujPGFJsNtqYrOPVqAcb98L+4ndnbdoODXqzz0kWekJtlb6QMl2R0uuzda0haE63UXXvnOp4JgR
f3PCqbrYunmAy3BGG9653VDXBqUUNbkeDaGbF23iwDeGXOKmTUGg6meNnNILdHaXC3Iuj0m3wEGi
OSoldGvcHJpwnxuXs8EIEbbDtwGEITgXjl3nPxsIPQ==
=ICko
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7940-1
December 17, 2025
linux-azure-fips vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-azure-fips: Linux kernel for Microsoft Azure Cloud systems with FIPS
Details:
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered
that the Linux kernel contained insufficient branch predictor isolation
between a guest and a userspace hypervisor for certain processors. This
flaw is known as VMSCAPE. An attacker in a guest VM could possibly use this
to expose sensitive information from the host OS. (CVE-2025-40300)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PowerPC architecture;
- x86 architecture;
- Cryptographic API;
- ACPI drivers;
- Ublk userspace block driver;
- Clock framework and drivers;
- EDAC drivers;
- GPU drivers;
- HSI subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Media drivers;
- MemoryStick subsystem;
- Network drivers;
- NTB driver;
- PCI subsystem;
- Remote Processor subsystem;
- Thermal drivers;
- Virtio Host (VHOST) subsystem;
- 9P distributed file system;
- File systems infrastructure;
- JFS file system;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- SMB network file system;
- Memory management;
- Bluetooth subsystem;
- RDMA verbs API;
- Kernel fork() syscall;
- Timer subsystem;
- Tracing infrastructure;
- Watch queue notification mechanism;
- Appletalk network protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- TLS protocol;
- SoC Audio for Freescale CPUs drivers;
(CVE-2023-53034, CVE-2024-58092, CVE-2025-21729, CVE-2025-22018,
CVE-2025-22019, CVE-2025-22020, CVE-2025-22021, CVE-2025-22025,
CVE-2025-22027, CVE-2025-22028, CVE-2025-22033, CVE-2025-22035,
CVE-2025-22036, CVE-2025-22038, CVE-2025-22039, CVE-2025-22040,
CVE-2025-22041, CVE-2025-22042, CVE-2025-22044, CVE-2025-22045,
CVE-2025-22047, CVE-2025-22050, CVE-2025-22053, CVE-2025-22054,
CVE-2025-22055, CVE-2025-22056, CVE-2025-22057, CVE-2025-22058,
CVE-2025-22060, CVE-2025-22062, CVE-2025-22063, CVE-2025-22064,
CVE-2025-22065, CVE-2025-22066, CVE-2025-22068, CVE-2025-22070,
CVE-2025-22071, CVE-2025-22072, CVE-2025-22073, CVE-2025-22075,
CVE-2025-22079, CVE-2025-22080, CVE-2025-22081, CVE-2025-22083,
CVE-2025-22086, CVE-2025-22089, CVE-2025-22090, CVE-2025-22095,
CVE-2025-22097, CVE-2025-23136, CVE-2025-23138, CVE-2025-37838,
CVE-2025-37937, CVE-2025-37958, CVE-2025-38118, CVE-2025-38152,
CVE-2025-38227, CVE-2025-38240, CVE-2025-38352, CVE-2025-38575,
CVE-2025-38616, CVE-2025-38637, CVE-2025-38666, CVE-2025-38678,
CVE-2025-39682, CVE-2025-39728, CVE-2025-39735, CVE-2025-39964,
CVE-2025-39993, CVE-2025-40018, CVE-2025-40114, CVE-2025-40157)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1044-azure-fips 6.8.0-1044.50+fips1
Available with Ubuntu Pro
linux-image-azure-fips 6.8.0-1044.50+fips1
Available with Ubuntu Pro
linux-image-azure-fips-6.8 6.8.0-1044.50+fips1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7940-1
CVE-2023-53034, CVE-2024-58092, CVE-2025-21729, CVE-2025-22018,
CVE-2025-22019, CVE-2025-22020, CVE-2025-22021, CVE-2025-22025,
CVE-2025-22027, CVE-2025-22028, CVE-2025-22033, CVE-2025-22035,
CVE-2025-22036, CVE-2025-22038, CVE-2025-22039, CVE-2025-22040,
CVE-2025-22041, CVE-2025-22042, CVE-2025-22044, CVE-2025-22045,
CVE-2025-22047, CVE-2025-22050, CVE-2025-22053, CVE-2025-22054,
CVE-2025-22055, CVE-2025-22056, CVE-2025-22057, CVE-2025-22058,
CVE-2025-22060, CVE-2025-22062, CVE-2025-22063, CVE-2025-22064,
CVE-2025-22065, CVE-2025-22066, CVE-2025-22068, CVE-2025-22070,
CVE-2025-22071, CVE-2025-22072, CVE-2025-22073, CVE-2025-22075,
CVE-2025-22079, CVE-2025-22080, CVE-2025-22081, CVE-2025-22083,
CVE-2025-22086, CVE-2025-22089, CVE-2025-22090, CVE-2025-22095,
CVE-2025-22097, CVE-2025-23136, CVE-2025-23138, CVE-2025-37838,
CVE-2025-37937, CVE-2025-37958, CVE-2025-38118, CVE-2025-38152,
CVE-2025-38227, CVE-2025-38240, CVE-2025-38352, CVE-2025-38575,
CVE-2025-38616, CVE-2025-38637, CVE-2025-38666, CVE-2025-38678,
CVE-2025-39682, CVE-2025-39728, CVE-2025-39735, CVE-2025-39964,
CVE-2025-39993, CVE-2025-40018, CVE-2025-40114, CVE-2025-40157,
CVE-2025-40300
Package Information:
https://launchpad.net/ubuntu/+source/linux-azure-fips/6.8.0-1044.50+fips1
Tuesday, December 16, 2025
FreeBSD Security Advisory FreeBSD-SA-25:12.rtsold
Hash: SHA512
=============================================================================
FreeBSD-SA-25:12.rtsold Security Advisory
The FreeBSD Project
Topic: Remote code execution via ND6 Router Advertisements
Category: core
Module: rtsold
Announced: 2025-12-16
Credits: Kevin Day
Affects: All supported versions of FreeBSD.
Corrected: 2025-12-16 23:39:32 UTC (stable/15, 15.0-STABLE)
2025-12-16 23:43:01 UTC (releng/15.0, 15.0-RELEASE-p1)
2025-12-16 23:45:05 UTC (stable/14, 14.3-STABLE)
2025-12-16 23:43:25 UTC (releng/14.3, 14.3-RELEASE-p7)
2025-12-16 23:44:10 UTC (stable/13, 13.4-STABLE)
2025-12-16 23:43:33 UTC (releng/13.5, 13.5-RELEASE-p8)
CVE Name: CVE-2025-14558
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
I. Background
rtsold(8) and rtsol(8) are programs which process router advertisement
packets as part of the IPv6 stateless address autoconfiguration (SLAAC)
mechanism.
II. Problem Description
The rtsol(8) and rtsold(8) programs do not validate the domain search list
options provided in router advertisement messages; the option body is passed
to resolvconf(8) unmodified.
resolvconf(8) is a shell script which does not validate its input. A lack of
quoting meant that shell commands pass as input to resolvconf(8) may be
executed.
III. Impact
Systems running rtsol(8) or rtsold(8) are vulnerable to remote code execution
from systems on the same network segment. In particular, router advertisement
messages are not routable and should be dropped by routers, so the attack does
not cross network boundaries.
IV. Workaround
No workaround is available. Users not using IPv6, and IPv6 users that do not
configure the system to accept router advertisement messages, are not affected.
A network interface listed by ifconfig(8) accepts router advertisement messages
if the string "ACCEPT_RTADV" is present in the nd6 option list.
V. Solution
Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
Perform one of the following:
1) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8)
utility:
# freebsd-update fetch
# freebsd-update install
2) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch https://security.FreeBSD.org/patches/SA-25:12/rtsold.patch
# fetch https://security.FreeBSD.org/patches/SA-25:12/rtsold.patch.asc
# gpg --verify rtsold.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
Restart the applicable daemons, or reboot the system.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/15/ 6759fbb1a553 stable/15-n281548
releng/15.0/ 408f5c61821f releng/15.0-n280998
stable/14/ 26702912e857 stable/14-n273051
releng/14.3/ 3c54b204bf86 releng/14.3-n271454
stable/13/ 4fef5819cca9 stable/13-n259643
releng/13.5/ 35cee6a90119 releng/13.5-n259186
- -------------------------------------------------------------------------
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
VII. References
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14558>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-25:12.rtsold.asc>
-----BEGIN PGP SIGNATURE-----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=TK7t
-----END PGP SIGNATURE-----
FreeBSD Security Advisory FreeBSD-SA-25:11.ipfw
Hash: SHA512
=============================================================================
FreeBSD-SA-25:11.ipfw Security Advisory
The FreeBSD Project
Topic: ipfw denial of service
Category: core
Module: ipfw
Announced: 2025-12-16
Affects: FreeBSD 13 and 14
Corrected: 2025-11-04 00:52:54 UTC (stable/14, 14.3-STABLE)
2025-12-16 23:43:24 UTC (releng/14.3, 14.3-RELEASE-p7)
2025-11-04 00:52:12 UTC (stable/13, 13.5-STABLE)
2025-12-16 23:43:32 UTC (releng/13.5, 13.5-RELEASE-p8)
CVE Name: CVE-2025-14769
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
I. Background
ipfw(4) is one of the firewalls provided in the FreeBSD base system. Its
`tcp-setmss` configuration directive allows the system administrator to lower
the Maximum Segment Size of a packet.
II. Problem Description
In some cases, the `tcp-setmss` handler may free the packet data and throw an
error without halting the rule processing engine. A subsequent rule can then
allow the traffic after the packet data is gone, resulting in a NULL pointer
dereference.
III. Impact
Maliciously crafted packets sent from a remote host may result in a Denial of
Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would
allow the traffic to pass.
IV. Workaround
No workaround is available, but systems that do not use ipfw(4) with the
`tcp-setmss` directive are not affected.
V. Solution
Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date, and
reboot the system.
Perform one of the following:
1) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8)
utility:
# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"
2) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
[FreeBSD 14.3]
# fetch https://security.FreeBSD.org/patches/SA-25:11/ipfw-14.patch
# fetch https://security.FreeBSD.org/patches/SA-25:11/ipfw-14.patch.asc
# gpg --verify ipfw-14.patch.asc
[FreeBSD 13.5]
# fetch https://security.FreeBSD.org/patches/SA-25:11/ipfw-13.patch
# fetch https://security.FreeBSD.org/patches/SA-25:11/ipfw-13.patch.asc
# gpg --verify ipfw-13.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/14/ deb684f9d1d6 stable/14-n272799
releng/14.3/ c0cb68169beb releng/14.3-n271453
stable/13/ 94360584542a stable/13-n259534
releng/13.5/ 60026b06366f releng/13.5-n259185
- -------------------------------------------------------------------------
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
VII. References
<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=284606>
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14769>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-25:11.ipfw.asc>
-----BEGIN PGP SIGNATURE-----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=0OhG
-----END PGP SIGNATURE-----
FreeBSD Errata Notice FreeBSD-EN-25:20.vmm
Hash: SHA512
=============================================================================
FreeBSD-EN-25:20.vmm Errata Notice
The FreeBSD Project
Topic: bhyve(8) PCI passthru regression
Category: core
Module: vmm
Announced: 2025-12-16
Affects: FreeBSD 15.0
Corrected: 2025-12-15 15:47:23 UTC (stable/15, 15.0-STABLE)
2025-12-16 23:43:00 UTC (releng/15.0, 15.0-RELEASE-p1)
For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.FreeBSD.org/>.
I. Background
vmm(4) is a kernel module which provides an interface to hardware
virtualization capabilities. It is the kernel-side counterpart to bhyve(8).
PCI passthru is a feature of bhyve(8) on amd64 which allows a PCIe device, such
as a network interface or GPU, to be effectively detached from the host system
and passed directly into a guest virtual machine, allowing the guest to control
the physical hardware.
II. Problem Description
Some refactoring of the vmm(4) code introduced a regression in the portion
of the module which creates IOMMU mappings of guest memory.
III. Impact
The bug could cause PCI passthrough to not work as expected.
IV. Workaround
No workaround is available. Users not using bhyve(8) with PCI passthrough are
unaffected.
V. Solution
Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date.
Perform one of the following:
1) To update your system via a binary patch:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms
can be updated via the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
# shutdown -r now
2) To update your system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch https://security.FreeBSD.org/patches/EN-25:20/vmm.patch
# fetch https://security.FreeBSD.org/patches/EN-25:20/vmm.patch.asc
# gpg --verify vmm.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/15/ 4f7436bf297b stable/15-n281529
releng/15.0/ 04e9f1aab83a releng/15.0-n280997
- -------------------------------------------------------------------------
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
VII. References
<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=290920>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-25:20.vmm.asc>
-----BEGIN PGP SIGNATURE-----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=8iiC
-----END PGP SIGNATURE-----