Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 4. New features
This part describes new features and major enhancements introduced in Red Hat Enterprise Linux 9.8.
4.1. Security Link kopierenLink in die Zwischenablage kopiert!
- AIDE rebased to 0.19.2
The
aidepackage, which provides the Advanced Intrusion Detection Environment (AIDE) utility, has been rebased to upstream version 0.19.2. This version provides important fixes and enhancements, most notably the following:- Security updates, Major library change
-
The
libnettlecryptographic library replaces the previouslibmhashcryptographic library. - Changes not compatible with earlier versions
The following options are removed and are replaced with new options:
database-
Replaced with
database_in. summarize_changes-
Replaced with
report_summarize_changes. grouped-
Replaced with
report_grouped.
- Default configuration update
-
The outdated default
aide.conffile is restructured with new attributes and rules. Review and integrate these changes. - New logging and reporting system
-
The previous
--verboseandverboseoptions are removed. This version introduces more flexiblelog_levelandreport_leveloptions and named log levels for better debugging. - New file attributes and hash sums
-
This version adds support for Linux capabilities and restricted rules based on file system type, implemented in the
fstypeattribute. - Improved command-line tools
-
This version adds the
--dry-initcommand to test initial database creation without writing the file, and the--path-checkcommand to test rule matching.
For more information on all detailed changes, including other bug fixes and improvements, see the installed documentation file at
/usr/share/doc/aide/NEWS.
p11-kit-client.soseparates to thep11-kit-clientsubpackageThe
p11-kit-client.somodule moves from thep11-kit-serversubpackage to the newp11-kit-clientsubpackage. With the separated subpackages, you can install only the required parts and avoid redundant content on host systems or in containers.
- OpenSSH provided in version 9.9
RHEL 9.8 provides OpenSSH in version 9.9, which introduces many fixes and improvements over OpenSSH 8.7, which was provided in RHEL 9.7. For the complete list of changes, see the
openssh-9.9p1/ChangeLogfile. The most important changes are as follows:-
A system for restricting forwarding and use of keys that were added to the
ssh-agentprogram has been added tossh,sshd,ssh-add, andssh-agentprograms. Improvements to the use of the FIDO standard:
-
The
verify-requiredcertificate option has been added tossh-keygen. - Fixes to FIDO key handling reduce unnecessary PIN prompts for keys that support intrinsic user verification.
-
A check for existing matching credentials in the
ssh-keygenprogram prompts the user before overwriting the credentials.
-
The
-
New
EnableEscapeCommandlineoption in thessh_configconfiguration file enables the command line option in theEscapeCharmenu for interactive sessions. -
New
ChannelTimeoutkeyword specifies whether and how quickly thesshddaemon should close inactive channels. -
The
ssh-keygenutility generates Ed25519 keys by default except in FIPS mode, where the default is RSA. -
The
sshclient performs keystroke timing obfuscation by sending interactive traffic at fixed intervals, every 20 ms by default, when only a small amount of data is being sent. It also sends fake keystrokes for a random interval after the last real keystroke, defined by theObscureKeystrokeTimingkeyword. -
With the new
ChannelTimeouttype,sshandsshdclose all open channels if all channels lack traffic for a specified interval. This is in addition to the existing per-channel timeouts. -
The
sshdserver blocks client addresses that repeatedly fail authentication, repeatedly connect without ever completing authentication, or that crash the server. -
The
sshdserver penalizes client addresses that do not successfully complete authentication. The penalties are controlled by the newPerSourcePenaltieskeyword insshd_config. -
The
sshdserver is split into a listener binarysshdand a per-session binarysshd-session. This reduces the listener binary size that does not need to support the SSH protocol. This also removes support for disabling privilege separation and disabling re-execution ofsshd. -
In portable OpenSSH,
sshdno longer usesargv[0]as the PAM service name. You can select the service name at runtime with the newPAMServiceNamedirective in thesshd_configfile. This defaults tosshd. -
The
HostkeyAlgorithmskeyword allowssshto disable implicit fallback from certificate host key to plain host keys. - The components have been hardened in general and work better with the PKCS #11 standard.
Jira:RHEL-108912[1]
-
A system for restricting forwarding and use of keys that were added to the
- Valkey runs with the
redis_tSELinux type Before this update, Valkey processes did not use the
redis_tSELinux type. This caused behavioral inconsistencies with Redis in RHEL 9. With this update, the SELinux policy has been enhanced to run Valkey asredis_t. As a result, Valkey processes align with Redis behavior, providing a consistent security context for these services in RHEL 9 environments.Jira:RHEL-108982[1]
fapolicydrebased to 1.4.3The
fapolicydpackages are rebased to upstream version 1.4.3 and provide many enhancements and bug fixes over the previous version. Most notably:-
Added the
--filteroption for thefapolicyd-cli --filecommand -
Added the
--test-filteroption for thefapolicy-clicommand to help test filter rules -
Added the
fapolicyd-filter.conf(5)man page -
Added the
--check-ignore_mountsoption forfapolicyd-cli -
Added the
--verboseflag for thefapolicyd-cli --check-ignore_mountscommand -
Increased the default value of the
db_max_sizeparameter -
Added support for the
db_max_size = autooption, which enables automatic database size management by thefapolicyddaemon - Increased the default subject cache size
-
Moved the
fapolicyd-rpm-loaderprogram to the/bindirectory -
Optimized performance of the
fapolicydframework
-
Added the
CanonicalMatchUserinsshd_configprevents privilege escalation for capitalized AD usernamesThis update of the
opensshpackages introduces theCanonicalMatchUserdirective for thesshd_configconfiguration file. With the new directive, you can configureMatch Userblocks so thatsshdfirst attempts to obtain the username from a password database instead of using an alias. As a result, Active Directory (AD) users can no longer bypass chroot restrictions when using capital letters in their usernames, which might lead to privilege escalation.Jira:RHEL-118372[1]
- GnuTLS rebased to 3.8.10
The
gnutlspackage is rebased to upstream version 3.8.10. This update introduces several enhancements and bug fixes. Most notably:- Post-quantum cryptography (PQC) support
- ML-KEM and ML-DSA integration: GnuTLS supports ML-KEM hybrid key exchange algorithms and ML-DSA-44, ML-DSA-65, and ML-DSA-87 signature algorithms for TLS communications. To enable these algorithms, use the PQ system-wide cryptographic subpolicy.
-
Expanded private key formats: This update adds support for all variants of ML-DSA private key formats defined in the
draft-ietf-lamps-dilithium-certificates-12document to provide compatibility with evolving international standards.
- TLS and cryptographic enhancements
- Improved OCSP verification: Before this update, when a single Online Certificate Status Protocol (OCSP) response contained multiple records, GnuTLS considered only the first record, which could cause verification failures. With this update, GnuTLS checks all records until it finds a match for the server certificate.
- Certificate compression: This update adds support for TLS certificate compression as defined in RFC 8879 to reduce handshake latency and bandwidth. Note that this feature is disabled by default.
- RSA-OAEP support: GnuTLS supports the Optimal Asymmetric Encryption Padding (RSA-OAEP) scheme as defined in RFC 8017, which provides a more secure alternative to traditional RSA padding.
- SHAKE hashing: This update adds support for the Secure Hash Algorithm Keccak (SHAKE) hashing algorithm and includes a new API to incrementally calculate SHAKE hashes of any length across multiple calls.
- Enhanced PKCS #12 security: GnuTLS can export PKCS #12 files by using Password-Based Message Authentication Code 1 (PBMAC1) as defined in RFC 9579. For interoperability with systems running in FIPS mode, use PBMAC1 explicitly.
- Technology Preview
-
PKCS #11 back end override: As a Technology Preview, you can use PKCS #11 modules to override the default cryptographic back end. You can test this feature by adding a
[provider]section to the system-wide configuration to configure the module path and PIN.
-
PKCS #11 back end override: As a Technology Preview, you can use PKCS #11 modules to override the default cryptographic back end. You can test this feature by adding a
crypto-policiessupports hybrid ML-KEM and pure ML-DSA in GnuTLSThis update of the system-wide cryptographic policies adds support for hybrid ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) and pure ML-DSA (Module-Lattice-Based Digital Signature) post-quantum (PQ) algorithms in GnuTLS. As a result, you can use GnuTLS in RHEL 9.8 to negotiate TLS connections that use hybrid ML-KEM or pure ML-DSA as long as the other side supports them, and the PQ system-wide cryptographic subpolicy is applied.
/dev/papr-*devices have more specific SELinux labelsWith this update of the
selinux-policypackages, the following devices have more specific SELinux labels:-
/dev/papr-indices -
/dev/papr-physical-attestation -
/dev/papr-platform-dump
This aligns with the addition of new character device interfaces to the kernel, providing user-space application binary interface (ABI) access to the Power Architecture Platform Reference (PAPR) system parameters, in addition to the existing kernel-internal API.
As a result, the SELinux policy assigns distinct labels to these devices so that different permissions can apply to various services accessing them.
-
p11-kitrebased to 0.26.1The
p11-kitpackages have been upgraded to upstream version 0.26.1. The new version provides many enhancements and bug fixes, most notably:- PKCS #11 headers are updated to version 3.2, which supports post-quantum cryptography (PQC) definitions.
-
The trust module now correctly looks up the last DN (Distinguished Name) in the
RDNSequenceattribute as defined in the RFC 4514 document. - You can specify the server address with the new module configuration option for the Remote Procedure Call (RPC) protocol.
- Handling of an empty array attribute in RPC is fixed.
-
Dependency on the
libsystemdlibrary for server socket activation is removed.
Jira:RHEL-139075[1]
- New package:
clevis-pin-trustee The
clevis-pin-trusteepackage provides a new Clevis pintrusteethat enables automated encryption and decryption of LUKS-encrypted volumes by using remote attestation through the Trustee Key Broker Service (KBS). Thetrusteepin integrates with the standard Clevis framework through theclevis-encrypt-trusteeandclevis-decrypt-trusteecommands, and it includes a Dracut module60clevis-pin-trusteefor automated root volume unlocking during early boot.In scenarios such as confidential clusters for OpenShift and confidential virtual machines with OpenShift Virtualization, the Trustee server acts as the policy enforcement point, releasing the disk encryption key only when the requesting platform’s attestation evidence validates against a set of reference values.
As a result, you can bind LUKS-encrypted volumes to one or more Trustee servers by using a
clevis luks bind -d <device> trustee '<config>'command. You can also combine thetrusteepin with other Clevis pins, such astangandtpm2, for multi-factor or multi-policy unlock configurations.Jira:RHEL-139790[1]
crypto-policiesenablesmlkem768x25519-sha256for OpenSSHThis update of the system-wide cryptographic policies adds support for the ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) post-quantum (PQ) key exchange
mlkem768x25519-sha256algorithm for OpenSSH. This aligns with support for ML-KEM in OpenSSH, providing a quantum-resistant key exchange method for your SSH sessions when you use thePQsystem-wide cryptographic policy.
- OpenSCAP rebased to 1.4.3
The OpenSCAP packages have been rebased to upstream version 1.4.3. This version provides bug fixes and various enhancements. For additional information, see the OpenSCAP release notes.
- SCAP Security Guide rebased to 0.1.80
For additional information, see the SCAP Security Guide release notes.
4.2. Software management Link kopierenLink in die Zwischenablage kopiert!
libreporebased to 1.19.0The
librepopackages are rebased to upstream version 1.19.0. This version provides the following important fixes and enhancements:-
Fixed creating a directory for a
gpgmesocket when verifying a signature from a file descriptor. - Added functions for importing keys from a file descriptor and memory.
- Added function for listing end exporting keys.
- Fixed including header files not to conflict with application’s local header files.
-
Removed the
/usr/include/librepo/downloader_internal.hheader file that should have been private. - Optimized code when extended attributes are not supported by a file system.
- Improved performance when downloading multiple packages.
-
Added the
LRO_USERNAMEandLRO_PASSWORDoptions to set a user name and a password separately. Use these options if you have a colon (:) in your user name. -
Removed the private
ensure_socket_dir_existsELF symbol. -
Fixed a SELinux warning if SELinux runs in a container where
/sys/fs/selinuxis not mounted. - Fixed caching package checksums on file systems that do not support extended attribute names with uppercase characters.
-
Fixed creating a directory for a
4.3. Shells and command-line tools Link kopierenLink in die Zwischenablage kopiert!
- Security and TLS improvements in
openwsman2.8.1 The
openwsmanpackage has been updated to version 2.8.1 with the following improvements:- Improved TLS 1.3 support.
- Improved compatibility with OpenSSL 3.0.
- Improved SSL/TLS error reporting.
- Improved security by clearing passwords from memory after use and enhancing buffer safety.
Jira:RHEL-97643[1]
openCryptokirebased to 3.26.0The
openCryptokipackages are updated to upstream version 3.26.0. This version provides important fixes and enhancements, most notably the following:- Post-quantum cryptography (PQC) support
- ML-DSA and ML-KEM integration
Adds support for the IBM-specific Module-Lattice-Based Digital Signature Algorithm (ML-DSA) and Module-Lattice Key Encapsulation Mechanism (ML-KEM).
- EP11 token: Requires EP11 host library version 4.2 or later, and a CEX8P crypto card with firmware version 9.6 or later (on IBM z17), or version 8.39 or later (on IBM z16).
- CCA token: Requires CCA version 8.4 or later.
- Soft token: Requires OpenSSL version 3.5 or later, or a configured OQS-provider.
-
The
p11saktool supports the IBM-specific ML-DSA and ML-KEM key types.
- BLS12-381 curve support
-
The EP11 token supports the pairing-friendly BLS12-381 elliptic curve (EC) for signing, verification, and public key aggregation. The
p11saktool also supports generating BLS12-381 EC keys.
- Cryptographic enhancements
- Expanded RSA key sizes
-
The Soft token and the
p11sakutility support RSA keys up to 16 Kb. - The CCA token supports RSA keys up to 8 Kb. This requires CCA version 8.4, or version 7.6 or later.
-
The Soft token and the
- New key derivation and Hash-based Message Authentication Code (HMAC) mechanisms
- The Soft and ICA tokens support SHA512/224 and SHA512/256 key derivation mechanisms.
- The Soft, ICA, CCA, and EP11 tokens support SHA-HMAC key types and generation mechanisms.
-
The
p11saktool supports SHA-HMAC key types and generation.
- PKCS #11 version 3.0 compliance
-
Adds support for canceling operations by using a NULL mechanism pointer at the
C_XxxInit()calls, which provides an alternative to theC_SessionCancel()calls.
- Management and utility improvements
- The
p11saktool enhancements -
The
p11sakutility supports key wrapping and unwrapping commands to securely export and import private and secret keys. It also provides export of non-sensitive private keys to password-protected PEM files. - HSM-protected TLS keys
-
The
p11kmiptool supports using a Hardware Security Module (HSM)-protected TLS client key through a PKCS#11 provider, which increases the security of communication with Key Management Interoperability Protocol (KMIP) servers.
- The
Jira:RHEL-100059[1]
- Updated
snmpcmdman page documents supportedprivProtocolfor SNMPv3 messages With this update, the
snmpcmdman page documents the supportedprivProtocolfor SNMPv3 messages. As a result, administrators have access to the necessary reference details to create SNMPv3 users with specific authentication and privacy protocols.Jira:RHEL-101614[1]
- Documentation updated for
net-snmp-create-v3-usersupported encryption algorithms The
--helpoutput and manual page for thenet-snmp-create-v3-userscript have been updated to include the complete list of supported authentication and encryption algorithms. This update improves clarity when configuring authentication and encryption passwords.Jira:RHEL-103557[1]
tog-pegasussupports post-quantum cryptographyThis update enables post-quantum key exchange by default in the
tog-pegasuspackages if the peer supports it. Two new files,/etc/pki/Pegasus/server-fallback.pemand/etc/pki/Pegasus/file-fallback.pem, fortog-pegasusservers provide a mechanism to support a classic certificate chain and anML-DSAcertificate at the same time. . As a result, you can use these new files to enable the loading of a classic certificate and key when you need to use anML-DSAcertificate and a classic certificate chain simultaneously.Jira:RHEL-127514[1]
- The
sblim-sfcbpackage supports post-quantum cryptography This update enables post-quantum key exchange by default in the
sblim-sfcbpackage if the peer supports it. This update also introduces two new configuration options,sslKeyFallbackFilePathandsslCertificateFallbackFilePath, in thesblim-sfcbserver configuration file.Before this update, there was no mechanism to support a classic certificate chain and an
ML-DSAcertificate at the same time. As a result, you can use these new options to enable the loading of a classic certificate and key when you need to use anML-DSAcertificate and a classic certificate chain simultaneously.Jira:RHEL-127515[1]
- Support added for post-quantum cryptography in
openwsman Previously, the package did not use post-quantum key exchange by default if the peer supports it. Also, there was no mechanism to support a classic certificate chain and the ML-DSA certificate at the same time.
With this update, two new configuration options
ssl_cert_fallback_fileandssl_key_fallback_fileare introduced inopenwsmanserver configuration file. These options are disabled by default, but can be used to enable loading of classic certificate and key when there is a requirement to use anML-DSAcertificate and classic certificate chain at the same time.As a result, the outdated SSL initialization which prevents post-quantum key exchange by default was removed from the
openwsmanserver.Jira:RHEL-127516[1]
- Red Hat build of OpenJDK 25 available in RHEL 9
Red Hat build of OpenJDK 25 and the
maven-openjdk25subpackages are available in Red Hat Enterprise Linux 9. This version provides the latest long-term support (LTS) release of the Open Java Development Kit (OpenJDK). As a result, you can leverage the latest Java features and performance improvements for your applications.Jira:RHEL-127952[1]
4.4. Infrastructure services Link kopierenLink in die Zwischenablage kopiert!
chronyrebased to version 4.8The
chronypackages are rebased to upstream version 4.8, which includes the following notable enhancements and bug fixes:-
The
maxunreachoption is added to limit the selection of unreachable sources. -
The
-uoption is added to thechronyccommand to drop root privileges. -
The
opencommandsdirective is added to select remote monitoring commands. -
The
waitsyncedandwaitunsyncedoptions are added to thelocaldirective. -
The RTC
refclockdriver is added. -
You can specify the PHC
refclockdriver with a network interface name. - Detection of clock interference from other processes is added.
-
The
chronycsocket is hidden to mitigate unsafe permissions changes. -
The
refclocksamples are validated for reachability updates.
-
The
- valgrind rebased to upstream version 3.26.0
The upgrade to the upstream version 3.26.0 provides the following notable enhancements:
-
valgrind recognizes the following Linux kernel system calls:
cachestat,futex_waitv,listmount,mount_setattr,mseal,quotactl_fd,remap_file_pages,setdomainname,statmount,swapoff,swapon,sysfs, andustat. -
A new option,
--modify-fds=yes, has been added. This option behaves like--modify-fds=high, returning the highest available file descriptor first. However, if file descriptors0,1, or2(stdin,stdout,stderr) are available, they are returned before higher-numbered file descriptors. -
When
--xml=yesis used, log output protocol version 6 is always enabled. Protocol version 6 includes error summaries in the XML output. -
A new value,
bad, has been added for the--track-fdsoption. When--track-fds=badis specified, valgrind reports only invalid file descriptor usage, such as double close or use of an invalid file descriptor. It does not report unclosed file descriptors at program exit. -
DWARF inlined subroutine handling has been rewritten to work across compilation units. This update removes backtraces that previously displayed
UnknownInlinedFunin warnings or error messages. A new utility script,
vgstack, has been added. Usevgstack <PID>to attach to a running valgrind process and display backtraces of the target executable. The script provides the following options:-
-h- Displays minimal help. -
-v- Displays version information.
-
-
valgrind recognizes the following Linux kernel system calls:
- SystemTap is rebased to version 5.4
SystemTap is rebased to version 5.4. The notable changes in this update include:
-
Implicit Header Discovery: The
@cast()operator now automatically searches the Linux Userspace API (UAPI)<vmlinux.h>header for type declarations. This reduces the requirement for manual header file inclusion in many common tracing scenarios. - Enhanced Type Validation: Improvements to type checking and autocast processing provide more rigorous analysis during the translation phase, identifying potential type mismatches earlier in the development cycle.
-
Implicit Header Discovery: The
elfutilsrebased to 0.194The upgrade to the upstream version 0.194 provides the following notable enhancements:
-
debuginfod-find: Fixed a caching issue that prevented re-downloading files after a user-cancelled download. elfclassify: Added the following new options:-
--has-debug-sections -
--any-ar-member
-
-
elflint: Vendor and application-specific ELF note types no longer trigger compliance errors. -
libdwfl_stacktrace: Added a new function,dwflst_sample_getframes. -
libelf: Added manual pages for many library functions. -
readelf: Improved performance by up to 13% when using the-Noption.
-
sscgrebased to version 4.0.3The
sscgpackages are rebased to upstream version 4.0.3. This version provides important fixes and enhancements, most notably the following:- Module-Lattice-Based Digital Signature Algorithm (ML-DSA) key generation is supported to provide post-quantum cryptography capabilities.
- Elliptic Curve Digital Signature Algorithm (ECDSA) key generation is supported.
- The command-line interface help output is reorganized into logical groups.
- Apache’s
ErrorLogFormatsupports millisecond timestamps With this update, Apache’s
ErrorLogFormatsupports millisecond timestamps. Millisecond-level timestamps in error logs improve log filtering, troubleshooting efficiency, and cross-system traceability. You can configure this, for example, by using the%{m}tformat specifier. As a result, you can correlate and filter logs across systems with millisecond precision.Jira:RHEL-129692[1]
4.5. Networking Link kopierenLink in die Zwischenablage kopiert!
iprouterebased to version 6.17.0The
iproutepackage has been updated to upstream version 6.17.0.Notable enhancements:
-
The
tcutility supports 64-bit hardware packet counters. -
The
iputility displays thenetns-immutableproperty. -
The
iputility supports theIFLA_VXLAN_MC_ROUTEconfiguration attribute. -
The
ip neighcommand supports theextern_validflag. -
The
ip rulecommand supports port and Differentiated Services Code Point (DSCP) mask. -
The
ip statscommand supports bridge VLAN statistics. -
The
bridge fdbcommand supports the forward database (FDB) activity notification control. -
The
bridge mdbcommand supports the offload failed flag. - The color output handling was improved.
-
The
- HSR RedBox support for non-HSR device integration
With this enhancement, you can configure High-availability Seamless Redundancy (HSR) interfaces as a Redundancy Box (RedBox). This mode provides a communication path between standard Ethernet devices and an HSR ring. By designating an interlink port on the HSR interface, external devices connected to the interlink port reside within the same layer-2 domain as the ring participants. The interlink port operates in High-availability Seamless Redundancy to Singly Attached Node (HSR-SAN) mode, which handles the insertion and removal of HSR tags as traffic passes between the redundant network and the connected devices.
Jira:RHEL-100940[1]
- The PRP and HSR protocols are fully supported
The
hsrkernel module provides the following protocols:- Parallel Redundancy Protocol (PRP)
High-availability Seamless Redundancy (HSR)
The IEC 62439-3 standard defines these protocols, and you can use this feature to configure redundancy with zero-time recovery in Ethernet networks.
The protocols were previously available as a Technology Preview. Starting with RHEL 9.8, Red Hat fully supports this module.
Jira:RHEL-100941[1]
- Nmstate can set alternative names on network interfaces
With this enhancement, you can use the Nmstate API to set alternative names on network interfaces to simplify configuration management and support processes. For example, to assign
LANas an alternative name toenp1s0and remove the nameinternal-LAN, use:interfaces: - name: enp1s0 alt-names: - name: LAN - name: internal-LAN state: absentJira:RHEL-110781[1]
- NetworkManager and Nmstate support configuring IPv4 forwarding per interface
With this enhancement, NetworkManager can enable and disable IPv4 forwarding per network interface. This enables granular control directly in NetworkManager connection profiles, and updating
sysctlkernel settings is no longer required. If you enable theipv4.forwardingparameter in a profile, the corresponding interface acts as a router and forwards IPv4 packets. With the default valueauto, NetworkManager enables IPv4 forwarding if any shared connection is active and, in other cases, it uses the kernel default value.This feature is also available in Nmstate.
Jira:RHEL-110793[1]
- The kernel supports setting a lower TCP maximum retransmission timeout value
With this enhancement, you can set a lower maximum TCP retransmission timeout value than the default
120000ms to reduce network latency. Note that changing this setting can require tuning other kernel settings as well.You can configure this limit either through the
tcp_rto_max_mskernelsysctlsetting or theTCP_RTO_MAX_MSsocket option. If you set both, the socket option has a higher priority.Jira:RHEL-115191[1]
- Setting the DHCP client ID is now possible through a kernel argument
With this update, users can now set the DHCP client ID as a kernel argument. Certain DHCP servers require this ID to identify a client correctly. By setting the
rd.net.dhcp.client-idkernel argument, the client ID is already available during early boot operations.Jira:RHEL-122166[1]
- NetworkManager supports specifying an HSR interlink interface
With this update, RHEL users can configure an interlink interface for High-availability Seamless Redundancy (HSR) connections. Users can now use the
hsr.interlinkproperty to specify the interlink interface name. As a result, you can configure RHEL as a Redundancy Box (RedBox).Jira:RHEL-122175[1]
- The NetworkManager Libreswan plugin supports using a single tunnel for multiple subnets
This update enhances the NetworkManager Libreswan client plugin to configure multiple subnets in IPsec policies. This corresponds to the use of multiple subnets in the
leftsubnetsandrightsubnetsparameters in the Libreswan configuration. As a result, users can connect to multiple subnets by using a single IPsec tunnel.Jira:RHEL-124258[1]
- FRRouting 10 package introduced in RHEL 9 AppStream repository
A new package,
frr10, is available in the RHEL 9 AppStream repository. This package provides FRRouting (FRR) version 10 alongside the existingfrrversion 8 package. You can now access newer routing features without replacing the earlier version. By introducingfrr10as a separate package, this update enables flexible adoption and testing of the latest FRR capabilities while maintaining compatibility with existing deployments.
- RHEL can now generate unique interface names for onboard E8xx devices
On certain hardware platforms with onboard Intel E8xx network controllers, the BIOS lists all ports of the network controllers as the same device because they have the same
Type Instancevalue in the desktop management interface (DMI) tables. Consequently, theudevservice fails to rename the interfaces when RHEL boots. On these platforms, thephys_port_namesysfsattribute is the only attribute to distinguish the ports from each other.With this enhancement, the
iceandi40edrivers can make thephys_port_namesysfsattribute available toudev. By default, this behavior is disabled on RHEL 9 to not break existing configurations. To enable the feature, addice.rh_phys_port_name=1 i40e.rh_phys_port_name=1to the kernel command line. As a result, the drivers make thephys_port_nameattribute available, andudevcorrectly renames the interfaces. The interfaces have thenp_<number_>suffix.Jira:RHEL-126034[1]
- VLAN segmentation support for HSR and PRP interfaces
With this enhancement, you can create VLAN interfaces on top of High-availability Seamless Redundancy (HSR) and Parallel Redundancy Protocol (PRP) interfaces to enable network traffic segmentation. When configured, the kernel adds a VLAN tag to all packets transmitted through the VLAN interface. This provides greater control over traffic isolation. Note that supervision frames remain unaffected by this configuration and are always transmitted without a VLAN tag.
Jira:RHEL-130476[1]
- The
dpllutility can manage and monitor DPLL devices With this update, the
iproutepackage includes thedpllutility which you can use to manage and monitor digital phase-locked loop (DPLL) devices. The utility useslibmnlto communicate with the kernel through thenetlinkinterface, providing a configuration tool for DPLL devices and pins.
- Unbound rebased to version 1.24.2
The Unbound packages have been rebased to version 1.24.2. This update provides several enhancements and a security fix:
- Resolved a possible domain hijacking attack (CVE-2025-11411).
-
Added the
unbound-control cache_lookup <domains>command to query the cache for specific domains. -
Added
zone statussupport for Unbound authoritative zones (auth-zones). -
Added
resolver.arpaandservice.arpato the default list of locally served zones. -
Added configuration options for DNS Error Reporting (RFC 9567) and support for the
RESINFOresource record (RR) type.
Jira:RHEL-132717[1]
- The K1 power state flag can be disabled on
e1000eNICs The K1 state reduces power consumption on ICH-family network interface controllers (NIC) during idle periods. However, on Intel Meteor Lake and later platforms, enabling K1 state on NICs that use the
e1000edriver can cause packet loss due to firmware misconfiguration, interoperability with certain link partners, and other conditions.Default:
- The K1 state is disabled on Intel Meteor Lake and later platforms.
The K1 state is enabled on platforms earlier than Intel Meteor Lake.
If you experience problems related to the K1 power state, disable K1 for the affected device:
Display the current status:
# ethtool --show-priv-flags <device> ... disable-k1: offDisable the K1 state:
# ethtool --set-priv-flags <device> disable-k1 on
Jira:RHEL-134986[1]
- The FOU and GUE protocols added to the kernel
This update adds the
fouandfou6modules to thekernel-modules-extrapackage. With these modules, you can configure connections that use the following protocols:- Foo-over-UDP (FOU), which encapsulates IP protocols directly within UDP packages, without adding extra headers. For example, you can use this protocol for tunneling protocols, such as Generic Routing Encapsulation (GRE) or IP-in-IP (IPIP).
Generic UDP Encapsulation (GUE), which adds a small header inside the UDP payload to carry metadata, such as the inner protocol. With GUE, you can use multiple protocols on the same UDP port, which makes GUE more flexible than FOU.
Red Hat does not support the
fouandfou6kernel modules.
Jira:RHEL-138741[1]
- Qualcomm wireless cards work correctly if passed through to a VM
Due to missing upstream support for passing Qualcomm wireless cards to VMs by using the PCI pass through feature, these cards do not work correctly in VMs. With this update, the
ath11kandath12kdrivers use certain kernel parameters to work around the problem. As a result, Qualcomm wireless cards that use these drivers work if you pass the devices to VMs. Note that the solution is only an unsupported workaround.Jira:RHEL-141399[1]
- Nmstate can configure Libreswan and use its default values
By default, the NMstate API uses NetworkManager to send configurations to Libreswan service. In this case, NetworkManager defines default values, which are different from Libreswan’s defaults. With this enhancement, you can set
nm-auto-defaults: falsein the YAML file and Nmstate does not inject any extra settings. In this case, Libreswan uses this configuration and also its own default values.For backward compatibility, the default value of
nm-auto-defaultsistrue.Jira:RHEL-141605[1]
4.6. Kernel Link kopierenLink in die Zwischenablage kopiert!
Red Hat Enterprise Linux 9.8 is distributed with the kernel version 5.14.0-687.5.1.
- BPF trampoline support on IBM PowerPC (
ppc64le) Before this update, BPF trampoline and associated functionality, including BPF
STRUCT_OPSfeatures such assched_ext, were not available on the IBM PowerPC (ppc64le) architecture in Red Hat Enterprise Linux 9.With this update, Red Hat Enterprise Linux 9.8 running on
ppc64lecan use BPF trampoline and BPFSTRUCT_OPS-based features, such assched_ext, for advanced tracing and scheduling use cases.Jira:RHEL-14156[1]
- PerfMon support added for Clearwater Forest on CentOS Stream kernel
With this update, PerfMon support is added for Clearwater Forest, a hardware or software platform, on the CentOS Stream kernel. This enhancement enables performance monitoring for the Clearwater Forest platform, improving overall system efficiency and stability.
Jira:RHEL-45067[1]
- EDAC driver adds Intel Clearwater Forest server support
The EDAC driver is updated to add platform support for Intel Clearwater Forest (CWF) servers, enhancing RAS capabilities for this hardware. This change improves error detection and correction functionality specific to the Intel platform.
Jira:RHEL-45085[1]
- Uncore events counters support enabled on the Panther Lake platform
With this update, you can use uncore events counters on the Panther Lake platform to monitor system performance.
Jira:RHEL-47456[1]
- Full
perfsupport for Intel Core Ultra Series 2 and 3 processors The
perftool now provides full support for Intel Core Ultra Series 2 and Intel Core Ultra Series 3 processors. This update enables the complete range ofperffunctionality, including performance counters and C-state events. As a result, you can perform comprehensive hardware profiling, power-management analysis, and performance tuning on these Intel platforms.Jira:RHEL-74193[1]
- Intel QAT GEN6 device driver support
The Intel QAT crypto device driver is updated to support QAT GEN6 devices through the new
qat_6xxxdriver. GEN6 devices enable concurrent use of symmetric encryption, asymmetric encryption, and data compression. This was not available in earlier generations.Jira:RHEL-94929[1]
tpm2-toolsrebased for TPM 2.0 improvementsThe
tpm2-toolspackage is updated to ensure compatibility with modern TPM 2.0 hardware and improve security tooling support. This update enables enhanced TPM-based operations and aligns with upstream security and feature developments.Jira:RHEL-94933[1]
- Device IDs are added for the In-memory Analytics Accelerator (IAA) on the Wildcat Lake platform
With this update, the IAA is now moved from a Technology Preview to the supported state and the device IDs are added for In-memory Analytics Accelerator (IAA). As a result, devices on the Wildcat Lake platform are now supported.
Jira:RHEL-95629[1]
- Perfmon drivers now support Wildcat Lake CPU platform
With this update, Perfmon drivers now support the Wildcat Lake CPU platform, enhancing performance monitoring on compatible hardware.
Jira:RHEL-95671[1]
- Uncore events counter support for Intel Wildcat Lake platform
With this update, you can use uncore events counter for the Intel Wildcat Lake platform to monitor system performance. As a result, you can analyze performance on Intel-based systems.
Jira:RHEL-95673[1]
- View CVEs patched by live kernel updates
kpatchreports which kernel CVEs are patched by live patches for the currently running base kernel. With this update, administrators can verify that specific CVEs are remediated, even if the on-disk kernel version appears vulnerable.By listing CVEs that are patched only by
kpatch, this enhancement improves security reporting and supports compliance workflows and external scanners that must account for live-patched vulnerabilities.Jira:RHEL-103845[1]
- LUKS volume keyfor secure
vmcoredata saving on RHEL systems With this update, you can pass the LUKS volume key to the
kdumpkernel, to savevmcoredata to a LUKS-encrypted disk volume. This enhancement securesvmcoredata on RHEL systems, as sensitive data remains protected in the event of system crashes. To activate this optional feature, you must use thekdumpctl setup-crypttabcommand. This update is available for the x86_64 architecture in RHEL 9.8.Jira:RHEL-104939[1]
- The
perftool now supports AMD Turin LdLat filtering for IBS on RHEL With this update, the Perf tool now supports Load Latency (LdLat) filtering for 5th Generation AMD EPYC processors (also known as Turin). This enhances Instruction-Based Sampling (IBS) capabilities of
perf. This improvement aims to provide more accurate and efficient performance analysis on AMD systems.Jira:RHEL-106898[1]
- Updating
kernelCCP crypto driver support for Venice PCI device This update adds support for the AMD Venice CCP crypto device with PCI device ID 0x17D8 (PCIID 1002:17D8) in the kernel CCP driver. With this change, systems equipped with Venice CCP hardware can use the device’s enhanced cryptographic offload capabilities.
Jira:RHEL-106910[1]
- Userspace action triggers for rtla
With this update, the rtla tool now supports triggering userspace actions either when a latency threshold is reached or when tracing concludes. This allows you to execute diagnostic commands immediately or extract trace data before the instance is removed, regardless of whether a threshold violation occurred.
Jira:RHEL-113482[1]
crashrebased to 9.0.1The
crashpackage, which provides a kernel analysis utility for live systems and various types of dump files, is rebased to upstream version 9.0.1. This version provides a number of fixes and enhancements, most notably the following:-
Internal
gdbis updated to version 16.2. -
Added
gdb multi-stackunwind support on 64-bit architectures (x86-64-v3), aarch64, and ppc64. - Added Rust support.
-
Internal
- You can select
cyclictestortimerlatas the measurement modules inrteval With this update, you can select the measurement module for the
rtevalutility. This overrides the default setting in therteval.conffile. This new feature, 'measurement-module', provides greater flexibility and control over performance testing, which enhances the precision and customization.Jira:RHEL-114928[1]
- Advanced performance analysis enabled with
perfutility anddebuginfodclient support With this update, advanced performance analysis is enabled using the
perfutility withdebuginfodclient support in RHEL-9. This enhancement enables debugging and probing performance issues. The feature introduces new runtime dependencies and is currently limited to probing.Jira:RHEL-124984[1]
4.7. File systems and storage Link kopierenLink in die Zwischenablage kopiert!
cryptsetuprebased to version 2.8.0The
cryptsetuppackage has been upgraded to version 2.8.0. This update provides the following feature enhancements:-
Added support for inline mode on NVMe drives, eliminating double writes caused by journaling in the
dm-integritytarget. This improves performance for bothcryptsetupencryption and decryption when using authenticated encryption modes as well as forintegritysetupin standalone integrity device protection. -
Extended the
cryptsetup reencryptcommand to support LUKS2 tokens, enabling reencryption of existing LUKS2 devices, including token-bound devices. - Optimized LUKS2 metadata writes, improving reencryption for configurations with metadata larger than 12 KiB, particularly for configurations sized in megabytes.
Jira:RHEL-100089[1]
-
Added support for inline mode on NVMe drives, eliminating double writes caused by journaling in the
io_uringinterface added for asynchronous I/OThe
io_uringinterface supports asynchronous I/O operations. With this update, applications use this interface to submit multiple I/O requests without blocking the calling process.io_uringuses shared ring buffers between user space and kernel space to reduce system call overhead and avoid buffer copying. This interface is more efficient and supports more asynchronous system calls than Linux AIO.Jira:RHEL-120699[1]
snapmrebased to 0.7.0The
snapmpackage has been rebased to upstream version 0.7.0. This version provides important fixes and enhancements, most notably the following:-
The new Mount Manager mounts and unmounts entire snapshots. You can run commands or interactive shells inside mounted snapshot sets by using the
snapset {mount, umount, exec, shell}subcommands. -
The Difference Engine was added to compare snapshot sets or to compare against the running system. You can specify output formats, such as
paths,full,short,json,diff,summary, andtree. - The performance of the Stratis plugin was improved. With this update, the plugin queries the D-Bus every 5 seconds and caches the results internally. This improvement significantly reduces the time to discover Stratis snapshots.
Jira:RHEL-137377[1]
-
The new Mount Manager mounts and unmounts entire snapshots. You can run commands or interactive shells inside mounted snapshot sets by using the
- Multipath automatically removes unmapped LUNs
Before this update, multipath devices remained in the system if you did not remove SCSI devices before disconnecting a LUN. This sometimes resulted in queued I/O or incorrect writes if the LUN was repurposed.
With this update, the
purge_disconnectedoption is available in thedefaults,devices, andmultipathssections of themultipath.conffile. When you set this option toyes, themultipathddaemon automatically removes disconnected SCSI devices from the system.
4.8. High availability and clusters Link kopierenLink in die Zwischenablage kopiert!
- HAProxy rebased to 2.8
The HAProxy package has been rebased to the upstream Long-Term Support (LTS) version 2.8. The notable changes in this update include:
- Security updates and critical fixes for RHEL 9 after the previous 2.4 LTS release reaches its End-of-Life (EOL) date in Q2 2026.
- Numerous upstream stability, performance, and functional improvements accumulated between versions 2.4 and 2.8.
For a complete list of changes, see the HAProxy webpage.
Jira:RHEL-74039[1]
4.9. Dynamic programming languages, web and database servers Link kopierenLink in die Zwischenablage kopiert!
- A new module stream:
postgresql:18 RHEL 9.8 introduces PostgreSQL 18 as the
postgresql:18module stream.Notable changes:
-
The new Asynchronous I/O (AIO) subsystem provides up to three times faster data reads. You can enable this subsystem by setting the
io_methodvariable. - The MD5 authentication method is deprecated and will be removed in a future major PostgreSQL release.
- By default, data page checksums are enabled in PostgreSQL 18. If you upgrade from a previous version with data page checksums disabled, you must either enable the feature before the update or disable it during the upgrade. For further details, see Upgrading from a RHEL 9 version of PostgreSQL 16 to PostgreSQL 18.
- PostgreSQL 18 supports native OAUth 2.0 single sign-on authentication.
- The database service supports Federal Information Processing Standards (FIPS) mode validation for regulated environments.
-
The
pg_upgradeutility preserves statistics during major release upgrades and significantly faster reaches full performance after an upgrade.
Jira:RHEL-90852[1]
-
The new Asynchronous I/O (AIO) subsystem provides up to three times faster data reads. You can enable this subsystem by setting the
- A new module stream:
mariadb:11.8 MariaDB 11.8 is available as a new module stream,
mariadb:11.8.Notable changes over the previously available version 10.11 include:
-
By default, MariaDB 11.8 uses the
utf8mb4character set instead oflatin1and legacyutf8to ensure full Unicode support. Vector support was added to support machine learning. This includes the
VECTOR(N)data type and the following functions:-
VEC_DISTANCE() -
VEC_DISTANCE_EUCLIDEAN() -
VEC_DISTANCE_COSINE() -
Vec_FromText(json_array) -
Vec_ToText(vector_column)
-
-
The
mariadb-dumpandmariadb-importutilities natively support parallel operations. Specify the--dirand--paralleloptions to dump or load multiple databases simultaneously. -
The upper limit of the
TIMESTAMPdata type was increased from2038-01-19to2106-02-07while still using 4 bytes of storage. -
The
UUID_v4()andUUID_v7()functions were added. -
The JSON handling was improved. This includes new functions, such as
JSON_SCHEMA_VALID(). The following system variables were added to define the maximum storage for temporary tables and other internally created temporary files:
-
max_tmp_session_space_usagelimits the disk space used per session -
max_tmp_total_space_usagelimits the total disk space used by the MariaDB server instance
-
-
The
des_encryptanddes_decryptconfiguration file parameters are deprecated and will be removed in a future MariaDB release.
Notable breaking differences:
The following utilities were renamed but symbolic links were created for backward compatibility:
-
mysql>mariadb -
mysqldump>mariadb-dump -
mysqladmin>mariadb-admin
If you still use the previous names of these utilities, they display deprecation warnings.
-
-
The
innodb_defragmentconfiguration parameter is no longer supported. Remove it from your configuration files.
For more information about MariaDB, see Using MariaDB.
To install the
mariadb:11.8stream, enter:# dnf module install mariadb:11.8If you want to upgrade from MariaDB 10.11, see Upgrading from a RHEL 9 version of MariaDB 10.11 to MariaDB 11.8.
For information about the length of support for the
mariadbmodule streams, see Red Hat Enterprise Linux Application Streams Life Cycle.Jira:RHEL-96956[1]
-
By default, MariaDB 11.8 uses the
- New
ruby:4.0runtime module stream with database connectors The
rubymodule provides a new Ruby 4.0 runtime, including database connector support. As a result, Red Hat Enterprise Linux 9.8 users can use Ruby 4.0 alongside existing Ruby streams to develop and run Ruby applications with supported database connectivity.Jira:RHEL-142278[1]
- The
mysql:8.4module now includes theperl-DBD-MySQLpackage This update adds the
perl-DBD-MySQLpackage to themysql:8.4module. Starting with Red Hat Enterprise Linux (RHEL) 9.7, theperl-DBD-MySQLpackage is linked againstlibmysqlclientinstead oflibmariadb. To ensure compatibility,perl-DBD-MySQLis included withinmysql:8.4. As a result, theperl-DBD-MySQLpackage is fully compatible with themysql:8.4module, which resolves dependency conflicts and installation failures.
- New Python 3.14 stack is available
Red Hat Enterprise Linux 9.8 now includes the
python3.14stack. This new alternative stack provides Python 3.14 for developing and running applications.Jira:RHEL-120823[1]
4.10. Compilers and development tools Link kopierenLink in die Zwischenablage kopiert!
- Optimized
glibcmath routines on x86-64-v3 hardware On x86-64 systems that support the x86-64-v3 microarchitecture level, the
glibcmath library now provides additional IFUNC-optimized implementations of selected functions. The functionsatanh,expm1,log1p,log2,sincos,sinh, andtanhnow have optimized variants that use x86-64-v3 instructions, improving execution efficiency for workloads that rely on these operations.As a result, the execution time for workloads that perform large volumes of these mathematical computations might be reduced.
- Documented
glibcmemstream behavior withSEEK_END The
glibcmemstream documentation describes the implementation behavior ofopen_memstreamwhen you useSEEK_ENDto change the file position. This clarification aligns the documentation with the new requirement to documentglibcbehavior, introduced inPOSIX.1-2024, and helps you understand how seeking affects the current position and buffer contents.
- Enhanced
gcovfunction coverage summaries ingcc Before this update,
gcovfunction summaries only reported the number of lines executed and did not include details about branch or call coverage within the function.With this enhancement, requesting function summaries using the
-foption now includes data on branches taken and function calls made within the profiled function. This provides a more comprehensive view of function-level test coverage.Jira:RHEL-105416[1]
glibcaddsGLIBC_ABI_DT_X86_64_PLTsymbol support on x86_64 systemsThis enhancement adds the
GLIBC_ABI_DT_X86_64_PLTsymbol version toglibcon x86_64 systems, so programs that require this symbol at startup no longer fail to start and instead run as expected.Jira:RHEL-109622[1]
- Rust Toolset is rebased to version 1.92.0
In RHEL 9.8,
rust-toolsetis rebased to version 1.92.0 from version 1.88.0. This update delivers multiple improvements to debugging, systems programming features, memory safety diagnostics, and Rust workflow tooling for RHEL developers.Notable enhancements include:
-
More reliable debugging on Linux because unwind tables are now emitted by default even when compiling with
-Cpanic=abort, which ensures that backtraces work correctly for debugging. - Improved systems programming support with full i128 and u128 support in extern "C" functions and the ability to create raw pointers to union fields using &raw in safe Rust code.
-
Enhanced safety diagnostics through the new
dangling_pointers_from_localslint, which warns against returning dangling raw pointers derived from local variables. -
Clearer lifetime relationships with the new
mismatched_lifetime_syntaxeslint, which warns when lifetime elision rules hide potentially confusing relationships between input and output lifetimes. Workflow improvements in Cargo, including native support for workspace publishing with
cargo publish --workspace, which automatically handles dependency ordering for multi-crate projects.Rust Toolset is delivered as a rolling Application Stream, and only the latest
rust-toolsetversion is supported. For more information about Rust Toolset life cycle and support, see the Red Hat Enterprise Linux Application Streams Life Cycle.
-
More reliable debugging on Linux because unwind tables are now emitted by default even when compiling with
- The Red Hat Build of OpenJDK 25 integrates with the
crypto-policiespackage for secure system property handling With this update, the Red Hat Build of OpenJDK 25 for RHEL integrates with the RHEL
crypto-policiespackage. This enhancement ensures secure system property handling and improves the security of Java applications running on RHEL by loading additional configuration files based on Red Hat system properties. This change also adds FIPS support using NSS.Jira:RHEL-128412[1]
glibclocale for Bulgaria now uses the euro currency symbolThe
glibcpackage now uses the euro currency symbol for thebg_BGlocale, reflecting Bulgaria’s adoption of the euro as of 2026-01-01.As a result, applications using the
bg_BGlocale display currency values with the updated euro symbol, ensuring consistency with the current official currency.
- Rebase
llvmtoolset to version 21 The
llvmtoolset has been rebased to version 21 in RHEL 9.8. This rebase provides updated compiler and tooling features for building and optimizing applications that depend onllvm.As part of this change, dependent packages in RHEL 9 have been rebuilt against
llvm21 to ensure compatibility with the updated toolset.The notable changes are:
-
The
nocapturefunction attribute is replaced by the more expressivecaptures(none)attribute in LLVM IR, clarifying pointer capture semantics. -
Constant expression forms of several arithmetic instructions, including
mul, are removed in favor of using regular instructions, simplifying IR and optimizations. -
Inline assembly calls no longer accept
labeloperands. Thecallbrinstruction must be used instead, which clarifies semantics for indirect labels. -
New
fmaximumandfminimumoperations are supported in theatomicrmwinstruction, aligning atomic floating-point operations withllvm.maximum.*andllvm.minimum.*behavior. - Multiple back ends, including AArch64, AMDGPU, RISC-V, PowerPC, and others, receive code generation improvements, new ISA extensions, and bug fixes that can result in better performance and broader hardware support.
-
The
- Improved
trylockperformance inglibcfor heavily contended multi-core workloads With this enhancement, the
glibcpackage optimizes thetrylockimplementation for workloads with high thread counts on multi-core systems, improvingtrylockthroughput under heavy contention.
LD_DEBUG,TLS, andTCBtracing support inglibcWith this enhancement,
glibcadds tracing support for Thread-Local Storage (TLS) and Thread Control Block (TCB) operations through thetlscategory of theLD_DEBUGenvironment variable. You can useLD_DEBUG=tlsto trackTLSandTCBrelated events in the dynamic linker and improve analysis of complex runtime issues.LD_DEBUGalso supports excluding specific debug categories by prefixing the category name with a dash, for example,LD_DEBUG=all,-tls, so that you can refine the debug output.Jira:RHEL-49785[1]
- Croatia locale uses the euro currency symbol in
glibc The
glibcpackage now uses the euro currency symbol for thehr_HRlocale in RHEL. This change aligns Croatian locale data with the country’s current official currency.As a result, applications that rely on
glibclocale information for thehr_HRlocale now display the up-to-date euro currency symbol instead of the former Croatian kuna.Jira:RHEL-140105[1]
glibcaddsRTLD_DI_ORIGIN_PATHto prevent buffer overflowsThe
RTLD_DI_ORIGIN_PATHdlinforequest type inglibcaccepts the size of the destination buffer when retrieving the shared object origin path. This request type helps avoid buffer overflows when obtaining the shared object origin path.The behavior of the existing
RTLD_DI_ORIGINrequest type remains unchanged.
4.11. Identity Management Link kopierenLink in die Zwischenablage kopiert!
- IdM password policies support
libpwqualitycharacter credit options Identity Management (IdM) password policies support four new options (
--dcredit,--ucredit,--lcredit, and--ocredit) based on thelibpwqualitycredit system. A negative value sets the minimum number of characters of that type required in a password; a positive value provides a credit toward the minimum password length. These options are mutually exclusive with--minclassesand offer a more granular way to enforce per-class character requirements. As a result, administrators can configure specific character type minimums in IdM password policies, for example, to satisfy DISA STIG compliance requirements.For more information, see Additional password policy options in IdM.
Jira:RHEL-73399[1]
- samba rebased to 4.23.0
The
sambapackages, which provide file and print services using the SMB protocol, have been rebased to upstream version 4.23.0. This version provides important fixes and enhancements, most notably the following:- SMB3 UNIX Extensions are enabled by default to provide support for POSIX semantics, such as proper POSIX permissions and symlink handling, for UNIX and Linux clients.
-
Experimental support for SMB3 connections over Quick UDP Internet Connections (QUIC) is introduced. Configurable through
client smb transportsandserver smb transports, this allows for secure SMB traffic over UDP port 443, which is ideal for remote access. -
The new
smb_prometheus_endpointutility exports Samba server metrics in a Prometheus-compatible format to facilitate performance and status monitoring. The
samba-tool domain backup --no-secretscommand explicitly removes confidential attributes, such as BitLocker recovery data and KDS root keys, from backups.For a complete list of changes, see Samba 4.23.0 Available for Download.
- ipa rebased to 4.13.0
The
ipapackages have been rebased to upstream version 4.13.0. This version provides important fixes and enhancements, most notably the following:- A new responsive and intuitive beta interface is available as a Technology Preview. You can experiment with it and provide feedback.
-
You can use the
ipa-idrange-fixtool to identify users and groups outside current ID ranges and propose new ranges to include them. - The requirement for unique Certificate Authority (CA) subject names is relaxed, which enables duplicates under specific trust and nickname conditions.
- The platform supports the full 32-bit ID range space.
- This release resolves over 170 bugs and improves overall system performance and stability.
- cepces rebased to 0.3.12
The
cepcespackage, which provides a certificate enrollment client for Microsoft Active Directory Certificate Services (AD CS), has been rebased to upstream version 0.3.12. This version provides important fixes and enhancements, most notably the following:- Support for GSSAPI channel bindings to bind Kerberos authentication to the TLS (HTTPS) tunnel is available. This is required for compatibility with Windows Server 2025, which enforces stricter security requirements for SOAP-based certificate enrollment web services (CEP/CES) by default.
- Authentication handshake failures when connecting to modern Windows environments that have TLS channel binding and Kerberos security policies enabled are fixed.
-
Updates to the
cepces-submithelper ensure smoother communication with thecertmongerservice during automated certificate renewal cycles.
Jira:RHEL-121787[1]
dsctl dbverifyprovides clearer output when a specified backend does not existThe
dsctl dbverifycommand, used to verify the integrity of a Directory Server database, provides explicit feedback depending on the database backend type. For Berkeley Database (BDB) backends, the command now returns an error when the specified backend does not exist, instead of incorrectly reporting a successful verification. For LMDB backends, the command displays a warning that the verification is always reported as successful because LMDB has built-in integrity protection. As a result, administrators can distinguish between a missing backend and a genuinely successful verification when runningdsctl dbverify.Jira:RHEL-123893[1]
- You can configure external password reset agents in IdM
When integrating Identity Management (IdM) with a third-party application that does not support Kerberos authentication, you can define a dedicated system account for the application to securely reset user passwords. Notably, these resets do not trigger the "password change required" flag, ensuring a seamless login experience for the end user. The system account authenticates by using LDAP.
As a result, organizations can integrate their own secure password management solutions directly with IdM.
Jira:RHEL-126515[1]
- Support for generating LWCA certificates and private keys on an HSM
For installations using a hardware security module (HSM), Lightweight CA (LWCA) certificates and private keys are now generated on the HSM. This provides the same hardware-level security for the private keys as the root CA private key. The LWCA private key is generated on the HSM with the HSM token name as the prefix, for example
mytoken:lwca.Jira:RHEL-128238[1]
- pki rebased to 11.7.1
The
pkipackages have been rebased to upstream version 11.7.1. This version provides important fixes and enhancements, most notably the following:-
A race condition that caused
ipa ca-addto fail with a "500 Internal Server Error" when adding multiple Sub-CAs in rapid succession is resolved. With this update, the CA engine correctly synchronizes authority initialization with signing certificate availability, which prevents API timeouts during high-volume operations. -
A regression where enabling the
nuxwdogwatchdog prevented the PKI service from starting is fixed. Thepki-server-nuxwdogutility correctly interfaces withsystemd-ask-password, enabling users to provide required credentials at startup when a password file is missing. - An issue where the PKI server failed to issue certificates when a Sub-CA was specified is resolved. This fix ensures the certificate request pipeline correctly identifies and utilizes Sub-CA signing keys, which restores full functionality to multi-tier CA environments.
-
A race condition that caused
- Automated services no longer reset account lockout counters
This update ensures that automated services like
crondandsystemd-userare prevented from unlocking accounts locked byfaillock. Previously, these services would automatically clear the "failed login" counter when they ran, which could allow a malicious actor to keep guessing passwords without being permanently locked out. With this release, once an account is locked by a security policy, it remains locked until the timeout expires or an administrator intervenes, regardless of any background system activity.
- ansible-freeipa rebased to 1.16.0
The
ansible-freeipapackages, which provide Ansible modules and roles for Identity Management (IdM), have been rebased to upstream version 1.16.0. This version provides important fixes and enhancements, most notably the following:The
sysaccountmodule (ipasysaccount) creates and manages system accounts in IdM. Therolemodule (iparole) supports system accounts as role members, so you can assign privileges such as user password management to those accounts in playbooks. You can, for example, use system accounts to integrate IdM with an external password reset management solution. For more information, refer to thesysaccountandrolemodule READMEs.The
ipapasskeyconfigmodule is available in theansible-freeipacollection. You can use this module to configure whether passkey authentication in IdM requires user verification, such as a PIN, when users authenticate with a passkey device. Additionally, theipausermodule supportspasskeyas a user authentication type, and theipaserviceandipahostmodules supportpasskeyas an authentication indicator.
ansible-freeipaadds support for thepasskeyauthentication type in management modulesWith this update, the
ipaconfig,ipahost,ipaservice, andipausermodules support thepasskeyauthentication type for IdM resources. This enables you to manage Passkey device authentication directly through your Ansible playbooks by setting the authentication type topasskey.
389-ds-baserebased to 2.8.0The
389-ds-basepackage, which provides an enterprise-class LDAP server, has been rebased to upstream version 2.8.0.
- You can specify an IdM server from which to update the local CA trust store
With this update, the
ipa-certupdatetool includes a new--force-server<server_fqdn>option. Before this update, an Identity Management (IdM) client only connected to its default IdM server, specified in the/etc/ipa/default.conffile, when updating the local CA trust store. If this default server was down or unreachable, theipa-certupdatecommand failed. As a result, administrators can ensure successful trust store updates and maintain service continuity, even if the primary server is unavailable.Jira:RHEL-141446[1]
4.12. SSSD Link kopierenLink in die Zwischenablage kopiert!
sudorebased to sudo-1.9.17p2The
sudopackages have been rebased to upstream version 1.9.17p2, which includes the following notable bug fixes and enhancements:-
The
sudoersfile supports regular expressions. -
The
log_subcmdsandinterceptoptions are supported. -
The
json_compactlogging is supported. - Privilege listing is enhanced.
-
Added the
cmddenial_message sudoersoption. -
The
sudoersLDAP schema now allowssudoUser,sudoRunasUser, andsudoRunasGroupto include UTF-8 characters. -
Added a new
-N(no-update) command-line option tosudo. The following
sudoerssettings can be used to support more fine-grained I/O logging:-
log_stdin -
log_stdout -
log_stderr -
log_ttyin -
log_ttyout
-
-
The
- Recursive deletion for computer objects added to
adcli The
adcli delete-computercommand supports the--recursiveoption to delete computer objects from Active Directory, including their child objects. Previously, attempting to delete a computer object that contained child objects, such as metadata for BitLocker drive recovery, failed with aCANT_ON_NON_LEAFerror in AD. With this update, users can cleanly delete computer objects that contain child objects usingadcli.Jira:RHEL-134951[1]
4.13. The web console Link kopierenLink in die Zwischenablage kopiert!
cockpitrebased to version 356The
cockpitpackages have been rebased to version 356, which provides many improvements and fixes compared to version 344 in RHEL 9.7, most notably:-
Timers created by the RHEL web console are executed directly by the
/bin/shsystem shell, and you can edit them. - The health dashboard shows a warning if the last shutdown or reboot was unclean.
-
You can override the RHEL web console branding with a custom configuration in the
/etc/cockpit/branding.cssfile. -
Support for the
pam_cockpit_certPAM module in the/etc/pam.d/cockpitfile, which is redundant since version 248, is removed. If you still use the module in your configuration, you must remove it manually. - The web console lists additional ports in a firewall zone, each in its own row, and you can delete them individually.
-
Support for TLS is removed from the
cockpit-wssubpackage. Instead, containers run thecockpit-tlsprogram and directly connect to thecockpit-wsserver. - You can detach the VNC console viewer of a virtual machine into its own window.
- The web console no longer adds both SPICE and VNC graphics when creating new virtual machines, but only VNC.
- You can shut down and restart virtual machines with a single action from the web console.
-
The
cockpit-podmanplug-in supports the quadlet lifecycle and shows inactive quadlets. - You can create empty files in the web console file manager.
-
Timers created by the RHEL web console are executed directly by the
4.14. Red Hat Enterprise Linux System Roles Link kopierenLink in die Zwischenablage kopiert!
- Disk partition management available to the storage role
With this update, you can manage disk partitions by using the storage role, streamlining storage management. With this unified approach you can add, remove, resize, and format partitions, ensuring consistent and repeatable results.
Jira:RHEL-112772[1]
- Support for bootable snapshots with
snapm With this update, you can create bootable snapshot sets on platforms that support
snapm, such as RHEL 9.6 and Fedora 41 or later. You can now set abootableflag when requesting snapshots and boot the system directly from a snapshot.Jira:RHEL-120325[1]
- The postgresql RHEL system role now supports PostgreSQL 18
The postgresql RHEL system role, which installs, configures, manages, and starts the PostgreSQL server, now supports PostgreSQL 18.
For more information about this system role, see Installing and configuring PostgreSQL by using the postgresql RHEL system role.
Jira:RHEL-122958[1]
- The
firewallRHEL system role supports IPv6 addresses within theipset_entries With this enhancement, you can now use IPv6 addresses within the
ipset_entriesvariable when utilizinghash:iporhash:nettypes in playbooks that use thefirewallRHEL system role. You can also specify additional<key>:<value>pairs of options foripsetby using theipset_optionsvariable. pairsDue to a limitation of the underlying
firewalldimplementation, you cannot mix IPv4, IPv6, and MAC addresses in the sameipset_entrieslist.Jira:RHEL-123040[1]
- The
ha_clusterRHEL System Role now exports additional cluster configuration variables Previously, the
ha_clusterRHEL System Role provided limited visibility into the current cluster configuration.With this update, the
ha_clusterrole has been expanded to include cluster properties and resource defaults.As a result, the following variables are now exported, allowing for easier auditing and configuration mirroring:
-
ha_cluster_cluster_properties -
ha_cluster_resource_defaults -
ha_cluster_resource_operation_defaults
Jira:RHEL-123041[1]
-
- The
sshdsystem role supports theCanonicalMatchUseroption To provide more granular control over conditional configurations, the
sshdsystem role supports thesshd_CanonicalMatchUservariable. You can specify whether to evaluate OpenSSHMatchblocks against a user’s initial login name or their final canonical username after the server rewrites it.As a result, you can consistently apply security policies in environments where external identity providers or local configuration rules modify usernames. This ensures that
Matchblocks accurately reflect the user’s identity once the server determines the final canonical username.Jira:RHEL-127973[1]
- The
ha_clusterRHEL System Role now exports cluster constraint variables Previously, the
ha_clusterRHEL System Role did not include detailed constraint information in its exported data.With this enhancement, the
ha_clusterrole now includes variables for location, colocation, order, and ticket constraints.As a result, the following variables are now available in the module output, facilitating better configuration management and role-based automation:
-
ha_cluster_constraints_location -
ha_cluster_constraints_colocation -
ha_cluster_constraints_order -
ha_cluster_constraints_ticket
Jira:RHEL-128436[1]
-
- Support added for the
fencing-watchdog-timeoutcluster property Before this update, the high-availability stack primarily supported the
stonith-watchdog-timeoutproperty for managing watchdog-based fencing. However, future Pacemaker versions replace this property withfencing-watchdog-timeout.With this update, the role handles both the legacy and new property names consistently.
As a result, the role supports future Pacemaker versions and ensures that watchdog-related cluster properties remain functional regardless of which property name you use. The role preserves both
stonith-watchdog-timeoutandfencing-watchdog-timeoutwhen creating or pushing CIB configurations.Jira:RHEL-136599[1]
- The
VersionAddendumoption is available in SSH configuration With this update, you can configure the
VersionAddendumoption in SSH settings for match blocks, host blocks, and global client configurations. This enhancement ensures compatibility with the latest OpenSSH versions and provides granular control over your SSH connections.Jira:RHEL-138279[1]
- The
sshdsystem role supportsGSSAPIDelegateCredentials The new
GSSAPIDelegateCredentialsparameter provides Generic Security Services Application Programming Interface (GSSAPI) credential delegation in Kerberos environments and enables a seamless single sign-on experience.As a result, you can automate the configuration of GSSAPI credential delegation to simplify network authentication.
Jira:RHEL-144496[1]
- The
metricsRHEL system role supports configuring TLS-encrypted connections With this enhancement, you can use the
metricsRHEL system role to configure TLS-encrypted connections to Grafana. To use this feature, specify the following variables in your playbook:-
metrics_grafana_certificatesto use thecertificateRHEL system role to generate new certificates on the managed nodes -
metrics_grafana_certandmetrics_grafana_private_keyto specify the path to an existing certificate and private key on the managed nodes -
metrics_grafana_cert_srcandmetrics_grafana_private_key_srcto copy an existing certificate and private key from the control node to the managed nodes
Jira:RHEL-144592[1]
-
- SELinux supports the DCCP and SCTP protocols
With this update, you can manage SELinux port types for Datagram Congestion Control Protocol (DCCP) and Stream Control Transmission Protocol (SCTP). By configuring SELinux port labels for these protocols, you can apply granular access controls and improve system security.
Jira:RHEL-145215[1]
- RHEL System Roles support for immutable systems (
ostree) You can use RHEL system roles to build and manage immutable operating systems. This provides a consistent management interface across different backend technologies, including
ostree.As a result, you can deploy and configure immutable systems using the same roles used for traditional systems, ensuring environment consistency. Note: This feature is currently not compatible with the
nbde_clientrole.
- In-place upgrade phases automation with the
analysis,remediate, andupgradeAnsible roles With this release, you can use the
analysis,remediate, andupgradeAnsible roles to automate the pre-upgrade and upgrade phases of the in-place upgrade. By using these Ansible roles, you can quickly and efficiently upgrade large numbers of systems, saving you time.For more information, see Upgrading large deployments by using Ansible roles.
4.15. Virtualization Link kopierenLink in die Zwischenablage kopiert!
- Encryption for libvirt secrets
This update introduces the
virt-secrets-init-encryptionservice, which encryptslibvirtsecrets, such as keys for the virtual Trusted Platform Module (vTPM). By default, this encryption usessystemdcredentials sealing. However, you can use the new/etc/libvirt/secret.conffile to specify a custom key for encrypting secrets, as well as to disable automatic encryption of secrets. As a result, critical vTPM metadata is protected from unauthorized access on the host file system. This also hardens the overall security of the virtualization environment.Jira:RHEL-7125[1]
- Faster updates for cryptographic coprocessors on IBM Z
After using the
virsh nodedev-updatecommand to update a cryptograpic coprocessor (vfio-ap) device on an IBM Z host, the new configuration now takes effect significantly faster.Jira:RHEL-73001[1]
- CPI for virtual machines on IBM Z
Virtual machines (VMs) on RHEL 9 hosts that use IBM Z hardware can now use the control program identification (CPI) feature. By using CPI, you can obtain system information about VMs without accessing them. For more information about CPI, see IBM documentation.
Note that on VMs that use IBM Secure Execution, CPI is disabled by default to ensure confidentiality, and must be enabled manually. For instructions, see Setting up IBM Secure Execution on IBM Z.
Jira:RHEL-73009[1]
- Live migration can switch from
multifdprecopy to postcopy without restarting With this update, you can enable both
multifd(multiple file descriptor) precopy and postcopy virtual machine live migration strategies.multifduses multiple parallel TCP channels during the precopy phase to maximize network bandwidth usage and reduce migration time. As a result, you can configure both migration strategies and switch from precopy to postcopy live migration without disruption. Note that, postcopy migration does not usemultifd.Jira:RHEL-97465[1]
- New
s390-ccw-virtio-rhel9.8.0machine type available for IBM Z VMs The updated
qemu-kvmpackage provides a news390-ccw-virtio-rhel9.8.0machine type for IBM Z virtual machines (VMs). This machine type enables Control Program Identification (CPI) and performance-enhanced PCI translation for passthrough PCI devices by default. As a result, IBM Z VMs that use thes390-ccw-virtio-rhel9.8.0machine type benefit from improved performance with passthrough PCI devices and CPI without additional configuration.Jira:RHEL-104005[1]
libvirtintroduces ahost-modelmode for Hyper-V EnlightenmentsThe
libvirtpackage provides a newhost-modelmode for Hyper-V Enlightenments, which automatically enables all Hyper-V enlightenments supported on the host. This mode eliminates the need for separate configuration templates for Intel and AMD hosts. As a result, you can configure<hyperv mode='host-model'/>in the XML definition of a virtual machine to automatically apply all host-supported Hyper-V Enlightenments without maintaining separate configurations for each vendor.
- Native FUA support for QEMU
With this update, the QEMU emulator no longer needs to emulate the Forced Unit Access (FUA) I/O method, and instead can use FUA natively. This can improve the overall performance of virtual storage, particularly in database workloads.
- PCCS for Intel TDX
This update introduces the Provisioning Caching Certification Service (PCCS) for Intel Trust Domain Extensions (TDX). This provides the local caching required to use Intel hosted Provisioning Certification Services (PCS) at scale, and also makes it possible to perform TDX attestation on host systems that are isolated from the public internet.
- SCSI passthrough support for virtual machines
With this update, RHEL now supports SCSI passthrough for virtual machines (VMs). With this feature, VMs can directly access host SCSI devices, such as tape drives and Storage Area Network (SAN) Logical Unit Numbers (LUNs).
As a result, you can configure VMs to use specialized storage devices that require direct SCSI access, including support for both single-path and multipathed vDisks.
Note that for SCSI passthrough to work, the host must use a supported RHEL and kernel version. For details, see: Required RHEL versions for SGIO support in Virtual Machines
Jira:RHELDOCS-21410[1]
- SCSI3 Persistent Reservation support for virtual machines
With this update, RHEL supports SCSI3 Persistent Reservation (S3-PR) for virtual machines (VMs). This feature makes it possible for multiple VMs to coordinate access to shared storage devices, which is essential for Linux clustering solutions, such as Pacemaker, and for Windows Server Failover Clustering.
As a result, VMs can register and manage persistent reservations on storage devices, which prevent conflicts when multiple VMs access the same storage. S3-PR support is available for both single-path and multipathed vDisks.
Note that for S3-PR to work, the host must use a supported RHEL and kernel version. For details, see: Required RHEL versions for SGIO support in Virtual Machines
4.16. Supportability Link kopierenLink in die Zwischenablage kopiert!
- Improved AAP plugins for more useful diagnostics
Before this update, the
sosreport was collected onAAP. With this update, the notable enhancements to the following AAP plugins are:-
aap_containerized: Resolved an issue that incorrectly enabledaap_containerizedon the RPM-based Private Automation Hub servers. -
aap_controller: Expanded the set of gathered command outputs and conditionally collectrun_wsbroadcastorrun_wsrelaydepending on the AWX release version. -
aap_eda: Collected service output details based on the installed EDA version. Starting from AAP 2.5, specific commands are used to obtain service status information. -
aap_gateway: Added additional command outputs for improved troubleshooting on Gateway servers. -
aap_hub: Centralized the collection of service information for PAH servers under a single location within the plugin directory.
-
- SSL certificate control in SOS clean process is available
With this update, you can manage SSL/TLS certificates that contain sensitive data during the SOS clean process. The new
--treat-certificatesoption provides the option to remove, obfuscate, or maintain the original binary format of these certificates ensuring that no sensitive data persists.As a result, you can enhance data security and privacy by selecting the treatment for SSL/TLS certificates during the SOS clean process.
- Automatic user detection for AAP container runners in SOS reports
With this update, the
sosutility automatically detects the user running containers for Ansible Application Platform (AAP) deployments. This eliminates the need for manual specification, ensuring the collection of all necessary AAP data.
4.17. Containers Link kopierenLink in die Zwischenablage kopiert!
- The
log-locationoption is available in the podman configuration You can specify a custom
log-locationoption in thecontainers.conffile for per-user configurations usingpodman-kube systemd. Previously, logs were restricted to a default location and could not be customized. With this release, you can define custom log paths directly in the configuration file, reducing the need to specify them manually in thepodman runcommand.Jira:RHEL-3114[1]
- Enhanced
aardvark-dnsfunctionality rereadsresolv.conffile without requiring a full process restart With this update, the Aardvark-DNS process now dynamically reloads DNS configurations in the Podman 5.x stack on Red Hat Enterprise Linux (RHEL). This eliminates the need to stop and restart the entire process when changes are made to the DNS configuration file, resulting in improved efficiency and reduced downtime for end users.
Jira:RHEL-85839[1]
container-selinuxrebased to version 2.244.0-1The
container-selinuxpackage, which provides necessary SELinux policies, types, and rules to confine and secure container runtimes, has been rebased to version 2.244.0-1. This version provides important enhancements, most notably, it streamlines the process, enhances data protection, and ensures confidentiality in deployments, while reducing potential security risks associated with public storage endpoints.
runcrebased to 1.3.3The
runcpackage, which serves as the low-level, CLI tool for spawning and running containers, is rebased to upstream version 1.3.3. This version provides important fixes and enhancements, most notably the following:- You can create and manage their own private container registries on a dedicated Azure Kubernetes Service (AKS) cluster. This enhancement streamlines container workflows, enhances security, and boosts efficiency by providing a private space for storing and distributing container images, reducing the risk of unauthorized access.
- Automates routine tasks, saves time and effort, and improves the user interface. It enables seamless integration of third-party applications, expanding the platform’s functionality and versatility for users.
- Unified Configuration available for Rootless Podman
With this update, a unified system-wide configuration file is introduced for rootless Podman, enabling centralized policy management, a consistent security baseline, and operational standardization across all users.
As a result, you can inherit sensible defaults without manual configuration, while still maintaining the flexibility to override system settings through personal configuration files. Additionally, this update ensures backward compatibility, meaning existing user workflows and configurations remain unchanged.
- The Container Tools packages have been updated
The updated Container Tools RPM meta-package, which includes the Podman, Buildah, Skopeo,
crun, andrunctools, is available. The Buildah package has been updated to version 1.43.1, and Skopeo has been updated to version 1.22.2. Podman release 5.8.2 contains the following notable bug fixes and enhancements over the previous version:-
The
podman machine init --imagecommand can runPowerShell-escapedcommands from the user-specified image path in a PowerShell session on the host when you use it on Windows with the Hyper-V backend ( CVE-2026-33414). - Automatic migration from BoltDB to SQLite after a reboot no longer performs a partial migration, leaving some containers in SQLite and others in BoltDB, when Quadlets are in use.
-
The
podman quadlet installcommand installs files that contain multiple separate Quadlet files. You must separate the files with a--- delimiteron a new line and begin each section with a# FileName=<name>line to name the new Quadlet. -
The
Quadlet .containerfiles include theAppArmorkey to configure a container’s AppArmor profile. -
Podman automatically attempts to migrate earlier BoltDB databases to SQLite when the system reboots. This is necessary because the Podman 6.0 release removes support for BoltDB. If automatic migration is not possible, you can manually force a migration with the new
podman system migrate --migrate-dboption. -
Podman loads the path from the VM’s filesystem when you run the
podman artifact addcommand against a Podman machine VM. This improves performance if you share the path you load or build into the VM instead of streaming the data through the REST API. -
The
podman updatecommand has a new option,--ulimit, to update container ulimits. -
You can use the new
--no-sessionoption with thepodman execcommand to disable tracking of the exec session, which improves performance and startup time. -
Containers with the
unless-stoppedrestart policy restart after a reboot when you enable thepodman-restart.serviceservice. In the
Quadlet.containerfile:-
You can set
Entrypoint=""to clear the container’s entrypoint. -
A
HealthCmdsupports commands with double-quotes and ensures a functional health check. -
The
RequiresMountsForfield correctly handles bind-mount paths that contain spaces.
-
You can set
- Inspecting containers in host network mode no longer causes FreeBSD systems to panic.
- The Libpod System Check endpoint no longer performs operations with bad data after it returns a 400 error.
- The remote attach API for containers (Libpod & Compat) no longer panics due to a rare race condition.
-
The system no longer improperly adds options from the default driver, which previously prevented the Secret Create API from creating functional secrets using the shell driver. You can enter the secret directly at the terminal with the
podman secret createcommand instead of providing it through a pipe. Added new APIs for interacting with Quadlets:
-
GET /libpod/quadlets/{name}/file: Print the contents of a Quadlet file. -
GET /libpod/quadlets/{name}/exists: Check if the given Quadlet exists. -
POST /libpod/quadlets: Install one or more Quadlets. -
DELETE /libpod/quadlets: Remove one or more Quadlets. -
DELETE /libpod/quadlets/{name}: Remove a single Quadlet.
-
-
Containers created by the
podman play kubecommand no longer run health checks before theinitialDelaySecondsoption expires, and thepodman kube playcommand now correctly handles precedence between environment variables set by both theenvFromandenvfields. -
The
podman buildcommand’s--pull=neweroption now functions correctly. -
The
podman artifact pushandpodman artifact pullcommands no longer ignore authentication credentials given by the--authfileoption. The
podman run --pod-id-fileoption is now properly validated, preventing the creation of containers in pods with improper user namespace configuration.For more information about notable changes, see Upstream release notes.
-
The
- Support for updates in air-gapped and disconnected environments
This update introduces air-gapped and disconnected updates for RHEL deployments, enabling edge deployments to perform updates without internet connectivity. As a result, you can benefit from greater flexibility and reliability for offline updates, improving deployment management in remote or secure environments.
Jira:RHELDOCS-20708[1]
- New container images are available
The
rhel9/ruby-40,rhel9/postgresql-18,rhel9/python-314-minimal,rhel9/mariadb-118andrhel9/python-314container images are now available in the Red Hat Container Registry. The notable enhancements for each image are:-
rhel9/ruby-40: You use the Ruby 4.0 container as your base platform to build and run diverse Ruby 4.0 applications and frameworks. This container image includes the npm utility, so you can install JavaScript modules for your web applications. -
rhel9/postgresql-18: You can use this container image to package the PostgreSQLpostgresdaemon and client application in a container. Thepostgresserver daemon accepts your connections from clients and provides you access to content from PostgreSQL databases. -
rhel9/python-314-minimal: You use the full container image as a universal base image to build your containerized applications. However, this universal nature means that the resulting containers consume a lot of disk space. This happens mainly because the image contains npm, compilers, header files, and other packages you might need to install and deploy your applications. -
rhel9/mariadb-118: You use this container image to package the MariaDBmysqlddaemon and client application into a container. Themysqldserver daemon accepts your client connections and provides you with access to content from MySQL databases. -
rhel9/python-314: You can use the Python 3.14 container as your base platform to build and run your Python 3.14 applications and frameworks. This container image includes the npm utility, so you can install JavaScript modules for your web applications. Currently, Red Hat does not support a specific npm or nodejs version in the image.
Jira:RHELDOCS-22067[1]
-
4.18. RHEL Lightspeed Link kopierenLink in die Zwischenablage kopiert!
- Color support for the command-line assistant
With this update, the command-line assistant supports color output by default, aligning its appearance with other RHEL command-line tools. This update improves output readability through increased visual contrast.
You can disable color output by using the
--plainoption or by setting theNO_COLOR=1environment variable.Jira:RHELDOCS-21814[1]
- SAP Solutions documentation added to RHEL Lightspeed
With this enhancement, RHEL Lightspeed includes the Red Hat Enterprise Linux for SAP Solutions documentation set in its knowledge base. You can now ask RHEL Lightspeed technical questions specific to SAP deployments on RHEL. This update provides more accurate and context-aware responses for SAP-related administrative and configuration tasks.
Jira:RHELDOCS-21815[1]