Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Chapter 4. New features


This part describes new features and major enhancements introduced in Red Hat Enterprise Linux 9.8.

4.1. Security

AIDE rebased to 0.19.2

The aide package, which provides the Advanced Intrusion Detection Environment (AIDE) utility, has been rebased to upstream version 0.19.2. This version provides important fixes and enhancements, most notably the following:

Security updates, Major library change
The libnettle cryptographic library replaces the previous libmhash cryptographic library.
Changes not compatible with earlier versions

The following options are removed and are replaced with new options:

database
Replaced with database_in.
summarize_changes
Replaced with report_summarize_changes.
grouped
Replaced with report_grouped.
Default configuration update
The outdated default aide.conf file is restructured with new attributes and rules. Review and integrate these changes.
New logging and reporting system
The previous --verbose and verbose options are removed. This version introduces more flexible log_level and report_level options and named log levels for better debugging.
New file attributes and hash sums
This version adds support for Linux capabilities and restricted rules based on file system type, implemented in the fstype attribute.
Improved command-line tools
This version adds the --dry-init command to test initial database creation without writing the file, and the --path-check command to test rule matching.

For more information on all detailed changes, including other bug fixes and improvements, see the installed documentation file at /usr/share/doc/aide/NEWS.

Jira:RHEL-83776

p11-kit-client.so separates to the p11-kit-client subpackage

The p11-kit-client.so module moves from the p11-kit-server subpackage to the new p11-kit-client subpackage. With the separated subpackages, you can install only the required parts and avoid redundant content on host systems or in containers.

Jira:RHEL-91952

OpenSSH provided in version 9.9

RHEL 9.8 provides OpenSSH in version 9.9, which introduces many fixes and improvements over OpenSSH 8.7, which was provided in RHEL 9.7. For the complete list of changes, see the openssh-9.9p1/ChangeLog file. The most important changes are as follows:

  • A system for restricting forwarding and use of keys that were added to the ssh-agent program has been added to ssh, sshd, ssh-add, and ssh-agent programs.
  • Improvements to the use of the FIDO standard:

    • The verify-required certificate option has been added to ssh-keygen.
    • Fixes to FIDO key handling reduce unnecessary PIN prompts for keys that support intrinsic user verification.
    • A check for existing matching credentials in the ssh-keygen program prompts the user before overwriting the credentials.
  • New EnableEscapeCommandline option in the ssh_config configuration file enables the command line option in the EscapeChar menu for interactive sessions.
  • New ChannelTimeout keyword specifies whether and how quickly the sshd daemon should close inactive channels.
  • The ssh-keygen utility generates Ed25519 keys by default except in FIPS mode, where the default is RSA.
  • The ssh client performs keystroke timing obfuscation by sending interactive traffic at fixed intervals, every 20 ms by default, when only a small amount of data is being sent. It also sends fake keystrokes for a random interval after the last real keystroke, defined by the ObscureKeystrokeTiming keyword.
  • With the new ChannelTimeout type, ssh and sshd close all open channels if all channels lack traffic for a specified interval. This is in addition to the existing per-channel timeouts.
  • The sshd server blocks client addresses that repeatedly fail authentication, repeatedly connect without ever completing authentication, or that crash the server.
  • The sshd server penalizes client addresses that do not successfully complete authentication. The penalties are controlled by the new PerSourcePenalties keyword in sshd_config.
  • The sshd server is split into a listener binary sshd and a per-session binary sshd-session. This reduces the listener binary size that does not need to support the SSH protocol. This also removes support for disabling privilege separation and disabling re-execution of sshd.
  • In portable OpenSSH, sshd no longer uses argv[0] as the PAM service name. You can select the service name at runtime with the new PAMServiceName directive in the sshd_config file. This defaults to sshd.
  • The HostkeyAlgorithms keyword allows ssh to disable implicit fallback from certificate host key to plain host keys.
  • The components have been hardened in general and work better with the PKCS #11 standard.

Jira:RHEL-108912[1]

Valkey runs with the redis_t SELinux type

Before this update, Valkey processes did not use the redis_t SELinux type. This caused behavioral inconsistencies with Redis in RHEL 9. With this update, the SELinux policy has been enhanced to run Valkey as redis_t. As a result, Valkey processes align with Redis behavior, providing a consistent security context for these services in RHEL 9 environments.

Jira:RHEL-108982[1]

fapolicyd rebased to 1.4.3

The fapolicyd packages are rebased to upstream version 1.4.3 and provide many enhancements and bug fixes over the previous version. Most notably:

  • Added the --filter option for the fapolicyd-cli --file command
  • Added the --test-filter option for the fapolicy-cli command to help test filter rules
  • Added the fapolicyd-filter.conf(5) man page
  • Added the --check-ignore_mounts option for fapolicyd-cli
  • Added the --verbose flag for the fapolicyd-cli --check-ignore_mounts command
  • Increased the default value of the db_max_size parameter
  • Added support for the db_max_size = auto option, which enables automatic database size management by the fapolicyd daemon
  • Increased the default subject cache size
  • Moved the fapolicyd-rpm-loader program to the /bin directory
  • Optimized performance of the fapolicyd framework

Jira:RHEL-118363

CanonicalMatchUser in sshd_config prevents privilege escalation for capitalized AD usernames

This update of the openssh packages introduces the CanonicalMatchUser directive for the sshd_config configuration file. With the new directive, you can configure Match User blocks so that sshd first attempts to obtain the username from a password database instead of using an alias. As a result, Active Directory (AD) users can no longer bypass chroot restrictions when using capital letters in their usernames, which might lead to privilege escalation.

Jira:RHEL-118372[1]

GnuTLS rebased to 3.8.10

The gnutls package is rebased to upstream version 3.8.10. This update introduces several enhancements and bug fixes. Most notably:

Post-quantum cryptography (PQC) support
  • ML-KEM and ML-DSA integration: GnuTLS supports ML-KEM hybrid key exchange algorithms and ML-DSA-44, ML-DSA-65, and ML-DSA-87 signature algorithms for TLS communications. To enable these algorithms, use the PQ system-wide cryptographic subpolicy.
  • Expanded private key formats: This update adds support for all variants of ML-DSA private key formats defined in the draft-ietf-lamps-dilithium-certificates-12 document to provide compatibility with evolving international standards.
TLS and cryptographic enhancements
  • Improved OCSP verification: Before this update, when a single Online Certificate Status Protocol (OCSP) response contained multiple records, GnuTLS considered only the first record, which could cause verification failures. With this update, GnuTLS checks all records until it finds a match for the server certificate.
  • Certificate compression: This update adds support for TLS certificate compression as defined in RFC 8879 to reduce handshake latency and bandwidth. Note that this feature is disabled by default.
  • RSA-OAEP support: GnuTLS supports the Optimal Asymmetric Encryption Padding (RSA-OAEP) scheme as defined in RFC 8017, which provides a more secure alternative to traditional RSA padding.
  • SHAKE hashing: This update adds support for the Secure Hash Algorithm Keccak (SHAKE) hashing algorithm and includes a new API to incrementally calculate SHAKE hashes of any length across multiple calls.
  • Enhanced PKCS #12 security: GnuTLS can export PKCS #12 files by using Password-Based Message Authentication Code 1 (PBMAC1) as defined in RFC 9579. For interoperability with systems running in FIPS mode, use PBMAC1 explicitly.
Technology Preview
  • PKCS #11 back end override: As a Technology Preview, you can use PKCS #11 modules to override the default cryptographic back end. You can test this feature by adding a [provider] section to the system-wide configuration to configure the module path and PIN.

Jira:RHEL-125971

crypto-policies supports hybrid ML-KEM and pure ML-DSA in GnuTLS

This update of the system-wide cryptographic policies adds support for hybrid ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) and pure ML-DSA (Module-Lattice-Based Digital Signature) post-quantum (PQ) algorithms in GnuTLS. As a result, you can use GnuTLS in RHEL 9.8 to negotiate TLS connections that use hybrid ML-KEM or pure ML-DSA as long as the other side supports them, and the PQ system-wide cryptographic subpolicy is applied.

Jira:RHEL-127829

/dev/papr-* devices have more specific SELinux labels

With this update of the selinux-policy packages, the following devices have more specific SELinux labels:

  • /dev/papr-indices
  • /dev/papr-physical-attestation
  • /dev/papr-platform-dump

This aligns with the addition of new character device interfaces to the kernel, providing user-space application binary interface (ABI) access to the Power Architecture Platform Reference (PAPR) system parameters, in addition to the existing kernel-internal API.

As a result, the SELinux policy assigns distinct labels to these devices so that different permissions can apply to various services accessing them.

Jira:RHEL-129879

p11-kit rebased to 0.26.1

The p11-kit packages have been upgraded to upstream version 0.26.1. The new version provides many enhancements and bug fixes, most notably:

  • PKCS #11 headers are updated to version 3.2, which supports post-quantum cryptography (PQC) definitions.
  • The trust module now correctly looks up the last DN (Distinguished Name) in the RDNSequence attribute as defined in the RFC 4514 document.
  • You can specify the server address with the new module configuration option for the Remote Procedure Call (RPC) protocol.
  • Handling of an empty array attribute in RPC is fixed.
  • Dependency on the libsystemd library for server socket activation is removed.

Jira:RHEL-139075[1]

New package: clevis-pin-trustee

The clevis-pin-trustee package provides a new Clevis pin trustee that enables automated encryption and decryption of LUKS-encrypted volumes by using remote attestation through the Trustee Key Broker Service (KBS). The trustee pin integrates with the standard Clevis framework through the clevis-encrypt-trustee and clevis-decrypt-trustee commands, and it includes a Dracut module 60clevis-pin-trustee for automated root volume unlocking during early boot.

In scenarios such as confidential clusters for OpenShift and confidential virtual machines with OpenShift Virtualization, the Trustee server acts as the policy enforcement point, releasing the disk encryption key only when the requesting platform’s attestation evidence validates against a set of reference values.

As a result, you can bind LUKS-encrypted volumes to one or more Trustee servers by using a clevis luks bind -d <device> trustee '<config>' command. You can also combine the trustee pin with other Clevis pins, such as tang and tpm2, for multi-factor or multi-policy unlock configurations.

Jira:RHEL-139790[1]

crypto-policies enables mlkem768x25519-sha256 for OpenSSH

This update of the system-wide cryptographic policies adds support for the ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) post-quantum (PQ) key exchange mlkem768x25519-sha256 algorithm for OpenSSH. This aligns with support for ML-KEM in OpenSSH, providing a quantum-resistant key exchange method for your SSH sessions when you use the PQ system-wide cryptographic policy.

Jira:RHEL-151499

OpenSCAP rebased to 1.4.3

The OpenSCAP packages have been rebased to upstream version 1.4.3. This version provides bug fixes and various enhancements. For additional information, see the OpenSCAP release notes.

Jira:RHEL-133976

SCAP Security Guide rebased to 0.1.80

For additional information, see the SCAP Security Guide release notes.

Jira:RHEL-136121

4.2. Software management

librepo rebased to 1.19.0

The librepo packages are rebased to upstream version 1.19.0. This version provides the following important fixes and enhancements:

  • Fixed creating a directory for a gpgme socket when verifying a signature from a file descriptor.
  • Added functions for importing keys from a file descriptor and memory.
  • Added function for listing end exporting keys.
  • Fixed including header files not to conflict with application’s local header files.
  • Removed the /usr/include/librepo/downloader_internal.h header file that should have been private.
  • Optimized code when extended attributes are not supported by a file system.
  • Improved performance when downloading multiple packages.
  • Added the LRO_USERNAME and LRO_PASSWORD options to set a user name and a password separately. Use these options if you have a colon (:) in your user name.
  • Removed the private ensure_socket_dir_exists ELF symbol.
  • Fixed a SELinux warning if SELinux runs in a container where /sys/fs/selinux is not mounted.
  • Fixed caching package checksums on file systems that do not support extended attribute names with uppercase characters.

Jira:RHEL-62033

4.3. Shells and command-line tools

Security and TLS improvements in openwsman 2.8.1

The openwsman package has been updated to version 2.8.1 with the following improvements:

  • Improved TLS 1.3 support.
  • Improved compatibility with OpenSSL 3.0.
  • Improved SSL/TLS error reporting.
  • Improved security by clearing passwords from memory after use and enhancing buffer safety.

Jira:RHEL-97643[1]

openCryptoki rebased to 3.26.0

The openCryptoki packages are updated to upstream version 3.26.0. This version provides important fixes and enhancements, most notably the following:

Post-quantum cryptography (PQC) support
ML-DSA and ML-KEM integration

Adds support for the IBM-specific Module-Lattice-Based Digital Signature Algorithm (ML-DSA) and Module-Lattice Key Encapsulation Mechanism (ML-KEM).

  • EP11 token: Requires EP11 host library version 4.2 or later, and a CEX8P crypto card with firmware version 9.6 or later (on IBM z17), or version 8.39 or later (on IBM z16).
  • CCA token: Requires CCA version 8.4 or later.
  • Soft token: Requires OpenSSL version 3.5 or later, or a configured OQS-provider.
  • The p11sak tool supports the IBM-specific ML-DSA and ML-KEM key types.
BLS12-381 curve support
The EP11 token supports the pairing-friendly BLS12-381 elliptic curve (EC) for signing, verification, and public key aggregation. The p11sak tool also supports generating BLS12-381 EC keys.
Cryptographic enhancements
Expanded RSA key sizes
  • The Soft token and the p11sak utility support RSA keys up to 16 Kb.
  • The CCA token supports RSA keys up to 8 Kb. This requires CCA version 8.4, or version 7.6 or later.
New key derivation and Hash-based Message Authentication Code (HMAC) mechanisms
  • The Soft and ICA tokens support SHA512/224 and SHA512/256 key derivation mechanisms.
  • The Soft, ICA, CCA, and EP11 tokens support SHA-HMAC key types and generation mechanisms.
  • The p11sak tool supports SHA-HMAC key types and generation.
PKCS #11 version 3.0 compliance
Adds support for canceling operations by using a NULL mechanism pointer at the C_XxxInit() calls, which provides an alternative to the C_SessionCancel() calls.
Management and utility improvements
The p11sak tool enhancements
The p11sak utility supports key wrapping and unwrapping commands to securely export and import private and secret keys. It also provides export of non-sensitive private keys to password-protected PEM files.
HSM-protected TLS keys
The p11kmip tool supports using a Hardware Security Module (HSM)-protected TLS client key through a PKCS#11 provider, which increases the security of communication with Key Management Interoperability Protocol (KMIP) servers.

Jira:RHEL-100059[1]

Updated snmpcmd man page documents supported privProtocol for SNMPv3 messages

With this update, the snmpcmd man page documents the supported privProtocol for SNMPv3 messages. As a result, administrators have access to the necessary reference details to create SNMPv3 users with specific authentication and privacy protocols.

Jira:RHEL-101614[1]

Documentation updated for net-snmp-create-v3-user supported encryption algorithms

The --help output and manual page for the net-snmp-create-v3-user script have been updated to include the complete list of supported authentication and encryption algorithms. This update improves clarity when configuring authentication and encryption passwords.

Jira:RHEL-103557[1]

tog-pegasus supports post-quantum cryptography

This update enables post-quantum key exchange by default in the tog-pegasus packages if the peer supports it. Two new files, /etc/pki/Pegasus/server-fallback.pem and /etc/pki/Pegasus/file-fallback.pem, for tog-pegasus servers provide a mechanism to support a classic certificate chain and an ML-DSA certificate at the same time. . As a result, you can use these new files to enable the loading of a classic certificate and key when you need to use an ML-DSA certificate and a classic certificate chain simultaneously.

Jira:RHEL-127514[1]

The sblim-sfcb package supports post-quantum cryptography

This update enables post-quantum key exchange by default in the sblim-sfcb package if the peer supports it. This update also introduces two new configuration options, sslKeyFallbackFilePath and sslCertificateFallbackFilePath, in the sblim-sfcb server configuration file.

Before this update, there was no mechanism to support a classic certificate chain and an ML-DSA certificate at the same time. As a result, you can use these new options to enable the loading of a classic certificate and key when you need to use an ML-DSA certificate and a classic certificate chain simultaneously.

Jira:RHEL-127515[1]

Support added for post-quantum cryptography in openwsman

Previously, the package did not use post-quantum key exchange by default if the peer supports it. Also, there was no mechanism to support a classic certificate chain and the ML-DSA certificate at the same time.

With this update, two new configuration options ssl_cert_fallback_file and ssl_key_fallback_file are introduced in openwsman server configuration file. These options are disabled by default, but can be used to enable loading of classic certificate and key when there is a requirement to use an ML-DSA certificate and classic certificate chain at the same time.

As a result, the outdated SSL initialization which prevents post-quantum key exchange by default was removed from the openwsman server.

Jira:RHEL-127516[1]

Red Hat build of OpenJDK 25 available in RHEL 9

Red Hat build of OpenJDK 25 and the maven-openjdk25 subpackages are available in Red Hat Enterprise Linux 9. This version provides the latest long-term support (LTS) release of the Open Java Development Kit (OpenJDK). As a result, you can leverage the latest Java features and performance improvements for your applications.

Jira:RHEL-127952[1]

4.4. Infrastructure services

chrony rebased to version 4.8

The chrony packages are rebased to upstream version 4.8, which includes the following notable enhancements and bug fixes:

  • The maxunreach option is added to limit the selection of unreachable sources.
  • The -u option is added to the chronyc command to drop root privileges.
  • The opencommands directive is added to select remote monitoring commands.
  • The waitsynced and waitunsynced options are added to the local directive.
  • The RTC refclock driver is added.
  • You can specify the PHC refclock driver with a network interface name.
  • Detection of clock interference from other processes is added.
  • The chronyc socket is hidden to mitigate unsafe permissions changes.
  • The refclock samples are validated for reachability updates.

Jira:RHEL-112598

valgrind rebased to upstream version 3.26.0

The upgrade to the upstream version 3.26.0 provides the following notable enhancements:

  • valgrind recognizes the following Linux kernel system calls: cachestat, futex_waitv, listmount, mount_setattr, mseal, quotactl_fd, remap_file_pages, setdomainname, statmount, swapoff, swapon, sysfs, and ustat.
  • A new option, --modify-fds=yes, has been added. This option behaves like --modify-fds=high, returning the highest available file descriptor first. However, if file descriptors 0, 1, or 2 (stdin, stdout, stderr) are available, they are returned before higher-numbered file descriptors.
  • When --xml=yes is used, log output protocol version 6 is always enabled. Protocol version 6 includes error summaries in the XML output.
  • A new value, bad, has been added for the --track-fds option. When --track-fds=bad is specified, valgrind reports only invalid file descriptor usage, such as double close or use of an invalid file descriptor. It does not report unclosed file descriptors at program exit.
  • DWARF inlined subroutine handling has been rewritten to work across compilation units. This update removes backtraces that previously displayed UnknownInlinedFun in warnings or error messages.
  • A new utility script, vgstack, has been added. Use vgstack <PID> to attach to a running valgrind process and display backtraces of the target executable. The script provides the following options:

    • -h - Displays minimal help.
    • -v - Displays version information.

Jira:RHEL-120965

SystemTap is rebased to version 5.4

SystemTap is rebased to version 5.4. The notable changes in this update include:

  • Implicit Header Discovery: The @cast() operator now automatically searches the Linux Userspace API (UAPI) <vmlinux.h> header for type declarations. This reduces the requirement for manual header file inclusion in many common tracing scenarios.
  • Enhanced Type Validation: Improvements to type checking and autocast processing provide more rigorous analysis during the translation phase, identifying potential type mismatches earlier in the development cycle.

Jira:RHEL-121662

elfutils rebased to 0.194

The upgrade to the upstream version 0.194 provides the following notable enhancements:

  • debuginfod-find: Fixed a caching issue that prevented re-downloading files after a user-cancelled download.
  • elfclassify: Added the following new options:

    • --has-debug-sections
    • --any-ar-member
  • elflint: Vendor and application-specific ELF note types no longer trigger compliance errors.
  • libdwfl_stacktrace: Added a new function, dwflst_sample_getframes.
  • libelf: Added manual pages for many library functions.
  • readelf: Improved performance by up to 13% when using the -N option.

Jira:RHEL-121664

sscg rebased to version 4.0.3

The sscg packages are rebased to upstream version 4.0.3. This version provides important fixes and enhancements, most notably the following:

  • Module-Lattice-Based Digital Signature Algorithm (ML-DSA) key generation is supported to provide post-quantum cryptography capabilities.
  • Elliptic Curve Digital Signature Algorithm (ECDSA) key generation is supported.
  • The command-line interface help output is reorganized into logical groups.

Jira:RHEL-124447

Apache’s ErrorLogFormat supports millisecond timestamps

With this update, Apache’s ErrorLogFormat supports millisecond timestamps. Millisecond-level timestamps in error logs improve log filtering, troubleshooting efficiency, and cross-system traceability. You can configure this, for example, by using the %{m}t format specifier. As a result, you can correlate and filter logs across systems with millisecond precision.

Jira:RHEL-129692[1]

4.5. Networking

iproute rebased to version 6.17.0

The iproute package has been updated to upstream version 6.17.0.

Notable enhancements:

  • The tc utility supports 64-bit hardware packet counters.
  • The ip utility displays the netns-immutable property.
  • The ip utility supports the IFLA_VXLAN_MC_ROUTE configuration attribute.
  • The ip neigh command supports the extern_valid flag.
  • The ip rule command supports port and Differentiated Services Code Point (DSCP) mask.
  • The ip stats command supports bridge VLAN statistics.
  • The bridge fdb command supports the forward database (FDB) activity notification control.
  • The bridge mdb command supports the offload failed flag.
  • The color output handling was improved.

Jira:RHEL-98272

HSR RedBox support for non-HSR device integration

With this enhancement, you can configure High-availability Seamless Redundancy (HSR) interfaces as a Redundancy Box (RedBox). This mode provides a communication path between standard Ethernet devices and an HSR ring. By designating an interlink port on the HSR interface, external devices connected to the interlink port reside within the same layer-2 domain as the ring participants. The interlink port operates in High-availability Seamless Redundancy to Singly Attached Node (HSR-SAN) mode, which handles the insertion and removal of HSR tags as traffic passes between the redundant network and the connected devices.

Jira:RHEL-100940[1]

The PRP and HSR protocols are fully supported

The hsr kernel module provides the following protocols:

  • Parallel Redundancy Protocol (PRP)
  • High-availability Seamless Redundancy (HSR)

    The IEC 62439-3 standard defines these protocols, and you can use this feature to configure redundancy with zero-time recovery in Ethernet networks.

    The protocols were previously available as a Technology Preview. Starting with RHEL 9.8, Red Hat fully supports this module.

Jira:RHEL-100941[1]

Nmstate can set alternative names on network interfaces

With this enhancement, you can use the Nmstate API to set alternative names on network interfaces to simplify configuration management and support processes. For example, to assign LAN as an alternative name to enp1s0 and remove the name internal-LAN, use:

interfaces:
  - name: enp1s0
    alt-names:
      - name: LAN
      - name: internal-LAN
        state: absent

Jira:RHEL-110781[1]

NetworkManager and Nmstate support configuring IPv4 forwarding per interface

With this enhancement, NetworkManager can enable and disable IPv4 forwarding per network interface. This enables granular control directly in NetworkManager connection profiles, and updating sysctl kernel settings is no longer required. If you enable the ipv4.forwarding parameter in a profile, the corresponding interface acts as a router and forwards IPv4 packets. With the default value auto, NetworkManager enables IPv4 forwarding if any shared connection is active and, in other cases, it uses the kernel default value.

This feature is also available in Nmstate.

Jira:RHEL-110793[1]

The kernel supports setting a lower TCP maximum retransmission timeout value

With this enhancement, you can set a lower maximum TCP retransmission timeout value than the default 120000 ms to reduce network latency. Note that changing this setting can require tuning other kernel settings as well.

You can configure this limit either through the tcp_rto_max_ms kernel sysctl setting or the TCP_RTO_MAX_MS socket option. If you set both, the socket option has a higher priority.

Jira:RHEL-115191[1]

Setting the DHCP client ID is now possible through a kernel argument

With this update, users can now set the DHCP client ID as a kernel argument. Certain DHCP servers require this ID to identify a client correctly. By setting the rd.net.dhcp.client-id kernel argument, the client ID is already available during early boot operations.

Jira:RHEL-122166[1]

NetworkManager supports specifying an HSR interlink interface

With this update, RHEL users can configure an interlink interface for High-availability Seamless Redundancy (HSR) connections. Users can now use the hsr.interlink property to specify the interlink interface name. As a result, you can configure RHEL as a Redundancy Box (RedBox).

Jira:RHEL-122175[1]

The NetworkManager Libreswan plugin supports using a single tunnel for multiple subnets

This update enhances the NetworkManager Libreswan client plugin to configure multiple subnets in IPsec policies. This corresponds to the use of multiple subnets in the leftsubnets and rightsubnets parameters in the Libreswan configuration. As a result, users can connect to multiple subnets by using a single IPsec tunnel.

Jira:RHEL-124258[1]

FRRouting 10 package introduced in RHEL 9 AppStream repository

A new package, frr10, is available in the RHEL 9 AppStream repository. This package provides FRRouting (FRR) version 10 alongside the existing frr version 8 package. You can now access newer routing features without replacing the earlier version. By introducing frr10 as a separate package, this update enables flexible adoption and testing of the latest FRR capabilities while maintaining compatibility with existing deployments.

Jira:RHEL-125957

RHEL can now generate unique interface names for onboard E8xx devices

On certain hardware platforms with onboard Intel E8xx network controllers, the BIOS lists all ports of the network controllers as the same device because they have the same Type Instance value in the desktop management interface (DMI) tables. Consequently, the udev service fails to rename the interfaces when RHEL boots. On these platforms, the phys_port_name sysfs attribute is the only attribute to distinguish the ports from each other.

With this enhancement, the ice and i40e drivers can make the phys_port_name sysfs attribute available to udev. By default, this behavior is disabled on RHEL 9 to not break existing configurations. To enable the feature, add ice.rh_phys_port_name=1 i40e.rh_phys_port_name=1 to the kernel command line. As a result, the drivers make the phys_port_name attribute available, and udev correctly renames the interfaces. The interfaces have the np_<number_> suffix.

Jira:RHEL-126034[1]

VLAN segmentation support for HSR and PRP interfaces

With this enhancement, you can create VLAN interfaces on top of High-availability Seamless Redundancy (HSR) and Parallel Redundancy Protocol (PRP) interfaces to enable network traffic segmentation. When configured, the kernel adds a VLAN tag to all packets transmitted through the VLAN interface. This provides greater control over traffic isolation. Note that supervision frames remain unaffected by this configuration and are always transmitted without a VLAN tag.

Jira:RHEL-130476[1]

The dpll utility can manage and monitor DPLL devices

With this update, the iproute package includes the dpll utility which you can use to manage and monitor digital phase-locked loop (DPLL) devices. The utility uses libmnl to communicate with the kernel through the netlink interface, providing a configuration tool for DPLL devices and pins.

Jira:RHEL-131661

Unbound rebased to version 1.24.2

The Unbound packages have been rebased to version 1.24.2. This update provides several enhancements and a security fix:

  • Resolved a possible domain hijacking attack (CVE-2025-11411).
  • Added the unbound-control cache_lookup <domains> command to query the cache for specific domains.
  • Added zone status support for Unbound authoritative zones (auth-zones).
  • Added resolver.arpa and service.arpa to the default list of locally served zones.
  • Added configuration options for DNS Error Reporting (RFC 9567) and support for the RESINFO resource record (RR) type.

Jira:RHEL-132717[1]

The K1 power state flag can be disabled on e1000e NICs

The K1 state reduces power consumption on ICH-family network interface controllers (NIC) during idle periods. However, on Intel Meteor Lake and later platforms, enabling K1 state on NICs that use the e1000e driver can cause packet loss due to firmware misconfiguration, interoperability with certain link partners, and other conditions.

Default:

  • The K1 state is disabled on Intel Meteor Lake and later platforms.
  • The K1 state is enabled on platforms earlier than Intel Meteor Lake.

    If you experience problems related to the K1 power state, disable K1 for the affected device:

    1. Display the current status:

      # ethtool --show-priv-flags <device>
      ...
      disable-k1: off
    2. Disable the K1 state:

      # ethtool --set-priv-flags <device> disable-k1 on

Jira:RHEL-134986[1]

The FOU and GUE protocols added to the kernel

This update adds the fou and fou6 modules to the kernel-modules-extra package. With these modules, you can configure connections that use the following protocols:

  • Foo-over-UDP (FOU), which encapsulates IP protocols directly within UDP packages, without adding extra headers. For example, you can use this protocol for tunneling protocols, such as Generic Routing Encapsulation (GRE) or IP-in-IP (IPIP).
  • Generic UDP Encapsulation (GUE), which adds a small header inside the UDP payload to carry metadata, such as the inner protocol. With GUE, you can use multiple protocols on the same UDP port, which makes GUE more flexible than FOU.

    Red Hat does not support the fou and fou6 kernel modules.

Jira:RHEL-138741[1]

Qualcomm wireless cards work correctly if passed through to a VM

Due to missing upstream support for passing Qualcomm wireless cards to VMs by using the PCI pass through feature, these cards do not work correctly in VMs. With this update, the ath11k and ath12k drivers use certain kernel parameters to work around the problem. As a result, Qualcomm wireless cards that use these drivers work if you pass the devices to VMs. Note that the solution is only an unsupported workaround.

Jira:RHEL-141399[1]

Nmstate can configure Libreswan and use its default values

By default, the NMstate API uses NetworkManager to send configurations to Libreswan service. In this case, NetworkManager defines default values, which are different from Libreswan’s defaults. With this enhancement, you can set nm-auto-defaults: false in the YAML file and Nmstate does not inject any extra settings. In this case, Libreswan uses this configuration and also its own default values.

For backward compatibility, the default value of nm-auto-defaults is true.

Jira:RHEL-141605[1]

4.6. Kernel

Red Hat Enterprise Linux 9.8 is distributed with the kernel version 5.14.0-687.5.1.

BPF trampoline support on IBM PowerPC (ppc64le)

Before this update, BPF trampoline and associated functionality, including BPF STRUCT_OPS features such as sched_ext, were not available on the IBM PowerPC (ppc64le) architecture in Red Hat Enterprise Linux 9.

With this update, Red Hat Enterprise Linux 9.8 running on ppc64le can use BPF trampoline and BPF STRUCT_OPS-based features, such as sched_ext, for advanced tracing and scheduling use cases.

Jira:RHEL-14156[1]

PerfMon support added for Clearwater Forest on CentOS Stream kernel

With this update, PerfMon support is added for Clearwater Forest, a hardware or software platform, on the CentOS Stream kernel. This enhancement enables performance monitoring for the Clearwater Forest platform, improving overall system efficiency and stability.

Jira:RHEL-45067[1]

EDAC driver adds Intel Clearwater Forest server support

The EDAC driver is updated to add platform support for Intel Clearwater Forest (CWF) servers, enhancing RAS capabilities for this hardware. This change improves error detection and correction functionality specific to the Intel platform.

Jira:RHEL-45085[1]

Uncore events counters support enabled on the Panther Lake platform

With this update, you can use uncore events counters on the Panther Lake platform to monitor system performance.

Jira:RHEL-47456[1]

Full perf support for Intel Core Ultra Series 2 and 3 processors

The perf tool now provides full support for Intel Core Ultra Series 2 and Intel Core Ultra Series 3 processors. This update enables the complete range of perf functionality, including performance counters and C-state events. As a result, you can perform comprehensive hardware profiling, power-management analysis, and performance tuning on these Intel platforms.

Jira:RHEL-74193[1]

Intel QAT GEN6 device driver support

The Intel QAT crypto device driver is updated to support QAT GEN6 devices through the new qat_6xxx driver. GEN6 devices enable concurrent use of symmetric encryption, asymmetric encryption, and data compression. This was not available in earlier generations.

Jira:RHEL-94929[1]

tpm2-tools rebased for TPM 2.0 improvements

The tpm2-tools package is updated to ensure compatibility with modern TPM 2.0 hardware and improve security tooling support. This update enables enhanced TPM-based operations and aligns with upstream security and feature developments.

Jira:RHEL-94933[1]

Device IDs are added for the In-memory Analytics Accelerator (IAA) on the Wildcat Lake platform

With this update, the IAA is now moved from a Technology Preview to the supported state and the device IDs are added for In-memory Analytics Accelerator (IAA). As a result, devices on the Wildcat Lake platform are now supported.

Jira:RHEL-95629[1]

Perfmon drivers now support Wildcat Lake CPU platform

With this update, Perfmon drivers now support the Wildcat Lake CPU platform, enhancing performance monitoring on compatible hardware.

Jira:RHEL-95671[1]

Uncore events counter support for Intel Wildcat Lake platform

With this update, you can use uncore events counter for the Intel Wildcat Lake platform to monitor system performance. As a result, you can analyze performance on Intel-based systems.

Jira:RHEL-95673[1]

View CVEs patched by live kernel updates

kpatch reports which kernel CVEs are patched by live patches for the currently running base kernel. With this update, administrators can verify that specific CVEs are remediated, even if the on-disk kernel version appears vulnerable.

By listing CVEs that are patched only by kpatch, this enhancement improves security reporting and supports compliance workflows and external scanners that must account for live-patched vulnerabilities.

Jira:RHEL-103845[1]

LUKS volume keyfor secure vmcore data saving on RHEL systems

With this update, you can pass the LUKS volume key to the kdump kernel, to save vmcore data to a LUKS-encrypted disk volume. This enhancement secures vmcore data on RHEL systems, as sensitive data remains protected in the event of system crashes. To activate this optional feature, you must use the kdumpctl setup-crypttab command. This update is available for the x86_64 architecture in RHEL 9.8.

Jira:RHEL-104939[1]

The perf tool now supports AMD Turin LdLat filtering for IBS on RHEL

With this update, the Perf tool now supports Load Latency (LdLat) filtering for 5th Generation AMD EPYC processors (also known as Turin). This enhances Instruction-Based Sampling (IBS) capabilities of perf. This improvement aims to provide more accurate and efficient performance analysis on AMD systems.

Jira:RHEL-106898[1]

Updating kernel CCP crypto driver support for Venice PCI device

This update adds support for the AMD Venice CCP crypto device with PCI device ID 0x17D8 (PCIID 1002:17D8) in the kernel CCP driver. With this change, systems equipped with Venice CCP hardware can use the device’s enhanced cryptographic offload capabilities.

Jira:RHEL-106910[1]

Userspace action triggers for rtla

With this update, the rtla tool now supports triggering userspace actions either when a latency threshold is reached or when tracing concludes. This allows you to execute diagnostic commands immediately or extract trace data before the instance is removed, regardless of whether a threshold violation occurred.

Jira:RHEL-113482[1]

crash rebased to 9.0.1

The crash package, which provides a kernel analysis utility for live systems and various types of dump files, is rebased to upstream version 9.0.1. This version provides a number of fixes and enhancements, most notably the following:

  • Internal gdb is updated to version 16.2.
  • Added gdb multi-stack unwind support on 64-bit architectures (x86-64-v3), aarch64, and ppc64.
  • Added Rust support.

Jira:RHEL-114658

You can select cyclictest or timerlat as the measurement modules in rteval

With this update, you can select the measurement module for the rteval utility. This overrides the default setting in the rteval.conf file. This new feature, 'measurement-module', provides greater flexibility and control over performance testing, which enhances the precision and customization.

Jira:RHEL-114928[1]

Advanced performance analysis enabled with perf utility and debuginfod client support

With this update, advanced performance analysis is enabled using the perf utility with debuginfod client support in RHEL-9. This enhancement enables debugging and probing performance issues. The feature introduces new runtime dependencies and is currently limited to probing.

Jira:RHEL-124984[1]

4.7. File systems and storage

cryptsetup rebased to version 2.8.0

The cryptsetup package has been upgraded to version 2.8.0. This update provides the following feature enhancements:

  • Added support for inline mode on NVMe drives, eliminating double writes caused by journaling in the dm-integrity target. This improves performance for both cryptsetup encryption and decryption when using authenticated encryption modes as well as for integritysetup in standalone integrity device protection.
  • Extended the cryptsetup reencrypt command to support LUKS2 tokens, enabling reencryption of existing LUKS2 devices, including token-bound devices.
  • Optimized LUKS2 metadata writes, improving reencryption for configurations with metadata larger than 12 KiB, particularly for configurations sized in megabytes.

Jira:RHEL-100089[1]

io_uring interface added for asynchronous I/O

The io_uring interface supports asynchronous I/O operations. With this update, applications use this interface to submit multiple I/O requests without blocking the calling process. io_uring uses shared ring buffers between user space and kernel space to reduce system call overhead and avoid buffer copying. This interface is more efficient and supports more asynchronous system calls than Linux AIO.

Jira:RHEL-120699[1]

snapm rebased to 0.7.0

The snapm package has been rebased to upstream version 0.7.0. This version provides important fixes and enhancements, most notably the following:

  • The new Mount Manager mounts and unmounts entire snapshots. You can run commands or interactive shells inside mounted snapshot sets by using the snapset {mount, umount, exec, shell} subcommands.
  • The Difference Engine was added to compare snapshot sets or to compare against the running system. You can specify output formats, such as paths, full, short, json, diff, summary, and tree.
  • The performance of the Stratis plugin was improved. With this update, the plugin queries the D-Bus every 5 seconds and caches the results internally. This improvement significantly reduces the time to discover Stratis snapshots.

Jira:RHEL-137377[1]

Multipath automatically removes unmapped LUNs

Before this update, multipath devices remained in the system if you did not remove SCSI devices before disconnecting a LUN. This sometimes resulted in queued I/O or incorrect writes if the LUN was repurposed.

With this update, the purge_disconnected option is available in the defaults, devices, and multipaths sections of the multipath.conf file. When you set this option to yes, the multipathd daemon automatically removes disconnected SCSI devices from the system.

Jira:RHEL-141291

4.8. High availability and clusters

HAProxy rebased to 2.8

The HAProxy package has been rebased to the upstream Long-Term Support (LTS) version 2.8. The notable changes in this update include:

  • Security updates and critical fixes for RHEL 9 after the previous 2.4 LTS release reaches its End-of-Life (EOL) date in Q2 2026.
  • Numerous upstream stability, performance, and functional improvements accumulated between versions 2.4 and 2.8.

For a complete list of changes, see the HAProxy webpage.

Jira:RHEL-74039[1]

4.9. Dynamic programming languages, web and database servers

A new module stream: postgresql:18

RHEL 9.8 introduces PostgreSQL 18 as the postgresql:18 module stream.

Notable changes:

  • The new Asynchronous I/O (AIO) subsystem provides up to three times faster data reads. You can enable this subsystem by setting the io_method variable.
  • The MD5 authentication method is deprecated and will be removed in a future major PostgreSQL release.
  • By default, data page checksums are enabled in PostgreSQL 18. If you upgrade from a previous version with data page checksums disabled, you must either enable the feature before the update or disable it during the upgrade. For further details, see Upgrading from a RHEL 9 version of PostgreSQL 16 to PostgreSQL 18.
  • PostgreSQL 18 supports native OAUth 2.0 single sign-on authentication.
  • The database service supports Federal Information Processing Standards (FIPS) mode validation for regulated environments.
  • The pg_upgrade utility preserves statistics during major release upgrades and significantly faster reaches full performance after an upgrade.

Jira:RHEL-90852[1]

A new module stream: mariadb:11.8

MariaDB 11.8 is available as a new module stream, mariadb:11.8.

Notable changes over the previously available version 10.11 include:

  • By default, MariaDB 11.8 uses the utf8mb4 character set instead of latin1 and legacy utf8 to ensure full Unicode support.
  • Vector support was added to support machine learning. This includes the VECTOR(N) data type and the following functions:

    • VEC_DISTANCE()
    • VEC_DISTANCE_EUCLIDEAN()
    • VEC_DISTANCE_COSINE()
    • Vec_FromText(json_array)
    • Vec_ToText(vector_column)
  • The mariadb-dump and mariadb-import utilities natively support parallel operations. Specify the --dir and --parallel options to dump or load multiple databases simultaneously.
  • The upper limit of the TIMESTAMP data type was increased from 2038-01-19 to 2106-02-07 while still using 4 bytes of storage.
  • The UUID_v4() and UUID_v7() functions were added.
  • The JSON handling was improved. This includes new functions, such as JSON_SCHEMA_VALID().
  • The following system variables were added to define the maximum storage for temporary tables and other internally created temporary files:

    • max_tmp_session_space_usage limits the disk space used per session
    • max_tmp_total_space_usage limits the total disk space used by the MariaDB server instance
  • The des_encrypt and des_decrypt configuration file parameters are deprecated and will be removed in a future MariaDB release.

Notable breaking differences:

  • The following utilities were renamed but symbolic links were created for backward compatibility:

    • mysql > mariadb
    • mysqldump > mariadb-dump
    • mysqladmin > mariadb-admin

    If you still use the previous names of these utilities, they display deprecation warnings.

  • The innodb_defragment configuration parameter is no longer supported. Remove it from your configuration files.

For more information about MariaDB, see Using MariaDB.

To install the mariadb:11.8 stream, enter:

# dnf module install mariadb:11.8

If you want to upgrade from MariaDB 10.11, see Upgrading from a RHEL 9 version of MariaDB 10.11 to MariaDB 11.8.

For information about the length of support for the mariadb module streams, see Red Hat Enterprise Linux Application Streams Life Cycle.

Jira:RHEL-96956[1]

New ruby:4.0 runtime module stream with database connectors

The ruby module provides a new Ruby 4.0 runtime, including database connector support. As a result, Red Hat Enterprise Linux 9.8 users can use Ruby 4.0 alongside existing Ruby streams to develop and run Ruby applications with supported database connectivity.

Jira:RHEL-142278[1]

The mysql:8.4 module now includes the perl-DBD-MySQL package

This update adds the perl-DBD-MySQL package to the mysql:8.4 module. Starting with Red Hat Enterprise Linux (RHEL) 9.7, the perl-DBD-MySQL package is linked against libmysqlclient instead of libmariadb. To ensure compatibility, perl-DBD-MySQL is included within mysql:8.4. As a result, the perl-DBD-MySQL package is fully compatible with the mysql:8.4 module, which resolves dependency conflicts and installation failures.

Jira:RHEL-144470

New Python 3.14 stack is available

Red Hat Enterprise Linux 9.8 now includes the python3.14 stack. This new alternative stack provides Python 3.14 for developing and running applications.

Jira:RHEL-120823[1]

4.10. Compilers and development tools

Optimized glibc math routines on x86-64-v3 hardware

On x86-64 systems that support the x86-64-v3 microarchitecture level, the glibc math library now provides additional IFUNC-optimized implementations of selected functions. The functions atanh, expm1, log1p, log2, sincos, sinh, and tanh now have optimized variants that use x86-64-v3 instructions, improving execution efficiency for workloads that rely on these operations.

As a result, the execution time for workloads that perform large volumes of these mathematical computations might be reduced.

Jira:RHEL-1063

Documented glibc memstream behavior with SEEK_END

The glibc memstream documentation describes the implementation behavior of open_memstream when you use SEEK_END to change the file position. This clarification aligns the documentation with the new requirement to document glibc behavior, introduced in POSIX.1-2024, and helps you understand how seeking affects the current position and buffer contents.

Jira:RHEL-61087

Enhanced gcov function coverage summaries in gcc

Before this update, gcov function summaries only reported the number of lines executed and did not include details about branch or call coverage within the function.

With this enhancement, requesting function summaries using the -f option now includes data on branches taken and function calls made within the profiled function. This provides a more comprehensive view of function-level test coverage.

Jira:RHEL-105416[1]

glibc adds GLIBC_ABI_DT_X86_64_PLT symbol support on x86_64 systems

This enhancement adds the GLIBC_ABI_DT_X86_64_PLT symbol version to glibc on x86_64 systems, so programs that require this symbol at startup no longer fail to start and instead run as expected.

Jira:RHEL-109622[1]

Rust Toolset is rebased to version 1.92.0

In RHEL 9.8, rust-toolset is rebased to version 1.92.0 from version 1.88.0. This update delivers multiple improvements to debugging, systems programming features, memory safety diagnostics, and Rust workflow tooling for RHEL developers.

Notable enhancements include:

  • More reliable debugging on Linux because unwind tables are now emitted by default even when compiling with -Cpanic=abort, which ensures that backtraces work correctly for debugging.
  • Improved systems programming support with full i128 and u128 support in extern "C" functions and the ability to create raw pointers to union fields using &raw in safe Rust code.
  • Enhanced safety diagnostics through the new dangling_pointers_from_locals lint, which warns against returning dangling raw pointers derived from local variables.
  • Clearer lifetime relationships with the new mismatched_lifetime_syntaxes lint, which warns when lifetime elision rules hide potentially confusing relationships between input and output lifetimes.
  • Workflow improvements in Cargo, including native support for workspace publishing with cargo publish --workspace, which automatically handles dependency ordering for multi-crate projects.

    Rust Toolset is delivered as a rolling Application Stream, and only the latest rust-toolset version is supported. For more information about Rust Toolset life cycle and support, see the Red Hat Enterprise Linux Application Streams Life Cycle.

Jira:RHEL-111847

The Red Hat Build of OpenJDK 25 integrates with the crypto-policies package for secure system property handling

With this update, the Red Hat Build of OpenJDK 25 for RHEL integrates with the RHEL crypto-policies package. This enhancement ensures secure system property handling and improves the security of Java applications running on RHEL by loading additional configuration files based on Red Hat system properties. This change also adds FIPS support using NSS.

Jira:RHEL-128412[1]

glibc locale for Bulgaria now uses the euro currency symbol

The glibc package now uses the euro currency symbol for the bg_BG locale, reflecting Bulgaria’s adoption of the euro as of 2026-01-01.

As a result, applications using the bg_BG locale display currency values with the updated euro symbol, ensuring consistency with the current official currency.

Jira:RHEL-137186

Rebase llvm toolset to version 21

The llvm toolset has been rebased to version 21 in RHEL 9.8. This rebase provides updated compiler and tooling features for building and optimizing applications that depend on llvm.

As part of this change, dependent packages in RHEL 9 have been rebuilt against llvm 21 to ensure compatibility with the updated toolset.

The notable changes are:

  • The nocapture function attribute is replaced by the more expressive captures(none) attribute in LLVM IR, clarifying pointer capture semantics.
  • Constant expression forms of several arithmetic instructions, including mul, are removed in favor of using regular instructions, simplifying IR and optimizations.
  • Inline assembly calls no longer accept label operands. The callbr instruction must be used instead, which clarifies semantics for indirect labels.
  • New fmaximum and fminimum operations are supported in the atomicrmw instruction, aligning atomic floating-point operations with llvm.maximum.* and llvm.minimum.* behavior.
  • Multiple back ends, including AArch64, AMDGPU, RISC-V, PowerPC, and others, receive code generation improvements, new ISA extensions, and bug fixes that can result in better performance and broader hardware support.

Jira:RHEL-100898

Improved trylock performance in glibc for heavily contended multi-core workloads

With this enhancement, the glibc package optimizes the trylock implementation for workloads with high thread counts on multi-core systems, improving trylock throughput under heavy contention.

Jira:RHEL-141072

LD_DEBUG, TLS, and TCB tracing support in glibc

With this enhancement, glibc adds tracing support for Thread-Local Storage (TLS) and Thread Control Block (TCB) operations through the tls category of the LD_DEBUG environment variable. You can use LD_DEBUG=tls to track TLS and TCB related events in the dynamic linker and improve analysis of complex runtime issues.

LD_DEBUG also supports excluding specific debug categories by prefixing the category name with a dash, for example, LD_DEBUG=all, -tls, so that you can refine the debug output.

Jira:RHEL-49785[1]

Croatia locale uses the euro currency symbol in glibc

The glibc package now uses the euro currency symbol for the hr_HR locale in RHEL. This change aligns Croatian locale data with the country’s current official currency.

As a result, applications that rely on glibc locale information for the hr_HR locale now display the up-to-date euro currency symbol instead of the former Croatian kuna.

Jira:RHEL-140105[1]

glibc adds RTLD_DI_ORIGIN_PATH to prevent buffer overflows

The RTLD_DI_ORIGIN_PATH dlinfo request type in glibc accepts the size of the destination buffer when retrieving the shared object origin path. This request type helps avoid buffer overflows when obtaining the shared object origin path.

The behavior of the existing RTLD_DI_ORIGIN request type remains unchanged.

Jira:RHEL-54450

4.11. Identity Management

IdM password policies support libpwquality character credit options

Identity Management (IdM) password policies support four new options (--dcredit, --ucredit, --lcredit, and --ocredit) based on the libpwquality credit system. A negative value sets the minimum number of characters of that type required in a password; a positive value provides a credit toward the minimum password length. These options are mutually exclusive with --minclasses and offer a more granular way to enforce per-class character requirements. As a result, administrators can configure specific character type minimums in IdM password policies, for example, to satisfy DISA STIG compliance requirements.

For more information, see Additional password policy options in IdM.

Jira:RHEL-73399[1]

samba rebased to 4.23.0

The samba packages, which provide file and print services using the SMB protocol, have been rebased to upstream version 4.23.0. This version provides important fixes and enhancements, most notably the following:

  • SMB3 UNIX Extensions are enabled by default to provide support for POSIX semantics, such as proper POSIX permissions and symlink handling, for UNIX and Linux clients.
  • Experimental support for SMB3 connections over Quick UDP Internet Connections (QUIC) is introduced. Configurable through client smb transports and server smb transports, this allows for secure SMB traffic over UDP port 443, which is ideal for remote access.
  • The new smb_prometheus_endpoint utility exports Samba server metrics in a Prometheus-compatible format to facilitate performance and status monitoring.
  • The samba-tool domain backup --no-secrets command explicitly removes confidential attributes, such as BitLocker recovery data and KDS root keys, from backups.

    For a complete list of changes, see Samba 4.23.0 Available for Download.

Jira:RHEL-114548

ipa rebased to 4.13.0

The ipa packages have been rebased to upstream version 4.13.0. This version provides important fixes and enhancements, most notably the following:

  • A new responsive and intuitive beta interface is available as a Technology Preview. You can experiment with it and provide feedback.
  • You can use the ipa-idrange-fix tool to identify users and groups outside current ID ranges and propose new ranges to include them.
  • The requirement for unique Certificate Authority (CA) subject names is relaxed, which enables duplicates under specific trust and nickname conditions.
  • The platform supports the full 32-bit ID range space.
  • This release resolves over 170 bugs and improves overall system performance and stability.

Jira:RHEL-120954

cepces rebased to 0.3.12

The cepces package, which provides a certificate enrollment client for Microsoft Active Directory Certificate Services (AD CS), has been rebased to upstream version 0.3.12. This version provides important fixes and enhancements, most notably the following:

  • Support for GSSAPI channel bindings to bind Kerberos authentication to the TLS (HTTPS) tunnel is available. This is required for compatibility with Windows Server 2025, which enforces stricter security requirements for SOAP-based certificate enrollment web services (CEP/CES) by default.
  • Authentication handshake failures when connecting to modern Windows environments that have TLS channel binding and Kerberos security policies enabled are fixed.
  • Updates to the cepces-submit helper ensure smoother communication with the certmonger service during automated certificate renewal cycles.

Jira:RHEL-121787[1]

dsctl dbverify provides clearer output when a specified backend does not exist

The dsctl dbverify command, used to verify the integrity of a Directory Server database, provides explicit feedback depending on the database backend type. For Berkeley Database (BDB) backends, the command now returns an error when the specified backend does not exist, instead of incorrectly reporting a successful verification. For LMDB backends, the command displays a warning that the verification is always reported as successful because LMDB has built-in integrity protection. As a result, administrators can distinguish between a missing backend and a genuinely successful verification when running dsctl dbverify.

Jira:RHEL-123893[1]

You can configure external password reset agents in IdM

When integrating Identity Management (IdM) with a third-party application that does not support Kerberos authentication, you can define a dedicated system account for the application to securely reset user passwords. Notably, these resets do not trigger the "password change required" flag, ensuring a seamless login experience for the end user. The system account authenticates by using LDAP.

As a result, organizations can integrate their own secure password management solutions directly with IdM.

Jira:RHEL-126515[1]

Support for generating LWCA certificates and private keys on an HSM

For installations using a hardware security module (HSM), Lightweight CA (LWCA) certificates and private keys are now generated on the HSM. This provides the same hardware-level security for the private keys as the root CA private key. The LWCA private key is generated on the HSM with the HSM token name as the prefix, for example mytoken:lwca.

Jira:RHEL-128238[1]

pki rebased to 11.7.1

The pki packages have been rebased to upstream version 11.7.1. This version provides important fixes and enhancements, most notably the following:

  • A race condition that caused ipa ca-add to fail with a "500 Internal Server Error" when adding multiple Sub-CAs in rapid succession is resolved. With this update, the CA engine correctly synchronizes authority initialization with signing certificate availability, which prevents API timeouts during high-volume operations.
  • A regression where enabling the nuxwdog watchdog prevented the PKI service from starting is fixed. The pki-server-nuxwdog utility correctly interfaces with systemd-ask-password, enabling users to provide required credentials at startup when a password file is missing.
  • An issue where the PKI server failed to issue certificates when a Sub-CA was specified is resolved. This fix ensures the certificate request pipeline correctly identifies and utilizes Sub-CA signing keys, which restores full functionality to multi-tier CA environments.

Jira:RHEL-129092

Automated services no longer reset account lockout counters

This update ensures that automated services like crond and systemd-user are prevented from unlocking accounts locked by faillock. Previously, these services would automatically clear the "failed login" counter when they ran, which could allow a malicious actor to keep guessing passwords without being permanently locked out. With this release, once an account is locked by a security policy, it remains locked until the timeout expires or an administrator intervenes, regardless of any background system activity.

Jira:RHEL-130875

ansible-freeipa rebased to 1.16.0

The ansible-freeipa packages, which provide Ansible modules and roles for Identity Management (IdM), have been rebased to upstream version 1.16.0. This version provides important fixes and enhancements, most notably the following:

The sysaccount module (ipasysaccount) creates and manages system accounts in IdM. The role module (iparole) supports system accounts as role members, so you can assign privileges such as user password management to those accounts in playbooks. You can, for example, use system accounts to integrate IdM with an external password reset management solution. For more information, refer to the sysaccount and role module READMEs.

The ipapasskeyconfig module is available in the ansible-freeipa collection. You can use this module to configure whether passkey authentication in IdM requires user verification, such as a PIN, when users authenticate with a passkey device. Additionally, the ipauser module supports passkey as a user authentication type, and the ipaservice and ipahost modules support passkey as an authentication indicator.

Jira:RHEL-139144

ansible-freeipa adds support for the passkey authentication type in management modules

With this update, the ipaconfig, ipahost, ipaservice, and ipauser modules support the passkey authentication type for IdM resources. This enables you to manage Passkey device authentication directly through your Ansible playbooks by setting the authentication type to passkey.

Jira:RHEL-139257

389-ds-base rebased to 2.8.0

The 389-ds-base package, which provides an enterprise-class LDAP server, has been rebased to upstream version 2.8.0.

Jira:RHEL-139825

You can specify an IdM server from which to update the local CA trust store

With this update, the ipa-certupdate tool includes a new --force-server <server_fqdn> option. Before this update, an Identity Management (IdM) client only connected to its default IdM server, specified in the /etc/ipa/default.conf file, when updating the local CA trust store. If this default server was down or unreachable, the ipa-certupdate command failed. As a result, administrators can ensure successful trust store updates and maintain service continuity, even if the primary server is unavailable.

Jira:RHEL-141446[1]

4.12. SSSD

sudo rebased to sudo-1.9.17p2

The sudo packages have been rebased to upstream version 1.9.17p2, which includes the following notable bug fixes and enhancements:

  • The sudoers file supports regular expressions.
  • The log_subcmds and intercept options are supported.
  • The json_compact logging is supported.
  • Privilege listing is enhanced.
  • Added the cmddenial_message sudoers option.
  • The sudoers LDAP schema now allows sudoUser, sudoRunasUser, and sudoRunasGroup to include UTF-8 characters.
  • Added a new -N (no-update) command-line option to sudo.
  • The following sudoers settings can be used to support more fine-grained I/O logging:

    • log_stdin
    • log_stdout
    • log_stderr
    • log_ttyin
    • log_ttyout

Jira:RHEL-128623

Recursive deletion for computer objects added to adcli

The adcli delete-computer command supports the --recursive option to delete computer objects from Active Directory, including their child objects. Previously, attempting to delete a computer object that contained child objects, such as metadata for BitLocker drive recovery, failed with a CANT_ON_NON_LEAF error in AD. With this update, users can cleanly delete computer objects that contain child objects using adcli.

Jira:RHEL-134951[1]

4.13. The web console

cockpit rebased to version 356

The cockpit packages have been rebased to version 356, which provides many improvements and fixes compared to version 344 in RHEL 9.7, most notably:

  • Timers created by the RHEL web console are executed directly by the /bin/sh system shell, and you can edit them.
  • The health dashboard shows a warning if the last shutdown or reboot was unclean.
  • You can override the RHEL web console branding with a custom configuration in the /etc/cockpit/branding.css file.
  • Support for the pam_cockpit_cert PAM module in the /etc/pam.d/cockpit file, which is redundant since version 248, is removed. If you still use the module in your configuration, you must remove it manually.
  • The web console lists additional ports in a firewall zone, each in its own row, and you can delete them individually.
  • Support for TLS is removed from the cockpit-ws subpackage. Instead, containers run the cockpit-tls program and directly connect to the cockpit-ws server.
  • You can detach the VNC console viewer of a virtual machine into its own window.
  • The web console no longer adds both SPICE and VNC graphics when creating new virtual machines, but only VNC.
  • You can shut down and restart virtual machines with a single action from the web console.
  • The cockpit-podman plug-in supports the quadlet lifecycle and shows inactive quadlets.
  • You can create empty files in the web console file manager.

Jira:RHEL-112866

4.14. Red Hat Enterprise Linux System Roles

Disk partition management available to the storage role

With this update, you can manage disk partitions by using the storage role, streamlining storage management. With this unified approach you can add, remove, resize, and format partitions, ensuring consistent and repeatable results.

Jira:RHEL-112772[1]

Support for bootable snapshots with snapm

With this update, you can create bootable snapshot sets on platforms that support snapm, such as RHEL 9.6 and Fedora 41 or later. You can now set a bootable flag when requesting snapshots and boot the system directly from a snapshot.

Jira:RHEL-120325[1]

The postgresql RHEL system role now supports PostgreSQL 18

The postgresql RHEL system role, which installs, configures, manages, and starts the PostgreSQL server, now supports PostgreSQL 18.

For more information about this system role, see Installing and configuring PostgreSQL by using the postgresql RHEL system role.

Jira:RHEL-122958[1]

The firewall RHEL system role supports IPv6 addresses within the ipset_entries

With this enhancement, you can now use IPv6 addresses within the ipset_entries variable when utilizing hash:ip or hash:net types in playbooks that use the firewall RHEL system role. You can also specify additional <key>:<value> pairs of options for ipset by using the ipset_options variable. pairs

Due to a limitation of the underlying firewalld implementation, you cannot mix IPv4, IPv6, and MAC addresses in the same ipset_entries list.

Jira:RHEL-123040[1]

The ha_cluster RHEL System Role now exports additional cluster configuration variables

Previously, the ha_cluster RHEL System Role provided limited visibility into the current cluster configuration.

With this update, the ha_cluster role has been expanded to include cluster properties and resource defaults.

As a result, the following variables are now exported, allowing for easier auditing and configuration mirroring:

  • ha_cluster_cluster_properties
  • ha_cluster_resource_defaults
  • ha_cluster_resource_operation_defaults

Jira:RHEL-123041[1]

The sshd system role supports the CanonicalMatchUser option

To provide more granular control over conditional configurations, the sshd system role supports the sshd_CanonicalMatchUser variable. You can specify whether to evaluate OpenSSH Match blocks against a user’s initial login name or their final canonical username after the server rewrites it.

As a result, you can consistently apply security policies in environments where external identity providers or local configuration rules modify usernames. This ensures that Match blocks accurately reflect the user’s identity once the server determines the final canonical username.

Jira:RHEL-127973[1]

The ha_cluster RHEL System Role now exports cluster constraint variables

Previously, the ha_cluster RHEL System Role did not include detailed constraint information in its exported data.

With this enhancement, the ha_cluster role now includes variables for location, colocation, order, and ticket constraints.

As a result, the following variables are now available in the module output, facilitating better configuration management and role-based automation:

  • ha_cluster_constraints_location
  • ha_cluster_constraints_colocation
  • ha_cluster_constraints_order
  • ha_cluster_constraints_ticket

Jira:RHEL-128436[1]

Support added for the fencing-watchdog-timeout cluster property

Before this update, the high-availability stack primarily supported the stonith-watchdog-timeout property for managing watchdog-based fencing. However, future Pacemaker versions replace this property with fencing-watchdog-timeout.

With this update, the role handles both the legacy and new property names consistently.

As a result, the role supports future Pacemaker versions and ensures that watchdog-related cluster properties remain functional regardless of which property name you use. The role preserves both stonith-watchdog-timeout and fencing-watchdog-timeout when creating or pushing CIB configurations.

Jira:RHEL-136599[1]

The VersionAddendum option is available in SSH configuration

With this update, you can configure the VersionAddendum option in SSH settings for match blocks, host blocks, and global client configurations. This enhancement ensures compatibility with the latest OpenSSH versions and provides granular control over your SSH connections.

Jira:RHEL-138279[1]

The sshd system role supports GSSAPIDelegateCredentials

The new GSSAPIDelegateCredentials parameter provides Generic Security Services Application Programming Interface (GSSAPI) credential delegation in Kerberos environments and enables a seamless single sign-on experience.

As a result, you can automate the configuration of GSSAPI credential delegation to simplify network authentication.

Jira:RHEL-144496[1]

The metrics RHEL system role supports configuring TLS-encrypted connections

With this enhancement, you can use the metrics RHEL system role to configure TLS-encrypted connections to Grafana. To use this feature, specify the following variables in your playbook:

  • metrics_grafana_certificates to use the certificate RHEL system role to generate new certificates on the managed nodes
  • metrics_grafana_cert and metrics_grafana_private_key to specify the path to an existing certificate and private key on the managed nodes
  • metrics_grafana_cert_src and metrics_grafana_private_key_src to copy an existing certificate and private key from the control node to the managed nodes

Jira:RHEL-144592[1]

SELinux supports the DCCP and SCTP protocols

With this update, you can manage SELinux port types for Datagram Congestion Control Protocol (DCCP) and Stream Control Transmission Protocol (SCTP). By configuring SELinux port labels for these protocols, you can apply granular access controls and improve system security.

Jira:RHEL-145215[1]

RHEL System Roles support for immutable systems (ostree)

You can use RHEL system roles to build and manage immutable operating systems. This provides a consistent management interface across different backend technologies, including ostree.

As a result, you can deploy and configure immutable systems using the same roles used for traditional systems, ensuring environment consistency. Note: This feature is currently not compatible with the nbde_client role.

Jira:RHELDOCS-21216

In-place upgrade phases automation with the analysis, remediate, and upgrade Ansible roles

With this release, you can use the analysis, remediate, and upgrade Ansible roles to automate the pre-upgrade and upgrade phases of the in-place upgrade. By using these Ansible roles, you can quickly and efficiently upgrade large numbers of systems, saving you time.

For more information, see Upgrading large deployments by using Ansible roles.

Jira:RHEL-117252

4.15. Virtualization

Encryption for libvirt secrets

This update introduces the virt-secrets-init-encryption service, which encrypts libvirt secrets, such as keys for the virtual Trusted Platform Module (vTPM). By default, this encryption uses systemd credentials sealing. However, you can use the new /etc/libvirt/secret.conf file to specify a custom key for encrypting secrets, as well as to disable automatic encryption of secrets. As a result, critical vTPM metadata is protected from unauthorized access on the host file system. This also hardens the overall security of the virtualization environment.

Jira:RHEL-7125[1]

Faster updates for cryptographic coprocessors on IBM Z

After using the virsh nodedev-update command to update a cryptograpic coprocessor (vfio-ap) device on an IBM Z host, the new configuration now takes effect significantly faster.

Jira:RHEL-73001[1]

CPI for virtual machines on IBM Z

Virtual machines (VMs) on RHEL 9 hosts that use IBM Z hardware can now use the control program identification (CPI) feature. By using CPI, you can obtain system information about VMs without accessing them. For more information about CPI, see IBM documentation.

Note that on VMs that use IBM Secure Execution, CPI is disabled by default to ensure confidentiality, and must be enabled manually. For instructions, see Setting up IBM Secure Execution on IBM Z.

Jira:RHEL-73009[1]

Live migration can switch from multifd precopy to postcopy without restarting

With this update, you can enable both multifd (multiple file descriptor) precopy and postcopy virtual machine live migration strategies. multifd uses multiple parallel TCP channels during the precopy phase to maximize network bandwidth usage and reduce migration time. As a result, you can configure both migration strategies and switch from precopy to postcopy live migration without disruption. Note that, postcopy migration does not use multifd.

Jira:RHEL-97465[1]

New s390-ccw-virtio-rhel9.8.0 machine type available for IBM Z VMs

The updated qemu-kvm package provides a new s390-ccw-virtio-rhel9.8.0 machine type for IBM Z virtual machines (VMs). This machine type enables Control Program Identification (CPI) and performance-enhanced PCI translation for passthrough PCI devices by default. As a result, IBM Z VMs that use the s390-ccw-virtio-rhel9.8.0 machine type benefit from improved performance with passthrough PCI devices and CPI without additional configuration.

Jira:RHEL-104005[1]

libvirt introduces a host-model mode for Hyper-V Enlightenments

The libvirt package provides a new host-model mode for Hyper-V Enlightenments, which automatically enables all Hyper-V enlightenments supported on the host. This mode eliminates the need for separate configuration templates for Intel and AMD hosts. As a result, you can configure <hyperv mode='host-model'/> in the XML definition of a virtual machine to automatically apply all host-supported Hyper-V Enlightenments without maintaining separate configurations for each vendor.

Jira:RHEL-114003

Native FUA support for QEMU

With this update, the QEMU emulator no longer needs to emulate the Forced Unit Access (FUA) I/O method, and instead can use FUA natively. This can improve the overall performance of virtual storage, particularly in database workloads.

Jira:RHEL-118197

PCCS for Intel TDX

This update introduces the Provisioning Caching Certification Service (PCCS) for Intel Trust Domain Extensions (TDX). This provides the local caching required to use Intel hosted Provisioning Certification Services (PCS) at scale, and also makes it possible to perform TDX attestation on host systems that are isolated from the public internet.

Jira:RHEL-127046

SCSI passthrough support for virtual machines

With this update, RHEL now supports SCSI passthrough for virtual machines (VMs). With this feature, VMs can directly access host SCSI devices, such as tape drives and Storage Area Network (SAN) Logical Unit Numbers (LUNs).

As a result, you can configure VMs to use specialized storage devices that require direct SCSI access, including support for both single-path and multipathed vDisks.

Note that for SCSI passthrough to work, the host must use a supported RHEL and kernel version. For details, see: Required RHEL versions for SGIO support in Virtual Machines

Jira:RHELDOCS-21410[1]

SCSI3 Persistent Reservation support for virtual machines

With this update, RHEL supports SCSI3 Persistent Reservation (S3-PR) for virtual machines (VMs). This feature makes it possible for multiple VMs to coordinate access to shared storage devices, which is essential for Linux clustering solutions, such as Pacemaker, and for Windows Server Failover Clustering.

As a result, VMs can register and manage persistent reservations on storage devices, which prevent conflicts when multiple VMs access the same storage. S3-PR support is available for both single-path and multipathed vDisks.

Note that for S3-PR to work, the host must use a supported RHEL and kernel version. For details, see: Required RHEL versions for SGIO support in Virtual Machines

Jira:RHELDOCS-21467

4.16. Supportability

Improved AAP plugins for more useful diagnostics

Before this update, the sos report was collected on AAP. With this update, the notable enhancements to the following AAP plugins are:

  • aap_containerized: Resolved an issue that incorrectly enabled aap_containerized on the RPM-based Private Automation Hub servers.
  • aap_controller: Expanded the set of gathered command outputs and conditionally collect run_wsbroadcast or run_wsrelay depending on the AWX release version.
  • aap_eda: Collected service output details based on the installed EDA version. Starting from AAP 2.5, specific commands are used to obtain service status information.
  • aap_gateway: Added additional command outputs for improved troubleshooting on Gateway servers.
  • aap_hub: Centralized the collection of service information for PAH servers under a single location within the plugin directory.

Jira:RHEL-121524

SSL certificate control in SOS clean process is available

With this update, you can manage SSL/TLS certificates that contain sensitive data during the SOS clean process. The new --treat-certificates option provides the option to remove, obfuscate, or maintain the original binary format of these certificates ensuring that no sensitive data persists.

As a result, you can enhance data security and privacy by selecting the treatment for SSL/TLS certificates during the SOS clean process.

Jira:RHEL-142619

Automatic user detection for AAP container runners in SOS reports

With this update, the sos utility automatically detects the user running containers for Ansible Application Platform (AAP) deployments. This eliminates the need for manual specification, ensuring the collection of all necessary AAP data.

Jira:RHEL-140738

4.17. Containers

The log-location option is available in the podman configuration

You can specify a custom log-location option in the containers.conf file for per-user configurations using podman-kube systemd. Previously, logs were restricted to a default location and could not be customized. With this release, you can define custom log paths directly in the configuration file, reducing the need to specify them manually in the podman run command.

Jira:RHEL-3114[1]

Enhanced aardvark-dns functionality rereads resolv.conf file without requiring a full process restart

With this update, the Aardvark-DNS process now dynamically reloads DNS configurations in the Podman 5.x stack on Red Hat Enterprise Linux (RHEL). This eliminates the need to stop and restart the entire process when changes are made to the DNS configuration file, resulting in improved efficiency and reduced downtime for end users.

Jira:RHEL-85839[1]

container-selinux rebased to version 2.244.0-1

The container-selinux package, which provides necessary SELinux policies, types, and rules to confine and secure container runtimes, has been rebased to version 2.244.0-1. This version provides important enhancements, most notably, it streamlines the process, enhances data protection, and ensures confidentiality in deployments, while reducing potential security risks associated with public storage endpoints.

Jira:RHEL-112187

runc rebased to 1.3.3

The runc package, which serves as the low-level, CLI tool for spawning and running containers, is rebased to upstream version 1.3.3. This version provides important fixes and enhancements, most notably the following:

  • You can create and manage their own private container registries on a dedicated Azure Kubernetes Service (AKS) cluster. This enhancement streamlines container workflows, enhances security, and boosts efficiency by providing a private space for storing and distributing container images, reducing the risk of unauthorized access.
  • Automates routine tasks, saves time and effort, and improves the user interface. It enables seamless integration of third-party applications, expanding the platform’s functionality and versatility for users.

Jira:RHEL-124800

Unified Configuration available for Rootless Podman

With this update, a unified system-wide configuration file is introduced for rootless Podman, enabling centralized policy management, a consistent security baseline, and operational standardization across all users.

As a result, you can inherit sensible defaults without manual configuration, while still maintaining the flexibility to override system settings through personal configuration files. Additionally, this update ensures backward compatibility, meaning existing user workflows and configurations remain unchanged.

Jira:RHEL-126643

The Container Tools packages have been updated

The updated Container Tools RPM meta-package, which includes the Podman, Buildah, Skopeo, crun, and runc tools, is available. The Buildah package has been updated to version 1.43.1, and Skopeo has been updated to version 1.22.2. Podman release 5.8.2 contains the following notable bug fixes and enhancements over the previous version:

  • The podman machine init --image command can run PowerShell-escaped commands from the user-specified image path in a PowerShell session on the host when you use it on Windows with the Hyper-V backend ( CVE-2026-33414).
  • Automatic migration from BoltDB to SQLite after a reboot no longer performs a partial migration, leaving some containers in SQLite and others in BoltDB, when Quadlets are in use.
  • The podman quadlet install command installs files that contain multiple separate Quadlet files. You must separate the files with a --- delimiter on a new line and begin each section with a # FileName=<name> line to name the new Quadlet.
  • The Quadlet .container files include the AppArmor key to configure a container’s AppArmor profile.
  • Podman automatically attempts to migrate earlier BoltDB databases to SQLite when the system reboots. This is necessary because the Podman 6.0 release removes support for BoltDB. If automatic migration is not possible, you can manually force a migration with the new podman system migrate --migrate-db option.
  • Podman loads the path from the VM’s filesystem when you run the podman artifact add command against a Podman machine VM. This improves performance if you share the path you load or build into the VM instead of streaming the data through the REST API.
  • The podman update command has a new option, --ulimit, to update container ulimits.
  • You can use the new --no-session option with the podman exec command to disable tracking of the exec session, which improves performance and startup time.
  • Containers with the unless-stopped restart policy restart after a reboot when you enable the podman-restart.service service.
  • In the Quadlet.container file:

    • You can set Entrypoint="" to clear the container’s entrypoint.
    • A HealthCmd supports commands with double-quotes and ensures a functional health check.
    • The RequiresMountsFor field correctly handles bind-mount paths that contain spaces.
  • Inspecting containers in host network mode no longer causes FreeBSD systems to panic.
  • The Libpod System Check endpoint no longer performs operations with bad data after it returns a 400 error.
  • The remote attach API for containers (Libpod & Compat) no longer panics due to a rare race condition.
  • The system no longer improperly adds options from the default driver, which previously prevented the Secret Create API from creating functional secrets using the shell driver. You can enter the secret directly at the terminal with the podman secret create command instead of providing it through a pipe.
  • Added new APIs for interacting with Quadlets:

    • GET /libpod/quadlets/{name}/file: Print the contents of a Quadlet file.
    • GET /libpod/quadlets/{name}/exists: Check if the given Quadlet exists.
    • POST /libpod/quadlets: Install one or more Quadlets.
    • DELETE /libpod/quadlets: Remove one or more Quadlets.
    • DELETE /libpod/quadlets/{name}: Remove a single Quadlet.
  • Containers created by the podman play kube command no longer run health checks before the initialDelaySeconds option expires, and the podman kube play command now correctly handles precedence between environment variables set by both the envFrom and env fields.
  • The podman build command’s --pull=newer option now functions correctly.
  • The podman artifact push and podman artifact pull commands no longer ignore authentication credentials given by the --authfile option.
  • The podman run --pod-id-file option is now properly validated, preventing the creation of containers in pods with improper user namespace configuration.

    For more information about notable changes, see Upstream release notes.

Jira:RHEL-127908

Support for updates in air-gapped and disconnected environments

This update introduces air-gapped and disconnected updates for RHEL deployments, enabling edge deployments to perform updates without internet connectivity. As a result, you can benefit from greater flexibility and reliability for offline updates, improving deployment management in remote or secure environments.

Jira:RHELDOCS-20708[1]

New container images are available

The rhel9/ruby-40, rhel9/postgresql-18, rhel9/python-314-minimal, rhel9/mariadb-118 and rhel9/python-314 container images are now available in the Red Hat Container Registry. The notable enhancements for each image are:

  • rhel9/ruby-40: You use the Ruby 4.0 container as your base platform to build and run diverse Ruby 4.0 applications and frameworks. This container image includes the npm utility, so you can install JavaScript modules for your web applications.
  • rhel9/postgresql-18: You can use this container image to package the PostgreSQL postgres daemon and client application in a container. The postgres server daemon accepts your connections from clients and provides you access to content from PostgreSQL databases.
  • rhel9/python-314-minimal: You use the full container image as a universal base image to build your containerized applications. However, this universal nature means that the resulting containers consume a lot of disk space. This happens mainly because the image contains npm, compilers, header files, and other packages you might need to install and deploy your applications.
  • rhel9/mariadb-118: You use this container image to package the MariaDB mysqld daemon and client application into a container. The mysqld server daemon accepts your client connections and provides you with access to content from MySQL databases.
  • rhel9/python-314: You can use the Python 3.14 container as your base platform to build and run your Python 3.14 applications and frameworks. This container image includes the npm utility, so you can install JavaScript modules for your web applications. Currently, Red Hat does not support a specific npm or nodejs version in the image.

Jira:RHELDOCS-22067[1]

4.18. RHEL Lightspeed

Color support for the command-line assistant

With this update, the command-line assistant supports color output by default, aligning its appearance with other RHEL command-line tools. This update improves output readability through increased visual contrast.

You can disable color output by using the --plain option or by setting the NO_COLOR=1 environment variable.

Jira:RHELDOCS-21814[1]

SAP Solutions documentation added to RHEL Lightspeed

With this enhancement, RHEL Lightspeed includes the Red Hat Enterprise Linux for SAP Solutions documentation set in its knowledge base. You can now ask RHEL Lightspeed technical questions specific to SAP deployments on RHEL. This update provides more accurate and context-aware responses for SAP-related administrative and configuration tasks.

Jira:RHELDOCS-21815[1]

Red Hat logoGithubredditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat Dokumentation

Legal Notice

Theme

© 2026 Red Hat
Nach oben