Alibaba Cloud regularly releases updated versions of the Alibaba Cloud Linux 3 image to ensure users have access to the latest operating system (OS) features, capabilities, and security patches. This topic lists the latest versions of the Alibaba Cloud Linux 3 image and their updates.
Background information
Unless otherwise specified, updates apply to Elastic Compute Service (ECS) in all available regions.
Alibaba Cloud Linux 3 images are compatible with most instance families. However, some images support only specific instance families that require designated public images, as follows:
ARM images (image IDs that contain
_arm64_) are compatible with all ARM-based instances on Alibaba Cloud.
2026
Alibaba Cloud Linux 3.2104 U12.3
Version | Image ID | Release date | Published content |
Alibaba Cloud Linux 3.2104 U12.2 | aliyun_3_x64_20G_alibase_20260122.vhd | 2026-01-22 |
|
aliyun_3_x64_20G_dengbao_alibase_20260122.vhd | 2026-01-22 |
| |
aliyun_3_x64_20G_container_optimized_alibase_20260122.vhd | 2026-01-22 |
| |
aliyun_3_arm64_20G_alibase_20260122.vhd | 2026-01-22 |
| |
aliyun_3_arm64_20G_dengbao_alibase_20260122.vhd | 2026-01-22 |
| |
aliyun_3_arm64_20G_container_optimized_alibase_20260122.vhd | 2026-01-22 |
|
Package updates
New features
Cloud application component updates:
Upgraded the
aliyun-clicomponent fromaliyun-cli-3.1.3-1.al8toaliyun-cli-3.2.0-1.al8.
OS-level capability enhancements:
Upgraded the
alinux-releasecomponent fromalinux-release-3.2104.12.2-4.al8toalinux-release-3.2104.12.3-1.al8, which marks the release of Alibaba Cloud Linux 3.2104 U12.3.
Bug Fixes
Compatibility changes:
Upgraded the
kexec-toolscomponent fromkexec-tools-2.0.26-14.0.1.7.al8.2tokexec-tools-2.0.26-14.0.1.9.al8.2. This update addspcie_ports=compatto the kdump cmdline configuration on x86 to resolve an issue where kdump hangs on 8th-generation instances.Upgraded the
alinux-base-setupcomponent fromalinux-base-setup-3.2-9.al8toalinux-base-setup-3.2-10.al8. This update adds UUID support to/boot/efi/EFI/alinux/grub.cfgto bind the initial boot disk, which resolves boot issues on Bare Metal systems.
Component | Previous version | Updated version | Update method |
glibc | glibc-2.32-1.21.al8 | glibc-2.32-1.22.al8 | Updated in image |
alinux-base-setup | alinux-base-setup-3.2-9.al8 | alinux-base-setup-3.2-10.al8 | Updated in image |
grub2 | grub2-2.02-165.0.2.al8 | grub2-2.02-165.0.2.1.al8 | Updated in image |
kexec-tools | kexec-tools-2.0.26-14.0.1.7.al8.2 | kexec-tools-2.0.26-14.0.1.9.al8.2 | Updated in image |
systemd | systemd-239-82.0.4.4.al8.5 | systemd-239-82.0.4.5.al8.5 | Updated in image |
grubby | grubby-8.40-49.0.1.al8 | grubby-8.40-49.0.1.1.al8 | Updated in image |
kpatch | kpatch-0.9.7-2.0.1.al8 | kpatch-0.9.7-2.0.4.al8 | Updated through yum repository |
The following bug fixes are synchronized from Anolis OS 8:
Component | Previous version | Updated version | Reason | Update method |
quota | quota-4.09-2.0.1.al8 | quota-4.09-4.0.1.al8 | Fixes a memory leak. | Updated in image |
intel-ipp-crypto-mb | intel-ipp-crypto-mb-1.0.6-4.al8 | intel-ipp-crypto-mb-1.0.6-5.al8 | Fixes a qatengine installation failure when an EPEL repository is configured. | Updated through yum repository |
qatengine | qatengine-1.2.0-3.al8 | qatengine-1.2.0-4.al8 | Updated through yum repository | |
gnome-shell-extensions | gnome-shell-extensions-40.7-19.0.1.al8 | gnome-shell-extensions-40.7-29.0.1.al8 | Fixes an error in the window list reordering backport, resolves an issue with the application grid and the dash-to-panel extension, and makes workspace names more prominent. | Updated through yum repository |
geoclue2 | geoclue2-2.6.0-7.al8 | geoclue2-2.6.0-8.al8.1 | Migrates user and group management for geoclue2 from manual scripts to a sysusers.d file. | Updated through yum repository |
evolution-data-server | evolution-data-server-3.40.4-9.0.1.al8 | evolution-data-server-3.40.4-10.0.1.al8 | Prevents runtime warnings about assertion failures when the signal handler runs. | Updated through yum repository |
gsettings-desktop-schemas | gsettings-desktop-schemas-40.0-7.0.1.al8 | gsettings-desktop-schemas-40.0-8.0.1.al8 | Adds an option to disable the password input display on the login or lock screen. | Updated through yum repository |
pulseaudio | pulseaudio-15.0-2.0.1.al8 | pulseaudio-15.0-3.0.1.al8 | Fixes an auto-start issue. | Updated through yum repository |
The following table lists the CVEs fixed in this release.
Component | Previous version | Updated version | Fixed CVE ID | Update method |
cups | cups-2.2.6-63.0.2.al8 | cups-2.2.6-64.0.1.al8 | CVE-2025-58364 | Updated in image |
curl | curl-7.61.1-35.0.2.al8.3 | curl-7.61.1-35.0.2.al8.9 | CVE-2025-9086 | Updated in image |
openssh | openssh-8.0p1-26.0.1.1.al8 | openssh-8.0p1-27.0.1.1.al8 | CVE-2025-61984 CVE-2025-61985 | Updated in image |
gimp | gimp-2.8.22-26.al8.2 | gimp-2.8.22-26.al8.3 | CVE-2025-10920 CVE-2025-10921 CVE-2025-10922 CVE-2025-10923 CVE-2025-10924 CVE-2025-10925 CVE-2025-10934 | Updated through yum repository |
abrt | abrt-2.10.9-24.0.1.al8 | abrt-2.10.9-25.0.1.1.al8 | CVE-2025-12744 | Updated through yum repository |
tomcat | tomcat-9.0.87-1.al8.6 | tomcat-9.0.87-1.al8.7 | CVE-2025-31651 CVE-2025-55752 | Updated through yum repository |
luksmeta | luksmeta-9-4.1.al8 | luksmeta-9-4.2.al8.1 | CVE-2025-11568 | Updated through yum repository |
webkit2gtk3 | webkit2gtk3-2.46.6-2.0.1.al8 | webkit2gtk3-2.50.4-1.0.1.al8 | CVE-2025-43501 CVE-2025-43529 CVE-2025-43531 CVE-2025-43535 CVE-2025-43536 CVE-2025-43541 CVE-2024-44192 CVE-2024-54467 CVE-2024-54551 CVE-2025-13502 CVE-2025-13947 CVE-2025-24189 CVE-2025-24208 CVE-2025-24209 CVE-2025-24216 CVE-2025-30427 CVE-2025-31205 CVE-2025-31257 CVE-2025-31273 CVE-2025-31278 CVE-2025-43211 CVE-2025-43212 CVE-2025-43216 CVE-2025-43227 CVE-2025-43240 CVE-2025-43265 CVE-2025-43272 CVE-2025-43342 CVE-2025-43343 CVE-2025-43356 CVE-2025-43368 CVE-2025-43392 CVE-2025-43419 CVE-2025-43421 CVE-2025-43425 CVE-2025-43427 CVE-2025-43429 CVE-2025-43430 CVE-2025-43431 CVE-2025-43432 CVE-2025-43434 CVE-2025-43440 CVE-2025-43443 CVE-2025-43458 CVE-2025-6558 CVE-2025-66287 | Updated through yum repository |
golang | golang-1.24.6-1.0.1.al8 | golang-1.25.3-2.0.2.al8 | CVE-2025-47906 CVE-2025-58183 | Updated through yum repository |
delve | delve-1.24.1-1.0.2.al8 | delve-1.25.2-1.0.2.al8 | CVE-2025-47906 CVE-2025-58183 | Updated through yum repository |
httpd | httpd-2.4.37-655.0.1.al8.5 | httpd-2.4.37-655.0.1.al8.6 | CVE-2025-55753 CVE-2025-58098 CVE-2025-65082 CVE-2025-66200 | Updated through yum repository |
mysql | mysql-8.0.43-1.0.1.1.al8 | mysql-8.0.44-1.0.1.1.al8 | CVE-2025-53040 CVE-2025-53042 CVE-2025-53044 CVE-2025-53045 CVE-2025-53053 CVE-2025-53054 CVE-2025-53062 CVE-2025-53069 | Updated through yum repository |
Known Issues
Refer to the Known issues for Alibaba Cloud Linux 3.2104 U12.1.
2025
Alibaba Cloud Linux 3.2104 U12.2
Version | Image ID | Release date | Release summary |
Alibaba Cloud Linux 3.2104 U12.2 | aliyun_3_x64_20G_alibase_20251215.vhd | 2026-01-05 |
|
aliyun_3_x64_20G_dengbao_alibase_20251215.vhd | 2026-01-05 |
| |
aliyun_3_x64_20G_container_optimized_alibase_20251215.vhd | 2026-01-05 |
| |
aliyun_3_arm64_20G_alibase_20251215.vhd | 2026-01-05 |
| |
aliyun_3_arm64_20G_dengbao_alibase_20251215.vhd | 2026-01-05 |
| |
aliyun_3_arm64_20G_container_optimized_alibase_20251215.vhd | 2026-01-05 |
|
Updates
Major updates
Kernel: No changes. This release uses the
kernel-5.10.134-19.2.al8package.Driver: The
kmod-udmadriver is updated tokmod-udma-5.10.134~19.2-0.1.0~1.al8for compatibility withkmod-intel-QAT20-5.10.134~19.2-L.0.9.4__00004~1.al8.
Package updates
New features
Updates to cloud application components:
aliyun-cliis updated fromaliyun-cli-3.0.305-1.al8toaliyun-cli-3.1.3-1.al8. This component is updated in the image.
Core OS enhancements:
alinux-releaseis updated toalinux-release-3.2104.12-4.al8to mark the release of Alibaba Cloud Linux 3.2104.12.2. This component is updated in the image.intel-QAT20is updated tointel-QAT20-L.0.9.4-00004.15.al8to recognize the QAT VF device ID of 9th-generation GNR instances. This component is updated in the yum repository.
Bug fixes
Fixes for Alibaba Cloud Linux 3:
systemdis updated fromsystemd-239-82.0.4.3.al8.5tosystemd-239-82.0.4.4.al8.5. This update backports a fix for a race condition between mount and reload operations. This component is updated in the image.glibcis updated fromglibc-2.32-1.21.al8toglibc-2.32-1.22.al8. This update resolves an issue wherepthread_cond_waitcould miss a wakeup signal. This component is updated in the image.tee-primitivesis updated fromtee-primitives-1.0-2.al8totee-primitives-1.0-3.al8. This update resolves an issue caused by a source code md5sum change. This component is updated in the yum repository.qt5-qtmultimediais updated fromqt5-qtmultimedia-5.15.3-1.al8toqt5-qtmultimedia-5.15.3-1.1.al8. This update resolves a dependency issue. This component is updated in the yum repository.dracutis updated fromdracut-049-233.git20240115.0.2.al8todracut-049-233.git20240115.0.2.1.al8. This update fixes an error that occurs when installing a 6.x kernel on Alibaba Cloud Linux 3. This component is updated in the yum repository.intel-QAT20is updated fromintel-QAT20-L.0.9.4-00004.12.al8tointel-QAT20-L.0.9.4-00004.15.al8. This update resolves an installation dependency issue with OpenSSL 3.0 that caused TLS v1.0 and v1.1 to be unsupported. This component is updated in the yum repository.qatengineis updated fromqatengine-1.2.0-3.al8toqatengine-1.2.0-4.al8. This update resolves an installation dependency issue with OpenSSL 3.0 that caused TLS v1.0 and v1.1 to be unsupported. This component is updated in the yum repository.intel-ipp-crypto-mbis updated fromintel-ipp-crypto-mb-1.0.6-4.al8tointel-ipp-crypto-mb-1.0.6-5.al8. This update resolves an installation dependency issue with OpenSSL 3.0 that caused TLS v1.0 and v1.1 to be unsupported. This component is updated in the yum repository.
This release incorporates bug fixes from Anolis OS 8, updating 12 components. One is updated in the image and 11 in the yum repository, as detailed in the table below:
Component
Previous version
New version
Description
Update method
which
which-2.21-20.0.1.al8
which-2.21-21.0.1.al8
Adds a check to ensure
/proc/$$/exeis readable.Updated in the image
dnsmasq
dnsmasq-2.79-33.al8
dnsmasq-2.79-35.al8
Changes the behavior of repeated DNS queries.
Updated in the yum repository
gnome-session
gnome-session-40.1.1-9.0.1.al8
gnome-session-40.1.1-10.0.1.al8
Reduces excessive logging during debugging to improve efficiency.
Updated in the yum repository
gnome-settings-daemon
gnome-settings-daemon-40.0.1-17.0.1.al8
gnome-settings-daemon-40.0.1-19.0.1.al8
Fixes the default power button action for servers.
Fixes an issue where smart cards only worked on cold plug.
Updated in the yum repository
java-1.8.0-openjdk-portable
java-1.8.0-openjdk-portable-1.8.0.462.b08-1.0.1.1.al8
java-1.8.0-openjdk-portable-1.8.0.472.b08-1.0.1.1.al8
Fixes the JDK-8202369 issue.
Updated in the yum repository
ksh
ksh-20120801-267.0.1.al8
ksh-20120801-269.0.1.al8
Fixes an issue with pasting long multi-byte characters via SSH.
Updated in the yum repository
libdrm
libdrm-2.4.121-1.0.1.al8
libdrm-2.4.123-2.0.1.al8
Fixes an issue where the
libpciaccesslibrary was unavailable for the aarch64, ppc64le, and s390x architectures on RHEL 9.Updated in the yum repository
motif
motif-2.3.4-21.al8
motif-2.3.4-24.al8
Fixes a memory leak related to UTF-8 strings.
Updated in the yum repository
mysql-selinux
mysql-selinux-1.0.13-1.al8
mysql-selinux-1.0.14-1.al8
Resolves Red Hat Bugzilla issue rhbz#2380217 by upgrading the package and updating its hash and release information.
Updated in the yum repository
net-snmp
net-snmp-5.8-30.0.1.al8
net-snmp-5.8-31.0.1.al8
Fixes a use-after-free vulnerability in a callback function.
Updated in the yum repository
intel-ipp-crypto-mb
intel-ipp-crypto-mb-1.0.6-4.al8
intel-ipp-crypto-mb-1.0.6-5.al8
Resolves an installation dependency issue with OpenSSL 3.0 that caused TLS v1.0 and v1.1 to be unsupported.
Updated in the yum repository
qatengine
qatengine-1.2.0-3.al8
qatengine-1.2.0-4.al8
Resolves an installation dependency issue with OpenSSL 3.0 that caused TLS v1.0 and v1.1 to be unsupported.
Updated in the yum repository
This release addresses 24 CVEs. 4 are patched in the image and 20 are available in the yum repository, as detailed in the table below:
Component
Previous version
New version
CVE ID
Update method
bind
bind-9.11.36-16.0.1.al8.4
bind-9.11.36-16.0.1.al8.6
CVE-2025-40778
Updated in the image
expat
expat-2.2.5-17.al8
expat-2.5.0-1.al8
CVE-2025-59375
Updated in the image
libssh
libssh-0.9.6-12.al8
libssh-0.9.6-16.0.1.al8
CVE-2025-5318
Updated in the image
sssd
sssd-2.9.4-5.al8.2
sssd-2.9.4-5.al8.3
CVE-2025-11561
Updated in the image
galera
galera-26.4.20-1.al8
galera-26.4.22-1.al8
CVE-2023-52969
CVE-2023-52970
CVE-2025-21490
CVE-2025-30693
CVE-2025-30722
Updated in the yum repository
haproxy
haproxy-2.4.22-3.0.1.al8.1
haproxy-2.8.14-1.0.1.al8.1
CVE-2025-11230
Updated in the yum repository
java-1.8.0-openjdk
java-1.8.0-openjdk-1.8.0.462.b08-2.0.1.1.al8
java-1.8.0-openjdk-1.8.0.472.b08-1.0.1.1.al8
CVE-2025-53057
CVE-2025-53066
Updated in the yum repository
java-17-openjdk
java-17-openjdk-17.0.16.0.8-2.0.1.1.al8
java-17-openjdk-17.0.17.0.10-1.0.2.1.al8
CVE-2025-53057
CVE-2025-53066
Updated in the yum repository
lasso
lasso-2.6.0-13.0.1.al8
lasso-2.6.0-14.0.1.al8
CVE-2025-47151
Updated in the yum repository
libsoup
libsoup-2.62.3-9.0.1.al8
libsoup-2.62.3-10.0.1.al8
CVE-2025-11021
CVE-2025-4945
Updated in the yum repository
libtiff
libtiff-4.4.0-12.0.3.al8
libtiff-4.4.0-15.0.1.al8
CVE-2025-8176
CVE-2025-9900
Updated in the yum repository
mariadb
mariadb-10.5.27-1.0.1.al8
mariadb-10.5.29-2.0.1.al8
CVE-2023-52969
CVE-2023-52970
CVE-2025-21490
CVE-2025-30693
CVE-2025-30722
Updated in the yum repository
mingw-expat
mingw-expat-2.4.8-2.al8
mingw-expat-2.5.0-1.al8
CVE-2025-59375
Updated in the yum repository
mingw-libtiff
mingw-libtiff-4.0.9-2.1.al8
mingw-libtiff-4.0.9-3.al8
CVE-2025-8176
CVE-2025-9900
Updated in the yum repository
osbuild-composer
osbuild-composer-132.2-2.0.1.al8
osbuild-composer-132.2-3.0.1.al8
CVE-2025-27144
Updated in the yum repository
pcs
pcs-0.10.18-2.0.1.1.al8.6
pcs-0.10.18-2.0.1.1.al8.7
CVE-2025-59830
CVE-2025-61770
CVE-2025-61771
CVE-2025-61772
CVE-2025-61919
Updated in the yum repository
python-kdcproxy
python-kdcproxy-0.4-5.3.al8.1
python-kdcproxy-0.4-5.3.al8.2
CVE-2025-59088
CVE-2025-59089
Updated in the yum repository
redis
redis-6.2.19-1.0.1.1.al8
redis-6.2.20-1.0.1.1.al8
CVE-2025-46817
CVE-2025-46818
CVE-2025-46819
CVE-2025-49844
Updated in the yum repository
runc
runc-1.1.12-6.0.1.al8
runc-1.2.5-2.al8
CVE-2025-31133
CVE-2025-52565
CVE-2025-52881
Updated in the yum repository
squid
squid-4.15-13.al8.5
squid-4.15-13.al8.6
CVE-2025-62168
Updated in the yum repository
tigervnc
tigervnc-1.15.0-7.al8
tigervnc-1.15.0-8.al8
CVE-2025-62229
CVE-2025-62230
CVE-2025-62231
Updated in the yum repository
xorg-x11-server
xorg-x11-server-1.20.11-26.0.1.al8
xorg-x11-server-1.20.11-27.0.1.al8
CVE-2025-62229
CVE-2025-62230
CVE-2025-62231
Updated in the yum repository
xorg-x11-server-Xwayland
xorg-x11-server-Xwayland-23.2.7-4.al8
xorg-x11-server-Xwayland-23.2.7-5.al8
CVE-2025-62229
CVE-2025-62230
CVE-2025-62231
Updated in the yum repository
zziplib
zziplib-0.13.71-11.0.1.al8
zziplib-0.13.71-12.0.1.al8
CVE-2018-17828
Updated in the yum repository
Known issues
See the Known issues for Alibaba Cloud Linux 3.2104 U12.1.
Alibaba Cloud Linux (Alinux) 3.2104 U12.1
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux 3.2104 U12.1 | aliyun_3_x64_20G_alibase_20251030.vhd | 2025-11-30 |
|
aliyun_3_x64_20G_dengbao_alibase_20251030.vhd | 2025-11-30 |
| |
aliyun_3_x64_20G_container_optimized_alibase_20251030.vhd | 2025-11-30 |
| |
aliyun_3_arm64_20G_alibase_20251030.vhd | 2025-11-30 |
| |
aliyun_3_arm64_20G_dengbao_alibase_20251030.vhd | 2025-11-30 |
| |
aliyun_3_arm64_20G_container_optimized_alibase_20251030.vhd | 2025-11-30 |
|
Updates
Important updates
This release updates the Kernel to kernel-5.10.134-19.2.al8 and resolves the following issues:
Fixed an issue that incorrectly applied the Zenbleed Vulnerability patch to non-Zen2 architectures during a Microcode hot-upgrade.
Added the
swiotlb_any cmdlineparameter, enabling the system to allocate high-memory addresses as bounce buffers for Confidential Computing scenarios.Fixed an issue where Memory was not correctly accepted during the EFI stub phase when booting a TDX VM.
Fixed a race condition following a PCIe secondary bus reset that allowed a downstream device to be used before its initialization was complete, potentially causing errors or taking the device offline.
Fixed issues in the DWC_PMU driver that caused kernel startup failures on Yitian-based instance models when hardware link anomalies occur.
Fixed a potential crash in the Group Balancer.
Fixed unexpected packet loss that occurred when using
virtio_netwith vhost under certain conditions.
For more information, see https://openanolis.cn/sig/Cloud-Kernel/doc/1388258453605187661
Package updates
New features
Updated Confidential Computing CAI components to support Remote Device Attestation and Hygon CSV. These components are available from the
yumrepository.Updated
trusteetotrustee-1.7.0-1.al8.Updated
trustifluxtotrustiflux-1.4.4-1.al8.Updated
cryptpilottocryptpilot-0.2.7-1.al8.Updated
trusted-network-gatewaytotrusted-network-gateway-2.2.6-1.al8.Released
gocryptfs-2.4.0-2.al8.Updated
tee-primitivestotee-primitives-1.0-2.al8.
System O&M enhancements:
Updated
sysaktosysak-3.8.0-1to enhance System O&M capabilities. This update is available from theyumrepository.
Base OS Enhancements:
Updated
alinux-base-setuptoalinux-release-3.2104.12-2.al8. For security reasons, this update disables therpcbindservice by default. This update is included in the Image.Updated
alinux-releasetoalinux-release-3.2104.12-2.al8, introducing Alibaba Cloud Linux (Alinux) 3.12.1. This update is included in the Image.Updated
NetworkManagertoNetworkManager-1.40.16-19.0.1.1.al8to enableipvlansupport. This update is included in the Image.Updated
systemdtosystemd-239-82.0.4.3.al8.5to support the SystemdNetworkNamespacePathfeature. This update is included in the Image.Updated
logrotatetologrotate-3.14.0-6.0.1.1.al8. This update optimizes memory usage by compressing system logs. This update is included in the Image.Updated
tpm2-tsstotpm2-tss-2.4.6-1.0.2.al8to provide runtime dependencies for Confidential Computing. This update is available from theyumrepository.Updated
tpm2-toolstotpm2-tools-4.1.1-5.0.6.al8to provide runtime dependencies for Confidential Computing. This update is available from theyumrepository.Updated
tenginetotengine-3.1.0-3.al8. This version integrates thenginx-module-vtsPlugin and improves performance on the Yitian Processor. This update is available from theyumrepository.Updated
gcc-toolset-12-gcctogcc-toolset-12-gcc-12.3.0-1.2.al8to provide a newer version of the GCC toolset. This update is available from theyumrepository.Updated
rasdaemontorasdaemon-0.6.7-16.5.al8for RAS diagnostic and self-healing capabilities. This update is available from theyumrepository.Updated
trackertotracker-3.1.2-3.0.1.1.al8, modifying compilation options to disable the SQLite version check. This update is available from theyumrepository.Updated
ostreetoostree-2022.2-11.al8to apply security updates in ContainerOS. This update is available from theyumrepository.
System Tuning Enhancements:
Released
keentunedandkeentune-targetversion 3.2.0. These updates are available from theyumrepository.
Kernel-related component updates:
Updated
smc-toolstosmc-tools-1.8.3-1.0.4.al8. This minor version adds monitoring and packet capture capabilities. This update is available from theyumrepository.Updated
vtoatovtoa-2.1.1-1.al8to provide forward and backward compatibility. This update is available from theyumrepository.Updated
erofs-utilstoerofs-utils-1.8.10-1.al8. This is a bug-fix release and is available from theyumrepository.
Cloud application component updates:
Updated
aliyun-clitoaliyun-cli-3.0.305-1.al8. This update is included in the Image.Updated
ossfstoossfs-1.91.8-1.al8. This version resolves basic functionality issues and is available from theyumrepository.
OS Copilot updates:
Updated
os-copilottoos-copilot-0.9.1-1.al8. This update is available from theyumrepository.
In total, this release updates 11 components synchronized from Anolis OS 8: three in the Image and eight in the
yumrepository.
Component | Previous version | Updated version | Description | Update method |
libsemanage | libsemanage-2.9-10.0.1.al8 | libsemanage-2.9-12.0.1.al8 | Feature Enhancement. Improves storage and rebuild performance in semanage by adding detection conditions to reduce function calls during the reuse phase. This update is forward-compatible. | Updated via the image |
tzdata | tzdata-2024b-1.0.1.2.al8 | tzdata-2025b-1.0.1.1.al8 | Feature Update. Routine time zone data update. | Updated via the image |
linux-firmware | linux-firmware-20241014-125.git06bad2f1.al8 | linux-firmware-20250325-129.git710a336b.al8 | New Feature. Adds support for additional hardware types. | Updated via the image |
gnome-control-center | gnome-control-center-40.0-31.1.al8 | gnome-control-center-40.0-32.1.al8 | New Feature. Adds an API to query device group information. | Updated through the yum repository |
java-1.8.0-openjdk-portable | java-1.8.0-openjdk-portable-1.8.0.432.b06-1.0.2.1.al8 | java-1.8.0-openjdk-portable-1.8.0.462.b08-1.0.1.1.al8 | Feature Update. The component now serves as a build and installation dependency for newer Java components. | Updated through the yum repository |
java-17-openjdk-portable | java-17-openjdk-portable-17.0.13.0.11-1.0.2.1.al8 | java-17-openjdk-portable-17.0.16.0.8-1.0.1.1.al8 | Feature Update. The component now serves as a build and installation dependency for newer Java components. | Updated through the yum repository |
motif | motif-2.3.4-20.al8 | motif-2.3.4-21.al8 | Feature Enhancement. Adds multi-screen support. | Updated through the yum repository |
mysql-selinux | mysql-selinux-1.0.10-1.al8 | mysql-selinux-1.0.13-1.al8 | New Feature. Introduces new features and bug fixes. | Updated through the yum repository |
scap-security-guide | scap-security-guide-0.1.75-1.0.1.al8 | scap-security-guide-0.1.77-1.0.1.al8 | Feature Enhancement. Adds rules for User Namespaces. | Updated through the yum repository |
sos | sos-4.8.1-1.0.1.1.al8 | sos-4.8.2-1.0.1.1.al8 | Feature Enhancement. Adds support for the walrus operator ( | Updated through the yum repository |
tzdata | tzdata-2024b-1.0.1.2.al8 | tzdata-2025b-1.0.1.1.al8 | Feature Update. Routine time zone data update. | Updated via the image |
xorg-x11-drv-libinput | xorg-x11-drv-libinput-1.0.1-3.al8 | xorg-x11-drv-libinput-1.0.1-4.al8 | New Feature. Adds a mapping for specific high keycodes to the FK20–FK23 range. | Updated through the yum repository |
This release includes bug fixes synchronized from Anolis OS 8 and updates a total of 27 components: 12 are updated in the image, and 15 are available through the yum repository. The following list details the updated components and the reason for each update:
Component | Previous version | New version | Description | Update method |
device-mapper-multipath | device-mapper-multipath-0.8.4-41.0.1.al8 | device-mapper-multipath-0.8.4-42.0.1.al8 | Fixed a memory leak in the external NVMe handler. | Updated in the image |
dnf | dnf-4.7.0-20.0.1.1.al8 | dnf-4.7.0-21.0.1.1.al8 | Fixed functional and runtime issues in | Updated in the image |
firewalld | firewalld-0.9.11-9.0.1.al8 | firewalld-0.9.11-10.0.1.al8 | Updated the Ceph port number in the service definition to prevent port conflicts. | Updated in the image |
libdnf | libdnf-0.63.0-20.0.1.2.al8 | libdnf-0.63.0-21.0.1.1.al8 | Fixed an invalid memory access issue. | Updated in the image |
libselinux | libselinux-2.9-9.1.al8 | libselinux-2.9-10.1.al8 | Fixed a null pointer dereference issue. | Updated in the image |
lvm2 | lvm2-2.03.14-14.0.1.al8 | lvm2-2.03.14-15.0.1.al8 | Fixed a thread-blocking issue in the | Updated in the image |
nfs-utils | nfs-utils-2.3.3-59.0.4.al8 | nfs-utils-2.3.3-64.0.1.al8 | Applied patches to fix and improve GSSD authentication, | Updated in the image |
nftables | nftables-1.0.4-4.al8 | nftables-1.0.4-7.al8 | This update optimizes the handling of compatibility expressions (such as | Updated in the image |
openldap | openldap-2.4.46-20.al8 | openldap-2.4.46-21.al8 | Fixed a file descriptor leak on failed LDAP over SSL connections and resolved an error where a file was closed multiple times after an initial TLS connection failure. | Updated in the image |
sssd | sssd-2.9.4-5.al8.1 | sssd-2.9.4-5.al8.2 | Fixed a memory leak in | Updated in the image |
tar | tar-1.30-9.0.2.al8 | tar-1.30-11.0.1.al8 | Fixed a regression introduced by a previous fix for the | Updated in the image |
tuned | tuned-2.22.1-5.0.1.1.al8 | tuned-2.22.1-6.0.1.1.al8 | This update enables lazy loading for the | Updated in the image |
389-ds-base | 389-ds-base-1.4.3.39-9.0.1.al8 | 389-ds-base-1.4.3.39-15.0.1.al8 | Fixed functional issues in the | Updated in the yum repository |
autofs | autofs-5.1.4-114.0.1.al8.1 | autofs-5.1.4-114.0.1.al8.2 | Fixed a deadlock issue. | Updated in the yum repository |
cups-filters | cups-filters-1.20.0-35.0.1.al8 | cups-filters-1.20.0-36.0.1.al8 | Fixed an issue that incorrectly rotated images 90 degrees during printing. | Updated in the yum repository |
curl | curl-7.61.1-35.0.2.al8 | curl-7.61.1-35.0.2.al8.3 | Applied a follow-up fix for | Updated in the yum repository |
haproxy | haproxy-2.4.22-3.0.1.al8 | haproxy-2.4.22-3.0.1.al8.1 | Cleared the retry flag in read and write functions to prevent CPU usage spikes. Fixed an error that prevented certificates from loading from a file. | Updated in the yum repository |
jasper | jasper-2.0.14-5.0.1.al8 | jasper-2.0.14-6.0.1.al8 | Updated settings in the | Updated in the yum repository |
libisoburn | libisoburn-1.5.4-4.al8 | libisoburn-1.5.4-5.al8 | Modified the post-installation script to fix an upgrade error. | Updated in the yum repository |
mod_security_crs | mod_security_crs-3.3.4-3.al8 | mod_security_crs-3.3.4-3.al8.2 | Fixed rules that incorrectly blocked certain city and street names in forms. | Updated in the yum repository |
mutter | mutter-40.9-22.0.1.al8 | mutter-40.9-23.0.1.al8 | Fixed an issue caused by rapidly and repeatedly switching windows. | Updated in the yum repository |
portreserve | portreserve-0.0.5-19.2.al8 | portreserve-0.0.5-20.0.1.al8 | Updated the | Updated in the yum repository |
samba | samba-4.19.4-6.1.al8 | samba-4.19.4-9.1.al8 | Fixed domain controller discovery after Windows | Updated in the yum repository |
squid | squid-4.15-13.al8.3 | squid-4.15-13.al8.5 | Fixed an issue that caused | Updated in the yum repository |
strace | strace-5.18-2.0.4.al8 | strace-5.18-2.1.0.1.al8 | Added support for the Fixed incorrect system call name reporting in Updated | Updated in the yum repository |
traceroute | traceroute-2.1.0-6.2.0.3.al8 | traceroute-2.1.0-9.0.1.al8 | Fixed the polling logic in | Updated in the yum repository |
unzip | unzip-6.0-47.0.1.al8 | unzip-6.0-48.0.1.al8 | Fixed an extraction error affecting certain ZIP files. | Updated in the yum repository |
This update addresses the following 116 CVEs.
Component | Previous version | Updated version | Addressed CVEs |
aide | aide-0.16-102.al8 | aide-0.16-103.al8.2 | CVE-2025-54389 |
bind | bind-9.11.36-16.0.1.al8 | bind-9.11.36-16.0.1.al8.4 | CVE-2024-11187 |
bind-dyndb-ldap | bind-dyndb-ldap-11.6-5.al8 | bind-dyndb-ldap-11.6-6.al8 | CVE-2025-4404 |
bluez | bluez-5.63-3.0.1.al8 | bluez-5.63-5.0.1.al8 | CVE-2023-27349 CVE-2023-51589 |
buildah | buildah-1.33.11-1.al8 | buildah-1.33.12-2.al8 | CVE-2025-22871 CVE-2025-6032 |
bzip2 | bzip2-1.0.6-27.al8 | bzip2-1.0.6-28.al8 | CVE-2019-12900 |
compat-libtiff3 | compat-libtiff3-3.9.4-13.2.al8 | compat-libtiff3-3.9.4-14.0.1.al8 | CVE-2025-9900 |
compat-openssl10 | compat-openssl10-1.0.2o-4.0.1.al8 | compat-openssl10-1.0.2o-4.0.1.al8.1 | CVE-2023-0286 |
containernetworking-plugins | containernetworking-plugins-1.4.0-5.0.1.al8 | containernetworking-plugins-1.4.0-6.0.1.al8 | CVE-2025-22871 CVE-2025-6032 |
corosync | corosync-3.1.8-2.al8 | corosync-3.1.9-2.al8 | CVE-2025-30472 |
cups | cups-2.2.6-62.0.1.al8 | cups-2.2.6-63.0.1.al8 | CVE-2025-58060 |
delve | delve-1.22.1-1.0.2.al8 | delve-1.24.1-1.0.2.al8 | CVE-2025-22871 CVE-2025-4673 |
doxygen | doxygen-1.8.14-12.1.al8 | doxygen-1.8.14-13.al8 | CVE-2020-11023 |
emacs | emacs-27.2-10.0.1.al8 | emacs-27.2-14.0.1.al8.2 | CVE-2024-53920 |
expat | expat-2.2.5-16.al8 | expat-2.2.5-17.al8 | CVE-2024-8176 |
fence-agents | fence-agents-4.10.0-76.0.1.al8.1 | fence-agents-4.10.0-86.0.1.al8.7 | CVE-2025-47273 |
freetype | freetype-2.10.4-9.al8 | freetype-2.10.4-10.al8 | CVE-2025-27363 |
galera | galera-26.4.14-1.al8 | galera-26.4.20-1.al8 | CVE-2023-22084 CVE-2024-21096 |
gcc-toolset-13-gcc | gcc-toolset-13-gcc-13.3.1-2.1.0.1.1.al8 | gcc-toolset-13-gcc-13.3.1-2.2.0.1.1.al8 | CVE-2020-11023 |
gdk-pixbuf2 | gdk-pixbuf2-2.42.6-4.0.1.al8 | gdk-pixbuf2-2.42.6-6.0.1.al8 | CVE-2025-7345 |
ghostscript | ghostscript-9.54.0-18.al8 | ghostscript-9.54.0-19.al8 | CVE-2025-27832 |
gimp | gimp-2.8.22-25.al8 | gimp-2.8.22-26.al8.2 | CVE-2025-48797 CVE-2025-48798 CVE-2025-5473 |
git | git-2.43.5-2.0.1.al8 | git-2.43.7-1.0.1.al8 | CVE-2024-50349 CVE-2024-52006 CVE-2025-27613 CVE-2025-27614 CVE-2025-46835 CVE-2025-48384 CVE-2025-48385 |
git-lfs | git-lfs-3.4.1-3.0.1.al8 | git-lfs-3.4.1-5.0.1.al8 | CVE-2025-22871 |
glib2 | glib2-2.68.4-14.0.2.al8 | glib2-2.68.4-16.0.1.al8.2 | CVE-2024-52533 CVE-2025-4373 |
glibc | glibc-2.32-1.16.al8 | glibc-2.32-1.21.al8 | CVE-2025-0395 CVE-2025-4802 CVE-2025-8058 |
gnome-remote-desktop | gnome-remote-desktop-0.1.8-3.1.al8 | gnome-remote-desktop-0.1.8-4.0.1.al8 | CVE-2025-5024 |
gnutls | gnutls-3.6.16-8.0.2.al8.3 | gnutls-3.6.16-8.0.2.al8.4 | CVE-2025-32988 CVE-2025-32990 CVE-2025-6395 |
go-toolset | go-toolset-1.22.9-1.al8 | go-toolset-1.24.6-1.al8 | CVE-2025-4674 |
golang | golang-1.22.9-1.0.1.al8 | golang-1.24.6-1.0.1.al8 | CVE-2025-4674 |
grafana | grafana-9.2.10-20.0.1.al8 | grafana-9.2.10-25.0.1.al8 | CVE-2025-22871 |
grafana-pcp | grafana-pcp-5.1.1-9.0.1.al8 | grafana-pcp-5.1.1-10.al8 | CVE-2025-22871 |
gstreamer1 | gstreamer1-1.22.1-2.0.1.al8 | gstreamer1-1.22.12-3.0.1.al8 | CVE-2024-0444 CVE-2024-4453 |
gstreamer1-plugins-bad-free | gstreamer1-plugins-bad-free-1.22.1-4.0.1.al8 | gstreamer1-plugins-bad-free-1.16.1-1.1.al8 | N/A |
gstreamer1-plugins-base | gstreamer1-plugins-base-1.22.1-3.0.1.al8 | gstreamer1-plugins-base-1.22.12-4.0.1.al8 | CVE-2024-47541 CVE-2024-47542 CVE-2024-47600 CVE-2024-47835 |
httpd | httpd-2.4.37-65.0.1.al8.2 | httpd-2.4.37-655.0.1.al8.5 | CVE-2024-47252 CVE-2025-23048 CVE-2025-49630 CVE-2025-49812 |
ipa | ipa-4.9.13-14.0.1.1.al8 | ipa-4.9.13-20.0.1.1.al8 | CVE-2025-7493 |
ipa-healthcheck | ipa-healthcheck-0.12-4.al8 | ipa-healthcheck-0.12-6.al8 | CVE-2025-7493 |
jackson-annotations | jackson-annotations-2.14.2-1.al8 | jackson-annotations-2.19.1-1.al8 | CVE-2025-52999 |
jackson-core | jackson-core-2.14.2-1.al8 | jackson-core-2.19.1-1.al8 | CVE-2025-52999 |
jackson-databind | jackson-databind-2.14.2-1.al8 | jackson-databind-2.19.1-1.al8 | CVE-2025-52999 |
jackson-jaxrs-providers | jackson-jaxrs-providers-2.14.2-1.al8 | jackson-jaxrs-providers-2.19.1-1.al8 | CVE-2025-52999 |
java-1.8.0-openjdk | java-1.8.0-openjdk-1.8.0.432.b06-2.0.2.1.al8 | java-1.8.0-openjdk-1.8.0.462.b08-2.0.1.1.al8 | CVE-2025-30749 CVE-2025-30754 CVE-2025-30761 CVE-2025-50106 |
java-17-openjdk | java-17-openjdk-17.0.13.0.11-3.0.2.1.al8 | java-17-openjdk-17.0.16.0.8-2.0.1.1.al8 | CVE-2025-30749 CVE-2025-30754 CVE-2025-50059 CVE-2025-50106 |
jq | jq-1.6-17.al8 | jq-1.6-17.al8.2 | CVE-2024-23337 CVE-2025-48060 |
keepalived | keepalived-2.2.8-3.al8 | keepalived-2.2.8-4.al8 | CVE-2024-41184 |
krb5 | krb5-1.18.2-30.0.1.al8 | krb5-1.18.2-32.0.1.al8 | CVE-2025-3576 |
libarchive | libarchive-3.5.3-4.al8 | libarchive-3.5.3-6.al8 | CVE-2025-5914 |
libblockdev | libblockdev-2.28-6.al8 | libblockdev-2.28-7.al8 | CVE-2025-6019 |
libcap | libcap-2.48-6.0.1.al8 | libcap-2.48-6.0.2.al8 | CVE-2025-1390 |
libpq | libpq-13.11-1.0.1.al8 | libpq-13.20-1.0.1.al8 | CVE-2025-1094 |
libreoffice | libreoffice-7.1.8.1-12.0.2.1.al8.1 | libreoffice-7.1.8.1-15.0.1.1.al8.1 | CVE-2025-1080 |
libsoup | libsoup-2.62.3-6.0.1.al8 | libsoup-2.62.3-9.0.1.al8 | CVE-2025-2784 CVE-2025-4948 CVE-2025-32049 CVE-2025-32914 |
libtasn1 | libtasn1-4.13-4.0.1.al8 | libtasn1-4.13-5.0.1.al8 | CVE-2024-12133 |
libtpms | libtpms-0.9.1-2.20211126git1ff6fe1f43.al8 | libtpms-0.9.1-3.20211126git1ff6fe1f43.al8 | CVE-2025-49133 |
libvirt | libvirt-8.0.0-23.3.0.2.al8 | libvirt-8.0.0-23.4.0.1.al8 | CVE-2025-49133 |
libvpx | libvpx-1.7.0-11.0.1.al8 | libvpx-1.7.0-12.0.1.al8 | CVE-2025-5283 |
libxml2 | libxml2-2.9.7-18.0.3.1.al8 | libxml2-2.9.7-21.0.1.1.al8.3 | CVE-2025-32415 |
libxslt | libxslt-1.1.32-6.1.al8 | libxslt-1.1.32-6.2.0.1.al8 | CVE-2023-40403 |
mariadb | mariadb-10.5.22-1.0.1.al8 | mariadb-10.5.27-1.0.1.al8 | CVE-2023-22084 CVE-2024-21096 |
mecab-ipadic | mecab-ipadic-2.7.0.20070801-16.2.al8 | mecab-ipadic-2.7.0.20070801-17.0.1.al8 | CVE-2024-11053 CVE-2024-21193 CVE-2024-21194 CVE-2024-21196 CVE-2024-21197 CVE-2024-21198 CVE-2024-21199 CVE-2024-21201 CVE-2024-21203 CVE-2024-21212 CVE-2024-21213 CVE-2024-21218 CVE-2024-21219 CVE-2024-21230 CVE-2024-21231 CVE-2024-21236 CVE-2024-21237 CVE-2024-21238 CVE-2024-21239 CVE-2024-21241 CVE-2024-21247 CVE-2024-37371 CVE-2024-5535 CVE-2024-7264 CVE-2025-21490 CVE-2025-21491 CVE-2025-21494 CVE-2025-21497 CVE-2025-21500 CVE-2025-21501 CVE-2025-21503 CVE-2025-21504 CVE-2025-21505 CVE-2025-21518 CVE-2025-21519 CVE-2025-21520 CVE-2025-21521 CVE-2025-21522 CVE-2025-21523 CVE-2025-21525 CVE-2025-21529 CVE-2025-21531 CVE-2025-21534 CVE-2025-21536 CVE-2025-21540 CVE-2025-21543 CVE-2025-21546 CVE-2025-21555 CVE-2025-21559 |
microcode_ctl | microcode_ctl-20240910-1.0.1.al8 | microcode_ctl-20250512-1.0.1.al8 | CVE-2024-28956 CVE-2024-43420 CVE-2024-45332 CVE-2025-20012 CVE-2025-20623 CVE-2025-24495 |
mingw-freetype | mingw-freetype-2.8-3.1.al8 | mingw-freetype-2.8-3.1.al8.1 | CVE-2025-27363 CVE-2025-32050 CVE-2025-32052 CVE-2025-32053 CVE-2025-32906 CVE-2025-32907 CVE-2025-32909 CVE-2025-32910 CVE-2025-32911 CVE-2025-32913 |
mingw-sqlite | mingw-sqlite-3.26.0.0-1.1.al8 | mingw-sqlite-3.26.0.0-2.al8 | CVE-2025-6965 |
mod_auth_openidc | mod_auth_openidc-2.4.9.4-6.al8 | mod_auth_openidc-2.4.9.4-8.al8 | CVE-2025-3891 |
mod_http2 | mod_http2-1.15.7-10.al8.1 | mod_http2-1.15.7-10.al8.4 | CVE-2024-47252 CVE-2025-23048 CVE-2025-49630 CVE-2025-49812 |
mod_security | mod_security-2.9.6-1.al8 | mod_security-2.9.6-2.al8 | CVE-2025-47947 |
mysql | mysql-8.0.36-1.0.1.1.al8 | mysql-8.0.43-1.0.1.1.al8 | CVE-2025-21574 CVE-2025-21575 CVE-2025-21577 CVE-2025-21579 CVE-2025-21580 CVE-2025-21581 CVE-2025-21584 CVE-2025-21585 CVE-2025-30681 CVE-2025-30682 CVE-2025-30683 CVE-2025-30684 CVE-2025-30685 CVE-2025-30687 CVE-2025-30688 CVE-2025-30689 CVE-2025-30693 CVE-2025-30695 CVE-2025-30696 CVE-2025-30699 CVE-2025-30703 CVE-2025-30704 CVE-2025-30705 CVE-2025-30715 CVE-2025-30721 CVE-2025-30722 CVE-2025-50077 CVE-2025-50078 CVE-2025-50079 CVE-2025-50080 CVE-2025-50081 CVE-2025-50082 CVE-2025-50083 CVE-2025-50084 CVE-2025-50085 CVE-2025-50086 CVE-2025-50087 CVE-2025-50088 CVE-2025-50091 CVE-2025-50092 CVE-2025-50093 CVE-2025-50094 CVE-2025-50096 CVE-2025-50097 CVE-2025-50098 CVE-2025-50099 CVE-2025-50100 CVE-2025-50101 CVE-2025-50102 CVE-2025-50104 CVE-2025-53023 |
nodejs | nodejs-20.16.0-1.1.al8 | nodejs-20.19.2-1.1.al8 | CVE-2025-23165 CVE-2025-23166 CVE-2025-23167 |
nodejs-nodemon | nodejs-nodemon-2.0.20-3.al8 | nodejs-nodemon-3.0.1-1.al8 | CVE-2025-22150 CVE-2025-23083 CVE-2025-23085 |
nodejs-packaging | nodejs-packaging-23-3.1.al8 | nodejs-packaging-2021.06-4.al8 | CVE-2025-22150 CVE-2025-23083 CVE-2025-23085 |
open-vm-tools | open-vm-tools-12.3.5-2.al8 | open-vm-tools-12.3.5-2.al8.1 | CVE-2025-41244 |
opendnssec | opendnssec-2.1.7-1.1.al8 | opendnssec-2.1.7-2.al8 | CVE-2025-4404 |
openssh | openssh-8.0p1-25.0.1.1.al8 | openssh-8.0p1-26.0.1.1.al8 | CVE-2025-26465 |
osbuild | osbuild-126-1.0.1.al8 | osbuild-141.2-1.0.1.al8 | CVE-2024-34158 CVE-2024-9355 CVE-2024-1394 |
osbuild-composer | osbuild-composer-118-2.0.1.al8 | osbuild-composer-132.2-2.0.1.al8 | CVE-2025-22871 |
pam | pam-1.3.1-36.al8 | pam-1.3.1-38.al8 | CVE-2025-6020 |
pcs | pcs-0.10.18-2.0.1.1.al8.3 | pcs-0.10.18-2.0.1.1.al8.6 | CVE-2024-49761 |
perl | perl-5.26.3-422.0.1.al8 | perl-5.26.3-423.0.1.al8 | CVE-2025-40909 |
perl-CPAN | perl-CPAN-2.18-397.1.0.2.al8 | perl-CPAN-2.18-402.0.1.al8 | CVE-2020-16156 |
perl-FCGI | perl-FCGI-0.78-11.2.al8 | perl-FCGI-0.78-12.al8 | CVE-2025-40907 |
perl-File-Find-Rule | perl-File-Find-Rule-0.34-8.1.al8 | perl-File-Find-Rule-0.34-9.al8 | CVE-2011-10007 |
perl-JSON-XS | perl-JSON-XS-3.04-3.2.al8 | perl-JSON-XS-3.04-4.al8 | CVE-2025-40928 |
perl-YAML-LibYAML | perl-YAML-LibYAML-0.70-1.1.al8 | perl-YAML-LibYAML-0.70-2.al8 | CVE-2025-40908 |
podman | podman-4.9.4-18.0.1.al8 | podman-4.9.4-23.0.1.al8 | CVE-2025-9566 |
postgresql | postgresql-13.18-1.0.1.al8 | postgresql-13.22-1.0.1.al8 | CVE-2025-8714 CVE-2025-8715 |
python-cryptography | python-cryptography-3.2.1-7.al8 | python-cryptography-3.2.1-8.al8 | CVE-2023-49083 |
python-jinja2 | python-jinja2-2.10.1-3.0.3.al8 | python-jinja2-2.10.1-7.0.1.al8 | CVE-2025-27516 |
python-requests | python-requests-2.20.0-5.al8 | python-requests-2.20.0-6.al8 | CVE-2024-47081 |
python-setuptools | python-setuptools-39.2.0-8.al8.1 | python-setuptools-39.2.0-9.al8 | CVE-2025-47273 |
python3 | python3-3.6.8-69.0.1.1.al8 | python3-3.6.8-71.0.1.1.al8 | CVE-2025-8194 |
python3.11 | python3.11-3.11.11-1.0.1.al8 | python3.11-3.11.13-2.0.1.al8 | CVE-2025-8194 |
python3.11-setuptools | python3.11-setuptools-65.5.1-3.al8 | python3.11-setuptools-65.5.1-4.al8 | CVE-2025-47273 |
qemu-kvm | qemu-kvm-6.2.0-53.0.1.al8.2 | qemu-kvm-6.2.0-53.0.8.al8.4 | CVE-2025-49133 |
redis | redis-6.2.7-1.0.3.al8 | redis-6.2.19-1.0.1.1.al8 | CVE-2025-32023 CVE-2025-48367 |
resource-agents | resource-agents-4.9.0-54.al8.6 | resource-agents-4.9.0-54.al8.16 | CVE-2024-47081 |
rsync | rsync-3.1.3-20.0.1.al8 | rsync-3.1.3-23.0.1.al8 | CVE-2016-9840 |
runc | runc-1.1.12-5.0.1.al8 | runc-1.1.12-6.0.1.al8 | CVE-2025-22869 |
skopeo | skopeo-1.14.5-3.0.1.al8 | skopeo-1.14.5-4.0.1.al8 | CVE-2025-22871 CVE-2025-6032 |
socat | socat-1.7.4.1-1.0.1.al8 | socat-1.7.4.1-2.0.1.al8 | CVE-2024-54661 |
spice-client-win | spice-client-win-8.8-1.al8 | spice-client-win-8.10-1.al8 | CVE-2025-27363 CVE-2025-32050 CVE-2025-32052 CVE-2025-32053 CVE-2025-32906 CVE-2025-32907 CVE-2025-32909 CVE-2025-32910 CVE-2025-32911 CVE-2025-32913 |
sqlite | sqlite-3.26.0-19.al8 | sqlite-3.26.0-20.al8 | CVE-2025-6965 |
sudo | sudo-1.9.5p2-1.0.2.al8 | sudo-1.9.5p2-1.0.2.al8.1 | CVE-2025-32462 |
tbb | tbb-2018.2-9.2.al8 | tbb-2018.2-10.al8.1 | CVE-2020-11023 |
tigervnc | tigervnc-1.13.1-14.al8 | tigervnc-1.15.0-7.al8 | CVE-2025-49175 CVE-2025-49176 CVE-2025-49178 CVE-2025-49179 CVE-2025-49180 |
tomcat | tomcat-9.0.87-1.al8.2 | tomcat-9.0.87-1.al8.6 | CVE-2025-48976 CVE-2025-48988 CVE-2025-48989 CVE-2025-49125 CVE-2025-52434 CVE-2025-52520 CVE-2025-53506 |
udisks2 | udisks2-2.9.0-16.0.1.1.al8 | udisks2-2.9.0-16.0.4.al8.1 | CVE-2025-8067 |
unbound | unbound-1.16.2-7.al8 | unbound-1.16.2-9.al8 | CVE-2025-5994 |
varnish | varnish-6.0.13-1.0.1.1.al8 | varnish-6.0.13-1.1.al8.1 | CVE-2025-47905 |
vim | vim-8.0.1763-19.0.2.al8.5 | vim-8.0.1763-21.0.1.al8 | CVE-2025-53905 CVE-2025-53906 |
webkit2gtk3 | webkit2gtk3-2.46.5-1.0.1.al8 | webkit2gtk3-2.46.6-2.0.1.al8 | CVE-2025-24201 |
xdg-utils | xdg-utils-1.1.3-11.al8 | xdg-utils-1.1.3-13.al8 | CVE-2022-4055 |
xmlrpc-c | xmlrpc-c-1.51.0-10.0.1.al8 | xmlrpc-c-1.51.0-11.0.1.al8 | CVE-2024-8176 |
xorg-x11-server | xorg-x11-server-1.20.11-25.0.1.al8 | xorg-x11-server-1.20.11-26.0.1.al8 | CVE-2025-49175 CVE-2025-49176 CVE-2025-49178 CVE-2025-49179 CVE-2025-49180 |
xorg-x11-server-Xwayland | xorg-x11-server-Xwayland-23.2.7-1.al8 | xorg-x11-server-Xwayland-23.2.7-4.al8 | CVE-2025-49175 CVE-2025-49176 CVE-2025-49178 CVE-2025-49179 CVE-2025-49180 |
yelp | yelp-40.3-2.al8 | yelp-40.3-2.al8.1 | CVE-2025-3155 |
yelp-xsl | yelp-xsl-40.2-1.0.1.al8 | yelp-xsl-40.2-1.0.1.al8.1 | CVE-2025-3155 |
Bug fixes
qemu-kvm Version 6.2.0-53.0.8.al8.4 fixes an issue that prevented SPICE support on the arm64 architecture.
anaconda Version 33.16.7.12-1.0.7.4.al8 changes /etc/timezone from a symbolic link to a regular text file.
cloud-init Version 23.2.2-9.0.1.1.al8 fixes an issue where symbolic links were left behind after uninstallation.
kexec-tools Version 2.0.26-14.0.1.7.al8.2 fixes an issue that prevented Normal memory from being reserved for Node0 on c9i instances.
fuse Version 2.9.7-19.1.al8 fixes an issue where OSS mount points were lost.
gcc-toolset-12 Version 12.0-6.1.al8 fixes an issue where installing the pcp software incorrectly triggered a rebuild into the gcc-toolset-12 directory, impairing functionality.
util-linux Version 2.32.1-46.0.4.1.al8 fixes an "invalid parameter" error when setting the hardware clock.
Known issue
The NetworkManager-wait-online service fails to start on ebmhfr7.48xlarge16 ECS Bare Metal Instances. This issue occurs because the instance has a usb0 interface that NetworkManager does not manage. Resolving this issue requires manual configuration.
Resolution
Create the file /etc/NetworkManager/conf.d/99-unmanaged-device.conf with the following content:
[device-usb0-unmanaged] match-device=interface-name:usb0 managed=0After saving the file, restart the system and verify that the NetworkManager-wait-online service starts correctly.
Alibaba Cloud Linux 3 AI Extension Edition 0.5.4
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux 3 AI Extension ARM Edition 0.5.4 | aliyun_3_0_arm64_20G_alibase_aiext_0.5.4_20251031.vhd | 2025-11-30 |
|
Updates
Important updates
Upgraded the kernel to 5.10.134-19.2.al8.aarch64.
Kernel updates:
Fixed an issue where a microcode hot patch for the Zenbleed vulnerability was incorrectly applied to non-Zen2 architectures.
Added the
swiotlb_anycommand-line parameter. This parameter enables the system to allocate high-memory addresses (> 2 GB) as bounce buffers for Confidential Computing scenarios.Fixed an issue where the EFI stub did not correctly accept memory when booting a TDX VM.
Fixed an issue where a downstream device could be used before its initialization was complete after a PCIe secondary bus reset, which could cause errors or force the device offline.
Fixed issues in the DWC_PMU driver to prevent kernel boot failures on Yitian-based instance models when hardware links are abnormal.
Fixed a potential crash in the Group Balancer.
Fixed an issue that caused unexpected packet loss in virtio_net when used with vhost under specific conditions.
Image updates:
Installed
python3.12-3.12.7-1.al8by default and configured it as the default Python 3 version.Added
keentuned-3.4.1-1.al8to provide Intelligent Tuning for AI workloads.Installed
kmod-fuse-5.10.134~19.2-1.2.5~1.al8by default, which enhances support for thefuse over io_uringmode and increases performance to millions of IOPS and a cache read/write bandwidth of 40 GB/s.
Alibaba Cloud Linux 3 AI Extension Edition 0.5.3
Version | Image ID | Release date | Published content |
Alibaba Cloud Linux 3 AI Extension Edition 0.5.3 | aliyun_3_0_x64_20G_alibase_aiext_0.5.3_20251011.vhd | 2025-10-11 |
|
Updates
Important updates
Kernel
Upgraded the kernel to version
5.10.134-19.103.al8.x86_64.New features
Supports five-level page tables, enabling petabyte-scale memory management. For compatibility reasons, user-mode applications must explicitly specify a high address as a hint during the mmap phase to enable allocation from the five-level page table space.
Introduces the PCIe Resizable BAR feature, which lets you adjust the BAR size of PCIe devices without modifying BIOS settings.
Enables the page table page reclaim feature by default by adding
reclaim_ptto the kernel command line. This feature reclaims page table pages in the MADV_DONTNEED path to save memory and prevent premature out-of-memory (OOM) errors.Hybrid deployment enhancement: This update optimizes the load balancing policy for hybrid deployment scenarios and refactors the absolute preemption policy to ensure that online tasks have absolute priority over offline tasks, preventing offline tasks from preempting the resources of online tasks.
Compatibility
Backports patches for GNR to support UPI.
The kernel kABI remains consistent with previous versions.
cmdline changes:
pci_quirkis enabled by default and can be disabled by addingpci_quirk=disable. Thedrv_quirkis disabled by default and can be enabled by addingdrv_quirk=enable.
Stability improvements
Fixes a checksum error issue in virtio-net that occurred with both large and small packets.
Fixes a use-after-free issue in the group balancer.
Fixes a null pointer dereference issue in the nvme driver during system reboot or shutdown.
Fixes a vhost thread exception issue.
Image
Introduces the
update-grubenvservice, which automatically detects the current boot mode (UEFI or Legacy BIOS) at system startup. This service dynamically updates the/boot/grub2/grubenvconfiguration file to ensure the GRUB environment variable matches the actual boot mode. This service runs automatically at startup by default.Upgraded keentuned to the latest version:
keentuned-3.4.0-1.al8.x86_64.Upgraded kmod-fuse to
kmod-fuse-5.10.134~19.103-1.2.4.5~2.al8.x86_64.Removed
drv_quirk=disableanddrv_link_quirk=disablefrom the kernel command line and addedreclaim_pt.
Security updates
Package name | CVE ID | Updated version |
bind-export-libs | CVE-2024-11187 | 9.11.36-16.0.1.al8.4 |
bzip2 | CVE-2019-12900 | 1.0.6-28.al8 |
bzip2-libs | 1.0.6-28.al8 | |
cups-client | CVE-2025-58060 | 2.2.6-63.0.1.al8 |
cups-libs | 2.2.6-63.0.1.al8 | |
expat | CVE-2024-8176 | 2.2.5-17.al8 |
freetype | CVE-2025-27363 | 2.10.4-10.al8 |
glib2 | CVE-2024-52533 CVE-2025-4373 | 2.68.4-16.0.1.al8.2 |
glibc | CVE-2025-0395 CVE-2025-4802 CVE-2025-8058 | 2.32-1.21.al8 |
glibc-all-langpacks | 2.32-1.21.al8 | |
glibc-common | 2.32-1.21.al8 | |
glibc-devel | 2.32-1.21.al8 | |
glibc-headers-x86 | 2.32-1.21.al8 | |
grub2-common | CVE-2025-0624 | 2.02-165.0.1.al8 |
grub2-efi-x64 | 2.02-165.0.1.al8 | |
grub2-pc | 2.02-165.0.1.al8 | |
grub2-pc-modules | 2.02-165.0.1.al8 | |
grub2-tools | 2.02-165.0.1.al8 | |
grub2-tools-efi | 2.02-165.0.1.al8 | |
grub2-tools-extra | 2.02-165.0.1.al8 | |
grub2-tools-minimal | 2.02-165.0.1.al8 | |
krb5-libs | CVE-2025-3576 | 1.18.2-32.0.1.al8 |
libarchive | CVE-2025-5914 | 3.5.3-6.al8 |
libblockdev | CVE-2025-6019 | 2.28-7.al8 |
libblockdev-crypto | 2.28-7.al8 | |
libblockdev-fs | 2.28-7.al8 | |
libblockdev-loop | 2.28-7.al8 | |
libblockdev-mdraid | 2.28-7.al8 | |
libblockdev-part | 2.28-7.al8 | |
libblockdev-swap | 2.28-7.al8 | |
libblockdev-utils | 2.28-7.al8 | |
libcap | CVE-2025-1390 | 2.48-6.0.2.al8 |
libtasn1 | CVE-2024-12133 | 4.13-5.0.1.al8 |
libudisks2 | CVE-2025-8067 | 2.9.0-16.0.4.al8.1 |
libxml2 | CVE-2025-32415 | 2.9.7-21.0.1.1.al8.3 |
nscd | CVE-2025-0395 CVE-2025-4802 CVE-2025-8058 | 2.32-1.21.al8 |
pam | CVE-2025-6020 CVE-2025-8941 | 1.3.1-38.al8 |
perl-Errno | CVE-2025-40909 | 1.28-423.0.1.al8 |
perl-interpreter | 5.26.3-423.0.1.al8 | |
perl-IO | 1.38-423.0.1.al8 | |
perl-libs | 5.26.3-423.0.1.al8 | |
perl-macros | 5.26.3-423.0.1.al8 | |
platform-python | CVE-2025-8194 | 3.6.8-71.0.1.1.al8 |
platform-python-devel | 3.6.8-71.0.1.1.al8 | |
platform-python-setuptools | CVE-2025-47273 | 39.2.0-9.al8 |
python3-cryptography | CVE-2023-49083 | 3.2.1-8.al8 |
python3-libs | CVE-2025-8194 | 3.6.8-71.0.1.1.al8 |
python3-libxml2 | CVE-2025-32415 | 2.9.7-21.0.1.1.al8.3 |
python3-requests | CVE-2024-47081 | 2.20.0-6.al8 |
python3-setuptools | CVE-2025-47273 | 39.2.0-9.al8 |
python3-setuptools-wheel | 39.2.0-9.al8 | |
python3-unbound | CVE-2025-5994 | 1.16.2-9.al8 |
socat | CVE-2024-54661 | 1.7.4.1-2.0.1.al8 |
sqlite | CVE-2025-6965 | 3.26.0-20.al8 |
sqlite-libs | 3.26.0-20.al8 | |
tuned | CVE-2024-52337 | 2.22.1-5.0.1.1.al8 |
udisks2 | CVE-2025-8067 | 2.9.0-16.0.4.al8.1 |
unbound-libs | CVE-2025-5994 | 1.16.2-9.al8 |
Alibaba Cloud Linux 3 AI Extension Edition 0.5.2
Version | Image ID | Release date | Description |
Alibaba Cloud Linux 3 AI Extension Edition 0.5.2 | aliyun_3_0_x64_20G_alibase_aiext_0.5.2_20250714.vhd | 2025-07-14 |
|
Updates
Major updates
When used with standard community openclip/bevformer AI container images (AC2), Alibaba Cloud Linux 3 AI Extension Edition 0.5.2 provides improved training and inference performance compared to Ubuntu 22.04:
For bevformer_base training, the average throughput per step is 13% higher with FP32 precision and 12% to 18% higher with FP16 precision.
For openclip (RN50), the average throughput per step for training is 26% higher, and the average throughput for inference is 26% higher.
Replacing the community openclip/bevformer AI container images with Alibaba Cloud's optimized versions yields the following performance gains:
For bevformer_base training, the average throughput per step is 22% higher with FP32 precision and 17% to 20% higher with FP16 precision.
For openclip (RN50), the average throughput per step for training is 46% higher, and the average throughput for inference is 26% higher.
The kernel is upgraded to version 5.10.134-19.101.al8.x86_64.
Scheduling
Backported cluster scheduling features.
Added support for configuring BVT for non-movable threads in the root group.
Added support in Core Scheduling for independently configuring special properties for each
cookie.Allows sharing a core with normal tasks that do not have a
cookie.Prevents load balancing from packing tasks with the same
cookie, ensuring they are distributed across different cores.
Memory
Enabled Transparent Huge Pages (THP)-aligned address space allocation for
mmap().Added support for the
memmap_on_memoryfeature invirtio-memfor rapid container memory scaling.Introduced a temporary file optimization feature to improve performance in model training scenarios.
Introduced a smooth reclamation feature for the
pagecache limitto improve memory efficiency and performance in model training scenarios.Introduced a page table page reclamation feature to improve memory efficiency. Enabled by adding
reclaim_ptto thecmdline, this feature is expected to improve performance in model training scenarios.Added a switch to control the delayed release of shmem file pages.
Fixed various issues, including a stability issue in
kfenceand a THP counting issue for large code pages.
Network
Fixed various SMC issues, including
link groupandlink use-after-freeproblems, and resolvedsmc-rdevice lookup failures in container scenarios.
Storage
erofs:
Backported several fixes for the erofs file system from the mainline branch.
Added support for file-backed mounting and a 48-bit layout.
Added support for sub-page blocks for compressed files.
Backported patches from the mainline stable branches for components such as ext4, block, blk-mq, and io_uring.
Introduced the
virtio-blk passthroughfeature for virtio-blk devices.
Drivers
The NVMe driver supports batch processing of completed polled I/O commands.
Added support for differential configuration of NVMe driver parameters for cloud disks and local disks.
Merged PCIe driver bugfix patches to resolve issues such as incorrect space size calculation and root bus allocation.
BPF
Merged bugfix and CVE fix patches from the stable community.
Packages
Provides and installs
python3.12-3.12.7-1.al8.x86_64by default, setting it as the default Python 3 version.Includes
keentuned-3.2.4-2.al8.x86_64to provide intelligent tuning for AI scenarios.
Known issues
The NetworkManager-wait-online service fails to start during the startup of ecs.ebmgn8t.32xlarge instances.
The instance includes a USB network device, which extends the startup time of the NetworkManager service. This causes the NetworkManager-wait-online service to time out and fail. If you do not use the USB network device, you can configure NetworkManager to not manage usb0. To do this, edit the
/etc/NetworkManager/conf.d/99-unmanaged-device.conffile and add the following content:[device-usb0-unmanaged] match-device=interface-name:usb0 managed=0After editing the file, restart the NetworkManager service to apply the changes. NetworkManager will no longer manage the usb0 device. After rebooting the system, the NetworkManager-wait-online service will start normally.
Using
vhost-netmay occasionally cause high CPU usage and network outages. To resolve this issue, install the following hotfix:yum install kernel-hotfix-22577883-5.10.134-19.101 -yWhen an NVMe device encounters a hardware exception, rebooting the system may trigger a null pointer error. To resolve this issue, install the following hotfix:
yum install kernel-hotfix-22584571-5.10.134-19.101 -y
Alibaba Cloud Linux 3.2104 U12
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux (Alinux) 3.2104 U12 | aliyun_3_x64_20G_alibase_20250629.vhd | 2025-06-29 |
|
aliyun_3_x64_20G_dengbao_alibase_20250629.vhd | 2025-06-29 |
| |
aliyun_3_x64_20G_container_optimized_alibase_20250629.vhd | 2025-06-29 |
| |
aliyun_3_arm64_20G_alibase_20250629.vhd | 2025-06-29 |
| |
aliyun_3_arm64_20G_dengbao_alibase_20250629.vhd | 2025-06-29 |
| |
aliyun_3_arm64_20G_container_optimized_alibase_20250629.vhd | 2025-06-29 |
|
Content updates
Security updates
Package name | CVE ID | Updated version |
buildah | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | buildah-1.33.8-4.al8 |
containernetworking-plugins | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | containernetworking-plugins-1.4.0-5.0.1.al8 |
containers-common | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | containers-common-1-82.0.1.al8 |
podman | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | podman-4.9.4-12.0.1.al8 |
python-podman | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | python-podman-4.9.0-2.al8 |
runc | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | runc-1.1.12-4.0.1.al8 |
skopeo | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | skopeo-1.14.5-3.0.1.al8 |
httpd | CVE-2023-27522 | httpd-2.4.37-65.0.1.al8.2 |
git-lfs | CVE-2023-45288 CVE-2023-45289 CVE-2023-45290 CVE-2024-24783 | git-lfs-3.4.1-2.0.1.al8 |
bind | CVE-2024-1975 CVE-2024-1737 | bind-9.11.36-16.0.1.al8 |
python-setuptools | CVE-2024-6345 | python-setuptools-39.2.0-8.al8.1 |
less | CVE-2022-48624 CVE-2024-32487 | less-530-3.0.1.al8 |
java-17-openjdk | CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 | java-17-openjdk-17.0.12.0.7-2.0.2.1.al8 |
java-11-openjdk | CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 | java-11-openjdk-11.0.24.0.8-3.0.2.1.al8 |
postgresql | CVE-2024-7348 | postgresql-13.16-1.0.1.al8 |
flatpak | CVE-2024-42472 | flatpak-1.12.9-3.al8 |
bubblewrap | CVE-2024-42472 | bubblewrap-0.4.0-2.2.al8 |
java-1.8.0-openjdk | CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 | java-1.8.0-openjdk-1.8.0.422.b05-2.0.2.1.al8 |
fence-agents | CVE-2024-6345 | fence-agents-4.10.0-62.0.2.al8.4 |
pcp | CVE-2024-45769 CVE-2024-45770 | pcp-5.3.7-22.0.1.al8 |
delve | CVE-2024-24791 CVE-2024-34155 CVE-2024-34156 CVE-2024-34158 | delve-1.21.2-4.0.1.al8 |
golang | CVE-2024-24791 CVE-2024-34155 CVE-2024-34156 CVE-2024-34158 | golang-1.21.13-2.0.1.al8 |
go-toolset | CVE-2024-24791 CVE-2024-34155 CVE-2024-34156 CVE-2024-34158 | go-toolset-1.21.13-1.al8 |
edk2 | CVE-2023-45236 CVE-2023-45237 CVE-2024-1298 | edk2-20220126gitbb1bba3d77-13.0.1.al8.2 |
curl | CVE-2024-2398 | curl-7.61.1-35.0.2.al8 |
libvpx | CVE-2023-6349 CVE-2024-5197 | libvpx-1.7.0-11.0.1.al8 |
resource-agents | CVE-2024-37891 CVE-2024-6345 | resource-agents-4.9.0-54.al8.4 |
389-ds-base | CVE-2024-5953 | 389-ds-base-1.4.3.39-8.0.1.al8 |
python-urllib3 | CVE-2024-37891 | python-urllib3-1.24.2-8.al8 |
pcs | CVE-2024-41123 CVE-2024-41946 CVE-2024-43398 | pcs-0.10.18-2.0.1.1.al8.2 |
grafana | CVE-2024-24788 CVE-2024-24789 CVE-2024-24790 | grafana-9.2.10-17.0.1.al8 |
libuv | CVE-2024-24806 | libuv-1.42.0-2.al8 |
c-ares | CVE-2024-25629 | c-ares-1.13.0-11.al8 |
xmlrpc-c | CVE-2023-52425 | xmlrpc-c-1.51.0-9.0.1.al8 |
yajl | CVE-2022-24795 CVE-2023-33460 | yajl-2.1.0-13.0.1.al8 |
wpa_supplicant | CVE-2023-52160 | wpa_supplicant-2.10-2.al8 |
cups | CVE-2024-35235 | cups-2.2.6-60.0.1.al8 |
linux-firmware | CVE-2023-31346 | linux-firmware-20240610-122.git90df68d2.al8 |
wget | CVE-2024-38428 | wget-1.19.5-12.0.1.al8 |
poppler | CVE-2024-6239 | poppler-20.11.0-12.0.1.al8 |
krb5 | CVE-2024-37370 CVE-2024-37371 | krb5-1.18.2-29.0.1.al8 |
git-lfs | CVE-2024-34156 | git-lfs-3.4.1-3.0.1.al8 |
libreoffice | CVE-2024-3044 CVE-2024-6472 | libreoffice-7.1.8.1-12.0.2.1.al8.1 |
orc | CVE-2024-40897 | orc-0.4.28-4.al8 |
jose | CVE-2023-50967 CVE-2024-28176 | jose-10-2.3.al8.3 |
openssh | CVE-2020-15778 CVE-2023-48795 CVE-2023-51385 | openssh-8.0p1-25.0.1.1.al8 |
libnbd | CVE-2024-3446 CVE-2024-7383 CVE-2024-7409 | libnbd-1.6.0-6.0.1.al8 |
qemu-kvm | CVE-2024-3446 CVE-2024-7383 CVE-2024-7409 | qemu-kvm-6.2.0-53.0.1.al8 |
libvirt | CVE-2024-3446 CVE-2024-7383 CVE-2024-7409 | libvirt-8.0.0-23.2.0.2.al8 |
osbuild-composer | CVE-2024-34156 | osbuild-composer-101-2.0.1.al8 |
libreswan | CVE-2024-3652 | libreswan-4.12-2.0.2.al8.4 |
mod_auth_openidc | CVE-2024-24814 | mod_auth_openidc-2.4.9.4-6.al8 |
podman | CVE-2023-45290 CVE-2024-24783 CVE-2024-24784 CVE-2024-24788 CVE-2024-24791 | podman-4.9.4-13.0.1.al8 |
ghostscript | CVE-2024-29510 CVE-2024-33869 CVE-2024-33870 | ghostscript-9.54.0-18.al8 |
emacs | CVE-2024-39331 | emacs-27.2-9.0.3.al8 |
dovecot | CVE-2024-23184 CVE-2024-23185 | dovecot-2.3.16-5.0.1.al8 |
expat | CVE-2024-45490 CVE-2024-45491 CVE-2024-45492 | expat-2.2.5-13.0.1.al8 |
glib2 | CVE-2024-34397 | glib2-2.68.4-14.0.2.al8 |
python-idna | CVE-2024-3651 | python-idna-2.5-7.al8 |
openldap | CVE-2023-2953 | openldap-2.4.46-19.al8 |
python-pillow | CVE-2024-28219 | python-pillow-5.1.1-21.al8 |
nghttp2 | CVE-2024-28182 | nghttp2-1.33.0-6.0.1.al8.1 |
python-jinja2 | CVE-2024-34064 | python-jinja2-2.10.1-3.0.3.al8 |
opencryptoki | CVE-2024-0914 | opencryptoki-3.22.0-3.al8 |
gdk-pixbuf2 | CVE-2021-44648 CVE-2021-46829 CVE-2022-48622 | gdk-pixbuf2-2.42.6-4.0.1.al8 |
rear | CVE-2024-23301 | rear-2.6-13.0.1.al8 |
grub2 | CVE-2023-4692 CVE-2023-4693 CVE-2024-1048 | grub2-2.02-150.0.2.al8 |
nss | CVE-2023-5388 CVE-2023-6135 | nss-3.101.0-7.0.1.al8 |
gnutls | CVE-2024-0553 CVE-2024-28834 | gnutls-3.6.16-8.0.1.al8.3 |
python3 | CVE-2024-4032 CVE-2024-6232 CVE-2024-6923 | python3-3.6.8-67.0.1.2.al8 |
grafana | CVE-2024-24791 | grafana-9.2.10-18.0.1.al8 |
cups-filters | CVE-2024-47076 CVE-2024-47175 CVE-2024-47176 CVE-2024-47850 | cups-filters-1.20.0-35.0.1.al8 |
linux-firmware | CVE-2023-20584 CVE-2023-31315 CVE-2023-31356 | linux-firmware-20240827-124.git3cff7109.al8 |
golang | CVE-2024-9355 | golang-1.21.13-3.0.1.al8 |
openssl | CVE-2024-5535 | openssl-1.1.1k-14.0.1.al8 |
nano | CVE-2024-5742 | nano-2.9.8-2.0.1.al8 |
runc | CVE-2023-45290 CVE-2024-34155 CVE-2024-34156 CVE-2024-34158 | runc-1.1.12-5.0.1.al8 |
OpenIPMI | CVE-2024-42934 | OpenIPMI-2.0.32-5.0.1.al8 |
grafana | CVE-2024-47875 CVE-2024-9355 | grafana-9.2.10-20.0.1.al8 |
java-11-openjdk | CVE-2023-48161 CVE-2024-21208 CVE-2024-21210 CVE-2024-21217 CVE-2024-21235 | java-11-openjdk-11.0.25.0.9-2.0.1.1.al8 |
java-1.8.0-openjdk | CVE-2023-48161 CVE-2024-21208 CVE-2024-21210 CVE-2024-21217 CVE-2024-21235 | java-1.8.0-openjdk-1.8.0.432.b06-2.0.2.1.al8 |
java-17-openjdk | CVE-2023-48161 CVE-2024-21208 CVE-2024-21210 CVE-2024-21217 CVE-2024-21235 | java-17-openjdk-17.0.13.0.11-3.0.2.1.al8 |
NetworkManager-libreswan | CVE-2024-9050 | NetworkManager-libreswan-1.2.10-7.0.1.al8 |
ansible-core | CVE-2024-0690 | ansible-core-2.16.3-2.0.1.al8 |
libtiff | CVE-2023-52356 | libtiff-4.4.0-12.0.2.al8 |
krb5 | CVE-2024-3596 | krb5-1.18.2-30.0.1.al8 |
xorg-x11-server | CVE-2024-9632 | xorg-x11-server-1.20.11-25.0.1.al8 |
xmlrpc-c | CVE-2024-45491 | xmlrpc-c-1.51.0-10.0.1.al8 |
bzip2 | CVE-2019-12900 | bzip2-1.0.6-27.al8 |
bcc | CVE-2024-2314 | bcc-0.25.0-9.0.1.al8 |
python3.11 | CVE-2024-6232 | python3.11-3.11.10-1.0.1.al8 |
buildah | CVE-2024-9341 CVE-2024-9407 CVE-2024-9675 | buildah-1.33.10-1.al8 |
podman | CVE-2024-9341 CVE-2024-9407 CVE-2024-9675 | podman-4.9.4-15.0.1.al8 |
libtiff | CVE-2024-7006 | libtiff-4.4.0-12.0.3.al8 |
libsoup | CVE-2024-52530 CVE-2024-52532 | libsoup-2.62.3-6.0.1.al8 |
gtk3 | CVE-2024-6655 | gtk3-3.24.31-5.0.2.1.al8 |
tigervnc | CVE-2024-9632 | tigervnc-1.13.1-14.al8 |
emacs | CVE-2024-30203 CVE-2024-30204 CVE-2024-30205 | emacs-27.2-10.0.1.al8 |
squid | CVE-2024-23638 CVE-2024-45802 | squid-4.15-13.al8.3 |
gnome-shell-extensions | CVE-2024-36472 | gnome-shell-extensions-40.7-19.0.1.al8 |
gnome-shell | CVE-2024-36472 | gnome-shell-40.10-21.al8 |
osbuild-composer | CVE-2024-34156 | osbuild-composer-118-2.0.1.al8 |
expat | CVE-2024-50602 | expat-2.2.5-16.al8 |
iperf3 | CVE-2023-7250 CVE-2024-26306 | iperf3-3.9-13.al8 |
lldpd | CVE-2020-27827 CVE-2021-43612 CVE-2023-41910 | lldpd-1.0.18-4.0.1.al8 |
xorg-x11-server-Xwayland | CVE-2024-31080 CVE-2024-31081 CVE-2024-31083 | xorg-x11-server-Xwayland-23.2.7-1.al8 |
bpftrace | CVE-2024-2313 | bpftrace-0.16.0-8.al8 |
perl-Convert-ASN1 | CVE-2013-7488 | perl-Convert-ASN1-0.27-17.1.0.1.al8 |
podman | CVE-2021-33198 CVE-2021-4024 CVE-2024-9676 | podman-4.9.4-18.0.1.al8 |
grafana-pcp | CVE-2024-9355 | grafana-pcp-5.1.1-9.0.1.al8 |
buildah | CVE-2021-33198 CVE-2021-4024 CVE-2024-9676 | buildah-1.33.11-1.al8 |
python-podman | CVE-2021-33198 CVE-2021-4024 CVE-2024-9676 | python-podman-4.9.0-3.al8 |
golang | CVE-2024-24790 | golang-1.22.7-1.0.2.al8 |
delve | CVE-2024-24790 | delve-1.22.1-1.0.2.al8 |
go-toolset | CVE-2024-24790 | go-toolset-1.22.7-1.al8 |
pam | CVE-2024-10041 CVE-2024-10963 | pam-1.3.1-36.al8 |
perl-App-cpanminus | CVE-2024-45321 | perl-App-cpanminus-1.7044-6.al8 |
postgresql | CVE-2024-10976 CVE-2024-10978 CVE-2024-10979 | postgresql-13.18-1.0.1.al8 |
python3 | CVE-2024-11168 CVE-2024-9287 | python3-3.6.8-69.0.1.1.al8 |
python3.11-cryptography | CVE-2023-49083 | python3.11-cryptography-37.0.2-6.0.1.al8 |
python3.11-setuptools | CVE-2024-6345 | python3.11-setuptools-65.5.1-3.al8 |
python3.11-pip | CVE-2007-4559 | python3.11-pip-22.3.1-5.al8 |
python3.11 | CVE-2024-9287 | python3.11-3.11.11-1.0.1.al8 |
php | CVE-2023-0567 CVE-2023-0568 CVE-2023-3247 CVE-2023-3823 CVE-2023-3824 CVE-2024-2756 CVE-2024-3096 CVE-2024-5458 CVE-2024-8925 CVE-2024-8927 CVE-2024-9026 | php-7.4.33-2.0.1.al8 |
pcs | CVE-2024-21510 | pcs-0.10.18-2.0.1.1.al8.3 |
gstreamer1-plugins-good | CVE-2024-47537 CVE-2024-47539 CVE-2024-47540 CVE-2024-47606 CVE-2024-47613 | gstreamer1-plugins-good-1.16.1-5.al8 |
gstreamer1-plugins-base | CVE-2024-47538 CVE-2024-47607 CVE-2024-47615 | gstreamer1-plugins-base-1.22.1-3.0.1.al8 |
libsndfile | CVE-2024-50612 | libsndfile-1.0.28-16.0.1.al8 |
tuned | CVE-2024-52337 | tuned-2.22.1-5.0.1.1.al8 |
edk2 | CVE-2024-38796 | edk2-20220126gitbb1bba3d77-13.0.1.al8.4 |
bluez | CVE-2023-45866 | bluez-5.63-3.0.1.al8 |
fontforge | CVE-2024-25081 CVE-2024-25082 | fontforge-20200314-6.0.1.al8 |
mpg123 | CVE-2024-10573 | mpg123-1.32.9-1.al8 |
webkit2gtk3 | CVE-2024-23271 CVE-2024-27820 CVE-2024-27838 CVE-2024-27851 CVE-2024-40779 CVE-2024-40780 CVE-2024-40782 CVE-2024-40789 CVE-2024-40866 CVE-2024-44185 CVE-2024-44187 CVE-2024-44244 CVE-2024-44296 CVE-2024-4558 | webkit2gtk3-2.46.3-2.0.1.al8 |
python-requests | CVE-2024-35195 | python-requests-2.20.0-5.al8 |
cups-filters | CVE-2024-47076 CVE-2024-47175 CVE-2024-47176 CVE-2024-47850 | cups-filters-1.20.0-35.0.2.al8 |
openssh | CVE-2020-15778 CVE-2023-48795 CVE-2023-51385 | openssh-8.0p1-25.0.1.2.al8 |
pam | CVE-2024-10041 CVE-2024-10963 | pam-1.3.1-36.1.al8 |
webkit2gtk3 | CVE-2024-23271 CVE-2024-27820 CVE-2024-27838 CVE-2024-27851 CVE-2024-40779 CVE-2024-40780 CVE-2024-40782 CVE-2024-40789 CVE-2024-40866 CVE-2024-44185 CVE-2024-44187 CVE-2024-44244 CVE-2024-44296 CVE-2024-44309 CVE-2024-4558 | webkit2gtk3-2.46.5-1.0.1.al8 |
dpdk | CVE-2024-11614 | dpdk-23.11-2.al8 |
cups | CVE-2024-47175 | cups-2.2.6-62.0.1.al8 |
iperf3 | CVE-2024-53580 | iperf3-3.9-13.al8.1 |
cups | CVE-2024-47175 | cups-2.2.6-62.0.2.al8 |
NetworkManager | CVE-2024-3661 | NetworkManager-1.40.16-18.0.1.al8 |
raptor2 | CVE-2024-57823 | raptor2-2.0.15-17.0.1.al8 |
rsync | CVE-2024-12085 | rsync-3.1.3-20.0.1.al8 |
fence-agents | CVE-2024-56201 CVE-2024-56326 | fence-agents-4.10.0-76.0.1.al8.4 |
glibc | CVE-2022-23218 CVE-2022-23219 | glibc-2.32-1.19.al8 |
glibc | CVE-2024-33602 CVE-2024-33601 CVE-2024-33600 CVE-2024-33599 | glibc-2.32-1.20.al8 |
grafana | CVE-2025-21613 CVE-2025-21614 | grafana-9.2.10-21.0.1.al8 |
redis | CVE-2022-24834 CVE-2022-35977 CVE-2022-36021 CVE-2023-22458 CVE-2023-25155 CVE-2023-28856 CVE-2023-45145 CVE-2024-31228 CVE-2024-31449 CVE-2024-46981 | redis-6.2.17-1.0.1.1.al8 |
python-jinja2 | CVE-2024-56326 | python-jinja2-2.10.1-3.0.4.al8 |
bzip2 | CVE-2019-12900 | bzip2-1.0.6-28.al8 |
libsoup | CVE-2024-52531 | libsoup-2.62.3-7.0.1.al8 |
git-lfs | CVE-2024-53263 | git-lfs-3.4.1-4.0.1.al8 |
keepalived | CVE-2024-41184 | keepalived-2.2.8-4.al8 |
unbound | CVE-2024-1488 CVE-2024-8508 | unbound-1.16.2-8.al8 |
java-17-openjdk | CVE-2025-21502 | java-17-openjdk-17.0.14.0.7-3.0.1.1.al8 |
galera | CVE-2023-22084 CVE-2024-21096 | galera-26.4.20-1.al8 |
mariadb | CVE-2023-22084 CVE-2024-21096 | mariadb-10.5.27-1.0.1.al8 |
doxygen | CVE-2020-11023 | doxygen-1.8.14-13.al8 |
tbb | CVE-2020-11023 | tbb-2018.2-10.al8.1 |
gcc-toolset-13-gcc | CVE-2020-11023 | gcc-toolset-13-gcc-13.3.1-2.2.0.1.1.al8 |
nodejs | CVE-2025-22150 CVE-2025-23083 CVE-2025-23085 | nodejs-20.18.2-1.1.al8 |
nodejs-packaging | CVE-2025-22150 CVE-2025-23083 CVE-2025-23085 | nodejs-packaging-2021.06-4.al8 |
nodejs-nodemon | CVE-2025-22150 CVE-2025-23083 CVE-2025-23085 | nodejs-nodemon-3.0.1-1.al8 |
podman | CVE-2024-11218 | podman-4.9.4-19.0.1.al8 |
buildah | CVE-2024-11218 | buildah-1.33.12-1.al8 |
libcap | CVE-2025-1390 | libcap-2.48-6.0.2.al8 |
libxml2 | CVE-2022-49043 | libxml2-2.9.7-18.0.4.1.al8 |
bind | CVE-2024-11187 | bind-9.11.36-16.0.1.al8.4 |
postgresql | CVE-2025-1094 | postgresql-13.20-1.0.1.al8 |
libpq | CVE-2025-1094 | libpq-13.20-1.0.1.al8 |
mecab-ipadic | CVE-2024-11053 CVE-2024-21193 CVE-2024-21194 CVE-2024-21196 CVE-2024-21197 CVE-2024-21198 CVE-2024-21199 CVE-2024-21201 CVE-2024-21203 CVE-2024-21212 CVE-2024-21213 CVE-2024-21218 CVE-2024-21219 CVE-2024-21230 CVE-2024-21231 CVE-2024-21236 CVE-2024-21237 CVE-2024-21238 CVE-2024-21239 CVE-2024-21241 CVE-2024-21247 CVE-2024-37371 CVE-2024-5535 CVE-2024-7264 CVE-2025-21490 CVE-2025-21491 CVE-2025-21494 CVE-2025-21497 CVE-2025-21500 CVE-2025-21501 CVE-2025-21503 CVE-2025-21504 CVE-2025-21505 CVE-2025-21518 CVE-2025-21519 CVE-2025-21520 CVE-2025-21521 CVE-2025-21522 CVE-2025-21523 CVE-2025-21525 CVE-2025-21529 CVE-2025-21531 CVE-2025-21534 CVE-2025-21536 CVE-2025-21540 CVE-2025-21543 CVE-2025-21546 CVE-2025-21555 CVE-2025-21559 | mecab-ipadic-2.7.0.20070801-17.0.1.al8 |
mysql | CVE-2024-11053 CVE-2024-21193 CVE-2024-21194 CVE-2024-21196 CVE-2024-21197 CVE-2024-21198 CVE-2024-21199 CVE-2024-21201 CVE-2024-21203 CVE-2024-21212 CVE-2024-21213 CVE-2024-21218 CVE-2024-21219 CVE-2024-21230 CVE-2024-21231 CVE-2024-21236 CVE-2024-21237 CVE-2024-21238 CVE-2024-21239 CVE-2024-21241 CVE-2024-21247 CVE-2024-37371 CVE-2024-5535 CVE-2024-7264 CVE-2025-21490 CVE-2025-21491 CVE-2025-21494 CVE-2025-21497 CVE-2025-21500 CVE-2025-21501 CVE-2025-21503 CVE-2025-21504 CVE-2025-21505 CVE-2025-21520 CVE-2025-21521 CVE-2025-21522 CVE-2025-21523 CVE-2025-21525 CVE-2025-21529 CVE-2025-21531 CVE-2025-21534 CVE-2025-21536 CVE-2025-21540 CVE-2025-21543 CVE-2025-21546 CVE-2025-21555 CVE-2025-21559 | mysql-8.0.41-1.0.1.1.al8 |
emacs | CVE-2025-1244 | emacs-27.2-11.0.1.al8.1 |
webkit2gtk3 | CVE-2024-54543 CVE-2025-24143 CVE-2025-24150 CVE-2025-24158 CVE-2025-24162 | webkit2gtk3-2.46.6-1.0.1.al8 |
tigervnc | CVE-2025-26594 CVE-2025-26595 CVE-2025-26596 CVE-2025-26597 CVE-2025-26598 CVE-2025-26599 CVE-2025-26600 CVE-2025-26601 | tigervnc-1.13.1-15.al8 |
rsync | CVE-2024-12087 CVE-2024-12088 CVE-2024-12747 | rsync-3.1.3-21.0.1.al8 |
libxml2 | CVE-2024-56171 CVE-2025-24928 | libxml2-2.9.7-19.0.1.1.al8 |
krb5 | CVE-2025-24528 | krb5-1.18.2-31.0.1.al8 |
pcs | CVE-2024-52804 | pcs-0.10.18-2.0.1.1.al8.4 |
webkit2gtk3 | CVE-2025-24201 | webkit2gtk3-2.46.6-2.0.1.al8 |
fence-agents | CVE-2025-27516 | fence-agents-4.10.0-76.0.1.al8.6 |
podman | CVE-2025-22869 | podman-4.9.4-20.0.1.al8 |
runc | CVE-2025-22869 | runc-1.1.12-6.0.1.al8 |
grub2 | CVE-2025-0624 | grub2-2.02-150.0.3.al8 |
libreoffice | CVE-2025-1080 | libreoffice-7.1.8.1-15.0.1.1.al8.1 |
freetype | CVE-2025-27363 | freetype-2.10.4-10.al8 |
python-jinja2 | CVE-2025-27516 | python-jinja2-2.10.1-7.0.1.al8 |
libxslt | CVE-2024-55549 CVE-2025-24855 | libxslt-1.1.32-6.1.0.1.al8 |
tomcat | CVE-2024-50379 CVE-2025-24813 | tomcat-9.0.87-1.al8.3 |
expat | CVE-2024-8176 | expat-2.2.5-17.al8 |
mod_auth_openidc | CVE-2025-31492 | mod_auth_openidc-2.4.9.4-7.al8 |
xmlrpc-c | CVE-2024-8176 | xmlrpc-c-1.51.0-11.0.1.al8 |
libtasn1 | CVE-2024-12133 | libtasn1-4.13-5.0.1.al8 |
bluez | CVE-2023-27349 CVE-2023-51589 | bluez-5.63-5.0.1.al8 |
Package updates
New features
This release introduces Confidential AI, which uses Confidential Computing to provide enhanced data security for AI model training and inference.
Adds support for PCIe error injection through
ras-tools.Adds 26 new external device drivers to expand hardware compatibility. These drivers are not installed by default.
kmod-ast-5.10.134~19-1.14.4~1.al8.src.rpmkmod-bnxt-5.10.134~19-1.10.3_231.0.162.0~2.al8.src.rpmkmod-fic2-5.10.134~19-1.2.6~1.al8.src.rpmkmod-hinic-5.10.134~19-1.0~1.al8.src.rpmkmod-hns3-5.10.134~19-1.0~1.al8.src.rpmkmod-i40e-5.10.134~19-2.23.17~1.al8.src.rpmkmod-iavf-5.10.134~19-4.9.4~1.al8.src.rpmkmod-ice-5.10.134~19-1.12.13.4~2.al8.src.rpmkmod-igb-5.10.134~19-5.14.16~1.al8.src.rpmkmod-intel-QAT20-5.10.134~19-L.0.9.4__00004~1.al8.src.rpmkmod-irdma-5.10.134~19-1.13.43~1.al8.src.rpmkmod-ixgbe-5.10.134~19-5.19.6~1.al8.src.rpmkmod-ixgbevf-5.10.134~19-4.18.7~1.al8.src.rpmkmod-ixgbevf-5.10.134~19-4.18.7~1.al8.src.rpmkmod-kvdo-6.2.8.7-94.0.1.al8.src.rpmkmod-lpfc-5.10.134~19-14.2.673.37~1.al8.src.rpmkmod-mellanox-5.10.134~19-23.10~2.al8.src.rpmkmod-mpi3mr-5.10.134~19-8.11.1.0.0~1.al8.src.rpmkmod-mpt3sas-5.10.134~19-47.00.00.00~1.al8.src.rpmkmod-ngbevf-5.10.134~19-1.2.2~2.al8.src.rpmkmod-ps3stor-5.10.134~19-2.3.1.24~1.al8.src.rpmkmod-ps3stor-5.10.134~19-2.3.1.24~1.al8.src.rpmkmod-qla2xxx-5.10.134~19-10.02.09.00_k~1.al8.src.rpmkmod-sfc-5.10.134~19-5.3.16.1004~2.al8.src.rpmkmod-smartpqi-5.10.134~19-2.1.22_040~1.al8.src.rpmkmod-sxe-5.10.134~19-1.3.1.1~1.al8.src.rpmkmod-txgbevf-5.10.134~19-1.3.1~2.al8.src.rpmkmod-xscale-5.10.134~19-1.2.0_367~2.al8.src.rpm
Important updates
Kernel
The Kernel has been updated to version kernel-5.10.134-19.1.al8.
Scheduling
Merged the cluster scheduling feature.
Adds support for configuring BVT for non-migratable threads in the root cgroup.
Core sched now supports independent configuration of special properties for each cookie.
Cores can now be shared with regular Tasks that do not have a cookie.
Prevents Load Balancing from automatically grouping Tasks with the same cookie, ensuring they are distributed across different cores.
Memory
Fixed stability issues in
kfence.Fixed a Transparent Huge Page (THP) accounting issue.
mmap()now supports THP-aligned address space allocation.virtio-memnow supports thememmap_on_memoryfeature, which enables fast memory scaling (scale-out and scale-in) for containers.Merged several memory-related CVE patches.
Network
Fixed
link groupandlink use-after-freeissues.Fixed an
smc-rdevice lookup failure in container environments.
Storage
erofs
Merged several upstream fixes for the erofs file system.
Adds support for file-backed mounting and a 48-bit layout.
Adds sub-page block support for compressed files.
Merged upstream stable branch patches for components including ext4, block, blk-mq, and io_uring.
Added the
virtio-blk passthroughfeature, which provides passthrough capabilities for virtio-blk devices.Added a generic Character Device, named
/dev/vdXc0, for each virtio-blk Block Device. This allows users to send read/write commands directly to the virtio-blk driver layer by using theuring_cmdmethod provided by the io_uring framework.Adds support for bidirectional commands for virtio-blk devices. In a single vectored read/write operation on the same base sector address, you can specify the number of both write and read buffers. This allows a single I/O command to complete both a write and a subsequent read operation. Currently, only the write-then-read sequence is supported.
Introduced a virtio_ring extension for virtio-blk called 'ring_pair'. In this model, each hardware request queue for a virtio-blk device maps to two virtio_ring queues: a Submission Queue (SQ) and a Completion Queue (CQ). After a request is submitted, the driver can proactively reclaim the slots occupied by the submitted I/O command to issue new requests. When the I/O operation is complete, the backend populates the CQ, and the driver harvests the completions. This feature requires backend support for the 'ring_pair' mode and currently only supports the
vring split_queue+Indirect descriptormode.
Drivers
The NVMe driver now supports batch completion handling for polled I/O commands.
Fixed multiple issues in the HiSilicon SAS driver for SCSI and in libsas.
Merged PCIe driver bugfix patches, addressing issues such as incorrect space size calculation and root bus assignment.
BPF
Merged bugfix and CVE patches from the stable community.
Architecture
Includes CVE-related fixes for the x86 architecture.
Bug fixes
Updated
alinux-base-setuptoalinux-base-setup-3.2-8.al8to fix an issue whereKdumpfailed to generate dumps andgrubbyparameters had no effect on the ARM architecture.Updated
gdmtogdm-40.0-27.0.1.1.al8to fix an issue where the desktop failed to wake up after the screen was locked.Updated
alinux-releasetoalinux-release-3.2104.12-1.al8to update the End-User License Agreement (EULA) file for Alibaba Cloud Linux (Alinux).Updated
dumptodump-0.4-0.36.b46.3.al8to fix an issue where therestorecommand failed after an incremental backup withdump.Updated
maventomaven-3.6.2-9.1.al8to fix an issue where themvncommand could not be used immediately after installation on Alibaba Cloud Linux (Alinux) 3.Updated
grub2togrub2-2.02-165.0.2.al8to fix an issue wheregrub2reported errors intdxscenarios on Alibaba Cloud Linux (Alinux) 3.
Known issue
The virtio-blk passthrough feature introduces a generic character device for virtio-blk devices, which can cause detection issues in some user-space components.
For a device such as /dev/vda, partitions start at 1. Therefore, /dev/vdac0 represents the character device for /dev/vda and is distinct from /dev/vdac. Additionally, the file type of /dev/vdac0 is a character device rather than a block device. If you do not need this character channel, you can upgrade the kernel to kernel-5.10.134-19.1.al8 or later to prevent this interface from being exposed for virtio-blk Cloud Disks.
Alibaba Cloud Linux (Alinux) 3.2104 U11.1
Version | Image id | Release date | Updates |
Alibaba Cloud Linux (Alinux) 3.2104 U11.1 | aliyun_3_x64_20G_alibase_20250117.vhd | 2025-01-17 |
|
aliyun_3_x64_20G_dengbao_alibase_20250117.vhd | 2025-01-17 |
| |
aliyun_3_arm64_20G_alibase_20250117.vhd | 2025-01-17 |
| |
aliyun_3_arm64_20G_dengbao_alibase_20250117.vhd | 2025-01-17 |
| |
aliyun_3_x64_20G_container_optimized_20250117.vhd | 2025-01-17 |
|
Updates
Security Updates
Package name | CVE id |
python-requests | CVE-2024-35195 |
cups | CVE-2024-47175 |
NetworkManager | CVE-2024-3661 |
Image
The
loadmodulesservice is enabled by default.The
timedatexservice is enabled by default.
2024
Alibaba Cloud Linux 3.2104 U11
Version | Image ID | Release date | Release highlights |
Alibaba Cloud Linux 3.2104 U11 | aliyun_3_x64_20G_alibase_20241218.vhd | 2024-12-18 |
|
aliyun_3_x64_20G_dengbao_alibase_20241218.vhd | 2024-12-18 |
| |
aliyun_3_arm64_20G_alibase_20241218.vhd | 2024-12-18 |
| |
aliyun_3_arm64_20G_dengbao_alibase_20241218.vhd | 2024-12-18 |
| |
aliyun_3_x64_20G_container_optimized_20241226.vhd | 2024-12-26 |
|
Updates
Security updates
Package name | CVE ID | Version |
grafana | CVE-2024-47875 CVE-2024-9355 | grafana-9.2.10-20.0.1.al8 |
java-11-openjdk | CVE-2023-48161 CVE-2024-21208 CVE-2024-21210 CVE-2024-21217 CVE-2024-21235 | java-11-openjdk-11.0.25.0.9-2.0.1.1.al8 |
java-1.8.0-openjdk | CVE-2023-48161 CVE-2024-21208 CVE-2024-21210 CVE-2024-21217 CVE-2024-21235 | java-1.8.0-openjdk-1.8.0.432.b06-2.0.2.1.al8 |
java-17-openjdk | CVE-2023-48161 CVE-2024-21208 CVE-2024-21210 CVE-2024-21217 CVE-2024-21235 | java-17-openjdk-17.0.13.0.11-3.0.2.1.al8 |
NetworkManager-libreswan | CVE-2024-9050 | NetworkManager-libreswan-1.2.10-7.0.1.al8 |
ansible-core | CVE-2024-0690 | ansible-core-2.16.3-2.0.1.al8 |
krb5 | CVE-2024-3596 | krb5-1.18.2-30.0.1.al8 |
xorg-x11-server | CVE-2024-9632 | xorg-x11-server-1.20.11-25.0.1.al8 |
xmlrpc-c | CVE-2024-45491 | xmlrpc-c-1.51.0-10.0.1.al8 |
bzip2 | CVE-2019-12900 | bzip2-1.0.6-27.al8 |
bcc | CVE-2024-2314 | bcc-0.25.0-9.0.1.al8 |
buildah | CVE-2024-9341 CVE-2024-9407 CVE-2024-9675 | buildah-1.33.10-1.al8 |
libtiff | CVE-2024-7006 | libtiff-4.4.0-12.0.3.al8 |
libsoup | CVE-2024-52530 CVE-2024-52532 | libsoup-2.62.3-6.0.1.al8 |
gtk3 | CVE-2024-6655 | gtk3-3.24.31-5.0.2.1.al8 |
tigervnc | CVE-2024-9632 | tigervnc-1.13.1-14.al8 |
emacs | CVE-2024-30203 CVE-2024-30204 CVE-2024-30205 | emacs-27.2-10.0.1.al8 |
squid | CVE-2024-23638 CVE-2024-45802 | squid-4.15-13.al8.3 |
gnome-shell-extensions | CVE-2024-36472 | gnome-shell-extensions-40.7-19.0.1.al8 |
gnome-shell | CVE-2024-36472 | gnome-shell-40.10-21.al8 |
osbuild-composer | CVE-2024-34156 | osbuild-composer-118-2.0.1.al8 |
expat | CVE-2024-50602 | expat-2.2.5-16.al8 |
iperf3 | CVE-2023-7250 CVE-2024-26306 | iperf3-3.9-13.al8 |
lldpd | CVE-2020-27827 CVE-2021-43612 CVE-2023-41910 | lldpd-1.0.18-4.0.1.al8 |
xorg-x11-server-Xwayland | CVE-2024-31080 CVE-2024-31081 CVE-2024-31083 | xorg-x11-server-Xwayland-23.2.7-1.al8 |
bpftrace | CVE-2024-2313 | bpftrace-0.16.0-8.al8 |
perl-Convert-ASN1 | CVE-2013-7488 | perl-Convert-ASN1-0.27-17.1.0.1.al8 |
podman | CVE-2021-33198 CVE-2021-4024 CVE-2024-9676 | podman-4.9.4-18.0.1.al8 |
grafana-pcp | CVE-2024-9355 | grafana-pcp-5.1.1-9.0.1.al8 |
buildah | CVE-2021-33198 CVE-2021-4024 CVE-2024-9676 | buildah-1.33.11-1.al8 |
python-podman | CVE-2021-33198 CVE-2021-4024 CVE-2024-9676 | python-podman-4.9.0-3.al8 |
golang | CVE-2024-24790 | golang-1.22.7-1.0.2.al8 |
delve | CVE-2024-24790 | delve-1.22.1-1.0.2.al8 |
go-toolset | CVE-2024-24790 | go-toolset-1.22.7-1.al8 |
pam | CVE-2024-10041 CVE-2024-10963 | pam-1.3.1-36.al8 |
perl-App-cpanminus | CVE-2024-45321 | perl-App-cpanminus-1.7044-6.al8 |
postgresql | CVE-2024-10976 CVE-2024-10978 CVE-2024-10979 | postgresql-13.18-1.0.1.al8 |
python3 | CVE-2024-11168 CVE-2024-9287 | python3-3.6.8-69.0.1.1.al8 |
python3.11-cryptography | CVE-2023-49083 | python3.11-cryptography-37.0.2-6.0.1.al8 |
python3.11-setuptools | CVE-2024-6345 | python3.11-setuptools-65.5.1-3.al8 |
python3.11-pip | CVE-2007-4559 | python3.11-pip-22.3.1-5.al8 |
python3.11 | CVE-2024-9287 | python3.11-3.11.11-1.0.1.al8 |
php | CVE-2023-0567 CVE-2023-0568 CVE-2023-3247 CVE-2023-3823 CVE-2023-3824 CVE-2024-2756 CVE-2024-3096 CVE-2024-5458 CVE-2024-8925 CVE-2024-8927 CVE-2024-9026 | php-7.4.33-2.0.1.al8 |
pcs | CVE-2024-21510 | pcs-0.10.18-2.0.1.1.al8.3 |
Package updates
New features
Support for confidential computing on AMD and NVIDIA GPUs.
Optimized the performance of the
lscpucommand on large-scalepciedevices by usingutil-linux-2.32.1-46.0.3.al8.Implemented container storage by using
erofs-utils-1.8.2-1.al8.Updated
java-11-alibaba-dragonwell-11.0.24.21.21-1.1.al8to optimize the BigDecimal class for better performance in big data scenarios.Updated
java-21-alibaba-dragonwell-21.0.4.0.4-1.1.al8to improve Java performance.Added the
system-rpm-config-129-1.0.2.1.al8component to provide system macro variable configurations.
Important updates
Kernel
The kernel is updated to 5.10.134-18.al8.
New hardware support
Official support for the Intel GNR platform.
Official support for the AMD Turin platform.
Scheduling
Added support for
cpu slioncgroup v2, which includes container-level data such ascpuusageandloadavg.Memory
Fixed multiple memory-related issues and backported memory
bugfixesfrom multiplekernel-5.10 stablebranches.The
pgtable_sharefeature is disabled by default.Added support for the
direct collapsemode for huge pages in the code segment to quickly consolidate huge pages upon apage fault.Backported the
percpu chunkrelease optimization patch set to preventchunkrelease failures caused bypercpufragmentation.
Network
Optimized the RSS logic of
virtio_netto align the RSS configuration with the device and ensure correct updates as the number of queues changes.Added support for 200 G and 400 G rates for the bond 3ad mode.
Storage
io_uring
Fixed a
racecondition that occurs whenpercpu sqthreadare created concurrently.Checked the validity of the CPU configured for enabling
percpu sqthread.Backported patches from the community
stablebranch to improve code quality.
fuse/virtio-fs
Added support for
resend pendingrequests.Added support for multiple queues to optimize
fuseperformance.Optimized read/write separation to prevent a large number of write requests from blocking read requests.
Added support for the
failoverfeature, which allows afuse daemonto reconnect to the originalfuse connectionby performing anattachoperation after an exception is rectified and resend requests to complete fault recovery.Added support for 4 MB write alignment to optimize performance.
Fixed an
IO hangissue that occurs whenvirtio-fsloads a module that is larger than 4 MB.Added
tagandqueue mapping sysfsinterfaces tovirtio-fs.Backported patches from the community
stablebranch to improve code quality.
erofs
Fixed the UUID issue in
erofs_statfs()and optimized the DEFLATE stream allocation logic.Backported patches from the community
stablebranch to improve code quality.
ext4
Optimized the cleanup logic for EXT4_GROUP_INFO_WAS_TRIMMED_BIT.
Backported patches from the community
stablebranch to improve code quality.
xfs
Optimized the
reflinkperformance jitter caused by a potential blockage of tens of milliseconds inxfs_log_force().Fixed a compilation error caused by disabling CONFIG_FS_DAX.
Correctly checked
i_blockswhen the atomic write feature is enabled.
block
Fixed an
IO hangissue that occurs on themq-deadlinescheduler in a multi-hardware queue device.Fixed an issue where the
blockthrottling did not work as expected because a negative value was generated when thebpsthrottling was calculated during the update of the block throttling configuration.Removed the
blk-mq "running from the wrong CPU"alert.Backported patches from the community
stablebranch to improve code quality.
misc
Backported patches from the community
stablebranch for modules such asvfs,quota,overlayfs,nfs,cifs,ceph,dm/md,null_blk,nbd,loop, andvirtio-blkto improve code quality.
Drivers
Backported
watchdogdriver-related fixes fromkernel-5.10 LTSto improve stability.The NVMe driver supports the latest activation solution for Alibaba Cloud disks.
Backported NVMe driver-related fixes from
kernel-5.10 LTSto improve stability.Backported SCSI-related fixes from
kernel-5.10 LTSto improve stability.Backported ATA-related fixes from
kernel-5.10 LTSto improve stability.Introduced the
sig_enforce_subsysparameter to support mandatory verification of module signatures in theblock,net, and GPU fields.Incorporated a large number of patches for fixing
txgbeandtxgbevfinto the network card driver to improve code quality and stability.
Perf
Fixed a pointer memory leak issue in the
perftool caused by backporting patches from thestablebranch to resolve acoredumpfailure.BPF
Added support for atomic operations in Berkeley Packet Filter (BPF) programs.
Backported community
stableandbugfixpatches.
Architecture x86
Added support for C-states on the Intel GNR platform.
Added support for P-states on the EMR and GNR platforms.
Updated
intel-speed-selecttov1.20to support new platforms.Added support for passing through the PEBS feature to virtual machines.
Applied
x86bugfixfor ACPI, APIC, power consumption, and PMU to other architectures or systems.Upgraded
turbostateto2023.11.07to support more features.Added support for SPR and EMR CXL PMON.
Added support for AMD c2c.
Added support for AMD HSMP.
Added AMD IBRS enhancements.
Added support for AMD ABMC.
Bug fixes
Packages
Fixed an issue where a pod unexpectedly exits and a deployment fails because a non-
device cgroupsubgroup is reclaimed bysystemdwithin 20 seconds whenDelegate=yesis set by usingsystemd-239-82.0.3.4.al8.2.Fixed a memory leak issue by using
ledmon-0.97-1.0.2.al8.Improved data access efficiency on the Yitian platform by using
tuned-2.22.1-5.0.1.1.al8.Fixed an issue where some components failed to be installed on the
mirror.
Images
Modified the
crashkernelvalue of thex86image to resolve an issue wherevmcorecannot be generated.Changed the default parameter in
/sys/kernel/mm/transparent_hugepage/defragtodeferto improve the memory reclamation speed in transparent huge page scenarios.
Alibaba Cloud Linux 3.2104 U10.1
Version | Image ID | Release date | Release highlights |
Alibaba Cloud Linux 3.2104 U10.1 | aliyun_3_x64_20G_alibase_20241103.vhd | 2024-11-03 |
|
aliyun_3_x64_20G_dengbao_alibase_20241103.vhd | 2024-11-03 |
| |
aliyun_3_arm64_20G_alibase_20241103.vhd | 2024-11-03 |
| |
aliyun_3_arm64_20G_dengbao_alibase_20241103.vhd | 2024-11-03 |
|
Update details
Security updates
Package name | CVE ID | Version |
buildah | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | buildah-1.33.8-4.al8 |
containernetworking-plugins | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | containernetworking-plugins-1.4.0-5.0.1.al8 |
containers-common | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | containers-common-1-82.0.1.al8 |
podman | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | podman-4.9.4-12.0.1.al8 |
python-podman | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | python-podman-4.9.0-2.al8 |
runc | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | runc-1.1.12-4.0.1.al8 |
skopeo | CVE-2023-45290 CVE-2024-1394 CVE-2024-3727 CVE-2024-6104 CVE-2024-24783 CVE-2024-24784 CVE-2024-24789 CVE-2024-37298 | skopeo-1.14.5-3.0.1.al8 |
httpd | CVE-2023-27522 | httpd-2.4.37-65.0.1.al8.2 |
git-lfs | CVE-2023-45288 CVE-2023-45289 CVE-2023-45290 CVE-2024-24783 | git-lfs-3.4.1-2.0.1.al8 |
bind | CVE-2024-1975 CVE-2024-1737 | bind-9.11.36-16.0.1.al8 |
python-setuptools | CVE-2024-6345 | python-setuptools-39.2.0-8.al8.1 |
less | CVE-2022-48624 CVE-2024-32487 | less-530-3.0.1.al8 |
java-17-openjdk | CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 | java-17-openjdk-17.0.12.0.7-2.0.2.1.al8 |
java-11-openjdk | CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 | java-11-openjdk-11.0.24.0.8-3.0.2.1.al8 |
postgresql | CVE-2024-7348 | postgresql-13.16-1.0.1.al8 |
flatpak | CVE-2024-42472 | flatpak-1.12.9-3.al8 |
bubblewrap | CVE-2024-42472 | bubblewrap-0.4.0-2.2.al8 |
java-1.8.0-openjdk | CVE-2024-21131 CVE-2024-21138 CVE-2024-21140 CVE-2024-21144 CVE-2024-21145 CVE-2024-21147 | java-1.8.0-openjdk-1.8.0.422.b05-2.0.2.1.al8 |
fence-agents | CVE-2024-6345 | fence-agents-4.10.0-62.0.2.al8.4 |
pcp | CVE-2024-45769 CVE-2024-45770 | pcp-5.3.7-22.0.1.al8 |
delve | CVE-2024-24791 CVE-2024-34155 CVE-2024-34156 CVE-2024-34158 | delve-1.21.2-4.0.1.al8 |
golang | CVE-2024-24791 CVE-2024-34155 CVE-2024-34156 CVE-2024-34158 | golang-1.21.13-2.0.1.al8 |
go-toolset | CVE-2024-24791 CVE-2024-34155 CVE-2024-34156 CVE-2024-34158 | go-toolset-1.21.13-1.al8 |
edk2 | CVE-2023-45236 CVE-2023-45237 CVE-2024-1298 | edk2-20220126gitbb1bba3d77-13.0.1.al8.2 |
curl | CVE-2024-2398 | curl-7.61.1-35.0.2.al8 |
libvpx | CVE-2023-6349 CVE-2024-5197 | libvpx-1.7.0-11.0.1.al8 |
resource-agents | CVE-2024-37891 CVE-2024-6345 | resource-agents-4.9.0-54.al8.4 |
389-ds-base | CVE-2024-5953 | 389-ds-base-1.4.3.39-8.0.1.al8 |
python-urllib3 | CVE-2024-37891 | python-urllib3-1.24.2-8.al8 |
pcs | CVE-2024-41123 CVE-2024-41946 CVE-2024-43398 | pcs-0.10.18-2.0.1.1.al8.2 |
grafana | CVE-2024-24788 CVE-2024-24789 CVE-2024-24790 | grafana-9.2.10-17.0.1.al8 |
libuv | CVE-2024-24806 | libuv-1.42.0-2.al8 |
c-ares | CVE-2024-25629 | c-ares-1.13.0-11.al8 |
xmlrpc-c | CVE-2023-52425 | xmlrpc-c-1.51.0-9.0.1.al8 |
yajl | CVE-2022-24795 CVE-2023-33460 | yajl-2.1.0-13.0.1.al8 |
wpa_supplicant | CVE-2023-52160 | wpa_supplicant-2.10-2.al8 |
cups | CVE-2024-35235 | cups-2.2.6-60.0.1.al8 |
linux-firmware | CVE-2023-31346 | linux-firmware-20240610-122.git90df68d2.al8 |
wget | CVE-2024-38428 | wget-1.19.5-12.0.1.al8 |
poppler | CVE-2024-6239 | poppler-20.11.0-12.0.1.al8 |
krb5 | CVE-2024-37370 CVE-2024-37371 | krb5-1.18.2-29.0.1.al8 |
git-lfs | CVE-2024-34156 | git-lfs-3.4.1-3.0.1.al8 |
libreoffice | CVE-2024-3044 CVE-2024-6472 | libreoffice-7.1.8.1-12.0.2.1.al8.1 |
orc | CVE-2024-40897 | orc-0.4.28-4.al8 |
jose | CVE-2023-50967 CVE-2024-28176 | jose-10-2.3.al8.3 |
openssh | CVE-2020-15778 CVE-2023-48795 CVE-2023-51385 | openssh-8.0p1-25.0.1.1.al8 |
libnbd | CVE-2024-3446 CVE-2024-7383 CVE-2024-7409 | libnbd-1.6.0-6.0.1.al8 |
qemu-kvm | CVE-2024-3446 CVE-2024-7383 CVE-2024-7409 | qemu-kvm-6.2.0-53.0.1.al8 |
libvirt | CVE-2024-3446 CVE-2024-7383 CVE-2024-7409 | libvirt-8.0.0-23.2.0.2.al8 |
osbuild-composer | CVE-2024-34156 | osbuild-composer-101-2.0.1.al8 |
libreswan | CVE-2024-3652 | libreswan-4.12-2.0.2.al8.4 |
mod_auth_openidc | CVE-2024-24814 | mod_auth_openidc-2.4.9.4-6.al8 |
podman | CVE-2023-45290 CVE-2024-24783 CVE-2024-24784 CVE-2024-24788 CVE-2024-24791 | podman-4.9.4-13.0.1.al8 |
ghostscript | CVE-2024-29510 CVE-2024-33869 CVE-2024-33870 | ghostscript-9.54.0-18.al8 |
emacs | CVE-2024-39331 | emacs-27.2-9.0.3.al8 |
dovecot | CVE-2024-23184 CVE-2024-23185 | dovecot-2.3.16-5.0.1.al8 |
expat | CVE-2024-45490 CVE-2024-45491 CVE-2024-45492 | expat-2.2.5-13.0.1.al8 |
glib2 | CVE-2024-34397 | glib2-2.68.4-14.0.2.al8 |
python-idna | CVE-2024-3651 | python-idna-2.5-7.al8 |
openldap | CVE-2023-2953 | openldap-2.4.46-19.al8 |
python-pillow | CVE-2024-28219 | python-pillow-5.1.1-21.al8 |
nghttp2 | CVE-2024-28182 | nghttp2-1.33.0-6.0.1.al8.1 |
python-jinja2 | CVE-2024-34064 | python-jinja2-2.10.1-3.0.3.al8 |
opencryptoki | CVE-2024-0914 | opencryptoki-3.22.0-3.al8 |
gdk-pixbuf2 | CVE-2021-44648 CVE-2021-46829 CVE-2022-48622 | gdk-pixbuf2-2.42.6-4.0.1.al8 |
rear | CVE-2024-23301 | rear-2.6-13.0.1.al8 |
grub2 | CVE-2023-4692 CVE-2023-4693 CVE-2024-1048 | grub2-2.02-150.0.2.al8 |
nss | CVE-2023-5388 CVE-2023-6135 | nss-3.101.0-7.0.1.al8 |
gnutls | CVE-2024-0553 CVE-2024-28834 | gnutls-3.6.16-8.0.1.al8.3 |
python3 | CVE-2024-4032 CVE-2024-6232 CVE-2024-6923 | python3-3.6.8-67.0.1.2.al8 |
grafana | CVE-2024-24791 | grafana-9.2.10-18.0.1.al8 |
cups-filters | CVE-2024-47076 CVE-2024-47175 CVE-2024-47176 CVE-2024-47850 | cups-filters-1.20.0-35.0.1.al8 |
linux-firmware | CVE-2023-20584 CVE-2023-31315 CVE-2023-31356 | linux-firmware-20240827-124.git3cff7109.al8 |
golang | CVE-2024-9355 | golang-1.21.13-3.0.1.al8 |
openssl | CVE-2024-5535 | openssl-1.1.1k-14.0.1.al8 |
nano | CVE-2024-5742 | nano-2.9.8-2.0.1.al8 |
runc | CVE-2023-45290 CVE-2024-34155 CVE-2024-34156 CVE-2024-34158 | runc-1.1.12-5.0.1.al8 |
OpenIPMI | CVE-2024-42934 | OpenIPMI-2.0.32-5.0.1.al8 |
Package updates
New features
Adds the
libyang2component.Updates
keentunedandkeentune-targetto version 3.1.1.Adds a tuning option to modify the number of network interface queues.
Adds a tuning option to modify priority control.
Removes the
file-maxandschedulertuning options.Removes insecure command execution.
Adds four API components for
keentuned:keentune-bench,keentune-brain,keentune-ui, andkeenopt.Updates
tcprtto version 1.1.0 to enhance TCP monitoring capabilities.Updates
Node.jsto 20.16, providing a version 20 baseline for the ACR Artifacts Center.Upgrades
erofs-utilsto 1.8.2, fixing bugs and enhancing EROFS support.
Important updates
Kernel
The Kernel is upgraded to version 5.10.134-17.3.al8.
Anolis-specific features
Shared Memory Communications (SMC)
Introduces the
AutoSplitfeature to optimize large-packet transmission delay.Allows connections in an SMC Link Group to exclusively use an RDMA QP.
Introduces shared memory watermark control.
Introduces data
dumpcapabilities at the SMC layer.
swiotlb
Introduces the
swiotlb=anyKernel command-line parameter to support reservingswiotlbin the entire memory space.
Upstream features
Backports
sysctlsettings related to SMC Limited Handshake.Backports Shared Memory usage statistics for SMC LGR and net namespaces.
TDX
Introduces a TDX Guest RTMR update interface to add custom measurements for Remote Attestation.
Introduces the ECDSA algorithm module.
Bug fixes
Addresses slow
lscpucommand execution on clusters with a large number ofpcidevices by updating toutil-linux-2.32.1-46.0.3.al8.Resolves an issue with missing time zone files during migration by updating
tzdatato2024a-1.0.1.6.al8.Fixes issues in the SMC module, including division-by-zero errors and memory leaks.
Fixes a bug in the
ftracesubsystem that could cause a system crash when multiple security software products were running concurrently.Fixes a potential out-of-bounds memory access issue when using
uprobe.
Alibaba Cloud Linux (Alinux) 3.2104 U10
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux 3.2104 U10 | aliyun_3_x64_20G_alibase_20240819.vhd | 2024-08-19 |
|
aliyun_3_x64_20G_dengbao_alibase_20240819.vhd | 2024-08-19 |
| |
aliyun_3_arm64_20G_alibase_20240819.vhd | 2024-08-19 |
| |
aliyun_3_arm64_20G_dengbao_alibase_20240819.vhd | 2024-08-19 |
|
Updates
This topic describes the updates in the 20240527 version of the Alibaba Cloud Linux 3.2104 LTS 64-bit public image.
Updates
The 20240527 version of the Alibaba Cloud Linux 3.2104 LTS 64-bit public image includes the following updates:
Security updates
The Linux Kernel has been upgraded to version 5.10.134-16.
Software packages have been updated to fix security vulnerabilities and enhance system stability.
Bug fixes
This version contains no bug fixes.
Known issues
An issue persists where Alibaba Cloud Message Queue for Apache RocketMQ 5.x clients fail to start on confidential computing virtual machines (VMs) of the g8y, c8y, and r8y Instance Families running Alibaba Cloud Linux 3. To work around this, create an Elastic Compute Service (ECS) instance from a non-confidential computing Instance Family when using the client in an aarch64 environment.
Package | CVE ID | Version |
adwaita-qt |
| 1.4.2-1.al8 |
apr | CVE-2022-24963 | 1.7.0-12.al8 |
avahi |
| 0.7-21.0.1.al8.1 |
bind |
| 9.11.36-14.0.1.al8 |
c-ares |
| 1.13.0-9.al8.1 |
cockpit | CVE-2024-2947 | 310.4-1.al8 |
cups |
| 2.2.6-54.0.1.al8 |
cups-filters | CVE-2023-24805 | 1.20.0-32.0.1.al8 |
curl | CVE-2023-38546 | 7.61.1-34.0.1.al8 |
device-mapper-multipath | CVE-2022-41973 | 0.8.4-39.0.2.al8 |
dhcp |
| 4.3.6-50.0.1.al8 |
dnsmasq |
| 2.79-32.0.1.al8 |
edk2 |
| 20220126gitbb1bba3d77-13.0.1.al8 |
expat | CVE-2023-52425 | 2.2.5-13.al8 |
evolution-mapi |
| 3.40.1-6.al8 |
flatpak |
| 1.12.9-1.al8 |
frr |
| 7.5.1-16.0.4.al8 |
fwupd | CVE-2022-3287 | 1.7.8-2.0.1.al8 |
ghostscript | CVE-2024-33871 | 9.54.0-16.al8 |
git |
| 2.43.5-1.0.1.al8 |
glib2 |
| 2.68.4-11.al8 |
gmp | CVE-2021-43618 | 6.2.0-13.0.1.al8 |
gnutls | CVE-2023-5981 | 3.6.16-8.0.2.al8 |
grafana |
| 9.2.10-16.0.1.al8 |
grafana-pcp | CVE-2024-1394 | 5.1.1-2.0.1.al8 |
gstreamer1-plugins-bad-free |
| 1.22.1-4.0.1.al8 |
gstreamer1-plugins-base | CVE-2023-37328 | 1.22.1-2.0.1.al8 |
gstreamer1-plugins-good | CVE-2023-37327 | 1.16.1-4.al8 |
harfbuzz | CVE-2023-25193 | 2.7.4-10.0.1.al8 |
httpd |
| 2.4.37-64.0.1.al8 |
mod_http2 |
| 1.15.7-10.al8 |
java-1.8.0-openjdk |
| 1.8.0.412.b08-2.0.1.1.al8 |
java-11-openjdk |
| 11.0.23.0.9-3.0.1.1.al8 |
libfastjson | CVE-2020-12762 | 0.99.9-5.al8 |
libjpeg-turbo | CVE-2021-29390 | 2.0.90-7.0.1.al8 |
liblouis |
| 3.16.1-5.al8 |
libmicrohttpd | CVE-2023-27371 | 0.9.59-3.al8 |
libpq | CVE-2022-41862 | 13.11-1.0.1.al8 |
librabbitmq | CVE-2023-35789 | 0.11.0-7.0.1.al8 |
libreoffice |
| 7.1.8.1-12.0.1.1.al8.1 |
libreswan |
| 4.12-2.0.2.al8 |
libsndfile | CVE-2022-33065 | 1.0.28-13.0.2.al8 |
libssh |
| 0.9.6-12.al8 |
libtiff |
| 4.4.0-12.0.1.al8 |
libvirt |
| 8.0.0-23.1.0.1.al8 |
qemu-kvm |
| 6.2.0-49.0.1.al8 |
libX11 |
| 1.7.0-9.al8 |
libxml2 |
| 2.9.7-18.0.3.al8 |
libXpm |
| 3.5.13-10.0.1.al8 |
linux-firmware |
| 20240111-121.gitb3132c18.al8 |
motif |
| 2.3.4-20.al8 |
openchange |
| 2.3-32.0.1.al8 |
opensc |
| 0.20.0-7.0.1.al8 |
openssh | CVE-2023-51385 | 8.0p1-20.0.1.al8 |
openssl |
| 1.1.1k-12.0.1.al8 |
pam | CVE-2024-22365 | 1.3.1-28.al8 |
pcp | CVE-2024-3019 | 5.3.7-20.0.1.al8 |
perl-HTTP-Tiny | CVE-2023-31486 | 0.074-2.0.1.al8.1 |
pixman | CVE-2022-44638 | 0.40.0-6.al8 |
pmix | CVE-2023-41915 | 3.2.3-5.al8 |
poppler | CVE-2020-36024 | 20.11.0-10.0.2.al8 |
postgresql-jdbc | CVE-2024-1597 | 42.2.14-3.al8 |
procps-ng | CVE-2023-4016 | 3.3.15-14.0.1.al8 |
protobuf-c | CVE-2022-48468 | 1.3.0-7.al8 |
python-cryptography | CVE-2023-23931 | 3.2.1-7.al8 |
python-dns | CVE-2023-29483 | 1.15.0-12.al8 |
python-pillow |
| 5.1.1-20.al8 |
python-pip | CVE-2007-4559 | 9.0.3-23.0.1.al8.1 |
python3 |
| 3.6.8-62.0.1.2.al8 |
qt5-qtbase |
| 5.15.3-5.0.3.al8 |
qt5-qtsvg | CVE-2023-32573 | 5.15.3-2.al8 |
rpm |
| 4.14.3-27.0.5.2.al8 |
samba |
| 4.18.6-3.0.1.1.al8 |
shadow-utils | CVE-2023-4641 | 4.6-19.0.1.al8 |
shim |
| 15.8-2.0.1.1.al8 |
sqlite | CVE-2023-7104 | 3.26.0-19.al8 |
squashfs-tools |
| 4.3-20.1.0.3.al8 |
sssd | CVE-2023-3758 | 2.9.4-3.al8 |
sudo |
| 1.9.5p2-1.0.1.al8 |
sysstat | CVE-2023-33204 | 11.7.3-11.0.1.al8 |
tang | CVE-2023-1672 | 7-8.al8 |
tcpdump | CVE-2021-41043 | 4.9.3-4.0.1.al8 |
tigervnc |
| 1.13.1-10.0.1.al8 |
tpm2-tss | CVE-2023-22745 | 2.3.2-5.0.2.al8 |
traceroute | CVE-2023-46316 | 2.1.0-6.2.0.3.al8 |
unbound | CVE-2024-1488 | 1.16.2-7.al8 |
util-linux | CVE-2024-28085 | 2.32.1-45.0.1.1.al8.1 |
webkit2gtk3 |
| 2.42.5-1.0.1.al8 |
wireshark |
| 2.6.2-17.al8 |
xorg-x11-server |
| 1.20.11-16.0.4.al8 |
xorg-x11-server-Xwayland |
| 22.1.9-5.al8 |
yajl | CVE-2023-33460 | 2.1.0-12.0.1.al8 |
zziplib | CVE-2020-18770 | 0.13.71-11.al8 |
buildah |
| 1.33.7-2.al8 |
cockpit-podman |
| 84.1-1.al8 |
conmon |
| 2.1.10-1.al8 |
container-selinux |
| 2.229.0-2.al8 |
containernetworking-plugins |
| 1.4.0-2.0.1.al8 |
containers-common |
| 1-81.0.1.al8 |
criu |
| 3.18-5.0.1.al8 |
fuse-overlayfs |
| 1.13-1.0.1.al8 |
podman |
| 4.9.4-3.0.1.al8 |
runc |
| 1.1.12-1.0.1.al8 |
slirp4netns |
| 1.2.3-1.al8 |
libslirp |
| 4.4.0-2.al8 |
Package updates
New features
rdma-core adds support for eRDMA.
rasdaemon supports Memory CE Error Isolation.
Nginx uses OpenSSL 3.
aliyun-cli is now version 3.0.210.
Important updates
Kernel
The Kernel is upgraded to version 5.10.134-17.2.al8.
New features
Adds native Kernel-level failover for FUSE, ensuring uninterrupted file access.
Adds support for dynamic Kernel preemption. This feature aligns with the upstream community's design and lets you switch the preemption model by using
cmdlineorsysfs. The supported models arenoneandvoluntary. Thefullmodel is not yet supported.Enhances
perfto support performance metrics for CMN and DDR PMUs.New BPF features
Adds new BPF helpers.
bpf_for_each_map_elem: Iterates over BPF map elements.bpf_snprintf: Formats strings.bpf_timer: Triggers a callback function after a specified time.bpf_loop: Removes the limitation of constant-bounded loops, enabling flexible loop implementation.bpf_strncmp: Compares strings.bpf_ktime_get_tai_ns: Gets the time based on theCLOCK_TAIclock source.bpf_skb_load_bytes: Adds support for theraw_tptype, enabling programs of this type to readskbdata, including non-linear data.
Adds support on the arm64 architecture for attaching BPF trampoline features, including
fentry,fexit,fmod_ret, andbpf_lsm, providing more powerful tracing, diagnostics, and security.Allows
bpf_trampolineto coexist withlivepatch.
Adds support for virtio-net features.
Supports
virtio-netdevice statistics. This feature allows the Kernel to retrieve device statistics, improving troubleshooting and diagnostics.Introduces a queue reset feature. This feature resizes virtual machine queues to reduce packet loss and optimize latency.
Supports dynamic interrupt moderation (netdim). This feature intelligently adjusts interrupt coalescing parameters based on real-time traffic to optimize data reception performance.
Optimizes
virtiochecksum handling. This update fixes a checksum verification issue on virtio network interface controllers (NICs) under specific feature controls. In XDP application scenarios, the checksum no longer needs to be re-verified in the guest operating system, which significantly reduces CPU usage.
Enables failover support for the EROFS on-demand loading mode.
Fixes a semantic issue with
O_DIRECTandO_SYNCin the ext4 file system. This issue has existed since the introduction of the iomap framework. The problem occurred becausegeneric_write_sync()was called within the iomap framework, but the file size (i_disksize) was updated afteriomap_dio_rw()completed. In append-write scenarios, the system did not update the on-disk file size in time. As a result, written data could become unreadable after a power failure.Adds support for delayed inode invalidation to the XFS file system. This feature offloads inode reclamation to a background
kworkerprocess, which reduces application stuttering caused by foreground delete operations.Adds new features and optimizations for FUSE.
Adds support for Shared Memory Mapping (mmap) in
cache=nonemode.Adds a dynamic switch for the
strict limitfeature. In certain scenarios, the FUSE module'sstrict limitsetting can cause slow write-backs or stuttering. This newsysfsswitch resolves these issues dynamically.
Optimizes
kernfsglobal lock contention to reduce load spikes caused by concurrent access from monitoring programs.Adds features related to Group Identity.
Introduces fine-grained priority features for Group Identity 2.0.
Adds support for the
smc_pnetfeature in Shared Memory Communications over RDMA (SMC-R) and elastic Remote Direct Memory Access (eRDMA) use cases.Improves reachability checks in Shared Memory Communications (SMC) and eRDMA scenarios to fix a rare kernel crash.
Calibrates the CPU share ratio for Group Identity 2.0.
Adds the
force_idled_timemetric for Group Identity 2.0.Optimizes Group Identity to enhance load control for tasks with different priorities.
Provides the basic functionality of Group Balancer.
Adds support for passing zero-length
iovecinrafsv6mode.Allows reclamation of
daxmappings inrafsv6mode. This prevents Out of Memory (OOM) errors and FUSE hangs caused by pinned memory.Uses
kconfigto restrictrafsv6for use only in Secure Container scenarios.
Adds optimizations and support for SMC.
Adds a timeout mechanism for the
control vqinvirtio. This prevents continuous polling from consuming a virtual machine's CPU when a device becomes unresponsive. The default timeout is 7 days.Adds a feature to isolate slab memory used by Out-of-Tree (OOT) modules. This helps isolate problems when an OOT module causes memory corruption.
Introduces a fast OOM feature. This feature prevents long periods of unresponsiveness in multi-core, large-memory environments when memory is low. This increases memory deployment density and improves the stability and performance of online services under high watermarks.
Adds support and optimizations for EROFS.
XFS adds support for
fsdaxreflinkanddedupe, with specific optimizations for Tair PMEM instances. These optimizations include ensuring the contiguity of snapshot source files, improving dirty page write-back efficiency, and removing the dependency on the reverse-map B-tree to reduce page fault latency.Adds support for
cgroup writebackto fix an issue where memory cgroups were not released for long periods whenlazytimewas enabled. This issue could cause the number of memory cgroups to remain high in containerized deployment environments, consuming memory and causing highsysusage when iterating through cgroups.Extends the cgroup v2 IO SLI by adding
blkiocgroup v2 metrics, includingwait time,service time,complete time,io queued, andbytes queued.In extreme cases where each
bio_veccontains only a single 4 KB page, the 5.10 Kernel supports a maximum I/O size of 1 MB. The additional logic for splitting I/O operations can impact performance in some scenarios.Fixes an ABBA deadlock caused by a race condition when setting
blk-iocostqos parameters.Allows configuration of
tcmu_loopdevice parameters, includingcan_queue,nr_hw_queues,cmd_per_lun, andsg_tablesize. On powerful backend devices, increasing these parameters can significantly improve performance.
Image update
Operating system image
Added the
spec_rstack_overflow=offboot parameter.Added the
kfence.sample_interval=100andkfence.booting_max=0-2G:0,2G-32G:2M,32G-:32Mboot parameters.Set the
net.ipv4.tcp_retries2parameter to8.Set the
net.ipv4.tcp_syn_retriesparameter to4.Removed the NTP server configuration for Classic Network.
Container image
alibaba-cloud-linux-3-registry.cn-hangzhou.cr.aliyuncs.com/alinux3/alinux3:3.2104U10
Bug fixes
Kernel
Fixed a linked list corruption issue caused by incorrect scheduling of the
credits_announce_workwork item in thesmckernel module.Fixed a race condition in
perf_cgroup_switch.Fixed an issue where the Group Identity 2.0
Queue other timestatistic could become a negative value.Fixed incorrect
cfs_rqruntime statistics.Fixed an issue where
cfs_rq->corecould be NULL.Enabled sound card-related drivers (
CONFIG_SND).Fixed a Kernel Panic caused by
kfencewhencgroup kmemaccounting was enabled.Added LoongArch architecture fixes.
Improved the stability of erofs compression mode.
Improved stability for
erofsoverfscache.Improved SMC-related stability.
Fixed a writeback performance regression when a backing device info (BDI) with its share set to 0 used the
STRICTLIMITfeature.Fixed a memory leak in
seccomp.Fixed an issue where certain user operations could lead to an incorrect reference count for
ZERO_PAGE.Fixed a potential recursive memory reclamation issue in
TCMU.Fixed a Kernel Crash caused by the
ioasidssubsystem when it migrated kernel threads.Fixed multiple I/O counting when no rate-limiting rules were configured.
Fixed a hardware signal hang during frequent communication between Phytium S2500 CPUs and certain BMC chips.
Fixed a Kernel Panic that occurred when Group Identity and core scheduling were enabled simultaneously.
Changed the throttling mechanism for Completely Fair Scheduler (CFS) bandwidth control from synchronous to asynchronous mode to optimize bandwidth control efficiency on systems with a large number of CPUs.
Fixed a potential race condition when disabling the global switch for core scheduling.
Fixed inaccurate SIB Idle statistics under high Interrupt Request (IRQ) loads.
Backported fixes for NVMe over RDMA from newer versions to improve system stability.
Fixed a deadlock during the concurrent execution of
nvme_resetandnvme_rescan.Fixed a Kernel Crash caused by a use-after-free (UAF) issue related to Active State Power Management (ASPM) in the PCIe driver.
Fixed a screen corruption issue on Phytium S5000C devices equipped with an AST2600 graphics card.
Fixed a warning, caused by asynchronous unthrottle, that could lead to a scheduling deadlock.
CVE-2023-52445
CVE-2023-6817
CVE-2024-0646
CVE-2023-20569
CVE-2023-51042
CVE-2023-6915
CVE-2023-6546
CVE-2022-38096
CVE-2024-0565
CVE-2024-26589
CVE-2024-23307
CVE-2024-22099
CVE-2024-24860
CVE-2024-1086
CVE-2023-51779
CVE-2024-26597
CVE-2024-24855
CVE-2023-52438
CVE-2023-4622
CVE-2023-6932
CVE-2023-20588
CVE-2023-5717
CVE-2023-6931
CVE-2023-28464
CVE-2023-39192
CVE-2023-6176
CVE-2023-45863
CVE-2023-5178
CVE-2023-45871
CVE-2023-4155
CVE-2023-20593
CVE-2023-3567
CVE-2023-3358
CVE-2023-0615
CVE-2023-31083
CVE-2023-4015
CVE-2023-42753
CVE-2023-4623
CVE-2023-4921
CVE-2023-2860
CVE-2023-1206
CVE-2023-3772
CVE-2023-42755
CVE-2023-3863
CVE-2022-3114
CVE-2023-31085
CVE-2023-4132
CVE-2022-3424
CVE-2022-3903
CVE-2022-45887
CVE-2023-3006
CVE-2023-42754
CVE-2023-0160
Image
Standardized the debuginfo repository names. Users can now install the corresponding debuginfo packages by running the command
dnf debuginfo-install <package_name>.Extended the
dnf-makecacheservice interval from 1 hour to 1 day to reduce its impact on disk and network usage.Removed the
virtio_blkmodule configuration frominitramfsas the module is now included in the kernel.
Package
Fixed a bug in
dnf-plugin-releasever-adapterthat could cause thednfcommand to fail.
Alibaba Cloud Linux (Alinux) 3.2104 U9.1
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux (Alinux) 3.2104 U9.1 | aliyun_3_x64_20G_alibase_20240528.vhd | 2024-05-28 |
|
aliyun_3_arm64_20G_alibase_20240528.vhd | 2024-05-28 |
|
Updates
Security updates
Package name | CVE ID | Package version |
kernel |
| 5.10.134-16.3.al8 |
bind | CVE-2022-3094 | 9.11.36-11.0.1.al8 |
buildah |
| 1.31.3-1.al8 |
dnsmasq | CVE-2023-28450 | 2.79-31.0.1.al8 |
edk2-20220126gitbb1bba3d77 | CVE-2019-14560 | 6.0.2.al8 |
frr |
| 7.5.1-16.0.2.al8 |
grafana |
| 9.2.10-7.0.1.al8 |
grafana | CVE-2024-1394 | 9.2.10-7.0.1.al8 |
grafana-pcp | 5.1.1-1.0.1.al8 | |
gstreamer1-plugins-bad-free | CVE-2023-44429 | 1.22.1-2.0.1.al8 |
tigervnc | CVE-2023-44446 | 1.13.1-2.al8 |
unbound |
| 1.16.2-6.al8 |
webkit2gtk3 | CVE-2023-42917 | 2.40.5-1.0.2.al8.1 |
glibc | CVE-2024-2961 | 2.32-1.16.al8 |
python2-setuptools | CVE-2022-40897 | 39.0.1-13.1.module+al8+9+77049424 |
Package updates
Package name | Release version |
cloud-init | 23.2.2 |
container-selinux | 2.229.0 |
ethtool | 6.6 |
iproute | 6.2.0 |
iptables | 1.8.5 |
keentuned | 2.4.0 |
keentune-target | 2.4.0 |
rng-tools | 6.16 |
sssd | 2.9.1 |
sudo | 1.9.5p2 |
sysak | 2.4.0 |
Important updates
Kernel updates
Upgraded the kernel to 5.10.134-16.3.al8.
Added support for the
smc_pnetfeature in SMC-R and elastic Remote Direct Memory Access (eRDMA) scenarios.Added support for HWDRC, an RDT-based dynamic memory bandwidth control technology. This technology enables more precise control over resources such as memory bandwidth and cache.
Optimized Group Identity to enhance workload control for tasks with different priorities.
New features
Upgraded aliyun-cli to 3.0.204. You can now install and update aliyun-cli using
yumordnf.Upgraded cloud-init to 23.2.2, which now supports accessing Instance Metadata in Hardened Mode.
Upgraded ethtool to 6.6 to support the CMIS Protocol.
Upgraded sysak to 2.4.0. This upgrade optimizes diagnostic capabilities, adds node monitoring, provides node-side support for sysom observability, and includes several bug fixes.
Upgraded keentune to 2.4.0.
Image updates
Container images
alibaba-cloud-linux-3-registry.cn-hangzhou.cr.aliyuncs.com/alinux3/alinux3:3.9.1
alibaba-cloud-linux-3-registry.cn-hangzhou.cr.aliyuncs.com/alinux3/alinux3:latest
NoteAfter this release, the
latesttag will no longer point to the3.9.1image.
Virtual machine images
Switched the image type to UEFI-Preferred. The image now supports Dual-boot Mode (UEFI + Legacy).
Bug fixes
Kernel
Fixed stability issues in EROFS compression mode.
Fixed stability issues with EROFS over fscache.
Fixed stability issues related to SMC.
Fixed degraded writeback performance when BDI uses the
STRICTLIMITfeature and the BDI share is 0.Fixed a memory leak in seccomp.
Fixed an issue where user operations could cause an incorrect reference count for
ZERO_PAGE.Fixed a potential recursive memory reclamation issue in TCMU.
Fixed a kernel crash that occurred when the ioasids subsystem migrated a kernel thread.
Fixed an issue with duplicate I/O statistics when no throttling rules were configured.
Fixed a hardware signal hang that occurred when Phytium S2500 and some BMC chips communicated frequently over a short period.
Fixed a kernel panic that occurred when Group Identity and core scheduling were enabled concurrently.
Changed CFS bandwidth control to lift throttling asynchronously instead of synchronously, improving efficiency in scenarios with many CPUs.
Fixed a potential race condition when disabling the main core sched switch.
Fixed inaccurate sibidle statistics in high-IRQ scenarios.
Image
Fixed an issue that prevented the system from using a newly installed kernel after a reboot.
2023
Alibaba Cloud Linux 3.2104 U9
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux 3.2104 U9 | aliyun_3_9_x64_20G_alibase_20231219.vhd | 2023-12-19 |
|
aliyun_3_9_arm64_20G_alibase_20231219.vhd | 2023-12-19 |
| |
aliyun_3_9_x64_20G_uefi_alibase_20231219.vhd | 2023-12-19 |
|
Content updates
Security updates
Package name | CVE ID | Package version |
kernel |
| 5.10.134-16.1.al8 |
java-1.8.0-openjdk |
| 1.8.0.392.b08-4.0.3.al8 |
java-11-openjdk | CVE-2023-22081 | 11.0.21.0.9-2.0.3.al8 |
mariadb |
| 10.5.22-1.0.1.al8 |
open-vm-tools |
| 12.2.5-3.al8.1 |
bind | CVE-2023-3341 | 9.11.36-8.al8.2 |
dmidecode-doc | CVE-2023-30630 | 3.3-5.0.2.al8 |
frr | CVE-2023-38802 | 7.5.1-8.0.1.al8 |
ghostscript |
| 9.54.0-14.al8 |
glibc | CVE-2023-4911 | 2.32-1.12.al8 |
grafana |
| 7.5.15-5.0.1 |
libvpx |
| 1.7.0-10.0.1.al8 |
linux-firmware | CVE-2023-20593 | 20230404-117.git2e92a49f.al8 |
ncurses | CVE-2023-29491 | 6.1-10.20180224.0.1.al8 |
nghttp2 | CVE-2023-44487 | 1.33.0-4.0.1.al8.1 |
|
|
|
tracker-miners | CVE-2023-5557 | 3.1.2-4.0.1.al8 |
Package updates
Package name | Release version |
ca-certificates | 2023.2.60_v7.0.306 |
firewalld | 0.9.11 |
java-1.8.0-openjdk | 1.8.0.392.b08 |
java-11-openjdk | 11.0.21.0.9 |
libbpf | 0.6.0 |
lz4 | 1.9.4 |
mariadb | 10.5.22 |
nmstate | 2.2.15 |
nspr | 4.35.0 |
nss | 3.90.0 |
open-vm-tools | 12.2.5 |
openscap | 1.3.8 |
scap-security-guide | 0.1.69 |
sos | 4.6.0 |
xz | 5.4.4 |
Important updates
Kernel
New features
Added support for core scheduling.
This release backports the core scheduling security feature from the upstream community. This feature restricts hyper-threads on the same physical core to running only trusted processes from the same group simultaneously. This feature is incompatible with group identity and the two features must not be enabled at the same time. The feature is disabled by default. To enable it, run the
sysctl -w kernel.sched_core=1command.Added support for the eBPF trampoline feature on Arm64.
This release backports the eBPF trampoline feature on Arm64 to support the bpf struct ops feature. Note that bpf fentry-related features are still unavailable because the required Arm64 ftrace-related features have not been backported.
Added support for the Multi-Generational LRU (MGLRU) feature.
This feature improves the speed and accuracy of memory page reclaim, which enhances end-to-end performance in big data scenarios.
Added support for batch TLB flushing.
The batch migration feature improves the performance of kernel page migration by implementing batch TLB flushing and page copy operations.
This version refactors and optimizes the original batch migration feature from the previous kernel based on upstream code. Key changes include removing the
batch_migratecmdline parameter and the/sys/kernel/mm/migrate/batch_migrate_enabledinterface. Batch migration is now the default page migration behavior.This update adds the
/sys/kernel/mm/migrate/dma_migration_min_pagesinterface, which has a default value of 32. This interface applies only when the DMA page copy feature is enabled. The DMA page copy feature is used only if/sys/kernel/mm/migrate/dma_migrate_enabledis enabled and the number of migrated pages reaches the value set in/sys/kernel/mm/migrate/dma_migration_min_pages.Backported the cachestat feature.
This introduces the
cachestatsystem call, allowing you to view detailed page cache statistics for a specified file.Enhanced kernel-mode RAS event triggering on Arm64.
This adds error recovery capabilities for RAS issues in various scenarios, such as
copy_{from/to}_user,{get/put}_user, Copy On Write (COW), and page cache reading.Added support for the proprietary SMC-D loopback feature.
This introduces the SMC-D loopback feature to accelerate local inter-process and inter-container TCP communication.
Added support for proprietary page table core binding and cross-die page table statistics.
The page table core binding feature allocates page tables for QoS-sensitive services to the current NUMA node when memory is tight. This reduces memory access latency and enables faster, more efficient memory access.
Enhanced the proprietary multi-copy code.
An asynchronous task now retries if the multi-copy code fails to apply during process startup. Additionally, the new
memory.duptext_nodeskernel interface restricts memory allocation nodes forduptext.Enhanced the proprietary kfence feature.
The enhanced kfence feature on Arm64 can be dynamically enabled or disabled. It fully captures memory corruption issues to facilitate both online detection and offline debugging.
You can now trigger an immediate system crash when a memory issue is detected, helping developers analyze problems in a debugging environment. To enable this, set the boot cmdline to
"kfence.fault=panic"or runecho panic > /sys/module/kfence/parameters/fault. The default value isreport, which only outputs logs without triggering a crash.
Added a proprietary memcg THP control interface.
This interface lets you disable THP requests for a specified memcg.
Added support for the proprietary ACPU (Assess CPU) feature.
ACPU calculates the idle time of the hyper-threading sibling during task execution and provides per-cgroup statistics. It can be used to evaluate hardware resource contention on shared CPU cores during task runtime.
Added support for the proprietary HT-aware quota feature.
This feature stabilizes computing power by using CFS bandwidth control and core scheduling. In mixed-deployment scenarios, it calibrates the quota by detecting whether the hyper-threading sibling is idle. This process ensures that a task receives consistent computing power in each scheduling period, making the feature ideal for compute-intensive tasks.
Added support for the proprietary group identity 2.0 feature.
This introduces a cgroup-level
SCHED_IDLEfeature. By setting thecpu.idleproperty of a target cgroup, you change its scheduling policy toSCHED_IDLE. This is ideal for managing offline tasks in batches.
Behavioral changes
Module signing
Kernel modules are now signed to help you identify and reject unsigned modules.
Disabled Spectre-BHB and Variant 4 vulnerability mitigations by default on Arm64.
Spectre-BHB and Variant 4 vulnerabilities are already addressed by other mitigations, such as the Spectre v2 fix, disabling unprivileged eBPF, Site-Isolation technology, and disabling SharedArrayBuffer, making separate fixes unnecessary. Therefore, the
nospectre_bhbandssbd=force-offparameters are added to the default cmdline for Arm64 to improve performance by reducing unnecessary overhead while maintaining security.Enabled TDX guest configurations to support TDX confidential virtual machine scenarios.
New features in packages
Added
erofs-utils-1.7.1to the software repository.erofs-utilsis a tool for creating, checking, and compressing EROFS file systems. It supports compression algorithms such as LZ4, LZMA, and DEFLATE, and can convert TAR archives to the EROFS format.Added
stress-ng-0.15.00to the software repository.Added
alibaba-cloud-compiler-13.0.1.4to the software repository.Alibaba Cloud Compiler is a C/C++ compiler from Alibaba Cloud, based on the open-source Clang/LLVM 13. It supports all options and parameters of the community version and is deeply optimized for Alibaba Cloud infrastructure, offering unique features and optimizations for Alibaba Cloud users.
Added a patch to
glibcto support GB18030-2022 encoding.Updated Dragonwell 17 to 17.0.9.0.10.9: The JIT compiler improves inlining performance by no longer basing inlining decisions on absolute call counts.
Updated Dragonwell 8 to 8.15.16.372: Supports multiple coroutines waiting for read/write events on the same socket and fixes a bug in okhttp scenarios.
Added
plugsched-1.3to the software repository.plugschedis an SDK for scheduler hot-swapping, designed for kernel scheduler developers. You can install this tool to develop scheduler modules.Updated
sysakto 2.2.0: Adds application observability for MySQL and Java applications (including metric monitoring and diagnostics), new monitoring metrics for containers and clusters, and local monitoring capabilities.Updated
keentuneto 2.3.0: Updates x264/265 scripts to support the latest ffmpeg. Resolves core binding errors for XPS and RPS. Updates the default eRDMA settings in profiles.Updated the software stack for Intel QAT, DLB, and IAA accelerators: Includes bug fixes for the QAT driver, an upgrade for the DLB driver, user-space bug fixes for QAT and IAA, and a new unified DMA memory management solution for cross-architecture accelerators in user space.
Updated
smc-tools: Adds thesmc-ebpfcommand to control the scope ofsmc_runat the port level. Control modes include allowlist/blocklist and intelligent scheduling.
Fixed issues
Fixed an issue where netfilter-related functions were unavailable because RPM packages such as
kernel-modules-extraandkernel-modules-internalwere not automatically installed during a kernel update.Fixed an issue where the
/proc/sys/kernel/sched_group_identity_enabledinterface could not be disabled due to incorrect reference counting for group identity during cgroup creation and deletion operations.
Image updates
Container images
alibaba-cloud-linux-3-registry.cn-hangzhou.cr.aliyuncs.com/alinux3/alinux3:3.9
alibaba-cloud-linux-3-registry.cn-hangzhou.cr.aliyuncs.com/alinux3/alinux3:latest
NoteAfter this release, the
latesttag no longer points to the 3.9 image version.
Virtual machine (VM) images
The default rpmdb format is now SQLite.
The keentune service is installed but not enabled by default.
The nfs-server service is not enabled by default.
Known issues
The kdump service may fail on
ecs.g6r.largeinstances due to memory constraints. To work around this issue, adjust the crash parameter, for example, to0M-2G:0M,2G-128G:256M,128G-:384M.On an NFSv3 file system, if you add an S permission to a file, the S permission for the group is lost after you change the file owner under certain conditions.
The patch to fix this issue is
2d8ae8c417("db nfsd: use vfs setgid helper"). However, applying this fix is deferred because the required helper functions differ significantly from the 5.10 kernel code base. This remains a known issue.When using SMC to replace TCP,
netperftests may exit prematurely.SMC uses a fixed-size ring buffer. During transmission, the remaining buffer space may be smaller than the amount of data requested in a
send()call. In this case, SMC returns the number of bytes that can be sent, which is typically less than the requested amount. Innetperf, this behavior is treated as an anomaly, causing it to exit. Because the upstream maintainer recommends this design to prevent connection stalls, this issue will not be fixed.
Alibaba Cloud Linux (Alinux) 3.2104 U8
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux (Alinux) 3.2104 U8 | aliyun_3_arm64_20G_alibase_20230731.vhd | 2023-07-31 |
|
aliyun_3_x64_20G_alibase_20230727.vhd | 2023-07-27 |
| |
aliyun_3_x64_20G_qboot_alibase_20230727.vhd | 2023-07-27 |
| |
aliyun_3_x64_20G_uefi_alibase_20230727.vhd | 2023-07-27 |
|
Updates
Security updates
Package name | CVE ID | Package version |
ctags | CVE-2022-4515 | 5.8-23.0.1.al8 |
gssntlmssp |
| 1.2.0-1.0.1.al8 |
libtar |
| 1.2.20-17.0.1.al8 |
device-mapper-multipath | CVE-2022-41973 | 0.8.4-37.0.1.al8 |
postgresql-jdbc | CVE-2022-41946 | 42.2.14-2.al8 |
freerdp |
| 2.2.0-10.0.1.al8 |
tigervnc |
| 1.12.0-15.al8 |
xorg-x11-server |
| 1.20.11-15.0.1.al8 |
poppler | CVE-2022-38784 | 20.11.0-6.0.1.al8 |
wayland | CVE-2021-3782 | 1.21.0-1.al8 |
net-snmp |
| 5.8-27.0.1.al8 |
dhcp |
| 4.3.6-49.0.1.al8 |
python-mako | CVE-2022-40023 | 1.0.6-14.al8 |
curl | CVE-2023-27535 | 7.61.1-30.0.2.al8.2 |
|
|
|
dnsmasq | CVE-2023-28450 | 2.79-27.al8 |
qt5 | CVE-2022-25255 | 5.15.3-1.0.1.al8 |
autotrace | CVE-2022-32323 | 0.31.1-55.al8 |
bind | CVE-2023-2828 | 9.11.36-8.al8.1 |
|
|
|
mysql |
| 8.0.32-1.0.2.al8 |
ruby |
| 2.7.8-139.0.1.al8 |
Kernel |
| 5.10.134-15.al8 |
webkit2gtk3 |
| 2.38.5-1.0.1.al8.5 |
libssh |
| 0.9.6-7.al8 |
open-vm-tools | CVE-2023-20867 | 12.1.5-2.al8 |
grafana |
| 7.5.15-4.0.2.al8 |
grafana-pcp | CVE-2022-27664 | 3.2.0-3.0.1.al8 |
frr | CVE-2022-37032 | 7.5.1-7.0.1.al8 |
sqlite | CVE-2020-24736 | 3.26.0-18.al8 |
git-lfs |
| 3.2.0-2.0.1.al8 |
sysstat | CVE-2022-39377 | 11.7.3-9.0.1.al8 |
python3 | CVE-2023-24329 | 3.6.8-51.0.1.al8.1 |
c-ares | CVE-2023-32067 | 1.13.0-6.al8.2 |
cups-filters | CVE-2023-24805 | 1.20.0-29.0.1.al8.2 |
webkit2gtk3 |
| 2.38.5-1.0.1.al8.4 |
delve go-toolset golang | CVE-2023-24540 | delve-1.9.1-1.0.1.al8 go-toolset-1.19.9-1.al8 golang-1.19.9-1.0.1.al8 |
Kernel |
| 5.10.134-14.1.al8 |
git |
| 2.39.3-1.1.al8 |
apr-util | CVE-2022-25147 | 1.6.1-6.2.al8.1 |
webkit2gtk3 | CVE-2023-2203 | 2.38.5-1.0.1.al8.3 |
edk2 |
| 20220126gitbb1bba3d77-4.al8 |
mingw-expat | CVE-2022-40674 | 2.4.8-2.al8 |
Package updates
Parameter | Release version |
at | at-3.1.20-12.0.1.al8 |
audit | audit-3.0.7-2.0.1.al8.2 |
authselect | authselect-1.2.6-1.al8 |
bind | bind-9.11.36-8.al8.1 |
checkpolicy | checkpolicy-2.9-1.2.al8 |
cloud-utils-growpart | cloud-utils-growpart-0.33-0.0.1.al8 |
container-selinux | container-selinux-2.189.0-1.al8 |
coreutils | coreutils-8.30-13.al8 |
crypto-policies | crypto-policies-20221215-1.gitece0092.al8 |
cups | cups-2.2.6-51.0.1.al8 |
dbus | dbus-1.12.8-24.0.1.al8 |
ding-libs | ding-libs-0.6.1-40.al8 |
dnf | dnf-4.7.0-16.0.1.al8 |
dnf-plugins-core | dnf-plugins-core-4.0.21-14.1.al8 |
dracut | dracut-049-223.git20230119.al8 |
elfutils | elfutils-0.188-3.0.1.al8 |
emacs | emacs-27.2-8.0.3.al8.1 |
expat | expat-2.2.5-11.al8 |
file | file-5.33-24.al8 |
freetype | freetype-2.10.4-9.al8 |
fuse | fuse-2.9.7-16.al8 |
gmp | gmp-6.2.0-10.0.1.al8 |
gnupg2 | gnupg2-2.2.20-3.al8 |
graphite2 | graphite2-1.3.10-10.2.al8 |
grub2 | grub2-2.02-148.0.1.al8 |
harfbuzz | harfbuzz-1.7.5-3.2.al8 |
hwdata | hwdata-0.314-8.16.al8 |
iproute | iproute-5.18.0-1.al8 |
iptables | iptables-1.8.4-24.0.1.al8 |
kernel | kernel-5.10.134-15.al8 |
kernel-hotfix-13383560-5.10.134-15 | kernel-hotfix-13383560-5.10.134-15-1.0-20230724161633.al8 |
kexec-tools | kexec-tools-2.0.25-5.0.1.al8 |
kmod | kmod-25-19.0.2.al8 |
kpatch | kpatch-0.9.7-2.0.1.al8 |
libarchive | libarchive-3.5.3-4.al8 |
libffi | libffi-3.1-24.0.1.al8 |
libteam | libteam-1.31-4.0.1.al8 |
libuser | libuser-0.62-25.0.1.al8 |
libxml2 | libxml2-2.9.7-16.0.1.al8 |
linux-firmware | linux-firmware-20230404-114.git2e92a49f.al8 |
logrotate | logrotate-3.14.0-6.0.1.al8 |
NetworkManager | NetworkManager-1.40.16-1.0.1.al8 |
nfs-utils | nfs-utils-2.3.3-59.0.2.al8 |
nftables | nftables-0.9.3-26.al8 |
oddjob | oddjob-0.34.7-3.0.1.al8 |
openssh | openssh-8.0p1-17.0.2.al8 |
openssl-pkcs11 | openssl-pkcs11-0.4.10-3.0.1.al8 |
pam | pam-1.3.1-25.0.1.al8 |
pciutils | pciutils-3.7.0-3.0.1.al8 |
python-linux-procfs | python-linux-procfs-0.7.1-1.al8 |
python-rpm-generators | python-rpm-generators-5-8.al8 |
python-slip | python-slip-0.6.4-13.al8 |
rng-tools | rng-tools-6.15-3.0.1.al8 |
rpcbind | rpcbind-1.2.5-10.0.1.al8 |
rpm | rpm-4.14.3-26.0.1.al8 |
rsyslog | rsyslog-8.2102.0-13.al8 |
selinux-policy | selinux-policy-3.14.3-117.0.1.al8 |
setools | setools-4.3.0-3.al8 |
setup | setup-2.12.2-9.0.1.al8 |
sg3_utils | sg3_utils-1.44-6.0.1.al8 |
shared-mime-info | shared-mime-info-2.1-5.0.1.al8 |
sssd | sssd-2.8.2-2.0.1.al8 |
tpm2-tss | tpm2-tss-2.3.2-4.0.2.al8 |
unbound | unbound-1.16.2-5.al8 |
util-linux | util-linux-2.32.1-42.0.1.al8 |
virt-what | virt-what-1.25-3.al8 |
wget | wget-1.19.5-11.0.1.al8 |
which | which-2.21-18.0.1.al8 |
xfsprogs | xfsprogs-5.0.0-10.0.6.al8 |
Important updates
Kernel updates
Upstream backports
Devlink subfunction management
A subfunction is a more lightweight function than a PCIe virtual function. Unlike a virtual function, a subfunction is not an independent PCI device and shares the resources of its parent PCI device. However, a subfunction has its own resources for network communication, including a send queue, receive queue, and completion queue. In Linux, a subfunction appears as a complete network adapter. This update lets you manage subfunctions on a network adapter using devlink. In conjunction with the driver, you can create, delete, and query subfunctions on supported network adapters.
NVMe passthrough for io_uring
The overhead from complex storage stacks significantly impacts latency and IOPS, especially as storage devices become faster. Accessing an NVMe disk typically requires data to pass through multiple layers, including the file system, block layer, and nvme driver. This update backports the
uring_cmdfeature from the upstream community's v5.19 Kernel. It allows io_uring to pass file operations directly to the NVMe driver layer for processing, bypassing the file system and block layers. To support this feature, io_uring now also supports theCQE32data structure and the creation of NVMe character devices.Fine-grained access control for NVMe/SCSI Persistent Reservations
Previously, processes required
CAP_SYS_ADMINprivilege to perform Persistent Reservation operations, which limited their use in non-privileged environments like containers. This feature lets any non-privileged process with write permissions to the block device perform these operations, expanding its use cases.IOPS throttling for large block I/O
The IOPS throttling in the 5.10 Kernel does not work effectively for large block I/O scenarios, such as 1 MB requests. This is mainly because large I/O requests may be split, and the block throttle logic does not handle this well. This issue is particularly noticeable with buffered I/O, where data is first written to the page cache and later written back to disk in merged, large blocks. The upstream community refactored this in Kernel v5.18. This update backports those patches to optimize IOPS throttling for large block I/O and also fixes a bug that caused BPS to be counted twice.
BPF enhancements
Hash map support for
lookup_and_delete_elemBloom filter map type
CPU and memory hot-plugging
vCPU hot-add
Default online for hot-plugged memory
Intel HWP boost
The HWP I/O boost technology improves I/O performance. Previously, the Kernel enabled this feature only for some Skylake platforms and enterprise servers. This patch removes the CPU type check, enabling HWP boost by default for all CPUs.
HugeTLB Vmemmap Optimization (HVO)
HVO reduces the memory footprint of vmemmap for Huge Pages. It works by mapping the virtual addresses of all
struct pageinstances within a Huge Page to the same physical address, which frees the physical memory occupied by thosestruct pageinstances.Memcg LRU lock optimization
This feature optimizes scenarios that previously required a global LRU lock. Operations like page migration, memcg moves, swap-in, and swap-out now use a per-memcg lock instead. This significantly reduces contention on the global LRU lock, improving performance by approximately 50% in tests with multiple memcgs.
Kernel support for Intel TDX guests
You can now run the Linux Kernel in an Intel TDX guest. This provides the guest with features like memory encryption, memory integrity protection, CPU register protection, and remote attestation in a trusted environment.
EMR platform enhancements
PMU support for EMR platform
In-Field Scan (IFS) support
Custom enhancements
Transparent TCP acceleration with SMC
Shared Memory Communications (SMC) is a high-performance Kernel network protocol stack contributed by IBM to the upstream Linux Kernel. It can transparently accelerate TCP connections using shared memory technologies like RDMA. Building on the upstream version, Alibaba Cloud Kernel (ANCK) includes numerous stability fixes and adds several key features: SMCv2 is used by default, SMCv2.1 protocol negotiation is supported,
max_link/max_connand Alibaba vendor ID features are added, link connection counts are optimized, RQ flow control and RDMA Write With Immediate operations are supported, various diagnostic information is available, the SMC stack can be used via thePF_INETprotocol family, and transparent replacement via BPF is supported.FUSE cache consistency and statistics
FUSE pending requests debugging interface
FUSE request statistics interface
Enhanced cache consistency
Dentry invalidation notification
Close-to-Open (CTO) consistency model
Cache consistency in failover mode
EROFS enhancements
Support for 4k block size on Arm64
Direct mounting of tar files
Passing FUSE mount points across namespaces
This allows a non-privileged sidecar container to propagate its FUSE mount point into an application container, providing a FUSE-based solution for remote storage in cloud-native scenarios.
THP memory bloat mitigation
While THP can improve performance, it can also cause memory bloat, which may lead to Out of Memory (OOM) errors. For example, an application might only need 8 KiB of memory (two small pages), but the Kernel allocates a single THP. In this case, the remaining 510 small pages are unused, increasing the Resident Set Size (RSS) memory usage and potentially triggering an OOM error.
THP Zero Subpage Reclaim (ZSR) solves this problem. When the Kernel reclaims memory, this feature splits the THP into small pages and reclaims any zero subpages, which prevents rapid memory bloat and OOM errors.
System configuration updates
The value of
tcp_max_tw_bucketsis now 5000.The default character set for mounting the vfat file system is now iso8859-1.
Package updates
The aliyun-cli is now included by default.
The container-selinux package is now included by default.
Adds the anolis-epao-release package, which enables Alibaba Cloud Linux 3 to use the Anolis OS epao repository to install applications such as AI tools.
Bug fixes
Fixed an issue that prevented the
rngd.servicefrom starting on Alibaba Cloud Linux 3 arm64 images.Backported a fix from the Community Mainline for a cgroup leak caused by a failed process fork.
Fixed a permission issue in overlayfs. This issue occurred when
upperdirandlowerdirwere on the same filesystem and a file or directory was accessed without read permission. A logic error in a previous performance optimization causedovl_override_creds()to fail, preventing permissions from being elevated to those of the mounter. As a result, a copy-up operation would fail with an Insufficient Permissions error.Backported multiple bug fixes for fuse from the Community Mainline to improve its stability.
Backported multiple bug fixes from the community for ext4 when the
bigallocfeature is enabled. This update also significantly reduces the duration of online resizing in this scenario.Backported a community fix to resolve a potential data consistency issue caused by
CONT-PTE/PMD.Fixed an issue that prevented
resctrlfrom being used correctly on instances with AMD processors.Resolved a stability issue with the IAX hardware compression/decompression accelerator.
Fixed CRC validation failures in the IAX hardware compression/decompression accelerator.
Fixed a memory corruption issue caused by the improper use of the
swap_info_structlock during concurrentswapoffandswaponoperations. This fix has been merged into the upstream community.Fixed an issue that made the in-house zombie memcg reaper feature ineffective in
one-shotmode.Addressed a potential stability issue in the MPAM memory bandwidth monitoring feature on Yitian 710 processors.
Image updates
Container Image
alibaba-cloud-linux-3-registry.cn-hangzhou.cr.aliyuncs.com/alinux3/alinux3:3.8
alibaba-cloud-linux-3-registry.cn-hangzhou.cr.aliyuncs.com/alinux3/alinux3:latest
NoteAfter a new version is released, the
latesttag will no longer point to version 3.8.
Known issues
An update in ANCK 5.10-015 aligns a scheduler wakeup optimization with the upstream implementation. This change can cause a performance regression in certain edge cases, such as benchmarks under extremely high load. However, this regression does not affect typical user workloads.
Alibaba Cloud Linux 3.2104 U7
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux 3.2104 U7 | aliyun_3_x64_20G_alibase_20230516.vhd | 2023-05-16 |
|
aliyun_3_arm64_20G_alibase_20230515.vhd | 2023-05-15 |
|
Updates
Fixed kernel bugs and addressed critical security vulnerabilities (CVEs).
Added support for the multi-pcp feature to improve network packet reception performance by bypassing the buddy system's global lock.
Multi-pcp reserves higher-order (order > 0) memory pages on a per-core basis. This avoids allocations from the zone buddy system for these pages, bypassing the global lock and improving network packet reception performance.
Enabled the Intel IAA accelerator driver, improving compression and decompression performance.
The In-Memory Analytics Accelerator (IAA) is a hardware accelerator that combines basic data analysis functions with high-throughput compression/decompression. The driver code was adapted from the Intel repository for the ANCK kernel and includes bug fixes.
Fixed silent data loss in
shmemandhugetlbfile systems caused by Page Cache truncation.Previously, the kernel removed faulted pages in
shmemandhugetlbfrom the Page Cache. Subsequent access to the offset of the faulted page would allocate a new zero page, leading to silent data loss. This feature prevents this issue inshmem/tmpfsandhugetlbfile systems.Added support for the CoreSight ETE driver and the
tools/perfutility.Enhanced the signal handling mechanism in the KVM module on ARM64 platforms, fixing a system crash issue in scenarios such as RAS events.
If the
TIF_NOTIFY_RESUMEflag was not processed before the CPU entered Guest mode, frequent RAS events could trigger an exception and cause a system crash. This update implements the full generic entry infrastructure on ARM64 platforms to correctly handle pending work for a task.This update synchronizes the CMN/DRW driver with the mainline Linux community version, adds debugfs support, and fixes related defects.
Before version 5.10-014, the CMN/DRW driver diverged from the community version. To reduce future maintenance costs, version 5.10-014 synchronizes with the community driver and adds compatibility for the CMN700 in Yitian 710 processors. This update also adds debugfs support and fixes, allowing you to view the CMN topology in User Mode.
Added support for MCE error recovery during Copy on Write (COW) operations in Kernel Mode on x86 platforms.
Previously, if an uncorrectable error occurred during a kernel Copy on Write (COW) operation, the system would crash because there was no recovery handler for such errors. This feature adds a recovery handler that sends a
SIGBUSsignal to the application, preventing a system crash.Added support for the
perf metricfeature and top-down performance analysis tools.To improve CPU PMU usability and help users identify CPU performance bottlenecks, version 5.10-014 adds the
perf metricfeature and supports top-down metrics for Yitian 710, Kunpeng, and x86 platforms.virtio-netnow supports USO offloading.Compared to UFO offloading, USO improves packet reception performance and the forwarding performance of network components in a complex network environment. In network conditions with instability, incast traffic, or significant bursts, USO effectively reduces the packet loss rate caused by fragment reassembly and lowers the overhead of reassembly at the receiving end. At the same time, packet loss and out-of-order delivery can also degrade the efficiency of forwarding components due to fragment reassembly. USO helps mitigate this problem.
Fixed an issue on the aarch64 architecture where the virtual address space was exhausted because
pci_iounmapwas not implemented.Before version 5.10-014, the
pci_iounmapfunction was empty becauseCONFIG_GENERIC_IOMAPwas not configured. This prevented the system from releasing mapped memory, leading to virtual address space exhaustion. Version 5.10-014 fixes this issue by correctly implementing thepci_iounmapfunction.Added support for high-performance ublk.
ublkis a high-performance user-space block device based on theio_uringpassthrough mechanism. It provides efficient agent access in distributed storage.Added support for the following self-developed Alibaba Cloud technologies:
Added a feature to lock code segments at the system-wide or
memcglevel.When memory usage is high, memory reclaim is triggered. During this process, the system can reclaim the memory that holds the code segments of core business applications. As the application continues to run, these code segments are reloaded from disk into memory. Frequent I/O operations can cause response delays and performance fluctuations. To prevent this issue, this feature lets you lock the code segments of core applications within a specified cgroup, making them non-reclaimable. It also includes a quota limit, which can be set as a percentage to control the amount of locked code segment memory.
Introduced a Page Cache usage limit to resolve Out of Memory (OOM) issues that occur when the cache grows faster than the system can reclaim it.
In containerized environments, available memory is limited. If the Page Cache consumes too much memory and triggers memory reclaim, an OOM error can occur if the reclamation rate is slower than the application's growing memory demand, which severely impacts performance. This feature addresses the problem by limiting the Page Cache size for a container and proactively reclaiming memory that exceeds the limit. The solution supports both cgroup-level and global Page Cache usage limits and offers both synchronous and asynchronous reclamation methods for flexibility.
Added support for dynamic CPU Isolation.
CPU Isolation allows you to assign different CPU cores or sets of cores to different tasks, preventing them from competing for CPU resources and thereby improving overall system performance and stability. You can isolate a subset of CPUs for key tasks, while non-critical tasks share the remaining CPUs. However, the number of key tasks can change during runtime. Isolating too many CPUs wastes resources and increases costs. This feature enables dynamic CPU Isolation, which lets you modify the isolation scope at any time to better utilize CPU resources, save costs, and improve overall business performance.
Added support for CPU Burst and tiered memory-low watermarks in cgroup v2.
To promote the adoption of cgroup v2, we have ported interfaces for various self-developed ANCK technologies to cgroup v2, including CPU Burst and tiered memory-low watermarks.
Enabled
xdpsockets to allocate virtual memory for queues, preventing allocation failures caused by memory fragmentation.By default,
xdpsockets use__get_free_pages()to allocate contiguous physical memory. If the machine's memory is highly fragmented, this allocation can easily fail, preventingxdpsocket creation. This feature usesvmalloc()to allocate memory, reducing the likelihood ofxdpsocket creation failure.
Alibaba Cloud Linux 3.2104 U6.1
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux 3.2104 U6.1 | aliyun_3_x64_20G_alibase_20230424.vhd | 2023-04-24 |
|
aliyun_3_arm64_20G_alibase_20230424.vhd | 2023-04-24 |
| |
aliyun_3_x64_20G_alibase_20230327.vhd | 2023-03-27 |
| |
aliyun_3_arm64_20G_alibase_20230327.vhd | 2023-03-27 |
|
Alibaba Cloud Linux 3.2104 U6
Version number | Image ID | Release date | Release notes |
Alibaba Cloud Linux 3.2104 U6 | aliyun_3_x64_20G_qboot_alibase_20230214.vhd | 2023-02-14 |
|
aliyun_3_x64_20G_uefi_alibase_20230214.vhd | 2023-02-14 |
| |
aliyun_3_x64_20G_alibase_20230110.vhd | 2023-01-10 |
| |
aliyun_3_arm64_20G_alibase_20230110.vhd | 2023-01-10 |
|
2022
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux 3.5.2 | aliyun_3_x64_20G_alibase_20221118.vhd | 2022-11-18 | Updated the |
aliyun_3_arm64_20G_alibase_20221118.vhd | 2022-11-18 | Updated the | |
aliyun_3_x64_20G_alibase_20221102.vhd | 2022-11-02 |
| |
aliyun_3_arm64_20G_alibase_20221102.vhd | 2022-11-02 |
| |
Alibaba Cloud Linux 3.5 | aliyun_3_x64_20G_alibase_20220907.vhd | 2022-09-07 |
|
aliyun_3_arm64_20G_alibase_20220907.vhd | 2022-09-07 |
| |
aliyun_3_x64_20G_qboot_alibase_20220907.vhd | 2022-09-07 |
| |
aliyun_3_x64_20G_uefi_alibase_20220907.vhd | 2022-09-07 |
| |
Alibaba Cloud Linux 3.4.2 | aliyun_3_arm64_20G_alibase_20220819.vhd | 2022-08-19 |
|
aliyun_3_x64_20G_alibase_20220815.vhd | 2022-08-15 |
| |
Alibaba Cloud Linux 3.4.1 | aliyun_3_x64_20G_alibase_20220728.vhd | 2022-07-28 |
|
aliyun_3_arm64_20G_alibase_20220728.vhd | 2022-07-28 |
| |
Alibaba Cloud Linux 3.4 | aliyun_3_x64_20G_alibase_20220527.vhd | 2022-05-27 |
|
aliyun_3_x64_20G_qboot_alibase_20220527.vhd | 2022-05-27 |
| |
aliyun_3_x64_20G_uefi_alibase_20220527.vhd | 2022-05-27 |
| |
aliyun_3_arm64_20G_alibase_20220526.vhd | 2022-05-26 |
| |
Alibaba Cloud Linux 3.3.4 | aliyun_3_x64_20G_alibase_20220413.vhd | 2022-04-13 |
|
aliyun_3_arm64_20G_alibase_20220413.vhd | 2022-04-13 |
| |
Alibaba Cloud Linux 3.3.3 | aliyun_3_x64_20G_alibase_20220315.vhd | 2022-03-15 |
|
aliyun_3_arm64_20G_alibase_20220315.vhd | 2022-03-15 |
| |
Alibaba Cloud Linux 3.3.2 | aliyun_3_x64_20G_alibase_20220225.vhd | 2022-02-25 |
|
aliyun_3_x64_20G_qboot_alibase_20220225.vhd | 2022-02-25 |
| |
aliyun_3_arm64_20G_alibase_20220225.vhd | 2022-02-25 |
| |
aliyun_3_x64_20G_uefi_alibase_20220225.vhd | 2022-02-25 |
|
2021
Version | Image ID | Release date | Updates |
Alibaba Cloud Linux 3.2 | aliyun_3_x64_20G_qboot_alibase_20211214.vhd | 2021-12-14 |
|
aliyun_3_x64_20G_alibase_20210910.vhd | 2021-09-10 |
| |
aliyun_3_arm64_20G_alibase_20210910.vhd | 2021-09-10 |
| |
aliyun_3_x64_20G_uefi_alibase_20210910.vhd | 2021-09-10 |
| |
Alibaba Cloud Linux 3.1 | aliyun_3_arm64_20G_alibase_20210709.vhd | 2021-07-09 |
|
aliyun_3_x64_20G_alibase_20210425.vhd | 2021-04-25 |
| |
aliyun_3_x64_20G_uefi_alibase_20210425.vhd | 2021-04-25 |
| |
Alibaba Cloud Linux 3 | aliyun_3_x64_20G_alibase_20210415.vhd | 2021-04-15 |
|
Related topics
Release notes for third-party and open-source Public Images.
How to create an instance using the latest Alibaba Cloud Linux (Alinux) 3 image.