VyOS 1.4.0 General Availability
Details
Yesterday
Mon, Apr 14
Sun, Apr 13
Mar 28 2025
Mar 17 2025
MITRE has assigned CVE-2025-30095.
Mar 14 2025
Did you have a chance to testing ?
Mar 13 2025
Looks like it was assigned too restrictively before.
Hi there,
Mar 10 2025
Mar 6 2025
Is there anyone else we should tag on this ticket?
Mar 5 2025
Mar 4 2025
@daniel.arconada can you check this? The latest rolling has these modules.
vyos@vpp-left:~$ zcat /proc/config.gz | grep -i vdpa CONFIG_VIRTIO_VDPA=m CONFIG_VDPA=m # CONFIG_VDPA_USER is not set # CONFIG_MLX5_VDPA_NET is not set # CONFIG_MLX5_VDPA_STEERING_DEBUG is not set # CONFIG_VP_VDPA is not set # CONFIG_ALIBABA_ENI_VDPA is not set # CONFIG_SNET_VDPA is not set CONFIG_VHOST_VDPA=m vyos@vpp-left:~$ vyos@vpp-left:~$ show ver Version: VyOS 1.5-rolling-202503020018
Feb 24 2025
@Viacheslav Yes, I will test it once it is included in the next rolling release.
Feb 22 2025
Feb 20 2025
@daniel.arconada are you able to test it with the next rolling release? Those options will be included.
@daniel.arconada are you able to test it with the next rolling release? Those options will be included.
Feb 19 2025
Both kernel and user-space support are needed. On the kernel side, you must enable vDPA-related options (e.g., CONFIG_VDPA and/or CONFIG_VHOST_VDPA) to provide the necessary infrastructure. On the user-space side, binaries that interact with VirtIO devices must be updated to take advantage of this support. For example, QEMU needs to be built with vDPA support so that virtual machines can offload packet processing to the hardware accelerator. Additionally, tools like libvirt or other management utilities might require adjustments to properly configure and utilize vDPA-enabled devices.
Is there any kernel option that should be enabled, or just some binaries or both of them?
Feb 18 2025
Feb 11 2025
Feb 10 2025
Jan 21 2025
Jan 3 2025
Dec 27 2024
Nov 25 2024
I’d expect the behavior is correct now. There shouldn't be empty nodes. As some of them uses “default values” and system can see it as partly configured,
In any case the check is here https://github.com/vyos/vyos-1x/blob/ec18cc393591052fd1f021c4a62220ab2e537a2e/src/conf_mode/service_ntp.py#L68
Nov 24 2024
Nov 20 2024
Nov 1 2024
Oct 31 2024
Oct 30 2024
Oct 29 2024
FTR --ncp-disable was only supposed to disable the cipher negotiation. It was not meant to disable encryption entirely. --data-ciphers none is the way to go, but it seems you've already figure this out.