<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[pfSense CE 2.8 Release Candidate is Here!]]></title><description><![CDATA[<p dir="auto">The Release Candidate for pfSense CE 2.8 is now available for testing!</p>
<p dir="auto">We're excited to introduce several major improvements:</p>
<p dir="auto"><img src="https://forum.netgate.com/assets/plugins/nodebb-plugin-emoji/emoji/android/2705.png?v=d0a5ddc94ac" class="not-responsive emoji emoji-android emoji--white_check_mark" style="height:23px;width:auto;vertical-align:middle" title="✅" alt="✅" /> New PPPoE Driver: Experience dramatic performance increases and reduced CPU usage for PPPoE connections, especially beneficial for multi-gigabit WAN links<br />
<img src="https://forum.netgate.com/assets/plugins/nodebb-plugin-emoji/emoji/android/2705.png?v=d0a5ddc94ac" class="not-responsive emoji emoji-android emoji--white_check_mark" style="height:23px;width:auto;vertical-align:middle" title="✅" alt="✅" /> NAT64: Seamlessly connect IPv6-only networks with IPv4 resources through advanced translation capabilities<br />
<img src="https://forum.netgate.com/assets/plugins/nodebb-plugin-emoji/emoji/android/2705.png?v=d0a5ddc94ac" class="not-responsive emoji emoji-android emoji--white_check_mark" style="height:23px;width:auto;vertical-align:middle" title="✅" alt="✅" /> Kea Integration: The next-generation DHCP server is now fully integrated, replacing the deprecated ISC DHCPd with improved functionality</p>
<p dir="auto">Thank you to all users willing to test this release candidate. Your community involvement is essential to making pfSense a stronger solution for everyone!</p>
<p dir="auto">Release Notes with more details on these improvements are available here:<br />
https://docs.netgate.com/pfsense/en/latest/releases/2-8-0.html</p>
]]></description><link>https://forum.netgate.com/topic/197522/pfsense-ce-2-8-release-candidate-is-here</link><generator>RSS for Node</generator><lastBuildDate>Mon, 20 Apr 2026 03:12:40 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/197522.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 20 May 2025 21:58:04 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to pfSense CE 2.8 Release Candidate is Here! on Wed, 28 May 2025 16:11:17 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/sergei_shablovsky">@<bdi>Sergei_Shablovsky</bdi></a> said in <a href="/post/1215679">pfSense CE 2.8 Release Candidate is Here!</a>:</p>
<blockquote>
<p dir="auto">So, as a solution You propose me just…to stop using ntopng ? Seriously ?</p>
</blockquote>
<p dir="auto">If the unexposed redis vulnerabilities concern you, then yes, I definitely suggest that you stop using ntopng. There are likely much worse vulnerabilities, known and unknown, in ntopng itself.</p>
<p dir="auto">Running any add-on package increases risk, and ntopng is a large and complicated piece of code which brings a higher level of risk than most. Of course, you have to decide for yourself what level of risk you are willing to operate with.</p>
<p dir="auto">FWIW, as a whole I recommend use of ntopng as a diagnostic tool only. I do not recommend it as something for continual, routine operation.</p>
<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/sergei_shablovsky">@<bdi>Sergei_Shablovsky</bdi></a> said in <a href="/post/1215679">pfSense CE 2.8 Release Candidate is Here!</a>:</p>
<blockquote>
<p dir="auto">I clearly understand that most of this CVEs are out of Netgate’s obligation. But is this mean the current 2.8.0 would be in BETA until all of this CVEs would be resolved by developer’s community ?</p>
</blockquote>
<p dir="auto">No. It is not practical to stop the release of pfSense because there is a vulnerability in an add-on provided by the community. pfSense itself would never release.</p>
<p dir="auto">If you want to go down that path, a much more practical  approach would be for Netgate to remove the add-on from the repository until all vulnerabilities in the component and all of its dependencies were remediated. Ouch.</p>
]]></description><link>https://forum.netgate.com/post/1215723</link><guid isPermaLink="true">https://forum.netgate.com/post/1215723</guid><dc:creator><![CDATA[dennypage]]></dc:creator><pubDate>Wed, 28 May 2025 16:11:17 GMT</pubDate></item><item><title><![CDATA[Reply to pfSense CE 2.8 Release Candidate is Here! on Wed, 28 May 2025 10:54:14 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/dennypage">@<bdi>dennypage</bdi></a> said in <a href="/post/1215471">pfSense CE 2.8 Release Candidate is Here!</a>:</p>
<blockquote>
<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/sergei_shablovsky">@<bdi>Sergei_Shablovsky</bdi></a> said in <a href="/post/1215439">pfSense CE 2.8 Release Candidate is Here!</a>:</p>
<blockquote>
<p dir="auto">redis-7.4.1 is vulnerable:<br />
redis,valkey -- Denial-of-service valnerability due to malformed ACL selectors<br />
CVE: CVE-2024-51741<br />
WWW: https://vuxml.FreeBSD.org/freebsd/4d79fd1a-cc93-11ef-abed-08002784c58d.html</p>
<p dir="auto">redis,valkey -- Remote code execution valnerability<br />
CVE: CVE-2024-46981<br />
WWW: https://vuxml.FreeBSD.org/freebsd/5f19ac58-cc90-11ef-abed-08002784c58d.html</p>
<p dir="auto">redis,valkey -- DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client<br />
CVE: CVE-2025-21605<br />
WWW: https://vuxml.FreeBSD.org/freebsd/af8d043f-20df-11f0-b9c5-000c295725e4.html</p>
</blockquote>
<p dir="auto">If the redis vulnerabilities are of concern, you can completely remediate them by uninstalling the ntopng package. <img src="https://forum.netgate.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=d0a5ddc94ac" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":slightly_smiling_face:" alt="🙂" /></p>
</blockquote>
<p dir="auto">So, as a solution You propose me just…to stop using ntopng ? Seriously ?</p>
<blockquote>
<p dir="auto">FWIW, the vuls listed don't actually impact the system as redis is started as a local-only embedded server, used only by ntopng.</p>
</blockquote>
<p dir="auto">Of course, I clearly understand that <strong>most of this CVEs are out of Netgate’s obligation</strong>. But <strong>is this mean the current 2.8.0 would be in BETA until all of this CVEs would be resolved</strong> by developer’s community ?</p>
<p dir="auto">P.S.<br />
Of course, agree with You, <a class="plugin-mentions-user plugin-mentions-a" href="/user/dennypage">@<bdi>dennypage</bdi></a> if You say that NetFlow are better to use instead of a little outdated ntopng. Agree ?</p>
]]></description><link>https://forum.netgate.com/post/1215679</link><guid isPermaLink="true">https://forum.netgate.com/post/1215679</guid><dc:creator><![CDATA[Sergei_Shablovsky]]></dc:creator><pubDate>Wed, 28 May 2025 10:54:14 GMT</pubDate></item><item><title><![CDATA[Reply to pfSense CE 2.8 Release Candidate is Here! on Sun, 25 May 2025 17:17:36 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/sergei_shablovsky">@<bdi>Sergei_Shablovsky</bdi></a> said in <a href="/post/1215439">pfSense CE 2.8 Release Candidate is Here!</a>:</p>
<blockquote>
<p dir="auto">redis-7.4.1 is vulnerable:<br />
redis,valkey -- Denial-of-service valnerability due to malformed ACL selectors<br />
CVE: CVE-2024-51741<br />
WWW: https://vuxml.FreeBSD.org/freebsd/4d79fd1a-cc93-11ef-abed-08002784c58d.html</p>
<p dir="auto">redis,valkey -- Remote code execution valnerability<br />
CVE: CVE-2024-46981<br />
WWW: https://vuxml.FreeBSD.org/freebsd/5f19ac58-cc90-11ef-abed-08002784c58d.html</p>
<p dir="auto">redis,valkey -- DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client<br />
CVE: CVE-2025-21605<br />
WWW: https://vuxml.FreeBSD.org/freebsd/af8d043f-20df-11f0-b9c5-000c295725e4.html</p>
</blockquote>
<p dir="auto">If the redis vulnerabilities are of concern, you can completely remediate them by uninstalling the ntopng package. <img src="https://forum.netgate.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=d0a5ddc94ac" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":slightly_smiling_face:" alt="🙂" /></p>
<p dir="auto">FWIW, the vuls listed don't actually impact the system as redis is started as a local-only embedded server, used only by ntopng.</p>
]]></description><link>https://forum.netgate.com/post/1215471</link><guid isPermaLink="true">https://forum.netgate.com/post/1215471</guid><dc:creator><![CDATA[dennypage]]></dc:creator><pubDate>Sun, 25 May 2025 17:17:36 GMT</pubDate></item><item><title><![CDATA[Reply to pfSense CE 2.8 Release Candidate is Here! on Sun, 25 May 2025 09:31:19 GMT]]></title><description><![CDATA[<p dir="auto">Dear pfSense Dev Team!</p>
<p dir="auto">Are You planning to resolving this CVEs ? In which version ?</p>
<pre><code>pkg audit -F

vulnxml file up-to-date
libxslt-1.1.37_1 is vulnerable:
  libxslt -- multiple vulnerabilities
  CVE: CVE-2025-24855
  CVE: CVE-2024-55549
  WWW: https://vuxml.FreeBSD.org/freebsd/a96cd659-303e-11f0-94b5-54ee755069b5.html

git-2.47.1 is vulnerable:
  git -- multiple vulnerabilities
  CVE: CVE-2024-52006
  CVE: CVE-2024-50349
  WWW: https://vuxml.FreeBSD.org/freebsd/3445e4b6-d2b8-11ef-9ff3-43c2b5d6c4c8.html

vim-9.1.0915 is vulnerable:
  vim -- Potential code execution
  WWW: https://vuxml.FreeBSD.org/freebsd/398d1ec1-f7e6-11ef-bb15-002590af0794.html

  vim -- potential data loss with zip.vim and specially crafted zip files
  CVE: CVE-2025-29768
  WWW: https://vuxml.FreeBSD.org/freebsd/9cf03c96-ffa5-11ef-bb15-002590af0794.html

  vim -- Improper Input Validation in Vim
  CVE: CVE-2025-27423
  WWW: https://vuxml.FreeBSD.org/freebsd/2ec7816d-fdb7-11ef-91ff-b42e991fc52e.html

python311-3.11.11 is vulnerable:
  cpython -- Use-after-free in "unicode_escape" decoder with error handler
  CVE: CVE-2025-4516
  WWW: https://vuxml.FreeBSD.org/freebsd/e587b52d-38ac-11f0-b7b6-dcfe074bd614.html

postgresql16-client-16.6 is vulnerable:
  PostgreSQL -- PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation
  CVE: CVE-2025-4207
  WWW: https://vuxml.FreeBSD.org/freebsd/78b8e808-2c45-11f0-9a65-6cc21735f730.html

  PostgreSQL -- PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
  CVE: CVE-2025-1094
  WWW: https://vuxml.FreeBSD.org/freebsd/fadf3b41-ea19-11ef-a540-6cc21735f730.html

suricata-7.0.8 is vulnerable:
  suricata -- Multiple vulnerabilities
  CVE: CVE-2025-29918
  CVE: CVE-2025-29917
  CVE: CVE-2025-29916
  CVE: CVE-2025-29915
  WWW: https://vuxml.FreeBSD.org/freebsd/1d53db32-0d60-11f0-8542-b42e991fc52e.html

redis-7.4.1 is vulnerable:
  redis,valkey -- Denial-of-service valnerability due to malformed ACL selectors
  CVE: CVE-2024-51741
  WWW: https://vuxml.FreeBSD.org/freebsd/4d79fd1a-cc93-11ef-abed-08002784c58d.html

  redis,valkey -- Remote code execution valnerability
  CVE: CVE-2024-46981
  WWW: https://vuxml.FreeBSD.org/freebsd/5f19ac58-cc90-11ef-abed-08002784c58d.html

  redis,valkey -- DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client
  CVE: CVE-2025-21605
  WWW: https://vuxml.FreeBSD.org/freebsd/af8d043f-20df-11f0-b9c5-000c295725e4.html

12 problem(s) in 7 installed package(s) found.
</code></pre>
]]></description><link>https://forum.netgate.com/post/1215439</link><guid isPermaLink="true">https://forum.netgate.com/post/1215439</guid><dc:creator><![CDATA[Sergei_Shablovsky]]></dc:creator><pubDate>Sun, 25 May 2025 09:31:19 GMT</pubDate></item><item><title><![CDATA[Reply to pfSense CE 2.8 Release Candidate is Here! on Fri, 23 May 2025 02:46:49 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/steveits">@<bdi>SteveITS</bdi></a> You are correct. The SG1100 is an arm product - however I run my CE variant on an Intel x86 platform. Even though I test on the home lab - I still like to have something to use if the CE RC gets completely borked. <img src="https://forum.netgate.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f609.png?v=d0a5ddc94ac" class="not-responsive emoji emoji-android emoji--wink" style="height:23px;width:auto;vertical-align:middle" title="😉" alt="😉" /></p>
]]></description><link>https://forum.netgate.com/post/1215349</link><guid isPermaLink="true">https://forum.netgate.com/post/1215349</guid><dc:creator><![CDATA[originalradman]]></dc:creator><pubDate>Fri, 23 May 2025 02:46:49 GMT</pubDate></item><item><title><![CDATA[Reply to pfSense CE 2.8 Release Candidate is Here! on Fri, 23 May 2025 02:36:30 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/originalradman">@<bdi>originalradman</bdi></a> The 1100’s ARM based…</p>
]]></description><link>https://forum.netgate.com/post/1215348</link><guid isPermaLink="true">https://forum.netgate.com/post/1215348</guid><dc:creator><![CDATA[SteveITS]]></dc:creator><pubDate>Fri, 23 May 2025 02:36:30 GMT</pubDate></item><item><title><![CDATA[Reply to pfSense CE 2.8 Release Candidate is Here! on Fri, 23 May 2025 02:14:02 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/pfgeorge">@<bdi>pfGeorge</bdi></a> Time to fire up the old sg1100 (so it can be used as a backup) so I can try this out! Thanks for everything.</p>
]]></description><link>https://forum.netgate.com/post/1215347</link><guid isPermaLink="true">https://forum.netgate.com/post/1215347</guid><dc:creator><![CDATA[originalradman]]></dc:creator><pubDate>Fri, 23 May 2025 02:14:02 GMT</pubDate></item><item><title><![CDATA[Reply to pfSense CE 2.8 Release Candidate is Here! on Tue, 20 May 2025 23:24:59 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/pfgeorge">@<bdi>pfGeorge</bdi></a> is Kea therefore considered stable now?</p>
]]></description><link>https://forum.netgate.com/post/1215165</link><guid isPermaLink="true">https://forum.netgate.com/post/1215165</guid><dc:creator><![CDATA[SteveITS]]></dc:creator><pubDate>Tue, 20 May 2025 23:24:59 GMT</pubDate></item></channel></rss>