Microsoft announced Azure Linux 4, now built on Fedora, while Fedora’s Fedora Engineering Steering Committee voted to retire the Deepin Desktop Environment after security concerns. The shift reshapes the Linux ecosystem for cloud VMs and highlights the importance of upstream security vetting.
Microsoft adopts Fedora as upstream for Azure Linux 4 while Fedora retires Deepin Desktop

What happened
Microsoft unveiled Azure Linux 4, the latest version of its in‑house Linux offering for Azure virtual machines. For the first time the distro is based on Fedora, moving away from the minimal CBL‑Mariner stack that powered earlier releases. At the same time, Fedora’s Engineering Steering Committee (FESCo) voted to retire all packages maintained by the deepinde‑sig group, effectively removing the Deep in Desktop Environment (DDE) from the Fedora project.
Legal and regulatory backdrop
Both moves intersect with data‑protection obligations that cloud providers and Linux distributors must respect:
- GDPR Art. 32 requires controllers and processors to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk. Using a well‑maintained upstream such as Fedora helps meet this duty because security patches are delivered promptly and the codebase is subject to public audit.
- CCPA § 1798.150 obliges businesses to adopt reasonable security procedures and to disclose any material changes to their privacy‑related practices. Microsoft’s public announcement and the requirement for customers to register interest in Azure Linux 4 constitute a transparent change‑of‑service notice under the act.
- Fedora’s decision to drop Deepin follows a prior security review that identified unresolved vulnerabilities. By removing a component that could not be adequately vetted, Fedora avoids exposing downstream users to compliance risk under both GDPR and CCA‑related breach‑notification rules.
Impact on users and companies
Azure customers
- Improved security posture – Fedora’s rapid release cadence means security updates are typically available within days of discovery. Azure customers can now inherit this cadence without having to manage a separate patch stream.
- Compatibility shift – Existing workloads that were tuned for CBL‑Mariner may need minor adjustments to accommodate Fedora’s glibc version and default package set. Microsoft has promised migration tooling, but organisations should test critical services before the Build conference rollout.
- Data‑protection compliance – Leveraging a mainstream upstream eases auditors’ work. Evidence of upstream patch timelines can be cited when demonstrating GDPR‑compliant risk mitigation.
Fedora users and downstream distributors
- Loss of Deepin – Projects that built custom spins or images around DDE must now either maintain the desktop themselves or switch to an alternative such as GNOME or KDE. The removal eliminates a potential attack surface that had previously been flagged in security assessments.
- Clearer maintenance responsibilities – By pruning external SIGs that lack a Red Hat‑backed maintainer, Fedora reduces the likelihood of orphaned packages lingering in the repository, a common source of unpatched vulnerabilities.
The broader Linux ecosystem
- Microsoft’s dual‑distro strategy – Azure Linux 4 (Fedora‑based) and Azure Container Linux (Flatcar‑based) give Microsoft flexibility: a general‑purpose server OS for traditional VMs and an immutable OS for container workloads. The split mirrors the industry trend of separating mutable and immutable workloads for security isolation.
- Potential consolidation – With Flatcar already derived from CoreOS, which itself migrated to Fedora CoreOS, Microsoft may eventually converge the two codebases. Such a move would simplify compliance reporting and reduce duplication of effort.
What changes are coming
- Azure Linux 4 GA – Expected at the Microsoft Build conference in June 2026. Customers will receive a Fedora‑based image with the latest stable release (Fedora 40 at the time of writing) and a set of Azure‑specific drivers.
- Migration guidance – Microsoft has opened a registration portal where interested parties can request early‑access binaries and migration scripts. Documentation will detail how to transition from CBL‑Mariner to Fedora, including steps to re‑configure SELinux policies and update package repositories.
- Fedora’s security policy update – Following the Deepin removal, Fedora will publish a revised SIG onboarding checklist that requires at least one Red Hat‑affiliated maintainer for any external desktop environment. This policy aims to prevent future security‑review failures.
- Audit‑ready artefacts – Both Microsoft and Fedora will provide SBOMs (Software Bill of Materials) for the new releases, helping enterprises satisfy GDPR’s requirement to maintain an inventory of processing components.
Bottom line
Microsoft’s decision to base Azure Linux 4 on Fedora strengthens the security foundation of Azure’s Linux VMs and aligns the service with European data‑protection expectations. Fedora’s removal of the Deepin Desktop Environment demonstrates a proactive stance on upstream security hygiene, reducing risk for downstream users and simplifying compliance audits. Organizations running workloads on Azure or Fedora should review the upcoming migration guides, update their risk assessments, and prepare to leverage the new SBOMs for regulatory reporting.

Comments
Please log in or register to join the discussion