<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://www.flatcar.org/</id>
  <title>Flatcar :: beta</title>
  <updated>2026-03-09T16:26:26.866843+00:00</updated>
  <author>
    <name>Flatcar Container Linux</name>
    <email>maintainers@flatcar-linux.org</email>
  </author>
  <link href="https://www.flatcar.org/" rel="self"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <logo>https://www.flatcar.org/media/brand-logo.svg</logo>
  <subtitle>Flatcar Container Linux release feed</subtitle>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4593.1.0</id>
    <title>4593.1.0</title>
    <updated>2026-03-09T16:26:28.474787+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4547.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23145">CVE-2026-23145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23144">CVE-2026-23144</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23142">CVE-2026-23142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23141">CVE-2026-23141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23054">CVE-2026-23054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23053">CVE-2026-23053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23050">CVE-2026-23050</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23049">CVE-2026-23049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71196">CVE-2025-71196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71195">CVE-2025-71195</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23055">CVE-2026-23055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71193">CVE-2025-71193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71194">CVE-2025-71194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23038">CVE-2026-23038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23037">CVE-2026-23037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23026">CVE-2026-23026</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23025">CVE-2026-23025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71191">CVE-2025-71191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71190">CVE-2025-71190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71189">CVE-2025-71189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71188">CVE-2025-71188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23035">CVE-2026-23035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23033">CVE-2026-23033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23032">CVE-2026-23032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23031">CVE-2026-23031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23030">CVE-2026-23030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71185">CVE-2025-71185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71186">CVE-2025-71186</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23003">CVE-2026-23003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23002">CVE-2026-23002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23000">CVE-2026-23000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22999">CVE-2026-22999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22998">CVE-2026-22998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22997">CVE-2026-22997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22996">CVE-2026-22996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23013">CVE-2026-23013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23011">CVE-2026-23011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23010">CVE-2026-23010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23006">CVE-2026-23006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23005">CVE-2026-23005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71162">CVE-2025-71162</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71163">CVE-2025-71163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23135">CVE-2026-23135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23133">CVE-2026-23133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23131">CVE-2026-23131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23121">CVE-2026-23121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23120">CVE-2026-23120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23119">CVE-2026-23119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23116">CVE-2026-23116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23129">CVE-2026-23129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23128">CVE-2026-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23126">CVE-2026-23126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23125">CVE-2026-23125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23124">CVE-2026-23124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23123">CVE-2026-23123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71200">CVE-2025-71200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23113">CVE-2026-23113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23089">CVE-2026-23089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23098">CVE-2026-23098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23097">CVE-2026-23097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23096">CVE-2026-23096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23095">CVE-2026-23095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23094">CVE-2026-23094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23110">CVE-2026-23110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23091">CVE-2026-23091</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23108">CVE-2026-23108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23107">CVE-2026-23107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23105">CVE-2026-23105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23103">CVE-2026-23103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23101">CVE-2026-23101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23099">CVE-2026-23099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23090">CVE-2026-23090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23062">CVE-2026-23062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23061">CVE-2026-23061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23060">CVE-2026-23060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23059">CVE-2026-23059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23058">CVE-2026-23058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23057">CVE-2026-23057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23088">CVE-2026-23088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23087">CVE-2026-23087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23086">CVE-2026-23086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23085">CVE-2026-23085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23084">CVE-2026-23084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23083">CVE-2026-23083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23056">CVE-2026-23056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23082">CVE-2026-23082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23080">CVE-2026-23080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23078">CVE-2026-23078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23076">CVE-2026-23076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23075">CVE-2026-23075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23073">CVE-2026-23073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71199">CVE-2025-71199</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23072">CVE-2026-23072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23071">CVE-2026-23071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23069">CVE-2026-23069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23068">CVE-2026-23068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23065">CVE-2026-23065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23064">CVE-2026-23064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23063">CVE-2026-23063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71197">CVE-2025-71197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71198">CVE-2025-71198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23212">CVE-2026-23212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23173">CVE-2026-23173</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23172">CVE-2026-23172</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23155">CVE-2026-23155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23154">CVE-2026-23154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23151">CVE-2026-23151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23150">CVE-2026-23150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23170">CVE-2026-23170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23168">CVE-2026-23168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23167">CVE-2026-23167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23166">CVE-2026-23166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23148">CVE-2026-23148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23164">CVE-2026-23164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23163">CVE-2026-23163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23161">CVE-2026-23161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23160">CVE-2026-23160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23159">CVE-2026-23159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23158">CVE-2026-23158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23156">CVE-2026-23156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23146">CVE-2026-23146</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23118">CVE-2026-23118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57881">CVE-2024-57881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53690">CVE-2024-53690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52319">CVE-2024-52319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-51729">CVE-2024-51729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49573">CVE-2024-49573</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56788">CVE-2024-56788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56368">CVE-2024-56368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54455">CVE-2024-54455</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54193">CVE-2024-54193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41149">CVE-2024-41149</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56714">CVE-2024-56714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56713">CVE-2024-56713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56712">CVE-2024-56712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56710">CVE-2024-56710</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56711">CVE-2024-56711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23216">CVE-2026-23216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23215">CVE-2026-23215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23214">CVE-2026-23214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23213">CVE-2026-23213</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71228">CVE-2025-71228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23219">CVE-2026-23219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71225">CVE-2025-71225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23206">CVE-2026-23206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71222">CVE-2025-71222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23180">CVE-2026-23180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23179">CVE-2026-23179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23178">CVE-2026-23178</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23177">CVE-2026-23177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23176">CVE-2026-23176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23205">CVE-2026-23205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23204">CVE-2026-23204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23202">CVE-2026-23202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23201">CVE-2026-23201</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23200">CVE-2026-23200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23199">CVE-2026-23199</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23198">CVE-2026-23198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23193">CVE-2026-23193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71224">CVE-2025-71224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23190">CVE-2026-23190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23189">CVE-2026-23189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23188">CVE-2026-23188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23187">CVE-2026-23187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23182">CVE-2026-23182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71223">CVE-2025-71223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71220">CVE-2025-71220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71203">CVE-2025-71203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71204">CVE-2025-71204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23112">CVE-2026-23112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23111">CVE-2026-23111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23220">CVE-2026-23220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71237">CVE-2025-71237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71236">CVE-2025-71236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71235">CVE-2025-71235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71234">CVE-2025-71234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71233">CVE-2025-71233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71232">CVE-2025-71232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71231">CVE-2025-71231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23230">CVE-2026-23230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23229">CVE-2026-23229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23228">CVE-2026-23228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23224">CVE-2026-23224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23223">CVE-2026-23223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23222">CVE-2026-23222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71229">CVE-2025-71229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23237">CVE-2026-23237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23238">CVE-2026-23238</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23236">CVE-2026-23236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23235">CVE-2026-23235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23234">CVE-2026-23234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23233">CVE-2026-23233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71238">CVE-2025-71238</a>)</li>
<li>gnupg (<a href="https://www.cve.org/CVERecord/?id=CVE-2025-68972">CVE-2025-68972</a>, <a href="https://www.cve.org/CVERecord/?id=CVE-2025-68973">CVE-2025-68973</a>, <a href="https://gpg.fail/notdash">gnupg-20251228-notdash</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Enabled back PAM sssd support for LDAP authentication (<a href="https://github.com/flatcar/scripts/pull/3696">scripts#3696</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Enabled netkit module (<a href="https://github.com/flatcar/scripts/pull/3524">scripts#3524</a>)</li>
<li>Function tracer (ftrace) enabled in ARM64 builds. (Enables CONFIG_FUNCTION_TRACER &amp; CONFIG_DYNAMIC_FTRACE for observability and security tools) (<a href="https://github.com/flatcar/scripts/pull/3685">flatcar/scripts#3685</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>base, dev: gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2025q4/000500.html">2.5.16</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00005.html">2.5</a>))</li>
<li>base, dev: libgpg-error (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob_plain;f=NEWS;h=52ac1464a0c0af091a3d69e8c5f2f3afa2cc3c9f;hb=39d7b85a7d69975f1dfec5a0add10b4d57dcfc9e">1.57</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120_1.html">3.120.1</a>)</li>
<li>dracut (<a href="https://github.com/dracut-ng/dracut-ng/releases/tag/109">109</a> (includes <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/108">108</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/107">107</a>))</li>
<li>etcdctl (<a href="https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md#v3518-2025-01-24">3.5.18</a>)</li>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.74">6.12.74</a> (includes <a href="https://lwn.net/Articles/1059031">6.12.73</a>,<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.72">6.12.72</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.71">6.12.71</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.70">6.12.70</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.69">6.12.69</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.68">6.12.68</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.67">6.12.67</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64">6.12.64</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63">6.12.63</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62">6.12.62</a>))</li>
<li>python (<a href="https://www.python.org/downloads/release/python-31212/">3.12.12</a> (includes <a href="https://www.python.org/downloads/release/python-3120/">3.12.0</a>))</li>
<li>sysext-podman: gpgme (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=1fd34dbd9143829e9163d402ab0191a9fc6adab2;hb=e4adebe020b07bc47e583817576ce98ca93e9711">2.0.1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.1.5</li>
<li>docker 28.0.4</li>
<li>ignition 2.24.0</li>
<li>kernel 6.12.74</li>
<li>systemd 257</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4593.1.0"/>
    <published>2026-03-09T13:30:26+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4547.1.0</id>
    <title>4547.1.0</title>
    <updated>2026-03-09T16:26:28.441963+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4515.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68335">CVE-2025-68335</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68332">CVE-2025-68332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68337">CVE-2025-68337</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68336">CVE-2025-68336</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68265">CVE-2025-68265</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68266">CVE-2025-68266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68263">CVE-2025-68263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68261">CVE-2025-68261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68259">CVE-2025-68259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68258">CVE-2025-68258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68257">CVE-2025-68257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68256">CVE-2025-68256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68264">CVE-2025-68264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68254">CVE-2025-68254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68255">CVE-2025-68255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68764">CVE-2025-68764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68766">CVE-2025-68766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68765">CVE-2025-68765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68759">CVE-2025-68759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68758">CVE-2025-68758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68757">CVE-2025-68757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68756">CVE-2025-68756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68753">CVE-2025-68753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68763">CVE-2025-68763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68744">CVE-2025-68744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68742">CVE-2025-68742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68741">CVE-2025-68741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68740">CVE-2025-68740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68748">CVE-2025-68748</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68747">CVE-2025-68747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68746">CVE-2025-68746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68724">CVE-2025-68724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68380">CVE-2025-68380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68379">CVE-2025-68379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68378">CVE-2025-68378</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68733">CVE-2025-68733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68732">CVE-2025-68732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68728">CVE-2025-68728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68727">CVE-2025-68727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68374">CVE-2025-68374</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68352">CVE-2025-68352</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68348">CVE-2025-68348</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68347">CVE-2025-68347</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68372">CVE-2025-68372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68371">CVE-2025-68371</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68369">CVE-2025-68369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68367">CVE-2025-68367</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68366">CVE-2025-68366</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68364">CVE-2025-68364</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68346">CVE-2025-68346</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68363">CVE-2025-68363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68362">CVE-2025-68362</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68361">CVE-2025-68361</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68356">CVE-2025-68356</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68354">CVE-2025-68354</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68344">CVE-2025-68344</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68325">CVE-2025-68325</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68324">CVE-2025-68324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71157">CVE-2025-71157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71156">CVE-2025-71156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71154">CVE-2025-71154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71153">CVE-2025-71153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71151">CVE-2025-71151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71150">CVE-2025-71150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71149">CVE-2025-71149</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71148">CVE-2025-71148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71146">CVE-2025-71146</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71147">CVE-2025-71147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71143">CVE-2025-71143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71140">CVE-2025-71140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71138">CVE-2025-71138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71137">CVE-2025-71137</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71136">CVE-2025-71136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71135">CVE-2025-71135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71133">CVE-2025-71133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71132">CVE-2025-71132</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71131">CVE-2025-71131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71130">CVE-2025-71130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71129">CVE-2025-71129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71111">CVE-2025-71111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71109">CVE-2025-71109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71108">CVE-2025-71108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71107">CVE-2025-71107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71105">CVE-2025-71105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71126">CVE-2025-71126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71125">CVE-2025-71125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71123">CVE-2025-71123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71122">CVE-2025-71122</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71104">CVE-2025-71104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71121">CVE-2025-71121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71120">CVE-2025-71120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71119">CVE-2025-71119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71118">CVE-2025-71118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71116">CVE-2025-71116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71114">CVE-2025-71114</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71113">CVE-2025-71113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71112">CVE-2025-71112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71102">CVE-2025-71102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71079">CVE-2025-71079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71087">CVE-2025-71087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71086">CVE-2025-71086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71084">CVE-2025-71084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71083">CVE-2025-71083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71082">CVE-2025-71082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71101">CVE-2025-71101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71100">CVE-2025-71100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71099">CVE-2025-71099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71081">CVE-2025-71081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71098">CVE-2025-71098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71097">CVE-2025-71097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71096">CVE-2025-71096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71095">CVE-2025-71095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71094">CVE-2025-71094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71093">CVE-2025-71093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71091">CVE-2025-71091</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71089">CVE-2025-71089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71080">CVE-2025-71080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71078">CVE-2025-71078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71064">CVE-2025-71064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71073">CVE-2025-71073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71072">CVE-2025-71072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71071">CVE-2025-71071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71069">CVE-2025-71069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71068">CVE-2025-71068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71067">CVE-2025-71067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71066">CVE-2025-71066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71077">CVE-2025-71077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71076">CVE-2025-71076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71075">CVE-2025-71075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71065">CVE-2025-71065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68820">CVE-2025-68820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68822">CVE-2025-68822</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68821">CVE-2025-68821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68785">CVE-2025-68785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68794">CVE-2025-68794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68789">CVE-2025-68789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68819">CVE-2025-68819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68818">CVE-2025-68818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68817">CVE-2025-68817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68816">CVE-2025-68816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68815">CVE-2025-68815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68788">CVE-2025-68788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68814">CVE-2025-68814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68811">CVE-2025-68811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68810">CVE-2025-68810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68809">CVE-2025-68809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68808">CVE-2025-68808</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68806">CVE-2025-68806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68787">CVE-2025-68787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68804">CVE-2025-68804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68803">CVE-2025-68803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68802">CVE-2025-68802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68801">CVE-2025-68801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68800">CVE-2025-68800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68799">CVE-2025-68799</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68798">CVE-2025-68798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68797">CVE-2025-68797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68796">CVE-2025-68796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68795">CVE-2025-68795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68786">CVE-2025-68786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68776">CVE-2025-68776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68775">CVE-2025-68775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68774">CVE-2025-68774</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68773">CVE-2025-68773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68772">CVE-2025-68772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68771">CVE-2025-68771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68770">CVE-2025-68770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68769">CVE-2025-68769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68784">CVE-2025-68784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68783">CVE-2025-68783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68782">CVE-2025-68782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68781">CVE-2025-68781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68780">CVE-2025-68780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68778">CVE-2025-68778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68777">CVE-2025-68777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68767">CVE-2025-68767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71144">CVE-2025-71144</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71134">CVE-2025-71134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71127">CVE-2025-71127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71088">CVE-2025-71088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22982">CVE-2026-22982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22980">CVE-2026-22980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22979">CVE-2026-22979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22978">CVE-2026-22978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22994">CVE-2026-22994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71160">CVE-2025-71160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22992">CVE-2026-22992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22991">CVE-2026-22991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22990">CVE-2026-22990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22989">CVE-2026-22989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22988">CVE-2026-22988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22984">CVE-2026-22984</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22977">CVE-2026-22977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22976">CVE-2026-22976</a>)</li>
<li>coreutils (<a href="https://www.cve.org/CVERecord?id=CVE-2025-5278">CVE-2025-5278</a>)</li>
<li>go (<a href="https://www.cve.org/CVERecord?id=CVE-2025-47912">CVE-2025-47912</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-58183">CVE-2025-58183</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-58185">CVE-2025-58185</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-58186">CVE-2025-58186</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-58187">CVE-2025-58187</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-58188">CVE-2025-58188</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-58189">CVE-2025-58189</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-61723">CVE-2025-61723</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-61724">CVE-2025-61724</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-61725">CVE-2025-61725</a>)</li>
<li>pam (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10041">CVE-2024-10041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10963">CVE-2024-10963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020</a>)</li>
<li>openssl (<a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187">CVE-2025-11187</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467">CVE-2025-15467</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468">CVE-2025-15468</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469">CVE-2025-15469</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199">CVE-2025-66199</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160">CVE-2025-68160</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418">CVE-2025-69418</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419">CVE-2025-69419</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420">CVE-2025-69420</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421">CVE-2025-69421</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795">CVE-2026-22795</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796">CVE-2026-22796</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Dropped debug symbols from containerd, incus, and overlaybd system extensions to reduce download size.</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Dropped Ciphers, MACs, and KexAlgorithms from the sshd configuration so that the OpenSSH upstream defaults are used. This introduces post-quantum key exchange algorithms for better security. (<a href="https://github.com/flatcar/Flatcar/issues/1921">Flatcar#1921</a>). Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable this by deploying a custom drop-in config  to <code>/etc/ssh/sshd_config.d/</code>.</li>
<li><code>/etc/shadow</code>, <code>/etc/gshadow</code> are now owned by the <code>shadow</code> group, <code>/usr/bin/unix_chkpwd</code>, <code>/usr/bin/chage</code> and <code>/usr/bin/expiry</code> are now also owned by the <code>shadow</code> group with a sticky bit enabled.</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2240-2024-10-14">2.24.0</a>)</li>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66">6.12.66</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65">6.12.65</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64">6.12.64</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63">6.12.63</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62">6.12.62</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59">6.12.59</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251125">20251125</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251111">20251111</a>))</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v4.1/release/4.1.html#id22">4.1.2</a> (includes <a href="https://cmake.org/cmake/help/v4.1/release/4.1.html#id21">4.1.1</a>, <a href="https://cmake.org/cmake/help/v4.1/release/4.1.html">4.1</a>, <a href="https://cmake.org/cmake/help/v4.0/release/4.0.html">4.0</a>))</li>
<li>SDK: go (<a href="https://go.dev/doc/devel/release#go1.25.minor">1.25.3</a>)</li>
<li>SDK: meson (<a href="https://mesonbuild.com/Release-notes-for-1-9-0.html">1.9.1</a> (includes <a href="https://mesonbuild.com/Release-notes-for-1-8-0.html">1.8.0</a>))</li>
<li>SDK: nasm (<a href="https://www.nasm.us/docs/3.01/nasmac.html">3.01</a> (includes <a href="https://www.nasm.us/docs/3.00/nasmac.html">3.00</a>))</li>
<li>base, dev: btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/releases/tag/v6.17">6.17</a>)</li>
<li>base, dev: cifs-utils (<a href="https://lwn.net/Articles/1024956/">7.4</a>)</li>
<li>base, dev: coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-09/msg00005.html">9.8</a>)</li>
<li>base, dev: hwdata (<a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.400">0.400</a> (includes <a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.399">0.399</a>))</li>
<li>base, dev: inih (<a href="https://github.com/benhoyt/inih/releases/tag/r62">62</a> (includes <a href="https://github.com/benhoyt/inih/releases/tag/r61">61</a>))</li>
<li>base, dev: intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111">20251111_p20251112</a>)</li>
<li>base, dev: iproute2 (<a href="https://lore.kernel.org/all/20250929095042.48200315@hermes.local/">6.17.0</a>)</li>
<li>base, dev: jose (<a href="https://github.com/latchset/jose/releases/tag/v14">14</a> (includes <a href="https://github.com/latchset/jose/releases/tag/v13">13</a>))</li>
<li>base, dev: kbd (<a href="https://github.com/legionus/kbd/releases/tag/v2.9.0">2.9.0</a>)</li>
<li>base, dev: less (<a href="https://greenwoodsoftware.com/less/news.685.html">685</a>)</li>
<li>base, dev: libgpg-error (<a href="https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.56">1.56</a>)</li>
<li>base, dev: libtirpc (<a href="https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-7">1.3.7</a>)</li>
<li>base, dev: pam (<a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.7.1">1.7.1</a> (includes <a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.7.0">1.7.0</a>, <a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.6.1">1.6.1</a>, <a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0">1.6.0</a>))</li>
<li>base, dev: pambase (<a href="https://gitweb.gentoo.org/proj/pambase.git/log/?h=pambase-20251013">20251013</a>)</li>
<li>base, dev: samba (<a href="https://www.samba.org/samba/history/samba-4.22.5.html">4.22.5</a> (includes <a href="https://www.samba.org/samba/history/samba-4.22.4.html">4.22.4</a>))</li>
<li>base, dev: strace (<a href="https://github.com/strace/strace/releases/tag/v6.17">6.17</a>)</li>
<li>base, dev: thin-provisioning-tools (<a href="https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.3.0/CHANGES">1.3.0</a> (includes <a href="https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.2/CHANGES">1.2.2</a>, <a href="https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.1/CHANGES">1.2.1</a>, <a href="https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.0/CHANGES">1.2.0</a>, <a href="https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.1.0/CHANGES">1.1.0</a>, <a href="https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.14/CHANGES">1.0.14</a>, <a href="https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.13/CHANGES">1.0.13</a>, <a href="https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.12/CHANGES">1.0.12</a>, <a href="https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.11/CHANGES">1.0.11</a>))</li>
<li>base, dev: util-linux (<a href="https://github.com/util-linux/util-linux/blob/v2.41.2/Documentation/releases/v2.41.2-ReleaseNotes">2.41.2</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html">3.120</a>)</li>
<li>dev: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.3">3.0.69.3</a> (includes <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.2">3.0.69.2</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.1">3.0.69.1</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69">3.0.69</a>))</li>
<li>sysext-overlaybd: overlaybd (<a href="https://github.com/containerd/overlaybd/releases/tag/v1.0.16">1.0.16</a>)</li>
<li>sysext-podman: aardvark-dns (<a href="https://github.com/containers/aardvark-dns/releases/tag/v1.15.0">1.15.0</a>)</li>
<li>sysext-podman: netavark (<a href="https://github.com/containers/netavark/releases/tag/v1.16.1">1.16.1</a> (includes <a href="https://github.com/containers/netavark/releases/tag/v1.16.0">1.16.0</a>))</li>
<li>sysext-python: more-itertools (<a href="https://github.com/more-itertools/more-itertools/releases/tag/v10.8.0">10.8.0</a>)</li>
<li>sysext-python: platformdirs (<a href="https://github.com/tox-dev/platformdirs/releases/tag/4.5.0">4.5.0</a>)</li>
<li>sysext-python: resolvelib (<a href="https://raw.githubusercontent.com/sarugaku/resolvelib/refs/tags/1.2.1/CHANGELOG.rst">1.2.1</a>)</li>
<li>sysext-python: rich (<a href="https://github.com/Textualize/rich/releases/tag/v14.2.0">14.2.0</a>)</li>
<li>sysext-python: setuptools-scm (<a href="https://github.com/pypa/setuptools-scm/releases/tag/v9.2.0">9.2.0</a> (includes <a href="https://github.com/pypa/setuptools-scm/releases/tag/v9.1.0">9.1.0</a>, <a href="https://github.com/pypa/setuptools-scm/releases/tag/v9.0.0">9.0.0</a>))</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.9.11.17">2025.9.11.17</a> (includes <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.9.9.12">2025.9.9.12</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.9.8.13">2025.9.8.13</a>))</li>
<li>openssl (<a href="https://github.com/openssl/openssl/releases/tag/openssl-3.5.5">3.5.5</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.1.5</li>
<li>docker 28.0.4</li>
<li>ignition 2.24.0</li>
<li>kernel 6.12.66</li>
<li>systemd 257</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4547.1.0"/>
    <published>2026-01-27T14:42:03+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4515.1.0</id>
    <title>4515.1.0</title>
    <updated>2026-03-09T16:26:28.406109+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Alpha 4515.0.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40275">CVE-2025-40275</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40274">CVE-2025-40274</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40273">CVE-2025-40273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40272">CVE-2025-40272</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40289">CVE-2025-40289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40288">CVE-2025-40288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40287">CVE-2025-40287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40269">CVE-2025-40269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40286">CVE-2025-40286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40285">CVE-2025-40285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40284">CVE-2025-40284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40283">CVE-2025-40283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40282">CVE-2025-40282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40281">CVE-2025-40281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40280">CVE-2025-40280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40279">CVE-2025-40279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40278">CVE-2025-40278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40268">CVE-2025-40268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40212">CVE-2025-40212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58087">CVE-2024-58087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57879">CVE-2024-57879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57880">CVE-2024-57880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55642">CVE-2024-55642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55641">CVE-2024-55641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54460">CVE-2024-54460</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54191">CVE-2024-54191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53689">CVE-2024-53689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53682">CVE-2024-53682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53687">CVE-2024-53687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56656">CVE-2024-56656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56674">CVE-2024-56674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56673">CVE-2024-56673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56671">CVE-2024-56671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56669">CVE-2024-56669</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56668">CVE-2024-56668</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56666">CVE-2024-56666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56652">CVE-2024-56652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40261">CVE-2025-40261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40266">CVE-2025-40266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40264">CVE-2025-40264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40263">CVE-2025-40263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40262">CVE-2025-40262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40254">CVE-2025-40254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40253">CVE-2025-40253</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40252">CVE-2025-40252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40251">CVE-2025-40251</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40250">CVE-2025-40250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40259">CVE-2025-40259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40257">CVE-2025-40257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40246">CVE-2025-40246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40345">CVE-2025-40345</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61">6.12.61</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59">6.12.59</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60">6.12.60</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html">3.119</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html">3.118.1</a>))</li>
</ul>
<p><em>Changes since <strong>Beta 4459.1.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40275">CVE-2025-40275</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40274">CVE-2025-40274</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40273">CVE-2025-40273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40272">CVE-2025-40272</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40289">CVE-2025-40289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40288">CVE-2025-40288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40287">CVE-2025-40287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40269">CVE-2025-40269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40286">CVE-2025-40286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40285">CVE-2025-40285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40284">CVE-2025-40284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40283">CVE-2025-40283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40282">CVE-2025-40282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40281">CVE-2025-40281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40280">CVE-2025-40280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40279">CVE-2025-40279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40278">CVE-2025-40278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40268">CVE-2025-40268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40212">CVE-2025-40212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58087">CVE-2024-58087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57879">CVE-2024-57879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57880">CVE-2024-57880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55642">CVE-2024-55642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55641">CVE-2024-55641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54460">CVE-2024-54460</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54191">CVE-2024-54191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53689">CVE-2024-53689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53682">CVE-2024-53682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53687">CVE-2024-53687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56656">CVE-2024-56656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56674">CVE-2024-56674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56673">CVE-2024-56673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56671">CVE-2024-56671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56669">CVE-2024-56669</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56668">CVE-2024-56668</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56666">CVE-2024-56666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56652">CVE-2024-56652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40261">CVE-2025-40261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40266">CVE-2025-40266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40264">CVE-2025-40264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40263">CVE-2025-40263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40262">CVE-2025-40262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40254">CVE-2025-40254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40253">CVE-2025-40253</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40252">CVE-2025-40252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40251">CVE-2025-40251</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40250">CVE-2025-40250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40259">CVE-2025-40259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40257">CVE-2025-40257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40246">CVE-2025-40246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40345">CVE-2025-40345</a>)</li>
<li>binutils (<a href="https://www.cve.org/CVERecord?id=CVE-2025-5244">CVE-2025-5244</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-5245">CVE-2025-5245</a> <a href="https://www.cve.org/CVERecord?id=CVE-2025-8225">CVE-2025-8225</a>)</li>
<li>curl (<a href="https://www.cve.org/CVERecord?id=CVE-2025-9086">CVE-2025-9086</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-10148">CVE-2025-10148</a>)</li>
<li>expat (<a href="https://www.cve.org/CVERecord?id=CVE-2025-59375">CVE-2025-59375</a>)</li>
<li>go (<a href="https://www.cve.org/CVERecord?id=CVE-2025-47910">CVE-2025-47910</a>)</li>
<li>intel-microcode (<a href="https://www.cve.org/CVERecord?id=CVE-2024-28956">CVE-2024-28956</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420">CVE-2024-43420</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332">CVE-2024-45332</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012">CVE-2025-20012</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054">CVE-2025-20054</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103">CVE-2025-20103</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623">CVE-2025-20623</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495">CVE-2025-24495</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053">CVE-2025-20053</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109">CVE-2025-20109</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839">CVE-2025-22839</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840">CVE-2025-22840</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889">CVE-2025-22889</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403">CVE-2025-26403</a>)</li>
<li>libpcre2 (<a href="https://www.cve.org/CVERecord?id=CVE-2025-58050">CVE-2025-58050</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9">libxml2-20250908</a>)</li>
<li>libxslt (<a href="https://www.cve.org/CVERecord?id=CVE-2025-7424">CVE-2025-7424</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-7425">CVE-2025-7425</a>)</li>
<li>net-tools (<a href="https://www.cve.org/CVERecord?id=CVE-2025-46836">CVE-2025-46836</a>)</li>
<li>nvidia-drivers (<a href="https://www.cve.org/CVERecord?id=CVE-2025-23280">CVE-2025-23280</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23282">CVE-2025-23282</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23300">CVE-2025-23300</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23330">CVE-2025-23330</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23332">CVE-2025-23332</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23345">CVE-2025-23345</a>)</li>
<li>openssh (<a href="https://www.cve.org/CVERecord?id=CVE-2025-61984">CVE-2025-61984</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-61985">CVE-2025-61985</a>)</li>
<li>openssl (<a href="https://www.cve.org/CVERecord?id=CVE-2025-9230">CVE-2025-9230</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-9231">CVE-2025-9231</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-9232">CVE-2025-9232</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Alpha only: Added Fusion SCSI disk drivers back to the initrd after they got lost in the rework (<a href="https://github.com/flatcar/Flatcar/issues/1924">Flatcar#1924</a>)</li>
<li>Alpha only: Fixed systemd-sysext payload handling for air-gapped/self-hosted updates which was a known bug for 4487.0.0 (<a href="https://github.com/flatcar/ue-rs/pull/93">ue-rs#93</a>)</li>
<li>Configured the services in the overlaybd sysext to start automatically like the other sysexts. Note that the sysext must be enabled at boot time for this to happen, otherwise you need to call <code>systemd-tmpfiles --create</code> and <code>systemctl daemon-reload</code> first.</li>
<li>Fixed SSSD startup failure by adding back LDB modules into the image, which got lost after a Samba update (<a href="https://github.com/flatcar/Flatcar/issues/1919">Flatcar#1919</a>)</li>
<li>Fixed a kernel boot warning when loading an explicit list of kernel modules in the minimal first-stage initrd (<a href="https://github.com/flatcar/Flatcar/issues/1934">Flatcar#1934</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added support for the kernel cmdline parameters <code>flatcar.release_file_server_url</code> and <code>flatcar.dev_file_server_url</code> to specify custom servers where Flatcar extensions should be downloaded on boot (<a href="https://github.com/flatcar/bootengine/pull/112">bootengine#112</a>)</li>
<li>Alpha only: Reduced Azure image size again to 30 GB as before by shrinking the root partition to compensate for the growth of the other partitions (<a href="https://github.com/flatcar/scripts/pull/3460">scripts#3460</a>)</li>
<li>Increased all partition sizes: <code>/boot</code> to 1 GB, the two <code>/usr</code> partitions to 2 GB, <code>/oem</code> to 1 GB so that we can use more space in a few years when we can assume that most nodes run the new partition layout - existing nodes can still update for the next years (<a href="https://github.com/flatcar/scripts/pull/3027">scripts#3027</a>)</li>
<li>Reduced the kernel+initrd size on <code>/boot</code> by half. Flatcar now uses a minimal first stage initrd just to access the <code>/usr</code> partition and then switches to the full initrd that does the full system preparation as before. Since this means that the set of kernel modules available in the first initrd is reduced, please report any impact.</li>
<li>The way that files for building custom kernel modules are installed has changed from a Ubuntu-inspired method to the standard upstream kernel method. In the unlikely event that this breaks your module builds, please let the Flatcar team know immediately.</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61">6.12.61</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49">6.12.49</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50">6.12.50</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59">6.12.59</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60">6.12.60</a>))</li>
<li>Linux firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251021">20251021</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250917">20250917</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251011">20251011</a>))</li>
<li>Afterburn (<a href="https://coreos.github.io/afterburn/release-notes/#afterburn-5100">5.10.0</a>)</li>
<li>azure, dev: inotify-tools (<a href="https://github.com/inotify-tools/inotify-tools/releases/tag/4.25.9.0">4.25.9.0</a>)</li>
<li>azure, stackit: chrony (<a href="https://gitlab.com/chrony/chrony/-/raw/4.8/NEWS">4.8</a>)</li>
<li>base, dev: bash (<a href="https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html">5.3_p3</a>)</li>
<li>base, dev: bind (<a href="https://bind9.readthedocs.io/en/v9.18.38/notes.html#notes-for-bind-9-18-38">9.18.38</a>)</li>
<li>base, dev: bpftool (<a href="https://github.com/libbpf/bpftool/releases/tag/v7.6.0">7.6.0</a>)</li>
<li>base, dev: btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/releases/tag/v6.16.1">6.16.1</a> (includes <a href="https://github.com/kdave/btrfs-progs/releases/tag/v6.16">6.16</a>))</li>
<li>base, dev: coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00006.html">9.7</a> (includes <a href="https://savannah.gnu.org/news/?id=10715">9.6</a>))</li>
<li>base, dev: cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/raw/v2.8.1/docs/v2.8.1-ReleaseNotes">2.8.1</a>)</li>
<li>base, dev: curl (<a href="https://curl.se/ch/8.16.0.html">8.16.0</a>)</li>
<li>base, dev: expat (<a href="https://raw.githubusercontent.com/libexpat/libexpat/refs/tags/R_2_7_3/expat/Changes">2.7.3</a> (includes <a href="https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes">2.7.2</a>))</li>
<li>base, dev: gcc (<a href="https://gcc.gnu.org/pipermail/gcc/2025-May/246078.html">14.3.1_p20250801</a>)</li>
<li>base, dev: gettext (<a href="https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=a5cc8a63eb4f06e4a1171afda862812feb67d693;hb=e8e6cb71aec0de1f5758ac21327bb8cd69e33731">0.23.2</a> (includes <a href="https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=9d87d45408f510d15856a1dda8a9376573f0a9c5;hb=c12b25dc82104691ca80c4da1cbc538fcab42bf5">0.23.0</a>, <a href="https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=4aafedf9b10a66891838e1f35c7af020c6124ee0;hb=d9b0432a825bfe3fc72f9a081d295a9528cd8aac">0.23.1</a>))</li>
<li>base, dev: git (<a href="https://github.com/git/git/blob/v2.51.0/Documentation/RelNotes/2.51.0.adoc">2.51.0</a> (includes <a href="https://github.com/git/git/blob/v2.50.0/Documentation/RelNotes/2.50.0.adoc">2.50.0</a>))</li>
<li>base, dev: hwdata (<a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.398">0.398</a>)</li>
<li>base, dev: intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250812">20250812</a> (includes <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250512">20250512</a>))</li>
<li>base, dev: libffi (<a href="https://github.com/libffi/libffi/releases/tag/v3.5.2">3.5.2</a>)</li>
<li>base, dev: libnftnl (<a href="https://lwn.net/Articles/1032725/">1.3.0</a>)</li>
<li>base, dev: libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.6">2.14.6</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9">2.13.9</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.0">2.14.0</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.1">2.14.1</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.2">2.14.2</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.3">2.14.3</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.4">2.14.4</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.5">2.14.5</a>))</li>
<li>base, dev: ncurses (<a href="https://invisible-island.net/ncurses/NEWS.html#t20250802">6.5_p20250802</a>)</li>
<li>base, dev: nftables (<a href="https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.5.txt">1.1.5</a> (includes <a href="https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.4.txt">1.1.4</a>))</li>
<li>base, dev: nvidia-drivers-service (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-195-03/index.html">570.195.03</a> (includes <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-274-02/index.html">535.274.02</a>))</li>
<li>base, dev: openssh (<a href="https://www.openssh.com/txt/release-10.2">10.2_p1</a> (includes <a href="https://www.openssh.com/txt/release-10.1">10.1</a>))</li>
<li>base, dev: openssl (<a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.3">3.4.3</a>)</li>
<li>base, dev: readline (<a href="https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html">8.3_p1</a>)</li>
<li>base, dev: samba (<a href="https://www.samba.org/samba/history/samba-4.22.3.html">4.22.3</a> (includes <a href="https://www.samba.org/samba/history/samba-4.21.0.html">4.21.0</a>, <a href="https://www.samba.org/samba/history/samba-4.22.0.html">4.22.0</a>, <a href="https://www.samba.org/samba/history/samba-4.22.1.html">4.22.1</a>, <a href="https://www.samba.org/samba/history/samba-4.22.2.html">4.22.2</a>))</li>
<li>base, dev: talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/77229f73c20af69ab0f3c96efbb229ff64a9dfe4">2.4.3</a>)</li>
<li>base, dev: tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/70a8c7a89a6d62d2ff172d79b5f4e6439300b88d">1.4.13</a>)</li>
<li>base, dev: tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/8d398acbbb7fdc0ff50fe6ba80433deaf92515c6">0.16.2</a>)</li>
<li>base, dev: xfsprogs (<a href="https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.16.0">6.16.0</a> (includes <a href="https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.15.0">6.15.0</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html">3.119</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html">3.118.1</a>))</li>
<li>dev, sysext-incus: squashfs-tools (<a href="https://github.com/plougher/squashfs-tools/releases/tag/4.7.2">4.7.2</a> (includes <a href="https://github.com/plougher/squashfs-tools/releases/tag/4.7.1">4.7.1</a>))</li>
<li>dev: binutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00009.html">2.45</a>)</li>
<li>sdk: azure-core (<a href="https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-core_1.16.1">1.16.1</a>)</li>
<li>sdk: azure-identity (<a href="https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-identity_1.13.1">1.13.1</a>)</li>
<li>sdk: cmake (<a href="https://cmake.org/cmake/help/v3.31/release/3.31.html#id1">3.31.9</a>)</li>
<li>sdk: go (<a href="https://go.dev/doc/devel/release#go1.25.minor">1.25.1</a> (includes <a href="https://go.dev/doc/devel/release#go1.24.minor">1.24.7</a>, <a href="https://go.dev/doc/go1.25">1.25</a>))</li>
<li>sdk: pkgcheck (<a href="https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.37">0.10.37</a>)</li>
<li>sdk: qemu (<a href="https://wiki.qemu.org/ChangeLog/10.0">10.0.5</a>)</li>
<li>sdk: rust (<a href="https://blog.rust-lang.org/2025/08/07/Rust-1.89.0/">1.89.0</a>)</li>
<li>sysext-containerd: containerd (<a href="https://github.com/containerd/containerd/releases/tag/v2.1.4">2.1.4</a>)</li>
<li>sysext-containerd: runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.3.1">1.3.1</a>)</li>
<li>sysext-incus, sysext-podman, vmware: fuse (<a href="https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.4">3.17.4</a>)</li>
<li>sysext-nvidia-drivers-535: nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-274-02/index.html">535.274.02</a>)</li>
<li>sysext-nvidia-drivers-570: nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-195-03/index.html">570.195.03</a> (includes 570.190))</li>
<li>sysext-podman: crun (<a href="https://github.com/containers/crun/releases/tag/1.21">1.21</a>)</li>
<li>sysext-podman: gpgme (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=cd0e093bf83fe47b6773fb478fced07d8409fbe0;hb=e17ba578861905857da0a514b4fc9b88a57f7346">2.0.0</a>)</li>
<li>sysext-podman: netavark (<a href="https://github.com/containers/netavark/releases/tag/v1.15.2">1.15.2</a> (includes <a href="https://github.com/containers/netavark/releases/tag/v1.15.0">1.15.0</a>, <a href="https://github.com/containers/netavark/releases/tag/v1.15.1">1.15.1</a>))</li>
<li>sysext-podman: passt (<a href="https://archives.passt.top/passt-user/20250611175947.7d540ddc@elisabeth/T/#u">2025.06.11</a>)</li>
<li>sysext-python: charset-normalizer (<a href="https://github.com/jawah/charset_normalizer/releases/tag/3.4.3">3.4.3</a>)</li>
<li>sysext-python: jaraco-functools (<a href="https://raw.githubusercontent.com/jaraco/jaraco.functools/refs/tags/v4.3.0/NEWS.rst">4.3.0</a>)</li>
<li>sysext-python: markdown-it-py (<a href="https://github.com/executablebooks/markdown-it-py/releases/tag/v4.0.0">4.0.0</a>)</li>
<li>sysext-python: pip (<a href="https://raw.githubusercontent.com/pypa/pip/refs/tags/25.2/NEWS.rst">25.2</a>)</li>
<li>sysext-python: platformdirs (<a href="https://github.com/tox-dev/platformdirs/releases/tag/4.4.0">4.4.0</a>)</li>
<li>sysext-python: requests (<a href="https://github.com/psf/requests/releases/tag/v2.32.5">2.32.5</a>)</li>
<li>sysext-python: typing-extensions (<a href="https://raw.githubusercontent.com/python/typing_extensions/refs/tags/4.15.0/CHANGELOG.md">4.15.0</a>)</li>
<li>systemd (257.9)</li>
<li>vmware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-13.0.5">13.0.5</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.1.5</li>
<li>docker 28.0.4</li>
<li>ignition 2.22.0</li>
<li>kernel 6.12.61</li>
<li>systemd 257</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4515.1.0"/>
    <published>2025-12-18T15:18:34+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4459.1.2</id>
    <title>4459.1.2</title>
    <updated>2026-03-09T16:26:28.389627+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4459.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40177">CVE-2025-40177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40176">CVE-2025-40176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40172">CVE-2025-40172</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40173">CVE-2025-40173</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40166">CVE-2025-40166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40167">CVE-2025-40167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40165">CVE-2025-40165</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40162">CVE-2025-40162</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40133">CVE-2025-40133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40095">CVE-2025-40095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40094">CVE-2025-40094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40093">CVE-2025-40093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40092">CVE-2025-40092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40090">CVE-2025-40090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40088">CVE-2025-40088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40105">CVE-2025-40105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40104">CVE-2025-40104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40103">CVE-2025-40103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40101">CVE-2025-40101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40100">CVE-2025-40100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40099">CVE-2025-40099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40087">CVE-2025-40087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40085">CVE-2025-40085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40040">CVE-2025-40040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40106">CVE-2025-40106</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40084">CVE-2025-40084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40211">CVE-2025-40211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40209">CVE-2025-40209</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed the loading of kernel modules from system extensions via udev (e.g. at boot time).(<a href="https://github.com/flatcar/scripts/pull/3367">flatcar/scripts#3367</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added Nutanix images (<a href="https://github.com/flatcar/scripts/pull/3311">flatcar/scripts#3311</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.58">6.12.58</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.57">6.12.57</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.56">6.12.56</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.55">6.12.55</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.7</li>
<li>docker 28.0.4</li>
<li>ignition 2.22.0</li>
<li>kernel 6.12.58</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4459.1.2"/>
    <published>2025-11-27T11:34:35+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4459.1.1</id>
    <title>4459.1.1</title>
    <updated>2026-03-09T16:26:28.380033+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4459.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40109">CVE-2025-40109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40107">CVE-2025-40107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40028">CVE-2025-40028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40027">CVE-2025-40027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40026">CVE-2025-40026</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40000">CVE-2025-40000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39995">CVE-2025-39995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40052">CVE-2025-40052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40061">CVE-2025-40061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40060">CVE-2025-40060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40059">CVE-2025-40059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40058">CVE-2025-40058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40057">CVE-2025-40057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40056">CVE-2025-40056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40055">CVE-2025-40055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40081">CVE-2025-40081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40080">CVE-2025-40080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40079">CVE-2025-40079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40078">CVE-2025-40078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40071">CVE-2025-40071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40070">CVE-2025-40070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40068">CVE-2025-40068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40067">CVE-2025-40067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40062">CVE-2025-40062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40053">CVE-2025-40053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40029">CVE-2025-40029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40038">CVE-2025-40038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40037">CVE-2025-40037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40036">CVE-2025-40036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40035">CVE-2025-40035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40033">CVE-2025-40033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40051">CVE-2025-40051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40049">CVE-2025-40049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40031">CVE-2025-40031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40048">CVE-2025-40048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40047">CVE-2025-40047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40045">CVE-2025-40045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40043">CVE-2025-40043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40039">CVE-2025-40039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40030">CVE-2025-40030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40004">CVE-2025-40004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40032">CVE-2025-40032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40042">CVE-2025-40042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40019">CVE-2025-40019</a>)</li>
<li>containerd (<a href="https://www.cve.org/CVERecord?id=CVE-2024-25621">CVE-2024-25621</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-64329">CVE-2025-64329</a>)</li>
<li>runc (<a href="https://www.cve.org/CVERecord?id=CVE-2025-31133">CVE-2025-31133</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-52565">CVE-2025-52565</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-52881">CVE-2025-52881</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Enabled <code>CONFIG_MEMCG_V1</code> to mitigate cgroupsv1 removal (e.g JVM) (<a href="https://github.com/flatcar/Flatcar/issues/1884">Flatcar#1884</a>)</li>
<li>Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them (<a href="https://github.com/flatcar/Flatcar/issues/1933">Flatcar#1933</a>)</li>
<li>Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by switching back to built-in extra firmware instead of early cpio inclusion (<a href="https://github.com/flatcar/Flatcar/issues/1909">Flatcar#1909</a>)</li>
<li>Fixed that the needed Flatcar extensions don't get removed on update which caused a re-download (<a href="https://github.com/flatcar/update_engine/pull/51">update_engine#51</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Scaleway: The Linux console is now attached to the correct console port. (<a href="https://github.com/flatcar/scripts/pull/3383">scripts#3383</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.54">6.12.54</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.53">6.12.53</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.52">6.12.52</a>))</li>
<li>sysext-containerd: containerd (<a href="https://github.com/containerd/containerd/releases/tag/v2.0.7">2.0.7</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v2.0.6">2.0.6</a>))</li>
<li>sysext-containerd: runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.3.3">1.3.3</a> (includes <a href="https://github.com/opencontainers/runc/releases/tag/v1.3.2">1.3.2</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.3.1">1.3.1</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.3.0">1.3.0</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.7</li>
<li>docker 28.0.4</li>
<li>ignition 2.22.0</li>
<li>kernel 6.12.54</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4459.1.1"/>
    <published>2025-11-12T15:00:28+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4459.1.0</id>
    <title>4459.1.0</title>
    <updated>2026-03-09T16:26:28.344353+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4426.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39927">CVE-2025-39927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39926">CVE-2025-39926</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39923">CVE-2025-39923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39913">CVE-2025-39913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39912">CVE-2025-39912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39911">CVE-2025-39911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39909">CVE-2025-39909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39907">CVE-2025-39907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39917">CVE-2025-39917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39916">CVE-2025-39916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39914">CVE-2025-39914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39885">CVE-2025-39885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39886">CVE-2025-39886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39876">CVE-2025-39876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39873">CVE-2025-39873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39871">CVE-2025-39871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39870">CVE-2025-39870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39869">CVE-2025-39869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39884">CVE-2025-39884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39883">CVE-2025-39883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39882">CVE-2025-39882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39881">CVE-2025-39881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39880">CVE-2025-39880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39877">CVE-2025-39877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39963">CVE-2025-39963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39961">CVE-2025-39961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39957">CVE-2025-39957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39956">CVE-2025-39956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39938">CVE-2025-39938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39937">CVE-2025-39937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39934">CVE-2025-39934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39953">CVE-2025-39953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39952">CVE-2025-39952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39951">CVE-2025-39951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39950">CVE-2025-39950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39932">CVE-2025-39932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39949">CVE-2025-39949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39948">CVE-2025-39948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39947">CVE-2025-39947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39946">CVE-2025-39946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945">CVE-2025-39945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39944">CVE-2025-39944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39943">CVE-2025-39943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39942">CVE-2025-39942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39940">CVE-2025-39940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39929">CVE-2025-39929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39931">CVE-2025-39931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57878">CVE-2024-57878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57877">CVE-2024-57877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57875">CVE-2024-57875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23128">CVE-2025-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23127">CVE-2025-23127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23126">CVE-2025-23126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23125">CVE-2025-23125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23124">CVE-2025-23124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57872">CVE-2024-57872</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57839">CVE-2024-57839</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48875">CVE-2024-48875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47794">CVE-2024-47794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49569">CVE-2024-49569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48876">CVE-2024-48876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41932">CVE-2024-41932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41935">CVE-2024-41935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56785">CVE-2024-56785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56784">CVE-2024-56784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56781">CVE-2024-56781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56782">CVE-2024-56782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56639">CVE-2024-56639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56647">CVE-2024-56647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56646">CVE-2024-56646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56632">CVE-2024-56632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56624">CVE-2024-56624</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56621">CVE-2024-56621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56620">CVE-2024-56620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56618">CVE-2024-56618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56628">CVE-2024-56628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56627">CVE-2024-56627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56626">CVE-2024-56626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56591">CVE-2024-56591</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56588">CVE-2024-56588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56613">CVE-2024-56613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56586">CVE-2024-56586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56612">CVE-2024-56612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56609">CVE-2024-56609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56608">CVE-2024-56608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56607">CVE-2024-56607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56585">CVE-2024-56585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56599">CVE-2024-56599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56597">CVE-2024-56597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56596">CVE-2024-56596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56595">CVE-2024-56595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584</a>)</li>
<li>glib (<a href="https://www.cve.org/CVERecord?id=CVE-2025-7039">CVE-2025-7039</a>)</li>
<li>glibc (<a href="https://www.cve.org/CVERecord?id=CVE-2025-8058">CVE-2025-8058</a>)</li>
<li>gnutls (<a href="https://www.cve.org/CVERecord?id=CVE-2025-32988">CVE-2025-32988</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32989">CVE-2025-32989</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32990">CVE-2025-32990</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-6395">CVE-2025-6395</a>)</li>
<li>go (<a href="https://www.cve.org/CVERecord?id=CVE-2025-47906">CVE-2025-47906</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-47907">CVE-2025-47907</a>)</li>
<li>iperf (<a href="https://www.cve.org/CVERecord?id=CVE-2025-54349">CVE-2025-54349</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-54350">CVE-2025-54350</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-54351">CVE-2025-54351</a>)</li>
<li>nvidia-drivers (<a href="https://www.cve.org/CVERecord?id=CVE-2025-23277">CVE-2025-23277</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23278">CVE-2025-23278</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23279">CVE-2025-23279</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23286">CVE-2025-23286</a>)</li>
<li>python (<a href="https://www.cve.org/CVERecord?id=CVE-2025-6069">CVE-2025-6069</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-8194">CVE-2025-8194</a>)</li>
<li>vim (<a href="https://www.cve.org/CVERecord?id=CVE-2025-53905">CVE-2025-53905</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-53906">CVE-2025-53906</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-9390">CVE-2025-9390</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance (<a href="https://github.com/flatcar/Flatcar/issues/1901">Flatcar#1901</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Enable CONFIG_INET_DIAG_DESTROY in kernel options (<a href="https://github.com/flatcar/scripts/pull/3176">flatcar/scripts#3176</a>)</li>
<li>Hyper-V images now use a systemd-sysext image for layering additional platform-specific software on top of <code>/usr</code></li>
<li>Scaleway: SSH keys are now fetched <em>via</em> Afterburn (<a href="https://github.com/flatcar/scripts/pull/3277">scripts#3277</a>)</li>
<li>Scaleway: The hostname is now set <em>via</em> Afterburn (<a href="https://github.com/flatcar/scripts/pull/3277">scripts#3277</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2220-2025-07-08">2.22.0</a>)</li>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51">6.12.51</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.42">6.12.42</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.43">6.12.43</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48">6.12.48</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49">6.12.49</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50">6.12.50</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250808">20250808</a>)</li>
<li>SDK: gnu-efi (<a href="https://github.com/ncroxon/gnu-efi/releases/tag/4.0.2">4.0.2</a>)</li>
<li>SDK: go (<a href="https://go.dev/doc/devel/release#go1.24.minor">1.24.6</a>)</li>
<li>SDK: rust (<a href="https://blog.rust-lang.org/2025/06/26/Rust-1.88.0/">1.88.0</a>)</li>
<li>SDK: sbsigntools (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/commit/?h=v0.9.5&amp;id=9cfca9fe7aa7a8e29b92fe33ce8433e212c9a8ba">0.9.5</a>)</li>
<li>azure, dev, gce, sysext-python: gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00012.html">1.26</a>)</li>
<li>azure, dev, gce, sysext-python: python (3.11.13_p1)</li>
<li>base, dev: azure-vm-utils (<a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.7.0">0.7.0</a>)</li>
<li>base, dev: btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/releases/tag/v6.15">6.15</a>)</li>
<li>base, dev: cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.8.0/docs/v2.8.0-ReleaseNotes">2.8.0</a>)</li>
<li>base, dev: curl (<a href="https://curl.se/ch/8.15.0.html">8.15.0</a> (includes <a href="https://curl.se/ch/8.14.0.html">8.14.0</a>, <a href="https://curl.se/ch/8.14.1.html">8.14.1</a>))</li>
<li>base, dev: e2fsprogs (<a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.3">1.47.3</a>)</li>
<li>base, dev: ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/plain/NEWS?h=v6.15">6.15</a>)</li>
<li>base, dev: glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.4">2.84.4</a>)</li>
<li>base, dev: gnutls (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html">3.8.10</a>)</li>
<li>base, dev: iproute2 (<a href="https://www.spinics.net/lists/netdev/msg1112693.html">6.16.0</a>)</li>
<li>base, dev: kmod (<a href="https://lwn.net/Articles/1011365/">34.2</a>)</li>
<li>base, dev: libgcrypt (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS;h=3add9aad0cf6dc5a70ce6cb3983a46e585a630b3;hb=737cc63600146f196738a6768679eb016cf866e9">1.11.2</a>)</li>
<li>base, dev: libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.15">1.15</a>)</li>
<li>base, dev: libsodium (<a href="https://raw.githubusercontent.com/jedisct1/libsodium/7e024fbf096c84bef866b21f521c516591908bef/ChangeLog">1.0.20_p20250606</a>)</li>
<li>base, dev: libusb (<a href="https://raw.githubusercontent.com/libusb/libusb/refs/tags/v1.0.29/ChangeLog">1.0.29</a>)</li>
<li>base, dev: lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.99.5">4.99.5</a>)</li>
<li>base, dev: ncurses (<a href="https://invisible-island.net/ncurses/NEWS.html#t20250531">6.5_p20250531</a>)</li>
<li>base, dev: nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/raw/nettle_3.10.2_release_20250626/ChangeLog">3.10.2</a>)</li>
<li>base, dev: ntp (<a href="https://www.ntp.org/support/securitynotice/4_2_8p18-release-announcement/">4.2.8_p18</a>)</li>
<li>base, dev: nvidia-drivers-service (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-172-08/index.html">570.172.08</a> (includes <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-261-03/index.html">535.261.03</a>, 570.172.08))</li>
<li>base, dev: nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.15">2.15</a>)</li>
<li>base, dev: openssl (<a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.2">3.4.2</a>)</li>
<li>base, dev: pciutils (<a href="https://git.kernel.org/pub/scm/utils/pciutils/pciutils.git/plain/ChangeLog?h=v3.14.0">3.14.0</a>)</li>
<li>base, dev: pinentry (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob_plain;f=NEWS;h=8bf192539fed9104a1ff431c6dcc3add7fb6771c;hb=d7660807593067d5cd7150b7d4d987d60957b5cb">1.3.2</a>)</li>
<li>base, dev: pkgconf (<a href="https://raw.githubusercontent.com/pkgconf/pkgconf/refs/tags/pkgconf-2.5.1/NEWS">2.5.1</a> (includes <a href="https://raw.githubusercontent.com/pkgconf/pkgconf/refs/tags/pkgconf-2.5.0/NEWS">2.5.0</a>))</li>
<li>base, dev: rpcbind (<a href="https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_8">1.2.8</a>)</li>
<li>base, dev: selinux (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20250213">2.20250213</a>)</li>
<li>base, dev: sqlite (<a href="https://sqlite.org/releaselog/3_50_4.html">3.50.4</a> (includes <a href="https://sqlite.org/releaselog/3_50_3.html">3.50.3</a>))</li>
<li>base, dev: strace (<a href="https://github.com/strace/strace/releases/tag/v6.16">6.16</a>)</li>
<li>base, dev: sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/v1.9.17p2">1.9.17_p2</a>)</li>
<li>base, dev: vim (<a href="https://github.com/vim/vim/commits/v9.1.1652/">9.1.1652</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html">3.117</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115.html">3.115</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html">3.116</a>))</li>
<li>dev: gnuconfig (<a href="https://cgit.git.savannah.gnu.org/cgit/config.git/log/?id=a2287c3041a3f2a204eb942e09c015eab00dc7dd">20250710</a>)</li>
<li>dev: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.19.1">3.19.1</a>)</li>
<li>sysext-incus, sysext-podman, vmware: fuse (<a href="https://raw.githubusercontent.com/libfuse/libfuse/refs/tags/fuse-3.17.3/ChangeLog.rst">3.17.3</a>)</li>
<li>sysext-incus: cowsql (<a href="https://github.com/cowsql/cowsql/commits/v1.15.9/">1.15.9</a>)</li>
<li>sysext-nvidia-drivers-535, sysext-nvidia-drivers-535-open: nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-261-03/index.html">535.261.03</a>)</li>
<li>sysext-nvidia-drivers-570, sysext-nvidia-drivers-570-open: nvidia-drivers (570.181 (includes <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-172-08/index.html">570.172.08</a>))</li>
<li>sysext-python: distlib (<a href="https://github.com/pypa/distlib/blob/0.4.0/CHANGES.rst#040">0.4.0</a>)</li>
<li>sysext-python: rich (<a href="https://github.com/Textualize/rich/releases/tag/v14.1.0">14.1.0</a>)</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.8.26.11">2025.8.26.11</a> (includes <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.8.6.13">2025.8.6.13</a>))</li>
<li>sysext-python: truststore (<a href="https://raw.githubusercontent.com/sethmlarson/truststore/refs/tags/v0.10.4/CHANGELOG.md">0.10.4</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 4459.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39927">CVE-2025-39927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39926">CVE-2025-39926</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39923">CVE-2025-39923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39913">CVE-2025-39913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39912">CVE-2025-39912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39911">CVE-2025-39911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39909">CVE-2025-39909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39907">CVE-2025-39907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39917">CVE-2025-39917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39916">CVE-2025-39916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39914">CVE-2025-39914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39885">CVE-2025-39885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39886">CVE-2025-39886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39876">CVE-2025-39876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39873">CVE-2025-39873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39871">CVE-2025-39871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39870">CVE-2025-39870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39869">CVE-2025-39869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39884">CVE-2025-39884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39883">CVE-2025-39883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39882">CVE-2025-39882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39881">CVE-2025-39881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39880">CVE-2025-39880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39877">CVE-2025-39877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39963">CVE-2025-39963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39961">CVE-2025-39961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39957">CVE-2025-39957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39956">CVE-2025-39956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39938">CVE-2025-39938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39937">CVE-2025-39937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39934">CVE-2025-39934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39953">CVE-2025-39953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39952">CVE-2025-39952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39951">CVE-2025-39951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39950">CVE-2025-39950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39932">CVE-2025-39932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39949">CVE-2025-39949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39948">CVE-2025-39948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39947">CVE-2025-39947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39946">CVE-2025-39946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945">CVE-2025-39945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39944">CVE-2025-39944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39943">CVE-2025-39943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39942">CVE-2025-39942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39940">CVE-2025-39940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39929">CVE-2025-39929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39931">CVE-2025-39931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57878">CVE-2024-57878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57877">CVE-2024-57877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57875">CVE-2024-57875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23128">CVE-2025-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23127">CVE-2025-23127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23126">CVE-2025-23126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23125">CVE-2025-23125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23124">CVE-2025-23124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57872">CVE-2024-57872</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57839">CVE-2024-57839</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48875">CVE-2024-48875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47794">CVE-2024-47794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49569">CVE-2024-49569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48876">CVE-2024-48876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41932">CVE-2024-41932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41935">CVE-2024-41935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56785">CVE-2024-56785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56784">CVE-2024-56784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56781">CVE-2024-56781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56782">CVE-2024-56782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56639">CVE-2024-56639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56647">CVE-2024-56647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56646">CVE-2024-56646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56632">CVE-2024-56632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56624">CVE-2024-56624</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56621">CVE-2024-56621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56620">CVE-2024-56620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56618">CVE-2024-56618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56628">CVE-2024-56628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56627">CVE-2024-56627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56626">CVE-2024-56626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56591">CVE-2024-56591</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56588">CVE-2024-56588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56613">CVE-2024-56613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56586">CVE-2024-56586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56612">CVE-2024-56612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56609">CVE-2024-56609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56608">CVE-2024-56608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56607">CVE-2024-56607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56585">CVE-2024-56585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56599">CVE-2024-56599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56597">CVE-2024-56597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56596">CVE-2024-56596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56595">CVE-2024-56595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance (<a href="https://github.com/flatcar/Flatcar/issues/1901">Flatcar#1901</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Scaleway: SSH keys are now fetched <em>via</em> Afterburn (<a href="https://github.com/flatcar/scripts/pull/3277">scripts#3277</a>)</li>
<li>Scaleway: The hostname is now set <em>via</em> Afterburn (<a href="https://github.com/flatcar/scripts/pull/3277">scripts#3277</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51">6.12.51</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48">6.12.48</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49">6.12.49</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50">6.12.50</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html">3.117</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html">3.116</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.5</li>
<li>docker 28.0.4</li>
<li>ignition 2.22.0</li>
<li>kernel 6.12.51</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4459.1.0"/>
    <published>2025-10-14T12:34:34+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4426.1.0</id>
    <title>4426.1.0</title>
    <updated>2026-03-09T16:26:28.279722+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4372.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39725">CVE-2025-39725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39726">CVE-2025-39726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38675">CVE-2025-38675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38670">CVE-2025-38670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38668">CVE-2025-38668</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38666">CVE-2025-38666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38665">CVE-2025-38665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38663">CVE-2025-38663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38671">CVE-2025-38671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38662">CVE-2025-38662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39734">CVE-2025-39734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39732">CVE-2025-39732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39731">CVE-2025-39731</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39727">CVE-2025-39727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38650">CVE-2025-38650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38648">CVE-2025-38648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38646">CVE-2025-38646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38645">CVE-2025-38645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38660">CVE-2025-38660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38653">CVE-2025-38653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38652">CVE-2025-38652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38628">CVE-2025-38628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38626">CVE-2025-38626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38625">CVE-2025-38625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38624">CVE-2025-38624</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38623">CVE-2025-38623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38622">CVE-2025-38622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38640">CVE-2025-38640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38639">CVE-2025-38639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38635">CVE-2025-38635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38634">CVE-2025-38634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38632">CVE-2025-38632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38631">CVE-2025-38631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38630">CVE-2025-38630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38619">CVE-2025-38619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38611">CVE-2025-38611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38615">CVE-2025-38615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38612">CVE-2025-38612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38577">CVE-2025-38577</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38586">CVE-2025-38586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38585">CVE-2025-38585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38583">CVE-2025-38583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38582">CVE-2025-38582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38581">CVE-2025-38581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38610">CVE-2025-38610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38609">CVE-2025-38609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38604">CVE-2025-38604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38602">CVE-2025-38602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38601">CVE-2025-38601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38579">CVE-2025-38579</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38595">CVE-2025-38595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38593">CVE-2025-38593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38590">CVE-2025-38590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38588">CVE-2025-38588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38587">CVE-2025-38587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38578">CVE-2025-38578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38562">CVE-2025-38562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38561">CVE-2025-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38559">CVE-2025-38559</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38557">CVE-2025-38557</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38576">CVE-2025-38576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38574">CVE-2025-38574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38573">CVE-2025-38573</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38569">CVE-2025-38569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38501">CVE-2025-38501</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39798">CVE-2025-39798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39795">CVE-2025-39795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39794">CVE-2025-39794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39792">CVE-2025-39792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39750">CVE-2025-39750</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39758">CVE-2025-39758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39756">CVE-2025-39756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39754">CVE-2025-39754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39753">CVE-2025-39753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39752">CVE-2025-39752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39763">CVE-2025-39763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39744">CVE-2025-39744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39743">CVE-2025-39743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39739">CVE-2025-39739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39738">CVE-2025-39738</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39749">CVE-2025-39749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39748">CVE-2025-39748</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39747">CVE-2025-39747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39746">CVE-2025-39746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39736">CVE-2025-39736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39737">CVE-2025-39737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38727">CVE-2025-38727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38728">CVE-2025-38728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38694">CVE-2025-38694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38703">CVE-2025-38703</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38702">CVE-2025-38702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38701">CVE-2025-38701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38700">CVE-2025-38700</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38699">CVE-2025-38699</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38698">CVE-2025-38698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38726">CVE-2025-38726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38725">CVE-2025-38725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38697">CVE-2025-38697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38723">CVE-2025-38723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38722">CVE-2025-38722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38721">CVE-2025-38721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38717">CVE-2025-38717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38716">CVE-2025-38716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38715">CVE-2025-38715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38714">CVE-2025-38714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38696">CVE-2025-38696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38713">CVE-2025-38713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38712">CVE-2025-38712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38711">CVE-2025-38711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38710">CVE-2025-38710</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38709">CVE-2025-38709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38708">CVE-2025-38708</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38707">CVE-2025-38707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38705">CVE-2025-38705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38704">CVE-2025-38704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38695">CVE-2025-38695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38688">CVE-2025-38688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38687">CVE-2025-38687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38686">CVE-2025-38686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38683">CVE-2025-38683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38681">CVE-2025-38681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38693">CVE-2025-38693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38692">CVE-2025-38692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38691">CVE-2025-38691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38679">CVE-2025-38679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38680">CVE-2025-38680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38616">CVE-2025-38616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39773">CVE-2025-39773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39772">CVE-2025-39772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39770">CVE-2025-39770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39791">CVE-2025-39791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39788">CVE-2025-39788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39787">CVE-2025-39787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39767">CVE-2025-39767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39783">CVE-2025-39783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39782">CVE-2025-39782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39781">CVE-2025-39781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39780">CVE-2025-39780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39779">CVE-2025-39779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39776">CVE-2025-39776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39765">CVE-2025-39765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39766">CVE-2025-39766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39759">CVE-2025-39759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39711">CVE-2025-39711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39720">CVE-2025-39720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39719">CVE-2025-39719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39716">CVE-2025-39716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39715">CVE-2025-39715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39714">CVE-2025-39714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39713">CVE-2025-39713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39724">CVE-2025-39724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39723">CVE-2025-39723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39722">CVE-2025-39722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39721">CVE-2025-39721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39712">CVE-2025-39712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39675">CVE-2025-39675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39673">CVE-2025-39673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38737">CVE-2025-38737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38736">CVE-2025-38736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39710">CVE-2025-39710</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39709">CVE-2025-39709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39707">CVE-2025-39707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38735">CVE-2025-38735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39706">CVE-2025-39706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39705">CVE-2025-39705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39701">CVE-2025-39701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39700">CVE-2025-39700</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39698">CVE-2025-39698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39697">CVE-2025-39697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39695">CVE-2025-39695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39693">CVE-2025-39693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39692">CVE-2025-39692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39689">CVE-2025-39689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39687">CVE-2025-39687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39686">CVE-2025-39686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38733">CVE-2025-38733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39685">CVE-2025-39685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39684">CVE-2025-39684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39683">CVE-2025-39683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39681">CVE-2025-39681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39679">CVE-2025-39679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39676">CVE-2025-39676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38732">CVE-2025-38732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38677">CVE-2025-38677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300</a>)</li>
<li>bind (<a href="https://www.cve.org/CVERecord?id=CVE-2024-11187">CVE-2024-11187</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2024-12705">CVE-2024-12705</a>)</li>
<li>containerd (<a href="https://www.cve.org/CVERecord?id=CVE-2025-47291">CVE-2025-47291</a>)</li>
<li>git (<a href="https://www.cve.org/CVERecord?id=CVE-2025-48384">CVE-2025-48384</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-48385">CVE-2025-48385</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-48386">CVE-2025-48386</a>)</li>
<li>glib (<a href="https://www.cve.org/CVERecord?id=CVE-2025-4373">CVE-2025-4373</a>)</li>
<li>go (<a href="https://www.cve.org/CVERecord?id=CVE-2025-4674">CVE-2025-4674</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-22873">CVE-2025-22873</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4673">CVE-2025-4673</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-0913">CVE-2025-0913</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-22874">CVE-2025-22874</a>)</li>
<li>jq (<a href="https://www.cve.org/CVERecord?id=CVE-2024-23337">CVE-2024-23337</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2024-53427">CVE-2024-53427</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-48060">CVE-2025-48060</a>)</li>
<li>libxml2 (<a href="https://www.cve.org/CVERecord?id=CVE-2025-32414">CVE-2025-32414</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32415">CVE-2025-32415</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-6021">CVE-2025-6021</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-49794">CVE-2025-49794</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-49795">CVE-2025-49795</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-49796">CVE-2025-49796</a>)</li>
<li>nvidia-drivers-service (<a href="https://www.cve.org/CVERecord?id=CVE-2025-23244">CVE-2025-23244</a>)</li>
<li>podman (<a href="https://www.cve.org/CVERecord?id=CVE-2025-6032">CVE-2025-6032</a>)</li>
<li>python (<a href="https://www.cve.org/CVERecord?id=CVE-2025-4516">CVE-2025-4516</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2024-12718">CVE-2024-12718</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4138">CVE-2025-4138</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4330">CVE-2025-4330</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4517">CVE-2025-4517</a>)</li>
<li>requests (<a href="https://www.cve.org/CVERecord?id=CVE-2024-47081">CVE-2024-47081</a>)</li>
<li>vim (<a href="https://www.cve.org/CVERecord?id=CVE-2025-1215">CVE-2025-1215</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-22134">CVE-2025-22134</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-24014">CVE-2025-24014</a>, <a href="https://github.com/vim/vim/security/advisories/GHSA-63p5-mwg2-787v">GHSA-63p5-mwg2-787v</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-27423">CVE-2025-27423</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-29768">CVE-2025-29768</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Enabled <code>CONFIG_CPUSETS_V1</code> to mitigate cgroupsv1 removal (e.g JVM) (<a href="https://github.com/flatcar/Flatcar/issues/1884">Flatcar#1884</a>)</li>
<li>Fixed a UID/GID mis-alignment for user/group <code>messagebus</code> between acct-user/acct-group and baselayout. (<a href="https://github.com/flatcar/baselayout/pull/36">baselayout#36</a>)</li>
<li>Reenabled console support for DRM drivers, so that with the virtio graphics driver the interactive console is shown again after boot (<a href="https://github.com/flatcar/Flatcar/issues/1834">Flatcar#1834</a>)</li>
<li>sysext-podman: removed <code>/etc/subuid</code> and <code>/etc/subgid</code> generation for <code>core</code> user, before this change it partially overwrites the file and causes issues. (<a href="https://github.com/flatcar/Flatcar/issues/1733">Flatcar#1733</a>) This could be created through initial provisioning. (<a href="https://github.com/flatcar/scripts/pull/3043">scripts#3043</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added <a href="https://containerd.github.io/overlaybd/">overlaybd</a> system extension to support accelerated container images.
Add <code>overlaybd</code> to <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/"><code>/etc/flatcar/enabled-sysext.conf</code></a> to check it out.
The extension includes both <a href="https://github.com/containerd/overlaybd/">overlaybd</a> as well as <a href="https://github.com/containerd/accelerated-container-image">accelerated-container-image</a> tools.</li>
<li>Azure OEM: add inotify-tools, python urllib3 (<a href="https://github.com/flatcar/scripts/pull/3116">flatcar/scripts#3116</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.47">6.12.47</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.46">6.12.46</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.45">6.12.45</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.44">6.12.44</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.43">6.12.43</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.42">6.12.42</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.41">6.12.41</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.35">6.12.35</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250708">20250708</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250627">20250627</a>))</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.31/release/3.31.html#id1">3.31.7</a>)</li>
<li>SDK: gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00014.html">16.3</a>)</li>
<li>SDK: gentoo-syntax (<a href="https://github.com/gentoo/gentoo-syntax/releases/tag/v16">16</a>)</li>
<li>SDK: go (<a href="https://go.dev/doc/devel/release#go1.24.minor">1.24.5</a> includes <a href="https://go.dev/doc/devel/release#go1.24.minor">1.24.4</a>)</li>
<li>SDK: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.19">3.19</a>)</li>
<li>SDK: m4 (<a href="https://lists.gnu.org/archive/html/m4-discuss/2025-05/msg00002.html">1.4.20</a>)</li>
<li>SDK: maturin (<a href="https://github.com/PyO3/maturin/blob/main/Changelog.md#191">1.9.1</a>)</li>
<li>SDK: meson (<a href="https://github.com/mesonbuild/meson/commits/1.7.2/">1.7.2</a>)</li>
<li>SDK: mtools (<a href="https://www.gnu.org/software/mtools/manual/mtools.html">4.0.49</a>)</li>
<li>SDK: nano (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-06/msg00003.html">8.5</a>)</li>
<li>SDK: pkgcheck (<a href="https://github.com/pkgcore/pkgcheck/blob/v0.10.36/NEWS.rst">0.10.36</a>)</li>
<li>SDK: python-cryptography (<a href="https://cryptography.io/en/latest/changelog/#v45-0-5">45.0.4</a>)</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/9.2">9.2.3</a>)</li>
<li>SDK: rust (<a href="https://releases.rs/docs/1.87.0/">1.87.0</a> (includes <a href="https://releases.rs/docs/1.86.0/">1.86.0</a>))</li>
<li>azure, dev, gce, sysext-python: mpdecimal (<a href="https://www.bytereef.org/mpdecimal/changelog.html#version-4-0-1xs">4.0.1</a>)</li>
<li>azure, dev, gce, sysext-python: python (<a href="https://www.python.org/downloads/release/python-31113/">3.11.13</a>)</li>
<li>base, dev: bind (<a href="https://bind9.readthedocs.io/en/v9.18.37/notes.html#notes-for-bind-9-18-37">9.18.37</a> (includes <a href="https://bind9.readthedocs.io/en/v9.18.36/notes.html#notes-for-bind-9-18-36">9.18.36</a>, <a href="https://bind9.readthedocs.io/en/v9.18.35/notes.html#notes-for-bind-9-18-35">9.18.35</a>, <a href="https://bind9.readthedocs.io/en/v9.18.34/notes.html#notes-for-bind-9-18-34">9.18.34</a>, <a href="https://bind9.readthedocs.io/en/v9.18.33/notes.html#notes-for-bind-9-18-33">9.18.33</a>, <a href="https://bind9.readthedocs.io/en/v9.18.32/notes.html#notes-for-bind-9-18-32">9.18.32</a>))</li>
<li>base, dev: checkpolicy (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8.1">3.8.1</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8">3.8</a>))</li>
<li>base, dev: elfutils (<a href="https://inbox.sourceware.org/elfutils-devel/CAJDtP-RjuT13zehLgSvz9TnwQZ1VYPOS=q_kuut5a2g+KLamgw@mail.gmail.com/T/#u">0.193</a>)</li>
<li>base, dev: gawk (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00003.html">5.3.2</a>)</li>
<li>base, dev: gcc (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-05/msg00004.html">14.3.0</a>)</li>
<li>base, dev: glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.3">2.84.3</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.2">2.84.2</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.1">2.84.1</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.0">2.84.0</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.5">2.83.5</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.4">2.83.4</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.3">2.83.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.2">2.83.2</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.1">2.83.1</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.0">2.83.0</a>))</li>
<li>base, dev: glibc (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-01/msg00014.html">2.41</a>)</li>
<li>base, dev: gnupg (<a href="https://dev.gnupg.org/T7428">2.4.8</a>)</li>
<li>base, dev: grep (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00008.html">3.12</a>)</li>
<li>base, dev: gzip (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00007.html">1.14</a>)</li>
<li>base, dev: inih (<a href="https://github.com/benhoyt/inih/releases/tag/r60">60</a> (includes <a href="https://github.com/benhoyt/inih/releases/tag/r59">59</a>))</li>
<li>base, dev: ipset (<a href="https://lwn.net/Articles/1021623/">7.24</a>)</li>
<li>base, dev: iputils (<a href="https://github.com/iputils/iputils/releases/tag/20250605">20250605</a> (includes <a href="https://github.com/iputils/iputils/releases/tag/20250602">20250602</a>))</li>
<li>base, dev: jansson (<a href="https://jansson.readthedocs.io/en/latest/changes.html#version-2-14-1">2.14.1</a>)</li>
<li>base, dev: jq (<a href="https://github.com/jqlang/jq/releases/tag/jq-1.8.1">1.8.1</a> (includes <a href="https://github.com/jqlang/jq/releases/tag/jq-1.8.0">1.8.0</a>))</li>
<li>base, dev: kexec-tools (<a href="https://github.com/horms/kexec-tools/commits/v2.0.31/">2.0.31</a>)</li>
<li>base, dev: libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.8.1">3.8.1</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.8.0">3.8.0</a>))</li>
<li>base, dev: libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.wqnp1zp1o8bm">2.76</a> (includes <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.7xqcoecpcnn8">2.75</a>, <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.ccbrq82zh7n9">2.74</a>, <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.7yd7ab9ppagk">2.73</a>, <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.ulglddlojmy0">2.72</a>))</li>
<li>base, dev: libffi (<a href="https://github.com/libffi/libffi/releases/tag/v3.5.1">3.5.1</a> (includes <a href="https://github.com/libffi/libffi/releases/tag/v3.4.8">3.4.8</a> (includes <a href="https://github.com/libffi/libffi/releases/tag/v3.4.7">3.4.7</a>)))</li>
<li>base, dev: libgcrypt (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=84bc61a49f3a09302b3438cb529baf67576ad859;hb=81ce5321b1b79bde6dfdc3c164efb40c13cf656b">1.11.1</a>)</li>
<li>base, dev: libgpg-error (<a href="https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.55">1.55</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=66b2256de2f59c38b9cd35fb4a1b1971a6c9f3f1;hb=f9e98ed8315eaf0468870149d22c5dcf992288ec">1.53</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=4f6a114d81fb5b2f73bb65a1f1cc3c21fe64fa0c;hb=be471d158e4951f4b17335b0fc9ae2387a786b5b">1.52</a>)))</li>
<li>base, dev: libnftnl (<a href="https://lwn.net/Articles/1017463/">1.2.9</a>)</li>
<li>base, dev: libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8.1">3.8.1</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8">3.8</a>))</li>
<li>base, dev: libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8.1">3.8.1</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8">3.8</a>))</li>
<li>base, dev: libunistring (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-10/msg00000.html">1.3</a>)</li>
<li>base, dev: libunwind (<a href="https://github.com/libunwind/libunwind/releases/tag/v1.8.2">1.8.2</a>)</li>
<li>base, dev: liburing (<a href="https://github.com/axboe/liburing/releases/tag/liburing-2.9">2.9</a> (includes <a href="https://github.com/axboe/liburing/releases/tag/liburing-2.8">2.8</a>))</li>
<li>base, dev: libusb (<a href="https://github.com/libusb/libusb/blob/v1.0.28/ChangeLog">1.0.28</a>)</li>
<li>base, dev: libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.51.0">1.51.0</a>)</li>
<li>base, dev: libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.8">2.13.8</a>)</li>
<li>base, dev: nvidia-drivers-service (amd64) (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-247-01/index.html">535.247.01</a>)</li>
<li>base, dev: nvidia-drivers-service (arm64) (570.153.02 (includes <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-148-08/index.html">570.148.08</a>, <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-133-20/index.html">570.133.20</a>, <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-124-06/index.html">570.124.06</a>))</li>
<li>base, dev: openssh (<a href="https://www.openssh.com/releasenotes.html#10.0p1">10.0_p1</a>)</li>
<li>base, dev: openssl (<a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.1">3.4.1</a> (includes <a href="https://github.com/openssl/openssl/blob/openssl-3.4.0/NEWS.md#openssl-34">3.4.0</a>))</li>
<li>base, dev: quota (<a href="https://sourceforge.net/p/linuxquota/news/2025/04/quota-tools-410-released/">4.10</a>)</li>
<li>base, dev: semodule-utils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8.1">3.8.1</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8">3.8</a>))</li>
<li>base, dev: sqlite (<a href="https://sqlite.org/releaselog/3_50_2.html">3.50.2</a> (includes <a href="https://sqlite.org/releaselog/3_49_2.html">3.49.2</a>))</li>
<li>base, dev: sssd (<a href="https://sssd.io/release-notes/sssd-2.9.7.html">2.9.7</a>)</li>
<li>base, dev: userspace-rcu (<a href="https://lkml.org/lkml/2025/5/14/1580">0.15.3</a> (includes <a href="https://lwn.net/Articles/1017443/">0.15.2</a>))</li>
<li>base, dev: vim (<a href="https://github.com/vim/vim/commits/v9.1.1436/">9.1.1436</a>)</li>
<li>base, dev: xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.8.1">5.8.1</a> (includes <a href="https://github.com/tukaani-project/xz/releases/tag/v5.8.0">5.8.0</a>))</li>
<li>btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/releases/tag/v6.14">6.14</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115_1.html">3.115.1</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html">3.113</a>))</li>
<li>chrony (<a href="https://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2025/06/msg00000.html">4.7</a>)</li>
<li>curl (<a href="https://curl.se/ch/8.14.1.html">8.14.1</a>)</li>
<li>dbus-glib (<a href="https://gitlab.freedesktop.org/dbus/dbus-glib/-/blob/master/NEWS?ref_type=heads#L8">0.114</a>)</li>
<li>dev, sysext-incus: squashfs-tools (<a href="https://lkml.org/lkml/2025/6/3/1214">4.7</a>)</li>
<li>dev: file (<a href="https://github.com/file/file/blob/FILE5_46/ChangeLog">5.46</a>)</li>
<li>dev: gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00000.html">16.2</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2025-01/msg00009.html">16.1</a>))</li>
<li>dev: man-db (<a href="https://gitlab.com/man-db/man-db/-/releases/2.13.1">2.13.1</a>)</li>
<li>dev: pahole (<a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.30">1.30</a>)</li>
<li>dev: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.68">3.0.68</a>)</li>
<li>dev: sandbox (<a href="https://gitweb.gentoo.org/proj/sandbox.git/log/?h=v2.46">2.46</a>)</li>
<li>dev: smartmontools (<a href="https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_5">7.5</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=fba608c5a8ac943ebff046f387ade9dd364eb5a7">6.14</a>)</li>
<li>fuse-overlayfs (<a href="https://github.com/containers/fuse-overlayfs/releases/tag/v1.15">1.15</a>)</li>
<li>git (<a href="https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.49.1.adoc">2.49.1</a>)</li>
<li>iproute2 (<a href="https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=401816cc9c7cde7b666d4befb06a10d6359c9688">6.15.0</a>)</li>
<li>kbd (<a href="https://lore.kernel.org/kbd/aDmDTB_oRNU8UsWy@example.org/T/#u">2.8.0</a>)</li>
<li>less (<a href="https://greenwoodsoftware.com/less/news.679.html">679</a>)</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.14">1.14</a>)</li>
<li>ncurses (<a href="https://invisible-island.net/ncurses/announce.html">6.5_p20250329</a>)</li>
<li>nftables (<a href="https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.3.txt">1.1.3</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.14">2.14</a>)</li>
<li>procps (<a href="https://gitlab.com/procps-ng/procps/-/blob/master/NEWS?ref_type=heads#L30">4.0.5</a>)</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.20.8.html">4.20.8</a>)</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.15">6.15</a>)</li>
<li>sysext-containerd: containerd (<a href="https://github.com/containerd/containerd/releases/tag/v2.0.5">2.0.5</a>)</li>
<li>sysext-containerd: runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.2.6">1.2.6</a>)</li>
<li>sysext-docker: docker (<a href="https://github.com/moby/moby/releases/tag/v28.0.4">28.0.4</a> (includes <a href="https://github.com/moby/moby/releases/tag/v28.0.3">28.0.3</a>, <a href="https://github.com/moby/moby/releases/tag/v28.0.2">28.0.2</a>))</li>
<li>sysext-incus: cowsql (<a href="https://github.com/cowsql/cowsql/commits/v1.15.8/">1.15.8</a>)</li>
<li>sysext-incus: incus (<a href="https://discuss.linuxcontainers.org/t/incus-6-0-4-lts-has-been-released/23391">6.0.4</a>)</li>
<li>sysext-incus: lxc (<a href="https://discuss.linuxcontainers.org/t/lxc-6-0-4-lts-has-been-released/23390">6.0.4</a>)</li>
<li>sysext-incus: lxcfs (<a href="https://discuss.linuxcontainers.org/t/lxcfs-6-0-4-lts-has-been-released/23389">6.0.4</a>)</li>
<li>sysext-nvidia: nvidia-drivers (<a href="https://www.nvidia.com/en-us/drivers/details/247720/">570.169</a> (includes 570.153.02))</li>
<li>sysext-podman: containers-common (<a href="https://github.com/containers/common/releases/tag/v0.63.0">0.63.0</a>)</li>
<li>sysext-podman: gpgme (<a href="https://dev.gnupg.org/T7659">1.24.3</a>)</li>
<li>sysext-podman: passt (<a href="https://archives.passt.top/passt-user/20250415233140.35074c4b@elisabeth/T/#u">2025.04.15</a>)</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.5.2">5.5.2</a>)</li>
<li>sysext-python: cachecontrol (<a href="https://github.com/psf/cachecontrol/releases/tag/v0.14.3">0.14.3</a> (includes <a href="https://github.com/psf/cachecontrol/releases/tag/v0.14.2">0.14.2</a>))</li>
<li>sysext-python: charset-normalizer (<a href="https://github.com/jawah/charset_normalizer/releases/tag/3.4.2">3.4.2</a>)</li>
<li>sysext-python: ensurepip-pip (<a href="https://pip.pypa.io/en/stable/news/#v25-1-1">25.1.1</a>)</li>
<li>sysext-python: jaraco-collections (<a href="https://github.com/jaraco/jaraco.collections/releases/tag/v5.2.1">5.2.1</a>)</li>
<li>sysext-python: jaraco-functools (<a href="https://github.com/jaraco/jaraco.functools/releases/tag/v4.2.1">4.2.1</a>)</li>
<li>sysext-python: more-itertools (<a href="https://github.com/more-itertools/more-itertools/blob/v10.7.0/docs/versions.rst">10.7.0</a>)</li>
<li>sysext-python: msgpack (<a href="https://github.com/msgpack/msgpack-python/releases/tag/v1.1.1">1.1.1</a>)</li>
<li>sysext-python: packaging (<a href="https://github.com/pypa/packaging/releases/tag/25.0">25.0</a>)</li>
<li>sysext-python: pip (<a href="https://github.com/pypa/pip/blob/25.1.1/NEWS.rst">25.1.1</a> (includes <a href="https://github.com/pypa/pip/blob/25.1/NEWS.rst">25.1</a>))</li>
<li>sysext-python: platformdirs (<a href="https://github.com/tox-dev/platformdirs/releases/tag/4.3.8">4.3.8</a>)</li>
<li>sysext-python: pygments (<a href="https://pygments.org/docs/changelog/#version-2-19-2">2.19.2</a>)</li>
<li>sysext-python: requests (<a href="https://github.com/psf/requests/releases/tag/v2.32.4">2.32.4</a> (includes <a href="https://github.com/psf/requests/releases/tag/v2.32.3">2.32.3</a>))</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/releases/tag/v80.9.0">80.9.0</a> (includes <a href="https://github.com/pypa/setuptools/releases/tag/v80.8.0">80.8.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.7.0">80.7.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.6.0">80.6.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.4.0">80.4.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.3.0">80.3.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.2.0">80.2.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.1.0">80.1.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.0.0">80.0.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v79.0.0">79.0.0</a>))</li>
<li>sysext-python: setuptools-scm (<a href="https://github.com/pypa/setuptools-scm/releases/tag/v8.3.1">8.3.1</a> (includes <a href="https://github.com/pypa/setuptools-scm/releases/tag/v8.3.0">8.3.0</a>))</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.5.9.12">2025.5.9.12</a> (includes <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.5.8.15">2025.5.8.15</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.5.8.13">2025.5.8.13</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.5.7.19">2025.5.7.19</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.5.1.12">2025.5.1.12</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.4.28.22">2025.4.28.22</a>))</li>
<li>sysext-python: typing-extensions (<a href="https://github.com/python/typing_extensions/releases/tag/4.14.1">4.14.1</a> (includes <a href="https://github.com/python/typing_extensions/releases/tag/4.14.0">4.14.0</a>))</li>
<li>sysext-python: urllib3 (<a href="https://github.com/urllib3/urllib3/releases/tag/2.5.0">2.5.0</a>)</li>
<li>sysext-zfs: zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.3.3">2.3.3</a> (includes <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.3.2">2.3.2</a>))</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/blob/master/Documentation/releases/v2.41-ReleaseNotes">2.41.1</a>)</li>
<li>vmware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-13.0.0">13.0.0</a>)</li>
<li>xfsprogs (<a href="https://lkml.org/lkml/2025/4/14/1443">6.14.0</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 4426.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39734">CVE-2025-39734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39732">CVE-2025-39732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39731">CVE-2025-39731</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39727">CVE-2025-39727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38650">CVE-2025-38650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38648">CVE-2025-38648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38646">CVE-2025-38646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38645">CVE-2025-38645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38660">CVE-2025-38660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38653">CVE-2025-38653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38652">CVE-2025-38652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38628">CVE-2025-38628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38626">CVE-2025-38626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38625">CVE-2025-38625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38624">CVE-2025-38624</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38623">CVE-2025-38623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38622">CVE-2025-38622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38640">CVE-2025-38640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38639">CVE-2025-38639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38635">CVE-2025-38635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38634">CVE-2025-38634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38632">CVE-2025-38632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38631">CVE-2025-38631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38630">CVE-2025-38630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38619">CVE-2025-38619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38611">CVE-2025-38611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38615">CVE-2025-38615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38612">CVE-2025-38612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38577">CVE-2025-38577</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38586">CVE-2025-38586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38585">CVE-2025-38585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38583">CVE-2025-38583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38582">CVE-2025-38582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38581">CVE-2025-38581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38610">CVE-2025-38610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38609">CVE-2025-38609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38604">CVE-2025-38604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38602">CVE-2025-38602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38601">CVE-2025-38601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38579">CVE-2025-38579</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38595">CVE-2025-38595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38593">CVE-2025-38593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38590">CVE-2025-38590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38588">CVE-2025-38588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38587">CVE-2025-38587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38578">CVE-2025-38578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38562">CVE-2025-38562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38561">CVE-2025-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38559">CVE-2025-38559</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38557">CVE-2025-38557</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38576">CVE-2025-38576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38574">CVE-2025-38574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38573">CVE-2025-38573</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38569">CVE-2025-38569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38501">CVE-2025-38501</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39798">CVE-2025-39798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39795">CVE-2025-39795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39794">CVE-2025-39794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39792">CVE-2025-39792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39750">CVE-2025-39750</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39758">CVE-2025-39758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39756">CVE-2025-39756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39754">CVE-2025-39754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39753">CVE-2025-39753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39752">CVE-2025-39752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39763">CVE-2025-39763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39744">CVE-2025-39744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39743">CVE-2025-39743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39739">CVE-2025-39739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39738">CVE-2025-39738</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39749">CVE-2025-39749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39748">CVE-2025-39748</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39747">CVE-2025-39747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39746">CVE-2025-39746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39736">CVE-2025-39736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39737">CVE-2025-39737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38727">CVE-2025-38727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38728">CVE-2025-38728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38694">CVE-2025-38694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38703">CVE-2025-38703</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38702">CVE-2025-38702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38701">CVE-2025-38701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38700">CVE-2025-38700</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38699">CVE-2025-38699</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38698">CVE-2025-38698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38726">CVE-2025-38726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38725">CVE-2025-38725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38697">CVE-2025-38697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38723">CVE-2025-38723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38722">CVE-2025-38722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38721">CVE-2025-38721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38717">CVE-2025-38717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38716">CVE-2025-38716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38715">CVE-2025-38715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38714">CVE-2025-38714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38696">CVE-2025-38696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38713">CVE-2025-38713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38712">CVE-2025-38712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38711">CVE-2025-38711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38710">CVE-2025-38710</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38709">CVE-2025-38709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38708">CVE-2025-38708</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38707">CVE-2025-38707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38705">CVE-2025-38705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38704">CVE-2025-38704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38695">CVE-2025-38695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38688">CVE-2025-38688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38687">CVE-2025-38687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38686">CVE-2025-38686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38683">CVE-2025-38683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38681">CVE-2025-38681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38693">CVE-2025-38693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38692">CVE-2025-38692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38691">CVE-2025-38691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38679">CVE-2025-38679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38680">CVE-2025-38680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38616">CVE-2025-38616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39773">CVE-2025-39773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39772">CVE-2025-39772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39770">CVE-2025-39770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39791">CVE-2025-39791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39788">CVE-2025-39788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39787">CVE-2025-39787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39767">CVE-2025-39767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39783">CVE-2025-39783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39782">CVE-2025-39782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39781">CVE-2025-39781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39780">CVE-2025-39780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39779">CVE-2025-39779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39776">CVE-2025-39776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39765">CVE-2025-39765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39766">CVE-2025-39766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39759">CVE-2025-39759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39711">CVE-2025-39711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39720">CVE-2025-39720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39719">CVE-2025-39719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39716">CVE-2025-39716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39715">CVE-2025-39715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39714">CVE-2025-39714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39713">CVE-2025-39713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39724">CVE-2025-39724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39723">CVE-2025-39723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39722">CVE-2025-39722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39721">CVE-2025-39721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39712">CVE-2025-39712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39675">CVE-2025-39675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39673">CVE-2025-39673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38737">CVE-2025-38737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38736">CVE-2025-38736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39710">CVE-2025-39710</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39709">CVE-2025-39709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39707">CVE-2025-39707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38735">CVE-2025-38735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39706">CVE-2025-39706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39705">CVE-2025-39705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39701">CVE-2025-39701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39700">CVE-2025-39700</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39698">CVE-2025-39698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39697">CVE-2025-39697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39695">CVE-2025-39695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39693">CVE-2025-39693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39692">CVE-2025-39692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39689">CVE-2025-39689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39687">CVE-2025-39687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39686">CVE-2025-39686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38733">CVE-2025-38733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39685">CVE-2025-39685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39684">CVE-2025-39684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39683">CVE-2025-39683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39681">CVE-2025-39681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39679">CVE-2025-39679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39676">CVE-2025-39676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38732">CVE-2025-38732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38677">CVE-2025-38677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Enabled <code>CONFIG_CPUSETS_V1</code> to mitigate cgroupsv1 removal (e.g JVM) (<a href="https://github.com/flatcar/Flatcar/issues/1884">Flatcar#1884</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.47">6.12.47</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.46">6.12.46</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.45">6.12.45</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.44">6.12.44</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.43">6.12.43</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.42">6.12.42</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115_1.html">3.115.1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.5</li>
<li>docker 28.0.4</li>
<li>ignition 2.21.0</li>
<li>kernel 6.12.47</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4426.1.0"/>
    <published>2025-09-15T14:01:56+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4372.1.0</id>
    <title>4372.1.0</title>
    <updated>2026-03-09T16:26:28.222941+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4344.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38523">CVE-2025-38523</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38436">CVE-2025-38436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38434">CVE-2025-38434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38362">CVE-2025-38362</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38361">CVE-2025-38361</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38355">CVE-2025-38355</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38369">CVE-2025-38369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38368">CVE-2025-38368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38365">CVE-2025-38365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38364">CVE-2025-38364</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38363">CVE-2025-38363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38353">CVE-2025-38353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38354">CVE-2025-38354</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38246">CVE-2025-38246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38245">CVE-2025-38245</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38244">CVE-2025-38244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38264">CVE-2025-38264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38263">CVE-2025-38263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38262">CVE-2025-38262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38260">CVE-2025-38260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38259">CVE-2025-38259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38258">CVE-2025-38258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38257">CVE-2025-38257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38256">CVE-2025-38256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38255">CVE-2025-38255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38253">CVE-2025-38253</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38251">CVE-2025-38251</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38250">CVE-2025-38250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38249">CVE-2025-38249</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38239">CVE-2025-38239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38236">CVE-2025-38236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38413">CVE-2025-38413</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38412">CVE-2025-38412</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38410">CVE-2025-38410</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38409">CVE-2025-38409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38407">CVE-2025-38407</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38408">CVE-2025-38408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38406">CVE-2025-38406</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38405">CVE-2025-38405</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38404">CVE-2025-38404</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38403">CVE-2025-38403</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38401">CVE-2025-38401</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38402">CVE-2025-38402</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38379">CVE-2025-38379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38377">CVE-2025-38377</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38376">CVE-2025-38376</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38375">CVE-2025-38375</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38374">CVE-2025-38374</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38400">CVE-2025-38400</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38373">CVE-2025-38373</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38399">CVE-2025-38399</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38396">CVE-2025-38396</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38395">CVE-2025-38395</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38393">CVE-2025-38393</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38392">CVE-2025-38392</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38391">CVE-2025-38391</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38390">CVE-2025-38390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38372">CVE-2025-38372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38389">CVE-2025-38389</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38388">CVE-2025-38388</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38387">CVE-2025-38387</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38386">CVE-2025-38386</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38385">CVE-2025-38385</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38384">CVE-2025-38384</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38383">CVE-2025-38383</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38382">CVE-2025-38382</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38381">CVE-2025-38381</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38371">CVE-2025-38371</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38360">CVE-2025-38360</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38356">CVE-2025-38356</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38546">CVE-2025-38546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38545">CVE-2025-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38544">CVE-2025-38544</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38543">CVE-2025-38543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38542">CVE-2025-38542</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38540">CVE-2025-38540</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38541">CVE-2025-38541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38520">CVE-2025-38520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38521">CVE-2025-38521</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38512">CVE-2025-38512</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38511">CVE-2025-38511</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38510">CVE-2025-38510</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38507">CVE-2025-38507</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38506">CVE-2025-38506</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38517">CVE-2025-38517</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38516">CVE-2025-38516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38515">CVE-2025-38515</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38514">CVE-2025-38514</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38513">CVE-2025-38513</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38503">CVE-2025-38503</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38505">CVE-2025-38505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38460">CVE-2025-38460</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38467">CVE-2025-38467</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38466">CVE-2025-38466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38465">CVE-2025-38465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38464">CVE-2025-38464</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38463">CVE-2025-38463</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38462">CVE-2025-38462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38461">CVE-2025-38461</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38446">CVE-2025-38446</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38445">CVE-2025-38445</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38444">CVE-2025-38444</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38443">CVE-2025-38443</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38441">CVE-2025-38441</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38440">CVE-2025-38440</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38458">CVE-2025-38458</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38457">CVE-2025-38457</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38439">CVE-2025-38439</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38456">CVE-2025-38456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38455">CVE-2025-38455</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38454">CVE-2025-38454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38452">CVE-2025-38452</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38451">CVE-2025-38451</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38450">CVE-2025-38450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38449">CVE-2025-38449</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38448">CVE-2025-38448</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38437">CVE-2025-38437</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38438">CVE-2025-38438</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38349">CVE-2025-38349</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57809">CVE-2024-57809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57838">CVE-2024-57838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56780">CVE-2024-56780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56779">CVE-2024-56779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56778">CVE-2024-56778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56777">CVE-2024-56777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56776">CVE-2024-56776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56775">CVE-2024-56775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56774">CVE-2024-56774</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56773">CVE-2024-56773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56771">CVE-2024-56771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56772">CVE-2024-56772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56556">CVE-2024-56556</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56565">CVE-2024-56565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56564">CVE-2024-56564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56563">CVE-2024-56563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56562">CVE-2024-56562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56561">CVE-2024-56561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56560">CVE-2024-56560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56559">CVE-2024-56559</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56582">CVE-2024-56582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56581">CVE-2024-56581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56580">CVE-2024-56580</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56579">CVE-2024-56579</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56578">CVE-2024-56578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56577">CVE-2024-56577</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56576">CVE-2024-56576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56558">CVE-2024-56558</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56575">CVE-2024-56575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56574">CVE-2024-56574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56573">CVE-2024-56573</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56572">CVE-2024-56572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56571">CVE-2024-56571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56570">CVE-2024-56570</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56569">CVE-2024-56569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56567">CVE-2024-56567</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56566">CVE-2024-56566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56557">CVE-2024-56557</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56555">CVE-2024-56555</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56554">CVE-2024-56554</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56553">CVE-2024-56553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56550">CVE-2024-56550</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56552">CVE-2024-56552</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56551">CVE-2024-56551</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38552">CVE-2025-38552</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38551">CVE-2025-38551</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38550">CVE-2025-38550</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38549">CVE-2025-38549</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38547">CVE-2025-38547</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38548">CVE-2025-38548</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38531">CVE-2025-38531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38530">CVE-2025-38530</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38529">CVE-2025-38529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38528">CVE-2025-38528</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38527">CVE-2025-38527</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38526">CVE-2025-38526</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38524">CVE-2025-38524</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38539">CVE-2025-38539</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38538">CVE-2025-38538</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38537">CVE-2025-38537</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38535">CVE-2025-38535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38533">CVE-2025-38533</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38532">CVE-2025-38532</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38499">CVE-2025-38499</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38478">CVE-2025-38478</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38476">CVE-2025-38476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38475">CVE-2025-38475</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38474">CVE-2025-38474</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38473">CVE-2025-38473</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38472">CVE-2025-38472</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38497">CVE-2025-38497</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38496">CVE-2025-38496</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38495">CVE-2025-38495</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38494">CVE-2025-38494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38493">CVE-2025-38493</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38491">CVE-2025-38491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38490">CVE-2025-38490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38471">CVE-2025-38471</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38489">CVE-2025-38489</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38488">CVE-2025-38488</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38487">CVE-2025-38487</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38485">CVE-2025-38485</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38484">CVE-2025-38484</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38483">CVE-2025-38483</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38482">CVE-2025-38482</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38481">CVE-2025-38481</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38480">CVE-2025-38480</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38469">CVE-2025-38469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38470">CVE-2025-38470</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38468">CVE-2025-38468</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.40">6.12.40</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.39">6.12.39</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.38">6.12.38</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.37">6.12.37</a>, <a href="https://lwn.net/Articles/1028828/">6.12.36</a>, <a href="https://lwn.net/Articles/1027277">6.12.35</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.33">6.12.33</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.32">6.12.32</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250613">20250613</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html">3.114</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html">3.113.1</a>,<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html">3.113</a>))</li>
</ul>
<p><em>Changes since <strong>Alpha 4372.0.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38523">CVE-2025-38523</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38436">CVE-2025-38436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38434">CVE-2025-38434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38362">CVE-2025-38362</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38361">CVE-2025-38361</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38355">CVE-2025-38355</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38369">CVE-2025-38369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38368">CVE-2025-38368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38365">CVE-2025-38365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38364">CVE-2025-38364</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38363">CVE-2025-38363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38353">CVE-2025-38353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38354">CVE-2025-38354</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38246">CVE-2025-38246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38245">CVE-2025-38245</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38244">CVE-2025-38244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38264">CVE-2025-38264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38263">CVE-2025-38263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38262">CVE-2025-38262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38260">CVE-2025-38260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38259">CVE-2025-38259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38258">CVE-2025-38258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38257">CVE-2025-38257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38256">CVE-2025-38256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38255">CVE-2025-38255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38253">CVE-2025-38253</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38251">CVE-2025-38251</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38250">CVE-2025-38250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38249">CVE-2025-38249</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38239">CVE-2025-38239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38236">CVE-2025-38236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38413">CVE-2025-38413</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38412">CVE-2025-38412</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38410">CVE-2025-38410</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38409">CVE-2025-38409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38407">CVE-2025-38407</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38408">CVE-2025-38408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38406">CVE-2025-38406</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38405">CVE-2025-38405</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38404">CVE-2025-38404</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38403">CVE-2025-38403</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38401">CVE-2025-38401</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38402">CVE-2025-38402</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38379">CVE-2025-38379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38377">CVE-2025-38377</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38376">CVE-2025-38376</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38375">CVE-2025-38375</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38374">CVE-2025-38374</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38400">CVE-2025-38400</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38373">CVE-2025-38373</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38399">CVE-2025-38399</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38396">CVE-2025-38396</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38395">CVE-2025-38395</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38393">CVE-2025-38393</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38392">CVE-2025-38392</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38391">CVE-2025-38391</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38390">CVE-2025-38390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38372">CVE-2025-38372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38389">CVE-2025-38389</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38388">CVE-2025-38388</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38387">CVE-2025-38387</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38386">CVE-2025-38386</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38385">CVE-2025-38385</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38384">CVE-2025-38384</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38383">CVE-2025-38383</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38382">CVE-2025-38382</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38381">CVE-2025-38381</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38371">CVE-2025-38371</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38360">CVE-2025-38360</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38356">CVE-2025-38356</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38546">CVE-2025-38546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38545">CVE-2025-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38544">CVE-2025-38544</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38543">CVE-2025-38543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38542">CVE-2025-38542</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38540">CVE-2025-38540</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38541">CVE-2025-38541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38520">CVE-2025-38520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38521">CVE-2025-38521</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38512">CVE-2025-38512</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38511">CVE-2025-38511</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38510">CVE-2025-38510</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38507">CVE-2025-38507</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38506">CVE-2025-38506</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38517">CVE-2025-38517</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38516">CVE-2025-38516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38515">CVE-2025-38515</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38514">CVE-2025-38514</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38513">CVE-2025-38513</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38503">CVE-2025-38503</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38505">CVE-2025-38505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38460">CVE-2025-38460</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38467">CVE-2025-38467</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38466">CVE-2025-38466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38465">CVE-2025-38465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38464">CVE-2025-38464</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38463">CVE-2025-38463</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38462">CVE-2025-38462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38461">CVE-2025-38461</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38446">CVE-2025-38446</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38445">CVE-2025-38445</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38444">CVE-2025-38444</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38443">CVE-2025-38443</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38441">CVE-2025-38441</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38440">CVE-2025-38440</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38458">CVE-2025-38458</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38457">CVE-2025-38457</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38439">CVE-2025-38439</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38456">CVE-2025-38456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38455">CVE-2025-38455</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38454">CVE-2025-38454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38452">CVE-2025-38452</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38451">CVE-2025-38451</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38450">CVE-2025-38450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38449">CVE-2025-38449</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38448">CVE-2025-38448</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38437">CVE-2025-38437</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38438">CVE-2025-38438</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38349">CVE-2025-38349</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57809">CVE-2024-57809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57838">CVE-2024-57838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56780">CVE-2024-56780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56779">CVE-2024-56779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56778">CVE-2024-56778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56777">CVE-2024-56777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56776">CVE-2024-56776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56775">CVE-2024-56775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56774">CVE-2024-56774</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56773">CVE-2024-56773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56771">CVE-2024-56771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56772">CVE-2024-56772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56556">CVE-2024-56556</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56565">CVE-2024-56565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56564">CVE-2024-56564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56563">CVE-2024-56563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56562">CVE-2024-56562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56561">CVE-2024-56561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56560">CVE-2024-56560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56559">CVE-2024-56559</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56582">CVE-2024-56582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56581">CVE-2024-56581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56580">CVE-2024-56580</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56579">CVE-2024-56579</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56578">CVE-2024-56578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56577">CVE-2024-56577</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56576">CVE-2024-56576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56558">CVE-2024-56558</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56575">CVE-2024-56575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56574">CVE-2024-56574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56573">CVE-2024-56573</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56572">CVE-2024-56572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56571">CVE-2024-56571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56570">CVE-2024-56570</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56569">CVE-2024-56569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56567">CVE-2024-56567</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56566">CVE-2024-56566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56557">CVE-2024-56557</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56555">CVE-2024-56555</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56554">CVE-2024-56554</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56553">CVE-2024-56553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56550">CVE-2024-56550</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56552">CVE-2024-56552</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56551">CVE-2024-56551</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38552">CVE-2025-38552</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38551">CVE-2025-38551</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38550">CVE-2025-38550</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38549">CVE-2025-38549</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38547">CVE-2025-38547</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38548">CVE-2025-38548</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38531">CVE-2025-38531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38530">CVE-2025-38530</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38529">CVE-2025-38529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38528">CVE-2025-38528</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38527">CVE-2025-38527</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38526">CVE-2025-38526</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38524">CVE-2025-38524</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38539">CVE-2025-38539</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38538">CVE-2025-38538</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38537">CVE-2025-38537</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38535">CVE-2025-38535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38533">CVE-2025-38533</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38532">CVE-2025-38532</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38499">CVE-2025-38499</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38478">CVE-2025-38478</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38476">CVE-2025-38476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38475">CVE-2025-38475</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38474">CVE-2025-38474</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38473">CVE-2025-38473</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38472">CVE-2025-38472</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38497">CVE-2025-38497</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38496">CVE-2025-38496</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38495">CVE-2025-38495</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38494">CVE-2025-38494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38493">CVE-2025-38493</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38491">CVE-2025-38491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38490">CVE-2025-38490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38471">CVE-2025-38471</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38489">CVE-2025-38489</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38488">CVE-2025-38488</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38487">CVE-2025-38487</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38485">CVE-2025-38485</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38484">CVE-2025-38484</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38483">CVE-2025-38483</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38482">CVE-2025-38482</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38481">CVE-2025-38481</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38480">CVE-2025-38480</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38469">CVE-2025-38469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38470">CVE-2025-38470</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38468">CVE-2025-38468</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.40">6.12.40</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.39">6.12.39</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.38">6.12.38</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.37">6.12.37</a>, <a href="https://lwn.net/Articles/1028828/">6.12.36</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html">3.114</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html">3.113.1</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.4</li>
<li>docker 28.0.1</li>
<li>ignition 2.21.0</li>
<li>kernel 6.12.40</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4372.1.0"/>
    <published>2025-08-19T13:09:33+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4344.1.1</id>
    <title>4344.1.1</title>
    <updated>2026-03-09T16:26:28.203988+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4344.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38210">CVE-2025-38210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38219">CVE-2025-38219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38218">CVE-2025-38218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38217">CVE-2025-38217</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38216">CVE-2025-38216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38215">CVE-2025-38215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38214">CVE-2025-38214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38232">CVE-2025-38232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38231">CVE-2025-38231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38212">CVE-2025-38212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38229">CVE-2025-38229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38228">CVE-2025-38228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38227">CVE-2025-38227</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38226">CVE-2025-38226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38225">CVE-2025-38225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38224">CVE-2025-38224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38223">CVE-2025-38223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38222">CVE-2025-38222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38220">CVE-2025-38220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38186">CVE-2025-38186</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38185">CVE-2025-38185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38183">CVE-2025-38183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38182">CVE-2025-38182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38208">CVE-2025-38208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38202">CVE-2025-38202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38201">CVE-2025-38201</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38198">CVE-2025-38198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38197">CVE-2025-38197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38195">CVE-2025-38195</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38194">CVE-2025-38194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38193">CVE-2025-38193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38192">CVE-2025-38192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38191">CVE-2025-38191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38190">CVE-2025-38190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38189">CVE-2025-38189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38188">CVE-2025-38188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38179">CVE-2025-38179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38090">CVE-2025-38090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38089">CVE-2025-38089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38087">CVE-2025-38087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38086">CVE-2025-38086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085</a>)</li>
<li>sudo (<a href="https://www.cve.org/CVERecord?id=CVE-2025-32462">CVE-2025-32462</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32463">CVE-2025-32463</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added STACKIT images (<a href="https://github.com/flatcar/scripts/pull/3018">flatcar/scripts#3018</a>)</li>
<li>ftrace syscalls also available in ARM64 builds. (Enables syscall tracepoints) (<a href="https://github.com/flatcar/scripts/pull/2600">flatcar/scripts#2600</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/1027277/">6.12.35</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html">3.113</a>)</li>
<li>sudo (<a href="https://www.sudo.ws/releases/stable/#1.9.17p1">1.9.17p1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.4</li>
<li>docker 28.0.1</li>
<li>ignition 2.21.0</li>
<li>kernel 6.12.35</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4344.1.1"/>
    <published>2025-07-08T15:20:14+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4344.1.0</id>
    <title>4344.1.0</title>
    <updated>2026-03-09T16:26:28.157100+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4230.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>VMWare: open-vm-tools (<a href="https://www.cve.org/CVERecord/?id=CVE-2025-22247">CVE-2025-22247</a>)</li>
<li>afterburn (<a href="https://www.cve.org/CVERecord?id=CVE-2025-3416">CVE-2025-3416</a>, <a href="https://www.cve.org/CVERecord/?id=CVE-2025-0977">CVE-2025-0977</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53589">CVE-2024-53589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1176">CVE-2025-1176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1178">CVE-2025-1178</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1179">CVE-2025-1179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1180">CVE-2025-1180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1181">CVE-2025-1181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1182">CVE-2025-1182</a>)</li>
<li>c-ares (<a href="https://www.cve.org/CVERecord?id=CVE-2025-31498">CVE-2025-31498</a>)</li>
<li>cifs-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-2312">CVE-2025-2312</a>)</li>
<li>containerd (<a href="https://www.cve.org/CVERecord?id=CVE-2024-40635">CVE-2024-40635</a>)</li>
<li>crun (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24965">CVE-2025-24965</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0167">CVE-2025-0167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0665">CVE-2025-0665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0725">CVE-2025-0725</a>, <a href="https://github.com/curl/curl/issues/16197">curl-20250205</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">CVE-2024-8176</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50349">CVE-2024-50349</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52005">CVE-2024-52005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52006">CVE-2024-52006</a>)</li>
<li>glib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12243">CVE-2024-12243</a>)</li>
<li>go (<a href="https://www.cve.org/CVERecord?id=CVE-2025-22871">CVE-2025-22871</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34440">CVE-2023-34440</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43758">CVE-2023-43758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24582">CVE-2024-24582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28047">CVE-2024-28047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28127">CVE-2024-28127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29214">CVE-2024-29214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-31157">CVE-2024-31157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39279">CVE-2024-39279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-31068">CVE-2024-31068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36293">CVE-2024-36293</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37020">CVE-2024-37020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39355">CVE-2024-39355</a>)</li>
<li>iperf (<a href="https://www.cve.org/CVERecord?id=CVE-2024-53580">CVE-2024-53580</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57970">CVE-2024-57970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25724">CVE-2025-25724</a>)</li>
<li>libcap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1390">CVE-2025-1390</a>)</li>
<li>libtasn1 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12133">CVE-2024-12133</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27113">CVE-2025-27113</a>)</li>
<li>libxslt (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528</a>)</li>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26466">CVE-2025-26466</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">CVE-2024-13176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12797">CVE-2024-12797</a>)</li>
<li>perl (<a href="https://www.cve.org/CVERecord?id=CVE-2024-56406">CVE-2024-56406</a>)</li>
<li>podman (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218</a>)</li>
<li>python (<a href="https://www.cve.org/CVERecord?id=CVE-2025-0938">CVE-2025-0938</a>)</li>
<li>rsync (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12084">CVE-2024-12084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12085">CVE-2024-12085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12086">CVE-2024-12086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12087">CVE-2024-12087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12088">CVE-2024-12088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12747">CVE-2024-12747</a>)</li>
<li>socat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54661">CVE-2024-54661</a>, <a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.8.0.3:/CHANGES#l4">socat-20250221</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41957">CVE-2024-41957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41965">CVE-2024-41965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43374">CVE-2024-43374</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43790">CVE-2024-43790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43802">CVE-2024-43802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45306">CVE-2024-45306</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47814">CVE-2024-47814</a>)</li>
<li>xz-utils (<a href="https://www.cve.org/CVERecord?id=CVE-2025-31115">CVE-2025-31115</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added back some BCC tools (<a href="https://github.com/flatcar/scripts/pull/2900">scripts#2900</a>)</li>
<li>Fix non-conforming GPT partition table (<a href="https://github.com/flatcar/Flatcar/issues/1651">flatcar/Flatcar#1651</a>)</li>
<li>Fixed path handling in the QEMU .sh launcher scripts. Given paths now are relative to the current directory and absolute paths work as you would expect.</li>
<li>Fixed race condition in the script that grows the root partition to fill the disk. This bug sometimes caused the operation to not occur. (<a href="https://github.com/flatcar/init/pull/132">init#132</a>)</li>
<li>Fixed the inclusion of Intel and AMD CPU microcode in the initrd. This was accidentally dropped some time ago.</li>
<li>azure: Fixed issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning (<a href="https://github.com/flatcar/Flatcar/issues/1661">flatcar/Flatcar#1661</a>)</li>
<li>update-ssh-keys: More intuitive --help text and the -n (no-replace) option has been fixed. (<a href="https://github.com/flatcar/Flatcar/issues/1554">flatcar/Flatcar#1554</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Add changes for our secureboot signed images with our signed release process until the official shim signing (<a href="https://github.com/flatcar/scripts/pull/2754/">scripts#2754</a>)</li>
<li>Added <code>nftables-load.service</code> and <code>nftables-store.service</code> services to load/store rules from/in <code>/var/lib/nftables/rules-save</code> (<a href="https://github.com/flatcar/Flatcar/issues/900">Flatcar#900</a>)</li>
<li>Added support for podman in <code>toolbox</code> (<a href="https://github.com/flatcar/toolbox/pull/11">toolbox#11</a>)</li>
<li>Allow per-sysext USE flags and architecture-specific sysexts. (<a href="https://github.com/flatcar/scripts/pull/2798/">scripts#2798</a>)</li>
<li>Always truncate hostnames on the first occurrence of <code>.</code> (<a href="https://github.com/flatcar/coreos-cloudinit/pull/32">cloud-init#32</a>)</li>
<li>Build Intel iGPU i915 driver as module (<a href="https://github.com/flatcar/scripts/pull/2349">scripts#2349</a>)</li>
<li>Compile OS-dependent NVIDIA kernel module sysexts signed for secure boot. (<a href="https://github.com/flatcar/scripts/pull/2798/">scripts#2798</a>)</li>
<li>Enabled EROFS module with XATTR support (<a href="https://github.com/flatcar/Flatcar/issues/1659">Flatcar#1659</a>)</li>
<li>Enabled virtiofs and fuse-dax modules in the kernel for advaned Qemu usecases. Thank you @aaronk6! (<a href="https://github.com/flatcar/scripts/pull/2825">Flatcar#2825</a>)</li>
<li>Ensure hostnames never exceeds 63 characters, regardless of the metadata provider (<a href="https://github.com/flatcar/coreos-cloudinit/pull/31">cloud-init#31</a>)</li>
<li>Provided an Incus Flatcar extension as optional systemd-sysext image with the release. Write 'incus' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning. (<a href="https://github.com/flatcar/scripts/pull/1655">scripts#1655</a>)</li>
<li>Sign out-of-tree kernel modules using the ephemeral signing key so that ZFS and NVIDIA sysexts can work with secure boot. (<a href="https://github.com/flatcar/scripts/pull/2636/">scripts#2636</a>)</li>
<li>The kernel image and its embedded initrd are now compressed with xz rather than zstd. This gives greater compression at the cost of decompression performance. Systems may therefore now be ever so slightly slower to boot, but this was necessary to avoid running out of space in the /boot partition. Further measures to address the space issue are planned, and perhaps we can switch back to zstd in a later release.</li>
<li>The qemu script (<code>flatcar_production_qemu*.sh</code>) received two new options. <code>-D</code> (or <code>-image-disk-opts</code>) can be used to add extra options to the <code>virtio-blk-pci</code> device for primary disk. <code>-d</code> (or <code>-disk</code>) can be used to add extra disks to the machine - this one takes a path to a raw or qcow2 image file and, after a comma, <code>virtio-blk-pci</code> options. To learn what disk options can be passed to <code>-D</code> or <code>-d</code>, call <code>qemu-system-x86_64 -device virtio-blk-pci,help</code> (<code>qemu-system-aarch64</code> can be used too).</li>
<li><code>/boot</code> is now only accessible by the root user for better security. (<a href="https://github.com/flatcar/Flatcar/issues/296">Flatcar#296</a>)</li>
<li>sysext-incus: removed <code>/etc/subuid</code> and <code>/etc/subgid</code> generation for <code>root</code> user, it has to be created through initial provisioning. (<a href="https://github.com/flatcar/scripts/pull/3028">scripts#3028</a>)</li>
<li>systemd now uses OpenSSL instead of gcrypt for cryptography to reduce the size of the initrd. This change disables systemd-journal's Forward Secure Sealing feature, but it is generally not useful for Flatcar.</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>AWS: Amazon SSM Agent (<a href="https://github.com/aws/amazon-ssm-agent/blob/mainline/RELEASENOTES.md#3322990">3.3.2299.0</a>)</li>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2210-2025-03-13">2.21.0</a>)</li>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.34">6.12.34</a> (includes <a href="https://lwn.net/Articles/1024717">6.12.33</a>, <a href="https://lwn.net/Articles/1023797">6.12.32</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.31">6.12.31</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.30">6.12.30</a> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.29">6.12.29</a> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.28">6.12.28</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.27">6.12.27</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.26">6.12.26</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.25">6.12.25</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.24">6.12.24</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.23">6.12.23</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.22">6.12.22</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.21">6.12.21</a>, <a href="https://lwn.net/Articles/1015185/">6.12.20</a>  <a href="https://lwn.net/Articles/1014045/">6.12.19</a>, <a href="https://lwn.net/Articles/1013397/">6.12.18</a>, <a href="https://lwn.net/Articles/1012191/">6.12.17</a>, <a href="https://lwn.net/Articles/1011265/">6.12.16</a>, <a href="https://lwn.net/Articles/1010623/">6.12.15</a>, <a href="https://lwn.net/Articles/1010356/">6.12.14</a>, <a href="https://lwn.net/Articles/1008643/">6.12.13</a>, <a href="https://lwn.net/Articles/1007440/">6.12.12</a>, <a href="https://lwn.net/Articles/1006009/">6.12.11</a>, <a href="https://lwn.net/Articles/1005382/">6.12.10</a>, <a href="https://lwn.net/Articles/1004549/">6.12.9</a>, <a href="https://lwn.net/Articles/1003985/">6.12.8</a>, <a href="https://lwn.net/Articles/1003608/">6.12.7</a>, <a href="https://lwn.net/Articles/1002918/">6.12.6</a>, <a href="https://lwn.net/Articles/1002176/">6.12.5</a>, <a href="https://lwn.net/Articles/1001437/">6.12.4</a>, <a href="https://lwn.net/Articles/1001203/">6.12.3</a>, <a href="https://lwn.net/Articles/1000872/">6.12.2</a>, <a href="https://lwn.net/Articles/999108/">6.12.1</a>, <a href="https://lwn.net/Articles/998490/">6.12</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.89">6.6.89</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250509">20250509</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250410">20250410</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250311">20250311</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250211">20250211</a>))</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.31/release/3.31.html">3.31.5</a>)</li>
<li>SDK: go (<a href="https://go.dev/doc/devel/release#go1.24.minor">1.24.2</a> (includes <a href="https://go.dev/doc/go1.24">1.24.1</a>, <a href="https://go.dev/doc/devel/release#go1.23.6">1.23.6</a>, <a href="https://go.dev/doc/go1.23">1.23.5</a>))</li>
<li>SDK: meson (<a href="https://mesonbuild.com/Release-notes-for-1-6-0.html">1.6.1</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/perl5402delta">5.40.2</a> (includes <a href="https://perldoc.perl.org/perl5401delta">5.40.1</a>)</li>
<li>SDK: pkgcheck (<a href="https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.34">0.10.34</a>)</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/9.1">9.1.2</a> (includes <a href="https://wiki.qemu.org/ChangeLog/9.0">9.0</a>))</li>
<li>SDK: rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.85.1">1.85.1</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.85.0">1.85.0</a>, <a href="https://releases.rs/docs/1.84.1/">1.84.1</a>, <a href="https://releases.rs/docs/1.84.0/">1.84.0</a>, <a href="https://blog.rust-lang.org/2024/11/28/Rust-1.83.0.html">1.83.0</a>))</li>
<li>VMWare: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.5.2">12.5.2</a>)</li>
<li>afterburn (<a href="https://coreos.github.io/afterburn/release-notes/#afterburn-582">5.8.2</a>)</li>
<li>azure, dev, gce, sysext-python: gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-03/msg00010.html">1.25</a>)</li>
<li>azure, dev, gce, sysext-python: python (<a href="https://www.python.org/downloads/release/python-31112/">3.11.12</a>)</li>
<li>azure: wa-linux-agent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.12.0.4">2.12.0.4</a>)</li>
<li>base, dev: azure-vm-utils (<a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.6.0">0.6.0</a> (includes <a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.5.2">0.5.2</a>, <a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.5.1">0.5.1</a>, <a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.5.0">0.5.0</a>))</li>
<li>base, dev: bind (<a href="https://bind9.readthedocs.io/en/v9.18.31/notes.html#notes-for-bind-9-18-31">9.18.31</a> (includes <a href="https://bind9.readthedocs.io/en/v9.18.30/notes.html#notes-for-bind-9-18-30">9.18.30</a>))</li>
<li>base, dev: binutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00001.html">2.44</a>)</li>
<li>base, dev: btrfs-progs (<a href="https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.13/CHANGES">6.13</a>)</li>
<li>base, dev: c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/v1.34.4">1.34.4</a>)</li>
<li>base, dev: cifs-utils (<a href="https://lists.samba.org/archive/samba-technical/2025-March/139360.html">7.3</a> (includes <a href="https://lists.samba.org/archive/samba-technical/2025-February/139330.html">7.2</a>, <a href="https://lists.samba.org/archive/samba-technical/2024-October/139146.html">7.1</a>))</li>
<li>base, dev: cracklib (<a href="https://github.com/cracklib/cracklib/releases/tag/v2.10.3">2.10.3</a>)</li>
<li>base, dev: cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.32.0">1.32.0</a> (includes <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.31.1">1.31.1</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.31.0">1.31.0</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.30.1">1.30.1</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.30.0">1.30.0</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.29.0">1.29.0</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.28.0">1.28.0</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.1">1.27.1</a>))</li>
<li>base, dev: curl (<a href="https://curl.se/ch/8.13.0.html">8.13.0</a> (includes <a href="https://curl.se/ch/8.12.1.html">8.12.1</a>, <a href="https://curl.se/ch/8.12.0.html">8.12.0</a>)</li>
<li>base, dev: dbus (<a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.16.2/NEWS">1.16.2</a> (includes <a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.16.0/NEWS">1.16.0</a>, <a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.14.8/NEWS">1.14.8</a>, <a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.14.6/NEWS">1.14.6</a>))</li>
<li>base, dev: diffutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00005.html">3.12</a> (includes <a href="https://savannah.gnu.org/news/?id=10720">3.11</a>))</li>
<li>base, dev: e2fsprogs (<a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.2">1.47.2</a>)</li>
<li>base, dev: elfutils (<a href="https://inbox.sourceware.org/elfutils-devel/CAJDtP-T3+gXqHWp3T0mejWWbPr0_1tHetEXwfB67-o+zz7ShiA@mail.gmail.com/T/">0.192</a>)</li>
<li>base, dev: ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.11">6.11</a>)</li>
<li>base, dev: expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_7_1/expat/Changes#L40">2.7.1</a> (includes <a href="https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40">2.7.0</a>))</li>
<li>base, dev: git (<a href="https://github.com/git/git/blob/v2.49.0/Documentation/RelNotes/2.49.0.adoc">2.49.0</a> (includes <a href="https://github.com/git/git/blob/v2.48.1/Documentation/RelNotes/2.48.1.txt">2.48.1</a> <a href="https://github.com/git/git/blob/v2.48.0/Documentation/RelNotes/2.48.0.txt">2.48.0</a>, <a href="https://github.com/git/git/blob/v2.47.2/Documentation/RelNotes/2.47.2.txt">2.47.2</a>, <a href="https://github.com/git/git/blob/v2.47.1/Documentation/RelNotes/2.47.1.txt">2.47.1</a>, <a href="https://github.com/git/git/blob/v2.47.0/Documentation/RelNotes/2.47.0.txt">2.47.0</a>, <a href="https://github.com/git/git/blob/v2.46.3/Documentation/RelNotes/2.46.3.txt">2.46.3</a>, <a href="https://github.com/git/git/blob/v2.46.2/Documentation/RelNotes/2.46.2.txt">2.46.2</a>, <a href="https://github.com/git/git/blob/v2.46.1/Documentation/RelNotes/2.46.1.txt">2.46.1</a>, <a href="https://github.com/git/git/blob/v2.46.0/Documentation/RelNotes/2.46.0.txt">2.46.0</a>, <a href="https://github.com/git/git/blob/v2.45.3/Documentation/RelNotes/2.45.3.txt">2.45.3</a>))</li>
<li>base, dev: glib ((<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.5">2.82.5</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.4">2.82.4</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.3">2.82.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.2">2.82.2</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1">2.82.1</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.0">2.82.0</a>))</li>
<li>base, dev: gnupg (<a href="https://dev.gnupg.org/T7353">2.4.7</a>)</li>
<li>base, dev: gnutls (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2025-February/004875.html">3.8.9</a> (includes <a href="https://gitlab.com/gnutls/gnutls/-/blob/3.8.8/NEWS">3.8.8</a>))</li>
<li>base, dev: hwdata (<a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.391">0.391</a>)</li>
<li>base, dev: intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211">20250211_p20250211</a>)</li>
<li>base, dev: iproute2 (<a href="https://lore.kernel.org/all/20250324092319.28d39f2f@hermes.local/">6.14.0</a> (includes <a href="https://lore.kernel.org/all/20250120194053.3744d96b@hermes.local/">6.13.0</a>))</li>
<li>base, dev: ipset (<a href="https://ipset.netfilter.org/changelog.html">7.23</a>)</li>
<li>base, dev: iptables (<a href="https://netfilter.org/projects/iptables/files/changes-iptables-1.8.11.txt">1.8.11</a> (includes <a href="https://netfilter.org/projects/iptables/files/changes-iptables-1.8.10.txt">1.8.10</a>, <a href="https://netfilter.org/projects/iptables/files/changes-iptables-1.8.9.txt">1.8.9</a>))</li>
<li>base, dev: kbd (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7.1">2.7.1</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7">2.7</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7-rc1">2.7-rc1</a>))</li>
<li>base, dev: ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/42bfbb012f9c1c9054cdfb510ae4a50a3f12b384">2.9.2</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/3dd39600da3c0bedeae9f033c1333eb6b0f4ff33">2.9.1</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/ec91204387bd7f5c5a8d8df8534c6ca59b491ac5">2.9.0</a>))</li>
<li>base, dev: libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.9">3.7.9</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.8">3.7.8</a>))</li>
<li>base, dev: libidn2 (<a href="https://gitlab.com/libidn/libidn2/-/blob/v2.3.8/NEWS">2.3.8</a>)</li>
<li>base, dev: libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.12">1.12</a>)</li>
<li>base, dev: libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.45/NEWS">10.45</a>)</li>
<li>base, dev: libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.6.0">2.6.0</a> (includes <a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.6">2.5.6</a>))</li>
<li>base, dev: libsemanage (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: libtasn1 (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00004.html">4.20.0</a>)</li>
<li>base, dev: libtirpc (<a href="https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-6">1.3.6</a> (includes <a href="https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-5">1.3.5</a>))</li>
<li>base, dev: libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.50.0">1.50.0</a>)</li>
<li>base, dev: libxcrypt (<a href="https://github.com/besser82/libxcrypt/releases/tag/v4.4.38">4.4.38</a> (includes <a href="https://github.com/besser82/libxcrypt/releases/tag/v4.4.37">4.4.37</a>))</li>
<li>base, dev: libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.7">2.13.7</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.6">2.13.6</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.5">2.13.5</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.4">2.13.4</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.3">2.13.3</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.2">2.13.2</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.1">2.13.1</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.0">2.13.0</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.10">2.12.10</a>))</li>
<li>base, dev: linux-headers (<a href="https://kernelnewbies.org/Linux_6.12">6.12</a>)</li>
<li>base, dev: logrotate (<a href="https://github.com/logrotate/logrotate/releases/tag/3.22.0">3.22.0</a> (includes <a href="https://github.com/logrotate/logrotate/releases/tag/3.21.0">3.21.0</a>))</li>
<li>base, dev: lvm2 (<a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_22">2.03.22</a> (includes <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_21">2.03.21</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_20">2.03.20</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_19">2.03.19</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_18">2.03.18</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_17">2.03.17</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_16">2.03.16</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_15">2.03.15</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_14">2.03.14</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_13">2.03.13</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_12">2.03.12</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_11">2.03.11</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_10">2.03.10</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_09">2.03.09</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_08">2.03.08</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_07">2.03.07</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_06">2.03.06</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_05">2.03.05</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_04">2.03.04</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_03">2.03.03</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_02">2.03.02</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_01">2.03.01</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_00">2.03.00</a>))</li>
<li>base, dev: mdadm (<a href="https://git.kernel.org/pub/scm/utils/mdadm/mdadm.git/tree/CHANGELOG.md?h=mdadm-4.4">4.4</a> (includes <a href="https://git.kernel.org/pub/scm/utils/mdadm/mdadm.git/tree/CHANGELOG.md?h=mdadm-4.4#n36">4.3</a>))</li>
<li>base, dev: ncurses (<a href="https://invisible-island.net/ncurses/announce-6.5.html">6.5_p20250125</a>)</li>
<li>base, dev: nettle (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-12/msg00008.html">3.10.1</a>)</li>
<li>base, dev: nfs-utils (<a href="https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-7-1">2.7.1</a> (includes <a href="https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-4">2.6.4</a>, <a href="https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-3">2.6.3</a>, <a href="https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-2">2.6.2</a>, <a href="https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-1">2.6.1</a>))</li>
<li>base, dev: nftables (<a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.1.1.txt">1.1.1</a> (includes <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.1.0.txt">1.1.0</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.9.txt">1.0.9</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.8.txt">1.0.8</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.7.txt">1.0.7</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.6.txt">1.0.6</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.5.txt">1.0.5</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.4.txt">1.0.4</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.3.txt">1.0.3</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.2.txt">1.0.2</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.1.txt">1.0.1</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.0.txt">1.0.0</a>))</li>
<li>base, dev: nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.65.0">1.65.0</a> (includes <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.64.0">1.64.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.63.0">1.63.0</a>))</li>
<li>base, dev: nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.12">2.12</a>)</li>
<li>base, dev: oniguruma (<a href="https://github.com/kkos/oniguruma/releases/tag/v6.9.10">6.9.10</a>)</li>
<li>base, dev: open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/blob/2.1.11/Changelog">2.1.11</a>)</li>
<li>base, dev: open-isns (<a href="https://github.com/open-iscsi/open-isns/releases/tag/v0.103">0.103</a>)</li>
<li>base, dev: openssh (<a href="https://www.openssh.com/txt/release-9.9p2">9.9_p2</a> (includes <a href="https://www.openssh.com/txt/release-9.9">9.9_p1</a>))</li>
<li>base, dev: openssl (<a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.3">3.3.3</a>)</li>
<li>base, dev: pkgconf (<a href="https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.3/NEWS">2.4.3</a> (includes <a href="https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.2/NEWS">2.4.2</a>, <a href="https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.1/NEWS">2.4.1</a>, <a href="https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.0/NEWS">2.4.0</a>))</li>
<li>base, dev: policycoreutils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: polkit (<a href="https://github.com/polkit-org/polkit/blob/126/NEWS.md">126</a> (includes <a href="https://github.com/polkit-org/polkit/blob/125/NEWS.md">125</a>, <a href="https://github.com/polkit-org/polkit/blob/124/NEWS.md">124</a>, <a href="https://github.com/polkit-org/polkit/blob/123/NEWS.md">123</a>, <a href="https://github.com/polkit-org/polkit/blob/122/NEWS.md">122</a>))</li>
<li>base, dev: qemu-guest-agent (<a href="https://wiki.qemu.org/ChangeLog/9.2#Guest_agent">9.2.0</a> (includes <a href="https://wiki.qemu.org/ChangeLog/9.1#Guest_agent">9.1</a>, <a href="https://wiki.qemu.org/ChangeLog/9.0#Guest_agent">9.0</a>))</li>
<li>base, dev: rpcbind (<a href="http://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_7">1.2.7</a>)</li>
<li>base, dev: rsync (<a href="https://download.samba.org/pub/rsync/NEWS#3.4.1">3.4.1</a> (includes <a href="https://download.samba.org/pub/rsync/NEWS#3.4.0">3.4.0</a>))</li>
<li>base, dev: samba (<a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.7/WHATSNEW.txt">4.20.7</a> (includes <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.6/WHATSNEW.txt">4.20.6</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.5/WHATSNEW.txt">4.20.5</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.4/WHATSNEW.txt">4.20.4</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.3/WHATSNEW.txt">4.20.3</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.2/WHATSNEW.txt">4.20.2</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.1/WHATSNEW.txt">4.20.1</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.0/WHATSNEW.txt">4.20.0</a>))</li>
<li>base, dev: semodule-utils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: shadow (<a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.8">4.14.8</a> (includes <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.7">4.14.7</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.6">4.14.6</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.5">4.14.5</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.4">4.14.4</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.3">4.14.3</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.2">4.14.2</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.1">4.14.1</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.0">4.14.0</a>))</li>
<li>base, dev: socat (<a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.8.0.3:/CHANGES">1.8.0.3</a> (includes <a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.8.0.2:/CHANGES">1.8.0.2</a>, <a href="https://repo.or.cz/socat.git/blob/6ff391324d2d3b9f6bfb58e7d16a20be43b47af7:/CHANGES">1.8.0.1</a>))</li>
<li>base, dev: sqlite (<a href="https://sqlite.org/releaselog/3_49_1.html">3.49.1</a> (includes <a href="https://sqlite.org/releaselog/3_49_0.html">3.49.0</a>, <a href="https://sqlite.org/releaselog/3_48_0.html">3.48.0</a>, <a href="https://sqlite.org/releaselog/3_47_2.html">3.47.2</a>))</li>
<li>base, dev: sssd (<a href="https://sssd.io/release-notes/sssd-2.9.6.html">2.9.6</a>)</li>
<li>base, dev: strace (<a href="https://github.com/strace/strace/releases/tag/v6.14">6.14</a> (includes <a href="https://github.com/strace/strace/releases/tag/v6.13">6.13</a>))</li>
<li>base, dev: tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/6b10cfbaf2c522cceb48c610c18656d2d69cf60b">1.4.12</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/93a6656c13facdb8565f90954428c4cf800bfc36">1.4.11</a>))</li>
<li>base, dev: timezone-data (<a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/6JVHNHLB6I2WAYTQ75L6KEPEQHFXAJK3/">2025b</a> (includes <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/MWII7R3HMCEDNUCIYQKSSTYYR7UWK4OQ/">2025a</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/IZ7AO6WRE3W3TWBL5IR6PMQUL433BQIE/">2024b</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/UXFL4DEZCXJVZW6E24Y2HLSXVB2ILFVE/">2024a</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/WSF4TA5RFP7ECRKUKQFRHYN724HDMRTO/">2023d</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/NPQOFZRXK5QKUW7F4CC24W52OTZ7YOOT/">2023c</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/YXCVU55LIUZTZREUUH4VPMC75GYKKPE7/">2023b</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/HLUTNGHZ5QPNOPZTZFS6F2QVMGQWEDMC/">2023a</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/XIK47NMDAHCVOWE4MZIB7F44HFU3J2OB/">2022g</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/65JMZVURDDM3XOABROYJX5ZN4N6TATZ5/">2022f</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/CTWT3RFQXZHROH4VJKXAVQ77FYMF7BHY/">2022e</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/TCLVCAIDB64WNEVHJV2ITDHFRUHVB7BN/">2022d</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/GFXHZWBRVLDVX5QQUI4UCY5B4O2FRV5Z/">2022c</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/IB5UMSJYN42GOMKHHWU5UCHD3WYRCVQ4/">2022b</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/CU52CSKQNZRRZPRBDY4GKCCFWKZD4HAJ/">2022a</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/ANTPUKJNFDF6ZA3NSIJEOZGDHUNJ4HL2/">2021e</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/YPPIPGO3PLSMDNSVX6VOMASHRDL4GQWB/">2021d</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/MFS2QPRANAWSPV2DKU46NQKDDPLMXH2H/">2021c</a>, <a href="https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/422GNGI6F26NIV2JNHI726UO2TDTO2MD/">2021b</a>))</li>
<li>base, dev: trousers (<a href="https://sourceforge.net/p/trousers/trousers/ci/TROUSERS_0_3_15/tree/ChangeLog">0.3.15</a>)</li>
<li>base, dev: unzip (<a href="https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-29_changelog">6.0_p29</a>)</li>
<li>base, dev: userspace-rcu (<a href="https://lore.kernel.org/lkml/6894741e-c3c8-4464-92ab-ba8b88929961@efficios.com/T/">0.15.1</a> (includes <a href="https://lore.kernel.org/all/51160e24-389a-41b6-871b-ba522d427220@efficios.com/">0.15.0</a>))</li>
<li>base, dev: util-linux (<a href="https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.4/Documentation/releases/v2.40.4-ReleaseNotes">2.40.4</a> (includes <a href="https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.3/Documentation/releases/v2.40.3-ReleaseNotes">2.40.3</a>))</li>
<li>base, dev: vim (<a href="https://github.com/vim/vim/commits/v9.1.0794/">9.1.0794</a>)</li>
<li>base, dev: which (<a href="https://git.savannah.gnu.org/cgit/which.git/tree/NEWS?id=3e2c8f8acc3a333b66b06de234bc9324c6fe5500">2.23</a>)</li>
<li>base, dev: xfsprogs (<a href="https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.13.0">6.13.0</a> (includes <a href="https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.12.0">6.12.0</a>))</li>
<li>base, dev: xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.6.4">5.6.4</a>)</li>
<li>base, dev: zram-generator (<a href="https://github.com/systemd/zram-generator/releases/tag/v1.2.1">1.2.1</a> (includes <a href="https://github.com/systemd/zram-generator/releases/tag/v1.2.0">1.2.0</a>))</li>
<li>base, dev: zstd (<a href="https://github.com/facebook/zstd/releases/tag/v1.5.7">1.5.7</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html">3.112</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html">3.111</a>))</li>
<li>containerd: containerd (<a href="https://github.com/containerd/containerd/releases/tag/v2.0.2">2.0.2</a>)</li>
<li>containerd: runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.2.5">1.2.5</a> (includes <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.4">1.2.4</a> <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.3">1.2.3</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.2">1.2.2</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.1">1.2.1</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.0">1.2.0</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.15">1.1.15</a>))</li>
<li>dev: bash-completion (<a href="https://github.com/scop/bash-completion/releases/tag/2.16.0">2.16.0</a>)</li>
<li>dev: eselect (<a href="https://gitweb.gentoo.org/proj/eselect.git/tree/NEWS?h=eselect-1.4.30">1.4.30</a> (includes <a href="https://gitweb.gentoo.org/proj/eselect.git/tree/NEWS?h=eselect-1.4.29">1.4.29</a>))</li>
<li>dev: gcc-config (<a href="https://gitweb.gentoo.org/proj/gcc-config.git/log/?h=v2.12.1">2.12.1</a>)</li>
<li>dev: getuto (<a href="https://github.com/projg2/getuto/commits/getuto-1.15/">1.15</a>)</li>
<li>dev: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.18">3.18</a>)</li>
<li>dev: man-pages (<a href="https://lkml.org/lkml/2025/1/22/1229">6.10</a>)</li>
<li>dev: minicom (<a href="https://salsa.debian.org/minicom-team/minicom/-/releases/2.10">2.10</a>)</li>
<li>dev: mpfr (<a href="https://www.mpfr.org/mpfr-4.2.2/">4.2.2</a>)</li>
<li>dev: pahole (<a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.29">1.29</a> (includes <a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.28">1.28</a>))</li>
<li>dev: patch (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-03/msg00014.html">2.8</a>)</li>
<li>dev: portage (<a href="https://github.com/gentoo/portage/blob/portage-3.0.67/NEWS">3.0.67</a>)</li>
<li>docker: docker (<a href="https://github.com/moby/moby/releases/tag/v28.0.1">28.0.1</a> (includes <a href="https://github.com/moby/moby/releases/tag/v28.0.0">28.0.0</a>, <a href="https://docs.docker.com/engine/release-notes/27/#2741">27.4.1</a>, <a href="https://docs.docker.com/engine/release-notes/27/#2740">27.4.0</a>))</li>
<li>docker: docker-buildx (<a href="https://github.com/docker/buildx/releases/tag/v0.20.1">0.20.1</a> (includes <a href="https://github.com/docker/buildx/releases/tag/v0.20.0">0.20.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.19.3">0.19.3</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.19.2">0.19.2</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.19.1">0.19.1</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.19.0">0.19.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.18.0">0.18.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.17.1">0.17.1</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.17.0">0.17.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.16.2">0.16.2</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.16.1">0.16.1</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.16.0">0.16.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.15.1">0.15.1</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.15.0">0.15.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.14.1">0.14.1</a>))</li>
<li>dracut (<a href="https://github.com/dracut-ng/dracut-ng/releases/tag/106">106</a> (includes <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/105">105</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/104">104</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/103">103</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/102">102</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/101">101</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/100">100</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/060">060</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/059">059</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/058">058</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/057">057</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/056">056</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/055">055</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/054">054</a>))</li>
<li>sysext-docker: docker-buildx (<a href="https://github.com/docker/buildx/releases/tag/v0.21.2">0.21.2</a> (includes <a href="https://github.com/docker/buildx/releases/tag/v0.21.1">0.21.1</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.21.0">0.21.0</a>))</li>
<li>sysext-podman, vmware: fuse (<a href="https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.2">3.17.2</a> (includes <a href="https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.1">3.17.1</a>))</li>
<li>sysext-podman: aardvark-dns (<a href="https://github.com/containers/aardvark-dns/releases/tag/v1.14.0">1.14.0</a> (includes <a href="https://github.com/containers/aardvark-dns/releases/tag/v1.13.1">1.13.1</a>, <a href="https://github.com/containers/aardvark-dns/releases/tag/v1.13.0">1.13.0</a>))</li>
<li>sysext-podman: catatonit (<a href="https://github.com/openSUSE/catatonit/releases/tag/v0.2.1">0.2.1</a>)</li>
<li>sysext-podman: conmon (<a href="https://github.com/containers/conmon/releases/tag/v2.1.13">2.1.13</a> (includes <a href="https://github.com/containers/conmon/releases/tag/v2.1.12">2.1.12</a>, <a href="https://github.com/containers/conmon/releases/tag/v2.1.11">2.1.11</a>))</li>
<li>sysext-podman: containers-common (<a href="https://github.com/containers/common/releases/tag/v0.62.2">0.62.2</a> (includes <a href="https://github.com/containers/common/releases/tag/v0.62.1">0.62.1</a>, <a href="https://github.com/containers/common/releases/tag/v0.62.0">0.62.0</a>, <a href="https://github.com/containers/common/releases/tag/v0.61.0">0.61.0</a>))</li>
<li>sysext-podman: containers-image (<a href="https://github.com/containers/image/releases/tag/v5.34.2">5.34.2</a> (includes <a href="https://github.com/containers/image/releases/tag/v5.34.1">5.34.1</a>, <a href="https://github.com/containers/image/releases/tag/v5.34.0">5.34.0</a>, <a href="https://github.com/containers/image/releases/tag/v5.33.0">5.33.0</a>))</li>
<li>sysext-podman: containers-shortnames (<a href="https://github.com/containers/shortnames/releases/tag/v2025.03.19">2025.03.19</a>)</li>
<li>sysext-podman: containers-storage (<a href="https://github.com/containers/storage/releases/tag/v1.57.2">1.57.2</a> (includes <a href="https://github.com/containers/storage/releases/tag/v1.57.1">1.57.1</a>, <a href="https://github.com/containers/storage/releases/tag/v1.57.0">1.57.0</a>, <a href="https://github.com/containers/storage/releases/tag/v1.56.0">1.56.0</a>))</li>
<li>sysext-podman: crun (<a href="https://github.com/containers/crun/releases/tag/1.20">1.20</a>, <a href="https://github.com/containers/crun/releases/tag/1.19.1">1.19.1</a>, <a href="https://github.com/containers/crun/releases/tag/1.19">1.19</a>, <a href="https://github.com/containers/crun/releases/tag/1.18.2">1.18.2</a>, <a href="https://github.com/containers/crun/releases/tag/1.18.1">1.18.1</a>, <a href="https://github.com/containers/crun/releases/tag/1.18">1.18</a>)</li>
<li>sysext-podman: gpgme (<a href="https://dev.gnupg.org/T7524">1.24.2</a>)</li>
<li>sysext-podman: netavark (<a href="https://github.com/containers/netavark/releases/tag/v1.14.1">1.14.1</a> (includes <a href="https://github.com/containers/netavark/releases/tag/v1.14.0">1.14.0</a>, <a href="https://github.com/containers/netavark/releases/tag/v1.13.1">1.13.1</a>, <a href="https://github.com/containers/netavark/releases/tag/v1.13.0">1.13.0</a>))</li>
<li>sysext-podman: passt (<a href="https://archives.passt.top/passt-user/20250217101614.561b23bc@elisabeth/T/#u">2025.02.17</a> (includes <a href="https://archives.passt.top/passt-user/20250121182827.652400c8@elisabeth/T/#u">2025.01.21</a>))</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.3.2">5.3.2</a>)</li>
<li>sysext-python: more-itertools (<a href="https://github.com/more-itertools/more-itertools/releases/tag/v10.6.0">10.6.0</a>)</li>
<li>sysext-python: pip (<a href="https://github.com/pypa/pip/blob/25.0.1/NEWS.rst">25.0.1</a> (includes <a href="https://github.com/pypa/pip/blob/25.0/NEWS.rst">25.0</a>))</li>
<li>sysext-python: platformdirs (<a href="https://github.com/tox-dev/platformdirs/releases/tag/4.3.7">4.3.7</a>)</li>
<li>sysext-python: rich (<a href="https://github.com/Textualize/rich/releases/tag/v14.0.0">14.0.0</a>)</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v78.1.0/NEWS.rst">78.1.0</a> (includes <a href="https://github.com/pypa/setuptools/blob/v78.0.2/NEWS.rst">78.0.2</a>, <a href="https://github.com/pypa/setuptools/blob/v78.0.1/NEWS.rst">78.0.1</a>, <a href="https://github.com/pypa/setuptools/blob/v78.0.0/NEWS.rst">78.0.0</a>, <a href="https://github.com/pypa/setuptools/blob/v77.0.3/NEWS.rst">77.0.3</a>, <a href="https://github.com/pypa/setuptools/blob/v77.0.2/NEWS.rst">77.0.2</a>, <a href="https://github.com/pypa/setuptools/blob/v77.0.1/NEWS.rst">77.0.1</a>, <a href="https://github.com/pypa/setuptools/blob/v77.0.0/NEWS.rst">77.0.0</a>, <a href="https://github.com/pypa/setuptools/blob/v76.1.0/NEWS.rst">76.1.0</a>, <a href="https://github.com/pypa/setuptools/blob/v76.0.0/NEWS.rst">76.0.0</a>, <a href="https://github.com/pypa/setuptools/blob/v75.8.2/NEWS.rst">75.8.2</a>, <a href="https://github.com/pypa/setuptools/blob/v75.8.1/NEWS.rst">75.8.1</a>, <a href="https://github.com/pypa/setuptools/blob/v75.8.0/NEWS.rst#v7580">75.8.0</a>, <a href="https://github.com/pypa/setuptools/blob/v75.7.0/NEWS.rst#v7570">75.7.0</a>))</li>
<li>sysext-python: setuptools-scm (<a href="https://github.com/pypa/setuptools-scm/blob/v8.2.1/CHANGELOG.md">8.2.1</a>, <a href="https://github.com/pypa/setuptools-scm/blob/v8.2.0/CHANGELOG.md">8.2.0</a>)</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.4.11.15">2025.4.11.15</a> (includes <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.3.3.18">2025.3.3.18</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.3.19.19">2025.3.19.19</a>))</li>
<li>sysext-python: truststore (<a href="https://github.com/sethmlarson/truststore/blob/v0.10.1/CHANGELOG.md">0.10.1</a>)</li>
<li>sysext-python: typing-extensions (<a href="https://github.com/python/typing_extensions/releases/tag/4.13.2">4.13.2</a> (includes <a href="https://github.com/python/typing_extensions/releases/tag/4.13.1">4.13.1</a>, <a href="https://github.com/python/typing_extensions/releases/tag/4.13.0">4.13.0</a>))</li>
<li>sysext-python: urllib3 (<a href="https://github.com/urllib3/urllib3/releases/tag/2.4.0">2.4.0</a>)</li>
<li>sysext-python: wheel (<a href="https://github.com/pypa/wheel/releases/tag/0.46.1">0.46.1</a> (includes <a href="https://github.com/pypa/wheel/releases/tag/0.46.0">0.46.0</a>))</li>
<li>sysext-zfs: zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.3.1">2.3.1</a> (includes <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.3.0">2.3.0</a>))</li>
<li>vmware: libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.43">1.1.43</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.42">1.1.42</a>, <a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.41">1.1.41</a>, <a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.40">1.1.40</a>))</li>
<li>vmware: xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.7">1.3.7</a>, <a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.6">1.3.6</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 4344.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38061">CVE-2025-38061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38060">CVE-2025-38060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38059">CVE-2025-38059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38058">CVE-2025-38058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38057">CVE-2025-38057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38056">CVE-2025-38056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38055">CVE-2025-38055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38081">CVE-2025-38081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38080">CVE-2025-38080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38078">CVE-2025-38078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38077">CVE-2025-38077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38074">CVE-2025-38074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38073">CVE-2025-38073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38072">CVE-2025-38072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38054">CVE-2025-38054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38071">CVE-2025-38071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38069">CVE-2025-38069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38068">CVE-2025-38068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38066">CVE-2025-38066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38065">CVE-2025-38065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38063">CVE-2025-38063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38062">CVE-2025-38062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38053">CVE-2025-38053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38038">CVE-2025-38038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38037">CVE-2025-38037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38035">CVE-2025-38035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38034">CVE-2025-38034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38033">CVE-2025-38033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38051">CVE-2025-38051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38031">CVE-2025-38031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38048">CVE-2025-38048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38047">CVE-2025-38047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38046">CVE-2025-38046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38045">CVE-2025-38045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38044">CVE-2025-38044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38043">CVE-2025-38043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38040">CVE-2025-38040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38039">CVE-2025-38039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38030">CVE-2025-38030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38003">CVE-2025-38003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38004">CVE-2025-38004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38082">CVE-2025-38082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38001">CVE-2025-38001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38083">CVE-2025-38083</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed race condition in the script that grows the root partition to fill the disk. This bug sometimes caused the operation to not occur. (<a href="https://github.com/flatcar/init/pull/132">init#132</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added support for podman in <code>toolbox</code> (<a href="https://github.com/flatcar/toolbox/pull/11">toolbox#11</a>)</li>
<li><code>/boot</code> is now only accessible by the root user for better security. (<a href="https://github.com/flatcar/Flatcar/issues/296">Flatcar#296</a>)</li>
<li>sysext-incus: removed <code>/etc/subuid</code> and <code>/etc/subgid</code> generation for <code>root</code> user, it has to be created through initial provisioning. (<a href="https://github.com/flatcar/scripts/pull/3028">scripts#3028</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.34">6.12.34</a> (includes <a href="https://lwn.net/Articles/1024717">6.12.33</a>, <a href="https://lwn.net/Articles/1023797">6.12.32</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.31">6.12.31</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html">3.112</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.4</li>
<li>docker 28.0.1</li>
<li>ignition 2.21.0</li>
<li>kernel 6.12.34</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4344.1.0"/>
    <published>2025-06-24T11:56:49+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4230.1.1</id>
    <title>4230.1.1</title>
    <updated>2026-03-09T16:26:28.126243+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4230.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21993">CVE-2025-21993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21992">CVE-2025-21992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21991">CVE-2025-21991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21967">CVE-2025-21967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21975">CVE-2025-21975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21971">CVE-2025-21971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21970">CVE-2025-21970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21969">CVE-2025-21969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21986">CVE-2025-21986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21981">CVE-2025-21981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21980">CVE-2025-21980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21979">CVE-2025-21979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21978">CVE-2025-21978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21968">CVE-2025-21968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21962">CVE-2025-21962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21960">CVE-2025-21960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21959">CVE-2025-21959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21957">CVE-2025-21957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21956">CVE-2025-21956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21955">CVE-2025-21955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21966">CVE-2025-21966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21964">CVE-2025-21964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21963">CVE-2025-21963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22015">CVE-2025-22015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22014">CVE-2025-22014</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22013">CVE-2025-22013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22010">CVE-2025-22010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22008">CVE-2025-22008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22009">CVE-2025-22009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22003">CVE-2025-22003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22001">CVE-2025-22001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21999">CVE-2025-21999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21997">CVE-2025-21997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22007">CVE-2025-22007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22005">CVE-2025-22005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21995">CVE-2025-21995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21996">CVE-2025-21996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21994">CVE-2025-21994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22021">CVE-2025-22021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22018">CVE-2025-22018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38575">CVE-2025-38575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38240">CVE-2025-38240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38152">CVE-2025-38152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37893">CVE-2025-37893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39735">CVE-2025-39735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39728">CVE-2025-39728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38637">CVE-2025-38637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23138">CVE-2025-23138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23136">CVE-2025-23136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22066">CVE-2025-22066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22075">CVE-2025-22075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22074">CVE-2025-22074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22073">CVE-2025-22073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22072">CVE-2025-22072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22071">CVE-2025-22071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22095">CVE-2025-22095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22093">CVE-2025-22093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22090">CVE-2025-22090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22089">CVE-2025-22089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22088">CVE-2025-22088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22086">CVE-2025-22086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22083">CVE-2025-22083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22081">CVE-2025-22081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22080">CVE-2025-22080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22079">CVE-2025-22079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22077">CVE-2025-22077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22033">CVE-2025-22033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22042">CVE-2025-22042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22041">CVE-2025-22041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22040">CVE-2025-22040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22038">CVE-2025-22038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22064">CVE-2025-22064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22063">CVE-2025-22063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22060">CVE-2025-22060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22058">CVE-2025-22058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22057">CVE-2025-22057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22054">CVE-2025-22054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22053">CVE-2025-22053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22035">CVE-2025-22035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22050">CVE-2025-22050</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22049">CVE-2025-22049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22048">CVE-2025-22048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22047">CVE-2025-22047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22045">CVE-2025-22045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22044">CVE-2025-22044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22043">CVE-2025-22043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22027">CVE-2025-22027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22025">CVE-2025-22025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22029">CVE-2025-22029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-53034">CVE-2023-53034</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed PXE boot failures that arose since upgrading to systemd v256. Users were dumped to an emergency shell. (<a href="https://github.com/flatcar/bootengine/pull/103">flatcar/bootengine#103</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.88">6.6.88</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.87">6.6.87</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.86">6.6.86</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.85">6.6.85</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.84">6.6.84</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html">3.110</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.3.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.88</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4230.1.1"/>
    <published>2025-05-06T11:35:29+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4230.1.0</id>
    <title>4230.1.0</title>
    <updated>2026-03-09T16:26:28.102127+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4186.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21835">CVE-2025-21835</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21836">CVE-2025-21836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58086">CVE-2024-58086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21823">CVE-2025-21823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21821">CVE-2025-21821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21787">CVE-2025-21787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21784">CVE-2025-21784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21782">CVE-2025-21782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21783">CVE-2025-21783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21781">CVE-2025-21781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21780">CVE-2025-21780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21796">CVE-2025-21796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21795">CVE-2025-21795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21794">CVE-2025-21794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21793">CVE-2025-21793</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21792">CVE-2025-21792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21790">CVE-2025-21790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21789">CVE-2025-21789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21779">CVE-2025-21779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58020">CVE-2024-58020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57834">CVE-2024-57834</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54458">CVE-2024-54458</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54456">CVE-2024-54456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21776">CVE-2025-21776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21775">CVE-2025-21775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21772">CVE-2025-21772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21773">CVE-2025-21773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21767">CVE-2025-21767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21766">CVE-2025-21766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21763">CVE-2025-21763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21761">CVE-2025-21761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21762">CVE-2025-21762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21760">CVE-2025-21760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21759">CVE-2025-21759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21758">CVE-2025-21758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21704">CVE-2025-21704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21848">CVE-2025-21848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21847">CVE-2025-21847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21846">CVE-2025-21846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21866">CVE-2025-21866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21865">CVE-2025-21865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21864">CVE-2025-21864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21863">CVE-2025-21863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21862">CVE-2025-21862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21844">CVE-2025-21844</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21859">CVE-2025-21859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21858">CVE-2025-21858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21857">CVE-2025-21857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21856">CVE-2025-21856</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21855">CVE-2025-21855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21854">CVE-2025-21854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21853">CVE-2025-21853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58088">CVE-2024-58088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21838">CVE-2025-21838</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-11053">CVE-2024-11053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9681">CVE-2024-9681</a>)</li>
<li>sysext-podman: containers-storage, podman (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676</a>)</li>
<li>amd64: nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0131">CVE-2024-0131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0147">CVE-2024-0147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0149">CVE-2024-0149</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0150">CVE-2024-0150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53869">CVE-2024-53869</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>azure: Fix issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning (<a href="https://github.com/flatcar/Flatcar/issues/1661">flatcar/Flatcar#1661</a>)</li>
<li>Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. (<a href="https://github.com/flatcar/scripts/pull/2667">flatcar/scripts#2667</a>)</li>
<li>Fixed creating netdev arguments to correctly include commas when no port forwards are passed (<a href="https://github.com/flatcar/scripts/pull/2581">flatcar/scripts#2581</a>)</li>
<li>The kernel module build directory now contains native binaries in arm64 images instead of the previous amd64 binaries (<a href="https://github.com/flatcar/scripts/pull/2694">scripts#2694</a>)</li>
<li>Nvidia driver installer service now supports the 570 driver branch by forcing the use of the proprietary kernel module. The 570 branch defaults to the kernel-open driver which requires loading firmware, which is not yet supported on Flatcar. (<a href="https://github.com/flatcar/scripts/pull/2694">scripts#2694</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added support for ARM64 architecture in the NVIDIA driver installer service (<a href="https://github.com/flatcar/scripts/pull/2694">scripts#2694</a>)</li>
<li>Added new image signing pub key to <code>flatcar-install</code>, needed for download verification of releases built from March 2025 onwards, if you have copies of <code>flatcar-install</code> or the image signing pub key, you need to update them as well (<a href="https://github.com/flatcar/init/pull/129">init#129</a>)</li>
<li>Added support for multiple port forwarding parameters in the QEMU startup script. Users can now specify multiple port forwards using the <code>-f</code> option. (<a href="https://github.com/flatcar/scripts/pull/2575">flatcar/scripts#2575</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>AMD64: nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-230-02/index.html">535.230.02</a>)</li>
<li>ARM64: nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-86-15/index.html">570.86.15</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.22.11">1.22.11</a>)</li>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83">6.6.83</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79">6.6.79</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80">6.6.80</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81">6.6.81</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82">6.6.82</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250109">20250109</a>)</li>
<li>SDK: qemu (<a href="https://lists.gnu.org/archive/html/qemu-devel/2024-09/msg03900.html">8.2.7</a>)</li>
<li>base, dev: audit (<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.2">4.0.2</a>)</li>
<li>base, dev: bpftool (<a href="https://github.com/libbpf/bpftool/releases/tag/v7.5.0">7.5.0</a>)</li>
<li>base, dev: btrfs-progs (<a href="https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.12/CHANGES">6.12</a>)</li>
<li>base, dev: c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/v1.34.3">1.34.3</a> (includes <a href="https://github.com/c-ares/c-ares/releases/tag/v1.34.0">1.34.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.34.1">1.34.1</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.34.2">1.34.2</a>))</li>
<li>base, dev: ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.10">6.10</a>)</li>
<li>base, dev: glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.5">2.80.5</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.0">2.80.0</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.1">2.80.1</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.2">2.80.2</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.3">2.80.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.4">2.80.4</a>))</li>
<li>base, dev: gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2024q4/000486.html">2.4.6</a>)</li>
<li>base, dev: hwdata (<a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.390">0.390</a>)</li>
<li>base, dev: intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112">20241112</a> (includes <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241029">20241029</a>))</li>
<li>base, dev: iproute2 (<a href="https://lore.kernel.org/netdev/20241119092743.6a1bdcb7@hermes.local/">6.12.0</a>)</li>
<li>base, dev: kexec-tools (<a href="https://github.com/horms/kexec-tools/commits/v2.0.30/">2.0.30</a>)</li>
<li>base, dev: libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.oq9dsdhihxp5">2.71</a>)</li>
<li>base, dev: libgpg-error (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=75f2b2d220de4e4f53252d3367950ecb2ab85079;hb=b0bb9266010d84b30fa2dc6a2127b7e40dc03660">1.51</a>)</li>
<li>base, dev: libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.11.1">1.11.1</a> (includes <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.11">1.11</a>))</li>
<li>base, dev: libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.9">2.12.9</a>)</li>
<li>base, dev: lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.99.4">4.99.4</a>)</li>
<li>base, dev: npth (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=0f8d78958d8059de95e363a977051995e05dc691;hb=64905e765aad9de6054ef70a97fc30bd992ce999">1.8</a>)</li>
<li>base, dev: nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.11">2.11</a>)</li>
<li>base, dev: openldap (<a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_8/CHANGES">2.6.8</a> (includes <a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_7/CHANGES">2.6.7</a>))</li>
<li>base, dev: strace (<a href="https://github.com/strace/strace/releases/tag/v6.12">6.12</a> (includes <a href="https://github.com/strace/strace/releases/tag/v6.10">6.10</a>, <a href="https://github.com/strace/strace/releases/tag/v6.11">6.11</a>))</li>
<li>base, dev: usbutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v018">018</a>)</li>
<li>base, dev: xfsprogs (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.11.0">6.11.0</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html">3.109</a>)</li>
<li>dev: bash-completion (<a href="https://github.com/scop/bash-completion/releases/tag/2.15.0">2.15.0</a>)</li>
<li>dev: binutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-08/msg00001.html">2.43</a>)</li>
<li>docker: docker-buildx (<a href="https://github.com/docker/buildx/releases/tag/v0.14.0">0.14.0</a> (includes <a href="https://github.com/docker/buildx/releases/tag/v0.11.0">0.11.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.12.0">0.12.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.13.0">0.13.0</a>))</li>
<li>gce: six (<a href="https://github.com/benjaminp/six/blob/1.17.0/CHANGES">1.17.0</a>)</li>
<li>sysext-podman: containers-storage (<a href="https://github.com/containers/storage/releases/tag/v1.55.1">1.55.1</a>)</li>
<li>sysext-podman: gpgme (<a href="https://dev.gnupg.org/T7440">1.24.1</a> (includes <a href="https://dev.gnupg.org/T7376">1.24.0</a>))</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.3.0">5.3.0</a>)</li>
<li>sysext-python: charset-normalizer (<a href="https://github.com/jawah/charset_normalizer/releases/tag/3.4.1">3.4.1</a>)</li>
<li>sysext-python: pip (<a href="https://github.com/pypa/pip/blob/24.3.1/NEWS.rst">24.3.1</a> (includes <a href="https://github.com/pypa/pip/blob/24.3/NEWS.rst">24.3</a>))</li>
<li>sysext-python: python (<a href="https://www.python.org/downloads/release/python-31111/">3.11.11_p1</a>)</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v75.6.0/NEWS.rst">75.6.0</a> (includes <a href="https://github.com/pypa/setuptools/blob/75.0.0/NEWS.rst">75.0.0</a>, <a href="https://github.com/pypa/setuptools/blob/75.1.0/NEWS.rst">75.1.0</a>, <a href="https://github.com/pypa/setuptools/blob/75.1.1/NEWS.rst">75.1.1</a>, <a href="https://github.com/pypa/setuptools/blob/75.2.0/NEWS.rst">75.2.0</a>, <a href="https://github.com/pypa/setuptools/blob/75.3.0/NEWS.rst">75.3.0</a>, <a href="https://github.com/pypa/setuptools/blob/75.4.0/NEWS.rst">75.4.0</a>, <a href="https://github.com/pypa/setuptools/blob/75.5.0/NEWS.rst">75.5.0</a>))</li>
<li>sysext-python: urllib3 (<a href="https://github.com/urllib3/urllib3/releases/tag/2.3.0">2.3.0</a>)</li>
<li>sysext-python: wheel (<a href="https://github.com/pypa/wheel/releases/tag/0.45.1">0.45.1</a> (includes <a href="https://github.com/pypa/wheel/releases/tag/0.45.0">0.45.0</a>))</li>
<li>sysext-zfs: zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.7">2.2.7</a> (includes <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.6">2.2.6</a>))</li>
<li>systemd (<a href="https://github.com/systemd/system/releases/tag/v256.9">256.9</a>)</li>
<li>vmware: libltdl (<a href="https://savannah.gnu.org/news/?id=10693">2.5.4</a> (includes <a href="https://savannah.gnu.org/news/?id=10631">2.5.0</a>, <a href="https://savannah.gnu.org/news/?id=10660">2.5.1</a>, <a href="https://savannah.gnu.org/news/?id=10669">2.5.2</a>, <a href="https://savannah.gnu.org/news/?id=10676">2.5.3</a>))</li>
</ul>
<p><em>Changes since <strong>Alpha 4230.0.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21835">CVE-2025-21835</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21836">CVE-2025-21836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58086">CVE-2024-58086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21823">CVE-2025-21823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21821">CVE-2025-21821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21787">CVE-2025-21787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21784">CVE-2025-21784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21782">CVE-2025-21782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21783">CVE-2025-21783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21781">CVE-2025-21781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21780">CVE-2025-21780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21796">CVE-2025-21796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21795">CVE-2025-21795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21794">CVE-2025-21794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21793">CVE-2025-21793</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21792">CVE-2025-21792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21790">CVE-2025-21790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21789">CVE-2025-21789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21779">CVE-2025-21779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58020">CVE-2024-58020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57834">CVE-2024-57834</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54458">CVE-2024-54458</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54456">CVE-2024-54456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21776">CVE-2025-21776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21775">CVE-2025-21775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21772">CVE-2025-21772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21773">CVE-2025-21773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21767">CVE-2025-21767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21766">CVE-2025-21766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21763">CVE-2025-21763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21761">CVE-2025-21761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21762">CVE-2025-21762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21760">CVE-2025-21760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21759">CVE-2025-21759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21758">CVE-2025-21758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21704">CVE-2025-21704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21848">CVE-2025-21848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21847">CVE-2025-21847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21846">CVE-2025-21846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21866">CVE-2025-21866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21865">CVE-2025-21865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21864">CVE-2025-21864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21863">CVE-2025-21863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21862">CVE-2025-21862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21844">CVE-2025-21844</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21859">CVE-2025-21859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21858">CVE-2025-21858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21857">CVE-2025-21857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21856">CVE-2025-21856</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21855">CVE-2025-21855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21854">CVE-2025-21854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21853">CVE-2025-21853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58088">CVE-2024-58088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21838">CVE-2025-21838</a>)</li>
<li>amd64: nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0131">CVE-2024-0131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0147">CVE-2024-0147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0149">CVE-2024-0149</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0150">CVE-2024-0150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53869">CVE-2024-53869</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>azure: Fix issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning (<a href="https://github.com/flatcar/Flatcar/issues/1661">flatcar/Flatcar#1661</a>)</li>
<li>Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. (<a href="https://github.com/flatcar/scripts/pull/2667">flatcar/scripts#2667</a>)</li>
<li>The kernel module build directory now contains native binaries in arm64 images instead of the previous amd64 binaries (<a href="https://github.com/flatcar/scripts/pull/2694">scripts#2694</a>)</li>
<li>Nvidia driver installer service now supports the 570 driver branch by forcing the use of the proprietary kernel module. The 570 branch defaults to the kernel-open driver which requires loading firmware, which is not yet supported on Flatcar. (<a href="https://github.com/flatcar/scripts/pull/2694">scripts#2694</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added support for ARM64 architecture in the NVIDIA driver installer service (<a href="https://github.com/flatcar/scripts/pull/2694">scripts#2694</a>)</li>
<li>Added new image signing pub key to <code>flatcar-install</code>, needed for download verification of releases built from March 2025 onwards, if you have copies of <code>flatcar-install</code> or the image signing pub key, you need to update them as well (<a href="https://github.com/flatcar/init/pull/129">init#129</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>AMD64: nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-230-02/index.html">535.230.02</a>)</li>
<li>ARM64: nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-86-15/index.html">570.86.15</a>)</li>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83">6.6.83</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79">6.6.79</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80">6.6.80</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81">6.6.81</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82">6.6.82</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html">3.109</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.3.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.83</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4230.1.0"/>
    <published>2025-03-20T14:05:38+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4186.1.1</id>
    <title>4186.1.1</title>
    <updated>2026-03-09T16:26:28.090098+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4186.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26466">CVE-2025-26466</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>openssh(9.8_p1-r4)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.3.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.74</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4186.1.1"/>
    <published>2025-02-18T15:12:26+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4186.1.0</id>
    <title>4186.1.0</title>
    <updated>2026-03-09T16:26:28.051393+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4152.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23128">CVE-2025-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23125">CVE-2025-23125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48875">CVE-2024-48875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41935">CVE-2024-41935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56785">CVE-2024-56785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56781">CVE-2024-56781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56628">CVE-2024-56628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56627">CVE-2024-56627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56626">CVE-2024-56626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56613">CVE-2024-56613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56586">CVE-2024-56586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56585">CVE-2024-56585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56597">CVE-2024-56597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56596">CVE-2024-56596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56595">CVE-2024-56595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56565">CVE-2024-56565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53196">CVE-2024-53196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53687">CVE-2024-53687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53690">CVE-2024-53690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57946">CVE-2024-57946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56766">CVE-2024-56766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56765">CVE-2024-56765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56763">CVE-2024-56763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56762">CVE-2024-56762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56769">CVE-2024-56769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56767">CVE-2024-56767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57938">CVE-2024-57938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57933">CVE-2024-57933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57932">CVE-2024-57932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57930">CVE-2024-57930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57931">CVE-2024-57931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57841">CVE-2024-57841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57802">CVE-2024-57802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57801">CVE-2024-57801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39282">CVE-2024-39282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36476">CVE-2024-36476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57896">CVE-2024-57896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21629">CVE-2025-21629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57903">CVE-2024-57903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57902">CVE-2024-57902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57901">CVE-2024-57901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57900">CVE-2024-57900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57899">CVE-2024-57899</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57897">CVE-2024-57897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57890">CVE-2024-57890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57889">CVE-2024-57889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57887">CVE-2024-57887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57885">CVE-2024-57885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57884">CVE-2024-57884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57895">CVE-2024-57895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57894">CVE-2024-57894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57893">CVE-2024-57893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57892">CVE-2024-57892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57882">CVE-2024-57882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21658">CVE-2025-21658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21656">CVE-2025-21656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57945">CVE-2024-57945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21664">CVE-2025-21664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21663">CVE-2025-21663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21662">CVE-2025-21662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21660">CVE-2025-21660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57939">CVE-2024-57939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57940">CVE-2024-57940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21655">CVE-2025-21655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57913">CVE-2024-57913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57912">CVE-2024-57912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57911">CVE-2024-57911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57910">CVE-2024-57910</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57908">CVE-2024-57908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57907">CVE-2024-57907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57929">CVE-2024-57929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57926">CVE-2024-57926</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57925">CVE-2024-57925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57906">CVE-2024-57906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57922">CVE-2024-57922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57917">CVE-2024-57917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57916">CVE-2024-57916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57915">CVE-2024-57915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57904">CVE-2024-57904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21654">CVE-2025-21654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21653">CVE-2025-21653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21652">CVE-2025-21652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21640">CVE-2025-21640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21639">CVE-2025-21639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21638">CVE-2025-21638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21637">CVE-2025-21637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21636">CVE-2025-21636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21648">CVE-2025-21648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21647">CVE-2025-21647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21646">CVE-2025-21646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21645">CVE-2025-21645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21642">CVE-2025-21642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21631">CVE-2025-21631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21632">CVE-2025-21632</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602</a>)</li>
<li>sssd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3758">CVE-2023-3758</a>)</li>
<li>wget (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10524">CVE-2024-10524</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Additional GRUB modules are no longer installed for UEFI platforms to save space and also because they cannot be loaded with Secure Boot enabled. This does not affect existing installations.</li>
<li>The GRUB modules on non-UEFI platforms are now compressed with xz rather than gzip to save even more space. This does not affect existing installations.</li>
<li>The VFIO kernel modules are now also available in ARM64 builds. (<a href="https://github.com/flatcar/scripts/pull/2484">flatcar/scripts#2484</a>)- Enabled the gtp kernel module. This is the GPRS Tunneling Protocol datapath for usage in telecoms scenarios. (<a href="https://github.com/flatcar/scripts/pull/2504">flatcar/scripts#2504</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.22.10">1.22.10</a>)</li>
<li>Linux (<a href="https://lwn.net/Articles/1006010">6.6.74</a> (includes <a href="https://lwn.net/Articles/1005709">6.6.73</a>, <a href="https://lwn.net/Articles/1005383">6.6.72</a>, <a href="https://lwn.net/Articles/1004703">6.6.71</a>, <a href="https://lwn.net/Articles/1004551">6.6.70</a>, <a href="https://lwn.net/Articles/1003986">6.6.69</a>, <a href="https://lwn.net/Articles/1003609">6.6.68</a>, <a href="https://lwn.net/Articles/1002919">6.6.67</a>, <a href="https://lwn.net/Articles/1002177">6.6.66</a>, <a href="https://lwn.net/Articles/1001732">6.6.65</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241210">20241210</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241110">20241110</a>))</li>
<li>SDK: autoconf (<a href="https://lists.gnu.org/archive/html/autotools-announce/2023-12/msg00003.html">2.72</a>)</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.30/release/3.30.html#id5">3.30.5</a>)</li>
<li>SDK: libpng (<a href="https://github.com/pnggroup/libpng/blob/v1.6.44/CHANGES#L6199">1.6.44</a>)</li>
<li>SDK: perf (<a href="https://kernelnewbies.org/Linux_6.11#Tracing.2C_perf_and_BPF">6.11.7</a>)</li>
<li>SDK: pkgcheck (<a href="https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.32">0.10.32</a>)</li>
<li>SDK: portage (<a href="https://github.com/gentoo/portage/blob/portage-3.0.66.1/NEWS#L9">3.0.66.1</a>)</li>
<li>azure: chrony (<a href="https://gitlab.com/chrony/chrony/-/blob/4.6.1/NEWS">4.6.1</a>)</li>
<li>base, dev: azure-vm-utils (<a href="https://github.com/Azure/azure-vm-utils/commits/v0.4.0/">0.4.0</a>)</li>
<li>base, dev: bind (<a href="https://bind9.readthedocs.io/en/v9.18.29/notes.html#notes-for-bind-9-18-29">9.18.29</a>)</li>
<li>base, dev: bpftool (<a href="https://github.com/libbpf/bpftool/releases/tag/v7.4.0">7.4.0</a>)</li>
<li>base, dev: btrfs-progs (<a href="https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.11/CHANGES">6.11</a>)</li>
<li>base, dev: checkpolicy (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_4/expat/Changes">2.6.4</a>)</li>
<li>base, dev: gawk (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00008.html">5.3.1</a>)</li>
<li>base, dev: gcc (<a href="https://gcc.gnu.org/gcc-14/changes.html">14.2.1_p20241116</a>)</li>
<li>base, dev: iproute2 (<a href="https://lore.kernel.org/netdev/20240915201831.164de47e@hermes.local/">6.11.0</a> (includes <a href="https://lore.kernel.org/netdev/20240717090601.20b2871f@hermes.local/">6.10.0</a>))</li>
<li>base, dev: iputils (<a href="https://github.com/iputils/iputils/releases/tag/20240905">20240905</a>)</li>
<li>base, dev: json-c (<a href="https://github.com/json-c/json-c/blob/json-c-0.18-20240915/ChangeLog">0.18</a>)</li>
<li>base, dev: kexec-tools (<a href="https://github.com/horms/kexec-tools/commits/v2.0.29/">2.0.29</a>)</li>
<li>base, dev: less (<a href="https://www.greenwoodsoftware.com/less/news.668.html">668</a>)</li>
<li>base, dev: libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.7">3.7.7</a>)</li>
<li>base, dev: libnetfilter_conntrack (<a href="https://lists.netfilter.org/pipermail/netfilter-announce/2024/000260.html">1.1.0</a>)</li>
<li>base, dev: libnftnl (<a href="https://lists.netfilter.org/pipermail/netfilter-announce/2024/000261.html">1.2.8</a>)</li>
<li>base, dev: libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.49.2">1.49.2</a> (includes <a href="https://github.com/libuv/libuv/releases/tag/v1.49.1">1.49.1</a>, <a href="https://github.com/libuv/libuv/releases/tag/v1.49.0">1.49.0</a>))</li>
<li>base, dev: libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.8">2.12.8</a>)</li>
<li>base, dev: mokutil (<a href="https://github.com/lcp/mokutil/commits/0.7.2/">0.7.2</a>)</li>
<li>base, dev: openldap (<a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_6/CHANGES">2.6.6</a> (includes <a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_5/CHANGES">2.6.5</a>))</li>
<li>base, dev: pax-utils (<a href="https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.8">1.3.8</a>)</li>
<li>base, dev: util-linux (<a href="https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.2/Documentation/releases/v2.40.2-ReleaseNotes">2.40.2</a> (includes <a href="https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.1/Documentation/releases/v2.40.1-ReleaseNotes">2.40.1</a>, <a href="https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40/Documentation/releases/v2.40-ReleaseNotes">2.40.0</a>))</li>
<li>base, dev: wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-11/msg00000.html">1.25.0</a>)</li>
<li>base, dev: xfsprogs (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.10.1">6.10.1</a> (includes <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.10.0">6.10.0</a>, <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.9.0">6.9.0</a>))</li>
<li>base, dev: xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.6.3">5.6.3</a>)</li>
<li>dev: gentoolkit (<a href="https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.8">0.6.8</a>)</li>
<li>sssd (<a href="https://sssd.io/release-notes/sssd-2.9.5.html">2.9.5</a> (includes <a href="https://sssd.io/release-notes/sssd-2.9.4.html">2.9.4</a>, <a href="https://sssd.io/release-notes/sssd-2.9.3.html">2.9.3</a>, <a href="https://sssd.io/release-notes/sssd-2.9.2.html">2.9.2</a>, <a href="https://sssd.io/release-notes/sssd-2.9.1.html">2.9.1</a>, <a href="https://sssd.io/release-notes/sssd-2.9.0.html">2.9.0</a>, <a href="https://sssd.io/release-notes/sssd-2.8.0.html">2.8.0</a>, <a href="https://sssd.io/release-notes/sssd-2.7.0.html">2.7.0</a>, <a href="https://sssd.io/release-notes/sssd-2.6.0.html">2.6.0</a>, <a href="https://sssd.io/release-notes/sssd-2.5.0.html">2.5.0</a>, <a href="https://sssd.io/release-notes/sssd-2.4.0.html">2.4.0</a>))</li>
<li>sysext-docker: docker (<a href="https://github.com/moby/moby/releases/tag/v27.3.1">27.3.1</a>)</li>
<li>sysext-docker: docker-cli (<a href="https://github.com/moby/moby/releases/tag/v27.3.1">27.3.1</a>)</li>
<li>sysext-python: cachecontrol (<a href="https://github.com/psf/cachecontrol/releases/tag/v0.14.1">0.14.1</a>)</li>
<li>sysext-python: charset-normalizer (<a href="https://github.com/jawah/charset_normalizer/releases/tag/3.4.0">3.4.0</a>)</li>
<li>sysext-python: distlib (<a href="https://github.com/pypa/distlib/blob/0.3.9/CHANGES.rst">0.3.9</a>)</li>
<li>sysext-python: jaraco-functools (<a href="https://github.com/jaraco/jaraco.functools/blob/v4.1.0/NEWS.rsto">4.1.0</a>)</li>
<li>sysext-python: packaging (<a href="https://github.com/pypa/packaging/releases/tag/24.2">24.2</a>)</li>
<li>sysext-python: pyproject-hooks (<a href="https://github.com/pypa/pyproject-hooks/blob/v1.2.0/docs/changelog.rst">1.2.0</a>)</li>
<li>sysext-python: resolvelib (<a href="https://github.com/sarugaku/resolvelib/blob/1.1.0/CHANGELOG.rst">1.1.0</a>)</li>
<li>sysext-python: rich (<a href="https://github.com/Textualize/rich/releases/tag/v13.9.3">13.9.3</a>)</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/commits/2024.10.21.16/">2024.10.21.16</a>)</li>
<li>sysext-python: truststore (<a href="https://github.com/sethmlarson/truststore/blob/v0.10.0/CHANGELOG.md">0.10.0</a>)</li>
<li>vmware: libmspack (<a href="https://github.com/kyz/libmspack/commits/v1.11/libmspack">1.11</a>)</li>
<li>vmware: xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.5">1.3.5</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 4186.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23128">CVE-2025-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23125">CVE-2025-23125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48875">CVE-2024-48875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41935">CVE-2024-41935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56785">CVE-2024-56785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56781">CVE-2024-56781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56628">CVE-2024-56628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56627">CVE-2024-56627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56626">CVE-2024-56626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56613">CVE-2024-56613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56586">CVE-2024-56586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56585">CVE-2024-56585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56597">CVE-2024-56597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56596">CVE-2024-56596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56595">CVE-2024-56595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56565">CVE-2024-56565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53196">CVE-2024-53196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53687">CVE-2024-53687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53690">CVE-2024-53690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57946">CVE-2024-57946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56766">CVE-2024-56766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56765">CVE-2024-56765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56763">CVE-2024-56763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56762">CVE-2024-56762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56769">CVE-2024-56769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56767">CVE-2024-56767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57938">CVE-2024-57938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57933">CVE-2024-57933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57932">CVE-2024-57932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57930">CVE-2024-57930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57931">CVE-2024-57931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57841">CVE-2024-57841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57802">CVE-2024-57802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57801">CVE-2024-57801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39282">CVE-2024-39282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36476">CVE-2024-36476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57896">CVE-2024-57896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21629">CVE-2025-21629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57903">CVE-2024-57903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57902">CVE-2024-57902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57901">CVE-2024-57901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57900">CVE-2024-57900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57899">CVE-2024-57899</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57897">CVE-2024-57897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57890">CVE-2024-57890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57889">CVE-2024-57889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57887">CVE-2024-57887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57885">CVE-2024-57885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57884">CVE-2024-57884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57895">CVE-2024-57895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57894">CVE-2024-57894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57893">CVE-2024-57893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57892">CVE-2024-57892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57882">CVE-2024-57882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21658">CVE-2025-21658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21656">CVE-2025-21656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57945">CVE-2024-57945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21664">CVE-2025-21664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21663">CVE-2025-21663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21662">CVE-2025-21662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21660">CVE-2025-21660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57939">CVE-2024-57939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57940">CVE-2024-57940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21655">CVE-2025-21655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57913">CVE-2024-57913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57912">CVE-2024-57912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57911">CVE-2024-57911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57910">CVE-2024-57910</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57908">CVE-2024-57908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57907">CVE-2024-57907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57929">CVE-2024-57929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57926">CVE-2024-57926</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57925">CVE-2024-57925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57906">CVE-2024-57906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57922">CVE-2024-57922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57917">CVE-2024-57917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57916">CVE-2024-57916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57915">CVE-2024-57915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57904">CVE-2024-57904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21654">CVE-2025-21654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21653">CVE-2025-21653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21652">CVE-2025-21652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21640">CVE-2025-21640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21639">CVE-2025-21639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21638">CVE-2025-21638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21637">CVE-2025-21637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21636">CVE-2025-21636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21648">CVE-2025-21648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21647">CVE-2025-21647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21646">CVE-2025-21646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21645">CVE-2025-21645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21642">CVE-2025-21642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21631">CVE-2025-21631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21632">CVE-2025-21632</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/1006010">6.6.74</a> (includes <a href="https://lwn.net/Articles/1005709">6.6.73</a>, <a href="https://lwn.net/Articles/1005383">6.6.72</a>, <a href="https://lwn.net/Articles/1004703">6.6.71</a>, <a href="https://lwn.net/Articles/1004551">6.6.70</a>, <a href="https://lwn.net/Articles/1003986">6.6.69</a>, <a href="https://lwn.net/Articles/1003609">6.6.68</a>, <a href="https://lwn.net/Articles/1002919">6.6.67</a>, <a href="https://lwn.net/Articles/1002177">6.6.66</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.3.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.74</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4186.1.0"/>
    <published>2025-01-30T16:23:38+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4152.1.0</id>
    <title>4152.1.0</title>
    <updated>2026-03-09T16:26:28.009902+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4116.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53103">CVE-2024-53103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53082">CVE-2024-53082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53083">CVE-2024-53083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53081">CVE-2024-53081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53068">CVE-2024-53068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53066">CVE-2024-53066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53072">CVE-2024-53072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53070">CVE-2024-53070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50296">CVE-2024-50296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50295">CVE-2024-50295</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50294">CVE-2024-50294</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50292">CVE-2024-50292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50300">CVE-2024-50300</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50299">CVE-2024-50299</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50298">CVE-2024-50298</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50275">CVE-2024-50275</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50284">CVE-2024-50284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50283">CVE-2024-50283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50280">CVE-2024-50280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50278">CVE-2024-50278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50287">CVE-2024-50287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50286">CVE-2024-50286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50285">CVE-2024-50285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50276">CVE-2024-50276</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50273">CVE-2024-50273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50272">CVE-2024-50272</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50271">CVE-2024-50271</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50269">CVE-2024-50269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50268">CVE-2024-50268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50265">CVE-2024-50265</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53102">CVE-2024-53102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53101">CVE-2024-53101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53100">CVE-2024-53100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53099">CVE-2024-53099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53097">CVE-2024-53097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53095">CVE-2024-53095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53094">CVE-2024-53094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53093">CVE-2024-53093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53091">CVE-2024-53091</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53079">CVE-2024-53079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53135">CVE-2024-53135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53134">CVE-2024-53134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53131">CVE-2024-53131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53130">CVE-2024-53130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53129">CVE-2024-53129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53140">CVE-2024-53140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53139">CVE-2024-53139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53138">CVE-2024-53138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53136">CVE-2024-53136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53126">CVE-2024-53126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53127">CVE-2024-53127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53113">CVE-2024-53113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53112">CVE-2024-53112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53110">CVE-2024-53110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53109">CVE-2024-53109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53108">CVE-2024-53108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53123">CVE-2024-53123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53122">CVE-2024-53122</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53121">CVE-2024-53121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53120">CVE-2024-53120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53119">CVE-2024-53119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53106">CVE-2024-53106</a>)</li>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9143">CVE-2024-9143</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8096">CVE-2024-8096</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26256">CVE-2024-26256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48957">CVE-2024-48957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48958">CVE-2024-48958</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31022">CVE-2023-31022</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0074">CVE-2024-0074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0075">CVE-2024-0075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0078">CVE-2024-0078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0126">CVE-2024-0126</a>)</li>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39894">CVE-2024-39894</a>)</li>
<li>sysext-podman: containers-common (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341</a>)</li>
<li>sysext-podman: containers-image (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727</a>)</li>
<li>sysext-podman: podman (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added qemu-guest-agent to ARM64 images (<a href="https://github.com/flatcar/Flatcar/issues/1593">flatcar/flatcar#1593</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added Proxmox Virtual Environment images (<a href="https://github.com/flatcar/scripts/pull/1783">scripts#1783</a>)</li>
<li>The UEFI firmware has changed from raw (.fd) format to QCOW2 format. In addition, the amd64 firmware variables are now held in a 4MB image rather than a 2MB image. Note that this firmware is only intended for testing with QEMU. Do not use it in production. (<a href="https://github.com/flatcar/scripts/pull/2434">scripts#2434</a>)</li>
<li>The arm64 UEFI firmware now supports Secure Boot. Be aware that this is not considered secure due to the lack of an SMM implementation, which is needed to protect the variable store. As above, this firmware should not be used in production anyway. (<a href="https://github.com/flatcar/scripts/pull/2434">scripts#2434</a>)</li>
<li>grub 2.12-flatcar3: GRUB now includes many patches from Red Hat to support Secure Boot, as well as Flatcar's own patches. The version string includes a numbered &quot;flatcar&quot; suffix to track changes to these additional patches. This string can be seen in the GRUB menu. (<a href="https://github.com/flatcar/scripts/pull/2431">scripts#2431</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2200-2024-10-22">2.20.0</a>)</li>
<li>Linux (<a href="https://lwn.net/Articles/1001739">6.6.65</a> (includes <a href="https://lwn.net/Articles/1001438">6.6.64</a>, <a href="https://lwn.net/Articles/999110">6.6.63</a>, <a href="https://lwn.net/Articles/998450">6.6.62</a>, <a href="https://lwn.net/Articles/998150">6.6.61</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241017">20241017</a>)</li>
<li>OpenSSL (<a href="https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32">3.2.3</a>)</li>
<li>SDK: Go (<a href="https://go.dev/doc/devel/release#go1.22.9">1.22.9</a>)</li>
<li>SDK: catalyst (<a href="https://gitweb.gentoo.org/proj/catalyst.git/log/?h=4.0.0">4.0.0</a>)</li>
<li>SDK: crossdev (<a href="https://gitweb.gentoo.org/proj/crossdev.git/log/?h=20240921">20240921</a>)</li>
<li>SDK: edk2-bin (<a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202408">202408</a> (includes <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202405">202405</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202402">202402</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202311">202311</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202308">202308</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202305">202305</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202302">202302</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202211">202211</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202208">202208</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202205">202205</a>))</li>
<li>SDK: meson (<a href="https://github.com/mesonbuild/meson/commits/1.5.2/">1.5.2</a>)</li>
<li>SDK: rust (<a href="https://blog.rust-lang.org/2024/09/05/Rust-1.81.0.html">1.81.0</a>)</li>
<li>azure: chrony (<a href="https://gitlab.com/chrony/chrony/-/blob/4.6/NEWS">4.6</a>)</li>
<li>base, dev: azure-vm-utils (<a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.3.0">0.3.0</a>)</li>
<li>base, dev: binutils-config (<a href="https://gitweb.gentoo.org/proj/binutils-config.git/log/?h=v5.5.2">5.5.2</a>)</li>
<li>base, dev: btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/blob/v6.10.1/CHANGES#L26-L38">6.10.1</a> (includes <a href="https://github.com/kdave/btrfs-progs/blob/v6.10/CHANGES">6.10</a>))</li>
<li>base, dev: c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/v1.33.1">1.33.1</a> (includes <a href="https://github.com/c-ares/c-ares/releases/tag/v1.33.0">1.33.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.32.3">1.32.3</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.32.2">1.32.2</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.32.1">1.32.1</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.32.0">1.32.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.31.0">1.31.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.30.0">1.30.0</a>))</li>
<li>base, dev: cracklib (<a href="https://github.com/cracklib/cracklib/releases/tag/v2.10.2">2.10.2</a> (includes <a href="https://github.com/cracklib/cracklib/releases/tag/v2.10.1">2.10.1</a>, <a href="https://github.com/cracklib/cracklib/releases/tag/v2.10.0">2.10.0</a>))</li>
<li>base, dev: cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.5/docs/v2.7.5-ReleaseNotes">2.7.5</a> (includes <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.4/docs/v2.7.4-ReleaseNotes">2.7.4</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.3/docs/v2.7.3-ReleaseNotes">2.7.3</a>))</li>
<li>base, dev: curl (<a href="https://curl.se/ch/8.10.1.html">8.10.1</a> (includes <a href="https://curl.se/ch/8.10.0.html">8.10.0</a>))</li>
<li>base, dev: efivar (<a href="https://github.com/rhboot/efivar/releases/tag/39">39</a>)</li>
<li>base, dev: gettext (<a href="https://savannah.gnu.org/news/?id=10597">0.22.5</a>)</li>
<li>base, dev: git (<a href="https://github.com/git/git/blob/v2.45.2/Documentation/RelNotes/2.45.2.txt">2.45.2</a> (includes <a href="https://github.com/git/git/blob/v2.45.1/Documentation/RelNotes/2.45.1.txt">2.45.1</a>, <a href="https://github.com/git/git/blob/v2.45.0/Documentation/RelNotes/2.45.0.txt">2.45.0</a>))</li>
<li>base, dev: gnutls (<a href="https://gitlab.com/gnutls/gnutls/-/blob/3.8.7/NEWS">3.8.7.1</a> (includes <a href="https://gitlab.com/gnutls/gnutls/-/blob/3.8.6/NEWS">3.8.6</a>))</li>
<li>base, dev: gptfdisk (<a href="https://sourceforge.net/p/gptfdisk/code/ci/53ac725a88a616b9f3395500d6e520aa04742fa5/tree/NEWS">1.0.10</a>)</li>
<li>base, dev: intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910">20240910_p20240915</a>)</li>
<li>base, dev: kmod (<a href="https://github.com/kmod-project/kmod/blob/v33/NEWS">33</a>)</li>
<li>base, dev: ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/6ca4df6374136d1d205de689618dc8fce5177d14">2.8.1</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/94f11c3c21bc3b8a34d376ab99becd2c6260af62">2.8.0</a>))</li>
<li>base, dev: libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.6">3.7.6</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.5">3.7.5</a>))</li>
<li>base, dev: libassuan (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=48ece8b1cf8b81bdf835db00079ae247742cd398;hb=0351ecfa4f35ad44684075abec153574986b11bd">3.0.0</a>)</li>
<li>base, dev: libgcrypt (<a href="https://dev.gnupg.org/T7165">1.11.0</a>)</li>
<li>base, dev: libgpg-error (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=b865ecc7197a4f60b1530958fbb25a92bdfdc3de;hb=bb732615daad9bba9026354ae90f0f5292ea4908">1.50</a>)</li>
<li>base, dev: libnl (<a href="https://lists.infradead.org/pipermail/libnl/2024-July/002440.html">3.10.0</a>)</li>
<li>base, dev: libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.10">1.10</a>)</li>
<li>base, dev: liburing (<a href="https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.7">2.7</a> (includes <a href="https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.6">2.6</a>, <a href="https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.5">2.5</a>, <a href="https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.4">2.4</a>))</li>
<li>base, dev: nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.2">2.10.2</a> (includes <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.1">2.10.1</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10">2.10</a>))</li>
<li>base, dev: oniguruma (<a href="https://github.com/kkos/oniguruma/releases/tag/v6.9.9">6.9.9</a>)</li>
<li>base, dev: openssh (<a href="https://www.openssh.com/txt/release-9.8">9.8_p1</a>)</li>
<li>base, dev: pinentry (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=a07d18953341a4eb65c9873e64c06bc7c642606d;hb=dd8894fa60c1f1c08ecc50ba4657580abc348347">1.3.1</a>)</li>
<li>base, dev: pkgconf (<a href="https://github.com/pkgconf/pkgconf/blob/pkgconf-2.3.0/NEWS">2.3.0</a>)</li>
<li>base, dev: samba (<a href="https://gitlab.com/samba-team/samba/-/blob/bce5c475d12fb75619bc85d176bfd40420b4fce8/WHATSNEW.txt">4.19.7</a>)</li>
<li>base, dev: selinux-base (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-base-policy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-container (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-dbus (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-policykit (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-sssd (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-unconfined (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: socat (<a href="https://repo.or.cz/socat.git/blob/2da070164d454971d5c970b5278e645051f0d0f7:/CHANGES">1.8.0.0</a>)</li>
<li>base, dev: sqlite (<a href="https://www.sqlite.org/releaselog/3_46_1.html">3.46.1</a>)</li>
<li>base, dev: talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/f28966c1638806a5af1fa4e451b668af638491ce">2.4.2</a>)</li>
<li>base, dev: tcpdump (<a href="https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.5/CHANGES">4.99.5</a>)</li>
<li>base, dev: tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/5032ab712c6e9d6562cd10b1d840d2ee052d1d16">1.4.10</a>)</li>
<li>base, dev: tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/0ba05d5bbb1788b0b8cee26748bcda0c90c48baa">0.16.1</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/acd9248b13cba06d5b748f17aa9bc5d62079d9cc">0.16.0</a>))</li>
<li>base, dev: userspace-rcu (<a href="https://lists.lttng.org/pipermail/lttng-dev/2024-August/030860.html">0.14.1</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html">3.107</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.23">1.7.23</a>)</li>
<li>dev: gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00011.html">15.2</a>)</li>
<li>dev: gnuconfig (<a href="https://git.savannah.gnu.org/cgit/config.git/log/?id=00b15927496058d23e6258a28d8996f87cf1f191">20240728</a>)</li>
<li>dev: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.17.1">3.17.1</a> (includes <a href="https://github.com/esnet/iperf/releases/tag/3.17">3.17</a>))</li>
<li>dev: libpipeline (<a href="https://gitlab.com/libpipeline/libpipeline/-/blob/dd37cf76496b4b999509bd133657c1fc021e3a5f/NEWS.md">1.5.8</a>)</li>
<li>dev: man-db (<a href="https://gitlab.com/man-db/man-db/-/releases/2.13.0">2.13.0</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-216-01/index.html">535.216.01</a>)</li>
<li>sysext-podman: aardvark-dns (<a href="https://github.com/containers/aardvark-dns/releases/tag/v1.12.2">1.12.2</a> (includes <a href="https://github.com/containers/aardvark-dns/releases/tag/v1.12.1">1.12.1</a>, <a href="https://github.com/containers/aardvark-dns/releases/tag/v1.12.0">1.12.0</a>))</li>
<li>sysext-podman: containers-common (<a href="https://github.com/containers/common/releases/tag/v0.60.4">0.60.4</a> (includes <a href="https://github.com/containers/common/releases/tag/v0.60.3">0.60.3</a>, <a href="https://github.com/containers/common/releases/tag/v0.60.2">0.60.2</a>, <a href="https://github.com/containers/common/releases/tag/v0.60.1">0.60.1</a>, <a href="https://github.com/containers/common/releases/tag/v0.60.0">0.60.0</a>, <a href="https://github.com/containers/common/releases/tag/v0.59.2">0.59.2</a>))</li>
<li>sysext-podman: containers-image (<a href="https://github.com/containers/image/releases/tag/v5.32.2">5.32.2</a> (includes <a href="https://github.com/containers/image/releases/tag/v5.32.1">5.32.1</a>, <a href="https://github.com/containers/image/releases/tag/v5.32.0">5.32.0</a>, <a href="https://github.com/containers/image/releases/tag/v5.31.0">5.31.0</a>, <a href="https://github.com/containers/image/releases/tag/v5.30.2">5.30.2</a>, <a href="https://github.com/containers/image/releases/tag/v5.30.1">5.30.1</a>))</li>
<li>sysext-podman: containers-storage (<a href="https://github.com/containers/storage/releases/tag/v1.55.0">1.55.0</a> (includes <a href="https://github.com/containers/storage/releases/tag/v1.54.0">1.54.0</a>))</li>
<li>sysext-podman: crun (<a href="https://github.com/containers/crun/releases/tag/1.17">1.17</a> (includes <a href="https://github.com/containers/crun/releases/tag/1.16.1">1.16.1</a>, <a href="https://github.com/containers/crun/releases/tag/1.16">1.16</a>, <a href="https://github.com/containers/crun/releases/tag/1.15">1.15</a>, <a href="https://github.com/containers/crun/releases/tag/1.14.4">1.14.4</a>))</li>
<li>sysext-podman: fuse-overlayfs (<a href="https://github.com/containers/fuse-overlayfs/releases/tag/v1.14">1.14</a>)</li>
<li>sysext-podman: netavark (<a href="https://github.com/containers/netavark/releases/tag/v1.12.2">1.12.2</a> (includes <a href="https://github.com/containers/netavark/releases/tag/v1.12.1">1.12.1</a>, <a href="https://github.com/containers/netavark/releases/tag/v1.12.0">1.12.0</a>, <a href="https://github.com/containers/netavark/releases/tag/v1.11.0">1.11.0</a>))</li>
<li>sysext-podman: passt (<a href="https://archives.passt.top/passt-user/20240906171530.763b3179@elisabeth/T/#u">2024.09.06</a>)</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.2.4">5.2.4</a> (includes <a href="https://github.com/containers/podman/releases/tag/v5.2.3">5.2.3</a>, <a href="https://github.com/containers/podman/releases/tag/v5.2.2">5.2.2</a>, <a href="https://github.com/containers/podman/releases/tag/v5.2.1">5.2.1</a>, <a href="https://github.com/containers/podman/releases/tag/v5.2.0">5.2.0</a>, <a href="https://github.com/containers/podman/releases/tag/v5.1.2">5.1.2</a>, <a href="https://github.com/containers/podman/releases/tag/v5.1.1">5.1.1</a>, <a href="https://github.com/containers/podman/releases/tag/v5.1.0">5.1.0</a>))</li>
<li>sysext-python: idna (<a href="https://github.com/kjd/idna/blob/v3.10/HISTORY.rst">3.10</a>)</li>
<li>sysext-python: more-itertools (<a href="https://github.com/more-itertools/more-itertools/blob/v10.5.0/docs/versions.rst#1050">10.5.0</a>)</li>
<li>sysext-python: msgpack (<a href="https://github.com/msgpack/msgpack-python/blob/v1.1.0/ChangeLog.rst#110">1.1.0</a>)</li>
<li>sysext-python: platformdirs (<a href="https://github.com/tox-dev/platformdirs/releases/tag/4.3.6">4.3.6</a>)</li>
<li>sysext-python: rich (<a href="https://github.com/Textualize/rich/releases/tag/v13.8.1">13.8.1</a>)</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v74.1.3/NEWS.rst">74.1.3</a>)</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/releases/tag/2024.9.12">2024.9.12</a>)</li>
<li>sysext-python: urllib3 (<a href="https://github.com/urllib3/urllib3/releases/tag/2.2.3">2.2.3</a>)</li>
<li>vmware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.5.0">12.5.0</a>)</li>
<li>vmware: xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.4">1.3.4</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 4152.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53103">CVE-2024-53103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53082">CVE-2024-53082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53083">CVE-2024-53083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53081">CVE-2024-53081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53068">CVE-2024-53068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53066">CVE-2024-53066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53072">CVE-2024-53072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53070">CVE-2024-53070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50296">CVE-2024-50296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50295">CVE-2024-50295</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50294">CVE-2024-50294</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50292">CVE-2024-50292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50300">CVE-2024-50300</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50299">CVE-2024-50299</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50298">CVE-2024-50298</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50275">CVE-2024-50275</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50284">CVE-2024-50284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50283">CVE-2024-50283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50280">CVE-2024-50280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50278">CVE-2024-50278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50287">CVE-2024-50287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50286">CVE-2024-50286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50285">CVE-2024-50285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50276">CVE-2024-50276</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50273">CVE-2024-50273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50272">CVE-2024-50272</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50271">CVE-2024-50271</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50269">CVE-2024-50269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50268">CVE-2024-50268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50265">CVE-2024-50265</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53102">CVE-2024-53102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53101">CVE-2024-53101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53100">CVE-2024-53100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53099">CVE-2024-53099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53097">CVE-2024-53097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53095">CVE-2024-53095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53094">CVE-2024-53094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53093">CVE-2024-53093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53091">CVE-2024-53091</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53079">CVE-2024-53079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53135">CVE-2024-53135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53134">CVE-2024-53134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53131">CVE-2024-53131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53130">CVE-2024-53130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53129">CVE-2024-53129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53140">CVE-2024-53140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53139">CVE-2024-53139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53138">CVE-2024-53138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53136">CVE-2024-53136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53126">CVE-2024-53126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53127">CVE-2024-53127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53113">CVE-2024-53113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53112">CVE-2024-53112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53110">CVE-2024-53110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53109">CVE-2024-53109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53108">CVE-2024-53108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53123">CVE-2024-53123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53122">CVE-2024-53122</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53121">CVE-2024-53121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53120">CVE-2024-53120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53119">CVE-2024-53119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53106">CVE-2024-53106</a>)</li>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9143">CVE-2024-9143</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added qemu-guest-agent to ARM64 images (<a href="https://github.com/flatcar/Flatcar/issues/1593">flatcar/flatcar#1593</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/1001739">6.6.65</a> (includes <a href="https://lwn.net/Articles/1001438">6.6.64</a>, <a href="https://lwn.net/Articles/999110">6.6.63</a>, <a href="https://lwn.net/Articles/998450">6.6.62</a>, <a href="https://lwn.net/Articles/998150">6.6.61</a>))</li>
<li>OpenSSL (<a href="https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32">3.2.3</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html">3.107</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.2.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.65</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4152.1.0"/>
    <published>2024-12-16T14:12:13+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4116.1.0</id>
    <title>4116.1.0</title>
    <updated>2026-03-09T16:26:27.953874+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4081.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50176">CVE-2024-50176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50175">CVE-2024-50175</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50012">CVE-2024-50012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50005">CVE-2024-50005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50016">CVE-2024-50016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49997">CVE-2024-49997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49961">CVE-2024-49961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49992">CVE-2024-49992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49988">CVE-2024-49988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49987">CVE-2024-49987</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49986">CVE-2024-49986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49980">CVE-2024-49980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49978">CVE-2024-49978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49977">CVE-2024-49977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49976">CVE-2024-49976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49953">CVE-2024-49953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49952">CVE-2024-49952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49951">CVE-2024-49951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49948">CVE-2024-49948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49944">CVE-2024-49944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49931">CVE-2024-49931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49927">CVE-2024-49927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49889">CVE-2024-49889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49874">CVE-2024-49874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50191">CVE-2024-50191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50185">CVE-2024-50185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50181">CVE-2024-50181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50097">CVE-2024-50097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50065">CVE-2024-50065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50057">CVE-2024-50057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50040">CVE-2024-50040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50039">CVE-2024-50039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50038">CVE-2024-50038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50036">CVE-2024-50036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50032">CVE-2024-50032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50029">CVE-2024-50029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50202">CVE-2024-50202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50101">CVE-2024-50101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50088">CVE-2024-50088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50087">CVE-2024-50087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50086">CVE-2024-50086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50085">CVE-2024-50085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50084">CVE-2024-50084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50083">CVE-2024-50083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50080">CVE-2024-50080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50076">CVE-2024-50076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50072">CVE-2024-50072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50070">CVE-2024-50070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50069">CVE-2024-50069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50066">CVE-2024-50066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50211">CVE-2024-50211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50210">CVE-2024-50210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50164">CVE-2024-50164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50163">CVE-2024-50163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50162">CVE-2024-50162</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50159">CVE-2024-50159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50158">CVE-2024-50158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50172">CVE-2024-50172</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50170">CVE-2024-50170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50169">CVE-2024-50169</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50168">CVE-2024-50168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50166">CVE-2024-50166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50145">CVE-2024-50145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50142">CVE-2024-50142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50152">CVE-2024-50152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50151">CVE-2024-50151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50139">CVE-2024-50139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50140">CVE-2024-50140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50136">CVE-2024-50136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50135">CVE-2024-50135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50133">CVE-2024-50133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50111">CVE-2024-50111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50126">CVE-2024-50126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50121">CVE-2024-50121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50120">CVE-2024-50120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50112">CVE-2024-50112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50262">CVE-2024-50262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50226">CVE-2024-50226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50235">CVE-2024-50235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50231">CVE-2024-50231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50258">CVE-2024-50258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50257">CVE-2024-50257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50256">CVE-2024-50256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50252">CVE-2024-50252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50251">CVE-2024-50251</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50250">CVE-2024-50250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50248">CVE-2024-50248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50247">CVE-2024-50247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50246">CVE-2024-50246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50245">CVE-2024-50245</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50244">CVE-2024-50244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50243">CVE-2024-50243</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50242">CVE-2024-50242</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50240">CVE-2024-50240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50239">CVE-2024-50239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50219">CVE-2024-50219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50216">CVE-2024-50216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50224">CVE-2024-50224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50223">CVE-2024-50223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50222">CVE-2024-50222</a>)</li>
<li>docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110</a>)</li>
<li>etcd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32082">CVE-2023-32082</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42667">CVE-2023-42667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-49141">CVE-2023-49141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24980">CVE-2024-24980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25939">CVE-2024-25939</a>)</li>
<li>libpcap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-7256">CVE-2023-7256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8006">CVE-2024-8006</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310</a>)</li>
<li>SDK: Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Kernel lockdown in integrity mode is now enabled when secure boot is enabled. This prevents loading unsigned kernel modules and matches the behavior of all major distros. (<a href="https://github.com/flatcar/scripts/pull/2299">scripts#2299</a>)</li>
<li>The <code>/usr/sbin</code> directory is now merged into <code>/usr/bin</code>, so the former became a symlink to the latter. The SDK now has the same base layout as the generic images. (<a href="https://github.com/flatcar/scripts/pull/2068">flatcar/scripts#2068</a>)</li>
<li>Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha (<a href="https://github.com/flatcar/scripts/pull/2390">flatcar/scripts#2390</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/997527">6.6.60</a> (includes <a href="https://lwn.net/Articles/996689">6.6.59</a>, <a href="https://lwn.net/Articles/995132">6.6.58</a>, <a href="https://lwn.net/Articles/994634">6.6.57</a>, <a href="https://lwn.net/Articles/993600">6.6.56</a>, <a href="https://lwn.net/Articles/993599">6.6.55</a>, <a href="https://lwn.net/Articles/970172">6.6.50</a>, <a href="https://lwn.net/Articles/988749">6.6.49</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240909">20240909</a>)</li>
<li>SDK: Go (<a href="https://go.dev/doc/devel/release#go1.22.8">1.22.8</a> (includes <a href="https://go.dev/doc/devel/release#go1.22.7">1.22.7</a>))</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.30/release/3.30.html#id2">3.30.2</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/5.40.0/perldelta">5.40.0</a>)</li>
<li>afterburn (<a href="https://coreos.github.io/afterburn/release-notes/#afterburn-570">5.7.0</a>)</li>
<li>audit (<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.1">4.0.1</a> (includes <a href="https://github.com/linux-audit/audit-userspace/releases/tag/v4.0">4.0</a>))</li>
<li>azure, gce, sysext-python: gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00001.html">1.24</a>)</li>
<li>azure, gce, sysext-python: python (<a href="https://docs.python.org/3.11/whatsnew/3.11.html#notable-changes-in-3-11-10">3.11.10</a>)</li>
<li>bind-tools (<a href="https://bind9.readthedocs.io/en/v9.16.50/notes.html#notes-for-bind-9-16-50">9.16.50</a> (includes <a href="https://bind9.readthedocs.io/en/v9.16.49/notes.html#notes-for-bind-9-16-49">9.16.49</a>))</li>
<li>bpftool (<a href="https://github.com/libbpf/bpftool/releases/tag/v7.5.0">7.5.0</a> (includes <a href="https://github.com/libbpf/bpftool/releases/tag/v7.4.0">7.4.0</a>, <a href="https://github.com/libbpf/bpftool/releases/tag/v7.3.0">7.3.0</a>, <a href="https://github.com/libbpf/bpftool/releases/tag/v7.2.0">7.2.0</a>, <a href="https://github.com/libbpf/bpftool/releases/tag/v7.1.0">7.1.0</a>, <a href="https://github.com/libbpf/bpftool/releases/tag/v7.0.0">7.0.0</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html">3.106</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.22">1.7.22</a>)</li>
<li>dev: gentoolkit (<a href="https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.7">0.6.7</a>)</li>
<li>docker (<a href="https://docs.docker.com/engine/release-notes/27/#2721">27.2.1</a>, includes changes from <a href="https://docs.docker.com/engine/release-notes/26.1/#2610">26.1.0</a>))</li>
<li>etcd (<a href="https://github.com/etcd-io/etcd/blob/96e17d38e244ef18756a55d33066f2893402794b/CHANGELOG/CHANGELOG-3.5.md#v3516-2024-09-10">3.5.16</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes">2.6.3</a>)</li>
<li>grub (<a href="https://lists.gnu.org/archive/html/grub-devel/2023-12/msg00052.html">2.12</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813">20240531_p20240526</a>)</li>
<li>iproute2 (<a href="https://lkml.org/lkml/2024/5/13/860">6.9.0</a>)</li>
<li>libffi (<a href="https://github.com/libffi/libffi/releases/tag/v3.4.6">3.4.6</a> (includes <a href="https://github.com/libffi/libffi/releases/tag/v3.4.5">3.4.5</a>))</li>
<li>libnftnl (<a href="https://www.mail-archive.com/netfilter-announce@lists.netfilter.org/msg00264.html">1.2.7</a>)</li>
<li>libpcap (<a href="https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.10.5/CHANGES">1.10.5</a>)</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.44/NEWS">10.44</a>)</li>
<li>libsodium (<a href="https://github.com/jedisct1/libsodium/releases/tag/1.0.20-RELEASE">1.0.20</a>)</li>
<li>nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/blob/b8c841dc3278dec0812365f02370b41ea9d4ddee/NEWS">3.10</a>)</li>
<li>pinentry (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=1ea7e76f836fe15fe7c59b954d7aab768bd090e6;hb=24833c9ef2bf93d9f6c0583a9ecfefa6747473bc">1.3.0</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.14">1.1.14</a>)</li>
<li>sysext-python: idna (<a href="https://github.com/kjd/idna/releases/tag/v3.8">3.8</a>)</li>
<li>sysext-python: jaraco-context (<a href="https://github.com/jaraco/jaraco.context/blob/v6.0.1/NEWS.rst">6.0.1</a>)</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v73.0.1/NEWS.rst">73.0.1</a> (includes <a href="https://github.com/pypa/setuptools/blob/v72.2.0/NEWS.rst">72.2.0</a>))</li>
<li>sysext-python: truststore (<a href="https://github.com/sethmlarson/truststore/blob/v0.9.2/CHANGELOG.md">0.9.2</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.23/debian/changelog">5.5.23</a> (includes <a href="https://github.com/rfc1036/whois/blob/v5.5.22/debian/changelog">5.5.22</a>))</li>
</ul>
<p><em>Changes since <strong>Alpha 4116.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50176">CVE-2024-50176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50175">CVE-2024-50175</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50012">CVE-2024-50012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50005">CVE-2024-50005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50016">CVE-2024-50016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49997">CVE-2024-49997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49961">CVE-2024-49961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49992">CVE-2024-49992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49988">CVE-2024-49988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49987">CVE-2024-49987</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49986">CVE-2024-49986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49980">CVE-2024-49980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49978">CVE-2024-49978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49977">CVE-2024-49977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49976">CVE-2024-49976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49953">CVE-2024-49953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49952">CVE-2024-49952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49951">CVE-2024-49951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49948">CVE-2024-49948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49944">CVE-2024-49944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49931">CVE-2024-49931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49927">CVE-2024-49927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49889">CVE-2024-49889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49874">CVE-2024-49874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50191">CVE-2024-50191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50185">CVE-2024-50185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50181">CVE-2024-50181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50097">CVE-2024-50097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50065">CVE-2024-50065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50057">CVE-2024-50057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50040">CVE-2024-50040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50039">CVE-2024-50039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50038">CVE-2024-50038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50036">CVE-2024-50036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50032">CVE-2024-50032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50029">CVE-2024-50029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50202">CVE-2024-50202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50101">CVE-2024-50101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50088">CVE-2024-50088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50087">CVE-2024-50087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50086">CVE-2024-50086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50085">CVE-2024-50085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50084">CVE-2024-50084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50083">CVE-2024-50083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50080">CVE-2024-50080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50076">CVE-2024-50076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50072">CVE-2024-50072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50070">CVE-2024-50070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50069">CVE-2024-50069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50066">CVE-2024-50066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50211">CVE-2024-50211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50210">CVE-2024-50210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50164">CVE-2024-50164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50163">CVE-2024-50163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50162">CVE-2024-50162</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50159">CVE-2024-50159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50158">CVE-2024-50158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50172">CVE-2024-50172</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50170">CVE-2024-50170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50169">CVE-2024-50169</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50168">CVE-2024-50168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50166">CVE-2024-50166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50145">CVE-2024-50145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50142">CVE-2024-50142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50152">CVE-2024-50152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50151">CVE-2024-50151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50139">CVE-2024-50139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50140">CVE-2024-50140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50136">CVE-2024-50136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50135">CVE-2024-50135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50133">CVE-2024-50133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50111">CVE-2024-50111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50126">CVE-2024-50126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50121">CVE-2024-50121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50120">CVE-2024-50120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50112">CVE-2024-50112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50262">CVE-2024-50262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50226">CVE-2024-50226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50235">CVE-2024-50235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50231">CVE-2024-50231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50258">CVE-2024-50258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50257">CVE-2024-50257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50256">CVE-2024-50256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50252">CVE-2024-50252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50251">CVE-2024-50251</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50250">CVE-2024-50250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50248">CVE-2024-50248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50247">CVE-2024-50247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50246">CVE-2024-50246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50245">CVE-2024-50245</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50244">CVE-2024-50244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50243">CVE-2024-50243</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50242">CVE-2024-50242</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50240">CVE-2024-50240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50239">CVE-2024-50239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50219">CVE-2024-50219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50216">CVE-2024-50216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50224">CVE-2024-50224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50223">CVE-2024-50223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50222">CVE-2024-50222</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha (<a href="https://github.com/flatcar/scripts/pull/2390">flatcar/scripts#2390</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html">3.106</a>)</li>
<li>Linux (<a href="https://lwn.net/Articles/997527">6.6.60</a> (includes <a href="https://lwn.net/Articles/996689">6.6.59</a>, <a href="https://lwn.net/Articles/995132">6.6.58</a>, <a href="https://lwn.net/Articles/994634">6.6.57</a>, <a href="https://lwn.net/Articles/993600">6.6.56</a>, <a href="https://lwn.net/Articles/993599">6.6.55</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.22</li>
<li>docker 27.2.1</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.60</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4116.1.0"/>
    <published>2024-11-13T12:28:50+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4081.1.0</id>
    <title>4081.1.0</title>
    <updated>2026-03-09T16:26:27.911161+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4054.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46711">CVE-2024-46711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46709">CVE-2024-46709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46680">CVE-2024-46680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46678">CVE-2024-46678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46695">CVE-2024-46695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46694">CVE-2024-46694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46693">CVE-2024-46693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46692">CVE-2024-46692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46687">CVE-2024-46687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46686">CVE-2024-46686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46811">CVE-2024-46811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46809">CVE-2024-46809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46806">CVE-2024-46806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46821">CVE-2024-46821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46812">CVE-2024-46812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46802">CVE-2024-46802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46803">CVE-2024-46803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46728">CVE-2024-46728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46726">CVE-2024-46726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46721">CVE-2024-46721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46720">CVE-2024-46720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46717">CVE-2024-46717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46715">CVE-2024-46715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46831">CVE-2024-46831</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46840">CVE-2024-46840</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46839">CVE-2024-46839</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46838">CVE-2024-46838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46836">CVE-2024-46836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46848">CVE-2024-46848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46847">CVE-2024-46847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46846">CVE-2024-46846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46845">CVE-2024-46845</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46844">CVE-2024-46844</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46843">CVE-2024-46843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46832">CVE-2024-46832</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46830">CVE-2024-46830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46829">CVE-2024-46829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46827">CVE-2024-46827</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46825">CVE-2024-46825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46788">CVE-2024-46788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46797">CVE-2024-46797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46796">CVE-2024-46796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46795">CVE-2024-46795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46794">CVE-2024-46794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46760">CVE-2024-46760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46768">CVE-2024-46768</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46767">CVE-2024-46767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46765">CVE-2024-46765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46763">CVE-2024-46763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46785">CVE-2024-46785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46782">CVE-2024-46782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46762">CVE-2024-46762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46777">CVE-2024-46777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46776">CVE-2024-46776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46773">CVE-2024-46773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46770">CVE-2024-46770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46742">CVE-2024-46742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46741">CVE-2024-46741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46740">CVE-2024-46740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46757">CVE-2024-46757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46736">CVE-2024-46736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46749">CVE-2024-46749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46734">CVE-2024-46734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46735">CVE-2024-46735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46713">CVE-2024-46713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46858">CVE-2024-46858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46857">CVE-2024-46857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46855">CVE-2024-46855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46852">CVE-2024-46852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46865">CVE-2024-46865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46861">CVE-2024-46861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46860">CVE-2024-46860</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46859">CVE-2024-46859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490</a>)</li>
<li>linux-firmware (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315</a>)</li>
<li>SDK: re2c (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23901">CVE-2022-23901</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: (<a href="https://github.com/flatcar/scripts/pull/2016">flatcar/scripts#2016</a>)</li>
<li>Fixed the initrd option in the QEMU launcher script. It was -R, but this was already taken by the read-only pflash option, so use -r instead. (<a href="https://github.com/flatcar/scripts/pull/2239">scripts#2239</a>)</li>
<li>Equinix Metal: fixed race condition on 'mount' Ignition stage (<a href="https://github.com/flatcar/scripts/pull/2308">scripts#2308</a>)</li>
<li>Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. (<a href="https://github.com/flatcar/flatcar/pull/1514">Flatcar#1514</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Azure, HyperV: Added daemons <code>kvp</code>, <code>vss</code>, and <code>fcopy</code> for better HyperV hypervisor integration with Flatcar guests (<a href="https://github.com/flatcar/scripts/pull/2309">scripts#2309</a>).</li>
<li>Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers (<a href="https://github.com/flatcar/scripts/pull/2355">flatcar/scripts#2355</a>)</li>
<li>Replace nmap netcat with openbsd variant. The license didn't get an exception from CNCF. Something about the definition of &quot;derivative works&quot; being too broad.</li>
<li>The <code>docker build</code> command will now use buildx as its backend as the old one became deprecated and a loud &quot;DEPRECATED&quot; information is printed every time it's used.</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.21.13">1.21.13</a>)</li>
<li>Linux (<a href="https://lwn.net/Articles/992980">6.6.54</a> (includes <a href="https://lwn.net/Articles/992296">6.6.53</a>, <a href="https://lwn.net/Articles/990767/">6.6.52</a>, <a href="https://lwn.net/Articles/990045">6.6.51</a>, <a href="https://lwn.net/Articles/989411/">6.6.50</a>, <a href="https://lwn.net/Articles/988749">6.6.49</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240811">20240811</a>)</li>
<li>Open-iSCSI (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.10">2.1.10</a>)</li>
<li>azure: azure-nvme-utils (<a href="https://github.com/Azure/azure-nvme-utils/releases/tag/v0.2.0">0.2.0</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html">3.105</a>)</li>
<li>conntrack-tools (<a href="https://lwn.net/Articles/945927/">1.4.8</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.21">1.7.21</a>)</li>
<li>curl (<a href="https://curl.se/ch/8.9.1.html">8.9.1</a>)</li>
<li>dev: minicom (<a href="https://salsa.debian.org/minicom-team/minicom/-/releases/2.9">2.9</a>)</li>
<li>elfutils (<a href="https://inbox.sourceware.org/elfutils-devel/CAJDtP-SJhJ8cjTpkNpi+F0nzVJ2pZsEai8Ewpp4yJmsO_H5-NA@mail.gmail.com/T/#u">0.191</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes">2.6.3</a>)</li>
<li>gce, sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v71.1.0/NEWS.rst">71.1.0</a> (includes <a href="https://github.com/pypa/setuptools/blob/v71.0.0/NEWS.rst">71.0.0</a>))</li>
<li>gce, sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v72.1.0/NEWS.rst">72.1.0</a>)</li>
<li>gflags (<a href="https://github.com/gflags/gflags/releases/tag/v2.2.2">2.2.2</a>)</li>
<li>glog (<a href="https://github.com/google/glog/releases/tag/v0.6.0">0.6.0</a>)</li>
<li>libmicrohttpd (<a href="https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00005.html">1.0.1</a> (inlcudes <a href="https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00000.html">1.0.0</a>))</li>
<li>lz4 (<a href="https://github.com/lz4/lz4/releases/tag/v1.10.0">1.10.0</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.62.1">1.62.1</a>)</li>
<li>npth (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=c1b631b4294eabfef29baefd60e1b0dfecce710d;hb=75c68399ef3bbb5d024f2a60474a7214fa479016">1.7</a>)</li>
<li>pahole (<a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.27">1.27</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.80.1">1.80.1</a>)</li>
<li>SDK: meson (<a href="https://mesonbuild.com/Release-notes-for-1-5-0.html">1.5.1</a>)</li>
<li>sysext-python: more-itertools (<a href="https://github.com/more-itertools/more-itertools/releases/tag/v10.4.0">10.4.0</a>)</li>
<li>sysext-python: pip (<a href="https://github.com/pypa/pip/blob/24.1.2/NEWS.rst">24.1.2</a>)</li>
<li>sysext-python: pip (<a href="https://github.com/pypa/pip/blob/24.2/NEWS.rst">24.2</a>)</li>
<li>sysext-python: wheel (<a href="https://github.com/pypa/wheel/releases/tag/0.44.0">0.44.0</a>)</li>
<li>sysext-zfs: zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.5">2.2.5</a> (includes <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.4">2.2.4</a>))</li>
<li>tcpdump (<a href="https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.4/CHANGES">4.99.4</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 4081.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46711">CVE-2024-46711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46709">CVE-2024-46709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46680">CVE-2024-46680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46678">CVE-2024-46678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46695">CVE-2024-46695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46694">CVE-2024-46694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46693">CVE-2024-46693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46692">CVE-2024-46692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46687">CVE-2024-46687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46686">CVE-2024-46686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46811">CVE-2024-46811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46809">CVE-2024-46809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46806">CVE-2024-46806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46821">CVE-2024-46821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46812">CVE-2024-46812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46802">CVE-2024-46802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46803">CVE-2024-46803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46728">CVE-2024-46728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46726">CVE-2024-46726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46721">CVE-2024-46721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46720">CVE-2024-46720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46717">CVE-2024-46717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46715">CVE-2024-46715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46831">CVE-2024-46831</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46840">CVE-2024-46840</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46839">CVE-2024-46839</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46838">CVE-2024-46838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46836">CVE-2024-46836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46848">CVE-2024-46848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46847">CVE-2024-46847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46846">CVE-2024-46846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46845">CVE-2024-46845</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46844">CVE-2024-46844</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46843">CVE-2024-46843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46832">CVE-2024-46832</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46830">CVE-2024-46830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46829">CVE-2024-46829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46827">CVE-2024-46827</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46825">CVE-2024-46825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46788">CVE-2024-46788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46797">CVE-2024-46797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46796">CVE-2024-46796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46795">CVE-2024-46795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46794">CVE-2024-46794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46760">CVE-2024-46760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46768">CVE-2024-46768</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46767">CVE-2024-46767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46765">CVE-2024-46765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46763">CVE-2024-46763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46785">CVE-2024-46785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46782">CVE-2024-46782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46762">CVE-2024-46762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46777">CVE-2024-46777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46776">CVE-2024-46776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46773">CVE-2024-46773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46770">CVE-2024-46770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46742">CVE-2024-46742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46741">CVE-2024-46741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46740">CVE-2024-46740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46757">CVE-2024-46757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46736">CVE-2024-46736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46749">CVE-2024-46749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46734">CVE-2024-46734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46735">CVE-2024-46735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46713">CVE-2024-46713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46858">CVE-2024-46858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46857">CVE-2024-46857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46855">CVE-2024-46855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46852">CVE-2024-46852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46865">CVE-2024-46865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46861">CVE-2024-46861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46860">CVE-2024-46860</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46859">CVE-2024-46859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: (<a href="https://github.com/flatcar/scripts/pull/2016">flatcar/scripts#2016</a>)</li>
<li>Equinix Metal: fixed race condition on 'mount' Ignition stage (<a href="https://github.com/flatcar/scripts/pull/2308">scripts#2308</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Azure, HyperV: Added daemons <code>kvp</code>, <code>vss</code>, and <code>fcopy</code> for better HyperV hypervisor integration with Flatcar guests (<a href="https://github.com/flatcar/scripts/pull/2309">scripts#2309</a>).</li>
<li>Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers (<a href="https://github.com/flatcar/scripts/pull/2355">flatcar/scripts#2355</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/992980">6.6.54</a> (includes <a href="https://lwn.net/Articles/992296">6.6.53</a>, <a href="https://lwn.net/Articles/990767/">6.6.52</a>, <a href="https://lwn.net/Articles/990045">6.6.51</a>, <a href="https://lwn.net/Articles/989411/">6.6.50</a>, <a href="https://lwn.net/Articles/988749">6.6.49</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html">3.105</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes">2.6.3</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.54</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.1.0"/>
    <published>2024-10-10T12:24:32+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4054.1.0</id>
    <title>4054.1.0</title>
    <updated>2026-03-09T16:26:27.867421+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 4012.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43877">CVE-2024-43877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43876">CVE-2024-43876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43875">CVE-2024-43875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43881">CVE-2024-43881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43869">CVE-2024-43869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43870">CVE-2024-43870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43856">CVE-2024-43856</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43860">CVE-2024-43860</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43859">CVE-2024-43859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43858">CVE-2024-43858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43833">CVE-2024-43833</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43832">CVE-2024-43832</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43831">CVE-2024-43831</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43829">CVE-2024-43829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43855">CVE-2024-43855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43851">CVE-2024-43851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43850">CVE-2024-43850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43849">CVE-2024-43849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43847">CVE-2024-43847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43845">CVE-2024-43845</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43841">CVE-2024-43841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43839">CVE-2024-43839</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43837">CVE-2024-43837</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43825">CVE-2024-43825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43818">CVE-2024-43818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43817">CVE-2024-43817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42321">CVE-2024-42321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42288">CVE-2024-42288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42297">CVE-2024-42297</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42296">CVE-2024-42296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42295">CVE-2024-42295</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42294">CVE-2024-42294</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42320">CVE-2024-42320</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42318">CVE-2024-42318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42316">CVE-2024-42316</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42314">CVE-2024-42314</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42313">CVE-2024-42313</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42311">CVE-2024-42311</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42310">CVE-2024-42310</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42309">CVE-2024-42309</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42308">CVE-2024-42308</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42290">CVE-2024-42290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42307">CVE-2024-42307</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42306">CVE-2024-42306</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42303">CVE-2024-42303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42299">CVE-2024-42299</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42298">CVE-2024-42298</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42289">CVE-2024-42289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42281">CVE-2024-42281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42280">CVE-2024-42280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42279">CVE-2024-42279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42278">CVE-2024-42278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42277">CVE-2024-42277</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42287">CVE-2024-42287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42286">CVE-2024-42286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42285">CVE-2024-42285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52889">CVE-2023-52889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42276">CVE-2024-42276</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43866">CVE-2024-43866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43864">CVE-2024-43864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42274">CVE-2024-42274</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42273">CVE-2024-42273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42272">CVE-2024-42272</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42270">CVE-2024-42270</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42269">CVE-2024-42269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42268">CVE-2024-42268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42267">CVE-2024-42267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43912">CVE-2024-43912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44934">CVE-2024-44934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43905">CVE-2024-43905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43903">CVE-2024-43903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43900">CVE-2024-43900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43906">CVE-2024-43906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43897">CVE-2024-43897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43895">CVE-2024-43895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42259">CVE-2024-42259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44943">CVE-2024-44943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44942">CVE-2024-44942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44941">CVE-2024-44941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44940">CVE-2024-44940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44939">CVE-2024-44939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6197">CVE-2024-6197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6874">CVE-2024-6874</a>)</li>
<li>docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29018">CVE-2024-29018</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465</a>)</li>
<li>glib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397</a>)</li>
<li>go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26256">CVE-2024-26256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37407">CVE-2024-37407</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">CVE-2024-34459</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371</a>)</li>
<li>sysext-podman: podman (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727</a>)</li>
<li>tpm2-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040">CVE-2024-29040</a>)</li>
<li>wget (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38428">CVE-2024-38428</a>)</li>
<li>SDK: nasm (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6290">CVE-2019-6290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6291">CVE-2019-6291</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-8343">CVE-2019-8343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-21528">CVE-2020-21528</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33450">CVE-2021-33450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33452">CVE-2021-33452</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44368">CVE-2022-44368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44369">CVE-2022-44369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44370">CVE-2022-44370</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fix ownership of systemd units shipped with built-in docker/containerd sysexts. The files shipped on production images were accidentally owned by 1000:1000 instead of 0:0. This uid/gid is not present on Flatcar images but would be assigned to the first created user. Due to contents of sysexts and /usr being readonly on Flatcar, the invalid permissions can't be used to escalate privileges. (<a href="https://github.com/flatcar/scripts/pull/2266">scripts#2266</a>)</li>
<li>Fixed bad usage of gpg that prevented flatcar-install from being used with custom signing keys (<a href="https://github.com/flatcar/flatcar/pull/1471">Flatcar#1471</a>)</li>
<li>Equinix Metal: Fixed oem-cloudinit.service. The availability check now uses the https://metadata.platformequinix.com/metadata endpoint. (<a href="https://github.com/flatcar/scripts/pull/2222">scripts#2222</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>As part of the update to Catalyst 4 (used to build the SDK), the coreos package repository has been renamed to coreos-overlay to match its directory name. This will be reflected in package listings and package manager output. (<a href="https://github.com/flatcar/scripts/pull/2115">flatcar/scripts#2115</a>)</li>
<li>The kernel security module Landlock is now enabled for programs to sandbox themselves (<a href="https://github.com/flatcar/scripts/pull/2158">flatcar/scripts#2158</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/987679">6.6.48</a> (includes <a href="https://lwn.net/Articles/986231/">6.6.47</a>, <a href="https://lwn.net/Articles/985672">6.6.46</a>, <a href="https://lwn.net/Articles/985200">6.6.45</a>, <a href="https://lwn.net/Articles/984450">6.6.44</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240709">20240709</a>)</li>
<li>audit (<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.2">3.1.2</a>)</li>
<li>binutils (<a href="https://sourceware.org/pipermail/binutils/2024-January/132213.html">2.42</a>)</li>
<li>bpftool (<a href="https://kernelnewbies.org/Linux_6.9#Tracing.2C_perf_and_BPF">6.9.2</a> (includes <a href="https://kernelnewbies.org/Linux_6.8#Tracing.2C_perf_and_BPF">6.8.2</a>))</li>
<li>btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/blob/v6.9.2/CHANGES">6.9.2</a>)</li>
<li>c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_29_0">1.29.0</a> (includes <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_28_1">1.28.1</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_28_0">1.28.0</a>))</li>
<li>cJSON (<a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.18">1.7.18</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_104.html">3.104</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.20">1.7.20</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.19">1.7.19</a>))</li>
<li>cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.2/docs/v2.7.2-ReleaseNotes">2.7.2</a> (includes <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.1/docs/v2.7.1-ReleaseNotes">2.7.1</a> and <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.0/docs/v2.7.0-ReleaseNotes">2.7.0</a>))</li>
<li>curl (<a href="https://curl.se/ch/8.9.0.html">8.9.0</a> (includes <a href="https://curl.se/changes.html#8_8_0">8.8.0</a>))</li>
<li>docker (<a href="https://docs.docker.com/engine/release-notes/26.1/#2610">26.1.0</a>, includes changes from <a href="https://docs.docker.com/engine/release-notes/25.0/">25.0</a>)</li>
<li>e2fsprogs (<a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.1">1.47.1</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.9">6.9</a>)</li>
<li>findutils (<a href="https://git.savannah.gnu.org/cgit/findutils.git/tree/NEWS?h=v4.10.0">4.10.0</a>)</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-13/changes.html">13.3.1_p20240614</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.44.2/Documentation/RelNotes/2.44.2.txt">2.44.2</a> (includes <a href="https://github.com/git/git/blob/v2.44.1/Documentation/RelNotes/2.44.1.txt">2.44.1</a>, <a href="https://github.com/git/git/blob/v2.44.0/Documentation/RelNotes/2.44.0.txt">2.44.0</a>))</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.6">2.78.6</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.5">2.78.5</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.4">2.78.4</a>))</li>
<li>gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000482.html">2.4.5</a>)</li>
<li>hwdata (<a href="https://github.com/vcrhonek/hwdata/compare/v0.382...v0.383">0.383</a> (includes <a href="https://github.com/vcrhonek/hwdata/commits/v0.382">0.382</a>))</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514">20240514_p20240514</a>)</li>
<li>iproute2 (<a href="https://lwn.net/Articles/965125/">6.8.0</a> (includes <a href="https://lwn.net/Articles/957171/">6.7.0</a>))</li>
<li>ipset (<a href="https://ipset.netfilter.org/changelog.html">7.22</a>)</li>
<li>kexec-tools (<a href="https://github.com/horms/kexec-tools/commits/v2.0.28/">2.0.28</a>)</li>
<li>kmod (<a href="https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/tree/NEWS?h=v32">32</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.4">3.7.4</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.3">3.7.3</a>))</li>
<li>libassuan (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=047f12b7c3ee0c8c1718a2da8b5a6bb9dd541fd8;hb=cc2f776904e0b5e56e2b81b2672ca98d7787ed1b">2.5.7</a>)</li>
<li>libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.hde102t8xd0v">2.70</a>)</li>
<li>libcap-ng (<a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.5">0.8.5</a>)</li>
<li>libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.18.0">1.18.0</a>)</li>
<li>libgpg-error (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=8ac4bf36113fe9254a361e2bc8d0ed52383839ce;hb=faed9c271ad22bbd2ed265d8e11badb53b7a2f32">1.49</a>)</li>
<li>libksba (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=3d2d5a47688bb6214efaf02f5ab29f6e64433a97;hb=b14e68b97df754b2bb7a90bb904d143d8e896afb">1.6.7</a>)</li>
<li>libnl (<a href="http://lists.infradead.org/pipermail/libnl/2023-December/002436.html">3.9.0</a>)</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.9">1.9</a>)</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.43/NEWS">10.43</a>)</li>
<li>libunwind (<a href="https://github.com/libunwind/libunwind/releases/tag/v1.8.1">1.8.1</a> (includes <a href="https://github.com/libunwind/libunwind/releases/tag/v1.8.0">1.8.0</a>))</li>
<li>libusb (<a href="https://github.com/libusb/libusb/blob/v1.0.27/ChangeLog">1.0.27</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7">2.12.7</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.6">2.12.6</a>))</li>
<li>linux-pam (<a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.5.3">1.5.3</a>)</li>
<li>lshw (<a href="https://www.ezix.org/project/wiki/HardwareLiSter#Changes">02.20.2b</a>)</li>
<li>mit-krb5 (<a href="https://web.mit.edu/kerberos/krb5-1.21/README-1.21.3.txt">1.21.3</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/blob/0.9.8/NEWS.md">0.9.8</a>)</li>
<li>nmap (<a href="https://nmap.org/changelog.html#7.95">7.95</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9.1">2.9.1</a> (includes <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9">2.9</a>))</li>
<li>pciutils (<a href="https://github.com/pciutils/pciutils/blob/v3.13.0/ChangeLog">3.13.0</a> (includes <a href="https://github.com/pciutils/pciutils/blob/v3.12.0/ChangeLog">3.12.0</a>))</li>
<li>qemu-guest-agent (<a href="https://wiki.qemu.org/ChangeLog/8.2#Guest_agent">8.2.0</a>)</li>
<li>rsync (<a href="https://github.com/RsyncProject/rsync/blob/v3.3.0/NEWS.md">3.3.0</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.13">1.1.13</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_46_0.html">3.46.0</a> (includes <a href="https://www.sqlite.org/releaselog/3_45_3.html">3.45.3</a>))</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.9">6.9</a>)</li>
<li>sysext-podman: aardvark-dns (<a href="https://github.com/containers/aardvark-dns/releases/tag/v1.11.0">1.11.0</a>)</li>
<li>sysext-podman: containers-common (<a href="https://github.com/containers/common/releases/tag/v0.59.1">0.59.1</a>)</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.0.3">5.0.3</a>)</li>
<li>sysext-python: jaraco-text (<a href="https://github.com/jaraco/jaraco.text/compare/v3.12.0...v3.12.1">3.12.1</a>)</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v70.3.0/NEWS.rst">70.3.0</a> (includes <a href="https://setuptools.pypa.io/en/stable/history.html#v70-1-1">70.1.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v70-1-0">70.1.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v70-0-0">70.0.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-5-1">69.5.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-5-0">69.5.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-2">69.4.2</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-1">69.4.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-0">69.4.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-3-1">69.3.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-3-0">69.3.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-2-0">69.2.0</a>))</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/compare/2024.5.22...2024.7.2">2024.7.2</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/commits/v255.8/">255.8</a>)</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/791e2817e13182344447590313f7e372a27c1d48">2.4.1</a>)</li>
<li>tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/b649c7d3c2b1e13e900c80ff7a20959a70b1c528">1.4.9</a>)</li>
<li>tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/6a80d170bca0c938f78ab12e37481b52792a9d83">0.15.0</a>)</li>
<li>tpm2-tools (<a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7">5.7</a> (includes <a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6.1">5.6.1</a>, <a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6">5.6</a>))</li>
<li>tpm2-tss (<a href="https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.3">4.1.3</a> (includes changes from <a href="https://github.com/tpm2-software/tpm2-tss/releases/tag/4.0.2">4.0.2</a>)</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/blob/v2.39.4/Documentation/releases/v2.39.4-ReleaseNotes">2.39.4</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/commits/v9.1.0366/">9.1.0366</a> (includes changes from <a href="https://www.vim.org/vim-9.1-released.php">9.1</a>))</li>
<li>wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00002.html">1.24.5</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.21/debian/changelog">5.5.21</a>)</li>
<li>xfsprogs (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.8.0">6.8.0</a> (includes changes from <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.6.0">6.6.0</a>))</li>
<li>xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.6.2">5.6.2</a>)</li>
<li>zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.3">2.2.3</a>)</li>
<li>zlib (<a href="https://github.com/madler/zlib/releases/tag/v1.3.1">1.3.1</a>)</li>
<li>zstd (<a href="https://github.com/facebook/zstd/releases/tag/v1.5.6">1.5.6</a>)</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.5">12.4.5</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.80.0">1.80.0</a>)</li>
<li>SDK: go (<a href="https://go.dev/doc/devel/release#go1.21.12">1.21.12</a> includes changes from <a href="https://go.dev/doc/go1.21">1.21</a>)</li>
<li>SDK: nasm (<a href="https://github.com/netwide-assembler/nasm/releases/tag/nasm-2.16.01">2.16.01</a>)</li>
<li>SDK: portage (<a href="https://github.com/gentoo/portage/blob/f03998622e0960388e903de0d6d24bdf6881e567/NEWS#L9">3.0.65</a> (includes changes from <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.63">3.0.63</a>))</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/8.2">8.2.3</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 4054.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43877">CVE-2024-43877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43876">CVE-2024-43876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43875">CVE-2024-43875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43881">CVE-2024-43881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43869">CVE-2024-43869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43870">CVE-2024-43870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43856">CVE-2024-43856</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43860">CVE-2024-43860</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43859">CVE-2024-43859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43858">CVE-2024-43858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43833">CVE-2024-43833</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43832">CVE-2024-43832</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43831">CVE-2024-43831</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43829">CVE-2024-43829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43855">CVE-2024-43855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43851">CVE-2024-43851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43850">CVE-2024-43850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43849">CVE-2024-43849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43847">CVE-2024-43847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43845">CVE-2024-43845</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43841">CVE-2024-43841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43839">CVE-2024-43839</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43837">CVE-2024-43837</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43825">CVE-2024-43825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43818">CVE-2024-43818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43817">CVE-2024-43817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42321">CVE-2024-42321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42288">CVE-2024-42288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42297">CVE-2024-42297</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42296">CVE-2024-42296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42295">CVE-2024-42295</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42294">CVE-2024-42294</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42320">CVE-2024-42320</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42318">CVE-2024-42318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42316">CVE-2024-42316</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42314">CVE-2024-42314</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42313">CVE-2024-42313</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42311">CVE-2024-42311</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42310">CVE-2024-42310</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42309">CVE-2024-42309</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42308">CVE-2024-42308</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42290">CVE-2024-42290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42307">CVE-2024-42307</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42306">CVE-2024-42306</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42303">CVE-2024-42303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42299">CVE-2024-42299</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42298">CVE-2024-42298</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42289">CVE-2024-42289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42281">CVE-2024-42281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42280">CVE-2024-42280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42279">CVE-2024-42279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42278">CVE-2024-42278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42277">CVE-2024-42277</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42287">CVE-2024-42287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42286">CVE-2024-42286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42285">CVE-2024-42285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52889">CVE-2023-52889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42276">CVE-2024-42276</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43866">CVE-2024-43866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43864">CVE-2024-43864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42274">CVE-2024-42274</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42273">CVE-2024-42273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42272">CVE-2024-42272</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42270">CVE-2024-42270</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42269">CVE-2024-42269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42268">CVE-2024-42268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42267">CVE-2024-42267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43912">CVE-2024-43912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44934">CVE-2024-44934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43905">CVE-2024-43905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43903">CVE-2024-43903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43900">CVE-2024-43900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43906">CVE-2024-43906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43897">CVE-2024-43897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43895">CVE-2024-43895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42259">CVE-2024-42259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44943">CVE-2024-44943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44942">CVE-2024-44942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44941">CVE-2024-44941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44940">CVE-2024-44940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44939">CVE-2024-44939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fix ownership of systemd units shipped with built-in docker/containerd sysexts. The files shipped on production images were accidentally owned by 1000:1000 instead of 0:0. This uid/gid is not present on Flatcar images but would be assigned to the first created user. Due to contents of sysexts and /usr being readonly on Flatcar, the invalid permissions can't be used to escalate privileges. (<a href="https://github.com/flatcar/scripts/pull/2266">scripts#2266</a>)</li>
<li>Equinix Metal: Fixed oem-cloudinit.service. The availability check now uses the https://metadata.platformequinix.com/metadata endpoint. (<a href="https://github.com/flatcar/scripts/pull/2222">scripts#2222</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/987679">6.6.48</a> (includes <a href="https://lwn.net/Articles/986231/">6.6.47</a>, <a href="https://lwn.net/Articles/985672">6.6.46</a>, <a href="https://lwn.net/Articles/985200">6.6.45</a>, <a href="https://lwn.net/Articles/984450">6.6.44</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_104.html">3.104</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.20</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.48</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4054.1.0"/>
    <published>2024-09-05T11:38:16+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-4012.1.0</id>
    <title>4012.1.0</title>
    <updated>2026-03-09T16:26:27.804704+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3975.1.1</strong></em></p>
<h5>Security fixes:</h5>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42094">CVE-2024-42094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42084">CVE-2024-42084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42069">CVE-2024-42069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42068">CVE-2024-42068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42067">CVE-2024-42067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42074">CVE-2024-42074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42073">CVE-2024-42073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42063">CVE-2024-42063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41094">CVE-2024-41094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41088">CVE-2024-41088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41098">CVE-2024-41098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41096">CVE-2024-41096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41084">CVE-2024-41084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39486">CVE-2024-39486</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42068">CVE-2024-42068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42067">CVE-2024-42067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42153">CVE-2024-42153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42147">CVE-2024-42147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42160">CVE-2024-42160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42159">CVE-2024-42159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42116">CVE-2024-42116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42144">CVE-2024-42144</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42143">CVE-2024-42143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42142">CVE-2024-42142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42141">CVE-2024-42141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42140">CVE-2024-42140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42113">CVE-2024-42113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42138">CVE-2024-42138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42136">CVE-2024-42136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42135">CVE-2024-42135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42133">CVE-2024-42133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42132">CVE-2024-42132</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42128">CVE-2024-42128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52888">CVE-2023-52888</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42103">CVE-2024-42103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42102">CVE-2024-42102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42100">CVE-2024-42100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42109">CVE-2024-42109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40947">CVE-2024-40947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41053">CVE-2024-41053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41055">CVE-2024-41055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41054">CVE-2024-41054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41032">CVE-2024-41032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41031">CVE-2024-41031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41030">CVE-2024-41030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41028">CVE-2024-41028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41027">CVE-2024-41027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41052">CVE-2024-41052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41051">CVE-2024-41051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41050">CVE-2024-41050</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41047">CVE-2024-41047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41046">CVE-2024-41046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41025">CVE-2024-41025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41037">CVE-2024-41037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41036">CVE-2024-41036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41034">CVE-2024-41034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41024">CVE-2024-41024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41079">CVE-2024-41079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41075">CVE-2024-41075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41074">CVE-2024-41074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41077">CVE-2024-41077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41057">CVE-2024-41057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41058">CVE-2024-41058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41022">CVE-2024-41022</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41020">CVE-2024-41020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41019">CVE-2024-41019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41018">CVE-2024-41018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41017">CVE-2024-41017</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41015">CVE-2024-41015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36977">CVE-2024-36977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36975">CVE-2024-36975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36969">CVE-2024-36969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36968">CVE-2024-36968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36967">CVE-2024-36967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36965">CVE-2024-36965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36966">CVE-2024-36966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36963">CVE-2024-36963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36962">CVE-2024-36962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36960">CVE-2024-36960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36951">CVE-2024-36951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36949">CVE-2024-36949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36946">CVE-2024-36946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36945">CVE-2024-36945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36954">CVE-2024-36954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36953">CVE-2024-36953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36916">CVE-2024-36916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36914">CVE-2024-36914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36913">CVE-2024-36913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36912">CVE-2024-36912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36911">CVE-2024-36911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36939">CVE-2024-36939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36938">CVE-2024-36938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36937">CVE-2024-36937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36910">CVE-2024-36910</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36934">CVE-2024-36934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36933">CVE-2024-36933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36931">CVE-2024-36931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36930">CVE-2024-36930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36928">CVE-2024-36928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36927">CVE-2024-36927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36909">CVE-2024-36909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36925">CVE-2024-36925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36922">CVE-2024-36922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36921">CVE-2024-36921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36920">CVE-2024-36920</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36918">CVE-2024-36918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36917">CVE-2024-36917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36908">CVE-2024-36908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36888">CVE-2024-36888</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36887">CVE-2024-36887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36886">CVE-2024-36886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36885">CVE-2024-36885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36883">CVE-2024-36883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36906">CVE-2024-36906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36905">CVE-2024-36905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36903">CVE-2024-36903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36902">CVE-2024-36902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36901">CVE-2024-36901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36900">CVE-2024-36900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36882">CVE-2024-36882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36898">CVE-2024-36898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36897">CVE-2024-36897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36896">CVE-2024-36896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36895">CVE-2024-36895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36893">CVE-2024-36893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36891">CVE-2024-36891</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36890">CVE-2024-36890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36881">CVE-2024-36881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36032">CVE-2024-36032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52882">CVE-2023-52882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36031">CVE-2024-36031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36028">CVE-2024-36028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36011">CVE-2024-36011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35947">CVE-2024-35947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41006">CVE-2024-41006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41005">CVE-2024-41005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41004">CVE-2024-41004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40996">CVE-2024-40996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41002">CVE-2024-41002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41001">CVE-2024-41001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41000">CVE-2024-41000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40997">CVE-2024-40997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40993">CVE-2024-40993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40992">CVE-2024-40992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40990">CVE-2024-40990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40987">CVE-2024-40987</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40970">CVE-2024-40970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40976">CVE-2024-40976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40974">CVE-2024-40974</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40973">CVE-2024-40973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40982">CVE-2024-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40981">CVE-2024-40981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40980">CVE-2024-40980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40971">CVE-2024-40971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40955">CVE-2024-40955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40953">CVE-2024-40953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40952">CVE-2024-40952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40951">CVE-2024-40951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40969">CVE-2024-40969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40968">CVE-2024-40968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40967">CVE-2024-40967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40966">CVE-2024-40966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40948">CVE-2024-40948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40964">CVE-2024-40964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40963">CVE-2024-40963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40962">CVE-2024-40962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40957">CVE-2024-40957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956</a>-<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40938">CVE-2024-40938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40936">CVE-2024-40936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40935">CVE-2024-40935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40934">CVE-2024-40934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40932">CVE-2024-40932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40945">CVE-2024-40945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40944">CVE-2024-40944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40943">CVE-2024-40943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40942">CVE-2024-40942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40940">CVE-2024-40940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40939">CVE-2024-40939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40922">CVE-2024-40922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40921">CVE-2024-40921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40920">CVE-2024-40920</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40919">CVE-2024-40919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40918">CVE-2024-40918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40916">CVE-2024-40916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40915">CVE-2024-40915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40928">CVE-2024-40928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40925">CVE-2024-40925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40924">CVE-2024-40924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40923">CVE-2024-40923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40913">CVE-2024-40913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40914">CVE-2024-40914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39503">CVE-2024-39503</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39497">CVE-2024-39497</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40909">CVE-2024-40909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40908">CVE-2024-40908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40906">CVE-2024-40906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40903">CVE-2024-40903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39496">CVE-2024-39496</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40900">CVE-2024-40900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39509">CVE-2024-39509</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39508">CVE-2024-39508</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39507">CVE-2024-39507</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39505">CVE-2024-39505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39504">CVE-2024-39504</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39495">CVE-2024-39495</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39469">CVE-2024-39469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39298">CVE-2024-39298</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39371">CVE-2024-39371</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37078">CVE-2024-37078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39493">CVE-2024-39493</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39485">CVE-2024-39485</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39484">CVE-2024-39484</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39483">CVE-2024-39483</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39482">CVE-2024-39482</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39481">CVE-2024-39481</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39480">CVE-2024-39480</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39479">CVE-2024-39479</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39475">CVE-2024-39475</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39473">CVE-2024-39473</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39474">CVE-2024-39474</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39471">CVE-2024-39471</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39470">CVE-2024-39470</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39468">CVE-2024-39468</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39467">CVE-2024-39467</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39466">CVE-2024-39466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39464">CVE-2024-39464</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39461">CVE-2024-39461</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39462">CVE-2024-39462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39296">CVE-2024-39296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39276">CVE-2024-39276</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38661">CVE-2024-38661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38385">CVE-2024-38385</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37354">CVE-2024-37354</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39362">CVE-2024-39362</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39301">CVE-2024-39301</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48772">CVE-2022-48772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39491">CVE-2024-39491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39490">CVE-2024-39490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39489">CVE-2024-39489</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39488">CVE-2024-39488</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37021">CVE-2024-37021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36479">CVE-2024-36479</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35247">CVE-2024-35247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34030">CVE-2024-34030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34027">CVE-2024-34027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33847">CVE-2024-33847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39292">CVE-2024-39292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38667">CVE-2024-38667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39291">CVE-2024-39291</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38384">CVE-2024-38384</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38664">CVE-2024-38664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38663">CVE-2024-38663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36481">CVE-2024-36481</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36477">CVE-2024-36477</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34777">CVE-2024-34777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39277">CVE-2024-39277</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38662">CVE-2024-38662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38780">CVE-2024-38780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38659">CVE-2024-38659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38634">CVE-2024-38634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38637">CVE-2024-38637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38636">CVE-2024-38636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38635">CVE-2024-38635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36484">CVE-2024-36484</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36286">CVE-2024-36286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36281">CVE-2024-36281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33621">CVE-2024-33621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38633">CVE-2024-38633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38632">CVE-2024-38632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38630">CVE-2024-38630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38629">CVE-2024-38629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38628">CVE-2024-38628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38627">CVE-2024-38627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38625">CVE-2024-38625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38624">CVE-2024-38624</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33619">CVE-2024-33619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38623">CVE-2024-38623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38622">CVE-2024-38622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38621">CVE-2024-38621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38391">CVE-2024-38391</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38390">CVE-2024-38390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38388">CVE-2024-38388</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38381">CVE-2024-38381</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37356">CVE-2024-37356</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37353">CVE-2024-37353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-31076">CVE-2024-31076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38620">CVE-2024-38620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38617">CVE-2024-38617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38616">CVE-2024-38616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38614">CVE-2024-38614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38613">CVE-2024-38613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38612">CVE-2024-38612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38611">CVE-2024-38611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38610">CVE-2024-38610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38618">CVE-2024-38618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38607">CVE-2024-38607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38605">CVE-2024-38605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38604">CVE-2024-38604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38603">CVE-2024-38603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38602">CVE-2024-38602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38598">CVE-2024-38598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38597">CVE-2024-38597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38596">CVE-2024-38596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38593">CVE-2024-38593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38591">CVE-2024-38591</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38600">CVE-2024-38600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38589">CVE-2024-38589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38590">CVE-2024-38590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38575">CVE-2024-38575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38584">CVE-2024-38584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38583">CVE-2024-38583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38582">CVE-2024-38582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38581">CVE-2024-38581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38577">CVE-2024-38577</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38588">CVE-2024-38588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38587">CVE-2024-38587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38585">CVE-2024-38585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38576">CVE-2024-38576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38568">CVE-2024-38568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38572">CVE-2024-38572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38571">CVE-2024-38571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38569">CVE-2024-38569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36979">CVE-2024-36979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38546">CVE-2024-38546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38543">CVE-2024-38543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38567">CVE-2024-38567</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38566">CVE-2024-38566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38565">CVE-2024-38565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38562">CVE-2024-38562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38561">CVE-2024-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38557">CVE-2024-38557</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38539">CVE-2024-38539</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38554">CVE-2024-38554</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38553">CVE-2024-38553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38552">CVE-2024-38552</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38551">CVE-2024-38551</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38550">CVE-2024-38550</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38549">CVE-2024-38549</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38547">CVE-2024-38547</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538</a>)</li>
</ul>
<h5>Bug fixes:</h5>
<ul>
<li>Hetzner: Fixed duplicated prefix in the Afterburn metadata (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
</ul>
<h5>Changes:</h5>
<ul>
<li>Hetzner: Added <code>COREOS_HETZNER_PRIVATE_IPV4_0</code> Afterburn attribute for Hetzner private IPs (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
<li>Provided a Python Flatcar extension as optional systemd-sysext image with the release. Write 'python' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning (<a href="https://github.com/flatcar/scripts/pull/1979">scripts#1979</a>)</li>
<li>Added Akamai / Linode images (<a href="https://github.com/flatcar/scripts/pull/1806">scripts#1806</a>)</li>
<li>Removed unused grub executable duplicate files and removed grub modules that are already assembled in the grub executable (<a href="https://github.com/flatcar/scripts/pull/1955">scripts#1955</a>).</li>
<li>libcrypt is now provided by the libxcrypt library instead of glibc. Glibc libcrypt was deprecated long time ago.</li>
</ul>
<h5>Updates:</h5>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/983655">6.6.43</a> (includes <a href="https://lwn.net/Articles/983333">6.6.42</a>, <a href="https://lwn.net/Articles/982381">6.6.41</a>, <a href="https://lwn.net/Articles/982050">6.6.40</a>, <a href="https://lwn.net/Articles/981719">6.6.39</a>, <a href="https://lwn.net/Articles/981255">6.6.38</a>, <a href="https://lwn.net/Articles/980860">6.6.37</a>, <a href="https://lwn.net/Articles/979850/">6.6.36</a>, <a href="https://lwn.net/Articles/979262/">6.6.35</a>, <a href="https://lwn.net/Articles/978593/">6.6.34</a>, <a href="https://lwn.net/Articles/978141/">6.6.33</a>, <a href="https://lwn.net/Articles/975075">6.6.32</a>, <a href="https://lwn.net/Articles/974072">6.6.31</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240610">20240610</a>)</li>
<li>afterburn (<a href="https://coreos.github.io/afterburn/release-notes/#afterburn-560">5.6.0</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_103.html">3.103</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102.html">3.102</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102_1.html">3.102.1</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101_1.html">3.101.1</a>))</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.18">1.7.18</a>)</li>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2190-2024-06-05">2.19.0</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.79.0">1.79.0</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.78.0">1.78.0</a>))</li>
</ul>
<p><em>Changes since <strong>Alpha 4012.0.1</strong></em></p>
<h5>Security fixes</h5>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42094">CVE-2024-42094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42084">CVE-2024-42084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42069">CVE-2024-42069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42068">CVE-2024-42068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42067">CVE-2024-42067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42074">CVE-2024-42074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42073">CVE-2024-42073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42063">CVE-2024-42063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41094">CVE-2024-41094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41088">CVE-2024-41088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41098">CVE-2024-41098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41096">CVE-2024-41096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41084">CVE-2024-41084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39486">CVE-2024-39486</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42068">CVE-2024-42068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42067">CVE-2024-42067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42153">CVE-2024-42153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42147">CVE-2024-42147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42160">CVE-2024-42160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42159">CVE-2024-42159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42116">CVE-2024-42116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42144">CVE-2024-42144</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42143">CVE-2024-42143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42142">CVE-2024-42142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42141">CVE-2024-42141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42140">CVE-2024-42140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42113">CVE-2024-42113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42138">CVE-2024-42138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42136">CVE-2024-42136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42135">CVE-2024-42135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42133">CVE-2024-42133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42132">CVE-2024-42132</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42128">CVE-2024-42128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52888">CVE-2023-52888</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42103">CVE-2024-42103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42102">CVE-2024-42102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42100">CVE-2024-42100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42109">CVE-2024-42109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40947">CVE-2024-40947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41053">CVE-2024-41053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41055">CVE-2024-41055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41054">CVE-2024-41054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41032">CVE-2024-41032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41031">CVE-2024-41031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41030">CVE-2024-41030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41028">CVE-2024-41028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41027">CVE-2024-41027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41052">CVE-2024-41052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41051">CVE-2024-41051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41050">CVE-2024-41050</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41047">CVE-2024-41047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41046">CVE-2024-41046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41025">CVE-2024-41025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41037">CVE-2024-41037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41036">CVE-2024-41036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41034">CVE-2024-41034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41024">CVE-2024-41024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41079">CVE-2024-41079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41075">CVE-2024-41075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41074">CVE-2024-41074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41077">CVE-2024-41077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41057">CVE-2024-41057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41058">CVE-2024-41058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41022">CVE-2024-41022</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41020">CVE-2024-41020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41019">CVE-2024-41019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41018">CVE-2024-41018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41017">CVE-2024-41017</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41015">CVE-2024-41015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091</a>)</li>
</ul>
<h5>Bug fixes:</h5>
<ul>
<li>Hetzner: Fixed duplicated prefix in the Afterburn metadata (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
</ul>
<h5>Changes:</h5>
<ul>
<li>Hetzner: Added <code>COREOS_HETZNER_PRIVATE_IPV4_0</code> Afterburn attribute for Hetzner private IPs (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
</ul>
<h5>Updates:</h5>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/983655">6.6.43</a> (includes <a href="https://lwn.net/Articles/983333">6.6.42</a>, <a href="https://lwn.net/Articles/982381">6.6.41</a>, <a href="https://lwn.net/Articles/982050">6.6.40</a>, <a href="https://lwn.net/Articles/981719">6.6.39</a>, <a href="https://lwn.net/Articles/981255">6.6.38</a>, <a href="https://lwn.net/Articles/980860">6.6.37</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_103.html">3.103</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102.html">3.102</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102_1.html">3.102.1</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101_1.html">3.101.1</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.18</li>
<li>docker 24.0.9</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.43</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4012.1.0"/>
    <published>2024-08-07T10:55:03+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3975.1.1</id>
    <title>3975.1.1</title>
    <updated>2026-03-09T16:26:27.783854+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3975.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387">CVE-2024-6387</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/979850">6.6.36</a>)</li>
<li>openssh (<a href="https://www.openssh.com/txt/release-9.7">9.7_p1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.17</li>
<li>docker 24.0.9</li>
<li>ignition 2.18.0</li>
<li>kernel 6.6.36</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3975.1.1"/>
    <published>2024-07-02T13:35:08+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3975.1.0</id>
    <title>3975.1.0</title>
    <updated>2026-03-09T16:26:27.776140+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3941.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490</a>)</li>
<li>less (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487</a>)</li>
<li>SDK: python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450</a>, <a href="https://github.com/python/cpython/issues/81194">gh-81194</a>, <a href="https://github.com/python/cpython/issues/113659">gh-113659</a>, <a href="https://github.com/python/cpython/issues/102388">gh-102388</a>, <a href="https://github.com/python/cpython/issues/114572">gh-114572</a>, <a href="https://github.com/python/cpython/issues/115243">gh-115243</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed issue file generation from <code>/etc/issue.d</code> (<a href="https://github.com/flatcar/scripts/pull/2018">scripts#2018</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added KubeVirt qcow2 image for amd64/arm64 (<a href="https://github.com/flatcar/scripts/pull/1962">flatcar/scripts#1962</a>)</li>
<li>Added azure-nvme-utils to the image, which is used by udev to create symlinks for NVMe disks on Azure v6 instances under /dev/disk/azure/. (<a href="https://github.com/flatcar/scripts/pull/1950">scripts#1950</a>)</li>
<li>Backported systemd-sysext mutable overlays functionality from yet-unreleased systemd v256. (<a href="https://github.com/flatcar/scripts/pull/1753">flatcar/scripts#1753</a>)</li>
<li>Provided a Podman Flatcar extension as optional systemd-sysext image with the release. Write 'podman' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning (<a href="https://github.com/flatcar/scripts/pull/1964">scripts#1964</a>)</li>
<li>OpenStack: Changed metadata hostname source order. The service first tries with the config drive then fallback on the metadata service. (<a href="https://github.com/flatcar/bootengine/pull/96">bootengine#96</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/979262">6.6.35</a> (includes <a href="https://lwn.net/Articles/978593">6.6.34</a>, <a href="https://lwn.net/Articles/978141">6.6.33</a>, <a href="https://lwn.net/Articles/975075">6.6.32</a> and <a href="https://lwn.net/Articles/974072">6.6.31</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240513">20240513</a>)</li>
<li>Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.77.2">1.77.2</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101.html">3.101</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.17">1.7.17</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.16">1.7.16</a>))</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_2/expat/Changes">2.6.2</a> (includes <a href="https://github.com/libexpat/libexpat/blob/R_2_6_1/expat/Changes">2.6.1</a> and <a href="https://github.com/libexpat/libexpat/blob/R_2_6_0/expat/Changes">2.6.0</a>))</li>
<li>gnutls (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2024-April/004846.html">3.8.5</a> (includes <a href="https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html">3.8.4</a>))</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312">20240312</a>)</li>
<li>libunistring (<a href="https://savannah.gnu.org/news/?id=10599">1.2</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/commits/v255.4/">255.4</a>)</li>
<li>SDK: python (<a href="https://www.get-python.org/downloads/release/python-3119/">3.11.9</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3975.0.0</strong></em></p>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed issue file generation from <code>/etc/issue.d</code> (<a href="https://github.com/flatcar/scripts/pull/2018">scripts#2018</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>OpenStack: Changed metadata hostname source order. The service first tries with the config drive then fallback on the metadata service. (<a href="https://github.com/flatcar/bootengine/pull/96">bootengine#96</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/979262">6.6.35</a> (includes <a href="https://lwn.net/Articles/978593">6.6.34</a>, <a href="https://lwn.net/Articles/978141">6.6.33</a>, <a href="https://lwn.net/Articles/975075">6.6.32</a> and <a href="https://lwn.net/Articles/974072">6.6.31</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101.html">3.101</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.17</li>
<li>docker 24.0.9</li>
<li>ignition 2.18.0</li>
<li>kernel 6.6.35</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3975.1.0"/>
    <published>2024-06-26T13:04:36+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3941.1.0</id>
    <title>3941.1.0</title>
    <updated>2026-03-09T16:26:27.761647+00:00</updated>
    <content type="html"><![CDATA[<h4>Beta 3941.1.0</h4>
<p><em>Changes since <strong>Beta 3913.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24861">CVE-2024-24861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26652">CVE-2024-26652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26809">CVE-2024-26809</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629</a>)</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html">coreutils-2024-03-28</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2004">CVE-2024-2004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2379">CVE-2024-2379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2466">CVE-2024-2466</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602</a>)</li>
<li>nghttp2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<ul>
<li>Added zram-generator package to the image (<a href="https://github.com/flatcar/scripts/pull/1772">scripts#1772</a>)</li>
<li>Add Intel igc driver to support I225/I226 family NICs. (<a href="https://github.com/flatcar/scripts/pull/1786">scripts#1786</a>)</li>
<li>Added Hetzner images (<a href="https://github.com/flatcar/scripts/pull/1880">scripts#1880</a>)</li>
<li>Added Hyper-V VHDX image (<a href="https://github.com/flatcar/scripts/pull/1791">scripts#1791</a>)</li>
<li>Enabled amd-pstate,amd-pstate-epp cpufreq drivers for some AMD CPUs in the kernel. (<a href="https://github.com/flatcar/scripts/pull/1770">scripts#1770</a>)</li>
<li>Enabled ntpd by default on AWS &amp; GCP, enabled chronyd by default on Azure. The native time sync source is used on each cloud. (<a href="https://github.com/flatcar/scripts/pull/1792">scripts#1792</a>)</li>
<li>Enabled the ptp_vmw module in the kernel.</li>
<li>Hyper-V images, both .vhd and .vhdx files are available as <code>zip</code> compressed, switching from <code>bzip2</code> to a built-in available Windows compression - <code>zip</code> (<a href="https://github.com/flatcar/scripts/pull/1878">scripts#1878</a>)</li>
<li>OpenStack, Brightbox: Added the <code>flatcar.autologin</code> kernel cmdline parameter by default as the hypervisor manages access to the console (<a href="https://github.com/flatcar/scripts/pull/1866">scripts#1866</a>)</li>
<li>Removed <code>actool</code> from the image and <code>acbuild</code> from the SDK as these tools are deprecated and not used (<a href="https://github.com/flatcar/scripts/pull/1817">scripts#1817</a>)</li>
<li>Scaleway: images are now provided directly as <code>.qcow2</code> to ease the import on Scaleway (<a href="https://github.com/flatcar/scripts/pull/1953">scripts#1953</a>)</li>
<li>Switched ptp_kvm from kernel builtin to module.</li>
<li>The default VM memory was bumped to 2 GB in the Qemu script and for VMware OVFs</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/972211">6.6.30</a> (includes <a href="https://lwn.net/Articles/971363">6.6.29</a>, <a href="https://lwn.net/Articles/970172">6.6.28</a>, <a href="https://lwn.net/Articles/969734">6.6.27</a>, <a href="https://lwn.net/Articles/969352">6.6.26</a>, <a href="https://lwn.net/Articles/968470">6.6.25</a>, <a href="https://lwn.net/Articles/968253">6.6.24</a>, <a href="https://lwn.net/Articles/966758">6.6.23</a>, <a href="https://lwn.net/Articles/965606">6.6.22</a>))</li>
<li>acl (<a href="https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00012.html">2.3.2</a>)</li>
<li>attr (<a href="https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00011.html">2.5.2</a>)</li>
<li>bpftool (<a href="https://kernelnewbies.org/Linux_6.7#Tracing.2C_probing_and_BPF">6.7.6</a>)</li>
<li>c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_27_0">1.27.0</a> (includes <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_26_0">1.26.0</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_100.html">3.100</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_99.html">3.99</a>))</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.15">1.7.15</a> includes (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.14">1.7.14</a>))</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html">9.5</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#8_7_1">8.7.1</a> (includes <a href="https://curl.se/changes.html#8_7_0">8.7.0</a>))</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.7">6.7</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.43.2/Documentation/RelNotes/2.43.2.txt">2.43.2</a>)</li>
<li>inih (<a href="https://github.com/benhoyt/inih/releases/tag/r58">58</a>)</li>
<li>ipset (<a href="https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.21">7.21</a> (includes <a href="https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.20">7.20</a>))</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20240117">20240117</a> (includes <a href="https://github.com/iputils/iputils/releases/tag/20231222">20231222</a>)</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.8">1.8</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.61.0">1.61.0</a> (includes <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.58.0">1.58.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.59.0">1.59.0</a> and <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.60.0">1.60.0</a>))</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.8">2.8</a>)</li>
<li>open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.0">12.4.0</a>)</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.18.9.html">4.18.9</a>)</li>
<li>selinux-refpolicy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240226">2.20240226</a>)</li>
<li>SDK: libpng (<a href="https://github.com/pnggroup/libpng/blob/v1.6.43/ANNOUNCE">1.6.43</a> (includes <a href="https://github.com/pnggroup/libpng/blob/v1.6.42/ANNOUNCE">1.6.42</a> and <a href="https://github.com/pnggroup/libpng/blob/v1.6.41/ANNOUNCE">1.6.41</a>))</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.77.1">1.77.1</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.77.0">1.77.0</a>))</li>
</ul>
<p><em>Changes since <strong>Alpha 3941.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24861">CVE-2024-24861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26652">CVE-2024-26652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26809">CVE-2024-26809</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<ul>
<li>Added Hetzner images (<a href="https://github.com/flatcar/scripts/pull/1880">scripts#1880</a>)</li>
<li>Scaleway: images are now provided directly as <code>.qcow2</code> to ease the import on Scaleway (<a href="https://github.com/flatcar/scripts/pull/1953">scripts#1953</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/972211">6.6.30</a> (includes <a href="https://lwn.net/Articles/971363">6.6.29</a>, <a href="https://lwn.net/Articles/970172">6.6.28</a>, <a href="https://lwn.net/Articles/969734">6.6.27</a>, <a href="https://lwn.net/Articles/969352">6.6.26</a>, <a href="https://lwn.net/Articles/968470">6.6.25</a>, <a href="https://lwn.net/Articles/968253">6.6.24</a>, <a href="https://lwn.net/Articles/966758">6.6.23</a>, <a href="https://lwn.net/Articles/965606">6.6.22</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_100.html">3.100</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.15</li>
<li>docker 24.0.9</li>
<li>ignition 2.18.0</li>
<li>kernel 6.6.30</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3941.1.0"/>
    <published>2024-05-22T13:39:58+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3913.1.0</id>
    <title>3913.1.0</title>
    <updated>2026-03-09T16:26:27.744159+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3874.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Downgraded xz-utils to 5.4.2 as precaution even though Flatcar is not affected of the SSH backdoor (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094">CVE-2024-3094</a>)</li>
<li>coreutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0684">CVE-2024-0684</a>)</li>
<li>dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868</a>)</li>
<li>gcc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5156">CVE-2023-5156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6246">CVE-2023-6246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6779">CVE-2023-6779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6780">CVE-2023-6780</a>)</li>
<li>gnupg (<a href="https://gnupg.org/blog/20240125-smartcard-backup-key.html">gnupg-2024-01-25</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553</a>)</li>
<li>libuv (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727</a>)</li>
<li>sudo (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48231">CVE-2023-48231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48232">CVE-2023-48232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48233">CVE-2023-48233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48234">CVE-2023-48234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48235">CVE-2023-48235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48236">CVE-2023-48236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48237">CVE-2023-48237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48706">CVE-2023-48706</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Disabled user-configdrive.service on OpenStack when config drive is used, which caused the hostname to be overwritten. The coreos-cloudinit.service unit already runs on OpenStack if the system is not configured via ignition. (<a href="https://github.com/flatcar/Flatcar/issues/1385">Flatcar#1385</a>)</li>
<li>Fixed <code>toolbox</code> to prevent mounted <code>ctr</code> snapshots from being garbage-collected (<a href="https://github.com/flatcar/toolbox/pull/9">toolbox#9</a>)</li>
<li>Removed custom CloudSigma coreos-cloudinit service configuration since it will be called with the cloudsigma oem anyway. The restart of the service can also cause the serial port to be stuck in an nondeterministic state which breaks future runs.</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>A new format <code>qemu_uefi_secure</code> is introduced to test Flatcar for SecureBoot-enabled features. The format will be later merged into <code>qemu_uefi</code>.</li>
<li>Added Ignition Clevis support for encrypted disks unlocked with a TPM2 device or a Tang server (<a href="https://github.com/flatcar/scripts/pull/1560">scripts#1560</a>)</li>
<li>Added Scaleway images (<a href="https://github.com/flatcar/scripts/pull/1683">flatcar/scripts#1683</a>)</li>
<li>Added support for unlocking the rootfs with a TPM set up by systemd-cryptenroll (<a href="https://github.com/flatcar/bootengine/pull/93">bootengine#93</a>)</li>
<li>Disabled real-time priority for multipathd as it prevents the cgroups2 cpu controller from working. (<a href="https://github.com/flatcar/scripts/pull/1771">flatcar/scripts#1771</a>)</li>
<li>Enabled the GRUB TPM2 module to measure the boot code path and files into PCR 8+9 in UEFI (<a href="https://github.com/flatcar/scripts/pull/1861">scripts#1861</a>)</li>
<li>Provided a ZFS-2.2.2 Flatcar extension as optional systemd-sysext image with the release. Write 'zfs' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning. ZFS support is experimental and ZFS is not supported for the root partition. (<a href="https://github.com/flatcar/scripts/pull/1742">flatcar/scripts#1742</a>)</li>
<li>Removed Linux drivers for Mellanox Technologies Switch ASICs family and Spectrum/Spectrum-2/Spectrum-3/Spectrum-4 Ethernet Switch ASICs to reduce the initrd size on AMD64 by ~5MB (<a href="https://github.com/flatcar/scripts/pull/1734">flatcar/scripts#1734</a>). This change is part of the effort to reduce the initrd size (<a href="https://github.com/flatcar/Flatcar/issues/1381">flatcar#1381</a>).</li>
<li>Removed coreos-cloudinit support for automatic keys conversion (e.g <code>reboot-strategy</code> -&gt; <code>reboot_strategy</code>) (<a href="https://github.com/flatcar/scripts/pull/1687">scripts#1687</a>)</li>
<li>SDK: Unified qemu image formats, so that the <code>qemu_uefi</code> build target provides the regular <code>qemu</code> and the <code>qemu_uefi_secure</code> artifacts (<a href="https://github.com/flatcar/scripts/pull/1847">scripts#1847</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.20.14">1.20.14</a>)</li>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2180-2024-03-01">2.18.0</a> (includes <a href="https://coreos.github.io/ignition/release-notes/#ignition-2170-2023-11-20">2.17.0</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2162-2023-07-12">2.16.2</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2161-2023-07-10">2.16.1</a> and <a href="https://coreos.github.io/ignition/release-notes/#ignition-2160-2023-06-29">2.16.0</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240312">20240312</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240220">20240220</a>))</li>
<li>audit (<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.1">3.1.1</a>)</li>
<li>bind-tools (<a href="https://bind9.readthedocs.io/en/v9.16.48/notes.html#notes-for-bind-9-16-48">9.16.48</a>)</li>
<li>c-ares (<a href="https://c-ares.org/changelog.html#1_25_0">1.25.0</a>)</li>
<li>cJSON (<a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.17">1.7.17</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_99.html">3.99</a>)</li>
<li>checkpolicy (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#8_6_0">8.6.0</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.6">6.6</a>)</li>
<li>glibc (<a href="https://sourceware.org/pipermail/libc-alpha/2023-July/150524.html">2.38</a>)</li>
<li>gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000481.html">2.4.4</a> (includes <a href="https://dev.gnupg.org/T6307">2.2.42</a>))</li>
<li>less (<a href="https://www.greenwoodsoftware.com/less/news.643.html">643</a>)</li>
<li>libbsd (<a href="https://lists.freedesktop.org/archives/libbsd/2024-January/000377.html">0.11.8</a>)</li>
<li>libcap-ng (<a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.4">0.8.4</a>)</li>
<li>libgcrypt (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=b767dc1170eb479b9a311cca4074c58e4eedaf0b;hb=aa1610866f8e42bdc272584f0a717f32ee050a22">1.10.3</a>)</li>
<li>libidn2 (<a href="https://gitlab.com/libidn/libidn2/-/blob/v2.3.7/NEWS">2.3.7</a> (includes https://gitlab.com/libidn/libidn2/-/releases/v2.3.4)))</li>
<li>libksba (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=48b42025773e88fbb78d015d1f154fef4c80ef9f;hb=5b220df6f8216a9d5f6139c7b17f075374a27480">1.6.6</a>)</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.7.1">1.7.1</a> (includes <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.7">1.7</a>))</li>
<li>libpsl (<a href="https://github.com/rockdaboot/libpsl/blob/0.21.5/NEWS">0.21.5</a>)</li>
<li>libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.5">2.5.5</a>)</li>
<li>libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>libsemanage (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.48.0">1.48.0</a>)</li>
<li>libverto (<a href="https://github.com/latchset/libverto/releases/tag/0.3.2">0.3.2</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.5">2.12.5</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.12.4/NEWS">2.12.4</a>))</li>
<li>lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.99.3">4.99.3</a> (includes <a href="https://github.com/lsof-org/lsof/releases/tag/4.99.2">4.99.2</a> and <a href="https://github.com/lsof-org/lsof/releases/tag/4.99.1">4.99.1</a>))</li>
<li>mime-types (<a href="https://pagure.io/mailcap/blob/9699055a1b4dfb90f7594ee2e8dda705fa56d3b8/f/NEWS">2.1.54</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/commits/0.9.7">0.9.7</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7.1">2.7.1</a> (includes <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7">2.7</a>))</li>
<li>openssl (<a href="https://github.com/openssl/openssl/blob/openssl-3.2.1/CHANGES.md">3.2.1</a>)</li>
<li>policycoreutils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>semodule-utils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>shim (<a href="https://github.com/rhboot/shim/releases/tag/15.8">15.8</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_45_1.html">3.45.1</a>)</li>
<li>sudo (<a href="https://www.sudo.ws/releases/stable/#1.9.15p5">1.9.15p5</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v255.3">255.3</a> (from 252.11))</li>
<li>thin-provisioning-tools (<a href="https://github.com/jthornber/thin-provisioning-tools/commits/v1.0.10/">1.0.10</a>)</li>
<li>traceroute (<a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.5/">2.1.5</a> (includes <a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute%202.1.4/">2.1.4</a>))</li>
<li>usbutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v017">017</a>)</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/blob/v2.39.3/Documentation/releases/v2.39.3-ReleaseNotes">2.39.3</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/commits/v9.0.2167/">9.0.2167</a>)</li>
<li>xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.3">1.3.3</a>)</li>
<li>SDK: python (<a href="https://www.get-python.org/downloads/release/python-3118/">3.11.8</a>)</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/8.1">8.1.5</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.76.0">1.76.0</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3913.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Downgraded xz-utils to 5.4.2 as precaution even though Flatcar is not affected of the SSH backdoor (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094">CVE-2024-3094</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Disabled user-configdrive.service on OpenStack when config drive is used, which caused the hostname to be overwritten. The coreos-cloudinit.service unit already runs on OpenStack if the system is not configured via ignition. (<a href="https://github.com/flatcar/Flatcar/issues/1385">Flatcar#1385</a>)</li>
<li>Fixed <code>toolbox</code> to prevent mounted <code>ctr</code> snapshots from being garbage-collected (<a href="https://github.com/flatcar/toolbox/pull/9">toolbox#9</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added support for unlocking the rootfs with a TPM set up by systemd-cryptenroll (<a href="https://github.com/flatcar/bootengine/pull/93">bootengine#93</a>)</li>
<li>Disabled real-time priority for multipathd as it prevents the cgroups2 cpu controller from working. (<a href="https://github.com/flatcar/scripts/pull/1771">scripts#1771</a>)</li>
<li>Enabled the GRUB TPM2 module to measure the boot code path and files into PCR 8+9 in UEFI (<a href="https://github.com/flatcar/scripts/pull/1861">scripts#1861</a>)</li>
<li>SDK: Unified qemu image formats, so that the <code>qemu_uefi</code> build target provides the regular <code>qemu</code> and the <code>qemu_uefi_secure</code> artifacts (<a href="https://github.com/flatcar/scripts/pull/1847">scripts#1847</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_99.html">3.99</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.13</li>
<li>docker 24.0.9</li>
<li>ignition 2.18.0</li>
<li>kernel 6.6.21</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3913.1.0"/>
    <published>2024-04-16T11:56:20+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3874.1.0</id>
    <title>3874.1.0</title>
    <updated>2026-03-09T16:26:27.730470+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3850.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26581">CVE-2024-26581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26582">CVE-2024-26582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed that systemd-sysext images can extend directories where Flatcar extensions are also shipping files, e.g., that the sysext-bakery Kubernetes extension works when OEM extensions are present (<a href="https://github.com/flatcar/sysext-bakery/issues/50">sysext-bakery#50</a>)</li>
<li>Fixed kubevirt vm creation by ensuring that /dev/vhost-net exists (<a href="https://github.com/flatcar/Flatcar/issues/1336">Flatcar#1336</a>)</li>
<li>Resolved kmod static nodes creation in bootengine (<a href="https://github.com/flatcar/bootengine/pull/85">bootengine#85</a>)</li>
<li>Restored support for custom OEMs supplied in the PXE boot where <code>/usr/share/oem</code> brings the OEM partition contents (<a href="https://github.com/flatcar/Flatcar/issues/1376">Flatcar#1376</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/964561">6.6.21</a> (includes <a href="https://lwn.net/Articles/964307">6.6.20</a>, <a href="https://lwn.net/Articles/964173">6.6.19</a>, <a href="https://lwn.net/Articles/963357">6.6.18</a>, <a href="https://lwn.net/Articles/962558">6.6.17</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240115">20240115</a>)</li>
<li>afterburn (<a href="https://github.com/coreos/afterburn/releases/tag/v5.5.1">5.5.1</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html">3.98</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.13">1.7.13</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.12">1.7.12</a>))</li>
<li>docker (<a href="https://github.com/moby/moby/releases/tag/v24.0.9">24.0.9</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.43.0/Documentation/RelNotes/2.43.0.txt">2.43.0</a> (includes <a href="https://github.com/git/git/blob/v2.42.0/Documentation/RelNotes/2.42.0.txt">2.42.0</a>))</li>
<li>iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.16">3.16</a>)</li>
<li>keyutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=cb3bb194cca88211cbfcdde2f10c0f43c3fb8ec3">1.6.3</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=454f80f537e5d1aad506599b6776e4cc1cf5f0f2">1.6.2</a>))</li>
<li>libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.47.0">1.47.0</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.12">1.1.12</a>)</li>
<li>SDK: make (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-02/msg00011.html">4.4.1</a> (includes <a href="https://lists.gnu.org/archive/html/help-make/2022-10/msg00020.html">4.4</a>))</li>
<li>SDK: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.61">3.0.61</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3874.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26581">CVE-2024-26581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26582">CVE-2024-26582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed that systemd-sysext images can extend directories where Flatcar extensions are also shipping files, e.g., that the sysext-bakery Kubernetes extension works when OEM extensions are present (<a href="https://github.com/flatcar/sysext-bakery/issues/50">sysext-bakery#50</a>)</li>
<li>Fixed kubevirt vm creation by ensuring that /dev/vhost-net exists (<a href="https://github.com/flatcar/Flatcar/issues/1336">Flatcar#1336</a>)</li>
<li>Resolved kmod static nodes creation in bootengine (<a href="https://github.com/flatcar/bootengine/pull/85">bootengine#85</a>)</li>
<li>Restored support for custom OEMs supplied in the PXE boot where <code>/usr/share/oem</code> brings the OEM partition contents (<a href="https://github.com/flatcar/Flatcar/issues/1376">Flatcar#1376</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/964561">6.6.21</a> (includes <a href="https://lwn.net/Articles/964307">6.6.20</a>, <a href="https://lwn.net/Articles/964173">6.6.19</a>, <a href="https://lwn.net/Articles/963357">6.6.18</a>, <a href="https://lwn.net/Articles/962558">6.6.17</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html">3.98</a>)</li>
<li>keyutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=cb3bb194cca88211cbfcdde2f10c0f43c3fb8ec3">1.6.3</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=454f80f537e5d1aad506599b6776e4cc1cf5f0f2">1.6.2</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.13</li>
<li>docker 24.0.9</li>
<li>ignition 2.15.0</li>
<li>kernel 6.6.21</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3874.1.0"/>
    <published>2024-03-20T09:23:40+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3850.1.0</id>
    <title>3850.1.0</title>
    <updated>2026-03-09T16:26:27.696823+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3815.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27672">CVE-2022-27672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36402">CVE-2022-36402</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36402">CVE-2022-36402</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48425">CVE-2022-48425</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1032">CVE-2023-1032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1194">CVE-2023-1194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1281">CVE-2023-1281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1583">CVE-2023-1583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21255">CVE-2023-21255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21264">CVE-2023-21264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2194">CVE-2023-2194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2248">CVE-2023-2248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2248">CVE-2023-2248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2483">CVE-2023-2483</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2598">CVE-2023-2598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28866">CVE-2023-28866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2898">CVE-2023-2898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3117">CVE-2023-3117</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3220">CVE-2023-3220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32247">CVE-2023-32247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32247">CVE-2023-32247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32248">CVE-2023-32248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32248">CVE-2023-32248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32250">CVE-2023-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32250">CVE-2023-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32252">CVE-2023-32252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32252">CVE-2023-32252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32254">CVE-2023-32254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32254">CVE-2023-32254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32257">CVE-2023-32257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32257">CVE-2023-32257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32258">CVE-2023-32258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32258">CVE-2023-32258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3312">CVE-2023-3312</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3312">CVE-2023-3312</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3317">CVE-2023-3317</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33203">CVE-2023-33203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33250">CVE-2023-33250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33250">CVE-2023-33250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3355">CVE-2023-3355</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34255">CVE-2023-34255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34256">CVE-2023-34256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34256">CVE-2023-34256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35824">CVE-2023-35824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35824">CVE-2023-35824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35826">CVE-2023-35826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35826">CVE-2023-35826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3773">CVE-2023-3773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38426">CVE-2023-38426</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38427">CVE-2023-38427</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38428">CVE-2023-38428</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38429">CVE-2023-38429</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38430">CVE-2023-38430</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38431">CVE-2023-38431</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38432">CVE-2023-38432</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38432">CVE-2023-38432</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3865">CVE-2023-3865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3865">CVE-2023-3865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3866">CVE-2023-3866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3866">CVE-2023-3866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3867">CVE-2023-3867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39191">CVE-2023-39191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4015">CVE-2023-4015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40791">CVE-2023-40791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4132">CVE-2023-4132</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42756">CVE-2023-42756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44466">CVE-2023-44466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45862">CVE-2023-45862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45898">CVE-2023-45898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4610">CVE-2023-4610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4611">CVE-2023-4611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46343">CVE-2023-46343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50431">CVE-2023-50431</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50431">CVE-2023-50431</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5090">CVE-2023-5090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51781">CVE-2023-51781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5972">CVE-2023-5972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6111">CVE-2023-6111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6200">CVE-2023-6200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6560">CVE-2023-6560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-7192">CVE-2023-7192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0193">CVE-2024-0193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0443">CVE-2024-0443</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0582">CVE-2024-0582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0584">CVE-2024-0584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0646">CVE-2024-0646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1312">CVE-2024-1312</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22705">CVE-2024-22705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1972">CVE-2023-1972</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46219">CVE-2023-46219</a>)</li>
<li>docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322</a>)</li>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51384">CVE-2023-51384</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626</a>)</li>
<li>traceroute (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5344">CVE-2023-5344</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5441">CVE-2023-5441</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5535">CVE-2023-5535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46246">CVE-2023-46246</a>)</li>
<li>SDK: perl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47038">CVE-2023-47038</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added a workaround for old airgapped/proxied update-engine clients to be able to update to this release (<a href="https://github.com/flatcar/Flatcar/issues/1332">Flatcar#1332</a>, <a href="https://github.com/flatcar/update_engine/pull/38">update_engine#38</a>)</li>
<li>Fixed the handling of OEM update payloads in a Nebraska response with self-hosted packages (<a href="https://github.com/flatcar/ue-rs/pull/49">ue-rs#49</a>)</li>
<li>Forwarded the proxy environment variables of <code>update-engine.service</code> to the postinstall script to support fetching OEM systemd-sysext payloads through a proxy (<a href="https://github.com/flatcar/Flatcar/issues/1326">Flatcar#1326</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added a <code>flatcar-update --oem-payloads &lt;yes|no&gt;</code> flag to skip providing OEM payloads, e.g., for downgrades (<a href="https://github.com/flatcar/init/pull/114">init#114</a>)</li>
<li>Update generation SLSA provenance info from v0.2 to v1.0.</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/961011">6.6.16</a> (includes <a href="https://lwn.net/Articles/960441">6.6.15</a>, <a href="https://lwn.net/Articles/959512">6.6.14</a>, <a href="https://lwn.net/Articles/958862">6.6.13</a>, <a href="https://lwn.net/Articles/958342">6.6.12</a>, <a href="https://lwn.net/Articles/957375">6.6.11</a>, <a href="https://lwn.net/Articles/957008">6.6.10</a>, <a href="https://lwn.net/Articles/956525">6.6.9</a>, <a href="https://lwn.net/Articles/955813">6.6.8</a>, <a href="https://lwn.net/Articles/954990/">6.6.7</a>, <a href="https://kernelnewbies.org/Linux_6.6">6.6</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231211">20231211</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.20.13">1.20.13</a>)</li>
<li>bash (<a href="https://git.savannah.gnu.org/cgit/bash.git/log/?id=2bb3cbefdb8fd019765b1a9cc42ecf37ff22fec6">5.2_p21</a>)</li>
<li>binutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00009.html">2.41</a>)</li>
<li>bpftool (<a href="https://kernelnewbies.org/Linux_6.5#Tracing.2C_perf_and_BPF">6.5.7</a>)</li>
<li>c-ares (<a href="https://c-ares.org/changelog.html#1_21_0">1.21.0</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_97.html">3.97</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.13">1.7.13</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.11">1.7.11</a>))</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-08/msg00007.html">9.4</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#8_5_0">8.5.0</a>)</li>
<li>docker (<a href="https://github.com/moby/moby/releases/tag/v24.0.9">24.0.9</a>)</li>
<li>elfutils (<a href="https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=0420d3b8376877c1b11712f1aad90a2e2b6f6d06;hb=c1058da5a450e33e72b72abb53bc3ffd7f6b361b">0.190</a>)</li>
<li>gawk (<a href="https://lwn.net/Articles/949829/">5.3.0</a>)</li>
<li>gentoolkit (<a href="https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.3">0.6.3</a>)</li>
<li>gettext (<a href="https://savannah.gnu.org/news/?id=10544">0.22.4</a>)</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/blob/2.78.3/NEWS">2.78.3</a>)</li>
<li>gnutls (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html">3.8.2</a>)</li>
<li>groff (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00001.html">1.23.0</a>)</li>
<li>hwdata (<a href="https://github.com/vcrhonek/hwdata/commits/v0.376">0.376</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114">20231114_p20231114</a>)</li>
<li>iproute2 (<a href="https://marc.info/?l=linux-netdev&amp;m=169929000929786&amp;w=2">6.6.0</a>)</li>
<li>ipset (<a href="https://git.netfilter.org/ipset/tree/ChangeLog?id=ce6db35a0ea950e850ebe7c50ce46908c1c3bb2b">7.19</a>)</li>
<li>jq (<a href="https://github.com/jqlang/jq/releases/tag/jq-1.7.1">1.7.1</a> (includes <a href="https://github.com/jqlang/jq/releases/tag/jq-1.7">1.7</a>))</li>
<li>kbd (<a href="https://github.com/legionus/kbd/releases/tag/v2.6.4">2.6.4</a>)</li>
<li>kmod (<a href="https://github.com/kmod-project/kmod/blob/v31/NEWS">31</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.2">3.7.2</a>)</li>
<li>libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.4">1.16.4</a>)</li>
<li>libksba (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=369cfb5d91bf232685a6c5b156453a624e11ed67;hb=7b3e4785e54280d1a13c5bc839bdc6722d898ac7">1.6.5</a>)</li>
<li>libnsl (<a href="https://github.com/thkukuk/libnsl/releases/tag/v2.0.1">2.0.1</a>)</li>
<li>libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.39">1.1.39</a>)</li>
<li>lsof (<a href="https://github.com/lsof-org/lsof/blob/4.99.0/00DIST#L5523">4.99.0</a>)</li>
<li>lz4 (<a href="https://github.com/lz4/lz4/releases/tag/v1.9.4">1.9.4</a>)</li>
<li>openssh (<a href="https://www.openssh.com/releasenotes.html#9.6p1">9.6p1</a>)</li>
<li>openssl (<a href="https://github.com/openssl/openssl/blob/openssl-3.0.12/NEWS.md#major-changes-between-openssl-3011-and-openssl-3012-24-oct-2023">3.0.12</a>)</li>
<li>readline (<a href="https://git.savannah.gnu.org/cgit/readline.git/log/?id=bfe9c573a9e376323929c80b2b71c59727fab0cc">8.2_p7</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.12">1.1.12</a>)</li>
<li>selinux-base (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-base-policy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-container (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-dbus (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-sssd (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-unconfined (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_44_2.html">3.44.2</a>)</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.6">6.6</a>)</li>
<li>traceroute (<a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/">2.1.3</a>)</li>
<li>usbutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v016">016</a>)</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/blob/v2.39.2/Documentation/releases/v2.39.2-ReleaseNotes">2.39.2</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/commits/v9.0.2092/">9.0.2092</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.20/debian/changelog">5.5.20</a>)</li>
<li>xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/xmlsec_1_3_2">1.3.2</a>)</li>
<li>xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.5">5.4.5</a>)</li>
<li>zlib (<a href="https://github.com/madler/zlib/releases/tag/v1.3">1.3</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/5.38.2/perldelta">5.38.2</a>)</li>
<li>SDK: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.59">3.0.59</a>)</li>
<li>SDK: python (<a href="https://www.python.org/downloads/release/python-3117/">3.11.7</a>)</li>
<li>SDK: repo (2.37)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.75.0">1.75.0</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.74.1">1.74.1</a>))</li>
</ul>
<p><em>Changes since <strong>Alpha 3850.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50431">CVE-2023-50431</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849</a>)</li>
<li>docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added a workaround for old airgapped/proxied update-engine clients to be able to update to this release (<a href="https://github.com/flatcar/Flatcar/issues/1332">Flatcar#1332</a>, <a href="https://github.com/flatcar/update_engine/pull/38">update_engine#38</a>)</li>
<li>Fixed the handling of OEM update payloads in a Nebraska response with self-hosted packages (<a href="https://github.com/flatcar/ue-rs/pull/49">ue-rs#49</a>)</li>
<li>Forwarded the proxy environment variables of <code>update-engine.service</code> to the postinstall script to support fetching OEM systemd-sysext payloads through a proxy (<a href="https://github.com/flatcar/Flatcar/issues/1326">Flatcar#1326</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added a <code>flatcar-update --oem-payloads &lt;yes|no&gt;</code> flag to skip providing OEM payloads, e.g., for downgrades (<a href="https://github.com/flatcar/init/pull/114">init#114</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/961011">6.6.16</a> (includes <a href="https://lwn.net/Articles/960441">6.6.15</a>, <a href="https://lwn.net/Articles/959512">6.6.14</a>, <a href="https://lwn.net/Articles/958862">6.6.13</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_97.html">3.97</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.13">1.7.13</a>)</li>
<li>docker (<a href="https://github.com/moby/moby/releases/tag/v24.0.9">24.0.9</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.12">1.1.12</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.13</li>
<li>docker 24.0.9</li>
<li>ignition 2.15.0</li>
<li>kernel 6.6.16</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3850.1.0"/>
    <published>2024-02-14T04:34:27+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3815.1.0</id>
    <title>3815.1.0</title>
    <updated>2026-03-09T16:26:27.671705+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3760.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1193">CVE-2023-1193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51781">CVE-2023-51781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a>)</li>
<li>VMWare: open-vm-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059</a>)</li>
<li>nghttp2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a>)</li>
<li>samba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091</a>)</li>
<li>zlib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>AWS: Fixed the Amazon SSM agent that was crashing. (<a href="https://github.com/flatcar/Flatcar/issues/1307">Flatcar#1307</a>)</li>
<li>Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found (<a href="https://github.com/flatcar/coreos-cloudinit/pull/25">coreos-cloudinit#25</a>, <a href="https://github.com/flatcar/Flatcar/issues/1262">Flatcar#1262</a>), with contributions from <a href="https://github.com/MichaelEischer">MichaelEischer</a></li>
<li>Fixed supplying extension update payloads with a custom base URL in Nebraska (<a href="https://github.com/flatcar/Flatcar/issues/1281">Flatcar#1281</a>)</li>
<li>Set TTY used for fetching server_context to RAW mode before running cloudinit on cloudsigma (<a href="https://github.com/flatcar/scripts/pull/1280">scripts#1280</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li><strong>Torcx, the mechanism to provide a custom Docker version, was replaced by systemd-sysext in the OS image</strong>. Learn more about sysext and how to customise OS images <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/">here</a> and read the blogpost about the replacement <a href="https://www.flatcar.org/blog/2023/12/extending-flatcar-say-goodbye-to-torcx-and-hello-to-systemd-sysext/">here</a>.
<ul>
<li>Torcx entered deprecation 2 years ago in favour of <a href="https://www.flatcar.org/docs/latest/container-runtimes/use-a-custom-docker-or-containerd-version/">deploying plain Docker binaries</a>
(which is now also a legacy option because systemd-sysext offers a more robust and better structured way of customisation, including OS independent updates).</li>
<li>Torcx has been removed entirely; if you use Torcx to extend the Flatcar base OS image, please refer to our <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/#torcx-deprecation">conversion script</a> and to the sysext documentation mentioned above for migrating.</li>
<li>Consequently, <code>update_engine</code> will not perform torcx sanity checks post-update anymore.</li>
<li>Relevant changes: <a href="https://github.com/flatcar/scripts/pull/1216">scripts#1216</a>, <a href="https://github.com/flatcar/update_engine/pull/30">update_engine#30</a>, <a href="https://github.com/flatcar/mantle/pull/466">Mantle#466</a>, <a href="https://github.com/flatcar/mantle/pull/465">Mantle#465</a>.</li>
</ul>
</li>
<li>cri-tools, runc, containerd, docker, and docker-cli are now built from Gentoo upstream ebuilds. Docker received a major version upgrade - it was updated to Docker 24 (from Docker 20; see &quot;updates&quot;).
<ul>
<li><strong>NOTE:</strong> The docker btrfs storage driver has been de-prioritised; BTRFS backed storage will now default to the <code>overlay2</code> driver
(<a href="https://docs.docker.com/engine/release-notes/23.0/#bug-fixes-and-enhancements-6">changelog</a>, <a href="https://github.com/moby/moby/pull/42661">upstream pr</a>).
Using the btrfs driver can still be enforced by creating a respective <a href="https://docs.docker.com/storage/storagedriver/btrfs-driver/#configure-docker-to-use-the-btrfs-storage-driver">docker config</a> at <code>/etc/docker/daemon.json</code>.</li>
<li><strong>NOTE:</strong> If you are already using btrfs-backed Docker storage and are upgrading to this new version, Docker will automatically use the <code>btrfs</code> storage driver for backwards-compatibility with your deployment.
<ul>
<li><strong>Docker will remove the <code>btrfs</code> driver entirely in a future version. Please consider migrating your deployments to the <code>overlay2</code> driver.</strong></li>
</ul>
</li>
</ul>
</li>
<li>GCP OEM images now use a systemd-sysext image for layering additional platform-specific software on top of <code>/usr</code> and being part of the OEM A/B updates (<a href="https://github.com/flatcar/Flatcar/issues/1146">flatcar#1146</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Azure: WALinuxAgent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.9.1.1">v2.9.1.1</a>)</li>
<li>DEV, AZURE: python (<a href="https://docs.python.org/release/3.11.6/whatsnew/changelog.html#python-3-11-6">3.11.6</a>)</li>
<li>DEV: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.15">3.15</a>)</li>
<li>DEV: smartmontools (<a href="https://www.smartmontools.org/browser/tags/RELEASE_7_4/smartmontools/NEWS">7.4</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.20.12">1.20.12</a> (includes <a href="https://go.dev/doc/devel/release#go1.20.11">1.20.11</a>))</li>
<li>Linux (<a href="https://lwn.net/Articles/958343">6.1.73</a> (includes <a href="https://lwn.net/Articles/957376">6.1.72</a>, <a href="https://lwn.net/Articles/957009">6.1.71</a>, <a href="https://lwn.net/Articles/956526">6.1.70</a>, <a href="https://lwn.net/Articles/955814">6.1.69</a>, <a href="https://lwn.net/Articles/954989/">6.1.68</a>, <a href="https://lwn.net/Articles/954455">6.1.67</a>, <a href="https://lwn.net/Articles/948817">6.1.60</a> and <a href="https://lwn.net/Articles/948297">6.1.59</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231111">20231111</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231030">20231030</a>))</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.73.0">1.73.0</a>)</li>
<li>SDK: python packaging (<a href="https://github.com/pypa/packaging/releases/tag/23.2">23.2</a>), platformdirs (<a href="https://github.com/platformdirs/platformdirs/releases/tag/3.11.0">3.11.0</a>)</li>
<li>VMWare: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.5">12.3.5</a>)</li>
<li>acpid (<a href="https://sourceforge.net/p/acpid2/code/ci/2.0.34/tree/Changelog">2.0.34</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html">3.96.1</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html">3.96</a>))</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.10">1.7.10</a> includes (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.9">1.7.9</a> and <a href="https://github.com/containerd/containerd/releases/tag/v1.7.8">1.7.8</a>))</li>
<li>cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.0">1.27.0</a>)</li>
<li>ding-libs (<a href="https://github.com/SSSD/ding-libs/releases/tag/0.6.2">0.6.2</a>)</li>
<li>docker (<a href="https://docs.docker.com/engine/release-notes/24.0/">24.0.6</a>, includes changes from <a href="https://docs.docker.com/engine/release-notes/23.0/">23.0</a>)</li>
<li>efibootmgr (<a href="https://github.com/rhboot/efibootmgr/releases/tag/18">18</a>)</li>
<li>efivar (<a href="https://github.com/rhboot/efivar/releases/tag/38">38</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.5">6.5</a>)</li>
<li>hwdata (<a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.375">0.375</a> includes (<a href="https://github.com/vcrhonek/hwdata/commits/v0.374">0.374</a>))</li>
<li>iproute2 (<a href="https://marc.info/?l=linux-netdev&amp;m=169401822317373&amp;w=2">6.5.0</a>)</li>
<li>ipvsadm (<a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.31">1.31</a> (includes <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.28">1.28</a>, <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.29">1.29</a> and <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.30">1.30</a>))</li>
<li>json-c (<a href="https://github.com/json-c/json-c/blob/json-c-0.17-20230812/ChangeLog">0.17</a>)</li>
<li>libffi (<a href="https://github.com/libffi/libffi/releases/tag/v3.4.4">3.4.4</a> (includes <a href="https://github.com/libffi/libffi/releases/tag/v3.4.2">3.4.2</a> and <a href="https://github.com/libffi/libffi/releases/tag/v3.4.3">3.4.3</a>))</li>
<li>liblinear (246)</li>
<li>libmnl (<a href="https://git.netfilter.org/libmnl/log/?h=libmnl-1.0.5">1.0.5</a>)</li>
<li>libnetfilter_conntrack (<a href="https://git.netfilter.org/libnetfilter_conntrack/log/?h=libnetfilter_conntrack-1.0.9">1.0.9</a>)</li>
<li>libnetfilter_cthelper (<a href="https://git.netfilter.org/libnetfilter_cthelper/log/?id=8cee0347cc6969c39bb64000dfaa676a8f9e30f0">1.0.1</a>)</li>
<li>libnetfilter_cttimeout (<a href="https://git.netfilter.org/libnetfilter_cttimeout/log/?id=068d36d6291f53a0a609ab1f695aa06e94ce3d30">1.0.1</a>)</li>
<li>libnfnetlink (<a href="https://git.netfilter.org/libnfnetlink/log/?h=libnfnetlink-1.0.2">1.0.2</a>)</li>
<li>libsodium (<a href="https://github.com/jedisct1/libsodium/releases/tag/1.0.19-RELEASE">1.0.19</a>)</li>
<li>libunistring (<a href="https://git.savannah.gnu.org/gitweb/?p=libunistring.git;a=blob;f=NEWS;h=5a43ddd7011d62a952733f6c0b7ad52aa4f385c7;hb=8006860b710aae2e8442088c3ddc7d819dfa8ac7">1.1</a>)</li>
<li>libunwind (<a href="https://github.com/libunwind/libunwind/releases/tag/v1.7.2">1.7.2</a> (includes <a href="https://github.com/libunwind/libunwind/releases/tag/v1.7.0">1.7.0</a>))</li>
<li>liburing (<a href="https://github.com/axboe/liburing/blob/liburing-2.3/CHANGELOG">2.3</a>)</li>
<li>mpc (<a href="https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00049.html">1.3.1</a> (includes <a href="https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00028.html">1.3.0</a>)</li>
<li>mpfr (<a href="https://gitlab.inria.fr/mpfr/mpfr/-/blob/4.2.1/NEWS">4.2.1</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0">1.57.0</a> (includes <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0">1.52.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.53.0">1.53.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.54.0">1.54.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.55.0">1.55.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.55.1">1.55.1</a> and <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.56.0">1.56.0</a>))</li>
<li>nspr (<a href="https://hg.mozilla.org/projects/nspr/log/b563bfc16c887c48b038b7b441fcc4e40a126d3b">4.35</a>)</li>
<li>ntp (<a href="https://www.ntp.org/support/securitynotice/4_2_8p17-release-announcement/">4.2.8p17</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.6">v2.6</a>, libnvme <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.6">v1.6</a>)</li>
<li>protobuf (<a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.12">21.12</a> (includes <a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.10">21.10</a> and <a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.11">21.11</a>))</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.18.8.html">4.18.8</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_43_2.html">3.43.2</a>)</li>
<li>squashfs-tools (<a href="https://github.com/plougher/squashfs-tools/releases/tag/4.6.1">4.6.1</a> (includes <a href="https://github.com/plougher/squashfs-tools/releases/tag/4.6">4.6</a>))</li>
<li>thin-provisioning-tools (<a href="https://github.com/jthornber/thin-provisioning-tools/blob/v1.0.6/CHANGES">1.0.6</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3815.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1193">CVE-2023-1193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51781">CVE-2023-51781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>AWS: Fixed the Amazon SSM agent that was crashing. (<a href="https://github.com/flatcar/Flatcar/issues/1307">Flatcar#1307</a>)</li>
<li>Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found (<a href="https://github.com/flatcar/coreos-cloudinit/pull/25">coreos-cloudinit#25</a>, <a href="https://github.com/flatcar/Flatcar/issues/1262">Flatcar#1262</a>), with contributions from <a href="https://github.com/MichaelEischer">MichaelEischer</a></li>
<li>Fixed supplying extension update payloads with a custom base URL in Nebraska (<a href="https://github.com/flatcar/Flatcar/issues/1281">Flatcar#1281</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/958343">6.1.73</a> (includes <a href="https://lwn.net/Articles/957376">6.1.72</a>, <a href="https://lwn.net/Articles/957009">6.1.71</a>, <a href="https://lwn.net/Articles/956526">6.1.70</a>, <a href="https://lwn.net/Articles/955814">6.1.69</a>, <a href="https://lwn.net/Articles/954989/">6.1.68</a> and <a href="https://lwn.net/Articles/954455">6.1.67</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html">3.96.1</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html">3.96</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.10</li>
<li>docker 24.0.6</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.73</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3815.1.0"/>
    <published>2024-01-18T15:14:38+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3760.1.1</id>
    <title>3760.1.1</title>
    <updated>2026-03-09T16:26:27.661024+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3760.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Deleted files in <code>/etc</code> that have a tmpfiles rule that normally would recreate them will now show up again through the <code>/etc</code> lowerdir (<a href="https://github.com/flatcar/Flatcar/issues/1265">Flatcar#1265</a>, <a href="https://github.com/flatcar/bootengine/pull/79">bootengine#79</a>)</li>
<li>Fixed the missing <code>/etc/extensions/</code> symlinks for the inbuilt Docker/containerd systemd-sysext images on update from Beta 3760.1.0 (<a href="https://github.com/flatcar/update_engine/pull/32">update_engine#32</a>)</li>
<li>GCP: Fixed OS Login enabling (<a href="https://github.com/flatcar/scripts/pull/1445">scripts#1445</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>linux kernel: added zstd support for squashfs kernel module (<a href="https://github.com/flatcar/scripts/pull/1297">scripts#1297</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/954112">6.1.66</a> (includes <a href="https://lwn.net/Articles/953648/">6.1.65</a>, <a href="https://lwn.net/Articles/953132">6.1.64</a>, <a href="https://lwn.net/Articles/952003">6.1.63</a>))</li>
<li>afterburn (<a href="https://github.com/coreos/afterburn/releases/tag/v5.5.0">5.5.0</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html">3.95</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.7</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.66</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3760.1.1"/>
    <published>2023-12-13T12:51:26+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3760.1.0</id>
    <title>3760.1.0</title>
    <updated>2026-03-09T16:26:27.652557+00:00</updated>
    <content type="html"><![CDATA[<p>⚠️ From Alpha 3794.0.0 Torcx has been removed - please assert that you don't rely on specific Torcx mechanism but now use systemd-sysext. See <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/">here</a> for more information.</p>
<p><em>Changes since <strong>Beta 3745.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4911">CVE-2023-4911</a>)</li>
<li>go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a>)</li>
<li>grub (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693</a>)</li>
<li>libtirpc (<a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=4a2d85c64110ee9e21a8c4f9dafd6b0ae621506d">libtirpc-rhbg-2138317</a>, <a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=f7f0abdf267698de3f74a0285405b1b01f40893b">libtirpc-rhbg-2150611</a>, <a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1d2e10afb2ffc35cb3623f57a15f712359f18e75">libtirpc-rhbg-2224666</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added AWS EKS support for versions 1.24-1.28. Fixed <code>/usr/share/amazon/eks/download-kubelet.sh</code> to include download paths for these versions. (<a href="https://github.com/flatcar/scripts/pull/1210">scripts#1210</a>)</li>
<li>Fixed iterating over the OEM update payload signatures which prevented the AWS OEM update to 3745.x.y (<a href="https://github.com/flatcar/update_engine/pull/31">update-engine#31</a>)</li>
<li>Fixed quotes handling for update-engine (<a href="https://github.com/flatcar/Flatcar/issues/1209">Flatcar#1209</a>)</li>
<li>Made <code>sshkeys.service</code> more robust to only run <code>coreos-metadata-sshkeys@core.service</code> when not masked and also retry on failure (<a href="https://github.com/flatcar/init/pull/112">init#112</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Brightbox: The regular OpenStack image should now be used, it includes Afterburn for instance metadata attributes</li>
<li>OpenStack: An uncompressed image is provided for simpler import (since the images use qcow2 inline compression, there is no benefit in using the <code>.gz</code> or <code>.bz2</code> images)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.20.10">1.20.10</a> (includes <a href="https://go.dev/doc/devel/release#go1.20.9">1.20.9</a>))</li>
<li>Linux (<a href="https://lwn.net/Articles/950700">6.1.62</a> (includes <a href="https://lwn.net/Articles/949826">6.1.61</a>, <a href="https://lwn.net/Articles/948817">6.1.60</a> and includes <a href="https://lwn.net/Articles/948299">6.1.59</a>))</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.7">1.7.7</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#8_4_0">8.4.0</a>)</li>
<li>libnl (<a href="https://github.com/thom311/libnl/compare/libnl3_7_0...libnl3_8_0">3.8.0</a>)</li>
<li>libtirpc (<a href="https://marc.info/?l=linux-nfs&amp;m=169667640909830&amp;w=2">1.3.4</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.5">2.11.5</a>)</li>
<li>openssh (<a href="https://www.openssh.com/releasenotes.html#9.5p1">9.5p1</a>)</li>
<li>pigz (<a href="https://zlib.net/pipermail/pigz-announce_zlib.net/2023-August/000018.html">2.8</a>)</li>
<li>strace(<a href="https://github.com/strace/strace/releases/tag/v6.4">6.4</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.18/debian/changelog">5.5.18</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3760.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed iterating over the OEM update payload signatures which prevented the AWS OEM update to 3745.x.y (<a href="https://github.com/flatcar/update_engine/pull/31">update-engine#31</a>)</li>
<li>Made <code>sshkeys.service</code> more robust to only run <code>coreos-metadata-sshkeys@core.service</code> when not masked and also retry on failure (<a href="https://github.com/flatcar/init/pull/112">init#112</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Brightbox: The regular OpenStack image should now be used, it includes Afterburn for instance metadata attributes</li>
<li>OpenStack: An uncompressed image is provided for simpler import (since the images use qcow2 inline compression, there is no benefit in using the <code>.gz</code> or <code>.bz2</code> images)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/950700">6.1.62</a> (includes <a href="https://lwn.net/Articles/949826">6.1.61</a>, <a href="https://lwn.net/Articles/948817">6.1.60</a> and includes <a href="https://lwn.net/Articles/948299">6.1.59</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.7</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.62</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3760.1.0"/>
    <published>2023-11-22T07:54:40+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3745.1.0</id>
    <title>3745.1.0</title>
    <updated>2026-03-09T16:26:27.641187+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3732.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38039">CVE-2023-38039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4527">CVE-2023-4527</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4806">CVE-2023-4806</a>)</li>
<li>lua (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33099">CVE-2022-33099</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054</a>)</li>
<li>procps (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016</a>)</li>
<li>samba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1615">CVE-2022-1615</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Disabled systemd-networkd's RoutesToDNS setting by default to fix provisioning failures observed in VMs with multiple network interfaces on Azure (<a href="https://github.com/flatcar/scripts/pull/1206">scripts#1206</a>)</li>
<li>Fixed the postinstall hook failure when updating from Azure instances without OEM systemd-sysext images to Flatcar Alpha 3745.x.y (<a href="https://github.com/flatcar/update_engine/pull/29">update_engine#29</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>AWS OEM images now use a systemd-sysext image for layering additional platform-specific software on top of <code>/usr</code></li>
<li>Reworked the VMware OEM software to be shipped as A/B updated systemd-sysext image</li>
<li>SDK: Experimental support for <a href="https://github.com/flatcar/scripts/blob/main/PREFIX.md">prefix builds</a> to create distro independent, portable, self-contained applications w/ all dependencies included. With contributions from <a href="https://github.com/chewi">chewi</a> and <a href="https://github.com/HappyTobi">HappyTobi</a>.</li>
<li>Started shipping default ssh client and ssh daemon configs in <code>/etc/ssh/ssh_config</code> and <code>/etc/ssh/sshd_config</code> which include config snippets in <code>/etc/ssh/ssh_config.d</code> and <code>/etc/ssh/sshd_config.d</code>, respectively.</li>
<li>The open-vm-tools package in VMware OEM now comes with vmhgfs-fuse, udev rules, pam and vgauth</li>
<li>To make Kubernetes work by default, <code>/usr/libexec/kubernetes/kubelet-plugins/volume/exec</code> is now a symlink to the writable folder <code>/var/kubernetes/kubelet-plugins/volume/exec</code> (<a href="https://github.com/flatcar/Flatcar/issues/1193">Flatcar#1193</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/947820">6.1.58</a> (includes <a href="https://lwn.net/Articles/947298">6.1.57</a>, <a href="https://lwn.net/Articles/946854">6.1.56</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230919">20230919</a>)</li>
<li>bind-tools (<a href="https://bind9.readthedocs.io/en/v9.16.42/notes.html#notes-for-bind-9-16-42">9.16.42</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html">3.94</a>)</li>
<li>checkpolicy (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#8_3_0">8.3.0</a>)</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-13/changes.html">13.2</a>)</li>
<li>gzip (<a href="https://savannah.gnu.org/news/?id=10501">1.13</a>)</li>
<li>libgcrypt (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=c9a239615f8070427a96688b1be40a81e59e9b8a;hb=1c5cbacf3d88dded5063e959ee68678ff7d0fa56">1.10.2</a>)</li>
<li>libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>libsemanage (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>lua (<a href="https://www.lua.org/manual/5.4/readme.html#changes">5.4.6</a>)</li>
<li>mit-krb5 (<a href="http://web.mit.edu/kerberos/krb5-1.21/">1.21.2</a>)</li>
<li>openssh (<a href="https://www.openssh.com/releasenotes.html#9.4p1">9.4p1</a>)</li>
<li>policycoreutils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>procps (<a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.4">4.0.4</a> (includes <a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.3">4.0.3</a> and <a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.0">4.0.0</a>))</li>
<li>rpcsvc-proto (<a href="https://github.com/thkukuk/rpcsvc-proto/releases/tag/v1.4.4">1.4.4</a>)</li>
<li>samba (<a href="https://wiki.samba.org/index.php/Samba_4.18_Features_added/changed#Samba_4.18.4">4.18.4</a>)</li>
<li>selinux-base (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>)</li>
<li>selinux-base-policy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>)</li>
<li>selinux-container (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>)</li>
<li>selinux-sssd (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>)</li>
<li>selinux-unconfined (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>)</li>
<li>semodule-utils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.72.1">1.72.1</a>)</li>
<li>VMWARE: libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.2">1.16.2</a> (includes <a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16">1.16</a>))</li>
</ul>
<p><em>Changes since <strong>Alpha 3745.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Disabled systemd-networkd's RoutesToDNS setting by default to fix provisioning failures observed in VMs with multiple network interfaces on Azure (<a href="https://github.com/flatcar/scripts/pull/1206">scripts#1206</a>)</li>
<li>Fixed the postinstall hook failure when updating from Azure instances without OEM systemd-sysext images to Flatcar Alpha 3745.x.y (<a href="https://github.com/flatcar/update_engine/pull/29">update_engine#29</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>To make Kubernetes work by default, <code>/usr/libexec/kubernetes/kubelet-plugins/volume/exec</code> is now a symlink to the writable folder <code>/var/kubernetes/kubelet-plugins/volume/exec</code> (<a href="https://github.com/flatcar/Flatcar/issues/1193">Flatcar#1193</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/947820">6.1.58</a> (includes <a href="https://lwn.net/Articles/947298">6.1.57</a>, <a href="https://lwn.net/Articles/946854">6.1.56</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html">3.94</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.6</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.58</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3745.1.0"/>
    <published>2023-10-25T08:38:48+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3732.1.0</id>
    <title>3732.1.0</title>
    <updated>2026-03-09T16:26:27.578447+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Alpha 3732.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Triggered re-reading of partition table to fix adding partitions to the boot disk (<a href="https://github.com/flatcar/scripts/pull/1202">scripts#1202</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Use qcow2 compressed format instead of additional compression layer in Qemu images (<a href="https://github.com/flatcar/Flatcar/issues/1135">Flatcar#1135</a>, <a href="https://github.com/flatcar/scripts/pull/1132">scripts#1132</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/945379">6.1.55</a>)</li>
</ul>
<p><em>Changes compared to <strong>Beta 3602.1.6</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36516">CVE-2020-36516</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33135">CVE-2021-33135</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3923">CVE-2021-3923</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44879">CVE-2021-44879</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45469">CVE-2021-45469</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0382">CVE-2022-0382</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0433">CVE-2022-0433</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0435">CVE-2022-0435</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0516">CVE-2022-0516</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0742">CVE-2022-0742</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0995">CVE-2022-0995</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1015">CVE-2022-1015</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1055">CVE-2022-1055</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1198">CVE-2022-1198</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1199">CVE-2022-1199</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1204">CVE-2022-1204</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1205">CVE-2022-1205</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1651">CVE-2022-1651</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1671">CVE-2022-1671</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1882">CVE-2022-1882</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1943">CVE-2022-1943</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1973">CVE-2022-1973</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1974">CVE-2022-1974</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1975">CVE-2022-1975</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1976">CVE-2022-1976</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1998">CVE-2022-1998</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20008">CVE-2022-20008</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20158">CVE-2022-20158</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20369">CVE-2022-20369</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20421">CVE-2022-20421</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20422">CVE-2022-20422</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20423">CVE-2022-20423</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20566">CVE-2022-20566</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20572">CVE-2022-20572</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2078">CVE-2022-2078</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21505">CVE-2022-21505</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2153">CVE-2022-2153</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2308">CVE-2022-2308</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2380">CVE-2022-2380</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23960">CVE-2022-23960</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24958">CVE-2022-24958</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24959">CVE-2022-24959</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2503">CVE-2022-2503</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25258">CVE-2022-25258</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25375">CVE-2022-25375</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25636">CVE-2022-25636</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2590">CVE-2022-2590</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2639">CVE-2022-2639</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27223">CVE-2022-27223</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27666">CVE-2022-27666</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27672">CVE-2022-27672</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2785">CVE-2022-2785</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27950">CVE-2022-27950</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28356">CVE-2022-28356</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2873">CVE-2022-2873</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28796">CVE-2022-28796</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29156">CVE-2022-29156</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2938">CVE-2022-2938</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29582">CVE-2022-29582</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2959">CVE-2022-2959</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2977">CVE-2022-2977</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2978">CVE-2022-2978</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29968">CVE-2022-29968</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3077">CVE-2022-3077</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3078">CVE-2022-3078</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3104">CVE-2022-3104</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3105">CVE-2022-3105</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3107">CVE-2022-3107</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3108">CVE-2022-3108</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3110">CVE-2022-3110</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3111">CVE-2022-3111</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3112">CVE-2022-3112</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3113">CVE-2022-3113</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3115">CVE-2022-3115</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3169">CVE-2022-3169</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3202">CVE-2022-3202</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32296">CVE-2022-32296</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3239">CVE-2022-3239</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32981">CVE-2022-32981</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3344">CVE-2022-3344</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33744">CVE-2022-33744</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33981">CVE-2022-33981</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34494">CVE-2022-34494</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34495">CVE-2022-34495</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3521">CVE-2022-3521</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3526">CVE-2022-3526</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3534">CVE-2022-3534</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3541">CVE-2022-3541</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3543">CVE-2022-3543</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3577">CVE-2022-3577</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3586">CVE-2022-3586</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3595">CVE-2022-3595</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36123">CVE-2022-36123</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3621">CVE-2022-3621</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3625">CVE-2022-3625</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3635">CVE-2022-3635</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3643">CVE-2022-3643</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3646">CVE-2022-3646</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3649">CVE-2022-3649</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3910">CVE-2022-3910</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39189">CVE-2022-39189</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3977">CVE-2022-3977</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40307">CVE-2022-40307</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4095">CVE-2022-4095</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4128">CVE-2022-4128</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4139">CVE-2022-4139</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41849">CVE-2022-41849</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41850">CVE-2022-41850</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42328">CVE-2022-42328</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42329">CVE-2022-42329</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42432">CVE-2022-42432</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4662">CVE-2022-4662</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47518">CVE-2022-47518</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47519">CVE-2022-47519</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47520">CVE-2022-47520</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47521">CVE-2022-47521</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47938">CVE-2022-47938</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47939">CVE-2022-47939</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47940">CVE-2022-47940</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47941">CVE-2022-47941</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47942">CVE-2022-47942</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47943">CVE-2022-47943</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4842">CVE-2022-4842</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48423">CVE-2022-48423</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48424">CVE-2022-48424</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48425">CVE-2022-48425</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48502">CVE-2022-48502</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0210">CVE-2023-0210</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0458">CVE-2023-0458</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0468">CVE-2023-0468</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0469">CVE-2023-0469</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0615">CVE-2023-0615</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1032">CVE-2023-1032</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1073">CVE-2023-1073</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1074">CVE-2023-1074</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1194">CVE-2023-1194</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1281">CVE-2023-1281</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1583">CVE-2023-1583</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1872">CVE-2023-1872</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2008">CVE-2023-2008</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2019">CVE-2023-2019</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20928">CVE-2023-20928</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20938">CVE-2023-20938</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21106">CVE-2023-21106</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21255">CVE-2023-21255</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2194">CVE-2023-2194</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2236">CVE-2023-2236</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22996">CVE-2023-22996</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22997">CVE-2023-22997</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22999">CVE-2023-22999</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23001">CVE-2023-23001</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23002">CVE-2023-23002</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2430">CVE-2023-2430</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26544">CVE-2023-26544</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26606">CVE-2023-26606</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26607">CVE-2023-26607</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28866">CVE-2023-28866</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2898">CVE-2023-2898</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3006">CVE-2023-3006</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3159">CVE-2023-3159</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3220">CVE-2023-3220</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32247">CVE-2023-32247</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32248">CVE-2023-32248</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32250">CVE-2023-32250</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32252">CVE-2023-32252</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32254">CVE-2023-32254</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32257">CVE-2023-32257</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32258">CVE-2023-32258</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32269">CVE-2023-32269</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33203">CVE-2023-33203</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3355">CVE-2023-3355</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3357">CVE-2023-3357</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3359">CVE-2023-3359</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3439">CVE-2023-3439</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35824">CVE-2023-35824</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35826">CVE-2023-35826</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3773">CVE-2023-3773</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38426">CVE-2023-38426</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38427">CVE-2023-38427</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38428">CVE-2023-38428</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38429">CVE-2023-38429</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38430">CVE-2023-38430</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38431">CVE-2023-38431</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38432">CVE-2023-38432</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3865">CVE-2023-3865</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3866">CVE-2023-3866</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3867">CVE-2023-3867</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4015">CVE-2023-4015</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4132">CVE-2023-4132</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4385">CVE-2023-4385</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4394">CVE-2023-4394</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39320">CVE-2023-39320</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38533">CVE-2022-38533</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1579">CVE-2023-1579</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28319">CVE-2023-28319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007</a>)</li>
<li>grub (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3981">CVE-2021-3981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28735">CVE-2022-28735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.1">libarchive-20230729</a>)</li>
<li>libcap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603</a>)</li>
<li>libmicrohttpd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4">libxml2-20230428</a>)</li>
<li>ncurses (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25515">CVE-2023-25515</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25516">CVE-2023-25516</a>)</li>
<li>openldap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953</a>)</li>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2975">CVE-2023-2975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446</a>)</li>
<li>protobuf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1941">CVE-2022-1941</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">CVE-2023-29383</a>)</li>
<li>sudo (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27320">CVE-2023-27320</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28486">CVE-2023-28486</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28487">CVE-2023-28487</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28948">CVE-2022-28948</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2609">CVE-2023-2609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2610">CVE-2023-2610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2426">CVE-2023-2426</a>)</li>
<li>SDK: Python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41105">CVE-2023-41105</a>)</li>
<li>SDK: qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0330">CVE-2023-0330</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2861">CVE-2023-2861</a>)</li>
<li>SDK: Rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38497">CVE-2023-38497</a>)</li>
<li>VMware: open-vm-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fix the RemainAfterExit clause in nvidia.service (<a href="https://github.com/flatcar/Flatcar/issues/1169">Flatcar#1169</a>)</li>
<li>Fixed bug in handling renamed network interfaces when generating login issue (<a href="https://github.com/flatcar/init/pull/102">init#102</a>)</li>
<li>Triggered re-reading of partition table to fix adding partitions to the boot disk (<a href="https://github.com/flatcar/scripts/pull/1202">scripts#1202</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>:warning: Dropped support for niftycloud and interoute. For interoute we haven't been generating the images for some time already. (<a href="https://github.com/flatcar/scripts/pull/971">scripts#971</a>) :warning:</li>
<li>Added TLS Kernel module (<a href="https://github.com/flatcar/scripts/pull/865">scripts#865</a>)</li>
<li>Added support for multipart MIME userdata in coreos-cloudinit. Ignition now detects multipart userdata and delegates execution to coreos-cloudinit. (<a href="https://github.com/flatcar/scripts/pull/873">scripts#873</a>)</li>
<li>Azure and QEMU OEM images now use systemd-sysext images for layering additional platform-specific software on top of <code>/usr</code>. For Azure images this also means that the image has a normal Python installation available through the sysext image. The OEM software is still not updated but this will be added soon.</li>
<li>Change nvidia.service to type oneshot (from the default &quot;simple&quot;) so the subsequent services (configured with &quot;Requires/After&quot;) are executed after the driver installation is successfully finished (<a href="https://github.com/flatcar/Flatcar/issues/1136">flatcar/Flatcar#1136</a>)</li>
<li>Enabled the virtio GPU driver (<a href="https://github.com/flatcar/scripts/pull/830">scripts#830</a>)</li>
<li>Migrate to Type=notify in containerd.service. Changed the unit to Type=notify, utilizing the existing containerd support for sd_notify call after socket setup.</li>
<li>Migrated the NVIDIA installer from the Azure/AWS OEM partition to <code>/usr</code> to make it available on all platforms (<a href="https://github.com/flatcar/scripts/pull/932/">scripts#932</a>, <a href="https://github.com/flatcar/Flatcar/issues/1077">Flatcar#1077</a>)</li>
<li>Moved a mountpoint of the OEM partition from <code>/usr/share/oem</code> to <code>/oem</code>. <code>/usr/share/oem</code> became a symlink to <code>/oem</code> for backward compatibility. Despite the move, the initrd images providing files through <code>/usr/share/oem</code> should keep using <code>/usr/share/oem</code>. The move was done to enable activating the OEM sysext images that are placed in the OEM partition.</li>
<li>OEM vendor tools are now A/B updated if they are shipped as systemd-sysext images, the migration happens when both partitions require a systemd-sysext OEM image - note that this will delete the <code>nvidia.service</code> from <code>/etc</code> on Azure because it's now part of <code>/usr</code> (<a href="https://github.com/flatcar/Flatcar/issues/60">Flatcar#60</a>)</li>
<li>Updated locksmith to use non-deprecated resource control options in the systemd unit (<a href="https://github.com/flatcar/locksmith/pull/20">Locksmith#20</a>)</li>
<li>Use qcow2 compressed format instead of additional compression layer in Qemu images (<a href="https://github.com/flatcar/Flatcar/issues/1135">Flatcar#1135</a>, <a href="https://github.com/flatcar/scripts/pull/1132">scripts#1132</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/945379">6.1.55</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.54">6.1.54</a>, <a href="https://lwn.net/Articles/944358">6.1.53</a>,<a href="https://lwn.net/Articles/943754">6.1.52</a>, <a href="https://lwn.net/Articles/943403">6.1.51</a>, <a href="https://lwn.net/Articles/943112">6.1.50</a>, <a href="https://lwn.net/Articles/942880">6.1.49</a>, <a href="https://lwn.net/Articles/942865">6.1.48</a>, <a href="https://lwn.net/Articles/942531">6.1.47</a>, <a href="https://lwn.net/Articles/941774">6.1.46</a>, <a href="https://lwn.net/Articles/941273">6.1.45</a>, <a href="https://lwn.net/Articles/940800">6.1.44</a>, <a href="https://lwn.net/Articles/940338">6.1.43</a>, <a href="https://lwn.net/Articles/939423">6.1.42</a>, <a href="https://lwn.net/Articles/939103">6.1.41</a>, <a href="https://lwn.net/Articles/939015">6.1.40</a>, <a href="https://lwn.net/Articles/938619">6.1.39</a>, <a href="https://lwn.net/Articles/937403">6.1.38</a>, <a href="https://lwn.net/Articles/937082">6.1.37</a>, <a href="https://lwn.net/Articles/936674">6.1.36</a>, <a href="https://lwn.net/Articles/935588">6.1.35</a>, <a href="https://lwn.net/Articles/934623">6.1.34</a>, <a href="https://lwn.net/Articles/934319">6.1.33</a>, <a href="https://lwn.net/Articles/933908">6.1.32</a>, <a href="https://lwn.net/Articles/933281">6.1.31</a>, <a href="https://lwn.net/Articles/932882">6.1.30</a>, <a href="https://lwn.net/Articles/932133">6.1.29</a>, <a href="https://lwn.net/Articles/931651">6.1.28</a>, <a href="https://lwn.net/Articles/930597/">6.1.27</a>, <a href="https://kernelnewbies.org/Linux_6.1">6.1</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230804">20230804</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625">20230625</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230515">20230515</a>))</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.20.8">1.20.8</a> (includes <a href="https://go.dev/doc/devel/release#go1.20.7">1.20.7</a>, <a href="https://go.dev/doc/devel/release#go1.20.6">1.20.6</a>, <a href="https://go.dev/doc/devel/release#go1.20.5">1.20.5</a>, <a href="https://go.dev/doc/devel/release#go1.20.4">1.20.4</a>, <a href="https://go.dev/doc/devel/release#go1.19.13">1.19.13</a>, <a href="https://go.dev/doc/devel/release#go1.19.12">1.19.12</a>, <a href="https://go.dev/doc/devel/release#go1.19.11">1.19.11</a>, <a href="https://go.dev/doc/devel/release#go1.19.10">1.19.10</a>))</li>
<li>bind tools (<a href="https://bind9.readthedocs.io/en/v9.16.41/notes.html#notes-for-bind-9-16-41">9.16.41</a>)</li>
<li>binutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-01/msg00003.html">2.40</a>)</li>
<li>bpftool (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/log/tools/bpf/bpftool?h=v6.3">6.3</a>)</li>
<li>c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1">1.19.1</a>)</li>
<li>cJSON (<a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.16">1.7.16</a>)</li>
<li>cifs-utils (<a href="https://lists.samba.org/archive/samba-technical/2022-August/137528.html">7.0</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.6">1.7.6</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.5">1.7.5</a>,<a href="https://github.com/containerd/containerd/releases/tag/v1.7.4">1.7.4</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.3">1.7.3</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.2">1.7.2</a>))</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-04/msg00006.html">9.3</a> (includes <a href="https://git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?h=v9.1">9.1</a>))</li>
<li>cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.1/docs/v2.6.1-ReleaseNotes">2.6.1</a> (includes <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.0/docs/v2.6.0-ReleaseNotes">2.6.0</a> and <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.5.0/docs/v2.5.0-ReleaseNotes">2.5.0</a>))</li>
<li>curl (<a href="https://curl.se/changes.html#8_2_1">8.2.1</a> (includes <a href="https://curl.se/changes.html#8_2_0">8.2.0</a>, <a href="https://curl.se/changes.html#8_1_2">8.1.2</a>, <a href="https://curl.se/changes.html#8_1_0">8.1.0</a>))</li>
<li>debianutils (<a href="https://metadata.ftp-master.debian.org/changelogs//main/d/debianutils/debianutils_5.7-0.4_changelog">5.7</a>)</li>
<li>diffutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00009.html">3.10</a>)</li>
<li>elfutils (<a href="https://sourceware.org/pipermail/elfutils-devel/2023q1/006023.html">0.189</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.4">6.4</a> (includes <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=7bdf78f0d2a9ae1571fe9444e552490130e573fd">6.3</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.2">6.2</a>))</li>
<li>gawk (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00008.html">5.2.2</a>)</li>
<li>gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00011.html">13.2</a>)</li>
<li>gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00004.html">1.23</a>)</li>
<li>git (<a href="https://lore.kernel.org/git/xmqqleh3a3wm.fsf@gitster.g/">2.41.0</a> (includes <a href="https://github.com/git/git/blob/v2.39.3/Documentation/RelNotes/2.39.3.txt">2.39.3</a>))</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.4">2.76.4</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.3">2.76.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.2">2.76.2</a>))</li>
<li>glibc (<a href="https://sourceware.org/git/?p=glibc.git;a=tag;h=refs/tags/glibc-2.37">2.37</a>)</li>
<li>gmp (<a href="https://gmplib.org/gmp6.3">6.3.0</a>)</li>
<li>gptfdisk (<a href="https://sourceforge.net/p/gptfdisk/code/ci/1d46f3723bc25f5598266f7d9a3548af3cee0c77/tree/NEWS">1.0.9</a>)</li>
<li>grep (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00004.html">3.11</a> (includes <a href="http://savannah.gnu.org/forum/forum.php?forum_id=10227">3.8</a>))</li>
<li>grub (<a href="https://lists.gnu.org/archive/html/grub-devel/2021-06/msg00022.html">2.06</a>)</li>
<li>hwdata (<a href="https://github.com/vcrhonek/hwdata/commits/v0.373">0.373</a> (includes <a href="https://github.com/vcrhonek/hwdata/commits/v0.372">0.372</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.371">0.371</a>, <a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.367">0.367</a>))</li>
<li>inih (<a href="https://github.com/benhoyt/inih/releases/tag/r57">57</a> (includes <a href="https://github.com/benhoyt/inih/releases/tag/r56">56</a>))</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230808">20230808</a> (includes <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230613">20230613</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230512">20230512</a>))</li>
<li>iperf (<a href="https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-314-2023-07-07">3.14</a>)</li>
<li>iproute2 (<a href="https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/?h=v6.4.0">6.4.0</a> (includes <a href="https://lwn.net/Articles/930473/">6.3.0</a>, <a href="https://lwn.net/Articles/923952/">6.2</a>))</li>
<li>ipset (<a href="https://git.netfilter.org/ipset/tree/ChangeLog?id=186f9b57c60bb53aae5f6633eff1e9d5e9095c3e">7.17</a>)</li>
<li>kbd (<a href="https://github.com/legionus/kbd/releases/tag/v2.6.1">2.6.1</a> (includes <a href="https://github.com/legionus/kbd/releases/tag/v2.6.0">2.6.0</a>, <a href="https://github.com/legionus/kbd/releases/tag/v2.5.1">2.5.1</a>))</li>
<li>kmod (<a href="https://lwn.net/Articles/899526/">30</a>)</li>
<li>ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/b686ef00da46d4a0c0aba0c61b1866cbc9b462b6">2.4.4</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/604f94704f30e90ef960aa2be62a14d2e614a002">2.4.3</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/d93892d2e8ed69758c15ab18bc03bba09e715bc6">2.4.2</a>))</li>
<li>less (<a href="http://www.greenwoodsoftware.com/less/news.633.html">633</a> (includes <a href="http://www.greenwoodsoftware.com/less/news.632.html">632</a>))</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.1">3.7.1</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.0">3.7.0</a>))</li>
<li>libassuan (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=e52bb5dd36ac93ea227e53e89f82af9ccf38f339;hb=6b50ee6bcdd6aa81bd7cc3fb2379864c3ed479b8">2.5.6</a>)</li>
<li>libbsd (<a href="https://lists.freedesktop.org/archives/libbsd/2022-October/000337.html">0.11.7</a>)</li>
<li>libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe">2.69</a>)</li>
<li>libgcrypt (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=03132c2a115e35783a782c64777cf5f5b1a2825f;hb=ae0e567820c37f9640440b3cff77d7c185aa6742">1.10.1</a>)</li>
<li>libgpg-error (<a href="https://dev.gnupg.org/T6231">1.47</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=14b0ba97d6ba2b10b3178f2e4a3e24bfc2355bb3;hb=ea031873aa9642831017937fd33e9009d514ee07">1.46</a>))</li>
<li>libksba (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=f640523209c1c9ce9855040e53914a79d24d6a67;hb=557999424ebd13e70d6fc17e648a5dd2a06f440b">1.6.4</a>)</li>
<li>libmd (<a href="https://git.hadrons.org/cgit/libmd.git/log/?h=1.1.0">1.1.0</a>)</li>
<li>libmicrohttpd (<a href="https://gitlab.com/libmicrohttpd/libmicrohttpd/-/releases/v0.9.77">0.9.77</a> (includes <a href="https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html">0.9.76</a>))</li>
<li>libnftnl (<a href="https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.6">1.2.6</a> (includes <a href="https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.5">1.2.5</a>))</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.5">1.5</a>)</li>
<li>libpcap (<a href="https://github.com/the-tcpdump-group/libpcap/blob/24832dd2728bd95ed9b9464ef27b47a943c38003/CHANGES#L51">1.10.4</a>)</li>
<li>libpcre (8.45)</li>
<li>libpipeline (<a href="https://gitlab.com/libpipeline/libpipeline/-/tags/1.5.7">1.5.7</a>)</li>
<li>libusb (<a href="https://github.com/libusb/libusb/blob/v1.0.26/ChangeLog">1.0.26</a>)</li>
<li>libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.46.0">1.46.0</a> (includes <a href="https://github.com/libuv/libuv/releases/tag/v1.45.0">1.45.0</a>))</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4">2.11.4</a>)</li>
<li>libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.38">1.1.38</a>)</li>
<li>lsof (<a href="https://github.com/lsof-org/lsof/blob/4.98.0/00DIST#L5471">4.98.0</a>)</li>
<li>lua (<a href="https://www.lua.org/manual/5.4/readme.html#changes">5.4.4</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/commits/0.9.5">0.9.5</a>)</li>
<li>ncurses (<a href="https://invisible-island.net/ncurses/announce.html#h2-release-notes">6.4</a>)</li>
<li>nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/blob/nettle_3.9.1_release_20230601/ChangeLog">3.9.1</a>)</li>
<li>nmap (<a href="https://nmap.org/changelog.html#7.94">7.94</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-104-05/index.html">535.104.05</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.5">2.5</a> (includes <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.3">2.3</a>))</li>
<li>open-isns (<a href="https://github.com/open-iscsi/open-isns/blob/v0.102/ChangeLog">0.102</a>)</li>
<li>openldap (<a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_4/CHANGES">2.6.4</a> (includes <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FQJM2JSSSOMLQH7XC7Q5IZJYOGCTV2LK/">2.6.3</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/IHS5V46H6NFNFUERMC6AWMPHTWRVNLFA/">2.6</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/TZQHR4SIWUA5BZTKDAKSFDOOGDVU4TU7/">2.5.14</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/BH3VDPG6IYYF5L5U6LZGHHKMJY5HFA3L/">2.5</a>))</li>
<li>OpenSSL (<a href="https://github.com/openssl/openssl/blob/openssl-3.0.9/NEWS.md#major-changes-between-openssl-308-and-openssl-309-30-may-2023">3.0.9</a>)</li>
<li>parted (<a href="https://git.savannah.gnu.org/gitweb/?p=parted.git;a=blob;f=NEWS;h=52bb11697039f70e55120c571750f9ee761a75aa;hb=3b5f327b213d21e9adb9ba933c78dd898fee5b1d">3.6</a>)</li>
<li>pax-utils (<a href="https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.7">1.3.7</a>)</li>
<li>pciutils (<a href="https://github.com/pciutils/pciutils/blob/v3.10.0/ChangeLog">3.10.0</a> (includes <a href="https://github.com/pciutils/pciutils/releases/tag/v3.9.0">3.9.0</a>))</li>
<li>popt (<a href="https://github.com/rpm-software-management/popt/releases/tag/popt-1.19-release">1.19</a>)</li>
<li>protobuf (<a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.9">21.9</a>)</li>
<li>psmisc (<a href="https://gitlab.com/psmisc/psmisc/-/blob/v23.6/ChangeLog">23.6</a>)</li>
<li>qemu guest agent (<a href="https://wiki.qemu.org/ChangeLog/8.0#Guest_agent">8.0.3</a> (includes <a href="https://wiki.qemu.org/ChangeLog/8.0#Guest_agent">8.0.0</a>))</li>
<li>quota (<a href="https://sourceforge.net/p/linuxquota/code/ci/87d2fd7635e4bca54fa2a00b8d5b073ba9ca521b/tree/Changelog">4.09</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.9">1.1.9</a> (includes <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.8">1.1.8</a>))</li>
<li>sed (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html">4.9</a>)</li>
<li>smartmontools (<a href="https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_3">7.3</a>)</li>
<li>sqlite (<a href="https://sqlite.org/releaselog/3_42_0.html">3.42.0</a>)</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.3">6.3</a> (includes <a href="https://github.com/strace/strace/releases/tag/v6.2">6.2</a>))</li>
<li>sudo (<a href="https://www.sudo.ws/releases/stable/#1.9.13p3">1.9.13p3</a>)</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/5224ed98eeba43f22b5f5f87de5947fbb1c1c7c1">2.4.0</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/0189ccf9fc3d2a77cc83cffe180e307bcdccebb4">2.3.4</a>))</li>
<li>tar (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html">1.35</a>)</li>
<li>tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/eab796a4f9172e602dc262f3c99ead35b35929e7">1.4.8</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/27ceb1c3ad786386e746a5e2968780d791393b9e">1.4.7</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/1c776e54cf33b46b2ed73263f093d596a0cdbb2f">1.4.6</a>))</li>
<li>tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/d80f28b081e515e32a480daf80b42cf782447a9c">0.14.1</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/3c6d28ebae27dba8e40558ae37ae8138ea0b4bdc">0.14.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/63d4db63feda920c8020f8484a8b31065b7f1380">0.13.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/53692735c733d01acbd953641f831a1f5e0cf6c5">0.12.1</a>, 0.12.0))</li>
<li>usbutils (<a href="https://github.com/gregkh/usbutils/blob/79b796f945ea7d5c2b0e2a74f9b8819cb7948680/NEWS">015</a>)</li>
<li>userspace-rcu (<a href="https://github.com/urcu/userspace-rcu/blob/v0.13.2/ChangeLog">0.14.0</a>)</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/releases/tag/v2.38.1">2.38.1</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/commits/v9.0.1678">9.0.1678</a> includes (<a href="https://github.com/vim/vim/commits/v9.0.1677">9.0.1677</a>, <a href="https://github.com/vim/vim/commits/v9.0.1503">9.0.1503</a>))</li>
<li>wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00003.html">1.21.4</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/commit/bac7108b01cfd54c517444efa1239e10e6edd5a4">5.5.17</a>)</li>
<li>xfsprogs (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.4.0">6.4.0</a> (includes (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.3.0">6.3.0</a>))</li>
<li>XZ utils (<a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=2f4d35adca6198671434d2988803cc9316ad1ec8;hb=dbb3a536ed9873ffa0870321f6873e564c6a9da8">5.4.3</a>)</li>
<li>zstandard (<a href="https://github.com/facebook/zstd/releases/tag/v1.5.5">1.5.5</a>)</li>
<li>AWS: amazon-ssm-agent (<a href="https://github.com/aws/amazon-ssm-agent/releases/tag/3.2.985.0">3.2.985.0</a>)</li>
<li>SDK: file (<a href="https://github.com/file/file/blob/FILE5_45/ChangeLog">5.45</a>)</li>
<li>SDK: gnuconfig (<a href="https://git.savannah.gnu.org/cgit/config.git/log/?id=d4e37b5868ef910e3e52744c34408084bb13051c">20230731</a>)</li>
<li>SDK: kexec-tools (<a href="https://github.com/horms/kexec-tools/releases/tag/v2.0.24">2.0.24</a>)</li>
<li>SDK: man-db (<a href="https://gitlab.com/man-db/man-db/-/tags/2.11.2">2.11.2</a>)</li>
<li>SDK: man-pages (<a href="https://lore.kernel.org/lkml/d56662b2-538c-7252-9052-8afbf325f843@gmail.com/T/">6.03</a>)</li>
<li>SDK: pahole (<a href="https://github.com/acmel/dwarves/blob/master/changes-v1.25">1.25</a>)</li>
<li>SDK: perf (<a href="https://kernelnewbies.org/LinuxChanges#Linux_6.3.Tracing.2C_perf_and_BPF">6.3</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/perl5361delta">5.36.1</a>)</li>
<li>SDK: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.49">3.0.49</a> (includes <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.46">3.0.46</a>))</li>
<li>SDK: python (<a href="https://www.python.org/downloads/release/python-3115/">3.11.5</a> (includes <a href="https://www.python.org/downloads/release/python-3113/">3.11.3</a>, <a href="https://www.python.org/downloads/release/python-31012/">3.10.12</a>, <a href="https://www.python.org/downloads/release/python-31011/">3.10.11</a>))</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/8.0">8.0.4</a> (includes <a href="https://wiki.qemu.org/ChangeLog/8.0">8.0.3</a>, <a href="https://wiki.qemu.org/ChangeLog/7.2">7.2.3</a>))</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.72.0">1.72.0</a> (includes (<a href="https://github.com/rust-lang/rust/releases/tag/1.71.1">1.71.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.71.0">1.71.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.70.0">1.70.0</a>))</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0">12.3.0</a> (includes <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.5">12.2.5</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.6</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.55</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3732.1.0"/>
    <published>2023-10-05T10:00:33+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3602.1.6</id>
    <title>3602.1.6</title>
    <updated>2026-03-09T16:26:27.554960+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3602.1.5</strong></em></p>
<h4>Changes:</h4>
<ul>
<li>Azure: Add support for Microsoft Azure Network Adapter (MANA) NICs on Azure (<a href="https://github.com/flatcar/scripts/pull/1131">scripts#1131</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/944877">5.15.132</a> (includes <a href="https://lwn.net/Articles/943755">5.15.131</a>, <a href="https://lwn.net/Articles/943404">5.15.130</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_93.html">3.93</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.132</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.1.6"/>
    <published>2023-09-21T11:36:01+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3602.1.5</id>
    <title>3602.1.5</title>
    <updated>2026-03-09T16:26:27.550341+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3602.1.4</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed the restart of Systemd services when the main process is being killed by a SIGHUP signal (<a href="https://github.com/flatcar/Flatcar/issues/1157">flatcar#1157</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/943113">5.15.129</a> (includes <a href="https://lwn.net/Articles/942866">5.15.128</a>, <a href="https://lwn.net/Articles/941775">5.15.127</a>, <a href="https://lwn.net/Articles/941296">5.15.126</a>, <a href="https://lwn.net/Articles/940801">5.15.125</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.129</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.1.5"/>
    <published>2023-09-06T13:18:11+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3602.1.4</id>
    <title>3602.1.4</title>
    <updated>2026-03-09T16:26:27.545126+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3602.1.3</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48502">CVE-2022-48502</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2898">CVE-2023-2898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38432">CVE-2023-38432</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863</a>)</li>
<li>OpenSSH (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408</a>)</li>
<li>linux-firmware (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/940339">5.15.124</a> (includes <a href="https://lwn.net/Articles/939424">5.15.123</a>, <a href="https://lwn.net/Articles/939104">5.15.122</a>, <a href="https://lwn.net/Articles/939016">5.15.121</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_92.html">3.92</a>)</li>
<li>linux-firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625">20230625</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.124</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.1.4"/>
    <published>2023-08-09T11:43:20+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3602.1.3</id>
    <title>3602.1.3</title>
    <updated>2026-03-09T16:26:27.541168+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3602.1.2</strong></em></p>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/937404">5.15.120</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.120</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.1.3"/>
    <published>2023-07-18T08:59:31+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3602.1.2</id>
    <title>3602.1.2</title>
    <updated>2026-03-09T16:26:27.536918+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3602.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3338">CVE-2023-3338</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured that the folder <code>/var/log/sssd</code> is created if it doesn't exist, required for <code>sssd.service</code> (<a href="https://github.com/flatcar/Flatcar/issues/1096">Flatcar#1096</a>)</li>
<li>Worked around a bash regression in <code>flatcar-install</code> and added error reporting for disk write failures (<a href="https://github.com/flatcar/Flatcar/issues/1059">Flatcar#1059</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Changed ext4 inode size of root partition to 256 bytes. This improves compatibility with applications and is necessary for 2038 readiness (<a href="https://github.com/flatcar/Flatcar/issues/1082">Flatcar#1082</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/936675">5.15.119</a> (includes <a href="https://lwn.net/Articles/935584">5.15.118</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_91.html">3.91</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.119</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.1.2"/>
    <published>2023-07-06T12:15:43+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3602.1.1</id>
    <title>3602.1.1</title>
    <updated>2026-03-09T16:26:27.532465+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3602.1.0</strong></em></p>
<h4>Bug fixes:</h4>
<ul>
<li>Resolved the conflicting FD usage of libselinux and systemd which caused, e.g., a systemd crash on certain watchdog interaction during shutdown (patch in systemd 252.11)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/934622">5.15.117</a> (includes <a href="https://lwn.net/Articles/934320">5.15.116</a>, <a href="https://lwn.net/Articles/933909">5.15.115</a>, <a href="https://lwn.net/Articles/933280">5.15.114</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90.html">3.90</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v252.11">252.11</a> (from 252.5))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.117</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.1.1"/>
    <published>2023-06-21T12:17:56+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3602.1.0</id>
    <title>3602.1.0</title>
    <updated>2026-03-09T16:26:27.524692+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3572.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48425">CVE-2022-48425</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400</a>)</li>
<li>OpenSSH (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28531">CVE-2023-28531</a>)</li>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1255">CVE-2023-1255</a>)</li>
<li>bash (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27533">CVE-2023-27533</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27534">CVE-2023-27534</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27537">CVE-2023-27537</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27538">CVE-2023-27538</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Restored the reboot warning and delay for non-SSH console sessions (<a href="https://github.com/flatcar/locksmith/pull/21">locksmith#21</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Changed coreos-cloudinit to now set the short hostname instead of the FQDN when fetched from the metadata service (<a href="https://github.com/flatcar/coreos-cloudinit/pull/19">coreos-cloudinit#19</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/932883">5.15.113</a> (includes <a href="https://lwn.net/Articles/932134">5.15.112</a>))</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.19.9">1.19.9</a>)</li>
<li>OpenSSH (<a href="http://www.openssh.com/releasenotes.html#9.3">9.3</a>)</li>
<li>bash (<a href="https://lists.gnu.org/archive/html/bash-announce/2022-09/msg00000.html">5.2</a>)</li>
<li>bpftool (<a href="https://kernelnewbies.org/LinuxChanges#Linux_6.2.Tracing.2C_perf_and_BPF">6.2.1</a>)</li>
<li>c-ares (<a href="https://c-ares.org/changelog.html#1_19_0">1.19.0</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.21">1.6.21</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#8_0_1">8.0.1</a>)</li>
<li>e2fsprogs (<a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html##1.47.0">1.47.0</a>)</li>
<li>gdb (<a href="https://lwn.net/Articles/923819/">13.1.90</a>)</li>
<li>GLib (<a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.6">2.74.6</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.6.2">3.6.2</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.4">2.10.4</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/commits/0.9.4">0.9.4</a>)</li>
<li>pinentry (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=c080b34e57d01a6ccca9d2996d7096c42b1a3f84;hb=8ab1682e80a2b4185ee9ef66cbb44340245966fc">1.2.1</a>)</li>
<li>readline (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-09/msg00013.html">8.2</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.7">1.1.7</a>)</li>
<li>sqlite (<a href="https://sqlite.org/releaselog/3_41_2.html">3.41.2</a>)</li>
<li>XZ utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.2">5.4.2</a>)</li>
<li>SDK: nano (<a href="https://git.savannah.gnu.org/cgit/nano.git/tree/NEWS?h=v7.2">7.2</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3602.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48425">CVE-2022-48425</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/932883">5.15.113</a> (includes <a href="https://lwn.net/Articles/932134">5.15.112</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.113</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.1.0"/>
    <published>2023-06-01T11:51:22+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3572.1.0</id>
    <title>3572.1.0</title>
    <updated>2026-03-09T16:26:27.515998+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3549.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28841">CVE-2023-28841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28842">CVE-2023-28842</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642</a>)</li>
<li>tar (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1175">CVE-2023-1175</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1170">CVE-2023-1170</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed a miscompilation of getfacl causing it to dump core when executed (<a href="https://github.com/flatcar/scripts/pull/809">scripts#809</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Improved the OS reset tool to offer preview, backup and restore (<a href="https://github.com/flatcar/init/pull/94">init#94</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/931680">5.15.111</a> (includes <a href="https://lwn.net/Articles/930600">5.15.110</a>, <a href="https://lwn.net/Articles/930263">5.15.109</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230404">20230404</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89_1.html">3.89.1</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.20">1.6.20</a>)</li>
<li>docker (<a href="https://docs.docker.com/engine/release-notes/20.10/#201024">20.10.24</a>)</li>
<li>go (<a href="https://go.dev/doc/devel/release#go1.19.8">1.19.8</a>)</li>
<li>iperf (<a href="https://github.com/esnet/iperf/blob/3.13/RELNOTES.md">3.13</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.5">1.1.5</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v9.0.1403">9.0.1403</a>)</li>
<li>zstandard (<a href="https://github.com/facebook/zstd/releases/tag/v1.5.4">1.5.4</a>)</li>
<li>SDK: pahole (<a href="https://github.com/acmel/dwarves/releases/tag/v1.24">1.24</a>)</li>
<li>SDK: rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.68.2">1.68.2</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3572.0.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed a miscompilation of getfacl causing it to dump core when executed (<a href="https://github.com/flatcar/scripts/pull/809">scripts#809</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/931680">5.15.111</a> (includes <a href="https://lwn.net/Articles/930600">5.15.110</a>, <a href="https://lwn.net/Articles/930263">5.15.109</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89_1.html">3.89.1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.20</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.111</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3572.1.0"/>
    <published>2023-05-16T10:20:20+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3549.1.1</id>
    <title>3549.1.1</title>
    <updated>2026-03-09T16:26:27.508794+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3549.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31607">CVE-2022-31607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31608">CVE-2022-31608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31615">CVE-2022-31615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34665">CVE-2022-34665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34666">CVE-2022-34666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34670">CVE-2022-34670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34673">CVE-2022-34673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34674">CVE-2022-34674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34676">CVE-2022-34676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34677">CVE-2022-34677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34678">CVE-2022-34678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34679">CVE-2022-34679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34680">CVE-2022-34680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34682">CVE-2022-34682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34684">CVE-2022-34684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42254">CVE-2022-42254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42255">CVE-2022-42255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42256">CVE-2022-42256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42257">CVE-2022-42257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42258">CVE-2022-42258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42259">CVE-2022-42259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42260">CVE-2022-42260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42261">CVE-2022-42261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42263">CVE-2022-42263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42264">CVE-2022-42264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42265">CVE-2022-42265</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed systemd journal logs persistency on the first boot (<a href="https://github.com/flatcar/Flatcar/issues/1005">flatcar#1005</a>)</li>
<li>Fixed the broken emerge-gitclone in the dev-container owing to the missing migration action around the unification of the Flatcar core repositories</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>The package upgrade for nvidia-drivers might result in not supporting a few of the older NVIDIA Tesla GPUs. If you are facing issues, set <code>NVIDIA_DRIVER_VERSION=460.106.00</code> in <code>/etc/flatcar/nvidia-metadata</code></li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/929679/">5.15.108</a> (includes <a href="https://lwn.net/Articles/929015/">5.15.107</a>))</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-525-105-17/index.html">525.105.17</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.19</li>
<li>docker 20.10.23</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.108</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3549.1.1"/>
    <published>2023-04-25T13:37:33+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3549.1.0</id>
    <title>3549.1.0</title>
    <updated>2026-03-09T16:26:27.493460+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3510.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23004">CVE-2023-23004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25153">CVE-2023-25153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23914">CVE-2023-23914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23915">CVE-2023-23915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23916">CVE-2023-23916</a>)</li>
<li>e2fsprogs (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946</a>)</li>
<li>GnuTLS (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0361">CVE-2023-0361</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24532">CVE-2023-24532</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38090">CVE-2022-38090</a>)</li>
<li>less (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-46663">CVE-2022-46663</a>)</li>
<li>OpenSSH (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25136">CVE-2023-25136</a>)</li>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4203">CVE-2022-4203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0216">CVE-2023-0216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0217">CVE-2023-0217</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0401">CVE-2023-0401</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0288">CVE-2023-0288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0433">CVE-2023-0433</a>)</li>
<li>SDK: dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934</a>)</li>
<li>SDK: pkgconf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24056">CVE-2023-24056</a>)</li>
<li>SDK: python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured that <code>/var/log/journal/</code> is created early enough for systemd-journald to persist the logs on first boot (<a href="https://github.com/flatcar/bootengine/pull/60">bootengine#60</a>, <a href="https://github.com/flatcar/baselayout/pull/29">baselayout#29</a>)</li>
<li>Fixed <code>journalctl --user</code> permission issue (<a href="https://github.com/flatcar/Flatcar/issues/989">Flatcar#989</a>)</li>
<li>Restored the support to specify OEM partition files in Ignition when <code>/usr/share/oem</code> is given as initrd mount point (<a href="https://github.com/flatcar/bootengine/pull/58">bootengine#58</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added a new <code>flatcar-reset</code> tool and boot logic for selective OS resets to reconfigure the system with Ignition while avoiding config drift (<a href="https://github.com/flatcar/bootengine/pull/55">bootengine#55</a>, <a href="https://github.com/flatcar/init/pull/91">init#91</a>)</li>
<li>Added new image signing pub key to <code>flatcar-install</code>, needed for download verification of releases built from July 2023 onwards, if you have copies of <code>flatcar-install</code> or the image signing pub key, you need to update them as well (<a href="https://github.com/flatcar/init/pull/92">init#92</a>)</li>
<li>Added <code>pigz</code> to the image, a parallel gzip implementation, which is useful to speed up the (de)compression for large container image imports/exports (<a href="https://github.com/flatcar/coreos-overlay/pull/2504">coreos-overlay#2504</a>)</li>
<li>Enabled elfutils support in systemd-coredump. A backtrace will now appear in the journal for any program that dumps core (<a href="https://github.com/flatcar/coreos-overlay/pull/2489">coreos-overlay#2489</a>)</li>
<li><code>/etc</code> is now set up as overlayfs with the original <code>/etc</code> folder being the store for changed files/directories and <code>/usr/share/flatcar/etc</code> providing the lower default directory tree (<a href="https://github.com/flatcar/bootengine/pull/53">bootengine#53</a>, <a href="https://github.com/flatcar/scripts/pull/666">scripts#666</a>)</li>
<li>On boot any files in <code>/etc</code> that are the same as provided by the booted <code>/usr/share/flatcar/etc</code> default for the overlay mount on <code>/etc</code> are deleted to ensure that future updates of <code>/usr/share/flatcar/etc</code> are propagated - to opt out create <code>/etc/.no-dup-update</code> in case you want to keep an unmodified config file as is or because you fear that a future Flatcar version may use the same file as you at which point your copy is cleaned up and any other future Flatcar changes would be applied (<a href="https://github.com/flatcar/bootengine/pull/54">bootengine#54</a>)</li>
<li>Specifying the OEM filesystem in Ignition to write files to <code>/usr/share/oem</code> is not needed anymore (<a href="https://github.com/flatcar/bootengine/pull/58">bootengine#58</a>)</li>
<li>Switched systemd log reporting to the combined format of both unit description, as before, and now the unit name to easily find the unit (<a href="https://github.com/flatcar/coreos-overlay/pull/2436">coreos-overlay#2436</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/928343">5.15.106</a> (includes <a href="https://lwn.net/Articles/927860">5.15.105</a>, <a href="https://lwn.net/Articles/926873">5.15.104</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.103">5.15.103</a> <a href="https://lwn.net/Articles/925991">5.15.102</a>, <a href="https://lwn.net/Articles/925939">5.15.101</a>, <a href="https://lwn.net/Articles/925913">5.15.100</a>, <a href="https://lwn.net/Articles/925844">5.15.99</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230310">20230310</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230210">20230210</a>))</li>
<li>bind tools (<a href="https://bind9.readthedocs.io/en/v9_16_37/notes.html#notes-for-bind-9-16-37">9.16.37</a>)</li>
<li>btrfs-progs (<a href="https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2-2022-11-24">6.0.2</a> (includes <a href="https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2022-10-11">6.0</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89.html">3.89</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.19">1.6.19</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.6.18">1.6.18</a>))</li>
<li>curl (<a href="https://curl.se/changes.html#7_88_1">7.88.1</a> (includes <a href="https://curl.se/changes.html#7_88_0">7.88.0</a>))</li>
<li>diffutils (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10282">3.9</a>)</li>
<li>e2fsprogs (<a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.6">1.46.6</a>)</li>
<li>findutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00003.html">4.9.0</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.19.7">1.19.7</a> (includes <a href="https://go.dev/doc/devel/release#go1.19.6">1.19.6</a>))</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-12/changes.html">12.2.1</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.39.2/Documentation/RelNotes/2.39.2.txt">2.39.2</a>)</li>
<li>GLib (<a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.5">2.74.5</a>)</li>
<li>GnuTLS (<a href="https://gitlab.com/gnutls/gnutls/-/blob/3.8.0/NEWS">3.8.0</a>)</li>
<li>ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2150-2023-02-21">2.15.0</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214">20230214</a>)</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20221126">20221126</a>)</li>
<li>less (<a href="http://www.greenwoodsoftware.com/less/news.608.html">608</a>)</li>
<li>libpcap (<a href="https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.3:/CHANGES">1.10.3</a> (includes <a href="https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.2:/CHANGES">1.10.2</a>))</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.42/NEWS">10.42</a>)</li>
<li>OpenSSH (<a href="http://www.openssh.com/releasenotes.html#9.2">9.2</a>)</li>
<li>OpenSSL (<a href="https://github.com/openssl/openssl/blob/openssl-3.0.8/NEWS.md#major-changes-between-openssl-307-and-openssl-308-7-feb-2023">3.0.8</a>)</li>
<li>qemu guest agent (<a href="https://wiki.qemu.org/ChangeLog/7.1#Guest_agent">7.1.0</a>)</li>
<li>socat (<a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.4:/CHANGES">1.7.4.4</a>)</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.1">6.1</a>)</li>
<li>traceroute (2.1.1)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v9.0.1363">9.0.1363</a>)</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.25/release/3.25.html">3.25.2</a>)</li>
<li>SDK: dnsmasq (<a href="https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q1/016859.html">2.89</a>)</li>
<li>SDK: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.44">3.0.44</a>)</li>
<li>SDK: python (<a href="https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-10-final">3.10.10</a> (includes <a href="https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-9-final">3.10.9</a>, <a href="https://www.python.org/downloads/release/python-3100/">3.10</a>))</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.68.0">1.68.0</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.67.1">1.67.1</a>))</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.0">12.2.0</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3549.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured that <code>/var/log/journal/</code> is created early enough for systemd-journald to persist the logs on first boot (<a href="https://github.com/flatcar/bootengine/pull/60">bootengine#60</a>, <a href="https://github.com/flatcar/baselayout/pull/29">baselayout#29</a>)</li>
<li>Fixed <code>journalctl --user</code> permission issue (<a href="https://github.com/flatcar/Flatcar/issues/989">Flatcar#989</a>)</li>
</ul>
<h4>Changes:</h4>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/928343">5.15.106</a> (includes <a href="https://lwn.net/Articles/927860">5.15.105</a>, <a href="https://lwn.net/Articles/926873">5.15.104</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.19</li>
<li>docker 20.10.23</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.106</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3549.1.0"/>
    <published>2023-04-17T13:18:23+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3510.1.0</id>
    <title>3510.1.0</title>
    <updated>2026-03-09T16:26:27.480642+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3493.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27672">CVE-2022-27672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43551">CVE-2022-43551</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552</a>)</li>
<li>sudo (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0049">CVE-2023-0049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0051">CVE-2023-0051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0054">CVE-2023-0054</a>)</li>
<li>SDK: qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4172">CVE-2022-4172</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Excluded the special Kubernetes network interfaces <code>nodelocaldns</code> and <code>kube-ipvs0</code> from being managed with systemd-networkd which interfered with the setup (<a href="https://github.com/flatcar/init/pull/89">init#89</a>).</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/925080">5.15.98</a> (includes <a href="https://lwn.net/Articles/925064">5.15.97</a>, <a href="https://lwn.net/Articles/924441">5.15.96</a>, <a href="https://lwn.net/Articles/924073">5.15.95</a>, <a href="https://lwn.net/Articles/923308">5.15.94</a>, <a href="https://lwn.net/Articles/922814">5.15.93</a>))</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201023">20.10.23</a>)</li>
<li>bind tools (<a href="https://bind9.readthedocs.io/en/v9_16_36/notes.html#notes-for-bind-9-16-36">9.16.36</a> (includes <a href="https://bind9.readthedocs.io/en/v9_16_35/notes.html#notes-for-bind-9-16-34">9.16.34</a> and <a href="https://bind9.readthedocs.io/en/v9_16_34/notes.html#notes-for-bind-9-16-35">9.16.35</a>))</li>
<li>bpftool (<a href="https://lwn.net/Articles/909678/">5.19.12</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_88_1.html">3.88.1</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.16">1.6.16</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_87_0">7.87.0</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.39.1/Documentation/RelNotes/2.39.1.txt">2.39.1</a> (includes <a href="https://github.com/git/git/blob/v2.39.0/Documentation/RelNotes/2.39.0.txt">2.39.0</a>))</li>
<li>iptables (<a href="https://www.netfilter.org/projects/iptables/files/changes-iptables-1.8.8.txt">1.8.8</a>)</li>
<li>sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p2">1.9.12_p2</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v252.5">252.5</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v9.0.1157">9.0.1157</a>)</li>
<li>XZ utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.1">5.4.1</a> (includes <a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.0">5.4.0</a>))</li>
<li>SDK: boost (<a href="https://www.boost.org/users/history/version_1_81_0.html">1.81.0</a>)</li>
<li>SDK: file (<a href="https://github.com/file/file/blob/FILE5_44/ChangeLog">5.44</a>)</li>
<li>SDK: portage (<a href="https://github.com/gentoo/portage/blob/portage-3.0.43/NEWS">3.0.43</a> (includes <a href="https://github.com/gentoo/portage/blob/portage-3.0.42/NEWS">3.0.42</a>))</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/7.2">7.2.0</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.67.0">1.67.0</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3510.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27672">CVE-2022-27672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Excluded the special Kubernetes network interfaces <code>nodelocaldns</code> and <code>kube-ipvs0</code> from being managed with systemd-networkd which interfered with the setup (<a href="https://github.com/flatcar/init/pull/89">init#89</a>).</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/925080">5.15.98</a> (includes <a href="https://lwn.net/Articles/925064">5.15.97</a>, <a href="https://lwn.net/Articles/924441">5.15.96</a>, <a href="https://lwn.net/Articles/924073">5.15.95</a>, <a href="https://lwn.net/Articles/923308">5.15.94</a>, <a href="https://lwn.net/Articles/922814">5.15.93</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.98</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.1.0"/>
    <published>2023-03-07T15:23:17+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3493.1.0</id>
    <title>3493.1.0</title>
    <updated>2026-03-09T16:26:27.468776+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3446.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4129">CVE-2022-4129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4842">CVE-2022-4842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23471">CVE-2022-23471</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903</a>)</li>
<li>glib (<a href="https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835">fixes to normal form handling in GVariant</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36227">CVE-2022-36227</a>)</li>
<li>systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3821">CVE-2022-3821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4415">CVE-2022-4415</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3491">CVE-2022-3491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3520">CVE-2022-3520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3591">CVE-2022-3591</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4141">CVE-2022-4141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4292">CVE-2022-4292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4293">CVE-2022-4293</a>)</li>
<li>SDK: Python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3654">CVE-2021-3654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061</a>)</li>
<li>SDK: qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14394">CVE-2020-14394</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0216">CVE-2022-0216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3872">CVE-2022-3872</a>)</li>
<li>SDK: rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-46176">CVE-2022-46176</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/922340">5.15.92</a> (includes <a href="https://lwn.net/Articles/921851">5.15.91</a>, <a href="https://lwn.net/Articles/921029">5.15.90</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230117">20230117</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/20.10/#201022">20.10.22</a>)</li>
<li>adcli (<a href="https://gitlab.freedesktop.org/realmd/adcli/-/commits/8e88e3590a19006362ea8b8dfdc18bb88b3cb3b5/">0.9.2</a>)</li>
<li>binutils (<a href="https://sourceware.org/pipermail/binutils/2022-August/122246.html">2.39</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.15">1.6.15</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.6.14">1.6.14</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.13">1.6.13</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.12">1.6.12</a>))</li>
<li>cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.24.2">1.24.2</a>)</li>
<li>elfutils (<a href="https://sourceware.org/pipermail/elfutils-devel/2022q4/005561.html">0.188</a> (includes <a href="https://sourceware.org/pipermail/elfutils-devel/2022q2/004978.html">0.187</a>)</li>
<li>file (<a href="https://mailman.astron.com/pipermail/file/2022-September/000857.html">5.43</a>)</li>
<li>gawk (<a href="https://lists.gnu.org/archive/html/help-gawk/2022-11/msg00008.html">5.2.1</a> (includes <a href="https://lists.gnu.org/archive/html/help-gawk/2022-09/msg00000.html">5.2.0</a>))</li>
<li>git (<a href="https://github.com/git/git/blob/v2.38.3/Documentation/RelNotes/2.38.3.txt">2.38.3</a>)</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.4">2.74.4</a>)</li>
<li>GNU C Library (<a href="https://sourceware.org/pipermail/libc-alpha/2022-August/141193.html">2.36</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.19.5">1.19.5</a>)</li>
<li>I2C tools (<a href="https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/tree/CHANGES?id=d8bc1f1ff4b00a6bd988aa114100ae9b787f50d8">4.3</a>)</li>
<li>Intel Microcode Package (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20221108">20221108</a>)</li>
<li>libcap-ng (<a href="https://people.redhat.com/sgrubb/libcap-ng/ChangeLog">0.8.3</a>)</li>
<li>libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.4">2.5.4</a> (includes <a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.2">2.5.2</a>, <a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.3">2.5.3</a>))</li>
<li>MIT Kerberos V (<a href="https://web.mit.edu/kerberos/krb5-1.20/krb5-1.20.1.html">1.20.1</a>)</li>
<li>nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/blob/990abad16ceacd070747dcc76ed16a39c129321e/ChangeLog">3.8.1</a>)</li>
<li>rsync (<a href="https://download.samba.org/pub/rsync/NEWS#3.2.7">3.2.7</a>)</li>
<li>shadow (<a href="https://github.com/shadow-maint/shadow/releases/tag/4.13">4.13</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_40_1.html">3.40.1</a> (includes <a href="https://www.sqlite.org/releaselog/3_40_0.html">3.40.0</a>))</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/commits/v251.10">251.10</a> (includes <a href="https://github.com/systemd/systemd/releases/tag/v251">251</a>))</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v9.0.1000">9.0.1000</a>)</li>
<li>XZ utils (<a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=d92fa88a835180af5d6ff22ad0e240d6468f81af;hb=f7c2cc55618b9af3318f0c908cf8db0df1e28e7c">5.2.10</a>)</li>
<li>OEM: python-oem (<a href="https://www.python.org/downloads/release/python-3916/">3.9.16</a>)</li>
<li>SDK: libpng (<a href="http://www.libpng.org/pub/png/src/libpng-1.6.39-README.txt">1.6.39</a> (includes <a href="http://www.libpng.org/pub/png/src/libpng-1.6.38-README.txt">1.6.38</a>))</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/5.36.0/perldelta">5.36.0</a>)</li>
<li>SDK: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.41">3.0.41</a>)</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/7.1">7.1.0</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.66.1">1.66.1</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3493.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4129">CVE-2022-4129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4842">CVE-2022-4842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/922340">5.15.92</a> (includes <a href="https://lwn.net/Articles/921851">5.15.91</a>, <a href="https://lwn.net/Articles/921029">5.15.90</a>))</li>
<li>cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.24.2">1.24.2</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.15</li>
<li>docker 20.10.22</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.92</li>
<li>systemd 251</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3493.1.0"/>
    <published>2023-02-16T13:07:54+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3446.1.1</id>
    <title>3446.1.1</title>
    <updated>2026-03-09T16:26:27.461347+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3446.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0210">CVE-2023-0210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed a regression (in Alpha/Beta) where machines failed to boot if they didn't have the <code>core</code> user or group in <code>/etc/passwd</code> or <code>/etc/group</code> (<a href="https://github.com/flatcar/baselayout/pull/26">baselayout#26</a>)</li>
</ul>
<h4>Changes:</h4>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/920321">5.15.89</a> (includes <a href="https://lwn.net/Articles/920012">5.15.88</a>, <a href="https://lwn.net/Articles/919793">5.15.87</a>))</li>
<li>git (<a href="https://github.com/git/git/blob/v2.37.5/Documentation/RelNotes/2.37.5.txt">2.37.5</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.10</li>
<li>docker 20.10.21</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.89</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3446.1.1"/>
    <published>2023-01-24T13:16:19+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3446.1.0</id>
    <title>3446.1.0</title>
    <updated>2026-03-09T16:26:27.454019+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3432.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3534">CVE-2022-3534</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3545">CVE-2022-3545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3643">CVE-2022-3643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934</a>)</li>
<li>sudo (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43995">CVE-2022-43995</a>)</li>
<li>libksba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added back Ignition support for Vagrant (<a href="https://github.com/flatcar/coreos-overlay/pull/2351">coreos-overlay#2351</a>)</li>
<li>The rootfs setup in the initrd now runs systemd-tmpfiles on every boot, not only when Ignition runs, to fix a dbus failure due to missing files (<a href="https://github.com/flatcar/Flatcar/issues/944">Flatcar#944</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/918808">5.15.86</a> (includes <a href="https://lwn.net/Articles/918329">5.15.85</a>, <a href="https://lwn.net/Articles/918206">5.15.84</a>, <a href="https://lwn.net/Articles/917896">5.15.83</a>, <a href="https://lwn.net/Articles/917400">5.15.82</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_87.html">3.87</a>)</li>
<li>sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p1">1.9.12_p1</a>)</li>
<li>GnuTLS (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2022-September/004765.html">3.7.8</a>)</li>
<li>XZ utils (<a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=c244b42a6771a6e8af206318dfc500d78929fd6f;hb=5476089d9c42b9b04e92b80e1800b384a98265cb">5.2.8</a>)</li>
<li>gettext (<a href="https://git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob;f=NEWS;h=cdbb16746c23555e70bb1e16917f5c349ce92d9e;hb=8b38ee827251cadbb90cb6cb576ae98702566288">0.21.1</a>)</li>
<li>libksba (<a href="https://dev.gnupg.org/T6304">1.6.3</a>)</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.5">12.1.5</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3446.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3534">CVE-2022-3534</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3545">CVE-2022-3545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3643">CVE-2022-3643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934</a>)</li>
<li>libksba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added back Ignition support for Vagrant (<a href="https://github.com/flatcar/coreos-overlay/pull/2351">coreos-overlay#2351</a>)</li>
<li>The rootfs setup in the initrd now runs systemd-tmpfiles on every boot, not only when Ignition runs, to fix a dbus failure due to missing files (<a href="https://github.com/flatcar/Flatcar/issues/944">Flatcar#944</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/918808">5.15.86</a> (includes <a href="https://lwn.net/Articles/918329">5.15.85</a>, <a href="https://lwn.net/Articles/918206">5.15.84</a>, <a href="https://lwn.net/Articles/917896">5.15.83</a>, <a href="https://lwn.net/Articles/917400">5.15.82</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_87.html">3.87</a>)</li>
<li>libksba (<a href="https://dev.gnupg.org/T6304">1.6.3</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.10</li>
<li>docker 20.10.21</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.86</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3446.1.0"/>
    <published>2023-01-11T13:32:59+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3432.1.0</id>
    <title>3432.1.0</title>
    <updated>2026-03-09T16:26:27.445982+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3417.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-169">CVE-2022-3169</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-521">CVE-2022-3521</a>)</li>
<li>cpio (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-8185">CVE-2021-38185</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2221">CVE-2022-32221</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2221">CVE-2022-35260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2221">CVE-2022-42915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2221">CVE-2022-42916</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3680">CVE-2022-43680</a>)</li>
<li>libksba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-515">CVE-2022-3515</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-705">CVE-2022-3705</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added support for hardware security keys in update-ssh-keys (<a href="https://github.com/flatcar/update-ssh-eys/pull/7">update-ssh-keys#7</a>)</li>
<li>Fix &quot;ext4 deadlock under heavy I/O load&quot; kernel issue. The patch for this is included provisionally while we wait for it to be merged pstream (<a href="https://github.com/flatcar/Flatcar/issues/847">Flatcar#847</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/2315">coreos-overlay#2315</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/916763">5.15.81</a> (includes <a href="https://lwn.net/Articles/916003">5.15.80</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221109">20221109</a>)</li>
<li>OpenSSH (<a href="http://www.openssh.com/releasenotes.html#9.1">9.1</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.10">1.6.10</a>)</li>
<li>cpio (<a href="https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html">2.13</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_86_0">7.86</a>)</li>
<li>Expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_5_0/expat/Changes">2.5.0</a>)</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.1">2.74.1</a>)</li>
<li>libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.d9ygdose5kw">2.66</a>)</li>
<li>libksba (<a href="https://dev.gnupg.org/T6230">1.6.2</a>)</li>
<li>sqlite (<a href="https://sqlite.org/releaselog/3_39_4.html">3.39.4</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v9.0.0828">9.0.0828</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/commit/ab10466cf2e1ec4887f6a44375c3e29c1720157f">5.5.14</a>)</li>
<li>XZ utils (<a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=0205423e79ce8297102096b0fc8b030ddf5b2023;hb=d24a57b7fc7e5e9267b84367cb0788d3acf7f569">5.2.7</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-ang/rust/releases/tag/1.65.0">1.65.0</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3432.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3169">CVE-2022-3169</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3521">CVE-2022-3521</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fix &quot;ext4 deadlock under heavy I/O load&quot; kernel issue. The patch for this is included provisionally while we wait for it to be merged upstream (<a href="https://github.com/flatcar/Flatcar/issues/847">Flatcar#847</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/2315">coreos-overlay#2315</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/916763">5.15.81</a> (includes <a href="https://lwn.net/Articles/916003">5.15.80</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.10</li>
<li>docker 20.10.21</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.81</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3432.1.0"/>
    <published>2022-12-09T09:47:46+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3417.1.0</id>
    <title>3417.1.0</title>
    <updated>2026-03-09T16:26:27.437668+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3402.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3543">CVE-2022-3543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39260">CVE-2022-39260</a>)</li>
<li>multipath-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41973">CVE-2022-41973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed Ignition btrfs forced formatting for OEM partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2277">coreos-overlay#2277</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Toolbox now uses containerd to download and mount the image (<a href="https://github.com/flatcar/toolbox/pull/7">toolbox#7</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/915100">5.15.79</a> (includes <a href="https://lwn.net/Articles/914423">5.15.78</a>))</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201021">20.10.21</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.19.3">1.19.3</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_85.html">3.85</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.9">1.6.9</a>)</li>
<li>glibc (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10111">2.35</a>)</li>
<li>bpftool (<a href="https://lwn.net/Articles/907523/">5.19.8</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/master/Documentation/RelNotes/2.37.4.txt">2.37.4</a>)</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20211215">20211215</a>)</li>
<li>libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap?authuser=0#h.wfblevfzkj0">2.65</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/releases/tag/0.9.3">0.9.3</a>)</li>
<li>wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00017.html">1.21.3</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.13/debian/changelog">5.5.13</a>)</li>
<li>xz-utils (<a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=4c79b18ff26a1c479a920b21f07d050599c04c9e;hb=8dfed05bdaa4873833ba24279f02ad2db25effea">5.2.6</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3417.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3543">CVE-2022-3543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed Ignition btrfs forced formatting for OEM partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2277">coreos-overlay#2277</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/915100">5.15.79</a> (includes <a href="https://lwn.net/Articles/914423">5.15.78</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_85.html">3.85</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.9</li>
<li>docker 20.10.21</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.79</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3417.1.0"/>
    <published>2022-11-24T15:10:53+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3402.1.0</id>
    <title>3402.1.0</title>
    <updated>2026-03-09T16:26:27.423371+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3374.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3535">CVE-2022-3535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3542">CVE-2022-3542</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594</a>)</li>
<li>bind tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2881">CVE-2022-2881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2906">CVE-2022-2906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3080">CVE-2022-3080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252</a>)</li>
<li>dbus (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012</a>)</li>
<li>go (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715">CVE-2022-41715</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880">CVE-2022-2880</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879">CVE-2022-2879</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304</a>)</li>
<li>logrotate (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1348">CVE-2022-1348</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1725">CVE-2022-1725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2042">CVE-2022-2042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2124">CVE-2022-2124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2125">CVE-2022-2125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2126">CVE-2022-2126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2129">CVE-2022-2129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2175">CVE-2022-2175</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2182">CVE-2022-2182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2183">CVE-2022-2183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2206">CVE-2022-2206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2207">CVE-2022-2207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2208">CVE-2022-2208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2210">CVE-2022-2210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2231">CVE-2022-2231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2257">CVE-2022-2257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2264">CVE-2022-2264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2284">CVE-2022-2284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2285">CVE-2022-2285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2286">CVE-2022-2286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2287">CVE-2022-2287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2288">CVE-2022-2288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2289">CVE-2022-2289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2304">CVE-2022-2304</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2343">CVE-2022-2343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2344">CVE-2022-2344</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2345">CVE-2022-2345</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2522">CVE-2022-2522</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2816">CVE-2022-2816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2817">CVE-2022-2817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2819">CVE-2022-2819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2845">CVE-2022-2845</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2849">CVE-2022-2849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2862">CVE-2022-2862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2874">CVE-2022-2874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2889">CVE-2022-2889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2923">CVE-2022-2923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2946">CVE-2022-2946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2980">CVE-2022-2980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2982">CVE-2022-2982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3016">CVE-2022-3016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3099">CVE-2022-3099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3134">CVE-2022-3134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3153">CVE-2022-3153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3234">CVE-2022-3234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3235">CVE-2022-3235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3278">CVE-2022-3278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3256">CVE-2022-3256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3296">CVE-2022-3296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3297">CVE-2022-3297</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3324">CVE-2022-3324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3352">CVE-2022-3352</a>)</li>
<li>SDK: rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36113">CVE-2022-36113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36114">CVE-2022-36114</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Enabled IOMMU on arm64 kernels, the lack of which prevented some systems from booting (<a href="https://github.com/flatcar/coreos-overlay/pull/2235">coreos-overlay#2235</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added <code>CONFIG_NF_CONNTRACK_BRIDGE</code> (for nf_conntrack_bridge) and <code>CONFIG_NFT_BRIDGE_META</code> (for nft_meta_bridge) to the kernel config to allow using conntrack rules for bridges in nftables and to match on bridge interface names (<a href="https://github.com/flatcar/coreos-overlay/pull/2207">coreos-overlay#2207</a>)</li>
<li>Change CONFIG_WIREGUARD kernel option to module to save space on boot partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2239">coreos-overlay#2239</a>)</li>
<li>Disable several arch specific arm64 kernel config options for unsupported platforms to save space on boot partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2239">coreos-overlay#2239</a>)</li>
<li>Switched from <code>--strip-unneeded</code> to <code>--strip-debug</code> when installing kernel modules, which makes kernel stacktraces more accurate and makes debugging issues easier (<a href="https://github.com/flatcar/coreos-overlay/pull/2196">coreos-overlay#2196</a>)</li>
<li>The flatcar-update tool got two new flags to customize ports used on the host while updating flatcar (<a href="https://github.com/flatcar/init/pull/81">init#81</a>)</li>
<li>Add qemu-guest-agent to all amd64 images, it will be automatically enabled when qemu-ga virtio-port is detected (<a href="https://github.com/flatcar/coreos-overlay/pull/2240">coreos-overlay#2240</a>, <a href="https://github.com/flatcar/portage-stable/pull/373">portage-stable#373</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/913681">5.15.77</a> (includes <a href="https://lwn.net/Articles/912997">5.15.76</a>, <a href="https://lwn.net/Articles/912500">5.15.75</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221012">20221012</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201020">20.10.20</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#1.18.7">1.18.7</a>)</li>
<li>OpenSSL (<a href="https://www.openssl.org/news/openssl-3.0-notes.html">3.0.7</a>)</li>
<li>bind tools (<a href="https://gitlab.isc.org/isc-projects/bind9/-/raw/v9_16_33/CHANGES">9.16.33</a>)</li>
<li>bpftool (<a href="https://lwn.net/Articles/904957/">5.19.2</a>)</li>
<li>curl (<a href="https://curl.se/mail/archive-2022-08/0012.html">7.85</a>)</li>
<li>dbus (<a href="https://gitlab.freedesktop.org/dbus/dbus/-/raw/dbus-1.14.4/NEWS">1.14.4</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.37.3/Documentation/RelNotes/2.37.3.txt">2.37.3</a>)</li>
<li>glibc (<a href="https://sourceware.org/pipermail/libc-alpha/2021-August/129718.html">2.34</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3">2.10.3</a>)</li>
<li>logrotate (<a href="https://github.com/logrotate/logrotate/releases/tag/3.20.1">3.20.1</a>)</li>
<li>nmap (<a href="https://nmap.org/changelog.html#7.93">7.93</a>)</li>
<li>pahole (<a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.23">1.23</a>)</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v5.19">5.19</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v9.0.0655">9.0.0655</a>)</li>
<li>wireguard-tools (<a href="https://github.com/WireGuard/wireguard-tools/releases/tag/v1.0.20210914">1.0.20210914</a>)</li>
<li>zlib (<a href="https://github.com/madler/zlib/releases/tag/v1.2.13">1.2.13</a>)</li>
<li>SDK: catalyst (<a href="https://gitweb.gentoo.org/proj/catalyst.git/log/?h=3.0.21">3.0.21</a>)</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.23/release/3.23.html">3.23.3</a>)</li>
<li>SDK: libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.37">1.1.37</a>)</li>
<li>SDK: meson (<a href="https://mesonbuild.com/Release-notes-for-0-62-0.html">0.62.2</a>)</li>
<li>SDK: ninja (<a href="https://groups.google.com/g/ninja-build/c/R2oCyDctDf8/m/-U94Y5I8AgAJ?pli=1">1.11.0</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.64.0">1.64.0</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3402.0.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3535">CVE-2022-3535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3542">CVE-2022-3542</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/913681">5.15.77</a> (includes <a href="https://lwn.net/Articles/912997">5.15.76</a>, <a href="https://lwn.net/Articles/912500">5.15.75</a>))</li>
<li>OpenSSL (<a href="https://www.openssl.org/news/openssl-3.0-notes.html">3.0.7</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.8</li>
<li>docker 20.10.20</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.77</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3402.1.0"/>
    <published>2022-11-09T12:52:43+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3374.1.1</id>
    <title>3374.1.1</title>
    <updated>2026-03-09T16:26:27.415885+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3374.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.8</li>
<li>docker 20.10.18</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.74</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3374.1.1"/>
    <published>2022-11-01T13:15:45+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3374.1.0</id>
    <title>3374.1.0</title>
    <updated>2026-03-09T16:26:27.408205+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> Release <strong>3374.1.0</strong></p>
<p><em>Changes since <strong>Beta 3346.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2308">CVE-2022-2308</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36109">CVE-2022-36109</a>)</li>
<li>GNU Libtasn1 (<a href="https://bugs.gentoo.org/866237">Gentoo#866237</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21233">CVE-2022-21233</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2016-3709">CVE-2016-3709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309</a>)</li>
<li>polkit (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4115">CVE-2021-4115</a>)</li>
<li>rsync (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154</a>)</li>
<li>unzip (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0529">CVE-2022-0529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0530">CVE-2022-0530</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4217">CVE-2021-4217</a>)</li>
<li>zlib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>OpenStack: enabled <code>coreos-metadata-sshkeys@.service</code> to provision SSH keys from metadata. (<a href="https://github.com/flatcar/Flatcar/issues/817">Flatcar#817</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/2246">coreos-overlay#2246</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/911275/">5.15.74</a> (includes <a href="https://lwn.net/Articles/909679">5.15.71</a>, <a href="https://lwn.net/Articles/910398">5.15.72</a>, <a href="https://lwn.net/Articles/910957">5.15.73</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220913">20220913</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_84.html">3.84</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201018">20.10.18</a>)</li>
<li>GNU Libtasn1 (<a href="https://lists.gnu.org/archive/html/help-libtasn1/2022-08/msg00001.html">4.19.0</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220809">20220809</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.2">2.10.2</a>)</li>
<li>polkit (<a href="https://gitlab.freedesktop.org/polkit/polkit/-/commit/827b0ddac5b1ef00a47fca4526fcf057bee5f1db">121</a>)</li>
<li>rsync (<a href="https://github.com/WayneD/rsync/releases/tag/v3.2.6">3.2.6</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.4">1.1.4</a>)</li>
<li>unzip (<a href="https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-27_changelog">6.0_p27</a>)</li>
<li>SDK: libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.35">1.1.35</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3374.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2308">CVE-2022-2308</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>OpenStack: enabled <code>coreos-metadata-sshkeys@.service</code> to provision SSH keys from metadata. (<a href="https://github.com/flatcar/Flatcar/issues/817">Flatcar#817</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/2246">coreos-overlay#2246</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/911275/">5.15.74</a> (includes <a href="https://lwn.net/Articles/909679">5.15.71</a>, <a href="https://lwn.net/Articles/910398">5.15.72</a>, <a href="https://lwn.net/Articles/910957">5.15.73</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_84.html">3.84</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.8</li>
<li>docker 20.10.18</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.74</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3374.1.0"/>
    <published>2022-10-26T09:26:18+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/beta-3346.1.0</id>
    <title>3346.1.0</title>
    <updated>2026-03-09T16:26:27.392515+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3277.1.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0171">CVE-2022-0171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3061">CVE-2022-3061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3176">CVE-2022-3176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39842">CVE-2022-39842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40307">CVE-2022-40307</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32190">CVE-2022-32190</a>, (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189</a>))</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45078">CVE-2021-45078</a>)</li>
<li>cifs-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29869">CVE-2022-29869</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32205">CVE-2022-32205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32206">CVE-2022-32206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32207">CVE-2022-32207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187</a>)</li>
<li>gnupg (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2509">CVE-2022-2509</a>)</li>
<li>libtirpc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828</a>)</li>
<li>oniguruma (<a href="https://bugs.gentoo.org/841893">oniguruma-20220430</a>)</li>
<li>open-vm-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">CVE-2022-0629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">CVE-2022-0685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">CVE-2022-0714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">CVE-2022-0729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">CVE-2022-0943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">CVE-2022-1154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1160">CVE-2022-1160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1381">CVE-2022-1381</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">CVE-2022-1616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">CVE-2022-1619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">CVE-2022-1620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">CVE-2022-1621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">CVE-2022-1629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1674">CVE-2022-1674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">CVE-2022-1733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">CVE-2022-1735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1769">CVE-2022-1769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1771">CVE-2022-1771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">CVE-2022-1796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">CVE-2022-1898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1886">CVE-2022-1886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">CVE-2022-1851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1942">CVE-2022-1942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1968">CVE-2022-1968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2000">CVE-2022-2000</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added back <code>gettext</code> to the OS (<a href="https://github.com/flatcar-linux/Flatcar/issues/849">Flatcar#849</a>)</li>
<li>Added merging of Ignition systemd duplicated units when auto-translating from Ignition 2 to Ignition 3. (<a href="https://github.com/flatcar/coreos-overlay/pull/2187">coreos-overlay#2187</a>)</li>
<li>Equinix Metal: Fixed serial console settings for the <code>m3.small.x86</code> instance by expanding the GRUB check for <code>i386</code> to <code>x86_64</code> (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/2122">coreos-overlay#2122</a>)</li>
<li>Removed outdated LTS channel information printed on login (<a href="https://github.com/flatcar-linux/init/pull/75">init#75</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added symlink from <code>nc</code> to <code>ncat</code>. <code>-q</code> option is <a href="https://github.com/nmap/nmap/issues/2422">not yet supported</a> (<a href="https://github.com/flatcar-linux/Flatcar/issues/545">flatcar#545</a>)</li>
<li>emerge-gitclone: Migrate emerge-gitclone to use scripts repo tags and submodule refs</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/909212">5.15.70</a> (includes <a href="https://lwn.net/Articles/908782">5.15.69</a>, <a href="https://lwn.net/Articles/908140">5.15.68</a>, <a href="https://lwn.net/Articles/907526">5.15.67</a>, <a href="https://lwn.net/Articles/907524">5.15.66</a>, <a href="https://lwn.net/Articles/907204">5.15.65</a>, <a href="https://lwn.net/Articles/906630">5.15.64</a>, <a href="https://lwn.net/Articles/899370">5.15.51</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220815">20220815</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220708">20220708</a>))</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.18.6">1.18.6</a>)</li>
<li>adcli (<a href="https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.1">0.9.1</a>)</li>
<li>automake (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10055">1.16.5</a>)</li>
<li>binutils (<a href="https://lwn.net/Articles/884264/">2.38</a>)</li>
<li>bison (<a href="https://lists.gnu.org/archive/html/bug-bison/2021-09/msg00056.html">3.8.2</a>)</li>
<li>boost (<a href="https://www.boost.org/users/history/version_1_79_0.html">1.79</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_83.html">3.83</a>)</li>
<li>cifs-utils (<a href="https://lists.samba.org/archive/samba-technical/2022-April/137335.html">6.15</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.8">1.6.8</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.6.7">1.6.7</a>))</li>
<li>curl (<a href="https://github.com/curl/curl/releases/tag/curl-7_84_0">7.84.0</a>)</li>
<li>Cyrus SASL (<a href="https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28">2.1.28</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_9/expat/Changes">2.4.9</a>)</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-11/changes.html">11.3.0</a>)</li>
<li>gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-01/msg00009.html">11.2</a>)</li>
<li>gettext (<a href="https://www.gnu.org/software/gettext/">0.21</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.37.1/Documentation/RelNotes/2.37.1.txt">2.37.1</a>)</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.73.3">2.72.3</a>)</li>
<li>gnupg (<a href="https://dev.gnupg.org/T5928">2.2.35</a>)</li>
<li>gnutls (<a href="https://gitlab.com/gnutls/gnutls/-/tags/3.7.7">3.7.7</a>)</li>
<li>libtool (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10139">2.4.7</a>)</li>
<li>locksmith(<a href="https://github.com/flatcar/locksmith/blob/v0.7.0/CHANGELOG.md#v070--30112021">0.7.0</a>)</li>
<li>oniguruma (<a href="https://github.com/kkos/oniguruma/releases/tag/v6.9.8">6.9.8</a>)</li>
<li>perl (<a href="https://perldoc.perl.org/5.34.1/perldelta">5.34.1</a>)</li>
<li>pkgconf (<a href="https://gitea.treehouse.systems/ariadne/pkgconf/src/tag/pkgconf-1.8.0/NEWS">1.8.0</a>)</li>
<li>shadow (<a href="https://github.com/shadow-maint/shadow/releases/tag/4.12.3">4.12.3</a>)</li>
<li>sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_10">1.9.10</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v8.2.5066">8.2.5066</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.63.0">1.63.0</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.62.1">1.62.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.62.0">1.62.0</a>))</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.0">12.1.0</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3346.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0171">CVE-2022-0171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3061">CVE-2022-3061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3176">CVE-2022-3176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39842">CVE-2022-39842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40307">CVE-2022-40307</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32190">CVE-2022-32190</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added back <code>gettext</code> to the OS (<a href="https://github.com/flatcar-linux/Flatcar/issues/849">Flatcar#849</a>)</li>
<li>Added merging of Ignition systemd duplicated units when auto-translating from Ignition 2 to Ignition 3. (<a href="https://github.com/flatcar/coreos-overlay/pull/2187">coreos-overlay#2187</a>)</li>
<li>Equinix Metal: Fixed serial console settings for the <code>m3.small.x86</code> instance by expanding the GRUB check for <code>i386</code> to <code>x86_64</code> (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/2122">coreos-overlay#2122</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>emerge-gitclone: Migrate emerge-gitclone to use scripts repo tags and submodule refs</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/909212">5.15.70</a> (includes <a href="https://lwn.net/Articles/908782">5.15.69</a>, <a href="https://lwn.net/Articles/908140">5.15.68</a>, <a href="https://lwn.net/Articles/907526">5.15.67</a>, <a href="https://lwn.net/Articles/907524">5.15.66</a>, <a href="https://lwn.net/Articles/907204">5.15.65</a>, <a href="https://lwn.net/Articles/906630">5.15.64</a>))</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.18.6">1.18.6</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_83.html">3.83</a>)</li>
<li>gettext (<a href="https://www.gnu.org/software/gettext/">0.21</a>)</li>
<li>locksmith(<a href="https://github.com/flatcar/locksmith/blob/v0.7.0/CHANGELOG.md#v070--30112021">0.7.0</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_9/expat/Changes">2.4.9</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.8</li>
<li>docker 20.10.17</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.70</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3346.1.0"/>
    <published>2022-10-04T12:19:52+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3277.1.2</id>
    <title>3277.1.2</title>
    <updated>2026-03-09T16:26:27.383418+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3277.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>AWS: added EKS support for version 1.22 and 1.23. (<a href="https://github.com/flatcar/coreos-overlay/pull/2110">coreos-overlay#2110</a>, <a href="https://github.com/flatcar/Flatcar/issues/829">Flatcar#829</a>)</li>
<li>VMWare: excluded <code>wireguard</code> (and others) from <code>systemd-networkd</code> management. (<a href="https://github.com/flatcar/init/pull/80">init#80</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>The new image signing subkey was added to the public key embedded into <code>flatcar-install</code> (the old expired on 10th August 2022), only an updated <code>flatcar-install</code> script can verify releases signed with the new key (<a href="https://github.com/flatcar/init/pull/79">init#79</a>)</li>
<li>AWS: Added AWS IMDSv2 support to coreos-cloudinit (<a href="https://github.com/flatcar/coreos-cloudinit/pull/13">flatcar-linux/coreos-cloudinit#13</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/906061">5.15.63</a> (includes <a href="https://lwn.net/Articles/905533">5.15.62</a>, <a href="https://lwn.net/Articles/904959">5.15.61</a>, <a href="https://lwn.net/Articles/904461">5.15.60</a>, <a href="https://lwn.net/Articles/903688">5.15.59</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_82.html">3.82</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.6</li>
<li>docker 20.10.17</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.63</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3277.1.2"/>
    <published>2022-09-01T13:01:56+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3277.1.1</id>
    <title>3277.1.1</title>
    <updated>2026-03-09T16:26:27.378115+00:00</updated>
    <content type="html"><![CDATA[<p>New Beta Release 3277.1.1</p>
<p>Changes since Beta 3277.1.0</p>
<h2>Security fixes:</h2>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901</a>)</li>
</ul>
<h2>Bug fixes:</h2>
<ul>
<li>Added support for Openstack for cloud-init activation (<a href="https://github.com/flatcar/init/pull/76">flatcar-linux/init#76</a>)</li>
<li>Excluded Wireguard interface from <code>systemd-networkd</code> default management (<a href="https://github.com/flatcar/Flatcar/issues/808">Flatcar#808</a>)</li>
<li>Fixed <code>/etc/resolv.conf</code> symlink by pointing it at <code>resolv.conf</code> instead of <code>stub-resolv.conf</code>. This bug was present since the update to systemd v250 (<a href="https://github.com/flatcar/coreos-overlay/pull/2057">coreos-overlay#2057</a>)</li>
<li>Fixed excluded interface type from default systemd-networkd configuration (<a href="https://github.com/flatcar/init/pull/78">flatcar-linux/init#78</a>)</li>
<li>Fixed space escaping in the <code>networkd</code> Ignition translation (<a href="https://github.com/flatcar/Flatcar/issues/812">Flatcar#812</a>)</li>
</ul>
<h2>Changes:</h2>
<h2>Updates:</h2>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/902917">5.15.58</a> (includes <a href="https://lwn.net/Articles/902317">5.15.57</a>, <a href="https://lwn.net/Articles/902101">5.15.56</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_81.html">3.81</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>containerd 1.6.6</li>
<li>docker 20.10.17</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.58</li>
<li>systemd 250</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3277.1.1"/>
    <published>2022-08-04T12:08:33+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3277.1.0</id>
    <title>3277.1.0</title>
    <updated>2026-03-09T16:26:27.364371+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> Release <strong>3277.1.0</strong></p>
<p><em>Changes since <strong>Alpha 3277.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33744">CVE-2022-33744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>The Ignition v3 kargs directive failed before when used with the generic image where no <code>grub.cfg</code> exists, this was fixed by creating it first (<a href="https://github.com/flatcar/bootengine/pull/47">bootengine#47</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/901380">5.15.55</a> (includes <a href="https://lwn.net/Articles/900911">5.15.54</a>, <a href="https://lwn.net/Articles/900321">5.15.53</a>, <a href="https://lwn.net/Articles/899788">5.15.52</a>, <a href="https://lwn.net/Articles/899370">5.15.51</a>, <a href="https://lwn.net/Articles/899091">5.15.50</a>, <a href="https://lwn.net/Articles/898622">5.15.49</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_80.html">3.80</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.18.4">1.18.4</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 3227.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33744">CVE-2022-33744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">CVE-2022-27774</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">CVE-2022-27775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27778">CVE-2022-27778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27779">CVE-2022-27779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27780">CVE-2022-27780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30115">CVE-2022-30115</a>)</li>
<li>docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765</a>)</li>
<li>go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526</a>)</li>
<li>ignition (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1706">CVE-2022-1706</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824</a>)</li>
<li>ncurses (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">CVE-2022-29458</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1343">CVE-2022-1343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1434">CVE-2022-1434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1473">CVE-2022-1473</a>)</li>
<li>rsync (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191</a>)</li>
<li>SDK: qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3930">CVE-2021-3930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3947">CVE-2021-3947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4145">CVE-2021-4145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26353">CVE-2022-26353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26354">CVE-2022-26354</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>The Ignition v3 kargs directive failed before when used with the generic image where no <code>grub.cfg</code> exists, this was fixed by creating it first (<a href="https://github.com/flatcar/bootengine/pull/47">bootengine#47</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added efibootmgr binary to the image (<a href="https://github.com/flatcar/coreos-overlay/pull/1955">coreos-overlay#1955</a>)</li>
<li>Added VMware networking configuration in the initramfs via guestinfo settings (<a href="https://github.com/flatcar/bootengine/pull/44">bootengine#44</a>, <a href="https://github.com/flatcar/Flatcar/issues/717">flatcar#717</a>)</li>
<li>Enabled <code>containerd.service</code> unit, <code>br_netfilter</code> and <code>overlay</code> modules by default to follow Kubernetes requirements (<a href="https://github.com/flatcar/coreos-overlay/pull/1944">coreos-overlay#1944</a>, <a href="https://github.com/flatcar/init/pull/72">init#72</a>)</li>
<li>flatcar-install: Added option to create UEFI boot entry (<a href="https://github.com/flatcar/init/pull/74">init#74</a>)</li>
<li>VMWare: Added <code>ignition-delete-config.service</code> to remove Ignition config from VM metadata, see also <a href="https://coreos.github.io/ignition/operator-notes/#automatic-config-deletion">here</a> (<a href="https://github.com/flatcar/coreos-overlay/pull/1948">coreos-overlay#1948</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/901380">5.15.55</a> (includes <a href="https://lwn.net/Articles/900911">5.15.54</a>, <a href="https://lwn.net/Articles/900321">5.15.53</a>, <a href="https://lwn.net/Articles/899788">5.15.52</a>, <a href="https://lwn.net/Articles/899370">5.15.51</a>, <a href="https://lwn.net/Articles/899091">5.15.50</a>, <a href="https://lwn.net/Articles/898622">5.15.49</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220610">20220610</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201017">20.10.17</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.18.4">1.18.4</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_80.html">3.80</a>)</li>
<li>curl <a href="https://curl.se/mail/lib-2022-05/0010.html">7.83.1</a></li>
<li>dbus (<a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/177ab044bc87cbc4ded75d21b900795a6fefef76/NEWS">1.12.22</a>)</li>
<li>e2fsprogs (<a href="http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.5">1.46.5</a>)</li>
<li>gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-10/msg00006.html">1.22</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.35.3/Documentation/RelNotes/2.35.3.txt">2.35.3</a>)</li>
<li>ignition (<a href="https://github.com/coreos/ignition/releases/tag/v2.14.0">2.14.0</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220510">20220510</a>)</li>
<li>ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/a795e0c84597aa045d011e663dbad3cdabf0f1e6">2.4.1</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14">2.9.14</a>)</li>
<li>ncurses (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-11/msg00001.html">6.3_p20220423</a>)</li>
<li>open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.5">12.0.5</a>)</li>
<li>openssl (<a href="https://www.openssl.org/news/changelog.html#openssl-30">3.0.3</a>)</li>
<li>python (<a href="https://www.python.org/downloads/release/python-3912/">3.9.12</a>)</li>
<li>rsync (<a href="https://download.samba.org/pub/rsync/NEWS.html#3.2.4">3.2.4</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.3">1.1.3</a>)</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.15.4.html">4.15.4</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_38_1.html">3.38.1</a>)</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/bc1ee7ca0640f0136e5af7dcc4ca8ed0a5893053">2.3.3</a>)</li>
<li>tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/de4e8a1af9564f6056f9af90867c2f013449051c">0.11.0</a>)</li>
<li>new: acpid (<a href="https://sourceforge.net/p/acpid2/code/ci/2.0.33/tree/Changelog">2.0.33</a>)</li>
<li>OEM: distro (<a href="https://github.com/python-distro/distro/releases/tag/v1.7.0">1.7.0</a>)</li>
<li>OEM: python (<a href="https://www.python.org/downloads/release/python-3912/">3.9.12</a>)</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/7.0">7.0.0</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.61.0">1.61.0</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.6</li>
<li>docker 20.10.17</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.55</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3277.1.0"/>
    <published>2022-07-21T15:29:48+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3227.1.1</id>
    <title>3227.1.1</title>
    <updated>2026-03-09T16:26:27.355257+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> Release <strong>3227.1.1</strong></p>
<p>Changes since <strong>Beta 3227.1.0</strong></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1972">CVE-2022-1972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1973">CVE-2022-1973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2078">CVE-2022-2078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32981">CVE-2022-32981</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31030">CVE-2022-31030</a>)</li>
<li>libpcre2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">CVE-2022-1587</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>ARM64: Added <a href="https://wiki.samba.org/index.php/LinuxCIFS_utils">cifs-utils</a> for ARM64</li>
<li>ARM64: Added <a href="https://sssd.io/">sssd</a>, <a href="https://www.freedesktop.org/software/realmd/adcli/adcli.html">adcli</a> and realmd for ARM64</li>
<li>SDK / ARM64: Added <a href="https://pkg.go.dev/github.com/coreos/go-tspi">go-tspi</a> bindings for ARM64</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/898124">5.15.48</a> (includes <a href="https://lwn.net/Articles/897904">5.15.47</a>, <a href="https://lwn.net/Articles/897377">5.15.46</a>, <a href="https://lwn.net/Articles/897167">5.15.45</a>, <a href="https://lwn.net/Articles/896647">5.15.44</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_79.html">3.79</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.6">1.6.6</a>)</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.40/NEWS">10.40</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.6</li>
<li>docker 20.10.14</li>
<li>ignition 2.13.0</li>
<li>kernel 5.15.48</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3227.1.1"/>
    <published>2022-06-23T11:46:15+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3227.1.0</id>
    <title>3227.1.0</title>
    <updated>2026-03-09T16:26:27.343446+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> Release <strong>3227.1.0</strong></p>
<p><em>Changes since <strong>Beta 3185.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4209">CVE-2021-4209</a>, <a href="https://gitlab.com/gnutls/gnutls/-/issues/1277">GNUTLS-SA-2022-01-17</a>)</li>
<li>gzip,xz-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26280">CVE-2022-26280</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28181">CVE-2022-28181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28183">CVE-2022-28183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28184">CVE-2022-28184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28185">CVE-2022-28185</a>)</li>
<li>util-linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3995">CVE-2021-3995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3996">CVE-2021-3996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">CVE-2022-0563</a>)</li>
<li>zlib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured <code>/etc/flatcar/update.conf</code> exists because it happens to be used as flag file for Ansible (<a href="https://github.com/flatcar/init/pull/71">init#71</a>)</li>
<li>Fixed Ignition's OEM ID to be <code>metal</code> to follow the Ignition upstream change which otherwise resulted in a broken boot when the Flatcar OEM ID <code>pxe</code> was used (<a href="https://github.com/flatcar/bootengine/pull/45">bootengine#45</a>)</li>
<li>Added <code>networkd</code> translation to <code>files</code> section when converting from Ignition 2.x to Ignition 3.x (<a href="https://github.com/flatcar/coreos-overlay/pull/1910">coreos-overlay#1910</a>, <a href="https://github.com/flatcar/Flatcar/issues/741">flatcar#741</a>)</li>
<li>GCP: Fixed shutdown script execution (<a href="https://github.com/flatcar/coreos-overlay/pull/1912">coreos-overlay#1912</a>, <a href="https://github.com/flatcar/Flatcar/issues/743">flatcar#743</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Enabled <code>CONFIG_INTEL_RAPL</code> on AMD64 Kernel config to compile <code>intel_rapl_common</code> module in order to allow power monitoring on modern Intel processors (<a href="https://github.com/flatcar/coreos-overlay/pull/1801">flatcar#coreos-overlay#1801</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/896231/">5.15.43</a> (includes <a href="https://lwn.net/Articles/896226">5.15.42</a>, <a href="https://lwn.net/Articles/895645">5.15.41</a>, <a href="https://lwn.net/Articles/895318">5.15.40</a>, <a href="https://lwn.net/Articles/895070">5.15.39</a>, <a href="https://lwn.net/Articles/894357">5.15.38</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220411">20220411</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.10">1.17.10</a>)</li>
<li>afterburn (<a href="https://github.com/coreos/afterburn/releases/tag/v5.2.0">5.2.0</a>)</li>
<li>bind-tools (<a href="https://gitlab.isc.org/isc-projects/bind9/-/blob/v9_16_27/CHANGES">9.16.27</a>)</li>
<li>conntrack-tools (<a href="https://lists.netfilter.org/pipermail/netfilter-announce/2020/000240.html">1.4.6</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.3">1.6.3</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.6.2">1.6.2</a>))</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201014">20.10.14</a>)</li>
<li>e2fsprogs (<a href="http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.4">1.46.4</a>)</li>
<li>elfutils (<a href="https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=490932ae4ef9b5a3af01d2c8c616f14d57586046;hb=983e86fd89e8bf02f2d27ba5dce5bf078af4ceda">0.186</a>)</li>
<li>gnutls (<a href="https://gitlab.com/gnutls/gnutls/-/merge_requests/1517">3.7.3</a>)</li>
<li>gzip (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10157">1.12</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2021-09/msg00002.html">1.11</a>))</li>
<li>jansson (<a href="https://github.com/akheron/jansson/blob/v2.14/CHANGES">2.14</a>)</li>
<li>libarchive <a href="https://github.com/libarchive/libarchive/releases/tag/v3.6.1">3.6.1</a></li>
<li>libbsd (<a href="https://gitlab.freedesktop.org/libbsd/libbsd/-/commits/0.11.3/">0.11.3</a>)</li>
<li>libnetfilter_queue (<a href="https://git.netfilter.org/libnetfilter_queue/log/?h=libnetfilter_queue-1.0.5">1.0.5</a>)</li>
<li>libpcap (<a href="https://git.tcpdump.org/libpcap/blob/c7642e2cc0c5bd65754685b160d25dc23c76c6bd:/CHANGES">1.10.1</a>)</li>
<li>libtasn1 (<a href="https://gitlab.com/gnutls/libtasn1/-/blob/v4.17.0/NEWS">4.17.0</a>)</li>
<li>liburing (<a href="https://github.com/axboe/liburing/commits/liburing-2.1">2.1</a>)</li>
<li>mdadm (<a href="https://lore.kernel.org/all/28fdbc45-96ca-7cdb-3ced-a5f65d978048@trained-monkey.org/T/">4.2</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/commits/0.8.7">0.8.7</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.45.1">1.45.1</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-73-05/index.html">510.73.05</a>)</li>
<li>oniguruma (<a href="https://github.com/kkos/oniguruma/releases/tag/v6.9.7.1">6.9.7.1</a>)</li>
<li>open-isns (<a href="https://github.com/open-iscsi/open-isns/blob/v0.101/ChangeLog">0.101</a>)</li>
<li>pcre2 (<a href="https://github.com/PhilipHazel/pcre2/blob/pcre2-10.39/NEWS">10.39</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.1">1.1.1</a>)</li>
<li>tcpdump (<a href="https://git.tcpdump.org/tcpdump/blob/5f552b5e6e9fe05f7ad9681d51d0303233daba6a:/CHANGES">4.99.1</a>)</li>
<li>unzip (<a href="https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-26_changelog">6.0_p26</a>)</li>
<li>util-linux (<a href="https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.4-ChangeLog">2.37.4</a>)</li>
<li>zlib (<a href="https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/ChangeLog#L4">1.2.12</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.60.0">1.60.0</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3227.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28181">CVE-2022-28181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28183">CVE-2022-28183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28184">CVE-2022-28184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28185">CVE-2022-28185</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured <code>/etc/flatcar/update.conf</code> exists because it happens to be used as flag file for Ansible (<a href="https://github.com/flatcar/init/pull/71">init#71</a>)</li>
<li>Fixed Ignition's OEM ID to be <code>metal</code> to follow the Ignition upstream change which otherwise resulted in a broken boot when the Flatcar OEM ID <code>pxe</code> was used (<a href="https://github.com/flatcar/bootengine/pull/45">bootengine#45</a>)</li>
<li>Added <code>networkd</code> translation to <code>files</code> section when converting from Ignition 2.x to Ignition 3.x (<a href="https://github.com/flatcar/coreos-overlay/pull/1910">coreos-overlay#1910</a>, <a href="https://github.com/flatcar/Flatcar/issues/741">flatcar#741</a>)</li>
<li>GCP: Fixed shutdown script execution (<a href="https://github.com/flatcar/coreos-overlay/pull/1912">coreos-overlay#1912</a>, <a href="https://github.com/flatcar/Flatcar/issues/743">flatcar#743</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/896231/">5.15.43</a> (includes <a href="https://lwn.net/Articles/896226">5.15.42</a>, <a href="https://lwn.net/Articles/895645">5.15.41</a>, <a href="https://lwn.net/Articles/895318">5.15.40</a>, <a href="https://lwn.net/Articles/895070">5.15.39</a>, <a href="https://lwn.net/Articles/894357">5.15.38</a>))</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.10">1.17.10</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-73-05/index.html">510.73.05</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.14</li>
<li>ignition 2.13.0</li>
<li>kernel 5.15.43</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3227.1.0"/>
    <published>2022-06-02T15:06:28+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3185.1.1</id>
    <title>3185.1.1</title>
    <updated>2026-03-09T16:26:27.334003+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> Release <strong>3185.1.1</strong></p>
<p><em>Changes since <strong>Beta 3185.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1198">CVE-2022-1198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29582">CVE-2022-29582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1204">CVE-2022-1204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1205">CVE-2022-1205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>GCE: Restored oem-gce.service functionality on GCP (<a href="https://github.com/flatcar/coreos-overlay/pull/1813">coreos-overlay#1813</a>)</li>
<li>Skipped starting <code>ensure-sysext.service</code> if <code>systemd-sysext.service</code> won't be started, to prevent reporting a dependency failure (<a href="https://github.com/flatcar/Flatcar/issues/710">Flatcar#710</a>)</li>
<li>Added a remount action as <code>systemd-sysext.service</code> drop-in unit to restore the OEM partition mount after the overlay mounts in <code>/usr</code> are done (<a href="https://github.com/flatcar/init/pull/69">init#69</a>)</li>
<li>Added pahole to developer container, without it kernel modules built against /usr/src/linux may fail to probe with an 'invalid relocation target' error (<a href="https://github.com/flatcar/coreos-overlay/pull/1839">coreos-overlay#1839</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>GCE: Enabled GVE kernel driver, which adds support for Google Virtual NIC on GCP (<a href="https://github.com/flatcar/coreos-overlay/pull/1802">coreos-overlay#1802</a>)</li>
<li>Azure: Set up <code>/etc/hostname</code> from instance metadata with Afterburn</li>
<li>AWS EC2: Removed the setup of <code>/etc/hostname</code> from the instance metadata because it used a long FQDN but we can just use use the hostname set via DHCP (<a href="https://github.com/flatcar/Flatcar/issues/707">Flatcar#707</a>)</li>
<li>SDK: Dropped the mantle binaries (kola, ore, etc.) from the SDK, they are now provided by the <code>ghcr.io/flatcar/mantle</code> image (<a href="https://github.com/flatcar/coreos-overlay/pull/1827">coreos-overlay#1827</a>, <a href="https://github.com/flatcar/scripts/pull/275">scripts#275</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/893264">5.15.37</a> (includes <a href="https://lwn.net/Articles/892812">5.15.36</a>, <a href="https://lwn.net/Articles/892002">5.15.35</a>, <a href="https://lwn.net/Articles/891251">5.15.34</a>, <a href="https://lwn.net/Articles/890722">5.15.33</a>))</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.9">1.17.9</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html">3.78</a>)</li>
<li>GCE: google compute-image-packages (<a href="https://github.com/GoogleCloudPlatform/compute-image-packages/releases/tag/20190124">20190124</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.13</li>
<li>ignition 2.13.0</li>
<li>kernel 5.15.37</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3185.1.1"/>
    <published>2022-05-09T14:42:03+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3185.1.0</id>
    <title>3185.1.0</title>
    <updated>2026-03-09T16:26:27.318035+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> Release <strong>3185.1.0</strong></p>
<p><em>Changes since <strong>Beta 3139.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1015">CVE-2022-1015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016</a>)</li>
<li>cifs-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20208">CVE-2021-20208</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648</a>)</li>
<li>cryptsetup (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4122">CVE-2021-4122</a>)</li>
<li>duktape (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46322">CVE-2021-46322</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31566">CVE-2021-31566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36976">CVE-2021-36976</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21814">CVE-2022-21814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21813">CVE-2022-21813</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235</a>)</li>
<li>systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3997">CVE-2021-3997</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3984">CVE-2021-3984</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4019">CVE-2021-4019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4069">CVE-2021-4069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4136">CVE-2021-4136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4173">CVE-2021-4173</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166"> CVE-2021-4166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4187">CVE-2021-4187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">CVE-2021-4192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">CVE-2021-4193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0128">CVE-2022-0128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0156">CVE-2022-0156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0158">CVE-2022-0158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0213">CVE-2022-0213</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">CVE-2022-0261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">CVE-2022-0318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0319">CVE-2022-0319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0351">CVE-2022-0351</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">CVE-2022-0359</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">CVE-2022-0361</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">CVE-2022-0368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">CVE-2022-0392</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0393">CVE-2022-0393</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0407">CVE-2022-0407</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">CVE-2022-0408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">CVE-2022-0413</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">CVE-2022-0417</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">CVE-2022-0443</a>)</li>
<li>SDK: squashfs-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>AWS: specify correct console (ttyS0) on kernel command line for ARM64 instances (<a href="https://github.com/flatcar/coreos-overlay/pull/1628">coreos-overlay#1628</a>)</li>
<li>Made Ignition write the SSH keys into a file under <code>authorized_keys.d/ignition</code> again and added a call to <code>update-ssh-keys</code> after Ignition ran to create the merged <code>authorized_keys</code> file, which fixes the problem that keys added by Ignition get lost when <code>update-ssh-keys</code> runs (<a href="https://github.com/flatcar/init/pull/66">init#66</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added <code>auditd.service</code> but left it disabled by default, a custom configuration can be created by removing <code>/etc/audit/auditd.conf</code> and replacing it with an own file (<a href="https://github.com/flatcar/coreos-overlay/pull/1636">coreos-overlay#1636</a>)</li>
<li>The systemd-networkd <code>ManageForeignRoutes</code> and <code>ManageForeignRoutingPolicyRules</code> settings are now disabled through a drop-in file and thus can only be enabled again by a drop-in file under <code>/etc/systemd/networkd.conf.d/</code> because drop-in files take precedence over <code>/etc/systemd/networkd.conf</code> (<a href="https://github.com/flatcar/init/pull/61">init#61</a>)</li>
<li>Bring in dependencies for NFS4 with Kerberos both in kernel and userspace. Tested against NFS4.1 server. (<a href="https://github.com/flatcar/coreos-overlay/pull/1664">coreos-overlay#1664</a>)</li>
<li>Merge the Flatcar Pro features into the regular Flatcar images (<a href="https://github.com/flatcar/coreos-overlay/pull/1679">coreos-overlay#1679</a>)</li>
<li>Besides Ignition v1 and v2 configurations, Ignition configurations with specification v3 (up to 3.3.0) are now supported, see the <a href="https://www.flatcar.org/docs/latest/provisioning/ignition/specification/#ignition-v3">docs section for details</a></li>
<li>Made SELinux enabled by default in default containerd configuration file. (<a href="https://github.com/flatcar/coreos-overlay/pull/1699">coreos-overlay#1699</a>)</li>
<li>Removed rngd.service because it is not essential anymore for the kernel to boot fast in VM environments (<a href="https://github.com/flatcar/coreos-overlay/pull/1700">coreos-overlay#1700</a>)</li>
<li>Enabled <code>systemd-sysext.service</code> to activate systemd-sysext images on boot, to disable you will need to mask it. Also added a helper service <code>ensure-sysext.service</code> which reloads the systemd units to reevaluate the <code>sockets</code>, <code>timers</code>, and <code>multi-user</code> targets when <code>systemd-sysext.service</code> is (re)started, making it possible to enable units that are part of a sysext image (<a href="https://github.com/flatcar/init/pull/65">coreos-overlay#65</a>)</li>
<li>For amd64 <code>/usr/lib</code> used to be a symlink to <code>/usr/lib64</code> but now they became two separate folders as common in other distributions (and was the case for arm64 already). Compatibility symlinks exist in case <code>/usr/lib64</code> was used to access, e.g., the <code>modules</code> folder or the <code>systemd</code> folder (<a href="https://github.com/flatcar/coreos-overlay/pull/1713">coreos-overlay#1713</a>, <a href="https://github.com/flatcar/scripts/pull/255">scripts#255</a>)</li>
<li>Enabled FIPS mode for cryptsetup (<a href="https://github.com/flatcar/coreos-overlay/pull/1747">coreos-overlay#1747</a>)</li>
<li>Added <code>cryptsetup</code> to the initramfs for the Ignition <code>luks</code> directive (<a href="https://github.com/flatcar/coreos-overlay/pull/1760">flatcar-linux/coreos-overlay#1760</a>)</li>
<li>Enabled FIPS mode for cryptsetup (<a href="https://github.com/flatcar/portage-stable/pull/312">portage-stable#312</a>)</li>
<li>Defined a systemd-sysext level that sysext images can match for instead of the OS version when they don't have a strong coupling, meaning the only metadata required is <code>SYSEXT_LEVEL=1.0</code> and <code>ID=flatcar</code> (<a href="https://github.com/flatcar/Flatcar/issues/643">Flatcar#643</a>)</li>
<li>Azure: Azure VHD disks are now created using subformat=fixed, which makes them suitable for immediate upload to Azure using any tool.</li>
<li>DigitalOcean: In addition to the <code>bz2</code> image, a <code>gz</code> compressed image is published. This helps against hitting the compression timeout that sometimes lets the image import fail.</li>
<li>OpenStack: In addition to the <code>bz2</code> image, a <code>gz</code> compressed image is published. This allows Glance to directly consume the images by simply passing in the URL of the image.</li>
<li>SDK: The image compression format is now configurable. Supported formats are: <code>bz2</code>, <code>gz</code>, <code>zip</code>, <code>none</code>, <code>zst</code>. Selecting the image format can now be done by passing the <code>--image_compression_formats</code> option. This flag gets a comma separated list of formats.</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/889438">5.15.32</a>) (from 5.15.30)</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220310">20220310</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201013">20.10.13</a>)</li>
<li>bpftool (<a href="https://lwn.net/Articles/878631/">5.15.8</a>)</li>
<li>bridge-utils (<a href="https://git.kernel.org/pub/scm/network/bridge/bridge-utils.git/log/?h=v1.7.1">1.7.1</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html">3.77</a>)</li>
<li>cifs-utils (<a href="https://lkml.kernel.org/linux-cifs/CAKywueSqRGSFmeDHQacyu831BNUeGFxGg3vgBmozzhkGBCjyXQ@mail.gmail.com/T/">6.13</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.1">1.6.1</a>)</li>
<li>cryptsetup (<a href="https://lore.kernel.org/all/572c18a7bf60cb1b0f67c3a03c531d7e7ed31832.camel@scientia.net/T/">2.4.3</a>)</li>
<li>dosfstools (<a href="https://github.com/dosfstools/dosfstools/releases/tag/v4.2">4.2</a>)</li>
<li>duktape (<a href="https://github.com/svaarala/duktape/releases/tag/v2.7.0">2.7.0</a>)</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-10/changes.html">10.3.0</a>)</li>
<li>grep (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10037">3.7</a>)</li>
<li>ignition (<a href="https://github.com/coreos/ignition/releases/tag/v2.13.0">2.13.0</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207">20220207_p20220207</a>)</li>
<li>iperf (<a href="https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-3101-2021-06-03">3.10.1</a>)</li>
<li>kexec-tools (<a href="https://www.spinics.net/lists/kexec/msg26864.html">2.0.22</a>)</li>
<li>less (<a href="https://www.greenwoodsoftware.com/less/news.590.html">590</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.5.3">3.5.3</a>)</li>
<li>libmspack (<a href="https://github.com/kyz/libmspack/blob/v0.10.1alpha/libmspack/ChangeLog">0.10.1_alpha</a>)</li>
<li>libxml2 (<a href="http://www.xmlsoft.org/news.html">2.9.13</a>)</li>
<li>lsscsi (<a href="https://sg.danny.cz/scsi/lsscsi.ChangeLog">0.32</a>)</li>
<li>nfs-utils (<a href="https://lore.kernel.org/linux-fsdevel/c8795653-7728-18a4-93dc-58943ad0fe09@redhat.com/">2.5.4</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-47-03/index.html">510.47.03</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/commits/deee9cae1ac94760deebd71f8e5449061338666c">1.16</a>)</li>
<li>pam (<a href="https://github.com/linux-pam/linux-pam/commit/fe1307512fb8892b5ceb3d884c793af8dbd4c16a">1.5.1_p20210622</a>)</li>
<li>pambase (20220214)</li>
<li>pinentry (<a href="https://dev.gnupg.org/T5566">1.2.0</a>)</li>
<li>quota (<a href="https://sourceforge.net/p/linuxquota/code/ci/0acd4cc6275122fd9864cb7b5d349e65a2622920/">4.06</a>)</li>
<li>rpcbind (<a href="https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_6">1.2.6</a>)</li>
<li>shadow (<a href="https://github.com/shadow-maint/shadow/releases/tag/v4.11.1">4.11.1</a>)</li>
<li>socat (<a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.3:/CHANGES">1.7.4.3</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v250.3">250.3</a>)</li>
<li>thin-provisioning-tools (<a href="https://github.com/jthornber/thin-provisioning-tools/blob/d6d93c3157631b242a13a81d30f75453e576c55a/CHANGES#L1-L9">0.9.0</a>)</li>
<li>timezone-data (<a href="https://mm.icann.org/pipermail/tz-announce/2021-January/000065.html">2021a</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v8.2.4328">8.2.4328</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/commit/5f5ba8312c04a759dad05723c035549273d07461">5.5.11</a>)</li>
<li>xfsprogs (<a href="https://marc.info/?l=linux-xfs&amp;m=163883318025390&amp;w=2">5.14.2</a>)</li>
<li>Azure: WALinuxAgent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.6.0.2">2.6.0.2</a>)</li>
<li>VMWare: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.0">12.0.0</a>)</li>
<li>SDK: gcc-config (<a href="https://gitweb.gentoo.org/proj/gcc-config.git/tag/?h=v2.5">2.5</a>)</li>
<li>SDK: iasl (<a href="https://www.acpica.org/node/183">20200717</a>)</li>
<li>SDK: man-db (<a href="https://gitlab.com/cjwatson/man-db/-/tags/2.9.4">2.9.4</a>)</li>
<li>SDK: man-pages (<a href="https://man7.org/linux/man-pages/changelog.html#release_5.12">5.12-r2</a>)</li>
<li>SDK: netperf (<a href="https://github.com/HewlettPackard/netperf/blob/netperf-2.7.0/Release_Notes">2.7.0</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.59.0">1.59.0</a>)</li>
<li>SDK: squashfs-tools (<a href="https://lore.kernel.org/lkml/CAB3woddJss+ziGp-RjJ-yiax6pc_HLMdxk3Qk5nJdRgjpEYWBg@mail.gmail.com/">4.5_p20210914</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 3185.0.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1015">CVE-2022-1015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Made Ignition write the SSH keys into a file under <code>authorized_keys.d/ignition</code> again and added a call to <code>update-ssh-keys</code> after Ignition ran to create the merged <code>authorized_keys</code> file, which fixes the problem that keys added by Ignition get lost when <code>update-ssh-keys</code> runs (<a href="https://github.com/flatcar/init/pull/66">init#66</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Enabled FIPS mode for cryptsetup (<a href="https://github.com/flatcar/coreos-overlay/pull/1747">flatcar-linux/coreos-overlay#1747</a>)</li>
<li>Added <code>cryptsetup</code> to the initramfs for the Ignition <code>luks</code> directive (<a href="https://github.com/flatcar/coreos-overlay/pull/1760">flatcar-linux/coreos-overlay#1760</a>)</li>
<li>Enabled FIPS mode for cryptsetup (<a href="https://github.com/flatcar/portage-stable/pull/312">portage-stable#312</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/889438">5.15.32</a>) (from 5.15.30)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html">3.77</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.13</li>
<li>ignition 2.13.0</li>
<li>kernel 5.15.32</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3185.1.0"/>
    <published>2022-04-07T12:04:52+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3139.1.1</id>
    <title>3139.1.1</title>
    <updated>2026-03-09T16:26:27.307019+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> Release <strong>3139.1.1</strong></p>
<p><strong>Changes since Beta-3139.1.0</strong></p>
<h4>Security fixes</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25636">CVE-2022-25636</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921</a>)</li>
<li>systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3997">CVE-2021-3997</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778</a>)</li>
</ul>
<h4>Bug fixes</h4>
<ul>
<li>Reverted the Linux kernel commit which broke networking on AWS instances which use Intel 82559 NIC (c4/m4) (<a href="https://github.com/flatcar/Flatcar/issues/665">Flatcar#665</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/1723">coreos-overlay#1723</a>)</li>
<li>Re-added the <code>brd drbd nbd rbd xen-blkfront zram libarc4 lru_cache zsmalloc</code> kernel modules to the initramfs since they were missing compared to the Flatcar 3033.2.x releases where the 5.10 kernel is used (<a href="https://github.com/flatcar/bootengine/pull/40">bootengine#40</a>)</li>
</ul>
<h4>Changes</h4>
<ul>
<li>(none)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/888521">5.15.30</a> (from 5.15.25, includes <a href="https://lwn.net/Articles/886569">5.15.26</a>, <a href="https://lwn.net/Articles/887219">5.15.27</a>, <a href="https://lwn.net/Articles/887638">5.15.28</a>, <a href="https://lwn.net/Articles/888116">5.15.29</a>))</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.8">1.17.8</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v249.10">249.10</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_76.html">3.76</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.10">1.5.10</a>)</li>
<li>openssl (<a href="https://www.openssl.org/news/changelog.html#openssl-30">3.0.2</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.15.30</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3139.1.1"/>
    <published>2022-03-23T13:34:49+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3139.1.0</id>
    <title>3139.1.0</title>
    <updated>2026-03-09T16:26:27.289514+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> Release <strong>3139.1.0</strong></p>
<p><em>Changes since <strong>Alpha 3139.0.0</strong></em></p>
<h4>Security fixes</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0516">CVE-2022-0516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0435">CVE-2022-0435</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25375">CVE-2022-25375</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25258">CVE-2022-25258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847</a>)</li>
<li>go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315</a>)</li>
</ul>
<h4>Bug fixes</h4>
<ul>
<li>Disabled the systemd-networkd settings <code>ManageForeignRoutes</code> and <code>ManageForeignRoutingPolicyRules</code> by default to ensure that CNIs like Cilium don't get their routes or routing policy rules discarded on network reconfiguration events (<a href="https://github.com/flatcar/Flatcar/issues/620">Flatcar#620</a>).</li>
<li>Prevented hitting races when creating filesystems in Ignition, these races caused boot failures like <code>fsck[1343]: Failed to stat /dev/disk/by-label/ROOT: No such file or directory</code> when creating a btrfs root filesystem (<a href="https://github.com/flatcar/ignition/pull/35">ignition#35</a>)</li>
<li>Reverted the Linux kernel change to forbid xfrm id 0 for IPSec state because it broke Cilium (<a href="https://github.com/flatcar/Flatcar/issues/626">Flatcar#626</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/1682">coreos-overlay#1682</a>)</li>
</ul>
<h4>Changes</h4>
<ul>
<li>Added support for switching back to CGroupsV1 without requiring a reboot. Create <code>/etc/flatcar-cgroupv1</code> through ignition. (<a href="https://github.com/flatcar/coreos-overlay/pull/1666">coreos-overlay#1666</a>)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/885896">5.15.25</a>) (from 5.15.19)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_75.html">3.75</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.7">1.17.7</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes">2.4.6</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 3066.1.2</strong></em></p>
<h4>Security fixes</h4>
<ul>
<li>GCC (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43816">CVE-2021-43816</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315</a>)</li>
<li>ignition (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14040">CVE-2020-14040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561</a>)</li>
<li>krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/issues/1565">libarchive-1565</a>, <a href="https://github.com/libarchive/libarchive/issues/1566">libarchive-1566</a>)</li>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4044">CVE-2021-4044</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3872">CVE-2021-3872</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3875">CVE-2021-3875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3903">CVE-2021-3903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3927">CVE-2021-3927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3928">CVE-2021-3928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3968">CVE-2021-3968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">CVE-2021-3973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3974">CVE-2021-3974</a>)</li>
<li>SDK: edk2-ovmf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28210">CVE-2021-28210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28211">CVE-2021-28211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28213">CVE-2021-28213</a>)</li>
<li>SDK: libxslt (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560</a>)</li>
<li>SDK: mantle (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3121">CVE-2021-3121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565</a>)</li>
<li>SDK: Rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21658">CVE-2022-21658</a>)</li>
<li>SDK: QEMU (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35504">CVE-2020-35504</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35505">CVE-2020-35505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35506">CVE-2020-35506</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35517">CVE-2020-35517</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20263">CVE-2021-20263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3409">CVE-2021-3409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3544">CVE-2021-3544</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3545">CVE-2021-3545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3546">CVE-2021-3546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3582">CVE-2021-3582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3607">CVE-2021-3607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3608">CVE-2021-3608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682</a>)</li>
</ul>
<h4>Bug fixes</h4>
<ul>
<li>Excluded the Kubenet cbr0 interface from networkd's DHCP config and set it to Unmanaged to prevent interference and ensure that it is not part of the network online check (<a href="https://github.com/flatcar/init/pull/55">init#55</a>)</li>
<li>Fixed the dracut emergency Ignition log printing that had a scripting error causing the cat command to fail (<a href="https://github.com/flatcar/bootengine/pull/33">bootengine#33</a>)</li>
<li>network: Accept ICMPv6 Router Advertisements to fix IPv6 address assignment in the default DHCP setting (<a href="https://github.com/flatcar/init/pull/51">init#51</a>, <a href="https://github.com/flatcar/coreos-cloudinit/pull/12">coreos-cloudinit#12</a>, <a href="https://github.com/flatcar/bootengine/pull/30">bootengine#30</a>)</li>
<li>flatcar-update: Stopped checking for the <code>USER</code> environment variable which may not be set in all environments, causing the script to fail unless a workaround was used like prepending an additional <code>sudo</code> invocation (<a href="https://github.com/flatcar/init/pull/58">init#58</a>)</li>
<li>Disabled the systemd-networkd settings <code>ManageForeignRoutes</code> and <code>ManageForeignRoutingPolicyRules</code> by default to ensure that CNIs like Cilium don't get their routes or routing policy rules discarded on network reconfiguration events (<a href="https://github.com/flatcar/Flatcar/issues/620">Flatcar#620</a>).</li>
<li>Prevented hitting races when creating filesystems in Ignition, these races caused boot failures like <code>fsck[1343]: Failed to stat /dev/disk/by-label/ROOT: No such file or directory</code> when creating a btrfs root filesystem (<a href="https://github.com/flatcar/ignition/pull/35">ignition#35</a>)</li>
<li>Reverted the Linux kernel change to forbid xfrm id 0 for IPSec state because it broke Cilium (<a href="https://github.com/flatcar/Flatcar/issues/626">Flatcar#626</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/1682">coreos-overlay#1682</a>)</li>
</ul>
<h4>Changes</h4>
<ul>
<li>Update-engine now creates the <code>/run/reboot-required</code> flag file for <a href="https://github.com/weaveworks/kured">kured</a> (<a href="https://github.com/flatcar/update_engine/pull/15">update_engine#15</a>)</li>
<li>Excluded special network interface devices like bridge, tunnel, vxlan, and veth devices from the default DHCP configuration to prevent networkd interference (<a href="https://github.com/flatcar/init/pull/56">init#56</a>)</li>
<li>Added CONFIG_NF_CT_NETLINK_HELPER (for libnetfilter_cthelper), CONFIG_NET_VRF (for virtual routing and forwarding) and CONFIG_KEY_DH_OPERATIONS (for keyutils) to the kernel config (<a href="https://github.com/flatcar/coreos-overlay/pull/1524">coreos-overlay#1524</a>)</li>
<li>Enabled the FIPS support for the Linux kernel, which users can now choose through a kernel parameter in <code>grub.cfg</code> (check it taking effect with <code>cat /proc/sys/crypto/fips_enabled</code>) (<a href="https://github.com/flatcar/coreos-overlay/pull/1602">coreos-overlay#1602</a>)</li>
<li>Added support for switching back to CGroupsV1 without requiring a reboot. Create <code>/etc/flatcar-cgroupv1</code> through ignition. (<a href="https://github.com/flatcar/coreos-overlay/pull/1666">coreos-overlay#1666</a>)</li>
<li>Removed the pre-shipped <code>/etc/flatcar/update.conf</code> file, leaving it totally to the user to define the contents as it was unnecessarily overwriting the <code>/use/share/flatcar/update.conf</code> (<a href="https://github.com/flatcar/scripts/pull/212">flatcar-linux/scripts#212</a>)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/885895">5.15.25</a>) (from 5.10.96)</li>
<li>GCC (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00000.html">9.4.0</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.7">1.17.7</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_75.html">3.75</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/blob/v249.7/NEWS">249.7</a>)</li>
<li>acl (<a href="https://git.savannah.nongnu.org/cgit/acl.git/log/?h=v2.3.1">2.3.1</a>)</li>
<li>attr (<a href="https://git.savannah.nongnu.org/cgit/attr.git/log/?h=v2.5.1">2.5.1</a>)</li>
<li>audit (<a href="https://listman.redhat.com/archives/linux-audit/2021-October/msg00000.html">3.0.6</a>)</li>
<li>boost (<a href="https://www.boost.org/users/history/version_1_76_0.html">1.76.0</a>)</li>
<li>btrfs-progs (<a href="https://btrfs.wiki.kernel.org/index.php/Changelog#btrfs-progs_v5.15_.28Nov_2021.29">5.15.1</a>)</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/coreutils-announce/2020-03/msg00000.html">8.32</a>)</li>
<li>diffutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-08/msg00000.html">3.8</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v5.10">5.10</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes">2.4.6</a>)</li>
<li>findutils (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9914">4.8.0</a>)</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.68.4">2.68.4</a>)</li>
<li>i2c-tools (<a href="https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/log/?h=v4.2">4.2</a>)</li>
<li>iproute2 (<a href="https://lwn.net/ml/linux-kernel/20211101164705.6f4f2e41%40hermes.local/">5.15</a>)</li>
<li>ipset (<a href="https://ipset.netfilter.org/changelog.html">7.11</a>)</li>
<li>ipvsadm (<a href="http://archive.linuxvirtualserver.org/html/lvs-devel/2013-09/msg00011.html">1.27</a>)</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20210722">20210722</a>)</li>
<li>kmod (<a href="https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/commit/?id=b6ecfc916a17eab8f93be5b09f4e4f845aabd3d1">29</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.5.2">3.5.2</a>)</li>
<li>libcap-ng (<a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.2">0.8.2</a>)</li>
<li>libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.1">2.5.1</a>)</li>
<li>lshw (<a href="https://www.ezix.org/project/wiki/HardwareLiSter#Changes">02.19.2b_p20210121</a>)</li>
<li>lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.94.0">4.94.0</a>)</li>
<li>openssh (<a href="http://www.openssh.com/txt/release-8.8">8.8</a>)</li>
<li>openssl (<a href="https://www.openssl.org/news/changelog.html#openssl-30">3.0.1</a>)</li>
<li>parted (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9924">3.4</a> (includes <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9569">3.3</a>))</li>
<li>pciutils (<a href="https://github.com/pciutils/pciutils/commit/864aecdea9c7db626856d8d452f6c784316a878c">3.7.0</a>)</li>
<li>polkit (<a href="https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.120/NEWS">0.120</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.0">1.1.0</a>)</li>
<li>sbsigntools (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/tag/?h=v0.9.4">0.9.4</a>)</li>
<li>sed (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9647">4.8</a>)</li>
<li>usbutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/commit/?id=57fb18e59cce31a50a1ca62d1e192512c905ba00">014</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v8.2.3582">8.2.3582</a>)</li>
<li>Azure: Python for OEM images (<a href="https://www.python.org/downloads/release/python-398/">3.9.8</a>)</li>
<li>SDK: Linux headers (<a href="https://lwn.net/Articles/876611/">5.15</a>)</li>
<li>SDK: edk2-ovmf (<a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202105">202105</a>)</li>
<li>SDK: file (<a href="https://mailman.astron.com/pipermail/file/2021-March/000478.html">5.40</a>)</li>
<li>SDK: ipxe (<a href="https://github.com/ipxe/ipxe/releases/tag/v1.21.1">1.21.1</a>)</li>
<li>SDK: mantle (<a href="https://github.com/flatcar/mantle/releases/tag/v0.18.0">0.18.0</a>)</li>
<li>SDK: perf (<a href="https://kernelnewbies.org/LinuxChanges#Linux_5.15.Tracing.2C_perf_and_BPF">5.15</a>)</li>
<li>SDK: Python (<a href="https://www.python.org/downloads/release/python-398/">3.9.8</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.58.1">1.58.1</a>)</li>
<li>SDK: QEMU (<a href="https://wiki.qemu.org/ChangeLog/6.1">6.1.0</a>)</li>
<li>SDK: seabios (<a href="https://seabios.org/Releases#SeaBIOS_1.14.0">1.14.0</a>)</li>
<li>SDK: sgabios (<a href="https://git.qemu.org/?p=sgabios.git;a=tree;h=a85446adb0e0">0.1_pre10</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.15.25</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3139.1.0"/>
    <published>2022-03-07T13:13:36+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3066.1.2</id>
    <title>3066.1.2</title>
    <updated>2026-03-09T16:26:27.278517+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> Release <strong>3066.1.2</strong></p>
<p><em>Changes since <strong>Beta 3066.1.1</strong></em></p>
<h4>Security fixes</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3998">CVE-2021-3998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219</a>)</li>
<li>polkit (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034</a>)</li>
</ul>
<h4>Bug fixes</h4>
<ul>
<li>SDK: Fixed build error popping up in the new SDK Container because <code>policycoreutils</code> used the wrong ROOT to update the SELinux store (<a href="https://github.com/flatcar/coreos-overlay/pull/1502">flatcar-linux/coreos-overlay#1502</a>)</li>
<li>Fixed leak of SELinux policy store to the root filesystem top directory due to wrong store path in <code>policycoreutils</code> instead of <code>/var/lib/selinux</code> (<a href="https://github.com/flatcar/Flatcar/issues/596">flatcar-linux/Flatcar#596</a>)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/883442">5.10.96</a>) (from 5.10.93)</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20211216">20211216</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_4/expat/Changes">2.4.4</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.96</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3066.1.2"/>
    <published>2022-02-09T10:02:57+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3066.1.1</id>
    <title>3066.1.1</title>
    <updated>2026-03-09T16:26:27.271483+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> release <strong>3066.1.1</strong></p>
<p><em>Changes since <strong>Beta 3066.1.0</strong></em></p>
<h4>Known issues:</h4>
<ul>
<li>The SELinux policy store update fix resulted in some files leaked to the root filesystem top directory (<a href="https://github.com/flatcar/Flatcar/issues/596">flatcar-linux/Flatcar#596</a>)</li>
</ul>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4135">CVE-2021-4135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28714">CVE-2021-28714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39685">CVE-2021-39685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44733">CVE-2021-44733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185</a>)</li>
<li>ca-certificates (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43816">CVE-2021-43816</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured that the <code>/run/xtables.lock</code> coordination file exists for modifications of the xtables backend from containers (must be bind-mounted) or the <code>iptables-legacy</code> binaries on the host (<a href="https://github.com/flatcar/init/pull/57">flatcar-linux/init#57</a>)</li>
<li>Excluded the Kubenet cbr0 interface from networkd’s DHCP config and set it to Unmanaged to prevent interference and ensure that it is not part of the network online check (<a href="https://github.com/flatcar/init/pull/55">flatcar-linux/init#55</a>)</li>
<li>dev container: Fix github URL for coreos-overlay and portage-stable to use repos from flatcar-linux org directly instead of relying on redirects from the kinvolk org. This fixes checkouts with emerge-gitclone inside dev-container. (<a href="https://github.com/flatcar/scripts/pull/194">flatcar-linux/scripts#194</a>)</li>
<li>SDK: Fixed build error popping up in the new SDK Container because <code>policycoreutils</code> used the wrong ROOT to update the SELinux store (<a href="https://github.com/flatcar/coreos-overlay/pull/1502">flatcar-linux/coreos-overlay#1502</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Backported <code>elf</code> support for <code>iproute2</code> (<a href="https://github.com/flatcar/coreos-overlay/pull/1526">flatcar-linux/coreos-overlay#1256</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/881964">5.10.93</a>) (from 5.10.84)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_74.html">3.74</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201012">20.10.12</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.9">1.5.9</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_3/expat/Changes">2.4.3</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.93</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3066.1.1"/>
    <published>2022-01-26T08:13:36+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3066.1.0</id>
    <title>3066.1.0</title>
    <updated>2026-03-09T16:26:27.261023+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> release <strong>3066.1.0</strong></p>
<p><em>Changes since <strong>Alpha 3066.0.0</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4001">CVE-2021-4001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">CVE-2021-43975</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717</a>)</li>
<li>ca-certificates (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>Added configuration files for logrotate (<a href="https://github.com/flatcar/coreos-overlay/pull/1442">flatcar-linux/coreos-overlay#1442</a>)</li>
<li>Fixed <code>ETCD_NAME</code> conflicting with <code>--name</code> for <code>etcd-member</code> to start (<a href="https://github.com/flatcar/coreos-overlay/pull/1444">flatcar-linux/coreos-overlay#1444</a>)</li>
<li>The Torcx profile docker-1.12-no got fixed to reference the current Docker version instead of 19.03 which wasn't found on the image, causing Torcx to fail to provide Docker <a href="https://github.com/flatcar/coreos-overlay/pull/1456">flatcar-linux/coreos-overlay#1456</a></li>
<li>Fix vim warnings on missing file, when built with USE=”minimal” (<a href="https://github.com/flatcar/portage-stable/pull/260">portage-stable#260</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Added a new <code>flatcar-update</code> tool to the image to ease manual updates, rollbacks, channel/release jumping, and airgapped updates (<a href="https://github.com/flatcar/init/pull/53">flatcar-linux/init#53</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_73.html">3.73</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.0.3">1.0.3</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.5">1.17.5</a>)</li>
<li>Linux (<a href="https://lwn.net/Articles/878041">5.10.84</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 3033.1.1</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4001">CVE-2021-4001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">CVE-2021-43975</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717</a>)</li>
<li>ca-certificates (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527</a>)</li>
<li>Docker, containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190</a>)</li>
<li>rsync (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14387">CVE-2020-14387</a>)</li>
<li>SDK: u-boot-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27097">CVE-2021-27097</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27138">CVE-2021-27138</a>)</li>
</ul>
<p><strong>Changes:</strong></p>
<ul>
<li>Added sgx group to /etc/group in baselayout (<a href="https://github.com/flatcar/baselayout/pull/20">baselayout#20</a>)</li>
<li>Added missing SELinux rule as initial step to resolve Torcx unpacking issue (<a href="https://github.com/flatcar/coreos-overlay/pull/1426">coreos-overlay#1426</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>Skip <code>tcsd</code> for machine with TPM 2.0 (<a href="https://github.com/flatcar/coreos-overlay/pull/1364">flatcar-linux/coreos-overlay#1364</a>,<a href="https://github.com/flatcar/coreos-overlay/pull/1365">flatcar-linux/coreos-overlay#1365</a>)</li>
<li>Fix vim warnings on missing file, when built with USE=”minimal” (<a href="https://github.com/flatcar/portage-stable/pull/260">portage-stable#260</a>)</li>
<li>SDK: Add missing arm64 SDK keywords to profiles (<a href="https://github.com/flatcar/coreos-overlay/pull/1407">coreos-overlay#1407</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Openssl (<a href="https://www.openssl.org/news/cl30.txt">3.0.0</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#20111">20.10.11</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.8">1.5.8</a>)</li>
<li>btrfs-progs (<a href="https://btrfs.wiki.kernel.org/index.php/Changelog#btrfs-progs_v5.10_.28Jan_2021.29">5.10.1</a>)</li>
<li>dbus-glib (<a href="https://gitlab.freedesktop.org/dbus/dbus-glib/-/tags/dbus-glib-0.112">0.112</a>)</li>
<li>gmp (<a href="https://gmplib.org/gmp6.2">6.2.1</a>)</li>
<li>ignition (<a href="https://github.com/flatcar/ignition/releases/tag/v0.36.1">0.36.1</a>)</li>
<li>json-c (<a href="https://github.com/json-c/json-c/wiki/Notes-for-v0.15-release">0.15</a>)</li>
<li>libgpg-error (<a href="https://dev.gnupg.org/T5194">1.42</a>)</li>
<li>logrotate (<a href="https://github.com/logrotate/logrotate/releases/tag/3.18.1">3.18.1</a>)</li>
<li>p11-kit (<a href="https://github.com/p11-glue/p11-kit/releases/tag/0.23.22">0.23.22</a>)</li>
<li>popt (<a href="https://github.com/rpm-software-management/popt/releases/tag/popt-1.18-release">1.18</a>)</li>
<li>rpcsvc-proto (<a href="https://github.com/thkukuk/rpcsvc-proto/releases/tag/v1.4.2">1.4.2</a>)</li>
<li>SDK: crossdev (<a href="https://gitweb.gentoo.org/proj/crossdev.git/commit/?id=b40ebcdb89f19d2fd0c563590f30d7574cfe0755">20210621</a>)</li>
<li>SDK: gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00008.html">1.20</a>)</li>
<li>SDK: man-pages-posix (<a href="https://www.mail-archive.com/cygwin-announce@cygwin.com/msg09598.html">2017a</a>)</li>
<li>SDK: miscfiles (<a href="https://lists.gnu.org/archive/html/info-gnu/2010-11/msg00009.html">1.5</a>)</li>
<li>SDK: pkgconf (<a href="https://git.sr.ht/~kaniini/pkgconf/tree/458101e787a47378d2fc74c64f649fd3a5f75e55/item/NEWS">1.7.4</a>)</li>
<li>SDK: swig (<a href="https://sourceforge.net/p/swig/news/2020/06/swig-402-released/">4.0.2</a>)</li>
<li>SDK: u-boot-tools (<a href="https://source.denx.de/u-boot/u-boot/-/tags/v2021.04-rc2">2021.04_rc2</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.11</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.84</li>
<li>systemd 249</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3066.1.0"/>
    <published>2021-12-15T19:40:26+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.1.1</id>
    <title>3033.1.1</title>
    <updated>2026-03-09T16:26:27.254411+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> Release <strong>3033.1.1</strong></p>
<p><em>Changes since <strong>Beta 3033.1.0</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739</a>)</li>
<li>Docker, containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/876426/">5.10.80</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#20111">20.10.11</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.8">1.5.8</a>)</li>
<li>ca-certificates (<a href="https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/7O6a4NlaI2A">3.72</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Added missing SELinux rule as initial step to resolve Torcx unpacking issue (<a href="https://github.com/flatcar/coreos-overlay/pull/1426">coreos-overlay#1426</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.11</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.80</li>
<li>systemd 249</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.1.1"/>
    <published>2021-11-25T11:11:55+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.1.0</id>
    <title>3033.1.0</title>
    <updated>2026-03-09T16:26:27.240735+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> release <strong>3033.1.0</strong></p>
<p><em>Changes since <strong>Alpha 3033.0.0</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43267">CVE-2021-43267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41092">CVE-2021-41092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41089">CVE-2021-41089</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41091"> CVE-2021-41091</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772"> CVE-2021-41772</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Use https protocol instead of git for Github URLs (<a href="https://github.com/flatcar/coreos-overlay/pull/1394">flatcar-linux/coreos-overlay#1394</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/874852/">5.10.77</a>)</li>
<li>docker (<a href="https://docs.docker.com/engine/release-notes/#201010">20.10.10</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.3">1.17.3</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 2983.1.2</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3739">CVE-2021-3739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3739"> CVE-2021-3760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3764">CVE-2021-3764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38300">CVE-2021-38300</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41864">CVE-2021-41864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43267">CVE-2021-43267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29923">CVE-2021-29923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772"> CVE-2021-41772</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41092">CVE-2021-41092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41089">CVE-2021-41089</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41091"> CVE-2021-41091</a>)</li>
<li>bash (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9924">CVE-2019-9924</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18276"> CVE-2019-18276</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3530">CVE-2021-3530</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3549"> CVE-2021-3549</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22945">CVE-2021-22945</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946"> CVE-2021-22946</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947"> CVE-2021-22947</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40330">CVE-2021-40330</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38604">CVE-2021-38604</a>)</li>
<li>gnuPG (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25125">CVE-2020-25125</a>)</li>
<li>libgcrypt (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40528">CVE-2021-40528</a>)</li>
<li>nettle (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580</a>)</li>
<li>polkit (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560</a>)</li>
<li>sssd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16883">CVE-2018-16883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3811">CVE-2019-3811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838">CVE-2018-16838</a>)</li>
<li>util-linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3770">CVE-2021-3770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3778">CVE-2021-3778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3796">CVE-2021-3796</a>)</li>
<li>SDK: bison (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14150">CVE-2020-14150</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24240"> CVE-2020-24240</a>)</li>
<li>SDK: perl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>toolbox: fixed support for multi-layered docker images (<a href="https://github.com/flatcar/toolbox/pull/5">flatcar-linux/toolbox#5</a>)</li>
<li>arm64: the Polkit service does not crash anymore. (<a href="https://github.com/flatcar/Flatcar/issues/156">flatcar-linux/Flatcar#156</a>)</li>
<li>The tcsd service for TPM 1 is not started on machines with TPM 2 anymore where it fails and isn’t necessary. (<a href="https://github.com/flatcar/coreos-overlay/pull/1365">flatcar-linux/coreos-overlay#1365</a>)</li>
<li>Skip tcsd.service for TPM2 devices to fix failures on c3.small.x86 instances of Equinix Metal (<a href="https://github.com/flatcar/Flatcar/issues/208">Flatcar#208</a>)</li>
<li>Fixed locksmith adhering to reboot window when getting the etcd lock (<a href="https://github.com/flatcar/locksmith/pull/10">flatcar-linux/locksmith#10</a>)</li>
<li>Run emergency.target on <code>ignition/torcx</code> service unit failure in dracut (<a href="https://github.com/flatcar/bootengine/pull/28">bootengine#28</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Added GPIO support (<a href="https://github.com/flatcar/coreos-overlay/pull/1236">coreos-overlay#1236</a>)</li>
<li>Enabled SELinux in permissive mode on ARM64 (<a href="https://github.com/flatcar/coreos-overlay/pull/1245">coreos-overlay#1245</a>)</li>
<li>Added support for some alias commands from <code>bcc</code> (<a href="https://github.com/flatcar/coreos-overlay/pull/1278">flatcar-linux/coreos-overlay#1278</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/874852/">5.10.77</a>)</li>
<li>Linux firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20210919">20210919</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.3">1.17.3</a>)</li>
<li>bash (<a href="https://lists.gnu.org/archive/html/info-gnu/2020-12/msg00003.html">5.1_p8</a>)</li>
<li>binutils (<a href="https://sourceware.org/pipermail/binutils/2021-July/117384.html">2.37</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_69_1.html#nss-3-69-1-release-notes">3.69.1</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.7">1.5.7</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_79_1">7.79.1</a>)</li>
<li>duktape (<a href="https://github.com/svaarala/duktape/blob/master/doc/release-notes-v2-6.rst">2.6.0</a>)</li>
<li>ebtables (<a href="https://lwn.net/Articles/806179/">2.0.11</a>)</li>
<li>gawk (<a href="https://lists.gnu.org/archive/html/info-gnu/2020-04/msg00007.html">5.1.0</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/master/Documentation/RelNotes/2.32.0.txt">2.32.0</a>)</li>
<li>gnuPG (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2021q3/000461.html">2.2.29</a>)</li>
<li>iptables (<a href="https://lwn.net/Articles/843069/">1.8.7</a>)</li>
<li>keyutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/tag/?h=v1.6.1">1.6.1</a>)</li>
<li>libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.14">1.14</a>)</li>
<li>libgcrypt (<a href="https://dev.gnupg.org/T5402">1.9.4</a>)</li>
<li>libmnl (<a href="https://marc.info/?l=netfilter-devel&amp;m=146745072727070&amp;w=2">1.0.4</a>)</li>
<li>libnftnl (<a href="https://marc.info/?l=netfilter&amp;m=162194376520385&amp;w=2">1.2.0</a>)</li>
<li>libtirpc (<a href="https://www.spinics.net/lists/linux-nfs/msg84129.html">1.3.2</a>)</li>
<li>ldb (<a href="https://gitlab.com/samba-team/samba/-/tags/ldb-2.3.0">2.3.0</a>)</li>
<li>lvm2 (<a href="https://github.com/lvmteam/lvm2/releases/tag/v2_02_188">2.02.188</a>)</li>
<li>nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/blob/master/NEWS#L1-37">3.7.3</a>)</li>
<li>net-tools (<a href="https://sourceforge.net/p/net-tools/news/2021/01/net-tools-210-released/">2.10</a>)</li>
<li>nftables (<a href="https://lwn.net/Articles/857369/">0.9.9</a>)</li>
<li>openssh (<a href="https://www.openssh.com/txt/release-8.7">8.7_p1-r1</a>)</li>
<li>polkit (<a href="https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.119/NEWS">0.119</a>)</li>
<li>realmd (<a href="https://gitlab.freedesktop.org/realmd/realmd/-/tags/0.17.0">0.17.0</a>)</li>
<li>sssd (2.3.1)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/blob/v249.4/NEWS">249.4</a>)</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/tags/talloc-2.3.2">2.3.2</a>)</li>
<li>util-linux (<a href="https://github.com/karelzak/util-linux/blob/v2.37.2/NEWS">2.37.2</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v8.2.3428">8.2.3428</a>)</li>
<li>xenstore (<a href="https://xenproject.org/downloads/xen-project-archives/xen-project-4-14-series/xen-project-4-14-2/">4.14.2</a>)</li>
<li>SDK: bison (3.7.6)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/perl5340delta">5.34.0</a>)</li>
<li>SDK: rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.55.0">1.55</a>)</li>
<li>VMWare: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-11.3.5">11.3.5</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.10</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.77</li>
<li>systemd 249</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.1.0"/>
    <published>2021-11-09T06:39:46+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2983.1.2</id>
    <title>2983.1.2</title>
    <updated>2026-03-09T16:26:27.231975+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Update to CGroupsV2</strong></p>
<p>As of Alpha version 2969.0.0, Flatcar Container Linux migrates to the unified cgroup hierarchy (aka CGroupsV2)! New nodes will utilize CGroupsV2 by default. Existing nodes remain on CGroupsV1 and need to be manually migrated to CGroupsV2. To learn more about CGroupsV2 on Flatcar Container Linux and the migration guide, please refer to<a href="https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/"> https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/</a></p>
<p>New <strong>Beta</strong> release <strong>2983.1.2</strong></p>
<p><em>Changes since <strong>Beta 2983.1.1</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3764">CVE-2021-3764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38300">CVE-2021-38300</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41864">CVE-2021-41864</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41092">CVE-2021-41092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41089">CVE-2021-41089</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41091"> CVE-2021-41091</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103</a>)</li>
</ul>
<p><strong>Bux fixes</strong></p>
<ul>
<li>The tcsd service for TPM 1 is not started on machines with TPM 2 anymore where it fails and isn’t necessary (<a href="https://github.com/flatcar/coreos-overlay/pull/1364">flatcar-linux/coreos-overlay#1364</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/873465/">5.10.75</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#20109">20.10.9</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_69_1.html#nss-3-69-1-release-notes">3.69.1</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.7">1.5.7</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.9</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.75</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2983.1.2"/>
    <published>2021-10-25T15:56:14+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2983.1.1</id>
    <title>2983.1.1</title>
    <updated>2026-03-09T16:26:27.227375+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> release <strong>2983.1.1</strong></p>
<p><em>Changes since <strong>Beta 2983.1.0</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41073">CVE-2021-41073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16119">CVE-2020-16119</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/870544/">5.10.69</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.8</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.69</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2983.1.1"/>
    <published>2021-09-30T16:22:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2983.1.0</id>
    <title>2983.1.0</title>
    <updated>2026-03-09T16:26:27.217124+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> release <strong>2983.1.0</strong></p>
<p><em>Changes since <strong>Beta 2942.1.2</strong></em></p>
<p><strong>Update to CGroupsV2</strong></p>
<p>As of Alpha version 2969.0.0, Flatcar Container Linux migrates to the unified cgroup hierarchy (aka CGroupsV2)! New nodes will utilize CGroupsV2 by default. Existing nodes remain on CGroupsV1 and need to be manually migrated to CGroupsV2. To learn more about CGroupsV2 on Flatcar Container Linux and the migration guide, please refer to <a href="https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/">https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/</a></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36221">CVE-2021-36221</a>)</li>
<li>libuv (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22918">CVE-2021-22918</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222</a>)</li>
<li>tar (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20193">CVE-2021-20193</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">CVE-2013-0340</a>)</li>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3739">CVE-2021-3739</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>Fixed containerd config after introduction of CGroupsV2 (<a href="https://github.com/kinvolk/coreos-overlay/pull/1214">coreos-overlay#1214</a>)</li>
<li>Fixed path for amazon-ssm-agent in base-ec2.ign (<a href="https://github.com/kinvolk/coreos-overlay/pull/1228">coreos-overlay#1228</a>)</li>
<li>Fixed locksmith adhering to reboot window when getting the etcd lock (<a href="https://github.com/kinvolk/locksmith/pull/10">locksmith#10</a>)</li>
<li>Disabled SELinux by default on dockerd wrapper script (<a href="https://github.com/kinvolk/coreos-overlay/pull/1149">coreos-overlay#1149</a>)</li>
<li>Let network-cleanup.service finish before entering rootfs (<a href="https://github.com/kinvolk/coreos-overlay/pull/1182">coreos-overlay#1182</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Added Azure <a href="https://docs.microsoft.com/en-us/azure/virtual-machines/generation-2">Generation 2 VM</a> support (<a href="https://github.com/kinvolk/coreos-overlay/pull/1198">coreos-overlay#1198</a>)</li>
<li>cgroups v2 by default for new nodes (<a href="https://github.com/kinvolk/coreos-overlay/pull/931">coreos-overlay#931</a>).</li>
<li>Upgrade Docker to 20.10 (<a href="https://github.com/kinvolk/coreos-overlay/pull/931">coreos-overlay#931</a>)</li>
<li>Switched Docker ecosystem packages to go1.16 (<a href="https://github.com/kinvolk/coreos-overlay/pull/1217">coreos-overlay#1217</a>)</li>
<li>Added lbzip2 binary to the image (<a href="https://github.com/kinvolk/coreos-overlay/pull/1221">coreos-overlay#1221</a>)</li>
<li>flatcar-install uses lbzip2 if present, falls back on bzip2 if not (<a href="https://github.com/kinvolk/init/pull/46">init#46</a>)</li>
<li>Added Intel E800 series network adapter driver (<a href="https://github.com/kinvolk/coreos-overlay/pull/1237">coreos-overlay#1237</a>)</li>
<li>Enabled 'audit' use flag for sys-libs/pam (<a href="https://github.com/kinvolk/coreos-overlay/pull/1233">coreos-overlay#1233</a>)</li>
<li>Bumped etcd and flannel to respectively <code>3.5.0</code>, <code>0.14.0</code> to get multiarch images for arm64 support. <em>Note for users of the old etcd v2 support</em>: <code>ETCDCTL_API=2</code> must be set to use v2 store as well as <code>ETCD_ENABLE_V2=true</code> in the <code>etcd-member.service</code> - this support will be removed in <code>3.6.0</code> (<a href="https://github.com/kinvolk/coreos-overlay/pull/1179">coreos-overlay#1179</a>)</li>
<li>Switched to zstd compression for the initramfs (<a href="https://github.com/kinvolk/coreos-overlay/pull/1136">coreos-overlay#1136</a>)</li>
<li>Support BTRFS in OEM and /usr partitions, but only used it for the OEM partition for now. Ignition configurations that refer to the OEM partition will work with any filesystem format specified, a mismatch is not resulting in a boot error. (<a href="https://github.com/kinvolk/coreos-overlay/pull/1106">coreos-overlay#1106</a>)</li>
<li>Switched the arm64 kernel to use a 4k page size instead of 64k</li>
<li>Switched dm-verity corruption detection to issue a kernel panic (a panic results in a reboot after 1 minute, this was the case before already) instead of merely failing certain syscalls that try to use the corrupted data</li>
<li>Support BTRFS in OEM and /usr partitions, but only used it for the OEM partition for now. Ignition configurations that refer to the OEM partition will work with any filesystem format specified, a mismatch is not resulting in a boot error. (<a href="https://github.com/kinvolk/coreos-overlay/pull/1106">coreos-overlay#1106</a>)</li>
<li>Enabled zstd compression for the initramfs and for amd64 also for the kernel because we hit the vmlinuz size limit on the /boot partition</li>
<li>Deleted the unused kernel+initramfs vmlinuz file from the /usr partition</li>
<li>devcontainer: added support to run on arm64 by switching to an architecture-agnostic partition UUID</li>
<li>Enabled ARM64 SDK bootstrap (<a href="https://github.com/kinvolk/flatcar-scripts/pull/134">scripts#134</a>)</li>
<li>SDK: enabled experimental ARM64 SDK usage (<a href="https://github.com/kinvolk/flatcar-scripts/pull/134">flatcar-scripts#134</a>) (<a href="https://github.com/kinvolk/flatcar-scripts/pull/141">flatcar-scripts#141</a>)</li>
<li>AWS: Added amazon-ssm-agent (<a href="https://github.com/kinvolk/coreos-overlay/pull/1162">coreos-overlay#1162</a>)</li>
<li>Azure: Compile OEM contents for all architectures (<a href="https://github.com/kinvolk/coreos-overlay/pull/1196">coreos-overlay#1196</a>)</li>
<li>update_engine: add postinstall hook to stay on cgroupv1 (<a href="https://github.com/kinvolk/update_engine/pull/13">update_engine#13</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/868663/">5.10.63</a>)</li>
<li>Linux firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20210818">20210818</a>)</li>
<li>c-ares (<a href="https://c-ares.haxx.se/changelog.html#1_17_2">1.17.2</a>)</li>
<li>docker (<a href="https://docs.docker.com/engine/release-notes/#20108">20.10.8</a>)</li>
<li>docker CLI (<a href="https://github.com/docker/cli/releases/tag/v20.10.8">20.10.8</a>)</li>
<li>docker proxy (<a href="https://github.com/moby/libnetwork/commit/64b7a4574d1426139437d20e81c0b6d391130ec8">0.8.0_p20210525</a>)</li>
<li>Go (<a href="https://golang.org/doc/devel/release#go1.16.minor">1.16.7</a>)</li>
<li>glibc (<a href="https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7dfddd056de5f23bc29591d212f4051ed9d0634e">2.33-r5</a>)</li>
<li>etcd (<a href="https://github.com/etcd-io/etcd/releases/tag/v3.5.0">3.5.0</a>)</li>
<li>flannel (<a href="https://github.com/flannel-io/flannel/releases/tag/v0.14.0">0.14.0</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.0.2">1.0.2</a>)</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v5.12">5.12</a>)</li>
<li>wa-linux-agent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.3.1.1">2.3.1.1</a>)</li>
<li>cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/tags/v2.3.6">2.3.6</a>)</li>
<li>expat (<a href="https://www.xml.com/news/2021-05-expat-240-and-241/">2.4.1</a>)</li>
<li>portage-utils (<a href="https://github.com/gentoo/portage-utils/releases/tag/v0.90">0.90</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/3.5.1">3.5.1</a>)</li>
<li>xz-utils (<a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=aade49443ad7ddba13bbfd9da188c99664736d80;hb=3247e95115acb95bc27f41e8cf4501db5b0b4309#l16">5.2.5</a>)</li>
<li>tar (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9935">1.34</a>)</li>
<li>libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.41.1">1.41.1</a>)</li>
<li>tini (<a href="https://github.com/krallin/tini/releases/tag/v0.19.0">0.19</a>)</li>
<li>mit-krb5 (<a href="https://github.com/krb5/krb5/tree/krb5-1.19.2-final">1.19.2</a>)</li>
<li>SDK: dnsmasq (<a href="https://thekelleys.org.uk/dnsmasq/CHANGELOG">2.85</a>)</li>
<li>SDK: rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.54.0">1.54</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 2983.0.0</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux(<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3739">CVE-2021-3739</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/868663/">5.10.63</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.8</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.63</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2983.1.0"/>
    <published>2021-09-16T14:56:46+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2942.1.2</id>
    <title>2942.1.2</title>
    <updated>2026-03-09T16:26:27.209079+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Beta</strong> release <strong>2942.1.2</strong></p>
<p><em>Changes since <strong>Beta 2942.1.1</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>Re-enabled kernel config FS_ENCRYPTION (<a href="https://github.com/kinvolk/coreos-overlay/pull/1212/">coreos-overlay#1212</a>)</li>
<li>Fixed Perl in dev-container (<a href="https://github.com/kinvolk/coreos-overlay/pull/1238">coreos-overlay#1238</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/867497/">5.10.61</a>)</li>
<li>openssl (<a href="https://mta.openssl.org/pipermail/openssl-announce/2021-August/000206.html">1.1.1l</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.61</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2942.1.2"/>
    <published>2021-09-01T14:14:50+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2942.1.1</id>
    <title>2942.1.1</title>
    <updated>2026-03-09T16:26:27.203414+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 2942.1.0</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38205">CVE-2021-38205</a>)</li>
<li>NVIDIA Drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1090">CVE-2021-1090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1093">CVE-2021-1093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1094">CVE-2021-1094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1095">CVE-2021-1095</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36221">CVE-2021-36221</a>)</li>
<li>Systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>Fixed <code>pam.d</code> sssd LDAP auth with sudo (<a href="https://github.com/kinvolk/coreos-overlay/pull/1170">coreos-overlay#1170</a>)</li>
<li>Let network-cleanup.service finish before entering rootfs (<a href="https://github.com/kinvolk/coreos-overlay/pull/1182">coreos-overlay#1182</a>)</li>
<li>Fixed SELinux policy for Flannel CNI (<a href="https://github.com/kinvolk/coreos-overlay/pull/1181">coreos-overlay#1181</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Switched to zstd for the initramfs (<a href="https://github.com/kinvolk/coreos-overlay/pull/1136">coreos-overlay#1136</a>)</li>
<li>Embedded new subkey in flatcar-install (<a href="https://github.com/kinvolk/coreos-overlay/pull/1180">coreos-overlay#1180</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/866302/">5.10.59</a>)</li>
<li>NVIDIA Drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-470-57-02/index.html">470.57.02</a>)</li>
<li>Systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v247.9">247.9</a>)</li>
<li>Go (<a href="https://golang.org/doc/devel/release#go1.16.minor">1.16.7</a>)</li>
<li>portage-utils (<a href="https://github.com/gentoo/portage-utils/releases/tag/v0.90">0.90</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.59</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2942.1.1"/>
    <published>2021-08-19T13:36:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2942.1.0</id>
    <title>2942.1.0</title>
    <updated>2026-03-09T16:26:27.195108+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 2920.1.0</strong></em></p>
<p><strong>Security Fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29562">CVE-2020-29562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013</a>, <a href="https://nvd.nist.gov/vuln/detail/https://cve.circl.lu/cve/CVE-2020-27618">CVE-2020-27618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27645">CVE-2021-27645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558</a>)</li>
<li>libgcrypt (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560</a>)</li>
<li>libpcre (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>Added the systemd tag in udev for Azure storage devices, to fix /boot automount (<a href="https://github.com/kinvolk/init/pull/41">init#41</a>)</li>
<li>Disabled SELinux by default on <code>dockerd</code> wrapper script (<a href="https://github.com/kinvolk/coreos-overlay/pull/1149">coreos-overlay#1149</a>)</li>
<li>Set the cilium_vxlan interface to be not managed by networkd's default setup with DHCP as it's managed by Cilium. (<a href="https://github.com/kinvolk/init/pull/43">init#43</a>)</li>
<li>update_engine_client: Improve feedback when an update is not needed(<a href="https://github.com/kinvolk/update_engine/pull/10">update_engine#10</a>)</li>
<li>GCE: Granted CAP_NET_ADMIN to set routes for the TCP LB when starting oem-gce.service (<a href="https://github.com/kinvolk/coreos-overlay/pull/1146">coreos-overlay#1146</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Enabled telnet support for curl (<a href="https://github.com/kinvolk/coreos-overlay/pull/1099">coreos-overlay#1099</a>)</li>
<li>Enabled ssl USE flag for wget (<a href="https://github.com/kinvolk/coreos-overlay/pull/932">coreos-overlay#932</a>)</li>
<li>Enabled MDIO_BCM_UNIMAC for arm64 (<a href="https://github.com/kinvolk/coreos-overlay/pull/929">coreos-overlay#929</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/864901/">5.10.55</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.4">1.5.4</a>)</li>
<li>dbus (<a href="https://github.com/freedesktop/dbus/blob/ab88811768f750777d1a8b9d9ab12f13390bfd3a/NEWS#L1">1.12.20</a>)</li>
<li>dracut (<a href="https://github.com/dracutdevs/dracut/releases/tag/053">053</a>)</li>
<li>glibc (<a href="https://sourceware.org/pipermail/libc-alpha/2021-February/122207.html">2.33</a>)</li>
<li>go (<a href="https://golang.org/doc/devel/release#go1.16.minor">1.16.6</a>)</li>
<li>libev (4.33)</li>
<li>libgcrypt (<a href="https://github.com/gpg/libgcrypt/blob/cb78627203705365d24b48ec4fc4cf2fc804b277/NEWS#L1">1.9.3</a>)</li>
<li>libpcre (8.44)</li>
<li>libverto (<a href="https://github.com/latchset/libverto/releases/tag/0.3.1">0.3.1</a>)</li>
<li>pax-utils (1.3.1)</li>
<li>readline (<a href="https://tiswww.case.edu/php/chet/readline/CHANGES">8.1_p1</a>)</li>
<li>rust (<a href="https://blog.rust-lang.org/2021/06/17/Rust-1.53.0.html">1.53.0</a>)</li>
<li>selinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/20200710">3.1</a>)</li>
<li>selinux-refpolicy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818">2.20200818</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v247.7">247.7</a>)</li>
<li>VMWare: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-11.3.0">11.3.0</a>)</li>
</ul>
<p><em>Changes since <strong>Alpha 2942.0.0</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Set the cilium_vxlan interface to be not managed by networkd's default setup with DHCP as it's managed by Cilium. (<a href="https://github.com/kinvolk/init/pull/43">init#43</a>)</li>
<li>Disabled SELinux by default on <code>dockerd</code> wrapper script (<a href="https://github.com/kinvolk/coreos-overlay/pull/1149">coreos-overlay#1149</a>)</li>
<li>GCE: Granted CAP_NET_ADMIN to set routes for the TCP LB when starting oem-gce.service (<a href="https://github.com/kinvolk/coreos-overlay/pull/1146">coreos-overlay#1146</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/864901/">5.10.55</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.55</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2942.1.0"/>
    <published>2021-08-04T13:23:23+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2920.1.0</id>
    <title>2920.1.0</title>
    <updated>2026-03-09T16:26:27.188445+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Alpha 2920.0.0</strong></em></p>
<p><strong>Security Fixes</strong></p>
<ul>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760</a>)</li>
<li>curl (CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22926)</li>
<li>linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26541">CVE-2020-26541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35039">CVE-2021-35039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543</a>, CVE-2021-3609, CVE-2021-3655, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/863648/">5.10.52</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_78_0">7.78</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.4">1.5.4</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 2905.1.0</strong></em></p>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/863648/">5.10.52</a>)</li>
<li>lz4 (<a href="https://github.com/lz4/lz4/releases/tag/v1.9.3">1.9.3-r1</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_78_0">7.78</a>)</li>
<li>gptfdisk (1.0.7)</li>
<li>gettext (<a href="https://lists.gnu.org/archive/html/info-gnu/2020-07/msg00009.html">0.21-r1</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20210608">20210608_p20210608</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.0.0">1.0.0</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.52</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2920.1.0"/>
    <published>2021-07-28T08:21:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2905.1.0</id>
    <title>2905.1.0</title>
    <updated>2026-03-09T16:26:27.180435+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Alpha</strong> <strong>2905.0.0</strong>:</em>
<strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33624">CVE-2021-33624</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>NVIDIA GPU Support added in the AWS Pro images (<a href="https://github.com/kinvolk/coreos-overlay/pull/1078">coreos-overlay#1078</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/860655/">5.10.46</a>)</li>
</ul>
<p><em>Changes since <strong>Beta</strong> <strong>2823.1.3</strong>:</em>
<strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33624">CVE-2021-33624</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487</a>)</li>
<li>openldap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212</a>)</li>
<li>sqlite (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20227">CVE-2021-20227</a>)</li>
<li>Go (CVE-2021-33195,CVE-2021-33196,CVE-2021-33197,CVE-2021-33198)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518</a>,CVE-2021-3541)</li>
<li>qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10717">CVE-2020-10717</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13754"> CVE-2020-13754</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15859"> CVE-2020-15859</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863"> CVE-2020-15863</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092"> CVE-2020-16092</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25741"> CVE-2020-25741</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25742"> CVE-2020-25742</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25743"> CVE-2020-25743</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20231">CVE-2021-20231</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20232"> CVE-2021-20232</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22890"> CVE-2021-22890</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>NVIDIA GPU Support added in the AWS Pro images (<a href="https://github.com/kinvolk/coreos-overlay/pull/1078">coreos-overlay#1078</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/860655/">5.10.46</a>)</li>
<li>dbus (<a href="https://github.com/freedesktop/dbus/releases/tag/dbus-1.10.32">1.10.32</a>)</li>
<li>openssh (<a href="https://www.openssh.com/txt/release-8.6">8.6_p1</a>)</li>
<li>openldap (<a href="https://www.openldap.org/software/release/announce.html">2.4.58</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_76_1">7.76.1</a>)</li>
<li>gnutls (<a href="https://gitlab.com/gnutls/gnutls/-/tags/3.7.1">3.7.1</a>)</li>
<li>git (<a href="https://raw.githubusercontent.com/git/git/v2.26.3/Documentation/RelNotes/2.26.3.txt">2.26.3</a>)</li>
<li>go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.16.4">1.16.4</a>)</li>
<li>dnsmasq (<a href="https://thekelleys.org.uk/dnsmasq/CHANGELOG">2.83</a>)</li>
<li>libxml2 (<a href="https://github.com/GNOME/libxml2/releases/tag/v2.9.12">2.9.12</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_34_1.html">3.34.1</a>)</li>
<li>SDK: binutils (<a href="https://sourceware.org/pipermail/binutils/2021-February/115240.html">2.36.1</a>)</li>
<li>SDK: QEMU (<a href="https://wiki.qemu.org/ChangeLog/5.2">5.2.0</a>)</li>
</ul>
<p><strong>Deprecation</strong></p>
<ul>
<li>rkt and kubelet-wrapper are deprecated and removed from Beta, also from subsequent channels in the future. Please read the<a href="https://groups.google.com/g/flatcar-linux-user/c/MeinndLqJO4"> removal announcement</a> to know more.</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.46</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2905.1.0"/>
    <published>2021-07-02T07:37:53+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2823.1.3</id>
    <title>2823.1.3</title>
    <updated>2026-03-09T16:26:27.174336+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28691">CVE-2021-28691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3587">CVE-2021-3587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Update-engine sent empty requests when restarted before a pending reboot (<a href="https://github.com/kinvolk/Flatcar/issues/388">Flatcar#388</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Disabled SELinux for Docker (<a href="https://github.com/kinvolk/coreos-overlay/pull/1055">coreos-overlay#1055</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/859022/">5.10.43</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.43</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2823.1.3"/>
    <published>2021-06-17T10:30:54+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2823.1.2</id>
    <title>2823.1.2</title>
    <updated>2026-03-09T16:26:27.170361+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Bug fixes</strong></p>
<ul>
<li>The Linux kernel IOMMU-related crash introduced in the 5.10.37 update got fixed through the 5.10.38 update (<a href="https://github.com/kinvolk/Flatcar/issues/400">Flatcar#400</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/856654/">5.10.38</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.38</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2823.1.2"/>
    <published>2021-05-21T12:08:31+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2823.1.1</id>
    <title>2823.1.1</title>
    <updated>2026-03-09T16:26:27.166047+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3491">CVE-2021-3491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31440">CVE-2021-31440</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31829">CVE-2021-31829</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1052">CVE-2021-1052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1053">CVE-2021-1053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1056">CVE-2021-1056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1076">CVE-2021-1076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1077">CVE-2021-1077</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/856269/">5.10.37</a>)</li>
<li>nvidia-drivers (<a href="https://www.nvidia.com/Download/driverResults.aspx/172376/en-us">460.73.01</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.37</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2823.1.1"/>
    <published>2021-05-19T11:39:05+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2823.1.0</id>
    <title>2823.1.0</title>
    <updated>2026-03-09T16:26:27.157567+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Alpha</strong> <strong>2823.0.0</strong>:</em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28964">CVE-2021-28964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28951">CVE-2021-28951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28952">CVE-2021-28952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29266">CVE-2021-29266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29649">CVE-2021-29649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29646">CVE-2021-29646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29647">CVE-2021-29647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29155">CVE-2021-29155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23133">CVE-2021-23133</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Fix the patch to update DefaultTasksMax in systemd (<a href="https://github.com/kinvolk/coreos-overlay/pull/971">coreos-overlay#971</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/853762/">5.10.32</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v247.6">247.6</a>)</li>
</ul>
<p><em>Changes since <strong>Beta</strong> <strong>2801.1.0</strong>:</em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28964">CVE-2021-28964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28951">CVE-2021-28951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28952">CVE-2021-28952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29266">CVE-2021-29266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29649">CVE-2021-29649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29646">CVE-2021-29646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29647">CVE-2021-29647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29155">CVE-2021-29155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23133">CVE-2021-23133</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27918">CVE-2021-27918</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27919"> CVE-2021-27919</a>)</li>
<li>glib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">CVE-2021-28153</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218"> CVE-2021-27218</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219"> CVE-2021-27219</a>)</li>
<li>boost (<a href="https://nvd.nist.gov/vuln/detail/CVE-2012-2677">CVE-2012-2677</a>)</li>
<li>ncurses (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17594">CVE-2019-17594</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595"> CVE-2019-17595</a>)</li>
<li>zstd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-24032">CVE-2021-24032</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>Fix the patch to update DefaultTasksMax in systemd (<a href="https://github.com/kinvolk/coreos-overlay/pull/971">coreos-overlay#971</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>The pam_faillock PAM module was enabled as replacement for the removed pam_tally2 module and will temporarily lock an account if there were login attempts with a wrong password. The faillock command can be used to show the current state. With pam_tally2 there was no limit for wrong password login attempts but with faillock the default is already restricting the attempts. The default behavior was relaxed to allow 5 wrong passwords per two minutes, and a one minute account lock time. This does not apply to logins with an SSH key. (<a href="https://github.com/kinvolk/baselayout/pull/17">baselayout#17</a>)</li>
<li>The etcd and flannel services are now run with Docker and any rkt-based customizations of the etcd-member and flanneld services not supported anymore. Also, because the flanneld service relies on Docker and will restart Docker after applying the new configuration, it is not possible anymore to set Requires=flanneld.service for docker.service and instead it’s enough to have flanneld.service enabled. (<a href="https://github.com/kinvolk/coreos-overlay/pull/857">coreos-overlay#857</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/853762/">5.10.32</a>)</li>
<li>Linux firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20210315">20210315</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v247.6">247.6</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.15.10">1.15.10</a>)</li>
<li>boost (<a href="https://www.boost.org/users/history/version_1_75_0.html">1.75.0</a>)</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.66.8">2.66.8</a>)</li>
<li>ncurses (<a href="https://invisible-island.net/ncurses/announce-6.2.html">6.2</a>)</li>
<li>zstd (<a href="https://github.com/facebook/zstd/releases/tag/v1.4.9">1.4.9</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.32</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2823.1.0"/>
    <published>2021-04-28T13:33:49+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2801.1.0</id>
    <title>2801.1.0</title>
    <updated>2026-03-09T16:26:27.149928+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28039">CVE-2021-28039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28375">CVE-2021-28375</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3444">CVE-2021-3444</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841"> CVE-2021-23841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840"> CVE-2021-23840</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841"> CVE-2021-23841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3449">CVE-2021-3449</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3450"> CVE-2021-3450</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>GCE: The old interface name ens4v1 which was replaced by eth0 due to a broken udev rule was restored, but now as alternative interface name, and eth0 will stay the primary name for consistency across cloud environments. (<a href="https://github.com/kinvolk/init/pull/38">init#38</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>The virtio network interfaces got predictable interface names as alternative interface names, and thus these names can also be used to match for a specific interface in case there is more than one and the eth0 and eth1 name assignment is not stable. (<a href="https://github.com/kinvolk/init/pull/38">init#38</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/849951/">5.10.25</a>)</li>
<li>openssl (<a href="https://mta.openssl.org/pipermail/openssl-announce/2021-March/000197.html">1.1.1k</a>)</li>
<li>open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.4">2.1.4</a>)</li>
</ul>
<p><strong>Deprecation</strong></p>
<ul>
<li>dhcpcd and containerd-stress are deprecated and removed from Beta, also from subsequent channels in the future. Users that relied on dhcpd should either migrate to systemd-networkd as a DHCP server or run dhcpd from a container.</li>
<li>Docker 1.12 is deprecated and removed from Beta, also from subsequent channels in the future.</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.25</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2801.1.0"/>
    <published>2021-03-25T15:38:18+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2765.1.0</id>
    <title>2765.1.0</title>
    <updated>2026-03-09T16:26:27.144065+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3348">CVE-2021-3348</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26708">CVE-2021-26708</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20194">CVE-2021-20194</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21285">CVE-2021-21285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21284">CVE-2021-21284</a>)</li>
<li>NVIDIA (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1052">CVE-2021-1052</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1053"> CVE-2021-1053</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1056"> CVE-2021-1056</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>app-crypt/trousers: use correct file permissions (<a href="https://github.com/kinvolk/coreos-overlay/pull/809">coreos-overlay#809</a>)</li>
<li>x11-drivers/nvidia-drivers: Handle NVIDIA Version upgrades (<a href="https://github.com/kinvolk/coreos-overlay/pull/762">https://github.com/kinvolk/coreos-overlay/pull/762</a>)</li>
<li>flatcar-eks: add missing mkdir and update to latest versions (<a href="https://github.com/kinvolk/coreos-overlay/pull/817">https://github.com/kinvolk/coreos-overlay/pull/817</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/846116/">5.10.16</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/19.03/#190315">19.03.15</a>)</li>
<li>NVIDIA Tesla Driver (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-460-32-03/index.html">460.32.03</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.16</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2765.1.0"/>
    <published>2021-02-18T12:44:47+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2705.1.2</id>
    <title>2705.1.2</title>
    <updated>2026-03-09T16:26:27.138637+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>go - <a href="https://github.com/golang/go/issues/43786">CVE-2021-3114</a></li>
<li>sudo - <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239</a></li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li><code>/etc/iscsi/initiatorname.iscsi</code> is generated by the iscsi-init service (<a href="https://github.com/kinvolk/Flatcar/issues/321">#321</a>)</li>
<li>Prevent iscsiadm buffer overflow (<a href="https://github.com/kinvolk/Flatcar/issues/318">#318</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Revert to building docker and containerd with go1.13 instead of go1.15. This reduces the SIGURG log spam (<a href="https://github.com/kinvolk/Flatcar/issues/315">Issue #315</a> <a href="https://github.com/kinvolk/coreos-overlay/pull/774">PR #774</a>)</li>
<li>The containerd socket is now available in the default location (<code>/run/containerd/containerd.sock</code>) and also as a symlink in the previous location (<code>/run/docker/libcontainerd/docker-containerd.sock</code>) (<a href="https://github.com/kinvolk/coreos-overlay/pull/771">#771</a>)</li>
<li>With the iscsi update, the service unit has changed from iscsid to iscsi (<a href="https://github.com/kinvolk/coreos-overlay/pull/791">#791</a>)</li>
<li>AWS Pro: include scripts to facilitate setup of EKS workers (<a href="https://github.com/kinvolk/coreos-overlay/pull/794">#794</a>).</li>
<li>Missed from earlier notes: with the previous open-iscsi update to 2.1.2, the service unit name changed from iscsid to iscsi (<a href="https://github.com/kinvolk/coreos-overlay/pull/682">#682</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.3">2.1.3</a>)</li>
<li>go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.15.7">1.15.7</a>)</li>
<li>sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_5p2">1.9.5p2</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.14</li>
<li>ignition 0.34.0</li>
<li>kernel 5.9.16</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2705.1.2"/>
    <published>2021-01-28T11:01:35+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2705.1.1</id>
    <title>2705.1.1</title>
    <updated>2026-03-09T16:26:27.132887+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux
<ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27835">CVE-2020-27835</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660</a></li>
<li><a href="https://www.openwall.com/lists/oss-security/2020/12/07/1">CVE-2020-27830</a></li>
<li><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f134b89a24b965991e7c345b9a4591821f7c2a6">CVE-2020-28588</a></li>
</ul>
</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>The sysctl <code>net.ipv4.conf.*.rp_filter</code> is set to <code>0</code> for the Cilium CNI plugin to work (<a href="https://github.com/kinvolk/Flatcar/issues/181">kinvolk/Flatcar#181</a>)</li>
<li>Package downloads in the developer container now use the correct URL again (<a href="https://github.com/kinvolk/Flatcar/issues/298">kinvolk/Flatcar#298</a>)</li>
<li>networkd: avoid managing MAC addresses for veth devices (<a href="https://github.com/kinvolk/init/pull/33">kinvolk/init#33</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>The sysctl default config file is now applied under the prefix 60 which allows for custom sysctl config files to take effect when they start with a prefix of 70, 80, or 90 (<a href="https://github.com/kinvolk/baselayout/pull/13">kinvolk/baselayout#13</a>)</li>
<li>Containerd CRI plugin got enabled by default, only the containerd socket path needs to be specified as kubelet parameter for Kubernetes 1.20 to use containerd instead of Docker (<a href="https://github.com/kinvolk/Flatcar/issues/283">kinvolk/Flatcar#283</a>)</li>
<li>For users with a custom update server a machine alias setting in update-engine allows to give human-friendly names to client instances (<a href="https://github.com/kinvolk/update_engine/pull/8">kinvolk/update-engine#8</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/840977/">5.9.16</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.4.3">1.4.3</a>)</li>
<li>Docker (<a href="https://github.com/docker/docker-ce/releases/tag/v19.03.14">19.03.14</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.14</li>
<li>ignition 0.34.0</li>
<li>kernel 5.9.16</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2705.1.1"/>
    <published>2021-01-12T17:00:58+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2705.1.0</id>
    <title>2705.1.0</title>
    <updated>2026-03-09T16:26:27.128530+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>No changes since Alpha 2705.0.0</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>No changes since Alpha 2705.0.0</li>
</ul>
<p>Changes:</p>
<ul>
<li>No changes since Alpha 2705.0.0</li>
</ul>
<p>Updates:</p>
<ul>
<li>No changes since Alpha 2705.0.0</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.13</li>
<li>ignition 0.34.0</li>
<li>kernel 5.9.11</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2705.1.0"/>
    <published>2020-12-01T13:28:41+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2643.1.1</id>
    <title>2643.1.1</title>
    <updated>2026-03-09T16:26:27.124540+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Linux -  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27194">CVE-2020-27194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27152">CVE-2020-27152</a></li>
<li>Go - <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28362">CVE-2020-28362</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28367">CVE-2020-28367</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28366">CVE-2020-28366</a></li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>network: Restore KeepConfiguration=dhcp-on-stop (<a href="https://github.com/kinvolk/init/pull/30">kinvolk/init#30</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/835763/">5.8.18</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.15.5">1.15.5</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.13</li>
<li>ignition 0.34.0</li>
<li>kernel 5.8.18</li>
<li>systemd 245</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2643.1.1"/>
    <published>2020-11-19T15:42:05+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2643.1.0</id>
    <title>2643.1.0</title>
    <updated>2026-03-09T16:26:27.120546+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Linux - <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211</a></li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Ensured that the <code>/etc/coreos</code> to <code>/etc/flatcar</code> symlink always exists, relevant for the Container Linux Config transpiler (ct) when specifying directives for <code>update:</code> or <code>locksmith:</code> while also reformatting the rootfs (<a href="https://github.com/flatcar/baselayout/pull/7">baselayout PR#7</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/833689/">5.8.14</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.13</li>
<li>ignition 0.34.0</li>
<li>kernel 5.8.14</li>
<li>systemd 245</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2643.1.0"/>
    <published>2020-10-16T08:05:22+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2632.1.0</id>
    <title>2632.1.0</title>
    <updated>2026-03-09T16:26:27.115842+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Linux: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284">CVE-2020-25284</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390">CVE-2020-14390</a></li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Enabled missing systemd services (<a href="https://github.com/flatcar/Flatcar/issues/191">#191</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/612">PR #612</a>)</li>
<li>Fixed Docker torcx image unpacking error on machines with less than ~600 MB total RAM (<a href="https://github.com/flatcar/Flatcar/issues/32">#32</a>)</li>
<li>Solved adcli Kerberos Active Directory incompatibility (<a href="https://github.com/flatcar/Flatcar/issues/194">#194</a>)</li>
<li>Fixed the makefile path when building kernel modules with the developer container (<a href="https://github.com/flatcar/Flatcar/issues/195">#195</a>)</li>
<li>Removed the <code>/etc/portage/savedconfig/</code> folder that contained a dump of the firmware config <a href="https://github.com/flatcar/coreos-overlay/pull/613">flatcar-linux/coreos-overlay#613</a></li>
</ul>
<p>Changes:</p>
<ul>
<li>GCE: Improved oslogin support and added shell aliases to run a Python Docker image (<a href="https://github.com/flatcar/coreos-overlay/pull/592">PR #592</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/832305/">5.8.11</a></li>
<li>adcli <a href="https://cgit.freedesktop.org/realmd/adcli/tree/NEWS?h=0.9.0">0.9.0</a></li>
<li>GCE: oslogin <a href="https://github.com/GoogleCloudPlatform/guest-oslogin/releases/tag/20200910.00">20200910.00</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.12</li>
<li>ignition 0.34.0</li>
<li>kernel 5.8.11</li>
<li>rkt 1.30.0</li>
<li>systemd 245</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2632.1.0"/>
    <published>2020-09-30T12:22:40+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2605.4.0</id>
    <title>2605.4.0</title>
    <updated>2026-03-09T16:26:27.111290+00:00</updated>
    <content type="html"><![CDATA[<p>Bug fixes:</p>
<ul>
<li>Fix resetting of DNS nameservers in systemd-networkd units (<a href="https://github.com/flatcar/systemd/pull/12">PR#12</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Disable TX checksum offloading for the IP-in-IP tunl0 interface used by Calico (<a href="https://github.com/flatcar/init/pull/26">PR#26</a>). This is a workaround for a Mellanox driver issue, currently tracked in <a href="https://github.com/flatcar/Flatcar/issues/183">Flatcar#183</a></li>
<li>Set <code>sysctl net.ipv4.conf.(all|*).rp_filter</code> to 0 (instead of the systemd upstream value 2) to be less restrictive which some network solutions rely on (<a href="https://github.com/flatcar/systemd/pull/11">PR#11</a>)</li>
<li><code>flatcar-install</code> allows installation to a multipath drive (<a href="https://github.com/flatcar/init/pull/24">PR#24</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/831366/">5.4.65</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.12</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.65</li>
<li>rkt 1.30.0</li>
<li>systemd 245</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.4.0"/>
    <published>2020-09-16T06:13:42+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2605.3.0</id>
    <title>2605.3.0</title>
    <updated>2026-03-09T16:26:27.107333+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Linux kernel: Fix AF_PACKET overflow in tpacket_rcv <a href="https://seclists.org/oss-sec/2020/q3/146">CVE-2020-14386</a></li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/830502/">5.4.62</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.12</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.62</li>
<li>rkt 1.30.0</li>
<li>systemd 245</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.3.0"/>
    <published>2020-09-07T15:37:41+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2605.2.0</id>
    <title>2605.2.0</title>
    <updated>2026-03-09T16:26:27.103881+00:00</updated>
    <content type="html"><![CDATA[<p>Changes from Alpha release 2605.1.0</p>
<p>Changes:</p>
<ul>
<li>Update public key to include <a href="https://github.com/flatcar/init/pull/25">new subkey</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.12</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.61</li>
<li>rkt 1.30.0</li>
<li>systemd 245</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.2.0"/>
    <published>2020-09-03T12:48:56+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2513.3.0</id>
    <title>2513.3.0</title>
    <updated>2026-03-09T16:26:27.099512+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Bind: fixes for <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8620">CVE-2020-8620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8621">CVE-2020-8621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8623">CVE-2020-8623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8624">CVE-2020-8624</a></li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>etcd-wrapper: Adjust data dir permissions (<a href="https://github.com/flatcar/coreos-overlay/pull/536">flatcar-linux/coreos-overlay#536</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/829106/">5.4.59</a></li>
<li>bind-tools <a href="https://ftp.isc.org/isc/bind9/cur/9.11/RELEASE-NOTES-bind-9.11.22.txt">9.11.22</a></li>
<li>etcd-wrapper <a href="https://github.com/etcd-io/etcd/releases/tag/v3.3.24">3.3.24</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.11</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.59</li>
<li>rkt 1.30.0</li>
<li>systemd 243</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2513.3.0"/>
    <published>2020-08-20T21:46:48+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2513.2.0</id>
    <title>2513.2.0</title>
    <updated>2026-03-09T16:26:27.095617+00:00</updated>
    <content type="html"><![CDATA[<p>Changes since the Alpha release 2513.1.0</p>
<p>Bug Fixes:</p>
<ul>
<li>The <a href="https://docs.flatcar-linux.org/ignition/network-configuration/#using-static-ip-addresses-with-ignition">static IP address configuration in the initramfs</a> works again in the format <code>ip=&lt;ip&gt;::&lt;gateway&gt;:&lt;netmask&gt;:&lt;hostname&gt;:&lt;iface&gt;:none[:&lt;dns1&gt;[:&lt;dns2&gt;]]</code> https://github.com/flatcar/bootengine/pull/15</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/826291/">5.4.52</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.11</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.52</li>
<li>rkt 1.30.0</li>
<li>systemd 243</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2513.2.0"/>
    <published>2020-07-23T09:44:10+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2512.1.1</id>
    <title>2512.1.1</title>
    <updated>2026-03-09T16:26:27.091735+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Security fixes:</p>
<ul>
<li>Fix the Intel Microcode vulnerabilities (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543">CVE-2020-0543</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>A source code and licensing overview is available under <code>/usr/share/licenses/INFO</code></li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/822841/">4.19.128</a></li>
<li>intel-microcode <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20200609">20200609</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.34.0</li>
<li>kernel 4.19.128</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2512.1.1"/>
    <published>2020-06-17T15:46:09+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2512.1.0</id>
    <title>2512.1.0</title>
    <updated>2026-03-09T16:26:27.084856+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Security fixes:</p>
<ul>
<li>Fix e2fsprogs arbitrary code execution via crafted filesystem (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094">CVE-2019-5094</a>)</li>
<li>Fix Git arbitrary path overwrite, credential leak from credential helpers, remote code execution in recursive clones, and arbitrary command execution via submodules (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348">CVE-2019-1348</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387">CVE-2019-1387</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604">CVE-2019-19604</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11008">CVE-2020-11008</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5260">CVE-2020-5260</a>)</li>
<li>Fix libarchive crash or use-after-free via crafted RAR file (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18408">CVE-2019-18408</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9308">CVE-2020-9308</a>)</li>
<li>Fix libgcrypt ECDSA timing attack (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627">CVE-2019-13627</a>)</li>
<li>Fix libidn2 domain impersonation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290">CVE-2019-12290</a>)</li>
<li>Fix NSS crashes and heap corruption (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695">CVE-2017-11695</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696">CVE-2017-11696</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697">CVE-2017-11697</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698">CVE-2017-11698</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508">CVE-2018-18508</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745">CVE-2019-11745</a>)</li>
<li>Fix OpenSSL overflow in Montgomery squaring procedure (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551">CVE-2019-1551</a>)</li>
<li>Fix SQLite crash and heap corruption (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168">CVE-2019-16168</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827">CVE-2019-5827</a>)</li>
<li>Fix unzip heap overflow or excessive resource consumption via crafted archive (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035">CVE-2018-1000035</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13232">CVE-2019-13232</a>)</li>
<li>Fix vim arbitrary command execution via crafted file (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735">CVE-2019-12735</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>When writing the update kernel, prefer <code>/boot/coreos</code> only if <code>/boot/coreos/vmlinux-*</code> exists (https://github.com/flatcar/update_engine/pull/5)</li>
<li>Fixed sysroot-boot initramfs service race which resulted in a warning that this service failed</li>
<li>Use the correct <code>BINHOST</code> URLs in the development container to download binary packages</li>
</ul>
<p>Changes:</p>
<ul>
<li>Support the CoreOS GRUB <code>/boot/coreos/first_boot</code> flag file (https://github.com/flatcar/bootengine/pull/13)</li>
<li>Fetch container images in docker format rather than ACI by default in <code>etcd-member.service</code>, <code>flanneld.service</code>, and <code>kubelet-wrapper</code></li>
<li>Use <code>flatcar.autologin</code> kernel command line parameter on Azure and VMware for auto login on the serial console</li>
<li>Include <code>conntrack</code> (<a href="http://conntrack-tools.netfilter.org/">conntrack-tools</a>)</li>
<li>Include <code>journalctl</code> output, <code>pstore</code> kernel crash logs, and <code>coredumpctl list</code> output in the <code>mayday</code> report</li>
<li>Update wa-linux-agent to 2.2.46 on Azure</li>
<li>Support both <code>coreos.config.*</code> and <code>flatcar.config.*</code> guestinfo variables on VMware OEM</li>
</ul>
<p>Updates:</p>
<ul>
<li>e2fsprogs <a href="http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.45.5">1.45.5</a></li>
<li>etcd <a href="https://github.com/etcd-io/etcd/releases/tag/v3.3.20">3.3.20</a></li>
<li>etcdctl <a href="https://github.com/etcd-io/etcd/releases/tag/v3.3.20">3.3.20</a></li>
<li>Git <a href="https://raw.githubusercontent.com/git/git/v2.24.1/Documentation/RelNotes/2.24.1.txt">2.24.1</a></li>
<li>Linux <a href="https://lwn.net/Articles/820974/">4.19.124</a></li>
<li>OpenSSL <a href="https://www.openssl.org/news/openssl-1.0.2-notes.html">1.0.2u</a></li>
<li>vim <a href="http://ftp.vim.org/pub/vim/patches/8.2/README">8.2.0360</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.34.0</li>
<li>kernel 4.19.124</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2512.1.0"/>
    <published>2020-05-26T16:58:31+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2411.1.1</id>
    <title>2411.1.1</title>
    <updated>2026-03-09T16:26:27.079135+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Use newest network interface naming scheme (https://github.com/flatcar/Flatcar/issues/36)
<ul>
<li>It is a possible breaking change for some persistent network interface names</li>
</ul>
</li>
<li>Fix URL scheme in emerge-gitclone (https://github.com/flatcar/coreos-overlay/issues/223)</li>
<li>Fix coreos-cloudinit variable names (https://github.com/flatcar/coreos-overlay/pull/206)</li>
<li>Prefer /boot/coreos to write updates (https://github.com/flatcar/update_engine/pull/2)</li>
<li>Remove /boot/coreos/first_boot after a Ignition rerun on migration (https://github.com/flatcar/bootengine/pull/10)</li>
<li>Support coreos.config.url as kernel command line parameter for Ignition (https://github.com/flatcar/ignition/pull/10)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Add kernel config for QEDE driver (https://github.com/flatcar/coreos-overlay/pull/198)</li>
<li>Add <code>tracepath</code> alongside <code>traceroute6</code> (https://github.com/flatcar/Flatcar/issues/50)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/815677/">4.19.112</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.34.0</li>
<li>kernel 4.19.112</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2411.1.1"/>
    <published>2020-03-31T16:25:22+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2411.1.0</id>
    <title>2411.1.0</title>
    <updated>2026-03-09T16:26:27.074967+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Enable persistent network interface names already in the initramfs to fix https://github.com/coreos/bugs/issues/1767</li>
<li>Fix backwards compatibility issues for users to migrate from CoreOS Container Linux. Support the kernel command line parameters <code>coreos.oem.*</code>, <code>coreos.autologin</code>, <code>coreos.first_boot</code>, and the QEMU firmware config path <code>opt/com.coreos/config</code> (https://github.com/flatcar/Flatcar/issues/16 https://github.com/flatcar/afterburn/pull/7 https://github.com/flatcar/bootengine/pull/7 https://github.com/flatcar/bootengine/pull/8 https://github.com/flatcar/init/pull/16 https://github.com/flatcar/init/pull/17 https://github.com/flatcar/ignition/pull/8)</li>
</ul>
<h2><a href="https://github.com/coreos/manifest/releases/tag/v2411.1.0">Upstream Container Linux updates</a></h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/813157/">4.19.106</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.34.0</li>
<li>kernel 4.19.106</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2411.1.0"/>
    <published>2020-03-02T11:57:48+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2345.2.0</id>
    <title>2345.2.0</title>
    <updated>2026-03-09T16:26:27.070711+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix DNS resolution for the GCE metadata server (https://github.com/flatcar/coreos-overlay/pull/160)</li>
<li>Create symlink for /run/metadata/coreos (https://github.com/flatcar/coreos-overlay/pull/166)</li>
<li>Create symlink for flatcar-install (https://github.com/flatcar/init/pull/14)</li>
</ul>
<h2><a href="https://github.com/coreos/manifest/releases/tag/v2345.2.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix systemd use-after-free upon receiving crafted D-Bus message from local unprivileged attacker (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712">CVE-2020-1712</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Enable <code>qede</code> kernel module</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/811638/">4.19.102</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.102</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2345.2.0"/>
    <published>2020-02-10T11:11:29+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2345.1.0</id>
    <title>2345.1.0</title>
    <updated>2026-03-09T16:26:27.066036+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2345.1.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix multiple Git <a href="https://marc.info/?l=git&amp;m=157600115215285&amp;w=2">vulnerabilities</a> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348">CVE-2019-1348</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349">CVE-2019-1349</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350">CVE-2019-1350</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351">CVE-2019-1351</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352">CVE-2019-1352</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353">CVE-2019-1353</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354">CVE-2019-1354</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387">CVE-2019-1387</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604">CVE-2019-19604</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Git <a href="https://github.com/git/git/blob/master/Documentation/RelNotes/2.24.1.txt">2.24.1</a></li>
<li>Linux <a href="https://lwn.net/Articles/809258/">4.19.95</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.95</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2345.1.0"/>
    <published>2020-01-17T13:33:11+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2331.1.1</id>
    <title>2331.1.1</title>
    <updated>2026-03-09T16:26:27.061713+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix a bug when creating RAID0 arrays by setting the default layout (https://github.com/flatcar/baselayout/pull/2)</li>
<li>Fix bug of unpacking tarballs failing when xattr is not supported (https://github.com/flatcar/torcx/pull/2)</li>
</ul>
<p>Updates:</p>
<ul>
<li>ldb <a href="https://gitlab.com/samba-team/samba/-/tags/ldb-1.3.6">1.3.6</a></li>
<li>samba <a href="https://gitlab.com/samba-team/samba/-/tags/samba-4.8.6">4.8.6</a></li>
<li>talloc <a href="https://gitlab.com/samba-team/samba/-/tags/talloc-2.1.11">2.1.11</a></li>
<li>tdb <a href="https://gitlab.com/samba-team/samba/-/tags/tdb-1.3.15">1.3.15</a></li>
<li>tevent <a href="https://gitlab.com/samba-team/samba/-/tags/tevent-0.9.37">0.9.37</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.87</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2331.1.1"/>
    <published>2019-12-18T09:49:53+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2331.1.0</id>
    <title>2331.1.0</title>
    <updated>2026-03-09T16:26:27.057953+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2331.1.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/805923/">4.19.87</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.87</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2331.1.0"/>
    <published>2019-12-05T06:34:11+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2303.2.0</id>
    <title>2303.2.0</title>
    <updated>2026-03-09T16:26:27.053759+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2303.2.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Intel CPU disclosure of memory to user process. Complete mitigation requires <a href="https://docs.flatcar-linux.org/os/disabling-smt/">manually disabling TSX or SMT</a> on affected processors. (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135">CVE-2019-11135</a>, <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html">TAA</a>)</li>
<li>Fix Intel CPU denial of service by a malicious guest VM (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207">CVE-2018-12207</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix CFS scheduler throttling highly-threaded I/O-bound applications (<a href="https://github.com/coreos/bugs/issues/2623">#2623</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>intel-microcode <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20191115/releasenote">20191115</a></li>
<li>Linux <a href="https://lwn.net/Articles/804465/">4.19.84</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.84</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2303.2.0"/>
    <published>2019-11-21T09:28:13+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2303.1.1</id>
    <title>2303.1.1</title>
    <updated>2026-03-09T16:26:27.049686+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2303.1.1">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix time zone for Brazil (<a href="https://github.com/coreos/bugs/issues/2627">#2627</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/803384/">4.19.81</a></li>
<li>timezone-data <a href="http://mm.icann.org/pipermail/tz-announce/2019-September/000057.html">2019c</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.81</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2303.1.1"/>
    <published>2019-11-11T14:13:02+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2275.2.0</id>
    <title>2275.2.0</title>
    <updated>2026-03-09T16:26:27.046116+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2275.2.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/802169/">4.19.79</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.79</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2275.2.0"/>
    <published>2019-10-17T18:54:07+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2247.4.0</id>
    <title>2247.4.0</title>
    <updated>2026-03-09T16:26:27.042520+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2247.4.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix kernel crash with CephFS mounts, introduced in 2247.3.0 (<a href="https://github.com/coreos/bugs/issues/2616">#2616</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/801700/">4.19.78</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.78</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2247.4.0"/>
    <published>2019-10-16T15:09:03+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2247.3.0</id>
    <title>2247.3.0</title>
    <updated>2026-03-09T16:26:27.038640+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2247.3.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix kernel KVM guest escape (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835">CVE-2019-14835</a>)</li>
<li>Fix race condition in Intel microprocessors (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11184">CVE-2019-11184</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>intel-microcode <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20190918/releasenote">20190918</a></li>
<li>Linux <a href="https://lwn.net/Articles/800247/">4.19.75</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.75</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2247.3.0"/>
    <published>2019-09-25T09:32:22+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2247.2.0</id>
    <title>2247.2.0</title>
    <updated>2026-03-09T16:26:27.034965+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2247.2.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/798627/">4.19.71</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.71</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2247.2.0"/>
    <published>2019-09-13T10:53:37+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2219.3.0</id>
    <title>2219.3.0</title>
    <updated>2026-03-09T16:26:27.030988+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2219.3.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix pam_systemd bug allowing authenticated remote users to perform polkit actions as if locally logged in (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842">CVE-2019-3842</a>)</li>
<li>Fix systemd-resolved bug allowing unprivileged users to change DNS settings (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15718">CVE-2019-15718</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix GCE agent crash loop in new installs (<a href="https://github.com/coreos/bugs/issues/2608">#2608</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/797815/">4.19.69</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.69</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2219.3.0"/>
    <published>2019-09-05T08:53:14+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2219.2.1</id>
    <title>2219.2.1</title>
    <updated>2026-03-09T16:26:27.026960+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2219.2.1">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix wget buffer overflow allowing arbitrary code execution (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953">CVE-2019-5953</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/797250/">4.19.68</a></li>
<li>wget <a href="http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS?h=v1.20.3&amp;id=a220ead43505bc3e0ea8efb1572919111dbbf6dc#n8">1.20.3</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.68</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2219.2.1"/>
    <published>2019-08-30T07:37:15+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2219.2.0</id>
    <title>2219.2.0</title>
    <updated>2026-03-09T16:26:27.022910+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2219.2.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Use secure_getenv to fix a vulnerability around XDG_SEAT in pam_systemd (https://github.com/coreos/systemd/pull/118) (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842">CVE-2019-3842</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/795525/">4.19.65</a></li>
</ul>
<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix wrong key name for fw_cfg in ignition with QEMU (https://github.com/flatcar/ignition/issues/2)</li>
<li>Get SELinux context included in torcx tarballs (https://github.com/flatcar/scripts/pull/16)</li>
<li>Enable XattrPrivileged for untar to fix SELinux issue (https://github.com/flatcar/torcx/pull/1)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.65</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2219.2.0"/>
    <published>2019-08-16T09:44:16+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2191.3.0</id>
    <title>2191.3.0</title>
    <updated>2026-03-09T16:26:27.018851+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2191.3.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Linux information leak attack vector via speculative side channel (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125">CVE-2019-1125</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/795525/">4.19.65</a></li>
</ul>
<h2>Flatcar updates</h2>
<p>Changes:</p>
<ul>
<li>Add &quot;-s&quot; flag in flatcar-install to install to smallest disk (https://github.com/flatcar/init/pull/7)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.65</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2191.3.0"/>
    <published>2019-08-08T08:18:09+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2191.2.0</id>
    <title>2191.2.0</title>
    <updated>2026-03-09T16:26:27.015225+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2191.2.0">Upstream Container Linux updates</a>:</h2>
<ul>
<li>Linux <a href="https://lwn.net/Articles/794807/">4.19.62</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.62</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2191.2.0"/>
    <published>2019-08-01T09:15:48+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2191.1.0</id>
    <title>2191.1.0</title>
    <updated>2026-03-09T16:26:27.011887+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2191.1.0">Upstream Container Linux updates</a>:</h2>
<p>No changes for beta promotion</p>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.56</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2191.1.0"/>
    <published>2019-07-17T13:51:51+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2163.4.0</id>
    <title>2163.4.0</title>
    <updated>2026-03-09T16:26:27.008330+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2163.4.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix Ignition panic when no <code>guestinfo.(coreos|ignition).config</code> parameters are specified on VMware (coreos/ignition#821)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Ignition <a href="https://github.com/coreos/ignition/releases/tag/v0.33.0">0.33.0</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.55</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2163.4.0"/>
    <published>2019-07-03T08:02:30+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2163.3.0</id>
    <title>2163.3.0</title>
    <updated>2026-03-09T16:26:27.004774+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2163.3.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/791468/">4.19.53</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.32.0</li>
<li>kernel 4.19.55</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2163.3.0"/>
    <published>2019-07-01T10:45:57+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2135.3.1</id>
    <title>2135.3.1</title>
    <updated>2026-03-09T16:26:27.000864+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2135.3.1">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Linux TCP remotely-triggerable kernel panic and excessive resource consumption (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477">CVE-2019-11477</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478">CVE-2019-11478</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479">CVE-2019-11479</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix invalid bzip2 compression of Container Linux release images (<a href="https://github.com/coreos/bugs/issues/2589">#2589</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/790878/">4.19.50</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.32.0</li>
<li>kernel 4.19.50</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2135.3.1"/>
    <published>2019-06-19T08:16:10+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2135.2.0</id>
    <title>2135.2.0</title>
    <updated>2026-03-09T16:26:26.997096+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2135.2.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/788778/">4.19.44</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.32.0</li>
<li>kernel 4.19.44</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2135.2.0"/>
    <published>2019-05-21T20:28:25+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2107.3.0</id>
    <title>2107.3.0</title>
    <updated>2026-03-09T16:26:26.992995+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2107.3.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Intel CPU disclosure of memory to user process.  Complete mitigation requires <a href="https://docs.flatcar-linux.org/os/disabling-smt/">manually disabling SMT</a> on affected processors. (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091">CVE-2019-11091</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126">CVE-2018-12126</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127">CVE-2018-12127</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130">CVE-2018-12130</a>, <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html">MDS</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>intel-microcode <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20190514/releasenote">20190514</a></li>
<li>Linux <a href="https://lwn.net/Articles/788388/">4.19.43</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.43</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2107.3.0"/>
    <published>2019-05-16T10:57:15+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2107.2.0</id>
    <title>2107.2.0</title>
    <updated>2026-03-09T16:26:26.988988+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2107.2.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix systemd <code>MountFlags=shared</code> option (<a href="https://github.com/coreos/bugs/issues/2579">#2579</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Pin network interface naming to systemd v238 scheme (<a href="https://github.com/coreos/bugs/issues/2578">#2578</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.36</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2107.2.0"/>
    <published>2019-05-08T07:07:32+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2107.1.0</id>
    <title>2107.1.0</title>
    <updated>2026-03-09T16:26:26.985143+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2107.1.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Disable new sticky directory protections for backward compatibility (<a href="https://github.com/coreos/bugs/issues/2577">#2577</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Enable <code>atlantic</code> kernel module (<a href="https://github.com/coreos/bugs/issues/2576">#2576</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/786361/">4.19.36</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.36</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2107.1.0"/>
    <published>2019-04-24T10:01:19+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2079.2.0</id>
    <title>2079.2.0</title>
    <updated>2026-03-09T16:26:26.981262+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2079.2.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Disable new sticky directory protections for backwards compatibility (<a href="https://github.com/coreos/bugs/issues/2577">#2577</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Enable <code>atlantic</code> kernel module (<a href="https://github.com/coreos/bugs/issues/2576">#2576</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/786050/">4.19.34</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.34</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2079.2.0"/>
    <published>2019-04-17T07:53:14+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2079.1.0</id>
    <title>2079.1.0</title>
    <updated>2026-03-09T16:26:26.977505+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2079.1.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix systemd presets incorrectly handling escaped unit names (<a href="https://github.com/coreos/bugs/issues/2569">#2569</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/783858/">4.19.31</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.31</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2079.1.0"/>
    <published>2019-03-26T13:08:57+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2051.2.0</id>
    <title>2051.2.0</title>
    <updated>2026-03-09T16:26:26.973846+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2051.2.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix systemd-journald memory leak (<a href="https://github.com/coreos/bugs/issues/2564">#2564</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/782719/">4.19.28</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.30.0</li>
<li>kernel 4.19.28</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2051.2.0"/>
    <published>2019-03-12T14:37:08+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2051.1.0</id>
    <title>2051.1.0</title>
    <updated>2026-03-09T16:26:26.969971+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2051.1.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Linux use-after-free in <code>sockfs_setattr</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8912">CVE-2019-8912</a>)</li>
<li>Fix systemd crash from a specially-crafted D-Bus message (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454">CVE-2019-6454</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/780611/">4.19.25</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.30.0</li>
<li>kernel 4.19.25</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2051.1.0"/>
    <published>2019-02-27T08:53:46+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2023.3.0</id>
    <title>2023.3.0</title>
    <updated>2026-03-09T16:26:26.966307+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2023.3.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/779940/">4.19.23</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.30.0</li>
<li>kernel 4.19.23</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2023.3.0"/>
    <published>2019-02-21T08:41:36+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2023.2.0</id>
    <title>2023.2.0</title>
    <updated>2026-03-09T16:26:26.962306+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2023.2.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix runc container breakout (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736">CVE-2019-5736</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Revert <code>/sys/bus/rbd/add</code> to Linux 4.14 behavior (<a href="https://github.com/coreos/bugs/issues/2544">#2544</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>etcd <a href="https://github.com/etcd-io/etcd/releases/tag/v3.3.12">3.3.12</a></li>
<li>etcdctl <a href="https://github.com/etcd-io/etcd/releases/tag/v3.3.12">3.3.12</a></li>
<li>Linux <a href="https://lwn.net/Articles/779132/">4.19.20</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.30.0</li>
<li>kernel 4.19.20</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2023.2.0"/>
    <published>2019-02-14T10:31:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2023.1.0</id>
    <title>2023.1.0</title>
    <updated>2026-03-09T16:26:26.958277+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2023.1.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Go CPU denial of service in ECC (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6486">CVE-2019-6486</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Go <a href="https://golang.org/doc/devel/release.html#go1.10.minor">1.10.8</a></li>
<li>Go <a href="https://golang.org/doc/devel/release.html#go1.11.minor">1.11.5</a></li>
<li>Linux <a href="https://lwn.net/Articles/777580/">4.19.18</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.30.0</li>
<li>kernel 4.19.18</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2023.1.0"/>
    <published>2019-01-30T13:45:28+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1995.1.0</id>
    <title>1995.1.0</title>
    <updated>2026-03-09T16:26:26.954687+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1995.1.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/775720/">4.19.13</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.29.1</li>
<li>kernel 4.19.13</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1995.1.0"/>
    <published>2019-01-18T09:10:26+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1967.2.0</id>
    <title>1967.2.0</title>
    <updated>2026-03-09T16:26:26.950721+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1967.2.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Go CPU denial of service in X.509 verification (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16875">CVE-2018-16875</a>)</li>
<li>Fix PolicyKit always authorizing UIDs greater than <code>INT_MAX</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19788">CVE-2018-19788</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Go <a href="https://golang.org/doc/devel/release.html#go1.10.minor">1.10.6</a></li>
<li>Go <a href="https://golang.org/doc/devel/release.html#go1.11.minor">1.11.3</a></li>
<li>Linux <a href="https://lwn.net/Articles/774848/">4.14.88</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.88</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1967.2.0"/>
    <published>2018-12-21T09:08:43+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1967.1.0</id>
    <title>1967.1.0</title>
    <updated>2026-03-09T16:26:26.947019+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1967.1.0">Upstream Container Linux updates</a>:</h2>
<p>Changes:</p>
<ul>
<li>Switch to the LTS Linux version <a href="https://lwn.net/Articles/773114/">4.14.84</a> for the beta channel</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.84</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1967.1.0"/>
    <published>2018-12-06T09:43:43+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1939.2.1</id>
    <title>1939.2.1</title>
    <updated>2026-03-09T16:26:26.943311+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1939.2.1">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Disable containerd CRI plugin to stop it from listening on a TCP port (<a href="https://github.com/coreos/bugs/issues/2524">#2524</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/771885/">4.14.81</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.81</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1939.2.1"/>
    <published>2018-11-21T10:57:13+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1939.1.0</id>
    <title>1939.1.0</title>
    <updated>2026-03-09T16:26:26.939224+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1939.1.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix systemd re-executing with arbitrary supplied state (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686">CVE-2018-15686</a>)</li>
<li>Fix systemd race allowing changing file permissions (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687">CVE-2018-15687</a>)</li>
<li>Fix systemd-networkd buffer overflow in the dhcp6 client (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688">CVE-2018-15688</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Switch to the LTS Linux version <a href="https://lwn.net/Articles/770749/">4.14.79</a> for the beta channel</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.79</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1939.1.0"/>
    <published>2018-11-08T16:14:38+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1911.2.0</id>
    <title>1911.2.0</title>
    <updated>2026-03-09T16:26:26.935080+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1911.2.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Git remote code execution during recursive clone (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456">CVE-2018-17456</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix missing kernel headers (<a href="https://github.com/coreos/bugs/issues/2505">#2505</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Git <a href="https://raw.githubusercontent.com/git/git/v2.16.5/Documentation/RelNotes/2.16.5.txt">2.16.5</a></li>
<li>Linux <a href="https://lwn.net/Articles/769051/">4.14.78</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.78</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1911.2.0"/>
    <published>2018-10-26T10:14:36+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1911.1.1</id>
    <title>1911.1.1</title>
    <updated>2026-03-09T16:26:26.931043+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Changes:</p>
<ul>
<li>Add new image signing subkey to <code>flatcar-install</code> (<a href="https://github.com/flatcar/init/pull/4">flatcar-linux/init#4</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix <code>/usr/lib/coreos</code> symlink for Container Linux compatibility (<a href="https://github.com/flatcar/coreos-overlay/pull/8">flatcar-linux/coreos-overlay#8</a>)</li>
</ul>
<h2><a href="https://github.com/coreos/manifest/releases/tag/v1911.1.1">Upstream Container Linux updates</a>:</h2>
<p>Changes:</p>
<ul>
<li>Switch to the LTS Linux version <a href="https://lwn.net/Articles/767628/">4.14.74</a> for the beta channel</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.74</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1911.1.1"/>
    <published>2018-10-11T13:18:49+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1883.1.0</id>
    <title>1883.1.0</title>
    <updated>2026-03-09T16:26:26.927074+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1883.1.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix Docker mounting named volumes (<a href="https://github.com/coreos/bugs/issues/2497">#2497</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Switch to the LTS Linux version <a href="https://lwn.net/Articles/764513/">4.14.69</a> for the beta channel</li>
</ul>
<p>Updates:</p>
<ul>
<li>intel-microcode <a href="https://downloadcenter.intel.com/download/28087">20180807a</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.69</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1883.1.0"/>
    <published>2018-09-14T09:59:48+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1855.3.0</id>
    <title>1855.3.0</title>
    <updated>2026-03-09T16:26:26.922990+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1855.3.0">Upstream Container Linux updates</a>:</h2>
<p>Changes:</p>
<ul>
<li>Drop AWS PV images from regions which do not support PV</li>
</ul>
<p>Updates:</p>
<ul>
<li>containerd <a href="https://github.com/containerd/containerd/releases/tag/v1.1.2">1.1.2</a></li>
<li>Docker <a href="https://github.com/docker/docker-ce/releases/tag/v18.06.1-ce">18.06.1-ce</a></li>
<li>intel-microcode <a href="https://downloadcenter.intel.com/download/28087/Linux-Processor-Microcode-Data-File">20180807a</a></li>
<li>Linux <a href="https://lwn.net/Articles/763433/">4.14.67</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.26.0</li>
<li>kernel 4.14.67</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1855.3.0"/>
    <published>2018-09-05T08:43:19+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1855.2.0</id>
    <title>1855.2.0</title>
    <updated>2026-03-09T16:26:26.918730+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1855.2.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Linux remote denial of service (<a href="https://access.redhat.com/security/cve/cve-2018-5391">FragmentSmack</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391">CVE-2018-5391</a>)</li>
<li>Fix Linux privileged memory access via speculative execution (<a href="https://foreshadowattack.eu/">L1TF/Foreshadow</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620">CVE-2018-3620</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646">CVE-2018-3646</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix PXE systems attempting to mount an ESP (<a href="https://github.com/coreos/bugs/issues/2491">#2491</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Switch to the LTS Linux version <a href="https://lwn.net/Articles/762808/">4.14.63</a> for the beta channel</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.0</li>
<li>ignition 0.26.0</li>
<li>kernel 4.14.63</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1855.2.0"/>
    <published>2018-08-17T12:09:29+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1828.3.0</id>
    <title>1828.3.0</title>
    <updated>2026-03-09T16:26:26.914635+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1828.3.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Linux local denial of service as Xen PV guest (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678">CVE-2018-14678</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix failure to mount large ext4 filesystems (<a href="https://github.com/coreos/bugs/issues/2485">#2485</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/761767/">4.14.60</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.26.0</li>
<li>kernel 4.14.60</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1828.3.0"/>
    <published>2018-08-08T10:49:50+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1828.2.0</id>
    <title>1828.2.0</title>
    <updated>2026-03-09T16:26:26.910832+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1828.2.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix kernel CIFS client (<a href="https://github.com/coreos/bugs/issues/2480">#2480</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/761180/">4.14.59</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.26.0</li>
<li>kernel 4.14.59</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1828.2.0"/>
    <published>2018-07-31T09:16:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1828.1.0</id>
    <title>1828.1.0</title>
    <updated>2026-03-09T16:26:26.907149+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1828.1.0">Upstream Container Linux updates</a>:</h2>
<p>Changes:</p>
<ul>
<li>Switch to the LTS Docker version <a href="https://github.com/docker/docker-ce/releases/tag/v18.03.1-ce">18.03.1-ce</a> for the beta channel</li>
<li>Switch to the LTS Linux version <a href="https://lwn.net/Articles/760500/">4.14.57</a> for the beta channel</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.26.0</li>
<li>kernel 4.14.57</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1828.1.0"/>
    <published>2018-07-26T09:40:11+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1800.3.0</id>
    <title>1800.3.0</title>
    <updated>2026-03-09T16:26:26.903517+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1800.3.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/759535/">4.14.55</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.25.1</li>
<li>kernel 4.14.55</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1800.3.0"/>
    <published>2018-07-13T15:43:19+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1800.2.0</id>
    <title>1800.2.0</title>
    <updated>2026-03-09T16:26:26.899883+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1800.2.0">Upstream Container Linux updates</a>:</h2>
<p>Changes:</p>
<ul>
<li>Switch to the LTS Docker version <a href="https://github.com/docker/docker-ce/releases/tag/v18.03.1-ce">18.03.1-ce</a> for the beta channel</li>
<li>Switch to the LTS Linux version <a href="https://lwn.net/Articles/757680/">4.14.50</a> for the beta channel</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.25.1</li>
<li>kernel 4.14.50</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1800.2.0"/>
    <published>2018-06-22T10:17:31+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1772.4.0</id>
    <title>1772.4.0</title>
    <updated>2026-03-09T16:26:26.896098+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1772.4.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix TCP connection stalls (<a href="https://github.com/coreos/bugs/issues/2457">#2457</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/757308/">4.14.49</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.24.1</li>
<li>kernel 4.14.49</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1772.4.0"/>
    <published>2018-06-15T14:51:22+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1772.3.0</id>
    <title>1772.3.0</title>
    <updated>2026-03-09T16:26:26.892398+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1772.3.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix Hyper-V network driver regression (<a href="https://github.com/coreos/bugs/issues/2454">#2454</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/756652/">4.14.48</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.24.1</li>
<li>kernel 4.14.48</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1772.3.0"/>
    <published>2018-06-13T13:22:40+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1772.2.0</id>
    <title>1772.2.0</title>
    <updated>2026-03-09T16:26:26.888238+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1772.2.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Git arbitrary code execution when cloning untrusted repositories (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235">CVE-2018-11235</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix inadvertent change of network interface names (<a href="https://github.com/coreos/bugs/issues/2437">#2437</a>)</li>
<li>Fix failure to set network interface MTU (<a href="https://github.com/coreos/bugs/issues/2443">#2443</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Git <a href="https://raw.githubusercontent.com/git/git/v2.16.4/Documentation/RelNotes/2.16.4.txt">2.16.4</a></li>
<li>Linux <a href="https://lwn.net/Articles/756055/">4.14.47</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.24.1</li>
<li>kernel 4.14.47</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1772.2.0"/>
    <published>2018-06-01T13:23:43+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1772.1.1</id>
    <title>1772.1.1</title>
    <updated>2026-03-09T16:26:26.884161+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1772.1.1">Upstream Container Linux updates</a>:</h2>
<p>Changes:</p>
<ul>
<li>Switch to the LTS Docker version <a href="https://github.com/docker/docker-ce/releases/tag/v18.03.1-ce">18.03.1-ce</a> for the beta channel</li>
<li>Switch to the LTS Linux version <a href="https://lwn.net/Articles/754972/">4.14.42</a> for the beta channel</li>
</ul>
<p>Updates:</p>
<ul>
<li>Ignition <a href="https://github.com/coreos/ignition/releases/tag/v0.24.1">0.24.1</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.24.1</li>
<li>kernel 4.14.42</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1772.1.1"/>
    <published>2018-05-26T15:29:49+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1745.2.0</id>
    <title>1745.2.0</title>
    <updated>2026-03-09T16:26:26.879444+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1745.2.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix ntp clock manipulation from ephemeral connections (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549">CVE-2016-1549</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170">CVE-2018-7170</a>)</li>
<li>Fix ntp denial of service from out of bounds read (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182">CVE-2018-7182</a>)</li>
<li>Fix ntp denial of service from packets with timestamp 0 (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7184">CVE-2018-7184</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185">CVE-2018-7185</a>)</li>
<li>Fix ntp remote code execution (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183">CVE-2018-7183</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>containerd <a href="https://github.com/containerd/containerd/releases/tag/v1.0.3">1.0.3</a></li>
<li>Docker <a href="https://github.com/docker/docker-ce/releases/tag/v18.03.1-ce">18.03.1-ce</a></li>
<li>Linux <a href="https://lwn.net/Articles/753349/">4.14.39</a></li>
<li>ntp <a href="https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ChangeLog-stable">4.2.8p11</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.24.0</li>
<li>kernel 4.14.39</li>
<li>rkt 1.29.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1745.2.0"/>
    <published>2018-05-11T11:40:35+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1745.1.0</id>
    <title>1745.1.0</title>
    <updated>2026-03-09T16:26:26.875211+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1745.1.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix docker2aci tar conversion (<a href="https://github.com/coreos/bugs/issues/2402">#2402</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Switch to the LTS Linux version <a href="https://lwn.net/Articles/752328/">4.14.35</a> for the beta channel</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.0</li>
<li>ignition 0.24.0</li>
<li>kernel 4.14.35</li>
<li>rkt 1.29.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1745.1.0"/>
    <published>2018-04-26T09:58:55+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1722.2.0</id>
    <title>1722.2.0</title>
    <updated>2026-03-09T16:26:26.870501+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Initial Flatcar release.</p>
<p>Bug fixes:</p>
<ul>
<li>Fix GRUB crash at boot (<a href="https://github.com/coreos/bugs/issues/2284">#2284</a>)</li>
<li>Fix <a href="https://groups.google.com/forum/#!topic/coreos-user/YcGkRHU9SvQ">poweroff problems</a> (<a href="https://github.com/systemd/systemd/pull/8080">#8080</a>)</li>
</ul>
<p>Notes:</p>
<ul>
<li>Previous test images have been removed from the release servers. This is due to a new update key being generated using our updated security policy which we <a href="https://github.com/flatcar/coreos-overlay/pull/6">included</a> in the first public image.</li>
</ul>
<h2><a href="https://github.com/coreos/manifest/releases/tag/v1722.2.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix kernel panic with vxlan (<a href="https://github.com/coreos/bugs/issues/2382">#2382</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 17.12.1</li>
<li>ignition 0.23.0</li>
<li>kernel 4.14.30</li>
<li>rkt 1.29.0</li>
<li>systemd 237</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1722.2.0"/>
    <published>2018-04-25T14:36:40+00:00</published>
  </entry>
</feed>

