<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://www.flatcar.org/</id>
  <title>Flatcar :: lts</title>
  <updated>2026-03-09T16:26:30.115618+00:00</updated>
  <author>
    <name>Flatcar Container Linux</name>
    <email>maintainers@flatcar-linux.org</email>
  </author>
  <link href="https://www.flatcar.org/" rel="self"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <logo>https://www.flatcar.org/media/brand-logo.svg</logo>
  <subtitle>Flatcar Container Linux release feed</subtitle>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.6</id>
    <title>4081.3.6</title>
    <updated>2026-03-09T16:26:30.340924+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.5</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39726">CVE-2025-39726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38670">CVE-2025-38670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38668">CVE-2025-38668</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38666">CVE-2025-38666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38665">CVE-2025-38665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38663">CVE-2025-38663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38671">CVE-2025-38671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38552">CVE-2025-38552</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38520">CVE-2025-38520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39734">CVE-2025-39734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39731">CVE-2025-39731</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38650">CVE-2025-38650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38648">CVE-2025-38648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38646">CVE-2025-38646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38645">CVE-2025-38645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38653">CVE-2025-38653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38652">CVE-2025-38652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38626">CVE-2025-38626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38625">CVE-2025-38625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38624">CVE-2025-38624</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38623">CVE-2025-38623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38622">CVE-2025-38622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38640">CVE-2025-38640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38639">CVE-2025-38639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38635">CVE-2025-38635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38634">CVE-2025-38634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38632">CVE-2025-38632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38630">CVE-2025-38630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38611">CVE-2025-38611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38615">CVE-2025-38615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38612">CVE-2025-38612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38577">CVE-2025-38577</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38583">CVE-2025-38583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38581">CVE-2025-38581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38610">CVE-2025-38610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38609">CVE-2025-38609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38604">CVE-2025-38604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38602">CVE-2025-38602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38601">CVE-2025-38601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38579">CVE-2025-38579</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38590">CVE-2025-38590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38588">CVE-2025-38588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38587">CVE-2025-38587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38578">CVE-2025-38578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38562">CVE-2025-38562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38561">CVE-2025-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38576">CVE-2025-38576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38574">CVE-2025-38574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38569">CVE-2025-38569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38501">CVE-2025-38501</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39798">CVE-2025-39798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39795">CVE-2025-39795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39794">CVE-2025-39794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39773">CVE-2025-39773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39772">CVE-2025-39772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39770">CVE-2025-39770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39788">CVE-2025-39788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39787">CVE-2025-39787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39767">CVE-2025-39767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39783">CVE-2025-39783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39782">CVE-2025-39782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39781">CVE-2025-39781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39776">CVE-2025-39776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39766">CVE-2025-39766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39750">CVE-2025-39750</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39759">CVE-2025-39759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39758">CVE-2025-39758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39756">CVE-2025-39756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39753">CVE-2025-39753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39752">CVE-2025-39752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39763">CVE-2025-39763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39744">CVE-2025-39744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39743">CVE-2025-39743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39739">CVE-2025-39739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39738">CVE-2025-39738</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39749">CVE-2025-39749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39736">CVE-2025-39736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39737">CVE-2025-39737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39711">CVE-2025-39711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39720">CVE-2025-39720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39719">CVE-2025-39719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39716">CVE-2025-39716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39715">CVE-2025-39715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39714">CVE-2025-39714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39713">CVE-2025-39713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39724">CVE-2025-39724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39721">CVE-2025-39721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39675">CVE-2025-39675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39673">CVE-2025-39673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39710">CVE-2025-39710</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39709">CVE-2025-39709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38735">CVE-2025-38735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39706">CVE-2025-39706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39701">CVE-2025-39701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39693">CVE-2025-39693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39692">CVE-2025-39692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39689">CVE-2025-39689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39687">CVE-2025-39687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39686">CVE-2025-39686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39685">CVE-2025-39685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39684">CVE-2025-39684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39683">CVE-2025-39683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39681">CVE-2025-39681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39679">CVE-2025-39679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39676">CVE-2025-39676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38732">CVE-2025-38732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38727">CVE-2025-38727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38728">CVE-2025-38728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38694">CVE-2025-38694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38702">CVE-2025-38702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38701">CVE-2025-38701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38700">CVE-2025-38700</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38699">CVE-2025-38699</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38698">CVE-2025-38698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38725">CVE-2025-38725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38697">CVE-2025-38697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38723">CVE-2025-38723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38721">CVE-2025-38721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38716">CVE-2025-38716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38715">CVE-2025-38715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38714">CVE-2025-38714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38696">CVE-2025-38696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38713">CVE-2025-38713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38712">CVE-2025-38712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38711">CVE-2025-38711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38709">CVE-2025-38709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38708">CVE-2025-38708</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38707">CVE-2025-38707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38695">CVE-2025-38695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38688">CVE-2025-38688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38687">CVE-2025-38687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38683">CVE-2025-38683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38681">CVE-2025-38681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38693">CVE-2025-38693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38692">CVE-2025-38692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38691">CVE-2025-38691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38679">CVE-2025-38679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38680">CVE-2025-38680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38677">CVE-2025-38677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.106">6.6.106</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.105">6.6.105</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.104">6.6.104</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.103">6.6.103</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.102">6.6.102</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.101">6.6.101</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115_1.html">3.115.1</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115.html">3.115</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.106</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.6"/>
    <published>2025-09-15T14:03:10+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.5</id>
    <title>4081.3.5</title>
    <updated>2026-03-09T16:26:30.332135+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.4</strong></em></p>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.100">6.6.100</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.99">6.6.99</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.98">6.6.98</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.97">6.6.97</a>, <a href="https://lwn.net/Articles/1028829/">6.6.96</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html">3.114</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html">3.113.1</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.100</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.5"/>
    <published>2025-08-19T13:10:36+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.4</id>
    <title>4081.3.4</title>
    <updated>2026-03-09T16:26:30.311234+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.3</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37989">CVE-2025-37989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37988">CVE-2025-37988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37985">CVE-2025-37985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37983">CVE-2025-37983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37938">CVE-2025-37938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37885">CVE-2025-37885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37884">CVE-2025-37884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37883">CVE-2025-37883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37881">CVE-2025-37881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37879">CVE-2025-37879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37878">CVE-2025-37878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37887">CVE-2025-37887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37886">CVE-2025-37886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37836">CVE-2025-37836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37831">CVE-2025-37831</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37830">CVE-2025-37830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37829">CVE-2025-37829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37828">CVE-2025-37828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37824">CVE-2025-37824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37808">CVE-2025-37808</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37805">CVE-2025-37805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37804">CVE-2025-37804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37803">CVE-2025-37803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37820">CVE-2025-37820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37819">CVE-2025-37819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37818">CVE-2025-37818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37817">CVE-2025-37817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37815">CVE-2025-37815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37813">CVE-2025-37813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37812">CVE-2025-37812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37811">CVE-2025-37811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37810">CVE-2025-37810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37800">CVE-2025-37800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37801">CVE-2025-37801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37799">CVE-2025-37799</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37990">CVE-2025-37990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37991">CVE-2025-37991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37917">CVE-2025-37917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37927">CVE-2025-37927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37924">CVE-2025-37924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37923">CVE-2025-37923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37922">CVE-2025-37922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37921">CVE-2025-37921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37936">CVE-2025-37936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37935">CVE-2025-37935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37933">CVE-2025-37933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37932">CVE-2025-37932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37930">CVE-2025-37930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37929">CVE-2025-37929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37928">CVE-2025-37928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37918">CVE-2025-37918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37903">CVE-2025-37903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37901">CVE-2025-37901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37897">CVE-2025-37897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37916">CVE-2025-37916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37915">CVE-2025-37915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37914">CVE-2025-37914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37913">CVE-2025-37913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37912">CVE-2025-37912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37911">CVE-2025-37911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37909">CVE-2025-37909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37905">CVE-2025-37905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37891">CVE-2025-37891</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37998">CVE-2025-37998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37997">CVE-2025-37997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37995">CVE-2025-37995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37994">CVE-2025-37994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37973">CVE-2025-37973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37972">CVE-2025-37972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37970">CVE-2025-37970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37969">CVE-2025-37969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37964">CVE-2025-37964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37963">CVE-2025-37963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37962">CVE-2025-37962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37961">CVE-2025-37961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37959">CVE-2025-37959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37954">CVE-2025-37954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37953">CVE-2025-37953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37952">CVE-2025-37952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37951">CVE-2025-37951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37949">CVE-2025-37949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37948">CVE-2025-37948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37956">CVE-2025-37956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37947">CVE-2025-37947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38094">CVE-2025-38094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38095">CVE-2025-38095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38015">CVE-2025-38015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38014">CVE-2025-38014</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38013">CVE-2025-38013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38010">CVE-2025-38010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38009">CVE-2025-38009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38027">CVE-2025-38027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38008">CVE-2025-38008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38024">CVE-2025-38024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38023">CVE-2025-38023</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38020">CVE-2025-38020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38019">CVE-2025-38019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38018">CVE-2025-38018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38007">CVE-2025-38007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38006">CVE-2025-38006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38005">CVE-2025-38005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37992">CVE-2025-37992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38097">CVE-2025-38097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38092">CVE-2025-38092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38061">CVE-2025-38061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38059">CVE-2025-38059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38058">CVE-2025-38058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38081">CVE-2025-38081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38080">CVE-2025-38080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38078">CVE-2025-38078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38077">CVE-2025-38077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38074">CVE-2025-38074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38072">CVE-2025-38072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38071">CVE-2025-38071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38068">CVE-2025-38068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38066">CVE-2025-38066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38065">CVE-2025-38065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38063">CVE-2025-38063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38062">CVE-2025-38062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38037">CVE-2025-38037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38035">CVE-2025-38035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38034">CVE-2025-38034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38051">CVE-2025-38051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38031">CVE-2025-38031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38048">CVE-2025-38048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38046">CVE-2025-38046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38045">CVE-2025-38045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38044">CVE-2025-38044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38043">CVE-2025-38043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38040">CVE-2025-38040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38039">CVE-2025-38039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38030">CVE-2025-38030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38003">CVE-2025-38003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38004">CVE-2025-38004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38001">CVE-2025-38001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38174">CVE-2025-38174</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38163">CVE-2025-38163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38170">CVE-2025-38170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38167">CVE-2025-38167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38166">CVE-2025-38166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38165">CVE-2025-38165</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38173">CVE-2025-38173</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38138">CVE-2025-38138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38136">CVE-2025-38136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38135">CVE-2025-38135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38161">CVE-2025-38161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38160">CVE-2025-38160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38158">CVE-2025-38158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38157">CVE-2025-38157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38155">CVE-2025-38155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38154">CVE-2025-38154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38153">CVE-2025-38153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38151">CVE-2025-38151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38149">CVE-2025-38149</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38148">CVE-2025-38148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38147">CVE-2025-38147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38146">CVE-2025-38146</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38145">CVE-2025-38145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38143">CVE-2025-38143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38142">CVE-2025-38142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38131">CVE-2025-38131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38110">CVE-2025-38110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38109">CVE-2025-38109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38108">CVE-2025-38108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38107">CVE-2025-38107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38103">CVE-2025-38103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38127">CVE-2025-38127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38126">CVE-2025-38126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38124">CVE-2025-38124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38123">CVE-2025-38123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38122">CVE-2025-38122</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38102">CVE-2025-38102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38120">CVE-2025-38120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38119">CVE-2025-38119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38118">CVE-2025-38118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38117">CVE-2025-38117</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38115">CVE-2025-38115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38113">CVE-2025-38113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38112">CVE-2025-38112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38111">CVE-2025-38111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38100">CVE-2025-38100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38088">CVE-2025-38088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38083">CVE-2025-38083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38219">CVE-2025-38219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38218">CVE-2025-38218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38217">CVE-2025-38217</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38215">CVE-2025-38215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38214">CVE-2025-38214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38231">CVE-2025-38231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38212">CVE-2025-38212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38229">CVE-2025-38229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38227">CVE-2025-38227</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38226">CVE-2025-38226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38225">CVE-2025-38225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38222">CVE-2025-38222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38220">CVE-2025-38220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38185">CVE-2025-38185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38183">CVE-2025-38183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38182">CVE-2025-38182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38208">CVE-2025-38208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38202">CVE-2025-38202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38198">CVE-2025-38198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38197">CVE-2025-38197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38195">CVE-2025-38195</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38194">CVE-2025-38194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38193">CVE-2025-38193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38192">CVE-2025-38192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38191">CVE-2025-38191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38190">CVE-2025-38190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38090">CVE-2025-38090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38089">CVE-2025-38089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38087">CVE-2025-38087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38086">CVE-2025-38086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085</a>)</li>
<li>sudo (<a href="https://www.cve.org/CVERecord?id=CVE-2025-32462">CVE-2025-32462</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32463">CVE-2025-32463</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added back some BCC tools (<a href="https://github.com/flatcar/scripts/pull/2900">scripts#2900</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/1027279/">6.6.95</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.94">6.6.94</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.93">6.6.93</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.92">6.6.92</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.91">6.6.91</a>, <a href="https://lwn.net/Articles/1020659/">6.6.90</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.89">6.6.89</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html">3.113</a> (includes(<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html">3.112</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html">3.111</a>))</li>
<li>sudo (<a href="https://www.sudo.ws/releases/stable/#1.9.17p1">1.9.17p1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.95</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.4"/>
    <published>2025-07-08T15:22:02+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.3</id>
    <title>4081.3.3</title>
    <updated>2026-03-09T16:26:30.294625+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21993">CVE-2025-21993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21992">CVE-2025-21992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21991">CVE-2025-21991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21967">CVE-2025-21967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21975">CVE-2025-21975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21971">CVE-2025-21971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21970">CVE-2025-21970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21969">CVE-2025-21969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21986">CVE-2025-21986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21981">CVE-2025-21981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21980">CVE-2025-21980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21979">CVE-2025-21979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21978">CVE-2025-21978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21968">CVE-2025-21968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21962">CVE-2025-21962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21960">CVE-2025-21960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21959">CVE-2025-21959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21957">CVE-2025-21957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21956">CVE-2025-21956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21955">CVE-2025-21955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21966">CVE-2025-21966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21964">CVE-2025-21964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21963">CVE-2025-21963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22015">CVE-2025-22015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22014">CVE-2025-22014</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22013">CVE-2025-22013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22010">CVE-2025-22010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22008">CVE-2025-22008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22009">CVE-2025-22009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22003">CVE-2025-22003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22001">CVE-2025-22001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21999">CVE-2025-21999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21997">CVE-2025-21997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22007">CVE-2025-22007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22005">CVE-2025-22005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21995">CVE-2025-21995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21996">CVE-2025-21996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21994">CVE-2025-21994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22021">CVE-2025-22021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22018">CVE-2025-22018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38575">CVE-2025-38575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38240">CVE-2025-38240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38152">CVE-2025-38152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37893">CVE-2025-37893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39735">CVE-2025-39735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39728">CVE-2025-39728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38637">CVE-2025-38637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23138">CVE-2025-23138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23136">CVE-2025-23136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22066">CVE-2025-22066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22075">CVE-2025-22075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22074">CVE-2025-22074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22073">CVE-2025-22073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22072">CVE-2025-22072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22071">CVE-2025-22071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22095">CVE-2025-22095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22093">CVE-2025-22093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22090">CVE-2025-22090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22089">CVE-2025-22089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22088">CVE-2025-22088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22086">CVE-2025-22086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22083">CVE-2025-22083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22081">CVE-2025-22081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22080">CVE-2025-22080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22079">CVE-2025-22079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22077">CVE-2025-22077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22033">CVE-2025-22033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22042">CVE-2025-22042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22041">CVE-2025-22041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22040">CVE-2025-22040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22038">CVE-2025-22038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22064">CVE-2025-22064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22063">CVE-2025-22063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22060">CVE-2025-22060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22058">CVE-2025-22058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22057">CVE-2025-22057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22054">CVE-2025-22054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22053">CVE-2025-22053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22035">CVE-2025-22035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22050">CVE-2025-22050</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22049">CVE-2025-22049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22048">CVE-2025-22048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22047">CVE-2025-22047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22045">CVE-2025-22045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22044">CVE-2025-22044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22043">CVE-2025-22043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22027">CVE-2025-22027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22025">CVE-2025-22025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22029">CVE-2025-22029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-53034">CVE-2023-53034</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.88">6.6.88</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.87">6.6.87</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.86">6.6.86</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.85">6.6.85</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.84">6.6.84</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html">3.110</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.88</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.3"/>
    <published>2025-05-06T11:36:40+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.2</id>
    <title>4081.3.2</title>
    <updated>2026-03-09T16:26:30.283521+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21835">CVE-2025-21835</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21836">CVE-2025-21836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58086">CVE-2024-58086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21823">CVE-2025-21823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21821">CVE-2025-21821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21787">CVE-2025-21787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21784">CVE-2025-21784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21782">CVE-2025-21782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21783">CVE-2025-21783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21781">CVE-2025-21781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21780">CVE-2025-21780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21796">CVE-2025-21796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21795">CVE-2025-21795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21794">CVE-2025-21794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21793">CVE-2025-21793</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21792">CVE-2025-21792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21790">CVE-2025-21790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21789">CVE-2025-21789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21779">CVE-2025-21779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58020">CVE-2024-58020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57834">CVE-2024-57834</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54458">CVE-2024-54458</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54456">CVE-2024-54456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21776">CVE-2025-21776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21775">CVE-2025-21775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21772">CVE-2025-21772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21773">CVE-2025-21773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21767">CVE-2025-21767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21766">CVE-2025-21766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21763">CVE-2025-21763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21761">CVE-2025-21761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21762">CVE-2025-21762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21760">CVE-2025-21760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21759">CVE-2025-21759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21758">CVE-2025-21758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21704">CVE-2025-21704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21848">CVE-2025-21848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21847">CVE-2025-21847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21846">CVE-2025-21846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21866">CVE-2025-21866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21865">CVE-2025-21865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21864">CVE-2025-21864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21863">CVE-2025-21863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21862">CVE-2025-21862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21844">CVE-2025-21844</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21859">CVE-2025-21859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21858">CVE-2025-21858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21857">CVE-2025-21857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21856">CVE-2025-21856</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21855">CVE-2025-21855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21854">CVE-2025-21854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21853">CVE-2025-21853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58088">CVE-2024-58088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21838">CVE-2025-21838</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. (<a href="https://github.com/flatcar/scripts/pull/2667">flatcar/scripts#2667</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added new image signing pub key to <code>flatcar-install</code>, needed for download verification of releases built from March 2025 onwards, if you have copies of <code>flatcar-install</code> or the image signing pub key, you need to update them as well (<a href="https://github.com/flatcar/init/pull/129">init#129</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83">6.6.83</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79">6.6.79</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80">6.6.80</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81">6.6.81</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82">6.6.82</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html">3.109</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.83</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.2"/>
    <published>2025-03-20T14:07:30+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.1</id>
    <title>4081.3.1</title>
    <updated>2026-03-09T16:26:30.277548+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26466">CVE-2025-26466</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>openssh(9.8_p1-r4)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.74</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.1"/>
    <published>2025-02-18T15:13:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.0</id>
    <title>4081.3.0</title>
    <updated>2026-03-09T16:26:30.168485+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3510.3.6</strong></em></p>
<ul>
<li>Linux (<a href="https://hackmd.io/EN9yZnYFS-ijPvCx8PtObw#New-LTS-2024-Release-408130">Please refer to the Go/No-Go document for the list of CVEs resolved</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24532">CVE-2023-24532</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39320">CVE-2023-39320</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791</a>)</li>
<li>Linux Firmware (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315</a>)</li>
<li>SDK: dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934</a>)</li>
<li>SDK: nasm (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6290">CVE-2019-6290</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6291">CVE-2019-6291</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-8343">CVE-2019-8343</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-21528">CVE-2020-21528</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33450">CVE-2021-33450</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33452">CVE-2021-33452</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44368">CVE-2022-44368</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44369">CVE-2022-44369</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44370">CVE-2022-44370</a>)</li>
<li>SDK: perl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47038">CVE-2023-47038</a>)</li>
<li>SDK: pkgconf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24056">CVE-2023-24056</a>)</li>
<li>SDK: python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41105">CVE-2023-41105</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450</a>,  <a href="https://github.com/python/cpython/issues/81194">gh-81194</a>,  <a href="https://github.com/python/cpython/issues/113659">gh-113659</a>,  <a href="https://github.com/python/cpython/issues/102388">gh-102388</a>,  <a href="https://github.com/python/cpython/issues/114572">gh-114572</a>,  <a href="https://github.com/python/cpython/issues/115243">gh-115243</a>)</li>
<li>SDK: qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0330">CVE-2023-0330</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2861">CVE-2023-2861</a>)</li>
<li>SDK: re2c (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23901">CVE-2022-23901</a>)</li>
<li>SDK: Rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38497">CVE-2023-38497</a>)</li>
<li>VMware: open-vm-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867</a>)</li>
<li>bash (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38533">CVE-2022-38533</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1579">CVE-2023-1579</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2222">CVE-2023-2222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1972">CVE-2023-1972</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25153">CVE-2023-25153</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173</a>)</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html">coreutils-2024-03-28</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0684">CVE-2024-0684</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23914">CVE-2023-23914</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23915">CVE-2023-23915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23916">CVE-2023-23916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27533">CVE-2023-27533</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27534">CVE-2023-27534</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27537">CVE-2023-27537</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27538">CVE-2023-27538</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28319">CVE-2023-28319</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32001">CVE-2023-32001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38039">CVE-2023-38039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46219">CVE-2023-46219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2004">CVE-2024-2004</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2379">CVE-2024-2379</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2466">CVE-2024-2466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6197">CVE-2024-6197</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6874">CVE-2024-6874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264</a>)</li>
<li>dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868</a>)</li>
<li>e2fsprogs (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490</a>)</li>
<li>gcc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465</a>)</li>
<li>glib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4527">CVE-2023-4527</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4806">CVE-2023-4806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4911">CVE-2023-4911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5156">CVE-2023-5156</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6246">CVE-2023-6246</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6779">CVE-2023-6779</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6780">CVE-2023-6780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602</a>)</li>
<li>gnupg (<a href="https://gnupg.org/blog/20240125-smartcard-backup-key.html">gnupg-2024-01-25</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0361">CVE-2023-0361</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835</a>)</li>
<li>grub (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3981">CVE-2021-3981</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28735">CVE-2022-28735</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38090">CVE-2022-38090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855</a>)</li>
<li>less (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-46663">CVE-2022-46663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26256">CVE-2024-26256</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37407">CVE-2024-37407</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.1">libarchive-20230729</a>)</li>
<li>libcap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603</a>)</li>
<li>libmicrohttpd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371</a>)</li>
<li>libtirpc (<a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=4a2d85c64110ee9e21a8c4f9dafd6b0ae621506d">libtirpc-rhbg-2138317</a>,  <a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=f7f0abdf267698de3f74a0285405b1b01f40893b">libtirpc-rhbg-2150611</a>,  <a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1d2e10afb2ffc35cb3623f57a15f712359f18e75">libtirpc-rhbg-2224666</a>)</li>
<li>libuv (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">CVE-2024-34459</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4">libxml2-20230428</a>)</li>
<li>lua (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33099">CVE-2022-33099</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371</a>)</li>
<li>ncurses (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491</a>)</li>
<li>nghttp2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25515">CVE-2023-25515</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25516">CVE-2023-25516</a>)</li>
<li>openldap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953</a>)</li>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25136">CVE-2023-25136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387">CVE-2024-6387</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28531">CVE-2023-28531</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51384">CVE-2023-51384</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4203">CVE-2022-4203</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0216">CVE-2023-0216</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0217">CVE-2023-0217</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0401">CVE-2023-0401</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1255">CVE-2023-1255</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650</a>),  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2975">CVE-2023-2975</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446</a>)</li>
<li>procps (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016</a>)</li>
<li>protobuf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1941">CVE-2022-1941</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626</a>)</li>
<li>samba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1615">CVE-2022-1615</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">CVE-2023-29383</a>)</li>
<li>sudo (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27320">CVE-2023-27320</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28486">CVE-2023-28486</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28487">CVE-2023-28487</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465</a>)</li>
<li>sysext-docker: Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28841">CVE-2023-28841</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28842">CVE-2023-28842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29018">CVE-2024-29018</a>)</li>
<li>sysext-podman: podman (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727</a>)</li>
<li>tar (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28948">CVE-2022-28948</a>)</li>
<li>tpm2-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040">CVE-2024-29040</a>)</li>
<li>traceroute (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0288">CVE-2023-0288</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0433">CVE-2023-0433</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1175">CVE-2023-1175</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1170">CVE-2023-1170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2609">CVE-2023-2609</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2610">CVE-2023-2610</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2426">CVE-2023-2426</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48231">CVE-2023-48231</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48232">CVE-2023-48232</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48233">CVE-2023-48233</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48234">CVE-2023-48234</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48235">CVE-2023-48235</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48236">CVE-2023-48236</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48237">CVE-2023-48237</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48706">CVE-2023-48706</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5344">CVE-2023-5344</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5441">CVE-2023-5441</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5535">CVE-2023-5535</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46246">CVE-2023-46246</a>)</li>
<li>zlib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured that <code>/var/log/journal/</code> is created early enough for systemd-journald to persist the logs on first boot (<a href="https://github.com/flatcar/bootengine/pull/60">bootengine#60</a>, <a href="https://github.com/flatcar/baselayout/pull/29">baselayout#29</a>)</li>
<li>Fixed <code>journalctl --user</code> permission issue (<a href="https://github.com/flatcar/Flatcar/issues/989">Flatcar#989</a>)</li>
<li>Added a workaround for old airgapped/proxied update-engine clients to be able to update to this release (<a href="https://github.com/flatcar/Flatcar/issues/1332">Flatcar#1332</a>, <a href="https://github.com/flatcar/update_engine/pull/38">update_engine#38</a>)</li>
<li>Added AWS EKS support for versions 1.24-1.28. Fixed <code>/usr/share/amazon/eks/download-kubelet.sh</code> to include download paths for these versions. (<a href="https://github.com/flatcar/scripts/pull/1210">scripts#1210</a>)</li>
<li>Added qemu-guest-agent to ARM64 images (<a href="https://github.com/flatcar/Flatcar/issues/1593">flatcar/flatcar#1593</a>)</li>
<li>AWS: Fixed the Amazon SSM agent that was crashing. (<a href="https://github.com/flatcar/Flatcar/issues/1307">Flatcar#1307</a>)</li>
<li>CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: (<a href="https://github.com/flatcar/scripts/pull/2016">flatcar/scripts#2016</a>)- Fixed issue file generation from '/etc/issue.d' (<a href="https://github.com/flatcar/scripts/pull/2018">scripts#2018</a>)</li>
<li>Deleted files in <code>/etc</code> that have a tmpfiles rule that normally would recreate them will now show up again through the <code>/etc</code> lowerdir (<a href="https://github.com/flatcar/Flatcar/issues/1265">Flatcar#1265</a>, <a href="https://github.com/flatcar/bootengine/pull/79">bootengine#79</a>)</li>
<li>Disabled user-configdrive.service on OpenStack when config drive is used, which caused the hostname to be overwritten. The coreos-cloudinit.service unit already runs on OpenStack if the system is not configured via ignition. (<a href="https://github.com/flatcar/Flatcar/issues/1385">Flatcar#1385</a>)</li>
<li>Ensured that the folder <code>/var/log/sssd</code> is created if it doesn't exist, required for <code>sssd.service</code> (<a href="https://github.com/flatcar/Flatcar/issues/1096">Flatcar#1096</a>)</li>
<li>Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found (<a href="https://github.com/flatcar/coreos-cloudinit/pull/25">coreos-cloudinit#25</a>)</li>
<li>Fixed a miscompilation of getfacl causing it to dump core when executed (<a href="https://github.com/flatcar/scripts/pull/809">scripts#809</a>)</li>
<li>Fixed bad usage of gpg that prevented flatcar-install from being used with custom signing keys (<a href="https://github.com/flatcar/flatcar/pull/1471">Flatcar#1471</a>)</li>
<li>Fixed bug in handling renamed network interfaces when generating login issue (<a href="https://github.com/flatcar/init/pull/102">init#102</a>)</li>
<li>Fixed iterating over the OEM update payload signatures which prevented the AWS OEM update to 3745.x.y (<a href="https://github.com/flatcar/update_engine/pull/31">update-engine#31</a>)</li>
<li>Fixed oem-cloudinit.service on Equinix Metal. The availability check now uses the https://metadata.platformequinix.com/metadata endpoint. (<a href="https://github.com/flatcar/scripts/pull/2222">scripts#2222</a>)</li>
<li>Fixed quotes handling for update-engine (<a href="https://github.com/flatcar/Flatcar/issues/1209">Flatcar#1209</a>)</li>
<li>Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. (<a href="https://github.com/flatcar/flatcar/pull/1514">Flatcar#1514</a>)</li>
<li>Fixed supplying extension update payloads with a custom base URL in Nebraska (<a href="https://github.com/flatcar/Flatcar/issues/1281">Flatcar#1281</a>)</li>
<li>Fixed that systemd-sysext images can extend directories where Flatcar extensions are also shipping files, e.g., that the sysext-bakery Kubernetes extension works when OEM extensions are present (<a href="https://github.com/flatcar/sysext-bakery/issues/50">sysext-bakery#50</a>)</li>
<li>Fixed the handling of OEM update payloads in a Nebraska response with self-hosted packages (<a href="https://github.com/flatcar/ue-rs/pull/49">ue-rs#49</a>)</li>
<li>Fixed the initrd option in the QEMU launcher script. It was -R, but this was already taken by the read-only pflash option, so use -r instead. (<a href="https://github.com/flatcar/scripts/pull/2239">scripts#2239</a>)</li>
<li>Fixed the missing <code>/etc/extensions/</code> symlinks for the inbuilt Docker/containerd systemd-sysext images on update from Beta 3760.1.0 (<a href="https://github.com/flatcar/update_engine/pull/32">update_engine#32</a>)</li>
<li>Fixed the postinstall hook failure when updating from Azure instances without OEM systemd-sysext images to Flatcar Alpha 3745.x.y (<a href="https://github.com/flatcar/update_engine/pull/29">update_engine#29</a>)</li>
<li>Fixes kubevirt vm creation by ensuring that /dev/vhost-net exists (<a href="https://github.com/flatcar/Flatcar/issues/1336">Flatcar#1336</a>)</li>
<li>Fix ownership of systemd units shipped with built-in docker/containerd sysexts. The files shipped on production images were accidentally owned by 1000:1000 instead of 0:0. This uid/gid is not present on Flatcar images but would be assigned to the first created user. Due to contents of sysexts and /usr being readonly on Flatcar, the invalid permissions can't be used to escalate privileges. (<a href="https://github.com/flatcar/scripts/pull/2266">scripts#2266</a>)</li>
<li>Fix the RemainAfterExit clause in nvidia.service (<a href="https://github.com/flatcar/Flatcar/issues/1169">Flatcar#1169</a>)</li>
<li>GCP: Fixed OS Login enabling (<a href="https://github.com/flatcar/scripts/pull/1445">scripts#1445</a>)</li>
<li>Hetzner: Fixed duplicated prefix in the Afterburn metadata (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
<li>Made <code>sshkeys.service</code> more robust to only run <code>coreos-metadata-sshkeys@core.service</code> when not masked and also retry on failure (<a href="https://github.com/flatcar/init/pull/112">init#112</a>)</li>
<li>Removed custom CloudSigma coreos-cloudinit service configuration since it will be called with the cloudsigma oem anyway. The restart of the service can also cause the serial port to be stuck in an nondeterministic state which breaks future runs.</li>
<li>Resolved kmod static nodes creation in bootengine (<a href="https://github.com/flatcar/bootengine/pull/85">bootengine#85</a>)</li>
<li>Restored support for custom OEMs supplied in the PXE boot where <code>/usr/share/oem</code> brings the OEM partition contents (<a href="https://github.com/flatcar/Flatcar/issues/1376">Flatcar#1376</a>)</li>
<li>Restored the reboot warning and delay for non-SSH console sessions (<a href="https://github.com/flatcar/locksmith/pull/21">locksmith#21</a>)</li>
<li>Set TTY used for fetching server_context to RAW mode before running cloudinit on cloudsigma (<a href="https://github.com/flatcar/scripts/pull/1280">scripts#1280</a>)</li>
<li>Worked around a bash regression in <code>flatcar-install</code> and added error reporting for disk write failures (<a href="https://github.com/flatcar/Flatcar/issues/1059">Flatcar#1059</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added a new <code>flatcar-reset</code> tool and boot logic for selective OS resets to reconfigure the system with Ignition while avoiding config drift (<a href="https://github.com/flatcar/bootengine/pull/55">bootengine#55</a>, <a href="https://github.com/flatcar/init/pull/91">init#91</a>)</li>
<li>Added <code>pigz</code> to the image, a parallel gzip implementation, which is useful to speed up the (de)compression for large container image imports/exports (<a href="https://github.com/flatcar/coreos-overlay/pull/2504">coreos-overlay#2504</a>)</li>
<li>Enabled elfutils support in systemd-coredump. A backtrace will now appear in the journal for any program that dumps core (<a href="https://github.com/flatcar/coreos-overlay/pull/2489">coreos-overlay#2489</a>)</li>
<li><code>/etc</code> is now set up as overlayfs with the original <code>/etc</code> folder being the store for changed files/directories and <code>/usr/share/flatcar/etc</code> providing the lower default directory tree (<a href="https://github.com/flatcar/bootengine/pull/53">bootengine#53</a>, <a href="https://github.com/flatcar/scripts/pull/666">scripts#666</a>)</li>
<li>Improved the OS reset tool to offer preview, backup and restore (<a href="https://github.com/flatcar/init/pull/94">init#94</a>)</li>
<li>On boot any files in <code>/etc</code> that are the same as provided by the booted <code>/usr/share/flatcar/etc</code> default for the overlay mount on <code>/etc</code> are deleted to ensure that future updates of <code>/usr/share/flatcar/etc</code> are propagated - to opt out create <code>/etc/.no-dup-update</code> in case you want to keep an unmodified config file as is or because you fear that a future Flatcar version may use the same file as you at which point your copy is cleaned up and any other future Flatcar changes would be applied (<a href="https://github.com/flatcar/bootengine/pull/54">bootengine#54</a>)</li>
<li>Switched systemd log reporting to the combined format of both unit description, as before, and now the unit name to easily find the unit (<a href="https://github.com/flatcar/coreos-overlay/pull/2436">coreos-overlay#2436</a>)</li>
<li>Added zram-generator package to the image (<a href="https://github.com/flatcar/scripts/pull/1772">scripts#1772</a>)</li>
<li>Added Akamai / Linode images (<a href="https://github.com/flatcar/scripts/pull/1806">flatcar/scripts#1806</a>)</li>
<li>Added azure-nvme-utils to the image, which is used by udev to create symlinks for NVMe disks on Azure v6 instances under /dev/disk/azure/. (<a href="https://github.com/flatcar/scripts/pull/1950">scripts#1950</a>)</li>
<li>Added Hetzner images (<a href="https://github.com/flatcar/scripts/pull/1880">flatcar/scripts#1880</a>)</li>
<li>Added Hyper-V VHDX image (<a href="https://github.com/flatcar/scripts/pull/1791">flatcar/scripts#1791</a>)</li>
<li>Added Ignition Clevis support for encrypted disks unlocked with a TPM2 device or a Tang server (<a href="https://github.com/flatcar/scripts/pull/1560">scripts#1560</a>)</li>
<li>Added KubeVirt qcow2 image for amd64/arm64 (<a href="https://github.com/flatcar/scripts/pull/1962">flatcar/scripts#1962</a>)</li>
<li>Added Scaleway images (<a href="https://github.com/flatcar/scripts/pull/1683">flatcar/scripts#1683</a>)</li>
<li>Added support for multipart MIME userdata in coreos-cloudinit. Ignition now detects multipart userdata and delegates execution to coreos-cloudinit. (scripts#873)</li>
<li>Added support for unlocking the rootfs with a TPM set up by systemd-cryptenroll (<a href="https://github.com/flatcar/bootengine/pull/93">bootengine#93</a>)</li>
<li>Added TLS Kernel module (<a href="https://github.com/flatcar/scripts/pull/865">scripts#865</a>)</li>
<li>Add Intel igc driver to support I225/I226 family NICs. (<a href="https://github.com/flatcar/scripts/pull/1786">flatcar/scripts#1786</a>)</li>
<li>A new format <code>qemu_uefi_secure</code> is introduced to test Flatcar for SecureBoot-enabled features. The format will be later merged into <code>qemu_uefi</code>.</li>
<li>As part of the update to Catalyst 4 (used to build the SDK), the coreos package repository has been renamed to coreos-overlay to match its directory name. This will be reflected in package listings and package manager output. (<a href="https://github.com/flatcar/scripts/pull/2115">flatcar/scripts#2115</a>)</li>
<li>AWS OEM images now use a systemd-sysext image for layering additional platform-specific software on top of <code>/usr</code></li>
<li>Azure and QEMU OEM images now use systemd-sysext images for layering additional platform-specific software on top of <code>/usr</code>. For Azure images this also means that the image has a normal Python installation available through the sysext image. The OEM software is still not updated but this will be added soon.</li>
<li>Azure, HyperV: Added daemons <code>kvp</code>, <code>vss</code>, and <code>fcopy</code> for better HyperV hypervisor integration with Flatcar guests (<a href="https://github.com/flatcar/scripts/pull/2309">scripts#2309</a>).</li>
<li>Backported systemd-sysext mutable overlays functionality from yet-unreleased systemd v256. (<a href="https://github.com/flatcar/scripts/pull/1753">flatcar/scripts#1753</a>)</li>
<li>Changed coreos-cloudinit to now set the short hostname instead of the FQDN when fetched from the metadata service (<a href="https://github.com/flatcar/coreos-cloudinit/pull/19">coreos-cloudinit#19</a>)
(<a href="https://docs.docker.com/engine/release-notes/23.0/#bug-fixes-and-enhancements-6">changelog</a>, <a href="https://github.com/moby/moby/pull/42661">upstream pr</a>).</li>
<li>Change nvidia.service to type oneshot (from the default &quot;simple&quot;) so the subsequent services (configured with &quot;Requires/After&quot;) are executed after the driver installation is successfully finished (flatcar/Flatcar#1136)
<ul>
<li>Consequently, <code>update_engine</code> will not perform torcx sanity checks post-update anymore.</li>
</ul>
</li>
<li>cri-tools, runc, containerd, docker, and docker-cli are now built from Gentoo upstream ebuilds. Docker received a major version upgrade - it was updated to Docker 24 (from Docker 20; see “updates”).</li>
<li>Disabled real-time priority for multipathd as it prevents the cgroups2 cpu controller from working. (<a href="https://github.com/flatcar/scripts/pull/1771">flatcar/scripts#1771</a>)
<ul>
<li><strong>Docker will remove the <code>btrfs</code> driver entirely in a future version. Please consider migrating your deployments to the <code>overlay2</code> driver.</strong></li>
</ul>
</li>
<li>Enabled amd-pstate,amd-pstate-epp cpufreq drivers for some AMD CPUs in the kernel. (<a href="https://github.com/flatcar/scripts/pull/1770">flatcar/scripts#1770</a>)</li>
<li>Enabled ntpd by default on AWS &amp; GCP, enabled chronyd by default on Azure. The native time sync source is used on each cloud. (<a href="https://github.com/flatcar/scripts/pull/1792">scripts#1792</a>)</li>
<li>Enabled the GRUB TPM2 module to measure the boot code path and files into PCR 8+9 in UEFI (<a href="https://github.com/flatcar/scripts/pull/1861">scripts#1861</a>)</li>
<li>Enabled the ptp_vmw module in the kernel.</li>
<li>Enabled the virtio GPU driver (<a href="https://github.com/flatcar/scripts/pull/830">scripts#830</a>)</li>
<li>Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers (<a href="https://github.com/flatcar/scripts/pull/2355">flatcar/scripts#2355</a>)</li>
<li>GCP OEM images now use a systemd-sysext image for layering additional platform-specific software on top of <code>/usr</code> and being part of the OEM A/B updates (<a href="https://github.com/flatcar/Flatcar/issues/1146">flatcar#1146</a>)</li>
<li>Hetzner: Added <code>COREOS_HETZNER_PRIVATE_IPV4_0</code> Afterburn attribute for Hetzner private IPs (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
<li>Hyper-V images, both .vhd and .vhdx files are available as <code>zip</code> compressed, switching from <code>bzip2</code> to a built-in available Windows compression - <code>zip</code> (<a href="https://github.com/flatcar/scripts/pull/1878">scripts#1878</a>)</li>
<li>libcrypt is now provided by the libxcrypt library instead of glibc. Glibc libcrypt was deprecated long time ago.</li>
<li>Migrated the NVIDIA installer from the Azure/AWS OEM partition to <code>/usr</code> to make it available on all platforms (<a href="https://github.com/flatcar/scripts/pull/932/">scripts#932</a>, <a href="https://github.com/flatcar/Flatcar/issues/1077">Flatcar#1077</a>)</li>
<li>Migrate to Type=notify in containerd.service. Changed the unit to Type=notify, utilizing the existing containerd support for sd_notify call after socket setup.</li>
<li>Moved a mountpoint of the OEM partition from <code>/usr/share/oem</code> to <code>/oem</code>. <code>/usr/share/oem</code> became a symlink to <code>/oem</code> for backward compatibility. Despite the move, the initrd images providing files through <code>/usr/share/oem</code> should keep using <code>/usr/share/oem</code>. The move was done to enable activating the OEM sysext images that are placed in the OEM partition.
<ul>
<li><strong>NOTE</strong> that if you are already using btrfs-backed Docker storage and are upgrading to this new version, Docker will automatically use the <code>btrfs</code> storage driver for backwards-compatibility with your deployment.</li>
<li><strong>NOTE</strong> The docker btrfs storage driver has been de-prioritised; BTRFS backed storage will now default to the <code>overlay2</code> driver</li>
</ul>
</li>
<li>OEM vendor tools are now A/B updated if they are shipped as systemd-sysext images, the migration happens when both partitions require a systemd-sysext OEM image - note that this will delete the <code>nvidia.service</code> from <code>/etc</code> on Azure because it's now part of <code>/usr</code> (<a href="https://github.com/flatcar/Flatcar/issues/60">Flatcar#60</a>)</li>
<li>OpenStack, Brightbox: Added the <code>flatcar.autologin</code> kernel cmdline parameter by default as the hypervisor manages access to the console (<a href="https://github.com/flatcar/scripts/pull/1866">scripts#1866</a>)</li>
<li>Provided a Podman Flatcar extension as optional systemd-sysext image with the release. Write 'podman' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning (<a href="https://github.com/flatcar/scripts/pull/1964">scripts#1964</a>)</li>
<li>Provided a Python Flatcar extension as optional systemd-sysext image with the release. Write 'python' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning (<a href="https://github.com/flatcar/scripts/pull/1979">scripts#1979</a>)</li>
<li>OpenStack: Changed metadata hostname source order. The service first tries with the config drive then fallback on the metadata service. (<a href="https://github.com/flatcar/bootengine/pull/96">bootengine#96</a>)</li>
<li>Provided a ZFS-2.2.2 Flatcar extension as optional systemd-sysext image with the release. Write 'zfs' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning. ZFS support is experimental and ZFS is not supported for the root partition. (<a href="https://github.com/flatcar/scripts/pull/1742">flatcar/scripts#1742</a>)
<ul>
<li>Relevant changes: <a href="https://github.com/flatcar/scripts/pull/1216">scripts#1216</a>, <a href="https://github.com/flatcar/update_engine/pull/30">update_engine#30</a>, <a href="https://github.com/flatcar/mantle/pull/466">Mantle#466</a>, <a href="https://github.com/flatcar/mantle/pull/465">Mantle#465</a>.</li>
</ul>
</li>
<li>Removed <code>actool</code> from the image and <code>acbuild</code> from the SDK as these tools are deprecated and not used (<a href="https://github.com/flatcar/scripts/pull/1817">scripts#1817</a>)</li>
<li>⚠ Removed coreos-cloudinit support for automatic keys conversion (e.g <code>reboot-strategy</code> -&gt; <code>reboot_strategy</code>) (<a href="https://github.com/flatcar/scripts/pull/1687">scripts#1687</a>)</li>
<li>Removed Linux drivers for Mellanox Technologies Switch ASICs family and Spectrum/Spectrum-2/Spectrum-3/Spectrum-4 Ethernet Switch ASICs to reduce the initrd size on AMD64 by ~5MB (<a href="https://github.com/flatcar/scripts/pull/1734">flatcar/scripts#1734</a>). This change is part of the effort to reduce the initrd size (<a href="https://github.com/flatcar/Flatcar/issues/1381">flatcar#1381</a>).</li>
<li>Removed unused grub executable duplicate files and removed grub modules that are already assembled in the grub executable (<a href="https://github.com/flatcar/scripts/pull/1955">scripts#1955</a>).</li>
<li>Replace nmap netcat with openbsd variant. The license didn't get an exception from CNCF. Something about the definition of &quot;derivative works&quot; being too broad.</li>
<li>Reworked the VMware OEM software to be shipped as A/B updated systemd-sysext image</li>
<li>Scaleway: images are now provided directly as <code>.qcow2</code> to ease the import on Scaleway (<a href="https://github.com/flatcar/scripts/pull/1953">scripts#1953</a>)</li>
<li>SDK: Experimental support for <a href="https://github.com/flatcar/scripts/blob/main/PREFIX.md">prefix builds</a> to create distro independent, portable, self-contained applications w/ all dependencies included. With contributions from <a href="https://github.com/chewi">chewi</a> and <a href="https://github.com/HappyTobi">HappyTobi</a>.</li>
<li>Started shipping default ssh client and ssh daemon configs in <code>/etc/ssh/ssh_config</code> and <code>/etc/ssh/sshd_config</code> which include config snippets in <code>/etc/ssh/ssh_config.d</code> and <code>/etc/ssh/sshd_config.d</code>, respectively.</li>
<li>Switched ptp_kvm from kernel builtin to module.</li>
<li>The default VM memory was bumped to 2 GB in the Qemu script and for VMware OVFs</li>
<li>The <code>docker build</code> command will now use buildx as its backend as the old one became deprecated and a loud &quot;DEPRECATED&quot; information is printed every time it's used.</li>
<li>The kernel security module Landlock is now enabled for programs to sandbox themselves (<a href="https://github.com/flatcar/scripts/pull/2158">flatcar/scripts#2158</a>)</li>
<li>The open-vm-tools package in VMware OEM now comes with vmhgfs-fuse, udev rules, pam and vgauth
<ul>
<li>Torcx entered deprecation 2 years ago in favour of <a href="https://www.flatcar.org/docs/latest/container-runtimes/use-a-custom-docker-or-containerd-version/">deploying plain Docker binaries</a></li>
<li>Torcx has been removed entirely; if you use torcx to extend the Flatcar base OS image, please refer to our <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/#torcx-deprecation">conversion script</a> and to the sysext documentation mentioned above for migrating.</li>
</ul>
</li>
<li><strong>torcx was replaced by systemd-sysext in the OS image</strong>. Learn more about sysext and how to customise OS images <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/">here</a>.</li>
<li>Updated locksmith to use non-deprecated resource control options in the systemd unit (<a href="https://github.com/flatcar/locksmith/pull/20">Locksmith#20</a>)</li>
<li>Update generation SLSA provenance info from v0.2 to v1.0.
Using the btrfs driver can still be enforced by creating a respective <a href="https://docs.docker.com/storage/storagedriver/btrfs-driver/#configure-docker-to-use-the-btrfs-storage-driver">docker config</a> at <code>/etc/docker/daemon.json</code>.</li>
<li>:warning: Dropped support for niftycloud and interoute. For interoute we haven't been generating the images for some time already. (TODO) :warning:
(which is now also a legacy option because systemd-sysext offers a more robust and better structured way of customisation, including OS independent updates).</li>
</ul>
<h4>Updates</h4>
<ul>
<li>AWS: amazon-ssm-agent (<a href="https://github.com/aws/amazon-ssm-agent/releases/tag/3.2.985.0">3.2.985.0</a>)</li>
<li>Azure: WALinuxAgent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/2.9.1.1">2.9.1.1</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.21.13">1.21.13</a> (includes <a href="https://go.dev/doc/devel/release#go1.20.14">1.20.14</a>, <a href="https://go.dev/doc/devel/release#go1.20.13">1.20.13</a>, <a href="https://go.dev/doc/devel/release#go1.20.12">1.20.12</a>, <a href="https://go.dev/doc/devel/release#go1.20.11">1.20.11</a>, <a href="https://go.dev/doc/devel/release#go1.20.10">1.20.10</a>, <a href="https://go.dev/doc/devel/release#go1.20.9">1.20.9</a>, <a href="https://go.dev/doc/devel/release#go1.20.8">1.20.8</a>, <a href="https://go.dev/doc/devel/release#go1.20.7">1.20.7</a>, <a href="https://go.dev/doc/devel/release#go1.20.6">1.20.6</a>, <a href="https://go.dev/doc/devel/release#go1.20.5">1.20.5</a>, <a href="https://go.dev/doc/devel/release#go1.20.4">1.20.4</a>, <a href="https://go.dev/doc/devel/release#go1.19.13">1.19.13</a>, <a href="https://go.dev/doc/devel/release#go1.19.12">1.19.12</a>, <a href="https://go.dev/doc/devel/release#go1.19.11">1.19.11</a>, <a href="https://go.dev/doc/devel/release#go1.19.10">1.19.10</a>, <a href="https://go.dev/doc/devel/release#go1.19.9">1.19.9</a>, <a href="https://go.dev/doc/devel/release#go1.19.8">1.19.8</a>, <a href="https://go.dev/doc/devel/release#go1.19.7">1.19.7</a>, <a href="https://go.dev/doc/devel/release#go1.19.6">1.19.6</a>))</li>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2190-2024-06-05">2.19.0</a> (includes <a href="https://coreos.github.io/ignition/release-notes/#ignition-2180-2024-03-01">2.18.0</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2170-2023-11-20">2.17.0</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2162-2023-07-12">2.16.2</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2161-2023-07-10">2.16.1</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2160-2023-06-29">2.16.0</a>))</li>
<li>Linux (<a href="https://lwn.net/Articles/1006010">6.6.74</a> (includes <a href="https://lwn.net/Articles/1005709">6.6.73</a>, <a href="https://lwn.net/Articles/1005383">6.6.72</a>, <a href="https://lwn.net/Articles/1004703">6.6.71</a>, <a href="https://lwn.net/Articles/1004551">6.6.70</a>, <a href="https://lwn.net/Articles/1003986">6.6.69</a>, <a href="https://lwn.net/Articles/1003609">6.6.68</a>, <a href="https://lwn.net/Articles/1002919">6.6.67</a>, <a href="https://lwn.net/Articles/1002177">6.6.66</a>, <a href="https://lwn.net/Articles/1001739">6.6.65</a>, <a href="https://lwn.net/Articles/1001438">6.6.64</a>, <a href="https://lwn.net/Articles/999110">6.6.63</a>, <a href="https://lwn.net/Articles/998450">6.6.62</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.61">6.6.61</a>, <a href="https://lwn.net/Articles/997527">6.6.60</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.59">6.6.59</a>, <a href="https://lwn.net/Articles/995132">6.6.58</a>, <a href="https://lwn.net/Articles/994634">6.6.57</a>, <a href="https://lwn.net/Articles/993600">6.6.56</a>, <a href="https://lwn.net/Articles/993599">6.6.55</a>, <a href="https://lwn.net/Articles/992980">6.6.54</a>, <a href="https://lwn.net/Articles/992296">6.6.53</a>, <a href="https://lwn.net/Articles/990767/">6.6.52</a>, <a href="https://lwn.net/Articles/990045">6.6.51</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.50">6.6.50</a>, <a href="https://lwn.net/Articles/988749">6.6.49</a>, <a href="https://lwn.net/Articles/987679">6.6.48</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.47">6.6.47</a>, <a href="https://lwn.net/Articles/985672">6.6.46</a>, <a href="https://lwn.net/Articles/985200">6.6.45</a>, <a href="https://lwn.net/Articles/984450">6.6.44</a>, <a href="https://lwn.net/Articles/983655">6.6.43</a>, <a href="https://lwn.net/Articles/983333">6.6.42</a>, <a href="https://lwn.net/Articles/982381">6.6.41</a>, <a href="https://lwn.net/Articles/982050">6.6.40</a>, <a href="https://lwn.net/Articles/981719">6.6.39</a>, <a href="https://lwn.net/Articles/981255">6.6.38</a>, <a href="https://lwn.net/Articles/980860">6.6.37</a>, <a href="https://lwn.net/Articles/979850">6.6.36</a>, <a href="https://lwn.net/Articles/979262">6.6.35</a>, <a href="https://lwn.net/Articles/978593">6.6.34</a>, <a href="https://lwn.net/Articles/978141">6.6.33</a>, <a href="https://lwn.net/Articles/975075">6.6.32</a>, <a href="https://lwn.net/Articles/974072">6.6.31</a>, <a href="https://lwn.net/Articles/972211">6.6.30</a>, <a href="https://lwn.net/Articles/971363">6.6.29</a>, <a href="https://lwn.net/Articles/970172">6.6.28</a>, <a href="https://lwn.net/Articles/969734">6.6.27</a>, <a href="https://lwn.net/Articles/969352">6.6.26</a>, <a href="https://lwn.net/Articles/968470">6.6.25</a>, <a href="https://lwn.net/Articles/968253">6.6.24</a>, <a href="https://lwn.net/Articles/966758">6.6.23</a>, <a href="https://lwn.net/Articles/965606">6.6.22</a>, <a href="https://lwn.net/Articles/964561">6.6.21</a>, <a href="https://lwn.net/Articles/964307">6.6.20</a>, <a href="https://lwn.net/Articles/964173">6.6.19</a>, <a href="https://lwn.net/Articles/963357">6.6.18</a>, <a href="https://lwn.net/Articles/962558">6.6.17</a>, <a href="https://lwn.net/Articles/961011">6.6.16</a>, <a href="https://lwn.net/Articles/960441">6.6.15</a>, <a href="https://lwn.net/Articles/959512">6.6.14</a>, <a href="https://lwn.net/Articles/958862">6.6.13</a>, <a href="https://lwn.net/Articles/958342">6.6.12</a>, <a href="https://lwn.net/Articles/957375">6.6.11</a>, <a href="https://lwn.net/Articles/957008">6.6.10</a>, <a href="https://lwn.net/Articles/956525">6.6.9</a>, <a href="https://lwn.net/Articles/955813">6.6.8</a>, <a href="https://lwn.net/Articles/954990/">6.6.7</a>, <a href="https://kernelnewbies.org/Linux_6.6">6.6</a>, <a href="https://lwn.net/Articles/954112">6.1.66</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.65">6.1.65</a>, <a href="https://lwn.net/Articles/953132">6.1.64</a>, <a href="https://lwn.net/Articles/952003">6.1.63</a>, <a href="https://lwn.net/Articles/950700">6.1.62</a>, <a href="https://lwn.net/Articles/949826">6.1.61</a>, <a href="https://lwn.net/Articles/948817">6.1.60</a>, <a href="https://lwn.net/Articles/948297">6.1.59</a>, <a href="https://lwn.net/Articles/947820">6.1.58</a>, <a href="https://lwn.net/Articles/947298">6.1.57</a>, <a href="https://lwn.net/Articles/946854">6.1.56</a>, <a href="https://lwn.net/Articles/945379">6.1.55</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.54">6.1.54</a>, <a href="https://lwn.net/Articles/944358">6.1.53</a>, <a href="https://lwn.net/Articles/943754">6.1.52</a>, <a href="https://lwn.net/Articles/943403">6.1.51</a>, <a href="https://lwn.net/Articles/943112">6.1.50</a>, <a href="https://lwn.net/Articles/942880">6.1.49</a>, <a href="https://lwn.net/Articles/942865">6.1.48</a>, <a href="https://lwn.net/Articles/942531">6.1.47</a>, <a href="https://lwn.net/Articles/941774">6.1.46</a>, <a href="https://lwn.net/Articles/941273">6.1.45</a>, <a href="https://lwn.net/Articles/940800">6.1.44</a>, <a href="https://lwn.net/Articles/940338">6.1.43</a>, <a href="https://lwn.net/Articles/939423">6.1.42</a>, <a href="https://lwn.net/Articles/939103">6.1.41</a>, <a href="https://lwn.net/Articles/939015">6.1.40</a>, <a href="https://lwn.net/Articles/938619">6.1.39</a>, <a href="https://lwn.net/Articles/937403">6.1.38</a>, <a href="https://lwn.net/Articles/937082">6.1.37</a>, <a href="https://lwn.net/Articles/936674">6.1.36</a>, <a href="https://lwn.net/Articles/935588">6.1.35</a>, <a href="https://lwn.net/Articles/934623">6.1.34</a>, <a href="https://lwn.net/Articles/934319">6.1.33</a>, <a href="https://lwn.net/Articles/933908">6.1.32</a>, <a href="https://lwn.net/Articles/933281">6.1.31</a>, <a href="https://lwn.net/Articles/932882">6.1.30</a>, <a href="https://lwn.net/Articles/932133">6.1.29</a>, <a href="https://lwn.net/Articles/931651">6.1.28</a>, <a href="https://lwn.net/Articles/930597/">6.1.27</a>, <a href="https://kernelnewbies.org/Linux_6.1">6.1</a>, <a href="https://lwn.net/Articles/929679/">5.15.108</a>, <a href="https://lwn.net/Articles/929015/">5.15.107</a>, <a href="https://lwn.net/Articles/928343">5.15.106</a>, <a href="https://lwn.net/Articles/927860">5.15.105</a>, <a href="https://lwn.net/Articles/926873">5.15.104</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.103">5.15.103</a>, <a href="https://lwn.net/Articles/925991">5.15.102</a>, <a href="https://lwn.net/Articles/925939">5.15.101</a>, <a href="https://lwn.net/Articles/925913">5.15.100</a>, <a href="https://lwn.net/Articles/925844">5.15.99</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240811">20240811</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240709">20240709</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240610">20240610</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240513">20240513</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240410">20240410</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240312">20240312</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240220">20240220</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240115">20240115</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231211">20231211</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231111">20231111</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231030">20231030</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230919">20230919</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230804">20230804</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625">20230625</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230515">20230515</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230404">20230404</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230310">20230310</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230210">20230210</a>))</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.80.1">1.80.1</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.80.0">1.80.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.79.0">1.79.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.78.0">1.78.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.77.2">1.77.2</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.77.1">1.77.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.77.0">1.77.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.76.0">1.76.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.75.0">1.75.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.74.1">1.74.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.73.0">1.73.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.72.1">1.72.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.72.0">1.72.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.71.1">1.71.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.71.0">1.71.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.70.0">1.70.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.68.2">1.68.2</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.68.0">1.68.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.67.1">1.67.1</a>))</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.25/release/3.25.html">3.25.2</a>)</li>
<li>SDK: dnsmasq (<a href="https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q1/016859.html">2.89</a>)</li>
<li>SDK: go (<a href="https://go.dev/doc/devel/release#go1.21.12">1.21.12</a> (includes <a href="https://go.dev/doc/go1.21">1.21</a>))</li>
<li>SDK: make (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-02/msg00011.html">4.4.1</a> (includes <a href="https://lists.gnu.org/archive/html/help-make/2022-10/msg00020.html">4.4</a>))</li>
<li>SDK: man-db (<a href="https://gitlab.com/man-db/man-db/-/tags/2.11.2">2.11.2</a>)</li>
<li>SDK: man-pages (<a href="https://lore.kernel.org/lkml/d56662b2-538c-7252-9052-8afbf325f843@gmail.com/T/">6.03</a>)</li>
<li>SDK: meson (<a href="https://mesonbuild.com/Release-notes-for-1-5-0.html">1.5.1</a>)</li>
<li>SDK: nano (<a href="https://git.savannah.gnu.org/cgit/nano.git/tree/NEWS?h=v7.2">7.2</a>)</li>
<li>SDK: nasm (<a href="https://github.com/netwide-assembler/nasm/releases/tag/nasm-2.16.01">2.16.01</a>)</li>
<li>SDK: pahole (<a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.27">1.27</a> (includes <a href="https://github.com/acmel/dwarves/blob/master/changes-v1.25">1.25</a>, <a href="https://github.com/acmel/dwarves/releases/tag/v1.24">1.24</a>))</li>
<li>SDK: perf (<a href="https://kernelnewbies.org/LinuxChanges#Linux_6.3.Tracing.2C_perf_and_BPF">6.3</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/5.38.2/perldelta">5.38.2</a> (includes <a href="https://perldoc.perl.org/perl5361delta">5.36.1</a>))</li>
<li>SDK: portage (<a href="https://github.com/gentoo/portage/blob/f03998622e0960388e903de0d6d24bdf6881e567/NEWS#L9">3.0.65</a> (includes <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.63">3.0.63</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.61">3.0.61</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.59">3.0.59</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.49">3.0.49</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.46">3.0.46</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.44">3.0.44</a>))</li>
<li>SDK: python (<a href="https://www.get-python.org/downloads/release/python-3119/">3.11.9</a> (includes <a href="https://www.get-python.org/downloads/release/python-3118/">3.11.8</a>, <a href="https://www.python.org/downloads/release/python-3117/">3.11.7</a>, <a href="https://docs.python.org/release/3.11.6/whatsnew/changelog.html#python-3-11-6">3.11.6</a>, <a href="https://www.python.org/downloads/release/python-3115/">3.11.5</a>, <a href="https://www.python.org/downloads/release/python-3113/">3.11.3</a>, <a href="https://www.python.org/downloads/release/python-31012/">3.10.12</a>, <a href="https://www.python.org/downloads/release/python-31011/">3.10.11</a>, <a href="https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-10-final">3.10.10</a>, <a href="https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-9-final">3.10.9</a>, <a href="https://www.python.org/downloads/release/python-3100/">3.10</a>))</li>
<li>SDK: python-packaging (<a href="https://github.com/pypa/packaging/releases/tag/23.2">23.2</a>)</li>
<li>SDK: python-platformdirs (<a href="https://github.com/platformdirs/platformdirs/releases/tag/3.11.0">3.11.0</a>)</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/8.2">8.2.3</a> (includes <a href="https://wiki.qemu.org/ChangeLog/8.0">8.0.4</a>, <a href="https://wiki.qemu.org/ChangeLog/8.1">8.1.5</a>, <a href="https://wiki.qemu.org/ChangeLog/8.0">8.0.3</a>, <a href="https://wiki.qemu.org/ChangeLog/7.2">7.2.3</a>))</li>
<li>SDK: repo (2.37)</li>
<li>VMware: libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.2">1.16.2</a> (includes <a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16">1.16</a>))</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.5">12.3.5</a> (includes <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0">12.3.0</a>, <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.5">12.2.5</a>))</li>
<li>acl (<a href="https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00012.html">2.3.2</a>)</li>
<li>acpid (<a href="https://sourceforge.net/p/acpid2/code/ci/2.0.34/tree/Changelog">2.0.34</a>)</li>
<li>afterburn (<a href="https://coreos.github.io/afterburn/release-notes/#afterburn-560">5.6.0</a> (includes <a href="https://github.com/coreos/afterburn/releases/tag/v5.5.1">5.5.1</a>, <a href="https://github.com/coreos/afterburn/releases/tag/v5.5.0">5.5.0</a>))</li>
<li>attr (<a href="https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00011.html">2.5.2</a>)</li>
<li>audit (<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.2">3.1.2</a> (includes <a href="https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.1">3.1.1</a>))</li>
<li>azure: azure-nvme-utils (<a href="https://github.com/Azure/azure-nvme-utils/releases/tag/v0.2.0">0.2.0</a>)</li>
<li>bash (<a href="https://git.savannah.gnu.org/cgit/bash.git/log/?id=2bb3cbefdb8fd019765b1a9cc42ecf37ff22fec6">5.2_p21</a> (includes <a href="https://lists.gnu.org/archive/html/bash-announce/2022-09/msg00000.html">5.2</a>))</li>
<li>bind-tools (<a href="https://bind9.readthedocs.io/en/v9.16.48/notes.html#notes-for-bind-9-16-48">9.16.48</a> (includes <a href="https://bind9.readthedocs.io/en/v9.16.42/notes.html#notes-for-bind-9-16-42">9.16.42</a>, <a href="https://bind9.readthedocs.io/en/v9.16.41/notes.html#notes-for-bind-9-16-41">9.16.41</a>, <a href="https://bind9.readthedocs.io/en/v9_16_37/notes.html#notes-for-bind-9-16-37">9.16.37</a>))</li>
<li>binutils (<a href="https://sourceware.org/pipermail/binutils/2024-January/132213.html">2.42</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00009.html">2.41</a>, <a href="https://lists.gnu.org/archive/html/info-gnu/2023-01/msg00003.html">2.40</a>))</li>
<li>bpftool (<a href="https://kernelnewbies.org/Linux_6.9#Tracing.2C_perf_and_BPF">6.9.2</a> (includes <a href="https://kernelnewbies.org/Linux_6.8#Tracing.2C_perf_and_BPF">6.8.2</a>, <a href="https://kernelnewbies.org/Linux_6.7#Tracing.2C_probing_and_BPF">6.7.6</a>, <a href="https://kernelnewbies.org/Linux_6.5#Tracing.2C_perf_and_BPF">6.5.7</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/log/tools/bpf/bpftool?h=v6.3">6.3</a>, <a href="https://kernelnewbies.org/LinuxChanges#Linux_6.2.Tracing.2C_perf_and_BPF">6.2.1</a>))</li>
<li>btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/blob/v6.9.2/CHANGES">6.9.2</a> (includes <a href="https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2-2022-11-24">6.0.2</a>, <a href="https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2022-10-11">6.0</a>))</li>
<li>c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_29_0">1.29.0</a> (includes <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_28_1">1.28.1</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_28_0">1.28.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_27_0">1.27.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_26_0">1.26.0</a>, <a href="https://c-ares.org/changelog.html#1_25_0">1.25.0</a>, <a href="https://c-ares.org/changelog.html#1_21_0">1.21.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1">1.19.1</a>, <a href="https://c-ares.org/changelog.html#1_19_0">1.19.0</a>))</li>
<li>cJSON (<a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.18">1.7.18</a> (includes <a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.17">1.7.17</a>, <a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.16">1.7.16</a>))</li>
<li>checkpolicy (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>cifs-utils (<a href="https://lists.samba.org/archive/samba-technical/2022-August/137528.html">7.0</a>)</li>
<li>conntrack-tools (<a href="https://lwn.net/Articles/945927/">1.4.8</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.21">1.7.21</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.20">1.7.20</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.19">1.7.19</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.18">1.7.18</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.17">1.7.17</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.16">1.7.16</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.15">1.7.15</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.14">1.7.14</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.13">1.7.13</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.12">1.7.12</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.11">1.7.11</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.10">1.7.10</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.9">1.7.9</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.8">1.7.8</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.7">1.7.7</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.6">1.7.6</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.5">1.7.5</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.4">1.7.4</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.3">1.7.3</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.2">1.7.2</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.21">1.6.21</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.20">1.6.20</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.19">1.6.19</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.18">1.6.18</a>))</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html">9.5</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2023-08/msg00007.html">9.4</a>, <a href="https://lists.gnu.org/archive/html/info-gnu/2023-04/msg00006.html">9.3</a>, <a href="https://git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?h=v9.1">9.1</a>))</li>
<li>cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.0">1.27.0</a>)</li>
<li>cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.2/docs/v2.7.2-ReleaseNotes">2.7.2</a> (includes <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.1/docs/v2.7.1-ReleaseNotes">2.7.1</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.0/docs/v2.7.0-ReleaseNotes">2.7.0</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.1/docs/v2.6.1-ReleaseNotes">2.6.1</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.0/docs/v2.6.0-ReleaseNotes">2.6.0</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.5.0/docs/v2.5.0-ReleaseNotes">2.5.0</a>))</li>
<li>curl (<a href="https://curl.se/ch/8.9.1.html">8.9.1</a> (includes <a href="https://curl.se/ch/8.9.0.html">8.9.0</a>, <a href="https://curl.se/changes.html#8_8_0">8.8.0</a>, <a href="https://curl.se/changes.html#8_7_1">8.7.1</a>, <a href="https://curl.se/changes.html#8_7_0">8.7.0</a>, <a href="https://curl.se/changes.html#8_6_0">8.6.0</a>, <a href="https://curl.se/changes.html#8_5_0">8.5.0</a>, <a href="https://curl.se/changes.html#8_4_0">8.4.0</a>, <a href="https://curl.se/changes.html#8_3_0">8.3.0</a>, <a href="https://curl.se/changes.html#8_2_1">8.2.1</a>, <a href="https://curl.se/changes.html#8_2_0">8.2.0</a>, <a href="https://curl.se/changes.html#8_1_2">8.1.2</a>, <a href="https://curl.se/changes.html#8_1_0">8.1.0</a>, <a href="https://curl.se/changes.html#8_0_1">8.0.1</a>, <a href="https://curl.se/changes.html#7_88_1">7.88.1</a>, <a href="https://curl.se/changes.html#7_88_0">7.88.0</a>))</li>
<li>debianutils (<a href="https://metadata.ftp-master.debian.org/changelogs//main/d/debianutils/debianutils_5.7-0.4_changelog">5.7</a>)</li>
<li>dev: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.15">3.15</a>)</li>
<li>dev: minicom (<a href="https://salsa.debian.org/minicom-team/minicom/-/releases/2.9">2.9</a>)</li>
<li>dev: smartmontools (<a href="https://www.smartmontools.org/browser/tags/RELEASE_7_4/smartmontools/NEWS">7.4</a>)</li>
<li>diffutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00009.html">3.10</a> (includes <a href="https://savannah.gnu.org/forum/forum.php?forum_id=10282">3.9</a>))</li>
<li>ding-libs (<a href="https://github.com/SSSD/ding-libs/releases/tag/0.6.2">0.6.2</a>)</li>
<li>e2fsprogs (<a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.1">1.47.1</a> (includes <a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html##1.47.0">1.47.0</a>, <a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.6">1.46.6</a>))</li>
<li>efibootmgr (<a href="https://github.com/rhboot/efibootmgr/releases/tag/18">18</a>)</li>
<li>efivar (<a href="https://github.com/rhboot/efivar/releases/tag/38">38</a>)</li>
<li>elfutils (<a href="https://inbox.sourceware.org/elfutils-devel/CAJDtP-SJhJ8cjTpkNpi+F0nzVJ2pZsEai8Ewpp4yJmsO_H5-NA@mail.gmail.com/T/#u">0.191</a> (includes <a href="https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=0420d3b8376877c1b11712f1aad90a2e2b6f6d06;hb=c1058da5a450e33e72b72abb53bc3ffd7f6b361b">0.190</a>, <a href="https://sourceware.org/pipermail/elfutils-devel/2023q1/006023.html">0.189</a>))</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.9">6.9</a> (includes <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.7">6.7</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.6">6.6</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.5">6.5</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.4">6.4</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=7bdf78f0d2a9ae1571fe9444e552490130e573fd">6.3</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.2">6.2</a>))</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes">2.6.3</a> (includes <a href="https://github.com/libexpat/libexpat/blob/R_2_6_2/expat/Changes">2.6.2</a>, <a href="https://github.com/libexpat/libexpat/blob/R_2_6_1/expat/Changes">2.6.1</a>, <a href="https://github.com/libexpat/libexpat/blob/R_2_6_0/expat/Changes">2.6.0</a>))</li>
<li>file (<a href="https://github.com/file/file/blob/FILE5_45/ChangeLog">5.45</a>)</li>
<li>findutils (<a href="https://git.savannah.gnu.org/cgit/findutils.git/tree/NEWS?h=v4.10.0">4.10.0</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00003.html">4.9.0</a>))</li>
<li>gawk (<a href="https://lwn.net/Articles/949829/">5.3.0</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00008.html">5.2.2</a>))</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-13/changes.html">13.3.1_p20240614</a> (includes <a href="https://gcc.gnu.org/gcc-13/changes.html">13.2</a>, <a href="https://gcc.gnu.org/gcc-12/changes.html">12.2.1</a>))</li>
<li>gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00011.html">13.2</a> (includes <a href="https://lwn.net/Articles/923819/">13.1.90</a>))</li>
<li>gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00004.html">1.23</a>)</li>
<li>gentoolkit (<a href="https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.3">0.6.3</a>)</li>
<li>gettext (<a href="https://savannah.gnu.org/news/?id=10544">0.22.4</a>)</li>
<li>gflags (<a href="https://github.com/gflags/gflags/releases/tag/v2.2.2">2.2.2</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.44.2/Documentation/RelNotes/2.44.2.txt">2.44.2</a> (includes <a href="https://github.com/git/git/blob/v2.44.1/Documentation/RelNotes/2.44.1.txt">2.44.1</a>, <a href="https://github.com/git/git/blob/v2.44.0/Documentation/RelNotes/2.44.0.txt">2.44.0</a>, <a href="https://github.com/git/git/blob/v2.43.2/Documentation/RelNotes/2.43.2.txt">2.43.2</a>, <a href="https://github.com/git/git/blob/v2.43.0/Documentation/RelNotes/2.43.0.txt">2.43.0</a>, <a href="https://github.com/git/git/blob/v2.42.0/Documentation/RelNotes/2.42.0.txt">2.42.0</a>, <a href="https://lore.kernel.org/git/xmqqleh3a3wm.fsf@gitster.g/">2.41.0</a>, <a href="https://github.com/git/git/blob/v2.39.3/Documentation/RelNotes/2.39.3.txt">2.39.3</a>, <a href="https://github.com/git/git/blob/v2.39.2/Documentation/RelNotes/2.39.2.txt">2.39.2</a>))</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.6">2.78.6</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.5">2.78.5</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.4">2.78.4</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/blob/2.78.3/NEWS">2.78.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.4">2.76.4</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.3">2.76.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.2">2.76.2</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.6">2.74.6</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.5">2.74.5</a>))</li>
<li>glibc (<a href="https://sourceware.org/pipermail/libc-alpha/2023-July/150524.html">2.38</a> (includes <a href="https://sourceware.org/git/?p=glibc.git;a=tag;h=refs/tags/glibc-2.37">2.37</a>))</li>
<li>glog (<a href="https://github.com/google/glog/releases/tag/v0.6.0">0.6.0</a>)</li>
<li>gmp (<a href="https://gmplib.org/gmp6.3">6.3.0</a>)</li>
<li>gnuconfig (<a href="https://git.savannah.gnu.org/cgit/config.git/log/?id=d4e37b5868ef910e3e52744c34408084bb13051c">20230731</a>)</li>
<li>gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000482.html">2.4.5</a> (includes <a href="https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000481.html">2.4.4</a>, <a href="https://dev.gnupg.org/T6307">2.2.42</a>))</li>
<li>gnutls (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2024-April/004846.html">3.8.5</a> (includes <a href="https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html">3.8.4</a>, <a href="https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html">3.8.2</a>, <a href="https://gitlab.com/gnutls/gnutls/-/blob/3.8.0/NEWS">3.8.0</a>))</li>
<li>gptfdisk (<a href="https://sourceforge.net/p/gptfdisk/code/ci/1d46f3723bc25f5598266f7d9a3548af3cee0c77/tree/NEWS">1.0.9</a>)</li>
<li>grep (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00004.html">3.11</a> (includes <a href="http://savannah.gnu.org/forum/forum.php?forum_id=10227">3.8</a>))</li>
<li>groff (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00001.html">1.23.0</a>)</li>
<li>grub (<a href="https://lists.gnu.org/archive/html/grub-devel/2021-06/msg00022.html">2.06</a>)</li>
<li>gzip (<a href="https://savannah.gnu.org/news/?id=10501">1.13</a>)</li>
<li>hwdata (<a href="https://github.com/vcrhonek/hwdata/compare/v0.382...v0.383">0.383</a> (includes <a href="https://github.com/vcrhonek/hwdata/commits/v0.382">0.382</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.376">0.376</a>, <a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.375">0.375</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.374">0.374</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.373">0.373</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.372">0.372</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.371">0.371</a>, <a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.367">0.367</a>))</li>
<li>ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2150-2023-02-21">2.15.0</a>)</li>
<li>inih (<a href="https://github.com/benhoyt/inih/releases/tag/r58">58</a> (includes <a href="https://github.com/benhoyt/inih/releases/tag/r57">57</a>, <a href="https://github.com/benhoyt/inih/releases/tag/r56">56</a>))</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514">20240514_p20240514</a> (includes <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312">20240312</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114">20231114_p20231114</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230808">20230808</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230613">20230613</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230512">20230512</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214">20230214</a>))</li>
<li>iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.16">3.16</a> (includes <a href="https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-314-2023-07-07">3.14</a>, <a href="https://github.com/esnet/iperf/blob/3.13/RELNOTES.md">3.13</a>))</li>
<li>iproute2 (<a href="https://lwn.net/Articles/965125/">6.8.0</a> (includes <a href="https://lwn.net/Articles/957171/">6.7.0</a>, <a href="https://marc.info/?l=linux-netdev&amp;m=169929000929786&amp;w=2">6.6.0</a>, <a href="https://marc.info/?l=linux-netdev&amp;m=169401822317373&amp;w=2">6.5.0</a>, <a href="https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/?h=v6.4.0">6.4.0</a>, <a href="https://lwn.net/Articles/930473/">6.3.0</a>, <a href="https://lwn.net/Articles/923952/">6.2.0</a>))</li>
<li>ipset (<a href="https://ipset.netfilter.org/changelog.html">7.22</a> (includes <a href="https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.21">7.21</a>, <a href="https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.20">7.20</a>, <a href="https://git.netfilter.org/ipset/tree/ChangeLog?id=ce6db35a0ea950e850ebe7c50ce46908c1c3bb2b">7.19</a>, <a href="https://git.netfilter.org/ipset/tree/ChangeLog?id=186f9b57c60bb53aae5f6633eff1e9d5e9095c3e">7.17</a>))</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20240117">20240117</a> (includes <a href="https://github.com/iputils/iputils/releases/tag/20231222">20231222</a>, <a href="https://github.com/iputils/iputils/releases/tag/20221126">20221126</a>))</li>
<li>ipvsadm (<a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.31">1.31</a> (includes <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.30">1.30</a>, <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.29">1.29</a>, <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.28">1.28</a>))</li>
<li>jq (<a href="https://github.com/jqlang/jq/releases/tag/jq-1.7.1">1.7.1</a> (includes <a href="https://github.com/jqlang/jq/releases/tag/jq-1.7">1.7</a>))</li>
<li>json-c (<a href="https://github.com/json-c/json-c/blob/json-c-0.17-20230812/ChangeLog">0.17</a>)</li>
<li>kbd (<a href="https://github.com/legionus/kbd/releases/tag/v2.6.4">2.6.4</a> (includes <a href="https://github.com/legionus/kbd/releases/tag/v2.6.1">2.6.1</a>, <a href="https://github.com/legionus/kbd/releases/tag/v2.6.0">2.6.0</a>, <a href="https://github.com/legionus/kbd/releases/tag/v2.5.1">2.5.1</a>))</li>
<li>kexec-tools (<a href="https://github.com/horms/kexec-tools/commits/v2.0.28/">2.0.28</a> (includes <a href="https://github.com/horms/kexec-tools/releases/tag/v2.0.24">2.0.24</a>))</li>
<li>keyutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=cb3bb194cca88211cbfcdde2f10c0f43c3fb8ec3">1.6.3</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=454f80f537e5d1aad506599b6776e4cc1cf5f0f2">1.6.2</a>))</li>
<li>kmod (<a href="https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/tree/NEWS?h=v32">32</a> (includes <a href="https://github.com/kmod-project/kmod/blob/v31/NEWS">31</a>, <a href="https://lwn.net/Articles/899526/">30</a>))</li>
<li>ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/b686ef00da46d4a0c0aba0c61b1866cbc9b462b6">2.4.4</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/604f94704f30e90ef960aa2be62a14d2e614a002">2.4.3</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/d93892d2e8ed69758c15ab18bc03bba09e715bc6">2.4.2</a>))</li>
<li>less (<a href="https://www.greenwoodsoftware.com/less/news.643.html">643</a> (includes <a href="http://www.greenwoodsoftware.com/less/news.633.html">633</a>, <a href="http://www.greenwoodsoftware.com/less/news.632.html">632</a>, <a href="http://www.greenwoodsoftware.com/less/news.608.html">608</a>))</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.4">3.7.4</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.3">3.7.3</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.2">3.7.2</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.1">3.7.1</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.0">3.7.0</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.6.2">3.6.2</a>))</li>
<li>libassuan (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=047f12b7c3ee0c8c1718a2da8b5a6bb9dd541fd8;hb=cc2f776904e0b5e56e2b81b2672ca98d7787ed1b">2.5.7</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=e52bb5dd36ac93ea227e53e89f82af9ccf38f339;hb=6b50ee6bcdd6aa81bd7cc3fb2379864c3ed479b8">2.5.6</a>))</li>
<li>libbsd (<a href="https://lists.freedesktop.org/archives/libbsd/2024-January/000377.html">0.11.8</a> (includes <a href="https://lists.freedesktop.org/archives/libbsd/2022-October/000337.html">0.11.7</a>))</li>
<li>libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.hde102t8xd0v">2.70</a> (includes <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe">2.69</a>))</li>
<li>libcap-ng (<a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.5">0.8.5</a> (includes <a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.4">0.8.4</a>))</li>
<li>libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.18.0">1.18.0</a> (includes <a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.4">1.16.4</a>))</li>
<li>libffi (<a href="https://github.com/libffi/libffi/releases/tag/v3.4.4">3.4.4</a> (includes <a href="https://github.com/libffi/libffi/releases/tag/v3.4.3">3.4.3</a>, <a href="https://github.com/libffi/libffi/releases/tag/v3.4.2">3.4.2</a>))</li>
<li>libgcrypt (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=b767dc1170eb479b9a311cca4074c58e4eedaf0b;hb=aa1610866f8e42bdc272584f0a717f32ee050a22">1.10.3</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=c9a239615f8070427a96688b1be40a81e59e9b8a;hb=1c5cbacf3d88dded5063e959ee68678ff7d0fa56">1.10.2</a>, <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=03132c2a115e35783a782c64777cf5f5b1a2825f;hb=ae0e567820c37f9640440b3cff77d7c185aa6742">1.10.1</a>))</li>
<li>libgpg-error (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=8ac4bf36113fe9254a361e2bc8d0ed52383839ce;hb=faed9c271ad22bbd2ed265d8e11badb53b7a2f32">1.49</a> (includes <a href="https://dev.gnupg.org/T6231">1.47</a>, <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=14b0ba97d6ba2b10b3178f2e4a3e24bfc2355bb3;hb=ea031873aa9642831017937fd33e9009d514ee07">1.46</a>))</li>
<li>libidn2 (<a href="https://gitlab.com/libidn/libidn2/-/blob/v2.3.7/NEWS">2.3.7</a> (includes <a href="https://gitlab.com/libidn/libidn2/-/releases/v2.3.4">2.3.4</a>))</li>
<li>libksba (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=3d2d5a47688bb6214efaf02f5ab29f6e64433a97;hb=b14e68b97df754b2bb7a90bb904d143d8e896afb">1.6.7</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=48b42025773e88fbb78d015d1f154fef4c80ef9f;hb=5b220df6f8216a9d5f6139c7b17f075374a27480">1.6.6</a>, <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=369cfb5d91bf232685a6c5b156453a624e11ed67;hb=7b3e4785e54280d1a13c5bc839bdc6722d898ac7">1.6.5</a>, <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=f640523209c1c9ce9855040e53914a79d24d6a67;hb=557999424ebd13e70d6fc17e648a5dd2a06f440b">1.6.4</a>))</li>
<li>liblinear (246)</li>
<li>libmd (<a href="https://git.hadrons.org/cgit/libmd.git/log/?h=1.1.0">1.1.0</a>)</li>
<li>libmicrohttpd (<a href="https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00005.html">1.0.1</a> (includes <a href="https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00000.html">1.0.0</a>, <a href="https://gitlab.com/libmicrohttpd/libmicrohttpd/-/releases/v0.9.77">0.9.77</a>, <a href="https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html">0.9.76</a>))</li>
<li>libmnl (<a href="https://git.netfilter.org/libmnl/log/?h=libmnl-1.0.5">1.0.5</a>)</li>
<li>libnetfilter_conntrack (<a href="https://git.netfilter.org/libnetfilter_conntrack/log/?h=libnetfilter_conntrack-1.0.9">1.0.9</a>)</li>
<li>libnetfilter_cthelper (<a href="https://git.netfilter.org/libnetfilter_cthelper/log/?id=8cee0347cc6969c39bb64000dfaa676a8f9e30f0">1.0.1</a>)</li>
<li>libnetfilter_cttimeout (<a href="https://git.netfilter.org/libnetfilter_cttimeout/log/?id=068d36d6291f53a0a609ab1f695aa06e94ce3d30">1.0.1</a>)</li>
<li>libnfnetlink (<a href="https://git.netfilter.org/libnfnetlink/log/?h=libnfnetlink-1.0.2">1.0.2</a>)</li>
<li>libnftnl (<a href="https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.6">1.2.6</a> (includes <a href="https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.5">1.2.5</a>))</li>
<li>libnl (<a href="http://lists.infradead.org/pipermail/libnl/2023-December/002436.html">3.9.0</a> (includes <a href="https://github.com/thom311/libnl/compare/libnl3_7_0...libnl3_8_0">3.8.0</a>))</li>
<li>libnsl (<a href="https://github.com/thkukuk/libnsl/releases/tag/v2.0.1">2.0.1</a>)</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.9">1.9</a> (includes <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.8">1.8</a>, <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.7.1">1.7.1</a>, <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.7">1.7</a>, <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.5">1.5</a>))</li>
<li>libpcap (<a href="https://github.com/the-tcpdump-group/libpcap/blob/24832dd2728bd95ed9b9464ef27b47a943c38003/CHANGES#L51">1.10.4</a> (includes <a href="https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.3:/CHANGES">1.10.3</a>, <a href="https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.2:/CHANGES">1.10.2</a>))</li>
<li>libpcre (8.45)</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.43/NEWS">10.43</a> (includes <a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.42/NEWS">10.42</a>))</li>
<li>libpipeline (<a href="https://gitlab.com/libpipeline/libpipeline/-/tags/1.5.7">1.5.7</a>)</li>
<li>libpng (<a href="https://github.com/pnggroup/libpng/blob/v1.6.43/ANNOUNCE">1.6.43</a> (includes <a href="https://github.com/pnggroup/libpng/blob/v1.6.42/ANNOUNCE">1.6.42</a>, <a href="https://github.com/pnggroup/libpng/blob/v1.6.41/ANNOUNCE">1.6.41</a>))</li>
<li>libpsl (<a href="https://github.com/rockdaboot/libpsl/blob/0.21.5/NEWS">0.21.5</a>)</li>
<li>libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.5">2.5.5</a>)</li>
<li>libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>libsemanage (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>libsodium (<a href="https://github.com/jedisct1/libsodium/releases/tag/1.0.19-RELEASE">1.0.19</a>)</li>
<li>libtirpc (<a href="https://marc.info/?l=linux-nfs&amp;m=169667640909830&amp;w=2">1.3.4</a>)</li>
<li>libunistring (<a href="https://savannah.gnu.org/news/?id=10599">1.2</a> (includes <a href="https://git.savannah.gnu.org/gitweb/?p=libunistring.git;a=blob;f=NEWS;h=5a43ddd7011d62a952733f6c0b7ad52aa4f385c7;hb=8006860b710aae2e8442088c3ddc7d819dfa8ac7">1.1</a>))</li>
<li>libunwind (<a href="https://github.com/libunwind/libunwind/releases/tag/v1.8.1">1.8.1</a> (includes <a href="https://github.com/libunwind/libunwind/releases/tag/v1.8.0">1.8.0</a>, <a href="https://github.com/libunwind/libunwind/releases/tag/v1.7.2">1.7.2</a>, <a href="https://github.com/libunwind/libunwind/releases/tag/v1.7.0">1.7.0</a>))</li>
<li>liburing (<a href="https://github.com/axboe/liburing/blob/liburing-2.3/CHANGELOG">2.3</a>)</li>
<li>libusb (<a href="https://github.com/libusb/libusb/blob/v1.0.27/ChangeLog">1.0.27</a> (includes <a href="https://github.com/libusb/libusb/blob/v1.0.26/ChangeLog">1.0.26</a>))</li>
<li>libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.48.0">1.48.0</a> (includes <a href="https://github.com/libuv/libuv/releases/tag/v1.47.0">1.47.0</a>, <a href="https://github.com/libuv/libuv/releases/tag/v1.46.0">1.46.0</a>, <a href="https://github.com/libuv/libuv/releases/tag/v1.45.0">1.45.0</a>))</li>
<li>libverto (<a href="https://github.com/latchset/libverto/releases/tag/0.3.2">0.3.2</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7">2.12.7</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.6">2.12.6</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.5">2.12.5</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.12.4/NEWS">2.12.4</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.5">2.11.5</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4">2.11.4</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.4">2.10.4</a>))</li>
<li>libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.39">1.1.39</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.38">1.1.38</a>))</li>
<li>linux-pam (<a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.5.3">1.5.3</a>)</li>
<li>lshw (<a href="https://www.ezix.org/project/wiki/HardwareLiSter#Changes">02.20.2b</a>)</li>
<li>lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.99.3">4.99.3</a> (includes <a href="https://github.com/lsof-org/lsof/releases/tag/4.99.2">4.99.2</a>, <a href="https://github.com/lsof-org/lsof/releases/tag/4.99.1">4.99.1</a>, <a href="https://github.com/lsof-org/lsof/blob/4.99.0/00DIST#L5523">4.99.0</a>, <a href="https://github.com/lsof-org/lsof/blob/4.98.0/00DIST#L5471">4.98.0</a>))</li>
<li>lua (<a href="https://www.lua.org/manual/5.4/readme.html#changes">5.4.6</a> (includes <a href="https://www.lua.org/manual/5.4/readme.html#changes">5.4.4</a>))</li>
<li>lz4 (<a href="https://github.com/lz4/lz4/releases/tag/v1.10.0">1.10.0</a> (includes <a href="https://github.com/lz4/lz4/releases/tag/v1.9.4">1.9.4</a>))</li>
<li>mime-types (<a href="https://pagure.io/mailcap/blob/9699055a1b4dfb90f7594ee2e8dda705fa56d3b8/f/NEWS">2.1.54</a>)</li>
<li>mit-krb5 (<a href="https://web.mit.edu/kerberos/krb5-1.21/README-1.21.3.txt">1.21.3</a> (includes <a href="http://web.mit.edu/kerberos/krb5-1.21/">1.21.2</a>))</li>
<li>mpc (<a href="https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00049.html">1.3.1</a> (includes <a href="https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00028.html">1.3.0</a>))</li>
<li>mpfr (<a href="https://gitlab.inria.fr/mpfr/mpfr/-/blob/4.2.1/NEWS">4.2.1</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/blob/0.9.8/NEWS.md">0.9.8</a> (includes <a href="https://github.com/opensvc/multipath-tools/commits/0.9.7">0.9.7</a>, <a href="https://github.com/opensvc/multipath-tools/commits/0.9.5">0.9.5</a>, <a href="https://github.com/opensvc/multipath-tools/commits/0.9.4">0.9.4</a>))</li>
<li>ncurses (<a href="https://invisible-island.net/ncurses/announce.html#h2-release-notes">6.4</a>)</li>
<li>nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/blob/nettle_3.9.1_release_20230601/ChangeLog">3.9.1</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.62.1">1.62.1</a> (includes <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.61.0">1.61.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.60.0">1.60.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.59.0">1.59.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.58.0">1.58.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0">1.57.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.56.0">1.56.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.55.1">1.55.1</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.55.0">1.55.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.54.0">1.54.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.53.0">1.53.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0">1.52.0</a>))</li>
<li>nmap (<a href="https://nmap.org/changelog.html#7.95">7.95</a> (includes <a href="https://nmap.org/changelog.html#7.94">7.94</a>))</li>
<li>npth (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=c1b631b4294eabfef29baefd60e1b0dfecce710d;hb=75c68399ef3bbb5d024f2a60474a7214fa479016">1.7</a>)</li>
<li>nspr (<a href="https://hg.mozilla.org/projects/nspr/log/b563bfc16c887c48b038b7b441fcc4e40a126d3b">4.35</a>)</li>
<li>ntp (<a href="https://www.ntp.org/support/securitynotice/4_2_8p17-release-announcement/">4.2.8p17</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-104-05/index.html">535.104.05</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9.1">2.9.1</a> (includes <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9">2.9</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.8">2.8</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7.1">2.7.1</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7">2.7</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/2.6">2.6</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.5">2.5</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.3">2.3</a>))</li>
<li>open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.10">2.1.10</a>)</li>
<li>open-isns (<a href="https://github.com/open-iscsi/open-isns/blob/v0.102/ChangeLog">0.102</a>)</li>
<li>openldap (<a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_4/CHANGES">2.6.4</a> (includes <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FQJM2JSSSOMLQH7XC7Q5IZJYOGCTV2LK/">2.6.3</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/IHS5V46H6NFNFUERMC6AWMPHTWRVNLFA/">2.6</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/TZQHR4SIWUA5BZTKDAKSFDOOGDVU4TU7/">2.5.14</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/BH3VDPG6IYYF5L5U6LZGHHKMJY5HFA3L/">2.5</a>))</li>
<li>openssh (<a href="https://www.openssh.com/txt/release-9.7">9.7_p1</a> (includes <a href="https://www.openssh.com/releasenotes.html#9.6p1">9.6p1</a>, <a href="https://www.openssh.com/releasenotes.html#9.5p1">9.5p1</a>, <a href="https://www.openssh.com/releasenotes.html#9.4p1">9.4p1</a>, <a href="http://www.openssh.com/releasenotes.html#9.3">9.3</a>, <a href="http://www.openssh.com/releasenotes.html#9.2">9.2</a>))</li>
<li>openssl (<a href="https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32">3.2.3</a> (includes <a href="https://github.com/openssl/openssl/blob/openssl-3.2.1/CHANGES.md">3.2.1</a>, <a href="https://github.com/openssl/openssl/blob/openssl-3.0.12/NEWS.md#major-changes-between-openssl-3011-and-openssl-3012-24-oct-2023">3.0.12</a>, <a href="https://github.com/openssl/openssl/blob/openssl-3.0.9/NEWS.md#major-changes-between-openssl-308-and-openssl-309-30-may-2023">3.0.9</a>, <a href="https://github.com/openssl/openssl/blob/openssl-3.0.8/NEWS.md#major-changes-between-openssl-307-and-openssl-308-7-feb-2023">3.0.8</a>))</li>
<li>parted (<a href="https://git.savannah.gnu.org/gitweb/?p=parted.git;a=blob;f=NEWS;h=52bb11697039f70e55120c571750f9ee761a75aa;hb=3b5f327b213d21e9adb9ba933c78dd898fee5b1d">3.6</a>)</li>
<li>pax-utils (<a href="https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.7">1.3.7</a>)</li>
<li>pciutils (<a href="https://github.com/pciutils/pciutils/blob/v3.13.0/ChangeLog">3.13.0</a> (includes <a href="https://github.com/pciutils/pciutils/blob/v3.12.0/ChangeLog">3.12.0</a>, <a href="https://github.com/pciutils/pciutils/blob/v3.10.0/ChangeLog">3.10.0</a>, <a href="https://github.com/pciutils/pciutils/releases/tag/v3.9.0">3.9.0</a>))</li>
<li>pigz (<a href="https://zlib.net/pipermail/pigz-announce_zlib.net/2023-August/000018.html">2.8</a>)</li>
<li>pinentry (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=c080b34e57d01a6ccca9d2996d7096c42b1a3f84;hb=8ab1682e80a2b4185ee9ef66cbb44340245966fc">1.2.1</a>)</li>
<li>policycoreutils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>popt (<a href="https://github.com/rpm-software-management/popt/releases/tag/popt-1.19-release">1.19</a>)</li>
<li>procps (<a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.4">4.0.4</a> (includes <a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.3">4.0.3</a>, <a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.0">4.0.0</a>))</li>
<li>protobuf (<a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.12">21.12</a> (includes <a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.11">21.11</a>, <a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.10">21.10</a>, <a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.9">21.9</a>))</li>
<li>psmisc (<a href="https://gitlab.com/psmisc/psmisc/-/blob/v23.6/ChangeLog">23.6</a>)</li>
<li>qemu-guest-agent (<a href="https://wiki.qemu.org/ChangeLog/8.2#Guest_agent">8.2.0</a> (includes <a href="https://wiki.qemu.org/ChangeLog/8.0#Guest_agent">8.0.3</a>, <a href="https://wiki.qemu.org/ChangeLog/8.0#Guest_agent">8.0.0</a>, <a href="https://wiki.qemu.org/ChangeLog/7.1#Guest_agent">7.1.0</a>))</li>
<li>quota (<a href="https://sourceforge.net/p/linuxquota/code/ci/87d2fd7635e4bca54fa2a00b8d5b073ba9ca521b/tree/Changelog">4.09</a>)</li>
<li>readline (<a href="https://git.savannah.gnu.org/cgit/readline.git/log/?id=bfe9c573a9e376323929c80b2b71c59727fab0cc">8.2_p7</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2022-09/msg00013.html">8.2</a>))</li>
<li>rpcsvc-proto (<a href="https://github.com/thkukuk/rpcsvc-proto/releases/tag/v1.4.4">1.4.4</a>)</li>
<li>rsync (<a href="https://github.com/RsyncProject/rsync/blob/v3.3.0/NEWS.md">3.3.0</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.13">1.1.13</a> (includes <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.12">1.1.12</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.9">1.1.9</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.8">1.1.8</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.7">1.1.7</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.5">1.1.5</a>))</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.18.9.html">4.18.9</a> (includes <a href="https://www.samba.org/samba/history/samba-4.18.8.html">4.18.8</a>, <a href="https://wiki.samba.org/index.php/Samba_4.18_Features_added/changed#Samba_4.18.4">4.18.4</a>))</li>
<li>sed (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html">4.9</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html">4.9</a>))</li>
<li>selinux-base (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a> (includes <a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>))</li>
<li>selinux-base-policy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a> (includes <a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>))</li>
<li>selinux-container (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a> (includes <a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>))</li>
<li>selinux-dbus (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-refpolicy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240226">2.20240226</a>)</li>
<li>selinux-sssd (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a> (includes <a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>))</li>
<li>selinux-unconfined (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a> (includes <a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>))</li>
<li>semodule-utils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>shim (<a href="https://github.com/rhboot/shim/releases/tag/15.8">15.8</a>)</li>
<li>smartmontools (<a href="https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_3">7.3</a>)</li>
<li>socat (<a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.4:/CHANGES">1.7.4.4</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_46_0.html">3.46.0</a> (includes <a href="https://www.sqlite.org/releaselog/3_45_3.html">3.45.3</a>, <a href="https://www.sqlite.org/releaselog/3_45_1.html">3.45.1</a>, <a href="https://www.sqlite.org/releaselog/3_44_2.html">3.44.2</a>, <a href="https://www.sqlite.org/releaselog/3_43_2.html">3.43.2</a>, <a href="https://sqlite.org/releaselog/3_42_0.html">3.42.0</a>, <a href="https://sqlite.org/releaselog/3_41_2.html">3.41.2</a>))</li>
<li>squashfs-tools (<a href="https://github.com/plougher/squashfs-tools/releases/tag/4.6.1">4.6.1</a> (includes <a href="https://github.com/plougher/squashfs-tools/releases/tag/4.6">4.6</a>))</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.9">6.9</a> (includes <a href="https://github.com/strace/strace/releases/tag/v6.6">6.6</a>, <a href="https://github.com/strace/strace/releases/tag/v6.4">6.4</a>, <a href="https://github.com/strace/strace/releases/tag/v6.3">6.3</a>, <a href="https://github.com/strace/strace/releases/tag/v6.2">6.2</a>, <a href="https://github.com/strace/strace/releases/tag/v6.1">6.1</a>))</li>
<li>sudo (<a href="https://www.sudo.ws/releases/stable/#1.9.15p5">1.9.15p5</a> (includes <a href="https://www.sudo.ws/releases/stable/#1.9.13p3">1.9.13p3</a>))</li>
<li>sysext-docker: docker (<a href="https://docs.docker.com/engine/release-notes/26.1/#2610">26.1.0</a> (includes <a href="https://docs.docker.com/engine/release-notes/25.0/">25.0</a>, <a href="https://github.com/moby/moby/releases/tag/v24.0.9">24.0.9</a>, <a href="https://docs.docker.com/engine/release-notes/24.0/">24.0.6</a>, <a href="https://docs.docker.com/engine/release-notes/23.0/">23.0</a>, <a href="https://docs.docker.com/engine/release-notes/20.10/#201024">20.10.24</a>))</li>
<li>sysext-podman: aardvark-dns (<a href="https://github.com/containers/aardvark-dns/releases/tag/v1.11.0">1.11.0</a>)</li>
<li>sysext-podman: containers-common (<a href="https://github.com/containers/common/releases/tag/v0.59.1">0.59.1</a>)</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.0.3">5.0.3</a>)</li>
<li>sysext-python: jaraco-text (<a href="https://github.com/jaraco/jaraco.text/compare/v3.12.0...v3.12.1">3.12.1</a>)</li>
<li>sysext-python: more-itertools (<a href="https://github.com/more-itertools/more-itertools/releases/tag/v10.4.0">10.4.0</a>)</li>
<li>sysext-python: pip (<a href="https://github.com/pypa/pip/blob/24.2/NEWS.rst">24.2</a> (includes <a href="https://github.com/pypa/pip/blob/24.1.2/NEWS.rst">24.1.2</a>))</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v72.1.0/NEWS.rst">72.1.0</a> (includes <a href="https://github.com/pypa/setuptools/blob/v71.1.0/NEWS.rst">71.1.0</a>, <a href="https://github.com/pypa/setuptools/blob/v71.0.0/NEWS.rst">71.0.0</a>, <a href="https://github.com/pypa/setuptools/blob/v70.3.0/NEWS.rst">70.3.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v70-1-1">70.1.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v70-1-0">70.1.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v70-0-0">70.0.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-5-1">69.5.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-5-0">69.5.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-2">69.4.2</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-1">69.4.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-0">69.4.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-3-1">69.3.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-3-0">69.3.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-2-0">69.2.0</a>))</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/compare/2024.5.22...2024.7.2">2024.7.2</a>)</li>
<li>sysext-python: wheel (<a href="https://github.com/pypa/wheel/releases/tag/0.44.0">0.44.0</a>)</li>
<li>sysext-zfs: zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.5">2.2.5</a> (includes <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.4">2.2.4</a>))</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/commits/v255.8/">255.8</a> (includes <a href="https://github.com/systemd/systemd-stable/commits/v255.4/">255.4</a>, <a href="https://github.com/systemd/systemd-stable/releases/tag/v255.3">255.3</a>))</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/791e2817e13182344447590313f7e372a27c1d48">2.4.1</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/5224ed98eeba43f22b5f5f87de5947fbb1c1c7c1">2.4.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/0189ccf9fc3d2a77cc83cffe180e307bcdccebb4">2.3.4</a>))</li>
<li>tar (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html">1.35</a>)</li>
<li>tcpdump (<a href="https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.4/CHANGES">4.99.4</a>)</li>
<li>tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/b649c7d3c2b1e13e900c80ff7a20959a70b1c528">1.4.9</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/eab796a4f9172e602dc262f3c99ead35b35929e7">1.4.8</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/27ceb1c3ad786386e746a5e2968780d791393b9e">1.4.7</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/1c776e54cf33b46b2ed73263f093d596a0cdbb2f">1.4.6</a>))</li>
<li>tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/6a80d170bca0c938f78ab12e37481b52792a9d83">0.15.0</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/d80f28b081e515e32a480daf80b42cf782447a9c">0.14.1</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/3c6d28ebae27dba8e40558ae37ae8138ea0b4bdc">0.14.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/63d4db63feda920c8020f8484a8b31065b7f1380">0.13.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/53692735c733d01acbd953641f831a1f5e0cf6c5">0.12.1</a>))</li>
<li>thin-provisioning-tools (<a href="https://github.com/jthornber/thin-provisioning-tools/commits/v1.0.10/">1.0.10</a> (includes <a href="https://github.com/jthornber/thin-provisioning-tools/blob/v1.0.6/CHANGES">1.0.6</a>))</li>
<li>tpm2-tools (<a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7">5.7</a> (includes <a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6.1">5.6.1</a>, <a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6">5.6</a>))</li>
<li>tpm2-tss (<a href="https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.3">4.1.3</a> (includes <a href="https://github.com/tpm2-software/tpm2-tss/releases/tag/4.0.2">4.0.2</a>))</li>
<li>traceroute (<a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.5/">2.1.5</a> (includes <a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute%202.1.4/">2.1.4</a>, <a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/">2.1.3</a>, 2.1.1))</li>
<li>usbutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v017">017</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v016">016</a>, <a href="https://github.com/gregkh/usbutils/blob/79b796f945ea7d5c2b0e2a74f9b8819cb7948680/NEWS">015</a>))</li>
<li>userspace-rcu (<a href="https://github.com/urcu/userspace-rcu/blob/v0.13.2/ChangeLog">0.14.0</a>)</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/blob/v2.39.4/Documentation/releases/v2.39.4-ReleaseNotes">2.39.4</a> (includes <a href="https://github.com/util-linux/util-linux/blob/v2.39.3/Documentation/releases/v2.39.3-ReleaseNotes">2.39.3</a>, <a href="https://github.com/util-linux/util-linux/blob/v2.39.2/Documentation/releases/v2.39.2-ReleaseNotes">2.39.2</a>, <a href="https://github.com/util-linux/util-linux/releases/tag/v2.38.1">2.38.1</a>))</li>
<li>vim (<a href="https://github.com/vim/vim/commits/v9.1.0366/">9.1.0366</a> (includes <a href="https://www.vim.org/vim-9.1-released.php">9.1</a>, <a href="https://github.com/vim/vim/commits/v9.0.2167/">9.0.2167</a>, <a href="https://github.com/vim/vim/commits/v9.0.2092/">9.0.2092</a>, <a href="https://github.com/vim/vim/commits/v9.0.1678">9.0.1678</a>, <a href="https://github.com/vim/vim/commits/v9.0.1677">9.0.1677</a>, <a href="https://github.com/vim/vim/commits/v9.0.1503">9.0.1503</a>, <a href="https://github.com/vim/vim/releases/tag/v9.0.1403">9.0.1403</a>, <a href="https://github.com/vim/vim/releases/tag/v9.0.1363">9.0.1363</a>))</li>
<li>VMWare: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.5">12.4.5</a> (includes <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.0">12.4.0</a>, <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.0">12.2.0</a>))</li>
<li>wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00002.html">1.24.5</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00003.html">1.21.4</a>))</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.21/debian/changelog">5.5.21</a> (includes <a href="https://github.com/rfc1036/whois/blob/v5.5.20/debian/changelog">5.5.20</a>, <a href="https://github.com/rfc1036/whois/blob/v5.5.18/debian/changelog">5.5.18</a>, <a href="https://github.com/rfc1036/whois/commit/bac7108b01cfd54c517444efa1239e10e6edd5a4">5.5.17</a>))</li>
<li>xfsprogs (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.8.0">6.8.0</a> (includes <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.6.0">6.6.0</a>, <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.4.0">6.4.0</a>, <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.3.0">6.3.0</a>))</li>
<li>xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.3">1.3.3</a> (includes <a href="https://github.com/lsh123/xmlsec/releases/tag/xmlsec_1_3_2">1.3.2</a>))</li>
<li>xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.6.2">5.6.2</a> (includes <a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.6">5.4.6</a>, <a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.5">5.4.5</a>, <a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=2f4d35adca6198671434d2988803cc9316ad1ec8;hb=dbb3a536ed9873ffa0870321f6873e564c6a9da8">5.4.3</a>, <a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.2">5.4.2</a>))</li>
<li>zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.3">2.2.3</a>)</li>
<li>zlib (<a href="https://github.com/madler/zlib/releases/tag/v1.3.1">1.3.1</a> (includes <a href="https://github.com/madler/zlib/releases/tag/v1.3">1.3</a>))</li>
<li>zstd (<a href="https://github.com/facebook/zstd/releases/tag/v1.5.6">1.5.6</a> (includes <a href="https://github.com/facebook/zstd/releases/tag/v1.5.5">1.5.5</a>, <a href="https://github.com/facebook/zstd/releases/tag/v1.5.4">1.5.4</a>, <a href="https://github.com/facebook/zstd/releases/tag/v1.5.2">1.5.2</a>, <a href="https://github.com/facebook/zstd/releases/tag/v1.5.1">1.5.1</a>, <a href="https://github.com/facebook/zstd/releases/tag/v1.5.0">1.5.0</a>))</li>
</ul>
<p><em>Changes since <strong>Stable 4081.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23128">CVE-2025-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23125">CVE-2025-23125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48875">CVE-2024-48875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41935">CVE-2024-41935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56785">CVE-2024-56785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56781">CVE-2024-56781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56628">CVE-2024-56628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56627">CVE-2024-56627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56626">CVE-2024-56626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56613">CVE-2024-56613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56586">CVE-2024-56586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56585">CVE-2024-56585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56597">CVE-2024-56597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56596">CVE-2024-56596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56595">CVE-2024-56595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56565">CVE-2024-56565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53196">CVE-2024-53196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53687">CVE-2024-53687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53690">CVE-2024-53690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57946">CVE-2024-57946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56766">CVE-2024-56766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56765">CVE-2024-56765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56763">CVE-2024-56763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56762">CVE-2024-56762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56769">CVE-2024-56769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56767">CVE-2024-56767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57938">CVE-2024-57938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57933">CVE-2024-57933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57932">CVE-2024-57932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57930">CVE-2024-57930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57931">CVE-2024-57931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57841">CVE-2024-57841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57802">CVE-2024-57802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57801">CVE-2024-57801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39282">CVE-2024-39282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36476">CVE-2024-36476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57896">CVE-2024-57896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21629">CVE-2025-21629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57903">CVE-2024-57903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57902">CVE-2024-57902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57901">CVE-2024-57901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57900">CVE-2024-57900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57899">CVE-2024-57899</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57897">CVE-2024-57897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57890">CVE-2024-57890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57889">CVE-2024-57889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57887">CVE-2024-57887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57885">CVE-2024-57885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57884">CVE-2024-57884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57895">CVE-2024-57895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57894">CVE-2024-57894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57893">CVE-2024-57893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57892">CVE-2024-57892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57882">CVE-2024-57882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21658">CVE-2025-21658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21656">CVE-2025-21656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57945">CVE-2024-57945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21664">CVE-2025-21664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21663">CVE-2025-21663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21662">CVE-2025-21662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21660">CVE-2025-21660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57939">CVE-2024-57939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57940">CVE-2024-57940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21655">CVE-2025-21655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57913">CVE-2024-57913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57912">CVE-2024-57912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57911">CVE-2024-57911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57910">CVE-2024-57910</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57908">CVE-2024-57908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57907">CVE-2024-57907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57929">CVE-2024-57929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57926">CVE-2024-57926</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57925">CVE-2024-57925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57906">CVE-2024-57906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57922">CVE-2024-57922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57917">CVE-2024-57917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57916">CVE-2024-57916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57915">CVE-2024-57915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57904">CVE-2024-57904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21654">CVE-2025-21654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21653">CVE-2025-21653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21652">CVE-2025-21652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21640">CVE-2025-21640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21639">CVE-2025-21639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21638">CVE-2025-21638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21637">CVE-2025-21637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21636">CVE-2025-21636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21648">CVE-2025-21648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21647">CVE-2025-21647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21646">CVE-2025-21646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21645">CVE-2025-21645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21642">CVE-2025-21642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21631">CVE-2025-21631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21632">CVE-2025-21632</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.74">6.6.74</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.73">6.6.73</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.72">6.6.72</a>, <a href="https://lwn.net/Articles/1004703">6.6.71</a>, <a href="https://lwn.net/Articles/1004551">6.6.70</a>, <a href="https://lwn.net/Articles/1003986">6.6.69</a>, <a href="https://lwn.net/Articles/1003609">6.6.68</a>, <a href="https://lwn.net/Articles/1002919">6.6.67</a>, <a href="https://lwn.net/Articles/1002177">6.6.66</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.74</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.0"/>
    <published>2025-01-30T18:31:43+00:00</published>
  </entry>
</feed>

