<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://www.flatcar.org/</id>
  <title>Flatcar :: lts</title>
  <updated>2026-03-09T16:26:29.042017+00:00</updated>
  <author>
    <name>Flatcar Container Linux</name>
    <email>maintainers@flatcar-linux.org</email>
  </author>
  <link href="https://www.flatcar.org/" rel="self"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <logo>https://www.flatcar.org/media/brand-logo.svg</logo>
  <subtitle>Flatcar Container Linux release feed</subtitle>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.6</id>
    <title>4081.3.6</title>
    <updated>2026-03-09T16:26:29.814707+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.5</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39726">CVE-2025-39726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38670">CVE-2025-38670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38668">CVE-2025-38668</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38666">CVE-2025-38666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38665">CVE-2025-38665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38663">CVE-2025-38663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38671">CVE-2025-38671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38552">CVE-2025-38552</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38520">CVE-2025-38520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39734">CVE-2025-39734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39731">CVE-2025-39731</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38650">CVE-2025-38650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38648">CVE-2025-38648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38646">CVE-2025-38646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38645">CVE-2025-38645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38653">CVE-2025-38653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38652">CVE-2025-38652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38626">CVE-2025-38626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38625">CVE-2025-38625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38624">CVE-2025-38624</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38623">CVE-2025-38623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38622">CVE-2025-38622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38640">CVE-2025-38640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38639">CVE-2025-38639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38635">CVE-2025-38635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38634">CVE-2025-38634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38632">CVE-2025-38632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38630">CVE-2025-38630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38611">CVE-2025-38611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38615">CVE-2025-38615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38612">CVE-2025-38612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38577">CVE-2025-38577</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38583">CVE-2025-38583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38581">CVE-2025-38581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38610">CVE-2025-38610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38609">CVE-2025-38609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38604">CVE-2025-38604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38602">CVE-2025-38602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38601">CVE-2025-38601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38579">CVE-2025-38579</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38590">CVE-2025-38590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38588">CVE-2025-38588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38587">CVE-2025-38587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38578">CVE-2025-38578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38562">CVE-2025-38562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38561">CVE-2025-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38576">CVE-2025-38576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38574">CVE-2025-38574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38569">CVE-2025-38569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38501">CVE-2025-38501</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39798">CVE-2025-39798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39795">CVE-2025-39795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39794">CVE-2025-39794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39773">CVE-2025-39773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39772">CVE-2025-39772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39770">CVE-2025-39770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39788">CVE-2025-39788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39787">CVE-2025-39787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39767">CVE-2025-39767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39783">CVE-2025-39783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39782">CVE-2025-39782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39781">CVE-2025-39781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39776">CVE-2025-39776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39766">CVE-2025-39766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39750">CVE-2025-39750</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39759">CVE-2025-39759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39758">CVE-2025-39758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39756">CVE-2025-39756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39753">CVE-2025-39753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39752">CVE-2025-39752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39763">CVE-2025-39763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39744">CVE-2025-39744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39743">CVE-2025-39743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39739">CVE-2025-39739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39738">CVE-2025-39738</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39749">CVE-2025-39749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39736">CVE-2025-39736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39737">CVE-2025-39737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39711">CVE-2025-39711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39720">CVE-2025-39720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39719">CVE-2025-39719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39716">CVE-2025-39716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39715">CVE-2025-39715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39714">CVE-2025-39714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39713">CVE-2025-39713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39724">CVE-2025-39724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39721">CVE-2025-39721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39675">CVE-2025-39675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39673">CVE-2025-39673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39710">CVE-2025-39710</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39709">CVE-2025-39709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38735">CVE-2025-38735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39706">CVE-2025-39706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39701">CVE-2025-39701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39693">CVE-2025-39693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39692">CVE-2025-39692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39689">CVE-2025-39689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39687">CVE-2025-39687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39686">CVE-2025-39686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39685">CVE-2025-39685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39684">CVE-2025-39684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39683">CVE-2025-39683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39681">CVE-2025-39681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39679">CVE-2025-39679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39676">CVE-2025-39676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38732">CVE-2025-38732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38727">CVE-2025-38727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38728">CVE-2025-38728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38694">CVE-2025-38694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38702">CVE-2025-38702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38701">CVE-2025-38701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38700">CVE-2025-38700</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38699">CVE-2025-38699</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38698">CVE-2025-38698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38725">CVE-2025-38725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38697">CVE-2025-38697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38723">CVE-2025-38723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38721">CVE-2025-38721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38716">CVE-2025-38716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38715">CVE-2025-38715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38714">CVE-2025-38714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38696">CVE-2025-38696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38713">CVE-2025-38713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38712">CVE-2025-38712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38711">CVE-2025-38711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38709">CVE-2025-38709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38708">CVE-2025-38708</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38707">CVE-2025-38707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38695">CVE-2025-38695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38688">CVE-2025-38688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38687">CVE-2025-38687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38683">CVE-2025-38683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38681">CVE-2025-38681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38693">CVE-2025-38693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38692">CVE-2025-38692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38691">CVE-2025-38691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38679">CVE-2025-38679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38680">CVE-2025-38680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38677">CVE-2025-38677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.106">6.6.106</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.105">6.6.105</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.104">6.6.104</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.103">6.6.103</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.102">6.6.102</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.101">6.6.101</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115_1.html">3.115.1</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115.html">3.115</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.106</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.6"/>
    <published>2025-09-15T14:03:10+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.5</id>
    <title>4081.3.5</title>
    <updated>2026-03-09T16:26:29.806041+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.4</strong></em></p>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.100">6.6.100</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.99">6.6.99</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.98">6.6.98</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.97">6.6.97</a>, <a href="https://lwn.net/Articles/1028829/">6.6.96</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html">3.114</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html">3.113.1</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.100</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.5"/>
    <published>2025-08-19T13:10:36+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.4</id>
    <title>4081.3.4</title>
    <updated>2026-03-09T16:26:29.785874+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.3</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37989">CVE-2025-37989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37988">CVE-2025-37988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37985">CVE-2025-37985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37983">CVE-2025-37983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37938">CVE-2025-37938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37885">CVE-2025-37885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37884">CVE-2025-37884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37883">CVE-2025-37883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37881">CVE-2025-37881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37879">CVE-2025-37879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37878">CVE-2025-37878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37887">CVE-2025-37887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37886">CVE-2025-37886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37836">CVE-2025-37836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37831">CVE-2025-37831</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37830">CVE-2025-37830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37829">CVE-2025-37829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37828">CVE-2025-37828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37824">CVE-2025-37824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37808">CVE-2025-37808</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37805">CVE-2025-37805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37804">CVE-2025-37804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37803">CVE-2025-37803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37820">CVE-2025-37820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37819">CVE-2025-37819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37818">CVE-2025-37818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37817">CVE-2025-37817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37815">CVE-2025-37815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37813">CVE-2025-37813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37812">CVE-2025-37812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37811">CVE-2025-37811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37810">CVE-2025-37810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37800">CVE-2025-37800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37801">CVE-2025-37801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37799">CVE-2025-37799</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37990">CVE-2025-37990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37991">CVE-2025-37991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37917">CVE-2025-37917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37927">CVE-2025-37927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37924">CVE-2025-37924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37923">CVE-2025-37923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37922">CVE-2025-37922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37921">CVE-2025-37921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37936">CVE-2025-37936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37935">CVE-2025-37935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37933">CVE-2025-37933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37932">CVE-2025-37932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37930">CVE-2025-37930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37929">CVE-2025-37929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37928">CVE-2025-37928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37918">CVE-2025-37918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37903">CVE-2025-37903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37901">CVE-2025-37901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37897">CVE-2025-37897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37916">CVE-2025-37916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37915">CVE-2025-37915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37914">CVE-2025-37914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37913">CVE-2025-37913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37912">CVE-2025-37912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37911">CVE-2025-37911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37909">CVE-2025-37909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37905">CVE-2025-37905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37891">CVE-2025-37891</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37998">CVE-2025-37998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37997">CVE-2025-37997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37995">CVE-2025-37995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37994">CVE-2025-37994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37973">CVE-2025-37973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37972">CVE-2025-37972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37970">CVE-2025-37970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37969">CVE-2025-37969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37964">CVE-2025-37964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37963">CVE-2025-37963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37962">CVE-2025-37962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37961">CVE-2025-37961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37959">CVE-2025-37959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37954">CVE-2025-37954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37953">CVE-2025-37953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37952">CVE-2025-37952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37951">CVE-2025-37951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37949">CVE-2025-37949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37948">CVE-2025-37948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37956">CVE-2025-37956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37947">CVE-2025-37947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38094">CVE-2025-38094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38095">CVE-2025-38095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38015">CVE-2025-38015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38014">CVE-2025-38014</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38013">CVE-2025-38013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38010">CVE-2025-38010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38009">CVE-2025-38009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38027">CVE-2025-38027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38008">CVE-2025-38008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38024">CVE-2025-38024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38023">CVE-2025-38023</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38020">CVE-2025-38020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38019">CVE-2025-38019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38018">CVE-2025-38018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38007">CVE-2025-38007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38006">CVE-2025-38006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38005">CVE-2025-38005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37992">CVE-2025-37992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38097">CVE-2025-38097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38092">CVE-2025-38092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38061">CVE-2025-38061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38059">CVE-2025-38059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38058">CVE-2025-38058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38081">CVE-2025-38081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38080">CVE-2025-38080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38078">CVE-2025-38078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38077">CVE-2025-38077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38074">CVE-2025-38074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38072">CVE-2025-38072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38071">CVE-2025-38071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38068">CVE-2025-38068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38066">CVE-2025-38066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38065">CVE-2025-38065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38063">CVE-2025-38063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38062">CVE-2025-38062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38037">CVE-2025-38037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38035">CVE-2025-38035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38034">CVE-2025-38034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38051">CVE-2025-38051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38031">CVE-2025-38031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38048">CVE-2025-38048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38046">CVE-2025-38046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38045">CVE-2025-38045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38044">CVE-2025-38044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38043">CVE-2025-38043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38040">CVE-2025-38040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38039">CVE-2025-38039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38030">CVE-2025-38030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38003">CVE-2025-38003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38004">CVE-2025-38004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38001">CVE-2025-38001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38174">CVE-2025-38174</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38163">CVE-2025-38163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38170">CVE-2025-38170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38167">CVE-2025-38167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38166">CVE-2025-38166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38165">CVE-2025-38165</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38173">CVE-2025-38173</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38138">CVE-2025-38138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38136">CVE-2025-38136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38135">CVE-2025-38135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38161">CVE-2025-38161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38160">CVE-2025-38160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38158">CVE-2025-38158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38157">CVE-2025-38157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38155">CVE-2025-38155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38154">CVE-2025-38154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38153">CVE-2025-38153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38151">CVE-2025-38151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38149">CVE-2025-38149</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38148">CVE-2025-38148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38147">CVE-2025-38147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38146">CVE-2025-38146</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38145">CVE-2025-38145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38143">CVE-2025-38143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38142">CVE-2025-38142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38131">CVE-2025-38131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38110">CVE-2025-38110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38109">CVE-2025-38109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38108">CVE-2025-38108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38107">CVE-2025-38107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38103">CVE-2025-38103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38127">CVE-2025-38127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38126">CVE-2025-38126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38124">CVE-2025-38124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38123">CVE-2025-38123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38122">CVE-2025-38122</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38102">CVE-2025-38102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38120">CVE-2025-38120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38119">CVE-2025-38119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38118">CVE-2025-38118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38117">CVE-2025-38117</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38115">CVE-2025-38115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38113">CVE-2025-38113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38112">CVE-2025-38112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38111">CVE-2025-38111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38100">CVE-2025-38100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38088">CVE-2025-38088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38083">CVE-2025-38083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38219">CVE-2025-38219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38218">CVE-2025-38218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38217">CVE-2025-38217</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38215">CVE-2025-38215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38214">CVE-2025-38214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38231">CVE-2025-38231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38212">CVE-2025-38212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38229">CVE-2025-38229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38227">CVE-2025-38227</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38226">CVE-2025-38226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38225">CVE-2025-38225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38222">CVE-2025-38222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38220">CVE-2025-38220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38185">CVE-2025-38185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38183">CVE-2025-38183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38182">CVE-2025-38182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38208">CVE-2025-38208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38202">CVE-2025-38202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38198">CVE-2025-38198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38197">CVE-2025-38197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38195">CVE-2025-38195</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38194">CVE-2025-38194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38193">CVE-2025-38193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38192">CVE-2025-38192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38191">CVE-2025-38191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38190">CVE-2025-38190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38090">CVE-2025-38090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38089">CVE-2025-38089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38087">CVE-2025-38087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38086">CVE-2025-38086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085</a>)</li>
<li>sudo (<a href="https://www.cve.org/CVERecord?id=CVE-2025-32462">CVE-2025-32462</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32463">CVE-2025-32463</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added back some BCC tools (<a href="https://github.com/flatcar/scripts/pull/2900">scripts#2900</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/1027279/">6.6.95</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.94">6.6.94</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.93">6.6.93</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.92">6.6.92</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.91">6.6.91</a>, <a href="https://lwn.net/Articles/1020659/">6.6.90</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.89">6.6.89</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html">3.113</a> (includes(<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html">3.112</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html">3.111</a>))</li>
<li>sudo (<a href="https://www.sudo.ws/releases/stable/#1.9.17p1">1.9.17p1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.95</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.4"/>
    <published>2025-07-08T15:22:02+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.3</id>
    <title>4081.3.3</title>
    <updated>2026-03-09T16:26:29.769332+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21993">CVE-2025-21993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21992">CVE-2025-21992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21991">CVE-2025-21991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21967">CVE-2025-21967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21975">CVE-2025-21975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21971">CVE-2025-21971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21970">CVE-2025-21970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21969">CVE-2025-21969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21986">CVE-2025-21986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21981">CVE-2025-21981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21980">CVE-2025-21980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21979">CVE-2025-21979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21978">CVE-2025-21978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21968">CVE-2025-21968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21962">CVE-2025-21962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21960">CVE-2025-21960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21959">CVE-2025-21959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21957">CVE-2025-21957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21956">CVE-2025-21956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21955">CVE-2025-21955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21966">CVE-2025-21966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21964">CVE-2025-21964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21963">CVE-2025-21963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22015">CVE-2025-22015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22014">CVE-2025-22014</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22013">CVE-2025-22013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22010">CVE-2025-22010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22008">CVE-2025-22008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22009">CVE-2025-22009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22003">CVE-2025-22003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22001">CVE-2025-22001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21999">CVE-2025-21999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21997">CVE-2025-21997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22007">CVE-2025-22007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22005">CVE-2025-22005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21995">CVE-2025-21995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21996">CVE-2025-21996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21994">CVE-2025-21994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22021">CVE-2025-22021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22018">CVE-2025-22018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38575">CVE-2025-38575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38240">CVE-2025-38240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38152">CVE-2025-38152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37893">CVE-2025-37893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39735">CVE-2025-39735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39728">CVE-2025-39728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38637">CVE-2025-38637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23138">CVE-2025-23138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23136">CVE-2025-23136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22066">CVE-2025-22066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22075">CVE-2025-22075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22074">CVE-2025-22074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22073">CVE-2025-22073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22072">CVE-2025-22072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22071">CVE-2025-22071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22095">CVE-2025-22095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22093">CVE-2025-22093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22090">CVE-2025-22090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22089">CVE-2025-22089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22088">CVE-2025-22088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22086">CVE-2025-22086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22083">CVE-2025-22083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22081">CVE-2025-22081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22080">CVE-2025-22080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22079">CVE-2025-22079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22077">CVE-2025-22077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22033">CVE-2025-22033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22042">CVE-2025-22042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22041">CVE-2025-22041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22040">CVE-2025-22040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22038">CVE-2025-22038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22064">CVE-2025-22064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22063">CVE-2025-22063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22060">CVE-2025-22060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22058">CVE-2025-22058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22057">CVE-2025-22057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22054">CVE-2025-22054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22053">CVE-2025-22053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22035">CVE-2025-22035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22050">CVE-2025-22050</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22049">CVE-2025-22049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22048">CVE-2025-22048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22047">CVE-2025-22047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22045">CVE-2025-22045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22044">CVE-2025-22044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22043">CVE-2025-22043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22027">CVE-2025-22027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22025">CVE-2025-22025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22029">CVE-2025-22029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-53034">CVE-2023-53034</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.88">6.6.88</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.87">6.6.87</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.86">6.6.86</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.85">6.6.85</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.84">6.6.84</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html">3.110</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.88</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.3"/>
    <published>2025-05-06T11:36:40+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.2</id>
    <title>4081.3.2</title>
    <updated>2026-03-09T16:26:29.758331+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21835">CVE-2025-21835</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21836">CVE-2025-21836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58086">CVE-2024-58086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21823">CVE-2025-21823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21821">CVE-2025-21821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21787">CVE-2025-21787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21784">CVE-2025-21784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21782">CVE-2025-21782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21783">CVE-2025-21783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21781">CVE-2025-21781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21780">CVE-2025-21780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21796">CVE-2025-21796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21795">CVE-2025-21795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21794">CVE-2025-21794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21793">CVE-2025-21793</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21792">CVE-2025-21792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21790">CVE-2025-21790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21789">CVE-2025-21789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21779">CVE-2025-21779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58020">CVE-2024-58020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57834">CVE-2024-57834</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54458">CVE-2024-54458</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54456">CVE-2024-54456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21776">CVE-2025-21776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21775">CVE-2025-21775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21772">CVE-2025-21772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21773">CVE-2025-21773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21767">CVE-2025-21767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21766">CVE-2025-21766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21763">CVE-2025-21763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21761">CVE-2025-21761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21762">CVE-2025-21762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21760">CVE-2025-21760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21759">CVE-2025-21759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21758">CVE-2025-21758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21704">CVE-2025-21704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21848">CVE-2025-21848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21847">CVE-2025-21847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21846">CVE-2025-21846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21866">CVE-2025-21866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21865">CVE-2025-21865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21864">CVE-2025-21864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21863">CVE-2025-21863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21862">CVE-2025-21862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21844">CVE-2025-21844</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21859">CVE-2025-21859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21858">CVE-2025-21858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21857">CVE-2025-21857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21856">CVE-2025-21856</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21855">CVE-2025-21855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21854">CVE-2025-21854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21853">CVE-2025-21853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58088">CVE-2024-58088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21838">CVE-2025-21838</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. (<a href="https://github.com/flatcar/scripts/pull/2667">flatcar/scripts#2667</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added new image signing pub key to <code>flatcar-install</code>, needed for download verification of releases built from March 2025 onwards, if you have copies of <code>flatcar-install</code> or the image signing pub key, you need to update them as well (<a href="https://github.com/flatcar/init/pull/129">init#129</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83">6.6.83</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79">6.6.79</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80">6.6.80</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81">6.6.81</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82">6.6.82</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html">3.109</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.83</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.2"/>
    <published>2025-03-20T14:07:30+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.1</id>
    <title>4081.3.1</title>
    <updated>2026-03-09T16:26:29.752277+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 4081.3.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26466">CVE-2025-26466</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>openssh(9.7_p1-r7)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.74</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.1"/>
    <published>2025-02-18T15:13:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-4081.3.0</id>
    <title>4081.3.0</title>
    <updated>2026-03-09T16:26:29.643794+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3510.3.6</strong></em></p>
<ul>
<li>Linux (<a href="https://hackmd.io/EN9yZnYFS-ijPvCx8PtObw#New-LTS-2024-Release-408130">Please refer to the Go/No-Go document for the list of CVEs resolved</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24532">CVE-2023-24532</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39320">CVE-2023-39320</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791</a>)</li>
<li>Linux Firmware (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315</a>)</li>
<li>SDK: dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934</a>)</li>
<li>SDK: nasm (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6290">CVE-2019-6290</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6291">CVE-2019-6291</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-8343">CVE-2019-8343</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-21528">CVE-2020-21528</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33450">CVE-2021-33450</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33452">CVE-2021-33452</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44368">CVE-2022-44368</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44369">CVE-2022-44369</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44370">CVE-2022-44370</a>)</li>
<li>SDK: perl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47038">CVE-2023-47038</a>)</li>
<li>SDK: pkgconf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24056">CVE-2023-24056</a>)</li>
<li>SDK: python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41105">CVE-2023-41105</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450</a>,  <a href="https://github.com/python/cpython/issues/81194">gh-81194</a>,  <a href="https://github.com/python/cpython/issues/113659">gh-113659</a>,  <a href="https://github.com/python/cpython/issues/102388">gh-102388</a>,  <a href="https://github.com/python/cpython/issues/114572">gh-114572</a>,  <a href="https://github.com/python/cpython/issues/115243">gh-115243</a>)</li>
<li>SDK: qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0330">CVE-2023-0330</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2861">CVE-2023-2861</a>)</li>
<li>SDK: re2c (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23901">CVE-2022-23901</a>)</li>
<li>SDK: Rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38497">CVE-2023-38497</a>)</li>
<li>VMware: open-vm-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867</a>)</li>
<li>bash (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38533">CVE-2022-38533</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1579">CVE-2023-1579</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2222">CVE-2023-2222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1972">CVE-2023-1972</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25153">CVE-2023-25153</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173</a>)</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html">coreutils-2024-03-28</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0684">CVE-2024-0684</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23914">CVE-2023-23914</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23915">CVE-2023-23915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23916">CVE-2023-23916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27533">CVE-2023-27533</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27534">CVE-2023-27534</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27537">CVE-2023-27537</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27538">CVE-2023-27538</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28319">CVE-2023-28319</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32001">CVE-2023-32001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38039">CVE-2023-38039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46219">CVE-2023-46219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2004">CVE-2024-2004</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2379">CVE-2024-2379</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2466">CVE-2024-2466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6197">CVE-2024-6197</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6874">CVE-2024-6874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264</a>)</li>
<li>dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868</a>)</li>
<li>e2fsprogs (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490</a>)</li>
<li>gcc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465</a>)</li>
<li>glib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4527">CVE-2023-4527</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4806">CVE-2023-4806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4911">CVE-2023-4911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5156">CVE-2023-5156</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6246">CVE-2023-6246</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6779">CVE-2023-6779</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6780">CVE-2023-6780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602</a>)</li>
<li>gnupg (<a href="https://gnupg.org/blog/20240125-smartcard-backup-key.html">gnupg-2024-01-25</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0361">CVE-2023-0361</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835</a>)</li>
<li>grub (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3981">CVE-2021-3981</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28735">CVE-2022-28735</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38090">CVE-2022-38090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855</a>)</li>
<li>less (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-46663">CVE-2022-46663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26256">CVE-2024-26256</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37407">CVE-2024-37407</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.1">libarchive-20230729</a>)</li>
<li>libcap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603</a>)</li>
<li>libmicrohttpd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371</a>)</li>
<li>libtirpc (<a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=4a2d85c64110ee9e21a8c4f9dafd6b0ae621506d">libtirpc-rhbg-2138317</a>,  <a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=f7f0abdf267698de3f74a0285405b1b01f40893b">libtirpc-rhbg-2150611</a>,  <a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1d2e10afb2ffc35cb3623f57a15f712359f18e75">libtirpc-rhbg-2224666</a>)</li>
<li>libuv (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">CVE-2024-34459</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4">libxml2-20230428</a>)</li>
<li>lua (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33099">CVE-2022-33099</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371</a>)</li>
<li>ncurses (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491</a>)</li>
<li>nghttp2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25515">CVE-2023-25515</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25516">CVE-2023-25516</a>)</li>
<li>openldap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953</a>)</li>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25136">CVE-2023-25136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387">CVE-2024-6387</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28531">CVE-2023-28531</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51384">CVE-2023-51384</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4203">CVE-2022-4203</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0216">CVE-2023-0216</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0217">CVE-2023-0217</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0401">CVE-2023-0401</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1255">CVE-2023-1255</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650</a>),  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2975">CVE-2023-2975</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446</a>)</li>
<li>procps (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016</a>)</li>
<li>protobuf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1941">CVE-2022-1941</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626</a>)</li>
<li>samba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1615">CVE-2022-1615</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">CVE-2023-29383</a>)</li>
<li>sudo (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27320">CVE-2023-27320</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28486">CVE-2023-28486</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28487">CVE-2023-28487</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465</a>)</li>
<li>sysext-docker: Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28841">CVE-2023-28841</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28842">CVE-2023-28842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29018">CVE-2024-29018</a>)</li>
<li>sysext-podman: podman (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727</a>)</li>
<li>tar (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28948">CVE-2022-28948</a>)</li>
<li>tpm2-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040">CVE-2024-29040</a>)</li>
<li>traceroute (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0288">CVE-2023-0288</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0433">CVE-2023-0433</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1175">CVE-2023-1175</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1170">CVE-2023-1170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2609">CVE-2023-2609</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2610">CVE-2023-2610</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2426">CVE-2023-2426</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48231">CVE-2023-48231</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48232">CVE-2023-48232</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48233">CVE-2023-48233</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48234">CVE-2023-48234</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48235">CVE-2023-48235</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48236">CVE-2023-48236</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48237">CVE-2023-48237</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48706">CVE-2023-48706</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5344">CVE-2023-5344</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5441">CVE-2023-5441</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5535">CVE-2023-5535</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46246">CVE-2023-46246</a>)</li>
<li>zlib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured that <code>/var/log/journal/</code> is created early enough for systemd-journald to persist the logs on first boot (<a href="https://github.com/flatcar/bootengine/pull/60">bootengine#60</a>, <a href="https://github.com/flatcar/baselayout/pull/29">baselayout#29</a>)</li>
<li>Fixed <code>journalctl --user</code> permission issue (<a href="https://github.com/flatcar/Flatcar/issues/989">Flatcar#989</a>)</li>
<li>Added a workaround for old airgapped/proxied update-engine clients to be able to update to this release (<a href="https://github.com/flatcar/Flatcar/issues/1332">Flatcar#1332</a>, <a href="https://github.com/flatcar/update_engine/pull/38">update_engine#38</a>)</li>
<li>Added AWS EKS support for versions 1.24-1.28. Fixed <code>/usr/share/amazon/eks/download-kubelet.sh</code> to include download paths for these versions. (<a href="https://github.com/flatcar/scripts/pull/1210">scripts#1210</a>)</li>
<li>Added qemu-guest-agent to ARM64 images (<a href="https://github.com/flatcar/Flatcar/issues/1593">flatcar/flatcar#1593</a>)</li>
<li>AWS: Fixed the Amazon SSM agent that was crashing. (<a href="https://github.com/flatcar/Flatcar/issues/1307">Flatcar#1307</a>)</li>
<li>CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: (<a href="https://github.com/flatcar/scripts/pull/2016">flatcar/scripts#2016</a>)- Fixed issue file generation from '/etc/issue.d' (<a href="https://github.com/flatcar/scripts/pull/2018">scripts#2018</a>)</li>
<li>Deleted files in <code>/etc</code> that have a tmpfiles rule that normally would recreate them will now show up again through the <code>/etc</code> lowerdir (<a href="https://github.com/flatcar/Flatcar/issues/1265">Flatcar#1265</a>, <a href="https://github.com/flatcar/bootengine/pull/79">bootengine#79</a>)</li>
<li>Disabled user-configdrive.service on OpenStack when config drive is used, which caused the hostname to be overwritten. The coreos-cloudinit.service unit already runs on OpenStack if the system is not configured via ignition. (<a href="https://github.com/flatcar/Flatcar/issues/1385">Flatcar#1385</a>)</li>
<li>Ensured that the folder <code>/var/log/sssd</code> is created if it doesn't exist, required for <code>sssd.service</code> (<a href="https://github.com/flatcar/Flatcar/issues/1096">Flatcar#1096</a>)</li>
<li>Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found (<a href="https://github.com/flatcar/coreos-cloudinit/pull/25">coreos-cloudinit#25</a>)</li>
<li>Fixed a miscompilation of getfacl causing it to dump core when executed (<a href="https://github.com/flatcar/scripts/pull/809">scripts#809</a>)</li>
<li>Fixed bad usage of gpg that prevented flatcar-install from being used with custom signing keys (<a href="https://github.com/flatcar/flatcar/pull/1471">Flatcar#1471</a>)</li>
<li>Fixed bug in handling renamed network interfaces when generating login issue (<a href="https://github.com/flatcar/init/pull/102">init#102</a>)</li>
<li>Fixed iterating over the OEM update payload signatures which prevented the AWS OEM update to 3745.x.y (<a href="https://github.com/flatcar/update_engine/pull/31">update-engine#31</a>)</li>
<li>Fixed oem-cloudinit.service on Equinix Metal. The availability check now uses the https://metadata.platformequinix.com/metadata endpoint. (<a href="https://github.com/flatcar/scripts/pull/2222">scripts#2222</a>)</li>
<li>Fixed quotes handling for update-engine (<a href="https://github.com/flatcar/Flatcar/issues/1209">Flatcar#1209</a>)</li>
<li>Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. (<a href="https://github.com/flatcar/flatcar/pull/1514">Flatcar#1514</a>)</li>
<li>Fixed supplying extension update payloads with a custom base URL in Nebraska (<a href="https://github.com/flatcar/Flatcar/issues/1281">Flatcar#1281</a>)</li>
<li>Fixed that systemd-sysext images can extend directories where Flatcar extensions are also shipping files, e.g., that the sysext-bakery Kubernetes extension works when OEM extensions are present (<a href="https://github.com/flatcar/sysext-bakery/issues/50">sysext-bakery#50</a>)</li>
<li>Fixed the handling of OEM update payloads in a Nebraska response with self-hosted packages (<a href="https://github.com/flatcar/ue-rs/pull/49">ue-rs#49</a>)</li>
<li>Fixed the initrd option in the QEMU launcher script. It was -R, but this was already taken by the read-only pflash option, so use -r instead. (<a href="https://github.com/flatcar/scripts/pull/2239">scripts#2239</a>)</li>
<li>Fixed the missing <code>/etc/extensions/</code> symlinks for the inbuilt Docker/containerd systemd-sysext images on update from Beta 3760.1.0 (<a href="https://github.com/flatcar/update_engine/pull/32">update_engine#32</a>)</li>
<li>Fixed the postinstall hook failure when updating from Azure instances without OEM systemd-sysext images to Flatcar Alpha 3745.x.y (<a href="https://github.com/flatcar/update_engine/pull/29">update_engine#29</a>)</li>
<li>Fixes kubevirt vm creation by ensuring that /dev/vhost-net exists (<a href="https://github.com/flatcar/Flatcar/issues/1336">Flatcar#1336</a>)</li>
<li>Fix ownership of systemd units shipped with built-in docker/containerd sysexts. The files shipped on production images were accidentally owned by 1000:1000 instead of 0:0. This uid/gid is not present on Flatcar images but would be assigned to the first created user. Due to contents of sysexts and /usr being readonly on Flatcar, the invalid permissions can't be used to escalate privileges. (<a href="https://github.com/flatcar/scripts/pull/2266">scripts#2266</a>)</li>
<li>Fix the RemainAfterExit clause in nvidia.service (<a href="https://github.com/flatcar/Flatcar/issues/1169">Flatcar#1169</a>)</li>
<li>GCP: Fixed OS Login enabling (<a href="https://github.com/flatcar/scripts/pull/1445">scripts#1445</a>)</li>
<li>Hetzner: Fixed duplicated prefix in the Afterburn metadata (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
<li>Made <code>sshkeys.service</code> more robust to only run <code>coreos-metadata-sshkeys@core.service</code> when not masked and also retry on failure (<a href="https://github.com/flatcar/init/pull/112">init#112</a>)</li>
<li>Removed custom CloudSigma coreos-cloudinit service configuration since it will be called with the cloudsigma oem anyway. The restart of the service can also cause the serial port to be stuck in an nondeterministic state which breaks future runs.</li>
<li>Resolved kmod static nodes creation in bootengine (<a href="https://github.com/flatcar/bootengine/pull/85">bootengine#85</a>)</li>
<li>Restored support for custom OEMs supplied in the PXE boot where <code>/usr/share/oem</code> brings the OEM partition contents (<a href="https://github.com/flatcar/Flatcar/issues/1376">Flatcar#1376</a>)</li>
<li>Restored the reboot warning and delay for non-SSH console sessions (<a href="https://github.com/flatcar/locksmith/pull/21">locksmith#21</a>)</li>
<li>Set TTY used for fetching server_context to RAW mode before running cloudinit on cloudsigma (<a href="https://github.com/flatcar/scripts/pull/1280">scripts#1280</a>)</li>
<li>Worked around a bash regression in <code>flatcar-install</code> and added error reporting for disk write failures (<a href="https://github.com/flatcar/Flatcar/issues/1059">Flatcar#1059</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added a new <code>flatcar-reset</code> tool and boot logic for selective OS resets to reconfigure the system with Ignition while avoiding config drift (<a href="https://github.com/flatcar/bootengine/pull/55">bootengine#55</a>, <a href="https://github.com/flatcar/init/pull/91">init#91</a>)</li>
<li>Added <code>pigz</code> to the image, a parallel gzip implementation, which is useful to speed up the (de)compression for large container image imports/exports (<a href="https://github.com/flatcar/coreos-overlay/pull/2504">coreos-overlay#2504</a>)</li>
<li>Enabled elfutils support in systemd-coredump. A backtrace will now appear in the journal for any program that dumps core (<a href="https://github.com/flatcar/coreos-overlay/pull/2489">coreos-overlay#2489</a>)</li>
<li><code>/etc</code> is now set up as overlayfs with the original <code>/etc</code> folder being the store for changed files/directories and <code>/usr/share/flatcar/etc</code> providing the lower default directory tree (<a href="https://github.com/flatcar/bootengine/pull/53">bootengine#53</a>, <a href="https://github.com/flatcar/scripts/pull/666">scripts#666</a>)</li>
<li>Improved the OS reset tool to offer preview, backup and restore (<a href="https://github.com/flatcar/init/pull/94">init#94</a>)</li>
<li>On boot any files in <code>/etc</code> that are the same as provided by the booted <code>/usr/share/flatcar/etc</code> default for the overlay mount on <code>/etc</code> are deleted to ensure that future updates of <code>/usr/share/flatcar/etc</code> are propagated - to opt out create <code>/etc/.no-dup-update</code> in case you want to keep an unmodified config file as is or because you fear that a future Flatcar version may use the same file as you at which point your copy is cleaned up and any other future Flatcar changes would be applied (<a href="https://github.com/flatcar/bootengine/pull/54">bootengine#54</a>)</li>
<li>Switched systemd log reporting to the combined format of both unit description, as before, and now the unit name to easily find the unit (<a href="https://github.com/flatcar/coreos-overlay/pull/2436">coreos-overlay#2436</a>)</li>
<li>Added zram-generator package to the image (<a href="https://github.com/flatcar/scripts/pull/1772">scripts#1772</a>)</li>
<li>Added Akamai / Linode images (<a href="https://github.com/flatcar/scripts/pull/1806">flatcar/scripts#1806</a>)</li>
<li>Added azure-nvme-utils to the image, which is used by udev to create symlinks for NVMe disks on Azure v6 instances under /dev/disk/azure/. (<a href="https://github.com/flatcar/scripts/pull/1950">scripts#1950</a>)</li>
<li>Added Hetzner images (<a href="https://github.com/flatcar/scripts/pull/1880">flatcar/scripts#1880</a>)</li>
<li>Added Hyper-V VHDX image (<a href="https://github.com/flatcar/scripts/pull/1791">flatcar/scripts#1791</a>)</li>
<li>Added Ignition Clevis support for encrypted disks unlocked with a TPM2 device or a Tang server (<a href="https://github.com/flatcar/scripts/pull/1560">scripts#1560</a>)</li>
<li>Added KubeVirt qcow2 image for amd64/arm64 (<a href="https://github.com/flatcar/scripts/pull/1962">flatcar/scripts#1962</a>)</li>
<li>Added Scaleway images (<a href="https://github.com/flatcar/scripts/pull/1683">flatcar/scripts#1683</a>)</li>
<li>Added support for multipart MIME userdata in coreos-cloudinit. Ignition now detects multipart userdata and delegates execution to coreos-cloudinit. (scripts#873)</li>
<li>Added support for unlocking the rootfs with a TPM set up by systemd-cryptenroll (<a href="https://github.com/flatcar/bootengine/pull/93">bootengine#93</a>)</li>
<li>Added TLS Kernel module (<a href="https://github.com/flatcar/scripts/pull/865">scripts#865</a>)</li>
<li>Add Intel igc driver to support I225/I226 family NICs. (<a href="https://github.com/flatcar/scripts/pull/1786">flatcar/scripts#1786</a>)</li>
<li>A new format <code>qemu_uefi_secure</code> is introduced to test Flatcar for SecureBoot-enabled features. The format will be later merged into <code>qemu_uefi</code>.</li>
<li>As part of the update to Catalyst 4 (used to build the SDK), the coreos package repository has been renamed to coreos-overlay to match its directory name. This will be reflected in package listings and package manager output. (<a href="https://github.com/flatcar/scripts/pull/2115">flatcar/scripts#2115</a>)</li>
<li>AWS OEM images now use a systemd-sysext image for layering additional platform-specific software on top of <code>/usr</code></li>
<li>Azure and QEMU OEM images now use systemd-sysext images for layering additional platform-specific software on top of <code>/usr</code>. For Azure images this also means that the image has a normal Python installation available through the sysext image. The OEM software is still not updated but this will be added soon.</li>
<li>Azure, HyperV: Added daemons <code>kvp</code>, <code>vss</code>, and <code>fcopy</code> for better HyperV hypervisor integration with Flatcar guests (<a href="https://github.com/flatcar/scripts/pull/2309">scripts#2309</a>).</li>
<li>Backported systemd-sysext mutable overlays functionality from yet-unreleased systemd v256. (<a href="https://github.com/flatcar/scripts/pull/1753">flatcar/scripts#1753</a>)</li>
<li>Changed coreos-cloudinit to now set the short hostname instead of the FQDN when fetched from the metadata service (<a href="https://github.com/flatcar/coreos-cloudinit/pull/19">coreos-cloudinit#19</a>)
(<a href="https://docs.docker.com/engine/release-notes/23.0/#bug-fixes-and-enhancements-6">changelog</a>, <a href="https://github.com/moby/moby/pull/42661">upstream pr</a>).</li>
<li>Change nvidia.service to type oneshot (from the default &quot;simple&quot;) so the subsequent services (configured with &quot;Requires/After&quot;) are executed after the driver installation is successfully finished (flatcar/Flatcar#1136)
<ul>
<li>Consequently, <code>update_engine</code> will not perform torcx sanity checks post-update anymore.</li>
</ul>
</li>
<li>cri-tools, runc, containerd, docker, and docker-cli are now built from Gentoo upstream ebuilds. Docker received a major version upgrade - it was updated to Docker 24 (from Docker 20; see “updates”).</li>
<li>Disabled real-time priority for multipathd as it prevents the cgroups2 cpu controller from working. (<a href="https://github.com/flatcar/scripts/pull/1771">flatcar/scripts#1771</a>)
<ul>
<li><strong>Docker will remove the <code>btrfs</code> driver entirely in a future version. Please consider migrating your deployments to the <code>overlay2</code> driver.</strong></li>
</ul>
</li>
<li>Enabled amd-pstate,amd-pstate-epp cpufreq drivers for some AMD CPUs in the kernel. (<a href="https://github.com/flatcar/scripts/pull/1770">flatcar/scripts#1770</a>)</li>
<li>Enabled ntpd by default on AWS &amp; GCP, enabled chronyd by default on Azure. The native time sync source is used on each cloud. (<a href="https://github.com/flatcar/scripts/pull/1792">scripts#1792</a>)</li>
<li>Enabled the GRUB TPM2 module to measure the boot code path and files into PCR 8+9 in UEFI (<a href="https://github.com/flatcar/scripts/pull/1861">scripts#1861</a>)</li>
<li>Enabled the ptp_vmw module in the kernel.</li>
<li>Enabled the virtio GPU driver (<a href="https://github.com/flatcar/scripts/pull/830">scripts#830</a>)</li>
<li>Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers (<a href="https://github.com/flatcar/scripts/pull/2355">flatcar/scripts#2355</a>)</li>
<li>GCP OEM images now use a systemd-sysext image for layering additional platform-specific software on top of <code>/usr</code> and being part of the OEM A/B updates (<a href="https://github.com/flatcar/Flatcar/issues/1146">flatcar#1146</a>)</li>
<li>Hetzner: Added <code>COREOS_HETZNER_PRIVATE_IPV4_0</code> Afterburn attribute for Hetzner private IPs (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
<li>Hyper-V images, both .vhd and .vhdx files are available as <code>zip</code> compressed, switching from <code>bzip2</code> to a built-in available Windows compression - <code>zip</code> (<a href="https://github.com/flatcar/scripts/pull/1878">scripts#1878</a>)</li>
<li>libcrypt is now provided by the libxcrypt library instead of glibc. Glibc libcrypt was deprecated long time ago.</li>
<li>Migrated the NVIDIA installer from the Azure/AWS OEM partition to <code>/usr</code> to make it available on all platforms (<a href="https://github.com/flatcar/scripts/pull/932/">scripts#932</a>, <a href="https://github.com/flatcar/Flatcar/issues/1077">Flatcar#1077</a>)</li>
<li>Migrate to Type=notify in containerd.service. Changed the unit to Type=notify, utilizing the existing containerd support for sd_notify call after socket setup.</li>
<li>Moved a mountpoint of the OEM partition from <code>/usr/share/oem</code> to <code>/oem</code>. <code>/usr/share/oem</code> became a symlink to <code>/oem</code> for backward compatibility. Despite the move, the initrd images providing files through <code>/usr/share/oem</code> should keep using <code>/usr/share/oem</code>. The move was done to enable activating the OEM sysext images that are placed in the OEM partition.
<ul>
<li><strong>NOTE</strong> that if you are already using btrfs-backed Docker storage and are upgrading to this new version, Docker will automatically use the <code>btrfs</code> storage driver for backwards-compatibility with your deployment.</li>
<li><strong>NOTE</strong> The docker btrfs storage driver has been de-prioritised; BTRFS backed storage will now default to the <code>overlay2</code> driver</li>
</ul>
</li>
<li>OEM vendor tools are now A/B updated if they are shipped as systemd-sysext images, the migration happens when both partitions require a systemd-sysext OEM image - note that this will delete the <code>nvidia.service</code> from <code>/etc</code> on Azure because it's now part of <code>/usr</code> (<a href="https://github.com/flatcar/Flatcar/issues/60">Flatcar#60</a>)</li>
<li>OpenStack, Brightbox: Added the <code>flatcar.autologin</code> kernel cmdline parameter by default as the hypervisor manages access to the console (<a href="https://github.com/flatcar/scripts/pull/1866">scripts#1866</a>)</li>
<li>Provided a Podman Flatcar extension as optional systemd-sysext image with the release. Write 'podman' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning (<a href="https://github.com/flatcar/scripts/pull/1964">scripts#1964</a>)</li>
<li>Provided a Python Flatcar extension as optional systemd-sysext image with the release. Write 'python' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning (<a href="https://github.com/flatcar/scripts/pull/1979">scripts#1979</a>)</li>
<li>OpenStack: Changed metadata hostname source order. The service first tries with the config drive then fallback on the metadata service. (<a href="https://github.com/flatcar/bootengine/pull/96">bootengine#96</a>)</li>
<li>Provided a ZFS-2.2.2 Flatcar extension as optional systemd-sysext image with the release. Write 'zfs' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning. ZFS support is experimental and ZFS is not supported for the root partition. (<a href="https://github.com/flatcar/scripts/pull/1742">flatcar/scripts#1742</a>)
<ul>
<li>Relevant changes: <a href="https://github.com/flatcar/scripts/pull/1216">scripts#1216</a>, <a href="https://github.com/flatcar/update_engine/pull/30">update_engine#30</a>, <a href="https://github.com/flatcar/mantle/pull/466">Mantle#466</a>, <a href="https://github.com/flatcar/mantle/pull/465">Mantle#465</a>.</li>
</ul>
</li>
<li>Removed <code>actool</code> from the image and <code>acbuild</code> from the SDK as these tools are deprecated and not used (<a href="https://github.com/flatcar/scripts/pull/1817">scripts#1817</a>)</li>
<li>⚠ Removed coreos-cloudinit support for automatic keys conversion (e.g <code>reboot-strategy</code> -&gt; <code>reboot_strategy</code>) (<a href="https://github.com/flatcar/scripts/pull/1687">scripts#1687</a>)</li>
<li>Removed Linux drivers for Mellanox Technologies Switch ASICs family and Spectrum/Spectrum-2/Spectrum-3/Spectrum-4 Ethernet Switch ASICs to reduce the initrd size on AMD64 by ~5MB (<a href="https://github.com/flatcar/scripts/pull/1734">flatcar/scripts#1734</a>). This change is part of the effort to reduce the initrd size (<a href="https://github.com/flatcar/Flatcar/issues/1381">flatcar#1381</a>).</li>
<li>Removed unused grub executable duplicate files and removed grub modules that are already assembled in the grub executable (<a href="https://github.com/flatcar/scripts/pull/1955">scripts#1955</a>).</li>
<li>Replace nmap netcat with openbsd variant. The license didn't get an exception from CNCF. Something about the definition of &quot;derivative works&quot; being too broad.</li>
<li>Reworked the VMware OEM software to be shipped as A/B updated systemd-sysext image</li>
<li>Scaleway: images are now provided directly as <code>.qcow2</code> to ease the import on Scaleway (<a href="https://github.com/flatcar/scripts/pull/1953">scripts#1953</a>)</li>
<li>SDK: Experimental support for <a href="https://github.com/flatcar/scripts/blob/main/PREFIX.md">prefix builds</a> to create distro independent, portable, self-contained applications w/ all dependencies included. With contributions from <a href="https://github.com/chewi">chewi</a> and <a href="https://github.com/HappyTobi">HappyTobi</a>.</li>
<li>Started shipping default ssh client and ssh daemon configs in <code>/etc/ssh/ssh_config</code> and <code>/etc/ssh/sshd_config</code> which include config snippets in <code>/etc/ssh/ssh_config.d</code> and <code>/etc/ssh/sshd_config.d</code>, respectively.</li>
<li>Switched ptp_kvm from kernel builtin to module.</li>
<li>The default VM memory was bumped to 2 GB in the Qemu script and for VMware OVFs</li>
<li>The <code>docker build</code> command will now use buildx as its backend as the old one became deprecated and a loud &quot;DEPRECATED&quot; information is printed every time it's used.</li>
<li>The kernel security module Landlock is now enabled for programs to sandbox themselves (<a href="https://github.com/flatcar/scripts/pull/2158">flatcar/scripts#2158</a>)</li>
<li>The open-vm-tools package in VMware OEM now comes with vmhgfs-fuse, udev rules, pam and vgauth
<ul>
<li>Torcx entered deprecation 2 years ago in favour of <a href="https://www.flatcar.org/docs/latest/container-runtimes/use-a-custom-docker-or-containerd-version/">deploying plain Docker binaries</a></li>
<li>Torcx has been removed entirely; if you use torcx to extend the Flatcar base OS image, please refer to our <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/#torcx-deprecation">conversion script</a> and to the sysext documentation mentioned above for migrating.</li>
</ul>
</li>
<li><strong>torcx was replaced by systemd-sysext in the OS image</strong>. Learn more about sysext and how to customise OS images <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/">here</a>.</li>
<li>Updated locksmith to use non-deprecated resource control options in the systemd unit (<a href="https://github.com/flatcar/locksmith/pull/20">Locksmith#20</a>)</li>
<li>Update generation SLSA provenance info from v0.2 to v1.0.
Using the btrfs driver can still be enforced by creating a respective <a href="https://docs.docker.com/storage/storagedriver/btrfs-driver/#configure-docker-to-use-the-btrfs-storage-driver">docker config</a> at <code>/etc/docker/daemon.json</code>.</li>
<li>:warning: Dropped support for niftycloud and interoute. For interoute we haven't been generating the images for some time already. (TODO) :warning:
(which is now also a legacy option because systemd-sysext offers a more robust and better structured way of customisation, including OS independent updates).</li>
</ul>
<h4>Updates</h4>
<ul>
<li>AWS: amazon-ssm-agent (<a href="https://github.com/aws/amazon-ssm-agent/releases/tag/3.2.985.0">3.2.985.0</a>)</li>
<li>Azure: WALinuxAgent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/2.9.1.1">2.9.1.1</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.21.13">1.21.13</a> (includes <a href="https://go.dev/doc/devel/release#go1.20.14">1.20.14</a>, <a href="https://go.dev/doc/devel/release#go1.20.13">1.20.13</a>, <a href="https://go.dev/doc/devel/release#go1.20.12">1.20.12</a>, <a href="https://go.dev/doc/devel/release#go1.20.11">1.20.11</a>, <a href="https://go.dev/doc/devel/release#go1.20.10">1.20.10</a>, <a href="https://go.dev/doc/devel/release#go1.20.9">1.20.9</a>, <a href="https://go.dev/doc/devel/release#go1.20.8">1.20.8</a>, <a href="https://go.dev/doc/devel/release#go1.20.7">1.20.7</a>, <a href="https://go.dev/doc/devel/release#go1.20.6">1.20.6</a>, <a href="https://go.dev/doc/devel/release#go1.20.5">1.20.5</a>, <a href="https://go.dev/doc/devel/release#go1.20.4">1.20.4</a>, <a href="https://go.dev/doc/devel/release#go1.19.13">1.19.13</a>, <a href="https://go.dev/doc/devel/release#go1.19.12">1.19.12</a>, <a href="https://go.dev/doc/devel/release#go1.19.11">1.19.11</a>, <a href="https://go.dev/doc/devel/release#go1.19.10">1.19.10</a>, <a href="https://go.dev/doc/devel/release#go1.19.9">1.19.9</a>, <a href="https://go.dev/doc/devel/release#go1.19.8">1.19.8</a>, <a href="https://go.dev/doc/devel/release#go1.19.7">1.19.7</a>, <a href="https://go.dev/doc/devel/release#go1.19.6">1.19.6</a>))</li>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2190-2024-06-05">2.19.0</a> (includes <a href="https://coreos.github.io/ignition/release-notes/#ignition-2180-2024-03-01">2.18.0</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2170-2023-11-20">2.17.0</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2162-2023-07-12">2.16.2</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2161-2023-07-10">2.16.1</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2160-2023-06-29">2.16.0</a>))</li>
<li>Linux (<a href="https://lwn.net/Articles/1006010">6.6.74</a> (includes <a href="https://lwn.net/Articles/1005709">6.6.73</a>, <a href="https://lwn.net/Articles/1005383">6.6.72</a>, <a href="https://lwn.net/Articles/1004703">6.6.71</a>, <a href="https://lwn.net/Articles/1004551">6.6.70</a>, <a href="https://lwn.net/Articles/1003986">6.6.69</a>, <a href="https://lwn.net/Articles/1003609">6.6.68</a>, <a href="https://lwn.net/Articles/1002919">6.6.67</a>, <a href="https://lwn.net/Articles/1002177">6.6.66</a>, <a href="https://lwn.net/Articles/1001739">6.6.65</a>, <a href="https://lwn.net/Articles/1001438">6.6.64</a>, <a href="https://lwn.net/Articles/999110">6.6.63</a>, <a href="https://lwn.net/Articles/998450">6.6.62</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.61">6.6.61</a>, <a href="https://lwn.net/Articles/997527">6.6.60</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.59">6.6.59</a>, <a href="https://lwn.net/Articles/995132">6.6.58</a>, <a href="https://lwn.net/Articles/994634">6.6.57</a>, <a href="https://lwn.net/Articles/993600">6.6.56</a>, <a href="https://lwn.net/Articles/993599">6.6.55</a>, <a href="https://lwn.net/Articles/992980">6.6.54</a>, <a href="https://lwn.net/Articles/992296">6.6.53</a>, <a href="https://lwn.net/Articles/990767/">6.6.52</a>, <a href="https://lwn.net/Articles/990045">6.6.51</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.50">6.6.50</a>, <a href="https://lwn.net/Articles/988749">6.6.49</a>, <a href="https://lwn.net/Articles/987679">6.6.48</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.47">6.6.47</a>, <a href="https://lwn.net/Articles/985672">6.6.46</a>, <a href="https://lwn.net/Articles/985200">6.6.45</a>, <a href="https://lwn.net/Articles/984450">6.6.44</a>, <a href="https://lwn.net/Articles/983655">6.6.43</a>, <a href="https://lwn.net/Articles/983333">6.6.42</a>, <a href="https://lwn.net/Articles/982381">6.6.41</a>, <a href="https://lwn.net/Articles/982050">6.6.40</a>, <a href="https://lwn.net/Articles/981719">6.6.39</a>, <a href="https://lwn.net/Articles/981255">6.6.38</a>, <a href="https://lwn.net/Articles/980860">6.6.37</a>, <a href="https://lwn.net/Articles/979850">6.6.36</a>, <a href="https://lwn.net/Articles/979262">6.6.35</a>, <a href="https://lwn.net/Articles/978593">6.6.34</a>, <a href="https://lwn.net/Articles/978141">6.6.33</a>, <a href="https://lwn.net/Articles/975075">6.6.32</a>, <a href="https://lwn.net/Articles/974072">6.6.31</a>, <a href="https://lwn.net/Articles/972211">6.6.30</a>, <a href="https://lwn.net/Articles/971363">6.6.29</a>, <a href="https://lwn.net/Articles/970172">6.6.28</a>, <a href="https://lwn.net/Articles/969734">6.6.27</a>, <a href="https://lwn.net/Articles/969352">6.6.26</a>, <a href="https://lwn.net/Articles/968470">6.6.25</a>, <a href="https://lwn.net/Articles/968253">6.6.24</a>, <a href="https://lwn.net/Articles/966758">6.6.23</a>, <a href="https://lwn.net/Articles/965606">6.6.22</a>, <a href="https://lwn.net/Articles/964561">6.6.21</a>, <a href="https://lwn.net/Articles/964307">6.6.20</a>, <a href="https://lwn.net/Articles/964173">6.6.19</a>, <a href="https://lwn.net/Articles/963357">6.6.18</a>, <a href="https://lwn.net/Articles/962558">6.6.17</a>, <a href="https://lwn.net/Articles/961011">6.6.16</a>, <a href="https://lwn.net/Articles/960441">6.6.15</a>, <a href="https://lwn.net/Articles/959512">6.6.14</a>, <a href="https://lwn.net/Articles/958862">6.6.13</a>, <a href="https://lwn.net/Articles/958342">6.6.12</a>, <a href="https://lwn.net/Articles/957375">6.6.11</a>, <a href="https://lwn.net/Articles/957008">6.6.10</a>, <a href="https://lwn.net/Articles/956525">6.6.9</a>, <a href="https://lwn.net/Articles/955813">6.6.8</a>, <a href="https://lwn.net/Articles/954990/">6.6.7</a>, <a href="https://kernelnewbies.org/Linux_6.6">6.6</a>, <a href="https://lwn.net/Articles/954112">6.1.66</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.65">6.1.65</a>, <a href="https://lwn.net/Articles/953132">6.1.64</a>, <a href="https://lwn.net/Articles/952003">6.1.63</a>, <a href="https://lwn.net/Articles/950700">6.1.62</a>, <a href="https://lwn.net/Articles/949826">6.1.61</a>, <a href="https://lwn.net/Articles/948817">6.1.60</a>, <a href="https://lwn.net/Articles/948297">6.1.59</a>, <a href="https://lwn.net/Articles/947820">6.1.58</a>, <a href="https://lwn.net/Articles/947298">6.1.57</a>, <a href="https://lwn.net/Articles/946854">6.1.56</a>, <a href="https://lwn.net/Articles/945379">6.1.55</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.54">6.1.54</a>, <a href="https://lwn.net/Articles/944358">6.1.53</a>, <a href="https://lwn.net/Articles/943754">6.1.52</a>, <a href="https://lwn.net/Articles/943403">6.1.51</a>, <a href="https://lwn.net/Articles/943112">6.1.50</a>, <a href="https://lwn.net/Articles/942880">6.1.49</a>, <a href="https://lwn.net/Articles/942865">6.1.48</a>, <a href="https://lwn.net/Articles/942531">6.1.47</a>, <a href="https://lwn.net/Articles/941774">6.1.46</a>, <a href="https://lwn.net/Articles/941273">6.1.45</a>, <a href="https://lwn.net/Articles/940800">6.1.44</a>, <a href="https://lwn.net/Articles/940338">6.1.43</a>, <a href="https://lwn.net/Articles/939423">6.1.42</a>, <a href="https://lwn.net/Articles/939103">6.1.41</a>, <a href="https://lwn.net/Articles/939015">6.1.40</a>, <a href="https://lwn.net/Articles/938619">6.1.39</a>, <a href="https://lwn.net/Articles/937403">6.1.38</a>, <a href="https://lwn.net/Articles/937082">6.1.37</a>, <a href="https://lwn.net/Articles/936674">6.1.36</a>, <a href="https://lwn.net/Articles/935588">6.1.35</a>, <a href="https://lwn.net/Articles/934623">6.1.34</a>, <a href="https://lwn.net/Articles/934319">6.1.33</a>, <a href="https://lwn.net/Articles/933908">6.1.32</a>, <a href="https://lwn.net/Articles/933281">6.1.31</a>, <a href="https://lwn.net/Articles/932882">6.1.30</a>, <a href="https://lwn.net/Articles/932133">6.1.29</a>, <a href="https://lwn.net/Articles/931651">6.1.28</a>, <a href="https://lwn.net/Articles/930597/">6.1.27</a>, <a href="https://kernelnewbies.org/Linux_6.1">6.1</a>, <a href="https://lwn.net/Articles/929679/">5.15.108</a>, <a href="https://lwn.net/Articles/929015/">5.15.107</a>, <a href="https://lwn.net/Articles/928343">5.15.106</a>, <a href="https://lwn.net/Articles/927860">5.15.105</a>, <a href="https://lwn.net/Articles/926873">5.15.104</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.103">5.15.103</a>, <a href="https://lwn.net/Articles/925991">5.15.102</a>, <a href="https://lwn.net/Articles/925939">5.15.101</a>, <a href="https://lwn.net/Articles/925913">5.15.100</a>, <a href="https://lwn.net/Articles/925844">5.15.99</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240811">20240811</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240709">20240709</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240610">20240610</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240513">20240513</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240410">20240410</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240312">20240312</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240220">20240220</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240115">20240115</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231211">20231211</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231111">20231111</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231030">20231030</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230919">20230919</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230804">20230804</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625">20230625</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230515">20230515</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230404">20230404</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230310">20230310</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230210">20230210</a>))</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.80.1">1.80.1</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.80.0">1.80.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.79.0">1.79.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.78.0">1.78.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.77.2">1.77.2</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.77.1">1.77.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.77.0">1.77.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.76.0">1.76.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.75.0">1.75.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.74.1">1.74.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.73.0">1.73.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.72.1">1.72.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.72.0">1.72.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.71.1">1.71.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.71.0">1.71.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.70.0">1.70.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.68.2">1.68.2</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.68.0">1.68.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.67.1">1.67.1</a>))</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.25/release/3.25.html">3.25.2</a>)</li>
<li>SDK: dnsmasq (<a href="https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q1/016859.html">2.89</a>)</li>
<li>SDK: go (<a href="https://go.dev/doc/devel/release#go1.21.12">1.21.12</a> (includes <a href="https://go.dev/doc/go1.21">1.21</a>))</li>
<li>SDK: make (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-02/msg00011.html">4.4.1</a> (includes <a href="https://lists.gnu.org/archive/html/help-make/2022-10/msg00020.html">4.4</a>))</li>
<li>SDK: man-db (<a href="https://gitlab.com/man-db/man-db/-/tags/2.11.2">2.11.2</a>)</li>
<li>SDK: man-pages (<a href="https://lore.kernel.org/lkml/d56662b2-538c-7252-9052-8afbf325f843@gmail.com/T/">6.03</a>)</li>
<li>SDK: meson (<a href="https://mesonbuild.com/Release-notes-for-1-5-0.html">1.5.1</a>)</li>
<li>SDK: nano (<a href="https://git.savannah.gnu.org/cgit/nano.git/tree/NEWS?h=v7.2">7.2</a>)</li>
<li>SDK: nasm (<a href="https://github.com/netwide-assembler/nasm/releases/tag/nasm-2.16.01">2.16.01</a>)</li>
<li>SDK: pahole (<a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.27">1.27</a> (includes <a href="https://github.com/acmel/dwarves/blob/master/changes-v1.25">1.25</a>, <a href="https://github.com/acmel/dwarves/releases/tag/v1.24">1.24</a>))</li>
<li>SDK: perf (<a href="https://kernelnewbies.org/LinuxChanges#Linux_6.3.Tracing.2C_perf_and_BPF">6.3</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/5.38.2/perldelta">5.38.2</a> (includes <a href="https://perldoc.perl.org/perl5361delta">5.36.1</a>))</li>
<li>SDK: portage (<a href="https://github.com/gentoo/portage/blob/f03998622e0960388e903de0d6d24bdf6881e567/NEWS#L9">3.0.65</a> (includes <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.63">3.0.63</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.61">3.0.61</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.59">3.0.59</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.49">3.0.49</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.46">3.0.46</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.44">3.0.44</a>))</li>
<li>SDK: python (<a href="https://www.get-python.org/downloads/release/python-3119/">3.11.9</a> (includes <a href="https://www.get-python.org/downloads/release/python-3118/">3.11.8</a>, <a href="https://www.python.org/downloads/release/python-3117/">3.11.7</a>, <a href="https://docs.python.org/release/3.11.6/whatsnew/changelog.html#python-3-11-6">3.11.6</a>, <a href="https://www.python.org/downloads/release/python-3115/">3.11.5</a>, <a href="https://www.python.org/downloads/release/python-3113/">3.11.3</a>, <a href="https://www.python.org/downloads/release/python-31012/">3.10.12</a>, <a href="https://www.python.org/downloads/release/python-31011/">3.10.11</a>, <a href="https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-10-final">3.10.10</a>, <a href="https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-9-final">3.10.9</a>, <a href="https://www.python.org/downloads/release/python-3100/">3.10</a>))</li>
<li>SDK: python-packaging (<a href="https://github.com/pypa/packaging/releases/tag/23.2">23.2</a>)</li>
<li>SDK: python-platformdirs (<a href="https://github.com/platformdirs/platformdirs/releases/tag/3.11.0">3.11.0</a>)</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/8.2">8.2.3</a> (includes <a href="https://wiki.qemu.org/ChangeLog/8.0">8.0.4</a>, <a href="https://wiki.qemu.org/ChangeLog/8.1">8.1.5</a>, <a href="https://wiki.qemu.org/ChangeLog/8.0">8.0.3</a>, <a href="https://wiki.qemu.org/ChangeLog/7.2">7.2.3</a>))</li>
<li>SDK: repo (2.37)</li>
<li>VMware: libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.2">1.16.2</a> (includes <a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16">1.16</a>))</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.5">12.3.5</a> (includes <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0">12.3.0</a>, <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.5">12.2.5</a>))</li>
<li>acl (<a href="https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00012.html">2.3.2</a>)</li>
<li>acpid (<a href="https://sourceforge.net/p/acpid2/code/ci/2.0.34/tree/Changelog">2.0.34</a>)</li>
<li>afterburn (<a href="https://coreos.github.io/afterburn/release-notes/#afterburn-560">5.6.0</a> (includes <a href="https://github.com/coreos/afterburn/releases/tag/v5.5.1">5.5.1</a>, <a href="https://github.com/coreos/afterburn/releases/tag/v5.5.0">5.5.0</a>))</li>
<li>attr (<a href="https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00011.html">2.5.2</a>)</li>
<li>audit (<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.2">3.1.2</a> (includes <a href="https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.1">3.1.1</a>))</li>
<li>azure: azure-nvme-utils (<a href="https://github.com/Azure/azure-nvme-utils/releases/tag/v0.2.0">0.2.0</a>)</li>
<li>bash (<a href="https://git.savannah.gnu.org/cgit/bash.git/log/?id=2bb3cbefdb8fd019765b1a9cc42ecf37ff22fec6">5.2_p21</a> (includes <a href="https://lists.gnu.org/archive/html/bash-announce/2022-09/msg00000.html">5.2</a>))</li>
<li>bind-tools (<a href="https://bind9.readthedocs.io/en/v9.16.48/notes.html#notes-for-bind-9-16-48">9.16.48</a> (includes <a href="https://bind9.readthedocs.io/en/v9.16.42/notes.html#notes-for-bind-9-16-42">9.16.42</a>, <a href="https://bind9.readthedocs.io/en/v9.16.41/notes.html#notes-for-bind-9-16-41">9.16.41</a>, <a href="https://bind9.readthedocs.io/en/v9_16_37/notes.html#notes-for-bind-9-16-37">9.16.37</a>))</li>
<li>binutils (<a href="https://sourceware.org/pipermail/binutils/2024-January/132213.html">2.42</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00009.html">2.41</a>, <a href="https://lists.gnu.org/archive/html/info-gnu/2023-01/msg00003.html">2.40</a>))</li>
<li>bpftool (<a href="https://kernelnewbies.org/Linux_6.9#Tracing.2C_perf_and_BPF">6.9.2</a> (includes <a href="https://kernelnewbies.org/Linux_6.8#Tracing.2C_perf_and_BPF">6.8.2</a>, <a href="https://kernelnewbies.org/Linux_6.7#Tracing.2C_probing_and_BPF">6.7.6</a>, <a href="https://kernelnewbies.org/Linux_6.5#Tracing.2C_perf_and_BPF">6.5.7</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/log/tools/bpf/bpftool?h=v6.3">6.3</a>, <a href="https://kernelnewbies.org/LinuxChanges#Linux_6.2.Tracing.2C_perf_and_BPF">6.2.1</a>))</li>
<li>btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/blob/v6.9.2/CHANGES">6.9.2</a> (includes <a href="https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2-2022-11-24">6.0.2</a>, <a href="https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2022-10-11">6.0</a>))</li>
<li>c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_29_0">1.29.0</a> (includes <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_28_1">1.28.1</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_28_0">1.28.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_27_0">1.27.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_26_0">1.26.0</a>, <a href="https://c-ares.org/changelog.html#1_25_0">1.25.0</a>, <a href="https://c-ares.org/changelog.html#1_21_0">1.21.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1">1.19.1</a>, <a href="https://c-ares.org/changelog.html#1_19_0">1.19.0</a>))</li>
<li>cJSON (<a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.18">1.7.18</a> (includes <a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.17">1.7.17</a>, <a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.16">1.7.16</a>))</li>
<li>checkpolicy (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>cifs-utils (<a href="https://lists.samba.org/archive/samba-technical/2022-August/137528.html">7.0</a>)</li>
<li>conntrack-tools (<a href="https://lwn.net/Articles/945927/">1.4.8</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.21">1.7.21</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.20">1.7.20</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.19">1.7.19</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.18">1.7.18</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.17">1.7.17</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.16">1.7.16</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.15">1.7.15</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.14">1.7.14</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.13">1.7.13</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.12">1.7.12</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.11">1.7.11</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.10">1.7.10</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.9">1.7.9</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.8">1.7.8</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.7">1.7.7</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.6">1.7.6</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.5">1.7.5</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.4">1.7.4</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.3">1.7.3</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.2">1.7.2</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.21">1.6.21</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.20">1.6.20</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.19">1.6.19</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.18">1.6.18</a>))</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html">9.5</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2023-08/msg00007.html">9.4</a>, <a href="https://lists.gnu.org/archive/html/info-gnu/2023-04/msg00006.html">9.3</a>, <a href="https://git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?h=v9.1">9.1</a>))</li>
<li>cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.0">1.27.0</a>)</li>
<li>cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.2/docs/v2.7.2-ReleaseNotes">2.7.2</a> (includes <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.1/docs/v2.7.1-ReleaseNotes">2.7.1</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.0/docs/v2.7.0-ReleaseNotes">2.7.0</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.1/docs/v2.6.1-ReleaseNotes">2.6.1</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.0/docs/v2.6.0-ReleaseNotes">2.6.0</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.5.0/docs/v2.5.0-ReleaseNotes">2.5.0</a>))</li>
<li>curl (<a href="https://curl.se/ch/8.9.1.html">8.9.1</a> (includes <a href="https://curl.se/ch/8.9.0.html">8.9.0</a>, <a href="https://curl.se/changes.html#8_8_0">8.8.0</a>, <a href="https://curl.se/changes.html#8_7_1">8.7.1</a>, <a href="https://curl.se/changes.html#8_7_0">8.7.0</a>, <a href="https://curl.se/changes.html#8_6_0">8.6.0</a>, <a href="https://curl.se/changes.html#8_5_0">8.5.0</a>, <a href="https://curl.se/changes.html#8_4_0">8.4.0</a>, <a href="https://curl.se/changes.html#8_3_0">8.3.0</a>, <a href="https://curl.se/changes.html#8_2_1">8.2.1</a>, <a href="https://curl.se/changes.html#8_2_0">8.2.0</a>, <a href="https://curl.se/changes.html#8_1_2">8.1.2</a>, <a href="https://curl.se/changes.html#8_1_0">8.1.0</a>, <a href="https://curl.se/changes.html#8_0_1">8.0.1</a>, <a href="https://curl.se/changes.html#7_88_1">7.88.1</a>, <a href="https://curl.se/changes.html#7_88_0">7.88.0</a>))</li>
<li>debianutils (<a href="https://metadata.ftp-master.debian.org/changelogs//main/d/debianutils/debianutils_5.7-0.4_changelog">5.7</a>)</li>
<li>dev: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.15">3.15</a>)</li>
<li>dev: minicom (<a href="https://salsa.debian.org/minicom-team/minicom/-/releases/2.9">2.9</a>)</li>
<li>dev: smartmontools (<a href="https://www.smartmontools.org/browser/tags/RELEASE_7_4/smartmontools/NEWS">7.4</a>)</li>
<li>diffutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00009.html">3.10</a> (includes <a href="https://savannah.gnu.org/forum/forum.php?forum_id=10282">3.9</a>))</li>
<li>ding-libs (<a href="https://github.com/SSSD/ding-libs/releases/tag/0.6.2">0.6.2</a>)</li>
<li>e2fsprogs (<a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.1">1.47.1</a> (includes <a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html##1.47.0">1.47.0</a>, <a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.6">1.46.6</a>))</li>
<li>efibootmgr (<a href="https://github.com/rhboot/efibootmgr/releases/tag/18">18</a>)</li>
<li>efivar (<a href="https://github.com/rhboot/efivar/releases/tag/38">38</a>)</li>
<li>elfutils (<a href="https://inbox.sourceware.org/elfutils-devel/CAJDtP-SJhJ8cjTpkNpi+F0nzVJ2pZsEai8Ewpp4yJmsO_H5-NA@mail.gmail.com/T/#u">0.191</a> (includes <a href="https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=0420d3b8376877c1b11712f1aad90a2e2b6f6d06;hb=c1058da5a450e33e72b72abb53bc3ffd7f6b361b">0.190</a>, <a href="https://sourceware.org/pipermail/elfutils-devel/2023q1/006023.html">0.189</a>))</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.9">6.9</a> (includes <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.7">6.7</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.6">6.6</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.5">6.5</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.4">6.4</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=7bdf78f0d2a9ae1571fe9444e552490130e573fd">6.3</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.2">6.2</a>))</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes">2.6.3</a> (includes <a href="https://github.com/libexpat/libexpat/blob/R_2_6_2/expat/Changes">2.6.2</a>, <a href="https://github.com/libexpat/libexpat/blob/R_2_6_1/expat/Changes">2.6.1</a>, <a href="https://github.com/libexpat/libexpat/blob/R_2_6_0/expat/Changes">2.6.0</a>))</li>
<li>file (<a href="https://github.com/file/file/blob/FILE5_45/ChangeLog">5.45</a>)</li>
<li>findutils (<a href="https://git.savannah.gnu.org/cgit/findutils.git/tree/NEWS?h=v4.10.0">4.10.0</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00003.html">4.9.0</a>))</li>
<li>gawk (<a href="https://lwn.net/Articles/949829/">5.3.0</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00008.html">5.2.2</a>))</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-13/changes.html">13.3.1_p20240614</a> (includes <a href="https://gcc.gnu.org/gcc-13/changes.html">13.2</a>, <a href="https://gcc.gnu.org/gcc-12/changes.html">12.2.1</a>))</li>
<li>gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00011.html">13.2</a> (includes <a href="https://lwn.net/Articles/923819/">13.1.90</a>))</li>
<li>gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00004.html">1.23</a>)</li>
<li>gentoolkit (<a href="https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.3">0.6.3</a>)</li>
<li>gettext (<a href="https://savannah.gnu.org/news/?id=10544">0.22.4</a>)</li>
<li>gflags (<a href="https://github.com/gflags/gflags/releases/tag/v2.2.2">2.2.2</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.44.2/Documentation/RelNotes/2.44.2.txt">2.44.2</a> (includes <a href="https://github.com/git/git/blob/v2.44.1/Documentation/RelNotes/2.44.1.txt">2.44.1</a>, <a href="https://github.com/git/git/blob/v2.44.0/Documentation/RelNotes/2.44.0.txt">2.44.0</a>, <a href="https://github.com/git/git/blob/v2.43.2/Documentation/RelNotes/2.43.2.txt">2.43.2</a>, <a href="https://github.com/git/git/blob/v2.43.0/Documentation/RelNotes/2.43.0.txt">2.43.0</a>, <a href="https://github.com/git/git/blob/v2.42.0/Documentation/RelNotes/2.42.0.txt">2.42.0</a>, <a href="https://lore.kernel.org/git/xmqqleh3a3wm.fsf@gitster.g/">2.41.0</a>, <a href="https://github.com/git/git/blob/v2.39.3/Documentation/RelNotes/2.39.3.txt">2.39.3</a>, <a href="https://github.com/git/git/blob/v2.39.2/Documentation/RelNotes/2.39.2.txt">2.39.2</a>))</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.6">2.78.6</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.5">2.78.5</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.4">2.78.4</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/blob/2.78.3/NEWS">2.78.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.4">2.76.4</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.3">2.76.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.2">2.76.2</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.6">2.74.6</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.5">2.74.5</a>))</li>
<li>glibc (<a href="https://sourceware.org/pipermail/libc-alpha/2023-July/150524.html">2.38</a> (includes <a href="https://sourceware.org/git/?p=glibc.git;a=tag;h=refs/tags/glibc-2.37">2.37</a>))</li>
<li>glog (<a href="https://github.com/google/glog/releases/tag/v0.6.0">0.6.0</a>)</li>
<li>gmp (<a href="https://gmplib.org/gmp6.3">6.3.0</a>)</li>
<li>gnuconfig (<a href="https://git.savannah.gnu.org/cgit/config.git/log/?id=d4e37b5868ef910e3e52744c34408084bb13051c">20230731</a>)</li>
<li>gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000482.html">2.4.5</a> (includes <a href="https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000481.html">2.4.4</a>, <a href="https://dev.gnupg.org/T6307">2.2.42</a>))</li>
<li>gnutls (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2024-April/004846.html">3.8.5</a> (includes <a href="https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html">3.8.4</a>, <a href="https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html">3.8.2</a>, <a href="https://gitlab.com/gnutls/gnutls/-/blob/3.8.0/NEWS">3.8.0</a>))</li>
<li>gptfdisk (<a href="https://sourceforge.net/p/gptfdisk/code/ci/1d46f3723bc25f5598266f7d9a3548af3cee0c77/tree/NEWS">1.0.9</a>)</li>
<li>grep (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00004.html">3.11</a> (includes <a href="http://savannah.gnu.org/forum/forum.php?forum_id=10227">3.8</a>))</li>
<li>groff (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00001.html">1.23.0</a>)</li>
<li>grub (<a href="https://lists.gnu.org/archive/html/grub-devel/2021-06/msg00022.html">2.06</a>)</li>
<li>gzip (<a href="https://savannah.gnu.org/news/?id=10501">1.13</a>)</li>
<li>hwdata (<a href="https://github.com/vcrhonek/hwdata/compare/v0.382...v0.383">0.383</a> (includes <a href="https://github.com/vcrhonek/hwdata/commits/v0.382">0.382</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.376">0.376</a>, <a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.375">0.375</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.374">0.374</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.373">0.373</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.372">0.372</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.371">0.371</a>, <a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.367">0.367</a>))</li>
<li>ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2150-2023-02-21">2.15.0</a>)</li>
<li>inih (<a href="https://github.com/benhoyt/inih/releases/tag/r58">58</a> (includes <a href="https://github.com/benhoyt/inih/releases/tag/r57">57</a>, <a href="https://github.com/benhoyt/inih/releases/tag/r56">56</a>))</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514">20240514_p20240514</a> (includes <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312">20240312</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114">20231114_p20231114</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230808">20230808</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230613">20230613</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230512">20230512</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214">20230214</a>))</li>
<li>iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.16">3.16</a> (includes <a href="https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-314-2023-07-07">3.14</a>, <a href="https://github.com/esnet/iperf/blob/3.13/RELNOTES.md">3.13</a>))</li>
<li>iproute2 (<a href="https://lwn.net/Articles/965125/">6.8.0</a> (includes <a href="https://lwn.net/Articles/957171/">6.7.0</a>, <a href="https://marc.info/?l=linux-netdev&amp;m=169929000929786&amp;w=2">6.6.0</a>, <a href="https://marc.info/?l=linux-netdev&amp;m=169401822317373&amp;w=2">6.5.0</a>, <a href="https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/?h=v6.4.0">6.4.0</a>, <a href="https://lwn.net/Articles/930473/">6.3.0</a>, <a href="https://lwn.net/Articles/923952/">6.2.0</a>))</li>
<li>ipset (<a href="https://ipset.netfilter.org/changelog.html">7.22</a> (includes <a href="https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.21">7.21</a>, <a href="https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.20">7.20</a>, <a href="https://git.netfilter.org/ipset/tree/ChangeLog?id=ce6db35a0ea950e850ebe7c50ce46908c1c3bb2b">7.19</a>, <a href="https://git.netfilter.org/ipset/tree/ChangeLog?id=186f9b57c60bb53aae5f6633eff1e9d5e9095c3e">7.17</a>))</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20240117">20240117</a> (includes <a href="https://github.com/iputils/iputils/releases/tag/20231222">20231222</a>, <a href="https://github.com/iputils/iputils/releases/tag/20221126">20221126</a>))</li>
<li>ipvsadm (<a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.31">1.31</a> (includes <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.30">1.30</a>, <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.29">1.29</a>, <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.28">1.28</a>))</li>
<li>jq (<a href="https://github.com/jqlang/jq/releases/tag/jq-1.7.1">1.7.1</a> (includes <a href="https://github.com/jqlang/jq/releases/tag/jq-1.7">1.7</a>))</li>
<li>json-c (<a href="https://github.com/json-c/json-c/blob/json-c-0.17-20230812/ChangeLog">0.17</a>)</li>
<li>kbd (<a href="https://github.com/legionus/kbd/releases/tag/v2.6.4">2.6.4</a> (includes <a href="https://github.com/legionus/kbd/releases/tag/v2.6.1">2.6.1</a>, <a href="https://github.com/legionus/kbd/releases/tag/v2.6.0">2.6.0</a>, <a href="https://github.com/legionus/kbd/releases/tag/v2.5.1">2.5.1</a>))</li>
<li>kexec-tools (<a href="https://github.com/horms/kexec-tools/commits/v2.0.28/">2.0.28</a> (includes <a href="https://github.com/horms/kexec-tools/releases/tag/v2.0.24">2.0.24</a>))</li>
<li>keyutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=cb3bb194cca88211cbfcdde2f10c0f43c3fb8ec3">1.6.3</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=454f80f537e5d1aad506599b6776e4cc1cf5f0f2">1.6.2</a>))</li>
<li>kmod (<a href="https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/tree/NEWS?h=v32">32</a> (includes <a href="https://github.com/kmod-project/kmod/blob/v31/NEWS">31</a>, <a href="https://lwn.net/Articles/899526/">30</a>))</li>
<li>ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/b686ef00da46d4a0c0aba0c61b1866cbc9b462b6">2.4.4</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/604f94704f30e90ef960aa2be62a14d2e614a002">2.4.3</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/d93892d2e8ed69758c15ab18bc03bba09e715bc6">2.4.2</a>))</li>
<li>less (<a href="https://www.greenwoodsoftware.com/less/news.643.html">643</a> (includes <a href="http://www.greenwoodsoftware.com/less/news.633.html">633</a>, <a href="http://www.greenwoodsoftware.com/less/news.632.html">632</a>, <a href="http://www.greenwoodsoftware.com/less/news.608.html">608</a>))</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.4">3.7.4</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.3">3.7.3</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.2">3.7.2</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.1">3.7.1</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.0">3.7.0</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.6.2">3.6.2</a>))</li>
<li>libassuan (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=047f12b7c3ee0c8c1718a2da8b5a6bb9dd541fd8;hb=cc2f776904e0b5e56e2b81b2672ca98d7787ed1b">2.5.7</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=e52bb5dd36ac93ea227e53e89f82af9ccf38f339;hb=6b50ee6bcdd6aa81bd7cc3fb2379864c3ed479b8">2.5.6</a>))</li>
<li>libbsd (<a href="https://lists.freedesktop.org/archives/libbsd/2024-January/000377.html">0.11.8</a> (includes <a href="https://lists.freedesktop.org/archives/libbsd/2022-October/000337.html">0.11.7</a>))</li>
<li>libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.hde102t8xd0v">2.70</a> (includes <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe">2.69</a>))</li>
<li>libcap-ng (<a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.5">0.8.5</a> (includes <a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.4">0.8.4</a>))</li>
<li>libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.18.0">1.18.0</a> (includes <a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.4">1.16.4</a>))</li>
<li>libffi (<a href="https://github.com/libffi/libffi/releases/tag/v3.4.4">3.4.4</a> (includes <a href="https://github.com/libffi/libffi/releases/tag/v3.4.3">3.4.3</a>, <a href="https://github.com/libffi/libffi/releases/tag/v3.4.2">3.4.2</a>))</li>
<li>libgcrypt (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=b767dc1170eb479b9a311cca4074c58e4eedaf0b;hb=aa1610866f8e42bdc272584f0a717f32ee050a22">1.10.3</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=c9a239615f8070427a96688b1be40a81e59e9b8a;hb=1c5cbacf3d88dded5063e959ee68678ff7d0fa56">1.10.2</a>, <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=03132c2a115e35783a782c64777cf5f5b1a2825f;hb=ae0e567820c37f9640440b3cff77d7c185aa6742">1.10.1</a>))</li>
<li>libgpg-error (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=8ac4bf36113fe9254a361e2bc8d0ed52383839ce;hb=faed9c271ad22bbd2ed265d8e11badb53b7a2f32">1.49</a> (includes <a href="https://dev.gnupg.org/T6231">1.47</a>, <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=14b0ba97d6ba2b10b3178f2e4a3e24bfc2355bb3;hb=ea031873aa9642831017937fd33e9009d514ee07">1.46</a>))</li>
<li>libidn2 (<a href="https://gitlab.com/libidn/libidn2/-/blob/v2.3.7/NEWS">2.3.7</a> (includes <a href="https://gitlab.com/libidn/libidn2/-/releases/v2.3.4">2.3.4</a>))</li>
<li>libksba (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=3d2d5a47688bb6214efaf02f5ab29f6e64433a97;hb=b14e68b97df754b2bb7a90bb904d143d8e896afb">1.6.7</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=48b42025773e88fbb78d015d1f154fef4c80ef9f;hb=5b220df6f8216a9d5f6139c7b17f075374a27480">1.6.6</a>, <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=369cfb5d91bf232685a6c5b156453a624e11ed67;hb=7b3e4785e54280d1a13c5bc839bdc6722d898ac7">1.6.5</a>, <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=f640523209c1c9ce9855040e53914a79d24d6a67;hb=557999424ebd13e70d6fc17e648a5dd2a06f440b">1.6.4</a>))</li>
<li>liblinear (246)</li>
<li>libmd (<a href="https://git.hadrons.org/cgit/libmd.git/log/?h=1.1.0">1.1.0</a>)</li>
<li>libmicrohttpd (<a href="https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00005.html">1.0.1</a> (includes <a href="https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00000.html">1.0.0</a>, <a href="https://gitlab.com/libmicrohttpd/libmicrohttpd/-/releases/v0.9.77">0.9.77</a>, <a href="https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html">0.9.76</a>))</li>
<li>libmnl (<a href="https://git.netfilter.org/libmnl/log/?h=libmnl-1.0.5">1.0.5</a>)</li>
<li>libnetfilter_conntrack (<a href="https://git.netfilter.org/libnetfilter_conntrack/log/?h=libnetfilter_conntrack-1.0.9">1.0.9</a>)</li>
<li>libnetfilter_cthelper (<a href="https://git.netfilter.org/libnetfilter_cthelper/log/?id=8cee0347cc6969c39bb64000dfaa676a8f9e30f0">1.0.1</a>)</li>
<li>libnetfilter_cttimeout (<a href="https://git.netfilter.org/libnetfilter_cttimeout/log/?id=068d36d6291f53a0a609ab1f695aa06e94ce3d30">1.0.1</a>)</li>
<li>libnfnetlink (<a href="https://git.netfilter.org/libnfnetlink/log/?h=libnfnetlink-1.0.2">1.0.2</a>)</li>
<li>libnftnl (<a href="https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.6">1.2.6</a> (includes <a href="https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.5">1.2.5</a>))</li>
<li>libnl (<a href="http://lists.infradead.org/pipermail/libnl/2023-December/002436.html">3.9.0</a> (includes <a href="https://github.com/thom311/libnl/compare/libnl3_7_0...libnl3_8_0">3.8.0</a>))</li>
<li>libnsl (<a href="https://github.com/thkukuk/libnsl/releases/tag/v2.0.1">2.0.1</a>)</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.9">1.9</a> (includes <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.8">1.8</a>, <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.7.1">1.7.1</a>, <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.7">1.7</a>, <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.5">1.5</a>))</li>
<li>libpcap (<a href="https://github.com/the-tcpdump-group/libpcap/blob/24832dd2728bd95ed9b9464ef27b47a943c38003/CHANGES#L51">1.10.4</a> (includes <a href="https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.3:/CHANGES">1.10.3</a>, <a href="https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.2:/CHANGES">1.10.2</a>))</li>
<li>libpcre (8.45)</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.43/NEWS">10.43</a> (includes <a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.42/NEWS">10.42</a>))</li>
<li>libpipeline (<a href="https://gitlab.com/libpipeline/libpipeline/-/tags/1.5.7">1.5.7</a>)</li>
<li>libpng (<a href="https://github.com/pnggroup/libpng/blob/v1.6.43/ANNOUNCE">1.6.43</a> (includes <a href="https://github.com/pnggroup/libpng/blob/v1.6.42/ANNOUNCE">1.6.42</a>, <a href="https://github.com/pnggroup/libpng/blob/v1.6.41/ANNOUNCE">1.6.41</a>))</li>
<li>libpsl (<a href="https://github.com/rockdaboot/libpsl/blob/0.21.5/NEWS">0.21.5</a>)</li>
<li>libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.5">2.5.5</a>)</li>
<li>libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>libsemanage (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>libsodium (<a href="https://github.com/jedisct1/libsodium/releases/tag/1.0.19-RELEASE">1.0.19</a>)</li>
<li>libtirpc (<a href="https://marc.info/?l=linux-nfs&amp;m=169667640909830&amp;w=2">1.3.4</a>)</li>
<li>libunistring (<a href="https://savannah.gnu.org/news/?id=10599">1.2</a> (includes <a href="https://git.savannah.gnu.org/gitweb/?p=libunistring.git;a=blob;f=NEWS;h=5a43ddd7011d62a952733f6c0b7ad52aa4f385c7;hb=8006860b710aae2e8442088c3ddc7d819dfa8ac7">1.1</a>))</li>
<li>libunwind (<a href="https://github.com/libunwind/libunwind/releases/tag/v1.8.1">1.8.1</a> (includes <a href="https://github.com/libunwind/libunwind/releases/tag/v1.8.0">1.8.0</a>, <a href="https://github.com/libunwind/libunwind/releases/tag/v1.7.2">1.7.2</a>, <a href="https://github.com/libunwind/libunwind/releases/tag/v1.7.0">1.7.0</a>))</li>
<li>liburing (<a href="https://github.com/axboe/liburing/blob/liburing-2.3/CHANGELOG">2.3</a>)</li>
<li>libusb (<a href="https://github.com/libusb/libusb/blob/v1.0.27/ChangeLog">1.0.27</a> (includes <a href="https://github.com/libusb/libusb/blob/v1.0.26/ChangeLog">1.0.26</a>))</li>
<li>libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.48.0">1.48.0</a> (includes <a href="https://github.com/libuv/libuv/releases/tag/v1.47.0">1.47.0</a>, <a href="https://github.com/libuv/libuv/releases/tag/v1.46.0">1.46.0</a>, <a href="https://github.com/libuv/libuv/releases/tag/v1.45.0">1.45.0</a>))</li>
<li>libverto (<a href="https://github.com/latchset/libverto/releases/tag/0.3.2">0.3.2</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7">2.12.7</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.6">2.12.6</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.5">2.12.5</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.12.4/NEWS">2.12.4</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.5">2.11.5</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4">2.11.4</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.4">2.10.4</a>))</li>
<li>libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.39">1.1.39</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.38">1.1.38</a>))</li>
<li>linux-pam (<a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.5.3">1.5.3</a>)</li>
<li>lshw (<a href="https://www.ezix.org/project/wiki/HardwareLiSter#Changes">02.20.2b</a>)</li>
<li>lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.99.3">4.99.3</a> (includes <a href="https://github.com/lsof-org/lsof/releases/tag/4.99.2">4.99.2</a>, <a href="https://github.com/lsof-org/lsof/releases/tag/4.99.1">4.99.1</a>, <a href="https://github.com/lsof-org/lsof/blob/4.99.0/00DIST#L5523">4.99.0</a>, <a href="https://github.com/lsof-org/lsof/blob/4.98.0/00DIST#L5471">4.98.0</a>))</li>
<li>lua (<a href="https://www.lua.org/manual/5.4/readme.html#changes">5.4.6</a> (includes <a href="https://www.lua.org/manual/5.4/readme.html#changes">5.4.4</a>))</li>
<li>lz4 (<a href="https://github.com/lz4/lz4/releases/tag/v1.10.0">1.10.0</a> (includes <a href="https://github.com/lz4/lz4/releases/tag/v1.9.4">1.9.4</a>))</li>
<li>mime-types (<a href="https://pagure.io/mailcap/blob/9699055a1b4dfb90f7594ee2e8dda705fa56d3b8/f/NEWS">2.1.54</a>)</li>
<li>mit-krb5 (<a href="https://web.mit.edu/kerberos/krb5-1.21/README-1.21.3.txt">1.21.3</a> (includes <a href="http://web.mit.edu/kerberos/krb5-1.21/">1.21.2</a>))</li>
<li>mpc (<a href="https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00049.html">1.3.1</a> (includes <a href="https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00028.html">1.3.0</a>))</li>
<li>mpfr (<a href="https://gitlab.inria.fr/mpfr/mpfr/-/blob/4.2.1/NEWS">4.2.1</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/blob/0.9.8/NEWS.md">0.9.8</a> (includes <a href="https://github.com/opensvc/multipath-tools/commits/0.9.7">0.9.7</a>, <a href="https://github.com/opensvc/multipath-tools/commits/0.9.5">0.9.5</a>, <a href="https://github.com/opensvc/multipath-tools/commits/0.9.4">0.9.4</a>))</li>
<li>ncurses (<a href="https://invisible-island.net/ncurses/announce.html#h2-release-notes">6.4</a>)</li>
<li>nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/blob/nettle_3.9.1_release_20230601/ChangeLog">3.9.1</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.62.1">1.62.1</a> (includes <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.61.0">1.61.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.60.0">1.60.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.59.0">1.59.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.58.0">1.58.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0">1.57.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.56.0">1.56.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.55.1">1.55.1</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.55.0">1.55.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.54.0">1.54.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.53.0">1.53.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0">1.52.0</a>))</li>
<li>nmap (<a href="https://nmap.org/changelog.html#7.95">7.95</a> (includes <a href="https://nmap.org/changelog.html#7.94">7.94</a>))</li>
<li>npth (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=c1b631b4294eabfef29baefd60e1b0dfecce710d;hb=75c68399ef3bbb5d024f2a60474a7214fa479016">1.7</a>)</li>
<li>nspr (<a href="https://hg.mozilla.org/projects/nspr/log/b563bfc16c887c48b038b7b441fcc4e40a126d3b">4.35</a>)</li>
<li>ntp (<a href="https://www.ntp.org/support/securitynotice/4_2_8p17-release-announcement/">4.2.8p17</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-104-05/index.html">535.104.05</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9.1">2.9.1</a> (includes <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9">2.9</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.8">2.8</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7.1">2.7.1</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7">2.7</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/2.6">2.6</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.5">2.5</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.3">2.3</a>))</li>
<li>open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.10">2.1.10</a>)</li>
<li>open-isns (<a href="https://github.com/open-iscsi/open-isns/blob/v0.102/ChangeLog">0.102</a>)</li>
<li>openldap (<a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_4/CHANGES">2.6.4</a> (includes <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FQJM2JSSSOMLQH7XC7Q5IZJYOGCTV2LK/">2.6.3</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/IHS5V46H6NFNFUERMC6AWMPHTWRVNLFA/">2.6</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/TZQHR4SIWUA5BZTKDAKSFDOOGDVU4TU7/">2.5.14</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/BH3VDPG6IYYF5L5U6LZGHHKMJY5HFA3L/">2.5</a>))</li>
<li>openssh (<a href="https://www.openssh.com/txt/release-9.7">9.7_p1</a> (includes <a href="https://www.openssh.com/releasenotes.html#9.6p1">9.6p1</a>, <a href="https://www.openssh.com/releasenotes.html#9.5p1">9.5p1</a>, <a href="https://www.openssh.com/releasenotes.html#9.4p1">9.4p1</a>, <a href="http://www.openssh.com/releasenotes.html#9.3">9.3</a>, <a href="http://www.openssh.com/releasenotes.html#9.2">9.2</a>))</li>
<li>openssl (<a href="https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32">3.2.3</a> (includes <a href="https://github.com/openssl/openssl/blob/openssl-3.2.1/CHANGES.md">3.2.1</a>, <a href="https://github.com/openssl/openssl/blob/openssl-3.0.12/NEWS.md#major-changes-between-openssl-3011-and-openssl-3012-24-oct-2023">3.0.12</a>, <a href="https://github.com/openssl/openssl/blob/openssl-3.0.9/NEWS.md#major-changes-between-openssl-308-and-openssl-309-30-may-2023">3.0.9</a>, <a href="https://github.com/openssl/openssl/blob/openssl-3.0.8/NEWS.md#major-changes-between-openssl-307-and-openssl-308-7-feb-2023">3.0.8</a>))</li>
<li>parted (<a href="https://git.savannah.gnu.org/gitweb/?p=parted.git;a=blob;f=NEWS;h=52bb11697039f70e55120c571750f9ee761a75aa;hb=3b5f327b213d21e9adb9ba933c78dd898fee5b1d">3.6</a>)</li>
<li>pax-utils (<a href="https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.7">1.3.7</a>)</li>
<li>pciutils (<a href="https://github.com/pciutils/pciutils/blob/v3.13.0/ChangeLog">3.13.0</a> (includes <a href="https://github.com/pciutils/pciutils/blob/v3.12.0/ChangeLog">3.12.0</a>, <a href="https://github.com/pciutils/pciutils/blob/v3.10.0/ChangeLog">3.10.0</a>, <a href="https://github.com/pciutils/pciutils/releases/tag/v3.9.0">3.9.0</a>))</li>
<li>pigz (<a href="https://zlib.net/pipermail/pigz-announce_zlib.net/2023-August/000018.html">2.8</a>)</li>
<li>pinentry (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=c080b34e57d01a6ccca9d2996d7096c42b1a3f84;hb=8ab1682e80a2b4185ee9ef66cbb44340245966fc">1.2.1</a>)</li>
<li>policycoreutils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>popt (<a href="https://github.com/rpm-software-management/popt/releases/tag/popt-1.19-release">1.19</a>)</li>
<li>procps (<a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.4">4.0.4</a> (includes <a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.3">4.0.3</a>, <a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.0">4.0.0</a>))</li>
<li>protobuf (<a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.12">21.12</a> (includes <a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.11">21.11</a>, <a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.10">21.10</a>, <a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.9">21.9</a>))</li>
<li>psmisc (<a href="https://gitlab.com/psmisc/psmisc/-/blob/v23.6/ChangeLog">23.6</a>)</li>
<li>qemu-guest-agent (<a href="https://wiki.qemu.org/ChangeLog/8.2#Guest_agent">8.2.0</a> (includes <a href="https://wiki.qemu.org/ChangeLog/8.0#Guest_agent">8.0.3</a>, <a href="https://wiki.qemu.org/ChangeLog/8.0#Guest_agent">8.0.0</a>, <a href="https://wiki.qemu.org/ChangeLog/7.1#Guest_agent">7.1.0</a>))</li>
<li>quota (<a href="https://sourceforge.net/p/linuxquota/code/ci/87d2fd7635e4bca54fa2a00b8d5b073ba9ca521b/tree/Changelog">4.09</a>)</li>
<li>readline (<a href="https://git.savannah.gnu.org/cgit/readline.git/log/?id=bfe9c573a9e376323929c80b2b71c59727fab0cc">8.2_p7</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2022-09/msg00013.html">8.2</a>))</li>
<li>rpcsvc-proto (<a href="https://github.com/thkukuk/rpcsvc-proto/releases/tag/v1.4.4">1.4.4</a>)</li>
<li>rsync (<a href="https://github.com/RsyncProject/rsync/blob/v3.3.0/NEWS.md">3.3.0</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.13">1.1.13</a> (includes <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.12">1.1.12</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.9">1.1.9</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.8">1.1.8</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.7">1.1.7</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.5">1.1.5</a>))</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.18.9.html">4.18.9</a> (includes <a href="https://www.samba.org/samba/history/samba-4.18.8.html">4.18.8</a>, <a href="https://wiki.samba.org/index.php/Samba_4.18_Features_added/changed#Samba_4.18.4">4.18.4</a>))</li>
<li>sed (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html">4.9</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html">4.9</a>))</li>
<li>selinux-base (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a> (includes <a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>))</li>
<li>selinux-base-policy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a> (includes <a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>))</li>
<li>selinux-container (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a> (includes <a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>))</li>
<li>selinux-dbus (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-refpolicy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240226">2.20240226</a>)</li>
<li>selinux-sssd (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a> (includes <a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>))</li>
<li>selinux-unconfined (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a> (includes <a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>))</li>
<li>semodule-utils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>))</li>
<li>shim (<a href="https://github.com/rhboot/shim/releases/tag/15.8">15.8</a>)</li>
<li>smartmontools (<a href="https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_3">7.3</a>)</li>
<li>socat (<a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.4:/CHANGES">1.7.4.4</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_46_0.html">3.46.0</a> (includes <a href="https://www.sqlite.org/releaselog/3_45_3.html">3.45.3</a>, <a href="https://www.sqlite.org/releaselog/3_45_1.html">3.45.1</a>, <a href="https://www.sqlite.org/releaselog/3_44_2.html">3.44.2</a>, <a href="https://www.sqlite.org/releaselog/3_43_2.html">3.43.2</a>, <a href="https://sqlite.org/releaselog/3_42_0.html">3.42.0</a>, <a href="https://sqlite.org/releaselog/3_41_2.html">3.41.2</a>))</li>
<li>squashfs-tools (<a href="https://github.com/plougher/squashfs-tools/releases/tag/4.6.1">4.6.1</a> (includes <a href="https://github.com/plougher/squashfs-tools/releases/tag/4.6">4.6</a>))</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.9">6.9</a> (includes <a href="https://github.com/strace/strace/releases/tag/v6.6">6.6</a>, <a href="https://github.com/strace/strace/releases/tag/v6.4">6.4</a>, <a href="https://github.com/strace/strace/releases/tag/v6.3">6.3</a>, <a href="https://github.com/strace/strace/releases/tag/v6.2">6.2</a>, <a href="https://github.com/strace/strace/releases/tag/v6.1">6.1</a>))</li>
<li>sudo (<a href="https://www.sudo.ws/releases/stable/#1.9.15p5">1.9.15p5</a> (includes <a href="https://www.sudo.ws/releases/stable/#1.9.13p3">1.9.13p3</a>))</li>
<li>sysext-docker: docker (<a href="https://docs.docker.com/engine/release-notes/26.1/#2610">26.1.0</a> (includes <a href="https://docs.docker.com/engine/release-notes/25.0/">25.0</a>, <a href="https://github.com/moby/moby/releases/tag/v24.0.9">24.0.9</a>, <a href="https://docs.docker.com/engine/release-notes/24.0/">24.0.6</a>, <a href="https://docs.docker.com/engine/release-notes/23.0/">23.0</a>, <a href="https://docs.docker.com/engine/release-notes/20.10/#201024">20.10.24</a>))</li>
<li>sysext-podman: aardvark-dns (<a href="https://github.com/containers/aardvark-dns/releases/tag/v1.11.0">1.11.0</a>)</li>
<li>sysext-podman: containers-common (<a href="https://github.com/containers/common/releases/tag/v0.59.1">0.59.1</a>)</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.0.3">5.0.3</a>)</li>
<li>sysext-python: jaraco-text (<a href="https://github.com/jaraco/jaraco.text/compare/v3.12.0...v3.12.1">3.12.1</a>)</li>
<li>sysext-python: more-itertools (<a href="https://github.com/more-itertools/more-itertools/releases/tag/v10.4.0">10.4.0</a>)</li>
<li>sysext-python: pip (<a href="https://github.com/pypa/pip/blob/24.2/NEWS.rst">24.2</a> (includes <a href="https://github.com/pypa/pip/blob/24.1.2/NEWS.rst">24.1.2</a>))</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v72.1.0/NEWS.rst">72.1.0</a> (includes <a href="https://github.com/pypa/setuptools/blob/v71.1.0/NEWS.rst">71.1.0</a>, <a href="https://github.com/pypa/setuptools/blob/v71.0.0/NEWS.rst">71.0.0</a>, <a href="https://github.com/pypa/setuptools/blob/v70.3.0/NEWS.rst">70.3.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v70-1-1">70.1.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v70-1-0">70.1.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v70-0-0">70.0.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-5-1">69.5.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-5-0">69.5.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-2">69.4.2</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-1">69.4.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-0">69.4.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-3-1">69.3.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-3-0">69.3.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-2-0">69.2.0</a>))</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/compare/2024.5.22...2024.7.2">2024.7.2</a>)</li>
<li>sysext-python: wheel (<a href="https://github.com/pypa/wheel/releases/tag/0.44.0">0.44.0</a>)</li>
<li>sysext-zfs: zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.5">2.2.5</a> (includes <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.4">2.2.4</a>))</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/commits/v255.8/">255.8</a> (includes <a href="https://github.com/systemd/systemd-stable/commits/v255.4/">255.4</a>, <a href="https://github.com/systemd/systemd-stable/releases/tag/v255.3">255.3</a>))</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/791e2817e13182344447590313f7e372a27c1d48">2.4.1</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/5224ed98eeba43f22b5f5f87de5947fbb1c1c7c1">2.4.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/0189ccf9fc3d2a77cc83cffe180e307bcdccebb4">2.3.4</a>))</li>
<li>tar (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html">1.35</a>)</li>
<li>tcpdump (<a href="https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.4/CHANGES">4.99.4</a>)</li>
<li>tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/b649c7d3c2b1e13e900c80ff7a20959a70b1c528">1.4.9</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/eab796a4f9172e602dc262f3c99ead35b35929e7">1.4.8</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/27ceb1c3ad786386e746a5e2968780d791393b9e">1.4.7</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/1c776e54cf33b46b2ed73263f093d596a0cdbb2f">1.4.6</a>))</li>
<li>tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/6a80d170bca0c938f78ab12e37481b52792a9d83">0.15.0</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/d80f28b081e515e32a480daf80b42cf782447a9c">0.14.1</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/3c6d28ebae27dba8e40558ae37ae8138ea0b4bdc">0.14.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/63d4db63feda920c8020f8484a8b31065b7f1380">0.13.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/53692735c733d01acbd953641f831a1f5e0cf6c5">0.12.1</a>))</li>
<li>thin-provisioning-tools (<a href="https://github.com/jthornber/thin-provisioning-tools/commits/v1.0.10/">1.0.10</a> (includes <a href="https://github.com/jthornber/thin-provisioning-tools/blob/v1.0.6/CHANGES">1.0.6</a>))</li>
<li>tpm2-tools (<a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7">5.7</a> (includes <a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6.1">5.6.1</a>, <a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6">5.6</a>))</li>
<li>tpm2-tss (<a href="https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.3">4.1.3</a> (includes <a href="https://github.com/tpm2-software/tpm2-tss/releases/tag/4.0.2">4.0.2</a>))</li>
<li>traceroute (<a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.5/">2.1.5</a> (includes <a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute%202.1.4/">2.1.4</a>, <a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/">2.1.3</a>, 2.1.1))</li>
<li>usbutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v017">017</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v016">016</a>, <a href="https://github.com/gregkh/usbutils/blob/79b796f945ea7d5c2b0e2a74f9b8819cb7948680/NEWS">015</a>))</li>
<li>userspace-rcu (<a href="https://github.com/urcu/userspace-rcu/blob/v0.13.2/ChangeLog">0.14.0</a>)</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/blob/v2.39.4/Documentation/releases/v2.39.4-ReleaseNotes">2.39.4</a> (includes <a href="https://github.com/util-linux/util-linux/blob/v2.39.3/Documentation/releases/v2.39.3-ReleaseNotes">2.39.3</a>, <a href="https://github.com/util-linux/util-linux/blob/v2.39.2/Documentation/releases/v2.39.2-ReleaseNotes">2.39.2</a>, <a href="https://github.com/util-linux/util-linux/releases/tag/v2.38.1">2.38.1</a>))</li>
<li>vim (<a href="https://github.com/vim/vim/commits/v9.1.0366/">9.1.0366</a> (includes <a href="https://www.vim.org/vim-9.1-released.php">9.1</a>, <a href="https://github.com/vim/vim/commits/v9.0.2167/">9.0.2167</a>, <a href="https://github.com/vim/vim/commits/v9.0.2092/">9.0.2092</a>, <a href="https://github.com/vim/vim/commits/v9.0.1678">9.0.1678</a>, <a href="https://github.com/vim/vim/commits/v9.0.1677">9.0.1677</a>, <a href="https://github.com/vim/vim/commits/v9.0.1503">9.0.1503</a>, <a href="https://github.com/vim/vim/releases/tag/v9.0.1403">9.0.1403</a>, <a href="https://github.com/vim/vim/releases/tag/v9.0.1363">9.0.1363</a>))</li>
<li>VMWare: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.5">12.4.5</a> (includes <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.0">12.4.0</a>, <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.0">12.2.0</a>))</li>
<li>wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00002.html">1.24.5</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00003.html">1.21.4</a>))</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.21/debian/changelog">5.5.21</a> (includes <a href="https://github.com/rfc1036/whois/blob/v5.5.20/debian/changelog">5.5.20</a>, <a href="https://github.com/rfc1036/whois/blob/v5.5.18/debian/changelog">5.5.18</a>, <a href="https://github.com/rfc1036/whois/commit/bac7108b01cfd54c517444efa1239e10e6edd5a4">5.5.17</a>))</li>
<li>xfsprogs (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.8.0">6.8.0</a> (includes <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.6.0">6.6.0</a>, <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.4.0">6.4.0</a>, <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.3.0">6.3.0</a>))</li>
<li>xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.3">1.3.3</a> (includes <a href="https://github.com/lsh123/xmlsec/releases/tag/xmlsec_1_3_2">1.3.2</a>))</li>
<li>xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.6.2">5.6.2</a> (includes <a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.6">5.4.6</a>, <a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.5">5.4.5</a>, <a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=2f4d35adca6198671434d2988803cc9316ad1ec8;hb=dbb3a536ed9873ffa0870321f6873e564c6a9da8">5.4.3</a>, <a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.2">5.4.2</a>))</li>
<li>zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.3">2.2.3</a>)</li>
<li>zlib (<a href="https://github.com/madler/zlib/releases/tag/v1.3.1">1.3.1</a> (includes <a href="https://github.com/madler/zlib/releases/tag/v1.3">1.3</a>))</li>
<li>zstd (<a href="https://github.com/facebook/zstd/releases/tag/v1.5.6">1.5.6</a> (includes <a href="https://github.com/facebook/zstd/releases/tag/v1.5.5">1.5.5</a>, <a href="https://github.com/facebook/zstd/releases/tag/v1.5.4">1.5.4</a>, <a href="https://github.com/facebook/zstd/releases/tag/v1.5.2">1.5.2</a>, <a href="https://github.com/facebook/zstd/releases/tag/v1.5.1">1.5.1</a>, <a href="https://github.com/facebook/zstd/releases/tag/v1.5.0">1.5.0</a>))</li>
</ul>
<p><em>Changes since <strong>Stable 4081.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23128">CVE-2025-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23125">CVE-2025-23125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48875">CVE-2024-48875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41935">CVE-2024-41935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56785">CVE-2024-56785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56781">CVE-2024-56781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56628">CVE-2024-56628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56627">CVE-2024-56627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56626">CVE-2024-56626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56613">CVE-2024-56613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56586">CVE-2024-56586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56585">CVE-2024-56585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56597">CVE-2024-56597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56596">CVE-2024-56596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56595">CVE-2024-56595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56565">CVE-2024-56565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53196">CVE-2024-53196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53687">CVE-2024-53687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53690">CVE-2024-53690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57946">CVE-2024-57946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56766">CVE-2024-56766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56765">CVE-2024-56765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56763">CVE-2024-56763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56762">CVE-2024-56762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56769">CVE-2024-56769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56767">CVE-2024-56767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57938">CVE-2024-57938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57933">CVE-2024-57933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57932">CVE-2024-57932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57930">CVE-2024-57930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57931">CVE-2024-57931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57841">CVE-2024-57841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57802">CVE-2024-57802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57801">CVE-2024-57801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39282">CVE-2024-39282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36476">CVE-2024-36476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57896">CVE-2024-57896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21629">CVE-2025-21629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57903">CVE-2024-57903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57902">CVE-2024-57902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57901">CVE-2024-57901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57900">CVE-2024-57900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57899">CVE-2024-57899</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57897">CVE-2024-57897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57890">CVE-2024-57890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57889">CVE-2024-57889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57887">CVE-2024-57887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57885">CVE-2024-57885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57884">CVE-2024-57884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57895">CVE-2024-57895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57894">CVE-2024-57894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57893">CVE-2024-57893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57892">CVE-2024-57892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57882">CVE-2024-57882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21658">CVE-2025-21658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21656">CVE-2025-21656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57945">CVE-2024-57945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21664">CVE-2025-21664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21663">CVE-2025-21663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21662">CVE-2025-21662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21660">CVE-2025-21660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57939">CVE-2024-57939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57940">CVE-2024-57940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21655">CVE-2025-21655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57913">CVE-2024-57913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57912">CVE-2024-57912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57911">CVE-2024-57911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57910">CVE-2024-57910</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57908">CVE-2024-57908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57907">CVE-2024-57907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57929">CVE-2024-57929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57926">CVE-2024-57926</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57925">CVE-2024-57925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57906">CVE-2024-57906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57922">CVE-2024-57922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57917">CVE-2024-57917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57916">CVE-2024-57916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57915">CVE-2024-57915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57904">CVE-2024-57904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21654">CVE-2025-21654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21653">CVE-2025-21653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21652">CVE-2025-21652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21640">CVE-2025-21640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21639">CVE-2025-21639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21638">CVE-2025-21638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21637">CVE-2025-21637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21636">CVE-2025-21636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21648">CVE-2025-21648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21647">CVE-2025-21647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21646">CVE-2025-21646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21645">CVE-2025-21645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21642">CVE-2025-21642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21631">CVE-2025-21631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21632">CVE-2025-21632</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.74">6.6.74</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.73">6.6.73</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.72">6.6.72</a>, <a href="https://lwn.net/Articles/1004703">6.6.71</a>, <a href="https://lwn.net/Articles/1004551">6.6.70</a>, <a href="https://lwn.net/Articles/1003986">6.6.69</a>, <a href="https://lwn.net/Articles/1003609">6.6.68</a>, <a href="https://lwn.net/Articles/1002919">6.6.67</a>, <a href="https://lwn.net/Articles/1002177">6.6.66</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.74</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.3.0"/>
    <published>2025-01-30T18:31:43+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3510.3.8</id>
    <title>3510.3.8</title>
    <updated>2026-03-09T16:26:29.574135+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3510.3.7</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48771">CVE-2022-48771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37937">CVE-2025-37937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37889">CVE-2025-37889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38575">CVE-2025-38575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38152">CVE-2025-38152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39735">CVE-2025-39735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39728">CVE-2025-39728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38637">CVE-2025-38637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23138">CVE-2025-23138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23136">CVE-2025-23136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22066">CVE-2025-22066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22075">CVE-2025-22075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22073">CVE-2025-22073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22071">CVE-2025-22071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22089">CVE-2025-22089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22086">CVE-2025-22086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22081">CVE-2025-22081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22079">CVE-2025-22079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22063">CVE-2025-22063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22060">CVE-2025-22060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22054">CVE-2025-22054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22035">CVE-2025-22035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22050">CVE-2025-22050</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22045">CVE-2025-22045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22044">CVE-2025-22044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22025">CVE-2025-22025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-53034">CVE-2023-53034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22021">CVE-2025-22021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22018">CVE-2025-22018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37989">CVE-2025-37989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37985">CVE-2025-37985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37983">CVE-2025-37983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37982">CVE-2025-37982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37940">CVE-2025-37940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37892">CVE-2025-37892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37885">CVE-2025-37885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37883">CVE-2025-37883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37881">CVE-2025-37881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37871">CVE-2025-37871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37867">CVE-2025-37867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37875">CVE-2025-37875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37844">CVE-2025-37844</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37841">CVE-2025-37841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37840">CVE-2025-37840</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37862">CVE-2025-37862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37859">CVE-2025-37859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37858">CVE-2025-37858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37857">CVE-2025-37857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37839">CVE-2025-37839</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37851">CVE-2025-37851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37850">CVE-2025-37850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37836">CVE-2025-37836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37830">CVE-2025-37830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37829">CVE-2025-37829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37824">CVE-2025-37824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37808">CVE-2025-37808</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37805">CVE-2025-37805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37803">CVE-2025-37803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37817">CVE-2025-37817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37812">CVE-2025-37812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37811">CVE-2025-37811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37810">CVE-2025-37810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37990">CVE-2025-37990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37991">CVE-2025-37991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37927">CVE-2025-37927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37923">CVE-2025-37923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37930">CVE-2025-37930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37929">CVE-2025-37929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37915">CVE-2025-37915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37914">CVE-2025-37914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37913">CVE-2025-37913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37912">CVE-2025-37912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37911">CVE-2025-37911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37909">CVE-2025-37909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37905">CVE-2025-37905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37998">CVE-2025-37998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37997">CVE-2025-37997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37995">CVE-2025-37995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37994">CVE-2025-37994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37970">CVE-2025-37970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37969">CVE-2025-37969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37964">CVE-2025-37964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37949">CVE-2025-37949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38094">CVE-2025-38094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38009">CVE-2025-38009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38024">CVE-2025-38024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38023">CVE-2025-38023</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38005">CVE-2025-38005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37992">CVE-2025-37992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38061">CVE-2025-38061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38058">CVE-2025-38058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38078">CVE-2025-38078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38077">CVE-2025-38077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38072">CVE-2025-38072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38068">CVE-2025-38068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38066">CVE-2025-38066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38065">CVE-2025-38065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38037">CVE-2025-38037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38035">CVE-2025-38035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38034">CVE-2025-38034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38051">CVE-2025-38051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38031">CVE-2025-38031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38048">CVE-2025-38048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38046">CVE-2025-38046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38044">CVE-2025-38044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38043">CVE-2025-38043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38030">CVE-2025-38030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38003">CVE-2025-38003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38004">CVE-2025-38004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38001">CVE-2025-38001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38498">CVE-2025-38498</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38428">CVE-2025-38428</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38424">CVE-2025-38424</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38430">CVE-2025-38430</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38420">CVE-2025-38420</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38419">CVE-2025-38419</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38418">CVE-2025-38418</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38416">CVE-2025-38416</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38415">CVE-2025-38415</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38346">CVE-2025-38346</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38348">CVE-2025-38348</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38328">CVE-2025-38328</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38326">CVE-2025-38326</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38324">CVE-2025-38324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38323">CVE-2025-38323</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38345">CVE-2025-38345</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38344">CVE-2025-38344</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38342">CVE-2025-38342</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38337">CVE-2025-38337</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38336">CVE-2025-38336</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38332">CVE-2025-38332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38320">CVE-2025-38320</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38313">CVE-2025-38313</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38312">CVE-2025-38312</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38310">CVE-2025-38310</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38319">CVE-2025-38319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38273">CVE-2025-38273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38305">CVE-2025-38305</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38298">CVE-2025-38298</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38293">CVE-2025-38293</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38286">CVE-2025-38286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38285">CVE-2025-38285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38280">CVE-2025-38280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38237">CVE-2025-38237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38219">CVE-2025-38219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38218">CVE-2025-38218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38214">CVE-2025-38214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38231">CVE-2025-38231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38212">CVE-2025-38212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38229">CVE-2025-38229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38227">CVE-2025-38227</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38226">CVE-2025-38226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38222">CVE-2025-38222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38185">CVE-2025-38185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38206">CVE-2025-38206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38204">CVE-2025-38204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38203">CVE-2025-38203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38197">CVE-2025-38197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38194">CVE-2025-38194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38193">CVE-2025-38193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38190">CVE-2025-38190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38174">CVE-2025-38174</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38163">CVE-2025-38163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38167">CVE-2025-38167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38173">CVE-2025-38173</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38138">CVE-2025-38138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38136">CVE-2025-38136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38135">CVE-2025-38135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38161">CVE-2025-38161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38160">CVE-2025-38160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38157">CVE-2025-38157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38154">CVE-2025-38154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38153">CVE-2025-38153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38147">CVE-2025-38147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38146">CVE-2025-38146</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38145">CVE-2025-38145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38143">CVE-2025-38143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38108">CVE-2025-38108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38107">CVE-2025-38107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38103">CVE-2025-38103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38122">CVE-2025-38122</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38102">CVE-2025-38102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38120">CVE-2025-38120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38119">CVE-2025-38119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38115">CVE-2025-38115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38112">CVE-2025-38112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38111">CVE-2025-38111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38100">CVE-2025-38100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38088">CVE-2025-38088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38090">CVE-2025-38090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38086">CVE-2025-38086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38412">CVE-2025-38412</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38410">CVE-2025-38410</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38406">CVE-2025-38406</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38403">CVE-2025-38403</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38401">CVE-2025-38401</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38377">CVE-2025-38377</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38400">CVE-2025-38400</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38399">CVE-2025-38399</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38395">CVE-2025-38395</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38393">CVE-2025-38393</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38391">CVE-2025-38391</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38389">CVE-2025-38389</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38387">CVE-2025-38387</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38386">CVE-2025-38386</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38384">CVE-2025-38384</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38371">CVE-2025-38371</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38362">CVE-2025-38362</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38363">CVE-2025-38363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38546">CVE-2025-38546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38542">CVE-2025-38542</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38540">CVE-2025-38540</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38516">CVE-2025-38516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38515">CVE-2025-38515</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38514">CVE-2025-38514</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38513">CVE-2025-38513</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38460">CVE-2025-38460</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38467">CVE-2025-38467</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38466">CVE-2025-38466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38465">CVE-2025-38465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38464">CVE-2025-38464</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38462">CVE-2025-38462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38461">CVE-2025-38461</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38445">CVE-2025-38445</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38444">CVE-2025-38444</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38443">CVE-2025-38443</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38441">CVE-2025-38441</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38458">CVE-2025-38458</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38457">CVE-2025-38457</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38439">CVE-2025-38439</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38448">CVE-2025-38448</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38375">CVE-2025-38375</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.189">5.15.189</a> includes (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.188">5.15.188</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.187">5.15.187</a>, <a href="https://lwn.net/Articles/1027283/">5.15.186</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.185">5.15.185</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.184">5.15.184</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.183">5.15.183</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.182">5.15.182</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.181">5.15.181</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.180">5.15.180</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html">3.114</a> includes (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html">3.113</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html">3.113.1</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html">3.112</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html">3.111</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html">3.110</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.189</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.3.8"/>
    <published>2025-08-19T13:11:03+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3510.3.7</id>
    <title>3510.3.7</title>
    <updated>2026-03-09T16:26:29.551100+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3510.3.6</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23128">CVE-2025-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57838">CVE-2024-57838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56785">CVE-2024-56785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56781">CVE-2024-56781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56780">CVE-2024-56780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56779">CVE-2024-56779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56778">CVE-2024-56778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56777">CVE-2024-56777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56776">CVE-2024-56776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56774">CVE-2024-56774</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56754">CVE-2024-56754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56756">CVE-2024-56756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56728">CVE-2024-56728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56726">CVE-2024-56726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56724">CVE-2024-56724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56723">CVE-2024-56723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56748">CVE-2024-56748</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56747">CVE-2024-56747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56746">CVE-2024-56746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56745">CVE-2024-56745</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56741">CVE-2024-56741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56739">CVE-2024-56739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56720">CVE-2024-56720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56694">CVE-2024-56694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56701">CVE-2024-56701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56700">CVE-2024-56700</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56698">CVE-2024-56698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56708">CVE-2024-56708</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56705">CVE-2024-56705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56704">CVE-2024-56704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56681">CVE-2024-56681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56679">CVE-2024-56679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56678">CVE-2024-56678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56693">CVE-2024-56693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56691">CVE-2024-56691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56690">CVE-2024-56690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56688">CVE-2024-56688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56586">CVE-2024-56586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56597">CVE-2024-56597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56596">CVE-2024-56596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56595">CVE-2024-56595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56562">CVE-2024-56562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56581">CVE-2024-56581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56578">CVE-2024-56578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56576">CVE-2024-56576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56558">CVE-2024-56558</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56575">CVE-2024-56575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56574">CVE-2024-56574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56572">CVE-2024-56572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56571">CVE-2024-56571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56570">CVE-2024-56570</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56569">CVE-2024-56569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56567">CVE-2024-56567</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56539">CVE-2024-56539</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56533">CVE-2024-56533</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56548">CVE-2024-56548</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56531">CVE-2024-56531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56532">CVE-2024-56532</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53217">CVE-2024-53217</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53215">CVE-2024-53215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53239">CVE-2024-53239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53237">CVE-2024-53237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53214">CVE-2024-53214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53227">CVE-2024-53227</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53226">CVE-2024-53226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53180">CVE-2024-53180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53184">CVE-2024-53184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53183">CVE-2024-53183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53206">CVE-2024-53206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53198">CVE-2024-53198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53197">CVE-2024-53197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53194">CVE-2024-53194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53181">CVE-2024-53181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53172">CVE-2024-53172</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53171">CVE-2024-53171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53174">CVE-2024-53174</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-49034">CVE-2022-49034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53165">CVE-2024-53165</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53151">CVE-2024-53151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53150">CVE-2024-53150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53148">CVE-2024-53148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53161">CVE-2024-53161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53158">CVE-2024-53158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53157">CVE-2024-53157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53156">CVE-2024-53156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53155">CVE-2024-53155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53145">CVE-2024-53145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53146">CVE-2024-53146</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58087">CVE-2024-58087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57946">CVE-2024-57946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57938">CVE-2024-57938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57931">CVE-2024-57931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57841">CVE-2024-57841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57802">CVE-2024-57802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36476">CVE-2024-36476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57896">CVE-2024-57896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57903">CVE-2024-57903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57902">CVE-2024-57902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57901">CVE-2024-57901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57900">CVE-2024-57900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57897">CVE-2024-57897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57890">CVE-2024-57890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57889">CVE-2024-57889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57884">CVE-2024-57884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53690">CVE-2024-53690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21697">CVE-2025-21697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57951">CVE-2024-57951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21694">CVE-2025-21694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21669">CVE-2025-21669</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21666">CVE-2025-21666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21683">CVE-2025-21683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21680">CVE-2025-21680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21678">CVE-2025-21678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57948">CVE-2024-57948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21665">CVE-2025-21665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21699">CVE-2025-21699</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21698">CVE-2025-21698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21687">CVE-2025-21687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21692">CVE-2025-21692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21690">CVE-2025-21690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21689">CVE-2025-21689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21688">CVE-2025-21688</a></li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added new image signing pub key to <code>flatcar-install</code>, needed for download verification of releases built from March 2025 onwards, if you have copies of <code>flatcar-install</code> or the image signing pub key, you need to update them as well (<a href="https://github.com/flatcar/init/pull/129">init#129</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.179">5.15.179</a> (includes <a href="https://lwn.net/Articles/1002179">5.15.174</a>, <a href="https://lwn.net/Articles/1002921">5.15.175</a>, <a href="https://lwn.net/Articles/1004553">5.15.176</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.177">5.15.177</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.178">5.15.178</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html">3.109</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.179</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.3.7"/>
    <published>2025-03-20T14:08:13+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3510.3.6</id>
    <title>3510.3.6</title>
    <updated>2026-03-09T16:26:29.507451+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3510.3.5</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42094">CVE-2024-42094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42084">CVE-2024-42084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42068">CVE-2024-42068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41006">CVE-2024-41006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41005">CVE-2024-41005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41004">CVE-2024-41004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41002">CVE-2024-41002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41000">CVE-2024-41000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40990">CVE-2024-40990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40987">CVE-2024-40987</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40970">CVE-2024-40970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40976">CVE-2024-40976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40974">CVE-2024-40974</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40981">CVE-2024-40981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40980">CVE-2024-40980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40971">CVE-2024-40971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40968">CVE-2024-40968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40967">CVE-2024-40967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40963">CVE-2024-40963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40957">CVE-2024-40957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40934">CVE-2024-40934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40932">CVE-2024-40932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40945">CVE-2024-40945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40943">CVE-2024-40943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40942">CVE-2024-40942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40916">CVE-2024-40916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40914">CVE-2024-40914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39503">CVE-2024-39503</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40908">CVE-2024-40908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39509">CVE-2024-39509</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39507">CVE-2024-39507</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39505">CVE-2024-39505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39495">CVE-2024-39495</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42247">CVE-2024-42247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42236">CVE-2024-42236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42153">CVE-2024-42153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42116">CVE-2024-42116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42143">CVE-2024-42143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42140">CVE-2024-42140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42103">CVE-2024-42103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42102">CVE-2024-42102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42109">CVE-2024-42109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41055">CVE-2024-41055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41027">CVE-2024-41027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41047">CVE-2024-41047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41046">CVE-2024-41046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41034">CVE-2024-41034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41077">CVE-2024-41077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41022">CVE-2024-41022</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41020">CVE-2024-41020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41019">CVE-2024-41019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41017">CVE-2024-41017</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41015">CVE-2024-41015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44971">CVE-2024-44971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44969">CVE-2024-44969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44966">CVE-2024-44966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44954">CVE-2024-44954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44952">CVE-2024-44952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44965">CVE-2024-44965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44960">CVE-2024-44960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44958">CVE-2024-44958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44948">CVE-2024-44948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44934">CVE-2024-44934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43875">CVE-2024-43875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43869">CVE-2024-43869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43870">CVE-2024-43870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52918">CVE-2023-52918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46707">CVE-2024-46707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46702">CVE-2024-46702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45028">CVE-2024-45028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45011">CVE-2024-45011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45025">CVE-2024-45025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44999">CVE-2024-44999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44998">CVE-2024-44998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44995">CVE-2024-44995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45008">CVE-2024-45008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45007">CVE-2024-45007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45006">CVE-2024-45006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45003">CVE-2024-45003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44983">CVE-2024-44983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44982">CVE-2024-44982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44988">CVE-2024-44988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44986">CVE-2024-44986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44985">CVE-2024-44985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47669">CVE-2024-47669</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47667">CVE-2024-47667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47665">CVE-2024-47665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47663">CVE-2024-47663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47660">CVE-2024-47660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47659">CVE-2024-47659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46840">CVE-2024-46840</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46839">CVE-2024-46839</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46844">CVE-2024-46844</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46832">CVE-2024-46832</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46829">CVE-2024-46829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46795">CVE-2024-46795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46763">CVE-2024-46763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46782">CVE-2024-46782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46777">CVE-2024-46777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46740">CVE-2024-46740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46757">CVE-2024-46757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46734">CVE-2024-46734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46721">CVE-2024-46721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46713">CVE-2024-46713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50191">CVE-2024-50191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50181">CVE-2024-50181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50040">CVE-2024-50040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50039">CVE-2024-50039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50038">CVE-2024-50038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49997">CVE-2024-49997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49977">CVE-2024-49977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49952">CVE-2024-49952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49948">CVE-2024-49948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49944">CVE-2024-49944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49927">CVE-2024-49927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49889">CVE-2024-49889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49858">CVE-2024-49858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49856">CVE-2024-49856</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49852">CVE-2024-49852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47735">CVE-2024-47735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47734">CVE-2024-47734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47756">CVE-2024-47756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47749">CVE-2024-47749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47742">CVE-2024-47742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47740">CVE-2024-47740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47723">CVE-2024-47723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47722">CVE-2024-47722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47712">CVE-2024-47712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47709">CVE-2024-47709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47720">CVE-2024-47720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47701">CVE-2024-47701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47699">CVE-2024-47699</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47698">CVE-2024-47698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47697">CVE-2024-47697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47696">CVE-2024-47696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47695">CVE-2024-47695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47693">CVE-2024-47693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47690">CVE-2024-47690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50202">CVE-2024-50202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50185">CVE-2024-50185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50101">CVE-2024-50101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50085">CVE-2024-50085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50083">CVE-2024-50083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50210">CVE-2024-50210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50163">CVE-2024-50163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50162">CVE-2024-50162</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50168">CVE-2024-50168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50142">CVE-2024-50142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50151">CVE-2024-50151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53042">CVE-2024-53042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53059">CVE-2024-53059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53057">CVE-2024-53057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53058">CVE-2024-53058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53055">CVE-2024-53055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50262">CVE-2024-50262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50257">CVE-2024-50257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50251">CVE-2024-50251</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50247">CVE-2024-50247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50245">CVE-2024-50245</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50244">CVE-2024-50244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50219">CVE-2024-50219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53103">CVE-2024-53103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53066">CVE-2024-53066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53070">CVE-2024-53070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53052">CVE-2024-53052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50296">CVE-2024-50296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50295">CVE-2024-50295</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50292">CVE-2024-50292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50299">CVE-2024-50299</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50278">CVE-2024-50278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50287">CVE-2024-50287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50273">CVE-2024-50273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50269">CVE-2024-50269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50268">CVE-2024-50268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50265">CVE-2024-50265</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53101">CVE-2024-53101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53097">CVE-2024-53097</a>)</li>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9143">CVE-2024-9143</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Equinix Metal: fixed race condition on 'mount' Ignition stage (<a href="https://github.com/flatcar/scripts/pull/2308">scripts#2308</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/998452">5.15.173</a> (includes <a href="https://lwn.net/Articles/998152">5.15.172</a>, <a href="https://lwn.net/Articles/997530">5.15.171</a>, <a href="https://lwn.net/Articles/996691">5.15.170</a>, <a href="https://lwn.net/Articles/995134">5.15.169</a>, <a href="https://lwn.net/Articles/994636">5.15.168</a>, <a href="https://lwn.net/Articles/990047">5.15.167</a>, <a href="https://lwn.net/Articles/988751">5.15.166</a>, <a href="https://lwn.net/Articles/986233">5.15.165</a>, <a href="https://lwn.net/Articles/983657">5.15.164</a>, <a href="https://lwn.net/Articles/982384">5.15.163</a>, <a href="https://lwn.net/Articles/980862">5.15.162</a>))</li>
<li>OpenSSL (<a href="https://github.com/openssl/openssl/blob/openssl-3.0/CHANGES.md#openssl-30">3.0.15</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html">3.107</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html">3.106</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html">3.105</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_104.html">3.104</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_103.html">3.103</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102.html">3.102</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102_1.html">3.102.1</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101_1.html">3.101.1</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.173</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.3.6"/>
    <published>2024-12-16T14:13:08+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3510.3.5</id>
    <title>3510.3.5</title>
    <updated>2026-03-09T16:26:29.491071+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3510.3.4</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387">CVE-2024-6387</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.161</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.3.5"/>
    <published>2024-07-02T13:35:44+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3510.3.4</id>
    <title>3510.3.4</title>
    <updated>2026-03-09T16:26:29.486919+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3510.3.3</strong></em></p>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/978595">5.15.161</a> (includes <a href="https://lwn.net/Articles/975078">5.15.160</a>, <a href="https://lwn.net/Articles/974075">5.15.159</a>, <a href="https://lwn.net/Articles/972213">5.15.158</a>, <a href="https://lwn.net/Articles/971365">5.15.157</a>, <a href="https://lwn.net/Articles/970174">5.15.156</a> and <a href="https://lwn.net/Articles/969736">5.15.155</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101.html">3.101</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_100.html">3.100</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.161</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.3.4"/>
    <published>2024-06-26T13:05:46+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3510.3.3</id>
    <title>3510.3.3</title>
    <updated>2026-03-09T16:26:29.472663+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3510.3.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52435">CVE-2023-52435</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52491">CVE-2023-52491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52493">CVE-2023-52493</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52494">CVE-2023-52494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52498">CVE-2023-52498</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52587">CVE-2023-52587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52588">CVE-2023-52588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52594">CVE-2023-52594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52595">CVE-2023-52595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52598">CVE-2023-52598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52599">CVE-2023-52599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52600">CVE-2023-52600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52601">CVE-2023-52601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52602">CVE-2023-52602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52603">CVE-2023-52603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52604">CVE-2023-52604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52606">CVE-2023-52606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52608">CVE-2023-52608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52614">CVE-2023-52614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52615">CVE-2023-52615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52617">CVE-2023-52617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52618">CVE-2023-52618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52619">CVE-2023-52619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52620">CVE-2023-52620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52622">CVE-2023-52622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52623">CVE-2023-52623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52627">CVE-2023-52627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52630">CVE-2023-52630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52631">CVE-2023-52631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52633">CVE-2023-52633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52635">CVE-2023-52635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52637">CVE-2023-52637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52638">CVE-2023-52638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52640">CVE-2023-52640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52641">CVE-2023-52641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0340">CVE-2024-0340</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26592">CVE-2024-26592</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26594">CVE-2024-26594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26606">CVE-2024-26606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26608">CVE-2024-26608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26625">CVE-2024-26625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26627">CVE-2024-26627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26635">CVE-2024-26635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26636">CVE-2024-26636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26641">CVE-2024-26641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26644">CVE-2024-26644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26645">CVE-2024-26645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26660">CVE-2024-26660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26663">CVE-2024-26663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26665">CVE-2024-26665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26675">CVE-2024-26675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26676">CVE-2024-26676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26679">CVE-2024-26679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26684">CVE-2024-26684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26685">CVE-2024-26685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26696">CVE-2024-26696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26697">CVE-2024-26697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26698">CVE-2024-26698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26702">CVE-2024-26702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26707">CVE-2024-26707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26712">CVE-2024-26712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26715">CVE-2024-26715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26717">CVE-2024-26717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26736">CVE-2024-26736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26743">CVE-2024-26743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26744">CVE-2024-26744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26747">CVE-2024-26747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26748">CVE-2024-26748</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26749">CVE-2024-26749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26751">CVE-2024-26751</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26752">CVE-2024-26752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26754">CVE-2024-26754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26763">CVE-2024-26763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26769">CVE-2024-26769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26771">CVE-2024-26771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26772">CVE-2024-26772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26774">CVE-2024-26774</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26776">CVE-2024-26776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26777">CVE-2024-26777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26778">CVE-2024-26778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26779">CVE-2024-26779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26787">CVE-2024-26787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26788">CVE-2024-26788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26790">CVE-2024-26790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26791">CVE-2024-26791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26793">CVE-2024-26793</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26795">CVE-2024-26795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26798">CVE-2024-26798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26802">CVE-2024-26802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26803">CVE-2024-26803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26805">CVE-2024-26805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26809">CVE-2024-26809</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed <code>toolbox</code> to prevent mounted <code>ctr</code> snapshots from being garbage-collected (<a href="https://github.com/flatcar/toolbox/pull/9">toolbox#9</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>SDK: Unified qemu image formats, so that the <code>qemu_uefi</code> build target provides the regular <code>qemu</code> and the <code>qemu_uefi_secure</code> artifacts (<a href="https://github.com/flatcar/scripts/pull/1847">scripts#1847</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/969357">5.15.154</a> (includes <a href="https://lwn.net/Articles/966760">5.15.153</a>, <a href="https://lwn.net/Articles/965608">5.15.152</a>, <a href="https://lwn.net/Articles/964564">5.15.151</a>, <a href="https://lwn.net/Articles/964175">5.15.150</a>, <a href="https://lwn.net/Articles/963359">5.15.149</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_99.html">3.99</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html">3.98</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.154</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.3.3"/>
    <published>2024-04-16T11:53:54+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3510.3.2</id>
    <title>3510.3.2</title>
    <updated>2026-03-09T16:26:29.461188+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3510.3.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47940">CVE-2022-47940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1193">CVE-2023-1193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1194">CVE-2023-1194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32247">CVE-2023-32247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32250">CVE-2023-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32252">CVE-2023-32252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32254">CVE-2023-32254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32257">CVE-2023-32257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32258">CVE-2023-32258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38427">CVE-2023-38427</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38430">CVE-2023-38430</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38431">CVE-2023-38431</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3867">CVE-2023-3867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46343">CVE-2023-46343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51781">CVE-2023-51781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0584">CVE-2024-0584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0646">CVE-2024-0646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22705">CVE-2024-22705</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Forwarded the proxy environment variables of <code>update-engine.service</code> to the postinstall script to support fetching OEM systemd-sysext payloads through a proxy (<a href="https://github.com/flatcar/Flatcar/issues/1326">Flatcar#1326</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added a <code>flatcar-update --oem-payloads &lt;yes|no&gt;</code> flag to skip providing OEM payloads, e.g., for downgrades (<a href="https://github.com/flatcar/init/pull/114">init#114</a>)</li>
<li>Backported the OEM payload support to update-engine to avoid the fallback download path for clients on a restricted network and rather use the URLs passed from <code>flatcar-update -E</code> or with self-hosted Nebraska payloads (<a href="https://github.com/flatcar/Flatcar/issues/1332">Flatcar#1332</a>, <a href="https://github.com/flatcar/Flatcar/issues/1326">Flatcar#1326</a>)</li>
<li>Brightbox: The regular OpenStack image should now be used, it includes Afterburn for instance metadata attributes</li>
<li>OpenStack: An uncompressed image is provided for simpler import (since the images use qcow2 inline compression, there is no benefit in using the <code>.gz</code> or <code>.bz2</code> images)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/959514">5.15.148</a> (includes <a href="https://lwn.net/Articles/958344">5.15.147</a>, <a href="https://lwn.net/Articles/957010">5.15.146</a>, <a href="https://lwn.net/Articles/956081">5.15.145</a>, <a href="https://lwn.net/Articles/955815">5.15.144</a>, <a href="https://lwn.net/Articles/954988/">5.15.143</a>, <a href="https://lwn.net/Articles/954114">5.15.142</a>, <a href="https://lwn.net/Articles/953649/">5.15.141</a>, <a href="https://lwn.net/Articles/953130">5.15.140</a>, <a href="https://lwn.net/Articles/952004">5.15.139</a>, <a href="https://lwn.net/Articles/950714">5.15.138</a>, <a href="https://lwn.net/Articles/948818">5.15.137</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_97.html">3.97</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html">3.96.1</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html">3.96</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html">3.95</a>))</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.12">1.1.12</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.148</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.3.2"/>
    <published>2024-02-14T04:35:42+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3510.3.1</id>
    <title>3510.3.1</title>
    <updated>2026-03-09T16:26:29.454385+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3510.3.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Disabled systemd-networkd's RoutesToDNS setting by default to fix provisioning failures observed in VMs with multiple network interfaces on Azure (<a href="https://github.com/flatcar/scripts/pull/1206">scripts#1206</a>)</li>
<li>Triggered re-reading of partition table to fix adding partitions to the boot disk (<a href="https://github.com/flatcar/scripts/pull/1202">scripts#1202</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>To make Kubernetes work by default, <code>/usr/libexec/kubernetes/kubelet-plugins/volume/exec</code> is now a symlink to the writable folder <code>/var/kubernetes/kubelet-plugins/volume/exec</code> (<a href="https://github.com/flatcar/Flatcar/issues/1193">Flatcar#1193</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/948297">5.15.136</a> (includes <a href="https://lwn.net/Articles/947299">5.15.135</a>, <a href="https://lwn.net/Articles/946855">5.15.134</a>, <a href="https://lwn.net/Articles/945380">5.15.133</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html">3.94</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.136</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.3.1"/>
    <published>2023-10-25T08:41:08+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3510.3.0</id>
    <title>3510.3.0</title>
    <updated>2026-03-09T16:26:29.349085+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3510.2.8</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<ul>
<li>Use qcow2 compressed format instead of additional compression layer in Qemu images (<a href="https://github.com/flatcar/Flatcar/issues/1135">Flatcar#1135</a>, <a href="https://github.com/flatcar/scripts/pull/1132">scripts#1132</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/944877">5.15.132</a> (includes <a href="https://lwn.net/Articles/943755">5.15.131</a>, <a href="https://lwn.net/Articles/943404">5.15.130</a>))</li>
</ul>
<p><strong>Changes compared to LTS-2022 3033.3.17</strong></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15794">CVE-2019-15794</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16119">CVE-2020-16119</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25639">CVE-2020-25639</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26541">CVE-2020-26541</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27170">CVE-2020-27170</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27171">CVE-2020-27171</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36516">CVE-2020-36516</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0937">CVE-2021-0937</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0941">CVE-2021-0941</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20320">CVE-2021-20320</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22600">CVE-2021-22600</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23133">CVE-2021-23133</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28039">CVE-2021-28039</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28375">CVE-2021-28375</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28691">CVE-2021-28691</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28714">CVE-2021-28714</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28951">CVE-2021-28951</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28952">CVE-2021-28952</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28964">CVE-2021-28964</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29155">CVE-2021-29155</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29265">CVE-2021-29265</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29266">CVE-2021-29266</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29646">CVE-2021-29646</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29647">CVE-2021-29647</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29648">CVE-2021-29648</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29649">CVE-2021-29649</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29657">CVE-2021-29657</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31440">CVE-2021-31440</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31829">CVE-2021-31829</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31916">CVE-2021-31916</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32606">CVE-2021-32606</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33098">CVE-2021-33098</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33135">CVE-2021-33135</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33200">CVE-2021-33200</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33624">CVE-2021-33624</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3444">CVE-2021-3444</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34866">CVE-2021-34866</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3489">CVE-2021-3489</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3490">CVE-2021-3490</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3491">CVE-2021-3491</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34981">CVE-2021-34981</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3501">CVE-2021-3501</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35039">CVE-2021-35039</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3506">CVE-2021-3506</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3543">CVE-2021-3543</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3600">CVE-2021-3600</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3612">CVE-2021-3612</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3659">CVE-2021-3659</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">CVE-2021-3732</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3736">CVE-2021-3736</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3739">CVE-2021-3739</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3743">CVE-2021-3743</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3764">CVE-2021-3764</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38199">CVE-2021-38199</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38200">CVE-2021-38200</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38201">CVE-2021-38201</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38202">CVE-2021-38202</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38203">CVE-2021-38203</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">CVE-2021-38204</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38205">CVE-2021-38205</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38206">CVE-2021-38206</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38207">CVE-2021-38207</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38208">CVE-2021-38208</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38209">CVE-2021-38209</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38300">CVE-2021-38300</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3923">CVE-2021-3923</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39633">CVE-2021-39633</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39656">CVE-2021-39656</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39685">CVE-2021-39685</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39686">CVE-2021-39686</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39698">CVE-2021-39698</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4001">CVE-2021-4001</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4028">CVE-2021-4028</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4090">CVE-2021-4090</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4093">CVE-2021-4093</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41073">CVE-2021-41073</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4135">CVE-2021-4135</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4149">CVE-2021-4149</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4154">CVE-2021-4154</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4157">CVE-2021-4157</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41864">CVE-2021-41864</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4203">CVE-2021-4203</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42252">CVE-2021-42252</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43057">CVE-2021-43057</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43267">CVE-2021-43267</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">CVE-2021-43975</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44733">CVE-2021-44733</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44879">CVE-2021-44879</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45100">CVE-2021-45100</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45402">CVE-2021-45402</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45469">CVE-2021-45469</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45480">CVE-2021-45480</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45485">CVE-2021-45485</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45486">CVE-2021-45486</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46283">CVE-2021-46283</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0171">CVE-2022-0171</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0264">CVE-2022-0264</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0286">CVE-2022-0286</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0322">CVE-2022-0322</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0382">CVE-2022-0382</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0435">CVE-2022-0435</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0516">CVE-2022-0516</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0742">CVE-2022-0742</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0850">CVE-2022-0850</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0995">CVE-2022-0995</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1015">CVE-2022-1015</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1043">CVE-2022-1043</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1055">CVE-2022-1055</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1195">CVE-2022-1195</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1198">CVE-2022-1198</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1199">CVE-2022-1199</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1204">CVE-2022-1204</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1651">CVE-2022-1651</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1671">CVE-2022-1671</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1943">CVE-2022-1943</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1973">CVE-2022-1973</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1974">CVE-2022-1974</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1975">CVE-2022-1975</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1998">CVE-2022-1998</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20008">CVE-2022-20008</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20132">CVE-2022-20132</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20141">CVE-2022-20141</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20148">CVE-2022-20148</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20154">CVE-2022-20154</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20158">CVE-2022-20158</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20369">CVE-2022-20369</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20421">CVE-2022-20421</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20422">CVE-2022-20422</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20566">CVE-2022-20566</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20572">CVE-2022-20572</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2078">CVE-2022-2078</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21505">CVE-2022-21505</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2153">CVE-2022-2153</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2308">CVE-2022-2308</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2380">CVE-2022-2380</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23960">CVE-2022-23960</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24122">CVE-2022-24122</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24958">CVE-2022-24958</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24959">CVE-2022-24959</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2503">CVE-2022-2503</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25258">CVE-2022-25258</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25375">CVE-2022-25375</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25636">CVE-2022-25636</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2639">CVE-2022-2639</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27223">CVE-2022-27223</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27666">CVE-2022-27666</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27672">CVE-2022-27672</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27950">CVE-2022-27950</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28356">CVE-2022-28356</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2873">CVE-2022-2873</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29156">CVE-2022-29156</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2938">CVE-2022-2938</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29582">CVE-2022-29582</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2959">CVE-2022-2959</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2977">CVE-2022-2977</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2978">CVE-2022-2978</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3061">CVE-2022-3061</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3077">CVE-2022-3077</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3078">CVE-2022-3078</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3104">CVE-2022-3104</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3105">CVE-2022-3105</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3106">CVE-2022-3106</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3107">CVE-2022-3107</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3108">CVE-2022-3108</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3110">CVE-2022-3110</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3111">CVE-2022-3111</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3112">CVE-2022-3112</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3113">CVE-2022-3113</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3115">CVE-2022-3115</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3169">CVE-2022-3169</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3176">CVE-2022-3176</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3202">CVE-2022-3202</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32296">CVE-2022-32296</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3239">CVE-2022-3239</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32981">CVE-2022-32981</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3344">CVE-2022-3344</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33744">CVE-2022-33744</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33981">CVE-2022-33981</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34494">CVE-2022-34494</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34495">CVE-2022-34495</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3521">CVE-2022-3521</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3526">CVE-2022-3526</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3534">CVE-2022-3534</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3543">CVE-2022-3543</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3545">CVE-2022-3545</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3577">CVE-2022-3577</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3586">CVE-2022-3586</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36123">CVE-2022-36123</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3621">CVE-2022-3621</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3625">CVE-2022-3625</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3629">CVE-2022-3629</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3633">CVE-2022-3633</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3635">CVE-2022-3635</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3643">CVE-2022-3643</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3646">CVE-2022-3646</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3649">CVE-2022-3649</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39189">CVE-2022-39189</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40307">CVE-2022-40307</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4095">CVE-2022-4095</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41222">CVE-2022-41222</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4129">CVE-2022-4129</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41849">CVE-2022-41849</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41850">CVE-2022-41850</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42432">CVE-2022-42432</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4662">CVE-2022-4662</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47518">CVE-2022-47518</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47519">CVE-2022-47519</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47520">CVE-2022-47520</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47521">CVE-2022-47521</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47938">CVE-2022-47938</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47939">CVE-2022-47939</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47941">CVE-2022-47941</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47942">CVE-2022-47942</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47943">CVE-2022-47943</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4842">CVE-2022-4842</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48423">CVE-2022-48423</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48424">CVE-2022-48424</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48425">CVE-2022-48425</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48502">CVE-2022-48502</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0210">CVE-2023-0210</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0458">CVE-2023-0458</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0615">CVE-2023-0615</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1073">CVE-2023-1073</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1074">CVE-2023-1074</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1252">CVE-2023-1252</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1281">CVE-2023-1281</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1295">CVE-2023-1295</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2008">CVE-2023-2008</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2019">CVE-2023-2019</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20928">CVE-2023-20928</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2194">CVE-2023-2194</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22999">CVE-2023-22999</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23001">CVE-2023-23001</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23002">CVE-2023-23002</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23004">CVE-2023-23004</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23006">CVE-2023-23006</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26544">CVE-2023-26544</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26606">CVE-2023-26606</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26607">CVE-2023-26607</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2860">CVE-2023-2860</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28772">CVE-2023-28772</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2898">CVE-2023-2898</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3006">CVE-2023-3006</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3159">CVE-2023-3159</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3220">CVE-2023-3220</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32248">CVE-2023-32248</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32269">CVE-2023-32269</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33203">CVE-2023-33203</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3338">CVE-2023-3338</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3355">CVE-2023-3355</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3357">CVE-2023-3357</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35824">CVE-2023-35824</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38426">CVE-2023-38426</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38428">CVE-2023-38428</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38429">CVE-2023-38429</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38432">CVE-2023-38432</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3865">CVE-2023-3865</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3866">CVE-2023-3866</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4015">CVE-2023-4015</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4132">CVE-2023-4132</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4385">CVE-2023-4385</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36109">CVE-2022-36109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879">CVE-2022-2879</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880">CVE-2022-2880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32190">CVE-2022-32190</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715">CVE-2022-41715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717</a>)</li>
<li>bind tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2881">CVE-2022-2881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2906">CVE-2022-2906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3080">CVE-2022-3080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45078">CVE-2021-45078</a>)</li>
<li>cifs-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20208">CVE-2021-20208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29869">CVE-2022-29869</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43816">CVE-2021-43816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23471">CVE-2022-23471</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31030">CVE-2022-31030</a>)</li>
<li>cpio (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185</a>)</li>
<li>cryptsetup (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4122">CVE-2021-4122</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">CVE-2022-27774</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">CVE-2022-27775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27778">CVE-2022-27778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27779">CVE-2022-27779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27780">CVE-2022-27780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30115">CVE-2022-30115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32205">CVE-2022-32205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32206">CVE-2022-32206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32207">CVE-2022-32207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-35260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-42915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-42916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43551">CVE-2022-43551</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552</a>)</li>
<li>dbus (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012</a>)</li>
<li>duktape (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46322">CVE-2021-46322</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680</a>)</li>
<li>gcc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39260">CVE-2022-39260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903</a>)</li>
<li>glib (<a href="https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835">fixes to normal form handling in GVariant</a>)</li>
<li>gnupg (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4209">CVE-2021-4209</a>, <a href="https://gitlab.com/gnutls/gnutls/-/issues/1277">GNUTLS-SA-2022-01-17</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2509">CVE-2022-2509</a>)</li>
<li>gzip,xz-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271</a>)</li>
<li>ignition (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14040">CVE-2020-14040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1706">CVE-2022-1706</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21233">CVE-2022-21233</a>)</li>
<li>krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31566">CVE-2021-31566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36976">CVE-2021-36976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26280">CVE-2022-26280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36227">CVE-2022-36227</a>, <a href="https://github.com/libarchive/libarchive/issues/1565">libarchive-1565</a>, <a href="https://github.com/libarchive/libarchive/issues/1566">libarchive-1566</a>)</li>
<li>libksba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629</a>)</li>
<li>GNU Libtasn1 (<a href="https://bugs.gentoo.org/866237">Gentoo#866237</a>)</li>
<li>libtirpc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2016-3709">CVE-2016-3709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304</a>)</li>
<li>logrotate (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1348">CVE-2022-1348</a>)</li>
<li>multipath-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41973">CVE-2022-41973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974</a>)</li>
<li>ncurses (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">CVE-2022-29458</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28181">CVE-2022-28181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28183">CVE-2022-28183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28184">CVE-2022-28184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28185">CVE-2022-28185</a>)</li>
<li>oniguruma (<a href="https://bugs.gentoo.org/841893">oniguruma-20220430</a>)</li>
<li>OpenSSH (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617</a>)</li>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4044">CVE-2021-4044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1343">CVE-2022-1343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1434">CVE-2022-1434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1473">CVE-2022-1473</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786</a>)</li>
<li>polkit (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4115">CVE-2021-4115</a>)</li>
<li>rsync (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235</a>)</li>
<li>sudo (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43995">CVE-2022-43995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809</a>)</li>
<li>systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3997">CVE-2021-3997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3821">CVE-2022-3821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4415">CVE-2022-4415</a>)</li>
<li>unzip (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0529">CVE-2022-0529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0530">CVE-2022-0530</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4217">CVE-2021-4217</a>)</li>
<li>util-linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3995">CVE-2021-3995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3996">CVE-2021-3996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">CVE-2022-0563</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3872">CVE-2021-3872</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3875">CVE-2021-3875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3903">CVE-2021-3903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3927">CVE-2021-3927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3928">CVE-2021-3928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3968">CVE-2021-3968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">CVE-2021-3973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3974">CVE-2021-3974</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3984">CVE-2021-3984</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4019">CVE-2021-4019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4069">CVE-2021-4069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4136">CVE-2021-4136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4173">CVE-2021-4173</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166"> CVE-2021-4166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4187">CVE-2021-4187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">CVE-2021-4192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">CVE-2021-4193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0128">CVE-2022-0128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0156">CVE-2022-0156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0158">CVE-2022-0158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0213">CVE-2022-0213</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">CVE-2022-0261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">CVE-2022-0318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0319">CVE-2022-0319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0351">CVE-2022-0351</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">CVE-2022-0359</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">CVE-2022-0361</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">CVE-2022-0368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">CVE-2022-0392</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0393">CVE-2022-0393</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0407">CVE-2022-0407</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">CVE-2022-0408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">CVE-2022-0413</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">CVE-2022-0417</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">CVE-2022-0443</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">CVE-2022-0629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">CVE-2022-0685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">CVE-2022-0714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">CVE-2022-0729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">CVE-2022-0943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">CVE-2022-1154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1160">CVE-2022-1160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1381">CVE-2022-1381</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">CVE-2022-1616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">CVE-2022-1619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">CVE-2022-1620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">CVE-2022-1621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">CVE-2022-1629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1674">CVE-2022-1674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1725">CVE-2022-1725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">CVE-2022-1733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">CVE-2022-1735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1769">CVE-2022-1769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1771">CVE-2022-1771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">CVE-2022-1796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">CVE-2022-1898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1886">CVE-2022-1886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">CVE-2022-1851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1942">CVE-2022-1942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1968">CVE-2022-1968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2000">CVE-2022-2000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2042">CVE-2022-2042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2124">CVE-2022-2124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2125">CVE-2022-2125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2126">CVE-2022-2126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2129">CVE-2022-2129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2175">CVE-2022-2175</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2182">CVE-2022-2182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2183">CVE-2022-2183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2206">CVE-2022-2206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2207">CVE-2022-2207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2208">CVE-2022-2208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2210">CVE-2022-2210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2231">CVE-2022-2231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2257">CVE-2022-2257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2264">CVE-2022-2264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2284">CVE-2022-2284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2285">CVE-2022-2285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2286">CVE-2022-2286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2287">CVE-2022-2287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2288">CVE-2022-2288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2289">CVE-2022-2289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2304">CVE-2022-2304</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2343">CVE-2022-2343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2344">CVE-2022-2344</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2345">CVE-2022-2345</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2522">CVE-2022-2522</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2816">CVE-2022-2816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2817">CVE-2022-2817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2819">CVE-2022-2819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2845">CVE-2022-2845</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2849">CVE-2022-2849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2862">CVE-2022-2862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2874">CVE-2022-2874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2889">CVE-2022-2889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2923">CVE-2022-2923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2946">CVE-2022-2946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2980">CVE-2022-2980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2982">CVE-2022-2982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3016">CVE-2022-3016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3099">CVE-2022-3099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3134">CVE-2022-3134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3153">CVE-2022-3153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3234">CVE-2022-3234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3235">CVE-2022-3235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3278">CVE-2022-3278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3256">CVE-2022-3256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3296">CVE-2022-3296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3297">CVE-2022-3297</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3324">CVE-2022-3324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3352">CVE-2022-3352</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3491">CVE-2022-3491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3520">CVE-2022-3520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3591">CVE-2022-3591</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3705">CVE-2022-3705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4141">CVE-2022-4141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4292">CVE-2022-4292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4293">CVE-2022-4293</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0049">CVE-2023-0049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0051">CVE-2023-0051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0054">CVE-2023-0054</a>)</li>
<li>zlib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434</a>)</li>
<li>SDK: edk2-ovmf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28210">CVE-2021-28210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28211">CVE-2021-28211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28213">CVE-2021-28213</a>)</li>
<li>SDK: libxslt (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560</a>)</li>
<li>SDK: mantle (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3121">CVE-2021-3121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565</a>)</li>
<li>SDK: Python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3654">CVE-2021-3654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061</a>)</li>
<li>SDK: QEMU (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14394">CVE-2020-14394</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35504">CVE-2020-35504</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35505">CVE-2020-35505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35506">CVE-2020-35506</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35517">CVE-2020-35517</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20263">CVE-2021-20263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3409">CVE-2021-3409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3544">CVE-2021-3544</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3545">CVE-2021-3545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3546">CVE-2021-3546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3582">CVE-2021-3582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3607">CVE-2021-3607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3608">CVE-2021-3608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3930">CVE-2021-3930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3947">CVE-2021-3947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4145">CVE-2021-4145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0216">CVE-2022-0216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26353">CVE-2022-26353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26354">CVE-2022-26354</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3872">CVE-2022-3872</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4172">CVE-2022-4172</a>)</li>
<li>SDK: Rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21658">CVE-2022-21658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36113">CVE-2022-36113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36114">CVE-2022-36114</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-46176">CVE-2022-46176</a>)</li>
<li>SDK: squashfs-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072</a>)</li>
<li>VMware: open-vm-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added <code>networkd</code> translation to <code>files</code> section when converting from Ignition 2.x to Ignition 3.x (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1910">coreos-overlay#1910</a>, <a href="https://github.com/flatcar-linux/Flatcar/issues/741">flatcar#741</a>)</li>
<li>Added a remount action as <code>systemd-sysext.service</code> drop-in unit to restore the OEM partition mount after the overlay mounts in <code>/usr</code> are done (<a href="https://github.com/flatcar-linux/init/pull/69">init#69</a>)</li>
<li>Added back Ignition support for Vagrant (<a href="https://github.com/flatcar/coreos-overlay/pull/2351">coreos-overlay#2351</a>)</li>
<li>Added back <code>gettext</code> to the OS (<a href="https://github.com/flatcar-linux/Flatcar/issues/849">Flatcar#849</a>)</li>
<li>Added merging of Ignition systemd duplicated units when auto-translating from Ignition 2 to Ignition 3. (<a href="https://github.com/flatcar/coreos-overlay/pull/2187">coreos-overlay#2187</a>)</li>
<li>Added support for Openstack for cloud-init activation (<a href="https://github.com/flatcar-linux/init/pull/76">flatcar-linux/init#76</a>)</li>
<li>Added support for hardware security keys in update-ssh-keys (<a href="https://github.com/flatcar/update-ssh-keys/pull/7">update-ssh-keys#7</a>)</li>
<li>Enabled IOMMU on arm64 kernels, the lack of which prevented some systems from booting (<a href="https://github.com/flatcar/coreos-overlay/pull/2235">coreos-overlay#2235</a>)</li>
<li>Excluded Wireguard interface from <code>systemd-networkd</code> default management (<a href="https://github.com/flatcar-linux/Flatcar/issues/808">Flatcar#808</a>)</li>
<li>Excluded the Kubenet cbr0 interface from networkd's DHCP config and set it to Unmanaged to prevent interference and ensure that it is not part of the network online check (<a href="https://github.com/flatcar-linux/init/pull/55">init#55</a>)</li>
<li>Excluded the special Kubernetes network interfaces <code>nodelocaldns</code> and <code>kube-ipvs0</code> from being managed with systemd-networkd which interfered with the setup (<a href="https://github.com/flatcar/init/pull/89">init#89</a>).</li>
<li>Fix &quot;ext4 deadlock under heavy I/O load&quot; kernel issue. The patch for this is included provisionally while we wait for it to be merged upstream (<a href="https://github.com/flatcar/Flatcar/issues/847">Flatcar#847</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/2315">coreos-overlay#2315</a>)</li>
<li>Fixed Ignition btrfs forced formatting for OEM partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2277">coreos-overlay#2277</a>)</li>
<li>Fixed Ignition's OEM ID to be <code>metal</code> to follow the Ignition upstream change which otherwise resulted in a broken boot when the Flatcar OEM ID <code>pxe</code> was used (<a href="https://github.com/flatcar-linux/bootengine/pull/45">bootengine#45</a>)</li>
<li>Fixed <code>/etc/resolv.conf</code> symlink by pointing it at <code>resolv.conf</code> instead of <code>stub-resolv.conf</code>. This bug was present since the update to systemd v250 (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/2057">coreos-overlay#2057</a>)</li>
<li>Fixed a regression (in Alpha/Beta) where machines failed to boot if they didn't have the <code>core</code> user or group in <code>/etc/passwd</code> or <code>/etc/group</code> (<a href="https://github.com/flatcar/baselayout/pull/26">baselayout#26</a>)</li>
<li>Fixed excluded interface type from default systemd-networkd configuration (<a href="https://github.com/flatcar-linux/init/pull/78">flatcar-linux/init#78</a>)</li>
<li>Fixed space escaping in the <code>networkd</code> Ignition translation (<a href="https://github.com/flatcar-linux/Flatcar/issues/812">Flatcar#812</a>)</li>
<li>Fixed the dracut emergency Ignition log printing that had a scripting error causing the cat command to fail (<a href="https://github.com/flatcar-linux/bootengine/pull/33">bootengine#33</a>)</li>
<li>Made Ignition write the SSH keys into a file under <code>authorized_keys.d/ignition</code> again and added a call to <code>update-ssh-keys</code> after Ignition ran to create the merged <code>authorized_keys</code> file, which fixes the problem that keys added by Ignition get lost when <code>update-ssh-keys</code> runs (<a href="https://github.com/flatcar-linux/init/pull/66">init#66</a>)</li>
<li>Re-added the <code>brd drbd nbd rbd xen-blkfront zram libarc4 lru_cache zsmalloc</code> kernel modules to the initramfs since they were missing compared to the Flatcar 3033.2.x releases where the 5.10 kernel is used (<a href="https://github.com/flatcar-linux/bootengine/pull/40">bootengine#40</a>)</li>
<li>Restored the support to specify OEM partition files in Ignition when <code>/usr/share/oem</code> is given as initrd mount point (<a href="https://github.com/flatcar/bootengine/pull/58">bootengine#58</a>)</li>
<li>Reverted the Linux kernel commit which broke networking on AWS instances which use Intel 82559 NIC (c4/m4) (<a href="https://github.com/flatcar-linux/Flatcar/issues/665">Flatcar#665</a>, <a href="https://github.com/flatcar-linux/coreos-overlay/pull/1723">coreos-overlay#1723</a>)</li>
<li>Skipped starting <code>ensure-sysext.service</code> if <code>systemd-sysext.service</code> won't be started, to prevent reporting a dependency failure (<a href="https://github.com/flatcar-linux/Flatcar/issues/710">Flatcar#710</a>)</li>
<li>The Ignition v3 kargs directive failed before when used with the generic image where no <code>grub.cfg</code> exists, this was fixed by creating it first (<a href="https://github.com/flatcar-linux/bootengine/pull/47">bootengine#47</a>)</li>
<li>The rootfs setup in the initrd now runs systemd-tmpfiles on every boot, not only when Ignition runs, to fix a dbus failure due to missing files (<a href="https://github.com/flatcar/Flatcar/issues/944">Flatcar#944</a>)</li>
<li>flatcar-update: Stopped checking for the <code>USER</code> environment variable which may not be set in all environments, causing the script to fail unless a workaround was used like prepending an additional <code>sudo</code> invocation (<a href="https://github.com/flatcar-linux/init/pull/58">init#58</a>)</li>
<li>network: Accept ICMPv6 Router Advertisements to fix IPv6 address assignment in the default DHCP setting (<a href="https://github.com/flatcar-linux/init/pull/51">init#51</a>, <a href="https://github.com/flatcar-linux/coreos-cloudinit/pull/12">coreos-cloudinit#12</a>, <a href="https://github.com/flatcar-linux/bootengine/pull/30">bootengine#30</a>)</li>
<li>Fixed the restart of Systemd services when the main process is being killed by a SIGHUP signal (<a href="https://github.com/flatcar/Flatcar/issues/1157">flatcar#1157</a>)</li>
<li>Resolved the conflicting FD usage of libselinux and systemd which caused, e.g., a systemd crash on certain watchdog interaction during shutdown (patch in systemd 252.11)</li>
<li>AWS: added EKS support for version 1.22 and 1.23. (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/2110">coreos-overlay#2110</a>, <a href="https://github.com/flatcar-linux/Flatcar/issues/829">Flatcar#829</a>)- VMWare: excluded <code>wireguard</code> (and others) from <code>systemd-networkd</code> management. (<a href="https://github.com/flatcar-linux/init/pull/80">init#80</a>)</li>
<li>GCP: Restored oem-gce.service functionality on GCP (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1813">coreos-overlay#1813</a>)</li>
<li>GCP: Fixed shutdown script execution (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1912">coreos-overlay#1912</a>, <a href="https://github.com/flatcar-linux/Flatcar/issues/743">flatcar#743</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>ARM64: Added <a href="https://wiki.samba.org/index.php/LinuxCIFS_utils">cifs-utils</a> for ARM64</li>
<li>ARM64: Added <a href="https://sssd.io/">sssd</a>, <a href="https://www.freedesktop.org/software/realmd/adcli/adcli.html">adcli</a> and realmd for ARM64</li>
<li>Added CONFIG_NF_CT_NETLINK_HELPER (for libnetfilter_cthelper), CONFIG_NET_VRF (for virtual routing and forwarding) and CONFIG_KEY_DH_OPERATIONS (for keyutils) to the kernel config (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1524">coreos-overlay#1524</a>)</li>
<li>Added VMware networking configuration in the initramfs via guestinfo settings (<a href="https://github.com/flatcar-linux/bootengine/pull/44">bootengine#44</a>, <a href="https://github.com/flatcar-linux/Flatcar/issues/717">flatcar#717</a>)</li>
<li>Added <code>CONFIG_NF_CONNTRACK_BRIDGE</code> (for nf_conntrack_bridge) and <code>CONFIG_NFT_BRIDGE_META</code> (for nft_meta_bridge) to the kernel config to allow using conntrack rules for bridges in nftables and to match on bridge interface names (<a href="https://github.com/flatcar/coreos-overlay/pull/2207">coreos-overlay#2207</a>)</li>
<li>Added <code>auditd.service</code> but left it disabled by default, a custom configuration can be created by removing <code>/etc/audit/auditd.conf</code> and replacing it with an own file (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1636">coreos-overlay#1636</a>)</li>
<li>Added <code>cryptsetup</code> to the initramfs for the Ignition <code>luks</code> directive (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1760">flatcar-linux/coreos-overlay#1760</a>)</li>
<li>Added a new flatcar-update tool to the image to ease manual updates, rollbacks, channel/release jumping, and airgapped updates (<a href="https://github.com/flatcar-linux/init/pull/53">init#53</a>)</li>
<li>Added efibootmgr binary to the image (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1955">coreos-overlay#1955</a>)</li>
<li>Added symlink from <code>nc</code> to <code>ncat</code>. <code>-q</code> option is <a href="https://github.com/nmap/nmap/issues/2422">not yet supported</a> (<a href="https://github.com/flatcar-linux/Flatcar/issues/545">flatcar#545</a>)</li>
<li>Besides Ignition v1 and v2 configurations, Ignition configurations with specification v3 (up to 3.3.0) are now supported, see the <a href="https://www.flatcar.org/docs/latest/provisioning/ignition/specification/#ignition-v3">docs section for details</a></li>
<li>Bring in dependencies for NFS4 with Kerberos both in kernel and userspace. Tested against NFS4.1 server. (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1664">coreos-overlay#1664</a>)</li>
<li>Change CONFIG_WIREGUARD kernel option to module to save space on boot partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2239">coreos-overlay#2239</a>)</li>
<li>Disable several arch specific arm64 kernel config options for unsupported platforms to save space on boot partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2239">coreos-overlay#2239</a>)</li>
<li>Enabled <code>CONFIG_INTEL_RAPL</code> on AMD64 Kernel config to compile <code>intel_rapl_common</code> module in order to allow power monitoring on modern Intel processors (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1801">coreos-overlay#1801</a>)</li>
<li>Enabled <code>systemd-sysext.service</code> to activate systemd-sysext images on boot, to disable you will need to mask it. Also added a helper service <code>ensure-sysext.service</code> which reloads the systemd units to reevaluate the <code>sockets</code>, <code>timers</code>, and <code>multi-user</code> targets when <code>systemd-sysext.service</code> is (re)started, making it possible to enable units that are part of a sysext image (<a href="https://github.com/flatcar-linux/init/pull/65">init#65</a>)</li>
<li>Excluded special network interface devices like bridge, tunnel, vxlan, and veth devices from the default DHCP configuration to prevent networkd interference (<a href="https://github.com/flatcar-linux/init/pull/56">init#56</a>)</li>
<li>For amd64 <code>/usr/lib</code> used to be a symlink to <code>/usr/lib64</code> but now they became two separate folders as common in other distributions (and was the case for arm64 already). Compatibility symlinks exist in case <code>/usr/lib64</code> was used to access, e.g., the <code>modules</code> folder or the <code>systemd</code> folder (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1713">coreos-overlay#1713</a>, <a href="https://github.com/flatcar-linux/scripts/pull/255">scripts#255</a>)</li>
<li>Made SELinux enabled by default in default containerd configuration file. (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1699">coreos-overlay#1699</a>)</li>
<li>Removed rngd.service because it is not essential anymore for the kernel to boot fast in VM environments (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1700">coreos-overlay#1700</a>)</li>
<li>Specifying the OEM filesystem in Ignition to write files to <code>/usr/share/oem</code> is not needed anymore (<a href="https://github.com/flatcar/bootengine/pull/58">bootengine#58</a>)</li>
<li>Switched from <code>--strip-unneeded</code> to <code>--strip-debug</code> when installing kernel modules, which makes kernel stacktraces more accurate and makes debugging issues easier (<a href="https://github.com/flatcar/coreos-overlay/pull/2196">coreos-overlay#2196</a>)</li>
<li>The flatcar-update tool got two new flags to customize ports used on the host while updating flatcar (<a href="https://github.com/flatcar/init/pull/81">init#81</a>)</li>
<li>Toolbox now uses containerd to download and mount the image (<a href="https://github.com/flatcar/toolbox/pull/7">toolbox#7</a>)</li>
<li>Update-engine now creates the <code>/run/reboot-required</code> flag file for <a href="https://github.com/weaveworks/kured">kured</a> (<a href="https://github.com/flatcar-linux/update_engine/pull/15">update_engine#15</a>)</li>
<li>flatcar-install: Added option to create UEFI boot entry (<a href="https://github.com/flatcar-linux/init/pull/74">init#74</a>)</li>
<li>Add qemu-guest-agent to all amd64 images, it will be automatically enabled when qemu-ga virtio-port is detected (<a href="https://github.com/flatcar/coreos-overlay/pull/2240">coreos-overlay#2240</a>, <a href="https://github.com/flatcar/portage-stable/pull/373">portage-stable#373</a>)</li>
<li>Add a way to remove packages that are hard-blockers for update. A hard-blocker means that the package needs to be removed (for example with <code>emerge -C</code>) before an update can happen.</li>
<li>Add support for Microsoft Azure Network Adapter (MANA) NICs on Azure (<a href="https://github.com/flatcar/scripts/pull/1131">scripts#1131</a>)</li>
<li>Defined a systemd-sysext level that sysext images can match for instead of the OS version when they don't have a strong coupling, meaning the only metadata required is <code>SYSEXT_LEVEL=1.0</code> and <code>ID=flatcar</code> (<a href="https://github.com/flatcar-linux/Flatcar/issues/643">Flatcar#643</a>)</li>
<li>Removed the pre-shipped <code>/etc/flatcar/update.conf</code> file, leaving it totally to the user to define the contents as it was unnecessarily overwriting the <code>/use/share/flatcar/update.conf</code> (<a href="https://github.com/flatcar-linux/scripts/pull/212">scripts#212</a>)</li>
<li>Rework the way we set up the default python intepreter in SDK - it is now without specifying a version. This should work fine as long as we keep having one version of python in SDK.</li>
<li>Use qcow2 compressed format instead of additional compression layer in Qemu images (<a href="https://github.com/flatcar/Flatcar/issues/1135">Flatcar#1135</a>, <a href="https://github.com/flatcar/scripts/pull/1132">scripts#1132</a>)</li>
<li>AWS: Added AWS IMDSv2 support to coreos-cloudinit (<a href="https://github.com/flatcar-linux/coreos-cloudinit/pull/13">flatcar-linux/coreos-cloudinit#13</a>)</li>
<li>AWS EC2: Removed the setup of <code>/etc/hostname</code> from the instance metadata because it used a long FQDN but we can just use use the hostname set via DHCP (<a href="https://github.com/flatcar-linux/Flatcar/issues/707">Flatcar#707</a>)</li>
<li>Azure: Azure VHD disks are now created using subformat=fixed, which makes them suitable for immediate upload to Azure using any tool.</li>
<li>Azure: Set up <code>/etc/hostname</code> from instance metadata with Afterburn</li>
<li>OpenStack: enabled <code>coreos-metadata-sshkeys@.service</code> to provision SSH keys from metadata. (<a href="https://github.com/flatcar/Flatcar/issues/817">Flatcar#817</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/2246">coreos-overlay#2246</a>)</li>
<li>VMWare: Added <code>ignition-delete-config.service</code> to remove Ignition config from VM metadata, see also <a href="https://coreos.github.io/ignition/operator-notes/#automatic-config-deletion">here</a> (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1948">coreos-overlay#1948</a>)</li>
<li>SDK / ARM64: Added <a href="https://pkg.go.dev/github.com/coreos/go-tspi">go-tspi</a> bindings for ARM64</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/944877">5.15.132</a> (includes <a href="https://lwn.net/Articles/943755">5.15.131</a>, <a href="https://lwn.net/Articles/943404">5.15.130</a>, <a href="https://lwn.net/Articles/943113">5.15.129</a>, <a href="https://lwn.net/Articles/942866">5.15.128</a>, <a href="https://lwn.net/Articles/941775">5.15.127</a>, <a href="https://lwn.net/Articles/941296">5.15.126</a>, <a href="https://lwn.net/Articles/940798">5.15.125</a>, <a href="https://lwn.net/Articles/940339">5.15.124</a>, <a href="https://lwn.net/Articles/939424">5.15.123</a>, <a href="https://lwn.net/Articles/939104">5.15.122</a>, <a href="https://lwn.net/Articles/939016">5.15.121</a>, <a href="https://lwn.net/Articles/937404">5.15.120</a>, <a href="https://lwn.net/Articles/936675">5.15.119</a>, <a href="https://lwn.net/Articles/935584">5.15.118</a>, <a href="https://lwn.net/Articles/934622">5.15.117</a>, <a href="https://lwn.net/Articles/934320">5.15.116</a>, <a href="https://lwn.net/Articles/933909">5.15.115</a>, <a href="https://lwn.net/Articles/933280">5.15.114</a>, <a href="https://lwn.net/Articles/932883">5.15.113</a>, <a href="https://lwn.net/Articles/932134">5.15.112</a>, <a href="https://lwn.net/Articles/931680">5.15.111</a>, <a href="https://lwn.net/Articles/930600">5.15.110</a>, <a href="https://lwn.net/Articles/930263">5.15.109</a>, <a href="https://lwn.net/Articles/929679">5.15.108</a>, <a href="https://lwn.net/Articles/929015">5.15.107</a>, <a href="https://lwn.net/Articles/928343">5.15.106</a>, <a href="https://lwn.net/Articles/927860">5.15.105</a>, <a href="https://lwn.net/Articles/926873">5.15.104</a>, <a href="https://lwn.net/Articles/926415">5.15.103</a>, <a href="https://lwn.net/Articles/925991">5.15.102</a>, <a href="https://lwn.net/Articles/925939">5.15.101</a>, <a href="https://lwn.net/Articles/925913">5.15.100</a>, <a href="https://lwn.net/Articles/925844">5.15.99</a>, <a href="https://lwn.net/Articles/925080">5.15.98</a>, <a href="https://lwn.net/Articles/925064">5.15.97</a>, <a href="https://lwn.net/Articles/924441">5.15.96</a>, <a href="https://lwn.net/Articles/924073">5.15.95</a>, <a href="https://lwn.net/Articles/923308">5.15.94</a>, <a href="https://lwn.net/Articles/922814">5.15.93</a>, <a href="https://lwn.net/Articles/922340">5.15.92</a>, <a href="https://lwn.net/Articles/921851">5.15.91</a>, <a href="https://lwn.net/Articles/921029">5.15.90</a>, <a href="https://lwn.net/Articles/920321">5.15.89</a>, <a href="https://lwn.net/Articles/920012">5.15.88</a>, <a href="https://lwn.net/Articles/919793">5.15.87</a>, <a href="https://lwn.net/Articles/918808">5.15.86</a>, <a href="https://lwn.net/Articles/918329">5.15.85</a>, <a href="https://lwn.net/Articles/918206">5.15.84</a>, <a href="https://lwn.net/Articles/917896">5.15.83</a>, <a href="https://lwn.net/Articles/917400">5.15.82</a>, <a href="https://lwn.net/Articles/916763">5.15.81</a>, <a href="https://lwn.net/Articles/916003">5.15.80</a>, <a href="https://lwn.net/Articles/915100">5.15.79</a>, <a href="https://lwn.net/Articles/914423">5.15.78</a>, <a href="https://lwn.net/Articles/913681">5.15.77</a>, <a href="https://lwn.net/Articles/912997">5.15.76</a>, <a href="https://lwn.net/Articles/912500">5.15.75</a>, <a href="https://lwn.net/Articles/911275">5.15.74</a>, <a href="https://lwn.net/Articles/910957">5.15.73</a>, <a href="https://lwn.net/Articles/910398">5.15.72</a>, <a href="https://lwn.net/Articles/909679">5.15.71</a>, <a href="https://lwn.net/Articles/909212">5.15.70</a>, <a href="https://lwn.net/Articles/908782">5.15.69</a>, <a href="https://lwn.net/Articles/908140">5.15.68</a>, <a href="https://lwn.net/Articles/907526">5.15.67</a>, <a href="https://lwn.net/Articles/907524">5.15.66</a>, <a href="https://lwn.net/Articles/907204">5.15.65</a>, <a href="https://lwn.net/Articles/906630">5.15.64</a>, <a href="https://lwn.net/Articles/906059">5.15.63</a>, <a href="https://lwn.net/Articles/905533">5.15.62</a>, <a href="https://lwn.net/Articles/904959">5.15.61</a>, <a href="https://lwn.net/Articles/904461">5.15.60</a>, <a href="https://lwn.net/Articles/903688">5.15.59</a>, <a href="https://lwn.net/Articles/902917">5.15.58</a>, <a href="https://lwn.net/Articles/902317">5.15.57</a>, <a href="https://lwn.net/Articles/902101">5.15.56</a>, <a href="https://lwn.net/Articles/901380">5.15.55</a>, <a href="https://lwn.net/Articles/900911">5.15.54</a>, <a href="https://lwn.net/Articles/900321">5.15.53</a>, <a href="https://lwn.net/Articles/899788">5.15.52</a>, <a href="https://lwn.net/Articles/899370">5.15.51</a>, <a href="https://lwn.net/Articles/899091">5.15.50</a>, <a href="https://lwn.net/Articles/898622">5.15.49</a>, <a href="https://lwn.net/Articles/898124">5.15.48</a>, <a href="https://lwn.net/Articles/897904">5.15.47</a>, <a href="https://lwn.net/Articles/897377">5.15.46</a>, <a href="https://lwn.net/Articles/897167">5.15.45</a>, <a href="https://lwn.net/Articles/896647">5.15.44</a>, <a href="https://lwn.net/Articles/896220">5.15.43</a>, <a href="https://lwn.net/Articles/896226">5.15.42</a>, <a href="https://lwn.net/Articles/895645">5.15.41</a>, <a href="https://lwn.net/Articles/895318">5.15.40</a>, <a href="https://lwn.net/Articles/895070">5.15.39</a>, <a href="https://lwn.net/Articles/894357">5.15.38</a>, <a href="https://lwn.net/Articles/893264">5.15.37</a>, <a href="https://lwn.net/Articles/892812">5.15.36</a>, <a href="https://lwn.net/Articles/892002">5.15.35</a>, <a href="https://lwn.net/Articles/891251">5.15.34</a>, <a href="https://lwn.net/Articles/890722">5.15.33</a>, <a href="https://lwn.net/Articles/889438">5.15.32</a>, <a href="https://lwn.net/Articles/889001">5.15.31</a>, <a href="https://lwn.net/Articles/888521">5.15.30</a>, <a href="https://lwn.net/Articles/888116">5.15.29</a>, <a href="https://lwn.net/Articles/887638">5.15.28</a>, <a href="https://lwn.net/Articles/887219">5.15.27</a>, <a href="https://lwn.net/Articles/886569">5.15.26</a>, <a href="https://lwn.net/Articles/885895">5.15.25</a>, <a href="https://lwn.net/Articles/884973">5.15.24</a>, <a href="https://lwn.net/Articles/884527">5.15.23</a>, <a href="https://lwn.net/Articles/884107">5.15.22</a>, <a href="https://lwn.net/Articles/883958">5.15.21</a>, <a href="https://lwn.net/Articles/883951">5.15.20</a>, <a href="https://lwn.net/Articles/883441">5.15.19</a>, <a href="https://lwn.net/Articles/883326">5.15.18</a>, <a href="https://lwn.net/Articles/882911">5.15.17</a>, <a href="https://lwn.net/Articles/881963">5.15.16</a>, <a href="https://lwn.net/Articles/881548">5.15.15</a>, <a href="https://lwn.net/Articles/881018">5.15.14</a>, <a href="https://lwn.net/Articles/880469">5.15.13</a>, <a href="https://lwn.net/Articles/879997">5.15.12</a>, <a href="https://lwn.net/Articles/879496">5.15.11</a>, <a href="https://lwn.net/Articles/879023">5.15.10</a>, <a href="https://lwn.net/Articles/878898">5.15.9</a>, <a href="https://lwn.net/Articles/878631">5.15.8</a>, <a href="https://lwn.net/Articles/878040">5.15.7</a>, <a href="https://lwn.net/Articles/877286">5.15.6</a>, <a href="https://lwn.net/Articles/876860">5.15.5</a>,  <a href="https://lwn.net/Articles/876611">5.15.4</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230117">20230117</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221214">20221214</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221109">20221109</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221012">20221012</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220913">20220913</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220815">20220815</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220708">20220708</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220610">20220610</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220509">20220509</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220411">20220411</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220310">20220310</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220209">20220209</a>))</li>
<li>Linux Headers (<a href="https://lwn.net/Articles/876611/">5.15</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.19.5">1.19.5</a> (includes <a href="https://go.dev/doc/devel/release#go1.19.4">1.19.4</a>, <a href="https://go.dev/doc/devel/release#go1.19.3">1.19.3</a>, <a href="https://go.dev/doc/devel/release#go1.18.10">1.18.10</a>, <a href="https://go.dev/doc/devel/release#go1.18.9">1.18.9</a>, <a href="https://go.dev/doc/devel/release#1.18.7">1.18.7</a>, <a href="https://go.dev/doc/devel/release#go1.18.6">1.18.6</a>, <a href="https://go.dev/doc/devel/release#go1.18.4">1.18.4</a>, <a href="https://go.googlesource.com/go/+/refs/tags/go1.18.2">1.18.2</a>, <a href="https://go.googlesource.com/go/+/refs/tags/go1.17.9">1.17.9</a>))</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201023">20.10.23</a> (includes <a href="https://docs.docker.com/engine/release-notes/#201022">20.10.22</a>, <a href="https://docs.docker.com/engine/release-notes/#201021">20.10.21</a>, <a href="https://docs.docker.com/engine/release-notes/#201020">20.10.20</a>, <a href="https://docs.docker.com/engine/release-notes/#201018">20.10.18</a>, <a href="https://docs.docker.com/engine/release-notes/#201017">20.10.17</a>, <a href="https://docs.docker.com/engine/release-notes/#201016">20.10.16</a>, <a href="https://docs.docker.com/engine/release-notes/#201015">20.10.15</a>, <a href="https://docs.docker.com/engine/release-notes/#201014">20.10.14</a>, <a href="https://docs.docker.com/engine/release-notes/#201013">20.10.13</a>))</li>
<li>acl (<a href="https://git.savannah.nongnu.org/cgit/acl.git/log/?h=v2.3.1">2.3.1</a>)</li>
<li>new: acpid (<a href="https://sourceforge.net/p/acpid2/code/ci/2.0.33/tree/Changelog">2.0.33</a>)</li>
<li>adcli (<a href="https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.2">0.9.2</a> (includes <a href="https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.1">0.9.1</a>))</li>
<li>afterburn (<a href="https://github.com/coreos/afterburn/releases/tag/v5.2.0">5.2.0</a>)</li>
<li>attr (<a href="https://git.savannah.nongnu.org/cgit/attr.git/log/?h=v2.5.1">2.5.1</a>)</li>
<li>audit (<a href="https://listman.redhat.com/archives/linux-audit/2021-October/msg00000.html">3.0.6</a>)</li>
<li>automake (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10055">1.16.5</a>)</li>
<li>bind tools (<a href="https://bind9.readthedocs.io/en/v9_16_36/notes.html#notes-for-bind-9-16-36">9.16.36</a> (includes <a href="https://bind9.readthedocs.io/en/v9_16_34/notes.html#notes-for-bind-9-16-35">9.16.35</a>, <a href="https://bind9.readthedocs.io/en/v9_16_35/notes.html#notes-for-bind-9-16-34">9.16.34</a>, <a href="https://gitlab.isc.org/isc-projects/bind9/-/raw/v9_16_33/CHANGES">9.16.33</a>, <a href="https://gitlab.isc.org/isc-projects/bind9/-/blob/v9_16_27/CHANGES">9.16.27</a>))</li>
<li>binutils (<a href="https://sourceware.org/pipermail/binutils/2022-August/122246.html">2.39</a> (includes <a href="https://lwn.net/Articles/884264">2.38</a>))</li>
<li>boost (<a href="https://www.boost.org/users/history/version_1_79_0.html">1.79</a> (includes <a href="https://www.boost.org/users/history/version_1_76_0.html">1.76.0</a>))</li>
<li>bpftool (<a href="https://lwn.net/Articles/909678/">5.19.12</a> (includes <a href="https://lwn.net/Articles/907523/">5.19.8</a>, <a href="https://lwn.net/Articles/904957/">5.19.2</a>, <a href="https://lwn.net/Articles/900912/">5.18.11</a>, <a href="https://lwn.net/Articles/878631/">5.15.8</a>))</li>
<li>bridge-utils (<a href="https://git.kernel.org/pub/scm/network/bridge/bridge-utils.git/log/?h=v1.7.1">1.7.1</a>)</li>
<li>btrfs-progs (<a href="https://btrfs.wiki.kernel.org/index.php/Changelog#btrfs-progs_v5.15_.28Nov_2021.29">5.15.1</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_93.html">3.93</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90.html">3.90</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html">3.78</a>))</li>
<li>cifs-utils (<a href="https://lists.samba.org/archive/samba-technical/2022-April/137335.html">6.15</a> (includes <a href="https://lkml.kernel.org/linux-cifs/CAKywueSqRGSFmeDHQacyu831BNUeGFxGg3vgBmozzhkGBCjyXQ@mail.gmail.com/T/">6.13</a>))</li>
<li>conntrack-tools (<a href="https://lists.netfilter.org/pipermail/netfilter-announce/2020/000240.html">1.4.6</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.16">1.6.16</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.6.15">1.6.15</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.14">1.6.14</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.13">1.6.13</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.12">1.6.12</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.10">1.6.10</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.9">1.6.9</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.8">1.6.8</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.7">1.6.7</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.6">1.6.6</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.4">1.6.4</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.3">1.6.3</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.2">1.6.2</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.1">1.6.1</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.0">1.6.0</a>))</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/coreutils-announce/2020-03/msg00000.html">8.32</a>)</li>
<li>cpio (<a href="https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html">2.13</a>)</li>
<li>cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.24.2">1.24.2</a>)</li>
<li>cryptsetup (<a href="https://lore.kernel.org/all/572c18a7bf60cb1b0f67c3a03c531d7e7ed31832.camel@scientia.net/T/">2.4.3</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_87_0">7.87.0</a> (includes <a href="https://curl.se/changes.html#7_86_0">7.86</a>, <a href="https://curl.se/mail/archive-2022-08/0012.html">7.85</a>, <a href="https://github.com/curl/curl/releases/tag/curl-7_84_0">7.84.0</a>, <a href="https://curl.se/mail/lib-2022-05/0010.html">7.83.1</a>))</li>
<li>Cyrus SASL (<a href="https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28">2.1.28</a>)</li>
<li>dbus (<a href="https://gitlab.freedesktop.org/dbus/dbus/-/raw/dbus-1.14.4/NEWS">1.14.4</a> (includes <a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/177ab044bc87cbc4ded75d21b900795a6fefef76/NEWS">1.12.22</a>))</li>
<li>diffutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-08/msg00000.html">3.8</a>)</li>
<li>dosfstools (<a href="https://github.com/dosfstools/dosfstools/releases/tag/v4.2">4.2</a>)</li>
<li>duktape (<a href="https://github.com/svaarala/duktape/releases/tag/v2.7.0">2.7.0</a>)</li>
<li>e2fsprogs (<a href="http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.5">1.46.5</a> (includes <a href="http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.4">1.46.4</a>))</li>
<li>elfutils (<a href="https://sourceware.org/pipermail/elfutils-devel/2022q4/005561.html">0.188</a> (includes <a href="https://sourceware.org/pipermail/elfutils-devel/2022q2/004978.html">0.187</a>, <a href="https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=490932ae4ef9b5a3af01d2c8c616f14d57586046;hb=983e86fd89e8bf02f2d27ba5dce5bf078af4ceda">0.186</a>))</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v5.10">5.10</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_5_0/expat/Changes">2.5.0</a> (includes <a href="https://github.com/libexpat/libexpat/blob/R_2_4_9/expat/Changes">2.4.9</a>))</li>
<li>findutils (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9914">4.8.0</a>)</li>
<li>gawk (<a href="https://lists.gnu.org/archive/html/help-gawk/2022-11/msg00008.html">5.2.1</a> (contains <a href="https://lists.gnu.org/archive/html/help-gawk/2022-09/msg00000.html">5.2.0</a>))</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-11/changes.html">11.3.0</a> (includes <a href="https://gcc.gnu.org/gcc-10/changes.html">10.3.0</a>, <a href="https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00000.html">9.4.0</a>))</li>
<li>gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-01/msg00009.html">11.2</a>)</li>
<li>gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-10/msg00006.html">1.22</a>)</li>
<li>gettext (<a href="https://git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob;f=NEWS;h=cdbb16746c23555e70bb1e16917f5c349ce92d9e;hb=8b38ee827251cadbb90cb6cb576ae98702566288">0.21.1</a> (includes <a href="https://www.gnu.org/software/gettext/">0.21</a>))</li>
<li>git (<a href="https://github.com/git/git/blob/v2.39.1/Documentation/RelNotes/2.39.1.txt">2.39.1</a> (includes <a href="https://github.com/git/git/blob/v2.39.0/Documentation/RelNotes/2.39.0.txt">2.39.0</a>, <a href="https://github.com/git/git/blob/v2.38.3/Documentation/RelNotes/2.38.3.txt">2.38.3</a>, <a href="https://github.com/git/git/blob/master/Documentation/RelNotes/2.37.4.txt">2.37.4</a>, <a href="https://github.com/git/git/blob/v2.37.3/Documentation/RelNotes/2.37.3.txt">2.37.3</a>, <a href="https://github.com/git/git/blob/v2.37.1/Documentation/RelNotes/2.37.1.txt">2.37.1</a>, <a href="https://github.com/git/git/blob/v2.35.3/Documentation/RelNotes/2.35.3.txt">2.35.3</a>))</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.4">2.74.4</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.1">2.74.1</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.73.3">2.72.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.68.4">2.68.4</a>))</li>
<li>glibc (<a href="https://sourceware.org/pipermail/libc-alpha/2022-August/141193.html">2.36</a> (includes <a href="https://savannah.gnu.org/forum/forum.php?forum_id=10111">2.35</a>, <a href="https://sourceware.org/pipermail/libc-alpha/2021-August/129718.html">2.34</a>))</li>
<li>gnupg (<a href="https://dev.gnupg.org/T5928">2.2.35</a>)</li>
<li>gnutls (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2022-September/004765.html">3.7.8</a> (includes <a href="https://gitlab.com/gnutls/gnutls/-/tags/3.7.7">3.7.7</a>, <a href="https://gitlab.com/gnutls/gnutls/-/merge_requests/1517">3.7.3</a>))</li>
<li>grep (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10037">3.7</a>)</li>
<li>gzip (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10157">1.12</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2021-09/msg00002.html">1.11</a>))</li>
<li>i2c-tools (<a href="https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/tree/CHANGES?id=d8bc1f1ff4b00a6bd988aa114100ae9b787f50d8">4.3</a> (includes <a href="https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/log/?h=v4.2">4.2</a>))</li>
<li>ignition (<a href="https://github.com/coreos/ignition/releases/tag/v2.14.0">2.14.0</a> (includes <a href="https://github.com/coreos/ignition/releases/tag/v2.13.0">2.13.0</a>))</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220809">20220809</a> (includes <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220510">20220510</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207">20220207_p20220207</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20221108">20221108</a>))</li>
<li>iperf (<a href="https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-3101-2021-06-03">3.10.1</a>)</li>
<li>iproute2 (<a href="https://lwn.net/ml/linux-kernel/20211101164705.6f4f2e41%40hermes.local/">5.15</a>)</li>
<li>ipset (<a href="https://ipset.netfilter.org/changelog.html">7.11</a>)</li>
<li>iptables (<a href="https://www.netfilter.org/projects/iptables/files/changes-iptables-1.8.8.txt">1.8.8</a>)</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20211215">20211215</a> (includes <a href="https://github.com/iputils/iputils/releases/tag/20210722">20210722</a>))</li>
<li>ipvsadm (<a href="http://archive.linuxvirtualserver.org/html/lvs-devel/2013-09/msg00011.html">1.27</a>)</li>
<li>jansson (<a href="https://github.com/akheron/jansson/blob/v2.14/CHANGES">2.14</a>)</li>
<li>kmod (<a href="https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/commit/?id=b6ecfc916a17eab8f93be5b09f4e4f845aabd3d1">29</a>)</li>
<li>ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/a795e0c84597aa045d011e663dbad3cdabf0f1e6">2.4.1</a>)</li>
<li>less (<a href="https://www.greenwoodsoftware.com/less/news.590.html">590</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.6.1">3.6.1</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.5.3">3.5.3</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.5.2">3.5.2</a>))</li>
<li>libbsd (<a href="https://gitlab.freedesktop.org/libbsd/libbsd/-/commits/0.11.3/">0.11.3</a>)</li>
<li>libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.d9ygdose5kw">2.66</a> (includes <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap?authuser=0#h.wfblevfzkj0">2.65</a>))</li>
<li>libcap-ng (<a href="https://people.redhat.com/sgrubb/libcap-ng/ChangeLog">0.8.3</a> (includes <a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.2">0.8.2</a>))</li>
<li>libksba (<a href="https://dev.gnupg.org/T6304">1.6.3</a> (includes <a href="https://dev.gnupg.org/T6230">1.6.2</a>))</li>
<li>libnetfilter_queue (<a href="https://git.netfilter.org/libnetfilter_queue/log/?h=libnetfilter_queue-1.0.5">1.0.5</a>)</li>
<li>libpcap (<a href="https://git.tcpdump.org/libpcap/blob/c7642e2cc0c5bd65754685b160d25dc23c76c6bd:/CHANGES">1.10.1</a>)</li>
<li>libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.4">2.5.4</a> (contains <a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.3">2.5.3</a>, <a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.2">2.5.2</a>, <a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.1">2.5.1</a>))</li>
<li>libtasn1 (<a href="https://lists.gnu.org/archive/html/help-libtasn1/2022-08/msg00001.html">4.19.0</a> (includes <a href="https://gitlab.com/gnutls/libtasn1/-/blob/v4.17.0/NEWS">4.17.0</a>))</li>
<li>liburing (<a href="https://github.com/axboe/liburing/commits/liburing-2.1">2.1</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3">2.10.3</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.2">2.10.2</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14">2.9.14</a>, <a href="http://www.xmlsoft.org/news.html">2.9.13</a>))</li>
<li>logrotate (<a href="https://github.com/logrotate/logrotate/releases/tag/3.20.1">3.20.1</a>)</li>
<li>lshw (<a href="https://www.ezix.org/project/wiki/HardwareLiSter#Changes">02.19.2b_p20210121</a>)</li>
<li>lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.94.0">4.94.0</a>)</li>
<li>lsscsi (<a href="https://sg.danny.cz/scsi/lsscsi.ChangeLog">0.32</a>)</li>
<li>mantle (<a href="https://github.com/flatcar-linux/mantle/releases/tag/v0.18.0">0.18.0</a> (includes <a href="https://github.com/flatcar-linux/mantle/releases/tag/v0.17.0">0.17.0</a>))</li>
<li>mdadm (<a href="https://lore.kernel.org/all/28fdbc45-96ca-7cdb-3ced-a5f65d978048@trained-monkey.org/T/">4.2</a>)</li>
<li>MIT Kerberos V (<a href="https://web.mit.edu/kerberos/krb5-1.20/krb5-1.20.1.html">1.20.1</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/releases/tag/0.9.3">0.9.3</a> (includes <a href="https://github.com/opensvc/multipath-tools/commits/0.8.7">0.8.7</a>))</li>
<li>ncurses (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-11/msg00001.html">6.3_p20220423</a>)</li>
<li>nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/blob/990abad16ceacd070747dcc76ed16a39c129321e/ChangeLog">3.8.1</a>)</li>
<li>nfs-utils (<a href="https://lore.kernel.org/linux-fsdevel/c8795653-7728-18a4-93dc-58943ad0fe09@redhat.com/">2.5.4</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.45.1">1.45.1</a>)</li>
<li>nmap (<a href="https://nmap.org/changelog.html#7.93">7.93</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-73-05/index.html">510.73.05</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/commits/deee9cae1ac94760deebd71f8e5449061338666c">1.16</a>)</li>
<li>oniguruma (<a href="https://github.com/kkos/oniguruma/releases/tag/v6.9.8">6.9.8</a> (includes <a href="https://github.com/kkos/oniguruma/releases/tag/v6.9.7.1">6.9.7.1</a>))</li>
<li>open-isns (<a href="https://github.com/open-iscsi/open-isns/blob/v0.101/ChangeLog">0.101</a>)</li>
<li>openssh (<a href="http://www.openssh.com/releasenotes.html#9.1">9.1</a> (includes <a href="http://www.openssh.com/txt/release-8.8">8.8</a>))</li>
<li>openssl (<a href="https://www.openssl.org/news/openssl-3.0-notes.html">3.0.7</a> (includes <a href="https://www.openssl.org/news/changelog.html#openssl-30">3.0.3</a>, <a href="https://www.openssl.org/news/changelog.html#openssl-30">3.0.2</a>, <a href="https://www.openssl.org/news/changelog.html#openssl-30">3.0.1</a>))</li>
<li>pam (<a href="https://github.com/linux-pam/linux-pam/commit/fe1307512fb8892b5ceb3d884c793af8dbd4c16a">1.5.1_p20210622</a>)</li>
<li>pambase (20220214)</li>
<li>parted (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9924">3.4</a> (includes <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9569">3.3</a>))</li>
<li>pciutils (<a href="https://github.com/pciutils/pciutils/commit/864aecdea9c7db626856d8d452f6c784316a878c">3.7.0</a>)</li>
<li>pcre2 (<a href="https://github.com/PhilipHazel/pcre2/blob/pcre2-10.39/NEWS">10.39</a>)</li>
<li>pinentry (<a href="https://dev.gnupg.org/T5566">1.2.0</a>)</li>
<li>polkit (<a href="https://gitlab.freedesktop.org/polkit/polkit/-/commit/827b0ddac5b1ef00a47fca4526fcf057bee5f1db">121</a> (includes <a href="https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.120/NEWS">0.120</a>))</li>
<li>quota (<a href="https://sourceforge.net/p/linuxquota/code/ci/0acd4cc6275122fd9864cb7b5d349e65a2622920/">4.06</a>)</li>
<li>rpcbind (<a href="https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_6">1.2.6</a>)</li>
<li>rsync (<a href="https://download.samba.org/pub/rsync/NEWS#3.2.7">3.2.7</a> (includes <a href="https://github.com/WayneD/rsync/releases/tag/v3.2.6">3.2.6</a>, <a href="https://download.samba.org/pub/rsync/NEWS.html#3.2.4">3.2.4</a>))</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.4">1.1.4</a> (includes <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.3">1.1.3</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.2">1.1.2</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.1">1.1.1</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.0">1.1.0</a>))</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.15.4.html">4.15.4</a>)</li>
<li>sed (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9647">4.8</a>)</li>
<li>shadow (<a href="https://github.com/shadow-maint/shadow/releases/tag/4.13">4.13</a> (includes <a href="https://github.com/shadow-maint/shadow/releases/tag/4.12.3">4.12.3</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/v4.11.1">4.11.1</a>))</li>
<li>socat (<a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.3:/CHANGES">1.7.4.3</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_40_1.html">3.40.1</a> (contains <a href="https://www.sqlite.org/releaselog/3_40_0.html">3.40.0</a>, <a href="https://sqlite.org/releaselog/3_39_4.html">3.39.4</a>, <a href="https://www.sqlite.org/releaselog/3_38_1.html">3.38.1</a>))</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v5.19">5.19</a>)</li>
<li>sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p2">1.9.12_p2</a> (includes <a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p1">1.9.12_p1</a>, <a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_10">1.9.10</a>))</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v252.11">252.11</a> (includes <a href="https://github.com/systemd/systemd-stable/releases/tag/v252.5">252.5</a>, <a href="https://github.com/systemd/systemd/releases/tag/v252">252</a>, <a href="https://github.com/systemd/systemd-stable/commits/v251.10">251.10</a>, <a href="https://github.com/systemd/systemd/releases/tag/v251">251</a>, <a href="https://github.com/systemd/systemd-stable/releases/tag/v250.7">250.7</a>, <a href="https://github.com/systemd/systemd-stable/releases/tag/v250.3">250.3</a>, <a href="https://github.com/systemd/systemd-stable/blob/v249.7/NEWS">249.7</a>))</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/bc1ee7ca0640f0136e5af7dcc4ca8ed0a5893053">2.3.3</a>)</li>
<li>tcpdump (<a href="https://git.tcpdump.org/tcpdump/blob/5f552b5e6e9fe05f7ad9681d51d0303233daba6a:/CHANGES">4.99.1</a>)</li>
<li>tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/de4e8a1af9564f6056f9af90867c2f013449051c">0.11.0</a>)</li>
<li>thin-provisioning-tools (<a href="https://github.com/jthornber/thin-provisioning-tools/blob/d6d93c3157631b242a13a81d30f75453e576c55a/CHANGES#L1-L9">0.9.0</a>)</li>
<li>timezone-data (<a href="https://mm.icann.org/pipermail/tz-announce/2021-January/000065.html">2021a</a>)</li>
<li>unzip (<a href="https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-27_changelog">6.0_p27</a> (includes <a href="https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-26_changelog">6.0_p26</a>))</li>
<li>usbutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/commit/?id=57fb18e59cce31a50a1ca62d1e192512c905ba00">014</a>)</li>
<li>util-linux (<a href="https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.4-ChangeLog">2.37.4</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v9.0.1157">9.0.1157</a> (includes <a href="https://github.com/vim/vim/releases/tag/v9.0.1000">9.0.1000</a>, <a href="https://github.com/vim/vim/releases/tag/v9.0.0828">9.0.0828</a>, <a href="https://github.com/vim/vim/releases/tag/v9.0.0655">9.0.0655</a>, <a href="https://github.com/vim/vim/releases/tag/v9.0.0469">9.0.0469</a>, <a href="https://github.com/vim/vim/releases/tag/v8.2.5066">8.2.5066</a>, <a href="https://github.com/vim/vim/releases/tag/v8.2.4328">8.2.4328</a>, <a href="https://github.com/vim/vim/releases/tag/v8.2.3582">8.2.3582</a>))</li>
<li>wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00017.html">1.21.3</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/commit/ab10466cf2e1ec4887f6a44375c3e29c1720157f">5.5.14</a> (includes <a href="https://github.com/rfc1036/whois/blob/v5.5.13/debian/changelog">5.5.13</a>, <a href="https://github.com/rfc1036/whois/commit/5f5ba8312c04a759dad05723c035549273d07461">5.5.11</a>))</li>
<li>wireguard-tools (<a href="https://github.com/WireGuard/wireguard-tools/releases/tag/v1.0.20210914">1.0.20210914</a>)</li>
<li>xfsprogs (<a href="https://marc.info/?l=linux-xfs&amp;m=163883318025390&amp;w=2">5.14.2</a>)</li>
<li>xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.1">5.4.1</a> (includes <a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.0">5.4.0</a>, <a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=d92fa88a835180af5d6ff22ad0e240d6468f81af;hb=f7c2cc55618b9af3318f0c908cf8db0df1e28e7c">5.2.10</a>, <a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=ebb303084403445088ec97dfedf0461a6e5b5077;hb=d8a898eb9974683bc725c49ec76722f9a8758f48">5.2.9</a>, <a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=c244b42a6771a6e8af206318dfc500d78929fd6f;hb=5476089d9c42b9b04e92b80e1800b384a98265cb">5.2.8</a>, <a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=0205423e79ce8297102096b0fc8b030ddf5b2023;hb=d24a57b7fc7e5e9267b84367cb0788d3acf7f569">5.2.7</a>, <a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=4c79b18ff26a1c479a920b21f07d050599c04c9e;hb=8dfed05bdaa4873833ba24279f02ad2db25effea">5.2.6</a>))</li>
<li>zlib (<a href="https://github.com/madler/zlib/releases/tag/v1.2.13">1.2.13</a> (includes <a href="https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/ChangeLog#L4">1.2.12</a>))</li>
<li>GCE: google-compute-image-packages (<a href="https://github.com/GoogleCloudPlatform/compute-image-packages/releases/tag/20190124">20190124</a>)</li>
<li>OEM: distro (<a href="https://github.com/python-distro/distro/releases/tag/v1.7.0">1.7.0</a>)</li>
<li>OEM: libmspack (<a href="https://github.com/kyz/libmspack/blob/v0.10.1alpha/libmspack/ChangeLog">0.10.1_alpha</a>)</li>
<li>OEM: python (<a href="https://www.python.org/downloads/release/python-3916/">3.9.16</a> (includes <a href="https://www.python.org/downloads/release/python-3912/">3.9.12</a>, <a href="https://www.python.org/downloads/release/python-398/">3.9.8</a>))</li>
<li>SDK: bison (<a href="https://lists.gnu.org/archive/html/bug-bison/2021-09/msg00056.html">3.8.2</a>)</li>
<li>SDK: boost (<a href="https://www.boost.org/users/history/version_1_81_0.html">1.81.0</a>)</li>
<li>SDK: catalyst (<a href="https://gitweb.gentoo.org/proj/catalyst.git/log/?h=3.0.21">3.0.21</a>)</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.23/release/3.23.html">3.23.3</a>)</li>
<li>SDK: edk2-ovmf (<a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202105">202105</a>)</li>
<li>SDK: file (<a href="https://github.com/file/file/blob/FILE5_44/ChangeLog">5.44</a> (includes <a href="https://mailman.astron.com/pipermail/file/2022-September/000857.html">5.43</a>, <a href="https://mailman.astron.com/pipermail/file/2021-March/000478.html">5.40</a>))</li>
<li>SDK: gcc-config (<a href="https://gitweb.gentoo.org/proj/gcc-config.git/tag/?h=v2.5">2.5</a>)</li>
<li>SDK: iasl (<a href="https://www.acpica.org/node/183">20200717</a>)</li>
<li>SDK: ipxe (<a href="https://github.com/ipxe/ipxe/releases/tag/v1.21.1">1.21.1</a>)</li>
<li>SDK: kexec-tools (<a href="https://www.spinics.net/lists/kexec/msg26864.html">2.0.22</a>)</li>
<li>SDK: libpng (<a href="http://www.libpng.org/pub/png/src/libpng-1.6.39-README.txt">1.6.39</a> (includes <a href="http://www.libpng.org/pub/png/src/libpng-1.6.38-README.txt">1.6.38</a>))</li>
<li>SDK: libtool (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10139">2.4.7</a>)</li>
<li>SDK: libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.37">1.1.37</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.35">1.1.35</a>))</li>
<li>SDK: man-db (<a href="https://gitlab.com/cjwatson/man-db/-/tags/2.9.4">2.9.4</a>)</li>
<li>SDK: man-pages (<a href="https://man7.org/linux/man-pages/changelog.html#release_5.12">5.12-r2</a>)</li>
<li>SDK: meson (<a href="https://mesonbuild.com/Release-notes-for-0-62-0.html">0.62.2</a>)</li>
<li>SDK: netperf (<a href="https://github.com/HewlettPackard/netperf/blob/netperf-2.7.0/Release_Notes">2.7.0</a>)</li>
<li>SDK: ninja (<a href="https://groups.google.com/g/ninja-build/c/R2oCyDctDf8/m/-U94Y5I8AgAJ?pli=1">1.11.0</a>)</li>
<li>SDK: pahole (<a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.23">1.23</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/5.36.0/perldelta">5.36.0</a> (includes <a href="https://perldoc.perl.org/5.34.1/perldelta">5.34.1</a>, <a href="https://kernelnewbies.org/LinuxChanges#Linux_5.15.Tracing.2C_perf_and_BPF">5.15</a>))</li>
<li>SDK: pkgconf (<a href="https://gitea.treehouse.systems/ariadne/pkgconf/src/tag/pkgconf-1.8.0/NEWS">1.8.0</a>)</li>
<li>SDK: portage (<a href="https://github.com/gentoo/portage/blob/portage-3.0.43/NEWS">3.0.43</a> (includes <a href="https://github.com/gentoo/portage/blob/portage-3.0.42/NEWS">3.0.42</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.41">3.0.41</a>))</li>
<li>SDK: Python (<a href="https://www.python.org/downloads/release/python-3912/">3.9.12</a> (includes <a href="https://www.python.org/downloads/release/python-398/">3.9.8</a>))</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/7.2">7.2.0</a> (includes <a href="https://wiki.qemu.org/ChangeLog/7.1">7.1.0</a>, <a href="https://wiki.qemu.org/ChangeLog/7.0">7.0.0</a>, <a href="https://wiki.qemu.org/ChangeLog/6.1">6.1.0</a>))</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.67.0">1.67.0</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.66.1">1.66.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.66.0">1.66.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.65.0">1.65.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.64.0">1.64.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.63.0">1.63.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.62.1">1.62.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.62.0">1.62.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.61.0">1.61.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.60.0">1.60.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.59.0">1.59.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.58.1">1.58.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.57.0">1.57.0</a>))</li>
<li>SDK: sbsigntools (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/tag/?h=v0.9.4">0.9.4</a>)</li>
<li>SDK: seabios (<a href="https://seabios.org/Releases#SeaBIOS_1.14.0">1.14.0</a>)</li>
<li>SDK: sgabios (<a href="https://git.qemu.org/?p=sgabios.git;a=tree;h=a85446adb0e0">0.1_pre10</a>)</li>
<li>SDK: squashfs-tools (<a href="https://lore.kernel.org/lkml/CAB3woddJss+ziGp-RjJ-yiax6pc_HLMdxk3Qk5nJdRgjpEYWBg@mail.gmail.com/">4.5_p20210914</a>)</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.5">12.1.5</a> (includes <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.0">12.1.0</a>, <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.5">12.0.5</a>, <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.0">12.0.0</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.132</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.3.0"/>
    <published>2023-10-05T10:09:06+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.9</id>
    <title>3033.3.9</title>
    <updated>2026-03-09T16:26:29.303060+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.8</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3534">CVE-2022-3534</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3545">CVE-2022-3545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3643">CVE-2022-3643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/920322">5.10.164</a> (includes <a href="https://lwn.net/Articles/920013">5.10.163</a>, <a href="https://lwn.net/Articles/919055">5.10.162</a>, <a href="https://lwn.net/Articles/918330">5.10.161</a>, <a href="https://lwn.net/Articles/918207">5.10.160</a>, <a href="https://lwn.net/Articles/917899">5.10.159</a>, <a href="https://lwn.net/Articles/917402">5.10.158</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_87.html">3.87</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_86.html">3.86</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.164</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.9"/>
    <published>2023-01-24T13:14:09+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.8</id>
    <title>3033.3.8</title>
    <updated>2026-03-09T16:26:29.298785+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.7</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3169">CVE-2022-3169</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3521">CVE-2022-3521</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/916764">5.10.157</a> (includes <a href="https://lwn.net/Articles/915992">5.10.156</a>, <a href="https://lwn.net/Articles/915101">5.10.155</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.157</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.8"/>
    <published>2022-12-09T09:46:54+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.7</id>
    <title>3033.3.7</title>
    <updated>2026-03-09T16:26:29.293021+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.6</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4037">CVE-2021-4037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0171">CVE-2022-0171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3061">CVE-2022-3061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3535">CVE-2022-3535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3542">CVE-2022-3542</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3586">CVE-2022-3586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3621">CVE-2022-3621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3646">CVE-2022-3646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3649">CVE-2022-3649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39842">CVE-2022-39842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40307">CVE-2022-40307</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/914423">5.10.154</a> (includes <a href="https://lwn.net/Articles/913682">5.10.153</a> <a href="https://lwn.net/Articles/913110">5.10.152</a>, <a href="https://lwn.net/Articles/912993">5.10.151</a>, <a href="https://lwn.net/Articles/912501">5.10.150</a>, <a href="https://lwn.net/Articles/911488">5.10.149</a>, <a href="https://lwn.net/Articles/911276">5.10.148</a>, <a href="https://lwn.net/Articles/910399">5.10.147</a>, <a href="https://lwn.net/Articles/909680">5.10.146</a>, <a href="https://lwn.net/Articles/909213">5.10.145</a>, <a href="https://lwn.net/Articles/908783">5.10.144</a>, <a href="https://lwn.net/Articles/908141">5.10.143</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_84.html">3.84</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.154</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.7"/>
    <published>2022-11-17T12:03:56+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.6</id>
    <title>3033.3.6</title>
    <updated>2026-03-09T16:26:29.287677+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.5</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Equinix Metal: Fixed serial console settings for the <code>m3.small.x86</code> instance by expanding the GRUB check for <code>i386</code> to <code>x86_64</code> <a href="https://github.com/flatcar-linux/coreos-overlay/pull/2122">coreos-overlay#2122</a></li>
</ul>
<h4>Changes:</h4>
<ul>
<li>emerge-gitclone: Migrate emerge-gitclone to use scripts repo tags and submodule refs</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/907525">5.10.142</a> (includes <a href="https://lwn.net/Articles/907205">5.10.141</a>, <a href="https://lwn.net/Articles/906628">5.10.140</a>, <a href="https://lwn.net/Articles/906359">5.10.139</a>, <a href="https://lwn.net/Articles/906062">5.10.138</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_83.html">3.83</a>)</li>
<li>locksmith(<a href="https://github.com/flatcar/locksmith/blob/v0.7.0/CHANGELOG.md#v070--30112021">0.7.0</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.142</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.6"/>
    <published>2022-10-17T14:39:29+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.3.5</id>
    <title>3033.3.5</title>
    <updated>2026-03-09T16:26:29.282830+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.4</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2153">CVE-2022-2153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>The new image signing subkey was added to the public key embedded into <code>flatcar-install</code> (the old expired on 10th August 2022), only an updated <code>flatcar-install</code> script can verify releases signed with the new key (<a href="https://github.com/flatcar/init/pull/79">init#79</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/905534">5.10.137</a> (includes <a href="https://lwn.net/Articles/904462">5.10.136</a>, <a href="https://lwn.net/Articles/903689">5.10.135</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_82.html">3.82</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.137</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.5"/>
    <published>2022-09-01T12:58:14+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.3.4</id>
    <title>3033.3.4</title>
    <updated>2026-03-09T16:26:29.278370+00:00</updated>
    <content type="html"><![CDATA[<p>New LTS-2022 Release 3033.3.4</p>
<p>Changes since LTS-2022 3033.3.3</p>
<h2>Security fixes:</h2>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901</a>)</li>
</ul>
<h2>Bug fixes:</h2>
<h2>Changes:</h2>
<h2>Updates:</h2>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/902918">5.10.134</a> (includes <a href="https://lwn.net/Articles/902372">5.10.133</a>, <a href="https://lwn.net/Articles/902102">5.10.132</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_81.html">3.81</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.134</li>
<li>systemd 249</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.4"/>
    <published>2022-08-04T12:04:45+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.3.3</id>
    <title>3033.3.3</title>
    <updated>2026-03-09T16:26:29.272551+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS-2022</strong> Release <strong>3033.3.3</strong></p>
<p><em>Changes since <strong>LTS 3033.3.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33656">CVE-2021-33656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32296">CVE-2022-32296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33744">CVE-2022-33744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31030">CVE-2022-31030</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Removed outdated LTS channel information printed on login (<a href="https://github.com/flatcar/init/pull/75">init#75</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Enabled <code>containerd.service</code> unit, <code>br_netfilter</code> and <code>overlay</code> modules by default to follow Kubernetes requirements (<a href="https://github.com/flatcar/coreos-overlay/pull/1944">coreos-overlay#1944</a>, <a href="https://github.com/flatcar/init/pull/72">init#72</a>)</li>
<li>DigitalOcean: In addition to the <code>bz2</code> image, a <code>gz</code> compressed image is published. This helps against hitting the compression timeout that sometimes lets the image import fail.</li>
<li>OpenStack: In addition to the <code>bz2</code> image, a <code>gz</code> compressed image is published. This allows Glance to directly consume the images by simply passing in the URL of the image.</li>
<li>SDK: The image compression format is now configurable. Supported formats are: <code>bz2</code>, <code>gz</code>, <code>zip</code>, <code>none</code>, <code>zst</code>. Selecting the image format can now be done by passing the <code>--image_compression_formats</code> option. This flag gets a comma separated list of formats.</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/901381/">5.10.131</a> (includes <a href="https://lwn.net/Articles/900910">5.10.130</a>, <a href="https://lwn.net/Articles/900322">5.10.129</a>, <a href="https://lwn.net/Articles/899789">5.10.128</a>, <a href="https://lwn.net/Articles/899371">5.10.127</a>, <a href="https://lwn.net/Articles/899121">5.10.126</a>, <a href="https://lwn.net/Articles/899090">5.10.125</a>, <a href="https://lwn.net/Articles/898623">5.10.124</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_80.html">3.80</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.13">1.5.13</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.131</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.3"/>
    <published>2022-07-21T15:46:59+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.3.2</id>
    <title>3033.3.2</title>
    <updated>2026-03-09T16:26:29.266760+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS-2022</strong> Release <strong>3033.3.2</strong></p>
<p>Changes since <strong>LTS 3033.3.1</strong></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1972">CVE-2022-1972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2078">CVE-2022-2078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32981">CVE-2022-32981</a>)</li>
<li>libpcre2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">CVE-2022-1587</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/898125">5.10.123</a> (includes <a href="https://lwn.net/Articles/897903">5.10.122</a>, <a href="https://lwn.net/Articles/897378">5.10.121</a>, <a href="https://lwn.net/Articles/897168">5.10.120</a>, <a href="https://lwn.net/Articles/896648">5.10.119</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_79.html">3.79</a>)</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.40/NEWS">10.40</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.123</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.2"/>
    <published>2022-06-23T11:49:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.18</id>
    <title>3033.3.18</title>
    <updated>2026-03-09T16:26:29.261214+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.17</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<ul>
<li>Add support for Microsoft Azure Network Adapter (MANA) NICs on Azure (<a href="https://github.com/flatcar/scripts/pull/1131">scripts#1131</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html">3.94</a>)</li>
<li>Linux (<a href="https://lwn.net/Articles/947300">5.10.198</a> (includes <a href="https://lwn.net/Articles/945381">5.10.197</a>, <a href="https://lwn.net/Articles/945131">5.10.196</a>, <a href="https://lwn.net/Articles/944878">5.10.195</a>, <a href="https://lwn.net/Articles/943405">5.10.194</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.198</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.18"/>
    <published>2023-10-25T08:40:29+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.17</id>
    <title>3033.3.17</title>
    <updated>2026-03-09T16:26:29.256231+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.16</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/943114">5.10.193</a> (includes <a href="https://lwn.net/Articles/942867">5.10.192</a>, <a href="https://lwn.net/Articles/941777">5.10.191</a>,<a href="https://lwn.net/Articles/941276">5.10.190</a>, <a href="https://lwn.net/Articles/940802">5.10.189</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.193</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.17"/>
    <published>2023-09-06T13:19:04+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.16</id>
    <title>3033.3.16</title>
    <updated>2026-03-09T16:26:29.251421+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.15</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2898">CVE-2023-2898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863</a>)</li>
<li>linux-firmware (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/939425">5.10.188</a> (includes <a href="https://lwn.net/Articles/939105">5.10.187</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_92.html">3.92</a>)</li>
<li>linux-firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625">20230625</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.188</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.16"/>
    <published>2023-08-09T11:41:25+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.15</id>
    <title>3033.3.15</title>
    <updated>2026-03-09T16:26:29.247142+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.14</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3338">CVE-2023-3338</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<ul>
<li>Changed ext4 inode size of root partition to 256 bytes. This improves compatibility with applications and is necessary for 2038 readiness (<a href="https://github.com/flatcar/Flatcar/issues/1082">Flatcar#1082</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/936676">5.10.186</a> (includes <a href="https://lwn.net/Articles/935583">5.10.185</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_91.html">3.91</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.186</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.15"/>
    <published>2023-07-18T09:01:17+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.14</id>
    <title>3033.3.14</title>
    <updated>2026-03-09T16:26:29.243052+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.13</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/934624">5.10.184</a> (includes <a href="https://lwn.net/Articles/934321">5.10.183</a>, <a href="https://lwn.net/Articles/933910">5.10.182</a>, <a href="https://lwn.net/Articles/933279">5.10.181</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90.html">3.90</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.184</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.14"/>
    <published>2023-06-21T12:18:59+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.13</id>
    <title>3033.3.13</title>
    <updated>2026-03-09T16:26:29.238714+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.12</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39189">CVE-2022-39189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/932135">5.10.180</a> (includes <a href="https://lwn.net/Articles/930264">5.10.179</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89_1.html">3.89.1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.180</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.13"/>
    <published>2023-06-01T11:48:40+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.12</id>
    <title>3033.3.12</title>
    <updated>2026-03-09T16:26:29.232844+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.11</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31607">CVE-2022-31607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31608">CVE-2022-31608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31615">CVE-2022-31615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34665">CVE-2022-34665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34666">CVE-2022-34666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34670">CVE-2022-34670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34673">CVE-2022-34673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34674">CVE-2022-34674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34676">CVE-2022-34676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34677">CVE-2022-34677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34678">CVE-2022-34678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34679">CVE-2022-34679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34680">CVE-2022-34680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34682">CVE-2022-34682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34684">CVE-2022-34684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42254">CVE-2022-42254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42255">CVE-2022-42255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42256">CVE-2022-42256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42257">CVE-2022-42257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42258">CVE-2022-42258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42259">CVE-2022-42259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42260">CVE-2022-42260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42261">CVE-2022-42261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42263">CVE-2022-42263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42264">CVE-2022-42264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42265">CVE-2022-42265</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fix the broken emerge-gitclone in the dev-container owing to the missing migration action around the unification of the Flatcar core repositories</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>The package upgrade for nvidia-drivers might result in not supporting a few of the older NVIDIA Tesla GPUs. If you are facing issues, set <code>NVIDIA_DRIVER_VERSION=460.106.00</code> in <code>/etc/flatcar/nvidia-metadata</code></li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/929680/">5.10.178</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-525-105-17/index.html">525.105.17</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.178</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.12"/>
    <published>2023-04-25T13:46:55+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.11</id>
    <title>3033.3.11</title>
    <updated>2026-03-09T16:26:29.226841+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.10</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23004">CVE-2023-23004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<ul>
<li>Added new image signing pub key to <code>flatcar-install</code>, needed for download verification of releases built from July 2023 onwards, if you have copies of <code>flatcar-install</code> or the image signing pub key, you need to update them as well (<a href="https://github.com/flatcar/init/pull/92">init#92</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89.html">3.89</a>)</li>
<li>Linux (<a href="https://lwn.net/Articles/928342">5.10.177</a> (includes <a href="https://lwn.net/Articles/926874">5.10.176</a>, <a href="https://lwn.net/Articles/926416">5.10.175</a>, <a href="https://lwn.net/Articles/925992">5.10.174</a>, <a href="https://lwn.net/Articles/925935">5.10.173</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.177</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.11"/>
    <published>2023-04-17T13:20:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-3033.3.10</id>
    <title>3033.3.10</title>
    <updated>2026-03-09T16:26:29.221478+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 3033.3.9</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4129">CVE-2022-4129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1073">CVE-2023-1073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1074">CVE-2023-1074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/925079">5.10.172</a> (includes <a href="https://lwn.net/Articles/925065">5.10.171</a>, <a href="https://lwn.net/Articles/924440">5.10.170</a>, <a href="https://lwn.net/Articles/924074">5.10.169</a>, <a href="https://lwn.net/Articles/923395">5.10.168</a>, <a href="https://lwn.net/Articles/922341">5.10.167</a>, <a href="https://lwn.net/Articles/921852">5.10.166</a>, <a href="https://lwn.net/Articles/921030">5.10.165</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_88_1.html">3.88.1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.172</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.10"/>
    <published>2023-03-07T15:25:03+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.3.1</id>
    <title>3033.3.1</title>
    <updated>2026-03-09T16:26:29.215372+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS-2022</strong> Release <strong>3033.3.1</strong></p>
<p><em>Changes since <strong>LTS-2022 3033.3.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1198">CVE-2022-1198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29582">CVE-2022-29582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1204">CVE-2022-1204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1205">CVE-2022-1205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1836">CVE-2022-1836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured <code>/etc/flatcar/update.conf</code> exists because it happens to be used as flag file for Ansible (<a href="https://github.com/flatcar/init/pull/71">init#71</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/896225/">5.10.118</a> (includes <a href="https://lwn.net/Articles/895646">5.10.117</a>, <a href="https://lwn.net/Articles/895319">5.10.116</a>, <a href="https://lwn.net/Articles/895071">5.10.115</a>, <a href="https://lwn.net/Articles/894358">5.10.114</a>, <a href="https://lwn.net/Articles/892813">5.10.113</a>, <a href="https://lwn.net/Articles/891997">5.10.112</a>, <a href="https://lwn.net/Articles/891252">5.10.111</a>, <a href="https://lwn.net/Articles/890723">5.10.110</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html">3.78</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.118</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.1"/>
    <published>2022-06-02T15:10:04+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.3.0</id>
    <title>3033.3.0</title>
    <updated>2026-03-09T16:26:29.170310+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS-2022</strong> Release <strong>3033.3.0</strong></p>
<p><em>Changes since <strong>LTS-2021 2605.27.1</strong></em></p>
<p>Update to CGroupsV2: Flatcar Container Linux migrates to the unified cgroup hierarchy (aka cgroups v2)! New nodes will utilize cgroups v2 by default. Existing nodes remain on cgroups v1 and need to be manually migrated to cgroups v2. To learn more about the cgroups v2 on Flatcar Container Linux and the migration guide, please refer to https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/</p>
<p>Other notable changes: cri-tools and lbzip2 got added, PAM tally2 got replaced by PAM faillock, only a single Docker version is now shipped (20.10), and rkt, kubelet-wapper, dhcpcd, and containerd-stress got removed.</p>
<h3>Security fixes:</h3>
<p>(Note: Not all fixed issues may have been present in the old versions)</p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27170">CVE-2020-27170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25220">CVE-2020-25220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27171">CVE-2020-27171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35499">CVE-2020-35499</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0286">CVE-2022-0286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0516">CVE-2022-0516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3411">CVE-2021-3411</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3489">CVE-2021-3489</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3490">CVE-2021-3490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3491">CVE-2021-3491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3501">CVE-2021-3501</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3543">CVE-2021-3543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4001">CVE-2021-4001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4028">CVE-2021-4028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4204">CVE-2021-4204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20268">CVE-2021-20268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22600">CVE-2021-22600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26708">CVE-2021-26708</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28039">CVE-2021-28039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28691">CVE-2021-28691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28952">CVE-2021-28952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29266">CVE-2021-29266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29646">CVE-2021-29646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29649">CVE-2021-29649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29657">CVE-2021-29657</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34866">CVE-2021-34866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38206">CVE-2021-38206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38207">CVE-2021-38207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38209">CVE-2021-38209</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31440">CVE-2021-31440</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41073">CVE-2021-41073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45402">CVE-2021-45402</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43267">CVE-2021-43267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46283">CVE-2021-46283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847</a>)</li>
<li>systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3997">CVE-2021-3997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21284">CVE-2021-21284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21285">CVE-2021-21285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41089">CVE-2021-41089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41091">CVE-2021-41091</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41092">CVE-2021-41092</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15257">CVE-2020-15257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21334">CVE-2021-21334</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43816">CVE-2021-43816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769</a>)</li>
<li>Docker, containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">CVE-2020-27618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29562">CVE-2020-29562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3998">CVE-2021-3998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27645">CVE-2021-27645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38604">CVE-2021-38604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28362">CVE-2020-28362</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28366">CVE-2020-28366</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28367">CVE-2020-28367</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27918">CVE-2021-27918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27919">CVE-2021-27919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29923">CVE-2021-29923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31525">CVE-2021-31525</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33196">CVE-2021-33196</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33197">CVE-2021-33197</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36221">CVE-2021-36221</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772">CVE-2021-41772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921</a>)</li>
<li>bash (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9924">CVE-2019-9924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18276">CVE-2019-18276</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3530">CVE-2021-3530</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3549">CVE-2021-3549</a>)</li>
<li>boost (<a href="https://nvd.nist.gov/vuln/detail/CVE-2012-2677">CVE-2012-2677</a>)</li>
<li>bsdiff <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-9862">CVE-2014-9862</a></li>
<li>bzip2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22890">CVE-2021-22890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22901">CVE-2021-22901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22945">CVE-2021-22945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">CVE-2021-22946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">CVE-2021-22947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">CVE-2021-22923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">CVE-2021-22924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22925">CVE-2021-22925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22926">CVE-2021-22926</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8277">CVE-2020-8277</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672</a>)</li>
<li>ca-certificates (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527</a>)</li>
<li>cifs-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14342">CVE-2020-14342</a>)</li>
<li>coreutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7476">CVE-2017-7476</a>)</li>
<li>dbus (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">CVE-2013-0340</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315</a>)</li>
<li>gettext (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40330">CVE-2021-40330</a>)</li>
<li>glib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">CVE-2021-28153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219</a>)</li>
<li>gnupg (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25125">CVE-2020-25125</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20231">CVE-2021-20231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20232">CVE-2021-20232</a>)</li>
<li>gptfdisk (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0308">CVE-2021-0308</a>)</li>
<li>ignition (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14040">CVE-2020-14040</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513</a>)</li>
<li>libgcrypt (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40528">CVE-2021-40528</a>)</li>
<li>libpcre (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155</a>)</li>
<li>libuv (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22918">CVE-2021-22918</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541</a>)</li>
<li>lz4 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3520">CVE-2021-3520</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222</a>)</li>
<li>ncurses (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17594">CVE-2019-17594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595">CVE-2019-17595</a>)</li>
<li>nettle (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580</a>)</li>
<li>ntp (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956">CVE-2018-8956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025">CVE-2020-15025</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21813">CVE-2022-21813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21814">CVE-2022-21814</a>)</li>
<li>open-iscsi (<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17840">CVE-2017-17840</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3449">CVE-2021-3449</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3450">CVE-2021-3450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778</a>)</li>
<li>openldap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212</a>)</li>
<li>pam <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27780">CVE-2020-27780</a></li>
<li>polkit (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465</a>)</li>
<li>samba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10197">CVE-2019-10197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10704">CVE-2020-10704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383">CVE-2020-14383</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19882">CVE-2019-19882</a>)</li>
<li>sqlite (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20227">CVE-2021-20227</a>)</li>
<li>sssd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838">CVE-2018-16838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16883">CVE-2018-16883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3811">CVE-2019-3811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3621">CVE-2021-3621</a>)</li>
<li>tar (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20193">CVE-2021-20193</a>)</li>
<li>trousers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24330">CVE-2020-24330</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24331">CVE-2020-24331</a>)</li>
<li>util-linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3770">CVE-2021-3770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3778">CVE-2021-3778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3796">CVE-2021-3796</a>)</li>
<li>zstd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-24032">CVE-2021-24032</a>)</li>
<li>SDK: bison (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14150">CVE-2020-14150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24240">CVE-2020-24240</a>)</li>
<li>SDK: dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687</a>)</li>
<li>SDK: perl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878</a>)</li>
<li>SDK: qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10717">CVE-2020-10717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13754">CVE-2020-13754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15859">CVE-2020-15859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25741">CVE-2020-25741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25742">CVE-2020-25742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25743">CVE-2020-25743</a>)</li>
<li>SDK: Rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36323">CVE-2020-36323</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28876">CVE-2021-28876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28877">CVE-2021-28877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28878">CVE-2021-28878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28879">CVE-2021-28879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31162">CVE-2021-31162</a>)</li>
</ul>
<h3>Bug fixes:</h3>
<ul>
<li>The Torcx profile <code>docker-1.12-no</code> got fixed to reference the current Docker version instead of 19.03 which wasn't found on the image, causing Torcx to fail to provide Docker (<a href="https://github.com/flatcar/coreos-overlay/pull/1456">coreos-overlay#1456</a>)</li>
<li>Ensured that the <code>/run/xtables.lock</code> coordination file exists for modifications of the xtables backend from containers (must be bind-mounted) or the <code>iptables-legacy</code> binaries on the host (<a href="https://github.com/flatcar/init/pull/57">init#57</a>)</li>
<li>SDK: Fixed build error popping up in the new SDK Container because <code>policycoreutils</code> used the wrong ROOT to update the SELinux store (<a href="https://github.com/flatcar/coreos-overlay/pull/1502">coreos-overlay#1502</a>)</li>
<li>Fixed leak of SELinux policy store to the root filesystem top directory due to wrong store path in <code>policycoreutils</code> instead of <code>/var/lib/selinux</code> (<a href="https://github.com/flatcar/Flatcar/issues/596">flatcar-linux/Flatcar#596</a>)</li>
<li>Disabled the systemd-networkd settings <code>ManageForeignRoutes</code> and <code>ManageForeignRoutingPolicyRules</code> by default to ensure that CNIs like Cilium don't get their routes or routing policy rules discarded on network reconfiguration events (<a href="https://github.com/flatcar/Flatcar/issues/620">Flatcar#620</a>).</li>
<li>AWS: specify correct console (ttyS0) on kernel command line for ARM64 instances (<a href="https://github.com/flatcar/coreos-overlay/pull/1628">coreos-overlay#1628</a>)</li>
<li>Prevented hitting races when creating filesystems in Ignition, these races caused boot failures like <code>fsck[1343]: Failed to stat /dev/disk/by-label/ROOT: No such file or directory</code> when creating a btrfs root filesystem (<a href="https://github.com/flatcar/ignition/pull/35">ignition#35</a>)</li>
<li>Reverted the Linux kernel change to forbid xfrm id 0 for IPSec state because it broke Cilium (<a href="https://github.com/flatcar/Flatcar/issues/626">Flatcar#626</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/1682">coreos-overlay#1682</a>)</li>
<li>Reverted the Linux kernel commit which broke networking on AWS instances which use Intel 82559 NIC (c4/m4) (<a href="https://github.com/flatcar/Flatcar/issues/665">Flatcar#665</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/1720">coreos-overlay#1720</a>)</li>
<li>Added pahole to developer container, without it kernel modules built against /usr/src/linux may fail to probe with an 'invalid relocation target' error (<a href="https://github.com/flatcar/coreos-overlay/pull/1839">coreos-overlay#1839</a>)</li>
<li>vim with USE=minimal was fixed to run without warning in the beginning <a href="https://github.com/flatcar/portage-stable/pull/260">portage-stable#260</a></li>
<li>dev container: Fix github URL for coreos-overlay and portage-stable to use repos from flatcar-linux org directly instead of relying on redirects from the kinvolk org. This fixes checkouts with emerge-gitclone inside dev-container. <a href="https://github.com/flatcar/scripts/pull/194">scripts#194</a></li>
<li>Added missing SELinux rule as initial step to resolve Torcx unpacking issue (<a href="https://github.com/flatcar/coreos-overlay/pull/1426">coreos-overlay#1426</a>)</li>
<li>Randomize OEM filesystem UUID if mounting fails (<a href="https://github.com/flatcar/init/pull/47">init#47</a>)</li>
<li>Run emergency.target on ignition/torcx service unit failure in dracut (<a href="https://github.com/flatcar/bootengine/pull/28">bootengine#28</a>)</li>
<li>Re-enabled kernel config FS_ENCRYPTION (<a href="https://github.com/flatcar/coreos-overlay/pull/1212/">coreos-overlay#1212</a>)</li>
<li>Fixed Perl in dev-container (<a href="https://github.com/flatcar/coreos-overlay/pull/1238/">coreos-overlay#1238</a>)</li>
<li>Fixed containerd config after introduction of CGroupsV2 (<a href="https://github.com/flatcar/coreos-overlay/pull/1214">coreos-overlay#1214</a>)</li>
<li>Fixed path for amazon-ssm-agent in base-ec2.ign (<a href="https://github.com/flatcar/coreos-overlay/pull/1228">coreos-overlay#1228</a>)</li>
<li>flatcar-install: randomized OEM filesystem UUID if mounting fails (<a href="https://github.com/flatcar/init/pull/47">init#47</a>)</li>
<li>Fixed null-pointer deref crash in Ignition when specifying the OEM filesystem without a label (<a href="https://github.com/flatcar/ignition/pull/25">ignition#25</a>)</li>
<li>Fixed locksmith adhering to reboot window when getting the etcd lock (<a href="https://github.com/flatcar/locksmith/pull/10">locksmith#10</a>)</li>
<li>Fixed pam.d sssd LDAP auth with sudo (<a href="https://github.com/flatcar/coreos-overlay/pull/1170">coreos-overlay#1170</a>)</li>
<li>Let network-cleanup.service finish before entering rootfs (<a href="https://github.com/flatcar/coreos-overlay/pull/1182">coreos-overlay#1182</a>)</li>
<li>Fixed SELinux policy for Flannel CNI (<a href="https://github.com/flatcar/coreos-overlay/pull/1181">coreos-overlay#1181</a>)</li>
<li>Set the cilium_vxlan interface to be not managed by networkd’s default setup with DHCP as it’s managed by Cilium. (<a href="https://github.com/flatcar/init/pull/43">init#43</a>)</li>
<li>Disabled SELinux by default on dockerd wrapper script (<a href="https://github.com/flatcar/coreos-overlay/pull/1149">coreos-overlay#1149</a>)</li>
<li>Fixed the network-cleanup service race in the initramfs which resulted in a failure being reported</li>
<li>GCE: Granted CAP_NET_ADMIN to set routes for the TCP LB when starting oem-gce.service (<a href="https://github.com/flatcar/coreos-overlay/pull/1146">coreos-overlay#1146</a>)</li>
<li>Add the systemd tag in udev for Azure storage devices, to fix /boot automount (<a href="https://github.com/flatcar/init/pull/41">init#41</a>)</li>
<li>Update-engine sent empty requests when restarted before a pending reboot (<a href="https://github.com/flatcar/Flatcar/issues/388">Flatcar#388</a>)</li>
<li>systemd-networkd: Do not manage loopback network interface (<a href="https://github.com/flatcar/bootengine/pull/24">bootengine#24</a> <a href="https://github.com/flatcar/init/pull/40">init#40</a>)</li>
<li>flatcar-install: Detect device mapper (e.g., LVM/LUKS) usage when searching for free drives with the -s flag (<a href="https://github.com/flatcar/Flatcar/issues/332">Flatcar#332</a>)</li>
<li>GCE: The old interface name ens4v1 which was replaced by eth0 due to a broken udev rule was restored, but now as alternative interface name, and eth0 will stay the primary name for consistency across cloud environments. (<a href="https://github.com/flatcar/init/pull/38">init#38</a>)</li>
<li>Include firmware files for all modules shipped in our image (<a href="https://github.com/flatcar/Flatcar/issues/359">Issue #359</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/887">coreos-overlay#887</a>)</li>
<li>Add explicit path to the binary call in the coreos-metadata unit file (<a href="https://github.com/flatcar/Flatcar/issues/360">Issue #360</a>)</li>
<li>sys-apps/systemd: Fix unit installation (<a href="https://github.com/flatcar/coreos-overlay/pull/810">coreos-overlay#810</a>)</li>
<li>passwd: use correct GID for tss (<a href="https://github.com/flatcar/baselayout/pull/15">baselayout#15</a>)</li>
<li>coreos-base/gmerge: Stop installing gmerge script (<a href="https://github.com/flatcar/coreos-overlay/pull/828">coreos-overlay#828</a>)</li>
<li>Update sys-apps/coreutils and make sure they have split-usr disabled for generic images (<a href="https://github.com/flatcar/coreos-overlay/pull/829">coreos-overlay#829</a>)</li>
<li>afterburn (coreos-metadata): Restart on failure and keep coreos-metadata unit active (<a href="https://github.com/flatcar/coreos-overlay/pull/768">coreos-overlay#768</a>)</li>
<li>network: Accept ICMPv6 Router Advertisements to fix IPv6 address assignment in the default DHCP setting (<a href="https://github.com/flatcar/init/pull/51">flatcar-linux/init#51</a>, <a href="https://github.com/flatcar/coreos-cloudinit/pull/12">flatcar-linux/cloudinit#12</a>, <a href="https://github.com/flatcar/bootengine/pull/30">flatcar-linux/bootengine#30</a>)</li>
<li>Added a new flatcar-update tool to the image to ease manual updates, rollbacks, channel/release jumping, and airgapped updates (<a href="https://github.com/flatcar/init/pull/53">flatcar-linux/init#53</a>)</li>
<li>Default again to disable SELinux permissions checks in systemd which was missing in the initial systemd 246 update</li>
<li>Default again to set DefaultTasksMax=100% in systemd which was missing in the initial systemd 246 update</li>
<li>Make systemd detect updates again when the /usr partition changes which was missing in the initial systemd 246 update</li>
<li>Default again to disabling IP Forwarding in systemd which was missing in the initial systemd 246 update</li>
<li>Default again to waiting only for one network interface to be ready with systemd-networkd-wait-online which was missing in the initial systemd 246 update</li>
</ul>
<h3>Changes:</h3>
<ul>
<li>Backported <code>elf</code> support for <code>iproute2</code> (<a href="https://github.com/flatcar/coreos-overlay/pull/1526">coreos-overlay#1256</a>)</li>
<li>Enabled the FIPS support for the Linux kernel, which users can now choose through a kernel parameter in <code>grub.cfg</code> (check it taking effect with <code>cat /proc/sys/crypto/fips_enabled</code>) (<a href="https://github.com/flatcar/coreos-overlay/pull/1602">coreos-overlay#1602</a>)</li>
<li>Merge the Flatcar Pro features into the regular Flatcar images (<a href="https://github.com/flatcar/coreos-overlay/pull/1679">coreos-overlay#1679</a>)</li>
<li>Added support for switching back to CGroupsV1 without requiring a reboot. Create <code>/etc/flatcar-cgroupv1</code> through ignition. (<a href="https://github.com/flatcar/coreos-overlay/pull/1666">coreos-overlay#1666</a>)</li>
<li>Enabled FIPS mode for cryptsetup (<a href="https://github.com/flatcar/coreos-overlay/pull/1747">coreos-overlay#1747</a>)</li>
<li>GCE: Enabled GVE kernel driver, which adds support for Google Virtual NIC on GCP (<a href="https://github.com/flatcar/coreos-overlay/pull/1802">coreos-overlay#1802</a>)</li>
<li>Enabled FIPS mode for cryptsetup (<a href="https://github.com/flatcar/portage-stable/pull/312">portage-stable#312</a>)</li>
<li>Added GPIO support (<a href="https://github.com/flatcar/coreos-overlay/pull/1236">coreos-overlay#1236</a>)</li>
<li>Added Azure Generation 2 VM support (<a href="https://github.com/flatcar/coreos-overlay/pull/1198">coreos-overlay#1198</a>)</li>
<li>Switched Docker ecosystem packages to go1.16 (<a href="https://github.com/flatcar/coreos-overlay/pull/1217">coreos-overlay#1217</a>)</li>
<li>Added lbzip2 binary to the image (<a href="https://github.com/flatcar/coreos-overlay/pull/1221">coreos-overlay#1221</a>)</li>
<li>flatcar-install uses lbzip2 if present, falls back on bzip2 if not (<a href="https://github.com/flatcar/init/pull/46">init#46</a>)</li>
<li>Added Intel E800 series network adapter driver (<a href="https://github.com/flatcar/coreos-overlay/pull/1237">coreos-overlay#1237</a>)</li>
<li>Enabled ‘audit’ use flag for sys-libs/pam (<a href="https://github.com/flatcar/coreos-overlay/pull/1233">coreos-overlay#1233</a>)</li>
<li>Bumped etcd and flannel to respectively 3.5.0, 0.14.0 to get multiarch images for arm64 support. Note for users of the old etcd v2 support: ETCDCTL_API=2 must be set to use v2 store as well as ETCD_ENABLE_V2=true in the etcd-member.service - this support will be removed in 3.6.0 (<a href="https://github.com/flatcar/coreos-overlay/pull/1179">coreos-overlay#1179</a>)</li>
<li>cgroups v2 by default for new nodes (<a href="https://github.com/flatcar/coreos-overlay/pull/931">coreos-overlay#931</a>)</li>
<li>Upgrade Docker to 20.10 (<a href="https://github.com/flatcar/coreos-overlay/pull/931">coreos-overlay#931</a>)</li>
<li>update_engine: add postinstall hook to stay on cgroupv1 (<a href="https://github.com/flatcar/update_engine/pull/13">update_engine#13</a>)</li>
<li>Switched to zstd compression for the initramfs (<a href="https://github.com/flatcar/coreos-overlay/pull/1136">coreos-overlay#1136</a>)</li>
<li>Embedded new subkey in flatcar-install (<a href="https://github.com/flatcar/coreos-overlay/pull/1180">coreos-overlay#1180</a>)</li>
<li>Azure: Compile OEM contents for all architectures (<a href="https://github.com/flatcar/coreos-overlay/pull/1196">coreos-overlay#1196</a>)</li>
<li>AWS: Added amazon-ssm-agent (<a href="https://github.com/flatcar/coreos-overlay/pull/1162">coreos-overlay#1162</a>)</li>
<li>Switched dm-verity corruption detection to issue a kernel panic (a panic results in a reboot after 1 minute, this was the case before already) instead of merely failing certain syscalls that try to use the corrupted data</li>
<li>Support BTRFS in OEM and /usr partitions, but only used it for the OEM partition for now. Ignition configurations that refer to the OEM partition will work with any filesystem format specified, a mismatch is not resulting in a boot error. (<a href="https://github.com/flatcar/coreos-overlay/pull/1106">coreos-overlay#1106</a>)</li>
<li>Enabled zstd compression for the initramfs and for amd64 also for the kernel because we hit the vmlinuz size limit on the /boot partition</li>
<li>Deleted the unused kernel+initramfs vmlinuz file from the /usr partition</li>
<li>devcontainer: added support to run on arm64 by switching to an architecture-agnostic partition UUID</li>
<li>Enabled ARM64 SDK bootstrap (<a href="https://github.com/flatcar/scripts/pull/134">scripts#134</a>)</li>
<li>Enable telnet support for curl (<a href="https://github.com/flatcar/coreos-overlay/pull/1099">coreos-overlay#1099</a>)</li>
<li>Enable MDIO_BCM_UNIMAC for arm64 (<a href="https://github.com/flatcar/coreos-overlay/pull/929">coreos-overlay#929</a>)</li>
<li>Disabled SELinux for Docker (<a href="https://github.com/flatcar/coreos-overlay/pull/1055">coreos-overlay#1055</a>)</li>
<li>flatcar-install: Add -D flag to only download the image file (<a href="https://github.com/flatcar/Flatcar/issues/248">Flatcar#248</a>)</li>
<li>Make the hostname setting units optional. Having the hostname units as required by the initrd.target meant that if the unit failed the machine wouldn’t start, disrupting the whole boot. (<a href="https://github.com/flatcar/bootengine/pull/23">bootengine#23</a>)</li>
<li>Enable using iSCSI netroot devices on Flatcar (<a href="https://github.com/flatcar/bootengine/pull/22">bootengine#22</a>)</li>
<li>The virtio network interfaces got predictable interface names as alternative interface names, and thus these names can also be used to match for a specific interface in case there is more than one and the eth0 and eth1 name assignment is not stable. (<a href="https://github.com/flatcar/init/pull/38">init#38</a>)</li>
<li>The pam_faillock PAM module was enabled as replacement for the removed pam_tally2 module and will temporarily lock an account if there were login attempts with a wrong password. The faillock command can be used to show the current state. With pam_tally2 there was no limit for wrong password login attempts but with faillock the default is already restricting the attempts. The default behavior was relaxed to allow 5 wrong passwords per two minutes, and a one minute account lock time. This does not apply to logins with an SSH key. (<a href="https://github.com/flatcar/baselayout/pull/17">baselayout#17</a>)</li>
<li>The etcd and flannel services are now run with Docker and any rkt-based customizations of the etcd-member and flanneld services not supported anymore. Also, because the flanneld service relies on Docker and will restart Docker after applying the new configuration, it is not possible anymore to set Requires=flanneld.service for docker.service and instead it’s enough to have flanneld.service enabled. (<a href="https://github.com/flatcar/coreos-overlay/pull/857">coreos-overlay#857</a>)</li>
<li>sshd: use secure crypto algos only (<a href="https://github.com/flatcar/coreos-overlay/pull/852">coreos-overlay#852</a>)</li>
<li>samba: Update to EAPI=7, add new USE flags and remove deps on icu (<a href="https://github.com/flatcar/coreos-overlay/pull/864">coreos-overlay#864</a>)</li>
<li>kernel: enable kernel config CONFIG_BPF_LSM (<a href="https://github.com/flatcar/coreos-overlay/pull/846">coreos-overlay#846</a>)</li>
<li>bootengine: set hostname for EC2 and OpenStack from metadata (<a href="https://github.com/flatcar/coreos-overlay/pull/848">coreos-overlay#848</a>)</li>
<li>sys-block/open-iscsi: Command substitution in iscsi-init system service (<a href="https://github.com/flatcar/coreos-overlay/pull/801">coreos-overlay#801</a>)</li>
<li>scripts/motdgen: Add OEM information to motd output (<a href="https://github.com/flatcar/init/pull/34">init#34</a>)</li>
<li>torcx: delete Docker 1.12 (<a href="https://github.com/flatcar/coreos-overlay/pull/826">coreos-overlay#826</a>)</li>
<li>portage update: update portage and related packages to newer versions (<a href="https://github.com/flatcar/coreos-overlay/pull/840">coreos-overlay#840</a>)</li>
<li>bin/flatcar-install: add parameters to make wget more resilient (<a href="https://github.com/flatcar/init/pull/35">init#35</a>)</li>
<li>With the open-iscsi update to 2.1.2, the service unit name changed from iscsid to iscsi (<a href="https://github.com/flatcar/coreos-overlay/pull/682">coreos-overlay#682</a>)</li>
<li>Updated nsswitch.conf to use systemd-resolved (<a href="https://github.com/flatcar/baselayout/pull/10">baselayout#10</a>)</li>
<li>Enabled systemd-resolved stub listeners (<a href="https://github.com/flatcar/baselayout/pull/11">baselayout#11</a>)</li>
<li>systemd-resolved: Disabled DNSSEC for the mean time (<a href="https://github.com/flatcar/baselayout/pull/14">baselayout#14</a>)</li>
<li>kernel: enabled CONFIG_DEBUG_INFO_BTF (<a href="https://github.com/flatcar/coreos-overlay/pull/753">coreos-overlay#753</a>)</li>
<li>containerd: Disabled shim debug logs (<a href="https://github.com/flatcar/coreos-overlay/pull/766">coreos-overlay#766</a>)</li>
<li>Enable BCMGENET as a module on arm64_defconfig-5.9 (<a href="https://github.com/flatcar/coreos-overlay/pull/717">coreos-overlay#717</a>)</li>
<li>Enable BCM7XXX_PHY as a module on arm64_defconfig-5.9 for Raspberry Pi 4 (<a href="https://github.com/flatcar/coreos-overlay/pull/716">coreos-overlay#716</a>)</li>
<li>flatcar_production_qemu.sh: Use more CPUs for ARM if available (<a href="https://github.com/flatcar/flatcar-scripts/pull/91">scripts#91</a>)</li>
<li>Enabled the kernel config HOTPLUG_PCI_ACPI for arm64 to support attaching EC2 volumes (<a href="https://github.com/flatcar/coreos-overlay/pull/705">coreos-overlay#705</a>)</li>
<li>Support the lockdown kernel command line parameter (<a href="https://github.com/flatcar/coreos-overlay/pull/553">coreos-overlay#533</a>)</li>
<li>AWS arm64: Enable elastic network adapter module (<a href="https://github.com/flatcar/coreos-overlay/pull/631">coreos-overlay#631</a>)</li>
<li>rkt and kubelet-wrapper are deprecated and removed from Alpha, also from subsequent channels in the future. Please read the <a href="https://groups.google.com/g/flatcar-linux-user/c/MeinndLqJO4">removal announcement</a> to know more.</li>
</ul>
<h3>Updates:</h3>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/889439">5.10.109</a>) (from 5.4.188)</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20211216">20211216</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v249.10">249.10</a>)</li>
<li>glibc (<a href="https://sourceware.org/glibc/wiki/Release/2.33">2.33</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.8">1.17.8</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201012">20.10.12</a>)</li>
<li>bash (<a href="https://lists.gnu.org/archive/html/info-gnu/2020-12/msg00003.html">5.1</a>)</li>
<li>c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_17_2">1.17.2</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_73.html">3.73</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.11">1.5.11</a>)</li>
<li>coreutils (<a href="http://savannah.gnu.org/forum/forum.php?forum_id=9693">8.32</a>)</li>
<li>cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.3.6/docs/v2.3.6-ReleaseNotes">2.3.6</a>)</li>
<li>curl (<a href="https://curl.se/mail/lib-2021-09/0079.html">7.79.1</a>)</li>
<li>dbus (<a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.12.20/NEWS">1.12.20</a>)</li>
<li>ebtables (<a href="https://lwn.net/Articles/806179/">2.0.11</a>)</li>
<li>etcd-wrapper (<a href="https://github.com/etcd-io/etcd/releases/tag/v3.5.0">3.5.0</a>)</li>
<li>etcdctl (<a href="https://github.com/etcd-io/etcd/releases/tag/v3.5.0">3.5.0</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes">2.4.6</a>)</li>
<li>flannel-wrapper (<a href="https://github.com/flannel-io/flannel/releases/tag/v0.14.0">0.14</a>)</li>
<li>gawk (<a href="https://lists.gnu.org/archive/html/info-gnu/2020-04/msg00007.html">5.1.0</a>)</li>
<li>gettext (<a href="https://lists.gnu.org/archive/html/info-gnu/2020-07/msg00009.html">0.21</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/master/Documentation/RelNotes/2.32.0.txt">2.32.0</a>)</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.66.8">2.66.8</a>)</li>
<li>gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2021q3/000461.html">2.2.29</a>)</li>
<li>gnutls (<a href="https://github.com/gnutls/gnutls/blob/3.7.1/NEWS">3.7.1</a>)</li>
<li>gptfdisk (<a href="http://www.rodsbooks.com/gdisk/">1.0.7</a>)</li>
<li>ignition (<a href="https://github.com/flatcar/ignition/releases/tag/v0.36.1">0.36.1</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20210608">20210608_p20210608</a>)</li>
<li>iptables (<a href="https://lwn.net/Articles/843069/">1.8.7</a>)</li>
<li>keyutils (<a href="https://lwn.net/Articles/771934/">1.6.1</a>)</li>
<li>ldb (<a href="https://gitlab.com/samba-team/samba/-/blob/ldb-2.3.0/WHATSNEW.txt">2.3.0</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.5.1">3.5.1</a>)</li>
<li>libev (<a href="http://dist.schmorp.de/libev/">4.33</a>)</li>
<li>libgcrypt (<a href="https://dev.gnupg.org/T5402">1.9.4</a>)</li>
<li>libmnl (<a href="https://marc.info/?l=netfilter-devel&amp;m=146745072727070&amp;w=2">1.0.4</a>)</li>
<li>libnftnl (<a href="https://lwn.net/Articles/857198/">1.2.0</a>)</li>
<li>libpcre (<a href="http://www.rexegg.com/pcre-doc/ChangeLog">8.44</a>)</li>
<li>libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/libselinux-3.1">3.1</a>)</li>
<li>libsemanage (<a href="https://github.com/SELinuxProject/selinux/releases/tag/libsemanage-3.1">3.1</a>)</li>
<li>libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/libsepol-3.1">3.1</a>)</li>
<li>libtirpc (<a href="https://www.spinics.net/lists/linux-nfs/msg84129.html">1.3.2</a>)</li>
<li>libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.41.1">1.41.1</a>)</li>
<li>libverto (<a href="https://github.com/latchset/libverto/releases/tag/0.3.1">0.3.1</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.12">2.9.12</a>)</li>
<li>lvm2 (<a href="https://github.com/lvmteam/lvm2/blob/v2_02_188/WHATS_NEW">2.02.188</a>)</li>
<li>lz4 (<a href="https://github.com/lz4/lz4/releases/tag/v1.9.3">1.9.3</a>)</li>
<li>mit-krb5 (<a href="https://web.mit.edu/kerberos/krb5-1.19/README-1.19.2.txt">1.19.2</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/releases/tag/0.8.5">0.8.5</a>)</li>
<li>ncurses (<a href="https://lists.gnu.org/archive/html/info-gnu/2020-02/msg00010.html">6.2</a>)</li>
<li>net-tools (<a href="https://sourceforge.net/p/net-tools/mailman/message/37192002/">2.10</a>)</li>
<li>nettle (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00002.html">3.7.3</a>)</li>
<li>nftables (<a href="https://lwn.net/Articles/857369/">0.9.9</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-47-03/index.html">510.47.03</a>)</li>
<li>openldap (<a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/GK4OGTM6VMIAJCAZSG66VXRRN2LVQDVF/">2.4.58</a>)</li>
<li>openssh (<a href="https://www.openssh.com/txt/release-8.7">8.7</a>)</li>
<li>openssl (<a href="https://www.openssl.org/news/changelog.html#openssl-111">1.1.1n</a>)</li>
<li>pam (<a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.5.1">1.5.1</a>)</li>
<li>pambase 20200817</li>
<li>pax-utils (<a href="https://gitweb.gentoo.org/proj/pax-utils.git/tag/?h=v1.3.1">1.3.1</a>)</li>
<li>policycoreutils (<a href="https://github.com/SELinuxProject/selinux/tree/policycoreutils-3.1">3.1</a>)</li>
<li>polkit (<a href="https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.119/NEWS">0.119</a>)</li>
<li>readline (<a href="https://lwn.net/Articles/839213/">8.1</a>)</li>
<li>realmd (<a href="https://gitlab.freedesktop.org/realmd/realmd/-/blob/0.17.0/NEWS">0.17.0</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.0.3">1.0.3</a>)</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.12.9.html">4.12.9</a>)</li>
<li>selinux-base (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818">2.20200818</a>)</li>
<li>selinux-base-policy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818">2.20200818</a>)</li>
<li>selinux-unconfined (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818">2.20200818</a>)</li>
<li>selinux-virt (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818">2.20200818</a>)</li>
<li>sssd (<a href="https://sssd.io/release-notes/sssd-2.3.1.html">2.3.1</a>)</li>
<li>strace (<a href="https://lists.strace.io/pipermail/strace-devel/2021-April/010516.html">5.12</a>)</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/tags/talloc-2.3.2">2.3.2</a>)</li>
<li>tar (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-02/msg00006.html">1.34</a>)</li>
<li>util-linux (<a href="https://www.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.2-ChangeLog">2.37.2</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v8.2.3428">8.2.3428</a>)</li>
<li>xenstore (<a href="https://wiki.xenproject.org/wiki/Xen_Project_4.14_Release_Notes">4.14</a>)</li>
<li>xz-utils (<a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=d3f7d602343b4885e2c5653fefcc86fc2c14a06b;hb=v5.2.5">5.2.5</a>)</li>
<li>zstd (<a href="https://github.com/facebook/zstd/releases/tag/v1.4.9">1.4.9</a>)</li>
<li>Azure: WALinuxAgent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.6.0.2">2.6.0.2</a>)</li>
</ul>
<p><em>Changes since <strong>Stable 3033.2.4</strong></em></p>
<h3>Security fixes:</h3>
<ul>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21814">CVE-2022-21814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21813">CVE-2022-21813</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769</a>)</li>
</ul>
<h3>Bug fixes:</h3>
<ul>
<li>AWS: specify correct console (ttyS0) on kernel command line for ARM64 instances (<a href="https://github.com/flatcar/coreos-overlay/pull/1628">coreos-overlay#1628</a>)</li>
<li>Added pahole to developer container, without it kernel modules built against /usr/src/linux may fail to probe with an 'invalid relocation target' error (<a href="https://github.com/flatcar/coreos-overlay/pull/1839">coreos-overlay#1839</a>)</li>
<li>network: Accept ICMPv6 Router Advertisements to fix IPv6 address assignment in the default DHCP setting (<a href="https://github.com/flatcar/init/pull/51">flatcar-linux/init#51</a>, <a href="https://github.com/flatcar/coreos-cloudinit/pull/12">flatcar-linux/cloudinit#12</a>, <a href="https://github.com/flatcar/bootengine/pull/30">flatcar-linux/bootengine#30</a>)</li>
</ul>
<h3>Changes:</h3>
<ul>
<li>The systemd-networkd <code>ManageForeignRoutes</code> and <code>ManageForeignRoutingPolicyRules</code> settings are now disabled through a drop-in file and thus can only be enabled again by a drop-in file under <code>/etc/systemd/networkd.conf.d/</code> because drop-in files take precedence over <code>/etc/systemd/networkd.conf</code> (<a href="https://github.com/flatcar/init/pull/61">init#61</a>)</li>
<li>Excluded special network interface devices like bridge, tunnel, vxlan, and veth devices from the default DHCP configuration to prevent networkd interference (<a href="https://github.com/flatcar/init/pull/56">init#56</a>)</li>
<li>Added a new flatcar-update tool to the image to ease manual updates, rollbacks, channel/release jumping, and airgapped updates (<a href="https://github.com/flatcar/init/pull/53">flatcar-linux/init#53</a>)</li>
<li>Merge the Flatcar Pro features into the regular Flatcar images (<a href="https://github.com/flatcar/coreos-overlay/pull/1679">coreos-overlay#1679</a>)</li>
<li>Enabled the FIPS support for the Linux kernel, which users can now choose through a kernel parameter in <code>grub.cfg</code> (check it taking effect with <code>cat /proc/sys/crypto/fips_enabled</code>) (<a href="https://github.com/flatcar/coreos-overlay/pull/1602">coreos-overlay#1602</a>)</li>
<li>Merge the Flatcar Pro features into the regular Flatcar images (<a href="https://github.com/flatcar/coreos-overlay/pull/1679">coreos-overlay#1679</a>)</li>
<li>Enabled FIPS mode for cryptsetup (<a href="https://github.com/flatcar/coreos-overlay/pull/1747">flatcar-linux/coreos-overlay#1747</a>, <a href="https://github.com/flatcar/portage-stable/pull/312">portage-stable#312</a>)</li>
<li>GCE: Enabled GVE kernel driver, which adds support for Google Virtual NIC on GCP (<a href="https://github.com/flatcar/coreos-overlay/pull/1802">coreos-overlay#1802</a>)</li>
<li>SDK: Dropped the mantle binaries (kola, ore, etc.) from the SDK, they are now provided by the <code>ghcr.io/flatcar/mantle</code> image (<a href="https://github.com/flatcar/coreos-overlay/pull/1827">coreos-overlay#1827</a>, <a href="https://github.com/flatcar/scripts/pull/275">scripts#275</a>)</li>
</ul>
<h3>Updates:</h3>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/889439">5.10.109</a> with <a href="https://lwn.net/Articles/889002">5.10.108</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html">3.77</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.11">1.5.11</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-47-03/index.html">510.47.03</a>)</li>
<li>Azure: WALinuxAgent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.6.0.2">2.6.0.2</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.109</li>
<li>systemd 249</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.3.0"/>
    <published>2022-05-05T08:46:50+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/lts-2605.32.1</id>
    <title>2605.32.1</title>
    <updated>2026-03-09T16:26:29.146483+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>LTS 2605.31.1</strong></em></p>
<h4>Updates:</h4>
<ul>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_83.html">3.83</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.210</li>
<li>systemd 246</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.32.1"/>
    <published>2022-10-17T15:09:11+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.31.1</id>
    <title>2605.31.1</title>
    <updated>2026-03-09T16:26:29.141818+00:00</updated>
    <content type="html"><![CDATA[<p><strong>NOTE</strong> LTS-2021 is near the designated end of its 18 month lifespan and will only receive 1 more update by the end of September. If you use a fixed LTS channel please switch to LTS-2022, the new LTS which has been published in May. After the next update by end of September  there will be no more releases for the LTS-2021 channel. Please check your nodes' <code>GROUP=</code> setting in <code>/etc/flatcar/update.conf</code> to determine if you need to take action. Please refer to the Flatcar documentation on <a href="https://flatcar-linux.org/docs/latest/setup/releases/switching-channels/#freezing-an-lts-stream">switching channels</a> to switch to LTS-2022.</p>
<p><em>Changes since <strong>LTS 2605.30.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4159">CVE-2021-4159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20369">CVE-2022-20369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21505">CVE-2022-21505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36123">CVE-2022-36123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>The new image signing subkey was added to the public key embedded into <code>flatcar-install</code> (the old expired on 10th August 2022), only an updated <code>flatcar-install</code> script can verify releases signed with the new key (<a href="https://github.com/flatcar/init/pull/79">init#79</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/904463">5.4.210</a> (includes <a href="https://lwn.net/Articles/903690">5.4.209</a>, <a href="https://lwn.net/Articles/902919">5.4.208</a>, <a href="https://lwn.net/Articles/902103">5.4.207</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_82.html">3.82</a>)</li>
</ul>
<p>Note: LTS 2605.32.1 i.e the next release to be release in the month of September would be the last release for LTS-2021. Post that there will be no more releases for the channel. Please upgrade your workloads to LTS-2022 as soon as possible.</p>
<h4>Packages:</h4>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.210</li>
<li>systemd 246</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.31.1"/>
    <published>2022-09-01T12:57:10+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.30.1</id>
    <title>2605.30.1</title>
    <updated>2026-03-09T16:26:29.136092+00:00</updated>
    <content type="html"><![CDATA[<p>New LTS-2021 Release 2605.30.1</p>
<p>Changes since LTS-2021 2605.29.1</p>
<h2>Security fixes:</h2>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33656">CVE-2021-33656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32296">CVE-2022-32296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33744">CVE-2022-33744</a>)</li>
</ul>
<h2>Bug fixes:</h2>
<ul>
<li>Removed outdated LTS channel information printed on login (<a href="https://github.com/flatcar/init/pull/75">init#75</a>)</li>
</ul>
<h2>Changes:</h2>
<h2>Updates:</h2>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/901382">5.4.206</a> (includes <a href="https://lwn.net/Articles/900908">5.4.205</a>, <a href="https://lwn.net/Articles/900323">5.4.204</a>, <a href="https://lwn.net/Articles/899790">5.4.203</a>, <a href="https://lwn.net/Articles/899372">5.4.202</a>, <a href="https://lwn.net/Articles/899089">5.4.201</a>, <a href="https://lwn.net/Articles/898624">5.4.200</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_80.html">3.80</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.206</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.30.1"/>
    <published>2022-08-04T12:03:25+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.29.1</id>
    <title>2605.29.1</title>
    <updated>2026-03-09T16:26:29.131636+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS-2021</strong> Release <strong>2605.29.1</strong></p>
<p>Changes since <strong>LTS 2605.28.1</strong></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32981">CVE-2022-32981</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/898126">5.4.199</a> (includes <a href="https://lwn.net/Articles/897902">5.4.198</a>, <a href="https://lwn.net/Articles/897169">5.4.197</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_79.html">3.79</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.199</li>
<li>systemd 246</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.29.1"/>
    <published>2022-06-23T11:56:51+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.28.1</id>
    <title>2605.28.1</title>
    <updated>2026-03-09T16:26:29.126138+00:00</updated>
    <content type="html"><![CDATA[<h1>New <strong>LTS-2021</strong> Release <strong>2605.28.1</strong></h1>
<p><em>Changes since <strong>LTS-2021 2605.27.1</strong></em></p>
<h2>Security fixes:</h2>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1198">CVE-2022-1198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1204">CVE-2022-1204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1205">CVE-2022-1205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1836">CVE-2022-1836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28356">CVE-2022-28356</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27666">CVE-2022-27666</a>)</li>
</ul>
<h2>Updates:</h2>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/896224/">5.4.196</a> from 5.4.188)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html">3.78</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.196</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.28.1"/>
    <published>2022-06-23T08:51:23+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.27.1</id>
    <title>2605.27.1</title>
    <updated>2026-03-09T16:26:29.120799+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS-2021</strong> Release <strong>2605.27.1</strong></p>
<p><em>Changes since <strong>LTS 2605.26.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23960">CVE-2022-23960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25636">CVE-2022-25636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27666">CVE-2022-27666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28356">CVE-2022-28356</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/889440">5.4.188</a>) (from 5.4.181)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html">3.77</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.188</li>
<li>systemd 246</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.27.1"/>
    <published>2022-04-07T12:12:25+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.26.1</id>
    <title>2605.26.1</title>
    <updated>2026-03-09T16:26:29.116358+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS-2605</strong> Release <strong>2605.26.1</strong></p>
<p><em>Changes since <strong>LTS 2605.25.1</strong></em></p>
<h4>Security fixes</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24959">CVE-2022-24959</a>)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/883443">5.4.176</a>) (from 5.4.173)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.181</li>
<li>systemd 246</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.26.1"/>
    <published>2022-03-07T13:10:55+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.25.1</id>
    <title>2605.25.1</title>
    <updated>2026-03-09T16:26:29.111225+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS</strong> release <strong>2605.25.1</strong></p>
<p><em>Changes since <strong>LTS 2605.24.1</strong></em></p>
<h4>Security fixes</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4135">CVE-2021-4135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28714">CVE-2021-28714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39685">CVE-2021-39685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44733">CVE-2021-44733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185</a>)</li>
<li>ca-certificates (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527</a>)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/881965">5.4.173</a>) (includes <a href="https://lwn.net/Articles/878633">5.4.165</a>, <a href="https://lwn.net/Articles/878900">5.4.166</a>, <a href="https://lwn.net/Articles/879025">5.4.167</a>, <a href="https://lwn.net/Articles/879498">5.4.168</a>, <a href="https://lwn.net/Articles/879999">5.4.169</a>, <a href="https://lwn.net/Articles/880467">5.4.170</a>, <a href="https://lwn.net/Articles/881016">5.4.171</a>, <a href="https://lwn.net/Articles/881550">5.4.172</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_74.html">3.74</a>) (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_73_1.html">3.73.1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.173</li>
<li>systemd 246</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.25.1"/>
    <published>2022-01-26T08:39:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.24.1</id>
    <title>2605.24.1</title>
    <updated>2026-03-09T16:26:29.106293+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS</strong> release <strong>2605.24.1</strong></p>
<p><em>Changes since <strong>LTS 2605.23.1</strong></em></p>
<p><strong>Security Fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">CVE-2021-43975</a>)</li>
<li>ca-certificates (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/878042">5.4.164</a>)</li>
<li>ca-certificates (<a href="https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/vy9284s8APM">3.73</a>)</li>
<li>repo (<a href="https://gerrit.googlesource.com/git-repo/+/refs/tags/v2.8">2.8</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.164</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.24.1"/>
    <published>2021-12-15T19:41:33+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.23.1</id>
    <title>2605.23.1</title>
    <updated>2026-03-09T16:26:29.101960+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS</strong> release <strong>2605.23.1</strong></p>
<p><em>Changes since <strong>LTS 2605.22.1</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Use https protocol instead of git for Github URLs (<a href="https://github.com/flatcar/coreos-overlay/pull/1394">flatcar-linux/coreos-overlay#1394</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/874853/">5.4.157</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.157</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.23.1"/>
    <published>2021-11-09T08:12:13+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.22.1</id>
    <title>2605.22.1</title>
    <updated>2026-03-09T16:26:29.097127+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS</strong> release <strong>2605.22.1</strong></p>
<p><em>Changes since <strong>LTS 2605.21.1</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42252">CVE-2021-42252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20320">CVE-2021-20320</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16119">CVE-2020-16119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3764">CVE-2021-3764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38300">CVE-2021-38300</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41864">CVE-2021-41864</a>)</li>
</ul>
<p><strong>Bux fixes</strong></p>
<ul>
<li>The tcsd service for TPM 1 is not started on machines with TPM 2 anymore where it fails and isn’t necessary (<a href="https://github.com/flatcar/coreos-overlay/pull/1364">flatcar-linux/coreos-overlay#1364</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/873466/">5.4.155</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_69_1.html#nss-3-69-1-release-notes">3.69.1</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.155</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.22.1"/>
    <published>2021-10-25T15:57:52+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.21.1</id>
    <title>2605.21.1</title>
    <updated>2026-03-09T16:26:29.092563+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS</strong> release <strong>2605.21.1</strong></p>
<p><em>Changes since <strong>LTS 2605.20.1</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3739"> CVE-2021-3739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/869407/">5.4.147</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.147</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.21.1"/>
    <published>2021-09-27T08:32:37+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.20.1</id>
    <title>2605.20.1</title>
    <updated>2026-03-09T16:26:29.088317+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>LTS</strong> release <strong>2605.20.1</strong></p>
<p><em>Changes since <strong>LTS 2605.19.1</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/867498/">5.4.143</a>)</li>
<li>openssl (<a href="https://mta.openssl.org/pipermail/openssl-announce/2021-August/000206.html">1.1.1l</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.143</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.20.1"/>
    <published>2021-09-01T14:16:35+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.19.1</id>
    <title>2605.19.1</title>
    <updated>2026-03-09T16:26:29.083872+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since  <strong>LTS 2605.18.1</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">CVE-2021-38204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33624">CVE-2021-33624</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38205">CVE-2021-38205</a>)</li>
<li>Systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/866303/">5.4.141</a>)</li>
<li>Systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v246.15">246.15</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.141</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.19.1"/>
    <published>2021-08-19T13:37:31+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.18.1</id>
    <title>2605.18.1</title>
    <updated>2026-03-09T16:26:29.079547+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security Fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26541">CVE-2020-26541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35039">CVE-2021-35039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36311">CVE-2020-36311</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/863649/">5.4.134</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.134</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.18.1"/>
    <published>2021-07-28T08:28:35+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.17.1</id>
    <title>2605.17.1</title>
    <updated>2026-03-09T16:26:29.075091+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3587">CVE-2021-3587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/859023/">5.4.125</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.125</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.17.1"/>
    <published>2021-06-17T10:32:57+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.16.1</id>
    <title>2605.16.1</title>
    <updated>2026-03-09T16:26:29.071050+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31829">CVE-2021-31829</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/856270/">5.4.119</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v246.13">246.13</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.119</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.16.1"/>
    <published>2021-05-19T11:36:59+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.15.1</id>
    <title>2605.15.1</title>
    <updated>2026-03-09T16:26:29.066653+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28964">CVE-2021-28964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29647">CVE-2021-29647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23133">CVE-2021-23133</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Fix the patch to update DefaultTasksMax in systemd (<a href="https://github.com/kinvolk/coreos-overlay/pull/971">coreos-overlay#971</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/853763/">5.4.114</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.114</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.15.1"/>
    <published>2021-04-28T13:38:02+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.14.1</id>
    <title>2605.14.1</title>
    <updated>2026-03-09T16:26:29.061491+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28375">CVE-2021-28375</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25639">CVE-2020-25639</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841"> CVE-2021-23841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840"> CVE-2021-23840</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841"> CVE-2021-23841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3449">CVE-2021-3449</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3450"> CVE-2021-3450</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/849952/">5.4.107</a>)</li>
<li>openssl (<a href="https://mta.openssl.org/pipermail/openssl-announce/2021-March/000197.html">1.1.1k</a>)</li>
<li>open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.4">2.1.4</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.4.4">1.4.4</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.107</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.14.1"/>
    <published>2021-03-25T15:40:57+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.13.1</id>
    <title>2605.13.1</title>
    <updated>2026-03-09T16:26:29.056553+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux - <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20194">CVE-2021-20194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3348">CVE-2021-3348</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27825">CVE-2020-27825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932</a></li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>login message (motd): filter out bullet point when parsing failed units (<a href="https://github.com/kinvolk/baselayout/pull/16">baselayout#16</a>)</li>
<li>tcsd.service: use correct file permissions (<a href="https://github.com/kinvolk/coreos-overlay/pull/809">coreos-overlay#809</a>)</li>
<li>Use LTS 2021 as OS codename instead of the wrong LTS 2020 name</li>
<li>Flatcar Pro for AWS: flatcar-eks: add missing mkdir and update to latest versions (<a href="https://github.com/kinvolk/coreos-overlay/pull/817">coreos-overlay#817</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/847590/">5.4.101</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.101</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.13.1"/>
    <published>2021-03-02T12:23:32+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.12.1</id>
    <title>2605.12.1</title>
    <updated>2026-03-09T16:26:29.050614+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux <a href="https://www.openwall.com/lists/oss-security/2020/11/30/5">CVE-2020-27815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158"> CVE-2020-36158</a></li>
<li>Go<a href="https://github.com/golang/go/issues/43786"> CVE-2021-3114</a></li>
<li>sudo <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239"> CVE-2021-23239</a></li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>networkd: avoid managing MAC addresses for veth devices (<a href="https://github.com/kinvolk/init/pull/33">kinvolk/init#33</a>)</li>
<li><code>/etc/iscsi/initiatorname.iscsi</code> is generated by the iscsi-init service (<a href="https://github.com/kinvolk/Flatcar/issues/321">#321</a>)</li>
<li>Prevent iscsiadm buffer overflow (<a href="https://github.com/kinvolk/Flatcar/issues/318">#318</a>)</li>
<li>Revert to building docker and containerd with go1.13 instead of go1.15. This reduces the SIGURG log spam (<a href="https://github.com/kinvolk/Flatcar/issues/315">#315</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>The containerd socket is now available in the default location (<code>/run/containerd/containerd.sock</code>) and also as a symlink in the previous location (<code>/run/docker/libcontainerd/docker-containerd.sock</code>) (<a href="https://github.com/kinvolk/coreos-overlay/pull/771">#771</a>)</li>
<li>With the iscsi update, the service unit has changed from iscsid to iscsi (<a href="https://github.com/kinvolk/coreos-overlay/pull/791">#791</a>)</li>
<li>AWS Pro: include scripts to facilitate setup of EKS workers (<a href="https://github.com/kinvolk/coreos-overlay/pull/794">#794</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/843687/">5.4.92</a>)</li>
<li>open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.3">2.1.3</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.15.7">1.15.7</a>)</li>
<li>sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_5p2">1.9.5p2</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.14</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.92</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.12.1"/>
    <published>2021-02-02T13:26:13+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.10.1</id>
    <title>2605.10.1</title>
    <updated>2026-03-09T16:26:29.045559+00:00</updated>
    <content type="html"><![CDATA[<p>Changes:</p>
<ul>
<li>The Linux kernel is compiled with FIPS support</li>
<li>Containerd CRI plugin got enabled by default, only the containerd socket path needs to be specified as kubelet parameter for Kubernetes 1.20 to use containerd instead of Docker (<a href="https://github.com/kinvolk/Flatcar/issues/283">Flatcar#283</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux (5.4.83)</li>
<li>Docker (19.03.14)</li>
<li>containerd (1.4.3)</li>
<li>systemd (246.6)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.14</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.83</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.10.1"/>
    <published>2020-12-16T12:01:59+00:00</published>
  </entry>
</feed>

