<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://www.flatcar.org/</id>
  <title>Flatcar :: stable</title>
  <updated>2026-03-09T16:26:31.245113+00:00</updated>
  <author>
    <name>Flatcar Container Linux</name>
    <email>maintainers@flatcar-linux.org</email>
  </author>
  <link href="https://www.flatcar.org/" rel="self"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <logo>https://www.flatcar.org/media/brand-logo.svg</logo>
  <subtitle>Flatcar Container Linux release feed</subtitle>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4459.2.4</id>
    <title>4459.2.4</title>
    <updated>2026-03-09T16:26:32.662743+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4459.2.3</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23145">CVE-2026-23145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23144">CVE-2026-23144</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23142">CVE-2026-23142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23141">CVE-2026-23141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23054">CVE-2026-23054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23053">CVE-2026-23053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23050">CVE-2026-23050</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23049">CVE-2026-23049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71196">CVE-2025-71196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71195">CVE-2025-71195</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23055">CVE-2026-23055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71193">CVE-2025-71193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71194">CVE-2025-71194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23038">CVE-2026-23038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23037">CVE-2026-23037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23026">CVE-2026-23026</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23025">CVE-2026-23025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71191">CVE-2025-71191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71190">CVE-2025-71190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71189">CVE-2025-71189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71188">CVE-2025-71188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23035">CVE-2026-23035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23033">CVE-2026-23033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23032">CVE-2026-23032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23031">CVE-2026-23031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23030">CVE-2026-23030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71185">CVE-2025-71185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71186">CVE-2025-71186</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23003">CVE-2026-23003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23002">CVE-2026-23002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23000">CVE-2026-23000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22999">CVE-2026-22999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22998">CVE-2026-22998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22997">CVE-2026-22997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22996">CVE-2026-22996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23013">CVE-2026-23013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23011">CVE-2026-23011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23010">CVE-2026-23010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23006">CVE-2026-23006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23005">CVE-2026-23005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71162">CVE-2025-71162</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71163">CVE-2025-71163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23135">CVE-2026-23135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23133">CVE-2026-23133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23131">CVE-2026-23131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23121">CVE-2026-23121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23120">CVE-2026-23120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23119">CVE-2026-23119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23116">CVE-2026-23116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23129">CVE-2026-23129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23128">CVE-2026-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23126">CVE-2026-23126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23125">CVE-2026-23125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23124">CVE-2026-23124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23123">CVE-2026-23123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71200">CVE-2025-71200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23113">CVE-2026-23113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23089">CVE-2026-23089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23098">CVE-2026-23098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23097">CVE-2026-23097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23096">CVE-2026-23096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23095">CVE-2026-23095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23094">CVE-2026-23094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23110">CVE-2026-23110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23091">CVE-2026-23091</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23108">CVE-2026-23108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23107">CVE-2026-23107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23105">CVE-2026-23105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23103">CVE-2026-23103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23101">CVE-2026-23101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23099">CVE-2026-23099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23090">CVE-2026-23090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23062">CVE-2026-23062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23061">CVE-2026-23061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23060">CVE-2026-23060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23059">CVE-2026-23059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23058">CVE-2026-23058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23057">CVE-2026-23057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23088">CVE-2026-23088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23087">CVE-2026-23087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23086">CVE-2026-23086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23085">CVE-2026-23085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23084">CVE-2026-23084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23083">CVE-2026-23083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23056">CVE-2026-23056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23082">CVE-2026-23082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23080">CVE-2026-23080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23078">CVE-2026-23078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23076">CVE-2026-23076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23075">CVE-2026-23075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23073">CVE-2026-23073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71199">CVE-2025-71199</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23072">CVE-2026-23072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23071">CVE-2026-23071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23069">CVE-2026-23069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23068">CVE-2026-23068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23065">CVE-2026-23065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23064">CVE-2026-23064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23063">CVE-2026-23063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71197">CVE-2025-71197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71198">CVE-2025-71198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23212">CVE-2026-23212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23173">CVE-2026-23173</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23172">CVE-2026-23172</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23155">CVE-2026-23155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23154">CVE-2026-23154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23151">CVE-2026-23151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23150">CVE-2026-23150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23170">CVE-2026-23170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23168">CVE-2026-23168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23167">CVE-2026-23167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23166">CVE-2026-23166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23148">CVE-2026-23148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23164">CVE-2026-23164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23163">CVE-2026-23163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23161">CVE-2026-23161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23160">CVE-2026-23160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23159">CVE-2026-23159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23158">CVE-2026-23158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23156">CVE-2026-23156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23146">CVE-2026-23146</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23118">CVE-2026-23118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57881">CVE-2024-57881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53690">CVE-2024-53690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52319">CVE-2024-52319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-51729">CVE-2024-51729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49573">CVE-2024-49573</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56788">CVE-2024-56788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56368">CVE-2024-56368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54455">CVE-2024-54455</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54193">CVE-2024-54193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41149">CVE-2024-41149</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56714">CVE-2024-56714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56713">CVE-2024-56713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56712">CVE-2024-56712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56710">CVE-2024-56710</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56711">CVE-2024-56711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23216">CVE-2026-23216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23215">CVE-2026-23215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23214">CVE-2026-23214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23213">CVE-2026-23213</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71228">CVE-2025-71228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23219">CVE-2026-23219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71225">CVE-2025-71225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23206">CVE-2026-23206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71222">CVE-2025-71222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23180">CVE-2026-23180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23179">CVE-2026-23179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23178">CVE-2026-23178</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23177">CVE-2026-23177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23176">CVE-2026-23176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23205">CVE-2026-23205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23204">CVE-2026-23204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23202">CVE-2026-23202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23201">CVE-2026-23201</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23200">CVE-2026-23200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23199">CVE-2026-23199</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23198">CVE-2026-23198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23193">CVE-2026-23193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71224">CVE-2025-71224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23190">CVE-2026-23190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23189">CVE-2026-23189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23188">CVE-2026-23188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23187">CVE-2026-23187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23182">CVE-2026-23182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71223">CVE-2025-71223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71220">CVE-2025-71220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71203">CVE-2025-71203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71204">CVE-2025-71204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23112">CVE-2026-23112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23111">CVE-2026-23111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23220">CVE-2026-23220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71237">CVE-2025-71237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71236">CVE-2025-71236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71235">CVE-2025-71235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71234">CVE-2025-71234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71233">CVE-2025-71233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71232">CVE-2025-71232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71231">CVE-2025-71231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23230">CVE-2026-23230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23229">CVE-2026-23229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23228">CVE-2026-23228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23224">CVE-2026-23224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23223">CVE-2026-23223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23222">CVE-2026-23222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71229">CVE-2025-71229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23237">CVE-2026-23237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23238">CVE-2026-23238</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23236">CVE-2026-23236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23235">CVE-2026-23235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23234">CVE-2026-23234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-23233">CVE-2026-23233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71238">CVE-2025-71238</a>)</li>
<li>openssh (<a href="https://www.cve.org/CVERecord?id=CVE-2025-61984">CVE-2025-61984</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-61985">CVE-2025-61985</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>base, dev: openssh (<a href="https://www.openssh.com/txt/release-10.2">10.2_p1</a> (includes <a href="https://www.openssh.com/txt/release-10.1">10.1</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120_1.html">3.120.1</a>)</li>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.74">6.12.74</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.73">6.12.73</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.72">6.12.72</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.71">6.12.71</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.70">6.12.70</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.69">6.12.69</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.68">6.12.68</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.67">6.12.67</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.7</li>
<li>docker 28.0.4</li>
<li>ignition 2.22.0</li>
<li>kernel 6.12.74</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4459.2.4"/>
    <published>2026-03-09T13:30:55+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4459.2.3</id>
    <title>4459.2.3</title>
    <updated>2026-03-09T16:26:32.635686+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4459.2.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68335">CVE-2025-68335</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68332">CVE-2025-68332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68337">CVE-2025-68337</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68336">CVE-2025-68336</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68265">CVE-2025-68265</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68266">CVE-2025-68266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68263">CVE-2025-68263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68261">CVE-2025-68261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68259">CVE-2025-68259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68258">CVE-2025-68258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68257">CVE-2025-68257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68256">CVE-2025-68256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68264">CVE-2025-68264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68254">CVE-2025-68254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68255">CVE-2025-68255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68764">CVE-2025-68764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68766">CVE-2025-68766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68765">CVE-2025-68765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68759">CVE-2025-68759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68758">CVE-2025-68758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68757">CVE-2025-68757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68756">CVE-2025-68756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68753">CVE-2025-68753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68763">CVE-2025-68763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68744">CVE-2025-68744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68742">CVE-2025-68742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68741">CVE-2025-68741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68740">CVE-2025-68740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68748">CVE-2025-68748</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68747">CVE-2025-68747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68746">CVE-2025-68746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68724">CVE-2025-68724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68380">CVE-2025-68380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68379">CVE-2025-68379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68378">CVE-2025-68378</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68733">CVE-2025-68733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68732">CVE-2025-68732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68728">CVE-2025-68728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68727">CVE-2025-68727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68374">CVE-2025-68374</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68352">CVE-2025-68352</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68348">CVE-2025-68348</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68347">CVE-2025-68347</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68372">CVE-2025-68372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68371">CVE-2025-68371</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68369">CVE-2025-68369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68367">CVE-2025-68367</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68366">CVE-2025-68366</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68364">CVE-2025-68364</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68346">CVE-2025-68346</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68363">CVE-2025-68363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68362">CVE-2025-68362</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68361">CVE-2025-68361</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68356">CVE-2025-68356</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68354">CVE-2025-68354</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68344">CVE-2025-68344</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68325">CVE-2025-68325</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68324">CVE-2025-68324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71157">CVE-2025-71157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71156">CVE-2025-71156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71154">CVE-2025-71154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71153">CVE-2025-71153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71151">CVE-2025-71151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71150">CVE-2025-71150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71149">CVE-2025-71149</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71148">CVE-2025-71148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71146">CVE-2025-71146</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71147">CVE-2025-71147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71143">CVE-2025-71143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71140">CVE-2025-71140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71138">CVE-2025-71138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71137">CVE-2025-71137</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71136">CVE-2025-71136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71135">CVE-2025-71135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71133">CVE-2025-71133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71132">CVE-2025-71132</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71131">CVE-2025-71131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71130">CVE-2025-71130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71129">CVE-2025-71129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71111">CVE-2025-71111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71109">CVE-2025-71109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71108">CVE-2025-71108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71107">CVE-2025-71107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71105">CVE-2025-71105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71126">CVE-2025-71126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71125">CVE-2025-71125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71123">CVE-2025-71123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71122">CVE-2025-71122</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71104">CVE-2025-71104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71121">CVE-2025-71121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71120">CVE-2025-71120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71119">CVE-2025-71119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71118">CVE-2025-71118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71116">CVE-2025-71116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71114">CVE-2025-71114</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71113">CVE-2025-71113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71112">CVE-2025-71112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71102">CVE-2025-71102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71079">CVE-2025-71079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71087">CVE-2025-71087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71086">CVE-2025-71086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71084">CVE-2025-71084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71083">CVE-2025-71083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71082">CVE-2025-71082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71101">CVE-2025-71101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71100">CVE-2025-71100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71099">CVE-2025-71099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71081">CVE-2025-71081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71098">CVE-2025-71098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71097">CVE-2025-71097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71096">CVE-2025-71096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71095">CVE-2025-71095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71094">CVE-2025-71094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71093">CVE-2025-71093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71091">CVE-2025-71091</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71089">CVE-2025-71089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71080">CVE-2025-71080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71078">CVE-2025-71078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71064">CVE-2025-71064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71073">CVE-2025-71073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71072">CVE-2025-71072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71071">CVE-2025-71071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71069">CVE-2025-71069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71068">CVE-2025-71068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71067">CVE-2025-71067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71066">CVE-2025-71066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71077">CVE-2025-71077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71076">CVE-2025-71076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71075">CVE-2025-71075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71065">CVE-2025-71065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68820">CVE-2025-68820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68822">CVE-2025-68822</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68821">CVE-2025-68821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68785">CVE-2025-68785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68794">CVE-2025-68794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68789">CVE-2025-68789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68819">CVE-2025-68819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68818">CVE-2025-68818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68817">CVE-2025-68817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68816">CVE-2025-68816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68815">CVE-2025-68815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68788">CVE-2025-68788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68814">CVE-2025-68814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68811">CVE-2025-68811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68810">CVE-2025-68810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68809">CVE-2025-68809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68808">CVE-2025-68808</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68806">CVE-2025-68806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68787">CVE-2025-68787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68804">CVE-2025-68804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68803">CVE-2025-68803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68802">CVE-2025-68802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68801">CVE-2025-68801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68800">CVE-2025-68800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68799">CVE-2025-68799</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68798">CVE-2025-68798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68797">CVE-2025-68797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68796">CVE-2025-68796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68795">CVE-2025-68795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68786">CVE-2025-68786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68776">CVE-2025-68776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68775">CVE-2025-68775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68774">CVE-2025-68774</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68773">CVE-2025-68773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68772">CVE-2025-68772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68771">CVE-2025-68771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68770">CVE-2025-68770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68769">CVE-2025-68769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68784">CVE-2025-68784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68783">CVE-2025-68783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68782">CVE-2025-68782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68781">CVE-2025-68781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68780">CVE-2025-68780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68778">CVE-2025-68778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68777">CVE-2025-68777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68767">CVE-2025-68767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71144">CVE-2025-71144</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71134">CVE-2025-71134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71127">CVE-2025-71127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71088">CVE-2025-71088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22982">CVE-2026-22982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22980">CVE-2026-22980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22979">CVE-2026-22979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22978">CVE-2026-22978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22994">CVE-2026-22994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-71160">CVE-2025-71160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22992">CVE-2026-22992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22991">CVE-2026-22991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22990">CVE-2026-22990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22989">CVE-2026-22989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22988">CVE-2026-22988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22984">CVE-2026-22984</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22977">CVE-2026-22977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22976">CVE-2026-22976</a>)</li>
<li>openssl (<a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187">CVE-2025-11187</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467">CVE-2025-15467</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468">CVE-2025-15468</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199">CVE-2025-66199</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160">CVE-2025-68160</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418">CVE-2025-69418</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419">CVE-2025-69419</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420">CVE-2025-69420</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421">CVE-2025-69421</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795">CVE-2026-22795</a>, <a href="https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796">CVE-2026-22796</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66">6.12.66</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65">6.12.65</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64">6.12.64</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63">6.12.63</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62">6.12.62</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html">3.120</a>)</li>
<li>openssl (<a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.4">3.4.4</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.7</li>
<li>docker 28.0.4</li>
<li>ignition 2.22.0</li>
<li>kernel 6.12.66</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4459.2.3"/>
    <published>2026-01-27T14:42:39+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4459.2.2</id>
    <title>4459.2.2</title>
    <updated>2026-03-09T16:26:32.621246+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4459.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40275">CVE-2025-40275</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40274">CVE-2025-40274</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40273">CVE-2025-40273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40272">CVE-2025-40272</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40289">CVE-2025-40289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40288">CVE-2025-40288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40287">CVE-2025-40287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40269">CVE-2025-40269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40286">CVE-2025-40286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40285">CVE-2025-40285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40284">CVE-2025-40284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40283">CVE-2025-40283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40282">CVE-2025-40282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40281">CVE-2025-40281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40280">CVE-2025-40280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40279">CVE-2025-40279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40278">CVE-2025-40278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40268">CVE-2025-40268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40212">CVE-2025-40212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58087">CVE-2024-58087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57879">CVE-2024-57879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57880">CVE-2024-57880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55642">CVE-2024-55642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55641">CVE-2024-55641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54460">CVE-2024-54460</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54191">CVE-2024-54191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53689">CVE-2024-53689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53682">CVE-2024-53682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53687">CVE-2024-53687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56656">CVE-2024-56656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56674">CVE-2024-56674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56673">CVE-2024-56673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56671">CVE-2024-56671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56669">CVE-2024-56669</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56668">CVE-2024-56668</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56666">CVE-2024-56666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56652">CVE-2024-56652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40261">CVE-2025-40261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40266">CVE-2025-40266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40264">CVE-2025-40264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40263">CVE-2025-40263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40262">CVE-2025-40262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40254">CVE-2025-40254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40253">CVE-2025-40253</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40252">CVE-2025-40252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40251">CVE-2025-40251</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40250">CVE-2025-40250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40259">CVE-2025-40259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40257">CVE-2025-40257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40246">CVE-2025-40246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40345">CVE-2025-40345</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61">6.12.61</a> (includes (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59">6.12.59</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60">6.12.60</a>)))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html">3.119</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html">3.118.1</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.7</li>
<li>docker 28.0.4</li>
<li>ignition 2.22.0</li>
<li>kernel 6.12.61</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4459.2.2"/>
    <published>2025-12-18T15:25:15+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4459.2.1</id>
    <title>4459.2.1</title>
    <updated>2026-03-09T16:26:32.612920+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4459.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40177">CVE-2025-40177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40176">CVE-2025-40176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40172">CVE-2025-40172</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40173">CVE-2025-40173</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40166">CVE-2025-40166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40167">CVE-2025-40167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40165">CVE-2025-40165</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40162">CVE-2025-40162</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40133">CVE-2025-40133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40095">CVE-2025-40095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40094">CVE-2025-40094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40093">CVE-2025-40093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40092">CVE-2025-40092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40090">CVE-2025-40090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40088">CVE-2025-40088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40105">CVE-2025-40105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40104">CVE-2025-40104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40103">CVE-2025-40103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40101">CVE-2025-40101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40100">CVE-2025-40100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40099">CVE-2025-40099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40087">CVE-2025-40087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40085">CVE-2025-40085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40040">CVE-2025-40040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40106">CVE-2025-40106</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40084">CVE-2025-40084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40211">CVE-2025-40211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40209">CVE-2025-40209</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed the loading of kernel modules from system extensions via udev (e.g. at boot time). (<a href="https://github.com/flatcar/scripts/pull/3367">flatcar/scripts#3367</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added Nutanix images (<a href="https://github.com/flatcar/scripts/pull/3311">flatcar/scripts#3311</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.58">6.12.58</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.57">6.12.57</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.56">6.12.56</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.55">6.12.55</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.7</li>
<li>docker 28.0.4</li>
<li>ignition 2.22.0</li>
<li>kernel 6.12.58</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4459.2.1"/>
    <published>2025-11-27T11:34:52+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4459.2.0</id>
    <title>4459.2.0</title>
    <updated>2026-03-09T16:26:32.542281+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4230.2.4</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>VMWare: open-vm-tools (<a href="https://www.cve.org/CVERecord/?id=CVE-2025-22247">CVE-2025-22247</a>)</li>
<li>afterburn (<a href="https://www.cve.org/CVERecord/?id=CVE-2025-0977">CVE-2025-0977</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-3416">CVE-2025-3416</a>)</li>
<li>bind (<a href="https://www.cve.org/CVERecord?id=CVE-2024-11187">CVE-2024-11187</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2024-12705">CVE-2024-12705</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53589">CVE-2024-53589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1176">CVE-2025-1176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1178">CVE-2025-1178</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1179">CVE-2025-1179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1180">CVE-2025-1180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1181">CVE-2025-1181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1182">CVE-2025-1182</a>)</li>
<li>c-ares (<a href="https://www.cve.org/CVERecord?id=CVE-2025-31498">CVE-2025-31498</a>)</li>
<li>cifs-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-2312">CVE-2025-2312</a>)</li>
<li>containerd (<a href="https://www.cve.org/CVERecord?id=CVE-2024-25621">CVE-2024-25621</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-64329">CVE-2025-64329</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2024-40635">CVE-2024-40635</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-47291">CVE-2025-47291</a>)</li>
<li>crun (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24965">CVE-2025-24965</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0167">CVE-2025-0167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0665">CVE-2025-0665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0725">CVE-2025-0725</a>, <a href="https://github.com/curl/curl/issues/16197">curl-20250205</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">CVE-2024-8176</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50349">CVE-2024-50349</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52005">CVE-2024-52005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52006">CVE-2024-52006</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-48384">CVE-2025-48384</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-48385">CVE-2025-48385</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-48386">CVE-2025-48386</a>)</li>
<li>glib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4373">CVE-2025-4373</a>, (<a href="https://www.cve.org/CVERecord?id=CVE-2025-7039">CVE-2025-7039</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-8058">CVE-2025-8058</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12243">CVE-2024-12243</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32988">CVE-2025-32988</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32989">CVE-2025-32989</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32990">CVE-2025-32990</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-6395">CVE-2025-6395</a>)</li>
<li>go (<a href="https://www.cve.org/CVERecord?id=CVE-2025-22871">CVE-2025-22871</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-22873">CVE-2025-22873</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4673">CVE-2025-4673</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-0913">CVE-2025-0913</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-22874">CVE-2025-22874</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4674">CVE-2025-4674</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-47906">CVE-2025-47906</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-47907">CVE-2025-47907</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34440">CVE-2023-34440</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43758">CVE-2023-43758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24582">CVE-2024-24582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28047">CVE-2024-28047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28127">CVE-2024-28127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29214">CVE-2024-29214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-31157">CVE-2024-31157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39279">CVE-2024-39279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-31068">CVE-2024-31068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36293">CVE-2024-36293</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37020">CVE-2024-37020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39355">CVE-2024-39355</a>)</li>
<li>iperf (<a href="https://www.cve.org/CVERecord?id=CVE-2024-53580">CVE-2024-53580</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-54349">CVE-2025-54349</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-54350">CVE-2025-54350</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-54351">CVE-2025-54351</a>)</li>
<li>jq (<a href="https://www.cve.org/CVERecord?id=CVE-2024-23337">CVE-2024-23337</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2024-53427">CVE-2024-53427</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-48060">CVE-2025-48060</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57970">CVE-2024-57970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25724">CVE-2025-25724</a>)</li>
<li>libcap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1390">CVE-2025-1390</a>)</li>
<li>libtasn1 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12133">CVE-2024-12133</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27113">CVE-2025-27113</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32414">CVE-2025-32414</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32415">CVE-2025-32415</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-49794">CVE-2025-49794</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-49795">CVE-2025-49795</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-49796">CVE-2025-49796</a>)</li>
<li>libxslt (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528</a>)</li>
<li>nvidia-drivers (<a href="https://www.cve.org/CVERecord?id=CVE-2025-23277">CVE-2025-23277</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23278">CVE-2025-23278</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23279">CVE-2025-23279</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-23286">CVE-2025-23286</a>)</li>
<li>nvidia-drivers-service (<a href="https://www.cve.org/CVERecord?id=CVE-2025-23244">CVE-2025-23244</a>)</li>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26466">CVE-2025-26466</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12797">CVE-2024-12797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">CVE-2024-13176</a>)</li>
<li>perl (<a href="https://www.cve.org/CVERecord?id=CVE-2024-56406">CVE-2024-56406</a>)</li>
<li>podman (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-6032">CVE-2025-6032</a>)</li>
<li>python (<a href="https://www.cve.org/CVERecord?id=CVE-2025-0938">CVE-2025-0938</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4516">CVE-2025-4516</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2024-12718">CVE-2024-12718</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4138">CVE-2025-4138</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4330">CVE-2025-4330</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-4517">CVE-2025-4517</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-6069">CVE-2025-6069</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-8194">CVE-2025-8194</a>)</li>
<li>requests (<a href="https://www.cve.org/CVERecord?id=CVE-2024-47081">CVE-2024-47081</a>)</li>
<li>rsync (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12084">CVE-2024-12084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12085">CVE-2024-12085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12086">CVE-2024-12086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12087">CVE-2024-12087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12088">CVE-2024-12088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12747">CVE-2024-12747</a>)</li>
<li>runc (<a href="https://www.cve.org/CVERecord?id=CVE-2025-31133">CVE-2025-31133</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-52565">CVE-2025-52565</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-52881">CVE-2025-52881</a>)</li>
<li>socat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54661">CVE-2024-54661</a>, <a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.8.0.3:/CHANGES#l4">socat-20250221</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41957">CVE-2024-41957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41965">CVE-2024-41965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43374">CVE-2024-43374</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43790">CVE-2024-43790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43802">CVE-2024-43802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45306">CVE-2024-45306</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47814">CVE-2024-47814</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-1215">CVE-2025-1215</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-22134">CVE-2025-22134</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-24014">CVE-2025-24014</a>, <a href="https://github.com/vim/vim/security/advisories/GHSA-63p5-mwg2-787v">GHSA-63p5-mwg2-787v</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-27423">CVE-2025-27423</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-29768">CVE-2025-29768</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-53905">CVE-2025-53905</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-53906">CVE-2025-53906</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-9390">CVE-2025-9390</a>)</li>
<li>xz-utils (<a href="https://www.cve.org/CVERecord?id=CVE-2025-31115">CVE-2025-31115</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Enabled <code>CONFIG_CPUSETS_V1</code> to mitigate cgroupsv1 removal (e.g JVM) (<a href="https://github.com/flatcar/Flatcar/issues/1884">Flatcar#1884</a>)</li>
<li>Enabled <code>CONFIG_MEMCG_V1</code> to mitigate cgroupsv1 removal (e.g JVM) (<a href="https://github.com/flatcar/Flatcar/issues/1884">Flatcar#1884</a>)</li>
<li>Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them (<a href="https://github.com/flatcar/Flatcar/issues/1933">Flatcar#1933</a>)</li>
<li>Fix non-conforming GPT partition table (<a href="https://github.com/flatcar/Flatcar/issues/1651">Flatcar#1651</a>)</li>
<li>Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by switching back to built-in extra firmware instead of early cpio inclusion (<a href="https://github.com/flatcar/Flatcar/issues/1909">Flatcar#1909</a>)</li>
<li>Fixed a UID/GID mis-alignment for user/group <code>messagebus</code> between acct-user/acct-group and baselayout. (<a href="https://github.com/flatcar/baselayout/pull/36">baselayout#36</a>)</li>
<li>Fixed path handling in the QEMU .sh launcher scripts. Given paths now are relative to the current directory and absolute paths work as you would expect.</li>
<li>Fixed race condition in the script that grows the root partition to fill the disk. This bug sometimes caused the operation to not occur. (<a href="https://github.com/flatcar/init/pull/132">init#132</a>)</li>
<li>Fixed that the needed Flatcar extensions don't get removed on update which caused a re-download (<a href="https://github.com/flatcar/update_engine/pull/51">update_engine#51</a>)</li>
<li>Reenabled console support for DRM drivers, so that with the virtio graphics driver the interactive console is shown again after boot (<a href="https://github.com/flatcar/Flatcar/issues/1834">Flatcar#1834</a>)</li>
<li>azure: Fixed issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning (<a href="https://github.com/flatcar/Flatcar/issues/1661">flatcar/Flatcar#1661</a>)</li>
<li>sysext-podman: removed <code>/etc/subuid</code> and <code>/etc/subgid</code> generation for <code>core</code> user, before this change it partially overwrites the file and causes issues. (<a href="https://github.com/flatcar/Flatcar/issues/1733">Flatcar#1733</a>) This could be created through initial provisioning. (<a href="https://github.com/flatcar/scripts/pull/3043">scripts#3043</a>)</li>
<li>update-ssh-keys: More intuitive --help text and the -n (no-replace) option has been fixed. (<a href="https://github.com/flatcar/Flatcar/issues/1554">flatcar/Flatcar#1554</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added <a href="https://containerd.github.io/overlaybd/">overlaybd</a> system extension to support accelerated container images. Add <code>overlaybd</code> to <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/"><code>/etc/flatcar/enabled-sysext.conf</code></a> to check it out. The extension includes both <a href="https://github.com/containerd/overlaybd/">overlaybd</a> as well as <a href="https://github.com/containerd/accelerated-container-image">accelerated-container-image</a> tools.</li>
<li>Added changes for our secureboot signed images with our signed release process until the official shim signing (<a href="https://github.com/flatcar/scripts/pull/2754/">scripts#2754</a>)</li>
<li>Added <code>nftables-load.service</code> and <code>nftables-store.service</code> services to load/store rules from/in <code>/var/lib/nftables/rules-save</code> (<a href="https://github.com/flatcar/Flatcar/issues/900">Flatcar#900</a>)</li>
<li>Added support for podman in <code>toolbox</code> (<a href="https://github.com/flatcar/toolbox/pull/11">toolbox#11</a>)</li>
<li>Allow per-sysext USE flags and architecture-specific sysexts. (<a href="https://github.com/flatcar/scripts/pull/2798/">scripts#2798</a>)</li>
<li>Always truncate hostnames on the first occurrence of <code>.</code> (<a href="https://github.com/flatcar/coreos-cloudinit/pull/32">cloud-init#32</a>)</li>
<li>Azure OEM: add inotify-tools, python urllib3 (<a href="https://github.com/flatcar/scripts/pull/3116">flatcar/scripts#3116</a>)</li>
<li>Build Intel iGPU i915 driver as module (<a href="https://github.com/flatcar/scripts/pull/2349">scripts#2349</a>)</li>
<li>Compiled OS-dependent NVIDIA kernel module sysexts signed for secure boot. (<a href="https://github.com/flatcar/scripts/pull/2798/">scripts#2798</a>)</li>
<li>Enabled CONFIG_INET_DIAG_DESTROY in kernel options (<a href="https://github.com/flatcar/scripts/pull/3176">flatcar/scripts#3176</a>)</li>
<li>Enabled EROFS module with XATTR support (<a href="https://github.com/flatcar/Flatcar/issues/1659">Flatcar#1659</a>)</li>
<li>Enabled virtiofs and fuse-dax modules in the kernel for advaned Qemu usecases. Thank you @aaronk6! (<a href="https://github.com/flatcar/scripts/pull/2825">Flatcar#2825</a>)</li>
<li>Ensured hostnames never exceeds 63 characters, regardless of the metadata provider (<a href="https://github.com/flatcar/coreos-cloudinit/pull/31">cloud-init#31</a>)</li>
<li>Hyper-V images now use a systemd-sysext image for layering additional platform-specific software on top of <code>/usr</code></li>
<li>Provided an Incus Flatcar extension as optional systemd-sysext image with the release. Write 'incus' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning. (<a href="https://github.com/flatcar/scripts/pull/1655">scripts#1655</a>)</li>
<li>Scaleway: The Linux console is now attached to the correct console port. (<a href="https://github.com/flatcar/scripts/pull/3383">scripts#3383</a>)</li>
<li>Signed out-of-tree kernel modules using the ephemeral signing key so that ZFS and NVIDIA sysexts can work with secure boot. (<a href="https://github.com/flatcar/scripts/pull/2636/">scripts#2636</a>)</li>
<li>The kernel image and its embedded initrd are now compressed with xz rather than zstd. This gives greater compression at the cost of decompression performance. Systems may therefore now be ever so slightly slower to boot, but this was necessary to avoid running out of space in the /boot partition. Further measures to address the space issue are planned, and perhaps we can switch back to zstd in a later release.</li>
<li>The qemu script (<code>flatcar_production_qemu*.sh</code>) received two new options. <code>-D</code> (or <code>-image-disk-opts</code>) can be used to add extra options to the <code>virtio-blk-pci</code> device for primary disk. <code>-d</code> (or <code>-disk</code>) can be used to add extra disks to the machine - this one takes a path to a raw or qcow2 image file and, after a comma, <code>virtio-blk-pci</code> options. To learn what disk options can be passed to <code>-D</code> or <code>-d</code>, call <code>qemu-system-x86_64 -device virtio-blk-pci,help</code> (<code>qemu-system-aarch64</code> can be used too).</li>
<li><code>/boot</code> is now only accessible by the root user for better security. (<a href="https://github.com/flatcar/Flatcar/issues/296">Flatcar#296</a>)</li>
<li>ftrace syscalls also available in ARM64 builds. (Enables syscall tracepoints) (<a href="https://github.com/flatcar/scripts/pull/2600">flatcar/scripts#2600</a>)</li>
<li>sysext-incus: removed <code>/etc/subuid</code> and <code>/etc/subgid</code> generation for <code>root</code> user, it has to be created through initial provisioning. (<a href="https://github.com/flatcar/scripts/pull/3028">scripts#3028</a>)</li>
<li>systemd now uses OpenSSL instead of gcrypt for cryptography to reduce the size of the initrd. This change disables systemd-journal's Forward Secure Sealing feature, but it is generally not useful for Flatcar.</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>AWS: Amazon SSM Agent (<a href="https://github.com/aws/amazon-ssm-agent/blob/mainline/RELEASENOTES.md#3322990">3.3.2299.0</a>)</li>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2220-2025-07-08">2.22.0</a> (includes <a href="https://coreos.github.io/ignition/release-notes/#ignition-2210-2025-03-13">2.21.0</a>))</li>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.54">6.12.54</a> (includes <a href="https://lwn.net/Articles/998490/">6.12</a>, <a href="https://lwn.net/Articles/999108/">6.12.1</a>, <a href="https://lwn.net/Articles/1000872/">6.12.2</a>, <a href="https://lwn.net/Articles/1001203/">6.12.3</a>, <a href="https://lwn.net/Articles/1001437/">6.12.4</a>, <a href="https://lwn.net/Articles/1002176/">6.12.5</a>, <a href="https://lwn.net/Articles/1002918/">6.12.6</a>, <a href="https://lwn.net/Articles/1003608/">6.12.7</a>, <a href="https://lwn.net/Articles/1003985/">6.12.8</a>, <a href="https://lwn.net/Articles/1004549/">6.12.9</a>, <a href="https://lwn.net/Articles/1005382/">6.12.10</a>, <a href="https://lwn.net/Articles/1006009/">6.12.11</a>, <a href="https://lwn.net/Articles/1007440/">6.12.12</a>, <a href="https://lwn.net/Articles/1008643/">6.12.13</a>, <a href="https://lwn.net/Articles/1010356/">6.12.14</a>, <a href="https://lwn.net/Articles/1010623/">6.12.15</a>, <a href="https://lwn.net/Articles/1011265/">6.12.16</a>, <a href="https://lwn.net/Articles/1012191/">6.12.17</a>, <a href="https://lwn.net/Articles/1013397/">6.12.18</a>, <a href="https://lwn.net/Articles/1014045/">6.12.19</a>, <a href="https://lwn.net/Articles/1015185/">6.12.20</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.21">6.12.21</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.22">6.12.22</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.23">6.12.23</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.24">6.12.24</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.25">6.12.25</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.26">6.12.26</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.27">6.12.27</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.28">6.12.28</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.29">6.12.29</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.30">6.12.30</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.31">6.12.31</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.32">6.12.32</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.33">6.12.33</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.34">6.12.34</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.35">6.12.35</a>, <a href="https://lwn.net/Articles/1028828/">6.12.36</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.37">6.12.37</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.38">6.12.38</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.39">6.12.39</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.40">6.12.40</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.41">6.12.41</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.42">6.12.42</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.43">6.12.43</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.44">6.12.44</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.45">6.12.45</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.46">6.12.46</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.47">6.12.47</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48">6.12.48</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49">6.12.49</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50">6.12.50</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51">6.12.51</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.52">6.12.52</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.53">6.12.53</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250808">20250808</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250211">20250211</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250311">20250311</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250410">20250410</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250509">20250509</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250613">20250613</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250627">20250627</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250708">20250708</a>))</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.31/release/3.31.html#id1">3.31.7</a> (includes <a href="https://cmake.org/cmake/help/v3.31/release/3.31.html">3.31.5</a>))</li>
<li>SDK: gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00014.html">16.3</a>)</li>
<li>SDK: gentoo-syntax (<a href="https://github.com/gentoo/gentoo-syntax/releases/tag/v16">16</a>)</li>
<li>SDK: gnu-efi (<a href="https://github.com/ncroxon/gnu-efi/releases/tag/4.0.2">4.0.2</a>)</li>
<li>SDK: go (<a href="https://go.dev/doc/devel/release#go1.24.minor">1.24.6</a> (includes <a href="https://go.dev/doc/go1.23">1.23.5</a>, <a href="https://go.dev/doc/devel/release#go1.23.6">1.23.6</a>, <a href="https://go.dev/doc/go1.24">1.24.1</a>, <a href="https://go.dev/doc/devel/release#go1.24.minor">1.24.2</a>, <a href="https://go.dev/doc/devel/release#go1.24.minor">1.24.4</a>, <a href="https://go.dev/doc/devel/release#go1.24.minor">1.24.5</a>))</li>
<li>SDK: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.19">3.19</a>)</li>
<li>SDK: m4 (<a href="https://lists.gnu.org/archive/html/m4-discuss/2025-05/msg00002.html">1.4.20</a>)</li>
<li>SDK: maturin (<a href="https://github.com/PyO3/maturin/blob/main/Changelog.md#191">1.9.1</a>)</li>
<li>SDK: meson (<a href="https://github.com/mesonbuild/meson/commits/1.7.2/">1.7.2</a> (includes <a href="https://mesonbuild.com/Release-notes-for-1-6-0.html">1.6.1</a>))</li>
<li>SDK: mtools (<a href="https://www.gnu.org/software/mtools/manual/mtools.html">4.0.49</a>)</li>
<li>SDK: nano (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-06/msg00003.html">8.5</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/perl5402delta">5.40.2</a> (includes <a href="https://perldoc.perl.org/perl5401delta">5.40.1</a>))</li>
<li>SDK: pkgcheck (<a href="https://github.com/pkgcore/pkgcheck/blob/v0.10.36/NEWS.rst">0.10.36</a> (includes <a href="https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.34">0.10.34</a>))</li>
<li>SDK: python-cryptography (<a href="https://cryptography.io/en/latest/changelog/#v45-0-5">45.0.4</a>)</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/9.2">9.2.3</a> (includes <a href="https://wiki.qemu.org/ChangeLog/9.0">9.0</a>, <a href="https://wiki.qemu.org/ChangeLog/9.1">9.1.2</a>))</li>
<li>SDK: rust (<a href="https://blog.rust-lang.org/2025/06/26/Rust-1.88.0/">1.88.0</a> (includes <a href="https://blog.rust-lang.org/2024/11/28/Rust-1.83.0.html">1.83.0</a>, <a href="https://releases.rs/docs/1.84.0/">1.84.0</a>, <a href="https://releases.rs/docs/1.84.1/">1.84.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.85.0">1.85.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.85.1">1.85.1</a>, <a href="https://releases.rs/docs/1.86.0/">1.86.0</a>, <a href="https://releases.rs/docs/1.87.0/">1.87.0</a>))</li>
<li>SDK: sbsigntools (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/commit/?h=v0.9.5&amp;id=9cfca9fe7aa7a8e29b92fe33ce8433e212c9a8ba">0.9.5</a>)</li>
<li>VMWare: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.5.2">12.5.2</a>)</li>
<li>afterburn (<a href="https://coreos.github.io/afterburn/release-notes/#afterburn-582">5.8.2</a>)</li>
<li>azure, dev, gce, sysext-python: gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00012.html">1.26</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2025-03/msg00010.html">1.25</a>))</li>
<li>azure, dev, gce, sysext-python: mpdecimal (<a href="https://www.bytereef.org/mpdecimal/changelog.html#version-4-0-1xs">4.0.1</a>)</li>
<li>azure, dev, gce, sysext-python: python (<a href="https://www.python.org/downloads/release/python-31113/">3.11.13</a> (includes <a href="https://www.python.org/downloads/release/python-31112/">3.11.12</a>))</li>
<li>azure: wa-linux-agent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.12.0.4">2.12.0.4</a>)</li>
<li>base, dev: azure-vm-utils (<a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.7.0">0.7.0</a> (includes <a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.5.0">0.5.0</a>, <a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.5.1">0.5.1</a>, <a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.5.2">0.5.2</a>, <a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.6.0">0.6.0</a>))</li>
<li>base, dev: bind (<a href="https://bind9.readthedocs.io/en/v9.18.37/notes.html#notes-for-bind-9-18-37">9.18.37</a> (includes <a href="https://bind9.readthedocs.io/en/v9.18.30/notes.html#notes-for-bind-9-18-30">9.18.30</a>, <a href="https://bind9.readthedocs.io/en/v9.18.31/notes.html#notes-for-bind-9-18-31">9.18.31</a>, <a href="https://bind9.readthedocs.io/en/v9.18.32/notes.html#notes-for-bind-9-18-32">9.18.32</a>, <a href="https://bind9.readthedocs.io/en/v9.18.33/notes.html#notes-for-bind-9-18-33">9.18.33</a>, <a href="https://bind9.readthedocs.io/en/v9.18.34/notes.html#notes-for-bind-9-18-34">9.18.34</a>, <a href="https://bind9.readthedocs.io/en/v9.18.35/notes.html#notes-for-bind-9-18-35">9.18.35</a>, <a href="https://bind9.readthedocs.io/en/v9.18.36/notes.html#notes-for-bind-9-18-36">9.18.36</a>))</li>
<li>base, dev: binutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00001.html">2.44</a>)</li>
<li>base, dev: btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/releases/tag/v6.15">6.15</a> (includes <a href="https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.13/CHANGES">6.13</a>))</li>
<li>base, dev: c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/v1.34.4">1.34.4</a>)</li>
<li>base, dev: checkpolicy (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8.1">3.8.1</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8">3.8</a>))</li>
<li>base, dev: cifs-utils (<a href="https://lists.samba.org/archive/samba-technical/2025-March/139360.html">7.3</a> (includes <a href="https://lists.samba.org/archive/samba-technical/2024-October/139146.html">7.1</a>, <a href="https://lists.samba.org/archive/samba-technical/2025-February/139330.html">7.2</a>))</li>
<li>base, dev: cracklib (<a href="https://github.com/cracklib/cracklib/releases/tag/v2.10.3">2.10.3</a>)</li>
<li>base, dev: cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.32.0">1.32.0</a> (includes <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.1">1.27.1</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.28.0">1.28.0</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.29.0">1.29.0</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.30.0">1.30.0</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.30.1">1.30.1</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.31.0">1.31.0</a>, <a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.31.1">1.31.1</a>))</li>
<li>base, dev: cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.8.0/docs/v2.8.0-ReleaseNotes">2.8.0</a>)</li>
<li>base, dev: curl (<a href="https://curl.se/ch/8.15.0.html">8.15.0</a> (includes <a href="https://curl.se/ch/8.12.0.html">8.12.0</a>, <a href="https://curl.se/ch/8.12.1.html">8.12.1</a>, <a href="https://curl.se/ch/8.13.0.html">8.13.0</a>, <a href="https://curl.se/ch/8.14.0.html">8.14.0</a>, <a href="https://curl.se/ch/8.14.1.html">8.14.1</a>))</li>
<li>base, dev: dbus (<a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.16.2/NEWS">1.16.2</a> (includes <a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.14.6/NEWS">1.14.6</a>, <a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.14.8/NEWS">1.14.8</a>, <a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.16.0/NEWS">1.16.0</a>))</li>
<li>base, dev: diffutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00005.html">3.12</a> (includes <a href="https://savannah.gnu.org/news/?id=10720">3.11</a>))</li>
<li>base, dev: e2fsprogs (<a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.3">1.47.3</a> (includes <a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.2">1.47.2</a>))</li>
<li>base, dev: elfutils (<a href="https://inbox.sourceware.org/elfutils-devel/CAJDtP-RjuT13zehLgSvz9TnwQZ1VYPOS=q_kuut5a2g+KLamgw@mail.gmail.com/T/#u">0.193</a> (includes <a href="https://inbox.sourceware.org/elfutils-devel/CAJDtP-T3+gXqHWp3T0mejWWbPr0_1tHetEXwfB67-o+zz7ShiA@mail.gmail.com/T/">0.192</a>))</li>
<li>base, dev: ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/plain/NEWS?h=v6.15">6.15</a> (includes <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.11">6.11</a>))</li>
<li>base, dev: expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_7_1/expat/Changes#L40">2.7.1</a> (includes <a href="https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40">2.7.0</a>))</li>
<li>base, dev: gawk (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00003.html">5.3.2</a>)</li>
<li>base, dev: gcc (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-05/msg00004.html">14.3.0</a>)</li>
<li>base, dev: git (<a href="https://github.com/git/git/blob/v2.49.0/Documentation/RelNotes/2.49.0.adoc">2.49.0</a> (includes <a href="https://github.com/git/git/blob/v2.45.3/Documentation/RelNotes/2.45.3.txt">2.45.3</a>, <a href="https://github.com/git/git/blob/v2.46.0/Documentation/RelNotes/2.46.0.txt">2.46.0</a>, <a href="https://github.com/git/git/blob/v2.46.1/Documentation/RelNotes/2.46.1.txt">2.46.1</a>, <a href="https://github.com/git/git/blob/v2.46.2/Documentation/RelNotes/2.46.2.txt">2.46.2</a>, <a href="https://github.com/git/git/blob/v2.46.3/Documentation/RelNotes/2.46.3.txt">2.46.3</a>, <a href="https://github.com/git/git/blob/v2.47.0/Documentation/RelNotes/2.47.0.txt">2.47.0</a>, <a href="https://github.com/git/git/blob/v2.47.1/Documentation/RelNotes/2.47.1.txt">2.47.1</a>, <a href="https://github.com/git/git/blob/v2.47.2/Documentation/RelNotes/2.47.2.txt">2.47.2</a>, <a href="https://github.com/git/git/blob/v2.48.0/Documentation/RelNotes/2.48.0.txt">2.48.0</a>, <a href="https://github.com/git/git/blob/v2.48.1/Documentation/RelNotes/2.48.1.txt">2.48.1</a>))</li>
<li>base, dev: glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.4">2.84.4</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.0">2.82.0</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1">2.82.1</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.2">2.82.2</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.3">2.82.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.4">2.82.4</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.5">2.82.5</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.0">2.83.0</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.1">2.83.1</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.2">2.83.2</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.3">2.83.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.4">2.83.4</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.5">2.83.5</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.0">2.84.0</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.1">2.84.1</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.2">2.84.2</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.3">2.84.3</a>))</li>
<li>base, dev: glibc (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-01/msg00014.html">2.41</a>)</li>
<li>base, dev: gnupg (<a href="https://dev.gnupg.org/T7428">2.4.8</a> (includes <a href="https://dev.gnupg.org/T7353">2.4.7</a>))</li>
<li>base, dev: gnutls (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html">3.8.10</a> (includes <a href="https://gitlab.com/gnutls/gnutls/-/blob/3.8.8/NEWS">3.8.8</a>, <a href="https://lists.gnupg.org/pipermail/gnutls-help/2025-February/004875.html">3.8.9</a>))</li>
<li>base, dev: grep (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00008.html">3.12</a>)</li>
<li>base, dev: gzip (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00007.html">1.14</a>)</li>
<li>base, dev: hwdata (<a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.391">0.391</a>)</li>
<li>base, dev: inih (<a href="https://github.com/benhoyt/inih/releases/tag/r59">59</a>)</li>
<li>base, dev: intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211">20250211_p20250211</a>)</li>
<li>base, dev: iproute2 (<a href="https://www.spinics.net/lists/netdev/msg1112693.html">6.16.0</a> (includes <a href="https://lore.kernel.org/all/20250120194053.3744d96b@hermes.local/">6.13.0</a>, <a href="https://lore.kernel.org/all/20250324092319.28d39f2f@hermes.local/">6.14.0</a>))</li>
<li>base, dev: ipset (<a href="https://lwn.net/Articles/1021623/">7.24</a> (includes <a href="https://ipset.netfilter.org/changelog.html">7.23</a>))</li>
<li>base, dev: iptables (<a href="https://netfilter.org/projects/iptables/files/changes-iptables-1.8.11.txt">1.8.11</a> (includes <a href="https://netfilter.org/projects/iptables/files/changes-iptables-1.8.9.txt">1.8.9</a>, <a href="https://netfilter.org/projects/iptables/files/changes-iptables-1.8.10.txt">1.8.10</a>))</li>
<li>base, dev: iputils (<a href="https://github.com/iputils/iputils/releases/tag/20250605">20250605</a> (includes <a href="https://github.com/iputils/iputils/releases/tag/20250602">20250602</a>))</li>
<li>base, dev: jansson (<a href="https://jansson.readthedocs.io/en/latest/changes.html#version-2-14-1">2.14.1</a>)</li>
<li>base, dev: jq (<a href="https://github.com/jqlang/jq/releases/tag/jq-1.8.1">1.8.1</a> (includes <a href="https://github.com/jqlang/jq/releases/tag/jq-1.8.0">1.8.0</a>))</li>
<li>base, dev: kbd (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7.1">2.7.1</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7">2.7</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7-rc1">2.7-rc1</a>))</li>
<li>base, dev: kexec-tools (<a href="https://github.com/horms/kexec-tools/commits/v2.0.31/">2.0.31</a>)</li>
<li>base, dev: kmod (<a href="https://lwn.net/Articles/1011365/">34.2</a>)</li>
<li>base, dev: ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/42bfbb012f9c1c9054cdfb510ae4a50a3f12b384">2.9.2</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/ec91204387bd7f5c5a8d8df8534c6ca59b491ac5">2.9.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/3dd39600da3c0bedeae9f033c1333eb6b0f4ff33">2.9.1</a>))</li>
<li>base, dev: libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.8.1">3.8.1</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.8">3.7.8</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.9">3.7.9</a>, <a href="https://github.com/libarchive/libarchive/releases/tag/v3.8.0">3.8.0</a>))</li>
<li>base, dev: libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.wqnp1zp1o8bm">2.76</a> (includes <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.ulglddlojmy0">2.72</a>, <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.7yd7ab9ppagk">2.73</a>, <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.ccbrq82zh7n9">2.74</a>, <a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.7xqcoecpcnn8">2.75</a>))</li>
<li>base, dev: libffi (<a href="https://github.com/libffi/libffi/releases/tag/v3.4.8">3.4.8</a> (includes <a href="https://github.com/libffi/libffi/releases/tag/v3.4.7">3.4.7</a>))</li>
<li>base, dev: libgcrypt (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS;h=3add9aad0cf6dc5a70ce6cb3983a46e585a630b3;hb=737cc63600146f196738a6768679eb016cf866e9">1.11.2</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=84bc61a49f3a09302b3438cb529baf67576ad859;hb=81ce5321b1b79bde6dfdc3c164efb40c13cf656b">1.11.1</a>))</li>
<li>base, dev: libgpg-error (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=66b2256de2f59c38b9cd35fb4a1b1971a6c9f3f1;hb=f9e98ed8315eaf0468870149d22c5dcf992288ec">1.53</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=4f6a114d81fb5b2f73bb65a1f1cc3c21fe64fa0c;hb=be471d158e4951f4b17335b0fc9ae2387a786b5b">1.52</a>))</li>
<li>base, dev: libidn2 (<a href="https://gitlab.com/libidn/libidn2/-/blob/v2.3.8/NEWS">2.3.8</a>)</li>
<li>base, dev: libnftnl (<a href="https://lwn.net/Articles/1017463/">1.2.9</a>)</li>
<li>base, dev: libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.15">1.15</a> (includes <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.12">1.12</a>))</li>
<li>base, dev: libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.45/NEWS">10.45</a>)</li>
<li>base, dev: libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.6.0">2.6.0</a> (includes <a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.6">2.5.6</a>))</li>
<li>base, dev: libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8.1">3.8.1</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8">3.8</a>))</li>
<li>base, dev: libsemanage (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8.1">3.8.1</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8">3.8</a>))</li>
<li>base, dev: libsodium (<a href="https://raw.githubusercontent.com/jedisct1/libsodium/7e024fbf096c84bef866b21f521c516591908bef/ChangeLog">1.0.20_p20250606</a>)</li>
<li>base, dev: libtasn1 (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00004.html">4.20.0</a>)</li>
<li>base, dev: libtirpc (<a href="https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-6">1.3.6</a> (includes <a href="https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-5">1.3.5</a>))</li>
<li>base, dev: libunistring (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-10/msg00000.html">1.3</a>)</li>
<li>base, dev: libunwind (<a href="https://github.com/libunwind/libunwind/releases/tag/v1.8.2">1.8.2</a>)</li>
<li>base, dev: liburing (<a href="https://github.com/axboe/liburing/releases/tag/liburing-2.9">2.9</a> (includes <a href="https://github.com/axboe/liburing/releases/tag/liburing-2.8">2.8</a>))</li>
<li>base, dev: libusb (<a href="https://raw.githubusercontent.com/libusb/libusb/refs/tags/v1.0.29/ChangeLog">1.0.29</a> (includes <a href="https://github.com/libusb/libusb/blob/v1.0.28/ChangeLog">1.0.28</a>))</li>
<li>base, dev: libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.51.0">1.51.0</a> (includes <a href="https://github.com/libuv/libuv/releases/tag/v1.50.0">1.50.0</a>))</li>
<li>base, dev: libxcrypt (<a href="https://github.com/besser82/libxcrypt/releases/tag/v4.4.38">4.4.38</a> (includes <a href="https://github.com/besser82/libxcrypt/releases/tag/v4.4.37">4.4.37</a>))</li>
<li>base, dev: libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.8">2.13.8</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.10">2.12.10</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.0">2.13.0</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.1">2.13.1</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.2">2.13.2</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.3">2.13.3</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.4">2.13.4</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.5">2.13.5</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.6">2.13.6</a>, <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.7">2.13.7</a>))</li>
<li>base, dev: linux-headers (<a href="https://kernelnewbies.org/Linux_6.12">6.12</a>)</li>
<li>base, dev: logrotate (<a href="https://github.com/logrotate/logrotate/releases/tag/3.22.0">3.22.0</a> (includes <a href="https://github.com/logrotate/logrotate/releases/tag/3.21.0">3.21.0</a>))</li>
<li>base, dev: lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.99.5">4.99.5</a>)</li>
<li>base, dev: lvm2 (<a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_21">2.03.21</a> (includes <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_00">2.03.00</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_01">2.03.01</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_02">2.03.02</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_03">2.03.03</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_04">2.03.04</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_05">2.03.05</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_06">2.03.06</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_07">2.03.07</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_08">2.03.08</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_09">2.03.09</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_10">2.03.10</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_11">2.03.11</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_12">2.03.12</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_13">2.03.13</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_14">2.03.14</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_15">2.03.15</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_16">2.03.16</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_17">2.03.17</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_18">2.03.18</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_19">2.03.19</a>, <a href="https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_20">2.03.20</a>))</li>
<li>base, dev: mdadm (<a href="https://git.kernel.org/pub/scm/utils/mdadm/mdadm.git/tree/CHANGELOG.md?h=mdadm-4.4">4.4</a> (includes <a href="https://git.kernel.org/pub/scm/utils/mdadm/mdadm.git/tree/CHANGELOG.md?h=mdadm-4.4#n36">4.3</a>))</li>
<li>base, dev: ncurses (<a href="https://invisible-island.net/ncurses/NEWS.html#t20250531">6.5_p20250531</a> (includes <a href="https://invisible-island.net/ncurses/announce-6.5.html">6.5_p20250125</a>))</li>
<li>base, dev: nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/raw/nettle_3.10.2_release_20250626/ChangeLog">3.10.2</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2024-12/msg00008.html">3.10.1</a>))</li>
<li>base, dev: nfs-utils (<a href="https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-7-1">2.7.1</a> (includes <a href="https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-1">2.6.1</a>, <a href="https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-2">2.6.2</a>, <a href="https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-3">2.6.3</a>, <a href="https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-4">2.6.4</a>))</li>
<li>base, dev: nftables (<a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.1.1.txt">1.1.1</a> (includes <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.0.txt">1.0.0</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.1.txt">1.0.1</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.2.txt">1.0.2</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.3.txt">1.0.3</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.4.txt">1.0.4</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.5.txt">1.0.5</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.6.txt">1.0.6</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.7.txt">1.0.7</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.8.txt">1.0.8</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.0.9.txt">1.0.9</a>, <a href="https://netfilter.org/projects/nftables/files/changes-nftables-1.1.0.txt">1.1.0</a>))</li>
<li>base, dev: nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.65.0">1.65.0</a> (includes <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.63.0">1.63.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.64.0">1.64.0</a>))</li>
<li>base, dev: ntp (<a href="https://www.ntp.org/support/securitynotice/4_2_8p18-release-announcement/">4.2.8_p18</a>)</li>
<li>base, dev: nvidia-drivers-service (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-172-08/index.html">570.172.08</a> (includes <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-247-01/index.html">535.247.01</a>, <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-261-03/index.html">535.261.03</a>, <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-124-06/index.html">570.124.06</a>, <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-133-20/index.html">570.133.20</a>, <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-148-08/index.html">570.148.08</a>, 570.172.08))</li>
<li>base, dev: nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.15">2.15</a> (includes <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.12">2.12</a>))</li>
<li>base, dev: oniguruma (<a href="https://github.com/kkos/oniguruma/releases/tag/v6.9.10">6.9.10</a>)</li>
<li>base, dev: open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/blob/2.1.11/Changelog">2.1.11</a>)</li>
<li>base, dev: open-isns (<a href="https://github.com/open-iscsi/open-isns/releases/tag/v0.103">0.103</a>)</li>
<li>base, dev: openssh (<a href="https://www.openssh.com/releasenotes.html#10.0p1">10.0_p1</a> (includes <a href="https://www.openssh.com/txt/release-9.9">9.9_p1</a>, <a href="https://www.openssh.com/txt/release-9.9p2">9.9_p2</a>))</li>
<li>base, dev: openssl (<a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.2">3.4.2</a> (includes <a href="https://github.com/openssl/openssl/releases/tag/openssl-3.3.3">3.3.3</a>, <a href="https://github.com/openssl/openssl/blob/openssl-3.4.0/NEWS.md#openssl-34">3.4.0</a>, <a href="https://github.com/openssl/openssl/releases/tag/openssl-3.4.1">3.4.1</a>))</li>
<li>base, dev: pciutils (<a href="https://git.kernel.org/pub/scm/utils/pciutils/pciutils.git/plain/ChangeLog?h=v3.14.0">3.14.0</a>)</li>
<li>base, dev: pinentry (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob_plain;f=NEWS;h=8bf192539fed9104a1ff431c6dcc3add7fb6771c;hb=d7660807593067d5cd7150b7d4d987d60957b5cb">1.3.2</a>)</li>
<li>base, dev: pkgconf (<a href="https://raw.githubusercontent.com/pkgconf/pkgconf/refs/tags/pkgconf-2.5.1/NEWS">2.5.1</a> (includes <a href="https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.0/NEWS">2.4.0</a>, <a href="https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.1/NEWS">2.4.1</a>, <a href="https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.2/NEWS">2.4.2</a>, <a href="https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.3/NEWS">2.4.3</a>, <a href="https://raw.githubusercontent.com/pkgconf/pkgconf/refs/tags/pkgconf-2.5.0/NEWS">2.5.0</a>))</li>
<li>base, dev: policycoreutils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: polkit (<a href="https://github.com/polkit-org/polkit/blob/126/NEWS.md">126</a> (includes <a href="https://github.com/polkit-org/polkit/blob/122/NEWS.md">122</a>, <a href="https://github.com/polkit-org/polkit/blob/123/NEWS.md">123</a>, <a href="https://github.com/polkit-org/polkit/blob/124/NEWS.md">124</a>, <a href="https://github.com/polkit-org/polkit/blob/125/NEWS.md">125</a>))</li>
<li>base, dev: qemu-guest-agent (<a href="https://wiki.qemu.org/ChangeLog/9.2#Guest_agent">9.2.0</a> (includes <a href="https://wiki.qemu.org/ChangeLog/9.0#Guest_agent">9.0</a>, <a href="https://wiki.qemu.org/ChangeLog/9.1#Guest_agent">9.1</a>))</li>
<li>base, dev: quota (<a href="https://sourceforge.net/p/linuxquota/news/2025/04/quota-tools-410-released/">4.10</a>)</li>
<li>base, dev: rpcbind (<a href="https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_8">1.2.8</a> (includes <a href="http://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_7">1.2.7</a>))</li>
<li>base, dev: rsync (<a href="https://download.samba.org/pub/rsync/NEWS#3.4.1">3.4.1</a> (includes <a href="https://download.samba.org/pub/rsync/NEWS#3.4.0">3.4.0</a>))</li>
<li>base, dev: samba (<a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.7/WHATSNEW.txt">4.20.7</a> (includes <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.0/WHATSNEW.txt">4.20.0</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.1/WHATSNEW.txt">4.20.1</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.2/WHATSNEW.txt">4.20.2</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.3/WHATSNEW.txt">4.20.3</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.4/WHATSNEW.txt">4.20.4</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.5/WHATSNEW.txt">4.20.5</a>, <a href="https://gitlab.com/samba-team/samba/-/blob/samba-4.20.6/WHATSNEW.txt">4.20.6</a>))</li>
<li>base, dev: selinux (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20250213">2.20250213</a>)</li>
<li>base, dev: semodule-utils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8.1">3.8.1</a> (includes <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>, <a href="https://github.com/SELinuxProject/selinux/releases/tag/3.8">3.8</a>))</li>
<li>base, dev: shadow (<a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.8">4.14.8</a> (includes <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.0">4.14.0</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.1">4.14.1</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.2">4.14.2</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.3">4.14.3</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.4">4.14.4</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.5">4.14.5</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.6">4.14.6</a>, <a href="https://github.com/shadow-maint/shadow/releases/tag/4.14.7">4.14.7</a>))</li>
<li>base, dev: socat (<a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.8.0.3:/CHANGES">1.8.0.3</a> (includes <a href="https://repo.or.cz/socat.git/blob/6ff391324d2d3b9f6bfb58e7d16a20be43b47af7:/CHANGES">1.8.0.1</a>, <a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.8.0.2:/CHANGES">1.8.0.2</a>))</li>
<li>base, dev: sqlite (<a href="https://sqlite.org/releaselog/3_50_4.html">3.50.4</a> (includes <a href="https://sqlite.org/releaselog/3_47_2.html">3.47.2</a>, <a href="https://sqlite.org/releaselog/3_48_0.html">3.48.0</a>, <a href="https://sqlite.org/releaselog/3_49_0.html">3.49.0</a>, <a href="https://sqlite.org/releaselog/3_49_1.html">3.49.1</a>, <a href="https://sqlite.org/releaselog/3_49_2.html">3.49.2</a>, <a href="https://sqlite.org/releaselog/3_50_3.html">3.50.3</a>))</li>
<li>base, dev: sssd (<a href="https://sssd.io/release-notes/sssd-2.9.7.html">2.9.7</a> (includes <a href="https://sssd.io/release-notes/sssd-2.9.6.html">2.9.6</a>))</li>
<li>base, dev: strace (<a href="https://github.com/strace/strace/releases/tag/v6.16">6.16</a> (includes <a href="https://github.com/strace/strace/releases/tag/v6.13">6.13</a>, <a href="https://github.com/strace/strace/releases/tag/v6.14">6.14</a>))</li>
<li>base, dev: sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/v1.9.17p2">1.9.17_p2</a>)</li>
<li>base, dev: tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/6b10cfbaf2c522cceb48c610c18656d2d69cf60b">1.4.12</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/93a6656c13facdb8565f90954428c4cf800bfc36">1.4.11</a>))</li>
<li>base, dev: trousers (<a href="https://sourceforge.net/p/trousers/trousers/ci/TROUSERS_0_3_15/tree/ChangeLog">0.3.15</a>)</li>
<li>base, dev: unzip (<a href="https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-29_changelog">6.0_p29</a>)</li>
<li>base, dev: userspace-rcu (<a href="https://lwn.net/Articles/1017443/">0.15.2</a> (includes <a href="https://lore.kernel.org/all/51160e24-389a-41b6-871b-ba522d427220@efficios.com/">0.15.0</a>, <a href="https://lore.kernel.org/lkml/6894741e-c3c8-4464-92ab-ba8b88929961@efficios.com/T/">0.15.1</a>))</li>
<li>base, dev: util-linux (<a href="https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.4/Documentation/releases/v2.40.4-ReleaseNotes">2.40.4</a> (includes <a href="https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.3/Documentation/releases/v2.40.3-ReleaseNotes">2.40.3</a>))</li>
<li>base, dev: vim (<a href="https://github.com/vim/vim/commits/v9.1.1652/">9.1.1652</a> (includes <a href="https://github.com/vim/vim/commits/v9.1.0794/">9.1.0794</a>, <a href="https://github.com/vim/vim/commits/v9.1.1436/">9.1.1436</a>))</li>
<li>base, dev: which (<a href="https://git.savannah.gnu.org/cgit/which.git/tree/NEWS?id=3e2c8f8acc3a333b66b06de234bc9324c6fe5500">2.23</a>)</li>
<li>base, dev: xfsprogs (<a href="https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.13.0">6.13.0</a> (includes <a href="https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.12.0">6.12.0</a>))</li>
<li>base, dev: xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.8.1">5.8.1</a> (includes <a href="https://github.com/tukaani-project/xz/releases/tag/v5.6.4">5.6.4</a>, <a href="https://github.com/tukaani-project/xz/releases/tag/v5.8.0">5.8.0</a>))</li>
<li>base, dev: zram-generator (<a href="https://github.com/systemd/zram-generator/releases/tag/v1.2.1">1.2.1</a> (includes <a href="https://github.com/systemd/zram-generator/releases/tag/v1.2.0">1.2.0</a>))</li>
<li>base, dev: zstd (<a href="https://github.com/facebook/zstd/releases/tag/v1.5.7">1.5.7</a>)</li>
<li>btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/releases/tag/v6.14">6.14</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html">3.116</a>)</li>
<li>chrony (<a href="https://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2025/06/msg00000.html">4.7</a>)</li>
<li>curl (<a href="https://curl.se/ch/8.14.1.html">8.14.1</a>)</li>
<li>dbus-glib (<a href="https://gitlab.freedesktop.org/dbus/dbus-glib/-/blob/master/NEWS?ref_type=heads#L8">0.114</a>)</li>
<li>dev, sysext-incus: squashfs-tools (<a href="https://lkml.org/lkml/2025/6/3/1214">4.7</a>)</li>
<li>dev: bash-completion (<a href="https://github.com/scop/bash-completion/releases/tag/2.16.0">2.16.0</a>)</li>
<li>dev: eselect (<a href="https://gitweb.gentoo.org/proj/eselect.git/tree/NEWS?h=eselect-1.4.30">1.4.30</a> (includes <a href="https://gitweb.gentoo.org/proj/eselect.git/tree/NEWS?h=eselect-1.4.29">1.4.29</a>))</li>
<li>dev: file (<a href="https://github.com/file/file/blob/FILE5_46/ChangeLog">5.46</a>)</li>
<li>dev: gcc-config (<a href="https://gitweb.gentoo.org/proj/gcc-config.git/log/?h=v2.12.1">2.12.1</a>)</li>
<li>dev: gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00000.html">16.2</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2025-01/msg00009.html">16.1</a>))</li>
<li>dev: getuto (<a href="https://github.com/projg2/getuto/commits/getuto-1.15/">1.15</a>)</li>
<li>dev: gnuconfig (<a href="https://cgit.git.savannah.gnu.org/cgit/config.git/log/?id=a2287c3041a3f2a204eb942e09c015eab00dc7dd">20250710</a>)</li>
<li>dev: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.19.1">3.19.1</a> (includes <a href="https://github.com/esnet/iperf/releases/tag/3.18">3.18</a>))</li>
<li>dev: man-db (<a href="https://gitlab.com/man-db/man-db/-/releases/2.13.1">2.13.1</a>)</li>
<li>dev: man-pages (<a href="https://lkml.org/lkml/2025/1/22/1229">6.10</a>)</li>
<li>dev: minicom (<a href="https://salsa.debian.org/minicom-team/minicom/-/releases/2.10">2.10</a>)</li>
<li>dev: mpfr (<a href="https://www.mpfr.org/mpfr-4.2.2/">4.2.2</a>)</li>
<li>dev: pahole (<a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.30">1.30</a> (includes <a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.28">1.28</a>, <a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.29">1.29</a>))</li>
<li>dev: patch (<a href="https://lists.gnu.org/archive/html/info-gnu/2025-03/msg00014.html">2.8</a>)</li>
<li>dev: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.68">3.0.68</a> (includes <a href="https://github.com/gentoo/portage/blob/portage-3.0.67/NEWS">3.0.67</a>))</li>
<li>dev: sandbox (<a href="https://gitweb.gentoo.org/proj/sandbox.git/log/?h=v2.46">2.46</a>)</li>
<li>dev: smartmontools (<a href="https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_5">7.5</a>)</li>
<li>docker: docker (<a href="https://github.com/moby/moby/releases/tag/v28.0.1">28.0.1</a> (includes <a href="https://docs.docker.com/engine/release-notes/27/#2740">27.4.0</a>, <a href="https://docs.docker.com/engine/release-notes/27/#2741">27.4.1</a>, <a href="https://github.com/moby/moby/releases/tag/v28.0.0">28.0.0</a>))</li>
<li>docker: docker-buildx (<a href="https://github.com/docker/buildx/releases/tag/v0.20.1">0.20.1</a> (includes <a href="https://github.com/docker/buildx/releases/tag/v0.14.1">0.14.1</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.15.0">0.15.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.15.1">0.15.1</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.16.0">0.16.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.16.1">0.16.1</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.16.2">0.16.2</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.17.0">0.17.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.17.1">0.17.1</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.18.0">0.18.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.19.0">0.19.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.19.1">0.19.1</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.19.2">0.19.2</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.19.3">0.19.3</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.20.0">0.20.0</a>))</li>
<li>dracut (<a href="https://github.com/dracut-ng/dracut-ng/releases/tag/106">106</a> (includes <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/054">054</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/055">055</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/056">056</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/057">057</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/058">058</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/059">059</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/060">060</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/100">100</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/101">101</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/102">102</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/103">103</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/104">104</a>, <a href="https://github.com/dracut-ng/dracut-ng/releases/tag/105">105</a>))</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=fba608c5a8ac943ebff046f387ade9dd364eb5a7">6.14</a>)</li>
<li>fuse-overlayfs (<a href="https://github.com/containers/fuse-overlayfs/releases/tag/v1.15">1.15</a>)</li>
<li>git (<a href="https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.49.1.adoc">2.49.1</a>)</li>
<li>inih (<a href="https://github.com/benhoyt/inih/releases/tag/r60">60</a>)</li>
<li>iproute2 (<a href="https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=401816cc9c7cde7b666d4befb06a10d6359c9688">6.15.0</a>)</li>
<li>kbd (<a href="https://lore.kernel.org/kbd/aDmDTB_oRNU8UsWy@example.org/T/#u">2.8.0</a>)</li>
<li>less (<a href="https://greenwoodsoftware.com/less/news.679.html">679</a>)</li>
<li>libffi (<a href="https://github.com/libffi/libffi/releases/tag/v3.5.1">3.5.1</a>)</li>
<li>libgpg-error (<a href="https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.55">1.55</a>)</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.14">1.14</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.14.5">2.14.5</a>)</li>
<li>ncurses (<a href="https://invisible-island.net/ncurses/announce.html">6.5_p20250329</a>)</li>
<li>nftables (<a href="https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.3.txt">1.1.3</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.14">2.14</a>)</li>
<li>passt (<a href="https://passt.top/passt/commit/?id=0293c6f4a316baa561a9b43388906707f8cf7e81">2025.6.11</a>)</li>
<li>procps (<a href="https://gitlab.com/procps-ng/procps/-/blob/master/NEWS?ref_type=heads#L30">4.0.5</a>)</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.20.8.html">4.20.8</a>)</li>
<li>sqlite (<a href="https://sqlite.org/releaselog/3_50_2.html">3.50.2</a>)</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.15">6.15</a>)</li>
<li>sysext-containerd: containerd (<a href="https://github.com/containerd/containerd/releases/tag/v2.0.7">2.0.7</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v2.0.2">2.0.2</a>, <a href="https://github.com/containerd/containerd/releases/tag/v2.0.5">2.0.5</a>, <a href="https://github.com/containerd/containerd/releases/tag/v2.0.6">2.0.6</a>))</li>
<li>sysext-containerd: runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.3.3">1.3.3</a> (includes <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.15">1.1.15</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.0">1.2.0</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.1">1.2.1</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.2">1.2.2</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.3">1.2.3</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.4">1.2.4</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.5">1.2.5</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.2.6">1.2.6</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.3.0">1.3.0</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.3.1">1.3.1</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.3.2">1.3.2</a>)</li>
<li>sysext-docker: docker (<a href="https://github.com/moby/moby/releases/tag/v28.0.4">28.0.4</a> (includes <a href="https://github.com/moby/moby/releases/tag/v28.0.2">28.0.2</a>, <a href="https://github.com/moby/moby/releases/tag/v28.0.3">28.0.3</a>))</li>
<li>sysext-docker: docker-buildx (<a href="https://github.com/docker/buildx/releases/tag/v0.21.2">0.21.2</a> (includes <a href="https://github.com/docker/buildx/releases/tag/v0.21.0">0.21.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.21.1">0.21.1</a>))</li>
<li>sysext-incus, sysext-podman, vmware: fuse (<a href="https://raw.githubusercontent.com/libfuse/libfuse/refs/tags/fuse-3.17.3/ChangeLog.rst">3.17.3</a>)</li>
<li>sysext-incus: cowsql (<a href="https://github.com/cowsql/cowsql/commits/v1.15.9/">1.15.9</a> (includes <a href="https://github.com/cowsql/cowsql/commits/v1.15.8/">1.15.8</a>))</li>
<li>sysext-incus: incus (<a href="https://discuss.linuxcontainers.org/t/incus-6-0-4-lts-has-been-released/23391">6.0.4</a>)</li>
<li>sysext-incus: lxc (<a href="https://discuss.linuxcontainers.org/t/lxc-6-0-4-lts-has-been-released/23390">6.0.4</a>)</li>
<li>sysext-incus: lxcfs (<a href="https://discuss.linuxcontainers.org/t/lxcfs-6-0-4-lts-has-been-released/23389">6.0.4</a>)</li>
<li>sysext-nvidia-drivers-535, sysext-nvidia-drivers-535-open: nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-261-03/index.html">535.261.03</a>)</li>
<li>sysext-nvidia-drivers-570, sysext-nvidia-drivers-570-open: nvidia-drivers (570.181 (includes 570.153.02, <a href="https://www.nvidia.com/en-us/drivers/details/247720/">570.169</a>, <a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-172-08/index.html">570.172.08</a>))</li>
<li>sysext-podman, vmware: fuse (<a href="https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.2">3.17.2</a> (includes <a href="https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.1">3.17.1</a>))</li>
<li>sysext-podman: aardvark-dns (<a href="https://github.com/containers/aardvark-dns/releases/tag/v1.14.0">1.14.0</a> (includes <a href="https://github.com/containers/aardvark-dns/releases/tag/v1.13.0">1.13.0</a>, <a href="https://github.com/containers/aardvark-dns/releases/tag/v1.13.1">1.13.1</a>))</li>
<li>sysext-podman: catatonit (<a href="https://github.com/openSUSE/catatonit/releases/tag/v0.2.1">0.2.1</a>)</li>
<li>sysext-podman: conmon (<a href="https://github.com/containers/conmon/releases/tag/v2.1.13">2.1.13</a> (includes <a href="https://github.com/containers/conmon/releases/tag/v2.1.11">2.1.11</a>, <a href="https://github.com/containers/conmon/releases/tag/v2.1.12">2.1.12</a>))</li>
<li>sysext-podman: containers-common (<a href="https://github.com/containers/common/releases/tag/v0.63.0">0.63.0</a> (includes <a href="https://github.com/containers/common/releases/tag/v0.61.0">0.61.0</a>, <a href="https://github.com/containers/common/releases/tag/v0.62.0">0.62.0</a>, <a href="https://github.com/containers/common/releases/tag/v0.62.1">0.62.1</a>, <a href="https://github.com/containers/common/releases/tag/v0.62.2">0.62.2</a>))</li>
<li>sysext-podman: containers-image (<a href="https://github.com/containers/image/releases/tag/v5.34.2">5.34.2</a> (includes <a href="https://github.com/containers/image/releases/tag/v5.33.0">5.33.0</a>, <a href="https://github.com/containers/image/releases/tag/v5.34.0">5.34.0</a>, <a href="https://github.com/containers/image/releases/tag/v5.34.1">5.34.1</a>))</li>
<li>sysext-podman: containers-shortnames (<a href="https://github.com/containers/shortnames/releases/tag/v2025.03.19">2025.03.19</a>)</li>
<li>sysext-podman: containers-storage (<a href="https://github.com/containers/storage/releases/tag/v1.57.2">1.57.2</a> (includes <a href="https://github.com/containers/storage/releases/tag/v1.56.0">1.56.0</a>, <a href="https://github.com/containers/storage/releases/tag/v1.57.0">1.57.0</a>, <a href="https://github.com/containers/storage/releases/tag/v1.57.1">1.57.1</a>))</li>
<li>sysext-podman: crun (<a href="https://github.com/containers/crun/releases/tag/1.20">1.20</a> (includes <a href="https://github.com/containers/crun/releases/tag/1.18">1.18</a>, <a href="https://github.com/containers/crun/releases/tag/1.18.1">1.18.1</a>, <a href="https://github.com/containers/crun/releases/tag/1.18.2">1.18.2</a>, <a href="https://github.com/containers/crun/releases/tag/1.19">1.19</a>, <a href="https://github.com/containers/crun/releases/tag/1.19.1">1.19.1</a>))</li>
<li>sysext-podman: gpgme (<a href="https://dev.gnupg.org/T7659">1.24.3</a> (includes <a href="https://dev.gnupg.org/T7524">1.24.2</a>))</li>
<li>sysext-podman: netavark (<a href="https://github.com/containers/netavark/releases/tag/v1.14.1">1.14.1</a> (includes <a href="https://github.com/containers/netavark/releases/tag/v1.13.0">1.13.0</a>, <a href="https://github.com/containers/netavark/releases/tag/v1.13.1">1.13.1</a>, <a href="https://github.com/containers/netavark/releases/tag/v1.14.0">1.14.0</a>))</li>
<li>sysext-podman: passt (<a href="https://archives.passt.top/passt-user/20250415233140.35074c4b@elisabeth/T/#u">2025.04.15</a> (includes <a href="https://archives.passt.top/passt-user/20250121182827.652400c8@elisabeth/T/#u">2025.01.21</a>, <a href="https://archives.passt.top/passt-user/20250217101614.561b23bc@elisabeth/T/#u">2025.02.17</a>))</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.5.2">5.5.2</a> (includes <a href="https://github.com/containers/podman/releases/tag/v5.3.2">5.3.2</a>)</li>
<li>sysext-python: cachecontrol (<a href="https://github.com/psf/cachecontrol/releases/tag/v0.14.3">0.14.3</a> (includes <a href="https://github.com/psf/cachecontrol/releases/tag/v0.14.2">0.14.2</a>))</li>
<li>sysext-python: charset-normalizer (<a href="https://github.com/jawah/charset_normalizer/releases/tag/3.4.2">3.4.2</a>)</li>
<li>sysext-python: distlib (<a href="https://github.com/pypa/distlib/blob/0.4.0/CHANGES.rst#040">0.4.0</a>)</li>
<li>sysext-python: ensurepip-pip (<a href="https://pip.pypa.io/en/stable/news/#v25-1-1">25.1.1</a>)</li>
<li>sysext-python: jaraco-collections (<a href="https://github.com/jaraco/jaraco.collections/releases/tag/v5.2.1">5.2.1</a>)</li>
<li>sysext-python: jaraco-functools (<a href="https://github.com/jaraco/jaraco.functools/releases/tag/v4.2.1">4.2.1</a>)</li>
<li>sysext-python: more-itertools (<a href="https://github.com/more-itertools/more-itertools/blob/v10.7.0/docs/versions.rst">10.7.0</a> (includes <a href="https://github.com/more-itertools/more-itertools/releases/tag/v10.6.0">10.6.0</a>))</li>
<li>sysext-python: msgpack (<a href="https://github.com/msgpack/msgpack-python/releases/tag/v1.1.1">1.1.1</a>)</li>
<li>sysext-python: packaging (<a href="https://github.com/pypa/packaging/releases/tag/25.0">25.0</a>)</li>
<li>sysext-python: pip (<a href="https://github.com/pypa/pip/blob/25.1.1/NEWS.rst">25.1.1</a> (includes <a href="https://github.com/pypa/pip/blob/25.0/NEWS.rst">25.0</a>, <a href="https://github.com/pypa/pip/blob/25.0.1/NEWS.rst">25.0.1</a>, <a href="https://github.com/pypa/pip/blob/25.1/NEWS.rst">25.1</a>))</li>
<li>sysext-python: platformdirs (<a href="https://github.com/tox-dev/platformdirs/releases/tag/4.3.8">4.3.8</a> (includes <a href="https://github.com/tox-dev/platformdirs/releases/tag/4.3.7">4.3.7</a>))</li>
<li>sysext-python: pygments (<a href="https://pygments.org/docs/changelog/#version-2-19-2">2.19.2</a>)</li>
<li>sysext-python: requests (<a href="https://github.com/psf/requests/releases/tag/v2.32.4">2.32.4</a> (includes <a href="https://github.com/psf/requests/releases/tag/v2.32.3">2.32.3</a>))</li>
<li>sysext-python: resolvelib (<a href="https://github.com/sarugaku/resolvelib/blob/main/CHANGELOG.rst#120-2025-06-26">1.2.0</a>)</li>
<li>sysext-python: rich (<a href="https://github.com/Textualize/rich/releases/tag/v14.1.0">14.1.0</a> (includes <a href="https://github.com/Textualize/rich/releases/tag/v14.0.0">14.0.0</a>))</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/releases/tag/v80.9.0">80.9.0</a> (includes <a href="https://github.com/pypa/setuptools/blob/v75.7.0/NEWS.rst#v7570">75.7.0</a>, <a href="https://github.com/pypa/setuptools/blob/v75.8.0/NEWS.rst#v7580">75.8.0</a>, <a href="https://github.com/pypa/setuptools/blob/v75.8.1/NEWS.rst">75.8.1</a>, <a href="https://github.com/pypa/setuptools/blob/v75.8.2/NEWS.rst">75.8.2</a>, <a href="https://github.com/pypa/setuptools/blob/v76.0.0/NEWS.rst">76.0.0</a>, <a href="https://github.com/pypa/setuptools/blob/v76.1.0/NEWS.rst">76.1.0</a>, <a href="https://github.com/pypa/setuptools/blob/v77.0.0/NEWS.rst">77.0.0</a>, <a href="https://github.com/pypa/setuptools/blob/v77.0.1/NEWS.rst">77.0.1</a>, <a href="https://github.com/pypa/setuptools/blob/v77.0.2/NEWS.rst">77.0.2</a>, <a href="https://github.com/pypa/setuptools/blob/v77.0.3/NEWS.rst">77.0.3</a>, <a href="https://github.com/pypa/setuptools/blob/v78.0.0/NEWS.rst">78.0.0</a>, <a href="https://github.com/pypa/setuptools/blob/v78.0.1/NEWS.rst">78.0.1</a>, <a href="https://github.com/pypa/setuptools/blob/v78.0.2/NEWS.rst">78.0.2</a>, <a href="https://github.com/pypa/setuptools/blob/v78.1.0/NEWS.rst">78.1.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v79.0.0">79.0.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.0.0">80.0.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.1.0">80.1.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.2.0">80.2.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.3.0">80.3.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.4.0">80.4.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.6.0">80.6.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.7.0">80.7.0</a>, <a href="https://github.com/pypa/setuptools/releases/tag/v80.8.0">80.8.0</a>))</li>
<li>sysext-python: setuptools-scm (<a href="https://github.com/pypa/setuptools-scm/releases/tag/v8.3.1">8.3.1</a> (includes <a href="https://github.com/pypa/setuptools-scm/blob/v8.2.0/CHANGELOG.md">8.2.0</a>, <a href="https://github.com/pypa/setuptools-scm/blob/v8.2.1/CHANGELOG.md">8.2.1</a>, <a href="https://github.com/pypa/setuptools-scm/releases/tag/v8.3.0">8.3.0</a>))</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.8.26.11">2025.8.26.11</a> (includes <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.3.3.18">2025.3.3.18</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.3.19.19">2025.3.19.19</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.4.11.15">2025.4.11.15</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.4.28.22">2025.4.28.22</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.5.1.12">2025.5.1.12</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.5.7.19">2025.5.7.19</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.5.8.13">2025.5.8.13</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.5.8.15">2025.5.8.15</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.5.9.12">2025.5.9.12</a>, <a href="https://github.com/pypa/trove-classifiers/releases/tag/2025.8.6.13">2025.8.6.13</a>))</li>
<li>sysext-python: truststore (<a href="https://raw.githubusercontent.com/sethmlarson/truststore/refs/tags/v0.10.4/CHANGELOG.md">0.10.4</a> (includes <a href="https://github.com/sethmlarson/truststore/blob/v0.10.1/CHANGELOG.md">0.10.1</a>))</li>
<li>sysext-python: typing-extensions (<a href="https://github.com/python/typing_extensions/releases/tag/4.14.1">4.14.1</a> (includes <a href="https://github.com/python/typing_extensions/releases/tag/4.13.0">4.13.0</a>, <a href="https://github.com/python/typing_extensions/releases/tag/4.13.1">4.13.1</a>, <a href="https://github.com/python/typing_extensions/releases/tag/4.13.2">4.13.2</a>, <a href="https://github.com/python/typing_extensions/releases/tag/4.14.0">4.14.0</a>))</li>
<li>sysext-python: urllib3 (<a href="https://github.com/urllib3/urllib3/releases/tag/2.5.0">2.5.0</a> (includes <a href="https://github.com/urllib3/urllib3/releases/tag/2.4.0">2.4.0</a>))</li>
<li>sysext-python: wheel (<a href="https://github.com/pypa/wheel/releases/tag/0.46.1">0.46.1</a> (includes <a href="https://github.com/pypa/wheel/releases/tag/0.46.0">0.46.0</a>))</li>
<li>sysext-zfs: zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.3.2">2.3.2</a> (includes <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.3.0">2.3.0</a>, <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.3.1">2.3.1</a>))</li>
<li>userspace-rcu (<a href="https://lkml.org/lkml/2025/5/14/1580">0.15.3</a>)</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/blob/master/Documentation/releases/v2.41-ReleaseNotes">2.41.1</a>)</li>
<li>vmware: libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.43">1.1.43</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.40">1.1.40</a>, <a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.41">1.1.41</a>, <a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.42">1.1.42</a>))</li>
<li>vmware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-13.0.0">13.0.0</a>)</li>
<li>vmware: xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.7">1.3.7</a> (includes <a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.6">1.3.6</a>))</li>
<li>xfsprogs (<a href="https://lkml.org/lkml/2025/4/14/1443">6.14.0</a>)</li>
<li>zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.3.3">2.3.3</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 4459.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40109">CVE-2025-40109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40107">CVE-2025-40107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40028">CVE-2025-40028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40027">CVE-2025-40027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40026">CVE-2025-40026</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40000">CVE-2025-40000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39995">CVE-2025-39995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40052">CVE-2025-40052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40061">CVE-2025-40061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40060">CVE-2025-40060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40059">CVE-2025-40059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40058">CVE-2025-40058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40057">CVE-2025-40057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40056">CVE-2025-40056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40055">CVE-2025-40055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40081">CVE-2025-40081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40080">CVE-2025-40080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40079">CVE-2025-40079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40078">CVE-2025-40078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40071">CVE-2025-40071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40070">CVE-2025-40070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40068">CVE-2025-40068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40067">CVE-2025-40067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40062">CVE-2025-40062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40053">CVE-2025-40053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40029">CVE-2025-40029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40038">CVE-2025-40038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40037">CVE-2025-40037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40036">CVE-2025-40036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40035">CVE-2025-40035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40033">CVE-2025-40033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40051">CVE-2025-40051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40049">CVE-2025-40049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40031">CVE-2025-40031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40048">CVE-2025-40048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40047">CVE-2025-40047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40045">CVE-2025-40045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40043">CVE-2025-40043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40039">CVE-2025-40039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40030">CVE-2025-40030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40004">CVE-2025-40004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40032">CVE-2025-40032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40042">CVE-2025-40042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40019">CVE-2025-40019</a>)</li>
<li>sysext-containerd: containerd (<a href="https://www.cve.org/CVERecord?id=CVE-2024-25621">CVE-2024-25621</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-64329">CVE-2025-64329</a>)</li>
<li>sysext-containerd: runc (<a href="https://www.cve.org/CVERecord?id=CVE-2025-31133">CVE-2025-31133</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-52565">CVE-2025-52565</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-52881">CVE-2025-52881</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Enabled <code>CONFIG_MEMCG_V1</code> to mitigate cgroupsv1 removal (e.g JVM) (<a href="https://github.com/flatcar/Flatcar/issues/1884">Flatcar#1884</a>)</li>
<li>Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them (<a href="https://github.com/flatcar/Flatcar/issues/1933">Flatcar#1933</a>)</li>
<li>Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by switching back to built-in extra firmware instead of early cpio inclusion (<a href="https://github.com/flatcar/Flatcar/issues/1909">Flatcar#1909</a>)</li>
<li>Fixed that the needed Flatcar extensions don't get removed on update which caused a re-download (<a href="https://github.com/flatcar/update_engine/pull/51">update_engine#51</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Scaleway: The Linux console is now attached to the correct console port. (<a href="https://github.com/flatcar/scripts/pull/3383">scripts#3383</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.54">6.12.54</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.53">6.12.53</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.52">6.12.52</a>))</li>
<li>sysext-containerd: containerd (<a href="https://github.com/containerd/containerd/releases/tag/v2.0.7">2.0.7</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v2.0.6">2.0.6</a>))</li>
<li>sysext-containerd: runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.3.3">1.3.3</a> (includes <a href="https://github.com/opencontainers/runc/releases/tag/v1.3.2">1.3.2</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.3.1">1.3.1</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.3.0">1.3.0</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 2.0.7</li>
<li>docker 28.0.4</li>
<li>ignition 2.22.0</li>
<li>kernel 6.12.54</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4459.2.0"/>
    <published>2025-11-12T15:00:55+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4230.2.4</id>
    <title>4230.2.4</title>
    <updated>2026-03-09T16:26:32.504282+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4230.2.3</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39923">CVE-2025-39923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39913">CVE-2025-39913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39911">CVE-2025-39911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39909">CVE-2025-39909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39907">CVE-2025-39907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39916">CVE-2025-39916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39914">CVE-2025-39914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39885">CVE-2025-39885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39886">CVE-2025-39886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39876">CVE-2025-39876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39873">CVE-2025-39873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39871">CVE-2025-39871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39870">CVE-2025-39870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39869">CVE-2025-39869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39883">CVE-2025-39883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39882">CVE-2025-39882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39881">CVE-2025-39881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39880">CVE-2025-39880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39877">CVE-2025-39877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39961">CVE-2025-39961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39957">CVE-2025-39957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39938">CVE-2025-39938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39937">CVE-2025-39937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39934">CVE-2025-39934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39953">CVE-2025-39953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39952">CVE-2025-39952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39951">CVE-2025-39951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39949">CVE-2025-39949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39947">CVE-2025-39947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39946">CVE-2025-39946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945">CVE-2025-39945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39944">CVE-2025-39944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39943">CVE-2025-39943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39942">CVE-2025-39942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39929">CVE-2025-39929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39931">CVE-2025-39931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52435">CVE-2023-52435</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance (<a href="https://github.com/flatcar/Flatcar/issues/1901">Flatcar#1901</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Scaleway: SSH keys are now fetched <em>via</em> Afterburn (<a href="https://github.com/flatcar/scripts/pull/3277">scripts#3277</a>)</li>
<li>Scaleway: The hostname is now set <em>via</em> Afterburn (<a href="https://github.com/flatcar/scripts/pull/3277">scripts#3277</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.110">6.6.110</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.107">6.6.107</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.108">6.6.108</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.109">6.6.109</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html">3.117</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html">3.116</a>))</li>
<li>open-iscsi (<a href="https://raw.githubusercontent.com/open-iscsi/open-iscsi/refs/tags/2.1.11/Changelog">2.1.11</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.3.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.110</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4230.2.4"/>
    <published>2025-10-14T12:35:04+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4230.2.3</id>
    <title>4230.2.3</title>
    <updated>2026-03-09T16:26:32.486276+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4230.2.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39726">CVE-2025-39726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38670">CVE-2025-38670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38668">CVE-2025-38668</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38666">CVE-2025-38666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38665">CVE-2025-38665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38663">CVE-2025-38663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38671">CVE-2025-38671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38552">CVE-2025-38552</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38520">CVE-2025-38520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39734">CVE-2025-39734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39731">CVE-2025-39731</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38650">CVE-2025-38650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38648">CVE-2025-38648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38646">CVE-2025-38646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38645">CVE-2025-38645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38653">CVE-2025-38653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38652">CVE-2025-38652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38626">CVE-2025-38626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38625">CVE-2025-38625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38624">CVE-2025-38624</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38623">CVE-2025-38623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38622">CVE-2025-38622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38640">CVE-2025-38640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38639">CVE-2025-38639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38635">CVE-2025-38635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38634">CVE-2025-38634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38632">CVE-2025-38632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38630">CVE-2025-38630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38611">CVE-2025-38611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38615">CVE-2025-38615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38612">CVE-2025-38612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38577">CVE-2025-38577</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38583">CVE-2025-38583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38581">CVE-2025-38581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38610">CVE-2025-38610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38609">CVE-2025-38609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38604">CVE-2025-38604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38602">CVE-2025-38602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38601">CVE-2025-38601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38579">CVE-2025-38579</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38590">CVE-2025-38590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38588">CVE-2025-38588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38587">CVE-2025-38587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38578">CVE-2025-38578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38562">CVE-2025-38562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38561">CVE-2025-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38576">CVE-2025-38576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38574">CVE-2025-38574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38569">CVE-2025-38569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38501">CVE-2025-38501</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39798">CVE-2025-39798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39795">CVE-2025-39795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39794">CVE-2025-39794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39773">CVE-2025-39773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39772">CVE-2025-39772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39770">CVE-2025-39770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39788">CVE-2025-39788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39787">CVE-2025-39787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39767">CVE-2025-39767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39783">CVE-2025-39783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39782">CVE-2025-39782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39781">CVE-2025-39781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39776">CVE-2025-39776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39766">CVE-2025-39766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39750">CVE-2025-39750</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39759">CVE-2025-39759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39758">CVE-2025-39758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39756">CVE-2025-39756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39753">CVE-2025-39753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39752">CVE-2025-39752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39763">CVE-2025-39763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39744">CVE-2025-39744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39743">CVE-2025-39743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39739">CVE-2025-39739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39738">CVE-2025-39738</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39749">CVE-2025-39749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39736">CVE-2025-39736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39737">CVE-2025-39737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39711">CVE-2025-39711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39720">CVE-2025-39720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39719">CVE-2025-39719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39716">CVE-2025-39716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39715">CVE-2025-39715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39714">CVE-2025-39714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39713">CVE-2025-39713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39724">CVE-2025-39724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39721">CVE-2025-39721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39675">CVE-2025-39675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39673">CVE-2025-39673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39710">CVE-2025-39710</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39709">CVE-2025-39709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38735">CVE-2025-38735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39706">CVE-2025-39706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39701">CVE-2025-39701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39693">CVE-2025-39693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39692">CVE-2025-39692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39689">CVE-2025-39689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39687">CVE-2025-39687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39686">CVE-2025-39686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39685">CVE-2025-39685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39684">CVE-2025-39684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39683">CVE-2025-39683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39681">CVE-2025-39681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39679">CVE-2025-39679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39676">CVE-2025-39676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38732">CVE-2025-38732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38727">CVE-2025-38727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38728">CVE-2025-38728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38694">CVE-2025-38694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38702">CVE-2025-38702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38701">CVE-2025-38701</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38700">CVE-2025-38700</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38699">CVE-2025-38699</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38698">CVE-2025-38698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38725">CVE-2025-38725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38697">CVE-2025-38697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38723">CVE-2025-38723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38721">CVE-2025-38721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38716">CVE-2025-38716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38715">CVE-2025-38715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38714">CVE-2025-38714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38696">CVE-2025-38696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38713">CVE-2025-38713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38712">CVE-2025-38712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38711">CVE-2025-38711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38709">CVE-2025-38709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38708">CVE-2025-38708</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38707">CVE-2025-38707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38695">CVE-2025-38695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38688">CVE-2025-38688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38687">CVE-2025-38687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38683">CVE-2025-38683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38681">CVE-2025-38681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38693">CVE-2025-38693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38692">CVE-2025-38692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38691">CVE-2025-38691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38679">CVE-2025-38679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38680">CVE-2025-38680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38677">CVE-2025-38677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.106">6.6.106</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.105">6.6.105</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.104">6.6.104</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.103">6.6.103</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.102">6.6.102</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.101">6.6.101</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115_1.html">3.115.1</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115.html">3.115</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.3.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.106</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4230.2.3"/>
    <published>2025-09-15T14:02:36+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4230.2.2</id>
    <title>4230.2.2</title>
    <updated>2026-03-09T16:26:32.477620+00:00</updated>
    <content type="html"><![CDATA[<p>Changes since <strong>Stable 4230.2.1</strong></p>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.100">6.6.100</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.99">6.6.99</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.98">6.6.98</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.97">6.6.97</a>, <a href="https://lwn.net/Articles/1028829/">6.6.96</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html">3.114</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html">3.113.1</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.3.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.100</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4230.2.2"/>
    <published>2025-08-19T13:10:04+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4230.2.1</id>
    <title>4230.2.1</title>
    <updated>2026-03-09T16:26:32.470515+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4230.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38219">CVE-2025-38219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38218">CVE-2025-38218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38217">CVE-2025-38217</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38215">CVE-2025-38215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38214">CVE-2025-38214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38231">CVE-2025-38231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38212">CVE-2025-38212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38229">CVE-2025-38229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38227">CVE-2025-38227</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38226">CVE-2025-38226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38225">CVE-2025-38225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38222">CVE-2025-38222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38220">CVE-2025-38220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38185">CVE-2025-38185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38183">CVE-2025-38183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38182">CVE-2025-38182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38208">CVE-2025-38208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38202">CVE-2025-38202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38198">CVE-2025-38198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38197">CVE-2025-38197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38195">CVE-2025-38195</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38194">CVE-2025-38194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38193">CVE-2025-38193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38192">CVE-2025-38192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38191">CVE-2025-38191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38190">CVE-2025-38190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38090">CVE-2025-38090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38089">CVE-2025-38089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38087">CVE-2025-38087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38086">CVE-2025-38086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085</a>)</li>
<li>sudo (<a href="https://www.cve.org/CVERecord?id=CVE-2025-32462">CVE-2025-32462</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2025-32463">CVE-2025-32463</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added STACKIT images (<a href="https://github.com/flatcar/scripts/pull/3018">flatcar/scripts#3018</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/1027279/">6.6.95</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html">3.113</a>)</li>
<li>sudo (<a href="https://www.sudo.ws/releases/stable/#1.9.17p1">1.9.17p1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.3.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.95</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4230.2.1"/>
    <published>2025-07-08T15:20:47+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4230.2.0</id>
    <title>4230.2.0</title>
    <updated>2026-03-09T16:26:32.432375+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4152.2.3</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37989">CVE-2025-37989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37988">CVE-2025-37988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37985">CVE-2025-37985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37983">CVE-2025-37983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37938">CVE-2025-37938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37885">CVE-2025-37885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37884">CVE-2025-37884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37883">CVE-2025-37883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37881">CVE-2025-37881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37879">CVE-2025-37879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37878">CVE-2025-37878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37887">CVE-2025-37887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37886">CVE-2025-37886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37836">CVE-2025-37836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37831">CVE-2025-37831</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37830">CVE-2025-37830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37829">CVE-2025-37829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37828">CVE-2025-37828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37824">CVE-2025-37824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37808">CVE-2025-37808</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37805">CVE-2025-37805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37804">CVE-2025-37804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37803">CVE-2025-37803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37820">CVE-2025-37820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37819">CVE-2025-37819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37818">CVE-2025-37818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37817">CVE-2025-37817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37815">CVE-2025-37815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37813">CVE-2025-37813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37812">CVE-2025-37812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37811">CVE-2025-37811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37810">CVE-2025-37810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37800">CVE-2025-37800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37801">CVE-2025-37801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37799">CVE-2025-37799</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37990">CVE-2025-37990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37991">CVE-2025-37991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37917">CVE-2025-37917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37927">CVE-2025-37927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37924">CVE-2025-37924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37923">CVE-2025-37923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37922">CVE-2025-37922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37921">CVE-2025-37921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37936">CVE-2025-37936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37935">CVE-2025-37935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37933">CVE-2025-37933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37932">CVE-2025-37932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37930">CVE-2025-37930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37929">CVE-2025-37929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37928">CVE-2025-37928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37918">CVE-2025-37918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37903">CVE-2025-37903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37901">CVE-2025-37901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37897">CVE-2025-37897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37916">CVE-2025-37916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37915">CVE-2025-37915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37914">CVE-2025-37914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37913">CVE-2025-37913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37912">CVE-2025-37912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37911">CVE-2025-37911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37909">CVE-2025-37909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37905">CVE-2025-37905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37891">CVE-2025-37891</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37998">CVE-2025-37998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37997">CVE-2025-37997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37995">CVE-2025-37995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37994">CVE-2025-37994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37973">CVE-2025-37973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37972">CVE-2025-37972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37970">CVE-2025-37970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37969">CVE-2025-37969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37964">CVE-2025-37964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37963">CVE-2025-37963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37962">CVE-2025-37962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37961">CVE-2025-37961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37959">CVE-2025-37959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37954">CVE-2025-37954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37953">CVE-2025-37953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37952">CVE-2025-37952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37951">CVE-2025-37951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37949">CVE-2025-37949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37948">CVE-2025-37948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37956">CVE-2025-37956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37947">CVE-2025-37947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38015">CVE-2025-38015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38014">CVE-2025-38014</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38013">CVE-2025-38013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38010">CVE-2025-38010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38009">CVE-2025-38009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38027">CVE-2025-38027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38008">CVE-2025-38008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38024">CVE-2025-38024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38023">CVE-2025-38023</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38020">CVE-2025-38020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38019">CVE-2025-38019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38018">CVE-2025-38018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38007">CVE-2025-38007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38006">CVE-2025-38006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38005">CVE-2025-38005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37992">CVE-2025-37992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38061">CVE-2025-38061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38059">CVE-2025-38059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38058">CVE-2025-38058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38081">CVE-2025-38081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38080">CVE-2025-38080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38078">CVE-2025-38078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38077">CVE-2025-38077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38074">CVE-2025-38074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38072">CVE-2025-38072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38071">CVE-2025-38071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38068">CVE-2025-38068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38066">CVE-2025-38066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38065">CVE-2025-38065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38063">CVE-2025-38063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38062">CVE-2025-38062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38037">CVE-2025-38037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38035">CVE-2025-38035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38034">CVE-2025-38034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38051">CVE-2025-38051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38031">CVE-2025-38031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38048">CVE-2025-38048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38046">CVE-2025-38046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38045">CVE-2025-38045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38044">CVE-2025-38044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38043">CVE-2025-38043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38040">CVE-2025-38040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38039">CVE-2025-38039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38030">CVE-2025-38030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38003">CVE-2025-38003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38004">CVE-2025-38004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38001">CVE-2025-38001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38083">CVE-2025-38083</a>)</li>
<li>containers-storage, podman (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-11053">CVE-2024-11053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9681">CVE-2024-9681</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602</a>)</li>
<li>sssd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3758">CVE-2023-3758</a>)</li>
<li>wget (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10524">CVE-2024-10524</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed PXE boot failures that arose since upgrading to systemd v256. Users were dumped to an emergency shell. (<a href="https://github.com/flatcar/bootengine/pull/103">flatcar/bootengine#103</a>)</li>
<li>Fixed creating netdev arguments to correctly include commas when no port forwards are passed (<a href="https://github.com/flatcar/scripts/pull/2581">flatcar/scripts#2581</a>)</li>
<li>The kernel module build directory now contains native binaries in arm64 images instead of the previous amd64 binaries (<a href="https://github.com/flatcar/scripts/pull/2694">scripts#2694</a>)</li>
<li>Nvidia driver installer service now supports the 570 driver branch by forcing the use of the proprietary kernel module. The 570 branch defaults to the kernel-open driver which requires loading firmware, which is not yet supported on Flatcar. (<a href="https://github.com/flatcar/scripts/pull/2694">scripts#2694</a>)</li>
<li>Added back some BCC tools (<a href="https://github.com/flatcar/scripts/pull/2900">scripts#2900</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added support for ARM64 architecture in the NVIDIA driver installer service (<a href="https://github.com/flatcar/scripts/pull/2694">scripts#2694</a>)</li>
<li>Added support for multiple port forwarding parameters in the QEMU startup script. Users can now specify multiple port forwards using the <code>-f</code> option. (<a href="https://github.com/flatcar/scripts/pull/2575">flatcar/scripts#2575</a>)</li>
<li>Additional GRUB modules are no longer installed for UEFI platforms to save space and also because they cannot be loaded with Secure Boot enabled. This does not affect existing installations.</li>
<li>The GRUB modules on non-UEFI platforms are now compressed with xz rather than gzip to save even more space. This does not affect existing installations.</li>
<li>The VFIO kernel modules are now also available in ARM64 builds. (<a href="https://github.com/flatcar/scripts/pull/2484">flatcar/scripts#2484</a>)</li>
<li>Enabled the gtp kernel module. This is the GPRS Tunneling Protocol datapath for usage in telecoms scenarios. (<a href="https://github.com/flatcar/scripts/pull/2504">flatcar/scripts#2504</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>AMD64: nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-230-02/index.html">535.230.02</a>)</li>
<li>ARM64: nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-86-15/index.html">570.86.15</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.22.11">1.22.11</a> (includes <a href="https://go.dev/doc/devel/release#go1.22.10">1.22.10</a>))</li>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.94">6.6.94</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.93">6.6.93</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.92">6.6.92</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.91">6.6.91</a>, <a href="https://lwn.net/Articles/1020659/">6.6.90</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.89">6.6.89</a>,<a href="https://lwn.net/Articles/1001732">6.6.65</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250109">20250109</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241210">20241210</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241110">20241110</a>))</li>
<li>SDK: autoconf (<a href="https://lists.gnu.org/archive/html/autotools-announce/2023-12/msg00003.html">2.72</a>)</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.30/release/3.30.html#id5">3.30.5</a>)</li>
<li>SDK: libpng (<a href="https://github.com/pnggroup/libpng/blob/v1.6.44/CHANGES#L6199">1.6.44</a>)</li>
<li>SDK: perf (<a href="https://kernelnewbies.org/Linux_6.11#Tracing.2C_perf_and_BPF">6.11.7</a>)</li>
<li>SDK: pkgcheck (<a href="https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.32">0.10.32</a>)</li>
<li>SDK: portage (<a href="https://github.com/gentoo/portage/blob/portage-3.0.66.1/NEWS#L9">3.0.66.1</a>)</li>
<li>SDK: qemu (<a href="https://lists.gnu.org/archive/html/qemu-devel/2024-09/msg03900.html">8.2.7</a>)</li>
<li>azure, dev, gce, sysext-python: python (<a href="https://www.python.org/downloads/release/python-31111/">3.11.11_p1</a>)</li>
<li>azure: chrony (<a href="https://gitlab.com/chrony/chrony/-/blob/4.6.1/NEWS">4.6.1</a>)</li>
<li>base, dev: audit (<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.2">4.0.2</a>)</li>
<li>base, dev: azure-vm-utils (<a href="https://github.com/Azure/azure-vm-utils/commits/v0.4.0/">0.4.0</a>)</li>
<li>base, dev: bind (<a href="https://bind9.readthedocs.io/en/v9.18.29/notes.html#notes-for-bind-9-18-29">9.18.29</a>)</li>
<li>base, dev: bpftool (<a href="https://github.com/libbpf/bpftool/releases/tag/v7.5.0">7.5.0</a> (includes <a href="https://github.com/libbpf/bpftool/releases/tag/v7.4.0">7.4.0</a>))</li>
<li>base, dev: btrfs-progs (<a href="https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.12/CHANGES">6.12</a> (includes <a href="https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.11/CHANGES">6.11</a>))</li>
<li>base, dev: c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/v1.34.3">1.34.3</a> (includes <a href="https://github.com/c-ares/c-ares/releases/tag/v1.34.2">1.34.2</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.34.1">1.34.1</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.34.0">1.34.0</a>))</li>
<li>base, dev: checkpolicy (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.10">6.10</a>)</li>
<li>base, dev: expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_4/expat/Changes">2.6.4</a>)</li>
<li>base, dev: gawk (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00008.html">5.3.1</a>)</li>
<li>base, dev: gcc (<a href="https://gcc.gnu.org/gcc-14/changes.html">14.2.1_p20241116</a>)</li>
<li>base, dev: glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.5">2.80.5</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.4">2.80.4</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.3">2.80.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.2">2.80.2</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.1">2.80.1</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.0">2.80.0</a>))</li>
<li>base, dev: gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2024q4/000486.html">2.4.6</a>)</li>
<li>base, dev: hwdata (<a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.390">0.390</a>)</li>
<li>base, dev: intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112">20241112</a> (includes <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241029">20241029</a>))</li>
<li>base, dev: iproute2 (<a href="https://lore.kernel.org/netdev/20241119092743.6a1bdcb7@hermes.local/">6.12.0</a> (includes <a href="https://lore.kernel.org/netdev/20240915201831.164de47e@hermes.local/">6.11.0</a>, <a href="https://lore.kernel.org/netdev/20240717090601.20b2871f@hermes.local/">6.10.0</a>))</li>
<li>base, dev: iputils (<a href="https://github.com/iputils/iputils/releases/tag/20240905">20240905</a>)</li>
<li>base, dev: json-c (<a href="https://github.com/json-c/json-c/blob/json-c-0.18-20240915/ChangeLog">0.18</a>)</li>
<li>base, dev: kexec-tools (<a href="https://github.com/horms/kexec-tools/commits/v2.0.30/">2.0.30</a> (includes <a href="https://github.com/horms/kexec-tools/commits/v2.0.29/">2.0.29</a>))</li>
<li>base, dev: less (<a href="https://www.greenwoodsoftware.com/less/news.668.html">668</a>)</li>
<li>base, dev: libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.7">3.7.7</a>)</li>
<li>base, dev: libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.oq9dsdhihxp5">2.71</a>)</li>
<li>base, dev: libgpg-error (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=75f2b2d220de4e4f53252d3367950ecb2ab85079;hb=b0bb9266010d84b30fa2dc6a2127b7e40dc03660">1.51</a>)</li>
<li>base, dev: libnetfilter_conntrack (<a href="https://lists.netfilter.org/pipermail/netfilter-announce/2024/000260.html">1.1.0</a>)</li>
<li>base, dev: libnftnl (<a href="https://lists.netfilter.org/pipermail/netfilter-announce/2024/000261.html">1.2.8</a>)</li>
<li>base, dev: libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.11.1">1.11.1</a> (includes <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.11">1.11</a>))</li>
<li>base, dev: libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.7">3.7</a>)</li>
<li>base, dev: libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.49.2">1.49.2</a> (includes <a href="https://github.com/libuv/libuv/releases/tag/v1.49.1">1.49.1</a>, <a href="https://github.com/libuv/libuv/releases/tag/v1.49.0">1.49.0</a>))</li>
<li>base, dev: libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.9">2.12.9</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.8">2.12.8</a>))</li>
<li>base, dev: lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.99.4">4.99.4</a>)</li>
<li>base, dev: mokutil (<a href="https://github.com/lcp/mokutil/commits/0.7.2/">0.7.2</a>)</li>
<li>base, dev: npth (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=0f8d78958d8059de95e363a977051995e05dc691;hb=64905e765aad9de6054ef70a97fc30bd992ce999">1.8</a>)</li>
<li>base, dev: nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.11">2.11</a>)</li>
<li>base, dev: openldap (<a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_8/CHANGES">2.6.8</a> (includes <a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_7/CHANGES">2.6.7</a>, <a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_6/CHANGES">2.6.6</a>, <a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_5/CHANGES">2.6.5</a>))</li>
<li>base, dev: pax-utils (<a href="https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.8">1.3.8</a>)</li>
<li>base, dev: sssd (<a href="https://sssd.io/release-notes/sssd-2.9.5.html">2.9.5</a> (includes <a href="https://sssd.io/release-notes/sssd-2.9.4.html">2.9.4</a>, <a href="https://sssd.io/release-notes/sssd-2.9.3.html">2.9.3</a>, <a href="https://sssd.io/release-notes/sssd-2.9.2.html">2.9.2</a>, <a href="https://sssd.io/release-notes/sssd-2.9.1.html">2.9.1</a>, <a href="https://sssd.io/release-notes/sssd-2.9.0.html">2.9.0</a>, <a href="https://sssd.io/release-notes/sssd-2.8.0.html">2.8.0</a>, <a href="https://sssd.io/release-notes/sssd-2.7.0.html">2.7.0</a>, <a href="https://sssd.io/release-notes/sssd-2.6.0.html">2.6.0</a>, <a href="https://sssd.io/release-notes/sssd-2.5.0.html">2.5.0</a>, <a href="https://sssd.io/release-notes/sssd-2.4.0.html">2.4.0</a>))</li>
<li>base, dev: strace (<a href="https://github.com/strace/strace/releases/tag/v6.12">6.12</a> (includes <a href="https://github.com/strace/strace/releases/tag/v6.11">6.11</a>, <a href="https://github.com/strace/strace/releases/tag/v6.10">6.10</a>))</li>
<li>base, dev: usbutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v018">018</a>)</li>
<li>base, dev: util-linux (<a href="https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.2/Documentation/releases/v2.40.2-ReleaseNotes">2.40.2</a> (includes <a href="https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.1/Documentation/releases/v2.40.1-ReleaseNotes">2.40.1</a>, <a href="https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40/Documentation/releases/v2.40-ReleaseNotes">2.40.0</a>))</li>
<li>base, dev: wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-11/msg00000.html">1.25.0</a>)</li>
<li>base, dev: xfsprogs (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.11.0">6.11.0</a> includes (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.10.1">6.10.1</a>, <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.10.0">6.10.0</a>, <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.9.0">6.9.0</a>))</li>
<li>base, dev: xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.6.3">5.6.3</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html">3.112</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html">3.111</a>))</li>
<li>dev: bash-completion (<a href="https://github.com/scop/bash-completion/releases/tag/2.15.0">2.15.0</a>)</li>
<li>dev: binutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-08/msg00001.html">2.43</a>)</li>
<li>dev: gentoolkit (<a href="https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.8">0.6.8</a>)</li>
<li>docker: docker (<a href="https://github.com/moby/moby/releases/tag/v27.3.1">27.3.1</a>)</li>
<li>docker: docker-buildx (<a href="https://github.com/docker/buildx/releases/tag/v0.14.0">0.14.0</a> (includes <a href="https://github.com/docker/buildx/releases/tag/v0.13.0">0.13.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.12.0">0.12.0</a>, <a href="https://github.com/docker/buildx/releases/tag/v0.11.0">0.11.0</a>))</li>
<li>docker: docker-cli (<a href="https://github.com/moby/moby/releases/tag/v27.3.1">27.3.1</a>)</li>
<li>gce: six (<a href="https://github.com/benjaminp/six/blob/1.17.0/CHANGES">1.17.0</a>)</li>
<li>sysext-podman: containers-storage (<a href="https://github.com/containers/storage/releases/tag/v1.55.1">1.55.1</a>)</li>
<li>sysext-podman: gpgme (<a href="https://dev.gnupg.org/T7440">1.24.1</a> (includes <a href="https://dev.gnupg.org/T7376">1.24.0</a>))</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.3.0">5.3.0</a>)</li>
<li>sysext-python: cachecontrol (<a href="https://github.com/psf/cachecontrol/releases/tag/v0.14.1">0.14.1</a>)</li>
<li>sysext-python: charset-normalizer (<a href="https://github.com/jawah/charset_normalizer/releases/tag/3.4.1">3.4.1</a> (includes <a href="https://github.com/jawah/charset_normalizer/releases/tag/3.4.0">3.4.0</a>))</li>
<li>sysext-python: distlib (<a href="https://github.com/pypa/distlib/blob/0.3.9/CHANGES.rst">0.3.9</a>)</li>
<li>sysext-python: jaraco-functools (<a href="https://github.com/jaraco/jaraco.functools/blob/v4.1.0/NEWS.rsto">4.1.0</a>)</li>
<li>sysext-python: packaging (<a href="https://github.com/pypa/packaging/releases/tag/24.2">24.2</a>)</li>
<li>sysext-python: pip (<a href="https://github.com/pypa/pip/blob/24.3.1/NEWS.rst">24.3.1</a> (includes <a href="https://github.com/pypa/pip/blob/24.3/NEWS.rst">24.3</a>)</li>
<li>sysext-python: pyproject-hooks (<a href="https://github.com/pypa/pyproject-hooks/blob/v1.2.0/docs/changelog.rst">1.2.0</a>)</li>
<li>sysext-python: resolvelib (<a href="https://github.com/sarugaku/resolvelib/blob/1.1.0/CHANGELOG.rst">1.1.0</a>)</li>
<li>sysext-python: rich (<a href="https://github.com/Textualize/rich/releases/tag/v13.9.3">13.9.3</a>)</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v75.6.0/NEWS.rst">75.6.0</a> (includes <a href="https://github.com/pypa/setuptools/blob/75.5.0/NEWS.rst">75.5.0</a>, <a href="https://github.com/pypa/setuptools/blob/75.4.0/NEWS.rst">75.4.0</a>, <a href="https://github.com/pypa/setuptools/blob/75.3.0/NEWS.rst">75.3.0</a>, <a href="https://github.com/pypa/setuptools/blob/75.2.0/NEWS.rst">75.2.0</a>, <a href="https://github.com/pypa/setuptools/blob/75.1.1/NEWS.rst">75.1.1</a>, <a href="https://github.com/pypa/setuptools/blob/75.1.0/NEWS.rst">75.1.0</a>, <a href="https://github.com/pypa/setuptools/blob/75.0.0/NEWS.rst">75.0.0</a>))</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/commits/2024.10.21.16/">2024.10.21.16</a>)</li>
<li>sysext-python: truststore (<a href="https://github.com/sethmlarson/truststore/blob/v0.10.0/CHANGELOG.md">0.10.0</a>)</li>
<li>sysext-python: urllib3 (<a href="https://github.com/urllib3/urllib3/releases/tag/2.3.0">2.3.0</a>)</li>
<li>sysext-python: wheel (<a href="https://github.com/pypa/wheel/releases/tag/0.45.1">0.45.1</a> (includes <a href="https://github.com/pypa/wheel/releases/tag/0.45.0">0.45.0</a>))</li>
<li>sysext-zfs: zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.7">2.2.7</a> (includes <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.6">2.2.6</a>))</li>
<li>systemd (<a href="https://github.com/systemd/system/releases/tag/v256.9">256.9</a> (from 255.8))</li>
<li>vmware: libltdl (<a href="https://savannah.gnu.org/news/?id=10693">2.5.4</a> (includes <a href="https://savannah.gnu.org/news/?id=10676">2.5.3</a>, <a href="https://savannah.gnu.org/news/?id=10669">2.5.2</a>, <a href="https://savannah.gnu.org/news/?id=10660">2.5.1</a>, <a href="https://savannah.gnu.org/news/?id=10631">2.5.0</a>))</li>
<li>vmware: libmspack (<a href="https://github.com/kyz/libmspack/commits/v1.11/libmspack">1.11</a>)</li>
<li>vmware: xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.5">1.3.5</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 4230.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37989">CVE-2025-37989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37988">CVE-2025-37988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37985">CVE-2025-37985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37983">CVE-2025-37983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37938">CVE-2025-37938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37885">CVE-2025-37885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37884">CVE-2025-37884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37883">CVE-2025-37883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37881">CVE-2025-37881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37879">CVE-2025-37879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37878">CVE-2025-37878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37887">CVE-2025-37887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37886">CVE-2025-37886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37836">CVE-2025-37836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37831">CVE-2025-37831</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37830">CVE-2025-37830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37829">CVE-2025-37829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37828">CVE-2025-37828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37824">CVE-2025-37824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37808">CVE-2025-37808</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37805">CVE-2025-37805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37804">CVE-2025-37804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37803">CVE-2025-37803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37820">CVE-2025-37820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37819">CVE-2025-37819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37818">CVE-2025-37818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37817">CVE-2025-37817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37815">CVE-2025-37815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37813">CVE-2025-37813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37812">CVE-2025-37812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37811">CVE-2025-37811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37810">CVE-2025-37810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37800">CVE-2025-37800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37801">CVE-2025-37801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37799">CVE-2025-37799</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37990">CVE-2025-37990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37991">CVE-2025-37991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37917">CVE-2025-37917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37927">CVE-2025-37927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37924">CVE-2025-37924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37923">CVE-2025-37923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37922">CVE-2025-37922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37921">CVE-2025-37921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37936">CVE-2025-37936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37935">CVE-2025-37935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37933">CVE-2025-37933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37932">CVE-2025-37932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37930">CVE-2025-37930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37929">CVE-2025-37929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37928">CVE-2025-37928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37918">CVE-2025-37918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37903">CVE-2025-37903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37901">CVE-2025-37901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37897">CVE-2025-37897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37916">CVE-2025-37916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37915">CVE-2025-37915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37914">CVE-2025-37914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37913">CVE-2025-37913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37912">CVE-2025-37912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37911">CVE-2025-37911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37909">CVE-2025-37909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37905">CVE-2025-37905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37891">CVE-2025-37891</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37998">CVE-2025-37998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37997">CVE-2025-37997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37995">CVE-2025-37995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37994">CVE-2025-37994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37973">CVE-2025-37973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37972">CVE-2025-37972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37970">CVE-2025-37970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37969">CVE-2025-37969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37964">CVE-2025-37964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37963">CVE-2025-37963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37962">CVE-2025-37962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37961">CVE-2025-37961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37959">CVE-2025-37959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37954">CVE-2025-37954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37953">CVE-2025-37953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37952">CVE-2025-37952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37951">CVE-2025-37951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37949">CVE-2025-37949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37948">CVE-2025-37948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37956">CVE-2025-37956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37947">CVE-2025-37947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38015">CVE-2025-38015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38014">CVE-2025-38014</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38013">CVE-2025-38013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38010">CVE-2025-38010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38009">CVE-2025-38009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38027">CVE-2025-38027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38008">CVE-2025-38008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38024">CVE-2025-38024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38023">CVE-2025-38023</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38020">CVE-2025-38020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38019">CVE-2025-38019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38018">CVE-2025-38018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38007">CVE-2025-38007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38006">CVE-2025-38006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38005">CVE-2025-38005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37992">CVE-2025-37992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38061">CVE-2025-38061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38059">CVE-2025-38059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38058">CVE-2025-38058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38081">CVE-2025-38081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38080">CVE-2025-38080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38078">CVE-2025-38078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38077">CVE-2025-38077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38074">CVE-2025-38074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38072">CVE-2025-38072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38071">CVE-2025-38071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38068">CVE-2025-38068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38066">CVE-2025-38066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38065">CVE-2025-38065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38063">CVE-2025-38063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38062">CVE-2025-38062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38037">CVE-2025-38037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38035">CVE-2025-38035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38034">CVE-2025-38034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38051">CVE-2025-38051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38031">CVE-2025-38031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38048">CVE-2025-38048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38046">CVE-2025-38046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38045">CVE-2025-38045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38044">CVE-2025-38044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38043">CVE-2025-38043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38040">CVE-2025-38040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38039">CVE-2025-38039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38030">CVE-2025-38030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38003">CVE-2025-38003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38004">CVE-2025-38004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38001">CVE-2025-38001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38083">CVE-2025-38083</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added back some BCC tools (<a href="https://github.com/flatcar/scripts/pull/2900">scripts#2900</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.94">6.6.94</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.93">6.6.93</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.92">6.6.92</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.91">6.6.91</a>, <a href="https://lwn.net/Articles/1020659/">6.6.90</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.89">6.6.89</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html">3.112</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html">3.111</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.3.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.94</li>
<li>systemd 256</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4230.2.0"/>
    <published>2025-06-24T11:58:22+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4152.2.3</id>
    <title>4152.2.3</title>
    <updated>2026-03-09T16:26:32.407908+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4152.2.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21993">CVE-2025-21993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21992">CVE-2025-21992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21991">CVE-2025-21991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21967">CVE-2025-21967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21975">CVE-2025-21975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21971">CVE-2025-21971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21970">CVE-2025-21970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21969">CVE-2025-21969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21986">CVE-2025-21986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21981">CVE-2025-21981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21980">CVE-2025-21980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21979">CVE-2025-21979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21978">CVE-2025-21978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21968">CVE-2025-21968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21962">CVE-2025-21962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21960">CVE-2025-21960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21959">CVE-2025-21959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21957">CVE-2025-21957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21956">CVE-2025-21956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21955">CVE-2025-21955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21966">CVE-2025-21966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21964">CVE-2025-21964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21963">CVE-2025-21963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22015">CVE-2025-22015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22014">CVE-2025-22014</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22013">CVE-2025-22013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22010">CVE-2025-22010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22008">CVE-2025-22008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22009">CVE-2025-22009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22003">CVE-2025-22003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22001">CVE-2025-22001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21999">CVE-2025-21999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21997">CVE-2025-21997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22007">CVE-2025-22007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22005">CVE-2025-22005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21995">CVE-2025-21995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21996">CVE-2025-21996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21994">CVE-2025-21994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22021">CVE-2025-22021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22018">CVE-2025-22018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38575">CVE-2025-38575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38240">CVE-2025-38240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38152">CVE-2025-38152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37893">CVE-2025-37893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39735">CVE-2025-39735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39728">CVE-2025-39728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-38637">CVE-2025-38637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23138">CVE-2025-23138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23136">CVE-2025-23136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22066">CVE-2025-22066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22075">CVE-2025-22075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22074">CVE-2025-22074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22073">CVE-2025-22073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22072">CVE-2025-22072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22071">CVE-2025-22071</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22095">CVE-2025-22095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22093">CVE-2025-22093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22090">CVE-2025-22090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22089">CVE-2025-22089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22088">CVE-2025-22088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22086">CVE-2025-22086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22083">CVE-2025-22083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22081">CVE-2025-22081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22080">CVE-2025-22080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22079">CVE-2025-22079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22077">CVE-2025-22077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22033">CVE-2025-22033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22042">CVE-2025-22042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22041">CVE-2025-22041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22040">CVE-2025-22040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22038">CVE-2025-22038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22064">CVE-2025-22064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22063">CVE-2025-22063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22060">CVE-2025-22060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22058">CVE-2025-22058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22057">CVE-2025-22057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22054">CVE-2025-22054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22053">CVE-2025-22053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22035">CVE-2025-22035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22050">CVE-2025-22050</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22049">CVE-2025-22049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22048">CVE-2025-22048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22047">CVE-2025-22047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22045">CVE-2025-22045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22044">CVE-2025-22044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22043">CVE-2025-22043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22027">CVE-2025-22027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22025">CVE-2025-22025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22029">CVE-2025-22029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-53034">CVE-2023-53034</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.88">6.6.88</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.87">6.6.87</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.86">6.6.86</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.85">6.6.85</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.84">6.6.84</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html">3.110</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.2.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.88</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4152.2.3"/>
    <published>2025-05-06T11:36:04+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4152.2.2</id>
    <title>4152.2.2</title>
    <updated>2026-03-09T16:26:32.396793+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4152.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21835">CVE-2025-21835</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21836">CVE-2025-21836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58086">CVE-2024-58086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21823">CVE-2025-21823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21821">CVE-2025-21821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21787">CVE-2025-21787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21784">CVE-2025-21784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21782">CVE-2025-21782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21783">CVE-2025-21783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21781">CVE-2025-21781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21780">CVE-2025-21780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21796">CVE-2025-21796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21795">CVE-2025-21795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21794">CVE-2025-21794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21793">CVE-2025-21793</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21792">CVE-2025-21792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21790">CVE-2025-21790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21789">CVE-2025-21789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21779">CVE-2025-21779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58020">CVE-2024-58020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57834">CVE-2024-57834</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54458">CVE-2024-54458</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54456">CVE-2024-54456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21776">CVE-2025-21776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21775">CVE-2025-21775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21772">CVE-2025-21772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21773">CVE-2025-21773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21767">CVE-2025-21767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21766">CVE-2025-21766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21763">CVE-2025-21763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21761">CVE-2025-21761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21762">CVE-2025-21762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21760">CVE-2025-21760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21759">CVE-2025-21759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21758">CVE-2025-21758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21704">CVE-2025-21704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21848">CVE-2025-21848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21847">CVE-2025-21847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21846">CVE-2025-21846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21866">CVE-2025-21866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21865">CVE-2025-21865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21864">CVE-2025-21864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21863">CVE-2025-21863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21862">CVE-2025-21862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21844">CVE-2025-21844</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21859">CVE-2025-21859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21858">CVE-2025-21858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21857">CVE-2025-21857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21856">CVE-2025-21856</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21855">CVE-2025-21855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21854">CVE-2025-21854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21853">CVE-2025-21853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-58088">CVE-2024-58088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-21838">CVE-2025-21838</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>azure: Fix issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning (<a href="https://github.com/flatcar/Flatcar/issues/1661">flatcar/Flatcar#1661</a>)</li>
<li>Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. (<a href="https://github.com/flatcar/scripts/pull/2667">flatcar/scripts#2667</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added new image signing pub key to <code>flatcar-install</code>, needed for download verification of releases built from March 2025 onwards, if you have copies of <code>flatcar-install</code> or the image signing pub key, you need to update them as well (<a href="https://github.com/flatcar/init/pull/129">init#129</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83">6.6.83</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79">6.6.79</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80">6.6.80</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81">6.6.81</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82">6.6.82</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html">3.109</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.2.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.83</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4152.2.2"/>
    <published>2025-03-20T14:06:36+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4152.2.1</id>
    <title>4152.2.1</title>
    <updated>2026-03-09T16:26:32.390815+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4152.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-26466">CVE-2025-26466</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>openssh(9.8_p1-r4)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.2.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.74</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4152.2.1"/>
    <published>2025-02-18T15:12:44+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4152.2.0</id>
    <title>4152.2.0</title>
    <updated>2026-03-09T16:26:32.350283+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4081.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23128">CVE-2025-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23125">CVE-2025-23125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48875">CVE-2024-48875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41935">CVE-2024-41935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56785">CVE-2024-56785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56781">CVE-2024-56781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56628">CVE-2024-56628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56627">CVE-2024-56627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56626">CVE-2024-56626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56613">CVE-2024-56613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56586">CVE-2024-56586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56585">CVE-2024-56585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56597">CVE-2024-56597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56596">CVE-2024-56596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56595">CVE-2024-56595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56565">CVE-2024-56565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53196">CVE-2024-53196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53687">CVE-2024-53687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53690">CVE-2024-53690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56766">CVE-2024-56766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56765">CVE-2024-56765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56763">CVE-2024-56763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56762">CVE-2024-56762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56769">CVE-2024-56769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56767">CVE-2024-56767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8096">CVE-2024-8096</a>)</li>
<li>etcd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32082">CVE-2023-32082</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42667">CVE-2023-42667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-49141">CVE-2023-49141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24980">CVE-2024-24980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25939">CVE-2024-25939</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26256">CVE-2024-26256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48957">CVE-2024-48957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48958">CVE-2024-48958</a>)</li>
<li>libpcap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-7256">CVE-2023-7256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8006">CVE-2024-8006</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31022">CVE-2023-31022</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0074">CVE-2024-0074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0075">CVE-2024-0075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0078">CVE-2024-0078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0126">CVE-2024-0126</a>)</li>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39894">CVE-2024-39894</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310</a>)</li>
<li>sysext-docker: docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110</a>)</li>
<li>sysext-podman: containers-common (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341</a>)</li>
<li>sysext-podman: containers-image (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727</a>)</li>
<li>sysext-podman: podman (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added Proxmox Virtual Environment images (<a href="https://github.com/flatcar/scripts/pull/1783">scripts#1783</a>)</li>
<li>Kernel lockdown in integrity mode is now enabled when secure boot is enabled. This prevents loading unsigned kernel modules and matches the behavior of all major distros. (<a href="https://github.com/flatcar/scripts/pull/2299">scripts#2299</a>)</li>
<li>The UEFI firmware has changed from raw (.fd) format to QCOW2 format. In addition, the amd64 firmware variables are now held in a 4MB image rather than a 2MB image. Note that this firmware is only intended for testing with QEMU. Do not use it in production. (<a href="https://github.com/flatcar/scripts/pull/2434">scripts#2434</a>)</li>
<li>The <code>/usr/sbin</code> directory is now merged into <code>/usr/bin</code>, so the former became a symlink to the latter. The SDK now has the same base layout as the generic images. (<a href="https://github.com/flatcar/scripts/pull/2068">flatcar/scripts#2068</a>)</li>
<li>The arm64 UEFI firmware now supports Secure Boot. Be aware that this is not considered secure due to the lack of an SMM implementation, which is needed to protect the variable store. As above, this firmware should not be used in production anyway. (<a href="https://github.com/flatcar/scripts/pull/2434">scripts#2434</a>)</li>
<li>grub 2.12-flatcar3: GRUB now includes many patches from Red Hat to support Secure Boot, as well as Flatcar's own patches. The version string includes a numbered &quot;flatcar&quot; suffix to track changes to these additional patches. This string can be seen in the GRUB menu. (<a href="https://github.com/flatcar/scripts/pull/2431">scripts#2431</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2200-2024-10-22">2.20.0</a>)</li>
<li>Linux (<a href="https://lwn.net/Articles/1004703">6.6.71</a> (includes <a href="https://lwn.net/Articles/1004551">6.6.70</a>, <a href="https://lwn.net/Articles/1003986">6.6.69</a>, <a href="https://lwn.net/Articles/1003609">6.6.68</a>, <a href="https://lwn.net/Articles/1002919">6.6.67</a>, <a href="https://lwn.net/Articles/1002177">6.6.66</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241210">20241210</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241110">20241110</a>))</li>
<li>SDK: Go (<a href="https://go.dev/doc/devel/release#go1.22.9">1.22.9</a> (includes <a href="https://go.dev/doc/devel/release#go1.22.8">1.22.8</a>, <a href="https://go.dev/doc/devel/release#go1.22.7">1.22.7</a>))</li>
<li>SDK: catalyst (<a href="https://gitweb.gentoo.org/proj/catalyst.git/log/?h=4.0.0">4.0.0</a>)</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.30/release/3.30.html#id2">3.30.2</a>)</li>
<li>SDK: crossdev (<a href="https://gitweb.gentoo.org/proj/crossdev.git/log/?h=20240921">20240921</a>)</li>
<li>SDK: edk2-bin (<a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202408">202408</a> (includes <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202405">202405</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202402">202402</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202311">202311</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202308">202308</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202305">202305</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202302">202302</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202211">202211</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202208">202208</a>, <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202205">202205</a>))</li>
<li>SDK: meson (<a href="https://github.com/mesonbuild/meson/commits/1.5.2/">1.5.2</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/5.40.0/perldelta">5.40.0</a>)</li>
<li>SDK: rust (<a href="https://blog.rust-lang.org/2024/09/05/Rust-1.81.0.html">1.81.0</a>)</li>
<li>afterburn (<a href="https://coreos.github.io/afterburn/release-notes/#afterburn-570">5.7.0</a>)</li>
<li>audit (<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.1">4.0.1</a> (includes <a href="https://github.com/linux-audit/audit-userspace/releases/tag/v4.0">4.0</a>))</li>
<li>azure, gce, sysext-python: gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00001.html">1.24</a>)</li>
<li>azure, gce, sysext-python: python (<a href="https://docs.python.org/3.11/whatsnew/3.11.html#notable-changes-in-3-11-10">3.11.10</a>)</li>
<li>azure: chrony (<a href="https://gitlab.com/chrony/chrony/-/blob/4.6/NEWS">4.6</a>)</li>
<li>base, dev: azure-vm-utils (<a href="https://github.com/Azure/azure-vm-utils/releases/tag/v0.3.0">0.3.0</a>)</li>
<li>base, dev: binutils-config (<a href="https://gitweb.gentoo.org/proj/binutils-config.git/log/?h=v5.5.2">5.5.2</a>)</li>
<li>base, dev: btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/blob/v6.10.1/CHANGES#L26-L38">6.10.1</a> (includes <a href="https://github.com/kdave/btrfs-progs/blob/v6.10/CHANGES">6.10</a>))</li>
<li>base, dev: c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/v1.33.1">1.33.1</a> (includes <a href="https://github.com/c-ares/c-ares/releases/tag/v1.33.0">1.33.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.32.3">1.32.3</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.32.2">1.32.2</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.32.1">1.32.1</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.32.0">1.32.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.31.0">1.31.0</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/v1.30.0">1.30.0</a>))</li>
<li>base, dev: cracklib (<a href="https://github.com/cracklib/cracklib/releases/tag/v2.10.2">2.10.2</a> (includes <a href="https://github.com/cracklib/cracklib/releases/tag/v2.10.1">2.10.1</a>, <a href="https://github.com/cracklib/cracklib/releases/tag/v2.10.0">2.10.0</a>))</li>
<li>base, dev: cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.5/docs/v2.7.5-ReleaseNotes">2.7.5</a> (includes <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.4/docs/v2.7.4-ReleaseNotes">2.7.4</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.3/docs/v2.7.3-ReleaseNotes">2.7.3</a>))</li>
<li>base, dev: curl (<a href="https://curl.se/ch/8.10.1.html">8.10.1</a> (includes <a href="https://curl.se/ch/8.10.0.html">8.10.0</a>))</li>
<li>base, dev: efivar (<a href="https://github.com/rhboot/efivar/releases/tag/39">39</a>)</li>
<li>base, dev: gettext (<a href="https://savannah.gnu.org/news/?id=10597">0.22.5</a>)</li>
<li>base, dev: git (<a href="https://github.com/git/git/blob/v2.45.2/Documentation/RelNotes/2.45.2.txt">2.45.2</a> (includes <a href="https://github.com/git/git/blob/v2.45.1/Documentation/RelNotes/2.45.1.txt">2.45.1</a>, <a href="https://github.com/git/git/blob/v2.45.0/Documentation/RelNotes/2.45.0.txt">2.45.0</a>))</li>
<li>base, dev: gnutls (<a href="https://gitlab.com/gnutls/gnutls/-/blob/3.8.7/NEWS">3.8.7.1</a> (includes <a href="https://gitlab.com/gnutls/gnutls/-/blob/3.8.6/NEWS">3.8.6</a>))</li>
<li>base, dev: gptfdisk (<a href="https://sourceforge.net/p/gptfdisk/code/ci/53ac725a88a616b9f3395500d6e520aa04742fa5/tree/NEWS">1.0.10</a>)</li>
<li>base, dev: intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910">20240910_p20240915</a>)</li>
<li>base, dev: kmod (<a href="https://github.com/kmod-project/kmod/blob/v33/NEWS">33</a>)</li>
<li>base, dev: ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/6ca4df6374136d1d205de689618dc8fce5177d14">2.8.1</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/94f11c3c21bc3b8a34d376ab99becd2c6260af62">2.8.0</a>))</li>
<li>base, dev: libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.6">3.7.6</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.5">3.7.5</a>))</li>
<li>base, dev: libassuan (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=48ece8b1cf8b81bdf835db00079ae247742cd398;hb=0351ecfa4f35ad44684075abec153574986b11bd">3.0.0</a>)</li>
<li>base, dev: libgcrypt (<a href="https://dev.gnupg.org/T7165">1.11.0</a>)</li>
<li>base, dev: libgpg-error (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=b865ecc7197a4f60b1530958fbb25a92bdfdc3de;hb=bb732615daad9bba9026354ae90f0f5292ea4908">1.50</a>)</li>
<li>base, dev: libnl (<a href="https://lists.infradead.org/pipermail/libnl/2024-July/002440.html">3.10.0</a>)</li>
<li>base, dev: libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.10">1.10</a>)</li>
<li>base, dev: liburing (<a href="https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.7">2.7</a> (includes <a href="https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.6">2.6</a>, <a href="https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.5">2.5</a>, <a href="https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.4">2.4</a>))</li>
<li>base, dev: nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.2">2.10.2</a> (includes <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.1">2.10.1</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10">2.10</a>))</li>
<li>base, dev: oniguruma (<a href="https://github.com/kkos/oniguruma/releases/tag/v6.9.9">6.9.9</a>)</li>
<li>base, dev: openssh (<a href="https://www.openssh.com/txt/release-9.8">9.8_p1</a>)</li>
<li>base, dev: pinentry (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=a07d18953341a4eb65c9873e64c06bc7c642606d;hb=dd8894fa60c1f1c08ecc50ba4657580abc348347">1.3.1</a>)</li>
<li>base, dev: pkgconf (<a href="https://github.com/pkgconf/pkgconf/blob/pkgconf-2.3.0/NEWS">2.3.0</a>)</li>
<li>base, dev: samba (<a href="https://gitlab.com/samba-team/samba/-/blob/bce5c475d12fb75619bc85d176bfd40420b4fce8/WHATSNEW.txt">4.19.7</a>)</li>
<li>base, dev: selinux-base (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-base-policy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-container (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-dbus (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-policykit (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-sssd (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: selinux-unconfined (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916">2.20240916</a>)</li>
<li>base, dev: socat (<a href="https://repo.or.cz/socat.git/blob/2da070164d454971d5c970b5278e645051f0d0f7:/CHANGES">1.8.0.0</a>)</li>
<li>base, dev: sqlite (<a href="https://www.sqlite.org/releaselog/3_46_1.html">3.46.1</a>)</li>
<li>base, dev: talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/f28966c1638806a5af1fa4e451b668af638491ce">2.4.2</a>)</li>
<li>base, dev: tcpdump (<a href="https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.5/CHANGES">4.99.5</a>)</li>
<li>base, dev: tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/5032ab712c6e9d6562cd10b1d840d2ee052d1d16">1.4.10</a>)</li>
<li>base, dev: tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/0ba05d5bbb1788b0b8cee26748bcda0c90c48baa">0.16.1</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/acd9248b13cba06d5b748f17aa9bc5d62079d9cc">0.16.0</a>))</li>
<li>base, dev: userspace-rcu (<a href="https://lists.lttng.org/pipermail/lttng-dev/2024-August/030860.html">0.14.1</a>)</li>
<li>bind-tools (<a href="https://bind9.readthedocs.io/en/v9.16.50/notes.html#notes-for-bind-9-16-50">9.16.50</a> (includes <a href="https://bind9.readthedocs.io/en/v9.16.49/notes.html#notes-for-bind-9-16-49">9.16.49</a>))</li>
<li>bpftool (<a href="https://github.com/libbpf/bpftool/releases/tag/v7.4.0">7.4.0</a> (includes <a href="https://github.com/libbpf/bpftool/releases/tag/v7.3.0">7.3.0</a>, <a href="https://github.com/libbpf/bpftool/releases/tag/v7.2.0">7.2.0</a>, <a href="https://github.com/libbpf/bpftool/releases/tag/v7.1.0">7.1.0</a>, <a href="https://github.com/libbpf/bpftool/releases/tag/v7.0.0">7.0.0</a>))</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.23">1.7.23</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.22">1.7.22</a>))</li>
<li>dev: gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00011.html">15.2</a>)</li>
<li>dev: gentoolkit (<a href="https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.7">0.6.7</a>)</li>
<li>dev: gnuconfig (<a href="https://git.savannah.gnu.org/cgit/config.git/log/?id=00b15927496058d23e6258a28d8996f87cf1f191">20240728</a>)</li>
<li>dev: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.17.1">3.17.1</a> (includes <a href="https://github.com/esnet/iperf/releases/tag/3.17">3.17</a>))</li>
<li>dev: libpipeline (<a href="https://gitlab.com/libpipeline/libpipeline/-/blob/dd37cf76496b4b999509bd133657c1fc021e3a5f/NEWS.md">1.5.8</a>)</li>
<li>dev: man-db (<a href="https://gitlab.com/man-db/man-db/-/releases/2.13.0">2.13.0</a>)</li>
<li>etcd (<a href="https://github.com/etcd-io/etcd/blob/96e17d38e244ef18756a55d33066f2893402794b/CHANGELOG/CHANGELOG-3.5.md#v3516-2024-09-10">3.5.16</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes">2.6.3</a>)</li>
<li>grub (<a href="https://lists.gnu.org/archive/html/grub-devel/2023-12/msg00052.html">2.12</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813">20240531_p20240526</a>)</li>
<li>iproute2 (<a href="https://lkml.org/lkml/2024/5/13/860">6.9.0</a>)</li>
<li>libffi (<a href="https://github.com/libffi/libffi/releases/tag/v3.4.6">3.4.6</a> (includes <a href="https://github.com/libffi/libffi/releases/tag/v3.4.5">3.4.5</a>))</li>
<li>libnftnl (<a href="https://www.mail-archive.com/netfilter-announce@lists.netfilter.org/msg00264.html">1.2.7</a>)</li>
<li>libpcap (<a href="https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.10.5/CHANGES">1.10.5</a>)</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.44/NEWS">10.44</a>)</li>
<li>libsodium (<a href="https://github.com/jedisct1/libsodium/releases/tag/1.0.20-RELEASE">1.0.20</a>)</li>
<li>nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/blob/b8c841dc3278dec0812365f02370b41ea9d4ddee/NEWS">3.10</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-216-01/index.html">535.216.01</a>)</li>
<li>pinentry (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=1ea7e76f836fe15fe7c59b954d7aab768bd090e6;hb=24833c9ef2bf93d9f6c0583a9ecfefa6747473bc">1.3.0</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.14">1.1.14</a>)</li>
<li>sysext-docker: docker (<a href="https://docs.docker.com/engine/release-notes/27/#2721">27.2.1</a> (includes <a href="https://docs.docker.com/engine/release-notes/26.1/#2610">26.1.0</a>))</li>
<li>sysext-podman: aardvark-dns (<a href="https://github.com/containers/aardvark-dns/releases/tag/v1.12.2">1.12.2</a> (includes <a href="https://github.com/containers/aardvark-dns/releases/tag/v1.12.1">1.12.1</a>, <a href="https://github.com/containers/aardvark-dns/releases/tag/v1.12.0">1.12.0</a>))</li>
<li>sysext-podman: containers-common (<a href="https://github.com/containers/common/releases/tag/v0.60.4">0.60.4</a> (includes <a href="https://github.com/containers/common/releases/tag/v0.60.3">0.60.3</a>, <a href="https://github.com/containers/common/releases/tag/v0.60.2">0.60.2</a>, <a href="https://github.com/containers/common/releases/tag/v0.60.1">0.60.1</a>, <a href="https://github.com/containers/common/releases/tag/v0.60.0">0.60.0</a>, <a href="https://github.com/containers/common/releases/tag/v0.59.2">0.59.2</a>))</li>
<li>sysext-podman: containers-image (<a href="https://github.com/containers/image/releases/tag/v5.32.2">5.32.2</a> (includes <a href="https://github.com/containers/image/releases/tag/v5.32.1">5.32.1</a>, <a href="https://github.com/containers/image/releases/tag/v5.32.0">5.32.0</a>, <a href="https://github.com/containers/image/releases/tag/v5.31.0">5.31.0</a>, <a href="https://github.com/containers/image/releases/tag/v5.30.2">5.30.2</a>, <a href="https://github.com/containers/image/releases/tag/v5.30.1">5.30.1</a>))</li>
<li>sysext-podman: containers-storage (<a href="https://github.com/containers/storage/releases/tag/v1.55.0">1.55.0</a> (includes <a href="https://github.com/containers/storage/releases/tag/v1.54.0">1.54.0</a>))</li>
<li>sysext-podman: crun (<a href="https://github.com/containers/crun/releases/tag/1.17">1.17</a> (includes <a href="https://github.com/containers/crun/releases/tag/1.16.1">1.16.1</a>, <a href="https://github.com/containers/crun/releases/tag/1.16">1.16</a>, <a href="https://github.com/containers/crun/releases/tag/1.15">1.15</a>, <a href="https://github.com/containers/crun/releases/tag/1.14.4">1.14.4</a>))</li>
<li>sysext-podman: fuse-overlayfs (<a href="https://github.com/containers/fuse-overlayfs/releases/tag/v1.14">1.14</a>)</li>
<li>sysext-podman: netavark (<a href="https://github.com/containers/netavark/releases/tag/v1.12.2">1.12.2</a> (includes <a href="https://github.com/containers/netavark/releases/tag/v1.12.1">1.12.1</a>, <a href="https://github.com/containers/netavark/releases/tag/v1.12.0">1.12.0</a>, <a href="https://github.com/containers/netavark/releases/tag/v1.11.0">1.11.0</a>))</li>
<li>sysext-podman: passt (<a href="https://archives.passt.top/passt-user/20240906171530.763b3179@elisabeth/T/#u">2024.09.06</a>)</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.2.4">5.2.4</a> (includes <a href="https://github.com/containers/podman/releases/tag/v5.2.3">5.2.3</a>, <a href="https://github.com/containers/podman/releases/tag/v5.2.2">5.2.2</a>, <a href="https://github.com/containers/podman/releases/tag/v5.2.1">5.2.1</a>, <a href="https://github.com/containers/podman/releases/tag/v5.2.0">5.2.0</a>, <a href="https://github.com/containers/podman/releases/tag/v5.1.2">5.1.2</a>, <a href="https://github.com/containers/podman/releases/tag/v5.1.1">5.1.1</a>, <a href="https://github.com/containers/podman/releases/tag/v5.1.0">5.1.0</a>))</li>
<li>sysext-python: idna (<a href="https://github.com/kjd/idna/blob/v3.10/HISTORY.rst">3.10</a> (includes <a href="https://github.com/kjd/idna/releases/tag/v3.8">3.8</a>))</li>
<li>sysext-python: jaraco-context (<a href="https://github.com/jaraco/jaraco.context/blob/v6.0.1/NEWS.rst">6.0.1</a>)</li>
<li>sysext-python: more-itertools (<a href="https://github.com/more-itertools/more-itertools/blob/v10.5.0/docs/versions.rst#1050">10.5.0</a>)</li>
<li>sysext-python: msgpack (<a href="https://github.com/msgpack/msgpack-python/blob/v1.1.0/ChangeLog.rst#110">1.1.0</a>)</li>
<li>sysext-python: platformdirs (<a href="https://github.com/tox-dev/platformdirs/releases/tag/4.3.6">4.3.6</a>)</li>
<li>sysext-python: rich (<a href="https://github.com/Textualize/rich/releases/tag/v13.8.1">13.8.1</a>)</li>
<li>sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v74.1.3/NEWS.rst">74.1.3</a> (includes <a href="https://github.com/pypa/setuptools/blob/v73.0.1/NEWS.rst">73.0.1</a>, <a href="https://github.com/pypa/setuptools/blob/v72.2.0/NEWS.rst">72.2.0</a>))</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/releases/tag/2024.9.12">2024.9.12</a>)</li>
<li>sysext-python: truststore (<a href="https://github.com/sethmlarson/truststore/blob/v0.9.2/CHANGELOG.md">0.9.2</a>)</li>
<li>sysext-python: urllib3 (<a href="https://github.com/urllib3/urllib3/releases/tag/2.2.3">2.2.3</a>)</li>
<li>vmware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.5.0">12.5.0</a>)</li>
<li>vmware: xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.4">1.3.4</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.23/debian/changelog">5.5.23</a> (includes <a href="https://github.com/rfc1036/whois/blob/v5.5.22/debian/changelog">5.5.22</a>))</li>
</ul>
<p><em>Changes since <strong>Beta 4152.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23128">CVE-2025-23128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23125">CVE-2025-23125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48875">CVE-2024-48875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41935">CVE-2024-41935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56785">CVE-2024-56785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56781">CVE-2024-56781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56628">CVE-2024-56628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56627">CVE-2024-56627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56626">CVE-2024-56626</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56613">CVE-2024-56613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56586">CVE-2024-56586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56585">CVE-2024-56585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56597">CVE-2024-56597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56596">CVE-2024-56596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56595">CVE-2024-56595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56565">CVE-2024-56565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53196">CVE-2024-53196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53687">CVE-2024-53687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53690">CVE-2024-53690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56766">CVE-2024-56766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56765">CVE-2024-56765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56763">CVE-2024-56763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56762">CVE-2024-56762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56769">CVE-2024-56769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56767">CVE-2024-56767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.74">6.6.74</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.73">6.6.73</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.72">6.6.72</a>, <a href="https://lwn.net/Articles/1004703">6.6.71</a>, <a href="https://lwn.net/Articles/1004551">6.6.70</a>, <a href="https://lwn.net/Articles/1003986">6.6.69</a>, <a href="https://lwn.net/Articles/1003609">6.6.68</a>, <a href="https://lwn.net/Articles/1002919">6.6.67</a>, <a href="https://lwn.net/Articles/1002177">6.6.66</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.23</li>
<li>docker 27.2.1</li>
<li>ignition 2.20.0</li>
<li>kernel 6.6.74</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4152.2.0"/>
    <published>2025-01-30T16:25:47+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4081.2.1</id>
    <title>4081.2.1</title>
    <updated>2026-03-09T16:26:32.325359+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 4081.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53103">CVE-2024-53103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53082">CVE-2024-53082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53083">CVE-2024-53083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53081">CVE-2024-53081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53068">CVE-2024-53068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53066">CVE-2024-53066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53072">CVE-2024-53072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53070">CVE-2024-53070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50296">CVE-2024-50296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50295">CVE-2024-50295</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50294">CVE-2024-50294</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50292">CVE-2024-50292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50300">CVE-2024-50300</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50299">CVE-2024-50299</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50298">CVE-2024-50298</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50275">CVE-2024-50275</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50284">CVE-2024-50284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50283">CVE-2024-50283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50280">CVE-2024-50280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50278">CVE-2024-50278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50287">CVE-2024-50287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50286">CVE-2024-50286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50285">CVE-2024-50285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50276">CVE-2024-50276</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50273">CVE-2024-50273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50272">CVE-2024-50272</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50271">CVE-2024-50271</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50269">CVE-2024-50269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50268">CVE-2024-50268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50265">CVE-2024-50265</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53102">CVE-2024-53102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53101">CVE-2024-53101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53100">CVE-2024-53100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53099">CVE-2024-53099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53097">CVE-2024-53097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53095">CVE-2024-53095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53094">CVE-2024-53094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53093">CVE-2024-53093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53091">CVE-2024-53091</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53079">CVE-2024-53079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53135">CVE-2024-53135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53134">CVE-2024-53134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53131">CVE-2024-53131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53130">CVE-2024-53130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53129">CVE-2024-53129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53140">CVE-2024-53140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53139">CVE-2024-53139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53138">CVE-2024-53138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53136">CVE-2024-53136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53126">CVE-2024-53126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53127">CVE-2024-53127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53113">CVE-2024-53113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53112">CVE-2024-53112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53110">CVE-2024-53110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53109">CVE-2024-53109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53108">CVE-2024-53108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53123">CVE-2024-53123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53122">CVE-2024-53122</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53121">CVE-2024-53121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53120">CVE-2024-53120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53119">CVE-2024-53119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53106">CVE-2024-53106</a>)</li>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9143">CVE-2024-9143</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added qemu-guest-agent to ARM64 images (<a href="https://github.com/flatcar/Flatcar/issues/1593">flatcar/flatcar#1593</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/1001739">6.6.65</a> (includes <a href="https://lwn.net/Articles/1001438">6.6.64</a>, <a href="https://lwn.net/Articles/999110">6.6.63</a>, <a href="https://lwn.net/Articles/998450">6.6.62</a>, <a href="https://lwn.net/Articles/998150">6.6.61</a>))</li>
<li>OpenSSL (<a href="https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32">3.2.3</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html">3.107</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.65</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.2.1"/>
    <published>2024-12-16T14:12:39+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-4081.2.0</id>
    <title>4081.2.0</title>
    <updated>2026-03-09T16:26:32.265522+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3975.2.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50176">CVE-2024-50176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50175">CVE-2024-50175</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50012">CVE-2024-50012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50005">CVE-2024-50005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50016">CVE-2024-50016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49997">CVE-2024-49997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49961">CVE-2024-49961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49992">CVE-2024-49992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49988">CVE-2024-49988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49987">CVE-2024-49987</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49986">CVE-2024-49986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49980">CVE-2024-49980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49978">CVE-2024-49978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49977">CVE-2024-49977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49976">CVE-2024-49976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49953">CVE-2024-49953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49952">CVE-2024-49952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49951">CVE-2024-49951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49948">CVE-2024-49948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49944">CVE-2024-49944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49931">CVE-2024-49931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49927">CVE-2024-49927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49889">CVE-2024-49889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49874">CVE-2024-49874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50191">CVE-2024-50191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50185">CVE-2024-50185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50181">CVE-2024-50181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50097">CVE-2024-50097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50065">CVE-2024-50065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50057">CVE-2024-50057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50040">CVE-2024-50040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50039">CVE-2024-50039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50038">CVE-2024-50038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50036">CVE-2024-50036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50032">CVE-2024-50032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50029">CVE-2024-50029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50202">CVE-2024-50202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50101">CVE-2024-50101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50088">CVE-2024-50088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50087">CVE-2024-50087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50086">CVE-2024-50086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50085">CVE-2024-50085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50084">CVE-2024-50084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50083">CVE-2024-50083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50080">CVE-2024-50080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50076">CVE-2024-50076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50072">CVE-2024-50072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50070">CVE-2024-50070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50069">CVE-2024-50069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50066">CVE-2024-50066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50211">CVE-2024-50211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50210">CVE-2024-50210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50164">CVE-2024-50164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50163">CVE-2024-50163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50162">CVE-2024-50162</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50159">CVE-2024-50159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50158">CVE-2024-50158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50172">CVE-2024-50172</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50170">CVE-2024-50170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50169">CVE-2024-50169</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50168">CVE-2024-50168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50166">CVE-2024-50166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50145">CVE-2024-50145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50142">CVE-2024-50142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50152">CVE-2024-50152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50151">CVE-2024-50151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50139">CVE-2024-50139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50140">CVE-2024-50140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50136">CVE-2024-50136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50135">CVE-2024-50135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50133">CVE-2024-50133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50111">CVE-2024-50111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50126">CVE-2024-50126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50121">CVE-2024-50121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50120">CVE-2024-50120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50112">CVE-2024-50112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50262">CVE-2024-50262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50226">CVE-2024-50226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50235">CVE-2024-50235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50231">CVE-2024-50231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50258">CVE-2024-50258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50257">CVE-2024-50257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50256">CVE-2024-50256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50252">CVE-2024-50252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50251">CVE-2024-50251</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50250">CVE-2024-50250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50248">CVE-2024-50248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50247">CVE-2024-50247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50246">CVE-2024-50246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50245">CVE-2024-50245</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50244">CVE-2024-50244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50243">CVE-2024-50243</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50242">CVE-2024-50242</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50240">CVE-2024-50240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50239">CVE-2024-50239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50219">CVE-2024-50219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50216">CVE-2024-50216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50224">CVE-2024-50224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50223">CVE-2024-50223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50222">CVE-2024-50222</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6197">CVE-2024-6197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6874">CVE-2024-6874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264</a>)</li>
<li>docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29018">CVE-2024-29018</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465</a>)</li>
<li>glib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26256">CVE-2024-26256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37407">CVE-2024-37407</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">CVE-2024-34459</a>)</li>
<li>linux-firmware (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371</a>)</li>
<li>sysext-podman: podman (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727</a>)</li>
<li>tpm2-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040">CVE-2024-29040</a>)</li>
<li>SDK: go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791</a>)</li>
<li>SDK: nasm (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6290">CVE-2019-6290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6291">CVE-2019-6291</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-8343">CVE-2019-8343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-21528">CVE-2020-21528</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33450">CVE-2021-33450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33452">CVE-2021-33452</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44368">CVE-2022-44368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44369">CVE-2022-44369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-44370">CVE-2022-44370</a>)</li>
<li>SDK: re2c (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23901">CVE-2022-23901</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: (<a href="https://github.com/flatcar/scripts/pull/2016">flatcar/scripts#2016</a>)</li>
<li>Fixed bad usage of gpg that prevented flatcar-install from being used with custom signing keys (<a href="https://github.com/flatcar/flatcar/pull/1471">Flatcar#1471</a>)</li>
<li>Fixed the initrd option in the QEMU launcher script. It was -R, but this was already taken by the read-only pflash option, so use -r instead. (<a href="https://github.com/flatcar/scripts/pull/2239">scripts#2239</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>As part of the update to Catalyst 4 (used to build the SDK), the coreos package repository has been renamed to coreos-overlay to match its directory name. This will be reflected in package listings and package manager output. (<a href="https://github.com/flatcar/scripts/pull/2115">flatcar/scripts#2115</a>)</li>
<li>Provided a Python Flatcar extension as optional systemd-sysext image with the release. Write 'python' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning (<a href="https://github.com/flatcar/scripts/pull/1979">scripts#1979</a>)</li>
<li>Added Akamai / Linode images (<a href="https://github.com/flatcar/scripts/pull/1806">flatcar/scripts#1806</a>)</li>
<li>Removed unused grub executable duplicate files and removed grub modules that are already assembled in the grub executable (<a href="https://github.com/flatcar/scripts/pull/1955">flatcar/scripts#1955</a>).</li>
<li>Replace nmap netcat with openbsd variant. The license didn't get an exception from CNCF. Something about the definition of &quot;derivative works&quot; being too broad.</li>
<li>The <code>docker build</code> command will now use buildx as its backend as the old one became deprecated and a loud &quot;DEPRECATED&quot; information is printed every time it's used.</li>
<li>The kernel security module Landlock is now enabled for programs to sandbox themselves (<a href="https://github.com/flatcar/scripts/pull/2158">flatcar/scripts#2158</a>)</li>
<li>libcrypt is now provided by the libxcrypt library instead of glibc. Glibc libcrypt was deprecated long time ago.</li>
<li>Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha (<a href="https://github.com/flatcar/scripts/pull/2390">flatcar/scripts#2390</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2190-2024-06-05">2.19.0</a>)</li>
<li>Linux (<a href="https://lwn.net/Articles/997527">6.6.60</a> (includes <a href="https://lwn.net/Articles/996689">6.6.59</a>, <a href="https://lwn.net/Articles/995132">6.6.58</a>, <a href="https://lwn.net/Articles/994634">6.6.57</a>, <a href="https://lwn.net/Articles/993600">6.6.56</a>, <a href="https://lwn.net/Articles/993599">6.6.55</a>, <a href="https://lwn.net/Articles/990767/">6.6.52</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.50">6.6.50</a>,<a href="https://lwn.net/Articles/988749">6.6.49</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.47">6.6.47</a>, <a href="https://lwn.net/Articles/985672">6.6.46</a>, <a href="https://lwn.net/Articles/985200">6.6.45</a>, <a href="https://lwn.net/Articles/984450">6.6.44</a>, <a href="https://lwn.net/Articles/975075">6.6.32</a>, <a href="https://lwn.net/Articles/974072">6.6.31</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240811">20240811</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240709">20240709</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240610">20240610</a>))</li>
<li>Open-iSCSI (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.10">2.1.10</a>)</li>
<li>SDK: Go (<a href="https://go.dev/doc/devel/release#go1.21.13">1.21.13</a> (includes <a href="https://go.dev/doc/devel/release#go1.21.12">1.21.12</a> includes changes from <a href="https://go.dev/doc/go1.21">1.21</a>))</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.80.1">1.80.1</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.80.0">1.80.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.79.0">1.79.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.78.0">1.78.0</a>))</li>
<li>SDK: meson (<a href="https://mesonbuild.com/Release-notes-for-1-5-0.html">1.5.1</a>)</li>
<li>SDK: nasm (<a href="https://github.com/netwide-assembler/nasm/releases/tag/nasm-2.16.01">2.16.01</a>)</li>
<li>SDK: portage (<a href="https://github.com/gentoo/portage/blob/f03998622e0960388e903de0d6d24bdf6881e567/NEWS#L9">3.0.65</a> (includes <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.63">3.0.63</a>))</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/8.2">8.2.3</a>)</li>
<li>afterburn (<a href="https://coreos.github.io/afterburn/release-notes/#afterburn-560">5.6.0</a>)</li>
<li>audit (<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.2">3.1.2</a>)</li>
<li>azure-nvme-utils (<a href="https://github.com/Azure/azure-nvme-utils/releases/tag/v0.2.0">0.2.0</a>)</li>
<li>binutils (<a href="https://sourceware.org/pipermail/binutils/2024-January/132213.html">2.42</a>)</li>
<li>bpftool (<a href="https://kernelnewbies.org/Linux_6.9#Tracing.2C_perf_and_BPF">6.9.2</a> (includes <a href="https://kernelnewbies.org/Linux_6.8#Tracing.2C_perf_and_BPF">6.8.2</a>))</li>
<li>btrfs-progs (<a href="https://github.com/kdave/btrfs-progs/blob/v6.9.2/CHANGES">6.9.2</a>)</li>
<li>c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_29_0">1.29.0</a> (includes <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_28_1">1.28.1</a>, <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_28_0">1.28.0</a>))</li>
<li>cJSON (<a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.18">1.7.18</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html">3.106</a>)</li>
<li>conntrack-tools (<a href="https://lwn.net/Articles/945927/">1.4.8</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.21">1.7.21</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.20">1.7.20</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.19">1.7.19</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.18">1.7.18</a>))</li>
<li>cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.2/docs/v2.7.2-ReleaseNotes">2.7.2</a> (includes <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.1/docs/v2.7.1-ReleaseNotes">2.7.1</a> and <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.0/docs/v2.7.0-ReleaseNotes">2.7.0</a>))</li>
<li>curl (<a href="https://curl.se/ch/8.9.1.html">8.9.1</a> (includes <a href="https://curl.se/ch/8.9.0.html">8.9.0</a>, <a href="https://curl.se/changes.html#8_8_0">8.8.0</a>))</li>
<li>dev: minicom (<a href="https://salsa.debian.org/minicom-team/minicom/-/releases/2.9">2.9</a>)</li>
<li>docker (<a href="https://docs.docker.com/engine/release-notes/26.1/#2610">26.1.0</a>, includes changes from <a href="https://docs.docker.com/engine/release-notes/25.0/">25.0</a>)</li>
<li>e2fsprogs (<a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.1">1.47.1</a>)</li>
<li>elfutils (<a href="https://inbox.sourceware.org/elfutils-devel/CAJDtP-SJhJ8cjTpkNpi+F0nzVJ2pZsEai8Ewpp4yJmsO_H5-NA@mail.gmail.com/T/#u">0.191</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.9">6.9</a>)</li>
<li>findutils (<a href="https://git.savannah.gnu.org/cgit/findutils.git/tree/NEWS?h=v4.10.0">4.10.0</a>)</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-13/changes.html">13.3.1_p20240614</a>)</li>
<li>gce, sysext-python: setuptools (<a href="https://github.com/pypa/setuptools/blob/v72.1.0/NEWS.rst">72.1.0</a> (includes <a href="https://github.com/pypa/setuptools/blob/v71.1.0/NEWS.rst">71.1.0</a>, <a href="https://github.com/pypa/setuptools/blob/v71.0.0/NEWS.rst">71.0.0</a>))</li>
<li>gflags (<a href="https://github.com/gflags/gflags/releases/tag/v2.2.2">2.2.2</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.44.2/Documentation/RelNotes/2.44.2.txt">2.44.2</a> (includes <a href="https://github.com/git/git/blob/v2.44.1/Documentation/RelNotes/2.44.1.txt">2.44.1</a>, <a href="https://github.com/git/git/blob/v2.44.0/Documentation/RelNotes/2.44.0.txt">2.44.0</a>))</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.6">2.78.6</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.5">2.78.5</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.4">2.78.4</a>))</li>
<li>glog (<a href="https://github.com/google/glog/releases/tag/v0.6.0">0.6.0</a>)</li>
<li>gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000482.html">2.4.5</a>)</li>
<li>hwdata (<a href="https://github.com/vcrhonek/hwdata/compare/v0.382...v0.383">0.383</a> (includes <a href="https://github.com/vcrhonek/hwdata/commits/v0.382">0.382</a>))</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514">20240514_p20240514</a>)</li>
<li>iproute2 (<a href="https://lwn.net/Articles/965125/">6.8.0</a> (includes <a href="https://lwn.net/Articles/957171/">6.7.0</a>))</li>
<li>ipset (<a href="https://ipset.netfilter.org/changelog.html">7.22</a>)</li>
<li>kexec-tools (<a href="https://github.com/horms/kexec-tools/commits/v2.0.28/">2.0.28</a>)</li>
<li>kmod (<a href="https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/tree/NEWS?h=v32">32</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.4">3.7.4</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.3">3.7.3</a>))</li>
<li>libassuan (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=047f12b7c3ee0c8c1718a2da8b5a6bb9dd541fd8;hb=cc2f776904e0b5e56e2b81b2672ca98d7787ed1b">2.5.7</a>)</li>
<li>libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.hde102t8xd0v">2.70</a>)</li>
<li>libcap-ng (<a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.5">0.8.5</a>)</li>
<li>libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.18.0">1.18.0</a>)</li>
<li>libgpg-error (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=8ac4bf36113fe9254a361e2bc8d0ed52383839ce;hb=faed9c271ad22bbd2ed265d8e11badb53b7a2f32">1.49</a>)</li>
<li>libksba (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=3d2d5a47688bb6214efaf02f5ab29f6e64433a97;hb=b14e68b97df754b2bb7a90bb904d143d8e896afb">1.6.7</a>)</li>
<li>libmicrohttpd (<a href="https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00005.html">1.0.1</a> (inlcudes <a href="https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00000.html">1.0.0</a>))</li>
<li>libnl (<a href="http://lists.infradead.org/pipermail/libnl/2023-December/002436.html">3.9.0</a>)</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.9">1.9</a>)</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.43/NEWS">10.43</a>)</li>
<li>libunwind (<a href="https://github.com/libunwind/libunwind/releases/tag/v1.8.1">1.8.1</a> (includes <a href="https://github.com/libunwind/libunwind/releases/tag/v1.8.0">1.8.0</a>))</li>
<li>libusb (<a href="https://github.com/libusb/libusb/blob/v1.0.27/ChangeLog">1.0.27</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7">2.12.7</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.6">2.12.6</a>))</li>
<li>linux-pam (<a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.5.3">1.5.3</a>)</li>
<li>lshw (<a href="https://www.ezix.org/project/wiki/HardwareLiSter#Changes">02.20.2b</a>)</li>
<li>lz4 (<a href="https://github.com/lz4/lz4/releases/tag/v1.10.0">1.10.0</a>)</li>
<li>mit-krb5 (<a href="https://web.mit.edu/kerberos/krb5-1.21/README-1.21.3.txt">1.21.3</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/blob/0.9.8/NEWS.md">0.9.8</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.62.1">1.62.1</a>)</li>
<li>nmap (<a href="https://nmap.org/changelog.html#7.95">7.95</a>)</li>
<li>npth (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=c1b631b4294eabfef29baefd60e1b0dfecce710d;hb=75c68399ef3bbb5d024f2a60474a7214fa479016">1.7</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9.1">2.9.1</a> (includes <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9">2.9</a>))</li>
<li>pahole (<a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.27">1.27</a>)</li>
<li>pciutils (<a href="https://github.com/pciutils/pciutils/blob/v3.13.0/ChangeLog">3.13.0</a> (includes <a href="https://github.com/pciutils/pciutils/blob/v3.12.0/ChangeLog">3.12.0</a>))</li>
<li>qemu-guest-agent (<a href="https://wiki.qemu.org/ChangeLog/8.2#Guest_agent">8.2.0</a>)</li>
<li>rsync (<a href="https://github.com/RsyncProject/rsync/blob/v3.3.0/NEWS.md">3.3.0</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.13">1.1.13</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_46_0.html">3.46.0</a> (includes <a href="https://www.sqlite.org/releaselog/3_45_3.html">3.45.3</a>))</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.9">6.9</a>)</li>
<li>sysext-podman: aardvark-dns (<a href="https://github.com/containers/aardvark-dns/releases/tag/v1.11.0">1.11.0</a>)</li>
<li>sysext-podman: containers-common (<a href="https://github.com/containers/common/releases/tag/v0.59.1">0.59.1</a>)</li>
<li>sysext-podman: podman (<a href="https://github.com/containers/podman/releases/tag/v5.0.3">5.0.3</a>)</li>
<li>sysext-python: jaraco-text (<a href="https://github.com/jaraco/jaraco.text/compare/v3.12.0...v3.12.1">3.12.1</a>)</li>
<li>sysext-python: more-itertools (<a href="https://github.com/more-itertools/more-itertools/releases/tag/v10.4.0">10.4.0</a>)</li>
<li>sysext-python: pip (<a href="https://github.com/pypa/pip/blob/24.2/NEWS.rst">24.2</a> (includes <a href="https://github.com/pypa/pip/blob/24.1.2/NEWS.rst">24.1.2</a>))</li>
<li>sysext-python: setuptools(<a href="https://github.com/pypa/setuptools/blob/v70.3.0/NEWS.rst">70.3.0</a> (includes <a href="https://setuptools.pypa.io/en/stable/history.html#v70-1-1">70.1.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v70-1-0">70.1.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v70-0-0">70.0.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-5-1">69.5.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-5-0">69.5.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-2">69.4.2</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-1">69.4.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-4-0">69.4.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-3-1">69.3.1</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-3-0">69.3.0</a>, <a href="https://setuptools.pypa.io/en/stable/history.html#v69-2-0">69.2.0</a>))</li>
<li>sysext-python: trove-classifiers (<a href="https://github.com/pypa/trove-classifiers/compare/2024.5.22...2024.7.2">2024.7.2</a>)</li>
<li>sysext-python: wheel (<a href="https://github.com/pypa/wheel/releases/tag/0.44.0">0.44.0</a>)</li>
<li>sysext-zfs: zfs (<a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.5">2.2.5</a> (includes <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.4">2.2.4</a>, <a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.2.3">2.2.3</a>))</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/commits/v255.8/">255.8</a>)</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/791e2817e13182344447590313f7e372a27c1d48">2.4.1</a>)</li>
<li>tcpdump (<a href="https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.4/CHANGES">4.99.4</a>)</li>
<li>tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/b649c7d3c2b1e13e900c80ff7a20959a70b1c528">1.4.9</a>)</li>
<li>tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/6a80d170bca0c938f78ab12e37481b52792a9d83">0.15.0</a>)</li>
<li>tpm2-tools (<a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7">5.7</a> (includes <a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6.1">5.6.1</a>, <a href="https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6">5.6</a>))</li>
<li>tpm2-tss (<a href="https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.3">4.1.3</a> (includes <a href="https://github.com/tpm2-software/tpm2-tss/releases/tag/4.0.2">4.0.2</a>))</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/blob/v2.39.4/Documentation/releases/v2.39.4-ReleaseNotes">2.39.4</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/commits/v9.1.0366/">9.1.0366</a> (includes <a href="https://www.vim.org/vim-9.1-released.php">9.1</a>))</li>
<li>wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00002.html">1.24.5</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.21/debian/changelog">5.5.21</a>)</li>
<li>xfsprogs (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.8.0">6.8.0</a> (includes <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.6.0">6.6.0</a>))</li>
<li>xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.6.2">5.6.2</a>)</li>
<li>zlib (<a href="https://github.com/madler/zlib/releases/tag/v1.3.1">1.3.1</a>)</li>
<li>zstd (<a href="https://github.com/facebook/zstd/releases/tag/v1.5.6">1.5.6</a>)</li>
<li>vmware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.5">12.4.5</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 4081.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50176">CVE-2024-50176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50175">CVE-2024-50175</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50012">CVE-2024-50012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50005">CVE-2024-50005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50016">CVE-2024-50016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49997">CVE-2024-49997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49961">CVE-2024-49961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49992">CVE-2024-49992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49988">CVE-2024-49988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49987">CVE-2024-49987</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49986">CVE-2024-49986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49980">CVE-2024-49980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49978">CVE-2024-49978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49977">CVE-2024-49977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49976">CVE-2024-49976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49953">CVE-2024-49953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49952">CVE-2024-49952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49951">CVE-2024-49951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49948">CVE-2024-49948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49944">CVE-2024-49944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49931">CVE-2024-49931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49927">CVE-2024-49927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49889">CVE-2024-49889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49874">CVE-2024-49874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50191">CVE-2024-50191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50185">CVE-2024-50185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50181">CVE-2024-50181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50097">CVE-2024-50097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50065">CVE-2024-50065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50057">CVE-2024-50057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50040">CVE-2024-50040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50039">CVE-2024-50039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50038">CVE-2024-50038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50036">CVE-2024-50036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50032">CVE-2024-50032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50029">CVE-2024-50029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50202">CVE-2024-50202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50101">CVE-2024-50101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50088">CVE-2024-50088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50087">CVE-2024-50087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50086">CVE-2024-50086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50085">CVE-2024-50085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50084">CVE-2024-50084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50083">CVE-2024-50083</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50080">CVE-2024-50080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50076">CVE-2024-50076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50072">CVE-2024-50072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50070">CVE-2024-50070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50069">CVE-2024-50069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50066">CVE-2024-50066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50211">CVE-2024-50211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50210">CVE-2024-50210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50164">CVE-2024-50164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50163">CVE-2024-50163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50162">CVE-2024-50162</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50159">CVE-2024-50159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50158">CVE-2024-50158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50172">CVE-2024-50172</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50170">CVE-2024-50170</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50169">CVE-2024-50169</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50168">CVE-2024-50168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50166">CVE-2024-50166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50145">CVE-2024-50145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50142">CVE-2024-50142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50152">CVE-2024-50152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50151">CVE-2024-50151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50139">CVE-2024-50139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50140">CVE-2024-50140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50136">CVE-2024-50136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50135">CVE-2024-50135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50133">CVE-2024-50133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50111">CVE-2024-50111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50126">CVE-2024-50126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50121">CVE-2024-50121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50120">CVE-2024-50120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50112">CVE-2024-50112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50262">CVE-2024-50262</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50226">CVE-2024-50226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50235">CVE-2024-50235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50231">CVE-2024-50231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50258">CVE-2024-50258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50257">CVE-2024-50257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50256">CVE-2024-50256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50252">CVE-2024-50252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50251">CVE-2024-50251</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50250">CVE-2024-50250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50248">CVE-2024-50248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50247">CVE-2024-50247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50246">CVE-2024-50246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50245">CVE-2024-50245</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50244">CVE-2024-50244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50243">CVE-2024-50243</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50242">CVE-2024-50242</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50240">CVE-2024-50240</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50239">CVE-2024-50239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50219">CVE-2024-50219</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50216">CVE-2024-50216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50224">CVE-2024-50224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50223">CVE-2024-50223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50222">CVE-2024-50222</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha (<a href="https://github.com/flatcar/scripts/pull/2390">flatcar/scripts#2390</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html">3.106</a>)</li>
<li>Linux (<a href="https://lwn.net/Articles/997527">6.6.60</a> (includes <a href="https://lwn.net/Articles/996689">6.6.59</a>, <a href="https://lwn.net/Articles/995132">6.6.58</a>, <a href="https://lwn.net/Articles/994634">6.6.57</a>, <a href="https://lwn.net/Articles/993600">6.6.56</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.21</li>
<li>docker 26.1.0</li>
<li>ignition 2.19.0</li>
<li>kernel 6.6.60</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-4081.2.0"/>
    <published>2024-11-13T12:29:46+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3975.2.2</id>
    <title>3975.2.2</title>
    <updated>2026-03-09T16:26:32.231128+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3975.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46711">CVE-2024-46711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46709">CVE-2024-46709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46680">CVE-2024-46680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46678">CVE-2024-46678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46695">CVE-2024-46695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46694">CVE-2024-46694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46693">CVE-2024-46693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46692">CVE-2024-46692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46687">CVE-2024-46687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46686">CVE-2024-46686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46811">CVE-2024-46811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46809">CVE-2024-46809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46806">CVE-2024-46806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46821">CVE-2024-46821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46812">CVE-2024-46812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46802">CVE-2024-46802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46803">CVE-2024-46803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46728">CVE-2024-46728</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46726">CVE-2024-46726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46721">CVE-2024-46721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46720">CVE-2024-46720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46717">CVE-2024-46717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46715">CVE-2024-46715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46831">CVE-2024-46831</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46840">CVE-2024-46840</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46839">CVE-2024-46839</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46838">CVE-2024-46838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46836">CVE-2024-46836</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46848">CVE-2024-46848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46847">CVE-2024-46847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46846">CVE-2024-46846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46845">CVE-2024-46845</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46844">CVE-2024-46844</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46843">CVE-2024-46843</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46832">CVE-2024-46832</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46830">CVE-2024-46830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46829">CVE-2024-46829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46827">CVE-2024-46827</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46825">CVE-2024-46825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46788">CVE-2024-46788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46797">CVE-2024-46797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46796">CVE-2024-46796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46795">CVE-2024-46795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46794">CVE-2024-46794</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46760">CVE-2024-46760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46768">CVE-2024-46768</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46767">CVE-2024-46767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46765">CVE-2024-46765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46763">CVE-2024-46763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46785">CVE-2024-46785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46782">CVE-2024-46782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46762">CVE-2024-46762</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46777">CVE-2024-46777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46776">CVE-2024-46776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46773">CVE-2024-46773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46770">CVE-2024-46770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46742">CVE-2024-46742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46741">CVE-2024-46741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46740">CVE-2024-46740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46757">CVE-2024-46757</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46736">CVE-2024-46736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46749">CVE-2024-46749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46734">CVE-2024-46734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46735">CVE-2024-46735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46713">CVE-2024-46713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46858">CVE-2024-46858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46857">CVE-2024-46857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46855">CVE-2024-46855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46852">CVE-2024-46852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46865">CVE-2024-46865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46861">CVE-2024-46861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46860">CVE-2024-46860</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46859">CVE-2024-46859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Equinix Metal: fixed race condition on 'mount' Ignition stage (<a href="https://github.com/flatcar/scripts/pull/2308">scripts#2308</a>)</li>
<li>Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. (<a href="https://github.com/flatcar/flatcar/pull/1514">Flatcar#1514</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Azure, HyperV: Added daemons <code>kvp</code>, <code>vss</code>, and <code>fcopy</code> for better HyperV hypervisor integration with Flatcar guests (<a href="https://github.com/flatcar/scripts/pull/2309">scripts#2309</a>).</li>
<li>Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers (<a href="https://github.com/flatcar/scripts/pull/2355">flatcar/scripts#2355</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/992980">6.6.54</a> (includes <a href="https://lwn.net/Articles/992296">6.6.53</a>, <a href="https://lwn.net/Articles/990767/">6.6.52</a>, <a href="https://lwn.net/Articles/990045">6.6.51</a>, <a href="https://lwn.net/Articles/989411/">6.6.50</a>, <a href="https://lwn.net/Articles/988749">6.6.49</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html">3.105</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes">2.6.3</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.17</li>
<li>docker 24.0.9</li>
<li>ignition 2.18.0</li>
<li>kernel 6.6.54</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3975.2.2"/>
    <published>2024-10-10T12:23:10+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3975.2.1</id>
    <title>3975.2.1</title>
    <updated>2026-03-09T16:26:32.214313+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3975.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43877">CVE-2024-43877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43876">CVE-2024-43876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43875">CVE-2024-43875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43881">CVE-2024-43881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43869">CVE-2024-43869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43870">CVE-2024-43870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43856">CVE-2024-43856</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43860">CVE-2024-43860</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43859">CVE-2024-43859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43858">CVE-2024-43858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43833">CVE-2024-43833</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43832">CVE-2024-43832</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43831">CVE-2024-43831</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43829">CVE-2024-43829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43855">CVE-2024-43855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43851">CVE-2024-43851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43850">CVE-2024-43850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43849">CVE-2024-43849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43847">CVE-2024-43847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43845">CVE-2024-43845</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43841">CVE-2024-43841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43839">CVE-2024-43839</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43837">CVE-2024-43837</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43825">CVE-2024-43825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43818">CVE-2024-43818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43817">CVE-2024-43817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42321">CVE-2024-42321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42288">CVE-2024-42288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42297">CVE-2024-42297</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42296">CVE-2024-42296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42295">CVE-2024-42295</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42294">CVE-2024-42294</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42320">CVE-2024-42320</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42318">CVE-2024-42318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42316">CVE-2024-42316</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42314">CVE-2024-42314</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42313">CVE-2024-42313</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42311">CVE-2024-42311</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42310">CVE-2024-42310</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42309">CVE-2024-42309</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42308">CVE-2024-42308</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42290">CVE-2024-42290</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42307">CVE-2024-42307</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42306">CVE-2024-42306</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42303">CVE-2024-42303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42299">CVE-2024-42299</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42298">CVE-2024-42298</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42289">CVE-2024-42289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42281">CVE-2024-42281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42280">CVE-2024-42280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42279">CVE-2024-42279</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42278">CVE-2024-42278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42277">CVE-2024-42277</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42287">CVE-2024-42287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42286">CVE-2024-42286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42285">CVE-2024-42285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52889">CVE-2023-52889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42276">CVE-2024-42276</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43866">CVE-2024-43866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43864">CVE-2024-43864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42274">CVE-2024-42274</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42273">CVE-2024-42273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42272">CVE-2024-42272</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42270">CVE-2024-42270</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42269">CVE-2024-42269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42268">CVE-2024-42268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42267">CVE-2024-42267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43912">CVE-2024-43912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44934">CVE-2024-44934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43905">CVE-2024-43905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43903">CVE-2024-43903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43900">CVE-2024-43900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43906">CVE-2024-43906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43897">CVE-2024-43897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43895">CVE-2024-43895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42259">CVE-2024-42259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44943">CVE-2024-44943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44942">CVE-2024-44942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44941">CVE-2024-44941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44940">CVE-2024-44940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44939">CVE-2024-44939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fix ownership of systemd units shipped with built-in docker/containerd sysexts. The files shipped on production images were accidentally owned by 1000:1000 instead of 0:0. This uid/gid is not present on Flatcar images but would be assigned to the first created user. Due to contents of sysexts and /usr being readonly on Flatcar, the invalid permissions can't be used to escalate privileges. (<a href="https://github.com/flatcar/scripts/pull/2266">scripts#2266</a>)</li>
<li>Equinix Metal: Fixed oem-cloudinit.service. The availability check now uses the https://metadata.platformequinix.com/metadata endpoint. (<a href="https://github.com/flatcar/scripts/pull/2222">scripts#2222</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/987679">6.6.48</a> (includes <a href="https://lwn.net/Articles/986231/">6.6.47</a>, <a href="https://lwn.net/Articles/985672">6.6.46</a>, <a href="https://lwn.net/Articles/985200">6.6.45</a>, <a href="https://lwn.net/Articles/984450">6.6.44</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_104.html">3.104</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.17</li>
<li>docker 24.0.9</li>
<li>ignition 2.18.0</li>
<li>kernel 6.6.48</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3975.2.1"/>
    <published>2024-09-05T11:38:49+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3975.2.0</id>
    <title>3975.2.0</title>
    <updated>2026-03-09T16:26:32.086731+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3815.2.5</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27672">CVE-2022-27672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36402">CVE-2022-36402</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36402">CVE-2022-36402</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48425">CVE-2022-48425</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48628">CVE-2022-48628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1032">CVE-2023-1032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1194">CVE-2023-1194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1281">CVE-2023-1281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1583">CVE-2023-1583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21255">CVE-2023-21255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21264">CVE-2023-21264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2194">CVE-2023-2194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2248">CVE-2023-2248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2248">CVE-2023-2248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2483">CVE-2023-2483</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2598">CVE-2023-2598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28866">CVE-2023-28866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2898">CVE-2023-2898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3117">CVE-2023-3117</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3220">CVE-2023-3220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32247">CVE-2023-32247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32247">CVE-2023-32247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32248">CVE-2023-32248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32248">CVE-2023-32248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32250">CVE-2023-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32250">CVE-2023-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32252">CVE-2023-32252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32252">CVE-2023-32252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32254">CVE-2023-32254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32254">CVE-2023-32254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32257">CVE-2023-32257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32257">CVE-2023-32257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32258">CVE-2023-32258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32258">CVE-2023-32258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3312">CVE-2023-3312</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3312">CVE-2023-3312</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3317">CVE-2023-3317</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33203">CVE-2023-33203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33250">CVE-2023-33250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33250">CVE-2023-33250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3355">CVE-2023-3355</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34255">CVE-2023-34255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34256">CVE-2023-34256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34256">CVE-2023-34256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35824">CVE-2023-35824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35824">CVE-2023-35824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35826">CVE-2023-35826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35826">CVE-2023-35826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3773">CVE-2023-3773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38426">CVE-2023-38426</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38427">CVE-2023-38427</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38428">CVE-2023-38428</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38429">CVE-2023-38429</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38430">CVE-2023-38430</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38431">CVE-2023-38431</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38432">CVE-2023-38432</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38432">CVE-2023-38432</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3865">CVE-2023-3865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3865">CVE-2023-3865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3866">CVE-2023-3866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3866">CVE-2023-3866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3867">CVE-2023-3867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39191">CVE-2023-39191</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4015">CVE-2023-4015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40791">CVE-2023-40791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4132">CVE-2023-4132</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42756">CVE-2023-42756</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44466">CVE-2023-44466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45862">CVE-2023-45862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45898">CVE-2023-45898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4610">CVE-2023-4610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4611">CVE-2023-4611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46343">CVE-2023-46343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50431">CVE-2023-50431</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5090">CVE-2023-5090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51781">CVE-2023-51781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52433">CVE-2023-52433</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52435">CVE-2023-52435</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52436">CVE-2023-52436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52438">CVE-2023-52438</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52440">CVE-2023-52440</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52440">CVE-2023-52440</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52441">CVE-2023-52441</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52442">CVE-2023-52442</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52443">CVE-2023-52443</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52444">CVE-2023-52444</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52446">CVE-2023-52446</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52453">CVE-2023-52453</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52455">CVE-2023-52455</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52458">CVE-2023-52458</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52459">CVE-2023-52459</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52462">CVE-2023-52462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52465">CVE-2023-52465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52468">CVE-2023-52468</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52472">CVE-2023-52472</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52473">CVE-2023-52473</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52474">CVE-2023-52474</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52474">CVE-2023-52474</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52479">CVE-2023-52479</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52480">CVE-2023-52480</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52481">CVE-2023-52481</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52483">CVE-2023-52483</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52487">CVE-2023-52487</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52488">CVE-2023-52488</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52490">CVE-2023-52490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52491">CVE-2023-52491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52493">CVE-2023-52493</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52494">CVE-2023-52494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52495">CVE-2023-52495</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52498">CVE-2023-52498</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52499">CVE-2023-52499</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52503">CVE-2023-52503</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52505">CVE-2023-52505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52506">CVE-2023-52506</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52512">CVE-2023-52512</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52516">CVE-2023-52516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52518">CVE-2023-52518</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52522">CVE-2023-52522</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52526">CVE-2023-52526</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52527">CVE-2023-52527</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52560">CVE-2023-52560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52561">CVE-2023-52561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52562">CVE-2023-52562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52563">CVE-2023-52563</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52565">CVE-2023-52565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52568">CVE-2023-52568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52570">CVE-2023-52570</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52571">CVE-2023-52571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52572">CVE-2023-52572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52573">CVE-2023-52573</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52578">CVE-2023-52578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52584">CVE-2023-52584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52587">CVE-2023-52587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52588">CVE-2023-52588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52589">CVE-2023-52589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52593">CVE-2023-52593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52594">CVE-2023-52594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52595">CVE-2023-52595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52596">CVE-2023-52596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52598">CVE-2023-52598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52599">CVE-2023-52599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52600">CVE-2023-52600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52601">CVE-2023-52601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52602">CVE-2023-52602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52603">CVE-2023-52603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52604">CVE-2023-52604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52606">CVE-2023-52606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52608">CVE-2023-52608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52609">CVE-2023-52609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52611">CVE-2023-52611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52612">CVE-2023-52612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52613">CVE-2023-52613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52614">CVE-2023-52614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52615">CVE-2023-52615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52617">CVE-2023-52617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52618">CVE-2023-52618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52619">CVE-2023-52619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52620">CVE-2023-52620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52622">CVE-2023-52622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52623">CVE-2023-52623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52627">CVE-2023-52627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52629">CVE-2023-52629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52630">CVE-2023-52630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52631">CVE-2023-52631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52632">CVE-2023-52632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52633">CVE-2023-52633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52635">CVE-2023-52635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52636">CVE-2023-52636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52637">CVE-2023-52637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52638">CVE-2023-52638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52640">CVE-2023-52640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52641">CVE-2023-52641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5972">CVE-2023-5972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6111">CVE-2023-6111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6200">CVE-2023-6200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6560">CVE-2023-6560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-7192">CVE-2023-7192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0193">CVE-2024-0193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0443">CVE-2024-0443</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0582">CVE-2024-0582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0584">CVE-2024-0584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0646">CVE-2024-0646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1312">CVE-2024-1312</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22705">CVE-2024-22705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23196">CVE-2024-23196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24861">CVE-2024-24861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26581">CVE-2024-26581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26582">CVE-2024-26582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26587">CVE-2024-26587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26588">CVE-2024-26588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26590">CVE-2024-26590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26592">CVE-2024-26592</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26594">CVE-2024-26594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26597">CVE-2024-26597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26599">CVE-2024-26599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26604">CVE-2024-26604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26606">CVE-2024-26606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26608">CVE-2024-26608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26611">CVE-2024-26611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26612">CVE-2024-26612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26616">CVE-2024-26616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26618">CVE-2024-26618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26620">CVE-2024-26620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26623">CVE-2024-26623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26625">CVE-2024-26625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26627">CVE-2024-26627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26629">CVE-2024-26629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26630">CVE-2024-26630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26631">CVE-2024-26631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26632">CVE-2024-26632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26633">CVE-2024-26633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26634">CVE-2024-26634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26635">CVE-2024-26635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26636">CVE-2024-26636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26638">CVE-2024-26638</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26641">CVE-2024-26641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26644">CVE-2024-26644</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26645">CVE-2024-26645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26646">CVE-2024-26646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26647">CVE-2024-26647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26648">CVE-2024-26648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26649">CVE-2024-26649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26650">CVE-2024-26650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26652">CVE-2024-26652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26660">CVE-2024-26660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26661">CVE-2024-26661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26662">CVE-2024-26662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26663">CVE-2024-26663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26665">CVE-2024-26665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26666">CVE-2024-26666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26667">CVE-2024-26667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26669">CVE-2024-26669</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26670">CVE-2024-26670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26674">CVE-2024-26674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26675">CVE-2024-26675</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26676">CVE-2024-26676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26677">CVE-2024-26677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26679">CVE-2024-26679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26680">CVE-2024-26680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26681">CVE-2024-26681</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26684">CVE-2024-26684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26685">CVE-2024-26685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26690">CVE-2024-26690</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26691">CVE-2024-26691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26692">CVE-2024-26692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26693">CVE-2024-26693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26694">CVE-2024-26694</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26695">CVE-2024-26695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26696">CVE-2024-26696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26697">CVE-2024-26697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26698">CVE-2024-26698</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26700">CVE-2024-26700</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26702">CVE-2024-26702</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26703">CVE-2024-26703</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26705">CVE-2024-26705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26706">CVE-2024-26706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26707">CVE-2024-26707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26708">CVE-2024-26708</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26711">CVE-2024-26711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26712">CVE-2024-26712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26713">CVE-2024-26713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26714">CVE-2024-26714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26715">CVE-2024-26715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26716">CVE-2024-26716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26717">CVE-2024-26717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26718">CVE-2024-26718</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26719">CVE-2024-26719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26723">CVE-2024-26723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26726">CVE-2024-26726</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26730">CVE-2024-26730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26731">CVE-2024-26731</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26734">CVE-2024-26734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26736">CVE-2024-26736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26738">CVE-2024-26738</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26740">CVE-2024-26740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26741">CVE-2024-26741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26742">CVE-2024-26742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26743">CVE-2024-26743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26744">CVE-2024-26744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26745">CVE-2024-26745</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26746">CVE-2024-26746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26747">CVE-2024-26747</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26748">CVE-2024-26748</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26749">CVE-2024-26749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26751">CVE-2024-26751</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26752">CVE-2024-26752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26753">CVE-2024-26753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26754">CVE-2024-26754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26759">CVE-2024-26759</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26760">CVE-2024-26760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26761">CVE-2024-26761</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26763">CVE-2024-26763</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26765">CVE-2024-26765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26767">CVE-2024-26767</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26768">CVE-2024-26768</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26769">CVE-2024-26769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26770">CVE-2024-26770</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26771">CVE-2024-26771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26772">CVE-2024-26772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26774">CVE-2024-26774</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26775">CVE-2024-26775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26776">CVE-2024-26776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26777">CVE-2024-26777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26778">CVE-2024-26778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26779">CVE-2024-26779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26786">CVE-2024-26786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26787">CVE-2024-26787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26788">CVE-2024-26788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26789">CVE-2024-26789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26790">CVE-2024-26790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26791">CVE-2024-26791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26793">CVE-2024-26793</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26795">CVE-2024-26795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26796">CVE-2024-26796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26798">CVE-2024-26798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26799">CVE-2024-26799</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26802">CVE-2024-26802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26803">CVE-2024-26803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26805">CVE-2024-26805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26807">CVE-2024-26807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26809">CVE-2024-26809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41079">CVE-2024-41079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41075">CVE-2024-41075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41074">CVE-2024-41074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41077">CVE-2024-41077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41057">CVE-2024-41057</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41058">CVE-2024-41058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41053">CVE-2024-41053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41055">CVE-2024-41055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41054">CVE-2024-41054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41032">CVE-2024-41032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41031">CVE-2024-41031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41030">CVE-2024-41030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41028">CVE-2024-41028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41027">CVE-2024-41027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41052">CVE-2024-41052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41051">CVE-2024-41051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41050">CVE-2024-41050</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41047">CVE-2024-41047</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41046">CVE-2024-41046</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41025">CVE-2024-41025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41037">CVE-2024-41037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41036">CVE-2024-41036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41034">CVE-2024-41034</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41024">CVE-2024-41024</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42153">CVE-2024-42153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42147">CVE-2024-42147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42160">CVE-2024-42160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42159">CVE-2024-42159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42116">CVE-2024-42116</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42144">CVE-2024-42144</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42143">CVE-2024-42143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42142">CVE-2024-42142</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42141">CVE-2024-42141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42140">CVE-2024-42140</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42113">CVE-2024-42113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42138">CVE-2024-42138</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42136">CVE-2024-42136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42135">CVE-2024-42135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42133">CVE-2024-42133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42132">CVE-2024-42132</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42128">CVE-2024-42128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52888">CVE-2023-52888</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42103">CVE-2024-42103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42102">CVE-2024-42102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42100">CVE-2024-42100</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42109">CVE-2024-42109</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40947">CVE-2024-40947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42068">CVE-2024-42068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42067">CVE-2024-42067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42094">CVE-2024-42094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42084">CVE-2024-42084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42069">CVE-2024-42069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42068">CVE-2024-42068</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42067">CVE-2024-42067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42074">CVE-2024-42074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42073">CVE-2024-42073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42063">CVE-2024-42063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41094">CVE-2024-41094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41088">CVE-2024-41088</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41098">CVE-2024-41098</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41096">CVE-2024-41096</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41084">CVE-2024-41084</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39486">CVE-2024-39486</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41006">CVE-2024-41006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41005">CVE-2024-41005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41004">CVE-2024-41004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40996">CVE-2024-40996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41002">CVE-2024-41002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41001">CVE-2024-41001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41000">CVE-2024-41000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40997">CVE-2024-40997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40993">CVE-2024-40993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40992">CVE-2024-40992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40990">CVE-2024-40990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40987">CVE-2024-40987</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40970">CVE-2024-40970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40976">CVE-2024-40976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40974">CVE-2024-40974</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40973">CVE-2024-40973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40982">CVE-2024-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40981">CVE-2024-40981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40980">CVE-2024-40980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40971">CVE-2024-40971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40955">CVE-2024-40955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40953">CVE-2024-40953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40952">CVE-2024-40952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40951">CVE-2024-40951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40969">CVE-2024-40969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40968">CVE-2024-40968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40967">CVE-2024-40967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40966">CVE-2024-40966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40948">CVE-2024-40948</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40964">CVE-2024-40964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40963">CVE-2024-40963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40962">CVE-2024-40962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40957">CVE-2024-40957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40938">CVE-2024-40938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40936">CVE-2024-40936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40935">CVE-2024-40935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40934">CVE-2024-40934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40932">CVE-2024-40932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40945">CVE-2024-40945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40944">CVE-2024-40944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40943">CVE-2024-40943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40942">CVE-2024-40942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40940">CVE-2024-40940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40939">CVE-2024-40939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40922">CVE-2024-40922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40921">CVE-2024-40921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40920">CVE-2024-40920</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40919">CVE-2024-40919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40918">CVE-2024-40918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40916">CVE-2024-40916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40915">CVE-2024-40915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40928">CVE-2024-40928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40925">CVE-2024-40925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40924">CVE-2024-40924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40923">CVE-2024-40923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40913">CVE-2024-40913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40914">CVE-2024-40914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39503">CVE-2024-39503</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39497">CVE-2024-39497</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40909">CVE-2024-40909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40908">CVE-2024-40908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40906">CVE-2024-40906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40903">CVE-2024-40903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39496">CVE-2024-39496</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-40900">CVE-2024-40900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39509">CVE-2024-39509</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39508">CVE-2024-39508</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39507">CVE-2024-39507</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39505">CVE-2024-39505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39504">CVE-2024-39504</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39495">CVE-2024-39495</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39469">CVE-2024-39469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39298">CVE-2024-39298</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39371">CVE-2024-39371</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37078">CVE-2024-37078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39493">CVE-2024-39493</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39485">CVE-2024-39485</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39484">CVE-2024-39484</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39483">CVE-2024-39483</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39482">CVE-2024-39482</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39481">CVE-2024-39481</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39480">CVE-2024-39480</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39479">CVE-2024-39479</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39475">CVE-2024-39475</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39473">CVE-2024-39473</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39474">CVE-2024-39474</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39471">CVE-2024-39471</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39470">CVE-2024-39470</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39468">CVE-2024-39468</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39467">CVE-2024-39467</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39466">CVE-2024-39466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39464">CVE-2024-39464</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39461">CVE-2024-39461</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39462">CVE-2024-39462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39296">CVE-2024-39296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39276">CVE-2024-39276</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38661">CVE-2024-38661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38385">CVE-2024-38385</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37354">CVE-2024-37354</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39362">CVE-2024-39362</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39301">CVE-2024-39301</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48772">CVE-2022-48772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39491">CVE-2024-39491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39490">CVE-2024-39490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39489">CVE-2024-39489</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39488">CVE-2024-39488</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37021">CVE-2024-37021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36479">CVE-2024-36479</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35247">CVE-2024-35247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34030">CVE-2024-34030</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34027">CVE-2024-34027</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33847">CVE-2024-33847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39292">CVE-2024-39292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38667">CVE-2024-38667</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39291">CVE-2024-39291</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38384">CVE-2024-38384</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38664">CVE-2024-38664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38663">CVE-2024-38663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36481">CVE-2024-36481</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36477">CVE-2024-36477</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34777">CVE-2024-34777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-39277">CVE-2024-39277</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38662">CVE-2024-38662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38780">CVE-2024-38780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38659">CVE-2024-38659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38634">CVE-2024-38634</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38637">CVE-2024-38637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38636">CVE-2024-38636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38635">CVE-2024-38635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36484">CVE-2024-36484</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36286">CVE-2024-36286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36281">CVE-2024-36281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33621">CVE-2024-33621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38633">CVE-2024-38633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38632">CVE-2024-38632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38630">CVE-2024-38630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38629">CVE-2024-38629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38628">CVE-2024-38628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38627">CVE-2024-38627</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38625">CVE-2024-38625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38624">CVE-2024-38624</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33619">CVE-2024-33619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38623">CVE-2024-38623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38622">CVE-2024-38622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38621">CVE-2024-38621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38391">CVE-2024-38391</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38390">CVE-2024-38390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38388">CVE-2024-38388</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38381">CVE-2024-38381</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37356">CVE-2024-37356</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-37353">CVE-2024-37353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-31076">CVE-2024-31076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38620">CVE-2024-38620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38617">CVE-2024-38617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38616">CVE-2024-38616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38614">CVE-2024-38614</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38613">CVE-2024-38613</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38612">CVE-2024-38612</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38611">CVE-2024-38611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38610">CVE-2024-38610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38618">CVE-2024-38618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38607">CVE-2024-38607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38605">CVE-2024-38605</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38604">CVE-2024-38604</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38603">CVE-2024-38603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38602">CVE-2024-38602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38598">CVE-2024-38598</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38597">CVE-2024-38597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38596">CVE-2024-38596</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38593">CVE-2024-38593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38591">CVE-2024-38591</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38600">CVE-2024-38600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38589">CVE-2024-38589</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38590">CVE-2024-38590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38575">CVE-2024-38575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38584">CVE-2024-38584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38583">CVE-2024-38583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38582">CVE-2024-38582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38581">CVE-2024-38581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38577">CVE-2024-38577</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38588">CVE-2024-38588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38587">CVE-2024-38587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38585">CVE-2024-38585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38576">CVE-2024-38576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38568">CVE-2024-38568</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38572">CVE-2024-38572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38571">CVE-2024-38571</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38569">CVE-2024-38569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36979">CVE-2024-36979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38546">CVE-2024-38546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38543">CVE-2024-38543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38567">CVE-2024-38567</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38566">CVE-2024-38566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38565">CVE-2024-38565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38562">CVE-2024-38562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38561">CVE-2024-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38557">CVE-2024-38557</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38539">CVE-2024-38539</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38554">CVE-2024-38554</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38553">CVE-2024-38553</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38552">CVE-2024-38552</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38551">CVE-2024-38551</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38550">CVE-2024-38550</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38549">CVE-2024-38549</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38547">CVE-2024-38547</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36977">CVE-2024-36977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36975">CVE-2024-36975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36969">CVE-2024-36969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36968">CVE-2024-36968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36967">CVE-2024-36967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36965">CVE-2024-36965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36966">CVE-2024-36966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36963">CVE-2024-36963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36962">CVE-2024-36962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36960">CVE-2024-36960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36951">CVE-2024-36951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36949">CVE-2024-36949</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36946">CVE-2024-36946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36945">CVE-2024-36945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36954">CVE-2024-36954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36953">CVE-2024-36953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36916">CVE-2024-36916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36914">CVE-2024-36914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36913">CVE-2024-36913</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36912">CVE-2024-36912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36911">CVE-2024-36911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36939">CVE-2024-36939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36938">CVE-2024-36938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36937">CVE-2024-36937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36910">CVE-2024-36910</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36934">CVE-2024-36934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36933">CVE-2024-36933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36931">CVE-2024-36931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36930">CVE-2024-36930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36928">CVE-2024-36928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36927">CVE-2024-36927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36909">CVE-2024-36909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36925">CVE-2024-36925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36922">CVE-2024-36922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36921">CVE-2024-36921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36920">CVE-2024-36920</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36918">CVE-2024-36918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36917">CVE-2024-36917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36908">CVE-2024-36908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36888">CVE-2024-36888</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36887">CVE-2024-36887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36886">CVE-2024-36886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36885">CVE-2024-36885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36883">CVE-2024-36883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36906">CVE-2024-36906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36905">CVE-2024-36905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36903">CVE-2024-36903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36902">CVE-2024-36902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36901">CVE-2024-36901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36900">CVE-2024-36900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36882">CVE-2024-36882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36898">CVE-2024-36898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36897">CVE-2024-36897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36896">CVE-2024-36896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36895">CVE-2024-36895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36893">CVE-2024-36893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36891">CVE-2024-36891</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36890">CVE-2024-36890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36881">CVE-2024-36881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36032">CVE-2024-36032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52882">CVE-2023-52882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36031">CVE-2024-36031</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36028">CVE-2024-36028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36011">CVE-2024-36011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35947">CVE-2024-35947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36029">CVE-2024-36029</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35990">CVE-2024-35990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35999">CVE-2024-35999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35998">CVE-2024-35998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35997">CVE-2024-35997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35996">CVE-2024-35996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35995">CVE-2024-35995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35993">CVE-2024-35993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35992">CVE-2024-35992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36009">CVE-2024-36009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36008">CVE-2024-36008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36007">CVE-2024-36007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36006">CVE-2024-36006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36004">CVE-2024-36004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36003">CVE-2024-36003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36000">CVE-2024-36000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35991">CVE-2024-35991</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35988">CVE-2024-35988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35987">CVE-2024-35987</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35986">CVE-2024-35986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35985">CVE-2024-35985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35983">CVE-2024-35983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35984">CVE-2024-35984</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35855">CVE-2024-35855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35853">CVE-2024-35853</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35851">CVE-2024-35851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35850">CVE-2024-35850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35849">CVE-2024-35849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35858">CVE-2024-35858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35857">CVE-2024-35857</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35856">CVE-2024-35856</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35847">CVE-2024-35847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27396">CVE-2024-27396</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27395">CVE-2024-27395</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35981">CVE-2024-35981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35980">CVE-2024-35980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35870">CVE-2024-35870</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35812">CVE-2024-35812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27013">CVE-2024-27013</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27018">CVE-2024-27018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27016">CVE-2024-27016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27015">CVE-2024-27015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27014">CVE-2024-27014</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26988">CVE-2024-26988</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26987">CVE-2024-26987</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26986">CVE-2024-26986</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26984">CVE-2024-26984</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26983">CVE-2024-26983</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27009">CVE-2024-27009</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27008">CVE-2024-27008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27005">CVE-2024-27005</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27004">CVE-2024-27004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27003">CVE-2024-27003</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27002">CVE-2024-27002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27001">CVE-2024-27001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27000">CVE-2024-27000</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26999">CVE-2024-26999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26981">CVE-2024-26981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26998">CVE-2024-26998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26997">CVE-2024-26997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26996">CVE-2024-26996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26994">CVE-2024-26994</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26992">CVE-2024-26992</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26990">CVE-2024-26990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26989">CVE-2024-26989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26936">CVE-2024-26936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26980">CVE-2024-26980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26939">CVE-2024-26939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36026">CVE-2024-36026</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35961">CVE-2024-35961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35959">CVE-2024-35959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35956">CVE-2024-35956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35982">CVE-2024-35982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35955">CVE-2024-35955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35979">CVE-2024-35979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35978">CVE-2024-35978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35977">CVE-2024-35977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35976">CVE-2024-35976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35975">CVE-2024-35975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35974">CVE-2024-35974</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35973">CVE-2024-35973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35972">CVE-2024-35972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35954">CVE-2024-35954</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35971">CVE-2024-35971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35970">CVE-2024-35970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35969">CVE-2024-35969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35967">CVE-2024-35967</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35953">CVE-2024-35953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35951">CVE-2024-35951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923</a><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36023">CVE-2024-36023</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35941">CVE-2024-35941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35946">CVE-2024-35946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35945">CVE-2024-35945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35944">CVE-2024-35944</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35943">CVE-2024-35943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35942">CVE-2024-35942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35925">CVE-2024-35925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35924">CVE-2024-35924</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35923">CVE-2024-35923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35922">CVE-2024-35922</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35921">CVE-2024-35921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35920">CVE-2024-35920</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35940">CVE-2024-35940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35939">CVE-2024-35939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35938">CVE-2024-35938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35919">CVE-2024-35919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35936">CVE-2024-35936</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35935">CVE-2024-35935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35934">CVE-2024-35934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35933">CVE-2024-35933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35932">CVE-2024-35932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35930">CVE-2024-35930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35929">CVE-2024-35929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35928">CVE-2024-35928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35927">CVE-2024-35927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52699">CVE-2023-52699</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35918">CVE-2024-35918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26817">CVE-2024-26817</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36021">CVE-2024-36021</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36018">CVE-2024-36018</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-36019">CVE-2024-36019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35910">CVE-2024-35910</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35917">CVE-2024-35917</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35916">CVE-2024-35916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35915">CVE-2024-35915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35912">CVE-2024-35912</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35911">CVE-2024-35911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35888">CVE-2024-35888</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35887">CVE-2024-35887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35886">CVE-2024-35886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35885">CVE-2024-35885</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35884">CVE-2024-35884</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35909">CVE-2024-35909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35908">CVE-2024-35908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35907">CVE-2024-35907</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35903">CVE-2024-35903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35902">CVE-2024-35902</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35901">CVE-2024-35901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35883">CVE-2024-35883</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35900">CVE-2024-35900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35893">CVE-2024-35893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35892">CVE-2024-35892</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35891">CVE-2024-35891</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35882">CVE-2024-35882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35860">CVE-2024-35860</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35866">CVE-2024-35866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35865">CVE-2024-35865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35880">CVE-2024-35880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35879">CVE-2024-35879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35877">CVE-2024-35877</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35876">CVE-2024-35876</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35875">CVE-2024-35875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35872">CVE-2024-35872</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35871">CVE-2024-35871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35799">CVE-2024-35799</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27393">CVE-2024-27393</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27080">CVE-2024-27080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921</a><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27055">CVE-2024-27055</a><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52671">CVE-2023-52671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35826">CVE-2024-35826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35824">CVE-2024-35824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35825">CVE-2024-35825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35804">CVE-2024-35804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35803">CVE-2024-35803</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35802">CVE-2024-35802</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35801">CVE-2024-35801</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35800">CVE-2024-35800</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35798">CVE-2024-35798</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35822">CVE-2024-35822</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35821">CVE-2024-35821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35819">CVE-2024-35819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35818">CVE-2024-35818</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35816">CVE-2024-35816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35797">CVE-2024-35797</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35814">CVE-2024-35814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35813">CVE-2024-35813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35812">CVE-2024-35812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35810">CVE-2024-35810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35809">CVE-2024-35809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35807">CVE-2024-35807</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35806">CVE-2024-35806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35805">CVE-2024-35805</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35795">CVE-2024-35795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35796">CVE-2024-35796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35792">CVE-2024-35792</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35791">CVE-2024-35791</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35790">CVE-2024-35790</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35787">CVE-2024-35787</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35786">CVE-2024-35786</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35784">CVE-2024-35784</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-35785">CVE-2024-35785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27063">CVE-2024-27063</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27062">CVE-2024-27062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27061">CVE-2024-27061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27058">CVE-2024-27058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27059">CVE-2024-27059</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26965">CVE-2024-26965</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26973">CVE-2024-26973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26971">CVE-2024-26971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26970">CVE-2024-26970</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26969">CVE-2024-26969</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26968">CVE-2024-26968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26979">CVE-2024-26979</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26978">CVE-2024-26978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26977">CVE-2024-26977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26975">CVE-2024-26975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26966">CVE-2024-26966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26937">CVE-2024-26937</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26934">CVE-2024-26934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26933">CVE-2024-26933</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26964">CVE-2024-26964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26963">CVE-2024-26963</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26960">CVE-2024-26960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26959">CVE-2024-26959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26958">CVE-2024-26958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26957">CVE-2024-26957</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26956">CVE-2024-26956</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26955">CVE-2024-26955</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26953">CVE-2024-26953</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26951">CVE-2024-26951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26950">CVE-2024-26950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26947">CVE-2024-26947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26946">CVE-2024-26946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26943">CVE-2024-26943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26940">CVE-2024-26940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26938">CVE-2024-26938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52647">CVE-2023-52647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52648">CVE-2023-52648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27437">CVE-2024-27437</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26814">CVE-2024-26814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26813">CVE-2024-26813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26810">CVE-2024-26810</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26812">CVE-2024-26812</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1972">CVE-2023-1972</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629</a>)</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html">coreutils-2024-03-28</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0684">CVE-2024-0684</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2004">CVE-2024-2004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2379">CVE-2024-2379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2466">CVE-2024-2466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46219">CVE-2023-46219</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757</a>)</li>
<li>gcc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5156">CVE-2023-5156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6246">CVE-2023-6246</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6779">CVE-2023-6779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6780">CVE-2023-6780</a>)</li>
<li>gnupg (<a href="https://gnupg.org/blog/20240125-smartcard-backup-key.html">gnupg-2024-01-25</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583</a>)</li>
<li>less (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487</a>)</li>
<li>libuv (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322</a>)</li>
<li>nghttp2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727</a>)</li>
<li>sudo (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465</a>)</li>
<li>traceroute (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48231">CVE-2023-48231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48232">CVE-2023-48232</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48233">CVE-2023-48233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48234">CVE-2023-48234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48235">CVE-2023-48235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48236">CVE-2023-48236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48237">CVE-2023-48237</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48706">CVE-2023-48706</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5344">CVE-2023-5344</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5441">CVE-2023-5441</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5535">CVE-2023-5535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46246">CVE-2023-46246</a>)</li>
<li>SDK: dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868</a>)</li>
<li>SDK: perl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47038">CVE-2023-47038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678</a>)</li>
<li>SDK: python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450</a>, <a href="https://github.com/python/cpython/issues/81194">gh-81194</a>, <a href="https://github.com/python/cpython/issues/113659">gh-113659</a>, <a href="https://github.com/python/cpython/issues/102388">gh-102388</a>, <a href="https://github.com/python/cpython/issues/114572">gh-114572</a>, <a href="https://github.com/python/cpython/issues/115243">gh-115243</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed issue file generation from '/etc/issue.d' (<a href="https://github.com/flatcar/scripts/pull/2018">scripts#2018</a>)</li>
<li>Fixed the handling of OEM update payloads in a Nebraska response with self-hosted packages (<a href="https://github.com/flatcar/ue-rs/pull/49">ue-rs#49</a>)</li>
<li>Fixes kubevirt vm creation by ensuring that /dev/vhost-net exists (<a href="https://github.com/flatcar/Flatcar/issues/1336">Flatcar#1336</a>)</li>
<li>Hetzner: Fixed duplicated prefix in the Afterburn metadata (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
<li>Removed custom CloudSigma coreos-cloudinit service configuration since it will be called with the cloudsigma oem anyway. The restart of the service can also cause the serial port to be stuck in an nondeterministic state which breaks future runs.</li>
<li>Resolved kmod static nodes creation in bootengine (<a href="https://github.com/flatcar/bootengine/pull/85">bootengine#85</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added zram-generator package to the image (<a href="https://github.com/flatcar/scripts/pull/1772">scripts#1772</a>)</li>
<li>A new format <code>qemu_uefi_secure</code> is introduced to test Flatcar for SecureBoot-enabled features. The format will be later merged into <code>qemu_uefi</code>.</li>
<li>Added Intel igc driver to support I225/I226 family NICs. (<a href="https://github.com/flatcar/scripts/pull/1786">flatcar/scripts#1786</a>)</li>
<li>Added Hetzner images (<a href="https://github.com/flatcar/scripts/pull/1880">flatcar/scripts#1880</a>)</li>
<li>Added Hyper-V VHDX image (<a href="https://github.com/flatcar/scripts/pull/1791">flatcar/scripts#1791</a>)</li>
<li>Added Ignition Clevis support for encrypted disks unlocked with a TPM2 device or a Tang server (<a href="https://github.com/flatcar/scripts/pull/1560">scripts#1560</a>)</li>
<li>Added KubeVirt qcow2 image for amd64/arm64 (<a href="https://github.com/flatcar/scripts/pull/1962">flatcar/scripts#1962</a>)</li>
<li>Added Scaleway images (<a href="https://github.com/flatcar/scripts/pull/1683">flatcar/scripts#1683</a>)</li>
<li>Added support for unlocking the rootfs with a TPM set up by systemd-cryptenroll (<a href="https://github.com/flatcar/bootengine/pull/93">bootengine#93</a>)</li>
<li>Backported systemd-sysext mutable overlays functionality from yet-unreleased systemd v256. (<a href="https://github.com/flatcar/scripts/pull/1753">flatcar/scripts#1753</a>)</li>
<li>Enabled amd-pstate,amd-pstate-epp cpufreq drivers for some AMD CPUs in the kernel. (<a href="https://github.com/flatcar/scripts/pull/1770">flatcar/scripts#1770</a>)</li>
<li>Enabled ntpd by default on AWS &amp; GCP, enabled chronyd by default on Azure. The native time sync source is used on each cloud. (<a href="https://github.com/flatcar/scripts/pull/1792">scripts#1792</a>)</li>
<li>Enabled the GRUB TPM2 module to measure the boot code path and files into PCR 8+9 in UEFI (<a href="https://github.com/flatcar/scripts/pull/1861">scripts#1861</a>)</li>
<li>Enabled the ptp_vmw module in the kernel.</li>
<li>Hetzner: Added <code>COREOS_HETZNER_PRIVATE_IPV4_0</code> Afterburn attribute for Hetzner private IPs (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
<li>Hyper-V images, both .vhd and .vhdx files are available as <code>zip</code> compressed, switching from <code>bzip2</code> to a built-in available Windows compression - <code>zip</code> (<a href="https://github.com/flatcar/scripts/pull/1878">scripts#1878</a>)</li>
<li>OpenStack, Brightbox: Added the <code>flatcar.autologin</code> kernel cmdline parameter by default as the hypervisor manages access to the console (<a href="https://github.com/flatcar/scripts/pull/1866">scripts#1866</a>)</li>
<li>Provided a Podman Flatcar extension as optional systemd-sysext image with the release. Write 'podman' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning (<a href="https://github.com/flatcar/scripts/pull/1964">scripts#1964</a>)</li>
<li>OpenStack: Changed metadata hostname source order. The service first tries with the config drive then fallback on the metadata service. (<a href="https://github.com/flatcar/bootengine/pull/96">bootengine#96</a>)</li>
<li>Provided a ZFS-2.2.2 Flatcar extension as optional systemd-sysext image with the release. Write 'zfs' to <code>/etc/flatcar/enabled-sysext.conf</code> through Ignition and the sysext will be installed during provisioning. ZFS support is experimental and ZFS is not supported for the root partition. (<a href="https://github.com/flatcar/scripts/pull/1742">flatcar/scripts#1742</a>)</li>
<li>Removed Linux drivers for Mellanox Technologies Switch ASICs family and Spectrum/Spectrum-2/Spectrum-3/Spectrum-4 Ethernet Switch ASICs to reduce the initrd size on AMD64 by ~5MB (<a href="https://github.com/flatcar/scripts/pull/1734">flatcar/scripts#1734</a>). This change is part of the effort to reduce the initrd size (<a href="https://github.com/flatcar/Flatcar/issues/1381">Flatcar#1381</a>).</li>
<li>Removed <code>actool</code> from the image and <code>acbuild</code> from the SDK as these tools are deprecated and not used (<a href="https://github.com/flatcar/scripts/pull/1817">scripts#1817</a>)</li>
<li>Scaleway: images are now provided directly as <code>.qcow2</code> to ease the import on Scaleway (<a href="https://github.com/flatcar/scripts/pull/1953">scripts#1953</a>)</li>
<li>Switched ptp_kvm from kernel builtin to module.</li>
<li>The default VM memory was bumped to 2 GB in the Qemu script and for VMware OVFs</li>
<li>Update generation SLSA provenance info from v0.2 to v1.0.</li>
<li>Removed coreos-cloudinit support for automatic keys conversion (e.g <code>reboot-strategy</code> -&gt; <code>reboot_strategy</code>) (<a href="https://github.com/flatcar/scripts/pull/1687">scripts#1687</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/983655">6.6.43</a> (includes <a href="https://lwn.net/Articles/983333">6.6.42</a>, <a href="https://lwn.net/Articles/982381">6.6.41</a>, <a href="https://lwn.net/Articles/982050">6.6.40</a>, <a href="https://lwn.net/Articles/981719">6.6.39</a>, <a href="https://lwn.net/Articles/981255">6.6.38</a>, <a href="https://lwn.net/Articles/980860">6.6.37</a>, <a href="https://lwn.net/Articles/979850">6.6.36</a>, <a href="https://lwn.net/Articles/979262">6.6.35</a>, <a href="https://lwn.net/Articles/978593">6.6.34</a>, <a href="https://lwn.net/Articles/978141">6.6.33</a>, <a href="https://lwn.net/Articles/975075">6.6.32</a>, <a href="https://lwn.net/Articles/974072">6.6.31</a>, <a href="https://lwn.net/Articles/972211">6.6.30</a>, <a href="https://lwn.net/Articles/971363">6.6.29</a>, <a href="https://lwn.net/Articles/970172">6.6.28</a>, <a href="https://lwn.net/Articles/969734">6.6.27</a>, <a href="https://lwn.net/Articles/969352">6.6.26</a>, <a href="https://lwn.net/Articles/968470">6.6.25</a>, <a href="https://lwn.net/Articles/968253">6.6.24</a>, <a href="https://lwn.net/Articles/966758">6.6.23</a>, <a href="https://lwn.net/Articles/965606">6.6.22</a>, <a href="https://lwn.net/Articles/964561">6.6.21</a>, <a href="https://lwn.net/Articles/964307">6.6.20</a>, <a href="https://lwn.net/Articles/964173">6.6.19</a>, <a href="https://lwn.net/Articles/963357">6.6.18</a>, <a href="https://lwn.net/Articles/962558">6.6.17</a>, <a href="https://lwn.net/Articles/961011">6.6.16</a>, <a href="https://lwn.net/Articles/960441">6.6.15</a>, <a href="https://lwn.net/Articles/959512">6.6.14</a>, <a href="https://lwn.net/Articles/958862">6.6.13</a>, <a href="https://lwn.net/Articles/958342">6.6.12</a>, <a href="https://lwn.net/Articles/957375">6.6.11</a>, <a href="https://lwn.net/Articles/957008">6.6.10</a>, <a href="https://lwn.net/Articles/956525">6.6.9</a>, <a href="https://lwn.net/Articles/955813">6.6.8</a>, <a href="https://lwn.net/Articles/954990">6.6.7</a>, <a href="https://kernelnewbies.org/Linux_6.6">6.6</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240513">20240513</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240410">20240410</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240312">20240312</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240220">20240220</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240115">20240115</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231211">20231211</a>))</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.20.14">1.20.14</a> (includes <a href="https://go.dev/doc/devel/release#go1.20.13">1.20.13</a>))</li>
<li>Ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2180-2024-03-01">2.18.0</a> (includes <a href="https://coreos.github.io/ignition/release-notes/#ignition-2170-2023-11-20">2.17.0</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2162-2023-07-12">2.16.2</a>, <a href="https://coreos.github.io/ignition/release-notes/#ignition-2161-2023-07-10">2.16.1</a> and <a href="https://coreos.github.io/ignition/release-notes/#ignition-2160-2023-06-29">2.16.0</a>))</li>
<li>acl (<a href="https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00012.html">2.3.2</a>)</li>
<li>afterburn (<a href="https://github.com/coreos/afterburn/releases/tag/v5.5.1">5.5.1</a>)</li>
<li>attr (<a href="https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00011.html">2.5.2</a>)</li>
<li>audit (<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.1">3.1.1</a>)</li>
<li>bash (<a href="https://git.savannah.gnu.org/cgit/bash.git/log/?id=2bb3cbefdb8fd019765b1a9cc42ecf37ff22fec6">5.2_p21</a>)</li>
<li>bind-tools (<a href="https://bind9.readthedocs.io/en/v9.16.48/notes.html#notes-for-bind-9-16-48">9.16.48</a>)</li>
<li>binutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00009.html">2.41</a>)</li>
<li>bpftool (<a href="https://kernelnewbies.org/Linux_6.7#Tracing.2C_probing_and_BPF">6.7.6</a> (includes <a href="https://kernelnewbies.org/Linux_6.5#Tracing.2C_perf_and_BPF">6.5.7</a>))</li>
<li>c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_27_0">1.27.0</a> (includes <a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_26_0">1.26.0</a>, <a href="https://c-ares.org/changelog.html#1_25_0">1.25.0</a>, <a href="https://c-ares.org/changelog.html#1_21_0">1.21.0</a>))</li>
<li>cJSON (<a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.17">1.7.17</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_103.html">3.103</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102.html">3.102</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102_1.html">3.102.1</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101_1.html">3.101.1</a>))</li>
<li>checkpolicy (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.17">1.7.17</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.16">1.7.16</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.15">1.7.15</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.14">1.7.14</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.13">1.7.13</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.12">1.7.12</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.11">1.7.11</a>))</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html">9.5</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2023-08/msg00007.html">9.4</a>))</li>
<li>curl (<a href="https://curl.se/changes.html#8_7_1">8.7.1</a> (includes <a href="https://curl.se/changes.html#8_7_0">8.7.0</a>, <a href="https://curl.se/changes.html#8_6_0">8.6.0</a>, <a href="https://curl.se/changes.html#8_5_0">8.5.0</a>))</li>
<li>docker (<a href="https://github.com/moby/moby/releases/tag/v24.0.9">24.0.9</a>)</li>
<li>elfutils (<a href="https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=0420d3b8376877c1b11712f1aad90a2e2b6f6d06;hb=c1058da5a450e33e72b72abb53bc3ffd7f6b361b">0.190</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.7">6.7</a> (includes <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.6">6.6</a>))</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_6_2/expat/Changes">2.6.2</a> (includes <a href="https://github.com/libexpat/libexpat/blob/R_2_6_1/expat/Changes">2.6.1</a> and <a href="https://github.com/libexpat/libexpat/blob/R_2_6_0/expat/Changes">2.6.0</a>))</li>
<li>gawk (<a href="https://lwn.net/Articles/949829/">5.3.0</a>)</li>
<li>gentoolkit (<a href="https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.3">0.6.3</a>)</li>
<li>gettext (<a href="https://savannah.gnu.org/news/?id=10544">0.22.4</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.43.2/Documentation/RelNotes/2.43.2.txt">2.43.2</a> (includes <a href="https://github.com/git/git/blob/v2.43.0/Documentation/RelNotes/2.43.0.txt">2.43.0</a>, <a href="https://github.com/git/git/blob/v2.42.0/Documentation/RelNotes/2.42.0.txt">2.42.0</a>))</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/blob/2.78.3/NEWS">2.78.3</a>)</li>
<li>glibc (<a href="https://sourceware.org/pipermail/libc-alpha/2023-July/150524.html">2.38</a>)</li>
<li>gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000481.html">2.4.4</a> (includes <a href="https://dev.gnupg.org/T6307">2.2.42</a>))</li>
<li>gnutls (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2024-April/004846.html">3.8.5</a> (includes <a href="https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html">3.8.4</a>, <a href="https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html">3.8.2</a>))</li>
<li>groff (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00001.html">1.23.0</a>)</li>
<li>hwdata (<a href="https://github.com/vcrhonek/hwdata/commits/v0.376">0.376</a>)</li>
<li>inih (<a href="https://github.com/benhoyt/inih/releases/tag/r58">58</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312">20240312</a> (includes <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114">20231114_p20231114</a>))</li>
<li>iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.16">3.16</a>)</li>
<li>iproute2 (<a href="https://marc.info/?l=linux-netdev&amp;m=169929000929786&amp;w=2">6.6.0</a>)</li>
<li>ipset (<a href="https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.21">7.21</a> (includes <a href="https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.20">7.20</a>, <a href="https://git.netfilter.org/ipset/tree/ChangeLog?id=ce6db35a0ea950e850ebe7c50ce46908c1c3bb2b">7.19</a>))</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20240117">20240117</a> (includes <a href="https://github.com/iputils/iputils/releases/tag/20231222">20231222</a>)</li>
<li>jq (<a href="https://github.com/jqlang/jq/releases/tag/jq-1.7.1">1.7.1</a> (includes <a href="https://github.com/jqlang/jq/releases/tag/jq-1.7">1.7</a>))</li>
<li>kbd (<a href="https://github.com/legionus/kbd/releases/tag/v2.6.4">2.6.4</a>)</li>
<li>kmod (<a href="https://github.com/kmod-project/kmod/blob/v31/NEWS">31</a>)</li>
<li>less (<a href="https://www.greenwoodsoftware.com/less/news.643.html">643</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.2">3.7.2</a>)</li>
<li>libbsd (<a href="https://lists.freedesktop.org/archives/libbsd/2024-January/000377.html">0.11.8</a>)</li>
<li>libcap-ng (<a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.4">0.8.4</a>)</li>
<li>libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.4">1.16.4</a>)</li>
<li>libgcrypt (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=b767dc1170eb479b9a311cca4074c58e4eedaf0b;hb=aa1610866f8e42bdc272584f0a717f32ee050a22">1.10.3</a>)</li>
<li>libidn2 (<a href="https://gitlab.com/libidn/libidn2/-/blob/v2.3.7/NEWS">2.3.7</a> (includes <a href="https://gitlab.com/libidn/libidn2/-/releases/v2.3.4">2.3.4</a>))</li>
<li>libksba (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=48b42025773e88fbb78d015d1f154fef4c80ef9f;hb=5b220df6f8216a9d5f6139c7b17f075374a27480">1.6.6</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=369cfb5d91bf232685a6c5b156453a624e11ed67;hb=7b3e4785e54280d1a13c5bc839bdc6722d898ac7">1.6.5</a>))</li>
<li>libnsl (<a href="https://github.com/thkukuk/libnsl/releases/tag/v2.0.1">2.0.1</a>)</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.8">1.8</a> (includes <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.7.1">1.7.1</a>,  <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.7">1.7</a>))</li>
<li>libpng (<a href="https://github.com/pnggroup/libpng/blob/v1.6.43/ANNOUNCE">1.6.43</a> (includes <a href="https://github.com/pnggroup/libpng/blob/v1.6.42/ANNOUNCE">1.6.42</a> and <a href="https://github.com/pnggroup/libpng/blob/v1.6.41/ANNOUNCE">1.6.41</a>))</li>
<li>libpsl (<a href="https://github.com/rockdaboot/libpsl/blob/0.21.5/NEWS">0.21.5</a>)</li>
<li>libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.5">2.5.5</a>)</li>
<li>libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>libsemanage (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>libunistring (<a href="https://savannah.gnu.org/news/?id=10599">1.2</a>)</li>
<li>libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.48.0">1.48.0</a> (includes <a href="https://github.com/libuv/libuv/releases/tag/v1.47.0">1.47.0</a>))</li>
<li>libverto (<a href="https://github.com/latchset/libverto/releases/tag/0.3.2">0.3.2</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.5">2.12.5</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.12.4/NEWS">2.12.4</a>))</li>
<li>libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.39">1.1.39</a>)</li>
<li>lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.99.3">4.99.3</a> (includes <a href="https://github.com/lsof-org/lsof/releases/tag/4.99.2">4.99.2</a>, <a href="https://github.com/lsof-org/lsof/releases/tag/4.99.1">4.99.1</a>, <a href="https://github.com/lsof-org/lsof/blob/4.99.0/00DIST#L5523">4.99.0</a>))</li>
<li>lz4 (<a href="https://github.com/lz4/lz4/releases/tag/v1.9.4">1.9.4</a>)</li>
<li>mime-types (<a href="https://pagure.io/mailcap/blob/9699055a1b4dfb90f7594ee2e8dda705fa56d3b8/f/NEWS">2.1.54</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/commits/0.9.7">0.9.7</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.61.0">1.61.0</a> (includes <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.58.0">1.58.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.59.0">1.59.0</a> and <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.60.0">1.60.0</a>))</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.8">2.8</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7.1">2.7.1</a>, <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7">2.7</a>)</li>
<li>openssl (<a href="https://github.com/openssl/openssl/blob/openssl-3.2.1/CHANGES.md">3.2.1</a> (includes <a href="https://github.com/openssl/openssl/blob/openssl-3.0.12/NEWS.md#major-changes-between-openssl-3011-and-openssl-3012-24-oct-2023">3.0.12</a>))</li>
<li>policycoreutils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>readline (<a href="https://git.savannah.gnu.org/cgit/readline.git/log/?id=bfe9c573a9e376323929c80b2b71c59727fab0cc">8.2_p7</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.12">1.1.12</a>)</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.18.9.html">4.18.9</a>)</li>
<li>selinux-base (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-base-policy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-container (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-dbus (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-refpolicy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240226">2.20240226</a>)</li>
<li>selinux-sssd (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>selinux-unconfined (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002">2.20231002</a>)</li>
<li>semodule-utils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.6">3.6</a>)</li>
<li>shim (<a href="https://github.com/rhboot/shim/releases/tag/15.8">15.8</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_45_1.html">3.45.1</a> (includes <a href="https://www.sqlite.org/releaselog/3_44_2.html">3.44.2</a>))</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.6">6.6</a>)</li>
<li>sudo (<a href="https://www.sudo.ws/releases/stable/#1.9.15p5">1.9.15p5</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/commits/v255.4/">255.4</a> (includes <a href="https://github.com/systemd/systemd-stable/releases/tag/v255.3">255.3</a>))</li>
<li>thin-provisioning-tools (<a href="https://github.com/jthornber/thin-provisioning-tools/commits/v1.0.10/">1.0.10</a>)</li>
<li>traceroute (<a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.5/">2.1.5</a> (includes <a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute%202.1.4/">2.1.4</a>, <a href="https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/">2.1.3</a>))</li>
<li>usbutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v017">017</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v016">016</a>))</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/blob/v2.39.3/Documentation/releases/v2.39.3-ReleaseNotes">2.39.3</a> (includes <a href="https://github.com/util-linux/util-linux/blob/v2.39.2/Documentation/releases/v2.39.2-ReleaseNotes">2.39.2</a>))</li>
<li>vim (<a href="https://github.com/vim/vim/commits/v9.0.2167/">9.0.2167</a> (includes (<a href="https://github.com/vim/vim/commits/v9.0.2092/">9.0.2092</a>)))</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.20/debian/changelog">5.5.20</a>)</li>
<li>xmlsec (<a href="https://github.com/lsh123/xmlsec/releases/tag/1.3.3">1.3.3</a> (includes <a href="https://github.com/lsh123/xmlsec/releases/tag/xmlsec_1_3_2">1.3.2</a>))</li>
<li>xz-utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.6">5.4.6</a> (includes <a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.5">5.4.5</a>))</li>
<li>zlib (<a href="https://github.com/madler/zlib/releases/tag/v1.3">1.3</a>)</li>
<li>SDK: make (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-02/msg00011.html">4.4.1</a> (includes <a href="https://lists.gnu.org/archive/html/help-make/2022-10/msg00020.html">4.4</a>))</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/5.38.2/perldelta">5.38.2</a>)</li>
<li>SDK: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.61">3.0.61</a> (includes <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.59">3.0.59</a>))</li>
<li>SDK: python (<a href="https://www.get-python.org/downloads/release/python-3119/">3.11.9</a> (includes <a href="https://www.get-python.org/downloads/release/python-3118/">3.11.8</a>, <a href="https://www.python.org/downloads/release/python-3117/">3.11.7</a>))</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/8.1">8.1.5</a>)</li>
<li>SDK: repo (2.37)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.77.2">1.77.2</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.77.1">1.77.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.77.0">1.77.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.76.0">1.76.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.75.0">1.75.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.74.1">1.74.1</a>))</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.0">12.4.0</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 3975.1.1</strong></em></p>
<h4>Bug fixes:</h4>
<ul>
<li>Hetzner: Fixed duplicated prefix in the Afterburn metadata (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Hetzner: Added <code>COREOS_HETZNER_PRIVATE_IPV4_0</code> Afterburn attribute for Hetzner private IPs (<a href="https://github.com/flatcar/scripts/pull/2141">scripts#2141</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/983655">6.6.43</a> (includes <a href="https://lwn.net/Articles/983333">6.6.42</a>, <a href="https://lwn.net/Articles/982381">6.6.41</a>, <a href="https://lwn.net/Articles/982050">6.6.40</a>, <a href="https://lwn.net/Articles/981719">6.6.39</a>, <a href="https://lwn.net/Articles/981255">6.6.38</a>, <a href="https://lwn.net/Articles/980860">6.6.37</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_103.html">3.103</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102.html">3.102</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102_1.html">3.102.1</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101_1.html">3.101.1</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.17</li>
<li>docker 24.0.9</li>
<li>ignition 2.18.0</li>
<li>kernel 6.6.43</li>
<li>systemd 255</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3975.2.0"/>
    <published>2024-08-07T10:56:37+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3815.2.5</id>
    <title>3815.2.5</title>
    <updated>2026-03-09T16:26:32.038949+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3815.2.4</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387">CVE-2024-6387</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/979851">6.1.96</a>)</li>
<li>openssh (<a href="https://www.openssh.com/txt/release-9.7">9.7_p1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.13</li>
<li>docker 24.0.9</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.96</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3815.2.5"/>
    <published>2024-07-02T13:35:34+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3815.2.4</id>
    <title>3815.2.4</title>
    <updated>2026-03-09T16:26:32.034870+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3815.2.3</strong></em></p>
<h4>Changes:</h4>
<ul>
<li>Added azure-nvme-utils to the image, which is used by udev to create symlinks for NVMe disks on Azure v6 instances under /dev/disk/azure/. (<a href="https://github.com/flatcar/scripts/pull/1950">scripts#1950</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/979261">6.1.95</a> (includes <a href="https://lwn.net/Articles/978594">6.1.94</a>, <a href="https://lwn.net/Articles/978139">6.1.93</a>, <a href="https://lwn.net/Articles/975076">6.1.92</a> and <a href="https://lwn.net/Articles/974074">6.1.91</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101.html">3.101</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.13</li>
<li>docker 24.0.9</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.95</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3815.2.4"/>
    <published>2024-06-26T13:05:09+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3815.2.3</id>
    <title>3815.2.3</title>
    <updated>2026-03-09T16:26:32.030649+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3815.2.2</strong></em></p>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/972212">6.1.90</a> (includes <a href="https://lwn.net/Articles/971443">6.1.89</a>, <a href="https://lwn.net/Articles/971364">6.1.88</a>, <a href="https://lwn.net/Articles/970173">6.1.87</a>, <a href="https://lwn.net/Articles/969735">6.1.86</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_100.html">3.100</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.13</li>
<li>docker 24.0.9</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.90</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3815.2.3"/>
    <published>2024-05-22T10:15:15+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3815.2.2</id>
    <title>3815.2.2</title>
    <updated>2026-03-09T16:26:32.024357+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3815.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24861">CVE-2024-24861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26686">CVE-2024-26686</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26700">CVE-2024-26700</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26809">CVE-2024-26809</a>)</li>
<li>Downgraded xz-utils to 5.4.2 as precaution even though Flatcar is not affected of the SSH backdoor (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094">CVE-2024-3094</a>)</li>
<li>openssh (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51384">CVE-2023-51384</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Disabled user-configdrive.service on OpenStack when config drive is used, which caused the hostname to be overwritten. The coreos-cloudinit.service unit already runs on OpenStack if the system is not configured via ignition. (<a href="https://github.com/flatcar/Flatcar/issues/1385">Flatcar#1385</a>)</li>
<li>Fixed <code>toolbox</code> to prevent mounted <code>ctr</code> snapshots from being garbage-collected (<a href="https://github.com/flatcar/toolbox/pull/9">toolbox#9</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Disabled real-time priority for multipathd as it prevents the cgroups2 cpu controller from working. (<a href="https://github.com/flatcar/scripts/pull/1771">scripts#1771</a>)</li>
<li>SDK: Unified qemu image formats, so that the <code>qemu_uefi</code> build target provides the regular <code>qemu</code> and the <code>qemu_uefi_secure</code> artifacts (<a href="https://github.com/flatcar/scripts/pull/1847">scripts#1847</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/969355">6.1.85</a> (includes <a href="https://lwn.net/Articles/968254">6.1.84</a>, <a href="https://lwn.net/Articles/966759">6.1.83</a>, <a href="https://lwn.net/Articles/965607">6.1.82</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_99.html">3.99</a>)</li>
<li>openssh (<a href="https://www.openssh.com/releasenotes.html#9.6p1">9.6p1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.13</li>
<li>docker 24.0.9</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.85</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3815.2.2"/>
    <published>2024-04-16T11:54:48+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3815.2.1</id>
    <title>3815.2.1</title>
    <updated>2026-03-09T16:26:32.017795+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3815.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52435">CVE-2023-52435</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0340">CVE-2024-0340</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26582">CVE-2024-26582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed that systemd-sysext images can extend directories where Flatcar extensions are also shipping files, e.g., that the sysext-bakery Kubernetes extension works when OEM extensions are present (<a href="https://github.com/flatcar/sysext-bakery/issues/50">sysext-bakery#50</a>)</li>
<li>Fixed the handling of OEM update payloads in a Nebraska response with self-hosted packages in an airgapped environment (<a href="https://github.com/flatcar/update_engine/pull/39">update_engine#39</a>)</li>
<li>Restored support for custom OEMs supplied in the PXE boot where <code>/usr/share/oem</code> brings the OEM partition contents (<a href="https://github.com/flatcar/Flatcar/issues/1376">Flatcar#1376</a>)</li>
</ul>
<h4>Changes:</h4>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/964562">6.1.81</a> (includes <a href="https://lwn.net/Articles/964174">6.1.80</a>, <a href="https://lwn.net/Articles/963358">6.1.79</a>, <a href="https://lwn.net/Articles/962559">6.1.78</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html">3.98</a>)</li>
<li>keyutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=cb3bb194cca88211cbfcdde2f10c0f43c3fb8ec3">1.6.3</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=454f80f537e5d1aad506599b6776e4cc1cf5f0f2">1.6.2</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.13</li>
<li>docker 24.0.9</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.81</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3815.2.1"/>
    <published>2024-03-20T09:23:01+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3815.2.0</id>
    <title>3815.2.0</title>
    <updated>2026-03-09T16:26:31.998627+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3760.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50431">CVE-2023-50431</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285</a>)</li>
<li>VMWare: open-vm-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059</a>)</li>
<li>docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557</a>)</li>
<li>nghttp2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626</a>)</li>
<li>samba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091</a>)</li>
<li>zlib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added a workaround for old airgapped/proxied update-engine clients to be able to update to this release (<a href="https://github.com/flatcar/Flatcar/issues/1332">Flatcar#1332</a>, <a href="https://github.com/flatcar/update_engine/pull/38">update_engine#38</a>)</li>
<li>Forwarded the proxy environment variables of <code>update-engine.service</code> to the postinstall script to support fetching OEM systemd-sysext payloads through a proxy (<a href="https://github.com/flatcar/Flatcar/issues/1326">Flatcar#1326</a>)</li>
<li>Set TTY used for fetching server_context to RAW mode before running cloudinit on cloudsigma (<a href="https://github.com/flatcar/scripts/pull/1280">scripts#1280</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li><strong>torcx was replaced by systemd-sysext in the OS image</strong>. Learn more about sysext and how to customise OS images <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/">here</a>.
(which is now also a legacy option because systemd-sysext offers a more robust and better structured way of customisation, including OS independent updates).
<ul>
<li>Torcx entered deprecation 2 years ago in favour of <a href="https://www.flatcar.org/docs/latest/container-runtimes/use-a-custom-docker-or-containerd-version/">deploying plain Docker binaries</a></li>
<li>Torcx has been removed entirely; if you use torcx to extend the Flatcar base OS image, please refer to our <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/#torcx-deprecation">conversion script</a> and to the sysext documentation mentioned above for migrating.</li>
<li>Consequently, <code>update_engine</code> will not perform torcx sanity checks post-update anymore.</li>
<li>Relevant changes: <a href="https://github.com/flatcar/scripts/pull/1216">scripts#1216</a>, <a href="https://github.com/flatcar/update_engine/pull/30">update_engine#30</a>, <a href="https://github.com/flatcar/mantle/pull/466">Mantle#466</a>, <a href="https://github.com/flatcar/mantle/pull/465">Mantle#465</a>.</li>
</ul>
</li>
<li><strong>NOTE:</strong> The docker btrfs storage driver has been de-prioritised; BTRFS backed storage will now default to the <code>overlay2</code> driver
(<a href="https://docs.docker.com/engine/release-notes/23.0/#bug-fixes-and-enhancements-6">changelog</a>, <a href="https://github.com/moby/moby/pull/42661">upstream pr</a>).</li>
<li><strong>NOTE:</strong> If you are already using btrfs-backed Docker storage and are upgrading to this new version, Docker will automatically use the <code>btrfs</code> storage driver for backwards-compatibility with your deployment.</li>
<li><strong>Docker will remove the <code>btrfs</code> driver entirely in a future version. Please consider migrating your deployments to the <code>overlay2</code> driver.</strong>
Using the btrfs driver can still be enforced by creating a respective <a href="https://docs.docker.com/storage/storagedriver/btrfs-driver/#configure-docker-to-use-the-btrfs-storage-driver">docker config</a> at <code>/etc/docker/daemon.json</code>.</li>
<li>cri-tools, runc, containerd, docker, and docker-cli are now built from Gentoo upstream ebuilds. Docker received a major version upgrade - it was updated to Docker 24 (from Docker 20; see &quot;updates&quot;).</li>
<li>GCP OEM images now use a systemd-sysext image for layering additional platform-specific software on top of <code>/usr</code> and being part of the OEM A/B updates (<a href="https://github.com/flatcar/Flatcar/issues/1146">flatcar#1146</a>)</li>
<li>Added a <code>flatcar-update --oem-payloads &lt;yes|no&gt;</code> flag to skip providing OEM payloads, e.g., for downgrades (<a href="https://github.com/flatcar/init/pull/114">init#114</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/961012">6.1.77</a> (includes <a href="https://lwn.net/Articles/960442">6.1.76</a>, <a href="https://lwn.net/Articles/959513">6.1.75</a>, <a href="https://lwn.net/Articles/958863">6.1.74</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231111">20231111</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231030">20231030</a>))</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.20.12">1.20.12</a>)</li>
<li>Azure: WALinuxAgent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.9.1.1">v2.9.1.1</a>)</li>
<li>DEV: Azure (<a href="https://docs.python.org/release/3.11.6/whatsnew/changelog.html#python-3-11-6">3.11.6</a>)</li>
<li>DEV: iperf (<a href="https://github.com/esnet/iperf/releases/tag/3.15">3.15</a>)</li>
<li>DEV: smartmontools (<a href="https://www.smartmontools.org/browser/tags/RELEASE_7_4/smartmontools/NEWS">7.4</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.73.0">1.73.0</a>)</li>
<li>SDK: Python (<a href="https://github.com/platformdirs/platformdirs/releases/tag/3.11.0">3.11.0</a> (includes <a href="https://github.com/pypa/packaging/releases/tag/23.2">23.2</a>))</li>
<li>VMWare: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.5">12.3.5</a>)</li>
<li>acpid (<a href="https://sourceforge.net/p/acpid2/code/ci/2.0.34/tree/Changelog">2.0.34</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_97.html">3.97</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.9">1.7.9</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.8">1.7.8</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.13">1.7.13</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.10">1.7.10</a>))</li>
<li>cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.0">1.27.0</a>)</li>
<li>ding-libs (<a href="https://github.com/SSSD/ding-libs/releases/tag/0.6.2">0.6.2</a>)</li>
<li>docker (<a href="https://github.com/moby/moby/releases/tag/v24.0.9">24.0.9</a> (includes <a href="https://docs.docker.com/engine/release-notes/24.0/">24.0.6</a>, <a href="https://docs.docker.com/engine/release-notes/23.0/">23.0</a>))</li>
<li>efibootmgr (<a href="https://github.com/rhboot/efibootmgr/releases/tag/18">18</a>)</li>
<li>efivar (<a href="https://github.com/rhboot/efivar/releases/tag/38">38</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.5">6.5</a>)</li>
<li>hwdata (<a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.375">v0.375</a> (includes <a href="https://github.com/vcrhonek/hwdata/commits/v0.374">0.374</a>))</li>
<li>iproute2 (<a href="https://marc.info/?l=linux-netdev&amp;m=169401822317373&amp;w=2">6.5.0</a>)</li>
<li>ipvsadm (<a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.31">1.31</a> (includes <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.30">1.30</a>, <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.29">1.29</a>, <a href="https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.28">1.28</a>))</li>
<li>json-c (<a href="https://github.com/json-c/json-c/blob/json-c-0.17-20230812/ChangeLog">0.17</a>)</li>
<li>libffi (<a href="https://github.com/libffi/libffi/releases/tag/v3.4.4">3.4.4</a> (includes <a href="https://github.com/libffi/libffi/releases/tag/v3.4.3">3.4.3</a>, <a href="https://github.com/libffi/libffi/releases/tag/v3.4.2">3.4.2</a>))</li>
<li>liblinear (<a href="https://github.com/cjlin1/liblinear/releases/tag/v246">246</a>)</li>
<li>libmnl (<a href="https://git.netfilter.org/libmnl/log/?h=libmnl-1.0.5">1.0.5</a>)</li>
<li>libnetfilter_conntrack (<a href="https://git.netfilter.org/libnetfilter_conntrack/log/?h=libnetfilter_conntrack-1.0.9">1.0.9</a>)</li>
<li>libnetfilter_cthelper (<a href="https://git.netfilter.org/libnetfilter_cthelper/log/?id=8cee0347cc6969c39bb64000dfaa676a8f9e30f0">1.0.1</a>)</li>
<li>libnetfilter_cttimeout (<a href="https://git.netfilter.org/libnetfilter_cttimeout/log/?id=068d36d6291f53a0a609ab1f695aa06e94ce3d30">1.0.1</a>)</li>
<li>libnfnetlink (<a href="https://git.netfilter.org/libnfnetlink/log/?h=libnfnetlink-1.0.2">1.0.2</a>)</li>
<li>libsodium (<a href="https://github.com/jedisct1/libsodium/releases/tag/1.0.19-RELEASE">1.0.19</a>)</li>
<li>libunistring (<a href="https://git.savannah.gnu.org/gitweb/?p=libunistring.git;a=blob;f=NEWS;h=5a43ddd7011d62a952733f6c0b7ad52aa4f385c7;hb=8006860b710aae2e8442088c3ddc7d819dfa8ac7">1.1</a>)</li>
<li>libunwind (<a href="https://github.com/libunwind/libunwind/releases/tag/v1.7.2">1.7.2</a> (includes <a href="https://github.com/libunwind/libunwind/releases/tag/v1.7.0">1.7.0</a>))</li>
<li>liburing (<a href="https://github.com/axboe/liburing/blob/liburing-2.3/CHANGELOG">2.3</a>)</li>
<li>mpc (<a href="https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00049.html">1.3.1</a> (includes <a href="https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00028.html">1.3.0</a>))</li>
<li>mpfr (<a href="https://gitlab.inria.fr/mpfr/mpfr/-/blob/4.2.1/NEWS">4.2.1</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0">1.57.0</a> (includes <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.56.0">1.56.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.55.1">1.55.1</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.55.0">1.55.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.54.0">1.54.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.53.0">1.53.0</a>, <a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0">1.52.0</a>))</li>
<li>nspr (<a href="https://hg.mozilla.org/projects/nspr/log/b563bfc16c887c48b038b7b441fcc4e40a126d3b">4.35</a>)</li>
<li>ntp (<a href="https://www.ntp.org/support/securitynotice/4_2_8p17-release-announcement/">4.2.8p17</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.6">v2.6</a> (includes <a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.6">v1.6</a>))</li>
<li>protobuf (<a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.12">21.12</a> (includes <a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.11">21.11</a>, <a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.10">21.10</a>))</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.12">1.1.12</a>)</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.18.8.html">4.18.8</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_43_2.html">3.43.2</a>)</li>
<li>squashfs-tools (<a href="https://github.com/plougher/squashfs-tools/releases/tag/4.6.1">4.6.1</a> (includes <a href="https://github.com/plougher/squashfs-tools/releases/tag/4.6">4.6</a>))</li>
<li>thin-provisioning-tools (<a href="https://github.com/jthornber/thin-provisioning-tools/blob/v1.0.6/CHANGES">1.0.6</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 3815.1.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50431">CVE-2023-50431</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849</a>)</li>
<li>docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24557">CVE-2024-24557</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added a workaround for old airgapped/proxied update-engine clients to be able to update to this release (<a href="https://github.com/flatcar/Flatcar/issues/1332">Flatcar#1332</a>, <a href="https://github.com/flatcar/update_engine/pull/38">update_engine#38</a>)</li>
<li>Forwarded the proxy environment variables of <code>update-engine.service</code> to the postinstall script to support fetching OEM systemd-sysext payloads through a proxy (<a href="https://github.com/flatcar/Flatcar/issues/1326">Flatcar#1326</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added a <code>flatcar-update --oem-payloads &lt;yes|no&gt;</code> flag to skip providing OEM payloads, e.g., for downgrades (<a href="https://github.com/flatcar/init/pull/114">init#114</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/961012">6.1.77</a> (includes <a href="https://lwn.net/Articles/960442">6.1.76</a>, <a href="https://lwn.net/Articles/959513">6.1.75</a>, <a href="https://lwn.net/Articles/958863">6.1.74</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_97.html">3.97</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.13">1.7.13</a>)</li>
<li>docker (<a href="https://github.com/moby/moby/releases/tag/v24.0.9">24.0.9</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.12">1.1.12</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.13</li>
<li>docker 24.0.9</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.77</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3815.2.0"/>
    <published>2024-02-14T04:35:10+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3760.2.0</id>
    <title>3760.2.0</title>
    <updated>2026-03-09T16:26:31.925754+00:00</updated>
    <content type="html"><![CDATA[<p>⚠️ From Alpha 3794.0.0 Torcx has been removed - please assert that you don’t rely on specific Torcx mechanism but now use systemd-sysext. See <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/">here</a> for more information.</p>
<p><strong>Changes since Stable-3602.2.3</strong></p>
<h4>Security fixes</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-7192">CVE-2023-7192</a> (includes <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51781">CVE-2023-51781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5090">CVE-2023-5090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45862">CVE-2023-45862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44466">CVE-2023-44466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4394">CVE-2023-4394</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4385">CVE-2023-4385</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4132">CVE-2023-4132</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4015">CVE-2023-4015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3867">CVE-2023-3867</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3866">CVE-2023-3866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3865">CVE-2023-3865</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38432">CVE-2023-38432</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38431">CVE-2023-38431</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38430">CVE-2023-38430</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38429">CVE-2023-38429</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38428">CVE-2023-38428</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38427">CVE-2023-38427</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38426">CVE-2023-38426</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3773">CVE-2023-3773</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35826">CVE-2023-35826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35824">CVE-2023-35824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3439">CVE-2023-3439</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34256">CVE-2023-34256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3359">CVE-2023-3359</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3357">CVE-2023-3357</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3355">CVE-2023-3355</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33203">CVE-2023-33203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32269">CVE-2023-32269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32258">CVE-2023-32258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32257">CVE-2023-32257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32254">CVE-2023-32254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32252">CVE-2023-32252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32250">CVE-2023-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32248">CVE-2023-32248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32247">CVE-2023-32247</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3220">CVE-2023-3220</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3159">CVE-2023-3159</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3006">CVE-2023-3006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2898">CVE-2023-2898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28866">CVE-2023-28866</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26607">CVE-2023-26607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26606">CVE-2023-26606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26544">CVE-2023-26544</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2430">CVE-2023-2430</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23002">CVE-2023-23002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23001">CVE-2023-23001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22999">CVE-2023-22999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22997">CVE-2023-22997</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22996">CVE-2023-22996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2236">CVE-2023-2236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2194">CVE-2023-2194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21255">CVE-2023-21255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21106">CVE-2023-21106</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20938">CVE-2023-20938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20928">CVE-2023-20928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2019">CVE-2023-2019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2008">CVE-2023-2008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1872">CVE-2023-1872</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1583">CVE-2023-1583</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1281">CVE-2023-1281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1194">CVE-2023-1194</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1193">CVE-2023-1193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1074">CVE-2023-1074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1073">CVE-2023-1073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1032">CVE-2023-1032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0615">CVE-2023-0615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0469">CVE-2023-0469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0468">CVE-2023-0468</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0458">CVE-2023-0458</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0210">CVE-2023-0210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48619">CVE-2022-48619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48502">CVE-2022-48502</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48425">CVE-2022-48425</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48424">CVE-2022-48424</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48423">CVE-2022-48423</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4842">CVE-2022-4842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47943">CVE-2022-47943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47942">CVE-2022-47942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47941">CVE-2022-47941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47940">CVE-2022-47940</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47939">CVE-2022-47939</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47938">CVE-2022-47938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47521">CVE-2022-47521</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47520">CVE-2022-47520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47519">CVE-2022-47519</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47518">CVE-2022-47518</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4662">CVE-2022-4662</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42432">CVE-2022-42432</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42329">CVE-2022-42329</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42328">CVE-2022-42328</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41850">CVE-2022-41850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41849">CVE-2022-41849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4139">CVE-2022-4139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4128">CVE-2022-4128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4095">CVE-2022-4095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40307">CVE-2022-40307</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3977">CVE-2022-3977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39189">CVE-2022-39189</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3910">CVE-2022-3910</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3649">CVE-2022-3649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3646">CVE-2022-3646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3643">CVE-2022-3643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3635">CVE-2022-3635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3630">CVE-2022-3630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3629">CVE-2022-3629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3625">CVE-2022-3625</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3621">CVE-2022-3621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36123">CVE-2022-36123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3595">CVE-2022-3595</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3586">CVE-2022-3586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3577">CVE-2022-3577</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3543">CVE-2022-3543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3541">CVE-2022-3541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3534">CVE-2022-3534</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3526">CVE-2022-3526</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3521">CVE-2022-3521</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34495">CVE-2022-34495</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34494">CVE-2022-34494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33981">CVE-2022-33981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33744">CVE-2022-33744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3344">CVE-2022-3344</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32981">CVE-2022-32981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3239">CVE-2022-3239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32296">CVE-2022-32296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3202">CVE-2022-3202</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3169">CVE-2022-3169</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3115">CVE-2022-3115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3113">CVE-2022-3113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3112">CVE-2022-3112</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3111">CVE-2022-3111</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3110">CVE-2022-3110</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3108">CVE-2022-3108</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3107">CVE-2022-3107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3105">CVE-2022-3105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3104">CVE-2022-3104</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3078">CVE-2022-3078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3077">CVE-2022-3077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29968">CVE-2022-29968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2978">CVE-2022-2978</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2977">CVE-2022-2977</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2959">CVE-2022-2959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29582">CVE-2022-29582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2938">CVE-2022-2938</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29156">CVE-2022-29156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28796">CVE-2022-28796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2873">CVE-2022-2873</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28356">CVE-2022-28356</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27950">CVE-2022-27950</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2785">CVE-2022-2785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27672">CVE-2022-27672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27666">CVE-2022-27666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27223">CVE-2022-27223</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2639">CVE-2022-2639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2590">CVE-2022-2590</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25636">CVE-2022-25636</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25375">CVE-2022-25375</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25258">CVE-2022-25258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2503">CVE-2022-2503</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24959">CVE-2022-24959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24958">CVE-2022-24958</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23960">CVE-2022-23960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2380">CVE-2022-2380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2308">CVE-2022-2308</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2153">CVE-2022-2153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21505">CVE-2022-21505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2078">CVE-2022-2078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20572">CVE-2022-20572</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20566">CVE-2022-20566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20423">CVE-2022-20423</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20422">CVE-2022-20422</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20421">CVE-2022-20421</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20369">CVE-2022-20369</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20158">CVE-2022-20158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-20008">CVE-2022-20008</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1998">CVE-2022-1998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1976">CVE-2022-1976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1975">CVE-2022-1975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1974">CVE-2022-1974</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1973">CVE-2022-1973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1943">CVE-2022-1943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1882">CVE-2022-1882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1671">CVE-2022-1671</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1651">CVE-2022-1651</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1205">CVE-2022-1205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1204">CVE-2022-1204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1199">CVE-2022-1199</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1198">CVE-2022-1198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1055">CVE-2022-1055</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1015">CVE-2022-1015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0995">CVE-2022-0995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0742">CVE-2022-0742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0516">CVE-2022-0516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0435">CVE-2022-0435</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0433">CVE-2022-0433</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0382">CVE-2022-0382</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45469">CVE-2021-45469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44879">CVE-2021-44879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3923">CVE-2021-3923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33135">CVE-2021-33135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36516">CVE-2020-36516</a>))</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39320">CVE-2023-39320</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402</a>)</li>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2975">CVE-2023-2975</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650</a>)</li>
<li>Python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-41105">CVE-2023-41105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217</a>)</li>
<li>SDK: Rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38497">CVE-2023-38497</a>)</li>
<li>VMware: open-vm-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1579">CVE-2023-1579</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38533">CVE-2022-38533</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38039">CVE-2023-38039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28319">CVE-2023-28319</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4911">CVE-2023-4911</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4806">CVE-2023-4806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4527">CVE-2023-4527</a>)</li>
<li>go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325</a>)</li>
<li>grub (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28735">CVE-2022-28735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3981">CVE-2021-3981</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.1">libarchive-20230729</a>)</li>
<li>libcap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602</a>)</li>
<li>libmicrohttpd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371</a>)</li>
<li>libtirpc (<a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1d2e10afb2ffc35cb3623f57a15f712359f18e75">libtirpc-rhbg-2224666</a>, <a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=f7f0abdf267698de3f74a0285405b1b01f40893b">libtirpc-rhbg-2150611</a>, <a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=4a2d85c64110ee9e21a8c4f9dafd6b0ae621506d">libtirpc-rhbg-2138317</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4">libxml2-20230428</a>)</li>
<li>lua (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33099">CVE-2022-33099</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054</a>)</li>
<li>ncurses (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25516">CVE-2023-25516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25515">CVE-2023-25515</a>)</li>
<li>openldap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953</a>)</li>
<li>procps (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016</a>)</li>
<li>protobuf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1941">CVE-2022-1941</a>)</li>
<li>qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2861">CVE-2023-2861</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0330">CVE-2023-0330</a>)</li>
<li>samba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1615">CVE-2022-1615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">CVE-2023-29383</a>)</li>
<li>sudo (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28487">CVE-2023-28487</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28486">CVE-2023-28486</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27320">CVE-2023-27320</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28948">CVE-2022-28948</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2610">CVE-2023-2610</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2609">CVE-2023-2609</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2426">CVE-2023-2426</a>)</li>
</ul>
<h4>Bug fixes</h4>
<ul>
<li>AWS: Fixed the Amazon SSM agent that was crashing. (<a href="https://github.com/flatcar/Flatcar/issues/1307">Flatcar#1307</a>)</li>
<li>Added AWS EKS support for versions 1.24-1.28. Fixed <code>/usr/share/amazon/eks/download-kubelet.sh</code> to include download paths for these versions. (<a href="https://github.com/flatcar/scripts/pull/1210">scripts#1210</a>)</li>
<li>Fix the RemainAfterExit clause in nvidia.service (<a href="https://github.com/flatcar/Flatcar/issues/1169">Flatcar#1169</a>)</li>
<li>Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found (<a href="https://github.com/flatcar/coreos-cloudinit/pull/25">coreos-cloudinit#25</a>, <a href="https://github.com/flatcar/Flatcar/issues/1262">Flatcar#1262</a>), with contributions from <a href="https://github.com/MichaelEischer">MichaelEischer</a></li>
<li>Fixed bug in handling renamed network interfaces when generating login issue (<a href="https://github.com/flatcar/init/pull/102">init#102</a>)</li>
<li>Fixed iterating over the OEM update payload signatures which prevented the AWS OEM update to 3745.x.y (<a href="https://github.com/flatcar/update_engine/pull/31">update-engine#31</a>)</li>
<li>Fixed quotes handling for update-engine (<a href="https://github.com/flatcar/Flatcar/issues/1209">Flatcar#1209</a>)</li>
<li>Fixed supplying extension update payloads with a custom base URL in Nebraska (<a href="https://github.com/flatcar/Flatcar/issues/1281">Flatcar#1281</a>)</li>
<li>Fixed the missing <code>/etc/extensions/</code> symlinks for the inbuilt Docker/containerd systemd-sysext images on update from Beta 3760.1.0 (<a href="https://github.com/flatcar/update_engine/pull/32">update_engine#32</a>)</li>
<li>Fixed the postinstall hook failure when updating from Azure instances without OEM systemd-sysext images to Flatcar Alpha 3745.x.y (<a href="https://github.com/flatcar/update_engine/pull/29">update_engine#29</a>)</li>
<li>GCP: Fixed OS Login enabling (<a href="https://github.com/flatcar/scripts/pull/1445">scripts#1445</a>)</li>
<li>Made <code>sshkeys.service</code> more robust to only run <code>coreos-metadata-sshkeys@core.service</code> when not masked and also retry on failure (<a href="https://github.com/flatcar/init/pull/112">init#112</a>)</li>
</ul>
<h4>Changes</h4>
<ul>
<li>:warning: Dropped support for niftycloud and interoute. For interoute we haven't been generating the images for some time already. (<a href="https://github.com/flatcar/scripts/pull/971">scripts#971</a>) :warning:</li>
<li>AWS OEM images now use a systemd-sysext image for layering additional platform-specific software on top of <code>/usr</code></li>
<li>Added TLS Kernel module (<a href="https://github.com/flatcar/scripts/pull/865">scripts#865</a>)</li>
<li>Added support for multipart MIME userdata in coreos-cloudinit. Ignition now detects multipart userdata and delegates execution to coreos-cloudinit. (scripts#873)</li>
<li>Azure and QEMU OEM images now use systemd-sysext images for layering additional platform-specific software on top of <code>/usr</code>. For Azure images this also means that the image has a normal Python installation available through the sysext image. The OEM software is still not updated but this will be added soon.</li>
<li>Change nvidia.service to type oneshot (from the default &quot;simple&quot;) so the subsequent services (configured with &quot;Requires/After&quot;) are executed after the driver installation is successfully finished (flatcar/Flatcar#1136)</li>
<li>Enabled the virtio GPU driver (<a href="https://github.com/flatcar/scripts/pull/830">scripts#830</a>)</li>
<li>Migrate to Type=notify in containerd.service. Changed the unit to Type=notify, utilizing the existing containerd support for sd_notify call after socket setup.</li>
<li>Migrated the NVIDIA installer from the Azure/AWS OEM partition to <code>/usr</code> to make it available on all platforms (<a href="https://github.com/flatcar/scripts/pull/932/">scripts#932</a>, <a href="https://github.com/flatcar/Flatcar/issues/1077">Flatcar#1077</a>)</li>
<li>Moved a mountpoint of the OEM partition from <code>/usr/share/oem</code> to <code>/oem</code>. <code>/usr/share/oem</code> became a symlink to <code>/oem</code> for backward compatibility. Despite the move, the initrd images providing files through <code>/usr/share/oem</code> should keep using <code>/usr/share/oem</code>. The move was done to enable activating the OEM sysext images that are placed in the OEM partition.</li>
<li>OEM vendor tools are now A/B updated if they are shipped as systemd-sysext images, the migration happens when both partitions require a systemd-sysext OEM image - note that this will delete the <code>nvidia.service</code> from <code>/etc</code> on Azure because it's now part of <code>/usr</code> (<a href="https://github.com/flatcar/Flatcar/issues/60">Flatcar#60</a>)</li>
<li>Reworked the VMware OEM software to be shipped as A/B updated systemd-sysext image</li>
<li>SDK: Experimental support for <a href="https://github.com/flatcar/scripts/blob/main/PREFIX.md">prefix builds</a> to create distro independent, portable, self-contained applications w/ all dependencies included. With contributions from <a href="https://github.com/chewi">chewi</a> and <a href="https://github.com/HappyTobi">HappyTobi</a>.</li>
<li>Started shipping default ssh client and ssh daemon configs in <code>/etc/ssh/ssh_config</code> and <code>/etc/ssh/sshd_config</code> which include config snippets in <code>/etc/ssh/ssh_config.d</code> and <code>/etc/ssh/sshd_config.d</code>, respectively.</li>
<li>The open-vm-tools package in VMware OEM now comes with vmhgfs-fuse, udev rules, pam and vgauth</li>
<li>Updated locksmith to use non-deprecated resource control options in the systemd unit (<a href="https://github.com/flatcar/locksmith/pull/20">Locksmith#20</a>)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/958343">6.1.73</a> (includes <a href="https://lwn.net/Articles/957376">6.1.72</a>, <a href="https://lwn.net/Articles/957009">6.1.71</a>, <a href="https://lwn.net/Articles/956526">6.1.70</a>, <a href="https://lwn.net/Articles/955814">6.1.69</a>, <a href="https://lwn.net/Articles/954989">6.1.68</a>, <a href="https://lwn.net/Articles/954455">6.1.67</a>, <a href="https://lwn.net/Articles/954112">6.1.66</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.65">6.1.65</a>, <a href="https://lwn.net/Articles/953132">6.1.64</a>, <a href="https://lwn.net/Articles/952003">6.1.63</a>, <a href="https://lwn.net/Articles/950700">6.1.62</a>, <a href="https://lwn.net/Articles/949826">6.1.61</a>, <a href="https://lwn.net/Articles/948817">6.1.60</a>, <a href="https://lwn.net/Articles/948299">6.1.59</a>, <a href="https://lwn.net/Articles/947820">6.1.58</a>, <a href="https://lwn.net/Articles/947298">6.1.57</a>, <a href="https://lwn.net/Articles/946854">6.1.56</a>, <a href="https://lwn.net/Articles/945379">6.1.55</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.54">6.1.54</a>, <a href="https://lwn.net/Articles/944358">6.1.53</a>, <a href="https://lwn.net/Articles/943754">6.1.52</a>, <a href="https://lwn.net/Articles/943403">6.1.51</a>, <a href="https://lwn.net/Articles/943112">6.1.50</a>, <a href="https://lwn.net/Articles/942880">6.1.49</a>, <a href="https://lwn.net/Articles/942865">6.1.48</a>, <a href="https://lwn.net/Articles/942531">6.1.47</a>, <a href="https://lwn.net/Articles/941774">6.1.46</a>, <a href="https://lwn.net/Articles/941273">6.1.45</a>, <a href="https://lwn.net/Articles/940800">6.1.44</a>, <a href="https://lwn.net/Articles/940338">6.1.43</a>, <a href="https://lwn.net/Articles/939423">6.1.42</a>, <a href="https://lwn.net/Articles/939103">6.1.41</a>, <a href="https://lwn.net/Articles/939015">6.1.40</a>, <a href="https://lwn.net/Articles/938619">6.1.39</a>, <a href="https://lwn.net/Articles/937403">6.1.38</a>, <a href="https://lwn.net/Articles/937082">6.1.37</a>, <a href="https://lwn.net/Articles/936674">6.1.36</a>, <a href="https://lwn.net/Articles/935588">6.1.35</a>, <a href="https://lwn.net/Articles/934623">6.1.34</a>, <a href="https://lwn.net/Articles/934319">6.1.33</a>, <a href="https://lwn.net/Articles/933908">6.1.32</a>, <a href="https://lwn.net/Articles/933281">6.1.31</a>, <a href="https://lwn.net/Articles/932882">6.1.30</a>, <a href="https://lwn.net/Articles/932133">6.1.29</a>, <a href="https://lwn.net/Articles/931651">6.1.28</a>, <a href="https://lwn.net/Articles/930597/">6.1.27</a>, <a href="https://kernelnewbies.org/Linux_6.1">6.1</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230919">20230919</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230804">20230804</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625">20230625</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230515">20230515</a>))</li>
<li>AWS: amazon-ssm-agent (<a href="https://github.com/aws/amazon-ssm-agent/releases/tag/3.2.985.0">3.2.985.0</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.20.9">1.20.9</a> (includes <a href="https://go.dev/doc/devel/release#go1.20.8">1.20.8</a>, <a href="https://go.dev/doc/devel/release#go1.20.7">1.20.7</a>, <a href="https://go.dev/doc/devel/release#go1.20.6">1.20.6</a>, <a href="https://go.dev/doc/devel/release#go1.20.5">1.20.5</a>, <a href="https://go.dev/doc/devel/release#go1.20.4">1.20.4</a>, <a href="https://go.dev/doc/devel/release#go1.20.10">1.20.10</a>, <a href="https://go.dev/doc/devel/release#go1.19.13">1.19.13</a>, <a href="https://go.dev/doc/devel/release#go1.19.12">1.19.12</a>, <a href="https://go.dev/doc/devel/release#go1.19.11">1.19.11</a>, <a href="https://go.dev/doc/devel/release#go1.19.10">1.19.10</a>))</li>
<li>OpenSSL (<a href="https://github.com/openssl/openssl/blob/openssl-3.0.9/NEWS.md#major-changes-between-openssl-308-and-openssl-309-30-may-2023">3.0.9</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.72.1">1.72.1</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.72.0">1.72.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.71.1">1.71.1</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.71.0">1.71.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.70.0">1.70.0</a>))</li>
<li>SDK: file (<a href="https://github.com/file/file/blob/FILE5_45/ChangeLog">5.45</a>)</li>
<li>SDK: gnuconfig (<a href="https://git.savannah.gnu.org/cgit/config.git/log/?id=d4e37b5868ef910e3e52744c34408084bb13051c">20230731</a>)</li>
<li>SDK: libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.38">1.1.38</a>)</li>
<li>SDK: man-db (<a href="https://gitlab.com/man-db/man-db/-/tags/2.11.2">2.11.2</a>)</li>
<li>SDK: man-pages (<a href="https://lore.kernel.org/lkml/d56662b2-538c-7252-9052-8afbf325f843@gmail.com/T/">6.03</a>)</li>
<li>SDK: pahole (<a href="https://github.com/acmel/dwarves/blob/master/changes-v1.25">1.25</a>)</li>
<li>SDK: perf (<a href="https://kernelnewbies.org/LinuxChanges#Linux_6.3.Tracing.2C_perf_and_BPF">6.3</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/perl5361delta">5.36.1</a>)</li>
<li>SDK: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.49">3.0.49</a> (includes <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.49">3.0.49</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.46">3.0.46</a>))</li>
<li>SDK: python (<a href="https://www.python.org/downloads/release/python-3115/">3.11.5</a> (includes <a href="https://www.python.org/downloads/release/python-3113/">3.11.3</a>, <a href="https://www.python.org/downloads/release/python-31012/">3.10.12</a>, <a href="https://www.python.org/downloads/release/python-31011/">3.10.11</a>))</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/8.0">8.0.4</a> (includes <a href="https://wiki.qemu.org/ChangeLog/8.0">8.0.3</a>, <a href="https://wiki.qemu.org/ChangeLog/7.2">7.2.3</a>))</li>
<li>SDK: qemu-guest-agent (<a href="https://wiki.qemu.org/ChangeLog/8.0#Guest_agent">8.0.3</a> (includes <a href="https://wiki.qemu.org/ChangeLog/8.0#Guest_agent">8.0.0</a>))</li>
<li>VMWARE: libdnet (<a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.2">1.16.2</a> (includes <a href="https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16">1.16</a>))</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0">12.3.0</a> (includes <a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.5">12.2.5</a>))</li>
<li>XZ Utils (<a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=2f4d35adca6198671434d2988803cc9316ad1ec8;hb=dbb3a536ed9873ffa0870321f6873e564c6a9da8">5.4.3</a>)</li>
<li>afterburn (<a href="https://github.com/coreos/afterburn/releases/tag/v5.5.0">5.5.0</a>)</li>
<li>bind-tools (<a href="https://bind9.readthedocs.io/en/v9.16.42/notes.html#notes-for-bind-9-16-42">9.16.42</a> (includes <a href="https://bind9.readthedocs.io/en/v9.16.41/notes.html#notes-for-bind-9-16-41">9.16.41</a>))</li>
<li>binutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-01/msg00003.html">2.40</a>)</li>
<li>bpftool (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/log/tools/bpf/bpftool?h=v6.3">6.3</a>)</li>
<li>c-ares (<a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1">1.19.1</a>)</li>
<li>cJSON (<a href="https://github.com/DaveGamble/cJSON/releases/tag/v1.7.16">1.7.16</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html">3.96.1</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html">3.96</a>))</li>
<li>checkpolicy (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>cifs-utils (<a href="https://lists.samba.org/archive/samba-technical/2022-August/137528.html">7.0</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.7.7">1.7.7</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.7.6">1.7.6</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.5">1.7.5</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.4">1.7.4</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.3">1.7.3</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.7.2">1.7.2</a>))</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-04/msg00006.html">9.3</a> (includes <a href="https://git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?h=v9.1">9.1</a>))</li>
<li>cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.1/docs/v2.6.1-ReleaseNotes">2.6.1</a> (includes <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.0/docs/v2.6.0-ReleaseNotes">2.6.0</a>, <a href="https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.5.0/docs/v2.5.0-ReleaseNotes">2.5.0</a>))</li>
<li>curl (<a href="https://curl.se/changes.html#8_4_0">8.4.0</a> (includes <a href="https://curl.se/changes.html#8_3_0">8.3.0</a>, <a href="https://curl.se/changes.html#8_2_1">8.2.1</a>, <a href="https://curl.se/changes.html#8_2_0">8.2.0</a>, <a href="https://curl.se/changes.html#8_1_2">8.1.2</a>, <a href="https://curl.se/changes.html#8_1_0">8.1.0</a>))</li>
<li>debianutils (<a href="https://metadata.ftp-master.debian.org/changelogs//main/d/debianutils/debianutils_5.7-0.4_changelog">5.7</a>)</li>
<li>diffutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00009.html">3.10</a>)</li>
<li>elfutils (<a href="https://sourceware.org/pipermail/elfutils-devel/2023q1/006023.html">0.189</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.4">6.4</a> (includes <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=7bdf78f0d2a9ae1571fe9444e552490130e573fd">6.3</a>, <a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.2">6.2</a>))</li>
<li>gawk (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00008.html">5.2.2</a>)</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-13/changes.html">13.2</a>)</li>
<li>gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00011.html">13.2</a>)</li>
<li>gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00004.html">1.23</a>)</li>
<li>git (<a href="https://lore.kernel.org/git/xmqqleh3a3wm.fsf@gitster.g/">2.41.0</a> (includes <a href="https://github.com/git/git/blob/v2.39.3/Documentation/RelNotes/2.39.3.txt">2.39.3</a>))</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.4">2.76.4</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.3">2.76.3</a>, <a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.2">2.76.2</a>))</li>
<li>glibc (<a href="https://sourceware.org/git/?p=glibc.git;a=tag;h=refs/tags/glibc-2.37">2.37</a>)</li>
<li>gmp (<a href="https://gmplib.org/gmp6.3">6.3.0</a>)</li>
<li>gptfdisk (<a href="https://sourceforge.net/p/gptfdisk/code/ci/1d46f3723bc25f5598266f7d9a3548af3cee0c77/tree/NEWS">1.0.9</a>)</li>
<li>grep (<a href="http://savannah.gnu.org/forum/forum.php?forum_id=10227">3.8</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00004.html">3.11</a>))</li>
<li>grub (<a href="https://lists.gnu.org/archive/html/grub-devel/2021-06/msg00022.html">2.06</a>)</li>
<li>gzip (<a href="https://savannah.gnu.org/news/?id=10501">1.13</a>)</li>
<li>hwdata (<a href="https://github.com/vcrhonek/hwdata/commits/v0.373">0.373</a> (includes <a href="https://github.com/vcrhonek/hwdata/commits/v0.372">0.372</a>, <a href="https://github.com/vcrhonek/hwdata/commits/v0.371">0.371</a>, <a href="https://github.com/vcrhonek/hwdata/releases/tag/v0.367">0.367</a>))</li>
<li>inih (<a href="https://github.com/benhoyt/inih/releases/tag/r57">57</a> (includes <a href="https://github.com/benhoyt/inih/releases/tag/r56">56</a>))</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230808">20230808</a> (includes <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230613">20230613</a>, <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230512">20230512</a>))</li>
<li>iperf (<a href="https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-314-2023-07-07">3.14</a>)</li>
<li>iproute2 (<a href="https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/?h=v6.4.0">6.4.0</a> (includes <a href="https://lwn.net/Articles/930473/">6.3.0</a>, <a href="https://lwn.net/Articles/923952/">6.2</a>))</li>
<li>ipset (<a href="https://git.netfilter.org/ipset/tree/ChangeLog?id=186f9b57c60bb53aae5f6633eff1e9d5e9095c3e">7.17</a>)</li>
<li>kbd (<a href="https://github.com/legionus/kbd/releases/tag/v2.6.1">2.6.1</a> (includes <a href="https://github.com/legionus/kbd/releases/tag/v2.6.0">2.6.0</a>, <a href="https://github.com/legionus/kbd/releases/tag/v2.5.1">2.5.1</a>))</li>
<li>kexec-tools (<a href="https://github.com/horms/kexec-tools/releases/tag/v2.0.24">2.0.24</a>)</li>
<li>kmod (<a href="https://lwn.net/Articles/899526/">30</a>)</li>
<li>ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/b686ef00da46d4a0c0aba0c61b1866cbc9b462b6">2.4.4</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/604f94704f30e90ef960aa2be62a14d2e614a002">2.4.3</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/d93892d2e8ed69758c15ab18bc03bba09e715bc6">2.4.2</a>))</li>
<li>less (<a href="http://www.greenwoodsoftware.com/less/news.633.html">633</a> (includes <a href="http://www.greenwoodsoftware.com/less/news.632.html">632</a>))</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.1">3.7.1</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.7.0">3.7.0</a>))</li>
<li>libassuan (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=e52bb5dd36ac93ea227e53e89f82af9ccf38f339;hb=6b50ee6bcdd6aa81bd7cc3fb2379864c3ed479b8">2.5.6</a>)</li>
<li>libbsd (<a href="https://lists.freedesktop.org/archives/libbsd/2022-October/000337.html">0.11.7</a>)</li>
<li>libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe">2.69</a>)</li>
<li>libgcrypt (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=c9a239615f8070427a96688b1be40a81e59e9b8a;hb=1c5cbacf3d88dded5063e959ee68678ff7d0fa56">1.10.2</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=03132c2a115e35783a782c64777cf5f5b1a2825f;hb=ae0e567820c37f9640440b3cff77d7c185aa6742">1.10.1</a>))</li>
<li>libgpg-error (<a href="https://dev.gnupg.org/T6231">1.47</a> (includes <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=14b0ba97d6ba2b10b3178f2e4a3e24bfc2355bb3;hb=ea031873aa9642831017937fd33e9009d514ee07">1.46</a>))</li>
<li>libksba (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=f640523209c1c9ce9855040e53914a79d24d6a67;hb=557999424ebd13e70d6fc17e648a5dd2a06f440b">1.6.4</a>)</li>
<li>libmd (<a href="https://git.hadrons.org/cgit/libmd.git/log/?h=1.1.0">1.1.0</a>)</li>
<li>libmicrohttpd (<a href="https://gitlab.com/libmicrohttpd/libmicrohttpd/-/releases/v0.9.77">0.9.77</a> (includes <a href="https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html">0.9.76</a>))</li>
<li>libnftnl (<a href="https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.6">1.2.6</a> (includes <a href="https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.5">1.2.5</a>))</li>
<li>libnl (<a href="https://github.com/thom311/libnl/compare/libnl3_7_0...libnl3_8_0">3.8.0</a>)</li>
<li>libnvme (<a href="https://github.com/linux-nvme/libnvme/releases/tag/v1.5">1.5</a>)</li>
<li>libpcap (<a href="https://github.com/the-tcpdump-group/libpcap/blob/24832dd2728bd95ed9b9464ef27b47a943c38003/CHANGES#L51">1.10.4</a>)</li>
<li>libpcre (<a href="https://www.pcre.org/original/changelog.txt">8.45</a>)</li>
<li>libpipeline (<a href="https://gitlab.com/libpipeline/libpipeline/-/tags/1.5.7">1.5.7</a>)</li>
<li>libselinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>libsemanage (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>libsepol (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>libtirpc (<a href="https://marc.info/?l=linux-nfs&amp;m=169667640909830&amp;w=2">1.3.4</a>)</li>
<li>libusb (<a href="https://github.com/libusb/libusb/blob/v1.0.26/ChangeLog">1.0.26</a>)</li>
<li>libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.46.0">1.46.0</a> (includes <a href="https://github.com/libuv/libuv/releases/tag/v1.45.0">1.45.0</a>))</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.5">2.11.5</a> (includes <a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4">2.11.4</a>))</li>
<li>lsof (<a href="https://github.com/lsof-org/lsof/blob/4.98.0/00DIST#L5471">4.98.0</a>)</li>
<li>lua (<a href="https://www.lua.org/manual/5.4/readme.html#changes">5.4.6</a> (includes <a href="https://www.lua.org/manual/5.4/readme.html#changes">5.4.4</a>))</li>
<li>mit-krb5 (<a href="http://web.mit.edu/kerberos/krb5-1.21/">1.21.2</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/commits/0.9.5">0.9.5</a>)</li>
<li>ncurses (<a href="https://invisible-island.net/ncurses/announce.html#h2-release-notes">6.4</a>)</li>
<li>nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/blob/nettle_3.9.1_release_20230601/ChangeLog">3.9.1</a>)</li>
<li>nmap (<a href="https://nmap.org/changelog.html#7.94">7.94</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-104-05/index.html">535.104.05</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.5">2.5</a> (includes <a href="https://github.com/linux-nvme/nvme-cli/releases/tag/v2.3">2.3</a>))</li>
<li>open-isns (<a href="https://github.com/open-iscsi/open-isns/blob/v0.102/ChangeLog">0.102</a>)</li>
<li>openldap (<a href="https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_4/CHANGES">2.6.4</a> (includes <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FQJM2JSSSOMLQH7XC7Q5IZJYOGCTV2LK/">2.6.3</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/IHS5V46H6NFNFUERMC6AWMPHTWRVNLFA/">2.6</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/TZQHR4SIWUA5BZTKDAKSFDOOGDVU4TU7/">2.5.14</a>, <a href="https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/BH3VDPG6IYYF5L5U6LZGHHKMJY5HFA3L/">2.5</a>))</li>
<li>openssh (<a href="https://www.openssh.com/releasenotes.html#9.5p1">9.5p1</a> (includes <a href="https://www.openssh.com/releasenotes.html#9.4p1">9.4p1</a>))</li>
<li>parted (<a href="https://git.savannah.gnu.org/gitweb/?p=parted.git;a=blob;f=NEWS;h=52bb11697039f70e55120c571750f9ee761a75aa;hb=3b5f327b213d21e9adb9ba933c78dd898fee5b1d">3.6</a>)</li>
<li>pax-utils (<a href="https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.7">1.3.7</a>)</li>
<li>pciutils (<a href="https://github.com/pciutils/pciutils/releases/tag/v3.9.0">3.9.0</a> (includes <a href="https://github.com/pciutils/pciutils/blob/v3.10.0/ChangeLog">3.10.0</a>))</li>
<li>pigz (<a href="https://zlib.net/pipermail/pigz-announce_zlib.net/2023-August/000018.html">2.8</a>)</li>
<li>policycoreutils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>popt (<a href="https://github.com/rpm-software-management/popt/releases/tag/popt-1.19-release">1.19</a>)</li>
<li>procps (<a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.4">4.0.4</a> (includes <a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.3">4.0.3</a>, <a href="https://gitlab.com/procps-ng/procps/-/releases/v4.0.0">4.0.0</a>))</li>
<li>protobuf (<a href="https://github.com/protocolbuffers/protobuf/releases/tag/v21.9">21.9</a>)</li>
<li>psmisc (<a href="https://gitlab.com/psmisc/psmisc/-/blob/v23.6/ChangeLog">23.6</a>)</li>
<li>quota (<a href="https://sourceforge.net/p/linuxquota/code/ci/87d2fd7635e4bca54fa2a00b8d5b073ba9ca521b/tree/Changelog">4.09</a>)</li>
<li>rpcsvc-proto (<a href="https://github.com/thkukuk/rpcsvc-proto/releases/tag/v1.4.4">1.4.4</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.9">1.1.9</a> (includes <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.8">1.1.8</a>))</li>
<li>samba (<a href="https://wiki.samba.org/index.php/Samba_4.18_Features_added/changed#Samba_4.18.4">4.18.4</a>)</li>
<li>sed (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html">4.9</a>)</li>
<li>selinux-base (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>)</li>
<li>selinux-base-policy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>)</li>
<li>selinux-container (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>)</li>
<li>selinux-sssd (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>)</li>
<li>selinux-unconfined (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101">2.20221101</a>)</li>
<li>semodule-utils (<a href="https://github.com/SELinuxProject/selinux/releases/tag/3.5">3.5</a>)</li>
<li>smartmontools (<a href="https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_3">7.3</a>)</li>
<li>sqlite (<a href="https://sqlite.org/releaselog/3_42_0.html">3.42.0</a>)</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.4">6.4</a> (includes <a href="https://github.com/strace/strace/releases/tag/v6.3">6.3</a>, <a href="https://github.com/strace/strace/releases/tag/v6.2">6.2</a>))</li>
<li>sudo (<a href="https://www.sudo.ws/releases/stable/#1.9.13p3">1.9.13p3</a>)</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/5224ed98eeba43f22b5f5f87de5947fbb1c1c7c1">2.4.0</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/0189ccf9fc3d2a77cc83cffe180e307bcdccebb4">2.3.4</a>))</li>
<li>tar (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html">1.35</a>)</li>
<li>tdb (<a href="https://gitlab.com/samba-team/samba/-/commit/eab796a4f9172e602dc262f3c99ead35b35929e7">1.4.8</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/27ceb1c3ad786386e746a5e2968780d791393b9e">1.4.7</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/1c776e54cf33b46b2ed73263f093d596a0cdbb2f">1.4.6</a>))</li>
<li>tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/d80f28b081e515e32a480daf80b42cf782447a9c">0.14.1</a> (includes <a href="https://gitlab.com/samba-team/samba/-/commit/3c6d28ebae27dba8e40558ae37ae8138ea0b4bdc">0.14.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/63d4db63feda920c8020f8484a8b31065b7f1380">0.13.0</a>, <a href="https://gitlab.com/samba-team/samba/-/commit/53692735c733d01acbd953641f831a1f5e0cf6c5">0.12.1</a>, <a href="https://gitlab.com/samba-team/samba/-/tags/tevent-0.12.0">0.12.0</a>))</li>
<li>usbutils (<a href="https://github.com/gregkh/usbutils/blob/79b796f945ea7d5c2b0e2a74f9b8819cb7948680/NEWS">015</a>)</li>
<li>userspace-rcu (<a href="https://github.com/urcu/userspace-rcu/blob/v0.13.2/ChangeLog">0.14.0</a>)</li>
<li>util-linux (<a href="https://github.com/util-linux/util-linux/releases/tag/v2.38.1">2.38.1</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/commits/v9.0.1678">9.0.1678</a> (includes <a href="https://github.com/vim/vim/commits/v9.0.1677">9.0.1677</a>, <a href="https://github.com/vim/vim/commits/v9.0.1503">9.0.1503</a>))</li>
<li>wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00003.html">1.21.4</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/blob/v5.5.18/debian/changelog">5.5.18</a> (includes <a href="https://github.com/rfc1036/whois/commit/bac7108b01cfd54c517444efa1239e10e6edd5a4">5.5.17</a>))</li>
<li>xfsprogs (<a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.4.0">6.4.0</a> (includes <a href="https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.3.0">6.3.0</a>))</li>
<li>zstd (<a href="https://github.com/facebook/zstd/releases/tag/v1.5.5">1.5.5</a>)</li>
</ul>
<p><strong>Changes since Beta-3760.1.1</strong></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1193">CVE-2023-1193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51781">CVE-2023-51781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>AWS: Fixed the Amazon SSM agent that was crashing. (<a href="https://github.com/flatcar/Flatcar/issues/1307">Flatcar#1307</a>)</li>
<li>Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found (<a href="https://github.com/flatcar/coreos-cloudinit/pull/25">coreos-cloudinit#25</a>, <a href="https://github.com/flatcar/Flatcar/issues/1262">Flatcar#1262</a>), with contributions from <a href="https://github.com/MichaelEischer">MichaelEischer</a></li>
<li>Fixed supplying extension update payloads with a custom base URL in Nebraska (<a href="https://github.com/flatcar/Flatcar/issues/1281">Flatcar#1281</a>)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/958343">6.1.73</a> (includes <a href="https://lwn.net/Articles/957376">6.1.72</a>, <a href="https://lwn.net/Articles/957009">6.1.71</a>, <a href="https://lwn.net/Articles/956526">6.1.70</a>, <a href="https://lwn.net/Articles/955814">6.1.69</a>, <a href="https://lwn.net/Articles/954989">6.1.68</a>, <a href="https://lwn.net/Articles/954455">6.1.67</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html">3.96.1</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html">3.96</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.7.7</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 6.1.73</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3760.2.0"/>
    <published>2024-01-18T15:15:58+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3602.2.3</id>
    <title>3602.2.3</title>
    <updated>2026-03-09T16:26:31.896467+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3602.2.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Deleted files in <code>/etc</code> that have a tmpfiles rule that normally would recreate them will now show up again through the <code>/etc</code> lowerdir (<a href="https://github.com/flatcar/Flatcar/issues/1265">Flatcar#1265</a>, <a href="https://github.com/flatcar/bootengine/pull/79">bootengine#79</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/954114">5.15.142</a> (includes <a href="https://lwn.net/Articles/953649/">5.15.141</a>, <a href="https://lwn.net/Articles/953130">5.15.140</a>, <a href="https://lwn.net/Articles/952004">5.15.139</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html">3.95</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.142</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.2.3"/>
    <published>2023-12-13T12:52:05+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3602.2.2</id>
    <title>3602.2.2</title>
    <updated>2026-03-09T16:26:31.891947+00:00</updated>
    <content type="html"><![CDATA[<p>⚠️ From Alpha 3794.0.0 Torcx has been removed - please assert that you don't rely on specific Torcx mechanism but now use systemd-sysext. See <a href="https://www.flatcar.org/docs/latest/provisioning/sysext/">here</a> for more information.</p>
<p><em>Changes since <strong>Stable 3602.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Brightbox: The regular OpenStack image should now be used, it includes Afterburn for instance metadata attributes</li>
<li>OpenStack: An uncompressed image is provided for simpler import (since the images use qcow2 inline compression, there is no benefit in using the <code>.gz</code> or <code>.bz2</code> images)</li>
<li>linux kernel: added zstd support for squashfs kernel module (<a href="https://github.com/flatcar/scripts/pull/1297">scripts#1297</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/950714">5.15.138</a> (includes <a href="https://lwn.net/Articles/948818">5.15.137</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.138</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.2.2"/>
    <published>2023-11-22T07:55:14+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3602.2.1</id>
    <title>3602.2.1</title>
    <updated>2026-03-09T16:26:31.886698+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3602.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754</a>,  <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Disabled systemd-networkd's RoutesToDNS setting by default to fix provisioning failures observed in VMs with multiple network interfaces on Azure (<a href="https://github.com/flatcar/scripts/pull/1206">scripts#1206</a>)</li>
<li>Fixed a regression in Docker resulting in file permissions being dropped from exported container images. (<a href="https://github.com/flatcar/scripts/pull/1231">scripts#1231</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>To make Kubernetes work by default, <code>/usr/libexec/kubernetes/kubelet-plugins/volume/exec</code> is now a symlink to the writable folder <code>/var/kubernetes/kubelet-plugins/volume/exec</code> (<a href="https://github.com/flatcar/Flatcar/issues/1193">Flatcar#1193</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/948297">5.15.136</a> (includes <a href="https://lwn.net/Articles/947299">5.15.135</a>, <a href="https://lwn.net/Articles/946855">5.15.134</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html">3.94</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.136</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.2.1"/>
    <published>2023-10-25T08:39:23+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3602.2.0</id>
    <title>3602.2.0</title>
    <updated>2026-03-09T16:26:31.866877+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 3602.1.6</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Triggered re-reading of partition table to fix adding partitions to the boot disk (<a href="https://github.com/flatcar/scripts/pull/1202">scripts#1202</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Use qcow2 compressed format instead of additional compression layer in Qemu images (<a href="https://github.com/flatcar/Flatcar/issues/1135">Flatcar#1135</a>, <a href="https://github.com/flatcar/scripts/pull/1132">scripts#1132</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/945380">5.15.133</a>)</li>
</ul>
<p><em>Changes compared to <strong>Stable 3510.2.8</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24532">CVE-2023-24532</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725</a>)</li>
<li>bash (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25153">CVE-2023-25153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23914">CVE-2023-23914</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23915">CVE-2023-23915</a> and <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23916">CVE-2023-23916</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27533">CVE-2023-27533</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27534">CVE-2023-27534</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27537">CVE-2023-27537</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27538">CVE-2023-27538</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28841">CVE-2023-28841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28842">CVE-2023-28842</a>)</li>
<li>e2fsprogs (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946</a>)</li>
<li>GnuTLS (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0361">CVE-2023-0361</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38090">CVE-2022-38090</a>)</li>
<li>less (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-46663">CVE-2022-46663</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469</a>)</li>
<li>OpenSSH (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25136">CVE-2023-25136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28531">CVE-2023-28531</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408</a>)</li>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4203">CVE-2022-4203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0216">CVE-2023-0216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0217">CVE-2023-0217</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0401">CVE-2023-0401</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1255">CVE-2023-1255</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642</a>)</li>
<li>tar (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0288">CVE-2023-0288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0433">CVE-2023-0433</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1175">CVE-2023-1175</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1170">CVE-2023-1170</a>)</li>
<li>SDK: dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934</a>)</li>
<li>SDK: pkgconf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24056">CVE-2023-24056</a>)</li>
<li>SDK: python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured that <code>/var/log/journal/</code> is created early enough for systemd-journald to persist the logs on first boot (<a href="https://github.com/flatcar/bootengine/pull/60">bootengine#60</a>, <a href="https://github.com/flatcar/baselayout/pull/29">baselayout#29</a>)</li>
<li>Fixed <code>journalctl --user</code> permission issue (<a href="https://github.com/flatcar/Flatcar/issues/989">Flatcar#989</a>)</li>
<li>Ensured that the folder <code>/var/log/sssd</code> is created if it doesn't exist, required for <code>sssd.service</code> (<a href="https://github.com/flatcar/Flatcar/issues/1096">Flatcar#1096</a>)</li>
<li>Fixed a miscompilation of getfacl causing it to dump core when executed (<a href="https://github.com/flatcar/scripts/pull/809">scripts#809</a>)</li>
<li>Restored the reboot warning and delay for non-SSH console sessions (<a href="https://github.com/flatcar/locksmith/pull/21">locksmith#21</a>)</li>
<li>Triggered re-reading of partition table to fix adding partitions to the boot disk (<a href="https://github.com/flatcar/scripts/pull/1202">scripts#1202</a>)</li>
<li>Worked around a bash regression in <code>flatcar-install</code> and added error reporting for disk write failures (<a href="https://github.com/flatcar/Flatcar/issues/1059">Flatcar#1059</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added <code>pigz</code> to the image, a parallel gzip implementation, which is useful to speed up the (de)compression for large container image imports/exports (<a href="https://github.com/flatcar/coreos-overlay/pull/2504">coreos-overlay#2504</a>)</li>
<li>Added a new <code>flatcar-reset</code> tool and boot logic for selective OS resets to reconfigure the system with Ignition while avoiding config drift (<a href="https://github.com/flatcar/bootengine/pull/55">bootengine#55</a>, <a href="https://github.com/flatcar/init/pull/91">init#91</a>)</li>
<li>Enabled elfutils support in systemd-coredump. A backtrace will now appear in the journal for any program that dumps core (<a href="https://github.com/flatcar/coreos-overlay/pull/2489">coreos-overlay#2489</a>)</li>
<li>Improved the OS reset tool to offer preview, backup and restore (<a href="https://github.com/flatcar/init/pull/94">init#94</a>)</li>
<li>On boot any files in <code>/etc</code> that are the same as provided by the booted <code>/usr/share/flatcar/etc</code> default for the overlay mount on <code>/etc</code> are deleted to ensure that future updates of <code>/usr/share/flatcar/etc</code> are propagated - to opt out create <code>/etc/.no-dup-update</code> in case you want to keep an unmodified config file as is or because you fear that a future Flatcar version may use the same file as you at which point your copy is cleaned up and any other future Flatcar changes would be applied (<a href="https://github.com/flatcar/bootengine/pull/54">bootengine#54</a>)</li>
<li>Switched systemd log reporting to the combined format of both unit description, as before, and now the unit name to easily find the unit (<a href="https://github.com/flatcar/coreos-overlay/pull/2436">coreos-overlay#2436</a>)</li>
<li><code>/etc</code> is now set up as overlayfs with the original <code>/etc</code> folder being the store for changed files/directories and <code>/usr/share/flatcar/etc</code> providing the lower default directory tree (<a href="https://github.com/flatcar/bootengine/pull/53">bootengine#53</a>, <a href="https://github.com/flatcar/scripts/pull/666">scripts#666</a>)</li>
<li>Changed coreos-cloudinit to now set the short hostname instead of the FQDN when fetched from the metadata service (<a href="https://github.com/flatcar/coreos-cloudinit/pull/19">coreos-cloudinit#19</a>)</li>
<li>Use qcow2 compressed format instead of additional compression layer in Qemu images (<a href="https://github.com/flatcar/Flatcar/issues/1135">Flatcar#1135</a>, <a href="https://github.com/flatcar/scripts/pull/1132">scripts#1132</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/945380">5.15.133</a> (includes <a href="https://lwn.net/Articles/944877">5.15.132</a>, <a href="https://lwn.net/Articles/943755">5.15.131</a>, <a href="https://lwn.net/Articles/943404">5.15.130</a>, <a href="https://lwn.net/Articles/943113">5.15.129</a>, <a href="https://lwn.net/Articles/942866">5.15.128</a>, <a href="https://lwn.net/Articles/941775">5.15.127</a>, <a href="https://lwn.net/Articles/941273">5.15.126</a>, <a href="https://lwn.net/Articles/940798">5.15.125</a>, <a href="https://lwn.net/Articles/940339">5.15.124</a>, <a href="https://lwn.net/Articles/939424">5.15.123</a>, <a href="https://lwn.net/Articles/939104">5.15.122</a>, <a href="https://lwn.net/Articles/939016">5.15.121</a>, <a href="https://lwn.net/Articles/937404">5.15.120</a>, <a href="https://lwn.net/Articles/936675">5.15.119</a>, <a href="https://lwn.net/Articles/935584">5.15.118</a>, <a href="https://lwn.net/Articles/934622">5.15.117</a>, <a href="https://lwn.net/Articles/934320">5.15.116</a>, <a href="https://lwn.net/Articles/933909">5.15.115</a>, <a href="https://lwn.net/Articles/933280">5.15.114</a>, <a href="https://lwn.net/Articles/932883">5.15.113</a>, <a href="https://lwn.net/Articles/932134">5.15.112</a>, <a href="https://lwn.net/Articles/931652">5.15.111</a>, <a href="https://lwn.net/Articles/930600">5.15.110</a>, <a href="https://lwn.net/Articles/930263">5.15.109</a>, <a href="https://lwn.net/Articles/929679">5.15.108</a>, <a href="https://lwn.net/Articles/929015/">5.15.107</a>, <a href="https://lwn.net/Articles/928343">5.15.106</a>, <a href="https://lwn.net/Articles/927860">5.15.105</a>, <a href="https://lwn.net/Articles/926873">5.15.104</a>, <a href="https://lwn.net/Articles/926415">5.15.103</a>, <a href="https://lwn.net/Articles/925991">5.15.102</a>, <a href="https://lwn.net/Articles/925939">5.15.101</a>, <a href="https://lwn.net/Articles/925913">5.15.100</a>, <a href="https://lwn.net/Articles/925844">5.15.99</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230404">20230404</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230310">20230310</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230210">20230210</a>))</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.19.9">1.19.9</a> (includes <a href="https://go.dev/doc/devel/release#go1.19.8">1.19.8</a>, <a href="https://go.dev/doc/devel/release#go1.19.7">1.19.7</a>, <a href="https://go.dev/doc/devel/release#go1.19.6">1.19.6</a>))</li>
<li>bash (<a href="https://lists.gnu.org/archive/html/bash-announce/2022-09/msg00000.html">5.2</a>)</li>
<li>bind tools (<a href="https://bind9.readthedocs.io/en/v9_16_37/notes.html#notes-for-bind-9-16-37">9.16.37</a>)</li>
<li>bpftool (<a href="https://kernelnewbies.org/LinuxChanges#Linux_6.2.Tracing.2C_perf_and_BPF">6.2.1</a>)</li>
<li>btrfs-progs (<a href="https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2-2022-11-24">6.0.2</a>, includes <a href="https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2022-10-11">6.0</a>)</li>
<li>c-ares (<a href="https://c-ares.org/changelog.html#1_19_0">1.19.0</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.21">1.6.21</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.6.20">1.6.20</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.19">1.6.19</a> <a href="https://github.com/containerd/containerd/releases/tag/v1.6.18">1.6.18</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#8_0_1">8.0.1</a> (includes <a href="https://curl.se/changes.html#7_88_1">7.88.1</a>, <a href="https://curl.se/changes.html#7_88_0">7.88.0</a>))</li>
<li>diffutils (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10282">3.9</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/20.10/#201024">20.10.24</a>)</li>
<li>e2fsprogs (<a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html##1.47.0">1.47.0</a> (includes <a href="https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.6">1.46.6</a>))</li>
<li>findutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00003.html">4.9.0</a>)</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-12/changes.html">12.2.1</a>)</li>
<li>gdb (<a href="https://lwn.net/Articles/923819/">13.1.90</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.39.2/Documentation/RelNotes/2.39.2.txt">2.39.2</a>)</li>
<li>GLib (<a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.6">2.74.6</a> (includes <a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.5">2.74.5</a>))</li>
<li>GnuTLS (<a href="https://gitlab.com/gnutls/gnutls/-/blob/3.8.0/NEWS">3.8.0</a>)</li>
<li>ignition (<a href="https://coreos.github.io/ignition/release-notes/#ignition-2150-2023-02-21">2.15.0</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214">20230214</a>)</li>
<li>iperf (<a href="https://github.com/esnet/iperf/blob/3.13/RELNOTES.md">3.13</a>)</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20221126">20221126</a>)</li>
<li>less (<a href="http://www.greenwoodsoftware.com/less/news.608.html">608</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.6.2">3.6.2</a>)</li>
<li>libpcap (<a href="https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.3:/CHANGES">1.10.3</a> (includes <a href="https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.2:/CHANGES">1.10.2</a>))</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.42/NEWS">10.42</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.4">2.10.4</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/commits/0.9.4">0.9.4</a>)</li>
<li>OpenSSH (<a href="http://www.openssh.com/releasenotes.html#9.3">9.3</a> (includes <a href="http://www.openssh.com/releasenotes.html#9.2">9.2</a>))</li>
<li>OpenSSL (<a href="https://github.com/openssl/openssl/blob/openssl-3.0.8/NEWS.md#major-changes-between-openssl-307-and-openssl-308-7-feb-2023">3.0.8</a>)</li>
<li>pinentry (<a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=c080b34e57d01a6ccca9d2996d7096c42b1a3f84;hb=8ab1682e80a2b4185ee9ef66cbb44340245966fc">1.2.1</a>)</li>
<li>qemu guest agent (<a href="https://wiki.qemu.org/ChangeLog/7.1#Guest_agent">7.1.0</a>)</li>
<li>readline (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-09/msg00013.html">8.2</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.7">1.1.7</a> (includes <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.6">1.1.6</a>, <a href="https://github.com/opencontainers/runc/releases/tag/v1.1.5">1.1.5</a>))</li>
<li>socat (<a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.4:/CHANGES">1.7.4.4</a>)</li>
<li>sqlite (<a href="https://sqlite.org/releaselog/3_41_2.html">3.41.2</a>)</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v6.1">6.1</a>)</li>
<li>traceroute (2.1.1)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v9.0.1403">9.0.1403</a> (includes <a href="https://github.com/vim/vim/releases/tag/v9.0.1363">9.0.1363</a>))</li>
<li>XZ utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.2">5.4.2</a>)</li>
<li>Zstandard (<a href="https://github.com/facebook/zstd/releases/tag/v1.5.4">1.5.4</a> (includes <a href="https://github.com/facebook/zstd/releases/tag/v1.5.2">1.5.2</a>, <a href="https://github.com/facebook/zstd/releases/tag/v1.5.1">1.5.1</a> and <a href="https://github.com/facebook/zstd/releases/tag/v1.5.0">1.5.0</a>))</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.25/release/3.25.html">3.25.2</a>)</li>
<li>SDK: dnsmasq (<a href="https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q1/016859.html">2.89</a>)</li>
<li>SDK: pahole (<a href="https://github.com/acmel/dwarves/releases/tag/v1.24">1.24</a>)</li>
<li>SDK: portage (<a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.44">3.0.44</a>)</li>
<li>SDK: python (<a href="https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-10-final">3.10.10</a> (includes <a href="https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-9-final">3.10.9</a>, <a href="https://www.python.org/downloads/release/python-3100/">3.10</a>))</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.68.2">1.68.2</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.68.0">1.68.0</a>, <a href="https://github.com/rust-lang/rust/releases/tag/1.67.1">1.67.1</a>))</li>
<li>SDK: nano (<a href="https://git.savannah.gnu.org/cgit/nano.git/tree/NEWS?h=v7.2">7.2</a>)</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.0">12.2.0</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.21</li>
<li>docker 20.10.24</li>
<li>ignition 2.15.0</li>
<li>kernel 5.15.133</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3602.2.0"/>
    <published>2023-10-05T10:02:27+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3510.2.8</id>
    <title>3510.2.8</title>
    <updated>2026-03-09T16:26:31.855069+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3510.2.7</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Azure: Add support for Microsoft Azure Network Adapter (MANA) NICs on Azure (<a href="https://github.com/flatcar/scripts/pull/1131">scripts#1131</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/943113">5.15.129</a> (includes <a href="https://lwn.net/Articles/942866">5.15.128</a>, <a href="https://lwn.net/Articles/941775">5.15.127</a>, <a href="https://lwn.net/Articles/941296">5.15.126</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_93.html">3.93</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.129</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.2.8"/>
    <published>2023-09-21T11:36:30+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3510.2.7</id>
    <title>3510.2.7</title>
    <updated>2026-03-09T16:26:31.850258+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3510.2.6</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed the restart of Systemd services when the main process is being killed by a SIGHUP signal (<a href="https://github.com/flatcar/Flatcar/issues/1157">flatcar#1157</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/940801">5.15.125</a> (includes <a href="https://lwn.net/Articles/940339">5.15.124</a>, <a href="https://lwn.net/Articles/939424">5.15.123</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.125</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.2.7"/>
    <published>2023-09-06T13:18:41+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3510.2.6</id>
    <title>3510.2.6</title>
    <updated>2026-03-09T16:26:31.845254+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3510.2.5</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48502">CVE-2022-48502</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2898">CVE-2023-2898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38432">CVE-2023-38432</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863</a>)</li>
<li>linux-firmware (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/939104">5.15.122</a> (includes <a href="https://lwn.net/Articles/939016">5.15.121</a>, <a href="https://lwn.net/Articles/937404">5.15.120</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_92.html">3.92</a>)</li>
<li>linux-firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625">20230625</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.122</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.2.6"/>
    <published>2023-08-09T11:42:20+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3510.2.5</id>
    <title>3510.2.5</title>
    <updated>2026-03-09T16:26:31.840913+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3510.2.4</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3338">CVE-2023-3338</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Resolved the conflicting FD usage of libselinux and systemd which caused, e.g., a systemd crash on certain watchdog interaction during shutdown (patch in systemd 252.11)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/936675">5.15.119</a> (includes <a href="https://lwn.net/Articles/935584">5.15.118</a>))</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v252.11">252.11</a> (from 252.5))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.119</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.2.5"/>
    <published>2023-07-18T09:00:12+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3510.2.4</id>
    <title>3510.2.4</title>
    <updated>2026-03-09T16:26:31.836437+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3510.2.3</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<ul>
<li>Changed ext4 inode size of root partition to 256 bytes. This improves compatibility with applications and is necessary for 2038 readiness (<a href="https://github.com/flatcar/Flatcar/issues/1082">Flatcar#1082</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/934622">5.15.117</a> (includes <a href="https://lwn.net/Articles/934320">5.15.116</a>, <a href="https://lwn.net/Articles/933909">5.15.115</a>, <a href="https://lwn.net/Articles/933280">5.15.114</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_91.html">3.91</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.117</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.2.4"/>
    <published>2023-07-06T12:16:13+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3510.2.3</id>
    <title>3510.2.3</title>
    <updated>2026-03-09T16:26:31.832186+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3510.2.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-48425">CVE-2022-48425</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/932883">5.15.113</a> (includes <a href="https://lwn.net/Articles/932134">5.15.112</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90.html">3.90</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.113</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.2.3"/>
    <published>2023-06-21T12:18:43+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3510.2.2</id>
    <title>3510.2.2</title>
    <updated>2026-03-09T16:26:31.827742+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3510.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<h4>Changes:</h4>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/931652">5.15.111</a> (includes <a href="https://lwn.net/Articles/930600">5.15.110</a>, <a href="https://lwn.net/Articles/930263">5.15.109</a>, <a href="https://lwn.net/Articles/929679">5.15.108</a>, <a href="https://lwn.net/Articles/929015">5.15.107</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89_1.html">3.89.1</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.111</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.2.2"/>
    <published>2023-06-01T11:50:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3510.2.1</id>
    <title>3510.2.1</title>
    <updated>2026-03-09T16:26:31.820284+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3510.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23004">CVE-2023-23004</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31607">CVE-2022-31607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31608">CVE-2022-31608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31615">CVE-2022-31615</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34665">CVE-2022-34665</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34666">CVE-2022-34666</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34670">CVE-2022-34670</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34673">CVE-2022-34673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34674">CVE-2022-34674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34676">CVE-2022-34676</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34677">CVE-2022-34677</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34678">CVE-2022-34678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34679">CVE-2022-34679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34680">CVE-2022-34680</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34682">CVE-2022-34682</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34684">CVE-2022-34684</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42254">CVE-2022-42254</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42255">CVE-2022-42255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42256">CVE-2022-42256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42257">CVE-2022-42257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42258">CVE-2022-42258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42259">CVE-2022-42259</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42260">CVE-2022-42260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42261">CVE-2022-42261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42263">CVE-2022-42263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42264">CVE-2022-42264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42265">CVE-2022-42265</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed the broken emerge-gitclone in the dev-container owing to the missing migration action around the unification of the Flatcar core repositories</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>The package upgrade for nvidia-drivers might result in not supporting a few of the older NVIDIA Tesla GPUs. If you are facing issues, set <code>NVIDIA_DRIVER_VERSION=460.106.00</code> in <code>/etc/flatcar/nvidia-metadata</code></li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/928343">5.15.106</a> (includes <a href="https://lwn.net/Articles/927860">5.15.105</a>, <a href="https://lwn.net/Articles/926873">5.15.104</a>, <a href="https://lwn.net/Articles/926415">5.15.103</a>, <a href="https://lwn.net/Articles/925991">5.15.102</a>, <a href="https://lwn.net/Articles/925939">5.15.101</a>, <a href="https://lwn.net/Articles/925913">5.15.100</a>, <a href="https://lwn.net/Articles/925844">5.15.99</a>))</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-525-105-17/index.html">525.105.17</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.106</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.2.1"/>
    <published>2023-04-25T13:41:09+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3510.2.0</id>
    <title>3510.2.0</title>
    <updated>2026-03-09T16:26:31.796773+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3374.2.5</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27672">CVE-2022-27672</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1281">CVE-2023-1281</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545</a>)</li>
<li>bind tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2881">CVE-2022-2881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2906">CVE-2022-2906</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3080">CVE-2022-3080</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38126">CVE-2022-38126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38127">CVE-2022-38127</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23471">CVE-2022-23471</a>)</li>
<li>cpio (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43551">CVE-2022-43551</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-35260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-42915</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-42916</a>)</li>
<li>dbus (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39260">CVE-2022-39260</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903</a>)</li>
<li>glib (<a href="https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835">fixes to normal form handling in GVariant</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36227">CVE-2022-36227</a>)</li>
<li>libksba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304</a>)</li>
<li>logrotate (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1348">CVE-2022-1348</a>)</li>
<li>multipath-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41973">CVE-2022-41973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974</a>)</li>
<li>sudo (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43995">CVE-2022-43995</a>)</li>
<li>systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3821">CVE-2022-3821</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4415">CVE-2022-4415</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0049">CVE-2023-0049</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0051">CVE-2023-0051</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0054">CVE-2023-0054</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3705">CVE-2022-3705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3491">CVE-2022-3491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3520">CVE-2022-3520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3591">CVE-2022-3591</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4141">CVE-2022-4141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4292">CVE-2022-4292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4293">CVE-2022-4293</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1725">CVE-2022-1725</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3234">CVE-2022-3234</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3235">CVE-2022-3235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3278">CVE-2022-3278</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3256">CVE-2022-3256</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3296">CVE-2022-3296</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3297">CVE-2022-3297</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3324">CVE-2022-3324</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3352">CVE-2022-3352</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2042">CVE-2022-2042</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2124">CVE-2022-2124</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2125">CVE-2022-2125</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2126">CVE-2022-2126</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2129">CVE-2022-2129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2175">CVE-2022-2175</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2182">CVE-2022-2182</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2183">CVE-2022-2183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2206">CVE-2022-2206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2207">CVE-2022-2207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2208">CVE-2022-2208</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2210">CVE-2022-2210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2231">CVE-2022-2231</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2257">CVE-2022-2257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2264">CVE-2022-2264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2284">CVE-2022-2284</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2285">CVE-2022-2285</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2286">CVE-2022-2286</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2287">CVE-2022-2287</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2288">CVE-2022-2288</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2289">CVE-2022-2289</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2304">CVE-2022-2304</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2343">CVE-2022-2343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2344">CVE-2022-2344</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2345">CVE-2022-2345</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2522">CVE-2022-2522</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2816">CVE-2022-2816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2817">CVE-2022-2817</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2819">CVE-2022-2819</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2845">CVE-2022-2845</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2849">CVE-2022-2849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2862">CVE-2022-2862</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2874">CVE-2022-2874</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2889">CVE-2022-2889</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2923">CVE-2022-2923</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2946">CVE-2022-2946</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2980">CVE-2022-2980</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2982">CVE-2022-2982</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3016">CVE-2022-3016</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3099">CVE-2022-3099</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3134">CVE-2022-3134</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3153">CVE-2022-3153</a>)</li>
<li>SDK: Python (<a href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3654">CVE-2021-3654</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061</a>)</li>
<li>SDK: qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4172">CVE-2022-4172</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14394">CVE-2020-14394</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0216">CVE-2022-0216</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-35414">CVE-2022-35414</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3872">CVE-2022-3872</a>)</li>
<li>SDK: rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-46176">CVE-2022-46176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36113">CVE-2022-36113</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36114">CVE-2022-36114</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added back Ignition support for Vagrant (<a href="https://github.com/flatcar/coreos-overlay/pull/2351">coreos-overlay#2351</a>)</li>
<li>Added support for hardware security keys in update-ssh-keys (<a href="https://github.com/flatcar/update-ssh-keys/pull/7">update-ssh-keys#7</a>)</li>
<li>Enabled IOMMU on arm64 kernels, the lack of which prevented some systems from booting (<a href="https://github.com/flatcar/coreos-overlay/pull/2235">coreos-overlay#2235</a>)</li>
<li>Fixed a regression (in Alpha/Beta) where machines failed to boot if they didn't have the <code>core</code> user or group in <code>/etc/passwd</code> or <code>/etc/group</code> (<a href="https://github.com/flatcar/baselayout/pull/26">baselayout#26</a>)</li>
<li>Fix &quot;ext4 deadlock under heavy I/O load&quot; kernel issue. The patch for this is included provisionally while we wait for it to be merged upstream (<a href="https://github.com/flatcar/Flatcar/issues/847">Flatcar#847</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/2315">coreos-overlay#2315</a>)</li>
<li>Restored the support to specify OEM partition files in Ignition when <code>/usr/share/oem</code> is given as initrd mount point (<a href="https://github.com/flatcar/bootengine/pull/58">bootengine#58</a>)</li>
<li>The rootfs setup in the initrd now runs systemd-tmpfiles on every boot, not only when Ignition runs, to fix a dbus failure due to missing files (<a href="https://github.com/flatcar/Flatcar/issues/944">Flatcar#944</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added <code>CONFIG_NF_CONNTRACK_BRIDGE</code> (for nf_conntrack_bridge) and <code>CONFIG_NFT_BRIDGE_META</code> (for nft_meta_bridge) to the kernel config to allow using conntrack rules for bridges in nftables and to match on bridge interface names (<a href="https://github.com/flatcar/coreos-overlay/pull/2207">coreos-overlay#2207</a>)</li>
<li>Added new image signing pub key to <code>flatcar-install</code>, needed for download verification of releases built from July 2023 onwards, if you have copies of <code>flatcar-install</code> or the image signing pub key, you need to update them as well (<a href="https://github.com/flatcar/init/pull/92">init#92</a>)</li>
<li>Change CONFIG_WIREGUARD kernel option to module to save space on boot partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2239">coreos-overlay#2239</a>)</li>
<li>Disable several arch specific arm64 kernel config options for unsupported platforms to save space on boot partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2239">coreos-overlay#2239</a>)</li>
<li>Specifying the OEM filesystem in Ignition to write files to <code>/usr/share/oem</code> is not needed anymore (<a href="https://github.com/flatcar/bootengine/pull/58">bootengine#58</a>)</li>
<li>Switched from <code>--strip-unneeded</code> to <code>--strip-debug</code> when installing kernel modules, which makes kernel stacktraces more accurate and makes debugging issues easier (<a href="https://github.com/flatcar/coreos-overlay/pull/2196">coreos-overlay#2196</a>)</li>
<li>The flatcar-update tool got two new flags to customize ports used on the host while updating flatcar (<a href="https://github.com/flatcar/init/pull/81">init#81</a>)</li>
<li>Toolbox now uses containerd to download and mount the image (<a href="https://github.com/flatcar/toolbox/pull/7">toolbox#7</a>)</li>
<li>Add qemu-guest-agent to all amd64 images, it will be automatically enabled when qemu-ga virtio-port is detected (<a href="https://github.com/flatcar/coreos-overlay/pull/2240">coreos-overlay#2240</a>, <a href="https://github.com/flatcar/portage-stable/pull/373">portage-stable#373</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/925080">5.15.98</a> (includes <a href="https://lwn.net/Articles/925064">5.15.97</a>, <a href="https://lwn.net/Articles/924441">5.15.96</a>, <a href="https://lwn.net/Articles/924073">5.15.95</a>, <a href="https://lwn.net/Articles/923308">5.15.94</a>, <a href="https://lwn.net/Articles/922814">5.15.93</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230117">20230117</a>)</li>
<li>adcli (<a href="https://gitlab.freedesktop.org/realmd/adcli/-/commits/8e88e3590a19006362ea8b8dfdc18bb88b3cb3b5/">0.9.2</a>)</li>
<li>bind tools (<a href="https://bind9.readthedocs.io/en/v9_16_36/notes.html#notes-for-bind-9-16-36">9.16.36</a> (includes <a href="https://bind9.readthedocs.io/en/v9_16_35/notes.html#notes-for-bind-9-16-34">9.16.34</a> and <a href="https://bind9.readthedocs.io/en/v9_16_34/notes.html#notes-for-bind-9-16-35">9.16.35</a>))</li>
<li>binutils (<a href="https://sourceware.org/pipermail/binutils/2022-August/122246.html">2.39</a>)</li>
<li>bpftool (<a href="https://lwn.net/Articles/909678/">5.19.12</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89.html">3.89</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.16">1.6.16</a>)</li>
<li>cpio (<a href="https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html">2.13</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_87_0">7.87.0</a> (includes <a href="https://curl.se/mail/archive-2022-08/0012.html">7.85</a>))</li>
<li>dbus (<a href="https://gitlab.freedesktop.org/dbus/dbus/-/raw/dbus-1.14.4/NEWS">1.14.4</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201023">20.10.23</a>)</li>
<li>elfutils (<a href="https://sourceware.org/pipermail/elfutils-devel/2022q4/005561.html">0.188</a> (includes <a href="https://sourceware.org/pipermail/elfutils-devel/2022q2/004978.html">0.187</a>))</li>
<li>Expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_5_0/expat/Changes">2.5.0</a>)</li>
<li>gawk (<a href="https://lists.gnu.org/archive/html/help-gawk/2022-11/msg00008.html">5.2.1</a> (contains <a href="https://lists.gnu.org/archive/html/help-gawk/2022-09/msg00000.html">5.2.0</a>))</li>
<li>gettext (<a href="https://git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob;f=NEWS;h=cdbb16746c23555e70bb1e16917f5c349ce92d9e;hb=8b38ee827251cadbb90cb6cb576ae98702566288">0.21.1</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.39.1/Documentation/RelNotes/2.39.1.txt">2.39.1</a> (includes <a href="https://github.com/git/git/blob/v2.39.0/Documentation/RelNotes/2.39.0.txt">2.39.0</a>))</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.4">2.74.4</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.19.5">1.19.5</a>)</li>
<li>glibc (<a href="https://sourceware.org/pipermail/libc-alpha/2022-August/141193.html">2.36</a> (includes <a href="https://savannah.gnu.org/forum/forum.php?forum_id=10111">2.35</a>))</li>
<li>GnuTLS (<a href="https://lists.gnupg.org/pipermail/gnutls-help/2022-September/004765.html">3.7.8</a>)</li>
<li>I2C tools (<a href="https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/tree/CHANGES?id=d8bc1f1ff4b00a6bd988aa114100ae9b787f50d8">4.3</a>)</li>
<li>Intel Microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20221108">20221108</a>)</li>
<li>iptables (<a href="https://www.netfilter.org/projects/iptables/files/changes-iptables-1.8.8.txt">1.8.8</a>)</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20211215">20211215</a>)</li>
<li>libcap (<a href="https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.d9ygdose5kw">2.66</a>)</li>
<li>libcap-ng (<a href="https://people.redhat.com/sgrubb/libcap-ng/ChangeLog">0.8.3</a>)</li>
<li>libksba (<a href="https://dev.gnupg.org/T6304">1.6.3</a>)</li>
<li>libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.4">2.5.4</a> (contains <a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.2">2.5.2</a>, <a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.3">2.5.3</a>))</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3">2.10.3</a>)</li>
<li>logrotate (<a href="https://github.com/logrotate/logrotate/releases/tag/3.20.1">3.20.1</a>)</li>
<li>MIT Kerberos V (<a href="https://web.mit.edu/kerberos/krb5-1.20/krb5-1.20.1.html">1.20.1</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/releases/tag/0.9.3">0.9.3</a>)</li>
<li>nettle (<a href="https://git.lysator.liu.se/nettle/nettle/-/blob/990abad16ceacd070747dcc76ed16a39c129321e/ChangeLog">3.8.1</a>)</li>
<li>nmap (<a href="https://nmap.org/changelog.html#7.93">7.93</a>)</li>
<li>OpenSSH (<a href="http://www.openssh.com/releasenotes.html#9.1">9.1</a>)</li>
<li>rsync (<a href="https://download.samba.org/pub/rsync/NEWS#3.2.7">3.2.7</a>)</li>
<li>shadow (<a href="https://github.com/shadow-maint/shadow/releases/tag/4.13">4.13</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_40_1.html">3.40.1</a> (contains <a href="https://www.sqlite.org/releaselog/3_40_0.html">3.40.0</a> and <a href="https://sqlite.org/releaselog/3_39_4.html">3.39.4</a>))</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v5.19">5.19</a>)</li>
<li>sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p2">1.9.12_p2</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v252.5">252.5</a> (includes <a href="https://github.com/systemd/systemd/releases/tag/v252">252</a>))</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v9.0.1157">9.0.1157</a> (includes <a href="https://github.com/vim/vim/releases/tag/v9.0.0469">9.0.0469</a>))</li>
<li>wget (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00017.html">1.21.3</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/commit/ab10466cf2e1ec4887f6a44375c3e29c1720157f">5.5.14</a>)</li>
<li>wireguard-tools (<a href="https://github.com/WireGuard/wireguard-tools/releases/tag/v1.0.20210914">1.0.20210914</a>)</li>
<li>XZ utils (<a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.1">5.4.1</a> (includes <a href="https://github.com/tukaani-project/xz/releases/tag/v5.4.0">5.4.0</a>))</li>
<li>zlib (<a href="https://github.com/madler/zlib/releases/tag/v1.2.13">1.2.13</a>)</li>
<li>OEM: python-oem (<a href="https://www.python.org/downloads/release/python-3916/">3.9.16</a>)</li>
<li>SDK: boost (<a href="https://www.boost.org/users/history/version_1_81_0.html">1.81.0</a>)</li>
<li>SDK: catalyst (<a href="https://gitweb.gentoo.org/proj/catalyst.git/log/?h=3.0.21">3.0.21</a>)</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/v3.23/release/3.23.html">3.23.3</a>)</li>
<li>SDK: file (<a href="https://mailman.astron.com/pipermail/file/2022-September/000857.html">5.43</a> (includes <a href="https://github.com/file/file/blob/FILE5_44/ChangeLog">5.44</a>))</li>
<li>SDK: libpng (<a href="http://www.libpng.org/pub/png/src/libpng-1.6.39-README.txt">1.6.39</a> (includes <a href="http://www.libpng.org/pub/png/src/libpng-1.6.38-README.txt">1.6.38</a>))</li>
<li>SDK: libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.37">1.1.37</a>)</li>
<li>SDK: meson (<a href="https://mesonbuild.com/Release-notes-for-0-62-0.html">0.62.2</a>)</li>
<li>SDK: ninja (<a href="https://groups.google.com/g/ninja-build/c/R2oCyDctDf8/m/-U94Y5I8AgAJ?pli=1">1.11.0</a>)</li>
<li>SDK: pahole (<a href="https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.23">1.23</a>)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/5.36.0/perldelta">5.36.0</a>)</li>
<li>SDK: portage (<a href="https://github.com/gentoo/portage/blob/portage-3.0.43/NEWS">3.0.43</a> (includes <a href="https://github.com/gentoo/portage/blob/portage-3.0.42/NEWS">3.0.42</a>, <a href="https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.41">3.0.41</a>))</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/7.2">7.2.0</a> (includes <a href="https://wiki.qemu.org/ChangeLog/7.1">7.1.0</a>))</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.67.0">1.67.0</a>)</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.5">12.1.5</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 3510.1.0</strong></em></p>
<h4>Security fixes:</h4>
<h4>Bug fixes:</h4>
<ul>
<li>Restored the support to specify OEM partition files in Ignition when <code>/usr/share/oem</code> is given as initrd mount point (<a href="https://github.com/flatcar/bootengine/pull/58">bootengine#58</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added new image signing pub key to <code>flatcar-install</code>, needed for download verification of releases built from July 2023 onwards, if you have copies of <code>flatcar-install</code> or the image signing pub key, you need to update them as well (<a href="https://github.com/flatcar/init/pull/92">init#92</a>)</li>
<li>Specifying the OEM filesystem in Ignition to write files to <code>/usr/share/oem</code> is not needed anymore (<a href="https://github.com/flatcar/bootengine/pull/58">bootengine#58</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89.html">3.89</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.16</li>
<li>docker 20.10.23</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.98</li>
<li>systemd 252</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3510.2.0"/>
    <published>2023-04-17T13:19:22+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3374.2.5</id>
    <title>3374.2.5</title>
    <updated>2026-03-09T16:26:31.784451+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3374.2.4</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4129">CVE-2022-4129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4842">CVE-2022-4842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1073">CVE-2023-1073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1074">CVE-2023-1074</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Excluded the special Kubernetes network interfaces <code>nodelocaldns</code> and <code>kube-ipvs0</code> from being managed with systemd-networkd which interfered with the setup (<a href="https://github.com/flatcar/init/pull/89">init#89</a>).</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/922340">5.15.92</a> (includes <a href="https://lwn.net/Articles/921851">5.15.91</a>, <a href="https://lwn.net/Articles/921029">5.15.90</a>))</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.8</li>
<li>docker 20.10.18</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.92</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3374.2.5"/>
    <published>2023-03-07T15:24:37+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3374.2.4</id>
    <title>3374.2.4</title>
    <updated>2026-03-09T16:26:31.779562+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3374.2.3</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0210">CVE-2023-0210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/920321">5.15.89</a> (includes <a href="https://lwn.net/Articles/920012">5.15.88</a>, <a href="https://lwn.net/Articles/919793">5.15.87</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_88_1.html">3.88.1</a>)</li>
<li>cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.24.2">1.24.2</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.8</li>
<li>docker 20.10.18</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.89</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3374.2.4"/>
    <published>2023-02-16T13:06:44+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3374.2.3</id>
    <title>3374.2.3</title>
    <updated>2026-03-09T16:26:31.773886+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3374.2.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3169">CVE-2022-3169</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3344">CVE-2022-3344</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3521">CVE-2022-3521</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3534">CVE-2022-3534</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3545">CVE-2022-3545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3643">CVE-2022-3643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47518">CVE-2022-47518</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47519">CVE-2022-47519</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47520">CVE-2022-47520</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-47521">CVE-2022-47521</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fix &quot;ext4 deadlock under heavy I/O load&quot; kernel issue. The patch for this is included provisionally while we stay with Kernel 5.15.86. (<a href="https://github.com/flatcar/Flatcar/issues/847">Flatcar#847</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/2402">coreos-overlay#2402</a>)</li>
</ul>
<h4>Changes:</h4>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/918808">5.15.86</a> (includes <a href="https://lwn.net/Articles/918329">5.15.85</a>, <a href="https://lwn.net/Articles/918206">5.15.84</a>, <a href="https://lwn.net/Articles/917896">5.15.83</a>, <a href="https://lwn.net/Articles/917400">5.15.82</a>, <a href="https://lwn.net/Articles/916763">5.15.81</a>, <a href="https://lwn.net/Articles/916003">5.15.80</a>))</li>
<li>git (<a href="https://github.com/git/git/blob/v2.37.5/Documentation/RelNotes/2.37.5.txt">2.37.5</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.8</li>
<li>docker 20.10.18</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.86</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3374.2.3"/>
    <published>2023-01-24T13:15:20+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3374.2.2</id>
    <title>3374.2.2</title>
    <updated>2026-03-09T16:26:31.768835+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3374.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3543">CVE-2022-3543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/915100">5.15.79</a> (includes <a href="https://lwn.net/Articles/914423">5.15.78</a>, <a href="https://lwn.net/Articles/913681">5.15.77</a>, <a href="https://lwn.net/Articles/912997">5.15.76</a>, <a href="https://lwn.net/Articles/912500">5.15.75</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_87.html">3.87</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.8</li>
<li>docker 20.10.18</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.79</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3374.2.2"/>
    <published>2023-01-11T13:31:35+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3374.2.1</id>
    <title>3374.2.1</title>
    <updated>2026-03-09T16:26:31.764126+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3374.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3535">CVE-2022-3535</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3542">CVE-2022-3542</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41849">CVE-2022-41849</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41850">CVE-2022-41850</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/913681">5.15.77</a> (includes <a href="https://lwn.net/Articles/912997">5.15.76</a>, <a href="https://lwn.net/Articles/912500">5.15.75</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_85.html">3.85</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.8</li>
<li>docker 20.10.18</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.77</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3374.2.1"/>
    <published>2022-12-09T09:46:15+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3374.2.0</id>
    <title>3374.2.0</title>
    <updated>2026-03-09T16:26:31.745861+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3227.2.4</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2308">CVE-2022-2308</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3621">CVE-2022-3621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3646">CVE-2022-3646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3649">CVE-2022-3649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45078">CVE-2021-45078</a>)</li>
<li>cifs-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29869">CVE-2022-29869</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">CVE-2022-27774</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">CVE-2022-27775</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27778">CVE-2022-27778</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27779">CVE-2022-27779</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27780">CVE-2022-27780</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30115">CVE-2022-30115</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32205">CVE-2022-32205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32206">CVE-2022-32206</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32207">CVE-2022-32207</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36109">CVE-2022-36109</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187</a>)</li>
<li>GNU Libtasn1 (<a href="https://bugs.gentoo.org/866237">Gentoo#866237</a>)</li>
<li>gnupg (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2509">CVE-2022-2509</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32190">CVE-2022-32190</a>)</li>
<li>ignition (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1706">CVE-2022-1706</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21233">CVE-2022-21233</a>)</li>
<li>libtirpc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2016-3709">CVE-2016-3709</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824</a>)</li>
<li>ncurses (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">CVE-2022-29458</a>)</li>
<li>oniguruma (<a href="https://bugs.gentoo.org/841893">oniguruma-20220430</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1343">CVE-2022-1343</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1434">CVE-2022-1434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1473">CVE-2022-1473</a>)</li>
<li>polkit (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4115">CVE-2021-4115</a>)</li>
<li>rsync (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235</a>)</li>
<li>unzip (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0529">CVE-2022-0529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0530">CVE-2022-0530</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4217">CVE-2021-4217</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">CVE-2022-0629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">CVE-2022-0685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">CVE-2022-0714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">CVE-2022-0729</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">CVE-2022-0943</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">CVE-2022-1154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1160">CVE-2022-1160</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1381">CVE-2022-1381</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">CVE-2022-1616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">CVE-2022-1619</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">CVE-2022-1620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">CVE-2022-1621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">CVE-2022-1629</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1674">CVE-2022-1674</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">CVE-2022-1733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">CVE-2022-1735</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1769">CVE-2022-1769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1771">CVE-2022-1771</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">CVE-2022-1796</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">CVE-2022-1898</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1886">CVE-2022-1886</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">CVE-2022-1851</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1942">CVE-2022-1942</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1968">CVE-2022-1968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2000">CVE-2022-2000</a>)</li>
<li>zlib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434</a>)</li>
<li>VMware: open-vm-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676</a>)</li>
<li>SDK: qemu (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3930">CVE-2021-3930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3947">CVE-2021-3947</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4145">CVE-2021-4145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26353">CVE-2022-26353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26354">CVE-2022-26354</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed Ignition btrfs forced formatting for OEM partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2277">coreos-overlay#2277</a>)</li>
<li>Removed outdated LTS channel information printed on login (<a href="https://github.com/flatcar-linux/init/pull/75">init#75</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added efibootmgr binary to the image (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1955">coreos-overlay#1955</a>)</li>
<li>Added symlink from <code>nc</code> to <code>ncat</code>. <code>-q</code> option is <a href="https://github.com/nmap/nmap/issues/2422">not yet supported</a> (<a href="https://github.com/flatcar-linux/Flatcar/issues/545">flatcar#545</a>)</li>
<li>flatcar-install: Added option to create UEFI boot entry (<a href="https://github.com/flatcar-linux/init/pull/74">init#74</a>)</li>
<li>AWS: Added AWS IMDSv2 support to coreos-cloudinit (<a href="https://github.com/flatcar-linux/coreos-cloudinit/pull/13">flatcar-linux/coreos-cloudinit#13</a>)</li>
<li>VMware: Added VMware networking configuration in the initramfs via guestinfo settings (<a href="https://github.com/flatcar-linux/bootengine/pull/44">bootengine#44</a>, <a href="https://github.com/flatcar-linux/Flatcar/issues/717">flatcar#717</a>)</li>
<li>VMWare: Added <code>ignition-delete-config.service</code> to remove Ignition config from VM metadata, see also <a href="https://coreos.github.io/ignition/operator-notes/#automatic-config-deletion">here</a> (<a href="https://github.com/flatcar-linux/coreos-overlay/pull/1948">coreos-overlay#1948</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/911275">5.15.74</a> (includes (<a href="https://lwn.net/Articles/910957">5.15.73</a>, <a href="https://lwn.net/Articles/910398">5.15.72</a>. <a href="https://lwn.net/Articles/909679">5.15.71</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220913">20220913</a>)</li>
<li>acpid (<a href="https://sourceforge.net/p/acpid2/code/ci/2.0.33/tree/Changelog">2.0.33</a>)</li>
<li>adcli (<a href="https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.1">0.9.1</a>)</li>
<li>automake (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10055">1.16.5</a>)</li>
<li>binutils (<a href="https://lwn.net/Articles/884264/">2.38</a>)</li>
<li>bison (<a href="https://lists.gnu.org/archive/html/bug-bison/2021-09/msg00056.html">3.8.2</a>)</li>
<li>boost (<a href="https://www.boost.org/users/history/version_1_79_0.html">1.79</a>)</li>
<li>cifs-utils (<a href="https://lists.samba.org/archive/samba-technical/2022-April/137335.html">6.15</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.8">1.6.8</a>)</li>
<li>curl (<a href="https://github.com/curl/curl/releases/tag/curl-7_84_0">7.84.0</a>)</li>
<li>Cyrus SASL (<a href="https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28">2.1.28</a>)</li>
<li>dbus (<a href="https://gitlab.freedesktop.org/dbus/dbus/-/blob/177ab044bc87cbc4ded75d21b900795a6fefef76/NEWS">1.12.22</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201018">20.10.18</a>)</li>
<li>e2fsprogs (<a href="http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.5">1.46.5</a>)</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-11/changes.html">11.3.0</a>)</li>
<li>gdb (<a href="https://lists.gnu.org/archive/html/info-gnu/2022-01/msg00009.html">11.2</a>)</li>
<li>gdbm (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-10/msg00006.html">1.22</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/v2.35.3/Documentation/RelNotes/2.35.3.txt">2.35.3</a>)</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.73.3">2.72.3</a>)</li>
<li>GNU Libtasn1 (<a href="https://lists.gnu.org/archive/html/help-libtasn1/2022-08/msg00001.html">4.19.0</a>)</li>
<li>gnupg (<a href="https://dev.gnupg.org/T5928">2.2.35</a>)</li>
<li>gnutls (<a href="https://gitlab.com/gnutls/gnutls/-/tags/3.7.7">3.7.7</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.18.6">1.18.6</a>)</li>
<li>ignition (<a href="https://github.com/coreos/ignition/releases/tag/v2.14.0">2.14.0</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220809">20220809</a>)</li>
<li>ldb (<a href="https://gitlab.com/samba-team/samba/-/commit/a795e0c84597aa045d011e663dbad3cdabf0f1e6">2.4.1</a>)</li>
<li>libtool (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10139">2.4.7</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.2">2.10.2</a>)</li>
<li>ncurses (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-11/msg00001.html">6.3_p20220423</a>)</li>
<li>oniguruma (<a href="https://github.com/kkos/oniguruma/releases/tag/v6.9.8">6.9.8</a>)</li>
<li>OpenSSL (<a href="https://www.openssl.org/news/openssl-3.0-notes.html">3.0.7</a>)</li>
<li>perl (<a href="https://perldoc.perl.org/5.34.1/perldelta">5.34.1</a>)</li>
<li>pkgconf (<a href="https://gitea.treehouse.systems/ariadne/pkgconf/src/tag/pkgconf-1.8.0/NEWS">1.8.0</a>)</li>
<li>polkit (<a href="https://gitlab.freedesktop.org/polkit/polkit/-/commit/827b0ddac5b1ef00a47fca4526fcf057bee5f1db">121</a>)</li>
<li>python (<a href="https://www.python.org/downloads/release/python-3912/">3.9.12</a>)</li>
<li>rsync (<a href="https://github.com/WayneD/rsync/releases/tag/v3.2.6">3.2.6</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.4">1.1.4</a>)</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.15.4.html">4.15.4</a>)</li>
<li>shadow (<a href="https://github.com/shadow-maint/shadow/releases/tag/4.12.3">4.12.3</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_38_1.html">3.38.1</a>)</li>
<li>sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_10">1.9.10</a>)</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/commit/bc1ee7ca0640f0136e5af7dcc4ca8ed0a5893053">2.3.3</a>)</li>
<li>tevent (<a href="https://gitlab.com/samba-team/samba/-/commit/de4e8a1af9564f6056f9af90867c2f013449051c">0.11.0</a>)</li>
<li>unzip (<a href="https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-27_changelog">6.0_p27</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v8.2.5066">8.2.5066</a>)</li>
<li>OEM: distro (<a href="https://github.com/python-distro/distro/releases/tag/v1.7.0">1.7.0</a>)</li>
<li>OEM: python (<a href="https://www.python.org/downloads/release/python-3912/">3.9.12</a>)</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.0">12.1.0</a>)</li>
<li>SDK: libxslt (<a href="https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.35">1.1.35</a>)</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/7.0">7.0.0</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.63.0">1.63.0</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 3374.1.1</strong></em></p>
<h4>Bug fixes:</h4>
<ul>
<li>Fixed Ignition btrfs forced formatting for OEM partition (<a href="https://github.com/flatcar/coreos-overlay/pull/2277">coreos-overlay#2277</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>OpenSSL (<a href="https://www.openssl.org/news/openssl-3.0-notes.html">3.0.7</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.8</li>
<li>docker 20.10.18</li>
<li>ignition 2.14.0</li>
<li>kernel 5.15.74</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3374.2.0"/>
    <published>2022-11-17T07:03:54+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3227.2.4</id>
    <title>3227.2.4</title>
    <updated>2026-03-09T16:26:31.736500+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3227.2.3</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>OpenSSL (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>OpenStack: enabled <code>coreos-metadata-sshkeys@.service</code> to provision SSH keys from metadata. (<a href="https://github.com/flatcar/Flatcar/issues/817">Flatcar#817</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/2246">coreos-overlay#2246</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_84.html">3.84</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.6</li>
<li>docker 20.10.14</li>
<li>ignition 2.13.0</li>
<li>kernel 5.15.70</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3227.2.4"/>
    <published>2022-11-09T13:47:07+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/scripts/releases/tag/stable-3227.2.3</id>
    <title>3227.2.3</title>
    <updated>2026-03-09T16:26:31.730547+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable 3227.2.2</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0171">CVE-2022-0171</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3061">CVE-2022-3061</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3176">CVE-2022-3176</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39842">CVE-2022-39842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40307">CVE-2022-40307</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added back <code>gettext</code> to the OS (<a href="https://github.com/flatcar-linux/Flatcar/issues/849">Flatcar#849</a>)</li>
<li>Added merging of Ignition systemd duplicated units when auto-translating from Ignition 2 to Ignition 3. (<a href="https://github.com/flatcar/coreos-overlay/pull/2187">coreos-overlay#2187</a>)</li>
<li>Equinix Metal: Fixed serial console settings for the <code>m3.small.x86</code> instance by expanding the GRUB check for <code>i386</code> to <code>x86_64</code> <a href="https://github.com/flatcar-linux/coreos-overlay/pull/2122">coreos-overlay#2122</a></li>
</ul>
<h4>Changes:</h4>
<ul>
<li>emerge-gitclone: Migrate emerge-gitclone to use scripts repo tags and submodule refs</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/909212">5.15.70</a> (includes <a href="https://lwn.net/Articles/908782">5.15.69</a>, <a href="https://lwn.net/Articles/908140">5.15.68</a>, <a href="https://lwn.net/Articles/907526">5.15.67</a>, <a href="https://lwn.net/Articles/907524">5.15.66</a>, <a href="https://lwn.net/Articles/907204">5.15.65</a>, <a href="https://lwn.net/Articles/906630">5.15.64</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_83.html">3.83</a>)</li>
<li>gettext (<a href="https://www.gnu.org/software/gettext/">0.21</a>)</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.17.13">1.17.13</a>)</li>
<li>locksmith(<a href="https://github.com/flatcar/locksmith/blob/v0.7.0/CHANGELOG.md#v070--30112021">0.7.0</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_9/expat/Changes">2.4.9</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.6</li>
<li>docker 20.10.14</li>
<li>ignition 2.13.0</li>
<li>kernel 5.15.70</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3227.2.3"/>
    <published>2022-10-17T14:38:46+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3227.2.2</id>
    <title>3227.2.2</title>
    <updated>2026-03-09T16:26:31.724663+00:00</updated>
    <content type="html"><![CDATA[<p><em>Note: The ARM64 AWS AMI of the Stable release has an unknown issue of corrupted images which we are still investigating. We will release the AMI as soon as we have resolved the issue. Follow <a href="https://github.com/flatcar/Flatcar/issues/840">#840</a> for more information</em></p>
<p><em>Changes since <strong>Stable 3227.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>AWS: added EKS support for version 1.22 and 1.23. (<a href="https://github.com/flatcar/coreos-overlay/pull/2110">coreos-overlay#2110</a>, <a href="https://github.com/flatcar/Flatcar/issues/829">Flatcar#829</a>)</li>
<li>VMWare: excluded <code>wireguard</code> (and others) from <code>systemd-networkd</code> management. (<a href="https://github.com/flatcar/init/pull/80">init#80</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>The new image signing subkey was added to the public key embedded into <code>flatcar-install</code> (the old expired on 10th August 2022), only an updated <code>flatcar-install</code> script can verify releases signed with the new key (<a href="https://github.com/flatcar/init/pull/79">init#79</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/906061">5.15.63</a> (includes <a href="https://lwn.net/Articles/905533">5.15.62</a>, <a href="https://lwn.net/Articles/904959">5.15.61</a>, <a href="https://lwn.net/Articles/904461">5.15.60</a>, <a href="https://lwn.net/Articles/903688">5.15.59</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_82.html">3.82</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.6</li>
<li>docker 20.10.14</li>
<li>ignition 2.13.0</li>
<li>kernel 5.15.63</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3227.2.2"/>
    <published>2022-09-01T13:00:57+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3227.2.1</id>
    <title>3227.2.1</title>
    <updated>2026-03-09T16:26:31.719157+00:00</updated>
    <content type="html"><![CDATA[<p>New Stable Release 3227.2.1</p>
<p>Changes since Stable 3227.2.0</p>
<h2>Security fixes:</h2>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901</a>)</li>
</ul>
<h2>Bug fixes:</h2>
<ul>
<li>Added support for Openstack for cloud-init activation (<a href="https://github.com/flatcar/init/pull/76">flatcar-linux/init#76</a>)</li>
<li>Excluded Wireguard interface from <code>systemd-networkd</code> default management (<a href="https://github.com/flatcar/Flatcar/issues/808">Flatcar#808</a>)</li>
<li>Fixed <code>/etc/resolv.conf</code> symlink by pointing it at <code>resolv.conf</code> instead of <code>stub-resolv.conf</code>. This bug was present since the update to systemd v250 (<a href="https://github.com/flatcar/coreos-overlay/pull/2057">coreos-overlay#2057</a>)</li>
<li>Fixed excluded interface type from default systemd-networkd configuration (<a href="https://github.com/flatcar/init/pull/78">flatcar-linux/init#78</a>)</li>
<li>Fixed space escaping in the <code>networkd</code> Ignition translation (<a href="https://github.com/flatcar/Flatcar/issues/812">Flatcar#812</a>)</li>
</ul>
<h2>Changes:</h2>
<h2>Updates:</h2>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/902917">5.15.58</a> (includes <a href="https://lwn.net/Articles/902317">5.15.57</a>, <a href="https://lwn.net/Articles/902101">5.15.56</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_81.html">3.81</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>containerd 1.6.6</li>
<li>docker 20.10.14</li>
<li>ignition 2.13.0</li>
<li>kernel 5.15.58</li>
<li>systemd 250</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3227.2.1"/>
    <published>2022-08-04T12:07:17+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3227.2.0</id>
    <title>3227.2.0</title>
    <updated>2026-03-09T16:26:31.695050+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> Release <strong>3227.2.0</strong></p>
<p><em>Changes since <strong>Beta 3227.1.1</strong></em></p>
<h2>Security fixes:</h2>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33744">CVE-2022-33744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148</a>)</li>
</ul>
<h2>Bug fixes:</h2>
<ul>
<li>The Ignition v3 kargs directive failed before when used with the generic image where no <code>grub.cfg</code> exists, this was fixed by creating it first (<a href="https://github.com/flatcar/bootengine/pull/47">bootengine#47</a>)</li>
</ul>
<h2>Changes:</h2>
<ul>
<li>Enabled <code>containerd.service</code> unit, <code>br_netfilter</code> and <code>overlay</code> modules by default to follow Kubernetes requirements (<a href="https://github.com/flatcar/coreos-overlay/pull/1944">coreos-overlay#1944</a>, <a href="https://github.com/flatcar/init/pull/72">init#72</a>)</li>
</ul>
<h2>Updates:</h2>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/901380">5.15.55</a> (includes <a href="https://lwn.net/Articles/900911">5.15.54</a>, <a href="https://lwn.net/Articles/900321">5.15.53</a>, <a href="https://lwn.net/Articles/899788">5.15.52</a>, <a href="https://lwn.net/Articles/899370">5.15.51</a>, <a href="https://lwn.net/Articles/899091">5.15.50</a>, <a href="https://lwn.net/Articles/898622">5.15.49</a>))</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.17.12">1.17.12</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_80.html">3.80</a>)</li>
</ul>
<p><em>Changes compared to <strong>Stable 3139.2.3</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-33744">CVE-2022-33744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148</a>)</li>
<li>cifs-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20208">CVE-2021-20208</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-31030">CVE-2022-31030</a>)</li>
<li>cryptsetup (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4122">CVE-2021-4122</a>)</li>
<li>duktape (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46322">CVE-2021-46322</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4209">CVE-2021-4209</a>, <a href="https://gitlab.com/gnutls/gnutls/-/issues/1277">GNUTLS-SA-2022-01-17</a>)</li>
<li>gzip,xz-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146</a>)</li>
<li>libarchive (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31566">CVE-2021-31566</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36976">CVE-2021-36976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26280">CVE-2022-26280</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28181">CVE-2022-28181</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28183">CVE-2022-28183</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28184">CVE-2022-28184</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28185">CVE-2022-28185</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235</a>)</li>
<li>systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3997">CVE-2021-3997</a>)</li>
<li>util-linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3995">CVE-2021-3995</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3996">CVE-2021-3996</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">CVE-2022-0563</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3984">CVE-2021-3984</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4019">CVE-2021-4019</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4069">CVE-2021-4069</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4136">CVE-2021-4136</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4173">CVE-2021-4173</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166"> CVE-2021-4166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4187">CVE-2021-4187</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">CVE-2021-4192</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">CVE-2021-4193</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0128">CVE-2022-0128</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0156">CVE-2022-0156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0158">CVE-2022-0158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0213">CVE-2022-0213</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">CVE-2022-0261</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">CVE-2022-0318</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0319">CVE-2022-0319</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0351">CVE-2022-0351</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">CVE-2022-0359</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">CVE-2022-0361</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">CVE-2022-0368</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">CVE-2022-0392</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0393">CVE-2022-0393</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0407">CVE-2022-0407</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">CVE-2022-0408</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">CVE-2022-0413</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">CVE-2022-0417</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">CVE-2022-0443</a>)</li>
<li>zlib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032</a>)</li>
<li>SDK: squashfs-tools (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Added <code>networkd</code> translation to <code>files</code> section when converting from Ignition 2.x to Ignition 3.x (<a href="https://github.com/flatcar/coreos-overlay/pull/1910">coreos-overlay#1910</a>, <a href="https://github.com/flatcar/Flatcar/issues/741">flatcar#741</a>)</li>
<li>Added a remount action as <code>systemd-sysext.service</code> drop-in unit to restore the OEM partition mount after the overlay mounts in <code>/usr</code> are done (<a href="https://github.com/flatcar/init/pull/69">init#69</a>)</li>
<li>Fixed Ignition's OEM ID to be <code>metal</code> to follow the Ignition upstream change which otherwise resulted in a broken boot when the Flatcar OEM ID <code>pxe</code> was used (<a href="https://github.com/flatcar/bootengine/pull/45">bootengine#45</a>)</li>
<li>Made Ignition write the SSH keys into a file under <code>authorized_keys.d/ignition</code> again and added a call to <code>update-ssh-keys</code> after Ignition ran to create the merged <code>authorized_keys</code> file, which fixes the problem that keys added by Ignition get lost when <code>update-ssh-keys</code> runs (<a href="https://github.com/flatcar/init/pull/66">init#66</a>)</li>
<li>Skipped starting <code>ensure-sysext.service</code> if <code>systemd-sysext.service</code> won't be started, to prevent reporting a dependency failure (<a href="https://github.com/flatcar/Flatcar/issues/710">Flatcar#710</a>)</li>
<li>The Ignition v3 kargs directive failed before when used with the generic image where no <code>grub.cfg</code> exists, this was fixed by creating it first (<a href="https://github.com/flatcar/bootengine/pull/47">bootengine#47</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added <code>auditd.service</code> but left it disabled by default, a custom configuration can be created by removing <code>/etc/audit/auditd.conf</code> and replacing it with an own file (<a href="https://github.com/flatcar/coreos-overlay/pull/1636">coreos-overlay#1636</a>)</li>
<li>Added <code>cryptsetup</code> to the initramfs for the Ignition <code>luks</code> directive (<a href="https://github.com/flatcar/coreos-overlay/pull/1760">flatcar-linux/coreos-overlay#1760</a>)</li>
<li>Besides Ignition v1 and v2 configurations, Ignition configurations with specification v3 (up to 3.3.0) are now supported, see the <a href="https://www.flatcar.org/docs/latest/provisioning/ignition/specification/#ignition-v3">docs section for details</a></li>
<li>Bring in dependencies for NFS4 with Kerberos both in kernel and userspace. Tested against NFS4.1 server. <a href="https://github.com/flatcar/coreos-overlay/pull/1664">coreos-overlay#1664</a></li>
<li>Enabled <code>CONFIG_INTEL_RAPL</code> on AMD64 Kernel config to compile <code>intel_rapl_common</code> module in order to allow power monitoring on modern Intel processors (<a href="https://github.com/flatcar/coreos-overlay/pull/1801">coreos-overlay#1801</a>)</li>
<li>Enabled <code>containerd.service</code> unit, <code>br_netfilter</code> and <code>overlay</code> modules by default to follow Kubernetes requirements (<a href="https://github.com/flatcar/coreos-overlay/pull/1944">coreos-overlay#1944</a>, <a href="https://github.com/flatcar/init/pull/72">init#72</a>)</li>
<li>Enabled <code>systemd-sysext.service</code> to activate systemd-sysext images on boot, to disable you will need to mask it. Also added a helper service <code>ensure-sysext.service</code> which reloads the systemd units to reevaluate the <code>sockets</code>, <code>timers</code>, and <code>multi-user</code> targets when <code>systemd-sysext.service</code> is (re)started, making it possible to enable units that are part of a sysext image (<a href="https://github.com/flatcar/init/pull/65">init#65</a>)</li>
<li>For amd64 <code>/usr/lib</code> used to be a symlink to <code>/usr/lib64</code> but now they became two separate folders as common in other distributions (and was the case for arm64 already). Compatibility symlinks exist in case <code>/usr/lib64</code> was used to access, e.g., the <code>modules</code> folder or the <code>systemd</code> folder (<a href="https://github.com/flatcar/coreos-overlay/pull/1713">coreos-overlay#1713</a>, <a href="https://github.com/flatcar/scripts/pull/255">scripts#255</a>)</li>
<li>Made SELinux enabled by default in default containerd configuration file. (<a href="https://github.com/flatcar/coreos-overlay/pull/1699">coreos-overlay#1699</a>)</li>
<li>Removed rngd.service because it is not essential anymore for the kernel to boot fast in VM environments (<a href="https://github.com/flatcar/coreos-overlay/pull/1700">coreos-overlay#1700</a>)</li>
<li>The systemd-networkd <code>ManageForeignRoutes</code> and <code>ManageForeignRoutingPolicyRules</code> settings are now disabled through a drop-in file and thus can only be enabled again by a drop-in file under <code>/etc/systemd/networkd.conf.d/</code> because drop-in files take precedence over <code>/etc/systemd/networkd.conf</code> (<a href="https://github.com/flatcar/init/pull/61">init#61</a>)</li>
<li>Azure VHD disks are now created using subformat=fixed, which makes them suitable for immediate upload to Azure using any tool.</li>
<li>Defined a systemd-sysext level that sysext images can match for instead of the OS version when they don't have a strong coupling, meaning the only metadata required is <code>SYSEXT_LEVEL=1.0</code> and <code>ID=flatcar</code> (<a href="https://github.com/flatcar/Flatcar/issues/643">Flatcar#643</a>)</li>
<li>ARM64: Added <a href="https://wiki.samba.org/index.php/LinuxCIFS_utils">cifs-utils</a> for ARM64</li>
<li>ARM64: Added <a href="https://sssd.io/">sssd</a>, <a href="https://www.freedesktop.org/software/realmd/adcli/adcli.html">adcli</a> and realmd for ARM64</li>
<li>AWS EC2: Removed the setup of <code>/etc/hostname</code> from the instance metadata because it used a long FQDN but we can just use use the hostname set via DHCP (<a href="https://github.com/flatcar/Flatcar/issues/707">Flatcar#707</a>)</li>
<li>Azure: Set up <code>/etc/hostname</code> from instance metadata with Afterburn</li>
<li>DigitalOcean: In addition to the <code>bz2</code> image, a <code>gz</code> compressed image is published. This helps against hitting the compression timeout that sometimes lets the image import fail.</li>
<li>OpenStack: In addition to the <code>bz2</code> image, a <code>gz</code> compressed image is published. This allows Glance to directly consume the images by simply passing in the URL of the image.</li>
<li>SDK: The image compression format is now configurable. Supported formats are: <code>bz2</code>, <code>gz</code>, <code>zip</code>, <code>none</code>, <code>zst</code>. Selecting the image format can now be done by passing the <code>--image_compression_formats</code> option. This flag gets a comma separated list of formats.</li>
<li>SDK / ARM64: Added <a href="https://pkg.go.dev/github.com/coreos/go-tspi">go-tspi</a> bindings for ARM64</li>
</ul>
<h2>Updates:</h2>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/901380">5.15.55</a> (includes <a href="https://lwn.net/Articles/900911">5.15.54</a>, <a href="https://lwn.net/Articles/900321">5.15.53</a>, <a href="https://lwn.net/Articles/899788">5.15.52</a>, <a href="https://lwn.net/Articles/899370">5.15.51</a>, <a href="https://lwn.net/Articles/899091">5.15.50</a>, <a href="https://lwn.net/Articles/898622">5.15.49</a>, <a href="https://lwn.net/Articles/898124">5.15.48</a>, <a href="https://lwn.net/Articles/897904">5.15.47</a>, <a href="https://lwn.net/Articles/897377">5.15.46</a>, <a href="https://lwn.net/Articles/897167">5.15.45</a>, <a href="https://lwn.net/Articles/896647">5.15.44</a>, <a href="https://lwn.net/Articles/896231">5.15.43</a>, <a href="https://lwn.net/Articles/896226">5.15.42</a>, <a href="https://lwn.net/Articles/895645">5.15.41</a>, <a href="https://lwn.net/Articles/895318">5.15.40</a>, <a href="https://lwn.net/Articles/895070">5.15.39</a>, <a href="https://lwn.net/Articles/894357">5.15.38</a>, <a href="https://lwn.net/Articles/893264">5.15.37</a>, <a href="https://lwn.net/Articles/892812">5.15.36</a>, <a href="https://lwn.net/Articles/892002">5.15.35</a>))</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220411">20220411</a> (includes <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220310">20220310</a>, <a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220209">20220209</a>))</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201014">20.10.14</a> (includes <a href="https://docs.docker.com/engine/release-notes/#201013">20.10.13</a>))</li>
<li>Go (<a href="https://go.dev/doc/devel/release#go1.17.12">1.17.12</a>)</li>
<li>afterburn (<a href="https://github.com/coreos/afterburn/releases/tag/v5.2.0">5.2.0</a>)</li>
<li>bind-tools (<a href="https://gitlab.isc.org/isc-projects/bind9/-/blob/v9_16_27/CHANGES">9.16.27</a>)</li>
<li>bpftool (<a href="https://lwn.net/Articles/878631/">5.15.8</a>)</li>
<li>bridge-utils (<a href="https://git.kernel.org/pub/scm/network/bridge/bridge-utils.git/log/?h=v1.7.1">1.7.1</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_80.html">3.80</a> (includes <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_79.html">3.79</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html">3.78</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html">3.77</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_76.html">3.76</a>, <a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_75.html">3.75</a>))</li>
<li>cifs-utils (<a href="https://lkml.kernel.org/linux-cifs/CAKywueSqRGSFmeDHQacyu831BNUeGFxGg3vgBmozzhkGBCjyXQ@mail.gmail.com/T/">6.13</a>)</li>
<li>conntrack-tools (<a href="https://lists.netfilter.org/pipermail/netfilter-announce/2020/000240.html">1.4.6</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.6.6">1.6.6</a> (includes <a href="https://github.com/containerd/containerd/releases/tag/v1.6.5">1.6.5</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.4">1.6.4</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.3">1.6.3</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.2">1.6.2</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.1">1.6.1</a>, <a href="https://github.com/containerd/containerd/releases/tag/v1.6.0">1.6.0</a>))</li>
<li>cryptsetup (<a href="https://lore.kernel.org/all/572c18a7bf60cb1b0f67c3a03c531d7e7ed31832.camel@scientia.net/T/">2.4.3</a>)</li>
<li>dosfstools (<a href="https://github.com/dosfstools/dosfstools/releases/tag/v4.2">4.2</a>)</li>
<li>duktape (<a href="https://github.com/svaarala/duktape/releases/tag/v2.7.0">2.7.0</a>)</li>
<li>e2fsprogs (<a href="http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.4">1.46.4</a>)</li>
<li>elfutils (<a href="https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=490932ae4ef9b5a3af01d2c8c616f14d57586046;hb=983e86fd89e8bf02f2d27ba5dce5bf078af4ceda">0.186</a>)</li>
<li>gcc (<a href="https://gcc.gnu.org/gcc-10/changes.html">10.3.0</a>)</li>
<li>gnutls (<a href="https://gitlab.com/gnutls/gnutls/-/merge_requests/1517">3.7.3</a>)</li>
<li>grep (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10037">3.7</a>)</li>
<li>gzip (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=10157">1.12</a> (includes <a href="https://lists.gnu.org/archive/html/info-gnu/2021-09/msg00002.html">1.11</a>))</li>
<li>ignition (<a href="https://github.com/coreos/ignition/releases/tag/v2.13.0">2.13.0</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207">20220207_p20220207</a>)</li>
<li>iperf (<a href="https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-3101-2021-06-03">3.10.1</a>)</li>
<li>jansson (<a href="https://github.com/akheron/jansson/blob/v2.14/CHANGES">2.14</a>)</li>
<li>kexec-tools (<a href="https://www.spinics.net/lists/kexec/msg26864.html">2.0.22</a>)</li>
<li>less (<a href="https://www.greenwoodsoftware.com/less/news.590.html">590</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/v3.6.1">3.6.1</a> (includes <a href="https://github.com/libarchive/libarchive/releases/tag/v3.5.3">3.5.3</a>))</li>
<li>libbsd (<a href="https://gitlab.freedesktop.org/libbsd/libbsd/-/commits/0.11.3/">0.11.3</a>)</li>
<li>libmspack (<a href="https://github.com/kyz/libmspack/blob/v0.10.1alpha/libmspack/ChangeLog">0.10.1_alpha</a>)</li>
<li>libnetfilter_queue (<a href="https://git.netfilter.org/libnetfilter_queue/log/?h=libnetfilter_queue-1.0.5">1.0.5</a>)</li>
<li>libpcap (<a href="https://git.tcpdump.org/libpcap/blob/c7642e2cc0c5bd65754685b160d25dc23c76c6bd:/CHANGES">1.10.1</a>)</li>
<li>libtasn1 (<a href="https://gitlab.com/gnutls/libtasn1/-/blob/v4.17.0/NEWS">4.17.0</a>)</li>
<li>liburing (<a href="https://github.com/axboe/liburing/commits/liburing-2.1">2.1</a>)</li>
<li>libxml2 (<a href="http://www.xmlsoft.org/news.html">2.9.13</a>)</li>
<li>lsscsi (<a href="https://sg.danny.cz/scsi/lsscsi.ChangeLog">0.32</a>)</li>
<li>mdadm (<a href="https://lore.kernel.org/all/28fdbc45-96ca-7cdb-3ced-a5f65d978048@trained-monkey.org/T/">4.2</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/commits/0.8.7">0.8.7</a>)</li>
<li>nfs-utils (<a href="https://lore.kernel.org/linux-fsdevel/c8795653-7728-18a4-93dc-58943ad0fe09@redhat.com/">2.5.4</a>)</li>
<li>nghttp2 (<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.45.1">1.45.1</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-73-05/index.html">510.73.05</a>)</li>
<li>nvme-cli (<a href="https://github.com/linux-nvme/nvme-cli/commits/deee9cae1ac94760deebd71f8e5449061338666c">1.16</a>)</li>
<li>oniguruma (<a href="https://github.com/kkos/oniguruma/releases/tag/v6.9.7.1">6.9.7.1</a>)</li>
<li>open-isns (<a href="https://github.com/open-iscsi/open-isns/blob/v0.101/ChangeLog">0.101</a>)</li>
<li>pam (<a href="https://github.com/linux-pam/linux-pam/commit/fe1307512fb8892b5ceb3d884c793af8dbd4c16a">1.5.1_p20210622</a>)</li>
<li>pambase (20220214)</li>
<li>pcre2 (<a href="https://github.com/PhilipHazel/pcre2/blob/pcre2-10.39/NEWS">10.39</a>)</li>
<li>pinentry (<a href="https://dev.gnupg.org/T5566">1.2.0</a>)</li>
<li>quota (<a href="https://sourceforge.net/p/linuxquota/code/ci/0acd4cc6275122fd9864cb7b5d349e65a2622920/">4.06</a>)</li>
<li>rpcbind (<a href="https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_6">1.2.6</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.1">1.1.1</a>)</li>
<li>socat (<a href="https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.3:/CHANGES">1.7.4.3</a>)</li>
<li>shadow (<a href="https://github.com/shadow-maint/shadow/releases/tag/v4.11.1">4.11.1</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v250.3">250.3</a>)</li>
<li>timezone-data (<a href="https://mm.icann.org/pipermail/tz-announce/2021-January/000065.html">2021a</a>)</li>
<li>tcpdump (<a href="https://git.tcpdump.org/tcpdump/blob/5f552b5e6e9fe05f7ad9681d51d0303233daba6a:/CHANGES">4.99.1</a>)</li>
<li>thin-provisioning-tools (<a href="https://github.com/jthornber/thin-provisioning-tools/blob/d6d93c3157631b242a13a81d30f75453e576c55a/CHANGES#L1-L9">0.9.0</a>)</li>
<li>unzip (<a href="https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-26_changelog">6.0_p26</a>)</li>
<li>util-linux (<a href="https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.4-ChangeLog">2.37.4</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v8.2.4328">8.2.4328</a>)</li>
<li>whois (<a href="https://github.com/rfc1036/whois/commit/5f5ba8312c04a759dad05723c035549273d07461">5.5.11</a>)</li>
<li>xfsprogs (<a href="https://marc.info/?l=linux-xfs&amp;m=163883318025390&amp;w=2">5.14.2</a>)</li>
<li>zlib (<a href="https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/ChangeLog#L4">1.2.12</a>)</li>
<li>SDK: gcc-config (<a href="https://gitweb.gentoo.org/proj/gcc-config.git/tag/?h=v2.5">2.5</a>)</li>
<li>SDK: iasl (<a href="https://www.acpica.org/node/183">20200717</a>)</li>
<li>SDK: man-db (<a href="https://gitlab.com/cjwatson/man-db/-/tags/2.9.4">2.9.4</a>)</li>
<li>SDK: man-pages (<a href="https://man7.org/linux/man-pages/changelog.html#release_5.12">5.12-r2</a>)</li>
<li>SDK: netperf (<a href="https://github.com/HewlettPackard/netperf/blob/netperf-2.7.0/Release_Notes">2.7.0</a>)</li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.60.0">1.60.0</a> (includes <a href="https://github.com/rust-lang/rust/releases/tag/1.59.0">1.59.0</a>))</li>
<li>SDK: squashfs-tools (<a href="https://lore.kernel.org/lkml/CAB3woddJss+ziGp-RjJ-yiax6pc_HLMdxk3Qk5nJdRgjpEYWBg@mail.gmail.com/">4.5_p20210914</a>)</li>
<li>VMware: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.0">12.0.0</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.6.6</li>
<li>docker 20.10.14</li>
<li>ignition 2.13.0</li>
<li>kernel 5.15.55</li>
<li>systemd 250</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3227.2.0"/>
    <published>2022-07-21T15:45:09+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3139.2.3</id>
    <title>3139.2.3</title>
    <updated>2026-03-09T16:26:31.680825+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> Release <strong>3139.2.3</strong></p>
<p>Changes since <strong>Stable 3139.2.2</strong></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1972">CVE-2022-1972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1973">CVE-2022-1973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2078">CVE-2022-2078</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-32981">CVE-2022-32981</a>)</li>
<li>libpcre2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">CVE-2022-1587</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/898124">5.15.48</a> (includes <a href="https://lwn.net/Articles/897904">5.15.47</a>, <a href="https://lwn.net/Articles/897377">5.15.46</a>, <a href="https://lwn.net/Articles/897167">5.15.45</a>, <a href="https://lwn.net/Articles/896647">5.15.44</a>))</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_79.html">3.79</a>)</li>
<li>libpcre2 (<a href="https://github.com/PCRE2Project/pcre2/blob/pcre2-10.40/NEWS">10.40</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>containerd 1.5.11</li>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.15.48</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3139.2.3"/>
    <published>2022-06-23T11:47:39+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3139.2.2</id>
    <title>3139.2.2</title>
    <updated>2026-03-09T16:26:31.675766+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> Release <strong>3139.2.2</strong></p>
<p><em>Changes since <strong>Stable 3139.2.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured <code>/etc/flatcar/update.conf</code> exists because it happens to be used as flag file for Ansible (<a href="https://github.com/flatcar/init/pull/71">init#71</a>)</li>
<li>GCP: Fixed shutdown script execution (<a href="https://github.com/flatcar/coreos-overlay/pull/1912">coreos-overlay#1912</a>, <a href="https://github.com/flatcar/Flatcar/issues/743">flatcar#743</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/896231/">5.15.43</a> (includes <a href="https://lwn.net/Articles/896226">5.15.42</a>, <a href="https://lwn.net/Articles/895645">5.15.41</a>, <a href="https://lwn.net/Articles/895318">5.15.40</a>, <a href="https://lwn.net/Articles/895070">5.15.39</a>, <a href="https://lwn.net/Articles/894357">5.15.38</a>))</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.10">1.17.10</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.15.43</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3139.2.2"/>
    <published>2022-06-02T15:09:15+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3139.2.1</id>
    <title>3139.2.1</title>
    <updated>2026-03-09T16:26:31.668746+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> Release <strong>3139.2.1</strong></p>
<p><em>Changes since <strong>Stable 3139.2.0</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1198">CVE-2022-1198</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29582">CVE-2022-29582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1204">CVE-2022-1204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1205">CVE-2022-1205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21814">CVE-2022-21814</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21813">CVE-2022-21813</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>AWS: specify correct console (ttyS0) on kernel command line for ARM64 instances (<a href="https://github.com/flatcar/coreos-overlay/pull/1628">coreos-overlay#1628</a>)</li>
<li>GCE: Restored oem-gce.service functionality on GCP (<a href="https://github.com/flatcar/coreos-overlay/pull/1813">coreos-overlay#1813</a>)</li>
<li>Added pahole to developer container, without it kernel modules built against /usr/src/linux may fail to probe with an 'invalid relocation target' error (<a href="https://github.com/flatcar/coreos-overlay/pull/1839">coreos-overlay#1839</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Merge the Flatcar Pro features into the regular Flatcar images (<a href="https://github.com/flatcar/coreos-overlay/pull/1679">coreos-overlay#1679</a>)</li>
<li>GCE: Enabled GVE kernel driver, which adds support for Google Virtual NIC on GCP (<a href="https://github.com/flatcar/coreos-overlay/pull/1802">coreos-overlay#1802</a>)</li>
<li>SDK: Dropped the mantle binaries (kola, ore, etc.) from the SDK, they are now provided by the <code>ghcr.io/flatcar/mantle</code> image (<a href="https://github.com/flatcar/coreos-overlay/pull/1827">coreos-overlay#1827</a>, <a href="https://github.com/flatcar/scripts/pull/275">scripts#275</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/893264">5.15.37</a> (includes <a href="https://lwn.net/Articles/892812">5.15.36</a>, <a href="https://lwn.net/Articles/892002">5.15.35</a>, <a href="https://lwn.net/Articles/891251">5.15.34</a>, <a href="https://lwn.net/Articles/890722">5.15.33</a>))</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.9">1.17.9</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html">3.78</a>)</li>
<li>nvidia-drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-47-03/index.html">510.47.03</a>)</li>
<li>GCE: google compute-image-packages (<a href="https://github.com/GoogleCloudPlatform/compute-image-packages/releases/tag/20190124">20190124</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.15.37</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3139.2.1"/>
    <published>2022-05-09T14:42:58+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3139.2.0</id>
    <title>3139.2.0</title>
    <updated>2026-03-09T16:26:31.652511+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> Release <strong>3139.2.0</strong></p>
<p><em>Changes since <strong>Stable 3033.2.4</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1015">CVE-2022-1015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43816">CVE-2021-43816</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769</a>)</li>
<li>gcc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844</a>)</li>
<li>Ignition (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14040">CVE-2020-14040</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561</a>)</li>
<li>krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/issues/1565">libarchive-1565</a>, <a href="https://github.com/libarchive/libarchive/issues/1566">libarchive-1566</a>)</li>
<li>OpenSSH (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4044">CVE-2021-4044</a>)</li>
<li>torcx (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3872">CVE-2021-3872</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3875">CVE-2021-3875</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3903">CVE-2021-3903</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3927">CVE-2021-3927</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3928">CVE-2021-3928</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3968">CVE-2021-3968</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">CVE-2021-3973</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3974">CVE-2021-3974</a>)</li>
<li>SDK: edk2-ovmf (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28210">CVE-2021-28210</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28211">CVE-2021-28211</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28213">CVE-2021-28213</a>)</li>
<li>SDK: libxslt (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560</a>)</li>
<li>SDK: mantle (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3121">CVE-2021-3121</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38561">CVE-2021-38561</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565</a>)</li>
<li>SDK: QEMU (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35504">CVE-2020-35504</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35505">CVE-2020-35505</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35506">CVE-2020-35506</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35517">CVE-2020-35517</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20263">CVE-2021-20263</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3409">CVE-2021-3409</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3544">CVE-2021-3544</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3545">CVE-2021-3545</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3546">CVE-2021-3546</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3582">CVE-2021-3582</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3607">CVE-2021-3607</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3608">CVE-2021-3608</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682</a>)</li>
<li>SDK: Rust (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-21658">CVE-2022-21658</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Excluded the Kubenet cbr0 interface from networkd's DHCP config and set it to Unmanaged to prevent interference and ensure that it is not part of the network online check (<a href="https://github.com/flatcar/init/pull/55">init#55</a>)</li>
<li>Fixed the dracut emergency Ignition log printing that had a scripting error causing the cat command to fail (<a href="https://github.com/flatcar/bootengine/pull/33">bootengine#33</a>)</li>
<li>network: Accept ICMPv6 Router Advertisements to fix IPv6 address assignment in the default DHCP setting (<a href="https://github.com/flatcar/init/pull/51">init#51</a>, <a href="https://github.com/flatcar/coreos-cloudinit/pull/12">coreos-cloudinit#12</a>, <a href="https://github.com/flatcar/bootengine/pull/30">bootengine#30</a>)</li>
<li>flatcar-update: Stopped checking for the <code>USER</code> environment variable which may not be set in all environments, causing the script to fail unless a workaround was used like prepending an additional <code>sudo</code> invocation (<a href="https://github.com/flatcar/init/pull/58">init#58</a>)</li>
<li>Reverted the Linux kernel commit which broke networking on AWS instances which use Intel 82559 NIC (c4/m4) (<a href="https://github.com/flatcar/Flatcar/issues/665">Flatcar#665</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/1723">coreos-overlay#1723</a>)</li>
<li>Re-added the <code>brd drbd nbd rbd xen-blkfront zram libarc4 lru_cache zsmalloc</code> kernel modules to the initramfs since they were missing compared to the Flatcar 3033.2.x releases where the 5.10 kernel is used (<a href="https://github.com/flatcar/bootengine/pull/40">bootengine#40</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Added a new flatcar-update tool to the image to ease manual updates, rollbacks, channel/release jumping, and airgapped updates (<a href="https://github.com/flatcar/init/pull/53">init#53</a>)</li>
<li>Update-engine now creates the <code>/run/reboot-required</code> flag file for <a href="https://github.com/weaveworks/kured">kured</a> (<a href="https://github.com/flatcar/update_engine/pull/15">update_engine#15</a>)</li>
<li>Excluded special network interface devices like bridge, tunnel, vxlan, and veth devices from the default DHCP configuration to prevent networkd interference (<a href="https://github.com/flatcar/init/pull/56">init#56</a>)</li>
<li>Added CONFIG_NF_CT_NETLINK_HELPER (for libnetfilter_cthelper), CONFIG_NET_VRF (for virtual routing and forwarding) and CONFIG_KEY_DH_OPERATIONS (for keyutils) to the kernel config (<a href="https://github.com/flatcar/coreos-overlay/pull/1524">coreos-overlay#1524</a>)</li>
<li>Enabled the FIPS support for the Linux kernel, which users can now choose through a kernel parameter in <code>grub.cfg</code> (check it taking effect with <code>cat /proc/sys/crypto/fips_enabled</code>) (<a href="https://github.com/flatcar/coreos-overlay/pull/1602">coreos-overlay#1602</a>)</li>
<li>Enabled FIPS mode for cryptsetup (<a href="https://github.com/flatcar/portage-stable/pull/312">portage-stable#312</a>)</li>
<li>Rework the way we set up the default python intepreter in SDK - it is now without specifying a version. This should work fine as long as we keep having one version of python in SDK.</li>
<li>Add a way to remove packages that are hard-blockers for update. A hard-blocker means that the package needs to be removed (for example with <code>emerge -C</code>) before an update can happen.</li>
<li>Removed the pre-shipped <code>/etc/flatcar/update.conf</code> file, leaving it totally to the user to define the contents as it was unnecessarily overwriting the <code>/use/share/flatcar/update.conf</code> (<a href="https://github.com/flatcar/scripts/pull/212">scripts#212</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/889438">5.15.32</a>) (from 5.15.30)</li>
<li>Linux headers (<a href="https://lwn.net/Articles/876611/">5.15</a>)</li>
<li>GCC <a href="https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00000.html">9.4.0</a></li>
<li>acl (<a href="https://git.savannah.nongnu.org/cgit/acl.git/log/?h=v2.3.1">2.3.1</a>)</li>
<li>attr (<a href="https://git.savannah.nongnu.org/cgit/attr.git/log/?h=v2.5.1">2.5.1</a>)</li>
<li>audit (<a href="https://listman.redhat.com/archives/linux-audit/2021-October/msg00000.html">3.0.6</a>)</li>
<li>boost (<a href="https://www.boost.org/users/history/version_1_76_0.html">1.76.0</a>)</li>
<li>btrfs-progs (<a href="https://btrfs.wiki.kernel.org/index.php/Changelog#btrfs-progs_v5.15_.28Nov_2021.29">5.15.1</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html">3.77</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.11">1.5.11</a>)</li>
<li>coreutils (<a href="https://lists.gnu.org/archive/html/coreutils-announce/2020-03/msg00000.html">8.32</a>)</li>
<li>diffutils (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-08/msg00000.html">3.8</a>)</li>
<li>ethtool (<a href="https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v5.10">5.10</a>)</li>
<li>findutils (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9914">4.8.0</a>)</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.68.4">2.68.4</a>)</li>
<li>i2c-tools (<a href="https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/log/?h=v4.2">4.2</a>)</li>
<li>iproute2 (<a href="https://lwn.net/ml/linux-kernel/20211101164705.6f4f2e41%40hermes.local/">5.15</a>)</li>
<li>ipset (<a href="https://ipset.netfilter.org/changelog.html">7.11</a>)</li>
<li>iputils (<a href="https://github.com/iputils/iputils/releases/tag/20210722">20210722</a>)</li>
<li>ipvsadm (<a href="http://archive.linuxvirtualserver.org/html/lvs-devel/2013-09/msg00011.html">1.27</a>)</li>
<li>kmod (<a href="https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/commit/?id=b6ecfc916a17eab8f93be5b09f4e4f845aabd3d1">29</a>)</li>
<li>libarchive <a href="https://github.com/libarchive/libarchive/releases/tag/v3.5.2">3.5.2</a></li>
<li>libcap-ng (<a href="https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.2">0.8.2</a>)</li>
<li>libseccomp (<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.1">2.5.1</a>)</li>
<li>lshw (<a href="https://www.ezix.org/project/wiki/HardwareLiSter#Changes">02.19.2b_p20210121</a>)</li>
<li>lsof (<a href="https://github.com/lsof-org/lsof/releases/tag/4.94.0">4.94.0</a>)</li>
<li>openssh (<a href="http://www.openssh.com/txt/release-8.8">8.8</a>)</li>
<li>openssl (<a href="https://www.openssl.org/news/changelog.html#openssl-30">3.0.2</a>)</li>
<li>parted (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9924">3.4</a> (includes <a href="https://savannah.gnu.org/forum/forum.php?forum_id=9569">3.3</a>))</li>
<li>pciutils (<a href="https://github.com/pciutils/pciutils/commit/864aecdea9c7db626856d8d452f6c784316a878c">3.7.0</a>)</li>
<li>polkit (<a href="https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.120/NEWS">0.120</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.1.0">1.1.0</a>)</li>
<li>sbsigntools (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/tag/?h=v0.9.4">0.9.4</a>)</li>
<li>sed (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9647">4.8</a>)</li>
<li>usbutils (<a href="https://github.com/gregkh/usbutils/commit/57fb18e59cce31a50a1ca62d1e192512c905ba00">014</a>)</li>
<li>vim <a href="https://github.com/vim/vim/releases/tag/v8.2.3582">8.2.3582</a></li>
<li>Azure: Python for OEM images (<a href="https://www.python.org/downloads/release/python-398/">3.9.8</a>)</li>
<li>Azure: WALinuxAgent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.6.0.2">2.6.0.2</a>)</li>
<li>SDK: edk2-ovmf <a href="https://github.com/tianocore/edk2/releases/tag/edk2-stable202105">202105</a></li>
<li>SDK: file (<a href="https://mailman.astron.com/pipermail/file/2021-March/000478.html">5.40</a>)</li>
<li>SDK: ipxe <a href="https://github.com/ipxe/ipxe/releases/tag/v1.21.1">1.21.1</a></li>
<li>SDK: mantle (<a href="https://github.com/flatcar/mantle/releases/tag/v0.18.0">0.18.0</a>)</li>
<li>SDK: perf (<a href="https://kernelnewbies.org/LinuxChanges#Linux_5.15.Tracing.2C_perf_and_BPF">5.15</a>)</li>
<li>SDK: Python (<a href="https://www.python.org/downloads/release/python-398/">3.9.8</a>)</li>
<li>SDK: qemu (<a href="https://wiki.qemu.org/ChangeLog/6.1">6.1.0</a></li>
<li>SDK: Rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.58.1">1.58.1</a>)</li>
<li>SDK: seabios <a href="https://seabios.org/Releases#SeaBIOS_1.14.0">1.14.0</a></li>
<li>SDK: sgabios <a href="https://git.qemu.org/?p=sgabios.git;a=tree;h=a85446adb0e0">0.1_pre10</a></li>
</ul>
<p><em>Changes since <strong>Beta 3139.1.1</strong></em></p>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1015">CVE-2022-1015</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Enabled FIPS mode for cryptsetup (<a href="https://github.com/flatcar/portage-stable/pull/312">portage-stable#312</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/889438">5.15.32</a>) (from 5.15.30)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html">3.77</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.11">1.5.11</a>)</li>
<li>Azure: WALinuxAgent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.6.0.2">2.6.0.2</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.15.32</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3139.2.0"/>
    <published>2022-04-07T12:05:52+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.2.4</id>
    <title>3033.2.4</title>
    <updated>2026-03-09T16:26:31.642219+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> Release <strong>3033.2.4</strong></p>
<p><strong>Changes since Stable-3033.2.3</strong></p>
<h4>Security fixes</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25636">CVE-2022-25636</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921</a>)</li>
<li>systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3997">CVE-2021-3997</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778</a>)</li>
</ul>
<h4>Bug fixes</h4>
<ul>
<li>Reverted the Linux kernel commit which broke networking on AWS instances which use Intel 82559 NIC (c4/m4) (<a href="https://github.com/flatcar/Flatcar/issues/665">Flatcar#665</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/1720">coreos-overlay#1720</a>)</li>
</ul>
<h4>Changes</h4>
<ul>
<li>Added support for switching back to CGroupsV1 without requiring a reboot. Create <code>/etc/flatcar-cgroupv1</code> through ignition. (<a href="https://github.com/flatcar/coreos-overlay/pull/1666">coreos-overlay#1666</a>)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/888522">5.10.107</a> (from 5.10.102, includes <a href="https://lwn.net/Articles/886570">5.10.103</a>, <a href="https://lwn.net/Articles/887220">5.10.104</a>, <a href="https://lwn.net/Articles/887639">5.10.105</a>, <a href="https://lwn.net/Articles/888115">5.10.106</a>))</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.8">1.17.8</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v249.10">249.10</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_76.html">3.76</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.10">1.5.10</a>)</li>
<li>openssl (<a href="https://www.openssl.org/news/changelog.html#openssl-111">1.1.1n</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.107</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.2.4"/>
    <published>2022-03-23T13:33:43+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.2.3</id>
    <title>3033.2.3</title>
    <updated>2026-03-09T16:26:31.635602+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> Release <strong>3033.2.3</strong></p>
<p><em>Changes since <strong>Stable 3033.2.2</strong></em></p>
<h4>Security fixes</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24959">CVE-2022-24959</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0516">CVE-2022-0516</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0435">CVE-2022-0435</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25375">CVE-2022-25375</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25258">CVE-2022-25258</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847</a>)</li>
<li>go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773</a>)</li>
<li>ignition (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14040">CVE-2020-14040</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315</a>)</li>
</ul>
<h4>Bug fixes</h4>
<ul>
<li>Disabled the systemd-networkd settings <code>ManageForeignRoutes</code> and <code>ManageForeignRoutingPolicyRules</code> by default to ensure that CNIs like Cilium don't get their routes or routing policy rules discarded on network reconfiguration events (<a href="https://github.com/flatcar/Flatcar/issues/620">Flatcar#620</a>).</li>
<li>Prevented hitting races when creating filesystems in Ignition, these races caused boot failures like <code>fsck[1343]: Failed to stat /dev/disk/by-label/ROOT: No such file or directory</code> when creating a btrfs root filesystem (<a href="https://github.com/flatcar/ignition/pull/35">ignition#35</a>)</li>
<li>Reverted the Linux kernel change to forbid xfrm id 0 for IPSec state because it broke Cilium (<a href="https://github.com/flatcar/Flatcar/issues/626">Flatcar#626</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/1682">coreos-overlay#1682</a>)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/885896">5.10.102</a>) (from 5.10.96)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.7">1.17.7</a> (includes <a href="https://go.googlesource.com/go/+/refs/tags/go1.17.6">1.17.6</a>))</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes">2.4.6</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_75.html">3.75</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.36.1</li>
<li>kernel 5.10.102</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.2.3"/>
    <published>2022-03-07T13:12:34+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.2.2</id>
    <title>3033.2.2</title>
    <updated>2026-03-09T16:26:31.629610+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> Release <strong>3033.2.2</strong></p>
<p><em>Changes since <strong>Stable 3033.2.1</strong></em></p>
<h4>Security fixes</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3998">CVE-2021-3998</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219</a>)</li>
<li>polkit (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034</a>)</li>
</ul>
<h4>Bug fixes</h4>
<ul>
<li>SDK: Fixed build error popping up in the new SDK Container because <code>policycoreutils</code> used the wrong ROOT to update the SELinux store (<a href="https://github.com/flatcar/coreos-overlay/pull/1502">flatcar-linux/coreos-overlay#1502</a>)</li>
<li>Fixed leak of SELinux policy store to the root filesystem top directory due to wrong store path in <code>policycoreutils</code> instead of <code>/var/lib/selinux</code> (<a href="https://github.com/flatcar/Flatcar/issues/596">flatcar-linux/Flatcar#596</a>)</li>
</ul>
<h4>Updates</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/883442">5.10.96</a>) (from 5.10.93)</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20211216">20211216</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_4/expat/Changes">2.4.4</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.96</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.2.2"/>
    <published>2022-02-09T10:03:27+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.2.1</id>
    <title>3033.2.1</title>
    <updated>2026-03-09T16:26:31.622535+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> release <strong>3033.2.1</strong></p>
<p><em>Changes since <strong>Stable 3033.2.0</strong></em></p>
<h4>Known issues:</h4>
<ul>
<li>The SELinux policy store update fix resulted in some files leaked to the root filesystem top directory (<a href="https://github.com/flatcar/Flatcar/issues/596">flatcar-linux/Flatcar#596</a>)</li>
</ul>
<h4>Security fixes:</h4>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4135">CVE-2021-4135</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28714">CVE-2021-28714</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39685">CVE-2021-39685</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44733">CVE-2021-44733</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185</a>)</li>
<li>ca-certificates (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43816">CVE-2021-43816</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827</a>)</li>
</ul>
<h4>Bug fixes:</h4>
<ul>
<li>Ensured that the <code>/run/xtables.lock</code> coordination file exists for modifications of the xtables backend from containers (must be bind-mounted) or the <code>iptables-legacy</code> binaries on the host (<a href="https://github.com/flatcar/init/pull/57">flatcar-linux/init#57</a>)</li>
<li>dev container: Fix github URL for coreos-overlay and portage-stable to use repos from flatcar-linux org directly instead of relying on redirects from the kinvolk org. This fixes checkouts with emerge-gitclone inside dev-container. (<a href="https://github.com/flatcar/scripts/pull/194">flatcar-linux/scripts#194</a>)</li>
<li>SDK: Fixed build error popping up in the new SDK Container because <code>policycoreutils</code> used the wrong ROOT to update the SELinux store (<a href="https://github.com/flatcar/coreos-overlay/pull/1502">flatcar-linux/coreos-overlay#1502</a>)</li>
</ul>
<h4>Changes:</h4>
<ul>
<li>Backported <code>elf</code> support for <code>iproute2</code> (<a href="https://github.com/flatcar/coreos-overlay/pull/1526">flatcar-linux/coreos-overlay#1256</a>)</li>
</ul>
<h4>Updates:</h4>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/881964">5.10.93</a>) (from 5.10.84)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_74.html">3.74</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#201012">20.10.12</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.9">1.5.9</a>)</li>
<li>expat (<a href="https://github.com/libexpat/libexpat/blob/R_2_4_3/expat/Changes">2.4.3</a>)</li>
</ul>
<h4>Packages:</h4>
<ul>
<li>docker 20.10.12</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.93</li>
<li>systemd 249</li>
</ul>
<h4>Architectures:</h4>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.2.1"/>
    <published>2022-01-26T08:17:16+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v3033.2.0</id>
    <title>3033.2.0</title>
    <updated>2026-03-09T16:26:31.608045+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> release <strong>3033.2.0</strong></p>
<p><em>Changes since <strong>Stable 2983.2.1</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4001">CVE-2021-4001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">CVE-2021-43975</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29923">CVE-2021-29923</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293"> CVE-2021-39293</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297"> CVE-2021-38297</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a>)</li>
<li>bash (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9924">CVE-2019-9924</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18276"> CVE-2019-18276</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3530">CVE-2021-3530</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3549"> CVE-2021-3549</a>)</li>
<li>ca-certificates (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103</a>)</li>
<li>curl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22945">CVE-2021-22945</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946"> CVE-2021-22946</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947"> CVE-2021-22947</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41092">CVE-2021-41092</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41089"> CVE-2021-41089</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41091"> CVE-2021-41091</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40330">CVE-2021-40330</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38604">CVE-2021-38604</a>)</li>
<li>gnupg (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25125">CVE-2020-25125</a>)</li>
<li>libgcrypt (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40528">CVE-2021-40528</a>)</li>
<li>nettle (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580"> CVE-2021-3580</a>)</li>
<li>polkit (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560</a>)</li>
<li>sssd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3621">CVE-2021-3621</a>)</li>
<li>util-linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600</a>)</li>
<li>vim (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3770">CVE-2021-3770</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3778"> CVE-2021-3778</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3796"> CVE-2021-3796</a>)</li>
<li>SDK: bison (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14150">CVE-2020-14150</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24240"> CVE-2020-24240</a>)</li>
<li>SDK: perl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>arm64: the Polkit service does not crash anymore. (<a href="https://github.com/flatcar/Flatcar/issues/156">flatcar-linux/Flatcar#156</a>)</li>
<li>toolbox: fixed support for multi-layered docker images (<a href="https://github.com/flatcar/toolbox/pull/5">toolbox#5</a>)</li>
<li>Run emergency.target on ignition/torcx service unit failure in dracut (<a href="https://github.com/flatcar/bootengine/pull/28">bootengine#28</a>)</li>
<li>Fix vim warnings on missing file, when built with USE=”minimal” (<a href="https://github.com/flatcar/portage-stable/pull/260">portage-stable#260</a>)</li>
<li>The Torcx profile <code>docker-1.12-no</code> got fixed to reference the current Docker version instead of 19.03 which wasn't found on the image, causing Torcx to fail to provide Docker (<a href="https://github.com/flatcar/coreos-overlay/pull/1456">PR#1456</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Added GPIO support (<a href="https://github.com/flatcar/coreos-overlay/pull/1236">coreos-overlay#1236</a>)</li>
<li>Enabled SELinux in permissive mode on ARM64 (<a href="https://github.com/flatcar/coreos-overlay/pull/1245">coreos-overlay#1245</a>)</li>
<li>The <code>iptables</code> command uses the nftables kernel backend instead of the iptables backend, you can also migrate to using the <code>nft</code> tool instead of <code>iptables</code>. Containers with <code>iptables</code> binaries that use the iptables backend will result in <a href="https://wiki.nftables.org/wiki-nftables/index.php/Troubleshooting#Question_4._How_do_nftables_and_iptables_interact_when_used_on_the_same_system.3F">mixing both kernel backends</a> which is supported but you have to look up the rules separately (on the host you can use the <code>iptables-legacy</code> and friends).</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/878041/">5.10.84</a>)</li>
<li>Linux Firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20210919">20210919</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#20109">20.10.9</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.5">1.17.5</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.8">1.5.8</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/blob/v249.4/NEWS">249.4</a>)</li>
<li>bash (<a href="https://lists.gnu.org/archive/html/info-gnu/2020-12/msg00003.html">5.1_p8</a>)</li>
<li>binutils (<a href="https://sourceware.org/pipermail/binutils/2021-July/117384.html">2.37</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_79_1">7.79.1</a>)</li>
<li>ca-certificates (<a href="https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/vy9284s8APM">3.73</a>)</li>
<li>duktape (<a href="https://github.com/svaarala/duktape/blob/master/doc/release-notes-v2-6.rst">2.6.0</a>)</li>
<li>ebtables (<a href="https://lwn.net/Articles/806179/">2.0.11</a>)</li>
<li>git (<a href="https://github.com/git/git/blob/master/Documentation/RelNotes/2.32.0.txt">2.32.0</a>)</li>
<li>gnupg (<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2021q3/000461.html">2.2.29</a>)</li>
<li>iptables (<a href="https://lwn.net/Articles/843069/">1.8.7</a>)</li>
<li>keyutils (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/tag/?h=v1.6.1">1.6.1</a>)</li>
<li>ldb (<a href="https://gitlab.com/samba-team/samba/-/tags/ldb-2.3.0">2.3.0</a>)</li>
<li>libgcrypt (<a href="https://dev.gnupg.org/T5402">1.9.4</a>)</li>
<li>libmnl (<a href="https://marc.info/?l=netfilter-devel&amp;m=146745072727070&amp;w=2">1.0.4</a>)</li>
<li>libnftnl (<a href="https://marc.info/?l=netfilter&amp;m=162194376520385&amp;w=2">1.2.0</a>)</li>
<li>libtirpc (<a href="https://www.spinics.net/lists/linux-nfs/msg84129.html">1.3.2</a>)</li>
<li>lvm2 (<a href="https://github.com/lvmteam/lvm2/releases/tag/v2_02_188">2.02.188</a>)</li>
<li>nettle (<a href="https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00002.html">3.7.3</a>)</li>
<li>nftables (<a href="https://lwn.net/Articles/857369/">0.9.9</a>)</li>
<li>net-tools (<a href="https://sourceforge.net/p/net-tools/code/ci/v2.10/tree/">2.10</a>)</li>
<li>openssh (<a href="https://www.openssh.com/txt/release-8.7">8.7_p1-r1</a>)</li>
<li>open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-11.3.5">11.3.5</a>)</li>
<li>polkit (<a href="https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.119/NEWS">0.119</a>)</li>
<li>realmd (<a href="https://gitlab.freedesktop.org/realmd/realmd/-/tags/0.17.0">0.17.0</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.0.3">1.0.3</a>)</li>
<li>talloc (<a href="https://gitlab.com/samba-team/samba/-/tags/talloc-2.3.2">2.3.2</a>)</li>
<li>util-linux (<a href="https://github.com/karelzak/util-linux/blob/v2.37.2/NEWS">2.37.2</a>)</li>
<li>vim (<a href="https://github.com/vim/vim/releases/tag/v8.2.3428">8.2.3428</a>)</li>
<li>xenstore (<a href="https://xenproject.org/downloads/xen-project-archives/xen-project-4-14-series/xen-project-4-14-2/">4.14.2</a>)</li>
<li>SDK: gnuconfig (20210107)</li>
<li>SDK: google-cloud-sdk (<a href="https://groups.google.com/g/google-cloud-sdk-announce/c/HoJuttxnzNQ">355.0.0</a>)</li>
<li>SDK: meson (0.57.2)</li>
<li>SDK: mtools (4.0.35)</li>
<li>SDK: perl (<a href="https://perldoc.perl.org/perl5340delta">5.34.0</a>)</li>
<li>SDK: Rust (<a href="https://blog.rust-lang.org/2021/09/09/Rust-1.55.0.html">1.55.0</a>)</li>
<li>SDK: texinfo (<a href="https://github.com/debian-tex/texinfo/releases/tag/upstream%2F6.8">6.8</a>)</li>
</ul>
<p><em>Changes since <strong>Beta 3033.1.1</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4001">CVE-2021-4001</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">CVE-2021-43975</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29923">CVE-2021-29923</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293"> CVE-2021-39293</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297"> CVE-2021-38297</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</a>)</li>
<li>ca-certificates (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Fix vim warnings on missing file, when built with USE=”minimal” (<a href="https://github.com/flatcar/portage-stable/pull/260">portage-stable#260</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/878041/">5.10.84</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.17.5">1.17.5</a>)</li>
<li>ca-certificates (<a href="https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/vy9284s8APM">3.73</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.11</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.84</li>
<li>systemd 249</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
<li>arm64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-3033.2.0"/>
    <published>2021-12-15T19:36:24+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2983.2.1</id>
    <title>2983.2.1</title>
    <updated>2026-03-09T16:26:31.599787+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> Release <strong>2983.2.1</strong></p>
<p><em>Changes since <strong>Stable 2983.2.0</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739</a>)</li>
<li>Docker, containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/876426/">5.10.80</a>)</li>
<li>Docker (<a href="https://docs.docker.com/engine/release-notes/#20111">20.10.11</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.8">1.5.8</a>)</li>
<li>ca-certificates (<a href="https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/7O6a4NlaI2A">3.72</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Added missing SELinux rule as initial step to resolve Torcx unpacking issue (<a href="https://github.com/flatcar/coreos-overlay/pull/1426">coreos-overlay#1426</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.11</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.80</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2983.2.1"/>
    <published>2021-11-25T11:10:38+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2983.2.0</id>
    <title>2983.2.0</title>
    <updated>2026-03-09T16:26:31.584146+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> release <strong>2983.2.0</strong></p>
<p>Update to CGroupsV2</p>
<p>CGroups V2 is coming to Stable! Introduced in Alpha 2969.0.0, the feature has been stabilising for almost three months now and will be included in Stable 2983.2.0. <br />
NOTE that only new nodes will utilize CGroupsV2 by default. Existing nodes remain on CGroupsV1 and need to be manually migrated to CGroupsV2. To learn more about CGroupsV2 on Flatcar Container Linux and the migration guide, please refer to<a href="https://kinvolk.io/docs/flatcar-container-linux/latest/container-runtimes/switching-to-unified-cgroups/"> https://kinvolk.io/docs/flatcar-container-linux/latest/container-runtimes/switching-to-unified-cgroups/</a></p>
<p><em>Changes since <strong>Beta 2983.1.2</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43267">CVE-2021-43267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772"> CVE-2021-41772</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Use https protocol instead of git for Github URLs (<a href="https://github.com/flatcar/coreos-overlay/pull/1394">flatcar-linux/coreos-overlay#1394</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/874852/">5.10.77</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.16.10">1.16.10</a>)</li>
</ul>
<p><em>Changes since <strong>Stable 2905.2.6</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (CVE-2021-3609, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653</a>, CVE-2021-3655, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26541">CVE-2020-26541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35039">CVE-2021-35039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38205">CVE-2021-38205</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43267">CVE-2021-43267</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772"> CVE-2021-41772</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760</a>)</li>
<li>curl (CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22926)</li>
<li>dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448</a>)</li>
<li>expat (<a href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">CVE-2013-0340</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29562">CVE-2020-29562</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013</a>, <a href="https://nvd.nist.gov/vuln/detail/https://cve.circl.lu/cve/CVE-2020-27618">CVE-2020-27618</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27645">CVE-2021-27645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942</a>)</li>
<li>libgcrypt (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560</a>)</li>
<li>libpcre (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155</a>)</li>
<li>libuv (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22918">CVE-2021-22918</a>)</li>
<li>mit-krb5 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222</a>)</li>
<li>NVIDIA Drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1090">CVE-2021-1090</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1093">CVE-2021-1093</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1094">CVE-2021-1094</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1095">CVE-2021-1095</a>)</li>
<li>systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910</a>)</li>
<li>tar (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20193">CVE-2021-20193</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Use https protocol instead of git for Github URLs (<a href="https://github.com/flatcar/coreos-overlay/pull/1394">flatcar-linux/coreos-overlay#1394</a>)</li>
<li>Skip tcsd.service for TPM2 devices to fix failures on c3.small.x86 instances of Equinix Metal (<a href="https://github.com/flatcar/Flatcar/issues/208">Flatcar#208</a>)</li>
<li>Fixed containerd config after introduction of CGroupsV2 (<a href="https://github.com/flatcar/coreos-overlay/pull/1214">coreos-overlay#1214</a>)</li>
<li>Fixed path for amazon-ssm-agent in base-ec2.ign (<a href="https://github.com/flatcar/coreos-overlay/pull/1228">coreos-overlay#1228</a>)</li>
<li>Fixed locksmith adhering to reboot window when getting the etcd lock (<a href="https://github.com/flatcar/locksmith/pull/10">locksmith#10</a>)</li>
<li>Add the systemd tag in udev for Azure storage devices, to fix /boot automount (<a href="https://github.com/flatcar/init/pull/41">init#41</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Added Azure<a href="https://docs.microsoft.com/en-us/azure/virtual-machines/generation-2"> Generation 2 VM</a> support (<a href="https://github.com/flatcar/coreos-overlay/pull/1198">coreos-overlay#1198</a>)</li>
<li>cgroups v2 by default for new nodes (<a href="https://github.com/flatcar/coreos-overlay/pull/931">coreos-overlay#931</a>).</li>
<li>Upgrade Docker to 20.10 (<a href="https://github.com/flatcar/coreos-overlay/pull/931">coreos-overlay#931</a>)</li>
<li>Switched Docker ecosystem packages to go1.16 (<a href="https://github.com/flatcar/coreos-overlay/pull/1217">coreos-overlay#1217</a>)</li>
<li>Added lbzip2 binary to the image (<a href="https://github.com/flatcar/coreos-overlay/pull/1221">coreos-overlay#1221</a>)</li>
<li>flatcar-install uses lbzip2 if present, falls back on bzip2 if not (<a href="https://github.com/flatcar/init/pull/46">init#46</a>)</li>
<li>Added Intel E800 series network adapter driver (<a href="https://github.com/flatcar/coreos-overlay/pull/1237">coreos-overlay#1237</a>)</li>
<li>Enabled ‘audit’ use flag for sys-libs/pam (<a href="https://github.com/flatcar/coreos-overlay/pull/1233">coreos-overlay#1233</a>)</li>
<li>Bumped etcd and flannel to respectively 3.5.0, 0.14.0 to get multiarch images for arm64 support. <em>Note for users of the old etcd v2 support</em>: ETCDCTL_API=2 must be set to use v2 store as well as ETCD_ENABLE_V2=true in the etcd-member.service - this support will be removed in 3.6.0 (<a href="https://github.com/flatcar/coreos-overlay/pull/1179">coreos-overlay#1179</a>)</li>
<li>Support BTRFS in OEM and /usr partitions, but only used it for the OEM partition for now. Ignition configurations that refer to the OEM partition will work with any filesystem format specified, a mismatch is not resulting in a boot error. (<a href="https://github.com/flatcar/coreos-overlay/pull/1106">coreos-overlay#1106</a>)</li>
<li>Switched the arm64 kernel to use a 4k page size instead of 64k</li>
<li>Switched dm-verity corruption detection to issue a kernel panic (a panic results in a reboot after 1 minute, this was the case before already) instead of merely failing certain syscalls that try to use the corrupted data</li>
<li>Enabled ARM64 SDK bootstrap (<a href="https://github.com/flatcar/scripts/pull/134">flatcar-linux/scripts#134</a>)</li>
<li>SDK: enabled experimental ARM64 SDK usage (<a href="https://github.com/flatcar/scripts/pull/134">flatcar-linux/scripts#134</a>) (<a href="https://github.com/flatcar/scripts/pull/141">flatcar-linux/scripts#141</a>)</li>
<li>AWS: Added amazon-ssm-agent (<a href="https://github.com/flatcar/coreos-overlay/pull/1162">coreos-overlay#1162</a>)</li>
<li>Azure: Compile OEM contents for all architectures (<a href="https://github.com/flatcar/coreos-overlay/pull/1196">coreos-overlay#1196</a>)</li>
<li>update_engine: add postinstall hook to stay on cgroupv1 (<a href="https://github.com/flatcar/update_engine/pull/13">update_engine#13</a>)</li>
<li>Enable telnet support for curl (<a href="https://github.com/flatcar/coreos-overlay/pull/1099">coreos-overlay#1099</a>)</li>
<li>Enable ssl USE flag for wget (<a href="https://github.com/flatcar/coreos-overlay/pull/932">coreos-overlay#932</a>)</li>
<li>Enable MDIO_BCM_UNIMAC for arm64 (<a href="https://github.com/flatcar/coreos-overlay/pull/929">coreos-overlay#929</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/874852/">5.10.77</a>)</li>
<li>Linux firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20210818">20210818</a>)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.16.10">1.16.10</a>)</li>
<li>c-ares (<a href="https://c-ares.haxx.se/changelog.html#1_17_2">1.17.2</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.7">1.5.7</a>)</li>
<li>cryptsetup (<a href="https://gitlab.com/cryptsetup/cryptsetup/-/tags/v2.3.6">2.3.6</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_78_0">7.78</a>)</li>
<li>dbus (<a href="https://github.com/freedesktop/dbus/blob/ab88811768f750777d1a8b9d9ab12f13390bfd3a/NEWS#L1">1.12.20</a>)</li>
<li>docker (<a href="https://docs.docker.com/engine/release-notes/#201010">20.10.10</a>)</li>
<li>docker CLI (<a href="https://github.com/docker/cli/releases/tag/v20.10.10">20.10.10</a>)</li>
<li>docker proxy (<a href="https://github.com/moby/libnetwork/commit/64b7a4574d1426139437d20e81c0b6d391130ec8">0.8.0_p20210525</a>)</li>
<li>dracut (<a href="https://github.com/dracutdevs/dracut/releases/tag/053">053</a>)</li>
<li>etcd (<a href="https://github.com/etcd-io/etcd/releases/tag/v3.5.0">3.5.0</a>)</li>
<li>expat (<a href="https://www.xml.com/news/2021-05-expat-240-and-241/">2.4.1</a>)</li>
<li>gettext (<a href="https://lists.gnu.org/archive/html/info-gnu/2020-07/msg00009.html">0.21-r1</a>)</li>
<li>glibc (<a href="https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7dfddd056de5f23bc29591d212f4051ed9d0634e">2.33-r5</a>)</li>
<li>gptfdisk (1.0.7)</li>
<li>flannel (<a href="https://github.com/flannel-io/flannel/releases/tag/v0.14.0">0.14.0</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20210608">20210608</a>)</li>
<li>libarchive (<a href="https://github.com/libarchive/libarchive/releases/tag/3.5.1">3.5.1</a>)</li>
<li>libev (4.33)</li>
<li>libpcre (8.44)</li>
<li>libuv (<a href="https://github.com/libuv/libuv/releases/tag/v1.41.1">1.41.1</a>)</li>
<li>libverto (<a href="https://github.com/latchset/libverto/releases/tag/0.3.1">0.3.1</a>)</li>
<li>lz4 (<a href="https://github.com/lz4/lz4/releases/tag/v1.9.3">1.9.3-r1</a>)</li>
<li>mit-krb5 (<a href="https://github.com/krb5/krb5/tree/krb5-1.19.2-final">1.19.2</a>)</li>
<li>NVIDIA Drivers (<a href="https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-470-57-02/index.html">470.57.02</a>)</li>
<li>pax-utils (1.3.1)</li>
<li>portage-utils (<a href="https://github.com/gentoo/portage-utils/releases/tag/v0.90">0.90</a>)</li>
<li>readline (<a href="https://tiswww.case.edu/php/chet/readline/CHANGES">8.1_p1</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.0.2">1.0.2</a>)</li>
<li>selinux (<a href="https://github.com/SELinuxProject/selinux/releases/tag/20200710">3.1</a>)</li>
<li>selinux-refpolicy (<a href="https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818">2.20200818</a>)</li>
<li>strace (<a href="https://github.com/strace/strace/releases/tag/v5.12">5.12</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v247.9">247.9</a>)</li>
<li>tar (<a href="https://savannah.gnu.org/forum/forum.php?forum_id=9935">1.34</a>)</li>
<li>tini (<a href="https://github.com/krallin/tini/releases/tag/v0.19.0">0.19</a>)</li>
<li>wa-linux-agent (<a href="https://github.com/Azure/WALinuxAgent/releases/tag/v2.3.1.1">2.3.1.1</a>)</li>
<li>xz-utils (<a href="https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=aade49443ad7ddba13bbfd9da188c99664736d80;hb=3247e95115acb95bc27f41e8cf4501db5b0b4309#l16">5.2.5</a>)</li>
<li>SDK: dnsmasq (<a href="https://thekelleys.org.uk/dnsmasq/CHANGELOG">2.85</a>)</li>
<li>SDK: rust (<a href="https://github.com/rust-lang/rust/releases/tag/1.54.0">1.54</a>)</li>
<li>VMWare: open-vm-tools (<a href="https://github.com/vmware/open-vm-tools/releases/tag/stable-11.3.0">11.3.0</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 20.10.10</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.77</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2983.2.0"/>
    <published>2021-11-09T08:18:14+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2905.2.6</id>
    <title>2905.2.6</title>
    <updated>2026-03-09T16:26:31.574416+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> release <strong>2905.2.6</strong></p>
<p><em>Changes since <strong>Stable 2905.2.5</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3764">CVE-2021-3764</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38300">CVE-2021-38300</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41864">CVE-2021-41864</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103</a>)</li>
</ul>
<p><strong>Bux fixes</strong></p>
<ul>
<li>The tcsd service for TPM 1 is not started on machines with TPM 2 anymore where it fails and isn’t necessary (<a href="https://github.com/flatcar/coreos-overlay/pull/1364">flatcar-linux/coreos-overlay#1364</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/873465/">5.10.75</a>)</li>
<li>ca-certificates (<a href="https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_69_1.html#nss-3-69-1-release-notes">3.69.1</a>)</li>
<li>containerd (<a href="https://github.com/containerd">1.5.7</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.75</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2905.2.6"/>
    <published>2021-10-25T15:56:47+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2905.2.5</id>
    <title>2905.2.5</title>
    <updated>2026-03-09T16:26:31.570147+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> release <strong>2905.2.5</strong></p>
<p><em>Changes since <strong>Stable 2905.2.4</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41073">CVE-2021-41073</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-16119">CVE-2020-16119</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>The Mellanox NIC Linux driver issue introduced in the previous release was fixed (<a href="https://github.com/flatcar/Flatcar/issues/520">Flatcar#520</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/870544/">5.10.69</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.69</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2905.2.5"/>
    <published>2021-09-30T16:21:29+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2905.2.4</id>
    <title>2905.2.4</title>
    <updated>2026-03-09T16:26:31.566184+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> release <strong>2905.2.4</strong></p>
<p><em>Changes since <strong>Stable 2905.2.3</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3739"> CVE-2021-3739</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/869749/">5.10.67</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.67</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2905.2.4"/>
    <published>2021-09-27T08:32:01+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2905.2.3</id>
    <title>2905.2.3</title>
    <updated>2026-03-09T16:26:31.561703+00:00</updated>
    <content type="html"><![CDATA[<p>New <strong>Stable</strong> release <strong>2905.2.3</strong></p>
<p><em>Changes since <strong>Stable 2905.2.2</strong></em></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>Re-enabled kernel config FS_ENCRYPTION (<a href="https://github.com/kinvolk/coreos-overlay/pull/1212/">coreos-overlay#1212</a>)</li>
<li>Fixed Perl in dev-container (<a href="https://github.com/kinvolk/coreos-overlay/pull/1238">coreos-overlay#1238</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/867497/">5.10.61</a>)</li>
<li>openssl (<a href="https://mta.openssl.org/pipermail/openssl-announce/2021-August/000206.html">1.1.1l</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.61</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2905.2.3"/>
    <published>2021-09-01T14:15:46+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2905.2.2</id>
    <title>2905.2.2</title>
    <updated>2026-03-09T16:26:31.556444+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Stable</strong></em> <strong>2905.2.1</strong></p>
<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38205">CVE-2021-38205</a>)</li>
<li>Go (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-36221">CVE-2021-36221</a>)</li>
<li>Systemd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>Fixed <code>pam.d</code> sssd LDAP auth with sudo (<a href="https://github.com/kinvolk/coreos-overlay/pull/1170">coreos-overlay#1170</a>)</li>
<li>Let network-cleanup.service finish before entering rootfs (<a href="https://github.com/kinvolk/coreos-overlay/pull/1182">coreos-overlay#1182</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Switched to zstd for the initramfs (<a href="https://github.com/kinvolk/coreos-overlay/pull/1136">coreos-overlay#1136</a>)</li>
<li>Embedded new subkey in flatcar-install (<a href="https://github.com/kinvolk/coreos-overlay/pull/1180">coreos-overlay#1180</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/866302/">5.10.59</a>)</li>
<li>Systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v247.9">247.9</a>)</li>
<li>Go (<a href="https://golang.org/doc/devel/release#go1.16.minor">1.16.7</a>)</li>
<li>portage-utils (<a href="https://github.com/gentoo/portage-utils/releases/tag/v0.90">0.90</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.59</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2905.2.2"/>
    <published>2021-08-19T13:36:44+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2905.2.1</id>
    <title>2905.2.1</title>
    <updated>2026-03-09T16:26:31.551823+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Set the cilium_vxlan interface to be not managed by networkd's default setup with DHCP as it's managed by Cilium. (<a href="https://github.com/kinvolk/init/pull/43">init#43</a>)</li>
<li>Disabled SELinux by default on <code>dockerd</code> wrapper script (<a href="https://github.com/kinvolk/coreos-overlay/pull/1149">coreos-overlay#1149</a>)</li>
<li>GCE: Granted CAP_NET_ADMIN to set routes for the TCP LB when starting oem-gce.service (<a href="https://github.com/kinvolk/coreos-overlay/pull/1146">coreos-overlay#1146</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/864901/">5.10.55</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.55</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2905.2.1"/>
    <published>2021-08-04T13:24:56+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2905.2.0</id>
    <title>2905.2.0</title>
    <updated>2026-03-09T16:26:31.536238+00:00</updated>
    <content type="html"><![CDATA[<p><em>Changes since <strong>Beta 2905.1.0</strong></em></p>
<p><strong>Security Fixes</strong></p>
<ul>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760</a>)</li>
<li>curl (CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22926)</li>
<li>linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26541">CVE-2020-26541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35039">CVE-2021-35039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543</a>, CVE-2021-3609, CVE-2021-3655, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/863648/">5.10.52</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_78_0">7.78</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.4">1.5.4</a>)</li>
</ul>
<p><em>Changes since <strong>Stable 2765.2.6</strong></em></p>
<p><strong>Security Fixes:</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26541">CVE-2020-26541</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35039">CVE-2021-35039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543</a>, CVE-2021-3609, CVE-2021-3655, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-33624">CVE-2021-33624</a>)</li>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760</a>)</li>
<li>curl (CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22926)</li>
<li>boost (<a href="https://nvd.nist.gov/vuln/detail/CVE-2012-2677">CVE-2012-2677</a>)</li>
<li>Docker (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21285">CVE-2021-21285</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21284"> CVE-2021-21284</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8277">CVE-2020-8277</a>)</li>
<li>coreutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7476">CVE-2017-7476</a>)</li>
<li>dbus (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512</a>)</li>
<li>dnsmasq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682"> CVE-2020-25682</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683"> CVE-2020-25683</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683"> CVE-2020-25684</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685"> CVE-2020-25685</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686"> CVE-2020-25686</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687"> CVE-2020-25687</a>)</li>
<li>git (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21300">CVE-2021-21300</a>)</li>
<li>glib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">CVE-2021-28153</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218"> CVE-2021-27218</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219"> CVE-2021-27219</a>)</li>
<li>gnutls (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20231">CVE-2021-20231</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20232"> CVE-2021-20232</a>)</li>
<li>intel-microcode (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698"> CVE-2020-8698</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518</a>,CVE-2021-3541)</li>
<li>ncurses (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17594">CVE-2019-17594</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595"> CVE-2019-17595</a>)</li>
<li>openldap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222"> CVE-2020-36222</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223"> CVE-2020-36223</a>,<a href="https://nvd.nist.gov/vuln/detail/-2020-36224"> CVE-2020-36224</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225"> CVE-2020-36225</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226"> CVE-2020-36226</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227"> CVE-2020-36227</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228"> CVE-2020-36228</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229"> CVE-2020-36229</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230"> CVE-2020-36230</a>)</li>
<li>samba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323"> CVE-2020-14323</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383"> CVE-2020-14383</a>)</li>
<li>sqlite (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20227">CVE-2021-20227</a>)</li>
<li>binutils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487</a>)</li>
</ul>
<p><strong>Bug Fixes:</strong></p>
<ul>
<li>passwd: use correct GID for tss (<a href="https://github.com/kinvolk/baselayout/pull/15">baselayout#15</a>)</li>
<li>flatcar-eks: add missing mkdir and update to latest versions (<a href="https://github.com/kinvolk/coreos-overlay/pull/817">coreos-overlay#817</a>)</li>
<li>gmerge: Stop installing gmerge script (<a href="https://github.com/kinvolk/coreos-overlay/pull/828">coreos-overlay#828</a>)</li>
<li>Add explicit path to the binary call in the coreos-metadata unit file (<a href="https://github.com/kinvolk/Flatcar/issues/360">Issue #360</a>)</li>
<li>Fix the patch to update DefaultTasksMax in systemd (<a href="https://github.com/kinvolk/coreos-overlay/pull/971">coreos-overlay#971</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Docker: disabled SELinux support in the Docker daemon</li>
<li>The pam_faillock PAM module was enabled as replacement for the removed pam_tally2 module and will temporarily lock an account if there were login attempts with a wrong password. The faillock command can be used to show the current state. With pam_tally2 there was no limit for wrong password login attempts but with faillock the default is already restricting the attempts. The default behavior was relaxed to allow 5 wrong passwords per two minutes, and a one minute account lock time. This does not apply to logins with an SSH key. (<a href="https://github.com/kinvolk/baselayout/pull/17">baselayout#17</a>)</li>
<li>The etcd and flannel services are now run with Docker and any rkt-based customizations of the etcd-member and flanneld services not supported anymore. Also, because the flanneld service relies on Docker and will restart Docker after applying the new configuration, it is not possible anymore to set Requires=flanneld.service for docker.service and instead it’s enough to have flanneld.service enabled. (<a href="https://github.com/kinvolk/coreos-overlay/pull/857">coreos-overlay#857</a>)</li>
<li>toolbox: replace rkt with docker (<a href="https://github.com/kinvolk/coreos-overlay/pull/881">coreos-overlay#881</a>)</li>
<li>flatcar-install: add parameters to make wget more resilient (<a href="https://github.com/kinvolk/init/pull/35">init#35</a>)</li>
<li>flatcar-install: Add -D flag to only download the image file (<a href="https://github.com/kinvolk/Flatcar/issues/248">Flatcar#248</a>)</li>
<li>flatcar-install: Detect device mapper (e.g., LVM/LUKS) usage when searching for free drives with the -s flag (<a href="https://github.com/kinvolk/Flatcar/issues/332">Flatcar#332</a>)</li>
<li>motd: Add OEM information to motd output (<a href="https://github.com/kinvolk/init/pull/34">init#34</a>)</li>
<li>open-iscsi: Command substitution in iscsi-init system service (<a href="https://github.com/kinvolk/coreos-overlay/pull/801">coreos-overlay#801</a>)</li>
<li>sshd: use secure crypto algos only (<a href="https://github.com/kinvolk/coreos-overlay/pull/852">kinvolk/coreos-overlay#852</a>)</li>
<li>kernel: enable kernel config CONFIG_BPF_LSM (<a href="https://github.com/kinvolk/coreos-overlay/pull/846">kinvolk/coreos-overlay#846</a>)</li>
<li>bootengine: set hostname for EC2 and OpenStack from metadata (<a href="https://github.com/kinvolk/coreos-overlay/pull/848">kinvolk/coreos-overlay#848</a>)</li>
<li>Make the hostname setting units optional. Having the hostname units as required by the initrd.target meant that if the unit failed the machine wouldn’t start, disrupting the whole boot. (<a href="https://github.com/kinvolk/bootengine/pull/23">bootengine#23</a>)</li>
<li>Enable using iSCSI netroot devices on Flatcar (<a href="https://github.com/kinvolk/bootengine/pull/22">bootengine#22</a>)</li>
<li>systemd-networkd: Do not manage loopback network interface (<a href="https://github.com/kinvolk/bootengine/pull/24">bootengine#24 init#40</a>)</li>
<li>containerd: Removed the containerd-stress binary (<a href="https://github.com/kinvolk/coreos-overlay/pull/858">coreos-overlay#858</a>)</li>
<li>dhcpcd: Removed the dhcpcd binary from the image, systemd-networkd is the only DHCP client (<a href="https://github.com/kinvolk/coreos-overlay/pull/858">coreos-overlay#858</a>)</li>
<li>samba: Update to EAPI=7, add new USE flags and remove deps on icu (<a href="https://github.com/kinvolk/coreos-overlay/pull/864">kinvolk/coreos-overlay#864</a>)</li>
<li>GCE: The oem-gce.service was ported to use systemd-nspawn instead of rkt. A one-time action is required to fetch the new service file because the OEM partition is not updated: sudo curl -s -S -f -L -o /etc/systemd/system/oem-gce.service https://raw.githubusercontent.com/kinvolk/coreos-overlay/fe7b0047ef5b634ebe04c9627bbf1ce3008ee5fa/coreos-base/oem-gce/files/units/oem-gce.service &amp;&amp; sudo systemctl daemon-reload &amp;&amp; sudo systemctl restart oem-gce.service</li>
<li>SDK: update portage and related packages to newer versions (<a href="https://github.com/kinvolk/coreos-overlay/pull/840">coreos-overlay#840</a>)</li>
<li>SDK: Drop jobs parameter in flatcar-scripts (<a href="https://github.com/kinvolk/flatcar-scripts/pull/121">flatcar-scripts#121</a>)</li>
<li>SDK: delete Go 1.6 (<a href="https://github.com/kinvolk/coreos-overlay/pull/827">coreos-overlay#827</a>)</li>
<li>Update sys-apps/coreutils and make sure they have split-usr disabled for generic images (<a href="https://github.com/kinvolk/coreos-overlay/pull/829">coreos-overlay#829</a>)</li>
<li>systemd: Fix unit installation (<a href="https://github.com/kinvolk/coreos-overlay/pull/810">coreos-overlay#810</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/863648/">5.10.52</a>)</li>
<li>Linux firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20210511">20210511</a>)</li>
<li>boost (<a href="https://www.boost.org/users/history/version_1_75_0.html">1.75.0</a>)</li>
<li>docker (<a href="https://docs.docker.com/engine/release-notes/19.03/#190315">19.03.15</a>)</li>
<li>c-ares (<a href="https://c-ares.haxx.se/changelog.html#1_17_1">1.17.1</a>)</li>
<li>curl (<a href="https://curl.se/changes.html#7_78_0">7.78</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.5.4">1.5.4</a>)</li>
<li>coreutils (<a href="https://git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?h=v8.32">8.32</a>)</li>
<li>cri-tools (<a href="https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.19.0">1.19.0</a>)</li>
<li>dbus (<a href="https://lists.freedesktop.org/archives/ftp-release/2020-July/000759.html">1.10.32</a>)</li>
<li>dnsmasq (<a href="https://thekelleys.org.uk/dnsmasq/CHANGELOG">2.83</a>)</li>
<li>go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.16.5">1.16.5</a>)</li>
<li>git (<a href="https://raw.githubusercontent.com/git/git/v2.26.3/Documentation/RelNotes/2.26.3.txt">2.26.3</a>)</li>
<li>glib (<a href="https://gitlab.gnome.org/GNOME/glib/-/releases/2.66.8">2.66.8</a>)</li>
<li>gnutls (<a href="https://gitlab.com/gnutls/gnutls/-/tags/3.7.1">3.7.1</a>)</li>
<li>intel-microcode (<a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20210216">20210216</a>)</li>
<li>libxml2 (<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.12">2.9.12</a>)</li>
<li>multipath-tools (<a href="https://github.com/opensvc/multipath-tools/releases/tag/0.8.5">0.8.5</a>)</li>
<li>ncurses (<a href="https://invisible-island.net/ncurses/announce-6.2.html">6.2</a>)</li>
<li>open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.4">2.1.4</a>)</li>
<li>openldap (<a href="https://www.openldap.org/software/release/announce.html">2.4.58</a>)</li>
<li>openssh (<a href="https://www.openssh.com/txt/release-8.6">8.6_p1</a>)</li>
<li>runc (<a href="https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc95">1.0.0_rc95</a>)</li>
<li>samba (<a href="https://www.samba.org/samba/history/samba-4.12.9.html">4.12.9</a>)</li>
<li>sqlite (<a href="https://www.sqlite.org/releaselog/3_34_1.html">3.34.1</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v247.6">247.6</a>)</li>
<li>zstd (<a href="https://github.com/facebook/zstd/releases/tag/v1.4.9">1.4.9</a>)</li>
<li>SDK: Rust (<a href="https://blog.rust-lang.org/2021/05/10/Rust-1.52.1.html">1.52.1</a>)</li>
<li>SDK: QEMU (<a href="https://wiki.qemu.org/ChangeLog/5.2">5.2.0</a>)</li>
<li>SDK: cmake (<a href="https://cmake.org/cmake/help/latest/release/3.18.html#id1">3.18.5</a>)</li>
<li>SDK: binutils (<a href="https://sourceware.org/pipermail/binutils/2021-February/115240.html">2.36.1</a>)</li>
</ul>
<p><strong>Deprecation</strong></p>
<ul>
<li>docker-1.12, rkt and kubelet-wrapper are deprecated and removed from Stable, also from subsequent channels in the future. Please read the<a href="https://groups.google.com/g/flatcar-linux-user/c/MeinndLqJO4"> removal announcement</a> to know more</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.52</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2905.2.0"/>
    <published>2021-07-28T08:25:15+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2765.2.6</id>
    <title>2765.2.6</title>
    <updated>2026-03-09T16:26:31.525855+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28691">CVE-2021-28691</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3587">CVE-2021-3587</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Update-engine sent empty requests when restarted before a pending reboot (<a href="https://github.com/kinvolk/Flatcar/issues/388">Flatcar#388</a>)</li>
<li>motd login prompt list of failed services: The output of &quot;systemctl list-units --state=failed --no-legend&quot; contains a bullet point which is not expected and ended up being taken as the unit name of failed units which was previously on the start of the line. Filtered the bullet point out to stay compatible with the old behavior in case upstream would remove the bullet point again. (<a href="https://github.com/kinvolk/coreos-overlay/pull/1042">coreos-overlay#1042</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/859022/">5.10.43</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.43</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2765.2.6"/>
    <published>2021-06-17T10:32:06+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2765.2.5</id>
    <title>2765.2.5</title>
    <updated>2026-03-09T16:26:31.521589+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Bug fixes</strong></p>
<ul>
<li>The Linux kernel IOMMU-related crash introduced in the 5.10.37 update got fixed through the 5.10.38 update (<a href="https://github.com/kinvolk/Flatcar/issues/400">Flatcar#400</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/856654/">5.10.38</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.38</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2765.2.5"/>
    <published>2021-05-21T12:08:45+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2765.2.4</id>
    <title>2765.2.4</title>
    <updated>2026-03-09T16:26:31.517187+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3491">CVE-2021-3491</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31440">CVE-2021-31440</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31829">CVE-2021-31829</a>)</li>
<li>nvidia-drivers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1052">CVE-2021-1052</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1053">CVE-2021-1053</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1056">CVE-2021-1056</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1076">CVE-2021-1076</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1077">CVE-2021-1077</a>)</li>
<li>runc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/856269/">5.10.37</a>)</li>
<li>nvidia-drivers (<a href="https://www.nvidia.com/Download/driverResults.aspx/172376/en-us">460.73.01</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.37</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2765.2.4"/>
    <published>2021-05-19T11:38:16+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2765.2.3</id>
    <title>2765.2.3</title>
    <updated>2026-03-09T16:26:31.512192+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28964">CVE-2021-28964</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28951">CVE-2021-28951</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28952">CVE-2021-28952</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29266">CVE-2021-29266</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29649">CVE-2021-29649</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29646">CVE-2021-29646</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29647">CVE-2021-29647</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29155">CVE-2021-29155</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23133">CVE-2021-23133</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Fix the patch to update DefaultTasksMax in systemd (<a href="https://github.com/kinvolk/coreos-overlay/pull/971">coreos-overlay#971</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/853762/">5.10.32</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.32</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2765.2.3"/>
    <published>2021-04-28T13:36:47+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2765.2.2</id>
    <title>2765.2.2</title>
    <updated>2026-03-09T16:26:31.506494+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28039">CVE-2021-28039</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28375">CVE-2021-28375</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219</a>)</li>
<li>openssl (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841"> CVE-2021-23841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840"> CVE-2021-23840</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841"> CVE-2021-23841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3449">CVE-2021-3449</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3450"> CVE-2021-3450</a>)</li>
</ul>
<p><strong>Bug Fixes</strong></p>
<ul>
<li>GCE: The old interface name ens4v1 which was replaced by eth0 due to a broken udev rule was restored, but now as alternative interface name, and eth0 will stay the primary name for consistency across cloud environments. (<a href="https://github.com/kinvolk/init/pull/38">init#38</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>The virtio network interfaces got predictable interface names as alternative interface names, and thus these names can also be used to match for a specific interface in case there is more than one and the eth0 and eth1 name assignment is not stable. (<a href="https://github.com/kinvolk/init/pull/38">init#38</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/849951/">5.10.25</a>)</li>
<li>openssl (<a href="https://mta.openssl.org/pipermail/openssl-announce/2021-March/000197.html">1.1.1k</a>)</li>
<li>open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.4">2.1.4</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.25</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2765.2.2"/>
    <published>2021-03-25T15:39:33+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2765.2.1</id>
    <title>2765.2.1</title>
    <updated>2026-03-09T16:26:31.501065+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux - (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25639">CVE-2020-25639</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28039">CVE-2021-28039</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/security/advisories/GHSA-6g2q-w5j3-fwh4">GHSA-6g2q-w5j3-fwh4</a>)</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>Include firmware files for all modules shipped in our image (<a href="https://github.com/kinvolk/Flatcar/issues/359">Issue #359</a>, <a href="https://github.com/kinvolk/coreos-overlay/pull/887">PR #887</a>)</li>
<li>Add explicit path to the binary call in the coreos-metadata unit file (<a href="https://github.com/kinvolk/Flatcar/issues/360">Issue #360</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/848617/">5.10.21</a>)</li>
<li>Containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.4.4">1.4.4</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.21</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2765.2.1"/>
    <published>2021-03-11T09:19:31+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2765.2.0</id>
    <title>2765.2.0</title>
    <updated>2026-03-09T16:26:31.496843+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/847589/">5.10.19</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.15</li>
<li>ignition 0.34.0</li>
<li>kernel 5.10.19</li>
<li>systemd 247</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2765.2.0"/>
    <published>2021-03-03T14:58:35+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.9.0</id>
    <title>2605.9.0</title>
    <updated>2026-03-09T16:26:31.481549+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>containerd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15257">CVE-2020-15257</a>)</li>
<li>glibc (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6488"> CVE-2019-6488</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-7309"> CVE-2019-7309</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029"> CVE-2020-10029</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751"> CVE-2020-1751</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-6096"> CVE-2020-6096</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796"> CVE-2018-20796</a>)</li>
<li>Linux (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28941">CVE-2020-28941</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351</a>)</li>
<li>glib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450</a>)</li>
<li>open-iscsi (<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17840">CVE-2017-17840</a>)</li>
<li>samba (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10197">CVE-2019-10197</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10704"> CVE-2020-10704</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745"> CVE-2020-10745</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880"> CVE-2019-3880</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218"> CVE-2019-10218</a>)</li>
<li>shadow (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19882">CVE-2019-19882</a>)</li>
<li>sssd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16883">CVE-2018-16883</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-3811"> CVE-2019-3811</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838"> CVE-2018-16838</a>)</li>
<li>trousers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24330">CVE-2020-24330</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24331"> CVE-2020-24331</a>)</li>
<li>cifs-utils (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14342">CVE-2020-14342</a>)</li>
<li>ntp (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817"> CVE-2020-13817</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-8956"> CVE-2018-8956</a>,<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15025"> CVE-2020-15025</a>)</li>
<li>bzip2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900</a>)</li>
<li>c-ares (<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000381">CVE-2017-1000381</a>)</li>
<li>file (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218</a>)</li>
<li>json-c (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762</a>)</li>
<li>jq (<a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8863">CVE-2015-8863</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-4074">CVE-2016-4074</a>)</li>
<li>libuv (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8252">CVE-2020-8252</a>)</li>
<li>libxml2 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595</a>)</li>
<li>re2c (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11958">CVE-2020-11958</a>)</li>
<li>tar (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9923">CVE-2019-9923</a>)</li>
<li>sqlite (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11656">CVE-2020-11656</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-9327">CVE-2020-9327</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-11655">CVE-2020-11655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15358">CVE-2020-15358</a>)</li>
<li>tcpdump and pcap (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-10103">CVE-2018-10103</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-10105">CVE-2018-10105</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15163">CVE-2019-15163</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14461">CVE-2018-14461</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14462">CVE-2018-14462</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14463">CVE-2018-14463</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14464">CVE-2018-14464</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14465">CVE-2018-14465</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14466">CVE-2018-14466</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14467">CVE-2018-14467</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14468">CVE-2018-14468</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14469">CVE-2018-14469</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14470">CVE-2018-14470</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14880">CVE-2018-14880</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14881">CVE-2018-14881</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14882">CVE-2018-14882</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16227">CVE-2018-16227</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16228">CVE-2018-16228</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16229">CVE-2018-16229</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16230">CVE-2018-16230</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16300">CVE-2018-16300</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16451">CVE-2018-16451</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16452">CVE-2018-16452</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15166">CVE-2019-15166</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14879">CVE-2018-14879</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-16808">CVE-2017-16808</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-19519">CVE-2018-19519</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15161">CVE-2019-15161</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-15164">CVE-2019-15164</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010220">CVE-2019-1010220</a>)</li>
<li>libbsd (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20367">CVE-2019-20367</a>)</li>
<li>rsync and zlib (<a href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-9841">CVE-2016-9841</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-9842">CVE-2016-9842</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843</a>)</li>
</ul>
<p>Bug fixes</p>
<ul>
<li>Added systemd-tmpfiles directives for /opt and /opt/bin to ensure that the folders have correct permissions even when /opt/ was once created by containerd (<a href="https://github.com/kinvolk/Flatcar/issues/279">Flatcar#279</a>)</li>
<li>Make the automatic filesystem resizing more robust against a race and add more logging (<a href="https://github.com/kinvolk/init/pull/31">kinvolk/init#31</a>)</li>
<li>Allow inactive network interfaces to be bound to a bonding interface, by encoding additional configuration for systemd-networkd-wait-online (<a href="https://github.com/flatcar/afterburn/pull/10">afterburn PR #10</a>)</li>
<li>Do not configure ccache in Jenkins (<a href="https://github.com/flatcar/scripts/pull/100">scripts PR #100</a>)</li>
<li>Azure: Exclude bonded SR-IOV network interfaces with newer drivers from networkd (in addition to the old drivers) to prevent them being configured instead of just the bond interface (<a href="https://github.com/flatcar/init/pull/29">init PR#29</a>,<a href="https://github.com/flatcar/bootengine/pull/19"> bootengine PR#19</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Update-engine now detects rollbacks and reports them as errors to the update server (<a href="https://github.com/flatcar/update_engine/pull/6">PR#6</a>)</li>
<li>The zstd tools were added (version 1.4.4)</li>
<li>The kernel config CONFIG_PSI was set to support<a href="https://www.kernel.org/doc/html/latest/accounting/psi.html"> Pressure Stall Information</a>, more information also under<a href="https://facebookmicrosites.github.io/psi/docs/overview"> https://facebookmicrosites.github.io/psi/docs/overview</a> (<a href="https://github.com/flatcar/Flatcar/issues/162">Flatcar#162</a>)</li>
<li>The kernel config CONFIG_BPF_JIT_ALWAYS_ON was set to use the BPF just-in-time compiler by default for faster execution</li>
<li>The kernel config CONFIG_POWER_SUPPLY was set</li>
<li>The kernel configs CONFIG_OVERLAY_FS_METACOPY and CONFIG_OVERLAY_FS_REDIRECT_DIR were set. With the first overlayfs will only copy up metadata when a metadata-specific operation like chown/chmod is performed. The full file will be copied up later when the file is opened for write operations. With the second, which is equivalent to setting &quot;redirect_dir=on&quot; in the kernel command-line, overlayfs will copy up the directory first before the actual content (<a href="https://github.com/kinvolk/Flatcar/issues/170">Flatcar#170</a>).</li>
<li>Remove unnecessary kernel module nf-conntrack-ipv4 (<a href="https://github.com/flatcar/coreos-overlay/pull/649">overlay PR#649</a>)</li>
<li>Compress kernel modules with xz (<a href="https://github.com/flatcar/coreos-overlay/pull/628">overlay PR#628</a>)</li>
<li>Add containerd-runc-shim-v* binaries required by kubelet custom CRI endpoints (<a href="https://github.com/flatcar/coreos-overlay/pull/623">overlay PR#623</a>)</li>
<li>Equinix Metal (Packet): Exclude unused network interfaces from networkd, disregard the state of the bonded interfaces for the network-online.target and only require the bond interface itself to have at least one active link instead of routable which requires both links to be active (<a href="https://github.com/flatcar/afterburn/pull/10">afterburn PR#10</a>)</li>
<li>QEMU: Use flatcar.autologin kernel command line parameter for auto login on the console (<a href="https://github.com/flatcar/Flatcar/issues/71">Flatcar #71</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/838790/">5.4.81</a>)</li>
<li>Linux firmware (<a href="https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20200918">20200918</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v246.6">246.6</a>)</li>
<li>glibc (<a href="https://lwn.net/Articles/828210/">2.32</a>)</li>
<li>Docker (<a href="https://github.com/docker/docker-ce/releases/tag/v19.03.14">19.03.14</a>)</li>
<li>containerd (<a href="https://github.com/containerd/containerd/releases/tag/v1.4.3">1.4.3</a>)</li>
<li>tini<a href="https://github.com/krallin/tini/releases/tag/v0.18.0"> (0.18</a>)</li>
<li>libseccomp<a href="https://github.com/seccomp/libseccomp/releases/tag/v2.5.0"> (2.5.0</a>)</li>
<li>audit<a href="https://github.com/linux-audit/audit-userspace/releases/tag/v2.8.5"> (2.8.5</a>)</li>
<li>bzip2 (<a href="https://sourceware.org/git/?p=bzip2.git;a=blob;f=CHANGES;h=30afead2586b6d64f50988a41d394a0131b38949;hb=HEAD#l342">1.0.8</a>)</li>
<li>c-ares<a href="https://github.com/c-ares/c-ares/releases/tag/cares-1_16_1"> (1.61.1</a>)</li>
<li>cryptsetup<a href="https://gitlab.com/cryptsetup/cryptsetup/-/tags/v2.3.2"> (2.3.2</a>)</li>
<li>cifs-utils (6.11)</li>
<li>dbus-glib (0.110)</li>
<li>dracut<a href="https://github.com/dracutdevs/dracut/releases/tag/050"> (050</a>)</li>
<li>elfutils (0.178)</li>
<li>glib (2.64.5)</li>
<li>json-c<a href="https://github.com/json-c/json-c/releases/tag/json-c-0.15-20200726"> (0.15</a>)</li>
<li>jq (<a href="https://github.com/stedolan/jq/releases/tag/jq-1.6">1.6</a>)</li>
<li>libuv<a href="https://github.com/libuv/libuv/releases/tag/v1.39.0"> (1.39.0</a>)</li>
<li>libxml2<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.10"> (2.9.10</a>)</li>
<li>ntp (4.2.8_p15)</li>
<li>open-iscsi (2.1.2)</li>
<li>samba (4.11.13)</li>
<li>shadow (4.8)</li>
<li>sssd (2.3.1)</li>
<li>strace (5.9)</li>
<li>talloc (2.3.1)</li>
<li>tar<a href="https://git.savannah.gnu.org/cgit/tar.git/tag/?h=release_1_32"> (1.32</a>)</li>
<li>tdb (1.4.3)</li>
<li>tevent (0.10.2)</li>
<li>SDK/developer container: GCC (9.3.0), binutils (2.35), gdb (9.2)</li>
<li>Go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.15.5">1.15.5</a>, <a href="https://go.googlesource.com/go/+/refs/tags/go1.12.17">1.12.17</a>) (only in SDK)</li>
<li>Rust (<a href="https://blog.rust-lang.org/2020/08/27/Rust-1.46.0.html">1.46.0</a>) (only in SDK)</li>
<li>file (<a href="https://github.com/file/file/tree/FILE5_39">5.39</a>) (only in SDK)</li>
<li>gdbus-codegen (<a href="https://gitlab.gnome.org/GNOME/glib/-/tags/2.64.5">2.64.5</a>) (only in SDK)</li>
<li>meson (<a href="https://github.com/mesonbuild/meson/releases/tag/0.55.3">0.55.3</a>) (only in SDK)</li>
<li>re2c (<a href="https://re2c.org/releases/release_notes.html#release-2-0-3">2.0.3</a>) (only in SDK)</li>
<li>VMware: open-vm-tools (11.2.0)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.14</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.81</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.9.0"/>
    <published>2020-12-07T14:03:56+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.8.0</id>
    <title>2605.8.0</title>
    <updated>2026-03-09T16:26:31.472217+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Linux -  <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27673">CVE-2020-27673</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27675">CVE-2020-27675</a></li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>network: Restore KeepConfiguration=dhcp-on-stop (<a href="https://github.com/kinvolk/init/pull/30">kinvolk/init#30</a>)</li>
<li>systemd-stable-245.8: ingest latest fixes on top of upstream release (<a href="https://github.com/kinvolk/systemd/commit/261680bc0ea61777ac22ea1c42b0d728ec52ae14">#1</a>, <a href="https://github.com/kinvolk/systemd/commit/b2b382820bcfc166d048b85aadd90f5cf71c7a4a">#2</a>, <a href="https://github.com/kinvolk/systemd/commit/711ca814c9f2e81d3d25ebbed0b837b7d4fbbeda">#3</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/836795/">5.4.77</a>)</li>
<li>systemd (<a href="https://github.com/systemd/systemd-stable/releases/tag/v245.8">245.8</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.12</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.77</li>
<li>systemd 245</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.8.0"/>
    <published>2020-11-19T15:40:47+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2605.7.0</id>
    <title>2605.7.0</title>
    <updated>2026-03-09T16:26:31.468096+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Linux - <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211</a></li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Ensured that the <code>/etc/coreos</code> to <code>/etc/flatcar</code> symlink always exists, relevant for the Container Linux Config transpiler (ct) when specifying directives for <code>update:</code> or <code>locksmith:</code> while also reformatting the rootfs (<a href="https://github.com/flatcar/baselayout/pull/7">baselayout PR#7</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/834537/">5.4.72</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.12</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.72</li>
<li>systemd 245</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.7.0"/>
    <published>2020-10-28T14:35:36+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2605.6.0</id>
    <title>2605.6.0</title>
    <updated>2026-03-09T16:26:31.463477+00:00</updated>
    <content type="html"><![CDATA[<p>Bug fixes:</p>
<ul>
<li>Enabled missing systemd services (<a href="https://github.com/flatcar/Flatcar/issues/191">#191</a>, <a href="https://github.com/flatcar/coreos-overlay/pull/612">PR #612</a>)</li>
<li>Fixed Docker torcx image unpacking error on machines with less than ~600 MB total RAM (<a href="https://github.com/flatcar/Flatcar/issues/32">#32</a>)</li>
<li>Solved adcli Kerberos Active Directory incompatibility (<a href="https://github.com/flatcar/Flatcar/issues/194">#194</a>)</li>
<li>Fixed the makefile path when building kernel modules with the developer container (<a href="https://github.com/flatcar/Flatcar/issues/195">#195</a>)</li>
<li>Removed the <code>/etc/portage/savedconfig/</code> folder that contained a dump of the firmware config <a href="https://github.com/flatcar/coreos-overlay/pull/613">flatcar-linux/coreos-overlay#613</a></li>
</ul>
<p>Changes:</p>
<ul>
<li>GCE: Improved oslogin support and added shell aliases to run a Python Docker image (<a href="https://github.com/flatcar/coreos-overlay/pull/592">PR #592</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/832306/">5.4.67</a></li>
<li>adcli <a href="https://cgit.freedesktop.org/realmd/adcli/tree/NEWS?h=0.9.0">0.9.0</a></li>
<li>GCE: oslogin <a href="https://github.com/GoogleCloudPlatform/guest-oslogin/releases/tag/20200910.00">20200910.00</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.12</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.67</li>
<li>systemd 245</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.6.0"/>
    <published>2020-09-30T12:21:16+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2605.5.0</id>
    <title>2605.5.0</title>
    <updated>2026-03-09T16:26:31.459182+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Linux kernel <a href="https://www.openwall.com/lists/oss-security/2020/09/15/2">CVE-2020-14390</a> and the unassigned <a href="https://www.openwall.com/lists/oss-security/2020/09/16/1">similar bug</a></li>
<li>Linux kernel <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284">CVE-2020-25284</a></li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/831752/">5.4.66</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.12</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.66</li>
<li>rkt 1.30.0</li>
<li>systemd 245</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.5.0"/>
    <published>2020-09-22T08:20:39+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.12.0</id>
    <title>2605.12.0</title>
    <updated>2026-03-09T16:26:31.453891+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>linux - <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158</a></li>
<li>go - <a href="https://github.com/golang/go/issues/43786">CVE-2021-3114</a></li>
<li>sudo - <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239</a></li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li><code>/etc/iscsi/initiatorname.iscsi</code> is generated by the iscsi-init service (<a href="https://github.com/kinvolk/Flatcar/issues/321">#321</a>)</li>
<li>Prevent iscsiadm buffer overflow (<a href="https://github.com/kinvolk/Flatcar/issues/318">#318</a>)</li>
</ul>
<p><strong>Changes</strong></p>
<ul>
<li>Revert to building docker and containerd with go1.13 instead of go1.15. This reduces the SIGURG log spam (<a href="https://github.com/kinvolk/Flatcar/issues/315">Issue #315</a> <a href="https://github.com/kinvolk/coreos-overlay/pull/774">PR #774</a>)</li>
<li>The containerd socket is now available in the default location (<code>/run/containerd/containerd.sock</code>) and also as a symlink in the previous location (<code>/run/docker/libcontainerd/docker-containerd.sock</code>) (<a href="https://github.com/kinvolk/coreos-overlay/pull/771">#771</a>)</li>
<li>With the iscsi update, the service unit has changed from iscsid to iscsi (<a href="https://github.com/kinvolk/coreos-overlay/pull/791">#791</a>)</li>
<li>AWS Pro: include scripts to facilitate setup of EKS workers (<a href="https://github.com/kinvolk/coreos-overlay/pull/794">#794</a>).</li>
<li>Missed from earlier notes: with the previous open-iscsi update to 2.1.2, the service unit name changed from iscsid to iscsi (<a href="https://github.com/kinvolk/coreos-overlay/pull/682">#682</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>linux (<a href="https://lwn.net/Articles/843687/">5.4.92</a>)</li>
<li>open-iscsi (<a href="https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.3">2.1.3</a>)</li>
<li>go (<a href="https://go.googlesource.com/go/+/refs/tags/go1.15.7">1.15.7</a>)</li>
<li>sudo (<a href="https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_5p2">1.9.5p2</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.14</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.92</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.12.0"/>
    <published>2021-01-28T11:02:10+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.11.0</id>
    <title>2605.11.0</title>
    <updated>2026-03-09T16:26:31.449032+00:00</updated>
    <content type="html"><![CDATA[<p><strong>Security fixes</strong></p>
<ul>
<li>Linux
<ul>
<li><a href="https://www.openwall.com/lists/oss-security/2020/11/30/5">CVE-2020-27815</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568</a></li>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569</a></li>
</ul>
</li>
</ul>
<p><strong>Bug fixes</strong></p>
<ul>
<li>networkd: avoid managing MAC addresses for veth devices (<a href="https://github.com/kinvolk/init/pull/33">kinvolk/init#33</a>)</li>
</ul>
<p><strong>Updates</strong></p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/841900/">5.4.87</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.14</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.87</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.11.0"/>
    <published>2021-01-12T16:59:40+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/kinvolk/manifest/releases/tag/v2605.10.0</id>
    <title>2605.10.0</title>
    <updated>2026-03-09T16:26:31.444517+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Linux <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27830">CVE-2020-27830</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-28588">CVE-2020-28588</a></li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>The sysctl <code>net.ipv4.conf.*.rp_filter</code> is set to <code>0</code> for the Cilium CNI plugin to work (<a href="https://github.com/kinvolk/Flatcar/issues/181">Flatcar#181</a>)</li>
<li>Package downloads in the developer container now use the correct URL again (<a href="https://github.com/kinvolk/Flatcar/issues/298">Flatcar#298</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>The sysctl default config file is now applied under the prefix 60 which allows for custom sysctl config files to take effect when they start with a prefix of 70, 80, or 90 (<a href="https://github.com/kinvolk/baselayout/pull/13">baselayout#13</a>)</li>
<li>Containerd CRI plugin got enabled by default, only the containerd socket path needs to be specified as kubelet parameter for Kubernetes 1.20 to use containerd instead of Docker (<a href="https://github.com/kinvolk/Flatcar/issues/283">Flatcar#283</a>)</li>
<li>For users with a custom update server a machine alias setting in update-engine allows to give human-friendly names to client instances (<a href="https://github.com/kinvolk/update_engine/pull/8">update-engine#8</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux (<a href="https://lwn.net/Articles/839875/">5.4.83</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 19.03.14</li>
<li>ignition 0.34.0</li>
<li>kernel 5.4.83</li>
<li>systemd 246</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2605.10.0"/>
    <published>2020-12-16T12:01:04+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2512.5.0</id>
    <title>2512.5.0</title>
    <updated>2026-03-09T16:26:31.440336+00:00</updated>
    <content type="html"><![CDATA[<p>Changes:</p>
<ul>
<li>Update public key to include a <a href="https://www.flatcar-linux.org/security/image-signing-key/">new subkey</a></li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/831367/">4.19.145</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.34.0</li>
<li>kernel 4.19.145</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2512.5.0"/>
    <published>2020-09-16T06:12:05+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2512.4.0</id>
    <title>2512.4.0</title>
    <updated>2026-03-09T16:26:31.436672+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Linux kernel: Fix AF_PACKET overflow in tpacket_rcv <a href="https://seclists.org/oss-sec/2020/q3/146">CVE-2020-14386</a></li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/830503/">4.19.143</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.34.0</li>
<li>kernel 4.19.143</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2512.4.0"/>
    <published>2020-09-07T15:38:48+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2512.3.0</id>
    <title>2512.3.0</title>
    <updated>2026-03-09T16:26:31.431706+00:00</updated>
    <content type="html"><![CDATA[<p>Security fixes:</p>
<ul>
<li>Bind: fixes for <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8620">CVE-2020-8620</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8621">CVE-2020-8621</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8623">CVE-2020-8623</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8624">CVE-2020-8624</a></li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>The static IP address configuration in the initramfs works again in the format <code>ip=&lt;ip&gt;::&lt;gateway&gt;:&lt;netmask&gt;:&lt;hostname&gt;:&lt;iface&gt;:none[:&lt;dns1&gt;[:&lt;dns2&gt;]]</code> (<a href="https://github.com/flatcar/bootengine/pull/15">flatcar-linux/bootengine#15</a>)</li>
<li>app-admin/{kubelet, etcd, flannel}-wrapper: don't overwrite the user supplied –insecure-options argument (<a href="https://github.com/flatcar/coreos-overlay/pull/426">flatcar-linux/coreos-overlay#426</a>)</li>
<li>etcd-wrapper: Adjust data dir permissions (<a href="https://github.com/flatcar/coreos-overlay/pull/536">flatcar-linux/coreos-overlay#536</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Vultr support in Ignition (<a href="https://github.com/flatcar/ignition/pull/13">flatcar-linux/ignition#13</a>)</li>
<li>VMware OVF settings default to ESXi 6.5 and Linux 3.x</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/829107/">4.19.140</a></li>
<li>bind-tools <a href="https://ftp.isc.org/isc/bind9/cur/9.11/RELEASE-NOTES-bind-9.11.22.txt">9.11.22</a></li>
<li>etcd-wrapper <a href="https://github.com/etcd-io/etcd/releases/tag/v3.3.24">3.3.24</a></li>
<li>Git <a href="https://raw.githubusercontent.com/git/git/v2.26.2/Documentation/RelNotes/2.26.2.txt">2.26.2</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.34.0</li>
<li>kernel 4.19.140</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2512.3.0"/>
    <published>2020-08-20T21:44:54+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2512.2.1</id>
    <title>2512.2.1</title>
    <updated>2026-03-09T16:26:31.427222+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Security fixes:</p>
<ul>
<li>Fix the Intel Microcode vulnerabilities (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543">CVE-2020-0543</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>A source code and licensing overview is available under <code>/usr/share/licenses/INFO</code></li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/822841/">4.19.128</a></li>
<li>intel-microcode <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20200609">20200609</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.34.0</li>
<li>kernel 4.19.128</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2512.2.1"/>
    <published>2020-06-17T15:45:35+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2512.2.0</id>
    <title>2512.2.0</title>
    <updated>2026-03-09T16:26:31.420294+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Security fixes:</p>
<ul>
<li>Fix e2fsprogs arbitrary code execution via crafted filesystem (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094">CVE-2019-5094</a>)</li>
<li>Fix Git arbitrary path overwrite, credential leak from credential helpers, remote code execution in recursive clones, and arbitrary command execution via submodules (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348">CVE-2019-1348</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387">CVE-2019-1387</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604">CVE-2019-19604</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11008">CVE-2020-11008</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5260">CVE-2020-5260</a>)</li>
<li>Fix libarchive crash or use-after-free via crafted RAR file (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18408">CVE-2019-18408</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9308">CVE-2020-9308</a>)</li>
<li>Fix libgcrypt ECDSA timing attack (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627">CVE-2019-13627</a>)</li>
<li>Fix libidn2 domain impersonation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290">CVE-2019-12290</a>)</li>
<li>Fix NSS crashes and heap corruption (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695">CVE-2017-11695</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696">CVE-2017-11696</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697">CVE-2017-11697</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698">CVE-2017-11698</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508">CVE-2018-18508</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745">CVE-2019-11745</a>)</li>
<li>Fix OpenSSL overflow in Montgomery squaring procedure (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551">CVE-2019-1551</a>)</li>
<li>Fix SQLite crash and heap corruption (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168">CVE-2019-16168</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827">CVE-2019-5827</a>)</li>
<li>Fix unzip heap overflow or excessive resource consumption via crafted archive (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035">CVE-2018-1000035</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13232">CVE-2019-13232</a>)</li>
<li>Fix vim arbitrary command execution via crafted file (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735">CVE-2019-12735</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>When writing the update kernel, prefer <code>/boot/coreos</code> only if <code>/boot/coreos/vmlinux-*</code> exists (https://github.com/flatcar/update_engine/pull/5)</li>
<li>Fixed sysroot-boot initramfs service race which resulted in a warning that this service failed</li>
<li>Use the correct <code>BINHOST</code> URLs in the development container to download binary packages</li>
</ul>
<p>Changes:</p>
<ul>
<li>Support the CoreOS GRUB <code>/boot/coreos/first_boot</code> flag file (https://github.com/flatcar/bootengine/pull/13)</li>
<li>Fetch container images in docker format rather than ACI by default in <code>etcd-member.service</code>, <code>flanneld.service</code>, and <code>kubelet-wrapper</code></li>
<li>Use <code>flatcar.autologin</code> kernel command line parameter on Azure and VMware for auto login on the serial console</li>
<li>Include <code>conntrack</code> (<a href="http://conntrack-tools.netfilter.org/">conntrack-tools</a>)</li>
<li>Include <code>journalctl</code> output, <code>pstore</code> kernel crash logs, and <code>coredumpctl list</code> output in the <code>mayday</code> report</li>
<li>Update wa-linux-agent to 2.2.46 on Azure</li>
<li>Support both <code>coreos.config.*</code> and <code>flatcar.config.*</code> guestinfo variables on VMware OEM</li>
</ul>
<p>Updates:</p>
<ul>
<li>e2fsprogs <a href="http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.45.5">1.45.5</a></li>
<li>etcd <a href="https://github.com/etcd-io/etcd/releases/tag/v3.3.20">3.3.20</a></li>
<li>etcdctl <a href="https://github.com/etcd-io/etcd/releases/tag/v3.3.20">3.3.20</a></li>
<li>Git <a href="https://raw.githubusercontent.com/git/git/v2.24.1/Documentation/RelNotes/2.24.1.txt">2.24.1</a></li>
<li>Linux <a href="https://lwn.net/Articles/820974/">4.19.124</a></li>
<li>OpenSSL <a href="https://www.openssl.org/news/openssl-1.0.2-notes.html">1.0.2u</a></li>
<li>vim <a href="http://ftp.vim.org/pub/vim/patches/8.2/README">8.2.0360</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.34.0</li>
<li>kernel 4.19.124</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2512.2.0"/>
    <published>2020-05-26T16:58:25+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2345.3.1</id>
    <title>2345.3.1</title>
    <updated>2026-03-09T16:26:31.414526+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Use newest network interface naming scheme (https://github.com/flatcar/Flatcar/issues/36)
<ul>
<li>It is a possible breaking change for some persistent network interface names</li>
</ul>
</li>
<li>Fix URL scheme in emerge-gitclone (https://github.com/flatcar/coreos-overlay/issues/223)</li>
<li>Fix coreos-cloudinit variable names (https://github.com/flatcar/coreos-overlay/pull/206)</li>
<li>Prefer /boot/coreos to write updates (https://github.com/flatcar/update_engine/pull/2)</li>
<li>Remove /boot/coreos/first_boot after a Ignition rerun on migration (https://github.com/flatcar/bootengine/pull/10)</li>
<li>Support coreos.config.url as kernel command line parameter for Ignition (https://github.com/flatcar/ignition/pull/10)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Add kernel config for QEDE driver (https://github.com/flatcar/coreos-overlay/pull/198)</li>
<li>Add <code>tracepath</code> alongside <code>traceroute6</code> (https://github.com/flatcar/Flatcar/issues/50)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/813602/">4.19.107</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.34.0</li>
<li>kernel 4.19.107</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2345.3.1"/>
    <published>2020-03-31T16:25:06+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2345.3.0</id>
    <title>2345.3.0</title>
    <updated>2026-03-09T16:26:31.408365+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Enable persistent network interface names already in the initramfs to fix https://github.com/coreos/bugs/issues/1767</li>
<li>Fix backwards compatibility issues for users to migrate from CoreOS Container Linux. Support the kernel command line parameters <code>coreos.oem.*</code>, <code>coreos.autologin</code>, <code>coreos.first_boot</code>, and the QEMU firmware config path <code>opt/com.coreos/config</code> (https://github.com/flatcar/Flatcar/issues/16 https://github.com/flatcar/afterburn/pull/7 https://github.com/flatcar/bootengine/pull/7 https://github.com/flatcar/bootengine/pull/8 https://github.com/flatcar/init/pull/16 https://github.com/flatcar/init/pull/17 https://github.com/flatcar/ignition/pull/8)</li>
</ul>
<h2><a href="https://github.com/coreos/manifest/releases/tag/v2345.3.0">Upstream Container Linux updates</a></h2>
<p>Security fixes:</p>
<ul>
<li>Fix systemd use-after-free upon receiving crafted D-Bus message from local unprivileged attacker <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712">CVE-2020-1712</a></li>
<li>Fix heap-based buffer over-read in libexpat (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903">CVE-2019-15903</a>)</li>
<li>Fix multiple Git <a href="https://marc.info/?l=git&amp;m=157600115215285&amp;w=2">vulnerabilities</a> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348">CVE-2019-1348</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349">CVE-2019-1349</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350">CVE-2019-1350</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351">CVE-2019-1351</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352">CVE-2019-1352</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353">CVE-2019-1353</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354">CVE-2019-1354</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387">CVE-2019-1387</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604">CVE-2019-19604</a>)</li>
<li>Fix curl Kerberos FTP double free (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481">CVE-2019-5481</a>)</li>
<li>Fix curl TFTP buffer overflow with non-default block size (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482">CVE-2019-5482</a>)</li>
<li>Fix OpenSSL key extraction attacks under non-default conditions (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563">CVE-2019-1563</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547">CVE-2019-1547</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Git <a href="https://github.com/git/git/blob/master/Documentation/RelNotes/2.24.1.txt">2.24.1</a></li>
<li>Linux <a href="https://lwn.net/Articles/813157/">4.19.106</a></li>
<li>OpenSSL <a href="https://www.openssl.org/news/cl102.txt">1.0.2t</a></li>
<li>curl <a href="https://curl.haxx.se/mail/archive-2019-09/0002.html">7.66.0</a></li>
<li>etcd <a href="https://github.com/etcd-io/etcd/releases/tag/v3.3.18">3.3.18</a></li>
<li>expat <a href="https://github.com/libexpat/libexpat/releases/tag/R_2_2_8">2.2.8</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.106</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2345.3.0"/>
    <published>2020-03-02T14:03:06+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2303.4.0</id>
    <title>2303.4.0</title>
    <updated>2026-03-09T16:26:31.403433+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix DNS resolution for the GCE metadata server (https://github.com/flatcar/coreos-overlay/pull/160)</li>
<li>Create symlink for /run/metadata/coreos (https://github.com/flatcar/coreos-overlay/pull/166)</li>
<li>Create symlink for flatcar-install (https://github.com/flatcar/init/pull/14)</li>
</ul>
<h2><a href="https://github.com/coreos/manifest/releases/tag/v2303.4.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/809258/">4.19.95</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.95</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2303.4.0"/>
    <published>2020-02-10T11:10:47+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2303.3.1</id>
    <title>2303.3.1</title>
    <updated>2026-03-09T16:26:31.399197+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix a bug when creating RAID0 arrays by setting the default layout (https://github.com/flatcar/baselayout/pull/2)</li>
<li>Fix bug of unpacking tarballs failing when xattr is not supported (https://github.com/flatcar/torcx/pull/2)</li>
</ul>
<p>Updates:</p>
<ul>
<li>ldb <a href="https://gitlab.com/samba-team/samba/-/tags/ldb-1.3.6">1.3.6</a></li>
<li>samba <a href="https://gitlab.com/samba-team/samba/-/tags/samba-4.8.6">4.8.6</a></li>
<li>talloc <a href="https://gitlab.com/samba-team/samba/-/tags/talloc-2.1.11">2.1.11</a></li>
<li>tdb <a href="https://gitlab.com/samba-team/samba/-/tags/tdb-1.3.15">1.3.15</a></li>
<li>tevent <a href="https://gitlab.com/samba-team/samba/-/tags/tevent-0.9.37">0.9.37</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.86</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2303.3.1"/>
    <published>2019-12-18T09:49:23+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2303.3.0</id>
    <title>2303.3.0</title>
    <updated>2026-03-09T16:26:31.395371+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2303.3.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/805531/">4.19.86</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.86</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2303.3.0"/>
    <published>2019-12-05T06:33:04+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2247.7.0</id>
    <title>2247.7.0</title>
    <updated>2026-03-09T16:26:31.391171+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2247.7.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Intel CPU disclosure of memory to user process. Complete mitigation requires <a href="https://docs.flatcar-linux.org/os/disabling-smt/">manually disabling TSX or SMT</a> on affected processors. (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135">CVE-2019-11135</a>, <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html">TAA</a>)</li>
<li>Fix Intel CPU denial of service by a malicious guest VM (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207">CVE-2018-12207</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix CFS scheduler throttling highly-threaded I/O-bound applications (<a href="https://github.com/coreos/bugs/issues/2623">#2623</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>intel-microcode <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20191115/releasenote">20191115</a></li>
<li>Linux <a href="https://lwn.net/Articles/804465/">4.19.84</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.84</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2247.7.0"/>
    <published>2019-11-21T09:27:14+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2247.6.0</id>
    <title>2247.6.0</title>
    <updated>2026-03-09T16:26:31.387116+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2247.6.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix time zone for Brazil (<a href="https://github.com/coreos/bugs/issues/2627">#2627</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>timezone-data <a href="http://mm.icann.org/pipermail/tz-announce/2019-September/000057.html">2019c</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.78</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2247.6.0"/>
    <published>2019-11-11T14:11:52+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2247.5.0</id>
    <title>2247.5.0</title>
    <updated>2026-03-09T16:26:31.383617+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2247.5.0">Upstream Container Linux updates</a>:</h2>
<p>No changes for stable promotion</p>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.78</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2247.5.0"/>
    <published>2019-10-17T18:54:06+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2191.5.0</id>
    <title>2191.5.0</title>
    <updated>2026-03-09T16:26:31.379729+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2191.5.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix pam_systemd bug allowing authenticated remote users to perform polkit actions as if locally logged in (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842">CVE-2019-3842</a>)</li>
<li>Fix systemd-resolved bug allowing unprivileged users to change DNS settings (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15718">CVE-2019-15718</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix GCE agent crash loop in new installs (<a href="https://github.com/coreos/bugs/issues/2608">#2608</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/797250/">4.19.68</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.68</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2191.5.0"/>
    <published>2019-09-05T08:52:34+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2191.4.1</id>
    <title>2191.4.1</title>
    <updated>2026-03-09T16:26:31.375699+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2191.4.1">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix wget buffer overflow allowing arbitrary code execution (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953">CVE-2019-5953</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/795843/">4.19.66</a></li>
<li>wget <a href="http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS?h=v1.20.3&amp;id=a220ead43505bc3e0ea8efb1572919111dbbf6dc#n8">1.20.3</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.66</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2191.4.1"/>
    <published>2019-08-30T07:36:13+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2191.4.0</id>
    <title>2191.4.0</title>
    <updated>2026-03-09T16:26:31.371525+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2191.4.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Use secure_getenv to fix a vulnerability around XDG_SEAT in pam_systemd (https://github.com/coreos/systemd/pull/118) (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842">CVE-2019-3842</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/795525/">4.19.65</a></li>
</ul>
<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix wrong key name for fw_cfg in ignition with QEMU (https://github.com/flatcar/ignition/issues/2)</li>
<li>Get SELinux context included in torcx tarballs (https://github.com/flatcar/scripts/pull/16)</li>
<li>Enable XattrPrivileged for untar to fix SELinux issue (https://github.com/flatcar/torcx/pull/1)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Add &quot;-s&quot; flag in flatcar-install to install to smallest disk (https://github.com/flatcar/init/pull/7)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.65</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2191.4.0"/>
    <published>2019-08-16T09:42:56+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2135.6.0</id>
    <title>2135.6.0</title>
    <updated>2026-03-09T16:26:31.367537+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2135.6.0">Upstream Container Linux updates</a>:</h2>
<ul>
<li>intel-microcode <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20190618/releasenote">20190618</a></li>
<li>Linux <a href="https://lwn.net/Articles/792009/">4.19.56</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.56</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2135.6.0"/>
    <published>2019-08-01T09:14:26+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2135.5.0</id>
    <title>2135.5.0</title>
    <updated>2026-03-09T16:26:31.363886+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2135.5.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix Ignition panic when no <code>guestinfo.(coreos|ignition).config</code> parameters are specified on VMware (coreos/ignition#821)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Ignition <a href="https://github.com/coreos/ignition/releases/tag/v0.33.0">0.33.0</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.33.0</li>
<li>kernel 4.19.50</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2135.5.0"/>
    <published>2019-07-03T08:01:54+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2135.4.0</id>
    <title>2135.4.0</title>
    <updated>2026-03-09T16:26:31.360352+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2135.4.0">Upstream Container Linux updates</a>:</h2>
<p>No changes for stable promotion</p>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.32.0</li>
<li>kernel 4.19.50</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2135.4.0"/>
    <published>2019-07-01T10:47:02+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2079.6.0</id>
    <title>2079.6.0</title>
    <updated>2026-03-09T16:26:31.356348+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2079.6.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Linux TCP remotely-triggerable kernel panic and excessive resource consumption (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477">CVE-2019-11477</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478">CVE-2019-11478</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479">CVE-2019-11479</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix invalid bzip2 compression of Container Linux release images (<a href="https://github.com/coreos/bugs/issues/2589">#2589</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.43</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2079.6.0"/>
    <published>2019-06-19T08:15:07+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2079.5.0</id>
    <title>2079.5.0</title>
    <updated>2026-03-09T16:26:31.352414+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2079.5.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix systemd <code>MountFlags=shared</code> option (<a href="https://github.com/coreos/bugs/issues/2579">#2579</a>)</li>
</ul>
<p>Changes:</p>
<ul>
<li>Pin network interface naming to systemd v238 scheme (<a href="https://github.com/coreos/bugs/issues/2578">#2578</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.43</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2079.5.0"/>
    <published>2019-06-06T08:49:52+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2079.4.0</id>
    <title>2079.4.0</title>
    <updated>2026-03-09T16:26:31.348144+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2079.4.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Intel CPU disclosure of memory to user process.  Complete mitigation requires <a href="https://docs.flatcar-linux.org/os/disabling-smt/">manually disabling SMT</a> on affected processors. (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091">CVE-2019-11091</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126">CVE-2018-12126</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127">CVE-2018-12127</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130">CVE-2018-12130</a>, <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html">MDS</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>intel-microcode <a href="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20190514/releasenote">20190514</a></li>
<li>Linux <a href="https://lwn.net/Articles/788388/">4.19.43</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.43</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2079.4.0"/>
    <published>2019-05-16T10:57:17+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2079.3.2</id>
    <title>2079.3.2</title>
    <updated>2026-03-09T16:26:31.344190+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix a regression from the latest hotfix builds, about <a href="https://github.com/flatcar/coreos-overlay/blob/60e44f23a1a5527cfa6bcbc978b1ffdef74e2e3f/coreos-base/coreos-metadata/coreos-metadata-9999.ebuild#L13">CROS_WORKON_COMMIT</a> in <a href="https://github.com/flatcar/coreos-overlay">coreos-overlay</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.34</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2079.3.2"/>
    <published>2019-04-26T07:43:52+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2079.3.1</id>
    <title>2079.3.1</title>
    <updated>2026-03-09T16:26:31.340398+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix a wrong vendor-specific string in <a href="https://github.com/flatcar/afterburn/blob/f4f0adc6a96a1ba77a0f87b612ecdf21782aa8c6/src/main.rs#L60">CMDLINE_OEM_FLAG</a> in <a href="https://github.com/flatcar/afterburn">afterburn</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.34</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2079.3.1"/>
    <published>2019-04-25T10:05:40+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2079.3.0</id>
    <title>2079.3.0</title>
    <updated>2026-03-09T16:26:31.336961+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2079.3.0">Upstream Container Linux updates</a>:</h2>
<p>No changes for stable promotion</p>
<p>Packages:</p>
<ul>
<li>docker 18.06.3</li>
<li>ignition 0.31.0</li>
<li>kernel 4.19.34</li>
<li>rkt 1.30.0</li>
<li>systemd 241</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2079.3.0"/>
    <published>2019-04-24T10:00:10+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2023.5.0</id>
    <title>2023.5.0</title>
    <updated>2026-03-09T16:26:31.333144+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2023.5.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix systemd crash from a specially-crafted D-Bus message (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454">CVE-2019-6454</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix systemd-journald memory leak (<a href="https://github.com/coreos/bugs/issues/2564">#2564</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/780611/">4.19.25</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.30.0</li>
<li>kernel 4.19.25</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2023.5.0"/>
    <published>2019-03-12T14:35:58+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v2023.4.0</id>
    <title>2023.4.0</title>
    <updated>2026-03-09T16:26:31.329399+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v2023.4.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Linux use-after-free in <code>sockfs_setattr</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8912">CVE-2019-8912</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.30.0</li>
<li>kernel 4.19.23</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-2023.4.0"/>
    <published>2019-02-27T08:52:33+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1967.6.0</id>
    <title>1967.6.0</title>
    <updated>2026-03-09T16:26:31.325821+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1967.6.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix kernel POSIX timer rearming (<a href="https://github.com/coreos/bugs/issues/2549">#2549</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.96</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1967.6.0"/>
    <published>2019-02-21T08:40:53+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1967.5.0</id>
    <title>1967.5.0</title>
    <updated>2026-03-09T16:26:31.322230+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1967.5.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix runc container breakout (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736">CVE-2019-5736</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.96</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1967.5.0"/>
    <published>2019-02-14T10:29:38+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1967.4.0</id>
    <title>1967.4.0</title>
    <updated>2026-03-09T16:26:31.318719+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1967.4.0">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/777581/">4.14.96</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.96</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1967.4.0"/>
    <published>2019-01-30T13:45:29+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1967.3.1</id>
    <title>1967.3.1</title>
    <updated>2026-03-09T16:26:31.315084+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1967.3.0">Upstream Container Linux updates</a>:</h2>
<p>No changes for stable promotion</p>
<h2>Flatcar updates</h2>
<p>Changes:</p>
<ul>
<li><a href="https://github.com/flatcar/coreos-overlay/blob/build-1967.3.1/coreos-base/coreos-init/coreos-init-9999.ebuild#L13">Fix the previous update of Flatcar</a> where instead of https://github.com/flatcar/init the upstream coreos-init package was referenced and used accidentally.</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.88</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1967.3.1"/>
    <published>2019-01-28T10:32:57+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1967.3.0</id>
    <title>1967.3.0</title>
    <updated>2026-03-09T16:26:31.311510+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1967.3.0">Upstream Container Linux updates</a>:</h2>
<p>No changes for stable promotion</p>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.88</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1967.3.0"/>
    <published>2019-01-28T11:05:20+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1911.5.0</id>
    <title>1911.5.0</title>
    <updated>2026-03-09T16:26:31.307503+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1911.5.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Go CPU denial of service in X.509 verification (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16875">CVE-2018-16875</a>)</li>
<li>Fix PolicyKit always authorizing UIDs greater than <code>INT_MAX</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19788">CVE-2018-19788</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Go <a href="https://golang.org/doc/devel/release.html#go1.10.minor">1.10.6</a></li>
<li>Go <a href="https://golang.org/doc/devel/release.html#go1.11.minor">1.11.3</a></li>
<li>Linux <a href="https://lwn.net/Articles/773114/">4.14.84</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.84</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1911.5.0"/>
    <published>2018-12-21T09:08:00+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1911.4.0</id>
    <title>1911.4.0</title>
    <updated>2026-03-09T16:26:31.303586+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1911.4.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Disable containerd CRI plugin to stop it from listening on a TCP port (<a href="https://github.com/coreos/bugs/issues/2524">#2524</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/771885/">4.14.81</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.81</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1911.4.0"/>
    <published>2018-11-27T14:54:50+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1911.3.0</id>
    <title>1911.3.0</title>
    <updated>2026-03-09T16:26:31.299678+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1911.3.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix systemd re-executing with arbitrary supplied state (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686">CVE-2018-15686</a>)</li>
<li>Fix systemd race allowing changing file permissions (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687">CVE-2018-15687</a>)</li>
<li>Fix systemd-networkd buffer overflow in the dhcp6 client (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688">CVE-2018-15688</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.28.0</li>
<li>kernel 4.14.78</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1911.3.0"/>
    <published>2018-11-08T16:14:37+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1855.5.0</id>
    <title>1855.5.0</title>
    <updated>2026-03-09T16:26:31.295688+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1855.5.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Git remote code execution during recursive clone (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456">CVE-2018-17456</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Git <a href="https://raw.githubusercontent.com/git/git/v2.16.5/Documentation/RelNotes/2.16.5.txt">2.16.5</a></li>
<li>Linux <a href="https://lwn.net/Articles/767628/">4.14.74</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.26.0</li>
<li>kernel 4.14.74</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1855.5.0"/>
    <published>2018-10-26T10:13:33+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1855.4.2</id>
    <title>1855.4.2</title>
    <updated>2026-03-09T16:26:31.292041+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Changes:</p>
<ul>
<li>Add new image signing subkey to <code>flatcar-install</code> (<a href="https://github.com/flatcar/init/pull/4">flatcar-linux/init#4</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.26.0</li>
<li>kernel 4.14.67</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1855.4.2"/>
    <published>2018-10-11T20:17:03+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1855.4.0</id>
    <title>1855.4.0</title>
    <updated>2026-03-09T16:26:31.288439+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1855.4.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix Docker mounting named volumes (<a href="https://github.com/coreos/bugs/issues/2497">#2497</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.06.1</li>
<li>ignition 0.26.0</li>
<li>kernel 4.14.67</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1855.4.0"/>
    <published>2018-09-14T09:59:47+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1800.7.0</id>
    <title>1800.7.0</title>
    <updated>2026-03-09T16:26:31.284229+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1800.7.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Linux remote denial of service (<a href="https://access.redhat.com/security/cve/cve-2018-5391">FragmentSmack</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391">CVE-2018-5391</a>)</li>
<li>Fix Linux privileged memory access via speculative execution (<a href="https://foreshadowattack.eu/">L1TF/Foreshadow</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620">CVE-2018-3620</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646">CVE-2018-3646</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>intel-microcode <a href="https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File">20180703</a></li>
<li>Linux <a href="https://lwn.net/Articles/762808/">4.14.63</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.25.1</li>
<li>kernel 4.14.63</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1800.7.0"/>
    <published>2018-08-17T12:07:54+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1800.6.0</id>
    <title>1800.6.0</title>
    <updated>2026-03-09T16:26:31.280222+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1800.6.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Linux local denial of service as Xen PV guest (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678">CVE-2018-14678</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix failure to mount large ext4 filesystems (<a href="https://github.com/coreos/bugs/issues/2485">#2485</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.25.1</li>
<li>kernel 4.14.59</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1800.6.0"/>
    <published>2018-08-08T10:49:51+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1800.5.0</id>
    <title>1800.5.0</title>
    <updated>2026-03-09T16:26:31.276376+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1800.5.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix kernel CIFS client (<a href="https://github.com/coreos/bugs/issues/2480">#2480</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/761180/">4.14.59</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.25.1</li>
<li>kernel 4.14.59</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1800.5.0"/>
    <published>2018-07-31T09:16:01+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1800.4.0</id>
    <title>1800.4.0</title>
    <updated>2026-03-09T16:26:31.272864+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1800.4.0">Upstream Container Linux updates</a>:</h2>
<p>No changes for stable promotion</p>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.25.1</li>
<li>kernel 4.14.55</li>
<li>rkt 1.30.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1800.4.0"/>
    <published>2018-07-26T09:38:46+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1745.7.0</id>
    <title>1745.7.0</title>
    <updated>2026-03-09T16:26:31.269232+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1745.7.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix TCP connection stalls (<a href="https://github.com/coreos/bugs/issues/2457">#2457</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.24.1</li>
<li>kernel 4.14.48</li>
<li>rkt 1.29.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1745.7.0"/>
    <published>2018-06-15T14:51:25+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1745.6.0</id>
    <title>1745.6.0</title>
    <updated>2026-03-09T16:26:31.265449+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1745.6.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix Hyper-V network driver regression (<a href="https://github.com/coreos/bugs/issues/2454">#2454</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Linux <a href="https://lwn.net/Articles/756652/">4.14.48</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.24.1</li>
<li>kernel 4.14.48</li>
<li>rkt 1.29.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1745.6.0"/>
    <published>2018-06-13T13:21:16+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1745.5.0</id>
    <title>1745.5.0</title>
    <updated>2026-03-09T16:26:31.261381+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1745.5.0">Upstream Container Linux updates</a>:</h2>
<p>Security fixes:</p>
<ul>
<li>Fix Git arbitrary code execution when cloning untrusted repositories (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235">CVE-2018-11235</a>)</li>
</ul>
<p>Bug fixes:</p>
<ul>
<li>Fix failure to set network interface MTU (<a href="https://github.com/coreos/bugs/issues/2443">#2443</a>)</li>
</ul>
<p>Updates:</p>
<ul>
<li>Git <a href="https://raw.githubusercontent.com/git/git/v2.16.4/Documentation/RelNotes/2.16.4.txt">2.16.4</a></li>
<li>Linux <a href="https://lwn.net/Articles/755717/">4.14.44</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.24.1</li>
<li>kernel 4.14.44</li>
<li>rkt 1.29.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1745.5.0"/>
    <published>2018-06-01T13:23:44+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1745.4.0</id>
    <title>1745.4.0</title>
    <updated>2026-03-09T16:26:31.257538+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1745.4.0">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>Fix inadvertent change of network interface names (<a href="https://github.com/coreos/bugs/issues/2437">#2437</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.24.1</li>
<li>kernel 4.14.42</li>
<li>rkt 1.29.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1745.4.0"/>
    <published>2018-05-27T09:02:48+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1745.3.1</id>
    <title>1745.3.1</title>
    <updated>2026-03-09T16:26:31.253759+00:00</updated>
    <content type="html"><![CDATA[<h2><a href="https://github.com/coreos/manifest/releases/tag/v1745.3.1">Upstream Container Linux updates</a>:</h2>
<p>Updates:</p>
<ul>
<li>Ignition <a href="https://github.com/coreos/ignition/releases/tag/v0.24.1">0.24.1</a></li>
<li>Linux <a href="https://lwn.net/Articles/754972/">4.14.42</a></li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 18.03.1</li>
<li>ignition 0.24.1</li>
<li>kernel 4.14.42</li>
<li>rkt 1.29.0</li>
<li>systemd 238</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1745.3.1"/>
    <published>2018-05-26T15:29:48+00:00</published>
  </entry>
  <entry>
    <id>https://github.com/flatcar/manifest/releases/tag/v1688.5.3</id>
    <title>1688.5.3</title>
    <updated>2026-03-09T16:26:31.248908+00:00</updated>
    <content type="html"><![CDATA[<h2>Flatcar updates</h2>
<p>Initial Flatcar release.</p>
<p>Bug fixes:</p>
<ul>
<li>Fix GRUB crash at boot (<a href="https://github.com/coreos/bugs/issues/2284">#2284</a>)</li>
<li>Fix <a href="https://groups.google.com/forum/#!topic/coreos-user/YcGkRHU9SvQ">poweroff problems</a> (<a href="https://github.com/systemd/systemd/pull/8080">#8080</a>)</li>
</ul>
<p>Notes:</p>
<ul>
<li>Previous test images have been removed from the release servers. This is due to a new update key being generated using our updated security policy which we <a href="https://github.com/flatcar/coreos-overlay/pull/6">included</a> in the first public image.</li>
</ul>
<h2><a href="https://github.com/coreos/manifest/releases/tag/v1688.5.3">Upstream Container Linux updates</a>:</h2>
<p>Bug fixes:</p>
<ul>
<li>~~Avoid GRUB crash at boot (<a href="https://github.com/coreos/bugs/issues/2284">#2284</a>)~~ We've included the <a href="https://github.com/flatcar/grub/commit/8281b03be34552e744fd08aae78b38704e2562b5">real fix for this</a>.</li>
<li>Fix kernel panic with vxlan (<a href="https://github.com/coreos/bugs/issues/2382">#2382</a>)</li>
</ul>
<p>Packages:</p>
<ul>
<li>docker 17.12.1</li>
<li>ignition 0.22.0</li>
<li>kernel 4.14.32</li>
<li>rkt 1.29.0</li>
<li>systemd 237</li>
</ul>
<p>Architectures:</p>
<ul>
<li>amd64</li>
</ul>
]]></content>
    <link href="https://www.flatcar.org/releases/#release-1688.5.3"/>
    <published>2018-04-25T14:36:41+00:00</published>
  </entry>
</feed>

