{
  "1722.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-04-25 14:36:40 +0000",
    "major_software": {
      "docker": [
        "17.12.1"
      ],
      "ignition": [
        "0.23.0"
      ],
      "kernel": [
        "4.14.30"
      ],
      "rkt": [
        "1.29.0"
      ],
      "systemd": [
        "237"
      ]
    },
    "release_notes": "## Flatcar updates\n\nInitial Flatcar release.\n\nBug fixes:\n- Fix GRUB crash at boot ([#2284](https://github.com/coreos/bugs/issues/2284))\n- Fix [poweroff problems](https://groups.google.com/forum/#!topic/coreos-user/YcGkRHU9SvQ) ([#8080](https://github.com/systemd/systemd/pull/8080))\n\nNotes:\n- Previous test images have been removed from the release servers. This is due to a new update key being generated using our updated security policy which we [included](https://github.com/flatcar/coreos-overlay/pull/6) in the first public image.\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1722.2.0):\n\nBug fixes:\n- Fix kernel panic with vxlan ([#2382](https://github.com/coreos/bugs/issues/2382))"
  },
  "1745.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-04-26 09:58:55 +0000",
    "major_software": {
      "docker": [
        "18.03.0"
      ],
      "ignition": [
        "0.24.0"
      ],
      "kernel": [
        "4.14.35"
      ],
      "rkt": [
        "1.29.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.1.0):\n\nBug fixes:\n - Fix docker2aci tar conversion ([#2402](https://github.com/coreos/bugs/issues/2402))\n\nChanges:\n - Switch to the LTS Linux version [4.14.35](https://lwn.net/Articles/752328/) for the beta channel"
  },
  "1745.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-05-11 11:40:35 +0000",
    "major_software": {
      "docker": [
        "18.03.1"
      ],
      "ignition": [
        "0.24.0"
      ],
      "kernel": [
        "4.14.39"
      ],
      "rkt": [
        "1.29.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.2.0):\n\nSecurity fixes:\n - Fix ntp clock manipulation from ephemeral connections ([CVE-2016-1549](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549), [CVE-2018-7170](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170))\n - Fix ntp denial of service from out of bounds read ([CVE-2018-7182](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182)) \n -  Fix ntp denial of service from packets with timestamp 0 ([CVE-2018-7184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7184), [CVE-2018-7185](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185))\n - Fix ntp remote code execution ([CVE-2018-7183](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183))\n\nUpdates:\n - containerd [1.0.3](https://github.com/containerd/containerd/releases/tag/v1.0.3)\n - Docker [18.03.1-ce](https://github.com/docker/docker-ce/releases/tag/v18.03.1-ce)\n - Linux [4.14.39](https://lwn.net/Articles/753349/)\n - ntp [4.2.8p11](https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ChangeLog-stable)\n"
  },
  "1772.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-05-26 15:29:49 +0000",
    "major_software": {
      "docker": [
        "18.03.1"
      ],
      "ignition": [
        "0.24.1"
      ],
      "kernel": [
        "4.14.42"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1772.1.1):\n\nChanges:\n- Switch to the LTS Docker version [18.03.1-ce](https://github.com/docker/docker-ce/releases/tag/v18.03.1-ce) for the beta channel\n- Switch to the LTS Linux version [4.14.42](https://lwn.net/Articles/754972/) for the beta channel\n\nUpdates:\n- Ignition [0.24.1](https://github.com/coreos/ignition/releases/tag/v0.24.1)"
  },
  "1772.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-06-01 13:23:43 +0000",
    "major_software": {
      "docker": [
        "18.03.1"
      ],
      "ignition": [
        "0.24.1"
      ],
      "kernel": [
        "4.14.47"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1772.2.0):\n\nSecurity fixes:\n- Fix Git arbitrary code execution when cloning untrusted repositories ([CVE-2018-11235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235))\n\nBug fixes:\n- Fix inadvertent change of network interface names ([#2437](https://github.com/coreos/bugs/issues/2437))\n- Fix failure to set network interface MTU ([#2443](https://github.com/coreos/bugs/issues/2443))\n\nUpdates:\n- Git [2.16.4](https://raw.githubusercontent.com/git/git/v2.16.4/Documentation/RelNotes/2.16.4.txt)\n- Linux [4.14.47](https://lwn.net/Articles/756055/)"
  },
  "1772.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-06-13 13:22:40 +0000",
    "major_software": {
      "docker": [
        "18.03.1"
      ],
      "ignition": [
        "0.24.1"
      ],
      "kernel": [
        "4.14.48"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1772.3.0):\n\nBug fixes:\n- Fix Hyper-V network driver regression ([#2454](https://github.com/coreos/bugs/issues/2454))\n\nUpdates:\n- Linux [4.14.48](https://lwn.net/Articles/756652/)"
  },
  "1772.4.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-06-15 14:51:22 +0000",
    "major_software": {
      "docker": [
        "18.03.1"
      ],
      "ignition": [
        "0.24.1"
      ],
      "kernel": [
        "4.14.49"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1772.4.0):\n\nBug fixes:\n- Fix TCP connection stalls ([#2457](https://github.com/coreos/bugs/issues/2457))\n\nUpdates:\n- Linux [4.14.49](https://lwn.net/Articles/757308/)"
  },
  "1800.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-06-22 10:17:31 +0000",
    "major_software": {
      "docker": [
        "18.03.1"
      ],
      "ignition": [
        "0.25.1"
      ],
      "kernel": [
        "4.14.50"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1800.2.0):\n\nChanges:\n- Switch to the LTS Docker version [18.03.1-ce](https://github.com/docker/docker-ce/releases/tag/v18.03.1-ce) for the beta channel\n- Switch to the LTS Linux version [4.14.50](https://lwn.net/Articles/757680/) for the beta channel"
  },
  "1800.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-07-13 15:43:19 +0000",
    "major_software": {
      "docker": [
        "18.03.1"
      ],
      "ignition": [
        "0.25.1"
      ],
      "kernel": [
        "4.14.55"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1800.3.0):\n\nUpdates:\n- Linux [4.14.55](https://lwn.net/Articles/759535/)"
  },
  "1828.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-07-26 09:40:11 +0000",
    "major_software": {
      "docker": [
        "18.03.1"
      ],
      "ignition": [
        "0.26.0"
      ],
      "kernel": [
        "4.14.57"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1828.1.0):\n\nChanges:\n- Switch to the LTS Docker version [18.03.1-ce](https://github.com/docker/docker-ce/releases/tag/v18.03.1-ce) for the beta channel\n- Switch to the LTS Linux version [4.14.57](https://lwn.net/Articles/760500/) for the beta channel\n"
  },
  "1828.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-07-31 09:16:00 +0000",
    "major_software": {
      "docker": [
        "18.03.1"
      ],
      "ignition": [
        "0.26.0"
      ],
      "kernel": [
        "4.14.59"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1828.2.0):\n\nBug fixes:\n- Fix kernel CIFS client ([#2480](https://github.com/coreos/bugs/issues/2480))\n\nUpdates:\n- Linux [4.14.59](https://lwn.net/Articles/761180/)"
  },
  "1828.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-08-08 10:49:50 +0000",
    "major_software": {
      "docker": [
        "18.03.1"
      ],
      "ignition": [
        "0.26.0"
      ],
      "kernel": [
        "4.14.60"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1828.3.0):\n\nSecurity fixes:\n- Fix Linux local denial of service as Xen PV guest ([CVE-2018-14678](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678))\n\nBug fixes:\n- Fix failure to mount large ext4 filesystems ([#2485](https://github.com/coreos/bugs/issues/2485))\n\nUpdates:\n- Linux [4.14.60](https://lwn.net/Articles/761767/)"
  },
  "1855.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-08-17 12:09:29 +0000",
    "major_software": {
      "docker": [
        "18.06.0"
      ],
      "ignition": [
        "0.26.0"
      ],
      "kernel": [
        "4.14.63"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1855.2.0):\n\nSecurity fixes:\n- Fix Linux remote denial of service ([FragmentSmack](https://access.redhat.com/security/cve/cve-2018-5391), [CVE-2018-5391](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391))\n- Fix Linux privileged memory access via speculative execution ([L1TF/Foreshadow](https://foreshadowattack.eu/), [CVE-2018-3620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620), [CVE-2018-3646](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646))\n\nBug fixes:\n- Fix PXE systems attempting to mount an ESP ([#2491](https://github.com/coreos/bugs/issues/2491))\n\nChanges:\n- Switch to the LTS Linux version [4.14.63](https://lwn.net/Articles/762808/) for the beta channel"
  },
  "1855.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-09-05 08:43:19 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.26.0"
      ],
      "kernel": [
        "4.14.67"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1855.3.0):\n\nChanges:\n- Drop AWS PV images from regions which do not support PV\n\nUpdates:\n- containerd [1.1.2](https://github.com/containerd/containerd/releases/tag/v1.1.2)\n- Docker [18.06.1-ce](https://github.com/docker/docker-ce/releases/tag/v18.06.1-ce)\n- intel-microcode [20180807a](https://downloadcenter.intel.com/download/28087/Linux-Processor-Microcode-Data-File)\n- Linux [4.14.67](https://lwn.net/Articles/763433/)"
  },
  "1883.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-09-14 09:59:48 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.28.0"
      ],
      "kernel": [
        "4.14.69"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1883.1.0):\n\nBug fixes:\n- Fix Docker mounting named volumes ([#2497](https://github.com/coreos/bugs/issues/2497))\n\nChanges:\n- Switch to the LTS Linux version [4.14.69](https://lwn.net/Articles/764513/) for the beta channel\n\nUpdates:\n- intel-microcode [20180807a](https://downloadcenter.intel.com/download/28087)"
  },
  "1911.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-10-11 13:18:49 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.28.0"
      ],
      "kernel": [
        "4.14.74"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## Flatcar updates\n\nChanges:\n\n* Add new image signing subkey to `flatcar-install` ([flatcar-linux/init#4](https://github.com/flatcar/init/pull/4))\n\nBug fixes:\n\n* Fix `/usr/lib/coreos` symlink for Container Linux compatibility ([flatcar-linux/coreos-overlay#8](https://github.com/flatcar/coreos-overlay/pull/8))\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1911.1.1):\n\nChanges:\n- Switch to the LTS Linux version [4.14.74](https://lwn.net/Articles/767628/) for the beta channel\n"
  },
  "1911.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-10-26 10:14:36 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.28.0"
      ],
      "kernel": [
        "4.14.78"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1911.2.0):\n\nSecurity fixes:\n- Fix Git remote code execution during recursive clone ([CVE-2018-17456](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456))\n\nBug fixes:\n- Fix missing kernel headers ([#2505](https://github.com/coreos/bugs/issues/2505))\n\nUpdates:\n- Git [2.16.5](https://raw.githubusercontent.com/git/git/v2.16.5/Documentation/RelNotes/2.16.5.txt)\n- Linux [4.14.78](https://lwn.net/Articles/769051/)"
  },
  "1939.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-11-08 16:14:38 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.28.0"
      ],
      "kernel": [
        "4.14.79"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1939.1.0):\n\nSecurity fixes:\n- Fix systemd re-executing with arbitrary supplied state ([CVE-2018-15686](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686))\n- Fix systemd race allowing changing file permissions ([CVE-2018-15687](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687))\n- Fix systemd-networkd buffer overflow in the dhcp6 client ([CVE-2018-15688](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688))\n\nChanges:\n- Switch to the LTS Linux version [4.14.79](https://lwn.net/Articles/770749/) for the beta channel"
  },
  "1939.2.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-11-21 10:57:13 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.28.0"
      ],
      "kernel": [
        "4.14.81"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1939.2.1):\n\nSecurity fixes:\n- Disable containerd CRI plugin to stop it from listening on a TCP port ([#2524](https://github.com/coreos/bugs/issues/2524))\n\nUpdates:\n- Linux [4.14.81](https://lwn.net/Articles/771885/)"
  },
  "1967.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-12-06 09:43:43 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.28.0"
      ],
      "kernel": [
        "4.14.84"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.1.0):\n\nChanges:\n - Switch to the LTS Linux version [4.14.84](https://lwn.net/Articles/773114/) for the beta channel"
  },
  "1967.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2018-12-21 09:08:43 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.28.0"
      ],
      "kernel": [
        "4.14.88"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.2.0):\n\nSecurity fixes:\n- Fix Go CPU denial of service in X.509 verification ([CVE-2018-16875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16875))\n- Fix PolicyKit always authorizing UIDs greater than `INT_MAX` ([CVE-2018-19788](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19788))\n\nUpdates:\n- Go [1.10.6](https://golang.org/doc/devel/release.html#go1.10.minor)\n- Go [1.11.3](https://golang.org/doc/devel/release.html#go1.11.minor)\n- Linux [4.14.88](https://lwn.net/Articles/774848/)"
  },
  "1995.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-01-18 09:10:26 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.29.1"
      ],
      "kernel": [
        "4.19.13"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1995.1.0):\n\nUpdates:\n- Linux [4.19.13](https://lwn.net/Articles/775720/)"
  },
  "2023.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-01-30 13:45:28 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.30.0"
      ],
      "kernel": [
        "4.19.18"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2023.1.0):\n\nSecurity fixes:\n- Fix Go CPU denial of service in ECC ([CVE-2019-6486](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6486))\n\nUpdates:\n- Go [1.10.8](https://golang.org/doc/devel/release.html#go1.10.minor)\n- Go [1.11.5](https://golang.org/doc/devel/release.html#go1.11.minor)\n- Linux [4.19.18](https://lwn.net/Articles/777580/)"
  },
  "2023.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-02-14 10:31:00 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.30.0"
      ],
      "kernel": [
        "4.19.20"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2023.2.0):\nSecurity fixes:\n - Fix runc container breakout ([CVE-2019-5736](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736))\n\nChanges:\n - Revert `/sys/bus/rbd/add` to Linux 4.14 behavior ([#2544](https://github.com/coreos/bugs/issues/2544))\n\nUpdates:\n - etcd [3.3.12](https://github.com/etcd-io/etcd/releases/tag/v3.3.12)\n - etcdctl [3.3.12](https://github.com/etcd-io/etcd/releases/tag/v3.3.12)\n - Linux [4.19.20](https://lwn.net/Articles/779132/)\n"
  },
  "2023.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-02-21 08:41:36 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.30.0"
      ],
      "kernel": [
        "4.19.23"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2023.3.0):\n\nUpdates:\n- Linux [4.19.23](https://lwn.net/Articles/779940/)"
  },
  "2051.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-02-27 08:53:46 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.30.0"
      ],
      "kernel": [
        "4.19.25"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2051.1.0):\n\nSecurity fixes:\n- Fix Linux use-after-free in `sockfs_setattr` ([CVE-2019-8912](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8912))\n- Fix systemd crash from a specially-crafted D-Bus message ([CVE-2019-6454](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454))\n\nUpdates:\n- Linux [4.19.25](https://lwn.net/Articles/780611/)"
  },
  "2051.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-03-12 14:37:08 +0000",
    "major_software": {
      "docker": [
        "18.06.1"
      ],
      "ignition": [
        "0.30.0"
      ],
      "kernel": [
        "4.19.28"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "238"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2051.2.0):\n\nBug fixes:\n- Fix systemd-journald memory leak ([#2564](https://github.com/coreos/bugs/issues/2564))\n\nUpdates:\n- Linux [4.19.28](https://lwn.net/Articles/782719/)"
  },
  "2079.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-03-26 13:08:57 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.31.0"
      ],
      "kernel": [
        "4.19.31"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2079.1.0):\n\nBug fixes:\n- Fix systemd presets incorrectly handling escaped unit names ([#2569](https://github.com/coreos/bugs/issues/2569))\n\nUpdates:\n- Linux [4.19.31](https://lwn.net/Articles/783858/)\n"
  },
  "2079.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-04-17 07:53:14 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.31.0"
      ],
      "kernel": [
        "4.19.34"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2079.2.0):\n\nBug fixes:\n- Disable new sticky directory protections for backwards compatibility ([#2577](https://github.com/coreos/bugs/issues/2577))\n\nChanges:\n- Enable `atlantic` kernel module ([#2576](https://github.com/coreos/bugs/issues/2576))\n\nUpdates:\n- Linux [4.19.34](https://lwn.net/Articles/786050/)"
  },
  "2107.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-04-24 10:01:19 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.31.0"
      ],
      "kernel": [
        "4.19.36"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2107.1.0):\n\nBug fixes:\n - Disable new sticky directory protections for backward compatibility ([#2577](https://github.com/coreos/bugs/issues/2577))\n\nChanges:\n - Enable `atlantic` kernel module ([#2576](https://github.com/coreos/bugs/issues/2576))\n\nUpdates:\n - Linux [4.19.36](https://lwn.net/Articles/786361/)"
  },
  "2107.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-05-08 07:07:32 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.31.0"
      ],
      "kernel": [
        "4.19.36"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2107.2.0):\n\nBug fixes:\n\n- Fix systemd `MountFlags=shared` option ([#2579](https://github.com/coreos/bugs/issues/2579))\n\nChanges:\n\n- Pin network interface naming to systemd v238 scheme ([#2578](https://github.com/coreos/bugs/issues/2578))"
  },
  "2107.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-05-16 10:57:15 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.31.0"
      ],
      "kernel": [
        "4.19.43"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2107.3.0):\n\nSecurity fixes:\n- Fix Intel CPU disclosure of memory to user process.  Complete mitigation requires [manually disabling SMT](https://docs.flatcar-linux.org/os/disabling-smt/) on affected processors. ([CVE-2019-11091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091), [CVE-2018-12126](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126), [CVE-2018-12127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127), [CVE-2018-12130](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130), [MDS](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html))\n\nUpdates:\n- intel-microcode [20190514](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20190514/releasenote)\n- Linux [4.19.43](https://lwn.net/Articles/788388/)"
  },
  "2135.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-05-21 20:28:25 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.32.0"
      ],
      "kernel": [
        "4.19.44"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2135.2.0):\n\nUpdates:\n- Linux [4.19.44](https://lwn.net/Articles/788778/)"
  },
  "2135.3.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-06-19 08:16:10 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.32.0"
      ],
      "kernel": [
        "4.19.50"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2135.3.1):\n\nSecurity fixes:\n\n- Fix Linux TCP remotely-triggerable kernel panic and excessive resource consumption ([CVE-2019-11477](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477), [CVE-2019-11478](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478), [CVE-2019-11479](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479))\n\nBug fixes:\n\n- Fix invalid bzip2 compression of Container Linux release images ([#2589](https://github.com/coreos/bugs/issues/2589))\n\nUpdates:\n\n- Linux [4.19.50](https://lwn.net/Articles/790878/)"
  },
  "2163.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-07-01 10:45:57 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.32.0"
      ],
      "kernel": [
        "4.19.55"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2163.3.0):\n\nUpdates:\n\n- Linux [4.19.53](https://lwn.net/Articles/791468/)\n"
  },
  "2163.4.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-07-03 08:02:30 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.55"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2163.4.0):\n\nBug fixes:\n\n * Fix Ignition panic when no `guestinfo.(coreos|ignition).config` parameters are specified on VMware (coreos/ignition#821)\n\nUpdates:\n\n * Ignition [0.33.0](https://github.com/coreos/ignition/releases/tag/v0.33.0)"
  },
  "2191.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-07-17 13:51:51 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.56"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2191.1.0):\n\nNo changes for beta promotion"
  },
  "2191.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-08-01 09:15:48 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.62"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2191.2.0):\n- Linux [4.19.62](https://lwn.net/Articles/794807/)"
  },
  "2191.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-08-08 08:18:09 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.65"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2191.3.0):\n\nSecurity fixes:\n- Fix Linux information leak attack vector via speculative side channel ([CVE-2019-1125](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125))\n\nUpdates:\n- Linux [4.19.65](https://lwn.net/Articles/795525/)\n\n## Flatcar updates\n\nChanges:\n- Add \"-s\" flag in flatcar-install to install to smallest disk (https://github.com/flatcar/init/pull/7)"
  },
  "2219.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-08-16 09:44:16 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.65"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2219.2.0):\n\nSecurity fixes:\n- Use secure_getenv to fix a vulnerability around XDG_SEAT in pam_systemd (https://github.com/coreos/systemd/pull/118) ([CVE-2019-3842](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842))\n\nUpdates:\n- Linux [4.19.65](https://lwn.net/Articles/795525/)\n\n## Flatcar updates\n\nBug fixes:\n- Fix wrong key name for fw_cfg in ignition with QEMU (https://github.com/flatcar/ignition/issues/2)\n- Get SELinux context included in torcx tarballs (https://github.com/flatcar/scripts/pull/16)\n- Enable XattrPrivileged for untar to fix SELinux issue (https://github.com/flatcar/torcx/pull/1)\n"
  },
  "2219.2.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-08-30 07:37:15 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.68"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2219.2.1):\n\nSecurity fixes:\n- Fix wget buffer overflow allowing arbitrary code execution ([CVE-2019-5953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953))\n\nUpdates:\n- Linux [4.19.68](https://lwn.net/Articles/797250/)\n- wget [1.20.3](http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS?h=v1.20.3&id=a220ead43505bc3e0ea8efb1572919111dbbf6dc#n8)"
  },
  "2219.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-09-05 08:53:14 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.69"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2219.3.0):\n\nSecurity fixes:\n\n- Fix pam_systemd bug allowing authenticated remote users to perform polkit actions as if locally logged in ([CVE-2019-3842](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842))\n- Fix systemd-resolved bug allowing unprivileged users to change DNS settings ([CVE-2019-15718](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15718))\n\nBug fixes:\n\n- Fix GCE agent crash loop in new installs ([#2608](https://github.com/coreos/bugs/issues/2608))\n\nUpdates:\n\n- Linux [4.19.69](https://lwn.net/Articles/797815/)"
  },
  "2247.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-09-13 10:53:37 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.71"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2247.2.0):\n\nUpdates:\n\n- Linux [4.19.71](https://lwn.net/Articles/798627/)\n"
  },
  "2247.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-09-25 09:32:22 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.75"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2247.3.0):\n\nSecurity fixes:\n\n- Fix kernel KVM guest escape ([CVE-2019-14835](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835))\n- Fix race condition in Intel microprocessors ([CVE-2019-11184](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11184))\n\nUpdates:\n\n- intel-microcode [20190918](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20190918/releasenote)\n- Linux [4.19.75](https://lwn.net/Articles/800247/)"
  },
  "2247.4.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-10-16 15:09:03 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.78"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2247.4.0):\n\nBug fixes:\n- Fix kernel crash with CephFS mounts, introduced in 2247.3.0 ([#2616](https://github.com/coreos/bugs/issues/2616))\n\nUpdates:\n- Linux [4.19.78](https://lwn.net/Articles/801700/)"
  },
  "2275.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-10-17 18:54:07 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.79"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2275.2.0):\n\nUpdates:\n- Linux [4.19.79](https://lwn.net/Articles/802169/)"
  },
  "2303.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-11-11 14:13:02 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.81"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2303.1.1):\n\nBug fixes:\n\n- Fix time zone for Brazil ([#2627](https://github.com/coreos/bugs/issues/2627))\n\nUpdates:\n\n- Linux [4.19.81](https://lwn.net/Articles/803384/)\n- timezone-data [2019c](http://mm.icann.org/pipermail/tz-announce/2019-September/000057.html)"
  },
  "2303.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-11-21 09:28:13 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.84"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2303.2.0):\n\nSecurity fixes:\n\n- Fix Intel CPU disclosure of memory to user process. Complete mitigation requires [manually disabling TSX or SMT](https://docs.flatcar-linux.org/os/disabling-smt/) on affected processors. ([CVE-2019-11135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135), [TAA](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html))\n- Fix Intel CPU denial of service by a malicious guest VM ([CVE-2018-12207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207))\n\nBug fixes:\n\n- Fix CFS scheduler throttling highly-threaded I/O-bound applications ([#2623](https://github.com/coreos/bugs/issues/2623))\n\nUpdates:\n\n- intel-microcode [20191115](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20191115/releasenote)\n- Linux [4.19.84](https://lwn.net/Articles/804465/)"
  },
  "2331.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-12-05 06:34:11 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.87"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2331.1.0):\n\nUpdates:\n  - Linux [4.19.87](https://lwn.net/Articles/805923/)"
  },
  "2331.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2019-12-18 09:49:53 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.87"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## Flatcar updates\n\nBug fixes:\n\n- Fix a bug when creating RAID0 arrays by setting the default layout (https://github.com/flatcar/baselayout/pull/2)\n- Fix bug of unpacking tarballs failing when xattr is not supported (https://github.com/flatcar/torcx/pull/2)\n\nUpdates:\n\n- ldb [1.3.6](https://gitlab.com/samba-team/samba/-/tags/ldb-1.3.6)\n- samba [4.8.6](https://gitlab.com/samba-team/samba/-/tags/samba-4.8.6)\n- talloc [2.1.11](https://gitlab.com/samba-team/samba/-/tags/talloc-2.1.11)\n- tdb [1.3.15](https://gitlab.com/samba-team/samba/-/tags/tdb-1.3.15)\n- tevent [0.9.37](https://gitlab.com/samba-team/samba/-/tags/tevent-0.9.37)"
  },
  "2345.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-01-17 13:33:11 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.95"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2345.1.0):\n\nSecurity fixes:\n\n- Fix multiple Git [vulnerabilities](https://marc.info/?l=git&m=157600115215285&w=2) ([CVE-2019-1348](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348), [CVE-2019-1349](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349), [CVE-2019-1350](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350), [CVE-2019-1351](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351), [CVE-2019-1352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352), [CVE-2019-1353](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353), [CVE-2019-1354](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354), [CVE-2019-1387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387), [CVE-2019-19604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604))\n\nUpdates:\n\n- Git [2.24.1](https://github.com/git/git/blob/master/Documentation/RelNotes/2.24.1.txt)\n- Linux [4.19.95](https://lwn.net/Articles/809258/)\n"
  },
  "2345.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-02-10 11:11:29 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.33.0"
      ],
      "kernel": [
        "4.19.102"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## Flatcar updates\n\nBug fixes:\n- Fix DNS resolution for the GCE metadata server (https://github.com/flatcar/coreos-overlay/pull/160)\n- Create symlink for /run/metadata/coreos (https://github.com/flatcar/coreos-overlay/pull/166)\n- Create symlink for flatcar-install (https://github.com/flatcar/init/pull/14)\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2345.2.0):\n\nSecurity fixes:\n- Fix systemd use-after-free upon receiving crafted D-Bus message from local unprivileged attacker ([CVE-2020-1712](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712))\n\nChanges:\n- Enable `qede` kernel module\n\nUpdates:\n- Linux [4.19.102](https://lwn.net/Articles/811638/)"
  },
  "2411.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-03-02 11:57:48 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "4.19.106"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## Flatcar updates\nBug fixes:\n- Enable persistent network interface names already in the initramfs to fix https://github.com/coreos/bugs/issues/1767\n- Fix backwards compatibility issues for users to migrate from CoreOS Container Linux. Support the kernel command line parameters `coreos.oem.*`, `coreos.autologin`, `coreos.first_boot`, and the QEMU firmware config path `opt/com.coreos/config` (https://github.com/flatcar/Flatcar/issues/16 https://github.com/flatcar/afterburn/pull/7 https://github.com/flatcar/bootengine/pull/7 https://github.com/flatcar/bootengine/pull/8 https://github.com/flatcar/init/pull/16 https://github.com/flatcar/init/pull/17 https://github.com/flatcar/ignition/pull/8)\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2411.1.0)\nUpdates:\n- Linux [4.19.106](https://lwn.net/Articles/813157/)\n"
  },
  "2411.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-03-31 16:25:22 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "4.19.112"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## Flatcar updates\n\nBug fixes:\n\n- Use newest network interface naming scheme (https://github.com/flatcar/Flatcar/issues/36)\n  - It is a possible breaking change for some persistent network interface names\n- Fix URL scheme in emerge-gitclone (https://github.com/flatcar/coreos-overlay/issues/223)\n- Fix coreos-cloudinit variable names (https://github.com/flatcar/coreos-overlay/pull/206)\n- Prefer /boot/coreos to write updates (https://github.com/flatcar/update_engine/pull/2)\n- Remove /boot/coreos/first_boot after a Ignition rerun on migration (https://github.com/flatcar/bootengine/pull/10)\n- Support coreos.config.url as kernel command line parameter for Ignition (https://github.com/flatcar/ignition/pull/10)\n\nChanges:\n\n- Add kernel config for QEDE driver (https://github.com/flatcar/coreos-overlay/pull/198)\n- Add `tracepath` alongside `traceroute6` (https://github.com/flatcar/Flatcar/issues/50)\n\nUpdates:\n\n- Linux [4.19.112](https://lwn.net/Articles/815677/)"
  },
  "2512.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-05-26 16:58:31 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "4.19.124"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## Flatcar updates\n\nSecurity fixes:\n- Fix e2fsprogs arbitrary code execution via crafted filesystem ([CVE-2019-5094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094))\n- Fix Git arbitrary path overwrite, credential leak from credential helpers, remote code execution in recursive clones, and arbitrary command execution via submodules ([CVE-2019-1348](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348), [CVE-2019-1387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387), [CVE-2019-19604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604), [CVE-2020-11008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11008), [CVE-2020-5260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5260))\n- Fix libarchive crash or use-after-free via crafted RAR file ([CVE-2019-18408](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18408), [CVE-2020-9308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9308))\n- Fix libgcrypt ECDSA timing attack ([CVE-2019-13627](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627))\n- Fix libidn2 domain impersonation ([CVE-2019-12290](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290))\n- Fix NSS crashes and heap corruption ([CVE-2017-11695](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695), [CVE-2017-11696](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696), [CVE-2017-11697](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697), [CVE-2017-11698](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698), [CVE-2018-18508](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508), [CVE-2019-11745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745))\n- Fix OpenSSL overflow in Montgomery squaring procedure ([CVE-2019-1551](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551))\n- Fix SQLite crash and heap corruption ([CVE-2019-16168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168), [CVE-2019-5827](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827))\n- Fix unzip heap overflow or excessive resource consumption via crafted archive ([CVE-2018-1000035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035), [CVE-2019-13232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13232))\n- Fix vim arbitrary command execution via crafted file ([CVE-2019-12735](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735))\n\nBug fixes:\n- When writing the update kernel, prefer `/boot/coreos` only if `/boot/coreos/vmlinux-*` exists (https://github.com/flatcar/update_engine/pull/5)\n- Fixed sysroot-boot initramfs service race which resulted in a warning that this service failed\n- Use the correct `BINHOST` URLs in the development container to download binary packages\n\nChanges:\n- Support the CoreOS GRUB `/boot/coreos/first_boot` flag file (https://github.com/flatcar/bootengine/pull/13)\n- Fetch container images in docker format rather than ACI by default in `etcd-member.service`, `flanneld.service`, and `kubelet-wrapper`\n- Use `flatcar.autologin` kernel command line parameter on Azure and VMware for auto login on the serial console\n- Include `conntrack` ([conntrack-tools](http://conntrack-tools.netfilter.org/))\n- Include `journalctl` output, `pstore` kernel crash logs, and `coredumpctl list` output in the `mayday` report\n- Update wa-linux-agent to 2.2.46 on Azure\n- Support both `coreos.config.*` and `flatcar.config.*` guestinfo variables on VMware OEM\n\nUpdates:\n- e2fsprogs [1.45.5](http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.45.5)\n- etcd [3.3.20](https://github.com/etcd-io/etcd/releases/tag/v3.3.20)\n- etcdctl [3.3.20](https://github.com/etcd-io/etcd/releases/tag/v3.3.20)\n- Git [2.24.1](https://raw.githubusercontent.com/git/git/v2.24.1/Documentation/RelNotes/2.24.1.txt)\n- Linux [4.19.124](https://lwn.net/Articles/820974/)\n- OpenSSL [1.0.2u](https://www.openssl.org/news/openssl-1.0.2-notes.html)\n- vim [8.2.0360](http://ftp.vim.org/pub/vim/patches/8.2/README)\n"
  },
  "2512.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-06-17 15:46:09 +0000",
    "major_software": {
      "docker": [
        "18.06.3"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "4.19.128"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "241"
      ]
    },
    "release_notes": "## Flatcar updates\n\nSecurity fixes:\n- Fix the Intel Microcode vulnerabilities ([CVE-2020-0543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543))\n\nChanges:\n- A source code and licensing overview is available under `/usr/share/licenses/INFO`\n\nUpdates:\n- Linux [4.19.128](https://lwn.net/Articles/822841/)\n- intel-microcode [20200609](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20200609)"
  },
  "2513.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-07-23 09:44:10 +0000",
    "major_software": {
      "docker": [
        "19.03.11"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.52"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "243"
      ]
    },
    "release_notes": "Changes since the Alpha release 2513.1.0\n\nBug Fixes:\n- The [static IP address configuration in the initramfs](https://docs.flatcar-linux.org/ignition/network-configuration/#using-static-ip-addresses-with-ignition) works again in the format `ip=<ip>::<gateway>:<netmask>:<hostname>:<iface>:none[:<dns1>[:<dns2>]]` https://github.com/flatcar/bootengine/pull/15\n\n\nUpdates:\n- Linux [5.4.52](https://lwn.net/Articles/826291/)\n"
  },
  "2513.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-08-20 21:46:48 +0000",
    "major_software": {
      "docker": [
        "19.03.11"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.59"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "243"
      ]
    },
    "release_notes": "Security fixes:\n\n* Bind: fixes for [CVE-2020-8616](https://nvd.nist.gov/vuln/detail/CVE-2020-8616), [CVE-2020-8617](https://nvd.nist.gov/vuln/detail/CVE-2020-8617), [CVE-2020-8620](https://nvd.nist.gov/vuln/detail/CVE-2020-8620), [CVE-2020-8621](https://nvd.nist.gov/vuln/detail/CVE-2020-8621), [CVE-2020-8622](https://nvd.nist.gov/vuln/detail/CVE-2020-8622), [CVE-2020-8623](https://nvd.nist.gov/vuln/detail/CVE-2020-8623), [CVE-2020-8624](https://nvd.nist.gov/vuln/detail/CVE-2020-8624)\n\nBug fixes:\n\n* etcd-wrapper: Adjust data dir permissions ([flatcar-linux/coreos-overlay#536](https://github.com/flatcar/coreos-overlay/pull/536))\n\nUpdates:\n\n* Linux [5.4.59](https://lwn.net/Articles/829106/)\n* bind-tools [9.11.22](https://ftp.isc.org/isc/bind9/cur/9.11/RELEASE-NOTES-bind-9.11.22.txt)\n* etcd-wrapper [3.3.24](https://github.com/etcd-io/etcd/releases/tag/v3.3.24)\n"
  },
  "2605.2.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-09-03 12:48:56 +0000",
    "major_software": {
      "docker": [
        "19.03.12"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.61"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "245"
      ]
    },
    "release_notes": "Changes from Alpha release 2605.1.0\n\nChanges:\n- Update public key to include [new subkey](https://github.com/flatcar/init/pull/25)"
  },
  "2605.3.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-09-07 15:37:41 +0000",
    "major_software": {
      "docker": [
        "19.03.12"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.62"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "245"
      ]
    },
    "release_notes": "Security fixes:\n- Linux kernel: Fix AF_PACKET overflow in tpacket_rcv [CVE-2020-14386](https://seclists.org/oss-sec/2020/q3/146)\n\nUpdates:\n- Linux [5.4.62](https://lwn.net/Articles/830502/)"
  },
  "2605.4.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-09-16 06:13:42 +0000",
    "major_software": {
      "docker": [
        "19.03.12"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.65"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "245"
      ]
    },
    "release_notes": "Bug fixes:\n\n- Fix resetting of DNS nameservers in systemd-networkd units ([PR#12](https://github.com/flatcar/systemd/pull/12))\n\nChanges:\n\n- Disable TX checksum offloading for the IP-in-IP tunl0 interface used by Calico ([PR#26](https://github.com/flatcar/init/pull/26)). This is a workaround for a Mellanox driver issue, currently tracked in [Flatcar#183](https://github.com/flatcar/Flatcar/issues/183)\n- Set `sysctl net.ipv4.conf.(all|*).rp_filter` to 0 (instead of the systemd upstream value 2) to be less restrictive which some network solutions rely on ([PR#11](https://github.com/flatcar/systemd/pull/11))\n-  `flatcar-install` allows installation to a multipath drive ([PR#24](https://github.com/flatcar/init/pull/24))\n\nUpdates:\n\n- Linux [5.4.65](https://lwn.net/Articles/831366/)\n"
  },
  "2632.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-09-30 12:22:40 +0000",
    "major_software": {
      "docker": [
        "19.03.12"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.8.11"
      ],
      "rkt": [
        "1.30.0"
      ],
      "systemd": [
        "245"
      ]
    },
    "release_notes": "Security fixes:\n- Linux: [CVE-2020-25284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284), [CVE-2020-14390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390)\n\nBug fixes:\n\n- Enabled missing systemd services ([#191](https://github.com/flatcar/Flatcar/issues/191), [PR #612](https://github.com/flatcar/coreos-overlay/pull/612))\n- Fixed Docker torcx image unpacking error on machines with less than ~600 MB total RAM ([#32](https://github.com/flatcar/Flatcar/issues/32))\n- Solved adcli Kerberos Active Directory incompatibility ([#194](https://github.com/flatcar/Flatcar/issues/194))\n- Fixed the makefile path when building kernel modules with the developer container ([#195](https://github.com/flatcar/Flatcar/issues/195))\n- Removed the `/etc/portage/savedconfig/` folder that contained a dump of the firmware config [flatcar-linux/coreos-overlay#613](https://github.com/flatcar/coreos-overlay/pull/613)\n\nChanges:\n\n- GCE: Improved oslogin support and added shell aliases to run a Python Docker image ([PR #592](https://github.com/flatcar/coreos-overlay/pull/592))\n\nUpdates:\n\n- Linux [5.8.11](https://lwn.net/Articles/832305/)\n- adcli [0.9.0](https://cgit.freedesktop.org/realmd/adcli/tree/NEWS?h=0.9.0)\n- GCE: oslogin [20200910.00](https://github.com/GoogleCloudPlatform/guest-oslogin/releases/tag/20200910.00)"
  },
  "2643.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-10-16 08:05:22 +0000",
    "major_software": {
      "docker": [
        "19.03.13"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.8.14"
      ],
      "systemd": [
        "245"
      ]
    },
    "release_notes": "Security fixes:\n- Linux - [CVE-2020-25645](https://nvd.nist.gov/vuln/detail/CVE-2020-25645), [CVE-2020-25643](https://nvd.nist.gov/vuln/detail/CVE-2020-25643), [CVE-2020-25211](https://nvd.nist.gov/vuln/detail/CVE-2020-25211)\n\nBug fixes:\n- Ensured that the `/etc/coreos` to `/etc/flatcar` symlink always exists, relevant for the Container Linux Config transpiler (ct) when specifying directives for `update:` or `locksmith:` while also reformatting the rootfs ([baselayout PR#7](https://github.com/flatcar/baselayout/pull/7))\n\nUpdates:\n-   Linux [5.8.14](https://lwn.net/Articles/833689/)"
  },
  "2643.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-11-19 15:42:05 +0000",
    "major_software": {
      "docker": [
        "19.03.13"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.8.18"
      ],
      "systemd": [
        "245"
      ]
    },
    "release_notes": "Security fixes:\n\n*   Linux -  [CVE-2020-27194](https://nvd.nist.gov/vuln/detail/CVE-2020-27194), [CVE-2020-27152](https://nvd.nist.gov/vuln/detail/CVE-2020-27152)\n*   Go - [CVE-2020-28362](https://nvd.nist.gov/vuln/detail/CVE-2020-28362), [CVE-2020-28367](https://nvd.nist.gov/vuln/detail/CVE-2020-28367), [CVE-2020-28366](https://nvd.nist.gov/vuln/detail/CVE-2020-28366)\n\nBug fixes:\n\n*   network: Restore KeepConfiguration=dhcp-on-stop ([kinvolk/init#30](https://github.com/kinvolk/init/pull/30))\n\nUpdates:\n\n*   Linux ([5.8.18](https://lwn.net/Articles/835763/))\n*   Go ([1.15.5](https://go.googlesource.com/go/+/refs/tags/go1.15.5))\n"
  },
  "2705.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-12-01 13:28:41 +0000",
    "major_software": {
      "docker": [
        "19.03.13"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.9.11"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "Security fixes:\n*   No changes since Alpha 2705.0.0\n\nBug fixes:\n*   No changes since Alpha 2705.0.0\n\nChanges:\n*   No changes since Alpha 2705.0.0\n\nUpdates:\n*   No changes since Alpha 2705.0.0\n"
  },
  "2705.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-01-12 17:00:58 +0000",
    "major_software": {
      "docker": [
        "19.03.14"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.9.16"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "**Security fixes**\n\n* Linux\n  - [CVE-2020-27835](https://nvd.nist.gov/vuln/detail/CVE-2020-27835)\n  - [CVE-2020-29661](https://nvd.nist.gov/vuln/detail/CVE-2020-29661)\n  - [CVE-2020-29660](https://nvd.nist.gov/vuln/detail/CVE-2020-29660)\n  - [CVE-2020-27830](https://www.openwall.com/lists/oss-security/2020/12/07/1)\n  - [CVE-2020-28588](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f134b89a24b965991e7c345b9a4591821f7c2a6)\n\n**Bug fixes**\n\n*   The sysctl `net.ipv4.conf.*.rp_filter` is set to `0` for the Cilium CNI plugin to work ([kinvolk/Flatcar#181](https://github.com/kinvolk/Flatcar/issues/181))\n*   Package downloads in the developer container now use the correct URL again ([kinvolk/Flatcar#298](https://github.com/kinvolk/Flatcar/issues/298))\n*   networkd: avoid managing MAC addresses for veth devices ([kinvolk/init#33](https://github.com/kinvolk/init/pull/33))\n\n**Changes**\n\n*   The sysctl default config file is now applied under the prefix 60 which allows for custom sysctl config files to take effect when they start with a prefix of 70, 80, or 90 ([kinvolk/baselayout#13](https://github.com/kinvolk/baselayout/pull/13))\n*   Containerd CRI plugin got enabled by default, only the containerd socket path needs to be specified as kubelet parameter for Kubernetes 1.20 to use containerd instead of Docker ([kinvolk/Flatcar#283](https://github.com/kinvolk/Flatcar/issues/283))\n*   For users with a custom update server a machine alias setting in update-engine allows to give human-friendly names to client instances ([kinvolk/update-engine#8](https://github.com/kinvolk/update_engine/pull/8))\n\n**Updates**\n\n*   Linux ([5.9.16](https://lwn.net/Articles/840977/))\n*   containerd ([1.4.3](https://github.com/containerd/containerd/releases/tag/v1.4.3))\n*   Docker ([19.03.14](https://github.com/docker/docker-ce/releases/tag/v19.03.14))\n"
  },
  "2705.1.2": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-01-28 11:01:35 +0000",
    "major_software": {
      "docker": [
        "19.03.14"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.9.16"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "**Security fixes**\n\n*   go - [CVE-2021-3114](https://github.com/golang/go/issues/43786)\n*   sudo - [CVE-2021-3156](https://nvd.nist.gov/vuln/detail/CVE-2021-3156), [CVE-2021-23239](https://nvd.nist.gov/vuln/detail/CVE-2021-23239)\n\n**Bug fixes**\n\n*   `/etc/iscsi/initiatorname.iscsi` is generated by the iscsi-init service ([#321](https://github.com/kinvolk/Flatcar/issues/321))\n*   Prevent iscsiadm buffer overflow ([#318](https://github.com/kinvolk/Flatcar/issues/318))\n\n**Changes**\n\n*   Revert to building docker and containerd with go1.13 instead of go1.15. This reduces the SIGURG log spam ([Issue #315](https://github.com/kinvolk/Flatcar/issues/315) [PR #774](https://github.com/kinvolk/coreos-overlay/pull/774))\n*   The containerd socket is now available in the default location (`/run/containerd/containerd.sock`) and also as a symlink in the previous location (`/run/docker/libcontainerd/docker-containerd.sock`) ([#771](https://github.com/kinvolk/coreos-overlay/pull/771))\n*   With the iscsi update, the service unit has changed from iscsid to iscsi ([#791](https://github.com/kinvolk/coreos-overlay/pull/791))\n*   AWS Pro: include scripts to facilitate setup of EKS workers ([#794](https://github.com/kinvolk/coreos-overlay/pull/794)).\n*   Missed from earlier notes: with the previous open-iscsi update to 2.1.2, the service unit name changed from iscsid to iscsi ([#682](https://github.com/kinvolk/coreos-overlay/pull/682))\n\n**Updates**\n\n*   open-iscsi ([2.1.3](https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.3))\n*   go ([1.15.7](https://go.googlesource.com/go/+/refs/tags/go1.15.7))\n*   sudo ([1.9.5p2](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_5p2))"
  },
  "2765.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-02-18 12:44:47 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.16"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "**Security fixes**\n\n\n\n*   Linux ([CVE-2021-3347](https://nvd.nist.gov/vuln/detail/CVE-2021-3347), [CVE-2021-3348](https://nvd.nist.gov/vuln/detail/CVE-2021-3348), [CVE-2021-26708](https://nvd.nist.gov/vuln/detail/CVE-2021-26708), [CVE-2021-20194](https://nvd.nist.gov/vuln/detail/CVE-2021-20194))\n*   Docker ([CVE-2021-21285](https://nvd.nist.gov/vuln/detail/CVE-2021-21285), [CVE-2021-21284](https://nvd.nist.gov/vuln/detail/CVE-2021-21284))\n*   NVIDIA ([CVE-2021-1052](https://nvd.nist.gov/vuln/detail/CVE-2021-1052),[ CVE-2021-1053](https://nvd.nist.gov/vuln/detail/CVE-2021-1053),[ CVE-2021-1056](https://nvd.nist.gov/vuln/detail/CVE-2021-1056))\n\n**Bug Fixes**\n\n\n\n*   app-crypt/trousers: use correct file permissions ([coreos-overlay#809](https://github.com/kinvolk/coreos-overlay/pull/809))\n*   x11-drivers/nvidia-drivers: Handle NVIDIA Version upgrades ([https://github.com/kinvolk/coreos-overlay/pull/762](https://github.com/kinvolk/coreos-overlay/pull/762))\n*   flatcar-eks: add missing mkdir and update to latest versions ([https://github.com/kinvolk/coreos-overlay/pull/817](https://github.com/kinvolk/coreos-overlay/pull/817))\n\n**Updates**\n\n\n\n*   Linux ([5.10.16](https://lwn.net/Articles/846116/))\n*   Docker ([19.03.15](https://docs.docker.com/engine/release-notes/19.03/#190315))\n*   NVIDIA Tesla Driver ([460.32.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-460-32-03/index.html))"
  },
  "2801.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-03-25 15:38:18 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.25"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "**Security fixes**\n\n\n\n*   Linux ([CVE-2021-27365](https://nvd.nist.gov/vuln/detail/CVE-2021-27365), [CVE-2021-27364](https://nvd.nist.gov/vuln/detail/CVE-2021-27364), [CVE-2021-27363](https://nvd.nist.gov/vuln/detail/CVE-2021-27363), [CVE-2021-28038](https://nvd.nist.gov/vuln/detail/CVE-2021-28038), [CVE-2021-28039](https://nvd.nist.gov/vuln/detail/CVE-2021-28039), [CVE-2021-28375](https://nvd.nist.gov/vuln/detail/CVE-2021-28375), [CVE-2021-28660](https://nvd.nist.gov/vuln/detail/CVE-2021-28660), [CVE-2021-27218](https://nvd.nist.gov/vuln/detail/CVE-2021-27218), [CVE-2021-27219](https://nvd.nist.gov/vuln/detail/CVE-2021-27219), [CVE-2021-3444](https://nvd.nist.gov/vuln/detail/CVE-2021-3444))\n*   openssl ([CVE-2021-23840](https://nvd.nist.gov/vuln/detail/CVE-2021-23840),[ CVE-2021-23841](https://nvd.nist.gov/vuln/detail/CVE-2021-23841), [CVE-2020-1971](https://nvd.nist.gov/vuln/detail/CVE-2020-1971),[ CVE-2021-23840](https://nvd.nist.gov/vuln/detail/CVE-2021-23840),[ CVE-2021-23841](https://nvd.nist.gov/vuln/detail/CVE-2021-23841), [CVE-2021-3449](https://nvd.nist.gov/vuln/detail/CVE-2021-3449),[ CVE-2021-3450](https://nvd.nist.gov/vuln/detail/CVE-2021-3450))\n\n**Bug Fixes**\n\n\n\n*   GCE: The old interface name ens4v1 which was replaced by eth0 due to a broken udev rule was restored, but now as alternative interface name, and eth0 will stay the primary name for consistency across cloud environments. ([init#38](https://github.com/kinvolk/init/pull/38))\n\n**Changes**\n\n\n\n*   The virtio network interfaces got predictable interface names as alternative interface names, and thus these names can also be used to match for a specific interface in case there is more than one and the eth0 and eth1 name assignment is not stable. ([init#38](https://github.com/kinvolk/init/pull/38))\n\n**Updates**\n\n\n\n*   Linux ([5.10.25](https://lwn.net/Articles/849951/))\n*   openssl ([1.1.1k](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000197.html))\n*   open-iscsi ([2.1.4](https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.4))\n\n**Deprecation**\n\n\n\n*   dhcpcd and containerd-stress are deprecated and removed from Beta, also from subsequent channels in the future. Users that relied on dhcpd should either migrate to systemd-networkd as a DHCP server or run dhcpd from a container.\n*   Docker 1.12 is deprecated and removed from Beta, also from subsequent channels in the future."
  },
  "2823.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-04-28 13:33:49 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.32"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "_Changes since **Alpha** **2823.0.0**:_\n\n\n**Security fixes**\n\n\n\n*   Linux ([CVE-2021-28964](https://nvd.nist.gov/vuln/detail/CVE-2021-28964), [CVE-2021-28972](https://nvd.nist.gov/vuln/detail/CVE-2021-28972), [CVE-2021-28971](https://nvd.nist.gov/vuln/detail/CVE-2021-28971), [CVE-2021-28951](https://nvd.nist.gov/vuln/detail/CVE-2021-28951), [CVE-2021-28952](https://nvd.nist.gov/vuln/detail/CVE-2021-28952), [CVE-2021-29266](https://nvd.nist.gov/vuln/detail/CVE-2021-29266), [CVE-2021-28688](https://nvd.nist.gov/vuln/detail/CVE-2021-28688), [CVE-2021-29264](https://nvd.nist.gov/vuln/detail/CVE-2021-29264), [CVE-2021-29649](https://nvd.nist.gov/vuln/detail/CVE-2021-29649), [CVE-2021-29650](https://nvd.nist.gov/vuln/detail/CVE-2021-29650), [CVE-2021-29646](https://nvd.nist.gov/vuln/detail/CVE-2021-29646), [CVE-2021-29647](https://nvd.nist.gov/vuln/detail/CVE-2021-29647), [CVE-2021-29154](https://nvd.nist.gov/vuln/detail/CVE-2021-29154), [CVE-2021-29155](https://nvd.nist.gov/vuln/detail/CVE-2021-29155), [CVE-2021-23133](https://nvd.nist.gov/vuln/detail/CVE-2021-23133))\n\n**Bug fixes**\n\n\n\n*   Fix the patch to update DefaultTasksMax in systemd ([coreos-overlay#971](https://github.com/kinvolk/coreos-overlay/pull/971))\n\n**Updates**\n\n\n\n*   Linux ([5.10.32](https://lwn.net/Articles/853762/))\n*   systemd ([247.6](https://github.com/systemd/systemd-stable/releases/tag/v247.6))\n\n_Changes since **Beta** **2801.1.0**:_\n\n**Security fixes**\n\n\n\n*   Linux ([CVE-2021-28964](https://nvd.nist.gov/vuln/detail/CVE-2021-28964), [CVE-2021-28972](https://nvd.nist.gov/vuln/detail/CVE-2021-28972), [CVE-2021-28971](https://nvd.nist.gov/vuln/detail/CVE-2021-28971), [CVE-2021-28951](https://nvd.nist.gov/vuln/detail/CVE-2021-28951), [CVE-2021-28952](https://nvd.nist.gov/vuln/detail/CVE-2021-28952), [CVE-2021-29266](https://nvd.nist.gov/vuln/detail/CVE-2021-29266), [CVE-2021-28688](https://nvd.nist.gov/vuln/detail/CVE-2021-28688), [CVE-2021-29264](https://nvd.nist.gov/vuln/detail/CVE-2021-29264), [CVE-2021-29649](https://nvd.nist.gov/vuln/detail/CVE-2021-29649), [CVE-2021-29650](https://nvd.nist.gov/vuln/detail/CVE-2021-29650), [CVE-2021-29646](https://nvd.nist.gov/vuln/detail/CVE-2021-29646), [CVE-2021-29647](https://nvd.nist.gov/vuln/detail/CVE-2021-29647), [CVE-2021-29154](https://nvd.nist.gov/vuln/detail/CVE-2021-29154), [CVE-2021-29155](https://nvd.nist.gov/vuln/detail/CVE-2021-29155), [CVE-2021-23133](https://nvd.nist.gov/vuln/detail/CVE-2021-23133))\n*   Go ([CVE-2021-27918](https://nvd.nist.gov/vuln/detail/CVE-2021-27918),[ CVE-2021-27919](https://nvd.nist.gov/vuln/detail/CVE-2021-27919)) \n*   glib ([CVE-2021-28153](https://nvd.nist.gov/vuln/detail/CVE-2021-28153),[ CVE-2021-27218](https://nvd.nist.gov/vuln/detail/CVE-2021-27218),[ CVE-2021-27219](https://nvd.nist.gov/vuln/detail/CVE-2021-27219)) \n*   boost ([CVE-2012-2677](https://nvd.nist.gov/vuln/detail/CVE-2012-2677))\n*   ncurses ([CVE-2019-17594](https://nvd.nist.gov/vuln/detail/CVE-2019-17594),[ CVE-2019-17595](https://nvd.nist.gov/vuln/detail/CVE-2019-17595))\n*   zstd ([CVE-2021-24032](https://nvd.nist.gov/vuln/detail/CVE-2021-24032))\n\n**Bug Fixes**\n\n\n\n*   Fix the patch to update DefaultTasksMax in systemd ([coreos-overlay#971](https://github.com/kinvolk/coreos-overlay/pull/971))\n\n**Changes**\n\n\n\n*   The pam_faillock PAM module was enabled as replacement for the removed pam_tally2 module and will temporarily lock an account if there were login attempts with a wrong password. The faillock command can be used to show the current state. With pam_tally2 there was no limit for wrong password login attempts but with faillock the default is already restricting the attempts. The default behavior was relaxed to allow 5 wrong passwords per two minutes, and a one minute account lock time. This does not apply to logins with an SSH key. ([baselayout#17](https://github.com/kinvolk/baselayout/pull/17))\n*   The etcd and flannel services are now run with Docker and any rkt-based customizations of the etcd-member and flanneld services not supported anymore. Also, because the flanneld service relies on Docker and will restart Docker after applying the new configuration, it is not possible anymore to set Requires=flanneld.service for docker.service and instead it\u2019s enough to have flanneld.service enabled. ([coreos-overlay#857](https://github.com/kinvolk/coreos-overlay/pull/857))\n\n**Updates**\n\n\n\n*   Linux ([5.10.32](https://lwn.net/Articles/853762/))\n*   Linux firmware ([20210315](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20210315))\n*   systemd ([247.6](https://github.com/systemd/systemd-stable/releases/tag/v247.6))\n*   Go ([1.15.10](https://go.googlesource.com/go/+/refs/tags/go1.15.10))\n*   boost ([1.75.0](https://www.boost.org/users/history/version_1_75_0.html))\n*   glib ([2.66.8](https://gitlab.gnome.org/GNOME/glib/-/releases/2.66.8))\n*   ncurses ([6.2](https://invisible-island.net/ncurses/announce-6.2.html))\n*   zstd ([1.4.9](https://github.com/facebook/zstd/releases/tag/v1.4.9))"
  },
  "2823.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-05-19 11:39:05 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.37"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "**Security fixes**\n\n*   Linux ([CVE-2021-3491](https://nvd.nist.gov/vuln/detail/CVE-2021-3491), [CVE-2021-31440](https://nvd.nist.gov/vuln/detail/CVE-2021-31440), [CVE-2021-31829](https://nvd.nist.gov/vuln/detail/CVE-2021-31829))\n*   nvidia-drivers ([CVE-2021-1052](https://nvd.nist.gov/vuln/detail/CVE-2021-1052), [CVE-2021-1053](https://nvd.nist.gov/vuln/detail/CVE-2021-1053), [CVE-2021-1056](https://nvd.nist.gov/vuln/detail/CVE-2021-1056), [CVE-2021-1076](https://nvd.nist.gov/vuln/detail/CVE-2021-1076), [CVE-2021-1077](https://nvd.nist.gov/vuln/detail/CVE-2021-1077))\n*   runc ([CVE-2021-30465](https://nvd.nist.gov/vuln/detail/CVE-2021-30465))\n\n**Updates**\n\n*   Linux ([5.10.37](https://lwn.net/Articles/856269/))\n*   nvidia-drivers ([460.73.01](https://www.nvidia.com/Download/driverResults.aspx/172376/en-us))"
  },
  "2823.1.2": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-05-21 12:08:31 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.38"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "**Bug fixes**\n\n*   The Linux kernel IOMMU-related crash introduced in the 5.10.37 update got fixed through the 5.10.38 update ([Flatcar#400](https://github.com/kinvolk/Flatcar/issues/400))\n\n**Updates**\n\n*   Linux ([5.10.38](https://lwn.net/Articles/856654/))\n"
  },
  "2823.1.3": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-06-17 10:30:54 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.43"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "**Security fixes**\n\n\n\n*   Linux ([CVE-2020-26558](https://nvd.nist.gov/vuln/detail/CVE-2020-26558), [CVE-2021-0129](https://nvd.nist.gov/vuln/detail/CVE-2021-0129), [CVE-2020-24587](https://nvd.nist.gov/vuln/detail/CVE-2020-24587), [CVE-2020-24586](https://nvd.nist.gov/vuln/detail/CVE-2020-24586), [CVE-2020-24588](https://nvd.nist.gov/vuln/detail/CVE-2020-24588), [CVE-2020-26139](https://nvd.nist.gov/vuln/detail/CVE-2020-26139), [CVE-2020-26145](https://nvd.nist.gov/vuln/detail/CVE-2020-26145), [CVE-2020-26147](https://nvd.nist.gov/vuln/detail/CVE-2020-26147), [CVE-2020-26141](https://nvd.nist.gov/vuln/detail/CVE-2020-26141), [CVE-2021-3564](https://nvd.nist.gov/vuln/detail/CVE-2021-3564), [CVE-2021-28691](https://nvd.nist.gov/vuln/detail/CVE-2021-28691), [CVE-2021-3587](https://nvd.nist.gov/vuln/detail/CVE-2021-3587), [CVE-2021-3573](https://nvd.nist.gov/vuln/detail/CVE-2021-3573))\n\n**Bug fixes**\n\n\n\n*   Update-engine sent empty requests when restarted before a pending reboot ([Flatcar#388](https://github.com/kinvolk/Flatcar/issues/388))\n\n**Changes**\n\n\n\n*   Disabled SELinux for Docker ([coreos-overlay#1055](https://github.com/kinvolk/coreos-overlay/pull/1055))\n\n**Updates**\n\n\n\n*   Linux ([5.10.43](https://lwn.net/Articles/859022/))"
  },
  "2905.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-07-02 07:37:53 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.46"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "_Changes since **Alpha** **2905.0.0**:_\n**Security fixes**\n\n* Linux ([CVE-2021-34693](https://nvd.nist.gov/vuln/detail/CVE-2021-34693), [CVE-2021-33624](https://nvd.nist.gov/vuln/detail/CVE-2021-33624))\n\n**Changes**\n\n* NVIDIA GPU Support added in the AWS Pro images ([coreos-overlay#1078](https://github.com/kinvolk/coreos-overlay/pull/1078)) \n\n**Updates**\n\n* Linux ([5.10.46](https://lwn.net/Articles/860655/))\n\n\n\n_Changes since **Beta** **2823.1.3**:_\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-34693](https://nvd.nist.gov/vuln/detail/CVE-2021-34693), [CVE-2021-33624](https://nvd.nist.gov/vuln/detail/CVE-2021-33624))\n* binutils ([CVE-2021-20197](https://nvd.nist.gov/vuln/detail/CVE-2021-20197),[CVE-2021-3487](https://nvd.nist.gov/vuln/detail/CVE-2021-3487))\n* openldap ([CVE-2021-27212](https://nvd.nist.gov/vuln/detail/CVE-2021-27212))\n* sqlite ([CVE-2021-20227](https://nvd.nist.gov/vuln/detail/CVE-2021-20227))\n* Go (CVE-2021-33195,CVE-2021-33196,CVE-2021-33197,CVE-2021-33198)\n* libxml2 ([CVE-2021-3516](https://nvd.nist.gov/vuln/detail/CVE-2021-3516),[CVE-2021-3517](https://nvd.nist.gov/vuln/detail/CVE-2021-3517),[CVE-2021-3518](https://nvd.nist.gov/vuln/detail/CVE-2021-3518),CVE-2021-3541)\n* qemu ([CVE-2020-10717](https://nvd.nist.gov/vuln/detail/CVE-2020-10717),[ CVE-2020-13754](https://nvd.nist.gov/vuln/detail/CVE-2020-13754),[ CVE-2020-15859](https://nvd.nist.gov/vuln/detail/CVE-2020-15859),[ CVE-2020-15863](https://nvd.nist.gov/vuln/detail/CVE-2020-15863),[ CVE-2020-16092](https://nvd.nist.gov/vuln/detail/CVE-2020-16092),[ CVE-2020-25741](https://nvd.nist.gov/vuln/detail/CVE-2020-25741),[ CVE-2020-25742](https://nvd.nist.gov/vuln/detail/CVE-2020-25742),[ CVE-2020-25743](https://nvd.nist.gov/vuln/detail/CVE-2020-25743))\n* git ([CVE-2021-21300](https://nvd.nist.gov/vuln/detail/CVE-2021-21300))\n* gnutls ([CVE-2021-20231](https://nvd.nist.gov/vuln/detail/CVE-2021-20231),[ CVE-2021-20232](https://nvd.nist.gov/vuln/detail/CVE-2021-20232))\n* curl ([CVE-2021-22876](https://nvd.nist.gov/vuln/detail/CVE-2021-22876),[ CVE-2021-22890](https://nvd.nist.gov/vuln/detail/CVE-2021-22890))\n\n**Bug Fixes**\n\n\n\n* NVIDIA GPU Support added in the AWS Pro images ([coreos-overlay#1078](https://github.com/kinvolk/coreos-overlay/pull/1078)) \n\n**Updates**\n\n\n\n* Linux ([5.10.46](https://lwn.net/Articles/860655/))\n* dbus ([1.10.32](https://github.com/freedesktop/dbus/releases/tag/dbus-1.10.32))\n* openssh ([8.6_p1](https://www.openssh.com/txt/release-8.6))\n* openldap ([2.4.58](https://www.openldap.org/software/release/announce.html))\n* curl ([7.76.1](https://curl.se/changes.html#7_76_1))\n* gnutls ([3.7.1](https://gitlab.com/gnutls/gnutls/-/tags/3.7.1))\n* git ([2.26.3](https://raw.githubusercontent.com/git/git/v2.26.3/Documentation/RelNotes/2.26.3.txt))\n* go ([1.16.4](https://go.googlesource.com/go/+/refs/tags/go1.16.4))\n* dnsmasq ([2.83](https://thekelleys.org.uk/dnsmasq/CHANGELOG))\n* libxml2 ([2.9.12](https://github.com/GNOME/libxml2/releases/tag/v2.9.12))\n* sqlite ([3.34.1](https://www.sqlite.org/releaselog/3_34_1.html))\n* SDK: binutils ([2.36.1](https://sourceware.org/pipermail/binutils/2021-February/115240.html))\n* SDK: QEMU ([5.2.0](https://wiki.qemu.org/ChangeLog/5.2))\n\n**Deprecation**\n\n\n\n* rkt and kubelet-wrapper are deprecated and removed from Beta, also from subsequent channels in the future. Please read the[ removal announcement](https://groups.google.com/g/flatcar-linux-user/c/MeinndLqJO4) to know more."
  },
  "2920.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-07-28 08:21:00 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.52"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "_Changes since **Alpha 2920.0.0**_\n\n**Security Fixes**\n\n\n\n* containerd ([CVE-2021-32760](https://nvd.nist.gov/vuln/detail/CVE-2021-32760))\n* curl (CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22925, CVE-2021-22926)\n* linux ([CVE-2020-26541](https://nvd.nist.gov/vuln/detail/CVE-2020-26541), [CVE-2021-35039](https://nvd.nist.gov/vuln/detail/CVE-2021-35039), [CVE-2021-22543](https://nvd.nist.gov/vuln/detail/CVE-2021-22543), CVE-2021-3609, CVE-2021-3655, [CVE-2021-33909](https://nvd.nist.gov/vuln/detail/CVE-2021-33909))\n\n**Updates**\n\n\n\n* Linux ([5.10.52](https://lwn.net/Articles/863648/))\n* curl ([7.78](https://curl.se/changes.html#7_78_0))\n* containerd ([1.5.4](https://github.com/containerd/containerd/releases/tag/v1.5.4))\n\n_Changes since **Beta 2905.1.0**_\n\n**Updates**\n\n\n\n* Linux ([5.10.52](https://lwn.net/Articles/863648/))\n* lz4 ([1.9.3-r1](https://github.com/lz4/lz4/releases/tag/v1.9.3))\n* curl ([7.78](https://curl.se/changes.html#7_78_0))\n* gptfdisk (1.0.7)\n* gettext ([0.21-r1](https://lists.gnu.org/archive/html/info-gnu/2020-07/msg00009.html))\n* intel-microcode ([20210608_p20210608](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20210608))\n* runc ([1.0.0](https://github.com/opencontainers/runc/releases/tag/v1.0.0))"
  },
  "2942.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-08-04 13:23:23 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.55"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "_Changes since **Beta 2920.1.0**_\n\n**Security Fixes**\n\n* Linux ([CVE-2021-37576](https://nvd.nist.gov/vuln/detail/CVE-2021-37576))\n* containerd ([CVE-2021-32760](https://nvd.nist.gov/vuln/detail/CVE-2021-32760))\n* glibc ([CVE-2020-29562](https://nvd.nist.gov/vuln/detail/CVE-2020-29562), [CVE-2019-25013](https://nvd.nist.gov/vuln/detail/CVE-2019-25013), [CVE-2020-27618](https://nvd.nist.gov/vuln/detail/https://cve.circl.lu/cve/CVE-2020-27618), [CVE-2021-27645](https://nvd.nist.gov/vuln/detail/CVE-2021-27645), [CVE-2021-33574](https://nvd.nist.gov/vuln/detail/CVE-2021-33574))\n* Go ([CVE-2021-34558](https://nvd.nist.gov/vuln/detail/CVE-2021-34558))\n* libgcrypt ([CVE-2021-33560](https://nvd.nist.gov/vuln/detail/CVE-2021-33560))\n* libpcre ([CVE-2019-20838](https://nvd.nist.gov/vuln/detail/CVE-2019-20838), [CVE-2020-14155](https://nvd.nist.gov/vuln/detail/CVE-2020-14155))\n\n**Bug Fixes**\n\n* Added the systemd tag in udev for Azure storage devices, to fix /boot automount ([init#41](https://github.com/kinvolk/init/pull/41))\n* Disabled SELinux by default on `dockerd` wrapper script ([coreos-overlay#1149](https://github.com/kinvolk/coreos-overlay/pull/1149))\n* Set the cilium_vxlan interface to be not managed by networkd's default setup with DHCP as it's managed by Cilium. ([init#43](https://github.com/kinvolk/init/pull/43))\n* update_engine_client: Improve feedback when an update is not needed([update_engine#10](https://github.com/kinvolk/update_engine/pull/10))\n* GCE: Granted CAP_NET_ADMIN to set routes for the TCP LB when starting oem-gce.service ([coreos-overlay#1146](https://github.com/kinvolk/coreos-overlay/pull/1146))\n\n**Changes**\n\n* Enabled telnet support for curl ([coreos-overlay#1099](https://github.com/kinvolk/coreos-overlay/pull/1099))\n* Enabled ssl USE flag for wget ([coreos-overlay#932](https://github.com/kinvolk/coreos-overlay/pull/932))\n* Enabled MDIO_BCM_UNIMAC for arm64 ([coreos-overlay#929](https://github.com/kinvolk/coreos-overlay/pull/929))\n\n**Updates**\n\n* Linux ([5.10.55](https://lwn.net/Articles/864901/))\n* containerd ([1.5.4](https://github.com/containerd/containerd/releases/tag/v1.5.4))\n* dbus ([1.12.20](https://github.com/freedesktop/dbus/blob/ab88811768f750777d1a8b9d9ab12f13390bfd3a/NEWS#L1))\n* dracut ([053](https://github.com/dracutdevs/dracut/releases/tag/053))\n* glibc ([2.33](https://sourceware.org/pipermail/libc-alpha/2021-February/122207.html))\n* go ([1.16.6](https://golang.org/doc/devel/release#go1.16.minor)) \n* libev (4.33)\n* libgcrypt ([1.9.3](https://github.com/gpg/libgcrypt/blob/cb78627203705365d24b48ec4fc4cf2fc804b277/NEWS#L1))\n* libpcre (8.44)\n* libverto ([0.3.1](https://github.com/latchset/libverto/releases/tag/0.3.1))\n* pax-utils (1.3.1)\n* readline ([8.1_p1](https://tiswww.case.edu/php/chet/readline/CHANGES))\n* rust ([1.53.0](https://blog.rust-lang.org/2021/06/17/Rust-1.53.0.html))\n* selinux ([3.1](https://github.com/SELinuxProject/selinux/releases/tag/20200710))\n* selinux-refpolicy ([2.20200818](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818))\n* systemd ([247.7](https://github.com/systemd/systemd-stable/releases/tag/v247.7))\n* VMWare: open-vm-tools ([11.3.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-11.3.0))\n\n_Changes since **Alpha 2942.0.0**_\n\n**Security fixes**\n\n* Linux ([CVE-2021-37576](https://nvd.nist.gov/vuln/detail/CVE-2021-37576))\n\n**Bug fixes**\n\n* Set the cilium_vxlan interface to be not managed by networkd's default setup with DHCP as it's managed by Cilium. ([init#43](https://github.com/kinvolk/init/pull/43))\n* Disabled SELinux by default on `dockerd` wrapper script ([coreos-overlay#1149](https://github.com/kinvolk/coreos-overlay/pull/1149))\n* GCE: Granted CAP_NET_ADMIN to set routes for the TCP LB when starting oem-gce.service ([coreos-overlay#1146](https://github.com/kinvolk/coreos-overlay/pull/1146))\n\n**Updates**\n\n* Linux ([5.10.55](https://lwn.net/Articles/864901/))"
  },
  "2942.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-08-19 13:36:00 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.59"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "_Changes since **Beta 2942.1.0**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-34556](https://nvd.nist.gov/vuln/detail/CVE-2021-34556), [CVE-2021-35477](https://nvd.nist.gov/vuln/detail/CVE-2021-35477), [CVE-2021-38205](https://nvd.nist.gov/vuln/detail/CVE-2021-38205))\n* NVIDIA Drivers ([CVE-2021-1090](https://nvd.nist.gov/vuln/detail/CVE-2021-1090), [CVE-2021-1093](https://nvd.nist.gov/vuln/detail/CVE-2021-1093), [CVE-2021-1094](https://nvd.nist.gov/vuln/detail/CVE-2021-1094), [CVE-2021-1095](https://nvd.nist.gov/vuln/detail/CVE-2021-1095))\n* Go ([CVE-2021-36221](https://nvd.nist.gov/vuln/detail/CVE-2021-36221))\n* Systemd ([CVE-2020-13529](https://nvd.nist.gov/vuln/detail/CVE-2020-13529), [CVE-2021-33910](https://nvd.nist.gov/vuln/detail/CVE-2021-33910))\n\n**Bug Fixes**\n\n\n\n* Fixed `pam.d` sssd LDAP auth with sudo ([coreos-overlay#1170](https://github.com/kinvolk/coreos-overlay/pull/1170))\n* Let network-cleanup.service finish before entering rootfs ([coreos-overlay#1182](https://github.com/kinvolk/coreos-overlay/pull/1182))\n* Fixed SELinux policy for Flannel CNI ([coreos-overlay#1181](https://github.com/kinvolk/coreos-overlay/pull/1181))\n\n**Changes**\n\n\n\n* Switched to zstd for the initramfs ([coreos-overlay#1136](https://github.com/kinvolk/coreos-overlay/pull/1136))\n* Embedded new subkey in flatcar-install ([coreos-overlay#1180](https://github.com/kinvolk/coreos-overlay/pull/1180))\n\n**Updates**\n\n\n\n* Linux ([5.10.59](https://lwn.net/Articles/866302/))\n* NVIDIA Drivers ([470.57.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-470-57-02/index.html))\n* Systemd ([247.9](https://github.com/systemd/systemd-stable/releases/tag/v247.9))\n* Go ([1.16.7](https://golang.org/doc/devel/release#go1.16.minor))\n* portage-utils ([0.90](https://github.com/gentoo/portage-utils/releases/tag/v0.90))"
  },
  "2942.1.2": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-09-01 14:14:50 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.61"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "New **Beta** release **2942.1.2**\n\n_Changes since **Beta 2942.1.1**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-3653](https://nvd.nist.gov/vuln/detail/CVE-2021-3653), [CVE-2021-3656](https://nvd.nist.gov/vuln/detail/CVE-2021-3656), [CVE-2021-38166](https://nvd.nist.gov/vuln/detail/CVE-2021-38166)) \n* openssl ([CVE-2021-3711](https://nvd.nist.gov/vuln/detail/CVE-2021-3711), [CVE-2021-3712](https://nvd.nist.gov/vuln/detail/CVE-2021-3712))\n\n**Bug Fixes**\n\n\n\n* Re-enabled kernel config FS_ENCRYPTION ([coreos-overlay#1212](https://github.com/kinvolk/coreos-overlay/pull/1212/))\n* Fixed Perl in dev-container ([coreos-overlay#1238](https://github.com/kinvolk/coreos-overlay/pull/1238))\n\n**Updates**\n\n\n\n* Linux ([5.10.61](https://lwn.net/Articles/867497/))\n* openssl ([1.1.1l](https://mta.openssl.org/pipermail/openssl-announce/2021-August/000206.html))"
  },
  "2983.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-09-16 14:56:46 +0000",
    "major_software": {
      "docker": [
        "20.10.8"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.63"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "New **Beta** release **2983.1.0**\n\n_Changes since **Beta 2942.1.2**_\n\n**Update to CGroupsV2**\n\nAs of Alpha version 2969.0.0, Flatcar Container Linux migrates to the unified cgroup hierarchy (aka CGroupsV2)! New nodes will utilize CGroupsV2 by default. Existing nodes remain on CGroupsV1 and need to be manually migrated to CGroupsV2. To learn more about CGroupsV2 on Flatcar Container Linux and the migration guide, please refer to [https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/](https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/) \n\n**Security fixes**\n\n\n\n* dnsmasq ([CVE-2021-3448](https://nvd.nist.gov/vuln/detail/CVE-2021-3448))\n* glibc ([CVE-2021-35942](https://nvd.nist.gov/vuln/detail/CVE-2021-35942))\n* Go ([CVE-2021-36221](https://nvd.nist.gov/vuln/detail/CVE-2021-36221))\n* libuv ([CVE-2021-22918](https://nvd.nist.gov/vuln/detail/CVE-2021-22918))\n* mit-krb5 ([CVE-2021-36222](https://nvd.nist.gov/vuln/detail/CVE-2021-36222))\n* tar ([CVE-2021-20193](https://nvd.nist.gov/vuln/detail/CVE-2021-20193))\n* expat ([CVE-2013-0340](https://nvd.nist.gov/vuln/detail/CVE-2013-0340))\n* Linux ([CVE-2021-3753](https://nvd.nist.gov/vuln/detail/CVE-2021-3753), [CVE-2021-3739](https://nvd.nist.gov/vuln/detail/CVE-2021-3739))\n\n**Bug Fixes**\n\n\n\n* Fixed containerd config after introduction of CGroupsV2 ([coreos-overlay#1214](https://github.com/kinvolk/coreos-overlay/pull/1214))\n* Fixed path for amazon-ssm-agent in base-ec2.ign ([coreos-overlay#1228](https://github.com/kinvolk/coreos-overlay/pull/1228))\n* Fixed locksmith adhering to reboot window when getting the etcd lock ([locksmith#10](https://github.com/kinvolk/locksmith/pull/10))\n* Disabled SELinux by default on dockerd wrapper script ([coreos-overlay#1149](https://github.com/kinvolk/coreos-overlay/pull/1149))\n* Let network-cleanup.service finish before entering rootfs ([coreos-overlay#1182](https://github.com/kinvolk/coreos-overlay/pull/1182))\n\n**Changes**\n\n\n\n* Added Azure [Generation 2 VM](https://docs.microsoft.com/en-us/azure/virtual-machines/generation-2) support ([coreos-overlay#1198](https://github.com/kinvolk/coreos-overlay/pull/1198))\n* cgroups v2 by default for new nodes ([coreos-overlay#931](https://github.com/kinvolk/coreos-overlay/pull/931)).\n* Upgrade Docker to 20.10 ([coreos-overlay#931](https://github.com/kinvolk/coreos-overlay/pull/931))\n* Switched Docker ecosystem packages to go1.16 ([coreos-overlay#1217](https://github.com/kinvolk/coreos-overlay/pull/1217))\n* Added lbzip2 binary to the image ([coreos-overlay#1221](https://github.com/kinvolk/coreos-overlay/pull/1221))\n* flatcar-install uses lbzip2 if present, falls back on bzip2 if not ([init#46](https://github.com/kinvolk/init/pull/46))\n* Added Intel E800 series network adapter driver ([coreos-overlay#1237](https://github.com/kinvolk/coreos-overlay/pull/1237))\n* Enabled 'audit' use flag for sys-libs/pam ([coreos-overlay#1233](https://github.com/kinvolk/coreos-overlay/pull/1233))\n* Bumped etcd and flannel to respectively `3.5.0`, `0.14.0` to get multiarch images for arm64 support. _Note for users of the old etcd v2 support_: `ETCDCTL_API=2` must be set to use v2 store as well as `ETCD_ENABLE_V2=true` in the `etcd-member.service` - this support will be removed in `3.6.0` ([coreos-overlay#1179](https://github.com/kinvolk/coreos-overlay/pull/1179))\n* Switched to zstd compression for the initramfs ([coreos-overlay#1136](https://github.com/kinvolk/coreos-overlay/pull/1136))\n* Support BTRFS in OEM and /usr partitions, but only used it for the OEM partition for now. Ignition configurations that refer to the OEM partition will work with any filesystem format specified, a mismatch is not resulting in a boot error. ([coreos-overlay#1106](https://github.com/kinvolk/coreos-overlay/pull/1106))\n* Switched the arm64 kernel to use a 4k page size instead of 64k\n* Switched dm-verity corruption detection to issue a kernel panic (a panic results in a reboot after 1 minute, this was the case before already) instead of merely failing certain syscalls that try to use the corrupted data\n* Support BTRFS in OEM and /usr partitions, but only used it for the OEM partition for now. Ignition configurations that refer to the OEM partition will work with any filesystem format specified, a mismatch is not resulting in a boot error. ([coreos-overlay#1106](https://github.com/kinvolk/coreos-overlay/pull/1106))\n* Enabled zstd compression for the initramfs and for amd64 also for the kernel because we hit the vmlinuz size limit on the /boot partition\n* Deleted the unused kernel+initramfs vmlinuz file from the /usr partition\n* devcontainer: added support to run on arm64 by switching to an architecture-agnostic partition UUID\n* Enabled ARM64 SDK bootstrap ([scripts#134](https://github.com/kinvolk/flatcar-scripts/pull/134))\n* SDK: enabled experimental ARM64 SDK usage ([flatcar-scripts#134](https://github.com/kinvolk/flatcar-scripts/pull/134)) ([flatcar-scripts#141](https://github.com/kinvolk/flatcar-scripts/pull/141))\n* AWS: Added amazon-ssm-agent ([coreos-overlay#1162](https://github.com/kinvolk/coreos-overlay/pull/1162))\n* Azure: Compile OEM contents for all architectures ([coreos-overlay#1196](https://github.com/kinvolk/coreos-overlay/pull/1196))\n* update_engine: add postinstall hook to stay on cgroupv1 ([update_engine#13](https://github.com/kinvolk/update_engine/pull/13))\n\n**Updates**\n\n\n\n* Linux ([5.10.63](https://lwn.net/Articles/868663/))\n* Linux firmware ([20210818](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20210818))\n* c-ares ([1.17.2](https://c-ares.haxx.se/changelog.html#1_17_2))\n* docker ([20.10.8](https://docs.docker.com/engine/release-notes/#20108))\n* docker CLI ([20.10.8](https://github.com/docker/cli/releases/tag/v20.10.8))\n* docker proxy ([0.8.0_p20210525](https://github.com/moby/libnetwork/commit/64b7a4574d1426139437d20e81c0b6d391130ec8))\n* Go ([1.16.7](https://golang.org/doc/devel/release#go1.16.minor))\n* glibc ([2.33-r5](https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7dfddd056de5f23bc29591d212f4051ed9d0634e))\n* etcd ([3.5.0](https://github.com/etcd-io/etcd/releases/tag/v3.5.0))\n* flannel ([0.14.0](https://github.com/flannel-io/flannel/releases/tag/v0.14.0))\n* runc ([1.0.2](https://github.com/opencontainers/runc/releases/tag/v1.0.2))\n* strace ([5.12](https://github.com/strace/strace/releases/tag/v5.12))\n* wa-linux-agent ([2.3.1.1](https://github.com/Azure/WALinuxAgent/releases/tag/v2.3.1.1))\n* cryptsetup ([2.3.6](https://gitlab.com/cryptsetup/cryptsetup/-/tags/v2.3.6))\n* expat ([2.4.1](https://www.xml.com/news/2021-05-expat-240-and-241/))\n* portage-utils ([0.90](https://github.com/gentoo/portage-utils/releases/tag/v0.90))\n* libarchive ([3.5.1](https://github.com/libarchive/libarchive/releases/tag/3.5.1))\n* xz-utils ([5.2.5](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=aade49443ad7ddba13bbfd9da188c99664736d80;hb=3247e95115acb95bc27f41e8cf4501db5b0b4309#l16))\n* tar ([1.34](https://savannah.gnu.org/forum/forum.php?forum_id=9935))\n* libuv ([1.41.1](https://github.com/libuv/libuv/releases/tag/v1.41.1))\n* tini ([0.19](https://github.com/krallin/tini/releases/tag/v0.19.0))\n* mit-krb5 ([1.19.2](https://github.com/krb5/krb5/tree/krb5-1.19.2-final))\n* SDK: dnsmasq ([2.85](https://thekelleys.org.uk/dnsmasq/CHANGELOG))\n* SDK: rust ([1.54](https://github.com/rust-lang/rust/releases/tag/1.54.0))\n\n_Changes since **Alpha 2983.0.0**_\n\n**Security fixes**\n\n\n\n* Linux([CVE-2021-3753](https://nvd.nist.gov/vuln/detail/CVE-2021-3753), [CVE-2021-3739](https://nvd.nist.gov/vuln/detail/CVE-2021-3739))\n\n**Updates**\n\n\n\n* Linux ([5.10.63](https://lwn.net/Articles/868663/))"
  },
  "2983.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-09-30 16:22:00 +0000",
    "major_software": {
      "docker": [
        "20.10.8"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.69"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "New **Beta** release **2983.1.1**\n\n_Changes since **Beta 2983.1.0**_\n\n**Security fixes**\n\n* Linux ([CVE-2021-41073](https://nvd.nist.gov/vuln/detail/CVE-2021-41073), [CVE-2020-16119](https://nvd.nist.gov/vuln/detail/CVE-2020-16119))\n\n**Updates**\n\n* Linux ([5.10.69](https://lwn.net/Articles/870544/))"
  },
  "2983.1.2": {
    "channel": "beta",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-10-25 15:56:14 +0000",
    "major_software": {
      "docker": [
        "20.10.9"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.75"
      ],
      "systemd": [
        "247"
      ]
    },
    "release_notes": "**Update to CGroupsV2**\n\nAs of Alpha version 2969.0.0, Flatcar Container Linux migrates to the unified cgroup hierarchy (aka CGroupsV2)! New nodes will utilize CGroupsV2 by default. Existing nodes remain on CGroupsV1 and need to be manually migrated to CGroupsV2. To learn more about CGroupsV2 on Flatcar Container Linux and the migration guide, please refer to[ https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/](https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/)\n\nNew **Beta** release **2983.1.2**\n\n_Changes since **Beta 2983.1.1**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-3764](https://nvd.nist.gov/vuln/detail/CVE-2021-3764), [CVE-2021-3744](https://nvd.nist.gov/vuln/detail/CVE-2021-3744), [CVE-2021-38300](https://nvd.nist.gov/vuln/detail/CVE-2021-38300), [CVE-2021-20321](https://nvd.nist.gov/vuln/detail/CVE-2021-20321), [CVE-2021-41864](https://nvd.nist.gov/vuln/detail/CVE-2021-41864))\n* Docker ([CVE-2021-41092](https://nvd.nist.gov/vuln/detail/CVE-2021-41092), [CVE-2021-41089](https://nvd.nist.gov/vuln/detail/CVE-2021-41089),[ CVE-2021-41091](https://nvd.nist.gov/vuln/detail/CVE-2021-41091))\n* containerd ([CVE-2021-41103](https://nvd.nist.gov/vuln/detail/CVE-2021-41103))\n\n**Bux fixes**\n\n\n\n* The tcsd service for TPM 1 is not started on machines with TPM 2 anymore where it fails and isn\u2019t necessary ([flatcar-linux/coreos-overlay#1364](https://github.com/flatcar/coreos-overlay/pull/1364))\n\n**Updates**\n\n\n\n* Linux ([5.10.75](https://lwn.net/Articles/873465/))\n* Docker ([20.10.9](https://docs.docker.com/engine/release-notes/#20109))\n* ca-certificates ([3.69.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_69_1.html#nss-3-69-1-release-notes))\n* containerd ([1.5.7](https://github.com/containerd/containerd/releases/tag/v1.5.7))"
  },
  "3033.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2021-11-09 06:39:46 +0000",
    "major_software": {
      "docker": [
        "20.10.10"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.77"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **Beta** release **3033.1.0**\n\n_Changes since **Alpha 3033.0.0**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-3760](https://nvd.nist.gov/vuln/detail/CVE-2021-3760), [CVE-2021-3772](https://nvd.nist.gov/vuln/detail/CVE-2021-3772), [CVE-2021-42327](https://nvd.nist.gov/vuln/detail/CVE-2021-42327), [CVE-2021-43056](https://nvd.nist.gov/vuln/detail/CVE-2021-43056), [CVE-2021-43267](https://nvd.nist.gov/vuln/detail/CVE-2021-43267), [CVE-2021-43389](https://nvd.nist.gov/vuln/detail/CVE-2021-43389))\n* Docker ([CVE-2021-41092](https://nvd.nist.gov/vuln/detail/CVE-2021-41092), [CVE-2021-41089](https://nvd.nist.gov/vuln/detail/CVE-2021-41089),[ CVE-2021-41091](https://nvd.nist.gov/vuln/detail/CVE-2021-41091))\n* Go ([CVE-2021-41771](https://nvd.nist.gov/vuln/detail/CVE-2021-41771),[ CVE-2021-41772](https://nvd.nist.gov/vuln/detail/CVE-2021-41772))\n\n**Changes**\n\n\n\n* Use https protocol instead of git for Github URLs ([flatcar-linux/coreos-overlay#1394](https://github.com/flatcar/coreos-overlay/pull/1394))\n\n**Updates**\n\n\n\n* Linux ([5.10.77](https://lwn.net/Articles/874852/))\n* docker ([20.10.10](https://docs.docker.com/engine/release-notes/#201010))\n* Go ([1.17.3](https://go.googlesource.com/go/+/refs/tags/go1.17.3))\n\n_Changes since **Beta 2983.1.2**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-3739](https://nvd.nist.gov/vuln/detail/CVE-2021-3739), [CVE-2021-3744](https://nvd.nist.gov/vuln/detail/CVE-2021-3744), [CVE-2021-3753](https://nvd.nist.gov/vuln/detail/CVE-2021-3753),[ CVE-2021-3760](https://nvd.nist.gov/vuln/detail/CVE-2021-3739), [CVE-2021-3764](https://nvd.nist.gov/vuln/detail/CVE-2021-3764), [CVE-2021-3772](https://nvd.nist.gov/vuln/detail/CVE-2021-3772), [CVE-2021-20321](https://nvd.nist.gov/vuln/detail/CVE-2021-20321), [CVE-2021-38300](https://nvd.nist.gov/vuln/detail/CVE-2021-38300), [CVE-2021-40490](https://nvd.nist.gov/vuln/detail/CVE-2021-40490), [CVE-2021-41864](https://nvd.nist.gov/vuln/detail/CVE-2021-41864), [CVE-2021-42327](https://nvd.nist.gov/vuln/detail/CVE-2021-42327), [CVE-2021-43056](https://nvd.nist.gov/vuln/detail/CVE-2021-43056), [CVE-2021-43267](https://nvd.nist.gov/vuln/detail/CVE-2021-43267), [CVE-2021-43389](https://nvd.nist.gov/vuln/detail/CVE-2021-43389))\n* Go ([CVE-2021-29923](https://nvd.nist.gov/vuln/detail/CVE-2021-29923), [CVE-2021-38297](https://nvd.nist.gov/vuln/detail/CVE-2021-38297), [CVE-2021-39293](https://nvd.nist.gov/vuln/detail/CVE-2021-39293), [CVE-2021-41771](https://nvd.nist.gov/vuln/detail/CVE-2021-41771),[ CVE-2021-41772](https://nvd.nist.gov/vuln/detail/CVE-2021-41772))\n* Docker ([CVE-2021-41092](https://nvd.nist.gov/vuln/detail/CVE-2021-41092), [CVE-2021-41089](https://nvd.nist.gov/vuln/detail/CVE-2021-41089),[ CVE-2021-41091](https://nvd.nist.gov/vuln/detail/CVE-2021-41091))\n* bash ([CVE-2019-9924](https://nvd.nist.gov/vuln/detail/CVE-2019-9924),[ CVE-2019-18276](https://nvd.nist.gov/vuln/detail/CVE-2019-18276))\n* binutils ([CVE-2021-3530](https://nvd.nist.gov/vuln/detail/CVE-2021-3530),[ CVE-2021-3549](https://nvd.nist.gov/vuln/detail/CVE-2021-3549))\n* containerd ([CVE-2021-41103](https://nvd.nist.gov/vuln/detail/CVE-2021-41103))\n* curl ([CVE-2021-22945](https://nvd.nist.gov/vuln/detail/CVE-2021-22945),[ CVE-2021-22946](https://nvd.nist.gov/vuln/detail/CVE-2021-22946),[ CVE-2021-22947](https://nvd.nist.gov/vuln/detail/CVE-2021-22947))\n* git ([CVE-2021-40330](https://nvd.nist.gov/vuln/detail/CVE-2021-40330))\n* glibc ([CVE-2021-38604](https://nvd.nist.gov/vuln/detail/CVE-2021-38604))\n* gnuPG ([CVE-2020-25125](https://nvd.nist.gov/vuln/detail/CVE-2020-25125))\n* libgcrypt ([CVE-2021-40528](https://nvd.nist.gov/vuln/detail/CVE-2021-40528))\n* nettle ([CVE-2021-20305](https://nvd.nist.gov/vuln/detail/CVE-2021-20305), [CVE-2021-3580](https://nvd.nist.gov/vuln/detail/CVE-2021-3580))\n* polkit ([CVE-2021-3560](https://nvd.nist.gov/vuln/detail/CVE-2021-3560))\n* sssd ([CVE-2018-16883](https://nvd.nist.gov/vuln/detail/CVE-2018-16883), [CVE-2019-3811](https://nvd.nist.gov/vuln/detail/CVE-2019-3811), [CVE-2018-16838](https://nvd.nist.gov/vuln/detail/CVE-2018-16838))\n* util-linux ([CVE-2021-37600](https://nvd.nist.gov/vuln/detail/CVE-2021-37600))\n* vim ([CVE-2021-3770](https://nvd.nist.gov/vuln/detail/CVE-2021-3770), [CVE-2021-3778](https://nvd.nist.gov/vuln/detail/CVE-2021-3778), [CVE-2021-3796](https://nvd.nist.gov/vuln/detail/CVE-2021-3796))\n* SDK: bison ([CVE-2020-14150](https://nvd.nist.gov/vuln/detail/CVE-2020-14150),[ CVE-2020-24240](https://nvd.nist.gov/vuln/detail/CVE-2020-24240))\n* SDK: perl ([CVE-2020-10878](https://nvd.nist.gov/vuln/detail/CVE-2020-10878))\n\n**Bug fixes**\n\n\n\n* toolbox: fixed support for multi-layered docker images ([flatcar-linux/toolbox#5](https://github.com/flatcar/toolbox/pull/5))\n* arm64: the Polkit service does not crash anymore. ([flatcar-linux/Flatcar#156](https://github.com/flatcar/Flatcar/issues/156))\n* The tcsd service for TPM 1 is not started on machines with TPM 2 anymore where it fails and isn\u2019t necessary. ([flatcar-linux/coreos-overlay#1365](https://github.com/flatcar/coreos-overlay/pull/1365))\n* Skip tcsd.service for TPM2 devices to fix failures on c3.small.x86 instances of Equinix Metal ([Flatcar#208](https://github.com/flatcar/Flatcar/issues/208))\n* Fixed locksmith adhering to reboot window when getting the etcd lock ([flatcar-linux/locksmith#10](https://github.com/flatcar/locksmith/pull/10))\n* Run emergency.target on `ignition/torcx` service unit failure in dracut ([bootengine#28](https://github.com/flatcar/bootengine/pull/28))\n\n**Changes**\n\n\n\n* Added GPIO support ([coreos-overlay#1236](https://github.com/flatcar/coreos-overlay/pull/1236))\n* Enabled SELinux in permissive mode on ARM64 ([coreos-overlay#1245](https://github.com/flatcar/coreos-overlay/pull/1245))\n* Added support for some alias commands from `bcc` ([flatcar-linux/coreos-overlay#1278](https://github.com/flatcar/coreos-overlay/pull/1278))\n\n**Updates**\n\n\n\n* Linux ([5.10.77](https://lwn.net/Articles/874852/))\n* Linux firmware ([20210919](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20210919))\n* Go ([1.17.3](https://go.googlesource.com/go/+/refs/tags/go1.17.3))\n* bash ([5.1_p8](https://lists.gnu.org/archive/html/info-gnu/2020-12/msg00003.html))\n* binutils ([2.37](https://sourceware.org/pipermail/binutils/2021-July/117384.html))\n* ca-certificates ([3.69.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_69_1.html#nss-3-69-1-release-notes))\n* containerd ([1.5.7](https://github.com/containerd/containerd/releases/tag/v1.5.7))\n* curl ([7.79.1](https://curl.se/changes.html#7_79_1))\n* duktape ([2.6.0](https://github.com/svaarala/duktape/blob/master/doc/release-notes-v2-6.rst))\n* ebtables ([2.0.11](https://lwn.net/Articles/806179/))\n* gawk ([5.1.0](https://lists.gnu.org/archive/html/info-gnu/2020-04/msg00007.html))\n* git ([2.32.0](https://github.com/git/git/blob/master/Documentation/RelNotes/2.32.0.txt))\n* gnuPG ([2.2.29](https://lists.gnupg.org/pipermail/gnupg-announce/2021q3/000461.html))\n* iptables ([1.8.7](https://lwn.net/Articles/843069/))\n* keyutils ([1.6.1](https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/tag/?h=v1.6.1))\n* libdnet ([1.14](https://github.com/ofalk/libdnet/releases/tag/libdnet-1.14))\n* libgcrypt ([1.9.4](https://dev.gnupg.org/T5402))\n* libmnl ([1.0.4](https://marc.info/?l=netfilter-devel&m=146745072727070&w=2))\n* libnftnl ([1.2.0](https://marc.info/?l=netfilter&m=162194376520385&w=2))\n* libtirpc ([1.3.2](https://www.spinics.net/lists/linux-nfs/msg84129.html))\n* ldb ([2.3.0](https://gitlab.com/samba-team/samba/-/tags/ldb-2.3.0))\n* lvm2 ([2.02.188](https://github.com/lvmteam/lvm2/releases/tag/v2_02_188))\n* nettle ([3.7.3](https://git.lysator.liu.se/nettle/nettle/-/blob/master/NEWS#L1-37))\n* net-tools ([2.10](https://sourceforge.net/p/net-tools/news/2021/01/net-tools-210-released/))\n* nftables ([0.9.9](https://lwn.net/Articles/857369/))\n* openssh ([8.7_p1-r1](https://www.openssh.com/txt/release-8.7))\n* polkit ([0.119](https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.119/NEWS))\n* realmd ([0.17.0](https://gitlab.freedesktop.org/realmd/realmd/-/tags/0.17.0))\n* sssd (2.3.1)\n* systemd ([249.4](https://github.com/systemd/systemd-stable/blob/v249.4/NEWS))\n* talloc ([2.3.2](https://gitlab.com/samba-team/samba/-/tags/talloc-2.3.2))\n* util-linux ([2.37.2](https://github.com/karelzak/util-linux/blob/v2.37.2/NEWS))\n* vim ([8.2.3428](https://github.com/vim/vim/releases/tag/v8.2.3428))\n* xenstore ([4.14.2](https://xenproject.org/downloads/xen-project-archives/xen-project-4-14-series/xen-project-4-14-2/))\n* SDK: bison (3.7.6)\n* SDK: perl ([5.34.0](https://perldoc.perl.org/perl5340delta))\n* SDK: rust ([1.55](https://github.com/rust-lang/rust/releases/tag/1.55.0))\n* VMWare: open-vm-tools ([11.3.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-11.3.5))"
  },
  "3033.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2021-11-25 11:11:55 +0000",
    "major_software": {
      "docker": [
        "20.10.11"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.10.80"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **Beta** Release **3033.1.1**\n\n_Changes since **Beta 3033.1.0**_\n\n**Security fixes**\n\n* Linux ([CVE-2021-42739](https://nvd.nist.gov/vuln/detail/CVE-2021-42739))\n* Docker, containerd ([CVE-2021-41190](https://nvd.nist.gov/vuln/detail/CVE-2021-41190))\n\n**Updates**\n\n* Linux ([5.10.80](https://lwn.net/Articles/876426/))\n* Docker ([20.10.11](https://docs.docker.com/engine/release-notes/#20111))\n* containerd ([1.5.8](https://github.com/containerd/containerd/releases/tag/v1.5.8))\n* ca-certificates ([3.72](https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/7O6a4NlaI2A))\n\n**Changes**\n\n* Added missing SELinux rule as initial step to resolve Torcx unpacking issue ([coreos-overlay#1426](https://github.com/flatcar/coreos-overlay/pull/1426))"
  },
  "3066.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2021-12-15 19:40:26 +0000",
    "major_software": {
      "docker": [
        "20.10.11"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.84"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **Beta** release **3066.1.0**\n\n_Changes since **Alpha 3066.0.0**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-4002](https://nvd.nist.gov/vuln/detail/CVE-2021-4002), [CVE-2020-27820](https://nvd.nist.gov/vuln/detail/CVE-2020-27820), [CVE-2021-4001](https://nvd.nist.gov/vuln/detail/CVE-2021-4001), [CVE-2021-43975](https://nvd.nist.gov/vuln/detail/CVE-2021-43975))\n* Go ([CVE-2021-44716](https://nvd.nist.gov/vuln/detail/CVE-2021-44716), [CVE-2021-44717](https://nvd.nist.gov/vuln/detail/CVE-2021-44717))\n* ca-certificates ([CVE-2021-43527](https://nvd.nist.gov/vuln/detail/CVE-2021-43527))\n\n**Bug Fixes**\n\n\n\n* Added configuration files for logrotate ([flatcar-linux/coreos-overlay#1442](https://github.com/flatcar/coreos-overlay/pull/1442))\n* Fixed `ETCD_NAME` conflicting with `--name` for `etcd-member` to start ([flatcar-linux/coreos-overlay#1444](https://github.com/flatcar/coreos-overlay/pull/1444))\n* The Torcx profile docker-1.12-no got fixed to reference the current Docker version instead of 19.03 which wasn't found on the image, causing Torcx to fail to provide Docker [flatcar-linux/coreos-overlay#1456](https://github.com/flatcar/coreos-overlay/pull/1456)\n* Fix vim warnings on missing file, when built with USE=\u201dminimal\u201d ([portage-stable#260](https://github.com/flatcar/portage-stable/pull/260))\n\n**Changes**\n\n\n\n* Added a new `flatcar-update` tool to the image to ease manual updates, rollbacks, channel/release jumping, and airgapped updates ([flatcar-linux/init#53](https://github.com/flatcar/init/pull/53))\n\n**Updates**\n\n\n\n* ca-certificates ([3.73](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_73.html))\n* runc ([1.0.3](https://github.com/opencontainers/runc/releases/tag/v1.0.3))\n* Go ([1.17.5](https://go.googlesource.com/go/+/refs/tags/go1.17.5))\n* Linux ([5.10.84](https://lwn.net/Articles/878041))\n\n_Changes since **Beta 3033.1.1**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-4002](https://nvd.nist.gov/vuln/detail/CVE-2021-4002), [CVE-2020-27820](https://nvd.nist.gov/vuln/detail/CVE-2020-27820), [CVE-2021-4001](https://nvd.nist.gov/vuln/detail/CVE-2021-4001), [CVE-2021-43975](https://nvd.nist.gov/vuln/detail/CVE-2021-43975))\n* Go ([CVE-2021-44716](https://nvd.nist.gov/vuln/detail/CVE-2021-44716), [CVE-2021-44717](https://nvd.nist.gov/vuln/detail/CVE-2021-44717))\n* ca-certificates ([CVE-2021-43527](https://nvd.nist.gov/vuln/detail/CVE-2021-43527))\n* Docker, containerd ([CVE-2021-41190](https://nvd.nist.gov/vuln/detail/CVE-2021-41190))\n* rsync ([CVE-2020-14387](https://nvd.nist.gov/vuln/detail/CVE-2020-14387))\n* SDK: u-boot-tools ([CVE-2021-27097](https://nvd.nist.gov/vuln/detail/CVE-2021-27097),[CVE-2021-27138](https://nvd.nist.gov/vuln/detail/CVE-2021-27138))\n\n**Changes:**\n\n\n\n* Added sgx group to /etc/group in baselayout ([baselayout#20](https://github.com/flatcar/baselayout/pull/20))\n* Added missing SELinux rule as initial step to resolve Torcx unpacking issue ([coreos-overlay#1426](https://github.com/flatcar/coreos-overlay/pull/1426))\n\n**Bug Fixes**\n\n\n\n* Skip `tcsd` for machine with TPM 2.0 ([flatcar-linux/coreos-overlay#1364](https://github.com/flatcar/coreos-overlay/pull/1364),[flatcar-linux/coreos-overlay#1365](https://github.com/flatcar/coreos-overlay/pull/1365))\n* Fix vim warnings on missing file, when built with USE=\u201dminimal\u201d ([portage-stable#260](https://github.com/flatcar/portage-stable/pull/260))\n* SDK: Add missing arm64 SDK keywords to profiles ([coreos-overlay#1407](https://github.com/flatcar/coreos-overlay/pull/1407))\n\n**Updates**\n\n\n\n* Openssl ([3.0.0](https://www.openssl.org/news/cl30.txt))\n* Docker ([20.10.11](https://docs.docker.com/engine/release-notes/#20111))\n* containerd ([1.5.8](https://github.com/containerd/containerd/releases/tag/v1.5.8))\n* btrfs-progs ([5.10.1](https://btrfs.wiki.kernel.org/index.php/Changelog#btrfs-progs_v5.10_.28Jan_2021.29))\n* dbus-glib ([0.112](https://gitlab.freedesktop.org/dbus/dbus-glib/-/tags/dbus-glib-0.112))\n* gmp ([6.2.1](https://gmplib.org/gmp6.2))\n* ignition ([0.36.1](https://github.com/flatcar/ignition/releases/tag/v0.36.1))\n* json-c ([0.15](https://github.com/json-c/json-c/wiki/Notes-for-v0.15-release))\n* libgpg-error ([1.42](https://dev.gnupg.org/T5194))\n* logrotate ([3.18.1](https://github.com/logrotate/logrotate/releases/tag/3.18.1))\n* p11-kit ([0.23.22](https://github.com/p11-glue/p11-kit/releases/tag/0.23.22))\n* popt ([1.18](https://github.com/rpm-software-management/popt/releases/tag/popt-1.18-release))\n* rpcsvc-proto ([1.4.2](https://github.com/thkukuk/rpcsvc-proto/releases/tag/v1.4.2))\n* SDK: crossdev ([20210621](https://gitweb.gentoo.org/proj/crossdev.git/commit/?id=b40ebcdb89f19d2fd0c563590f30d7574cfe0755))\n* SDK: gdbm ([1.20](https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00008.html))\n* SDK: man-pages-posix ([2017a](https://www.mail-archive.com/cygwin-announce@cygwin.com/msg09598.html))\n* SDK: miscfiles ([1.5](https://lists.gnu.org/archive/html/info-gnu/2010-11/msg00009.html))\n* SDK: pkgconf ([1.7.4](https://git.sr.ht/~kaniini/pkgconf/tree/458101e787a47378d2fc74c64f649fd3a5f75e55/item/NEWS))\n* SDK: swig ([4.0.2](https://sourceforge.net/p/swig/news/2020/06/swig-402-released/))\n* SDK: u-boot-tools ([2021.04_rc2](https://source.denx.de/u-boot/u-boot/-/tags/v2021.04-rc2))"
  },
  "3066.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-01-26 08:13:36 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.93"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **Beta** release **3066.1.1**\n\n_Changes since **Beta 3066.1.0**_\n\n#### Known issues:\n- The SELinux policy store update fix resulted in some files leaked to the root filesystem top directory ([flatcar-linux/Flatcar#596](https://github.com/flatcar/Flatcar/issues/596))\n\n#### Security fixes:\n\n- Linux ([CVE-2021-4135](https://nvd.nist.gov/vuln/detail/CVE-2021-4135), [CVE-2021-4155](https://nvd.nist.gov/vuln/detail/CVE-2021-4155), [CVE-2021-28711](https://nvd.nist.gov/vuln/detail/CVE-2021-28711), [CVE-2021-28712](https://nvd.nist.gov/vuln/detail/CVE-2021-28712), [CVE-2021-28713](https://nvd.nist.gov/vuln/detail/CVE-2021-28713), [CVE-2021-28714](https://nvd.nist.gov/vuln/detail/CVE-2021-28714), [CVE-2021-28715](https://nvd.nist.gov/vuln/detail/CVE-2021-28715), [CVE-2021-39685](https://nvd.nist.gov/vuln/detail/CVE-2021-39685), [CVE-2021-44733](https://nvd.nist.gov/vuln/detail/CVE-2021-44733), [CVE-2021-45095](https://nvd.nist.gov/vuln/detail/CVE-2021-45095), [CVE-2022-0185](https://nvd.nist.gov/vuln/detail/CVE-2022-0185))\n- ca-certificates ([CVE-2021-43527](https://nvd.nist.gov/vuln/detail/CVE-2021-43527))\n- containerd ([CVE-2021-43816](https://nvd.nist.gov/vuln/detail/CVE-2021-43816))\n- expat ([CVE-2021-45960](https://nvd.nist.gov/vuln/detail/CVE-2021-45960), [CVE-2021-46143](https://nvd.nist.gov/vuln/detail/CVE-2021-46143), [CVE-2022-22822](https://nvd.nist.gov/vuln/detail/CVE-2022-22822), [CVE-2022-22823](https://nvd.nist.gov/vuln/detail/CVE-2022-22823), [CVE-2022-22824](https://nvd.nist.gov/vuln/detail/CVE-2022-22824), [CVE-2022-22825](https://nvd.nist.gov/vuln/detail/CVE-2022-22825), [CVE-2022-22826](https://nvd.nist.gov/vuln/detail/CVE-2022-22826), [CVE-2022-22827](https://nvd.nist.gov/vuln/detail/CVE-2022-22827))\n\n#### Bug fixes:\n\n- Ensured that the `/run/xtables.lock` coordination file exists for modifications of the xtables backend from containers (must be bind-mounted) or the `iptables-legacy` binaries on the host ([flatcar-linux/init#57](https://github.com/flatcar/init/pull/57))\n- Excluded the Kubenet cbr0 interface from networkd\u2019s DHCP config and set it to Unmanaged to prevent interference and ensure that it is not part of the network online check ([flatcar-linux/init#55](https://github.com/flatcar/init/pull/55))\n- dev container: Fix github URL for coreos-overlay and portage-stable to use repos from flatcar-linux org directly instead of relying on redirects from the kinvolk org. This fixes checkouts with emerge-gitclone inside dev-container. ([flatcar-linux/scripts#194](https://github.com/flatcar/scripts/pull/194))\n- SDK: Fixed build error popping up in the new SDK Container because `policycoreutils` used the wrong ROOT to update the SELinux store ([flatcar-linux/coreos-overlay#1502](https://github.com/flatcar/coreos-overlay/pull/1502))\n\n#### Changes:\n\n- Backported `elf` support for `iproute2` ([flatcar-linux/coreos-overlay#1256](https://github.com/flatcar/coreos-overlay/pull/1526))\n\n#### Updates:\n\n- Linux ([5.10.93](https://lwn.net/Articles/881964)) (from 5.10.84)\n- ca-certificates ([3.74](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_74.html))\n- Docker ([20.10.12](https://docs.docker.com/engine/release-notes/#201012))\n- containerd ([1.5.9](https://github.com/containerd/containerd/releases/tag/v1.5.9))\n- expat ([2.4.3](https://github.com/libexpat/libexpat/blob/R_2_4_3/expat/Changes))\n"
  },
  "3066.1.2": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-02-09 10:02:57 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.96"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **Beta** Release **3066.1.2**\n\n_Changes since **Beta 3066.1.1**_\n\n#### Security fixes\n- Linux ([CVE-2021-43976](https://nvd.nist.gov/vuln/detail/CVE-2021-43976), [CVE-2022-0330](https://nvd.nist.gov/vuln/detail/CVE-2022-0330), [CVE-2022-22942](https://nvd.nist.gov/vuln/detail/CVE-2022-22942))\n- expat ([CVE-2022-23852](https://nvd.nist.gov/vuln/detail/CVE-2022-23852), [CVE-2022-23990](https://nvd.nist.gov/vuln/detail/CVE-2022-23990))\n- glibc ([CVE-2021-3998](https://nvd.nist.gov/vuln/detail/CVE-2021-3998), [CVE-2021-3999](https://nvd.nist.gov/vuln/detail/CVE-2021-3999), [CVE-2022-23218](https://nvd.nist.gov/vuln/detail/CVE-2022-23218), [CVE-2022-23219](https://nvd.nist.gov/vuln/detail/CVE-2022-23219))\n- polkit ([CVE-2021-4034](https://nvd.nist.gov/vuln/detail/CVE-2021-4034))\n\n\n#### Bug fixes\n- SDK: Fixed build error popping up in the new SDK Container because `policycoreutils` used the wrong ROOT to update the SELinux store ([flatcar-linux/coreos-overlay#1502](https://github.com/flatcar/coreos-overlay/pull/1502))\n- Fixed leak of SELinux policy store to the root filesystem top directory due to wrong store path in `policycoreutils` instead of `/var/lib/selinux` ([flatcar-linux/Flatcar#596](https://github.com/flatcar/Flatcar/issues/596))\n\n#### Updates\n- Linux ([5.10.96](https://lwn.net/Articles/883442)) (from 5.10.93)\n- Linux Firmware ([20211216](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20211216))\n- expat ([2.4.4](https://github.com/libexpat/libexpat/blob/R_2_4_4/expat/Changes))"
  },
  "3139.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-03-07 13:13:36 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.15.25"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **Beta** Release **3139.1.0**\n\n_Changes since **Alpha 3139.0.0**_\n\n#### Security fixes\n- Linux ([CVE-2022-0492](https://nvd.nist.gov/vuln/detail/CVE-2022-0492), [CVE-2022-0516](https://nvd.nist.gov/vuln/detail/CVE-2022-0516), [CVE-2022-0435](https://nvd.nist.gov/vuln/detail/CVE-2022-0435), [CVE-2022-0487](https://nvd.nist.gov/vuln/detail/CVE-2022-0487), [CVE-2022-25375](https://nvd.nist.gov/vuln/detail/CVE-2022-25375), [CVE-2022-25258](https://nvd.nist.gov/vuln/detail/CVE-2022-25258), [CVE-2022-0847](https://nvd.nist.gov/vuln/detail/CVE-2022-0847))\n- go ([CVE-2022-23806](https://nvd.nist.gov/vuln/detail/CVE-2022-23806), [CVE-2022-23772](https://nvd.nist.gov/vuln/detail/CVE-2022-23772), [CVE-2022-23773](https://nvd.nist.gov/vuln/detail/CVE-2022-23773))\n- expat ([CVE-2022-25235](https://nvd.nist.gov/vuln/detail/CVE-2022-25235), [CVE-2022-25236](https://nvd.nist.gov/vuln/detail/CVE-2022-25236), [CVE-2022-25313](https://nvd.nist.gov/vuln/detail/CVE-2022-25313), [CVE-2022-25314](https://nvd.nist.gov/vuln/detail/CVE-2022-25314), [CVE-2022-25315](https://nvd.nist.gov/vuln/detail/CVE-2022-25315))\n\n#### Bug fixes\n- Disabled the systemd-networkd settings `ManageForeignRoutes` and `ManageForeignRoutingPolicyRules` by default to ensure that CNIs like Cilium don't get their routes or routing policy rules discarded on network reconfiguration events ([Flatcar#620](https://github.com/flatcar/Flatcar/issues/620)).\n- Prevented hitting races when creating filesystems in Ignition, these races caused boot failures like `fsck[1343]: Failed to stat /dev/disk/by-label/ROOT: No such file or directory` when creating a btrfs root filesystem ([ignition#35](https://github.com/flatcar/ignition/pull/35))\n- Reverted the Linux kernel change to forbid xfrm id 0 for IPSec state because it broke Cilium ([Flatcar#626](https://github.com/flatcar/Flatcar/issues/626), [coreos-overlay#1682](https://github.com/flatcar/coreos-overlay/pull/1682))\n\n#### Changes\n- Added support for switching back to CGroupsV1 without requiring a reboot. Create `/etc/flatcar-cgroupv1` through ignition. ([coreos-overlay#1666](https://github.com/flatcar/coreos-overlay/pull/1666))\n\n#### Updates\n- Linux ([5.15.25](https://lwn.net/Articles/885896)) (from 5.15.19)\n- ca-certificates ([3.75](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_75.html))\n- Go ([1.17.7](https://go.googlesource.com/go/+/refs/tags/go1.17.7))\n- expat ([2.4.6](https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes))\n\n_Changes since **Beta 3066.1.2**_\n\n#### Security fixes\n- GCC ([CVE-2020-13844](https://nvd.nist.gov/vuln/detail/CVE-2020-13844))\n- Go ([CVE-2021-44716](https://nvd.nist.gov/vuln/detail/CVE-2021-44716), [CVE-2021-44717](https://nvd.nist.gov/vuln/detail/CVE-2021-44717), [CVE-2022-23806](https://nvd.nist.gov/vuln/detail/CVE-2022-23806), [CVE-2022-23772](https://nvd.nist.gov/vuln/detail/CVE-2022-23772), [CVE-2022-23773](https://nvd.nist.gov/vuln/detail/CVE-2022-23773))\n- containerd ([CVE-2021-43816](https://nvd.nist.gov/vuln/detail/CVE-2021-43816))\n- expat ([CVE-2022-25235](https://nvd.nist.gov/vuln/detail/CVE-2022-25235), [CVE-2022-25236](https://nvd.nist.gov/vuln/detail/CVE-2022-25236), [CVE-2022-25313](https://nvd.nist.gov/vuln/detail/CVE-2022-25313), [CVE-2022-25314](https://nvd.nist.gov/vuln/detail/CVE-2022-25314), [CVE-2022-25315](https://nvd.nist.gov/vuln/detail/CVE-2022-25315))\n- ignition ([CVE-2020-14040](https://nvd.nist.gov/vuln/detail/CVE-2020-14040), [CVE-2021-38561](https://nvd.nist.gov/vuln/detail/CVE-2021-38561))\n- krb5 ([CVE-2021-37750](https://nvd.nist.gov/vuln/detail/CVE-2021-37750))\n- libarchive ([libarchive-1565](https://github.com/libarchive/libarchive/issues/1565), [libarchive-1566](https://github.com/libarchive/libarchive/issues/1566))\n- openssh ([CVE-2021-41617](https://nvd.nist.gov/vuln/detail/CVE-2021-41617))\n- openssl ([CVE-2021-4044](https://nvd.nist.gov/vuln/detail/CVE-2021-4044))\n- torcx ([CVE-2021-38561](https://nvd.nist.gov/vuln/detail/CVE-2021-38561), [CVE-2021-43565](https://nvd.nist.gov/vuln/detail/CVE-2021-43565))\n- vim ([CVE-2021-3872](https://nvd.nist.gov/vuln/detail/CVE-2021-3872), [CVE-2021-3875](https://nvd.nist.gov/vuln/detail/CVE-2021-3875), [CVE-2021-3903](https://nvd.nist.gov/vuln/detail/CVE-2021-3903), [CVE-2021-3927](https://nvd.nist.gov/vuln/detail/CVE-2021-3927), [CVE-2021-3928](https://nvd.nist.gov/vuln/detail/CVE-2021-3928), [CVE-2021-3968](https://nvd.nist.gov/vuln/detail/CVE-2021-3968), [CVE-2021-3973](https://nvd.nist.gov/vuln/detail/CVE-2021-3973), [CVE-2021-3974](https://nvd.nist.gov/vuln/detail/CVE-2021-3974))\n- SDK: edk2-ovmf ([CVE-2019-14584](https://nvd.nist.gov/vuln/detail/CVE-2019-14584), [CVE-2021-28210](https://nvd.nist.gov/vuln/detail/CVE-2021-28210), [CVE-2021-28211](https://nvd.nist.gov/vuln/detail/CVE-2021-28211), [CVE-2021-28213](https://nvd.nist.gov/vuln/detail/CVE-2021-28213))\n- SDK: libxslt ([CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560))\n- SDK: mantle ([CVE-2021-3121](https://nvd.nist.gov/vuln/detail/CVE-2021-3121), [CVE-2021-38561](https://nvd.nist.gov/vuln/detail/CVE-2021-38561), [CVE-2021-43565](https://nvd.nist.gov/vuln/detail/CVE-2021-43565))\n- SDK: Rust ([CVE-2022-21658](https://nvd.nist.gov/vuln/detail/CVE-2022-21658))\n- SDK: QEMU ([CVE-2020-35504](https://nvd.nist.gov/vuln/detail/CVE-2020-35504), [CVE-2020-35505](https://nvd.nist.gov/vuln/detail/CVE-2020-35505), [CVE-2020-35506](https://nvd.nist.gov/vuln/detail/CVE-2020-35506), [CVE-2020-35517](https://nvd.nist.gov/vuln/detail/CVE-2020-35517), [CVE-2021-20203](https://nvd.nist.gov/vuln/detail/CVE-2021-20203), [CVE-2021-20255](https://nvd.nist.gov/vuln/detail/CVE-2021-20255), [CVE-2021-20257](https://nvd.nist.gov/vuln/detail/CVE-2021-20257), [CVE-2021-20263](https://nvd.nist.gov/vuln/detail/CVE-2021-20263), [CVE-2021-3409](https://nvd.nist.gov/vuln/detail/CVE-2021-3409), [CVE-2021-3416](https://nvd.nist.gov/vuln/detail/CVE-2021-3416), [CVE-2021-3527](https://nvd.nist.gov/vuln/detail/CVE-2021-3527), [CVE-2021-3544](https://nvd.nist.gov/vuln/detail/CVE-2021-3544), [CVE-2021-3545](https://nvd.nist.gov/vuln/detail/CVE-2021-3545), [CVE-2021-3546](https://nvd.nist.gov/vuln/detail/CVE-2021-3546), [CVE-2021-3582](https://nvd.nist.gov/vuln/detail/CVE-2021-3582), [CVE-2021-3607](https://nvd.nist.gov/vuln/detail/CVE-2021-3607), [CVE-2021-3608](https://nvd.nist.gov/vuln/detail/CVE-2021-3608), [CVE-2021-3682](https://nvd.nist.gov/vuln/detail/CVE-2021-3682))\n\n#### Bug fixes\n- Excluded the Kubenet cbr0 interface from networkd's DHCP config and set it to Unmanaged to prevent interference and ensure that it is not part of the network online check ([init#55](https://github.com/flatcar/init/pull/55))\n- Fixed the dracut emergency Ignition log printing that had a scripting error causing the cat command to fail ([bootengine#33](https://github.com/flatcar/bootengine/pull/33))\n- network: Accept ICMPv6 Router Advertisements to fix IPv6 address assignment in the default DHCP setting ([init#51](https://github.com/flatcar/init/pull/51), [coreos-cloudinit#12](https://github.com/flatcar/coreos-cloudinit/pull/12), [bootengine#30](https://github.com/flatcar/bootengine/pull/30))\n- flatcar-update: Stopped checking for the `USER` environment variable which may not be set in all environments, causing the script to fail unless a workaround was used like prepending an additional `sudo` invocation ([init#58](https://github.com/flatcar/init/pull/58))\n- Disabled the systemd-networkd settings `ManageForeignRoutes` and `ManageForeignRoutingPolicyRules` by default to ensure that CNIs like Cilium don't get their routes or routing policy rules discarded on network reconfiguration events ([Flatcar#620](https://github.com/flatcar/Flatcar/issues/620)).\n- Prevented hitting races when creating filesystems in Ignition, these races caused boot failures like `fsck[1343]: Failed to stat /dev/disk/by-label/ROOT: No such file or directory` when creating a btrfs root filesystem ([ignition#35](https://github.com/flatcar/ignition/pull/35))\n- Reverted the Linux kernel change to forbid xfrm id 0 for IPSec state because it broke Cilium ([Flatcar#626](https://github.com/flatcar/Flatcar/issues/626), [coreos-overlay#1682](https://github.com/flatcar/coreos-overlay/pull/1682))\n\n#### Changes\n- Update-engine now creates the `/run/reboot-required` flag file for [kured](https://github.com/weaveworks/kured) ([update_engine#15](https://github.com/flatcar/update_engine/pull/15))\n- Excluded special network interface devices like bridge, tunnel, vxlan, and veth devices from the default DHCP configuration to prevent networkd interference ([init#56](https://github.com/flatcar/init/pull/56))\n- Added CONFIG_NF_CT_NETLINK_HELPER (for libnetfilter_cthelper), CONFIG_NET_VRF (for virtual routing and forwarding) and CONFIG_KEY_DH_OPERATIONS (for keyutils) to the kernel config ([coreos-overlay#1524](https://github.com/flatcar/coreos-overlay/pull/1524))\n- Enabled the FIPS support for the Linux kernel, which users can now choose through a kernel parameter in `grub.cfg` (check it taking effect with `cat /proc/sys/crypto/fips_enabled`) ([coreos-overlay#1602](https://github.com/flatcar/coreos-overlay/pull/1602))\n- Added support for switching back to CGroupsV1 without requiring a reboot. Create `/etc/flatcar-cgroupv1` through ignition. ([coreos-overlay#1666](https://github.com/flatcar/coreos-overlay/pull/1666))\n- Removed the pre-shipped `/etc/flatcar/update.conf` file, leaving it totally to the user to define the contents as it was unnecessarily overwriting the `/use/share/flatcar/update.conf` ([flatcar-linux/scripts#212](https://github.com/flatcar/scripts/pull/212))\n\n#### Updates\n- Linux ([5.15.25](https://lwn.net/Articles/885895)) (from 5.10.96)\n- GCC ([9.4.0](https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00000.html))\n- Go ([1.17.7](https://go.googlesource.com/go/+/refs/tags/go1.17.7))\n- ca-certificates ([3.75](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_75.html))\n- systemd ([249.7](https://github.com/systemd/systemd-stable/blob/v249.7/NEWS))\n- acl ([2.3.1](https://git.savannah.nongnu.org/cgit/acl.git/log/?h=v2.3.1))\n- attr ([2.5.1](https://git.savannah.nongnu.org/cgit/attr.git/log/?h=v2.5.1))\n- audit ([3.0.6](https://listman.redhat.com/archives/linux-audit/2021-October/msg00000.html))\n- boost ([1.76.0](https://www.boost.org/users/history/version_1_76_0.html))\n- btrfs-progs ([5.15.1](https://btrfs.wiki.kernel.org/index.php/Changelog#btrfs-progs_v5.15_.28Nov_2021.29))\n- coreutils ([8.32](https://lists.gnu.org/archive/html/coreutils-announce/2020-03/msg00000.html))\n- diffutils ([3.8](https://lists.gnu.org/archive/html/info-gnu/2021-08/msg00000.html))\n- ethtool ([5.10](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v5.10))\n- expat ([2.4.6](https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes))\n- findutils ([4.8.0](https://savannah.gnu.org/forum/forum.php?forum_id=9914))\n- glib ([2.68.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.68.4))\n- i2c-tools ([4.2](https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/log/?h=v4.2))\n- iproute2 ([5.15](https://lwn.net/ml/linux-kernel/20211101164705.6f4f2e41%40hermes.local/))\n- ipset ([7.11](https://ipset.netfilter.org/changelog.html))\n- ipvsadm ([1.27](http://archive.linuxvirtualserver.org/html/lvs-devel/2013-09/msg00011.html))\n- iputils ([20210722](https://github.com/iputils/iputils/releases/tag/20210722))\n- kmod ([29](https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/commit/?id=b6ecfc916a17eab8f93be5b09f4e4f845aabd3d1))\n- libarchive ([3.5.2](https://github.com/libarchive/libarchive/releases/tag/v3.5.2))\n- libcap-ng ([0.8.2](https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.2))\n- libseccomp ([2.5.1](https://github.com/seccomp/libseccomp/releases/tag/v2.5.1))\n- lshw ([02.19.2b_p20210121](https://www.ezix.org/project/wiki/HardwareLiSter#Changes))\n- lsof ([4.94.0](https://github.com/lsof-org/lsof/releases/tag/4.94.0))\n- openssh ([8.8](http://www.openssh.com/txt/release-8.8))\n- openssl ([3.0.1](https://www.openssl.org/news/changelog.html#openssl-30))\n- parted ([3.4](https://savannah.gnu.org/forum/forum.php?forum_id=9924) (includes [3.3](https://savannah.gnu.org/forum/forum.php?forum_id=9569)))\n- pciutils ([3.7.0](https://github.com/pciutils/pciutils/commit/864aecdea9c7db626856d8d452f6c784316a878c))\n- polkit ([0.120](https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.120/NEWS))\n- runc ([1.1.0](https://github.com/opencontainers/runc/releases/tag/v1.1.0))\n- sbsigntools ([0.9.4](https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/tag/?h=v0.9.4))\n- sed ([4.8](https://savannah.gnu.org/forum/forum.php?forum_id=9647))\n- usbutils ([014](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/commit/?id=57fb18e59cce31a50a1ca62d1e192512c905ba00))\n- vim ([8.2.3582](https://github.com/vim/vim/releases/tag/v8.2.3582))\n- Azure: Python for OEM images ([3.9.8](https://www.python.org/downloads/release/python-398/))\n- SDK: Linux headers ([5.15](https://lwn.net/Articles/876611/))\n- SDK: edk2-ovmf ([202105](https://github.com/tianocore/edk2/releases/tag/edk2-stable202105))\n- SDK: file ([5.40](https://mailman.astron.com/pipermail/file/2021-March/000478.html))\n- SDK: ipxe ([1.21.1](https://github.com/ipxe/ipxe/releases/tag/v1.21.1))\n- SDK: mantle ([0.18.0](https://github.com/flatcar/mantle/releases/tag/v0.18.0))\n- SDK: perf ([5.15](https://kernelnewbies.org/LinuxChanges#Linux_5.15.Tracing.2C_perf_and_BPF))\n- SDK: Python ([3.9.8](https://www.python.org/downloads/release/python-398/))\n- SDK: Rust ([1.58.1](https://github.com/rust-lang/rust/releases/tag/1.58.1))\n- SDK: QEMU ([6.1.0](https://wiki.qemu.org/ChangeLog/6.1))\n- SDK: seabios ([1.14.0](https://seabios.org/Releases#SeaBIOS_1.14.0))\n- SDK: sgabios ([0.1_pre10](https://git.qemu.org/?p=sgabios.git;a=tree;h=a85446adb0e0))\n"
  },
  "3139.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-03-23 13:34:49 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.15.30"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **Beta** Release **3139.1.1**\n\n**Changes since Beta-3139.1.0**\n\n#### Security fixes\n- Linux ([CVE-2022-25636](https://nvd.nist.gov/vuln/detail/CVE-2022-25636))\n- Go ([CVE-2022-24921](https://nvd.nist.gov/vuln/detail/CVE-2022-24921))\n- systemd ([CVE-2021-3997](https://nvd.nist.gov/vuln/detail/CVE-2021-3997))\n- containerd ([CVE-2022-23648](https://nvd.nist.gov/vuln/detail/CVE-2022-23648))\n- openssl ([CVE-2022-0778](https://nvd.nist.gov/vuln/detail/CVE-2022-0778))\n\n#### Bug fixes\n- Reverted the Linux kernel commit which broke networking on AWS instances which use Intel 82559 NIC (c4/m4) ([Flatcar#665](https://github.com/flatcar/Flatcar/issues/665), [coreos-overlay#1723](https://github.com/flatcar/coreos-overlay/pull/1723))\n- Re-added the `brd drbd nbd rbd xen-blkfront zram libarc4 lru_cache zsmalloc` kernel modules to the initramfs since they were missing compared to the Flatcar 3033.2.x releases where the 5.10 kernel is used ([bootengine#40](https://github.com/flatcar/bootengine/pull/40))\n\n#### Changes\n- (none)\n\n#### Updates\n- Linux ([5.15.30](https://lwn.net/Articles/888521) (from 5.15.25, includes [5.15.26](https://lwn.net/Articles/886569), [5.15.27](https://lwn.net/Articles/887219), [5.15.28](https://lwn.net/Articles/887638), [5.15.29](https://lwn.net/Articles/888116)))\n- Go ([1.17.8](https://go.googlesource.com/go/+/refs/tags/go1.17.8))\n- systemd ([249.10](https://github.com/systemd/systemd-stable/releases/tag/v249.10))\n- ca-certificates ([3.76](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_76.html))\n- containerd ([1.5.10](https://github.com/containerd/containerd/releases/tag/v1.5.10))\n- openssl ([3.0.2](https://www.openssl.org/news/changelog.html#openssl-30))\n"
  },
  "3185.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-04-07 12:04:52 +0000",
    "major_software": {
      "docker": [
        "20.10.13"
      ],
      "ignition": [
        "2.13.0"
      ],
      "kernel": [
        "5.15.32"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "New **Beta** Release **3185.1.0**\n\n_Changes since **Beta 3139.1.1**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-1015](https://nvd.nist.gov/vuln/detail/CVE-2022-1015), [CVE-2022-1016](https://nvd.nist.gov/vuln/detail/CVE-2022-1016))\n- cifs-utils ([CVE-2021-20208](https://nvd.nist.gov/vuln/detail/CVE-2021-20208))\n- containerd ([CVE-2022-23648](https://nvd.nist.gov/vuln/detail/CVE-2022-23648))\n- cryptsetup ([CVE-2021-4122](https://nvd.nist.gov/vuln/detail/CVE-2021-4122))\n- duktape ([CVE-2021-46322](https://nvd.nist.gov/vuln/detail/CVE-2021-46322))\n- intel-microcode ([CVE-2021-0127](https://nvd.nist.gov/vuln/detail/CVE-2021-0127), [CVE-2021-0146](https://nvd.nist.gov/vuln/detail/CVE-2021-0146))\n- libarchive ([CVE-2021-31566](https://nvd.nist.gov/vuln/detail/CVE-2021-31566), [CVE-2021-36976](https://nvd.nist.gov/vuln/detail/CVE-2021-36976))\n- libxml2 ([CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308))\n- nvidia-drivers ([CVE-2022-21814](https://nvd.nist.gov/vuln/detail/CVE-2022-21814), [CVE-2022-21813](https://nvd.nist.gov/vuln/detail/CVE-2022-21813))\n- shadow ([CVE-2013-4235](https://nvd.nist.gov/vuln/detail/CVE-2013-4235))\n- systemd ([CVE-2021-3997](https://nvd.nist.gov/vuln/detail/CVE-2021-3997))\n- vim ([CVE-2021-3984](https://nvd.nist.gov/vuln/detail/CVE-2021-3984), [CVE-2021-4019](https://nvd.nist.gov/vuln/detail/CVE-2021-4019), [CVE-2021-4069](https://nvd.nist.gov/vuln/detail/CVE-2021-4069), [CVE-2021-4136](https://nvd.nist.gov/vuln/detail/CVE-2021-4136), [CVE-2021-4173](https://nvd.nist.gov/vuln/detail/CVE-2021-4173),[ CVE-2021-4166](https://nvd.nist.gov/vuln/detail/CVE-2021-4166), [CVE-2021-4187](https://nvd.nist.gov/vuln/detail/CVE-2021-4187), [CVE-2021-4192](https://nvd.nist.gov/vuln/detail/CVE-2021-4192), [CVE-2021-4193](https://nvd.nist.gov/vuln/detail/CVE-2021-4193), [CVE-2022-0128](https://nvd.nist.gov/vuln/detail/CVE-2022-0128), [CVE-2022-0156](https://nvd.nist.gov/vuln/detail/CVE-2022-0156), [CVE-2022-0158](https://nvd.nist.gov/vuln/detail/CVE-2022-0158), [CVE-2022-0213](https://nvd.nist.gov/vuln/detail/CVE-2022-0213), [CVE-2022-0261](https://nvd.nist.gov/vuln/detail/CVE-2022-0261), [CVE-2022-0318](https://nvd.nist.gov/vuln/detail/CVE-2022-0318), [CVE-2022-0319](https://nvd.nist.gov/vuln/detail/CVE-2022-0319), [CVE-2022-0351](https://nvd.nist.gov/vuln/detail/CVE-2022-0351), [CVE-2022-0359](https://nvd.nist.gov/vuln/detail/CVE-2022-0359), [CVE-2022-0361](https://nvd.nist.gov/vuln/detail/CVE-2022-0361), [CVE-2022-0368](https://nvd.nist.gov/vuln/detail/CVE-2022-0368), [CVE-2022-0392](https://nvd.nist.gov/vuln/detail/CVE-2022-0392), [CVE-2022-0393](https://nvd.nist.gov/vuln/detail/CVE-2022-0393), [CVE-2022-0407](https://nvd.nist.gov/vuln/detail/CVE-2022-0407), [CVE-2022-0408](https://nvd.nist.gov/vuln/detail/CVE-2022-0408), [CVE-2022-0413](https://nvd.nist.gov/vuln/detail/CVE-2022-0413), [CVE-2022-0417](https://nvd.nist.gov/vuln/detail/CVE-2022-0417), [CVE-2022-0443](https://nvd.nist.gov/vuln/detail/CVE-2022-0443))\n- SDK: squashfs-tools ([CVE-2021-40153](https://nvd.nist.gov/vuln/detail/CVE-2021-40153), [CVE-2021-41072](https://nvd.nist.gov/vuln/detail/CVE-2021-41072))\n\n#### Bug fixes:\n\n- AWS: specify correct console (ttyS0) on kernel command line for ARM64 instances ([coreos-overlay#1628](https://github.com/flatcar/coreos-overlay/pull/1628))\n- Made Ignition write the SSH keys into a file under `authorized_keys.d/ignition` again and added a call to `update-ssh-keys` after Ignition ran to create the merged `authorized_keys` file, which fixes the problem that keys added by Ignition get lost when `update-ssh-keys` runs ([init#66](https://github.com/flatcar/init/pull/66))\n\n#### Changes:\n\n- Added `auditd.service` but left it disabled by default, a custom configuration can be created by removing `/etc/audit/auditd.conf` and replacing it with an own file ([coreos-overlay#1636](https://github.com/flatcar/coreos-overlay/pull/1636))\n- The systemd-networkd `ManageForeignRoutes` and `ManageForeignRoutingPolicyRules` settings are now disabled through a drop-in file and thus can only be enabled again by a drop-in file under `/etc/systemd/networkd.conf.d/` because drop-in files take precedence over `/etc/systemd/networkd.conf` ([init#61](https://github.com/flatcar/init/pull/61))\n- Bring in dependencies for NFS4 with Kerberos both in kernel and userspace. Tested against NFS4.1 server. ([coreos-overlay#1664](https://github.com/flatcar/coreos-overlay/pull/1664))\n- Merge the Flatcar Pro features into the regular Flatcar images ([coreos-overlay#1679](https://github.com/flatcar/coreos-overlay/pull/1679))\n- Besides Ignition v1 and v2 configurations, Ignition configurations with specification v3 (up to 3.3.0) are now supported, see the [docs section for details](https://www.flatcar.org/docs/latest/provisioning/ignition/specification/#ignition-v3)\n- Made SELinux enabled by default in default containerd configuration file. ([coreos-overlay#1699](https://github.com/flatcar/coreos-overlay/pull/1699))\n- Removed rngd.service because it is not essential anymore for the kernel to boot fast in VM environments ([coreos-overlay#1700](https://github.com/flatcar/coreos-overlay/pull/1700))\n- Enabled `systemd-sysext.service` to activate systemd-sysext images on boot, to disable you will need to mask it. Also added a helper service `ensure-sysext.service` which reloads the systemd units to reevaluate the `sockets`, `timers`, and `multi-user` targets when `systemd-sysext.service` is (re)started, making it possible to enable units that are part of a sysext image ([coreos-overlay#65](https://github.com/flatcar/init/pull/65))\n- For amd64 `/usr/lib` used to be a symlink to `/usr/lib64` but now they became two separate folders as common in other distributions (and was the case for arm64 already). Compatibility symlinks exist in case `/usr/lib64` was used to access, e.g., the `modules` folder or the `systemd` folder ([coreos-overlay#1713](https://github.com/flatcar/coreos-overlay/pull/1713), [scripts#255](https://github.com/flatcar/scripts/pull/255))\n- Enabled FIPS mode for cryptsetup ([coreos-overlay#1747](https://github.com/flatcar/coreos-overlay/pull/1747))\n- Added `cryptsetup` to the initramfs for the Ignition `luks` directive ([flatcar-linux/coreos-overlay#1760](https://github.com/flatcar/coreos-overlay/pull/1760))\n- Enabled FIPS mode for cryptsetup ([portage-stable#312](https://github.com/flatcar/portage-stable/pull/312))\n- Defined a systemd-sysext level that sysext images can match for instead of the OS version when they don't have a strong coupling, meaning the only metadata required is `SYSEXT_LEVEL=1.0` and `ID=flatcar` ([Flatcar#643](https://github.com/flatcar/Flatcar/issues/643))\n- Azure: Azure VHD disks are now created using subformat=fixed, which makes them suitable for immediate upload to Azure using any tool.\n- DigitalOcean: In addition to the `bz2` image, a `gz` compressed image is published. This helps against hitting the compression timeout that sometimes lets the image import fail.\n- OpenStack: In addition to the `bz2` image, a `gz` compressed image is published. This allows Glance to directly consume the images by simply passing in the URL of the image.\n- SDK: The image compression format is now configurable. Supported formats are: `bz2`, `gz`, `zip`, `none`, `zst`. Selecting the image format can now be done by passing the `--image_compression_formats` option. This flag gets a comma separated list of formats.\n\n#### Updates:\n\n- Linux ([5.15.32](https://lwn.net/Articles/889438)) (from 5.15.30)\n- Linux Firmware ([20220310](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220310))\n- Docker ([20.10.13](https://docs.docker.com/engine/release-notes/#201013))\n- bpftool ([5.15.8](https://lwn.net/Articles/878631/))\n- bridge-utils ([1.7.1](https://git.kernel.org/pub/scm/network/bridge/bridge-utils.git/log/?h=v1.7.1))\n- ca-certificates ([3.77](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html))\n- cifs-utils ([6.13](https://lkml.kernel.org/linux-cifs/CAKywueSqRGSFmeDHQacyu831BNUeGFxGg3vgBmozzhkGBCjyXQ@mail.gmail.com/T/))\n- containerd ([1.6.1](https://github.com/containerd/containerd/releases/tag/v1.6.1))\n- cryptsetup ([2.4.3](https://lore.kernel.org/all/572c18a7bf60cb1b0f67c3a03c531d7e7ed31832.camel@scientia.net/T/))\n- dosfstools ([4.2](https://github.com/dosfstools/dosfstools/releases/tag/v4.2))\n- duktape ([2.7.0](https://github.com/svaarala/duktape/releases/tag/v2.7.0))\n- gcc ([10.3.0](https://gcc.gnu.org/gcc-10/changes.html))\n- grep ([3.7](https://savannah.gnu.org/forum/forum.php?forum_id=10037))\n- ignition ([2.13.0](https://github.com/coreos/ignition/releases/tag/v2.13.0))\n- intel-microcode ([20220207_p20220207](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207))\n- iperf ([3.10.1](https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-3101-2021-06-03))\n- kexec-tools ([2.0.22](https://www.spinics.net/lists/kexec/msg26864.html))\n- less ([590](https://www.greenwoodsoftware.com/less/news.590.html))\n- libarchive ([3.5.3](https://github.com/libarchive/libarchive/releases/tag/v3.5.3))\n- libmspack ([0.10.1_alpha](https://github.com/kyz/libmspack/blob/v0.10.1alpha/libmspack/ChangeLog))\n- libxml2 ([2.9.13](http://www.xmlsoft.org/news.html))\n- lsscsi ([0.32](https://sg.danny.cz/scsi/lsscsi.ChangeLog))\n- nfs-utils ([2.5.4](https://lore.kernel.org/linux-fsdevel/c8795653-7728-18a4-93dc-58943ad0fe09@redhat.com/))\n- nvidia-drivers ([510.47.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-47-03/index.html))\n- nvme-cli ([1.16](https://github.com/linux-nvme/nvme-cli/commits/deee9cae1ac94760deebd71f8e5449061338666c))\n- pam ([1.5.1_p20210622](https://github.com/linux-pam/linux-pam/commit/fe1307512fb8892b5ceb3d884c793af8dbd4c16a))\n- pambase (20220214)\n- pinentry ([1.2.0](https://dev.gnupg.org/T5566))\n- quota ([4.06](https://sourceforge.net/p/linuxquota/code/ci/0acd4cc6275122fd9864cb7b5d349e65a2622920/))\n- rpcbind ([1.2.6](https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_6))\n- shadow ([4.11.1](https://github.com/shadow-maint/shadow/releases/tag/v4.11.1))\n- socat ([1.7.4.3](https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.3:/CHANGES))\n- systemd ([250.3](https://github.com/systemd/systemd-stable/releases/tag/v250.3))\n- thin-provisioning-tools ([0.9.0](https://github.com/jthornber/thin-provisioning-tools/blob/d6d93c3157631b242a13a81d30f75453e576c55a/CHANGES#L1-L9))\n- timezone-data ([2021a](https://mm.icann.org/pipermail/tz-announce/2021-January/000065.html))\n- vim ([8.2.4328](https://github.com/vim/vim/releases/tag/v8.2.4328))\n- whois ([5.5.11](https://github.com/rfc1036/whois/commit/5f5ba8312c04a759dad05723c035549273d07461))\n- xfsprogs ([5.14.2](https://marc.info/?l=linux-xfs&m=163883318025390&w=2))\n- Azure: WALinuxAgent ([2.6.0.2](https://github.com/Azure/WALinuxAgent/releases/tag/v2.6.0.2))\n- VMWare: open-vm-tools ([12.0.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.0))\n- SDK: gcc-config ([2.5](https://gitweb.gentoo.org/proj/gcc-config.git/tag/?h=v2.5))\n- SDK: iasl ([20200717](https://www.acpica.org/node/183))\n- SDK: man-db ([2.9.4](https://gitlab.com/cjwatson/man-db/-/tags/2.9.4))\n- SDK: man-pages ([5.12-r2](https://man7.org/linux/man-pages/changelog.html#release_5.12))\n- SDK: netperf ([2.7.0](https://github.com/HewlettPackard/netperf/blob/netperf-2.7.0/Release_Notes))\n- SDK: Rust ([1.59.0](https://github.com/rust-lang/rust/releases/tag/1.59.0))\n- SDK: squashfs-tools ([4.5_p20210914](https://lore.kernel.org/lkml/CAB3woddJss+ziGp-RjJ-yiax6pc_HLMdxk3Qk5nJdRgjpEYWBg@mail.gmail.com/))\n\n_Changes since **Alpha 3185.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-1015](https://nvd.nist.gov/vuln/detail/CVE-2022-1015), [CVE-2022-1016](https://nvd.nist.gov/vuln/detail/CVE-2022-1016))\n\n#### Bug fixes:\n\n- Made Ignition write the SSH keys into a file under `authorized_keys.d/ignition` again and added a call to `update-ssh-keys` after Ignition ran to create the merged `authorized_keys` file, which fixes the problem that keys added by Ignition get lost when `update-ssh-keys` runs ([init#66](https://github.com/flatcar/init/pull/66))\n\n#### Changes:\n\n- Enabled FIPS mode for cryptsetup ([flatcar-linux/coreos-overlay#1747](https://github.com/flatcar/coreos-overlay/pull/1747))\n- Added `cryptsetup` to the initramfs for the Ignition `luks` directive ([flatcar-linux/coreos-overlay#1760](https://github.com/flatcar/coreos-overlay/pull/1760))\n- Enabled FIPS mode for cryptsetup ([portage-stable#312](https://github.com/flatcar/portage-stable/pull/312))\n\n#### Updates:\n\n- Linux ([5.15.32](https://lwn.net/Articles/889438)) (from 5.15.30)\n- ca-certificates ([3.77](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html))\n"
  },
  "3185.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-05-09 14:42:03 +0000",
    "major_software": {
      "docker": [
        "20.10.13"
      ],
      "ignition": [
        "2.13.0"
      ],
      "kernel": [
        "5.15.37"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "New **Beta** Release **3185.1.1**\n\n_Changes since **Beta 3185.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390), [CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168), [CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158), [CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353), [CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198), [CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389), [CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388), [CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516), [CVE-2022-1263](https://nvd.nist.gov/vuln/detail/CVE-2022-1263), [CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582), [CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204), [CVE-2022-1205](https://nvd.nist.gov/vuln/detail/CVE-2022-1205), [CVE-2022-0500](https://nvd.nist.gov/vuln/detail/CVE-2022-0500), [CVE-2022-23222](https://nvd.nist.gov/vuln/detail/CVE-2022-23222))\n- Go ([CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675))\n\n#### Bug fixes:\n\n- GCE: Restored oem-gce.service functionality on GCP ([coreos-overlay#1813](https://github.com/flatcar/coreos-overlay/pull/1813))\n- Skipped starting `ensure-sysext.service` if `systemd-sysext.service` won't be started, to prevent reporting a dependency failure ([Flatcar#710](https://github.com/flatcar/Flatcar/issues/710))\n- Added a remount action as `systemd-sysext.service` drop-in unit to restore the OEM partition mount after the overlay mounts in `/usr` are done ([init#69](https://github.com/flatcar/init/pull/69))\n- Added pahole to developer container, without it kernel modules built against /usr/src/linux may fail to probe with an 'invalid relocation target' error ([coreos-overlay#1839](https://github.com/flatcar/coreos-overlay/pull/1839))\n\n#### Changes:\n\n- GCE: Enabled GVE kernel driver, which adds support for Google Virtual NIC on GCP ([coreos-overlay#1802](https://github.com/flatcar/coreos-overlay/pull/1802))\n- Azure: Set up `/etc/hostname` from instance metadata with Afterburn\n- AWS EC2: Removed the setup of `/etc/hostname` from the instance metadata because it used a long FQDN but we can just use use the hostname set via DHCP ([Flatcar#707](https://github.com/flatcar/Flatcar/issues/707))\n- SDK: Dropped the mantle binaries (kola, ore, etc.) from the SDK, they are now provided by the `ghcr.io/flatcar/mantle` image ([coreos-overlay#1827](https://github.com/flatcar/coreos-overlay/pull/1827), [scripts#275](https://github.com/flatcar/scripts/pull/275))\n\n#### Updates:\n\n- Linux ([5.15.37](https://lwn.net/Articles/893264) (includes [5.15.36](https://lwn.net/Articles/892812), [5.15.35](https://lwn.net/Articles/892002), [5.15.34](https://lwn.net/Articles/891251), [5.15.33](https://lwn.net/Articles/890722)))\n- Go ([1.17.9](https://go.googlesource.com/go/+/refs/tags/go1.17.9))\n- ca-certificates ([3.78](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html))\n- GCE: google compute-image-packages ([20190124](https://github.com/GoogleCloudPlatform/compute-image-packages/releases/tag/20190124))"
  },
  "3227.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-06-02 15:06:28 +0000",
    "major_software": {
      "docker": [
        "20.10.14"
      ],
      "ignition": [
        "2.13.0"
      ],
      "kernel": [
        "5.15.43"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "New **Beta** Release **3227.1.0**\n\n_Changes since **Beta 3185.1.1**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-1734](https://nvd.nist.gov/vuln/detail/CVE-2022-1734), [CVE-2022-28893](https://nvd.nist.gov/vuln/detail/CVE-2022-28893), [CVE-2022-1012](https://nvd.nist.gov/vuln/detail/CVE-2022-1012), [CVE-2022-1729](https://nvd.nist.gov/vuln/detail/CVE-2022-1729))\n- Go ([CVE-2022-29526](https://nvd.nist.gov/vuln/detail/CVE-2022-29526))\n- containerd ([CVE-2022-24769](https://nvd.nist.gov/vuln/detail/CVE-2022-24769))\n- gnutls ([CVE-2021-4209](https://nvd.nist.gov/vuln/detail/CVE-2021-4209), [GNUTLS-SA-2022-01-17](https://gitlab.com/gnutls/gnutls/-/issues/1277))\n- gzip,xz-utils ([CVE-2022-1271](https://nvd.nist.gov/vuln/detail/CVE-2022-1271))\n- libarchive ([CVE-2022-26280](https://nvd.nist.gov/vuln/detail/CVE-2022-26280))\n- nvidia-drivers ([CVE-2022-28181](https://nvd.nist.gov/vuln/detail/CVE-2022-28181), [CVE-2022-28183](https://nvd.nist.gov/vuln/detail/CVE-2022-28183), [CVE-2022-28184](https://nvd.nist.gov/vuln/detail/CVE-2022-28184), [CVE-2022-28185](https://nvd.nist.gov/vuln/detail/CVE-2022-28185))\n- util-linux ([CVE-2021-3995](https://nvd.nist.gov/vuln/detail/CVE-2021-3995), [CVE-2021-3996](https://nvd.nist.gov/vuln/detail/CVE-2021-3996), [CVE-2022-0563](https://nvd.nist.gov/vuln/detail/CVE-2022-0563))\n- zlib ([CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032))\n\n#### Bug fixes:\n\n- Ensured `/etc/flatcar/update.conf` exists because it happens to be used as flag file for Ansible ([init#71](https://github.com/flatcar/init/pull/71))\n- Fixed Ignition's OEM ID to be `metal` to follow the Ignition upstream change which otherwise resulted in a broken boot when the Flatcar OEM ID `pxe` was used ([bootengine#45](https://github.com/flatcar/bootengine/pull/45))\n- Added `networkd` translation to `files` section when converting from Ignition 2.x to Ignition 3.x ([coreos-overlay#1910](https://github.com/flatcar/coreos-overlay/pull/1910), [flatcar#741](https://github.com/flatcar/Flatcar/issues/741))\n- GCP: Fixed shutdown script execution ([coreos-overlay#1912](https://github.com/flatcar/coreos-overlay/pull/1912), [flatcar#743](https://github.com/flatcar/Flatcar/issues/743))\n\n#### Changes:\n\n- Enabled `CONFIG_INTEL_RAPL` on AMD64 Kernel config to compile `intel_rapl_common` module in order to allow power monitoring on modern Intel processors ([flatcar#coreos-overlay#1801](https://github.com/flatcar/coreos-overlay/pull/1801))\n\n#### Updates:\n\n- Linux ([5.15.43](https://lwn.net/Articles/896231/) (includes [5.15.42](https://lwn.net/Articles/896226), [5.15.41](https://lwn.net/Articles/895645), [5.15.40](https://lwn.net/Articles/895318), [5.15.39](https://lwn.net/Articles/895070), [5.15.38](https://lwn.net/Articles/894357)))\n- Linux Firmware ([20220411](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220411))\n- Go ([1.17.10](https://go.googlesource.com/go/+/refs/tags/go1.17.10))\n- afterburn ([5.2.0](https://github.com/coreos/afterburn/releases/tag/v5.2.0))\n- bind-tools ([9.16.27](https://gitlab.isc.org/isc-projects/bind9/-/blob/v9_16_27/CHANGES))\n- conntrack-tools ([1.4.6](https://lists.netfilter.org/pipermail/netfilter-announce/2020/000240.html))\n- containerd ([1.6.3](https://github.com/containerd/containerd/releases/tag/v1.6.3) (includes [1.6.2](https://github.com/containerd/containerd/releases/tag/v1.6.2)))\n- Docker ([20.10.14](https://docs.docker.com/engine/release-notes/#201014))\n- e2fsprogs ([1.46.4](http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.4))\n- elfutils ([0.186](https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=490932ae4ef9b5a3af01d2c8c616f14d57586046;hb=983e86fd89e8bf02f2d27ba5dce5bf078af4ceda))\n- gnutls ([3.7.3](https://gitlab.com/gnutls/gnutls/-/merge_requests/1517))\n- gzip ([1.12](https://savannah.gnu.org/forum/forum.php?forum_id=10157) (includes [1.11](https://lists.gnu.org/archive/html/info-gnu/2021-09/msg00002.html)))\n- jansson ([2.14](https://github.com/akheron/jansson/blob/v2.14/CHANGES))\n- libarchive [3.6.1](https://github.com/libarchive/libarchive/releases/tag/v3.6.1)\n- libbsd ([0.11.3](https://gitlab.freedesktop.org/libbsd/libbsd/-/commits/0.11.3/))\n- libnetfilter_queue ([1.0.5](https://git.netfilter.org/libnetfilter_queue/log/?h=libnetfilter_queue-1.0.5))\n- libpcap ([1.10.1](https://git.tcpdump.org/libpcap/blob/c7642e2cc0c5bd65754685b160d25dc23c76c6bd:/CHANGES))\n- libtasn1 ([4.17.0](https://gitlab.com/gnutls/libtasn1/-/blob/v4.17.0/NEWS))\n- liburing ([2.1](https://github.com/axboe/liburing/commits/liburing-2.1))\n- mdadm ([4.2](https://lore.kernel.org/all/28fdbc45-96ca-7cdb-3ced-a5f65d978048@trained-monkey.org/T/))\n- multipath-tools ([0.8.7](https://github.com/opensvc/multipath-tools/commits/0.8.7))\n- nghttp2 ([1.45.1](https://github.com/nghttp2/nghttp2/releases/tag/v1.45.1))\n- nvidia-drivers ([510.73.05](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-73-05/index.html))\n- oniguruma ([6.9.7.1](https://github.com/kkos/oniguruma/releases/tag/v6.9.7.1))\n- open-isns ([0.101](https://github.com/open-iscsi/open-isns/blob/v0.101/ChangeLog))\n- pcre2 ([10.39](https://github.com/PhilipHazel/pcre2/blob/pcre2-10.39/NEWS))\n- runc ([1.1.1](https://github.com/opencontainers/runc/releases/tag/v1.1.1))\n- tcpdump ([4.99.1](https://git.tcpdump.org/tcpdump/blob/5f552b5e6e9fe05f7ad9681d51d0303233daba6a:/CHANGES))\n- unzip ([6.0_p26](https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-26_changelog))\n- util-linux ([2.37.4](https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.4-ChangeLog))\n- zlib ([1.2.12](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/ChangeLog#L4)) \n- SDK: Rust ([1.60.0](https://github.com/rust-lang/rust/releases/tag/1.60.0))\n\n\n_Changes since **Alpha 3227.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-1734](https://nvd.nist.gov/vuln/detail/CVE-2022-1734), [CVE-2022-28893](https://nvd.nist.gov/vuln/detail/CVE-2022-28893), [CVE-2022-1012](https://nvd.nist.gov/vuln/detail/CVE-2022-1012), [CVE-2022-1729](https://nvd.nist.gov/vuln/detail/CVE-2022-1729))\n- Go ([CVE-2022-29526](https://nvd.nist.gov/vuln/detail/CVE-2022-29526))\n- nvidia-drivers ([CVE-2022-28181](https://nvd.nist.gov/vuln/detail/CVE-2022-28181), [CVE-2022-28183](https://nvd.nist.gov/vuln/detail/CVE-2022-28183), [CVE-2022-28184](https://nvd.nist.gov/vuln/detail/CVE-2022-28184), [CVE-2022-28185](https://nvd.nist.gov/vuln/detail/CVE-2022-28185))\n\n#### Bug fixes:\n\n- Ensured `/etc/flatcar/update.conf` exists because it happens to be used as flag file for Ansible ([init#71](https://github.com/flatcar/init/pull/71))\n- Fixed Ignition's OEM ID to be `metal` to follow the Ignition upstream change which otherwise resulted in a broken boot when the Flatcar OEM ID `pxe` was used ([bootengine#45](https://github.com/flatcar/bootengine/pull/45))\n- Added `networkd` translation to `files` section when converting from Ignition 2.x to Ignition 3.x ([coreos-overlay#1910](https://github.com/flatcar/coreos-overlay/pull/1910), [flatcar#741](https://github.com/flatcar/Flatcar/issues/741))\n- GCP: Fixed shutdown script execution ([coreos-overlay#1912](https://github.com/flatcar/coreos-overlay/pull/1912), [flatcar#743](https://github.com/flatcar/Flatcar/issues/743))\n\n\n#### Updates:\n\n- Linux ([5.15.43](https://lwn.net/Articles/896231/) (includes [5.15.42](https://lwn.net/Articles/896226), [5.15.41](https://lwn.net/Articles/895645), [5.15.40](https://lwn.net/Articles/895318), [5.15.39](https://lwn.net/Articles/895070), [5.15.38](https://lwn.net/Articles/894357)))\n- Go ([1.17.10](https://go.googlesource.com/go/+/refs/tags/go1.17.10))\n- nvidia-drivers ([510.73.05](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-73-05/index.html))\n"
  },
  "3227.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-06-23 11:46:15 +0000",
    "major_software": {
      "containerd": [
        "1.6.6"
      ],
      "docker": [
        "20.10.14"
      ],
      "ignition": [
        "2.13.0"
      ],
      "kernel": [
        "5.15.48"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "New **Beta** Release **3227.1.1**\n\nChanges since **Beta 3227.1.0**\n\n#### Security fixes:\n\n- Linux ([CVE-2022-1789](https://nvd.nist.gov/vuln/detail/CVE-2022-1789), [CVE-2022-1852](https://nvd.nist.gov/vuln/detail/CVE-2022-1852), [CVE-2022-1972](https://nvd.nist.gov/vuln/detail/CVE-2022-1972), [CVE-2022-1973](https://nvd.nist.gov/vuln/detail/CVE-2022-1973), [CVE-2022-2078](https://nvd.nist.gov/vuln/detail/CVE-2022-2078), [CVE-2022-32250](https://nvd.nist.gov/vuln/detail/CVE-2022-32250), [CVE-2022-32981](https://nvd.nist.gov/vuln/detail/CVE-2022-32981))\n- containerd ([CVE-2022-31030](https://nvd.nist.gov/vuln/detail/CVE-2022-31030))\n- libpcre2 ([CVE-2022-1586](https://nvd.nist.gov/vuln/detail/CVE-2022-1586), [CVE-2022-1587](https://nvd.nist.gov/vuln/detail/CVE-2022-1587))\n\n#### Changes:\n\n- ARM64: Added [cifs-utils](https://wiki.samba.org/index.php/LinuxCIFS_utils) for ARM64\n- ARM64: Added [sssd](https://sssd.io/), [adcli](https://www.freedesktop.org/software/realmd/adcli/adcli.html) and realmd for ARM64\n- SDK / ARM64: Added [go-tspi](https://pkg.go.dev/github.com/coreos/go-tspi) bindings for ARM64\n\n#### Updates:\n\n- Linux ([5.15.48](https://lwn.net/Articles/898124) (includes [5.15.47](https://lwn.net/Articles/897904), [5.15.46](https://lwn.net/Articles/897377), [5.15.45](https://lwn.net/Articles/897167), [5.15.44](https://lwn.net/Articles/896647)))\n- ca-certificates ([3.79](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_79.html))\n- containerd ([1.6.6](https://github.com/containerd/containerd/releases/tag/v1.6.6))\n- libpcre2 ([10.40](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.40/NEWS))"
  },
  "3277.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-07-21 15:29:48 +0000",
    "major_software": {
      "containerd": [
        "1.6.6"
      ],
      "docker": [
        "20.10.17"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.55"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "New **Beta** Release **3277.1.0**\n\n_Changes since **Alpha 3277.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2021-33655](https://nvd.nist.gov/vuln/detail/CVE-2021-33655), [CVE-2022-2318](https://nvd.nist.gov/vuln/detail/CVE-2022-2318), [CVE-2022-26365](https://nvd.nist.gov/vuln/detail/CVE-2022-26365), [CVE-2022-33740](https://nvd.nist.gov/vuln/detail/CVE-2022-33740), [CVE-2022-33741](https://nvd.nist.gov/vuln/detail/CVE-2022-33741), [CVE-2022-33742](https://nvd.nist.gov/vuln/detail/CVE-2022-33742), [CVE-2022-33743](https://nvd.nist.gov/vuln/detail/CVE-2022-33743), [CVE-2022-33744](https://nvd.nist.gov/vuln/detail/CVE-2022-33744), [CVE-2022-34918](https://nvd.nist.gov/vuln/detail/CVE-2022-34918))\n- Go ([CVE-2022-1705](https://nvd.nist.gov/vuln/detail/CVE-2022-1705), [CVE-2022-1962](https://nvd.nist.gov/vuln/detail/CVE-2022-1962), [CVE-2022-28131](https://nvd.nist.gov/vuln/detail/CVE-2022-28131), [CVE-2022-30630](https://nvd.nist.gov/vuln/detail/CVE-2022-30630), [CVE-2022-30631](https://nvd.nist.gov/vuln/detail/CVE-2022-30631), [CVE-2022-30632](https://nvd.nist.gov/vuln/detail/CVE-2022-30632), [CVE-2022-30633](https://nvd.nist.gov/vuln/detail/CVE-2022-30633), [CVE-2022-30635](https://nvd.nist.gov/vuln/detail/CVE-2022-30635), [CVE-2022-32148](https://nvd.nist.gov/vuln/detail/CVE-2022-32148))\n\n#### Bug fixes:\n\n- The Ignition v3 kargs directive failed before when used with the generic image where no `grub.cfg` exists, this was fixed by creating it first ([bootengine#47](https://github.com/flatcar/bootengine/pull/47))\n\n#### Updates:\n- Linux ([5.15.55](https://lwn.net/Articles/901380) (includes [5.15.54](https://lwn.net/Articles/900911), [5.15.53](https://lwn.net/Articles/900321), [5.15.52](https://lwn.net/Articles/899788), [5.15.51](https://lwn.net/Articles/899370), [5.15.50](https://lwn.net/Articles/899091), [5.15.49](https://lwn.net/Articles/898622)))\n- ca-certificates ([3.80](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_80.html))\n- Go ([1.18.4](https://go.dev/doc/devel/release#go1.18.4))\n\n\n\n_Changes since **Beta 3227.1.1**_\n\n#### Security fixes:\n\n- Linux ([CVE-2021-33655](https://nvd.nist.gov/vuln/detail/CVE-2021-33655), [CVE-2022-2318](https://nvd.nist.gov/vuln/detail/CVE-2022-2318), [CVE-2022-26365](https://nvd.nist.gov/vuln/detail/CVE-2022-26365), [CVE-2022-33740](https://nvd.nist.gov/vuln/detail/CVE-2022-33740), [CVE-2022-33741](https://nvd.nist.gov/vuln/detail/CVE-2022-33741), [CVE-2022-33742](https://nvd.nist.gov/vuln/detail/CVE-2022-33742), [CVE-2022-33743](https://nvd.nist.gov/vuln/detail/CVE-2022-33743), [CVE-2022-33744](https://nvd.nist.gov/vuln/detail/CVE-2022-33744), [CVE-2022-34918](https://nvd.nist.gov/vuln/detail/CVE-2022-34918))\n- curl ([CVE-2022-22576](https://nvd.nist.gov/vuln/detail/CVE-2022-22576), [CVE-2022-27774](https://nvd.nist.gov/vuln/detail/CVE-2022-27774), [CVE-2022-27775](https://nvd.nist.gov/vuln/detail/CVE-2022-27775), [CVE-2022-27776](https://nvd.nist.gov/vuln/detail/CVE-2022-27776), [CVE-2022-27778](https://nvd.nist.gov/vuln/detail/CVE-2022-27778), [CVE-2022-27779](https://nvd.nist.gov/vuln/detail/CVE-2022-27779), [CVE-2022-27780](https://nvd.nist.gov/vuln/detail/CVE-2022-27780), [CVE-2022-27781](https://nvd.nist.gov/vuln/detail/CVE-2022-27781), [CVE-2022-27782](https://nvd.nist.gov/vuln/detail/CVE-2022-27782), [CVE-2022-30115](https://nvd.nist.gov/vuln/detail/CVE-2022-30115))\n- docker ([CVE-2022-29526](https://nvd.nist.gov/vuln/detail/CVE-2022-29526))\n- git ([CVE-2022-24765](https://nvd.nist.gov/vuln/detail/CVE-2022-24765))\n- go ([CVE-2022-1705](https://nvd.nist.gov/vuln/detail/CVE-2022-1705), [CVE-2022-1962](https://nvd.nist.gov/vuln/detail/CVE-2022-1962), [CVE-2022-28131](https://nvd.nist.gov/vuln/detail/CVE-2022-28131), [CVE-2022-30630](https://nvd.nist.gov/vuln/detail/CVE-2022-30630), [CVE-2022-30631](https://nvd.nist.gov/vuln/detail/CVE-2022-30631), [CVE-2022-30632](https://nvd.nist.gov/vuln/detail/CVE-2022-30632), [CVE-2022-30633](https://nvd.nist.gov/vuln/detail/CVE-2022-30633), [CVE-2022-30635](https://nvd.nist.gov/vuln/detail/CVE-2022-30635), [CVE-2022-32148](https://nvd.nist.gov/vuln/detail/CVE-2022-32148), [CVE-2022-29526](https://nvd.nist.gov/vuln/detail/CVE-2022-29526))\n- ignition ([CVE-2022-1706](https://nvd.nist.gov/vuln/detail/CVE-2022-1706))\n- intel-microcode ([CVE-2022-21151](https://nvd.nist.gov/vuln/detail/CVE-2022-21151)) \n- libxml2 ([CVE-2022-29824](https://nvd.nist.gov/vuln/detail/CVE-2022-29824))\n- ncurses ([CVE-2022-29458](https://nvd.nist.gov/vuln/detail/CVE-2022-29458))\n- openssl ([CVE-2022-1292](https://nvd.nist.gov/vuln/detail/CVE-2022-1292), [CVE-2022-1343](https://nvd.nist.gov/vuln/detail/CVE-2022-1343), [CVE-2022-1434](https://nvd.nist.gov/vuln/detail/CVE-2022-1434), [CVE-2022-1473](https://nvd.nist.gov/vuln/detail/CVE-2022-1473))\n- rsync ([CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032))\n- runc ([CVE-2022-29162](https://nvd.nist.gov/vuln/detail/CVE-2022-29162))\n- torcx ([CVE-2022-27191](https://nvd.nist.gov/vuln/detail/CVE-2022-27191))\n- SDK: qemu ([CVE-2021-20203](https://nvd.nist.gov/vuln/detail/CVE-2021-20203), [CVE-2021-3713](https://nvd.nist.gov/vuln/detail/CVE-2021-3713), [CVE-2021-3930](https://nvd.nist.gov/vuln/detail/CVE-2021-3930), [CVE-2021-3947](https://nvd.nist.gov/vuln/detail/CVE-2021-3947), [CVE-2021-4145](https://nvd.nist.gov/vuln/detail/CVE-2021-4145), [CVE-2022-26353](https://nvd.nist.gov/vuln/detail/CVE-2022-26353), [CVE-2022-26354](https://nvd.nist.gov/vuln/detail/CVE-2022-26354))\n\n#### Bug fixes:\n\n- The Ignition v3 kargs directive failed before when used with the generic image where no `grub.cfg` exists, this was fixed by creating it first ([bootengine#47](https://github.com/flatcar/bootengine/pull/47))\n\n#### Changes:\n\n- Added efibootmgr binary to the image ([coreos-overlay#1955](https://github.com/flatcar/coreos-overlay/pull/1955))\n- Added VMware networking configuration in the initramfs via guestinfo settings ([bootengine#44](https://github.com/flatcar/bootengine/pull/44), [flatcar#717](https://github.com/flatcar/Flatcar/issues/717))\n- Enabled `containerd.service` unit, `br_netfilter` and `overlay` modules by default to follow Kubernetes requirements ([coreos-overlay#1944](https://github.com/flatcar/coreos-overlay/pull/1944), [init#72](https://github.com/flatcar/init/pull/72))\n- flatcar-install: Added option to create UEFI boot entry ([init#74](https://github.com/flatcar/init/pull/74))\n- VMWare: Added `ignition-delete-config.service` to remove Ignition config from VM metadata, see also [here](https://coreos.github.io/ignition/operator-notes/#automatic-config-deletion) ([coreos-overlay#1948](https://github.com/flatcar/coreos-overlay/pull/1948))\n\n#### Updates:\n\n- Linux ([5.15.55](https://lwn.net/Articles/901380) (includes [5.15.54](https://lwn.net/Articles/900911), [5.15.53](https://lwn.net/Articles/900321), [5.15.52](https://lwn.net/Articles/899788), [5.15.51](https://lwn.net/Articles/899370), [5.15.50](https://lwn.net/Articles/899091), [5.15.49](https://lwn.net/Articles/898622)))\n- Linux Firmware ([20220610](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220610))\n- Docker ([20.10.17](https://docs.docker.com/engine/release-notes/#201017))\n- Go ([1.18.4](https://go.dev/doc/devel/release#go1.18.4))\n- ca-certificates ([3.80](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_80.html))\n- curl [7.83.1](https://curl.se/mail/lib-2022-05/0010.html)\n- dbus ([1.12.22](https://gitlab.freedesktop.org/dbus/dbus/-/blob/177ab044bc87cbc4ded75d21b900795a6fefef76/NEWS))\n- e2fsprogs ([1.46.5](http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.5))\n- gdbm ([1.22](https://lists.gnu.org/archive/html/info-gnu/2021-10/msg00006.html))\n- git ([2.35.3](https://github.com/git/git/blob/v2.35.3/Documentation/RelNotes/2.35.3.txt))\n- ignition ([2.14.0](https://github.com/coreos/ignition/releases/tag/v2.14.0))\n- intel-microcode ([20220510](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220510)) \n- ldb ([2.4.1](https://gitlab.com/samba-team/samba/-/commit/a795e0c84597aa045d011e663dbad3cdabf0f1e6))\n- libxml2 ([2.9.14](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14))\n- ncurses ([6.3_p20220423](https://lists.gnu.org/archive/html/info-gnu/2021-11/msg00001.html))\n- open-vm-tools ([12.0.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.5))\n- openssl ([3.0.3](https://www.openssl.org/news/changelog.html#openssl-30))\n- python ([3.9.12](https://www.python.org/downloads/release/python-3912/))\n- rsync ([3.2.4](https://download.samba.org/pub/rsync/NEWS.html#3.2.4))\n- runc ([1.1.3](https://github.com/opencontainers/runc/releases/tag/v1.1.3))\n- samba ([4.15.4](https://www.samba.org/samba/history/samba-4.15.4.html))\n- sqlite ([3.38.1](https://www.sqlite.org/releaselog/3_38_1.html))\n- talloc ([2.3.3](https://gitlab.com/samba-team/samba/-/commit/bc1ee7ca0640f0136e5af7dcc4ca8ed0a5893053))\n- tevent ([0.11.0](https://gitlab.com/samba-team/samba/-/commit/de4e8a1af9564f6056f9af90867c2f013449051c))\n- new: acpid ([2.0.33](https://sourceforge.net/p/acpid2/code/ci/2.0.33/tree/Changelog))\n- OEM: distro ([1.7.0](https://github.com/python-distro/distro/releases/tag/v1.7.0))\n- OEM: python ([3.9.12](https://www.python.org/downloads/release/python-3912/))\n- SDK: qemu ([7.0.0](https://wiki.qemu.org/ChangeLog/7.0))\n- SDK: Rust ([1.61.0](https://github.com/rust-lang/rust/releases/tag/1.61.0))"
  },
  "3277.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-08-04 12:08:33 +0000",
    "major_software": {
      "containerd": [
        "1.6.6"
      ],
      "docker": [
        "20.10.17"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.58"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "New Beta Release 3277.1.1\n\nChanges since Beta 3277.1.0\n\n## Security fixes:\n\n- Linux ([CVE-2022-23816](https://nvd.nist.gov/vuln/detail/CVE-2022-23816), [CVE-2022-23825](https://nvd.nist.gov/vuln/detail/CVE-2022-23825), [CVE-2022-29900](https://nvd.nist.gov/vuln/detail/CVE-2022-29900), [CVE-2022-29901](https://nvd.nist.gov/vuln/detail/CVE-2022-29901))\n\n## Bug fixes:\n\n- Added support for Openstack for cloud-init activation ([flatcar-linux/init#76](https://github.com/flatcar/init/pull/76))\n- Excluded Wireguard interface from `systemd-networkd` default management ([Flatcar#808](https://github.com/flatcar/Flatcar/issues/808))\n- Fixed `/etc/resolv.conf` symlink by pointing it at `resolv.conf` instead of `stub-resolv.conf`. This bug was present since the update to systemd v250 ([coreos-overlay#2057](https://github.com/flatcar/coreos-overlay/pull/2057))\n- Fixed excluded interface type from default systemd-networkd configuration ([flatcar-linux/init#78](https://github.com/flatcar/init/pull/78))\n- Fixed space escaping in the `networkd` Ignition translation ([Flatcar#812](https://github.com/flatcar/Flatcar/issues/812))\n\n## Changes:\n\n\n## Updates:\n\n- Linux ([5.15.58](https://lwn.net/Articles/902917) (includes [5.15.57](https://lwn.net/Articles/902317), [5.15.56](https://lwn.net/Articles/902101)))\n- ca-certificates ([3.81](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_81.html))\n"
  },
  "3277.1.2": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-09-01 13:01:56 +0000",
    "major_software": {
      "containerd": [
        "1.6.6"
      ],
      "docker": [
        "20.10.17"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.63"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "_Changes since **Beta 3277.1.1**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-1679](https://nvd.nist.gov/vuln/detail/CVE-2022-1679), [CVE-2022-2585](https://nvd.nist.gov/vuln/detail/CVE-2022-2585), [CVE-2022-2586](https://nvd.nist.gov/vuln/detail/CVE-2022-2586), [CVE-2022-2588](https://nvd.nist.gov/vuln/detail/CVE-2022-2588), [CVE-2022-26373](https://nvd.nist.gov/vuln/detail/CVE-2022-26373), [CVE-2022-36946](https://nvd.nist.gov/vuln/detail/CVE-2022-36946))\n\n#### Bug fixes:\n\n- AWS: added EKS support for version 1.22 and 1.23. ([coreos-overlay#2110](https://github.com/flatcar/coreos-overlay/pull/2110), [Flatcar#829](https://github.com/flatcar/Flatcar/issues/829))\n- VMWare: excluded `wireguard` (and others) from `systemd-networkd` management. ([init#80](https://github.com/flatcar/init/pull/80))\n\n#### Changes:\n\n- The new image signing subkey was added to the public key embedded into `flatcar-install` (the old expired on 10th August 2022), only an updated `flatcar-install` script can verify releases signed with the new key ([init#79](https://github.com/flatcar/init/pull/79))\n- AWS: Added AWS IMDSv2 support to coreos-cloudinit ([flatcar-linux/coreos-cloudinit#13](https://github.com/flatcar/coreos-cloudinit/pull/13))\n\n#### Updates:\n\n- Linux ([5.15.63](https://lwn.net/Articles/906061) (includes [5.15.62](https://lwn.net/Articles/905533), [5.15.61](https://lwn.net/Articles/904959), [5.15.60](https://lwn.net/Articles/904461), [5.15.59](https://lwn.net/Articles/903688))\n- ca-certificates ([3.82](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_82.html))\n"
  },
  "3346.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-10-04 12:19:52 +0000",
    "major_software": {
      "containerd": [
        "1.6.8"
      ],
      "docker": [
        "20.10.17"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.70"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "_Changes since **Beta 3277.1.2**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-0171](https://nvd.nist.gov/vuln/detail/CVE-2022-0171), [CVE-2022-2663](https://nvd.nist.gov/vuln/detail/CVE-2022-2663), [CVE-2022-2905](https://nvd.nist.gov/vuln/detail/CVE-2022-2905), [CVE-2022-3028](https://nvd.nist.gov/vuln/detail/CVE-2022-3028), [CVE-2022-3061](https://nvd.nist.gov/vuln/detail/CVE-2022-3061), [CVE-2022-3176](https://nvd.nist.gov/vuln/detail/CVE-2022-3176), [CVE-2022-3303](https://nvd.nist.gov/vuln/detail/CVE-2022-3303), [CVE-2022-39190](https://nvd.nist.gov/vuln/detail/CVE-2022-39190), [CVE-2022-39842](https://nvd.nist.gov/vuln/detail/CVE-2022-39842), [CVE-2022-40307](https://nvd.nist.gov/vuln/detail/CVE-2022-40307))\n- Go ([CVE-2022-27664](https://nvd.nist.gov/vuln/detail/CVE-2022-27664), [CVE-2022-32190](https://nvd.nist.gov/vuln/detail/CVE-2022-32190), ([CVE-2022-32189](https://nvd.nist.gov/vuln/detail/CVE-2022-32189)))\n- binutils ([CVE-2021-45078](https://nvd.nist.gov/vuln/detail/CVE-2021-45078))\n- cifs-utils ([CVE-2022-27239](https://nvd.nist.gov/vuln/detail/CVE-2022-27239), [CVE-2022-29869](https://nvd.nist.gov/vuln/detail/CVE-2022-29869))\n- curl ([CVE-2022-32205](https://nvd.nist.gov/vuln/detail/CVE-2022-32205), [CVE-2022-32206](https://nvd.nist.gov/vuln/detail/CVE-2022-32206), [CVE-2022-32207](https://nvd.nist.gov/vuln/detail/CVE-2022-32207), [CVE-2022-32208](https://nvd.nist.gov/vuln/detail/CVE-2022-32208))\n- expat ([CVE-2022-40674](https://nvd.nist.gov/vuln/detail/CVE-2022-40674))\n- git ([CVE-2022-29187](https://nvd.nist.gov/vuln/detail/CVE-2022-29187))\n- gnupg ([CVE-2022-34903](https://nvd.nist.gov/vuln/detail/CVE-2022-34903))\n- gnutls ([CVE-2022-2509](https://nvd.nist.gov/vuln/detail/CVE-2022-2509))\n- libtirpc ([CVE-2021-46828](https://nvd.nist.gov/vuln/detail/CVE-2021-46828))\n- oniguruma ([oniguruma-20220430](https://bugs.gentoo.org/841893))\n- open-vm-tools ([CVE-2022-31676](https://nvd.nist.gov/vuln/detail/CVE-2022-31676))\n- shadow ([CVE-2013-4235](https://nvd.nist.gov/vuln/detail/CVE-2013-4235))\n- vim ([CVE-2022-0629](https://nvd.nist.gov/vuln/detail/CVE-2022-0629), [CVE-2022-0685](https://nvd.nist.gov/vuln/detail/CVE-2022-0685), [CVE-2022-0714](https://nvd.nist.gov/vuln/detail/CVE-2022-0714), [CVE-2022-0729](https://nvd.nist.gov/vuln/detail/CVE-2022-0729), [CVE-2022-0943](https://nvd.nist.gov/vuln/detail/CVE-2022-0943), [CVE-2022-1154](https://nvd.nist.gov/vuln/detail/CVE-2022-1154), [CVE-2022-1160](https://nvd.nist.gov/vuln/detail/CVE-2022-1160), [CVE-2022-1381](https://nvd.nist.gov/vuln/detail/CVE-2022-1381), [CVE-2022-1420](https://nvd.nist.gov/vuln/detail/CVE-2022-1420), [CVE-2022-1616](https://nvd.nist.gov/vuln/detail/CVE-2022-1616), [CVE-2022-1619](https://nvd.nist.gov/vuln/detail/CVE-2022-1619), [CVE-2022-1620](https://nvd.nist.gov/vuln/detail/CVE-2022-1620), [CVE-2022-1621](https://nvd.nist.gov/vuln/detail/CVE-2022-1621), [CVE-2022-1629](https://nvd.nist.gov/vuln/detail/CVE-2022-1629), [CVE-2022-1674](https://nvd.nist.gov/vuln/detail/CVE-2022-1674), [CVE-2022-1733](https://nvd.nist.gov/vuln/detail/CVE-2022-1733), [CVE-2022-1735](https://nvd.nist.gov/vuln/detail/CVE-2022-1735), [CVE-2022-1769](https://nvd.nist.gov/vuln/detail/CVE-2022-1769), [CVE-2022-1771](https://nvd.nist.gov/vuln/detail/CVE-2022-1771), [CVE-2022-1785](https://nvd.nist.gov/vuln/detail/CVE-2022-1785), [CVE-2022-1796](https://nvd.nist.gov/vuln/detail/CVE-2022-1796), [CVE-2022-1897](https://nvd.nist.gov/vuln/detail/CVE-2022-1897), [CVE-2022-1898](https://nvd.nist.gov/vuln/detail/CVE-2022-1898), [CVE-2022-1886](https://nvd.nist.gov/vuln/detail/CVE-2022-1886), [CVE-2022-1851](https://nvd.nist.gov/vuln/detail/CVE-2022-1851), [CVE-2022-1927](https://nvd.nist.gov/vuln/detail/CVE-2022-1927), [CVE-2022-1942](https://nvd.nist.gov/vuln/detail/CVE-2022-1942), [CVE-2022-1968](https://nvd.nist.gov/vuln/detail/CVE-2022-1968), [CVE-2022-2000](https://nvd.nist.gov/vuln/detail/CVE-2022-2000))\n\n#### Bug fixes:\n\n- Added back `gettext` to the OS ([Flatcar#849](https://github.com/flatcar-linux/Flatcar/issues/849))\n- Added merging of Ignition systemd duplicated units when auto-translating from Ignition 2 to Ignition 3. ([coreos-overlay#2187](https://github.com/flatcar/coreos-overlay/pull/2187))\n- Equinix Metal: Fixed serial console settings for the `m3.small.x86` instance by expanding the GRUB check for `i386` to `x86_64` ([coreos-overlay#2122](https://github.com/flatcar-linux/coreos-overlay/pull/2122))\n- Removed outdated LTS channel information printed on login ([init#75](https://github.com/flatcar-linux/init/pull/75))\n\n#### Changes:\n\n- Added symlink from `nc` to `ncat`. `-q` option is [not yet supported](https://github.com/nmap/nmap/issues/2422) ([flatcar#545](https://github.com/flatcar-linux/Flatcar/issues/545))\n- emerge-gitclone: Migrate emerge-gitclone to use scripts repo tags and submodule refs\n\n#### Updates:\n\n- Linux ([5.15.70](https://lwn.net/Articles/909212) (includes [5.15.69](https://lwn.net/Articles/908782), [5.15.68](https://lwn.net/Articles/908140), [5.15.67](https://lwn.net/Articles/907526), [5.15.66](https://lwn.net/Articles/907524), [5.15.65](https://lwn.net/Articles/907204), [5.15.64](https://lwn.net/Articles/906630), [5.15.51](https://lwn.net/Articles/899370)))\n- Linux Firmware ([20220815](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220815) (includes [20220708](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220708)))\n- Go ([1.18.6](https://go.dev/doc/devel/release#go1.18.6))\n- adcli ([0.9.1](https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.1))\n- automake ([1.16.5](https://savannah.gnu.org/forum/forum.php?forum_id=10055))\n- binutils ([2.38](https://lwn.net/Articles/884264/))\n- bison ([3.8.2](https://lists.gnu.org/archive/html/bug-bison/2021-09/msg00056.html))\n- boost ([1.79](https://www.boost.org/users/history/version_1_79_0.html))\n- ca-certificates ([3.83](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_83.html))\n- cifs-utils ([6.15](https://lists.samba.org/archive/samba-technical/2022-April/137335.html))\n- containerd ([1.6.8](https://github.com/containerd/containerd/releases/tag/v1.6.8) (includes [1.6.7](https://github.com/containerd/containerd/releases/tag/v1.6.7)))\n- curl ([7.84.0](https://github.com/curl/curl/releases/tag/curl-7_84_0))\n- Cyrus SASL ([2.1.28](https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28))\n- expat ([2.4.9](https://github.com/libexpat/libexpat/blob/R_2_4_9/expat/Changes))\n- gcc ([11.3.0](https://gcc.gnu.org/gcc-11/changes.html))\n- gdb ([11.2](https://lists.gnu.org/archive/html/info-gnu/2022-01/msg00009.html))\n- gettext ([0.21](https://www.gnu.org/software/gettext/))\n- git ([2.37.1](https://github.com/git/git/blob/v2.37.1/Documentation/RelNotes/2.37.1.txt))\n- glib ([2.72.3](https://gitlab.gnome.org/GNOME/glib/-/tags/2.73.3))\n- gnupg ([2.2.35](https://dev.gnupg.org/T5928))\n- gnutls ([3.7.7](https://gitlab.com/gnutls/gnutls/-/tags/3.7.7))\n- libtool ([2.4.7](https://savannah.gnu.org/forum/forum.php?forum_id=10139))\n- locksmith([0.7.0](https://github.com/flatcar/locksmith/blob/v0.7.0/CHANGELOG.md#v070--30112021))\n- oniguruma ([6.9.8](https://github.com/kkos/oniguruma/releases/tag/v6.9.8))\n- perl ([5.34.1](https://perldoc.perl.org/5.34.1/perldelta))\n- pkgconf ([1.8.0](https://gitea.treehouse.systems/ariadne/pkgconf/src/tag/pkgconf-1.8.0/NEWS))\n- shadow ([4.12.3](https://github.com/shadow-maint/shadow/releases/tag/4.12.3))\n- sudo ([1.9.10](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_10))\n- vim ([8.2.5066](https://github.com/vim/vim/releases/tag/v8.2.5066))\n- SDK: Rust ([1.63.0](https://github.com/rust-lang/rust/releases/tag/1.63.0) (includes [1.62.1](https://github.com/rust-lang/rust/releases/tag/1.62.1), [1.62.0](https://github.com/rust-lang/rust/releases/tag/1.62.0)))\n- VMware: open-vm-tools ([12.1.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.0))\n\n_Changes since **Alpha 3346.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-0171](https://nvd.nist.gov/vuln/detail/CVE-2022-0171), [CVE-2022-2663](https://nvd.nist.gov/vuln/detail/CVE-2022-2663), [CVE-2022-2905](https://nvd.nist.gov/vuln/detail/CVE-2022-2905), [CVE-2022-3028](https://nvd.nist.gov/vuln/detail/CVE-2022-3028), [CVE-2022-3061](https://nvd.nist.gov/vuln/detail/CVE-2022-3061), [CVE-2022-3176](https://nvd.nist.gov/vuln/detail/CVE-2022-3176), [CVE-2022-3303](https://nvd.nist.gov/vuln/detail/CVE-2022-3303), [CVE-2022-39190](https://nvd.nist.gov/vuln/detail/CVE-2022-39190), [CVE-2022-39842](https://nvd.nist.gov/vuln/detail/CVE-2022-39842), [CVE-2022-40307](https://nvd.nist.gov/vuln/detail/CVE-2022-40307))\n- Go ([CVE-2022-27664](https://nvd.nist.gov/vuln/detail/CVE-2022-27664), [CVE-2022-32190](https://nvd.nist.gov/vuln/detail/CVE-2022-32190))\n- expat ([CVE-2022-40674](https://nvd.nist.gov/vuln/detail/CVE-2022-40674))\n\n#### Bug fixes:\n\n- Added back `gettext` to the OS ([Flatcar#849](https://github.com/flatcar-linux/Flatcar/issues/849))\n- Added merging of Ignition systemd duplicated units when auto-translating from Ignition 2 to Ignition 3. ([coreos-overlay#2187](https://github.com/flatcar/coreos-overlay/pull/2187))\n- Equinix Metal: Fixed serial console settings for the `m3.small.x86` instance by expanding the GRUB check for `i386` to `x86_64` ([coreos-overlay#2122](https://github.com/flatcar-linux/coreos-overlay/pull/2122))\n\n#### Changes:\n\n- emerge-gitclone: Migrate emerge-gitclone to use scripts repo tags and submodule refs\n\n#### Updates:\n\n- Linux ([5.15.70](https://lwn.net/Articles/909212) (includes [5.15.69](https://lwn.net/Articles/908782), [5.15.68](https://lwn.net/Articles/908140), [5.15.67](https://lwn.net/Articles/907526), [5.15.66](https://lwn.net/Articles/907524), [5.15.65](https://lwn.net/Articles/907204), [5.15.64](https://lwn.net/Articles/906630)))\n- Go ([1.18.6](https://go.dev/doc/devel/release#go1.18.6))\n- ca-certificates ([3.83](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_83.html))\n- gettext ([0.21](https://www.gnu.org/software/gettext/))\n- locksmith([0.7.0](https://github.com/flatcar/locksmith/blob/v0.7.0/CHANGELOG.md#v070--30112021))\n- expat ([2.4.9](https://github.com/libexpat/libexpat/blob/R_2_4_9/expat/Changes))\n"
  },
  "3374.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-10-26 09:26:18 +0000",
    "major_software": {
      "containerd": [
        "1.6.8"
      ],
      "docker": [
        "20.10.18"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.74"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "New **Beta** Release **3374.1.0**\n\n_Changes since **Beta 3346.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-2308](https://nvd.nist.gov/vuln/detail/CVE-2022-2308), [CVE-2022-40768](https://nvd.nist.gov/vuln/detail/CVE-2022-40768), [CVE-2022-41674](https://nvd.nist.gov/vuln/detail/CVE-2022-41674), [CVE-2022-42719](https://nvd.nist.gov/vuln/detail/CVE-2022-42719), [CVE-2022-42720](https://nvd.nist.gov/vuln/detail/CVE-2022-42720), [CVE-2022-42721](https://nvd.nist.gov/vuln/detail/CVE-2022-42721), [CVE-2022-42722](https://nvd.nist.gov/vuln/detail/CVE-2022-42722))\n- Docker ([CVE-2022-36109](https://nvd.nist.gov/vuln/detail/CVE-2022-36109))\n- GNU Libtasn1 ([Gentoo#866237](https://bugs.gentoo.org/866237))\n- intel-microcode ([CVE-2022-21233](https://nvd.nist.gov/vuln/detail/CVE-2022-21233))\n- libxml2 ([CVE-2016-3709](https://nvd.nist.gov/vuln/detail/CVE-2016-3709), [CVE-2022-2309](https://nvd.nist.gov/vuln/detail/CVE-2022-2309))\n- polkit ([CVE-2021-4115](https://nvd.nist.gov/vuln/detail/CVE-2021-4115))\n- rsync ([CVE-2022-29154](https://nvd.nist.gov/vuln/detail/CVE-2022-29154))\n- unzip ([CVE-2022-0529](https://nvd.nist.gov/vuln/detail/CVE-2022-0529), [CVE-2022-0530](https://nvd.nist.gov/vuln/detail/CVE-2022-0530), [CVE-2021-4217](https://nvd.nist.gov/vuln/detail/CVE-2021-4217))\n- zlib ([CVE-2022-37434](https://nvd.nist.gov/vuln/detail/CVE-2022-37434))\n\n#### Changes:\n\n- OpenStack: enabled `coreos-metadata-sshkeys@.service` to provision SSH keys from metadata. ([Flatcar#817](https://github.com/flatcar/Flatcar/issues/817), [coreos-overlay#2246](https://github.com/flatcar/coreos-overlay/pull/2246))\n\n#### Updates:\n\n- Linux ([5.15.74](https://lwn.net/Articles/911275/) (includes [5.15.71](https://lwn.net/Articles/909679), [5.15.72](https://lwn.net/Articles/910398), [5.15.73](https://lwn.net/Articles/910957)))\n- Linux Firmware ([20220913](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220913))\n- ca-certificates ([3.84](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_84.html))\n- Docker ([20.10.18](https://docs.docker.com/engine/release-notes/#201018))\n- GNU Libtasn1 ([4.19.0](https://lists.gnu.org/archive/html/help-libtasn1/2022-08/msg00001.html))\n- intel-microcode ([20220809](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220809))\n- libxml2 ([2.10.2](https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.2))\n- polkit ([121](https://gitlab.freedesktop.org/polkit/polkit/-/commit/827b0ddac5b1ef00a47fca4526fcf057bee5f1db))\n- rsync ([3.2.6](https://github.com/WayneD/rsync/releases/tag/v3.2.6))\n- runc ([1.1.4](https://github.com/opencontainers/runc/releases/tag/v1.1.4))\n- unzip ([6.0_p27](https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-27_changelog))\n- SDK: libxslt ([1.1.35](https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.35))\n\n_Changes since **Alpha 3374.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-2308](https://nvd.nist.gov/vuln/detail/CVE-2022-2308), [CVE-2022-40768](https://nvd.nist.gov/vuln/detail/CVE-2022-40768), [CVE-2022-41674](https://nvd.nist.gov/vuln/detail/CVE-2022-41674), [CVE-2022-42719](https://nvd.nist.gov/vuln/detail/CVE-2022-42719), [CVE-2022-42720](https://nvd.nist.gov/vuln/detail/CVE-2022-42720), [CVE-2022-42721](https://nvd.nist.gov/vuln/detail/CVE-2022-42721), [CVE-2022-42722](https://nvd.nist.gov/vuln/detail/CVE-2022-42722))\n\n#### Changes:\n\n- OpenStack: enabled `coreos-metadata-sshkeys@.service` to provision SSH keys from metadata. ([Flatcar#817](https://github.com/flatcar/Flatcar/issues/817), [coreos-overlay#2246](https://github.com/flatcar/coreos-overlay/pull/2246))\n\n#### Updates:\n\n- Linux ([5.15.74](https://lwn.net/Articles/911275/) (includes [5.15.71](https://lwn.net/Articles/909679), [5.15.72](https://lwn.net/Articles/910398), [5.15.73](https://lwn.net/Articles/910957)))\n- ca-certificates ([3.84](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_84.html))"
  },
  "3374.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-11-01 13:15:45 +0000",
    "major_software": {
      "containerd": [
        "1.6.8"
      ],
      "docker": [
        "20.10.18"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.74"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "_Changes since **Beta 3374.1.0**_\n \n#### Security fixes:\n - OpenSSL ([CVE-2022-3602](https://nvd.nist.gov/vuln/detail/CVE-2022-3602), [CVE-2022-3786](https://nvd.nist.gov/vuln/detail/CVE-2022-3786))\n"
  },
  "3402.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-11-09 12:52:43 +0000",
    "major_software": {
      "containerd": [
        "1.6.8"
      ],
      "docker": [
        "20.10.20"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.77"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "_Changes since **Beta 3374.1.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-2602](https://nvd.nist.gov/vuln/detail/CVE-2022-2602), [CVE-2022-3535](https://nvd.nist.gov/vuln/detail/CVE-2022-3535), [CVE-2022-3542](https://nvd.nist.gov/vuln/detail/CVE-2022-3542), [CVE-2022-3565](https://nvd.nist.gov/vuln/detail/CVE-2022-3565), [CVE-2022-3594](https://nvd.nist.gov/vuln/detail/CVE-2022-3594))\n - bind tools ([CVE-2022-2795](https://nvd.nist.gov/vuln/detail/CVE-2022-2795), [CVE-2022-2881](https://nvd.nist.gov/vuln/detail/CVE-2022-2881), [CVE-2022-2906](https://nvd.nist.gov/vuln/detail/CVE-2022-2906), [CVE-2022-3080](https://nvd.nist.gov/vuln/detail/CVE-2022-3080), [CVE-2022-38177](https://nvd.nist.gov/vuln/detail/CVE-2022-38177), [CVE-2022-38178](https://nvd.nist.gov/vuln/detail/CVE-2022-38178))\n - curl ([CVE-2022-35252](https://nvd.nist.gov/vuln/detail/CVE-2022-35252))\n - dbus ([CVE-2022-42010](https://nvd.nist.gov/vuln/detail/CVE-2022-42010), [CVE-2022-42011](https://nvd.nist.gov/vuln/detail/CVE-2022-42011), [CVE-2022-42012](https://nvd.nist.gov/vuln/detail/CVE-2022-42012))\n - go ([CVE-2022-41715](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715), [CVE-2022-2880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880), [CVE-2022-2879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879))\n - libxml2 ([CVE-2022-40303](https://nvd.nist.gov/vuln/detail/CVE-2022-40303), [CVE-2022-40304](https://nvd.nist.gov/vuln/detail/CVE-2022-40304))\n - logrotate ([CVE-2022-1348](https://nvd.nist.gov/vuln/detail/CVE-2022-1348))\n - vim ([CVE-2022-1725](https://nvd.nist.gov/vuln/detail/CVE-2022-1725), [CVE-2022-2042](https://nvd.nist.gov/vuln/detail/CVE-2022-2042), [CVE-2022-2124](https://nvd.nist.gov/vuln/detail/CVE-2022-2124), [CVE-2022-2125](https://nvd.nist.gov/vuln/detail/CVE-2022-2125), [CVE-2022-2126](https://nvd.nist.gov/vuln/detail/CVE-2022-2126), [CVE-2022-2129](https://nvd.nist.gov/vuln/detail/CVE-2022-2129), [CVE-2022-2175](https://nvd.nist.gov/vuln/detail/CVE-2022-2175), [CVE-2022-2182](https://nvd.nist.gov/vuln/detail/CVE-2022-2182), [CVE-2022-2183](https://nvd.nist.gov/vuln/detail/CVE-2022-2183), [CVE-2022-2206](https://nvd.nist.gov/vuln/detail/CVE-2022-2206), [CVE-2022-2207](https://nvd.nist.gov/vuln/detail/CVE-2022-2207), [CVE-2022-2208](https://nvd.nist.gov/vuln/detail/CVE-2022-2208), [CVE-2022-2210](https://nvd.nist.gov/vuln/detail/CVE-2022-2210), [CVE-2022-2231](https://nvd.nist.gov/vuln/detail/CVE-2022-2231), [CVE-2022-2257](https://nvd.nist.gov/vuln/detail/CVE-2022-2257), [CVE-2022-2264](https://nvd.nist.gov/vuln/detail/CVE-2022-2264), [CVE-2022-2284](https://nvd.nist.gov/vuln/detail/CVE-2022-2284), [CVE-2022-2285](https://nvd.nist.gov/vuln/detail/CVE-2022-2285), [CVE-2022-2286](https://nvd.nist.gov/vuln/detail/CVE-2022-2286), [CVE-2022-2287](https://nvd.nist.gov/vuln/detail/CVE-2022-2287), [CVE-2022-2288](https://nvd.nist.gov/vuln/detail/CVE-2022-2288), [CVE-2022-2289](https://nvd.nist.gov/vuln/detail/CVE-2022-2289), [CVE-2022-2304](https://nvd.nist.gov/vuln/detail/CVE-2022-2304), [CVE-2022-2343](https://nvd.nist.gov/vuln/detail/CVE-2022-2343), [CVE-2022-2344](https://nvd.nist.gov/vuln/detail/CVE-2022-2344), [CVE-2022-2345](https://nvd.nist.gov/vuln/detail/CVE-2022-2345), [CVE-2022-2522](https://nvd.nist.gov/vuln/detail/CVE-2022-2522), [CVE-2022-2816](https://nvd.nist.gov/vuln/detail/CVE-2022-2816), [CVE-2022-2817](https://nvd.nist.gov/vuln/detail/CVE-2022-2817), [CVE-2022-2819](https://nvd.nist.gov/vuln/detail/CVE-2022-2819), [CVE-2022-2845](https://nvd.nist.gov/vuln/detail/CVE-2022-2845), [CVE-2022-2849](https://nvd.nist.gov/vuln/detail/CVE-2022-2849), [CVE-2022-2862](https://nvd.nist.gov/vuln/detail/CVE-2022-2862), [CVE-2022-2874](https://nvd.nist.gov/vuln/detail/CVE-2022-2874), [CVE-2022-2889](https://nvd.nist.gov/vuln/detail/CVE-2022-2889), [CVE-2022-2923](https://nvd.nist.gov/vuln/detail/CVE-2022-2923), [CVE-2022-2946](https://nvd.nist.gov/vuln/detail/CVE-2022-2946), [CVE-2022-2980](https://nvd.nist.gov/vuln/detail/CVE-2022-2980), [CVE-2022-2982](https://nvd.nist.gov/vuln/detail/CVE-2022-2982), [CVE-2022-3016](https://nvd.nist.gov/vuln/detail/CVE-2022-3016), [CVE-2022-3099](https://nvd.nist.gov/vuln/detail/CVE-2022-3099), [CVE-2022-3134](https://nvd.nist.gov/vuln/detail/CVE-2022-3134), [CVE-2022-3153](https://nvd.nist.gov/vuln/detail/CVE-2022-3153), [CVE-2022-3234](https://nvd.nist.gov/vuln/detail/CVE-2022-3234), [CVE-2022-3235](https://nvd.nist.gov/vuln/detail/CVE-2022-3235), [CVE-2022-3278](https://nvd.nist.gov/vuln/detail/CVE-2022-3278), [CVE-2022-3256](https://nvd.nist.gov/vuln/detail/CVE-2022-3256), [CVE-2022-3296](https://nvd.nist.gov/vuln/detail/CVE-2022-3296), [CVE-2022-3297](https://nvd.nist.gov/vuln/detail/CVE-2022-3297), [CVE-2022-3324](https://nvd.nist.gov/vuln/detail/CVE-2022-3324), [CVE-2022-3352](https://nvd.nist.gov/vuln/detail/CVE-2022-3352))\n - SDK: rust ([CVE-2022-36113](https://nvd.nist.gov/vuln/detail/CVE-2022-36113), [CVE-2022-36114](https://nvd.nist.gov/vuln/detail/CVE-2022-36114))\n\n #### Bug fixes:\n \n - Enabled IOMMU on arm64 kernels, the lack of which prevented some systems from booting ([coreos-overlay#2235](https://github.com/flatcar/coreos-overlay/pull/2235))\n \n #### Changes:\n \n - Added `CONFIG_NF_CONNTRACK_BRIDGE` (for nf_conntrack_bridge) and `CONFIG_NFT_BRIDGE_META` (for nft_meta_bridge) to the kernel config to allow using conntrack rules for bridges in nftables and to match on bridge interface names ([coreos-overlay#2207](https://github.com/flatcar/coreos-overlay/pull/2207))\n - Change CONFIG_WIREGUARD kernel option to module to save space on boot partition ([coreos-overlay#2239](https://github.com/flatcar/coreos-overlay/pull/2239))\n - Disable several arch specific arm64 kernel config options for unsupported platforms to save space on boot partition ([coreos-overlay#2239](https://github.com/flatcar/coreos-overlay/pull/2239))\n - Switched from `--strip-unneeded` to `--strip-debug` when installing kernel modules, which makes kernel stacktraces more accurate and makes debugging issues easier ([coreos-overlay#2196](https://github.com/flatcar/coreos-overlay/pull/2196))\n - The flatcar-update tool got two new flags to customize ports used on the host while updating flatcar ([init#81](https://github.com/flatcar/init/pull/81))\n - Add qemu-guest-agent to all amd64 images, it will be automatically enabled when qemu-ga virtio-port is detected ([coreos-overlay#2240](https://github.com/flatcar/coreos-overlay/pull/2240), [portage-stable#373](https://github.com/flatcar/portage-stable/pull/373))\n \n #### Updates:\n \n - Linux ([5.15.77](https://lwn.net/Articles/913681) (includes [5.15.76](https://lwn.net/Articles/912997), [5.15.75](https://lwn.net/Articles/912500)))\n - Linux Firmware ([20221012](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221012))\n - Docker ([20.10.20](https://docs.docker.com/engine/release-notes/#201020))\n - Go ([1.18.7](https://go.dev/doc/devel/release#1.18.7))\n - OpenSSL ([3.0.7](https://www.openssl.org/news/openssl-3.0-notes.html))\n - bind tools ([9.16.33](https://gitlab.isc.org/isc-projects/bind9/-/raw/v9_16_33/CHANGES))\n - bpftool ([5.19.2](https://lwn.net/Articles/904957/))\n - curl ([7.85](https://curl.se/mail/archive-2022-08/0012.html))\n - dbus ([1.14.4](https://gitlab.freedesktop.org/dbus/dbus/-/raw/dbus-1.14.4/NEWS))\n - git ([2.37.3](https://github.com/git/git/blob/v2.37.3/Documentation/RelNotes/2.37.3.txt))\n - glibc ([2.34](https://sourceware.org/pipermail/libc-alpha/2021-August/129718.html))\n - libxml2 ([2.10.3](https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3))\n - logrotate ([3.20.1](https://github.com/logrotate/logrotate/releases/tag/3.20.1))\n - nmap ([7.93](https://nmap.org/changelog.html#7.93))\n - pahole ([1.23](https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.23))\n - strace ([5.19](https://github.com/strace/strace/releases/tag/v5.19))\n - vim ([9.0.0655](https://github.com/vim/vim/releases/tag/v9.0.0655))\n - wireguard-tools ([1.0.20210914](https://github.com/WireGuard/wireguard-tools/releases/tag/v1.0.20210914))\n - zlib ([1.2.13](https://github.com/madler/zlib/releases/tag/v1.2.13))\n - SDK: catalyst ([3.0.21](https://gitweb.gentoo.org/proj/catalyst.git/log/?h=3.0.21))\n - SDK: cmake ([3.23.3](https://cmake.org/cmake/help/v3.23/release/3.23.html))\n - SDK: libxslt ([1.1.37](https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.37))\n - SDK: meson ([0.62.2](https://mesonbuild.com/Release-notes-for-0-62-0.html))\n - SDK: ninja ([1.11.0](https://groups.google.com/g/ninja-build/c/R2oCyDctDf8/m/-U94Y5I8AgAJ?pli=1))\n - SDK: Rust ([1.64.0](https://github.com/rust-lang/rust/releases/tag/1.64.0))\n \n _Changes since **Alpha 3402.0.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-2602](https://nvd.nist.gov/vuln/detail/CVE-2022-2602), [CVE-2022-3535](https://nvd.nist.gov/vuln/detail/CVE-2022-3535), [CVE-2022-3542](https://nvd.nist.gov/vuln/detail/CVE-2022-3542), [CVE-2022-3565](https://nvd.nist.gov/vuln/detail/CVE-2022-3565), [CVE-2022-3594](https://nvd.nist.gov/vuln/detail/CVE-2022-3594))\n\n #### Updates:\n \n - Linux ([5.15.77](https://lwn.net/Articles/913681) (includes [5.15.76](https://lwn.net/Articles/912997), [5.15.75](https://lwn.net/Articles/912500)))\n - OpenSSL ([3.0.7](https://www.openssl.org/news/openssl-3.0-notes.html))\n"
  },
  "3417.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-11-24 15:10:53 +0000",
    "major_software": {
      "containerd": [
        "1.6.9"
      ],
      "docker": [
        "20.10.21"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.79"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": " _Changes since **Beta 3402.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-3543](https://nvd.nist.gov/vuln/detail/CVE-2022-3543), [CVE-2022-3564](https://nvd.nist.gov/vuln/detail/CVE-2022-3564), [CVE-2022-3619](https://nvd.nist.gov/vuln/detail/CVE-2022-3619), [CVE-2022-3623](https://nvd.nist.gov/vuln/detail/CVE-2022-3623), [CVE-2022-3628](https://nvd.nist.gov/vuln/detail/CVE-2022-3628), [CVE-2022-42895](https://nvd.nist.gov/vuln/detail/CVE-2022-42895), [CVE-2022-42896](https://nvd.nist.gov/vuln/detail/CVE-2022-42896))\n - git ([CVE-2022-39253](https://nvd.nist.gov/vuln/detail/CVE-2022-39253), [CVE-2022-39260](https://nvd.nist.gov/vuln/detail/CVE-2022-39260))\n - multipath-tools ([CVE-2022-41973](https://nvd.nist.gov/vuln/detail/CVE-2022-41973), [CVE-2022-41974](https://nvd.nist.gov/vuln/detail/CVE-2022-41974))\n \n #### Bug fixes:\n \n - Fixed Ignition btrfs forced formatting for OEM partition ([coreos-overlay#2277](https://github.com/flatcar/coreos-overlay/pull/2277))\n \n #### Changes:\n \n - Toolbox now uses containerd to download and mount the image ([toolbox#7](https://github.com/flatcar/toolbox/pull/7))\n \n #### Updates:\n \n - Linux ([5.15.79](https://lwn.net/Articles/915100) (includes [5.15.78](https://lwn.net/Articles/914423)))\n - Docker ([20.10.21](https://docs.docker.com/engine/release-notes/#201021))\n - Go ([1.19.3](https://go.dev/doc/devel/release#go1.19.3))\n - ca-certificates ([3.85](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_85.html))\n - containerd ([1.6.9](https://github.com/containerd/containerd/releases/tag/v1.6.9))\n - glibc ([2.35](https://savannah.gnu.org/forum/forum.php?forum_id=10111))\n - bpftool ([5.19.8](https://lwn.net/Articles/907523/))\n - git ([2.37.4](https://github.com/git/git/blob/master/Documentation/RelNotes/2.37.4.txt))\n - iputils ([20211215](https://github.com/iputils/iputils/releases/tag/20211215))\n - libcap ([2.65](https://sites.google.com/site/fullycapable/release-notes-for-libcap?authuser=0#h.wfblevfzkj0))\n - multipath-tools ([0.9.3](https://github.com/opensvc/multipath-tools/releases/tag/0.9.3))\n - wget ([1.21.3](https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00017.html))\n - whois ([5.5.13](https://github.com/rfc1036/whois/blob/v5.5.13/debian/changelog))\n - xz-utils ([5.2.6](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=4c79b18ff26a1c479a920b21f07d050599c04c9e;hb=8dfed05bdaa4873833ba24279f02ad2db25effea))\n\n_Changes since **Alpha 3417.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-3543](https://nvd.nist.gov/vuln/detail/CVE-2022-3543), [CVE-2022-3564](https://nvd.nist.gov/vuln/detail/CVE-2022-3564), [CVE-2022-3619](https://nvd.nist.gov/vuln/detail/CVE-2022-3619), [CVE-2022-3623](https://nvd.nist.gov/vuln/detail/CVE-2022-3623), [CVE-2022-3628](https://nvd.nist.gov/vuln/detail/CVE-2022-3628), [CVE-2022-42895](https://nvd.nist.gov/vuln/detail/CVE-2022-42895), [CVE-2022-42896](https://nvd.nist.gov/vuln/detail/CVE-2022-42896))\n \n #### Bug fixes:\n \n - Fixed Ignition btrfs forced formatting for OEM partition ([coreos-overlay#2277](https://github.com/flatcar/coreos-overlay/pull/2277))\n \n #### Updates:\n \n - Linux ([5.15.79](https://lwn.net/Articles/915100) (includes [5.15.78](https://lwn.net/Articles/914423)))\n - ca-certificates ([3.85](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_85.html))\n"
  },
  "3432.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-12-09 09:47:46 +0000",
    "major_software": {
      "containerd": [
        "1.6.10"
      ],
      "docker": [
        "20.10.21"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.81"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "_Changes since **Beta 3417.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-3169](https://nvd.nist.gov/vuln/detail/CVE-2022-169), [CVE-2022-3521](https://nvd.nist.gov/vuln/detail/CVE-2022-521))\n- cpio ([CVE-2021-38185](https://nvd.nist.gov/vuln/detail/CVE-2021-8185))\n- curl ([CVE-2022-32221](https://nvd.nist.gov/vuln/detail/CVE-2022-2221), [CVE-2022-35260](https://nvd.nist.gov/vuln/detail/CVE-2022-2221), [CVE-2022-42915](https://nvd.nist.gov/vuln/detail/CVE-2022-2221), [CVE-2022-42916](https://nvd.nist.gov/vuln/detail/CVE-2022-2221))\n- expat ([CVE-2022-43680](https://nvd.nist.gov/vuln/detail/CVE-2022-3680))\n- libksba ([CVE-2022-3515](https://nvd.nist.gov/vuln/detail/CVE-2022-515))\n- vim ([CVE-2022-3705](https://nvd.nist.gov/vuln/detail/CVE-2022-705))\n\n#### Bug fixes:\n\n- Added support for hardware security keys in update-ssh-keys ([update-ssh-keys#7](https://github.com/flatcar/update-ssh-eys/pull/7))\n- Fix \"ext4 deadlock under heavy I/O load\" kernel issue. The patch for this is included provisionally while we wait for it to be merged pstream ([Flatcar#847](https://github.com/flatcar/Flatcar/issues/847), [coreos-overlay#2315](https://github.com/flatcar/coreos-overlay/pull/2315))\n\n#### Updates:\n\n- Linux ([5.15.81](https://lwn.net/Articles/916763) (includes [5.15.80](https://lwn.net/Articles/916003)))\n- Linux Firmware ([20221109](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221109))\n- OpenSSH ([9.1](http://www.openssh.com/releasenotes.html#9.1))\n- containerd ([1.6.10](https://github.com/containerd/containerd/releases/tag/v1.6.10))\n- cpio ([2.13](https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html))\n- curl ([7.86](https://curl.se/changes.html#7_86_0))\n- Expat ([2.5.0](https://github.com/libexpat/libexpat/blob/R_2_5_0/expat/Changes))\n- glib ([2.74.1](https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.1))\n- libcap ([2.66](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.d9ygdose5kw))\n- libksba ([1.6.2](https://dev.gnupg.org/T6230))\n- sqlite ([3.39.4](https://sqlite.org/releaselog/3_39_4.html))\n- vim ([9.0.0828](https://github.com/vim/vim/releases/tag/v9.0.0828))\n- whois ([5.5.14](https://github.com/rfc1036/whois/commit/ab10466cf2e1ec4887f6a44375c3e29c1720157f))\n- XZ utils ([5.2.7](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=0205423e79ce8297102096b0fc8b030ddf5b2023;hb=d24a57b7fc7e5e9267b84367cb0788d3acf7f569))\n- SDK: Rust ([1.65.0](https://github.com/rust-ang/rust/releases/tag/1.65.0))\n\n_Changes since **Alpha 3432.0.0**_\n \n#### Security fixes:\n \n- Linux ([CVE-2022-3169](https://nvd.nist.gov/vuln/detail/CVE-2022-3169), [CVE-2022-3521](https://nvd.nist.gov/vuln/detail/CVE-2022-3521))\n \n#### Bug fixes:\n \n- Fix \"ext4 deadlock under heavy I/O load\" kernel issue. The patch for this is included provisionally while we wait for it to be merged upstream ([Flatcar#847](https://github.com/flatcar/Flatcar/issues/847), [coreos-overlay#2315](https://github.com/flatcar/coreos-overlay/pull/2315))\n \n #### Updates:\n \n- Linux ([5.15.81](https://lwn.net/Articles/916763) (includes [5.15.80](https://lwn.net/Articles/916003)))"
  },
  "3446.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-01-11 13:32:59 +0000",
    "major_software": {
      "containerd": [
        "1.6.10"
      ],
      "docker": [
        "20.10.21"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.86"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "_Changes since **Beta 3432.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-3424](https://nvd.nist.gov/vuln/detail/CVE-2022-3424), [CVE-2022-3534](https://nvd.nist.gov/vuln/detail/CVE-2022-3534), [CVE-2022-3545](https://nvd.nist.gov/vuln/detail/CVE-2022-3545), [CVE-2022-3643](https://nvd.nist.gov/vuln/detail/CVE-2022-3643), [CVE-2022-4378](https://nvd.nist.gov/vuln/detail/CVE-2022-4378), [CVE-2022-45869](https://nvd.nist.gov/vuln/detail/CVE-2022-45869), [CVE-2022-45934](https://nvd.nist.gov/vuln/detail/CVE-2022-45934))\n- sudo ([CVE-2022-43995](https://nvd.nist.gov/vuln/detail/CVE-2022-43995))\n- libksba ([CVE-2022-47629](https://nvd.nist.gov/vuln/detail/CVE-2022-47629))\n\n#### Bug fixes:\n\n- Added back Ignition support for Vagrant ([coreos-overlay#2351](https://github.com/flatcar/coreos-overlay/pull/2351))\n- The rootfs setup in the initrd now runs systemd-tmpfiles on every boot, not only when Ignition runs, to fix a dbus failure due to missing files ([Flatcar#944](https://github.com/flatcar/Flatcar/issues/944))\n\n#### Updates:\n\n- Linux ([5.15.86](https://lwn.net/Articles/918808) (includes [5.15.85](https://lwn.net/Articles/918329), [5.15.84](https://lwn.net/Articles/918206), [5.15.83](https://lwn.net/Articles/917896), [5.15.82](https://lwn.net/Articles/917400)))\n- ca-certificates ([3.87](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_87.html))\n- sudo ([1.9.12_p1](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p1))\n- GnuTLS ([3.7.8](https://lists.gnupg.org/pipermail/gnutls-help/2022-September/004765.html))\n- XZ utils ([5.2.8](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=c244b42a6771a6e8af206318dfc500d78929fd6f;hb=5476089d9c42b9b04e92b80e1800b384a98265cb))\n- gettext ([0.21.1](https://git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob;f=NEWS;h=cdbb16746c23555e70bb1e16917f5c349ce92d9e;hb=8b38ee827251cadbb90cb6cb576ae98702566288))\n- libksba ([1.6.3](https://dev.gnupg.org/T6304))\n- VMware: open-vm-tools ([12.1.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.5))\n\n_Changes since **Alpha 3446.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-3424](https://nvd.nist.gov/vuln/detail/CVE-2022-3424), [CVE-2022-3534](https://nvd.nist.gov/vuln/detail/CVE-2022-3534), [CVE-2022-3545](https://nvd.nist.gov/vuln/detail/CVE-2022-3545), [CVE-2022-3643](https://nvd.nist.gov/vuln/detail/CVE-2022-3643), [CVE-2022-4378](https://nvd.nist.gov/vuln/detail/CVE-2022-4378), [CVE-2022-45869](https://nvd.nist.gov/vuln/detail/CVE-2022-45869), [CVE-2022-45934](https://nvd.nist.gov/vuln/detail/CVE-2022-45934))\n- libksba ([CVE-2022-47629](https://nvd.nist.gov/vuln/detail/CVE-2022-47629))\n\n#### Bug fixes:\n\n- Added back Ignition support for Vagrant ([coreos-overlay#2351](https://github.com/flatcar/coreos-overlay/pull/2351))\n- The rootfs setup in the initrd now runs systemd-tmpfiles on every boot, not only when Ignition runs, to fix a dbus failure due to missing files ([Flatcar#944](https://github.com/flatcar/Flatcar/issues/944))\n\n#### Updates:\n\n- Linux ([5.15.86](https://lwn.net/Articles/918808) (includes [5.15.85](https://lwn.net/Articles/918329), [5.15.84](https://lwn.net/Articles/918206), [5.15.83](https://lwn.net/Articles/917896), [5.15.82](https://lwn.net/Articles/917400)))\n- ca-certificates ([3.87](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_87.html))\n- libksba ([1.6.3](https://dev.gnupg.org/T6304))\n"
  },
  "3446.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-01-24 13:16:19 +0000",
    "major_software": {
      "containerd": [
        "1.6.10"
      ],
      "docker": [
        "20.10.21"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.89"
      ],
      "systemd": [
        "250"
      ]
    },
    "release_notes": "_Changes since **Beta 3446.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-36280](https://nvd.nist.gov/vuln/detail/CVE-2022-36280), [CVE-2022-41218](https://nvd.nist.gov/vuln/detail/CVE-2022-41218), [CVE-2022-47929](https://nvd.nist.gov/vuln/detail/CVE-2022-47929), [CVE-2023-0210](https://nvd.nist.gov/vuln/detail/CVE-2023-0210), [CVE-2023-0266](https://nvd.nist.gov/vuln/detail/CVE-2023-0266), [CVE-2023-0394](https://nvd.nist.gov/vuln/detail/CVE-2023-0394), [CVE-2023-23454](https://nvd.nist.gov/vuln/detail/CVE-2023-23454), [CVE-2023-23455](https://nvd.nist.gov/vuln/detail/CVE-2023-23455))\n- git ([CVE-2022-23521](https://nvd.nist.gov/vuln/detail/CVE-2022-23521), [CVE-2022-41903](https://nvd.nist.gov/vuln/detail/CVE-2022-41903))\n\n#### Bug fixes:\n\n- Fixed a regression (in Alpha/Beta) where machines failed to boot if they didn't have the `core` user or group in `/etc/passwd` or `/etc/group` ([baselayout#26](https://github.com/flatcar/baselayout/pull/26))\n\n#### Changes:\n\n\n#### Updates:\n\n- Linux ([5.15.89](https://lwn.net/Articles/920321) (includes [5.15.88](https://lwn.net/Articles/920012), [5.15.87](https://lwn.net/Articles/919793)))\n- git ([2.37.5](https://github.com/git/git/blob/v2.37.5/Documentation/RelNotes/2.37.5.txt))\n"
  },
  "3493.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-02-16 13:07:54 +0000",
    "major_software": {
      "containerd": [
        "1.6.15"
      ],
      "docker": [
        "20.10.22"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.92"
      ],
      "systemd": [
        "251"
      ]
    },
    "release_notes": "_Changes since **Beta 3446.1.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-4129](https://nvd.nist.gov/vuln/detail/CVE-2022-4129), [CVE-2022-4382](https://nvd.nist.gov/vuln/detail/CVE-2022-4382), [CVE-2022-4842](https://nvd.nist.gov/vuln/detail/CVE-2022-4842), [CVE-2023-23559](https://nvd.nist.gov/vuln/detail/CVE-2023-23559))\n - Go ([CVE-2022-41717](https://nvd.nist.gov/vuln/detail/CVE-2022-41717))\n - containerd ([CVE-2022-23471](https://nvd.nist.gov/vuln/detail/CVE-2022-23471))\n - git ([CVE-2022-23521](https://nvd.nist.gov/vuln/detail/CVE-2022-23521), [CVE-2022-41903](https://nvd.nist.gov/vuln/detail/CVE-2022-41903))\n - glib ([fixes to normal form handling in GVariant](https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835))\n - libarchive ([CVE-2022-36227](https://nvd.nist.gov/vuln/detail/CVE-2022-36227))\n - systemd ([CVE-2022-3821](https://nvd.nist.gov/vuln/detail/CVE-2022-3821), [CVE-2022-4415](https://nvd.nist.gov/vuln/detail/CVE-2022-4415))\n - vim ([CVE-2022-3491](https://nvd.nist.gov/vuln/detail/CVE-2022-3491), [CVE-2022-3520](https://nvd.nist.gov/vuln/detail/CVE-2022-3520), [CVE-2022-3591](https://nvd.nist.gov/vuln/detail/CVE-2022-3591), [CVE-2022-4141](https://nvd.nist.gov/vuln/detail/CVE-2022-4141), [CVE-2022-4292](https://nvd.nist.gov/vuln/detail/CVE-2022-4292), [CVE-2022-4293](https://nvd.nist.gov/vuln/detail/CVE-2022-4293))\n - SDK: Python ([CVE-2015-20107](https://nvd.nist.gov/vuln/detail/CVE-2015-20107), [CVE-2020-10735](https://nvd.nist.gov/vuln/detail/CVE-2020-10735), [CVE-2021-3654](https://nvd.nist.gov/vuln/detail/CVE-2021-3654), [CVE-2022-37454](https://nvd.nist.gov/vuln/detail/CVE-2022-37454), [CVE-2022-42919](https://nvd.nist.gov/vuln/detail/CVE-2022-42919), [CVE-2022-45061](https://nvd.nist.gov/vuln/detail/CVE-2022-45061))\n - SDK: qemu ([CVE-2020-14394](https://nvd.nist.gov/vuln/detail/CVE-2020-14394), [CVE-2022-0216](https://nvd.nist.gov/vuln/detail/CVE-2022-0216), [CVE-2022-3872](https://nvd.nist.gov/vuln/detail/CVE-2022-3872))\n - SDK: rust ([CVE-2022-46176](https://nvd.nist.gov/vuln/detail/CVE-2022-46176))\n\n \n #### Updates:\n - Linux ([5.15.92](https://lwn.net/Articles/922340) (includes [5.15.91](https://lwn.net/Articles/921851), [5.15.90](https://lwn.net/Articles/921029)))\n - Linux Firmware ([20230117](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230117))\n - Docker ([20.10.22](https://docs.docker.com/engine/release-notes/20.10/#201022))\n - adcli ([0.9.2](https://gitlab.freedesktop.org/realmd/adcli/-/commits/8e88e3590a19006362ea8b8dfdc18bb88b3cb3b5/))\n - binutils ([2.39](https://sourceware.org/pipermail/binutils/2022-August/122246.html))\n - containerd ([1.6.15](https://github.com/containerd/containerd/releases/tag/v1.6.15) (includes [1.6.14](https://github.com/containerd/containerd/releases/tag/v1.6.14), [1.6.13](https://github.com/containerd/containerd/releases/tag/v1.6.13), [1.6.12](https://github.com/containerd/containerd/releases/tag/v1.6.12)))\n - cri-tools ([1.24.2](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.24.2))\n - elfutils ([0.188](https://sourceware.org/pipermail/elfutils-devel/2022q4/005561.html) (includes [0.187](https://sourceware.org/pipermail/elfutils-devel/2022q2/004978.html))\n - file ([5.43](https://mailman.astron.com/pipermail/file/2022-September/000857.html))\n - gawk ([5.2.1](https://lists.gnu.org/archive/html/help-gawk/2022-11/msg00008.html) (includes [5.2.0](https://lists.gnu.org/archive/html/help-gawk/2022-09/msg00000.html)))\n - git ([2.38.3](https://github.com/git/git/blob/v2.38.3/Documentation/RelNotes/2.38.3.txt))\n - glib ([2.74.4](https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.4))\n - GNU C Library ([2.36](https://sourceware.org/pipermail/libc-alpha/2022-August/141193.html))\n - Go ([1.19.5](https://go.dev/doc/devel/release#go1.19.5))\n - I2C tools ([4.3](https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/tree/CHANGES?id=d8bc1f1ff4b00a6bd988aa114100ae9b787f50d8))\n - Intel Microcode Package ([20221108](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20221108))\n - libcap-ng ([0.8.3](https://people.redhat.com/sgrubb/libcap-ng/ChangeLog))\n - libseccomp ([2.5.4](https://github.com/seccomp/libseccomp/releases/tag/v2.5.4) (includes [2.5.2](https://github.com/seccomp/libseccomp/releases/tag/v2.5.2), [2.5.3](https://github.com/seccomp/libseccomp/releases/tag/v2.5.3)))\n - MIT Kerberos V ([1.20.1](https://web.mit.edu/kerberos/krb5-1.20/krb5-1.20.1.html))\n - nettle ([3.8.1](https://git.lysator.liu.se/nettle/nettle/-/blob/990abad16ceacd070747dcc76ed16a39c129321e/ChangeLog))\n - rsync ([3.2.7](https://download.samba.org/pub/rsync/NEWS#3.2.7))\n - shadow ([4.13](https://github.com/shadow-maint/shadow/releases/tag/4.13))\n - sqlite ([3.40.1](https://www.sqlite.org/releaselog/3_40_1.html) (includes [3.40.0](https://www.sqlite.org/releaselog/3_40_0.html)))\n - systemd ([251.10](https://github.com/systemd/systemd-stable/commits/v251.10) (includes [251](https://github.com/systemd/systemd/releases/tag/v251)))\n - vim ([9.0.1000](https://github.com/vim/vim/releases/tag/v9.0.1000))\n - XZ utils ([5.2.10](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=d92fa88a835180af5d6ff22ad0e240d6468f81af;hb=f7c2cc55618b9af3318f0c908cf8db0df1e28e7c))\n - OEM: python-oem ([3.9.16](https://www.python.org/downloads/release/python-3916/))\n - SDK: libpng ([1.6.39](http://www.libpng.org/pub/png/src/libpng-1.6.39-README.txt) (includes [1.6.38](http://www.libpng.org/pub/png/src/libpng-1.6.38-README.txt)))\n - SDK: perl ([5.36.0](https://perldoc.perl.org/5.36.0/perldelta))\n - SDK: portage ([3.0.41](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.41))\n - SDK: qemu ([7.1.0](https://wiki.qemu.org/ChangeLog/7.1))\n - SDK: Rust ([1.66.1](https://github.com/rust-lang/rust/releases/tag/1.66.1))\n\n_Changes since **Alpha 3493.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-4129](https://nvd.nist.gov/vuln/detail/CVE-2022-4129), [CVE-2022-4382](https://nvd.nist.gov/vuln/detail/CVE-2022-4382), [CVE-2022-4842](https://nvd.nist.gov/vuln/detail/CVE-2022-4842), [CVE-2023-23559](https://nvd.nist.gov/vuln/detail/CVE-2023-23559))\n\n#### Bug fixes:\n\n\n#### Changes:\n\n\n#### Updates:\n\n- Linux ([5.15.92](https://lwn.net/Articles/922340) (includes [5.15.91](https://lwn.net/Articles/921851), [5.15.90](https://lwn.net/Articles/921029)))\n- cri-tools ([1.24.2](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.24.2))\n"
  },
  "3510.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-03-07 15:23:17 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.98"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **Beta 3493.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-2196](https://nvd.nist.gov/vuln/detail/CVE-2022-2196), [CVE-2022-27672](https://nvd.nist.gov/vuln/detail/CVE-2022-27672), [CVE-2022-3707](https://nvd.nist.gov/vuln/detail/CVE-2022-3707), [CVE-2023-1078](https://nvd.nist.gov/vuln/detail/CVE-2023-1078), [CVE-2023-26545](https://nvd.nist.gov/vuln/detail/CVE-2023-26545))\n - curl ([CVE-2022-43551](https://nvd.nist.gov/vuln/detail/CVE-2022-43551), [CVE-2022-43552](https://nvd.nist.gov/vuln/detail/CVE-2022-43552))\n - sudo ([CVE-2023-22809](https://nvd.nist.gov/vuln/detail/CVE-2023-22809))\n - vim ([CVE-2023-0049](https://nvd.nist.gov/vuln/detail/CVE-2023-0049), [CVE-2023-0051](https://nvd.nist.gov/vuln/detail/CVE-2023-0051), [CVE-2023-0054](https://nvd.nist.gov/vuln/detail/CVE-2023-0054))\n - SDK: qemu ([CVE-2022-4172](https://nvd.nist.gov/vuln/detail/CVE-2022-4172))\n \n #### Bug fixes:\n \n - Excluded the special Kubernetes network interfaces `nodelocaldns` and `kube-ipvs0` from being managed with systemd-networkd which interfered with the setup ([init#89](https://github.com/flatcar/init/pull/89)).\n \n #### Updates:\n \n - Linux ([5.15.98](https://lwn.net/Articles/925080) (includes [5.15.97](https://lwn.net/Articles/925064), [5.15.96](https://lwn.net/Articles/924441), [5.15.95](https://lwn.net/Articles/924073), [5.15.94](https://lwn.net/Articles/923308), [5.15.93](https://lwn.net/Articles/922814)))\n - Docker ([20.10.23](https://docs.docker.com/engine/release-notes/#201023))\n - bind tools ([9.16.36](https://bind9.readthedocs.io/en/v9_16_36/notes.html#notes-for-bind-9-16-36) (includes [9.16.34](https://bind9.readthedocs.io/en/v9_16_35/notes.html#notes-for-bind-9-16-34) and [9.16.35](https://bind9.readthedocs.io/en/v9_16_34/notes.html#notes-for-bind-9-16-35)))\n - bpftool ([5.19.12](https://lwn.net/Articles/909678/))\n - ca-certificates ([3.88.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_88_1.html))\n - containerd ([1.6.16](https://github.com/containerd/containerd/releases/tag/v1.6.16))\n - curl ([7.87.0](https://curl.se/changes.html#7_87_0))\n - git ([2.39.1](https://github.com/git/git/blob/v2.39.1/Documentation/RelNotes/2.39.1.txt) (includes [2.39.0](https://github.com/git/git/blob/v2.39.0/Documentation/RelNotes/2.39.0.txt)))\n - iptables ([1.8.8](https://www.netfilter.org/projects/iptables/files/changes-iptables-1.8.8.txt))\n - sudo ([1.9.12_p2](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p2))\n - systemd ([252.5](https://github.com/systemd/systemd-stable/releases/tag/v252.5))\n - vim ([9.0.1157](https://github.com/vim/vim/releases/tag/v9.0.1157))\n - XZ utils ([5.4.1](https://github.com/tukaani-project/xz/releases/tag/v5.4.1) (includes [5.4.0](https://github.com/tukaani-project/xz/releases/tag/v5.4.0)))\n - SDK: boost ([1.81.0](https://www.boost.org/users/history/version_1_81_0.html))\n - SDK: file ([5.44](https://github.com/file/file/blob/FILE5_44/ChangeLog))\n - SDK: portage ([3.0.43](https://github.com/gentoo/portage/blob/portage-3.0.43/NEWS) (includes [3.0.42](https://github.com/gentoo/portage/blob/portage-3.0.42/NEWS)))\n - SDK: qemu ([7.2.0](https://wiki.qemu.org/ChangeLog/7.2))\n - SDK: Rust ([1.67.0](https://github.com/rust-lang/rust/releases/tag/1.67.0))\n \n _Changes since **Alpha 3510.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-2196](https://nvd.nist.gov/vuln/detail/CVE-2022-2196), [CVE-2022-27672](https://nvd.nist.gov/vuln/detail/CVE-2022-27672), [CVE-2022-3707](https://nvd.nist.gov/vuln/detail/CVE-2022-3707), [CVE-2023-1078](https://nvd.nist.gov/vuln/detail/CVE-2023-1078), [CVE-2023-26545](https://nvd.nist.gov/vuln/detail/CVE-2023-26545))\n \n #### Bug fixes:\n \n - Excluded the special Kubernetes network interfaces `nodelocaldns` and `kube-ipvs0` from being managed with systemd-networkd which interfered with the setup ([init#89](https://github.com/flatcar/init/pull/89)).\n \n #### Updates:\n \n - Linux ([5.15.98](https://lwn.net/Articles/925080) (includes [5.15.97](https://lwn.net/Articles/925064), [5.15.96](https://lwn.net/Articles/924441), [5.15.95](https://lwn.net/Articles/924073), [5.15.94](https://lwn.net/Articles/923308), [5.15.93](https://lwn.net/Articles/922814)))"
  },
  "3549.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-04-17 13:18:23 +0000",
    "major_software": {
      "containerd": [
        "1.6.19"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "5.15.106"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **Beta 3510.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-4269](https://nvd.nist.gov/vuln/detail/CVE-2022-4269), [CVE-2022-4379](https://nvd.nist.gov/vuln/detail/CVE-2022-4379), [CVE-2023-1076](https://nvd.nist.gov/vuln/detail/CVE-2023-1076), [CVE-2023-1077](https://nvd.nist.gov/vuln/detail/CVE-2023-1077), [CVE-2023-1079](https://nvd.nist.gov/vuln/detail/CVE-2023-1079), [CVE-2023-1118](https://nvd.nist.gov/vuln/detail/CVE-2023-1118), [CVE-2023-1611](https://nvd.nist.gov/vuln/detail/CVE-2023-1611), [CVE-2023-1670](https://nvd.nist.gov/vuln/detail/CVE-2023-1670), [CVE-2023-1829](https://nvd.nist.gov/vuln/detail/CVE-2023-1829), [CVE-2023-1855](https://nvd.nist.gov/vuln/detail/CVE-2023-1855), [CVE-2023-1989](https://nvd.nist.gov/vuln/detail/CVE-2023-1989), [CVE-2023-1990](https://nvd.nist.gov/vuln/detail/CVE-2023-1990), [CVE-2023-23004](https://nvd.nist.gov/vuln/detail/CVE-2023-23004), [CVE-2023-25012](https://nvd.nist.gov/vuln/detail/CVE-2023-25012), [CVE-2023-28466](https://nvd.nist.gov/vuln/detail/CVE-2023-28466), [CVE-2023-30456](https://nvd.nist.gov/vuln/detail/CVE-2023-30456), [CVE-2023-30772](https://nvd.nist.gov/vuln/detail/CVE-2023-30772))\n- containerd ([CVE-2023-25153](https://nvd.nist.gov/vuln/detail/CVE-2023-25153), [CVE-2023-25173](https://nvd.nist.gov/vuln/detail/CVE-2023-25173))\n- curl ([CVE-2023-23914](https://nvd.nist.gov/vuln/detail/CVE-2023-23914), [CVE-2023-23915](https://nvd.nist.gov/vuln/detail/CVE-2023-23915), [CVE-2023-23916](https://nvd.nist.gov/vuln/detail/CVE-2023-23916))\n- e2fsprogs ([CVE-2022-1304](https://nvd.nist.gov/vuln/detail/CVE-2022-1304))\n- git ([CVE-2023-22490](https://nvd.nist.gov/vuln/detail/CVE-2023-22490), [CVE-2023-23946](https://nvd.nist.gov/vuln/detail/CVE-2023-23946))\n- GnuTLS ([CVE-2023-0361](https://nvd.nist.gov/vuln/detail/CVE-2023-0361))\n- Go ([CVE-2022-41723](https://nvd.nist.gov/vuln/detail/CVE-2022-41723), [CVE-2022-41724](https://nvd.nist.gov/vuln/detail/CVE-2022-41724), [CVE-2022-41725](https://nvd.nist.gov/vuln/detail/CVE-2022-41725), [CVE-2023-24532](https://nvd.nist.gov/vuln/detail/CVE-2023-24532))\n- intel-microcode ([CVE-2022-21216](https://nvd.nist.gov/vuln/detail/CVE-2022-21216), [CVE-2022-33196](https://nvd.nist.gov/vuln/detail/CVE-2022-33196), [CVE-2022-38090](https://nvd.nist.gov/vuln/detail/CVE-2022-38090))\n- less ([CVE-2022-46663](https://nvd.nist.gov/vuln/detail/CVE-2022-46663))\n- OpenSSH ([CVE-2023-25136](https://nvd.nist.gov/vuln/detail/CVE-2023-25136))\n- OpenSSL ([CVE-2022-4203](https://nvd.nist.gov/vuln/detail/CVE-2022-4203), [CVE-2022-4304](https://nvd.nist.gov/vuln/detail/CVE-2022-4304), [CVE-2022-4450](https://nvd.nist.gov/vuln/detail/CVE-2022-4450), [CVE-2023-0215](https://nvd.nist.gov/vuln/detail/CVE-2023-0215), [CVE-2023-0216](https://nvd.nist.gov/vuln/detail/CVE-2023-0216), [CVE-2023-0217](https://nvd.nist.gov/vuln/detail/CVE-2023-0217), [CVE-2023-0286](https://nvd.nist.gov/vuln/detail/CVE-2023-0286), [CVE-2023-0401](https://nvd.nist.gov/vuln/detail/CVE-2023-0401))\n- torcx ([CVE-2022-32149](https://nvd.nist.gov/vuln/detail/CVE-2022-32149))\n- vim ([CVE-2023-0288](https://nvd.nist.gov/vuln/detail/CVE-2023-0288), [CVE-2023-0433](https://nvd.nist.gov/vuln/detail/CVE-2023-0433))\n- SDK: dnsmasq ([CVE-2022-0934](https://nvd.nist.gov/vuln/detail/CVE-2022-0934))\n- SDK: pkgconf ([CVE-2023-24056](https://nvd.nist.gov/vuln/detail/CVE-2023-24056))\n- SDK: python ([CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329))\n\n#### Bug fixes:\n\n- Ensured that `/var/log/journal/` is created early enough for systemd-journald to persist the logs on first boot ([bootengine#60](https://github.com/flatcar/bootengine/pull/60), [baselayout#29](https://github.com/flatcar/baselayout/pull/29))\n- Fixed `journalctl --user` permission issue ([Flatcar#989](https://github.com/flatcar/Flatcar/issues/989))\n- Restored the support to specify OEM partition files in Ignition when `/usr/share/oem` is given as initrd mount point ([bootengine#58](https://github.com/flatcar/bootengine/pull/58))\n\n#### Changes:\n\n- Added a new `flatcar-reset` tool and boot logic for selective OS resets to reconfigure the system with Ignition while avoiding config drift ([bootengine#55](https://github.com/flatcar/bootengine/pull/55), [init#91](https://github.com/flatcar/init/pull/91))\n- Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from July 2023 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#92](https://github.com/flatcar/init/pull/92))\n- Added `pigz` to the image, a parallel gzip implementation, which is useful to speed up the (de)compression for large container image imports/exports ([coreos-overlay#2504](https://github.com/flatcar/coreos-overlay/pull/2504))\n- Enabled elfutils support in systemd-coredump. A backtrace will now appear in the journal for any program that dumps core ([coreos-overlay#2489](https://github.com/flatcar/coreos-overlay/pull/2489))\n- `/etc` is now set up as overlayfs with the original `/etc` folder being the store for changed files/directories and `/usr/share/flatcar/etc` providing the lower default directory tree ([bootengine#53](https://github.com/flatcar/bootengine/pull/53), [scripts#666](https://github.com/flatcar/scripts/pull/666))\n- On boot any files in `/etc` that are the same as provided by the booted `/usr/share/flatcar/etc` default for the overlay mount on `/etc` are deleted to ensure that future updates of `/usr/share/flatcar/etc` are propagated - to opt out create `/etc/.no-dup-update` in case you want to keep an unmodified config file as is or because you fear that a future Flatcar version may use the same file as you at which point your copy is cleaned up and any other future Flatcar changes would be applied ([bootengine#54](https://github.com/flatcar/bootengine/pull/54))\n- Specifying the OEM filesystem in Ignition to write files to `/usr/share/oem` is not needed anymore ([bootengine#58](https://github.com/flatcar/bootengine/pull/58))\n- Switched systemd log reporting to the combined format of both unit description, as before, and now the unit name to easily find the unit ([coreos-overlay#2436](https://github.com/flatcar/coreos-overlay/pull/2436))\n\n#### Updates:\n\n- Linux ([5.15.106](https://lwn.net/Articles/928343) (includes [5.15.105](https://lwn.net/Articles/927860), [5.15.104](https://lwn.net/Articles/926873), [5.15.103](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.103) [5.15.102](https://lwn.net/Articles/925991), [5.15.101](https://lwn.net/Articles/925939), [5.15.100](https://lwn.net/Articles/925913), [5.15.99](https://lwn.net/Articles/925844)))\n- Linux Firmware ([20230310](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230310) (includes [20230210](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230210)))\n- bind tools ([9.16.37](https://bind9.readthedocs.io/en/v9_16_37/notes.html#notes-for-bind-9-16-37))\n- btrfs-progs ([6.0.2](https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2-2022-11-24) (includes [6.0](https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2022-10-11)))\n- ca-certificates ([3.89](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89.html))\n- containerd ([1.6.19](https://github.com/containerd/containerd/releases/tag/v1.6.19) (includes [1.6.18](https://github.com/containerd/containerd/releases/tag/v1.6.18)))\n- curl ([7.88.1](https://curl.se/changes.html#7_88_1) (includes [7.88.0](https://curl.se/changes.html#7_88_0)))\n- diffutils ([3.9](https://savannah.gnu.org/forum/forum.php?forum_id=10282))\n- e2fsprogs ([1.46.6](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.6))\n- findutils ([4.9.0](https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00003.html))\n- Go ([1.19.7](https://go.dev/doc/devel/release#go1.19.7) (includes [1.19.6](https://go.dev/doc/devel/release#go1.19.6)))\n- gcc ([12.2.1](https://gcc.gnu.org/gcc-12/changes.html))\n- git ([2.39.2](https://github.com/git/git/blob/v2.39.2/Documentation/RelNotes/2.39.2.txt))\n- GLib ([2.74.5](https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.5))\n- GnuTLS ([3.8.0](https://gitlab.com/gnutls/gnutls/-/blob/3.8.0/NEWS))\n- ignition ([2.15.0](https://coreos.github.io/ignition/release-notes/#ignition-2150-2023-02-21))\n- intel-microcode ([20230214](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214))\n- iputils ([20221126](https://github.com/iputils/iputils/releases/tag/20221126))\n- less ([608](http://www.greenwoodsoftware.com/less/news.608.html))\n- libpcap ([1.10.3](https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.3:/CHANGES) (includes [1.10.2](https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.2:/CHANGES)))\n- libpcre2 ([10.42](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.42/NEWS))\n- OpenSSH ([9.2](http://www.openssh.com/releasenotes.html#9.2))\n- OpenSSL ([3.0.8](https://github.com/openssl/openssl/blob/openssl-3.0.8/NEWS.md#major-changes-between-openssl-307-and-openssl-308-7-feb-2023))\n- qemu guest agent ([7.1.0](https://wiki.qemu.org/ChangeLog/7.1#Guest_agent))\n- socat ([1.7.4.4](https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.4:/CHANGES))\n- strace ([6.1](https://github.com/strace/strace/releases/tag/v6.1))\n- traceroute (2.1.1)\n- vim ([9.0.1363](https://github.com/vim/vim/releases/tag/v9.0.1363))\n- SDK: cmake ([3.25.2](https://cmake.org/cmake/help/v3.25/release/3.25.html))\n- SDK: dnsmasq ([2.89](https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q1/016859.html))\n- SDK: portage ([3.0.44](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.44))\n- SDK: python ([3.10.10](https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-10-final) (includes [3.10.9](https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-9-final), [3.10](https://www.python.org/downloads/release/python-3100/)))\n- SDK: Rust ([1.68.0](https://github.com/rust-lang/rust/releases/tag/1.68.0) (includes [1.67.1](https://github.com/rust-lang/rust/releases/tag/1.67.1)))\n- VMware: open-vm-tools ([12.2.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.0))\n\n\n_Changes since **Alpha 3549.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-4269](https://nvd.nist.gov/vuln/detail/CVE-2022-4269), [CVE-2022-4379](https://nvd.nist.gov/vuln/detail/CVE-2022-4379), [CVE-2023-1611](https://nvd.nist.gov/vuln/detail/CVE-2023-1611), [CVE-2023-1670](https://nvd.nist.gov/vuln/detail/CVE-2023-1670), [CVE-2023-1855](https://nvd.nist.gov/vuln/detail/CVE-2023-1855), [CVE-2023-1989](https://nvd.nist.gov/vuln/detail/CVE-2023-1989), [CVE-2023-1990](https://nvd.nist.gov/vuln/detail/CVE-2023-1990), [CVE-2023-28466](https://nvd.nist.gov/vuln/detail/CVE-2023-28466), [CVE-2023-30456](https://nvd.nist.gov/vuln/detail/CVE-2023-30456), [CVE-2023-30772](https://nvd.nist.gov/vuln/detail/CVE-2023-30772))\n\n#### Bug fixes:\n\n- Ensured that `/var/log/journal/` is created early enough for systemd-journald to persist the logs on first boot ([bootengine#60](https://github.com/flatcar/bootengine/pull/60), [baselayout#29](https://github.com/flatcar/baselayout/pull/29))\n- Fixed `journalctl --user` permission issue ([Flatcar#989](https://github.com/flatcar/Flatcar/issues/989))\n\n#### Changes:\n\n\n#### Updates:\n\n- Linux ([5.15.106](https://lwn.net/Articles/928343) (includes [5.15.105](https://lwn.net/Articles/927860), [5.15.104](https://lwn.net/Articles/926873)))\n"
  },
  "3549.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-04-25 13:37:33 +0000",
    "major_software": {
      "containerd": [
        "1.6.19"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "5.15.108"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **Beta 3549.1.0**_\n\n#### Security fixes:\n\n- nvidia-drivers ([CVE-2022-31607](https://nvd.nist.gov/vuln/detail/CVE-2022-31607), [CVE-2022-31608](https://nvd.nist.gov/vuln/detail/CVE-2022-31608), [CVE-2022-31615](https://nvd.nist.gov/vuln/detail/CVE-2022-31615), [CVE-2022-34665](https://nvd.nist.gov/vuln/detail/CVE-2022-34665), [CVE-2022-34666](https://nvd.nist.gov/vuln/detail/CVE-2022-34666), [CVE-2022-34670](https://nvd.nist.gov/vuln/detail/CVE-2022-34670), [CVE-2022-34673](https://nvd.nist.gov/vuln/detail/CVE-2022-34673), [CVE-2022-34674](https://nvd.nist.gov/vuln/detail/CVE-2022-34674), [CVE-2022-34676](https://nvd.nist.gov/vuln/detail/CVE-2022-34676), [CVE-2022-34677](https://nvd.nist.gov/vuln/detail/CVE-2022-34677), [CVE-2022-34678](https://nvd.nist.gov/vuln/detail/CVE-2022-34678), [CVE-2022-34679](https://nvd.nist.gov/vuln/detail/CVE-2022-34679), [CVE-2022-34680](https://nvd.nist.gov/vuln/detail/CVE-2022-34680), [CVE-2022-34682](https://nvd.nist.gov/vuln/detail/CVE-2022-34682), [CVE-2022-34684](https://nvd.nist.gov/vuln/detail/CVE-2022-34684), [CVE-2022-42254](https://nvd.nist.gov/vuln/detail/CVE-2022-42254), [CVE-2022-42255](https://nvd.nist.gov/vuln/detail/CVE-2022-42255), [CVE-2022-42256](https://nvd.nist.gov/vuln/detail/CVE-2022-42256), [CVE-2022-42257](https://nvd.nist.gov/vuln/detail/CVE-2022-42257), [CVE-2022-42258](https://nvd.nist.gov/vuln/detail/CVE-2022-42258), [CVE-2022-42259](https://nvd.nist.gov/vuln/detail/CVE-2022-42259), [CVE-2022-42260](https://nvd.nist.gov/vuln/detail/CVE-2022-42260), [CVE-2022-42261](https://nvd.nist.gov/vuln/detail/CVE-2022-42261), [CVE-2022-42263](https://nvd.nist.gov/vuln/detail/CVE-2022-42263), [CVE-2022-42264](https://nvd.nist.gov/vuln/detail/CVE-2022-42264), [CVE-2022-42265](https://nvd.nist.gov/vuln/detail/CVE-2022-42265))\n\n#### Bug fixes:\n- Fixed systemd journal logs persistency on the first boot ([flatcar#1005](https://github.com/flatcar/Flatcar/issues/1005))\n- Fixed the broken emerge-gitclone in the dev-container owing to the missing migration action around the unification of the Flatcar core repositories\n\n#### Changes:\n- The package upgrade for nvidia-drivers might result in not supporting a few of the older NVIDIA Tesla GPUs. If you are facing issues, set `NVIDIA_DRIVER_VERSION=460.106.00` in `/etc/flatcar/nvidia-metadata`\n\n\n#### Updates:\n\n- Linux ([5.15.108](https://lwn.net/Articles/929679/) (includes [5.15.107](https://lwn.net/Articles/929015/)))\n- nvidia-drivers ([525.105.17](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-525-105-17/index.html))\n"
  },
  "3572.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-05-16 10:20:20 +0000",
    "major_software": {
      "containerd": [
        "1.6.20"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "5.15.111"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **Beta 3549.1.1**_\n \n#### Security fixes:\n \n- Linux ([CVE-2023-1380](https://nvd.nist.gov/vuln/detail/CVE-2023-1380), [CVE-2023-2002](https://nvd.nist.gov/vuln/detail/CVE-2023-2002), [CVE-2023-31436](https://nvd.nist.gov/vuln/detail/CVE-2023-31436))\n- Docker ([CVE-2023-28840](https://nvd.nist.gov/vuln/detail/CVE-2023-28840), [CVE-2023-28841](https://nvd.nist.gov/vuln/detail/CVE-2023-28841), [CVE-2023-28842](https://nvd.nist.gov/vuln/detail/CVE-2023-28842))\n- Go ([CVE-2023-24534](https://nvd.nist.gov/vuln/detail/CVE-2023-24534), [CVE-2023-24536](https://nvd.nist.gov/vuln/detail/CVE-2023-24536), [CVE-2023-24537](https://nvd.nist.gov/vuln/detail/CVE-2023-24537), [CVE-2023-24538](https://nvd.nist.gov/vuln/detail/CVE-2023-24538))\n- runc ([CVE-2023-25809](https://nvd.nist.gov/vuln/detail/CVE-2023-25809), [CVE-2023-27561](https://nvd.nist.gov/vuln/detail/CVE-2023-27561), [CVE-2023-28642](https://nvd.nist.gov/vuln/detail/CVE-2023-28642))\n- tar ([CVE-2022-48303](https://nvd.nist.gov/vuln/detail/CVE-2022-48303))\n- vim ([CVE-2023-1127](https://nvd.nist.gov/vuln/detail/CVE-2023-1127), [CVE-2023-1175](https://nvd.nist.gov/vuln/detail/CVE-2023-1175), [CVE-2023-1170](https://nvd.nist.gov/vuln/detail/CVE-2023-1170))\n \n#### Bug fixes:\n \n- Fixed a miscompilation of getfacl causing it to dump core when executed ([scripts#809](https://github.com/flatcar/scripts/pull/809))\n \n#### Changes:\n \n- Improved the OS reset tool to offer preview, backup and restore ([init#94](https://github.com/flatcar/init/pull/94))\n \n#### Updates:\n \n- Linux ([5.15.111](https://lwn.net/Articles/931680) (includes [5.15.110](https://lwn.net/Articles/930600), [5.15.109](https://lwn.net/Articles/930263)))\n- Linux Firmware ([20230404](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230404))\n- ca-certificates ([3.89.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89_1.html))\n- containerd ([1.6.20](https://github.com/containerd/containerd/releases/tag/v1.6.20))\n- docker ([20.10.24](https://docs.docker.com/engine/release-notes/20.10/#201024))\n- go ([1.19.8](https://go.dev/doc/devel/release#go1.19.8))\n- iperf ([3.13](https://github.com/esnet/iperf/blob/3.13/RELNOTES.md))\n- runc ([1.1.5](https://github.com/opencontainers/runc/releases/tag/v1.1.5))\n- vim ([9.0.1403](https://github.com/vim/vim/releases/tag/v9.0.1403))\n- zstandard ([1.5.4](https://github.com/facebook/zstd/releases/tag/v1.5.4))\n- SDK: pahole ([1.24](https://github.com/acmel/dwarves/releases/tag/v1.24)) \n- SDK: rust ([1.68.2](https://github.com/rust-lang/rust/releases/tag/1.68.2))\n \n_Changes since **Alpha 3572.0.1**_\n \n#### Security fixes:\n \n- Linux ([CVE-2023-1380](https://nvd.nist.gov/vuln/detail/CVE-2023-1380), [CVE-2023-2002](https://nvd.nist.gov/vuln/detail/CVE-2023-2002), [CVE-2023-31436](https://nvd.nist.gov/vuln/detail/CVE-2023-31436))\n \n#### Bug fixes:\n \n- Fixed a miscompilation of getfacl causing it to dump core when executed ([scripts#809](https://github.com/flatcar/scripts/pull/809))\n \n#### Updates:\n \n- Linux ([5.15.111](https://lwn.net/Articles/931680) (includes [5.15.110](https://lwn.net/Articles/930600), [5.15.109](https://lwn.net/Articles/930263)))\n- ca-certificates ([3.89.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89_1.html))\n"
  },
  "3602.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-06-01 11:51:22 +0000",
    "major_software": {
      "containerd": [
        "1.6.21"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "5.15.113"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **Beta 3572.1.0**_\n \n#### Security fixes:\n \n - Linux ([CVE-2022-48425](https://nvd.nist.gov/vuln/detail/CVE-2022-48425))\n - Go ([CVE-2023-24539](https://nvd.nist.gov/vuln/detail/CVE-2023-24539), [CVE-2023-24540](https://nvd.nist.gov/vuln/detail/CVE-2023-24540), [CVE-2023-29400](https://nvd.nist.gov/vuln/detail/CVE-2023-29400))\n - OpenSSH ([CVE-2023-28531](https://nvd.nist.gov/vuln/detail/CVE-2023-28531))\n - OpenSSL ([CVE-2023-0464](https://nvd.nist.gov/vuln/detail/CVE-2023-0464), [CVE-2023-0465](https://nvd.nist.gov/vuln/detail/CVE-2023-0465), [CVE-2023-0466](https://nvd.nist.gov/vuln/detail/CVE-2023-0466), [CVE-2023-1255](https://nvd.nist.gov/vuln/detail/CVE-2023-1255))\n - bash ([CVE-2022-3715](https://nvd.nist.gov/vuln/detail/CVE-2022-3715))\n - c-ares ([CVE-2022-4904](https://nvd.nist.gov/vuln/detail/CVE-2022-4904))\n - curl ([CVE-2023-27533](https://nvd.nist.gov/vuln/detail/CVE-2023-27533), [CVE-2023-27534](https://nvd.nist.gov/vuln/detail/CVE-2023-27534), [CVE-2023-27535](https://nvd.nist.gov/vuln/detail/CVE-2023-27535), [CVE-2023-27536](https://nvd.nist.gov/vuln/detail/CVE-2023-27536), [CVE-2023-27537](https://nvd.nist.gov/vuln/detail/CVE-2023-27537), [CVE-2023-27538](https://nvd.nist.gov/vuln/detail/CVE-2023-27538))\n - libxml2 ([CVE-2023-28484](https://nvd.nist.gov/vuln/detail/CVE-2023-28484), [CVE-2023-29469](https://nvd.nist.gov/vuln/detail/CVE-2023-29469))\n \n#### Bug fixes:\n \n - Restored the reboot warning and delay for non-SSH console sessions ([locksmith#21](https://github.com/flatcar/locksmith/pull/21))\n \n#### Changes:\n \n - Changed coreos-cloudinit to now set the short hostname instead of the FQDN when fetched from the metadata service ([coreos-cloudinit#19](https://github.com/flatcar/coreos-cloudinit/pull/19))\n \n#### Updates:\n \n - Linux ([5.15.113](https://lwn.net/Articles/932883) (includes [5.15.112](https://lwn.net/Articles/932134)))\n - Go ([1.19.9](https://go.dev/doc/devel/release#go1.19.9))\n - OpenSSH ([9.3](http://www.openssh.com/releasenotes.html#9.3))\n - bash ([5.2](https://lists.gnu.org/archive/html/bash-announce/2022-09/msg00000.html))\n - bpftool ([6.2.1](https://kernelnewbies.org/LinuxChanges#Linux_6.2.Tracing.2C_perf_and_BPF))\n - c-ares ([1.19.0](https://c-ares.org/changelog.html#1_19_0))\n - containerd ([1.6.21](https://github.com/containerd/containerd/releases/tag/v1.6.21))\n - curl ([8.0.1](https://curl.se/changes.html#8_0_1))\n - e2fsprogs ([1.47.0](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html##1.47.0))\n - gdb ([13.1.90](https://lwn.net/Articles/923819/))\n - GLib ([2.74.6](https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.6))\n - libarchive ([3.6.2](https://github.com/libarchive/libarchive/releases/tag/v3.6.2))\n - libxml2 ([2.10.4](https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.4))\n - multipath-tools ([0.9.4](https://github.com/opensvc/multipath-tools/commits/0.9.4))\n - pinentry ([1.2.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=c080b34e57d01a6ccca9d2996d7096c42b1a3f84;hb=8ab1682e80a2b4185ee9ef66cbb44340245966fc))\n - readline ([8.2](https://lists.gnu.org/archive/html/info-gnu/2022-09/msg00013.html))\n - runc ([1.1.7](https://github.com/opencontainers/runc/releases/tag/v1.1.7))\n - sqlite ([3.41.2](https://sqlite.org/releaselog/3_41_2.html))\n - XZ utils ([5.4.2](https://github.com/tukaani-project/xz/releases/tag/v5.4.2))\n - SDK: nano ([7.2](https://git.savannah.gnu.org/cgit/nano.git/tree/NEWS?h=v7.2))\n\n_Changes since **Alpha 3602.0.0**_\n \n#### Security fixes:\n \n - Linux ([CVE-2022-48425](https://nvd.nist.gov/vuln/detail/CVE-2022-48425))\n \n#### Bug fixes:\n \n \n#### Changes:\n \n \n#### Updates:\n \n - Linux ([5.15.113](https://lwn.net/Articles/932883) (includes [5.15.112](https://lwn.net/Articles/932134)))\n"
  },
  "3602.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-06-21 12:17:56 +0000",
    "major_software": {
      "containerd": [
        "1.6.21"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "5.15.117"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **Beta 3602.1.0**_\n \n#### Bug fixes:\n \n- Resolved the conflicting FD usage of libselinux and systemd which caused, e.g., a systemd crash on certain watchdog interaction during shutdown (patch in systemd 252.11)\n \n#### Updates:\n \n- Linux ([5.15.117](https://lwn.net/Articles/934622) (includes [5.15.116](https://lwn.net/Articles/934320), [5.15.115](https://lwn.net/Articles/933909), [5.15.114](https://lwn.net/Articles/933280)))\n- ca-certificates ([3.90](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90.html))\n- systemd ([252.11](https://github.com/systemd/systemd-stable/releases/tag/v252.11) (from 252.5))"
  },
  "3602.1.2": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-07-06 12:15:43 +0000",
    "major_software": {
      "containerd": [
        "1.6.21"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "5.15.119"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **Beta 3602.1.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-3338](https://nvd.nist.gov/vuln/detail/CVE-2023-3338), [CVE-2023-3390](https://nvd.nist.gov/vuln/detail/CVE-2023-3390))\n \n #### Bug fixes:\n \n - Ensured that the folder `/var/log/sssd` is created if it doesn't exist, required for `sssd.service` ([Flatcar#1096](https://github.com/flatcar/Flatcar/issues/1096))\n - Worked around a bash regression in `flatcar-install` and added error reporting for disk write failures ([Flatcar#1059](https://github.com/flatcar/Flatcar/issues/1059))\n \n #### Changes:\n \n - Changed ext4 inode size of root partition to 256 bytes. This improves compatibility with applications and is necessary for 2038 readiness ([Flatcar#1082](https://github.com/flatcar/Flatcar/issues/1082))\n \n #### Updates:\n \n - Linux ([5.15.119](https://lwn.net/Articles/936675) (includes [5.15.118](https://lwn.net/Articles/935584)))\n - ca-certificates ([3.91](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_91.html))"
  },
  "3602.1.3": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-07-18 08:59:31 +0000",
    "major_software": {
      "containerd": [
        "1.6.21"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "5.15.120"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **Beta 3602.1.2**_\n\n #### Updates:\n \n - Linux ([5.15.120](https://lwn.net/Articles/937404))"
  },
  "3602.1.4": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-08-09 11:43:20 +0000",
    "major_software": {
      "containerd": [
        "1.6.21"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "5.15.124"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **Beta 3602.1.3**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-48502](https://nvd.nist.gov/vuln/detail/CVE-2022-48502), [CVE-2023-20593](https://nvd.nist.gov/vuln/detail/CVE-2023-20593), [CVE-2023-2898](https://nvd.nist.gov/vuln/detail/CVE-2023-2898), [CVE-2023-31248](https://nvd.nist.gov/vuln/detail/CVE-2023-31248), [CVE-2023-35001](https://nvd.nist.gov/vuln/detail/CVE-2023-35001), [CVE-2023-3611](https://nvd.nist.gov/vuln/detail/CVE-2023-3611), [CVE-2023-3776](https://nvd.nist.gov/vuln/detail/CVE-2023-3776), [CVE-2023-38432](https://nvd.nist.gov/vuln/detail/CVE-2023-38432), [CVE-2023-3863](https://nvd.nist.gov/vuln/detail/CVE-2023-3863))\n - OpenSSH ([CVE-2023-38408](https://nvd.nist.gov/vuln/detail/CVE-2023-38408))\n - linux-firmware ([CVE-2023-20593](https://nvd.nist.gov/vuln/detail/CVE-2023-20593))\n\n #### Updates:\n \n - Linux ([5.15.124](https://lwn.net/Articles/940339) (includes [5.15.123](https://lwn.net/Articles/939424), [5.15.122](https://lwn.net/Articles/939104), [5.15.121](https://lwn.net/Articles/939016)))\n - ca-certificates ([3.92](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_92.html))\n - linux-firmware ([20230625](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625))\n"
  },
  "3602.1.5": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-09-06 13:18:11 +0000",
    "major_software": {
      "containerd": [
        "1.6.21"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "5.15.129"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **Beta 3602.1.4**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982), [CVE-2022-41804](https://nvd.nist.gov/vuln/detail/CVE-2022-41804), [CVE-2023-20569](https://nvd.nist.gov/vuln/detail/CVE-2023-20569), [CVE-2023-20588](https://nvd.nist.gov/vuln/detail/CVE-2023-20588), [CVE-2023-40283](https://nvd.nist.gov/vuln/detail/CVE-2023-40283), [CVE-2023-4128](https://nvd.nist.gov/vuln/detail/CVE-2023-4128), [CVE-2023-23908](https://nvd.nist.gov/vuln/detail/CVE-2023-23908))\n \n #### Bug fixes:\n \n - Fixed the restart of Systemd services when the main process is being killed by a SIGHUP signal ([flatcar#1157](https://github.com/flatcar/Flatcar/issues/1157))\n \n #### Updates:\n \n - Linux ([5.15.129](https://lwn.net/Articles/943113) (includes [5.15.128](https://lwn.net/Articles/942866), [5.15.127](https://lwn.net/Articles/941775), [5.15.126](https://lwn.net/Articles/941296), [5.15.125](https://lwn.net/Articles/940801)))"
  },
  "3602.1.6": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-09-21 11:36:01 +0000",
    "major_software": {
      "containerd": [
        "1.6.21"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "5.15.132"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **Beta 3602.1.5**_\n \n #### Changes:\n \n - Azure: Add support for Microsoft Azure Network Adapter (MANA) NICs on Azure ([scripts#1131](https://github.com/flatcar/scripts/pull/1131))\n \n #### Updates:\n \n - Linux ([5.15.132](https://lwn.net/Articles/944877) (includes [5.15.131](https://lwn.net/Articles/943755), [5.15.130](https://lwn.net/Articles/943404)))\n - ca-certificates ([3.93](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_93.html))"
  },
  "3732.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-10-05 10:00:33 +0000",
    "major_software": {
      "containerd": [
        "1.7.6"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "6.1.55"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **Alpha 3732.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-42755](https://nvd.nist.gov/vuln/detail/CVE-2023-42755))\n \n #### Bug fixes:\n \n - Triggered re-reading of partition table to fix adding partitions to the boot disk ([scripts#1202](https://github.com/flatcar/scripts/pull/1202))\n \n #### Changes:\n \n - Use qcow2 compressed format instead of additional compression layer in Qemu images ([Flatcar#1135](https://github.com/flatcar/Flatcar/issues/1135), [scripts#1132](https://github.com/flatcar/scripts/pull/1132))\n \n #### Updates:\n \n - Linux ([6.1.55](https://lwn.net/Articles/945379))\n\n_Changes compared to **Beta 3602.1.6**_\n\n #### Security fixes:\n \n - Linux ([CVE-2020-36516](https://nvd.nist.gov/vuln/detail/CVE-2020-36516),[CVE-2021-26401](https://nvd.nist.gov/vuln/detail/CVE-2021-26401),[CVE-2021-33135](https://nvd.nist.gov/vuln/detail/CVE-2021-33135),[CVE-2021-33655](https://nvd.nist.gov/vuln/detail/CVE-2021-33655),[CVE-2021-3923](https://nvd.nist.gov/vuln/detail/CVE-2021-3923),[CVE-2021-4155](https://nvd.nist.gov/vuln/detail/CVE-2021-4155),[CVE-2021-4197](https://nvd.nist.gov/vuln/detail/CVE-2021-4197),[CVE-2021-43976](https://nvd.nist.gov/vuln/detail/CVE-2021-43976),[CVE-2021-44879](https://nvd.nist.gov/vuln/detail/CVE-2021-44879),[CVE-2021-45469](https://nvd.nist.gov/vuln/detail/CVE-2021-45469),[CVE-2022-0001](https://nvd.nist.gov/vuln/detail/CVE-2022-0001),[CVE-2022-0002](https://nvd.nist.gov/vuln/detail/CVE-2022-0002),[CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168),[CVE-2022-0185](https://nvd.nist.gov/vuln/detail/CVE-2022-0185),[CVE-2022-0330](https://nvd.nist.gov/vuln/detail/CVE-2022-0330),[CVE-2022-0382](https://nvd.nist.gov/vuln/detail/CVE-2022-0382),[CVE-2022-0433](https://nvd.nist.gov/vuln/detail/CVE-2022-0433),[CVE-2022-0435](https://nvd.nist.gov/vuln/detail/CVE-2022-0435),[CVE-2022-0487](https://nvd.nist.gov/vuln/detail/CVE-2022-0487),[CVE-2022-0492](https://nvd.nist.gov/vuln/detail/CVE-2022-0492),[CVE-2022-0494](https://nvd.nist.gov/vuln/detail/CVE-2022-0494),[CVE-2022-0500](https://nvd.nist.gov/vuln/detail/CVE-2022-0500),[CVE-2022-0516](https://nvd.nist.gov/vuln/detail/CVE-2022-0516),[CVE-2022-0617](https://nvd.nist.gov/vuln/detail/CVE-2022-0617),[CVE-2022-0742](https://nvd.nist.gov/vuln/detail/CVE-2022-0742),[CVE-2022-0847](https://nvd.nist.gov/vuln/detail/CVE-2022-0847),[CVE-2022-0995](https://nvd.nist.gov/vuln/detail/CVE-2022-0995),[CVE-2022-1011](https://nvd.nist.gov/vuln/detail/CVE-2022-1011),[CVE-2022-1012](https://nvd.nist.gov/vuln/detail/CVE-2022-1012),[CVE-2022-1015](https://nvd.nist.gov/vuln/detail/CVE-2022-1015),[CVE-2022-1016](https://nvd.nist.gov/vuln/detail/CVE-2022-1016),[CVE-2022-1048](https://nvd.nist.gov/vuln/detail/CVE-2022-1048),[CVE-2022-1055](https://nvd.nist.gov/vuln/detail/CVE-2022-1055),[CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158),[CVE-2022-1184](https://nvd.nist.gov/vuln/detail/CVE-2022-1184),[CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198),[CVE-2022-1199](https://nvd.nist.gov/vuln/detail/CVE-2022-1199),[CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204),[CVE-2022-1205](https://nvd.nist.gov/vuln/detail/CVE-2022-1205),[CVE-2022-1263](https://nvd.nist.gov/vuln/detail/CVE-2022-1263),[CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353),[CVE-2022-1462](https://nvd.nist.gov/vuln/detail/CVE-2022-1462),[CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516),[CVE-2022-1651](https://nvd.nist.gov/vuln/detail/CVE-2022-1651),[CVE-2022-1652](https://nvd.nist.gov/vuln/detail/CVE-2022-1652),[CVE-2022-1671](https://nvd.nist.gov/vuln/detail/CVE-2022-1671),[CVE-2022-1679](https://nvd.nist.gov/vuln/detail/CVE-2022-1679),[CVE-2022-1729](https://nvd.nist.gov/vuln/detail/CVE-2022-1729),[CVE-2022-1734](https://nvd.nist.gov/vuln/detail/CVE-2022-1734),[CVE-2022-1789](https://nvd.nist.gov/vuln/detail/CVE-2022-1789),[CVE-2022-1852](https://nvd.nist.gov/vuln/detail/CVE-2022-1852),[CVE-2022-1882](https://nvd.nist.gov/vuln/detail/CVE-2022-1882),[CVE-2022-1943](https://nvd.nist.gov/vuln/detail/CVE-2022-1943),[CVE-2022-1973](https://nvd.nist.gov/vuln/detail/CVE-2022-1973),[CVE-2022-1974](https://nvd.nist.gov/vuln/detail/CVE-2022-1974),[CVE-2022-1975](https://nvd.nist.gov/vuln/detail/CVE-2022-1975),[CVE-2022-1976](https://nvd.nist.gov/vuln/detail/CVE-2022-1976),[CVE-2022-1998](https://nvd.nist.gov/vuln/detail/CVE-2022-1998),[CVE-2022-20008](https://nvd.nist.gov/vuln/detail/CVE-2022-20008),[CVE-2022-20158](https://nvd.nist.gov/vuln/detail/CVE-2022-20158),[CVE-2022-20368](https://nvd.nist.gov/vuln/detail/CVE-2022-20368),[CVE-2022-20369](https://nvd.nist.gov/vuln/detail/CVE-2022-20369),[CVE-2022-20421](https://nvd.nist.gov/vuln/detail/CVE-2022-20421),[CVE-2022-20422](https://nvd.nist.gov/vuln/detail/CVE-2022-20422),[CVE-2022-20423](https://nvd.nist.gov/vuln/detail/CVE-2022-20423),[CVE-2022-20566](https://nvd.nist.gov/vuln/detail/CVE-2022-20566),[CVE-2022-20572](https://nvd.nist.gov/vuln/detail/CVE-2022-20572),[CVE-2022-2078](https://nvd.nist.gov/vuln/detail/CVE-2022-2078),[CVE-2022-21123](https://nvd.nist.gov/vuln/detail/CVE-2022-21123),[CVE-2022-21125](https://nvd.nist.gov/vuln/detail/CVE-2022-21125),[CVE-2022-21166](https://nvd.nist.gov/vuln/detail/CVE-2022-21166),[CVE-2022-21499](https://nvd.nist.gov/vuln/detail/CVE-2022-21499),[CVE-2022-21505](https://nvd.nist.gov/vuln/detail/CVE-2022-21505),[CVE-2022-2153](https://nvd.nist.gov/vuln/detail/CVE-2022-2153),[CVE-2022-2196](https://nvd.nist.gov/vuln/detail/CVE-2022-2196),[CVE-2022-22942](https://nvd.nist.gov/vuln/detail/CVE-2022-22942),[CVE-2022-23036](https://nvd.nist.gov/vuln/detail/CVE-2022-23036),[CVE-2022-23037](https://nvd.nist.gov/vuln/detail/CVE-2022-23037),[CVE-2022-23038](https://nvd.nist.gov/vuln/detail/CVE-2022-23038),[CVE-2022-23039](https://nvd.nist.gov/vuln/detail/CVE-2022-23039),[CVE-2022-23040](https://nvd.nist.gov/vuln/detail/CVE-2022-23040),[CVE-2022-23041](https://nvd.nist.gov/vuln/detail/CVE-2022-23041),[CVE-2022-23042](https://nvd.nist.gov/vuln/detail/CVE-2022-23042),[CVE-2022-2308](https://nvd.nist.gov/vuln/detail/CVE-2022-2308),[CVE-2022-2318](https://nvd.nist.gov/vuln/detail/CVE-2022-2318),[CVE-2022-23222](https://nvd.nist.gov/vuln/detail/CVE-2022-23222),[CVE-2022-2380](https://nvd.nist.gov/vuln/detail/CVE-2022-2380),[CVE-2022-23960](https://nvd.nist.gov/vuln/detail/CVE-2022-23960),[CVE-2022-24448](https://nvd.nist.gov/vuln/detail/CVE-2022-24448),[CVE-2022-24958](https://nvd.nist.gov/vuln/detail/CVE-2022-24958),[CVE-2022-24959](https://nvd.nist.gov/vuln/detail/CVE-2022-24959),[CVE-2022-2503](https://nvd.nist.gov/vuln/detail/CVE-2022-2503),[CVE-2022-25258](https://nvd.nist.gov/vuln/detail/CVE-2022-25258),[CVE-2022-25375](https://nvd.nist.gov/vuln/detail/CVE-2022-25375),[CVE-2022-25636](https://nvd.nist.gov/vuln/detail/CVE-2022-25636),[CVE-2022-2585](https://nvd.nist.gov/vuln/detail/CVE-2022-2585),[CVE-2022-2586](https://nvd.nist.gov/vuln/detail/CVE-2022-2586),[CVE-2022-2588](https://nvd.nist.gov/vuln/detail/CVE-2022-2588),[CVE-2022-2590](https://nvd.nist.gov/vuln/detail/CVE-2022-2590),[CVE-2022-2602](https://nvd.nist.gov/vuln/detail/CVE-2022-2602),[CVE-2022-26365](https://nvd.nist.gov/vuln/detail/CVE-2022-26365),[CVE-2022-26373](https://nvd.nist.gov/vuln/detail/CVE-2022-26373),[CVE-2022-2639](https://nvd.nist.gov/vuln/detail/CVE-2022-2639),[CVE-2022-26490](https://nvd.nist.gov/vuln/detail/CVE-2022-26490),[CVE-2022-2663](https://nvd.nist.gov/vuln/detail/CVE-2022-2663),[CVE-2022-26966](https://nvd.nist.gov/vuln/detail/CVE-2022-26966),[CVE-2022-27223](https://nvd.nist.gov/vuln/detail/CVE-2022-27223),[CVE-2022-27666](https://nvd.nist.gov/vuln/detail/CVE-2022-27666),[CVE-2022-27672](https://nvd.nist.gov/vuln/detail/CVE-2022-27672),[CVE-2022-2785](https://nvd.nist.gov/vuln/detail/CVE-2022-2785),[CVE-2022-27950](https://nvd.nist.gov/vuln/detail/CVE-2022-27950),[CVE-2022-28356](https://nvd.nist.gov/vuln/detail/CVE-2022-28356),[CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388),[CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389),[CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390),[CVE-2022-2873](https://nvd.nist.gov/vuln/detail/CVE-2022-2873),[CVE-2022-28796](https://nvd.nist.gov/vuln/detail/CVE-2022-28796),[CVE-2022-28893](https://nvd.nist.gov/vuln/detail/CVE-2022-28893),[CVE-2022-2905](https://nvd.nist.gov/vuln/detail/CVE-2022-2905),[CVE-2022-29156](https://nvd.nist.gov/vuln/detail/CVE-2022-29156),[CVE-2022-2938](https://nvd.nist.gov/vuln/detail/CVE-2022-2938),[CVE-2022-29581](https://nvd.nist.gov/vuln/detail/CVE-2022-29581),[CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582),[CVE-2022-2959](https://nvd.nist.gov/vuln/detail/CVE-2022-2959),[CVE-2022-2964](https://nvd.nist.gov/vuln/detail/CVE-2022-2964),[CVE-2022-2977](https://nvd.nist.gov/vuln/detail/CVE-2022-2977),[CVE-2022-2978](https://nvd.nist.gov/vuln/detail/CVE-2022-2978),[CVE-2022-29900](https://nvd.nist.gov/vuln/detail/CVE-2022-29900),[CVE-2022-29901](https://nvd.nist.gov/vuln/detail/CVE-2022-29901),[CVE-2022-29968](https://nvd.nist.gov/vuln/detail/CVE-2022-29968),[CVE-2022-3028](https://nvd.nist.gov/vuln/detail/CVE-2022-3028),[CVE-2022-30594](https://nvd.nist.gov/vuln/detail/CVE-2022-30594),[CVE-2022-3077](https://nvd.nist.gov/vuln/detail/CVE-2022-3077),[CVE-2022-3078](https://nvd.nist.gov/vuln/detail/CVE-2022-3078),[CVE-2022-3104](https://nvd.nist.gov/vuln/detail/CVE-2022-3104),[CVE-2022-3105](https://nvd.nist.gov/vuln/detail/CVE-2022-3105),[CVE-2022-3107](https://nvd.nist.gov/vuln/detail/CVE-2022-3107),[CVE-2022-3108](https://nvd.nist.gov/vuln/detail/CVE-2022-3108),[CVE-2022-3110](https://nvd.nist.gov/vuln/detail/CVE-2022-3110),[CVE-2022-3111](https://nvd.nist.gov/vuln/detail/CVE-2022-3111),[CVE-2022-3112](https://nvd.nist.gov/vuln/detail/CVE-2022-3112),[CVE-2022-3113](https://nvd.nist.gov/vuln/detail/CVE-2022-3113),[CVE-2022-3115](https://nvd.nist.gov/vuln/detail/CVE-2022-3115),[CVE-2022-3169](https://nvd.nist.gov/vuln/detail/CVE-2022-3169),[CVE-2022-3202](https://nvd.nist.gov/vuln/detail/CVE-2022-3202),[CVE-2022-32250](https://nvd.nist.gov/vuln/detail/CVE-2022-32250),[CVE-2022-32296](https://nvd.nist.gov/vuln/detail/CVE-2022-32296),[CVE-2022-3239](https://nvd.nist.gov/vuln/detail/CVE-2022-3239),[CVE-2022-32981](https://nvd.nist.gov/vuln/detail/CVE-2022-32981),[CVE-2022-3303](https://nvd.nist.gov/vuln/detail/CVE-2022-3303),[CVE-2022-3344](https://nvd.nist.gov/vuln/detail/CVE-2022-3344),[CVE-2022-33740](https://nvd.nist.gov/vuln/detail/CVE-2022-33740),[CVE-2022-33741](https://nvd.nist.gov/vuln/detail/CVE-2022-33741),[CVE-2022-33742](https://nvd.nist.gov/vuln/detail/CVE-2022-33742),[CVE-2022-33743](https://nvd.nist.gov/vuln/detail/CVE-2022-33743),[CVE-2022-33744](https://nvd.nist.gov/vuln/detail/CVE-2022-33744),[CVE-2022-33981](https://nvd.nist.gov/vuln/detail/CVE-2022-33981),[CVE-2022-3424](https://nvd.nist.gov/vuln/detail/CVE-2022-3424),[CVE-2022-3435](https://nvd.nist.gov/vuln/detail/CVE-2022-3435),[CVE-2022-34494](https://nvd.nist.gov/vuln/detail/CVE-2022-34494),[CVE-2022-34495](https://nvd.nist.gov/vuln/detail/CVE-2022-34495),[CVE-2022-34918](https://nvd.nist.gov/vuln/detail/CVE-2022-34918),[CVE-2022-3521](https://nvd.nist.gov/vuln/detail/CVE-2022-3521),[CVE-2022-3524](https://nvd.nist.gov/vuln/detail/CVE-2022-3524),[CVE-2022-3526](https://nvd.nist.gov/vuln/detail/CVE-2022-3526),[CVE-2022-3534](https://nvd.nist.gov/vuln/detail/CVE-2022-3534),[CVE-2022-3541](https://nvd.nist.gov/vuln/detail/CVE-2022-3541),[CVE-2022-3543](https://nvd.nist.gov/vuln/detail/CVE-2022-3543),[CVE-2022-3564](https://nvd.nist.gov/vuln/detail/CVE-2022-3564),[CVE-2022-3565](https://nvd.nist.gov/vuln/detail/CVE-2022-3565),[CVE-2022-3577](https://nvd.nist.gov/vuln/detail/CVE-2022-3577),[CVE-2022-3586](https://nvd.nist.gov/vuln/detail/CVE-2022-3586),[CVE-2022-3594](https://nvd.nist.gov/vuln/detail/CVE-2022-3594),[CVE-2022-3595](https://nvd.nist.gov/vuln/detail/CVE-2022-3595),[CVE-2022-36123](https://nvd.nist.gov/vuln/detail/CVE-2022-36123),[CVE-2022-3619](https://nvd.nist.gov/vuln/detail/CVE-2022-3619),[CVE-2022-3621](https://nvd.nist.gov/vuln/detail/CVE-2022-3621),[CVE-2022-3623](https://nvd.nist.gov/vuln/detail/CVE-2022-3623),[CVE-2022-3625](https://nvd.nist.gov/vuln/detail/CVE-2022-3625),[CVE-2022-3628](https://nvd.nist.gov/vuln/detail/CVE-2022-3628),[CVE-2022-36280](https://nvd.nist.gov/vuln/detail/CVE-2022-36280),[CVE-2022-3635](https://nvd.nist.gov/vuln/detail/CVE-2022-3635),[CVE-2022-3640](https://nvd.nist.gov/vuln/detail/CVE-2022-3640),[CVE-2022-3643](https://nvd.nist.gov/vuln/detail/CVE-2022-3643),[CVE-2022-3646](https://nvd.nist.gov/vuln/detail/CVE-2022-3646),[CVE-2022-3649](https://nvd.nist.gov/vuln/detail/CVE-2022-3649),[CVE-2022-36879](https://nvd.nist.gov/vuln/detail/CVE-2022-36879),[CVE-2022-36946](https://nvd.nist.gov/vuln/detail/CVE-2022-36946),[CVE-2022-3707](https://nvd.nist.gov/vuln/detail/CVE-2022-3707),[CVE-2022-38457](https://nvd.nist.gov/vuln/detail/CVE-2022-38457),[CVE-2022-3910](https://nvd.nist.gov/vuln/detail/CVE-2022-3910),[CVE-2022-39189](https://nvd.nist.gov/vuln/detail/CVE-2022-39189),[CVE-2022-39190](https://nvd.nist.gov/vuln/detail/CVE-2022-39190),[CVE-2022-3977](https://nvd.nist.gov/vuln/detail/CVE-2022-3977),[CVE-2022-40133](https://nvd.nist.gov/vuln/detail/CVE-2022-40133),[CVE-2022-40307](https://nvd.nist.gov/vuln/detail/CVE-2022-40307),[CVE-2022-40768](https://nvd.nist.gov/vuln/detail/CVE-2022-40768),[CVE-2022-4095](https://nvd.nist.gov/vuln/detail/CVE-2022-4095),[CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982),[CVE-2022-41218](https://nvd.nist.gov/vuln/detail/CVE-2022-41218),[CVE-2022-4128](https://nvd.nist.gov/vuln/detail/CVE-2022-4128),[CVE-2022-4139](https://nvd.nist.gov/vuln/detail/CVE-2022-4139),[CVE-2022-41674](https://nvd.nist.gov/vuln/detail/CVE-2022-41674),[CVE-2022-41849](https://nvd.nist.gov/vuln/detail/CVE-2022-41849),[CVE-2022-41850](https://nvd.nist.gov/vuln/detail/CVE-2022-41850),[CVE-2022-41858](https://nvd.nist.gov/vuln/detail/CVE-2022-41858),[CVE-2022-42328](https://nvd.nist.gov/vuln/detail/CVE-2022-42328),[CVE-2022-42329](https://nvd.nist.gov/vuln/detail/CVE-2022-42329),[CVE-2022-42432](https://nvd.nist.gov/vuln/detail/CVE-2022-42432),[CVE-2022-4269](https://nvd.nist.gov/vuln/detail/CVE-2022-4269),[CVE-2022-42703](https://nvd.nist.gov/vuln/detail/CVE-2022-42703),[CVE-2022-42719](https://nvd.nist.gov/vuln/detail/CVE-2022-42719),[CVE-2022-42720](https://nvd.nist.gov/vuln/detail/CVE-2022-42720),[CVE-2022-42721](https://nvd.nist.gov/vuln/detail/CVE-2022-42721),[CVE-2022-42722](https://nvd.nist.gov/vuln/detail/CVE-2022-42722),[CVE-2022-42895](https://nvd.nist.gov/vuln/detail/CVE-2022-42895),[CVE-2022-42896](https://nvd.nist.gov/vuln/detail/CVE-2022-42896),[CVE-2022-43750](https://nvd.nist.gov/vuln/detail/CVE-2022-43750),[CVE-2022-4378](https://nvd.nist.gov/vuln/detail/CVE-2022-4378),[CVE-2022-4379](https://nvd.nist.gov/vuln/detail/CVE-2022-4379),[CVE-2022-4382](https://nvd.nist.gov/vuln/detail/CVE-2022-4382),[CVE-2022-43945](https://nvd.nist.gov/vuln/detail/CVE-2022-43945),[CVE-2022-45869](https://nvd.nist.gov/vuln/detail/CVE-2022-45869),[CVE-2022-45886](https://nvd.nist.gov/vuln/detail/CVE-2022-45886),[CVE-2022-45887](https://nvd.nist.gov/vuln/detail/CVE-2022-45887),[CVE-2022-45919](https://nvd.nist.gov/vuln/detail/CVE-2022-45919),[CVE-2022-45934](https://nvd.nist.gov/vuln/detail/CVE-2022-45934),[CVE-2022-4662](https://nvd.nist.gov/vuln/detail/CVE-2022-4662),[CVE-2022-47518](https://nvd.nist.gov/vuln/detail/CVE-2022-47518),[CVE-2022-47519](https://nvd.nist.gov/vuln/detail/CVE-2022-47519),[CVE-2022-47520](https://nvd.nist.gov/vuln/detail/CVE-2022-47520),[CVE-2022-47521](https://nvd.nist.gov/vuln/detail/CVE-2022-47521),[CVE-2022-47929](https://nvd.nist.gov/vuln/detail/CVE-2022-47929),[CVE-2022-47938](https://nvd.nist.gov/vuln/detail/CVE-2022-47938),[CVE-2022-47939](https://nvd.nist.gov/vuln/detail/CVE-2022-47939),[CVE-2022-47940](https://nvd.nist.gov/vuln/detail/CVE-2022-47940),[CVE-2022-47941](https://nvd.nist.gov/vuln/detail/CVE-2022-47941),[CVE-2022-47942](https://nvd.nist.gov/vuln/detail/CVE-2022-47942),[CVE-2022-47943](https://nvd.nist.gov/vuln/detail/CVE-2022-47943),[CVE-2022-4842](https://nvd.nist.gov/vuln/detail/CVE-2022-4842),[CVE-2022-48423](https://nvd.nist.gov/vuln/detail/CVE-2022-48423),[CVE-2022-48424](https://nvd.nist.gov/vuln/detail/CVE-2022-48424),[CVE-2022-48425](https://nvd.nist.gov/vuln/detail/CVE-2022-48425),[CVE-2022-48502](https://nvd.nist.gov/vuln/detail/CVE-2022-48502),[CVE-2023-0045](https://nvd.nist.gov/vuln/detail/CVE-2023-0045),[CVE-2023-0160](https://nvd.nist.gov/vuln/detail/CVE-2023-0160),[CVE-2023-0179](https://nvd.nist.gov/vuln/detail/CVE-2023-0179),[CVE-2023-0210](https://nvd.nist.gov/vuln/detail/CVE-2023-0210),[CVE-2023-0266](https://nvd.nist.gov/vuln/detail/CVE-2023-0266),[CVE-2023-0386](https://nvd.nist.gov/vuln/detail/CVE-2023-0386),[CVE-2023-0394](https://nvd.nist.gov/vuln/detail/CVE-2023-0394),[CVE-2023-0458](https://nvd.nist.gov/vuln/detail/CVE-2023-0458),[CVE-2023-0459](https://nvd.nist.gov/vuln/detail/CVE-2023-0459),[CVE-2023-0461](https://nvd.nist.gov/vuln/detail/CVE-2023-0461),[CVE-2023-0468](https://nvd.nist.gov/vuln/detail/CVE-2023-0468),[CVE-2023-0469](https://nvd.nist.gov/vuln/detail/CVE-2023-0469),[CVE-2023-0590](https://nvd.nist.gov/vuln/detail/CVE-2023-0590),[CVE-2023-0615](https://nvd.nist.gov/vuln/detail/CVE-2023-0615),[CVE-2023-1032](https://nvd.nist.gov/vuln/detail/CVE-2023-1032),[CVE-2023-1073](https://nvd.nist.gov/vuln/detail/CVE-2023-1073),[CVE-2023-1074](https://nvd.nist.gov/vuln/detail/CVE-2023-1074),[CVE-2023-1075](https://nvd.nist.gov/vuln/detail/CVE-2023-1075),[CVE-2023-1076](https://nvd.nist.gov/vuln/detail/CVE-2023-1076),[CVE-2023-1077](https://nvd.nist.gov/vuln/detail/CVE-2023-1077),[CVE-2023-1078](https://nvd.nist.gov/vuln/detail/CVE-2023-1078),[CVE-2023-1079](https://nvd.nist.gov/vuln/detail/CVE-2023-1079),[CVE-2023-1095](https://nvd.nist.gov/vuln/detail/CVE-2023-1095),[CVE-2023-1118](https://nvd.nist.gov/vuln/detail/CVE-2023-1118),[CVE-2023-1192](https://nvd.nist.gov/vuln/detail/CVE-2023-1192),[CVE-2023-1194](https://nvd.nist.gov/vuln/detail/CVE-2023-1194),[CVE-2023-1206](https://nvd.nist.gov/vuln/detail/CVE-2023-1206),[CVE-2023-1249](https://nvd.nist.gov/vuln/detail/CVE-2023-1249),[CVE-2023-1281](https://nvd.nist.gov/vuln/detail/CVE-2023-1281),[CVE-2023-1380](https://nvd.nist.gov/vuln/detail/CVE-2023-1380),[CVE-2023-1382](https://nvd.nist.gov/vuln/detail/CVE-2023-1382),[CVE-2023-1513](https://nvd.nist.gov/vuln/detail/CVE-2023-1513),[CVE-2023-1582](https://nvd.nist.gov/vuln/detail/CVE-2023-1582),[CVE-2023-1583](https://nvd.nist.gov/vuln/detail/CVE-2023-1583),[CVE-2023-1611](https://nvd.nist.gov/vuln/detail/CVE-2023-1611),[CVE-2023-1637](https://nvd.nist.gov/vuln/detail/CVE-2023-1637),[CVE-2023-1652](https://nvd.nist.gov/vuln/detail/CVE-2023-1652),[CVE-2023-1670](https://nvd.nist.gov/vuln/detail/CVE-2023-1670),[CVE-2023-1829](https://nvd.nist.gov/vuln/detail/CVE-2023-1829),[CVE-2023-1838](https://nvd.nist.gov/vuln/detail/CVE-2023-1838),[CVE-2023-1855](https://nvd.nist.gov/vuln/detail/CVE-2023-1855),[CVE-2023-1859](https://nvd.nist.gov/vuln/detail/CVE-2023-1859),[CVE-2023-1872](https://nvd.nist.gov/vuln/detail/CVE-2023-1872),[CVE-2023-1989](https://nvd.nist.gov/vuln/detail/CVE-2023-1989),[CVE-2023-1990](https://nvd.nist.gov/vuln/detail/CVE-2023-1990),[CVE-2023-1998](https://nvd.nist.gov/vuln/detail/CVE-2023-1998),[CVE-2023-2002](https://nvd.nist.gov/vuln/detail/CVE-2023-2002),[CVE-2023-2006](https://nvd.nist.gov/vuln/detail/CVE-2023-2006),[CVE-2023-2008](https://nvd.nist.gov/vuln/detail/CVE-2023-2008),[CVE-2023-2019](https://nvd.nist.gov/vuln/detail/CVE-2023-2019),[CVE-2023-20569](https://nvd.nist.gov/vuln/detail/CVE-2023-20569),[CVE-2023-20588](https://nvd.nist.gov/vuln/detail/CVE-2023-20588),[CVE-2023-20593](https://nvd.nist.gov/vuln/detail/CVE-2023-20593),[CVE-2023-20928](https://nvd.nist.gov/vuln/detail/CVE-2023-20928),[CVE-2023-20938](https://nvd.nist.gov/vuln/detail/CVE-2023-20938),[CVE-2023-21102](https://nvd.nist.gov/vuln/detail/CVE-2023-21102),[CVE-2023-21106](https://nvd.nist.gov/vuln/detail/CVE-2023-21106),[CVE-2023-2124](https://nvd.nist.gov/vuln/detail/CVE-2023-2124),[CVE-2023-21255](https://nvd.nist.gov/vuln/detail/CVE-2023-21255),[CVE-2023-2156](https://nvd.nist.gov/vuln/detail/CVE-2023-2156),[CVE-2023-2162](https://nvd.nist.gov/vuln/detail/CVE-2023-2162),[CVE-2023-2163](https://nvd.nist.gov/vuln/detail/CVE-2023-2163),[CVE-2023-2166](https://nvd.nist.gov/vuln/detail/CVE-2023-2166),[CVE-2023-2177](https://nvd.nist.gov/vuln/detail/CVE-2023-2177),[CVE-2023-2194](https://nvd.nist.gov/vuln/detail/CVE-2023-2194),[CVE-2023-2235](https://nvd.nist.gov/vuln/detail/CVE-2023-2235),[CVE-2023-2236](https://nvd.nist.gov/vuln/detail/CVE-2023-2236),[CVE-2023-2269](https://nvd.nist.gov/vuln/detail/CVE-2023-2269),[CVE-2023-22996](https://nvd.nist.gov/vuln/detail/CVE-2023-22996),[CVE-2023-22997](https://nvd.nist.gov/vuln/detail/CVE-2023-22997),[CVE-2023-22998](https://nvd.nist.gov/vuln/detail/CVE-2023-22998),[CVE-2023-22999](https://nvd.nist.gov/vuln/detail/CVE-2023-22999),[CVE-2023-23001](https://nvd.nist.gov/vuln/detail/CVE-2023-23001),[CVE-2023-23002](https://nvd.nist.gov/vuln/detail/CVE-2023-23002),[CVE-2023-23454](https://nvd.nist.gov/vuln/detail/CVE-2023-23454),[CVE-2023-23455](https://nvd.nist.gov/vuln/detail/CVE-2023-23455),[CVE-2023-23559](https://nvd.nist.gov/vuln/detail/CVE-2023-23559),[CVE-2023-2430](https://nvd.nist.gov/vuln/detail/CVE-2023-2430),[CVE-2023-25012](https://nvd.nist.gov/vuln/detail/CVE-2023-25012),[CVE-2023-2513](https://nvd.nist.gov/vuln/detail/CVE-2023-2513),[CVE-2023-25775](https://nvd.nist.gov/vuln/detail/CVE-2023-25775),[CVE-2023-26544](https://nvd.nist.gov/vuln/detail/CVE-2023-26544),[CVE-2023-26545](https://nvd.nist.gov/vuln/detail/CVE-2023-26545),[CVE-2023-26606](https://nvd.nist.gov/vuln/detail/CVE-2023-26606),[CVE-2023-26607](https://nvd.nist.gov/vuln/detail/CVE-2023-26607),[CVE-2023-28327](https://nvd.nist.gov/vuln/detail/CVE-2023-28327),[CVE-2023-28328](https://nvd.nist.gov/vuln/detail/CVE-2023-28328),[CVE-2023-28410](https://nvd.nist.gov/vuln/detail/CVE-2023-28410),[CVE-2023-28466](https://nvd.nist.gov/vuln/detail/CVE-2023-28466),[CVE-2023-28866](https://nvd.nist.gov/vuln/detail/CVE-2023-28866),[CVE-2023-2898](https://nvd.nist.gov/vuln/detail/CVE-2023-2898),[CVE-2023-2985](https://nvd.nist.gov/vuln/detail/CVE-2023-2985),[CVE-2023-3006](https://nvd.nist.gov/vuln/detail/CVE-2023-3006),[CVE-2023-30456](https://nvd.nist.gov/vuln/detail/CVE-2023-30456),[CVE-2023-30772](https://nvd.nist.gov/vuln/detail/CVE-2023-30772),[CVE-2023-3090](https://nvd.nist.gov/vuln/detail/CVE-2023-3090),[CVE-2023-3111](https://nvd.nist.gov/vuln/detail/CVE-2023-3111),[CVE-2023-31248](https://nvd.nist.gov/vuln/detail/CVE-2023-31248),[CVE-2023-3141](https://nvd.nist.gov/vuln/detail/CVE-2023-3141),[CVE-2023-31436](https://nvd.nist.gov/vuln/detail/CVE-2023-31436),[CVE-2023-3159](https://nvd.nist.gov/vuln/detail/CVE-2023-3159),[CVE-2023-3161](https://nvd.nist.gov/vuln/detail/CVE-2023-3161),[CVE-2023-3212](https://nvd.nist.gov/vuln/detail/CVE-2023-3212),[CVE-2023-3220](https://nvd.nist.gov/vuln/detail/CVE-2023-3220),[CVE-2023-32233](https://nvd.nist.gov/vuln/detail/CVE-2023-32233),[CVE-2023-32247](https://nvd.nist.gov/vuln/detail/CVE-2023-32247),[CVE-2023-32248](https://nvd.nist.gov/vuln/detail/CVE-2023-32248),[CVE-2023-32250](https://nvd.nist.gov/vuln/detail/CVE-2023-32250),[CVE-2023-32252](https://nvd.nist.gov/vuln/detail/CVE-2023-32252),[CVE-2023-32254](https://nvd.nist.gov/vuln/detail/CVE-2023-32254),[CVE-2023-32257](https://nvd.nist.gov/vuln/detail/CVE-2023-32257),[CVE-2023-32258](https://nvd.nist.gov/vuln/detail/CVE-2023-32258),[CVE-2023-32269](https://nvd.nist.gov/vuln/detail/CVE-2023-32269),[CVE-2023-3268](https://nvd.nist.gov/vuln/detail/CVE-2023-3268),[CVE-2023-3269](https://nvd.nist.gov/vuln/detail/CVE-2023-3269),[CVE-2023-33203](https://nvd.nist.gov/vuln/detail/CVE-2023-33203),[CVE-2023-33288](https://nvd.nist.gov/vuln/detail/CVE-2023-33288),[CVE-2023-3355](https://nvd.nist.gov/vuln/detail/CVE-2023-3355),[CVE-2023-3357](https://nvd.nist.gov/vuln/detail/CVE-2023-3357),[CVE-2023-3358](https://nvd.nist.gov/vuln/detail/CVE-2023-3358),[CVE-2023-3359](https://nvd.nist.gov/vuln/detail/CVE-2023-3359),[CVE-2023-3390](https://nvd.nist.gov/vuln/detail/CVE-2023-3390),[CVE-2023-33951](https://nvd.nist.gov/vuln/detail/CVE-2023-33951),[CVE-2023-33952](https://nvd.nist.gov/vuln/detail/CVE-2023-33952),[CVE-2023-34319](https://nvd.nist.gov/vuln/detail/CVE-2023-34319),[CVE-2023-3439](https://nvd.nist.gov/vuln/detail/CVE-2023-3439),[CVE-2023-35001](https://nvd.nist.gov/vuln/detail/CVE-2023-35001),[CVE-2023-3567](https://nvd.nist.gov/vuln/detail/CVE-2023-3567),[CVE-2023-35788](https://nvd.nist.gov/vuln/detail/CVE-2023-35788),[CVE-2023-35823](https://nvd.nist.gov/vuln/detail/CVE-2023-35823),[CVE-2023-35824](https://nvd.nist.gov/vuln/detail/CVE-2023-35824),[CVE-2023-35826](https://nvd.nist.gov/vuln/detail/CVE-2023-35826),[CVE-2023-35828](https://nvd.nist.gov/vuln/detail/CVE-2023-35828),[CVE-2023-35829](https://nvd.nist.gov/vuln/detail/CVE-2023-35829),[CVE-2023-3609](https://nvd.nist.gov/vuln/detail/CVE-2023-3609),[CVE-2023-3610](https://nvd.nist.gov/vuln/detail/CVE-2023-3610),[CVE-2023-3611](https://nvd.nist.gov/vuln/detail/CVE-2023-3611),[CVE-2023-3772](https://nvd.nist.gov/vuln/detail/CVE-2023-3772),[CVE-2023-3773](https://nvd.nist.gov/vuln/detail/CVE-2023-3773),[CVE-2023-3776](https://nvd.nist.gov/vuln/detail/CVE-2023-3776),[CVE-2023-3777](https://nvd.nist.gov/vuln/detail/CVE-2023-3777),[CVE-2023-3812](https://nvd.nist.gov/vuln/detail/CVE-2023-3812),[CVE-2023-38409](https://nvd.nist.gov/vuln/detail/CVE-2023-38409),[CVE-2023-38426](https://nvd.nist.gov/vuln/detail/CVE-2023-38426),[CVE-2023-38427](https://nvd.nist.gov/vuln/detail/CVE-2023-38427),[CVE-2023-38428](https://nvd.nist.gov/vuln/detail/CVE-2023-38428),[CVE-2023-38429](https://nvd.nist.gov/vuln/detail/CVE-2023-38429),[CVE-2023-38430](https://nvd.nist.gov/vuln/detail/CVE-2023-38430),[CVE-2023-38431](https://nvd.nist.gov/vuln/detail/CVE-2023-38431),[CVE-2023-38432](https://nvd.nist.gov/vuln/detail/CVE-2023-38432),[CVE-2023-3863](https://nvd.nist.gov/vuln/detail/CVE-2023-3863),[CVE-2023-3865](https://nvd.nist.gov/vuln/detail/CVE-2023-3865),[CVE-2023-3866](https://nvd.nist.gov/vuln/detail/CVE-2023-3866),[CVE-2023-3867](https://nvd.nist.gov/vuln/detail/CVE-2023-3867),[CVE-2023-4004](https://nvd.nist.gov/vuln/detail/CVE-2023-4004),[CVE-2023-4015](https://nvd.nist.gov/vuln/detail/CVE-2023-4015),[CVE-2023-40283](https://nvd.nist.gov/vuln/detail/CVE-2023-40283),[CVE-2023-4128](https://nvd.nist.gov/vuln/detail/CVE-2023-4128),[CVE-2023-4132](https://nvd.nist.gov/vuln/detail/CVE-2023-4132),[CVE-2023-4147](https://nvd.nist.gov/vuln/detail/CVE-2023-4147),[CVE-2023-4155](https://nvd.nist.gov/vuln/detail/CVE-2023-4155),[CVE-2023-4206](https://nvd.nist.gov/vuln/detail/CVE-2023-4206),[CVE-2023-4207](https://nvd.nist.gov/vuln/detail/CVE-2023-4207),[CVE-2023-4208](https://nvd.nist.gov/vuln/detail/CVE-2023-4208),[CVE-2023-4273](https://nvd.nist.gov/vuln/detail/CVE-2023-4273),[CVE-2023-42752](https://nvd.nist.gov/vuln/detail/CVE-2023-42752),[CVE-2023-42753](https://nvd.nist.gov/vuln/detail/CVE-2023-42753),[CVE-2023-42755](https://nvd.nist.gov/vuln/detail/CVE-2023-42755),[CVE-2023-4385](https://nvd.nist.gov/vuln/detail/CVE-2023-4385),[CVE-2023-4387](https://nvd.nist.gov/vuln/detail/CVE-2023-4387),[CVE-2023-4389](https://nvd.nist.gov/vuln/detail/CVE-2023-4389),[CVE-2023-4394](https://nvd.nist.gov/vuln/detail/CVE-2023-4394),[CVE-2023-4459](https://nvd.nist.gov/vuln/detail/CVE-2023-4459),[CVE-2023-4569](https://nvd.nist.gov/vuln/detail/CVE-2023-4569),[CVE-2023-4623](https://nvd.nist.gov/vuln/detail/CVE-2023-4623),[CVE-2023-4921](https://nvd.nist.gov/vuln/detail/CVE-2023-4921), [CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982), [CVE-2022-41804](https://nvd.nist.gov/vuln/detail/CVE-2022-41804), [CVE-2023-20569](https://nvd.nist.gov/vuln/detail/CVE-2023-20569), [CVE-2023-23908](https://nvd.nist.gov/vuln/detail/CVE-2023-23908))\n - Go ([CVE-2023-29402](https://nvd.nist.gov/vuln/detail/CVE-2023-29402), [CVE-2023-29403](https://nvd.nist.gov/vuln/detail/CVE-2023-29403), [CVE-2023-29404](https://nvd.nist.gov/vuln/detail/CVE-2023-29404), [CVE-2023-29405](https://nvd.nist.gov/vuln/detail/CVE-2023-29405), [CVE-2023-29406](https://nvd.nist.gov/vuln/detail/CVE-2023-29406),[CVE-2023-29409](https://nvd.nist.gov/vuln/detail/CVE-2023-29409),[CVE-2023-39318](https://nvd.nist.gov/vuln/detail/CVE-2023-39318), [CVE-2023-39319](https://nvd.nist.gov/vuln/detail/CVE-2023-39319), [CVE-2023-39320](https://nvd.nist.gov/vuln/detail/CVE-2023-39320), [CVE-2023-39321](https://nvd.nist.gov/vuln/detail/CVE-2023-39321), [CVE-2023-39322](https://nvd.nist.gov/vuln/detail/CVE-2023-39322))\n - binutils ([CVE-2022-38533](https://nvd.nist.gov/vuln/detail/CVE-2022-38533), [CVE-2022-4285](https://nvd.nist.gov/vuln/detail/CVE-2022-4285), [CVE-2023-1579](https://nvd.nist.gov/vuln/detail/CVE-2023-1579))\n - c-ares ([CVE-2023-31124](https://nvd.nist.gov/vuln/detail/CVE-2023-31124), [CVE-2023-31130](https://nvd.nist.gov/vuln/detail/CVE-2023-31130), [CVE-2023-31147](https://nvd.nist.gov/vuln/detail/CVE-2023-31147), [CVE-2023-32067](https://nvd.nist.gov/vuln/detail/CVE-2023-32067))\n - curl ([CVE-2023-28319](https://nvd.nist.gov/vuln/detail/CVE-2023-28319), [CVE-2023-28320](https://nvd.nist.gov/vuln/detail/CVE-2023-28320), [CVE-2023-28321](https://nvd.nist.gov/vuln/detail/CVE-2023-28321), [CVE-2023-28322](https://nvd.nist.gov/vuln/detail/CVE-2023-28322))\n - git ([CVE-2023-25652](https://nvd.nist.gov/vuln/detail/CVE-2023-25652), [CVE-2023-25815](https://nvd.nist.gov/vuln/detail/CVE-2023-25815), [CVE-2023-29007](https://nvd.nist.gov/vuln/detail/CVE-2023-29007))\n - grub ([CVE-2020-10713](https://nvd.nist.gov/vuln/detail/CVE-2020-10713), [CVE-2020-14372](https://nvd.nist.gov/vuln/detail/CVE-2020-14372), [CVE-2020-25632](https://nvd.nist.gov/vuln/detail/CVE-2020-25632), [CVE-2020-25647](https://nvd.nist.gov/vuln/detail/CVE-2020-25647), [CVE-2020-27749](https://nvd.nist.gov/vuln/detail/CVE-2020-27749), [CVE-2020-27779](https://nvd.nist.gov/vuln/detail/CVE-2020-27779), [CVE-2021-20225](https://nvd.nist.gov/vuln/detail/CVE-2021-20225), [CVE-2021-20233](https://nvd.nist.gov/vuln/detail/CVE-2021-20233), [CVE-2021-3981](https://nvd.nist.gov/vuln/detail/CVE-2021-3981), [CVE-2021-3695](https://nvd.nist.gov/vuln/detail/CVE-2021-3695), [CVE-2021-3696](https://nvd.nist.gov/vuln/detail/CVE-2021-3696), [CVE-2021-3697](https://nvd.nist.gov/vuln/detail/CVE-2021-3697), [CVE-2022-28733](https://nvd.nist.gov/vuln/detail/CVE-2022-28733), [CVE-2022-28734](https://nvd.nist.gov/vuln/detail/CVE-2022-28734), [CVE-2022-28735](https://nvd.nist.gov/vuln/detail/CVE-2022-28735), [CVE-2022-28736](https://nvd.nist.gov/vuln/detail/CVE-2022-28736), [CVE-2022-28737](https://nvd.nist.gov/vuln/detail/CVE-2022-28737), [CVE-2022-2601](https://nvd.nist.gov/vuln/detail/CVE-2022-2601), [CVE-2022-3775](https://nvd.nist.gov/vuln/detail/CVE-2022-3775))\n - intel-microcode ([CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982), [CVE-2022-41804](https://nvd.nist.gov/vuln/detail/CVE-2022-41804), [CVE-2023-23908](https://nvd.nist.gov/vuln/detail/CVE-2023-23908))\n - libarchive ([libarchive-20230729](https://github.com/libarchive/libarchive/releases/tag/v3.7.1))\n - libcap ([CVE-2023-2602](https://nvd.nist.gov/vuln/detail/CVE-2023-2602), [CVE-2023-2603](https://nvd.nist.gov/vuln/detail/CVE-2023-2603))\n - libmicrohttpd ([CVE-2023-27371](https://nvd.nist.gov/vuln/detail/CVE-2023-27371))\n - libxml2 ([libxml2-20230428](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4))\n - ncurses ([CVE-2023-29491](https://nvd.nist.gov/vuln/detail/CVE-2023-29491))\n - nvidia-drivers ([CVE-2023-25515](https://nvd.nist.gov/vuln/detail/CVE-2023-25515), [CVE-2023-25516](https://nvd.nist.gov/vuln/detail/CVE-2023-25516))\n - openldap ([CVE-2023-2953](https://nvd.nist.gov/vuln/detail/CVE-2023-2953))\n - OpenSSL ([CVE-2023-2650](https://nvd.nist.gov/vuln/detail/CVE-2023-2650), [CVE-2023-2975](https://nvd.nist.gov/vuln/detail/CVE-2023-2975), [CVE-2023-3446](https://nvd.nist.gov/vuln/detail/CVE-2023-3446))\n - protobuf ([CVE-2022-1941](https://nvd.nist.gov/vuln/detail/CVE-2022-1941))\n - shadow ([CVE-2023-29383](https://nvd.nist.gov/vuln/detail/CVE-2023-29383))\n - sudo ([CVE-2023-27320](https://nvd.nist.gov/vuln/detail/CVE-2023-27320), [CVE-2023-28486](https://nvd.nist.gov/vuln/detail/CVE-2023-28486), [CVE-2023-28487](https://nvd.nist.gov/vuln/detail/CVE-2023-28487))\n - torcx ([CVE-2022-28948](https://nvd.nist.gov/vuln/detail/CVE-2022-28948))\n - vim ([CVE-2023-2609](https://nvd.nist.gov/vuln/detail/CVE-2023-2609), [CVE-2023-2610](https://nvd.nist.gov/vuln/detail/CVE-2023-2610), [CVE-2023-2426](https://nvd.nist.gov/vuln/detail/CVE-2023-2426))\n - SDK: Python ([CVE-2023-40217](https://nvd.nist.gov/vuln/detail/CVE-2023-40217), [CVE-2023-41105](https://nvd.nist.gov/vuln/detail/CVE-2023-41105))\n - SDK: qemu ([CVE-2023-0330](https://nvd.nist.gov/vuln/detail/CVE-2023-0330), [CVE-2023-2861](https://nvd.nist.gov/vuln/detail/CVE-2023-2861))\n - SDK: Rust ([CVE-2023-38497](https://nvd.nist.gov/vuln/detail/CVE-2023-38497))\n - VMware: open-vm-tools ([CVE-2023-20867](https://nvd.nist.gov/vuln/detail/CVE-2023-20867), [CVE-2023-20900](https://nvd.nist.gov/vuln/detail/CVE-2023-20900))\n \n #### Bug fixes:\n \n - Fix the RemainAfterExit clause in nvidia.service ([Flatcar#1169](https://github.com/flatcar/Flatcar/issues/1169))\n - Fixed bug in handling renamed network interfaces when generating login issue ([init#102](https://github.com/flatcar/init/pull/102))\n - Triggered re-reading of partition table to fix adding partitions to the boot disk ([scripts#1202](https://github.com/flatcar/scripts/pull/1202))\n \n #### Changes:\n \n - :warning: Dropped support for niftycloud and interoute. For interoute we haven't been generating the images for some time already. ([scripts#971](https://github.com/flatcar/scripts/pull/971)) :warning:\n - Added TLS Kernel module ([scripts#865](https://github.com/flatcar/scripts/pull/865))\n - Added support for multipart MIME userdata in coreos-cloudinit. Ignition now detects multipart userdata and delegates execution to coreos-cloudinit. ([scripts#873](https://github.com/flatcar/scripts/pull/873))\n - Azure and QEMU OEM images now use systemd-sysext images for layering additional platform-specific software on top of `/usr`. For Azure images this also means that the image has a normal Python installation available through the sysext image. The OEM software is still not updated but this will be added soon.\n - Change nvidia.service to type oneshot (from the default \"simple\") so the subsequent services (configured with \"Requires/After\") are executed after the driver installation is successfully finished ([flatcar/Flatcar#1136](https://github.com/flatcar/Flatcar/issues/1136))\n - Enabled the virtio GPU driver ([scripts#830](https://github.com/flatcar/scripts/pull/830))\n - Migrate to Type=notify in containerd.service. Changed the unit to Type=notify, utilizing the existing containerd support for sd_notify call after socket setup.\n - Migrated the NVIDIA installer from the Azure/AWS OEM partition to `/usr` to make it available on all platforms ([scripts#932](https://github.com/flatcar/scripts/pull/932/), [Flatcar#1077](https://github.com/flatcar/Flatcar/issues/1077))\n - Moved a mountpoint of the OEM partition from `/usr/share/oem` to `/oem`. `/usr/share/oem` became a symlink to `/oem` for backward compatibility. Despite the move, the initrd images providing files through `/usr/share/oem` should keep using `/usr/share/oem`. The move was done to enable activating the OEM sysext images that are placed in the OEM partition.\n - OEM vendor tools are now A/B updated if they are shipped as systemd-sysext images, the migration happens when both partitions require a systemd-sysext OEM image - note that this will delete the `nvidia.service` from `/etc` on Azure because it's now part of `/usr` ([Flatcar#60](https://github.com/flatcar/Flatcar/issues/60))\n - Updated locksmith to use non-deprecated resource control options in the systemd unit ([Locksmith#20](https://github.com/flatcar/locksmith/pull/20))\n - Use qcow2 compressed format instead of additional compression layer in Qemu images ([Flatcar#1135](https://github.com/flatcar/Flatcar/issues/1135), [scripts#1132](https://github.com/flatcar/scripts/pull/1132))\n \n #### Updates:\n \n - Linux ([6.1.55](https://lwn.net/Articles/945379) (includes [6.1.54](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.54), [6.1.53](https://lwn.net/Articles/944358),[6.1.52](https://lwn.net/Articles/943754), [6.1.51](https://lwn.net/Articles/943403), [6.1.50](https://lwn.net/Articles/943112), [6.1.49](https://lwn.net/Articles/942880), [6.1.48](https://lwn.net/Articles/942865), [6.1.47](https://lwn.net/Articles/942531), [6.1.46](https://lwn.net/Articles/941774), [6.1.45](https://lwn.net/Articles/941273), [6.1.44](https://lwn.net/Articles/940800), [6.1.43](https://lwn.net/Articles/940338), [6.1.42](https://lwn.net/Articles/939423), [6.1.41](https://lwn.net/Articles/939103), [6.1.40](https://lwn.net/Articles/939015), [6.1.39](https://lwn.net/Articles/938619), [6.1.38](https://lwn.net/Articles/937403), [6.1.37](https://lwn.net/Articles/937082), [6.1.36](https://lwn.net/Articles/936674), [6.1.35](https://lwn.net/Articles/935588), [6.1.34](https://lwn.net/Articles/934623), [6.1.33](https://lwn.net/Articles/934319), [6.1.32](https://lwn.net/Articles/933908), [6.1.31](https://lwn.net/Articles/933281), [6.1.30](https://lwn.net/Articles/932882), [6.1.29](https://lwn.net/Articles/932133), [6.1.28](https://lwn.net/Articles/931651), [6.1.27](https://lwn.net/Articles/930597/), [6.1](https://kernelnewbies.org/Linux_6.1)))\n - Linux Firmware ([20230804](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230804) (includes [20230625](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625), [20230515](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230515)))\n - Go ([1.20.8](https://go.dev/doc/devel/release#go1.20.8) (includes [1.20.7](https://go.dev/doc/devel/release#go1.20.7), [1.20.6](https://go.dev/doc/devel/release#go1.20.6), [1.20.5](https://go.dev/doc/devel/release#go1.20.5), [1.20.4](https://go.dev/doc/devel/release#go1.20.4), [1.19.13](https://go.dev/doc/devel/release#go1.19.13), [1.19.12](https://go.dev/doc/devel/release#go1.19.12), [1.19.11](https://go.dev/doc/devel/release#go1.19.11), [1.19.10](https://go.dev/doc/devel/release#go1.19.10)))\n - bind tools ([9.16.41](https://bind9.readthedocs.io/en/v9.16.41/notes.html#notes-for-bind-9-16-41))\n - binutils ([2.40](https://lists.gnu.org/archive/html/info-gnu/2023-01/msg00003.html))\n - bpftool ([6.3](https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/log/tools/bpf/bpftool?h=v6.3))\n - c-ares ([1.19.1](https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1))\n - cJSON ([1.7.16](https://github.com/DaveGamble/cJSON/releases/tag/v1.7.16))\n - cifs-utils ([7.0](https://lists.samba.org/archive/samba-technical/2022-August/137528.html))\n - containerd ([1.7.6](https://github.com/containerd/containerd/releases/tag/v1.7.6) (includes [1.7.5](https://github.com/containerd/containerd/releases/tag/v1.7.5),[1.7.4](https://github.com/containerd/containerd/releases/tag/v1.7.4), [1.7.3](https://github.com/containerd/containerd/releases/tag/v1.7.3), [1.7.2](https://github.com/containerd/containerd/releases/tag/v1.7.2)))\n - coreutils ([9.3](https://lists.gnu.org/archive/html/info-gnu/2023-04/msg00006.html) (includes [9.1](https://git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?h=v9.1)))\n - cryptsetup ([2.6.1](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.1/docs/v2.6.1-ReleaseNotes) (includes [2.6.0](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.0/docs/v2.6.0-ReleaseNotes) and [2.5.0](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.5.0/docs/v2.5.0-ReleaseNotes)))\n - curl ([8.2.1](https://curl.se/changes.html#8_2_1) (includes [8.2.0](https://curl.se/changes.html#8_2_0), [8.1.2](https://curl.se/changes.html#8_1_2), [8.1.0](https://curl.se/changes.html#8_1_0)))\n - debianutils ([5.7](https://metadata.ftp-master.debian.org/changelogs//main/d/debianutils/debianutils_5.7-0.4_changelog))\n - diffutils ([3.10](https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00009.html))\n - elfutils ([0.189](https://sourceware.org/pipermail/elfutils-devel/2023q1/006023.html))\n - ethtool ([6.4](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.4) (includes [6.3](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=7bdf78f0d2a9ae1571fe9444e552490130e573fd), [6.2](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.2)))\n - gawk ([5.2.2](https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00008.html))\n - gdb ([13.2](https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00011.html))\n - gdbm ([1.23](https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00004.html))\n - git ([2.41.0](https://lore.kernel.org/git/xmqqleh3a3wm.fsf@gitster.g/) (includes [2.39.3](https://github.com/git/git/blob/v2.39.3/Documentation/RelNotes/2.39.3.txt)))\n - glib ([2.76.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.4) (includes [2.76.3](https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.3), [2.76.2](https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.2)))\n - glibc ([2.37](https://sourceware.org/git/?p=glibc.git;a=tag;h=refs/tags/glibc-2.37))\n - gmp ([6.3.0](https://gmplib.org/gmp6.3))\n - gptfdisk ([1.0.9](https://sourceforge.net/p/gptfdisk/code/ci/1d46f3723bc25f5598266f7d9a3548af3cee0c77/tree/NEWS))\n - grep ([3.11](https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00004.html) (includes [3.8](http://savannah.gnu.org/forum/forum.php?forum_id=10227)))\n - grub ([2.06](https://lists.gnu.org/archive/html/grub-devel/2021-06/msg00022.html))\n - hwdata ([0.373](https://github.com/vcrhonek/hwdata/commits/v0.373) (includes [0.372](https://github.com/vcrhonek/hwdata/commits/v0.372), [0.371](https://github.com/vcrhonek/hwdata/commits/v0.371), [0.367](https://github.com/vcrhonek/hwdata/releases/tag/v0.367)))\n - inih ([57](https://github.com/benhoyt/inih/releases/tag/r57) (includes [56](https://github.com/benhoyt/inih/releases/tag/r56)))\n - intel-microcode ([20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230808) (includes [20230613](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230613), [20230512](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230512)))\n - iperf ([3.14](https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-314-2023-07-07))\n - iproute2 ([6.4.0](https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/?h=v6.4.0) (includes [6.3.0](https://lwn.net/Articles/930473/), [6.2](https://lwn.net/Articles/923952/)))\n - ipset ([7.17](https://git.netfilter.org/ipset/tree/ChangeLog?id=186f9b57c60bb53aae5f6633eff1e9d5e9095c3e))\n - kbd ([2.6.1](https://github.com/legionus/kbd/releases/tag/v2.6.1) (includes [2.6.0](https://github.com/legionus/kbd/releases/tag/v2.6.0), [2.5.1](https://github.com/legionus/kbd/releases/tag/v2.5.1)))\n - kmod ([30](https://lwn.net/Articles/899526/))\n - ldb ([2.4.4](https://gitlab.com/samba-team/samba/-/commit/b686ef00da46d4a0c0aba0c61b1866cbc9b462b6) (includes [2.4.3](https://gitlab.com/samba-team/samba/-/commit/604f94704f30e90ef960aa2be62a14d2e614a002), [2.4.2](https://gitlab.com/samba-team/samba/-/commit/d93892d2e8ed69758c15ab18bc03bba09e715bc6)))\n - less ([633](http://www.greenwoodsoftware.com/less/news.633.html) (includes [632](http://www.greenwoodsoftware.com/less/news.632.html)))\n - libarchive ([3.7.1](https://github.com/libarchive/libarchive/releases/tag/v3.7.1) (includes [3.7.0](https://github.com/libarchive/libarchive/releases/tag/v3.7.0)))\n - libassuan ([2.5.6](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=e52bb5dd36ac93ea227e53e89f82af9ccf38f339;hb=6b50ee6bcdd6aa81bd7cc3fb2379864c3ed479b8))\n - libbsd ([0.11.7](https://lists.freedesktop.org/archives/libbsd/2022-October/000337.html))\n - libcap ([2.69](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe))\n - libgcrypt ([1.10.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=03132c2a115e35783a782c64777cf5f5b1a2825f;hb=ae0e567820c37f9640440b3cff77d7c185aa6742))\n - libgpg-error ([1.47](https://dev.gnupg.org/T6231) (includes [1.46](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=14b0ba97d6ba2b10b3178f2e4a3e24bfc2355bb3;hb=ea031873aa9642831017937fd33e9009d514ee07)))\n - libksba ([1.6.4](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=f640523209c1c9ce9855040e53914a79d24d6a67;hb=557999424ebd13e70d6fc17e648a5dd2a06f440b))\n - libmd ([1.1.0](https://git.hadrons.org/cgit/libmd.git/log/?h=1.1.0))\n - libmicrohttpd ([0.9.77](https://gitlab.com/libmicrohttpd/libmicrohttpd/-/releases/v0.9.77) (includes [0.9.76](https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html)))\n - libnftnl ([1.2.6](https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.6) (includes [1.2.5](https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.5)))\n - libnvme ([1.5](https://github.com/linux-nvme/libnvme/releases/tag/v1.5))\n - libpcap ([1.10.4](https://github.com/the-tcpdump-group/libpcap/blob/24832dd2728bd95ed9b9464ef27b47a943c38003/CHANGES#L51))\n - libpcre (8.45)\n - libpipeline ([1.5.7](https://gitlab.com/libpipeline/libpipeline/-/tags/1.5.7))\n - libusb ([1.0.26](https://github.com/libusb/libusb/blob/v1.0.26/ChangeLog))\n - libuv ([1.46.0](https://github.com/libuv/libuv/releases/tag/v1.46.0) (includes [1.45.0](https://github.com/libuv/libuv/releases/tag/v1.45.0)))\n - libxml2 ([2.11.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4))\n - libxslt ([1.1.38](https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.38))\n - lsof ([4.98.0](https://github.com/lsof-org/lsof/blob/4.98.0/00DIST#L5471))\n - lua ([5.4.4](https://www.lua.org/manual/5.4/readme.html#changes))\n - multipath-tools ([0.9.5](https://github.com/opensvc/multipath-tools/commits/0.9.5))\n - ncurses ([6.4](https://invisible-island.net/ncurses/announce.html#h2-release-notes))\n - nettle ([3.9.1](https://git.lysator.liu.se/nettle/nettle/-/blob/nettle_3.9.1_release_20230601/ChangeLog))\n - nmap ([7.94](https://nmap.org/changelog.html#7.94))\n - nvidia-drivers ([535.104.05](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-104-05/index.html))\n - nvme-cli ([2.5](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.5) (includes [2.3](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.3)))\n - open-isns ([0.102](https://github.com/open-iscsi/open-isns/blob/v0.102/ChangeLog))\n - openldap ([2.6.4](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_4/CHANGES) (includes [2.6.3](https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FQJM2JSSSOMLQH7XC7Q5IZJYOGCTV2LK/), [2.6](https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/IHS5V46H6NFNFUERMC6AWMPHTWRVNLFA/), [2.5.14](https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/TZQHR4SIWUA5BZTKDAKSFDOOGDVU4TU7/), [2.5](https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/BH3VDPG6IYYF5L5U6LZGHHKMJY5HFA3L/)))\n - OpenSSL ([3.0.9](https://github.com/openssl/openssl/blob/openssl-3.0.9/NEWS.md#major-changes-between-openssl-308-and-openssl-309-30-may-2023))\n - parted ([3.6](https://git.savannah.gnu.org/gitweb/?p=parted.git;a=blob;f=NEWS;h=52bb11697039f70e55120c571750f9ee761a75aa;hb=3b5f327b213d21e9adb9ba933c78dd898fee5b1d))\n - pax-utils ([1.3.7](https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.7))\n - pciutils ([3.10.0](https://github.com/pciutils/pciutils/blob/v3.10.0/ChangeLog) (includes [3.9.0](https://github.com/pciutils/pciutils/releases/tag/v3.9.0)))\n - popt ([1.19](https://github.com/rpm-software-management/popt/releases/tag/popt-1.19-release))\n - protobuf ([21.9](https://github.com/protocolbuffers/protobuf/releases/tag/v21.9))\n - psmisc ([23.6](https://gitlab.com/psmisc/psmisc/-/blob/v23.6/ChangeLog))\n - qemu guest agent ([8.0.3](https://wiki.qemu.org/ChangeLog/8.0#Guest_agent) (includes [8.0.0](https://wiki.qemu.org/ChangeLog/8.0#Guest_agent)))\n - quota ([4.09](https://sourceforge.net/p/linuxquota/code/ci/87d2fd7635e4bca54fa2a00b8d5b073ba9ca521b/tree/Changelog))\n - runc ([1.1.9](https://github.com/opencontainers/runc/releases/tag/v1.1.9) (includes [1.1.8](https://github.com/opencontainers/runc/releases/tag/v1.1.8)))\n - sed ([4.9](https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html))\n - smartmontools ([7.3](https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_3))\n - sqlite ([3.42.0](https://sqlite.org/releaselog/3_42_0.html))\n - strace ([6.3](https://github.com/strace/strace/releases/tag/v6.3) (includes [6.2](https://github.com/strace/strace/releases/tag/v6.2)))\n - sudo ([1.9.13p3](https://www.sudo.ws/releases/stable/#1.9.13p3))\n - talloc ([2.4.0](https://gitlab.com/samba-team/samba/-/commit/5224ed98eeba43f22b5f5f87de5947fbb1c1c7c1) (includes [2.3.4](https://gitlab.com/samba-team/samba/-/commit/0189ccf9fc3d2a77cc83cffe180e307bcdccebb4)))\n - tar ([1.35](https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html))\n - tdb ([1.4.8](https://gitlab.com/samba-team/samba/-/commit/eab796a4f9172e602dc262f3c99ead35b35929e7) (includes [1.4.7](https://gitlab.com/samba-team/samba/-/commit/27ceb1c3ad786386e746a5e2968780d791393b9e), [1.4.6](https://gitlab.com/samba-team/samba/-/commit/1c776e54cf33b46b2ed73263f093d596a0cdbb2f)))\n - tevent ([0.14.1](https://gitlab.com/samba-team/samba/-/commit/d80f28b081e515e32a480daf80b42cf782447a9c) (includes [0.14.0](https://gitlab.com/samba-team/samba/-/commit/3c6d28ebae27dba8e40558ae37ae8138ea0b4bdc), [0.13.0](https://gitlab.com/samba-team/samba/-/commit/63d4db63feda920c8020f8484a8b31065b7f1380), [0.12.1](https://gitlab.com/samba-team/samba/-/commit/53692735c733d01acbd953641f831a1f5e0cf6c5), 0.12.0))\n - usbutils ([015](https://github.com/gregkh/usbutils/blob/79b796f945ea7d5c2b0e2a74f9b8819cb7948680/NEWS))\n - userspace-rcu ([0.14.0](https://github.com/urcu/userspace-rcu/blob/v0.13.2/ChangeLog))\n - util-linux ([2.38.1](https://github.com/util-linux/util-linux/releases/tag/v2.38.1))\n - vim ([9.0.1678](https://github.com/vim/vim/commits/v9.0.1678) includes ([9.0.1677](https://github.com/vim/vim/commits/v9.0.1677), [9.0.1503](https://github.com/vim/vim/commits/v9.0.1503)))\n - wget ([1.21.4](https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00003.html))\n - whois ([5.5.17](https://github.com/rfc1036/whois/commit/bac7108b01cfd54c517444efa1239e10e6edd5a4))\n - xfsprogs ([6.4.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.4.0) (includes ([6.3.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.3.0)))\n - XZ utils ([5.4.3](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=2f4d35adca6198671434d2988803cc9316ad1ec8;hb=dbb3a536ed9873ffa0870321f6873e564c6a9da8))\n - zstandard ([1.5.5](https://github.com/facebook/zstd/releases/tag/v1.5.5))\n - AWS: amazon-ssm-agent ([3.2.985.0](https://github.com/aws/amazon-ssm-agent/releases/tag/3.2.985.0))\n - SDK: file ([5.45](https://github.com/file/file/blob/FILE5_45/ChangeLog))\n - SDK: gnuconfig ([20230731](https://git.savannah.gnu.org/cgit/config.git/log/?id=d4e37b5868ef910e3e52744c34408084bb13051c))\n - SDK: kexec-tools ([2.0.24](https://github.com/horms/kexec-tools/releases/tag/v2.0.24))\n - SDK: man-db ([2.11.2](https://gitlab.com/man-db/man-db/-/tags/2.11.2))\n - SDK: man-pages ([6.03](https://lore.kernel.org/lkml/d56662b2-538c-7252-9052-8afbf325f843@gmail.com/T/))\n - SDK: pahole ([1.25](https://github.com/acmel/dwarves/blob/master/changes-v1.25))\n - SDK: perf ([6.3](https://kernelnewbies.org/LinuxChanges#Linux_6.3.Tracing.2C_perf_and_BPF))\n - SDK: perl ([5.36.1](https://perldoc.perl.org/perl5361delta))\n - SDK: portage ([3.0.49](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.49) (includes [3.0.46](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.46)))\n - SDK: python ([3.11.5](https://www.python.org/downloads/release/python-3115/) (includes [3.11.3](https://www.python.org/downloads/release/python-3113/), [3.10.12](https://www.python.org/downloads/release/python-31012/), [3.10.11](https://www.python.org/downloads/release/python-31011/)))\n - SDK: qemu ([8.0.4](https://wiki.qemu.org/ChangeLog/8.0) (includes [8.0.3](https://wiki.qemu.org/ChangeLog/8.0), [7.2.3](https://wiki.qemu.org/ChangeLog/7.2)))\n - SDK: Rust ([1.72.0](https://github.com/rust-lang/rust/releases/tag/1.72.0) (includes ([1.71.1](https://github.com/rust-lang/rust/releases/tag/1.71.1), [1.71.0](https://github.com/rust-lang/rust/releases/tag/1.71.0), [1.70.0](https://github.com/rust-lang/rust/releases/tag/1.70.0)))\n - VMware: open-vm-tools ([12.3.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0) (includes [12.2.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.5)))"
  },
  "3745.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-10-25 08:38:48 +0000",
    "major_software": {
      "containerd": [
        "1.7.6"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "6.1.58"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **Beta 3732.1.0**_\n \n #### Security fixes:\n \n - curl ([CVE-2023-38039](https://nvd.nist.gov/vuln/detail/CVE-2023-38039), [CVE-2023-38545](https://nvd.nist.gov/vuln/detail/CVE-2023-38545), [CVE-2023-38546](https://nvd.nist.gov/vuln/detail/CVE-2023-38546))\n - glibc ([CVE-2023-4527](https://nvd.nist.gov/vuln/detail/CVE-2023-4527), [CVE-2023-4806](https://nvd.nist.gov/vuln/detail/CVE-2023-4806))\n - lua ([CVE-2022-33099](https://nvd.nist.gov/vuln/detail/CVE-2022-33099))\n - mit-krb5 ([CVE-2023-36054](https://nvd.nist.gov/vuln/detail/CVE-2023-36054))\n - procps ([CVE-2023-4016](https://nvd.nist.gov/vuln/detail/CVE-2023-4016))\n - samba ([CVE-2021-44142](https://nvd.nist.gov/vuln/detail/CVE-2021-44142), [CVE-2022-1615](https://nvd.nist.gov/vuln/detail/CVE-2022-1615))\n \n #### Bug fixes:\n \n - Disabled systemd-networkd's RoutesToDNS setting by default to fix provisioning failures observed in VMs with multiple network interfaces on Azure ([scripts#1206](https://github.com/flatcar/scripts/pull/1206))\n - Fixed the postinstall hook failure when updating from Azure instances without OEM systemd-sysext images to Flatcar Alpha 3745.x.y ([update_engine#29](https://github.com/flatcar/update_engine/pull/29))\n \n #### Changes:\n \n - AWS OEM images now use a systemd-sysext image for layering additional platform-specific software on top of `/usr`\n - Reworked the VMware OEM software to be shipped as A/B updated systemd-sysext image\n - SDK: Experimental support for [prefix builds](https://github.com/flatcar/scripts/blob/main/PREFIX.md) to create distro independent, portable, self-contained applications w/ all dependencies included. With contributions from [chewi](https://github.com/chewi) and [HappyTobi](https://github.com/HappyTobi).\n - Started shipping default ssh client and ssh daemon configs in `/etc/ssh/ssh_config` and `/etc/ssh/sshd_config` which include config snippets in `/etc/ssh/ssh_config.d` and `/etc/ssh/sshd_config.d`, respectively.\n - The open-vm-tools package in VMware OEM now comes with vmhgfs-fuse, udev rules, pam and vgauth\n - To make Kubernetes work by default, `/usr/libexec/kubernetes/kubelet-plugins/volume/exec` is now a symlink to the writable folder `/var/kubernetes/kubelet-plugins/volume/exec` ([Flatcar#1193](https://github.com/flatcar/Flatcar/issues/1193))\n \n #### Updates:\n \n - Linux ([6.1.58](https://lwn.net/Articles/947820) (includes [6.1.57](https://lwn.net/Articles/947298), [6.1.56](https://lwn.net/Articles/946854)))\n - Linux Firmware ([20230919](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230919))\n - bind-tools ([9.16.42](https://bind9.readthedocs.io/en/v9.16.42/notes.html#notes-for-bind-9-16-42))\n - ca-certificates ([3.94](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html))\n - checkpolicy ([3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5))\n - curl ([8.3.0](https://curl.se/changes.html#8_3_0))\n - gcc ([13.2](https://gcc.gnu.org/gcc-13/changes.html))\n - gzip ([1.13](https://savannah.gnu.org/news/?id=10501))\n - libgcrypt ([1.10.2](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=c9a239615f8070427a96688b1be40a81e59e9b8a;hb=1c5cbacf3d88dded5063e959ee68678ff7d0fa56))\n - libselinux ([3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5))\n - libsemanage ([3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5))\n - libsepol ([3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5))\n - lua ([5.4.6](https://www.lua.org/manual/5.4/readme.html#changes))\n - mit-krb5 ([1.21.2](http://web.mit.edu/kerberos/krb5-1.21/))\n - openssh ([9.4p1](https://www.openssh.com/releasenotes.html#9.4p1))\n - policycoreutils ([3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5))\n - procps ([4.0.4](https://gitlab.com/procps-ng/procps/-/releases/v4.0.4) (includes [4.0.3](https://gitlab.com/procps-ng/procps/-/releases/v4.0.3) and [4.0.0](https://gitlab.com/procps-ng/procps/-/releases/v4.0.0)))\n - rpcsvc-proto ([1.4.4](https://github.com/thkukuk/rpcsvc-proto/releases/tag/v1.4.4))\n - samba ([4.18.4](https://wiki.samba.org/index.php/Samba_4.18_Features_added/changed#Samba_4.18.4))\n - selinux-base ([2.20221101](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101))\n - selinux-base-policy ([2.20221101](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101))\n - selinux-container ([2.20221101](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101))\n - selinux-sssd ([2.20221101](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101))\n - selinux-unconfined ([2.20221101](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101))\n - semodule-utils ([3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5))\n - SDK: Rust ([1.72.1](https://github.com/rust-lang/rust/releases/tag/1.72.1))\n - VMWARE: libdnet ([1.16.2](https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.2) (includes [1.16](https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16)))\n\n _Changes since **Alpha 3745.0.0**_\n \n #### Security fixes:\n \n - curl ([CVE-2023-38545](https://nvd.nist.gov/vuln/detail/CVE-2023-38545), [CVE-2023-38546](https://nvd.nist.gov/vuln/detail/CVE-2023-38546))\n \n #### Bug fixes:\n \n - Disabled systemd-networkd's RoutesToDNS setting by default to fix provisioning failures observed in VMs with multiple network interfaces on Azure ([scripts#1206](https://github.com/flatcar/scripts/pull/1206))\n - Fixed the postinstall hook failure when updating from Azure instances without OEM systemd-sysext images to Flatcar Alpha 3745.x.y ([update_engine#29](https://github.com/flatcar/update_engine/pull/29))\n \n #### Changes:\n \n - To make Kubernetes work by default, `/usr/libexec/kubernetes/kubelet-plugins/volume/exec` is now a symlink to the writable folder `/var/kubernetes/kubelet-plugins/volume/exec` ([Flatcar#1193](https://github.com/flatcar/Flatcar/issues/1193))\n \n #### Updates:\n \n - Linux ([6.1.58](https://lwn.net/Articles/947820) (includes [6.1.57](https://lwn.net/Articles/947298), [6.1.56](https://lwn.net/Articles/946854)))\n - ca-certificates ([3.94](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html))"
  },
  "3760.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-11-22 07:54:40 +0000",
    "major_software": {
      "containerd": [
        "1.7.7"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "6.1.62"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "\u26a0\ufe0f From Alpha 3794.0.0 Torcx has been removed - please assert that you don't rely on specific Torcx mechanism but now use systemd-sysext. See [here](https://www.flatcar.org/docs/latest/provisioning/sysext/) for more information.\n\n _Changes since **Beta 3745.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-35827](https://nvd.nist.gov/vuln/detail/CVE-2023-35827), [CVE-2023-46813](https://nvd.nist.gov/vuln/detail/CVE-2023-46813), [CVE-2023-46862](https://nvd.nist.gov/vuln/detail/CVE-2023-46862), [CVE-2023-5178](https://nvd.nist.gov/vuln/detail/CVE-2023-5178), [CVE-2023-5717](https://nvd.nist.gov/vuln/detail/CVE-2023-5717))\n - curl ([CVE-2023-38545](https://nvd.nist.gov/vuln/detail/CVE-2023-38545), [CVE-2023-38546](https://nvd.nist.gov/vuln/detail/CVE-2023-38546))\n - glibc ([CVE-2023-4911](https://nvd.nist.gov/vuln/detail/CVE-2023-4911))\n - go ([CVE-2023-39325](https://nvd.nist.gov/vuln/detail/CVE-2023-39325), [CVE-2023-39325](https://nvd.nist.gov/vuln/detail/CVE-2023-39325))\n - grub ([CVE-2023-4692](https://nvd.nist.gov/vuln/detail/CVE-2023-4692), [CVE-2023-4693](https://nvd.nist.gov/vuln/detail/CVE-2023-4693))\n - libtirpc ([libtirpc-rhbg-2138317](http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=4a2d85c64110ee9e21a8c4f9dafd6b0ae621506d), [libtirpc-rhbg-2150611](http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=f7f0abdf267698de3f74a0285405b1b01f40893b), [libtirpc-rhbg-2224666](http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1d2e10afb2ffc35cb3623f57a15f712359f18e75))\n \n #### Bug fixes:\n \n - Added AWS EKS support for versions 1.24-1.28. Fixed `/usr/share/amazon/eks/download-kubelet.sh` to include download paths for these versions. ([scripts#1210](https://github.com/flatcar/scripts/pull/1210))\n - Fixed iterating over the OEM update payload signatures which prevented the AWS OEM update to 3745.x.y ([update-engine#31](https://github.com/flatcar/update_engine/pull/31))\n - Fixed quotes handling for update-engine ([Flatcar#1209](https://github.com/flatcar/Flatcar/issues/1209))\n - Made `sshkeys.service` more robust to only run `coreos-metadata-sshkeys@core.service` when not masked and also retry on failure ([init#112](https://github.com/flatcar/init/pull/112))\n \n #### Changes:\n \n - Brightbox: The regular OpenStack image should now be used, it includes Afterburn for instance metadata attributes\n - OpenStack: An uncompressed image is provided for simpler import (since the images use qcow2 inline compression, there is no benefit in using the `.gz` or `.bz2` images)\n \n #### Updates:\n \n - Go ([1.20.10](https://go.dev/doc/devel/release#go1.20.10) (includes [1.20.9](https://go.dev/doc/devel/release#go1.20.9)))\n - Linux ([6.1.62](https://lwn.net/Articles/950700) (includes [6.1.61](https://lwn.net/Articles/949826), [6.1.60](https://lwn.net/Articles/948817) and includes [6.1.59](https://lwn.net/Articles/948299)))\n - containerd ([1.7.7](https://github.com/containerd/containerd/releases/tag/v1.7.7))\n - curl ([8.4.0](https://curl.se/changes.html#8_4_0))\n - libnl ([3.8.0](https://github.com/thom311/libnl/compare/libnl3_7_0...libnl3_8_0))\n - libtirpc ([1.3.4](https://marc.info/?l=linux-nfs&m=169667640909830&w=2))\n - libxml2 ([2.11.5](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.5))\n - openssh ([9.5p1](https://www.openssh.com/releasenotes.html#9.5p1))\n - pigz ([2.8](https://zlib.net/pipermail/pigz-announce_zlib.net/2023-August/000018.html))\n - strace([6.4](https://github.com/strace/strace/releases/tag/v6.4))\n - whois ([5.5.18](https://github.com/rfc1036/whois/blob/v5.5.18/debian/changelog))\n \n _Changes since **Alpha 3760.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-35827](https://nvd.nist.gov/vuln/detail/CVE-2023-35827), [CVE-2023-46813](https://nvd.nist.gov/vuln/detail/CVE-2023-46813), [CVE-2023-46862](https://nvd.nist.gov/vuln/detail/CVE-2023-46862), [CVE-2023-5178](https://nvd.nist.gov/vuln/detail/CVE-2023-5178), [CVE-2023-5717](https://nvd.nist.gov/vuln/detail/CVE-2023-5717))\n \n #### Bug fixes:\n \n - Fixed iterating over the OEM update payload signatures which prevented the AWS OEM update to 3745.x.y ([update-engine#31](https://github.com/flatcar/update_engine/pull/31))\n - Made `sshkeys.service` more robust to only run `coreos-metadata-sshkeys@core.service` when not masked and also retry on failure ([init#112](https://github.com/flatcar/init/pull/112))\n \n #### Changes:\n \n - Brightbox: The regular OpenStack image should now be used, it includes Afterburn for instance metadata attributes\n - OpenStack: An uncompressed image is provided for simpler import (since the images use qcow2 inline compression, there is no benefit in using the `.gz` or `.bz2` images)\n \n #### Updates:\n \n - Linux ([6.1.62](https://lwn.net/Articles/950700) (includes [6.1.61](https://lwn.net/Articles/949826), [6.1.60](https://lwn.net/Articles/948817) and includes [6.1.59](https://lwn.net/Articles/948299)))"
  },
  "3760.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-12-13 12:51:26 +0000",
    "major_software": {
      "containerd": [
        "1.7.7"
      ],
      "docker": [
        "20.10.24"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "6.1.66"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **Beta 3760.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-6121](https://nvd.nist.gov/vuln/detail/CVE-2023-6121))\n \n #### Bug fixes:\n \n - Deleted files in `/etc` that have a tmpfiles rule that normally would recreate them will now show up again through the `/etc` lowerdir ([Flatcar#1265](https://github.com/flatcar/Flatcar/issues/1265), [bootengine#79](https://github.com/flatcar/bootengine/pull/79))\n - Fixed the missing `/etc/extensions/` symlinks for the inbuilt Docker/containerd systemd-sysext images on update from Beta 3760.1.0 ([update_engine#32](https://github.com/flatcar/update_engine/pull/32))\n - GCP: Fixed OS Login enabling ([scripts#1445](https://github.com/flatcar/scripts/pull/1445))\n \n #### Changes:\n \n - linux kernel: added zstd support for squashfs kernel module ([scripts#1297](https://github.com/flatcar/scripts/pull/1297))\n \n #### Updates:\n \n - Linux ([6.1.66](https://lwn.net/Articles/954112) (includes [6.1.65](https://lwn.net/Articles/953648/), [6.1.64](https://lwn.net/Articles/953132), [6.1.63](https://lwn.net/Articles/952003)))\n - afterburn ([5.5.0](https://github.com/coreos/afterburn/releases/tag/v5.5.0))\n - ca-certificates ([3.95](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html))"
  },
  "3815.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-01-18 15:14:38 +0000",
    "major_software": {
      "containerd": [
        "1.7.10"
      ],
      "docker": [
        "24.0.6"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "6.1.73"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **Beta 3760.1.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-1193](https://nvd.nist.gov/vuln/detail/CVE-2023-1193), [CVE-2023-51779](https://nvd.nist.gov/vuln/detail/CVE-2023-51779), [CVE-2023-51780](https://nvd.nist.gov/vuln/detail/CVE-2023-51780), [CVE-2023-51781](https://nvd.nist.gov/vuln/detail/CVE-2023-51781), [CVE-2023-51782](https://nvd.nist.gov/vuln/detail/CVE-2023-51782), [CVE-2023-6531](https://nvd.nist.gov/vuln/detail/CVE-2023-6531), [CVE-2023-6606](https://nvd.nist.gov/vuln/detail/CVE-2023-6606), [CVE-2023-6622](https://nvd.nist.gov/vuln/detail/CVE-2023-6622), [CVE-2023-6817](https://nvd.nist.gov/vuln/detail/CVE-2023-6817), [CVE-2023-6931](https://nvd.nist.gov/vuln/detail/CVE-2023-6931))\n - Go ([CVE-2023-39326](https://nvd.nist.gov/vuln/detail/CVE-2023-39326), [CVE-2023-45285](https://nvd.nist.gov/vuln/detail/CVE-2023-45285))\n - VMWare: open-vm-tools ([CVE-2023-34058](https://nvd.nist.gov/vuln/detail/CVE-2023-34058), [CVE-2023-34059](https://nvd.nist.gov/vuln/detail/CVE-2023-34059))\n - nghttp2 ([CVE-2023-44487](https://nvd.nist.gov/vuln/detail/CVE-2023-44487))\n - samba ([CVE-2023-4091](https://nvd.nist.gov/vuln/detail/CVE-2023-4091))\n - zlib ([CVE-2023-45853](https://nvd.nist.gov/vuln/detail/CVE-2023-45853))\n \n #### Bug fixes:\n \n - AWS: Fixed the Amazon SSM agent that was crashing. ([Flatcar#1307](https://github.com/flatcar/Flatcar/issues/1307))\n - Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found ([coreos-cloudinit#25](https://github.com/flatcar/coreos-cloudinit/pull/25), [Flatcar#1262](https://github.com/flatcar/Flatcar/issues/1262)), with contributions from [MichaelEischer](https://github.com/MichaelEischer)\n - Fixed supplying extension update payloads with a custom base URL in Nebraska ([Flatcar#1281](https://github.com/flatcar/Flatcar/issues/1281))\n - Set TTY used for fetching server_context to RAW mode before running cloudinit on cloudsigma ([scripts#1280](https://github.com/flatcar/scripts/pull/1280))\n \n #### Changes:\n \n - **Torcx, the mechanism to provide a custom Docker version, was replaced by systemd-sysext in the OS image**. Learn more about sysext and how to customise OS images [here](https://www.flatcar.org/docs/latest/provisioning/sysext/) and read the blogpost about the replacement [here](https://www.flatcar.org/blog/2023/12/extending-flatcar-say-goodbye-to-torcx-and-hello-to-systemd-sysext/).\n   - Torcx entered deprecation 2 years ago in favour of [deploying plain Docker binaries](https://www.flatcar.org/docs/latest/container-runtimes/use-a-custom-docker-or-containerd-version/)\n    (which is now also a legacy option because systemd-sysext offers a more robust and better structured way of customisation, including OS independent updates).\n   - Torcx has been removed entirely; if you use Torcx to extend the Flatcar base OS image, please refer to our [conversion script](https://www.flatcar.org/docs/latest/provisioning/sysext/#torcx-deprecation) and to the sysext documentation mentioned above for migrating.\n   - Consequently, `update_engine` will not perform torcx sanity checks post-update anymore.\n   - Relevant changes: [scripts#1216](https://github.com/flatcar/scripts/pull/1216), [update_engine#30](https://github.com/flatcar/update_engine/pull/30), [Mantle#466](https://github.com/flatcar/mantle/pull/466), [Mantle#465](https://github.com/flatcar/mantle/pull/465).\n- cri-tools, runc, containerd, docker, and docker-cli are now built from Gentoo upstream ebuilds. Docker received a major version upgrade - it was updated to Docker 24 (from Docker 20; see \"updates\").\n  - **NOTE:** The docker btrfs storage driver has been de-prioritised; BTRFS backed storage will now default to the `overlay2` driver\n    ([changelog](https://docs.docker.com/engine/release-notes/23.0/#bug-fixes-and-enhancements-6), [upstream pr](https://github.com/moby/moby/pull/42661)).\n    Using the btrfs driver can still be enforced by creating a respective [docker config](https://docs.docker.com/storage/storagedriver/btrfs-driver/#configure-docker-to-use-the-btrfs-storage-driver) at `/etc/docker/daemon.json`.\n  - **NOTE:** If you are already using btrfs-backed Docker storage and are upgrading to this new version, Docker will automatically use the `btrfs` storage driver for backwards-compatibility with your deployment.\n    - **Docker will remove the `btrfs` driver entirely in a future version. Please consider migrating your deployments to the `overlay2` driver.**\n - GCP OEM images now use a systemd-sysext image for layering additional platform-specific software on top of `/usr` and being part of the OEM A/B updates ([flatcar#1146](https://github.com/flatcar/Flatcar/issues/1146)) \n \n #### Updates:\n \n - Azure: WALinuxAgent ([v2.9.1.1](https://github.com/Azure/WALinuxAgent/releases/tag/v2.9.1.1))\n - DEV, AZURE: python ([3.11.6](https://docs.python.org/release/3.11.6/whatsnew/changelog.html#python-3-11-6))\n - DEV: iperf ([3.15](https://github.com/esnet/iperf/releases/tag/3.15))\n - DEV: smartmontools ([7.4](https://www.smartmontools.org/browser/tags/RELEASE_7_4/smartmontools/NEWS))\n - Go ([1.20.12](https://go.dev/doc/devel/release#go1.20.12) (includes [1.20.11](https://go.dev/doc/devel/release#go1.20.11)))\n - Linux ([6.1.73](https://lwn.net/Articles/958343) (includes [6.1.72](https://lwn.net/Articles/957376), [6.1.71](https://lwn.net/Articles/957009), [6.1.70](https://lwn.net/Articles/956526), [6.1.69](https://lwn.net/Articles/955814), [6.1.68](https://lwn.net/Articles/954989/), [6.1.67](https://lwn.net/Articles/954455), [6.1.60](https://lwn.net/Articles/948817) and [6.1.59](https://lwn.net/Articles/948297)))\n - Linux Firmware ([20231111](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231111) (includes [20231030](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231030)))\n - SDK: Rust ([1.73.0](https://github.com/rust-lang/rust/releases/tag/1.73.0))\n - SDK: python packaging ([23.2](https://github.com/pypa/packaging/releases/tag/23.2)), platformdirs ([3.11.0](https://github.com/platformdirs/platformdirs/releases/tag/3.11.0)) \n - VMWare: open-vm-tools ([12.3.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.5))\n - acpid ([2.0.34](https://sourceforge.net/p/acpid2/code/ci/2.0.34/tree/Changelog))\n - ca-certificates ([3.96.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html) (includes [3.96](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html)))\n - containerd ([1.7.10](https://github.com/containerd/containerd/releases/tag/v1.7.10) includes ([1.7.9](https://github.com/containerd/containerd/releases/tag/v1.7.9) and [1.7.8](https://github.com/containerd/containerd/releases/tag/v1.7.8)))\n - cri-tools ([1.27.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.0))\n - ding-libs ([0.6.2](https://github.com/SSSD/ding-libs/releases/tag/0.6.2))\n - docker ([24.0.6](https://docs.docker.com/engine/release-notes/24.0/), includes changes from [23.0](https://docs.docker.com/engine/release-notes/23.0/))\n - efibootmgr ([18](https://github.com/rhboot/efibootmgr/releases/tag/18))\n - efivar ([38](https://github.com/rhboot/efivar/releases/tag/38))\n - ethtool ([6.5](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.5))\n - hwdata ([0.375](https://github.com/vcrhonek/hwdata/releases/tag/v0.375) includes ([0.374](https://github.com/vcrhonek/hwdata/commits/v0.374)))\n - iproute2 ([6.5.0](https://marc.info/?l=linux-netdev&m=169401822317373&w=2))\n - ipvsadm ([1.31](https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.31) (includes [1.28](https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.28), [1.29](https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.29) and [1.30](https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.30)))\n - json-c ([0.17](https://github.com/json-c/json-c/blob/json-c-0.17-20230812/ChangeLog))\n - libffi ([3.4.4](https://github.com/libffi/libffi/releases/tag/v3.4.4) (includes [3.4.2](https://github.com/libffi/libffi/releases/tag/v3.4.2) and [3.4.3](https://github.com/libffi/libffi/releases/tag/v3.4.3)))\n - liblinear (246)\n - libmnl ([1.0.5](https://git.netfilter.org/libmnl/log/?h=libmnl-1.0.5))\n - libnetfilter_conntrack ([1.0.9](https://git.netfilter.org/libnetfilter_conntrack/log/?h=libnetfilter_conntrack-1.0.9))\n - libnetfilter_cthelper ([1.0.1](https://git.netfilter.org/libnetfilter_cthelper/log/?id=8cee0347cc6969c39bb64000dfaa676a8f9e30f0))\n - libnetfilter_cttimeout ([1.0.1](https://git.netfilter.org/libnetfilter_cttimeout/log/?id=068d36d6291f53a0a609ab1f695aa06e94ce3d30))\n - libnfnetlink ([1.0.2](https://git.netfilter.org/libnfnetlink/log/?h=libnfnetlink-1.0.2))\n - libsodium ([1.0.19](https://github.com/jedisct1/libsodium/releases/tag/1.0.19-RELEASE))\n - libunistring ([1.1](https://git.savannah.gnu.org/gitweb/?p=libunistring.git;a=blob;f=NEWS;h=5a43ddd7011d62a952733f6c0b7ad52aa4f385c7;hb=8006860b710aae2e8442088c3ddc7d819dfa8ac7))\n - libunwind ([1.7.2](https://github.com/libunwind/libunwind/releases/tag/v1.7.2) (includes [1.7.0](https://github.com/libunwind/libunwind/releases/tag/v1.7.0)))\n - liburing ([2.3](https://github.com/axboe/liburing/blob/liburing-2.3/CHANGELOG))\n - mpc ([1.3.1](https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00049.html) (includes [1.3.0](https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00028.html))\n - mpfr ([4.2.1](https://gitlab.inria.fr/mpfr/mpfr/-/blob/4.2.1/NEWS))\n - nghttp2 ([1.57.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0) (includes [1.52.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0), [1.53.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.53.0), [1.54.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.54.0), [1.55.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.55.0), [1.55.1](https://github.com/nghttp2/nghttp2/releases/tag/v1.55.1) and [1.56.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.56.0)))\n - nspr ([4.35](https://hg.mozilla.org/projects/nspr/log/b563bfc16c887c48b038b7b441fcc4e40a126d3b))\n - ntp ([4.2.8p17](https://www.ntp.org/support/securitynotice/4_2_8p17-release-announcement/))\n - nvme-cli ([v2.6](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.6), libnvme [v1.6](https://github.com/linux-nvme/libnvme/releases/tag/v1.6))\n - protobuf ([21.12](https://github.com/protocolbuffers/protobuf/releases/tag/v21.12) (includes [21.10](https://github.com/protocolbuffers/protobuf/releases/tag/v21.10) and [21.11](https://github.com/protocolbuffers/protobuf/releases/tag/v21.11)))\n - samba ([4.18.8](https://www.samba.org/samba/history/samba-4.18.8.html))\n - sqlite ([3.43.2](https://www.sqlite.org/releaselog/3_43_2.html))\n - squashfs-tools ([4.6.1](https://github.com/plougher/squashfs-tools/releases/tag/4.6.1) (includes [4.6](https://github.com/plougher/squashfs-tools/releases/tag/4.6)))\n - thin-provisioning-tools ([1.0.6](https://github.com/jthornber/thin-provisioning-tools/blob/v1.0.6/CHANGES))\n\n _Changes since **Alpha 3815.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-1193](https://nvd.nist.gov/vuln/detail/CVE-2023-1193), [CVE-2023-51779](https://nvd.nist.gov/vuln/detail/CVE-2023-51779), [CVE-2023-51780](https://nvd.nist.gov/vuln/detail/CVE-2023-51780), [CVE-2023-51781](https://nvd.nist.gov/vuln/detail/CVE-2023-51781), [CVE-2023-51782](https://nvd.nist.gov/vuln/detail/CVE-2023-51782), [CVE-2023-6531](https://nvd.nist.gov/vuln/detail/CVE-2023-6531), [CVE-2023-6606](https://nvd.nist.gov/vuln/detail/CVE-2023-6606), [CVE-2023-6622](https://nvd.nist.gov/vuln/detail/CVE-2023-6622), [CVE-2023-6817](https://nvd.nist.gov/vuln/detail/CVE-2023-6817), [CVE-2023-6931](https://nvd.nist.gov/vuln/detail/CVE-2023-6931))\n \n #### Bug fixes:\n \n - AWS: Fixed the Amazon SSM agent that was crashing. ([Flatcar#1307](https://github.com/flatcar/Flatcar/issues/1307))\n - Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found ([coreos-cloudinit#25](https://github.com/flatcar/coreos-cloudinit/pull/25), [Flatcar#1262](https://github.com/flatcar/Flatcar/issues/1262)), with contributions from [MichaelEischer](https://github.com/MichaelEischer)\n - Fixed supplying extension update payloads with a custom base URL in Nebraska ([Flatcar#1281](https://github.com/flatcar/Flatcar/issues/1281))\n\n  \n #### Updates:\n \n - Linux ([6.1.73](https://lwn.net/Articles/958343) (includes [6.1.72](https://lwn.net/Articles/957376), [6.1.71](https://lwn.net/Articles/957009), [6.1.70](https://lwn.net/Articles/956526), [6.1.69](https://lwn.net/Articles/955814), [6.1.68](https://lwn.net/Articles/954989/) and [6.1.67](https://lwn.net/Articles/954455)))\n - ca-certificates ([3.96.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html) (includes [3.96](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html)))"
  },
  "3850.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-02-14 04:34:27 +0000",
    "major_software": {
      "containerd": [
        "1.7.13"
      ],
      "docker": [
        "24.0.9"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "6.6.16"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **Beta 3815.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-27672](https://nvd.nist.gov/vuln/detail/CVE-2022-27672), [CVE-2022-36402](https://nvd.nist.gov/vuln/detail/CVE-2022-36402), [CVE-2022-36402](https://nvd.nist.gov/vuln/detail/CVE-2022-36402), [CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982), [CVE-2022-4269](https://nvd.nist.gov/vuln/detail/CVE-2022-4269), [CVE-2022-45886](https://nvd.nist.gov/vuln/detail/CVE-2022-45886), [CVE-2022-45887](https://nvd.nist.gov/vuln/detail/CVE-2022-45887), [CVE-2022-45919](https://nvd.nist.gov/vuln/detail/CVE-2022-45919), [CVE-2022-48425](https://nvd.nist.gov/vuln/detail/CVE-2022-48425), [CVE-2023-0160](https://nvd.nist.gov/vuln/detail/CVE-2023-0160), [CVE-2023-0160](https://nvd.nist.gov/vuln/detail/CVE-2023-0160), [CVE-2023-0459](https://nvd.nist.gov/vuln/detail/CVE-2023-0459), [CVE-2023-1032](https://nvd.nist.gov/vuln/detail/CVE-2023-1032), [CVE-2023-1076](https://nvd.nist.gov/vuln/detail/CVE-2023-1076), [CVE-2023-1077](https://nvd.nist.gov/vuln/detail/CVE-2023-1077), [CVE-2023-1079](https://nvd.nist.gov/vuln/detail/CVE-2023-1079), [CVE-2023-1118](https://nvd.nist.gov/vuln/detail/CVE-2023-1118), [CVE-2023-1192](https://nvd.nist.gov/vuln/detail/CVE-2023-1192), [CVE-2023-1194](https://nvd.nist.gov/vuln/detail/CVE-2023-1194), [CVE-2023-1206](https://nvd.nist.gov/vuln/detail/CVE-2023-1206), [CVE-2023-1281](https://nvd.nist.gov/vuln/detail/CVE-2023-1281), [CVE-2023-1380](https://nvd.nist.gov/vuln/detail/CVE-2023-1380), [CVE-2023-1380](https://nvd.nist.gov/vuln/detail/CVE-2023-1380), [CVE-2023-1513](https://nvd.nist.gov/vuln/detail/CVE-2023-1513), [CVE-2023-1583](https://nvd.nist.gov/vuln/detail/CVE-2023-1583), [CVE-2023-1611](https://nvd.nist.gov/vuln/detail/CVE-2023-1611), [CVE-2023-1670](https://nvd.nist.gov/vuln/detail/CVE-2023-1670), [CVE-2023-1829](https://nvd.nist.gov/vuln/detail/CVE-2023-1829), [CVE-2023-1855](https://nvd.nist.gov/vuln/detail/CVE-2023-1855), [CVE-2023-1859](https://nvd.nist.gov/vuln/detail/CVE-2023-1859), [CVE-2023-1989](https://nvd.nist.gov/vuln/detail/CVE-2023-1989), [CVE-2023-1990](https://nvd.nist.gov/vuln/detail/CVE-2023-1990), [CVE-2023-1998](https://nvd.nist.gov/vuln/detail/CVE-2023-1998), [CVE-2023-2002](https://nvd.nist.gov/vuln/detail/CVE-2023-2002), [CVE-2023-2002](https://nvd.nist.gov/vuln/detail/CVE-2023-2002), [CVE-2023-20569](https://nvd.nist.gov/vuln/detail/CVE-2023-20569), [CVE-2023-20588](https://nvd.nist.gov/vuln/detail/CVE-2023-20588), [CVE-2023-20593](https://nvd.nist.gov/vuln/detail/CVE-2023-20593), [CVE-2023-2124](https://nvd.nist.gov/vuln/detail/CVE-2023-2124), [CVE-2023-21255](https://nvd.nist.gov/vuln/detail/CVE-2023-21255), [CVE-2023-21264](https://nvd.nist.gov/vuln/detail/CVE-2023-21264), [CVE-2023-2156](https://nvd.nist.gov/vuln/detail/CVE-2023-2156), [CVE-2023-2156](https://nvd.nist.gov/vuln/detail/CVE-2023-2156), [CVE-2023-2163](https://nvd.nist.gov/vuln/detail/CVE-2023-2163), [CVE-2023-2163](https://nvd.nist.gov/vuln/detail/CVE-2023-2163), [CVE-2023-2194](https://nvd.nist.gov/vuln/detail/CVE-2023-2194), [CVE-2023-2235](https://nvd.nist.gov/vuln/detail/CVE-2023-2235), [CVE-2023-2248](https://nvd.nist.gov/vuln/detail/CVE-2023-2248), [CVE-2023-2248](https://nvd.nist.gov/vuln/detail/CVE-2023-2248), [CVE-2023-2269](https://nvd.nist.gov/vuln/detail/CVE-2023-2269), [CVE-2023-2269](https://nvd.nist.gov/vuln/detail/CVE-2023-2269), [CVE-2023-2483](https://nvd.nist.gov/vuln/detail/CVE-2023-2483), [CVE-2023-25012](https://nvd.nist.gov/vuln/detail/CVE-2023-25012), [CVE-2023-25775](https://nvd.nist.gov/vuln/detail/CVE-2023-25775), [CVE-2023-25775](https://nvd.nist.gov/vuln/detail/CVE-2023-25775), [CVE-2023-2598](https://nvd.nist.gov/vuln/detail/CVE-2023-2598), [CVE-2023-26545](https://nvd.nist.gov/vuln/detail/CVE-2023-26545), [CVE-2023-28466](https://nvd.nist.gov/vuln/detail/CVE-2023-28466), [CVE-2023-28866](https://nvd.nist.gov/vuln/detail/CVE-2023-28866), [CVE-2023-2898](https://nvd.nist.gov/vuln/detail/CVE-2023-2898), [CVE-2023-2985](https://nvd.nist.gov/vuln/detail/CVE-2023-2985), [CVE-2023-30456](https://nvd.nist.gov/vuln/detail/CVE-2023-30456), [CVE-2023-30772](https://nvd.nist.gov/vuln/detail/CVE-2023-30772), [CVE-2023-3090](https://nvd.nist.gov/vuln/detail/CVE-2023-3090), [CVE-2023-31085](https://nvd.nist.gov/vuln/detail/CVE-2023-31085), [CVE-2023-3117](https://nvd.nist.gov/vuln/detail/CVE-2023-3117), [CVE-2023-31248](https://nvd.nist.gov/vuln/detail/CVE-2023-31248), [CVE-2023-3141](https://nvd.nist.gov/vuln/detail/CVE-2023-3141), [CVE-2023-31436](https://nvd.nist.gov/vuln/detail/CVE-2023-31436), [CVE-2023-31436](https://nvd.nist.gov/vuln/detail/CVE-2023-31436), [CVE-2023-3212](https://nvd.nist.gov/vuln/detail/CVE-2023-3212), [CVE-2023-3220](https://nvd.nist.gov/vuln/detail/CVE-2023-3220), [CVE-2023-32233](https://nvd.nist.gov/vuln/detail/CVE-2023-32233), [CVE-2023-32233](https://nvd.nist.gov/vuln/detail/CVE-2023-32233), [CVE-2023-32247](https://nvd.nist.gov/vuln/detail/CVE-2023-32247), [CVE-2023-32247](https://nvd.nist.gov/vuln/detail/CVE-2023-32247), [CVE-2023-32248](https://nvd.nist.gov/vuln/detail/CVE-2023-32248), [CVE-2023-32248](https://nvd.nist.gov/vuln/detail/CVE-2023-32248), [CVE-2023-32250](https://nvd.nist.gov/vuln/detail/CVE-2023-32250), [CVE-2023-32250](https://nvd.nist.gov/vuln/detail/CVE-2023-32250), [CVE-2023-32252](https://nvd.nist.gov/vuln/detail/CVE-2023-32252), [CVE-2023-32252](https://nvd.nist.gov/vuln/detail/CVE-2023-32252), [CVE-2023-32254](https://nvd.nist.gov/vuln/detail/CVE-2023-32254), [CVE-2023-32254](https://nvd.nist.gov/vuln/detail/CVE-2023-32254), [CVE-2023-32257](https://nvd.nist.gov/vuln/detail/CVE-2023-32257), [CVE-2023-32257](https://nvd.nist.gov/vuln/detail/CVE-2023-32257), [CVE-2023-32258](https://nvd.nist.gov/vuln/detail/CVE-2023-32258), [CVE-2023-32258](https://nvd.nist.gov/vuln/detail/CVE-2023-32258), [CVE-2023-3268](https://nvd.nist.gov/vuln/detail/CVE-2023-3268), [CVE-2023-3268](https://nvd.nist.gov/vuln/detail/CVE-2023-3268), [CVE-2023-3269](https://nvd.nist.gov/vuln/detail/CVE-2023-3269), [CVE-2023-3269](https://nvd.nist.gov/vuln/detail/CVE-2023-3269), [CVE-2023-3312](https://nvd.nist.gov/vuln/detail/CVE-2023-3312), [CVE-2023-3312](https://nvd.nist.gov/vuln/detail/CVE-2023-3312), [CVE-2023-3317](https://nvd.nist.gov/vuln/detail/CVE-2023-3317), [CVE-2023-33203](https://nvd.nist.gov/vuln/detail/CVE-2023-33203), [CVE-2023-33250](https://nvd.nist.gov/vuln/detail/CVE-2023-33250), [CVE-2023-33250](https://nvd.nist.gov/vuln/detail/CVE-2023-33250), [CVE-2023-33288](https://nvd.nist.gov/vuln/detail/CVE-2023-33288), [CVE-2023-3355](https://nvd.nist.gov/vuln/detail/CVE-2023-3355), [CVE-2023-3390](https://nvd.nist.gov/vuln/detail/CVE-2023-3390), [CVE-2023-33951](https://nvd.nist.gov/vuln/detail/CVE-2023-33951), [CVE-2023-33951](https://nvd.nist.gov/vuln/detail/CVE-2023-33951), [CVE-2023-33952](https://nvd.nist.gov/vuln/detail/CVE-2023-33952), [CVE-2023-33952](https://nvd.nist.gov/vuln/detail/CVE-2023-33952), [CVE-2023-34255](https://nvd.nist.gov/vuln/detail/CVE-2023-34255), [CVE-2023-34256](https://nvd.nist.gov/vuln/detail/CVE-2023-34256), [CVE-2023-34256](https://nvd.nist.gov/vuln/detail/CVE-2023-34256), [CVE-2023-34319](https://nvd.nist.gov/vuln/detail/CVE-2023-34319), [CVE-2023-34324](https://nvd.nist.gov/vuln/detail/CVE-2023-34324), [CVE-2023-35001](https://nvd.nist.gov/vuln/detail/CVE-2023-35001), [CVE-2023-35788](https://nvd.nist.gov/vuln/detail/CVE-2023-35788), [CVE-2023-35823](https://nvd.nist.gov/vuln/detail/CVE-2023-35823), [CVE-2023-35823](https://nvd.nist.gov/vuln/detail/CVE-2023-35823), [CVE-2023-35824](https://nvd.nist.gov/vuln/detail/CVE-2023-35824), [CVE-2023-35824](https://nvd.nist.gov/vuln/detail/CVE-2023-35824), [CVE-2023-35826](https://nvd.nist.gov/vuln/detail/CVE-2023-35826), [CVE-2023-35826](https://nvd.nist.gov/vuln/detail/CVE-2023-35826), [CVE-2023-35827](https://nvd.nist.gov/vuln/detail/CVE-2023-35827), [CVE-2023-35828](https://nvd.nist.gov/vuln/detail/CVE-2023-35828), [CVE-2023-35828](https://nvd.nist.gov/vuln/detail/CVE-2023-35828), [CVE-2023-35829](https://nvd.nist.gov/vuln/detail/CVE-2023-35829), [CVE-2023-35829](https://nvd.nist.gov/vuln/detail/CVE-2023-35829), [CVE-2023-3609](https://nvd.nist.gov/vuln/detail/CVE-2023-3609), [CVE-2023-3610](https://nvd.nist.gov/vuln/detail/CVE-2023-3610), [CVE-2023-3610](https://nvd.nist.gov/vuln/detail/CVE-2023-3610), [CVE-2023-3611](https://nvd.nist.gov/vuln/detail/CVE-2023-3611), [CVE-2023-37453](https://nvd.nist.gov/vuln/detail/CVE-2023-37453), [CVE-2023-37453](https://nvd.nist.gov/vuln/detail/CVE-2023-37453), [CVE-2023-3772](https://nvd.nist.gov/vuln/detail/CVE-2023-3772), [CVE-2023-3773](https://nvd.nist.gov/vuln/detail/CVE-2023-3773), [CVE-2023-3776](https://nvd.nist.gov/vuln/detail/CVE-2023-3776), [CVE-2023-3777](https://nvd.nist.gov/vuln/detail/CVE-2023-3777), [CVE-2023-38409](https://nvd.nist.gov/vuln/detail/CVE-2023-38409), [CVE-2023-38426](https://nvd.nist.gov/vuln/detail/CVE-2023-38426), [CVE-2023-38427](https://nvd.nist.gov/vuln/detail/CVE-2023-38427), [CVE-2023-38428](https://nvd.nist.gov/vuln/detail/CVE-2023-38428), [CVE-2023-38429](https://nvd.nist.gov/vuln/detail/CVE-2023-38429), [CVE-2023-38430](https://nvd.nist.gov/vuln/detail/CVE-2023-38430), [CVE-2023-38431](https://nvd.nist.gov/vuln/detail/CVE-2023-38431), [CVE-2023-38432](https://nvd.nist.gov/vuln/detail/CVE-2023-38432), [CVE-2023-38432](https://nvd.nist.gov/vuln/detail/CVE-2023-38432), [CVE-2023-3863](https://nvd.nist.gov/vuln/detail/CVE-2023-3863), [CVE-2023-3863](https://nvd.nist.gov/vuln/detail/CVE-2023-3863), [CVE-2023-3865](https://nvd.nist.gov/vuln/detail/CVE-2023-3865), [CVE-2023-3865](https://nvd.nist.gov/vuln/detail/CVE-2023-3865), [CVE-2023-3866](https://nvd.nist.gov/vuln/detail/CVE-2023-3866), [CVE-2023-3866](https://nvd.nist.gov/vuln/detail/CVE-2023-3866), [CVE-2023-3867](https://nvd.nist.gov/vuln/detail/CVE-2023-3867), [CVE-2023-39189](https://nvd.nist.gov/vuln/detail/CVE-2023-39189), [CVE-2023-39191](https://nvd.nist.gov/vuln/detail/CVE-2023-39191), [CVE-2023-39192](https://nvd.nist.gov/vuln/detail/CVE-2023-39192), [CVE-2023-39192](https://nvd.nist.gov/vuln/detail/CVE-2023-39192), [CVE-2023-39193](https://nvd.nist.gov/vuln/detail/CVE-2023-39193), [CVE-2023-39193](https://nvd.nist.gov/vuln/detail/CVE-2023-39193), [CVE-2023-39194](https://nvd.nist.gov/vuln/detail/CVE-2023-39194), [CVE-2023-39197](https://nvd.nist.gov/vuln/detail/CVE-2023-39197), [CVE-2023-39197](https://nvd.nist.gov/vuln/detail/CVE-2023-39197), [CVE-2023-39198](https://nvd.nist.gov/vuln/detail/CVE-2023-39198), [CVE-2023-4004](https://nvd.nist.gov/vuln/detail/CVE-2023-4004), [CVE-2023-4015](https://nvd.nist.gov/vuln/detail/CVE-2023-4015), [CVE-2023-40283](https://nvd.nist.gov/vuln/detail/CVE-2023-40283), [CVE-2023-40791](https://nvd.nist.gov/vuln/detail/CVE-2023-40791), [CVE-2023-4128](https://nvd.nist.gov/vuln/detail/CVE-2023-4128), [CVE-2023-4132](https://nvd.nist.gov/vuln/detail/CVE-2023-4132), [CVE-2023-4133](https://nvd.nist.gov/vuln/detail/CVE-2023-4133), [CVE-2023-4133](https://nvd.nist.gov/vuln/detail/CVE-2023-4133), [CVE-2023-4134](https://nvd.nist.gov/vuln/detail/CVE-2023-4134), [CVE-2023-4134](https://nvd.nist.gov/vuln/detail/CVE-2023-4134), [CVE-2023-4147](https://nvd.nist.gov/vuln/detail/CVE-2023-4147), [CVE-2023-4155](https://nvd.nist.gov/vuln/detail/CVE-2023-4155), [CVE-2023-4194](https://nvd.nist.gov/vuln/detail/CVE-2023-4194), [CVE-2023-4206](https://nvd.nist.gov/vuln/detail/CVE-2023-4206), [CVE-2023-4207](https://nvd.nist.gov/vuln/detail/CVE-2023-4207), [CVE-2023-4208](https://nvd.nist.gov/vuln/detail/CVE-2023-4208), [CVE-2023-4244](https://nvd.nist.gov/vuln/detail/CVE-2023-4244), [CVE-2023-4273](https://nvd.nist.gov/vuln/detail/CVE-2023-4273), [CVE-2023-42752](https://nvd.nist.gov/vuln/detail/CVE-2023-42752), [CVE-2023-42752](https://nvd.nist.gov/vuln/detail/CVE-2023-42752), [CVE-2023-42753](https://nvd.nist.gov/vuln/detail/CVE-2023-42753), [CVE-2023-42753](https://nvd.nist.gov/vuln/detail/CVE-2023-42753), [CVE-2023-42754](https://nvd.nist.gov/vuln/detail/CVE-2023-42754), [CVE-2023-42756](https://nvd.nist.gov/vuln/detail/CVE-2023-42756), [CVE-2023-44466](https://nvd.nist.gov/vuln/detail/CVE-2023-44466), [CVE-2023-4563](https://nvd.nist.gov/vuln/detail/CVE-2023-4563), [CVE-2023-4569](https://nvd.nist.gov/vuln/detail/CVE-2023-4569), [CVE-2023-45862](https://nvd.nist.gov/vuln/detail/CVE-2023-45862), [CVE-2023-45863](https://nvd.nist.gov/vuln/detail/CVE-2023-45863), [CVE-2023-45871](https://nvd.nist.gov/vuln/detail/CVE-2023-45871), [CVE-2023-45871](https://nvd.nist.gov/vuln/detail/CVE-2023-45871), [CVE-2023-45898](https://nvd.nist.gov/vuln/detail/CVE-2023-45898), [CVE-2023-4610](https://nvd.nist.gov/vuln/detail/CVE-2023-4610), [CVE-2023-4611](https://nvd.nist.gov/vuln/detail/CVE-2023-4611), [CVE-2023-4623](https://nvd.nist.gov/vuln/detail/CVE-2023-4623), [CVE-2023-4623](https://nvd.nist.gov/vuln/detail/CVE-2023-4623), [CVE-2023-46343](https://nvd.nist.gov/vuln/detail/CVE-2023-46343), [CVE-2023-46813](https://nvd.nist.gov/vuln/detail/CVE-2023-46813), [CVE-2023-46838](https://nvd.nist.gov/vuln/detail/CVE-2023-46838), [CVE-2023-46838](https://nvd.nist.gov/vuln/detail/CVE-2023-46838), [CVE-2023-46862](https://nvd.nist.gov/vuln/detail/CVE-2023-46862), [CVE-2023-46862](https://nvd.nist.gov/vuln/detail/CVE-2023-46862), [CVE-2023-4881](https://nvd.nist.gov/vuln/detail/CVE-2023-4881), [CVE-2023-4921](https://nvd.nist.gov/vuln/detail/CVE-2023-4921), [CVE-2023-50431](https://nvd.nist.gov/vuln/detail/CVE-2023-50431), [CVE-2023-50431](https://nvd.nist.gov/vuln/detail/CVE-2023-50431), [CVE-2023-5090](https://nvd.nist.gov/vuln/detail/CVE-2023-5090), [CVE-2023-51042](https://nvd.nist.gov/vuln/detail/CVE-2023-51042), [CVE-2023-51043](https://nvd.nist.gov/vuln/detail/CVE-2023-51043), [CVE-2023-5158](https://nvd.nist.gov/vuln/detail/CVE-2023-5158), [CVE-2023-51779](https://nvd.nist.gov/vuln/detail/CVE-2023-51779), [CVE-2023-51780](https://nvd.nist.gov/vuln/detail/CVE-2023-51780), [CVE-2023-51781](https://nvd.nist.gov/vuln/detail/CVE-2023-51781), [CVE-2023-51782](https://nvd.nist.gov/vuln/detail/CVE-2023-51782), [CVE-2023-5197](https://nvd.nist.gov/vuln/detail/CVE-2023-5197), [CVE-2023-5345](https://nvd.nist.gov/vuln/detail/CVE-2023-5345), [CVE-2023-5633](https://nvd.nist.gov/vuln/detail/CVE-2023-5633), [CVE-2023-5717](https://nvd.nist.gov/vuln/detail/CVE-2023-5717), [CVE-2023-5972](https://nvd.nist.gov/vuln/detail/CVE-2023-5972), [CVE-2023-6039](https://nvd.nist.gov/vuln/detail/CVE-2023-6039), [CVE-2023-6111](https://nvd.nist.gov/vuln/detail/CVE-2023-6111), [CVE-2023-6121](https://nvd.nist.gov/vuln/detail/CVE-2023-6121), [CVE-2023-6176](https://nvd.nist.gov/vuln/detail/CVE-2023-6176), [CVE-2023-6200](https://nvd.nist.gov/vuln/detail/CVE-2023-6200), [CVE-2023-6531](https://nvd.nist.gov/vuln/detail/CVE-2023-6531), [CVE-2023-6546](https://nvd.nist.gov/vuln/detail/CVE-2023-6546), [CVE-2023-6560](https://nvd.nist.gov/vuln/detail/CVE-2023-6560), [CVE-2023-6606](https://nvd.nist.gov/vuln/detail/CVE-2023-6606), [CVE-2023-6610](https://nvd.nist.gov/vuln/detail/CVE-2023-6610), [CVE-2023-6610](https://nvd.nist.gov/vuln/detail/CVE-2023-6610), [CVE-2023-6622](https://nvd.nist.gov/vuln/detail/CVE-2023-6622), [CVE-2023-6817](https://nvd.nist.gov/vuln/detail/CVE-2023-6817), [CVE-2023-6915](https://nvd.nist.gov/vuln/detail/CVE-2023-6915), [CVE-2023-6915](https://nvd.nist.gov/vuln/detail/CVE-2023-6915), [CVE-2023-6931](https://nvd.nist.gov/vuln/detail/CVE-2023-6931), [CVE-2023-6932](https://nvd.nist.gov/vuln/detail/CVE-2023-6932), [CVE-2023-7192](https://nvd.nist.gov/vuln/detail/CVE-2023-7192), [CVE-2024-0193](https://nvd.nist.gov/vuln/detail/CVE-2024-0193), [CVE-2024-0443](https://nvd.nist.gov/vuln/detail/CVE-2024-0443), [CVE-2024-0565](https://nvd.nist.gov/vuln/detail/CVE-2024-0565), [CVE-2024-0582](https://nvd.nist.gov/vuln/detail/CVE-2024-0582), [CVE-2024-0584](https://nvd.nist.gov/vuln/detail/CVE-2024-0584), [CVE-2024-0607](https://nvd.nist.gov/vuln/detail/CVE-2024-0607), [CVE-2024-0607](https://nvd.nist.gov/vuln/detail/CVE-2024-0607), [CVE-2024-0639](https://nvd.nist.gov/vuln/detail/CVE-2024-0639), [CVE-2024-0641](https://nvd.nist.gov/vuln/detail/CVE-2024-0641), [CVE-2024-0646](https://nvd.nist.gov/vuln/detail/CVE-2024-0646), [CVE-2024-0775](https://nvd.nist.gov/vuln/detail/CVE-2024-0775), [CVE-2024-0775](https://nvd.nist.gov/vuln/detail/CVE-2024-0775), [CVE-2024-1085](https://nvd.nist.gov/vuln/detail/CVE-2024-1085), [CVE-2024-1085](https://nvd.nist.gov/vuln/detail/CVE-2024-1085), [CVE-2024-1086](https://nvd.nist.gov/vuln/detail/CVE-2024-1086), [CVE-2024-1086](https://nvd.nist.gov/vuln/detail/CVE-2024-1086), [CVE-2024-1312](https://nvd.nist.gov/vuln/detail/CVE-2024-1312), [CVE-2024-22705](https://nvd.nist.gov/vuln/detail/CVE-2024-22705), [CVE-2024-23849](https://nvd.nist.gov/vuln/detail/CVE-2024-23849), [CVE-2024-23849](https://nvd.nist.gov/vuln/detail/CVE-2024-23849))\n - binutils ([CVE-2023-1972](https://nvd.nist.gov/vuln/detail/CVE-2023-1972))\n - curl ([CVE-2023-46218](https://nvd.nist.gov/vuln/detail/CVE-2023-46218), [CVE-2023-46219](https://nvd.nist.gov/vuln/detail/CVE-2023-46219))\n - docker ([CVE-2024-24557](https://nvd.nist.gov/vuln/detail/CVE-2024-24557))\n - gnutls ([CVE-2023-5981](https://nvd.nist.gov/vuln/detail/CVE-2023-5981))\n - intel-microcode ([CVE-2023-23583](https://nvd.nist.gov/vuln/detail/CVE-2023-23583))\n - libxml2 ([CVE-2023-45322](https://nvd.nist.gov/vuln/detail/CVE-2023-45322))\n - openssh ([CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795), [CVE-2023-51384](https://nvd.nist.gov/vuln/detail/CVE-2023-51384), [CVE-2023-51385](https://nvd.nist.gov/vuln/detail/CVE-2023-51385))\n - openssl ([CVE-2023-3817](https://nvd.nist.gov/vuln/detail/CVE-2023-3817), [CVE-2023-5363](https://nvd.nist.gov/vuln/detail/CVE-2023-5363), [CVE-2023-5678](https://nvd.nist.gov/vuln/detail/CVE-2023-5678))\n - runc ([CVE-2024-21626](https://nvd.nist.gov/vuln/detail/CVE-2024-21626))\n - traceroute ([CVE-2023-46316](https://nvd.nist.gov/vuln/detail/CVE-2023-46316))\n - vim ([CVE-2023-5344](https://nvd.nist.gov/vuln/detail/CVE-2023-5344), [CVE-2023-5441](https://nvd.nist.gov/vuln/detail/CVE-2023-5441), [CVE-2023-5535](https://nvd.nist.gov/vuln/detail/CVE-2023-5535), [CVE-2023-46246](https://nvd.nist.gov/vuln/detail/CVE-2023-46246))\n - SDK: perl ([CVE-2023-47038](https://nvd.nist.gov/vuln/detail/CVE-2023-47038))\n \n #### Bug fixes:\n \n - Added a workaround for old airgapped/proxied update-engine clients to be able to update to this release ([Flatcar#1332](https://github.com/flatcar/Flatcar/issues/1332), [update_engine#38](https://github.com/flatcar/update_engine/pull/38))\n - Fixed the handling of OEM update payloads in a Nebraska response with self-hosted packages ([ue-rs#49](https://github.com/flatcar/ue-rs/pull/49))\n - Forwarded the proxy environment variables of `update-engine.service` to the postinstall script to support fetching OEM systemd-sysext payloads through a proxy ([Flatcar#1326](https://github.com/flatcar/Flatcar/issues/1326))\n \n #### Changes:\n \n - Added a `flatcar-update --oem-payloads <yes|no>` flag to skip providing OEM payloads, e.g., for downgrades ([init#114](https://github.com/flatcar/init/pull/114))\n - Update generation SLSA provenance info from v0.2 to v1.0.\n \n #### Updates:\n \n- Linux ([6.6.16](https://lwn.net/Articles/961011) (includes [6.6.15](https://lwn.net/Articles/960441), [6.6.14](https://lwn.net/Articles/959512), [6.6.13](https://lwn.net/Articles/958862), [6.6.12](https://lwn.net/Articles/958342), [6.6.11](https://lwn.net/Articles/957375), [6.6.10](https://lwn.net/Articles/957008), [6.6.9](https://lwn.net/Articles/956525), [6.6.8](https://lwn.net/Articles/955813), [6.6.7](https://lwn.net/Articles/954990/), [6.6](https://kernelnewbies.org/Linux_6.6)))\n- Linux Firmware ([20231211](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231211))\n- Go ([1.20.13](https://go.dev/doc/devel/release#go1.20.13))\n- bash ([5.2_p21](https://git.savannah.gnu.org/cgit/bash.git/log/?id=2bb3cbefdb8fd019765b1a9cc42ecf37ff22fec6))\n- binutils ([2.41](https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00009.html))\n- bpftool ([6.5.7](https://kernelnewbies.org/Linux_6.5#Tracing.2C_perf_and_BPF))\n- c-ares ([1.21.0](https://c-ares.org/changelog.html#1_21_0))\n- ca-certificates ([3.97](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_97.html))\n- containerd ([1.7.13](https://github.com/containerd/containerd/releases/tag/v1.7.13) (includes [1.7.11](https://github.com/containerd/containerd/releases/tag/v1.7.11)))\n- coreutils ([9.4](https://lists.gnu.org/archive/html/info-gnu/2023-08/msg00007.html))\n- curl ([8.5.0](https://curl.se/changes.html#8_5_0))\n- docker ([24.0.9](https://github.com/moby/moby/releases/tag/v24.0.9))\n- elfutils ([0.190](https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=0420d3b8376877c1b11712f1aad90a2e2b6f6d06;hb=c1058da5a450e33e72b72abb53bc3ffd7f6b361b))\n- gawk ([5.3.0](https://lwn.net/Articles/949829/))\n- gentoolkit ([0.6.3](https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.3))\n- gettext ([0.22.4](https://savannah.gnu.org/news/?id=10544))\n- glib ([2.78.3](https://gitlab.gnome.org/GNOME/glib/-/blob/2.78.3/NEWS))\n- gnutls ([3.8.2](https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html))\n- groff ([1.23.0](https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00001.html))\n- hwdata ([0.376](https://github.com/vcrhonek/hwdata/commits/v0.376))\n- intel-microcode ([20231114_p20231114](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114))\n- iproute2 ([6.6.0](https://marc.info/?l=linux-netdev&m=169929000929786&w=2))\n- ipset ([7.19](https://git.netfilter.org/ipset/tree/ChangeLog?id=ce6db35a0ea950e850ebe7c50ce46908c1c3bb2b))\n- jq ([1.7.1](https://github.com/jqlang/jq/releases/tag/jq-1.7.1) (includes [1.7](https://github.com/jqlang/jq/releases/tag/jq-1.7)))\n- kbd ([2.6.4](https://github.com/legionus/kbd/releases/tag/v2.6.4))\n- kmod ([31](https://github.com/kmod-project/kmod/blob/v31/NEWS))\n- libarchive ([3.7.2](https://github.com/libarchive/libarchive/releases/tag/v3.7.2))\n- libdnet ([1.16.4](https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.4))\n- libksba ([1.6.5](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=369cfb5d91bf232685a6c5b156453a624e11ed67;hb=7b3e4785e54280d1a13c5bc839bdc6722d898ac7))\n- libnsl ([2.0.1](https://github.com/thkukuk/libnsl/releases/tag/v2.0.1))\n- libxslt ([1.1.39](https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.39))\n- lsof ([4.99.0](https://github.com/lsof-org/lsof/blob/4.99.0/00DIST#L5523))\n- lz4 ([1.9.4](https://github.com/lz4/lz4/releases/tag/v1.9.4))\n- openssh ([9.6p1](https://www.openssh.com/releasenotes.html#9.6p1))\n- openssl ([3.0.12](https://github.com/openssl/openssl/blob/openssl-3.0.12/NEWS.md#major-changes-between-openssl-3011-and-openssl-3012-24-oct-2023))\n- readline ([8.2_p7](https://git.savannah.gnu.org/cgit/readline.git/log/?id=bfe9c573a9e376323929c80b2b71c59727fab0cc))\n- runc ([1.1.12](https://github.com/opencontainers/runc/releases/tag/v1.1.12))\n- selinux-base ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002))\n- selinux-base-policy ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002))\n- selinux-container ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002))\n- selinux-dbus ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002))\n- selinux-sssd ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002))\n- selinux-unconfined ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002))\n- sqlite ([3.44.2](https://www.sqlite.org/releaselog/3_44_2.html))\n- strace ([6.6](https://github.com/strace/strace/releases/tag/v6.6))\n- traceroute ([2.1.3](https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/))\n- usbutils ([016](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v016))\n- util-linux ([2.39.2](https://github.com/util-linux/util-linux/blob/v2.39.2/Documentation/releases/v2.39.2-ReleaseNotes))\n- vim ([9.0.2092](https://github.com/vim/vim/commits/v9.0.2092/))\n- whois ([5.5.20](https://github.com/rfc1036/whois/blob/v5.5.20/debian/changelog))\n- xmlsec ([1.3.2](https://github.com/lsh123/xmlsec/releases/tag/xmlsec_1_3_2))\n- xz-utils ([5.4.5](https://github.com/tukaani-project/xz/releases/tag/v5.4.5))\n- zlib ([1.3](https://github.com/madler/zlib/releases/tag/v1.3))\n- SDK: perl ([5.38.2](https://perldoc.perl.org/5.38.2/perldelta))\n- SDK: portage ([3.0.59](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.59))\n- SDK: python ([3.11.7](https://www.python.org/downloads/release/python-3117/))\n- SDK: repo (2.37)\n- SDK: Rust ([1.75.0](https://github.com/rust-lang/rust/releases/tag/1.75.0) (includes [1.74.1](https://github.com/rust-lang/rust/releases/tag/1.74.1)))\n\n \n _Changes since **Alpha 3850.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-46838](https://nvd.nist.gov/vuln/detail/CVE-2023-46838), [CVE-2023-50431](https://nvd.nist.gov/vuln/detail/CVE-2023-50431), [CVE-2023-6610](https://nvd.nist.gov/vuln/detail/CVE-2023-6610), [CVE-2023-6915](https://nvd.nist.gov/vuln/detail/CVE-2023-6915), [CVE-2024-1085](https://nvd.nist.gov/vuln/detail/CVE-2024-1085), [CVE-2024-1086](https://nvd.nist.gov/vuln/detail/CVE-2024-1086), [CVE-2024-23849](https://nvd.nist.gov/vuln/detail/CVE-2024-23849))\n - docker ([CVE-2024-24557](https://nvd.nist.gov/vuln/detail/CVE-2024-24557))\n - runc ([CVE-2024-21626](https://nvd.nist.gov/vuln/detail/CVE-2024-21626))\n \n #### Bug fixes:\n \n - Added a workaround for old airgapped/proxied update-engine clients to be able to update to this release ([Flatcar#1332](https://github.com/flatcar/Flatcar/issues/1332), [update_engine#38](https://github.com/flatcar/update_engine/pull/38))\n - Fixed the handling of OEM update payloads in a Nebraska response with self-hosted packages ([ue-rs#49](https://github.com/flatcar/ue-rs/pull/49))\n - Forwarded the proxy environment variables of `update-engine.service` to the postinstall script to support fetching OEM systemd-sysext payloads through a proxy ([Flatcar#1326](https://github.com/flatcar/Flatcar/issues/1326))\n \n #### Changes:\n \n - Added a `flatcar-update --oem-payloads <yes|no>` flag to skip providing OEM payloads, e.g., for downgrades ([init#114](https://github.com/flatcar/init/pull/114))\n \n #### Updates:\n \n - Linux ([6.6.16](https://lwn.net/Articles/961011) (includes [6.6.15](https://lwn.net/Articles/960441), [6.6.14](https://lwn.net/Articles/959512), [6.6.13](https://lwn.net/Articles/958862)))\n - ca-certificates ([3.97](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_97.html))\n - containerd ([1.7.13](https://github.com/containerd/containerd/releases/tag/v1.7.13))\n - docker ([24.0.9](https://github.com/moby/moby/releases/tag/v24.0.9))\n - runc ([1.1.12](https://github.com/opencontainers/runc/releases/tag/v1.1.12))\n"
  },
  "3874.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-03-20 09:23:40 +0000",
    "major_software": {
      "containerd": [
        "1.7.13"
      ],
      "docker": [
        "24.0.9"
      ],
      "ignition": [
        "2.15.0"
      ],
      "kernel": [
        "6.6.21"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **Beta 3850.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-52429](https://nvd.nist.gov/vuln/detail/CVE-2023-52429), [CVE-2024-1151](https://nvd.nist.gov/vuln/detail/CVE-2024-1151), [CVE-2024-23850](https://nvd.nist.gov/vuln/detail/CVE-2024-23850), [CVE-2024-23851](https://nvd.nist.gov/vuln/detail/CVE-2024-23851), [CVE-2024-26581](https://nvd.nist.gov/vuln/detail/CVE-2024-26581), [CVE-2024-26582](https://nvd.nist.gov/vuln/detail/CVE-2024-26582), [CVE-2024-26583](https://nvd.nist.gov/vuln/detail/CVE-2024-26583), [CVE-2024-26584](https://nvd.nist.gov/vuln/detail/CVE-2024-26584), [CVE-2024-26585](https://nvd.nist.gov/vuln/detail/CVE-2024-26585), [CVE-2024-26593](https://nvd.nist.gov/vuln/detail/CVE-2024-26593))\n \n #### Bug fixes:\n \n - Fixed that systemd-sysext images can extend directories where Flatcar extensions are also shipping files, e.g., that the sysext-bakery Kubernetes extension works when OEM extensions are present ([sysext-bakery#50](https://github.com/flatcar/sysext-bakery/issues/50))\n - Fixed kubevirt vm creation by ensuring that /dev/vhost-net exists ([Flatcar#1336](https://github.com/flatcar/Flatcar/issues/1336))\n - Resolved kmod static nodes creation in bootengine ([bootengine#85](https://github.com/flatcar/bootengine/pull/85))\n - Restored support for custom OEMs supplied in the PXE boot where `/usr/share/oem` brings the OEM partition contents ([Flatcar#1376](https://github.com/flatcar/Flatcar/issues/1376))\n \n #### Updates:\n \n - Linux ([6.6.21](https://lwn.net/Articles/964561) (includes [6.6.20](https://lwn.net/Articles/964307), [6.6.19](https://lwn.net/Articles/964173), [6.6.18](https://lwn.net/Articles/963357), [6.6.17](https://lwn.net/Articles/962558)))\n - Linux Firmware ([20240115](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240115))\n - afterburn ([5.5.1](https://github.com/coreos/afterburn/releases/tag/v5.5.1))\n - ca-certificates ([3.98](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html))\n - containerd ([1.7.13](https://github.com/containerd/containerd/releases/tag/v1.7.13) (includes [1.7.12](https://github.com/containerd/containerd/releases/tag/v1.7.12)))\n - docker ([24.0.9](https://github.com/moby/moby/releases/tag/v24.0.9))\n - git ([2.43.0](https://github.com/git/git/blob/v2.43.0/Documentation/RelNotes/2.43.0.txt) (includes [2.42.0](https://github.com/git/git/blob/v2.42.0/Documentation/RelNotes/2.42.0.txt)))\n - iperf ([3.16](https://github.com/esnet/iperf/releases/tag/3.16))\n - keyutils ([1.6.3](https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=cb3bb194cca88211cbfcdde2f10c0f43c3fb8ec3) (includes [1.6.2](https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=454f80f537e5d1aad506599b6776e4cc1cf5f0f2)))\n - libuv ([1.47.0](https://github.com/libuv/libuv/releases/tag/v1.47.0))\n - runc ([1.1.12](https://github.com/opencontainers/runc/releases/tag/v1.1.12))\n - SDK: make ([4.4.1](https://lists.gnu.org/archive/html/info-gnu/2023-02/msg00011.html) (includes [4.4](https://lists.gnu.org/archive/html/help-make/2022-10/msg00020.html)))\n - SDK: portage ([3.0.61](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.61))\n\n _Changes since **Alpha 3874.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-52429](https://nvd.nist.gov/vuln/detail/CVE-2023-52429), [CVE-2024-1151](https://nvd.nist.gov/vuln/detail/CVE-2024-1151), [CVE-2024-23850](https://nvd.nist.gov/vuln/detail/CVE-2024-23850), [CVE-2024-23851](https://nvd.nist.gov/vuln/detail/CVE-2024-23851), [CVE-2024-26581](https://nvd.nist.gov/vuln/detail/CVE-2024-26581), [CVE-2024-26582](https://nvd.nist.gov/vuln/detail/CVE-2024-26582), [CVE-2024-26583](https://nvd.nist.gov/vuln/detail/CVE-2024-26583), [CVE-2024-26584](https://nvd.nist.gov/vuln/detail/CVE-2024-26584), [CVE-2024-26585](https://nvd.nist.gov/vuln/detail/CVE-2024-26585), [CVE-2024-26593](https://nvd.nist.gov/vuln/detail/CVE-2024-26593))\n \n #### Bug fixes:\n \n - Fixed that systemd-sysext images can extend directories where Flatcar extensions are also shipping files, e.g., that the sysext-bakery Kubernetes extension works when OEM extensions are present ([sysext-bakery#50](https://github.com/flatcar/sysext-bakery/issues/50))\n - Fixed kubevirt vm creation by ensuring that /dev/vhost-net exists ([Flatcar#1336](https://github.com/flatcar/Flatcar/issues/1336))\n - Resolved kmod static nodes creation in bootengine ([bootengine#85](https://github.com/flatcar/bootengine/pull/85))\n - Restored support for custom OEMs supplied in the PXE boot where `/usr/share/oem` brings the OEM partition contents ([Flatcar#1376](https://github.com/flatcar/Flatcar/issues/1376))\n \n #### Updates:\n \n - Linux ([6.6.21](https://lwn.net/Articles/964561) (includes [6.6.20](https://lwn.net/Articles/964307), [6.6.19](https://lwn.net/Articles/964173), [6.6.18](https://lwn.net/Articles/963357), [6.6.17](https://lwn.net/Articles/962558)))\n - ca-certificates ([3.98](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html))\n - keyutils ([1.6.3](https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=cb3bb194cca88211cbfcdde2f10c0f43c3fb8ec3) (includes [1.6.2](https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=454f80f537e5d1aad506599b6776e4cc1cf5f0f2)))"
  },
  "3913.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-04-16 11:56:20 +0000",
    "major_software": {
      "containerd": [
        "1.7.13"
      ],
      "docker": [
        "24.0.9"
      ],
      "ignition": [
        "2.18.0"
      ],
      "kernel": [
        "6.6.21"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": " _Changes since **Beta 3874.1.0**_\n \n #### Security fixes:\n \n - Downgraded xz-utils to 5.4.2 as precaution even though Flatcar is not affected of the SSH backdoor ([CVE-2024-3094](https://nvd.nist.gov/vuln/detail/CVE-2024-3094))\n - coreutils ([CVE-2024-0684](https://nvd.nist.gov/vuln/detail/CVE-2024-0684))\n - dnsmasq ([CVE-2023-28450](https://nvd.nist.gov/vuln/detail/CVE-2023-28450), [CVE-2023-50387](https://nvd.nist.gov/vuln/detail/CVE-2023-50387), [CVE-2023-50868](https://nvd.nist.gov/vuln/detail/CVE-2023-50868))\n - gcc ([CVE-2023-4039](https://nvd.nist.gov/vuln/detail/CVE-2023-4039))\n - glibc ([CVE-2023-5156](https://nvd.nist.gov/vuln/detail/CVE-2023-5156), [CVE-2023-6246](https://nvd.nist.gov/vuln/detail/CVE-2023-6246), [CVE-2023-6779](https://nvd.nist.gov/vuln/detail/CVE-2023-6779), [CVE-2023-6780](https://nvd.nist.gov/vuln/detail/CVE-2023-6780))\n - gnupg ([gnupg-2024-01-25](https://gnupg.org/blog/20240125-smartcard-backup-key.html))\n - gnutls ([CVE-2024-0567](https://nvd.nist.gov/vuln/detail/CVE-2024-0567), [CVE-2024-0553](https://nvd.nist.gov/vuln/detail/CVE-2024-0553))\n - libuv ([CVE-2024-24806](https://nvd.nist.gov/vuln/detail/CVE-2024-24806))\n - libxml2 ([CVE-2024-25062](https://nvd.nist.gov/vuln/detail/CVE-2024-25062))\n - openssl ([CVE-2023-5678](https://nvd.nist.gov/vuln/detail/CVE-2023-5678), [CVE-2023-6129](https://nvd.nist.gov/vuln/detail/CVE-2023-6129), [CVE-2023-6237](https://nvd.nist.gov/vuln/detail/CVE-2023-6237), [CVE-2024-0727](https://nvd.nist.gov/vuln/detail/CVE-2024-0727))\n - sudo ([CVE-2023-42465](https://nvd.nist.gov/vuln/detail/CVE-2023-42465))\n - vim ([CVE-2023-48231](https://nvd.nist.gov/vuln/detail/CVE-2023-48231), [CVE-2023-48232](https://nvd.nist.gov/vuln/detail/CVE-2023-48232), [CVE-2023-48233](https://nvd.nist.gov/vuln/detail/CVE-2023-48233), [CVE-2023-48234](https://nvd.nist.gov/vuln/detail/CVE-2023-48234), [CVE-2023-48235](https://nvd.nist.gov/vuln/detail/CVE-2023-48235), [CVE-2023-48236](https://nvd.nist.gov/vuln/detail/CVE-2023-48236), [CVE-2023-48237](https://nvd.nist.gov/vuln/detail/CVE-2023-48237), [CVE-2023-48706](https://nvd.nist.gov/vuln/detail/CVE-2023-48706))\n \n #### Bug fixes:\n \n - Disabled user-configdrive.service on OpenStack when config drive is used, which caused the hostname to be overwritten. The coreos-cloudinit.service unit already runs on OpenStack if the system is not configured via ignition. ([Flatcar#1385](https://github.com/flatcar/Flatcar/issues/1385))\n - Fixed `toolbox` to prevent mounted `ctr` snapshots from being garbage-collected ([toolbox#9](https://github.com/flatcar/toolbox/pull/9))\n - Removed custom CloudSigma coreos-cloudinit service configuration since it will be called with the cloudsigma oem anyway. The restart of the service can also cause the serial port to be stuck in an nondeterministic state which breaks future runs.\n \n #### Changes:\n \n - A new format `qemu_uefi_secure` is introduced to test Flatcar for SecureBoot-enabled features. The format will be later merged into `qemu_uefi`.\n - Added Ignition Clevis support for encrypted disks unlocked with a TPM2 device or a Tang server ([scripts#1560](https://github.com/flatcar/scripts/pull/1560))\n - Added Scaleway images ([flatcar/scripts#1683](https://github.com/flatcar/scripts/pull/1683))\n - Added support for unlocking the rootfs with a TPM set up by systemd-cryptenroll ([bootengine#93](https://github.com/flatcar/bootengine/pull/93))\n - Disabled real-time priority for multipathd as it prevents the cgroups2 cpu controller from working. ([flatcar/scripts#1771](https://github.com/flatcar/scripts/pull/1771))\n - Enabled the GRUB TPM2 module to measure the boot code path and files into PCR 8+9 in UEFI ([scripts#1861](https://github.com/flatcar/scripts/pull/1861))\n - Provided a ZFS-2.2.2 Flatcar extension as optional systemd-sysext image with the release. Write 'zfs' to `/etc/flatcar/enabled-sysext.conf` through Ignition and the sysext will be installed during provisioning. ZFS support is experimental and ZFS is not supported for the root partition. ([flatcar/scripts#1742](https://github.com/flatcar/scripts/pull/1742))\n - Removed Linux drivers for Mellanox Technologies Switch ASICs family and Spectrum/Spectrum-2/Spectrum-3/Spectrum-4 Ethernet Switch ASICs to reduce the initrd size on AMD64 by ~5MB ([flatcar/scripts#1734](https://github.com/flatcar/scripts/pull/1734)). This change is part of the effort to reduce the initrd size ([flatcar#1381](https://github.com/flatcar/Flatcar/issues/1381)).\n - Removed coreos-cloudinit support for automatic keys conversion (e.g `reboot-strategy` -> `reboot_strategy`) ([scripts#1687](https://github.com/flatcar/scripts/pull/1687))\n - SDK: Unified qemu image formats, so that the `qemu_uefi` build target provides the regular `qemu` and the `qemu_uefi_secure` artifacts ([scripts#1847](https://github.com/flatcar/scripts/pull/1847))\n \n #### Updates:\n \n - Go ([1.20.14](https://go.dev/doc/devel/release#go1.20.14))\n - Ignition ([2.18.0](https://coreos.github.io/ignition/release-notes/#ignition-2180-2024-03-01) (includes [2.17.0](https://coreos.github.io/ignition/release-notes/#ignition-2170-2023-11-20), [2.16.2](https://coreos.github.io/ignition/release-notes/#ignition-2162-2023-07-12), [2.16.1](https://coreos.github.io/ignition/release-notes/#ignition-2161-2023-07-10) and [2.16.0](https://coreos.github.io/ignition/release-notes/#ignition-2160-2023-06-29)))\n - Linux Firmware ([20240312](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240312) (includes [20240220](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240220)))\n - audit ([3.1.1](https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.1))\n - bind-tools ([9.16.48](https://bind9.readthedocs.io/en/v9.16.48/notes.html#notes-for-bind-9-16-48))\n - c-ares ([1.25.0](https://c-ares.org/changelog.html#1_25_0))\n - cJSON ([1.7.17](https://github.com/DaveGamble/cJSON/releases/tag/v1.7.17))\n - ca-certificates ([3.99](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_99.html))\n - checkpolicy ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6))\n - curl ([8.6.0](https://curl.se/changes.html#8_6_0))\n - ethtool ([6.6](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.6))\n - glibc ([2.38](https://sourceware.org/pipermail/libc-alpha/2023-July/150524.html))\n - gnupg ([2.4.4](https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000481.html) (includes [2.2.42](https://dev.gnupg.org/T6307)))\n - less ([643](https://www.greenwoodsoftware.com/less/news.643.html))\n - libbsd ([0.11.8](https://lists.freedesktop.org/archives/libbsd/2024-January/000377.html))\n - libcap-ng ([0.8.4](https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.4))\n - libgcrypt ([1.10.3](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=b767dc1170eb479b9a311cca4074c58e4eedaf0b;hb=aa1610866f8e42bdc272584f0a717f32ee050a22))\n - libidn2 ([2.3.7](https://gitlab.com/libidn/libidn2/-/blob/v2.3.7/NEWS) (includes https://gitlab.com/libidn/libidn2/-/releases/v2.3.4)))\n - libksba ([1.6.6](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=48b42025773e88fbb78d015d1f154fef4c80ef9f;hb=5b220df6f8216a9d5f6139c7b17f075374a27480))\n - libnvme ([1.7.1](https://github.com/linux-nvme/libnvme/releases/tag/v1.7.1) (includes [1.7](https://github.com/linux-nvme/libnvme/releases/tag/v1.7)))\n - libpsl ([0.21.5](https://github.com/rockdaboot/libpsl/blob/0.21.5/NEWS))\n - libseccomp ([2.5.5](https://github.com/seccomp/libseccomp/releases/tag/v2.5.5))\n - libselinux ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6))\n - libsemanage ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6))\n - libsepol ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6))\n - libuv ([1.48.0](https://github.com/libuv/libuv/releases/tag/v1.48.0))\n - libverto ([0.3.2](https://github.com/latchset/libverto/releases/tag/0.3.2))\n - libxml2 ([2.12.5](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.5) (includes [2.12.4](https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.12.4/NEWS)))\n - lsof ([4.99.3](https://github.com/lsof-org/lsof/releases/tag/4.99.3) (includes [4.99.2](https://github.com/lsof-org/lsof/releases/tag/4.99.2) and [4.99.1](https://github.com/lsof-org/lsof/releases/tag/4.99.1)))\n - mime-types ([2.1.54](https://pagure.io/mailcap/blob/9699055a1b4dfb90f7594ee2e8dda705fa56d3b8/f/NEWS))\n - multipath-tools ([0.9.7](https://github.com/opensvc/multipath-tools/commits/0.9.7))\n - nvme-cli ([2.7.1](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7.1) (includes [2.7](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7)))\n - openssl ([3.2.1](https://github.com/openssl/openssl/blob/openssl-3.2.1/CHANGES.md))\n - policycoreutils ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6))\n - semodule-utils ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6))\n - shim ([15.8](https://github.com/rhboot/shim/releases/tag/15.8))\n - sqlite ([3.45.1](https://www.sqlite.org/releaselog/3_45_1.html))\n - sudo ([1.9.15p5](https://www.sudo.ws/releases/stable/#1.9.15p5))\n - systemd ([255.3](https://github.com/systemd/systemd-stable/releases/tag/v255.3) (from 252.11))\n - thin-provisioning-tools ([1.0.10](https://github.com/jthornber/thin-provisioning-tools/commits/v1.0.10/))\n - traceroute ([2.1.5](https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.5/) (includes [2.1.4](https://sourceforge.net/projects/traceroute/files/traceroute/traceroute%202.1.4/)))\n - usbutils ([017](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v017))\n - util-linux ([2.39.3](https://github.com/util-linux/util-linux/blob/v2.39.3/Documentation/releases/v2.39.3-ReleaseNotes))\n - vim ([9.0.2167](https://github.com/vim/vim/commits/v9.0.2167/))\n - xmlsec ([1.3.3](https://github.com/lsh123/xmlsec/releases/tag/1.3.3))\n - SDK: python ([3.11.8](https://www.get-python.org/downloads/release/python-3118/))\n - SDK: qemu ([8.1.5](https://wiki.qemu.org/ChangeLog/8.1))\n - SDK: Rust ([1.76.0](https://github.com/rust-lang/rust/releases/tag/1.76.0))\n\n\n _Changes since **Alpha 3913.0.0**_\n \n #### Security fixes:\n \n - Downgraded xz-utils to 5.4.2 as precaution even though Flatcar is not affected of the SSH backdoor ([CVE-2024-3094](https://nvd.nist.gov/vuln/detail/CVE-2024-3094))\n \n #### Bug fixes:\n \n - Disabled user-configdrive.service on OpenStack when config drive is used, which caused the hostname to be overwritten. The coreos-cloudinit.service unit already runs on OpenStack if the system is not configured via ignition. ([Flatcar#1385](https://github.com/flatcar/Flatcar/issues/1385))\n - Fixed `toolbox` to prevent mounted `ctr` snapshots from being garbage-collected ([toolbox#9](https://github.com/flatcar/toolbox/pull/9))\n \n #### Changes:\n \n - Added support for unlocking the rootfs with a TPM set up by systemd-cryptenroll ([bootengine#93](https://github.com/flatcar/bootengine/pull/93))\n - Disabled real-time priority for multipathd as it prevents the cgroups2 cpu controller from working. ([scripts#1771](https://github.com/flatcar/scripts/pull/1771))\n - Enabled the GRUB TPM2 module to measure the boot code path and files into PCR 8+9 in UEFI ([scripts#1861](https://github.com/flatcar/scripts/pull/1861))\n - SDK: Unified qemu image formats, so that the `qemu_uefi` build target provides the regular `qemu` and the `qemu_uefi_secure` artifacts ([scripts#1847](https://github.com/flatcar/scripts/pull/1847))\n \n #### Updates:\n \n - ca-certificates ([3.99](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_99.html))\n"
  },
  "3941.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-05-22 13:39:58 +0000",
    "major_software": {
      "containerd": [
        "1.7.15"
      ],
      "docker": [
        "24.0.9"
      ],
      "ignition": [
        "2.18.0"
      ],
      "kernel": [
        "6.6.30"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "#### Beta 3941.1.0\n\n _Changes since **Beta 3913.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-28746](https://nvd.nist.gov/vuln/detail/CVE-2023-28746), [CVE-2023-47233](https://nvd.nist.gov/vuln/detail/CVE-2023-47233), [CVE-2023-52639](https://nvd.nist.gov/vuln/detail/CVE-2023-52639), [CVE-2023-6270](https://nvd.nist.gov/vuln/detail/CVE-2023-6270), [CVE-2023-7042](https://nvd.nist.gov/vuln/detail/CVE-2023-7042), [CVE-2024-22099](https://nvd.nist.gov/vuln/detail/CVE-2024-22099), [CVE-2024-23307](https://nvd.nist.gov/vuln/detail/CVE-2024-23307), [CVE-2024-24861](https://nvd.nist.gov/vuln/detail/CVE-2024-24861), [CVE-2024-26642](https://nvd.nist.gov/vuln/detail/CVE-2024-26642), [CVE-2024-26643](https://nvd.nist.gov/vuln/detail/CVE-2024-26643), [CVE-2024-26651](https://nvd.nist.gov/vuln/detail/CVE-2024-26651), [CVE-2024-26652](https://nvd.nist.gov/vuln/detail/CVE-2024-26652), [CVE-2024-26654](https://nvd.nist.gov/vuln/detail/CVE-2024-26654), [CVE-2024-26656](https://nvd.nist.gov/vuln/detail/CVE-2024-26656), [CVE-2024-26783](https://nvd.nist.gov/vuln/detail/CVE-2024-26783), [CVE-2024-26809](https://nvd.nist.gov/vuln/detail/CVE-2024-26809))\n - c-ares ([CVE-2024-25629](https://nvd.nist.gov/vuln/detail/CVE-2024-25629))\n - coreutils ([coreutils-2024-03-28](https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html))\n - curl ([CVE-2024-2004](https://nvd.nist.gov/vuln/detail/CVE-2024-2004), [CVE-2024-2379](https://nvd.nist.gov/vuln/detail/CVE-2024-2379), [CVE-2024-2398](https://nvd.nist.gov/vuln/detail/CVE-2024-2398), [CVE-2024-2466](https://nvd.nist.gov/vuln/detail/CVE-2024-2466))\n - glibc ([CVE-2024-2961](https://nvd.nist.gov/vuln/detail/CVE-2024-2961), [CVE-2024-33599](https://nvd.nist.gov/vuln/detail/CVE-2024-33599), [CVE-2024-33600](https://nvd.nist.gov/vuln/detail/CVE-2024-33600), [CVE-2024-33601](https://nvd.nist.gov/vuln/detail/CVE-2024-33601), [CVE-2024-33602](https://nvd.nist.gov/vuln/detail/CVE-2024-33602))\n - nghttp2 ([CVE-2024-28182](https://nvd.nist.gov/vuln/detail/CVE-2024-28182))\n \n #### Bug fixes:\n \n \n #### Changes:\n \n - Added zram-generator package to the image ([scripts#1772](https://github.com/flatcar/scripts/pull/1772))\n - Add Intel igc driver to support I225/I226 family NICs. ([scripts#1786](https://github.com/flatcar/scripts/pull/1786))\n - Added Hetzner images ([scripts#1880](https://github.com/flatcar/scripts/pull/1880))\n - Added Hyper-V VHDX image ([scripts#1791](https://github.com/flatcar/scripts/pull/1791))\n - Enabled amd-pstate,amd-pstate-epp cpufreq drivers for some AMD CPUs in the kernel. ([scripts#1770](https://github.com/flatcar/scripts/pull/1770))\n - Enabled ntpd by default on AWS & GCP, enabled chronyd by default on Azure. The native time sync source is used on each cloud. ([scripts#1792](https://github.com/flatcar/scripts/pull/1792))\n - Enabled the ptp_vmw module in the kernel.\n - Hyper-V images, both .vhd and .vhdx files are available as `zip` compressed, switching from `bzip2` to a built-in available Windows compression - `zip` ([scripts#1878](https://github.com/flatcar/scripts/pull/1878))\n - OpenStack, Brightbox: Added the `flatcar.autologin` kernel cmdline parameter by default as the hypervisor manages access to the console ([scripts#1866](https://github.com/flatcar/scripts/pull/1866))\n - Removed `actool` from the image and `acbuild` from the SDK as these tools are deprecated and not used ([scripts#1817](https://github.com/flatcar/scripts/pull/1817))\n - Scaleway: images are now provided directly as `.qcow2` to ease the import on Scaleway ([scripts#1953](https://github.com/flatcar/scripts/pull/1953))\n - Switched ptp_kvm from kernel builtin to module.\n - The default VM memory was bumped to 2 GB in the Qemu script and for VMware OVFs\n \n #### Updates:\n \n - Linux ([6.6.30](https://lwn.net/Articles/972211) (includes [6.6.29](https://lwn.net/Articles/971363), [6.6.28](https://lwn.net/Articles/970172), [6.6.27](https://lwn.net/Articles/969734), [6.6.26](https://lwn.net/Articles/969352), [6.6.25](https://lwn.net/Articles/968470), [6.6.24](https://lwn.net/Articles/968253), [6.6.23](https://lwn.net/Articles/966758), [6.6.22](https://lwn.net/Articles/965606)))\n - acl ([2.3.2](https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00012.html))\n - attr ([2.5.2](https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00011.html))\n - bpftool ([6.7.6](https://kernelnewbies.org/Linux_6.7#Tracing.2C_probing_and_BPF))\n - c-ares ([1.27.0](https://github.com/c-ares/c-ares/releases/tag/cares-1_27_0) (includes [1.26.0](https://github.com/c-ares/c-ares/releases/tag/cares-1_26_0)))\n - ca-certificates ([3.100](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_100.html) (includes [3.99](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_99.html)))\n - containerd ([1.7.15](https://github.com/containerd/containerd/releases/tag/v1.7.15) includes ([1.7.14](https://github.com/containerd/containerd/releases/tag/v1.7.14)))\n - coreutils ([9.5](https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html))\n - curl ([8.7.1](https://curl.se/changes.html#8_7_1) (includes [8.7.0](https://curl.se/changes.html#8_7_0)))\n - ethtool ([6.7](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.7))\n - git ([2.43.2](https://github.com/git/git/blob/v2.43.2/Documentation/RelNotes/2.43.2.txt))\n - inih ([58](https://github.com/benhoyt/inih/releases/tag/r58))\n - ipset ([7.21](https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.21) (includes [7.20](https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.20)))\n - iputils ([20240117](https://github.com/iputils/iputils/releases/tag/20240117) (includes [20231222](https://github.com/iputils/iputils/releases/tag/20231222))\n - libnvme ([1.8](https://github.com/linux-nvme/libnvme/releases/tag/v1.8))\n - nghttp2 ([1.61.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.61.0) (includes [1.58.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.58.0), [1.59.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.59.0) and [1.60.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.60.0)))\n - nvme-cli ([2.8](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.8))\n - open-vm-tools ([12.4.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.0))\n - samba ([4.18.9](https://www.samba.org/samba/history/samba-4.18.9.html))\n - selinux-refpolicy ([2.20240226](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240226))\n - SDK: libpng ([1.6.43](https://github.com/pnggroup/libpng/blob/v1.6.43/ANNOUNCE) (includes [1.6.42](https://github.com/pnggroup/libpng/blob/v1.6.42/ANNOUNCE) and [1.6.41](https://github.com/pnggroup/libpng/blob/v1.6.41/ANNOUNCE)))\n - SDK: Rust ([1.77.1](https://github.com/rust-lang/rust/releases/tag/1.77.1) (includes [1.77.0](https://github.com/rust-lang/rust/releases/tag/1.77.0)))\n\n _Changes since **Alpha 3941.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-28746](https://nvd.nist.gov/vuln/detail/CVE-2023-28746), [CVE-2023-47233](https://nvd.nist.gov/vuln/detail/CVE-2023-47233), [CVE-2023-52639](https://nvd.nist.gov/vuln/detail/CVE-2023-52639), [CVE-2023-6270](https://nvd.nist.gov/vuln/detail/CVE-2023-6270), [CVE-2023-7042](https://nvd.nist.gov/vuln/detail/CVE-2023-7042), [CVE-2024-22099](https://nvd.nist.gov/vuln/detail/CVE-2024-22099), [CVE-2024-23307](https://nvd.nist.gov/vuln/detail/CVE-2024-23307), [CVE-2024-24861](https://nvd.nist.gov/vuln/detail/CVE-2024-24861), [CVE-2024-26642](https://nvd.nist.gov/vuln/detail/CVE-2024-26642), [CVE-2024-26643](https://nvd.nist.gov/vuln/detail/CVE-2024-26643), [CVE-2024-26651](https://nvd.nist.gov/vuln/detail/CVE-2024-26651), [CVE-2024-26652](https://nvd.nist.gov/vuln/detail/CVE-2024-26652), [CVE-2024-26654](https://nvd.nist.gov/vuln/detail/CVE-2024-26654), [CVE-2024-26656](https://nvd.nist.gov/vuln/detail/CVE-2024-26656), [CVE-2024-26783](https://nvd.nist.gov/vuln/detail/CVE-2024-26783), [CVE-2024-26809](https://nvd.nist.gov/vuln/detail/CVE-2024-26809))\n - glibc ([CVE-2024-2961](https://nvd.nist.gov/vuln/detail/CVE-2024-2961), [CVE-2024-33599](https://nvd.nist.gov/vuln/detail/CVE-2024-33599), [CVE-2024-33600](https://nvd.nist.gov/vuln/detail/CVE-2024-33600), [CVE-2024-33601](https://nvd.nist.gov/vuln/detail/CVE-2024-33601), [CVE-2024-33602](https://nvd.nist.gov/vuln/detail/CVE-2024-33602))\n \n #### Bug fixes:\n \n \n #### Changes:\n \n - Added Hetzner images ([scripts#1880](https://github.com/flatcar/scripts/pull/1880))\n - Scaleway: images are now provided directly as `.qcow2` to ease the import on Scaleway ([scripts#1953](https://github.com/flatcar/scripts/pull/1953))\n \n #### Updates:\n \n - Linux ([6.6.30](https://lwn.net/Articles/972211) (includes [6.6.29](https://lwn.net/Articles/971363), [6.6.28](https://lwn.net/Articles/970172), [6.6.27](https://lwn.net/Articles/969734), [6.6.26](https://lwn.net/Articles/969352), [6.6.25](https://lwn.net/Articles/968470), [6.6.24](https://lwn.net/Articles/968253), [6.6.23](https://lwn.net/Articles/966758), [6.6.22](https://lwn.net/Articles/965606)))\n - ca-certificates ([3.100](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_100.html))\n"
  },
  "3975.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-06-26 13:04:36 +0000",
    "major_software": {
      "containerd": [
        "1.7.17"
      ],
      "docker": [
        "24.0.9"
      ],
      "ignition": [
        "2.18.0"
      ],
      "kernel": [
        "6.6.35"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": " _Changes since **Beta 3941.1.0**_\n \n #### Security fixes:\n \n - expat ([CVE-2023-52425](https://nvd.nist.gov/vuln/detail/CVE-2023-52425), [CVE-2024-28757](https://nvd.nist.gov/vuln/detail/CVE-2024-28757))\n - gnutls ([CVE-2024-28834](https://nvd.nist.gov/vuln/detail/CVE-2024-28834), [CVE-2024-28835](https://nvd.nist.gov/vuln/detail/CVE-2024-28835))\n - intel-microcode ([CVE-2023-22655](https://nvd.nist.gov/vuln/detail/CVE-2023-22655), [CVE-2023-28746](https://nvd.nist.gov/vuln/detail/CVE-2023-28746), [CVE-2023-38575](https://nvd.nist.gov/vuln/detail/CVE-2023-38575), [CVE-2023-39368](https://nvd.nist.gov/vuln/detail/CVE-2023-39368), [CVE-2023-43490](https://nvd.nist.gov/vuln/detail/CVE-2023-43490))\n - less ([CVE-2024-32487](https://nvd.nist.gov/vuln/detail/CVE-2024-32487))\n - SDK: python ([CVE-2023-6597](https://nvd.nist.gov/vuln/detail/CVE-2023-6597), [CVE-2024-0450](https://nvd.nist.gov/vuln/detail/CVE-2024-0450), [gh-81194](https://github.com/python/cpython/issues/81194), [gh-113659](https://github.com/python/cpython/issues/113659), [gh-102388](https://github.com/python/cpython/issues/102388), [gh-114572](https://github.com/python/cpython/issues/114572), [gh-115243](https://github.com/python/cpython/issues/115243))\n \n #### Bug fixes:\n \n - Fixed issue file generation from `/etc/issue.d` ([scripts#2018](https://github.com/flatcar/scripts/pull/2018))\n \n #### Changes:\n \n - Added KubeVirt qcow2 image for amd64/arm64 ([flatcar/scripts#1962](https://github.com/flatcar/scripts/pull/1962))\n - Added azure-nvme-utils to the image, which is used by udev to create symlinks for NVMe disks on Azure v6 instances under /dev/disk/azure/. ([scripts#1950](https://github.com/flatcar/scripts/pull/1950))\n - Backported systemd-sysext mutable overlays functionality from yet-unreleased systemd v256. ([flatcar/scripts#1753](https://github.com/flatcar/scripts/pull/1753))\n - Provided a Podman Flatcar extension as optional systemd-sysext image with the release. Write 'podman' to `/etc/flatcar/enabled-sysext.conf` through Ignition and the sysext will be installed during provisioning ([scripts#1964](https://github.com/flatcar/scripts/pull/1964))\n - OpenStack: Changed metadata hostname source order. The service first tries with the config drive then fallback on the metadata service. ([bootengine#96](https://github.com/flatcar/bootengine/pull/96))\n \n #### Updates:\n \n - Linux ([6.6.35](https://lwn.net/Articles/979262) (includes [6.6.34](https://lwn.net/Articles/978593), [6.6.33](https://lwn.net/Articles/978141), [6.6.32](https://lwn.net/Articles/975075) and [6.6.31](https://lwn.net/Articles/974072)))\n - Linux Firmware ([20240513](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240513))\n - Rust ([1.77.2](https://github.com/rust-lang/rust/releases/tag/1.77.2))\n - ca-certificates ([3.101](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101.html))\n - containerd ([1.7.17](https://github.com/containerd/containerd/releases/tag/v1.7.17) (includes [1.7.16](https://github.com/containerd/containerd/releases/tag/v1.7.16)))\n - expat ([2.6.2](https://github.com/libexpat/libexpat/blob/R_2_6_2/expat/Changes) (includes [2.6.1](https://github.com/libexpat/libexpat/blob/R_2_6_1/expat/Changes) and [2.6.0](https://github.com/libexpat/libexpat/blob/R_2_6_0/expat/Changes)))\n - gnutls ([3.8.5](https://lists.gnupg.org/pipermail/gnutls-help/2024-April/004846.html) (includes [3.8.4](https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html)))\n - intel-microcode ([20240312](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312))\n - libunistring ([1.2](https://savannah.gnu.org/news/?id=10599))\n - systemd ([255.4](https://github.com/systemd/systemd-stable/commits/v255.4/))\n - SDK: python ([3.11.9](https://www.get-python.org/downloads/release/python-3119/))\n\n\n _Changes since **Alpha 3975.0.0**_\n  \n \n #### Bug fixes:\n \n - Fixed issue file generation from `/etc/issue.d` ([scripts#2018](https://github.com/flatcar/scripts/pull/2018))\n \n #### Changes:\n \n - OpenStack: Changed metadata hostname source order. The service first tries with the config drive then fallback on the metadata service. ([bootengine#96](https://github.com/flatcar/bootengine/pull/96))\n \n #### Updates:\n \n - Linux ([6.6.35](https://lwn.net/Articles/979262) (includes [6.6.34](https://lwn.net/Articles/978593), [6.6.33](https://lwn.net/Articles/978141), [6.6.32](https://lwn.net/Articles/975075) and [6.6.31](https://lwn.net/Articles/974072)))\n - ca-certificates ([3.101](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101.html))\n"
  },
  "3975.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-07-02 13:35:08 +0000",
    "major_software": {
      "containerd": [
        "1.7.17"
      ],
      "docker": [
        "24.0.9"
      ],
      "ignition": [
        "2.18.0"
      ],
      "kernel": [
        "6.6.36"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": " _Changes since **Beta 3975.1.0**_\n \n #### Security fixes:\n \n - openssh ([CVE-2024-6387](https://nvd.nist.gov/vuln/detail/CVE-2024-6387))\n \n #### Updates:\n \n - Linux ([6.6.36](https://lwn.net/Articles/979850))\n - openssh ([9.7_p1](https://www.openssh.com/txt/release-9.7))"
  },
  "4012.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-08-07 10:55:03 +0000",
    "major_software": {
      "containerd": [
        "1.7.18"
      ],
      "docker": [
        "24.0.9"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.43"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "_Changes since **Beta 3975.1.1**_\n\n##### Security fixes:\n\n- Linux ([CVE-2024-42098](https://nvd.nist.gov/vuln/detail/CVE-2024-42098), [CVE-2024-42097](https://nvd.nist.gov/vuln/detail/CVE-2024-42097), [CVE-2024-42096](https://nvd.nist.gov/vuln/detail/CVE-2024-42096), [CVE-2024-42095](https://nvd.nist.gov/vuln/detail/CVE-2024-42095), [CVE-2024-42093](https://nvd.nist.gov/vuln/detail/CVE-2024-42093), [CVE-2024-42094](https://nvd.nist.gov/vuln/detail/CVE-2024-42094), [CVE-2024-42092](https://nvd.nist.gov/vuln/detail/CVE-2024-42092), [CVE-2024-42090](https://nvd.nist.gov/vuln/detail/CVE-2024-42090), [CVE-2024-42089](https://nvd.nist.gov/vuln/detail/CVE-2024-42089), [CVE-2024-42087](https://nvd.nist.gov/vuln/detail/CVE-2024-42087), [CVE-2024-42086](https://nvd.nist.gov/vuln/detail/CVE-2024-42086), [CVE-2024-42084](https://nvd.nist.gov/vuln/detail/CVE-2024-42084), [CVE-2024-42085](https://nvd.nist.gov/vuln/detail/CVE-2024-42085), [CVE-2024-42070](https://nvd.nist.gov/vuln/detail/CVE-2024-42070), [CVE-2024-42069](https://nvd.nist.gov/vuln/detail/CVE-2024-42069), [CVE-2024-42068](https://nvd.nist.gov/vuln/detail/CVE-2024-42068), [CVE-2024-42067](https://nvd.nist.gov/vuln/detail/CVE-2024-42067), [CVE-2024-42082](https://nvd.nist.gov/vuln/detail/CVE-2024-42082), [CVE-2024-42080](https://nvd.nist.gov/vuln/detail/CVE-2024-42080), [CVE-2024-42079](https://nvd.nist.gov/vuln/detail/CVE-2024-42079), [CVE-2024-42077](https://nvd.nist.gov/vuln/detail/CVE-2024-42077), [CVE-2024-42076](https://nvd.nist.gov/vuln/detail/CVE-2024-42076), [CVE-2024-42074](https://nvd.nist.gov/vuln/detail/CVE-2024-42074), [CVE-2024-42073](https://nvd.nist.gov/vuln/detail/CVE-2024-42073), [CVE-2023-52887](https://nvd.nist.gov/vuln/detail/CVE-2023-52887), [CVE-2024-42063](https://nvd.nist.gov/vuln/detail/CVE-2024-42063), [CVE-2024-41094](https://nvd.nist.gov/vuln/detail/CVE-2024-41094), [CVE-2024-41093](https://nvd.nist.gov/vuln/detail/CVE-2024-41093), [CVE-2024-41092](https://nvd.nist.gov/vuln/detail/CVE-2024-41092), [CVE-2024-41089](https://nvd.nist.gov/vuln/detail/CVE-2024-41089), [CVE-2024-41088](https://nvd.nist.gov/vuln/detail/CVE-2024-41088), [CVE-2024-41087](https://nvd.nist.gov/vuln/detail/CVE-2024-41087), [CVE-2024-41098](https://nvd.nist.gov/vuln/detail/CVE-2024-41098), [CVE-2024-41097](https://nvd.nist.gov/vuln/detail/CVE-2024-41097), [CVE-2024-41096](https://nvd.nist.gov/vuln/detail/CVE-2024-41096), [CVE-2024-41095](https://nvd.nist.gov/vuln/detail/CVE-2024-41095), [CVE-2024-41084](https://nvd.nist.gov/vuln/detail/CVE-2024-41084), [CVE-2024-41009](https://nvd.nist.gov/vuln/detail/CVE-2024-41009), [CVE-2024-39486](https://nvd.nist.gov/vuln/detail/CVE-2024-39486), [CVE-2024-42068](https://nvd.nist.gov/vuln/detail/CVE-2024-42068), [CVE-2024-42067](https://nvd.nist.gov/vuln/detail/CVE-2024-42067), [CVE-2024-42145](https://nvd.nist.gov/vuln/detail/CVE-2024-42145), [CVE-2024-42154](https://nvd.nist.gov/vuln/detail/CVE-2024-42154), [CVE-2024-42153](https://nvd.nist.gov/vuln/detail/CVE-2024-42153), [CVE-2024-42152](https://nvd.nist.gov/vuln/detail/CVE-2024-42152), [CVE-2024-42148](https://nvd.nist.gov/vuln/detail/CVE-2024-42148), [CVE-2024-42230](https://nvd.nist.gov/vuln/detail/CVE-2024-42230), [CVE-2024-42229](https://nvd.nist.gov/vuln/detail/CVE-2024-42229), [CVE-2024-42228](https://nvd.nist.gov/vuln/detail/CVE-2024-42228), [CVE-2024-42226](https://nvd.nist.gov/vuln/detail/CVE-2024-42226), [CVE-2024-42225](https://nvd.nist.gov/vuln/detail/CVE-2024-42225), [CVE-2024-42147](https://nvd.nist.gov/vuln/detail/CVE-2024-42147), [CVE-2024-42224](https://nvd.nist.gov/vuln/detail/CVE-2024-42224), [CVE-2024-42223](https://nvd.nist.gov/vuln/detail/CVE-2024-42223), [CVE-2024-42161](https://nvd.nist.gov/vuln/detail/CVE-2024-42161), [CVE-2024-42160](https://nvd.nist.gov/vuln/detail/CVE-2024-42160), [CVE-2024-42159](https://nvd.nist.gov/vuln/detail/CVE-2024-42159), [CVE-2024-42157](https://nvd.nist.gov/vuln/detail/CVE-2024-42157), [CVE-2024-42110](https://nvd.nist.gov/vuln/detail/CVE-2024-42110), [CVE-2024-42119](https://nvd.nist.gov/vuln/detail/CVE-2024-42119), [CVE-2024-42116](https://nvd.nist.gov/vuln/detail/CVE-2024-42116), [CVE-2024-42115](https://nvd.nist.gov/vuln/detail/CVE-2024-42115), [CVE-2024-42144](https://nvd.nist.gov/vuln/detail/CVE-2024-42144), [CVE-2024-42143](https://nvd.nist.gov/vuln/detail/CVE-2024-42143), [CVE-2024-42142](https://nvd.nist.gov/vuln/detail/CVE-2024-42142), [CVE-2024-42141](https://nvd.nist.gov/vuln/detail/CVE-2024-42141), [CVE-2024-42140](https://nvd.nist.gov/vuln/detail/CVE-2024-42140), [CVE-2024-42113](https://nvd.nist.gov/vuln/detail/CVE-2024-42113), [CVE-2024-42138](https://nvd.nist.gov/vuln/detail/CVE-2024-42138), [CVE-2024-42137](https://nvd.nist.gov/vuln/detail/CVE-2024-42137), [CVE-2024-42136](https://nvd.nist.gov/vuln/detail/CVE-2024-42136), [CVE-2024-42135](https://nvd.nist.gov/vuln/detail/CVE-2024-42135), [CVE-2024-42133](https://nvd.nist.gov/vuln/detail/CVE-2024-42133), [CVE-2024-42132](https://nvd.nist.gov/vuln/detail/CVE-2024-42132), [CVE-2024-42131](https://nvd.nist.gov/vuln/detail/CVE-2024-42131), [CVE-2024-42130](https://nvd.nist.gov/vuln/detail/CVE-2024-42130), [CVE-2024-42128](https://nvd.nist.gov/vuln/detail/CVE-2024-42128), [CVE-2024-42127](https://nvd.nist.gov/vuln/detail/CVE-2024-42127), [CVE-2024-42126](https://nvd.nist.gov/vuln/detail/CVE-2024-42126), [CVE-2024-42124](https://nvd.nist.gov/vuln/detail/CVE-2024-42124), [CVE-2024-42121](https://nvd.nist.gov/vuln/detail/CVE-2024-42121), [CVE-2024-42120](https://nvd.nist.gov/vuln/detail/CVE-2024-42120), [CVE-2023-52888](https://nvd.nist.gov/vuln/detail/CVE-2023-52888), [CVE-2024-42106](https://nvd.nist.gov/vuln/detail/CVE-2024-42106), [CVE-2024-42105](https://nvd.nist.gov/vuln/detail/CVE-2024-42105), [CVE-2024-42104](https://nvd.nist.gov/vuln/detail/CVE-2024-42104), [CVE-2024-42103](https://nvd.nist.gov/vuln/detail/CVE-2024-42103), [CVE-2024-42102](https://nvd.nist.gov/vuln/detail/CVE-2024-42102), [CVE-2024-42101](https://nvd.nist.gov/vuln/detail/CVE-2024-42101), [CVE-2024-42100](https://nvd.nist.gov/vuln/detail/CVE-2024-42100), [CVE-2024-42109](https://nvd.nist.gov/vuln/detail/CVE-2024-42109), [CVE-2024-40947](https://nvd.nist.gov/vuln/detail/CVE-2024-40947), [CVE-2024-41056](https://nvd.nist.gov/vuln/detail/CVE-2024-41056), [CVE-2024-41053](https://nvd.nist.gov/vuln/detail/CVE-2024-41053), [CVE-2024-41055](https://nvd.nist.gov/vuln/detail/CVE-2024-41055), [CVE-2024-41054](https://nvd.nist.gov/vuln/detail/CVE-2024-41054), [CVE-2024-41032](https://nvd.nist.gov/vuln/detail/CVE-2024-41032), [CVE-2024-41031](https://nvd.nist.gov/vuln/detail/CVE-2024-41031), [CVE-2024-41030](https://nvd.nist.gov/vuln/detail/CVE-2024-41030), [CVE-2024-41028](https://nvd.nist.gov/vuln/detail/CVE-2024-41028), [CVE-2024-41027](https://nvd.nist.gov/vuln/detail/CVE-2024-41027), [CVE-2024-41052](https://nvd.nist.gov/vuln/detail/CVE-2024-41052), [CVE-2024-41051](https://nvd.nist.gov/vuln/detail/CVE-2024-41051), [CVE-2024-41050](https://nvd.nist.gov/vuln/detail/CVE-2024-41050), [CVE-2024-41049](https://nvd.nist.gov/vuln/detail/CVE-2024-41049), [CVE-2024-41048](https://nvd.nist.gov/vuln/detail/CVE-2024-41048), [CVE-2024-41047](https://nvd.nist.gov/vuln/detail/CVE-2024-41047), [CVE-2024-41046](https://nvd.nist.gov/vuln/detail/CVE-2024-41046), [CVE-2024-41044](https://nvd.nist.gov/vuln/detail/CVE-2024-41044), [CVE-2024-41025](https://nvd.nist.gov/vuln/detail/CVE-2024-41025), [CVE-2024-41041](https://nvd.nist.gov/vuln/detail/CVE-2024-41041), [CVE-2024-41040](https://nvd.nist.gov/vuln/detail/CVE-2024-41040), [CVE-2024-41039](https://nvd.nist.gov/vuln/detail/CVE-2024-41039), [CVE-2024-41038](https://nvd.nist.gov/vuln/detail/CVE-2024-41038), [CVE-2024-41037](https://nvd.nist.gov/vuln/detail/CVE-2024-41037), [CVE-2024-41036](https://nvd.nist.gov/vuln/detail/CVE-2024-41036), [CVE-2024-41035](https://nvd.nist.gov/vuln/detail/CVE-2024-41035), [CVE-2024-41034](https://nvd.nist.gov/vuln/detail/CVE-2024-41034), [CVE-2024-41024](https://nvd.nist.gov/vuln/detail/CVE-2024-41024), [CVE-2024-41081](https://nvd.nist.gov/vuln/detail/CVE-2024-41081), [CVE-2024-41078](https://nvd.nist.gov/vuln/detail/CVE-2024-41078), [CVE-2024-41079](https://nvd.nist.gov/vuln/detail/CVE-2024-41079), [CVE-2024-41076](https://nvd.nist.gov/vuln/detail/CVE-2024-41076), [CVE-2024-41075](https://nvd.nist.gov/vuln/detail/CVE-2024-41075), [CVE-2024-41074](https://nvd.nist.gov/vuln/detail/CVE-2024-41074), [CVE-2024-41073](https://nvd.nist.gov/vuln/detail/CVE-2024-41073), [CVE-2024-41072](https://nvd.nist.gov/vuln/detail/CVE-2024-41072), [CVE-2024-41070](https://nvd.nist.gov/vuln/detail/CVE-2024-41070), [CVE-2024-41069](https://nvd.nist.gov/vuln/detail/CVE-2024-41069), [CVE-2024-41077](https://nvd.nist.gov/vuln/detail/CVE-2024-41077), [CVE-2024-41068](https://nvd.nist.gov/vuln/detail/CVE-2024-41068), [CVE-2024-41066](https://nvd.nist.gov/vuln/detail/CVE-2024-41066), [CVE-2024-41065](https://nvd.nist.gov/vuln/detail/CVE-2024-41065), [CVE-2024-41064](https://nvd.nist.gov/vuln/detail/CVE-2024-41064), [CVE-2024-41063](https://nvd.nist.gov/vuln/detail/CVE-2024-41063), [CVE-2024-41062](https://nvd.nist.gov/vuln/detail/CVE-2024-41062), [CVE-2024-41060](https://nvd.nist.gov/vuln/detail/CVE-2024-41060), [CVE-2024-41059](https://nvd.nist.gov/vuln/detail/CVE-2024-41059), [CVE-2024-41057](https://nvd.nist.gov/vuln/detail/CVE-2024-41057), [CVE-2024-41058](https://nvd.nist.gov/vuln/detail/CVE-2024-41058), [CVE-2024-41022](https://nvd.nist.gov/vuln/detail/CVE-2024-41022), [CVE-2024-41020](https://nvd.nist.gov/vuln/detail/CVE-2024-41020), [CVE-2024-41019](https://nvd.nist.gov/vuln/detail/CVE-2024-41019), [CVE-2024-41018](https://nvd.nist.gov/vuln/detail/CVE-2024-41018), [CVE-2024-41017](https://nvd.nist.gov/vuln/detail/CVE-2024-41017), [CVE-2024-41015](https://nvd.nist.gov/vuln/detail/CVE-2024-41015), [CVE-2024-41090](https://nvd.nist.gov/vuln/detail/CVE-2024-41090), [CVE-2024-41091](https://nvd.nist.gov/vuln/detail/CVE-2024-41091), [CVE-2024-36977](https://nvd.nist.gov/vuln/detail/CVE-2024-36977), [CVE-2024-36975](https://nvd.nist.gov/vuln/detail/CVE-2024-36975), [CVE-2024-36969](https://nvd.nist.gov/vuln/detail/CVE-2024-36969), [CVE-2024-36968](https://nvd.nist.gov/vuln/detail/CVE-2024-36968), [CVE-2024-36967](https://nvd.nist.gov/vuln/detail/CVE-2024-36967), [CVE-2024-36965](https://nvd.nist.gov/vuln/detail/CVE-2024-36965), [CVE-2024-36966](https://nvd.nist.gov/vuln/detail/CVE-2024-36966), [CVE-2024-41011](https://nvd.nist.gov/vuln/detail/CVE-2024-41011), [CVE-2024-36964](https://nvd.nist.gov/vuln/detail/CVE-2024-36964), [CVE-2024-36963](https://nvd.nist.gov/vuln/detail/CVE-2024-36963), [CVE-2024-36962](https://nvd.nist.gov/vuln/detail/CVE-2024-36962), [CVE-2024-36960](https://nvd.nist.gov/vuln/detail/CVE-2024-36960), [CVE-2024-36942](https://nvd.nist.gov/vuln/detail/CVE-2024-36942), [CVE-2024-36951](https://nvd.nist.gov/vuln/detail/CVE-2024-36951), [CVE-2024-36950](https://nvd.nist.gov/vuln/detail/CVE-2024-36950), [CVE-2024-36949](https://nvd.nist.gov/vuln/detail/CVE-2024-36949), [CVE-2024-36947](https://nvd.nist.gov/vuln/detail/CVE-2024-36947), [CVE-2024-36946](https://nvd.nist.gov/vuln/detail/CVE-2024-36946), [CVE-2024-36945](https://nvd.nist.gov/vuln/detail/CVE-2024-36945), [CVE-2024-36944](https://nvd.nist.gov/vuln/detail/CVE-2024-36944), [CVE-2024-36959](https://nvd.nist.gov/vuln/detail/CVE-2024-36959), [CVE-2024-36957](https://nvd.nist.gov/vuln/detail/CVE-2024-36957), [CVE-2024-36955](https://nvd.nist.gov/vuln/detail/CVE-2024-36955), [CVE-2024-36954](https://nvd.nist.gov/vuln/detail/CVE-2024-36954), [CVE-2024-36953](https://nvd.nist.gov/vuln/detail/CVE-2024-36953), [CVE-2024-36952](https://nvd.nist.gov/vuln/detail/CVE-2024-36952), [CVE-2024-36916](https://nvd.nist.gov/vuln/detail/CVE-2024-36916), [CVE-2024-36914](https://nvd.nist.gov/vuln/detail/CVE-2024-36914), [CVE-2024-36913](https://nvd.nist.gov/vuln/detail/CVE-2024-36913), [CVE-2024-36912](https://nvd.nist.gov/vuln/detail/CVE-2024-36912), [CVE-2024-36911](https://nvd.nist.gov/vuln/detail/CVE-2024-36911), [CVE-2024-36941](https://nvd.nist.gov/vuln/detail/CVE-2024-36941), [CVE-2024-36940](https://nvd.nist.gov/vuln/detail/CVE-2024-36940), [CVE-2024-36939](https://nvd.nist.gov/vuln/detail/CVE-2024-36939), [CVE-2024-36938](https://nvd.nist.gov/vuln/detail/CVE-2024-36938), [CVE-2024-36937](https://nvd.nist.gov/vuln/detail/CVE-2024-36937), [CVE-2024-36910](https://nvd.nist.gov/vuln/detail/CVE-2024-36910), [CVE-2024-36934](https://nvd.nist.gov/vuln/detail/CVE-2024-36934), [CVE-2024-36933](https://nvd.nist.gov/vuln/detail/CVE-2024-36933), [CVE-2024-36931](https://nvd.nist.gov/vuln/detail/CVE-2024-36931), [CVE-2024-36930](https://nvd.nist.gov/vuln/detail/CVE-2024-36930), [CVE-2024-36929](https://nvd.nist.gov/vuln/detail/CVE-2024-36929), [CVE-2024-36928](https://nvd.nist.gov/vuln/detail/CVE-2024-36928), [CVE-2024-36927](https://nvd.nist.gov/vuln/detail/CVE-2024-36927), [CVE-2024-36909](https://nvd.nist.gov/vuln/detail/CVE-2024-36909), [CVE-2024-36926](https://nvd.nist.gov/vuln/detail/CVE-2024-36926), [CVE-2024-36925](https://nvd.nist.gov/vuln/detail/CVE-2024-36925), [CVE-2024-36924](https://nvd.nist.gov/vuln/detail/CVE-2024-36924), [CVE-2024-36922](https://nvd.nist.gov/vuln/detail/CVE-2024-36922), [CVE-2024-36921](https://nvd.nist.gov/vuln/detail/CVE-2024-36921), [CVE-2024-36920](https://nvd.nist.gov/vuln/detail/CVE-2024-36920), [CVE-2024-36919](https://nvd.nist.gov/vuln/detail/CVE-2024-36919), [CVE-2024-36918](https://nvd.nist.gov/vuln/detail/CVE-2024-36918), [CVE-2024-36917](https://nvd.nist.gov/vuln/detail/CVE-2024-36917), [CVE-2024-36908](https://nvd.nist.gov/vuln/detail/CVE-2024-36908), [CVE-2024-36880](https://nvd.nist.gov/vuln/detail/CVE-2024-36880), [CVE-2024-36889](https://nvd.nist.gov/vuln/detail/CVE-2024-36889), [CVE-2024-36888](https://nvd.nist.gov/vuln/detail/CVE-2024-36888), [CVE-2024-36887](https://nvd.nist.gov/vuln/detail/CVE-2024-36887), [CVE-2024-36886](https://nvd.nist.gov/vuln/detail/CVE-2024-36886), [CVE-2024-36885](https://nvd.nist.gov/vuln/detail/CVE-2024-36885), [CVE-2024-36883](https://nvd.nist.gov/vuln/detail/CVE-2024-36883), [CVE-2024-36906](https://nvd.nist.gov/vuln/detail/CVE-2024-36906), [CVE-2024-36905](https://nvd.nist.gov/vuln/detail/CVE-2024-36905), [CVE-2024-36904](https://nvd.nist.gov/vuln/detail/CVE-2024-36904), [CVE-2024-36903](https://nvd.nist.gov/vuln/detail/CVE-2024-36903), [CVE-2024-36902](https://nvd.nist.gov/vuln/detail/CVE-2024-36902), [CVE-2024-36901](https://nvd.nist.gov/vuln/detail/CVE-2024-36901), [CVE-2024-36900](https://nvd.nist.gov/vuln/detail/CVE-2024-36900), [CVE-2024-36882](https://nvd.nist.gov/vuln/detail/CVE-2024-36882), [CVE-2024-36899](https://nvd.nist.gov/vuln/detail/CVE-2024-36899), [CVE-2024-36898](https://nvd.nist.gov/vuln/detail/CVE-2024-36898), [CVE-2024-36897](https://nvd.nist.gov/vuln/detail/CVE-2024-36897), [CVE-2024-36896](https://nvd.nist.gov/vuln/detail/CVE-2024-36896), [CVE-2024-36895](https://nvd.nist.gov/vuln/detail/CVE-2024-36895), [CVE-2024-36894](https://nvd.nist.gov/vuln/detail/CVE-2024-36894), [CVE-2024-36893](https://nvd.nist.gov/vuln/detail/CVE-2024-36893), [CVE-2024-36891](https://nvd.nist.gov/vuln/detail/CVE-2024-36891), [CVE-2024-36890](https://nvd.nist.gov/vuln/detail/CVE-2024-36890), [CVE-2024-36881](https://nvd.nist.gov/vuln/detail/CVE-2024-36881), [CVE-2024-36032](https://nvd.nist.gov/vuln/detail/CVE-2024-36032), [CVE-2023-52882](https://nvd.nist.gov/vuln/detail/CVE-2023-52882), [CVE-2024-36031](https://nvd.nist.gov/vuln/detail/CVE-2024-36031), [CVE-2024-36028](https://nvd.nist.gov/vuln/detail/CVE-2024-36028), [CVE-2024-36017](https://nvd.nist.gov/vuln/detail/CVE-2024-36017), [CVE-2024-36011](https://nvd.nist.gov/vuln/detail/CVE-2024-36011), [CVE-2024-36012](https://nvd.nist.gov/vuln/detail/CVE-2024-36012), [CVE-2024-35947](https://nvd.nist.gov/vuln/detail/CVE-2024-35947), [CVE-2024-35848](https://nvd.nist.gov/vuln/detail/CVE-2024-35848), [CVE-2024-41006](https://nvd.nist.gov/vuln/detail/CVE-2024-41006), [CVE-2024-41005](https://nvd.nist.gov/vuln/detail/CVE-2024-41005), [CVE-2024-41004](https://nvd.nist.gov/vuln/detail/CVE-2024-41004), [CVE-2024-40996](https://nvd.nist.gov/vuln/detail/CVE-2024-40996), [CVE-2024-41002](https://nvd.nist.gov/vuln/detail/CVE-2024-41002), [CVE-2024-41001](https://nvd.nist.gov/vuln/detail/CVE-2024-41001), [CVE-2024-41000](https://nvd.nist.gov/vuln/detail/CVE-2024-41000), [CVE-2024-40998](https://nvd.nist.gov/vuln/detail/CVE-2024-40998), [CVE-2024-40997](https://nvd.nist.gov/vuln/detail/CVE-2024-40997), [CVE-2024-40994](https://nvd.nist.gov/vuln/detail/CVE-2024-40994), [CVE-2024-40993](https://nvd.nist.gov/vuln/detail/CVE-2024-40993), [CVE-2024-40992](https://nvd.nist.gov/vuln/detail/CVE-2024-40992), [CVE-2024-40990](https://nvd.nist.gov/vuln/detail/CVE-2024-40990), [CVE-2024-40989](https://nvd.nist.gov/vuln/detail/CVE-2024-40989), [CVE-2024-40988](https://nvd.nist.gov/vuln/detail/CVE-2024-40988), [CVE-2024-40987](https://nvd.nist.gov/vuln/detail/CVE-2024-40987), [CVE-2024-40995](https://nvd.nist.gov/vuln/detail/CVE-2024-40995), [CVE-2024-40983](https://nvd.nist.gov/vuln/detail/CVE-2024-40983), [CVE-2024-40984](https://nvd.nist.gov/vuln/detail/CVE-2024-40984), [CVE-2024-40970](https://nvd.nist.gov/vuln/detail/CVE-2024-40970), [CVE-2024-40978](https://nvd.nist.gov/vuln/detail/CVE-2024-40978), [CVE-2024-40977](https://nvd.nist.gov/vuln/detail/CVE-2024-40977), [CVE-2024-40976](https://nvd.nist.gov/vuln/detail/CVE-2024-40976), [CVE-2024-40974](https://nvd.nist.gov/vuln/detail/CVE-2024-40974), [CVE-2024-40973](https://nvd.nist.gov/vuln/detail/CVE-2024-40973), [CVE-2024-40982](https://nvd.nist.gov/vuln/detail/CVE-2024-40982), [CVE-2024-40981](https://nvd.nist.gov/vuln/detail/CVE-2024-40981), [CVE-2024-40980](https://nvd.nist.gov/vuln/detail/CVE-2024-40980), [CVE-2024-40971](https://nvd.nist.gov/vuln/detail/CVE-2024-40971), [CVE-2024-40955](https://nvd.nist.gov/vuln/detail/CVE-2024-40955), [CVE-2024-40954](https://nvd.nist.gov/vuln/detail/CVE-2024-40954), [CVE-2024-40953](https://nvd.nist.gov/vuln/detail/CVE-2024-40953), [CVE-2024-40952](https://nvd.nist.gov/vuln/detail/CVE-2024-40952), [CVE-2024-40951](https://nvd.nist.gov/vuln/detail/CVE-2024-40951), [CVE-2024-40969](https://nvd.nist.gov/vuln/detail/CVE-2024-40969), [CVE-2024-40968](https://nvd.nist.gov/vuln/detail/CVE-2024-40968), [CVE-2024-40967](https://nvd.nist.gov/vuln/detail/CVE-2024-40967), [CVE-2024-40966](https://nvd.nist.gov/vuln/detail/CVE-2024-40966), [CVE-2024-40948](https://nvd.nist.gov/vuln/detail/CVE-2024-40948), [CVE-2024-40964](https://nvd.nist.gov/vuln/detail/CVE-2024-40964), [CVE-2024-40963](https://nvd.nist.gov/vuln/detail/CVE-2024-40963), [CVE-2024-40962](https://nvd.nist.gov/vuln/detail/CVE-2024-40962), [CVE-2024-40961](https://nvd.nist.gov/vuln/detail/CVE-2024-40961), [CVE-2024-40960](https://nvd.nist.gov/vuln/detail/CVE-2024-40960), [CVE-2024-40959](https://nvd.nist.gov/vuln/detail/CVE-2024-40959), [CVE-2024-40958](https://nvd.nist.gov/vuln/detail/CVE-2024-40958), [CVE-2024-40957](https://nvd.nist.gov/vuln/detail/CVE-2024-40957), [CVE-2024-40956](https://nvd.nist.gov/vuln/detail/CVE-2024-40956)-[CVE-2024-40929](https://nvd.nist.gov/vuln/detail/CVE-2024-40929), [CVE-2024-40938](https://nvd.nist.gov/vuln/detail/CVE-2024-40938), [CVE-2024-40937](https://nvd.nist.gov/vuln/detail/CVE-2024-40937), [CVE-2024-40936](https://nvd.nist.gov/vuln/detail/CVE-2024-40936), [CVE-2024-40935](https://nvd.nist.gov/vuln/detail/CVE-2024-40935), [CVE-2024-40934](https://nvd.nist.gov/vuln/detail/CVE-2024-40934), [CVE-2024-40932](https://nvd.nist.gov/vuln/detail/CVE-2024-40932), [CVE-2024-40931](https://nvd.nist.gov/vuln/detail/CVE-2024-40931), [CVE-2024-40945](https://nvd.nist.gov/vuln/detail/CVE-2024-40945), [CVE-2024-40944](https://nvd.nist.gov/vuln/detail/CVE-2024-40944), [CVE-2024-40943](https://nvd.nist.gov/vuln/detail/CVE-2024-40943), [CVE-2024-40942](https://nvd.nist.gov/vuln/detail/CVE-2024-40942), [CVE-2024-40941](https://nvd.nist.gov/vuln/detail/CVE-2024-40941), [CVE-2024-40940](https://nvd.nist.gov/vuln/detail/CVE-2024-40940), [CVE-2024-40939](https://nvd.nist.gov/vuln/detail/CVE-2024-40939), [CVE-2024-40922](https://nvd.nist.gov/vuln/detail/CVE-2024-40922), [CVE-2024-40921](https://nvd.nist.gov/vuln/detail/CVE-2024-40921), [CVE-2024-40920](https://nvd.nist.gov/vuln/detail/CVE-2024-40920), [CVE-2024-40919](https://nvd.nist.gov/vuln/detail/CVE-2024-40919), [CVE-2024-40918](https://nvd.nist.gov/vuln/detail/CVE-2024-40918), [CVE-2024-40916](https://nvd.nist.gov/vuln/detail/CVE-2024-40916), [CVE-2024-40915](https://nvd.nist.gov/vuln/detail/CVE-2024-40915), [CVE-2024-40928](https://nvd.nist.gov/vuln/detail/CVE-2024-40928), [CVE-2024-40927](https://nvd.nist.gov/vuln/detail/CVE-2024-40927), [CVE-2024-40925](https://nvd.nist.gov/vuln/detail/CVE-2024-40925), [CVE-2024-40924](https://nvd.nist.gov/vuln/detail/CVE-2024-40924), [CVE-2024-40923](https://nvd.nist.gov/vuln/detail/CVE-2024-40923), [CVE-2024-40913](https://nvd.nist.gov/vuln/detail/CVE-2024-40913), [CVE-2024-40914](https://nvd.nist.gov/vuln/detail/CVE-2024-40914), [CVE-2024-40912](https://nvd.nist.gov/vuln/detail/CVE-2024-40912), [CVE-2024-39503](https://nvd.nist.gov/vuln/detail/CVE-2024-39503), [CVE-2024-39502](https://nvd.nist.gov/vuln/detail/CVE-2024-39502), [CVE-2024-39501](https://nvd.nist.gov/vuln/detail/CVE-2024-39501), [CVE-2024-39500](https://nvd.nist.gov/vuln/detail/CVE-2024-39500), [CVE-2024-39499](https://nvd.nist.gov/vuln/detail/CVE-2024-39499), [CVE-2024-39497](https://nvd.nist.gov/vuln/detail/CVE-2024-39497), [CVE-2024-40911](https://nvd.nist.gov/vuln/detail/CVE-2024-40911), [CVE-2024-40910](https://nvd.nist.gov/vuln/detail/CVE-2024-40910), [CVE-2024-40909](https://nvd.nist.gov/vuln/detail/CVE-2024-40909), [CVE-2024-40908](https://nvd.nist.gov/vuln/detail/CVE-2024-40908), [CVE-2024-40906](https://nvd.nist.gov/vuln/detail/CVE-2024-40906), [CVE-2024-40905](https://nvd.nist.gov/vuln/detail/CVE-2024-40905), [CVE-2024-40904](https://nvd.nist.gov/vuln/detail/CVE-2024-40904), [CVE-2024-40903](https://nvd.nist.gov/vuln/detail/CVE-2024-40903), [CVE-2024-40902](https://nvd.nist.gov/vuln/detail/CVE-2024-40902), [CVE-2024-39496](https://nvd.nist.gov/vuln/detail/CVE-2024-39496), [CVE-2024-40901](https://nvd.nist.gov/vuln/detail/CVE-2024-40901), [CVE-2024-40900](https://nvd.nist.gov/vuln/detail/CVE-2024-40900), [CVE-2024-39509](https://nvd.nist.gov/vuln/detail/CVE-2024-39509), [CVE-2024-39508](https://nvd.nist.gov/vuln/detail/CVE-2024-39508), [CVE-2024-39507](https://nvd.nist.gov/vuln/detail/CVE-2024-39507), [CVE-2024-39506](https://nvd.nist.gov/vuln/detail/CVE-2024-39506), [CVE-2024-39505](https://nvd.nist.gov/vuln/detail/CVE-2024-39505), [CVE-2024-39504](https://nvd.nist.gov/vuln/detail/CVE-2024-39504), [CVE-2024-39494](https://nvd.nist.gov/vuln/detail/CVE-2024-39494), [CVE-2024-39495](https://nvd.nist.gov/vuln/detail/CVE-2024-39495), [CVE-2024-39469](https://nvd.nist.gov/vuln/detail/CVE-2024-39469), [CVE-2024-39298](https://nvd.nist.gov/vuln/detail/CVE-2024-39298), [CVE-2024-39371](https://nvd.nist.gov/vuln/detail/CVE-2024-39371), [CVE-2024-37078](https://nvd.nist.gov/vuln/detail/CVE-2024-37078), [CVE-2024-39493](https://nvd.nist.gov/vuln/detail/CVE-2024-39493), [CVE-2024-39476](https://nvd.nist.gov/vuln/detail/CVE-2024-39476), [CVE-2024-39485](https://nvd.nist.gov/vuln/detail/CVE-2024-39485), [CVE-2024-39484](https://nvd.nist.gov/vuln/detail/CVE-2024-39484), [CVE-2024-39483](https://nvd.nist.gov/vuln/detail/CVE-2024-39483), [CVE-2024-39482](https://nvd.nist.gov/vuln/detail/CVE-2024-39482), [CVE-2024-39481](https://nvd.nist.gov/vuln/detail/CVE-2024-39481), [CVE-2024-39480](https://nvd.nist.gov/vuln/detail/CVE-2024-39480), [CVE-2024-39479](https://nvd.nist.gov/vuln/detail/CVE-2024-39479), [CVE-2024-39475](https://nvd.nist.gov/vuln/detail/CVE-2024-39475), [CVE-2024-39473](https://nvd.nist.gov/vuln/detail/CVE-2024-39473), [CVE-2024-39474](https://nvd.nist.gov/vuln/detail/CVE-2024-39474), [CVE-2024-39471](https://nvd.nist.gov/vuln/detail/CVE-2024-39471), [CVE-2024-39470](https://nvd.nist.gov/vuln/detail/CVE-2024-39470), [CVE-2024-39468](https://nvd.nist.gov/vuln/detail/CVE-2024-39468), [CVE-2024-39467](https://nvd.nist.gov/vuln/detail/CVE-2024-39467), [CVE-2024-39466](https://nvd.nist.gov/vuln/detail/CVE-2024-39466), [CVE-2024-39464](https://nvd.nist.gov/vuln/detail/CVE-2024-39464), [CVE-2024-39461](https://nvd.nist.gov/vuln/detail/CVE-2024-39461), [CVE-2024-39463](https://nvd.nist.gov/vuln/detail/CVE-2024-39463), [CVE-2024-39462](https://nvd.nist.gov/vuln/detail/CVE-2024-39462), [CVE-2024-39296](https://nvd.nist.gov/vuln/detail/CVE-2024-39296), [CVE-2024-39276](https://nvd.nist.gov/vuln/detail/CVE-2024-39276), [CVE-2024-38661](https://nvd.nist.gov/vuln/detail/CVE-2024-38661), [CVE-2024-38385](https://nvd.nist.gov/vuln/detail/CVE-2024-38385), [CVE-2024-37354](https://nvd.nist.gov/vuln/detail/CVE-2024-37354), [CVE-2024-39362](https://nvd.nist.gov/vuln/detail/CVE-2024-39362), [CVE-2024-39301](https://nvd.nist.gov/vuln/detail/CVE-2024-39301), [CVE-2022-48772](https://nvd.nist.gov/vuln/detail/CVE-2022-48772), [CVE-2024-39491](https://nvd.nist.gov/vuln/detail/CVE-2024-39491), [CVE-2024-39490](https://nvd.nist.gov/vuln/detail/CVE-2024-39490), [CVE-2024-39489](https://nvd.nist.gov/vuln/detail/CVE-2024-39489), [CVE-2024-39488](https://nvd.nist.gov/vuln/detail/CVE-2024-39488), [CVE-2024-37021](https://nvd.nist.gov/vuln/detail/CVE-2024-37021), [CVE-2024-36479](https://nvd.nist.gov/vuln/detail/CVE-2024-36479), [CVE-2024-35247](https://nvd.nist.gov/vuln/detail/CVE-2024-35247), [CVE-2024-34030](https://nvd.nist.gov/vuln/detail/CVE-2024-34030), [CVE-2024-34027](https://nvd.nist.gov/vuln/detail/CVE-2024-34027), [CVE-2024-33847](https://nvd.nist.gov/vuln/detail/CVE-2024-33847), [CVE-2024-39292](https://nvd.nist.gov/vuln/detail/CVE-2024-39292), [CVE-2024-38667](https://nvd.nist.gov/vuln/detail/CVE-2024-38667), [CVE-2024-39291](https://nvd.nist.gov/vuln/detail/CVE-2024-39291), [CVE-2024-38384](https://nvd.nist.gov/vuln/detail/CVE-2024-38384), [CVE-2024-38664](https://nvd.nist.gov/vuln/detail/CVE-2024-38664), [CVE-2024-38663](https://nvd.nist.gov/vuln/detail/CVE-2024-38663), [CVE-2024-36481](https://nvd.nist.gov/vuln/detail/CVE-2024-36481), [CVE-2024-36477](https://nvd.nist.gov/vuln/detail/CVE-2024-36477), [CVE-2024-34777](https://nvd.nist.gov/vuln/detail/CVE-2024-34777), [CVE-2024-39277](https://nvd.nist.gov/vuln/detail/CVE-2024-39277), [CVE-2024-38662](https://nvd.nist.gov/vuln/detail/CVE-2024-38662), [CVE-2024-38780](https://nvd.nist.gov/vuln/detail/CVE-2024-38780), [CVE-2024-38659](https://nvd.nist.gov/vuln/detail/CVE-2024-38659), [CVE-2024-38634](https://nvd.nist.gov/vuln/detail/CVE-2024-38634), [CVE-2024-38637](https://nvd.nist.gov/vuln/detail/CVE-2024-38637), [CVE-2024-38636](https://nvd.nist.gov/vuln/detail/CVE-2024-38636), [CVE-2024-38635](https://nvd.nist.gov/vuln/detail/CVE-2024-38635), [CVE-2024-36484](https://nvd.nist.gov/vuln/detail/CVE-2024-36484), [CVE-2024-36286](https://nvd.nist.gov/vuln/detail/CVE-2024-36286), [CVE-2024-36281](https://nvd.nist.gov/vuln/detail/CVE-2024-36281), [CVE-2024-36270](https://nvd.nist.gov/vuln/detail/CVE-2024-36270), [CVE-2024-36244](https://nvd.nist.gov/vuln/detail/CVE-2024-36244), [CVE-2024-33621](https://nvd.nist.gov/vuln/detail/CVE-2024-33621), [CVE-2024-38633](https://nvd.nist.gov/vuln/detail/CVE-2024-38633), [CVE-2024-38632](https://nvd.nist.gov/vuln/detail/CVE-2024-38632), [CVE-2024-38630](https://nvd.nist.gov/vuln/detail/CVE-2024-38630), [CVE-2024-38629](https://nvd.nist.gov/vuln/detail/CVE-2024-38629), [CVE-2024-38628](https://nvd.nist.gov/vuln/detail/CVE-2024-38628), [CVE-2024-38627](https://nvd.nist.gov/vuln/detail/CVE-2024-38627), [CVE-2024-38625](https://nvd.nist.gov/vuln/detail/CVE-2024-38625), [CVE-2024-38624](https://nvd.nist.gov/vuln/detail/CVE-2024-38624), [CVE-2024-33619](https://nvd.nist.gov/vuln/detail/CVE-2024-33619), [CVE-2024-38623](https://nvd.nist.gov/vuln/detail/CVE-2024-38623), [CVE-2024-38622](https://nvd.nist.gov/vuln/detail/CVE-2024-38622), [CVE-2024-38621](https://nvd.nist.gov/vuln/detail/CVE-2024-38621), [CVE-2024-38391](https://nvd.nist.gov/vuln/detail/CVE-2024-38391), [CVE-2024-38390](https://nvd.nist.gov/vuln/detail/CVE-2024-38390), [CVE-2024-38388](https://nvd.nist.gov/vuln/detail/CVE-2024-38388), [CVE-2024-38381](https://nvd.nist.gov/vuln/detail/CVE-2024-38381), [CVE-2024-37356](https://nvd.nist.gov/vuln/detail/CVE-2024-37356), [CVE-2024-37353](https://nvd.nist.gov/vuln/detail/CVE-2024-37353), [CVE-2024-36489](https://nvd.nist.gov/vuln/detail/CVE-2024-36489), [CVE-2023-52884](https://nvd.nist.gov/vuln/detail/CVE-2023-52884), [CVE-2024-31076](https://nvd.nist.gov/vuln/detail/CVE-2024-31076), [CVE-2024-38620](https://nvd.nist.gov/vuln/detail/CVE-2024-38620), [CVE-2024-38617](https://nvd.nist.gov/vuln/detail/CVE-2024-38617), [CVE-2024-38616](https://nvd.nist.gov/vuln/detail/CVE-2024-38616), [CVE-2024-38615](https://nvd.nist.gov/vuln/detail/CVE-2024-38615), [CVE-2024-38614](https://nvd.nist.gov/vuln/detail/CVE-2024-38614), [CVE-2024-38613](https://nvd.nist.gov/vuln/detail/CVE-2024-38613), [CVE-2024-38612](https://nvd.nist.gov/vuln/detail/CVE-2024-38612), [CVE-2024-38611](https://nvd.nist.gov/vuln/detail/CVE-2024-38611), [CVE-2024-38610](https://nvd.nist.gov/vuln/detail/CVE-2024-38610), [CVE-2024-38618](https://nvd.nist.gov/vuln/detail/CVE-2024-38618), [CVE-2024-38607](https://nvd.nist.gov/vuln/detail/CVE-2024-38607), [CVE-2024-38605](https://nvd.nist.gov/vuln/detail/CVE-2024-38605), [CVE-2024-38604](https://nvd.nist.gov/vuln/detail/CVE-2024-38604), [CVE-2024-38603](https://nvd.nist.gov/vuln/detail/CVE-2024-38603), [CVE-2024-38601](https://nvd.nist.gov/vuln/detail/CVE-2024-38601), [CVE-2024-38602](https://nvd.nist.gov/vuln/detail/CVE-2024-38602), [CVE-2024-38598](https://nvd.nist.gov/vuln/detail/CVE-2024-38598), [CVE-2024-38597](https://nvd.nist.gov/vuln/detail/CVE-2024-38597), [CVE-2024-38596](https://nvd.nist.gov/vuln/detail/CVE-2024-38596), [CVE-2024-38593](https://nvd.nist.gov/vuln/detail/CVE-2024-38593), [CVE-2024-38591](https://nvd.nist.gov/vuln/detail/CVE-2024-38591), [CVE-2024-38600](https://nvd.nist.gov/vuln/detail/CVE-2024-38600), [CVE-2024-38599](https://nvd.nist.gov/vuln/detail/CVE-2024-38599), [CVE-2024-38589](https://nvd.nist.gov/vuln/detail/CVE-2024-38589), [CVE-2024-38590](https://nvd.nist.gov/vuln/detail/CVE-2024-38590), [CVE-2024-38575](https://nvd.nist.gov/vuln/detail/CVE-2024-38575), [CVE-2024-38584](https://nvd.nist.gov/vuln/detail/CVE-2024-38584), [CVE-2024-38583](https://nvd.nist.gov/vuln/detail/CVE-2024-38583), [CVE-2024-38582](https://nvd.nist.gov/vuln/detail/CVE-2024-38582), [CVE-2024-38581](https://nvd.nist.gov/vuln/detail/CVE-2024-38581), [CVE-2024-38580](https://nvd.nist.gov/vuln/detail/CVE-2024-38580), [CVE-2024-38579](https://nvd.nist.gov/vuln/detail/CVE-2024-38579), [CVE-2024-38578](https://nvd.nist.gov/vuln/detail/CVE-2024-38578), [CVE-2024-38577](https://nvd.nist.gov/vuln/detail/CVE-2024-38577), [CVE-2024-38588](https://nvd.nist.gov/vuln/detail/CVE-2024-38588), [CVE-2024-38587](https://nvd.nist.gov/vuln/detail/CVE-2024-38587), [CVE-2024-38586](https://nvd.nist.gov/vuln/detail/CVE-2024-38586), [CVE-2024-38585](https://nvd.nist.gov/vuln/detail/CVE-2024-38585), [CVE-2024-38576](https://nvd.nist.gov/vuln/detail/CVE-2024-38576), [CVE-2024-38568](https://nvd.nist.gov/vuln/detail/CVE-2024-38568), [CVE-2024-38573](https://nvd.nist.gov/vuln/detail/CVE-2024-38573), [CVE-2024-38572](https://nvd.nist.gov/vuln/detail/CVE-2024-38572), [CVE-2024-38571](https://nvd.nist.gov/vuln/detail/CVE-2024-38571), [CVE-2024-38570](https://nvd.nist.gov/vuln/detail/CVE-2024-38570), [CVE-2024-38569](https://nvd.nist.gov/vuln/detail/CVE-2024-38569), [CVE-2024-36979](https://nvd.nist.gov/vuln/detail/CVE-2024-36979), [CVE-2024-38546](https://nvd.nist.gov/vuln/detail/CVE-2024-38546), [CVE-2024-38545](https://nvd.nist.gov/vuln/detail/CVE-2024-38545), [CVE-2024-38544](https://nvd.nist.gov/vuln/detail/CVE-2024-38544), [CVE-2024-38543](https://nvd.nist.gov/vuln/detail/CVE-2024-38543), [CVE-2024-38541](https://nvd.nist.gov/vuln/detail/CVE-2024-38541), [CVE-2024-38567](https://nvd.nist.gov/vuln/detail/CVE-2024-38567), [CVE-2024-38540](https://nvd.nist.gov/vuln/detail/CVE-2024-38540), [CVE-2024-38566](https://nvd.nist.gov/vuln/detail/CVE-2024-38566), [CVE-2024-38565](https://nvd.nist.gov/vuln/detail/CVE-2024-38565), [CVE-2024-38564](https://nvd.nist.gov/vuln/detail/CVE-2024-38564), [CVE-2024-38562](https://nvd.nist.gov/vuln/detail/CVE-2024-38562), [CVE-2024-38561](https://nvd.nist.gov/vuln/detail/CVE-2024-38561), [CVE-2024-38560](https://nvd.nist.gov/vuln/detail/CVE-2024-38560), [CVE-2024-38559](https://nvd.nist.gov/vuln/detail/CVE-2024-38559), [CVE-2024-38558](https://nvd.nist.gov/vuln/detail/CVE-2024-38558), [CVE-2024-38557](https://nvd.nist.gov/vuln/detail/CVE-2024-38557), [CVE-2024-38539](https://nvd.nist.gov/vuln/detail/CVE-2024-38539), [CVE-2024-38556](https://nvd.nist.gov/vuln/detail/CVE-2024-38556), [CVE-2024-38555](https://nvd.nist.gov/vuln/detail/CVE-2024-38555), [CVE-2024-38554](https://nvd.nist.gov/vuln/detail/CVE-2024-38554), [CVE-2024-38553](https://nvd.nist.gov/vuln/detail/CVE-2024-38553), [CVE-2024-38552](https://nvd.nist.gov/vuln/detail/CVE-2024-38552), [CVE-2024-38551](https://nvd.nist.gov/vuln/detail/CVE-2024-38551), [CVE-2024-38550](https://nvd.nist.gov/vuln/detail/CVE-2024-38550), [CVE-2024-38549](https://nvd.nist.gov/vuln/detail/CVE-2024-38549), [CVE-2024-38548](https://nvd.nist.gov/vuln/detail/CVE-2024-38548), [CVE-2024-38547](https://nvd.nist.gov/vuln/detail/CVE-2024-38547), [CVE-2024-38538](https://nvd.nist.gov/vuln/detail/CVE-2024-38538))\n\n##### Bug fixes:\n\n- Hetzner: Fixed duplicated prefix in the Afterburn metadata ([scripts#2141](https://github.com/flatcar/scripts/pull/2141))\n\n##### Changes:\n\n- Hetzner: Added `COREOS_HETZNER_PRIVATE_IPV4_0` Afterburn attribute for Hetzner private IPs ([scripts#2141](https://github.com/flatcar/scripts/pull/2141))\n- Provided a Python Flatcar extension as optional systemd-sysext image with the release. Write 'python' to `/etc/flatcar/enabled-sysext.conf` through Ignition and the sysext will be installed during provisioning ([scripts#1979](https://github.com/flatcar/scripts/pull/1979))\n- Added Akamai / Linode images ([scripts#1806](https://github.com/flatcar/scripts/pull/1806))\n- Removed unused grub executable duplicate files and removed grub modules that are already assembled in the grub executable ([scripts#1955](https://github.com/flatcar/scripts/pull/1955)).\n- libcrypt is now provided by the libxcrypt library instead of glibc. Glibc libcrypt was deprecated long time ago.\n\n##### Updates:\n\n- Linux ([6.6.43](https://lwn.net/Articles/983655) (includes [6.6.42](https://lwn.net/Articles/983333), [6.6.41](https://lwn.net/Articles/982381), [6.6.40](https://lwn.net/Articles/982050), [6.6.39](https://lwn.net/Articles/981719), [6.6.38](https://lwn.net/Articles/981255), [6.6.37](https://lwn.net/Articles/980860), [6.6.36](https://lwn.net/Articles/979850/), [6.6.35](https://lwn.net/Articles/979262/), [6.6.34](https://lwn.net/Articles/978593/), [6.6.33](https://lwn.net/Articles/978141/), [6.6.32](https://lwn.net/Articles/975075), [6.6.31](https://lwn.net/Articles/974072)))\n- Linux Firmware ([20240610](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240610))\n- afterburn ([5.6.0](https://coreos.github.io/afterburn/release-notes/#afterburn-560))\n- ca-certificates ([3.103](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_103.html) (includes [3.102](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102.html), [3.102.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102_1.html), [3.101.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101_1.html)))\n- containerd ([1.7.18](https://github.com/containerd/containerd/releases/tag/v1.7.18))\n- Ignition ([2.19.0](https://coreos.github.io/ignition/release-notes/#ignition-2190-2024-06-05))\n- SDK: Rust ([1.79.0](https://github.com/rust-lang/rust/releases/tag/1.79.0) (includes [1.78.0](https://github.com/rust-lang/rust/releases/tag/1.78.0)))\n\n_Changes since **Alpha 4012.0.1**_\n\n##### Security fixes\n\n- Linux ([CVE-2024-42098](https://nvd.nist.gov/vuln/detail/CVE-2024-42098), [CVE-2024-42097](https://nvd.nist.gov/vuln/detail/CVE-2024-42097), [CVE-2024-42096](https://nvd.nist.gov/vuln/detail/CVE-2024-42096), [CVE-2024-42095](https://nvd.nist.gov/vuln/detail/CVE-2024-42095), [CVE-2024-42093](https://nvd.nist.gov/vuln/detail/CVE-2024-42093), [CVE-2024-42094](https://nvd.nist.gov/vuln/detail/CVE-2024-42094), [CVE-2024-42092](https://nvd.nist.gov/vuln/detail/CVE-2024-42092), [CVE-2024-42090](https://nvd.nist.gov/vuln/detail/CVE-2024-42090), [CVE-2024-42089](https://nvd.nist.gov/vuln/detail/CVE-2024-42089), [CVE-2024-42087](https://nvd.nist.gov/vuln/detail/CVE-2024-42087), [CVE-2024-42086](https://nvd.nist.gov/vuln/detail/CVE-2024-42086), [CVE-2024-42084](https://nvd.nist.gov/vuln/detail/CVE-2024-42084), [CVE-2024-42085](https://nvd.nist.gov/vuln/detail/CVE-2024-42085), [CVE-2024-42070](https://nvd.nist.gov/vuln/detail/CVE-2024-42070), [CVE-2024-42069](https://nvd.nist.gov/vuln/detail/CVE-2024-42069), [CVE-2024-42068](https://nvd.nist.gov/vuln/detail/CVE-2024-42068), [CVE-2024-42067](https://nvd.nist.gov/vuln/detail/CVE-2024-42067), [CVE-2024-42082](https://nvd.nist.gov/vuln/detail/CVE-2024-42082), [CVE-2024-42080](https://nvd.nist.gov/vuln/detail/CVE-2024-42080), [CVE-2024-42079](https://nvd.nist.gov/vuln/detail/CVE-2024-42079), [CVE-2024-42077](https://nvd.nist.gov/vuln/detail/CVE-2024-42077), [CVE-2024-42076](https://nvd.nist.gov/vuln/detail/CVE-2024-42076), [CVE-2024-42074](https://nvd.nist.gov/vuln/detail/CVE-2024-42074), [CVE-2024-42073](https://nvd.nist.gov/vuln/detail/CVE-2024-42073), [CVE-2023-52887](https://nvd.nist.gov/vuln/detail/CVE-2023-52887), [CVE-2024-42063](https://nvd.nist.gov/vuln/detail/CVE-2024-42063), [CVE-2024-41094](https://nvd.nist.gov/vuln/detail/CVE-2024-41094), [CVE-2024-41093](https://nvd.nist.gov/vuln/detail/CVE-2024-41093), [CVE-2024-41092](https://nvd.nist.gov/vuln/detail/CVE-2024-41092), [CVE-2024-41089](https://nvd.nist.gov/vuln/detail/CVE-2024-41089), [CVE-2024-41088](https://nvd.nist.gov/vuln/detail/CVE-2024-41088), [CVE-2024-41087](https://nvd.nist.gov/vuln/detail/CVE-2024-41087), [CVE-2024-41098](https://nvd.nist.gov/vuln/detail/CVE-2024-41098), [CVE-2024-41097](https://nvd.nist.gov/vuln/detail/CVE-2024-41097), [CVE-2024-41096](https://nvd.nist.gov/vuln/detail/CVE-2024-41096), [CVE-2024-41095](https://nvd.nist.gov/vuln/detail/CVE-2024-41095), [CVE-2024-41084](https://nvd.nist.gov/vuln/detail/CVE-2024-41084), [CVE-2024-41009](https://nvd.nist.gov/vuln/detail/CVE-2024-41009), [CVE-2024-39486](https://nvd.nist.gov/vuln/detail/CVE-2024-39486), [CVE-2024-42068](https://nvd.nist.gov/vuln/detail/CVE-2024-42068), [CVE-2024-42067](https://nvd.nist.gov/vuln/detail/CVE-2024-42067), [CVE-2024-42145](https://nvd.nist.gov/vuln/detail/CVE-2024-42145), [CVE-2024-42154](https://nvd.nist.gov/vuln/detail/CVE-2024-42154), [CVE-2024-42153](https://nvd.nist.gov/vuln/detail/CVE-2024-42153), [CVE-2024-42152](https://nvd.nist.gov/vuln/detail/CVE-2024-42152), [CVE-2024-42148](https://nvd.nist.gov/vuln/detail/CVE-2024-42148), [CVE-2024-42230](https://nvd.nist.gov/vuln/detail/CVE-2024-42230), [CVE-2024-42229](https://nvd.nist.gov/vuln/detail/CVE-2024-42229), [CVE-2024-42228](https://nvd.nist.gov/vuln/detail/CVE-2024-42228), [CVE-2024-42226](https://nvd.nist.gov/vuln/detail/CVE-2024-42226), [CVE-2024-42225](https://nvd.nist.gov/vuln/detail/CVE-2024-42225), [CVE-2024-42147](https://nvd.nist.gov/vuln/detail/CVE-2024-42147), [CVE-2024-42224](https://nvd.nist.gov/vuln/detail/CVE-2024-42224), [CVE-2024-42223](https://nvd.nist.gov/vuln/detail/CVE-2024-42223), [CVE-2024-42161](https://nvd.nist.gov/vuln/detail/CVE-2024-42161), [CVE-2024-42160](https://nvd.nist.gov/vuln/detail/CVE-2024-42160), [CVE-2024-42159](https://nvd.nist.gov/vuln/detail/CVE-2024-42159), [CVE-2024-42157](https://nvd.nist.gov/vuln/detail/CVE-2024-42157), [CVE-2024-42110](https://nvd.nist.gov/vuln/detail/CVE-2024-42110), [CVE-2024-42119](https://nvd.nist.gov/vuln/detail/CVE-2024-42119), [CVE-2024-42116](https://nvd.nist.gov/vuln/detail/CVE-2024-42116), [CVE-2024-42115](https://nvd.nist.gov/vuln/detail/CVE-2024-42115), [CVE-2024-42144](https://nvd.nist.gov/vuln/detail/CVE-2024-42144), [CVE-2024-42143](https://nvd.nist.gov/vuln/detail/CVE-2024-42143), [CVE-2024-42142](https://nvd.nist.gov/vuln/detail/CVE-2024-42142), [CVE-2024-42141](https://nvd.nist.gov/vuln/detail/CVE-2024-42141), [CVE-2024-42140](https://nvd.nist.gov/vuln/detail/CVE-2024-42140), [CVE-2024-42113](https://nvd.nist.gov/vuln/detail/CVE-2024-42113), [CVE-2024-42138](https://nvd.nist.gov/vuln/detail/CVE-2024-42138), [CVE-2024-42137](https://nvd.nist.gov/vuln/detail/CVE-2024-42137), [CVE-2024-42136](https://nvd.nist.gov/vuln/detail/CVE-2024-42136), [CVE-2024-42135](https://nvd.nist.gov/vuln/detail/CVE-2024-42135), [CVE-2024-42133](https://nvd.nist.gov/vuln/detail/CVE-2024-42133), [CVE-2024-42132](https://nvd.nist.gov/vuln/detail/CVE-2024-42132), [CVE-2024-42131](https://nvd.nist.gov/vuln/detail/CVE-2024-42131), [CVE-2024-42130](https://nvd.nist.gov/vuln/detail/CVE-2024-42130), [CVE-2024-42128](https://nvd.nist.gov/vuln/detail/CVE-2024-42128), [CVE-2024-42127](https://nvd.nist.gov/vuln/detail/CVE-2024-42127), [CVE-2024-42126](https://nvd.nist.gov/vuln/detail/CVE-2024-42126), [CVE-2024-42124](https://nvd.nist.gov/vuln/detail/CVE-2024-42124), [CVE-2024-42121](https://nvd.nist.gov/vuln/detail/CVE-2024-42121), [CVE-2024-42120](https://nvd.nist.gov/vuln/detail/CVE-2024-42120), [CVE-2023-52888](https://nvd.nist.gov/vuln/detail/CVE-2023-52888), [CVE-2024-42106](https://nvd.nist.gov/vuln/detail/CVE-2024-42106), [CVE-2024-42105](https://nvd.nist.gov/vuln/detail/CVE-2024-42105), [CVE-2024-42104](https://nvd.nist.gov/vuln/detail/CVE-2024-42104), [CVE-2024-42103](https://nvd.nist.gov/vuln/detail/CVE-2024-42103), [CVE-2024-42102](https://nvd.nist.gov/vuln/detail/CVE-2024-42102), [CVE-2024-42101](https://nvd.nist.gov/vuln/detail/CVE-2024-42101), [CVE-2024-42100](https://nvd.nist.gov/vuln/detail/CVE-2024-42100), [CVE-2024-42109](https://nvd.nist.gov/vuln/detail/CVE-2024-42109), [CVE-2024-40947](https://nvd.nist.gov/vuln/detail/CVE-2024-40947), [CVE-2024-41056](https://nvd.nist.gov/vuln/detail/CVE-2024-41056), [CVE-2024-41053](https://nvd.nist.gov/vuln/detail/CVE-2024-41053), [CVE-2024-41055](https://nvd.nist.gov/vuln/detail/CVE-2024-41055), [CVE-2024-41054](https://nvd.nist.gov/vuln/detail/CVE-2024-41054), [CVE-2024-41032](https://nvd.nist.gov/vuln/detail/CVE-2024-41032), [CVE-2024-41031](https://nvd.nist.gov/vuln/detail/CVE-2024-41031), [CVE-2024-41030](https://nvd.nist.gov/vuln/detail/CVE-2024-41030), [CVE-2024-41028](https://nvd.nist.gov/vuln/detail/CVE-2024-41028), [CVE-2024-41027](https://nvd.nist.gov/vuln/detail/CVE-2024-41027), [CVE-2024-41052](https://nvd.nist.gov/vuln/detail/CVE-2024-41052), [CVE-2024-41051](https://nvd.nist.gov/vuln/detail/CVE-2024-41051), [CVE-2024-41050](https://nvd.nist.gov/vuln/detail/CVE-2024-41050), [CVE-2024-41049](https://nvd.nist.gov/vuln/detail/CVE-2024-41049), [CVE-2024-41048](https://nvd.nist.gov/vuln/detail/CVE-2024-41048), [CVE-2024-41047](https://nvd.nist.gov/vuln/detail/CVE-2024-41047), [CVE-2024-41046](https://nvd.nist.gov/vuln/detail/CVE-2024-41046), [CVE-2024-41044](https://nvd.nist.gov/vuln/detail/CVE-2024-41044), [CVE-2024-41025](https://nvd.nist.gov/vuln/detail/CVE-2024-41025), [CVE-2024-41041](https://nvd.nist.gov/vuln/detail/CVE-2024-41041), [CVE-2024-41040](https://nvd.nist.gov/vuln/detail/CVE-2024-41040), [CVE-2024-41039](https://nvd.nist.gov/vuln/detail/CVE-2024-41039), [CVE-2024-41038](https://nvd.nist.gov/vuln/detail/CVE-2024-41038), [CVE-2024-41037](https://nvd.nist.gov/vuln/detail/CVE-2024-41037), [CVE-2024-41036](https://nvd.nist.gov/vuln/detail/CVE-2024-41036), [CVE-2024-41035](https://nvd.nist.gov/vuln/detail/CVE-2024-41035), [CVE-2024-41034](https://nvd.nist.gov/vuln/detail/CVE-2024-41034), [CVE-2024-41024](https://nvd.nist.gov/vuln/detail/CVE-2024-41024), [CVE-2024-41081](https://nvd.nist.gov/vuln/detail/CVE-2024-41081), [CVE-2024-41078](https://nvd.nist.gov/vuln/detail/CVE-2024-41078), [CVE-2024-41079](https://nvd.nist.gov/vuln/detail/CVE-2024-41079), [CVE-2024-41076](https://nvd.nist.gov/vuln/detail/CVE-2024-41076), [CVE-2024-41075](https://nvd.nist.gov/vuln/detail/CVE-2024-41075), [CVE-2024-41074](https://nvd.nist.gov/vuln/detail/CVE-2024-41074), [CVE-2024-41073](https://nvd.nist.gov/vuln/detail/CVE-2024-41073), [CVE-2024-41072](https://nvd.nist.gov/vuln/detail/CVE-2024-41072), [CVE-2024-41070](https://nvd.nist.gov/vuln/detail/CVE-2024-41070), [CVE-2024-41069](https://nvd.nist.gov/vuln/detail/CVE-2024-41069), [CVE-2024-41077](https://nvd.nist.gov/vuln/detail/CVE-2024-41077), [CVE-2024-41068](https://nvd.nist.gov/vuln/detail/CVE-2024-41068), [CVE-2024-41066](https://nvd.nist.gov/vuln/detail/CVE-2024-41066), [CVE-2024-41065](https://nvd.nist.gov/vuln/detail/CVE-2024-41065), [CVE-2024-41064](https://nvd.nist.gov/vuln/detail/CVE-2024-41064), [CVE-2024-41063](https://nvd.nist.gov/vuln/detail/CVE-2024-41063), [CVE-2024-41062](https://nvd.nist.gov/vuln/detail/CVE-2024-41062), [CVE-2024-41060](https://nvd.nist.gov/vuln/detail/CVE-2024-41060), [CVE-2024-41059](https://nvd.nist.gov/vuln/detail/CVE-2024-41059), [CVE-2024-41057](https://nvd.nist.gov/vuln/detail/CVE-2024-41057), [CVE-2024-41058](https://nvd.nist.gov/vuln/detail/CVE-2024-41058), [CVE-2024-41022](https://nvd.nist.gov/vuln/detail/CVE-2024-41022), [CVE-2024-41020](https://nvd.nist.gov/vuln/detail/CVE-2024-41020), [CVE-2024-41019](https://nvd.nist.gov/vuln/detail/CVE-2024-41019), [CVE-2024-41018](https://nvd.nist.gov/vuln/detail/CVE-2024-41018), [CVE-2024-41017](https://nvd.nist.gov/vuln/detail/CVE-2024-41017), [CVE-2024-41015](https://nvd.nist.gov/vuln/detail/CVE-2024-41015), [CVE-2024-41090](https://nvd.nist.gov/vuln/detail/CVE-2024-41090), [CVE-2024-41091](https://nvd.nist.gov/vuln/detail/CVE-2024-41091))\n\n##### Bug fixes:\n\n- Hetzner: Fixed duplicated prefix in the Afterburn metadata ([scripts#2141](https://github.com/flatcar/scripts/pull/2141))\n\n##### Changes:\n\n- Hetzner: Added `COREOS_HETZNER_PRIVATE_IPV4_0` Afterburn attribute for Hetzner private IPs ([scripts#2141](https://github.com/flatcar/scripts/pull/2141))\n\n##### Updates:\n\n- Linux ([6.6.43](https://lwn.net/Articles/983655) (includes [6.6.42](https://lwn.net/Articles/983333), [6.6.41](https://lwn.net/Articles/982381), [6.6.40](https://lwn.net/Articles/982050), [6.6.39](https://lwn.net/Articles/981719), [6.6.38](https://lwn.net/Articles/981255), [6.6.37](https://lwn.net/Articles/980860)))\n- ca-certificates ([3.103](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_103.html) (includes [3.102](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102.html), [3.102.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102_1.html), [3.101.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101_1.html)))"
  },
  "4054.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-09-05 11:38:16 +0000",
    "major_software": {
      "containerd": [
        "1.7.20"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.48"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "_Changes since **Beta 4012.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2024-44944](https://nvd.nist.gov/vuln/detail/CVE-2024-44944), [CVE-2024-43877](https://nvd.nist.gov/vuln/detail/CVE-2024-43877), [CVE-2024-43876](https://nvd.nist.gov/vuln/detail/CVE-2024-43876), [CVE-2024-43875](https://nvd.nist.gov/vuln/detail/CVE-2024-43875), [CVE-2024-43873](https://nvd.nist.gov/vuln/detail/CVE-2024-43873), [CVE-2024-43871](https://nvd.nist.gov/vuln/detail/CVE-2024-43871), [CVE-2024-43881](https://nvd.nist.gov/vuln/detail/CVE-2024-43881), [CVE-2024-43880](https://nvd.nist.gov/vuln/detail/CVE-2024-43880), [CVE-2024-43879](https://nvd.nist.gov/vuln/detail/CVE-2024-43879), [CVE-2024-43869](https://nvd.nist.gov/vuln/detail/CVE-2024-43869), [CVE-2024-43870](https://nvd.nist.gov/vuln/detail/CVE-2024-43870), [CVE-2024-43856](https://nvd.nist.gov/vuln/detail/CVE-2024-43856), [CVE-2024-43860](https://nvd.nist.gov/vuln/detail/CVE-2024-43860), [CVE-2024-43859](https://nvd.nist.gov/vuln/detail/CVE-2024-43859), [CVE-2024-43858](https://nvd.nist.gov/vuln/detail/CVE-2024-43858), [CVE-2024-43833](https://nvd.nist.gov/vuln/detail/CVE-2024-43833), [CVE-2024-43832](https://nvd.nist.gov/vuln/detail/CVE-2024-43832), [CVE-2024-43831](https://nvd.nist.gov/vuln/detail/CVE-2024-43831), [CVE-2024-43830](https://nvd.nist.gov/vuln/detail/CVE-2024-43830), [CVE-2024-43829](https://nvd.nist.gov/vuln/detail/CVE-2024-43829), [CVE-2024-43828](https://nvd.nist.gov/vuln/detail/CVE-2024-43828), [CVE-2024-43855](https://nvd.nist.gov/vuln/detail/CVE-2024-43855), [CVE-2024-43854](https://nvd.nist.gov/vuln/detail/CVE-2024-43854), [CVE-2024-43853](https://nvd.nist.gov/vuln/detail/CVE-2024-43853), [CVE-2024-43851](https://nvd.nist.gov/vuln/detail/CVE-2024-43851), [CVE-2024-43850](https://nvd.nist.gov/vuln/detail/CVE-2024-43850), [CVE-2024-43849](https://nvd.nist.gov/vuln/detail/CVE-2024-43849), [CVE-2024-43847](https://nvd.nist.gov/vuln/detail/CVE-2024-43847), [CVE-2024-43846](https://nvd.nist.gov/vuln/detail/CVE-2024-43846), [CVE-2024-43845](https://nvd.nist.gov/vuln/detail/CVE-2024-43845), [CVE-2024-43842](https://nvd.nist.gov/vuln/detail/CVE-2024-43842), [CVE-2024-43841](https://nvd.nist.gov/vuln/detail/CVE-2024-43841), [CVE-2024-43839](https://nvd.nist.gov/vuln/detail/CVE-2024-43839), [CVE-2024-43837](https://nvd.nist.gov/vuln/detail/CVE-2024-43837), [CVE-2024-43834](https://nvd.nist.gov/vuln/detail/CVE-2024-43834), [CVE-2024-43825](https://nvd.nist.gov/vuln/detail/CVE-2024-43825), [CVE-2024-43823](https://nvd.nist.gov/vuln/detail/CVE-2024-43823), [CVE-2024-43821](https://nvd.nist.gov/vuln/detail/CVE-2024-43821), [CVE-2024-43818](https://nvd.nist.gov/vuln/detail/CVE-2024-43818), [CVE-2024-43817](https://nvd.nist.gov/vuln/detail/CVE-2024-43817), [CVE-2024-42321](https://nvd.nist.gov/vuln/detail/CVE-2024-42321), [CVE-2024-42322](https://nvd.nist.gov/vuln/detail/CVE-2024-42322), [CVE-2024-42288](https://nvd.nist.gov/vuln/detail/CVE-2024-42288), [CVE-2024-42297](https://nvd.nist.gov/vuln/detail/CVE-2024-42297), [CVE-2024-42296](https://nvd.nist.gov/vuln/detail/CVE-2024-42296), [CVE-2024-42295](https://nvd.nist.gov/vuln/detail/CVE-2024-42295), [CVE-2024-42294](https://nvd.nist.gov/vuln/detail/CVE-2024-42294), [CVE-2024-42292](https://nvd.nist.gov/vuln/detail/CVE-2024-42292), [CVE-2024-42320](https://nvd.nist.gov/vuln/detail/CVE-2024-42320), [CVE-2024-42318](https://nvd.nist.gov/vuln/detail/CVE-2024-42318), [CVE-2024-42291](https://nvd.nist.gov/vuln/detail/CVE-2024-42291), [CVE-2024-42316](https://nvd.nist.gov/vuln/detail/CVE-2024-42316), [CVE-2024-42315](https://nvd.nist.gov/vuln/detail/CVE-2024-42315), [CVE-2024-42314](https://nvd.nist.gov/vuln/detail/CVE-2024-42314), [CVE-2024-42313](https://nvd.nist.gov/vuln/detail/CVE-2024-42313), [CVE-2024-42311](https://nvd.nist.gov/vuln/detail/CVE-2024-42311), [CVE-2024-42310](https://nvd.nist.gov/vuln/detail/CVE-2024-42310), [CVE-2024-42309](https://nvd.nist.gov/vuln/detail/CVE-2024-42309), [CVE-2024-42308](https://nvd.nist.gov/vuln/detail/CVE-2024-42308), [CVE-2024-42290](https://nvd.nist.gov/vuln/detail/CVE-2024-42290), [CVE-2024-42307](https://nvd.nist.gov/vuln/detail/CVE-2024-42307), [CVE-2024-42306](https://nvd.nist.gov/vuln/detail/CVE-2024-42306), [CVE-2024-42305](https://nvd.nist.gov/vuln/detail/CVE-2024-42305), [CVE-2024-42304](https://nvd.nist.gov/vuln/detail/CVE-2024-42304), [CVE-2024-42303](https://nvd.nist.gov/vuln/detail/CVE-2024-42303), [CVE-2024-42302](https://nvd.nist.gov/vuln/detail/CVE-2024-42302), [CVE-2024-42301](https://nvd.nist.gov/vuln/detail/CVE-2024-42301), [CVE-2024-42299](https://nvd.nist.gov/vuln/detail/CVE-2024-42299), [CVE-2024-42298](https://nvd.nist.gov/vuln/detail/CVE-2024-42298), [CVE-2024-42289](https://nvd.nist.gov/vuln/detail/CVE-2024-42289), [CVE-2024-42284](https://nvd.nist.gov/vuln/detail/CVE-2024-42284), [CVE-2024-42283](https://nvd.nist.gov/vuln/detail/CVE-2024-42283), [CVE-2024-42281](https://nvd.nist.gov/vuln/detail/CVE-2024-42281), [CVE-2024-42280](https://nvd.nist.gov/vuln/detail/CVE-2024-42280), [CVE-2024-42279](https://nvd.nist.gov/vuln/detail/CVE-2024-42279), [CVE-2024-42278](https://nvd.nist.gov/vuln/detail/CVE-2024-42278), [CVE-2024-42277](https://nvd.nist.gov/vuln/detail/CVE-2024-42277), [CVE-2024-42287](https://nvd.nist.gov/vuln/detail/CVE-2024-42287), [CVE-2024-42286](https://nvd.nist.gov/vuln/detail/CVE-2024-42286), [CVE-2024-42285](https://nvd.nist.gov/vuln/detail/CVE-2024-42285), [CVE-2023-52889](https://nvd.nist.gov/vuln/detail/CVE-2023-52889), [CVE-2024-42276](https://nvd.nist.gov/vuln/detail/CVE-2024-42276), [CVE-2024-43867](https://nvd.nist.gov/vuln/detail/CVE-2024-43867), [CVE-2024-43866](https://nvd.nist.gov/vuln/detail/CVE-2024-43866), [CVE-2024-43864](https://nvd.nist.gov/vuln/detail/CVE-2024-43864), [CVE-2024-43863](https://nvd.nist.gov/vuln/detail/CVE-2024-43863), [CVE-2024-42312](https://nvd.nist.gov/vuln/detail/CVE-2024-42312), [CVE-2024-42274](https://nvd.nist.gov/vuln/detail/CVE-2024-42274), [CVE-2024-42273](https://nvd.nist.gov/vuln/detail/CVE-2024-42273), [CVE-2024-42272](https://nvd.nist.gov/vuln/detail/CVE-2024-42272), [CVE-2024-42271](https://nvd.nist.gov/vuln/detail/CVE-2024-42271), [CVE-2024-42270](https://nvd.nist.gov/vuln/detail/CVE-2024-42270), [CVE-2024-42269](https://nvd.nist.gov/vuln/detail/CVE-2024-42269), [CVE-2024-42268](https://nvd.nist.gov/vuln/detail/CVE-2024-42268), [CVE-2024-42267](https://nvd.nist.gov/vuln/detail/CVE-2024-42267), [CVE-2024-42265](https://nvd.nist.gov/vuln/detail/CVE-2024-42265), [CVE-2024-43908](https://nvd.nist.gov/vuln/detail/CVE-2024-43908), [CVE-2024-44931](https://nvd.nist.gov/vuln/detail/CVE-2024-44931), [CVE-2024-43914](https://nvd.nist.gov/vuln/detail/CVE-2024-43914), [CVE-2024-43912](https://nvd.nist.gov/vuln/detail/CVE-2024-43912), [CVE-2024-44935](https://nvd.nist.gov/vuln/detail/CVE-2024-44935), [CVE-2024-44934](https://nvd.nist.gov/vuln/detail/CVE-2024-44934), [CVE-2024-43909](https://nvd.nist.gov/vuln/detail/CVE-2024-43909), [CVE-2024-43905](https://nvd.nist.gov/vuln/detail/CVE-2024-43905), [CVE-2024-43903](https://nvd.nist.gov/vuln/detail/CVE-2024-43903), [CVE-2024-43902](https://nvd.nist.gov/vuln/detail/CVE-2024-43902), [CVE-2024-43900](https://nvd.nist.gov/vuln/detail/CVE-2024-43900), [CVE-2024-43907](https://nvd.nist.gov/vuln/detail/CVE-2024-43907), [CVE-2024-43906](https://nvd.nist.gov/vuln/detail/CVE-2024-43906), [CVE-2024-43897](https://nvd.nist.gov/vuln/detail/CVE-2024-43897), [CVE-2024-43894](https://nvd.nist.gov/vuln/detail/CVE-2024-43894), [CVE-2024-43893](https://nvd.nist.gov/vuln/detail/CVE-2024-43893), [CVE-2024-43892](https://nvd.nist.gov/vuln/detail/CVE-2024-43892), [CVE-2024-43890](https://nvd.nist.gov/vuln/detail/CVE-2024-43890), [CVE-2024-43889](https://nvd.nist.gov/vuln/detail/CVE-2024-43889), [CVE-2024-43895](https://nvd.nist.gov/vuln/detail/CVE-2024-43895), [CVE-2024-43883](https://nvd.nist.gov/vuln/detail/CVE-2024-43883), [CVE-2024-43861](https://nvd.nist.gov/vuln/detail/CVE-2024-43861), [CVE-2024-42259](https://nvd.nist.gov/vuln/detail/CVE-2024-42259), [CVE-2024-44943](https://nvd.nist.gov/vuln/detail/CVE-2024-44943), [CVE-2024-44942](https://nvd.nist.gov/vuln/detail/CVE-2024-44942), [CVE-2024-44941](https://nvd.nist.gov/vuln/detail/CVE-2024-44941), [CVE-2024-44940](https://nvd.nist.gov/vuln/detail/CVE-2024-44940), [CVE-2024-44938](https://nvd.nist.gov/vuln/detail/CVE-2024-44938), [CVE-2024-44939](https://nvd.nist.gov/vuln/detail/CVE-2024-44939), [CVE-2024-43898](https://nvd.nist.gov/vuln/detail/CVE-2024-43898), [CVE-2024-43882](https://nvd.nist.gov/vuln/detail/CVE-2024-43882), [CVE-2024-44947](https://nvd.nist.gov/vuln/detail/CVE-2024-44947), [CVE-2024-44946](https://nvd.nist.gov/vuln/detail/CVE-2024-44946))\n- curl ([CVE-2024-6197](https://nvd.nist.gov/vuln/detail/CVE-2024-6197), [CVE-2024-6874](https://nvd.nist.gov/vuln/detail/CVE-2024-6874))\n- docker ([CVE-2024-29018](https://nvd.nist.gov/vuln/detail/CVE-2024-29018))\n- git ([CVE-2024-32002](https://nvd.nist.gov/vuln/detail/CVE-2024-32002), [CVE-2024-32004](https://nvd.nist.gov/vuln/detail/CVE-2024-32004), [CVE-2024-32020](https://nvd.nist.gov/vuln/detail/CVE-2024-32020), [CVE-2024-32021](https://nvd.nist.gov/vuln/detail/CVE-2024-32021), [CVE-2024-32465](https://nvd.nist.gov/vuln/detail/CVE-2024-32465))\n- glib ([CVE-2024-34397](https://nvd.nist.gov/vuln/detail/CVE-2024-34397))\n- go ([CVE-2023-45288](https://nvd.nist.gov/vuln/detail/CVE-2023-45288), [CVE-2023-45289](https://nvd.nist.gov/vuln/detail/CVE-2023-45289), [CVE-2023-45290](https://nvd.nist.gov/vuln/detail/CVE-2023-45290), [CVE-2024-24783](https://nvd.nist.gov/vuln/detail/CVE-2024-24783), [CVE-2024-24784](https://nvd.nist.gov/vuln/detail/CVE-2024-24784), [CVE-2024-24785](https://nvd.nist.gov/vuln/detail/CVE-2024-24785), [CVE-2024-24788](https://nvd.nist.gov/vuln/detail/CVE-2024-24788), [CVE-2024-24789](https://nvd.nist.gov/vuln/detail/CVE-2024-24789), [CVE-2024-24790](https://nvd.nist.gov/vuln/detail/CVE-2024-24790), [CVE-2024-24791](https://nvd.nist.gov/vuln/detail/CVE-2024-24791))\n- intel-microcode ([CVE-2023-45733](https://nvd.nist.gov/vuln/detail/CVE-2023-45733), [CVE-2023-45745](https://nvd.nist.gov/vuln/detail/CVE-2023-45745), [CVE-2023-46103](https://nvd.nist.gov/vuln/detail/CVE-2023-46103), [CVE-2023-47855](https://nvd.nist.gov/vuln/detail/CVE-2023-47855))\n- libarchive ([CVE-2024-26256](https://nvd.nist.gov/vuln/detail/CVE-2024-26256), [CVE-2024-37407](https://nvd.nist.gov/vuln/detail/CVE-2024-37407))\n- libxml2 ([CVE-2024-34459](https://nvd.nist.gov/vuln/detail/CVE-2024-34459))\n- mit-krb5 ([CVE-2024-26461](https://nvd.nist.gov/vuln/detail/CVE-2024-26461), [CVE-2024-26462](https://nvd.nist.gov/vuln/detail/CVE-2024-26462), [CVE-2024-37370](https://nvd.nist.gov/vuln/detail/CVE-2024-37370), [CVE-2024-37371](https://nvd.nist.gov/vuln/detail/CVE-2024-37371))\n- sysext-podman: podman ([CVE-2024-3727](https://nvd.nist.gov/vuln/detail/CVE-2024-3727))\n- tpm2-tools ([CVE-2024-29038](https://nvd.nist.gov/vuln/detail/CVE-2024-29038), [CVE-2024-29039](https://nvd.nist.gov/vuln/detail/CVE-2024-29039), [CVE-2024-29040](https://nvd.nist.gov/vuln/detail/CVE-2024-29040))\n- wget ([CVE-2024-38428](https://nvd.nist.gov/vuln/detail/CVE-2024-38428))\n- SDK: nasm ([CVE-2019-6290](https://nvd.nist.gov/vuln/detail/CVE-2019-6290), [CVE-2019-6291](https://nvd.nist.gov/vuln/detail/CVE-2019-6291), [CVE-2019-8343](https://nvd.nist.gov/vuln/detail/CVE-2019-8343), [CVE-2020-21528](https://nvd.nist.gov/vuln/detail/CVE-2020-21528), [CVE-2021-33450](https://nvd.nist.gov/vuln/detail/CVE-2021-33450), [CVE-2021-33452](https://nvd.nist.gov/vuln/detail/CVE-2021-33452), [CVE-2022-44368](https://nvd.nist.gov/vuln/detail/CVE-2022-44368), [CVE-2022-44369](https://nvd.nist.gov/vuln/detail/CVE-2022-44369), [CVE-2022-44370](https://nvd.nist.gov/vuln/detail/CVE-2022-44370))\n\n#### Bug fixes:\n\n- Fix ownership of systemd units shipped with built-in docker/containerd sysexts. The files shipped on production images were accidentally owned by 1000:1000 instead of 0:0. This uid/gid is not present on Flatcar images but would be assigned to the first created user. Due to contents of sysexts and /usr being readonly on Flatcar, the invalid permissions can't be used to escalate privileges. ([scripts#2266](https://github.com/flatcar/scripts/pull/2266))\n- Fixed bad usage of gpg that prevented flatcar-install from being used with custom signing keys ([Flatcar#1471](https://github.com/flatcar/flatcar/pull/1471))\n- Equinix Metal: Fixed oem-cloudinit.service. The availability check now uses the https://metadata.platformequinix.com/metadata endpoint. ([scripts#2222](https://github.com/flatcar/scripts/pull/2222))\n\n#### Changes:\n\n- As part of the update to Catalyst 4 (used to build the SDK), the coreos package repository has been renamed to coreos-overlay to match its directory name. This will be reflected in package listings and package manager output. ([flatcar/scripts#2115](https://github.com/flatcar/scripts/pull/2115))\n- The kernel security module Landlock is now enabled for programs to sandbox themselves ([flatcar/scripts#2158](https://github.com/flatcar/scripts/pull/2158))\n\n#### Updates:\n\n- Linux ([6.6.48](https://lwn.net/Articles/987679) (includes [6.6.47](https://lwn.net/Articles/986231/), [6.6.46](https://lwn.net/Articles/985672), [6.6.45](https://lwn.net/Articles/985200), [6.6.44](https://lwn.net/Articles/984450)))\n- Linux Firmware ([20240709](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240709))\n- audit ([3.1.2](https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.2))\n- binutils ([2.42](https://sourceware.org/pipermail/binutils/2024-January/132213.html))\n- bpftool ([6.9.2](https://kernelnewbies.org/Linux_6.9#Tracing.2C_perf_and_BPF) (includes [6.8.2](https://kernelnewbies.org/Linux_6.8#Tracing.2C_perf_and_BPF)))\n- btrfs-progs ([6.9.2](https://github.com/kdave/btrfs-progs/blob/v6.9.2/CHANGES))\n- c-ares ([1.29.0](https://github.com/c-ares/c-ares/releases/tag/cares-1_29_0) (includes [1.28.1](https://github.com/c-ares/c-ares/releases/tag/cares-1_28_1), [1.28.0](https://github.com/c-ares/c-ares/releases/tag/cares-1_28_0)))\n- cJSON ([1.7.18](https://github.com/DaveGamble/cJSON/releases/tag/v1.7.18))\n- ca-certificates ([3.104](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_104.html))\n- containerd ([1.7.20](https://github.com/containerd/containerd/releases/tag/v1.7.20) (includes [1.7.19](https://github.com/containerd/containerd/releases/tag/v1.7.19)))\n- cryptsetup ([2.7.2](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.2/docs/v2.7.2-ReleaseNotes) (includes [2.7.1](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.1/docs/v2.7.1-ReleaseNotes) and [2.7.0](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.0/docs/v2.7.0-ReleaseNotes)))\n- curl ([8.9.0](https://curl.se/ch/8.9.0.html) (includes [8.8.0](https://curl.se/changes.html#8_8_0)))\n- docker ([26.1.0](https://docs.docker.com/engine/release-notes/26.1/#2610), includes changes from [25.0](https://docs.docker.com/engine/release-notes/25.0/))\n- e2fsprogs ([1.47.1](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.1))\n- ethtool ([6.9](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.9))\n- findutils ([4.10.0](https://git.savannah.gnu.org/cgit/findutils.git/tree/NEWS?h=v4.10.0))\n- gcc ([13.3.1_p20240614](https://gcc.gnu.org/gcc-13/changes.html))\n- git ([2.44.2](https://github.com/git/git/blob/v2.44.2/Documentation/RelNotes/2.44.2.txt) (includes [2.44.1](https://github.com/git/git/blob/v2.44.1/Documentation/RelNotes/2.44.1.txt), [2.44.0](https://github.com/git/git/blob/v2.44.0/Documentation/RelNotes/2.44.0.txt)))\n- glib ([2.78.6](https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.6) (includes [2.78.5](https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.5), [2.78.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.4)))\n- gnupg ([2.4.5](https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000482.html))\n- hwdata ([0.383](https://github.com/vcrhonek/hwdata/compare/v0.382...v0.383) (includes [0.382](https://github.com/vcrhonek/hwdata/commits/v0.382)))\n- intel-microcode ([20240514_p20240514](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514))\n- iproute2 ([6.8.0](https://lwn.net/Articles/965125/) (includes [6.7.0](https://lwn.net/Articles/957171/)))\n- ipset ([7.22](https://ipset.netfilter.org/changelog.html))\n- kexec-tools ([2.0.28](https://github.com/horms/kexec-tools/commits/v2.0.28/))\n- kmod ([32](https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/tree/NEWS?h=v32))\n- libarchive ([3.7.4](https://github.com/libarchive/libarchive/releases/tag/v3.7.4) (includes [3.7.3](https://github.com/libarchive/libarchive/releases/tag/v3.7.3)))\n- libassuan ([2.5.7](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=047f12b7c3ee0c8c1718a2da8b5a6bb9dd541fd8;hb=cc2f776904e0b5e56e2b81b2672ca98d7787ed1b))\n- libcap ([2.70](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.hde102t8xd0v))\n- libcap-ng ([0.8.5](https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.5))\n- libdnet ([1.18.0](https://github.com/ofalk/libdnet/releases/tag/libdnet-1.18.0))\n- libgpg-error ([1.49](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=8ac4bf36113fe9254a361e2bc8d0ed52383839ce;hb=faed9c271ad22bbd2ed265d8e11badb53b7a2f32))\n- libksba ([1.6.7](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=3d2d5a47688bb6214efaf02f5ab29f6e64433a97;hb=b14e68b97df754b2bb7a90bb904d143d8e896afb))\n- libnl ([3.9.0](http://lists.infradead.org/pipermail/libnl/2023-December/002436.html))\n- libnvme ([1.9](https://github.com/linux-nvme/libnvme/releases/tag/v1.9))\n- libpcre2 ([10.43](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.43/NEWS))\n- libunwind ([1.8.1](https://github.com/libunwind/libunwind/releases/tag/v1.8.1) (includes [1.8.0](https://github.com/libunwind/libunwind/releases/tag/v1.8.0)))\n- libusb ([1.0.27](https://github.com/libusb/libusb/blob/v1.0.27/ChangeLog))\n- libxml2 ([2.12.7](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7) (includes [2.12.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.6)))\n- linux-pam ([1.5.3](https://github.com/linux-pam/linux-pam/releases/tag/v1.5.3))\n- lshw ([02.20.2b](https://www.ezix.org/project/wiki/HardwareLiSter#Changes))\n- mit-krb5 ([1.21.3](https://web.mit.edu/kerberos/krb5-1.21/README-1.21.3.txt))\n- multipath-tools ([0.9.8](https://github.com/opensvc/multipath-tools/blob/0.9.8/NEWS.md))\n- nmap ([7.95](https://nmap.org/changelog.html#7.95))\n- nvme-cli ([2.9.1](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9.1) (includes [2.9](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9)))\n- pciutils ([3.13.0](https://github.com/pciutils/pciutils/blob/v3.13.0/ChangeLog) (includes [3.12.0](https://github.com/pciutils/pciutils/blob/v3.12.0/ChangeLog)))\n- qemu-guest-agent ([8.2.0](https://wiki.qemu.org/ChangeLog/8.2#Guest_agent))\n- rsync ([3.3.0](https://github.com/RsyncProject/rsync/blob/v3.3.0/NEWS.md))\n- runc ([1.1.13](https://github.com/opencontainers/runc/releases/tag/v1.1.13))\n- sqlite ([3.46.0](https://www.sqlite.org/releaselog/3_46_0.html) (includes [3.45.3](https://www.sqlite.org/releaselog/3_45_3.html)))\n- strace ([6.9](https://github.com/strace/strace/releases/tag/v6.9))\n- sysext-podman: aardvark-dns ([1.11.0](https://github.com/containers/aardvark-dns/releases/tag/v1.11.0))\n- sysext-podman: containers-common ([0.59.1](https://github.com/containers/common/releases/tag/v0.59.1))\n- sysext-podman: podman ([5.0.3](https://github.com/containers/podman/releases/tag/v5.0.3))\n- sysext-python: jaraco-text ([3.12.1](https://github.com/jaraco/jaraco.text/compare/v3.12.0...v3.12.1))\n- sysext-python: setuptools ([70.3.0](https://github.com/pypa/setuptools/blob/v70.3.0/NEWS.rst) (includes [70.1.1](https://setuptools.pypa.io/en/stable/history.html#v70-1-1), [70.1.0](https://setuptools.pypa.io/en/stable/history.html#v70-1-0), [70.0.0](https://setuptools.pypa.io/en/stable/history.html#v70-0-0), [69.5.1](https://setuptools.pypa.io/en/stable/history.html#v69-5-1), [69.5.0](https://setuptools.pypa.io/en/stable/history.html#v69-5-0), [69.4.2](https://setuptools.pypa.io/en/stable/history.html#v69-4-2), [69.4.1](https://setuptools.pypa.io/en/stable/history.html#v69-4-1), [69.4.0](https://setuptools.pypa.io/en/stable/history.html#v69-4-0), [69.3.1](https://setuptools.pypa.io/en/stable/history.html#v69-3-1), [69.3.0](https://setuptools.pypa.io/en/stable/history.html#v69-3-0), [69.2.0](https://setuptools.pypa.io/en/stable/history.html#v69-2-0)))\n- sysext-python: trove-classifiers ([2024.7.2](https://github.com/pypa/trove-classifiers/compare/2024.5.22...2024.7.2))\n- systemd ([255.8](https://github.com/systemd/systemd-stable/commits/v255.8/))\n- talloc ([2.4.1](https://gitlab.com/samba-team/samba/-/commit/791e2817e13182344447590313f7e372a27c1d48))\n- tdb ([1.4.9](https://gitlab.com/samba-team/samba/-/commit/b649c7d3c2b1e13e900c80ff7a20959a70b1c528))\n- tevent ([0.15.0](https://gitlab.com/samba-team/samba/-/commit/6a80d170bca0c938f78ab12e37481b52792a9d83))\n- tpm2-tools ([5.7](https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7) (includes [5.6.1](https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6.1), [5.6](https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6)))\n- tpm2-tss ([4.1.3](https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.3) (includes changes from [4.0.2](https://github.com/tpm2-software/tpm2-tss/releases/tag/4.0.2))\n- util-linux ([2.39.4](https://github.com/util-linux/util-linux/blob/v2.39.4/Documentation/releases/v2.39.4-ReleaseNotes))\n- vim ([9.1.0366](https://github.com/vim/vim/commits/v9.1.0366/) (includes changes from [9.1](https://www.vim.org/vim-9.1-released.php)))\n- wget ([1.24.5](https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00002.html))\n- whois ([5.5.21](https://github.com/rfc1036/whois/blob/v5.5.21/debian/changelog))\n- xfsprogs ([6.8.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.8.0) (includes changes from [6.6.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.6.0)))\n- xz-utils ([5.6.2](https://github.com/tukaani-project/xz/releases/tag/v5.6.2))\n- zfs ([2.2.3](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.3))\n- zlib ([1.3.1](https://github.com/madler/zlib/releases/tag/v1.3.1))\n- zstd ([1.5.6](https://github.com/facebook/zstd/releases/tag/v1.5.6))\n- VMware: open-vm-tools ([12.4.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.5))\n- SDK: Rust ([1.80.0](https://github.com/rust-lang/rust/releases/tag/1.80.0))\n- SDK: go ([1.21.12](https://go.dev/doc/devel/release#go1.21.12) includes changes from [1.21](https://go.dev/doc/go1.21))\n- SDK: nasm ([2.16.01](https://github.com/netwide-assembler/nasm/releases/tag/nasm-2.16.01))\n- SDK: portage ([3.0.65](https://github.com/gentoo/portage/blob/f03998622e0960388e903de0d6d24bdf6881e567/NEWS#L9) (includes changes from [3.0.63](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.63)))\n- SDK: qemu ([8.2.3](https://wiki.qemu.org/ChangeLog/8.2))\n\n_Changes since **Alpha 4054.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2024-44944](https://nvd.nist.gov/vuln/detail/CVE-2024-44944), [CVE-2024-43877](https://nvd.nist.gov/vuln/detail/CVE-2024-43877), [CVE-2024-43876](https://nvd.nist.gov/vuln/detail/CVE-2024-43876), [CVE-2024-43875](https://nvd.nist.gov/vuln/detail/CVE-2024-43875), [CVE-2024-43873](https://nvd.nist.gov/vuln/detail/CVE-2024-43873), [CVE-2024-43871](https://nvd.nist.gov/vuln/detail/CVE-2024-43871), [CVE-2024-43881](https://nvd.nist.gov/vuln/detail/CVE-2024-43881), [CVE-2024-43880](https://nvd.nist.gov/vuln/detail/CVE-2024-43880), [CVE-2024-43879](https://nvd.nist.gov/vuln/detail/CVE-2024-43879), [CVE-2024-43869](https://nvd.nist.gov/vuln/detail/CVE-2024-43869), [CVE-2024-43870](https://nvd.nist.gov/vuln/detail/CVE-2024-43870), [CVE-2024-43856](https://nvd.nist.gov/vuln/detail/CVE-2024-43856), [CVE-2024-43860](https://nvd.nist.gov/vuln/detail/CVE-2024-43860), [CVE-2024-43859](https://nvd.nist.gov/vuln/detail/CVE-2024-43859), [CVE-2024-43858](https://nvd.nist.gov/vuln/detail/CVE-2024-43858), [CVE-2024-43833](https://nvd.nist.gov/vuln/detail/CVE-2024-43833), [CVE-2024-43832](https://nvd.nist.gov/vuln/detail/CVE-2024-43832), [CVE-2024-43831](https://nvd.nist.gov/vuln/detail/CVE-2024-43831), [CVE-2024-43830](https://nvd.nist.gov/vuln/detail/CVE-2024-43830), [CVE-2024-43829](https://nvd.nist.gov/vuln/detail/CVE-2024-43829), [CVE-2024-43828](https://nvd.nist.gov/vuln/detail/CVE-2024-43828), [CVE-2024-43855](https://nvd.nist.gov/vuln/detail/CVE-2024-43855), [CVE-2024-43854](https://nvd.nist.gov/vuln/detail/CVE-2024-43854), [CVE-2024-43853](https://nvd.nist.gov/vuln/detail/CVE-2024-43853), [CVE-2024-43851](https://nvd.nist.gov/vuln/detail/CVE-2024-43851), [CVE-2024-43850](https://nvd.nist.gov/vuln/detail/CVE-2024-43850), [CVE-2024-43849](https://nvd.nist.gov/vuln/detail/CVE-2024-43849), [CVE-2024-43847](https://nvd.nist.gov/vuln/detail/CVE-2024-43847), [CVE-2024-43846](https://nvd.nist.gov/vuln/detail/CVE-2024-43846), [CVE-2024-43845](https://nvd.nist.gov/vuln/detail/CVE-2024-43845), [CVE-2024-43842](https://nvd.nist.gov/vuln/detail/CVE-2024-43842), [CVE-2024-43841](https://nvd.nist.gov/vuln/detail/CVE-2024-43841), [CVE-2024-43839](https://nvd.nist.gov/vuln/detail/CVE-2024-43839), [CVE-2024-43837](https://nvd.nist.gov/vuln/detail/CVE-2024-43837), [CVE-2024-43834](https://nvd.nist.gov/vuln/detail/CVE-2024-43834), [CVE-2024-43825](https://nvd.nist.gov/vuln/detail/CVE-2024-43825), [CVE-2024-43823](https://nvd.nist.gov/vuln/detail/CVE-2024-43823), [CVE-2024-43821](https://nvd.nist.gov/vuln/detail/CVE-2024-43821), [CVE-2024-43818](https://nvd.nist.gov/vuln/detail/CVE-2024-43818), [CVE-2024-43817](https://nvd.nist.gov/vuln/detail/CVE-2024-43817), [CVE-2024-42321](https://nvd.nist.gov/vuln/detail/CVE-2024-42321), [CVE-2024-42322](https://nvd.nist.gov/vuln/detail/CVE-2024-42322), [CVE-2024-42288](https://nvd.nist.gov/vuln/detail/CVE-2024-42288), [CVE-2024-42297](https://nvd.nist.gov/vuln/detail/CVE-2024-42297), [CVE-2024-42296](https://nvd.nist.gov/vuln/detail/CVE-2024-42296), [CVE-2024-42295](https://nvd.nist.gov/vuln/detail/CVE-2024-42295), [CVE-2024-42294](https://nvd.nist.gov/vuln/detail/CVE-2024-42294), [CVE-2024-42292](https://nvd.nist.gov/vuln/detail/CVE-2024-42292), [CVE-2024-42320](https://nvd.nist.gov/vuln/detail/CVE-2024-42320), [CVE-2024-42318](https://nvd.nist.gov/vuln/detail/CVE-2024-42318), [CVE-2024-42291](https://nvd.nist.gov/vuln/detail/CVE-2024-42291), [CVE-2024-42316](https://nvd.nist.gov/vuln/detail/CVE-2024-42316), [CVE-2024-42315](https://nvd.nist.gov/vuln/detail/CVE-2024-42315), [CVE-2024-42314](https://nvd.nist.gov/vuln/detail/CVE-2024-42314), [CVE-2024-42313](https://nvd.nist.gov/vuln/detail/CVE-2024-42313), [CVE-2024-42311](https://nvd.nist.gov/vuln/detail/CVE-2024-42311), [CVE-2024-42310](https://nvd.nist.gov/vuln/detail/CVE-2024-42310), [CVE-2024-42309](https://nvd.nist.gov/vuln/detail/CVE-2024-42309), [CVE-2024-42308](https://nvd.nist.gov/vuln/detail/CVE-2024-42308), [CVE-2024-42290](https://nvd.nist.gov/vuln/detail/CVE-2024-42290), [CVE-2024-42307](https://nvd.nist.gov/vuln/detail/CVE-2024-42307), [CVE-2024-42306](https://nvd.nist.gov/vuln/detail/CVE-2024-42306), [CVE-2024-42305](https://nvd.nist.gov/vuln/detail/CVE-2024-42305), [CVE-2024-42304](https://nvd.nist.gov/vuln/detail/CVE-2024-42304), [CVE-2024-42303](https://nvd.nist.gov/vuln/detail/CVE-2024-42303), [CVE-2024-42302](https://nvd.nist.gov/vuln/detail/CVE-2024-42302), [CVE-2024-42301](https://nvd.nist.gov/vuln/detail/CVE-2024-42301), [CVE-2024-42299](https://nvd.nist.gov/vuln/detail/CVE-2024-42299), [CVE-2024-42298](https://nvd.nist.gov/vuln/detail/CVE-2024-42298), [CVE-2024-42289](https://nvd.nist.gov/vuln/detail/CVE-2024-42289), [CVE-2024-42284](https://nvd.nist.gov/vuln/detail/CVE-2024-42284), [CVE-2024-42283](https://nvd.nist.gov/vuln/detail/CVE-2024-42283), [CVE-2024-42281](https://nvd.nist.gov/vuln/detail/CVE-2024-42281), [CVE-2024-42280](https://nvd.nist.gov/vuln/detail/CVE-2024-42280), [CVE-2024-42279](https://nvd.nist.gov/vuln/detail/CVE-2024-42279), [CVE-2024-42278](https://nvd.nist.gov/vuln/detail/CVE-2024-42278), [CVE-2024-42277](https://nvd.nist.gov/vuln/detail/CVE-2024-42277), [CVE-2024-42287](https://nvd.nist.gov/vuln/detail/CVE-2024-42287), [CVE-2024-42286](https://nvd.nist.gov/vuln/detail/CVE-2024-42286), [CVE-2024-42285](https://nvd.nist.gov/vuln/detail/CVE-2024-42285), [CVE-2023-52889](https://nvd.nist.gov/vuln/detail/CVE-2023-52889), [CVE-2024-42276](https://nvd.nist.gov/vuln/detail/CVE-2024-42276), [CVE-2024-43867](https://nvd.nist.gov/vuln/detail/CVE-2024-43867), [CVE-2024-43866](https://nvd.nist.gov/vuln/detail/CVE-2024-43866), [CVE-2024-43864](https://nvd.nist.gov/vuln/detail/CVE-2024-43864), [CVE-2024-43863](https://nvd.nist.gov/vuln/detail/CVE-2024-43863), [CVE-2024-42312](https://nvd.nist.gov/vuln/detail/CVE-2024-42312), [CVE-2024-42274](https://nvd.nist.gov/vuln/detail/CVE-2024-42274), [CVE-2024-42273](https://nvd.nist.gov/vuln/detail/CVE-2024-42273), [CVE-2024-42272](https://nvd.nist.gov/vuln/detail/CVE-2024-42272), [CVE-2024-42271](https://nvd.nist.gov/vuln/detail/CVE-2024-42271), [CVE-2024-42270](https://nvd.nist.gov/vuln/detail/CVE-2024-42270), [CVE-2024-42269](https://nvd.nist.gov/vuln/detail/CVE-2024-42269), [CVE-2024-42268](https://nvd.nist.gov/vuln/detail/CVE-2024-42268), [CVE-2024-42267](https://nvd.nist.gov/vuln/detail/CVE-2024-42267), [CVE-2024-42265](https://nvd.nist.gov/vuln/detail/CVE-2024-42265), [CVE-2024-43908](https://nvd.nist.gov/vuln/detail/CVE-2024-43908), [CVE-2024-44931](https://nvd.nist.gov/vuln/detail/CVE-2024-44931), [CVE-2024-43914](https://nvd.nist.gov/vuln/detail/CVE-2024-43914), [CVE-2024-43912](https://nvd.nist.gov/vuln/detail/CVE-2024-43912), [CVE-2024-44935](https://nvd.nist.gov/vuln/detail/CVE-2024-44935), [CVE-2024-44934](https://nvd.nist.gov/vuln/detail/CVE-2024-44934), [CVE-2024-43909](https://nvd.nist.gov/vuln/detail/CVE-2024-43909), [CVE-2024-43905](https://nvd.nist.gov/vuln/detail/CVE-2024-43905), [CVE-2024-43903](https://nvd.nist.gov/vuln/detail/CVE-2024-43903), [CVE-2024-43902](https://nvd.nist.gov/vuln/detail/CVE-2024-43902), [CVE-2024-43900](https://nvd.nist.gov/vuln/detail/CVE-2024-43900), [CVE-2024-43907](https://nvd.nist.gov/vuln/detail/CVE-2024-43907), [CVE-2024-43906](https://nvd.nist.gov/vuln/detail/CVE-2024-43906), [CVE-2024-43897](https://nvd.nist.gov/vuln/detail/CVE-2024-43897), [CVE-2024-43894](https://nvd.nist.gov/vuln/detail/CVE-2024-43894), [CVE-2024-43893](https://nvd.nist.gov/vuln/detail/CVE-2024-43893), [CVE-2024-43892](https://nvd.nist.gov/vuln/detail/CVE-2024-43892), [CVE-2024-43890](https://nvd.nist.gov/vuln/detail/CVE-2024-43890), [CVE-2024-43889](https://nvd.nist.gov/vuln/detail/CVE-2024-43889), [CVE-2024-43895](https://nvd.nist.gov/vuln/detail/CVE-2024-43895), [CVE-2024-43883](https://nvd.nist.gov/vuln/detail/CVE-2024-43883), [CVE-2024-43861](https://nvd.nist.gov/vuln/detail/CVE-2024-43861), [CVE-2024-42259](https://nvd.nist.gov/vuln/detail/CVE-2024-42259), [CVE-2024-44943](https://nvd.nist.gov/vuln/detail/CVE-2024-44943), [CVE-2024-44942](https://nvd.nist.gov/vuln/detail/CVE-2024-44942), [CVE-2024-44941](https://nvd.nist.gov/vuln/detail/CVE-2024-44941), [CVE-2024-44940](https://nvd.nist.gov/vuln/detail/CVE-2024-44940), [CVE-2024-44938](https://nvd.nist.gov/vuln/detail/CVE-2024-44938), [CVE-2024-44939](https://nvd.nist.gov/vuln/detail/CVE-2024-44939), [CVE-2024-43898](https://nvd.nist.gov/vuln/detail/CVE-2024-43898), [CVE-2024-43882](https://nvd.nist.gov/vuln/detail/CVE-2024-43882), [CVE-2024-44947](https://nvd.nist.gov/vuln/detail/CVE-2024-44947), [CVE-2024-44946](https://nvd.nist.gov/vuln/detail/CVE-2024-44946))\n\n#### Bug fixes:\n\n- Fix ownership of systemd units shipped with built-in docker/containerd sysexts. The files shipped on production images were accidentally owned by 1000:1000 instead of 0:0. This uid/gid is not present on Flatcar images but would be assigned to the first created user. Due to contents of sysexts and /usr being readonly on Flatcar, the invalid permissions can't be used to escalate privileges. ([scripts#2266](https://github.com/flatcar/scripts/pull/2266))\n- Equinix Metal: Fixed oem-cloudinit.service. The availability check now uses the https://metadata.platformequinix.com/metadata endpoint. ([scripts#2222](https://github.com/flatcar/scripts/pull/2222))\n\n#### Updates:\n\n- Linux ([6.6.48](https://lwn.net/Articles/987679) (includes [6.6.47](https://lwn.net/Articles/986231/), [6.6.46](https://lwn.net/Articles/985672), [6.6.45](https://lwn.net/Articles/985200), [6.6.44](https://lwn.net/Articles/984450)))\n- ca-certificates ([3.104](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_104.html))"
  },
  "4081.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-10-10 12:24:32 +0000",
    "major_software": {
      "containerd": [
        "1.7.21"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.54"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": " _Changes since **Beta 4054.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2024-46711](https://nvd.nist.gov/vuln/detail/CVE-2024-46711), [CVE-2024-46709](https://nvd.nist.gov/vuln/detail/CVE-2024-46709), [CVE-2024-46680](https://nvd.nist.gov/vuln/detail/CVE-2024-46680), [CVE-2024-46679](https://nvd.nist.gov/vuln/detail/CVE-2024-46679), [CVE-2024-46678](https://nvd.nist.gov/vuln/detail/CVE-2024-46678), [CVE-2024-46677](https://nvd.nist.gov/vuln/detail/CVE-2024-46677), [CVE-2024-46676](https://nvd.nist.gov/vuln/detail/CVE-2024-46676), [CVE-2024-46695](https://nvd.nist.gov/vuln/detail/CVE-2024-46695), [CVE-2024-46694](https://nvd.nist.gov/vuln/detail/CVE-2024-46694), [CVE-2024-46693](https://nvd.nist.gov/vuln/detail/CVE-2024-46693), [CVE-2024-46675](https://nvd.nist.gov/vuln/detail/CVE-2024-46675), [CVE-2024-46692](https://nvd.nist.gov/vuln/detail/CVE-2024-46692), [CVE-2024-46689](https://nvd.nist.gov/vuln/detail/CVE-2024-46689), [CVE-2024-46687](https://nvd.nist.gov/vuln/detail/CVE-2024-46687), [CVE-2024-46686](https://nvd.nist.gov/vuln/detail/CVE-2024-46686), [CVE-2024-46685](https://nvd.nist.gov/vuln/detail/CVE-2024-46685), [CVE-2024-46673](https://nvd.nist.gov/vuln/detail/CVE-2024-46673), [CVE-2024-46674](https://nvd.nist.gov/vuln/detail/CVE-2024-46674), [CVE-2024-46811](https://nvd.nist.gov/vuln/detail/CVE-2024-46811), [CVE-2024-46810](https://nvd.nist.gov/vuln/detail/CVE-2024-46810), [CVE-2024-46809](https://nvd.nist.gov/vuln/detail/CVE-2024-46809), [CVE-2024-46807](https://nvd.nist.gov/vuln/detail/CVE-2024-46807), [CVE-2024-46806](https://nvd.nist.gov/vuln/detail/CVE-2024-46806), [CVE-2024-46805](https://nvd.nist.gov/vuln/detail/CVE-2024-46805), [CVE-2024-46804](https://nvd.nist.gov/vuln/detail/CVE-2024-46804), [CVE-2024-46821](https://nvd.nist.gov/vuln/detail/CVE-2024-46821), [CVE-2024-46819](https://nvd.nist.gov/vuln/detail/CVE-2024-46819), [CVE-2024-46818](https://nvd.nist.gov/vuln/detail/CVE-2024-46818), [CVE-2024-46817](https://nvd.nist.gov/vuln/detail/CVE-2024-46817), [CVE-2024-46815](https://nvd.nist.gov/vuln/detail/CVE-2024-46815), [CVE-2024-46814](https://nvd.nist.gov/vuln/detail/CVE-2024-46814), [CVE-2024-46812](https://nvd.nist.gov/vuln/detail/CVE-2024-46812), [CVE-2024-46802](https://nvd.nist.gov/vuln/detail/CVE-2024-46802), [CVE-2024-46803](https://nvd.nist.gov/vuln/detail/CVE-2024-46803), [CVE-2024-46724](https://nvd.nist.gov/vuln/detail/CVE-2024-46724), [CVE-2024-46732](https://nvd.nist.gov/vuln/detail/CVE-2024-46732), [CVE-2024-46731](https://nvd.nist.gov/vuln/detail/CVE-2024-46731), [CVE-2024-46728](https://nvd.nist.gov/vuln/detail/CVE-2024-46728), [CVE-2024-46726](https://nvd.nist.gov/vuln/detail/CVE-2024-46726), [CVE-2024-46725](https://nvd.nist.gov/vuln/detail/CVE-2024-46725), [CVE-2024-46723](https://nvd.nist.gov/vuln/detail/CVE-2024-46723), [CVE-2024-46722](https://nvd.nist.gov/vuln/detail/CVE-2024-46722), [CVE-2024-46721](https://nvd.nist.gov/vuln/detail/CVE-2024-46721), [CVE-2024-46720](https://nvd.nist.gov/vuln/detail/CVE-2024-46720), [CVE-2024-46719](https://nvd.nist.gov/vuln/detail/CVE-2024-46719), [CVE-2024-46717](https://nvd.nist.gov/vuln/detail/CVE-2024-46717), [CVE-2024-46716](https://nvd.nist.gov/vuln/detail/CVE-2024-46716), [CVE-2024-46714](https://nvd.nist.gov/vuln/detail/CVE-2024-46714), [CVE-2024-46715](https://nvd.nist.gov/vuln/detail/CVE-2024-46715), [CVE-2024-46831](https://nvd.nist.gov/vuln/detail/CVE-2024-46831), [CVE-2024-46840](https://nvd.nist.gov/vuln/detail/CVE-2024-46840), [CVE-2024-46839](https://nvd.nist.gov/vuln/detail/CVE-2024-46839), [CVE-2024-46838](https://nvd.nist.gov/vuln/detail/CVE-2024-46838), [CVE-2024-46836](https://nvd.nist.gov/vuln/detail/CVE-2024-46836), [CVE-2024-46835](https://nvd.nist.gov/vuln/detail/CVE-2024-46835), [CVE-2024-46848](https://nvd.nist.gov/vuln/detail/CVE-2024-46848), [CVE-2024-46847](https://nvd.nist.gov/vuln/detail/CVE-2024-46847), [CVE-2024-46846](https://nvd.nist.gov/vuln/detail/CVE-2024-46846), [CVE-2024-46845](https://nvd.nist.gov/vuln/detail/CVE-2024-46845), [CVE-2024-46844](https://nvd.nist.gov/vuln/detail/CVE-2024-46844), [CVE-2024-46843](https://nvd.nist.gov/vuln/detail/CVE-2024-46843), [CVE-2024-46832](https://nvd.nist.gov/vuln/detail/CVE-2024-46832), [CVE-2024-46830](https://nvd.nist.gov/vuln/detail/CVE-2024-46830), [CVE-2024-46829](https://nvd.nist.gov/vuln/detail/CVE-2024-46829), [CVE-2024-46828](https://nvd.nist.gov/vuln/detail/CVE-2024-46828), [CVE-2024-46827](https://nvd.nist.gov/vuln/detail/CVE-2024-46827), [CVE-2024-46826](https://nvd.nist.gov/vuln/detail/CVE-2024-46826), [CVE-2024-46825](https://nvd.nist.gov/vuln/detail/CVE-2024-46825), [CVE-2024-46822](https://nvd.nist.gov/vuln/detail/CVE-2024-46822), [CVE-2024-46788](https://nvd.nist.gov/vuln/detail/CVE-2024-46788), [CVE-2024-46797](https://nvd.nist.gov/vuln/detail/CVE-2024-46797), [CVE-2024-46796](https://nvd.nist.gov/vuln/detail/CVE-2024-46796), [CVE-2024-46795](https://nvd.nist.gov/vuln/detail/CVE-2024-46795), [CVE-2024-46794](https://nvd.nist.gov/vuln/detail/CVE-2024-46794), [CVE-2024-46791](https://nvd.nist.gov/vuln/detail/CVE-2024-46791), [CVE-2024-46800](https://nvd.nist.gov/vuln/detail/CVE-2024-46800), [CVE-2024-46798](https://nvd.nist.gov/vuln/detail/CVE-2024-46798), [CVE-2024-46760](https://nvd.nist.gov/vuln/detail/CVE-2024-46760), [CVE-2024-46768](https://nvd.nist.gov/vuln/detail/CVE-2024-46768), [CVE-2024-46767](https://nvd.nist.gov/vuln/detail/CVE-2024-46767), [CVE-2024-46765](https://nvd.nist.gov/vuln/detail/CVE-2024-46765), [CVE-2024-46763](https://nvd.nist.gov/vuln/detail/CVE-2024-46763), [CVE-2024-46787](https://nvd.nist.gov/vuln/detail/CVE-2024-46787), [CVE-2024-46786](https://nvd.nist.gov/vuln/detail/CVE-2024-46786), [CVE-2024-46785](https://nvd.nist.gov/vuln/detail/CVE-2024-46785), [CVE-2024-46784](https://nvd.nist.gov/vuln/detail/CVE-2024-46784), [CVE-2024-46783](https://nvd.nist.gov/vuln/detail/CVE-2024-46783), [CVE-2024-46782](https://nvd.nist.gov/vuln/detail/CVE-2024-46782), [CVE-2024-46781](https://nvd.nist.gov/vuln/detail/CVE-2024-46781), [CVE-2024-46780](https://nvd.nist.gov/vuln/detail/CVE-2024-46780), [CVE-2024-46762](https://nvd.nist.gov/vuln/detail/CVE-2024-46762), [CVE-2024-46777](https://nvd.nist.gov/vuln/detail/CVE-2024-46777), [CVE-2024-46776](https://nvd.nist.gov/vuln/detail/CVE-2024-46776), [CVE-2024-46773](https://nvd.nist.gov/vuln/detail/CVE-2024-46773), [CVE-2024-46771](https://nvd.nist.gov/vuln/detail/CVE-2024-46771), [CVE-2024-46770](https://nvd.nist.gov/vuln/detail/CVE-2024-46770), [CVE-2024-46761](https://nvd.nist.gov/vuln/detail/CVE-2024-46761), [CVE-2024-46743](https://nvd.nist.gov/vuln/detail/CVE-2024-46743), [CVE-2024-46742](https://nvd.nist.gov/vuln/detail/CVE-2024-46742), [CVE-2024-46741](https://nvd.nist.gov/vuln/detail/CVE-2024-46741), [CVE-2024-46740](https://nvd.nist.gov/vuln/detail/CVE-2024-46740), [CVE-2024-46739](https://nvd.nist.gov/vuln/detail/CVE-2024-46739), [CVE-2024-46738](https://nvd.nist.gov/vuln/detail/CVE-2024-46738), [CVE-2024-46737](https://nvd.nist.gov/vuln/detail/CVE-2024-46737), [CVE-2024-46759](https://nvd.nist.gov/vuln/detail/CVE-2024-46759), [CVE-2024-46758](https://nvd.nist.gov/vuln/detail/CVE-2024-46758), [CVE-2024-46757](https://nvd.nist.gov/vuln/detail/CVE-2024-46757), [CVE-2024-46756](https://nvd.nist.gov/vuln/detail/CVE-2024-46756), [CVE-2024-46755](https://nvd.nist.gov/vuln/detail/CVE-2024-46755), [CVE-2024-46736](https://nvd.nist.gov/vuln/detail/CVE-2024-46736), [CVE-2024-46752](https://nvd.nist.gov/vuln/detail/CVE-2024-46752), [CVE-2024-46750](https://nvd.nist.gov/vuln/detail/CVE-2024-46750), [CVE-2024-46749](https://nvd.nist.gov/vuln/detail/CVE-2024-46749), [CVE-2024-46747](https://nvd.nist.gov/vuln/detail/CVE-2024-46747), [CVE-2024-46746](https://nvd.nist.gov/vuln/detail/CVE-2024-46746), [CVE-2024-46745](https://nvd.nist.gov/vuln/detail/CVE-2024-46745), [CVE-2024-46744](https://nvd.nist.gov/vuln/detail/CVE-2024-46744), [CVE-2024-46734](https://nvd.nist.gov/vuln/detail/CVE-2024-46734), [CVE-2024-46735](https://nvd.nist.gov/vuln/detail/CVE-2024-46735), [CVE-2024-46713](https://nvd.nist.gov/vuln/detail/CVE-2024-46713), [CVE-2024-46858](https://nvd.nist.gov/vuln/detail/CVE-2024-46858), [CVE-2024-46857](https://nvd.nist.gov/vuln/detail/CVE-2024-46857), [CVE-2024-46855](https://nvd.nist.gov/vuln/detail/CVE-2024-46855), [CVE-2024-46854](https://nvd.nist.gov/vuln/detail/CVE-2024-46854), [CVE-2024-46853](https://nvd.nist.gov/vuln/detail/CVE-2024-46853), [CVE-2024-46852](https://nvd.nist.gov/vuln/detail/CVE-2024-46852), [CVE-2024-46865](https://nvd.nist.gov/vuln/detail/CVE-2024-46865), [CVE-2024-46864](https://nvd.nist.gov/vuln/detail/CVE-2024-46864), [CVE-2024-46861](https://nvd.nist.gov/vuln/detail/CVE-2024-46861), [CVE-2024-46860](https://nvd.nist.gov/vuln/detail/CVE-2024-46860), [CVE-2024-46859](https://nvd.nist.gov/vuln/detail/CVE-2024-46859), [CVE-2024-46849](https://nvd.nist.gov/vuln/detail/CVE-2024-46849))\n - curl ([CVE-2024-7264](https://nvd.nist.gov/vuln/detail/CVE-2024-7264))\n - expat ([CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490))\n - linux-firmware ([CVE-2023-31315](https://nvd.nist.gov/vuln/detail/CVE-2023-31315))\n - SDK: re2c ([CVE-2022-23901](https://nvd.nist.gov/vuln/detail/CVE-2022-23901))\n \n #### Bug fixes:\n \n - CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: ([flatcar/scripts#2016](https://github.com/flatcar/scripts/pull/2016))\n - Fixed the initrd option in the QEMU launcher script. It was -R, but this was already taken by the read-only pflash option, so use -r instead. ([scripts#2239](https://github.com/flatcar/scripts/pull/2239))\n - Equinix Metal: fixed race condition on 'mount' Ignition stage ([scripts#2308](https://github.com/flatcar/scripts/pull/2308))\n - Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. ([Flatcar#1514](https://github.com/flatcar/flatcar/pull/1514))\n \n #### Changes:\n \n - Azure, HyperV: Added daemons `kvp`, `vss`, and `fcopy` for better HyperV hypervisor integration with Flatcar guests ([scripts#2309](https://github.com/flatcar/scripts/pull/2309)).\n - Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers ([flatcar/scripts#2355](https://github.com/flatcar/scripts/pull/2355))\n - Replace nmap netcat with openbsd variant. The license didn't get an exception from CNCF. Something about the definition of \"derivative works\" being too broad.\n - The `docker build` command will now use buildx as its backend as the old one became deprecated and a loud \"DEPRECATED\" information is printed every time it's used.\n \n #### Updates:\n \n - Go ([1.21.13](https://go.dev/doc/devel/release#go1.21.13))\n - Linux ([6.6.54](https://lwn.net/Articles/992980) (includes [6.6.53](https://lwn.net/Articles/992296), [6.6.52](https://lwn.net/Articles/990767/), [6.6.51](https://lwn.net/Articles/990045), [6.6.50](https://lwn.net/Articles/989411/), [6.6.49](https://lwn.net/Articles/988749)))\n - Linux Firmware ([20240811](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240811))\n - Open-iSCSI ([2.1.10](https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.10))\n - azure: azure-nvme-utils ([0.2.0](https://github.com/Azure/azure-nvme-utils/releases/tag/v0.2.0))\n - ca-certificates ([3.105](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html))\n - conntrack-tools ([1.4.8](https://lwn.net/Articles/945927/))\n - containerd ([1.7.21](https://github.com/containerd/containerd/releases/tag/v1.7.21))\n - curl ([8.9.1](https://curl.se/ch/8.9.1.html))\n - dev: minicom ([2.9](https://salsa.debian.org/minicom-team/minicom/-/releases/2.9))\n - elfutils ([0.191](https://inbox.sourceware.org/elfutils-devel/CAJDtP-SJhJ8cjTpkNpi+F0nzVJ2pZsEai8Ewpp4yJmsO_H5-NA@mail.gmail.com/T/#u))\n - expat ([2.6.3](https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes))\n - gce, sysext-python: setuptools ([71.1.0](https://github.com/pypa/setuptools/blob/v71.1.0/NEWS.rst) (includes [71.0.0](https://github.com/pypa/setuptools/blob/v71.0.0/NEWS.rst)))\n - gce, sysext-python: setuptools ([72.1.0](https://github.com/pypa/setuptools/blob/v72.1.0/NEWS.rst))\n - gflags ([2.2.2](https://github.com/gflags/gflags/releases/tag/v2.2.2))\n - glog ([0.6.0](https://github.com/google/glog/releases/tag/v0.6.0))\n - libmicrohttpd ([1.0.1](https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00005.html) (inlcudes [1.0.0](https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00000.html)))\n - lz4 ([1.10.0](https://github.com/lz4/lz4/releases/tag/v1.10.0))\n - nghttp2 ([1.62.1](https://github.com/nghttp2/nghttp2/releases/tag/v1.62.1))\n - npth ([1.7](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=c1b631b4294eabfef29baefd60e1b0dfecce710d;hb=75c68399ef3bbb5d024f2a60474a7214fa479016))\n - pahole ([1.27](https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.27))\n - SDK: Rust ([1.80.1](https://github.com/rust-lang/rust/releases/tag/1.80.1))\n - SDK: meson ([1.5.1](https://mesonbuild.com/Release-notes-for-1-5-0.html))\n - sysext-python: more-itertools ([10.4.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.4.0))\n - sysext-python: pip ([24.1.2](https://github.com/pypa/pip/blob/24.1.2/NEWS.rst))\n - sysext-python: pip ([24.2](https://github.com/pypa/pip/blob/24.2/NEWS.rst))\n - sysext-python: wheel ([0.44.0](https://github.com/pypa/wheel/releases/tag/0.44.0))\n - sysext-zfs: zfs ([2.2.5](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.5) (includes [2.2.4](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.4)))\n - tcpdump ([4.99.4](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.4/CHANGES))\n \n _Changes since **Alpha 4081.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2024-46711](https://nvd.nist.gov/vuln/detail/CVE-2024-46711), [CVE-2024-46709](https://nvd.nist.gov/vuln/detail/CVE-2024-46709), [CVE-2024-46680](https://nvd.nist.gov/vuln/detail/CVE-2024-46680), [CVE-2024-46679](https://nvd.nist.gov/vuln/detail/CVE-2024-46679), [CVE-2024-46678](https://nvd.nist.gov/vuln/detail/CVE-2024-46678), [CVE-2024-46677](https://nvd.nist.gov/vuln/detail/CVE-2024-46677), [CVE-2024-46676](https://nvd.nist.gov/vuln/detail/CVE-2024-46676), [CVE-2024-46695](https://nvd.nist.gov/vuln/detail/CVE-2024-46695), [CVE-2024-46694](https://nvd.nist.gov/vuln/detail/CVE-2024-46694), [CVE-2024-46693](https://nvd.nist.gov/vuln/detail/CVE-2024-46693), [CVE-2024-46675](https://nvd.nist.gov/vuln/detail/CVE-2024-46675), [CVE-2024-46692](https://nvd.nist.gov/vuln/detail/CVE-2024-46692), [CVE-2024-46689](https://nvd.nist.gov/vuln/detail/CVE-2024-46689), [CVE-2024-46687](https://nvd.nist.gov/vuln/detail/CVE-2024-46687), [CVE-2024-46686](https://nvd.nist.gov/vuln/detail/CVE-2024-46686), [CVE-2024-46685](https://nvd.nist.gov/vuln/detail/CVE-2024-46685), [CVE-2024-46673](https://nvd.nist.gov/vuln/detail/CVE-2024-46673), [CVE-2024-46674](https://nvd.nist.gov/vuln/detail/CVE-2024-46674), [CVE-2024-46811](https://nvd.nist.gov/vuln/detail/CVE-2024-46811), [CVE-2024-46810](https://nvd.nist.gov/vuln/detail/CVE-2024-46810), [CVE-2024-46809](https://nvd.nist.gov/vuln/detail/CVE-2024-46809), [CVE-2024-46807](https://nvd.nist.gov/vuln/detail/CVE-2024-46807), [CVE-2024-46806](https://nvd.nist.gov/vuln/detail/CVE-2024-46806), [CVE-2024-46805](https://nvd.nist.gov/vuln/detail/CVE-2024-46805), [CVE-2024-46804](https://nvd.nist.gov/vuln/detail/CVE-2024-46804), [CVE-2024-46821](https://nvd.nist.gov/vuln/detail/CVE-2024-46821), [CVE-2024-46819](https://nvd.nist.gov/vuln/detail/CVE-2024-46819), [CVE-2024-46818](https://nvd.nist.gov/vuln/detail/CVE-2024-46818), [CVE-2024-46817](https://nvd.nist.gov/vuln/detail/CVE-2024-46817), [CVE-2024-46815](https://nvd.nist.gov/vuln/detail/CVE-2024-46815), [CVE-2024-46814](https://nvd.nist.gov/vuln/detail/CVE-2024-46814), [CVE-2024-46812](https://nvd.nist.gov/vuln/detail/CVE-2024-46812), [CVE-2024-46802](https://nvd.nist.gov/vuln/detail/CVE-2024-46802), [CVE-2024-46803](https://nvd.nist.gov/vuln/detail/CVE-2024-46803), [CVE-2024-46724](https://nvd.nist.gov/vuln/detail/CVE-2024-46724), [CVE-2024-46732](https://nvd.nist.gov/vuln/detail/CVE-2024-46732), [CVE-2024-46731](https://nvd.nist.gov/vuln/detail/CVE-2024-46731), [CVE-2024-46728](https://nvd.nist.gov/vuln/detail/CVE-2024-46728), [CVE-2024-46726](https://nvd.nist.gov/vuln/detail/CVE-2024-46726), [CVE-2024-46725](https://nvd.nist.gov/vuln/detail/CVE-2024-46725), [CVE-2024-46723](https://nvd.nist.gov/vuln/detail/CVE-2024-46723), [CVE-2024-46722](https://nvd.nist.gov/vuln/detail/CVE-2024-46722), [CVE-2024-46721](https://nvd.nist.gov/vuln/detail/CVE-2024-46721), [CVE-2024-46720](https://nvd.nist.gov/vuln/detail/CVE-2024-46720), [CVE-2024-46719](https://nvd.nist.gov/vuln/detail/CVE-2024-46719), [CVE-2024-46717](https://nvd.nist.gov/vuln/detail/CVE-2024-46717), [CVE-2024-46716](https://nvd.nist.gov/vuln/detail/CVE-2024-46716), [CVE-2024-46714](https://nvd.nist.gov/vuln/detail/CVE-2024-46714), [CVE-2024-46715](https://nvd.nist.gov/vuln/detail/CVE-2024-46715), [CVE-2024-46831](https://nvd.nist.gov/vuln/detail/CVE-2024-46831), [CVE-2024-46840](https://nvd.nist.gov/vuln/detail/CVE-2024-46840), [CVE-2024-46839](https://nvd.nist.gov/vuln/detail/CVE-2024-46839), [CVE-2024-46838](https://nvd.nist.gov/vuln/detail/CVE-2024-46838), [CVE-2024-46836](https://nvd.nist.gov/vuln/detail/CVE-2024-46836), [CVE-2024-46835](https://nvd.nist.gov/vuln/detail/CVE-2024-46835), [CVE-2024-46848](https://nvd.nist.gov/vuln/detail/CVE-2024-46848), [CVE-2024-46847](https://nvd.nist.gov/vuln/detail/CVE-2024-46847), [CVE-2024-46846](https://nvd.nist.gov/vuln/detail/CVE-2024-46846), [CVE-2024-46845](https://nvd.nist.gov/vuln/detail/CVE-2024-46845), [CVE-2024-46844](https://nvd.nist.gov/vuln/detail/CVE-2024-46844), [CVE-2024-46843](https://nvd.nist.gov/vuln/detail/CVE-2024-46843), [CVE-2024-46832](https://nvd.nist.gov/vuln/detail/CVE-2024-46832), [CVE-2024-46830](https://nvd.nist.gov/vuln/detail/CVE-2024-46830), [CVE-2024-46829](https://nvd.nist.gov/vuln/detail/CVE-2024-46829), [CVE-2024-46828](https://nvd.nist.gov/vuln/detail/CVE-2024-46828), [CVE-2024-46827](https://nvd.nist.gov/vuln/detail/CVE-2024-46827), [CVE-2024-46826](https://nvd.nist.gov/vuln/detail/CVE-2024-46826), [CVE-2024-46825](https://nvd.nist.gov/vuln/detail/CVE-2024-46825), [CVE-2024-46822](https://nvd.nist.gov/vuln/detail/CVE-2024-46822), [CVE-2024-46788](https://nvd.nist.gov/vuln/detail/CVE-2024-46788), [CVE-2024-46797](https://nvd.nist.gov/vuln/detail/CVE-2024-46797), [CVE-2024-46796](https://nvd.nist.gov/vuln/detail/CVE-2024-46796), [CVE-2024-46795](https://nvd.nist.gov/vuln/detail/CVE-2024-46795), [CVE-2024-46794](https://nvd.nist.gov/vuln/detail/CVE-2024-46794), [CVE-2024-46791](https://nvd.nist.gov/vuln/detail/CVE-2024-46791), [CVE-2024-46800](https://nvd.nist.gov/vuln/detail/CVE-2024-46800), [CVE-2024-46798](https://nvd.nist.gov/vuln/detail/CVE-2024-46798), [CVE-2024-46760](https://nvd.nist.gov/vuln/detail/CVE-2024-46760), [CVE-2024-46768](https://nvd.nist.gov/vuln/detail/CVE-2024-46768), [CVE-2024-46767](https://nvd.nist.gov/vuln/detail/CVE-2024-46767), [CVE-2024-46765](https://nvd.nist.gov/vuln/detail/CVE-2024-46765), [CVE-2024-46763](https://nvd.nist.gov/vuln/detail/CVE-2024-46763), [CVE-2024-46787](https://nvd.nist.gov/vuln/detail/CVE-2024-46787), [CVE-2024-46786](https://nvd.nist.gov/vuln/detail/CVE-2024-46786), [CVE-2024-46785](https://nvd.nist.gov/vuln/detail/CVE-2024-46785), [CVE-2024-46784](https://nvd.nist.gov/vuln/detail/CVE-2024-46784), [CVE-2024-46783](https://nvd.nist.gov/vuln/detail/CVE-2024-46783), [CVE-2024-46782](https://nvd.nist.gov/vuln/detail/CVE-2024-46782), [CVE-2024-46781](https://nvd.nist.gov/vuln/detail/CVE-2024-46781), [CVE-2024-46780](https://nvd.nist.gov/vuln/detail/CVE-2024-46780), [CVE-2024-46762](https://nvd.nist.gov/vuln/detail/CVE-2024-46762), [CVE-2024-46777](https://nvd.nist.gov/vuln/detail/CVE-2024-46777), [CVE-2024-46776](https://nvd.nist.gov/vuln/detail/CVE-2024-46776), [CVE-2024-46773](https://nvd.nist.gov/vuln/detail/CVE-2024-46773), [CVE-2024-46771](https://nvd.nist.gov/vuln/detail/CVE-2024-46771), [CVE-2024-46770](https://nvd.nist.gov/vuln/detail/CVE-2024-46770), [CVE-2024-46761](https://nvd.nist.gov/vuln/detail/CVE-2024-46761), [CVE-2024-46743](https://nvd.nist.gov/vuln/detail/CVE-2024-46743), [CVE-2024-46742](https://nvd.nist.gov/vuln/detail/CVE-2024-46742), [CVE-2024-46741](https://nvd.nist.gov/vuln/detail/CVE-2024-46741), [CVE-2024-46740](https://nvd.nist.gov/vuln/detail/CVE-2024-46740), [CVE-2024-46739](https://nvd.nist.gov/vuln/detail/CVE-2024-46739), [CVE-2024-46738](https://nvd.nist.gov/vuln/detail/CVE-2024-46738), [CVE-2024-46737](https://nvd.nist.gov/vuln/detail/CVE-2024-46737), [CVE-2024-46759](https://nvd.nist.gov/vuln/detail/CVE-2024-46759), [CVE-2024-46758](https://nvd.nist.gov/vuln/detail/CVE-2024-46758), [CVE-2024-46757](https://nvd.nist.gov/vuln/detail/CVE-2024-46757), [CVE-2024-46756](https://nvd.nist.gov/vuln/detail/CVE-2024-46756), [CVE-2024-46755](https://nvd.nist.gov/vuln/detail/CVE-2024-46755), [CVE-2024-46736](https://nvd.nist.gov/vuln/detail/CVE-2024-46736), [CVE-2024-46752](https://nvd.nist.gov/vuln/detail/CVE-2024-46752), [CVE-2024-46750](https://nvd.nist.gov/vuln/detail/CVE-2024-46750), [CVE-2024-46749](https://nvd.nist.gov/vuln/detail/CVE-2024-46749), [CVE-2024-46747](https://nvd.nist.gov/vuln/detail/CVE-2024-46747), [CVE-2024-46746](https://nvd.nist.gov/vuln/detail/CVE-2024-46746), [CVE-2024-46745](https://nvd.nist.gov/vuln/detail/CVE-2024-46745), [CVE-2024-46744](https://nvd.nist.gov/vuln/detail/CVE-2024-46744), [CVE-2024-46734](https://nvd.nist.gov/vuln/detail/CVE-2024-46734), [CVE-2024-46735](https://nvd.nist.gov/vuln/detail/CVE-2024-46735), [CVE-2024-46713](https://nvd.nist.gov/vuln/detail/CVE-2024-46713), [CVE-2024-46858](https://nvd.nist.gov/vuln/detail/CVE-2024-46858), [CVE-2024-46857](https://nvd.nist.gov/vuln/detail/CVE-2024-46857), [CVE-2024-46855](https://nvd.nist.gov/vuln/detail/CVE-2024-46855), [CVE-2024-46854](https://nvd.nist.gov/vuln/detail/CVE-2024-46854), [CVE-2024-46853](https://nvd.nist.gov/vuln/detail/CVE-2024-46853), [CVE-2024-46852](https://nvd.nist.gov/vuln/detail/CVE-2024-46852), [CVE-2024-46865](https://nvd.nist.gov/vuln/detail/CVE-2024-46865), [CVE-2024-46864](https://nvd.nist.gov/vuln/detail/CVE-2024-46864), [CVE-2024-46861](https://nvd.nist.gov/vuln/detail/CVE-2024-46861), [CVE-2024-46860](https://nvd.nist.gov/vuln/detail/CVE-2024-46860), [CVE-2024-46859](https://nvd.nist.gov/vuln/detail/CVE-2024-46859), [CVE-2024-46849](https://nvd.nist.gov/vuln/detail/CVE-2024-46849))\n - expat ([CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490))\n \n #### Bug fixes:\n \n - CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: ([flatcar/scripts#2016](https://github.com/flatcar/scripts/pull/2016))\n - Equinix Metal: fixed race condition on 'mount' Ignition stage ([scripts#2308](https://github.com/flatcar/scripts/pull/2308))\n \n #### Changes:\n \n - Azure, HyperV: Added daemons `kvp`, `vss`, and `fcopy` for better HyperV hypervisor integration with Flatcar guests ([scripts#2309](https://github.com/flatcar/scripts/pull/2309)).\n - Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers ([flatcar/scripts#2355](https://github.com/flatcar/scripts/pull/2355))\n \n #### Updates:\n\n - Linux ([6.6.54](https://lwn.net/Articles/992980) (includes [6.6.53](https://lwn.net/Articles/992296), [6.6.52](https://lwn.net/Articles/990767/), [6.6.51](https://lwn.net/Articles/990045), [6.6.50](https://lwn.net/Articles/989411/), [6.6.49](https://lwn.net/Articles/988749)))\n - ca-certificates ([3.105](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html))\n - expat ([2.6.3](https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes))\n"
  },
  "4116.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-11-13 12:28:50 +0000",
    "major_software": {
      "containerd": [
        "1.7.22"
      ],
      "docker": [
        "27.2.1"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.60"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "_Changes since **Beta 4081.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2024-50179](https://nvd.nist.gov/vuln/detail/CVE-2024-50179), [CVE-2024-50176](https://nvd.nist.gov/vuln/detail/CVE-2024-50176), [CVE-2024-50175](https://nvd.nist.gov/vuln/detail/CVE-2024-50175), [CVE-2024-50012](https://nvd.nist.gov/vuln/detail/CVE-2024-50012), [CVE-2024-50008](https://nvd.nist.gov/vuln/detail/CVE-2024-50008), [CVE-2024-50007](https://nvd.nist.gov/vuln/detail/CVE-2024-50007), [CVE-2024-50006](https://nvd.nist.gov/vuln/detail/CVE-2024-50006), [CVE-2024-50005](https://nvd.nist.gov/vuln/detail/CVE-2024-50005), [CVE-2024-50016](https://nvd.nist.gov/vuln/detail/CVE-2024-50016), [CVE-2024-50015](https://nvd.nist.gov/vuln/detail/CVE-2024-50015), [CVE-2024-50013](https://nvd.nist.gov/vuln/detail/CVE-2024-50013), [CVE-2024-50003](https://nvd.nist.gov/vuln/detail/CVE-2024-50003), [CVE-2024-50002](https://nvd.nist.gov/vuln/detail/CVE-2024-50002), [CVE-2024-50001](https://nvd.nist.gov/vuln/detail/CVE-2024-50001), [CVE-2024-50000](https://nvd.nist.gov/vuln/detail/CVE-2024-50000), [CVE-2024-49997](https://nvd.nist.gov/vuln/detail/CVE-2024-49997), [CVE-2024-49996](https://nvd.nist.gov/vuln/detail/CVE-2024-49996), [CVE-2024-49995](https://nvd.nist.gov/vuln/detail/CVE-2024-49995), [CVE-2024-49955](https://nvd.nist.gov/vuln/detail/CVE-2024-49955), [CVE-2024-49963](https://nvd.nist.gov/vuln/detail/CVE-2024-49963), [CVE-2024-49962](https://nvd.nist.gov/vuln/detail/CVE-2024-49962), [CVE-2024-49961](https://nvd.nist.gov/vuln/detail/CVE-2024-49961), [CVE-2024-49960](https://nvd.nist.gov/vuln/detail/CVE-2024-49960), [CVE-2024-49959](https://nvd.nist.gov/vuln/detail/CVE-2024-49959), [CVE-2024-49993](https://nvd.nist.gov/vuln/detail/CVE-2024-49993), [CVE-2024-49992](https://nvd.nist.gov/vuln/detail/CVE-2024-49992), [CVE-2024-49991](https://nvd.nist.gov/vuln/detail/CVE-2024-49991), [CVE-2024-49989](https://nvd.nist.gov/vuln/detail/CVE-2024-49989), [CVE-2024-49988](https://nvd.nist.gov/vuln/detail/CVE-2024-49988), [CVE-2024-49987](https://nvd.nist.gov/vuln/detail/CVE-2024-49987), [CVE-2024-49986](https://nvd.nist.gov/vuln/detail/CVE-2024-49986), [CVE-2024-49985](https://nvd.nist.gov/vuln/detail/CVE-2024-49985), [CVE-2024-49958](https://nvd.nist.gov/vuln/detail/CVE-2024-49958), [CVE-2024-49983](https://nvd.nist.gov/vuln/detail/CVE-2024-49983), [CVE-2024-49982](https://nvd.nist.gov/vuln/detail/CVE-2024-49982), [CVE-2024-49981](https://nvd.nist.gov/vuln/detail/CVE-2024-49981), [CVE-2024-49980](https://nvd.nist.gov/vuln/detail/CVE-2024-49980), [CVE-2024-49978](https://nvd.nist.gov/vuln/detail/CVE-2024-49978), [CVE-2024-49977](https://nvd.nist.gov/vuln/detail/CVE-2024-49977), [CVE-2024-49976](https://nvd.nist.gov/vuln/detail/CVE-2024-49976), [CVE-2024-49975](https://nvd.nist.gov/vuln/detail/CVE-2024-49975), [CVE-2024-49957](https://nvd.nist.gov/vuln/detail/CVE-2024-49957), [CVE-2024-49973](https://nvd.nist.gov/vuln/detail/CVE-2024-49973), [CVE-2024-49969](https://nvd.nist.gov/vuln/detail/CVE-2024-49969), [CVE-2024-49967](https://nvd.nist.gov/vuln/detail/CVE-2024-49967), [CVE-2024-49966](https://nvd.nist.gov/vuln/detail/CVE-2024-49966), [CVE-2024-49965](https://nvd.nist.gov/vuln/detail/CVE-2024-49965), [CVE-2024-49924](https://nvd.nist.gov/vuln/detail/CVE-2024-49924), [CVE-2024-49954](https://nvd.nist.gov/vuln/detail/CVE-2024-49954), [CVE-2024-49953](https://nvd.nist.gov/vuln/detail/CVE-2024-49953), [CVE-2024-49952](https://nvd.nist.gov/vuln/detail/CVE-2024-49952), [CVE-2024-49951](https://nvd.nist.gov/vuln/detail/CVE-2024-49951), [CVE-2024-49950](https://nvd.nist.gov/vuln/detail/CVE-2024-49950), [CVE-2024-49949](https://nvd.nist.gov/vuln/detail/CVE-2024-49949), [CVE-2024-49948](https://nvd.nist.gov/vuln/detail/CVE-2024-49948), [CVE-2024-49947](https://nvd.nist.gov/vuln/detail/CVE-2024-49947), [CVE-2024-49946](https://nvd.nist.gov/vuln/detail/CVE-2024-49946), [CVE-2024-49944](https://nvd.nist.gov/vuln/detail/CVE-2024-49944), [CVE-2024-49939](https://nvd.nist.gov/vuln/detail/CVE-2024-49939), [CVE-2024-49938](https://nvd.nist.gov/vuln/detail/CVE-2024-49938), [CVE-2024-49937](https://nvd.nist.gov/vuln/detail/CVE-2024-49937), [CVE-2024-49936](https://nvd.nist.gov/vuln/detail/CVE-2024-49936), [CVE-2024-49935](https://nvd.nist.gov/vuln/detail/CVE-2024-49935), [CVE-2024-49933](https://nvd.nist.gov/vuln/detail/CVE-2024-49933), [CVE-2024-49931](https://nvd.nist.gov/vuln/detail/CVE-2024-49931), [CVE-2024-49930](https://nvd.nist.gov/vuln/detail/CVE-2024-49930), [CVE-2024-49929](https://nvd.nist.gov/vuln/detail/CVE-2024-49929), [CVE-2024-49927](https://nvd.nist.gov/vuln/detail/CVE-2024-49927), [CVE-2024-49925](https://nvd.nist.gov/vuln/detail/CVE-2024-49925), [CVE-2024-49875](https://nvd.nist.gov/vuln/detail/CVE-2024-49875), [CVE-2024-49884](https://nvd.nist.gov/vuln/detail/CVE-2024-49884), [CVE-2024-49883](https://nvd.nist.gov/vuln/detail/CVE-2024-49883), [CVE-2024-49882](https://nvd.nist.gov/vuln/detail/CVE-2024-49882), [CVE-2024-49881](https://nvd.nist.gov/vuln/detail/CVE-2024-49881), [CVE-2024-49879](https://nvd.nist.gov/vuln/detail/CVE-2024-49879), [CVE-2024-49913](https://nvd.nist.gov/vuln/detail/CVE-2024-49913), [CVE-2024-49912](https://nvd.nist.gov/vuln/detail/CVE-2024-49912), [CVE-2024-49907](https://nvd.nist.gov/vuln/detail/CVE-2024-49907), [CVE-2024-49905](https://nvd.nist.gov/vuln/detail/CVE-2024-49905), [CVE-2024-49878](https://nvd.nist.gov/vuln/detail/CVE-2024-49878), [CVE-2024-49903](https://nvd.nist.gov/vuln/detail/CVE-2024-49903), [CVE-2024-49902](https://nvd.nist.gov/vuln/detail/CVE-2024-49902), [CVE-2024-49901](https://nvd.nist.gov/vuln/detail/CVE-2024-49901), [CVE-2024-49900](https://nvd.nist.gov/vuln/detail/CVE-2024-49900), [CVE-2024-49896](https://nvd.nist.gov/vuln/detail/CVE-2024-49896), [CVE-2024-49895](https://nvd.nist.gov/vuln/detail/CVE-2024-49895), [CVE-2024-49877](https://nvd.nist.gov/vuln/detail/CVE-2024-49877), [CVE-2024-49894](https://nvd.nist.gov/vuln/detail/CVE-2024-49894), [CVE-2024-49892](https://nvd.nist.gov/vuln/detail/CVE-2024-49892), [CVE-2024-49890](https://nvd.nist.gov/vuln/detail/CVE-2024-49890), [CVE-2024-49889](https://nvd.nist.gov/vuln/detail/CVE-2024-49889), [CVE-2024-49886](https://nvd.nist.gov/vuln/detail/CVE-2024-49886), [CVE-2024-49863](https://nvd.nist.gov/vuln/detail/CVE-2024-49863), [CVE-2024-49871](https://nvd.nist.gov/vuln/detail/CVE-2024-49871), [CVE-2024-49870](https://nvd.nist.gov/vuln/detail/CVE-2024-49870), [CVE-2024-49868](https://nvd.nist.gov/vuln/detail/CVE-2024-49868), [CVE-2024-49867](https://nvd.nist.gov/vuln/detail/CVE-2024-49867), [CVE-2024-49866](https://nvd.nist.gov/vuln/detail/CVE-2024-49866), [CVE-2024-49874](https://nvd.nist.gov/vuln/detail/CVE-2024-49874), [CVE-2024-49864](https://nvd.nist.gov/vuln/detail/CVE-2024-49864), [CVE-2024-47704](https://nvd.nist.gov/vuln/detail/CVE-2024-47704), [CVE-2024-50191](https://nvd.nist.gov/vuln/detail/CVE-2024-50191), [CVE-2024-50189](https://nvd.nist.gov/vuln/detail/CVE-2024-50189), [CVE-2024-50188](https://nvd.nist.gov/vuln/detail/CVE-2024-50188), [CVE-2024-50187](https://nvd.nist.gov/vuln/detail/CVE-2024-50187), [CVE-2024-50186](https://nvd.nist.gov/vuln/detail/CVE-2024-50186), [CVE-2024-50185](https://nvd.nist.gov/vuln/detail/CVE-2024-50185), [CVE-2024-50184](https://nvd.nist.gov/vuln/detail/CVE-2024-50184), [CVE-2024-50183](https://nvd.nist.gov/vuln/detail/CVE-2024-50183), [CVE-2024-50182](https://nvd.nist.gov/vuln/detail/CVE-2024-50182), [CVE-2024-50180](https://nvd.nist.gov/vuln/detail/CVE-2024-50180), [CVE-2024-50181](https://nvd.nist.gov/vuln/detail/CVE-2024-50181), [CVE-2024-50097](https://nvd.nist.gov/vuln/detail/CVE-2024-50097), [CVE-2024-50096](https://nvd.nist.gov/vuln/detail/CVE-2024-50096), [CVE-2024-50095](https://nvd.nist.gov/vuln/detail/CVE-2024-50095), [CVE-2024-50093](https://nvd.nist.gov/vuln/detail/CVE-2024-50093), [CVE-2024-50089](https://nvd.nist.gov/vuln/detail/CVE-2024-50089), [CVE-2024-50058](https://nvd.nist.gov/vuln/detail/CVE-2024-50058), [CVE-2024-50065](https://nvd.nist.gov/vuln/detail/CVE-2024-50065), [CVE-2024-50064](https://nvd.nist.gov/vuln/detail/CVE-2024-50064), [CVE-2024-50063](https://nvd.nist.gov/vuln/detail/CVE-2024-50063), [CVE-2024-50062](https://nvd.nist.gov/vuln/detail/CVE-2024-50062), [CVE-2024-50061](https://nvd.nist.gov/vuln/detail/CVE-2024-50061), [CVE-2024-50060](https://nvd.nist.gov/vuln/detail/CVE-2024-50060), [CVE-2024-50059](https://nvd.nist.gov/vuln/detail/CVE-2024-50059), [CVE-2024-50026](https://nvd.nist.gov/vuln/detail/CVE-2024-50026), [CVE-2024-50024](https://nvd.nist.gov/vuln/detail/CVE-2024-50024), [CVE-2024-50023](https://nvd.nist.gov/vuln/detail/CVE-2024-50023), [CVE-2024-50057](https://nvd.nist.gov/vuln/detail/CVE-2024-50057), [CVE-2024-50055](https://nvd.nist.gov/vuln/detail/CVE-2024-50055), [CVE-2024-50049](https://nvd.nist.gov/vuln/detail/CVE-2024-50049), [CVE-2024-50022](https://nvd.nist.gov/vuln/detail/CVE-2024-50022), [CVE-2024-50048](https://nvd.nist.gov/vuln/detail/CVE-2024-50048), [CVE-2024-50047](https://nvd.nist.gov/vuln/detail/CVE-2024-50047), [CVE-2024-50046](https://nvd.nist.gov/vuln/detail/CVE-2024-50046), [CVE-2024-50045](https://nvd.nist.gov/vuln/detail/CVE-2024-50045), [CVE-2024-50044](https://nvd.nist.gov/vuln/detail/CVE-2024-50044), [CVE-2024-50041](https://nvd.nist.gov/vuln/detail/CVE-2024-50041), [CVE-2024-50040](https://nvd.nist.gov/vuln/detail/CVE-2024-50040), [CVE-2024-50039](https://nvd.nist.gov/vuln/detail/CVE-2024-50039), [CVE-2024-50038](https://nvd.nist.gov/vuln/detail/CVE-2024-50038), [CVE-2024-50036](https://nvd.nist.gov/vuln/detail/CVE-2024-50036), [CVE-2024-50035](https://nvd.nist.gov/vuln/detail/CVE-2024-50035), [CVE-2024-50033](https://nvd.nist.gov/vuln/detail/CVE-2024-50033), [CVE-2024-50032](https://nvd.nist.gov/vuln/detail/CVE-2024-50032), [CVE-2024-50031](https://nvd.nist.gov/vuln/detail/CVE-2024-50031), [CVE-2024-50029](https://nvd.nist.gov/vuln/detail/CVE-2024-50029), [CVE-2024-50019](https://nvd.nist.gov/vuln/detail/CVE-2024-50019), [CVE-2024-50201](https://nvd.nist.gov/vuln/detail/CVE-2024-50201), [CVE-2024-50202](https://nvd.nist.gov/vuln/detail/CVE-2024-50202), [CVE-2024-50101](https://nvd.nist.gov/vuln/detail/CVE-2024-50101), [CVE-2024-50098](https://nvd.nist.gov/vuln/detail/CVE-2024-50098), [CVE-2024-50099](https://nvd.nist.gov/vuln/detail/CVE-2024-50099), [CVE-2024-50088](https://nvd.nist.gov/vuln/detail/CVE-2024-50088), [CVE-2024-50087](https://nvd.nist.gov/vuln/detail/CVE-2024-50087), [CVE-2024-50086](https://nvd.nist.gov/vuln/detail/CVE-2024-50086), [CVE-2024-50085](https://nvd.nist.gov/vuln/detail/CVE-2024-50085), [CVE-2024-50084](https://nvd.nist.gov/vuln/detail/CVE-2024-50084), [CVE-2024-50083](https://nvd.nist.gov/vuln/detail/CVE-2024-50083), [CVE-2024-50082](https://nvd.nist.gov/vuln/detail/CVE-2024-50082), [CVE-2024-50080](https://nvd.nist.gov/vuln/detail/CVE-2024-50080), [CVE-2024-50077](https://nvd.nist.gov/vuln/detail/CVE-2024-50077), [CVE-2024-50076](https://nvd.nist.gov/vuln/detail/CVE-2024-50076), [CVE-2024-50075](https://nvd.nist.gov/vuln/detail/CVE-2024-50075), [CVE-2024-50074](https://nvd.nist.gov/vuln/detail/CVE-2024-50074), [CVE-2024-50073](https://nvd.nist.gov/vuln/detail/CVE-2024-50073), [CVE-2024-50072](https://nvd.nist.gov/vuln/detail/CVE-2024-50072), [CVE-2024-50070](https://nvd.nist.gov/vuln/detail/CVE-2024-50070), [CVE-2024-50078](https://nvd.nist.gov/vuln/detail/CVE-2024-50078), [CVE-2024-50069](https://nvd.nist.gov/vuln/detail/CVE-2024-50069), [CVE-2024-50066](https://nvd.nist.gov/vuln/detail/CVE-2024-50066), [CVE-2024-50211](https://nvd.nist.gov/vuln/detail/CVE-2024-50211), [CVE-2024-50210](https://nvd.nist.gov/vuln/detail/CVE-2024-50210), [CVE-2024-50209](https://nvd.nist.gov/vuln/detail/CVE-2024-50209), [CVE-2024-50208](https://nvd.nist.gov/vuln/detail/CVE-2024-50208), [CVE-2024-50205](https://nvd.nist.gov/vuln/detail/CVE-2024-50205), [CVE-2024-50155](https://nvd.nist.gov/vuln/detail/CVE-2024-50155), [CVE-2024-50164](https://nvd.nist.gov/vuln/detail/CVE-2024-50164), [CVE-2024-50163](https://nvd.nist.gov/vuln/detail/CVE-2024-50163), [CVE-2024-50162](https://nvd.nist.gov/vuln/detail/CVE-2024-50162), [CVE-2024-50160](https://nvd.nist.gov/vuln/detail/CVE-2024-50160), [CVE-2024-50159](https://nvd.nist.gov/vuln/detail/CVE-2024-50159), [CVE-2024-50158](https://nvd.nist.gov/vuln/detail/CVE-2024-50158), [CVE-2024-50172](https://nvd.nist.gov/vuln/detail/CVE-2024-50172), [CVE-2024-50171](https://nvd.nist.gov/vuln/detail/CVE-2024-50171), [CVE-2024-50170](https://nvd.nist.gov/vuln/detail/CVE-2024-50170), [CVE-2024-50169](https://nvd.nist.gov/vuln/detail/CVE-2024-50169), [CVE-2024-50168](https://nvd.nist.gov/vuln/detail/CVE-2024-50168), [CVE-2024-50167](https://nvd.nist.gov/vuln/detail/CVE-2024-50167), [CVE-2024-50166](https://nvd.nist.gov/vuln/detail/CVE-2024-50166), [CVE-2024-50156](https://nvd.nist.gov/vuln/detail/CVE-2024-50156), [CVE-2024-50148](https://nvd.nist.gov/vuln/detail/CVE-2024-50148), [CVE-2024-50147](https://nvd.nist.gov/vuln/detail/CVE-2024-50147), [CVE-2024-50145](https://nvd.nist.gov/vuln/detail/CVE-2024-50145), [CVE-2024-50143](https://nvd.nist.gov/vuln/detail/CVE-2024-50143), [CVE-2024-50142](https://nvd.nist.gov/vuln/detail/CVE-2024-50142), [CVE-2024-50141](https://nvd.nist.gov/vuln/detail/CVE-2024-50141), [CVE-2024-50154](https://nvd.nist.gov/vuln/detail/CVE-2024-50154), [CVE-2024-50153](https://nvd.nist.gov/vuln/detail/CVE-2024-50153), [CVE-2024-50152](https://nvd.nist.gov/vuln/detail/CVE-2024-50152), [CVE-2024-50151](https://nvd.nist.gov/vuln/detail/CVE-2024-50151), [CVE-2024-50150](https://nvd.nist.gov/vuln/detail/CVE-2024-50150), [CVE-2024-50139](https://nvd.nist.gov/vuln/detail/CVE-2024-50139), [CVE-2024-50140](https://nvd.nist.gov/vuln/detail/CVE-2024-50140), [CVE-2024-50128](https://nvd.nist.gov/vuln/detail/CVE-2024-50128), [CVE-2024-50136](https://nvd.nist.gov/vuln/detail/CVE-2024-50136), [CVE-2024-50135](https://nvd.nist.gov/vuln/detail/CVE-2024-50135), [CVE-2024-50134](https://nvd.nist.gov/vuln/detail/CVE-2024-50134), [CVE-2024-50133](https://nvd.nist.gov/vuln/detail/CVE-2024-50133), [CVE-2024-50131](https://nvd.nist.gov/vuln/detail/CVE-2024-50131), [CVE-2024-50130](https://nvd.nist.gov/vuln/detail/CVE-2024-50130), [CVE-2024-50111](https://nvd.nist.gov/vuln/detail/CVE-2024-50111), [CVE-2024-50110](https://nvd.nist.gov/vuln/detail/CVE-2024-50110), [CVE-2024-50108](https://nvd.nist.gov/vuln/detail/CVE-2024-50108), [CVE-2024-50127](https://nvd.nist.gov/vuln/detail/CVE-2024-50127), [CVE-2024-50126](https://nvd.nist.gov/vuln/detail/CVE-2024-50126), [CVE-2024-50125](https://nvd.nist.gov/vuln/detail/CVE-2024-50125), [CVE-2024-50124](https://nvd.nist.gov/vuln/detail/CVE-2024-50124), [CVE-2024-50121](https://nvd.nist.gov/vuln/detail/CVE-2024-50121), [CVE-2024-50120](https://nvd.nist.gov/vuln/detail/CVE-2024-50120), [CVE-2024-50117](https://nvd.nist.gov/vuln/detail/CVE-2024-50117), [CVE-2024-50116](https://nvd.nist.gov/vuln/detail/CVE-2024-50116), [CVE-2024-50115](https://nvd.nist.gov/vuln/detail/CVE-2024-50115), [CVE-2024-50112](https://nvd.nist.gov/vuln/detail/CVE-2024-50112), [CVE-2024-50103](https://nvd.nist.gov/vuln/detail/CVE-2024-50103), [CVE-2024-50262](https://nvd.nist.gov/vuln/detail/CVE-2024-50262), [CVE-2024-50259](https://nvd.nist.gov/vuln/detail/CVE-2024-50259), [CVE-2024-50261](https://nvd.nist.gov/vuln/detail/CVE-2024-50261), [CVE-2024-50226](https://nvd.nist.gov/vuln/detail/CVE-2024-50226), [CVE-2024-50235](https://nvd.nist.gov/vuln/detail/CVE-2024-50235), [CVE-2024-50234](https://nvd.nist.gov/vuln/detail/CVE-2024-50234), [CVE-2024-50233](https://nvd.nist.gov/vuln/detail/CVE-2024-50233), [CVE-2024-50232](https://nvd.nist.gov/vuln/detail/CVE-2024-50232), [CVE-2024-50231](https://nvd.nist.gov/vuln/detail/CVE-2024-50231), [CVE-2024-50230](https://nvd.nist.gov/vuln/detail/CVE-2024-50230), [CVE-2024-50258](https://nvd.nist.gov/vuln/detail/CVE-2024-50258), [CVE-2024-50257](https://nvd.nist.gov/vuln/detail/CVE-2024-50257), [CVE-2024-50256](https://nvd.nist.gov/vuln/detail/CVE-2024-50256), [CVE-2024-50229](https://nvd.nist.gov/vuln/detail/CVE-2024-50229), [CVE-2024-50255](https://nvd.nist.gov/vuln/detail/CVE-2024-50255), [CVE-2024-50252](https://nvd.nist.gov/vuln/detail/CVE-2024-50252), [CVE-2024-50251](https://nvd.nist.gov/vuln/detail/CVE-2024-50251), [CVE-2024-50250](https://nvd.nist.gov/vuln/detail/CVE-2024-50250), [CVE-2024-50249](https://nvd.nist.gov/vuln/detail/CVE-2024-50249), [CVE-2024-50248](https://nvd.nist.gov/vuln/detail/CVE-2024-50248), [CVE-2024-50247](https://nvd.nist.gov/vuln/detail/CVE-2024-50247), [CVE-2024-50246](https://nvd.nist.gov/vuln/detail/CVE-2024-50246), [CVE-2024-50228](https://nvd.nist.gov/vuln/detail/CVE-2024-50228), [CVE-2024-50245](https://nvd.nist.gov/vuln/detail/CVE-2024-50245), [CVE-2024-50244](https://nvd.nist.gov/vuln/detail/CVE-2024-50244), [CVE-2024-50243](https://nvd.nist.gov/vuln/detail/CVE-2024-50243), [CVE-2024-50242](https://nvd.nist.gov/vuln/detail/CVE-2024-50242), [CVE-2024-50240](https://nvd.nist.gov/vuln/detail/CVE-2024-50240), [CVE-2024-50239](https://nvd.nist.gov/vuln/detail/CVE-2024-50239), [CVE-2024-50237](https://nvd.nist.gov/vuln/detail/CVE-2024-50237), [CVE-2024-50236](https://nvd.nist.gov/vuln/detail/CVE-2024-50236), [CVE-2024-50219](https://nvd.nist.gov/vuln/detail/CVE-2024-50219), [CVE-2024-50218](https://nvd.nist.gov/vuln/detail/CVE-2024-50218), [CVE-2024-50216](https://nvd.nist.gov/vuln/detail/CVE-2024-50216), [CVE-2024-50215](https://nvd.nist.gov/vuln/detail/CVE-2024-50215), [CVE-2024-50224](https://nvd.nist.gov/vuln/detail/CVE-2024-50224), [CVE-2024-50223](https://nvd.nist.gov/vuln/detail/CVE-2024-50223), [CVE-2024-50222](https://nvd.nist.gov/vuln/detail/CVE-2024-50222))\n - docker ([CVE-2024-41110](https://nvd.nist.gov/vuln/detail/CVE-2024-41110))\n - etcd ([CVE-2023-32082](https://nvd.nist.gov/vuln/detail/CVE-2023-32082))\n - expat ([CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490))\n - intel-microcode ([CVE-2023-42667](https://nvd.nist.gov/vuln/detail/CVE-2023-42667), [CVE-2023-49141](https://nvd.nist.gov/vuln/detail/CVE-2023-49141), [CVE-2024-24853](https://nvd.nist.gov/vuln/detail/CVE-2024-24853), [CVE-2024-24980](https://nvd.nist.gov/vuln/detail/CVE-2024-24980), [CVE-2024-25939](https://nvd.nist.gov/vuln/detail/CVE-2024-25939))\n - libpcap ([CVE-2023-7256](https://nvd.nist.gov/vuln/detail/CVE-2023-7256), [CVE-2024-8006](https://nvd.nist.gov/vuln/detail/CVE-2024-8006))\n - runc ([CVE-2024-45310](https://nvd.nist.gov/vuln/detail/CVE-2024-45310))\n - SDK: Go ([CVE-2024-34155](https://nvd.nist.gov/vuln/detail/CVE-2024-34155), [CVE-2024-34156](https://nvd.nist.gov/vuln/detail/CVE-2024-34156), [CVE-2024-34158](https://nvd.nist.gov/vuln/detail/CVE-2024-34158))\n \n #### Changes:\n \n - Kernel lockdown in integrity mode is now enabled when secure boot is enabled. This prevents loading unsigned kernel modules and matches the behavior of all major distros. ([scripts#2299](https://github.com/flatcar/scripts/pull/2299))\n - The `/usr/sbin` directory is now merged into `/usr/bin`, so the former became a symlink to the latter. The SDK now has the same base layout as the generic images. ([flatcar/scripts#2068](https://github.com/flatcar/scripts/pull/2068))\n - Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha ([flatcar/scripts#2390](https://github.com/flatcar/scripts/pull/2390))\n \n #### Updates:\n \n - Linux ([6.6.60](https://lwn.net/Articles/997527) (includes [6.6.59](https://lwn.net/Articles/996689), [6.6.58](https://lwn.net/Articles/995132), [6.6.57](https://lwn.net/Articles/994634), [6.6.56](https://lwn.net/Articles/993600), [6.6.55](https://lwn.net/Articles/993599), [6.6.50](https://lwn.net/Articles/970172), [6.6.49](https://lwn.net/Articles/988749)))\n - Linux Firmware ([20240909](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240909))\n - SDK: Go ([1.22.8](https://go.dev/doc/devel/release#go1.22.8) (includes [1.22.7](https://go.dev/doc/devel/release#go1.22.7)))\n - SDK: cmake ([3.30.2](https://cmake.org/cmake/help/v3.30/release/3.30.html#id2))\n - SDK: perl ([5.40.0](https://perldoc.perl.org/5.40.0/perldelta))\n - afterburn ([5.7.0](https://coreos.github.io/afterburn/release-notes/#afterburn-570))\n - audit ([4.0.1](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.1) (includes [4.0](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0)))\n - azure, gce, sysext-python: gdbm ([1.24](https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00001.html))\n - azure, gce, sysext-python: python ([3.11.10](https://docs.python.org/3.11/whatsnew/3.11.html#notable-changes-in-3-11-10))\n - bind-tools ([9.16.50](https://bind9.readthedocs.io/en/v9.16.50/notes.html#notes-for-bind-9-16-50) (includes [9.16.49](https://bind9.readthedocs.io/en/v9.16.49/notes.html#notes-for-bind-9-16-49)))\n - bpftool ([7.5.0](https://github.com/libbpf/bpftool/releases/tag/v7.5.0) (includes [7.4.0](https://github.com/libbpf/bpftool/releases/tag/v7.4.0), [7.3.0](https://github.com/libbpf/bpftool/releases/tag/v7.3.0), [7.2.0](https://github.com/libbpf/bpftool/releases/tag/v7.2.0), [7.1.0](https://github.com/libbpf/bpftool/releases/tag/v7.1.0), [7.0.0](https://github.com/libbpf/bpftool/releases/tag/v7.0.0)))\n - ca-certificates ([3.106](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html))\n - containerd ([1.7.22](https://github.com/containerd/containerd/releases/tag/v1.7.22))\n - dev: gentoolkit ([0.6.7](https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.7))\n - docker ([27.2.1](https://docs.docker.com/engine/release-notes/27/#2721), includes changes from [26.1.0](https://docs.docker.com/engine/release-notes/26.1/#2610)))\n - etcd ([3.5.16](https://github.com/etcd-io/etcd/blob/96e17d38e244ef18756a55d33066f2893402794b/CHANGELOG/CHANGELOG-3.5.md#v3516-2024-09-10))\n - expat ([2.6.3](https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes))\n - grub ([2.12](https://lists.gnu.org/archive/html/grub-devel/2023-12/msg00052.html))\n - intel-microcode ([20240531_p20240526](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813))\n - iproute2 ([6.9.0](https://lkml.org/lkml/2024/5/13/860))\n - libffi ([3.4.6](https://github.com/libffi/libffi/releases/tag/v3.4.6) (includes [3.4.5](https://github.com/libffi/libffi/releases/tag/v3.4.5)))\n - libnftnl ([1.2.7](https://www.mail-archive.com/netfilter-announce@lists.netfilter.org/msg00264.html))\n - libpcap ([1.10.5](https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.10.5/CHANGES))\n - libpcre2 ([10.44](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.44/NEWS))\n - libsodium ([1.0.20](https://github.com/jedisct1/libsodium/releases/tag/1.0.20-RELEASE))\n - nettle ([3.10](https://git.lysator.liu.se/nettle/nettle/-/blob/b8c841dc3278dec0812365f02370b41ea9d4ddee/NEWS))\n - pinentry ([1.3.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=1ea7e76f836fe15fe7c59b954d7aab768bd090e6;hb=24833c9ef2bf93d9f6c0583a9ecfefa6747473bc))\n - runc ([1.1.14](https://github.com/opencontainers/runc/releases/tag/v1.1.14))\n - sysext-python: idna ([3.8](https://github.com/kjd/idna/releases/tag/v3.8))\n - sysext-python: jaraco-context ([6.0.1](https://github.com/jaraco/jaraco.context/blob/v6.0.1/NEWS.rst))\n - sysext-python: setuptools ([73.0.1](https://github.com/pypa/setuptools/blob/v73.0.1/NEWS.rst) (includes [72.2.0](https://github.com/pypa/setuptools/blob/v72.2.0/NEWS.rst)))\n - sysext-python: truststore ([0.9.2](https://github.com/sethmlarson/truststore/blob/v0.9.2/CHANGELOG.md))\n - whois ([5.5.23](https://github.com/rfc1036/whois/blob/v5.5.23/debian/changelog) (includes [5.5.22](https://github.com/rfc1036/whois/blob/v5.5.22/debian/changelog)))\n\n _Changes since **Alpha 4116.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2024-50179](https://nvd.nist.gov/vuln/detail/CVE-2024-50179), [CVE-2024-50176](https://nvd.nist.gov/vuln/detail/CVE-2024-50176), [CVE-2024-50175](https://nvd.nist.gov/vuln/detail/CVE-2024-50175), [CVE-2024-50012](https://nvd.nist.gov/vuln/detail/CVE-2024-50012), [CVE-2024-50008](https://nvd.nist.gov/vuln/detail/CVE-2024-50008), [CVE-2024-50007](https://nvd.nist.gov/vuln/detail/CVE-2024-50007), [CVE-2024-50006](https://nvd.nist.gov/vuln/detail/CVE-2024-50006), [CVE-2024-50005](https://nvd.nist.gov/vuln/detail/CVE-2024-50005), [CVE-2024-50016](https://nvd.nist.gov/vuln/detail/CVE-2024-50016), [CVE-2024-50015](https://nvd.nist.gov/vuln/detail/CVE-2024-50015), [CVE-2024-50013](https://nvd.nist.gov/vuln/detail/CVE-2024-50013), [CVE-2024-50003](https://nvd.nist.gov/vuln/detail/CVE-2024-50003), [CVE-2024-50002](https://nvd.nist.gov/vuln/detail/CVE-2024-50002), [CVE-2024-50001](https://nvd.nist.gov/vuln/detail/CVE-2024-50001), [CVE-2024-50000](https://nvd.nist.gov/vuln/detail/CVE-2024-50000), [CVE-2024-49997](https://nvd.nist.gov/vuln/detail/CVE-2024-49997), [CVE-2024-49996](https://nvd.nist.gov/vuln/detail/CVE-2024-49996), [CVE-2024-49995](https://nvd.nist.gov/vuln/detail/CVE-2024-49995), [CVE-2024-49955](https://nvd.nist.gov/vuln/detail/CVE-2024-49955), [CVE-2024-49963](https://nvd.nist.gov/vuln/detail/CVE-2024-49963), [CVE-2024-49962](https://nvd.nist.gov/vuln/detail/CVE-2024-49962), [CVE-2024-49961](https://nvd.nist.gov/vuln/detail/CVE-2024-49961), [CVE-2024-49960](https://nvd.nist.gov/vuln/detail/CVE-2024-49960), [CVE-2024-49959](https://nvd.nist.gov/vuln/detail/CVE-2024-49959), [CVE-2024-49993](https://nvd.nist.gov/vuln/detail/CVE-2024-49993), [CVE-2024-49992](https://nvd.nist.gov/vuln/detail/CVE-2024-49992), [CVE-2024-49991](https://nvd.nist.gov/vuln/detail/CVE-2024-49991), [CVE-2024-49989](https://nvd.nist.gov/vuln/detail/CVE-2024-49989), [CVE-2024-49988](https://nvd.nist.gov/vuln/detail/CVE-2024-49988), [CVE-2024-49987](https://nvd.nist.gov/vuln/detail/CVE-2024-49987), [CVE-2024-49986](https://nvd.nist.gov/vuln/detail/CVE-2024-49986), [CVE-2024-49985](https://nvd.nist.gov/vuln/detail/CVE-2024-49985), [CVE-2024-49958](https://nvd.nist.gov/vuln/detail/CVE-2024-49958), [CVE-2024-49983](https://nvd.nist.gov/vuln/detail/CVE-2024-49983), [CVE-2024-49982](https://nvd.nist.gov/vuln/detail/CVE-2024-49982), [CVE-2024-49981](https://nvd.nist.gov/vuln/detail/CVE-2024-49981), [CVE-2024-49980](https://nvd.nist.gov/vuln/detail/CVE-2024-49980), [CVE-2024-49978](https://nvd.nist.gov/vuln/detail/CVE-2024-49978), [CVE-2024-49977](https://nvd.nist.gov/vuln/detail/CVE-2024-49977), [CVE-2024-49976](https://nvd.nist.gov/vuln/detail/CVE-2024-49976), [CVE-2024-49975](https://nvd.nist.gov/vuln/detail/CVE-2024-49975), [CVE-2024-49957](https://nvd.nist.gov/vuln/detail/CVE-2024-49957), [CVE-2024-49973](https://nvd.nist.gov/vuln/detail/CVE-2024-49973), [CVE-2024-49969](https://nvd.nist.gov/vuln/detail/CVE-2024-49969), [CVE-2024-49967](https://nvd.nist.gov/vuln/detail/CVE-2024-49967), [CVE-2024-49966](https://nvd.nist.gov/vuln/detail/CVE-2024-49966), [CVE-2024-49965](https://nvd.nist.gov/vuln/detail/CVE-2024-49965), [CVE-2024-49924](https://nvd.nist.gov/vuln/detail/CVE-2024-49924), [CVE-2024-49954](https://nvd.nist.gov/vuln/detail/CVE-2024-49954), [CVE-2024-49953](https://nvd.nist.gov/vuln/detail/CVE-2024-49953), [CVE-2024-49952](https://nvd.nist.gov/vuln/detail/CVE-2024-49952), [CVE-2024-49951](https://nvd.nist.gov/vuln/detail/CVE-2024-49951), [CVE-2024-49950](https://nvd.nist.gov/vuln/detail/CVE-2024-49950), [CVE-2024-49949](https://nvd.nist.gov/vuln/detail/CVE-2024-49949), [CVE-2024-49948](https://nvd.nist.gov/vuln/detail/CVE-2024-49948), [CVE-2024-49947](https://nvd.nist.gov/vuln/detail/CVE-2024-49947), [CVE-2024-49946](https://nvd.nist.gov/vuln/detail/CVE-2024-49946), [CVE-2024-49944](https://nvd.nist.gov/vuln/detail/CVE-2024-49944), [CVE-2024-49939](https://nvd.nist.gov/vuln/detail/CVE-2024-49939), [CVE-2024-49938](https://nvd.nist.gov/vuln/detail/CVE-2024-49938), [CVE-2024-49937](https://nvd.nist.gov/vuln/detail/CVE-2024-49937), [CVE-2024-49936](https://nvd.nist.gov/vuln/detail/CVE-2024-49936), [CVE-2024-49935](https://nvd.nist.gov/vuln/detail/CVE-2024-49935), [CVE-2024-49933](https://nvd.nist.gov/vuln/detail/CVE-2024-49933), [CVE-2024-49931](https://nvd.nist.gov/vuln/detail/CVE-2024-49931), [CVE-2024-49930](https://nvd.nist.gov/vuln/detail/CVE-2024-49930), [CVE-2024-49929](https://nvd.nist.gov/vuln/detail/CVE-2024-49929), [CVE-2024-49927](https://nvd.nist.gov/vuln/detail/CVE-2024-49927), [CVE-2024-49925](https://nvd.nist.gov/vuln/detail/CVE-2024-49925), [CVE-2024-49875](https://nvd.nist.gov/vuln/detail/CVE-2024-49875), [CVE-2024-49884](https://nvd.nist.gov/vuln/detail/CVE-2024-49884), [CVE-2024-49883](https://nvd.nist.gov/vuln/detail/CVE-2024-49883), [CVE-2024-49882](https://nvd.nist.gov/vuln/detail/CVE-2024-49882), [CVE-2024-49881](https://nvd.nist.gov/vuln/detail/CVE-2024-49881), [CVE-2024-49879](https://nvd.nist.gov/vuln/detail/CVE-2024-49879), [CVE-2024-49913](https://nvd.nist.gov/vuln/detail/CVE-2024-49913), [CVE-2024-49912](https://nvd.nist.gov/vuln/detail/CVE-2024-49912), [CVE-2024-49907](https://nvd.nist.gov/vuln/detail/CVE-2024-49907), [CVE-2024-49905](https://nvd.nist.gov/vuln/detail/CVE-2024-49905), [CVE-2024-49878](https://nvd.nist.gov/vuln/detail/CVE-2024-49878), [CVE-2024-49903](https://nvd.nist.gov/vuln/detail/CVE-2024-49903), [CVE-2024-49902](https://nvd.nist.gov/vuln/detail/CVE-2024-49902), [CVE-2024-49901](https://nvd.nist.gov/vuln/detail/CVE-2024-49901), [CVE-2024-49900](https://nvd.nist.gov/vuln/detail/CVE-2024-49900), [CVE-2024-49896](https://nvd.nist.gov/vuln/detail/CVE-2024-49896), [CVE-2024-49895](https://nvd.nist.gov/vuln/detail/CVE-2024-49895), [CVE-2024-49877](https://nvd.nist.gov/vuln/detail/CVE-2024-49877), [CVE-2024-49894](https://nvd.nist.gov/vuln/detail/CVE-2024-49894), [CVE-2024-49892](https://nvd.nist.gov/vuln/detail/CVE-2024-49892), [CVE-2024-49890](https://nvd.nist.gov/vuln/detail/CVE-2024-49890), [CVE-2024-49889](https://nvd.nist.gov/vuln/detail/CVE-2024-49889), [CVE-2024-49886](https://nvd.nist.gov/vuln/detail/CVE-2024-49886), [CVE-2024-49863](https://nvd.nist.gov/vuln/detail/CVE-2024-49863), [CVE-2024-49871](https://nvd.nist.gov/vuln/detail/CVE-2024-49871), [CVE-2024-49870](https://nvd.nist.gov/vuln/detail/CVE-2024-49870), [CVE-2024-49868](https://nvd.nist.gov/vuln/detail/CVE-2024-49868), [CVE-2024-49867](https://nvd.nist.gov/vuln/detail/CVE-2024-49867), [CVE-2024-49866](https://nvd.nist.gov/vuln/detail/CVE-2024-49866), [CVE-2024-49874](https://nvd.nist.gov/vuln/detail/CVE-2024-49874), [CVE-2024-49864](https://nvd.nist.gov/vuln/detail/CVE-2024-49864), [CVE-2024-47704](https://nvd.nist.gov/vuln/detail/CVE-2024-47704), [CVE-2024-50191](https://nvd.nist.gov/vuln/detail/CVE-2024-50191), [CVE-2024-50189](https://nvd.nist.gov/vuln/detail/CVE-2024-50189), [CVE-2024-50188](https://nvd.nist.gov/vuln/detail/CVE-2024-50188), [CVE-2024-50187](https://nvd.nist.gov/vuln/detail/CVE-2024-50187), [CVE-2024-50186](https://nvd.nist.gov/vuln/detail/CVE-2024-50186), [CVE-2024-50185](https://nvd.nist.gov/vuln/detail/CVE-2024-50185), [CVE-2024-50184](https://nvd.nist.gov/vuln/detail/CVE-2024-50184), [CVE-2024-50183](https://nvd.nist.gov/vuln/detail/CVE-2024-50183), [CVE-2024-50182](https://nvd.nist.gov/vuln/detail/CVE-2024-50182), [CVE-2024-50180](https://nvd.nist.gov/vuln/detail/CVE-2024-50180), [CVE-2024-50181](https://nvd.nist.gov/vuln/detail/CVE-2024-50181), [CVE-2024-50097](https://nvd.nist.gov/vuln/detail/CVE-2024-50097), [CVE-2024-50096](https://nvd.nist.gov/vuln/detail/CVE-2024-50096), [CVE-2024-50095](https://nvd.nist.gov/vuln/detail/CVE-2024-50095), [CVE-2024-50093](https://nvd.nist.gov/vuln/detail/CVE-2024-50093), [CVE-2024-50089](https://nvd.nist.gov/vuln/detail/CVE-2024-50089), [CVE-2024-50058](https://nvd.nist.gov/vuln/detail/CVE-2024-50058), [CVE-2024-50065](https://nvd.nist.gov/vuln/detail/CVE-2024-50065), [CVE-2024-50064](https://nvd.nist.gov/vuln/detail/CVE-2024-50064), [CVE-2024-50063](https://nvd.nist.gov/vuln/detail/CVE-2024-50063), [CVE-2024-50062](https://nvd.nist.gov/vuln/detail/CVE-2024-50062), [CVE-2024-50061](https://nvd.nist.gov/vuln/detail/CVE-2024-50061), [CVE-2024-50060](https://nvd.nist.gov/vuln/detail/CVE-2024-50060), [CVE-2024-50059](https://nvd.nist.gov/vuln/detail/CVE-2024-50059), [CVE-2024-50026](https://nvd.nist.gov/vuln/detail/CVE-2024-50026), [CVE-2024-50024](https://nvd.nist.gov/vuln/detail/CVE-2024-50024), [CVE-2024-50023](https://nvd.nist.gov/vuln/detail/CVE-2024-50023), [CVE-2024-50057](https://nvd.nist.gov/vuln/detail/CVE-2024-50057), [CVE-2024-50055](https://nvd.nist.gov/vuln/detail/CVE-2024-50055), [CVE-2024-50049](https://nvd.nist.gov/vuln/detail/CVE-2024-50049), [CVE-2024-50022](https://nvd.nist.gov/vuln/detail/CVE-2024-50022), [CVE-2024-50048](https://nvd.nist.gov/vuln/detail/CVE-2024-50048), [CVE-2024-50047](https://nvd.nist.gov/vuln/detail/CVE-2024-50047), [CVE-2024-50046](https://nvd.nist.gov/vuln/detail/CVE-2024-50046), [CVE-2024-50045](https://nvd.nist.gov/vuln/detail/CVE-2024-50045), [CVE-2024-50044](https://nvd.nist.gov/vuln/detail/CVE-2024-50044), [CVE-2024-50041](https://nvd.nist.gov/vuln/detail/CVE-2024-50041), [CVE-2024-50040](https://nvd.nist.gov/vuln/detail/CVE-2024-50040), [CVE-2024-50039](https://nvd.nist.gov/vuln/detail/CVE-2024-50039), [CVE-2024-50038](https://nvd.nist.gov/vuln/detail/CVE-2024-50038), [CVE-2024-50036](https://nvd.nist.gov/vuln/detail/CVE-2024-50036), [CVE-2024-50035](https://nvd.nist.gov/vuln/detail/CVE-2024-50035), [CVE-2024-50033](https://nvd.nist.gov/vuln/detail/CVE-2024-50033), [CVE-2024-50032](https://nvd.nist.gov/vuln/detail/CVE-2024-50032), [CVE-2024-50031](https://nvd.nist.gov/vuln/detail/CVE-2024-50031), [CVE-2024-50029](https://nvd.nist.gov/vuln/detail/CVE-2024-50029), [CVE-2024-50019](https://nvd.nist.gov/vuln/detail/CVE-2024-50019), [CVE-2024-50201](https://nvd.nist.gov/vuln/detail/CVE-2024-50201), [CVE-2024-50202](https://nvd.nist.gov/vuln/detail/CVE-2024-50202), [CVE-2024-50101](https://nvd.nist.gov/vuln/detail/CVE-2024-50101), [CVE-2024-50098](https://nvd.nist.gov/vuln/detail/CVE-2024-50098), [CVE-2024-50099](https://nvd.nist.gov/vuln/detail/CVE-2024-50099), [CVE-2024-50088](https://nvd.nist.gov/vuln/detail/CVE-2024-50088), [CVE-2024-50087](https://nvd.nist.gov/vuln/detail/CVE-2024-50087), [CVE-2024-50086](https://nvd.nist.gov/vuln/detail/CVE-2024-50086), [CVE-2024-50085](https://nvd.nist.gov/vuln/detail/CVE-2024-50085), [CVE-2024-50084](https://nvd.nist.gov/vuln/detail/CVE-2024-50084), [CVE-2024-50083](https://nvd.nist.gov/vuln/detail/CVE-2024-50083), [CVE-2024-50082](https://nvd.nist.gov/vuln/detail/CVE-2024-50082), [CVE-2024-50080](https://nvd.nist.gov/vuln/detail/CVE-2024-50080), [CVE-2024-50077](https://nvd.nist.gov/vuln/detail/CVE-2024-50077), [CVE-2024-50076](https://nvd.nist.gov/vuln/detail/CVE-2024-50076), [CVE-2024-50075](https://nvd.nist.gov/vuln/detail/CVE-2024-50075), [CVE-2024-50074](https://nvd.nist.gov/vuln/detail/CVE-2024-50074), [CVE-2024-50073](https://nvd.nist.gov/vuln/detail/CVE-2024-50073), [CVE-2024-50072](https://nvd.nist.gov/vuln/detail/CVE-2024-50072), [CVE-2024-50070](https://nvd.nist.gov/vuln/detail/CVE-2024-50070), [CVE-2024-50078](https://nvd.nist.gov/vuln/detail/CVE-2024-50078), [CVE-2024-50069](https://nvd.nist.gov/vuln/detail/CVE-2024-50069), [CVE-2024-50066](https://nvd.nist.gov/vuln/detail/CVE-2024-50066), [CVE-2024-50211](https://nvd.nist.gov/vuln/detail/CVE-2024-50211), [CVE-2024-50210](https://nvd.nist.gov/vuln/detail/CVE-2024-50210), [CVE-2024-50209](https://nvd.nist.gov/vuln/detail/CVE-2024-50209), [CVE-2024-50208](https://nvd.nist.gov/vuln/detail/CVE-2024-50208), [CVE-2024-50205](https://nvd.nist.gov/vuln/detail/CVE-2024-50205), [CVE-2024-50155](https://nvd.nist.gov/vuln/detail/CVE-2024-50155), [CVE-2024-50164](https://nvd.nist.gov/vuln/detail/CVE-2024-50164), [CVE-2024-50163](https://nvd.nist.gov/vuln/detail/CVE-2024-50163), [CVE-2024-50162](https://nvd.nist.gov/vuln/detail/CVE-2024-50162), [CVE-2024-50160](https://nvd.nist.gov/vuln/detail/CVE-2024-50160), [CVE-2024-50159](https://nvd.nist.gov/vuln/detail/CVE-2024-50159), [CVE-2024-50158](https://nvd.nist.gov/vuln/detail/CVE-2024-50158), [CVE-2024-50172](https://nvd.nist.gov/vuln/detail/CVE-2024-50172), [CVE-2024-50171](https://nvd.nist.gov/vuln/detail/CVE-2024-50171), [CVE-2024-50170](https://nvd.nist.gov/vuln/detail/CVE-2024-50170), [CVE-2024-50169](https://nvd.nist.gov/vuln/detail/CVE-2024-50169), [CVE-2024-50168](https://nvd.nist.gov/vuln/detail/CVE-2024-50168), [CVE-2024-50167](https://nvd.nist.gov/vuln/detail/CVE-2024-50167), [CVE-2024-50166](https://nvd.nist.gov/vuln/detail/CVE-2024-50166), [CVE-2024-50156](https://nvd.nist.gov/vuln/detail/CVE-2024-50156), [CVE-2024-50148](https://nvd.nist.gov/vuln/detail/CVE-2024-50148), [CVE-2024-50147](https://nvd.nist.gov/vuln/detail/CVE-2024-50147), [CVE-2024-50145](https://nvd.nist.gov/vuln/detail/CVE-2024-50145), [CVE-2024-50143](https://nvd.nist.gov/vuln/detail/CVE-2024-50143), [CVE-2024-50142](https://nvd.nist.gov/vuln/detail/CVE-2024-50142), [CVE-2024-50141](https://nvd.nist.gov/vuln/detail/CVE-2024-50141), [CVE-2024-50154](https://nvd.nist.gov/vuln/detail/CVE-2024-50154), [CVE-2024-50153](https://nvd.nist.gov/vuln/detail/CVE-2024-50153), [CVE-2024-50152](https://nvd.nist.gov/vuln/detail/CVE-2024-50152), [CVE-2024-50151](https://nvd.nist.gov/vuln/detail/CVE-2024-50151), [CVE-2024-50150](https://nvd.nist.gov/vuln/detail/CVE-2024-50150), [CVE-2024-50139](https://nvd.nist.gov/vuln/detail/CVE-2024-50139), [CVE-2024-50140](https://nvd.nist.gov/vuln/detail/CVE-2024-50140), [CVE-2024-50128](https://nvd.nist.gov/vuln/detail/CVE-2024-50128), [CVE-2024-50136](https://nvd.nist.gov/vuln/detail/CVE-2024-50136), [CVE-2024-50135](https://nvd.nist.gov/vuln/detail/CVE-2024-50135), [CVE-2024-50134](https://nvd.nist.gov/vuln/detail/CVE-2024-50134), [CVE-2024-50133](https://nvd.nist.gov/vuln/detail/CVE-2024-50133), [CVE-2024-50131](https://nvd.nist.gov/vuln/detail/CVE-2024-50131), [CVE-2024-50130](https://nvd.nist.gov/vuln/detail/CVE-2024-50130), [CVE-2024-50111](https://nvd.nist.gov/vuln/detail/CVE-2024-50111), [CVE-2024-50110](https://nvd.nist.gov/vuln/detail/CVE-2024-50110), [CVE-2024-50108](https://nvd.nist.gov/vuln/detail/CVE-2024-50108), [CVE-2024-50127](https://nvd.nist.gov/vuln/detail/CVE-2024-50127), [CVE-2024-50126](https://nvd.nist.gov/vuln/detail/CVE-2024-50126), [CVE-2024-50125](https://nvd.nist.gov/vuln/detail/CVE-2024-50125), [CVE-2024-50124](https://nvd.nist.gov/vuln/detail/CVE-2024-50124), [CVE-2024-50121](https://nvd.nist.gov/vuln/detail/CVE-2024-50121), [CVE-2024-50120](https://nvd.nist.gov/vuln/detail/CVE-2024-50120), [CVE-2024-50117](https://nvd.nist.gov/vuln/detail/CVE-2024-50117), [CVE-2024-50116](https://nvd.nist.gov/vuln/detail/CVE-2024-50116), [CVE-2024-50115](https://nvd.nist.gov/vuln/detail/CVE-2024-50115), [CVE-2024-50112](https://nvd.nist.gov/vuln/detail/CVE-2024-50112), [CVE-2024-50103](https://nvd.nist.gov/vuln/detail/CVE-2024-50103), [CVE-2024-50262](https://nvd.nist.gov/vuln/detail/CVE-2024-50262), [CVE-2024-50259](https://nvd.nist.gov/vuln/detail/CVE-2024-50259), [CVE-2024-50261](https://nvd.nist.gov/vuln/detail/CVE-2024-50261), [CVE-2024-50226](https://nvd.nist.gov/vuln/detail/CVE-2024-50226), [CVE-2024-50235](https://nvd.nist.gov/vuln/detail/CVE-2024-50235), [CVE-2024-50234](https://nvd.nist.gov/vuln/detail/CVE-2024-50234), [CVE-2024-50233](https://nvd.nist.gov/vuln/detail/CVE-2024-50233), [CVE-2024-50232](https://nvd.nist.gov/vuln/detail/CVE-2024-50232), [CVE-2024-50231](https://nvd.nist.gov/vuln/detail/CVE-2024-50231), [CVE-2024-50230](https://nvd.nist.gov/vuln/detail/CVE-2024-50230), [CVE-2024-50258](https://nvd.nist.gov/vuln/detail/CVE-2024-50258), [CVE-2024-50257](https://nvd.nist.gov/vuln/detail/CVE-2024-50257), [CVE-2024-50256](https://nvd.nist.gov/vuln/detail/CVE-2024-50256), [CVE-2024-50229](https://nvd.nist.gov/vuln/detail/CVE-2024-50229), [CVE-2024-50255](https://nvd.nist.gov/vuln/detail/CVE-2024-50255), [CVE-2024-50252](https://nvd.nist.gov/vuln/detail/CVE-2024-50252), [CVE-2024-50251](https://nvd.nist.gov/vuln/detail/CVE-2024-50251), [CVE-2024-50250](https://nvd.nist.gov/vuln/detail/CVE-2024-50250), [CVE-2024-50249](https://nvd.nist.gov/vuln/detail/CVE-2024-50249), [CVE-2024-50248](https://nvd.nist.gov/vuln/detail/CVE-2024-50248), [CVE-2024-50247](https://nvd.nist.gov/vuln/detail/CVE-2024-50247), [CVE-2024-50246](https://nvd.nist.gov/vuln/detail/CVE-2024-50246), [CVE-2024-50228](https://nvd.nist.gov/vuln/detail/CVE-2024-50228), [CVE-2024-50245](https://nvd.nist.gov/vuln/detail/CVE-2024-50245), [CVE-2024-50244](https://nvd.nist.gov/vuln/detail/CVE-2024-50244), [CVE-2024-50243](https://nvd.nist.gov/vuln/detail/CVE-2024-50243), [CVE-2024-50242](https://nvd.nist.gov/vuln/detail/CVE-2024-50242), [CVE-2024-50240](https://nvd.nist.gov/vuln/detail/CVE-2024-50240), [CVE-2024-50239](https://nvd.nist.gov/vuln/detail/CVE-2024-50239), [CVE-2024-50237](https://nvd.nist.gov/vuln/detail/CVE-2024-50237), [CVE-2024-50236](https://nvd.nist.gov/vuln/detail/CVE-2024-50236), [CVE-2024-50219](https://nvd.nist.gov/vuln/detail/CVE-2024-50219), [CVE-2024-50218](https://nvd.nist.gov/vuln/detail/CVE-2024-50218), [CVE-2024-50216](https://nvd.nist.gov/vuln/detail/CVE-2024-50216), [CVE-2024-50215](https://nvd.nist.gov/vuln/detail/CVE-2024-50215), [CVE-2024-50224](https://nvd.nist.gov/vuln/detail/CVE-2024-50224), [CVE-2024-50223](https://nvd.nist.gov/vuln/detail/CVE-2024-50223), [CVE-2024-50222](https://nvd.nist.gov/vuln/detail/CVE-2024-50222))\n\n #### Changes:\n\n - Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha ([flatcar/scripts#2390](https://github.com/flatcar/scripts/pull/2390))\n\n #### Updates:\n \n - ca-certificates ([3.106](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html))\n - Linux ([6.6.60](https://lwn.net/Articles/997527) (includes [6.6.59](https://lwn.net/Articles/996689), [6.6.58](https://lwn.net/Articles/995132), [6.6.57](https://lwn.net/Articles/994634), [6.6.56](https://lwn.net/Articles/993600), [6.6.55](https://lwn.net/Articles/993599)))\n"
  },
  "4152.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-12-16 14:12:13 +0000",
    "major_software": {
      "containerd": [
        "1.7.23"
      ],
      "docker": [
        "27.2.1"
      ],
      "ignition": [
        "2.20.0"
      ],
      "kernel": [
        "6.6.65"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "_Changes since **Beta 4116.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2024-53103](https://nvd.nist.gov/vuln/detail/CVE-2024-53103), [CVE-2024-53104](https://nvd.nist.gov/vuln/detail/CVE-2024-53104), [CVE-2024-53088](https://nvd.nist.gov/vuln/detail/CVE-2024-53088), [CVE-2024-53082](https://nvd.nist.gov/vuln/detail/CVE-2024-53082), [CVE-2024-53083](https://nvd.nist.gov/vuln/detail/CVE-2024-53083), [CVE-2024-53081](https://nvd.nist.gov/vuln/detail/CVE-2024-53081), [CVE-2024-53060](https://nvd.nist.gov/vuln/detail/CVE-2024-53060), [CVE-2024-53068](https://nvd.nist.gov/vuln/detail/CVE-2024-53068), [CVE-2024-53066](https://nvd.nist.gov/vuln/detail/CVE-2024-53066), [CVE-2024-53063](https://nvd.nist.gov/vuln/detail/CVE-2024-53063), [CVE-2024-53072](https://nvd.nist.gov/vuln/detail/CVE-2024-53072), [CVE-2024-53070](https://nvd.nist.gov/vuln/detail/CVE-2024-53070), [CVE-2024-53061](https://nvd.nist.gov/vuln/detail/CVE-2024-53061), [CVE-2024-50302](https://nvd.nist.gov/vuln/detail/CVE-2024-50302), [CVE-2024-50301](https://nvd.nist.gov/vuln/detail/CVE-2024-50301), [CVE-2024-50296](https://nvd.nist.gov/vuln/detail/CVE-2024-50296), [CVE-2024-50295](https://nvd.nist.gov/vuln/detail/CVE-2024-50295), [CVE-2024-50294](https://nvd.nist.gov/vuln/detail/CVE-2024-50294), [CVE-2024-50292](https://nvd.nist.gov/vuln/detail/CVE-2024-50292), [CVE-2024-50290](https://nvd.nist.gov/vuln/detail/CVE-2024-50290), [CVE-2024-50300](https://nvd.nist.gov/vuln/detail/CVE-2024-50300), [CVE-2024-50299](https://nvd.nist.gov/vuln/detail/CVE-2024-50299), [CVE-2024-50298](https://nvd.nist.gov/vuln/detail/CVE-2024-50298), [CVE-2024-50275](https://nvd.nist.gov/vuln/detail/CVE-2024-50275), [CVE-2024-50284](https://nvd.nist.gov/vuln/detail/CVE-2024-50284), [CVE-2024-50283](https://nvd.nist.gov/vuln/detail/CVE-2024-50283), [CVE-2024-50282](https://nvd.nist.gov/vuln/detail/CVE-2024-50282), [CVE-2024-50280](https://nvd.nist.gov/vuln/detail/CVE-2024-50280), [CVE-2024-50279](https://nvd.nist.gov/vuln/detail/CVE-2024-50279), [CVE-2024-50278](https://nvd.nist.gov/vuln/detail/CVE-2024-50278), [CVE-2024-50287](https://nvd.nist.gov/vuln/detail/CVE-2024-50287), [CVE-2024-50286](https://nvd.nist.gov/vuln/detail/CVE-2024-50286), [CVE-2024-50285](https://nvd.nist.gov/vuln/detail/CVE-2024-50285), [CVE-2024-50276](https://nvd.nist.gov/vuln/detail/CVE-2024-50276), [CVE-2024-50273](https://nvd.nist.gov/vuln/detail/CVE-2024-50273), [CVE-2024-50272](https://nvd.nist.gov/vuln/detail/CVE-2024-50272), [CVE-2024-50271](https://nvd.nist.gov/vuln/detail/CVE-2024-50271), [CVE-2024-50269](https://nvd.nist.gov/vuln/detail/CVE-2024-50269), [CVE-2024-50268](https://nvd.nist.gov/vuln/detail/CVE-2024-50268), [CVE-2024-50267](https://nvd.nist.gov/vuln/detail/CVE-2024-50267), [CVE-2024-50264](https://nvd.nist.gov/vuln/detail/CVE-2024-50264), [CVE-2024-50265](https://nvd.nist.gov/vuln/detail/CVE-2024-50265), [CVE-2024-53102](https://nvd.nist.gov/vuln/detail/CVE-2024-53102), [CVE-2024-53101](https://nvd.nist.gov/vuln/detail/CVE-2024-53101), [CVE-2024-53100](https://nvd.nist.gov/vuln/detail/CVE-2024-53100), [CVE-2024-53099](https://nvd.nist.gov/vuln/detail/CVE-2024-53099), [CVE-2024-53097](https://nvd.nist.gov/vuln/detail/CVE-2024-53097), [CVE-2024-53095](https://nvd.nist.gov/vuln/detail/CVE-2024-53095), [CVE-2024-53094](https://nvd.nist.gov/vuln/detail/CVE-2024-53094), [CVE-2024-53093](https://nvd.nist.gov/vuln/detail/CVE-2024-53093), [CVE-2024-53091](https://nvd.nist.gov/vuln/detail/CVE-2024-53091), [CVE-2024-53079](https://nvd.nist.gov/vuln/detail/CVE-2024-53079), [CVE-2024-53135](https://nvd.nist.gov/vuln/detail/CVE-2024-53135), [CVE-2024-53134](https://nvd.nist.gov/vuln/detail/CVE-2024-53134), [CVE-2024-53131](https://nvd.nist.gov/vuln/detail/CVE-2024-53131), [CVE-2024-53130](https://nvd.nist.gov/vuln/detail/CVE-2024-53130), [CVE-2024-53129](https://nvd.nist.gov/vuln/detail/CVE-2024-53129), [CVE-2024-53140](https://nvd.nist.gov/vuln/detail/CVE-2024-53140), [CVE-2024-53139](https://nvd.nist.gov/vuln/detail/CVE-2024-53139), [CVE-2024-53138](https://nvd.nist.gov/vuln/detail/CVE-2024-53138), [CVE-2024-53136](https://nvd.nist.gov/vuln/detail/CVE-2024-53136), [CVE-2024-53126](https://nvd.nist.gov/vuln/detail/CVE-2024-53126), [CVE-2024-53127](https://nvd.nist.gov/vuln/detail/CVE-2024-53127), [CVE-2024-53113](https://nvd.nist.gov/vuln/detail/CVE-2024-53113), [CVE-2024-53112](https://nvd.nist.gov/vuln/detail/CVE-2024-53112), [CVE-2024-53110](https://nvd.nist.gov/vuln/detail/CVE-2024-53110), [CVE-2024-53109](https://nvd.nist.gov/vuln/detail/CVE-2024-53109), [CVE-2024-53108](https://nvd.nist.gov/vuln/detail/CVE-2024-53108), [CVE-2024-53123](https://nvd.nist.gov/vuln/detail/CVE-2024-53123), [CVE-2024-53122](https://nvd.nist.gov/vuln/detail/CVE-2024-53122), [CVE-2024-53121](https://nvd.nist.gov/vuln/detail/CVE-2024-53121), [CVE-2024-53120](https://nvd.nist.gov/vuln/detail/CVE-2024-53120), [CVE-2024-53119](https://nvd.nist.gov/vuln/detail/CVE-2024-53119), [CVE-2024-53106](https://nvd.nist.gov/vuln/detail/CVE-2024-53106))\n- OpenSSL ([CVE-2024-2511](https://nvd.nist.gov/vuln/detail/CVE-2024-2511), [CVE-2024-4603](https://nvd.nist.gov/vuln/detail/CVE-2024-4603), [CVE-2024-4741](https://nvd.nist.gov/vuln/detail/CVE-2024-4741), [CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535), [CVE-2024-6119](https://nvd.nist.gov/vuln/detail/CVE-2024-6119), [CVE-2024-9143](https://nvd.nist.gov/vuln/detail/CVE-2024-9143))\n- curl ([CVE-2024-8096](https://nvd.nist.gov/vuln/detail/CVE-2024-8096))\n- libarchive ([CVE-2024-26256](https://nvd.nist.gov/vuln/detail/CVE-2024-26256), [CVE-2024-48957](https://nvd.nist.gov/vuln/detail/CVE-2024-48957), [CVE-2024-48958](https://nvd.nist.gov/vuln/detail/CVE-2024-48958))\n- nvidia-drivers ([CVE-2023-31022](https://nvd.nist.gov/vuln/detail/CVE-2023-31022), [CVE-2024-0074](https://nvd.nist.gov/vuln/detail/CVE-2024-0074), [CVE-2024-0075](https://nvd.nist.gov/vuln/detail/CVE-2024-0075), [CVE-2024-0078](https://nvd.nist.gov/vuln/detail/CVE-2024-0078), [CVE-2024-0126](https://nvd.nist.gov/vuln/detail/CVE-2024-0126))\n- openssh ([CVE-2024-39894](https://nvd.nist.gov/vuln/detail/CVE-2024-39894))\n- sysext-podman: containers-common ([CVE-2024-9341](https://nvd.nist.gov/vuln/detail/CVE-2024-9341))\n- sysext-podman: containers-image ([CVE-2024-3727](https://nvd.nist.gov/vuln/detail/CVE-2024-3727))\n- sysext-podman: podman ([CVE-2024-9407](https://nvd.nist.gov/vuln/detail/CVE-2024-9407))\n\n#### Bug fixes:\n\n- Added qemu-guest-agent to ARM64 images ([flatcar/flatcar#1593](https://github.com/flatcar/Flatcar/issues/1593))\n\n#### Changes:\n\n- Added Proxmox Virtual Environment images ([scripts#1783](https://github.com/flatcar/scripts/pull/1783))\n- The UEFI firmware has changed from raw (.fd) format to QCOW2 format. In addition, the amd64 firmware variables are now held in a 4MB image rather than a 2MB image. Note that this firmware is only intended for testing with QEMU. Do not use it in production. ([scripts#2434](https://github.com/flatcar/scripts/pull/2434))\n- The arm64 UEFI firmware now supports Secure Boot. Be aware that this is not considered secure due to the lack of an SMM implementation, which is needed to protect the variable store. As above, this firmware should not be used in production anyway. ([scripts#2434](https://github.com/flatcar/scripts/pull/2434))\n- grub 2.12-flatcar3: GRUB now includes many patches from Red Hat to support Secure Boot, as well as Flatcar's own patches. The version string includes a numbered \"flatcar\" suffix to track changes to these additional patches. This string can be seen in the GRUB menu. ([scripts#2431](https://github.com/flatcar/scripts/pull/2431))\n\n#### Updates:\n\n- Ignition ([2.20.0](https://coreos.github.io/ignition/release-notes/#ignition-2200-2024-10-22))\n- Linux ([6.6.65](https://lwn.net/Articles/1001739) (includes [6.6.64](https://lwn.net/Articles/1001438), [6.6.63](https://lwn.net/Articles/999110), [6.6.62](https://lwn.net/Articles/998450), [6.6.61](https://lwn.net/Articles/998150)))\n- Linux Firmware ([20241017](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241017))\n- OpenSSL ([3.2.3](https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32))\n- SDK: Go ([1.22.9](https://go.dev/doc/devel/release#go1.22.9))\n- SDK: catalyst ([4.0.0](https://gitweb.gentoo.org/proj/catalyst.git/log/?h=4.0.0))\n- SDK: crossdev ([20240921](https://gitweb.gentoo.org/proj/crossdev.git/log/?h=20240921))\n- SDK: edk2-bin ([202408](https://github.com/tianocore/edk2/releases/tag/edk2-stable202408) (includes [202405](https://github.com/tianocore/edk2/releases/tag/edk2-stable202405), [202402](https://github.com/tianocore/edk2/releases/tag/edk2-stable202402), [202311](https://github.com/tianocore/edk2/releases/tag/edk2-stable202311), [202308](https://github.com/tianocore/edk2/releases/tag/edk2-stable202308), [202305](https://github.com/tianocore/edk2/releases/tag/edk2-stable202305), [202302](https://github.com/tianocore/edk2/releases/tag/edk2-stable202302), [202211](https://github.com/tianocore/edk2/releases/tag/edk2-stable202211), [202208](https://github.com/tianocore/edk2/releases/tag/edk2-stable202208), [202205](https://github.com/tianocore/edk2/releases/tag/edk2-stable202205)))\n- SDK: meson ([1.5.2](https://github.com/mesonbuild/meson/commits/1.5.2/))\n- SDK: rust ([1.81.0](https://blog.rust-lang.org/2024/09/05/Rust-1.81.0.html))\n- azure: chrony ([4.6](https://gitlab.com/chrony/chrony/-/blob/4.6/NEWS))\n- base, dev: azure-vm-utils ([0.3.0](https://github.com/Azure/azure-vm-utils/releases/tag/v0.3.0))\n- base, dev: binutils-config ([5.5.2](https://gitweb.gentoo.org/proj/binutils-config.git/log/?h=v5.5.2))\n- base, dev: btrfs-progs ([6.10.1](https://github.com/kdave/btrfs-progs/blob/v6.10.1/CHANGES#L26-L38) (includes [6.10](https://github.com/kdave/btrfs-progs/blob/v6.10/CHANGES)))\n- base, dev: c-ares ([1.33.1](https://github.com/c-ares/c-ares/releases/tag/v1.33.1) (includes [1.33.0](https://github.com/c-ares/c-ares/releases/tag/v1.33.0), [1.32.3](https://github.com/c-ares/c-ares/releases/tag/v1.32.3), [1.32.2](https://github.com/c-ares/c-ares/releases/tag/v1.32.2), [1.32.1](https://github.com/c-ares/c-ares/releases/tag/v1.32.1), [1.32.0](https://github.com/c-ares/c-ares/releases/tag/v1.32.0), [1.31.0](https://github.com/c-ares/c-ares/releases/tag/v1.31.0), [1.30.0](https://github.com/c-ares/c-ares/releases/tag/v1.30.0)))\n- base, dev: cracklib ([2.10.2](https://github.com/cracklib/cracklib/releases/tag/v2.10.2) (includes [2.10.1](https://github.com/cracklib/cracklib/releases/tag/v2.10.1), [2.10.0](https://github.com/cracklib/cracklib/releases/tag/v2.10.0)))\n- base, dev: cryptsetup ([2.7.5](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.5/docs/v2.7.5-ReleaseNotes) (includes [2.7.4](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.4/docs/v2.7.4-ReleaseNotes), [2.7.3](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.3/docs/v2.7.3-ReleaseNotes)))\n- base, dev: curl ([8.10.1](https://curl.se/ch/8.10.1.html) (includes [8.10.0](https://curl.se/ch/8.10.0.html)))\n- base, dev: efivar ([39](https://github.com/rhboot/efivar/releases/tag/39))\n- base, dev: gettext ([0.22.5](https://savannah.gnu.org/news/?id=10597))\n- base, dev: git ([2.45.2](https://github.com/git/git/blob/v2.45.2/Documentation/RelNotes/2.45.2.txt) (includes [2.45.1](https://github.com/git/git/blob/v2.45.1/Documentation/RelNotes/2.45.1.txt), [2.45.0](https://github.com/git/git/blob/v2.45.0/Documentation/RelNotes/2.45.0.txt)))\n- base, dev: gnutls ([3.8.7.1](https://gitlab.com/gnutls/gnutls/-/blob/3.8.7/NEWS) (includes [3.8.6](https://gitlab.com/gnutls/gnutls/-/blob/3.8.6/NEWS)))\n- base, dev: gptfdisk ([1.0.10](https://sourceforge.net/p/gptfdisk/code/ci/53ac725a88a616b9f3395500d6e520aa04742fa5/tree/NEWS))\n- base, dev: intel-microcode ([20240910_p20240915](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910))\n- base, dev: kmod ([33](https://github.com/kmod-project/kmod/blob/v33/NEWS))\n- base, dev: ldb ([2.8.1](https://gitlab.com/samba-team/samba/-/commit/6ca4df6374136d1d205de689618dc8fce5177d14) (includes [2.8.0](https://gitlab.com/samba-team/samba/-/commit/94f11c3c21bc3b8a34d376ab99becd2c6260af62)))\n- base, dev: libarchive ([3.7.6](https://github.com/libarchive/libarchive/releases/tag/v3.7.6) (includes [3.7.5](https://github.com/libarchive/libarchive/releases/tag/v3.7.5)))\n- base, dev: libassuan ([3.0.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=48ece8b1cf8b81bdf835db00079ae247742cd398;hb=0351ecfa4f35ad44684075abec153574986b11bd))\n- base, dev: libgcrypt ([1.11.0](https://dev.gnupg.org/T7165))\n- base, dev: libgpg-error ([1.50](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=b865ecc7197a4f60b1530958fbb25a92bdfdc3de;hb=bb732615daad9bba9026354ae90f0f5292ea4908))\n- base, dev: libnl ([3.10.0](https://lists.infradead.org/pipermail/libnl/2024-July/002440.html))\n- base, dev: libnvme ([1.10](https://github.com/linux-nvme/libnvme/releases/tag/v1.10))\n- base, dev: liburing ([2.7](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.7) (includes [2.6](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.6), [2.5](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.5), [2.4](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.4)))\n- base, dev: nvme-cli ([2.10.2](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.2) (includes [2.10.1](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.1), [2.10](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10)))\n- base, dev: oniguruma ([6.9.9](https://github.com/kkos/oniguruma/releases/tag/v6.9.9))\n- base, dev: openssh ([9.8_p1](https://www.openssh.com/txt/release-9.8))\n- base, dev: pinentry ([1.3.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=a07d18953341a4eb65c9873e64c06bc7c642606d;hb=dd8894fa60c1f1c08ecc50ba4657580abc348347))\n- base, dev: pkgconf ([2.3.0](https://github.com/pkgconf/pkgconf/blob/pkgconf-2.3.0/NEWS))\n- base, dev: samba ([4.19.7](https://gitlab.com/samba-team/samba/-/blob/bce5c475d12fb75619bc85d176bfd40420b4fce8/WHATSNEW.txt))\n- base, dev: selinux-base ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916))\n- base, dev: selinux-base-policy ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916))\n- base, dev: selinux-container ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916))\n- base, dev: selinux-dbus ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916))\n- base, dev: selinux-policykit ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916))\n- base, dev: selinux-sssd ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916))\n- base, dev: selinux-unconfined ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916))\n- base, dev: socat ([1.8.0.0](https://repo.or.cz/socat.git/blob/2da070164d454971d5c970b5278e645051f0d0f7:/CHANGES))\n- base, dev: sqlite ([3.46.1](https://www.sqlite.org/releaselog/3_46_1.html))\n- base, dev: talloc ([2.4.2](https://gitlab.com/samba-team/samba/-/commit/f28966c1638806a5af1fa4e451b668af638491ce))\n- base, dev: tcpdump ([4.99.5](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.5/CHANGES))\n- base, dev: tdb ([1.4.10](https://gitlab.com/samba-team/samba/-/commit/5032ab712c6e9d6562cd10b1d840d2ee052d1d16))\n- base, dev: tevent ([0.16.1](https://gitlab.com/samba-team/samba/-/commit/0ba05d5bbb1788b0b8cee26748bcda0c90c48baa) (includes [0.16.0](https://gitlab.com/samba-team/samba/-/commit/acd9248b13cba06d5b748f17aa9bc5d62079d9cc)))\n- base, dev: userspace-rcu ([0.14.1](https://lists.lttng.org/pipermail/lttng-dev/2024-August/030860.html))\n- ca-certificates ([3.107](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html))\n- containerd ([1.7.23](https://github.com/containerd/containerd/releases/tag/v1.7.23))\n- dev: gdb ([15.2](https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00011.html))\n- dev: gnuconfig ([20240728](https://git.savannah.gnu.org/cgit/config.git/log/?id=00b15927496058d23e6258a28d8996f87cf1f191))\n- dev: iperf ([3.17.1](https://github.com/esnet/iperf/releases/tag/3.17.1) (includes [3.17](https://github.com/esnet/iperf/releases/tag/3.17)))\n- dev: libpipeline ([1.5.8](https://gitlab.com/libpipeline/libpipeline/-/blob/dd37cf76496b4b999509bd133657c1fc021e3a5f/NEWS.md))\n- dev: man-db ([2.13.0](https://gitlab.com/man-db/man-db/-/releases/2.13.0))\n- nvidia-drivers ([535.216.01](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-216-01/index.html))\n- sysext-podman: aardvark-dns ([1.12.2](https://github.com/containers/aardvark-dns/releases/tag/v1.12.2) (includes [1.12.1](https://github.com/containers/aardvark-dns/releases/tag/v1.12.1), [1.12.0](https://github.com/containers/aardvark-dns/releases/tag/v1.12.0)))\n- sysext-podman: containers-common ([0.60.4](https://github.com/containers/common/releases/tag/v0.60.4) (includes [0.60.3](https://github.com/containers/common/releases/tag/v0.60.3), [0.60.2](https://github.com/containers/common/releases/tag/v0.60.2), [0.60.1](https://github.com/containers/common/releases/tag/v0.60.1), [0.60.0](https://github.com/containers/common/releases/tag/v0.60.0), [0.59.2](https://github.com/containers/common/releases/tag/v0.59.2)))\n- sysext-podman: containers-image ([5.32.2](https://github.com/containers/image/releases/tag/v5.32.2) (includes [5.32.1](https://github.com/containers/image/releases/tag/v5.32.1), [5.32.0](https://github.com/containers/image/releases/tag/v5.32.0), [5.31.0](https://github.com/containers/image/releases/tag/v5.31.0), [5.30.2](https://github.com/containers/image/releases/tag/v5.30.2), [5.30.1](https://github.com/containers/image/releases/tag/v5.30.1)))\n- sysext-podman: containers-storage ([1.55.0](https://github.com/containers/storage/releases/tag/v1.55.0) (includes [1.54.0](https://github.com/containers/storage/releases/tag/v1.54.0)))\n- sysext-podman: crun ([1.17](https://github.com/containers/crun/releases/tag/1.17) (includes [1.16.1](https://github.com/containers/crun/releases/tag/1.16.1), [1.16](https://github.com/containers/crun/releases/tag/1.16), [1.15](https://github.com/containers/crun/releases/tag/1.15), [1.14.4](https://github.com/containers/crun/releases/tag/1.14.4)))\n- sysext-podman: fuse-overlayfs ([1.14](https://github.com/containers/fuse-overlayfs/releases/tag/v1.14))\n- sysext-podman: netavark ([1.12.2](https://github.com/containers/netavark/releases/tag/v1.12.2) (includes [1.12.1](https://github.com/containers/netavark/releases/tag/v1.12.1), [1.12.0](https://github.com/containers/netavark/releases/tag/v1.12.0), [1.11.0](https://github.com/containers/netavark/releases/tag/v1.11.0)))\n- sysext-podman: passt ([2024.09.06](https://archives.passt.top/passt-user/20240906171530.763b3179@elisabeth/T/#u))\n- sysext-podman: podman ([5.2.4](https://github.com/containers/podman/releases/tag/v5.2.4) (includes [5.2.3](https://github.com/containers/podman/releases/tag/v5.2.3), [5.2.2](https://github.com/containers/podman/releases/tag/v5.2.2), [5.2.1](https://github.com/containers/podman/releases/tag/v5.2.1), [5.2.0](https://github.com/containers/podman/releases/tag/v5.2.0), [5.1.2](https://github.com/containers/podman/releases/tag/v5.1.2), [5.1.1](https://github.com/containers/podman/releases/tag/v5.1.1), [5.1.0](https://github.com/containers/podman/releases/tag/v5.1.0)))\n- sysext-python: idna ([3.10](https://github.com/kjd/idna/blob/v3.10/HISTORY.rst))\n- sysext-python: more-itertools ([10.5.0](https://github.com/more-itertools/more-itertools/blob/v10.5.0/docs/versions.rst#1050))\n- sysext-python: msgpack ([1.1.0](https://github.com/msgpack/msgpack-python/blob/v1.1.0/ChangeLog.rst#110))\n- sysext-python: platformdirs ([4.3.6](https://github.com/tox-dev/platformdirs/releases/tag/4.3.6))\n- sysext-python: rich ([13.8.1](https://github.com/Textualize/rich/releases/tag/v13.8.1))\n- sysext-python: setuptools ([74.1.3](https://github.com/pypa/setuptools/blob/v74.1.3/NEWS.rst))\n- sysext-python: trove-classifiers ([2024.9.12](https://github.com/pypa/trove-classifiers/releases/tag/2024.9.12))\n- sysext-python: urllib3 ([2.2.3](https://github.com/urllib3/urllib3/releases/tag/2.2.3))\n- vmware: open-vm-tools ([12.5.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.5.0))\n- vmware: xmlsec ([1.3.4](https://github.com/lsh123/xmlsec/releases/tag/1.3.4))\n\n_Changes since **Alpha 4152.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2024-53103](https://nvd.nist.gov/vuln/detail/CVE-2024-53103), [CVE-2024-53104](https://nvd.nist.gov/vuln/detail/CVE-2024-53104), [CVE-2024-53088](https://nvd.nist.gov/vuln/detail/CVE-2024-53088), [CVE-2024-53082](https://nvd.nist.gov/vuln/detail/CVE-2024-53082), [CVE-2024-53083](https://nvd.nist.gov/vuln/detail/CVE-2024-53083), [CVE-2024-53081](https://nvd.nist.gov/vuln/detail/CVE-2024-53081), [CVE-2024-53060](https://nvd.nist.gov/vuln/detail/CVE-2024-53060), [CVE-2024-53068](https://nvd.nist.gov/vuln/detail/CVE-2024-53068), [CVE-2024-53066](https://nvd.nist.gov/vuln/detail/CVE-2024-53066), [CVE-2024-53063](https://nvd.nist.gov/vuln/detail/CVE-2024-53063), [CVE-2024-53072](https://nvd.nist.gov/vuln/detail/CVE-2024-53072), [CVE-2024-53070](https://nvd.nist.gov/vuln/detail/CVE-2024-53070), [CVE-2024-53061](https://nvd.nist.gov/vuln/detail/CVE-2024-53061), [CVE-2024-50302](https://nvd.nist.gov/vuln/detail/CVE-2024-50302), [CVE-2024-50301](https://nvd.nist.gov/vuln/detail/CVE-2024-50301), [CVE-2024-50296](https://nvd.nist.gov/vuln/detail/CVE-2024-50296), [CVE-2024-50295](https://nvd.nist.gov/vuln/detail/CVE-2024-50295), [CVE-2024-50294](https://nvd.nist.gov/vuln/detail/CVE-2024-50294), [CVE-2024-50292](https://nvd.nist.gov/vuln/detail/CVE-2024-50292), [CVE-2024-50290](https://nvd.nist.gov/vuln/detail/CVE-2024-50290), [CVE-2024-50300](https://nvd.nist.gov/vuln/detail/CVE-2024-50300), [CVE-2024-50299](https://nvd.nist.gov/vuln/detail/CVE-2024-50299), [CVE-2024-50298](https://nvd.nist.gov/vuln/detail/CVE-2024-50298), [CVE-2024-50275](https://nvd.nist.gov/vuln/detail/CVE-2024-50275), [CVE-2024-50284](https://nvd.nist.gov/vuln/detail/CVE-2024-50284), [CVE-2024-50283](https://nvd.nist.gov/vuln/detail/CVE-2024-50283), [CVE-2024-50282](https://nvd.nist.gov/vuln/detail/CVE-2024-50282), [CVE-2024-50280](https://nvd.nist.gov/vuln/detail/CVE-2024-50280), [CVE-2024-50279](https://nvd.nist.gov/vuln/detail/CVE-2024-50279), [CVE-2024-50278](https://nvd.nist.gov/vuln/detail/CVE-2024-50278), [CVE-2024-50287](https://nvd.nist.gov/vuln/detail/CVE-2024-50287), [CVE-2024-50286](https://nvd.nist.gov/vuln/detail/CVE-2024-50286), [CVE-2024-50285](https://nvd.nist.gov/vuln/detail/CVE-2024-50285), [CVE-2024-50276](https://nvd.nist.gov/vuln/detail/CVE-2024-50276), [CVE-2024-50273](https://nvd.nist.gov/vuln/detail/CVE-2024-50273), [CVE-2024-50272](https://nvd.nist.gov/vuln/detail/CVE-2024-50272), [CVE-2024-50271](https://nvd.nist.gov/vuln/detail/CVE-2024-50271), [CVE-2024-50269](https://nvd.nist.gov/vuln/detail/CVE-2024-50269), [CVE-2024-50268](https://nvd.nist.gov/vuln/detail/CVE-2024-50268), [CVE-2024-50267](https://nvd.nist.gov/vuln/detail/CVE-2024-50267), [CVE-2024-50264](https://nvd.nist.gov/vuln/detail/CVE-2024-50264), [CVE-2024-50265](https://nvd.nist.gov/vuln/detail/CVE-2024-50265), [CVE-2024-53102](https://nvd.nist.gov/vuln/detail/CVE-2024-53102), [CVE-2024-53101](https://nvd.nist.gov/vuln/detail/CVE-2024-53101), [CVE-2024-53100](https://nvd.nist.gov/vuln/detail/CVE-2024-53100), [CVE-2024-53099](https://nvd.nist.gov/vuln/detail/CVE-2024-53099), [CVE-2024-53097](https://nvd.nist.gov/vuln/detail/CVE-2024-53097), [CVE-2024-53095](https://nvd.nist.gov/vuln/detail/CVE-2024-53095), [CVE-2024-53094](https://nvd.nist.gov/vuln/detail/CVE-2024-53094), [CVE-2024-53093](https://nvd.nist.gov/vuln/detail/CVE-2024-53093), [CVE-2024-53091](https://nvd.nist.gov/vuln/detail/CVE-2024-53091), [CVE-2024-53079](https://nvd.nist.gov/vuln/detail/CVE-2024-53079), [CVE-2024-53135](https://nvd.nist.gov/vuln/detail/CVE-2024-53135), [CVE-2024-53134](https://nvd.nist.gov/vuln/detail/CVE-2024-53134), [CVE-2024-53131](https://nvd.nist.gov/vuln/detail/CVE-2024-53131), [CVE-2024-53130](https://nvd.nist.gov/vuln/detail/CVE-2024-53130), [CVE-2024-53129](https://nvd.nist.gov/vuln/detail/CVE-2024-53129), [CVE-2024-53140](https://nvd.nist.gov/vuln/detail/CVE-2024-53140), [CVE-2024-53139](https://nvd.nist.gov/vuln/detail/CVE-2024-53139), [CVE-2024-53138](https://nvd.nist.gov/vuln/detail/CVE-2024-53138), [CVE-2024-53136](https://nvd.nist.gov/vuln/detail/CVE-2024-53136), [CVE-2024-53126](https://nvd.nist.gov/vuln/detail/CVE-2024-53126), [CVE-2024-53127](https://nvd.nist.gov/vuln/detail/CVE-2024-53127), [CVE-2024-53113](https://nvd.nist.gov/vuln/detail/CVE-2024-53113), [CVE-2024-53112](https://nvd.nist.gov/vuln/detail/CVE-2024-53112), [CVE-2024-53110](https://nvd.nist.gov/vuln/detail/CVE-2024-53110), [CVE-2024-53109](https://nvd.nist.gov/vuln/detail/CVE-2024-53109), [CVE-2024-53108](https://nvd.nist.gov/vuln/detail/CVE-2024-53108), [CVE-2024-53123](https://nvd.nist.gov/vuln/detail/CVE-2024-53123), [CVE-2024-53122](https://nvd.nist.gov/vuln/detail/CVE-2024-53122), [CVE-2024-53121](https://nvd.nist.gov/vuln/detail/CVE-2024-53121), [CVE-2024-53120](https://nvd.nist.gov/vuln/detail/CVE-2024-53120), [CVE-2024-53119](https://nvd.nist.gov/vuln/detail/CVE-2024-53119), [CVE-2024-53106](https://nvd.nist.gov/vuln/detail/CVE-2024-53106))\n- OpenSSL ([CVE-2024-2511](https://nvd.nist.gov/vuln/detail/CVE-2024-2511), [CVE-2024-4603](https://nvd.nist.gov/vuln/detail/CVE-2024-4603), [CVE-2024-4741](https://nvd.nist.gov/vuln/detail/CVE-2024-4741), [CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535), [CVE-2024-6119](https://nvd.nist.gov/vuln/detail/CVE-2024-6119), [CVE-2024-9143](https://nvd.nist.gov/vuln/detail/CVE-2024-9143))\n\n#### Bug fixes:\n\n- Added qemu-guest-agent to ARM64 images ([flatcar/flatcar#1593](https://github.com/flatcar/Flatcar/issues/1593))\n\n#### Updates:\n\n- Linux ([6.6.65](https://lwn.net/Articles/1001739) (includes [6.6.64](https://lwn.net/Articles/1001438), [6.6.63](https://lwn.net/Articles/999110), [6.6.62](https://lwn.net/Articles/998450), [6.6.61](https://lwn.net/Articles/998150)))\n- OpenSSL ([3.2.3](https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32))\n- ca-certificates ([3.107](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html))"
  },
  "4186.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-01-30 16:23:38 +0000",
    "major_software": {
      "containerd": [
        "1.7.23"
      ],
      "docker": [
        "27.3.1"
      ],
      "ignition": [
        "2.20.0"
      ],
      "kernel": [
        "6.6.74"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "  _Changes since **Beta 4152.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584), [CVE-2024-56565](https://nvd.nist.gov/vuln/detail/CVE-2024-56565), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-53196](https://nvd.nist.gov/vuln/detail/CVE-2024-53196), [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683), [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658), [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675), [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664), [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-49568](https://nvd.nist.gov/vuln/detail/CVE-2024-49568), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56372](https://nvd.nist.gov/vuln/detail/CVE-2024-56372), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2024-54680](https://nvd.nist.gov/vuln/detail/CVE-2024-54680), [CVE-2024-46896](https://nvd.nist.gov/vuln/detail/CVE-2024-46896), [CVE-2024-56719](https://nvd.nist.gov/vuln/detail/CVE-2024-56719), [CVE-2024-56718](https://nvd.nist.gov/vuln/detail/CVE-2024-56718), [CVE-2024-56717](https://nvd.nist.gov/vuln/detail/CVE-2024-56717), [CVE-2024-56716](https://nvd.nist.gov/vuln/detail/CVE-2024-56716), [CVE-2024-56715](https://nvd.nist.gov/vuln/detail/CVE-2024-56715), [CVE-2024-56709](https://nvd.nist.gov/vuln/detail/CVE-2024-56709), [CVE-2024-53164](https://nvd.nist.gov/vuln/detail/CVE-2024-53164), [CVE-2024-57946](https://nvd.nist.gov/vuln/detail/CVE-2024-57946), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57798](https://nvd.nist.gov/vuln/detail/CVE-2024-57798), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-56766](https://nvd.nist.gov/vuln/detail/CVE-2024-56766), [CVE-2024-56765](https://nvd.nist.gov/vuln/detail/CVE-2024-56765), [CVE-2024-56763](https://nvd.nist.gov/vuln/detail/CVE-2024-56763), [CVE-2024-56762](https://nvd.nist.gov/vuln/detail/CVE-2024-56762), [CVE-2024-56760](https://nvd.nist.gov/vuln/detail/CVE-2024-56760), [CVE-2024-56769](https://nvd.nist.gov/vuln/detail/CVE-2024-56769), [CVE-2024-56767](https://nvd.nist.gov/vuln/detail/CVE-2024-56767), [CVE-2023-52881](https://nvd.nist.gov/vuln/detail/CVE-2023-52881), [CVE-2023-52654](https://nvd.nist.gov/vuln/detail/CVE-2023-52654), [CVE-2024-57938](https://nvd.nist.gov/vuln/detail/CVE-2024-57938), [CVE-2024-57933](https://nvd.nist.gov/vuln/detail/CVE-2024-57933), [CVE-2024-57932](https://nvd.nist.gov/vuln/detail/CVE-2024-57932), [CVE-2024-57930](https://nvd.nist.gov/vuln/detail/CVE-2024-57930), [CVE-2024-57931](https://nvd.nist.gov/vuln/detail/CVE-2024-57931), [CVE-2024-57841](https://nvd.nist.gov/vuln/detail/CVE-2024-57841), [CVE-2024-57802](https://nvd.nist.gov/vuln/detail/CVE-2024-57802), [CVE-2024-57801](https://nvd.nist.gov/vuln/detail/CVE-2024-57801), [CVE-2024-54031](https://nvd.nist.gov/vuln/detail/CVE-2024-54031), [CVE-2024-39282](https://nvd.nist.gov/vuln/detail/CVE-2024-39282), [CVE-2024-36476](https://nvd.nist.gov/vuln/detail/CVE-2024-36476), [CVE-2024-57896](https://nvd.nist.gov/vuln/detail/CVE-2024-57896), [CVE-2025-21629](https://nvd.nist.gov/vuln/detail/CVE-2025-21629), [CVE-2024-57903](https://nvd.nist.gov/vuln/detail/CVE-2024-57903), [CVE-2024-57902](https://nvd.nist.gov/vuln/detail/CVE-2024-57902), [CVE-2024-57901](https://nvd.nist.gov/vuln/detail/CVE-2024-57901), [CVE-2024-57900](https://nvd.nist.gov/vuln/detail/CVE-2024-57900), [CVE-2024-57899](https://nvd.nist.gov/vuln/detail/CVE-2024-57899), [CVE-2024-57897](https://nvd.nist.gov/vuln/detail/CVE-2024-57897), [CVE-2024-57890](https://nvd.nist.gov/vuln/detail/CVE-2024-57890), [CVE-2024-57889](https://nvd.nist.gov/vuln/detail/CVE-2024-57889), [CVE-2024-57887](https://nvd.nist.gov/vuln/detail/CVE-2024-57887), [CVE-2024-57885](https://nvd.nist.gov/vuln/detail/CVE-2024-57885), [CVE-2024-57884](https://nvd.nist.gov/vuln/detail/CVE-2024-57884), [CVE-2024-57895](https://nvd.nist.gov/vuln/detail/CVE-2024-57895), [CVE-2024-57894](https://nvd.nist.gov/vuln/detail/CVE-2024-57894), [CVE-2024-57893](https://nvd.nist.gov/vuln/detail/CVE-2024-57893), [CVE-2024-57892](https://nvd.nist.gov/vuln/detail/CVE-2024-57892), [CVE-2024-57882](https://nvd.nist.gov/vuln/detail/CVE-2024-57882), [CVE-2024-53685](https://nvd.nist.gov/vuln/detail/CVE-2024-53685), [CVE-2025-21658](https://nvd.nist.gov/vuln/detail/CVE-2025-21658), [CVE-2025-21656](https://nvd.nist.gov/vuln/detail/CVE-2025-21656), [CVE-2024-57945](https://nvd.nist.gov/vuln/detail/CVE-2024-57945), [CVE-2025-21664](https://nvd.nist.gov/vuln/detail/CVE-2025-21664), [CVE-2025-21663](https://nvd.nist.gov/vuln/detail/CVE-2025-21663), [CVE-2025-21662](https://nvd.nist.gov/vuln/detail/CVE-2025-21662), [CVE-2025-21660](https://nvd.nist.gov/vuln/detail/CVE-2025-21660), [CVE-2024-57939](https://nvd.nist.gov/vuln/detail/CVE-2024-57939), [CVE-2024-57940](https://nvd.nist.gov/vuln/detail/CVE-2024-57940), [CVE-2025-21655](https://nvd.nist.gov/vuln/detail/CVE-2025-21655), [CVE-2024-57913](https://nvd.nist.gov/vuln/detail/CVE-2024-57913), [CVE-2024-57912](https://nvd.nist.gov/vuln/detail/CVE-2024-57912), [CVE-2024-57911](https://nvd.nist.gov/vuln/detail/CVE-2024-57911), [CVE-2024-57910](https://nvd.nist.gov/vuln/detail/CVE-2024-57910), [CVE-2024-57908](https://nvd.nist.gov/vuln/detail/CVE-2024-57908), [CVE-2024-57907](https://nvd.nist.gov/vuln/detail/CVE-2024-57907), [CVE-2024-57929](https://nvd.nist.gov/vuln/detail/CVE-2024-57929), [CVE-2024-57926](https://nvd.nist.gov/vuln/detail/CVE-2024-57926), [CVE-2024-57925](https://nvd.nist.gov/vuln/detail/CVE-2024-57925), [CVE-2024-57906](https://nvd.nist.gov/vuln/detail/CVE-2024-57906), [CVE-2024-57922](https://nvd.nist.gov/vuln/detail/CVE-2024-57922), [CVE-2024-57917](https://nvd.nist.gov/vuln/detail/CVE-2024-57917), [CVE-2024-57916](https://nvd.nist.gov/vuln/detail/CVE-2024-57916), [CVE-2024-57915](https://nvd.nist.gov/vuln/detail/CVE-2024-57915), [CVE-2024-57904](https://nvd.nist.gov/vuln/detail/CVE-2024-57904), [CVE-2025-21654](https://nvd.nist.gov/vuln/detail/CVE-2025-21654), [CVE-2025-21653](https://nvd.nist.gov/vuln/detail/CVE-2025-21653), [CVE-2025-21652](https://nvd.nist.gov/vuln/detail/CVE-2025-21652), [CVE-2025-21640](https://nvd.nist.gov/vuln/detail/CVE-2025-21640), [CVE-2025-21639](https://nvd.nist.gov/vuln/detail/CVE-2025-21639), [CVE-2025-21638](https://nvd.nist.gov/vuln/detail/CVE-2025-21638), [CVE-2025-21637](https://nvd.nist.gov/vuln/detail/CVE-2025-21637), [CVE-2025-21636](https://nvd.nist.gov/vuln/detail/CVE-2025-21636), [CVE-2025-21648](https://nvd.nist.gov/vuln/detail/CVE-2025-21648), [CVE-2025-21647](https://nvd.nist.gov/vuln/detail/CVE-2025-21647), [CVE-2025-21646](https://nvd.nist.gov/vuln/detail/CVE-2025-21646), [CVE-2025-21645](https://nvd.nist.gov/vuln/detail/CVE-2025-21645), [CVE-2025-21642](https://nvd.nist.gov/vuln/detail/CVE-2025-21642), [CVE-2025-21631](https://nvd.nist.gov/vuln/detail/CVE-2025-21631), [CVE-2025-21632](https://nvd.nist.gov/vuln/detail/CVE-2025-21632))\n - expat ([CVE-2024-50602](https://nvd.nist.gov/vuln/detail/CVE-2024-50602))\n - sssd ([CVE-2023-3758](https://nvd.nist.gov/vuln/detail/CVE-2023-3758))\n - wget ([CVE-2024-10524](https://nvd.nist.gov/vuln/detail/CVE-2024-10524))\n\n \n #### Changes:\n \n - Additional GRUB modules are no longer installed for UEFI platforms to save space and also because they cannot be loaded with Secure Boot enabled. This does not affect existing installations.\n - The GRUB modules on non-UEFI platforms are now compressed with xz rather than gzip to save even more space. This does not affect existing installations.\n - The VFIO kernel modules are now also available in ARM64 builds. ([flatcar/scripts#2484](https://github.com/flatcar/scripts/pull/2484))- Enabled the gtp kernel module. This is the GPRS Tunneling Protocol datapath for usage in telecoms scenarios. ([flatcar/scripts#2504](https://github.com/flatcar/scripts/pull/2504))\n \n #### Updates:\n \n- Go ([1.22.10](https://go.dev/doc/devel/release#go1.22.10))\n- Linux ([6.6.74](https://lwn.net/Articles/1006010) (includes [6.6.73](https://lwn.net/Articles/1005709), [6.6.72](https://lwn.net/Articles/1005383), [6.6.71](https://lwn.net/Articles/1004703), [6.6.70](https://lwn.net/Articles/1004551), [6.6.69](https://lwn.net/Articles/1003986), [6.6.68](https://lwn.net/Articles/1003609), [6.6.67](https://lwn.net/Articles/1002919), [6.6.66](https://lwn.net/Articles/1002177), [6.6.65](https://lwn.net/Articles/1001732)))\n- Linux Firmware ([20241210](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241210) (includes [20241110](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241110)))\n- SDK: autoconf ([2.72](https://lists.gnu.org/archive/html/autotools-announce/2023-12/msg00003.html))\n- SDK: cmake ([3.30.5](https://cmake.org/cmake/help/v3.30/release/3.30.html#id5))\n- SDK: libpng ([1.6.44](https://github.com/pnggroup/libpng/blob/v1.6.44/CHANGES#L6199))\n- SDK: perf ([6.11.7](https://kernelnewbies.org/Linux_6.11#Tracing.2C_perf_and_BPF))\n- SDK: pkgcheck ([0.10.32](https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.32))\n- SDK: portage ([3.0.66.1](https://github.com/gentoo/portage/blob/portage-3.0.66.1/NEWS#L9))\n- azure: chrony ([4.6.1](https://gitlab.com/chrony/chrony/-/blob/4.6.1/NEWS))\n- base, dev: azure-vm-utils ([0.4.0](https://github.com/Azure/azure-vm-utils/commits/v0.4.0/))\n- base, dev: bind ([9.18.29](https://bind9.readthedocs.io/en/v9.18.29/notes.html#notes-for-bind-9-18-29))\n- base, dev: bpftool ([7.4.0](https://github.com/libbpf/bpftool/releases/tag/v7.4.0))\n- base, dev: btrfs-progs ([6.11](https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.11/CHANGES))\n- base, dev: checkpolicy ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7))\n- base, dev: expat ([2.6.4](https://github.com/libexpat/libexpat/blob/R_2_6_4/expat/Changes))\n- base, dev: gawk ([5.3.1](https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00008.html))\n- base, dev: gcc ([14.2.1_p20241116](https://gcc.gnu.org/gcc-14/changes.html))\n- base, dev: iproute2 ([6.11.0](https://lore.kernel.org/netdev/20240915201831.164de47e@hermes.local/) (includes [6.10.0](https://lore.kernel.org/netdev/20240717090601.20b2871f@hermes.local/)))\n- base, dev: iputils ([20240905](https://github.com/iputils/iputils/releases/tag/20240905))\n- base, dev: json-c ([0.18](https://github.com/json-c/json-c/blob/json-c-0.18-20240915/ChangeLog))\n- base, dev: kexec-tools ([2.0.29](https://github.com/horms/kexec-tools/commits/v2.0.29/))\n- base, dev: less ([668](https://www.greenwoodsoftware.com/less/news.668.html))\n- base, dev: libarchive ([3.7.7](https://github.com/libarchive/libarchive/releases/tag/v3.7.7))\n- base, dev: libnetfilter_conntrack ([1.1.0](https://lists.netfilter.org/pipermail/netfilter-announce/2024/000260.html))\n- base, dev: libnftnl ([1.2.8](https://lists.netfilter.org/pipermail/netfilter-announce/2024/000261.html))\n- base, dev: libselinux ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7))\n- base, dev: libsepol ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7))\n- base, dev: libuv ([1.49.2](https://github.com/libuv/libuv/releases/tag/v1.49.2) (includes [1.49.1](https://github.com/libuv/libuv/releases/tag/v1.49.1), [1.49.0](https://github.com/libuv/libuv/releases/tag/v1.49.0)))\n- base, dev: libxml2 ([2.12.8](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.8))\n- base, dev: mokutil ([0.7.2](https://github.com/lcp/mokutil/commits/0.7.2/))\n- base, dev: openldap ([2.6.6](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_6/CHANGES) (includes [2.6.5](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_5/CHANGES)))\n- base, dev: pax-utils ([1.3.8](https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.8))\n- base, dev: util-linux ([2.40.2](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.2/Documentation/releases/v2.40.2-ReleaseNotes) (includes [2.40.1](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.1/Documentation/releases/v2.40.1-ReleaseNotes), [2.40.0](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40/Documentation/releases/v2.40-ReleaseNotes)))\n- base, dev: wget ([1.25.0](https://lists.gnu.org/archive/html/info-gnu/2024-11/msg00000.html))\n- base, dev: xfsprogs ([6.10.1](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.10.1) (includes [6.10.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.10.0), [6.9.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.9.0)))\n- base, dev: xz-utils ([5.6.3](https://github.com/tukaani-project/xz/releases/tag/v5.6.3))\n- dev: gentoolkit ([0.6.8](https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.8))\n- sssd ([2.9.5](https://sssd.io/release-notes/sssd-2.9.5.html) (includes [2.9.4](https://sssd.io/release-notes/sssd-2.9.4.html), [2.9.3](https://sssd.io/release-notes/sssd-2.9.3.html), [2.9.2](https://sssd.io/release-notes/sssd-2.9.2.html), [2.9.1](https://sssd.io/release-notes/sssd-2.9.1.html), [2.9.0](https://sssd.io/release-notes/sssd-2.9.0.html), [2.8.0](https://sssd.io/release-notes/sssd-2.8.0.html), [2.7.0](https://sssd.io/release-notes/sssd-2.7.0.html), [2.6.0](https://sssd.io/release-notes/sssd-2.6.0.html), [2.5.0](https://sssd.io/release-notes/sssd-2.5.0.html), [2.4.0](https://sssd.io/release-notes/sssd-2.4.0.html)))\n- sysext-docker: docker ([27.3.1](https://github.com/moby/moby/releases/tag/v27.3.1))\n- sysext-docker: docker-cli ([27.3.1](https://github.com/moby/moby/releases/tag/v27.3.1))\n- sysext-python: cachecontrol ([0.14.1](https://github.com/psf/cachecontrol/releases/tag/v0.14.1))\n- sysext-python: charset-normalizer ([3.4.0](https://github.com/jawah/charset_normalizer/releases/tag/3.4.0))\n- sysext-python: distlib ([0.3.9](https://github.com/pypa/distlib/blob/0.3.9/CHANGES.rst))\n- sysext-python: jaraco-functools ([4.1.0](https://github.com/jaraco/jaraco.functools/blob/v4.1.0/NEWS.rsto))\n- sysext-python: packaging ([24.2](https://github.com/pypa/packaging/releases/tag/24.2))\n- sysext-python: pyproject-hooks ([1.2.0](https://github.com/pypa/pyproject-hooks/blob/v1.2.0/docs/changelog.rst))\n- sysext-python: resolvelib ([1.1.0](https://github.com/sarugaku/resolvelib/blob/1.1.0/CHANGELOG.rst))\n- sysext-python: rich ([13.9.3](https://github.com/Textualize/rich/releases/tag/v13.9.3))\n- sysext-python: trove-classifiers ([2024.10.21.16](https://github.com/pypa/trove-classifiers/commits/2024.10.21.16/))\n- sysext-python: truststore ([0.10.0](https://github.com/sethmlarson/truststore/blob/v0.10.0/CHANGELOG.md))\n- vmware: libmspack ([1.11](https://github.com/kyz/libmspack/commits/v1.11/libmspack))\n- vmware: xmlsec ([1.3.5](https://github.com/lsh123/xmlsec/releases/tag/1.3.5))\n\n \n _Changes since **Alpha 4186.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584), [CVE-2024-56565](https://nvd.nist.gov/vuln/detail/CVE-2024-56565), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-53196](https://nvd.nist.gov/vuln/detail/CVE-2024-53196), [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683), [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658), [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675), [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664), [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-49568](https://nvd.nist.gov/vuln/detail/CVE-2024-49568), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56372](https://nvd.nist.gov/vuln/detail/CVE-2024-56372), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2024-54680](https://nvd.nist.gov/vuln/detail/CVE-2024-54680), [CVE-2024-46896](https://nvd.nist.gov/vuln/detail/CVE-2024-46896), [CVE-2024-56719](https://nvd.nist.gov/vuln/detail/CVE-2024-56719), [CVE-2024-56718](https://nvd.nist.gov/vuln/detail/CVE-2024-56718), [CVE-2024-56717](https://nvd.nist.gov/vuln/detail/CVE-2024-56717), [CVE-2024-56716](https://nvd.nist.gov/vuln/detail/CVE-2024-56716), [CVE-2024-56715](https://nvd.nist.gov/vuln/detail/CVE-2024-56715), [CVE-2024-56709](https://nvd.nist.gov/vuln/detail/CVE-2024-56709), [CVE-2024-53164](https://nvd.nist.gov/vuln/detail/CVE-2024-53164), [CVE-2024-57946](https://nvd.nist.gov/vuln/detail/CVE-2024-57946), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57798](https://nvd.nist.gov/vuln/detail/CVE-2024-57798), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-56766](https://nvd.nist.gov/vuln/detail/CVE-2024-56766), [CVE-2024-56765](https://nvd.nist.gov/vuln/detail/CVE-2024-56765), [CVE-2024-56763](https://nvd.nist.gov/vuln/detail/CVE-2024-56763), [CVE-2024-56762](https://nvd.nist.gov/vuln/detail/CVE-2024-56762), [CVE-2024-56760](https://nvd.nist.gov/vuln/detail/CVE-2024-56760), [CVE-2024-56769](https://nvd.nist.gov/vuln/detail/CVE-2024-56769), [CVE-2024-56767](https://nvd.nist.gov/vuln/detail/CVE-2024-56767), [CVE-2023-52881](https://nvd.nist.gov/vuln/detail/CVE-2023-52881), [CVE-2023-52654](https://nvd.nist.gov/vuln/detail/CVE-2023-52654), [CVE-2024-57938](https://nvd.nist.gov/vuln/detail/CVE-2024-57938), [CVE-2024-57933](https://nvd.nist.gov/vuln/detail/CVE-2024-57933), [CVE-2024-57932](https://nvd.nist.gov/vuln/detail/CVE-2024-57932), [CVE-2024-57930](https://nvd.nist.gov/vuln/detail/CVE-2024-57930), [CVE-2024-57931](https://nvd.nist.gov/vuln/detail/CVE-2024-57931), [CVE-2024-57841](https://nvd.nist.gov/vuln/detail/CVE-2024-57841), [CVE-2024-57802](https://nvd.nist.gov/vuln/detail/CVE-2024-57802), [CVE-2024-57801](https://nvd.nist.gov/vuln/detail/CVE-2024-57801), [CVE-2024-54031](https://nvd.nist.gov/vuln/detail/CVE-2024-54031), [CVE-2024-39282](https://nvd.nist.gov/vuln/detail/CVE-2024-39282), [CVE-2024-36476](https://nvd.nist.gov/vuln/detail/CVE-2024-36476), [CVE-2024-57896](https://nvd.nist.gov/vuln/detail/CVE-2024-57896), [CVE-2025-21629](https://nvd.nist.gov/vuln/detail/CVE-2025-21629), [CVE-2024-57903](https://nvd.nist.gov/vuln/detail/CVE-2024-57903), [CVE-2024-57902](https://nvd.nist.gov/vuln/detail/CVE-2024-57902), [CVE-2024-57901](https://nvd.nist.gov/vuln/detail/CVE-2024-57901), [CVE-2024-57900](https://nvd.nist.gov/vuln/detail/CVE-2024-57900), [CVE-2024-57899](https://nvd.nist.gov/vuln/detail/CVE-2024-57899), [CVE-2024-57897](https://nvd.nist.gov/vuln/detail/CVE-2024-57897), [CVE-2024-57890](https://nvd.nist.gov/vuln/detail/CVE-2024-57890), [CVE-2024-57889](https://nvd.nist.gov/vuln/detail/CVE-2024-57889), [CVE-2024-57887](https://nvd.nist.gov/vuln/detail/CVE-2024-57887), [CVE-2024-57885](https://nvd.nist.gov/vuln/detail/CVE-2024-57885), [CVE-2024-57884](https://nvd.nist.gov/vuln/detail/CVE-2024-57884), [CVE-2024-57895](https://nvd.nist.gov/vuln/detail/CVE-2024-57895), [CVE-2024-57894](https://nvd.nist.gov/vuln/detail/CVE-2024-57894), [CVE-2024-57893](https://nvd.nist.gov/vuln/detail/CVE-2024-57893), [CVE-2024-57892](https://nvd.nist.gov/vuln/detail/CVE-2024-57892), [CVE-2024-57882](https://nvd.nist.gov/vuln/detail/CVE-2024-57882), [CVE-2024-53685](https://nvd.nist.gov/vuln/detail/CVE-2024-53685), [CVE-2025-21658](https://nvd.nist.gov/vuln/detail/CVE-2025-21658), [CVE-2025-21656](https://nvd.nist.gov/vuln/detail/CVE-2025-21656), [CVE-2024-57945](https://nvd.nist.gov/vuln/detail/CVE-2024-57945), [CVE-2025-21664](https://nvd.nist.gov/vuln/detail/CVE-2025-21664), [CVE-2025-21663](https://nvd.nist.gov/vuln/detail/CVE-2025-21663), [CVE-2025-21662](https://nvd.nist.gov/vuln/detail/CVE-2025-21662), [CVE-2025-21660](https://nvd.nist.gov/vuln/detail/CVE-2025-21660), [CVE-2024-57939](https://nvd.nist.gov/vuln/detail/CVE-2024-57939), [CVE-2024-57940](https://nvd.nist.gov/vuln/detail/CVE-2024-57940), [CVE-2025-21655](https://nvd.nist.gov/vuln/detail/CVE-2025-21655), [CVE-2024-57913](https://nvd.nist.gov/vuln/detail/CVE-2024-57913), [CVE-2024-57912](https://nvd.nist.gov/vuln/detail/CVE-2024-57912), [CVE-2024-57911](https://nvd.nist.gov/vuln/detail/CVE-2024-57911), [CVE-2024-57910](https://nvd.nist.gov/vuln/detail/CVE-2024-57910), [CVE-2024-57908](https://nvd.nist.gov/vuln/detail/CVE-2024-57908), [CVE-2024-57907](https://nvd.nist.gov/vuln/detail/CVE-2024-57907), [CVE-2024-57929](https://nvd.nist.gov/vuln/detail/CVE-2024-57929), [CVE-2024-57926](https://nvd.nist.gov/vuln/detail/CVE-2024-57926), [CVE-2024-57925](https://nvd.nist.gov/vuln/detail/CVE-2024-57925), [CVE-2024-57906](https://nvd.nist.gov/vuln/detail/CVE-2024-57906), [CVE-2024-57922](https://nvd.nist.gov/vuln/detail/CVE-2024-57922), [CVE-2024-57917](https://nvd.nist.gov/vuln/detail/CVE-2024-57917), [CVE-2024-57916](https://nvd.nist.gov/vuln/detail/CVE-2024-57916), [CVE-2024-57915](https://nvd.nist.gov/vuln/detail/CVE-2024-57915), [CVE-2024-57904](https://nvd.nist.gov/vuln/detail/CVE-2024-57904), [CVE-2025-21654](https://nvd.nist.gov/vuln/detail/CVE-2025-21654), [CVE-2025-21653](https://nvd.nist.gov/vuln/detail/CVE-2025-21653), [CVE-2025-21652](https://nvd.nist.gov/vuln/detail/CVE-2025-21652), [CVE-2025-21640](https://nvd.nist.gov/vuln/detail/CVE-2025-21640), [CVE-2025-21639](https://nvd.nist.gov/vuln/detail/CVE-2025-21639), [CVE-2025-21638](https://nvd.nist.gov/vuln/detail/CVE-2025-21638), [CVE-2025-21637](https://nvd.nist.gov/vuln/detail/CVE-2025-21637), [CVE-2025-21636](https://nvd.nist.gov/vuln/detail/CVE-2025-21636), [CVE-2025-21648](https://nvd.nist.gov/vuln/detail/CVE-2025-21648), [CVE-2025-21647](https://nvd.nist.gov/vuln/detail/CVE-2025-21647), [CVE-2025-21646](https://nvd.nist.gov/vuln/detail/CVE-2025-21646), [CVE-2025-21645](https://nvd.nist.gov/vuln/detail/CVE-2025-21645), [CVE-2025-21642](https://nvd.nist.gov/vuln/detail/CVE-2025-21642), [CVE-2025-21631](https://nvd.nist.gov/vuln/detail/CVE-2025-21631), [CVE-2025-21632](https://nvd.nist.gov/vuln/detail/CVE-2025-21632)) \n \n #### Updates:\n \n- Linux ([6.6.74](https://lwn.net/Articles/1006010) (includes [6.6.73](https://lwn.net/Articles/1005709), [6.6.72](https://lwn.net/Articles/1005383), [6.6.71](https://lwn.net/Articles/1004703), [6.6.70](https://lwn.net/Articles/1004551), [6.6.69](https://lwn.net/Articles/1003986), [6.6.68](https://lwn.net/Articles/1003609), [6.6.67](https://lwn.net/Articles/1002919), [6.6.66](https://lwn.net/Articles/1002177)))\n\n\n"
  },
  "4186.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-02-18 15:12:26 +0000",
    "major_software": {
      "containerd": [
        "1.7.23"
      ],
      "docker": [
        "27.3.1"
      ],
      "ignition": [
        "2.20.0"
      ],
      "kernel": [
        "6.6.74"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "_Changes since **Beta 4186.1.0**_\n\n #### Security fixes:\n - openssh ([CVE-2025-26465](https://nvd.nist.gov/vuln/detail/CVE-2025-26465), [CVE-2025-26466](https://nvd.nist.gov/vuln/detail/CVE-2025-26466))\n \n #### Updates:\n - openssh(9.8_p1-r4)"
  },
  "4230.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-03-20 14:05:38 +0000",
    "major_software": {
      "containerd": [
        "1.7.23"
      ],
      "docker": [
        "27.3.1"
      ],
      "ignition": [
        "2.20.0"
      ],
      "kernel": [
        "6.6.83"
      ],
      "systemd": [
        "256"
      ]
    },
    "release_notes": " _Changes since **Beta 4186.1.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-21835](https://nvd.nist.gov/vuln/detail/CVE-2025-21835), [CVE-2025-21836](https://nvd.nist.gov/vuln/detail/CVE-2025-21836), [CVE-2024-58086](https://nvd.nist.gov/vuln/detail/CVE-2024-58086), [CVE-2025-21823](https://nvd.nist.gov/vuln/detail/CVE-2025-21823), [CVE-2025-21821](https://nvd.nist.gov/vuln/detail/CVE-2025-21821), [CVE-2025-21787](https://nvd.nist.gov/vuln/detail/CVE-2025-21787), [CVE-2025-21785](https://nvd.nist.gov/vuln/detail/CVE-2025-21785), [CVE-2025-21784](https://nvd.nist.gov/vuln/detail/CVE-2025-21784), [CVE-2025-21782](https://nvd.nist.gov/vuln/detail/CVE-2025-21782), [CVE-2025-21783](https://nvd.nist.gov/vuln/detail/CVE-2025-21783), [CVE-2025-21781](https://nvd.nist.gov/vuln/detail/CVE-2025-21781), [CVE-2025-21780](https://nvd.nist.gov/vuln/detail/CVE-2025-21780), [CVE-2025-21796](https://nvd.nist.gov/vuln/detail/CVE-2025-21796), [CVE-2025-21795](https://nvd.nist.gov/vuln/detail/CVE-2025-21795), [CVE-2025-21794](https://nvd.nist.gov/vuln/detail/CVE-2025-21794), [CVE-2025-21793](https://nvd.nist.gov/vuln/detail/CVE-2025-21793), [CVE-2025-21792](https://nvd.nist.gov/vuln/detail/CVE-2025-21792), [CVE-2025-21791](https://nvd.nist.gov/vuln/detail/CVE-2025-21791), [CVE-2025-21790](https://nvd.nist.gov/vuln/detail/CVE-2025-21790), [CVE-2025-21789](https://nvd.nist.gov/vuln/detail/CVE-2025-21789), [CVE-2025-21779](https://nvd.nist.gov/vuln/detail/CVE-2025-21779), [CVE-2024-58020](https://nvd.nist.gov/vuln/detail/CVE-2024-58020), [CVE-2024-57834](https://nvd.nist.gov/vuln/detail/CVE-2024-57834), [CVE-2024-54458](https://nvd.nist.gov/vuln/detail/CVE-2024-54458), [CVE-2024-54456](https://nvd.nist.gov/vuln/detail/CVE-2024-54456), [CVE-2025-21776](https://nvd.nist.gov/vuln/detail/CVE-2025-21776), [CVE-2025-21775](https://nvd.nist.gov/vuln/detail/CVE-2025-21775), [CVE-2025-21772](https://nvd.nist.gov/vuln/detail/CVE-2025-21772), [CVE-2025-21773](https://nvd.nist.gov/vuln/detail/CVE-2025-21773), [CVE-2025-21767](https://nvd.nist.gov/vuln/detail/CVE-2025-21767), [CVE-2025-21766](https://nvd.nist.gov/vuln/detail/CVE-2025-21766), [CVE-2025-21765](https://nvd.nist.gov/vuln/detail/CVE-2025-21765), [CVE-2025-21764](https://nvd.nist.gov/vuln/detail/CVE-2025-21764), [CVE-2025-21763](https://nvd.nist.gov/vuln/detail/CVE-2025-21763), [CVE-2025-21761](https://nvd.nist.gov/vuln/detail/CVE-2025-21761), [CVE-2025-21762](https://nvd.nist.gov/vuln/detail/CVE-2025-21762), [CVE-2025-21760](https://nvd.nist.gov/vuln/detail/CVE-2025-21760), [CVE-2025-21759](https://nvd.nist.gov/vuln/detail/CVE-2025-21759), [CVE-2025-21758](https://nvd.nist.gov/vuln/detail/CVE-2025-21758), [CVE-2025-21756](https://nvd.nist.gov/vuln/detail/CVE-2025-21756), [CVE-2025-21704](https://nvd.nist.gov/vuln/detail/CVE-2025-21704), [CVE-2023-52655](https://nvd.nist.gov/vuln/detail/CVE-2023-52655), [CVE-2023-52434](https://nvd.nist.gov/vuln/detail/CVE-2023-52434), [CVE-2025-21848](https://nvd.nist.gov/vuln/detail/CVE-2025-21848), [CVE-2025-21847](https://nvd.nist.gov/vuln/detail/CVE-2025-21847), [CVE-2025-21846](https://nvd.nist.gov/vuln/detail/CVE-2025-21846), [CVE-2025-21866](https://nvd.nist.gov/vuln/detail/CVE-2025-21866), [CVE-2025-21865](https://nvd.nist.gov/vuln/detail/CVE-2025-21865), [CVE-2025-21864](https://nvd.nist.gov/vuln/detail/CVE-2025-21864), [CVE-2025-21863](https://nvd.nist.gov/vuln/detail/CVE-2025-21863), [CVE-2025-21862](https://nvd.nist.gov/vuln/detail/CVE-2025-21862), [CVE-2025-21844](https://nvd.nist.gov/vuln/detail/CVE-2025-21844), [CVE-2025-21859](https://nvd.nist.gov/vuln/detail/CVE-2025-21859), [CVE-2025-21858](https://nvd.nist.gov/vuln/detail/CVE-2025-21858), [CVE-2025-21857](https://nvd.nist.gov/vuln/detail/CVE-2025-21857), [CVE-2025-21856](https://nvd.nist.gov/vuln/detail/CVE-2025-21856), [CVE-2025-21855](https://nvd.nist.gov/vuln/detail/CVE-2025-21855), [CVE-2025-21854](https://nvd.nist.gov/vuln/detail/CVE-2025-21854), [CVE-2025-21853](https://nvd.nist.gov/vuln/detail/CVE-2025-21853), [CVE-2024-58088](https://nvd.nist.gov/vuln/detail/CVE-2024-58088), [CVE-2025-21838](https://nvd.nist.gov/vuln/detail/CVE-2025-21838))\n - curl ([CVE-2024-11053](https://nvd.nist.gov/vuln/detail/CVE-2024-11053), [CVE-2024-9681](https://nvd.nist.gov/vuln/detail/CVE-2024-9681))\n - sysext-podman: containers-storage, podman ([CVE-2024-9676](https://nvd.nist.gov/vuln/detail/CVE-2024-9676))\n - amd64: nvidia-drivers ([CVE-2024-0131](https://nvd.nist.gov/vuln/detail/CVE-2024-0131), [CVE-2024-0147](https://nvd.nist.gov/vuln/detail/CVE-2024-0147), [CVE-2024-0149](https://nvd.nist.gov/vuln/detail/CVE-2024-0149), [CVE-2024-0150](https://nvd.nist.gov/vuln/detail/CVE-2024-0150), [CVE-2024-53869](https://nvd.nist.gov/vuln/detail/CVE-2024-53869))\n \n #### Bug fixes:\n \n - azure: Fix issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning ([flatcar/Flatcar#1661](https://github.com/flatcar/Flatcar/issues/1661))\n - Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. ([flatcar/scripts#2667](https://github.com/flatcar/scripts/pull/2667))\n - Fixed creating netdev arguments to correctly include commas when no port forwards are passed ([flatcar/scripts#2581](https://github.com/flatcar/scripts/pull/2581))\n - The kernel module build directory now contains native binaries in arm64 images instead of the previous amd64 binaries ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))\n - Nvidia driver installer service now supports the 570 driver branch by forcing the use of the proprietary kernel module. The 570 branch defaults to the kernel-open driver which requires loading firmware, which is not yet supported on Flatcar. ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))\n \n #### Changes:\n \n - Added support for ARM64 architecture in the NVIDIA driver installer service ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))\n - Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))\n - Added support for multiple port forwarding parameters in the QEMU startup script. Users can now specify multiple port forwards using the `-f` option. ([flatcar/scripts#2575](https://github.com/flatcar/scripts/pull/2575))\n \n #### Updates:\n \n- AMD64: nvidia-drivers ([535.230.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-230-02/index.html))\n- ARM64: nvidia-drivers ([570.86.15](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-86-15/index.html))\n- Go ([1.22.11](https://go.dev/doc/devel/release#go1.22.11))\n- Linux ([6.6.83](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83) (includes [6.6.79](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79), [6.6.80](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80), [6.6.81](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81), [6.6.82](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82)))\n- Linux Firmware ([20250109](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250109))\n- SDK: qemu ([8.2.7](https://lists.gnu.org/archive/html/qemu-devel/2024-09/msg03900.html))\n- base, dev: audit ([4.0.2](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.2))\n- base, dev: bpftool ([7.5.0](https://github.com/libbpf/bpftool/releases/tag/v7.5.0))\n- base, dev: btrfs-progs ([6.12](https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.12/CHANGES))\n- base, dev: c-ares ([1.34.3](https://github.com/c-ares/c-ares/releases/tag/v1.34.3) (includes [1.34.0](https://github.com/c-ares/c-ares/releases/tag/v1.34.0), [1.34.1](https://github.com/c-ares/c-ares/releases/tag/v1.34.1), [1.34.2](https://github.com/c-ares/c-ares/releases/tag/v1.34.2)))\n- base, dev: ethtool ([6.10](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.10))\n- base, dev: glib ([2.80.5](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.5) (includes [2.80.0](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.0), [2.80.1](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.1), [2.80.2](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.2), [2.80.3](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.3), [2.80.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.4)))\n- base, dev: gnupg ([2.4.6](https://lists.gnupg.org/pipermail/gnupg-announce/2024q4/000486.html))\n- base, dev: hwdata ([0.390](https://github.com/vcrhonek/hwdata/releases/tag/v0.390))\n- base, dev: intel-microcode ([20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112) (includes [20241029](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241029)))\n- base, dev: iproute2 ([6.12.0](https://lore.kernel.org/netdev/20241119092743.6a1bdcb7@hermes.local/))\n- base, dev: kexec-tools ([2.0.30](https://github.com/horms/kexec-tools/commits/v2.0.30/))\n- base, dev: libcap ([2.71](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.oq9dsdhihxp5))\n- base, dev: libgpg-error ([1.51](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=75f2b2d220de4e4f53252d3367950ecb2ab85079;hb=b0bb9266010d84b30fa2dc6a2127b7e40dc03660))\n- base, dev: libnvme ([1.11.1](https://github.com/linux-nvme/libnvme/releases/tag/v1.11.1) (includes [1.11](https://github.com/linux-nvme/libnvme/releases/tag/v1.11)))\n- base, dev: libxml2 ([2.12.9](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.9))\n- base, dev: lsof ([4.99.4](https://github.com/lsof-org/lsof/releases/tag/4.99.4))\n- base, dev: npth ([1.8](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=0f8d78958d8059de95e363a977051995e05dc691;hb=64905e765aad9de6054ef70a97fc30bd992ce999))\n- base, dev: nvme-cli ([2.11](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.11))\n- base, dev: openldap ([2.6.8](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_8/CHANGES) (includes [2.6.7](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_7/CHANGES)))\n- base, dev: strace ([6.12](https://github.com/strace/strace/releases/tag/v6.12) (includes [6.10](https://github.com/strace/strace/releases/tag/v6.10), [6.11](https://github.com/strace/strace/releases/tag/v6.11)))\n- base, dev: usbutils ([018](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v018))\n- base, dev: xfsprogs ([6.11.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.11.0))\n- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))\n- dev: bash-completion ([2.15.0](https://github.com/scop/bash-completion/releases/tag/2.15.0))\n- dev: binutils ([2.43](https://lists.gnu.org/archive/html/info-gnu/2024-08/msg00001.html))\n- docker: docker-buildx ([0.14.0](https://github.com/docker/buildx/releases/tag/v0.14.0) (includes [0.11.0](https://github.com/docker/buildx/releases/tag/v0.11.0), [0.12.0](https://github.com/docker/buildx/releases/tag/v0.12.0), [0.13.0](https://github.com/docker/buildx/releases/tag/v0.13.0)))\n- gce: six ([1.17.0](https://github.com/benjaminp/six/blob/1.17.0/CHANGES))\n- sysext-podman: containers-storage ([1.55.1](https://github.com/containers/storage/releases/tag/v1.55.1))\n- sysext-podman: gpgme ([1.24.1](https://dev.gnupg.org/T7440) (includes [1.24.0](https://dev.gnupg.org/T7376)))\n- sysext-podman: podman ([5.3.0](https://github.com/containers/podman/releases/tag/v5.3.0))\n- sysext-python: charset-normalizer ([3.4.1](https://github.com/jawah/charset_normalizer/releases/tag/3.4.1))\n- sysext-python: pip ([24.3.1](https://github.com/pypa/pip/blob/24.3.1/NEWS.rst) (includes [24.3](https://github.com/pypa/pip/blob/24.3/NEWS.rst)))\n- sysext-python: python ([3.11.11_p1](https://www.python.org/downloads/release/python-31111/))\n- sysext-python: setuptools ([75.6.0](https://github.com/pypa/setuptools/blob/v75.6.0/NEWS.rst) (includes [75.0.0](https://github.com/pypa/setuptools/blob/75.0.0/NEWS.rst), [75.1.0](https://github.com/pypa/setuptools/blob/75.1.0/NEWS.rst), [75.1.1](https://github.com/pypa/setuptools/blob/75.1.1/NEWS.rst), [75.2.0](https://github.com/pypa/setuptools/blob/75.2.0/NEWS.rst), [75.3.0](https://github.com/pypa/setuptools/blob/75.3.0/NEWS.rst), [75.4.0](https://github.com/pypa/setuptools/blob/75.4.0/NEWS.rst), [75.5.0](https://github.com/pypa/setuptools/blob/75.5.0/NEWS.rst)))\n- sysext-python: urllib3 ([2.3.0](https://github.com/urllib3/urllib3/releases/tag/2.3.0))\n- sysext-python: wheel ([0.45.1](https://github.com/pypa/wheel/releases/tag/0.45.1) (includes [0.45.0](https://github.com/pypa/wheel/releases/tag/0.45.0)))\n- sysext-zfs: zfs ([2.2.7](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.7) (includes [2.2.6](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.6)))\n- systemd ([256.9](https://github.com/systemd/system/releases/tag/v256.9))\n- vmware: libltdl ([2.5.4](https://savannah.gnu.org/news/?id=10693) (includes [2.5.0](https://savannah.gnu.org/news/?id=10631), [2.5.1](https://savannah.gnu.org/news/?id=10660), [2.5.2](https://savannah.gnu.org/news/?id=10669), [2.5.3](https://savannah.gnu.org/news/?id=10676)))\n \n _Changes since **Alpha 4230.0.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-21835](https://nvd.nist.gov/vuln/detail/CVE-2025-21835), [CVE-2025-21836](https://nvd.nist.gov/vuln/detail/CVE-2025-21836), [CVE-2024-58086](https://nvd.nist.gov/vuln/detail/CVE-2024-58086), [CVE-2025-21823](https://nvd.nist.gov/vuln/detail/CVE-2025-21823), [CVE-2025-21821](https://nvd.nist.gov/vuln/detail/CVE-2025-21821), [CVE-2025-21787](https://nvd.nist.gov/vuln/detail/CVE-2025-21787), [CVE-2025-21785](https://nvd.nist.gov/vuln/detail/CVE-2025-21785), [CVE-2025-21784](https://nvd.nist.gov/vuln/detail/CVE-2025-21784), [CVE-2025-21782](https://nvd.nist.gov/vuln/detail/CVE-2025-21782), [CVE-2025-21783](https://nvd.nist.gov/vuln/detail/CVE-2025-21783), [CVE-2025-21781](https://nvd.nist.gov/vuln/detail/CVE-2025-21781), [CVE-2025-21780](https://nvd.nist.gov/vuln/detail/CVE-2025-21780), [CVE-2025-21796](https://nvd.nist.gov/vuln/detail/CVE-2025-21796), [CVE-2025-21795](https://nvd.nist.gov/vuln/detail/CVE-2025-21795), [CVE-2025-21794](https://nvd.nist.gov/vuln/detail/CVE-2025-21794), [CVE-2025-21793](https://nvd.nist.gov/vuln/detail/CVE-2025-21793), [CVE-2025-21792](https://nvd.nist.gov/vuln/detail/CVE-2025-21792), [CVE-2025-21791](https://nvd.nist.gov/vuln/detail/CVE-2025-21791), [CVE-2025-21790](https://nvd.nist.gov/vuln/detail/CVE-2025-21790), [CVE-2025-21789](https://nvd.nist.gov/vuln/detail/CVE-2025-21789), [CVE-2025-21779](https://nvd.nist.gov/vuln/detail/CVE-2025-21779), [CVE-2024-58020](https://nvd.nist.gov/vuln/detail/CVE-2024-58020), [CVE-2024-57834](https://nvd.nist.gov/vuln/detail/CVE-2024-57834), [CVE-2024-54458](https://nvd.nist.gov/vuln/detail/CVE-2024-54458), [CVE-2024-54456](https://nvd.nist.gov/vuln/detail/CVE-2024-54456), [CVE-2025-21776](https://nvd.nist.gov/vuln/detail/CVE-2025-21776), [CVE-2025-21775](https://nvd.nist.gov/vuln/detail/CVE-2025-21775), [CVE-2025-21772](https://nvd.nist.gov/vuln/detail/CVE-2025-21772), [CVE-2025-21773](https://nvd.nist.gov/vuln/detail/CVE-2025-21773), [CVE-2025-21767](https://nvd.nist.gov/vuln/detail/CVE-2025-21767), [CVE-2025-21766](https://nvd.nist.gov/vuln/detail/CVE-2025-21766), [CVE-2025-21765](https://nvd.nist.gov/vuln/detail/CVE-2025-21765), [CVE-2025-21764](https://nvd.nist.gov/vuln/detail/CVE-2025-21764), [CVE-2025-21763](https://nvd.nist.gov/vuln/detail/CVE-2025-21763), [CVE-2025-21761](https://nvd.nist.gov/vuln/detail/CVE-2025-21761), [CVE-2025-21762](https://nvd.nist.gov/vuln/detail/CVE-2025-21762), [CVE-2025-21760](https://nvd.nist.gov/vuln/detail/CVE-2025-21760), [CVE-2025-21759](https://nvd.nist.gov/vuln/detail/CVE-2025-21759), [CVE-2025-21758](https://nvd.nist.gov/vuln/detail/CVE-2025-21758), [CVE-2025-21756](https://nvd.nist.gov/vuln/detail/CVE-2025-21756), [CVE-2025-21704](https://nvd.nist.gov/vuln/detail/CVE-2025-21704), [CVE-2023-52655](https://nvd.nist.gov/vuln/detail/CVE-2023-52655), [CVE-2023-52434](https://nvd.nist.gov/vuln/detail/CVE-2023-52434), [CVE-2025-21848](https://nvd.nist.gov/vuln/detail/CVE-2025-21848), [CVE-2025-21847](https://nvd.nist.gov/vuln/detail/CVE-2025-21847), [CVE-2025-21846](https://nvd.nist.gov/vuln/detail/CVE-2025-21846), [CVE-2025-21866](https://nvd.nist.gov/vuln/detail/CVE-2025-21866), [CVE-2025-21865](https://nvd.nist.gov/vuln/detail/CVE-2025-21865), [CVE-2025-21864](https://nvd.nist.gov/vuln/detail/CVE-2025-21864), [CVE-2025-21863](https://nvd.nist.gov/vuln/detail/CVE-2025-21863), [CVE-2025-21862](https://nvd.nist.gov/vuln/detail/CVE-2025-21862), [CVE-2025-21844](https://nvd.nist.gov/vuln/detail/CVE-2025-21844), [CVE-2025-21859](https://nvd.nist.gov/vuln/detail/CVE-2025-21859), [CVE-2025-21858](https://nvd.nist.gov/vuln/detail/CVE-2025-21858), [CVE-2025-21857](https://nvd.nist.gov/vuln/detail/CVE-2025-21857), [CVE-2025-21856](https://nvd.nist.gov/vuln/detail/CVE-2025-21856), [CVE-2025-21855](https://nvd.nist.gov/vuln/detail/CVE-2025-21855), [CVE-2025-21854](https://nvd.nist.gov/vuln/detail/CVE-2025-21854), [CVE-2025-21853](https://nvd.nist.gov/vuln/detail/CVE-2025-21853), [CVE-2024-58088](https://nvd.nist.gov/vuln/detail/CVE-2024-58088), [CVE-2025-21838](https://nvd.nist.gov/vuln/detail/CVE-2025-21838))\n - amd64: nvidia-drivers ([CVE-2024-0131](https://nvd.nist.gov/vuln/detail/CVE-2024-0131), [CVE-2024-0147](https://nvd.nist.gov/vuln/detail/CVE-2024-0147), [CVE-2024-0149](https://nvd.nist.gov/vuln/detail/CVE-2024-0149), [CVE-2024-0150](https://nvd.nist.gov/vuln/detail/CVE-2024-0150), [CVE-2024-53869](https://nvd.nist.gov/vuln/detail/CVE-2024-53869))\n \n #### Bug fixes:\n \n - azure: Fix issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning ([flatcar/Flatcar#1661](https://github.com/flatcar/Flatcar/issues/1661))\n - Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. ([flatcar/scripts#2667](https://github.com/flatcar/scripts/pull/2667))\n - The kernel module build directory now contains native binaries in arm64 images instead of the previous amd64 binaries ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))\n - Nvidia driver installer service now supports the 570 driver branch by forcing the use of the proprietary kernel module. The 570 branch defaults to the kernel-open driver which requires loading firmware, which is not yet supported on Flatcar. ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))\n \n #### Changes:\n \n - Added support for ARM64 architecture in the NVIDIA driver installer service ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))\n - Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))\n \n #### Updates:\n \n- AMD64: nvidia-drivers ([535.230.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-230-02/index.html))\n- ARM64: nvidia-drivers ([570.86.15](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-86-15/index.html))\n- Linux ([6.6.83](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83) (includes [6.6.79](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79), [6.6.80](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80), [6.6.81](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81), [6.6.82](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82)))\n- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))\n"
  },
  "4230.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-05-06 11:35:29 +0000",
    "major_software": {
      "containerd": [
        "1.7.23"
      ],
      "docker": [
        "27.3.1"
      ],
      "ignition": [
        "2.20.0"
      ],
      "kernel": [
        "6.6.88"
      ],
      "systemd": [
        "256"
      ]
    },
    "release_notes": " _Changes since **Beta 4230.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-21993](https://nvd.nist.gov/vuln/detail/CVE-2025-21993), [CVE-2025-21992](https://nvd.nist.gov/vuln/detail/CVE-2025-21992), [CVE-2025-21991](https://nvd.nist.gov/vuln/detail/CVE-2025-21991), [CVE-2025-21967](https://nvd.nist.gov/vuln/detail/CVE-2025-21967), [CVE-2025-21975](https://nvd.nist.gov/vuln/detail/CVE-2025-21975), [CVE-2025-21971](https://nvd.nist.gov/vuln/detail/CVE-2025-21971), [CVE-2025-21970](https://nvd.nist.gov/vuln/detail/CVE-2025-21970), [CVE-2025-21969](https://nvd.nist.gov/vuln/detail/CVE-2025-21969), [CVE-2025-21986](https://nvd.nist.gov/vuln/detail/CVE-2025-21986), [CVE-2025-21981](https://nvd.nist.gov/vuln/detail/CVE-2025-21981), [CVE-2025-21980](https://nvd.nist.gov/vuln/detail/CVE-2025-21980), [CVE-2025-21979](https://nvd.nist.gov/vuln/detail/CVE-2025-21979), [CVE-2025-21978](https://nvd.nist.gov/vuln/detail/CVE-2025-21978), [CVE-2025-21968](https://nvd.nist.gov/vuln/detail/CVE-2025-21968), [CVE-2025-21962](https://nvd.nist.gov/vuln/detail/CVE-2025-21962), [CVE-2025-21960](https://nvd.nist.gov/vuln/detail/CVE-2025-21960), [CVE-2025-21959](https://nvd.nist.gov/vuln/detail/CVE-2025-21959), [CVE-2025-21957](https://nvd.nist.gov/vuln/detail/CVE-2025-21957), [CVE-2025-21956](https://nvd.nist.gov/vuln/detail/CVE-2025-21956), [CVE-2025-21955](https://nvd.nist.gov/vuln/detail/CVE-2025-21955), [CVE-2025-21966](https://nvd.nist.gov/vuln/detail/CVE-2025-21966), [CVE-2025-21964](https://nvd.nist.gov/vuln/detail/CVE-2025-21964), [CVE-2025-21963](https://nvd.nist.gov/vuln/detail/CVE-2025-21963), [CVE-2025-22015](https://nvd.nist.gov/vuln/detail/CVE-2025-22015), [CVE-2025-22014](https://nvd.nist.gov/vuln/detail/CVE-2025-22014), [CVE-2025-22013](https://nvd.nist.gov/vuln/detail/CVE-2025-22013), [CVE-2025-22010](https://nvd.nist.gov/vuln/detail/CVE-2025-22010), [CVE-2025-22008](https://nvd.nist.gov/vuln/detail/CVE-2025-22008), [CVE-2025-22009](https://nvd.nist.gov/vuln/detail/CVE-2025-22009), [CVE-2025-22004](https://nvd.nist.gov/vuln/detail/CVE-2025-22004), [CVE-2025-22003](https://nvd.nist.gov/vuln/detail/CVE-2025-22003), [CVE-2025-22001](https://nvd.nist.gov/vuln/detail/CVE-2025-22001), [CVE-2025-21999](https://nvd.nist.gov/vuln/detail/CVE-2025-21999), [CVE-2025-21997](https://nvd.nist.gov/vuln/detail/CVE-2025-21997), [CVE-2025-22007](https://nvd.nist.gov/vuln/detail/CVE-2025-22007), [CVE-2025-22005](https://nvd.nist.gov/vuln/detail/CVE-2025-22005), [CVE-2025-21995](https://nvd.nist.gov/vuln/detail/CVE-2025-21995), [CVE-2025-21996](https://nvd.nist.gov/vuln/detail/CVE-2025-21996), [CVE-2025-21994](https://nvd.nist.gov/vuln/detail/CVE-2025-21994), [CVE-2025-22021](https://nvd.nist.gov/vuln/detail/CVE-2025-22021), [CVE-2025-22020](https://nvd.nist.gov/vuln/detail/CVE-2025-22020), [CVE-2025-22018](https://nvd.nist.gov/vuln/detail/CVE-2025-22018), [CVE-2025-38575](https://nvd.nist.gov/vuln/detail/CVE-2025-38575), [CVE-2025-38240](https://nvd.nist.gov/vuln/detail/CVE-2025-38240), [CVE-2025-38152](https://nvd.nist.gov/vuln/detail/CVE-2025-38152), [CVE-2025-37893](https://nvd.nist.gov/vuln/detail/CVE-2025-37893), [CVE-2025-39735](https://nvd.nist.gov/vuln/detail/CVE-2025-39735), [CVE-2025-39728](https://nvd.nist.gov/vuln/detail/CVE-2025-39728), [CVE-2025-38637](https://nvd.nist.gov/vuln/detail/CVE-2025-38637), [CVE-2025-37785](https://nvd.nist.gov/vuln/detail/CVE-2025-37785), [CVE-2025-23138](https://nvd.nist.gov/vuln/detail/CVE-2025-23138), [CVE-2025-23136](https://nvd.nist.gov/vuln/detail/CVE-2025-23136), [CVE-2025-22066](https://nvd.nist.gov/vuln/detail/CVE-2025-22066), [CVE-2025-22075](https://nvd.nist.gov/vuln/detail/CVE-2025-22075), [CVE-2025-22074](https://nvd.nist.gov/vuln/detail/CVE-2025-22074), [CVE-2025-22073](https://nvd.nist.gov/vuln/detail/CVE-2025-22073), [CVE-2025-22072](https://nvd.nist.gov/vuln/detail/CVE-2025-22072), [CVE-2025-22071](https://nvd.nist.gov/vuln/detail/CVE-2025-22071), [CVE-2025-22097](https://nvd.nist.gov/vuln/detail/CVE-2025-22097), [CVE-2025-22095](https://nvd.nist.gov/vuln/detail/CVE-2025-22095), [CVE-2025-22093](https://nvd.nist.gov/vuln/detail/CVE-2025-22093), [CVE-2025-22090](https://nvd.nist.gov/vuln/detail/CVE-2025-22090), [CVE-2025-22089](https://nvd.nist.gov/vuln/detail/CVE-2025-22089), [CVE-2025-22088](https://nvd.nist.gov/vuln/detail/CVE-2025-22088), [CVE-2025-22086](https://nvd.nist.gov/vuln/detail/CVE-2025-22086), [CVE-2025-22083](https://nvd.nist.gov/vuln/detail/CVE-2025-22083), [CVE-2025-22081](https://nvd.nist.gov/vuln/detail/CVE-2025-22081), [CVE-2025-22080](https://nvd.nist.gov/vuln/detail/CVE-2025-22080), [CVE-2025-22079](https://nvd.nist.gov/vuln/detail/CVE-2025-22079), [CVE-2025-22077](https://nvd.nist.gov/vuln/detail/CVE-2025-22077), [CVE-2025-22033](https://nvd.nist.gov/vuln/detail/CVE-2025-22033), [CVE-2025-22042](https://nvd.nist.gov/vuln/detail/CVE-2025-22042), [CVE-2025-22041](https://nvd.nist.gov/vuln/detail/CVE-2025-22041), [CVE-2025-22040](https://nvd.nist.gov/vuln/detail/CVE-2025-22040), [CVE-2025-22038](https://nvd.nist.gov/vuln/detail/CVE-2025-22038), [CVE-2025-22064](https://nvd.nist.gov/vuln/detail/CVE-2025-22064), [CVE-2025-22063](https://nvd.nist.gov/vuln/detail/CVE-2025-22063), [CVE-2025-22060](https://nvd.nist.gov/vuln/detail/CVE-2025-22060), [CVE-2025-22058](https://nvd.nist.gov/vuln/detail/CVE-2025-22058), [CVE-2025-22057](https://nvd.nist.gov/vuln/detail/CVE-2025-22057), [CVE-2025-22056](https://nvd.nist.gov/vuln/detail/CVE-2025-22056), [CVE-2025-22055](https://nvd.nist.gov/vuln/detail/CVE-2025-22055), [CVE-2025-22054](https://nvd.nist.gov/vuln/detail/CVE-2025-22054), [CVE-2025-22053](https://nvd.nist.gov/vuln/detail/CVE-2025-22053), [CVE-2025-22035](https://nvd.nist.gov/vuln/detail/CVE-2025-22035), [CVE-2025-22050](https://nvd.nist.gov/vuln/detail/CVE-2025-22050), [CVE-2025-22049](https://nvd.nist.gov/vuln/detail/CVE-2025-22049), [CVE-2025-22048](https://nvd.nist.gov/vuln/detail/CVE-2025-22048), [CVE-2025-22047](https://nvd.nist.gov/vuln/detail/CVE-2025-22047), [CVE-2025-22045](https://nvd.nist.gov/vuln/detail/CVE-2025-22045), [CVE-2025-22044](https://nvd.nist.gov/vuln/detail/CVE-2025-22044), [CVE-2025-22043](https://nvd.nist.gov/vuln/detail/CVE-2025-22043), [CVE-2025-22027](https://nvd.nist.gov/vuln/detail/CVE-2025-22027), [CVE-2025-22025](https://nvd.nist.gov/vuln/detail/CVE-2025-22025), [CVE-2025-22029](https://nvd.nist.gov/vuln/detail/CVE-2025-22029), [CVE-2023-53034](https://nvd.nist.gov/vuln/detail/CVE-2023-53034))\n \n #### Bug fixes:\n \n - Fixed PXE boot failures that arose since upgrading to systemd v256. Users were dumped to an emergency shell. ([flatcar/bootengine#103](https://github.com/flatcar/bootengine/pull/103)) \n \n #### Updates:\n \n - Linux ([6.6.88](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.88) (includes [6.6.87](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.87), [6.6.86](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.86), [6.6.85](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.85), [6.6.84](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.84)))\n - ca-certificates ([3.110](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html))"
  },
  "4344.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-06-24 11:56:49 +0000",
    "major_software": {
      "containerd": [
        "2.0.4"
      ],
      "docker": [
        "28.0.1"
      ],
      "ignition": [
        "2.21.0"
      ],
      "kernel": [
        "6.12.34"
      ],
      "systemd": [
        "256"
      ]
    },
    "release_notes": " _Changes since **Beta 4230.1.1**_\n \n #### Security fixes:\n \n - VMWare: open-vm-tools ([CVE-2025-22247](https://www.cve.org/CVERecord/?id=CVE-2025-22247))\n - afterburn ([CVE-2025-3416](https://www.cve.org/CVERecord?id=CVE-2025-3416), [CVE-2025-0977](https://www.cve.org/CVERecord/?id=CVE-2025-0977))\n - binutils ([CVE-2024-53589](https://nvd.nist.gov/vuln/detail/CVE-2024-53589), [CVE-2025-1176](https://nvd.nist.gov/vuln/detail/CVE-2025-1176), [CVE-2025-1178](https://nvd.nist.gov/vuln/detail/CVE-2025-1178), [CVE-2025-1179](https://nvd.nist.gov/vuln/detail/CVE-2025-1179), [CVE-2025-1180](https://nvd.nist.gov/vuln/detail/CVE-2025-1180), [CVE-2025-1181](https://nvd.nist.gov/vuln/detail/CVE-2025-1181), [CVE-2025-1182](https://nvd.nist.gov/vuln/detail/CVE-2025-1182))\n - c-ares ([CVE-2025-31498](https://www.cve.org/CVERecord?id=CVE-2025-31498))\n - cifs-utils ([CVE-2025-2312](https://nvd.nist.gov/vuln/detail/CVE-2025-2312))\n - containerd ([CVE-2024-40635](https://www.cve.org/CVERecord?id=CVE-2024-40635))\n - crun ([CVE-2025-24965](https://nvd.nist.gov/vuln/detail/CVE-2025-24965))\n - curl ([CVE-2025-0167](https://nvd.nist.gov/vuln/detail/CVE-2025-0167), [CVE-2025-0665](https://nvd.nist.gov/vuln/detail/CVE-2025-0665), [CVE-2025-0725](https://nvd.nist.gov/vuln/detail/CVE-2025-0725), [curl-20250205](https://github.com/curl/curl/issues/16197))\n - expat ([CVE-2024-8176](https://nvd.nist.gov/vuln/detail/CVE-2024-8176))\n - git ([CVE-2024-50349](https://nvd.nist.gov/vuln/detail/CVE-2024-50349), [CVE-2024-52005](https://nvd.nist.gov/vuln/detail/CVE-2024-52005), [CVE-2024-52006](https://nvd.nist.gov/vuln/detail/CVE-2024-52006))\n - glib ([CVE-2024-52533](https://nvd.nist.gov/vuln/detail/CVE-2024-52533))\n - glibc ([CVE-2025-0395](https://nvd.nist.gov/vuln/detail/CVE-2025-0395))\n - gnutls ([CVE-2024-12243](https://nvd.nist.gov/vuln/detail/CVE-2024-12243))\n - go ([CVE-2025-22871](https://www.cve.org/CVERecord?id=CVE-2025-22871))\n - intel-microcode ([CVE-2023-34440](https://nvd.nist.gov/vuln/detail/CVE-2023-34440), [CVE-2023-43758](https://nvd.nist.gov/vuln/detail/CVE-2023-43758), [CVE-2024-24582](https://nvd.nist.gov/vuln/detail/CVE-2024-24582), [CVE-2024-28047](https://nvd.nist.gov/vuln/detail/CVE-2024-28047), [CVE-2024-28127](https://nvd.nist.gov/vuln/detail/CVE-2024-28127), [CVE-2024-29214](https://nvd.nist.gov/vuln/detail/CVE-2024-29214), [CVE-2024-31157](https://nvd.nist.gov/vuln/detail/CVE-2024-31157), [CVE-2024-39279](https://nvd.nist.gov/vuln/detail/CVE-2024-39279), [CVE-2024-31068](https://nvd.nist.gov/vuln/detail/CVE-2024-31068), [CVE-2024-36293](https://nvd.nist.gov/vuln/detail/CVE-2024-36293), [CVE-2024-37020](https://nvd.nist.gov/vuln/detail/CVE-2024-37020), [CVE-2024-39355](https://nvd.nist.gov/vuln/detail/CVE-2024-39355))\n - iperf ([CVE-2024-53580](https://www.cve.org/CVERecord?id=CVE-2024-53580))\n - libarchive ([CVE-2024-57970](https://nvd.nist.gov/vuln/detail/CVE-2024-57970), [CVE-2025-25724](https://nvd.nist.gov/vuln/detail/CVE-2025-25724))\n - libcap ([CVE-2025-1390](https://nvd.nist.gov/vuln/detail/CVE-2025-1390))\n - libtasn1 ([CVE-2024-12133](https://nvd.nist.gov/vuln/detail/CVE-2024-12133))\n - libxml2 ([CVE-2024-56171](https://nvd.nist.gov/vuln/detail/CVE-2024-56171), [CVE-2025-24928](https://nvd.nist.gov/vuln/detail/CVE-2025-24928), [CVE-2025-27113](https://nvd.nist.gov/vuln/detail/CVE-2025-27113))\n - libxslt ([CVE-2025-24855](https://nvd.nist.gov/vuln/detail/CVE-2025-24855), [CVE-2024-55549](https://nvd.nist.gov/vuln/detail/CVE-2024-55549))\n - mit-krb5 ([CVE-2025-24528](https://nvd.nist.gov/vuln/detail/CVE-2025-24528))\n - openssh ([CVE-2025-26465](https://nvd.nist.gov/vuln/detail/CVE-2025-26465), [CVE-2025-26466](https://nvd.nist.gov/vuln/detail/CVE-2025-26466))\n - openssl ([CVE-2024-13176](https://nvd.nist.gov/vuln/detail/CVE-2024-13176), [CVE-2024-12797](https://nvd.nist.gov/vuln/detail/CVE-2024-12797))\n - perl ([CVE-2024-56406](https://www.cve.org/CVERecord?id=CVE-2024-56406))\n - podman ([CVE-2024-11218](https://nvd.nist.gov/vuln/detail/CVE-2024-11218))\n - python ([CVE-2025-0938](https://www.cve.org/CVERecord?id=CVE-2025-0938))\n - rsync ([CVE-2024-12084](https://nvd.nist.gov/vuln/detail/CVE-2024-12084), [CVE-2024-12085](https://nvd.nist.gov/vuln/detail/CVE-2024-12085), [CVE-2024-12086](https://nvd.nist.gov/vuln/detail/CVE-2024-12086), [CVE-2024-12087](https://nvd.nist.gov/vuln/detail/CVE-2024-12087), [CVE-2024-12088](https://nvd.nist.gov/vuln/detail/CVE-2024-12088), [CVE-2024-12747](https://nvd.nist.gov/vuln/detail/CVE-2024-12747))\n - socat ([CVE-2024-54661](https://nvd.nist.gov/vuln/detail/CVE-2024-54661), [socat-20250221](https://repo.or.cz/socat.git/blob/refs/tags/tag-1.8.0.3:/CHANGES#l4))\n - vim ([CVE-2024-41957](https://nvd.nist.gov/vuln/detail/CVE-2024-41957), [CVE-2024-41965](https://nvd.nist.gov/vuln/detail/CVE-2024-41965), [CVE-2024-43374](https://nvd.nist.gov/vuln/detail/CVE-2024-43374), [CVE-2024-43790](https://nvd.nist.gov/vuln/detail/CVE-2024-43790), [CVE-2024-43802](https://nvd.nist.gov/vuln/detail/CVE-2024-43802), [CVE-2024-45306](https://nvd.nist.gov/vuln/detail/CVE-2024-45306), [CVE-2024-47814](https://nvd.nist.gov/vuln/detail/CVE-2024-47814))\n - xz-utils ([CVE-2025-31115](https://www.cve.org/CVERecord?id=CVE-2025-31115))\n \n #### Bug fixes:\n \n - Added back some BCC tools ([scripts#2900](https://github.com/flatcar/scripts/pull/2900))\n - Fix non-conforming GPT partition table ([flatcar/Flatcar#1651](https://github.com/flatcar/Flatcar/issues/1651))\n - Fixed path handling in the QEMU .sh launcher scripts. Given paths now are relative to the current directory and absolute paths work as you would expect.\n - Fixed race condition in the script that grows the root partition to fill the disk. This bug sometimes caused the operation to not occur. ([init#132](https://github.com/flatcar/init/pull/132))\n - Fixed the inclusion of Intel and AMD CPU microcode in the initrd. This was accidentally dropped some time ago.\n - azure: Fixed issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning ([flatcar/Flatcar#1661](https://github.com/flatcar/Flatcar/issues/1661))\n - update-ssh-keys: More intuitive --help text and the -n (no-replace) option has been fixed. ([flatcar/Flatcar#1554](https://github.com/flatcar/Flatcar/issues/1554))\n \n #### Changes:\n \n - Add changes for our secureboot signed images with our signed release process until the official shim signing ([scripts#2754](https://github.com/flatcar/scripts/pull/2754/))\n - Added `nftables-load.service` and `nftables-store.service` services to load/store rules from/in `/var/lib/nftables/rules-save` ([Flatcar#900](https://github.com/flatcar/Flatcar/issues/900))\n - Added support for podman in `toolbox` ([toolbox#11](https://github.com/flatcar/toolbox/pull/11))\n - Allow per-sysext USE flags and architecture-specific sysexts. ([scripts#2798](https://github.com/flatcar/scripts/pull/2798/))\n - Always truncate hostnames on the first occurrence of `.` ([cloud-init#32](https://github.com/flatcar/coreos-cloudinit/pull/32))\n - Build Intel iGPU i915 driver as module ([scripts#2349](https://github.com/flatcar/scripts/pull/2349))\n - Compile OS-dependent NVIDIA kernel module sysexts signed for secure boot. ([scripts#2798](https://github.com/flatcar/scripts/pull/2798/))\n - Enabled EROFS module with XATTR support ([Flatcar#1659](https://github.com/flatcar/Flatcar/issues/1659))\n - Enabled virtiofs and fuse-dax modules in the kernel for advaned Qemu usecases. Thank you @aaronk6! ([Flatcar#2825](https://github.com/flatcar/scripts/pull/2825))\n - Ensure hostnames never exceeds 63 characters, regardless of the metadata provider ([cloud-init#31](https://github.com/flatcar/coreos-cloudinit/pull/31))\n - Provided an Incus Flatcar extension as optional systemd-sysext image with the release. Write 'incus' to `/etc/flatcar/enabled-sysext.conf` through Ignition and the sysext will be installed during provisioning. ([scripts#1655](https://github.com/flatcar/scripts/pull/1655))\n - Sign out-of-tree kernel modules using the ephemeral signing key so that ZFS and NVIDIA sysexts can work with secure boot. ([scripts#2636](https://github.com/flatcar/scripts/pull/2636/))\n - The kernel image and its embedded initrd are now compressed with xz rather than zstd. This gives greater compression at the cost of decompression performance. Systems may therefore now be ever so slightly slower to boot, but this was necessary to avoid running out of space in the /boot partition. Further measures to address the space issue are planned, and perhaps we can switch back to zstd in a later release.\n - The qemu script (`flatcar_production_qemu*.sh`) received two new options. `-D` (or `-image-disk-opts`) can be used to add extra options to the `virtio-blk-pci` device for primary disk. `-d` (or `-disk`) can be used to add extra disks to the machine - this one takes a path to a raw or qcow2 image file and, after a comma, `virtio-blk-pci` options. To learn what disk options can be passed to `-D` or `-d`, call `qemu-system-x86_64 -device virtio-blk-pci,help` (`qemu-system-aarch64` can be used too).\n - `/boot` is now only accessible by the root user for better security. ([Flatcar#296](https://github.com/flatcar/Flatcar/issues/296))\n - sysext-incus: removed `/etc/subuid` and `/etc/subgid` generation for `root` user, it has to be created through initial provisioning. ([scripts#3028](https://github.com/flatcar/scripts/pull/3028))\n - systemd now uses OpenSSL instead of gcrypt for cryptography to reduce the size of the initrd. This change disables systemd-journal's Forward Secure Sealing feature, but it is generally not useful for Flatcar.\n \n #### Updates:\n \n - AWS: Amazon SSM Agent ([3.3.2299.0](https://github.com/aws/amazon-ssm-agent/blob/mainline/RELEASENOTES.md#3322990))\n - Ignition ([2.21.0](https://coreos.github.io/ignition/release-notes/#ignition-2210-2025-03-13))\n - Linux ([6.12.34](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.34) (includes [6.12.33](https://lwn.net/Articles/1024717), [6.12.32](https://lwn.net/Articles/1023797), [6.12.31](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.31), [6.12.30](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.30) [6.12.29](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.29) [6.12.28](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.28), [6.12.27](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.27), [6.12.26](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.26), [6.12.25](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.25), [6.12.24](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.24), [6.12.23](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.23), [6.12.22](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.22), [6.12.21](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.21), [6.12.20](https://lwn.net/Articles/1015185/)  [6.12.19](https://lwn.net/Articles/1014045/), [6.12.18](https://lwn.net/Articles/1013397/), [6.12.17](https://lwn.net/Articles/1012191/), [6.12.16](https://lwn.net/Articles/1011265/), [6.12.15](https://lwn.net/Articles/1010623/), [6.12.14](https://lwn.net/Articles/1010356/), [6.12.13](https://lwn.net/Articles/1008643/), [6.12.12](https://lwn.net/Articles/1007440/), [6.12.11](https://lwn.net/Articles/1006009/), [6.12.10](https://lwn.net/Articles/1005382/), [6.12.9](https://lwn.net/Articles/1004549/), [6.12.8](https://lwn.net/Articles/1003985/), [6.12.7](https://lwn.net/Articles/1003608/), [6.12.6](https://lwn.net/Articles/1002918/), [6.12.5](https://lwn.net/Articles/1002176/), [6.12.4](https://lwn.net/Articles/1001437/), [6.12.3](https://lwn.net/Articles/1001203/), [6.12.2](https://lwn.net/Articles/1000872/), [6.12.1](https://lwn.net/Articles/999108/), [6.12](https://lwn.net/Articles/998490/), [6.6.89](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.89)))\n - Linux Firmware ([20250509](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250509) (includes [20250410](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250410), [20250311](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250311), [20250211](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250211)))\n - SDK: cmake ([3.31.5](https://cmake.org/cmake/help/v3.31/release/3.31.html))\n - SDK: go ([1.24.2](https://go.dev/doc/devel/release#go1.24.minor) (includes [1.24.1](https://go.dev/doc/go1.24), [1.23.6](https://go.dev/doc/devel/release#go1.23.6), [1.23.5](https://go.dev/doc/go1.23)))\n - SDK: meson ([1.6.1](https://mesonbuild.com/Release-notes-for-1-6-0.html))\n - SDK: perl ([5.40.2](https://perldoc.perl.org/perl5402delta) (includes [5.40.1](https://perldoc.perl.org/perl5401delta))\n - SDK: pkgcheck ([0.10.34](https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.34))\n - SDK: qemu ([9.1.2](https://wiki.qemu.org/ChangeLog/9.1) (includes [9.0](https://wiki.qemu.org/ChangeLog/9.0)))\n - SDK: rust ([1.85.1](https://github.com/rust-lang/rust/releases/tag/1.85.1) (includes [1.85.0](https://github.com/rust-lang/rust/releases/tag/1.85.0), [1.84.1](https://releases.rs/docs/1.84.1/), [1.84.0](https://releases.rs/docs/1.84.0/), [1.83.0](https://blog.rust-lang.org/2024/11/28/Rust-1.83.0.html)))\n - VMWare: open-vm-tools ([12.5.2](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.5.2))\n - afterburn ([5.8.2](https://coreos.github.io/afterburn/release-notes/#afterburn-582))\n - azure, dev, gce, sysext-python: gdbm ([1.25](https://lists.gnu.org/archive/html/info-gnu/2025-03/msg00010.html))\n - azure, dev, gce, sysext-python: python ([3.11.12](https://www.python.org/downloads/release/python-31112/))\n - azure: wa-linux-agent ([2.12.0.4](https://github.com/Azure/WALinuxAgent/releases/tag/v2.12.0.4))\n - base, dev: azure-vm-utils ([0.6.0](https://github.com/Azure/azure-vm-utils/releases/tag/v0.6.0) (includes [0.5.2](https://github.com/Azure/azure-vm-utils/releases/tag/v0.5.2), [0.5.1](https://github.com/Azure/azure-vm-utils/releases/tag/v0.5.1), [0.5.0](https://github.com/Azure/azure-vm-utils/releases/tag/v0.5.0)))\n - base, dev: bind ([9.18.31](https://bind9.readthedocs.io/en/v9.18.31/notes.html#notes-for-bind-9-18-31) (includes [9.18.30](https://bind9.readthedocs.io/en/v9.18.30/notes.html#notes-for-bind-9-18-30)))\n - base, dev: binutils ([2.44](https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00001.html))\n - base, dev: btrfs-progs ([6.13](https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.13/CHANGES))\n - base, dev: c-ares ([1.34.4](https://github.com/c-ares/c-ares/releases/tag/v1.34.4))\n - base, dev: cifs-utils ([7.3](https://lists.samba.org/archive/samba-technical/2025-March/139360.html) (includes [7.2](https://lists.samba.org/archive/samba-technical/2025-February/139330.html), [7.1](https://lists.samba.org/archive/samba-technical/2024-October/139146.html)))\n - base, dev: cracklib ([2.10.3](https://github.com/cracklib/cracklib/releases/tag/v2.10.3))\n - base, dev: cri-tools ([1.32.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.32.0) (includes [1.31.1](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.31.1), [1.31.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.31.0), [1.30.1](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.30.1), [1.30.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.30.0), [1.29.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.29.0), [1.28.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.28.0), [1.27.1](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.1)))\n - base, dev: curl ([8.13.0](https://curl.se/ch/8.13.0.html) (includes [8.12.1](https://curl.se/ch/8.12.1.html), [8.12.0](https://curl.se/ch/8.12.0.html))\n - base, dev: dbus ([1.16.2](https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.16.2/NEWS) (includes [1.16.0](https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.16.0/NEWS), [1.14.8](https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.14.8/NEWS), [1.14.6](https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.14.6/NEWS)))\n - base, dev: diffutils ([3.12](https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00005.html) (includes [3.11](https://savannah.gnu.org/news/?id=10720)))\n - base, dev: e2fsprogs ([1.47.2](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.2))\n - base, dev: elfutils ([0.192](https://inbox.sourceware.org/elfutils-devel/CAJDtP-T3+gXqHWp3T0mejWWbPr0_1tHetEXwfB67-o+zz7ShiA@mail.gmail.com/T/))\n - base, dev: ethtool ([6.11](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.11))\n - base, dev: expat ([2.7.1](https://github.com/libexpat/libexpat/blob/R_2_7_1/expat/Changes#L40) (includes [2.7.0](https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40)))\n - base, dev: git ([2.49.0](https://github.com/git/git/blob/v2.49.0/Documentation/RelNotes/2.49.0.adoc) (includes [2.48.1](https://github.com/git/git/blob/v2.48.1/Documentation/RelNotes/2.48.1.txt) [2.48.0](https://github.com/git/git/blob/v2.48.0/Documentation/RelNotes/2.48.0.txt), [2.47.2](https://github.com/git/git/blob/v2.47.2/Documentation/RelNotes/2.47.2.txt), [2.47.1](https://github.com/git/git/blob/v2.47.1/Documentation/RelNotes/2.47.1.txt), [2.47.0](https://github.com/git/git/blob/v2.47.0/Documentation/RelNotes/2.47.0.txt), [2.46.3](https://github.com/git/git/blob/v2.46.3/Documentation/RelNotes/2.46.3.txt), [2.46.2](https://github.com/git/git/blob/v2.46.2/Documentation/RelNotes/2.46.2.txt), [2.46.1](https://github.com/git/git/blob/v2.46.1/Documentation/RelNotes/2.46.1.txt), [2.46.0](https://github.com/git/git/blob/v2.46.0/Documentation/RelNotes/2.46.0.txt), [2.45.3](https://github.com/git/git/blob/v2.45.3/Documentation/RelNotes/2.45.3.txt)))\n - base, dev: glib (([2.82.5](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.5) (includes [2.82.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.4), [2.82.3](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.3), [2.82.2](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.2), [2.82.1](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1), [2.82.0](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.0)))\n - base, dev: gnupg ([2.4.7](https://dev.gnupg.org/T7353))\n - base, dev: gnutls ([3.8.9](https://lists.gnupg.org/pipermail/gnutls-help/2025-February/004875.html) (includes [3.8.8](https://gitlab.com/gnutls/gnutls/-/blob/3.8.8/NEWS)))\n - base, dev: hwdata ([0.391](https://github.com/vcrhonek/hwdata/releases/tag/v0.391))\n - base, dev: intel-microcode ([20250211_p20250211](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211))\n - base, dev: iproute2 ([6.14.0](https://lore.kernel.org/all/20250324092319.28d39f2f@hermes.local/) (includes [6.13.0](https://lore.kernel.org/all/20250120194053.3744d96b@hermes.local/)))\n - base, dev: ipset ([7.23](https://ipset.netfilter.org/changelog.html))\n - base, dev: iptables ([1.8.11](https://netfilter.org/projects/iptables/files/changes-iptables-1.8.11.txt) (includes [1.8.10](https://netfilter.org/projects/iptables/files/changes-iptables-1.8.10.txt), [1.8.9](https://netfilter.org/projects/iptables/files/changes-iptables-1.8.9.txt)))\n - base, dev: kbd ([2.7.1](https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7.1) (includes [2.7](https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7), [2.7-rc1](https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7-rc1)))\n - base, dev: ldb ([2.9.2](https://gitlab.com/samba-team/samba/-/commit/42bfbb012f9c1c9054cdfb510ae4a50a3f12b384) (includes [2.9.1](https://gitlab.com/samba-team/samba/-/commit/3dd39600da3c0bedeae9f033c1333eb6b0f4ff33), [2.9.0](https://gitlab.com/samba-team/samba/-/commit/ec91204387bd7f5c5a8d8df8534c6ca59b491ac5)))\n - base, dev: libarchive ([3.7.9](https://github.com/libarchive/libarchive/releases/tag/v3.7.9) (includes [3.7.8](https://github.com/libarchive/libarchive/releases/tag/v3.7.8)))\n - base, dev: libidn2 ([2.3.8](https://gitlab.com/libidn/libidn2/-/blob/v2.3.8/NEWS))\n - base, dev: libnvme ([1.12](https://github.com/linux-nvme/libnvme/releases/tag/v1.12))\n - base, dev: libpcre2 ([10.45](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.45/NEWS))\n - base, dev: libseccomp ([2.6.0](https://github.com/seccomp/libseccomp/releases/tag/v2.6.0) (includes [2.5.6](https://github.com/seccomp/libseccomp/releases/tag/v2.5.6)))\n - base, dev: libsemanage ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7))\n - base, dev: libtasn1 ([4.20.0](https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00004.html))\n - base, dev: libtirpc ([1.3.6](https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-6) (includes [1.3.5](https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-5)))\n - base, dev: libuv ([1.50.0](https://github.com/libuv/libuv/releases/tag/v1.50.0))\n - base, dev: libxcrypt ([4.4.38](https://github.com/besser82/libxcrypt/releases/tag/v4.4.38) (includes [4.4.37](https://github.com/besser82/libxcrypt/releases/tag/v4.4.37)))\n - base, dev: libxml2 ([2.13.7](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.7) (includes [2.13.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.6), [2.13.5](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.5), [2.13.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.4), [2.13.3](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.3), [2.13.2](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.2), [2.13.1](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.1), [2.13.0](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.0), [2.12.10](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.10)))\n - base, dev: linux-headers ([6.12](https://kernelnewbies.org/Linux_6.12))\n - base, dev: logrotate ([3.22.0](https://github.com/logrotate/logrotate/releases/tag/3.22.0) (includes [3.21.0](https://github.com/logrotate/logrotate/releases/tag/3.21.0)))\n - base, dev: lvm2 ([2.03.22](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_22) (includes [2.03.21](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_21), [2.03.20](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_20), [2.03.19](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_19), [2.03.18](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_18), [2.03.17](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_17), [2.03.16](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_16), [2.03.15](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_15), [2.03.14](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_14), [2.03.13](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_13), [2.03.12](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_12), [2.03.11](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_11), [2.03.10](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_10), [2.03.09](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_09), [2.03.08](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_08), [2.03.07](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_07), [2.03.06](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_06), [2.03.05](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_05), [2.03.04](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_04), [2.03.03](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_03), [2.03.02](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_02), [2.03.01](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_01), [2.03.00](https://gitlab.com/lvmteam/lvm2/-/tags/v2_03_00)))\n - base, dev: mdadm ([4.4](https://git.kernel.org/pub/scm/utils/mdadm/mdadm.git/tree/CHANGELOG.md?h=mdadm-4.4) (includes [4.3](https://git.kernel.org/pub/scm/utils/mdadm/mdadm.git/tree/CHANGELOG.md?h=mdadm-4.4#n36)))\n - base, dev: ncurses ([6.5_p20250125](https://invisible-island.net/ncurses/announce-6.5.html))\n - base, dev: nettle ([3.10.1](https://lists.gnu.org/archive/html/info-gnu/2024-12/msg00008.html))\n - base, dev: nfs-utils ([2.7.1](https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-7-1) (includes [2.6.4](https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-4), [2.6.3](https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-3), [2.6.2](https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-2), [2.6.1](https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=log;h=refs/tags/nfs-utils-2-6-1)))\n - base, dev: nftables ([1.1.1](https://netfilter.org/projects/nftables/files/changes-nftables-1.1.1.txt) (includes [1.1.0](https://netfilter.org/projects/nftables/files/changes-nftables-1.1.0.txt), [1.0.9](https://netfilter.org/projects/nftables/files/changes-nftables-1.0.9.txt), [1.0.8](https://netfilter.org/projects/nftables/files/changes-nftables-1.0.8.txt), [1.0.7](https://netfilter.org/projects/nftables/files/changes-nftables-1.0.7.txt), [1.0.6](https://netfilter.org/projects/nftables/files/changes-nftables-1.0.6.txt), [1.0.5](https://netfilter.org/projects/nftables/files/changes-nftables-1.0.5.txt), [1.0.4](https://netfilter.org/projects/nftables/files/changes-nftables-1.0.4.txt), [1.0.3](https://netfilter.org/projects/nftables/files/changes-nftables-1.0.3.txt), [1.0.2](https://netfilter.org/projects/nftables/files/changes-nftables-1.0.2.txt), [1.0.1](https://netfilter.org/projects/nftables/files/changes-nftables-1.0.1.txt), [1.0.0](https://netfilter.org/projects/nftables/files/changes-nftables-1.0.0.txt)))\n - base, dev: nghttp2 ([1.65.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.65.0) (includes [1.64.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.64.0), [1.63.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.63.0)))\n - base, dev: nvme-cli ([2.12](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.12))\n - base, dev: oniguruma ([6.9.10](https://github.com/kkos/oniguruma/releases/tag/v6.9.10))\n - base, dev: open-iscsi ([2.1.11](https://github.com/open-iscsi/open-iscsi/blob/2.1.11/Changelog))\n - base, dev: open-isns ([0.103](https://github.com/open-iscsi/open-isns/releases/tag/v0.103))\n - base, dev: openssh ([9.9_p2](https://www.openssh.com/txt/release-9.9p2) (includes [9.9_p1](https://www.openssh.com/txt/release-9.9)))\n - base, dev: openssl ([3.3.3](https://github.com/openssl/openssl/releases/tag/openssl-3.3.3))\n - base, dev: pkgconf ([2.4.3](https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.3/NEWS) (includes [2.4.2](https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.2/NEWS), [2.4.1](https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.1/NEWS), [2.4.0](https://github.com/pkgconf/pkgconf/blob/pkgconf-2.4.0/NEWS)))\n - base, dev: policycoreutils ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7))\n - base, dev: polkit ([126](https://github.com/polkit-org/polkit/blob/126/NEWS.md) (includes [125](https://github.com/polkit-org/polkit/blob/125/NEWS.md), [124](https://github.com/polkit-org/polkit/blob/124/NEWS.md), [123](https://github.com/polkit-org/polkit/blob/123/NEWS.md), [122](https://github.com/polkit-org/polkit/blob/122/NEWS.md)))\n - base, dev: qemu-guest-agent ([9.2.0](https://wiki.qemu.org/ChangeLog/9.2#Guest_agent) (includes [9.1](https://wiki.qemu.org/ChangeLog/9.1#Guest_agent), [9.0](https://wiki.qemu.org/ChangeLog/9.0#Guest_agent)))\n - base, dev: rpcbind ([1.2.7](http://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_7))\n - base, dev: rsync ([3.4.1](https://download.samba.org/pub/rsync/NEWS#3.4.1) (includes [3.4.0](https://download.samba.org/pub/rsync/NEWS#3.4.0)))\n - base, dev: samba ([4.20.7](https://gitlab.com/samba-team/samba/-/blob/samba-4.20.7/WHATSNEW.txt) (includes [4.20.6](https://gitlab.com/samba-team/samba/-/blob/samba-4.20.6/WHATSNEW.txt), [4.20.5](https://gitlab.com/samba-team/samba/-/blob/samba-4.20.5/WHATSNEW.txt), [4.20.4](https://gitlab.com/samba-team/samba/-/blob/samba-4.20.4/WHATSNEW.txt), [4.20.3](https://gitlab.com/samba-team/samba/-/blob/samba-4.20.3/WHATSNEW.txt), [4.20.2](https://gitlab.com/samba-team/samba/-/blob/samba-4.20.2/WHATSNEW.txt), [4.20.1](https://gitlab.com/samba-team/samba/-/blob/samba-4.20.1/WHATSNEW.txt), [4.20.0](https://gitlab.com/samba-team/samba/-/blob/samba-4.20.0/WHATSNEW.txt)))\n - base, dev: semodule-utils ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7))\n - base, dev: shadow ([4.14.8](https://github.com/shadow-maint/shadow/releases/tag/4.14.8) (includes [4.14.7](https://github.com/shadow-maint/shadow/releases/tag/4.14.7), [4.14.6](https://github.com/shadow-maint/shadow/releases/tag/4.14.6), [4.14.5](https://github.com/shadow-maint/shadow/releases/tag/4.14.5), [4.14.4](https://github.com/shadow-maint/shadow/releases/tag/4.14.4), [4.14.3](https://github.com/shadow-maint/shadow/releases/tag/4.14.3), [4.14.2](https://github.com/shadow-maint/shadow/releases/tag/4.14.2), [4.14.1](https://github.com/shadow-maint/shadow/releases/tag/4.14.1), [4.14.0](https://github.com/shadow-maint/shadow/releases/tag/4.14.0)))\n - base, dev: socat ([1.8.0.3](https://repo.or.cz/socat.git/blob/refs/tags/tag-1.8.0.3:/CHANGES) (includes [1.8.0.2](https://repo.or.cz/socat.git/blob/refs/tags/tag-1.8.0.2:/CHANGES), [1.8.0.1](https://repo.or.cz/socat.git/blob/6ff391324d2d3b9f6bfb58e7d16a20be43b47af7:/CHANGES)))\n - base, dev: sqlite ([3.49.1](https://sqlite.org/releaselog/3_49_1.html) (includes [3.49.0](https://sqlite.org/releaselog/3_49_0.html), [3.48.0](https://sqlite.org/releaselog/3_48_0.html), [3.47.2](https://sqlite.org/releaselog/3_47_2.html)))\n - base, dev: sssd ([2.9.6](https://sssd.io/release-notes/sssd-2.9.6.html))\n - base, dev: strace ([6.14](https://github.com/strace/strace/releases/tag/v6.14) (includes [6.13](https://github.com/strace/strace/releases/tag/v6.13)))\n - base, dev: tdb ([1.4.12](https://gitlab.com/samba-team/samba/-/commit/6b10cfbaf2c522cceb48c610c18656d2d69cf60b) (includes [1.4.11](https://gitlab.com/samba-team/samba/-/commit/93a6656c13facdb8565f90954428c4cf800bfc36)))\n - base, dev: timezone-data ([2025b](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/6JVHNHLB6I2WAYTQ75L6KEPEQHFXAJK3/) (includes [2025a](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/MWII7R3HMCEDNUCIYQKSSTYYR7UWK4OQ/), [2024b](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/IZ7AO6WRE3W3TWBL5IR6PMQUL433BQIE/), [2024a](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/UXFL4DEZCXJVZW6E24Y2HLSXVB2ILFVE/), [2023d](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/WSF4TA5RFP7ECRKUKQFRHYN724HDMRTO/), [2023c](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/NPQOFZRXK5QKUW7F4CC24W52OTZ7YOOT/), [2023b](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/YXCVU55LIUZTZREUUH4VPMC75GYKKPE7/), [2023a](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/HLUTNGHZ5QPNOPZTZFS6F2QVMGQWEDMC/), [2022g](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/XIK47NMDAHCVOWE4MZIB7F44HFU3J2OB/), [2022f](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/65JMZVURDDM3XOABROYJX5ZN4N6TATZ5/), [2022e](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/CTWT3RFQXZHROH4VJKXAVQ77FYMF7BHY/), [2022d](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/TCLVCAIDB64WNEVHJV2ITDHFRUHVB7BN/), [2022c](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/GFXHZWBRVLDVX5QQUI4UCY5B4O2FRV5Z/), [2022b](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/IB5UMSJYN42GOMKHHWU5UCHD3WYRCVQ4/), [2022a](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/CU52CSKQNZRRZPRBDY4GKCCFWKZD4HAJ/), [2021e](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/ANTPUKJNFDF6ZA3NSIJEOZGDHUNJ4HL2/), [2021d](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/YPPIPGO3PLSMDNSVX6VOMASHRDL4GQWB/), [2021c](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/MFS2QPRANAWSPV2DKU46NQKDDPLMXH2H/), [2021b](https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/422GNGI6F26NIV2JNHI726UO2TDTO2MD/)))\n - base, dev: trousers ([0.3.15](https://sourceforge.net/p/trousers/trousers/ci/TROUSERS_0_3_15/tree/ChangeLog))\n - base, dev: unzip ([6.0_p29](https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-29_changelog))\n - base, dev: userspace-rcu ([0.15.1](https://lore.kernel.org/lkml/6894741e-c3c8-4464-92ab-ba8b88929961@efficios.com/T/) (includes [0.15.0](https://lore.kernel.org/all/51160e24-389a-41b6-871b-ba522d427220@efficios.com/)))\n - base, dev: util-linux ([2.40.4](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.4/Documentation/releases/v2.40.4-ReleaseNotes) (includes [2.40.3](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.3/Documentation/releases/v2.40.3-ReleaseNotes)))\n - base, dev: vim ([9.1.0794](https://github.com/vim/vim/commits/v9.1.0794/))\n - base, dev: which ([2.23](https://git.savannah.gnu.org/cgit/which.git/tree/NEWS?id=3e2c8f8acc3a333b66b06de234bc9324c6fe5500))\n - base, dev: xfsprogs ([6.13.0](https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.13.0) (includes [6.12.0](https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.12.0)))\n - base, dev: xz-utils ([5.6.4](https://github.com/tukaani-project/xz/releases/tag/v5.6.4))\n - base, dev: zram-generator ([1.2.1](https://github.com/systemd/zram-generator/releases/tag/v1.2.1) (includes [1.2.0](https://github.com/systemd/zram-generator/releases/tag/v1.2.0)))\n - base, dev: zstd ([1.5.7](https://github.com/facebook/zstd/releases/tag/v1.5.7))\n - ca-certificates ([3.112](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html) (includes [3.111](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html)))\n - containerd: containerd ([2.0.2](https://github.com/containerd/containerd/releases/tag/v2.0.2))\n - containerd: runc ([1.2.5](https://github.com/opencontainers/runc/releases/tag/v1.2.5) (includes [1.2.4](https://github.com/opencontainers/runc/releases/tag/v1.2.4) [1.2.3](https://github.com/opencontainers/runc/releases/tag/v1.2.3), [1.2.2](https://github.com/opencontainers/runc/releases/tag/v1.2.2), [1.2.1](https://github.com/opencontainers/runc/releases/tag/v1.2.1), [1.2.0](https://github.com/opencontainers/runc/releases/tag/v1.2.0), [1.1.15](https://github.com/opencontainers/runc/releases/tag/v1.1.15)))\n - dev: bash-completion ([2.16.0](https://github.com/scop/bash-completion/releases/tag/2.16.0))\n - dev: eselect ([1.4.30](https://gitweb.gentoo.org/proj/eselect.git/tree/NEWS?h=eselect-1.4.30) (includes [1.4.29](https://gitweb.gentoo.org/proj/eselect.git/tree/NEWS?h=eselect-1.4.29)))\n - dev: gcc-config ([2.12.1](https://gitweb.gentoo.org/proj/gcc-config.git/log/?h=v2.12.1))\n - dev: getuto ([1.15](https://github.com/projg2/getuto/commits/getuto-1.15/))\n - dev: iperf ([3.18](https://github.com/esnet/iperf/releases/tag/3.18))\n - dev: man-pages ([6.10](https://lkml.org/lkml/2025/1/22/1229))\n - dev: minicom ([2.10](https://salsa.debian.org/minicom-team/minicom/-/releases/2.10))\n - dev: mpfr ([4.2.2](https://www.mpfr.org/mpfr-4.2.2/))\n - dev: pahole ([1.29](https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.29) (includes [1.28](https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.28)))\n - dev: patch ([2.8](https://lists.gnu.org/archive/html/info-gnu/2025-03/msg00014.html))\n - dev: portage ([3.0.67](https://github.com/gentoo/portage/blob/portage-3.0.67/NEWS))\n - docker: docker ([28.0.1](https://github.com/moby/moby/releases/tag/v28.0.1) (includes [28.0.0](https://github.com/moby/moby/releases/tag/v28.0.0), [27.4.1](https://docs.docker.com/engine/release-notes/27/#2741), [27.4.0](https://docs.docker.com/engine/release-notes/27/#2740)))\n - docker: docker-buildx ([0.20.1](https://github.com/docker/buildx/releases/tag/v0.20.1) (includes [0.20.0](https://github.com/docker/buildx/releases/tag/v0.20.0), [0.19.3](https://github.com/docker/buildx/releases/tag/v0.19.3), [0.19.2](https://github.com/docker/buildx/releases/tag/v0.19.2), [0.19.1](https://github.com/docker/buildx/releases/tag/v0.19.1), [0.19.0](https://github.com/docker/buildx/releases/tag/v0.19.0), [0.18.0](https://github.com/docker/buildx/releases/tag/v0.18.0), [0.17.1](https://github.com/docker/buildx/releases/tag/v0.17.1), [0.17.0](https://github.com/docker/buildx/releases/tag/v0.17.0), [0.16.2](https://github.com/docker/buildx/releases/tag/v0.16.2), [0.16.1](https://github.com/docker/buildx/releases/tag/v0.16.1), [0.16.0](https://github.com/docker/buildx/releases/tag/v0.16.0), [0.15.1](https://github.com/docker/buildx/releases/tag/v0.15.1), [0.15.0](https://github.com/docker/buildx/releases/tag/v0.15.0), [0.14.1](https://github.com/docker/buildx/releases/tag/v0.14.1)))\n - dracut ([106](https://github.com/dracut-ng/dracut-ng/releases/tag/106) (includes [105](https://github.com/dracut-ng/dracut-ng/releases/tag/105), [104](https://github.com/dracut-ng/dracut-ng/releases/tag/104), [103](https://github.com/dracut-ng/dracut-ng/releases/tag/103), [102](https://github.com/dracut-ng/dracut-ng/releases/tag/102), [101](https://github.com/dracut-ng/dracut-ng/releases/tag/101), [100](https://github.com/dracut-ng/dracut-ng/releases/tag/100), [060](https://github.com/dracut-ng/dracut-ng/releases/tag/060), [059](https://github.com/dracut-ng/dracut-ng/releases/tag/059), [058](https://github.com/dracut-ng/dracut-ng/releases/tag/058), [057](https://github.com/dracut-ng/dracut-ng/releases/tag/057), [056](https://github.com/dracut-ng/dracut-ng/releases/tag/056), [055](https://github.com/dracut-ng/dracut-ng/releases/tag/055), [054](https://github.com/dracut-ng/dracut-ng/releases/tag/054)))\n - sysext-docker: docker-buildx ([0.21.2](https://github.com/docker/buildx/releases/tag/v0.21.2) (includes [0.21.1](https://github.com/docker/buildx/releases/tag/v0.21.1), [0.21.0](https://github.com/docker/buildx/releases/tag/v0.21.0)))\n - sysext-podman, vmware: fuse ([3.17.2](https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.2) (includes [3.17.1](https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.1)))\n - sysext-podman: aardvark-dns ([1.14.0](https://github.com/containers/aardvark-dns/releases/tag/v1.14.0) (includes [1.13.1](https://github.com/containers/aardvark-dns/releases/tag/v1.13.1), [1.13.0](https://github.com/containers/aardvark-dns/releases/tag/v1.13.0)))\n - sysext-podman: catatonit ([0.2.1](https://github.com/openSUSE/catatonit/releases/tag/v0.2.1))\n - sysext-podman: conmon ([2.1.13](https://github.com/containers/conmon/releases/tag/v2.1.13) (includes [2.1.12](https://github.com/containers/conmon/releases/tag/v2.1.12), [2.1.11](https://github.com/containers/conmon/releases/tag/v2.1.11)))\n - sysext-podman: containers-common ([0.62.2](https://github.com/containers/common/releases/tag/v0.62.2) (includes [0.62.1](https://github.com/containers/common/releases/tag/v0.62.1), [0.62.0](https://github.com/containers/common/releases/tag/v0.62.0), [0.61.0](https://github.com/containers/common/releases/tag/v0.61.0)))\n - sysext-podman: containers-image ([5.34.2](https://github.com/containers/image/releases/tag/v5.34.2) (includes [5.34.1](https://github.com/containers/image/releases/tag/v5.34.1), [5.34.0](https://github.com/containers/image/releases/tag/v5.34.0), [5.33.0](https://github.com/containers/image/releases/tag/v5.33.0)))\n - sysext-podman: containers-shortnames ([2025.03.19](https://github.com/containers/shortnames/releases/tag/v2025.03.19))\n - sysext-podman: containers-storage ([1.57.2](https://github.com/containers/storage/releases/tag/v1.57.2) (includes [1.57.1](https://github.com/containers/storage/releases/tag/v1.57.1), [1.57.0](https://github.com/containers/storage/releases/tag/v1.57.0), [1.56.0](https://github.com/containers/storage/releases/tag/v1.56.0)))\n - sysext-podman: crun ([1.20](https://github.com/containers/crun/releases/tag/1.20), [1.19.1](https://github.com/containers/crun/releases/tag/1.19.1), [1.19](https://github.com/containers/crun/releases/tag/1.19), [1.18.2](https://github.com/containers/crun/releases/tag/1.18.2), [1.18.1](https://github.com/containers/crun/releases/tag/1.18.1), [1.18](https://github.com/containers/crun/releases/tag/1.18))\n - sysext-podman: gpgme ([1.24.2](https://dev.gnupg.org/T7524))\n - sysext-podman: netavark ([1.14.1](https://github.com/containers/netavark/releases/tag/v1.14.1) (includes [1.14.0](https://github.com/containers/netavark/releases/tag/v1.14.0), [1.13.1](https://github.com/containers/netavark/releases/tag/v1.13.1), [1.13.0](https://github.com/containers/netavark/releases/tag/v1.13.0)))\n - sysext-podman: passt ([2025.02.17](https://archives.passt.top/passt-user/20250217101614.561b23bc@elisabeth/T/#u) (includes [2025.01.21](https://archives.passt.top/passt-user/20250121182827.652400c8@elisabeth/T/#u)))\n - sysext-podman: podman ([5.3.2](https://github.com/containers/podman/releases/tag/v5.3.2))\n - sysext-python: more-itertools ([10.6.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.6.0))\n - sysext-python: pip ([25.0.1](https://github.com/pypa/pip/blob/25.0.1/NEWS.rst) (includes [25.0](https://github.com/pypa/pip/blob/25.0/NEWS.rst)))\n - sysext-python: platformdirs ([4.3.7](https://github.com/tox-dev/platformdirs/releases/tag/4.3.7))\n - sysext-python: rich ([14.0.0](https://github.com/Textualize/rich/releases/tag/v14.0.0))\n - sysext-python: setuptools ([78.1.0](https://github.com/pypa/setuptools/blob/v78.1.0/NEWS.rst) (includes [78.0.2](https://github.com/pypa/setuptools/blob/v78.0.2/NEWS.rst), [78.0.1](https://github.com/pypa/setuptools/blob/v78.0.1/NEWS.rst), [78.0.0](https://github.com/pypa/setuptools/blob/v78.0.0/NEWS.rst), [77.0.3](https://github.com/pypa/setuptools/blob/v77.0.3/NEWS.rst), [77.0.2](https://github.com/pypa/setuptools/blob/v77.0.2/NEWS.rst), [77.0.1](https://github.com/pypa/setuptools/blob/v77.0.1/NEWS.rst), [77.0.0](https://github.com/pypa/setuptools/blob/v77.0.0/NEWS.rst), [76.1.0](https://github.com/pypa/setuptools/blob/v76.1.0/NEWS.rst), [76.0.0](https://github.com/pypa/setuptools/blob/v76.0.0/NEWS.rst), [75.8.2](https://github.com/pypa/setuptools/blob/v75.8.2/NEWS.rst), [75.8.1](https://github.com/pypa/setuptools/blob/v75.8.1/NEWS.rst), [75.8.0](https://github.com/pypa/setuptools/blob/v75.8.0/NEWS.rst#v7580), [75.7.0](https://github.com/pypa/setuptools/blob/v75.7.0/NEWS.rst#v7570)))\n - sysext-python: setuptools-scm ([8.2.1](https://github.com/pypa/setuptools-scm/blob/v8.2.1/CHANGELOG.md), [8.2.0](https://github.com/pypa/setuptools-scm/blob/v8.2.0/CHANGELOG.md))\n - sysext-python: trove-classifiers ([2025.4.11.15](https://github.com/pypa/trove-classifiers/releases/tag/2025.4.11.15) (includes [2025.3.3.18](https://github.com/pypa/trove-classifiers/releases/tag/2025.3.3.18), [2025.3.19.19](https://github.com/pypa/trove-classifiers/releases/tag/2025.3.19.19)))\n - sysext-python: truststore ([0.10.1](https://github.com/sethmlarson/truststore/blob/v0.10.1/CHANGELOG.md))\n - sysext-python: typing-extensions ([4.13.2](https://github.com/python/typing_extensions/releases/tag/4.13.2) (includes [4.13.1](https://github.com/python/typing_extensions/releases/tag/4.13.1), [4.13.0](https://github.com/python/typing_extensions/releases/tag/4.13.0)))\n - sysext-python: urllib3 ([2.4.0](https://github.com/urllib3/urllib3/releases/tag/2.4.0))\n - sysext-python: wheel ([0.46.1](https://github.com/pypa/wheel/releases/tag/0.46.1) (includes [0.46.0](https://github.com/pypa/wheel/releases/tag/0.46.0)))\n - sysext-zfs: zfs ([2.3.1](https://github.com/openzfs/zfs/releases/tag/zfs-2.3.1) (includes [2.3.0](https://github.com/openzfs/zfs/releases/tag/zfs-2.3.0)))\n - vmware: libxslt ([1.1.43](https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.43) (includes [1.1.42](https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.42), [1.1.41](https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.41), [1.1.40](https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.40)))\n - vmware: xmlsec ([1.3.7](https://github.com/lsh123/xmlsec/releases/tag/1.3.7), [1.3.6](https://github.com/lsh123/xmlsec/releases/tag/1.3.6))\n \n \n _Changes since **Alpha 4344.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-38052](https://nvd.nist.gov/vuln/detail/CVE-2025-38052), [CVE-2025-38061](https://nvd.nist.gov/vuln/detail/CVE-2025-38061), [CVE-2025-38060](https://nvd.nist.gov/vuln/detail/CVE-2025-38060), [CVE-2025-38059](https://nvd.nist.gov/vuln/detail/CVE-2025-38059), [CVE-2025-38058](https://nvd.nist.gov/vuln/detail/CVE-2025-38058), [CVE-2025-38057](https://nvd.nist.gov/vuln/detail/CVE-2025-38057), [CVE-2025-38056](https://nvd.nist.gov/vuln/detail/CVE-2025-38056), [CVE-2025-38055](https://nvd.nist.gov/vuln/detail/CVE-2025-38055), [CVE-2025-38081](https://nvd.nist.gov/vuln/detail/CVE-2025-38081), [CVE-2025-38080](https://nvd.nist.gov/vuln/detail/CVE-2025-38080), [CVE-2025-38079](https://nvd.nist.gov/vuln/detail/CVE-2025-38079), [CVE-2025-38078](https://nvd.nist.gov/vuln/detail/CVE-2025-38078), [CVE-2025-38077](https://nvd.nist.gov/vuln/detail/CVE-2025-38077), [CVE-2025-38075](https://nvd.nist.gov/vuln/detail/CVE-2025-38075), [CVE-2025-38074](https://nvd.nist.gov/vuln/detail/CVE-2025-38074), [CVE-2025-38073](https://nvd.nist.gov/vuln/detail/CVE-2025-38073), [CVE-2025-38072](https://nvd.nist.gov/vuln/detail/CVE-2025-38072), [CVE-2025-38054](https://nvd.nist.gov/vuln/detail/CVE-2025-38054), [CVE-2025-38071](https://nvd.nist.gov/vuln/detail/CVE-2025-38071), [CVE-2025-38069](https://nvd.nist.gov/vuln/detail/CVE-2025-38069), [CVE-2025-38068](https://nvd.nist.gov/vuln/detail/CVE-2025-38068), [CVE-2025-38066](https://nvd.nist.gov/vuln/detail/CVE-2025-38066), [CVE-2025-38065](https://nvd.nist.gov/vuln/detail/CVE-2025-38065), [CVE-2025-38063](https://nvd.nist.gov/vuln/detail/CVE-2025-38063), [CVE-2025-38062](https://nvd.nist.gov/vuln/detail/CVE-2025-38062), [CVE-2025-38053](https://nvd.nist.gov/vuln/detail/CVE-2025-38053), [CVE-2025-38038](https://nvd.nist.gov/vuln/detail/CVE-2025-38038), [CVE-2025-38037](https://nvd.nist.gov/vuln/detail/CVE-2025-38037), [CVE-2025-38035](https://nvd.nist.gov/vuln/detail/CVE-2025-38035), [CVE-2025-38034](https://nvd.nist.gov/vuln/detail/CVE-2025-38034), [CVE-2025-38033](https://nvd.nist.gov/vuln/detail/CVE-2025-38033), [CVE-2025-38051](https://nvd.nist.gov/vuln/detail/CVE-2025-38051), [CVE-2025-38031](https://nvd.nist.gov/vuln/detail/CVE-2025-38031), [CVE-2025-38048](https://nvd.nist.gov/vuln/detail/CVE-2025-38048), [CVE-2025-38047](https://nvd.nist.gov/vuln/detail/CVE-2025-38047), [CVE-2025-38046](https://nvd.nist.gov/vuln/detail/CVE-2025-38046), [CVE-2025-38045](https://nvd.nist.gov/vuln/detail/CVE-2025-38045), [CVE-2025-38044](https://nvd.nist.gov/vuln/detail/CVE-2025-38044), [CVE-2025-38043](https://nvd.nist.gov/vuln/detail/CVE-2025-38043), [CVE-2025-38040](https://nvd.nist.gov/vuln/detail/CVE-2025-38040), [CVE-2025-38039](https://nvd.nist.gov/vuln/detail/CVE-2025-38039), [CVE-2025-38030](https://nvd.nist.gov/vuln/detail/CVE-2025-38030), [CVE-2025-38003](https://nvd.nist.gov/vuln/detail/CVE-2025-38003), [CVE-2025-38004](https://nvd.nist.gov/vuln/detail/CVE-2025-38004), [CVE-2025-38000](https://nvd.nist.gov/vuln/detail/CVE-2025-38000), [CVE-2025-38082](https://nvd.nist.gov/vuln/detail/CVE-2025-38082), [CVE-2025-38001](https://nvd.nist.gov/vuln/detail/CVE-2025-38001), [CVE-2025-38083](https://nvd.nist.gov/vuln/detail/CVE-2025-38083))\n \n #### Bug fixes:\n \n - Fixed race condition in the script that grows the root partition to fill the disk. This bug sometimes caused the operation to not occur. ([init#132](https://github.com/flatcar/init/pull/132))\n \n #### Changes:\n \n - Added support for podman in `toolbox` ([toolbox#11](https://github.com/flatcar/toolbox/pull/11))\n - `/boot` is now only accessible by the root user for better security. ([Flatcar#296](https://github.com/flatcar/Flatcar/issues/296))\n - sysext-incus: removed `/etc/subuid` and `/etc/subgid` generation for `root` user, it has to be created through initial provisioning. ([scripts#3028](https://github.com/flatcar/scripts/pull/3028))\n \n #### Updates:\n \n - Linux ([6.12.34](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.34) (includes [6.12.33](https://lwn.net/Articles/1024717), [6.12.32](https://lwn.net/Articles/1023797), [6.12.31](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.31)))\n - ca-certificates ([3.112](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html))"
  },
  "4344.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-07-08 15:20:14 +0000",
    "major_software": {
      "containerd": [
        "2.0.4"
      ],
      "docker": [
        "28.0.1"
      ],
      "ignition": [
        "2.21.0"
      ],
      "kernel": [
        "6.12.35"
      ],
      "systemd": [
        "256"
      ]
    },
    "release_notes": " _Changes since **Beta 4344.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-38210](https://nvd.nist.gov/vuln/detail/CVE-2025-38210), [CVE-2025-38219](https://nvd.nist.gov/vuln/detail/CVE-2025-38219), [CVE-2025-38218](https://nvd.nist.gov/vuln/detail/CVE-2025-38218), [CVE-2025-38217](https://nvd.nist.gov/vuln/detail/CVE-2025-38217), [CVE-2025-38216](https://nvd.nist.gov/vuln/detail/CVE-2025-38216), [CVE-2025-38215](https://nvd.nist.gov/vuln/detail/CVE-2025-38215), [CVE-2025-38214](https://nvd.nist.gov/vuln/detail/CVE-2025-38214), [CVE-2025-38213](https://nvd.nist.gov/vuln/detail/CVE-2025-38213), [CVE-2025-38232](https://nvd.nist.gov/vuln/detail/CVE-2025-38232), [CVE-2025-38231](https://nvd.nist.gov/vuln/detail/CVE-2025-38231), [CVE-2025-38212](https://nvd.nist.gov/vuln/detail/CVE-2025-38212), [CVE-2025-38229](https://nvd.nist.gov/vuln/detail/CVE-2025-38229), [CVE-2025-38228](https://nvd.nist.gov/vuln/detail/CVE-2025-38228), [CVE-2025-38227](https://nvd.nist.gov/vuln/detail/CVE-2025-38227), [CVE-2025-38226](https://nvd.nist.gov/vuln/detail/CVE-2025-38226), [CVE-2025-38225](https://nvd.nist.gov/vuln/detail/CVE-2025-38225), [CVE-2025-38224](https://nvd.nist.gov/vuln/detail/CVE-2025-38224), [CVE-2025-38223](https://nvd.nist.gov/vuln/detail/CVE-2025-38223), [CVE-2025-38222](https://nvd.nist.gov/vuln/detail/CVE-2025-38222), [CVE-2025-38220](https://nvd.nist.gov/vuln/detail/CVE-2025-38220), [CVE-2025-38211](https://nvd.nist.gov/vuln/detail/CVE-2025-38211), [CVE-2025-38186](https://nvd.nist.gov/vuln/detail/CVE-2025-38186), [CVE-2025-38185](https://nvd.nist.gov/vuln/detail/CVE-2025-38185), [CVE-2025-38184](https://nvd.nist.gov/vuln/detail/CVE-2025-38184), [CVE-2025-38183](https://nvd.nist.gov/vuln/detail/CVE-2025-38183), [CVE-2025-38182](https://nvd.nist.gov/vuln/detail/CVE-2025-38182), [CVE-2025-38208](https://nvd.nist.gov/vuln/detail/CVE-2025-38208), [CVE-2025-38181](https://nvd.nist.gov/vuln/detail/CVE-2025-38181), [CVE-2025-38202](https://nvd.nist.gov/vuln/detail/CVE-2025-38202), [CVE-2025-38201](https://nvd.nist.gov/vuln/detail/CVE-2025-38201), [CVE-2025-38200](https://nvd.nist.gov/vuln/detail/CVE-2025-38200), [CVE-2025-38198](https://nvd.nist.gov/vuln/detail/CVE-2025-38198), [CVE-2025-38180](https://nvd.nist.gov/vuln/detail/CVE-2025-38180), [CVE-2025-38197](https://nvd.nist.gov/vuln/detail/CVE-2025-38197), [CVE-2025-38195](https://nvd.nist.gov/vuln/detail/CVE-2025-38195), [CVE-2025-38194](https://nvd.nist.gov/vuln/detail/CVE-2025-38194), [CVE-2025-38193](https://nvd.nist.gov/vuln/detail/CVE-2025-38193), [CVE-2025-38192](https://nvd.nist.gov/vuln/detail/CVE-2025-38192), [CVE-2025-38191](https://nvd.nist.gov/vuln/detail/CVE-2025-38191), [CVE-2025-38190](https://nvd.nist.gov/vuln/detail/CVE-2025-38190), [CVE-2025-38189](https://nvd.nist.gov/vuln/detail/CVE-2025-38189), [CVE-2025-38188](https://nvd.nist.gov/vuln/detail/CVE-2025-38188), [CVE-2025-38179](https://nvd.nist.gov/vuln/detail/CVE-2025-38179), [CVE-2025-38090](https://nvd.nist.gov/vuln/detail/CVE-2025-38090), [CVE-2025-38089](https://nvd.nist.gov/vuln/detail/CVE-2025-38089), [CVE-2025-38087](https://nvd.nist.gov/vuln/detail/CVE-2025-38087), [CVE-2025-38086](https://nvd.nist.gov/vuln/detail/CVE-2025-38086), [CVE-2025-38084](https://nvd.nist.gov/vuln/detail/CVE-2025-38084), [CVE-2025-38085](https://nvd.nist.gov/vuln/detail/CVE-2025-38085))\n - sudo ([CVE-2025-32462](https://www.cve.org/CVERecord?id=CVE-2025-32462), [CVE-2025-32463](https://www.cve.org/CVERecord?id=CVE-2025-32463))\n \n \n #### Changes:\n \n - Added STACKIT images ([flatcar/scripts#3018](https://github.com/flatcar/scripts/pull/3018))\n - ftrace syscalls also available in ARM64 builds. (Enables syscall tracepoints) ([flatcar/scripts#2600](https://github.com/flatcar/scripts/pull/2600))\n \n #### Updates:\n \n - Linux ([6.12.35](https://lwn.net/Articles/1027277/))\n - ca-certificates ([3.113](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html))\n - sudo ([1.9.17p1](https://www.sudo.ws/releases/stable/#1.9.17p1))\n"
  },
  "4372.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-08-19 13:09:33 +0000",
    "major_software": {
      "containerd": [
        "2.0.4"
      ],
      "docker": [
        "28.0.1"
      ],
      "ignition": [
        "2.21.0"
      ],
      "kernel": [
        "6.12.40"
      ],
      "systemd": [
        "256"
      ]
    },
    "release_notes": "_Changes since **Beta 4344.1.1**_\n\n#### Security fixes:\n\n- Linux ([CVE-2025-38523](https://nvd.nist.gov/vuln/detail/CVE-2025-38523), [CVE-2025-38436](https://nvd.nist.gov/vuln/detail/CVE-2025-38436), [CVE-2025-38434](https://nvd.nist.gov/vuln/detail/CVE-2025-38434), [CVE-2025-38362](https://nvd.nist.gov/vuln/detail/CVE-2025-38362), [CVE-2025-38361](https://nvd.nist.gov/vuln/detail/CVE-2025-38361), [CVE-2025-38355](https://nvd.nist.gov/vuln/detail/CVE-2025-38355), [CVE-2025-38369](https://nvd.nist.gov/vuln/detail/CVE-2025-38369), [CVE-2025-38368](https://nvd.nist.gov/vuln/detail/CVE-2025-38368), [CVE-2025-38365](https://nvd.nist.gov/vuln/detail/CVE-2025-38365), [CVE-2025-38364](https://nvd.nist.gov/vuln/detail/CVE-2025-38364), [CVE-2025-38363](https://nvd.nist.gov/vuln/detail/CVE-2025-38363), [CVE-2025-38353](https://nvd.nist.gov/vuln/detail/CVE-2025-38353), [CVE-2025-38354](https://nvd.nist.gov/vuln/detail/CVE-2025-38354), [CVE-2025-38246](https://nvd.nist.gov/vuln/detail/CVE-2025-38246), [CVE-2025-38245](https://nvd.nist.gov/vuln/detail/CVE-2025-38245), [CVE-2025-38244](https://nvd.nist.gov/vuln/detail/CVE-2025-38244), [CVE-2025-38264](https://nvd.nist.gov/vuln/detail/CVE-2025-38264), [CVE-2025-38263](https://nvd.nist.gov/vuln/detail/CVE-2025-38263), [CVE-2025-38262](https://nvd.nist.gov/vuln/detail/CVE-2025-38262), [CVE-2025-38260](https://nvd.nist.gov/vuln/detail/CVE-2025-38260), [CVE-2025-38259](https://nvd.nist.gov/vuln/detail/CVE-2025-38259), [CVE-2025-38258](https://nvd.nist.gov/vuln/detail/CVE-2025-38258), [CVE-2025-38257](https://nvd.nist.gov/vuln/detail/CVE-2025-38257), [CVE-2025-38256](https://nvd.nist.gov/vuln/detail/CVE-2025-38256), [CVE-2025-38255](https://nvd.nist.gov/vuln/detail/CVE-2025-38255), [CVE-2025-38253](https://nvd.nist.gov/vuln/detail/CVE-2025-38253), [CVE-2025-38251](https://nvd.nist.gov/vuln/detail/CVE-2025-38251), [CVE-2025-38250](https://nvd.nist.gov/vuln/detail/CVE-2025-38250), [CVE-2025-38249](https://nvd.nist.gov/vuln/detail/CVE-2025-38249), [CVE-2025-38239](https://nvd.nist.gov/vuln/detail/CVE-2025-38239), [CVE-2025-38236](https://nvd.nist.gov/vuln/detail/CVE-2025-38236), [CVE-2025-38413](https://nvd.nist.gov/vuln/detail/CVE-2025-38413), [CVE-2025-38412](https://nvd.nist.gov/vuln/detail/CVE-2025-38412), [CVE-2025-38410](https://nvd.nist.gov/vuln/detail/CVE-2025-38410), [CVE-2025-38409](https://nvd.nist.gov/vuln/detail/CVE-2025-38409), [CVE-2025-38407](https://nvd.nist.gov/vuln/detail/CVE-2025-38407), [CVE-2025-38408](https://nvd.nist.gov/vuln/detail/CVE-2025-38408), [CVE-2025-38406](https://nvd.nist.gov/vuln/detail/CVE-2025-38406), [CVE-2025-38405](https://nvd.nist.gov/vuln/detail/CVE-2025-38405), [CVE-2025-38404](https://nvd.nist.gov/vuln/detail/CVE-2025-38404), [CVE-2025-38403](https://nvd.nist.gov/vuln/detail/CVE-2025-38403), [CVE-2025-38401](https://nvd.nist.gov/vuln/detail/CVE-2025-38401), [CVE-2025-38402](https://nvd.nist.gov/vuln/detail/CVE-2025-38402), [CVE-2025-38379](https://nvd.nist.gov/vuln/detail/CVE-2025-38379), [CVE-2025-38377](https://nvd.nist.gov/vuln/detail/CVE-2025-38377), [CVE-2025-38376](https://nvd.nist.gov/vuln/detail/CVE-2025-38376), [CVE-2025-38375](https://nvd.nist.gov/vuln/detail/CVE-2025-38375), [CVE-2025-38374](https://nvd.nist.gov/vuln/detail/CVE-2025-38374), [CVE-2025-38400](https://nvd.nist.gov/vuln/detail/CVE-2025-38400), [CVE-2025-38373](https://nvd.nist.gov/vuln/detail/CVE-2025-38373), [CVE-2025-38399](https://nvd.nist.gov/vuln/detail/CVE-2025-38399), [CVE-2025-38396](https://nvd.nist.gov/vuln/detail/CVE-2025-38396), [CVE-2025-38395](https://nvd.nist.gov/vuln/detail/CVE-2025-38395), [CVE-2025-38393](https://nvd.nist.gov/vuln/detail/CVE-2025-38393), [CVE-2025-38392](https://nvd.nist.gov/vuln/detail/CVE-2025-38392), [CVE-2025-38391](https://nvd.nist.gov/vuln/detail/CVE-2025-38391), [CVE-2025-38390](https://nvd.nist.gov/vuln/detail/CVE-2025-38390), [CVE-2025-38372](https://nvd.nist.gov/vuln/detail/CVE-2025-38372), [CVE-2025-38389](https://nvd.nist.gov/vuln/detail/CVE-2025-38389), [CVE-2025-38388](https://nvd.nist.gov/vuln/detail/CVE-2025-38388), [CVE-2025-38387](https://nvd.nist.gov/vuln/detail/CVE-2025-38387), [CVE-2025-38386](https://nvd.nist.gov/vuln/detail/CVE-2025-38386), [CVE-2025-38385](https://nvd.nist.gov/vuln/detail/CVE-2025-38385), [CVE-2025-38384](https://nvd.nist.gov/vuln/detail/CVE-2025-38384), [CVE-2025-38383](https://nvd.nist.gov/vuln/detail/CVE-2025-38383), [CVE-2025-38382](https://nvd.nist.gov/vuln/detail/CVE-2025-38382), [CVE-2025-38381](https://nvd.nist.gov/vuln/detail/CVE-2025-38381), [CVE-2025-38380](https://nvd.nist.gov/vuln/detail/CVE-2025-38380), [CVE-2025-38371](https://nvd.nist.gov/vuln/detail/CVE-2025-38371), [CVE-2025-38360](https://nvd.nist.gov/vuln/detail/CVE-2025-38360), [CVE-2025-38356](https://nvd.nist.gov/vuln/detail/CVE-2025-38356), [CVE-2025-38350](https://nvd.nist.gov/vuln/detail/CVE-2025-38350), [CVE-2025-38546](https://nvd.nist.gov/vuln/detail/CVE-2025-38546), [CVE-2025-38545](https://nvd.nist.gov/vuln/detail/CVE-2025-38545), [CVE-2025-38544](https://nvd.nist.gov/vuln/detail/CVE-2025-38544), [CVE-2025-38543](https://nvd.nist.gov/vuln/detail/CVE-2025-38543), [CVE-2025-38542](https://nvd.nist.gov/vuln/detail/CVE-2025-38542), [CVE-2025-38540](https://nvd.nist.gov/vuln/detail/CVE-2025-38540), [CVE-2025-38541](https://nvd.nist.gov/vuln/detail/CVE-2025-38541), [CVE-2025-38520](https://nvd.nist.gov/vuln/detail/CVE-2025-38520), [CVE-2025-38521](https://nvd.nist.gov/vuln/detail/CVE-2025-38521), [CVE-2025-38512](https://nvd.nist.gov/vuln/detail/CVE-2025-38512), [CVE-2025-38511](https://nvd.nist.gov/vuln/detail/CVE-2025-38511), [CVE-2025-38510](https://nvd.nist.gov/vuln/detail/CVE-2025-38510), [CVE-2025-38507](https://nvd.nist.gov/vuln/detail/CVE-2025-38507), [CVE-2025-38506](https://nvd.nist.gov/vuln/detail/CVE-2025-38506), [CVE-2025-38517](https://nvd.nist.gov/vuln/detail/CVE-2025-38517), [CVE-2025-38516](https://nvd.nist.gov/vuln/detail/CVE-2025-38516), [CVE-2025-38515](https://nvd.nist.gov/vuln/detail/CVE-2025-38515), [CVE-2025-38514](https://nvd.nist.gov/vuln/detail/CVE-2025-38514), [CVE-2025-38513](https://nvd.nist.gov/vuln/detail/CVE-2025-38513), [CVE-2025-38503](https://nvd.nist.gov/vuln/detail/CVE-2025-38503), [CVE-2025-38505](https://nvd.nist.gov/vuln/detail/CVE-2025-38505), [CVE-2025-38460](https://nvd.nist.gov/vuln/detail/CVE-2025-38460), [CVE-2025-38467](https://nvd.nist.gov/vuln/detail/CVE-2025-38467), [CVE-2025-38466](https://nvd.nist.gov/vuln/detail/CVE-2025-38466), [CVE-2025-38465](https://nvd.nist.gov/vuln/detail/CVE-2025-38465), [CVE-2025-38464](https://nvd.nist.gov/vuln/detail/CVE-2025-38464), [CVE-2025-38463](https://nvd.nist.gov/vuln/detail/CVE-2025-38463), [CVE-2025-38462](https://nvd.nist.gov/vuln/detail/CVE-2025-38462), [CVE-2025-38461](https://nvd.nist.gov/vuln/detail/CVE-2025-38461), [CVE-2025-38446](https://nvd.nist.gov/vuln/detail/CVE-2025-38446), [CVE-2025-38445](https://nvd.nist.gov/vuln/detail/CVE-2025-38445), [CVE-2025-38444](https://nvd.nist.gov/vuln/detail/CVE-2025-38444), [CVE-2025-38443](https://nvd.nist.gov/vuln/detail/CVE-2025-38443), [CVE-2025-38441](https://nvd.nist.gov/vuln/detail/CVE-2025-38441), [CVE-2025-38440](https://nvd.nist.gov/vuln/detail/CVE-2025-38440), [CVE-2025-38459](https://nvd.nist.gov/vuln/detail/CVE-2025-38459), [CVE-2025-38458](https://nvd.nist.gov/vuln/detail/CVE-2025-38458), [CVE-2025-38457](https://nvd.nist.gov/vuln/detail/CVE-2025-38457), [CVE-2025-38439](https://nvd.nist.gov/vuln/detail/CVE-2025-38439), [CVE-2025-38456](https://nvd.nist.gov/vuln/detail/CVE-2025-38456), [CVE-2025-38455](https://nvd.nist.gov/vuln/detail/CVE-2025-38455), [CVE-2025-38454](https://nvd.nist.gov/vuln/detail/CVE-2025-38454), [CVE-2025-38452](https://nvd.nist.gov/vuln/detail/CVE-2025-38452), [CVE-2025-38451](https://nvd.nist.gov/vuln/detail/CVE-2025-38451), [CVE-2025-38450](https://nvd.nist.gov/vuln/detail/CVE-2025-38450), [CVE-2025-38449](https://nvd.nist.gov/vuln/detail/CVE-2025-38449), [CVE-2025-38448](https://nvd.nist.gov/vuln/detail/CVE-2025-38448), [CVE-2025-38437](https://nvd.nist.gov/vuln/detail/CVE-2025-38437), [CVE-2025-38438](https://nvd.nist.gov/vuln/detail/CVE-2025-38438), [CVE-2025-38349](https://nvd.nist.gov/vuln/detail/CVE-2025-38349), [CVE-2024-57809](https://nvd.nist.gov/vuln/detail/CVE-2024-57809), [CVE-2024-57838](https://nvd.nist.gov/vuln/detail/CVE-2024-57838), [CVE-2024-56780](https://nvd.nist.gov/vuln/detail/CVE-2024-56780), [CVE-2024-56779](https://nvd.nist.gov/vuln/detail/CVE-2024-56779), [CVE-2024-56778](https://nvd.nist.gov/vuln/detail/CVE-2024-56778), [CVE-2024-56777](https://nvd.nist.gov/vuln/detail/CVE-2024-56777), [CVE-2024-56776](https://nvd.nist.gov/vuln/detail/CVE-2024-56776), [CVE-2024-56775](https://nvd.nist.gov/vuln/detail/CVE-2024-56775), [CVE-2024-56774](https://nvd.nist.gov/vuln/detail/CVE-2024-56774), [CVE-2024-56773](https://nvd.nist.gov/vuln/detail/CVE-2024-56773), [CVE-2024-56771](https://nvd.nist.gov/vuln/detail/CVE-2024-56771), [CVE-2024-56772](https://nvd.nist.gov/vuln/detail/CVE-2024-56772), [CVE-2024-56556](https://nvd.nist.gov/vuln/detail/CVE-2024-56556), [CVE-2024-56565](https://nvd.nist.gov/vuln/detail/CVE-2024-56565), [CVE-2024-56564](https://nvd.nist.gov/vuln/detail/CVE-2024-56564), [CVE-2024-56563](https://nvd.nist.gov/vuln/detail/CVE-2024-56563), [CVE-2024-56562](https://nvd.nist.gov/vuln/detail/CVE-2024-56562), [CVE-2024-56561](https://nvd.nist.gov/vuln/detail/CVE-2024-56561), [CVE-2024-56560](https://nvd.nist.gov/vuln/detail/CVE-2024-56560), [CVE-2024-56559](https://nvd.nist.gov/vuln/detail/CVE-2024-56559), [CVE-2024-56582](https://nvd.nist.gov/vuln/detail/CVE-2024-56582), [CVE-2024-56581](https://nvd.nist.gov/vuln/detail/CVE-2024-56581), [CVE-2024-56580](https://nvd.nist.gov/vuln/detail/CVE-2024-56580), [CVE-2024-56579](https://nvd.nist.gov/vuln/detail/CVE-2024-56579), [CVE-2024-56578](https://nvd.nist.gov/vuln/detail/CVE-2024-56578), [CVE-2024-56577](https://nvd.nist.gov/vuln/detail/CVE-2024-56577), [CVE-2024-56576](https://nvd.nist.gov/vuln/detail/CVE-2024-56576), [CVE-2024-56558](https://nvd.nist.gov/vuln/detail/CVE-2024-56558), [CVE-2024-56575](https://nvd.nist.gov/vuln/detail/CVE-2024-56575), [CVE-2024-56574](https://nvd.nist.gov/vuln/detail/CVE-2024-56574), [CVE-2024-56573](https://nvd.nist.gov/vuln/detail/CVE-2024-56573), [CVE-2024-56572](https://nvd.nist.gov/vuln/detail/CVE-2024-56572), [CVE-2024-56571](https://nvd.nist.gov/vuln/detail/CVE-2024-56571), [CVE-2024-56570](https://nvd.nist.gov/vuln/detail/CVE-2024-56570), [CVE-2024-56569](https://nvd.nist.gov/vuln/detail/CVE-2024-56569), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-56567](https://nvd.nist.gov/vuln/detail/CVE-2024-56567), [CVE-2024-56566](https://nvd.nist.gov/vuln/detail/CVE-2024-56566), [CVE-2024-56557](https://nvd.nist.gov/vuln/detail/CVE-2024-56557), [CVE-2024-56555](https://nvd.nist.gov/vuln/detail/CVE-2024-56555), [CVE-2024-56554](https://nvd.nist.gov/vuln/detail/CVE-2024-56554), [CVE-2024-56553](https://nvd.nist.gov/vuln/detail/CVE-2024-56553), [CVE-2024-56550](https://nvd.nist.gov/vuln/detail/CVE-2024-56550), [CVE-2024-56552](https://nvd.nist.gov/vuln/detail/CVE-2024-56552), [CVE-2024-56551](https://nvd.nist.gov/vuln/detail/CVE-2024-56551), [CVE-2025-38552](https://nvd.nist.gov/vuln/detail/CVE-2025-38552), [CVE-2025-38551](https://nvd.nist.gov/vuln/detail/CVE-2025-38551), [CVE-2025-38550](https://nvd.nist.gov/vuln/detail/CVE-2025-38550), [CVE-2025-38549](https://nvd.nist.gov/vuln/detail/CVE-2025-38549), [CVE-2025-38547](https://nvd.nist.gov/vuln/detail/CVE-2025-38547), [CVE-2025-38548](https://nvd.nist.gov/vuln/detail/CVE-2025-38548), [CVE-2025-38531](https://nvd.nist.gov/vuln/detail/CVE-2025-38531), [CVE-2025-38530](https://nvd.nist.gov/vuln/detail/CVE-2025-38530), [CVE-2025-38529](https://nvd.nist.gov/vuln/detail/CVE-2025-38529), [CVE-2025-38528](https://nvd.nist.gov/vuln/detail/CVE-2025-38528), [CVE-2025-38527](https://nvd.nist.gov/vuln/detail/CVE-2025-38527), [CVE-2025-38526](https://nvd.nist.gov/vuln/detail/CVE-2025-38526), [CVE-2025-38524](https://nvd.nist.gov/vuln/detail/CVE-2025-38524), [CVE-2025-38539](https://nvd.nist.gov/vuln/detail/CVE-2025-38539), [CVE-2025-38538](https://nvd.nist.gov/vuln/detail/CVE-2025-38538), [CVE-2025-38537](https://nvd.nist.gov/vuln/detail/CVE-2025-38537), [CVE-2025-38535](https://nvd.nist.gov/vuln/detail/CVE-2025-38535), [CVE-2025-38533](https://nvd.nist.gov/vuln/detail/CVE-2025-38533), [CVE-2025-38532](https://nvd.nist.gov/vuln/detail/CVE-2025-38532), [CVE-2025-38499](https://nvd.nist.gov/vuln/detail/CVE-2025-38499), [CVE-2025-38478](https://nvd.nist.gov/vuln/detail/CVE-2025-38478), [CVE-2025-38477](https://nvd.nist.gov/vuln/detail/CVE-2025-38477), [CVE-2025-38476](https://nvd.nist.gov/vuln/detail/CVE-2025-38476), [CVE-2025-38475](https://nvd.nist.gov/vuln/detail/CVE-2025-38475), [CVE-2025-38474](https://nvd.nist.gov/vuln/detail/CVE-2025-38474), [CVE-2025-38473](https://nvd.nist.gov/vuln/detail/CVE-2025-38473), [CVE-2025-38472](https://nvd.nist.gov/vuln/detail/CVE-2025-38472), [CVE-2025-38497](https://nvd.nist.gov/vuln/detail/CVE-2025-38497), [CVE-2025-38496](https://nvd.nist.gov/vuln/detail/CVE-2025-38496), [CVE-2025-38495](https://nvd.nist.gov/vuln/detail/CVE-2025-38495), [CVE-2025-38494](https://nvd.nist.gov/vuln/detail/CVE-2025-38494), [CVE-2025-38493](https://nvd.nist.gov/vuln/detail/CVE-2025-38493), [CVE-2025-38491](https://nvd.nist.gov/vuln/detail/CVE-2025-38491), [CVE-2025-38490](https://nvd.nist.gov/vuln/detail/CVE-2025-38490), [CVE-2025-38471](https://nvd.nist.gov/vuln/detail/CVE-2025-38471), [CVE-2025-38489](https://nvd.nist.gov/vuln/detail/CVE-2025-38489), [CVE-2025-38488](https://nvd.nist.gov/vuln/detail/CVE-2025-38488), [CVE-2025-38487](https://nvd.nist.gov/vuln/detail/CVE-2025-38487), [CVE-2025-38485](https://nvd.nist.gov/vuln/detail/CVE-2025-38485), [CVE-2025-38484](https://nvd.nist.gov/vuln/detail/CVE-2025-38484), [CVE-2025-38483](https://nvd.nist.gov/vuln/detail/CVE-2025-38483), [CVE-2025-38482](https://nvd.nist.gov/vuln/detail/CVE-2025-38482), [CVE-2025-38481](https://nvd.nist.gov/vuln/detail/CVE-2025-38481), [CVE-2025-38480](https://nvd.nist.gov/vuln/detail/CVE-2025-38480), [CVE-2025-38469](https://nvd.nist.gov/vuln/detail/CVE-2025-38469), [CVE-2025-38470](https://nvd.nist.gov/vuln/detail/CVE-2025-38470), [CVE-2025-38468](https://nvd.nist.gov/vuln/detail/CVE-2025-38468))\n\n\n#### Updates:\n\n- Linux ([6.12.40](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.40) (includes [6.12.39](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.39), [6.12.38](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.38), [6.12.37](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.37), [6.12.36](https://lwn.net/Articles/1028828/), [6.12.35](https://lwn.net/Articles/1027277), [6.12.33](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.33), [6.12.32](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.32))) \n- Linux Firmware ([20250613](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250613))\n- ca-certificates ([3.114](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html) (includes [3.113.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html),[3.113](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html)))\n\n_Changes since **Alpha 4372.0.1**_\n\n#### Security fixes:\n\n- Linux ([CVE-2025-38523](https://nvd.nist.gov/vuln/detail/CVE-2025-38523), [CVE-2025-38436](https://nvd.nist.gov/vuln/detail/CVE-2025-38436), [CVE-2025-38434](https://nvd.nist.gov/vuln/detail/CVE-2025-38434), [CVE-2025-38362](https://nvd.nist.gov/vuln/detail/CVE-2025-38362), [CVE-2025-38361](https://nvd.nist.gov/vuln/detail/CVE-2025-38361), [CVE-2025-38355](https://nvd.nist.gov/vuln/detail/CVE-2025-38355), [CVE-2025-38369](https://nvd.nist.gov/vuln/detail/CVE-2025-38369), [CVE-2025-38368](https://nvd.nist.gov/vuln/detail/CVE-2025-38368), [CVE-2025-38365](https://nvd.nist.gov/vuln/detail/CVE-2025-38365), [CVE-2025-38364](https://nvd.nist.gov/vuln/detail/CVE-2025-38364), [CVE-2025-38363](https://nvd.nist.gov/vuln/detail/CVE-2025-38363), [CVE-2025-38353](https://nvd.nist.gov/vuln/detail/CVE-2025-38353), [CVE-2025-38354](https://nvd.nist.gov/vuln/detail/CVE-2025-38354), [CVE-2025-38246](https://nvd.nist.gov/vuln/detail/CVE-2025-38246), [CVE-2025-38245](https://nvd.nist.gov/vuln/detail/CVE-2025-38245), [CVE-2025-38244](https://nvd.nist.gov/vuln/detail/CVE-2025-38244), [CVE-2025-38264](https://nvd.nist.gov/vuln/detail/CVE-2025-38264), [CVE-2025-38263](https://nvd.nist.gov/vuln/detail/CVE-2025-38263), [CVE-2025-38262](https://nvd.nist.gov/vuln/detail/CVE-2025-38262), [CVE-2025-38260](https://nvd.nist.gov/vuln/detail/CVE-2025-38260), [CVE-2025-38259](https://nvd.nist.gov/vuln/detail/CVE-2025-38259), [CVE-2025-38258](https://nvd.nist.gov/vuln/detail/CVE-2025-38258), [CVE-2025-38257](https://nvd.nist.gov/vuln/detail/CVE-2025-38257), [CVE-2025-38256](https://nvd.nist.gov/vuln/detail/CVE-2025-38256), [CVE-2025-38255](https://nvd.nist.gov/vuln/detail/CVE-2025-38255), [CVE-2025-38253](https://nvd.nist.gov/vuln/detail/CVE-2025-38253), [CVE-2025-38251](https://nvd.nist.gov/vuln/detail/CVE-2025-38251), [CVE-2025-38250](https://nvd.nist.gov/vuln/detail/CVE-2025-38250), [CVE-2025-38249](https://nvd.nist.gov/vuln/detail/CVE-2025-38249), [CVE-2025-38239](https://nvd.nist.gov/vuln/detail/CVE-2025-38239), [CVE-2025-38236](https://nvd.nist.gov/vuln/detail/CVE-2025-38236), [CVE-2025-38413](https://nvd.nist.gov/vuln/detail/CVE-2025-38413), [CVE-2025-38412](https://nvd.nist.gov/vuln/detail/CVE-2025-38412), [CVE-2025-38410](https://nvd.nist.gov/vuln/detail/CVE-2025-38410), [CVE-2025-38409](https://nvd.nist.gov/vuln/detail/CVE-2025-38409), [CVE-2025-38407](https://nvd.nist.gov/vuln/detail/CVE-2025-38407), [CVE-2025-38408](https://nvd.nist.gov/vuln/detail/CVE-2025-38408), [CVE-2025-38406](https://nvd.nist.gov/vuln/detail/CVE-2025-38406), [CVE-2025-38405](https://nvd.nist.gov/vuln/detail/CVE-2025-38405), [CVE-2025-38404](https://nvd.nist.gov/vuln/detail/CVE-2025-38404), [CVE-2025-38403](https://nvd.nist.gov/vuln/detail/CVE-2025-38403), [CVE-2025-38401](https://nvd.nist.gov/vuln/detail/CVE-2025-38401), [CVE-2025-38402](https://nvd.nist.gov/vuln/detail/CVE-2025-38402), [CVE-2025-38379](https://nvd.nist.gov/vuln/detail/CVE-2025-38379), [CVE-2025-38377](https://nvd.nist.gov/vuln/detail/CVE-2025-38377), [CVE-2025-38376](https://nvd.nist.gov/vuln/detail/CVE-2025-38376), [CVE-2025-38375](https://nvd.nist.gov/vuln/detail/CVE-2025-38375), [CVE-2025-38374](https://nvd.nist.gov/vuln/detail/CVE-2025-38374), [CVE-2025-38400](https://nvd.nist.gov/vuln/detail/CVE-2025-38400), [CVE-2025-38373](https://nvd.nist.gov/vuln/detail/CVE-2025-38373), [CVE-2025-38399](https://nvd.nist.gov/vuln/detail/CVE-2025-38399), [CVE-2025-38396](https://nvd.nist.gov/vuln/detail/CVE-2025-38396), [CVE-2025-38395](https://nvd.nist.gov/vuln/detail/CVE-2025-38395), [CVE-2025-38393](https://nvd.nist.gov/vuln/detail/CVE-2025-38393), [CVE-2025-38392](https://nvd.nist.gov/vuln/detail/CVE-2025-38392), [CVE-2025-38391](https://nvd.nist.gov/vuln/detail/CVE-2025-38391), [CVE-2025-38390](https://nvd.nist.gov/vuln/detail/CVE-2025-38390), [CVE-2025-38372](https://nvd.nist.gov/vuln/detail/CVE-2025-38372), [CVE-2025-38389](https://nvd.nist.gov/vuln/detail/CVE-2025-38389), [CVE-2025-38388](https://nvd.nist.gov/vuln/detail/CVE-2025-38388), [CVE-2025-38387](https://nvd.nist.gov/vuln/detail/CVE-2025-38387), [CVE-2025-38386](https://nvd.nist.gov/vuln/detail/CVE-2025-38386), [CVE-2025-38385](https://nvd.nist.gov/vuln/detail/CVE-2025-38385), [CVE-2025-38384](https://nvd.nist.gov/vuln/detail/CVE-2025-38384), [CVE-2025-38383](https://nvd.nist.gov/vuln/detail/CVE-2025-38383), [CVE-2025-38382](https://nvd.nist.gov/vuln/detail/CVE-2025-38382), [CVE-2025-38381](https://nvd.nist.gov/vuln/detail/CVE-2025-38381), [CVE-2025-38380](https://nvd.nist.gov/vuln/detail/CVE-2025-38380), [CVE-2025-38371](https://nvd.nist.gov/vuln/detail/CVE-2025-38371), [CVE-2025-38360](https://nvd.nist.gov/vuln/detail/CVE-2025-38360), [CVE-2025-38356](https://nvd.nist.gov/vuln/detail/CVE-2025-38356), [CVE-2025-38350](https://nvd.nist.gov/vuln/detail/CVE-2025-38350), [CVE-2025-38546](https://nvd.nist.gov/vuln/detail/CVE-2025-38546), [CVE-2025-38545](https://nvd.nist.gov/vuln/detail/CVE-2025-38545), [CVE-2025-38544](https://nvd.nist.gov/vuln/detail/CVE-2025-38544), [CVE-2025-38543](https://nvd.nist.gov/vuln/detail/CVE-2025-38543), [CVE-2025-38542](https://nvd.nist.gov/vuln/detail/CVE-2025-38542), [CVE-2025-38540](https://nvd.nist.gov/vuln/detail/CVE-2025-38540), [CVE-2025-38541](https://nvd.nist.gov/vuln/detail/CVE-2025-38541), [CVE-2025-38520](https://nvd.nist.gov/vuln/detail/CVE-2025-38520), [CVE-2025-38521](https://nvd.nist.gov/vuln/detail/CVE-2025-38521), [CVE-2025-38512](https://nvd.nist.gov/vuln/detail/CVE-2025-38512), [CVE-2025-38511](https://nvd.nist.gov/vuln/detail/CVE-2025-38511), [CVE-2025-38510](https://nvd.nist.gov/vuln/detail/CVE-2025-38510), [CVE-2025-38507](https://nvd.nist.gov/vuln/detail/CVE-2025-38507), [CVE-2025-38506](https://nvd.nist.gov/vuln/detail/CVE-2025-38506), [CVE-2025-38517](https://nvd.nist.gov/vuln/detail/CVE-2025-38517), [CVE-2025-38516](https://nvd.nist.gov/vuln/detail/CVE-2025-38516), [CVE-2025-38515](https://nvd.nist.gov/vuln/detail/CVE-2025-38515), [CVE-2025-38514](https://nvd.nist.gov/vuln/detail/CVE-2025-38514), [CVE-2025-38513](https://nvd.nist.gov/vuln/detail/CVE-2025-38513), [CVE-2025-38503](https://nvd.nist.gov/vuln/detail/CVE-2025-38503), [CVE-2025-38505](https://nvd.nist.gov/vuln/detail/CVE-2025-38505), [CVE-2025-38460](https://nvd.nist.gov/vuln/detail/CVE-2025-38460), [CVE-2025-38467](https://nvd.nist.gov/vuln/detail/CVE-2025-38467), [CVE-2025-38466](https://nvd.nist.gov/vuln/detail/CVE-2025-38466), [CVE-2025-38465](https://nvd.nist.gov/vuln/detail/CVE-2025-38465), [CVE-2025-38464](https://nvd.nist.gov/vuln/detail/CVE-2025-38464), [CVE-2025-38463](https://nvd.nist.gov/vuln/detail/CVE-2025-38463), [CVE-2025-38462](https://nvd.nist.gov/vuln/detail/CVE-2025-38462), [CVE-2025-38461](https://nvd.nist.gov/vuln/detail/CVE-2025-38461), [CVE-2025-38446](https://nvd.nist.gov/vuln/detail/CVE-2025-38446), [CVE-2025-38445](https://nvd.nist.gov/vuln/detail/CVE-2025-38445), [CVE-2025-38444](https://nvd.nist.gov/vuln/detail/CVE-2025-38444), [CVE-2025-38443](https://nvd.nist.gov/vuln/detail/CVE-2025-38443), [CVE-2025-38441](https://nvd.nist.gov/vuln/detail/CVE-2025-38441), [CVE-2025-38440](https://nvd.nist.gov/vuln/detail/CVE-2025-38440), [CVE-2025-38459](https://nvd.nist.gov/vuln/detail/CVE-2025-38459), [CVE-2025-38458](https://nvd.nist.gov/vuln/detail/CVE-2025-38458), [CVE-2025-38457](https://nvd.nist.gov/vuln/detail/CVE-2025-38457), [CVE-2025-38439](https://nvd.nist.gov/vuln/detail/CVE-2025-38439), [CVE-2025-38456](https://nvd.nist.gov/vuln/detail/CVE-2025-38456), [CVE-2025-38455](https://nvd.nist.gov/vuln/detail/CVE-2025-38455), [CVE-2025-38454](https://nvd.nist.gov/vuln/detail/CVE-2025-38454), [CVE-2025-38452](https://nvd.nist.gov/vuln/detail/CVE-2025-38452), [CVE-2025-38451](https://nvd.nist.gov/vuln/detail/CVE-2025-38451), [CVE-2025-38450](https://nvd.nist.gov/vuln/detail/CVE-2025-38450), [CVE-2025-38449](https://nvd.nist.gov/vuln/detail/CVE-2025-38449), [CVE-2025-38448](https://nvd.nist.gov/vuln/detail/CVE-2025-38448), [CVE-2025-38437](https://nvd.nist.gov/vuln/detail/CVE-2025-38437), [CVE-2025-38438](https://nvd.nist.gov/vuln/detail/CVE-2025-38438), [CVE-2025-38349](https://nvd.nist.gov/vuln/detail/CVE-2025-38349), [CVE-2024-57809](https://nvd.nist.gov/vuln/detail/CVE-2024-57809), [CVE-2024-57838](https://nvd.nist.gov/vuln/detail/CVE-2024-57838), [CVE-2024-56780](https://nvd.nist.gov/vuln/detail/CVE-2024-56780), [CVE-2024-56779](https://nvd.nist.gov/vuln/detail/CVE-2024-56779), [CVE-2024-56778](https://nvd.nist.gov/vuln/detail/CVE-2024-56778), [CVE-2024-56777](https://nvd.nist.gov/vuln/detail/CVE-2024-56777), [CVE-2024-56776](https://nvd.nist.gov/vuln/detail/CVE-2024-56776), [CVE-2024-56775](https://nvd.nist.gov/vuln/detail/CVE-2024-56775), [CVE-2024-56774](https://nvd.nist.gov/vuln/detail/CVE-2024-56774), [CVE-2024-56773](https://nvd.nist.gov/vuln/detail/CVE-2024-56773), [CVE-2024-56771](https://nvd.nist.gov/vuln/detail/CVE-2024-56771), [CVE-2024-56772](https://nvd.nist.gov/vuln/detail/CVE-2024-56772), [CVE-2024-56556](https://nvd.nist.gov/vuln/detail/CVE-2024-56556), [CVE-2024-56565](https://nvd.nist.gov/vuln/detail/CVE-2024-56565), [CVE-2024-56564](https://nvd.nist.gov/vuln/detail/CVE-2024-56564), [CVE-2024-56563](https://nvd.nist.gov/vuln/detail/CVE-2024-56563), [CVE-2024-56562](https://nvd.nist.gov/vuln/detail/CVE-2024-56562), [CVE-2024-56561](https://nvd.nist.gov/vuln/detail/CVE-2024-56561), [CVE-2024-56560](https://nvd.nist.gov/vuln/detail/CVE-2024-56560), [CVE-2024-56559](https://nvd.nist.gov/vuln/detail/CVE-2024-56559), [CVE-2024-56582](https://nvd.nist.gov/vuln/detail/CVE-2024-56582), [CVE-2024-56581](https://nvd.nist.gov/vuln/detail/CVE-2024-56581), [CVE-2024-56580](https://nvd.nist.gov/vuln/detail/CVE-2024-56580), [CVE-2024-56579](https://nvd.nist.gov/vuln/detail/CVE-2024-56579), [CVE-2024-56578](https://nvd.nist.gov/vuln/detail/CVE-2024-56578), [CVE-2024-56577](https://nvd.nist.gov/vuln/detail/CVE-2024-56577), [CVE-2024-56576](https://nvd.nist.gov/vuln/detail/CVE-2024-56576), [CVE-2024-56558](https://nvd.nist.gov/vuln/detail/CVE-2024-56558), [CVE-2024-56575](https://nvd.nist.gov/vuln/detail/CVE-2024-56575), [CVE-2024-56574](https://nvd.nist.gov/vuln/detail/CVE-2024-56574), [CVE-2024-56573](https://nvd.nist.gov/vuln/detail/CVE-2024-56573), [CVE-2024-56572](https://nvd.nist.gov/vuln/detail/CVE-2024-56572), [CVE-2024-56571](https://nvd.nist.gov/vuln/detail/CVE-2024-56571), [CVE-2024-56570](https://nvd.nist.gov/vuln/detail/CVE-2024-56570), [CVE-2024-56569](https://nvd.nist.gov/vuln/detail/CVE-2024-56569), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-56567](https://nvd.nist.gov/vuln/detail/CVE-2024-56567), [CVE-2024-56566](https://nvd.nist.gov/vuln/detail/CVE-2024-56566), [CVE-2024-56557](https://nvd.nist.gov/vuln/detail/CVE-2024-56557), [CVE-2024-56555](https://nvd.nist.gov/vuln/detail/CVE-2024-56555), [CVE-2024-56554](https://nvd.nist.gov/vuln/detail/CVE-2024-56554), [CVE-2024-56553](https://nvd.nist.gov/vuln/detail/CVE-2024-56553), [CVE-2024-56550](https://nvd.nist.gov/vuln/detail/CVE-2024-56550), [CVE-2024-56552](https://nvd.nist.gov/vuln/detail/CVE-2024-56552), [CVE-2024-56551](https://nvd.nist.gov/vuln/detail/CVE-2024-56551), [CVE-2025-38552](https://nvd.nist.gov/vuln/detail/CVE-2025-38552), [CVE-2025-38551](https://nvd.nist.gov/vuln/detail/CVE-2025-38551), [CVE-2025-38550](https://nvd.nist.gov/vuln/detail/CVE-2025-38550), [CVE-2025-38549](https://nvd.nist.gov/vuln/detail/CVE-2025-38549), [CVE-2025-38547](https://nvd.nist.gov/vuln/detail/CVE-2025-38547), [CVE-2025-38548](https://nvd.nist.gov/vuln/detail/CVE-2025-38548), [CVE-2025-38531](https://nvd.nist.gov/vuln/detail/CVE-2025-38531), [CVE-2025-38530](https://nvd.nist.gov/vuln/detail/CVE-2025-38530), [CVE-2025-38529](https://nvd.nist.gov/vuln/detail/CVE-2025-38529), [CVE-2025-38528](https://nvd.nist.gov/vuln/detail/CVE-2025-38528), [CVE-2025-38527](https://nvd.nist.gov/vuln/detail/CVE-2025-38527), [CVE-2025-38526](https://nvd.nist.gov/vuln/detail/CVE-2025-38526), [CVE-2025-38524](https://nvd.nist.gov/vuln/detail/CVE-2025-38524), [CVE-2025-38539](https://nvd.nist.gov/vuln/detail/CVE-2025-38539), [CVE-2025-38538](https://nvd.nist.gov/vuln/detail/CVE-2025-38538), [CVE-2025-38537](https://nvd.nist.gov/vuln/detail/CVE-2025-38537), [CVE-2025-38535](https://nvd.nist.gov/vuln/detail/CVE-2025-38535), [CVE-2025-38533](https://nvd.nist.gov/vuln/detail/CVE-2025-38533), [CVE-2025-38532](https://nvd.nist.gov/vuln/detail/CVE-2025-38532), [CVE-2025-38499](https://nvd.nist.gov/vuln/detail/CVE-2025-38499), [CVE-2025-38478](https://nvd.nist.gov/vuln/detail/CVE-2025-38478), [CVE-2025-38477](https://nvd.nist.gov/vuln/detail/CVE-2025-38477), [CVE-2025-38476](https://nvd.nist.gov/vuln/detail/CVE-2025-38476), [CVE-2025-38475](https://nvd.nist.gov/vuln/detail/CVE-2025-38475), [CVE-2025-38474](https://nvd.nist.gov/vuln/detail/CVE-2025-38474), [CVE-2025-38473](https://nvd.nist.gov/vuln/detail/CVE-2025-38473), [CVE-2025-38472](https://nvd.nist.gov/vuln/detail/CVE-2025-38472), [CVE-2025-38497](https://nvd.nist.gov/vuln/detail/CVE-2025-38497), [CVE-2025-38496](https://nvd.nist.gov/vuln/detail/CVE-2025-38496), [CVE-2025-38495](https://nvd.nist.gov/vuln/detail/CVE-2025-38495), [CVE-2025-38494](https://nvd.nist.gov/vuln/detail/CVE-2025-38494), [CVE-2025-38493](https://nvd.nist.gov/vuln/detail/CVE-2025-38493), [CVE-2025-38491](https://nvd.nist.gov/vuln/detail/CVE-2025-38491), [CVE-2025-38490](https://nvd.nist.gov/vuln/detail/CVE-2025-38490), [CVE-2025-38471](https://nvd.nist.gov/vuln/detail/CVE-2025-38471), [CVE-2025-38489](https://nvd.nist.gov/vuln/detail/CVE-2025-38489), [CVE-2025-38488](https://nvd.nist.gov/vuln/detail/CVE-2025-38488), [CVE-2025-38487](https://nvd.nist.gov/vuln/detail/CVE-2025-38487), [CVE-2025-38485](https://nvd.nist.gov/vuln/detail/CVE-2025-38485), [CVE-2025-38484](https://nvd.nist.gov/vuln/detail/CVE-2025-38484), [CVE-2025-38483](https://nvd.nist.gov/vuln/detail/CVE-2025-38483), [CVE-2025-38482](https://nvd.nist.gov/vuln/detail/CVE-2025-38482), [CVE-2025-38481](https://nvd.nist.gov/vuln/detail/CVE-2025-38481), [CVE-2025-38480](https://nvd.nist.gov/vuln/detail/CVE-2025-38480), [CVE-2025-38469](https://nvd.nist.gov/vuln/detail/CVE-2025-38469), [CVE-2025-38470](https://nvd.nist.gov/vuln/detail/CVE-2025-38470), [CVE-2025-38468](https://nvd.nist.gov/vuln/detail/CVE-2025-38468))\n\n\n#### Updates:\n\n- Linux ([6.12.40](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.40) (includes [6.12.39](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.39), [6.12.38](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.38), [6.12.37](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.37), [6.12.36](https://lwn.net/Articles/1028828/)))\n- ca-certificates ([3.114](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html) (includes [3.113.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html)))"
  },
  "4426.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-09-15 14:01:56 +0000",
    "major_software": {
      "containerd": [
        "2.0.5"
      ],
      "docker": [
        "28.0.4"
      ],
      "ignition": [
        "2.21.0"
      ],
      "kernel": [
        "6.12.47"
      ],
      "systemd": [
        "256"
      ]
    },
    "release_notes": "_Changes since **Beta 4372.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2025-39725](https://nvd.nist.gov/vuln/detail/CVE-2025-39725), [CVE-2025-39726](https://nvd.nist.gov/vuln/detail/CVE-2025-39726), [CVE-2025-38675](https://nvd.nist.gov/vuln/detail/CVE-2025-38675), [CVE-2025-38670](https://nvd.nist.gov/vuln/detail/CVE-2025-38670), [CVE-2025-38668](https://nvd.nist.gov/vuln/detail/CVE-2025-38668), [CVE-2025-38666](https://nvd.nist.gov/vuln/detail/CVE-2025-38666), [CVE-2025-38665](https://nvd.nist.gov/vuln/detail/CVE-2025-38665), [CVE-2025-38664](https://nvd.nist.gov/vuln/detail/CVE-2025-38664), [CVE-2025-38663](https://nvd.nist.gov/vuln/detail/CVE-2025-38663), [CVE-2025-38671](https://nvd.nist.gov/vuln/detail/CVE-2025-38671), [CVE-2025-38662](https://nvd.nist.gov/vuln/detail/CVE-2025-38662), [CVE-2025-38500](https://nvd.nist.gov/vuln/detail/CVE-2025-38500), [CVE-2025-39734](https://nvd.nist.gov/vuln/detail/CVE-2025-39734), [CVE-2025-39732](https://nvd.nist.gov/vuln/detail/CVE-2025-39732), [CVE-2025-39731](https://nvd.nist.gov/vuln/detail/CVE-2025-39731), [CVE-2025-39730](https://nvd.nist.gov/vuln/detail/CVE-2025-39730), [CVE-2025-39727](https://nvd.nist.gov/vuln/detail/CVE-2025-39727), [CVE-2025-38650](https://nvd.nist.gov/vuln/detail/CVE-2025-38650), [CVE-2025-38648](https://nvd.nist.gov/vuln/detail/CVE-2025-38648), [CVE-2025-38646](https://nvd.nist.gov/vuln/detail/CVE-2025-38646), [CVE-2025-38645](https://nvd.nist.gov/vuln/detail/CVE-2025-38645), [CVE-2025-38644](https://nvd.nist.gov/vuln/detail/CVE-2025-38644), [CVE-2025-38660](https://nvd.nist.gov/vuln/detail/CVE-2025-38660), [CVE-2025-38659](https://nvd.nist.gov/vuln/detail/CVE-2025-38659), [CVE-2025-38653](https://nvd.nist.gov/vuln/detail/CVE-2025-38653), [CVE-2025-38652](https://nvd.nist.gov/vuln/detail/CVE-2025-38652), [CVE-2025-38628](https://nvd.nist.gov/vuln/detail/CVE-2025-38628), [CVE-2025-38626](https://nvd.nist.gov/vuln/detail/CVE-2025-38626), [CVE-2025-38625](https://nvd.nist.gov/vuln/detail/CVE-2025-38625), [CVE-2025-38624](https://nvd.nist.gov/vuln/detail/CVE-2025-38624), [CVE-2025-38623](https://nvd.nist.gov/vuln/detail/CVE-2025-38623), [CVE-2025-38622](https://nvd.nist.gov/vuln/detail/CVE-2025-38622), [CVE-2025-38640](https://nvd.nist.gov/vuln/detail/CVE-2025-38640), [CVE-2025-38639](https://nvd.nist.gov/vuln/detail/CVE-2025-38639), [CVE-2025-38635](https://nvd.nist.gov/vuln/detail/CVE-2025-38635), [CVE-2025-38634](https://nvd.nist.gov/vuln/detail/CVE-2025-38634), [CVE-2025-38632](https://nvd.nist.gov/vuln/detail/CVE-2025-38632), [CVE-2025-38631](https://nvd.nist.gov/vuln/detail/CVE-2025-38631), [CVE-2025-38630](https://nvd.nist.gov/vuln/detail/CVE-2025-38630), [CVE-2025-38619](https://nvd.nist.gov/vuln/detail/CVE-2025-38619), [CVE-2025-38618](https://nvd.nist.gov/vuln/detail/CVE-2025-38618), [CVE-2025-38617](https://nvd.nist.gov/vuln/detail/CVE-2025-38617), [CVE-2025-38611](https://nvd.nist.gov/vuln/detail/CVE-2025-38611), [CVE-2025-38615](https://nvd.nist.gov/vuln/detail/CVE-2025-38615), [CVE-2025-38612](https://nvd.nist.gov/vuln/detail/CVE-2025-38612), [CVE-2025-38577](https://nvd.nist.gov/vuln/detail/CVE-2025-38577), [CVE-2025-38586](https://nvd.nist.gov/vuln/detail/CVE-2025-38586), [CVE-2025-38585](https://nvd.nist.gov/vuln/detail/CVE-2025-38585), [CVE-2025-38583](https://nvd.nist.gov/vuln/detail/CVE-2025-38583), [CVE-2025-38582](https://nvd.nist.gov/vuln/detail/CVE-2025-38582), [CVE-2025-38581](https://nvd.nist.gov/vuln/detail/CVE-2025-38581), [CVE-2025-38610](https://nvd.nist.gov/vuln/detail/CVE-2025-38610), [CVE-2025-38609](https://nvd.nist.gov/vuln/detail/CVE-2025-38609), [CVE-2025-38608](https://nvd.nist.gov/vuln/detail/CVE-2025-38608), [CVE-2025-38604](https://nvd.nist.gov/vuln/detail/CVE-2025-38604), [CVE-2025-38602](https://nvd.nist.gov/vuln/detail/CVE-2025-38602), [CVE-2025-38601](https://nvd.nist.gov/vuln/detail/CVE-2025-38601), [CVE-2025-38579](https://nvd.nist.gov/vuln/detail/CVE-2025-38579), [CVE-2025-38595](https://nvd.nist.gov/vuln/detail/CVE-2025-38595), [CVE-2025-38593](https://nvd.nist.gov/vuln/detail/CVE-2025-38593), [CVE-2025-38590](https://nvd.nist.gov/vuln/detail/CVE-2025-38590), [CVE-2025-38588](https://nvd.nist.gov/vuln/detail/CVE-2025-38588), [CVE-2025-38587](https://nvd.nist.gov/vuln/detail/CVE-2025-38587), [CVE-2025-38578](https://nvd.nist.gov/vuln/detail/CVE-2025-38578), [CVE-2025-38563](https://nvd.nist.gov/vuln/detail/CVE-2025-38563), [CVE-2025-38562](https://nvd.nist.gov/vuln/detail/CVE-2025-38562), [CVE-2025-38561](https://nvd.nist.gov/vuln/detail/CVE-2025-38561), [CVE-2025-38560](https://nvd.nist.gov/vuln/detail/CVE-2025-38560), [CVE-2025-38559](https://nvd.nist.gov/vuln/detail/CVE-2025-38559), [CVE-2025-38557](https://nvd.nist.gov/vuln/detail/CVE-2025-38557), [CVE-2025-38576](https://nvd.nist.gov/vuln/detail/CVE-2025-38576), [CVE-2025-38574](https://nvd.nist.gov/vuln/detail/CVE-2025-38574), [CVE-2025-38573](https://nvd.nist.gov/vuln/detail/CVE-2025-38573), [CVE-2025-38572](https://nvd.nist.gov/vuln/detail/CVE-2025-38572), [CVE-2025-38571](https://nvd.nist.gov/vuln/detail/CVE-2025-38571), [CVE-2025-38569](https://nvd.nist.gov/vuln/detail/CVE-2025-38569), [CVE-2025-38568](https://nvd.nist.gov/vuln/detail/CVE-2025-38568), [CVE-2025-38566](https://nvd.nist.gov/vuln/detail/CVE-2025-38566), [CVE-2025-38565](https://nvd.nist.gov/vuln/detail/CVE-2025-38565), [CVE-2025-38555](https://nvd.nist.gov/vuln/detail/CVE-2025-38555), [CVE-2025-38553](https://nvd.nist.gov/vuln/detail/CVE-2025-38553), [CVE-2025-38501](https://nvd.nist.gov/vuln/detail/CVE-2025-38501), [CVE-2025-39798](https://nvd.nist.gov/vuln/detail/CVE-2025-39798), [CVE-2025-39797](https://nvd.nist.gov/vuln/detail/CVE-2025-39797), [CVE-2025-39795](https://nvd.nist.gov/vuln/detail/CVE-2025-39795), [CVE-2025-39794](https://nvd.nist.gov/vuln/detail/CVE-2025-39794), [CVE-2025-39792](https://nvd.nist.gov/vuln/detail/CVE-2025-39792), [CVE-2025-39750](https://nvd.nist.gov/vuln/detail/CVE-2025-39750), [CVE-2025-39760](https://nvd.nist.gov/vuln/detail/CVE-2025-39760), [CVE-2025-39758](https://nvd.nist.gov/vuln/detail/CVE-2025-39758), [CVE-2025-39757](https://nvd.nist.gov/vuln/detail/CVE-2025-39757), [CVE-2025-39756](https://nvd.nist.gov/vuln/detail/CVE-2025-39756), [CVE-2025-39754](https://nvd.nist.gov/vuln/detail/CVE-2025-39754), [CVE-2025-39753](https://nvd.nist.gov/vuln/detail/CVE-2025-39753), [CVE-2025-39752](https://nvd.nist.gov/vuln/detail/CVE-2025-39752), [CVE-2025-39763](https://nvd.nist.gov/vuln/detail/CVE-2025-39763), [CVE-2025-39761](https://nvd.nist.gov/vuln/detail/CVE-2025-39761), [CVE-2025-39751](https://nvd.nist.gov/vuln/detail/CVE-2025-39751), [CVE-2025-39744](https://nvd.nist.gov/vuln/detail/CVE-2025-39744), [CVE-2025-39743](https://nvd.nist.gov/vuln/detail/CVE-2025-39743), [CVE-2025-39742](https://nvd.nist.gov/vuln/detail/CVE-2025-39742), [CVE-2025-39739](https://nvd.nist.gov/vuln/detail/CVE-2025-39739), [CVE-2025-39738](https://nvd.nist.gov/vuln/detail/CVE-2025-39738), [CVE-2025-39749](https://nvd.nist.gov/vuln/detail/CVE-2025-39749), [CVE-2025-39748](https://nvd.nist.gov/vuln/detail/CVE-2025-39748), [CVE-2025-39747](https://nvd.nist.gov/vuln/detail/CVE-2025-39747), [CVE-2025-39746](https://nvd.nist.gov/vuln/detail/CVE-2025-39746), [CVE-2025-39736](https://nvd.nist.gov/vuln/detail/CVE-2025-39736), [CVE-2025-39737](https://nvd.nist.gov/vuln/detail/CVE-2025-39737), [CVE-2025-38727](https://nvd.nist.gov/vuln/detail/CVE-2025-38727), [CVE-2025-38729](https://nvd.nist.gov/vuln/detail/CVE-2025-38729), [CVE-2025-38728](https://nvd.nist.gov/vuln/detail/CVE-2025-38728), [CVE-2025-38694](https://nvd.nist.gov/vuln/detail/CVE-2025-38694), [CVE-2025-38703](https://nvd.nist.gov/vuln/detail/CVE-2025-38703), [CVE-2025-38702](https://nvd.nist.gov/vuln/detail/CVE-2025-38702), [CVE-2025-38701](https://nvd.nist.gov/vuln/detail/CVE-2025-38701), [CVE-2025-38700](https://nvd.nist.gov/vuln/detail/CVE-2025-38700), [CVE-2025-38699](https://nvd.nist.gov/vuln/detail/CVE-2025-38699), [CVE-2025-38698](https://nvd.nist.gov/vuln/detail/CVE-2025-38698), [CVE-2025-38726](https://nvd.nist.gov/vuln/detail/CVE-2025-38726), [CVE-2025-38725](https://nvd.nist.gov/vuln/detail/CVE-2025-38725), [CVE-2025-38724](https://nvd.nist.gov/vuln/detail/CVE-2025-38724), [CVE-2025-38697](https://nvd.nist.gov/vuln/detail/CVE-2025-38697), [CVE-2025-38723](https://nvd.nist.gov/vuln/detail/CVE-2025-38723), [CVE-2025-38722](https://nvd.nist.gov/vuln/detail/CVE-2025-38722), [CVE-2025-38721](https://nvd.nist.gov/vuln/detail/CVE-2025-38721), [CVE-2025-38718](https://nvd.nist.gov/vuln/detail/CVE-2025-38718), [CVE-2025-38717](https://nvd.nist.gov/vuln/detail/CVE-2025-38717), [CVE-2025-38716](https://nvd.nist.gov/vuln/detail/CVE-2025-38716), [CVE-2025-38715](https://nvd.nist.gov/vuln/detail/CVE-2025-38715), [CVE-2025-38714](https://nvd.nist.gov/vuln/detail/CVE-2025-38714), [CVE-2025-38696](https://nvd.nist.gov/vuln/detail/CVE-2025-38696), [CVE-2025-38713](https://nvd.nist.gov/vuln/detail/CVE-2025-38713), [CVE-2025-38712](https://nvd.nist.gov/vuln/detail/CVE-2025-38712), [CVE-2025-38711](https://nvd.nist.gov/vuln/detail/CVE-2025-38711), [CVE-2025-38710](https://nvd.nist.gov/vuln/detail/CVE-2025-38710), [CVE-2025-38709](https://nvd.nist.gov/vuln/detail/CVE-2025-38709), [CVE-2025-38708](https://nvd.nist.gov/vuln/detail/CVE-2025-38708), [CVE-2025-38707](https://nvd.nist.gov/vuln/detail/CVE-2025-38707), [CVE-2025-38706](https://nvd.nist.gov/vuln/detail/CVE-2025-38706), [CVE-2025-38705](https://nvd.nist.gov/vuln/detail/CVE-2025-38705), [CVE-2025-38704](https://nvd.nist.gov/vuln/detail/CVE-2025-38704), [CVE-2025-38695](https://nvd.nist.gov/vuln/detail/CVE-2025-38695), [CVE-2025-38688](https://nvd.nist.gov/vuln/detail/CVE-2025-38688), [CVE-2025-38687](https://nvd.nist.gov/vuln/detail/CVE-2025-38687), [CVE-2025-38686](https://nvd.nist.gov/vuln/detail/CVE-2025-38686), [CVE-2025-38685](https://nvd.nist.gov/vuln/detail/CVE-2025-38685), [CVE-2025-38684](https://nvd.nist.gov/vuln/detail/CVE-2025-38684), [CVE-2025-38683](https://nvd.nist.gov/vuln/detail/CVE-2025-38683), [CVE-2025-38681](https://nvd.nist.gov/vuln/detail/CVE-2025-38681), [CVE-2025-38693](https://nvd.nist.gov/vuln/detail/CVE-2025-38693), [CVE-2025-38692](https://nvd.nist.gov/vuln/detail/CVE-2025-38692), [CVE-2025-38691](https://nvd.nist.gov/vuln/detail/CVE-2025-38691), [CVE-2025-38679](https://nvd.nist.gov/vuln/detail/CVE-2025-38679), [CVE-2025-38680](https://nvd.nist.gov/vuln/detail/CVE-2025-38680), [CVE-2025-38616](https://nvd.nist.gov/vuln/detail/CVE-2025-38616), [CVE-2025-39773](https://nvd.nist.gov/vuln/detail/CVE-2025-39773), [CVE-2025-39772](https://nvd.nist.gov/vuln/detail/CVE-2025-39772), [CVE-2025-39770](https://nvd.nist.gov/vuln/detail/CVE-2025-39770), [CVE-2025-39791](https://nvd.nist.gov/vuln/detail/CVE-2025-39791), [CVE-2025-39790](https://nvd.nist.gov/vuln/detail/CVE-2025-39790), [CVE-2025-39788](https://nvd.nist.gov/vuln/detail/CVE-2025-39788), [CVE-2025-39787](https://nvd.nist.gov/vuln/detail/CVE-2025-39787), [CVE-2025-39767](https://nvd.nist.gov/vuln/detail/CVE-2025-39767), [CVE-2025-39783](https://nvd.nist.gov/vuln/detail/CVE-2025-39783), [CVE-2025-39782](https://nvd.nist.gov/vuln/detail/CVE-2025-39782), [CVE-2025-39781](https://nvd.nist.gov/vuln/detail/CVE-2025-39781), [CVE-2025-39780](https://nvd.nist.gov/vuln/detail/CVE-2025-39780), [CVE-2025-39779](https://nvd.nist.gov/vuln/detail/CVE-2025-39779), [CVE-2025-39776](https://nvd.nist.gov/vuln/detail/CVE-2025-39776), [CVE-2025-39765](https://nvd.nist.gov/vuln/detail/CVE-2025-39765), [CVE-2025-39766](https://nvd.nist.gov/vuln/detail/CVE-2025-39766), [CVE-2025-39759](https://nvd.nist.gov/vuln/detail/CVE-2025-39759), [CVE-2025-39711](https://nvd.nist.gov/vuln/detail/CVE-2025-39711), [CVE-2025-39720](https://nvd.nist.gov/vuln/detail/CVE-2025-39720), [CVE-2025-39719](https://nvd.nist.gov/vuln/detail/CVE-2025-39719), [CVE-2025-39718](https://nvd.nist.gov/vuln/detail/CVE-2025-39718), [CVE-2025-39716](https://nvd.nist.gov/vuln/detail/CVE-2025-39716), [CVE-2025-39715](https://nvd.nist.gov/vuln/detail/CVE-2025-39715), [CVE-2025-39714](https://nvd.nist.gov/vuln/detail/CVE-2025-39714), [CVE-2025-39713](https://nvd.nist.gov/vuln/detail/CVE-2025-39713), [CVE-2025-39724](https://nvd.nist.gov/vuln/detail/CVE-2025-39724), [CVE-2025-39723](https://nvd.nist.gov/vuln/detail/CVE-2025-39723), [CVE-2025-39722](https://nvd.nist.gov/vuln/detail/CVE-2025-39722), [CVE-2025-39721](https://nvd.nist.gov/vuln/detail/CVE-2025-39721), [CVE-2025-39712](https://nvd.nist.gov/vuln/detail/CVE-2025-39712), [CVE-2025-39675](https://nvd.nist.gov/vuln/detail/CVE-2025-39675), [CVE-2025-39673](https://nvd.nist.gov/vuln/detail/CVE-2025-39673), [CVE-2025-38737](https://nvd.nist.gov/vuln/detail/CVE-2025-38737), [CVE-2025-38736](https://nvd.nist.gov/vuln/detail/CVE-2025-38736), [CVE-2025-39710](https://nvd.nist.gov/vuln/detail/CVE-2025-39710), [CVE-2025-39709](https://nvd.nist.gov/vuln/detail/CVE-2025-39709), [CVE-2025-39707](https://nvd.nist.gov/vuln/detail/CVE-2025-39707), [CVE-2025-38735](https://nvd.nist.gov/vuln/detail/CVE-2025-38735), [CVE-2025-39706](https://nvd.nist.gov/vuln/detail/CVE-2025-39706), [CVE-2025-39705](https://nvd.nist.gov/vuln/detail/CVE-2025-39705), [CVE-2025-39703](https://nvd.nist.gov/vuln/detail/CVE-2025-39703), [CVE-2025-39702](https://nvd.nist.gov/vuln/detail/CVE-2025-39702), [CVE-2025-39701](https://nvd.nist.gov/vuln/detail/CVE-2025-39701), [CVE-2025-39700](https://nvd.nist.gov/vuln/detail/CVE-2025-39700), [CVE-2025-39698](https://nvd.nist.gov/vuln/detail/CVE-2025-39698), [CVE-2025-39697](https://nvd.nist.gov/vuln/detail/CVE-2025-39697), [CVE-2025-38734](https://nvd.nist.gov/vuln/detail/CVE-2025-38734), [CVE-2025-39695](https://nvd.nist.gov/vuln/detail/CVE-2025-39695), [CVE-2025-39694](https://nvd.nist.gov/vuln/detail/CVE-2025-39694), [CVE-2025-39693](https://nvd.nist.gov/vuln/detail/CVE-2025-39693), [CVE-2025-39692](https://nvd.nist.gov/vuln/detail/CVE-2025-39692), [CVE-2025-39691](https://nvd.nist.gov/vuln/detail/CVE-2025-39691), [CVE-2025-39689](https://nvd.nist.gov/vuln/detail/CVE-2025-39689), [CVE-2025-39687](https://nvd.nist.gov/vuln/detail/CVE-2025-39687), [CVE-2025-39686](https://nvd.nist.gov/vuln/detail/CVE-2025-39686), [CVE-2025-38733](https://nvd.nist.gov/vuln/detail/CVE-2025-38733), [CVE-2025-39685](https://nvd.nist.gov/vuln/detail/CVE-2025-39685), [CVE-2025-39684](https://nvd.nist.gov/vuln/detail/CVE-2025-39684), [CVE-2025-39683](https://nvd.nist.gov/vuln/detail/CVE-2025-39683), [CVE-2025-39682](https://nvd.nist.gov/vuln/detail/CVE-2025-39682), [CVE-2025-39681](https://nvd.nist.gov/vuln/detail/CVE-2025-39681), [CVE-2025-39679](https://nvd.nist.gov/vuln/detail/CVE-2025-39679), [CVE-2025-39676](https://nvd.nist.gov/vuln/detail/CVE-2025-39676), [CVE-2025-38732](https://nvd.nist.gov/vuln/detail/CVE-2025-38732), [CVE-2025-38730](https://nvd.nist.gov/vuln/detail/CVE-2025-38730), [CVE-2025-38677](https://nvd.nist.gov/vuln/detail/CVE-2025-38677), [CVE-2025-40300](https://nvd.nist.gov/vuln/detail/CVE-2025-40300))\n- bind ([CVE-2024-11187](https://www.cve.org/CVERecord?id=CVE-2024-11187), [CVE-2024-12705](https://www.cve.org/CVERecord?id=CVE-2024-12705))\n- containerd ([CVE-2025-47291](https://www.cve.org/CVERecord?id=CVE-2025-47291))\n- git ([CVE-2025-48384](https://www.cve.org/CVERecord?id=CVE-2025-48384), [CVE-2025-48385](https://www.cve.org/CVERecord?id=CVE-2025-48385), [CVE-2025-48386](https://www.cve.org/CVERecord?id=CVE-2025-48386))\n- glib ([CVE-2025-4373](https://www.cve.org/CVERecord?id=CVE-2025-4373))\n- go ([CVE-2025-4674](https://www.cve.org/CVERecord?id=CVE-2025-4674), [CVE-2025-22873](https://www.cve.org/CVERecord?id=CVE-2025-22873), [CVE-2025-4673](https://www.cve.org/CVERecord?id=CVE-2025-4673), [CVE-2025-0913](https://www.cve.org/CVERecord?id=CVE-2025-0913), [CVE-2025-22874](https://www.cve.org/CVERecord?id=CVE-2025-22874))\n- jq ([CVE-2024-23337](https://www.cve.org/CVERecord?id=CVE-2024-23337), [CVE-2024-53427](https://www.cve.org/CVERecord?id=CVE-2024-53427), [CVE-2025-48060](https://www.cve.org/CVERecord?id=CVE-2025-48060))\n- libxml2 ([CVE-2025-32414](https://www.cve.org/CVERecord?id=CVE-2025-32414), [CVE-2025-32415](https://www.cve.org/CVERecord?id=CVE-2025-32415), [CVE-2025-6021](https://www.cve.org/CVERecord?id=CVE-2025-6021), [CVE-2025-49794](https://www.cve.org/CVERecord?id=CVE-2025-49794), [CVE-2025-49795](https://www.cve.org/CVERecord?id=CVE-2025-49795), [CVE-2025-49796](https://www.cve.org/CVERecord?id=CVE-2025-49796))\n- nvidia-drivers-service ([CVE-2025-23244](https://www.cve.org/CVERecord?id=CVE-2025-23244))\n- podman ([CVE-2025-6032](https://www.cve.org/CVERecord?id=CVE-2025-6032))\n- python ([CVE-2025-4516](https://www.cve.org/CVERecord?id=CVE-2025-4516), [CVE-2024-12718](https://www.cve.org/CVERecord?id=CVE-2024-12718), [CVE-2025-4138](https://www.cve.org/CVERecord?id=CVE-2025-4138), [CVE-2025-4330](https://www.cve.org/CVERecord?id=CVE-2025-4330), [CVE-2025-4517](https://www.cve.org/CVERecord?id=CVE-2025-4517))\n- requests ([CVE-2024-47081](https://www.cve.org/CVERecord?id=CVE-2024-47081))\n- vim ([CVE-2025-1215](https://www.cve.org/CVERecord?id=CVE-2025-1215), [CVE-2025-22134](https://www.cve.org/CVERecord?id=CVE-2025-22134), [CVE-2025-24014](https://www.cve.org/CVERecord?id=CVE-2025-24014), [GHSA-63p5-mwg2-787v](https://github.com/vim/vim/security/advisories/GHSA-63p5-mwg2-787v), [CVE-2025-27423](https://www.cve.org/CVERecord?id=CVE-2025-27423), [CVE-2025-29768](https://www.cve.org/CVERecord?id=CVE-2025-29768))\n\n#### Bug fixes:\n\n- Enabled `CONFIG_CPUSETS_V1` to mitigate cgroupsv1 removal (e.g JVM) ([Flatcar#1884](https://github.com/flatcar/Flatcar/issues/1884))\n- Fixed a UID/GID mis-alignment for user/group `messagebus` between acct-user/acct-group and baselayout. ([baselayout#36](https://github.com/flatcar/baselayout/pull/36))\n- Reenabled console support for DRM drivers, so that with the virtio graphics driver the interactive console is shown again after boot ([Flatcar#1834](https://github.com/flatcar/Flatcar/issues/1834))\n- sysext-podman: removed `/etc/subuid` and `/etc/subgid` generation for `core` user, before this change it partially overwrites the file and causes issues. ([Flatcar#1733](https://github.com/flatcar/Flatcar/issues/1733)) This could be created through initial provisioning. ([scripts#3043](https://github.com/flatcar/scripts/pull/3043))\n\n#### Changes:\n\n- Added [overlaybd](https://containerd.github.io/overlaybd/) system extension to support accelerated container images.\nAdd `overlaybd` to [`/etc/flatcar/enabled-sysext.conf`](https://www.flatcar.org/docs/latest/provisioning/sysext/) to check it out.\nThe extension includes both [overlaybd](https://github.com/containerd/overlaybd/) as well as [accelerated-container-image](https://github.com/containerd/accelerated-container-image) tools.\n- Azure OEM: add inotify-tools, python urllib3 ([flatcar/scripts#3116](https://github.com/flatcar/scripts/pull/3116))\n\n\n#### Updates:\n\n- Linux ([6.12.47](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.47) (includes [6.12.46](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.46), [6.12.45](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.45), [6.12.44](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.44), [6.12.43](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.43), [6.12.42](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.42), [6.12.41](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.41), [6.12.35](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.35)))\n- Linux Firmware ([20250708](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250708) (includes [20250627](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250627)))\n- SDK: cmake ([3.31.7](https://cmake.org/cmake/help/v3.31/release/3.31.html#id1))\n- SDK: gdb ([16.3](https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00014.html))\n- SDK: gentoo-syntax ([16](https://github.com/gentoo/gentoo-syntax/releases/tag/v16))\n- SDK: go ([1.24.5](https://go.dev/doc/devel/release#go1.24.minor) includes [1.24.4](https://go.dev/doc/devel/release#go1.24.minor))\n- SDK: iperf ([3.19](https://github.com/esnet/iperf/releases/tag/3.19))\n- SDK: m4 ([1.4.20](https://lists.gnu.org/archive/html/m4-discuss/2025-05/msg00002.html))\n- SDK: maturin ([1.9.1](https://github.com/PyO3/maturin/blob/main/Changelog.md#191))\n- SDK: meson ([1.7.2](https://github.com/mesonbuild/meson/commits/1.7.2/))\n- SDK: mtools ([4.0.49](https://www.gnu.org/software/mtools/manual/mtools.html))\n- SDK: nano ([8.5](https://lists.gnu.org/archive/html/info-gnu/2025-06/msg00003.html))\n- SDK: pkgcheck ([0.10.36](https://github.com/pkgcore/pkgcheck/blob/v0.10.36/NEWS.rst))\n- SDK: python-cryptography ([45.0.4](https://cryptography.io/en/latest/changelog/#v45-0-5))\n- SDK: qemu ([9.2.3](https://wiki.qemu.org/ChangeLog/9.2))\n- SDK: rust ([1.87.0](https://releases.rs/docs/1.87.0/) (includes [1.86.0](https://releases.rs/docs/1.86.0/)))\n- azure, dev, gce, sysext-python: mpdecimal ([4.0.1](https://www.bytereef.org/mpdecimal/changelog.html#version-4-0-1xs))\n- azure, dev, gce, sysext-python: python ([3.11.13](https://www.python.org/downloads/release/python-31113/))\n- base, dev: bind ([9.18.37](https://bind9.readthedocs.io/en/v9.18.37/notes.html#notes-for-bind-9-18-37) (includes [9.18.36](https://bind9.readthedocs.io/en/v9.18.36/notes.html#notes-for-bind-9-18-36), [9.18.35](https://bind9.readthedocs.io/en/v9.18.35/notes.html#notes-for-bind-9-18-35), [9.18.34](https://bind9.readthedocs.io/en/v9.18.34/notes.html#notes-for-bind-9-18-34), [9.18.33](https://bind9.readthedocs.io/en/v9.18.33/notes.html#notes-for-bind-9-18-33), [9.18.32](https://bind9.readthedocs.io/en/v9.18.32/notes.html#notes-for-bind-9-18-32)))\n- base, dev: checkpolicy ([3.8.1](https://github.com/SELinuxProject/selinux/releases/tag/3.8.1) (includes [3.8](https://github.com/SELinuxProject/selinux/releases/tag/3.8)))\n- base, dev: elfutils ([0.193](https://inbox.sourceware.org/elfutils-devel/CAJDtP-RjuT13zehLgSvz9TnwQZ1VYPOS=q_kuut5a2g+KLamgw@mail.gmail.com/T/#u))\n- base, dev: gawk ([5.3.2](https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00003.html))\n- base, dev: gcc ([14.3.0](https://lists.gnu.org/archive/html/info-gnu/2025-05/msg00004.html))\n- base, dev: glib ([2.84.3](https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.3) (includes [2.84.2](https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.2), [2.84.1](https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.1), [2.84.0](https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.0), [2.83.5](https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.5), [2.83.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.4), [2.83.3](https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.3), [2.83.2](https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.2), [2.83.1](https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.1), [2.83.0](https://gitlab.gnome.org/GNOME/glib/-/releases/2.83.0)))\n- base, dev: glibc ([2.41](https://lists.gnu.org/archive/html/info-gnu/2025-01/msg00014.html))\n- base, dev: gnupg ([2.4.8](https://dev.gnupg.org/T7428))\n- base, dev: grep ([3.12](https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00008.html))\n- base, dev: gzip ([1.14](https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00007.html))\n- base, dev: inih ([60](https://github.com/benhoyt/inih/releases/tag/r60) (includes [59](https://github.com/benhoyt/inih/releases/tag/r59)))\n- base, dev: ipset ([7.24](https://lwn.net/Articles/1021623/))\n- base, dev: iputils ([20250605](https://github.com/iputils/iputils/releases/tag/20250605) (includes [20250602](https://github.com/iputils/iputils/releases/tag/20250602)))\n- base, dev: jansson ([2.14.1](https://jansson.readthedocs.io/en/latest/changes.html#version-2-14-1))\n- base, dev: jq ([1.8.1](https://github.com/jqlang/jq/releases/tag/jq-1.8.1) (includes [1.8.0](https://github.com/jqlang/jq/releases/tag/jq-1.8.0)))\n- base, dev: kexec-tools ([2.0.31](https://github.com/horms/kexec-tools/commits/v2.0.31/))\n- base, dev: libarchive ([3.8.1](https://github.com/libarchive/libarchive/releases/tag/v3.8.1) (includes [3.8.0](https://github.com/libarchive/libarchive/releases/tag/v3.8.0)))\n- base, dev: libcap ([2.76](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.wqnp1zp1o8bm) (includes [2.75](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.7xqcoecpcnn8), [2.74](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.ccbrq82zh7n9), [2.73](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.7yd7ab9ppagk), [2.72](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.ulglddlojmy0)))\n- base, dev: libffi ([3.5.1](https://github.com/libffi/libffi/releases/tag/v3.5.1) (includes [3.4.8](https://github.com/libffi/libffi/releases/tag/v3.4.8) (includes [3.4.7](https://github.com/libffi/libffi/releases/tag/v3.4.7))))\n- base, dev: libgcrypt ([1.11.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=84bc61a49f3a09302b3438cb529baf67576ad859;hb=81ce5321b1b79bde6dfdc3c164efb40c13cf656b))\n- base, dev: libgpg-error ([1.55](https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.55) (includes [1.53](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=66b2256de2f59c38b9cd35fb4a1b1971a6c9f3f1;hb=f9e98ed8315eaf0468870149d22c5dcf992288ec) (includes [1.52](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=4f6a114d81fb5b2f73bb65a1f1cc3c21fe64fa0c;hb=be471d158e4951f4b17335b0fc9ae2387a786b5b))))\n- base, dev: libnftnl ([1.2.9](https://lwn.net/Articles/1017463/))\n- base, dev: libselinux ([3.8.1](https://github.com/SELinuxProject/selinux/releases/tag/3.8.1) (includes [3.8](https://github.com/SELinuxProject/selinux/releases/tag/3.8)))\n- base, dev: libsepol ([3.8.1](https://github.com/SELinuxProject/selinux/releases/tag/3.8.1) (includes [3.8](https://github.com/SELinuxProject/selinux/releases/tag/3.8)))\n- base, dev: libunistring ([1.3](https://lists.gnu.org/archive/html/info-gnu/2024-10/msg00000.html))\n- base, dev: libunwind ([1.8.2](https://github.com/libunwind/libunwind/releases/tag/v1.8.2))\n- base, dev: liburing ([2.9](https://github.com/axboe/liburing/releases/tag/liburing-2.9) (includes [2.8](https://github.com/axboe/liburing/releases/tag/liburing-2.8)))\n- base, dev: libusb ([1.0.28](https://github.com/libusb/libusb/blob/v1.0.28/ChangeLog))\n- base, dev: libuv ([1.51.0](https://github.com/libuv/libuv/releases/tag/v1.51.0))\n- base, dev: libxml2 ([2.13.8](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.8))\n- base, dev: nvidia-drivers-service (amd64) ([535.247.01](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-247-01/index.html))\n- base, dev: nvidia-drivers-service (arm64) (570.153.02 (includes [570.148.08](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-148-08/index.html), [570.133.20](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-133-20/index.html), [570.124.06](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-124-06/index.html)))\n- base, dev: openssh ([10.0_p1](https://www.openssh.com/releasenotes.html#10.0p1))\n- base, dev: openssl ([3.4.1](https://github.com/openssl/openssl/releases/tag/openssl-3.4.1) (includes [3.4.0](https://github.com/openssl/openssl/blob/openssl-3.4.0/NEWS.md#openssl-34)))\n- base, dev: quota ([4.10](https://sourceforge.net/p/linuxquota/news/2025/04/quota-tools-410-released/))\n- base, dev: semodule-utils ([3.8.1](https://github.com/SELinuxProject/selinux/releases/tag/3.8.1) (includes [3.8](https://github.com/SELinuxProject/selinux/releases/tag/3.8)))\n- base, dev: sqlite ([3.50.2](https://sqlite.org/releaselog/3_50_2.html) (includes [3.49.2](https://sqlite.org/releaselog/3_49_2.html)))\n- base, dev: sssd ([2.9.7](https://sssd.io/release-notes/sssd-2.9.7.html))\n- base, dev: userspace-rcu ([0.15.3](https://lkml.org/lkml/2025/5/14/1580) (includes [0.15.2](https://lwn.net/Articles/1017443/)))\n- base, dev: vim ([9.1.1436](https://github.com/vim/vim/commits/v9.1.1436/))\n- base, dev: xz-utils ([5.8.1](https://github.com/tukaani-project/xz/releases/tag/v5.8.1) (includes [5.8.0](https://github.com/tukaani-project/xz/releases/tag/v5.8.0)))\n- btrfs-progs ([6.14](https://github.com/kdave/btrfs-progs/releases/tag/v6.14))\n- ca-certificates ([3.115.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115_1.html) (includes [3.113](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html)))\n- chrony ([4.7](https://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2025/06/msg00000.html))\n- curl ([8.14.1](https://curl.se/ch/8.14.1.html))\n- dbus-glib ([0.114](https://gitlab.freedesktop.org/dbus/dbus-glib/-/blob/master/NEWS?ref_type=heads#L8))\n- dev, sysext-incus: squashfs-tools ([4.7](https://lkml.org/lkml/2025/6/3/1214))\n- dev: file ([5.46](https://github.com/file/file/blob/FILE5_46/ChangeLog))\n- dev: gdb ([16.2](https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00000.html) (includes [16.1](https://lists.gnu.org/archive/html/info-gnu/2025-01/msg00009.html)))\n- dev: man-db ([2.13.1](https://gitlab.com/man-db/man-db/-/releases/2.13.1))\n- dev: pahole ([1.30](https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.30))\n- dev: portage ([3.0.68](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.68))\n- dev: sandbox ([2.46](https://gitweb.gentoo.org/proj/sandbox.git/log/?h=v2.46))\n- dev: smartmontools ([7.5](https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_5))\n- ethtool ([6.14](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=fba608c5a8ac943ebff046f387ade9dd364eb5a7))\n- fuse-overlayfs ([1.15](https://github.com/containers/fuse-overlayfs/releases/tag/v1.15))\n- git ([2.49.1](https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.49.1.adoc))\n- iproute2 ([6.15.0](https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=401816cc9c7cde7b666d4befb06a10d6359c9688))\n- kbd ([2.8.0](https://lore.kernel.org/kbd/aDmDTB_oRNU8UsWy@example.org/T/#u))\n- less ([679](https://greenwoodsoftware.com/less/news.679.html))\n- libnvme ([1.14](https://github.com/linux-nvme/libnvme/releases/tag/v1.14))\n- ncurses ([6.5_p20250329](https://invisible-island.net/ncurses/announce.html))\n- nftables ([1.1.3](https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.3.txt))\n- nvme-cli ([2.14](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.14))\n- procps ([4.0.5](https://gitlab.com/procps-ng/procps/-/blob/master/NEWS?ref_type=heads#L30))\n- samba ([4.20.8](https://www.samba.org/samba/history/samba-4.20.8.html))\n- strace ([6.15](https://github.com/strace/strace/releases/tag/v6.15))\n- sysext-containerd: containerd ([2.0.5](https://github.com/containerd/containerd/releases/tag/v2.0.5))\n- sysext-containerd: runc ([1.2.6](https://github.com/opencontainers/runc/releases/tag/v1.2.6))\n- sysext-docker: docker ([28.0.4](https://github.com/moby/moby/releases/tag/v28.0.4) (includes [28.0.3](https://github.com/moby/moby/releases/tag/v28.0.3), [28.0.2](https://github.com/moby/moby/releases/tag/v28.0.2)))\n- sysext-incus: cowsql ([1.15.8](https://github.com/cowsql/cowsql/commits/v1.15.8/))\n- sysext-incus: incus ([6.0.4](https://discuss.linuxcontainers.org/t/incus-6-0-4-lts-has-been-released/23391))\n- sysext-incus: lxc ([6.0.4](https://discuss.linuxcontainers.org/t/lxc-6-0-4-lts-has-been-released/23390))\n- sysext-incus: lxcfs ([6.0.4](https://discuss.linuxcontainers.org/t/lxcfs-6-0-4-lts-has-been-released/23389))\n- sysext-nvidia: nvidia-drivers ([570.169](https://www.nvidia.com/en-us/drivers/details/247720/) (includes 570.153.02))\n- sysext-podman: containers-common ([0.63.0](https://github.com/containers/common/releases/tag/v0.63.0))\n- sysext-podman: gpgme ([1.24.3](https://dev.gnupg.org/T7659))\n- sysext-podman: passt ([2025.04.15](https://archives.passt.top/passt-user/20250415233140.35074c4b@elisabeth/T/#u))\n- sysext-podman: podman ([5.5.2](https://github.com/containers/podman/releases/tag/v5.5.2))\n- sysext-python: cachecontrol ([0.14.3](https://github.com/psf/cachecontrol/releases/tag/v0.14.3) (includes [0.14.2](https://github.com/psf/cachecontrol/releases/tag/v0.14.2)))\n- sysext-python: charset-normalizer ([3.4.2](https://github.com/jawah/charset_normalizer/releases/tag/3.4.2))\n- sysext-python: ensurepip-pip ([25.1.1](https://pip.pypa.io/en/stable/news/#v25-1-1))\n- sysext-python: jaraco-collections ([5.2.1](https://github.com/jaraco/jaraco.collections/releases/tag/v5.2.1))\n- sysext-python: jaraco-functools ([4.2.1](https://github.com/jaraco/jaraco.functools/releases/tag/v4.2.1))\n- sysext-python: more-itertools ([10.7.0](https://github.com/more-itertools/more-itertools/blob/v10.7.0/docs/versions.rst))\n- sysext-python: msgpack ([1.1.1](https://github.com/msgpack/msgpack-python/releases/tag/v1.1.1))\n- sysext-python: packaging ([25.0](https://github.com/pypa/packaging/releases/tag/25.0))\n- sysext-python: pip ([25.1.1](https://github.com/pypa/pip/blob/25.1.1/NEWS.rst) (includes [25.1](https://github.com/pypa/pip/blob/25.1/NEWS.rst)))\n- sysext-python: platformdirs ([4.3.8](https://github.com/tox-dev/platformdirs/releases/tag/4.3.8))\n- sysext-python: pygments ([2.19.2](https://pygments.org/docs/changelog/#version-2-19-2))\n- sysext-python: requests ([2.32.4](https://github.com/psf/requests/releases/tag/v2.32.4) (includes [2.32.3](https://github.com/psf/requests/releases/tag/v2.32.3)))\n- sysext-python: setuptools ([80.9.0](https://github.com/pypa/setuptools/releases/tag/v80.9.0) (includes [80.8.0](https://github.com/pypa/setuptools/releases/tag/v80.8.0), [80.7.0](https://github.com/pypa/setuptools/releases/tag/v80.7.0), [80.6.0](https://github.com/pypa/setuptools/releases/tag/v80.6.0), [80.4.0](https://github.com/pypa/setuptools/releases/tag/v80.4.0), [80.3.0](https://github.com/pypa/setuptools/releases/tag/v80.3.0), [80.2.0](https://github.com/pypa/setuptools/releases/tag/v80.2.0), [80.1.0](https://github.com/pypa/setuptools/releases/tag/v80.1.0), [80.0.0](https://github.com/pypa/setuptools/releases/tag/v80.0.0), [79.0.0](https://github.com/pypa/setuptools/releases/tag/v79.0.0)))\n- sysext-python: setuptools-scm ([8.3.1](https://github.com/pypa/setuptools-scm/releases/tag/v8.3.1) (includes [8.3.0](https://github.com/pypa/setuptools-scm/releases/tag/v8.3.0)))\n- sysext-python: trove-classifiers ([2025.5.9.12](https://github.com/pypa/trove-classifiers/releases/tag/2025.5.9.12) (includes [2025.5.8.15](https://github.com/pypa/trove-classifiers/releases/tag/2025.5.8.15), [2025.5.8.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.5.8.13), [2025.5.7.19](https://github.com/pypa/trove-classifiers/releases/tag/2025.5.7.19), [2025.5.1.12](https://github.com/pypa/trove-classifiers/releases/tag/2025.5.1.12), [2025.4.28.22](https://github.com/pypa/trove-classifiers/releases/tag/2025.4.28.22)))\n- sysext-python: typing-extensions ([4.14.1](https://github.com/python/typing_extensions/releases/tag/4.14.1) (includes [4.14.0](https://github.com/python/typing_extensions/releases/tag/4.14.0)))\n- sysext-python: urllib3 ([2.5.0](https://github.com/urllib3/urllib3/releases/tag/2.5.0))\n- sysext-zfs: zfs ([2.3.3](https://github.com/openzfs/zfs/releases/tag/zfs-2.3.3) (includes [2.3.2](https://github.com/openzfs/zfs/releases/tag/zfs-2.3.2)))\n- util-linux ([2.41.1](https://github.com/util-linux/util-linux/blob/master/Documentation/releases/v2.41-ReleaseNotes))\n- vmware: open-vm-tools ([13.0.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-13.0.0))\n- xfsprogs ([6.14.0](https://lkml.org/lkml/2025/4/14/1443))\n\n_Changes since **Alpha 4426.0.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2025-39734](https://nvd.nist.gov/vuln/detail/CVE-2025-39734), [CVE-2025-39732](https://nvd.nist.gov/vuln/detail/CVE-2025-39732), [CVE-2025-39731](https://nvd.nist.gov/vuln/detail/CVE-2025-39731), [CVE-2025-39730](https://nvd.nist.gov/vuln/detail/CVE-2025-39730), [CVE-2025-39727](https://nvd.nist.gov/vuln/detail/CVE-2025-39727), [CVE-2025-38650](https://nvd.nist.gov/vuln/detail/CVE-2025-38650), [CVE-2025-38648](https://nvd.nist.gov/vuln/detail/CVE-2025-38648), [CVE-2025-38646](https://nvd.nist.gov/vuln/detail/CVE-2025-38646), [CVE-2025-38645](https://nvd.nist.gov/vuln/detail/CVE-2025-38645), [CVE-2025-38644](https://nvd.nist.gov/vuln/detail/CVE-2025-38644), [CVE-2025-38660](https://nvd.nist.gov/vuln/detail/CVE-2025-38660), [CVE-2025-38659](https://nvd.nist.gov/vuln/detail/CVE-2025-38659), [CVE-2025-38653](https://nvd.nist.gov/vuln/detail/CVE-2025-38653), [CVE-2025-38652](https://nvd.nist.gov/vuln/detail/CVE-2025-38652), [CVE-2025-38628](https://nvd.nist.gov/vuln/detail/CVE-2025-38628), [CVE-2025-38626](https://nvd.nist.gov/vuln/detail/CVE-2025-38626), [CVE-2025-38625](https://nvd.nist.gov/vuln/detail/CVE-2025-38625), [CVE-2025-38624](https://nvd.nist.gov/vuln/detail/CVE-2025-38624), [CVE-2025-38623](https://nvd.nist.gov/vuln/detail/CVE-2025-38623), [CVE-2025-38622](https://nvd.nist.gov/vuln/detail/CVE-2025-38622), [CVE-2025-38640](https://nvd.nist.gov/vuln/detail/CVE-2025-38640), [CVE-2025-38639](https://nvd.nist.gov/vuln/detail/CVE-2025-38639), [CVE-2025-38635](https://nvd.nist.gov/vuln/detail/CVE-2025-38635), [CVE-2025-38634](https://nvd.nist.gov/vuln/detail/CVE-2025-38634), [CVE-2025-38632](https://nvd.nist.gov/vuln/detail/CVE-2025-38632), [CVE-2025-38631](https://nvd.nist.gov/vuln/detail/CVE-2025-38631), [CVE-2025-38630](https://nvd.nist.gov/vuln/detail/CVE-2025-38630), [CVE-2025-38619](https://nvd.nist.gov/vuln/detail/CVE-2025-38619), [CVE-2025-38618](https://nvd.nist.gov/vuln/detail/CVE-2025-38618), [CVE-2025-38617](https://nvd.nist.gov/vuln/detail/CVE-2025-38617), [CVE-2025-38611](https://nvd.nist.gov/vuln/detail/CVE-2025-38611), [CVE-2025-38615](https://nvd.nist.gov/vuln/detail/CVE-2025-38615), [CVE-2025-38612](https://nvd.nist.gov/vuln/detail/CVE-2025-38612), [CVE-2025-38577](https://nvd.nist.gov/vuln/detail/CVE-2025-38577), [CVE-2025-38586](https://nvd.nist.gov/vuln/detail/CVE-2025-38586), [CVE-2025-38585](https://nvd.nist.gov/vuln/detail/CVE-2025-38585), [CVE-2025-38583](https://nvd.nist.gov/vuln/detail/CVE-2025-38583), [CVE-2025-38582](https://nvd.nist.gov/vuln/detail/CVE-2025-38582), [CVE-2025-38581](https://nvd.nist.gov/vuln/detail/CVE-2025-38581), [CVE-2025-38610](https://nvd.nist.gov/vuln/detail/CVE-2025-38610), [CVE-2025-38609](https://nvd.nist.gov/vuln/detail/CVE-2025-38609), [CVE-2025-38608](https://nvd.nist.gov/vuln/detail/CVE-2025-38608), [CVE-2025-38604](https://nvd.nist.gov/vuln/detail/CVE-2025-38604), [CVE-2025-38602](https://nvd.nist.gov/vuln/detail/CVE-2025-38602), [CVE-2025-38601](https://nvd.nist.gov/vuln/detail/CVE-2025-38601), [CVE-2025-38579](https://nvd.nist.gov/vuln/detail/CVE-2025-38579), [CVE-2025-38595](https://nvd.nist.gov/vuln/detail/CVE-2025-38595), [CVE-2025-38593](https://nvd.nist.gov/vuln/detail/CVE-2025-38593), [CVE-2025-38590](https://nvd.nist.gov/vuln/detail/CVE-2025-38590), [CVE-2025-38588](https://nvd.nist.gov/vuln/detail/CVE-2025-38588), [CVE-2025-38587](https://nvd.nist.gov/vuln/detail/CVE-2025-38587), [CVE-2025-38578](https://nvd.nist.gov/vuln/detail/CVE-2025-38578), [CVE-2025-38563](https://nvd.nist.gov/vuln/detail/CVE-2025-38563), [CVE-2025-38562](https://nvd.nist.gov/vuln/detail/CVE-2025-38562), [CVE-2025-38561](https://nvd.nist.gov/vuln/detail/CVE-2025-38561), [CVE-2025-38560](https://nvd.nist.gov/vuln/detail/CVE-2025-38560), [CVE-2025-38559](https://nvd.nist.gov/vuln/detail/CVE-2025-38559), [CVE-2025-38557](https://nvd.nist.gov/vuln/detail/CVE-2025-38557), [CVE-2025-38576](https://nvd.nist.gov/vuln/detail/CVE-2025-38576), [CVE-2025-38574](https://nvd.nist.gov/vuln/detail/CVE-2025-38574), [CVE-2025-38573](https://nvd.nist.gov/vuln/detail/CVE-2025-38573), [CVE-2025-38572](https://nvd.nist.gov/vuln/detail/CVE-2025-38572), [CVE-2025-38571](https://nvd.nist.gov/vuln/detail/CVE-2025-38571), [CVE-2025-38569](https://nvd.nist.gov/vuln/detail/CVE-2025-38569), [CVE-2025-38568](https://nvd.nist.gov/vuln/detail/CVE-2025-38568), [CVE-2025-38566](https://nvd.nist.gov/vuln/detail/CVE-2025-38566), [CVE-2025-38565](https://nvd.nist.gov/vuln/detail/CVE-2025-38565), [CVE-2025-38555](https://nvd.nist.gov/vuln/detail/CVE-2025-38555), [CVE-2025-38553](https://nvd.nist.gov/vuln/detail/CVE-2025-38553), [CVE-2025-38501](https://nvd.nist.gov/vuln/detail/CVE-2025-38501), [CVE-2025-39798](https://nvd.nist.gov/vuln/detail/CVE-2025-39798), [CVE-2025-39797](https://nvd.nist.gov/vuln/detail/CVE-2025-39797), [CVE-2025-39795](https://nvd.nist.gov/vuln/detail/CVE-2025-39795), [CVE-2025-39794](https://nvd.nist.gov/vuln/detail/CVE-2025-39794), [CVE-2025-39792](https://nvd.nist.gov/vuln/detail/CVE-2025-39792), [CVE-2025-39750](https://nvd.nist.gov/vuln/detail/CVE-2025-39750), [CVE-2025-39760](https://nvd.nist.gov/vuln/detail/CVE-2025-39760), [CVE-2025-39758](https://nvd.nist.gov/vuln/detail/CVE-2025-39758), [CVE-2025-39757](https://nvd.nist.gov/vuln/detail/CVE-2025-39757), [CVE-2025-39756](https://nvd.nist.gov/vuln/detail/CVE-2025-39756), [CVE-2025-39754](https://nvd.nist.gov/vuln/detail/CVE-2025-39754), [CVE-2025-39753](https://nvd.nist.gov/vuln/detail/CVE-2025-39753), [CVE-2025-39752](https://nvd.nist.gov/vuln/detail/CVE-2025-39752), [CVE-2025-39763](https://nvd.nist.gov/vuln/detail/CVE-2025-39763), [CVE-2025-39761](https://nvd.nist.gov/vuln/detail/CVE-2025-39761), [CVE-2025-39751](https://nvd.nist.gov/vuln/detail/CVE-2025-39751), [CVE-2025-39744](https://nvd.nist.gov/vuln/detail/CVE-2025-39744), [CVE-2025-39743](https://nvd.nist.gov/vuln/detail/CVE-2025-39743), [CVE-2025-39742](https://nvd.nist.gov/vuln/detail/CVE-2025-39742), [CVE-2025-39739](https://nvd.nist.gov/vuln/detail/CVE-2025-39739), [CVE-2025-39738](https://nvd.nist.gov/vuln/detail/CVE-2025-39738), [CVE-2025-39749](https://nvd.nist.gov/vuln/detail/CVE-2025-39749), [CVE-2025-39748](https://nvd.nist.gov/vuln/detail/CVE-2025-39748), [CVE-2025-39747](https://nvd.nist.gov/vuln/detail/CVE-2025-39747), [CVE-2025-39746](https://nvd.nist.gov/vuln/detail/CVE-2025-39746), [CVE-2025-39736](https://nvd.nist.gov/vuln/detail/CVE-2025-39736), [CVE-2025-39737](https://nvd.nist.gov/vuln/detail/CVE-2025-39737), [CVE-2025-38727](https://nvd.nist.gov/vuln/detail/CVE-2025-38727), [CVE-2025-38729](https://nvd.nist.gov/vuln/detail/CVE-2025-38729), [CVE-2025-38728](https://nvd.nist.gov/vuln/detail/CVE-2025-38728), [CVE-2025-38694](https://nvd.nist.gov/vuln/detail/CVE-2025-38694), [CVE-2025-38703](https://nvd.nist.gov/vuln/detail/CVE-2025-38703), [CVE-2025-38702](https://nvd.nist.gov/vuln/detail/CVE-2025-38702), [CVE-2025-38701](https://nvd.nist.gov/vuln/detail/CVE-2025-38701), [CVE-2025-38700](https://nvd.nist.gov/vuln/detail/CVE-2025-38700), [CVE-2025-38699](https://nvd.nist.gov/vuln/detail/CVE-2025-38699), [CVE-2025-38698](https://nvd.nist.gov/vuln/detail/CVE-2025-38698), [CVE-2025-38726](https://nvd.nist.gov/vuln/detail/CVE-2025-38726), [CVE-2025-38725](https://nvd.nist.gov/vuln/detail/CVE-2025-38725), [CVE-2025-38724](https://nvd.nist.gov/vuln/detail/CVE-2025-38724), [CVE-2025-38697](https://nvd.nist.gov/vuln/detail/CVE-2025-38697), [CVE-2025-38723](https://nvd.nist.gov/vuln/detail/CVE-2025-38723), [CVE-2025-38722](https://nvd.nist.gov/vuln/detail/CVE-2025-38722), [CVE-2025-38721](https://nvd.nist.gov/vuln/detail/CVE-2025-38721), [CVE-2025-38718](https://nvd.nist.gov/vuln/detail/CVE-2025-38718), [CVE-2025-38717](https://nvd.nist.gov/vuln/detail/CVE-2025-38717), [CVE-2025-38716](https://nvd.nist.gov/vuln/detail/CVE-2025-38716), [CVE-2025-38715](https://nvd.nist.gov/vuln/detail/CVE-2025-38715), [CVE-2025-38714](https://nvd.nist.gov/vuln/detail/CVE-2025-38714), [CVE-2025-38696](https://nvd.nist.gov/vuln/detail/CVE-2025-38696), [CVE-2025-38713](https://nvd.nist.gov/vuln/detail/CVE-2025-38713), [CVE-2025-38712](https://nvd.nist.gov/vuln/detail/CVE-2025-38712), [CVE-2025-38711](https://nvd.nist.gov/vuln/detail/CVE-2025-38711), [CVE-2025-38710](https://nvd.nist.gov/vuln/detail/CVE-2025-38710), [CVE-2025-38709](https://nvd.nist.gov/vuln/detail/CVE-2025-38709), [CVE-2025-38708](https://nvd.nist.gov/vuln/detail/CVE-2025-38708), [CVE-2025-38707](https://nvd.nist.gov/vuln/detail/CVE-2025-38707), [CVE-2025-38706](https://nvd.nist.gov/vuln/detail/CVE-2025-38706), [CVE-2025-38705](https://nvd.nist.gov/vuln/detail/CVE-2025-38705), [CVE-2025-38704](https://nvd.nist.gov/vuln/detail/CVE-2025-38704), [CVE-2025-38695](https://nvd.nist.gov/vuln/detail/CVE-2025-38695), [CVE-2025-38688](https://nvd.nist.gov/vuln/detail/CVE-2025-38688), [CVE-2025-38687](https://nvd.nist.gov/vuln/detail/CVE-2025-38687), [CVE-2025-38686](https://nvd.nist.gov/vuln/detail/CVE-2025-38686), [CVE-2025-38685](https://nvd.nist.gov/vuln/detail/CVE-2025-38685), [CVE-2025-38684](https://nvd.nist.gov/vuln/detail/CVE-2025-38684), [CVE-2025-38683](https://nvd.nist.gov/vuln/detail/CVE-2025-38683), [CVE-2025-38681](https://nvd.nist.gov/vuln/detail/CVE-2025-38681), [CVE-2025-38693](https://nvd.nist.gov/vuln/detail/CVE-2025-38693), [CVE-2025-38692](https://nvd.nist.gov/vuln/detail/CVE-2025-38692), [CVE-2025-38691](https://nvd.nist.gov/vuln/detail/CVE-2025-38691), [CVE-2025-38679](https://nvd.nist.gov/vuln/detail/CVE-2025-38679), [CVE-2025-38680](https://nvd.nist.gov/vuln/detail/CVE-2025-38680), [CVE-2025-38616](https://nvd.nist.gov/vuln/detail/CVE-2025-38616), [CVE-2025-39773](https://nvd.nist.gov/vuln/detail/CVE-2025-39773), [CVE-2025-39772](https://nvd.nist.gov/vuln/detail/CVE-2025-39772), [CVE-2025-39770](https://nvd.nist.gov/vuln/detail/CVE-2025-39770), [CVE-2025-39791](https://nvd.nist.gov/vuln/detail/CVE-2025-39791), [CVE-2025-39790](https://nvd.nist.gov/vuln/detail/CVE-2025-39790), [CVE-2025-39788](https://nvd.nist.gov/vuln/detail/CVE-2025-39788), [CVE-2025-39787](https://nvd.nist.gov/vuln/detail/CVE-2025-39787), [CVE-2025-39767](https://nvd.nist.gov/vuln/detail/CVE-2025-39767), [CVE-2025-39783](https://nvd.nist.gov/vuln/detail/CVE-2025-39783), [CVE-2025-39782](https://nvd.nist.gov/vuln/detail/CVE-2025-39782), [CVE-2025-39781](https://nvd.nist.gov/vuln/detail/CVE-2025-39781), [CVE-2025-39780](https://nvd.nist.gov/vuln/detail/CVE-2025-39780), [CVE-2025-39779](https://nvd.nist.gov/vuln/detail/CVE-2025-39779), [CVE-2025-39776](https://nvd.nist.gov/vuln/detail/CVE-2025-39776), [CVE-2025-39765](https://nvd.nist.gov/vuln/detail/CVE-2025-39765), [CVE-2025-39766](https://nvd.nist.gov/vuln/detail/CVE-2025-39766), [CVE-2025-39759](https://nvd.nist.gov/vuln/detail/CVE-2025-39759), [CVE-2025-39711](https://nvd.nist.gov/vuln/detail/CVE-2025-39711), [CVE-2025-39720](https://nvd.nist.gov/vuln/detail/CVE-2025-39720), [CVE-2025-39719](https://nvd.nist.gov/vuln/detail/CVE-2025-39719), [CVE-2025-39718](https://nvd.nist.gov/vuln/detail/CVE-2025-39718), [CVE-2025-39716](https://nvd.nist.gov/vuln/detail/CVE-2025-39716), [CVE-2025-39715](https://nvd.nist.gov/vuln/detail/CVE-2025-39715), [CVE-2025-39714](https://nvd.nist.gov/vuln/detail/CVE-2025-39714), [CVE-2025-39713](https://nvd.nist.gov/vuln/detail/CVE-2025-39713), [CVE-2025-39724](https://nvd.nist.gov/vuln/detail/CVE-2025-39724), [CVE-2025-39723](https://nvd.nist.gov/vuln/detail/CVE-2025-39723), [CVE-2025-39722](https://nvd.nist.gov/vuln/detail/CVE-2025-39722), [CVE-2025-39721](https://nvd.nist.gov/vuln/detail/CVE-2025-39721), [CVE-2025-39712](https://nvd.nist.gov/vuln/detail/CVE-2025-39712), [CVE-2025-39675](https://nvd.nist.gov/vuln/detail/CVE-2025-39675), [CVE-2025-39673](https://nvd.nist.gov/vuln/detail/CVE-2025-39673), [CVE-2025-38737](https://nvd.nist.gov/vuln/detail/CVE-2025-38737), [CVE-2025-38736](https://nvd.nist.gov/vuln/detail/CVE-2025-38736), [CVE-2025-39710](https://nvd.nist.gov/vuln/detail/CVE-2025-39710), [CVE-2025-39709](https://nvd.nist.gov/vuln/detail/CVE-2025-39709), [CVE-2025-39707](https://nvd.nist.gov/vuln/detail/CVE-2025-39707), [CVE-2025-38735](https://nvd.nist.gov/vuln/detail/CVE-2025-38735), [CVE-2025-39706](https://nvd.nist.gov/vuln/detail/CVE-2025-39706), [CVE-2025-39705](https://nvd.nist.gov/vuln/detail/CVE-2025-39705), [CVE-2025-39703](https://nvd.nist.gov/vuln/detail/CVE-2025-39703), [CVE-2025-39702](https://nvd.nist.gov/vuln/detail/CVE-2025-39702), [CVE-2025-39701](https://nvd.nist.gov/vuln/detail/CVE-2025-39701), [CVE-2025-39700](https://nvd.nist.gov/vuln/detail/CVE-2025-39700), [CVE-2025-39698](https://nvd.nist.gov/vuln/detail/CVE-2025-39698), [CVE-2025-39697](https://nvd.nist.gov/vuln/detail/CVE-2025-39697), [CVE-2025-38734](https://nvd.nist.gov/vuln/detail/CVE-2025-38734), [CVE-2025-39695](https://nvd.nist.gov/vuln/detail/CVE-2025-39695), [CVE-2025-39694](https://nvd.nist.gov/vuln/detail/CVE-2025-39694), [CVE-2025-39693](https://nvd.nist.gov/vuln/detail/CVE-2025-39693), [CVE-2025-39692](https://nvd.nist.gov/vuln/detail/CVE-2025-39692), [CVE-2025-39691](https://nvd.nist.gov/vuln/detail/CVE-2025-39691), [CVE-2025-39689](https://nvd.nist.gov/vuln/detail/CVE-2025-39689), [CVE-2025-39687](https://nvd.nist.gov/vuln/detail/CVE-2025-39687), [CVE-2025-39686](https://nvd.nist.gov/vuln/detail/CVE-2025-39686), [CVE-2025-38733](https://nvd.nist.gov/vuln/detail/CVE-2025-38733), [CVE-2025-39685](https://nvd.nist.gov/vuln/detail/CVE-2025-39685), [CVE-2025-39684](https://nvd.nist.gov/vuln/detail/CVE-2025-39684), [CVE-2025-39683](https://nvd.nist.gov/vuln/detail/CVE-2025-39683), [CVE-2025-39682](https://nvd.nist.gov/vuln/detail/CVE-2025-39682), [CVE-2025-39681](https://nvd.nist.gov/vuln/detail/CVE-2025-39681), [CVE-2025-39679](https://nvd.nist.gov/vuln/detail/CVE-2025-39679), [CVE-2025-39676](https://nvd.nist.gov/vuln/detail/CVE-2025-39676), [CVE-2025-38732](https://nvd.nist.gov/vuln/detail/CVE-2025-38732), [CVE-2025-38730](https://nvd.nist.gov/vuln/detail/CVE-2025-38730), [CVE-2025-38677](https://nvd.nist.gov/vuln/detail/CVE-2025-38677), [CVE-2025-40300](https://nvd.nist.gov/vuln/detail/CVE-2025-40300))\n\n#### Bug fixes:\n\n- Enabled `CONFIG_CPUSETS_V1` to mitigate cgroupsv1 removal (e.g JVM) ([Flatcar#1884](https://github.com/flatcar/Flatcar/issues/1884))\n\n#### Updates:\n\n- Linux ([6.12.47](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.47) (includes [6.12.46](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.46), [6.12.45](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.45), [6.12.44](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.44), [6.12.43](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.43), [6.12.42](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.42)))\n- ca-certificates ([3.115.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115_1.html))"
  },
  "4459.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-10-14 12:34:34 +0000",
    "major_software": {
      "containerd": [
        "2.0.5"
      ],
      "docker": [
        "28.0.4"
      ],
      "ignition": [
        "2.22.0"
      ],
      "kernel": [
        "6.12.51"
      ],
      "systemd": [
        "256"
      ]
    },
    "release_notes": " _Changes since **Beta 4426.1.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-39927](https://nvd.nist.gov/vuln/detail/CVE-2025-39927), [CVE-2025-39926](https://nvd.nist.gov/vuln/detail/CVE-2025-39926), [CVE-2025-39923](https://nvd.nist.gov/vuln/detail/CVE-2025-39923), [CVE-2025-39913](https://nvd.nist.gov/vuln/detail/CVE-2025-39913), [CVE-2025-39912](https://nvd.nist.gov/vuln/detail/CVE-2025-39912), [CVE-2025-39911](https://nvd.nist.gov/vuln/detail/CVE-2025-39911), [CVE-2025-39909](https://nvd.nist.gov/vuln/detail/CVE-2025-39909), [CVE-2025-39907](https://nvd.nist.gov/vuln/detail/CVE-2025-39907), [CVE-2025-39917](https://nvd.nist.gov/vuln/detail/CVE-2025-39917), [CVE-2025-39916](https://nvd.nist.gov/vuln/detail/CVE-2025-39916), [CVE-2025-39914](https://nvd.nist.gov/vuln/detail/CVE-2025-39914), [CVE-2025-39885](https://nvd.nist.gov/vuln/detail/CVE-2025-39885), [CVE-2025-39886](https://nvd.nist.gov/vuln/detail/CVE-2025-39886), [CVE-2025-39876](https://nvd.nist.gov/vuln/detail/CVE-2025-39876), [CVE-2025-39873](https://nvd.nist.gov/vuln/detail/CVE-2025-39873), [CVE-2025-39871](https://nvd.nist.gov/vuln/detail/CVE-2025-39871), [CVE-2025-39870](https://nvd.nist.gov/vuln/detail/CVE-2025-39870), [CVE-2025-39869](https://nvd.nist.gov/vuln/detail/CVE-2025-39869), [CVE-2025-39884](https://nvd.nist.gov/vuln/detail/CVE-2025-39884), [CVE-2025-39883](https://nvd.nist.gov/vuln/detail/CVE-2025-39883), [CVE-2025-39882](https://nvd.nist.gov/vuln/detail/CVE-2025-39882), [CVE-2025-39881](https://nvd.nist.gov/vuln/detail/CVE-2025-39881), [CVE-2025-39880](https://nvd.nist.gov/vuln/detail/CVE-2025-39880), [CVE-2025-39877](https://nvd.nist.gov/vuln/detail/CVE-2025-39877), [CVE-2025-39963](https://nvd.nist.gov/vuln/detail/CVE-2025-39963), [CVE-2025-39961](https://nvd.nist.gov/vuln/detail/CVE-2025-39961), [CVE-2025-39957](https://nvd.nist.gov/vuln/detail/CVE-2025-39957), [CVE-2025-39956](https://nvd.nist.gov/vuln/detail/CVE-2025-39956), [CVE-2025-39955](https://nvd.nist.gov/vuln/detail/CVE-2025-39955), [CVE-2025-39938](https://nvd.nist.gov/vuln/detail/CVE-2025-39938), [CVE-2025-39937](https://nvd.nist.gov/vuln/detail/CVE-2025-39937), [CVE-2025-39934](https://nvd.nist.gov/vuln/detail/CVE-2025-39934), [CVE-2025-39953](https://nvd.nist.gov/vuln/detail/CVE-2025-39953), [CVE-2025-39952](https://nvd.nist.gov/vuln/detail/CVE-2025-39952), [CVE-2025-39951](https://nvd.nist.gov/vuln/detail/CVE-2025-39951), [CVE-2025-39950](https://nvd.nist.gov/vuln/detail/CVE-2025-39950), [CVE-2025-39932](https://nvd.nist.gov/vuln/detail/CVE-2025-39932), [CVE-2025-39949](https://nvd.nist.gov/vuln/detail/CVE-2025-39949), [CVE-2025-39948](https://nvd.nist.gov/vuln/detail/CVE-2025-39948), [CVE-2025-39947](https://nvd.nist.gov/vuln/detail/CVE-2025-39947), [CVE-2025-39946](https://nvd.nist.gov/vuln/detail/CVE-2025-39946), [CVE-2025-39945](https://nvd.nist.gov/vuln/detail/CVE-2025-39945), [CVE-2025-39944](https://nvd.nist.gov/vuln/detail/CVE-2025-39944), [CVE-2025-39943](https://nvd.nist.gov/vuln/detail/CVE-2025-39943), [CVE-2025-39942](https://nvd.nist.gov/vuln/detail/CVE-2025-39942), [CVE-2025-39940](https://nvd.nist.gov/vuln/detail/CVE-2025-39940), [CVE-2025-39929](https://nvd.nist.gov/vuln/detail/CVE-2025-39929), [CVE-2025-39931](https://nvd.nist.gov/vuln/detail/CVE-2025-39931), [CVE-2024-57878](https://nvd.nist.gov/vuln/detail/CVE-2024-57878), [CVE-2024-57877](https://nvd.nist.gov/vuln/detail/CVE-2024-57877), [CVE-2024-57875](https://nvd.nist.gov/vuln/detail/CVE-2024-57875), [CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23127](https://nvd.nist.gov/vuln/detail/CVE-2025-23127), [CVE-2025-23126](https://nvd.nist.gov/vuln/detail/CVE-2025-23126), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2025-23124](https://nvd.nist.gov/vuln/detail/CVE-2025-23124), [CVE-2024-57872](https://nvd.nist.gov/vuln/detail/CVE-2024-57872), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57839](https://nvd.nist.gov/vuln/detail/CVE-2024-57839), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47794](https://nvd.nist.gov/vuln/detail/CVE-2024-47794), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-49569](https://nvd.nist.gov/vuln/detail/CVE-2024-49569), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-48876](https://nvd.nist.gov/vuln/detail/CVE-2024-48876), [CVE-2024-41932](https://nvd.nist.gov/vuln/detail/CVE-2024-41932), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56784](https://nvd.nist.gov/vuln/detail/CVE-2024-56784), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56782](https://nvd.nist.gov/vuln/detail/CVE-2024-56782), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56639](https://nvd.nist.gov/vuln/detail/CVE-2024-56639), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56647](https://nvd.nist.gov/vuln/detail/CVE-2024-56647), [CVE-2024-56646](https://nvd.nist.gov/vuln/detail/CVE-2024-56646), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56632](https://nvd.nist.gov/vuln/detail/CVE-2024-56632), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56624](https://nvd.nist.gov/vuln/detail/CVE-2024-56624), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56621](https://nvd.nist.gov/vuln/detail/CVE-2024-56621), [CVE-2024-56620](https://nvd.nist.gov/vuln/detail/CVE-2024-56620), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56618](https://nvd.nist.gov/vuln/detail/CVE-2024-56618), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56591](https://nvd.nist.gov/vuln/detail/CVE-2024-56591), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56588](https://nvd.nist.gov/vuln/detail/CVE-2024-56588), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56612](https://nvd.nist.gov/vuln/detail/CVE-2024-56612), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56609](https://nvd.nist.gov/vuln/detail/CVE-2024-56609), [CVE-2024-56608](https://nvd.nist.gov/vuln/detail/CVE-2024-56608), [CVE-2024-56607](https://nvd.nist.gov/vuln/detail/CVE-2024-56607), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56599](https://nvd.nist.gov/vuln/detail/CVE-2024-56599), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584))\n - glib ([CVE-2025-7039](https://www.cve.org/CVERecord?id=CVE-2025-7039))\n - glibc ([CVE-2025-8058](https://www.cve.org/CVERecord?id=CVE-2025-8058))\n - gnutls ([CVE-2025-32988](https://www.cve.org/CVERecord?id=CVE-2025-32988), [CVE-2025-32989](https://www.cve.org/CVERecord?id=CVE-2025-32989), [CVE-2025-32990](https://www.cve.org/CVERecord?id=CVE-2025-32990), [CVE-2025-6395](https://www.cve.org/CVERecord?id=CVE-2025-6395))\n - go ([CVE-2025-47906](https://www.cve.org/CVERecord?id=CVE-2025-47906), [CVE-2025-47907](https://www.cve.org/CVERecord?id=CVE-2025-47907))\n - iperf ([CVE-2025-54349](https://www.cve.org/CVERecord?id=CVE-2025-54349), [CVE-2025-54350](https://www.cve.org/CVERecord?id=CVE-2025-54350), [CVE-2025-54351](https://www.cve.org/CVERecord?id=CVE-2025-54351))\n - nvidia-drivers ([CVE-2025-23277](https://www.cve.org/CVERecord?id=CVE-2025-23277), [CVE-2025-23278](https://www.cve.org/CVERecord?id=CVE-2025-23278), [CVE-2025-23279](https://www.cve.org/CVERecord?id=CVE-2025-23279), [CVE-2025-23286](https://www.cve.org/CVERecord?id=CVE-2025-23286))\n - python ([CVE-2025-6069](https://www.cve.org/CVERecord?id=CVE-2025-6069), [CVE-2025-8194](https://www.cve.org/CVERecord?id=CVE-2025-8194))\n - vim ([CVE-2025-53905](https://www.cve.org/CVERecord?id=CVE-2025-53905), [CVE-2025-53906](https://www.cve.org/CVERecord?id=CVE-2025-53906), [CVE-2025-9390](https://www.cve.org/CVERecord?id=CVE-2025-9390))\n \n #### Bug fixes:\n \n - Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance ([Flatcar#1901](https://github.com/flatcar/Flatcar/issues/1901))\n \n #### Changes:\n \n - Enable CONFIG_INET_DIAG_DESTROY in kernel options ([flatcar/scripts#3176](https://github.com/flatcar/scripts/pull/3176))\n - Hyper-V images now use a systemd-sysext image for layering additional platform-specific software on top of `/usr`\n - Scaleway: SSH keys are now fetched _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))\n - Scaleway: The hostname is now set _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))\n \n #### Updates:\n \n- Ignition ([2.22.0](https://coreos.github.io/ignition/release-notes/#ignition-2220-2025-07-08))\n- Linux ([6.12.51](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51) (includes [6.12.42](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.42), [6.12.43](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.43), [6.12.48](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48), [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49), [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50)))\n- Linux Firmware ([20250808](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250808))\n- SDK: gnu-efi ([4.0.2](https://github.com/ncroxon/gnu-efi/releases/tag/4.0.2))\n- SDK: go ([1.24.6](https://go.dev/doc/devel/release#go1.24.minor))\n- SDK: rust ([1.88.0](https://blog.rust-lang.org/2025/06/26/Rust-1.88.0/))\n- SDK: sbsigntools ([0.9.5](https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/commit/?h=v0.9.5&id=9cfca9fe7aa7a8e29b92fe33ce8433e212c9a8ba))\n- azure, dev, gce, sysext-python: gdbm ([1.26](https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00012.html))\n- azure, dev, gce, sysext-python: python (3.11.13_p1)\n- base, dev: azure-vm-utils ([0.7.0](https://github.com/Azure/azure-vm-utils/releases/tag/v0.7.0))\n- base, dev: btrfs-progs ([6.15](https://github.com/kdave/btrfs-progs/releases/tag/v6.15))\n- base, dev: cryptsetup ([2.8.0](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.8.0/docs/v2.8.0-ReleaseNotes))\n- base, dev: curl ([8.15.0](https://curl.se/ch/8.15.0.html) (includes [8.14.0](https://curl.se/ch/8.14.0.html), [8.14.1](https://curl.se/ch/8.14.1.html)))\n- base, dev: e2fsprogs ([1.47.3](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.3))\n- base, dev: ethtool ([6.15](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/plain/NEWS?h=v6.15))\n- base, dev: glib ([2.84.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.4))\n- base, dev: gnutls ([3.8.10](https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html))\n- base, dev: iproute2 ([6.16.0](https://www.spinics.net/lists/netdev/msg1112693.html))\n- base, dev: kmod ([34.2](https://lwn.net/Articles/1011365/))\n- base, dev: libgcrypt ([1.11.2](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS;h=3add9aad0cf6dc5a70ce6cb3983a46e585a630b3;hb=737cc63600146f196738a6768679eb016cf866e9))\n- base, dev: libnvme ([1.15](https://github.com/linux-nvme/libnvme/releases/tag/v1.15))\n- base, dev: libsodium ([1.0.20_p20250606](https://raw.githubusercontent.com/jedisct1/libsodium/7e024fbf096c84bef866b21f521c516591908bef/ChangeLog))\n- base, dev: libusb ([1.0.29](https://raw.githubusercontent.com/libusb/libusb/refs/tags/v1.0.29/ChangeLog))\n- base, dev: lsof ([4.99.5](https://github.com/lsof-org/lsof/releases/tag/4.99.5))\n- base, dev: ncurses ([6.5_p20250531](https://invisible-island.net/ncurses/NEWS.html#t20250531))\n- base, dev: nettle ([3.10.2](https://git.lysator.liu.se/nettle/nettle/-/raw/nettle_3.10.2_release_20250626/ChangeLog))\n- base, dev: ntp ([4.2.8_p18](https://www.ntp.org/support/securitynotice/4_2_8p18-release-announcement/))\n- base, dev: nvidia-drivers-service ([570.172.08](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-172-08/index.html) (includes [535.261.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-261-03/index.html), 570.172.08))\n- base, dev: nvme-cli ([2.15](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.15))\n- base, dev: openssl ([3.4.2](https://github.com/openssl/openssl/releases/tag/openssl-3.4.2))\n- base, dev: pciutils ([3.14.0](https://git.kernel.org/pub/scm/utils/pciutils/pciutils.git/plain/ChangeLog?h=v3.14.0))\n- base, dev: pinentry ([1.3.2](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob_plain;f=NEWS;h=8bf192539fed9104a1ff431c6dcc3add7fb6771c;hb=d7660807593067d5cd7150b7d4d987d60957b5cb))\n- base, dev: pkgconf ([2.5.1](https://raw.githubusercontent.com/pkgconf/pkgconf/refs/tags/pkgconf-2.5.1/NEWS) (includes [2.5.0](https://raw.githubusercontent.com/pkgconf/pkgconf/refs/tags/pkgconf-2.5.0/NEWS)))\n- base, dev: rpcbind ([1.2.8](https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_8))\n- base, dev: selinux ([2.20250213](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20250213))\n- base, dev: sqlite ([3.50.4](https://sqlite.org/releaselog/3_50_4.html) (includes [3.50.3](https://sqlite.org/releaselog/3_50_3.html)))\n- base, dev: strace ([6.16](https://github.com/strace/strace/releases/tag/v6.16))\n- base, dev: sudo ([1.9.17_p2](https://github.com/sudo-project/sudo/releases/tag/v1.9.17p2))\n- base, dev: vim ([9.1.1652](https://github.com/vim/vim/commits/v9.1.1652/))\n- ca-certificates ([3.117](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html) (includes [3.115](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115.html), [3.116](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html)))\n- dev: gnuconfig ([20250710](https://cgit.git.savannah.gnu.org/cgit/config.git/log/?id=a2287c3041a3f2a204eb942e09c015eab00dc7dd))\n- dev: iperf ([3.19.1](https://github.com/esnet/iperf/releases/tag/3.19.1))\n- sysext-incus, sysext-podman, vmware: fuse ([3.17.3](https://raw.githubusercontent.com/libfuse/libfuse/refs/tags/fuse-3.17.3/ChangeLog.rst))\n- sysext-incus: cowsql ([1.15.9](https://github.com/cowsql/cowsql/commits/v1.15.9/))\n- sysext-nvidia-drivers-535, sysext-nvidia-drivers-535-open: nvidia-drivers ([535.261.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-261-03/index.html))\n- sysext-nvidia-drivers-570, sysext-nvidia-drivers-570-open: nvidia-drivers (570.181 (includes [570.172.08](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-172-08/index.html)))\n- sysext-python: distlib ([0.4.0](https://github.com/pypa/distlib/blob/0.4.0/CHANGES.rst#040))\n- sysext-python: rich ([14.1.0](https://github.com/Textualize/rich/releases/tag/v14.1.0))\n- sysext-python: trove-classifiers ([2025.8.26.11](https://github.com/pypa/trove-classifiers/releases/tag/2025.8.26.11) (includes [2025.8.6.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.8.6.13)))\n- sysext-python: truststore ([0.10.4](https://raw.githubusercontent.com/sethmlarson/truststore/refs/tags/v0.10.4/CHANGELOG.md))\n\n\n _Changes since **Alpha 4459.0.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-39927](https://nvd.nist.gov/vuln/detail/CVE-2025-39927), [CVE-2025-39926](https://nvd.nist.gov/vuln/detail/CVE-2025-39926), [CVE-2025-39923](https://nvd.nist.gov/vuln/detail/CVE-2025-39923), [CVE-2025-39913](https://nvd.nist.gov/vuln/detail/CVE-2025-39913), [CVE-2025-39912](https://nvd.nist.gov/vuln/detail/CVE-2025-39912), [CVE-2025-39911](https://nvd.nist.gov/vuln/detail/CVE-2025-39911), [CVE-2025-39909](https://nvd.nist.gov/vuln/detail/CVE-2025-39909), [CVE-2025-39907](https://nvd.nist.gov/vuln/detail/CVE-2025-39907), [CVE-2025-39917](https://nvd.nist.gov/vuln/detail/CVE-2025-39917), [CVE-2025-39916](https://nvd.nist.gov/vuln/detail/CVE-2025-39916), [CVE-2025-39914](https://nvd.nist.gov/vuln/detail/CVE-2025-39914), [CVE-2025-39885](https://nvd.nist.gov/vuln/detail/CVE-2025-39885), [CVE-2025-39886](https://nvd.nist.gov/vuln/detail/CVE-2025-39886), [CVE-2025-39876](https://nvd.nist.gov/vuln/detail/CVE-2025-39876), [CVE-2025-39873](https://nvd.nist.gov/vuln/detail/CVE-2025-39873), [CVE-2025-39871](https://nvd.nist.gov/vuln/detail/CVE-2025-39871), [CVE-2025-39870](https://nvd.nist.gov/vuln/detail/CVE-2025-39870), [CVE-2025-39869](https://nvd.nist.gov/vuln/detail/CVE-2025-39869), [CVE-2025-39884](https://nvd.nist.gov/vuln/detail/CVE-2025-39884), [CVE-2025-39883](https://nvd.nist.gov/vuln/detail/CVE-2025-39883), [CVE-2025-39882](https://nvd.nist.gov/vuln/detail/CVE-2025-39882), [CVE-2025-39881](https://nvd.nist.gov/vuln/detail/CVE-2025-39881), [CVE-2025-39880](https://nvd.nist.gov/vuln/detail/CVE-2025-39880), [CVE-2025-39877](https://nvd.nist.gov/vuln/detail/CVE-2025-39877), [CVE-2025-39963](https://nvd.nist.gov/vuln/detail/CVE-2025-39963), [CVE-2025-39961](https://nvd.nist.gov/vuln/detail/CVE-2025-39961), [CVE-2025-39957](https://nvd.nist.gov/vuln/detail/CVE-2025-39957), [CVE-2025-39956](https://nvd.nist.gov/vuln/detail/CVE-2025-39956), [CVE-2025-39955](https://nvd.nist.gov/vuln/detail/CVE-2025-39955), [CVE-2025-39938](https://nvd.nist.gov/vuln/detail/CVE-2025-39938), [CVE-2025-39937](https://nvd.nist.gov/vuln/detail/CVE-2025-39937), [CVE-2025-39934](https://nvd.nist.gov/vuln/detail/CVE-2025-39934), [CVE-2025-39953](https://nvd.nist.gov/vuln/detail/CVE-2025-39953), [CVE-2025-39952](https://nvd.nist.gov/vuln/detail/CVE-2025-39952), [CVE-2025-39951](https://nvd.nist.gov/vuln/detail/CVE-2025-39951), [CVE-2025-39950](https://nvd.nist.gov/vuln/detail/CVE-2025-39950), [CVE-2025-39932](https://nvd.nist.gov/vuln/detail/CVE-2025-39932), [CVE-2025-39949](https://nvd.nist.gov/vuln/detail/CVE-2025-39949), [CVE-2025-39948](https://nvd.nist.gov/vuln/detail/CVE-2025-39948), [CVE-2025-39947](https://nvd.nist.gov/vuln/detail/CVE-2025-39947), [CVE-2025-39946](https://nvd.nist.gov/vuln/detail/CVE-2025-39946), [CVE-2025-39945](https://nvd.nist.gov/vuln/detail/CVE-2025-39945), [CVE-2025-39944](https://nvd.nist.gov/vuln/detail/CVE-2025-39944), [CVE-2025-39943](https://nvd.nist.gov/vuln/detail/CVE-2025-39943), [CVE-2025-39942](https://nvd.nist.gov/vuln/detail/CVE-2025-39942), [CVE-2025-39940](https://nvd.nist.gov/vuln/detail/CVE-2025-39940), [CVE-2025-39929](https://nvd.nist.gov/vuln/detail/CVE-2025-39929), [CVE-2025-39931](https://nvd.nist.gov/vuln/detail/CVE-2025-39931), [CVE-2024-57878](https://nvd.nist.gov/vuln/detail/CVE-2024-57878), [CVE-2024-57877](https://nvd.nist.gov/vuln/detail/CVE-2024-57877), [CVE-2024-57875](https://nvd.nist.gov/vuln/detail/CVE-2024-57875), [CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23127](https://nvd.nist.gov/vuln/detail/CVE-2025-23127), [CVE-2025-23126](https://nvd.nist.gov/vuln/detail/CVE-2025-23126), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2025-23124](https://nvd.nist.gov/vuln/detail/CVE-2025-23124), [CVE-2024-57872](https://nvd.nist.gov/vuln/detail/CVE-2024-57872), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57839](https://nvd.nist.gov/vuln/detail/CVE-2024-57839), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47794](https://nvd.nist.gov/vuln/detail/CVE-2024-47794), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-49569](https://nvd.nist.gov/vuln/detail/CVE-2024-49569), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-48876](https://nvd.nist.gov/vuln/detail/CVE-2024-48876), [CVE-2024-41932](https://nvd.nist.gov/vuln/detail/CVE-2024-41932), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56784](https://nvd.nist.gov/vuln/detail/CVE-2024-56784), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56782](https://nvd.nist.gov/vuln/detail/CVE-2024-56782), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56639](https://nvd.nist.gov/vuln/detail/CVE-2024-56639), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56647](https://nvd.nist.gov/vuln/detail/CVE-2024-56647), [CVE-2024-56646](https://nvd.nist.gov/vuln/detail/CVE-2024-56646), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56632](https://nvd.nist.gov/vuln/detail/CVE-2024-56632), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56624](https://nvd.nist.gov/vuln/detail/CVE-2024-56624), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56621](https://nvd.nist.gov/vuln/detail/CVE-2024-56621), [CVE-2024-56620](https://nvd.nist.gov/vuln/detail/CVE-2024-56620), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56618](https://nvd.nist.gov/vuln/detail/CVE-2024-56618), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56591](https://nvd.nist.gov/vuln/detail/CVE-2024-56591), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56588](https://nvd.nist.gov/vuln/detail/CVE-2024-56588), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56612](https://nvd.nist.gov/vuln/detail/CVE-2024-56612), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56609](https://nvd.nist.gov/vuln/detail/CVE-2024-56609), [CVE-2024-56608](https://nvd.nist.gov/vuln/detail/CVE-2024-56608), [CVE-2024-56607](https://nvd.nist.gov/vuln/detail/CVE-2024-56607), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56599](https://nvd.nist.gov/vuln/detail/CVE-2024-56599), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584))\n \n #### Bug fixes:\n \n - Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance ([Flatcar#1901](https://github.com/flatcar/Flatcar/issues/1901))\n \n #### Changes:\n \n - Scaleway: SSH keys are now fetched _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))\n - Scaleway: The hostname is now set _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))\n \n #### Updates:\n \n- Linux ([6.12.51](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51) (includes [6.12.48](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48), [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49), [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50)))\n- ca-certificates ([3.117](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html) (includes [3.116](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html)))\n"
  },
  "4459.1.1": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-11-12 15:00:28 +0000",
    "major_software": {
      "containerd": [
        "2.0.7"
      ],
      "docker": [
        "28.0.4"
      ],
      "ignition": [
        "2.22.0"
      ],
      "kernel": [
        "6.12.54"
      ],
      "systemd": [
        "256"
      ]
    },
    "release_notes": "_Changes since **Beta 4459.1.0**_\n \n#### Security fixes:\n \n - Linux ([CVE-2025-40109](https://nvd.nist.gov/vuln/detail/CVE-2025-40109), [CVE-2025-40107](https://nvd.nist.gov/vuln/detail/CVE-2025-40107), [CVE-2025-40028](https://nvd.nist.gov/vuln/detail/CVE-2025-40028), [CVE-2025-40027](https://nvd.nist.gov/vuln/detail/CVE-2025-40027), [CVE-2025-40026](https://nvd.nist.gov/vuln/detail/CVE-2025-40026), [CVE-2025-40000](https://nvd.nist.gov/vuln/detail/CVE-2025-40000), [CVE-2025-39995](https://nvd.nist.gov/vuln/detail/CVE-2025-39995), [CVE-2025-40052](https://nvd.nist.gov/vuln/detail/CVE-2025-40052), [CVE-2025-40061](https://nvd.nist.gov/vuln/detail/CVE-2025-40061), [CVE-2025-40060](https://nvd.nist.gov/vuln/detail/CVE-2025-40060), [CVE-2025-40059](https://nvd.nist.gov/vuln/detail/CVE-2025-40059), [CVE-2025-40058](https://nvd.nist.gov/vuln/detail/CVE-2025-40058), [CVE-2025-40057](https://nvd.nist.gov/vuln/detail/CVE-2025-40057), [CVE-2025-40056](https://nvd.nist.gov/vuln/detail/CVE-2025-40056), [CVE-2025-40055](https://nvd.nist.gov/vuln/detail/CVE-2025-40055), [CVE-2025-40081](https://nvd.nist.gov/vuln/detail/CVE-2025-40081), [CVE-2025-40080](https://nvd.nist.gov/vuln/detail/CVE-2025-40080), [CVE-2025-40079](https://nvd.nist.gov/vuln/detail/CVE-2025-40079), [CVE-2025-40078](https://nvd.nist.gov/vuln/detail/CVE-2025-40078), [CVE-2025-40071](https://nvd.nist.gov/vuln/detail/CVE-2025-40071), [CVE-2025-40070](https://nvd.nist.gov/vuln/detail/CVE-2025-40070), [CVE-2025-40068](https://nvd.nist.gov/vuln/detail/CVE-2025-40068), [CVE-2025-40067](https://nvd.nist.gov/vuln/detail/CVE-2025-40067), [CVE-2025-40062](https://nvd.nist.gov/vuln/detail/CVE-2025-40062), [CVE-2025-40053](https://nvd.nist.gov/vuln/detail/CVE-2025-40053), [CVE-2025-40029](https://nvd.nist.gov/vuln/detail/CVE-2025-40029), [CVE-2025-40038](https://nvd.nist.gov/vuln/detail/CVE-2025-40038), [CVE-2025-40037](https://nvd.nist.gov/vuln/detail/CVE-2025-40037), [CVE-2025-40036](https://nvd.nist.gov/vuln/detail/CVE-2025-40036), [CVE-2025-40035](https://nvd.nist.gov/vuln/detail/CVE-2025-40035), [CVE-2025-40033](https://nvd.nist.gov/vuln/detail/CVE-2025-40033), [CVE-2025-40051](https://nvd.nist.gov/vuln/detail/CVE-2025-40051), [CVE-2025-40049](https://nvd.nist.gov/vuln/detail/CVE-2025-40049), [CVE-2025-40031](https://nvd.nist.gov/vuln/detail/CVE-2025-40031), [CVE-2025-40048](https://nvd.nist.gov/vuln/detail/CVE-2025-40048), [CVE-2025-40047](https://nvd.nist.gov/vuln/detail/CVE-2025-40047), [CVE-2025-40045](https://nvd.nist.gov/vuln/detail/CVE-2025-40045), [CVE-2025-40044](https://nvd.nist.gov/vuln/detail/CVE-2025-40044), [CVE-2025-40043](https://nvd.nist.gov/vuln/detail/CVE-2025-40043), [CVE-2025-40039](https://nvd.nist.gov/vuln/detail/CVE-2025-40039), [CVE-2025-40030](https://nvd.nist.gov/vuln/detail/CVE-2025-40030), [CVE-2025-40018](https://nvd.nist.gov/vuln/detail/CVE-2025-40018), [CVE-2025-40004](https://nvd.nist.gov/vuln/detail/CVE-2025-40004), [CVE-2025-40032](https://nvd.nist.gov/vuln/detail/CVE-2025-40032), [CVE-2025-40042](https://nvd.nist.gov/vuln/detail/CVE-2025-40042), [CVE-2025-40019](https://nvd.nist.gov/vuln/detail/CVE-2025-40019))\n - containerd ([CVE-2024-25621](https://www.cve.org/CVERecord?id=CVE-2024-25621), [CVE-2025-64329](https://www.cve.org/CVERecord?id=CVE-2025-64329))\n - runc ([CVE-2025-31133](https://www.cve.org/CVERecord?id=CVE-2025-31133), [CVE-2025-52565](https://www.cve.org/CVERecord?id=CVE-2025-52565), [CVE-2025-52881](https://www.cve.org/CVERecord?id=CVE-2025-52881))\n \n#### Bug fixes:\n \n - Enabled `CONFIG_MEMCG_V1` to mitigate cgroupsv1 removal (e.g JVM) ([Flatcar#1884](https://github.com/flatcar/Flatcar/issues/1884))\n - Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them ([Flatcar#1933](https://github.com/flatcar/Flatcar/issues/1933))\n - Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by switching back to built-in extra firmware instead of early cpio inclusion ([Flatcar#1909](https://github.com/flatcar/Flatcar/issues/1909))\n - Fixed that the needed Flatcar extensions don't get removed on update which caused a re-download ([update_engine#51](https://github.com/flatcar/update_engine/pull/51))\n \n#### Changes:\n \n - Scaleway: The Linux console is now attached to the correct console port. ([scripts#3383](https://github.com/flatcar/scripts/pull/3383))\n \n#### Updates:\n \n - Linux ([6.12.54](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.54) (includes [6.12.53](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.53), [6.12.52](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.52)))\n - sysext-containerd: containerd ([2.0.7](https://github.com/containerd/containerd/releases/tag/v2.0.7) (includes [2.0.6](https://github.com/containerd/containerd/releases/tag/v2.0.6)))\n - sysext-containerd: runc ([1.3.3](https://github.com/opencontainers/runc/releases/tag/v1.3.3) (includes [1.3.2](https://github.com/opencontainers/runc/releases/tag/v1.3.2), [1.3.1](https://github.com/opencontainers/runc/releases/tag/v1.3.1), [1.3.0](https://github.com/opencontainers/runc/releases/tag/v1.3.0)))\n"
  },
  "4459.1.2": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-11-27 11:34:35 +0000",
    "major_software": {
      "containerd": [
        "2.0.7"
      ],
      "docker": [
        "28.0.4"
      ],
      "ignition": [
        "2.22.0"
      ],
      "kernel": [
        "6.12.58"
      ],
      "systemd": [
        "256"
      ]
    },
    "release_notes": " _Changes since **Beta 4459.1.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-40177](https://nvd.nist.gov/vuln/detail/CVE-2025-40177), [CVE-2025-40176](https://nvd.nist.gov/vuln/detail/CVE-2025-40176), [CVE-2025-40172](https://nvd.nist.gov/vuln/detail/CVE-2025-40172), [CVE-2025-40173](https://nvd.nist.gov/vuln/detail/CVE-2025-40173), [CVE-2025-40166](https://nvd.nist.gov/vuln/detail/CVE-2025-40166), [CVE-2025-40167](https://nvd.nist.gov/vuln/detail/CVE-2025-40167), [CVE-2025-40165](https://nvd.nist.gov/vuln/detail/CVE-2025-40165), [CVE-2025-40162](https://nvd.nist.gov/vuln/detail/CVE-2025-40162), [CVE-2025-40133](https://nvd.nist.gov/vuln/detail/CVE-2025-40133), [CVE-2025-40095](https://nvd.nist.gov/vuln/detail/CVE-2025-40095), [CVE-2025-40094](https://nvd.nist.gov/vuln/detail/CVE-2025-40094), [CVE-2025-40093](https://nvd.nist.gov/vuln/detail/CVE-2025-40093), [CVE-2025-40092](https://nvd.nist.gov/vuln/detail/CVE-2025-40092), [CVE-2025-40090](https://nvd.nist.gov/vuln/detail/CVE-2025-40090), [CVE-2025-40088](https://nvd.nist.gov/vuln/detail/CVE-2025-40088), [CVE-2025-40105](https://nvd.nist.gov/vuln/detail/CVE-2025-40105), [CVE-2025-40104](https://nvd.nist.gov/vuln/detail/CVE-2025-40104), [CVE-2025-40103](https://nvd.nist.gov/vuln/detail/CVE-2025-40103), [CVE-2025-40101](https://nvd.nist.gov/vuln/detail/CVE-2025-40101), [CVE-2025-40100](https://nvd.nist.gov/vuln/detail/CVE-2025-40100), [CVE-2025-40099](https://nvd.nist.gov/vuln/detail/CVE-2025-40099), [CVE-2025-40096](https://nvd.nist.gov/vuln/detail/CVE-2025-40096), [CVE-2025-40087](https://nvd.nist.gov/vuln/detail/CVE-2025-40087), [CVE-2025-40085](https://nvd.nist.gov/vuln/detail/CVE-2025-40085), [CVE-2025-40040](https://nvd.nist.gov/vuln/detail/CVE-2025-40040), [CVE-2025-40106](https://nvd.nist.gov/vuln/detail/CVE-2025-40106), [CVE-2025-40084](https://nvd.nist.gov/vuln/detail/CVE-2025-40084), [CVE-2025-40211](https://nvd.nist.gov/vuln/detail/CVE-2025-40211), [CVE-2025-40209](https://nvd.nist.gov/vuln/detail/CVE-2025-40209))\n \n #### Bug fixes:\n \n - Fixed the loading of kernel modules from system extensions via udev (e.g. at boot time).([flatcar/scripts#3367](https://github.com/flatcar/scripts/pull/3367))\n \n #### Changes:\n- Added Nutanix images ([flatcar/scripts#3311](https://github.com/flatcar/scripts/pull/3311))\n\n\n #### Updates:\n \n - Linux ([6.12.58](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.58) (includes [6.12.57](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.57), [6.12.56](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.56), [6.12.55](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.55)))"
  },
  "4515.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-12-18 15:18:34 +0000",
    "major_software": {
      "containerd": [
        "2.1.5"
      ],
      "docker": [
        "28.0.4"
      ],
      "ignition": [
        "2.22.0"
      ],
      "kernel": [
        "6.12.61"
      ],
      "systemd": [
        "257"
      ]
    },
    "release_notes": "_Changes since **Alpha 4515.0.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-40275](https://nvd.nist.gov/vuln/detail/CVE-2025-40275), [CVE-2025-40274](https://nvd.nist.gov/vuln/detail/CVE-2025-40274), [CVE-2025-40273](https://nvd.nist.gov/vuln/detail/CVE-2025-40273), [CVE-2025-40272](https://nvd.nist.gov/vuln/detail/CVE-2025-40272), [CVE-2025-40271](https://nvd.nist.gov/vuln/detail/CVE-2025-40271), [CVE-2025-40289](https://nvd.nist.gov/vuln/detail/CVE-2025-40289), [CVE-2025-40288](https://nvd.nist.gov/vuln/detail/CVE-2025-40288), [CVE-2025-40287](https://nvd.nist.gov/vuln/detail/CVE-2025-40287), [CVE-2025-40269](https://nvd.nist.gov/vuln/detail/CVE-2025-40269), [CVE-2025-40286](https://nvd.nist.gov/vuln/detail/CVE-2025-40286), [CVE-2025-40285](https://nvd.nist.gov/vuln/detail/CVE-2025-40285), [CVE-2025-40284](https://nvd.nist.gov/vuln/detail/CVE-2025-40284), [CVE-2025-40283](https://nvd.nist.gov/vuln/detail/CVE-2025-40283), [CVE-2025-40282](https://nvd.nist.gov/vuln/detail/CVE-2025-40282), [CVE-2025-40281](https://nvd.nist.gov/vuln/detail/CVE-2025-40281), [CVE-2025-40280](https://nvd.nist.gov/vuln/detail/CVE-2025-40280), [CVE-2025-40279](https://nvd.nist.gov/vuln/detail/CVE-2025-40279), [CVE-2025-40278](https://nvd.nist.gov/vuln/detail/CVE-2025-40278), [CVE-2025-40277](https://nvd.nist.gov/vuln/detail/CVE-2025-40277), [CVE-2025-40268](https://nvd.nist.gov/vuln/detail/CVE-2025-40268), [CVE-2025-40214](https://nvd.nist.gov/vuln/detail/CVE-2025-40214), [CVE-2025-40212](https://nvd.nist.gov/vuln/detail/CVE-2025-40212), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087), [CVE-2024-57879](https://nvd.nist.gov/vuln/detail/CVE-2024-57879), [CVE-2024-57880](https://nvd.nist.gov/vuln/detail/CVE-2024-57880), [CVE-2024-55642](https://nvd.nist.gov/vuln/detail/CVE-2024-55642), [CVE-2024-55641](https://nvd.nist.gov/vuln/detail/CVE-2024-55641), [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683), [CVE-2024-54460](https://nvd.nist.gov/vuln/detail/CVE-2024-54460), [CVE-2024-54191](https://nvd.nist.gov/vuln/detail/CVE-2024-54191), [CVE-2024-53689](https://nvd.nist.gov/vuln/detail/CVE-2024-53689), [CVE-2024-53682](https://nvd.nist.gov/vuln/detail/CVE-2024-53682), [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658), [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56656](https://nvd.nist.gov/vuln/detail/CVE-2024-56656), [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675), [CVE-2024-56674](https://nvd.nist.gov/vuln/detail/CVE-2024-56674), [CVE-2024-56673](https://nvd.nist.gov/vuln/detail/CVE-2024-56673), [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654), [CVE-2024-56671](https://nvd.nist.gov/vuln/detail/CVE-2024-56671), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56669](https://nvd.nist.gov/vuln/detail/CVE-2024-56669), [CVE-2024-56668](https://nvd.nist.gov/vuln/detail/CVE-2024-56668), [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56666](https://nvd.nist.gov/vuln/detail/CVE-2024-56666), [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664), [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-56652](https://nvd.nist.gov/vuln/detail/CVE-2024-56652), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2025-40261](https://nvd.nist.gov/vuln/detail/CVE-2025-40261), [CVE-2025-40266](https://nvd.nist.gov/vuln/detail/CVE-2025-40266), [CVE-2025-40264](https://nvd.nist.gov/vuln/detail/CVE-2025-40264), [CVE-2025-40263](https://nvd.nist.gov/vuln/detail/CVE-2025-40263), [CVE-2025-40262](https://nvd.nist.gov/vuln/detail/CVE-2025-40262), [CVE-2025-40254](https://nvd.nist.gov/vuln/detail/CVE-2025-40254), [CVE-2025-40253](https://nvd.nist.gov/vuln/detail/CVE-2025-40253), [CVE-2025-40252](https://nvd.nist.gov/vuln/detail/CVE-2025-40252), [CVE-2025-40251](https://nvd.nist.gov/vuln/detail/CVE-2025-40251), [CVE-2025-40250](https://nvd.nist.gov/vuln/detail/CVE-2025-40250), [CVE-2025-40259](https://nvd.nist.gov/vuln/detail/CVE-2025-40259), [CVE-2025-40258](https://nvd.nist.gov/vuln/detail/CVE-2025-40258), [CVE-2025-40257](https://nvd.nist.gov/vuln/detail/CVE-2025-40257), [CVE-2025-40246](https://nvd.nist.gov/vuln/detail/CVE-2025-40246), [CVE-2025-40248](https://nvd.nist.gov/vuln/detail/CVE-2025-40248), [CVE-2025-40345](https://nvd.nist.gov/vuln/detail/CVE-2025-40345))\n \n \n #### Updates:\n\n- Linux ([6.12.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61) (includes [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59), [6.12.60](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60)))\n- ca-certificates ([3.119](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html) (includes [3.118.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html)))\n\n _Changes since **Beta 4459.1.2**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-40275](https://nvd.nist.gov/vuln/detail/CVE-2025-40275), [CVE-2025-40274](https://nvd.nist.gov/vuln/detail/CVE-2025-40274), [CVE-2025-40273](https://nvd.nist.gov/vuln/detail/CVE-2025-40273), [CVE-2025-40272](https://nvd.nist.gov/vuln/detail/CVE-2025-40272), [CVE-2025-40271](https://nvd.nist.gov/vuln/detail/CVE-2025-40271), [CVE-2025-40289](https://nvd.nist.gov/vuln/detail/CVE-2025-40289), [CVE-2025-40288](https://nvd.nist.gov/vuln/detail/CVE-2025-40288), [CVE-2025-40287](https://nvd.nist.gov/vuln/detail/CVE-2025-40287), [CVE-2025-40269](https://nvd.nist.gov/vuln/detail/CVE-2025-40269), [CVE-2025-40286](https://nvd.nist.gov/vuln/detail/CVE-2025-40286), [CVE-2025-40285](https://nvd.nist.gov/vuln/detail/CVE-2025-40285), [CVE-2025-40284](https://nvd.nist.gov/vuln/detail/CVE-2025-40284), [CVE-2025-40283](https://nvd.nist.gov/vuln/detail/CVE-2025-40283), [CVE-2025-40282](https://nvd.nist.gov/vuln/detail/CVE-2025-40282), [CVE-2025-40281](https://nvd.nist.gov/vuln/detail/CVE-2025-40281), [CVE-2025-40280](https://nvd.nist.gov/vuln/detail/CVE-2025-40280), [CVE-2025-40279](https://nvd.nist.gov/vuln/detail/CVE-2025-40279), [CVE-2025-40278](https://nvd.nist.gov/vuln/detail/CVE-2025-40278), [CVE-2025-40277](https://nvd.nist.gov/vuln/detail/CVE-2025-40277), [CVE-2025-40268](https://nvd.nist.gov/vuln/detail/CVE-2025-40268), [CVE-2025-40214](https://nvd.nist.gov/vuln/detail/CVE-2025-40214), [CVE-2025-40212](https://nvd.nist.gov/vuln/detail/CVE-2025-40212), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087), [CVE-2024-57879](https://nvd.nist.gov/vuln/detail/CVE-2024-57879), [CVE-2024-57880](https://nvd.nist.gov/vuln/detail/CVE-2024-57880), [CVE-2024-55642](https://nvd.nist.gov/vuln/detail/CVE-2024-55642), [CVE-2024-55641](https://nvd.nist.gov/vuln/detail/CVE-2024-55641), [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683), [CVE-2024-54460](https://nvd.nist.gov/vuln/detail/CVE-2024-54460), [CVE-2024-54191](https://nvd.nist.gov/vuln/detail/CVE-2024-54191), [CVE-2024-53689](https://nvd.nist.gov/vuln/detail/CVE-2024-53689), [CVE-2024-53682](https://nvd.nist.gov/vuln/detail/CVE-2024-53682), [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658), [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56656](https://nvd.nist.gov/vuln/detail/CVE-2024-56656), [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675), [CVE-2024-56674](https://nvd.nist.gov/vuln/detail/CVE-2024-56674), [CVE-2024-56673](https://nvd.nist.gov/vuln/detail/CVE-2024-56673), [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654), [CVE-2024-56671](https://nvd.nist.gov/vuln/detail/CVE-2024-56671), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56669](https://nvd.nist.gov/vuln/detail/CVE-2024-56669), [CVE-2024-56668](https://nvd.nist.gov/vuln/detail/CVE-2024-56668), [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56666](https://nvd.nist.gov/vuln/detail/CVE-2024-56666), [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664), [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-56652](https://nvd.nist.gov/vuln/detail/CVE-2024-56652), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2025-40261](https://nvd.nist.gov/vuln/detail/CVE-2025-40261), [CVE-2025-40266](https://nvd.nist.gov/vuln/detail/CVE-2025-40266), [CVE-2025-40264](https://nvd.nist.gov/vuln/detail/CVE-2025-40264), [CVE-2025-40263](https://nvd.nist.gov/vuln/detail/CVE-2025-40263), [CVE-2025-40262](https://nvd.nist.gov/vuln/detail/CVE-2025-40262), [CVE-2025-40254](https://nvd.nist.gov/vuln/detail/CVE-2025-40254), [CVE-2025-40253](https://nvd.nist.gov/vuln/detail/CVE-2025-40253), [CVE-2025-40252](https://nvd.nist.gov/vuln/detail/CVE-2025-40252), [CVE-2025-40251](https://nvd.nist.gov/vuln/detail/CVE-2025-40251), [CVE-2025-40250](https://nvd.nist.gov/vuln/detail/CVE-2025-40250), [CVE-2025-40259](https://nvd.nist.gov/vuln/detail/CVE-2025-40259), [CVE-2025-40258](https://nvd.nist.gov/vuln/detail/CVE-2025-40258), [CVE-2025-40257](https://nvd.nist.gov/vuln/detail/CVE-2025-40257), [CVE-2025-40246](https://nvd.nist.gov/vuln/detail/CVE-2025-40246), [CVE-2025-40248](https://nvd.nist.gov/vuln/detail/CVE-2025-40248), [CVE-2025-40345](https://nvd.nist.gov/vuln/detail/CVE-2025-40345))\n - binutils ([CVE-2025-5244](https://www.cve.org/CVERecord?id=CVE-2025-5244), [CVE-2025-5245](https://www.cve.org/CVERecord?id=CVE-2025-5245) [CVE-2025-8225](https://www.cve.org/CVERecord?id=CVE-2025-8225))\n - curl ([CVE-2025-9086](https://www.cve.org/CVERecord?id=CVE-2025-9086), [CVE-2025-10148](https://www.cve.org/CVERecord?id=CVE-2025-10148))\n - expat ([CVE-2025-59375](https://www.cve.org/CVERecord?id=CVE-2025-59375))\n - go ([CVE-2025-47910](https://www.cve.org/CVERecord?id=CVE-2025-47910))\n - intel-microcode ([CVE-2024-28956](https://www.cve.org/CVERecord?id=CVE-2024-28956), [CVE-2024-43420](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420), [CVE-2024-45332](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332), [CVE-2025-20012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012), [CVE-2025-20054](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054), [CVE-2025-20103](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103), [CVE-2025-20623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623), [CVE-2025-24495](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495), [CVE-2025-20053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053), [CVE-2025-20109](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109), [CVE-2025-22839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839), [CVE-2025-22840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840), [CVE-2025-22889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889), [CVE-2025-26403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403))\n - libpcre2 ([CVE-2025-58050](https://www.cve.org/CVERecord?id=CVE-2025-58050))\n - libxml2 ([libxml2-20250908](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9))\n - libxslt ([CVE-2025-7424](https://www.cve.org/CVERecord?id=CVE-2025-7424), [CVE-2025-7425](https://www.cve.org/CVERecord?id=CVE-2025-7425))\n - net-tools ([CVE-2025-46836](https://www.cve.org/CVERecord?id=CVE-2025-46836))\n - nvidia-drivers ([CVE-2025-23280](https://www.cve.org/CVERecord?id=CVE-2025-23280), [CVE-2025-23282](https://www.cve.org/CVERecord?id=CVE-2025-23282), [CVE-2025-23300](https://www.cve.org/CVERecord?id=CVE-2025-23300), [CVE-2025-23330](https://www.cve.org/CVERecord?id=CVE-2025-23330), [CVE-2025-23332](https://www.cve.org/CVERecord?id=CVE-2025-23332), [CVE-2025-23345](https://www.cve.org/CVERecord?id=CVE-2025-23345))\n - openssh ([CVE-2025-61984](https://www.cve.org/CVERecord?id=CVE-2025-61984), [CVE-2025-61985](https://www.cve.org/CVERecord?id=CVE-2025-61985))\n - openssl ([CVE-2025-9230](https://www.cve.org/CVERecord?id=CVE-2025-9230), [CVE-2025-9231](https://www.cve.org/CVERecord?id=CVE-2025-9231), [CVE-2025-9232](https://www.cve.org/CVERecord?id=CVE-2025-9232))\n \n #### Bug fixes:\n \n - Alpha only: Added Fusion SCSI disk drivers back to the initrd after they got lost in the rework ([Flatcar#1924](https://github.com/flatcar/Flatcar/issues/1924))\n - Alpha only: Fixed systemd-sysext payload handling for air-gapped/self-hosted updates which was a known bug for 4487.0.0 ([ue-rs#93](https://github.com/flatcar/ue-rs/pull/93))\n - Configured the services in the overlaybd sysext to start automatically like the other sysexts. Note that the sysext must be enabled at boot time for this to happen, otherwise you need to call `systemd-tmpfiles --create` and `systemctl daemon-reload` first.\n - Fixed SSSD startup failure by adding back LDB modules into the image, which got lost after a Samba update ([Flatcar#1919](https://github.com/flatcar/Flatcar/issues/1919))\n - Fixed a kernel boot warning when loading an explicit list of kernel modules in the minimal first-stage initrd ([Flatcar#1934](https://github.com/flatcar/Flatcar/issues/1934))\n \n #### Changes:\n \n - Added support for the kernel cmdline parameters `flatcar.release_file_server_url` and `flatcar.dev_file_server_url` to specify custom servers where Flatcar extensions should be downloaded on boot ([bootengine#112](https://github.com/flatcar/bootengine/pull/112))\n - Alpha only: Reduced Azure image size again to 30 GB as before by shrinking the root partition to compensate for the growth of the other partitions ([scripts#3460](https://github.com/flatcar/scripts/pull/3460))\n - Increased all partition sizes: `/boot` to 1 GB, the two `/usr` partitions to 2 GB, `/oem` to 1 GB so that we can use more space in a few years when we can assume that most nodes run the new partition layout - existing nodes can still update for the next years ([scripts#3027](https://github.com/flatcar/scripts/pull/3027))\n - Reduced the kernel+initrd size on `/boot` by half. Flatcar now uses a minimal first stage initrd just to access the `/usr` partition and then switches to the full initrd that does the full system preparation as before. Since this means that the set of kernel modules available in the first initrd is reduced, please report any impact.\n - The way that files for building custom kernel modules are installed has changed from a Ubuntu-inspired method to the standard upstream kernel method. In the unlikely event that this breaks your module builds, please let the Flatcar team know immediately.\n \n #### Updates:\n \n- Linux ([6.12.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61) (includes [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49), [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50), [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59), [6.12.60](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60)))\n- Linux firmware ([20251021](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251021) (includes [20250917](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250917), [20251011](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251011)))\n- Afterburn ([5.10.0](https://coreos.github.io/afterburn/release-notes/#afterburn-5100))\n- azure, dev: inotify-tools ([4.25.9.0](https://github.com/inotify-tools/inotify-tools/releases/tag/4.25.9.0))\n- azure, stackit: chrony ([4.8](https://gitlab.com/chrony/chrony/-/raw/4.8/NEWS))\n- base, dev: bash ([5.3_p3](https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html))\n- base, dev: bind ([9.18.38](https://bind9.readthedocs.io/en/v9.18.38/notes.html#notes-for-bind-9-18-38))\n- base, dev: bpftool ([7.6.0](https://github.com/libbpf/bpftool/releases/tag/v7.6.0))\n- base, dev: btrfs-progs ([6.16.1](https://github.com/kdave/btrfs-progs/releases/tag/v6.16.1) (includes [6.16](https://github.com/kdave/btrfs-progs/releases/tag/v6.16)))\n- base, dev: coreutils ([9.7](https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00006.html) (includes [9.6](https://savannah.gnu.org/news/?id=10715)))\n- base, dev: cryptsetup ([2.8.1](https://gitlab.com/cryptsetup/cryptsetup/-/raw/v2.8.1/docs/v2.8.1-ReleaseNotes))\n- base, dev: curl ([8.16.0](https://curl.se/ch/8.16.0.html))\n- base, dev: expat ([2.7.3](https://raw.githubusercontent.com/libexpat/libexpat/refs/tags/R_2_7_3/expat/Changes) (includes [2.7.2](https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes)))\n- base, dev: gcc ([14.3.1_p20250801](https://gcc.gnu.org/pipermail/gcc/2025-May/246078.html))\n- base, dev: gettext ([0.23.2](https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=a5cc8a63eb4f06e4a1171afda862812feb67d693;hb=e8e6cb71aec0de1f5758ac21327bb8cd69e33731) (includes [0.23.0](https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=9d87d45408f510d15856a1dda8a9376573f0a9c5;hb=c12b25dc82104691ca80c4da1cbc538fcab42bf5), [0.23.1](https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=4aafedf9b10a66891838e1f35c7af020c6124ee0;hb=d9b0432a825bfe3fc72f9a081d295a9528cd8aac)))\n- base, dev: git ([2.51.0](https://github.com/git/git/blob/v2.51.0/Documentation/RelNotes/2.51.0.adoc) (includes [2.50.0](https://github.com/git/git/blob/v2.50.0/Documentation/RelNotes/2.50.0.adoc)))\n- base, dev: hwdata ([0.398](https://github.com/vcrhonek/hwdata/releases/tag/v0.398))\n- base, dev: intel-microcode ([20250812](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250812) (includes [20250512](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250512)))\n- base, dev: libffi ([3.5.2](https://github.com/libffi/libffi/releases/tag/v3.5.2))\n- base, dev: libnftnl ([1.3.0](https://lwn.net/Articles/1032725/))\n- base, dev: libxml2 ([2.14.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.6) (includes [2.13.9](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9), [2.14.0](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.0), [2.14.1](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.1), [2.14.2](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.2), [2.14.3](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.3), [2.14.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.4), [2.14.5](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.5)))\n- base, dev: ncurses ([6.5_p20250802](https://invisible-island.net/ncurses/NEWS.html#t20250802))\n- base, dev: nftables ([1.1.5](https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.5.txt) (includes [1.1.4](https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.4.txt)))\n- base, dev: nvidia-drivers-service ([570.195.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-195-03/index.html) (includes [535.274.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-274-02/index.html)))\n- base, dev: openssh ([10.2_p1](https://www.openssh.com/txt/release-10.2) (includes [10.1](https://www.openssh.com/txt/release-10.1)))\n- base, dev: openssl ([3.4.3](https://github.com/openssl/openssl/releases/tag/openssl-3.4.3))\n- base, dev: readline ([8.3_p1](https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html))\n- base, dev: samba ([4.22.3](https://www.samba.org/samba/history/samba-4.22.3.html) (includes [4.21.0](https://www.samba.org/samba/history/samba-4.21.0.html), [4.22.0](https://www.samba.org/samba/history/samba-4.22.0.html), [4.22.1](https://www.samba.org/samba/history/samba-4.22.1.html), [4.22.2](https://www.samba.org/samba/history/samba-4.22.2.html)))\n- base, dev: talloc ([2.4.3](https://gitlab.com/samba-team/samba/-/commit/77229f73c20af69ab0f3c96efbb229ff64a9dfe4))\n- base, dev: tdb ([1.4.13](https://gitlab.com/samba-team/samba/-/commit/70a8c7a89a6d62d2ff172d79b5f4e6439300b88d))\n- base, dev: tevent ([0.16.2](https://gitlab.com/samba-team/samba/-/commit/8d398acbbb7fdc0ff50fe6ba80433deaf92515c6))\n- base, dev: xfsprogs ([6.16.0](https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.16.0) (includes [6.15.0](https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.15.0)))\n- ca-certificates ([3.119](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html) (includes [3.118.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html)))\n- dev, sysext-incus: squashfs-tools ([4.7.2](https://github.com/plougher/squashfs-tools/releases/tag/4.7.2) (includes [4.7.1](https://github.com/plougher/squashfs-tools/releases/tag/4.7.1)))\n- dev: binutils ([2.45](https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00009.html))\n- sdk: azure-core ([1.16.1](https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-core_1.16.1))\n- sdk: azure-identity ([1.13.1](https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-identity_1.13.1))\n- sdk: cmake ([3.31.9](https://cmake.org/cmake/help/v3.31/release/3.31.html#id1))\n- sdk: go ([1.25.1](https://go.dev/doc/devel/release#go1.25.minor) (includes [1.24.7](https://go.dev/doc/devel/release#go1.24.minor), [1.25](https://go.dev/doc/go1.25)))\n- sdk: pkgcheck ([0.10.37](https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.37))\n- sdk: qemu ([10.0.5](https://wiki.qemu.org/ChangeLog/10.0))\n- sdk: rust ([1.89.0](https://blog.rust-lang.org/2025/08/07/Rust-1.89.0/))\n- sysext-containerd: containerd ([2.1.4](https://github.com/containerd/containerd/releases/tag/v2.1.4))\n- sysext-containerd: runc ([1.3.1](https://github.com/opencontainers/runc/releases/tag/v1.3.1))\n- sysext-incus, sysext-podman, vmware: fuse ([3.17.4](https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.4))\n- sysext-nvidia-drivers-535: nvidia-drivers ([535.274.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-274-02/index.html))\n- sysext-nvidia-drivers-570: nvidia-drivers ([570.195.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-195-03/index.html) (includes 570.190))\n- sysext-podman: crun ([1.21](https://github.com/containers/crun/releases/tag/1.21))\n- sysext-podman: gpgme ([2.0.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=cd0e093bf83fe47b6773fb478fced07d8409fbe0;hb=e17ba578861905857da0a514b4fc9b88a57f7346))\n- sysext-podman: netavark ([1.15.2](https://github.com/containers/netavark/releases/tag/v1.15.2) (includes [1.15.0](https://github.com/containers/netavark/releases/tag/v1.15.0), [1.15.1](https://github.com/containers/netavark/releases/tag/v1.15.1)))\n- sysext-podman: passt ([2025.06.11](https://archives.passt.top/passt-user/20250611175947.7d540ddc@elisabeth/T/#u))\n- sysext-python: charset-normalizer ([3.4.3](https://github.com/jawah/charset_normalizer/releases/tag/3.4.3))\n- sysext-python: jaraco-functools ([4.3.0](https://raw.githubusercontent.com/jaraco/jaraco.functools/refs/tags/v4.3.0/NEWS.rst))\n- sysext-python: markdown-it-py ([4.0.0](https://github.com/executablebooks/markdown-it-py/releases/tag/v4.0.0))\n- sysext-python: pip ([25.2](https://raw.githubusercontent.com/pypa/pip/refs/tags/25.2/NEWS.rst))\n- sysext-python: platformdirs ([4.4.0](https://github.com/tox-dev/platformdirs/releases/tag/4.4.0))\n- sysext-python: requests ([2.32.5](https://github.com/psf/requests/releases/tag/v2.32.5))\n- sysext-python: typing-extensions ([4.15.0](https://raw.githubusercontent.com/python/typing_extensions/refs/tags/4.15.0/CHANGELOG.md))\n- systemd (257.9)\n- vmware: open-vm-tools ([13.0.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-13.0.5))\n"
  },
  "4547.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2026-01-27 14:42:03 +0000",
    "major_software": {
      "containerd": [
        "2.1.5"
      ],
      "docker": [
        "28.0.4"
      ],
      "ignition": [
        "2.24.0"
      ],
      "kernel": [
        "6.12.66"
      ],
      "systemd": [
        "257"
      ]
    },
    "release_notes": "_Changes since **Beta 4515.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332), [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336), [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266), [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261), [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258), [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256), [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254), [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764), [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765), [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758), [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756), [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763), [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742), [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740), [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747), [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724), [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379), [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733), [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728), [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374), [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349), [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347), [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371), [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367), [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364), [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363), [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361), [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354), [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325), [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157), [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154), [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151), [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149), [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146), [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143), [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138), [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136), [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133), [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131), [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129), [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109), [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107), [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126), [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123), [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104), [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120), [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118), [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114), [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112), [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079), [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086), [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084), [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082), [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100), [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081), [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097), [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095), [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093), [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089), [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078), [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073), [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071), [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068), [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066), [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076), [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065), [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822), [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785), [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789), [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818), [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816), [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788), [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813), [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810), [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808), [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787), [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803), [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801), [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799), [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797), [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795), [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776), [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774), [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772), [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770), [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784), [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782), [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780), [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777), [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144), [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127), [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982), [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979), [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994), [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992), [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990), [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988), [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977), [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\n- coreutils ([CVE-2025-5278](https://www.cve.org/CVERecord?id=CVE-2025-5278))\n- go ([CVE-2025-47912](https://www.cve.org/CVERecord?id=CVE-2025-47912), [CVE-2025-58183](https://www.cve.org/CVERecord?id=CVE-2025-58183), [CVE-2025-58185](https://www.cve.org/CVERecord?id=CVE-2025-58185), [CVE-2025-58186](https://www.cve.org/CVERecord?id=CVE-2025-58186), [CVE-2025-58187](https://www.cve.org/CVERecord?id=CVE-2025-58187), [CVE-2025-58188](https://www.cve.org/CVERecord?id=CVE-2025-58188), [CVE-2025-58189](https://www.cve.org/CVERecord?id=CVE-2025-58189), [CVE-2025-61723](https://www.cve.org/CVERecord?id=CVE-2025-61723), [CVE-2025-61724](https://www.cve.org/CVERecord?id=CVE-2025-61724), [CVE-2025-61725](https://www.cve.org/CVERecord?id=CVE-2025-61725))\n- pam ([CVE-2024-22365](https://nvd.nist.gov/vuln/detail/CVE-2024-22365), [CVE-2024-10041](https://nvd.nist.gov/vuln/detail/CVE-2024-10041), [CVE-2024-10963](https://nvd.nist.gov/vuln/detail/CVE-2024-10963), [CVE-2025-6020](https://nvd.nist.gov/vuln/detail/CVE-2025-6020))\n- openssl ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187), [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467), [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468), [CVE-2025-15469](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469), [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199), [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160), [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418), [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419), [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420), [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421), [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795), [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\n\n\n#### Bug fixes:\n\n- Dropped debug symbols from containerd, incus, and overlaybd system extensions to reduce download size.\n\n#### Changes:\n\n- Dropped Ciphers, MACs, and KexAlgorithms from the sshd configuration so that the OpenSSH upstream defaults are used. This introduces post-quantum key exchange algorithms for better security. ([Flatcar#1921](https://github.com/flatcar/Flatcar/issues/1921)). Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable this by deploying a custom drop-in config  to `/etc/ssh/sshd_config.d/`.\n- `/etc/shadow`, `/etc/gshadow` are now owned by the `shadow` group, `/usr/bin/unix_chkpwd`, `/usr/bin/chage` and `/usr/bin/expiry` are now also owned by the `shadow` group with a sticky bit enabled.\n\n#### Updates:\n\n- Ignition ([2.24.0](https://coreos.github.io/ignition/release-notes/#ignition-2240-2024-10-14))\n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66) (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65), [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64), [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63), [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62), [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59)))\n- Linux Firmware ([20251125](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251125) (includes [20251111](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251111)))\n- SDK: cmake ([4.1.2](https://cmake.org/cmake/help/v4.1/release/4.1.html#id22) (includes [4.1.1](https://cmake.org/cmake/help/v4.1/release/4.1.html#id21), [4.1](https://cmake.org/cmake/help/v4.1/release/4.1.html), [4.0](https://cmake.org/cmake/help/v4.0/release/4.0.html)))\n- SDK: go ([1.25.3](https://go.dev/doc/devel/release#go1.25.minor))\n- SDK: meson ([1.9.1](https://mesonbuild.com/Release-notes-for-1-9-0.html) (includes [1.8.0](https://mesonbuild.com/Release-notes-for-1-8-0.html)))\n- SDK: nasm ([3.01](https://www.nasm.us/docs/3.01/nasmac.html) (includes [3.00](https://www.nasm.us/docs/3.00/nasmac.html)))\n- base, dev: btrfs-progs ([6.17](https://github.com/kdave/btrfs-progs/releases/tag/v6.17))\n- base, dev: cifs-utils ([7.4](https://lwn.net/Articles/1024956/))\n- base, dev: coreutils ([9.8](https://lists.gnu.org/archive/html/info-gnu/2025-09/msg00005.html))\n- base, dev: hwdata ([0.400](https://github.com/vcrhonek/hwdata/releases/tag/v0.400) (includes [0.399](https://github.com/vcrhonek/hwdata/releases/tag/v0.399)))\n- base, dev: inih ([62](https://github.com/benhoyt/inih/releases/tag/r62) (includes [61](https://github.com/benhoyt/inih/releases/tag/r61)))\n- base, dev: intel-microcode ([20251111_p20251112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111))\n- base, dev: iproute2 ([6.17.0](https://lore.kernel.org/all/20250929095042.48200315@hermes.local/))\n- base, dev: jose ([14](https://github.com/latchset/jose/releases/tag/v14) (includes [13](https://github.com/latchset/jose/releases/tag/v13)))\n- base, dev: kbd ([2.9.0](https://github.com/legionus/kbd/releases/tag/v2.9.0))\n- base, dev: less ([685](https://greenwoodsoftware.com/less/news.685.html))\n- base, dev: libgpg-error ([1.56](https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.56))\n- base, dev: libtirpc ([1.3.7](https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-7))\n- base, dev: pam ([1.7.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.1) (includes [1.7.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.0), [1.6.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.1), [1.6.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0)))\n- base, dev: pambase ([20251013](https://gitweb.gentoo.org/proj/pambase.git/log/?h=pambase-20251013))\n- base, dev: samba ([4.22.5](https://www.samba.org/samba/history/samba-4.22.5.html) (includes [4.22.4](https://www.samba.org/samba/history/samba-4.22.4.html)))\n- base, dev: strace ([6.17](https://github.com/strace/strace/releases/tag/v6.17))\n- base, dev: thin-provisioning-tools ([1.3.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.3.0/CHANGES) (includes [1.2.2](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.2/CHANGES), [1.2.1](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.1/CHANGES), [1.2.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.0/CHANGES), [1.1.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.1.0/CHANGES), [1.0.14](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.14/CHANGES), [1.0.13](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.13/CHANGES), [1.0.12](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.12/CHANGES), [1.0.11](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.11/CHANGES)))\n- base, dev: util-linux ([2.41.2](https://github.com/util-linux/util-linux/blob/v2.41.2/Documentation/releases/v2.41.2-ReleaseNotes))\n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\n- dev: portage ([3.0.69.3](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.3) (includes [3.0.69.2](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.2), [3.0.69.1](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.1), [3.0.69](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69)))\n- sysext-overlaybd: overlaybd ([1.0.16](https://github.com/containerd/overlaybd/releases/tag/v1.0.16))\n- sysext-podman: aardvark-dns ([1.15.0](https://github.com/containers/aardvark-dns/releases/tag/v1.15.0))\n- sysext-podman: netavark ([1.16.1](https://github.com/containers/netavark/releases/tag/v1.16.1) (includes [1.16.0](https://github.com/containers/netavark/releases/tag/v1.16.0)))\n- sysext-python: more-itertools ([10.8.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.8.0))\n- sysext-python: platformdirs ([4.5.0](https://github.com/tox-dev/platformdirs/releases/tag/4.5.0))\n- sysext-python: resolvelib ([1.2.1](https://raw.githubusercontent.com/sarugaku/resolvelib/refs/tags/1.2.1/CHANGELOG.rst))\n- sysext-python: rich ([14.2.0](https://github.com/Textualize/rich/releases/tag/v14.2.0))\n- sysext-python: setuptools-scm ([9.2.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.2.0) (includes [9.1.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.1.0), [9.0.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.0.0)))\n- sysext-python: trove-classifiers ([2025.9.11.17](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.11.17) (includes [2025.9.9.12](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.9.12), [2025.9.8.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.8.13)))\n- openssl ([3.5.5](https://github.com/openssl/openssl/releases/tag/openssl-3.5.5))"
  },
  "4593.1.0": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2026-03-09 13:30:26 +0000",
    "major_software": {
      "containerd": [
        "2.1.5"
      ],
      "docker": [
        "28.0.4"
      ],
      "ignition": [
        "2.24.0"
      ],
      "kernel": [
        "6.12.74"
      ],
      "systemd": [
        "257"
      ]
    },
    "release_notes": "_Changes since **Beta 4547.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2026-23145](https://nvd.nist.gov/vuln/detail/CVE-2026-23145), [CVE-2026-23144](https://nvd.nist.gov/vuln/detail/CVE-2026-23144), [CVE-2026-23142](https://nvd.nist.gov/vuln/detail/CVE-2026-23142), [CVE-2026-23141](https://nvd.nist.gov/vuln/detail/CVE-2026-23141), [CVE-2026-23054](https://nvd.nist.gov/vuln/detail/CVE-2026-23054), [CVE-2026-23053](https://nvd.nist.gov/vuln/detail/CVE-2026-23053), [CVE-2026-23050](https://nvd.nist.gov/vuln/detail/CVE-2026-23050), [CVE-2026-23049](https://nvd.nist.gov/vuln/detail/CVE-2026-23049), [CVE-2025-71196](https://nvd.nist.gov/vuln/detail/CVE-2025-71196), [CVE-2025-71195](https://nvd.nist.gov/vuln/detail/CVE-2025-71195), [CVE-2026-23055](https://nvd.nist.gov/vuln/detail/CVE-2026-23055), [CVE-2025-71193](https://nvd.nist.gov/vuln/detail/CVE-2025-71193), [CVE-2025-71194](https://nvd.nist.gov/vuln/detail/CVE-2025-71194), [CVE-2026-23038](https://nvd.nist.gov/vuln/detail/CVE-2026-23038), [CVE-2026-23037](https://nvd.nist.gov/vuln/detail/CVE-2026-23037), [CVE-2026-23026](https://nvd.nist.gov/vuln/detail/CVE-2026-23026), [CVE-2026-23025](https://nvd.nist.gov/vuln/detail/CVE-2026-23025), [CVE-2025-71191](https://nvd.nist.gov/vuln/detail/CVE-2025-71191), [CVE-2025-71190](https://nvd.nist.gov/vuln/detail/CVE-2025-71190), [CVE-2025-71189](https://nvd.nist.gov/vuln/detail/CVE-2025-71189), [CVE-2025-71188](https://nvd.nist.gov/vuln/detail/CVE-2025-71188), [CVE-2026-23035](https://nvd.nist.gov/vuln/detail/CVE-2026-23035), [CVE-2026-23033](https://nvd.nist.gov/vuln/detail/CVE-2026-23033), [CVE-2026-23032](https://nvd.nist.gov/vuln/detail/CVE-2026-23032), [CVE-2026-23031](https://nvd.nist.gov/vuln/detail/CVE-2026-23031), [CVE-2026-23030](https://nvd.nist.gov/vuln/detail/CVE-2026-23030), [CVE-2025-71185](https://nvd.nist.gov/vuln/detail/CVE-2025-71185), [CVE-2025-71186](https://nvd.nist.gov/vuln/detail/CVE-2025-71186), [CVE-2026-23003](https://nvd.nist.gov/vuln/detail/CVE-2026-23003), [CVE-2026-23002](https://nvd.nist.gov/vuln/detail/CVE-2026-23002), [CVE-2026-23001](https://nvd.nist.gov/vuln/detail/CVE-2026-23001), [CVE-2026-23000](https://nvd.nist.gov/vuln/detail/CVE-2026-23000), [CVE-2026-22999](https://nvd.nist.gov/vuln/detail/CVE-2026-22999), [CVE-2026-22998](https://nvd.nist.gov/vuln/detail/CVE-2026-22998), [CVE-2026-22997](https://nvd.nist.gov/vuln/detail/CVE-2026-22997), [CVE-2026-22996](https://nvd.nist.gov/vuln/detail/CVE-2026-22996), [CVE-2026-23013](https://nvd.nist.gov/vuln/detail/CVE-2026-23013), [CVE-2026-23011](https://nvd.nist.gov/vuln/detail/CVE-2026-23011), [CVE-2026-23010](https://nvd.nist.gov/vuln/detail/CVE-2026-23010), [CVE-2026-23006](https://nvd.nist.gov/vuln/detail/CVE-2026-23006), [CVE-2026-23005](https://nvd.nist.gov/vuln/detail/CVE-2026-23005), [CVE-2025-71162](https://nvd.nist.gov/vuln/detail/CVE-2025-71162), [CVE-2025-71163](https://nvd.nist.gov/vuln/detail/CVE-2025-71163), [CVE-2026-23135](https://nvd.nist.gov/vuln/detail/CVE-2026-23135), [CVE-2026-23133](https://nvd.nist.gov/vuln/detail/CVE-2026-23133), [CVE-2026-23131](https://nvd.nist.gov/vuln/detail/CVE-2026-23131), [CVE-2026-23121](https://nvd.nist.gov/vuln/detail/CVE-2026-23121), [CVE-2026-23120](https://nvd.nist.gov/vuln/detail/CVE-2026-23120), [CVE-2026-23119](https://nvd.nist.gov/vuln/detail/CVE-2026-23119), [CVE-2026-23116](https://nvd.nist.gov/vuln/detail/CVE-2026-23116), [CVE-2026-23129](https://nvd.nist.gov/vuln/detail/CVE-2026-23129), [CVE-2026-23128](https://nvd.nist.gov/vuln/detail/CVE-2026-23128), [CVE-2026-23126](https://nvd.nist.gov/vuln/detail/CVE-2026-23126), [CVE-2026-23125](https://nvd.nist.gov/vuln/detail/CVE-2026-23125), [CVE-2026-23124](https://nvd.nist.gov/vuln/detail/CVE-2026-23124), [CVE-2026-23123](https://nvd.nist.gov/vuln/detail/CVE-2026-23123), [CVE-2025-71200](https://nvd.nist.gov/vuln/detail/CVE-2025-71200), [CVE-2026-23113](https://nvd.nist.gov/vuln/detail/CVE-2026-23113), [CVE-2026-23089](https://nvd.nist.gov/vuln/detail/CVE-2026-23089), [CVE-2026-23098](https://nvd.nist.gov/vuln/detail/CVE-2026-23098), [CVE-2026-23097](https://nvd.nist.gov/vuln/detail/CVE-2026-23097), [CVE-2026-23096](https://nvd.nist.gov/vuln/detail/CVE-2026-23096), [CVE-2026-23095](https://nvd.nist.gov/vuln/detail/CVE-2026-23095), [CVE-2026-23094](https://nvd.nist.gov/vuln/detail/CVE-2026-23094), [CVE-2026-23110](https://nvd.nist.gov/vuln/detail/CVE-2026-23110), [CVE-2026-23091](https://nvd.nist.gov/vuln/detail/CVE-2026-23091), [CVE-2026-23108](https://nvd.nist.gov/vuln/detail/CVE-2026-23108), [CVE-2026-23107](https://nvd.nist.gov/vuln/detail/CVE-2026-23107), [CVE-2026-23105](https://nvd.nist.gov/vuln/detail/CVE-2026-23105), [CVE-2026-23103](https://nvd.nist.gov/vuln/detail/CVE-2026-23103), [CVE-2026-23101](https://nvd.nist.gov/vuln/detail/CVE-2026-23101), [CVE-2026-23099](https://nvd.nist.gov/vuln/detail/CVE-2026-23099), [CVE-2026-23090](https://nvd.nist.gov/vuln/detail/CVE-2026-23090), [CVE-2026-23062](https://nvd.nist.gov/vuln/detail/CVE-2026-23062), [CVE-2026-23061](https://nvd.nist.gov/vuln/detail/CVE-2026-23061), [CVE-2026-23060](https://nvd.nist.gov/vuln/detail/CVE-2026-23060), [CVE-2026-23059](https://nvd.nist.gov/vuln/detail/CVE-2026-23059), [CVE-2026-23058](https://nvd.nist.gov/vuln/detail/CVE-2026-23058), [CVE-2026-23057](https://nvd.nist.gov/vuln/detail/CVE-2026-23057), [CVE-2026-23088](https://nvd.nist.gov/vuln/detail/CVE-2026-23088), [CVE-2026-23087](https://nvd.nist.gov/vuln/detail/CVE-2026-23087), [CVE-2026-23086](https://nvd.nist.gov/vuln/detail/CVE-2026-23086), [CVE-2026-23085](https://nvd.nist.gov/vuln/detail/CVE-2026-23085), [CVE-2026-23084](https://nvd.nist.gov/vuln/detail/CVE-2026-23084), [CVE-2026-23083](https://nvd.nist.gov/vuln/detail/CVE-2026-23083), [CVE-2026-23056](https://nvd.nist.gov/vuln/detail/CVE-2026-23056), [CVE-2026-23082](https://nvd.nist.gov/vuln/detail/CVE-2026-23082), [CVE-2026-23080](https://nvd.nist.gov/vuln/detail/CVE-2026-23080), [CVE-2026-23078](https://nvd.nist.gov/vuln/detail/CVE-2026-23078), [CVE-2026-23076](https://nvd.nist.gov/vuln/detail/CVE-2026-23076), [CVE-2026-23075](https://nvd.nist.gov/vuln/detail/CVE-2026-23075), [CVE-2026-23074](https://nvd.nist.gov/vuln/detail/CVE-2026-23074), [CVE-2026-23073](https://nvd.nist.gov/vuln/detail/CVE-2026-23073), [CVE-2025-71199](https://nvd.nist.gov/vuln/detail/CVE-2025-71199), [CVE-2026-23072](https://nvd.nist.gov/vuln/detail/CVE-2026-23072), [CVE-2026-23071](https://nvd.nist.gov/vuln/detail/CVE-2026-23071), [CVE-2026-23069](https://nvd.nist.gov/vuln/detail/CVE-2026-23069), [CVE-2026-23068](https://nvd.nist.gov/vuln/detail/CVE-2026-23068), [CVE-2026-23065](https://nvd.nist.gov/vuln/detail/CVE-2026-23065), [CVE-2026-23064](https://nvd.nist.gov/vuln/detail/CVE-2026-23064), [CVE-2026-23063](https://nvd.nist.gov/vuln/detail/CVE-2026-23063), [CVE-2025-71197](https://nvd.nist.gov/vuln/detail/CVE-2025-71197), [CVE-2025-71198](https://nvd.nist.gov/vuln/detail/CVE-2025-71198), [CVE-2026-23212](https://nvd.nist.gov/vuln/detail/CVE-2026-23212), [CVE-2026-23173](https://nvd.nist.gov/vuln/detail/CVE-2026-23173), [CVE-2026-23172](https://nvd.nist.gov/vuln/detail/CVE-2026-23172), [CVE-2026-23155](https://nvd.nist.gov/vuln/detail/CVE-2026-23155), [CVE-2026-23154](https://nvd.nist.gov/vuln/detail/CVE-2026-23154), [CVE-2026-23151](https://nvd.nist.gov/vuln/detail/CVE-2026-23151), [CVE-2026-23150](https://nvd.nist.gov/vuln/detail/CVE-2026-23150), [CVE-2026-23170](https://nvd.nist.gov/vuln/detail/CVE-2026-23170), [CVE-2026-23168](https://nvd.nist.gov/vuln/detail/CVE-2026-23168), [CVE-2026-23167](https://nvd.nist.gov/vuln/detail/CVE-2026-23167), [CVE-2026-23166](https://nvd.nist.gov/vuln/detail/CVE-2026-23166), [CVE-2026-23148](https://nvd.nist.gov/vuln/detail/CVE-2026-23148), [CVE-2026-23164](https://nvd.nist.gov/vuln/detail/CVE-2026-23164), [CVE-2026-23163](https://nvd.nist.gov/vuln/detail/CVE-2026-23163), [CVE-2026-23161](https://nvd.nist.gov/vuln/detail/CVE-2026-23161), [CVE-2026-23160](https://nvd.nist.gov/vuln/detail/CVE-2026-23160), [CVE-2026-23159](https://nvd.nist.gov/vuln/detail/CVE-2026-23159), [CVE-2026-23158](https://nvd.nist.gov/vuln/detail/CVE-2026-23158), [CVE-2026-23156](https://nvd.nist.gov/vuln/detail/CVE-2026-23156), [CVE-2026-23146](https://nvd.nist.gov/vuln/detail/CVE-2026-23146), [CVE-2026-23118](https://nvd.nist.gov/vuln/detail/CVE-2026-23118), [CVE-2024-57881](https://nvd.nist.gov/vuln/detail/CVE-2024-57881), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-53685](https://nvd.nist.gov/vuln/detail/CVE-2024-53685), [CVE-2024-52319](https://nvd.nist.gov/vuln/detail/CVE-2024-52319), [CVE-2024-51729](https://nvd.nist.gov/vuln/detail/CVE-2024-51729), [CVE-2024-49573](https://nvd.nist.gov/vuln/detail/CVE-2024-49573), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-49568](https://nvd.nist.gov/vuln/detail/CVE-2024-49568), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56788](https://nvd.nist.gov/vuln/detail/CVE-2024-56788), [CVE-2024-56372](https://nvd.nist.gov/vuln/detail/CVE-2024-56372), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-56368](https://nvd.nist.gov/vuln/detail/CVE-2024-56368), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2024-54680](https://nvd.nist.gov/vuln/detail/CVE-2024-54680), [CVE-2024-54455](https://nvd.nist.gov/vuln/detail/CVE-2024-54455), [CVE-2024-54193](https://nvd.nist.gov/vuln/detail/CVE-2024-54193), [CVE-2024-41149](https://nvd.nist.gov/vuln/detail/CVE-2024-41149), [CVE-2024-46896](https://nvd.nist.gov/vuln/detail/CVE-2024-46896), [CVE-2024-56719](https://nvd.nist.gov/vuln/detail/CVE-2024-56719), [CVE-2024-56718](https://nvd.nist.gov/vuln/detail/CVE-2024-56718), [CVE-2024-56717](https://nvd.nist.gov/vuln/detail/CVE-2024-56717), [CVE-2024-56716](https://nvd.nist.gov/vuln/detail/CVE-2024-56716), [CVE-2024-56715](https://nvd.nist.gov/vuln/detail/CVE-2024-56715), [CVE-2024-56714](https://nvd.nist.gov/vuln/detail/CVE-2024-56714), [CVE-2024-56713](https://nvd.nist.gov/vuln/detail/CVE-2024-56713), [CVE-2024-56712](https://nvd.nist.gov/vuln/detail/CVE-2024-56712), [CVE-2024-56710](https://nvd.nist.gov/vuln/detail/CVE-2024-56710), [CVE-2024-56711](https://nvd.nist.gov/vuln/detail/CVE-2024-56711), [CVE-2024-56709](https://nvd.nist.gov/vuln/detail/CVE-2024-56709), [CVE-2024-53164](https://nvd.nist.gov/vuln/detail/CVE-2024-53164), [CVE-2026-23216](https://nvd.nist.gov/vuln/detail/CVE-2026-23216), [CVE-2026-23215](https://nvd.nist.gov/vuln/detail/CVE-2026-23215), [CVE-2026-23214](https://nvd.nist.gov/vuln/detail/CVE-2026-23214), [CVE-2026-23213](https://nvd.nist.gov/vuln/detail/CVE-2026-23213), [CVE-2025-71228](https://nvd.nist.gov/vuln/detail/CVE-2025-71228), [CVE-2026-23219](https://nvd.nist.gov/vuln/detail/CVE-2026-23219), [CVE-2025-71225](https://nvd.nist.gov/vuln/detail/CVE-2025-71225), [CVE-2026-23206](https://nvd.nist.gov/vuln/detail/CVE-2026-23206), [CVE-2026-23209](https://nvd.nist.gov/vuln/detail/CVE-2026-23209), [CVE-2025-71222](https://nvd.nist.gov/vuln/detail/CVE-2025-71222), [CVE-2026-23180](https://nvd.nist.gov/vuln/detail/CVE-2026-23180), [CVE-2026-23179](https://nvd.nist.gov/vuln/detail/CVE-2026-23179), [CVE-2026-23178](https://nvd.nist.gov/vuln/detail/CVE-2026-23178), [CVE-2026-23177](https://nvd.nist.gov/vuln/detail/CVE-2026-23177), [CVE-2026-23176](https://nvd.nist.gov/vuln/detail/CVE-2026-23176), [CVE-2026-23205](https://nvd.nist.gov/vuln/detail/CVE-2026-23205), [CVE-2026-23204](https://nvd.nist.gov/vuln/detail/CVE-2026-23204), [CVE-2026-23202](https://nvd.nist.gov/vuln/detail/CVE-2026-23202), [CVE-2026-23201](https://nvd.nist.gov/vuln/detail/CVE-2026-23201), [CVE-2026-23200](https://nvd.nist.gov/vuln/detail/CVE-2026-23200), [CVE-2026-23199](https://nvd.nist.gov/vuln/detail/CVE-2026-23199), [CVE-2026-23198](https://nvd.nist.gov/vuln/detail/CVE-2026-23198), [CVE-2026-23193](https://nvd.nist.gov/vuln/detail/CVE-2026-23193), [CVE-2026-23191](https://nvd.nist.gov/vuln/detail/CVE-2026-23191), [CVE-2025-71224](https://nvd.nist.gov/vuln/detail/CVE-2025-71224), [CVE-2026-23190](https://nvd.nist.gov/vuln/detail/CVE-2026-23190), [CVE-2026-23189](https://nvd.nist.gov/vuln/detail/CVE-2026-23189), [CVE-2026-23188](https://nvd.nist.gov/vuln/detail/CVE-2026-23188), [CVE-2026-23187](https://nvd.nist.gov/vuln/detail/CVE-2026-23187), [CVE-2026-23182](https://nvd.nist.gov/vuln/detail/CVE-2026-23182), [CVE-2025-71223](https://nvd.nist.gov/vuln/detail/CVE-2025-71223), [CVE-2025-71220](https://nvd.nist.gov/vuln/detail/CVE-2025-71220), [CVE-2025-71203](https://nvd.nist.gov/vuln/detail/CVE-2025-71203), [CVE-2025-71204](https://nvd.nist.gov/vuln/detail/CVE-2025-71204), [CVE-2026-23112](https://nvd.nist.gov/vuln/detail/CVE-2026-23112), [CVE-2026-23111](https://nvd.nist.gov/vuln/detail/CVE-2026-23111), [CVE-2026-23220](https://nvd.nist.gov/vuln/detail/CVE-2026-23220), [CVE-2025-71237](https://nvd.nist.gov/vuln/detail/CVE-2025-71237), [CVE-2025-71236](https://nvd.nist.gov/vuln/detail/CVE-2025-71236), [CVE-2025-71235](https://nvd.nist.gov/vuln/detail/CVE-2025-71235), [CVE-2025-71234](https://nvd.nist.gov/vuln/detail/CVE-2025-71234), [CVE-2025-71233](https://nvd.nist.gov/vuln/detail/CVE-2025-71233), [CVE-2025-71232](https://nvd.nist.gov/vuln/detail/CVE-2025-71232), [CVE-2025-71231](https://nvd.nist.gov/vuln/detail/CVE-2025-71231), [CVE-2026-23230](https://nvd.nist.gov/vuln/detail/CVE-2026-23230), [CVE-2026-23229](https://nvd.nist.gov/vuln/detail/CVE-2026-23229), [CVE-2026-23228](https://nvd.nist.gov/vuln/detail/CVE-2026-23228), [CVE-2026-23224](https://nvd.nist.gov/vuln/detail/CVE-2026-23224), [CVE-2026-23223](https://nvd.nist.gov/vuln/detail/CVE-2026-23223), [CVE-2026-23222](https://nvd.nist.gov/vuln/detail/CVE-2026-23222), [CVE-2025-71229](https://nvd.nist.gov/vuln/detail/CVE-2025-71229), [CVE-2026-23237](https://nvd.nist.gov/vuln/detail/CVE-2026-23237), [CVE-2026-23238](https://nvd.nist.gov/vuln/detail/CVE-2026-23238), [CVE-2026-23236](https://nvd.nist.gov/vuln/detail/CVE-2026-23236), [CVE-2026-23235](https://nvd.nist.gov/vuln/detail/CVE-2026-23235), [CVE-2026-23234](https://nvd.nist.gov/vuln/detail/CVE-2026-23234), [CVE-2026-23233](https://nvd.nist.gov/vuln/detail/CVE-2026-23233), [CVE-2025-71238](https://nvd.nist.gov/vuln/detail/CVE-2025-71238))\n- gnupg ([CVE-2025-68972](https://www.cve.org/CVERecord/?id=CVE-2025-68972), [CVE-2025-68973](https://www.cve.org/CVERecord/?id=CVE-2025-68973), [gnupg-20251228-notdash](https://gpg.fail/notdash))\n\n#### Bug fixes:\n\n- Enabled back PAM sssd support for LDAP authentication ([scripts#3696](https://github.com/flatcar/scripts/pull/3696))\n\n#### Changes:\n\n- Enabled netkit module ([scripts#3524](https://github.com/flatcar/scripts/pull/3524))\n- Function tracer (ftrace) enabled in ARM64 builds. (Enables CONFIG_FUNCTION_TRACER & CONFIG_DYNAMIC_FTRACE for observability and security tools) ([flatcar/scripts#3685](https://github.com/flatcar/scripts/pull/3685))\n\n#### Updates:\n\n- base, dev: gnupg ([2.5.16](https://lists.gnupg.org/pipermail/gnupg-announce/2025q4/000500.html) (includes [2.5](https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00005.html)))\n- base, dev: libgpg-error ([1.57](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob_plain;f=NEWS;h=52ac1464a0c0af091a3d69e8c5f2f3afa2cc3c9f;hb=39d7b85a7d69975f1dfec5a0add10b4d57dcfc9e))\n- ca-certificates ([3.120.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120_1.html))\n- dracut ([109](https://github.com/dracut-ng/dracut-ng/releases/tag/109) (includes [108](https://github.com/dracut-ng/dracut-ng/releases/tag/108), [107](https://github.com/dracut-ng/dracut-ng/releases/tag/107)))\n- etcdctl ([3.5.18](https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md#v3518-2025-01-24))\n- Linux ([6.12.74](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.74) (includes [6.12.73](https://lwn.net/Articles/1059031),[6.12.72](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.72), [6.12.71](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.71), [6.12.70](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.70), [6.12.69](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.69), [6.12.68](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.68), [6.12.67](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.67), [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64), [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63), [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62)))\n- python ([3.12.12](https://www.python.org/downloads/release/python-31212/) (includes [3.12.0](https://www.python.org/downloads/release/python-3120/)))\n- sysext-podman: gpgme ([2.0.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=1fd34dbd9143829e9163d402ab0191a9fc6adab2;hb=e4adebe020b07bc47e583817576ce98ca93e9711))"
  },
  "current": {
    "channel": "beta",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2026-03-09 13:30:26 +0000",
    "major_software": {
      "containerd": [
        "2.1.5"
      ],
      "docker": [
        "28.0.4"
      ],
      "ignition": [
        "2.24.0"
      ],
      "kernel": [
        "6.12.74"
      ],
      "systemd": [
        "257"
      ]
    },
    "release_notes": "_Changes since **Beta 4547.1.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2026-23145](https://nvd.nist.gov/vuln/detail/CVE-2026-23145), [CVE-2026-23144](https://nvd.nist.gov/vuln/detail/CVE-2026-23144), [CVE-2026-23142](https://nvd.nist.gov/vuln/detail/CVE-2026-23142), [CVE-2026-23141](https://nvd.nist.gov/vuln/detail/CVE-2026-23141), [CVE-2026-23054](https://nvd.nist.gov/vuln/detail/CVE-2026-23054), [CVE-2026-23053](https://nvd.nist.gov/vuln/detail/CVE-2026-23053), [CVE-2026-23050](https://nvd.nist.gov/vuln/detail/CVE-2026-23050), [CVE-2026-23049](https://nvd.nist.gov/vuln/detail/CVE-2026-23049), [CVE-2025-71196](https://nvd.nist.gov/vuln/detail/CVE-2025-71196), [CVE-2025-71195](https://nvd.nist.gov/vuln/detail/CVE-2025-71195), [CVE-2026-23055](https://nvd.nist.gov/vuln/detail/CVE-2026-23055), [CVE-2025-71193](https://nvd.nist.gov/vuln/detail/CVE-2025-71193), [CVE-2025-71194](https://nvd.nist.gov/vuln/detail/CVE-2025-71194), [CVE-2026-23038](https://nvd.nist.gov/vuln/detail/CVE-2026-23038), [CVE-2026-23037](https://nvd.nist.gov/vuln/detail/CVE-2026-23037), [CVE-2026-23026](https://nvd.nist.gov/vuln/detail/CVE-2026-23026), [CVE-2026-23025](https://nvd.nist.gov/vuln/detail/CVE-2026-23025), [CVE-2025-71191](https://nvd.nist.gov/vuln/detail/CVE-2025-71191), [CVE-2025-71190](https://nvd.nist.gov/vuln/detail/CVE-2025-71190), [CVE-2025-71189](https://nvd.nist.gov/vuln/detail/CVE-2025-71189), [CVE-2025-71188](https://nvd.nist.gov/vuln/detail/CVE-2025-71188), [CVE-2026-23035](https://nvd.nist.gov/vuln/detail/CVE-2026-23035), [CVE-2026-23033](https://nvd.nist.gov/vuln/detail/CVE-2026-23033), [CVE-2026-23032](https://nvd.nist.gov/vuln/detail/CVE-2026-23032), [CVE-2026-23031](https://nvd.nist.gov/vuln/detail/CVE-2026-23031), [CVE-2026-23030](https://nvd.nist.gov/vuln/detail/CVE-2026-23030), [CVE-2025-71185](https://nvd.nist.gov/vuln/detail/CVE-2025-71185), [CVE-2025-71186](https://nvd.nist.gov/vuln/detail/CVE-2025-71186), [CVE-2026-23003](https://nvd.nist.gov/vuln/detail/CVE-2026-23003), [CVE-2026-23002](https://nvd.nist.gov/vuln/detail/CVE-2026-23002), [CVE-2026-23001](https://nvd.nist.gov/vuln/detail/CVE-2026-23001), [CVE-2026-23000](https://nvd.nist.gov/vuln/detail/CVE-2026-23000), [CVE-2026-22999](https://nvd.nist.gov/vuln/detail/CVE-2026-22999), [CVE-2026-22998](https://nvd.nist.gov/vuln/detail/CVE-2026-22998), [CVE-2026-22997](https://nvd.nist.gov/vuln/detail/CVE-2026-22997), [CVE-2026-22996](https://nvd.nist.gov/vuln/detail/CVE-2026-22996), [CVE-2026-23013](https://nvd.nist.gov/vuln/detail/CVE-2026-23013), [CVE-2026-23011](https://nvd.nist.gov/vuln/detail/CVE-2026-23011), [CVE-2026-23010](https://nvd.nist.gov/vuln/detail/CVE-2026-23010), [CVE-2026-23006](https://nvd.nist.gov/vuln/detail/CVE-2026-23006), [CVE-2026-23005](https://nvd.nist.gov/vuln/detail/CVE-2026-23005), [CVE-2025-71162](https://nvd.nist.gov/vuln/detail/CVE-2025-71162), [CVE-2025-71163](https://nvd.nist.gov/vuln/detail/CVE-2025-71163), [CVE-2026-23135](https://nvd.nist.gov/vuln/detail/CVE-2026-23135), [CVE-2026-23133](https://nvd.nist.gov/vuln/detail/CVE-2026-23133), [CVE-2026-23131](https://nvd.nist.gov/vuln/detail/CVE-2026-23131), [CVE-2026-23121](https://nvd.nist.gov/vuln/detail/CVE-2026-23121), [CVE-2026-23120](https://nvd.nist.gov/vuln/detail/CVE-2026-23120), [CVE-2026-23119](https://nvd.nist.gov/vuln/detail/CVE-2026-23119), [CVE-2026-23116](https://nvd.nist.gov/vuln/detail/CVE-2026-23116), [CVE-2026-23129](https://nvd.nist.gov/vuln/detail/CVE-2026-23129), [CVE-2026-23128](https://nvd.nist.gov/vuln/detail/CVE-2026-23128), [CVE-2026-23126](https://nvd.nist.gov/vuln/detail/CVE-2026-23126), [CVE-2026-23125](https://nvd.nist.gov/vuln/detail/CVE-2026-23125), [CVE-2026-23124](https://nvd.nist.gov/vuln/detail/CVE-2026-23124), [CVE-2026-23123](https://nvd.nist.gov/vuln/detail/CVE-2026-23123), [CVE-2025-71200](https://nvd.nist.gov/vuln/detail/CVE-2025-71200), [CVE-2026-23113](https://nvd.nist.gov/vuln/detail/CVE-2026-23113), [CVE-2026-23089](https://nvd.nist.gov/vuln/detail/CVE-2026-23089), [CVE-2026-23098](https://nvd.nist.gov/vuln/detail/CVE-2026-23098), [CVE-2026-23097](https://nvd.nist.gov/vuln/detail/CVE-2026-23097), [CVE-2026-23096](https://nvd.nist.gov/vuln/detail/CVE-2026-23096), [CVE-2026-23095](https://nvd.nist.gov/vuln/detail/CVE-2026-23095), [CVE-2026-23094](https://nvd.nist.gov/vuln/detail/CVE-2026-23094), [CVE-2026-23110](https://nvd.nist.gov/vuln/detail/CVE-2026-23110), [CVE-2026-23091](https://nvd.nist.gov/vuln/detail/CVE-2026-23091), [CVE-2026-23108](https://nvd.nist.gov/vuln/detail/CVE-2026-23108), [CVE-2026-23107](https://nvd.nist.gov/vuln/detail/CVE-2026-23107), [CVE-2026-23105](https://nvd.nist.gov/vuln/detail/CVE-2026-23105), [CVE-2026-23103](https://nvd.nist.gov/vuln/detail/CVE-2026-23103), [CVE-2026-23101](https://nvd.nist.gov/vuln/detail/CVE-2026-23101), [CVE-2026-23099](https://nvd.nist.gov/vuln/detail/CVE-2026-23099), [CVE-2026-23090](https://nvd.nist.gov/vuln/detail/CVE-2026-23090), [CVE-2026-23062](https://nvd.nist.gov/vuln/detail/CVE-2026-23062), [CVE-2026-23061](https://nvd.nist.gov/vuln/detail/CVE-2026-23061), [CVE-2026-23060](https://nvd.nist.gov/vuln/detail/CVE-2026-23060), [CVE-2026-23059](https://nvd.nist.gov/vuln/detail/CVE-2026-23059), [CVE-2026-23058](https://nvd.nist.gov/vuln/detail/CVE-2026-23058), [CVE-2026-23057](https://nvd.nist.gov/vuln/detail/CVE-2026-23057), [CVE-2026-23088](https://nvd.nist.gov/vuln/detail/CVE-2026-23088), [CVE-2026-23087](https://nvd.nist.gov/vuln/detail/CVE-2026-23087), [CVE-2026-23086](https://nvd.nist.gov/vuln/detail/CVE-2026-23086), [CVE-2026-23085](https://nvd.nist.gov/vuln/detail/CVE-2026-23085), [CVE-2026-23084](https://nvd.nist.gov/vuln/detail/CVE-2026-23084), [CVE-2026-23083](https://nvd.nist.gov/vuln/detail/CVE-2026-23083), [CVE-2026-23056](https://nvd.nist.gov/vuln/detail/CVE-2026-23056), [CVE-2026-23082](https://nvd.nist.gov/vuln/detail/CVE-2026-23082), [CVE-2026-23080](https://nvd.nist.gov/vuln/detail/CVE-2026-23080), [CVE-2026-23078](https://nvd.nist.gov/vuln/detail/CVE-2026-23078), [CVE-2026-23076](https://nvd.nist.gov/vuln/detail/CVE-2026-23076), [CVE-2026-23075](https://nvd.nist.gov/vuln/detail/CVE-2026-23075), [CVE-2026-23074](https://nvd.nist.gov/vuln/detail/CVE-2026-23074), [CVE-2026-23073](https://nvd.nist.gov/vuln/detail/CVE-2026-23073), [CVE-2025-71199](https://nvd.nist.gov/vuln/detail/CVE-2025-71199), [CVE-2026-23072](https://nvd.nist.gov/vuln/detail/CVE-2026-23072), [CVE-2026-23071](https://nvd.nist.gov/vuln/detail/CVE-2026-23071), [CVE-2026-23069](https://nvd.nist.gov/vuln/detail/CVE-2026-23069), [CVE-2026-23068](https://nvd.nist.gov/vuln/detail/CVE-2026-23068), [CVE-2026-23065](https://nvd.nist.gov/vuln/detail/CVE-2026-23065), [CVE-2026-23064](https://nvd.nist.gov/vuln/detail/CVE-2026-23064), [CVE-2026-23063](https://nvd.nist.gov/vuln/detail/CVE-2026-23063), [CVE-2025-71197](https://nvd.nist.gov/vuln/detail/CVE-2025-71197), [CVE-2025-71198](https://nvd.nist.gov/vuln/detail/CVE-2025-71198), [CVE-2026-23212](https://nvd.nist.gov/vuln/detail/CVE-2026-23212), [CVE-2026-23173](https://nvd.nist.gov/vuln/detail/CVE-2026-23173), [CVE-2026-23172](https://nvd.nist.gov/vuln/detail/CVE-2026-23172), [CVE-2026-23155](https://nvd.nist.gov/vuln/detail/CVE-2026-23155), [CVE-2026-23154](https://nvd.nist.gov/vuln/detail/CVE-2026-23154), [CVE-2026-23151](https://nvd.nist.gov/vuln/detail/CVE-2026-23151), [CVE-2026-23150](https://nvd.nist.gov/vuln/detail/CVE-2026-23150), [CVE-2026-23170](https://nvd.nist.gov/vuln/detail/CVE-2026-23170), [CVE-2026-23168](https://nvd.nist.gov/vuln/detail/CVE-2026-23168), [CVE-2026-23167](https://nvd.nist.gov/vuln/detail/CVE-2026-23167), [CVE-2026-23166](https://nvd.nist.gov/vuln/detail/CVE-2026-23166), [CVE-2026-23148](https://nvd.nist.gov/vuln/detail/CVE-2026-23148), [CVE-2026-23164](https://nvd.nist.gov/vuln/detail/CVE-2026-23164), [CVE-2026-23163](https://nvd.nist.gov/vuln/detail/CVE-2026-23163), [CVE-2026-23161](https://nvd.nist.gov/vuln/detail/CVE-2026-23161), [CVE-2026-23160](https://nvd.nist.gov/vuln/detail/CVE-2026-23160), [CVE-2026-23159](https://nvd.nist.gov/vuln/detail/CVE-2026-23159), [CVE-2026-23158](https://nvd.nist.gov/vuln/detail/CVE-2026-23158), [CVE-2026-23156](https://nvd.nist.gov/vuln/detail/CVE-2026-23156), [CVE-2026-23146](https://nvd.nist.gov/vuln/detail/CVE-2026-23146), [CVE-2026-23118](https://nvd.nist.gov/vuln/detail/CVE-2026-23118), [CVE-2024-57881](https://nvd.nist.gov/vuln/detail/CVE-2024-57881), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-53685](https://nvd.nist.gov/vuln/detail/CVE-2024-53685), [CVE-2024-52319](https://nvd.nist.gov/vuln/detail/CVE-2024-52319), [CVE-2024-51729](https://nvd.nist.gov/vuln/detail/CVE-2024-51729), [CVE-2024-49573](https://nvd.nist.gov/vuln/detail/CVE-2024-49573), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-49568](https://nvd.nist.gov/vuln/detail/CVE-2024-49568), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56788](https://nvd.nist.gov/vuln/detail/CVE-2024-56788), [CVE-2024-56372](https://nvd.nist.gov/vuln/detail/CVE-2024-56372), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-56368](https://nvd.nist.gov/vuln/detail/CVE-2024-56368), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2024-54680](https://nvd.nist.gov/vuln/detail/CVE-2024-54680), [CVE-2024-54455](https://nvd.nist.gov/vuln/detail/CVE-2024-54455), [CVE-2024-54193](https://nvd.nist.gov/vuln/detail/CVE-2024-54193), [CVE-2024-41149](https://nvd.nist.gov/vuln/detail/CVE-2024-41149), [CVE-2024-46896](https://nvd.nist.gov/vuln/detail/CVE-2024-46896), [CVE-2024-56719](https://nvd.nist.gov/vuln/detail/CVE-2024-56719), [CVE-2024-56718](https://nvd.nist.gov/vuln/detail/CVE-2024-56718), [CVE-2024-56717](https://nvd.nist.gov/vuln/detail/CVE-2024-56717), [CVE-2024-56716](https://nvd.nist.gov/vuln/detail/CVE-2024-56716), [CVE-2024-56715](https://nvd.nist.gov/vuln/detail/CVE-2024-56715), [CVE-2024-56714](https://nvd.nist.gov/vuln/detail/CVE-2024-56714), [CVE-2024-56713](https://nvd.nist.gov/vuln/detail/CVE-2024-56713), [CVE-2024-56712](https://nvd.nist.gov/vuln/detail/CVE-2024-56712), [CVE-2024-56710](https://nvd.nist.gov/vuln/detail/CVE-2024-56710), [CVE-2024-56711](https://nvd.nist.gov/vuln/detail/CVE-2024-56711), [CVE-2024-56709](https://nvd.nist.gov/vuln/detail/CVE-2024-56709), [CVE-2024-53164](https://nvd.nist.gov/vuln/detail/CVE-2024-53164), [CVE-2026-23216](https://nvd.nist.gov/vuln/detail/CVE-2026-23216), [CVE-2026-23215](https://nvd.nist.gov/vuln/detail/CVE-2026-23215), [CVE-2026-23214](https://nvd.nist.gov/vuln/detail/CVE-2026-23214), [CVE-2026-23213](https://nvd.nist.gov/vuln/detail/CVE-2026-23213), [CVE-2025-71228](https://nvd.nist.gov/vuln/detail/CVE-2025-71228), [CVE-2026-23219](https://nvd.nist.gov/vuln/detail/CVE-2026-23219), [CVE-2025-71225](https://nvd.nist.gov/vuln/detail/CVE-2025-71225), [CVE-2026-23206](https://nvd.nist.gov/vuln/detail/CVE-2026-23206), [CVE-2026-23209](https://nvd.nist.gov/vuln/detail/CVE-2026-23209), [CVE-2025-71222](https://nvd.nist.gov/vuln/detail/CVE-2025-71222), [CVE-2026-23180](https://nvd.nist.gov/vuln/detail/CVE-2026-23180), [CVE-2026-23179](https://nvd.nist.gov/vuln/detail/CVE-2026-23179), [CVE-2026-23178](https://nvd.nist.gov/vuln/detail/CVE-2026-23178), [CVE-2026-23177](https://nvd.nist.gov/vuln/detail/CVE-2026-23177), [CVE-2026-23176](https://nvd.nist.gov/vuln/detail/CVE-2026-23176), [CVE-2026-23205](https://nvd.nist.gov/vuln/detail/CVE-2026-23205), [CVE-2026-23204](https://nvd.nist.gov/vuln/detail/CVE-2026-23204), [CVE-2026-23202](https://nvd.nist.gov/vuln/detail/CVE-2026-23202), [CVE-2026-23201](https://nvd.nist.gov/vuln/detail/CVE-2026-23201), [CVE-2026-23200](https://nvd.nist.gov/vuln/detail/CVE-2026-23200), [CVE-2026-23199](https://nvd.nist.gov/vuln/detail/CVE-2026-23199), [CVE-2026-23198](https://nvd.nist.gov/vuln/detail/CVE-2026-23198), [CVE-2026-23193](https://nvd.nist.gov/vuln/detail/CVE-2026-23193), [CVE-2026-23191](https://nvd.nist.gov/vuln/detail/CVE-2026-23191), [CVE-2025-71224](https://nvd.nist.gov/vuln/detail/CVE-2025-71224), [CVE-2026-23190](https://nvd.nist.gov/vuln/detail/CVE-2026-23190), [CVE-2026-23189](https://nvd.nist.gov/vuln/detail/CVE-2026-23189), [CVE-2026-23188](https://nvd.nist.gov/vuln/detail/CVE-2026-23188), [CVE-2026-23187](https://nvd.nist.gov/vuln/detail/CVE-2026-23187), [CVE-2026-23182](https://nvd.nist.gov/vuln/detail/CVE-2026-23182), [CVE-2025-71223](https://nvd.nist.gov/vuln/detail/CVE-2025-71223), [CVE-2025-71220](https://nvd.nist.gov/vuln/detail/CVE-2025-71220), [CVE-2025-71203](https://nvd.nist.gov/vuln/detail/CVE-2025-71203), [CVE-2025-71204](https://nvd.nist.gov/vuln/detail/CVE-2025-71204), [CVE-2026-23112](https://nvd.nist.gov/vuln/detail/CVE-2026-23112), [CVE-2026-23111](https://nvd.nist.gov/vuln/detail/CVE-2026-23111), [CVE-2026-23220](https://nvd.nist.gov/vuln/detail/CVE-2026-23220), [CVE-2025-71237](https://nvd.nist.gov/vuln/detail/CVE-2025-71237), [CVE-2025-71236](https://nvd.nist.gov/vuln/detail/CVE-2025-71236), [CVE-2025-71235](https://nvd.nist.gov/vuln/detail/CVE-2025-71235), [CVE-2025-71234](https://nvd.nist.gov/vuln/detail/CVE-2025-71234), [CVE-2025-71233](https://nvd.nist.gov/vuln/detail/CVE-2025-71233), [CVE-2025-71232](https://nvd.nist.gov/vuln/detail/CVE-2025-71232), [CVE-2025-71231](https://nvd.nist.gov/vuln/detail/CVE-2025-71231), [CVE-2026-23230](https://nvd.nist.gov/vuln/detail/CVE-2026-23230), [CVE-2026-23229](https://nvd.nist.gov/vuln/detail/CVE-2026-23229), [CVE-2026-23228](https://nvd.nist.gov/vuln/detail/CVE-2026-23228), [CVE-2026-23224](https://nvd.nist.gov/vuln/detail/CVE-2026-23224), [CVE-2026-23223](https://nvd.nist.gov/vuln/detail/CVE-2026-23223), [CVE-2026-23222](https://nvd.nist.gov/vuln/detail/CVE-2026-23222), [CVE-2025-71229](https://nvd.nist.gov/vuln/detail/CVE-2025-71229), [CVE-2026-23237](https://nvd.nist.gov/vuln/detail/CVE-2026-23237), [CVE-2026-23238](https://nvd.nist.gov/vuln/detail/CVE-2026-23238), [CVE-2026-23236](https://nvd.nist.gov/vuln/detail/CVE-2026-23236), [CVE-2026-23235](https://nvd.nist.gov/vuln/detail/CVE-2026-23235), [CVE-2026-23234](https://nvd.nist.gov/vuln/detail/CVE-2026-23234), [CVE-2026-23233](https://nvd.nist.gov/vuln/detail/CVE-2026-23233), [CVE-2025-71238](https://nvd.nist.gov/vuln/detail/CVE-2025-71238))\n- gnupg ([CVE-2025-68972](https://www.cve.org/CVERecord/?id=CVE-2025-68972), [CVE-2025-68973](https://www.cve.org/CVERecord/?id=CVE-2025-68973), [gnupg-20251228-notdash](https://gpg.fail/notdash))\n\n#### Bug fixes:\n\n- Enabled back PAM sssd support for LDAP authentication ([scripts#3696](https://github.com/flatcar/scripts/pull/3696))\n\n#### Changes:\n\n- Enabled netkit module ([scripts#3524](https://github.com/flatcar/scripts/pull/3524))\n- Function tracer (ftrace) enabled in ARM64 builds. (Enables CONFIG_FUNCTION_TRACER & CONFIG_DYNAMIC_FTRACE for observability and security tools) ([flatcar/scripts#3685](https://github.com/flatcar/scripts/pull/3685))\n\n#### Updates:\n\n- base, dev: gnupg ([2.5.16](https://lists.gnupg.org/pipermail/gnupg-announce/2025q4/000500.html) (includes [2.5](https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00005.html)))\n- base, dev: libgpg-error ([1.57](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob_plain;f=NEWS;h=52ac1464a0c0af091a3d69e8c5f2f3afa2cc3c9f;hb=39d7b85a7d69975f1dfec5a0add10b4d57dcfc9e))\n- ca-certificates ([3.120.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120_1.html))\n- dracut ([109](https://github.com/dracut-ng/dracut-ng/releases/tag/109) (includes [108](https://github.com/dracut-ng/dracut-ng/releases/tag/108), [107](https://github.com/dracut-ng/dracut-ng/releases/tag/107)))\n- etcdctl ([3.5.18](https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md#v3518-2025-01-24))\n- Linux ([6.12.74](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.74) (includes [6.12.73](https://lwn.net/Articles/1059031),[6.12.72](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.72), [6.12.71](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.71), [6.12.70](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.70), [6.12.69](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.69), [6.12.68](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.68), [6.12.67](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.67), [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64), [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63), [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62)))\n- python ([3.12.12](https://www.python.org/downloads/release/python-31212/) (includes [3.12.0](https://www.python.org/downloads/release/python-3120/)))\n- sysext-podman: gpgme ([2.0.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=1fd34dbd9143829e9163d402ab0191a9fc6adab2;hb=e4adebe020b07bc47e583817576ce98ca93e9711))"
  }
}
