{
  "3510.3.0": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-10-05 10:09:06 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.132"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **Stable 3510.2.8**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-42752](https://nvd.nist.gov/vuln/detail/CVE-2023-42752), [CVE-2023-42753](https://nvd.nist.gov/vuln/detail/CVE-2023-42753), [CVE-2023-4623](https://nvd.nist.gov/vuln/detail/CVE-2023-4623), [CVE-2023-4921](https://nvd.nist.gov/vuln/detail/CVE-2023-4921))\n \n #### Bug fixes:\n \n \n #### Changes:\n \n - Use qcow2 compressed format instead of additional compression layer in Qemu images ([Flatcar#1135](https://github.com/flatcar/Flatcar/issues/1135), [scripts#1132](https://github.com/flatcar/scripts/pull/1132))\n \n #### Updates:\n \n - Linux ([5.15.132](https://lwn.net/Articles/944877) (includes [5.15.131](https://lwn.net/Articles/943755), [5.15.130](https://lwn.net/Articles/943404)))\n\n\n**Changes compared to LTS-2022 3033.3.17**\n\n #### Security fixes:\n \n - Linux ([CVE-2019-15794](https://nvd.nist.gov/vuln/detail/CVE-2019-15794),[CVE-2020-16119](https://nvd.nist.gov/vuln/detail/CVE-2020-16119),[CVE-2020-24586](https://nvd.nist.gov/vuln/detail/CVE-2020-24586),[CVE-2020-24587](https://nvd.nist.gov/vuln/detail/CVE-2020-24587),[CVE-2020-24588](https://nvd.nist.gov/vuln/detail/CVE-2020-24588),[CVE-2020-25639](https://nvd.nist.gov/vuln/detail/CVE-2020-25639),[CVE-2020-25670](https://nvd.nist.gov/vuln/detail/CVE-2020-25670),[CVE-2020-25671](https://nvd.nist.gov/vuln/detail/CVE-2020-25671),[CVE-2020-25672](https://nvd.nist.gov/vuln/detail/CVE-2020-25672),[CVE-2020-25673](https://nvd.nist.gov/vuln/detail/CVE-2020-25673),[CVE-2020-26139](https://nvd.nist.gov/vuln/detail/CVE-2020-26139),[CVE-2020-26141](https://nvd.nist.gov/vuln/detail/CVE-2020-26141),[CVE-2020-26145](https://nvd.nist.gov/vuln/detail/CVE-2020-26145),[CVE-2020-26147](https://nvd.nist.gov/vuln/detail/CVE-2020-26147),[CVE-2020-26541](https://nvd.nist.gov/vuln/detail/CVE-2020-26541),[CVE-2020-26555](https://nvd.nist.gov/vuln/detail/CVE-2020-26555),[CVE-2020-26558](https://nvd.nist.gov/vuln/detail/CVE-2020-26558),[CVE-2020-27170](https://nvd.nist.gov/vuln/detail/CVE-2020-27170),[CVE-2020-27171](https://nvd.nist.gov/vuln/detail/CVE-2020-27171),[CVE-2020-27820](https://nvd.nist.gov/vuln/detail/CVE-2020-27820),[CVE-2020-36516](https://nvd.nist.gov/vuln/detail/CVE-2020-36516),[CVE-2021-0129](https://nvd.nist.gov/vuln/detail/CVE-2021-0129),[CVE-2021-0512](https://nvd.nist.gov/vuln/detail/CVE-2021-0512),[CVE-2021-0920](https://nvd.nist.gov/vuln/detail/CVE-2021-0920),[CVE-2021-0937](https://nvd.nist.gov/vuln/detail/CVE-2021-0937),[CVE-2021-0941](https://nvd.nist.gov/vuln/detail/CVE-2021-0941),[CVE-2021-20320](https://nvd.nist.gov/vuln/detail/CVE-2021-20320),[CVE-2021-20321](https://nvd.nist.gov/vuln/detail/CVE-2021-20321),[CVE-2021-20322](https://nvd.nist.gov/vuln/detail/CVE-2021-20322),[CVE-2021-22543](https://nvd.nist.gov/vuln/detail/CVE-2021-22543),[CVE-2021-22555](https://nvd.nist.gov/vuln/detail/CVE-2021-22555),[CVE-2021-22600](https://nvd.nist.gov/vuln/detail/CVE-2021-22600),[CVE-2021-23133](https://nvd.nist.gov/vuln/detail/CVE-2021-23133),[CVE-2021-23134](https://nvd.nist.gov/vuln/detail/CVE-2021-23134),[CVE-2021-26401](https://nvd.nist.gov/vuln/detail/CVE-2021-26401),[CVE-2021-26930](https://nvd.nist.gov/vuln/detail/CVE-2021-26930),[CVE-2021-26931](https://nvd.nist.gov/vuln/detail/CVE-2021-26931),[CVE-2021-26932](https://nvd.nist.gov/vuln/detail/CVE-2021-26932),[CVE-2021-27363](https://nvd.nist.gov/vuln/detail/CVE-2021-27363),[CVE-2021-27364](https://nvd.nist.gov/vuln/detail/CVE-2021-27364),[CVE-2021-27365](https://nvd.nist.gov/vuln/detail/CVE-2021-27365),[CVE-2021-28038](https://nvd.nist.gov/vuln/detail/CVE-2021-28038),[CVE-2021-28039](https://nvd.nist.gov/vuln/detail/CVE-2021-28039),[CVE-2021-28375](https://nvd.nist.gov/vuln/detail/CVE-2021-28375),[CVE-2021-28660](https://nvd.nist.gov/vuln/detail/CVE-2021-28660),[CVE-2021-28688](https://nvd.nist.gov/vuln/detail/CVE-2021-28688),[CVE-2021-28691](https://nvd.nist.gov/vuln/detail/CVE-2021-28691),[CVE-2021-28711](https://nvd.nist.gov/vuln/detail/CVE-2021-28711),[CVE-2021-28712](https://nvd.nist.gov/vuln/detail/CVE-2021-28712),[CVE-2021-28713](https://nvd.nist.gov/vuln/detail/CVE-2021-28713),[CVE-2021-28714](https://nvd.nist.gov/vuln/detail/CVE-2021-28714),[CVE-2021-28715](https://nvd.nist.gov/vuln/detail/CVE-2021-28715),[CVE-2021-28950](https://nvd.nist.gov/vuln/detail/CVE-2021-28950),[CVE-2021-28951](https://nvd.nist.gov/vuln/detail/CVE-2021-28951),[CVE-2021-28952](https://nvd.nist.gov/vuln/detail/CVE-2021-28952),[CVE-2021-28964](https://nvd.nist.gov/vuln/detail/CVE-2021-28964),[CVE-2021-28971](https://nvd.nist.gov/vuln/detail/CVE-2021-28971),[CVE-2021-28972](https://nvd.nist.gov/vuln/detail/CVE-2021-28972),[CVE-2021-29154](https://nvd.nist.gov/vuln/detail/CVE-2021-29154),[CVE-2021-29155](https://nvd.nist.gov/vuln/detail/CVE-2021-29155),[CVE-2021-29264](https://nvd.nist.gov/vuln/detail/CVE-2021-29264),[CVE-2021-29265](https://nvd.nist.gov/vuln/detail/CVE-2021-29265),[CVE-2021-29266](https://nvd.nist.gov/vuln/detail/CVE-2021-29266),[CVE-2021-29646](https://nvd.nist.gov/vuln/detail/CVE-2021-29646),[CVE-2021-29647](https://nvd.nist.gov/vuln/detail/CVE-2021-29647),[CVE-2021-29648](https://nvd.nist.gov/vuln/detail/CVE-2021-29648),[CVE-2021-29649](https://nvd.nist.gov/vuln/detail/CVE-2021-29649),[CVE-2021-29650](https://nvd.nist.gov/vuln/detail/CVE-2021-29650),[CVE-2021-29657](https://nvd.nist.gov/vuln/detail/CVE-2021-29657),[CVE-2021-30002](https://nvd.nist.gov/vuln/detail/CVE-2021-30002),[CVE-2021-31440](https://nvd.nist.gov/vuln/detail/CVE-2021-31440),[CVE-2021-31829](https://nvd.nist.gov/vuln/detail/CVE-2021-31829),[CVE-2021-31916](https://nvd.nist.gov/vuln/detail/CVE-2021-31916),[CVE-2021-32399](https://nvd.nist.gov/vuln/detail/CVE-2021-32399),[CVE-2021-32606](https://nvd.nist.gov/vuln/detail/CVE-2021-32606),[CVE-2021-33033](https://nvd.nist.gov/vuln/detail/CVE-2021-33033),[CVE-2021-33034](https://nvd.nist.gov/vuln/detail/CVE-2021-33034),[CVE-2021-33098](https://nvd.nist.gov/vuln/detail/CVE-2021-33098),[CVE-2021-33135](https://nvd.nist.gov/vuln/detail/CVE-2021-33135),[CVE-2021-33200](https://nvd.nist.gov/vuln/detail/CVE-2021-33200),[CVE-2021-33624](https://nvd.nist.gov/vuln/detail/CVE-2021-33624),[CVE-2021-33655](https://nvd.nist.gov/vuln/detail/CVE-2021-33655),[CVE-2021-33909](https://nvd.nist.gov/vuln/detail/CVE-2021-33909),[CVE-2021-3444](https://nvd.nist.gov/vuln/detail/CVE-2021-3444),[CVE-2021-34556](https://nvd.nist.gov/vuln/detail/CVE-2021-34556),[CVE-2021-34693](https://nvd.nist.gov/vuln/detail/CVE-2021-34693),[CVE-2021-3483](https://nvd.nist.gov/vuln/detail/CVE-2021-3483),[CVE-2021-34866](https://nvd.nist.gov/vuln/detail/CVE-2021-34866),[CVE-2021-3489](https://nvd.nist.gov/vuln/detail/CVE-2021-3489),[CVE-2021-3490](https://nvd.nist.gov/vuln/detail/CVE-2021-3490),[CVE-2021-3491](https://nvd.nist.gov/vuln/detail/CVE-2021-3491),[CVE-2021-34981](https://nvd.nist.gov/vuln/detail/CVE-2021-34981),[CVE-2021-3501](https://nvd.nist.gov/vuln/detail/CVE-2021-3501),[CVE-2021-35039](https://nvd.nist.gov/vuln/detail/CVE-2021-35039),[CVE-2021-3506](https://nvd.nist.gov/vuln/detail/CVE-2021-3506),[CVE-2021-3543](https://nvd.nist.gov/vuln/detail/CVE-2021-3543),[CVE-2021-35477](https://nvd.nist.gov/vuln/detail/CVE-2021-35477),[CVE-2021-3564](https://nvd.nist.gov/vuln/detail/CVE-2021-3564),[CVE-2021-3573](https://nvd.nist.gov/vuln/detail/CVE-2021-3573),[CVE-2021-3600](https://nvd.nist.gov/vuln/detail/CVE-2021-3600),[CVE-2021-3609](https://nvd.nist.gov/vuln/detail/CVE-2021-3609),[CVE-2021-3612](https://nvd.nist.gov/vuln/detail/CVE-2021-3612),[CVE-2021-3640](https://nvd.nist.gov/vuln/detail/CVE-2021-3640),[CVE-2021-3653](https://nvd.nist.gov/vuln/detail/CVE-2021-3653),[CVE-2021-3655](https://nvd.nist.gov/vuln/detail/CVE-2021-3655),[CVE-2021-3656](https://nvd.nist.gov/vuln/detail/CVE-2021-3656),[CVE-2021-3659](https://nvd.nist.gov/vuln/detail/CVE-2021-3659),[CVE-2021-3679](https://nvd.nist.gov/vuln/detail/CVE-2021-3679),[CVE-2021-37159](https://nvd.nist.gov/vuln/detail/CVE-2021-37159),[CVE-2021-3732](https://nvd.nist.gov/vuln/detail/CVE-2021-3732),[CVE-2021-3736](https://nvd.nist.gov/vuln/detail/CVE-2021-3736),[CVE-2021-3739](https://nvd.nist.gov/vuln/detail/CVE-2021-3739),[CVE-2021-3743](https://nvd.nist.gov/vuln/detail/CVE-2021-3743),[CVE-2021-3744](https://nvd.nist.gov/vuln/detail/CVE-2021-3744),[CVE-2021-3752](https://nvd.nist.gov/vuln/detail/CVE-2021-3752),[CVE-2021-3753](https://nvd.nist.gov/vuln/detail/CVE-2021-3753),[CVE-2021-37576](https://nvd.nist.gov/vuln/detail/CVE-2021-37576),[CVE-2021-3760](https://nvd.nist.gov/vuln/detail/CVE-2021-3760),[CVE-2021-3764](https://nvd.nist.gov/vuln/detail/CVE-2021-3764),[CVE-2021-3772](https://nvd.nist.gov/vuln/detail/CVE-2021-3772),[CVE-2021-38166](https://nvd.nist.gov/vuln/detail/CVE-2021-38166),[CVE-2021-38198](https://nvd.nist.gov/vuln/detail/CVE-2021-38198),[CVE-2021-38199](https://nvd.nist.gov/vuln/detail/CVE-2021-38199),[CVE-2021-38200](https://nvd.nist.gov/vuln/detail/CVE-2021-38200),[CVE-2021-38201](https://nvd.nist.gov/vuln/detail/CVE-2021-38201),[CVE-2021-38202](https://nvd.nist.gov/vuln/detail/CVE-2021-38202),[CVE-2021-38203](https://nvd.nist.gov/vuln/detail/CVE-2021-38203),[CVE-2021-38204](https://nvd.nist.gov/vuln/detail/CVE-2021-38204),[CVE-2021-38205](https://nvd.nist.gov/vuln/detail/CVE-2021-38205),[CVE-2021-38206](https://nvd.nist.gov/vuln/detail/CVE-2021-38206),[CVE-2021-38207](https://nvd.nist.gov/vuln/detail/CVE-2021-38207),[CVE-2021-38208](https://nvd.nist.gov/vuln/detail/CVE-2021-38208),[CVE-2021-38209](https://nvd.nist.gov/vuln/detail/CVE-2021-38209),[CVE-2021-38300](https://nvd.nist.gov/vuln/detail/CVE-2021-38300),[CVE-2021-3923](https://nvd.nist.gov/vuln/detail/CVE-2021-3923),[CVE-2021-39633](https://nvd.nist.gov/vuln/detail/CVE-2021-39633),[CVE-2021-39656](https://nvd.nist.gov/vuln/detail/CVE-2021-39656),[CVE-2021-39685](https://nvd.nist.gov/vuln/detail/CVE-2021-39685),[CVE-2021-39686](https://nvd.nist.gov/vuln/detail/CVE-2021-39686),[CVE-2021-39698](https://nvd.nist.gov/vuln/detail/CVE-2021-39698),[CVE-2021-4001](https://nvd.nist.gov/vuln/detail/CVE-2021-4001),[CVE-2021-4002](https://nvd.nist.gov/vuln/detail/CVE-2021-4002),[CVE-2021-4028](https://nvd.nist.gov/vuln/detail/CVE-2021-4028),[CVE-2021-40490](https://nvd.nist.gov/vuln/detail/CVE-2021-40490),[CVE-2021-4083](https://nvd.nist.gov/vuln/detail/CVE-2021-4083),[CVE-2021-4090](https://nvd.nist.gov/vuln/detail/CVE-2021-4090),[CVE-2021-4093](https://nvd.nist.gov/vuln/detail/CVE-2021-4093),[CVE-2021-41073](https://nvd.nist.gov/vuln/detail/CVE-2021-41073),[CVE-2021-4135](https://nvd.nist.gov/vuln/detail/CVE-2021-4135),[CVE-2021-4148](https://nvd.nist.gov/vuln/detail/CVE-2021-4148),[CVE-2021-4149](https://nvd.nist.gov/vuln/detail/CVE-2021-4149),[CVE-2021-4154](https://nvd.nist.gov/vuln/detail/CVE-2021-4154),[CVE-2021-4155](https://nvd.nist.gov/vuln/detail/CVE-2021-4155),[CVE-2021-4157](https://nvd.nist.gov/vuln/detail/CVE-2021-4157),[CVE-2021-41864](https://nvd.nist.gov/vuln/detail/CVE-2021-41864),[CVE-2021-4197](https://nvd.nist.gov/vuln/detail/CVE-2021-4197),[CVE-2021-42008](https://nvd.nist.gov/vuln/detail/CVE-2021-42008),[CVE-2021-4202](https://nvd.nist.gov/vuln/detail/CVE-2021-4202),[CVE-2021-4203](https://nvd.nist.gov/vuln/detail/CVE-2021-4203),[CVE-2021-42252](https://nvd.nist.gov/vuln/detail/CVE-2021-42252),[CVE-2021-42327](https://nvd.nist.gov/vuln/detail/CVE-2021-42327),[CVE-2021-42739](https://nvd.nist.gov/vuln/detail/CVE-2021-42739),[CVE-2021-43056](https://nvd.nist.gov/vuln/detail/CVE-2021-43056),[CVE-2021-43057](https://nvd.nist.gov/vuln/detail/CVE-2021-43057),[CVE-2021-43267](https://nvd.nist.gov/vuln/detail/CVE-2021-43267),[CVE-2021-43389](https://nvd.nist.gov/vuln/detail/CVE-2021-43389),[CVE-2021-43975](https://nvd.nist.gov/vuln/detail/CVE-2021-43975),[CVE-2021-43976](https://nvd.nist.gov/vuln/detail/CVE-2021-43976),[CVE-2021-44733](https://nvd.nist.gov/vuln/detail/CVE-2021-44733),[CVE-2021-44879](https://nvd.nist.gov/vuln/detail/CVE-2021-44879),[CVE-2021-45095](https://nvd.nist.gov/vuln/detail/CVE-2021-45095),[CVE-2021-45100](https://nvd.nist.gov/vuln/detail/CVE-2021-45100),[CVE-2021-45402](https://nvd.nist.gov/vuln/detail/CVE-2021-45402),[CVE-2021-45469](https://nvd.nist.gov/vuln/detail/CVE-2021-45469),[CVE-2021-45480](https://nvd.nist.gov/vuln/detail/CVE-2021-45480),[CVE-2021-45485](https://nvd.nist.gov/vuln/detail/CVE-2021-45485),[CVE-2021-45486](https://nvd.nist.gov/vuln/detail/CVE-2021-45486),[CVE-2021-45868](https://nvd.nist.gov/vuln/detail/CVE-2021-45868),[CVE-2021-46283](https://nvd.nist.gov/vuln/detail/CVE-2021-46283),[CVE-2022-0001](https://nvd.nist.gov/vuln/detail/CVE-2022-0001),[CVE-2022-0002](https://nvd.nist.gov/vuln/detail/CVE-2022-0002),[CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168),[CVE-2022-0171](https://nvd.nist.gov/vuln/detail/CVE-2022-0171),[CVE-2022-0185](https://nvd.nist.gov/vuln/detail/CVE-2022-0185),[CVE-2022-0264](https://nvd.nist.gov/vuln/detail/CVE-2022-0264),[CVE-2022-0286](https://nvd.nist.gov/vuln/detail/CVE-2022-0286),[CVE-2022-0322](https://nvd.nist.gov/vuln/detail/CVE-2022-0322),[CVE-2022-0330](https://nvd.nist.gov/vuln/detail/CVE-2022-0330),[CVE-2022-0382](https://nvd.nist.gov/vuln/detail/CVE-2022-0382),[CVE-2022-0435](https://nvd.nist.gov/vuln/detail/CVE-2022-0435),[CVE-2022-0487](https://nvd.nist.gov/vuln/detail/CVE-2022-0487),[CVE-2022-0492](https://nvd.nist.gov/vuln/detail/CVE-2022-0492),[CVE-2022-0494](https://nvd.nist.gov/vuln/detail/CVE-2022-0494),[CVE-2022-0500](https://nvd.nist.gov/vuln/detail/CVE-2022-0500),[CVE-2022-0516](https://nvd.nist.gov/vuln/detail/CVE-2022-0516),[CVE-2022-0617](https://nvd.nist.gov/vuln/detail/CVE-2022-0617),[CVE-2022-0742](https://nvd.nist.gov/vuln/detail/CVE-2022-0742),[CVE-2022-0847](https://nvd.nist.gov/vuln/detail/CVE-2022-0847),[CVE-2022-0850](https://nvd.nist.gov/vuln/detail/CVE-2022-0850),[CVE-2022-0995](https://nvd.nist.gov/vuln/detail/CVE-2022-0995),[CVE-2022-1011](https://nvd.nist.gov/vuln/detail/CVE-2022-1011),[CVE-2022-1012](https://nvd.nist.gov/vuln/detail/CVE-2022-1012),[CVE-2022-1015](https://nvd.nist.gov/vuln/detail/CVE-2022-1015),[CVE-2022-1016](https://nvd.nist.gov/vuln/detail/CVE-2022-1016),[CVE-2022-1043](https://nvd.nist.gov/vuln/detail/CVE-2022-1043),[CVE-2022-1048](https://nvd.nist.gov/vuln/detail/CVE-2022-1048),[CVE-2022-1055](https://nvd.nist.gov/vuln/detail/CVE-2022-1055),[CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158),[CVE-2022-1184](https://nvd.nist.gov/vuln/detail/CVE-2022-1184),[CVE-2022-1195](https://nvd.nist.gov/vuln/detail/CVE-2022-1195),[CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198),[CVE-2022-1199](https://nvd.nist.gov/vuln/detail/CVE-2022-1199),[CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204),[CVE-2022-1263](https://nvd.nist.gov/vuln/detail/CVE-2022-1263),[CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353),[CVE-2022-1462](https://nvd.nist.gov/vuln/detail/CVE-2022-1462),[CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516),[CVE-2022-1651](https://nvd.nist.gov/vuln/detail/CVE-2022-1651),[CVE-2022-1652](https://nvd.nist.gov/vuln/detail/CVE-2022-1652),[CVE-2022-1671](https://nvd.nist.gov/vuln/detail/CVE-2022-1671),[CVE-2022-1679](https://nvd.nist.gov/vuln/detail/CVE-2022-1679),[CVE-2022-1729](https://nvd.nist.gov/vuln/detail/CVE-2022-1729),[CVE-2022-1734](https://nvd.nist.gov/vuln/detail/CVE-2022-1734),[CVE-2022-1789](https://nvd.nist.gov/vuln/detail/CVE-2022-1789),[CVE-2022-1852](https://nvd.nist.gov/vuln/detail/CVE-2022-1852),[CVE-2022-1943](https://nvd.nist.gov/vuln/detail/CVE-2022-1943),[CVE-2022-1973](https://nvd.nist.gov/vuln/detail/CVE-2022-1973),[CVE-2022-1974](https://nvd.nist.gov/vuln/detail/CVE-2022-1974),[CVE-2022-1975](https://nvd.nist.gov/vuln/detail/CVE-2022-1975),[CVE-2022-1998](https://nvd.nist.gov/vuln/detail/CVE-2022-1998),[CVE-2022-20008](https://nvd.nist.gov/vuln/detail/CVE-2022-20008),[CVE-2022-20132](https://nvd.nist.gov/vuln/detail/CVE-2022-20132),[CVE-2022-20141](https://nvd.nist.gov/vuln/detail/CVE-2022-20141),[CVE-2022-20148](https://nvd.nist.gov/vuln/detail/CVE-2022-20148),[CVE-2022-20154](https://nvd.nist.gov/vuln/detail/CVE-2022-20154),[CVE-2022-20158](https://nvd.nist.gov/vuln/detail/CVE-2022-20158),[CVE-2022-20368](https://nvd.nist.gov/vuln/detail/CVE-2022-20368),[CVE-2022-20369](https://nvd.nist.gov/vuln/detail/CVE-2022-20369),[CVE-2022-20421](https://nvd.nist.gov/vuln/detail/CVE-2022-20421),[CVE-2022-20422](https://nvd.nist.gov/vuln/detail/CVE-2022-20422),[CVE-2022-20566](https://nvd.nist.gov/vuln/detail/CVE-2022-20566),[CVE-2022-20572](https://nvd.nist.gov/vuln/detail/CVE-2022-20572),[CVE-2022-2078](https://nvd.nist.gov/vuln/detail/CVE-2022-2078),[CVE-2022-21123](https://nvd.nist.gov/vuln/detail/CVE-2022-21123),[CVE-2022-21125](https://nvd.nist.gov/vuln/detail/CVE-2022-21125),[CVE-2022-21166](https://nvd.nist.gov/vuln/detail/CVE-2022-21166),[CVE-2022-21499](https://nvd.nist.gov/vuln/detail/CVE-2022-21499),[CVE-2022-21505](https://nvd.nist.gov/vuln/detail/CVE-2022-21505),[CVE-2022-2153](https://nvd.nist.gov/vuln/detail/CVE-2022-2153),[CVE-2022-2196](https://nvd.nist.gov/vuln/detail/CVE-2022-2196),[CVE-2022-22942](https://nvd.nist.gov/vuln/detail/CVE-2022-22942),[CVE-2022-23036](https://nvd.nist.gov/vuln/detail/CVE-2022-23036),[CVE-2022-23037](https://nvd.nist.gov/vuln/detail/CVE-2022-23037),[CVE-2022-23038](https://nvd.nist.gov/vuln/detail/CVE-2022-23038),[CVE-2022-23039](https://nvd.nist.gov/vuln/detail/CVE-2022-23039),[CVE-2022-23040](https://nvd.nist.gov/vuln/detail/CVE-2022-23040),[CVE-2022-23041](https://nvd.nist.gov/vuln/detail/CVE-2022-23041),[CVE-2022-23042](https://nvd.nist.gov/vuln/detail/CVE-2022-23042),[CVE-2022-2308](https://nvd.nist.gov/vuln/detail/CVE-2022-2308),[CVE-2022-2318](https://nvd.nist.gov/vuln/detail/CVE-2022-2318),[CVE-2022-23222](https://nvd.nist.gov/vuln/detail/CVE-2022-23222),[CVE-2022-2380](https://nvd.nist.gov/vuln/detail/CVE-2022-2380),[CVE-2022-23960](https://nvd.nist.gov/vuln/detail/CVE-2022-23960),[CVE-2022-24122](https://nvd.nist.gov/vuln/detail/CVE-2022-24122),[CVE-2022-24448](https://nvd.nist.gov/vuln/detail/CVE-2022-24448),[CVE-2022-24958](https://nvd.nist.gov/vuln/detail/CVE-2022-24958),[CVE-2022-24959](https://nvd.nist.gov/vuln/detail/CVE-2022-24959),[CVE-2022-2503](https://nvd.nist.gov/vuln/detail/CVE-2022-2503),[CVE-2022-25258](https://nvd.nist.gov/vuln/detail/CVE-2022-25258),[CVE-2022-25375](https://nvd.nist.gov/vuln/detail/CVE-2022-25375),[CVE-2022-25636](https://nvd.nist.gov/vuln/detail/CVE-2022-25636),[CVE-2022-2585](https://nvd.nist.gov/vuln/detail/CVE-2022-2585),[CVE-2022-2586](https://nvd.nist.gov/vuln/detail/CVE-2022-2586),[CVE-2022-2588](https://nvd.nist.gov/vuln/detail/CVE-2022-2588),[CVE-2022-2602](https://nvd.nist.gov/vuln/detail/CVE-2022-2602),[CVE-2022-26365](https://nvd.nist.gov/vuln/detail/CVE-2022-26365),[CVE-2022-26373](https://nvd.nist.gov/vuln/detail/CVE-2022-26373),[CVE-2022-2639](https://nvd.nist.gov/vuln/detail/CVE-2022-2639),[CVE-2022-26490](https://nvd.nist.gov/vuln/detail/CVE-2022-26490),[CVE-2022-2663](https://nvd.nist.gov/vuln/detail/CVE-2022-2663),[CVE-2022-26966](https://nvd.nist.gov/vuln/detail/CVE-2022-26966),[CVE-2022-27223](https://nvd.nist.gov/vuln/detail/CVE-2022-27223),[CVE-2022-27666](https://nvd.nist.gov/vuln/detail/CVE-2022-27666),[CVE-2022-27672](https://nvd.nist.gov/vuln/detail/CVE-2022-27672),[CVE-2022-27950](https://nvd.nist.gov/vuln/detail/CVE-2022-27950),[CVE-2022-28356](https://nvd.nist.gov/vuln/detail/CVE-2022-28356),[CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388),[CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389),[CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390),[CVE-2022-2873](https://nvd.nist.gov/vuln/detail/CVE-2022-2873),[CVE-2022-28893](https://nvd.nist.gov/vuln/detail/CVE-2022-28893),[CVE-2022-2905](https://nvd.nist.gov/vuln/detail/CVE-2022-2905),[CVE-2022-29156](https://nvd.nist.gov/vuln/detail/CVE-2022-29156),[CVE-2022-2938](https://nvd.nist.gov/vuln/detail/CVE-2022-2938),[CVE-2022-29581](https://nvd.nist.gov/vuln/detail/CVE-2022-29581),[CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582),[CVE-2022-2959](https://nvd.nist.gov/vuln/detail/CVE-2022-2959),[CVE-2022-2964](https://nvd.nist.gov/vuln/detail/CVE-2022-2964),[CVE-2022-2977](https://nvd.nist.gov/vuln/detail/CVE-2022-2977),[CVE-2022-2978](https://nvd.nist.gov/vuln/detail/CVE-2022-2978),[CVE-2022-29900](https://nvd.nist.gov/vuln/detail/CVE-2022-29900),[CVE-2022-29901](https://nvd.nist.gov/vuln/detail/CVE-2022-29901),[CVE-2022-3028](https://nvd.nist.gov/vuln/detail/CVE-2022-3028),[CVE-2022-30594](https://nvd.nist.gov/vuln/detail/CVE-2022-30594),[CVE-2022-3061](https://nvd.nist.gov/vuln/detail/CVE-2022-3061),[CVE-2022-3077](https://nvd.nist.gov/vuln/detail/CVE-2022-3077),[CVE-2022-3078](https://nvd.nist.gov/vuln/detail/CVE-2022-3078),[CVE-2022-3104](https://nvd.nist.gov/vuln/detail/CVE-2022-3104),[CVE-2022-3105](https://nvd.nist.gov/vuln/detail/CVE-2022-3105),[CVE-2022-3106](https://nvd.nist.gov/vuln/detail/CVE-2022-3106),[CVE-2022-3107](https://nvd.nist.gov/vuln/detail/CVE-2022-3107),[CVE-2022-3108](https://nvd.nist.gov/vuln/detail/CVE-2022-3108),[CVE-2022-3110](https://nvd.nist.gov/vuln/detail/CVE-2022-3110),[CVE-2022-3111](https://nvd.nist.gov/vuln/detail/CVE-2022-3111),[CVE-2022-3112](https://nvd.nist.gov/vuln/detail/CVE-2022-3112),[CVE-2022-3113](https://nvd.nist.gov/vuln/detail/CVE-2022-3113),[CVE-2022-3115](https://nvd.nist.gov/vuln/detail/CVE-2022-3115),[CVE-2022-3169](https://nvd.nist.gov/vuln/detail/CVE-2022-3169),[CVE-2022-3176](https://nvd.nist.gov/vuln/detail/CVE-2022-3176),[CVE-2022-3202](https://nvd.nist.gov/vuln/detail/CVE-2022-3202),[CVE-2022-32250](https://nvd.nist.gov/vuln/detail/CVE-2022-32250),[CVE-2022-32296](https://nvd.nist.gov/vuln/detail/CVE-2022-32296),[CVE-2022-3239](https://nvd.nist.gov/vuln/detail/CVE-2022-3239),[CVE-2022-32981](https://nvd.nist.gov/vuln/detail/CVE-2022-32981),[CVE-2022-3303](https://nvd.nist.gov/vuln/detail/CVE-2022-3303),[CVE-2022-3344](https://nvd.nist.gov/vuln/detail/CVE-2022-3344),[CVE-2022-33740](https://nvd.nist.gov/vuln/detail/CVE-2022-33740),[CVE-2022-33741](https://nvd.nist.gov/vuln/detail/CVE-2022-33741),[CVE-2022-33742](https://nvd.nist.gov/vuln/detail/CVE-2022-33742),[CVE-2022-33743](https://nvd.nist.gov/vuln/detail/CVE-2022-33743),[CVE-2022-33744](https://nvd.nist.gov/vuln/detail/CVE-2022-33744),[CVE-2022-33981](https://nvd.nist.gov/vuln/detail/CVE-2022-33981),[CVE-2022-3424](https://nvd.nist.gov/vuln/detail/CVE-2022-3424),[CVE-2022-34494](https://nvd.nist.gov/vuln/detail/CVE-2022-34494),[CVE-2022-34495](https://nvd.nist.gov/vuln/detail/CVE-2022-34495),[CVE-2022-34918](https://nvd.nist.gov/vuln/detail/CVE-2022-34918),[CVE-2022-3521](https://nvd.nist.gov/vuln/detail/CVE-2022-3521),[CVE-2022-3524](https://nvd.nist.gov/vuln/detail/CVE-2022-3524),[CVE-2022-3526](https://nvd.nist.gov/vuln/detail/CVE-2022-3526),[CVE-2022-3534](https://nvd.nist.gov/vuln/detail/CVE-2022-3534),[CVE-2022-3543](https://nvd.nist.gov/vuln/detail/CVE-2022-3543),[CVE-2022-3545](https://nvd.nist.gov/vuln/detail/CVE-2022-3545),[CVE-2022-3564](https://nvd.nist.gov/vuln/detail/CVE-2022-3564),[CVE-2022-3565](https://nvd.nist.gov/vuln/detail/CVE-2022-3565),[CVE-2022-3577](https://nvd.nist.gov/vuln/detail/CVE-2022-3577),[CVE-2022-3586](https://nvd.nist.gov/vuln/detail/CVE-2022-3586),[CVE-2022-3594](https://nvd.nist.gov/vuln/detail/CVE-2022-3594),[CVE-2022-36123](https://nvd.nist.gov/vuln/detail/CVE-2022-36123),[CVE-2022-3619](https://nvd.nist.gov/vuln/detail/CVE-2022-3619),[CVE-2022-3621](https://nvd.nist.gov/vuln/detail/CVE-2022-3621),[CVE-2022-3623](https://nvd.nist.gov/vuln/detail/CVE-2022-3623),[CVE-2022-3625](https://nvd.nist.gov/vuln/detail/CVE-2022-3625),[CVE-2022-3628](https://nvd.nist.gov/vuln/detail/CVE-2022-3628),[CVE-2022-36280](https://nvd.nist.gov/vuln/detail/CVE-2022-36280),[CVE-2022-3629](https://nvd.nist.gov/vuln/detail/CVE-2022-3629),[CVE-2022-3633](https://nvd.nist.gov/vuln/detail/CVE-2022-3633),[CVE-2022-3635](https://nvd.nist.gov/vuln/detail/CVE-2022-3635),[CVE-2022-3643](https://nvd.nist.gov/vuln/detail/CVE-2022-3643),[CVE-2022-3646](https://nvd.nist.gov/vuln/detail/CVE-2022-3646),[CVE-2022-3649](https://nvd.nist.gov/vuln/detail/CVE-2022-3649),[CVE-2022-36879](https://nvd.nist.gov/vuln/detail/CVE-2022-36879),[CVE-2022-36946](https://nvd.nist.gov/vuln/detail/CVE-2022-36946),[CVE-2022-3707](https://nvd.nist.gov/vuln/detail/CVE-2022-3707),[CVE-2022-39189](https://nvd.nist.gov/vuln/detail/CVE-2022-39189),[CVE-2022-39190](https://nvd.nist.gov/vuln/detail/CVE-2022-39190),[CVE-2022-40307](https://nvd.nist.gov/vuln/detail/CVE-2022-40307),[CVE-2022-40768](https://nvd.nist.gov/vuln/detail/CVE-2022-40768),[CVE-2022-4095](https://nvd.nist.gov/vuln/detail/CVE-2022-4095),[CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982),[CVE-2022-41218](https://nvd.nist.gov/vuln/detail/CVE-2022-41218),[CVE-2022-41222](https://nvd.nist.gov/vuln/detail/CVE-2022-41222),[CVE-2022-4129](https://nvd.nist.gov/vuln/detail/CVE-2022-4129),[CVE-2022-41674](https://nvd.nist.gov/vuln/detail/CVE-2022-41674),[CVE-2022-41849](https://nvd.nist.gov/vuln/detail/CVE-2022-41849),[CVE-2022-41850](https://nvd.nist.gov/vuln/detail/CVE-2022-41850),[CVE-2022-41858](https://nvd.nist.gov/vuln/detail/CVE-2022-41858),[CVE-2022-42432](https://nvd.nist.gov/vuln/detail/CVE-2022-42432),[CVE-2022-4269](https://nvd.nist.gov/vuln/detail/CVE-2022-4269),[CVE-2022-42703](https://nvd.nist.gov/vuln/detail/CVE-2022-42703),[CVE-2022-42719](https://nvd.nist.gov/vuln/detail/CVE-2022-42719),[CVE-2022-42720](https://nvd.nist.gov/vuln/detail/CVE-2022-42720),[CVE-2022-42721](https://nvd.nist.gov/vuln/detail/CVE-2022-42721),[CVE-2022-42722](https://nvd.nist.gov/vuln/detail/CVE-2022-42722),[CVE-2022-42895](https://nvd.nist.gov/vuln/detail/CVE-2022-42895),[CVE-2022-42896](https://nvd.nist.gov/vuln/detail/CVE-2022-42896),[CVE-2022-43750](https://nvd.nist.gov/vuln/detail/CVE-2022-43750),[CVE-2022-4378](https://nvd.nist.gov/vuln/detail/CVE-2022-4378),[CVE-2022-4379](https://nvd.nist.gov/vuln/detail/CVE-2022-4379),[CVE-2022-4382](https://nvd.nist.gov/vuln/detail/CVE-2022-4382),[CVE-2022-43945](https://nvd.nist.gov/vuln/detail/CVE-2022-43945),[CVE-2022-45869](https://nvd.nist.gov/vuln/detail/CVE-2022-45869),[CVE-2022-45886](https://nvd.nist.gov/vuln/detail/CVE-2022-45886),[CVE-2022-45887](https://nvd.nist.gov/vuln/detail/CVE-2022-45887),[CVE-2022-45919](https://nvd.nist.gov/vuln/detail/CVE-2022-45919),[CVE-2022-45934](https://nvd.nist.gov/vuln/detail/CVE-2022-45934),[CVE-2022-4662](https://nvd.nist.gov/vuln/detail/CVE-2022-4662),[CVE-2022-4744](https://nvd.nist.gov/vuln/detail/CVE-2022-4744),[CVE-2022-47518](https://nvd.nist.gov/vuln/detail/CVE-2022-47518),[CVE-2022-47519](https://nvd.nist.gov/vuln/detail/CVE-2022-47519),[CVE-2022-47520](https://nvd.nist.gov/vuln/detail/CVE-2022-47520),[CVE-2022-47521](https://nvd.nist.gov/vuln/detail/CVE-2022-47521),[CVE-2022-47929](https://nvd.nist.gov/vuln/detail/CVE-2022-47929),[CVE-2022-47938](https://nvd.nist.gov/vuln/detail/CVE-2022-47938),[CVE-2022-47939](https://nvd.nist.gov/vuln/detail/CVE-2022-47939),[CVE-2022-47941](https://nvd.nist.gov/vuln/detail/CVE-2022-47941),[CVE-2022-47942](https://nvd.nist.gov/vuln/detail/CVE-2022-47942),[CVE-2022-47943](https://nvd.nist.gov/vuln/detail/CVE-2022-47943),[CVE-2022-4842](https://nvd.nist.gov/vuln/detail/CVE-2022-4842),[CVE-2022-48423](https://nvd.nist.gov/vuln/detail/CVE-2022-48423),[CVE-2022-48424](https://nvd.nist.gov/vuln/detail/CVE-2022-48424),[CVE-2022-48425](https://nvd.nist.gov/vuln/detail/CVE-2022-48425),[CVE-2022-48502](https://nvd.nist.gov/vuln/detail/CVE-2022-48502),[CVE-2023-0045](https://nvd.nist.gov/vuln/detail/CVE-2023-0045),[CVE-2023-0160](https://nvd.nist.gov/vuln/detail/CVE-2023-0160),[CVE-2023-0179](https://nvd.nist.gov/vuln/detail/CVE-2023-0179),[CVE-2023-0210](https://nvd.nist.gov/vuln/detail/CVE-2023-0210),[CVE-2023-0266](https://nvd.nist.gov/vuln/detail/CVE-2023-0266),[CVE-2023-0386](https://nvd.nist.gov/vuln/detail/CVE-2023-0386),[CVE-2023-0394](https://nvd.nist.gov/vuln/detail/CVE-2023-0394),[CVE-2023-0458](https://nvd.nist.gov/vuln/detail/CVE-2023-0458),[CVE-2023-0459](https://nvd.nist.gov/vuln/detail/CVE-2023-0459),[CVE-2023-0461](https://nvd.nist.gov/vuln/detail/CVE-2023-0461),[CVE-2023-0590](https://nvd.nist.gov/vuln/detail/CVE-2023-0590),[CVE-2023-0615](https://nvd.nist.gov/vuln/detail/CVE-2023-0615),[CVE-2023-1073](https://nvd.nist.gov/vuln/detail/CVE-2023-1073),[CVE-2023-1074](https://nvd.nist.gov/vuln/detail/CVE-2023-1074),[CVE-2023-1076](https://nvd.nist.gov/vuln/detail/CVE-2023-1076),[CVE-2023-1077](https://nvd.nist.gov/vuln/detail/CVE-2023-1077),[CVE-2023-1078](https://nvd.nist.gov/vuln/detail/CVE-2023-1078),[CVE-2023-1079](https://nvd.nist.gov/vuln/detail/CVE-2023-1079),[CVE-2023-1095](https://nvd.nist.gov/vuln/detail/CVE-2023-1095),[CVE-2023-1118](https://nvd.nist.gov/vuln/detail/CVE-2023-1118),[CVE-2023-1192](https://nvd.nist.gov/vuln/detail/CVE-2023-1192),[CVE-2023-1206](https://nvd.nist.gov/vuln/detail/CVE-2023-1206),[CVE-2023-1249](https://nvd.nist.gov/vuln/detail/CVE-2023-1249),[CVE-2023-1252](https://nvd.nist.gov/vuln/detail/CVE-2023-1252),[CVE-2023-1281](https://nvd.nist.gov/vuln/detail/CVE-2023-1281),[CVE-2023-1295](https://nvd.nist.gov/vuln/detail/CVE-2023-1295),[CVE-2023-1380](https://nvd.nist.gov/vuln/detail/CVE-2023-1380),[CVE-2023-1382](https://nvd.nist.gov/vuln/detail/CVE-2023-1382),[CVE-2023-1513](https://nvd.nist.gov/vuln/detail/CVE-2023-1513),[CVE-2023-1582](https://nvd.nist.gov/vuln/detail/CVE-2023-1582),[CVE-2023-1611](https://nvd.nist.gov/vuln/detail/CVE-2023-1611),[CVE-2023-1637](https://nvd.nist.gov/vuln/detail/CVE-2023-1637),[CVE-2023-1652](https://nvd.nist.gov/vuln/detail/CVE-2023-1652),[CVE-2023-1670](https://nvd.nist.gov/vuln/detail/CVE-2023-1670),[CVE-2023-1829](https://nvd.nist.gov/vuln/detail/CVE-2023-1829),[CVE-2023-1838](https://nvd.nist.gov/vuln/detail/CVE-2023-1838),[CVE-2023-1855](https://nvd.nist.gov/vuln/detail/CVE-2023-1855),[CVE-2023-1859](https://nvd.nist.gov/vuln/detail/CVE-2023-1859),[CVE-2023-1989](https://nvd.nist.gov/vuln/detail/CVE-2023-1989),[CVE-2023-1990](https://nvd.nist.gov/vuln/detail/CVE-2023-1990),[CVE-2023-2002](https://nvd.nist.gov/vuln/detail/CVE-2023-2002),[CVE-2023-2006](https://nvd.nist.gov/vuln/detail/CVE-2023-2006),[CVE-2023-2008](https://nvd.nist.gov/vuln/detail/CVE-2023-2008),[CVE-2023-2019](https://nvd.nist.gov/vuln/detail/CVE-2023-2019),[CVE-2023-20569](https://nvd.nist.gov/vuln/detail/CVE-2023-20569),[CVE-2023-20588](https://nvd.nist.gov/vuln/detail/CVE-2023-20588),[CVE-2023-20593](https://nvd.nist.gov/vuln/detail/CVE-2023-20593),[CVE-2023-20928](https://nvd.nist.gov/vuln/detail/CVE-2023-20928),[CVE-2023-21102](https://nvd.nist.gov/vuln/detail/CVE-2023-21102),[CVE-2023-2124](https://nvd.nist.gov/vuln/detail/CVE-2023-2124),[CVE-2023-2156](https://nvd.nist.gov/vuln/detail/CVE-2023-2156),[CVE-2023-2162](https://nvd.nist.gov/vuln/detail/CVE-2023-2162),[CVE-2023-2163](https://nvd.nist.gov/vuln/detail/CVE-2023-2163),[CVE-2023-2166](https://nvd.nist.gov/vuln/detail/CVE-2023-2166),[CVE-2023-2177](https://nvd.nist.gov/vuln/detail/CVE-2023-2177),[CVE-2023-2194](https://nvd.nist.gov/vuln/detail/CVE-2023-2194),[CVE-2023-2235](https://nvd.nist.gov/vuln/detail/CVE-2023-2235),[CVE-2023-2269](https://nvd.nist.gov/vuln/detail/CVE-2023-2269),[CVE-2023-22998](https://nvd.nist.gov/vuln/detail/CVE-2023-22998),[CVE-2023-22999](https://nvd.nist.gov/vuln/detail/CVE-2023-22999),[CVE-2023-23001](https://nvd.nist.gov/vuln/detail/CVE-2023-23001),[CVE-2023-23002](https://nvd.nist.gov/vuln/detail/CVE-2023-23002),[CVE-2023-23004](https://nvd.nist.gov/vuln/detail/CVE-2023-23004),[CVE-2023-23006](https://nvd.nist.gov/vuln/detail/CVE-2023-23006),[CVE-2023-23454](https://nvd.nist.gov/vuln/detail/CVE-2023-23454),[CVE-2023-23455](https://nvd.nist.gov/vuln/detail/CVE-2023-23455),[CVE-2023-23559](https://nvd.nist.gov/vuln/detail/CVE-2023-23559),[CVE-2023-25012](https://nvd.nist.gov/vuln/detail/CVE-2023-25012),[CVE-2023-2513](https://nvd.nist.gov/vuln/detail/CVE-2023-2513),[CVE-2023-26544](https://nvd.nist.gov/vuln/detail/CVE-2023-26544),[CVE-2023-26545](https://nvd.nist.gov/vuln/detail/CVE-2023-26545),[CVE-2023-26606](https://nvd.nist.gov/vuln/detail/CVE-2023-26606),[CVE-2023-26607](https://nvd.nist.gov/vuln/detail/CVE-2023-26607),[CVE-2023-28327](https://nvd.nist.gov/vuln/detail/CVE-2023-28327),[CVE-2023-28328](https://nvd.nist.gov/vuln/detail/CVE-2023-28328),[CVE-2023-28410](https://nvd.nist.gov/vuln/detail/CVE-2023-28410),[CVE-2023-28466](https://nvd.nist.gov/vuln/detail/CVE-2023-28466),[CVE-2023-2860](https://nvd.nist.gov/vuln/detail/CVE-2023-2860),[CVE-2023-28772](https://nvd.nist.gov/vuln/detail/CVE-2023-28772),[CVE-2023-2898](https://nvd.nist.gov/vuln/detail/CVE-2023-2898),[CVE-2023-2985](https://nvd.nist.gov/vuln/detail/CVE-2023-2985),[CVE-2023-3006](https://nvd.nist.gov/vuln/detail/CVE-2023-3006),[CVE-2023-30456](https://nvd.nist.gov/vuln/detail/CVE-2023-30456),[CVE-2023-30772](https://nvd.nist.gov/vuln/detail/CVE-2023-30772),[CVE-2023-3090](https://nvd.nist.gov/vuln/detail/CVE-2023-3090),[CVE-2023-3111](https://nvd.nist.gov/vuln/detail/CVE-2023-3111),[CVE-2023-31248](https://nvd.nist.gov/vuln/detail/CVE-2023-31248),[CVE-2023-3141](https://nvd.nist.gov/vuln/detail/CVE-2023-3141),[CVE-2023-31436](https://nvd.nist.gov/vuln/detail/CVE-2023-31436),[CVE-2023-3159](https://nvd.nist.gov/vuln/detail/CVE-2023-3159),[CVE-2023-3161](https://nvd.nist.gov/vuln/detail/CVE-2023-3161),[CVE-2023-3212](https://nvd.nist.gov/vuln/detail/CVE-2023-3212),[CVE-2023-3220](https://nvd.nist.gov/vuln/detail/CVE-2023-3220),[CVE-2023-32233](https://nvd.nist.gov/vuln/detail/CVE-2023-32233),[CVE-2023-32248](https://nvd.nist.gov/vuln/detail/CVE-2023-32248),[CVE-2023-32269](https://nvd.nist.gov/vuln/detail/CVE-2023-32269),[CVE-2023-3268](https://nvd.nist.gov/vuln/detail/CVE-2023-3268),[CVE-2023-33203](https://nvd.nist.gov/vuln/detail/CVE-2023-33203),[CVE-2023-33288](https://nvd.nist.gov/vuln/detail/CVE-2023-33288),[CVE-2023-3338](https://nvd.nist.gov/vuln/detail/CVE-2023-3338),[CVE-2023-3355](https://nvd.nist.gov/vuln/detail/CVE-2023-3355),[CVE-2023-3357](https://nvd.nist.gov/vuln/detail/CVE-2023-3357),[CVE-2023-3358](https://nvd.nist.gov/vuln/detail/CVE-2023-3358),[CVE-2023-3390](https://nvd.nist.gov/vuln/detail/CVE-2023-3390),[CVE-2023-35001](https://nvd.nist.gov/vuln/detail/CVE-2023-35001),[CVE-2023-3567](https://nvd.nist.gov/vuln/detail/CVE-2023-3567),[CVE-2023-35788](https://nvd.nist.gov/vuln/detail/CVE-2023-35788),[CVE-2023-35823](https://nvd.nist.gov/vuln/detail/CVE-2023-35823),[CVE-2023-35824](https://nvd.nist.gov/vuln/detail/CVE-2023-35824),[CVE-2023-35828](https://nvd.nist.gov/vuln/detail/CVE-2023-35828),[CVE-2023-35829](https://nvd.nist.gov/vuln/detail/CVE-2023-35829),[CVE-2023-3609](https://nvd.nist.gov/vuln/detail/CVE-2023-3609),[CVE-2023-3610](https://nvd.nist.gov/vuln/detail/CVE-2023-3610),[CVE-2023-3611](https://nvd.nist.gov/vuln/detail/CVE-2023-3611),[CVE-2023-3772](https://nvd.nist.gov/vuln/detail/CVE-2023-3772),[CVE-2023-3776](https://nvd.nist.gov/vuln/detail/CVE-2023-3776),[CVE-2023-3777](https://nvd.nist.gov/vuln/detail/CVE-2023-3777),[CVE-2023-3812](https://nvd.nist.gov/vuln/detail/CVE-2023-3812),[CVE-2023-38426](https://nvd.nist.gov/vuln/detail/CVE-2023-38426),[CVE-2023-38428](https://nvd.nist.gov/vuln/detail/CVE-2023-38428),[CVE-2023-38429](https://nvd.nist.gov/vuln/detail/CVE-2023-38429),[CVE-2023-38432](https://nvd.nist.gov/vuln/detail/CVE-2023-38432),[CVE-2023-3863](https://nvd.nist.gov/vuln/detail/CVE-2023-3863),[CVE-2023-3865](https://nvd.nist.gov/vuln/detail/CVE-2023-3865),[CVE-2023-3866](https://nvd.nist.gov/vuln/detail/CVE-2023-3866),[CVE-2023-4004](https://nvd.nist.gov/vuln/detail/CVE-2023-4004),[CVE-2023-4015](https://nvd.nist.gov/vuln/detail/CVE-2023-4015),[CVE-2023-40283](https://nvd.nist.gov/vuln/detail/CVE-2023-40283),[CVE-2023-4128](https://nvd.nist.gov/vuln/detail/CVE-2023-4128),[CVE-2023-4132](https://nvd.nist.gov/vuln/detail/CVE-2023-4132),[CVE-2023-4147](https://nvd.nist.gov/vuln/detail/CVE-2023-4147),[CVE-2023-4206](https://nvd.nist.gov/vuln/detail/CVE-2023-4206),[CVE-2023-4207](https://nvd.nist.gov/vuln/detail/CVE-2023-4207),[CVE-2023-4208](https://nvd.nist.gov/vuln/detail/CVE-2023-4208),[CVE-2023-4273](https://nvd.nist.gov/vuln/detail/CVE-2023-4273),[CVE-2023-42752](https://nvd.nist.gov/vuln/detail/CVE-2023-42752),[CVE-2023-42753](https://nvd.nist.gov/vuln/detail/CVE-2023-42753),[CVE-2023-42755](https://nvd.nist.gov/vuln/detail/CVE-2023-42755),[CVE-2023-4385](https://nvd.nist.gov/vuln/detail/CVE-2023-4385),[CVE-2023-4387](https://nvd.nist.gov/vuln/detail/CVE-2023-4387),[CVE-2023-4389](https://nvd.nist.gov/vuln/detail/CVE-2023-4389),[CVE-2023-4459](https://nvd.nist.gov/vuln/detail/CVE-2023-4459),[CVE-2023-4569](https://nvd.nist.gov/vuln/detail/CVE-2023-4569),[CVE-2023-4623](https://nvd.nist.gov/vuln/detail/CVE-2023-4623), [CVE-2023-4921](https://nvd.nist.gov/vuln/detail/CVE-2023-4921), [CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982), [CVE-2022-41804](https://nvd.nist.gov/vuln/detail/CVE-2022-41804), [CVE-2023-20569](https://nvd.nist.gov/vuln/detail/CVE-2023-20569), [CVE-2023-23908](https://nvd.nist.gov/vuln/detail/CVE-2023-23908))\n - Docker ([CVE-2022-36109](https://nvd.nist.gov/vuln/detail/CVE-2022-36109), [CVE-2022-29526](https://nvd.nist.gov/vuln/detail/CVE-2022-29526))\n - Go ([CVE-2021-44716](https://nvd.nist.gov/vuln/detail/CVE-2021-44716), [CVE-2021-44717](https://nvd.nist.gov/vuln/detail/CVE-2021-44717), [CVE-2022-1705](https://nvd.nist.gov/vuln/detail/CVE-2022-1705), [CVE-2022-1962](https://nvd.nist.gov/vuln/detail/CVE-2022-1962), [CVE-2022-2879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879), [CVE-2022-2880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880), [CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675), [CVE-2022-27664](https://nvd.nist.gov/vuln/detail/CVE-2022-27664), [CVE-2022-28131](https://nvd.nist.gov/vuln/detail/CVE-2022-28131), [CVE-2022-29526](https://nvd.nist.gov/vuln/detail/CVE-2022-29526), [CVE-2022-30630](https://nvd.nist.gov/vuln/detail/CVE-2022-30630), [CVE-2022-30631](https://nvd.nist.gov/vuln/detail/CVE-2022-30631), [CVE-2022-30632](https://nvd.nist.gov/vuln/detail/CVE-2022-30632), [CVE-2022-30633](https://nvd.nist.gov/vuln/detail/CVE-2022-30633), [CVE-2022-30635](https://nvd.nist.gov/vuln/detail/CVE-2022-30635), [CVE-2022-32148](https://nvd.nist.gov/vuln/detail/CVE-2022-32148), [CVE-2022-32189](https://nvd.nist.gov/vuln/detail/CVE-2022-32189), [CVE-2022-32190](https://nvd.nist.gov/vuln/detail/CVE-2022-32190), [CVE-2022-41715](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715), [CVE-2022-41717](https://nvd.nist.gov/vuln/detail/CVE-2022-41717))\n - bind tools ([CVE-2022-2795](https://nvd.nist.gov/vuln/detail/CVE-2022-2795), [CVE-2022-2881](https://nvd.nist.gov/vuln/detail/CVE-2022-2881), [CVE-2022-2906](https://nvd.nist.gov/vuln/detail/CVE-2022-2906), [CVE-2022-3080](https://nvd.nist.gov/vuln/detail/CVE-2022-3080), [CVE-2022-38177](https://nvd.nist.gov/vuln/detail/CVE-2022-38177), [CVE-2022-38178](https://nvd.nist.gov/vuln/detail/CVE-2022-38178))\n - binutils ([CVE-2021-45078](https://nvd.nist.gov/vuln/detail/CVE-2021-45078))\n - cifs-utils ([CVE-2021-20208](https://nvd.nist.gov/vuln/detail/CVE-2021-20208), [CVE-2022-27239](https://nvd.nist.gov/vuln/detail/CVE-2022-27239), [CVE-2022-29869](https://nvd.nist.gov/vuln/detail/CVE-2022-29869))\n - containerd ([CVE-2021-43816](https://nvd.nist.gov/vuln/detail/CVE-2021-43816), [CVE-2022-23471](https://nvd.nist.gov/vuln/detail/CVE-2022-23471), [CVE-2022-23648](https://nvd.nist.gov/vuln/detail/CVE-2022-23648), [CVE-2022-24769](https://nvd.nist.gov/vuln/detail/CVE-2022-24769), [CVE-2022-31030](https://nvd.nist.gov/vuln/detail/CVE-2022-31030))\n - cpio ([CVE-2021-38185](https://nvd.nist.gov/vuln/detail/CVE-2021-38185))\n - cryptsetup ([CVE-2021-4122](https://nvd.nist.gov/vuln/detail/CVE-2021-4122)) \n - curl ([CVE-2022-22576](https://nvd.nist.gov/vuln/detail/CVE-2022-22576), [CVE-2022-27774](https://nvd.nist.gov/vuln/detail/CVE-2022-27774), [CVE-2022-27775](https://nvd.nist.gov/vuln/detail/CVE-2022-27775), [CVE-2022-27776](https://nvd.nist.gov/vuln/detail/CVE-2022-27776), [CVE-2022-27778](https://nvd.nist.gov/vuln/detail/CVE-2022-27778), [CVE-2022-27779](https://nvd.nist.gov/vuln/detail/CVE-2022-27779), [CVE-2022-27780](https://nvd.nist.gov/vuln/detail/CVE-2022-27780), [CVE-2022-27781](https://nvd.nist.gov/vuln/detail/CVE-2022-27781), [CVE-2022-27782](https://nvd.nist.gov/vuln/detail/CVE-2022-27782), [CVE-2022-30115](https://nvd.nist.gov/vuln/detail/CVE-2022-30115), [CVE-2022-32205](https://nvd.nist.gov/vuln/detail/CVE-2022-32205), [CVE-2022-32206](https://nvd.nist.gov/vuln/detail/CVE-2022-32206), [CVE-2022-32207](https://nvd.nist.gov/vuln/detail/CVE-2022-32207), [CVE-2022-32208](https://nvd.nist.gov/vuln/detail/CVE-2022-32208), [CVE-2022-32221](https://nvd.nist.gov/vuln/detail/CVE-2022-32221), [CVE-2022-35260](https://nvd.nist.gov/vuln/detail/CVE-2022-32221), [CVE-2022-42915](https://nvd.nist.gov/vuln/detail/CVE-2022-32221), [CVE-2022-42916](https://nvd.nist.gov/vuln/detail/CVE-2022-32221), [CVE-2022-35252](https://nvd.nist.gov/vuln/detail/CVE-2022-35252), [CVE-2022-43551](https://nvd.nist.gov/vuln/detail/CVE-2022-43551), [CVE-2022-43552](https://nvd.nist.gov/vuln/detail/CVE-2022-43552))\n - dbus ([CVE-2022-42010](https://nvd.nist.gov/vuln/detail/CVE-2022-42010), [CVE-2022-42011](https://nvd.nist.gov/vuln/detail/CVE-2022-42011), [CVE-2022-42012](https://nvd.nist.gov/vuln/detail/CVE-2022-42012))\n - duktape ([CVE-2021-46322](https://nvd.nist.gov/vuln/detail/CVE-2021-46322))\n - expat ([CVE-2022-40674](https://nvd.nist.gov/vuln/detail/CVE-2022-40674), [CVE-2022-43680](https://nvd.nist.gov/vuln/detail/CVE-2022-43680))\n - gcc ([CVE-2020-13844](https://nvd.nist.gov/vuln/detail/CVE-2020-13844))\n - git ([CVE-2022-23521](https://nvd.nist.gov/vuln/detail/CVE-2022-23521), [CVE-2022-24765](https://nvd.nist.gov/vuln/detail/CVE-2022-24765), [CVE-2022-29187](https://nvd.nist.gov/vuln/detail/CVE-2022-29187), [CVE-2022-39253](https://nvd.nist.gov/vuln/detail/CVE-2022-39253), [CVE-2022-39260](https://nvd.nist.gov/vuln/detail/CVE-2022-39260), [CVE-2022-41903](https://nvd.nist.gov/vuln/detail/CVE-2022-41903))\n - glib ([fixes to normal form handling in GVariant](https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835))\n - gnupg ([CVE-2022-34903](https://nvd.nist.gov/vuln/detail/CVE-2022-34903))\n - gnutls ([CVE-2021-4209](https://nvd.nist.gov/vuln/detail/CVE-2021-4209), [GNUTLS-SA-2022-01-17](https://gitlab.com/gnutls/gnutls/-/issues/1277), [CVE-2022-2509](https://nvd.nist.gov/vuln/detail/CVE-2022-2509))\n - gzip,xz-utils ([CVE-2022-1271](https://nvd.nist.gov/vuln/detail/CVE-2022-1271))\n - ignition ([CVE-2020-14040](https://nvd.nist.gov/vuln/detail/CVE-2020-14040), [CVE-2021-38561](https://nvd.nist.gov/vuln/detail/CVE-2021-38561), [CVE-2022-1706](https://nvd.nist.gov/vuln/detail/CVE-2022-1706))\n - intel-microcode ([CVE-2021-0127](https://nvd.nist.gov/vuln/detail/CVE-2021-0127), [CVE-2021-0146](https://nvd.nist.gov/vuln/detail/CVE-2021-0146), [CVE-2022-21151](https://nvd.nist.gov/vuln/detail/CVE-2022-21151), [CVE-2022-21233](https://nvd.nist.gov/vuln/detail/CVE-2022-21233))\n - krb5 ([CVE-2021-37750](https://nvd.nist.gov/vuln/detail/CVE-2021-37750))\n - libarchive ([CVE-2021-31566](https://nvd.nist.gov/vuln/detail/CVE-2021-31566), [CVE-2021-36976](https://nvd.nist.gov/vuln/detail/CVE-2021-36976), [CVE-2022-26280](https://nvd.nist.gov/vuln/detail/CVE-2022-26280), [CVE-2022-36227](https://nvd.nist.gov/vuln/detail/CVE-2022-36227), [libarchive-1565](https://github.com/libarchive/libarchive/issues/1565), [libarchive-1566](https://github.com/libarchive/libarchive/issues/1566))\n - libksba ([CVE-2022-3515](https://nvd.nist.gov/vuln/detail/CVE-2022-3515), [CVE-2022-47629](https://nvd.nist.gov/vuln/detail/CVE-2022-47629))\n - GNU Libtasn1 ([Gentoo#866237](https://bugs.gentoo.org/866237))\n - libtirpc ([CVE-2021-46828](https://nvd.nist.gov/vuln/detail/CVE-2021-46828))\n - libxml2 ([CVE-2016-3709](https://nvd.nist.gov/vuln/detail/CVE-2016-3709), [CVE-2022-2309](https://nvd.nist.gov/vuln/detail/CVE-2022-2309), [CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308), [CVE-2022-29824](https://nvd.nist.gov/vuln/detail/CVE-2022-29824), [CVE-2022-40303](https://nvd.nist.gov/vuln/detail/CVE-2022-40303), [CVE-2022-40304](https://nvd.nist.gov/vuln/detail/CVE-2022-40304))\n - logrotate ([CVE-2022-1348](https://nvd.nist.gov/vuln/detail/CVE-2022-1348))\n - multipath-tools ([CVE-2022-41973](https://nvd.nist.gov/vuln/detail/CVE-2022-41973), [CVE-2022-41974](https://nvd.nist.gov/vuln/detail/CVE-2022-41974))\n - ncurses ([CVE-2022-29458](https://nvd.nist.gov/vuln/detail/CVE-2022-29458))\n - nvidia-drivers ([CVE-2022-28181](https://nvd.nist.gov/vuln/detail/CVE-2022-28181), [CVE-2022-28183](https://nvd.nist.gov/vuln/detail/CVE-2022-28183), [CVE-2022-28184](https://nvd.nist.gov/vuln/detail/CVE-2022-28184), [CVE-2022-28185](https://nvd.nist.gov/vuln/detail/CVE-2022-28185))\n - oniguruma ([oniguruma-20220430](https://bugs.gentoo.org/841893))\n - OpenSSH ([CVE-2021-41617](https://nvd.nist.gov/vuln/detail/CVE-2021-41617))\n - OpenSSL ([CVE-2021-4044](https://nvd.nist.gov/vuln/detail/CVE-2021-4044), [CVE-2022-1292](https://nvd.nist.gov/vuln/detail/CVE-2022-1292), [CVE-2022-1343](https://nvd.nist.gov/vuln/detail/CVE-2022-1343), [CVE-2022-1434](https://nvd.nist.gov/vuln/detail/CVE-2022-1434), [CVE-2022-1473](https://nvd.nist.gov/vuln/detail/CVE-2022-1473), [CVE-2022-3602](https://nvd.nist.gov/vuln/detail/CVE-2022-3602), [CVE-2022-3786](https://nvd.nist.gov/vuln/detail/CVE-2022-3786))\n - polkit ([CVE-2021-4115](https://nvd.nist.gov/vuln/detail/CVE-2021-4115))\n - rsync ([CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032), [CVE-2022-29154](https://nvd.nist.gov/vuln/detail/CVE-2022-29154))\n - runc ([CVE-2022-29162](https://nvd.nist.gov/vuln/detail/CVE-2022-29162))\n - shadow ([CVE-2013-4235](https://nvd.nist.gov/vuln/detail/CVE-2013-4235))\n - sudo ([CVE-2022-43995](https://nvd.nist.gov/vuln/detail/CVE-2022-43995), [CVE-2023-22809](https://nvd.nist.gov/vuln/detail/CVE-2023-22809))\n - systemd ([CVE-2021-3997](https://nvd.nist.gov/vuln/detail/CVE-2021-3997), [CVE-2022-3821](https://nvd.nist.gov/vuln/detail/CVE-2022-3821), [CVE-2022-4415](https://nvd.nist.gov/vuln/detail/CVE-2022-4415))\n - unzip ([CVE-2022-0529](https://nvd.nist.gov/vuln/detail/CVE-2022-0529), [CVE-2022-0530](https://nvd.nist.gov/vuln/detail/CVE-2022-0530), [CVE-2021-4217](https://nvd.nist.gov/vuln/detail/CVE-2021-4217))\n - util-linux ([CVE-2021-3995](https://nvd.nist.gov/vuln/detail/CVE-2021-3995), [CVE-2021-3996](https://nvd.nist.gov/vuln/detail/CVE-2021-3996), [CVE-2022-0563](https://nvd.nist.gov/vuln/detail/CVE-2022-0563))\n - vim ([CVE-2021-3872](https://nvd.nist.gov/vuln/detail/CVE-2021-3872), [CVE-2021-3875](https://nvd.nist.gov/vuln/detail/CVE-2021-3875), [CVE-2021-3903](https://nvd.nist.gov/vuln/detail/CVE-2021-3903), [CVE-2021-3927](https://nvd.nist.gov/vuln/detail/CVE-2021-3927), [CVE-2021-3928](https://nvd.nist.gov/vuln/detail/CVE-2021-3928), [CVE-2021-3968](https://nvd.nist.gov/vuln/detail/CVE-2021-3968), [CVE-2021-3973](https://nvd.nist.gov/vuln/detail/CVE-2021-3973), [CVE-2021-3974](https://nvd.nist.gov/vuln/detail/CVE-2021-3974), [CVE-2021-3984](https://nvd.nist.gov/vuln/detail/CVE-2021-3984), [CVE-2021-4019](https://nvd.nist.gov/vuln/detail/CVE-2021-4019), [CVE-2021-4069](https://nvd.nist.gov/vuln/detail/CVE-2021-4069), [CVE-2021-4136](https://nvd.nist.gov/vuln/detail/CVE-2021-4136), [CVE-2021-4173](https://nvd.nist.gov/vuln/detail/CVE-2021-4173),[ CVE-2021-4166](https://nvd.nist.gov/vuln/detail/CVE-2021-4166), [CVE-2021-4187](https://nvd.nist.gov/vuln/detail/CVE-2021-4187), [CVE-2021-4192](https://nvd.nist.gov/vuln/detail/CVE-2021-4192), [CVE-2021-4193](https://nvd.nist.gov/vuln/detail/CVE-2021-4193), [CVE-2022-0128](https://nvd.nist.gov/vuln/detail/CVE-2022-0128), [CVE-2022-0156](https://nvd.nist.gov/vuln/detail/CVE-2022-0156), [CVE-2022-0158](https://nvd.nist.gov/vuln/detail/CVE-2022-0158), [CVE-2022-0213](https://nvd.nist.gov/vuln/detail/CVE-2022-0213), [CVE-2022-0261](https://nvd.nist.gov/vuln/detail/CVE-2022-0261), [CVE-2022-0318](https://nvd.nist.gov/vuln/detail/CVE-2022-0318), [CVE-2022-0319](https://nvd.nist.gov/vuln/detail/CVE-2022-0319), [CVE-2022-0351](https://nvd.nist.gov/vuln/detail/CVE-2022-0351), [CVE-2022-0359](https://nvd.nist.gov/vuln/detail/CVE-2022-0359), [CVE-2022-0361](https://nvd.nist.gov/vuln/detail/CVE-2022-0361), [CVE-2022-0368](https://nvd.nist.gov/vuln/detail/CVE-2022-0368), [CVE-2022-0392](https://nvd.nist.gov/vuln/detail/CVE-2022-0392), [CVE-2022-0393](https://nvd.nist.gov/vuln/detail/CVE-2022-0393), [CVE-2022-0407](https://nvd.nist.gov/vuln/detail/CVE-2022-0407), [CVE-2022-0408](https://nvd.nist.gov/vuln/detail/CVE-2022-0408), [CVE-2022-0413](https://nvd.nist.gov/vuln/detail/CVE-2022-0413), [CVE-2022-0417](https://nvd.nist.gov/vuln/detail/CVE-2022-0417), [CVE-2022-0443](https://nvd.nist.gov/vuln/detail/CVE-2022-0443), [CVE-2022-0629](https://nvd.nist.gov/vuln/detail/CVE-2022-0629), [CVE-2022-0685](https://nvd.nist.gov/vuln/detail/CVE-2022-0685), [CVE-2022-0714](https://nvd.nist.gov/vuln/detail/CVE-2022-0714), [CVE-2022-0729](https://nvd.nist.gov/vuln/detail/CVE-2022-0729), [CVE-2022-0943](https://nvd.nist.gov/vuln/detail/CVE-2022-0943), [CVE-2022-1154](https://nvd.nist.gov/vuln/detail/CVE-2022-1154), [CVE-2022-1160](https://nvd.nist.gov/vuln/detail/CVE-2022-1160), [CVE-2022-1381](https://nvd.nist.gov/vuln/detail/CVE-2022-1381), [CVE-2022-1420](https://nvd.nist.gov/vuln/detail/CVE-2022-1420), [CVE-2022-1616](https://nvd.nist.gov/vuln/detail/CVE-2022-1616), [CVE-2022-1619](https://nvd.nist.gov/vuln/detail/CVE-2022-1619), [CVE-2022-1620](https://nvd.nist.gov/vuln/detail/CVE-2022-1620), [CVE-2022-1621](https://nvd.nist.gov/vuln/detail/CVE-2022-1621), [CVE-2022-1629](https://nvd.nist.gov/vuln/detail/CVE-2022-1629), [CVE-2022-1674](https://nvd.nist.gov/vuln/detail/CVE-2022-1674), [CVE-2022-1725](https://nvd.nist.gov/vuln/detail/CVE-2022-1725), [CVE-2022-1733](https://nvd.nist.gov/vuln/detail/CVE-2022-1733), [CVE-2022-1735](https://nvd.nist.gov/vuln/detail/CVE-2022-1735), [CVE-2022-1769](https://nvd.nist.gov/vuln/detail/CVE-2022-1769), [CVE-2022-1771](https://nvd.nist.gov/vuln/detail/CVE-2022-1771), [CVE-2022-1785](https://nvd.nist.gov/vuln/detail/CVE-2022-1785), [CVE-2022-1796](https://nvd.nist.gov/vuln/detail/CVE-2022-1796), [CVE-2022-1897](https://nvd.nist.gov/vuln/detail/CVE-2022-1897), [CVE-2022-1898](https://nvd.nist.gov/vuln/detail/CVE-2022-1898), [CVE-2022-1886](https://nvd.nist.gov/vuln/detail/CVE-2022-1886), [CVE-2022-1851](https://nvd.nist.gov/vuln/detail/CVE-2022-1851), [CVE-2022-1927](https://nvd.nist.gov/vuln/detail/CVE-2022-1927), [CVE-2022-1942](https://nvd.nist.gov/vuln/detail/CVE-2022-1942), [CVE-2022-1968](https://nvd.nist.gov/vuln/detail/CVE-2022-1968), [CVE-2022-2000](https://nvd.nist.gov/vuln/detail/CVE-2022-2000), [CVE-2022-2042](https://nvd.nist.gov/vuln/detail/CVE-2022-2042), [CVE-2022-2124](https://nvd.nist.gov/vuln/detail/CVE-2022-2124), [CVE-2022-2125](https://nvd.nist.gov/vuln/detail/CVE-2022-2125), [CVE-2022-2126](https://nvd.nist.gov/vuln/detail/CVE-2022-2126), [CVE-2022-2129](https://nvd.nist.gov/vuln/detail/CVE-2022-2129), [CVE-2022-2175](https://nvd.nist.gov/vuln/detail/CVE-2022-2175), [CVE-2022-2182](https://nvd.nist.gov/vuln/detail/CVE-2022-2182), [CVE-2022-2183](https://nvd.nist.gov/vuln/detail/CVE-2022-2183), [CVE-2022-2206](https://nvd.nist.gov/vuln/detail/CVE-2022-2206), [CVE-2022-2207](https://nvd.nist.gov/vuln/detail/CVE-2022-2207), [CVE-2022-2208](https://nvd.nist.gov/vuln/detail/CVE-2022-2208), [CVE-2022-2210](https://nvd.nist.gov/vuln/detail/CVE-2022-2210), [CVE-2022-2231](https://nvd.nist.gov/vuln/detail/CVE-2022-2231), [CVE-2022-2257](https://nvd.nist.gov/vuln/detail/CVE-2022-2257), [CVE-2022-2264](https://nvd.nist.gov/vuln/detail/CVE-2022-2264), [CVE-2022-2284](https://nvd.nist.gov/vuln/detail/CVE-2022-2284), [CVE-2022-2285](https://nvd.nist.gov/vuln/detail/CVE-2022-2285), [CVE-2022-2286](https://nvd.nist.gov/vuln/detail/CVE-2022-2286), [CVE-2022-2287](https://nvd.nist.gov/vuln/detail/CVE-2022-2287), [CVE-2022-2288](https://nvd.nist.gov/vuln/detail/CVE-2022-2288), [CVE-2022-2289](https://nvd.nist.gov/vuln/detail/CVE-2022-2289), [CVE-2022-2304](https://nvd.nist.gov/vuln/detail/CVE-2022-2304), [CVE-2022-2343](https://nvd.nist.gov/vuln/detail/CVE-2022-2343), [CVE-2022-2344](https://nvd.nist.gov/vuln/detail/CVE-2022-2344), [CVE-2022-2345](https://nvd.nist.gov/vuln/detail/CVE-2022-2345), [CVE-2022-2522](https://nvd.nist.gov/vuln/detail/CVE-2022-2522), [CVE-2022-2816](https://nvd.nist.gov/vuln/detail/CVE-2022-2816), [CVE-2022-2817](https://nvd.nist.gov/vuln/detail/CVE-2022-2817), [CVE-2022-2819](https://nvd.nist.gov/vuln/detail/CVE-2022-2819), [CVE-2022-2845](https://nvd.nist.gov/vuln/detail/CVE-2022-2845), [CVE-2022-2849](https://nvd.nist.gov/vuln/detail/CVE-2022-2849), [CVE-2022-2862](https://nvd.nist.gov/vuln/detail/CVE-2022-2862), [CVE-2022-2874](https://nvd.nist.gov/vuln/detail/CVE-2022-2874), [CVE-2022-2889](https://nvd.nist.gov/vuln/detail/CVE-2022-2889), [CVE-2022-2923](https://nvd.nist.gov/vuln/detail/CVE-2022-2923), [CVE-2022-2946](https://nvd.nist.gov/vuln/detail/CVE-2022-2946), [CVE-2022-2980](https://nvd.nist.gov/vuln/detail/CVE-2022-2980), [CVE-2022-2982](https://nvd.nist.gov/vuln/detail/CVE-2022-2982), [CVE-2022-3016](https://nvd.nist.gov/vuln/detail/CVE-2022-3016), [CVE-2022-3099](https://nvd.nist.gov/vuln/detail/CVE-2022-3099), [CVE-2022-3134](https://nvd.nist.gov/vuln/detail/CVE-2022-3134), [CVE-2022-3153](https://nvd.nist.gov/vuln/detail/CVE-2022-3153), [CVE-2022-3234](https://nvd.nist.gov/vuln/detail/CVE-2022-3234), [CVE-2022-3235](https://nvd.nist.gov/vuln/detail/CVE-2022-3235), [CVE-2022-3278](https://nvd.nist.gov/vuln/detail/CVE-2022-3278), [CVE-2022-3256](https://nvd.nist.gov/vuln/detail/CVE-2022-3256), [CVE-2022-3296](https://nvd.nist.gov/vuln/detail/CVE-2022-3296), [CVE-2022-3297](https://nvd.nist.gov/vuln/detail/CVE-2022-3297), [CVE-2022-3324](https://nvd.nist.gov/vuln/detail/CVE-2022-3324), [CVE-2022-3352](https://nvd.nist.gov/vuln/detail/CVE-2022-3352), [CVE-2022-3491](https://nvd.nist.gov/vuln/detail/CVE-2022-3491), [CVE-2022-3520](https://nvd.nist.gov/vuln/detail/CVE-2022-3520), [CVE-2022-3591](https://nvd.nist.gov/vuln/detail/CVE-2022-3591), [CVE-2022-3705](https://nvd.nist.gov/vuln/detail/CVE-2022-3705), [CVE-2022-4141](https://nvd.nist.gov/vuln/detail/CVE-2022-4141), [CVE-2022-4292](https://nvd.nist.gov/vuln/detail/CVE-2022-4292), [CVE-2022-4293](https://nvd.nist.gov/vuln/detail/CVE-2022-4293), [CVE-2023-0049](https://nvd.nist.gov/vuln/detail/CVE-2023-0049), [CVE-2023-0051](https://nvd.nist.gov/vuln/detail/CVE-2023-0051), [CVE-2023-0054](https://nvd.nist.gov/vuln/detail/CVE-2023-0054))\n - zlib ([CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032), [CVE-2022-37434](https://nvd.nist.gov/vuln/detail/CVE-2022-37434))\n - SDK: edk2-ovmf ([CVE-2019-14584](https://nvd.nist.gov/vuln/detail/CVE-2019-14584), [CVE-2021-28210](https://nvd.nist.gov/vuln/detail/CVE-2021-28210), [CVE-2021-28211](https://nvd.nist.gov/vuln/detail/CVE-2021-28211), [CVE-2021-28213](https://nvd.nist.gov/vuln/detail/CVE-2021-28213))\n - SDK: libxslt ([CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560))\n - SDK: mantle ([CVE-2021-3121](https://nvd.nist.gov/vuln/detail/CVE-2021-3121), [CVE-2021-38561](https://nvd.nist.gov/vuln/detail/CVE-2021-38561), [CVE-2021-43565](https://nvd.nist.gov/vuln/detail/CVE-2021-43565))\n - SDK: Python ([CVE-2015-20107](https://nvd.nist.gov/vuln/detail/CVE-2015-20107), [CVE-2020-10735](https://nvd.nist.gov/vuln/detail/CVE-2020-10735), [CVE-2021-3654](https://nvd.nist.gov/vuln/detail/CVE-2021-3654), [CVE-2022-37454](https://nvd.nist.gov/vuln/detail/CVE-2022-37454), [CVE-2022-42919](https://nvd.nist.gov/vuln/detail/CVE-2022-42919), [CVE-2022-45061](https://nvd.nist.gov/vuln/detail/CVE-2022-45061))\n - SDK: QEMU ([CVE-2020-14394](https://nvd.nist.gov/vuln/detail/CVE-2020-14394), [CVE-2020-35504](https://nvd.nist.gov/vuln/detail/CVE-2020-35504), [CVE-2020-35505](https://nvd.nist.gov/vuln/detail/CVE-2020-35505), [CVE-2020-35506](https://nvd.nist.gov/vuln/detail/CVE-2020-35506), [CVE-2020-35517](https://nvd.nist.gov/vuln/detail/CVE-2020-35517), [CVE-2021-20203](https://nvd.nist.gov/vuln/detail/CVE-2021-20203), [CVE-2021-20255](https://nvd.nist.gov/vuln/detail/CVE-2021-20255), [CVE-2021-20257](https://nvd.nist.gov/vuln/detail/CVE-2021-20257), [CVE-2021-20263](https://nvd.nist.gov/vuln/detail/CVE-2021-20263), [CVE-2021-3409](https://nvd.nist.gov/vuln/detail/CVE-2021-3409), [CVE-2021-3416](https://nvd.nist.gov/vuln/detail/CVE-2021-3416), [CVE-2021-3527](https://nvd.nist.gov/vuln/detail/CVE-2021-3527), [CVE-2021-3544](https://nvd.nist.gov/vuln/detail/CVE-2021-3544), [CVE-2021-3545](https://nvd.nist.gov/vuln/detail/CVE-2021-3545), [CVE-2021-3546](https://nvd.nist.gov/vuln/detail/CVE-2021-3546), [CVE-2021-3582](https://nvd.nist.gov/vuln/detail/CVE-2021-3582), [CVE-2021-3607](https://nvd.nist.gov/vuln/detail/CVE-2021-3607), [CVE-2021-3608](https://nvd.nist.gov/vuln/detail/CVE-2021-3608), [CVE-2021-3682](https://nvd.nist.gov/vuln/detail/CVE-2021-3682), [CVE-2021-20203](https://nvd.nist.gov/vuln/detail/CVE-2021-20203), [CVE-2021-3713](https://nvd.nist.gov/vuln/detail/CVE-2021-3713), [CVE-2021-3930](https://nvd.nist.gov/vuln/detail/CVE-2021-3930), [CVE-2021-3947](https://nvd.nist.gov/vuln/detail/CVE-2021-3947), [CVE-2021-4145](https://nvd.nist.gov/vuln/detail/CVE-2021-4145), [CVE-2022-0216](https://nvd.nist.gov/vuln/detail/CVE-2022-0216), [CVE-2022-26353](https://nvd.nist.gov/vuln/detail/CVE-2022-26353), [CVE-2022-26354](https://nvd.nist.gov/vuln/detail/CVE-2022-26354), [CVE-2022-3872](https://nvd.nist.gov/vuln/detail/CVE-2022-3872), [CVE-2022-4172](https://nvd.nist.gov/vuln/detail/CVE-2022-4172))\n - SDK: Rust ([CVE-2022-21658](https://nvd.nist.gov/vuln/detail/CVE-2022-21658), [CVE-2022-36113](https://nvd.nist.gov/vuln/detail/CVE-2022-36113), [CVE-2022-36114](https://nvd.nist.gov/vuln/detail/CVE-2022-36114), [CVE-2022-46176](https://nvd.nist.gov/vuln/detail/CVE-2022-46176))\n - SDK: squashfs-tools ([CVE-2021-40153](https://nvd.nist.gov/vuln/detail/CVE-2021-40153), [CVE-2021-41072](https://nvd.nist.gov/vuln/detail/CVE-2021-41072))\n - VMware: open-vm-tools ([CVE-2022-31676](https://nvd.nist.gov/vuln/detail/CVE-2022-31676))\n\n \n #### Bug fixes:\n \n - Added `networkd` translation to `files` section when converting from Ignition 2.x to Ignition 3.x ([coreos-overlay#1910](https://github.com/flatcar-linux/coreos-overlay/pull/1910), [flatcar#741](https://github.com/flatcar-linux/Flatcar/issues/741))\n - Added a remount action as `systemd-sysext.service` drop-in unit to restore the OEM partition mount after the overlay mounts in `/usr` are done ([init#69](https://github.com/flatcar-linux/init/pull/69))\n - Added back Ignition support for Vagrant ([coreos-overlay#2351](https://github.com/flatcar/coreos-overlay/pull/2351))\n - Added back `gettext` to the OS ([Flatcar#849](https://github.com/flatcar-linux/Flatcar/issues/849))\n - Added merging of Ignition systemd duplicated units when auto-translating from Ignition 2 to Ignition 3. ([coreos-overlay#2187](https://github.com/flatcar/coreos-overlay/pull/2187))\n - Added support for Openstack for cloud-init activation ([flatcar-linux/init#76](https://github.com/flatcar-linux/init/pull/76))\n - Added support for hardware security keys in update-ssh-keys ([update-ssh-keys#7](https://github.com/flatcar/update-ssh-keys/pull/7))\n - Enabled IOMMU on arm64 kernels, the lack of which prevented some systems from booting ([coreos-overlay#2235](https://github.com/flatcar/coreos-overlay/pull/2235))\n - Excluded Wireguard interface from `systemd-networkd` default management ([Flatcar#808](https://github.com/flatcar-linux/Flatcar/issues/808))\n - Excluded the Kubenet cbr0 interface from networkd's DHCP config and set it to Unmanaged to prevent interference and ensure that it is not part of the network online check ([init#55](https://github.com/flatcar-linux/init/pull/55))\n - Excluded the special Kubernetes network interfaces `nodelocaldns` and `kube-ipvs0` from being managed with systemd-networkd which interfered with the setup ([init#89](https://github.com/flatcar/init/pull/89)).\n - Fix \"ext4 deadlock under heavy I/O load\" kernel issue. The patch for this is included provisionally while we wait for it to be merged upstream ([Flatcar#847](https://github.com/flatcar/Flatcar/issues/847), [coreos-overlay#2315](https://github.com/flatcar/coreos-overlay/pull/2315))\n - Fixed Ignition btrfs forced formatting for OEM partition ([coreos-overlay#2277](https://github.com/flatcar/coreos-overlay/pull/2277))\n - Fixed Ignition's OEM ID to be `metal` to follow the Ignition upstream change which otherwise resulted in a broken boot when the Flatcar OEM ID `pxe` was used ([bootengine#45](https://github.com/flatcar-linux/bootengine/pull/45))\n - Fixed `/etc/resolv.conf` symlink by pointing it at `resolv.conf` instead of `stub-resolv.conf`. This bug was present since the update to systemd v250 ([coreos-overlay#2057](https://github.com/flatcar-linux/coreos-overlay/pull/2057))\n - Fixed a regression (in Alpha/Beta) where machines failed to boot if they didn't have the `core` user or group in `/etc/passwd` or `/etc/group` ([baselayout#26](https://github.com/flatcar/baselayout/pull/26))\n - Fixed excluded interface type from default systemd-networkd configuration ([flatcar-linux/init#78](https://github.com/flatcar-linux/init/pull/78))\n - Fixed space escaping in the `networkd` Ignition translation ([Flatcar#812](https://github.com/flatcar-linux/Flatcar/issues/812))\n - Fixed the dracut emergency Ignition log printing that had a scripting error causing the cat command to fail ([bootengine#33](https://github.com/flatcar-linux/bootengine/pull/33))\n - Made Ignition write the SSH keys into a file under `authorized_keys.d/ignition` again and added a call to `update-ssh-keys` after Ignition ran to create the merged `authorized_keys` file, which fixes the problem that keys added by Ignition get lost when `update-ssh-keys` runs ([init#66](https://github.com/flatcar-linux/init/pull/66))\n - Re-added the `brd drbd nbd rbd xen-blkfront zram libarc4 lru_cache zsmalloc` kernel modules to the initramfs since they were missing compared to the Flatcar 3033.2.x releases where the 5.10 kernel is used ([bootengine#40](https://github.com/flatcar-linux/bootengine/pull/40))\n - Restored the support to specify OEM partition files in Ignition when `/usr/share/oem` is given as initrd mount point ([bootengine#58](https://github.com/flatcar/bootengine/pull/58))\n - Reverted the Linux kernel commit which broke networking on AWS instances which use Intel 82559 NIC (c4/m4) ([Flatcar#665](https://github.com/flatcar-linux/Flatcar/issues/665), [coreos-overlay#1723](https://github.com/flatcar-linux/coreos-overlay/pull/1723))\n - Skipped starting `ensure-sysext.service` if `systemd-sysext.service` won't be started, to prevent reporting a dependency failure ([Flatcar#710](https://github.com/flatcar-linux/Flatcar/issues/710))\n - The Ignition v3 kargs directive failed before when used with the generic image where no `grub.cfg` exists, this was fixed by creating it first ([bootengine#47](https://github.com/flatcar-linux/bootengine/pull/47))\n - The rootfs setup in the initrd now runs systemd-tmpfiles on every boot, not only when Ignition runs, to fix a dbus failure due to missing files ([Flatcar#944](https://github.com/flatcar/Flatcar/issues/944))\n - flatcar-update: Stopped checking for the `USER` environment variable which may not be set in all environments, causing the script to fail unless a workaround was used like prepending an additional `sudo` invocation ([init#58](https://github.com/flatcar-linux/init/pull/58))\n - network: Accept ICMPv6 Router Advertisements to fix IPv6 address assignment in the default DHCP setting ([init#51](https://github.com/flatcar-linux/init/pull/51), [coreos-cloudinit#12](https://github.com/flatcar-linux/coreos-cloudinit/pull/12), [bootengine#30](https://github.com/flatcar-linux/bootengine/pull/30))\n - Fixed the restart of Systemd services when the main process is being killed by a SIGHUP signal ([flatcar#1157](https://github.com/flatcar/Flatcar/issues/1157))\n - Resolved the conflicting FD usage of libselinux and systemd which caused, e.g., a systemd crash on certain watchdog interaction during shutdown (patch in systemd 252.11)\n - AWS: added EKS support for version 1.22 and 1.23. ([coreos-overlay#2110](https://github.com/flatcar-linux/coreos-overlay/pull/2110), [Flatcar#829](https://github.com/flatcar-linux/Flatcar/issues/829))- VMWare: excluded `wireguard` (and others) from `systemd-networkd` management. ([init#80](https://github.com/flatcar-linux/init/pull/80))\n - GCP: Restored oem-gce.service functionality on GCP ([coreos-overlay#1813](https://github.com/flatcar-linux/coreos-overlay/pull/1813))\n - GCP: Fixed shutdown script execution ([coreos-overlay#1912](https://github.com/flatcar-linux/coreos-overlay/pull/1912), [flatcar#743](https://github.com/flatcar-linux/Flatcar/issues/743))\n\n \n #### Changes:\n \n - ARM64: Added [cifs-utils](https://wiki.samba.org/index.php/LinuxCIFS_utils) for ARM64\n - ARM64: Added [sssd](https://sssd.io/), [adcli](https://www.freedesktop.org/software/realmd/adcli/adcli.html) and realmd for ARM64\n - Added CONFIG_NF_CT_NETLINK_HELPER (for libnetfilter_cthelper), CONFIG_NET_VRF (for virtual routing and forwarding) and CONFIG_KEY_DH_OPERATIONS (for keyutils) to the kernel config ([coreos-overlay#1524](https://github.com/flatcar-linux/coreos-overlay/pull/1524))\n - Added VMware networking configuration in the initramfs via guestinfo settings ([bootengine#44](https://github.com/flatcar-linux/bootengine/pull/44), [flatcar#717](https://github.com/flatcar-linux/Flatcar/issues/717))\n - Added `CONFIG_NF_CONNTRACK_BRIDGE` (for nf_conntrack_bridge) and `CONFIG_NFT_BRIDGE_META` (for nft_meta_bridge) to the kernel config to allow using conntrack rules for bridges in nftables and to match on bridge interface names ([coreos-overlay#2207](https://github.com/flatcar/coreos-overlay/pull/2207))\n - Added `auditd.service` but left it disabled by default, a custom configuration can be created by removing `/etc/audit/auditd.conf` and replacing it with an own file ([coreos-overlay#1636](https://github.com/flatcar-linux/coreos-overlay/pull/1636))\n - Added `cryptsetup` to the initramfs for the Ignition `luks` directive ([flatcar-linux/coreos-overlay#1760](https://github.com/flatcar-linux/coreos-overlay/pull/1760))\n - Added a new flatcar-update tool to the image to ease manual updates, rollbacks, channel/release jumping, and airgapped updates ([init#53](https://github.com/flatcar-linux/init/pull/53))\n - Added efibootmgr binary to the image ([coreos-overlay#1955](https://github.com/flatcar-linux/coreos-overlay/pull/1955))\n - Added symlink from `nc` to `ncat`. `-q` option is [not yet supported](https://github.com/nmap/nmap/issues/2422) ([flatcar#545](https://github.com/flatcar-linux/Flatcar/issues/545))\n - Besides Ignition v1 and v2 configurations, Ignition configurations with specification v3 (up to 3.3.0) are now supported, see the [docs section for details](https://www.flatcar.org/docs/latest/provisioning/ignition/specification/#ignition-v3)\n - Bring in dependencies for NFS4 with Kerberos both in kernel and userspace. Tested against NFS4.1 server. ([coreos-overlay#1664](https://github.com/flatcar-linux/coreos-overlay/pull/1664))\n - Change CONFIG_WIREGUARD kernel option to module to save space on boot partition ([coreos-overlay#2239](https://github.com/flatcar/coreos-overlay/pull/2239))\n - Disable several arch specific arm64 kernel config options for unsupported platforms to save space on boot partition ([coreos-overlay#2239](https://github.com/flatcar/coreos-overlay/pull/2239))\n - Enabled `CONFIG_INTEL_RAPL` on AMD64 Kernel config to compile `intel_rapl_common` module in order to allow power monitoring on modern Intel processors ([coreos-overlay#1801](https://github.com/flatcar-linux/coreos-overlay/pull/1801))\n - Enabled `systemd-sysext.service` to activate systemd-sysext images on boot, to disable you will need to mask it. Also added a helper service `ensure-sysext.service` which reloads the systemd units to reevaluate the `sockets`, `timers`, and `multi-user` targets when `systemd-sysext.service` is (re)started, making it possible to enable units that are part of a sysext image ([init#65](https://github.com/flatcar-linux/init/pull/65))\n - Excluded special network interface devices like bridge, tunnel, vxlan, and veth devices from the default DHCP configuration to prevent networkd interference ([init#56](https://github.com/flatcar-linux/init/pull/56))\n - For amd64 `/usr/lib` used to be a symlink to `/usr/lib64` but now they became two separate folders as common in other distributions (and was the case for arm64 already). Compatibility symlinks exist in case `/usr/lib64` was used to access, e.g., the `modules` folder or the `systemd` folder ([coreos-overlay#1713](https://github.com/flatcar-linux/coreos-overlay/pull/1713), [scripts#255](https://github.com/flatcar-linux/scripts/pull/255))\n - Made SELinux enabled by default in default containerd configuration file. ([coreos-overlay#1699](https://github.com/flatcar-linux/coreos-overlay/pull/1699))\n - Removed rngd.service because it is not essential anymore for the kernel to boot fast in VM environments ([coreos-overlay#1700](https://github.com/flatcar-linux/coreos-overlay/pull/1700))\n - Specifying the OEM filesystem in Ignition to write files to `/usr/share/oem` is not needed anymore ([bootengine#58](https://github.com/flatcar/bootengine/pull/58))\n - Switched from `--strip-unneeded` to `--strip-debug` when installing kernel modules, which makes kernel stacktraces more accurate and makes debugging issues easier ([coreos-overlay#2196](https://github.com/flatcar/coreos-overlay/pull/2196))\n - The flatcar-update tool got two new flags to customize ports used on the host while updating flatcar ([init#81](https://github.com/flatcar/init/pull/81))\n - Toolbox now uses containerd to download and mount the image ([toolbox#7](https://github.com/flatcar/toolbox/pull/7))\n - Update-engine now creates the `/run/reboot-required` flag file for [kured](https://github.com/weaveworks/kured) ([update_engine#15](https://github.com/flatcar-linux/update_engine/pull/15))\n - flatcar-install: Added option to create UEFI boot entry ([init#74](https://github.com/flatcar-linux/init/pull/74))\n - Add qemu-guest-agent to all amd64 images, it will be automatically enabled when qemu-ga virtio-port is detected ([coreos-overlay#2240](https://github.com/flatcar/coreos-overlay/pull/2240), [portage-stable#373](https://github.com/flatcar/portage-stable/pull/373))\n - Add a way to remove packages that are hard-blockers for update. A hard-blocker means that the package needs to be removed (for example with `emerge -C`) before an update can happen.\n - Add support for Microsoft Azure Network Adapter (MANA) NICs on Azure ([scripts#1131](https://github.com/flatcar/scripts/pull/1131))\n - Defined a systemd-sysext level that sysext images can match for instead of the OS version when they don't have a strong coupling, meaning the only metadata required is `SYSEXT_LEVEL=1.0` and `ID=flatcar` ([Flatcar#643](https://github.com/flatcar-linux/Flatcar/issues/643))\n - Removed the pre-shipped `/etc/flatcar/update.conf` file, leaving it totally to the user to define the contents as it was unnecessarily overwriting the `/use/share/flatcar/update.conf` ([scripts#212](https://github.com/flatcar-linux/scripts/pull/212))\n - Rework the way we set up the default python intepreter in SDK - it is now without specifying a version. This should work fine as long as we keep having one version of python in SDK.\n - Use qcow2 compressed format instead of additional compression layer in Qemu images ([Flatcar#1135](https://github.com/flatcar/Flatcar/issues/1135), [scripts#1132](https://github.com/flatcar/scripts/pull/1132))\n - AWS: Added AWS IMDSv2 support to coreos-cloudinit ([flatcar-linux/coreos-cloudinit#13](https://github.com/flatcar-linux/coreos-cloudinit/pull/13))\n - AWS EC2: Removed the setup of `/etc/hostname` from the instance metadata because it used a long FQDN but we can just use use the hostname set via DHCP ([Flatcar#707](https://github.com/flatcar-linux/Flatcar/issues/707))\n - Azure: Azure VHD disks are now created using subformat=fixed, which makes them suitable for immediate upload to Azure using any tool.\n - Azure: Set up `/etc/hostname` from instance metadata with Afterburn\n - OpenStack: enabled `coreos-metadata-sshkeys@.service` to provision SSH keys from metadata. ([Flatcar#817](https://github.com/flatcar/Flatcar/issues/817), [coreos-overlay#2246](https://github.com/flatcar/coreos-overlay/pull/2246))\n - VMWare: Added `ignition-delete-config.service` to remove Ignition config from VM metadata, see also [here](https://coreos.github.io/ignition/operator-notes/#automatic-config-deletion) ([coreos-overlay#1948](https://github.com/flatcar-linux/coreos-overlay/pull/1948))\n - SDK / ARM64: Added [go-tspi](https://pkg.go.dev/github.com/coreos/go-tspi) bindings for ARM64\n\n \n #### Updates:\n \n- Linux ([5.15.132](https://lwn.net/Articles/944877) (includes [5.15.131](https://lwn.net/Articles/943755), [5.15.130](https://lwn.net/Articles/943404), [5.15.129](https://lwn.net/Articles/943113), [5.15.128](https://lwn.net/Articles/942866), [5.15.127](https://lwn.net/Articles/941775), [5.15.126](https://lwn.net/Articles/941296), [5.15.125](https://lwn.net/Articles/940798), [5.15.124](https://lwn.net/Articles/940339), [5.15.123](https://lwn.net/Articles/939424), [5.15.122](https://lwn.net/Articles/939104), [5.15.121](https://lwn.net/Articles/939016), [5.15.120](https://lwn.net/Articles/937404), [5.15.119](https://lwn.net/Articles/936675), [5.15.118](https://lwn.net/Articles/935584), [5.15.117](https://lwn.net/Articles/934622), [5.15.116](https://lwn.net/Articles/934320), [5.15.115](https://lwn.net/Articles/933909), [5.15.114](https://lwn.net/Articles/933280), [5.15.113](https://lwn.net/Articles/932883), [5.15.112](https://lwn.net/Articles/932134), [5.15.111](https://lwn.net/Articles/931680), [5.15.110](https://lwn.net/Articles/930600), [5.15.109](https://lwn.net/Articles/930263), [5.15.108](https://lwn.net/Articles/929679), [5.15.107](https://lwn.net/Articles/929015), [5.15.106](https://lwn.net/Articles/928343), [5.15.105](https://lwn.net/Articles/927860), [5.15.104](https://lwn.net/Articles/926873), [5.15.103](https://lwn.net/Articles/926415), [5.15.102](https://lwn.net/Articles/925991), [5.15.101](https://lwn.net/Articles/925939), [5.15.100](https://lwn.net/Articles/925913), [5.15.99](https://lwn.net/Articles/925844), [5.15.98](https://lwn.net/Articles/925080), [5.15.97](https://lwn.net/Articles/925064), [5.15.96](https://lwn.net/Articles/924441), [5.15.95](https://lwn.net/Articles/924073), [5.15.94](https://lwn.net/Articles/923308), [5.15.93](https://lwn.net/Articles/922814), [5.15.92](https://lwn.net/Articles/922340), [5.15.91](https://lwn.net/Articles/921851), [5.15.90](https://lwn.net/Articles/921029), [5.15.89](https://lwn.net/Articles/920321), [5.15.88](https://lwn.net/Articles/920012), [5.15.87](https://lwn.net/Articles/919793), [5.15.86](https://lwn.net/Articles/918808), [5.15.85](https://lwn.net/Articles/918329), [5.15.84](https://lwn.net/Articles/918206), [5.15.83](https://lwn.net/Articles/917896), [5.15.82](https://lwn.net/Articles/917400), [5.15.81](https://lwn.net/Articles/916763), [5.15.80](https://lwn.net/Articles/916003), [5.15.79](https://lwn.net/Articles/915100), [5.15.78](https://lwn.net/Articles/914423), [5.15.77](https://lwn.net/Articles/913681), [5.15.76](https://lwn.net/Articles/912997), [5.15.75](https://lwn.net/Articles/912500), [5.15.74](https://lwn.net/Articles/911275), [5.15.73](https://lwn.net/Articles/910957), [5.15.72](https://lwn.net/Articles/910398), [5.15.71](https://lwn.net/Articles/909679), [5.15.70](https://lwn.net/Articles/909212), [5.15.69](https://lwn.net/Articles/908782), [5.15.68](https://lwn.net/Articles/908140), [5.15.67](https://lwn.net/Articles/907526), [5.15.66](https://lwn.net/Articles/907524), [5.15.65](https://lwn.net/Articles/907204), [5.15.64](https://lwn.net/Articles/906630), [5.15.63](https://lwn.net/Articles/906059), [5.15.62](https://lwn.net/Articles/905533), [5.15.61](https://lwn.net/Articles/904959), [5.15.60](https://lwn.net/Articles/904461), [5.15.59](https://lwn.net/Articles/903688), [5.15.58](https://lwn.net/Articles/902917), [5.15.57](https://lwn.net/Articles/902317), [5.15.56](https://lwn.net/Articles/902101), [5.15.55](https://lwn.net/Articles/901380), [5.15.54](https://lwn.net/Articles/900911), [5.15.53](https://lwn.net/Articles/900321), [5.15.52](https://lwn.net/Articles/899788), [5.15.51](https://lwn.net/Articles/899370), [5.15.50](https://lwn.net/Articles/899091), [5.15.49](https://lwn.net/Articles/898622), [5.15.48](https://lwn.net/Articles/898124), [5.15.47](https://lwn.net/Articles/897904), [5.15.46](https://lwn.net/Articles/897377), [5.15.45](https://lwn.net/Articles/897167), [5.15.44](https://lwn.net/Articles/896647), [5.15.43](https://lwn.net/Articles/896220), [5.15.42](https://lwn.net/Articles/896226), [5.15.41](https://lwn.net/Articles/895645), [5.15.40](https://lwn.net/Articles/895318), [5.15.39](https://lwn.net/Articles/895070), [5.15.38](https://lwn.net/Articles/894357), [5.15.37](https://lwn.net/Articles/893264), [5.15.36](https://lwn.net/Articles/892812), [5.15.35](https://lwn.net/Articles/892002), [5.15.34](https://lwn.net/Articles/891251), [5.15.33](https://lwn.net/Articles/890722), [5.15.32](https://lwn.net/Articles/889438), [5.15.31](https://lwn.net/Articles/889001), [5.15.30](https://lwn.net/Articles/888521), [5.15.29](https://lwn.net/Articles/888116), [5.15.28](https://lwn.net/Articles/887638), [5.15.27](https://lwn.net/Articles/887219), [5.15.26](https://lwn.net/Articles/886569), [5.15.25](https://lwn.net/Articles/885895), [5.15.24](https://lwn.net/Articles/884973), [5.15.23](https://lwn.net/Articles/884527), [5.15.22](https://lwn.net/Articles/884107), [5.15.21](https://lwn.net/Articles/883958), [5.15.20](https://lwn.net/Articles/883951), [5.15.19](https://lwn.net/Articles/883441), [5.15.18](https://lwn.net/Articles/883326), [5.15.17](https://lwn.net/Articles/882911), [5.15.16](https://lwn.net/Articles/881963), [5.15.15](https://lwn.net/Articles/881548), [5.15.14](https://lwn.net/Articles/881018), [5.15.13](https://lwn.net/Articles/880469), [5.15.12](https://lwn.net/Articles/879997), [5.15.11](https://lwn.net/Articles/879496), [5.15.10](https://lwn.net/Articles/879023), [5.15.9](https://lwn.net/Articles/878898), [5.15.8](https://lwn.net/Articles/878631), [5.15.7](https://lwn.net/Articles/878040), [5.15.6](https://lwn.net/Articles/877286), [5.15.5](https://lwn.net/Articles/876860),  [5.15.4](https://lwn.net/Articles/876611)))\n- Linux Firmware ([20230117](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230117) (includes [20221214](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221214), [20221109](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221109), [20221012](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221012), [20220913](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220913), [20220815](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220815), [20220708](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220708), [20220610](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220610), [20220509](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220509), [20220411](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220411), [20220310](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220310), [20220209](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220209)))\n- Linux Headers ([5.15](https://lwn.net/Articles/876611/))\n- Go ([1.19.5](https://go.dev/doc/devel/release#go1.19.5) (includes [1.19.4](https://go.dev/doc/devel/release#go1.19.4), [1.19.3](https://go.dev/doc/devel/release#go1.19.3), [1.18.10](https://go.dev/doc/devel/release#go1.18.10), [1.18.9](https://go.dev/doc/devel/release#go1.18.9), [1.18.7](https://go.dev/doc/devel/release#1.18.7), [1.18.6](https://go.dev/doc/devel/release#go1.18.6), [1.18.4](https://go.dev/doc/devel/release#go1.18.4), [1.18.2](https://go.googlesource.com/go/+/refs/tags/go1.18.2), [1.17.9](https://go.googlesource.com/go/+/refs/tags/go1.17.9)))\n- Docker ([20.10.23](https://docs.docker.com/engine/release-notes/#201023) (includes [20.10.22](https://docs.docker.com/engine/release-notes/#201022), [20.10.21](https://docs.docker.com/engine/release-notes/#201021), [20.10.20](https://docs.docker.com/engine/release-notes/#201020), [20.10.18](https://docs.docker.com/engine/release-notes/#201018), [20.10.17](https://docs.docker.com/engine/release-notes/#201017), [20.10.16](https://docs.docker.com/engine/release-notes/#201016), [20.10.15](https://docs.docker.com/engine/release-notes/#201015), [20.10.14](https://docs.docker.com/engine/release-notes/#201014), [20.10.13](https://docs.docker.com/engine/release-notes/#201013)))\n- acl ([2.3.1](https://git.savannah.nongnu.org/cgit/acl.git/log/?h=v2.3.1))\n- new: acpid ([2.0.33](https://sourceforge.net/p/acpid2/code/ci/2.0.33/tree/Changelog)) \n- adcli ([0.9.2](https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.2) (includes [0.9.1](https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.1)))\n- afterburn ([5.2.0](https://github.com/coreos/afterburn/releases/tag/v5.2.0))\n- attr ([2.5.1](https://git.savannah.nongnu.org/cgit/attr.git/log/?h=v2.5.1))\n- audit ([3.0.6](https://listman.redhat.com/archives/linux-audit/2021-October/msg00000.html))\n- automake ([1.16.5](https://savannah.gnu.org/forum/forum.php?forum_id=10055))\n- bind tools ([9.16.36](https://bind9.readthedocs.io/en/v9_16_36/notes.html#notes-for-bind-9-16-36) (includes [9.16.35](https://bind9.readthedocs.io/en/v9_16_34/notes.html#notes-for-bind-9-16-35), [9.16.34](https://bind9.readthedocs.io/en/v9_16_35/notes.html#notes-for-bind-9-16-34), [9.16.33](https://gitlab.isc.org/isc-projects/bind9/-/raw/v9_16_33/CHANGES), [9.16.27](https://gitlab.isc.org/isc-projects/bind9/-/blob/v9_16_27/CHANGES)))\n- binutils ([2.39](https://sourceware.org/pipermail/binutils/2022-August/122246.html) (includes [2.38](https://lwn.net/Articles/884264)))\n- boost ([1.79](https://www.boost.org/users/history/version_1_79_0.html) (includes [1.76.0](https://www.boost.org/users/history/version_1_76_0.html)))\n- bpftool ([5.19.12](https://lwn.net/Articles/909678/) (includes [5.19.8](https://lwn.net/Articles/907523/), [5.19.2](https://lwn.net/Articles/904957/), [5.18.11](https://lwn.net/Articles/900912/), [5.15.8](https://lwn.net/Articles/878631/)))\n- bridge-utils ([1.7.1](https://git.kernel.org/pub/scm/network/bridge/bridge-utils.git/log/?h=v1.7.1))\n- btrfs-progs ([5.15.1](https://btrfs.wiki.kernel.org/index.php/Changelog#btrfs-progs_v5.15_.28Nov_2021.29))\n- ca-certificates ([3.93](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_93.html) (includes [3.90](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90.html), [3.78](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html)))\n- cifs-utils ([6.15](https://lists.samba.org/archive/samba-technical/2022-April/137335.html) (includes [6.13](https://lkml.kernel.org/linux-cifs/CAKywueSqRGSFmeDHQacyu831BNUeGFxGg3vgBmozzhkGBCjyXQ@mail.gmail.com/T/)))\n- conntrack-tools ([1.4.6](https://lists.netfilter.org/pipermail/netfilter-announce/2020/000240.html))\n- containerd ([1.6.16](https://github.com/containerd/containerd/releases/tag/v1.6.16) (includes [1.6.15](https://github.com/containerd/containerd/releases/tag/v1.6.15), [1.6.14](https://github.com/containerd/containerd/releases/tag/v1.6.14), [1.6.13](https://github.com/containerd/containerd/releases/tag/v1.6.13), [1.6.12](https://github.com/containerd/containerd/releases/tag/v1.6.12), [1.6.10](https://github.com/containerd/containerd/releases/tag/v1.6.10), [1.6.9](https://github.com/containerd/containerd/releases/tag/v1.6.9), [1.6.8](https://github.com/containerd/containerd/releases/tag/v1.6.8), [1.6.7](https://github.com/containerd/containerd/releases/tag/v1.6.7), [1.6.6](https://github.com/containerd/containerd/releases/tag/v1.6.6), [1.6.4](https://github.com/containerd/containerd/releases/tag/v1.6.4), [1.6.3](https://github.com/containerd/containerd/releases/tag/v1.6.3), [1.6.2](https://github.com/containerd/containerd/releases/tag/v1.6.2), [1.6.1](https://github.com/containerd/containerd/releases/tag/v1.6.1), [1.6.0](https://github.com/containerd/containerd/releases/tag/v1.6.0)))\n- coreutils ([8.32](https://lists.gnu.org/archive/html/coreutils-announce/2020-03/msg00000.html))\n- cpio ([2.13](https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html))\n- cri-tools ([1.24.2](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.24.2))\n- cryptsetup ([2.4.3](https://lore.kernel.org/all/572c18a7bf60cb1b0f67c3a03c531d7e7ed31832.camel@scientia.net/T/))\n- curl ([7.87.0](https://curl.se/changes.html#7_87_0) (includes [7.86](https://curl.se/changes.html#7_86_0), [7.85](https://curl.se/mail/archive-2022-08/0012.html), [7.84.0](https://github.com/curl/curl/releases/tag/curl-7_84_0), [7.83.1](https://curl.se/mail/lib-2022-05/0010.html)))\n- Cyrus SASL ([2.1.28](https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28))\n- dbus ([1.14.4](https://gitlab.freedesktop.org/dbus/dbus/-/raw/dbus-1.14.4/NEWS) (includes [1.12.22](https://gitlab.freedesktop.org/dbus/dbus/-/blob/177ab044bc87cbc4ded75d21b900795a6fefef76/NEWS)))\n- diffutils ([3.8](https://lists.gnu.org/archive/html/info-gnu/2021-08/msg00000.html))\n- dosfstools ([4.2](https://github.com/dosfstools/dosfstools/releases/tag/v4.2))\n- duktape ([2.7.0](https://github.com/svaarala/duktape/releases/tag/v2.7.0))\n- e2fsprogs ([1.46.5](http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.5) (includes [1.46.4](http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.4)))\n- elfutils ([0.188](https://sourceware.org/pipermail/elfutils-devel/2022q4/005561.html) (includes [0.187](https://sourceware.org/pipermail/elfutils-devel/2022q2/004978.html), [0.186](https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=490932ae4ef9b5a3af01d2c8c616f14d57586046;hb=983e86fd89e8bf02f2d27ba5dce5bf078af4ceda)))\n- ethtool ([5.10](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v5.10))\n- expat ([2.5.0](https://github.com/libexpat/libexpat/blob/R_2_5_0/expat/Changes) (includes [2.4.9](https://github.com/libexpat/libexpat/blob/R_2_4_9/expat/Changes)))\n- findutils ([4.8.0](https://savannah.gnu.org/forum/forum.php?forum_id=9914))\n- gawk ([5.2.1](https://lists.gnu.org/archive/html/help-gawk/2022-11/msg00008.html) (contains [5.2.0](https://lists.gnu.org/archive/html/help-gawk/2022-09/msg00000.html)))\n- gcc ([11.3.0](https://gcc.gnu.org/gcc-11/changes.html) (includes [10.3.0](https://gcc.gnu.org/gcc-10/changes.html), [9.4.0](https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00000.html)))\n- gdb ([11.2](https://lists.gnu.org/archive/html/info-gnu/2022-01/msg00009.html))\n- gdbm ([1.22](https://lists.gnu.org/archive/html/info-gnu/2021-10/msg00006.html))\n- gettext ([0.21.1](https://git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob;f=NEWS;h=cdbb16746c23555e70bb1e16917f5c349ce92d9e;hb=8b38ee827251cadbb90cb6cb576ae98702566288) (includes [0.21](https://www.gnu.org/software/gettext/)))\n- git ([2.39.1](https://github.com/git/git/blob/v2.39.1/Documentation/RelNotes/2.39.1.txt) (includes [2.39.0](https://github.com/git/git/blob/v2.39.0/Documentation/RelNotes/2.39.0.txt), [2.38.3](https://github.com/git/git/blob/v2.38.3/Documentation/RelNotes/2.38.3.txt), [2.37.4](https://github.com/git/git/blob/master/Documentation/RelNotes/2.37.4.txt), [2.37.3](https://github.com/git/git/blob/v2.37.3/Documentation/RelNotes/2.37.3.txt), [2.37.1](https://github.com/git/git/blob/v2.37.1/Documentation/RelNotes/2.37.1.txt), [2.35.3](https://github.com/git/git/blob/v2.35.3/Documentation/RelNotes/2.35.3.txt)))\n- glib ([2.74.4](https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.4) (includes [2.74.1](https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.1), [2.72.3](https://gitlab.gnome.org/GNOME/glib/-/tags/2.73.3), [2.68.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.68.4)))\n- glibc ([2.36](https://sourceware.org/pipermail/libc-alpha/2022-August/141193.html) (includes [2.35](https://savannah.gnu.org/forum/forum.php?forum_id=10111), [2.34](https://sourceware.org/pipermail/libc-alpha/2021-August/129718.html)))\n- gnupg ([2.2.35](https://dev.gnupg.org/T5928))\n- gnutls ([3.7.8](https://lists.gnupg.org/pipermail/gnutls-help/2022-September/004765.html) (includes [3.7.7](https://gitlab.com/gnutls/gnutls/-/tags/3.7.7), [3.7.3](https://gitlab.com/gnutls/gnutls/-/merge_requests/1517)))\n- grep ([3.7](https://savannah.gnu.org/forum/forum.php?forum_id=10037))\n- gzip ([1.12](https://savannah.gnu.org/forum/forum.php?forum_id=10157) (includes [1.11](https://lists.gnu.org/archive/html/info-gnu/2021-09/msg00002.html)))\n- i2c-tools ([4.3](https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/tree/CHANGES?id=d8bc1f1ff4b00a6bd988aa114100ae9b787f50d8) (includes [4.2](https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/log/?h=v4.2)))\n- ignition ([2.14.0](https://github.com/coreos/ignition/releases/tag/v2.14.0) (includes [2.13.0](https://github.com/coreos/ignition/releases/tag/v2.13.0)))\n- intel-microcode ([20220809](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220809) (includes [20220510](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220510), [20220207_p20220207](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207), [20221108](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20221108)))\n- iperf ([3.10.1](https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-3101-2021-06-03))\n- iproute2 ([5.15](https://lwn.net/ml/linux-kernel/20211101164705.6f4f2e41%40hermes.local/))\n- ipset ([7.11](https://ipset.netfilter.org/changelog.html))\n- iptables ([1.8.8](https://www.netfilter.org/projects/iptables/files/changes-iptables-1.8.8.txt))\n- iputils ([20211215](https://github.com/iputils/iputils/releases/tag/20211215) (includes [20210722](https://github.com/iputils/iputils/releases/tag/20210722)))\n- ipvsadm ([1.27](http://archive.linuxvirtualserver.org/html/lvs-devel/2013-09/msg00011.html))\n- jansson ([2.14](https://github.com/akheron/jansson/blob/v2.14/CHANGES))\n- kmod ([29](https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/commit/?id=b6ecfc916a17eab8f93be5b09f4e4f845aabd3d1))\n- ldb ([2.4.1](https://gitlab.com/samba-team/samba/-/commit/a795e0c84597aa045d011e663dbad3cdabf0f1e6))\n- less ([590](https://www.greenwoodsoftware.com/less/news.590.html))\n- libarchive ([3.6.1](https://github.com/libarchive/libarchive/releases/tag/v3.6.1) (includes [3.5.3](https://github.com/libarchive/libarchive/releases/tag/v3.5.3), [3.5.2](https://github.com/libarchive/libarchive/releases/tag/v3.5.2)))\n- libbsd ([0.11.3](https://gitlab.freedesktop.org/libbsd/libbsd/-/commits/0.11.3/))\n- libcap ([2.66](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.d9ygdose5kw) (includes [2.65](https://sites.google.com/site/fullycapable/release-notes-for-libcap?authuser=0#h.wfblevfzkj0)))\n- libcap-ng ([0.8.3](https://people.redhat.com/sgrubb/libcap-ng/ChangeLog) (includes [0.8.2](https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.2)))\n- libksba ([1.6.3](https://dev.gnupg.org/T6304) (includes [1.6.2](https://dev.gnupg.org/T6230)))\n- libnetfilter_queue ([1.0.5](https://git.netfilter.org/libnetfilter_queue/log/?h=libnetfilter_queue-1.0.5))\n- libpcap ([1.10.1](https://git.tcpdump.org/libpcap/blob/c7642e2cc0c5bd65754685b160d25dc23c76c6bd:/CHANGES))\n- libseccomp ([2.5.4](https://github.com/seccomp/libseccomp/releases/tag/v2.5.4) (contains [2.5.3](https://github.com/seccomp/libseccomp/releases/tag/v2.5.3), [2.5.2](https://github.com/seccomp/libseccomp/releases/tag/v2.5.2), [2.5.1](https://github.com/seccomp/libseccomp/releases/tag/v2.5.1)))\n- libtasn1 ([4.19.0](https://lists.gnu.org/archive/html/help-libtasn1/2022-08/msg00001.html) (includes [4.17.0](https://gitlab.com/gnutls/libtasn1/-/blob/v4.17.0/NEWS)))\n- liburing ([2.1](https://github.com/axboe/liburing/commits/liburing-2.1))\n- libxml2 ([2.10.3](https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3) (includes [2.10.2](https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.2), [2.9.14](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14), [2.9.13](http://www.xmlsoft.org/news.html)))\n- logrotate ([3.20.1](https://github.com/logrotate/logrotate/releases/tag/3.20.1))\n- lshw ([02.19.2b_p20210121](https://www.ezix.org/project/wiki/HardwareLiSter#Changes))\n- lsof ([4.94.0](https://github.com/lsof-org/lsof/releases/tag/4.94.0))\n- lsscsi ([0.32](https://sg.danny.cz/scsi/lsscsi.ChangeLog))\n- mantle ([0.18.0](https://github.com/flatcar-linux/mantle/releases/tag/v0.18.0) (includes [0.17.0](https://github.com/flatcar-linux/mantle/releases/tag/v0.17.0)))\n- mdadm ([4.2](https://lore.kernel.org/all/28fdbc45-96ca-7cdb-3ced-a5f65d978048@trained-monkey.org/T/))\n- MIT Kerberos V ([1.20.1](https://web.mit.edu/kerberos/krb5-1.20/krb5-1.20.1.html))\n- multipath-tools ([0.9.3](https://github.com/opensvc/multipath-tools/releases/tag/0.9.3) (includes [0.8.7](https://github.com/opensvc/multipath-tools/commits/0.8.7)))\n- ncurses ([6.3_p20220423](https://lists.gnu.org/archive/html/info-gnu/2021-11/msg00001.html))\n- nettle ([3.8.1](https://git.lysator.liu.se/nettle/nettle/-/blob/990abad16ceacd070747dcc76ed16a39c129321e/ChangeLog))\n- nfs-utils ([2.5.4](https://lore.kernel.org/linux-fsdevel/c8795653-7728-18a4-93dc-58943ad0fe09@redhat.com/))\n- nghttp2 ([1.45.1](https://github.com/nghttp2/nghttp2/releases/tag/v1.45.1))\n- nmap ([7.93](https://nmap.org/changelog.html#7.93))\n- nvidia-drivers ([510.73.05](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-73-05/index.html))\n- nvme-cli ([1.16](https://github.com/linux-nvme/nvme-cli/commits/deee9cae1ac94760deebd71f8e5449061338666c))\n- oniguruma ([6.9.8](https://github.com/kkos/oniguruma/releases/tag/v6.9.8) (includes [6.9.7.1](https://github.com/kkos/oniguruma/releases/tag/v6.9.7.1)))\n- open-isns ([0.101](https://github.com/open-iscsi/open-isns/blob/v0.101/ChangeLog))\n- openssh ([9.1](http://www.openssh.com/releasenotes.html#9.1) (includes [8.8](http://www.openssh.com/txt/release-8.8)))\n- openssl ([3.0.7](https://www.openssl.org/news/openssl-3.0-notes.html) (includes [3.0.3](https://www.openssl.org/news/changelog.html#openssl-30), [3.0.2](https://www.openssl.org/news/changelog.html#openssl-30), [3.0.1](https://www.openssl.org/news/changelog.html#openssl-30)))\n- pam ([1.5.1_p20210622](https://github.com/linux-pam/linux-pam/commit/fe1307512fb8892b5ceb3d884c793af8dbd4c16a))\n- pambase (20220214)\n- parted ([3.4](https://savannah.gnu.org/forum/forum.php?forum_id=9924) (includes [3.3](https://savannah.gnu.org/forum/forum.php?forum_id=9569)))\n- pciutils ([3.7.0](https://github.com/pciutils/pciutils/commit/864aecdea9c7db626856d8d452f6c784316a878c))\n- pcre2 ([10.39](https://github.com/PhilipHazel/pcre2/blob/pcre2-10.39/NEWS))\n- pinentry ([1.2.0](https://dev.gnupg.org/T5566))\n- polkit ([121](https://gitlab.freedesktop.org/polkit/polkit/-/commit/827b0ddac5b1ef00a47fca4526fcf057bee5f1db) (includes [0.120](https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.120/NEWS)))\n- quota ([4.06](https://sourceforge.net/p/linuxquota/code/ci/0acd4cc6275122fd9864cb7b5d349e65a2622920/))\n- rpcbind ([1.2.6](https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_6))\n- rsync ([3.2.7](https://download.samba.org/pub/rsync/NEWS#3.2.7) (includes [3.2.6](https://github.com/WayneD/rsync/releases/tag/v3.2.6), [3.2.4](https://download.samba.org/pub/rsync/NEWS.html#3.2.4)))\n- runc ([1.1.4](https://github.com/opencontainers/runc/releases/tag/v1.1.4) (includes [1.1.3](https://github.com/opencontainers/runc/releases/tag/v1.1.3), [1.1.2](https://github.com/opencontainers/runc/releases/tag/v1.1.2), [1.1.1](https://github.com/opencontainers/runc/releases/tag/v1.1.1), [1.1.0](https://github.com/opencontainers/runc/releases/tag/v1.1.0)))\n- samba ([4.15.4](https://www.samba.org/samba/history/samba-4.15.4.html))\n- sed ([4.8](https://savannah.gnu.org/forum/forum.php?forum_id=9647))\n- shadow ([4.13](https://github.com/shadow-maint/shadow/releases/tag/4.13) (includes [4.12.3](https://github.com/shadow-maint/shadow/releases/tag/4.12.3), [4.11.1](https://github.com/shadow-maint/shadow/releases/tag/v4.11.1)))\n- socat ([1.7.4.3](https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.3:/CHANGES))\n- sqlite ([3.40.1](https://www.sqlite.org/releaselog/3_40_1.html) (contains [3.40.0](https://www.sqlite.org/releaselog/3_40_0.html), [3.39.4](https://sqlite.org/releaselog/3_39_4.html), [3.38.1](https://www.sqlite.org/releaselog/3_38_1.html)))\n- strace ([5.19](https://github.com/strace/strace/releases/tag/v5.19))\n- sudo ([1.9.12_p2](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p2) (includes [1.9.12_p1](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p1), [1.9.10](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_10)))\n- systemd ([252.11](https://github.com/systemd/systemd-stable/releases/tag/v252.11) (includes [252.5](https://github.com/systemd/systemd-stable/releases/tag/v252.5), [252](https://github.com/systemd/systemd/releases/tag/v252), [251.10](https://github.com/systemd/systemd-stable/commits/v251.10), [251](https://github.com/systemd/systemd/releases/tag/v251), [250.7](https://github.com/systemd/systemd-stable/releases/tag/v250.7), [250.3](https://github.com/systemd/systemd-stable/releases/tag/v250.3), [249.7](https://github.com/systemd/systemd-stable/blob/v249.7/NEWS)))\n- talloc ([2.3.3](https://gitlab.com/samba-team/samba/-/commit/bc1ee7ca0640f0136e5af7dcc4ca8ed0a5893053))\n- tcpdump ([4.99.1](https://git.tcpdump.org/tcpdump/blob/5f552b5e6e9fe05f7ad9681d51d0303233daba6a:/CHANGES))\n- tevent ([0.11.0](https://gitlab.com/samba-team/samba/-/commit/de4e8a1af9564f6056f9af90867c2f013449051c))\n- thin-provisioning-tools ([0.9.0](https://github.com/jthornber/thin-provisioning-tools/blob/d6d93c3157631b242a13a81d30f75453e576c55a/CHANGES#L1-L9))\n- timezone-data ([2021a](https://mm.icann.org/pipermail/tz-announce/2021-January/000065.html))\n- unzip ([6.0_p27](https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-27_changelog) (includes [6.0_p26](https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-26_changelog)))\n- usbutils ([014](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/commit/?id=57fb18e59cce31a50a1ca62d1e192512c905ba00))\n- util-linux ([2.37.4](https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.4-ChangeLog))\n- vim ([9.0.1157](https://github.com/vim/vim/releases/tag/v9.0.1157) (includes [9.0.1000](https://github.com/vim/vim/releases/tag/v9.0.1000), [9.0.0828](https://github.com/vim/vim/releases/tag/v9.0.0828), [9.0.0655](https://github.com/vim/vim/releases/tag/v9.0.0655), [9.0.0469](https://github.com/vim/vim/releases/tag/v9.0.0469), [8.2.5066](https://github.com/vim/vim/releases/tag/v8.2.5066), [8.2.4328](https://github.com/vim/vim/releases/tag/v8.2.4328), [8.2.3582](https://github.com/vim/vim/releases/tag/v8.2.3582)))\n- wget ([1.21.3](https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00017.html))\n- whois ([5.5.14](https://github.com/rfc1036/whois/commit/ab10466cf2e1ec4887f6a44375c3e29c1720157f) (includes [5.5.13](https://github.com/rfc1036/whois/blob/v5.5.13/debian/changelog), [5.5.11](https://github.com/rfc1036/whois/commit/5f5ba8312c04a759dad05723c035549273d07461)))\n- wireguard-tools ([1.0.20210914](https://github.com/WireGuard/wireguard-tools/releases/tag/v1.0.20210914))\n- xfsprogs ([5.14.2](https://marc.info/?l=linux-xfs&m=163883318025390&w=2))\n- xz-utils ([5.4.1](https://github.com/tukaani-project/xz/releases/tag/v5.4.1) (includes [5.4.0](https://github.com/tukaani-project/xz/releases/tag/v5.4.0), [5.2.10](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=d92fa88a835180af5d6ff22ad0e240d6468f81af;hb=f7c2cc55618b9af3318f0c908cf8db0df1e28e7c), [5.2.9](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=ebb303084403445088ec97dfedf0461a6e5b5077;hb=d8a898eb9974683bc725c49ec76722f9a8758f48), [5.2.8](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=c244b42a6771a6e8af206318dfc500d78929fd6f;hb=5476089d9c42b9b04e92b80e1800b384a98265cb), [5.2.7](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=0205423e79ce8297102096b0fc8b030ddf5b2023;hb=d24a57b7fc7e5e9267b84367cb0788d3acf7f569), [5.2.6](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=4c79b18ff26a1c479a920b21f07d050599c04c9e;hb=8dfed05bdaa4873833ba24279f02ad2db25effea)))\n- zlib ([1.2.13](https://github.com/madler/zlib/releases/tag/v1.2.13) (includes [1.2.12](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/ChangeLog#L4)))\n- GCE: google-compute-image-packages ([20190124](https://github.com/GoogleCloudPlatform/compute-image-packages/releases/tag/20190124))\n- OEM: distro ([1.7.0](https://github.com/python-distro/distro/releases/tag/v1.7.0))\n- OEM: libmspack ([0.10.1_alpha](https://github.com/kyz/libmspack/blob/v0.10.1alpha/libmspack/ChangeLog))\n- OEM: python ([3.9.16](https://www.python.org/downloads/release/python-3916/) (includes [3.9.12](https://www.python.org/downloads/release/python-3912/), [3.9.8](https://www.python.org/downloads/release/python-398/)))\n- SDK: bison ([3.8.2](https://lists.gnu.org/archive/html/bug-bison/2021-09/msg00056.html))\n- SDK: boost ([1.81.0](https://www.boost.org/users/history/version_1_81_0.html))\n- SDK: catalyst ([3.0.21](https://gitweb.gentoo.org/proj/catalyst.git/log/?h=3.0.21))\n- SDK: cmake ([3.23.3](https://cmake.org/cmake/help/v3.23/release/3.23.html))\n- SDK: edk2-ovmf ([202105](https://github.com/tianocore/edk2/releases/tag/edk2-stable202105))\n- SDK: file ([5.44](https://github.com/file/file/blob/FILE5_44/ChangeLog) (includes [5.43](https://mailman.astron.com/pipermail/file/2022-September/000857.html), [5.40](https://mailman.astron.com/pipermail/file/2021-March/000478.html)))\n- SDK: gcc-config ([2.5](https://gitweb.gentoo.org/proj/gcc-config.git/tag/?h=v2.5))\n- SDK: iasl ([20200717](https://www.acpica.org/node/183))\n- SDK: ipxe ([1.21.1](https://github.com/ipxe/ipxe/releases/tag/v1.21.1))\n- SDK: kexec-tools ([2.0.22](https://www.spinics.net/lists/kexec/msg26864.html))\n- SDK: libpng ([1.6.39](http://www.libpng.org/pub/png/src/libpng-1.6.39-README.txt) (includes [1.6.38](http://www.libpng.org/pub/png/src/libpng-1.6.38-README.txt)))\n- SDK: libtool ([2.4.7](https://savannah.gnu.org/forum/forum.php?forum_id=10139))\n- SDK: libxslt ([1.1.37](https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.37) (includes [1.1.35](https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.35)))\n- SDK: man-db ([2.9.4](https://gitlab.com/cjwatson/man-db/-/tags/2.9.4))\n- SDK: man-pages ([5.12-r2](https://man7.org/linux/man-pages/changelog.html#release_5.12))\n- SDK: meson ([0.62.2](https://mesonbuild.com/Release-notes-for-0-62-0.html))\n- SDK: netperf ([2.7.0](https://github.com/HewlettPackard/netperf/blob/netperf-2.7.0/Release_Notes))\n- SDK: ninja ([1.11.0](https://groups.google.com/g/ninja-build/c/R2oCyDctDf8/m/-U94Y5I8AgAJ?pli=1))\n- SDK: pahole ([1.23](https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.23))\n- SDK: perl ([5.36.0](https://perldoc.perl.org/5.36.0/perldelta) (includes [5.34.1](https://perldoc.perl.org/5.34.1/perldelta), [5.15](https://kernelnewbies.org/LinuxChanges#Linux_5.15.Tracing.2C_perf_and_BPF)))\n- SDK: pkgconf ([1.8.0](https://gitea.treehouse.systems/ariadne/pkgconf/src/tag/pkgconf-1.8.0/NEWS))\n- SDK: portage ([3.0.43](https://github.com/gentoo/portage/blob/portage-3.0.43/NEWS) (includes [3.0.42](https://github.com/gentoo/portage/blob/portage-3.0.42/NEWS), [3.0.41](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.41)))\n- SDK: Python ([3.9.12](https://www.python.org/downloads/release/python-3912/) (includes [3.9.8](https://www.python.org/downloads/release/python-398/)))\n- SDK: qemu ([7.2.0](https://wiki.qemu.org/ChangeLog/7.2) (includes [7.1.0](https://wiki.qemu.org/ChangeLog/7.1), [7.0.0](https://wiki.qemu.org/ChangeLog/7.0), [6.1.0](https://wiki.qemu.org/ChangeLog/6.1)))\n- SDK: Rust ([1.67.0](https://github.com/rust-lang/rust/releases/tag/1.67.0) (includes [1.66.1](https://github.com/rust-lang/rust/releases/tag/1.66.1), [1.66.0](https://github.com/rust-lang/rust/releases/tag/1.66.0), [1.65.0](https://github.com/rust-lang/rust/releases/tag/1.65.0), [1.64.0](https://github.com/rust-lang/rust/releases/tag/1.64.0), [1.63.0](https://github.com/rust-lang/rust/releases/tag/1.63.0), [1.62.1](https://github.com/rust-lang/rust/releases/tag/1.62.1), [1.62.0](https://github.com/rust-lang/rust/releases/tag/1.62.0), [1.61.0](https://github.com/rust-lang/rust/releases/tag/1.61.0), [1.60.0](https://github.com/rust-lang/rust/releases/tag/1.60.0), [1.59.0](https://github.com/rust-lang/rust/releases/tag/1.59.0), [1.58.1](https://github.com/rust-lang/rust/releases/tag/1.58.1), [1.57.0](https://github.com/rust-lang/rust/releases/tag/1.57.0)))\n- SDK: sbsigntools ([0.9.4](https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/tag/?h=v0.9.4))\n- SDK: seabios ([1.14.0](https://seabios.org/Releases#SeaBIOS_1.14.0))\n- SDK: sgabios ([0.1_pre10](https://git.qemu.org/?p=sgabios.git;a=tree;h=a85446adb0e0))\n- SDK: squashfs-tools ([4.5_p20210914](https://lore.kernel.org/lkml/CAB3woddJss+ziGp-RjJ-yiax6pc_HLMdxk3Qk5nJdRgjpEYWBg@mail.gmail.com/))\n- VMware: open-vm-tools ([12.1.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.5) (includes [12.1.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.0), [12.0.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.5), [12.0.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.0)))"
  },
  "3510.3.1": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-10-25 08:41:08 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.136"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-31085](https://nvd.nist.gov/vuln/detail/CVE-2023-31085), [CVE-2023-34324](https://nvd.nist.gov/vuln/detail/CVE-2023-34324), [CVE-2023-4244](https://nvd.nist.gov/vuln/detail/CVE-2023-4244), [CVE-2023-42754](https://nvd.nist.gov/vuln/detail/CVE-2023-42754), [CVE-2023-42755](https://nvd.nist.gov/vuln/detail/CVE-2023-42755), [CVE-2023-5197](https://nvd.nist.gov/vuln/detail/CVE-2023-5197))\n - curl ([CVE-2023-38545](https://nvd.nist.gov/vuln/detail/CVE-2023-38545), [CVE-2023-38546](https://nvd.nist.gov/vuln/detail/CVE-2023-38546)) \n \n #### Bug fixes:\n \n - Disabled systemd-networkd's RoutesToDNS setting by default to fix provisioning failures observed in VMs with multiple network interfaces on Azure ([scripts#1206](https://github.com/flatcar/scripts/pull/1206))\n - Triggered re-reading of partition table to fix adding partitions to the boot disk ([scripts#1202](https://github.com/flatcar/scripts/pull/1202))\n \n #### Changes:\n \n - To make Kubernetes work by default, `/usr/libexec/kubernetes/kubelet-plugins/volume/exec` is now a symlink to the writable folder `/var/kubernetes/kubelet-plugins/volume/exec` ([Flatcar#1193](https://github.com/flatcar/Flatcar/issues/1193))\n \n #### Updates:\n \n - Linux ([5.15.136](https://lwn.net/Articles/948297) (includes [5.15.135](https://lwn.net/Articles/947299), [5.15.134](https://lwn.net/Articles/946855), [5.15.133](https://lwn.net/Articles/945380)))\n - ca-certificates ([3.94](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html))"
  },
  "3510.3.2": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-02-14 04:35:42 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.148"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **LTS 3510.3.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-47940](https://nvd.nist.gov/vuln/detail/CVE-2022-47940), [CVE-2023-1193](https://nvd.nist.gov/vuln/detail/CVE-2023-1193), [CVE-2023-1194](https://nvd.nist.gov/vuln/detail/CVE-2023-1194), [CVE-2023-25775](https://nvd.nist.gov/vuln/detail/CVE-2023-25775), [CVE-2023-32247](https://nvd.nist.gov/vuln/detail/CVE-2023-32247), [CVE-2023-32250](https://nvd.nist.gov/vuln/detail/CVE-2023-32250), [CVE-2023-32252](https://nvd.nist.gov/vuln/detail/CVE-2023-32252), [CVE-2023-32254](https://nvd.nist.gov/vuln/detail/CVE-2023-32254), [CVE-2023-32257](https://nvd.nist.gov/vuln/detail/CVE-2023-32257), [CVE-2023-32258](https://nvd.nist.gov/vuln/detail/CVE-2023-32258), [CVE-2023-38427](https://nvd.nist.gov/vuln/detail/CVE-2023-38427), [CVE-2023-38430](https://nvd.nist.gov/vuln/detail/CVE-2023-38430), [CVE-2023-38431](https://nvd.nist.gov/vuln/detail/CVE-2023-38431), [CVE-2023-3867](https://nvd.nist.gov/vuln/detail/CVE-2023-3867), [CVE-2023-46343](https://nvd.nist.gov/vuln/detail/CVE-2023-46343), [CVE-2023-46813](https://nvd.nist.gov/vuln/detail/CVE-2023-46813), [CVE-2023-46838](https://nvd.nist.gov/vuln/detail/CVE-2023-46838), [CVE-2023-46862](https://nvd.nist.gov/vuln/detail/CVE-2023-46862), [CVE-2023-51779](https://nvd.nist.gov/vuln/detail/CVE-2023-51779), [CVE-2023-51780](https://nvd.nist.gov/vuln/detail/CVE-2023-51780), [CVE-2023-51781](https://nvd.nist.gov/vuln/detail/CVE-2023-51781), [CVE-2023-51782](https://nvd.nist.gov/vuln/detail/CVE-2023-51782), [CVE-2023-52340](https://nvd.nist.gov/vuln/detail/CVE-2023-52340), [CVE-2023-5717](https://nvd.nist.gov/vuln/detail/CVE-2023-5717), [CVE-2023-6040](https://nvd.nist.gov/vuln/detail/CVE-2023-6040), [CVE-2023-6121](https://nvd.nist.gov/vuln/detail/CVE-2023-6121), [CVE-2023-6606](https://nvd.nist.gov/vuln/detail/CVE-2023-6606), [CVE-2023-6622](https://nvd.nist.gov/vuln/detail/CVE-2023-6622), [CVE-2023-6817](https://nvd.nist.gov/vuln/detail/CVE-2023-6817), [CVE-2023-6915](https://nvd.nist.gov/vuln/detail/CVE-2023-6915), [CVE-2023-6931](https://nvd.nist.gov/vuln/detail/CVE-2023-6931), [CVE-2023-6932](https://nvd.nist.gov/vuln/detail/CVE-2023-6932), [CVE-2024-0584](https://nvd.nist.gov/vuln/detail/CVE-2024-0584), [CVE-2024-0607](https://nvd.nist.gov/vuln/detail/CVE-2024-0607), [CVE-2024-0646](https://nvd.nist.gov/vuln/detail/CVE-2024-0646), [CVE-2024-1085](https://nvd.nist.gov/vuln/detail/CVE-2024-1085), [CVE-2024-22705](https://nvd.nist.gov/vuln/detail/CVE-2024-22705))\n - runc ([CVE-2024-21626](https://nvd.nist.gov/vuln/detail/CVE-2024-21626))\n \n #### Bug fixes:\n \n - Forwarded the proxy environment variables of `update-engine.service` to the postinstall script to support fetching OEM systemd-sysext payloads through a proxy ([Flatcar#1326](https://github.com/flatcar/Flatcar/issues/1326))\n \n #### Changes:\n \n - Added a `flatcar-update --oem-payloads <yes|no>` flag to skip providing OEM payloads, e.g., for downgrades ([init#114](https://github.com/flatcar/init/pull/114))\n - Backported the OEM payload support to update-engine to avoid the fallback download path for clients on a restricted network and rather use the URLs passed from `flatcar-update -E` or with self-hosted Nebraska payloads ([Flatcar#1332](https://github.com/flatcar/Flatcar/issues/1332), [Flatcar#1326](https://github.com/flatcar/Flatcar/issues/1326))\n - Brightbox: The regular OpenStack image should now be used, it includes Afterburn for instance metadata attributes\n - OpenStack: An uncompressed image is provided for simpler import (since the images use qcow2 inline compression, there is no benefit in using the `.gz` or `.bz2` images)\n \n #### Updates:\n \n- Linux ([5.15.148](https://lwn.net/Articles/959514) (includes [5.15.147](https://lwn.net/Articles/958344), [5.15.146](https://lwn.net/Articles/957010), [5.15.145](https://lwn.net/Articles/956081), [5.15.144](https://lwn.net/Articles/955815), [5.15.143](https://lwn.net/Articles/954988/), [5.15.142](https://lwn.net/Articles/954114), [5.15.141](https://lwn.net/Articles/953649/), [5.15.140](https://lwn.net/Articles/953130), [5.15.139](https://lwn.net/Articles/952004), [5.15.138](https://lwn.net/Articles/950714), [5.15.137](https://lwn.net/Articles/948818)))\n- ca-certificates ([3.97](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_97.html) (includes [3.96.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html), [3.96](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html), [3.95](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html)))\n- runc ([1.1.12](https://github.com/opencontainers/runc/releases/tag/v1.1.12))"
  },
  "3510.3.3": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-04-16 11:53:54 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.154"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.2**_\n\n#### Security fixes:\n\n- Linux ([CVE-2023-52429](https://nvd.nist.gov/vuln/detail/CVE-2023-52429), [CVE-2023-52434](https://nvd.nist.gov/vuln/detail/CVE-2023-52434), [CVE-2023-52435](https://nvd.nist.gov/vuln/detail/CVE-2023-52435), [CVE-2023-52447](https://nvd.nist.gov/vuln/detail/CVE-2023-52447), [CVE-2023-52486](https://nvd.nist.gov/vuln/detail/CVE-2023-52486), [CVE-2023-52489](https://nvd.nist.gov/vuln/detail/CVE-2023-52489), [CVE-2023-52491](https://nvd.nist.gov/vuln/detail/CVE-2023-52491), [CVE-2023-52492](https://nvd.nist.gov/vuln/detail/CVE-2023-52492), [CVE-2023-52493](https://nvd.nist.gov/vuln/detail/CVE-2023-52493), [CVE-2023-52494](https://nvd.nist.gov/vuln/detail/CVE-2023-52494), [CVE-2023-52497](https://nvd.nist.gov/vuln/detail/CVE-2023-52497), [CVE-2023-52498](https://nvd.nist.gov/vuln/detail/CVE-2023-52498), [CVE-2023-52583](https://nvd.nist.gov/vuln/detail/CVE-2023-52583), [CVE-2023-52587](https://nvd.nist.gov/vuln/detail/CVE-2023-52587), [CVE-2023-52588](https://nvd.nist.gov/vuln/detail/CVE-2023-52588), [CVE-2023-52594](https://nvd.nist.gov/vuln/detail/CVE-2023-52594), [CVE-2023-52595](https://nvd.nist.gov/vuln/detail/CVE-2023-52595), [CVE-2023-52597](https://nvd.nist.gov/vuln/detail/CVE-2023-52597), [CVE-2023-52598](https://nvd.nist.gov/vuln/detail/CVE-2023-52598), [CVE-2023-52599](https://nvd.nist.gov/vuln/detail/CVE-2023-52599), [CVE-2023-52600](https://nvd.nist.gov/vuln/detail/CVE-2023-52600), [CVE-2023-52601](https://nvd.nist.gov/vuln/detail/CVE-2023-52601), [CVE-2023-52602](https://nvd.nist.gov/vuln/detail/CVE-2023-52602), [CVE-2023-52603](https://nvd.nist.gov/vuln/detail/CVE-2023-52603), [CVE-2023-52604](https://nvd.nist.gov/vuln/detail/CVE-2023-52604), [CVE-2023-52606](https://nvd.nist.gov/vuln/detail/CVE-2023-52606), [CVE-2023-52607](https://nvd.nist.gov/vuln/detail/CVE-2023-52607), [CVE-2023-52608](https://nvd.nist.gov/vuln/detail/CVE-2023-52608), [CVE-2023-52614](https://nvd.nist.gov/vuln/detail/CVE-2023-52614), [CVE-2023-52615](https://nvd.nist.gov/vuln/detail/CVE-2023-52615), [CVE-2023-52616](https://nvd.nist.gov/vuln/detail/CVE-2023-52616), [CVE-2023-52617](https://nvd.nist.gov/vuln/detail/CVE-2023-52617), [CVE-2023-52618](https://nvd.nist.gov/vuln/detail/CVE-2023-52618), [CVE-2023-52619](https://nvd.nist.gov/vuln/detail/CVE-2023-52619), [CVE-2023-52620](https://nvd.nist.gov/vuln/detail/CVE-2023-52620), [CVE-2023-52622](https://nvd.nist.gov/vuln/detail/CVE-2023-52622), [CVE-2023-52623](https://nvd.nist.gov/vuln/detail/CVE-2023-52623), [CVE-2023-52627](https://nvd.nist.gov/vuln/detail/CVE-2023-52627), [CVE-2023-52630](https://nvd.nist.gov/vuln/detail/CVE-2023-52630), [CVE-2023-52631](https://nvd.nist.gov/vuln/detail/CVE-2023-52631), [CVE-2023-52633](https://nvd.nist.gov/vuln/detail/CVE-2023-52633), [CVE-2023-52635](https://nvd.nist.gov/vuln/detail/CVE-2023-52635), [CVE-2023-52637](https://nvd.nist.gov/vuln/detail/CVE-2023-52637), [CVE-2023-52638](https://nvd.nist.gov/vuln/detail/CVE-2023-52638), [CVE-2023-52640](https://nvd.nist.gov/vuln/detail/CVE-2023-52640), [CVE-2023-52641](https://nvd.nist.gov/vuln/detail/CVE-2023-52641), [CVE-2023-6270](https://nvd.nist.gov/vuln/detail/CVE-2023-6270), [CVE-2023-7042](https://nvd.nist.gov/vuln/detail/CVE-2023-7042), [CVE-2024-0340](https://nvd.nist.gov/vuln/detail/CVE-2024-0340), [CVE-2024-0565](https://nvd.nist.gov/vuln/detail/CVE-2024-0565), [CVE-2024-0841](https://nvd.nist.gov/vuln/detail/CVE-2024-0841), [CVE-2024-1086](https://nvd.nist.gov/vuln/detail/CVE-2024-1086), [CVE-2024-1151](https://nvd.nist.gov/vuln/detail/CVE-2024-1151), [CVE-2024-22099](https://nvd.nist.gov/vuln/detail/CVE-2024-22099), [CVE-2024-23849](https://nvd.nist.gov/vuln/detail/CVE-2024-23849), [CVE-2024-23850](https://nvd.nist.gov/vuln/detail/CVE-2024-23850), [CVE-2024-23851](https://nvd.nist.gov/vuln/detail/CVE-2024-23851), [CVE-2024-26592](https://nvd.nist.gov/vuln/detail/CVE-2024-26592), [CVE-2024-26593](https://nvd.nist.gov/vuln/detail/CVE-2024-26593), [CVE-2024-26594](https://nvd.nist.gov/vuln/detail/CVE-2024-26594), [CVE-2024-26600](https://nvd.nist.gov/vuln/detail/CVE-2024-26600), [CVE-2024-26601](https://nvd.nist.gov/vuln/detail/CVE-2024-26601), [CVE-2024-26602](https://nvd.nist.gov/vuln/detail/CVE-2024-26602), [CVE-2024-26603](https://nvd.nist.gov/vuln/detail/CVE-2024-26603), [CVE-2024-26606](https://nvd.nist.gov/vuln/detail/CVE-2024-26606), [CVE-2024-26608](https://nvd.nist.gov/vuln/detail/CVE-2024-26608), [CVE-2024-26610](https://nvd.nist.gov/vuln/detail/CVE-2024-26610), [CVE-2024-26614](https://nvd.nist.gov/vuln/detail/CVE-2024-26614), [CVE-2024-26615](https://nvd.nist.gov/vuln/detail/CVE-2024-26615), [CVE-2024-26622](https://nvd.nist.gov/vuln/detail/CVE-2024-26622), [CVE-2024-26625](https://nvd.nist.gov/vuln/detail/CVE-2024-26625), [CVE-2024-26627](https://nvd.nist.gov/vuln/detail/CVE-2024-26627), [CVE-2024-26635](https://nvd.nist.gov/vuln/detail/CVE-2024-26635), [CVE-2024-26636](https://nvd.nist.gov/vuln/detail/CVE-2024-26636), [CVE-2024-26640](https://nvd.nist.gov/vuln/detail/CVE-2024-26640), [CVE-2024-26641](https://nvd.nist.gov/vuln/detail/CVE-2024-26641), [CVE-2024-26644](https://nvd.nist.gov/vuln/detail/CVE-2024-26644), [CVE-2024-26645](https://nvd.nist.gov/vuln/detail/CVE-2024-26645), [CVE-2024-26651](https://nvd.nist.gov/vuln/detail/CVE-2024-26651), [CVE-2024-26659](https://nvd.nist.gov/vuln/detail/CVE-2024-26659), [CVE-2024-26660](https://nvd.nist.gov/vuln/detail/CVE-2024-26660), [CVE-2024-26663](https://nvd.nist.gov/vuln/detail/CVE-2024-26663), [CVE-2024-26664](https://nvd.nist.gov/vuln/detail/CVE-2024-26664), [CVE-2024-26665](https://nvd.nist.gov/vuln/detail/CVE-2024-26665), [CVE-2024-26668](https://nvd.nist.gov/vuln/detail/CVE-2024-26668), [CVE-2024-26671](https://nvd.nist.gov/vuln/detail/CVE-2024-26671), [CVE-2024-26673](https://nvd.nist.gov/vuln/detail/CVE-2024-26673), [CVE-2024-26675](https://nvd.nist.gov/vuln/detail/CVE-2024-26675), [CVE-2024-26676](https://nvd.nist.gov/vuln/detail/CVE-2024-26676), [CVE-2024-26679](https://nvd.nist.gov/vuln/detail/CVE-2024-26679), [CVE-2024-26684](https://nvd.nist.gov/vuln/detail/CVE-2024-26684), [CVE-2024-26685](https://nvd.nist.gov/vuln/detail/CVE-2024-26685), [CVE-2024-26688](https://nvd.nist.gov/vuln/detail/CVE-2024-26688), [CVE-2024-26689](https://nvd.nist.gov/vuln/detail/CVE-2024-26689), [CVE-2024-26696](https://nvd.nist.gov/vuln/detail/CVE-2024-26696), [CVE-2024-26697](https://nvd.nist.gov/vuln/detail/CVE-2024-26697), [CVE-2024-26698](https://nvd.nist.gov/vuln/detail/CVE-2024-26698), [CVE-2024-26702](https://nvd.nist.gov/vuln/detail/CVE-2024-26702), [CVE-2024-26704](https://nvd.nist.gov/vuln/detail/CVE-2024-26704), [CVE-2024-26707](https://nvd.nist.gov/vuln/detail/CVE-2024-26707), [CVE-2024-26712](https://nvd.nist.gov/vuln/detail/CVE-2024-26712), [CVE-2024-26715](https://nvd.nist.gov/vuln/detail/CVE-2024-26715), [CVE-2024-26717](https://nvd.nist.gov/vuln/detail/CVE-2024-26717), [CVE-2024-26720](https://nvd.nist.gov/vuln/detail/CVE-2024-26720), [CVE-2024-26727](https://nvd.nist.gov/vuln/detail/CVE-2024-26727), [CVE-2024-26733](https://nvd.nist.gov/vuln/detail/CVE-2024-26733), [CVE-2024-26735](https://nvd.nist.gov/vuln/detail/CVE-2024-26735), [CVE-2024-26736](https://nvd.nist.gov/vuln/detail/CVE-2024-26736), [CVE-2024-26737](https://nvd.nist.gov/vuln/detail/CVE-2024-26737), [CVE-2024-26743](https://nvd.nist.gov/vuln/detail/CVE-2024-26743), [CVE-2024-26744](https://nvd.nist.gov/vuln/detail/CVE-2024-26744), [CVE-2024-26747](https://nvd.nist.gov/vuln/detail/CVE-2024-26747), [CVE-2024-26748](https://nvd.nist.gov/vuln/detail/CVE-2024-26748), [CVE-2024-26749](https://nvd.nist.gov/vuln/detail/CVE-2024-26749), [CVE-2024-26751](https://nvd.nist.gov/vuln/detail/CVE-2024-26751), [CVE-2024-26752](https://nvd.nist.gov/vuln/detail/CVE-2024-26752), [CVE-2024-26754](https://nvd.nist.gov/vuln/detail/CVE-2024-26754), [CVE-2024-26763](https://nvd.nist.gov/vuln/detail/CVE-2024-26763), [CVE-2024-26764](https://nvd.nist.gov/vuln/detail/CVE-2024-26764), [CVE-2024-26766](https://nvd.nist.gov/vuln/detail/CVE-2024-26766), [CVE-2024-26769](https://nvd.nist.gov/vuln/detail/CVE-2024-26769), [CVE-2024-26771](https://nvd.nist.gov/vuln/detail/CVE-2024-26771), [CVE-2024-26772](https://nvd.nist.gov/vuln/detail/CVE-2024-26772), [CVE-2024-26773](https://nvd.nist.gov/vuln/detail/CVE-2024-26773), [CVE-2024-26774](https://nvd.nist.gov/vuln/detail/CVE-2024-26774), [CVE-2024-26776](https://nvd.nist.gov/vuln/detail/CVE-2024-26776), [CVE-2024-26777](https://nvd.nist.gov/vuln/detail/CVE-2024-26777), [CVE-2024-26778](https://nvd.nist.gov/vuln/detail/CVE-2024-26778), [CVE-2024-26779](https://nvd.nist.gov/vuln/detail/CVE-2024-26779), [CVE-2024-26782](https://nvd.nist.gov/vuln/detail/CVE-2024-26782), [CVE-2024-26787](https://nvd.nist.gov/vuln/detail/CVE-2024-26787), [CVE-2024-26788](https://nvd.nist.gov/vuln/detail/CVE-2024-26788), [CVE-2024-26790](https://nvd.nist.gov/vuln/detail/CVE-2024-26790), [CVE-2024-26791](https://nvd.nist.gov/vuln/detail/CVE-2024-26791), [CVE-2024-26793](https://nvd.nist.gov/vuln/detail/CVE-2024-26793), [CVE-2024-26795](https://nvd.nist.gov/vuln/detail/CVE-2024-26795), [CVE-2024-26798](https://nvd.nist.gov/vuln/detail/CVE-2024-26798), [CVE-2024-26801](https://nvd.nist.gov/vuln/detail/CVE-2024-26801), [CVE-2024-26802](https://nvd.nist.gov/vuln/detail/CVE-2024-26802), [CVE-2024-26803](https://nvd.nist.gov/vuln/detail/CVE-2024-26803), [CVE-2024-26804](https://nvd.nist.gov/vuln/detail/CVE-2024-26804), [CVE-2024-26805](https://nvd.nist.gov/vuln/detail/CVE-2024-26805), [CVE-2024-26808](https://nvd.nist.gov/vuln/detail/CVE-2024-26808), [CVE-2024-26809](https://nvd.nist.gov/vuln/detail/CVE-2024-26809))\n\n#### Bug fixes:\n\n- Fixed `toolbox` to prevent mounted `ctr` snapshots from being garbage-collected ([toolbox#9](https://github.com/flatcar/toolbox/pull/9))\n\n#### Changes:\n\n- SDK: Unified qemu image formats, so that the `qemu_uefi` build target provides the regular `qemu` and the `qemu_uefi_secure` artifacts ([scripts#1847](https://github.com/flatcar/scripts/pull/1847))\n\n#### Updates:\n\n- Linux ([5.15.154](https://lwn.net/Articles/969357) (includes [5.15.153](https://lwn.net/Articles/966760), [5.15.152](https://lwn.net/Articles/965608), [5.15.151](https://lwn.net/Articles/964564), [5.15.150](https://lwn.net/Articles/964175), [5.15.149](https://lwn.net/Articles/963359)))\n- ca-certificates ([3.99](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_99.html) (includes [3.98](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html)))\n"
  },
  "3510.3.4": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-06-26 13:05:46 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.161"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **LTS 3510.3.3**_\n \n #### Updates:\n \n - Linux ([5.15.161](https://lwn.net/Articles/978595) (includes [5.15.160](https://lwn.net/Articles/975078), [5.15.159](https://lwn.net/Articles/974075), [5.15.158](https://lwn.net/Articles/972213), [5.15.157](https://lwn.net/Articles/971365), [5.15.156](https://lwn.net/Articles/970174) and [5.15.155](https://lwn.net/Articles/969736)))\n - ca-certificates ([3.101](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101.html) (includes [3.100](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_100.html)))\n"
  },
  "3510.3.5": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-07-02 13:35:44 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.161"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **LTS 3510.3.4**_\n \n #### Security fixes:\n \n - openssh ([CVE-2024-6387](https://nvd.nist.gov/vuln/detail/CVE-2024-6387))"
  },
  "3510.3.6": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-12-16 14:13:08 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.173"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.5**_\n\n#### Security fixes:\n\n- Linux ([CVE-2024-42098](https://nvd.nist.gov/vuln/detail/CVE-2024-42098), [CVE-2024-42097](https://nvd.nist.gov/vuln/detail/CVE-2024-42097), [CVE-2024-42096](https://nvd.nist.gov/vuln/detail/CVE-2024-42096), [CVE-2024-42095](https://nvd.nist.gov/vuln/detail/CVE-2024-42095), [CVE-2024-42093](https://nvd.nist.gov/vuln/detail/CVE-2024-42093), [CVE-2024-42094](https://nvd.nist.gov/vuln/detail/CVE-2024-42094), [CVE-2024-42092](https://nvd.nist.gov/vuln/detail/CVE-2024-42092), [CVE-2024-42090](https://nvd.nist.gov/vuln/detail/CVE-2024-42090), [CVE-2024-42089](https://nvd.nist.gov/vuln/detail/CVE-2024-42089), [CVE-2024-42087](https://nvd.nist.gov/vuln/detail/CVE-2024-42087), [CVE-2024-42086](https://nvd.nist.gov/vuln/detail/CVE-2024-42086), [CVE-2024-42084](https://nvd.nist.gov/vuln/detail/CVE-2024-42084), [CVE-2024-42085](https://nvd.nist.gov/vuln/detail/CVE-2024-42085), [CVE-2024-42070](https://nvd.nist.gov/vuln/detail/CVE-2024-42070), [CVE-2024-42068](https://nvd.nist.gov/vuln/detail/CVE-2024-42068), [CVE-2024-42082](https://nvd.nist.gov/vuln/detail/CVE-2024-42082), [CVE-2024-42080](https://nvd.nist.gov/vuln/detail/CVE-2024-42080), [CVE-2024-42077](https://nvd.nist.gov/vuln/detail/CVE-2024-42077), [CVE-2024-42076](https://nvd.nist.gov/vuln/detail/CVE-2024-42076), [CVE-2023-52887](https://nvd.nist.gov/vuln/detail/CVE-2023-52887), [CVE-2024-41093](https://nvd.nist.gov/vuln/detail/CVE-2024-41093), [CVE-2024-41092](https://nvd.nist.gov/vuln/detail/CVE-2024-41092), [CVE-2024-41089](https://nvd.nist.gov/vuln/detail/CVE-2024-41089), [CVE-2024-41087](https://nvd.nist.gov/vuln/detail/CVE-2024-41087), [CVE-2024-41097](https://nvd.nist.gov/vuln/detail/CVE-2024-41097), [CVE-2024-41095](https://nvd.nist.gov/vuln/detail/CVE-2024-41095), [CVE-2024-41006](https://nvd.nist.gov/vuln/detail/CVE-2024-41006), [CVE-2024-41005](https://nvd.nist.gov/vuln/detail/CVE-2024-41005), [CVE-2024-41004](https://nvd.nist.gov/vuln/detail/CVE-2024-41004), [CVE-2024-41002](https://nvd.nist.gov/vuln/detail/CVE-2024-41002), [CVE-2024-41000](https://nvd.nist.gov/vuln/detail/CVE-2024-41000), [CVE-2024-40994](https://nvd.nist.gov/vuln/detail/CVE-2024-40994), [CVE-2024-40990](https://nvd.nist.gov/vuln/detail/CVE-2024-40990), [CVE-2024-40988](https://nvd.nist.gov/vuln/detail/CVE-2024-40988), [CVE-2024-40987](https://nvd.nist.gov/vuln/detail/CVE-2024-40987), [CVE-2024-40995](https://nvd.nist.gov/vuln/detail/CVE-2024-40995), [CVE-2024-40983](https://nvd.nist.gov/vuln/detail/CVE-2024-40983), [CVE-2024-40984](https://nvd.nist.gov/vuln/detail/CVE-2024-40984), [CVE-2024-40970](https://nvd.nist.gov/vuln/detail/CVE-2024-40970), [CVE-2024-40978](https://nvd.nist.gov/vuln/detail/CVE-2024-40978), [CVE-2024-40976](https://nvd.nist.gov/vuln/detail/CVE-2024-40976), [CVE-2024-40974](https://nvd.nist.gov/vuln/detail/CVE-2024-40974), [CVE-2024-40981](https://nvd.nist.gov/vuln/detail/CVE-2024-40981), [CVE-2024-40980](https://nvd.nist.gov/vuln/detail/CVE-2024-40980), [CVE-2024-40971](https://nvd.nist.gov/vuln/detail/CVE-2024-40971), [CVE-2024-40954](https://nvd.nist.gov/vuln/detail/CVE-2024-40954), [CVE-2024-40968](https://nvd.nist.gov/vuln/detail/CVE-2024-40968), [CVE-2024-40967](https://nvd.nist.gov/vuln/detail/CVE-2024-40967), [CVE-2024-40963](https://nvd.nist.gov/vuln/detail/CVE-2024-40963), [CVE-2024-40961](https://nvd.nist.gov/vuln/detail/CVE-2024-40961), [CVE-2024-40960](https://nvd.nist.gov/vuln/detail/CVE-2024-40960), [CVE-2024-40959](https://nvd.nist.gov/vuln/detail/CVE-2024-40959), [CVE-2024-40958](https://nvd.nist.gov/vuln/detail/CVE-2024-40958), [CVE-2024-40957](https://nvd.nist.gov/vuln/detail/CVE-2024-40957), [CVE-2024-40956](https://nvd.nist.gov/vuln/detail/CVE-2024-40956), [CVE-2024-40929](https://nvd.nist.gov/vuln/detail/CVE-2024-40929), [CVE-2024-40937](https://nvd.nist.gov/vuln/detail/CVE-2024-40937), [CVE-2024-40934](https://nvd.nist.gov/vuln/detail/CVE-2024-40934), [CVE-2024-40932](https://nvd.nist.gov/vuln/detail/CVE-2024-40932), [CVE-2024-40931](https://nvd.nist.gov/vuln/detail/CVE-2024-40931), [CVE-2024-40945](https://nvd.nist.gov/vuln/detail/CVE-2024-40945), [CVE-2024-40943](https://nvd.nist.gov/vuln/detail/CVE-2024-40943), [CVE-2024-40942](https://nvd.nist.gov/vuln/detail/CVE-2024-40942), [CVE-2024-40941](https://nvd.nist.gov/vuln/detail/CVE-2024-40941), [CVE-2024-40916](https://nvd.nist.gov/vuln/detail/CVE-2024-40916), [CVE-2024-40927](https://nvd.nist.gov/vuln/detail/CVE-2024-40927), [CVE-2024-40914](https://nvd.nist.gov/vuln/detail/CVE-2024-40914), [CVE-2024-40912](https://nvd.nist.gov/vuln/detail/CVE-2024-40912), [CVE-2024-39503](https://nvd.nist.gov/vuln/detail/CVE-2024-39503), [CVE-2024-39502](https://nvd.nist.gov/vuln/detail/CVE-2024-39502), [CVE-2024-39501](https://nvd.nist.gov/vuln/detail/CVE-2024-39501), [CVE-2024-39500](https://nvd.nist.gov/vuln/detail/CVE-2024-39500), [CVE-2024-39499](https://nvd.nist.gov/vuln/detail/CVE-2024-39499), [CVE-2024-40911](https://nvd.nist.gov/vuln/detail/CVE-2024-40911), [CVE-2024-40908](https://nvd.nist.gov/vuln/detail/CVE-2024-40908), [CVE-2024-40905](https://nvd.nist.gov/vuln/detail/CVE-2024-40905), [CVE-2024-40904](https://nvd.nist.gov/vuln/detail/CVE-2024-40904), [CVE-2024-40902](https://nvd.nist.gov/vuln/detail/CVE-2024-40902), [CVE-2024-40901](https://nvd.nist.gov/vuln/detail/CVE-2024-40901), [CVE-2024-39509](https://nvd.nist.gov/vuln/detail/CVE-2024-39509), [CVE-2024-39507](https://nvd.nist.gov/vuln/detail/CVE-2024-39507), [CVE-2024-39506](https://nvd.nist.gov/vuln/detail/CVE-2024-39506), [CVE-2024-39505](https://nvd.nist.gov/vuln/detail/CVE-2024-39505), [CVE-2024-39495](https://nvd.nist.gov/vuln/detail/CVE-2024-39495), [CVE-2024-42247](https://nvd.nist.gov/vuln/detail/CVE-2024-42247), [CVE-2024-42244](https://nvd.nist.gov/vuln/detail/CVE-2024-42244), [CVE-2024-42232](https://nvd.nist.gov/vuln/detail/CVE-2024-42232), [CVE-2024-42240](https://nvd.nist.gov/vuln/detail/CVE-2024-42240), [CVE-2024-42236](https://nvd.nist.gov/vuln/detail/CVE-2024-42236), [CVE-2024-42145](https://nvd.nist.gov/vuln/detail/CVE-2024-42145), [CVE-2024-42154](https://nvd.nist.gov/vuln/detail/CVE-2024-42154), [CVE-2024-42153](https://nvd.nist.gov/vuln/detail/CVE-2024-42153), [CVE-2024-42152](https://nvd.nist.gov/vuln/detail/CVE-2024-42152), [CVE-2024-42148](https://nvd.nist.gov/vuln/detail/CVE-2024-42148), [CVE-2024-42229](https://nvd.nist.gov/vuln/detail/CVE-2024-42229), [CVE-2024-42225](https://nvd.nist.gov/vuln/detail/CVE-2024-42225), [CVE-2024-42224](https://nvd.nist.gov/vuln/detail/CVE-2024-42224), [CVE-2024-42223](https://nvd.nist.gov/vuln/detail/CVE-2024-42223), [CVE-2024-42161](https://nvd.nist.gov/vuln/detail/CVE-2024-42161), [CVE-2024-42157](https://nvd.nist.gov/vuln/detail/CVE-2024-42157), [CVE-2024-42119](https://nvd.nist.gov/vuln/detail/CVE-2024-42119), [CVE-2024-42116](https://nvd.nist.gov/vuln/detail/CVE-2024-42116), [CVE-2024-42115](https://nvd.nist.gov/vuln/detail/CVE-2024-42115), [CVE-2024-42143](https://nvd.nist.gov/vuln/detail/CVE-2024-42143), [CVE-2024-42140](https://nvd.nist.gov/vuln/detail/CVE-2024-42140), [CVE-2024-42137](https://nvd.nist.gov/vuln/detail/CVE-2024-42137), [CVE-2024-42131](https://nvd.nist.gov/vuln/detail/CVE-2024-42131), [CVE-2024-42130](https://nvd.nist.gov/vuln/detail/CVE-2024-42130), [CVE-2024-42127](https://nvd.nist.gov/vuln/detail/CVE-2024-42127), [CVE-2024-42124](https://nvd.nist.gov/vuln/detail/CVE-2024-42124), [CVE-2024-42121](https://nvd.nist.gov/vuln/detail/CVE-2024-42121), [CVE-2024-42120](https://nvd.nist.gov/vuln/detail/CVE-2024-42120), [CVE-2024-42106](https://nvd.nist.gov/vuln/detail/CVE-2024-42106), [CVE-2024-42105](https://nvd.nist.gov/vuln/detail/CVE-2024-42105), [CVE-2024-42104](https://nvd.nist.gov/vuln/detail/CVE-2024-42104), [CVE-2024-42103](https://nvd.nist.gov/vuln/detail/CVE-2024-42103), [CVE-2024-42102](https://nvd.nist.gov/vuln/detail/CVE-2024-42102), [CVE-2024-42101](https://nvd.nist.gov/vuln/detail/CVE-2024-42101), [CVE-2024-42109](https://nvd.nist.gov/vuln/detail/CVE-2024-42109), [CVE-2024-41055](https://nvd.nist.gov/vuln/detail/CVE-2024-41055), [CVE-2024-41027](https://nvd.nist.gov/vuln/detail/CVE-2024-41027), [CVE-2024-41049](https://nvd.nist.gov/vuln/detail/CVE-2024-41049), [CVE-2024-41048](https://nvd.nist.gov/vuln/detail/CVE-2024-41048), [CVE-2024-41047](https://nvd.nist.gov/vuln/detail/CVE-2024-41047), [CVE-2024-41046](https://nvd.nist.gov/vuln/detail/CVE-2024-41046), [CVE-2024-41044](https://nvd.nist.gov/vuln/detail/CVE-2024-41044), [CVE-2024-41041](https://nvd.nist.gov/vuln/detail/CVE-2024-41041), [CVE-2024-41040](https://nvd.nist.gov/vuln/detail/CVE-2024-41040), [CVE-2024-41035](https://nvd.nist.gov/vuln/detail/CVE-2024-41035), [CVE-2024-41034](https://nvd.nist.gov/vuln/detail/CVE-2024-41034), [CVE-2024-41081](https://nvd.nist.gov/vuln/detail/CVE-2024-41081), [CVE-2024-41078](https://nvd.nist.gov/vuln/detail/CVE-2024-41078), [CVE-2024-41073](https://nvd.nist.gov/vuln/detail/CVE-2024-41073), [CVE-2024-41072](https://nvd.nist.gov/vuln/detail/CVE-2024-41072), [CVE-2024-41070](https://nvd.nist.gov/vuln/detail/CVE-2024-41070), [CVE-2024-41077](https://nvd.nist.gov/vuln/detail/CVE-2024-41077), [CVE-2024-41068](https://nvd.nist.gov/vuln/detail/CVE-2024-41068), [CVE-2024-41065](https://nvd.nist.gov/vuln/detail/CVE-2024-41065), [CVE-2024-41064](https://nvd.nist.gov/vuln/detail/CVE-2024-41064), [CVE-2024-41063](https://nvd.nist.gov/vuln/detail/CVE-2024-41063), [CVE-2024-41060](https://nvd.nist.gov/vuln/detail/CVE-2024-41060), [CVE-2024-41059](https://nvd.nist.gov/vuln/detail/CVE-2024-41059), [CVE-2024-41022](https://nvd.nist.gov/vuln/detail/CVE-2024-41022), [CVE-2024-41020](https://nvd.nist.gov/vuln/detail/CVE-2024-41020), [CVE-2024-41019](https://nvd.nist.gov/vuln/detail/CVE-2024-41019), [CVE-2024-41017](https://nvd.nist.gov/vuln/detail/CVE-2024-41017), [CVE-2024-41015](https://nvd.nist.gov/vuln/detail/CVE-2024-41015), [CVE-2024-41090](https://nvd.nist.gov/vuln/detail/CVE-2024-41090), [CVE-2024-41091](https://nvd.nist.gov/vuln/detail/CVE-2024-41091), [CVE-2024-44971](https://nvd.nist.gov/vuln/detail/CVE-2024-44971), [CVE-2024-44969](https://nvd.nist.gov/vuln/detail/CVE-2024-44969), [CVE-2024-44966](https://nvd.nist.gov/vuln/detail/CVE-2024-44966), [CVE-2024-44954](https://nvd.nist.gov/vuln/detail/CVE-2024-44954), [CVE-2024-44952](https://nvd.nist.gov/vuln/detail/CVE-2024-44952), [CVE-2024-44965](https://nvd.nist.gov/vuln/detail/CVE-2024-44965), [CVE-2024-44960](https://nvd.nist.gov/vuln/detail/CVE-2024-44960), [CVE-2024-44958](https://nvd.nist.gov/vuln/detail/CVE-2024-44958), [CVE-2024-44948](https://nvd.nist.gov/vuln/detail/CVE-2024-44948), [CVE-2024-44944](https://nvd.nist.gov/vuln/detail/CVE-2024-44944), [CVE-2024-43908](https://nvd.nist.gov/vuln/detail/CVE-2024-43908), [CVE-2024-43914](https://nvd.nist.gov/vuln/detail/CVE-2024-43914), [CVE-2024-44935](https://nvd.nist.gov/vuln/detail/CVE-2024-44935), [CVE-2024-44934](https://nvd.nist.gov/vuln/detail/CVE-2024-44934), [CVE-2024-43909](https://nvd.nist.gov/vuln/detail/CVE-2024-43909), [CVE-2024-43902](https://nvd.nist.gov/vuln/detail/CVE-2024-43902), [CVE-2024-43907](https://nvd.nist.gov/vuln/detail/CVE-2024-43907), [CVE-2024-43894](https://nvd.nist.gov/vuln/detail/CVE-2024-43894), [CVE-2024-43893](https://nvd.nist.gov/vuln/detail/CVE-2024-43893), [CVE-2024-43890](https://nvd.nist.gov/vuln/detail/CVE-2024-43890), [CVE-2024-43889](https://nvd.nist.gov/vuln/detail/CVE-2024-43889), [CVE-2024-43883](https://nvd.nist.gov/vuln/detail/CVE-2024-43883), [CVE-2024-43882](https://nvd.nist.gov/vuln/detail/CVE-2024-43882), [CVE-2024-43875](https://nvd.nist.gov/vuln/detail/CVE-2024-43875), [CVE-2024-43873](https://nvd.nist.gov/vuln/detail/CVE-2024-43873), [CVE-2024-43871](https://nvd.nist.gov/vuln/detail/CVE-2024-43871), [CVE-2024-43880](https://nvd.nist.gov/vuln/detail/CVE-2024-43880), [CVE-2024-43879](https://nvd.nist.gov/vuln/detail/CVE-2024-43879), [CVE-2024-43869](https://nvd.nist.gov/vuln/detail/CVE-2024-43869), [CVE-2024-43870](https://nvd.nist.gov/vuln/detail/CVE-2024-43870), [CVE-2024-43867](https://nvd.nist.gov/vuln/detail/CVE-2024-43867), [CVE-2024-43863](https://nvd.nist.gov/vuln/detail/CVE-2024-43863), [CVE-2024-43861](https://nvd.nist.gov/vuln/detail/CVE-2024-43861), [CVE-2023-52918](https://nvd.nist.gov/vuln/detail/CVE-2023-52918), [CVE-2024-46707](https://nvd.nist.gov/vuln/detail/CVE-2024-46707), [CVE-2024-46702](https://nvd.nist.gov/vuln/detail/CVE-2024-46702), [CVE-2024-46679](https://nvd.nist.gov/vuln/detail/CVE-2024-46679), [CVE-2024-46677](https://nvd.nist.gov/vuln/detail/CVE-2024-46677), [CVE-2024-46676](https://nvd.nist.gov/vuln/detail/CVE-2024-46676), [CVE-2024-46675](https://nvd.nist.gov/vuln/detail/CVE-2024-46675), [CVE-2024-46689](https://nvd.nist.gov/vuln/detail/CVE-2024-46689), [CVE-2024-46685](https://nvd.nist.gov/vuln/detail/CVE-2024-46685), [CVE-2024-46673](https://nvd.nist.gov/vuln/detail/CVE-2024-46673), [CVE-2024-46674](https://nvd.nist.gov/vuln/detail/CVE-2024-46674), [CVE-2024-45026](https://nvd.nist.gov/vuln/detail/CVE-2024-45026), [CVE-2024-45028](https://nvd.nist.gov/vuln/detail/CVE-2024-45028), [CVE-2024-45018](https://nvd.nist.gov/vuln/detail/CVE-2024-45018), [CVE-2024-45016](https://nvd.nist.gov/vuln/detail/CVE-2024-45016), [CVE-2024-45011](https://nvd.nist.gov/vuln/detail/CVE-2024-45011), [CVE-2024-45025](https://nvd.nist.gov/vuln/detail/CVE-2024-45025), [CVE-2024-45021](https://nvd.nist.gov/vuln/detail/CVE-2024-45021), [CVE-2024-44999](https://nvd.nist.gov/vuln/detail/CVE-2024-44999), [CVE-2024-44998](https://nvd.nist.gov/vuln/detail/CVE-2024-44998), [CVE-2024-44995](https://nvd.nist.gov/vuln/detail/CVE-2024-44995), [CVE-2024-45008](https://nvd.nist.gov/vuln/detail/CVE-2024-45008), [CVE-2024-45007](https://nvd.nist.gov/vuln/detail/CVE-2024-45007), [CVE-2024-45006](https://nvd.nist.gov/vuln/detail/CVE-2024-45006), [CVE-2024-45003](https://nvd.nist.gov/vuln/detail/CVE-2024-45003), [CVE-2024-44983](https://nvd.nist.gov/vuln/detail/CVE-2024-44983), [CVE-2024-44982](https://nvd.nist.gov/vuln/detail/CVE-2024-44982), [CVE-2024-44990](https://nvd.nist.gov/vuln/detail/CVE-2024-44990), [CVE-2024-44989](https://nvd.nist.gov/vuln/detail/CVE-2024-44989), [CVE-2024-44988](https://nvd.nist.gov/vuln/detail/CVE-2024-44988), [CVE-2024-44987](https://nvd.nist.gov/vuln/detail/CVE-2024-44987), [CVE-2024-44986](https://nvd.nist.gov/vuln/detail/CVE-2024-44986), [CVE-2024-44985](https://nvd.nist.gov/vuln/detail/CVE-2024-44985), [CVE-2024-47669](https://nvd.nist.gov/vuln/detail/CVE-2024-47669), [CVE-2024-47668](https://nvd.nist.gov/vuln/detail/CVE-2024-47668), [CVE-2024-47667](https://nvd.nist.gov/vuln/detail/CVE-2024-47667), [CVE-2024-47665](https://nvd.nist.gov/vuln/detail/CVE-2024-47665), [CVE-2024-47663](https://nvd.nist.gov/vuln/detail/CVE-2024-47663), [CVE-2024-47660](https://nvd.nist.gov/vuln/detail/CVE-2024-47660), [CVE-2024-47659](https://nvd.nist.gov/vuln/detail/CVE-2024-47659), [CVE-2024-46840](https://nvd.nist.gov/vuln/detail/CVE-2024-46840), [CVE-2024-46839](https://nvd.nist.gov/vuln/detail/CVE-2024-46839), [CVE-2024-46844](https://nvd.nist.gov/vuln/detail/CVE-2024-46844), [CVE-2024-46832](https://nvd.nist.gov/vuln/detail/CVE-2024-46832), [CVE-2024-46829](https://nvd.nist.gov/vuln/detail/CVE-2024-46829), [CVE-2024-46828](https://nvd.nist.gov/vuln/detail/CVE-2024-46828), [CVE-2024-46822](https://nvd.nist.gov/vuln/detail/CVE-2024-46822), [CVE-2024-46810](https://nvd.nist.gov/vuln/detail/CVE-2024-46810), [CVE-2024-46807](https://nvd.nist.gov/vuln/detail/CVE-2024-46807), [CVE-2024-46805](https://nvd.nist.gov/vuln/detail/CVE-2024-46805), [CVE-2024-46804](https://nvd.nist.gov/vuln/detail/CVE-2024-46804), [CVE-2024-46819](https://nvd.nist.gov/vuln/detail/CVE-2024-46819), [CVE-2024-46818](https://nvd.nist.gov/vuln/detail/CVE-2024-46818), [CVE-2024-46817](https://nvd.nist.gov/vuln/detail/CVE-2024-46817), [CVE-2024-46815](https://nvd.nist.gov/vuln/detail/CVE-2024-46815), [CVE-2024-46814](https://nvd.nist.gov/vuln/detail/CVE-2024-46814), [CVE-2024-46795](https://nvd.nist.gov/vuln/detail/CVE-2024-46795), [CVE-2024-46791](https://nvd.nist.gov/vuln/detail/CVE-2024-46791), [CVE-2024-46800](https://nvd.nist.gov/vuln/detail/CVE-2024-46800), [CVE-2024-46798](https://nvd.nist.gov/vuln/detail/CVE-2024-46798), [CVE-2024-46763](https://nvd.nist.gov/vuln/detail/CVE-2024-46763), [CVE-2024-46783](https://nvd.nist.gov/vuln/detail/CVE-2024-46783), [CVE-2024-46782](https://nvd.nist.gov/vuln/detail/CVE-2024-46782), [CVE-2024-46781](https://nvd.nist.gov/vuln/detail/CVE-2024-46781), [CVE-2024-46780](https://nvd.nist.gov/vuln/detail/CVE-2024-46780), [CVE-2024-46777](https://nvd.nist.gov/vuln/detail/CVE-2024-46777), [CVE-2024-46771](https://nvd.nist.gov/vuln/detail/CVE-2024-46771), [CVE-2024-46761](https://nvd.nist.gov/vuln/detail/CVE-2024-46761), [CVE-2024-46743](https://nvd.nist.gov/vuln/detail/CVE-2024-46743), [CVE-2024-46740](https://nvd.nist.gov/vuln/detail/CVE-2024-46740), [CVE-2024-46739](https://nvd.nist.gov/vuln/detail/CVE-2024-46739), [CVE-2024-46738](https://nvd.nist.gov/vuln/detail/CVE-2024-46738), [CVE-2024-46737](https://nvd.nist.gov/vuln/detail/CVE-2024-46737), [CVE-2024-46759](https://nvd.nist.gov/vuln/detail/CVE-2024-46759), [CVE-2024-46758](https://nvd.nist.gov/vuln/detail/CVE-2024-46758), [CVE-2024-46757](https://nvd.nist.gov/vuln/detail/CVE-2024-46757), [CVE-2024-46756](https://nvd.nist.gov/vuln/detail/CVE-2024-46756), [CVE-2024-46755](https://nvd.nist.gov/vuln/detail/CVE-2024-46755), [CVE-2024-46752](https://nvd.nist.gov/vuln/detail/CVE-2024-46752), [CVE-2024-46750](https://nvd.nist.gov/vuln/detail/CVE-2024-46750), [CVE-2024-46747](https://nvd.nist.gov/vuln/detail/CVE-2024-46747), [CVE-2024-46746](https://nvd.nist.gov/vuln/detail/CVE-2024-46746), [CVE-2024-46745](https://nvd.nist.gov/vuln/detail/CVE-2024-46745), [CVE-2024-46744](https://nvd.nist.gov/vuln/detail/CVE-2024-46744), [CVE-2024-46734](https://nvd.nist.gov/vuln/detail/CVE-2024-46734), [CVE-2024-46724](https://nvd.nist.gov/vuln/detail/CVE-2024-46724), [CVE-2024-46732](https://nvd.nist.gov/vuln/detail/CVE-2024-46732), [CVE-2024-46731](https://nvd.nist.gov/vuln/detail/CVE-2024-46731), [CVE-2024-46725](https://nvd.nist.gov/vuln/detail/CVE-2024-46725), [CVE-2024-46723](https://nvd.nist.gov/vuln/detail/CVE-2024-46723), [CVE-2024-46722](https://nvd.nist.gov/vuln/detail/CVE-2024-46722), [CVE-2024-46721](https://nvd.nist.gov/vuln/detail/CVE-2024-46721), [CVE-2024-46719](https://nvd.nist.gov/vuln/detail/CVE-2024-46719), [CVE-2024-46714](https://nvd.nist.gov/vuln/detail/CVE-2024-46714), [CVE-2024-46713](https://nvd.nist.gov/vuln/detail/CVE-2024-46713), [CVE-2024-50191](https://nvd.nist.gov/vuln/detail/CVE-2024-50191), [CVE-2024-50189](https://nvd.nist.gov/vuln/detail/CVE-2024-50189), [CVE-2024-50188](https://nvd.nist.gov/vuln/detail/CVE-2024-50188), [CVE-2024-50186](https://nvd.nist.gov/vuln/detail/CVE-2024-50186), [CVE-2024-50184](https://nvd.nist.gov/vuln/detail/CVE-2024-50184), [CVE-2024-50180](https://nvd.nist.gov/vuln/detail/CVE-2024-50180), [CVE-2024-50181](https://nvd.nist.gov/vuln/detail/CVE-2024-50181), [CVE-2024-50179](https://nvd.nist.gov/vuln/detail/CVE-2024-50179), [CVE-2024-50096](https://nvd.nist.gov/vuln/detail/CVE-2024-50096), [CVE-2024-50095](https://nvd.nist.gov/vuln/detail/CVE-2024-50095), [CVE-2024-50093](https://nvd.nist.gov/vuln/detail/CVE-2024-50093), [CVE-2024-50089](https://nvd.nist.gov/vuln/detail/CVE-2024-50089), [CVE-2024-50062](https://nvd.nist.gov/vuln/detail/CVE-2024-50062), [CVE-2024-50059](https://nvd.nist.gov/vuln/detail/CVE-2024-50059), [CVE-2024-50024](https://nvd.nist.gov/vuln/detail/CVE-2024-50024), [CVE-2024-50049](https://nvd.nist.gov/vuln/detail/CVE-2024-50049), [CVE-2024-50046](https://nvd.nist.gov/vuln/detail/CVE-2024-50046), [CVE-2024-50045](https://nvd.nist.gov/vuln/detail/CVE-2024-50045), [CVE-2024-50044](https://nvd.nist.gov/vuln/detail/CVE-2024-50044), [CVE-2024-50041](https://nvd.nist.gov/vuln/detail/CVE-2024-50041), [CVE-2024-50040](https://nvd.nist.gov/vuln/detail/CVE-2024-50040), [CVE-2024-50039](https://nvd.nist.gov/vuln/detail/CVE-2024-50039), [CVE-2024-50038](https://nvd.nist.gov/vuln/detail/CVE-2024-50038), [CVE-2024-50035](https://nvd.nist.gov/vuln/detail/CVE-2024-50035), [CVE-2024-50033](https://nvd.nist.gov/vuln/detail/CVE-2024-50033), [CVE-2024-50031](https://nvd.nist.gov/vuln/detail/CVE-2024-50031), [CVE-2024-50019](https://nvd.nist.gov/vuln/detail/CVE-2024-50019), [CVE-2024-50008](https://nvd.nist.gov/vuln/detail/CVE-2024-50008), [CVE-2024-50007](https://nvd.nist.gov/vuln/detail/CVE-2024-50007), [CVE-2024-50006](https://nvd.nist.gov/vuln/detail/CVE-2024-50006), [CVE-2024-50015](https://nvd.nist.gov/vuln/detail/CVE-2024-50015), [CVE-2024-50013](https://nvd.nist.gov/vuln/detail/CVE-2024-50013), [CVE-2024-50003](https://nvd.nist.gov/vuln/detail/CVE-2024-50003), [CVE-2024-50002](https://nvd.nist.gov/vuln/detail/CVE-2024-50002), [CVE-2024-50001](https://nvd.nist.gov/vuln/detail/CVE-2024-50001), [CVE-2024-50000](https://nvd.nist.gov/vuln/detail/CVE-2024-50000), [CVE-2024-49997](https://nvd.nist.gov/vuln/detail/CVE-2024-49997), [CVE-2024-49995](https://nvd.nist.gov/vuln/detail/CVE-2024-49995), [CVE-2024-49955](https://nvd.nist.gov/vuln/detail/CVE-2024-49955), [CVE-2024-49963](https://nvd.nist.gov/vuln/detail/CVE-2024-49963), [CVE-2024-49962](https://nvd.nist.gov/vuln/detail/CVE-2024-49962), [CVE-2024-49959](https://nvd.nist.gov/vuln/detail/CVE-2024-49959), [CVE-2024-49993](https://nvd.nist.gov/vuln/detail/CVE-2024-49993), [CVE-2024-49985](https://nvd.nist.gov/vuln/detail/CVE-2024-49985), [CVE-2024-49958](https://nvd.nist.gov/vuln/detail/CVE-2024-49958), [CVE-2024-49983](https://nvd.nist.gov/vuln/detail/CVE-2024-49983), [CVE-2024-49982](https://nvd.nist.gov/vuln/detail/CVE-2024-49982), [CVE-2024-49981](https://nvd.nist.gov/vuln/detail/CVE-2024-49981), [CVE-2024-49977](https://nvd.nist.gov/vuln/detail/CVE-2024-49977), [CVE-2024-49975](https://nvd.nist.gov/vuln/detail/CVE-2024-49975), [CVE-2024-49957](https://nvd.nist.gov/vuln/detail/CVE-2024-49957), [CVE-2024-49973](https://nvd.nist.gov/vuln/detail/CVE-2024-49973), [CVE-2024-49969](https://nvd.nist.gov/vuln/detail/CVE-2024-49969), [CVE-2024-49967](https://nvd.nist.gov/vuln/detail/CVE-2024-49967), [CVE-2024-49966](https://nvd.nist.gov/vuln/detail/CVE-2024-49966), [CVE-2024-49965](https://nvd.nist.gov/vuln/detail/CVE-2024-49965), [CVE-2024-49924](https://nvd.nist.gov/vuln/detail/CVE-2024-49924), [CVE-2024-49954](https://nvd.nist.gov/vuln/detail/CVE-2024-49954), [CVE-2024-49952](https://nvd.nist.gov/vuln/detail/CVE-2024-49952), [CVE-2024-49949](https://nvd.nist.gov/vuln/detail/CVE-2024-49949), [CVE-2024-49948](https://nvd.nist.gov/vuln/detail/CVE-2024-49948), [CVE-2024-49946](https://nvd.nist.gov/vuln/detail/CVE-2024-49946), [CVE-2024-49944](https://nvd.nist.gov/vuln/detail/CVE-2024-49944), [CVE-2024-49938](https://nvd.nist.gov/vuln/detail/CVE-2024-49938), [CVE-2024-49936](https://nvd.nist.gov/vuln/detail/CVE-2024-49936), [CVE-2024-49935](https://nvd.nist.gov/vuln/detail/CVE-2024-49935), [CVE-2024-49933](https://nvd.nist.gov/vuln/detail/CVE-2024-49933), [CVE-2024-49930](https://nvd.nist.gov/vuln/detail/CVE-2024-49930), [CVE-2024-49927](https://nvd.nist.gov/vuln/detail/CVE-2024-49927), [CVE-2024-49875](https://nvd.nist.gov/vuln/detail/CVE-2024-49875), [CVE-2024-49884](https://nvd.nist.gov/vuln/detail/CVE-2024-49884), [CVE-2024-49883](https://nvd.nist.gov/vuln/detail/CVE-2024-49883), [CVE-2024-49882](https://nvd.nist.gov/vuln/detail/CVE-2024-49882), [CVE-2024-49881](https://nvd.nist.gov/vuln/detail/CVE-2024-49881), [CVE-2024-49879](https://nvd.nist.gov/vuln/detail/CVE-2024-49879), [CVE-2024-49913](https://nvd.nist.gov/vuln/detail/CVE-2024-49913), [CVE-2024-49907](https://nvd.nist.gov/vuln/detail/CVE-2024-49907), [CVE-2024-49878](https://nvd.nist.gov/vuln/detail/CVE-2024-49878), [CVE-2024-49903](https://nvd.nist.gov/vuln/detail/CVE-2024-49903), [CVE-2024-49902](https://nvd.nist.gov/vuln/detail/CVE-2024-49902), [CVE-2024-49900](https://nvd.nist.gov/vuln/detail/CVE-2024-49900), [CVE-2024-49896](https://nvd.nist.gov/vuln/detail/CVE-2024-49896), [CVE-2024-49895](https://nvd.nist.gov/vuln/detail/CVE-2024-49895), [CVE-2024-49877](https://nvd.nist.gov/vuln/detail/CVE-2024-49877), [CVE-2024-49894](https://nvd.nist.gov/vuln/detail/CVE-2024-49894), [CVE-2024-49892](https://nvd.nist.gov/vuln/detail/CVE-2024-49892), [CVE-2024-49890](https://nvd.nist.gov/vuln/detail/CVE-2024-49890), [CVE-2024-49889](https://nvd.nist.gov/vuln/detail/CVE-2024-49889), [CVE-2024-49886](https://nvd.nist.gov/vuln/detail/CVE-2024-49886), [CVE-2024-49863](https://nvd.nist.gov/vuln/detail/CVE-2024-49863), [CVE-2024-49871](https://nvd.nist.gov/vuln/detail/CVE-2024-49871), [CVE-2024-49868](https://nvd.nist.gov/vuln/detail/CVE-2024-49868), [CVE-2024-49867](https://nvd.nist.gov/vuln/detail/CVE-2024-49867), [CVE-2024-49866](https://nvd.nist.gov/vuln/detail/CVE-2024-49866), [CVE-2024-49860](https://nvd.nist.gov/vuln/detail/CVE-2024-49860), [CVE-2024-49858](https://nvd.nist.gov/vuln/detail/CVE-2024-49858), [CVE-2024-49856](https://nvd.nist.gov/vuln/detail/CVE-2024-49856), [CVE-2024-49852](https://nvd.nist.gov/vuln/detail/CVE-2024-49852), [CVE-2024-49851](https://nvd.nist.gov/vuln/detail/CVE-2024-49851), [CVE-2024-47735](https://nvd.nist.gov/vuln/detail/CVE-2024-47735), [CVE-2024-47734](https://nvd.nist.gov/vuln/detail/CVE-2024-47734), [CVE-2024-47757](https://nvd.nist.gov/vuln/detail/CVE-2024-47757), [CVE-2024-47756](https://nvd.nist.gov/vuln/detail/CVE-2024-47756), [CVE-2024-47749](https://nvd.nist.gov/vuln/detail/CVE-2024-47749), [CVE-2024-47748](https://nvd.nist.gov/vuln/detail/CVE-2024-47748), [CVE-2024-47747](https://nvd.nist.gov/vuln/detail/CVE-2024-47747), [CVE-2024-47742](https://nvd.nist.gov/vuln/detail/CVE-2024-47742), [CVE-2024-47740](https://nvd.nist.gov/vuln/detail/CVE-2024-47740), [CVE-2024-47739](https://nvd.nist.gov/vuln/detail/CVE-2024-47739), [CVE-2024-47737](https://nvd.nist.gov/vuln/detail/CVE-2024-47737), [CVE-2024-47723](https://nvd.nist.gov/vuln/detail/CVE-2024-47723), [CVE-2023-52917](https://nvd.nist.gov/vuln/detail/CVE-2023-52917), [CVE-2024-47722](https://nvd.nist.gov/vuln/detail/CVE-2024-47722), [CVE-2024-47712](https://nvd.nist.gov/vuln/detail/CVE-2024-47712), [CVE-2024-47710](https://nvd.nist.gov/vuln/detail/CVE-2024-47710), [CVE-2024-47709](https://nvd.nist.gov/vuln/detail/CVE-2024-47709), [CVE-2024-47706](https://nvd.nist.gov/vuln/detail/CVE-2024-47706), [CVE-2024-47705](https://nvd.nist.gov/vuln/detail/CVE-2024-47705), [CVE-2024-47720](https://nvd.nist.gov/vuln/detail/CVE-2024-47720), [CVE-2024-47718](https://nvd.nist.gov/vuln/detail/CVE-2024-47718), [CVE-2024-47713](https://nvd.nist.gov/vuln/detail/CVE-2024-47713), [CVE-2024-47684](https://nvd.nist.gov/vuln/detail/CVE-2024-47684), [CVE-2024-47679](https://nvd.nist.gov/vuln/detail/CVE-2024-47679), [CVE-2024-47701](https://nvd.nist.gov/vuln/detail/CVE-2024-47701), [CVE-2024-47699](https://nvd.nist.gov/vuln/detail/CVE-2024-47699), [CVE-2024-47698](https://nvd.nist.gov/vuln/detail/CVE-2024-47698), [CVE-2024-47697](https://nvd.nist.gov/vuln/detail/CVE-2024-47697), [CVE-2024-47696](https://nvd.nist.gov/vuln/detail/CVE-2024-47696), [CVE-2024-47695](https://nvd.nist.gov/vuln/detail/CVE-2024-47695), [CVE-2024-47693](https://nvd.nist.gov/vuln/detail/CVE-2024-47693), [CVE-2024-47692](https://nvd.nist.gov/vuln/detail/CVE-2024-47692), [CVE-2024-47690](https://nvd.nist.gov/vuln/detail/CVE-2024-47690), [CVE-2024-47685](https://nvd.nist.gov/vuln/detail/CVE-2024-47685), [CVE-2024-50201](https://nvd.nist.gov/vuln/detail/CVE-2024-50201), [CVE-2024-50202](https://nvd.nist.gov/vuln/detail/CVE-2024-50202), [CVE-2024-50185](https://nvd.nist.gov/vuln/detail/CVE-2024-50185), [CVE-2024-50182](https://nvd.nist.gov/vuln/detail/CVE-2024-50182), [CVE-2024-50101](https://nvd.nist.gov/vuln/detail/CVE-2024-50101), [CVE-2024-50099](https://nvd.nist.gov/vuln/detail/CVE-2024-50099), [CVE-2024-50085](https://nvd.nist.gov/vuln/detail/CVE-2024-50085), [CVE-2024-50083](https://nvd.nist.gov/vuln/detail/CVE-2024-50083), [CVE-2024-50082](https://nvd.nist.gov/vuln/detail/CVE-2024-50082), [CVE-2024-50074](https://nvd.nist.gov/vuln/detail/CVE-2024-50074), [CVE-2024-50210](https://nvd.nist.gov/vuln/detail/CVE-2024-50210), [CVE-2024-50209](https://nvd.nist.gov/vuln/detail/CVE-2024-50209), [CVE-2024-50208](https://nvd.nist.gov/vuln/detail/CVE-2024-50208), [CVE-2024-50205](https://nvd.nist.gov/vuln/detail/CVE-2024-50205), [CVE-2024-50163](https://nvd.nist.gov/vuln/detail/CVE-2024-50163), [CVE-2024-50162](https://nvd.nist.gov/vuln/detail/CVE-2024-50162), [CVE-2024-50160](https://nvd.nist.gov/vuln/detail/CVE-2024-50160), [CVE-2024-50171](https://nvd.nist.gov/vuln/detail/CVE-2024-50171), [CVE-2024-50168](https://nvd.nist.gov/vuln/detail/CVE-2024-50168), [CVE-2024-50167](https://nvd.nist.gov/vuln/detail/CVE-2024-50167), [CVE-2024-50156](https://nvd.nist.gov/vuln/detail/CVE-2024-50156), [CVE-2024-50148](https://nvd.nist.gov/vuln/detail/CVE-2024-50148), [CVE-2024-50143](https://nvd.nist.gov/vuln/detail/CVE-2024-50143), [CVE-2024-50142](https://nvd.nist.gov/vuln/detail/CVE-2024-50142), [CVE-2024-50154](https://nvd.nist.gov/vuln/detail/CVE-2024-50154), [CVE-2024-50153](https://nvd.nist.gov/vuln/detail/CVE-2024-50153), [CVE-2024-50151](https://nvd.nist.gov/vuln/detail/CVE-2024-50151), [CVE-2024-50150](https://nvd.nist.gov/vuln/detail/CVE-2024-50150), [CVE-2024-50128](https://nvd.nist.gov/vuln/detail/CVE-2024-50128), [CVE-2024-50134](https://nvd.nist.gov/vuln/detail/CVE-2024-50134), [CVE-2024-50131](https://nvd.nist.gov/vuln/detail/CVE-2024-50131), [CVE-2024-50110](https://nvd.nist.gov/vuln/detail/CVE-2024-50110), [CVE-2024-50127](https://nvd.nist.gov/vuln/detail/CVE-2024-50127), [CVE-2024-50117](https://nvd.nist.gov/vuln/detail/CVE-2024-50117), [CVE-2024-50116](https://nvd.nist.gov/vuln/detail/CVE-2024-50116), [CVE-2024-50115](https://nvd.nist.gov/vuln/detail/CVE-2024-50115), [CVE-2024-50103](https://nvd.nist.gov/vuln/detail/CVE-2024-50103), [CVE-2024-53042](https://nvd.nist.gov/vuln/detail/CVE-2024-53042), [CVE-2024-53059](https://nvd.nist.gov/vuln/detail/CVE-2024-53059), [CVE-2024-53057](https://nvd.nist.gov/vuln/detail/CVE-2024-53057), [CVE-2024-53058](https://nvd.nist.gov/vuln/detail/CVE-2024-53058), [CVE-2024-53055](https://nvd.nist.gov/vuln/detail/CVE-2024-53055), [CVE-2024-50262](https://nvd.nist.gov/vuln/detail/CVE-2024-50262), [CVE-2024-50259](https://nvd.nist.gov/vuln/detail/CVE-2024-50259), [CVE-2024-50234](https://nvd.nist.gov/vuln/detail/CVE-2024-50234), [CVE-2024-50233](https://nvd.nist.gov/vuln/detail/CVE-2024-50233), [CVE-2024-50232](https://nvd.nist.gov/vuln/detail/CVE-2024-50232), [CVE-2024-50230](https://nvd.nist.gov/vuln/detail/CVE-2024-50230), [CVE-2024-50257](https://nvd.nist.gov/vuln/detail/CVE-2024-50257), [CVE-2024-50229](https://nvd.nist.gov/vuln/detail/CVE-2024-50229), [CVE-2024-50251](https://nvd.nist.gov/vuln/detail/CVE-2024-50251), [CVE-2024-50249](https://nvd.nist.gov/vuln/detail/CVE-2024-50249), [CVE-2024-50247](https://nvd.nist.gov/vuln/detail/CVE-2024-50247), [CVE-2024-50228](https://nvd.nist.gov/vuln/detail/CVE-2024-50228), [CVE-2024-50245](https://nvd.nist.gov/vuln/detail/CVE-2024-50245), [CVE-2024-50244](https://nvd.nist.gov/vuln/detail/CVE-2024-50244), [CVE-2024-50237](https://nvd.nist.gov/vuln/detail/CVE-2024-50237), [CVE-2024-50236](https://nvd.nist.gov/vuln/detail/CVE-2024-50236), [CVE-2024-50219](https://nvd.nist.gov/vuln/detail/CVE-2024-50219), [CVE-2024-50218](https://nvd.nist.gov/vuln/detail/CVE-2024-50218), [CVE-2024-53103](https://nvd.nist.gov/vuln/detail/CVE-2024-53103), [CVE-2024-53104](https://nvd.nist.gov/vuln/detail/CVE-2024-53104), [CVE-2024-53088](https://nvd.nist.gov/vuln/detail/CVE-2024-53088), [CVE-2024-53060](https://nvd.nist.gov/vuln/detail/CVE-2024-53060), [CVE-2024-53066](https://nvd.nist.gov/vuln/detail/CVE-2024-53066), [CVE-2024-53063](https://nvd.nist.gov/vuln/detail/CVE-2024-53063), [CVE-2024-53070](https://nvd.nist.gov/vuln/detail/CVE-2024-53070), [CVE-2024-53061](https://nvd.nist.gov/vuln/detail/CVE-2024-53061), [CVE-2024-53052](https://nvd.nist.gov/vuln/detail/CVE-2024-53052), [CVE-2024-50302](https://nvd.nist.gov/vuln/detail/CVE-2024-50302), [CVE-2024-50301](https://nvd.nist.gov/vuln/detail/CVE-2024-50301), [CVE-2024-50296](https://nvd.nist.gov/vuln/detail/CVE-2024-50296), [CVE-2024-50295](https://nvd.nist.gov/vuln/detail/CVE-2024-50295), [CVE-2024-50292](https://nvd.nist.gov/vuln/detail/CVE-2024-50292), [CVE-2024-50290](https://nvd.nist.gov/vuln/detail/CVE-2024-50290), [CVE-2024-50299](https://nvd.nist.gov/vuln/detail/CVE-2024-50299), [CVE-2024-50282](https://nvd.nist.gov/vuln/detail/CVE-2024-50282), [CVE-2024-50279](https://nvd.nist.gov/vuln/detail/CVE-2024-50279), [CVE-2024-50278](https://nvd.nist.gov/vuln/detail/CVE-2024-50278), [CVE-2024-50287](https://nvd.nist.gov/vuln/detail/CVE-2024-50287), [CVE-2024-50273](https://nvd.nist.gov/vuln/detail/CVE-2024-50273), [CVE-2024-50269](https://nvd.nist.gov/vuln/detail/CVE-2024-50269), [CVE-2024-50268](https://nvd.nist.gov/vuln/detail/CVE-2024-50268), [CVE-2024-50267](https://nvd.nist.gov/vuln/detail/CVE-2024-50267), [CVE-2024-50264](https://nvd.nist.gov/vuln/detail/CVE-2024-50264), [CVE-2024-50265](https://nvd.nist.gov/vuln/detail/CVE-2024-50265), [CVE-2024-53101](https://nvd.nist.gov/vuln/detail/CVE-2024-53101), [CVE-2024-53097](https://nvd.nist.gov/vuln/detail/CVE-2024-53097))\n- OpenSSL ([CVE-2024-2511](https://nvd.nist.gov/vuln/detail/CVE-2024-2511), [CVE-2024-4603](https://nvd.nist.gov/vuln/detail/CVE-2024-4603), [CVE-2024-4741](https://nvd.nist.gov/vuln/detail/CVE-2024-4741), [CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535), [CVE-2024-6119](https://nvd.nist.gov/vuln/detail/CVE-2024-6119), [CVE-2024-9143](https://nvd.nist.gov/vuln/detail/CVE-2024-9143))\n\n#### Bug fixes:\n\n- Equinix Metal: fixed race condition on 'mount' Ignition stage ([scripts#2308](https://github.com/flatcar/scripts/pull/2308))\n\n#### Updates:\n\n- Linux ([5.15.173](https://lwn.net/Articles/998452) (includes [5.15.172](https://lwn.net/Articles/998152), [5.15.171](https://lwn.net/Articles/997530), [5.15.170](https://lwn.net/Articles/996691), [5.15.169](https://lwn.net/Articles/995134), [5.15.168](https://lwn.net/Articles/994636), [5.15.167](https://lwn.net/Articles/990047), [5.15.166](https://lwn.net/Articles/988751), [5.15.165](https://lwn.net/Articles/986233), [5.15.164](https://lwn.net/Articles/983657), [5.15.163](https://lwn.net/Articles/982384), [5.15.162](https://lwn.net/Articles/980862)))\n- OpenSSL ([3.0.15](https://github.com/openssl/openssl/blob/openssl-3.0/CHANGES.md#openssl-30))\n- ca-certificates ([3.107](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html) (includes [3.106](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html), [3.105](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html), [3.104](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_104.html), [3.103](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_103.html), [3.102](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102.html), [3.102.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102_1.html), [3.101.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101_1.html)))"
  },
  "3510.3.7": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-03-20 14:08:13 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.179"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **LTS 3510.3.6**_\n \n #### Security fixes:\n \n - Linux ([CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57838](https://nvd.nist.gov/vuln/detail/CVE-2024-57838), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56780](https://nvd.nist.gov/vuln/detail/CVE-2024-56780), [CVE-2024-56779](https://nvd.nist.gov/vuln/detail/CVE-2024-56779), [CVE-2024-56778](https://nvd.nist.gov/vuln/detail/CVE-2024-56778), [CVE-2024-56777](https://nvd.nist.gov/vuln/detail/CVE-2024-56777), [CVE-2024-56776](https://nvd.nist.gov/vuln/detail/CVE-2024-56776), [CVE-2024-56774](https://nvd.nist.gov/vuln/detail/CVE-2024-56774), [CVE-2024-56754](https://nvd.nist.gov/vuln/detail/CVE-2024-56754), [CVE-2024-56756](https://nvd.nist.gov/vuln/detail/CVE-2024-56756), [CVE-2024-56728](https://nvd.nist.gov/vuln/detail/CVE-2024-56728), [CVE-2024-56726](https://nvd.nist.gov/vuln/detail/CVE-2024-56726), [CVE-2024-56724](https://nvd.nist.gov/vuln/detail/CVE-2024-56724), [CVE-2024-56723](https://nvd.nist.gov/vuln/detail/CVE-2024-56723), [CVE-2024-56748](https://nvd.nist.gov/vuln/detail/CVE-2024-56748), [CVE-2024-56747](https://nvd.nist.gov/vuln/detail/CVE-2024-56747), [CVE-2024-56746](https://nvd.nist.gov/vuln/detail/CVE-2024-56746), [CVE-2024-56745](https://nvd.nist.gov/vuln/detail/CVE-2024-56745), [CVE-2024-56741](https://nvd.nist.gov/vuln/detail/CVE-2024-56741), [CVE-2024-56739](https://nvd.nist.gov/vuln/detail/CVE-2024-56739), [CVE-2024-56720](https://nvd.nist.gov/vuln/detail/CVE-2024-56720), [CVE-2024-56694](https://nvd.nist.gov/vuln/detail/CVE-2024-56694), [CVE-2024-56701](https://nvd.nist.gov/vuln/detail/CVE-2024-56701), [CVE-2024-56700](https://nvd.nist.gov/vuln/detail/CVE-2024-56700), [CVE-2024-56698](https://nvd.nist.gov/vuln/detail/CVE-2024-56698), [CVE-2024-56708](https://nvd.nist.gov/vuln/detail/CVE-2024-56708), [CVE-2024-56705](https://nvd.nist.gov/vuln/detail/CVE-2024-56705), [CVE-2024-56704](https://nvd.nist.gov/vuln/detail/CVE-2024-56704), [CVE-2024-56681](https://nvd.nist.gov/vuln/detail/CVE-2024-56681), [CVE-2024-56679](https://nvd.nist.gov/vuln/detail/CVE-2024-56679), [CVE-2024-56678](https://nvd.nist.gov/vuln/detail/CVE-2024-56678), [CVE-2024-56693](https://nvd.nist.gov/vuln/detail/CVE-2024-56693), [CVE-2024-56691](https://nvd.nist.gov/vuln/detail/CVE-2024-56691), [CVE-2024-56690](https://nvd.nist.gov/vuln/detail/CVE-2024-56690), [CVE-2024-56688](https://nvd.nist.gov/vuln/detail/CVE-2024-56688), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56562](https://nvd.nist.gov/vuln/detail/CVE-2024-56562), [CVE-2024-56581](https://nvd.nist.gov/vuln/detail/CVE-2024-56581), [CVE-2024-56578](https://nvd.nist.gov/vuln/detail/CVE-2024-56578), [CVE-2024-56576](https://nvd.nist.gov/vuln/detail/CVE-2024-56576), [CVE-2024-56558](https://nvd.nist.gov/vuln/detail/CVE-2024-56558), [CVE-2024-56575](https://nvd.nist.gov/vuln/detail/CVE-2024-56575), [CVE-2024-56574](https://nvd.nist.gov/vuln/detail/CVE-2024-56574), [CVE-2024-56572](https://nvd.nist.gov/vuln/detail/CVE-2024-56572), [CVE-2024-56571](https://nvd.nist.gov/vuln/detail/CVE-2024-56571), [CVE-2024-56570](https://nvd.nist.gov/vuln/detail/CVE-2024-56570), [CVE-2024-56569](https://nvd.nist.gov/vuln/detail/CVE-2024-56569), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-56567](https://nvd.nist.gov/vuln/detail/CVE-2024-56567), [CVE-2024-56539](https://nvd.nist.gov/vuln/detail/CVE-2024-56539), [CVE-2024-56533](https://nvd.nist.gov/vuln/detail/CVE-2024-56533), [CVE-2024-56548](https://nvd.nist.gov/vuln/detail/CVE-2024-56548), [CVE-2024-56531](https://nvd.nist.gov/vuln/detail/CVE-2024-56531), [CVE-2024-56532](https://nvd.nist.gov/vuln/detail/CVE-2024-56532), [CVE-2024-53217](https://nvd.nist.gov/vuln/detail/CVE-2024-53217), [CVE-2024-53215](https://nvd.nist.gov/vuln/detail/CVE-2024-53215), [CVE-2024-53239](https://nvd.nist.gov/vuln/detail/CVE-2024-53239), [CVE-2024-53237](https://nvd.nist.gov/vuln/detail/CVE-2024-53237), [CVE-2024-53214](https://nvd.nist.gov/vuln/detail/CVE-2024-53214), [CVE-2024-53227](https://nvd.nist.gov/vuln/detail/CVE-2024-53227), [CVE-2024-53226](https://nvd.nist.gov/vuln/detail/CVE-2024-53226), [CVE-2024-53180](https://nvd.nist.gov/vuln/detail/CVE-2024-53180), [CVE-2024-53184](https://nvd.nist.gov/vuln/detail/CVE-2024-53184), [CVE-2024-53183](https://nvd.nist.gov/vuln/detail/CVE-2024-53183), [CVE-2024-53206](https://nvd.nist.gov/vuln/detail/CVE-2024-53206), [CVE-2024-53198](https://nvd.nist.gov/vuln/detail/CVE-2024-53198), [CVE-2024-53197](https://nvd.nist.gov/vuln/detail/CVE-2024-53197), [CVE-2024-53194](https://nvd.nist.gov/vuln/detail/CVE-2024-53194), [CVE-2024-53181](https://nvd.nist.gov/vuln/detail/CVE-2024-53181), [CVE-2024-53173](https://nvd.nist.gov/vuln/detail/CVE-2024-53173), [CVE-2024-53172](https://nvd.nist.gov/vuln/detail/CVE-2024-53172), [CVE-2024-53171](https://nvd.nist.gov/vuln/detail/CVE-2024-53171), [CVE-2024-53174](https://nvd.nist.gov/vuln/detail/CVE-2024-53174), [CVE-2022-49034](https://nvd.nist.gov/vuln/detail/CVE-2022-49034), [CVE-2024-53165](https://nvd.nist.gov/vuln/detail/CVE-2024-53165), [CVE-2024-53151](https://nvd.nist.gov/vuln/detail/CVE-2024-53151), [CVE-2024-53150](https://nvd.nist.gov/vuln/detail/CVE-2024-53150), [CVE-2024-53148](https://nvd.nist.gov/vuln/detail/CVE-2024-53148), [CVE-2024-53161](https://nvd.nist.gov/vuln/detail/CVE-2024-53161), [CVE-2024-53158](https://nvd.nist.gov/vuln/detail/CVE-2024-53158), [CVE-2024-53157](https://nvd.nist.gov/vuln/detail/CVE-2024-53157), [CVE-2024-53156](https://nvd.nist.gov/vuln/detail/CVE-2024-53156), [CVE-2024-53155](https://nvd.nist.gov/vuln/detail/CVE-2024-53155), [CVE-2024-53145](https://nvd.nist.gov/vuln/detail/CVE-2024-53145), [CVE-2024-53146](https://nvd.nist.gov/vuln/detail/CVE-2024-53146), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087), [CVE-2024-57946](https://nvd.nist.gov/vuln/detail/CVE-2024-57946), [CVE-2024-57938](https://nvd.nist.gov/vuln/detail/CVE-2024-57938), [CVE-2024-57931](https://nvd.nist.gov/vuln/detail/CVE-2024-57931), [CVE-2024-57841](https://nvd.nist.gov/vuln/detail/CVE-2024-57841), [CVE-2024-57802](https://nvd.nist.gov/vuln/detail/CVE-2024-57802), [CVE-2024-54031](https://nvd.nist.gov/vuln/detail/CVE-2024-54031), [CVE-2024-36476](https://nvd.nist.gov/vuln/detail/CVE-2024-36476), [CVE-2024-57896](https://nvd.nist.gov/vuln/detail/CVE-2024-57896), [CVE-2024-57903](https://nvd.nist.gov/vuln/detail/CVE-2024-57903), [CVE-2024-57902](https://nvd.nist.gov/vuln/detail/CVE-2024-57902), [CVE-2024-57901](https://nvd.nist.gov/vuln/detail/CVE-2024-57901), [CVE-2024-57900](https://nvd.nist.gov/vuln/detail/CVE-2024-57900), [CVE-2024-57897](https://nvd.nist.gov/vuln/detail/CVE-2024-57897), [CVE-2024-57890](https://nvd.nist.gov/vuln/detail/CVE-2024-57890), [CVE-2024-57889](https://nvd.nist.gov/vuln/detail/CVE-2024-57889), [CVE-2024-57884](https://nvd.nist.gov/vuln/detail/CVE-2024-57884), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2025-21697](https://nvd.nist.gov/vuln/detail/CVE-2025-21697), [CVE-2024-57951](https://nvd.nist.gov/vuln/detail/CVE-2024-57951), [CVE-2025-21694](https://nvd.nist.gov/vuln/detail/CVE-2025-21694), [CVE-2025-21669](https://nvd.nist.gov/vuln/detail/CVE-2025-21669), [CVE-2025-21666](https://nvd.nist.gov/vuln/detail/CVE-2025-21666), [CVE-2025-21683](https://nvd.nist.gov/vuln/detail/CVE-2025-21683), [CVE-2025-21680](https://nvd.nist.gov/vuln/detail/CVE-2025-21680), [CVE-2025-21678](https://nvd.nist.gov/vuln/detail/CVE-2025-21678), [CVE-2024-57948](https://nvd.nist.gov/vuln/detail/CVE-2024-57948), [CVE-2025-21665](https://nvd.nist.gov/vuln/detail/CVE-2025-21665), [CVE-2025-21699](https://nvd.nist.gov/vuln/detail/CVE-2025-21699), [CVE-2025-21698](https://nvd.nist.gov/vuln/detail/CVE-2025-21698), [CVE-2025-21687](https://nvd.nist.gov/vuln/detail/CVE-2025-21687), [CVE-2025-21692](https://nvd.nist.gov/vuln/detail/CVE-2025-21692), [CVE-2025-21690](https://nvd.nist.gov/vuln/detail/CVE-2025-21690), [CVE-2025-21689](https://nvd.nist.gov/vuln/detail/CVE-2025-21689), [CVE-2025-21688](https://nvd.nist.gov/vuln/detail/CVE-2025-21688)\n\n \n #### Changes:\n \n - Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))\n \n #### Updates:\n \n- Linux ([5.15.179](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.179) (includes [5.15.174](https://lwn.net/Articles/1002179), [5.15.175](https://lwn.net/Articles/1002921), [5.15.176](https://lwn.net/Articles/1004553), [5.15.177](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.177), [5.15.178](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.178)))\n- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))"
  },
  "3510.3.8": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-08-19 13:11:03 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.189"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.7**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-48771](https://nvd.nist.gov/vuln/detail/CVE-2022-48771), [CVE-2025-37937](https://nvd.nist.gov/vuln/detail/CVE-2025-37937), [CVE-2025-37889](https://nvd.nist.gov/vuln/detail/CVE-2025-37889), [CVE-2025-38575](https://nvd.nist.gov/vuln/detail/CVE-2025-38575), [CVE-2025-38152](https://nvd.nist.gov/vuln/detail/CVE-2025-38152), [CVE-2025-39735](https://nvd.nist.gov/vuln/detail/CVE-2025-39735), [CVE-2025-39728](https://nvd.nist.gov/vuln/detail/CVE-2025-39728), [CVE-2025-38637](https://nvd.nist.gov/vuln/detail/CVE-2025-38637), [CVE-2025-37785](https://nvd.nist.gov/vuln/detail/CVE-2025-37785), [CVE-2025-23138](https://nvd.nist.gov/vuln/detail/CVE-2025-23138), [CVE-2025-23136](https://nvd.nist.gov/vuln/detail/CVE-2025-23136), [CVE-2025-22066](https://nvd.nist.gov/vuln/detail/CVE-2025-22066), [CVE-2025-22075](https://nvd.nist.gov/vuln/detail/CVE-2025-22075), [CVE-2025-22073](https://nvd.nist.gov/vuln/detail/CVE-2025-22073), [CVE-2025-22071](https://nvd.nist.gov/vuln/detail/CVE-2025-22071), [CVE-2025-22097](https://nvd.nist.gov/vuln/detail/CVE-2025-22097), [CVE-2025-22089](https://nvd.nist.gov/vuln/detail/CVE-2025-22089), [CVE-2025-22086](https://nvd.nist.gov/vuln/detail/CVE-2025-22086), [CVE-2025-22081](https://nvd.nist.gov/vuln/detail/CVE-2025-22081), [CVE-2025-22079](https://nvd.nist.gov/vuln/detail/CVE-2025-22079), [CVE-2025-22063](https://nvd.nist.gov/vuln/detail/CVE-2025-22063), [CVE-2025-22060](https://nvd.nist.gov/vuln/detail/CVE-2025-22060), [CVE-2025-22056](https://nvd.nist.gov/vuln/detail/CVE-2025-22056), [CVE-2025-22055](https://nvd.nist.gov/vuln/detail/CVE-2025-22055), [CVE-2025-22054](https://nvd.nist.gov/vuln/detail/CVE-2025-22054), [CVE-2025-22035](https://nvd.nist.gov/vuln/detail/CVE-2025-22035), [CVE-2025-22050](https://nvd.nist.gov/vuln/detail/CVE-2025-22050), [CVE-2025-22045](https://nvd.nist.gov/vuln/detail/CVE-2025-22045), [CVE-2025-22044](https://nvd.nist.gov/vuln/detail/CVE-2025-22044), [CVE-2025-22025](https://nvd.nist.gov/vuln/detail/CVE-2025-22025), [CVE-2023-53034](https://nvd.nist.gov/vuln/detail/CVE-2023-53034), [CVE-2025-22021](https://nvd.nist.gov/vuln/detail/CVE-2025-22021), [CVE-2025-22020](https://nvd.nist.gov/vuln/detail/CVE-2025-22020), [CVE-2025-22018](https://nvd.nist.gov/vuln/detail/CVE-2025-22018), [CVE-2025-37989](https://nvd.nist.gov/vuln/detail/CVE-2025-37989), [CVE-2025-37985](https://nvd.nist.gov/vuln/detail/CVE-2025-37985), [CVE-2025-37983](https://nvd.nist.gov/vuln/detail/CVE-2025-37983), [CVE-2025-37982](https://nvd.nist.gov/vuln/detail/CVE-2025-37982), [CVE-2025-37940](https://nvd.nist.gov/vuln/detail/CVE-2025-37940), [CVE-2025-37892](https://nvd.nist.gov/vuln/detail/CVE-2025-37892), [CVE-2025-37885](https://nvd.nist.gov/vuln/detail/CVE-2025-37885), [CVE-2025-37883](https://nvd.nist.gov/vuln/detail/CVE-2025-37883), [CVE-2025-37881](https://nvd.nist.gov/vuln/detail/CVE-2025-37881), [CVE-2025-37871](https://nvd.nist.gov/vuln/detail/CVE-2025-37871), [CVE-2025-37867](https://nvd.nist.gov/vuln/detail/CVE-2025-37867), [CVE-2025-37875](https://nvd.nist.gov/vuln/detail/CVE-2025-37875), [CVE-2025-37844](https://nvd.nist.gov/vuln/detail/CVE-2025-37844), [CVE-2025-37841](https://nvd.nist.gov/vuln/detail/CVE-2025-37841), [CVE-2025-37840](https://nvd.nist.gov/vuln/detail/CVE-2025-37840), [CVE-2025-37862](https://nvd.nist.gov/vuln/detail/CVE-2025-37862), [CVE-2025-37859](https://nvd.nist.gov/vuln/detail/CVE-2025-37859), [CVE-2025-37858](https://nvd.nist.gov/vuln/detail/CVE-2025-37858), [CVE-2025-37857](https://nvd.nist.gov/vuln/detail/CVE-2025-37857), [CVE-2025-37839](https://nvd.nist.gov/vuln/detail/CVE-2025-37839), [CVE-2025-37851](https://nvd.nist.gov/vuln/detail/CVE-2025-37851), [CVE-2025-37850](https://nvd.nist.gov/vuln/detail/CVE-2025-37850), [CVE-2025-37836](https://nvd.nist.gov/vuln/detail/CVE-2025-37836), [CVE-2025-37823](https://nvd.nist.gov/vuln/detail/CVE-2025-37823), [CVE-2025-37830](https://nvd.nist.gov/vuln/detail/CVE-2025-37830), [CVE-2025-37829](https://nvd.nist.gov/vuln/detail/CVE-2025-37829), [CVE-2025-37824](https://nvd.nist.gov/vuln/detail/CVE-2025-37824), [CVE-2025-37808](https://nvd.nist.gov/vuln/detail/CVE-2025-37808), [CVE-2025-37805](https://nvd.nist.gov/vuln/detail/CVE-2025-37805), [CVE-2025-37803](https://nvd.nist.gov/vuln/detail/CVE-2025-37803), [CVE-2025-37817](https://nvd.nist.gov/vuln/detail/CVE-2025-37817), [CVE-2025-37812](https://nvd.nist.gov/vuln/detail/CVE-2025-37812), [CVE-2025-37811](https://nvd.nist.gov/vuln/detail/CVE-2025-37811), [CVE-2025-37810](https://nvd.nist.gov/vuln/detail/CVE-2025-37810), [CVE-2025-37797](https://nvd.nist.gov/vuln/detail/CVE-2025-37797), [CVE-2025-37990](https://nvd.nist.gov/vuln/detail/CVE-2025-37990), [CVE-2025-37991](https://nvd.nist.gov/vuln/detail/CVE-2025-37991), [CVE-2025-37927](https://nvd.nist.gov/vuln/detail/CVE-2025-37927), [CVE-2025-37923](https://nvd.nist.gov/vuln/detail/CVE-2025-37923), [CVE-2025-37930](https://nvd.nist.gov/vuln/detail/CVE-2025-37930), [CVE-2025-37929](https://nvd.nist.gov/vuln/detail/CVE-2025-37929), [CVE-2025-37915](https://nvd.nist.gov/vuln/detail/CVE-2025-37915), [CVE-2025-37914](https://nvd.nist.gov/vuln/detail/CVE-2025-37914), [CVE-2025-37913](https://nvd.nist.gov/vuln/detail/CVE-2025-37913), [CVE-2025-37912](https://nvd.nist.gov/vuln/detail/CVE-2025-37912), [CVE-2025-37911](https://nvd.nist.gov/vuln/detail/CVE-2025-37911), [CVE-2025-37909](https://nvd.nist.gov/vuln/detail/CVE-2025-37909), [CVE-2025-37905](https://nvd.nist.gov/vuln/detail/CVE-2025-37905), [CVE-2025-37890](https://nvd.nist.gov/vuln/detail/CVE-2025-37890), [CVE-2025-37998](https://nvd.nist.gov/vuln/detail/CVE-2025-37998), [CVE-2025-37997](https://nvd.nist.gov/vuln/detail/CVE-2025-37997), [CVE-2025-37995](https://nvd.nist.gov/vuln/detail/CVE-2025-37995), [CVE-2025-37994](https://nvd.nist.gov/vuln/detail/CVE-2025-37994), [CVE-2025-37970](https://nvd.nist.gov/vuln/detail/CVE-2025-37970), [CVE-2025-37969](https://nvd.nist.gov/vuln/detail/CVE-2025-37969), [CVE-2025-37964](https://nvd.nist.gov/vuln/detail/CVE-2025-37964), [CVE-2025-37949](https://nvd.nist.gov/vuln/detail/CVE-2025-37949), [CVE-2025-38094](https://nvd.nist.gov/vuln/detail/CVE-2025-38094), [CVE-2025-38009](https://nvd.nist.gov/vuln/detail/CVE-2025-38009), [CVE-2025-38024](https://nvd.nist.gov/vuln/detail/CVE-2025-38024), [CVE-2025-38023](https://nvd.nist.gov/vuln/detail/CVE-2025-38023), [CVE-2025-38005](https://nvd.nist.gov/vuln/detail/CVE-2025-38005), [CVE-2025-37992](https://nvd.nist.gov/vuln/detail/CVE-2025-37992), [CVE-2025-38052](https://nvd.nist.gov/vuln/detail/CVE-2025-38052), [CVE-2025-38061](https://nvd.nist.gov/vuln/detail/CVE-2025-38061), [CVE-2025-38058](https://nvd.nist.gov/vuln/detail/CVE-2025-38058), [CVE-2025-38079](https://nvd.nist.gov/vuln/detail/CVE-2025-38079), [CVE-2025-38078](https://nvd.nist.gov/vuln/detail/CVE-2025-38078), [CVE-2025-38077](https://nvd.nist.gov/vuln/detail/CVE-2025-38077), [CVE-2025-38075](https://nvd.nist.gov/vuln/detail/CVE-2025-38075), [CVE-2025-38072](https://nvd.nist.gov/vuln/detail/CVE-2025-38072), [CVE-2025-38068](https://nvd.nist.gov/vuln/detail/CVE-2025-38068), [CVE-2025-38066](https://nvd.nist.gov/vuln/detail/CVE-2025-38066), [CVE-2025-38065](https://nvd.nist.gov/vuln/detail/CVE-2025-38065), [CVE-2025-38037](https://nvd.nist.gov/vuln/detail/CVE-2025-38037), [CVE-2025-38035](https://nvd.nist.gov/vuln/detail/CVE-2025-38035), [CVE-2025-38034](https://nvd.nist.gov/vuln/detail/CVE-2025-38034), [CVE-2025-38051](https://nvd.nist.gov/vuln/detail/CVE-2025-38051), [CVE-2025-38031](https://nvd.nist.gov/vuln/detail/CVE-2025-38031), [CVE-2025-38048](https://nvd.nist.gov/vuln/detail/CVE-2025-38048), [CVE-2025-38046](https://nvd.nist.gov/vuln/detail/CVE-2025-38046), [CVE-2025-38044](https://nvd.nist.gov/vuln/detail/CVE-2025-38044), [CVE-2025-38043](https://nvd.nist.gov/vuln/detail/CVE-2025-38043), [CVE-2025-38030](https://nvd.nist.gov/vuln/detail/CVE-2025-38030), [CVE-2025-38003](https://nvd.nist.gov/vuln/detail/CVE-2025-38003), [CVE-2025-38004](https://nvd.nist.gov/vuln/detail/CVE-2025-38004), [CVE-2025-38001](https://nvd.nist.gov/vuln/detail/CVE-2025-38001), [CVE-2025-38000](https://nvd.nist.gov/vuln/detail/CVE-2025-38000), [CVE-2025-38498](https://nvd.nist.gov/vuln/detail/CVE-2025-38498), [CVE-2025-38428](https://nvd.nist.gov/vuln/detail/CVE-2025-38428), [CVE-2025-38424](https://nvd.nist.gov/vuln/detail/CVE-2025-38424), [CVE-2025-38430](https://nvd.nist.gov/vuln/detail/CVE-2025-38430), [CVE-2025-38420](https://nvd.nist.gov/vuln/detail/CVE-2025-38420), [CVE-2025-38419](https://nvd.nist.gov/vuln/detail/CVE-2025-38419), [CVE-2025-38418](https://nvd.nist.gov/vuln/detail/CVE-2025-38418), [CVE-2025-38416](https://nvd.nist.gov/vuln/detail/CVE-2025-38416), [CVE-2025-38415](https://nvd.nist.gov/vuln/detail/CVE-2025-38415), [CVE-2025-38352](https://nvd.nist.gov/vuln/detail/CVE-2025-38352), [CVE-2025-38346](https://nvd.nist.gov/vuln/detail/CVE-2025-38346), [CVE-2025-38348](https://nvd.nist.gov/vuln/detail/CVE-2025-38348), [CVE-2025-38328](https://nvd.nist.gov/vuln/detail/CVE-2025-38328), [CVE-2025-38326](https://nvd.nist.gov/vuln/detail/CVE-2025-38326), [CVE-2025-38324](https://nvd.nist.gov/vuln/detail/CVE-2025-38324), [CVE-2025-38323](https://nvd.nist.gov/vuln/detail/CVE-2025-38323), [CVE-2025-38345](https://nvd.nist.gov/vuln/detail/CVE-2025-38345), [CVE-2025-38344](https://nvd.nist.gov/vuln/detail/CVE-2025-38344), [CVE-2025-38342](https://nvd.nist.gov/vuln/detail/CVE-2025-38342), [CVE-2025-38337](https://nvd.nist.gov/vuln/detail/CVE-2025-38337), [CVE-2025-38336](https://nvd.nist.gov/vuln/detail/CVE-2025-38336), [CVE-2025-38332](https://nvd.nist.gov/vuln/detail/CVE-2025-38332), [CVE-2025-38320](https://nvd.nist.gov/vuln/detail/CVE-2025-38320), [CVE-2025-38313](https://nvd.nist.gov/vuln/detail/CVE-2025-38313), [CVE-2025-38312](https://nvd.nist.gov/vuln/detail/CVE-2025-38312), [CVE-2025-38310](https://nvd.nist.gov/vuln/detail/CVE-2025-38310), [CVE-2025-38319](https://nvd.nist.gov/vuln/detail/CVE-2025-38319), [CVE-2025-38273](https://nvd.nist.gov/vuln/detail/CVE-2025-38273), [CVE-2025-38305](https://nvd.nist.gov/vuln/detail/CVE-2025-38305), [CVE-2025-38298](https://nvd.nist.gov/vuln/detail/CVE-2025-38298), [CVE-2025-38293](https://nvd.nist.gov/vuln/detail/CVE-2025-38293), [CVE-2025-38286](https://nvd.nist.gov/vuln/detail/CVE-2025-38286), [CVE-2025-38285](https://nvd.nist.gov/vuln/detail/CVE-2025-38285), [CVE-2025-38280](https://nvd.nist.gov/vuln/detail/CVE-2025-38280), [CVE-2025-38237](https://nvd.nist.gov/vuln/detail/CVE-2025-38237), [CVE-2025-38219](https://nvd.nist.gov/vuln/detail/CVE-2025-38219), [CVE-2025-38218](https://nvd.nist.gov/vuln/detail/CVE-2025-38218), [CVE-2025-38214](https://nvd.nist.gov/vuln/detail/CVE-2025-38214), [CVE-2025-38213](https://nvd.nist.gov/vuln/detail/CVE-2025-38213), [CVE-2025-38231](https://nvd.nist.gov/vuln/detail/CVE-2025-38231), [CVE-2025-38212](https://nvd.nist.gov/vuln/detail/CVE-2025-38212), [CVE-2025-38229](https://nvd.nist.gov/vuln/detail/CVE-2025-38229), [CVE-2025-38227](https://nvd.nist.gov/vuln/detail/CVE-2025-38227), [CVE-2025-38226](https://nvd.nist.gov/vuln/detail/CVE-2025-38226), [CVE-2025-38222](https://nvd.nist.gov/vuln/detail/CVE-2025-38222), [CVE-2025-38211](https://nvd.nist.gov/vuln/detail/CVE-2025-38211), [CVE-2025-38185](https://nvd.nist.gov/vuln/detail/CVE-2025-38185), [CVE-2025-38184](https://nvd.nist.gov/vuln/detail/CVE-2025-38184), [CVE-2025-38181](https://nvd.nist.gov/vuln/detail/CVE-2025-38181), [CVE-2025-38206](https://nvd.nist.gov/vuln/detail/CVE-2025-38206), [CVE-2025-38204](https://nvd.nist.gov/vuln/detail/CVE-2025-38204), [CVE-2025-38203](https://nvd.nist.gov/vuln/detail/CVE-2025-38203), [CVE-2025-38200](https://nvd.nist.gov/vuln/detail/CVE-2025-38200), [CVE-2025-38180](https://nvd.nist.gov/vuln/detail/CVE-2025-38180), [CVE-2025-38197](https://nvd.nist.gov/vuln/detail/CVE-2025-38197), [CVE-2025-38194](https://nvd.nist.gov/vuln/detail/CVE-2025-38194), [CVE-2025-38193](https://nvd.nist.gov/vuln/detail/CVE-2025-38193), [CVE-2025-38190](https://nvd.nist.gov/vuln/detail/CVE-2025-38190), [CVE-2025-38174](https://nvd.nist.gov/vuln/detail/CVE-2025-38174), [CVE-2025-38163](https://nvd.nist.gov/vuln/detail/CVE-2025-38163), [CVE-2025-38167](https://nvd.nist.gov/vuln/detail/CVE-2025-38167), [CVE-2025-38173](https://nvd.nist.gov/vuln/detail/CVE-2025-38173), [CVE-2025-38138](https://nvd.nist.gov/vuln/detail/CVE-2025-38138), [CVE-2025-38136](https://nvd.nist.gov/vuln/detail/CVE-2025-38136), [CVE-2025-38135](https://nvd.nist.gov/vuln/detail/CVE-2025-38135), [CVE-2025-38161](https://nvd.nist.gov/vuln/detail/CVE-2025-38161), [CVE-2025-38160](https://nvd.nist.gov/vuln/detail/CVE-2025-38160), [CVE-2025-38159](https://nvd.nist.gov/vuln/detail/CVE-2025-38159), [CVE-2025-38157](https://nvd.nist.gov/vuln/detail/CVE-2025-38157), [CVE-2025-38154](https://nvd.nist.gov/vuln/detail/CVE-2025-38154), [CVE-2025-38153](https://nvd.nist.gov/vuln/detail/CVE-2025-38153), [CVE-2025-38147](https://nvd.nist.gov/vuln/detail/CVE-2025-38147), [CVE-2025-38146](https://nvd.nist.gov/vuln/detail/CVE-2025-38146), [CVE-2025-38145](https://nvd.nist.gov/vuln/detail/CVE-2025-38145), [CVE-2025-38143](https://nvd.nist.gov/vuln/detail/CVE-2025-38143), [CVE-2025-38108](https://nvd.nist.gov/vuln/detail/CVE-2025-38108), [CVE-2025-38107](https://nvd.nist.gov/vuln/detail/CVE-2025-38107), [CVE-2025-38103](https://nvd.nist.gov/vuln/detail/CVE-2025-38103), [CVE-2025-38122](https://nvd.nist.gov/vuln/detail/CVE-2025-38122), [CVE-2025-38102](https://nvd.nist.gov/vuln/detail/CVE-2025-38102), [CVE-2025-38120](https://nvd.nist.gov/vuln/detail/CVE-2025-38120), [CVE-2025-38119](https://nvd.nist.gov/vuln/detail/CVE-2025-38119), [CVE-2025-38115](https://nvd.nist.gov/vuln/detail/CVE-2025-38115), [CVE-2025-38112](https://nvd.nist.gov/vuln/detail/CVE-2025-38112), [CVE-2025-38111](https://nvd.nist.gov/vuln/detail/CVE-2025-38111), [CVE-2025-38100](https://nvd.nist.gov/vuln/detail/CVE-2025-38100), [CVE-2025-38088](https://nvd.nist.gov/vuln/detail/CVE-2025-38088), [CVE-2025-38090](https://nvd.nist.gov/vuln/detail/CVE-2025-38090), [CVE-2025-38086](https://nvd.nist.gov/vuln/detail/CVE-2025-38086), [CVE-2025-38084](https://nvd.nist.gov/vuln/detail/CVE-2025-38084), [CVE-2025-38085](https://nvd.nist.gov/vuln/detail/CVE-2025-38085), [CVE-2025-38412](https://nvd.nist.gov/vuln/detail/CVE-2025-38412), [CVE-2025-38410](https://nvd.nist.gov/vuln/detail/CVE-2025-38410), [CVE-2025-38406](https://nvd.nist.gov/vuln/detail/CVE-2025-38406), [CVE-2025-38403](https://nvd.nist.gov/vuln/detail/CVE-2025-38403), [CVE-2025-38401](https://nvd.nist.gov/vuln/detail/CVE-2025-38401), [CVE-2025-38377](https://nvd.nist.gov/vuln/detail/CVE-2025-38377), [CVE-2025-38400](https://nvd.nist.gov/vuln/detail/CVE-2025-38400), [CVE-2025-38399](https://nvd.nist.gov/vuln/detail/CVE-2025-38399), [CVE-2025-38395](https://nvd.nist.gov/vuln/detail/CVE-2025-38395), [CVE-2025-38393](https://nvd.nist.gov/vuln/detail/CVE-2025-38393), [CVE-2025-38391](https://nvd.nist.gov/vuln/detail/CVE-2025-38391), [CVE-2025-38389](https://nvd.nist.gov/vuln/detail/CVE-2025-38389), [CVE-2025-38387](https://nvd.nist.gov/vuln/detail/CVE-2025-38387), [CVE-2025-38386](https://nvd.nist.gov/vuln/detail/CVE-2025-38386), [CVE-2025-38384](https://nvd.nist.gov/vuln/detail/CVE-2025-38384), [CVE-2025-38380](https://nvd.nist.gov/vuln/detail/CVE-2025-38380), [CVE-2025-38371](https://nvd.nist.gov/vuln/detail/CVE-2025-38371), [CVE-2025-38362](https://nvd.nist.gov/vuln/detail/CVE-2025-38362), [CVE-2025-38363](https://nvd.nist.gov/vuln/detail/CVE-2025-38363), [CVE-2025-38350](https://nvd.nist.gov/vuln/detail/CVE-2025-38350), [CVE-2025-38546](https://nvd.nist.gov/vuln/detail/CVE-2025-38546), [CVE-2025-38542](https://nvd.nist.gov/vuln/detail/CVE-2025-38542), [CVE-2025-38540](https://nvd.nist.gov/vuln/detail/CVE-2025-38540), [CVE-2025-38516](https://nvd.nist.gov/vuln/detail/CVE-2025-38516), [CVE-2025-38515](https://nvd.nist.gov/vuln/detail/CVE-2025-38515), [CVE-2025-38514](https://nvd.nist.gov/vuln/detail/CVE-2025-38514), [CVE-2025-38513](https://nvd.nist.gov/vuln/detail/CVE-2025-38513), [CVE-2025-38460](https://nvd.nist.gov/vuln/detail/CVE-2025-38460), [CVE-2025-38467](https://nvd.nist.gov/vuln/detail/CVE-2025-38467), [CVE-2025-38466](https://nvd.nist.gov/vuln/detail/CVE-2025-38466), [CVE-2025-38465](https://nvd.nist.gov/vuln/detail/CVE-2025-38465), [CVE-2025-38464](https://nvd.nist.gov/vuln/detail/CVE-2025-38464), [CVE-2025-38462](https://nvd.nist.gov/vuln/detail/CVE-2025-38462), [CVE-2025-38461](https://nvd.nist.gov/vuln/detail/CVE-2025-38461), [CVE-2025-38445](https://nvd.nist.gov/vuln/detail/CVE-2025-38445), [CVE-2025-38444](https://nvd.nist.gov/vuln/detail/CVE-2025-38444), [CVE-2025-38443](https://nvd.nist.gov/vuln/detail/CVE-2025-38443), [CVE-2025-38441](https://nvd.nist.gov/vuln/detail/CVE-2025-38441), [CVE-2025-38459](https://nvd.nist.gov/vuln/detail/CVE-2025-38459), [CVE-2025-38458](https://nvd.nist.gov/vuln/detail/CVE-2025-38458), [CVE-2025-38457](https://nvd.nist.gov/vuln/detail/CVE-2025-38457), [CVE-2025-38439](https://nvd.nist.gov/vuln/detail/CVE-2025-38439), [CVE-2025-38448](https://nvd.nist.gov/vuln/detail/CVE-2025-38448), [CVE-2025-38375](https://nvd.nist.gov/vuln/detail/CVE-2025-38375))\n\n#### Updates:\n\n- Linux ([5.15.189](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.189) includes ([5.15.188](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.188), [5.15.187](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.187), [5.15.186](https://lwn.net/Articles/1027283/), [5.15.185](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.185), [5.15.184](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.184), [5.15.183](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.183), [5.15.182](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.182), [5.15.181](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.181), [5.15.180](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.180)))\n- ca-certificates ([3.114](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html) includes ([3.113](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html), [3.113.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html), [3.112](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html), [3.111](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html), [3.110](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html)))"
  },
  "current-2023": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-08-19 13:11:03 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.189"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.7**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-48771](https://nvd.nist.gov/vuln/detail/CVE-2022-48771), [CVE-2025-37937](https://nvd.nist.gov/vuln/detail/CVE-2025-37937), [CVE-2025-37889](https://nvd.nist.gov/vuln/detail/CVE-2025-37889), [CVE-2025-38575](https://nvd.nist.gov/vuln/detail/CVE-2025-38575), [CVE-2025-38152](https://nvd.nist.gov/vuln/detail/CVE-2025-38152), [CVE-2025-39735](https://nvd.nist.gov/vuln/detail/CVE-2025-39735), [CVE-2025-39728](https://nvd.nist.gov/vuln/detail/CVE-2025-39728), [CVE-2025-38637](https://nvd.nist.gov/vuln/detail/CVE-2025-38637), [CVE-2025-37785](https://nvd.nist.gov/vuln/detail/CVE-2025-37785), [CVE-2025-23138](https://nvd.nist.gov/vuln/detail/CVE-2025-23138), [CVE-2025-23136](https://nvd.nist.gov/vuln/detail/CVE-2025-23136), [CVE-2025-22066](https://nvd.nist.gov/vuln/detail/CVE-2025-22066), [CVE-2025-22075](https://nvd.nist.gov/vuln/detail/CVE-2025-22075), [CVE-2025-22073](https://nvd.nist.gov/vuln/detail/CVE-2025-22073), [CVE-2025-22071](https://nvd.nist.gov/vuln/detail/CVE-2025-22071), [CVE-2025-22097](https://nvd.nist.gov/vuln/detail/CVE-2025-22097), [CVE-2025-22089](https://nvd.nist.gov/vuln/detail/CVE-2025-22089), [CVE-2025-22086](https://nvd.nist.gov/vuln/detail/CVE-2025-22086), [CVE-2025-22081](https://nvd.nist.gov/vuln/detail/CVE-2025-22081), [CVE-2025-22079](https://nvd.nist.gov/vuln/detail/CVE-2025-22079), [CVE-2025-22063](https://nvd.nist.gov/vuln/detail/CVE-2025-22063), [CVE-2025-22060](https://nvd.nist.gov/vuln/detail/CVE-2025-22060), [CVE-2025-22056](https://nvd.nist.gov/vuln/detail/CVE-2025-22056), [CVE-2025-22055](https://nvd.nist.gov/vuln/detail/CVE-2025-22055), [CVE-2025-22054](https://nvd.nist.gov/vuln/detail/CVE-2025-22054), [CVE-2025-22035](https://nvd.nist.gov/vuln/detail/CVE-2025-22035), [CVE-2025-22050](https://nvd.nist.gov/vuln/detail/CVE-2025-22050), [CVE-2025-22045](https://nvd.nist.gov/vuln/detail/CVE-2025-22045), [CVE-2025-22044](https://nvd.nist.gov/vuln/detail/CVE-2025-22044), [CVE-2025-22025](https://nvd.nist.gov/vuln/detail/CVE-2025-22025), [CVE-2023-53034](https://nvd.nist.gov/vuln/detail/CVE-2023-53034), [CVE-2025-22021](https://nvd.nist.gov/vuln/detail/CVE-2025-22021), [CVE-2025-22020](https://nvd.nist.gov/vuln/detail/CVE-2025-22020), [CVE-2025-22018](https://nvd.nist.gov/vuln/detail/CVE-2025-22018), [CVE-2025-37989](https://nvd.nist.gov/vuln/detail/CVE-2025-37989), [CVE-2025-37985](https://nvd.nist.gov/vuln/detail/CVE-2025-37985), [CVE-2025-37983](https://nvd.nist.gov/vuln/detail/CVE-2025-37983), [CVE-2025-37982](https://nvd.nist.gov/vuln/detail/CVE-2025-37982), [CVE-2025-37940](https://nvd.nist.gov/vuln/detail/CVE-2025-37940), [CVE-2025-37892](https://nvd.nist.gov/vuln/detail/CVE-2025-37892), [CVE-2025-37885](https://nvd.nist.gov/vuln/detail/CVE-2025-37885), [CVE-2025-37883](https://nvd.nist.gov/vuln/detail/CVE-2025-37883), [CVE-2025-37881](https://nvd.nist.gov/vuln/detail/CVE-2025-37881), [CVE-2025-37871](https://nvd.nist.gov/vuln/detail/CVE-2025-37871), [CVE-2025-37867](https://nvd.nist.gov/vuln/detail/CVE-2025-37867), [CVE-2025-37875](https://nvd.nist.gov/vuln/detail/CVE-2025-37875), [CVE-2025-37844](https://nvd.nist.gov/vuln/detail/CVE-2025-37844), [CVE-2025-37841](https://nvd.nist.gov/vuln/detail/CVE-2025-37841), [CVE-2025-37840](https://nvd.nist.gov/vuln/detail/CVE-2025-37840), [CVE-2025-37862](https://nvd.nist.gov/vuln/detail/CVE-2025-37862), [CVE-2025-37859](https://nvd.nist.gov/vuln/detail/CVE-2025-37859), [CVE-2025-37858](https://nvd.nist.gov/vuln/detail/CVE-2025-37858), [CVE-2025-37857](https://nvd.nist.gov/vuln/detail/CVE-2025-37857), [CVE-2025-37839](https://nvd.nist.gov/vuln/detail/CVE-2025-37839), [CVE-2025-37851](https://nvd.nist.gov/vuln/detail/CVE-2025-37851), [CVE-2025-37850](https://nvd.nist.gov/vuln/detail/CVE-2025-37850), [CVE-2025-37836](https://nvd.nist.gov/vuln/detail/CVE-2025-37836), [CVE-2025-37823](https://nvd.nist.gov/vuln/detail/CVE-2025-37823), [CVE-2025-37830](https://nvd.nist.gov/vuln/detail/CVE-2025-37830), [CVE-2025-37829](https://nvd.nist.gov/vuln/detail/CVE-2025-37829), [CVE-2025-37824](https://nvd.nist.gov/vuln/detail/CVE-2025-37824), [CVE-2025-37808](https://nvd.nist.gov/vuln/detail/CVE-2025-37808), [CVE-2025-37805](https://nvd.nist.gov/vuln/detail/CVE-2025-37805), [CVE-2025-37803](https://nvd.nist.gov/vuln/detail/CVE-2025-37803), [CVE-2025-37817](https://nvd.nist.gov/vuln/detail/CVE-2025-37817), [CVE-2025-37812](https://nvd.nist.gov/vuln/detail/CVE-2025-37812), [CVE-2025-37811](https://nvd.nist.gov/vuln/detail/CVE-2025-37811), [CVE-2025-37810](https://nvd.nist.gov/vuln/detail/CVE-2025-37810), [CVE-2025-37797](https://nvd.nist.gov/vuln/detail/CVE-2025-37797), [CVE-2025-37990](https://nvd.nist.gov/vuln/detail/CVE-2025-37990), [CVE-2025-37991](https://nvd.nist.gov/vuln/detail/CVE-2025-37991), [CVE-2025-37927](https://nvd.nist.gov/vuln/detail/CVE-2025-37927), [CVE-2025-37923](https://nvd.nist.gov/vuln/detail/CVE-2025-37923), [CVE-2025-37930](https://nvd.nist.gov/vuln/detail/CVE-2025-37930), [CVE-2025-37929](https://nvd.nist.gov/vuln/detail/CVE-2025-37929), [CVE-2025-37915](https://nvd.nist.gov/vuln/detail/CVE-2025-37915), [CVE-2025-37914](https://nvd.nist.gov/vuln/detail/CVE-2025-37914), [CVE-2025-37913](https://nvd.nist.gov/vuln/detail/CVE-2025-37913), [CVE-2025-37912](https://nvd.nist.gov/vuln/detail/CVE-2025-37912), [CVE-2025-37911](https://nvd.nist.gov/vuln/detail/CVE-2025-37911), [CVE-2025-37909](https://nvd.nist.gov/vuln/detail/CVE-2025-37909), [CVE-2025-37905](https://nvd.nist.gov/vuln/detail/CVE-2025-37905), [CVE-2025-37890](https://nvd.nist.gov/vuln/detail/CVE-2025-37890), [CVE-2025-37998](https://nvd.nist.gov/vuln/detail/CVE-2025-37998), [CVE-2025-37997](https://nvd.nist.gov/vuln/detail/CVE-2025-37997), [CVE-2025-37995](https://nvd.nist.gov/vuln/detail/CVE-2025-37995), [CVE-2025-37994](https://nvd.nist.gov/vuln/detail/CVE-2025-37994), [CVE-2025-37970](https://nvd.nist.gov/vuln/detail/CVE-2025-37970), [CVE-2025-37969](https://nvd.nist.gov/vuln/detail/CVE-2025-37969), [CVE-2025-37964](https://nvd.nist.gov/vuln/detail/CVE-2025-37964), [CVE-2025-37949](https://nvd.nist.gov/vuln/detail/CVE-2025-37949), [CVE-2025-38094](https://nvd.nist.gov/vuln/detail/CVE-2025-38094), [CVE-2025-38009](https://nvd.nist.gov/vuln/detail/CVE-2025-38009), [CVE-2025-38024](https://nvd.nist.gov/vuln/detail/CVE-2025-38024), [CVE-2025-38023](https://nvd.nist.gov/vuln/detail/CVE-2025-38023), [CVE-2025-38005](https://nvd.nist.gov/vuln/detail/CVE-2025-38005), [CVE-2025-37992](https://nvd.nist.gov/vuln/detail/CVE-2025-37992), [CVE-2025-38052](https://nvd.nist.gov/vuln/detail/CVE-2025-38052), [CVE-2025-38061](https://nvd.nist.gov/vuln/detail/CVE-2025-38061), [CVE-2025-38058](https://nvd.nist.gov/vuln/detail/CVE-2025-38058), [CVE-2025-38079](https://nvd.nist.gov/vuln/detail/CVE-2025-38079), [CVE-2025-38078](https://nvd.nist.gov/vuln/detail/CVE-2025-38078), [CVE-2025-38077](https://nvd.nist.gov/vuln/detail/CVE-2025-38077), [CVE-2025-38075](https://nvd.nist.gov/vuln/detail/CVE-2025-38075), [CVE-2025-38072](https://nvd.nist.gov/vuln/detail/CVE-2025-38072), [CVE-2025-38068](https://nvd.nist.gov/vuln/detail/CVE-2025-38068), [CVE-2025-38066](https://nvd.nist.gov/vuln/detail/CVE-2025-38066), [CVE-2025-38065](https://nvd.nist.gov/vuln/detail/CVE-2025-38065), [CVE-2025-38037](https://nvd.nist.gov/vuln/detail/CVE-2025-38037), [CVE-2025-38035](https://nvd.nist.gov/vuln/detail/CVE-2025-38035), [CVE-2025-38034](https://nvd.nist.gov/vuln/detail/CVE-2025-38034), [CVE-2025-38051](https://nvd.nist.gov/vuln/detail/CVE-2025-38051), [CVE-2025-38031](https://nvd.nist.gov/vuln/detail/CVE-2025-38031), [CVE-2025-38048](https://nvd.nist.gov/vuln/detail/CVE-2025-38048), [CVE-2025-38046](https://nvd.nist.gov/vuln/detail/CVE-2025-38046), [CVE-2025-38044](https://nvd.nist.gov/vuln/detail/CVE-2025-38044), [CVE-2025-38043](https://nvd.nist.gov/vuln/detail/CVE-2025-38043), [CVE-2025-38030](https://nvd.nist.gov/vuln/detail/CVE-2025-38030), [CVE-2025-38003](https://nvd.nist.gov/vuln/detail/CVE-2025-38003), [CVE-2025-38004](https://nvd.nist.gov/vuln/detail/CVE-2025-38004), [CVE-2025-38001](https://nvd.nist.gov/vuln/detail/CVE-2025-38001), [CVE-2025-38000](https://nvd.nist.gov/vuln/detail/CVE-2025-38000), [CVE-2025-38498](https://nvd.nist.gov/vuln/detail/CVE-2025-38498), [CVE-2025-38428](https://nvd.nist.gov/vuln/detail/CVE-2025-38428), [CVE-2025-38424](https://nvd.nist.gov/vuln/detail/CVE-2025-38424), [CVE-2025-38430](https://nvd.nist.gov/vuln/detail/CVE-2025-38430), [CVE-2025-38420](https://nvd.nist.gov/vuln/detail/CVE-2025-38420), [CVE-2025-38419](https://nvd.nist.gov/vuln/detail/CVE-2025-38419), [CVE-2025-38418](https://nvd.nist.gov/vuln/detail/CVE-2025-38418), [CVE-2025-38416](https://nvd.nist.gov/vuln/detail/CVE-2025-38416), [CVE-2025-38415](https://nvd.nist.gov/vuln/detail/CVE-2025-38415), [CVE-2025-38352](https://nvd.nist.gov/vuln/detail/CVE-2025-38352), [CVE-2025-38346](https://nvd.nist.gov/vuln/detail/CVE-2025-38346), [CVE-2025-38348](https://nvd.nist.gov/vuln/detail/CVE-2025-38348), [CVE-2025-38328](https://nvd.nist.gov/vuln/detail/CVE-2025-38328), [CVE-2025-38326](https://nvd.nist.gov/vuln/detail/CVE-2025-38326), [CVE-2025-38324](https://nvd.nist.gov/vuln/detail/CVE-2025-38324), [CVE-2025-38323](https://nvd.nist.gov/vuln/detail/CVE-2025-38323), [CVE-2025-38345](https://nvd.nist.gov/vuln/detail/CVE-2025-38345), [CVE-2025-38344](https://nvd.nist.gov/vuln/detail/CVE-2025-38344), [CVE-2025-38342](https://nvd.nist.gov/vuln/detail/CVE-2025-38342), [CVE-2025-38337](https://nvd.nist.gov/vuln/detail/CVE-2025-38337), [CVE-2025-38336](https://nvd.nist.gov/vuln/detail/CVE-2025-38336), [CVE-2025-38332](https://nvd.nist.gov/vuln/detail/CVE-2025-38332), [CVE-2025-38320](https://nvd.nist.gov/vuln/detail/CVE-2025-38320), [CVE-2025-38313](https://nvd.nist.gov/vuln/detail/CVE-2025-38313), [CVE-2025-38312](https://nvd.nist.gov/vuln/detail/CVE-2025-38312), [CVE-2025-38310](https://nvd.nist.gov/vuln/detail/CVE-2025-38310), [CVE-2025-38319](https://nvd.nist.gov/vuln/detail/CVE-2025-38319), [CVE-2025-38273](https://nvd.nist.gov/vuln/detail/CVE-2025-38273), [CVE-2025-38305](https://nvd.nist.gov/vuln/detail/CVE-2025-38305), [CVE-2025-38298](https://nvd.nist.gov/vuln/detail/CVE-2025-38298), [CVE-2025-38293](https://nvd.nist.gov/vuln/detail/CVE-2025-38293), [CVE-2025-38286](https://nvd.nist.gov/vuln/detail/CVE-2025-38286), [CVE-2025-38285](https://nvd.nist.gov/vuln/detail/CVE-2025-38285), [CVE-2025-38280](https://nvd.nist.gov/vuln/detail/CVE-2025-38280), [CVE-2025-38237](https://nvd.nist.gov/vuln/detail/CVE-2025-38237), [CVE-2025-38219](https://nvd.nist.gov/vuln/detail/CVE-2025-38219), [CVE-2025-38218](https://nvd.nist.gov/vuln/detail/CVE-2025-38218), [CVE-2025-38214](https://nvd.nist.gov/vuln/detail/CVE-2025-38214), [CVE-2025-38213](https://nvd.nist.gov/vuln/detail/CVE-2025-38213), [CVE-2025-38231](https://nvd.nist.gov/vuln/detail/CVE-2025-38231), [CVE-2025-38212](https://nvd.nist.gov/vuln/detail/CVE-2025-38212), [CVE-2025-38229](https://nvd.nist.gov/vuln/detail/CVE-2025-38229), [CVE-2025-38227](https://nvd.nist.gov/vuln/detail/CVE-2025-38227), [CVE-2025-38226](https://nvd.nist.gov/vuln/detail/CVE-2025-38226), [CVE-2025-38222](https://nvd.nist.gov/vuln/detail/CVE-2025-38222), [CVE-2025-38211](https://nvd.nist.gov/vuln/detail/CVE-2025-38211), [CVE-2025-38185](https://nvd.nist.gov/vuln/detail/CVE-2025-38185), [CVE-2025-38184](https://nvd.nist.gov/vuln/detail/CVE-2025-38184), [CVE-2025-38181](https://nvd.nist.gov/vuln/detail/CVE-2025-38181), [CVE-2025-38206](https://nvd.nist.gov/vuln/detail/CVE-2025-38206), [CVE-2025-38204](https://nvd.nist.gov/vuln/detail/CVE-2025-38204), [CVE-2025-38203](https://nvd.nist.gov/vuln/detail/CVE-2025-38203), [CVE-2025-38200](https://nvd.nist.gov/vuln/detail/CVE-2025-38200), [CVE-2025-38180](https://nvd.nist.gov/vuln/detail/CVE-2025-38180), [CVE-2025-38197](https://nvd.nist.gov/vuln/detail/CVE-2025-38197), [CVE-2025-38194](https://nvd.nist.gov/vuln/detail/CVE-2025-38194), [CVE-2025-38193](https://nvd.nist.gov/vuln/detail/CVE-2025-38193), [CVE-2025-38190](https://nvd.nist.gov/vuln/detail/CVE-2025-38190), [CVE-2025-38174](https://nvd.nist.gov/vuln/detail/CVE-2025-38174), [CVE-2025-38163](https://nvd.nist.gov/vuln/detail/CVE-2025-38163), [CVE-2025-38167](https://nvd.nist.gov/vuln/detail/CVE-2025-38167), [CVE-2025-38173](https://nvd.nist.gov/vuln/detail/CVE-2025-38173), [CVE-2025-38138](https://nvd.nist.gov/vuln/detail/CVE-2025-38138), [CVE-2025-38136](https://nvd.nist.gov/vuln/detail/CVE-2025-38136), [CVE-2025-38135](https://nvd.nist.gov/vuln/detail/CVE-2025-38135), [CVE-2025-38161](https://nvd.nist.gov/vuln/detail/CVE-2025-38161), [CVE-2025-38160](https://nvd.nist.gov/vuln/detail/CVE-2025-38160), [CVE-2025-38159](https://nvd.nist.gov/vuln/detail/CVE-2025-38159), [CVE-2025-38157](https://nvd.nist.gov/vuln/detail/CVE-2025-38157), [CVE-2025-38154](https://nvd.nist.gov/vuln/detail/CVE-2025-38154), [CVE-2025-38153](https://nvd.nist.gov/vuln/detail/CVE-2025-38153), [CVE-2025-38147](https://nvd.nist.gov/vuln/detail/CVE-2025-38147), [CVE-2025-38146](https://nvd.nist.gov/vuln/detail/CVE-2025-38146), [CVE-2025-38145](https://nvd.nist.gov/vuln/detail/CVE-2025-38145), [CVE-2025-38143](https://nvd.nist.gov/vuln/detail/CVE-2025-38143), [CVE-2025-38108](https://nvd.nist.gov/vuln/detail/CVE-2025-38108), [CVE-2025-38107](https://nvd.nist.gov/vuln/detail/CVE-2025-38107), [CVE-2025-38103](https://nvd.nist.gov/vuln/detail/CVE-2025-38103), [CVE-2025-38122](https://nvd.nist.gov/vuln/detail/CVE-2025-38122), [CVE-2025-38102](https://nvd.nist.gov/vuln/detail/CVE-2025-38102), [CVE-2025-38120](https://nvd.nist.gov/vuln/detail/CVE-2025-38120), [CVE-2025-38119](https://nvd.nist.gov/vuln/detail/CVE-2025-38119), [CVE-2025-38115](https://nvd.nist.gov/vuln/detail/CVE-2025-38115), [CVE-2025-38112](https://nvd.nist.gov/vuln/detail/CVE-2025-38112), [CVE-2025-38111](https://nvd.nist.gov/vuln/detail/CVE-2025-38111), [CVE-2025-38100](https://nvd.nist.gov/vuln/detail/CVE-2025-38100), [CVE-2025-38088](https://nvd.nist.gov/vuln/detail/CVE-2025-38088), [CVE-2025-38090](https://nvd.nist.gov/vuln/detail/CVE-2025-38090), [CVE-2025-38086](https://nvd.nist.gov/vuln/detail/CVE-2025-38086), [CVE-2025-38084](https://nvd.nist.gov/vuln/detail/CVE-2025-38084), [CVE-2025-38085](https://nvd.nist.gov/vuln/detail/CVE-2025-38085), [CVE-2025-38412](https://nvd.nist.gov/vuln/detail/CVE-2025-38412), [CVE-2025-38410](https://nvd.nist.gov/vuln/detail/CVE-2025-38410), [CVE-2025-38406](https://nvd.nist.gov/vuln/detail/CVE-2025-38406), [CVE-2025-38403](https://nvd.nist.gov/vuln/detail/CVE-2025-38403), [CVE-2025-38401](https://nvd.nist.gov/vuln/detail/CVE-2025-38401), [CVE-2025-38377](https://nvd.nist.gov/vuln/detail/CVE-2025-38377), [CVE-2025-38400](https://nvd.nist.gov/vuln/detail/CVE-2025-38400), [CVE-2025-38399](https://nvd.nist.gov/vuln/detail/CVE-2025-38399), [CVE-2025-38395](https://nvd.nist.gov/vuln/detail/CVE-2025-38395), [CVE-2025-38393](https://nvd.nist.gov/vuln/detail/CVE-2025-38393), [CVE-2025-38391](https://nvd.nist.gov/vuln/detail/CVE-2025-38391), [CVE-2025-38389](https://nvd.nist.gov/vuln/detail/CVE-2025-38389), [CVE-2025-38387](https://nvd.nist.gov/vuln/detail/CVE-2025-38387), [CVE-2025-38386](https://nvd.nist.gov/vuln/detail/CVE-2025-38386), [CVE-2025-38384](https://nvd.nist.gov/vuln/detail/CVE-2025-38384), [CVE-2025-38380](https://nvd.nist.gov/vuln/detail/CVE-2025-38380), [CVE-2025-38371](https://nvd.nist.gov/vuln/detail/CVE-2025-38371), [CVE-2025-38362](https://nvd.nist.gov/vuln/detail/CVE-2025-38362), [CVE-2025-38363](https://nvd.nist.gov/vuln/detail/CVE-2025-38363), [CVE-2025-38350](https://nvd.nist.gov/vuln/detail/CVE-2025-38350), [CVE-2025-38546](https://nvd.nist.gov/vuln/detail/CVE-2025-38546), [CVE-2025-38542](https://nvd.nist.gov/vuln/detail/CVE-2025-38542), [CVE-2025-38540](https://nvd.nist.gov/vuln/detail/CVE-2025-38540), [CVE-2025-38516](https://nvd.nist.gov/vuln/detail/CVE-2025-38516), [CVE-2025-38515](https://nvd.nist.gov/vuln/detail/CVE-2025-38515), [CVE-2025-38514](https://nvd.nist.gov/vuln/detail/CVE-2025-38514), [CVE-2025-38513](https://nvd.nist.gov/vuln/detail/CVE-2025-38513), [CVE-2025-38460](https://nvd.nist.gov/vuln/detail/CVE-2025-38460), [CVE-2025-38467](https://nvd.nist.gov/vuln/detail/CVE-2025-38467), [CVE-2025-38466](https://nvd.nist.gov/vuln/detail/CVE-2025-38466), [CVE-2025-38465](https://nvd.nist.gov/vuln/detail/CVE-2025-38465), [CVE-2025-38464](https://nvd.nist.gov/vuln/detail/CVE-2025-38464), [CVE-2025-38462](https://nvd.nist.gov/vuln/detail/CVE-2025-38462), [CVE-2025-38461](https://nvd.nist.gov/vuln/detail/CVE-2025-38461), [CVE-2025-38445](https://nvd.nist.gov/vuln/detail/CVE-2025-38445), [CVE-2025-38444](https://nvd.nist.gov/vuln/detail/CVE-2025-38444), [CVE-2025-38443](https://nvd.nist.gov/vuln/detail/CVE-2025-38443), [CVE-2025-38441](https://nvd.nist.gov/vuln/detail/CVE-2025-38441), [CVE-2025-38459](https://nvd.nist.gov/vuln/detail/CVE-2025-38459), [CVE-2025-38458](https://nvd.nist.gov/vuln/detail/CVE-2025-38458), [CVE-2025-38457](https://nvd.nist.gov/vuln/detail/CVE-2025-38457), [CVE-2025-38439](https://nvd.nist.gov/vuln/detail/CVE-2025-38439), [CVE-2025-38448](https://nvd.nist.gov/vuln/detail/CVE-2025-38448), [CVE-2025-38375](https://nvd.nist.gov/vuln/detail/CVE-2025-38375))\n\n#### Updates:\n\n- Linux ([5.15.189](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.189) includes ([5.15.188](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.188), [5.15.187](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.187), [5.15.186](https://lwn.net/Articles/1027283/), [5.15.185](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.185), [5.15.184](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.184), [5.15.183](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.183), [5.15.182](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.182), [5.15.181](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.181), [5.15.180](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.180)))\n- ca-certificates ([3.114](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html) includes ([3.113](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html), [3.113.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html), [3.112](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html), [3.111](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html), [3.110](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html)))"
  },
  "current": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-08-19 13:11:03 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.189"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.7**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-48771](https://nvd.nist.gov/vuln/detail/CVE-2022-48771), [CVE-2025-37937](https://nvd.nist.gov/vuln/detail/CVE-2025-37937), [CVE-2025-37889](https://nvd.nist.gov/vuln/detail/CVE-2025-37889), [CVE-2025-38575](https://nvd.nist.gov/vuln/detail/CVE-2025-38575), [CVE-2025-38152](https://nvd.nist.gov/vuln/detail/CVE-2025-38152), [CVE-2025-39735](https://nvd.nist.gov/vuln/detail/CVE-2025-39735), [CVE-2025-39728](https://nvd.nist.gov/vuln/detail/CVE-2025-39728), [CVE-2025-38637](https://nvd.nist.gov/vuln/detail/CVE-2025-38637), [CVE-2025-37785](https://nvd.nist.gov/vuln/detail/CVE-2025-37785), [CVE-2025-23138](https://nvd.nist.gov/vuln/detail/CVE-2025-23138), [CVE-2025-23136](https://nvd.nist.gov/vuln/detail/CVE-2025-23136), [CVE-2025-22066](https://nvd.nist.gov/vuln/detail/CVE-2025-22066), [CVE-2025-22075](https://nvd.nist.gov/vuln/detail/CVE-2025-22075), [CVE-2025-22073](https://nvd.nist.gov/vuln/detail/CVE-2025-22073), [CVE-2025-22071](https://nvd.nist.gov/vuln/detail/CVE-2025-22071), [CVE-2025-22097](https://nvd.nist.gov/vuln/detail/CVE-2025-22097), [CVE-2025-22089](https://nvd.nist.gov/vuln/detail/CVE-2025-22089), [CVE-2025-22086](https://nvd.nist.gov/vuln/detail/CVE-2025-22086), [CVE-2025-22081](https://nvd.nist.gov/vuln/detail/CVE-2025-22081), [CVE-2025-22079](https://nvd.nist.gov/vuln/detail/CVE-2025-22079), [CVE-2025-22063](https://nvd.nist.gov/vuln/detail/CVE-2025-22063), [CVE-2025-22060](https://nvd.nist.gov/vuln/detail/CVE-2025-22060), [CVE-2025-22056](https://nvd.nist.gov/vuln/detail/CVE-2025-22056), [CVE-2025-22055](https://nvd.nist.gov/vuln/detail/CVE-2025-22055), [CVE-2025-22054](https://nvd.nist.gov/vuln/detail/CVE-2025-22054), [CVE-2025-22035](https://nvd.nist.gov/vuln/detail/CVE-2025-22035), [CVE-2025-22050](https://nvd.nist.gov/vuln/detail/CVE-2025-22050), [CVE-2025-22045](https://nvd.nist.gov/vuln/detail/CVE-2025-22045), [CVE-2025-22044](https://nvd.nist.gov/vuln/detail/CVE-2025-22044), [CVE-2025-22025](https://nvd.nist.gov/vuln/detail/CVE-2025-22025), [CVE-2023-53034](https://nvd.nist.gov/vuln/detail/CVE-2023-53034), [CVE-2025-22021](https://nvd.nist.gov/vuln/detail/CVE-2025-22021), [CVE-2025-22020](https://nvd.nist.gov/vuln/detail/CVE-2025-22020), [CVE-2025-22018](https://nvd.nist.gov/vuln/detail/CVE-2025-22018), [CVE-2025-37989](https://nvd.nist.gov/vuln/detail/CVE-2025-37989), [CVE-2025-37985](https://nvd.nist.gov/vuln/detail/CVE-2025-37985), [CVE-2025-37983](https://nvd.nist.gov/vuln/detail/CVE-2025-37983), [CVE-2025-37982](https://nvd.nist.gov/vuln/detail/CVE-2025-37982), [CVE-2025-37940](https://nvd.nist.gov/vuln/detail/CVE-2025-37940), [CVE-2025-37892](https://nvd.nist.gov/vuln/detail/CVE-2025-37892), [CVE-2025-37885](https://nvd.nist.gov/vuln/detail/CVE-2025-37885), [CVE-2025-37883](https://nvd.nist.gov/vuln/detail/CVE-2025-37883), [CVE-2025-37881](https://nvd.nist.gov/vuln/detail/CVE-2025-37881), [CVE-2025-37871](https://nvd.nist.gov/vuln/detail/CVE-2025-37871), [CVE-2025-37867](https://nvd.nist.gov/vuln/detail/CVE-2025-37867), [CVE-2025-37875](https://nvd.nist.gov/vuln/detail/CVE-2025-37875), [CVE-2025-37844](https://nvd.nist.gov/vuln/detail/CVE-2025-37844), [CVE-2025-37841](https://nvd.nist.gov/vuln/detail/CVE-2025-37841), [CVE-2025-37840](https://nvd.nist.gov/vuln/detail/CVE-2025-37840), [CVE-2025-37862](https://nvd.nist.gov/vuln/detail/CVE-2025-37862), [CVE-2025-37859](https://nvd.nist.gov/vuln/detail/CVE-2025-37859), [CVE-2025-37858](https://nvd.nist.gov/vuln/detail/CVE-2025-37858), [CVE-2025-37857](https://nvd.nist.gov/vuln/detail/CVE-2025-37857), [CVE-2025-37839](https://nvd.nist.gov/vuln/detail/CVE-2025-37839), [CVE-2025-37851](https://nvd.nist.gov/vuln/detail/CVE-2025-37851), [CVE-2025-37850](https://nvd.nist.gov/vuln/detail/CVE-2025-37850), [CVE-2025-37836](https://nvd.nist.gov/vuln/detail/CVE-2025-37836), [CVE-2025-37823](https://nvd.nist.gov/vuln/detail/CVE-2025-37823), [CVE-2025-37830](https://nvd.nist.gov/vuln/detail/CVE-2025-37830), [CVE-2025-37829](https://nvd.nist.gov/vuln/detail/CVE-2025-37829), [CVE-2025-37824](https://nvd.nist.gov/vuln/detail/CVE-2025-37824), [CVE-2025-37808](https://nvd.nist.gov/vuln/detail/CVE-2025-37808), [CVE-2025-37805](https://nvd.nist.gov/vuln/detail/CVE-2025-37805), [CVE-2025-37803](https://nvd.nist.gov/vuln/detail/CVE-2025-37803), [CVE-2025-37817](https://nvd.nist.gov/vuln/detail/CVE-2025-37817), [CVE-2025-37812](https://nvd.nist.gov/vuln/detail/CVE-2025-37812), [CVE-2025-37811](https://nvd.nist.gov/vuln/detail/CVE-2025-37811), [CVE-2025-37810](https://nvd.nist.gov/vuln/detail/CVE-2025-37810), [CVE-2025-37797](https://nvd.nist.gov/vuln/detail/CVE-2025-37797), [CVE-2025-37990](https://nvd.nist.gov/vuln/detail/CVE-2025-37990), [CVE-2025-37991](https://nvd.nist.gov/vuln/detail/CVE-2025-37991), [CVE-2025-37927](https://nvd.nist.gov/vuln/detail/CVE-2025-37927), [CVE-2025-37923](https://nvd.nist.gov/vuln/detail/CVE-2025-37923), [CVE-2025-37930](https://nvd.nist.gov/vuln/detail/CVE-2025-37930), [CVE-2025-37929](https://nvd.nist.gov/vuln/detail/CVE-2025-37929), [CVE-2025-37915](https://nvd.nist.gov/vuln/detail/CVE-2025-37915), [CVE-2025-37914](https://nvd.nist.gov/vuln/detail/CVE-2025-37914), [CVE-2025-37913](https://nvd.nist.gov/vuln/detail/CVE-2025-37913), [CVE-2025-37912](https://nvd.nist.gov/vuln/detail/CVE-2025-37912), [CVE-2025-37911](https://nvd.nist.gov/vuln/detail/CVE-2025-37911), [CVE-2025-37909](https://nvd.nist.gov/vuln/detail/CVE-2025-37909), [CVE-2025-37905](https://nvd.nist.gov/vuln/detail/CVE-2025-37905), [CVE-2025-37890](https://nvd.nist.gov/vuln/detail/CVE-2025-37890), [CVE-2025-37998](https://nvd.nist.gov/vuln/detail/CVE-2025-37998), [CVE-2025-37997](https://nvd.nist.gov/vuln/detail/CVE-2025-37997), [CVE-2025-37995](https://nvd.nist.gov/vuln/detail/CVE-2025-37995), [CVE-2025-37994](https://nvd.nist.gov/vuln/detail/CVE-2025-37994), [CVE-2025-37970](https://nvd.nist.gov/vuln/detail/CVE-2025-37970), [CVE-2025-37969](https://nvd.nist.gov/vuln/detail/CVE-2025-37969), [CVE-2025-37964](https://nvd.nist.gov/vuln/detail/CVE-2025-37964), [CVE-2025-37949](https://nvd.nist.gov/vuln/detail/CVE-2025-37949), [CVE-2025-38094](https://nvd.nist.gov/vuln/detail/CVE-2025-38094), [CVE-2025-38009](https://nvd.nist.gov/vuln/detail/CVE-2025-38009), [CVE-2025-38024](https://nvd.nist.gov/vuln/detail/CVE-2025-38024), [CVE-2025-38023](https://nvd.nist.gov/vuln/detail/CVE-2025-38023), [CVE-2025-38005](https://nvd.nist.gov/vuln/detail/CVE-2025-38005), [CVE-2025-37992](https://nvd.nist.gov/vuln/detail/CVE-2025-37992), [CVE-2025-38052](https://nvd.nist.gov/vuln/detail/CVE-2025-38052), [CVE-2025-38061](https://nvd.nist.gov/vuln/detail/CVE-2025-38061), [CVE-2025-38058](https://nvd.nist.gov/vuln/detail/CVE-2025-38058), [CVE-2025-38079](https://nvd.nist.gov/vuln/detail/CVE-2025-38079), [CVE-2025-38078](https://nvd.nist.gov/vuln/detail/CVE-2025-38078), [CVE-2025-38077](https://nvd.nist.gov/vuln/detail/CVE-2025-38077), [CVE-2025-38075](https://nvd.nist.gov/vuln/detail/CVE-2025-38075), [CVE-2025-38072](https://nvd.nist.gov/vuln/detail/CVE-2025-38072), [CVE-2025-38068](https://nvd.nist.gov/vuln/detail/CVE-2025-38068), [CVE-2025-38066](https://nvd.nist.gov/vuln/detail/CVE-2025-38066), [CVE-2025-38065](https://nvd.nist.gov/vuln/detail/CVE-2025-38065), [CVE-2025-38037](https://nvd.nist.gov/vuln/detail/CVE-2025-38037), [CVE-2025-38035](https://nvd.nist.gov/vuln/detail/CVE-2025-38035), [CVE-2025-38034](https://nvd.nist.gov/vuln/detail/CVE-2025-38034), [CVE-2025-38051](https://nvd.nist.gov/vuln/detail/CVE-2025-38051), [CVE-2025-38031](https://nvd.nist.gov/vuln/detail/CVE-2025-38031), [CVE-2025-38048](https://nvd.nist.gov/vuln/detail/CVE-2025-38048), [CVE-2025-38046](https://nvd.nist.gov/vuln/detail/CVE-2025-38046), [CVE-2025-38044](https://nvd.nist.gov/vuln/detail/CVE-2025-38044), [CVE-2025-38043](https://nvd.nist.gov/vuln/detail/CVE-2025-38043), [CVE-2025-38030](https://nvd.nist.gov/vuln/detail/CVE-2025-38030), [CVE-2025-38003](https://nvd.nist.gov/vuln/detail/CVE-2025-38003), [CVE-2025-38004](https://nvd.nist.gov/vuln/detail/CVE-2025-38004), [CVE-2025-38001](https://nvd.nist.gov/vuln/detail/CVE-2025-38001), [CVE-2025-38000](https://nvd.nist.gov/vuln/detail/CVE-2025-38000), [CVE-2025-38498](https://nvd.nist.gov/vuln/detail/CVE-2025-38498), [CVE-2025-38428](https://nvd.nist.gov/vuln/detail/CVE-2025-38428), [CVE-2025-38424](https://nvd.nist.gov/vuln/detail/CVE-2025-38424), [CVE-2025-38430](https://nvd.nist.gov/vuln/detail/CVE-2025-38430), [CVE-2025-38420](https://nvd.nist.gov/vuln/detail/CVE-2025-38420), [CVE-2025-38419](https://nvd.nist.gov/vuln/detail/CVE-2025-38419), [CVE-2025-38418](https://nvd.nist.gov/vuln/detail/CVE-2025-38418), [CVE-2025-38416](https://nvd.nist.gov/vuln/detail/CVE-2025-38416), [CVE-2025-38415](https://nvd.nist.gov/vuln/detail/CVE-2025-38415), [CVE-2025-38352](https://nvd.nist.gov/vuln/detail/CVE-2025-38352), [CVE-2025-38346](https://nvd.nist.gov/vuln/detail/CVE-2025-38346), [CVE-2025-38348](https://nvd.nist.gov/vuln/detail/CVE-2025-38348), [CVE-2025-38328](https://nvd.nist.gov/vuln/detail/CVE-2025-38328), [CVE-2025-38326](https://nvd.nist.gov/vuln/detail/CVE-2025-38326), [CVE-2025-38324](https://nvd.nist.gov/vuln/detail/CVE-2025-38324), [CVE-2025-38323](https://nvd.nist.gov/vuln/detail/CVE-2025-38323), [CVE-2025-38345](https://nvd.nist.gov/vuln/detail/CVE-2025-38345), [CVE-2025-38344](https://nvd.nist.gov/vuln/detail/CVE-2025-38344), [CVE-2025-38342](https://nvd.nist.gov/vuln/detail/CVE-2025-38342), [CVE-2025-38337](https://nvd.nist.gov/vuln/detail/CVE-2025-38337), [CVE-2025-38336](https://nvd.nist.gov/vuln/detail/CVE-2025-38336), [CVE-2025-38332](https://nvd.nist.gov/vuln/detail/CVE-2025-38332), [CVE-2025-38320](https://nvd.nist.gov/vuln/detail/CVE-2025-38320), [CVE-2025-38313](https://nvd.nist.gov/vuln/detail/CVE-2025-38313), [CVE-2025-38312](https://nvd.nist.gov/vuln/detail/CVE-2025-38312), [CVE-2025-38310](https://nvd.nist.gov/vuln/detail/CVE-2025-38310), [CVE-2025-38319](https://nvd.nist.gov/vuln/detail/CVE-2025-38319), [CVE-2025-38273](https://nvd.nist.gov/vuln/detail/CVE-2025-38273), [CVE-2025-38305](https://nvd.nist.gov/vuln/detail/CVE-2025-38305), [CVE-2025-38298](https://nvd.nist.gov/vuln/detail/CVE-2025-38298), [CVE-2025-38293](https://nvd.nist.gov/vuln/detail/CVE-2025-38293), [CVE-2025-38286](https://nvd.nist.gov/vuln/detail/CVE-2025-38286), [CVE-2025-38285](https://nvd.nist.gov/vuln/detail/CVE-2025-38285), [CVE-2025-38280](https://nvd.nist.gov/vuln/detail/CVE-2025-38280), [CVE-2025-38237](https://nvd.nist.gov/vuln/detail/CVE-2025-38237), [CVE-2025-38219](https://nvd.nist.gov/vuln/detail/CVE-2025-38219), [CVE-2025-38218](https://nvd.nist.gov/vuln/detail/CVE-2025-38218), [CVE-2025-38214](https://nvd.nist.gov/vuln/detail/CVE-2025-38214), [CVE-2025-38213](https://nvd.nist.gov/vuln/detail/CVE-2025-38213), [CVE-2025-38231](https://nvd.nist.gov/vuln/detail/CVE-2025-38231), [CVE-2025-38212](https://nvd.nist.gov/vuln/detail/CVE-2025-38212), [CVE-2025-38229](https://nvd.nist.gov/vuln/detail/CVE-2025-38229), [CVE-2025-38227](https://nvd.nist.gov/vuln/detail/CVE-2025-38227), [CVE-2025-38226](https://nvd.nist.gov/vuln/detail/CVE-2025-38226), [CVE-2025-38222](https://nvd.nist.gov/vuln/detail/CVE-2025-38222), [CVE-2025-38211](https://nvd.nist.gov/vuln/detail/CVE-2025-38211), [CVE-2025-38185](https://nvd.nist.gov/vuln/detail/CVE-2025-38185), [CVE-2025-38184](https://nvd.nist.gov/vuln/detail/CVE-2025-38184), [CVE-2025-38181](https://nvd.nist.gov/vuln/detail/CVE-2025-38181), [CVE-2025-38206](https://nvd.nist.gov/vuln/detail/CVE-2025-38206), [CVE-2025-38204](https://nvd.nist.gov/vuln/detail/CVE-2025-38204), [CVE-2025-38203](https://nvd.nist.gov/vuln/detail/CVE-2025-38203), [CVE-2025-38200](https://nvd.nist.gov/vuln/detail/CVE-2025-38200), [CVE-2025-38180](https://nvd.nist.gov/vuln/detail/CVE-2025-38180), [CVE-2025-38197](https://nvd.nist.gov/vuln/detail/CVE-2025-38197), [CVE-2025-38194](https://nvd.nist.gov/vuln/detail/CVE-2025-38194), [CVE-2025-38193](https://nvd.nist.gov/vuln/detail/CVE-2025-38193), [CVE-2025-38190](https://nvd.nist.gov/vuln/detail/CVE-2025-38190), [CVE-2025-38174](https://nvd.nist.gov/vuln/detail/CVE-2025-38174), [CVE-2025-38163](https://nvd.nist.gov/vuln/detail/CVE-2025-38163), [CVE-2025-38167](https://nvd.nist.gov/vuln/detail/CVE-2025-38167), [CVE-2025-38173](https://nvd.nist.gov/vuln/detail/CVE-2025-38173), [CVE-2025-38138](https://nvd.nist.gov/vuln/detail/CVE-2025-38138), [CVE-2025-38136](https://nvd.nist.gov/vuln/detail/CVE-2025-38136), [CVE-2025-38135](https://nvd.nist.gov/vuln/detail/CVE-2025-38135), [CVE-2025-38161](https://nvd.nist.gov/vuln/detail/CVE-2025-38161), [CVE-2025-38160](https://nvd.nist.gov/vuln/detail/CVE-2025-38160), [CVE-2025-38159](https://nvd.nist.gov/vuln/detail/CVE-2025-38159), [CVE-2025-38157](https://nvd.nist.gov/vuln/detail/CVE-2025-38157), [CVE-2025-38154](https://nvd.nist.gov/vuln/detail/CVE-2025-38154), [CVE-2025-38153](https://nvd.nist.gov/vuln/detail/CVE-2025-38153), [CVE-2025-38147](https://nvd.nist.gov/vuln/detail/CVE-2025-38147), [CVE-2025-38146](https://nvd.nist.gov/vuln/detail/CVE-2025-38146), [CVE-2025-38145](https://nvd.nist.gov/vuln/detail/CVE-2025-38145), [CVE-2025-38143](https://nvd.nist.gov/vuln/detail/CVE-2025-38143), [CVE-2025-38108](https://nvd.nist.gov/vuln/detail/CVE-2025-38108), [CVE-2025-38107](https://nvd.nist.gov/vuln/detail/CVE-2025-38107), [CVE-2025-38103](https://nvd.nist.gov/vuln/detail/CVE-2025-38103), [CVE-2025-38122](https://nvd.nist.gov/vuln/detail/CVE-2025-38122), [CVE-2025-38102](https://nvd.nist.gov/vuln/detail/CVE-2025-38102), [CVE-2025-38120](https://nvd.nist.gov/vuln/detail/CVE-2025-38120), [CVE-2025-38119](https://nvd.nist.gov/vuln/detail/CVE-2025-38119), [CVE-2025-38115](https://nvd.nist.gov/vuln/detail/CVE-2025-38115), [CVE-2025-38112](https://nvd.nist.gov/vuln/detail/CVE-2025-38112), [CVE-2025-38111](https://nvd.nist.gov/vuln/detail/CVE-2025-38111), [CVE-2025-38100](https://nvd.nist.gov/vuln/detail/CVE-2025-38100), [CVE-2025-38088](https://nvd.nist.gov/vuln/detail/CVE-2025-38088), [CVE-2025-38090](https://nvd.nist.gov/vuln/detail/CVE-2025-38090), [CVE-2025-38086](https://nvd.nist.gov/vuln/detail/CVE-2025-38086), [CVE-2025-38084](https://nvd.nist.gov/vuln/detail/CVE-2025-38084), [CVE-2025-38085](https://nvd.nist.gov/vuln/detail/CVE-2025-38085), [CVE-2025-38412](https://nvd.nist.gov/vuln/detail/CVE-2025-38412), [CVE-2025-38410](https://nvd.nist.gov/vuln/detail/CVE-2025-38410), [CVE-2025-38406](https://nvd.nist.gov/vuln/detail/CVE-2025-38406), [CVE-2025-38403](https://nvd.nist.gov/vuln/detail/CVE-2025-38403), [CVE-2025-38401](https://nvd.nist.gov/vuln/detail/CVE-2025-38401), [CVE-2025-38377](https://nvd.nist.gov/vuln/detail/CVE-2025-38377), [CVE-2025-38400](https://nvd.nist.gov/vuln/detail/CVE-2025-38400), [CVE-2025-38399](https://nvd.nist.gov/vuln/detail/CVE-2025-38399), [CVE-2025-38395](https://nvd.nist.gov/vuln/detail/CVE-2025-38395), [CVE-2025-38393](https://nvd.nist.gov/vuln/detail/CVE-2025-38393), [CVE-2025-38391](https://nvd.nist.gov/vuln/detail/CVE-2025-38391), [CVE-2025-38389](https://nvd.nist.gov/vuln/detail/CVE-2025-38389), [CVE-2025-38387](https://nvd.nist.gov/vuln/detail/CVE-2025-38387), [CVE-2025-38386](https://nvd.nist.gov/vuln/detail/CVE-2025-38386), [CVE-2025-38384](https://nvd.nist.gov/vuln/detail/CVE-2025-38384), [CVE-2025-38380](https://nvd.nist.gov/vuln/detail/CVE-2025-38380), [CVE-2025-38371](https://nvd.nist.gov/vuln/detail/CVE-2025-38371), [CVE-2025-38362](https://nvd.nist.gov/vuln/detail/CVE-2025-38362), [CVE-2025-38363](https://nvd.nist.gov/vuln/detail/CVE-2025-38363), [CVE-2025-38350](https://nvd.nist.gov/vuln/detail/CVE-2025-38350), [CVE-2025-38546](https://nvd.nist.gov/vuln/detail/CVE-2025-38546), [CVE-2025-38542](https://nvd.nist.gov/vuln/detail/CVE-2025-38542), [CVE-2025-38540](https://nvd.nist.gov/vuln/detail/CVE-2025-38540), [CVE-2025-38516](https://nvd.nist.gov/vuln/detail/CVE-2025-38516), [CVE-2025-38515](https://nvd.nist.gov/vuln/detail/CVE-2025-38515), [CVE-2025-38514](https://nvd.nist.gov/vuln/detail/CVE-2025-38514), [CVE-2025-38513](https://nvd.nist.gov/vuln/detail/CVE-2025-38513), [CVE-2025-38460](https://nvd.nist.gov/vuln/detail/CVE-2025-38460), [CVE-2025-38467](https://nvd.nist.gov/vuln/detail/CVE-2025-38467), [CVE-2025-38466](https://nvd.nist.gov/vuln/detail/CVE-2025-38466), [CVE-2025-38465](https://nvd.nist.gov/vuln/detail/CVE-2025-38465), [CVE-2025-38464](https://nvd.nist.gov/vuln/detail/CVE-2025-38464), [CVE-2025-38462](https://nvd.nist.gov/vuln/detail/CVE-2025-38462), [CVE-2025-38461](https://nvd.nist.gov/vuln/detail/CVE-2025-38461), [CVE-2025-38445](https://nvd.nist.gov/vuln/detail/CVE-2025-38445), [CVE-2025-38444](https://nvd.nist.gov/vuln/detail/CVE-2025-38444), [CVE-2025-38443](https://nvd.nist.gov/vuln/detail/CVE-2025-38443), [CVE-2025-38441](https://nvd.nist.gov/vuln/detail/CVE-2025-38441), [CVE-2025-38459](https://nvd.nist.gov/vuln/detail/CVE-2025-38459), [CVE-2025-38458](https://nvd.nist.gov/vuln/detail/CVE-2025-38458), [CVE-2025-38457](https://nvd.nist.gov/vuln/detail/CVE-2025-38457), [CVE-2025-38439](https://nvd.nist.gov/vuln/detail/CVE-2025-38439), [CVE-2025-38448](https://nvd.nist.gov/vuln/detail/CVE-2025-38448), [CVE-2025-38375](https://nvd.nist.gov/vuln/detail/CVE-2025-38375))\n\n#### Updates:\n\n- Linux ([5.15.189](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.189) includes ([5.15.188](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.188), [5.15.187](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.187), [5.15.186](https://lwn.net/Articles/1027283/), [5.15.185](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.185), [5.15.184](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.184), [5.15.183](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.183), [5.15.182](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.182), [5.15.181](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.181), [5.15.180](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.180)))\n- ca-certificates ([3.114](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html) includes ([3.113](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html), [3.113.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html), [3.112](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html), [3.111](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html), [3.110](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html)))"
  }
}
