{
  "2605.10.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2020-12-16 12:01:59 +0000",
    "major_software": {
      "docker": [
        "19.03.14"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.83"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "Changes:\n\n*   The Linux kernel is compiled with FIPS support\n*   Containerd CRI plugin got enabled by default, only the containerd socket path needs to be specified as kubelet parameter for Kubernetes 1.20 to use containerd instead of Docker ([Flatcar#283](https://github.com/kinvolk/Flatcar/issues/283))\n\nUpdates:\n\n*   Linux (5.4.83)\n*   Docker (19.03.14)\n*   containerd (1.4.3)\n*   systemd (246.6)\n"
  },
  "2605.12.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-02-02 13:26:13 +0000",
    "major_software": {
      "docker": [
        "19.03.14"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.92"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "**Security fixes**\n\n*   Linux [CVE-2020-27815](https://www.openwall.com/lists/oss-security/2020/11/30/5), [CVE-2020-29568](https://nvd.nist.gov/vuln/detail/CVE-2020-29568), [CVE-2020-29569](https://nvd.nist.gov/vuln/detail/CVE-2020-29569), [CVE-2020-28374](https://nvd.nist.gov/vuln/detail/CVE-2020-28374),[ CVE-2020-36158](https://nvd.nist.gov/vuln/detail/CVE-2020-36158)\n*   Go[ CVE-2021-3114](https://github.com/golang/go/issues/43786)\n*   sudo [CVE-2021-3156](https://nvd.nist.gov/vuln/detail/CVE-2021-3156),[ CVE-2021-23239](https://nvd.nist.gov/vuln/detail/CVE-2021-23239)\n\n**Bug fixes**\n\n*   networkd: avoid managing MAC addresses for veth devices ([kinvolk/init#33](https://github.com/kinvolk/init/pull/33))\n*   `/etc/iscsi/initiatorname.iscsi` is generated by the iscsi-init service ([#321](https://github.com/kinvolk/Flatcar/issues/321))\n*   Prevent iscsiadm buffer overflow ([#318](https://github.com/kinvolk/Flatcar/issues/318))\n*   Revert to building docker and containerd with go1.13 instead of go1.15. This reduces the SIGURG log spam ([#315](https://github.com/kinvolk/Flatcar/issues/315))\n\n**Changes**\n\n*   The containerd socket is now available in the default location (`/run/containerd/containerd.sock`) and also as a symlink in the previous location (`/run/docker/libcontainerd/docker-containerd.sock`) ([#771](https://github.com/kinvolk/coreos-overlay/pull/771))\n*   With the iscsi update, the service unit has changed from iscsid to iscsi ([#791](https://github.com/kinvolk/coreos-overlay/pull/791))\n*   AWS Pro: include scripts to facilitate setup of EKS workers ([#794](https://github.com/kinvolk/coreos-overlay/pull/794))\n\n**Updates**\n\n*   Linux ([5.4.92](https://lwn.net/Articles/843687/))\n*   open-iscsi ([2.1.3](https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.3))\n*   Go ([1.15.7](https://go.googlesource.com/go/+/refs/tags/go1.15.7))\n*   sudo ([1.9.5p2](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_5p2))\n"
  },
  "2605.13.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-03-02 12:23:32 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.101"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "**Security fixes**\n\n*   Linux - [CVE-2021-20194](https://nvd.nist.gov/vuln/detail/CVE-2021-20194), [CVE-2021-3348](https://nvd.nist.gov/vuln/detail/CVE-2021-3348), [CVE-2020-27825](https://nvd.nist.gov/vuln/detail/CVE-2020-27825), [CVE-2021-3347](https://nvd.nist.gov/vuln/detail/CVE-2021-3347), [CVE-2021-26931](https://nvd.nist.gov/vuln/detail/CVE-2021-26931), [CVE-2021-26930](https://nvd.nist.gov/vuln/detail/CVE-2021-26930), [CVE-2021-26932](https://nvd.nist.gov/vuln/detail/CVE-2021-26932)\n\n**Bug fixes**\n\n*   login message (motd): filter out bullet point when parsing failed units ([baselayout#16](https://github.com/kinvolk/baselayout/pull/16))\n*   tcsd.service: use correct file permissions ([coreos-overlay#809](https://github.com/kinvolk/coreos-overlay/pull/809))\n*   Use LTS 2021 as OS codename instead of the wrong LTS 2020 name\n*   Flatcar Pro for AWS: flatcar-eks: add missing mkdir and update to latest versions ([coreos-overlay#817](https://github.com/kinvolk/coreos-overlay/pull/817))\n\n**Updates**\n\n*   Linux [5.4.101](https://lwn.net/Articles/847590/)\n"
  },
  "2605.14.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-03-25 15:40:57 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.107"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "**Security fixes**\n\n\n\n*   Linux ([CVE-2021-28375](https://nvd.nist.gov/vuln/detail/CVE-2021-28375), [CVE-2021-28660](https://nvd.nist.gov/vuln/detail/CVE-2021-28660), [CVE-2021-27363](https://nvd.nist.gov/vuln/detail/CVE-2021-27363), [CVE-2021-27365](https://nvd.nist.gov/vuln/detail/CVE-2021-27365), [CVE-2021-28038](https://nvd.nist.gov/vuln/detail/CVE-2021-28038), [CVE-2021-27364](https://nvd.nist.gov/vuln/detail/CVE-2021-27364), [CVE-2020-25639](https://nvd.nist.gov/vuln/detail/CVE-2020-25639))\n*   openssl ([CVE-2021-23840](https://nvd.nist.gov/vuln/detail/CVE-2021-23840),[ CVE-2021-23841](https://nvd.nist.gov/vuln/detail/CVE-2021-23841), [CVE-2020-1971](https://nvd.nist.gov/vuln/detail/CVE-2020-1971),[ CVE-2021-23840](https://nvd.nist.gov/vuln/detail/CVE-2021-23840),[ CVE-2021-23841](https://nvd.nist.gov/vuln/detail/CVE-2021-23841), [CVE-2021-3449](https://nvd.nist.gov/vuln/detail/CVE-2021-3449),[ CVE-2021-3450](https://nvd.nist.gov/vuln/detail/CVE-2021-3450))\n\n**Updates**\n\n\n\n*   Linux ([5.4.107](https://lwn.net/Articles/849952/))\n*   openssl ([1.1.1k](https://mta.openssl.org/pipermail/openssl-announce/2021-March/000197.html))\n*   open-iscsi ([2.1.4](https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.4))\n*   containerd ([1.4.4](https://github.com/containerd/containerd/releases/tag/v1.4.4))"
  },
  "2605.15.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-04-28 13:38:02 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.114"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "\n**Security fixes**\n\n\n\n*   Linux ([CVE-2021-28964](https://nvd.nist.gov/vuln/detail/CVE-2021-28964), [CVE-2021-28972](https://nvd.nist.gov/vuln/detail/CVE-2021-28972), [CVE-2021-28971](https://nvd.nist.gov/vuln/detail/CVE-2021-28971), [CVE-2021-28688](https://nvd.nist.gov/vuln/detail/CVE-2021-28688), [CVE-2021-29264](https://nvd.nist.gov/vuln/detail/CVE-2021-29264),[CVE-2021-29647](https://nvd.nist.gov/vuln/detail/CVE-2021-29647), [CVE-2021-29650](https://nvd.nist.gov/vuln/detail/CVE-2021-29650), [CVE-2021-29154](https://nvd.nist.gov/vuln/detail/CVE-2021-29154), [CVE-2021-23133](https://nvd.nist.gov/vuln/detail/CVE-2021-23133))\n\n**Bug fixes**\n\n\n\n*   Fix the patch to update DefaultTasksMax in systemd ([coreos-overlay#971](https://github.com/kinvolk/coreos-overlay/pull/971))\n\n**Updates**\n\n\n\n*   Linux ([5.4.114](https://lwn.net/Articles/853763/))"
  },
  "2605.16.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-05-19 11:36:59 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.119"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "**Security fixes**\n\n*   Linux ([CVE-2021-31829](https://nvd.nist.gov/vuln/detail/CVE-2021-31829))\n*   runc ([CVE-2021-30465](https://nvd.nist.gov/vuln/detail/CVE-2021-30465))\n\n**Updates**\n\n*   Linux ([5.4.119](https://lwn.net/Articles/856270/))\n*   systemd ([246.13](https://github.com/systemd/systemd-stable/releases/tag/v246.13))"
  },
  "2605.17.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-06-17 10:32:57 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.125"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "\n**Security fixes**\n\n\n\n*   Linux ([CVE-2020-26558](https://nvd.nist.gov/vuln/detail/CVE-2020-26558), [CVE-2021-0129](https://nvd.nist.gov/vuln/detail/CVE-2021-0129), [CVE-2020-24587](https://nvd.nist.gov/vuln/detail/CVE-2020-24587), [CVE-2020-24586](https://nvd.nist.gov/vuln/detail/CVE-2020-24586), [CVE-2020-24588](https://nvd.nist.gov/vuln/detail/CVE-2020-24588), [CVE-2020-26139](https://nvd.nist.gov/vuln/detail/CVE-2020-26139), [CVE-2020-26145](https://nvd.nist.gov/vuln/detail/CVE-2020-26145), [CVE-2020-26141](https://nvd.nist.gov/vuln/detail/CVE-2020-26141), [CVE-2021-3564](https://nvd.nist.gov/vuln/detail/CVE-2021-3564), [CVE-2021-3587](https://nvd.nist.gov/vuln/detail/CVE-2021-3587), [CVE-2021-3573](https://nvd.nist.gov/vuln/detail/CVE-2021-3573))\n\n**Updates**\n\n\n\n*   Linux ([5.4.125](https://lwn.net/Articles/859023/))"
  },
  "2605.18.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-07-28 08:28:35 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.134"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "**Security Fixes**\n\n\n\n* Linux ([CVE-2021-34693](https://nvd.nist.gov/vuln/detail/CVE-2021-34693), [CVE-2020-26541](https://nvd.nist.gov/vuln/detail/CVE-2020-26541), [CVE-2021-35039](https://nvd.nist.gov/vuln/detail/CVE-2021-35039), [CVE-2021-22543](https://nvd.nist.gov/vuln/detail/CVE-2021-22543), [CVE-2020-36311](https://nvd.nist.gov/vuln/detail/CVE-2020-36311), [CVE-2021-3609](https://nvd.nist.gov/vuln/detail/CVE-2021-3609), [CVE-2021-3655](https://nvd.nist.gov/vuln/detail/CVE-2021-3655), [CVE-2021-33909](https://nvd.nist.gov/vuln/detail/CVE-2021-33909))\n\n**Updates**\n\n\n\n* Linux ([5.4.134](https://lwn.net/Articles/863649/))"
  },
  "2605.19.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-08-19 13:37:31 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.141"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "\n_Changes since  **LTS 2605.18.1**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-38204](https://nvd.nist.gov/vuln/detail/CVE-2021-38204), [CVE-2021-3679](https://nvd.nist.gov/vuln/detail/CVE-2021-3679), [CVE-2021-37576](https://nvd.nist.gov/vuln/detail/CVE-2021-37576), [CVE-2021-33624](https://nvd.nist.gov/vuln/detail/CVE-2021-33624), [CVE-2021-38198](https://nvd.nist.gov/vuln/detail/CVE-2021-38198), [CVE-2021-38205](https://nvd.nist.gov/vuln/detail/CVE-2021-38205))\n* Systemd ([CVE-2020-13529](https://nvd.nist.gov/vuln/detail/CVE-2020-13529), [CVE-2021-33910](https://nvd.nist.gov/vuln/detail/CVE-2021-33910))\n\n**Updates**\n\n\n\n* Linux ([5.4.141](https://lwn.net/Articles/866303/))\n* Systemd ([246.15](https://github.com/systemd/systemd-stable/releases/tag/v246.15))"
  },
  "2605.20.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-09-01 14:16:35 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.143"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "New **LTS** release **2605.20.1**\n\n_Changes since **LTS 2605.19.1**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-3653](https://nvd.nist.gov/vuln/detail/CVE-2021-3653), [CVE-2021-3656](https://nvd.nist.gov/vuln/detail/CVE-2021-3656), [CVE-2021-38166](https://nvd.nist.gov/vuln/detail/CVE-2021-38166)) \n* openssl ([CVE-2021-3711](https://nvd.nist.gov/vuln/detail/CVE-2021-3711), [CVE-2021-3712](https://nvd.nist.gov/vuln/detail/CVE-2021-3712))\n\n**Updates**\n\n\n\n* Linux ([5.4.143](https://lwn.net/Articles/867498/))\n* openssl ([1.1.1l](https://mta.openssl.org/pipermail/openssl-announce/2021-August/000206.html))"
  },
  "2605.21.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-09-27 08:32:37 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.147"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "New **LTS** release **2605.21.1**\n\n_Changes since **LTS 2605.20.1**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-3753](https://nvd.nist.gov/vuln/detail/CVE-2021-3753),[ CVE-2021-3739](https://nvd.nist.gov/vuln/detail/CVE-2021-3739), [CVE-2021-40490](https://nvd.nist.gov/vuln/detail/CVE-2021-40490), [CVE-2021-34556](https://nvd.nist.gov/vuln/detail/CVE-2021-34556), [CVE-2021-35477](https://nvd.nist.gov/vuln/detail/CVE-2021-35477))\n\n**Updates**\n\n\n\n* Linux ([5.4.147](https://lwn.net/Articles/869407/))"
  },
  "2605.22.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-10-25 15:57:52 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.155"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "\nNew **LTS** release **2605.22.1**\n\n_Changes since **LTS 2605.21.1**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-42252](https://nvd.nist.gov/vuln/detail/CVE-2021-42252), [CVE-2021-20320](https://nvd.nist.gov/vuln/detail/CVE-2021-20320), [CVE-2020-16119](https://nvd.nist.gov/vuln/detail/CVE-2020-16119), [CVE-2021-37159](https://nvd.nist.gov/vuln/detail/CVE-2021-37159), [CVE-2021-3764](https://nvd.nist.gov/vuln/detail/CVE-2021-3764), [CVE-2021-3744](https://nvd.nist.gov/vuln/detail/CVE-2021-3744), [CVE-2021-38300](https://nvd.nist.gov/vuln/detail/CVE-2021-38300), [CVE-2021-20321](https://nvd.nist.gov/vuln/detail/CVE-2021-20321), [CVE-2021-41864](https://nvd.nist.gov/vuln/detail/CVE-2021-41864))\n\n**Bux fixes**\n\n\n\n* The tcsd service for TPM 1 is not started on machines with TPM 2 anymore where it fails and isn\u2019t necessary ([flatcar-linux/coreos-overlay#1364](https://github.com/flatcar/coreos-overlay/pull/1364))\n\n**Updates**\n\n\n\n* Linux ([5.4.155](https://lwn.net/Articles/873466/))\n* ca-certificates ([3.69.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_69_1.html#nss-3-69-1-release-notes))"
  },
  "2605.23.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-11-09 08:12:13 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.157"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "\nNew **LTS** release **2605.23.1**\n\n_Changes since **LTS 2605.22.1**_\n\n**Security fixes**\n\n\n\n* Linux ([CVE-2021-3760](https://nvd.nist.gov/vuln/detail/CVE-2021-3760), [CVE-2021-3772](https://nvd.nist.gov/vuln/detail/CVE-2021-3772), [CVE-2021-43056](https://nvd.nist.gov/vuln/detail/CVE-2021-43056), [CVE-2021-43389](https://nvd.nist.gov/vuln/detail/CVE-2021-43389))\n\n**Bug fixes**\n\n\n\n* Use https protocol instead of git for Github URLs ([flatcar-linux/coreos-overlay#1394](https://github.com/flatcar/coreos-overlay/pull/1394))\n\n**Updates**\n\n\n\n* Linux ([5.4.157](https://lwn.net/Articles/874853/))"
  },
  "2605.24.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2021-12-15 19:41:33 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.164"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "\n\nNew **LTS** release **2605.24.1**\n\n_Changes since **LTS 2605.23.1**_\n\n**Security Fixes**\n\n\n\n* Linux ([CVE-2021-42739](https://nvd.nist.gov/vuln/detail/CVE-2021-42739), [CVE-2021-3640](https://nvd.nist.gov/vuln/detail/CVE-2021-3640), [CVE-2021-4002](https://nvd.nist.gov/vuln/detail/CVE-2021-4002), [CVE-2020-27820](https://nvd.nist.gov/vuln/detail/CVE-2020-27820), [CVE-2021-43975](https://nvd.nist.gov/vuln/detail/CVE-2021-43975))\n* ca-certificates ([CVE-2021-43527](https://nvd.nist.gov/vuln/detail/CVE-2021-43527))\n\n**Updates**\n\n\n\n* Linux ([5.4.164](https://lwn.net/Articles/878042))\n* ca-certificates ([3.73](https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/vy9284s8APM))\n* repo ([2.8](https://gerrit.googlesource.com/git-repo/+/refs/tags/v2.8))"
  },
  "2605.25.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2022-01-26 08:39:00 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.173"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "New **LTS** release **2605.25.1**\n\n_Changes since **LTS 2605.24.1**_\n\n#### Security fixes\n- Linux ([CVE-2021-4135](https://nvd.nist.gov/vuln/detail/CVE-2021-4135), [CVE-2021-4155](https://nvd.nist.gov/vuln/detail/CVE-2021-4155), [CVE-2021-28711](https://nvd.nist.gov/vuln/detail/CVE-2021-28711), [CVE-2021-28712](https://nvd.nist.gov/vuln/detail/CVE-2021-28712), [CVE-2021-28713](https://nvd.nist.gov/vuln/detail/CVE-2021-28713), [CVE-2021-28714](https://nvd.nist.gov/vuln/detail/CVE-2021-28714), [CVE-2021-28715](https://nvd.nist.gov/vuln/detail/CVE-2021-28715), [CVE-2021-39685](https://nvd.nist.gov/vuln/detail/CVE-2021-39685), [CVE-2021-44733](https://nvd.nist.gov/vuln/detail/CVE-2021-44733), [CVE-2021-45095](https://nvd.nist.gov/vuln/detail/CVE-2021-45095), [CVE-2022-0185](https://nvd.nist.gov/vuln/detail/CVE-2022-0185))\n- ca-certificates ([CVE-2021-43527](https://nvd.nist.gov/vuln/detail/CVE-2021-43527))\n\n#### Updates\n- Linux ([5.4.173](https://lwn.net/Articles/881965)) (includes [5.4.165](https://lwn.net/Articles/878633), [5.4.166](https://lwn.net/Articles/878900), [5.4.167](https://lwn.net/Articles/879025), [5.4.168](https://lwn.net/Articles/879498), [5.4.169](https://lwn.net/Articles/879999), [5.4.170](https://lwn.net/Articles/880467), [5.4.171](https://lwn.net/Articles/881016), [5.4.172](https://lwn.net/Articles/881550))\n- ca-certificates ([3.74](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_74.html)) (includes [3.73.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_73_1.html))"
  },
  "2605.26.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2022-03-07 13:10:55 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.181"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "New **LTS-2605** Release **2605.26.1**\n\n_Changes since **LTS 2605.25.1**_\n\n#### Security fixes\n- Linux ([CVE-2021-43976](https://nvd.nist.gov/vuln/detail/CVE-2021-43976), [CVE-2022-0330](https://nvd.nist.gov/vuln/detail/CVE-2022-0330), [CVE-2022-22942](https://nvd.nist.gov/vuln/detail/CVE-2022-22942), [CVE-2022-24448](https://nvd.nist.gov/vuln/detail/CVE-2022-24448), [CVE-2022-0617](https://nvd.nist.gov/vuln/detail/CVE-2022-0617), [CVE-2022-24959](https://nvd.nist.gov/vuln/detail/CVE-2022-24959))\n\n\n#### Updates\n- Linux ([5.4.176](https://lwn.net/Articles/883443)) (from 5.4.173)\n"
  },
  "2605.27.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2022-04-07 12:12:25 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.188"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "\nNew **LTS-2021** Release **2605.27.1**\n\n_Changes since **LTS 2605.26.1**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-0492](https://nvd.nist.gov/vuln/detail/CVE-2022-0492), [CVE-2022-0001](https://nvd.nist.gov/vuln/detail/CVE-2022-0001), [CVE-2022-0002](https://nvd.nist.gov/vuln/detail/CVE-2022-0002), [CVE-2022-1011](https://nvd.nist.gov/vuln/detail/CVE-2022-1011), [CVE-2022-1016](https://nvd.nist.gov/vuln/detail/CVE-2022-1016), [CVE-2022-23036](https://nvd.nist.gov/vuln/detail/CVE-2022-23036), [CVE-2022-23037](https://nvd.nist.gov/vuln/detail/CVE-2022-23037), [CVE-2022-23038](https://nvd.nist.gov/vuln/detail/CVE-2022-23038), [CVE-2022-23039](https://nvd.nist.gov/vuln/detail/CVE-2022-23039), [CVE-2022-23040](https://nvd.nist.gov/vuln/detail/CVE-2022-23040), [CVE-2022-23041](https://nvd.nist.gov/vuln/detail/CVE-2022-23041), [CVE-2022-23042](https://nvd.nist.gov/vuln/detail/CVE-2022-23042), [CVE-2022-23960](https://nvd.nist.gov/vuln/detail/CVE-2022-23960), [CVE-2022-25636](https://nvd.nist.gov/vuln/detail/CVE-2022-25636), [CVE-2022-27666](https://nvd.nist.gov/vuln/detail/CVE-2022-27666), [CVE-2022-28356](https://nvd.nist.gov/vuln/detail/CVE-2022-28356))\n\n#### Updates:\n\n- Linux ([5.4.188](https://lwn.net/Articles/889440)) (from 5.4.181)\n- ca-certificates ([3.77](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html))\n"
  },
  "2605.28.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2022-06-23 08:51:23 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.196"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "# New **LTS-2021** Release **2605.28.1**\n\n_Changes since **LTS-2021 2605.27.1**_\n\n## Security fixes:\n\n- Linux ([CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390), [CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158), [CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353), [CVE-2022-30594](https://nvd.nist.gov/vuln/detail/CVE-2022-30594), [CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198), [CVE-2021-4197](https://nvd.nist.gov/vuln/detail/CVE-2021-4197), [CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389), [CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516), [CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204), [CVE-2022-1205](https://nvd.nist.gov/vuln/detail/CVE-2022-1205), [CVE-2022-29581](https://nvd.nist.gov/vuln/detail/CVE-2022-29581), [CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388), [CVE-2022-1836](https://nvd.nist.gov/vuln/detail/CVE-2022-1836), [CVE-2022-1048](https://nvd.nist.gov/vuln/detail/CVE-2022-1048), [CVE-2022-1734](https://nvd.nist.gov/vuln/detail/CVE-2022-1734), [CVE-2022-0494](https://nvd.nist.gov/vuln/detail/CVE-2022-0494), [CVE-2022-28893](https://nvd.nist.gov/vuln/detail/CVE-2022-28893), [CVE-2022-1729](https://nvd.nist.gov/vuln/detail/CVE-2022-1729), [CVE-2022-0854](https://nvd.nist.gov/vuln/detail/CVE-2022-0854), [CVE-2022-26490](https://nvd.nist.gov/vuln/detail/CVE-2022-26490), [CVE-2022-28356](https://nvd.nist.gov/vuln/detail/CVE-2022-28356), [CVE-2022-1016](https://nvd.nist.gov/vuln/detail/CVE-2022-1016), [CVE-2022-27666](https://nvd.nist.gov/vuln/detail/CVE-2022-27666))\n\n\n## Updates:\n\n- Linux ([5.4.196](https://lwn.net/Articles/896224/) from 5.4.188)\n- ca-certificates ([3.78](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html))"
  },
  "2605.29.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2022-06-23 11:56:51 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.199"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "New **LTS-2021** Release **2605.29.1**\n\nChanges since **LTS 2605.28.1**\n\n#### Security fixes:\n\n- Linux ([CVE-2022-1012](https://nvd.nist.gov/vuln/detail/CVE-2022-1012), [CVE-2022-32250](https://nvd.nist.gov/vuln/detail/CVE-2022-32250), [CVE-2022-21499](https://nvd.nist.gov/vuln/detail/CVE-2022-21499), [CVE-2022-32981](https://nvd.nist.gov/vuln/detail/CVE-2022-32981))\n\n#### Updates:\n\n- Linux ([5.4.199](https://lwn.net/Articles/898126) (includes [5.4.198](https://lwn.net/Articles/897902), [5.4.197](https://lwn.net/Articles/897169)))\n- ca-certificates ([3.79](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_79.html))"
  },
  "2605.30.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2022-08-04 12:03:25 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.206"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "New LTS-2021 Release 2605.30.1\n\nChanges since LTS-2021 2605.29.1\n\n## Security fixes:\n\n- Linux ([CVE-2021-33655](https://nvd.nist.gov/vuln/detail/CVE-2021-33655), [CVE-2021-33656](https://nvd.nist.gov/vuln/detail/CVE-2021-33656), [CVE-2022-2318](https://nvd.nist.gov/vuln/detail/CVE-2022-2318), [CVE-2022-26365](https://nvd.nist.gov/vuln/detail/CVE-2022-26365), [CVE-2022-32296](https://nvd.nist.gov/vuln/detail/CVE-2022-32296), [CVE-2022-33740](https://nvd.nist.gov/vuln/detail/CVE-2022-33740), [CVE-2022-33741](https://nvd.nist.gov/vuln/detail/CVE-2022-33741), [CVE-2022-33742](https://nvd.nist.gov/vuln/detail/CVE-2022-33742), [CVE-2022-33744](https://nvd.nist.gov/vuln/detail/CVE-2022-33744))\n\n## Bug fixes:\n\n- Removed outdated LTS channel information printed on login ([init#75](https://github.com/flatcar/init/pull/75))\n\n## Changes:\n\n\n## Updates:\n\n- Linux ([5.4.206](https://lwn.net/Articles/901382) (includes [5.4.205](https://lwn.net/Articles/900908), [5.4.204](https://lwn.net/Articles/900323), [5.4.203](https://lwn.net/Articles/899790), [5.4.202](https://lwn.net/Articles/899372), [5.4.201](https://lwn.net/Articles/899089), [5.4.200](https://lwn.net/Articles/898624)))\n- ca-certificates ([3.80](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_80.html))\n"
  },
  "2605.31.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2022-09-01 12:57:10 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.210"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "**NOTE** LTS-2021 is near the designated end of its 18 month lifespan and will only receive 1 more update by the end of September. If you use a fixed LTS channel please switch to LTS-2022, the new LTS which has been published in May. After the next update by end of September  there will be no more releases for the LTS-2021 channel. Please check your nodes' `GROUP=` setting in `/etc/flatcar/update.conf` to determine if you need to take action. Please refer to the Flatcar documentation on [switching channels](https://flatcar-linux.org/docs/latest/setup/releases/switching-channels/#freezing-an-lts-stream) to switch to LTS-2022.\n\n\n_Changes since **LTS 2605.30.1**_\n\n#### Security fixes:\n\n- Linux ([CVE-2021-4159](https://nvd.nist.gov/vuln/detail/CVE-2021-4159), [CVE-2022-1462](https://nvd.nist.gov/vuln/detail/CVE-2022-1462), [CVE-2022-20369](https://nvd.nist.gov/vuln/detail/CVE-2022-20369), [CVE-2022-21505](https://nvd.nist.gov/vuln/detail/CVE-2022-21505), [CVE-2022-26373](https://nvd.nist.gov/vuln/detail/CVE-2022-26373), [CVE-2022-36123](https://nvd.nist.gov/vuln/detail/CVE-2022-36123), [CVE-2022-36879](https://nvd.nist.gov/vuln/detail/CVE-2022-36879), [CVE-2022-36946](https://nvd.nist.gov/vuln/detail/CVE-2022-36946))\n\n#### Changes:\n\n- The new image signing subkey was added to the public key embedded into `flatcar-install` (the old expired on 10th August 2022), only an updated `flatcar-install` script can verify releases signed with the new key ([init#79](https://github.com/flatcar/init/pull/79))\n\n#### Updates:\n\n- Linux ([5.4.210](https://lwn.net/Articles/904463) (includes [5.4.209](https://lwn.net/Articles/903690), [5.4.208](https://lwn.net/Articles/902919), [5.4.207](https://lwn.net/Articles/902103)))\n- ca-certificates ([3.82](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_82.html))\n\nNote: LTS 2605.32.1 i.e the next release to be release in the month of September would be the last release for LTS-2021. Post that there will be no more releases for the channel. Please upgrade your workloads to LTS-2022 as soon as possible.\n"
  },
  "2605.32.1": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2022-10-17 15:09:11 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.210"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "_Changes since **LTS 2605.31.1**_\n\n#### Updates:\n\n- ca-certificates ([3.83](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_83.html))"
  },
  "3033.3.0": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-05-05 08:46:50 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.109"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **LTS-2022** Release **3033.3.0**\n\n_Changes since **LTS-2021 2605.27.1**_\n\nUpdate to CGroupsV2: Flatcar Container Linux migrates to the unified cgroup hierarchy (aka cgroups v2)! New nodes will utilize cgroups v2 by default. Existing nodes remain on cgroups v1 and need to be manually migrated to cgroups v2. To learn more about the cgroups v2 on Flatcar Container Linux and the migration guide, please refer to https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/\n\nOther notable changes: cri-tools and lbzip2 got added, PAM tally2 got replaced by PAM faillock, only a single Docker version is now shipped (20.10), and rkt, kubelet-wapper, dhcpcd, and containerd-stress got removed.\n\n### Security fixes:\n\n(Note: Not all fixed issues may have been present in the old versions)\n- Linux ([CVE-2020-27170](https://nvd.nist.gov/vuln/detail/CVE-2020-27170), [CVE-2020-25220](https://nvd.nist.gov/vuln/detail/CVE-2020-25220), [CVE-2020-27171](https://nvd.nist.gov/vuln/detail/CVE-2020-27171), [CVE-2020-35499](https://nvd.nist.gov/vuln/detail/CVE-2020-35499), [CVE-2022-0286](https://nvd.nist.gov/vuln/detail/CVE-2022-0286), [CVE-2022-0516](https://nvd.nist.gov/vuln/detail/CVE-2022-0516), [CVE-2021-3411](https://nvd.nist.gov/vuln/detail/CVE-2021-3411), [CVE-2021-3489](https://nvd.nist.gov/vuln/detail/CVE-2021-3489), [CVE-2021-3490](https://nvd.nist.gov/vuln/detail/CVE-2021-3490), [CVE-2021-3491](https://nvd.nist.gov/vuln/detail/CVE-2021-3491), [CVE-2021-3501](https://nvd.nist.gov/vuln/detail/CVE-2021-3501), [CVE-2021-3543](https://nvd.nist.gov/vuln/detail/CVE-2021-3543), [CVE-2021-4001](https://nvd.nist.gov/vuln/detail/CVE-2021-4001), [CVE-2021-4028](https://nvd.nist.gov/vuln/detail/CVE-2021-4028), [CVE-2021-4204](https://nvd.nist.gov/vuln/detail/CVE-2021-4204), [CVE-2021-20268](https://nvd.nist.gov/vuln/detail/CVE-2021-20268), [CVE-2021-22600](https://nvd.nist.gov/vuln/detail/CVE-2021-22600), [CVE-2021-26708](https://nvd.nist.gov/vuln/detail/CVE-2021-26708), [CVE-2021-28039](https://nvd.nist.gov/vuln/detail/CVE-2021-28039), [CVE-2021-28691](https://nvd.nist.gov/vuln/detail/CVE-2021-28691), [CVE-2021-28952](https://nvd.nist.gov/vuln/detail/CVE-2021-28952), [CVE-2021-29266](https://nvd.nist.gov/vuln/detail/CVE-2021-29266), [CVE-2021-29646](https://nvd.nist.gov/vuln/detail/CVE-2021-29646), [CVE-2021-29649](https://nvd.nist.gov/vuln/detail/CVE-2021-29649), [CVE-2021-29657](https://nvd.nist.gov/vuln/detail/CVE-2021-29657), [CVE-2021-34866](https://nvd.nist.gov/vuln/detail/CVE-2021-34866), [CVE-2021-38166](https://nvd.nist.gov/vuln/detail/CVE-2021-38166), [CVE-2021-38206](https://nvd.nist.gov/vuln/detail/CVE-2021-38206), [CVE-2021-38207](https://nvd.nist.gov/vuln/detail/CVE-2021-38207), [CVE-2021-38209](https://nvd.nist.gov/vuln/detail/CVE-2021-38209), [CVE-2021-31440](https://nvd.nist.gov/vuln/detail/CVE-2021-31440), [CVE-2021-41073](https://nvd.nist.gov/vuln/detail/CVE-2021-41073), [CVE-2021-42327](https://nvd.nist.gov/vuln/detail/CVE-2021-42327), [CVE-2021-45402](https://nvd.nist.gov/vuln/detail/CVE-2021-45402), [CVE-2021-43267](https://nvd.nist.gov/vuln/detail/CVE-2021-43267), [CVE-2021-46283](https://nvd.nist.gov/vuln/detail/CVE-2021-46283), [CVE-2022-0847](https://nvd.nist.gov/vuln/detail/CVE-2022-0847))\n- systemd ([CVE-2020-13529](https://nvd.nist.gov/vuln/detail/CVE-2020-13529), [CVE-2021-3997](https://nvd.nist.gov/vuln/detail/CVE-2021-3997), [CVE-2021-33910](https://nvd.nist.gov/vuln/detail/CVE-2021-33910))\n- Docker ([CVE-2021-21284](https://nvd.nist.gov/vuln/detail/CVE-2021-21284), [CVE-2021-21285](https://nvd.nist.gov/vuln/detail/CVE-2021-21285), [CVE-2021-41089](https://nvd.nist.gov/vuln/detail/CVE-2021-41089), [CVE-2021-41091](https://nvd.nist.gov/vuln/detail/CVE-2021-41091), [CVE-2021-41092](https://nvd.nist.gov/vuln/detail/CVE-2021-41092))\n- containerd ([CVE-2020-15257](https://nvd.nist.gov/vuln/detail/CVE-2020-15257), [CVE-2021-21334](https://nvd.nist.gov/vuln/detail/CVE-2021-21334), [CVE-2021-32760](https://nvd.nist.gov/vuln/detail/CVE-2021-32760), [CVE-2021-41103](https://nvd.nist.gov/vuln/detail/CVE-2021-41103), [CVE-2021-43816](https://nvd.nist.gov/vuln/detail/CVE-2021-43816), [CVE-2022-23648](https://nvd.nist.gov/vuln/detail/CVE-2022-23648), [CVE-2022-24769](https://nvd.nist.gov/vuln/detail/CVE-2022-24769))\n- Docker, containerd ([CVE-2021-41190](https://nvd.nist.gov/vuln/detail/CVE-2021-41190))\n- glibc ([CVE-2019-25013](https://nvd.nist.gov/vuln/detail/CVE-2019-25013), [CVE-2020-27618](https://nvd.nist.gov/vuln/detail/CVE-2020-27618), [CVE-2020-29562](https://nvd.nist.gov/vuln/detail/CVE-2020-29562), [CVE-2021-3998](https://nvd.nist.gov/vuln/detail/CVE-2021-3998), [CVE-2021-3999](https://nvd.nist.gov/vuln/detail/CVE-2021-3999), [CVE-2021-27645](https://nvd.nist.gov/vuln/detail/CVE-2021-27645), [CVE-2021-33574](https://nvd.nist.gov/vuln/detail/CVE-2021-33574), [CVE-2021-35942](https://nvd.nist.gov/vuln/detail/CVE-2021-35942), [CVE-2021-38604](https://nvd.nist.gov/vuln/detail/CVE-2021-38604), [CVE-2022-23218](https://nvd.nist.gov/vuln/detail/CVE-2022-23218), [CVE-2022-23219](https://nvd.nist.gov/vuln/detail/CVE-2022-23219))\n- Go ([CVE-2020-28362](https://nvd.nist.gov/vuln/detail/CVE-2020-28362), [CVE-2020-28366](https://nvd.nist.gov/vuln/detail/CVE-2020-28366), [CVE-2020-28367](https://nvd.nist.gov/vuln/detail/CVE-2020-28367), [CVE-2021-27918](https://nvd.nist.gov/vuln/detail/CVE-2021-27918), [CVE-2021-27919](https://nvd.nist.gov/vuln/detail/CVE-2021-27919), [CVE-2021-29923](https://nvd.nist.gov/vuln/detail/CVE-2021-29923), [CVE-2021-31525](https://nvd.nist.gov/vuln/detail/CVE-2021-31525), [CVE-2021-33195](https://nvd.nist.gov/vuln/detail/CVE-2021-33195),[CVE-2021-33196](https://nvd.nist.gov/vuln/detail/CVE-2021-33196),[CVE-2021-33197](https://nvd.nist.gov/vuln/detail/CVE-2021-33197),[CVE-2021-33198](https://nvd.nist.gov/vuln/detail/CVE-2021-33198), [CVE-2021-34558](https://nvd.nist.gov/vuln/detail/CVE-2021-34558), [CVE-2021-36221](https://nvd.nist.gov/vuln/detail/CVE-2021-36221), [CVE-2021-38297](https://nvd.nist.gov/vuln/detail/CVE-2021-38297), [CVE-2021-39293](https://nvd.nist.gov/vuln/detail/CVE-2021-39293), [CVE-2021-44716](https://nvd.nist.gov/vuln/detail/CVE-2021-44716), [CVE-2021-44717](https://nvd.nist.gov/vuln/detail/CVE-2021-44717), [CVE-2021-41771](https://nvd.nist.gov/vuln/detail/CVE-2021-41771), [CVE-2021-41772](https://nvd.nist.gov/vuln/detail/CVE-2021-41772), [CVE-2022-23772](https://nvd.nist.gov/vuln/detail/CVE-2022-23772), [CVE-2022-23773](https://nvd.nist.gov/vuln/detail/CVE-2022-23773), [CVE-2022-23806](https://nvd.nist.gov/vuln/detail/CVE-2022-23806), [CVE-2022-24921](https://nvd.nist.gov/vuln/detail/CVE-2022-24921))\n- bash ([CVE-2019-9924](https://nvd.nist.gov/vuln/detail/CVE-2019-9924), [CVE-2019-18276](https://nvd.nist.gov/vuln/detail/CVE-2019-18276))\n- binutils ([CVE-2021-20197](https://nvd.nist.gov/vuln/detail/CVE-2021-20197), [CVE-2021-3487](https://nvd.nist.gov/vuln/detail/CVE-2021-3487), [CVE-2021-3530](https://nvd.nist.gov/vuln/detail/CVE-2021-3530), [CVE-2021-3549](https://nvd.nist.gov/vuln/detail/CVE-2021-3549))\n- boost ([CVE-2012-2677](https://nvd.nist.gov/vuln/detail/CVE-2012-2677))\n- bsdiff [CVE-2014-9862](https://nvd.nist.gov/vuln/detail/CVE-2014-9862)\n- bzip2 ([CVE-2019-12900](https://nvd.nist.gov/vuln/detail/CVE-2019-12900))\n- curl ([CVE-2021-22876](https://nvd.nist.gov/vuln/detail/CVE-2021-22876), [CVE-2021-22890](https://nvd.nist.gov/vuln/detail/CVE-2021-22890), [CVE-2021-22898](https://nvd.nist.gov/vuln/detail/CVE-2021-22898), [CVE-2021-22901](https://nvd.nist.gov/vuln/detail/CVE-2021-22901), [CVE-2021-22945](https://nvd.nist.gov/vuln/detail/CVE-2021-22945), [CVE-2021-22946](https://nvd.nist.gov/vuln/detail/CVE-2021-22946), [CVE-2021-22947](https://nvd.nist.gov/vuln/detail/CVE-2021-22947), [CVE-2021-22922](https://nvd.nist.gov/vuln/detail/CVE-2021-22922), [CVE-2021-22923](https://nvd.nist.gov/vuln/detail/CVE-2021-22923), [CVE-2021-22924](https://nvd.nist.gov/vuln/detail/CVE-2021-22924), [CVE-2021-22925](https://nvd.nist.gov/vuln/detail/CVE-2021-22925), [CVE-2021-22926](https://nvd.nist.gov/vuln/detail/CVE-2021-22926))\n- c-ares ([CVE-2020-8277](https://nvd.nist.gov/vuln/detail/CVE-2020-8277), [CVE-2021-3672](https://nvd.nist.gov/vuln/detail/CVE-2021-3672))\n- ca-certificates ([CVE-2021-43527](https://nvd.nist.gov/vuln/detail/CVE-2021-43527))\n- cifs-utils ([CVE-2020-14342](https://nvd.nist.gov/vuln/detail/CVE-2020-14342))\n- coreutils ([CVE-2017-7476](https://nvd.nist.gov/vuln/detail/CVE-2017-7476))\n- dbus ([CVE-2020-35512](https://nvd.nist.gov/vuln/detail/CVE-2020-35512))\n- expat ([CVE-2013-0340](https://nvd.nist.gov/vuln/detail/CVE-2013-0340), [CVE-2021-45960](https://nvd.nist.gov/vuln/detail/CVE-2021-45960), [CVE-2021-46143](https://nvd.nist.gov/vuln/detail/CVE-2021-46143), [CVE-2022-22822](https://nvd.nist.gov/vuln/detail/CVE-2022-22822), [CVE-2022-22823](https://nvd.nist.gov/vuln/detail/CVE-2022-22823), [CVE-2022-22824](https://nvd.nist.gov/vuln/detail/CVE-2022-22824), [CVE-2022-22825](https://nvd.nist.gov/vuln/detail/CVE-2022-22825), [CVE-2022-22826](https://nvd.nist.gov/vuln/detail/CVE-2022-22826), [CVE-2022-22827](https://nvd.nist.gov/vuln/detail/CVE-2022-22827), [CVE-2022-23852](https://nvd.nist.gov/vuln/detail/CVE-2022-23852), [CVE-2022-23990](https://nvd.nist.gov/vuln/detail/CVE-2022-23990), [CVE-2022-25235](https://nvd.nist.gov/vuln/detail/CVE-2022-25235), [CVE-2022-25236](https://nvd.nist.gov/vuln/detail/CVE-2022-25236), [CVE-2022-25313](https://nvd.nist.gov/vuln/detail/CVE-2022-25313), [CVE-2022-25314](https://nvd.nist.gov/vuln/detail/CVE-2022-25314), [CVE-2022-25315](https://nvd.nist.gov/vuln/detail/CVE-2022-25315))\n- gettext ([CVE-2020-12825](https://nvd.nist.gov/vuln/detail/CVE-2020-12825))\n- git ([CVE-2021-21300](https://nvd.nist.gov/vuln/detail/CVE-2021-21300), [CVE-2021-40330](https://nvd.nist.gov/vuln/detail/CVE-2021-40330))\n- glib ([CVE-2019-12450](https://nvd.nist.gov/vuln/detail/CVE-2019-12450), [CVE-2021-28153](https://nvd.nist.gov/vuln/detail/CVE-2021-28153), [CVE-2021-27218](https://nvd.nist.gov/vuln/detail/CVE-2021-27218), [CVE-2021-27219](https://nvd.nist.gov/vuln/detail/CVE-2021-27219))\n- gnupg ([CVE-2020-25125](https://nvd.nist.gov/vuln/detail/CVE-2020-25125))\n- gnutls ([CVE-2021-20231](https://nvd.nist.gov/vuln/detail/CVE-2021-20231), [CVE-2021-20232](https://nvd.nist.gov/vuln/detail/CVE-2021-20232))\n- gptfdisk ([CVE-2021-0308](https://nvd.nist.gov/vuln/detail/CVE-2021-0308))\n- ignition ([CVE-2020-14040](https://nvd.nist.gov/vuln/detail/CVE-2020-14040))\n- intel-microcode ([CVE-2020-8694](https://nvd.nist.gov/vuln/detail/CVE-2020-8694), [CVE-2020-8695](https://nvd.nist.gov/vuln/detail/CVE-2020-8695), [CVE-2020-8696](https://nvd.nist.gov/vuln/detail/CVE-2020-8696), [CVE-2020-8698](https://nvd.nist.gov/vuln/detail/CVE-2020-8698), [CVE-2020-24489](https://nvd.nist.gov/vuln/detail/CVE-2020-24489), [CVE-2020-24511](https://nvd.nist.gov/vuln/detail/CVE-2020-24511), [CVE-2020-24513](https://nvd.nist.gov/vuln/detail/CVE-2020-24513))\n- libgcrypt ([CVE-2021-33560](https://nvd.nist.gov/vuln/detail/CVE-2021-33560), [CVE-2021-40528](https://nvd.nist.gov/vuln/detail/CVE-2021-40528))\n- libpcre ([CVE-2019-20838](https://nvd.nist.gov/vuln/detail/CVE-2019-20838), [CVE-2020-14155](https://nvd.nist.gov/vuln/detail/CVE-2020-14155))\n- libuv ([CVE-2021-22918](https://nvd.nist.gov/vuln/detail/CVE-2021-22918))\n- libxml2 ([CVE-2020-24977](https://nvd.nist.gov/vuln/detail/CVE-2020-24977), [CVE-2021-3516](https://nvd.nist.gov/vuln/detail/CVE-2021-3516), [CVE-2021-3517](https://nvd.nist.gov/vuln/detail/CVE-2021-3517), [CVE-2021-3518](https://nvd.nist.gov/vuln/detail/CVE-2021-3518), [CVE-2021-3541](https://nvd.nist.gov/vuln/detail/CVE-2021-3541))\n- lz4 ([CVE-2021-3520](https://nvd.nist.gov/vuln/detail/CVE-2021-3520))\n- mit-krb5 ([CVE-2021-36222](https://nvd.nist.gov/vuln/detail/CVE-2021-36222))\n- ncurses ([CVE-2019-17594](https://nvd.nist.gov/vuln/detail/CVE-2019-17594), [CVE-2019-17595](https://nvd.nist.gov/vuln/detail/CVE-2019-17595))\n- nettle ([CVE-2021-20305](https://nvd.nist.gov/vuln/detail/CVE-2021-20305), [CVE-2021-3580](https://nvd.nist.gov/vuln/detail/CVE-2021-3580))\n- ntp ([CVE-2018-8956](https://nvd.nist.gov/vuln/detail/CVE-2018-8956), [CVE-2020-11868](https://nvd.nist.gov/vuln/detail/CVE-2020-11868), [CVE-2020-13817](https://nvd.nist.gov/vuln/detail/CVE-2020-13817), [CVE-2020-15025](https://nvd.nist.gov/vuln/detail/CVE-2020-15025))\n- nvidia-drivers ([CVE-2022-21813](https://nvd.nist.gov/vuln/detail/CVE-2022-21813), [CVE-2022-21814](https://nvd.nist.gov/vuln/detail/CVE-2022-21814))\n- open-iscsi ([CVE-2017-17840](https://nvd.nist.gov/vuln/detail/CVE-2017-17840))\n- openssl ([CVE-2021-3449](https://nvd.nist.gov/vuln/detail/CVE-2021-3449), [CVE-2021-3450](https://nvd.nist.gov/vuln/detail/CVE-2021-3450), [CVE-2022-0778](https://nvd.nist.gov/vuln/detail/CVE-2022-0778))\n- openldap ([CVE-2020-36221](https://nvd.nist.gov/vuln/detail/CVE-2020-36221), [CVE-2020-36222](https://nvd.nist.gov/vuln/detail/CVE-2020-36222), [CVE-2020-36223](https://nvd.nist.gov/vuln/detail/CVE-2020-36223), [CVE-2020-36224](https://nvd.nist.gov/vuln/detail/CVE-2020-36224), [CVE-2020-36225](https://nvd.nist.gov/vuln/detail/CVE-2020-36225), [CVE-2020-36226](https://nvd.nist.gov/vuln/detail/CVE-2020-36226), [CVE-2020-36227](https://nvd.nist.gov/vuln/detail/CVE-2020-36227), [CVE-2020-36228](https://nvd.nist.gov/vuln/detail/CVE-2020-36228), [CVE-2020-36229](https://nvd.nist.gov/vuln/detail/CVE-2020-36229), [CVE-2020-36230](https://nvd.nist.gov/vuln/detail/CVE-2020-36230), [CVE-2021-27212](https://nvd.nist.gov/vuln/detail/CVE-2021-27212))\n- pam [CVE-2020-27780](https://nvd.nist.gov/vuln/detail/CVE-2020-27780)\n- polkit ([CVE-2021-3560](https://nvd.nist.gov/vuln/detail/CVE-2021-3560), [CVE-2021-4034](https://nvd.nist.gov/vuln/detail/CVE-2021-4034))\n- runc ([CVE-2021-30465](https://nvd.nist.gov/vuln/detail/CVE-2021-30465))\n- samba ([CVE-2019-3880](https://nvd.nist.gov/vuln/detail/CVE-2019-3880), [CVE-2019-10197](https://nvd.nist.gov/vuln/detail/CVE-2019-10197), [CVE-2019-10218](https://nvd.nist.gov/vuln/detail/CVE-2019-10218), [CVE-2020-10704](https://nvd.nist.gov/vuln/detail/CVE-2020-10704), [CVE-2020-10745](https://nvd.nist.gov/vuln/detail/CVE-2020-10745), [CVE-2020-14318](https://nvd.nist.gov/vuln/detail/CVE-2020-14318), [CVE-2020-14323](https://nvd.nist.gov/vuln/detail/CVE-2020-14323), [CVE-2020-14383](https://nvd.nist.gov/vuln/detail/CVE-2020-14383))\n- shadow ([CVE-2019-19882](https://nvd.nist.gov/vuln/detail/CVE-2019-19882))\n- sqlite ([CVE-2021-20227](https://nvd.nist.gov/vuln/detail/CVE-2021-20227))\n- sssd ([CVE-2018-16838](https://nvd.nist.gov/vuln/detail/CVE-2018-16838), [CVE-2018-16883](https://nvd.nist.gov/vuln/detail/CVE-2018-16883), [CVE-2019-3811](https://nvd.nist.gov/vuln/detail/CVE-2019-3811), [CVE-2021-3621](https://nvd.nist.gov/vuln/detail/CVE-2021-3621))\n- tar ([CVE-2021-20193](https://nvd.nist.gov/vuln/detail/CVE-2021-20193))\n- trousers ([CVE-2020-24330](https://nvd.nist.gov/vuln/detail/CVE-2020-24330), [CVE-2020-24331](https://nvd.nist.gov/vuln/detail/CVE-2020-24331))\n- util-linux ([CVE-2021-37600](https://nvd.nist.gov/vuln/detail/CVE-2021-37600))\n- vim ([CVE-2021-3770](https://nvd.nist.gov/vuln/detail/CVE-2021-3770), [CVE-2021-3778](https://nvd.nist.gov/vuln/detail/CVE-2021-3778), [CVE-2021-3796](https://nvd.nist.gov/vuln/detail/CVE-2021-3796))\n- zstd ([CVE-2021-24032](https://nvd.nist.gov/vuln/detail/CVE-2021-24032))\n- SDK: bison ([CVE-2020-14150](https://nvd.nist.gov/vuln/detail/CVE-2020-14150), [CVE-2020-24240](https://nvd.nist.gov/vuln/detail/CVE-2020-24240))\n- SDK: dnsmasq ([CVE-2021-3448](https://nvd.nist.gov/vuln/detail/CVE-2021-3448), [CVE-2020-25681](https://nvd.nist.gov/vuln/detail/CVE-2020-25681), [CVE-2020-25682](https://nvd.nist.gov/vuln/detail/CVE-2020-25682), [CVE-2020-25683](https://nvd.nist.gov/vuln/detail/CVE-2020-25683), [CVE-2020-25684](https://nvd.nist.gov/vuln/detail/CVE-2020-25684), [CVE-2020-25685](https://nvd.nist.gov/vuln/detail/CVE-2020-25685), [CVE-2020-25686](https://nvd.nist.gov/vuln/detail/CVE-2020-25686), [CVE-2020-25687](https://nvd.nist.gov/vuln/detail/CVE-2020-25687))\n- SDK: perl ([CVE-2020-10878](https://nvd.nist.gov/vuln/detail/CVE-2020-10878))\n- SDK: qemu ([CVE-2020-10717](https://nvd.nist.gov/vuln/detail/CVE-2020-10717), [CVE-2020-13754](https://nvd.nist.gov/vuln/detail/CVE-2020-13754), [CVE-2020-15859](https://nvd.nist.gov/vuln/detail/CVE-2020-15859), [CVE-2020-15863](https://nvd.nist.gov/vuln/detail/CVE-2020-15863), [CVE-2020-16092](https://nvd.nist.gov/vuln/detail/CVE-2020-16092), [CVE-2020-25741](https://nvd.nist.gov/vuln/detail/CVE-2020-25741), [CVE-2020-25742](https://nvd.nist.gov/vuln/detail/CVE-2020-25742), [CVE-2020-25743](https://nvd.nist.gov/vuln/detail/CVE-2020-25743))\n- SDK: Rust ([CVE-2020-36323](https://nvd.nist.gov/vuln/detail/CVE-2020-36323), [CVE-2021-28876](https://nvd.nist.gov/vuln/detail/CVE-2021-28876), [CVE-2021-28877](https://nvd.nist.gov/vuln/detail/CVE-2021-28877), [CVE-2021-28878](https://nvd.nist.gov/vuln/detail/CVE-2021-28878), [CVE-2021-28879](https://nvd.nist.gov/vuln/detail/CVE-2021-28879), [CVE-2021-31162](https://nvd.nist.gov/vuln/detail/CVE-2021-31162))\n\n\n### Bug fixes:\n\n- The Torcx profile `docker-1.12-no` got fixed to reference the current Docker version instead of 19.03 which wasn't found on the image, causing Torcx to fail to provide Docker ([coreos-overlay#1456](https://github.com/flatcar/coreos-overlay/pull/1456))\n- Ensured that the `/run/xtables.lock` coordination file exists for modifications of the xtables backend from containers (must be bind-mounted) or the `iptables-legacy` binaries on the host ([init#57](https://github.com/flatcar/init/pull/57))\n- SDK: Fixed build error popping up in the new SDK Container because `policycoreutils` used the wrong ROOT to update the SELinux store ([coreos-overlay#1502](https://github.com/flatcar/coreos-overlay/pull/1502))\n- Fixed leak of SELinux policy store to the root filesystem top directory due to wrong store path in `policycoreutils` instead of `/var/lib/selinux` ([flatcar-linux/Flatcar#596](https://github.com/flatcar/Flatcar/issues/596))\n- Disabled the systemd-networkd settings `ManageForeignRoutes` and `ManageForeignRoutingPolicyRules` by default to ensure that CNIs like Cilium don't get their routes or routing policy rules discarded on network reconfiguration events ([Flatcar#620](https://github.com/flatcar/Flatcar/issues/620)).\n- AWS: specify correct console (ttyS0) on kernel command line for ARM64 instances ([coreos-overlay#1628](https://github.com/flatcar/coreos-overlay/pull/1628))\n- Prevented hitting races when creating filesystems in Ignition, these races caused boot failures like `fsck[1343]: Failed to stat /dev/disk/by-label/ROOT: No such file or directory` when creating a btrfs root filesystem ([ignition#35](https://github.com/flatcar/ignition/pull/35))\n- Reverted the Linux kernel change to forbid xfrm id 0 for IPSec state because it broke Cilium ([Flatcar#626](https://github.com/flatcar/Flatcar/issues/626), [coreos-overlay#1682](https://github.com/flatcar/coreos-overlay/pull/1682))\n- Reverted the Linux kernel commit which broke networking on AWS instances which use Intel 82559 NIC (c4/m4) ([Flatcar#665](https://github.com/flatcar/Flatcar/issues/665), [coreos-overlay#1720](https://github.com/flatcar/coreos-overlay/pull/1720))\n- Added pahole to developer container, without it kernel modules built against /usr/src/linux may fail to probe with an 'invalid relocation target' error ([coreos-overlay#1839](https://github.com/flatcar/coreos-overlay/pull/1839))\n- vim with USE=minimal was fixed to run without warning in the beginning [portage-stable#260](https://github.com/flatcar/portage-stable/pull/260)\n- dev container: Fix github URL for coreos-overlay and portage-stable to use repos from flatcar-linux org directly instead of relying on redirects from the kinvolk org. This fixes checkouts with emerge-gitclone inside dev-container. [scripts#194](https://github.com/flatcar/scripts/pull/194)\n- Added missing SELinux rule as initial step to resolve Torcx unpacking issue ([coreos-overlay#1426](https://github.com/flatcar/coreos-overlay/pull/1426))\n- Randomize OEM filesystem UUID if mounting fails ([init#47](https://github.com/flatcar/init/pull/47))\n- Run emergency.target on ignition/torcx service unit failure in dracut ([bootengine#28](https://github.com/flatcar/bootengine/pull/28))\n- Re-enabled kernel config FS_ENCRYPTION ([coreos-overlay#1212](https://github.com/flatcar/coreos-overlay/pull/1212/))\n- Fixed Perl in dev-container ([coreos-overlay#1238](https://github.com/flatcar/coreos-overlay/pull/1238/))\n- Fixed containerd config after introduction of CGroupsV2 ([coreos-overlay#1214](https://github.com/flatcar/coreos-overlay/pull/1214))\n- Fixed path for amazon-ssm-agent in base-ec2.ign ([coreos-overlay#1228](https://github.com/flatcar/coreos-overlay/pull/1228))\n- flatcar-install: randomized OEM filesystem UUID if mounting fails ([init#47](https://github.com/flatcar/init/pull/47))\n- Fixed null-pointer deref crash in Ignition when specifying the OEM filesystem without a label ([ignition#25](https://github.com/flatcar/ignition/pull/25))\n- Fixed locksmith adhering to reboot window when getting the etcd lock ([locksmith#10](https://github.com/flatcar/locksmith/pull/10))\n- Fixed pam.d sssd LDAP auth with sudo ([coreos-overlay#1170](https://github.com/flatcar/coreos-overlay/pull/1170))\n- Let network-cleanup.service finish before entering rootfs ([coreos-overlay#1182](https://github.com/flatcar/coreos-overlay/pull/1182))\n- Fixed SELinux policy for Flannel CNI ([coreos-overlay#1181](https://github.com/flatcar/coreos-overlay/pull/1181))\n- Set the cilium_vxlan interface to be not managed by networkd\u2019s default setup with DHCP as it\u2019s managed by Cilium. ([init#43](https://github.com/flatcar/init/pull/43))\n- Disabled SELinux by default on dockerd wrapper script ([coreos-overlay#1149](https://github.com/flatcar/coreos-overlay/pull/1149))\n- Fixed the network-cleanup service race in the initramfs which resulted in a failure being reported\n- GCE: Granted CAP_NET_ADMIN to set routes for the TCP LB when starting oem-gce.service ([coreos-overlay#1146](https://github.com/flatcar/coreos-overlay/pull/1146))\n- Add the systemd tag in udev for Azure storage devices, to fix /boot automount ([init#41](https://github.com/flatcar/init/pull/41))\n- Update-engine sent empty requests when restarted before a pending reboot ([Flatcar#388](https://github.com/flatcar/Flatcar/issues/388))\n- systemd-networkd: Do not manage loopback network interface ([bootengine#24](https://github.com/flatcar/bootengine/pull/24) [init#40](https://github.com/flatcar/init/pull/40))\n- flatcar-install: Detect device mapper (e.g., LVM/LUKS) usage when searching for free drives with the -s flag ([Flatcar#332](https://github.com/flatcar/Flatcar/issues/332))\n- GCE: The old interface name ens4v1 which was replaced by eth0 due to a broken udev rule was restored, but now as alternative interface name, and eth0 will stay the primary name for consistency across cloud environments. ([init#38](https://github.com/flatcar/init/pull/38))\n- Include firmware files for all modules shipped in our image ([Issue #359](https://github.com/flatcar/Flatcar/issues/359), [coreos-overlay#887](https://github.com/flatcar/coreos-overlay/pull/887))\n- Add explicit path to the binary call in the coreos-metadata unit file ([Issue #360](https://github.com/flatcar/Flatcar/issues/360))\n- sys-apps/systemd: Fix unit installation ([coreos-overlay#810](https://github.com/flatcar/coreos-overlay/pull/810))\n- passwd: use correct GID for tss ([baselayout#15](https://github.com/flatcar/baselayout/pull/15))\n- coreos-base/gmerge: Stop installing gmerge script ([coreos-overlay#828](https://github.com/flatcar/coreos-overlay/pull/828))\n- Update sys-apps/coreutils and make sure they have split-usr disabled for generic images ([coreos-overlay#829](https://github.com/flatcar/coreos-overlay/pull/829))\n- afterburn (coreos-metadata): Restart on failure and keep coreos-metadata unit active ([coreos-overlay#768](https://github.com/flatcar/coreos-overlay/pull/768))\n- network: Accept ICMPv6 Router Advertisements to fix IPv6 address assignment in the default DHCP setting ([flatcar-linux/init#51](https://github.com/flatcar/init/pull/51), [flatcar-linux/cloudinit#12](https://github.com/flatcar/coreos-cloudinit/pull/12), [flatcar-linux/bootengine#30](https://github.com/flatcar/bootengine/pull/30))\n- Added a new flatcar-update tool to the image to ease manual updates, rollbacks, channel/release jumping, and airgapped updates ([flatcar-linux/init#53](https://github.com/flatcar/init/pull/53))\n- Default again to disable SELinux permissions checks in systemd which was missing in the initial systemd 246 update\n- Default again to set DefaultTasksMax=100% in systemd which was missing in the initial systemd 246 update\n- Make systemd detect updates again when the /usr partition changes which was missing in the initial systemd 246 update\n- Default again to disabling IP Forwarding in systemd which was missing in the initial systemd 246 update\n- Default again to waiting only for one network interface to be ready with systemd-networkd-wait-online which was missing in the initial systemd 246 update\n\n### Changes:\n\n- Backported `elf` support for `iproute2` ([coreos-overlay#1256](https://github.com/flatcar/coreos-overlay/pull/1526))\n- Enabled the FIPS support for the Linux kernel, which users can now choose through a kernel parameter in `grub.cfg` (check it taking effect with `cat /proc/sys/crypto/fips_enabled`) ([coreos-overlay#1602](https://github.com/flatcar/coreos-overlay/pull/1602))\n- Merge the Flatcar Pro features into the regular Flatcar images ([coreos-overlay#1679](https://github.com/flatcar/coreos-overlay/pull/1679)) \n- Added support for switching back to CGroupsV1 without requiring a reboot. Create `/etc/flatcar-cgroupv1` through ignition. ([coreos-overlay#1666](https://github.com/flatcar/coreos-overlay/pull/1666))\n- Enabled FIPS mode for cryptsetup ([coreos-overlay#1747](https://github.com/flatcar/coreos-overlay/pull/1747))\n- GCE: Enabled GVE kernel driver, which adds support for Google Virtual NIC on GCP ([coreos-overlay#1802](https://github.com/flatcar/coreos-overlay/pull/1802))\n- Enabled FIPS mode for cryptsetup ([portage-stable#312](https://github.com/flatcar/portage-stable/pull/312))\n- Added GPIO support ([coreos-overlay#1236](https://github.com/flatcar/coreos-overlay/pull/1236))\n- Added Azure Generation 2 VM support ([coreos-overlay#1198](https://github.com/flatcar/coreos-overlay/pull/1198))\n- Switched Docker ecosystem packages to go1.16 ([coreos-overlay#1217](https://github.com/flatcar/coreos-overlay/pull/1217))\n- Added lbzip2 binary to the image ([coreos-overlay#1221](https://github.com/flatcar/coreos-overlay/pull/1221))\n- flatcar-install uses lbzip2 if present, falls back on bzip2 if not ([init#46](https://github.com/flatcar/init/pull/46))\n- Added Intel E800 series network adapter driver ([coreos-overlay#1237](https://github.com/flatcar/coreos-overlay/pull/1237))\n- Enabled \u2018audit\u2019 use flag for sys-libs/pam ([coreos-overlay#1233](https://github.com/flatcar/coreos-overlay/pull/1233))\n- Bumped etcd and flannel to respectively 3.5.0, 0.14.0 to get multiarch images for arm64 support. Note for users of the old etcd v2 support: ETCDCTL_API=2 must be set to use v2 store as well as ETCD_ENABLE_V2=true in the etcd-member.service - this support will be removed in 3.6.0 ([coreos-overlay#1179](https://github.com/flatcar/coreos-overlay/pull/1179))\n- cgroups v2 by default for new nodes ([coreos-overlay#931](https://github.com/flatcar/coreos-overlay/pull/931))\n- Upgrade Docker to 20.10 ([coreos-overlay#931](https://github.com/flatcar/coreos-overlay/pull/931))\n- update_engine: add postinstall hook to stay on cgroupv1 ([update_engine#13](https://github.com/flatcar/update_engine/pull/13))\n- Switched to zstd compression for the initramfs ([coreos-overlay#1136](https://github.com/flatcar/coreos-overlay/pull/1136))\n- Embedded new subkey in flatcar-install ([coreos-overlay#1180](https://github.com/flatcar/coreos-overlay/pull/1180))\n- Azure: Compile OEM contents for all architectures ([coreos-overlay#1196](https://github.com/flatcar/coreos-overlay/pull/1196))\n- AWS: Added amazon-ssm-agent ([coreos-overlay#1162](https://github.com/flatcar/coreos-overlay/pull/1162))\n- Switched dm-verity corruption detection to issue a kernel panic (a panic results in a reboot after 1 minute, this was the case before already) instead of merely failing certain syscalls that try to use the corrupted data\n- Support BTRFS in OEM and /usr partitions, but only used it for the OEM partition for now. Ignition configurations that refer to the OEM partition will work with any filesystem format specified, a mismatch is not resulting in a boot error. ([coreos-overlay#1106](https://github.com/flatcar/coreos-overlay/pull/1106))\n- Enabled zstd compression for the initramfs and for amd64 also for the kernel because we hit the vmlinuz size limit on the /boot partition\n- Deleted the unused kernel+initramfs vmlinuz file from the /usr partition\n- devcontainer: added support to run on arm64 by switching to an architecture-agnostic partition UUID\n- Enabled ARM64 SDK bootstrap ([scripts#134](https://github.com/flatcar/scripts/pull/134))\n- Enable telnet support for curl ([coreos-overlay#1099](https://github.com/flatcar/coreos-overlay/pull/1099))\n- Enable MDIO_BCM_UNIMAC for arm64 ([coreos-overlay#929](https://github.com/flatcar/coreos-overlay/pull/929))\n- Disabled SELinux for Docker ([coreos-overlay#1055](https://github.com/flatcar/coreos-overlay/pull/1055))\n- flatcar-install: Add -D flag to only download the image file ([Flatcar#248](https://github.com/flatcar/Flatcar/issues/248))\n- Make the hostname setting units optional. Having the hostname units as required by the initrd.target meant that if the unit failed the machine wouldn\u2019t start, disrupting the whole boot. ([bootengine#23](https://github.com/flatcar/bootengine/pull/23))\n- Enable using iSCSI netroot devices on Flatcar ([bootengine#22](https://github.com/flatcar/bootengine/pull/22))\n- The virtio network interfaces got predictable interface names as alternative interface names, and thus these names can also be used to match for a specific interface in case there is more than one and the eth0 and eth1 name assignment is not stable. ([init#38](https://github.com/flatcar/init/pull/38))\n- The pam_faillock PAM module was enabled as replacement for the removed pam_tally2 module and will temporarily lock an account if there were login attempts with a wrong password. The faillock command can be used to show the current state. With pam_tally2 there was no limit for wrong password login attempts but with faillock the default is already restricting the attempts. The default behavior was relaxed to allow 5 wrong passwords per two minutes, and a one minute account lock time. This does not apply to logins with an SSH key. ([baselayout#17](https://github.com/flatcar/baselayout/pull/17))\n- The etcd and flannel services are now run with Docker and any rkt-based customizations of the etcd-member and flanneld services not supported anymore. Also, because the flanneld service relies on Docker and will restart Docker after applying the new configuration, it is not possible anymore to set Requires=flanneld.service for docker.service and instead it\u2019s enough to have flanneld.service enabled. ([coreos-overlay#857](https://github.com/flatcar/coreos-overlay/pull/857))\n- sshd: use secure crypto algos only ([coreos-overlay#852](https://github.com/flatcar/coreos-overlay/pull/852))\n- samba: Update to EAPI=7, add new USE flags and remove deps on icu ([coreos-overlay#864](https://github.com/flatcar/coreos-overlay/pull/864))\n- kernel: enable kernel config CONFIG_BPF_LSM ([coreos-overlay#846](https://github.com/flatcar/coreos-overlay/pull/846))\n- bootengine: set hostname for EC2 and OpenStack from metadata ([coreos-overlay#848](https://github.com/flatcar/coreos-overlay/pull/848))\n- sys-block/open-iscsi: Command substitution in iscsi-init system service ([coreos-overlay#801](https://github.com/flatcar/coreos-overlay/pull/801))\n- scripts/motdgen: Add OEM information to motd output ([init#34](https://github.com/flatcar/init/pull/34))\n- torcx: delete Docker 1.12 ([coreos-overlay#826](https://github.com/flatcar/coreos-overlay/pull/826))\n- portage update: update portage and related packages to newer versions ([coreos-overlay#840](https://github.com/flatcar/coreos-overlay/pull/840))\n- bin/flatcar-install: add parameters to make wget more resilient ([init#35](https://github.com/flatcar/init/pull/35))\n- With the open-iscsi update to 2.1.2, the service unit name changed from iscsid to iscsi ([coreos-overlay#682](https://github.com/flatcar/coreos-overlay/pull/682))\n- Updated nsswitch.conf to use systemd-resolved ([baselayout#10](https://github.com/flatcar/baselayout/pull/10))\n- Enabled systemd-resolved stub listeners ([baselayout#11](https://github.com/flatcar/baselayout/pull/11))\n- systemd-resolved: Disabled DNSSEC for the mean time ([baselayout#14](https://github.com/flatcar/baselayout/pull/14))\n- kernel: enabled CONFIG_DEBUG_INFO_BTF ([coreos-overlay#753](https://github.com/flatcar/coreos-overlay/pull/753))\n- containerd: Disabled shim debug logs ([coreos-overlay#766](https://github.com/flatcar/coreos-overlay/pull/766))\n- Enable BCMGENET as a module on arm64_defconfig-5.9 ([coreos-overlay#717](https://github.com/flatcar/coreos-overlay/pull/717))\n- Enable BCM7XXX_PHY as a module on arm64_defconfig-5.9 for Raspberry Pi 4 ([coreos-overlay#716](https://github.com/flatcar/coreos-overlay/pull/716))\n- flatcar_production_qemu.sh: Use more CPUs for ARM if available ([scripts#91](https://github.com/flatcar/flatcar-scripts/pull/91))\n- Enabled the kernel config HOTPLUG_PCI_ACPI for arm64 to support attaching EC2 volumes ([coreos-overlay#705](https://github.com/flatcar/coreos-overlay/pull/705))\n- Support the lockdown kernel command line parameter ([coreos-overlay#533](https://github.com/flatcar/coreos-overlay/pull/553))\n- AWS arm64: Enable elastic network adapter module ([coreos-overlay#631](https://github.com/flatcar/coreos-overlay/pull/631))\n- rkt and kubelet-wrapper are deprecated and removed from Alpha, also from subsequent channels in the future. Please read the [removal announcement](https://groups.google.com/g/flatcar-linux-user/c/MeinndLqJO4) to know more.\n\n\n### Updates:\n\n- Linux ([5.10.109](https://lwn.net/Articles/889439)) (from 5.4.188)\n- Linux Firmware ([20211216](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20211216))\n- systemd ([249.10](https://github.com/systemd/systemd-stable/releases/tag/v249.10))\n- glibc ([2.33](https://sourceware.org/glibc/wiki/Release/2.33))\n- Go ([1.17.8](https://go.googlesource.com/go/+/refs/tags/go1.17.8))\n- Docker ([20.10.12](https://docs.docker.com/engine/release-notes/#201012))\n- bash ([5.1](https://lists.gnu.org/archive/html/info-gnu/2020-12/msg00003.html))\n- c-ares ([1.17.2](https://github.com/c-ares/c-ares/releases/tag/cares-1_17_2))\n- ca-certificates ([3.73](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_73.html))\n- containerd ([1.5.11](https://github.com/containerd/containerd/releases/tag/v1.5.11))\n- coreutils ([8.32](http://savannah.gnu.org/forum/forum.php?forum_id=9693))\n- cryptsetup ([2.3.6](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.3.6/docs/v2.3.6-ReleaseNotes))\n- curl ([7.79.1](https://curl.se/mail/lib-2021-09/0079.html))\n- dbus ([1.12.20](https://gitlab.freedesktop.org/dbus/dbus/-/blob/dbus-1.12.20/NEWS))\n- ebtables ([2.0.11](https://lwn.net/Articles/806179/))\n- etcd-wrapper ([3.5.0](https://github.com/etcd-io/etcd/releases/tag/v3.5.0))\n- etcdctl ([3.5.0](https://github.com/etcd-io/etcd/releases/tag/v3.5.0))\n- expat ([2.4.6](https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes))\n- flannel-wrapper ([0.14](https://github.com/flannel-io/flannel/releases/tag/v0.14.0))\n- gawk ([5.1.0](https://lists.gnu.org/archive/html/info-gnu/2020-04/msg00007.html))\n- gettext ([0.21](https://lists.gnu.org/archive/html/info-gnu/2020-07/msg00009.html))\n- git ([2.32.0](https://github.com/git/git/blob/master/Documentation/RelNotes/2.32.0.txt))\n- glib ([2.66.8](https://gitlab.gnome.org/GNOME/glib/-/releases/2.66.8))\n- gnupg ([2.2.29](https://lists.gnupg.org/pipermail/gnupg-announce/2021q3/000461.html))\n- gnutls ([3.7.1](https://github.com/gnutls/gnutls/blob/3.7.1/NEWS))\n- gptfdisk ([1.0.7](http://www.rodsbooks.com/gdisk/))\n- ignition ([0.36.1](https://github.com/flatcar/ignition/releases/tag/v0.36.1))\n- intel-microcode ([20210608_p20210608](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20210608))\n- iptables ([1.8.7](https://lwn.net/Articles/843069/))\n- keyutils ([1.6.1](https://lwn.net/Articles/771934/))\n- ldb ([2.3.0](https://gitlab.com/samba-team/samba/-/blob/ldb-2.3.0/WHATSNEW.txt))\n- libarchive ([3.5.1](https://github.com/libarchive/libarchive/releases/tag/v3.5.1))\n- libev ([4.33](http://dist.schmorp.de/libev/))\n- libgcrypt ([1.9.4](https://dev.gnupg.org/T5402))\n- libmnl ([1.0.4](https://marc.info/?l=netfilter-devel&m=146745072727070&w=2))\n- libnftnl ([1.2.0](https://lwn.net/Articles/857198/))\n- libpcre ([8.44](http://www.rexegg.com/pcre-doc/ChangeLog))\n- libselinux ([3.1](https://github.com/SELinuxProject/selinux/releases/tag/libselinux-3.1))\n- libsemanage ([3.1](https://github.com/SELinuxProject/selinux/releases/tag/libsemanage-3.1))\n- libsepol ([3.1](https://github.com/SELinuxProject/selinux/releases/tag/libsepol-3.1))\n- libtirpc ([1.3.2](https://www.spinics.net/lists/linux-nfs/msg84129.html))\n- libuv ([1.41.1](https://github.com/libuv/libuv/releases/tag/v1.41.1))\n- libverto ([0.3.1](https://github.com/latchset/libverto/releases/tag/0.3.1))\n- libxml2 ([2.9.12](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.12))\n- lvm2 ([2.02.188](https://github.com/lvmteam/lvm2/blob/v2_02_188/WHATS_NEW))\n- lz4 ([1.9.3](https://github.com/lz4/lz4/releases/tag/v1.9.3))\n- mit-krb5 ([1.19.2](https://web.mit.edu/kerberos/krb5-1.19/README-1.19.2.txt))\n- multipath-tools ([0.8.5](https://github.com/opensvc/multipath-tools/releases/tag/0.8.5))\n- ncurses ([6.2](https://lists.gnu.org/archive/html/info-gnu/2020-02/msg00010.html))\n- net-tools ([2.10](https://sourceforge.net/p/net-tools/mailman/message/37192002/))\n- nettle ([3.7.3](https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00002.html))\n- nftables ([0.9.9](https://lwn.net/Articles/857369/))\n- nvidia-drivers ([510.47.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-47-03/index.html)) \n- openldap ([2.4.58](https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/GK4OGTM6VMIAJCAZSG66VXRRN2LVQDVF/))\n- openssh ([8.7](https://www.openssh.com/txt/release-8.7))\n- openssl ([1.1.1n](https://www.openssl.org/news/changelog.html#openssl-111))\n- pam ([1.5.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.5.1))\n- pambase 20200817\n- pax-utils ([1.3.1](https://gitweb.gentoo.org/proj/pax-utils.git/tag/?h=v1.3.1))\n- policycoreutils ([3.1](https://github.com/SELinuxProject/selinux/tree/policycoreutils-3.1))\n- polkit ([0.119](https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.119/NEWS))\n- readline ([8.1](https://lwn.net/Articles/839213/))\n- realmd ([0.17.0](https://gitlab.freedesktop.org/realmd/realmd/-/blob/0.17.0/NEWS))\n- runc ([1.0.3](https://github.com/opencontainers/runc/releases/tag/v1.0.3))\n- samba ([4.12.9](https://www.samba.org/samba/history/samba-4.12.9.html))\n- selinux-base ([2.20200818](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818))\n- selinux-base-policy ([2.20200818](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818))\n- selinux-unconfined ([2.20200818](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818))\n- selinux-virt ([2.20200818](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20200818))\n- sssd ([2.3.1](https://sssd.io/release-notes/sssd-2.3.1.html))\n- strace ([5.12](https://lists.strace.io/pipermail/strace-devel/2021-April/010516.html))\n- talloc ([2.3.2](https://gitlab.com/samba-team/samba/-/tags/talloc-2.3.2))\n- tar ([1.34](https://lists.gnu.org/archive/html/info-gnu/2021-02/msg00006.html))\n- util-linux ([2.37.2](https://www.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.2-ChangeLog))\n- vim ([8.2.3428](https://github.com/vim/vim/releases/tag/v8.2.3428))\n- xenstore ([4.14](https://wiki.xenproject.org/wiki/Xen_Project_4.14_Release_Notes))\n- xz-utils ([5.2.5](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=d3f7d602343b4885e2c5653fefcc86fc2c14a06b;hb=v5.2.5))\n- zstd ([1.4.9](https://github.com/facebook/zstd/releases/tag/v1.4.9))\n- Azure: WALinuxAgent ([2.6.0.2](https://github.com/Azure/WALinuxAgent/releases/tag/v2.6.0.2))\n\n_Changes since **Stable 3033.2.4**_\n\n\n### Security fixes:\n\n- nvidia-drivers ([CVE-2022-21814](https://nvd.nist.gov/vuln/detail/CVE-2022-21814), [CVE-2022-21813](https://nvd.nist.gov/vuln/detail/CVE-2022-21813))\n- containerd ([CVE-2022-24769](https://nvd.nist.gov/vuln/detail/CVE-2022-24769))\n\n### Bug fixes:\n\n- AWS: specify correct console (ttyS0) on kernel command line for ARM64 instances ([coreos-overlay#1628](https://github.com/flatcar/coreos-overlay/pull/1628))\n- Added pahole to developer container, without it kernel modules built against /usr/src/linux may fail to probe with an 'invalid relocation target' error ([coreos-overlay#1839](https://github.com/flatcar/coreos-overlay/pull/1839))\n- network: Accept ICMPv6 Router Advertisements to fix IPv6 address assignment in the default DHCP setting ([flatcar-linux/init#51](https://github.com/flatcar/init/pull/51), [flatcar-linux/cloudinit#12](https://github.com/flatcar/coreos-cloudinit/pull/12), [flatcar-linux/bootengine#30](https://github.com/flatcar/bootengine/pull/30))\n\n### Changes:\n\n- The systemd-networkd `ManageForeignRoutes` and `ManageForeignRoutingPolicyRules` settings are now disabled through a drop-in file and thus can only be enabled again by a drop-in file under `/etc/systemd/networkd.conf.d/` because drop-in files take precedence over `/etc/systemd/networkd.conf` ([init#61](https://github.com/flatcar/init/pull/61))\n- Excluded special network interface devices like bridge, tunnel, vxlan, and veth devices from the default DHCP configuration to prevent networkd interference ([init#56](https://github.com/flatcar/init/pull/56))\n- Added a new flatcar-update tool to the image to ease manual updates, rollbacks, channel/release jumping, and airgapped updates ([flatcar-linux/init#53](https://github.com/flatcar/init/pull/53))\n- Merge the Flatcar Pro features into the regular Flatcar images ([coreos-overlay#1679](https://github.com/flatcar/coreos-overlay/pull/1679))\n- Enabled the FIPS support for the Linux kernel, which users can now choose through a kernel parameter in `grub.cfg` (check it taking effect with `cat /proc/sys/crypto/fips_enabled`) ([coreos-overlay#1602](https://github.com/flatcar/coreos-overlay/pull/1602))\n- Merge the Flatcar Pro features into the regular Flatcar images ([coreos-overlay#1679](https://github.com/flatcar/coreos-overlay/pull/1679)) \n- Enabled FIPS mode for cryptsetup ([flatcar-linux/coreos-overlay#1747](https://github.com/flatcar/coreos-overlay/pull/1747), [portage-stable#312](https://github.com/flatcar/portage-stable/pull/312))\n- GCE: Enabled GVE kernel driver, which adds support for Google Virtual NIC on GCP ([coreos-overlay#1802](https://github.com/flatcar/coreos-overlay/pull/1802))\n- SDK: Dropped the mantle binaries (kola, ore, etc.) from the SDK, they are now provided by the `ghcr.io/flatcar/mantle` image ([coreos-overlay#1827](https://github.com/flatcar/coreos-overlay/pull/1827), [scripts#275](https://github.com/flatcar/scripts/pull/275))\n\n### Updates:\n\n- Linux ([5.10.109](https://lwn.net/Articles/889439) with [5.10.108](https://lwn.net/Articles/889002))\n- ca-certificates ([3.77](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_77.html))\n- containerd ([1.5.11](https://github.com/containerd/containerd/releases/tag/v1.5.11))\n- nvidia-drivers ([510.47.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-47-03/index.html)) \n- Azure: WALinuxAgent ([2.6.0.2](https://github.com/Azure/WALinuxAgent/releases/tag/v2.6.0.2))\n"
  },
  "3033.3.1": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-06-02 15:10:04 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.118"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **LTS-2022** Release **3033.3.1**\n\n_Changes since **LTS-2022 3033.3.0**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390), [CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168), [CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158), [CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353), [CVE-2022-30594](https://nvd.nist.gov/vuln/detail/CVE-2022-30594), [CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198), [CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389), [CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388), [CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516), [CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582), [CVE-2021-4197](https://nvd.nist.gov/vuln/detail/CVE-2021-4197), [CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204), [CVE-2022-1205](https://nvd.nist.gov/vuln/detail/CVE-2022-1205), [CVE-2022-29581](https://nvd.nist.gov/vuln/detail/CVE-2022-29581), [CVE-2022-1836](https://nvd.nist.gov/vuln/detail/CVE-2022-1836), [CVE-2022-1734](https://nvd.nist.gov/vuln/detail/CVE-2022-1734), [CVE-2022-0494](https://nvd.nist.gov/vuln/detail/CVE-2022-0494), [CVE-2022-28893](https://nvd.nist.gov/vuln/detail/CVE-2022-28893), [CVE-2022-1729](https://nvd.nist.gov/vuln/detail/CVE-2022-1729), [CVE-2022-0854](https://nvd.nist.gov/vuln/detail/CVE-2022-0854))\n\n#### Bug fixes:\n\n- Ensured `/etc/flatcar/update.conf` exists because it happens to be used as flag file for Ansible ([init#71](https://github.com/flatcar/init/pull/71))\n\n#### Updates:\n\n- Linux ([5.10.118](https://lwn.net/Articles/896225/) (includes [5.10.117](https://lwn.net/Articles/895646), [5.10.116](https://lwn.net/Articles/895319), [5.10.115](https://lwn.net/Articles/895071), [5.10.114](https://lwn.net/Articles/894358), [5.10.113](https://lwn.net/Articles/892813), [5.10.112](https://lwn.net/Articles/891997), [5.10.111](https://lwn.net/Articles/891252), [5.10.110](https://lwn.net/Articles/890723)))\n- ca-certificates ([3.78](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html))"
  },
  "3033.3.10": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-03-07 15:25:03 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.172"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": " _Changes since **LTS 3033.3.9**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-2196](https://nvd.nist.gov/vuln/detail/CVE-2022-2196), [CVE-2022-3707](https://nvd.nist.gov/vuln/detail/CVE-2022-3707), [CVE-2022-4129](https://nvd.nist.gov/vuln/detail/CVE-2022-4129), [CVE-2022-4382](https://nvd.nist.gov/vuln/detail/CVE-2022-4382), [CVE-2023-1073](https://nvd.nist.gov/vuln/detail/CVE-2023-1073), [CVE-2023-1074](https://nvd.nist.gov/vuln/detail/CVE-2023-1074), [CVE-2023-1078](https://nvd.nist.gov/vuln/detail/CVE-2023-1078), [CVE-2023-22998](https://nvd.nist.gov/vuln/detail/CVE-2023-22998), [CVE-2023-23559](https://nvd.nist.gov/vuln/detail/CVE-2023-23559), [CVE-2023-26545](https://nvd.nist.gov/vuln/detail/CVE-2023-26545))\n \n #### Updates:\n \n - Linux ([5.10.172](https://lwn.net/Articles/925079) (includes [5.10.171](https://lwn.net/Articles/925065), [5.10.170](https://lwn.net/Articles/924440), [5.10.169](https://lwn.net/Articles/924074), [5.10.168](https://lwn.net/Articles/923395), [5.10.167](https://lwn.net/Articles/922341), [5.10.166](https://lwn.net/Articles/921852), [5.10.165](https://lwn.net/Articles/921030)))\n - ca-certificates ([3.88.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_88_1.html))"
  },
  "3033.3.11": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-04-17 13:20:00 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.177"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "_Changes since **LTS 3033.3.10**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-4379](https://nvd.nist.gov/vuln/detail/CVE-2022-4379), [CVE-2023-1076](https://nvd.nist.gov/vuln/detail/CVE-2023-1076), [CVE-2023-1077](https://nvd.nist.gov/vuln/detail/CVE-2023-1077), [CVE-2023-1079](https://nvd.nist.gov/vuln/detail/CVE-2023-1079), [CVE-2023-1118](https://nvd.nist.gov/vuln/detail/CVE-2023-1118), [CVE-2023-1611](https://nvd.nist.gov/vuln/detail/CVE-2023-1611), [CVE-2023-1670](https://nvd.nist.gov/vuln/detail/CVE-2023-1670), [CVE-2023-1829](https://nvd.nist.gov/vuln/detail/CVE-2023-1829), [CVE-2023-1855](https://nvd.nist.gov/vuln/detail/CVE-2023-1855), [CVE-2023-1989](https://nvd.nist.gov/vuln/detail/CVE-2023-1989), [CVE-2023-1990](https://nvd.nist.gov/vuln/detail/CVE-2023-1990), [CVE-2023-23004](https://nvd.nist.gov/vuln/detail/CVE-2023-23004), [CVE-2023-25012](https://nvd.nist.gov/vuln/detail/CVE-2023-25012), [CVE-2023-28466](https://nvd.nist.gov/vuln/detail/CVE-2023-28466), [CVE-2023-30456](https://nvd.nist.gov/vuln/detail/CVE-2023-30456), [CVE-2023-30772](https://nvd.nist.gov/vuln/detail/CVE-2023-30772))\n\n#### Bug fixes:\n\n\n#### Changes:\n\n- Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from July 2023 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#92](https://github.com/flatcar/init/pull/92))\n\n#### Updates:\n\n- ca-certificates ([3.89](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89.html))\n- Linux ([5.10.177](https://lwn.net/Articles/928342) (includes [5.10.176](https://lwn.net/Articles/926874), [5.10.175](https://lwn.net/Articles/926416), [5.10.174](https://lwn.net/Articles/925992), [5.10.173](https://lwn.net/Articles/925935)))\n"
  },
  "3033.3.12": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-04-25 13:46:55 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.178"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "_Changes since **LTS 3033.3.11**_\n\n#### Security fixes:\n\n- nvidia-drivers ([CVE-2022-31607](https://nvd.nist.gov/vuln/detail/CVE-2022-31607), [CVE-2022-31608](https://nvd.nist.gov/vuln/detail/CVE-2022-31608), [CVE-2022-31615](https://nvd.nist.gov/vuln/detail/CVE-2022-31615), [CVE-2022-34665](https://nvd.nist.gov/vuln/detail/CVE-2022-34665), [CVE-2022-34666](https://nvd.nist.gov/vuln/detail/CVE-2022-34666), [CVE-2022-34670](https://nvd.nist.gov/vuln/detail/CVE-2022-34670), [CVE-2022-34673](https://nvd.nist.gov/vuln/detail/CVE-2022-34673), [CVE-2022-34674](https://nvd.nist.gov/vuln/detail/CVE-2022-34674), [CVE-2022-34676](https://nvd.nist.gov/vuln/detail/CVE-2022-34676), [CVE-2022-34677](https://nvd.nist.gov/vuln/detail/CVE-2022-34677), [CVE-2022-34678](https://nvd.nist.gov/vuln/detail/CVE-2022-34678), [CVE-2022-34679](https://nvd.nist.gov/vuln/detail/CVE-2022-34679), [CVE-2022-34680](https://nvd.nist.gov/vuln/detail/CVE-2022-34680), [CVE-2022-34682](https://nvd.nist.gov/vuln/detail/CVE-2022-34682), [CVE-2022-34684](https://nvd.nist.gov/vuln/detail/CVE-2022-34684), [CVE-2022-42254](https://nvd.nist.gov/vuln/detail/CVE-2022-42254), [CVE-2022-42255](https://nvd.nist.gov/vuln/detail/CVE-2022-42255), [CVE-2022-42256](https://nvd.nist.gov/vuln/detail/CVE-2022-42256), [CVE-2022-42257](https://nvd.nist.gov/vuln/detail/CVE-2022-42257), [CVE-2022-42258](https://nvd.nist.gov/vuln/detail/CVE-2022-42258), [CVE-2022-42259](https://nvd.nist.gov/vuln/detail/CVE-2022-42259), [CVE-2022-42260](https://nvd.nist.gov/vuln/detail/CVE-2022-42260), [CVE-2022-42261](https://nvd.nist.gov/vuln/detail/CVE-2022-42261), [CVE-2022-42263](https://nvd.nist.gov/vuln/detail/CVE-2022-42263), [CVE-2022-42264](https://nvd.nist.gov/vuln/detail/CVE-2022-42264), [CVE-2022-42265](https://nvd.nist.gov/vuln/detail/CVE-2022-42265))\n\n#### Bug fixes:\n- Fix the broken emerge-gitclone in the dev-container owing to the missing migration action around the unification of the Flatcar core repositories\n\n#### Changes:\n- The package upgrade for nvidia-drivers might result in not supporting a few of the older NVIDIA Tesla GPUs. If you are facing issues, set `NVIDIA_DRIVER_VERSION=460.106.00` in `/etc/flatcar/nvidia-metadata`\n\n#### Updates:\n\n- Linux ([5.10.178](https://lwn.net/Articles/929680/))\n- nvidia-drivers ([525.105.17](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-525-105-17/index.html))"
  },
  "3033.3.13": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-06-01 11:48:40 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.180"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": " _Changes since **LTS 3033.3.12**_\n \n#### Security fixes:\n \n - Linux ([CVE-2022-39189](https://nvd.nist.gov/vuln/detail/CVE-2022-39189), [CVE-2023-1380](https://nvd.nist.gov/vuln/detail/CVE-2023-1380), [CVE-2023-2002](https://nvd.nist.gov/vuln/detail/CVE-2023-2002), [CVE-2023-2269](https://nvd.nist.gov/vuln/detail/CVE-2023-2269), [CVE-2023-2513](https://nvd.nist.gov/vuln/detail/CVE-2023-2513), [CVE-2023-31436](https://nvd.nist.gov/vuln/detail/CVE-2023-31436), [CVE-2023-32233](https://nvd.nist.gov/vuln/detail/CVE-2023-32233))\n \n#### Bug fixes:\n \n \n#### Changes:\n \n \n#### Updates:\n \n - Linux ([5.10.180](https://lwn.net/Articles/932135) (includes [5.10.179](https://lwn.net/Articles/930264)))\n - ca-certificates ([3.89.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_89_1.html))\n"
  },
  "3033.3.14": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-06-21 12:18:59 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.184"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "_Changes since **LTS 3033.3.13**_\n \n#### Security fixes:\n \n- Linux ([CVE-2022-4269](https://nvd.nist.gov/vuln/detail/CVE-2022-4269))\n \n#### Updates:\n \n- Linux ([5.10.184](https://lwn.net/Articles/934624) (includes [5.10.183](https://lwn.net/Articles/934321), [5.10.182](https://lwn.net/Articles/933910), [5.10.181](https://lwn.net/Articles/933279)))\n- ca-certificates ([3.90](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90.html))"
  },
  "3033.3.15": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-07-18 09:01:17 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.186"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": " _Changes since **LTS 3033.3.14**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-3338](https://nvd.nist.gov/vuln/detail/CVE-2023-3338))\n \n #### Bug fixes:\n \n \n #### Changes:\n \n - Changed ext4 inode size of root partition to 256 bytes. This improves compatibility with applications and is necessary for 2038 readiness ([Flatcar#1082](https://github.com/flatcar/Flatcar/issues/1082))\n \n #### Updates:\n \n - Linux ([5.10.186](https://lwn.net/Articles/936676) (includes [5.10.185](https://lwn.net/Articles/935583)))\n - ca-certificates ([3.91](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_91.html))\n"
  },
  "3033.3.16": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-08-09 11:41:25 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.188"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": " _Changes since **LTS 3033.3.15**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-20593](https://nvd.nist.gov/vuln/detail/CVE-2023-20593), [CVE-2023-2898](https://nvd.nist.gov/vuln/detail/CVE-2023-2898), [CVE-2023-31248](https://nvd.nist.gov/vuln/detail/CVE-2023-31248), [CVE-2023-3390](https://nvd.nist.gov/vuln/detail/CVE-2023-3390), [CVE-2023-35001](https://nvd.nist.gov/vuln/detail/CVE-2023-35001), [CVE-2023-3610](https://nvd.nist.gov/vuln/detail/CVE-2023-3610), [CVE-2023-3611](https://nvd.nist.gov/vuln/detail/CVE-2023-3611), [CVE-2023-3776](https://nvd.nist.gov/vuln/detail/CVE-2023-3776), [CVE-2023-3863](https://nvd.nist.gov/vuln/detail/CVE-2023-3863))\n - linux-firmware ([CVE-2023-20593](https://nvd.nist.gov/vuln/detail/CVE-2023-20593))\n \n #### Updates:\n \n - Linux ([5.10.188](https://lwn.net/Articles/939425) (includes [5.10.187](https://lwn.net/Articles/939105)))\n - ca-certificates ([3.92](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_92.html))\n - linux-firmware ([20230625](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625))\n"
  },
  "3033.3.17": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-09-06 13:19:04 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.193"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": " _Changes since **LTS 3033.3.16**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982), [CVE-2022-41804](https://nvd.nist.gov/vuln/detail/CVE-2022-41804), [CVE-2023-20569](https://nvd.nist.gov/vuln/detail/CVE-2023-20569), [CVE-2023-23908](https://nvd.nist.gov/vuln/detail/CVE-2023-23908), [CVE-2023-1206](https://nvd.nist.gov/vuln/detail/CVE-2023-1206), [CVE-2023-20588](https://nvd.nist.gov/vuln/detail/CVE-2023-20588), [CVE-2023-40283](https://nvd.nist.gov/vuln/detail/CVE-2023-40283), [CVE-2023-4128](https://nvd.nist.gov/vuln/detail/CVE-2023-4128), [CVE-2023-4147](https://nvd.nist.gov/vuln/detail/CVE-2023-4147), [CVE-2023-4273](https://nvd.nist.gov/vuln/detail/CVE-2023-4273))\n \n #### Updates:\n \n - Linux ([5.10.193](https://lwn.net/Articles/943114) (includes [5.10.192](https://lwn.net/Articles/942867), [5.10.191](https://lwn.net/Articles/941777),[5.10.190](https://lwn.net/Articles/941276), [5.10.189](https://lwn.net/Articles/940802)))"
  },
  "3033.3.18": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-10-25 08:40:29 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.198"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "_Changes since **LTS 3033.3.17**_\n\n#### Security fixes:\n\n- Linux ([CVE-2023-31085](https://nvd.nist.gov/vuln/detail/CVE-2023-31085), [CVE-2023-34324](https://nvd.nist.gov/vuln/detail/CVE-2023-34324), [CVE-2023-39189](https://nvd.nist.gov/vuln/detail/CVE-2023-39189), [CVE-2023-39192](https://nvd.nist.gov/vuln/detail/CVE-2023-39192), [CVE-2023-39193](https://nvd.nist.gov/vuln/detail/CVE-2023-39193), [CVE-2023-4244](https://nvd.nist.gov/vuln/detail/CVE-2023-4244), [CVE-2023-42752](https://nvd.nist.gov/vuln/detail/CVE-2023-42752), [CVE-2023-42753](https://nvd.nist.gov/vuln/detail/CVE-2023-42753), [CVE-2023-42754](https://nvd.nist.gov/vuln/detail/CVE-2023-42754), [CVE-2023-42755](https://nvd.nist.gov/vuln/detail/CVE-2023-42755), [CVE-2023-45871](https://nvd.nist.gov/vuln/detail/CVE-2023-45871), [CVE-2023-4623](https://nvd.nist.gov/vuln/detail/CVE-2023-4623), [CVE-2023-4921](https://nvd.nist.gov/vuln/detail/CVE-2023-4921), [CVE-2023-5197](https://nvd.nist.gov/vuln/detail/CVE-2023-5197))\n- curl ([CVE-2023-38545](https://nvd.nist.gov/vuln/detail/CVE-2023-38545), [CVE-2023-38546](https://nvd.nist.gov/vuln/detail/CVE-2023-38546))\n\n#### Bug fixes:\n\n\n#### Changes:\n\n- Add support for Microsoft Azure Network Adapter (MANA) NICs on Azure ([scripts#1131](https://github.com/flatcar/scripts/pull/1131))\n\n#### Updates:\n\n- ca-certificates ([3.94](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html))\n- Linux ([5.10.198](https://lwn.net/Articles/947300) (includes [5.10.197](https://lwn.net/Articles/945381), [5.10.196](https://lwn.net/Articles/945131), [5.10.195](https://lwn.net/Articles/944878), [5.10.194](https://lwn.net/Articles/943405)))"
  },
  "3033.3.2": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-06-23 11:49:00 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.123"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **LTS-2022** Release **3033.3.2**\n\nChanges since **LTS 3033.3.1**\n\n#### Security fixes:\n\n- Linux ([CVE-2022-1012](https://nvd.nist.gov/vuln/detail/CVE-2022-1012), [CVE-2022-1789](https://nvd.nist.gov/vuln/detail/CVE-2022-1789), [CVE-2022-1852](https://nvd.nist.gov/vuln/detail/CVE-2022-1852), [CVE-2022-1972](https://nvd.nist.gov/vuln/detail/CVE-2022-1972), [CVE-2022-2078](https://nvd.nist.gov/vuln/detail/CVE-2022-2078), [CVE-2022-21499](https://nvd.nist.gov/vuln/detail/CVE-2022-21499), [CVE-2022-32250](https://nvd.nist.gov/vuln/detail/CVE-2022-32250), [CVE-2022-32981](https://nvd.nist.gov/vuln/detail/CVE-2022-32981))\n- libpcre2 ([CVE-2022-1586](https://nvd.nist.gov/vuln/detail/CVE-2022-1586), [CVE-2022-1587](https://nvd.nist.gov/vuln/detail/CVE-2022-1587))\n\n#### Updates:\n\n- Linux ([5.10.123](https://lwn.net/Articles/898125) (includes [5.10.122](https://lwn.net/Articles/897903), [5.10.121](https://lwn.net/Articles/897378), [5.10.120](https://lwn.net/Articles/897168), [5.10.119](https://lwn.net/Articles/896648))\n- ca-certificates ([3.79](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_79.html))\n- libpcre2 ([10.40](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.40/NEWS))"
  },
  "3033.3.3": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-07-21 15:46:59 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.131"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New **LTS-2022** Release **3033.3.3**\n\n_Changes since **LTS 3033.3.2**_\n\n#### Security fixes:\n\n- Linux ([CVE-2021-33655](https://nvd.nist.gov/vuln/detail/CVE-2021-33655), [CVE-2021-33656](https://nvd.nist.gov/vuln/detail/CVE-2021-33656), [CVE-2022-2318](https://nvd.nist.gov/vuln/detail/CVE-2022-2318), [CVE-2022-26365](https://nvd.nist.gov/vuln/detail/CVE-2022-26365), [CVE-2022-32296](https://nvd.nist.gov/vuln/detail/CVE-2022-32296), [CVE-2022-33740](https://nvd.nist.gov/vuln/detail/CVE-2022-33740), [CVE-2022-33741](https://nvd.nist.gov/vuln/detail/CVE-2022-33741), [CVE-2022-33742](https://nvd.nist.gov/vuln/detail/CVE-2022-33742), [CVE-2022-33743](https://nvd.nist.gov/vuln/detail/CVE-2022-33743), [CVE-2022-33744](https://nvd.nist.gov/vuln/detail/CVE-2022-33744), [CVE-2022-34918](https://nvd.nist.gov/vuln/detail/CVE-2022-34918))\n- containerd ([CVE-2022-31030](https://nvd.nist.gov/vuln/detail/CVE-2022-31030))\n\n#### Bug fixes:\n\n- Removed outdated LTS channel information printed on login ([init#75](https://github.com/flatcar/init/pull/75))\n\n#### Changes:\n\n- Enabled `containerd.service` unit, `br_netfilter` and `overlay` modules by default to follow Kubernetes requirements ([coreos-overlay#1944](https://github.com/flatcar/coreos-overlay/pull/1944), [init#72](https://github.com/flatcar/init/pull/72))\n- DigitalOcean: In addition to the `bz2` image, a `gz` compressed image is published. This helps against hitting the compression timeout that sometimes lets the image import fail.\n- OpenStack: In addition to the `bz2` image, a `gz` compressed image is published. This allows Glance to directly consume the images by simply passing in the URL of the image.\n- SDK: The image compression format is now configurable. Supported formats are: `bz2`, `gz`, `zip`, `none`, `zst`. Selecting the image format can now be done by passing the `--image_compression_formats` option. This flag gets a comma separated list of formats.\n\n#### Updates:\n\n- Linux ([5.10.131](https://lwn.net/Articles/901381/) (includes [5.10.130](https://lwn.net/Articles/900910), [5.10.129](https://lwn.net/Articles/900322), [5.10.128](https://lwn.net/Articles/899789), [5.10.127](https://lwn.net/Articles/899371), [5.10.126](https://lwn.net/Articles/899121), [5.10.125](https://lwn.net/Articles/899090), [5.10.124](https://lwn.net/Articles/898623)))\n- ca-certificates ([3.80](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_80.html))\n- containerd ([1.5.13](https://github.com/containerd/containerd/releases/tag/v1.5.13))"
  },
  "3033.3.4": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-08-04 12:04:45 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.134"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "New LTS-2022 Release 3033.3.4\n\nChanges since LTS-2022 3033.3.3\n\n## Security fixes:\n\n- Linux ([CVE-2022-23816](https://nvd.nist.gov/vuln/detail/CVE-2022-23816), [CVE-2022-23825](https://nvd.nist.gov/vuln/detail/CVE-2022-23825), [CVE-2022-29900](https://nvd.nist.gov/vuln/detail/CVE-2022-29900), [CVE-2022-29901](https://nvd.nist.gov/vuln/detail/CVE-2022-29901))\n\n## Bug fixes:\n\n\n## Changes:\n\n\n## Updates:\n\n- Linux ([5.10.134](https://lwn.net/Articles/902918) (includes [5.10.133](https://lwn.net/Articles/902372), [5.10.132](https://lwn.net/Articles/902102)))\n- ca-certificates ([3.81](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_81.html))\n"
  },
  "3033.3.5": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-09-01 12:58:14 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.137"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "_Changes since **LTS 3033.3.4**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-1679](https://nvd.nist.gov/vuln/detail/CVE-2022-1679), [CVE-2022-2153](https://nvd.nist.gov/vuln/detail/CVE-2022-2153), [CVE-2022-2585](https://nvd.nist.gov/vuln/detail/CVE-2022-2585), [CVE-2022-2586](https://nvd.nist.gov/vuln/detail/CVE-2022-2586), [CVE-2022-2588](https://nvd.nist.gov/vuln/detail/CVE-2022-2588), [CVE-2022-26373](https://nvd.nist.gov/vuln/detail/CVE-2022-26373), [CVE-2022-36946](https://nvd.nist.gov/vuln/detail/CVE-2022-36946))\n\n#### Changes:\n\n- The new image signing subkey was added to the public key embedded into `flatcar-install` (the old expired on 10th August 2022), only an updated `flatcar-install` script can verify releases signed with the new key ([init#79](https://github.com/flatcar/init/pull/79))\n\n#### Updates:\n\n- Linux ([5.10.137](https://lwn.net/Articles/905534) (includes [5.10.136](https://lwn.net/Articles/904462), [5.10.135](https://lwn.net/Articles/903689)))\n- ca-certificates ([3.82](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_82.html))\n\n"
  },
  "3033.3.6": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-10-17 14:39:29 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.142"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "_Changes since **LTS 3033.3.5**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-2905](https://nvd.nist.gov/vuln/detail/CVE-2022-2905), [CVE-2022-3028](https://nvd.nist.gov/vuln/detail/CVE-2022-3028), [CVE-2022-39190](https://nvd.nist.gov/vuln/detail/CVE-2022-39190))\n- torcx ([CVE-2021-38561](https://nvd.nist.gov/vuln/detail/CVE-2021-38561), [CVE-2021-43565](https://nvd.nist.gov/vuln/detail/CVE-2021-43565), [CVE-2022-27191](https://nvd.nist.gov/vuln/detail/CVE-2022-27191))\n\n#### Bug fixes:\n\n- Equinix Metal: Fixed serial console settings for the `m3.small.x86` instance by expanding the GRUB check for `i386` to `x86_64` [coreos-overlay#2122](https://github.com/flatcar-linux/coreos-overlay/pull/2122)\n\n#### Changes:\n\n- emerge-gitclone: Migrate emerge-gitclone to use scripts repo tags and submodule refs\n\n#### Updates:\n\n- Linux ([5.10.142](https://lwn.net/Articles/907525) (includes [5.10.141](https://lwn.net/Articles/907205), [5.10.140](https://lwn.net/Articles/906628), [5.10.139](https://lwn.net/Articles/906359), [5.10.138](https://lwn.net/Articles/906062)))\n- ca-certificates ([3.83](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_83.html))\n- locksmith([0.7.0](https://github.com/flatcar/locksmith/blob/v0.7.0/CHANGELOG.md#v070--30112021))\n"
  },
  "3033.3.7": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-11-17 12:03:56 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.154"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": " _Changes since **LTS 3033.3.6**_\n \n #### Security fixes:\n \n - Linux ([CVE-2021-4037](https://nvd.nist.gov/vuln/detail/CVE-2021-4037), [CVE-2022-0171](https://nvd.nist.gov/vuln/detail/CVE-2022-0171), [CVE-2022-2602](https://nvd.nist.gov/vuln/detail/CVE-2022-2602), [CVE-2022-2663](https://nvd.nist.gov/vuln/detail/CVE-2022-2663), [CVE-2022-3061](https://nvd.nist.gov/vuln/detail/CVE-2022-3061), [CVE-2022-3303](https://nvd.nist.gov/vuln/detail/CVE-2022-3303), [CVE-2022-3535](https://nvd.nist.gov/vuln/detail/CVE-2022-3535), [CVE-2022-3542](https://nvd.nist.gov/vuln/detail/CVE-2022-3542), [CVE-2022-3565](https://nvd.nist.gov/vuln/detail/CVE-2022-3565), [CVE-2022-3586](https://nvd.nist.gov/vuln/detail/CVE-2022-3586), [CVE-2022-3594](https://nvd.nist.gov/vuln/detail/CVE-2022-3594), [CVE-2022-3621](https://nvd.nist.gov/vuln/detail/CVE-2022-3621), [CVE-2022-3646](https://nvd.nist.gov/vuln/detail/CVE-2022-3646), [CVE-2022-3649](https://nvd.nist.gov/vuln/detail/CVE-2022-3649), [CVE-2022-39842](https://nvd.nist.gov/vuln/detail/CVE-2022-39842), [CVE-2022-40307](https://nvd.nist.gov/vuln/detail/CVE-2022-40307), [CVE-2022-40768](https://nvd.nist.gov/vuln/detail/CVE-2022-40768), [CVE-2022-41674](https://nvd.nist.gov/vuln/detail/CVE-2022-41674), [CVE-2022-42719](https://nvd.nist.gov/vuln/detail/CVE-2022-42719), [CVE-2022-42720](https://nvd.nist.gov/vuln/detail/CVE-2022-42720), [CVE-2022-42721](https://nvd.nist.gov/vuln/detail/CVE-2022-42721), [CVE-2022-42722](https://nvd.nist.gov/vuln/detail/CVE-2022-42722), [CVE-2022-43750](https://nvd.nist.gov/vuln/detail/CVE-2022-43750))\n \n #### Updates:\n \n - Linux ([5.10.154](https://lwn.net/Articles/914423) (includes [5.10.153](https://lwn.net/Articles/913682) [5.10.152](https://lwn.net/Articles/913110), [5.10.151](https://lwn.net/Articles/912993), [5.10.150](https://lwn.net/Articles/912501), [5.10.149](https://lwn.net/Articles/911488), [5.10.148](https://lwn.net/Articles/911276), [5.10.147](https://lwn.net/Articles/910399), [5.10.146](https://lwn.net/Articles/909680), [5.10.145](https://lwn.net/Articles/909213), [5.10.144](https://lwn.net/Articles/908783), [5.10.143](https://lwn.net/Articles/908141)))\n - ca-certificates ([3.84](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_84.html))\n"
  },
  "3033.3.8": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2022-12-09 09:46:54 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.157"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": " _Changes since **LTS 3033.3.7**_\n \n#### Security fixes:\n \n- Linux ([CVE-2022-3169](https://nvd.nist.gov/vuln/detail/CVE-2022-3169), [CVE-2022-3521](https://nvd.nist.gov/vuln/detail/CVE-2022-3521))\n\n#### Updates:\n \n- Linux ([5.10.157](https://lwn.net/Articles/916764) (includes [5.10.156](https://lwn.net/Articles/915992), [5.10.155](https://lwn.net/Articles/915101)))"
  },
  "3033.3.9": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-01-24 13:14:09 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.164"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "_Changes since **LTS 3033.3.8**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-3424](https://nvd.nist.gov/vuln/detail/CVE-2022-3424), [CVE-2022-3534](https://nvd.nist.gov/vuln/detail/CVE-2022-3534), [CVE-2022-3545](https://nvd.nist.gov/vuln/detail/CVE-2022-3545), [CVE-2022-3623](https://nvd.nist.gov/vuln/detail/CVE-2022-3623), [CVE-2022-36280](https://nvd.nist.gov/vuln/detail/CVE-2022-36280), [CVE-2022-3643](https://nvd.nist.gov/vuln/detail/CVE-2022-3643), [CVE-2022-41218](https://nvd.nist.gov/vuln/detail/CVE-2022-41218), [CVE-2022-4378](https://nvd.nist.gov/vuln/detail/CVE-2022-4378), [CVE-2022-45934](https://nvd.nist.gov/vuln/detail/CVE-2022-45934), [CVE-2022-47929](https://nvd.nist.gov/vuln/detail/CVE-2022-47929), [CVE-2023-0266](https://nvd.nist.gov/vuln/detail/CVE-2023-0266), [CVE-2023-0394](https://nvd.nist.gov/vuln/detail/CVE-2023-0394), [CVE-2023-23454](https://nvd.nist.gov/vuln/detail/CVE-2023-23454), [CVE-2023-23455](https://nvd.nist.gov/vuln/detail/CVE-2023-23455))\n\n#### Bug fixes:\n\n\n#### Changes:\n\n\n#### Updates:\n\n- Linux ([5.10.164](https://lwn.net/Articles/920322) (includes [5.10.163](https://lwn.net/Articles/920013), [5.10.162](https://lwn.net/Articles/919055), [5.10.161](https://lwn.net/Articles/918330), [5.10.160](https://lwn.net/Articles/918207), [5.10.159](https://lwn.net/Articles/917899), [5.10.158](https://lwn.net/Articles/917402)))\n- ca-certificates ([3.87](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_87.html) (includes [3.86](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_86.html)))\n"
  },
  "3510.3.0": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-10-05 10:09:06 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.132"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **Stable 3510.2.8**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-42752](https://nvd.nist.gov/vuln/detail/CVE-2023-42752), [CVE-2023-42753](https://nvd.nist.gov/vuln/detail/CVE-2023-42753), [CVE-2023-4623](https://nvd.nist.gov/vuln/detail/CVE-2023-4623), [CVE-2023-4921](https://nvd.nist.gov/vuln/detail/CVE-2023-4921))\n \n #### Bug fixes:\n \n \n #### Changes:\n \n - Use qcow2 compressed format instead of additional compression layer in Qemu images ([Flatcar#1135](https://github.com/flatcar/Flatcar/issues/1135), [scripts#1132](https://github.com/flatcar/scripts/pull/1132))\n \n #### Updates:\n \n - Linux ([5.15.132](https://lwn.net/Articles/944877) (includes [5.15.131](https://lwn.net/Articles/943755), [5.15.130](https://lwn.net/Articles/943404)))\n\n\n**Changes compared to LTS-2022 3033.3.17**\n\n #### Security fixes:\n \n - Linux ([CVE-2019-15794](https://nvd.nist.gov/vuln/detail/CVE-2019-15794),[CVE-2020-16119](https://nvd.nist.gov/vuln/detail/CVE-2020-16119),[CVE-2020-24586](https://nvd.nist.gov/vuln/detail/CVE-2020-24586),[CVE-2020-24587](https://nvd.nist.gov/vuln/detail/CVE-2020-24587),[CVE-2020-24588](https://nvd.nist.gov/vuln/detail/CVE-2020-24588),[CVE-2020-25639](https://nvd.nist.gov/vuln/detail/CVE-2020-25639),[CVE-2020-25670](https://nvd.nist.gov/vuln/detail/CVE-2020-25670),[CVE-2020-25671](https://nvd.nist.gov/vuln/detail/CVE-2020-25671),[CVE-2020-25672](https://nvd.nist.gov/vuln/detail/CVE-2020-25672),[CVE-2020-25673](https://nvd.nist.gov/vuln/detail/CVE-2020-25673),[CVE-2020-26139](https://nvd.nist.gov/vuln/detail/CVE-2020-26139),[CVE-2020-26141](https://nvd.nist.gov/vuln/detail/CVE-2020-26141),[CVE-2020-26145](https://nvd.nist.gov/vuln/detail/CVE-2020-26145),[CVE-2020-26147](https://nvd.nist.gov/vuln/detail/CVE-2020-26147),[CVE-2020-26541](https://nvd.nist.gov/vuln/detail/CVE-2020-26541),[CVE-2020-26555](https://nvd.nist.gov/vuln/detail/CVE-2020-26555),[CVE-2020-26558](https://nvd.nist.gov/vuln/detail/CVE-2020-26558),[CVE-2020-27170](https://nvd.nist.gov/vuln/detail/CVE-2020-27170),[CVE-2020-27171](https://nvd.nist.gov/vuln/detail/CVE-2020-27171),[CVE-2020-27820](https://nvd.nist.gov/vuln/detail/CVE-2020-27820),[CVE-2020-36516](https://nvd.nist.gov/vuln/detail/CVE-2020-36516),[CVE-2021-0129](https://nvd.nist.gov/vuln/detail/CVE-2021-0129),[CVE-2021-0512](https://nvd.nist.gov/vuln/detail/CVE-2021-0512),[CVE-2021-0920](https://nvd.nist.gov/vuln/detail/CVE-2021-0920),[CVE-2021-0937](https://nvd.nist.gov/vuln/detail/CVE-2021-0937),[CVE-2021-0941](https://nvd.nist.gov/vuln/detail/CVE-2021-0941),[CVE-2021-20320](https://nvd.nist.gov/vuln/detail/CVE-2021-20320),[CVE-2021-20321](https://nvd.nist.gov/vuln/detail/CVE-2021-20321),[CVE-2021-20322](https://nvd.nist.gov/vuln/detail/CVE-2021-20322),[CVE-2021-22543](https://nvd.nist.gov/vuln/detail/CVE-2021-22543),[CVE-2021-22555](https://nvd.nist.gov/vuln/detail/CVE-2021-22555),[CVE-2021-22600](https://nvd.nist.gov/vuln/detail/CVE-2021-22600),[CVE-2021-23133](https://nvd.nist.gov/vuln/detail/CVE-2021-23133),[CVE-2021-23134](https://nvd.nist.gov/vuln/detail/CVE-2021-23134),[CVE-2021-26401](https://nvd.nist.gov/vuln/detail/CVE-2021-26401),[CVE-2021-26930](https://nvd.nist.gov/vuln/detail/CVE-2021-26930),[CVE-2021-26931](https://nvd.nist.gov/vuln/detail/CVE-2021-26931),[CVE-2021-26932](https://nvd.nist.gov/vuln/detail/CVE-2021-26932),[CVE-2021-27363](https://nvd.nist.gov/vuln/detail/CVE-2021-27363),[CVE-2021-27364](https://nvd.nist.gov/vuln/detail/CVE-2021-27364),[CVE-2021-27365](https://nvd.nist.gov/vuln/detail/CVE-2021-27365),[CVE-2021-28038](https://nvd.nist.gov/vuln/detail/CVE-2021-28038),[CVE-2021-28039](https://nvd.nist.gov/vuln/detail/CVE-2021-28039),[CVE-2021-28375](https://nvd.nist.gov/vuln/detail/CVE-2021-28375),[CVE-2021-28660](https://nvd.nist.gov/vuln/detail/CVE-2021-28660),[CVE-2021-28688](https://nvd.nist.gov/vuln/detail/CVE-2021-28688),[CVE-2021-28691](https://nvd.nist.gov/vuln/detail/CVE-2021-28691),[CVE-2021-28711](https://nvd.nist.gov/vuln/detail/CVE-2021-28711),[CVE-2021-28712](https://nvd.nist.gov/vuln/detail/CVE-2021-28712),[CVE-2021-28713](https://nvd.nist.gov/vuln/detail/CVE-2021-28713),[CVE-2021-28714](https://nvd.nist.gov/vuln/detail/CVE-2021-28714),[CVE-2021-28715](https://nvd.nist.gov/vuln/detail/CVE-2021-28715),[CVE-2021-28950](https://nvd.nist.gov/vuln/detail/CVE-2021-28950),[CVE-2021-28951](https://nvd.nist.gov/vuln/detail/CVE-2021-28951),[CVE-2021-28952](https://nvd.nist.gov/vuln/detail/CVE-2021-28952),[CVE-2021-28964](https://nvd.nist.gov/vuln/detail/CVE-2021-28964),[CVE-2021-28971](https://nvd.nist.gov/vuln/detail/CVE-2021-28971),[CVE-2021-28972](https://nvd.nist.gov/vuln/detail/CVE-2021-28972),[CVE-2021-29154](https://nvd.nist.gov/vuln/detail/CVE-2021-29154),[CVE-2021-29155](https://nvd.nist.gov/vuln/detail/CVE-2021-29155),[CVE-2021-29264](https://nvd.nist.gov/vuln/detail/CVE-2021-29264),[CVE-2021-29265](https://nvd.nist.gov/vuln/detail/CVE-2021-29265),[CVE-2021-29266](https://nvd.nist.gov/vuln/detail/CVE-2021-29266),[CVE-2021-29646](https://nvd.nist.gov/vuln/detail/CVE-2021-29646),[CVE-2021-29647](https://nvd.nist.gov/vuln/detail/CVE-2021-29647),[CVE-2021-29648](https://nvd.nist.gov/vuln/detail/CVE-2021-29648),[CVE-2021-29649](https://nvd.nist.gov/vuln/detail/CVE-2021-29649),[CVE-2021-29650](https://nvd.nist.gov/vuln/detail/CVE-2021-29650),[CVE-2021-29657](https://nvd.nist.gov/vuln/detail/CVE-2021-29657),[CVE-2021-30002](https://nvd.nist.gov/vuln/detail/CVE-2021-30002),[CVE-2021-31440](https://nvd.nist.gov/vuln/detail/CVE-2021-31440),[CVE-2021-31829](https://nvd.nist.gov/vuln/detail/CVE-2021-31829),[CVE-2021-31916](https://nvd.nist.gov/vuln/detail/CVE-2021-31916),[CVE-2021-32399](https://nvd.nist.gov/vuln/detail/CVE-2021-32399),[CVE-2021-32606](https://nvd.nist.gov/vuln/detail/CVE-2021-32606),[CVE-2021-33033](https://nvd.nist.gov/vuln/detail/CVE-2021-33033),[CVE-2021-33034](https://nvd.nist.gov/vuln/detail/CVE-2021-33034),[CVE-2021-33098](https://nvd.nist.gov/vuln/detail/CVE-2021-33098),[CVE-2021-33135](https://nvd.nist.gov/vuln/detail/CVE-2021-33135),[CVE-2021-33200](https://nvd.nist.gov/vuln/detail/CVE-2021-33200),[CVE-2021-33624](https://nvd.nist.gov/vuln/detail/CVE-2021-33624),[CVE-2021-33655](https://nvd.nist.gov/vuln/detail/CVE-2021-33655),[CVE-2021-33909](https://nvd.nist.gov/vuln/detail/CVE-2021-33909),[CVE-2021-3444](https://nvd.nist.gov/vuln/detail/CVE-2021-3444),[CVE-2021-34556](https://nvd.nist.gov/vuln/detail/CVE-2021-34556),[CVE-2021-34693](https://nvd.nist.gov/vuln/detail/CVE-2021-34693),[CVE-2021-3483](https://nvd.nist.gov/vuln/detail/CVE-2021-3483),[CVE-2021-34866](https://nvd.nist.gov/vuln/detail/CVE-2021-34866),[CVE-2021-3489](https://nvd.nist.gov/vuln/detail/CVE-2021-3489),[CVE-2021-3490](https://nvd.nist.gov/vuln/detail/CVE-2021-3490),[CVE-2021-3491](https://nvd.nist.gov/vuln/detail/CVE-2021-3491),[CVE-2021-34981](https://nvd.nist.gov/vuln/detail/CVE-2021-34981),[CVE-2021-3501](https://nvd.nist.gov/vuln/detail/CVE-2021-3501),[CVE-2021-35039](https://nvd.nist.gov/vuln/detail/CVE-2021-35039),[CVE-2021-3506](https://nvd.nist.gov/vuln/detail/CVE-2021-3506),[CVE-2021-3543](https://nvd.nist.gov/vuln/detail/CVE-2021-3543),[CVE-2021-35477](https://nvd.nist.gov/vuln/detail/CVE-2021-35477),[CVE-2021-3564](https://nvd.nist.gov/vuln/detail/CVE-2021-3564),[CVE-2021-3573](https://nvd.nist.gov/vuln/detail/CVE-2021-3573),[CVE-2021-3600](https://nvd.nist.gov/vuln/detail/CVE-2021-3600),[CVE-2021-3609](https://nvd.nist.gov/vuln/detail/CVE-2021-3609),[CVE-2021-3612](https://nvd.nist.gov/vuln/detail/CVE-2021-3612),[CVE-2021-3640](https://nvd.nist.gov/vuln/detail/CVE-2021-3640),[CVE-2021-3653](https://nvd.nist.gov/vuln/detail/CVE-2021-3653),[CVE-2021-3655](https://nvd.nist.gov/vuln/detail/CVE-2021-3655),[CVE-2021-3656](https://nvd.nist.gov/vuln/detail/CVE-2021-3656),[CVE-2021-3659](https://nvd.nist.gov/vuln/detail/CVE-2021-3659),[CVE-2021-3679](https://nvd.nist.gov/vuln/detail/CVE-2021-3679),[CVE-2021-37159](https://nvd.nist.gov/vuln/detail/CVE-2021-37159),[CVE-2021-3732](https://nvd.nist.gov/vuln/detail/CVE-2021-3732),[CVE-2021-3736](https://nvd.nist.gov/vuln/detail/CVE-2021-3736),[CVE-2021-3739](https://nvd.nist.gov/vuln/detail/CVE-2021-3739),[CVE-2021-3743](https://nvd.nist.gov/vuln/detail/CVE-2021-3743),[CVE-2021-3744](https://nvd.nist.gov/vuln/detail/CVE-2021-3744),[CVE-2021-3752](https://nvd.nist.gov/vuln/detail/CVE-2021-3752),[CVE-2021-3753](https://nvd.nist.gov/vuln/detail/CVE-2021-3753),[CVE-2021-37576](https://nvd.nist.gov/vuln/detail/CVE-2021-37576),[CVE-2021-3760](https://nvd.nist.gov/vuln/detail/CVE-2021-3760),[CVE-2021-3764](https://nvd.nist.gov/vuln/detail/CVE-2021-3764),[CVE-2021-3772](https://nvd.nist.gov/vuln/detail/CVE-2021-3772),[CVE-2021-38166](https://nvd.nist.gov/vuln/detail/CVE-2021-38166),[CVE-2021-38198](https://nvd.nist.gov/vuln/detail/CVE-2021-38198),[CVE-2021-38199](https://nvd.nist.gov/vuln/detail/CVE-2021-38199),[CVE-2021-38200](https://nvd.nist.gov/vuln/detail/CVE-2021-38200),[CVE-2021-38201](https://nvd.nist.gov/vuln/detail/CVE-2021-38201),[CVE-2021-38202](https://nvd.nist.gov/vuln/detail/CVE-2021-38202),[CVE-2021-38203](https://nvd.nist.gov/vuln/detail/CVE-2021-38203),[CVE-2021-38204](https://nvd.nist.gov/vuln/detail/CVE-2021-38204),[CVE-2021-38205](https://nvd.nist.gov/vuln/detail/CVE-2021-38205),[CVE-2021-38206](https://nvd.nist.gov/vuln/detail/CVE-2021-38206),[CVE-2021-38207](https://nvd.nist.gov/vuln/detail/CVE-2021-38207),[CVE-2021-38208](https://nvd.nist.gov/vuln/detail/CVE-2021-38208),[CVE-2021-38209](https://nvd.nist.gov/vuln/detail/CVE-2021-38209),[CVE-2021-38300](https://nvd.nist.gov/vuln/detail/CVE-2021-38300),[CVE-2021-3923](https://nvd.nist.gov/vuln/detail/CVE-2021-3923),[CVE-2021-39633](https://nvd.nist.gov/vuln/detail/CVE-2021-39633),[CVE-2021-39656](https://nvd.nist.gov/vuln/detail/CVE-2021-39656),[CVE-2021-39685](https://nvd.nist.gov/vuln/detail/CVE-2021-39685),[CVE-2021-39686](https://nvd.nist.gov/vuln/detail/CVE-2021-39686),[CVE-2021-39698](https://nvd.nist.gov/vuln/detail/CVE-2021-39698),[CVE-2021-4001](https://nvd.nist.gov/vuln/detail/CVE-2021-4001),[CVE-2021-4002](https://nvd.nist.gov/vuln/detail/CVE-2021-4002),[CVE-2021-4028](https://nvd.nist.gov/vuln/detail/CVE-2021-4028),[CVE-2021-40490](https://nvd.nist.gov/vuln/detail/CVE-2021-40490),[CVE-2021-4083](https://nvd.nist.gov/vuln/detail/CVE-2021-4083),[CVE-2021-4090](https://nvd.nist.gov/vuln/detail/CVE-2021-4090),[CVE-2021-4093](https://nvd.nist.gov/vuln/detail/CVE-2021-4093),[CVE-2021-41073](https://nvd.nist.gov/vuln/detail/CVE-2021-41073),[CVE-2021-4135](https://nvd.nist.gov/vuln/detail/CVE-2021-4135),[CVE-2021-4148](https://nvd.nist.gov/vuln/detail/CVE-2021-4148),[CVE-2021-4149](https://nvd.nist.gov/vuln/detail/CVE-2021-4149),[CVE-2021-4154](https://nvd.nist.gov/vuln/detail/CVE-2021-4154),[CVE-2021-4155](https://nvd.nist.gov/vuln/detail/CVE-2021-4155),[CVE-2021-4157](https://nvd.nist.gov/vuln/detail/CVE-2021-4157),[CVE-2021-41864](https://nvd.nist.gov/vuln/detail/CVE-2021-41864),[CVE-2021-4197](https://nvd.nist.gov/vuln/detail/CVE-2021-4197),[CVE-2021-42008](https://nvd.nist.gov/vuln/detail/CVE-2021-42008),[CVE-2021-4202](https://nvd.nist.gov/vuln/detail/CVE-2021-4202),[CVE-2021-4203](https://nvd.nist.gov/vuln/detail/CVE-2021-4203),[CVE-2021-42252](https://nvd.nist.gov/vuln/detail/CVE-2021-42252),[CVE-2021-42327](https://nvd.nist.gov/vuln/detail/CVE-2021-42327),[CVE-2021-42739](https://nvd.nist.gov/vuln/detail/CVE-2021-42739),[CVE-2021-43056](https://nvd.nist.gov/vuln/detail/CVE-2021-43056),[CVE-2021-43057](https://nvd.nist.gov/vuln/detail/CVE-2021-43057),[CVE-2021-43267](https://nvd.nist.gov/vuln/detail/CVE-2021-43267),[CVE-2021-43389](https://nvd.nist.gov/vuln/detail/CVE-2021-43389),[CVE-2021-43975](https://nvd.nist.gov/vuln/detail/CVE-2021-43975),[CVE-2021-43976](https://nvd.nist.gov/vuln/detail/CVE-2021-43976),[CVE-2021-44733](https://nvd.nist.gov/vuln/detail/CVE-2021-44733),[CVE-2021-44879](https://nvd.nist.gov/vuln/detail/CVE-2021-44879),[CVE-2021-45095](https://nvd.nist.gov/vuln/detail/CVE-2021-45095),[CVE-2021-45100](https://nvd.nist.gov/vuln/detail/CVE-2021-45100),[CVE-2021-45402](https://nvd.nist.gov/vuln/detail/CVE-2021-45402),[CVE-2021-45469](https://nvd.nist.gov/vuln/detail/CVE-2021-45469),[CVE-2021-45480](https://nvd.nist.gov/vuln/detail/CVE-2021-45480),[CVE-2021-45485](https://nvd.nist.gov/vuln/detail/CVE-2021-45485),[CVE-2021-45486](https://nvd.nist.gov/vuln/detail/CVE-2021-45486),[CVE-2021-45868](https://nvd.nist.gov/vuln/detail/CVE-2021-45868),[CVE-2021-46283](https://nvd.nist.gov/vuln/detail/CVE-2021-46283),[CVE-2022-0001](https://nvd.nist.gov/vuln/detail/CVE-2022-0001),[CVE-2022-0002](https://nvd.nist.gov/vuln/detail/CVE-2022-0002),[CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168),[CVE-2022-0171](https://nvd.nist.gov/vuln/detail/CVE-2022-0171),[CVE-2022-0185](https://nvd.nist.gov/vuln/detail/CVE-2022-0185),[CVE-2022-0264](https://nvd.nist.gov/vuln/detail/CVE-2022-0264),[CVE-2022-0286](https://nvd.nist.gov/vuln/detail/CVE-2022-0286),[CVE-2022-0322](https://nvd.nist.gov/vuln/detail/CVE-2022-0322),[CVE-2022-0330](https://nvd.nist.gov/vuln/detail/CVE-2022-0330),[CVE-2022-0382](https://nvd.nist.gov/vuln/detail/CVE-2022-0382),[CVE-2022-0435](https://nvd.nist.gov/vuln/detail/CVE-2022-0435),[CVE-2022-0487](https://nvd.nist.gov/vuln/detail/CVE-2022-0487),[CVE-2022-0492](https://nvd.nist.gov/vuln/detail/CVE-2022-0492),[CVE-2022-0494](https://nvd.nist.gov/vuln/detail/CVE-2022-0494),[CVE-2022-0500](https://nvd.nist.gov/vuln/detail/CVE-2022-0500),[CVE-2022-0516](https://nvd.nist.gov/vuln/detail/CVE-2022-0516),[CVE-2022-0617](https://nvd.nist.gov/vuln/detail/CVE-2022-0617),[CVE-2022-0742](https://nvd.nist.gov/vuln/detail/CVE-2022-0742),[CVE-2022-0847](https://nvd.nist.gov/vuln/detail/CVE-2022-0847),[CVE-2022-0850](https://nvd.nist.gov/vuln/detail/CVE-2022-0850),[CVE-2022-0995](https://nvd.nist.gov/vuln/detail/CVE-2022-0995),[CVE-2022-1011](https://nvd.nist.gov/vuln/detail/CVE-2022-1011),[CVE-2022-1012](https://nvd.nist.gov/vuln/detail/CVE-2022-1012),[CVE-2022-1015](https://nvd.nist.gov/vuln/detail/CVE-2022-1015),[CVE-2022-1016](https://nvd.nist.gov/vuln/detail/CVE-2022-1016),[CVE-2022-1043](https://nvd.nist.gov/vuln/detail/CVE-2022-1043),[CVE-2022-1048](https://nvd.nist.gov/vuln/detail/CVE-2022-1048),[CVE-2022-1055](https://nvd.nist.gov/vuln/detail/CVE-2022-1055),[CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158),[CVE-2022-1184](https://nvd.nist.gov/vuln/detail/CVE-2022-1184),[CVE-2022-1195](https://nvd.nist.gov/vuln/detail/CVE-2022-1195),[CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198),[CVE-2022-1199](https://nvd.nist.gov/vuln/detail/CVE-2022-1199),[CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204),[CVE-2022-1263](https://nvd.nist.gov/vuln/detail/CVE-2022-1263),[CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353),[CVE-2022-1462](https://nvd.nist.gov/vuln/detail/CVE-2022-1462),[CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516),[CVE-2022-1651](https://nvd.nist.gov/vuln/detail/CVE-2022-1651),[CVE-2022-1652](https://nvd.nist.gov/vuln/detail/CVE-2022-1652),[CVE-2022-1671](https://nvd.nist.gov/vuln/detail/CVE-2022-1671),[CVE-2022-1679](https://nvd.nist.gov/vuln/detail/CVE-2022-1679),[CVE-2022-1729](https://nvd.nist.gov/vuln/detail/CVE-2022-1729),[CVE-2022-1734](https://nvd.nist.gov/vuln/detail/CVE-2022-1734),[CVE-2022-1789](https://nvd.nist.gov/vuln/detail/CVE-2022-1789),[CVE-2022-1852](https://nvd.nist.gov/vuln/detail/CVE-2022-1852),[CVE-2022-1943](https://nvd.nist.gov/vuln/detail/CVE-2022-1943),[CVE-2022-1973](https://nvd.nist.gov/vuln/detail/CVE-2022-1973),[CVE-2022-1974](https://nvd.nist.gov/vuln/detail/CVE-2022-1974),[CVE-2022-1975](https://nvd.nist.gov/vuln/detail/CVE-2022-1975),[CVE-2022-1998](https://nvd.nist.gov/vuln/detail/CVE-2022-1998),[CVE-2022-20008](https://nvd.nist.gov/vuln/detail/CVE-2022-20008),[CVE-2022-20132](https://nvd.nist.gov/vuln/detail/CVE-2022-20132),[CVE-2022-20141](https://nvd.nist.gov/vuln/detail/CVE-2022-20141),[CVE-2022-20148](https://nvd.nist.gov/vuln/detail/CVE-2022-20148),[CVE-2022-20154](https://nvd.nist.gov/vuln/detail/CVE-2022-20154),[CVE-2022-20158](https://nvd.nist.gov/vuln/detail/CVE-2022-20158),[CVE-2022-20368](https://nvd.nist.gov/vuln/detail/CVE-2022-20368),[CVE-2022-20369](https://nvd.nist.gov/vuln/detail/CVE-2022-20369),[CVE-2022-20421](https://nvd.nist.gov/vuln/detail/CVE-2022-20421),[CVE-2022-20422](https://nvd.nist.gov/vuln/detail/CVE-2022-20422),[CVE-2022-20566](https://nvd.nist.gov/vuln/detail/CVE-2022-20566),[CVE-2022-20572](https://nvd.nist.gov/vuln/detail/CVE-2022-20572),[CVE-2022-2078](https://nvd.nist.gov/vuln/detail/CVE-2022-2078),[CVE-2022-21123](https://nvd.nist.gov/vuln/detail/CVE-2022-21123),[CVE-2022-21125](https://nvd.nist.gov/vuln/detail/CVE-2022-21125),[CVE-2022-21166](https://nvd.nist.gov/vuln/detail/CVE-2022-21166),[CVE-2022-21499](https://nvd.nist.gov/vuln/detail/CVE-2022-21499),[CVE-2022-21505](https://nvd.nist.gov/vuln/detail/CVE-2022-21505),[CVE-2022-2153](https://nvd.nist.gov/vuln/detail/CVE-2022-2153),[CVE-2022-2196](https://nvd.nist.gov/vuln/detail/CVE-2022-2196),[CVE-2022-22942](https://nvd.nist.gov/vuln/detail/CVE-2022-22942),[CVE-2022-23036](https://nvd.nist.gov/vuln/detail/CVE-2022-23036),[CVE-2022-23037](https://nvd.nist.gov/vuln/detail/CVE-2022-23037),[CVE-2022-23038](https://nvd.nist.gov/vuln/detail/CVE-2022-23038),[CVE-2022-23039](https://nvd.nist.gov/vuln/detail/CVE-2022-23039),[CVE-2022-23040](https://nvd.nist.gov/vuln/detail/CVE-2022-23040),[CVE-2022-23041](https://nvd.nist.gov/vuln/detail/CVE-2022-23041),[CVE-2022-23042](https://nvd.nist.gov/vuln/detail/CVE-2022-23042),[CVE-2022-2308](https://nvd.nist.gov/vuln/detail/CVE-2022-2308),[CVE-2022-2318](https://nvd.nist.gov/vuln/detail/CVE-2022-2318),[CVE-2022-23222](https://nvd.nist.gov/vuln/detail/CVE-2022-23222),[CVE-2022-2380](https://nvd.nist.gov/vuln/detail/CVE-2022-2380),[CVE-2022-23960](https://nvd.nist.gov/vuln/detail/CVE-2022-23960),[CVE-2022-24122](https://nvd.nist.gov/vuln/detail/CVE-2022-24122),[CVE-2022-24448](https://nvd.nist.gov/vuln/detail/CVE-2022-24448),[CVE-2022-24958](https://nvd.nist.gov/vuln/detail/CVE-2022-24958),[CVE-2022-24959](https://nvd.nist.gov/vuln/detail/CVE-2022-24959),[CVE-2022-2503](https://nvd.nist.gov/vuln/detail/CVE-2022-2503),[CVE-2022-25258](https://nvd.nist.gov/vuln/detail/CVE-2022-25258),[CVE-2022-25375](https://nvd.nist.gov/vuln/detail/CVE-2022-25375),[CVE-2022-25636](https://nvd.nist.gov/vuln/detail/CVE-2022-25636),[CVE-2022-2585](https://nvd.nist.gov/vuln/detail/CVE-2022-2585),[CVE-2022-2586](https://nvd.nist.gov/vuln/detail/CVE-2022-2586),[CVE-2022-2588](https://nvd.nist.gov/vuln/detail/CVE-2022-2588),[CVE-2022-2602](https://nvd.nist.gov/vuln/detail/CVE-2022-2602),[CVE-2022-26365](https://nvd.nist.gov/vuln/detail/CVE-2022-26365),[CVE-2022-26373](https://nvd.nist.gov/vuln/detail/CVE-2022-26373),[CVE-2022-2639](https://nvd.nist.gov/vuln/detail/CVE-2022-2639),[CVE-2022-26490](https://nvd.nist.gov/vuln/detail/CVE-2022-26490),[CVE-2022-2663](https://nvd.nist.gov/vuln/detail/CVE-2022-2663),[CVE-2022-26966](https://nvd.nist.gov/vuln/detail/CVE-2022-26966),[CVE-2022-27223](https://nvd.nist.gov/vuln/detail/CVE-2022-27223),[CVE-2022-27666](https://nvd.nist.gov/vuln/detail/CVE-2022-27666),[CVE-2022-27672](https://nvd.nist.gov/vuln/detail/CVE-2022-27672),[CVE-2022-27950](https://nvd.nist.gov/vuln/detail/CVE-2022-27950),[CVE-2022-28356](https://nvd.nist.gov/vuln/detail/CVE-2022-28356),[CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388),[CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389),[CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390),[CVE-2022-2873](https://nvd.nist.gov/vuln/detail/CVE-2022-2873),[CVE-2022-28893](https://nvd.nist.gov/vuln/detail/CVE-2022-28893),[CVE-2022-2905](https://nvd.nist.gov/vuln/detail/CVE-2022-2905),[CVE-2022-29156](https://nvd.nist.gov/vuln/detail/CVE-2022-29156),[CVE-2022-2938](https://nvd.nist.gov/vuln/detail/CVE-2022-2938),[CVE-2022-29581](https://nvd.nist.gov/vuln/detail/CVE-2022-29581),[CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582),[CVE-2022-2959](https://nvd.nist.gov/vuln/detail/CVE-2022-2959),[CVE-2022-2964](https://nvd.nist.gov/vuln/detail/CVE-2022-2964),[CVE-2022-2977](https://nvd.nist.gov/vuln/detail/CVE-2022-2977),[CVE-2022-2978](https://nvd.nist.gov/vuln/detail/CVE-2022-2978),[CVE-2022-29900](https://nvd.nist.gov/vuln/detail/CVE-2022-29900),[CVE-2022-29901](https://nvd.nist.gov/vuln/detail/CVE-2022-29901),[CVE-2022-3028](https://nvd.nist.gov/vuln/detail/CVE-2022-3028),[CVE-2022-30594](https://nvd.nist.gov/vuln/detail/CVE-2022-30594),[CVE-2022-3061](https://nvd.nist.gov/vuln/detail/CVE-2022-3061),[CVE-2022-3077](https://nvd.nist.gov/vuln/detail/CVE-2022-3077),[CVE-2022-3078](https://nvd.nist.gov/vuln/detail/CVE-2022-3078),[CVE-2022-3104](https://nvd.nist.gov/vuln/detail/CVE-2022-3104),[CVE-2022-3105](https://nvd.nist.gov/vuln/detail/CVE-2022-3105),[CVE-2022-3106](https://nvd.nist.gov/vuln/detail/CVE-2022-3106),[CVE-2022-3107](https://nvd.nist.gov/vuln/detail/CVE-2022-3107),[CVE-2022-3108](https://nvd.nist.gov/vuln/detail/CVE-2022-3108),[CVE-2022-3110](https://nvd.nist.gov/vuln/detail/CVE-2022-3110),[CVE-2022-3111](https://nvd.nist.gov/vuln/detail/CVE-2022-3111),[CVE-2022-3112](https://nvd.nist.gov/vuln/detail/CVE-2022-3112),[CVE-2022-3113](https://nvd.nist.gov/vuln/detail/CVE-2022-3113),[CVE-2022-3115](https://nvd.nist.gov/vuln/detail/CVE-2022-3115),[CVE-2022-3169](https://nvd.nist.gov/vuln/detail/CVE-2022-3169),[CVE-2022-3176](https://nvd.nist.gov/vuln/detail/CVE-2022-3176),[CVE-2022-3202](https://nvd.nist.gov/vuln/detail/CVE-2022-3202),[CVE-2022-32250](https://nvd.nist.gov/vuln/detail/CVE-2022-32250),[CVE-2022-32296](https://nvd.nist.gov/vuln/detail/CVE-2022-32296),[CVE-2022-3239](https://nvd.nist.gov/vuln/detail/CVE-2022-3239),[CVE-2022-32981](https://nvd.nist.gov/vuln/detail/CVE-2022-32981),[CVE-2022-3303](https://nvd.nist.gov/vuln/detail/CVE-2022-3303),[CVE-2022-3344](https://nvd.nist.gov/vuln/detail/CVE-2022-3344),[CVE-2022-33740](https://nvd.nist.gov/vuln/detail/CVE-2022-33740),[CVE-2022-33741](https://nvd.nist.gov/vuln/detail/CVE-2022-33741),[CVE-2022-33742](https://nvd.nist.gov/vuln/detail/CVE-2022-33742),[CVE-2022-33743](https://nvd.nist.gov/vuln/detail/CVE-2022-33743),[CVE-2022-33744](https://nvd.nist.gov/vuln/detail/CVE-2022-33744),[CVE-2022-33981](https://nvd.nist.gov/vuln/detail/CVE-2022-33981),[CVE-2022-3424](https://nvd.nist.gov/vuln/detail/CVE-2022-3424),[CVE-2022-34494](https://nvd.nist.gov/vuln/detail/CVE-2022-34494),[CVE-2022-34495](https://nvd.nist.gov/vuln/detail/CVE-2022-34495),[CVE-2022-34918](https://nvd.nist.gov/vuln/detail/CVE-2022-34918),[CVE-2022-3521](https://nvd.nist.gov/vuln/detail/CVE-2022-3521),[CVE-2022-3524](https://nvd.nist.gov/vuln/detail/CVE-2022-3524),[CVE-2022-3526](https://nvd.nist.gov/vuln/detail/CVE-2022-3526),[CVE-2022-3534](https://nvd.nist.gov/vuln/detail/CVE-2022-3534),[CVE-2022-3543](https://nvd.nist.gov/vuln/detail/CVE-2022-3543),[CVE-2022-3545](https://nvd.nist.gov/vuln/detail/CVE-2022-3545),[CVE-2022-3564](https://nvd.nist.gov/vuln/detail/CVE-2022-3564),[CVE-2022-3565](https://nvd.nist.gov/vuln/detail/CVE-2022-3565),[CVE-2022-3577](https://nvd.nist.gov/vuln/detail/CVE-2022-3577),[CVE-2022-3586](https://nvd.nist.gov/vuln/detail/CVE-2022-3586),[CVE-2022-3594](https://nvd.nist.gov/vuln/detail/CVE-2022-3594),[CVE-2022-36123](https://nvd.nist.gov/vuln/detail/CVE-2022-36123),[CVE-2022-3619](https://nvd.nist.gov/vuln/detail/CVE-2022-3619),[CVE-2022-3621](https://nvd.nist.gov/vuln/detail/CVE-2022-3621),[CVE-2022-3623](https://nvd.nist.gov/vuln/detail/CVE-2022-3623),[CVE-2022-3625](https://nvd.nist.gov/vuln/detail/CVE-2022-3625),[CVE-2022-3628](https://nvd.nist.gov/vuln/detail/CVE-2022-3628),[CVE-2022-36280](https://nvd.nist.gov/vuln/detail/CVE-2022-36280),[CVE-2022-3629](https://nvd.nist.gov/vuln/detail/CVE-2022-3629),[CVE-2022-3633](https://nvd.nist.gov/vuln/detail/CVE-2022-3633),[CVE-2022-3635](https://nvd.nist.gov/vuln/detail/CVE-2022-3635),[CVE-2022-3643](https://nvd.nist.gov/vuln/detail/CVE-2022-3643),[CVE-2022-3646](https://nvd.nist.gov/vuln/detail/CVE-2022-3646),[CVE-2022-3649](https://nvd.nist.gov/vuln/detail/CVE-2022-3649),[CVE-2022-36879](https://nvd.nist.gov/vuln/detail/CVE-2022-36879),[CVE-2022-36946](https://nvd.nist.gov/vuln/detail/CVE-2022-36946),[CVE-2022-3707](https://nvd.nist.gov/vuln/detail/CVE-2022-3707),[CVE-2022-39189](https://nvd.nist.gov/vuln/detail/CVE-2022-39189),[CVE-2022-39190](https://nvd.nist.gov/vuln/detail/CVE-2022-39190),[CVE-2022-40307](https://nvd.nist.gov/vuln/detail/CVE-2022-40307),[CVE-2022-40768](https://nvd.nist.gov/vuln/detail/CVE-2022-40768),[CVE-2022-4095](https://nvd.nist.gov/vuln/detail/CVE-2022-4095),[CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982),[CVE-2022-41218](https://nvd.nist.gov/vuln/detail/CVE-2022-41218),[CVE-2022-41222](https://nvd.nist.gov/vuln/detail/CVE-2022-41222),[CVE-2022-4129](https://nvd.nist.gov/vuln/detail/CVE-2022-4129),[CVE-2022-41674](https://nvd.nist.gov/vuln/detail/CVE-2022-41674),[CVE-2022-41849](https://nvd.nist.gov/vuln/detail/CVE-2022-41849),[CVE-2022-41850](https://nvd.nist.gov/vuln/detail/CVE-2022-41850),[CVE-2022-41858](https://nvd.nist.gov/vuln/detail/CVE-2022-41858),[CVE-2022-42432](https://nvd.nist.gov/vuln/detail/CVE-2022-42432),[CVE-2022-4269](https://nvd.nist.gov/vuln/detail/CVE-2022-4269),[CVE-2022-42703](https://nvd.nist.gov/vuln/detail/CVE-2022-42703),[CVE-2022-42719](https://nvd.nist.gov/vuln/detail/CVE-2022-42719),[CVE-2022-42720](https://nvd.nist.gov/vuln/detail/CVE-2022-42720),[CVE-2022-42721](https://nvd.nist.gov/vuln/detail/CVE-2022-42721),[CVE-2022-42722](https://nvd.nist.gov/vuln/detail/CVE-2022-42722),[CVE-2022-42895](https://nvd.nist.gov/vuln/detail/CVE-2022-42895),[CVE-2022-42896](https://nvd.nist.gov/vuln/detail/CVE-2022-42896),[CVE-2022-43750](https://nvd.nist.gov/vuln/detail/CVE-2022-43750),[CVE-2022-4378](https://nvd.nist.gov/vuln/detail/CVE-2022-4378),[CVE-2022-4379](https://nvd.nist.gov/vuln/detail/CVE-2022-4379),[CVE-2022-4382](https://nvd.nist.gov/vuln/detail/CVE-2022-4382),[CVE-2022-43945](https://nvd.nist.gov/vuln/detail/CVE-2022-43945),[CVE-2022-45869](https://nvd.nist.gov/vuln/detail/CVE-2022-45869),[CVE-2022-45886](https://nvd.nist.gov/vuln/detail/CVE-2022-45886),[CVE-2022-45887](https://nvd.nist.gov/vuln/detail/CVE-2022-45887),[CVE-2022-45919](https://nvd.nist.gov/vuln/detail/CVE-2022-45919),[CVE-2022-45934](https://nvd.nist.gov/vuln/detail/CVE-2022-45934),[CVE-2022-4662](https://nvd.nist.gov/vuln/detail/CVE-2022-4662),[CVE-2022-4744](https://nvd.nist.gov/vuln/detail/CVE-2022-4744),[CVE-2022-47518](https://nvd.nist.gov/vuln/detail/CVE-2022-47518),[CVE-2022-47519](https://nvd.nist.gov/vuln/detail/CVE-2022-47519),[CVE-2022-47520](https://nvd.nist.gov/vuln/detail/CVE-2022-47520),[CVE-2022-47521](https://nvd.nist.gov/vuln/detail/CVE-2022-47521),[CVE-2022-47929](https://nvd.nist.gov/vuln/detail/CVE-2022-47929),[CVE-2022-47938](https://nvd.nist.gov/vuln/detail/CVE-2022-47938),[CVE-2022-47939](https://nvd.nist.gov/vuln/detail/CVE-2022-47939),[CVE-2022-47941](https://nvd.nist.gov/vuln/detail/CVE-2022-47941),[CVE-2022-47942](https://nvd.nist.gov/vuln/detail/CVE-2022-47942),[CVE-2022-47943](https://nvd.nist.gov/vuln/detail/CVE-2022-47943),[CVE-2022-4842](https://nvd.nist.gov/vuln/detail/CVE-2022-4842),[CVE-2022-48423](https://nvd.nist.gov/vuln/detail/CVE-2022-48423),[CVE-2022-48424](https://nvd.nist.gov/vuln/detail/CVE-2022-48424),[CVE-2022-48425](https://nvd.nist.gov/vuln/detail/CVE-2022-48425),[CVE-2022-48502](https://nvd.nist.gov/vuln/detail/CVE-2022-48502),[CVE-2023-0045](https://nvd.nist.gov/vuln/detail/CVE-2023-0045),[CVE-2023-0160](https://nvd.nist.gov/vuln/detail/CVE-2023-0160),[CVE-2023-0179](https://nvd.nist.gov/vuln/detail/CVE-2023-0179),[CVE-2023-0210](https://nvd.nist.gov/vuln/detail/CVE-2023-0210),[CVE-2023-0266](https://nvd.nist.gov/vuln/detail/CVE-2023-0266),[CVE-2023-0386](https://nvd.nist.gov/vuln/detail/CVE-2023-0386),[CVE-2023-0394](https://nvd.nist.gov/vuln/detail/CVE-2023-0394),[CVE-2023-0458](https://nvd.nist.gov/vuln/detail/CVE-2023-0458),[CVE-2023-0459](https://nvd.nist.gov/vuln/detail/CVE-2023-0459),[CVE-2023-0461](https://nvd.nist.gov/vuln/detail/CVE-2023-0461),[CVE-2023-0590](https://nvd.nist.gov/vuln/detail/CVE-2023-0590),[CVE-2023-0615](https://nvd.nist.gov/vuln/detail/CVE-2023-0615),[CVE-2023-1073](https://nvd.nist.gov/vuln/detail/CVE-2023-1073),[CVE-2023-1074](https://nvd.nist.gov/vuln/detail/CVE-2023-1074),[CVE-2023-1076](https://nvd.nist.gov/vuln/detail/CVE-2023-1076),[CVE-2023-1077](https://nvd.nist.gov/vuln/detail/CVE-2023-1077),[CVE-2023-1078](https://nvd.nist.gov/vuln/detail/CVE-2023-1078),[CVE-2023-1079](https://nvd.nist.gov/vuln/detail/CVE-2023-1079),[CVE-2023-1095](https://nvd.nist.gov/vuln/detail/CVE-2023-1095),[CVE-2023-1118](https://nvd.nist.gov/vuln/detail/CVE-2023-1118),[CVE-2023-1192](https://nvd.nist.gov/vuln/detail/CVE-2023-1192),[CVE-2023-1206](https://nvd.nist.gov/vuln/detail/CVE-2023-1206),[CVE-2023-1249](https://nvd.nist.gov/vuln/detail/CVE-2023-1249),[CVE-2023-1252](https://nvd.nist.gov/vuln/detail/CVE-2023-1252),[CVE-2023-1281](https://nvd.nist.gov/vuln/detail/CVE-2023-1281),[CVE-2023-1295](https://nvd.nist.gov/vuln/detail/CVE-2023-1295),[CVE-2023-1380](https://nvd.nist.gov/vuln/detail/CVE-2023-1380),[CVE-2023-1382](https://nvd.nist.gov/vuln/detail/CVE-2023-1382),[CVE-2023-1513](https://nvd.nist.gov/vuln/detail/CVE-2023-1513),[CVE-2023-1582](https://nvd.nist.gov/vuln/detail/CVE-2023-1582),[CVE-2023-1611](https://nvd.nist.gov/vuln/detail/CVE-2023-1611),[CVE-2023-1637](https://nvd.nist.gov/vuln/detail/CVE-2023-1637),[CVE-2023-1652](https://nvd.nist.gov/vuln/detail/CVE-2023-1652),[CVE-2023-1670](https://nvd.nist.gov/vuln/detail/CVE-2023-1670),[CVE-2023-1829](https://nvd.nist.gov/vuln/detail/CVE-2023-1829),[CVE-2023-1838](https://nvd.nist.gov/vuln/detail/CVE-2023-1838),[CVE-2023-1855](https://nvd.nist.gov/vuln/detail/CVE-2023-1855),[CVE-2023-1859](https://nvd.nist.gov/vuln/detail/CVE-2023-1859),[CVE-2023-1989](https://nvd.nist.gov/vuln/detail/CVE-2023-1989),[CVE-2023-1990](https://nvd.nist.gov/vuln/detail/CVE-2023-1990),[CVE-2023-2002](https://nvd.nist.gov/vuln/detail/CVE-2023-2002),[CVE-2023-2006](https://nvd.nist.gov/vuln/detail/CVE-2023-2006),[CVE-2023-2008](https://nvd.nist.gov/vuln/detail/CVE-2023-2008),[CVE-2023-2019](https://nvd.nist.gov/vuln/detail/CVE-2023-2019),[CVE-2023-20569](https://nvd.nist.gov/vuln/detail/CVE-2023-20569),[CVE-2023-20588](https://nvd.nist.gov/vuln/detail/CVE-2023-20588),[CVE-2023-20593](https://nvd.nist.gov/vuln/detail/CVE-2023-20593),[CVE-2023-20928](https://nvd.nist.gov/vuln/detail/CVE-2023-20928),[CVE-2023-21102](https://nvd.nist.gov/vuln/detail/CVE-2023-21102),[CVE-2023-2124](https://nvd.nist.gov/vuln/detail/CVE-2023-2124),[CVE-2023-2156](https://nvd.nist.gov/vuln/detail/CVE-2023-2156),[CVE-2023-2162](https://nvd.nist.gov/vuln/detail/CVE-2023-2162),[CVE-2023-2163](https://nvd.nist.gov/vuln/detail/CVE-2023-2163),[CVE-2023-2166](https://nvd.nist.gov/vuln/detail/CVE-2023-2166),[CVE-2023-2177](https://nvd.nist.gov/vuln/detail/CVE-2023-2177),[CVE-2023-2194](https://nvd.nist.gov/vuln/detail/CVE-2023-2194),[CVE-2023-2235](https://nvd.nist.gov/vuln/detail/CVE-2023-2235),[CVE-2023-2269](https://nvd.nist.gov/vuln/detail/CVE-2023-2269),[CVE-2023-22998](https://nvd.nist.gov/vuln/detail/CVE-2023-22998),[CVE-2023-22999](https://nvd.nist.gov/vuln/detail/CVE-2023-22999),[CVE-2023-23001](https://nvd.nist.gov/vuln/detail/CVE-2023-23001),[CVE-2023-23002](https://nvd.nist.gov/vuln/detail/CVE-2023-23002),[CVE-2023-23004](https://nvd.nist.gov/vuln/detail/CVE-2023-23004),[CVE-2023-23006](https://nvd.nist.gov/vuln/detail/CVE-2023-23006),[CVE-2023-23454](https://nvd.nist.gov/vuln/detail/CVE-2023-23454),[CVE-2023-23455](https://nvd.nist.gov/vuln/detail/CVE-2023-23455),[CVE-2023-23559](https://nvd.nist.gov/vuln/detail/CVE-2023-23559),[CVE-2023-25012](https://nvd.nist.gov/vuln/detail/CVE-2023-25012),[CVE-2023-2513](https://nvd.nist.gov/vuln/detail/CVE-2023-2513),[CVE-2023-26544](https://nvd.nist.gov/vuln/detail/CVE-2023-26544),[CVE-2023-26545](https://nvd.nist.gov/vuln/detail/CVE-2023-26545),[CVE-2023-26606](https://nvd.nist.gov/vuln/detail/CVE-2023-26606),[CVE-2023-26607](https://nvd.nist.gov/vuln/detail/CVE-2023-26607),[CVE-2023-28327](https://nvd.nist.gov/vuln/detail/CVE-2023-28327),[CVE-2023-28328](https://nvd.nist.gov/vuln/detail/CVE-2023-28328),[CVE-2023-28410](https://nvd.nist.gov/vuln/detail/CVE-2023-28410),[CVE-2023-28466](https://nvd.nist.gov/vuln/detail/CVE-2023-28466),[CVE-2023-2860](https://nvd.nist.gov/vuln/detail/CVE-2023-2860),[CVE-2023-28772](https://nvd.nist.gov/vuln/detail/CVE-2023-28772),[CVE-2023-2898](https://nvd.nist.gov/vuln/detail/CVE-2023-2898),[CVE-2023-2985](https://nvd.nist.gov/vuln/detail/CVE-2023-2985),[CVE-2023-3006](https://nvd.nist.gov/vuln/detail/CVE-2023-3006),[CVE-2023-30456](https://nvd.nist.gov/vuln/detail/CVE-2023-30456),[CVE-2023-30772](https://nvd.nist.gov/vuln/detail/CVE-2023-30772),[CVE-2023-3090](https://nvd.nist.gov/vuln/detail/CVE-2023-3090),[CVE-2023-3111](https://nvd.nist.gov/vuln/detail/CVE-2023-3111),[CVE-2023-31248](https://nvd.nist.gov/vuln/detail/CVE-2023-31248),[CVE-2023-3141](https://nvd.nist.gov/vuln/detail/CVE-2023-3141),[CVE-2023-31436](https://nvd.nist.gov/vuln/detail/CVE-2023-31436),[CVE-2023-3159](https://nvd.nist.gov/vuln/detail/CVE-2023-3159),[CVE-2023-3161](https://nvd.nist.gov/vuln/detail/CVE-2023-3161),[CVE-2023-3212](https://nvd.nist.gov/vuln/detail/CVE-2023-3212),[CVE-2023-3220](https://nvd.nist.gov/vuln/detail/CVE-2023-3220),[CVE-2023-32233](https://nvd.nist.gov/vuln/detail/CVE-2023-32233),[CVE-2023-32248](https://nvd.nist.gov/vuln/detail/CVE-2023-32248),[CVE-2023-32269](https://nvd.nist.gov/vuln/detail/CVE-2023-32269),[CVE-2023-3268](https://nvd.nist.gov/vuln/detail/CVE-2023-3268),[CVE-2023-33203](https://nvd.nist.gov/vuln/detail/CVE-2023-33203),[CVE-2023-33288](https://nvd.nist.gov/vuln/detail/CVE-2023-33288),[CVE-2023-3338](https://nvd.nist.gov/vuln/detail/CVE-2023-3338),[CVE-2023-3355](https://nvd.nist.gov/vuln/detail/CVE-2023-3355),[CVE-2023-3357](https://nvd.nist.gov/vuln/detail/CVE-2023-3357),[CVE-2023-3358](https://nvd.nist.gov/vuln/detail/CVE-2023-3358),[CVE-2023-3390](https://nvd.nist.gov/vuln/detail/CVE-2023-3390),[CVE-2023-35001](https://nvd.nist.gov/vuln/detail/CVE-2023-35001),[CVE-2023-3567](https://nvd.nist.gov/vuln/detail/CVE-2023-3567),[CVE-2023-35788](https://nvd.nist.gov/vuln/detail/CVE-2023-35788),[CVE-2023-35823](https://nvd.nist.gov/vuln/detail/CVE-2023-35823),[CVE-2023-35824](https://nvd.nist.gov/vuln/detail/CVE-2023-35824),[CVE-2023-35828](https://nvd.nist.gov/vuln/detail/CVE-2023-35828),[CVE-2023-35829](https://nvd.nist.gov/vuln/detail/CVE-2023-35829),[CVE-2023-3609](https://nvd.nist.gov/vuln/detail/CVE-2023-3609),[CVE-2023-3610](https://nvd.nist.gov/vuln/detail/CVE-2023-3610),[CVE-2023-3611](https://nvd.nist.gov/vuln/detail/CVE-2023-3611),[CVE-2023-3772](https://nvd.nist.gov/vuln/detail/CVE-2023-3772),[CVE-2023-3776](https://nvd.nist.gov/vuln/detail/CVE-2023-3776),[CVE-2023-3777](https://nvd.nist.gov/vuln/detail/CVE-2023-3777),[CVE-2023-3812](https://nvd.nist.gov/vuln/detail/CVE-2023-3812),[CVE-2023-38426](https://nvd.nist.gov/vuln/detail/CVE-2023-38426),[CVE-2023-38428](https://nvd.nist.gov/vuln/detail/CVE-2023-38428),[CVE-2023-38429](https://nvd.nist.gov/vuln/detail/CVE-2023-38429),[CVE-2023-38432](https://nvd.nist.gov/vuln/detail/CVE-2023-38432),[CVE-2023-3863](https://nvd.nist.gov/vuln/detail/CVE-2023-3863),[CVE-2023-3865](https://nvd.nist.gov/vuln/detail/CVE-2023-3865),[CVE-2023-3866](https://nvd.nist.gov/vuln/detail/CVE-2023-3866),[CVE-2023-4004](https://nvd.nist.gov/vuln/detail/CVE-2023-4004),[CVE-2023-4015](https://nvd.nist.gov/vuln/detail/CVE-2023-4015),[CVE-2023-40283](https://nvd.nist.gov/vuln/detail/CVE-2023-40283),[CVE-2023-4128](https://nvd.nist.gov/vuln/detail/CVE-2023-4128),[CVE-2023-4132](https://nvd.nist.gov/vuln/detail/CVE-2023-4132),[CVE-2023-4147](https://nvd.nist.gov/vuln/detail/CVE-2023-4147),[CVE-2023-4206](https://nvd.nist.gov/vuln/detail/CVE-2023-4206),[CVE-2023-4207](https://nvd.nist.gov/vuln/detail/CVE-2023-4207),[CVE-2023-4208](https://nvd.nist.gov/vuln/detail/CVE-2023-4208),[CVE-2023-4273](https://nvd.nist.gov/vuln/detail/CVE-2023-4273),[CVE-2023-42752](https://nvd.nist.gov/vuln/detail/CVE-2023-42752),[CVE-2023-42753](https://nvd.nist.gov/vuln/detail/CVE-2023-42753),[CVE-2023-42755](https://nvd.nist.gov/vuln/detail/CVE-2023-42755),[CVE-2023-4385](https://nvd.nist.gov/vuln/detail/CVE-2023-4385),[CVE-2023-4387](https://nvd.nist.gov/vuln/detail/CVE-2023-4387),[CVE-2023-4389](https://nvd.nist.gov/vuln/detail/CVE-2023-4389),[CVE-2023-4459](https://nvd.nist.gov/vuln/detail/CVE-2023-4459),[CVE-2023-4569](https://nvd.nist.gov/vuln/detail/CVE-2023-4569),[CVE-2023-4623](https://nvd.nist.gov/vuln/detail/CVE-2023-4623), [CVE-2023-4921](https://nvd.nist.gov/vuln/detail/CVE-2023-4921), [CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982), [CVE-2022-41804](https://nvd.nist.gov/vuln/detail/CVE-2022-41804), [CVE-2023-20569](https://nvd.nist.gov/vuln/detail/CVE-2023-20569), [CVE-2023-23908](https://nvd.nist.gov/vuln/detail/CVE-2023-23908))\n - Docker ([CVE-2022-36109](https://nvd.nist.gov/vuln/detail/CVE-2022-36109), [CVE-2022-29526](https://nvd.nist.gov/vuln/detail/CVE-2022-29526))\n - Go ([CVE-2021-44716](https://nvd.nist.gov/vuln/detail/CVE-2021-44716), [CVE-2021-44717](https://nvd.nist.gov/vuln/detail/CVE-2021-44717), [CVE-2022-1705](https://nvd.nist.gov/vuln/detail/CVE-2022-1705), [CVE-2022-1962](https://nvd.nist.gov/vuln/detail/CVE-2022-1962), [CVE-2022-2879](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879), [CVE-2022-2880](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880), [CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675), [CVE-2022-27664](https://nvd.nist.gov/vuln/detail/CVE-2022-27664), [CVE-2022-28131](https://nvd.nist.gov/vuln/detail/CVE-2022-28131), [CVE-2022-29526](https://nvd.nist.gov/vuln/detail/CVE-2022-29526), [CVE-2022-30630](https://nvd.nist.gov/vuln/detail/CVE-2022-30630), [CVE-2022-30631](https://nvd.nist.gov/vuln/detail/CVE-2022-30631), [CVE-2022-30632](https://nvd.nist.gov/vuln/detail/CVE-2022-30632), [CVE-2022-30633](https://nvd.nist.gov/vuln/detail/CVE-2022-30633), [CVE-2022-30635](https://nvd.nist.gov/vuln/detail/CVE-2022-30635), [CVE-2022-32148](https://nvd.nist.gov/vuln/detail/CVE-2022-32148), [CVE-2022-32189](https://nvd.nist.gov/vuln/detail/CVE-2022-32189), [CVE-2022-32190](https://nvd.nist.gov/vuln/detail/CVE-2022-32190), [CVE-2022-41715](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715), [CVE-2022-41717](https://nvd.nist.gov/vuln/detail/CVE-2022-41717))\n - bind tools ([CVE-2022-2795](https://nvd.nist.gov/vuln/detail/CVE-2022-2795), [CVE-2022-2881](https://nvd.nist.gov/vuln/detail/CVE-2022-2881), [CVE-2022-2906](https://nvd.nist.gov/vuln/detail/CVE-2022-2906), [CVE-2022-3080](https://nvd.nist.gov/vuln/detail/CVE-2022-3080), [CVE-2022-38177](https://nvd.nist.gov/vuln/detail/CVE-2022-38177), [CVE-2022-38178](https://nvd.nist.gov/vuln/detail/CVE-2022-38178))\n - binutils ([CVE-2021-45078](https://nvd.nist.gov/vuln/detail/CVE-2021-45078))\n - cifs-utils ([CVE-2021-20208](https://nvd.nist.gov/vuln/detail/CVE-2021-20208), [CVE-2022-27239](https://nvd.nist.gov/vuln/detail/CVE-2022-27239), [CVE-2022-29869](https://nvd.nist.gov/vuln/detail/CVE-2022-29869))\n - containerd ([CVE-2021-43816](https://nvd.nist.gov/vuln/detail/CVE-2021-43816), [CVE-2022-23471](https://nvd.nist.gov/vuln/detail/CVE-2022-23471), [CVE-2022-23648](https://nvd.nist.gov/vuln/detail/CVE-2022-23648), [CVE-2022-24769](https://nvd.nist.gov/vuln/detail/CVE-2022-24769), [CVE-2022-31030](https://nvd.nist.gov/vuln/detail/CVE-2022-31030))\n - cpio ([CVE-2021-38185](https://nvd.nist.gov/vuln/detail/CVE-2021-38185))\n - cryptsetup ([CVE-2021-4122](https://nvd.nist.gov/vuln/detail/CVE-2021-4122)) \n - curl ([CVE-2022-22576](https://nvd.nist.gov/vuln/detail/CVE-2022-22576), [CVE-2022-27774](https://nvd.nist.gov/vuln/detail/CVE-2022-27774), [CVE-2022-27775](https://nvd.nist.gov/vuln/detail/CVE-2022-27775), [CVE-2022-27776](https://nvd.nist.gov/vuln/detail/CVE-2022-27776), [CVE-2022-27778](https://nvd.nist.gov/vuln/detail/CVE-2022-27778), [CVE-2022-27779](https://nvd.nist.gov/vuln/detail/CVE-2022-27779), [CVE-2022-27780](https://nvd.nist.gov/vuln/detail/CVE-2022-27780), [CVE-2022-27781](https://nvd.nist.gov/vuln/detail/CVE-2022-27781), [CVE-2022-27782](https://nvd.nist.gov/vuln/detail/CVE-2022-27782), [CVE-2022-30115](https://nvd.nist.gov/vuln/detail/CVE-2022-30115), [CVE-2022-32205](https://nvd.nist.gov/vuln/detail/CVE-2022-32205), [CVE-2022-32206](https://nvd.nist.gov/vuln/detail/CVE-2022-32206), [CVE-2022-32207](https://nvd.nist.gov/vuln/detail/CVE-2022-32207), [CVE-2022-32208](https://nvd.nist.gov/vuln/detail/CVE-2022-32208), [CVE-2022-32221](https://nvd.nist.gov/vuln/detail/CVE-2022-32221), [CVE-2022-35260](https://nvd.nist.gov/vuln/detail/CVE-2022-32221), [CVE-2022-42915](https://nvd.nist.gov/vuln/detail/CVE-2022-32221), [CVE-2022-42916](https://nvd.nist.gov/vuln/detail/CVE-2022-32221), [CVE-2022-35252](https://nvd.nist.gov/vuln/detail/CVE-2022-35252), [CVE-2022-43551](https://nvd.nist.gov/vuln/detail/CVE-2022-43551), [CVE-2022-43552](https://nvd.nist.gov/vuln/detail/CVE-2022-43552))\n - dbus ([CVE-2022-42010](https://nvd.nist.gov/vuln/detail/CVE-2022-42010), [CVE-2022-42011](https://nvd.nist.gov/vuln/detail/CVE-2022-42011), [CVE-2022-42012](https://nvd.nist.gov/vuln/detail/CVE-2022-42012))\n - duktape ([CVE-2021-46322](https://nvd.nist.gov/vuln/detail/CVE-2021-46322))\n - expat ([CVE-2022-40674](https://nvd.nist.gov/vuln/detail/CVE-2022-40674), [CVE-2022-43680](https://nvd.nist.gov/vuln/detail/CVE-2022-43680))\n - gcc ([CVE-2020-13844](https://nvd.nist.gov/vuln/detail/CVE-2020-13844))\n - git ([CVE-2022-23521](https://nvd.nist.gov/vuln/detail/CVE-2022-23521), [CVE-2022-24765](https://nvd.nist.gov/vuln/detail/CVE-2022-24765), [CVE-2022-29187](https://nvd.nist.gov/vuln/detail/CVE-2022-29187), [CVE-2022-39253](https://nvd.nist.gov/vuln/detail/CVE-2022-39253), [CVE-2022-39260](https://nvd.nist.gov/vuln/detail/CVE-2022-39260), [CVE-2022-41903](https://nvd.nist.gov/vuln/detail/CVE-2022-41903))\n - glib ([fixes to normal form handling in GVariant](https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835))\n - gnupg ([CVE-2022-34903](https://nvd.nist.gov/vuln/detail/CVE-2022-34903))\n - gnutls ([CVE-2021-4209](https://nvd.nist.gov/vuln/detail/CVE-2021-4209), [GNUTLS-SA-2022-01-17](https://gitlab.com/gnutls/gnutls/-/issues/1277), [CVE-2022-2509](https://nvd.nist.gov/vuln/detail/CVE-2022-2509))\n - gzip,xz-utils ([CVE-2022-1271](https://nvd.nist.gov/vuln/detail/CVE-2022-1271))\n - ignition ([CVE-2020-14040](https://nvd.nist.gov/vuln/detail/CVE-2020-14040), [CVE-2021-38561](https://nvd.nist.gov/vuln/detail/CVE-2021-38561), [CVE-2022-1706](https://nvd.nist.gov/vuln/detail/CVE-2022-1706))\n - intel-microcode ([CVE-2021-0127](https://nvd.nist.gov/vuln/detail/CVE-2021-0127), [CVE-2021-0146](https://nvd.nist.gov/vuln/detail/CVE-2021-0146), [CVE-2022-21151](https://nvd.nist.gov/vuln/detail/CVE-2022-21151), [CVE-2022-21233](https://nvd.nist.gov/vuln/detail/CVE-2022-21233))\n - krb5 ([CVE-2021-37750](https://nvd.nist.gov/vuln/detail/CVE-2021-37750))\n - libarchive ([CVE-2021-31566](https://nvd.nist.gov/vuln/detail/CVE-2021-31566), [CVE-2021-36976](https://nvd.nist.gov/vuln/detail/CVE-2021-36976), [CVE-2022-26280](https://nvd.nist.gov/vuln/detail/CVE-2022-26280), [CVE-2022-36227](https://nvd.nist.gov/vuln/detail/CVE-2022-36227), [libarchive-1565](https://github.com/libarchive/libarchive/issues/1565), [libarchive-1566](https://github.com/libarchive/libarchive/issues/1566))\n - libksba ([CVE-2022-3515](https://nvd.nist.gov/vuln/detail/CVE-2022-3515), [CVE-2022-47629](https://nvd.nist.gov/vuln/detail/CVE-2022-47629))\n - GNU Libtasn1 ([Gentoo#866237](https://bugs.gentoo.org/866237))\n - libtirpc ([CVE-2021-46828](https://nvd.nist.gov/vuln/detail/CVE-2021-46828))\n - libxml2 ([CVE-2016-3709](https://nvd.nist.gov/vuln/detail/CVE-2016-3709), [CVE-2022-2309](https://nvd.nist.gov/vuln/detail/CVE-2022-2309), [CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308), [CVE-2022-29824](https://nvd.nist.gov/vuln/detail/CVE-2022-29824), [CVE-2022-40303](https://nvd.nist.gov/vuln/detail/CVE-2022-40303), [CVE-2022-40304](https://nvd.nist.gov/vuln/detail/CVE-2022-40304))\n - logrotate ([CVE-2022-1348](https://nvd.nist.gov/vuln/detail/CVE-2022-1348))\n - multipath-tools ([CVE-2022-41973](https://nvd.nist.gov/vuln/detail/CVE-2022-41973), [CVE-2022-41974](https://nvd.nist.gov/vuln/detail/CVE-2022-41974))\n - ncurses ([CVE-2022-29458](https://nvd.nist.gov/vuln/detail/CVE-2022-29458))\n - nvidia-drivers ([CVE-2022-28181](https://nvd.nist.gov/vuln/detail/CVE-2022-28181), [CVE-2022-28183](https://nvd.nist.gov/vuln/detail/CVE-2022-28183), [CVE-2022-28184](https://nvd.nist.gov/vuln/detail/CVE-2022-28184), [CVE-2022-28185](https://nvd.nist.gov/vuln/detail/CVE-2022-28185))\n - oniguruma ([oniguruma-20220430](https://bugs.gentoo.org/841893))\n - OpenSSH ([CVE-2021-41617](https://nvd.nist.gov/vuln/detail/CVE-2021-41617))\n - OpenSSL ([CVE-2021-4044](https://nvd.nist.gov/vuln/detail/CVE-2021-4044), [CVE-2022-1292](https://nvd.nist.gov/vuln/detail/CVE-2022-1292), [CVE-2022-1343](https://nvd.nist.gov/vuln/detail/CVE-2022-1343), [CVE-2022-1434](https://nvd.nist.gov/vuln/detail/CVE-2022-1434), [CVE-2022-1473](https://nvd.nist.gov/vuln/detail/CVE-2022-1473), [CVE-2022-3602](https://nvd.nist.gov/vuln/detail/CVE-2022-3602), [CVE-2022-3786](https://nvd.nist.gov/vuln/detail/CVE-2022-3786))\n - polkit ([CVE-2021-4115](https://nvd.nist.gov/vuln/detail/CVE-2021-4115))\n - rsync ([CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032), [CVE-2022-29154](https://nvd.nist.gov/vuln/detail/CVE-2022-29154))\n - runc ([CVE-2022-29162](https://nvd.nist.gov/vuln/detail/CVE-2022-29162))\n - shadow ([CVE-2013-4235](https://nvd.nist.gov/vuln/detail/CVE-2013-4235))\n - sudo ([CVE-2022-43995](https://nvd.nist.gov/vuln/detail/CVE-2022-43995), [CVE-2023-22809](https://nvd.nist.gov/vuln/detail/CVE-2023-22809))\n - systemd ([CVE-2021-3997](https://nvd.nist.gov/vuln/detail/CVE-2021-3997), [CVE-2022-3821](https://nvd.nist.gov/vuln/detail/CVE-2022-3821), [CVE-2022-4415](https://nvd.nist.gov/vuln/detail/CVE-2022-4415))\n - unzip ([CVE-2022-0529](https://nvd.nist.gov/vuln/detail/CVE-2022-0529), [CVE-2022-0530](https://nvd.nist.gov/vuln/detail/CVE-2022-0530), [CVE-2021-4217](https://nvd.nist.gov/vuln/detail/CVE-2021-4217))\n - util-linux ([CVE-2021-3995](https://nvd.nist.gov/vuln/detail/CVE-2021-3995), [CVE-2021-3996](https://nvd.nist.gov/vuln/detail/CVE-2021-3996), [CVE-2022-0563](https://nvd.nist.gov/vuln/detail/CVE-2022-0563))\n - vim ([CVE-2021-3872](https://nvd.nist.gov/vuln/detail/CVE-2021-3872), [CVE-2021-3875](https://nvd.nist.gov/vuln/detail/CVE-2021-3875), [CVE-2021-3903](https://nvd.nist.gov/vuln/detail/CVE-2021-3903), [CVE-2021-3927](https://nvd.nist.gov/vuln/detail/CVE-2021-3927), [CVE-2021-3928](https://nvd.nist.gov/vuln/detail/CVE-2021-3928), [CVE-2021-3968](https://nvd.nist.gov/vuln/detail/CVE-2021-3968), [CVE-2021-3973](https://nvd.nist.gov/vuln/detail/CVE-2021-3973), [CVE-2021-3974](https://nvd.nist.gov/vuln/detail/CVE-2021-3974), [CVE-2021-3984](https://nvd.nist.gov/vuln/detail/CVE-2021-3984), [CVE-2021-4019](https://nvd.nist.gov/vuln/detail/CVE-2021-4019), [CVE-2021-4069](https://nvd.nist.gov/vuln/detail/CVE-2021-4069), [CVE-2021-4136](https://nvd.nist.gov/vuln/detail/CVE-2021-4136), [CVE-2021-4173](https://nvd.nist.gov/vuln/detail/CVE-2021-4173),[ CVE-2021-4166](https://nvd.nist.gov/vuln/detail/CVE-2021-4166), [CVE-2021-4187](https://nvd.nist.gov/vuln/detail/CVE-2021-4187), [CVE-2021-4192](https://nvd.nist.gov/vuln/detail/CVE-2021-4192), [CVE-2021-4193](https://nvd.nist.gov/vuln/detail/CVE-2021-4193), [CVE-2022-0128](https://nvd.nist.gov/vuln/detail/CVE-2022-0128), [CVE-2022-0156](https://nvd.nist.gov/vuln/detail/CVE-2022-0156), [CVE-2022-0158](https://nvd.nist.gov/vuln/detail/CVE-2022-0158), [CVE-2022-0213](https://nvd.nist.gov/vuln/detail/CVE-2022-0213), [CVE-2022-0261](https://nvd.nist.gov/vuln/detail/CVE-2022-0261), [CVE-2022-0318](https://nvd.nist.gov/vuln/detail/CVE-2022-0318), [CVE-2022-0319](https://nvd.nist.gov/vuln/detail/CVE-2022-0319), [CVE-2022-0351](https://nvd.nist.gov/vuln/detail/CVE-2022-0351), [CVE-2022-0359](https://nvd.nist.gov/vuln/detail/CVE-2022-0359), [CVE-2022-0361](https://nvd.nist.gov/vuln/detail/CVE-2022-0361), [CVE-2022-0368](https://nvd.nist.gov/vuln/detail/CVE-2022-0368), [CVE-2022-0392](https://nvd.nist.gov/vuln/detail/CVE-2022-0392), [CVE-2022-0393](https://nvd.nist.gov/vuln/detail/CVE-2022-0393), [CVE-2022-0407](https://nvd.nist.gov/vuln/detail/CVE-2022-0407), [CVE-2022-0408](https://nvd.nist.gov/vuln/detail/CVE-2022-0408), [CVE-2022-0413](https://nvd.nist.gov/vuln/detail/CVE-2022-0413), [CVE-2022-0417](https://nvd.nist.gov/vuln/detail/CVE-2022-0417), [CVE-2022-0443](https://nvd.nist.gov/vuln/detail/CVE-2022-0443), [CVE-2022-0629](https://nvd.nist.gov/vuln/detail/CVE-2022-0629), [CVE-2022-0685](https://nvd.nist.gov/vuln/detail/CVE-2022-0685), [CVE-2022-0714](https://nvd.nist.gov/vuln/detail/CVE-2022-0714), [CVE-2022-0729](https://nvd.nist.gov/vuln/detail/CVE-2022-0729), [CVE-2022-0943](https://nvd.nist.gov/vuln/detail/CVE-2022-0943), [CVE-2022-1154](https://nvd.nist.gov/vuln/detail/CVE-2022-1154), [CVE-2022-1160](https://nvd.nist.gov/vuln/detail/CVE-2022-1160), [CVE-2022-1381](https://nvd.nist.gov/vuln/detail/CVE-2022-1381), [CVE-2022-1420](https://nvd.nist.gov/vuln/detail/CVE-2022-1420), [CVE-2022-1616](https://nvd.nist.gov/vuln/detail/CVE-2022-1616), [CVE-2022-1619](https://nvd.nist.gov/vuln/detail/CVE-2022-1619), [CVE-2022-1620](https://nvd.nist.gov/vuln/detail/CVE-2022-1620), [CVE-2022-1621](https://nvd.nist.gov/vuln/detail/CVE-2022-1621), [CVE-2022-1629](https://nvd.nist.gov/vuln/detail/CVE-2022-1629), [CVE-2022-1674](https://nvd.nist.gov/vuln/detail/CVE-2022-1674), [CVE-2022-1725](https://nvd.nist.gov/vuln/detail/CVE-2022-1725), [CVE-2022-1733](https://nvd.nist.gov/vuln/detail/CVE-2022-1733), [CVE-2022-1735](https://nvd.nist.gov/vuln/detail/CVE-2022-1735), [CVE-2022-1769](https://nvd.nist.gov/vuln/detail/CVE-2022-1769), [CVE-2022-1771](https://nvd.nist.gov/vuln/detail/CVE-2022-1771), [CVE-2022-1785](https://nvd.nist.gov/vuln/detail/CVE-2022-1785), [CVE-2022-1796](https://nvd.nist.gov/vuln/detail/CVE-2022-1796), [CVE-2022-1897](https://nvd.nist.gov/vuln/detail/CVE-2022-1897), [CVE-2022-1898](https://nvd.nist.gov/vuln/detail/CVE-2022-1898), [CVE-2022-1886](https://nvd.nist.gov/vuln/detail/CVE-2022-1886), [CVE-2022-1851](https://nvd.nist.gov/vuln/detail/CVE-2022-1851), [CVE-2022-1927](https://nvd.nist.gov/vuln/detail/CVE-2022-1927), [CVE-2022-1942](https://nvd.nist.gov/vuln/detail/CVE-2022-1942), [CVE-2022-1968](https://nvd.nist.gov/vuln/detail/CVE-2022-1968), [CVE-2022-2000](https://nvd.nist.gov/vuln/detail/CVE-2022-2000), [CVE-2022-2042](https://nvd.nist.gov/vuln/detail/CVE-2022-2042), [CVE-2022-2124](https://nvd.nist.gov/vuln/detail/CVE-2022-2124), [CVE-2022-2125](https://nvd.nist.gov/vuln/detail/CVE-2022-2125), [CVE-2022-2126](https://nvd.nist.gov/vuln/detail/CVE-2022-2126), [CVE-2022-2129](https://nvd.nist.gov/vuln/detail/CVE-2022-2129), [CVE-2022-2175](https://nvd.nist.gov/vuln/detail/CVE-2022-2175), [CVE-2022-2182](https://nvd.nist.gov/vuln/detail/CVE-2022-2182), [CVE-2022-2183](https://nvd.nist.gov/vuln/detail/CVE-2022-2183), [CVE-2022-2206](https://nvd.nist.gov/vuln/detail/CVE-2022-2206), [CVE-2022-2207](https://nvd.nist.gov/vuln/detail/CVE-2022-2207), [CVE-2022-2208](https://nvd.nist.gov/vuln/detail/CVE-2022-2208), [CVE-2022-2210](https://nvd.nist.gov/vuln/detail/CVE-2022-2210), [CVE-2022-2231](https://nvd.nist.gov/vuln/detail/CVE-2022-2231), [CVE-2022-2257](https://nvd.nist.gov/vuln/detail/CVE-2022-2257), [CVE-2022-2264](https://nvd.nist.gov/vuln/detail/CVE-2022-2264), [CVE-2022-2284](https://nvd.nist.gov/vuln/detail/CVE-2022-2284), [CVE-2022-2285](https://nvd.nist.gov/vuln/detail/CVE-2022-2285), [CVE-2022-2286](https://nvd.nist.gov/vuln/detail/CVE-2022-2286), [CVE-2022-2287](https://nvd.nist.gov/vuln/detail/CVE-2022-2287), [CVE-2022-2288](https://nvd.nist.gov/vuln/detail/CVE-2022-2288), [CVE-2022-2289](https://nvd.nist.gov/vuln/detail/CVE-2022-2289), [CVE-2022-2304](https://nvd.nist.gov/vuln/detail/CVE-2022-2304), [CVE-2022-2343](https://nvd.nist.gov/vuln/detail/CVE-2022-2343), [CVE-2022-2344](https://nvd.nist.gov/vuln/detail/CVE-2022-2344), [CVE-2022-2345](https://nvd.nist.gov/vuln/detail/CVE-2022-2345), [CVE-2022-2522](https://nvd.nist.gov/vuln/detail/CVE-2022-2522), [CVE-2022-2816](https://nvd.nist.gov/vuln/detail/CVE-2022-2816), [CVE-2022-2817](https://nvd.nist.gov/vuln/detail/CVE-2022-2817), [CVE-2022-2819](https://nvd.nist.gov/vuln/detail/CVE-2022-2819), [CVE-2022-2845](https://nvd.nist.gov/vuln/detail/CVE-2022-2845), [CVE-2022-2849](https://nvd.nist.gov/vuln/detail/CVE-2022-2849), [CVE-2022-2862](https://nvd.nist.gov/vuln/detail/CVE-2022-2862), [CVE-2022-2874](https://nvd.nist.gov/vuln/detail/CVE-2022-2874), [CVE-2022-2889](https://nvd.nist.gov/vuln/detail/CVE-2022-2889), [CVE-2022-2923](https://nvd.nist.gov/vuln/detail/CVE-2022-2923), [CVE-2022-2946](https://nvd.nist.gov/vuln/detail/CVE-2022-2946), [CVE-2022-2980](https://nvd.nist.gov/vuln/detail/CVE-2022-2980), [CVE-2022-2982](https://nvd.nist.gov/vuln/detail/CVE-2022-2982), [CVE-2022-3016](https://nvd.nist.gov/vuln/detail/CVE-2022-3016), [CVE-2022-3099](https://nvd.nist.gov/vuln/detail/CVE-2022-3099), [CVE-2022-3134](https://nvd.nist.gov/vuln/detail/CVE-2022-3134), [CVE-2022-3153](https://nvd.nist.gov/vuln/detail/CVE-2022-3153), [CVE-2022-3234](https://nvd.nist.gov/vuln/detail/CVE-2022-3234), [CVE-2022-3235](https://nvd.nist.gov/vuln/detail/CVE-2022-3235), [CVE-2022-3278](https://nvd.nist.gov/vuln/detail/CVE-2022-3278), [CVE-2022-3256](https://nvd.nist.gov/vuln/detail/CVE-2022-3256), [CVE-2022-3296](https://nvd.nist.gov/vuln/detail/CVE-2022-3296), [CVE-2022-3297](https://nvd.nist.gov/vuln/detail/CVE-2022-3297), [CVE-2022-3324](https://nvd.nist.gov/vuln/detail/CVE-2022-3324), [CVE-2022-3352](https://nvd.nist.gov/vuln/detail/CVE-2022-3352), [CVE-2022-3491](https://nvd.nist.gov/vuln/detail/CVE-2022-3491), [CVE-2022-3520](https://nvd.nist.gov/vuln/detail/CVE-2022-3520), [CVE-2022-3591](https://nvd.nist.gov/vuln/detail/CVE-2022-3591), [CVE-2022-3705](https://nvd.nist.gov/vuln/detail/CVE-2022-3705), [CVE-2022-4141](https://nvd.nist.gov/vuln/detail/CVE-2022-4141), [CVE-2022-4292](https://nvd.nist.gov/vuln/detail/CVE-2022-4292), [CVE-2022-4293](https://nvd.nist.gov/vuln/detail/CVE-2022-4293), [CVE-2023-0049](https://nvd.nist.gov/vuln/detail/CVE-2023-0049), [CVE-2023-0051](https://nvd.nist.gov/vuln/detail/CVE-2023-0051), [CVE-2023-0054](https://nvd.nist.gov/vuln/detail/CVE-2023-0054))\n - zlib ([CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032), [CVE-2022-37434](https://nvd.nist.gov/vuln/detail/CVE-2022-37434))\n - SDK: edk2-ovmf ([CVE-2019-14584](https://nvd.nist.gov/vuln/detail/CVE-2019-14584), [CVE-2021-28210](https://nvd.nist.gov/vuln/detail/CVE-2021-28210), [CVE-2021-28211](https://nvd.nist.gov/vuln/detail/CVE-2021-28211), [CVE-2021-28213](https://nvd.nist.gov/vuln/detail/CVE-2021-28213))\n - SDK: libxslt ([CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560))\n - SDK: mantle ([CVE-2021-3121](https://nvd.nist.gov/vuln/detail/CVE-2021-3121), [CVE-2021-38561](https://nvd.nist.gov/vuln/detail/CVE-2021-38561), [CVE-2021-43565](https://nvd.nist.gov/vuln/detail/CVE-2021-43565))\n - SDK: Python ([CVE-2015-20107](https://nvd.nist.gov/vuln/detail/CVE-2015-20107), [CVE-2020-10735](https://nvd.nist.gov/vuln/detail/CVE-2020-10735), [CVE-2021-3654](https://nvd.nist.gov/vuln/detail/CVE-2021-3654), [CVE-2022-37454](https://nvd.nist.gov/vuln/detail/CVE-2022-37454), [CVE-2022-42919](https://nvd.nist.gov/vuln/detail/CVE-2022-42919), [CVE-2022-45061](https://nvd.nist.gov/vuln/detail/CVE-2022-45061))\n - SDK: QEMU ([CVE-2020-14394](https://nvd.nist.gov/vuln/detail/CVE-2020-14394), [CVE-2020-35504](https://nvd.nist.gov/vuln/detail/CVE-2020-35504), [CVE-2020-35505](https://nvd.nist.gov/vuln/detail/CVE-2020-35505), [CVE-2020-35506](https://nvd.nist.gov/vuln/detail/CVE-2020-35506), [CVE-2020-35517](https://nvd.nist.gov/vuln/detail/CVE-2020-35517), [CVE-2021-20203](https://nvd.nist.gov/vuln/detail/CVE-2021-20203), [CVE-2021-20255](https://nvd.nist.gov/vuln/detail/CVE-2021-20255), [CVE-2021-20257](https://nvd.nist.gov/vuln/detail/CVE-2021-20257), [CVE-2021-20263](https://nvd.nist.gov/vuln/detail/CVE-2021-20263), [CVE-2021-3409](https://nvd.nist.gov/vuln/detail/CVE-2021-3409), [CVE-2021-3416](https://nvd.nist.gov/vuln/detail/CVE-2021-3416), [CVE-2021-3527](https://nvd.nist.gov/vuln/detail/CVE-2021-3527), [CVE-2021-3544](https://nvd.nist.gov/vuln/detail/CVE-2021-3544), [CVE-2021-3545](https://nvd.nist.gov/vuln/detail/CVE-2021-3545), [CVE-2021-3546](https://nvd.nist.gov/vuln/detail/CVE-2021-3546), [CVE-2021-3582](https://nvd.nist.gov/vuln/detail/CVE-2021-3582), [CVE-2021-3607](https://nvd.nist.gov/vuln/detail/CVE-2021-3607), [CVE-2021-3608](https://nvd.nist.gov/vuln/detail/CVE-2021-3608), [CVE-2021-3682](https://nvd.nist.gov/vuln/detail/CVE-2021-3682), [CVE-2021-20203](https://nvd.nist.gov/vuln/detail/CVE-2021-20203), [CVE-2021-3713](https://nvd.nist.gov/vuln/detail/CVE-2021-3713), [CVE-2021-3930](https://nvd.nist.gov/vuln/detail/CVE-2021-3930), [CVE-2021-3947](https://nvd.nist.gov/vuln/detail/CVE-2021-3947), [CVE-2021-4145](https://nvd.nist.gov/vuln/detail/CVE-2021-4145), [CVE-2022-0216](https://nvd.nist.gov/vuln/detail/CVE-2022-0216), [CVE-2022-26353](https://nvd.nist.gov/vuln/detail/CVE-2022-26353), [CVE-2022-26354](https://nvd.nist.gov/vuln/detail/CVE-2022-26354), [CVE-2022-3872](https://nvd.nist.gov/vuln/detail/CVE-2022-3872), [CVE-2022-4172](https://nvd.nist.gov/vuln/detail/CVE-2022-4172))\n - SDK: Rust ([CVE-2022-21658](https://nvd.nist.gov/vuln/detail/CVE-2022-21658), [CVE-2022-36113](https://nvd.nist.gov/vuln/detail/CVE-2022-36113), [CVE-2022-36114](https://nvd.nist.gov/vuln/detail/CVE-2022-36114), [CVE-2022-46176](https://nvd.nist.gov/vuln/detail/CVE-2022-46176))\n - SDK: squashfs-tools ([CVE-2021-40153](https://nvd.nist.gov/vuln/detail/CVE-2021-40153), [CVE-2021-41072](https://nvd.nist.gov/vuln/detail/CVE-2021-41072))\n - VMware: open-vm-tools ([CVE-2022-31676](https://nvd.nist.gov/vuln/detail/CVE-2022-31676))\n\n \n #### Bug fixes:\n \n - Added `networkd` translation to `files` section when converting from Ignition 2.x to Ignition 3.x ([coreos-overlay#1910](https://github.com/flatcar-linux/coreos-overlay/pull/1910), [flatcar#741](https://github.com/flatcar-linux/Flatcar/issues/741))\n - Added a remount action as `systemd-sysext.service` drop-in unit to restore the OEM partition mount after the overlay mounts in `/usr` are done ([init#69](https://github.com/flatcar-linux/init/pull/69))\n - Added back Ignition support for Vagrant ([coreos-overlay#2351](https://github.com/flatcar/coreos-overlay/pull/2351))\n - Added back `gettext` to the OS ([Flatcar#849](https://github.com/flatcar-linux/Flatcar/issues/849))\n - Added merging of Ignition systemd duplicated units when auto-translating from Ignition 2 to Ignition 3. ([coreos-overlay#2187](https://github.com/flatcar/coreos-overlay/pull/2187))\n - Added support for Openstack for cloud-init activation ([flatcar-linux/init#76](https://github.com/flatcar-linux/init/pull/76))\n - Added support for hardware security keys in update-ssh-keys ([update-ssh-keys#7](https://github.com/flatcar/update-ssh-keys/pull/7))\n - Enabled IOMMU on arm64 kernels, the lack of which prevented some systems from booting ([coreos-overlay#2235](https://github.com/flatcar/coreos-overlay/pull/2235))\n - Excluded Wireguard interface from `systemd-networkd` default management ([Flatcar#808](https://github.com/flatcar-linux/Flatcar/issues/808))\n - Excluded the Kubenet cbr0 interface from networkd's DHCP config and set it to Unmanaged to prevent interference and ensure that it is not part of the network online check ([init#55](https://github.com/flatcar-linux/init/pull/55))\n - Excluded the special Kubernetes network interfaces `nodelocaldns` and `kube-ipvs0` from being managed with systemd-networkd which interfered with the setup ([init#89](https://github.com/flatcar/init/pull/89)).\n - Fix \"ext4 deadlock under heavy I/O load\" kernel issue. The patch for this is included provisionally while we wait for it to be merged upstream ([Flatcar#847](https://github.com/flatcar/Flatcar/issues/847), [coreos-overlay#2315](https://github.com/flatcar/coreos-overlay/pull/2315))\n - Fixed Ignition btrfs forced formatting for OEM partition ([coreos-overlay#2277](https://github.com/flatcar/coreos-overlay/pull/2277))\n - Fixed Ignition's OEM ID to be `metal` to follow the Ignition upstream change which otherwise resulted in a broken boot when the Flatcar OEM ID `pxe` was used ([bootengine#45](https://github.com/flatcar-linux/bootengine/pull/45))\n - Fixed `/etc/resolv.conf` symlink by pointing it at `resolv.conf` instead of `stub-resolv.conf`. This bug was present since the update to systemd v250 ([coreos-overlay#2057](https://github.com/flatcar-linux/coreos-overlay/pull/2057))\n - Fixed a regression (in Alpha/Beta) where machines failed to boot if they didn't have the `core` user or group in `/etc/passwd` or `/etc/group` ([baselayout#26](https://github.com/flatcar/baselayout/pull/26))\n - Fixed excluded interface type from default systemd-networkd configuration ([flatcar-linux/init#78](https://github.com/flatcar-linux/init/pull/78))\n - Fixed space escaping in the `networkd` Ignition translation ([Flatcar#812](https://github.com/flatcar-linux/Flatcar/issues/812))\n - Fixed the dracut emergency Ignition log printing that had a scripting error causing the cat command to fail ([bootengine#33](https://github.com/flatcar-linux/bootengine/pull/33))\n - Made Ignition write the SSH keys into a file under `authorized_keys.d/ignition` again and added a call to `update-ssh-keys` after Ignition ran to create the merged `authorized_keys` file, which fixes the problem that keys added by Ignition get lost when `update-ssh-keys` runs ([init#66](https://github.com/flatcar-linux/init/pull/66))\n - Re-added the `brd drbd nbd rbd xen-blkfront zram libarc4 lru_cache zsmalloc` kernel modules to the initramfs since they were missing compared to the Flatcar 3033.2.x releases where the 5.10 kernel is used ([bootengine#40](https://github.com/flatcar-linux/bootengine/pull/40))\n - Restored the support to specify OEM partition files in Ignition when `/usr/share/oem` is given as initrd mount point ([bootengine#58](https://github.com/flatcar/bootengine/pull/58))\n - Reverted the Linux kernel commit which broke networking on AWS instances which use Intel 82559 NIC (c4/m4) ([Flatcar#665](https://github.com/flatcar-linux/Flatcar/issues/665), [coreos-overlay#1723](https://github.com/flatcar-linux/coreos-overlay/pull/1723))\n - Skipped starting `ensure-sysext.service` if `systemd-sysext.service` won't be started, to prevent reporting a dependency failure ([Flatcar#710](https://github.com/flatcar-linux/Flatcar/issues/710))\n - The Ignition v3 kargs directive failed before when used with the generic image where no `grub.cfg` exists, this was fixed by creating it first ([bootengine#47](https://github.com/flatcar-linux/bootengine/pull/47))\n - The rootfs setup in the initrd now runs systemd-tmpfiles on every boot, not only when Ignition runs, to fix a dbus failure due to missing files ([Flatcar#944](https://github.com/flatcar/Flatcar/issues/944))\n - flatcar-update: Stopped checking for the `USER` environment variable which may not be set in all environments, causing the script to fail unless a workaround was used like prepending an additional `sudo` invocation ([init#58](https://github.com/flatcar-linux/init/pull/58))\n - network: Accept ICMPv6 Router Advertisements to fix IPv6 address assignment in the default DHCP setting ([init#51](https://github.com/flatcar-linux/init/pull/51), [coreos-cloudinit#12](https://github.com/flatcar-linux/coreos-cloudinit/pull/12), [bootengine#30](https://github.com/flatcar-linux/bootengine/pull/30))\n - Fixed the restart of Systemd services when the main process is being killed by a SIGHUP signal ([flatcar#1157](https://github.com/flatcar/Flatcar/issues/1157))\n - Resolved the conflicting FD usage of libselinux and systemd which caused, e.g., a systemd crash on certain watchdog interaction during shutdown (patch in systemd 252.11)\n - AWS: added EKS support for version 1.22 and 1.23. ([coreos-overlay#2110](https://github.com/flatcar-linux/coreos-overlay/pull/2110), [Flatcar#829](https://github.com/flatcar-linux/Flatcar/issues/829))- VMWare: excluded `wireguard` (and others) from `systemd-networkd` management. ([init#80](https://github.com/flatcar-linux/init/pull/80))\n - GCP: Restored oem-gce.service functionality on GCP ([coreos-overlay#1813](https://github.com/flatcar-linux/coreos-overlay/pull/1813))\n - GCP: Fixed shutdown script execution ([coreos-overlay#1912](https://github.com/flatcar-linux/coreos-overlay/pull/1912), [flatcar#743](https://github.com/flatcar-linux/Flatcar/issues/743))\n\n \n #### Changes:\n \n - ARM64: Added [cifs-utils](https://wiki.samba.org/index.php/LinuxCIFS_utils) for ARM64\n - ARM64: Added [sssd](https://sssd.io/), [adcli](https://www.freedesktop.org/software/realmd/adcli/adcli.html) and realmd for ARM64\n - Added CONFIG_NF_CT_NETLINK_HELPER (for libnetfilter_cthelper), CONFIG_NET_VRF (for virtual routing and forwarding) and CONFIG_KEY_DH_OPERATIONS (for keyutils) to the kernel config ([coreos-overlay#1524](https://github.com/flatcar-linux/coreos-overlay/pull/1524))\n - Added VMware networking configuration in the initramfs via guestinfo settings ([bootengine#44](https://github.com/flatcar-linux/bootengine/pull/44), [flatcar#717](https://github.com/flatcar-linux/Flatcar/issues/717))\n - Added `CONFIG_NF_CONNTRACK_BRIDGE` (for nf_conntrack_bridge) and `CONFIG_NFT_BRIDGE_META` (for nft_meta_bridge) to the kernel config to allow using conntrack rules for bridges in nftables and to match on bridge interface names ([coreos-overlay#2207](https://github.com/flatcar/coreos-overlay/pull/2207))\n - Added `auditd.service` but left it disabled by default, a custom configuration can be created by removing `/etc/audit/auditd.conf` and replacing it with an own file ([coreos-overlay#1636](https://github.com/flatcar-linux/coreos-overlay/pull/1636))\n - Added `cryptsetup` to the initramfs for the Ignition `luks` directive ([flatcar-linux/coreos-overlay#1760](https://github.com/flatcar-linux/coreos-overlay/pull/1760))\n - Added a new flatcar-update tool to the image to ease manual updates, rollbacks, channel/release jumping, and airgapped updates ([init#53](https://github.com/flatcar-linux/init/pull/53))\n - Added efibootmgr binary to the image ([coreos-overlay#1955](https://github.com/flatcar-linux/coreos-overlay/pull/1955))\n - Added symlink from `nc` to `ncat`. `-q` option is [not yet supported](https://github.com/nmap/nmap/issues/2422) ([flatcar#545](https://github.com/flatcar-linux/Flatcar/issues/545))\n - Besides Ignition v1 and v2 configurations, Ignition configurations with specification v3 (up to 3.3.0) are now supported, see the [docs section for details](https://www.flatcar.org/docs/latest/provisioning/ignition/specification/#ignition-v3)\n - Bring in dependencies for NFS4 with Kerberos both in kernel and userspace. Tested against NFS4.1 server. ([coreos-overlay#1664](https://github.com/flatcar-linux/coreos-overlay/pull/1664))\n - Change CONFIG_WIREGUARD kernel option to module to save space on boot partition ([coreos-overlay#2239](https://github.com/flatcar/coreos-overlay/pull/2239))\n - Disable several arch specific arm64 kernel config options for unsupported platforms to save space on boot partition ([coreos-overlay#2239](https://github.com/flatcar/coreos-overlay/pull/2239))\n - Enabled `CONFIG_INTEL_RAPL` on AMD64 Kernel config to compile `intel_rapl_common` module in order to allow power monitoring on modern Intel processors ([coreos-overlay#1801](https://github.com/flatcar-linux/coreos-overlay/pull/1801))\n - Enabled `systemd-sysext.service` to activate systemd-sysext images on boot, to disable you will need to mask it. Also added a helper service `ensure-sysext.service` which reloads the systemd units to reevaluate the `sockets`, `timers`, and `multi-user` targets when `systemd-sysext.service` is (re)started, making it possible to enable units that are part of a sysext image ([init#65](https://github.com/flatcar-linux/init/pull/65))\n - Excluded special network interface devices like bridge, tunnel, vxlan, and veth devices from the default DHCP configuration to prevent networkd interference ([init#56](https://github.com/flatcar-linux/init/pull/56))\n - For amd64 `/usr/lib` used to be a symlink to `/usr/lib64` but now they became two separate folders as common in other distributions (and was the case for arm64 already). Compatibility symlinks exist in case `/usr/lib64` was used to access, e.g., the `modules` folder or the `systemd` folder ([coreos-overlay#1713](https://github.com/flatcar-linux/coreos-overlay/pull/1713), [scripts#255](https://github.com/flatcar-linux/scripts/pull/255))\n - Made SELinux enabled by default in default containerd configuration file. ([coreos-overlay#1699](https://github.com/flatcar-linux/coreos-overlay/pull/1699))\n - Removed rngd.service because it is not essential anymore for the kernel to boot fast in VM environments ([coreos-overlay#1700](https://github.com/flatcar-linux/coreos-overlay/pull/1700))\n - Specifying the OEM filesystem in Ignition to write files to `/usr/share/oem` is not needed anymore ([bootengine#58](https://github.com/flatcar/bootengine/pull/58))\n - Switched from `--strip-unneeded` to `--strip-debug` when installing kernel modules, which makes kernel stacktraces more accurate and makes debugging issues easier ([coreos-overlay#2196](https://github.com/flatcar/coreos-overlay/pull/2196))\n - The flatcar-update tool got two new flags to customize ports used on the host while updating flatcar ([init#81](https://github.com/flatcar/init/pull/81))\n - Toolbox now uses containerd to download and mount the image ([toolbox#7](https://github.com/flatcar/toolbox/pull/7))\n - Update-engine now creates the `/run/reboot-required` flag file for [kured](https://github.com/weaveworks/kured) ([update_engine#15](https://github.com/flatcar-linux/update_engine/pull/15))\n - flatcar-install: Added option to create UEFI boot entry ([init#74](https://github.com/flatcar-linux/init/pull/74))\n - Add qemu-guest-agent to all amd64 images, it will be automatically enabled when qemu-ga virtio-port is detected ([coreos-overlay#2240](https://github.com/flatcar/coreos-overlay/pull/2240), [portage-stable#373](https://github.com/flatcar/portage-stable/pull/373))\n - Add a way to remove packages that are hard-blockers for update. A hard-blocker means that the package needs to be removed (for example with `emerge -C`) before an update can happen.\n - Add support for Microsoft Azure Network Adapter (MANA) NICs on Azure ([scripts#1131](https://github.com/flatcar/scripts/pull/1131))\n - Defined a systemd-sysext level that sysext images can match for instead of the OS version when they don't have a strong coupling, meaning the only metadata required is `SYSEXT_LEVEL=1.0` and `ID=flatcar` ([Flatcar#643](https://github.com/flatcar-linux/Flatcar/issues/643))\n - Removed the pre-shipped `/etc/flatcar/update.conf` file, leaving it totally to the user to define the contents as it was unnecessarily overwriting the `/use/share/flatcar/update.conf` ([scripts#212](https://github.com/flatcar-linux/scripts/pull/212))\n - Rework the way we set up the default python intepreter in SDK - it is now without specifying a version. This should work fine as long as we keep having one version of python in SDK.\n - Use qcow2 compressed format instead of additional compression layer in Qemu images ([Flatcar#1135](https://github.com/flatcar/Flatcar/issues/1135), [scripts#1132](https://github.com/flatcar/scripts/pull/1132))\n - AWS: Added AWS IMDSv2 support to coreos-cloudinit ([flatcar-linux/coreos-cloudinit#13](https://github.com/flatcar-linux/coreos-cloudinit/pull/13))\n - AWS EC2: Removed the setup of `/etc/hostname` from the instance metadata because it used a long FQDN but we can just use use the hostname set via DHCP ([Flatcar#707](https://github.com/flatcar-linux/Flatcar/issues/707))\n - Azure: Azure VHD disks are now created using subformat=fixed, which makes them suitable for immediate upload to Azure using any tool.\n - Azure: Set up `/etc/hostname` from instance metadata with Afterburn\n - OpenStack: enabled `coreos-metadata-sshkeys@.service` to provision SSH keys from metadata. ([Flatcar#817](https://github.com/flatcar/Flatcar/issues/817), [coreos-overlay#2246](https://github.com/flatcar/coreos-overlay/pull/2246))\n - VMWare: Added `ignition-delete-config.service` to remove Ignition config from VM metadata, see also [here](https://coreos.github.io/ignition/operator-notes/#automatic-config-deletion) ([coreos-overlay#1948](https://github.com/flatcar-linux/coreos-overlay/pull/1948))\n - SDK / ARM64: Added [go-tspi](https://pkg.go.dev/github.com/coreos/go-tspi) bindings for ARM64\n\n \n #### Updates:\n \n- Linux ([5.15.132](https://lwn.net/Articles/944877) (includes [5.15.131](https://lwn.net/Articles/943755), [5.15.130](https://lwn.net/Articles/943404), [5.15.129](https://lwn.net/Articles/943113), [5.15.128](https://lwn.net/Articles/942866), [5.15.127](https://lwn.net/Articles/941775), [5.15.126](https://lwn.net/Articles/941296), [5.15.125](https://lwn.net/Articles/940798), [5.15.124](https://lwn.net/Articles/940339), [5.15.123](https://lwn.net/Articles/939424), [5.15.122](https://lwn.net/Articles/939104), [5.15.121](https://lwn.net/Articles/939016), [5.15.120](https://lwn.net/Articles/937404), [5.15.119](https://lwn.net/Articles/936675), [5.15.118](https://lwn.net/Articles/935584), [5.15.117](https://lwn.net/Articles/934622), [5.15.116](https://lwn.net/Articles/934320), [5.15.115](https://lwn.net/Articles/933909), [5.15.114](https://lwn.net/Articles/933280), [5.15.113](https://lwn.net/Articles/932883), [5.15.112](https://lwn.net/Articles/932134), [5.15.111](https://lwn.net/Articles/931680), [5.15.110](https://lwn.net/Articles/930600), [5.15.109](https://lwn.net/Articles/930263), [5.15.108](https://lwn.net/Articles/929679), [5.15.107](https://lwn.net/Articles/929015), [5.15.106](https://lwn.net/Articles/928343), [5.15.105](https://lwn.net/Articles/927860), [5.15.104](https://lwn.net/Articles/926873), [5.15.103](https://lwn.net/Articles/926415), [5.15.102](https://lwn.net/Articles/925991), [5.15.101](https://lwn.net/Articles/925939), [5.15.100](https://lwn.net/Articles/925913), [5.15.99](https://lwn.net/Articles/925844), [5.15.98](https://lwn.net/Articles/925080), [5.15.97](https://lwn.net/Articles/925064), [5.15.96](https://lwn.net/Articles/924441), [5.15.95](https://lwn.net/Articles/924073), [5.15.94](https://lwn.net/Articles/923308), [5.15.93](https://lwn.net/Articles/922814), [5.15.92](https://lwn.net/Articles/922340), [5.15.91](https://lwn.net/Articles/921851), [5.15.90](https://lwn.net/Articles/921029), [5.15.89](https://lwn.net/Articles/920321), [5.15.88](https://lwn.net/Articles/920012), [5.15.87](https://lwn.net/Articles/919793), [5.15.86](https://lwn.net/Articles/918808), [5.15.85](https://lwn.net/Articles/918329), [5.15.84](https://lwn.net/Articles/918206), [5.15.83](https://lwn.net/Articles/917896), [5.15.82](https://lwn.net/Articles/917400), [5.15.81](https://lwn.net/Articles/916763), [5.15.80](https://lwn.net/Articles/916003), [5.15.79](https://lwn.net/Articles/915100), [5.15.78](https://lwn.net/Articles/914423), [5.15.77](https://lwn.net/Articles/913681), [5.15.76](https://lwn.net/Articles/912997), [5.15.75](https://lwn.net/Articles/912500), [5.15.74](https://lwn.net/Articles/911275), [5.15.73](https://lwn.net/Articles/910957), [5.15.72](https://lwn.net/Articles/910398), [5.15.71](https://lwn.net/Articles/909679), [5.15.70](https://lwn.net/Articles/909212), [5.15.69](https://lwn.net/Articles/908782), [5.15.68](https://lwn.net/Articles/908140), [5.15.67](https://lwn.net/Articles/907526), [5.15.66](https://lwn.net/Articles/907524), [5.15.65](https://lwn.net/Articles/907204), [5.15.64](https://lwn.net/Articles/906630), [5.15.63](https://lwn.net/Articles/906059), [5.15.62](https://lwn.net/Articles/905533), [5.15.61](https://lwn.net/Articles/904959), [5.15.60](https://lwn.net/Articles/904461), [5.15.59](https://lwn.net/Articles/903688), [5.15.58](https://lwn.net/Articles/902917), [5.15.57](https://lwn.net/Articles/902317), [5.15.56](https://lwn.net/Articles/902101), [5.15.55](https://lwn.net/Articles/901380), [5.15.54](https://lwn.net/Articles/900911), [5.15.53](https://lwn.net/Articles/900321), [5.15.52](https://lwn.net/Articles/899788), [5.15.51](https://lwn.net/Articles/899370), [5.15.50](https://lwn.net/Articles/899091), [5.15.49](https://lwn.net/Articles/898622), [5.15.48](https://lwn.net/Articles/898124), [5.15.47](https://lwn.net/Articles/897904), [5.15.46](https://lwn.net/Articles/897377), [5.15.45](https://lwn.net/Articles/897167), [5.15.44](https://lwn.net/Articles/896647), [5.15.43](https://lwn.net/Articles/896220), [5.15.42](https://lwn.net/Articles/896226), [5.15.41](https://lwn.net/Articles/895645), [5.15.40](https://lwn.net/Articles/895318), [5.15.39](https://lwn.net/Articles/895070), [5.15.38](https://lwn.net/Articles/894357), [5.15.37](https://lwn.net/Articles/893264), [5.15.36](https://lwn.net/Articles/892812), [5.15.35](https://lwn.net/Articles/892002), [5.15.34](https://lwn.net/Articles/891251), [5.15.33](https://lwn.net/Articles/890722), [5.15.32](https://lwn.net/Articles/889438), [5.15.31](https://lwn.net/Articles/889001), [5.15.30](https://lwn.net/Articles/888521), [5.15.29](https://lwn.net/Articles/888116), [5.15.28](https://lwn.net/Articles/887638), [5.15.27](https://lwn.net/Articles/887219), [5.15.26](https://lwn.net/Articles/886569), [5.15.25](https://lwn.net/Articles/885895), [5.15.24](https://lwn.net/Articles/884973), [5.15.23](https://lwn.net/Articles/884527), [5.15.22](https://lwn.net/Articles/884107), [5.15.21](https://lwn.net/Articles/883958), [5.15.20](https://lwn.net/Articles/883951), [5.15.19](https://lwn.net/Articles/883441), [5.15.18](https://lwn.net/Articles/883326), [5.15.17](https://lwn.net/Articles/882911), [5.15.16](https://lwn.net/Articles/881963), [5.15.15](https://lwn.net/Articles/881548), [5.15.14](https://lwn.net/Articles/881018), [5.15.13](https://lwn.net/Articles/880469), [5.15.12](https://lwn.net/Articles/879997), [5.15.11](https://lwn.net/Articles/879496), [5.15.10](https://lwn.net/Articles/879023), [5.15.9](https://lwn.net/Articles/878898), [5.15.8](https://lwn.net/Articles/878631), [5.15.7](https://lwn.net/Articles/878040), [5.15.6](https://lwn.net/Articles/877286), [5.15.5](https://lwn.net/Articles/876860),  [5.15.4](https://lwn.net/Articles/876611)))\n- Linux Firmware ([20230117](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230117) (includes [20221214](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221214), [20221109](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221109), [20221012](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221012), [20220913](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220913), [20220815](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220815), [20220708](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220708), [20220610](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220610), [20220509](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220509), [20220411](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220411), [20220310](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220310), [20220209](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220209)))\n- Linux Headers ([5.15](https://lwn.net/Articles/876611/))\n- Go ([1.19.5](https://go.dev/doc/devel/release#go1.19.5) (includes [1.19.4](https://go.dev/doc/devel/release#go1.19.4), [1.19.3](https://go.dev/doc/devel/release#go1.19.3), [1.18.10](https://go.dev/doc/devel/release#go1.18.10), [1.18.9](https://go.dev/doc/devel/release#go1.18.9), [1.18.7](https://go.dev/doc/devel/release#1.18.7), [1.18.6](https://go.dev/doc/devel/release#go1.18.6), [1.18.4](https://go.dev/doc/devel/release#go1.18.4), [1.18.2](https://go.googlesource.com/go/+/refs/tags/go1.18.2), [1.17.9](https://go.googlesource.com/go/+/refs/tags/go1.17.9)))\n- Docker ([20.10.23](https://docs.docker.com/engine/release-notes/#201023) (includes [20.10.22](https://docs.docker.com/engine/release-notes/#201022), [20.10.21](https://docs.docker.com/engine/release-notes/#201021), [20.10.20](https://docs.docker.com/engine/release-notes/#201020), [20.10.18](https://docs.docker.com/engine/release-notes/#201018), [20.10.17](https://docs.docker.com/engine/release-notes/#201017), [20.10.16](https://docs.docker.com/engine/release-notes/#201016), [20.10.15](https://docs.docker.com/engine/release-notes/#201015), [20.10.14](https://docs.docker.com/engine/release-notes/#201014), [20.10.13](https://docs.docker.com/engine/release-notes/#201013)))\n- acl ([2.3.1](https://git.savannah.nongnu.org/cgit/acl.git/log/?h=v2.3.1))\n- new: acpid ([2.0.33](https://sourceforge.net/p/acpid2/code/ci/2.0.33/tree/Changelog)) \n- adcli ([0.9.2](https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.2) (includes [0.9.1](https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.1)))\n- afterburn ([5.2.0](https://github.com/coreos/afterburn/releases/tag/v5.2.0))\n- attr ([2.5.1](https://git.savannah.nongnu.org/cgit/attr.git/log/?h=v2.5.1))\n- audit ([3.0.6](https://listman.redhat.com/archives/linux-audit/2021-October/msg00000.html))\n- automake ([1.16.5](https://savannah.gnu.org/forum/forum.php?forum_id=10055))\n- bind tools ([9.16.36](https://bind9.readthedocs.io/en/v9_16_36/notes.html#notes-for-bind-9-16-36) (includes [9.16.35](https://bind9.readthedocs.io/en/v9_16_34/notes.html#notes-for-bind-9-16-35), [9.16.34](https://bind9.readthedocs.io/en/v9_16_35/notes.html#notes-for-bind-9-16-34), [9.16.33](https://gitlab.isc.org/isc-projects/bind9/-/raw/v9_16_33/CHANGES), [9.16.27](https://gitlab.isc.org/isc-projects/bind9/-/blob/v9_16_27/CHANGES)))\n- binutils ([2.39](https://sourceware.org/pipermail/binutils/2022-August/122246.html) (includes [2.38](https://lwn.net/Articles/884264)))\n- boost ([1.79](https://www.boost.org/users/history/version_1_79_0.html) (includes [1.76.0](https://www.boost.org/users/history/version_1_76_0.html)))\n- bpftool ([5.19.12](https://lwn.net/Articles/909678/) (includes [5.19.8](https://lwn.net/Articles/907523/), [5.19.2](https://lwn.net/Articles/904957/), [5.18.11](https://lwn.net/Articles/900912/), [5.15.8](https://lwn.net/Articles/878631/)))\n- bridge-utils ([1.7.1](https://git.kernel.org/pub/scm/network/bridge/bridge-utils.git/log/?h=v1.7.1))\n- btrfs-progs ([5.15.1](https://btrfs.wiki.kernel.org/index.php/Changelog#btrfs-progs_v5.15_.28Nov_2021.29))\n- ca-certificates ([3.93](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_93.html) (includes [3.90](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90.html), [3.78](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html)))\n- cifs-utils ([6.15](https://lists.samba.org/archive/samba-technical/2022-April/137335.html) (includes [6.13](https://lkml.kernel.org/linux-cifs/CAKywueSqRGSFmeDHQacyu831BNUeGFxGg3vgBmozzhkGBCjyXQ@mail.gmail.com/T/)))\n- conntrack-tools ([1.4.6](https://lists.netfilter.org/pipermail/netfilter-announce/2020/000240.html))\n- containerd ([1.6.16](https://github.com/containerd/containerd/releases/tag/v1.6.16) (includes [1.6.15](https://github.com/containerd/containerd/releases/tag/v1.6.15), [1.6.14](https://github.com/containerd/containerd/releases/tag/v1.6.14), [1.6.13](https://github.com/containerd/containerd/releases/tag/v1.6.13), [1.6.12](https://github.com/containerd/containerd/releases/tag/v1.6.12), [1.6.10](https://github.com/containerd/containerd/releases/tag/v1.6.10), [1.6.9](https://github.com/containerd/containerd/releases/tag/v1.6.9), [1.6.8](https://github.com/containerd/containerd/releases/tag/v1.6.8), [1.6.7](https://github.com/containerd/containerd/releases/tag/v1.6.7), [1.6.6](https://github.com/containerd/containerd/releases/tag/v1.6.6), [1.6.4](https://github.com/containerd/containerd/releases/tag/v1.6.4), [1.6.3](https://github.com/containerd/containerd/releases/tag/v1.6.3), [1.6.2](https://github.com/containerd/containerd/releases/tag/v1.6.2), [1.6.1](https://github.com/containerd/containerd/releases/tag/v1.6.1), [1.6.0](https://github.com/containerd/containerd/releases/tag/v1.6.0)))\n- coreutils ([8.32](https://lists.gnu.org/archive/html/coreutils-announce/2020-03/msg00000.html))\n- cpio ([2.13](https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html))\n- cri-tools ([1.24.2](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.24.2))\n- cryptsetup ([2.4.3](https://lore.kernel.org/all/572c18a7bf60cb1b0f67c3a03c531d7e7ed31832.camel@scientia.net/T/))\n- curl ([7.87.0](https://curl.se/changes.html#7_87_0) (includes [7.86](https://curl.se/changes.html#7_86_0), [7.85](https://curl.se/mail/archive-2022-08/0012.html), [7.84.0](https://github.com/curl/curl/releases/tag/curl-7_84_0), [7.83.1](https://curl.se/mail/lib-2022-05/0010.html)))\n- Cyrus SASL ([2.1.28](https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28))\n- dbus ([1.14.4](https://gitlab.freedesktop.org/dbus/dbus/-/raw/dbus-1.14.4/NEWS) (includes [1.12.22](https://gitlab.freedesktop.org/dbus/dbus/-/blob/177ab044bc87cbc4ded75d21b900795a6fefef76/NEWS)))\n- diffutils ([3.8](https://lists.gnu.org/archive/html/info-gnu/2021-08/msg00000.html))\n- dosfstools ([4.2](https://github.com/dosfstools/dosfstools/releases/tag/v4.2))\n- duktape ([2.7.0](https://github.com/svaarala/duktape/releases/tag/v2.7.0))\n- e2fsprogs ([1.46.5](http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.5) (includes [1.46.4](http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.4)))\n- elfutils ([0.188](https://sourceware.org/pipermail/elfutils-devel/2022q4/005561.html) (includes [0.187](https://sourceware.org/pipermail/elfutils-devel/2022q2/004978.html), [0.186](https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=490932ae4ef9b5a3af01d2c8c616f14d57586046;hb=983e86fd89e8bf02f2d27ba5dce5bf078af4ceda)))\n- ethtool ([5.10](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v5.10))\n- expat ([2.5.0](https://github.com/libexpat/libexpat/blob/R_2_5_0/expat/Changes) (includes [2.4.9](https://github.com/libexpat/libexpat/blob/R_2_4_9/expat/Changes)))\n- findutils ([4.8.0](https://savannah.gnu.org/forum/forum.php?forum_id=9914))\n- gawk ([5.2.1](https://lists.gnu.org/archive/html/help-gawk/2022-11/msg00008.html) (contains [5.2.0](https://lists.gnu.org/archive/html/help-gawk/2022-09/msg00000.html)))\n- gcc ([11.3.0](https://gcc.gnu.org/gcc-11/changes.html) (includes [10.3.0](https://gcc.gnu.org/gcc-10/changes.html), [9.4.0](https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00000.html)))\n- gdb ([11.2](https://lists.gnu.org/archive/html/info-gnu/2022-01/msg00009.html))\n- gdbm ([1.22](https://lists.gnu.org/archive/html/info-gnu/2021-10/msg00006.html))\n- gettext ([0.21.1](https://git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob;f=NEWS;h=cdbb16746c23555e70bb1e16917f5c349ce92d9e;hb=8b38ee827251cadbb90cb6cb576ae98702566288) (includes [0.21](https://www.gnu.org/software/gettext/)))\n- git ([2.39.1](https://github.com/git/git/blob/v2.39.1/Documentation/RelNotes/2.39.1.txt) (includes [2.39.0](https://github.com/git/git/blob/v2.39.0/Documentation/RelNotes/2.39.0.txt), [2.38.3](https://github.com/git/git/blob/v2.38.3/Documentation/RelNotes/2.38.3.txt), [2.37.4](https://github.com/git/git/blob/master/Documentation/RelNotes/2.37.4.txt), [2.37.3](https://github.com/git/git/blob/v2.37.3/Documentation/RelNotes/2.37.3.txt), [2.37.1](https://github.com/git/git/blob/v2.37.1/Documentation/RelNotes/2.37.1.txt), [2.35.3](https://github.com/git/git/blob/v2.35.3/Documentation/RelNotes/2.35.3.txt)))\n- glib ([2.74.4](https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.4) (includes [2.74.1](https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.1), [2.72.3](https://gitlab.gnome.org/GNOME/glib/-/tags/2.73.3), [2.68.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.68.4)))\n- glibc ([2.36](https://sourceware.org/pipermail/libc-alpha/2022-August/141193.html) (includes [2.35](https://savannah.gnu.org/forum/forum.php?forum_id=10111), [2.34](https://sourceware.org/pipermail/libc-alpha/2021-August/129718.html)))\n- gnupg ([2.2.35](https://dev.gnupg.org/T5928))\n- gnutls ([3.7.8](https://lists.gnupg.org/pipermail/gnutls-help/2022-September/004765.html) (includes [3.7.7](https://gitlab.com/gnutls/gnutls/-/tags/3.7.7), [3.7.3](https://gitlab.com/gnutls/gnutls/-/merge_requests/1517)))\n- grep ([3.7](https://savannah.gnu.org/forum/forum.php?forum_id=10037))\n- gzip ([1.12](https://savannah.gnu.org/forum/forum.php?forum_id=10157) (includes [1.11](https://lists.gnu.org/archive/html/info-gnu/2021-09/msg00002.html)))\n- i2c-tools ([4.3](https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/tree/CHANGES?id=d8bc1f1ff4b00a6bd988aa114100ae9b787f50d8) (includes [4.2](https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/log/?h=v4.2)))\n- ignition ([2.14.0](https://github.com/coreos/ignition/releases/tag/v2.14.0) (includes [2.13.0](https://github.com/coreos/ignition/releases/tag/v2.13.0)))\n- intel-microcode ([20220809](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220809) (includes [20220510](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220510), [20220207_p20220207](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207), [20221108](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20221108)))\n- iperf ([3.10.1](https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-3101-2021-06-03))\n- iproute2 ([5.15](https://lwn.net/ml/linux-kernel/20211101164705.6f4f2e41%40hermes.local/))\n- ipset ([7.11](https://ipset.netfilter.org/changelog.html))\n- iptables ([1.8.8](https://www.netfilter.org/projects/iptables/files/changes-iptables-1.8.8.txt))\n- iputils ([20211215](https://github.com/iputils/iputils/releases/tag/20211215) (includes [20210722](https://github.com/iputils/iputils/releases/tag/20210722)))\n- ipvsadm ([1.27](http://archive.linuxvirtualserver.org/html/lvs-devel/2013-09/msg00011.html))\n- jansson ([2.14](https://github.com/akheron/jansson/blob/v2.14/CHANGES))\n- kmod ([29](https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/commit/?id=b6ecfc916a17eab8f93be5b09f4e4f845aabd3d1))\n- ldb ([2.4.1](https://gitlab.com/samba-team/samba/-/commit/a795e0c84597aa045d011e663dbad3cdabf0f1e6))\n- less ([590](https://www.greenwoodsoftware.com/less/news.590.html))\n- libarchive ([3.6.1](https://github.com/libarchive/libarchive/releases/tag/v3.6.1) (includes [3.5.3](https://github.com/libarchive/libarchive/releases/tag/v3.5.3), [3.5.2](https://github.com/libarchive/libarchive/releases/tag/v3.5.2)))\n- libbsd ([0.11.3](https://gitlab.freedesktop.org/libbsd/libbsd/-/commits/0.11.3/))\n- libcap ([2.66](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.d9ygdose5kw) (includes [2.65](https://sites.google.com/site/fullycapable/release-notes-for-libcap?authuser=0#h.wfblevfzkj0)))\n- libcap-ng ([0.8.3](https://people.redhat.com/sgrubb/libcap-ng/ChangeLog) (includes [0.8.2](https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.2)))\n- libksba ([1.6.3](https://dev.gnupg.org/T6304) (includes [1.6.2](https://dev.gnupg.org/T6230)))\n- libnetfilter_queue ([1.0.5](https://git.netfilter.org/libnetfilter_queue/log/?h=libnetfilter_queue-1.0.5))\n- libpcap ([1.10.1](https://git.tcpdump.org/libpcap/blob/c7642e2cc0c5bd65754685b160d25dc23c76c6bd:/CHANGES))\n- libseccomp ([2.5.4](https://github.com/seccomp/libseccomp/releases/tag/v2.5.4) (contains [2.5.3](https://github.com/seccomp/libseccomp/releases/tag/v2.5.3), [2.5.2](https://github.com/seccomp/libseccomp/releases/tag/v2.5.2), [2.5.1](https://github.com/seccomp/libseccomp/releases/tag/v2.5.1)))\n- libtasn1 ([4.19.0](https://lists.gnu.org/archive/html/help-libtasn1/2022-08/msg00001.html) (includes [4.17.0](https://gitlab.com/gnutls/libtasn1/-/blob/v4.17.0/NEWS)))\n- liburing ([2.1](https://github.com/axboe/liburing/commits/liburing-2.1))\n- libxml2 ([2.10.3](https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3) (includes [2.10.2](https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.2), [2.9.14](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14), [2.9.13](http://www.xmlsoft.org/news.html)))\n- logrotate ([3.20.1](https://github.com/logrotate/logrotate/releases/tag/3.20.1))\n- lshw ([02.19.2b_p20210121](https://www.ezix.org/project/wiki/HardwareLiSter#Changes))\n- lsof ([4.94.0](https://github.com/lsof-org/lsof/releases/tag/4.94.0))\n- lsscsi ([0.32](https://sg.danny.cz/scsi/lsscsi.ChangeLog))\n- mantle ([0.18.0](https://github.com/flatcar-linux/mantle/releases/tag/v0.18.0) (includes [0.17.0](https://github.com/flatcar-linux/mantle/releases/tag/v0.17.0)))\n- mdadm ([4.2](https://lore.kernel.org/all/28fdbc45-96ca-7cdb-3ced-a5f65d978048@trained-monkey.org/T/))\n- MIT Kerberos V ([1.20.1](https://web.mit.edu/kerberos/krb5-1.20/krb5-1.20.1.html))\n- multipath-tools ([0.9.3](https://github.com/opensvc/multipath-tools/releases/tag/0.9.3) (includes [0.8.7](https://github.com/opensvc/multipath-tools/commits/0.8.7)))\n- ncurses ([6.3_p20220423](https://lists.gnu.org/archive/html/info-gnu/2021-11/msg00001.html))\n- nettle ([3.8.1](https://git.lysator.liu.se/nettle/nettle/-/blob/990abad16ceacd070747dcc76ed16a39c129321e/ChangeLog))\n- nfs-utils ([2.5.4](https://lore.kernel.org/linux-fsdevel/c8795653-7728-18a4-93dc-58943ad0fe09@redhat.com/))\n- nghttp2 ([1.45.1](https://github.com/nghttp2/nghttp2/releases/tag/v1.45.1))\n- nmap ([7.93](https://nmap.org/changelog.html#7.93))\n- nvidia-drivers ([510.73.05](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-73-05/index.html))\n- nvme-cli ([1.16](https://github.com/linux-nvme/nvme-cli/commits/deee9cae1ac94760deebd71f8e5449061338666c))\n- oniguruma ([6.9.8](https://github.com/kkos/oniguruma/releases/tag/v6.9.8) (includes [6.9.7.1](https://github.com/kkos/oniguruma/releases/tag/v6.9.7.1)))\n- open-isns ([0.101](https://github.com/open-iscsi/open-isns/blob/v0.101/ChangeLog))\n- openssh ([9.1](http://www.openssh.com/releasenotes.html#9.1) (includes [8.8](http://www.openssh.com/txt/release-8.8)))\n- openssl ([3.0.7](https://www.openssl.org/news/openssl-3.0-notes.html) (includes [3.0.3](https://www.openssl.org/news/changelog.html#openssl-30), [3.0.2](https://www.openssl.org/news/changelog.html#openssl-30), [3.0.1](https://www.openssl.org/news/changelog.html#openssl-30)))\n- pam ([1.5.1_p20210622](https://github.com/linux-pam/linux-pam/commit/fe1307512fb8892b5ceb3d884c793af8dbd4c16a))\n- pambase (20220214)\n- parted ([3.4](https://savannah.gnu.org/forum/forum.php?forum_id=9924) (includes [3.3](https://savannah.gnu.org/forum/forum.php?forum_id=9569)))\n- pciutils ([3.7.0](https://github.com/pciutils/pciutils/commit/864aecdea9c7db626856d8d452f6c784316a878c))\n- pcre2 ([10.39](https://github.com/PhilipHazel/pcre2/blob/pcre2-10.39/NEWS))\n- pinentry ([1.2.0](https://dev.gnupg.org/T5566))\n- polkit ([121](https://gitlab.freedesktop.org/polkit/polkit/-/commit/827b0ddac5b1ef00a47fca4526fcf057bee5f1db) (includes [0.120](https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.120/NEWS)))\n- quota ([4.06](https://sourceforge.net/p/linuxquota/code/ci/0acd4cc6275122fd9864cb7b5d349e65a2622920/))\n- rpcbind ([1.2.6](https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_6))\n- rsync ([3.2.7](https://download.samba.org/pub/rsync/NEWS#3.2.7) (includes [3.2.6](https://github.com/WayneD/rsync/releases/tag/v3.2.6), [3.2.4](https://download.samba.org/pub/rsync/NEWS.html#3.2.4)))\n- runc ([1.1.4](https://github.com/opencontainers/runc/releases/tag/v1.1.4) (includes [1.1.3](https://github.com/opencontainers/runc/releases/tag/v1.1.3), [1.1.2](https://github.com/opencontainers/runc/releases/tag/v1.1.2), [1.1.1](https://github.com/opencontainers/runc/releases/tag/v1.1.1), [1.1.0](https://github.com/opencontainers/runc/releases/tag/v1.1.0)))\n- samba ([4.15.4](https://www.samba.org/samba/history/samba-4.15.4.html))\n- sed ([4.8](https://savannah.gnu.org/forum/forum.php?forum_id=9647))\n- shadow ([4.13](https://github.com/shadow-maint/shadow/releases/tag/4.13) (includes [4.12.3](https://github.com/shadow-maint/shadow/releases/tag/4.12.3), [4.11.1](https://github.com/shadow-maint/shadow/releases/tag/v4.11.1)))\n- socat ([1.7.4.3](https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.3:/CHANGES))\n- sqlite ([3.40.1](https://www.sqlite.org/releaselog/3_40_1.html) (contains [3.40.0](https://www.sqlite.org/releaselog/3_40_0.html), [3.39.4](https://sqlite.org/releaselog/3_39_4.html), [3.38.1](https://www.sqlite.org/releaselog/3_38_1.html)))\n- strace ([5.19](https://github.com/strace/strace/releases/tag/v5.19))\n- sudo ([1.9.12_p2](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p2) (includes [1.9.12_p1](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p1), [1.9.10](https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_10)))\n- systemd ([252.11](https://github.com/systemd/systemd-stable/releases/tag/v252.11) (includes [252.5](https://github.com/systemd/systemd-stable/releases/tag/v252.5), [252](https://github.com/systemd/systemd/releases/tag/v252), [251.10](https://github.com/systemd/systemd-stable/commits/v251.10), [251](https://github.com/systemd/systemd/releases/tag/v251), [250.7](https://github.com/systemd/systemd-stable/releases/tag/v250.7), [250.3](https://github.com/systemd/systemd-stable/releases/tag/v250.3), [249.7](https://github.com/systemd/systemd-stable/blob/v249.7/NEWS)))\n- talloc ([2.3.3](https://gitlab.com/samba-team/samba/-/commit/bc1ee7ca0640f0136e5af7dcc4ca8ed0a5893053))\n- tcpdump ([4.99.1](https://git.tcpdump.org/tcpdump/blob/5f552b5e6e9fe05f7ad9681d51d0303233daba6a:/CHANGES))\n- tevent ([0.11.0](https://gitlab.com/samba-team/samba/-/commit/de4e8a1af9564f6056f9af90867c2f013449051c))\n- thin-provisioning-tools ([0.9.0](https://github.com/jthornber/thin-provisioning-tools/blob/d6d93c3157631b242a13a81d30f75453e576c55a/CHANGES#L1-L9))\n- timezone-data ([2021a](https://mm.icann.org/pipermail/tz-announce/2021-January/000065.html))\n- unzip ([6.0_p27](https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-27_changelog) (includes [6.0_p26](https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-26_changelog)))\n- usbutils ([014](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/commit/?id=57fb18e59cce31a50a1ca62d1e192512c905ba00))\n- util-linux ([2.37.4](https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.4-ChangeLog))\n- vim ([9.0.1157](https://github.com/vim/vim/releases/tag/v9.0.1157) (includes [9.0.1000](https://github.com/vim/vim/releases/tag/v9.0.1000), [9.0.0828](https://github.com/vim/vim/releases/tag/v9.0.0828), [9.0.0655](https://github.com/vim/vim/releases/tag/v9.0.0655), [9.0.0469](https://github.com/vim/vim/releases/tag/v9.0.0469), [8.2.5066](https://github.com/vim/vim/releases/tag/v8.2.5066), [8.2.4328](https://github.com/vim/vim/releases/tag/v8.2.4328), [8.2.3582](https://github.com/vim/vim/releases/tag/v8.2.3582)))\n- wget ([1.21.3](https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00017.html))\n- whois ([5.5.14](https://github.com/rfc1036/whois/commit/ab10466cf2e1ec4887f6a44375c3e29c1720157f) (includes [5.5.13](https://github.com/rfc1036/whois/blob/v5.5.13/debian/changelog), [5.5.11](https://github.com/rfc1036/whois/commit/5f5ba8312c04a759dad05723c035549273d07461)))\n- wireguard-tools ([1.0.20210914](https://github.com/WireGuard/wireguard-tools/releases/tag/v1.0.20210914))\n- xfsprogs ([5.14.2](https://marc.info/?l=linux-xfs&m=163883318025390&w=2))\n- xz-utils ([5.4.1](https://github.com/tukaani-project/xz/releases/tag/v5.4.1) (includes [5.4.0](https://github.com/tukaani-project/xz/releases/tag/v5.4.0), [5.2.10](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=d92fa88a835180af5d6ff22ad0e240d6468f81af;hb=f7c2cc55618b9af3318f0c908cf8db0df1e28e7c), [5.2.9](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=ebb303084403445088ec97dfedf0461a6e5b5077;hb=d8a898eb9974683bc725c49ec76722f9a8758f48), [5.2.8](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=c244b42a6771a6e8af206318dfc500d78929fd6f;hb=5476089d9c42b9b04e92b80e1800b384a98265cb), [5.2.7](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=0205423e79ce8297102096b0fc8b030ddf5b2023;hb=d24a57b7fc7e5e9267b84367cb0788d3acf7f569), [5.2.6](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=4c79b18ff26a1c479a920b21f07d050599c04c9e;hb=8dfed05bdaa4873833ba24279f02ad2db25effea)))\n- zlib ([1.2.13](https://github.com/madler/zlib/releases/tag/v1.2.13) (includes [1.2.12](https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/ChangeLog#L4)))\n- GCE: google-compute-image-packages ([20190124](https://github.com/GoogleCloudPlatform/compute-image-packages/releases/tag/20190124))\n- OEM: distro ([1.7.0](https://github.com/python-distro/distro/releases/tag/v1.7.0))\n- OEM: libmspack ([0.10.1_alpha](https://github.com/kyz/libmspack/blob/v0.10.1alpha/libmspack/ChangeLog))\n- OEM: python ([3.9.16](https://www.python.org/downloads/release/python-3916/) (includes [3.9.12](https://www.python.org/downloads/release/python-3912/), [3.9.8](https://www.python.org/downloads/release/python-398/)))\n- SDK: bison ([3.8.2](https://lists.gnu.org/archive/html/bug-bison/2021-09/msg00056.html))\n- SDK: boost ([1.81.0](https://www.boost.org/users/history/version_1_81_0.html))\n- SDK: catalyst ([3.0.21](https://gitweb.gentoo.org/proj/catalyst.git/log/?h=3.0.21))\n- SDK: cmake ([3.23.3](https://cmake.org/cmake/help/v3.23/release/3.23.html))\n- SDK: edk2-ovmf ([202105](https://github.com/tianocore/edk2/releases/tag/edk2-stable202105))\n- SDK: file ([5.44](https://github.com/file/file/blob/FILE5_44/ChangeLog) (includes [5.43](https://mailman.astron.com/pipermail/file/2022-September/000857.html), [5.40](https://mailman.astron.com/pipermail/file/2021-March/000478.html)))\n- SDK: gcc-config ([2.5](https://gitweb.gentoo.org/proj/gcc-config.git/tag/?h=v2.5))\n- SDK: iasl ([20200717](https://www.acpica.org/node/183))\n- SDK: ipxe ([1.21.1](https://github.com/ipxe/ipxe/releases/tag/v1.21.1))\n- SDK: kexec-tools ([2.0.22](https://www.spinics.net/lists/kexec/msg26864.html))\n- SDK: libpng ([1.6.39](http://www.libpng.org/pub/png/src/libpng-1.6.39-README.txt) (includes [1.6.38](http://www.libpng.org/pub/png/src/libpng-1.6.38-README.txt)))\n- SDK: libtool ([2.4.7](https://savannah.gnu.org/forum/forum.php?forum_id=10139))\n- SDK: libxslt ([1.1.37](https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.37) (includes [1.1.35](https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.35)))\n- SDK: man-db ([2.9.4](https://gitlab.com/cjwatson/man-db/-/tags/2.9.4))\n- SDK: man-pages ([5.12-r2](https://man7.org/linux/man-pages/changelog.html#release_5.12))\n- SDK: meson ([0.62.2](https://mesonbuild.com/Release-notes-for-0-62-0.html))\n- SDK: netperf ([2.7.0](https://github.com/HewlettPackard/netperf/blob/netperf-2.7.0/Release_Notes))\n- SDK: ninja ([1.11.0](https://groups.google.com/g/ninja-build/c/R2oCyDctDf8/m/-U94Y5I8AgAJ?pli=1))\n- SDK: pahole ([1.23](https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.23))\n- SDK: perl ([5.36.0](https://perldoc.perl.org/5.36.0/perldelta) (includes [5.34.1](https://perldoc.perl.org/5.34.1/perldelta), [5.15](https://kernelnewbies.org/LinuxChanges#Linux_5.15.Tracing.2C_perf_and_BPF)))\n- SDK: pkgconf ([1.8.0](https://gitea.treehouse.systems/ariadne/pkgconf/src/tag/pkgconf-1.8.0/NEWS))\n- SDK: portage ([3.0.43](https://github.com/gentoo/portage/blob/portage-3.0.43/NEWS) (includes [3.0.42](https://github.com/gentoo/portage/blob/portage-3.0.42/NEWS), [3.0.41](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.41)))\n- SDK: Python ([3.9.12](https://www.python.org/downloads/release/python-3912/) (includes [3.9.8](https://www.python.org/downloads/release/python-398/)))\n- SDK: qemu ([7.2.0](https://wiki.qemu.org/ChangeLog/7.2) (includes [7.1.0](https://wiki.qemu.org/ChangeLog/7.1), [7.0.0](https://wiki.qemu.org/ChangeLog/7.0), [6.1.0](https://wiki.qemu.org/ChangeLog/6.1)))\n- SDK: Rust ([1.67.0](https://github.com/rust-lang/rust/releases/tag/1.67.0) (includes [1.66.1](https://github.com/rust-lang/rust/releases/tag/1.66.1), [1.66.0](https://github.com/rust-lang/rust/releases/tag/1.66.0), [1.65.0](https://github.com/rust-lang/rust/releases/tag/1.65.0), [1.64.0](https://github.com/rust-lang/rust/releases/tag/1.64.0), [1.63.0](https://github.com/rust-lang/rust/releases/tag/1.63.0), [1.62.1](https://github.com/rust-lang/rust/releases/tag/1.62.1), [1.62.0](https://github.com/rust-lang/rust/releases/tag/1.62.0), [1.61.0](https://github.com/rust-lang/rust/releases/tag/1.61.0), [1.60.0](https://github.com/rust-lang/rust/releases/tag/1.60.0), [1.59.0](https://github.com/rust-lang/rust/releases/tag/1.59.0), [1.58.1](https://github.com/rust-lang/rust/releases/tag/1.58.1), [1.57.0](https://github.com/rust-lang/rust/releases/tag/1.57.0)))\n- SDK: sbsigntools ([0.9.4](https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/tag/?h=v0.9.4))\n- SDK: seabios ([1.14.0](https://seabios.org/Releases#SeaBIOS_1.14.0))\n- SDK: sgabios ([0.1_pre10](https://git.qemu.org/?p=sgabios.git;a=tree;h=a85446adb0e0))\n- SDK: squashfs-tools ([4.5_p20210914](https://lore.kernel.org/lkml/CAB3woddJss+ziGp-RjJ-yiax6pc_HLMdxk3Qk5nJdRgjpEYWBg@mail.gmail.com/))\n- VMware: open-vm-tools ([12.1.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.5) (includes [12.1.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.0), [12.0.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.5), [12.0.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.0)))"
  },
  "3510.3.1": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-10-25 08:41:08 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.136"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.0**_\n \n #### Security fixes:\n \n - Linux ([CVE-2023-31085](https://nvd.nist.gov/vuln/detail/CVE-2023-31085), [CVE-2023-34324](https://nvd.nist.gov/vuln/detail/CVE-2023-34324), [CVE-2023-4244](https://nvd.nist.gov/vuln/detail/CVE-2023-4244), [CVE-2023-42754](https://nvd.nist.gov/vuln/detail/CVE-2023-42754), [CVE-2023-42755](https://nvd.nist.gov/vuln/detail/CVE-2023-42755), [CVE-2023-5197](https://nvd.nist.gov/vuln/detail/CVE-2023-5197))\n - curl ([CVE-2023-38545](https://nvd.nist.gov/vuln/detail/CVE-2023-38545), [CVE-2023-38546](https://nvd.nist.gov/vuln/detail/CVE-2023-38546)) \n \n #### Bug fixes:\n \n - Disabled systemd-networkd's RoutesToDNS setting by default to fix provisioning failures observed in VMs with multiple network interfaces on Azure ([scripts#1206](https://github.com/flatcar/scripts/pull/1206))\n - Triggered re-reading of partition table to fix adding partitions to the boot disk ([scripts#1202](https://github.com/flatcar/scripts/pull/1202))\n \n #### Changes:\n \n - To make Kubernetes work by default, `/usr/libexec/kubernetes/kubelet-plugins/volume/exec` is now a symlink to the writable folder `/var/kubernetes/kubelet-plugins/volume/exec` ([Flatcar#1193](https://github.com/flatcar/Flatcar/issues/1193))\n \n #### Updates:\n \n - Linux ([5.15.136](https://lwn.net/Articles/948297) (includes [5.15.135](https://lwn.net/Articles/947299), [5.15.134](https://lwn.net/Articles/946855), [5.15.133](https://lwn.net/Articles/945380)))\n - ca-certificates ([3.94](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html))"
  },
  "3510.3.2": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-02-14 04:35:42 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.148"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **LTS 3510.3.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2022-47940](https://nvd.nist.gov/vuln/detail/CVE-2022-47940), [CVE-2023-1193](https://nvd.nist.gov/vuln/detail/CVE-2023-1193), [CVE-2023-1194](https://nvd.nist.gov/vuln/detail/CVE-2023-1194), [CVE-2023-25775](https://nvd.nist.gov/vuln/detail/CVE-2023-25775), [CVE-2023-32247](https://nvd.nist.gov/vuln/detail/CVE-2023-32247), [CVE-2023-32250](https://nvd.nist.gov/vuln/detail/CVE-2023-32250), [CVE-2023-32252](https://nvd.nist.gov/vuln/detail/CVE-2023-32252), [CVE-2023-32254](https://nvd.nist.gov/vuln/detail/CVE-2023-32254), [CVE-2023-32257](https://nvd.nist.gov/vuln/detail/CVE-2023-32257), [CVE-2023-32258](https://nvd.nist.gov/vuln/detail/CVE-2023-32258), [CVE-2023-38427](https://nvd.nist.gov/vuln/detail/CVE-2023-38427), [CVE-2023-38430](https://nvd.nist.gov/vuln/detail/CVE-2023-38430), [CVE-2023-38431](https://nvd.nist.gov/vuln/detail/CVE-2023-38431), [CVE-2023-3867](https://nvd.nist.gov/vuln/detail/CVE-2023-3867), [CVE-2023-46343](https://nvd.nist.gov/vuln/detail/CVE-2023-46343), [CVE-2023-46813](https://nvd.nist.gov/vuln/detail/CVE-2023-46813), [CVE-2023-46838](https://nvd.nist.gov/vuln/detail/CVE-2023-46838), [CVE-2023-46862](https://nvd.nist.gov/vuln/detail/CVE-2023-46862), [CVE-2023-51779](https://nvd.nist.gov/vuln/detail/CVE-2023-51779), [CVE-2023-51780](https://nvd.nist.gov/vuln/detail/CVE-2023-51780), [CVE-2023-51781](https://nvd.nist.gov/vuln/detail/CVE-2023-51781), [CVE-2023-51782](https://nvd.nist.gov/vuln/detail/CVE-2023-51782), [CVE-2023-52340](https://nvd.nist.gov/vuln/detail/CVE-2023-52340), [CVE-2023-5717](https://nvd.nist.gov/vuln/detail/CVE-2023-5717), [CVE-2023-6040](https://nvd.nist.gov/vuln/detail/CVE-2023-6040), [CVE-2023-6121](https://nvd.nist.gov/vuln/detail/CVE-2023-6121), [CVE-2023-6606](https://nvd.nist.gov/vuln/detail/CVE-2023-6606), [CVE-2023-6622](https://nvd.nist.gov/vuln/detail/CVE-2023-6622), [CVE-2023-6817](https://nvd.nist.gov/vuln/detail/CVE-2023-6817), [CVE-2023-6915](https://nvd.nist.gov/vuln/detail/CVE-2023-6915), [CVE-2023-6931](https://nvd.nist.gov/vuln/detail/CVE-2023-6931), [CVE-2023-6932](https://nvd.nist.gov/vuln/detail/CVE-2023-6932), [CVE-2024-0584](https://nvd.nist.gov/vuln/detail/CVE-2024-0584), [CVE-2024-0607](https://nvd.nist.gov/vuln/detail/CVE-2024-0607), [CVE-2024-0646](https://nvd.nist.gov/vuln/detail/CVE-2024-0646), [CVE-2024-1085](https://nvd.nist.gov/vuln/detail/CVE-2024-1085), [CVE-2024-22705](https://nvd.nist.gov/vuln/detail/CVE-2024-22705))\n - runc ([CVE-2024-21626](https://nvd.nist.gov/vuln/detail/CVE-2024-21626))\n \n #### Bug fixes:\n \n - Forwarded the proxy environment variables of `update-engine.service` to the postinstall script to support fetching OEM systemd-sysext payloads through a proxy ([Flatcar#1326](https://github.com/flatcar/Flatcar/issues/1326))\n \n #### Changes:\n \n - Added a `flatcar-update --oem-payloads <yes|no>` flag to skip providing OEM payloads, e.g., for downgrades ([init#114](https://github.com/flatcar/init/pull/114))\n - Backported the OEM payload support to update-engine to avoid the fallback download path for clients on a restricted network and rather use the URLs passed from `flatcar-update -E` or with self-hosted Nebraska payloads ([Flatcar#1332](https://github.com/flatcar/Flatcar/issues/1332), [Flatcar#1326](https://github.com/flatcar/Flatcar/issues/1326))\n - Brightbox: The regular OpenStack image should now be used, it includes Afterburn for instance metadata attributes\n - OpenStack: An uncompressed image is provided for simpler import (since the images use qcow2 inline compression, there is no benefit in using the `.gz` or `.bz2` images)\n \n #### Updates:\n \n- Linux ([5.15.148](https://lwn.net/Articles/959514) (includes [5.15.147](https://lwn.net/Articles/958344), [5.15.146](https://lwn.net/Articles/957010), [5.15.145](https://lwn.net/Articles/956081), [5.15.144](https://lwn.net/Articles/955815), [5.15.143](https://lwn.net/Articles/954988/), [5.15.142](https://lwn.net/Articles/954114), [5.15.141](https://lwn.net/Articles/953649/), [5.15.140](https://lwn.net/Articles/953130), [5.15.139](https://lwn.net/Articles/952004), [5.15.138](https://lwn.net/Articles/950714), [5.15.137](https://lwn.net/Articles/948818)))\n- ca-certificates ([3.97](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_97.html) (includes [3.96.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html), [3.96](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html), [3.95](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html)))\n- runc ([1.1.12](https://github.com/opencontainers/runc/releases/tag/v1.1.12))"
  },
  "3510.3.3": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-04-16 11:53:54 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.154"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.2**_\n\n#### Security fixes:\n\n- Linux ([CVE-2023-52429](https://nvd.nist.gov/vuln/detail/CVE-2023-52429), [CVE-2023-52434](https://nvd.nist.gov/vuln/detail/CVE-2023-52434), [CVE-2023-52435](https://nvd.nist.gov/vuln/detail/CVE-2023-52435), [CVE-2023-52447](https://nvd.nist.gov/vuln/detail/CVE-2023-52447), [CVE-2023-52486](https://nvd.nist.gov/vuln/detail/CVE-2023-52486), [CVE-2023-52489](https://nvd.nist.gov/vuln/detail/CVE-2023-52489), [CVE-2023-52491](https://nvd.nist.gov/vuln/detail/CVE-2023-52491), [CVE-2023-52492](https://nvd.nist.gov/vuln/detail/CVE-2023-52492), [CVE-2023-52493](https://nvd.nist.gov/vuln/detail/CVE-2023-52493), [CVE-2023-52494](https://nvd.nist.gov/vuln/detail/CVE-2023-52494), [CVE-2023-52497](https://nvd.nist.gov/vuln/detail/CVE-2023-52497), [CVE-2023-52498](https://nvd.nist.gov/vuln/detail/CVE-2023-52498), [CVE-2023-52583](https://nvd.nist.gov/vuln/detail/CVE-2023-52583), [CVE-2023-52587](https://nvd.nist.gov/vuln/detail/CVE-2023-52587), [CVE-2023-52588](https://nvd.nist.gov/vuln/detail/CVE-2023-52588), [CVE-2023-52594](https://nvd.nist.gov/vuln/detail/CVE-2023-52594), [CVE-2023-52595](https://nvd.nist.gov/vuln/detail/CVE-2023-52595), [CVE-2023-52597](https://nvd.nist.gov/vuln/detail/CVE-2023-52597), [CVE-2023-52598](https://nvd.nist.gov/vuln/detail/CVE-2023-52598), [CVE-2023-52599](https://nvd.nist.gov/vuln/detail/CVE-2023-52599), [CVE-2023-52600](https://nvd.nist.gov/vuln/detail/CVE-2023-52600), [CVE-2023-52601](https://nvd.nist.gov/vuln/detail/CVE-2023-52601), [CVE-2023-52602](https://nvd.nist.gov/vuln/detail/CVE-2023-52602), [CVE-2023-52603](https://nvd.nist.gov/vuln/detail/CVE-2023-52603), [CVE-2023-52604](https://nvd.nist.gov/vuln/detail/CVE-2023-52604), [CVE-2023-52606](https://nvd.nist.gov/vuln/detail/CVE-2023-52606), [CVE-2023-52607](https://nvd.nist.gov/vuln/detail/CVE-2023-52607), [CVE-2023-52608](https://nvd.nist.gov/vuln/detail/CVE-2023-52608), [CVE-2023-52614](https://nvd.nist.gov/vuln/detail/CVE-2023-52614), [CVE-2023-52615](https://nvd.nist.gov/vuln/detail/CVE-2023-52615), [CVE-2023-52616](https://nvd.nist.gov/vuln/detail/CVE-2023-52616), [CVE-2023-52617](https://nvd.nist.gov/vuln/detail/CVE-2023-52617), [CVE-2023-52618](https://nvd.nist.gov/vuln/detail/CVE-2023-52618), [CVE-2023-52619](https://nvd.nist.gov/vuln/detail/CVE-2023-52619), [CVE-2023-52620](https://nvd.nist.gov/vuln/detail/CVE-2023-52620), [CVE-2023-52622](https://nvd.nist.gov/vuln/detail/CVE-2023-52622), [CVE-2023-52623](https://nvd.nist.gov/vuln/detail/CVE-2023-52623), [CVE-2023-52627](https://nvd.nist.gov/vuln/detail/CVE-2023-52627), [CVE-2023-52630](https://nvd.nist.gov/vuln/detail/CVE-2023-52630), [CVE-2023-52631](https://nvd.nist.gov/vuln/detail/CVE-2023-52631), [CVE-2023-52633](https://nvd.nist.gov/vuln/detail/CVE-2023-52633), [CVE-2023-52635](https://nvd.nist.gov/vuln/detail/CVE-2023-52635), [CVE-2023-52637](https://nvd.nist.gov/vuln/detail/CVE-2023-52637), [CVE-2023-52638](https://nvd.nist.gov/vuln/detail/CVE-2023-52638), [CVE-2023-52640](https://nvd.nist.gov/vuln/detail/CVE-2023-52640), [CVE-2023-52641](https://nvd.nist.gov/vuln/detail/CVE-2023-52641), [CVE-2023-6270](https://nvd.nist.gov/vuln/detail/CVE-2023-6270), [CVE-2023-7042](https://nvd.nist.gov/vuln/detail/CVE-2023-7042), [CVE-2024-0340](https://nvd.nist.gov/vuln/detail/CVE-2024-0340), [CVE-2024-0565](https://nvd.nist.gov/vuln/detail/CVE-2024-0565), [CVE-2024-0841](https://nvd.nist.gov/vuln/detail/CVE-2024-0841), [CVE-2024-1086](https://nvd.nist.gov/vuln/detail/CVE-2024-1086), [CVE-2024-1151](https://nvd.nist.gov/vuln/detail/CVE-2024-1151), [CVE-2024-22099](https://nvd.nist.gov/vuln/detail/CVE-2024-22099), [CVE-2024-23849](https://nvd.nist.gov/vuln/detail/CVE-2024-23849), [CVE-2024-23850](https://nvd.nist.gov/vuln/detail/CVE-2024-23850), [CVE-2024-23851](https://nvd.nist.gov/vuln/detail/CVE-2024-23851), [CVE-2024-26592](https://nvd.nist.gov/vuln/detail/CVE-2024-26592), [CVE-2024-26593](https://nvd.nist.gov/vuln/detail/CVE-2024-26593), [CVE-2024-26594](https://nvd.nist.gov/vuln/detail/CVE-2024-26594), [CVE-2024-26600](https://nvd.nist.gov/vuln/detail/CVE-2024-26600), [CVE-2024-26601](https://nvd.nist.gov/vuln/detail/CVE-2024-26601), [CVE-2024-26602](https://nvd.nist.gov/vuln/detail/CVE-2024-26602), [CVE-2024-26603](https://nvd.nist.gov/vuln/detail/CVE-2024-26603), [CVE-2024-26606](https://nvd.nist.gov/vuln/detail/CVE-2024-26606), [CVE-2024-26608](https://nvd.nist.gov/vuln/detail/CVE-2024-26608), [CVE-2024-26610](https://nvd.nist.gov/vuln/detail/CVE-2024-26610), [CVE-2024-26614](https://nvd.nist.gov/vuln/detail/CVE-2024-26614), [CVE-2024-26615](https://nvd.nist.gov/vuln/detail/CVE-2024-26615), [CVE-2024-26622](https://nvd.nist.gov/vuln/detail/CVE-2024-26622), [CVE-2024-26625](https://nvd.nist.gov/vuln/detail/CVE-2024-26625), [CVE-2024-26627](https://nvd.nist.gov/vuln/detail/CVE-2024-26627), [CVE-2024-26635](https://nvd.nist.gov/vuln/detail/CVE-2024-26635), [CVE-2024-26636](https://nvd.nist.gov/vuln/detail/CVE-2024-26636), [CVE-2024-26640](https://nvd.nist.gov/vuln/detail/CVE-2024-26640), [CVE-2024-26641](https://nvd.nist.gov/vuln/detail/CVE-2024-26641), [CVE-2024-26644](https://nvd.nist.gov/vuln/detail/CVE-2024-26644), [CVE-2024-26645](https://nvd.nist.gov/vuln/detail/CVE-2024-26645), [CVE-2024-26651](https://nvd.nist.gov/vuln/detail/CVE-2024-26651), [CVE-2024-26659](https://nvd.nist.gov/vuln/detail/CVE-2024-26659), [CVE-2024-26660](https://nvd.nist.gov/vuln/detail/CVE-2024-26660), [CVE-2024-26663](https://nvd.nist.gov/vuln/detail/CVE-2024-26663), [CVE-2024-26664](https://nvd.nist.gov/vuln/detail/CVE-2024-26664), [CVE-2024-26665](https://nvd.nist.gov/vuln/detail/CVE-2024-26665), [CVE-2024-26668](https://nvd.nist.gov/vuln/detail/CVE-2024-26668), [CVE-2024-26671](https://nvd.nist.gov/vuln/detail/CVE-2024-26671), [CVE-2024-26673](https://nvd.nist.gov/vuln/detail/CVE-2024-26673), [CVE-2024-26675](https://nvd.nist.gov/vuln/detail/CVE-2024-26675), [CVE-2024-26676](https://nvd.nist.gov/vuln/detail/CVE-2024-26676), [CVE-2024-26679](https://nvd.nist.gov/vuln/detail/CVE-2024-26679), [CVE-2024-26684](https://nvd.nist.gov/vuln/detail/CVE-2024-26684), [CVE-2024-26685](https://nvd.nist.gov/vuln/detail/CVE-2024-26685), [CVE-2024-26688](https://nvd.nist.gov/vuln/detail/CVE-2024-26688), [CVE-2024-26689](https://nvd.nist.gov/vuln/detail/CVE-2024-26689), [CVE-2024-26696](https://nvd.nist.gov/vuln/detail/CVE-2024-26696), [CVE-2024-26697](https://nvd.nist.gov/vuln/detail/CVE-2024-26697), [CVE-2024-26698](https://nvd.nist.gov/vuln/detail/CVE-2024-26698), [CVE-2024-26702](https://nvd.nist.gov/vuln/detail/CVE-2024-26702), [CVE-2024-26704](https://nvd.nist.gov/vuln/detail/CVE-2024-26704), [CVE-2024-26707](https://nvd.nist.gov/vuln/detail/CVE-2024-26707), [CVE-2024-26712](https://nvd.nist.gov/vuln/detail/CVE-2024-26712), [CVE-2024-26715](https://nvd.nist.gov/vuln/detail/CVE-2024-26715), [CVE-2024-26717](https://nvd.nist.gov/vuln/detail/CVE-2024-26717), [CVE-2024-26720](https://nvd.nist.gov/vuln/detail/CVE-2024-26720), [CVE-2024-26727](https://nvd.nist.gov/vuln/detail/CVE-2024-26727), [CVE-2024-26733](https://nvd.nist.gov/vuln/detail/CVE-2024-26733), [CVE-2024-26735](https://nvd.nist.gov/vuln/detail/CVE-2024-26735), [CVE-2024-26736](https://nvd.nist.gov/vuln/detail/CVE-2024-26736), [CVE-2024-26737](https://nvd.nist.gov/vuln/detail/CVE-2024-26737), [CVE-2024-26743](https://nvd.nist.gov/vuln/detail/CVE-2024-26743), [CVE-2024-26744](https://nvd.nist.gov/vuln/detail/CVE-2024-26744), [CVE-2024-26747](https://nvd.nist.gov/vuln/detail/CVE-2024-26747), [CVE-2024-26748](https://nvd.nist.gov/vuln/detail/CVE-2024-26748), [CVE-2024-26749](https://nvd.nist.gov/vuln/detail/CVE-2024-26749), [CVE-2024-26751](https://nvd.nist.gov/vuln/detail/CVE-2024-26751), [CVE-2024-26752](https://nvd.nist.gov/vuln/detail/CVE-2024-26752), [CVE-2024-26754](https://nvd.nist.gov/vuln/detail/CVE-2024-26754), [CVE-2024-26763](https://nvd.nist.gov/vuln/detail/CVE-2024-26763), [CVE-2024-26764](https://nvd.nist.gov/vuln/detail/CVE-2024-26764), [CVE-2024-26766](https://nvd.nist.gov/vuln/detail/CVE-2024-26766), [CVE-2024-26769](https://nvd.nist.gov/vuln/detail/CVE-2024-26769), [CVE-2024-26771](https://nvd.nist.gov/vuln/detail/CVE-2024-26771), [CVE-2024-26772](https://nvd.nist.gov/vuln/detail/CVE-2024-26772), [CVE-2024-26773](https://nvd.nist.gov/vuln/detail/CVE-2024-26773), [CVE-2024-26774](https://nvd.nist.gov/vuln/detail/CVE-2024-26774), [CVE-2024-26776](https://nvd.nist.gov/vuln/detail/CVE-2024-26776), [CVE-2024-26777](https://nvd.nist.gov/vuln/detail/CVE-2024-26777), [CVE-2024-26778](https://nvd.nist.gov/vuln/detail/CVE-2024-26778), [CVE-2024-26779](https://nvd.nist.gov/vuln/detail/CVE-2024-26779), [CVE-2024-26782](https://nvd.nist.gov/vuln/detail/CVE-2024-26782), [CVE-2024-26787](https://nvd.nist.gov/vuln/detail/CVE-2024-26787), [CVE-2024-26788](https://nvd.nist.gov/vuln/detail/CVE-2024-26788), [CVE-2024-26790](https://nvd.nist.gov/vuln/detail/CVE-2024-26790), [CVE-2024-26791](https://nvd.nist.gov/vuln/detail/CVE-2024-26791), [CVE-2024-26793](https://nvd.nist.gov/vuln/detail/CVE-2024-26793), [CVE-2024-26795](https://nvd.nist.gov/vuln/detail/CVE-2024-26795), [CVE-2024-26798](https://nvd.nist.gov/vuln/detail/CVE-2024-26798), [CVE-2024-26801](https://nvd.nist.gov/vuln/detail/CVE-2024-26801), [CVE-2024-26802](https://nvd.nist.gov/vuln/detail/CVE-2024-26802), [CVE-2024-26803](https://nvd.nist.gov/vuln/detail/CVE-2024-26803), [CVE-2024-26804](https://nvd.nist.gov/vuln/detail/CVE-2024-26804), [CVE-2024-26805](https://nvd.nist.gov/vuln/detail/CVE-2024-26805), [CVE-2024-26808](https://nvd.nist.gov/vuln/detail/CVE-2024-26808), [CVE-2024-26809](https://nvd.nist.gov/vuln/detail/CVE-2024-26809))\n\n#### Bug fixes:\n\n- Fixed `toolbox` to prevent mounted `ctr` snapshots from being garbage-collected ([toolbox#9](https://github.com/flatcar/toolbox/pull/9))\n\n#### Changes:\n\n- SDK: Unified qemu image formats, so that the `qemu_uefi` build target provides the regular `qemu` and the `qemu_uefi_secure` artifacts ([scripts#1847](https://github.com/flatcar/scripts/pull/1847))\n\n#### Updates:\n\n- Linux ([5.15.154](https://lwn.net/Articles/969357) (includes [5.15.153](https://lwn.net/Articles/966760), [5.15.152](https://lwn.net/Articles/965608), [5.15.151](https://lwn.net/Articles/964564), [5.15.150](https://lwn.net/Articles/964175), [5.15.149](https://lwn.net/Articles/963359)))\n- ca-certificates ([3.99](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_99.html) (includes [3.98](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html)))\n"
  },
  "3510.3.4": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-06-26 13:05:46 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.161"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **LTS 3510.3.3**_\n \n #### Updates:\n \n - Linux ([5.15.161](https://lwn.net/Articles/978595) (includes [5.15.160](https://lwn.net/Articles/975078), [5.15.159](https://lwn.net/Articles/974075), [5.15.158](https://lwn.net/Articles/972213), [5.15.157](https://lwn.net/Articles/971365), [5.15.156](https://lwn.net/Articles/970174) and [5.15.155](https://lwn.net/Articles/969736)))\n - ca-certificates ([3.101](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101.html) (includes [3.100](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_100.html)))\n"
  },
  "3510.3.5": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-07-02 13:35:44 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.161"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **LTS 3510.3.4**_\n \n #### Security fixes:\n \n - openssh ([CVE-2024-6387](https://nvd.nist.gov/vuln/detail/CVE-2024-6387))"
  },
  "3510.3.6": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2024-12-16 14:13:08 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.173"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.5**_\n\n#### Security fixes:\n\n- Linux ([CVE-2024-42098](https://nvd.nist.gov/vuln/detail/CVE-2024-42098), [CVE-2024-42097](https://nvd.nist.gov/vuln/detail/CVE-2024-42097), [CVE-2024-42096](https://nvd.nist.gov/vuln/detail/CVE-2024-42096), [CVE-2024-42095](https://nvd.nist.gov/vuln/detail/CVE-2024-42095), [CVE-2024-42093](https://nvd.nist.gov/vuln/detail/CVE-2024-42093), [CVE-2024-42094](https://nvd.nist.gov/vuln/detail/CVE-2024-42094), [CVE-2024-42092](https://nvd.nist.gov/vuln/detail/CVE-2024-42092), [CVE-2024-42090](https://nvd.nist.gov/vuln/detail/CVE-2024-42090), [CVE-2024-42089](https://nvd.nist.gov/vuln/detail/CVE-2024-42089), [CVE-2024-42087](https://nvd.nist.gov/vuln/detail/CVE-2024-42087), [CVE-2024-42086](https://nvd.nist.gov/vuln/detail/CVE-2024-42086), [CVE-2024-42084](https://nvd.nist.gov/vuln/detail/CVE-2024-42084), [CVE-2024-42085](https://nvd.nist.gov/vuln/detail/CVE-2024-42085), [CVE-2024-42070](https://nvd.nist.gov/vuln/detail/CVE-2024-42070), [CVE-2024-42068](https://nvd.nist.gov/vuln/detail/CVE-2024-42068), [CVE-2024-42082](https://nvd.nist.gov/vuln/detail/CVE-2024-42082), [CVE-2024-42080](https://nvd.nist.gov/vuln/detail/CVE-2024-42080), [CVE-2024-42077](https://nvd.nist.gov/vuln/detail/CVE-2024-42077), [CVE-2024-42076](https://nvd.nist.gov/vuln/detail/CVE-2024-42076), [CVE-2023-52887](https://nvd.nist.gov/vuln/detail/CVE-2023-52887), [CVE-2024-41093](https://nvd.nist.gov/vuln/detail/CVE-2024-41093), [CVE-2024-41092](https://nvd.nist.gov/vuln/detail/CVE-2024-41092), [CVE-2024-41089](https://nvd.nist.gov/vuln/detail/CVE-2024-41089), [CVE-2024-41087](https://nvd.nist.gov/vuln/detail/CVE-2024-41087), [CVE-2024-41097](https://nvd.nist.gov/vuln/detail/CVE-2024-41097), [CVE-2024-41095](https://nvd.nist.gov/vuln/detail/CVE-2024-41095), [CVE-2024-41006](https://nvd.nist.gov/vuln/detail/CVE-2024-41006), [CVE-2024-41005](https://nvd.nist.gov/vuln/detail/CVE-2024-41005), [CVE-2024-41004](https://nvd.nist.gov/vuln/detail/CVE-2024-41004), [CVE-2024-41002](https://nvd.nist.gov/vuln/detail/CVE-2024-41002), [CVE-2024-41000](https://nvd.nist.gov/vuln/detail/CVE-2024-41000), [CVE-2024-40994](https://nvd.nist.gov/vuln/detail/CVE-2024-40994), [CVE-2024-40990](https://nvd.nist.gov/vuln/detail/CVE-2024-40990), [CVE-2024-40988](https://nvd.nist.gov/vuln/detail/CVE-2024-40988), [CVE-2024-40987](https://nvd.nist.gov/vuln/detail/CVE-2024-40987), [CVE-2024-40995](https://nvd.nist.gov/vuln/detail/CVE-2024-40995), [CVE-2024-40983](https://nvd.nist.gov/vuln/detail/CVE-2024-40983), [CVE-2024-40984](https://nvd.nist.gov/vuln/detail/CVE-2024-40984), [CVE-2024-40970](https://nvd.nist.gov/vuln/detail/CVE-2024-40970), [CVE-2024-40978](https://nvd.nist.gov/vuln/detail/CVE-2024-40978), [CVE-2024-40976](https://nvd.nist.gov/vuln/detail/CVE-2024-40976), [CVE-2024-40974](https://nvd.nist.gov/vuln/detail/CVE-2024-40974), [CVE-2024-40981](https://nvd.nist.gov/vuln/detail/CVE-2024-40981), [CVE-2024-40980](https://nvd.nist.gov/vuln/detail/CVE-2024-40980), [CVE-2024-40971](https://nvd.nist.gov/vuln/detail/CVE-2024-40971), [CVE-2024-40954](https://nvd.nist.gov/vuln/detail/CVE-2024-40954), [CVE-2024-40968](https://nvd.nist.gov/vuln/detail/CVE-2024-40968), [CVE-2024-40967](https://nvd.nist.gov/vuln/detail/CVE-2024-40967), [CVE-2024-40963](https://nvd.nist.gov/vuln/detail/CVE-2024-40963), [CVE-2024-40961](https://nvd.nist.gov/vuln/detail/CVE-2024-40961), [CVE-2024-40960](https://nvd.nist.gov/vuln/detail/CVE-2024-40960), [CVE-2024-40959](https://nvd.nist.gov/vuln/detail/CVE-2024-40959), [CVE-2024-40958](https://nvd.nist.gov/vuln/detail/CVE-2024-40958), [CVE-2024-40957](https://nvd.nist.gov/vuln/detail/CVE-2024-40957), [CVE-2024-40956](https://nvd.nist.gov/vuln/detail/CVE-2024-40956), [CVE-2024-40929](https://nvd.nist.gov/vuln/detail/CVE-2024-40929), [CVE-2024-40937](https://nvd.nist.gov/vuln/detail/CVE-2024-40937), [CVE-2024-40934](https://nvd.nist.gov/vuln/detail/CVE-2024-40934), [CVE-2024-40932](https://nvd.nist.gov/vuln/detail/CVE-2024-40932), [CVE-2024-40931](https://nvd.nist.gov/vuln/detail/CVE-2024-40931), [CVE-2024-40945](https://nvd.nist.gov/vuln/detail/CVE-2024-40945), [CVE-2024-40943](https://nvd.nist.gov/vuln/detail/CVE-2024-40943), [CVE-2024-40942](https://nvd.nist.gov/vuln/detail/CVE-2024-40942), [CVE-2024-40941](https://nvd.nist.gov/vuln/detail/CVE-2024-40941), [CVE-2024-40916](https://nvd.nist.gov/vuln/detail/CVE-2024-40916), [CVE-2024-40927](https://nvd.nist.gov/vuln/detail/CVE-2024-40927), [CVE-2024-40914](https://nvd.nist.gov/vuln/detail/CVE-2024-40914), [CVE-2024-40912](https://nvd.nist.gov/vuln/detail/CVE-2024-40912), [CVE-2024-39503](https://nvd.nist.gov/vuln/detail/CVE-2024-39503), [CVE-2024-39502](https://nvd.nist.gov/vuln/detail/CVE-2024-39502), [CVE-2024-39501](https://nvd.nist.gov/vuln/detail/CVE-2024-39501), [CVE-2024-39500](https://nvd.nist.gov/vuln/detail/CVE-2024-39500), [CVE-2024-39499](https://nvd.nist.gov/vuln/detail/CVE-2024-39499), [CVE-2024-40911](https://nvd.nist.gov/vuln/detail/CVE-2024-40911), [CVE-2024-40908](https://nvd.nist.gov/vuln/detail/CVE-2024-40908), [CVE-2024-40905](https://nvd.nist.gov/vuln/detail/CVE-2024-40905), [CVE-2024-40904](https://nvd.nist.gov/vuln/detail/CVE-2024-40904), [CVE-2024-40902](https://nvd.nist.gov/vuln/detail/CVE-2024-40902), [CVE-2024-40901](https://nvd.nist.gov/vuln/detail/CVE-2024-40901), [CVE-2024-39509](https://nvd.nist.gov/vuln/detail/CVE-2024-39509), [CVE-2024-39507](https://nvd.nist.gov/vuln/detail/CVE-2024-39507), [CVE-2024-39506](https://nvd.nist.gov/vuln/detail/CVE-2024-39506), [CVE-2024-39505](https://nvd.nist.gov/vuln/detail/CVE-2024-39505), [CVE-2024-39495](https://nvd.nist.gov/vuln/detail/CVE-2024-39495), [CVE-2024-42247](https://nvd.nist.gov/vuln/detail/CVE-2024-42247), [CVE-2024-42244](https://nvd.nist.gov/vuln/detail/CVE-2024-42244), [CVE-2024-42232](https://nvd.nist.gov/vuln/detail/CVE-2024-42232), [CVE-2024-42240](https://nvd.nist.gov/vuln/detail/CVE-2024-42240), [CVE-2024-42236](https://nvd.nist.gov/vuln/detail/CVE-2024-42236), [CVE-2024-42145](https://nvd.nist.gov/vuln/detail/CVE-2024-42145), [CVE-2024-42154](https://nvd.nist.gov/vuln/detail/CVE-2024-42154), [CVE-2024-42153](https://nvd.nist.gov/vuln/detail/CVE-2024-42153), [CVE-2024-42152](https://nvd.nist.gov/vuln/detail/CVE-2024-42152), [CVE-2024-42148](https://nvd.nist.gov/vuln/detail/CVE-2024-42148), [CVE-2024-42229](https://nvd.nist.gov/vuln/detail/CVE-2024-42229), [CVE-2024-42225](https://nvd.nist.gov/vuln/detail/CVE-2024-42225), [CVE-2024-42224](https://nvd.nist.gov/vuln/detail/CVE-2024-42224), [CVE-2024-42223](https://nvd.nist.gov/vuln/detail/CVE-2024-42223), [CVE-2024-42161](https://nvd.nist.gov/vuln/detail/CVE-2024-42161), [CVE-2024-42157](https://nvd.nist.gov/vuln/detail/CVE-2024-42157), [CVE-2024-42119](https://nvd.nist.gov/vuln/detail/CVE-2024-42119), [CVE-2024-42116](https://nvd.nist.gov/vuln/detail/CVE-2024-42116), [CVE-2024-42115](https://nvd.nist.gov/vuln/detail/CVE-2024-42115), [CVE-2024-42143](https://nvd.nist.gov/vuln/detail/CVE-2024-42143), [CVE-2024-42140](https://nvd.nist.gov/vuln/detail/CVE-2024-42140), [CVE-2024-42137](https://nvd.nist.gov/vuln/detail/CVE-2024-42137), [CVE-2024-42131](https://nvd.nist.gov/vuln/detail/CVE-2024-42131), [CVE-2024-42130](https://nvd.nist.gov/vuln/detail/CVE-2024-42130), [CVE-2024-42127](https://nvd.nist.gov/vuln/detail/CVE-2024-42127), [CVE-2024-42124](https://nvd.nist.gov/vuln/detail/CVE-2024-42124), [CVE-2024-42121](https://nvd.nist.gov/vuln/detail/CVE-2024-42121), [CVE-2024-42120](https://nvd.nist.gov/vuln/detail/CVE-2024-42120), [CVE-2024-42106](https://nvd.nist.gov/vuln/detail/CVE-2024-42106), [CVE-2024-42105](https://nvd.nist.gov/vuln/detail/CVE-2024-42105), [CVE-2024-42104](https://nvd.nist.gov/vuln/detail/CVE-2024-42104), [CVE-2024-42103](https://nvd.nist.gov/vuln/detail/CVE-2024-42103), [CVE-2024-42102](https://nvd.nist.gov/vuln/detail/CVE-2024-42102), [CVE-2024-42101](https://nvd.nist.gov/vuln/detail/CVE-2024-42101), [CVE-2024-42109](https://nvd.nist.gov/vuln/detail/CVE-2024-42109), [CVE-2024-41055](https://nvd.nist.gov/vuln/detail/CVE-2024-41055), [CVE-2024-41027](https://nvd.nist.gov/vuln/detail/CVE-2024-41027), [CVE-2024-41049](https://nvd.nist.gov/vuln/detail/CVE-2024-41049), [CVE-2024-41048](https://nvd.nist.gov/vuln/detail/CVE-2024-41048), [CVE-2024-41047](https://nvd.nist.gov/vuln/detail/CVE-2024-41047), [CVE-2024-41046](https://nvd.nist.gov/vuln/detail/CVE-2024-41046), [CVE-2024-41044](https://nvd.nist.gov/vuln/detail/CVE-2024-41044), [CVE-2024-41041](https://nvd.nist.gov/vuln/detail/CVE-2024-41041), [CVE-2024-41040](https://nvd.nist.gov/vuln/detail/CVE-2024-41040), [CVE-2024-41035](https://nvd.nist.gov/vuln/detail/CVE-2024-41035), [CVE-2024-41034](https://nvd.nist.gov/vuln/detail/CVE-2024-41034), [CVE-2024-41081](https://nvd.nist.gov/vuln/detail/CVE-2024-41081), [CVE-2024-41078](https://nvd.nist.gov/vuln/detail/CVE-2024-41078), [CVE-2024-41073](https://nvd.nist.gov/vuln/detail/CVE-2024-41073), [CVE-2024-41072](https://nvd.nist.gov/vuln/detail/CVE-2024-41072), [CVE-2024-41070](https://nvd.nist.gov/vuln/detail/CVE-2024-41070), [CVE-2024-41077](https://nvd.nist.gov/vuln/detail/CVE-2024-41077), [CVE-2024-41068](https://nvd.nist.gov/vuln/detail/CVE-2024-41068), [CVE-2024-41065](https://nvd.nist.gov/vuln/detail/CVE-2024-41065), [CVE-2024-41064](https://nvd.nist.gov/vuln/detail/CVE-2024-41064), [CVE-2024-41063](https://nvd.nist.gov/vuln/detail/CVE-2024-41063), [CVE-2024-41060](https://nvd.nist.gov/vuln/detail/CVE-2024-41060), [CVE-2024-41059](https://nvd.nist.gov/vuln/detail/CVE-2024-41059), [CVE-2024-41022](https://nvd.nist.gov/vuln/detail/CVE-2024-41022), [CVE-2024-41020](https://nvd.nist.gov/vuln/detail/CVE-2024-41020), [CVE-2024-41019](https://nvd.nist.gov/vuln/detail/CVE-2024-41019), [CVE-2024-41017](https://nvd.nist.gov/vuln/detail/CVE-2024-41017), [CVE-2024-41015](https://nvd.nist.gov/vuln/detail/CVE-2024-41015), [CVE-2024-41090](https://nvd.nist.gov/vuln/detail/CVE-2024-41090), [CVE-2024-41091](https://nvd.nist.gov/vuln/detail/CVE-2024-41091), [CVE-2024-44971](https://nvd.nist.gov/vuln/detail/CVE-2024-44971), [CVE-2024-44969](https://nvd.nist.gov/vuln/detail/CVE-2024-44969), [CVE-2024-44966](https://nvd.nist.gov/vuln/detail/CVE-2024-44966), [CVE-2024-44954](https://nvd.nist.gov/vuln/detail/CVE-2024-44954), [CVE-2024-44952](https://nvd.nist.gov/vuln/detail/CVE-2024-44952), [CVE-2024-44965](https://nvd.nist.gov/vuln/detail/CVE-2024-44965), [CVE-2024-44960](https://nvd.nist.gov/vuln/detail/CVE-2024-44960), [CVE-2024-44958](https://nvd.nist.gov/vuln/detail/CVE-2024-44958), [CVE-2024-44948](https://nvd.nist.gov/vuln/detail/CVE-2024-44948), [CVE-2024-44944](https://nvd.nist.gov/vuln/detail/CVE-2024-44944), [CVE-2024-43908](https://nvd.nist.gov/vuln/detail/CVE-2024-43908), [CVE-2024-43914](https://nvd.nist.gov/vuln/detail/CVE-2024-43914), [CVE-2024-44935](https://nvd.nist.gov/vuln/detail/CVE-2024-44935), [CVE-2024-44934](https://nvd.nist.gov/vuln/detail/CVE-2024-44934), [CVE-2024-43909](https://nvd.nist.gov/vuln/detail/CVE-2024-43909), [CVE-2024-43902](https://nvd.nist.gov/vuln/detail/CVE-2024-43902), [CVE-2024-43907](https://nvd.nist.gov/vuln/detail/CVE-2024-43907), [CVE-2024-43894](https://nvd.nist.gov/vuln/detail/CVE-2024-43894), [CVE-2024-43893](https://nvd.nist.gov/vuln/detail/CVE-2024-43893), [CVE-2024-43890](https://nvd.nist.gov/vuln/detail/CVE-2024-43890), [CVE-2024-43889](https://nvd.nist.gov/vuln/detail/CVE-2024-43889), [CVE-2024-43883](https://nvd.nist.gov/vuln/detail/CVE-2024-43883), [CVE-2024-43882](https://nvd.nist.gov/vuln/detail/CVE-2024-43882), [CVE-2024-43875](https://nvd.nist.gov/vuln/detail/CVE-2024-43875), [CVE-2024-43873](https://nvd.nist.gov/vuln/detail/CVE-2024-43873), [CVE-2024-43871](https://nvd.nist.gov/vuln/detail/CVE-2024-43871), [CVE-2024-43880](https://nvd.nist.gov/vuln/detail/CVE-2024-43880), [CVE-2024-43879](https://nvd.nist.gov/vuln/detail/CVE-2024-43879), [CVE-2024-43869](https://nvd.nist.gov/vuln/detail/CVE-2024-43869), [CVE-2024-43870](https://nvd.nist.gov/vuln/detail/CVE-2024-43870), [CVE-2024-43867](https://nvd.nist.gov/vuln/detail/CVE-2024-43867), [CVE-2024-43863](https://nvd.nist.gov/vuln/detail/CVE-2024-43863), [CVE-2024-43861](https://nvd.nist.gov/vuln/detail/CVE-2024-43861), [CVE-2023-52918](https://nvd.nist.gov/vuln/detail/CVE-2023-52918), [CVE-2024-46707](https://nvd.nist.gov/vuln/detail/CVE-2024-46707), [CVE-2024-46702](https://nvd.nist.gov/vuln/detail/CVE-2024-46702), [CVE-2024-46679](https://nvd.nist.gov/vuln/detail/CVE-2024-46679), [CVE-2024-46677](https://nvd.nist.gov/vuln/detail/CVE-2024-46677), [CVE-2024-46676](https://nvd.nist.gov/vuln/detail/CVE-2024-46676), [CVE-2024-46675](https://nvd.nist.gov/vuln/detail/CVE-2024-46675), [CVE-2024-46689](https://nvd.nist.gov/vuln/detail/CVE-2024-46689), [CVE-2024-46685](https://nvd.nist.gov/vuln/detail/CVE-2024-46685), [CVE-2024-46673](https://nvd.nist.gov/vuln/detail/CVE-2024-46673), [CVE-2024-46674](https://nvd.nist.gov/vuln/detail/CVE-2024-46674), [CVE-2024-45026](https://nvd.nist.gov/vuln/detail/CVE-2024-45026), [CVE-2024-45028](https://nvd.nist.gov/vuln/detail/CVE-2024-45028), [CVE-2024-45018](https://nvd.nist.gov/vuln/detail/CVE-2024-45018), [CVE-2024-45016](https://nvd.nist.gov/vuln/detail/CVE-2024-45016), [CVE-2024-45011](https://nvd.nist.gov/vuln/detail/CVE-2024-45011), [CVE-2024-45025](https://nvd.nist.gov/vuln/detail/CVE-2024-45025), [CVE-2024-45021](https://nvd.nist.gov/vuln/detail/CVE-2024-45021), [CVE-2024-44999](https://nvd.nist.gov/vuln/detail/CVE-2024-44999), [CVE-2024-44998](https://nvd.nist.gov/vuln/detail/CVE-2024-44998), [CVE-2024-44995](https://nvd.nist.gov/vuln/detail/CVE-2024-44995), [CVE-2024-45008](https://nvd.nist.gov/vuln/detail/CVE-2024-45008), [CVE-2024-45007](https://nvd.nist.gov/vuln/detail/CVE-2024-45007), [CVE-2024-45006](https://nvd.nist.gov/vuln/detail/CVE-2024-45006), [CVE-2024-45003](https://nvd.nist.gov/vuln/detail/CVE-2024-45003), [CVE-2024-44983](https://nvd.nist.gov/vuln/detail/CVE-2024-44983), [CVE-2024-44982](https://nvd.nist.gov/vuln/detail/CVE-2024-44982), [CVE-2024-44990](https://nvd.nist.gov/vuln/detail/CVE-2024-44990), [CVE-2024-44989](https://nvd.nist.gov/vuln/detail/CVE-2024-44989), [CVE-2024-44988](https://nvd.nist.gov/vuln/detail/CVE-2024-44988), [CVE-2024-44987](https://nvd.nist.gov/vuln/detail/CVE-2024-44987), [CVE-2024-44986](https://nvd.nist.gov/vuln/detail/CVE-2024-44986), [CVE-2024-44985](https://nvd.nist.gov/vuln/detail/CVE-2024-44985), [CVE-2024-47669](https://nvd.nist.gov/vuln/detail/CVE-2024-47669), [CVE-2024-47668](https://nvd.nist.gov/vuln/detail/CVE-2024-47668), [CVE-2024-47667](https://nvd.nist.gov/vuln/detail/CVE-2024-47667), [CVE-2024-47665](https://nvd.nist.gov/vuln/detail/CVE-2024-47665), [CVE-2024-47663](https://nvd.nist.gov/vuln/detail/CVE-2024-47663), [CVE-2024-47660](https://nvd.nist.gov/vuln/detail/CVE-2024-47660), [CVE-2024-47659](https://nvd.nist.gov/vuln/detail/CVE-2024-47659), [CVE-2024-46840](https://nvd.nist.gov/vuln/detail/CVE-2024-46840), [CVE-2024-46839](https://nvd.nist.gov/vuln/detail/CVE-2024-46839), [CVE-2024-46844](https://nvd.nist.gov/vuln/detail/CVE-2024-46844), [CVE-2024-46832](https://nvd.nist.gov/vuln/detail/CVE-2024-46832), [CVE-2024-46829](https://nvd.nist.gov/vuln/detail/CVE-2024-46829), [CVE-2024-46828](https://nvd.nist.gov/vuln/detail/CVE-2024-46828), [CVE-2024-46822](https://nvd.nist.gov/vuln/detail/CVE-2024-46822), [CVE-2024-46810](https://nvd.nist.gov/vuln/detail/CVE-2024-46810), [CVE-2024-46807](https://nvd.nist.gov/vuln/detail/CVE-2024-46807), [CVE-2024-46805](https://nvd.nist.gov/vuln/detail/CVE-2024-46805), [CVE-2024-46804](https://nvd.nist.gov/vuln/detail/CVE-2024-46804), [CVE-2024-46819](https://nvd.nist.gov/vuln/detail/CVE-2024-46819), [CVE-2024-46818](https://nvd.nist.gov/vuln/detail/CVE-2024-46818), [CVE-2024-46817](https://nvd.nist.gov/vuln/detail/CVE-2024-46817), [CVE-2024-46815](https://nvd.nist.gov/vuln/detail/CVE-2024-46815), [CVE-2024-46814](https://nvd.nist.gov/vuln/detail/CVE-2024-46814), [CVE-2024-46795](https://nvd.nist.gov/vuln/detail/CVE-2024-46795), [CVE-2024-46791](https://nvd.nist.gov/vuln/detail/CVE-2024-46791), [CVE-2024-46800](https://nvd.nist.gov/vuln/detail/CVE-2024-46800), [CVE-2024-46798](https://nvd.nist.gov/vuln/detail/CVE-2024-46798), [CVE-2024-46763](https://nvd.nist.gov/vuln/detail/CVE-2024-46763), [CVE-2024-46783](https://nvd.nist.gov/vuln/detail/CVE-2024-46783), [CVE-2024-46782](https://nvd.nist.gov/vuln/detail/CVE-2024-46782), [CVE-2024-46781](https://nvd.nist.gov/vuln/detail/CVE-2024-46781), [CVE-2024-46780](https://nvd.nist.gov/vuln/detail/CVE-2024-46780), [CVE-2024-46777](https://nvd.nist.gov/vuln/detail/CVE-2024-46777), [CVE-2024-46771](https://nvd.nist.gov/vuln/detail/CVE-2024-46771), [CVE-2024-46761](https://nvd.nist.gov/vuln/detail/CVE-2024-46761), [CVE-2024-46743](https://nvd.nist.gov/vuln/detail/CVE-2024-46743), [CVE-2024-46740](https://nvd.nist.gov/vuln/detail/CVE-2024-46740), [CVE-2024-46739](https://nvd.nist.gov/vuln/detail/CVE-2024-46739), [CVE-2024-46738](https://nvd.nist.gov/vuln/detail/CVE-2024-46738), [CVE-2024-46737](https://nvd.nist.gov/vuln/detail/CVE-2024-46737), [CVE-2024-46759](https://nvd.nist.gov/vuln/detail/CVE-2024-46759), [CVE-2024-46758](https://nvd.nist.gov/vuln/detail/CVE-2024-46758), [CVE-2024-46757](https://nvd.nist.gov/vuln/detail/CVE-2024-46757), [CVE-2024-46756](https://nvd.nist.gov/vuln/detail/CVE-2024-46756), [CVE-2024-46755](https://nvd.nist.gov/vuln/detail/CVE-2024-46755), [CVE-2024-46752](https://nvd.nist.gov/vuln/detail/CVE-2024-46752), [CVE-2024-46750](https://nvd.nist.gov/vuln/detail/CVE-2024-46750), [CVE-2024-46747](https://nvd.nist.gov/vuln/detail/CVE-2024-46747), [CVE-2024-46746](https://nvd.nist.gov/vuln/detail/CVE-2024-46746), [CVE-2024-46745](https://nvd.nist.gov/vuln/detail/CVE-2024-46745), [CVE-2024-46744](https://nvd.nist.gov/vuln/detail/CVE-2024-46744), [CVE-2024-46734](https://nvd.nist.gov/vuln/detail/CVE-2024-46734), [CVE-2024-46724](https://nvd.nist.gov/vuln/detail/CVE-2024-46724), [CVE-2024-46732](https://nvd.nist.gov/vuln/detail/CVE-2024-46732), [CVE-2024-46731](https://nvd.nist.gov/vuln/detail/CVE-2024-46731), [CVE-2024-46725](https://nvd.nist.gov/vuln/detail/CVE-2024-46725), [CVE-2024-46723](https://nvd.nist.gov/vuln/detail/CVE-2024-46723), [CVE-2024-46722](https://nvd.nist.gov/vuln/detail/CVE-2024-46722), [CVE-2024-46721](https://nvd.nist.gov/vuln/detail/CVE-2024-46721), [CVE-2024-46719](https://nvd.nist.gov/vuln/detail/CVE-2024-46719), [CVE-2024-46714](https://nvd.nist.gov/vuln/detail/CVE-2024-46714), [CVE-2024-46713](https://nvd.nist.gov/vuln/detail/CVE-2024-46713), [CVE-2024-50191](https://nvd.nist.gov/vuln/detail/CVE-2024-50191), [CVE-2024-50189](https://nvd.nist.gov/vuln/detail/CVE-2024-50189), [CVE-2024-50188](https://nvd.nist.gov/vuln/detail/CVE-2024-50188), [CVE-2024-50186](https://nvd.nist.gov/vuln/detail/CVE-2024-50186), [CVE-2024-50184](https://nvd.nist.gov/vuln/detail/CVE-2024-50184), [CVE-2024-50180](https://nvd.nist.gov/vuln/detail/CVE-2024-50180), [CVE-2024-50181](https://nvd.nist.gov/vuln/detail/CVE-2024-50181), [CVE-2024-50179](https://nvd.nist.gov/vuln/detail/CVE-2024-50179), [CVE-2024-50096](https://nvd.nist.gov/vuln/detail/CVE-2024-50096), [CVE-2024-50095](https://nvd.nist.gov/vuln/detail/CVE-2024-50095), [CVE-2024-50093](https://nvd.nist.gov/vuln/detail/CVE-2024-50093), [CVE-2024-50089](https://nvd.nist.gov/vuln/detail/CVE-2024-50089), [CVE-2024-50062](https://nvd.nist.gov/vuln/detail/CVE-2024-50062), [CVE-2024-50059](https://nvd.nist.gov/vuln/detail/CVE-2024-50059), [CVE-2024-50024](https://nvd.nist.gov/vuln/detail/CVE-2024-50024), [CVE-2024-50049](https://nvd.nist.gov/vuln/detail/CVE-2024-50049), [CVE-2024-50046](https://nvd.nist.gov/vuln/detail/CVE-2024-50046), [CVE-2024-50045](https://nvd.nist.gov/vuln/detail/CVE-2024-50045), [CVE-2024-50044](https://nvd.nist.gov/vuln/detail/CVE-2024-50044), [CVE-2024-50041](https://nvd.nist.gov/vuln/detail/CVE-2024-50041), [CVE-2024-50040](https://nvd.nist.gov/vuln/detail/CVE-2024-50040), [CVE-2024-50039](https://nvd.nist.gov/vuln/detail/CVE-2024-50039), [CVE-2024-50038](https://nvd.nist.gov/vuln/detail/CVE-2024-50038), [CVE-2024-50035](https://nvd.nist.gov/vuln/detail/CVE-2024-50035), [CVE-2024-50033](https://nvd.nist.gov/vuln/detail/CVE-2024-50033), [CVE-2024-50031](https://nvd.nist.gov/vuln/detail/CVE-2024-50031), [CVE-2024-50019](https://nvd.nist.gov/vuln/detail/CVE-2024-50019), [CVE-2024-50008](https://nvd.nist.gov/vuln/detail/CVE-2024-50008), [CVE-2024-50007](https://nvd.nist.gov/vuln/detail/CVE-2024-50007), [CVE-2024-50006](https://nvd.nist.gov/vuln/detail/CVE-2024-50006), [CVE-2024-50015](https://nvd.nist.gov/vuln/detail/CVE-2024-50015), [CVE-2024-50013](https://nvd.nist.gov/vuln/detail/CVE-2024-50013), [CVE-2024-50003](https://nvd.nist.gov/vuln/detail/CVE-2024-50003), [CVE-2024-50002](https://nvd.nist.gov/vuln/detail/CVE-2024-50002), [CVE-2024-50001](https://nvd.nist.gov/vuln/detail/CVE-2024-50001), [CVE-2024-50000](https://nvd.nist.gov/vuln/detail/CVE-2024-50000), [CVE-2024-49997](https://nvd.nist.gov/vuln/detail/CVE-2024-49997), [CVE-2024-49995](https://nvd.nist.gov/vuln/detail/CVE-2024-49995), [CVE-2024-49955](https://nvd.nist.gov/vuln/detail/CVE-2024-49955), [CVE-2024-49963](https://nvd.nist.gov/vuln/detail/CVE-2024-49963), [CVE-2024-49962](https://nvd.nist.gov/vuln/detail/CVE-2024-49962), [CVE-2024-49959](https://nvd.nist.gov/vuln/detail/CVE-2024-49959), [CVE-2024-49993](https://nvd.nist.gov/vuln/detail/CVE-2024-49993), [CVE-2024-49985](https://nvd.nist.gov/vuln/detail/CVE-2024-49985), [CVE-2024-49958](https://nvd.nist.gov/vuln/detail/CVE-2024-49958), [CVE-2024-49983](https://nvd.nist.gov/vuln/detail/CVE-2024-49983), [CVE-2024-49982](https://nvd.nist.gov/vuln/detail/CVE-2024-49982), [CVE-2024-49981](https://nvd.nist.gov/vuln/detail/CVE-2024-49981), [CVE-2024-49977](https://nvd.nist.gov/vuln/detail/CVE-2024-49977), [CVE-2024-49975](https://nvd.nist.gov/vuln/detail/CVE-2024-49975), [CVE-2024-49957](https://nvd.nist.gov/vuln/detail/CVE-2024-49957), [CVE-2024-49973](https://nvd.nist.gov/vuln/detail/CVE-2024-49973), [CVE-2024-49969](https://nvd.nist.gov/vuln/detail/CVE-2024-49969), [CVE-2024-49967](https://nvd.nist.gov/vuln/detail/CVE-2024-49967), [CVE-2024-49966](https://nvd.nist.gov/vuln/detail/CVE-2024-49966), [CVE-2024-49965](https://nvd.nist.gov/vuln/detail/CVE-2024-49965), [CVE-2024-49924](https://nvd.nist.gov/vuln/detail/CVE-2024-49924), [CVE-2024-49954](https://nvd.nist.gov/vuln/detail/CVE-2024-49954), [CVE-2024-49952](https://nvd.nist.gov/vuln/detail/CVE-2024-49952), [CVE-2024-49949](https://nvd.nist.gov/vuln/detail/CVE-2024-49949), [CVE-2024-49948](https://nvd.nist.gov/vuln/detail/CVE-2024-49948), [CVE-2024-49946](https://nvd.nist.gov/vuln/detail/CVE-2024-49946), [CVE-2024-49944](https://nvd.nist.gov/vuln/detail/CVE-2024-49944), [CVE-2024-49938](https://nvd.nist.gov/vuln/detail/CVE-2024-49938), [CVE-2024-49936](https://nvd.nist.gov/vuln/detail/CVE-2024-49936), [CVE-2024-49935](https://nvd.nist.gov/vuln/detail/CVE-2024-49935), [CVE-2024-49933](https://nvd.nist.gov/vuln/detail/CVE-2024-49933), [CVE-2024-49930](https://nvd.nist.gov/vuln/detail/CVE-2024-49930), [CVE-2024-49927](https://nvd.nist.gov/vuln/detail/CVE-2024-49927), [CVE-2024-49875](https://nvd.nist.gov/vuln/detail/CVE-2024-49875), [CVE-2024-49884](https://nvd.nist.gov/vuln/detail/CVE-2024-49884), [CVE-2024-49883](https://nvd.nist.gov/vuln/detail/CVE-2024-49883), [CVE-2024-49882](https://nvd.nist.gov/vuln/detail/CVE-2024-49882), [CVE-2024-49881](https://nvd.nist.gov/vuln/detail/CVE-2024-49881), [CVE-2024-49879](https://nvd.nist.gov/vuln/detail/CVE-2024-49879), [CVE-2024-49913](https://nvd.nist.gov/vuln/detail/CVE-2024-49913), [CVE-2024-49907](https://nvd.nist.gov/vuln/detail/CVE-2024-49907), [CVE-2024-49878](https://nvd.nist.gov/vuln/detail/CVE-2024-49878), [CVE-2024-49903](https://nvd.nist.gov/vuln/detail/CVE-2024-49903), [CVE-2024-49902](https://nvd.nist.gov/vuln/detail/CVE-2024-49902), [CVE-2024-49900](https://nvd.nist.gov/vuln/detail/CVE-2024-49900), [CVE-2024-49896](https://nvd.nist.gov/vuln/detail/CVE-2024-49896), [CVE-2024-49895](https://nvd.nist.gov/vuln/detail/CVE-2024-49895), [CVE-2024-49877](https://nvd.nist.gov/vuln/detail/CVE-2024-49877), [CVE-2024-49894](https://nvd.nist.gov/vuln/detail/CVE-2024-49894), [CVE-2024-49892](https://nvd.nist.gov/vuln/detail/CVE-2024-49892), [CVE-2024-49890](https://nvd.nist.gov/vuln/detail/CVE-2024-49890), [CVE-2024-49889](https://nvd.nist.gov/vuln/detail/CVE-2024-49889), [CVE-2024-49886](https://nvd.nist.gov/vuln/detail/CVE-2024-49886), [CVE-2024-49863](https://nvd.nist.gov/vuln/detail/CVE-2024-49863), [CVE-2024-49871](https://nvd.nist.gov/vuln/detail/CVE-2024-49871), [CVE-2024-49868](https://nvd.nist.gov/vuln/detail/CVE-2024-49868), [CVE-2024-49867](https://nvd.nist.gov/vuln/detail/CVE-2024-49867), [CVE-2024-49866](https://nvd.nist.gov/vuln/detail/CVE-2024-49866), [CVE-2024-49860](https://nvd.nist.gov/vuln/detail/CVE-2024-49860), [CVE-2024-49858](https://nvd.nist.gov/vuln/detail/CVE-2024-49858), [CVE-2024-49856](https://nvd.nist.gov/vuln/detail/CVE-2024-49856), [CVE-2024-49852](https://nvd.nist.gov/vuln/detail/CVE-2024-49852), [CVE-2024-49851](https://nvd.nist.gov/vuln/detail/CVE-2024-49851), [CVE-2024-47735](https://nvd.nist.gov/vuln/detail/CVE-2024-47735), [CVE-2024-47734](https://nvd.nist.gov/vuln/detail/CVE-2024-47734), [CVE-2024-47757](https://nvd.nist.gov/vuln/detail/CVE-2024-47757), [CVE-2024-47756](https://nvd.nist.gov/vuln/detail/CVE-2024-47756), [CVE-2024-47749](https://nvd.nist.gov/vuln/detail/CVE-2024-47749), [CVE-2024-47748](https://nvd.nist.gov/vuln/detail/CVE-2024-47748), [CVE-2024-47747](https://nvd.nist.gov/vuln/detail/CVE-2024-47747), [CVE-2024-47742](https://nvd.nist.gov/vuln/detail/CVE-2024-47742), [CVE-2024-47740](https://nvd.nist.gov/vuln/detail/CVE-2024-47740), [CVE-2024-47739](https://nvd.nist.gov/vuln/detail/CVE-2024-47739), [CVE-2024-47737](https://nvd.nist.gov/vuln/detail/CVE-2024-47737), [CVE-2024-47723](https://nvd.nist.gov/vuln/detail/CVE-2024-47723), [CVE-2023-52917](https://nvd.nist.gov/vuln/detail/CVE-2023-52917), [CVE-2024-47722](https://nvd.nist.gov/vuln/detail/CVE-2024-47722), [CVE-2024-47712](https://nvd.nist.gov/vuln/detail/CVE-2024-47712), [CVE-2024-47710](https://nvd.nist.gov/vuln/detail/CVE-2024-47710), [CVE-2024-47709](https://nvd.nist.gov/vuln/detail/CVE-2024-47709), [CVE-2024-47706](https://nvd.nist.gov/vuln/detail/CVE-2024-47706), [CVE-2024-47705](https://nvd.nist.gov/vuln/detail/CVE-2024-47705), [CVE-2024-47720](https://nvd.nist.gov/vuln/detail/CVE-2024-47720), [CVE-2024-47718](https://nvd.nist.gov/vuln/detail/CVE-2024-47718), [CVE-2024-47713](https://nvd.nist.gov/vuln/detail/CVE-2024-47713), [CVE-2024-47684](https://nvd.nist.gov/vuln/detail/CVE-2024-47684), [CVE-2024-47679](https://nvd.nist.gov/vuln/detail/CVE-2024-47679), [CVE-2024-47701](https://nvd.nist.gov/vuln/detail/CVE-2024-47701), [CVE-2024-47699](https://nvd.nist.gov/vuln/detail/CVE-2024-47699), [CVE-2024-47698](https://nvd.nist.gov/vuln/detail/CVE-2024-47698), [CVE-2024-47697](https://nvd.nist.gov/vuln/detail/CVE-2024-47697), [CVE-2024-47696](https://nvd.nist.gov/vuln/detail/CVE-2024-47696), [CVE-2024-47695](https://nvd.nist.gov/vuln/detail/CVE-2024-47695), [CVE-2024-47693](https://nvd.nist.gov/vuln/detail/CVE-2024-47693), [CVE-2024-47692](https://nvd.nist.gov/vuln/detail/CVE-2024-47692), [CVE-2024-47690](https://nvd.nist.gov/vuln/detail/CVE-2024-47690), [CVE-2024-47685](https://nvd.nist.gov/vuln/detail/CVE-2024-47685), [CVE-2024-50201](https://nvd.nist.gov/vuln/detail/CVE-2024-50201), [CVE-2024-50202](https://nvd.nist.gov/vuln/detail/CVE-2024-50202), [CVE-2024-50185](https://nvd.nist.gov/vuln/detail/CVE-2024-50185), [CVE-2024-50182](https://nvd.nist.gov/vuln/detail/CVE-2024-50182), [CVE-2024-50101](https://nvd.nist.gov/vuln/detail/CVE-2024-50101), [CVE-2024-50099](https://nvd.nist.gov/vuln/detail/CVE-2024-50099), [CVE-2024-50085](https://nvd.nist.gov/vuln/detail/CVE-2024-50085), [CVE-2024-50083](https://nvd.nist.gov/vuln/detail/CVE-2024-50083), [CVE-2024-50082](https://nvd.nist.gov/vuln/detail/CVE-2024-50082), [CVE-2024-50074](https://nvd.nist.gov/vuln/detail/CVE-2024-50074), [CVE-2024-50210](https://nvd.nist.gov/vuln/detail/CVE-2024-50210), [CVE-2024-50209](https://nvd.nist.gov/vuln/detail/CVE-2024-50209), [CVE-2024-50208](https://nvd.nist.gov/vuln/detail/CVE-2024-50208), [CVE-2024-50205](https://nvd.nist.gov/vuln/detail/CVE-2024-50205), [CVE-2024-50163](https://nvd.nist.gov/vuln/detail/CVE-2024-50163), [CVE-2024-50162](https://nvd.nist.gov/vuln/detail/CVE-2024-50162), [CVE-2024-50160](https://nvd.nist.gov/vuln/detail/CVE-2024-50160), [CVE-2024-50171](https://nvd.nist.gov/vuln/detail/CVE-2024-50171), [CVE-2024-50168](https://nvd.nist.gov/vuln/detail/CVE-2024-50168), [CVE-2024-50167](https://nvd.nist.gov/vuln/detail/CVE-2024-50167), [CVE-2024-50156](https://nvd.nist.gov/vuln/detail/CVE-2024-50156), [CVE-2024-50148](https://nvd.nist.gov/vuln/detail/CVE-2024-50148), [CVE-2024-50143](https://nvd.nist.gov/vuln/detail/CVE-2024-50143), [CVE-2024-50142](https://nvd.nist.gov/vuln/detail/CVE-2024-50142), [CVE-2024-50154](https://nvd.nist.gov/vuln/detail/CVE-2024-50154), [CVE-2024-50153](https://nvd.nist.gov/vuln/detail/CVE-2024-50153), [CVE-2024-50151](https://nvd.nist.gov/vuln/detail/CVE-2024-50151), [CVE-2024-50150](https://nvd.nist.gov/vuln/detail/CVE-2024-50150), [CVE-2024-50128](https://nvd.nist.gov/vuln/detail/CVE-2024-50128), [CVE-2024-50134](https://nvd.nist.gov/vuln/detail/CVE-2024-50134), [CVE-2024-50131](https://nvd.nist.gov/vuln/detail/CVE-2024-50131), [CVE-2024-50110](https://nvd.nist.gov/vuln/detail/CVE-2024-50110), [CVE-2024-50127](https://nvd.nist.gov/vuln/detail/CVE-2024-50127), [CVE-2024-50117](https://nvd.nist.gov/vuln/detail/CVE-2024-50117), [CVE-2024-50116](https://nvd.nist.gov/vuln/detail/CVE-2024-50116), [CVE-2024-50115](https://nvd.nist.gov/vuln/detail/CVE-2024-50115), [CVE-2024-50103](https://nvd.nist.gov/vuln/detail/CVE-2024-50103), [CVE-2024-53042](https://nvd.nist.gov/vuln/detail/CVE-2024-53042), [CVE-2024-53059](https://nvd.nist.gov/vuln/detail/CVE-2024-53059), [CVE-2024-53057](https://nvd.nist.gov/vuln/detail/CVE-2024-53057), [CVE-2024-53058](https://nvd.nist.gov/vuln/detail/CVE-2024-53058), [CVE-2024-53055](https://nvd.nist.gov/vuln/detail/CVE-2024-53055), [CVE-2024-50262](https://nvd.nist.gov/vuln/detail/CVE-2024-50262), [CVE-2024-50259](https://nvd.nist.gov/vuln/detail/CVE-2024-50259), [CVE-2024-50234](https://nvd.nist.gov/vuln/detail/CVE-2024-50234), [CVE-2024-50233](https://nvd.nist.gov/vuln/detail/CVE-2024-50233), [CVE-2024-50232](https://nvd.nist.gov/vuln/detail/CVE-2024-50232), [CVE-2024-50230](https://nvd.nist.gov/vuln/detail/CVE-2024-50230), [CVE-2024-50257](https://nvd.nist.gov/vuln/detail/CVE-2024-50257), [CVE-2024-50229](https://nvd.nist.gov/vuln/detail/CVE-2024-50229), [CVE-2024-50251](https://nvd.nist.gov/vuln/detail/CVE-2024-50251), [CVE-2024-50249](https://nvd.nist.gov/vuln/detail/CVE-2024-50249), [CVE-2024-50247](https://nvd.nist.gov/vuln/detail/CVE-2024-50247), [CVE-2024-50228](https://nvd.nist.gov/vuln/detail/CVE-2024-50228), [CVE-2024-50245](https://nvd.nist.gov/vuln/detail/CVE-2024-50245), [CVE-2024-50244](https://nvd.nist.gov/vuln/detail/CVE-2024-50244), [CVE-2024-50237](https://nvd.nist.gov/vuln/detail/CVE-2024-50237), [CVE-2024-50236](https://nvd.nist.gov/vuln/detail/CVE-2024-50236), [CVE-2024-50219](https://nvd.nist.gov/vuln/detail/CVE-2024-50219), [CVE-2024-50218](https://nvd.nist.gov/vuln/detail/CVE-2024-50218), [CVE-2024-53103](https://nvd.nist.gov/vuln/detail/CVE-2024-53103), [CVE-2024-53104](https://nvd.nist.gov/vuln/detail/CVE-2024-53104), [CVE-2024-53088](https://nvd.nist.gov/vuln/detail/CVE-2024-53088), [CVE-2024-53060](https://nvd.nist.gov/vuln/detail/CVE-2024-53060), [CVE-2024-53066](https://nvd.nist.gov/vuln/detail/CVE-2024-53066), [CVE-2024-53063](https://nvd.nist.gov/vuln/detail/CVE-2024-53063), [CVE-2024-53070](https://nvd.nist.gov/vuln/detail/CVE-2024-53070), [CVE-2024-53061](https://nvd.nist.gov/vuln/detail/CVE-2024-53061), [CVE-2024-53052](https://nvd.nist.gov/vuln/detail/CVE-2024-53052), [CVE-2024-50302](https://nvd.nist.gov/vuln/detail/CVE-2024-50302), [CVE-2024-50301](https://nvd.nist.gov/vuln/detail/CVE-2024-50301), [CVE-2024-50296](https://nvd.nist.gov/vuln/detail/CVE-2024-50296), [CVE-2024-50295](https://nvd.nist.gov/vuln/detail/CVE-2024-50295), [CVE-2024-50292](https://nvd.nist.gov/vuln/detail/CVE-2024-50292), [CVE-2024-50290](https://nvd.nist.gov/vuln/detail/CVE-2024-50290), [CVE-2024-50299](https://nvd.nist.gov/vuln/detail/CVE-2024-50299), [CVE-2024-50282](https://nvd.nist.gov/vuln/detail/CVE-2024-50282), [CVE-2024-50279](https://nvd.nist.gov/vuln/detail/CVE-2024-50279), [CVE-2024-50278](https://nvd.nist.gov/vuln/detail/CVE-2024-50278), [CVE-2024-50287](https://nvd.nist.gov/vuln/detail/CVE-2024-50287), [CVE-2024-50273](https://nvd.nist.gov/vuln/detail/CVE-2024-50273), [CVE-2024-50269](https://nvd.nist.gov/vuln/detail/CVE-2024-50269), [CVE-2024-50268](https://nvd.nist.gov/vuln/detail/CVE-2024-50268), [CVE-2024-50267](https://nvd.nist.gov/vuln/detail/CVE-2024-50267), [CVE-2024-50264](https://nvd.nist.gov/vuln/detail/CVE-2024-50264), [CVE-2024-50265](https://nvd.nist.gov/vuln/detail/CVE-2024-50265), [CVE-2024-53101](https://nvd.nist.gov/vuln/detail/CVE-2024-53101), [CVE-2024-53097](https://nvd.nist.gov/vuln/detail/CVE-2024-53097))\n- OpenSSL ([CVE-2024-2511](https://nvd.nist.gov/vuln/detail/CVE-2024-2511), [CVE-2024-4603](https://nvd.nist.gov/vuln/detail/CVE-2024-4603), [CVE-2024-4741](https://nvd.nist.gov/vuln/detail/CVE-2024-4741), [CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535), [CVE-2024-6119](https://nvd.nist.gov/vuln/detail/CVE-2024-6119), [CVE-2024-9143](https://nvd.nist.gov/vuln/detail/CVE-2024-9143))\n\n#### Bug fixes:\n\n- Equinix Metal: fixed race condition on 'mount' Ignition stage ([scripts#2308](https://github.com/flatcar/scripts/pull/2308))\n\n#### Updates:\n\n- Linux ([5.15.173](https://lwn.net/Articles/998452) (includes [5.15.172](https://lwn.net/Articles/998152), [5.15.171](https://lwn.net/Articles/997530), [5.15.170](https://lwn.net/Articles/996691), [5.15.169](https://lwn.net/Articles/995134), [5.15.168](https://lwn.net/Articles/994636), [5.15.167](https://lwn.net/Articles/990047), [5.15.166](https://lwn.net/Articles/988751), [5.15.165](https://lwn.net/Articles/986233), [5.15.164](https://lwn.net/Articles/983657), [5.15.163](https://lwn.net/Articles/982384), [5.15.162](https://lwn.net/Articles/980862)))\n- OpenSSL ([3.0.15](https://github.com/openssl/openssl/blob/openssl-3.0/CHANGES.md#openssl-30))\n- ca-certificates ([3.107](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html) (includes [3.106](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html), [3.105](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html), [3.104](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_104.html), [3.103](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_103.html), [3.102](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102.html), [3.102.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102_1.html), [3.101.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101_1.html)))"
  },
  "3510.3.7": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-03-20 14:08:13 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.179"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": " _Changes since **LTS 3510.3.6**_\n \n #### Security fixes:\n \n - Linux ([CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57838](https://nvd.nist.gov/vuln/detail/CVE-2024-57838), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56780](https://nvd.nist.gov/vuln/detail/CVE-2024-56780), [CVE-2024-56779](https://nvd.nist.gov/vuln/detail/CVE-2024-56779), [CVE-2024-56778](https://nvd.nist.gov/vuln/detail/CVE-2024-56778), [CVE-2024-56777](https://nvd.nist.gov/vuln/detail/CVE-2024-56777), [CVE-2024-56776](https://nvd.nist.gov/vuln/detail/CVE-2024-56776), [CVE-2024-56774](https://nvd.nist.gov/vuln/detail/CVE-2024-56774), [CVE-2024-56754](https://nvd.nist.gov/vuln/detail/CVE-2024-56754), [CVE-2024-56756](https://nvd.nist.gov/vuln/detail/CVE-2024-56756), [CVE-2024-56728](https://nvd.nist.gov/vuln/detail/CVE-2024-56728), [CVE-2024-56726](https://nvd.nist.gov/vuln/detail/CVE-2024-56726), [CVE-2024-56724](https://nvd.nist.gov/vuln/detail/CVE-2024-56724), [CVE-2024-56723](https://nvd.nist.gov/vuln/detail/CVE-2024-56723), [CVE-2024-56748](https://nvd.nist.gov/vuln/detail/CVE-2024-56748), [CVE-2024-56747](https://nvd.nist.gov/vuln/detail/CVE-2024-56747), [CVE-2024-56746](https://nvd.nist.gov/vuln/detail/CVE-2024-56746), [CVE-2024-56745](https://nvd.nist.gov/vuln/detail/CVE-2024-56745), [CVE-2024-56741](https://nvd.nist.gov/vuln/detail/CVE-2024-56741), [CVE-2024-56739](https://nvd.nist.gov/vuln/detail/CVE-2024-56739), [CVE-2024-56720](https://nvd.nist.gov/vuln/detail/CVE-2024-56720), [CVE-2024-56694](https://nvd.nist.gov/vuln/detail/CVE-2024-56694), [CVE-2024-56701](https://nvd.nist.gov/vuln/detail/CVE-2024-56701), [CVE-2024-56700](https://nvd.nist.gov/vuln/detail/CVE-2024-56700), [CVE-2024-56698](https://nvd.nist.gov/vuln/detail/CVE-2024-56698), [CVE-2024-56708](https://nvd.nist.gov/vuln/detail/CVE-2024-56708), [CVE-2024-56705](https://nvd.nist.gov/vuln/detail/CVE-2024-56705), [CVE-2024-56704](https://nvd.nist.gov/vuln/detail/CVE-2024-56704), [CVE-2024-56681](https://nvd.nist.gov/vuln/detail/CVE-2024-56681), [CVE-2024-56679](https://nvd.nist.gov/vuln/detail/CVE-2024-56679), [CVE-2024-56678](https://nvd.nist.gov/vuln/detail/CVE-2024-56678), [CVE-2024-56693](https://nvd.nist.gov/vuln/detail/CVE-2024-56693), [CVE-2024-56691](https://nvd.nist.gov/vuln/detail/CVE-2024-56691), [CVE-2024-56690](https://nvd.nist.gov/vuln/detail/CVE-2024-56690), [CVE-2024-56688](https://nvd.nist.gov/vuln/detail/CVE-2024-56688), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56562](https://nvd.nist.gov/vuln/detail/CVE-2024-56562), [CVE-2024-56581](https://nvd.nist.gov/vuln/detail/CVE-2024-56581), [CVE-2024-56578](https://nvd.nist.gov/vuln/detail/CVE-2024-56578), [CVE-2024-56576](https://nvd.nist.gov/vuln/detail/CVE-2024-56576), [CVE-2024-56558](https://nvd.nist.gov/vuln/detail/CVE-2024-56558), [CVE-2024-56575](https://nvd.nist.gov/vuln/detail/CVE-2024-56575), [CVE-2024-56574](https://nvd.nist.gov/vuln/detail/CVE-2024-56574), [CVE-2024-56572](https://nvd.nist.gov/vuln/detail/CVE-2024-56572), [CVE-2024-56571](https://nvd.nist.gov/vuln/detail/CVE-2024-56571), [CVE-2024-56570](https://nvd.nist.gov/vuln/detail/CVE-2024-56570), [CVE-2024-56569](https://nvd.nist.gov/vuln/detail/CVE-2024-56569), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-56567](https://nvd.nist.gov/vuln/detail/CVE-2024-56567), [CVE-2024-56539](https://nvd.nist.gov/vuln/detail/CVE-2024-56539), [CVE-2024-56533](https://nvd.nist.gov/vuln/detail/CVE-2024-56533), [CVE-2024-56548](https://nvd.nist.gov/vuln/detail/CVE-2024-56548), [CVE-2024-56531](https://nvd.nist.gov/vuln/detail/CVE-2024-56531), [CVE-2024-56532](https://nvd.nist.gov/vuln/detail/CVE-2024-56532), [CVE-2024-53217](https://nvd.nist.gov/vuln/detail/CVE-2024-53217), [CVE-2024-53215](https://nvd.nist.gov/vuln/detail/CVE-2024-53215), [CVE-2024-53239](https://nvd.nist.gov/vuln/detail/CVE-2024-53239), [CVE-2024-53237](https://nvd.nist.gov/vuln/detail/CVE-2024-53237), [CVE-2024-53214](https://nvd.nist.gov/vuln/detail/CVE-2024-53214), [CVE-2024-53227](https://nvd.nist.gov/vuln/detail/CVE-2024-53227), [CVE-2024-53226](https://nvd.nist.gov/vuln/detail/CVE-2024-53226), [CVE-2024-53180](https://nvd.nist.gov/vuln/detail/CVE-2024-53180), [CVE-2024-53184](https://nvd.nist.gov/vuln/detail/CVE-2024-53184), [CVE-2024-53183](https://nvd.nist.gov/vuln/detail/CVE-2024-53183), [CVE-2024-53206](https://nvd.nist.gov/vuln/detail/CVE-2024-53206), [CVE-2024-53198](https://nvd.nist.gov/vuln/detail/CVE-2024-53198), [CVE-2024-53197](https://nvd.nist.gov/vuln/detail/CVE-2024-53197), [CVE-2024-53194](https://nvd.nist.gov/vuln/detail/CVE-2024-53194), [CVE-2024-53181](https://nvd.nist.gov/vuln/detail/CVE-2024-53181), [CVE-2024-53173](https://nvd.nist.gov/vuln/detail/CVE-2024-53173), [CVE-2024-53172](https://nvd.nist.gov/vuln/detail/CVE-2024-53172), [CVE-2024-53171](https://nvd.nist.gov/vuln/detail/CVE-2024-53171), [CVE-2024-53174](https://nvd.nist.gov/vuln/detail/CVE-2024-53174), [CVE-2022-49034](https://nvd.nist.gov/vuln/detail/CVE-2022-49034), [CVE-2024-53165](https://nvd.nist.gov/vuln/detail/CVE-2024-53165), [CVE-2024-53151](https://nvd.nist.gov/vuln/detail/CVE-2024-53151), [CVE-2024-53150](https://nvd.nist.gov/vuln/detail/CVE-2024-53150), [CVE-2024-53148](https://nvd.nist.gov/vuln/detail/CVE-2024-53148), [CVE-2024-53161](https://nvd.nist.gov/vuln/detail/CVE-2024-53161), [CVE-2024-53158](https://nvd.nist.gov/vuln/detail/CVE-2024-53158), [CVE-2024-53157](https://nvd.nist.gov/vuln/detail/CVE-2024-53157), [CVE-2024-53156](https://nvd.nist.gov/vuln/detail/CVE-2024-53156), [CVE-2024-53155](https://nvd.nist.gov/vuln/detail/CVE-2024-53155), [CVE-2024-53145](https://nvd.nist.gov/vuln/detail/CVE-2024-53145), [CVE-2024-53146](https://nvd.nist.gov/vuln/detail/CVE-2024-53146), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087), [CVE-2024-57946](https://nvd.nist.gov/vuln/detail/CVE-2024-57946), [CVE-2024-57938](https://nvd.nist.gov/vuln/detail/CVE-2024-57938), [CVE-2024-57931](https://nvd.nist.gov/vuln/detail/CVE-2024-57931), [CVE-2024-57841](https://nvd.nist.gov/vuln/detail/CVE-2024-57841), [CVE-2024-57802](https://nvd.nist.gov/vuln/detail/CVE-2024-57802), [CVE-2024-54031](https://nvd.nist.gov/vuln/detail/CVE-2024-54031), [CVE-2024-36476](https://nvd.nist.gov/vuln/detail/CVE-2024-36476), [CVE-2024-57896](https://nvd.nist.gov/vuln/detail/CVE-2024-57896), [CVE-2024-57903](https://nvd.nist.gov/vuln/detail/CVE-2024-57903), [CVE-2024-57902](https://nvd.nist.gov/vuln/detail/CVE-2024-57902), [CVE-2024-57901](https://nvd.nist.gov/vuln/detail/CVE-2024-57901), [CVE-2024-57900](https://nvd.nist.gov/vuln/detail/CVE-2024-57900), [CVE-2024-57897](https://nvd.nist.gov/vuln/detail/CVE-2024-57897), [CVE-2024-57890](https://nvd.nist.gov/vuln/detail/CVE-2024-57890), [CVE-2024-57889](https://nvd.nist.gov/vuln/detail/CVE-2024-57889), [CVE-2024-57884](https://nvd.nist.gov/vuln/detail/CVE-2024-57884), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2025-21697](https://nvd.nist.gov/vuln/detail/CVE-2025-21697), [CVE-2024-57951](https://nvd.nist.gov/vuln/detail/CVE-2024-57951), [CVE-2025-21694](https://nvd.nist.gov/vuln/detail/CVE-2025-21694), [CVE-2025-21669](https://nvd.nist.gov/vuln/detail/CVE-2025-21669), [CVE-2025-21666](https://nvd.nist.gov/vuln/detail/CVE-2025-21666), [CVE-2025-21683](https://nvd.nist.gov/vuln/detail/CVE-2025-21683), [CVE-2025-21680](https://nvd.nist.gov/vuln/detail/CVE-2025-21680), [CVE-2025-21678](https://nvd.nist.gov/vuln/detail/CVE-2025-21678), [CVE-2024-57948](https://nvd.nist.gov/vuln/detail/CVE-2024-57948), [CVE-2025-21665](https://nvd.nist.gov/vuln/detail/CVE-2025-21665), [CVE-2025-21699](https://nvd.nist.gov/vuln/detail/CVE-2025-21699), [CVE-2025-21698](https://nvd.nist.gov/vuln/detail/CVE-2025-21698), [CVE-2025-21687](https://nvd.nist.gov/vuln/detail/CVE-2025-21687), [CVE-2025-21692](https://nvd.nist.gov/vuln/detail/CVE-2025-21692), [CVE-2025-21690](https://nvd.nist.gov/vuln/detail/CVE-2025-21690), [CVE-2025-21689](https://nvd.nist.gov/vuln/detail/CVE-2025-21689), [CVE-2025-21688](https://nvd.nist.gov/vuln/detail/CVE-2025-21688)\n\n \n #### Changes:\n \n - Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))\n \n #### Updates:\n \n- Linux ([5.15.179](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.179) (includes [5.15.174](https://lwn.net/Articles/1002179), [5.15.175](https://lwn.net/Articles/1002921), [5.15.176](https://lwn.net/Articles/1004553), [5.15.177](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.177), [5.15.178](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.178)))\n- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))"
  },
  "3510.3.8": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-08-19 13:11:03 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.189"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.7**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-48771](https://nvd.nist.gov/vuln/detail/CVE-2022-48771), [CVE-2025-37937](https://nvd.nist.gov/vuln/detail/CVE-2025-37937), [CVE-2025-37889](https://nvd.nist.gov/vuln/detail/CVE-2025-37889), [CVE-2025-38575](https://nvd.nist.gov/vuln/detail/CVE-2025-38575), [CVE-2025-38152](https://nvd.nist.gov/vuln/detail/CVE-2025-38152), [CVE-2025-39735](https://nvd.nist.gov/vuln/detail/CVE-2025-39735), [CVE-2025-39728](https://nvd.nist.gov/vuln/detail/CVE-2025-39728), [CVE-2025-38637](https://nvd.nist.gov/vuln/detail/CVE-2025-38637), [CVE-2025-37785](https://nvd.nist.gov/vuln/detail/CVE-2025-37785), [CVE-2025-23138](https://nvd.nist.gov/vuln/detail/CVE-2025-23138), [CVE-2025-23136](https://nvd.nist.gov/vuln/detail/CVE-2025-23136), [CVE-2025-22066](https://nvd.nist.gov/vuln/detail/CVE-2025-22066), [CVE-2025-22075](https://nvd.nist.gov/vuln/detail/CVE-2025-22075), [CVE-2025-22073](https://nvd.nist.gov/vuln/detail/CVE-2025-22073), [CVE-2025-22071](https://nvd.nist.gov/vuln/detail/CVE-2025-22071), [CVE-2025-22097](https://nvd.nist.gov/vuln/detail/CVE-2025-22097), [CVE-2025-22089](https://nvd.nist.gov/vuln/detail/CVE-2025-22089), [CVE-2025-22086](https://nvd.nist.gov/vuln/detail/CVE-2025-22086), [CVE-2025-22081](https://nvd.nist.gov/vuln/detail/CVE-2025-22081), [CVE-2025-22079](https://nvd.nist.gov/vuln/detail/CVE-2025-22079), [CVE-2025-22063](https://nvd.nist.gov/vuln/detail/CVE-2025-22063), [CVE-2025-22060](https://nvd.nist.gov/vuln/detail/CVE-2025-22060), [CVE-2025-22056](https://nvd.nist.gov/vuln/detail/CVE-2025-22056), [CVE-2025-22055](https://nvd.nist.gov/vuln/detail/CVE-2025-22055), [CVE-2025-22054](https://nvd.nist.gov/vuln/detail/CVE-2025-22054), [CVE-2025-22035](https://nvd.nist.gov/vuln/detail/CVE-2025-22035), [CVE-2025-22050](https://nvd.nist.gov/vuln/detail/CVE-2025-22050), [CVE-2025-22045](https://nvd.nist.gov/vuln/detail/CVE-2025-22045), [CVE-2025-22044](https://nvd.nist.gov/vuln/detail/CVE-2025-22044), [CVE-2025-22025](https://nvd.nist.gov/vuln/detail/CVE-2025-22025), [CVE-2023-53034](https://nvd.nist.gov/vuln/detail/CVE-2023-53034), [CVE-2025-22021](https://nvd.nist.gov/vuln/detail/CVE-2025-22021), [CVE-2025-22020](https://nvd.nist.gov/vuln/detail/CVE-2025-22020), [CVE-2025-22018](https://nvd.nist.gov/vuln/detail/CVE-2025-22018), [CVE-2025-37989](https://nvd.nist.gov/vuln/detail/CVE-2025-37989), [CVE-2025-37985](https://nvd.nist.gov/vuln/detail/CVE-2025-37985), [CVE-2025-37983](https://nvd.nist.gov/vuln/detail/CVE-2025-37983), [CVE-2025-37982](https://nvd.nist.gov/vuln/detail/CVE-2025-37982), [CVE-2025-37940](https://nvd.nist.gov/vuln/detail/CVE-2025-37940), [CVE-2025-37892](https://nvd.nist.gov/vuln/detail/CVE-2025-37892), [CVE-2025-37885](https://nvd.nist.gov/vuln/detail/CVE-2025-37885), [CVE-2025-37883](https://nvd.nist.gov/vuln/detail/CVE-2025-37883), [CVE-2025-37881](https://nvd.nist.gov/vuln/detail/CVE-2025-37881), [CVE-2025-37871](https://nvd.nist.gov/vuln/detail/CVE-2025-37871), [CVE-2025-37867](https://nvd.nist.gov/vuln/detail/CVE-2025-37867), [CVE-2025-37875](https://nvd.nist.gov/vuln/detail/CVE-2025-37875), [CVE-2025-37844](https://nvd.nist.gov/vuln/detail/CVE-2025-37844), [CVE-2025-37841](https://nvd.nist.gov/vuln/detail/CVE-2025-37841), [CVE-2025-37840](https://nvd.nist.gov/vuln/detail/CVE-2025-37840), [CVE-2025-37862](https://nvd.nist.gov/vuln/detail/CVE-2025-37862), [CVE-2025-37859](https://nvd.nist.gov/vuln/detail/CVE-2025-37859), [CVE-2025-37858](https://nvd.nist.gov/vuln/detail/CVE-2025-37858), [CVE-2025-37857](https://nvd.nist.gov/vuln/detail/CVE-2025-37857), [CVE-2025-37839](https://nvd.nist.gov/vuln/detail/CVE-2025-37839), [CVE-2025-37851](https://nvd.nist.gov/vuln/detail/CVE-2025-37851), [CVE-2025-37850](https://nvd.nist.gov/vuln/detail/CVE-2025-37850), [CVE-2025-37836](https://nvd.nist.gov/vuln/detail/CVE-2025-37836), [CVE-2025-37823](https://nvd.nist.gov/vuln/detail/CVE-2025-37823), [CVE-2025-37830](https://nvd.nist.gov/vuln/detail/CVE-2025-37830), [CVE-2025-37829](https://nvd.nist.gov/vuln/detail/CVE-2025-37829), [CVE-2025-37824](https://nvd.nist.gov/vuln/detail/CVE-2025-37824), [CVE-2025-37808](https://nvd.nist.gov/vuln/detail/CVE-2025-37808), [CVE-2025-37805](https://nvd.nist.gov/vuln/detail/CVE-2025-37805), [CVE-2025-37803](https://nvd.nist.gov/vuln/detail/CVE-2025-37803), [CVE-2025-37817](https://nvd.nist.gov/vuln/detail/CVE-2025-37817), [CVE-2025-37812](https://nvd.nist.gov/vuln/detail/CVE-2025-37812), [CVE-2025-37811](https://nvd.nist.gov/vuln/detail/CVE-2025-37811), [CVE-2025-37810](https://nvd.nist.gov/vuln/detail/CVE-2025-37810), [CVE-2025-37797](https://nvd.nist.gov/vuln/detail/CVE-2025-37797), [CVE-2025-37990](https://nvd.nist.gov/vuln/detail/CVE-2025-37990), [CVE-2025-37991](https://nvd.nist.gov/vuln/detail/CVE-2025-37991), [CVE-2025-37927](https://nvd.nist.gov/vuln/detail/CVE-2025-37927), [CVE-2025-37923](https://nvd.nist.gov/vuln/detail/CVE-2025-37923), [CVE-2025-37930](https://nvd.nist.gov/vuln/detail/CVE-2025-37930), [CVE-2025-37929](https://nvd.nist.gov/vuln/detail/CVE-2025-37929), [CVE-2025-37915](https://nvd.nist.gov/vuln/detail/CVE-2025-37915), [CVE-2025-37914](https://nvd.nist.gov/vuln/detail/CVE-2025-37914), [CVE-2025-37913](https://nvd.nist.gov/vuln/detail/CVE-2025-37913), [CVE-2025-37912](https://nvd.nist.gov/vuln/detail/CVE-2025-37912), [CVE-2025-37911](https://nvd.nist.gov/vuln/detail/CVE-2025-37911), [CVE-2025-37909](https://nvd.nist.gov/vuln/detail/CVE-2025-37909), [CVE-2025-37905](https://nvd.nist.gov/vuln/detail/CVE-2025-37905), [CVE-2025-37890](https://nvd.nist.gov/vuln/detail/CVE-2025-37890), [CVE-2025-37998](https://nvd.nist.gov/vuln/detail/CVE-2025-37998), [CVE-2025-37997](https://nvd.nist.gov/vuln/detail/CVE-2025-37997), [CVE-2025-37995](https://nvd.nist.gov/vuln/detail/CVE-2025-37995), [CVE-2025-37994](https://nvd.nist.gov/vuln/detail/CVE-2025-37994), [CVE-2025-37970](https://nvd.nist.gov/vuln/detail/CVE-2025-37970), [CVE-2025-37969](https://nvd.nist.gov/vuln/detail/CVE-2025-37969), [CVE-2025-37964](https://nvd.nist.gov/vuln/detail/CVE-2025-37964), [CVE-2025-37949](https://nvd.nist.gov/vuln/detail/CVE-2025-37949), [CVE-2025-38094](https://nvd.nist.gov/vuln/detail/CVE-2025-38094), [CVE-2025-38009](https://nvd.nist.gov/vuln/detail/CVE-2025-38009), [CVE-2025-38024](https://nvd.nist.gov/vuln/detail/CVE-2025-38024), [CVE-2025-38023](https://nvd.nist.gov/vuln/detail/CVE-2025-38023), [CVE-2025-38005](https://nvd.nist.gov/vuln/detail/CVE-2025-38005), [CVE-2025-37992](https://nvd.nist.gov/vuln/detail/CVE-2025-37992), [CVE-2025-38052](https://nvd.nist.gov/vuln/detail/CVE-2025-38052), [CVE-2025-38061](https://nvd.nist.gov/vuln/detail/CVE-2025-38061), [CVE-2025-38058](https://nvd.nist.gov/vuln/detail/CVE-2025-38058), [CVE-2025-38079](https://nvd.nist.gov/vuln/detail/CVE-2025-38079), [CVE-2025-38078](https://nvd.nist.gov/vuln/detail/CVE-2025-38078), [CVE-2025-38077](https://nvd.nist.gov/vuln/detail/CVE-2025-38077), [CVE-2025-38075](https://nvd.nist.gov/vuln/detail/CVE-2025-38075), [CVE-2025-38072](https://nvd.nist.gov/vuln/detail/CVE-2025-38072), [CVE-2025-38068](https://nvd.nist.gov/vuln/detail/CVE-2025-38068), [CVE-2025-38066](https://nvd.nist.gov/vuln/detail/CVE-2025-38066), [CVE-2025-38065](https://nvd.nist.gov/vuln/detail/CVE-2025-38065), [CVE-2025-38037](https://nvd.nist.gov/vuln/detail/CVE-2025-38037), [CVE-2025-38035](https://nvd.nist.gov/vuln/detail/CVE-2025-38035), [CVE-2025-38034](https://nvd.nist.gov/vuln/detail/CVE-2025-38034), [CVE-2025-38051](https://nvd.nist.gov/vuln/detail/CVE-2025-38051), [CVE-2025-38031](https://nvd.nist.gov/vuln/detail/CVE-2025-38031), [CVE-2025-38048](https://nvd.nist.gov/vuln/detail/CVE-2025-38048), [CVE-2025-38046](https://nvd.nist.gov/vuln/detail/CVE-2025-38046), [CVE-2025-38044](https://nvd.nist.gov/vuln/detail/CVE-2025-38044), [CVE-2025-38043](https://nvd.nist.gov/vuln/detail/CVE-2025-38043), [CVE-2025-38030](https://nvd.nist.gov/vuln/detail/CVE-2025-38030), [CVE-2025-38003](https://nvd.nist.gov/vuln/detail/CVE-2025-38003), [CVE-2025-38004](https://nvd.nist.gov/vuln/detail/CVE-2025-38004), [CVE-2025-38001](https://nvd.nist.gov/vuln/detail/CVE-2025-38001), [CVE-2025-38000](https://nvd.nist.gov/vuln/detail/CVE-2025-38000), [CVE-2025-38498](https://nvd.nist.gov/vuln/detail/CVE-2025-38498), [CVE-2025-38428](https://nvd.nist.gov/vuln/detail/CVE-2025-38428), [CVE-2025-38424](https://nvd.nist.gov/vuln/detail/CVE-2025-38424), [CVE-2025-38430](https://nvd.nist.gov/vuln/detail/CVE-2025-38430), [CVE-2025-38420](https://nvd.nist.gov/vuln/detail/CVE-2025-38420), [CVE-2025-38419](https://nvd.nist.gov/vuln/detail/CVE-2025-38419), [CVE-2025-38418](https://nvd.nist.gov/vuln/detail/CVE-2025-38418), [CVE-2025-38416](https://nvd.nist.gov/vuln/detail/CVE-2025-38416), [CVE-2025-38415](https://nvd.nist.gov/vuln/detail/CVE-2025-38415), [CVE-2025-38352](https://nvd.nist.gov/vuln/detail/CVE-2025-38352), [CVE-2025-38346](https://nvd.nist.gov/vuln/detail/CVE-2025-38346), [CVE-2025-38348](https://nvd.nist.gov/vuln/detail/CVE-2025-38348), [CVE-2025-38328](https://nvd.nist.gov/vuln/detail/CVE-2025-38328), [CVE-2025-38326](https://nvd.nist.gov/vuln/detail/CVE-2025-38326), [CVE-2025-38324](https://nvd.nist.gov/vuln/detail/CVE-2025-38324), [CVE-2025-38323](https://nvd.nist.gov/vuln/detail/CVE-2025-38323), [CVE-2025-38345](https://nvd.nist.gov/vuln/detail/CVE-2025-38345), [CVE-2025-38344](https://nvd.nist.gov/vuln/detail/CVE-2025-38344), [CVE-2025-38342](https://nvd.nist.gov/vuln/detail/CVE-2025-38342), [CVE-2025-38337](https://nvd.nist.gov/vuln/detail/CVE-2025-38337), [CVE-2025-38336](https://nvd.nist.gov/vuln/detail/CVE-2025-38336), [CVE-2025-38332](https://nvd.nist.gov/vuln/detail/CVE-2025-38332), [CVE-2025-38320](https://nvd.nist.gov/vuln/detail/CVE-2025-38320), [CVE-2025-38313](https://nvd.nist.gov/vuln/detail/CVE-2025-38313), [CVE-2025-38312](https://nvd.nist.gov/vuln/detail/CVE-2025-38312), [CVE-2025-38310](https://nvd.nist.gov/vuln/detail/CVE-2025-38310), [CVE-2025-38319](https://nvd.nist.gov/vuln/detail/CVE-2025-38319), [CVE-2025-38273](https://nvd.nist.gov/vuln/detail/CVE-2025-38273), [CVE-2025-38305](https://nvd.nist.gov/vuln/detail/CVE-2025-38305), [CVE-2025-38298](https://nvd.nist.gov/vuln/detail/CVE-2025-38298), [CVE-2025-38293](https://nvd.nist.gov/vuln/detail/CVE-2025-38293), [CVE-2025-38286](https://nvd.nist.gov/vuln/detail/CVE-2025-38286), [CVE-2025-38285](https://nvd.nist.gov/vuln/detail/CVE-2025-38285), [CVE-2025-38280](https://nvd.nist.gov/vuln/detail/CVE-2025-38280), [CVE-2025-38237](https://nvd.nist.gov/vuln/detail/CVE-2025-38237), [CVE-2025-38219](https://nvd.nist.gov/vuln/detail/CVE-2025-38219), [CVE-2025-38218](https://nvd.nist.gov/vuln/detail/CVE-2025-38218), [CVE-2025-38214](https://nvd.nist.gov/vuln/detail/CVE-2025-38214), [CVE-2025-38213](https://nvd.nist.gov/vuln/detail/CVE-2025-38213), [CVE-2025-38231](https://nvd.nist.gov/vuln/detail/CVE-2025-38231), [CVE-2025-38212](https://nvd.nist.gov/vuln/detail/CVE-2025-38212), [CVE-2025-38229](https://nvd.nist.gov/vuln/detail/CVE-2025-38229), [CVE-2025-38227](https://nvd.nist.gov/vuln/detail/CVE-2025-38227), [CVE-2025-38226](https://nvd.nist.gov/vuln/detail/CVE-2025-38226), [CVE-2025-38222](https://nvd.nist.gov/vuln/detail/CVE-2025-38222), [CVE-2025-38211](https://nvd.nist.gov/vuln/detail/CVE-2025-38211), [CVE-2025-38185](https://nvd.nist.gov/vuln/detail/CVE-2025-38185), [CVE-2025-38184](https://nvd.nist.gov/vuln/detail/CVE-2025-38184), [CVE-2025-38181](https://nvd.nist.gov/vuln/detail/CVE-2025-38181), [CVE-2025-38206](https://nvd.nist.gov/vuln/detail/CVE-2025-38206), [CVE-2025-38204](https://nvd.nist.gov/vuln/detail/CVE-2025-38204), [CVE-2025-38203](https://nvd.nist.gov/vuln/detail/CVE-2025-38203), [CVE-2025-38200](https://nvd.nist.gov/vuln/detail/CVE-2025-38200), [CVE-2025-38180](https://nvd.nist.gov/vuln/detail/CVE-2025-38180), [CVE-2025-38197](https://nvd.nist.gov/vuln/detail/CVE-2025-38197), [CVE-2025-38194](https://nvd.nist.gov/vuln/detail/CVE-2025-38194), [CVE-2025-38193](https://nvd.nist.gov/vuln/detail/CVE-2025-38193), [CVE-2025-38190](https://nvd.nist.gov/vuln/detail/CVE-2025-38190), [CVE-2025-38174](https://nvd.nist.gov/vuln/detail/CVE-2025-38174), [CVE-2025-38163](https://nvd.nist.gov/vuln/detail/CVE-2025-38163), [CVE-2025-38167](https://nvd.nist.gov/vuln/detail/CVE-2025-38167), [CVE-2025-38173](https://nvd.nist.gov/vuln/detail/CVE-2025-38173), [CVE-2025-38138](https://nvd.nist.gov/vuln/detail/CVE-2025-38138), [CVE-2025-38136](https://nvd.nist.gov/vuln/detail/CVE-2025-38136), [CVE-2025-38135](https://nvd.nist.gov/vuln/detail/CVE-2025-38135), [CVE-2025-38161](https://nvd.nist.gov/vuln/detail/CVE-2025-38161), [CVE-2025-38160](https://nvd.nist.gov/vuln/detail/CVE-2025-38160), [CVE-2025-38159](https://nvd.nist.gov/vuln/detail/CVE-2025-38159), [CVE-2025-38157](https://nvd.nist.gov/vuln/detail/CVE-2025-38157), [CVE-2025-38154](https://nvd.nist.gov/vuln/detail/CVE-2025-38154), [CVE-2025-38153](https://nvd.nist.gov/vuln/detail/CVE-2025-38153), [CVE-2025-38147](https://nvd.nist.gov/vuln/detail/CVE-2025-38147), [CVE-2025-38146](https://nvd.nist.gov/vuln/detail/CVE-2025-38146), [CVE-2025-38145](https://nvd.nist.gov/vuln/detail/CVE-2025-38145), [CVE-2025-38143](https://nvd.nist.gov/vuln/detail/CVE-2025-38143), [CVE-2025-38108](https://nvd.nist.gov/vuln/detail/CVE-2025-38108), [CVE-2025-38107](https://nvd.nist.gov/vuln/detail/CVE-2025-38107), [CVE-2025-38103](https://nvd.nist.gov/vuln/detail/CVE-2025-38103), [CVE-2025-38122](https://nvd.nist.gov/vuln/detail/CVE-2025-38122), [CVE-2025-38102](https://nvd.nist.gov/vuln/detail/CVE-2025-38102), [CVE-2025-38120](https://nvd.nist.gov/vuln/detail/CVE-2025-38120), [CVE-2025-38119](https://nvd.nist.gov/vuln/detail/CVE-2025-38119), [CVE-2025-38115](https://nvd.nist.gov/vuln/detail/CVE-2025-38115), [CVE-2025-38112](https://nvd.nist.gov/vuln/detail/CVE-2025-38112), [CVE-2025-38111](https://nvd.nist.gov/vuln/detail/CVE-2025-38111), [CVE-2025-38100](https://nvd.nist.gov/vuln/detail/CVE-2025-38100), [CVE-2025-38088](https://nvd.nist.gov/vuln/detail/CVE-2025-38088), [CVE-2025-38090](https://nvd.nist.gov/vuln/detail/CVE-2025-38090), [CVE-2025-38086](https://nvd.nist.gov/vuln/detail/CVE-2025-38086), [CVE-2025-38084](https://nvd.nist.gov/vuln/detail/CVE-2025-38084), [CVE-2025-38085](https://nvd.nist.gov/vuln/detail/CVE-2025-38085), [CVE-2025-38412](https://nvd.nist.gov/vuln/detail/CVE-2025-38412), [CVE-2025-38410](https://nvd.nist.gov/vuln/detail/CVE-2025-38410), [CVE-2025-38406](https://nvd.nist.gov/vuln/detail/CVE-2025-38406), [CVE-2025-38403](https://nvd.nist.gov/vuln/detail/CVE-2025-38403), [CVE-2025-38401](https://nvd.nist.gov/vuln/detail/CVE-2025-38401), [CVE-2025-38377](https://nvd.nist.gov/vuln/detail/CVE-2025-38377), [CVE-2025-38400](https://nvd.nist.gov/vuln/detail/CVE-2025-38400), [CVE-2025-38399](https://nvd.nist.gov/vuln/detail/CVE-2025-38399), [CVE-2025-38395](https://nvd.nist.gov/vuln/detail/CVE-2025-38395), [CVE-2025-38393](https://nvd.nist.gov/vuln/detail/CVE-2025-38393), [CVE-2025-38391](https://nvd.nist.gov/vuln/detail/CVE-2025-38391), [CVE-2025-38389](https://nvd.nist.gov/vuln/detail/CVE-2025-38389), [CVE-2025-38387](https://nvd.nist.gov/vuln/detail/CVE-2025-38387), [CVE-2025-38386](https://nvd.nist.gov/vuln/detail/CVE-2025-38386), [CVE-2025-38384](https://nvd.nist.gov/vuln/detail/CVE-2025-38384), [CVE-2025-38380](https://nvd.nist.gov/vuln/detail/CVE-2025-38380), [CVE-2025-38371](https://nvd.nist.gov/vuln/detail/CVE-2025-38371), [CVE-2025-38362](https://nvd.nist.gov/vuln/detail/CVE-2025-38362), [CVE-2025-38363](https://nvd.nist.gov/vuln/detail/CVE-2025-38363), [CVE-2025-38350](https://nvd.nist.gov/vuln/detail/CVE-2025-38350), [CVE-2025-38546](https://nvd.nist.gov/vuln/detail/CVE-2025-38546), [CVE-2025-38542](https://nvd.nist.gov/vuln/detail/CVE-2025-38542), [CVE-2025-38540](https://nvd.nist.gov/vuln/detail/CVE-2025-38540), [CVE-2025-38516](https://nvd.nist.gov/vuln/detail/CVE-2025-38516), [CVE-2025-38515](https://nvd.nist.gov/vuln/detail/CVE-2025-38515), [CVE-2025-38514](https://nvd.nist.gov/vuln/detail/CVE-2025-38514), [CVE-2025-38513](https://nvd.nist.gov/vuln/detail/CVE-2025-38513), [CVE-2025-38460](https://nvd.nist.gov/vuln/detail/CVE-2025-38460), [CVE-2025-38467](https://nvd.nist.gov/vuln/detail/CVE-2025-38467), [CVE-2025-38466](https://nvd.nist.gov/vuln/detail/CVE-2025-38466), [CVE-2025-38465](https://nvd.nist.gov/vuln/detail/CVE-2025-38465), [CVE-2025-38464](https://nvd.nist.gov/vuln/detail/CVE-2025-38464), [CVE-2025-38462](https://nvd.nist.gov/vuln/detail/CVE-2025-38462), [CVE-2025-38461](https://nvd.nist.gov/vuln/detail/CVE-2025-38461), [CVE-2025-38445](https://nvd.nist.gov/vuln/detail/CVE-2025-38445), [CVE-2025-38444](https://nvd.nist.gov/vuln/detail/CVE-2025-38444), [CVE-2025-38443](https://nvd.nist.gov/vuln/detail/CVE-2025-38443), [CVE-2025-38441](https://nvd.nist.gov/vuln/detail/CVE-2025-38441), [CVE-2025-38459](https://nvd.nist.gov/vuln/detail/CVE-2025-38459), [CVE-2025-38458](https://nvd.nist.gov/vuln/detail/CVE-2025-38458), [CVE-2025-38457](https://nvd.nist.gov/vuln/detail/CVE-2025-38457), [CVE-2025-38439](https://nvd.nist.gov/vuln/detail/CVE-2025-38439), [CVE-2025-38448](https://nvd.nist.gov/vuln/detail/CVE-2025-38448), [CVE-2025-38375](https://nvd.nist.gov/vuln/detail/CVE-2025-38375))\n\n#### Updates:\n\n- Linux ([5.15.189](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.189) includes ([5.15.188](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.188), [5.15.187](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.187), [5.15.186](https://lwn.net/Articles/1027283/), [5.15.185](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.185), [5.15.184](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.184), [5.15.183](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.183), [5.15.182](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.182), [5.15.181](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.181), [5.15.180](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.180)))\n- ca-certificates ([3.114](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html) includes ([3.113](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html), [3.113.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html), [3.112](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html), [3.111](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html), [3.110](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html)))"
  },
  "4081.3.0": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-01-30 18:31:43 +0000",
    "major_software": {
      "containerd": [
        "1.7.21"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.74"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": " _Changes since **LTS 3510.3.6**_\n\n- Linux ([Please refer to the Go/No-Go document for the list of CVEs resolved](https://hackmd.io/EN9yZnYFS-ijPvCx8PtObw#New-LTS-2024-Release-408130))\n- Go ([CVE-2022-41723](https://nvd.nist.gov/vuln/detail/CVE-2022-41723),  [CVE-2022-41724](https://nvd.nist.gov/vuln/detail/CVE-2022-41724),  [CVE-2022-41725](https://nvd.nist.gov/vuln/detail/CVE-2022-41725), [CVE-2023-24532](https://nvd.nist.gov/vuln/detail/CVE-2023-24532), [CVE-2023-24534](https://nvd.nist.gov/vuln/detail/CVE-2023-24534),  [CVE-2023-24536](https://nvd.nist.gov/vuln/detail/CVE-2023-24536),  [CVE-2023-24537](https://nvd.nist.gov/vuln/detail/CVE-2023-24537),  [CVE-2023-24538](https://nvd.nist.gov/vuln/detail/CVE-2023-24538), [CVE-2023-24539](https://nvd.nist.gov/vuln/detail/CVE-2023-24539),  [CVE-2023-24540](https://nvd.nist.gov/vuln/detail/CVE-2023-24540),  [CVE-2023-29400](https://nvd.nist.gov/vuln/detail/CVE-2023-29400), [CVE-2023-29402](https://nvd.nist.gov/vuln/detail/CVE-2023-29402),  [CVE-2023-29403](https://nvd.nist.gov/vuln/detail/CVE-2023-29403),  [CVE-2023-29404](https://nvd.nist.gov/vuln/detail/CVE-2023-29404),  [CVE-2023-29405](https://nvd.nist.gov/vuln/detail/CVE-2023-29405), [CVE-2023-29406](https://nvd.nist.gov/vuln/detail/CVE-2023-29406), [CVE-2023-29409](https://nvd.nist.gov/vuln/detail/CVE-2023-29409), [CVE-2023-39318](https://nvd.nist.gov/vuln/detail/CVE-2023-39318),  [CVE-2023-39319](https://nvd.nist.gov/vuln/detail/CVE-2023-39319),  [CVE-2023-39320](https://nvd.nist.gov/vuln/detail/CVE-2023-39320),  [CVE-2023-39321](https://nvd.nist.gov/vuln/detail/CVE-2023-39321),  [CVE-2023-39322](https://nvd.nist.gov/vuln/detail/CVE-2023-39322), [CVE-2023-39323](https://nvd.nist.gov/vuln/detail/CVE-2023-39323), [CVE-2023-39325](https://nvd.nist.gov/vuln/detail/CVE-2023-39325), [CVE-2023-39326](https://nvd.nist.gov/vuln/detail/CVE-2023-39326),  [CVE-2023-45285](https://nvd.nist.gov/vuln/detail/CVE-2023-45285), [CVE-2023-45288](https://nvd.nist.gov/vuln/detail/CVE-2023-45288),  [CVE-2023-45289](https://nvd.nist.gov/vuln/detail/CVE-2023-45289),  [CVE-2023-45290](https://nvd.nist.gov/vuln/detail/CVE-2023-45290),  [CVE-2024-24783](https://nvd.nist.gov/vuln/detail/CVE-2024-24783),  [CVE-2024-24784](https://nvd.nist.gov/vuln/detail/CVE-2024-24784),  [CVE-2024-24785](https://nvd.nist.gov/vuln/detail/CVE-2024-24785),  [CVE-2024-24788](https://nvd.nist.gov/vuln/detail/CVE-2024-24788),  [CVE-2024-24789](https://nvd.nist.gov/vuln/detail/CVE-2024-24789),  [CVE-2024-24790](https://nvd.nist.gov/vuln/detail/CVE-2024-24790),  [CVE-2024-24791](https://nvd.nist.gov/vuln/detail/CVE-2024-24791))\n- Linux Firmware ([CVE-2023-31315](https://nvd.nist.gov/vuln/detail/CVE-2023-31315))\n- SDK: dnsmasq ([CVE-2022-0934](https://nvd.nist.gov/vuln/detail/CVE-2022-0934))\n- SDK: nasm ([CVE-2019-6290](https://nvd.nist.gov/vuln/detail/CVE-2019-6290),  [CVE-2019-6291](https://nvd.nist.gov/vuln/detail/CVE-2019-6291),  [CVE-2019-8343](https://nvd.nist.gov/vuln/detail/CVE-2019-8343),  [CVE-2020-21528](https://nvd.nist.gov/vuln/detail/CVE-2020-21528),  [CVE-2021-33450](https://nvd.nist.gov/vuln/detail/CVE-2021-33450),  [CVE-2021-33452](https://nvd.nist.gov/vuln/detail/CVE-2021-33452),  [CVE-2022-44368](https://nvd.nist.gov/vuln/detail/CVE-2022-44368),  [CVE-2022-44369](https://nvd.nist.gov/vuln/detail/CVE-2022-44369),  [CVE-2022-44370](https://nvd.nist.gov/vuln/detail/CVE-2022-44370))\n- SDK: perl ([CVE-2023-47038](https://nvd.nist.gov/vuln/detail/CVE-2023-47038))\n- SDK: pkgconf ([CVE-2023-24056](https://nvd.nist.gov/vuln/detail/CVE-2023-24056))\n- SDK: python ([CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329), [CVE-2023-40217](https://nvd.nist.gov/vuln/detail/CVE-2023-40217),  [CVE-2023-41105](https://nvd.nist.gov/vuln/detail/CVE-2023-41105),  [CVE-2023-6597](https://nvd.nist.gov/vuln/detail/CVE-2023-6597),  [CVE-2024-0450](https://nvd.nist.gov/vuln/detail/CVE-2024-0450),  [gh-81194](https://github.com/python/cpython/issues/81194),  [gh-113659](https://github.com/python/cpython/issues/113659),  [gh-102388](https://github.com/python/cpython/issues/102388),  [gh-114572](https://github.com/python/cpython/issues/114572),  [gh-115243](https://github.com/python/cpython/issues/115243))\n- SDK: qemu ([CVE-2023-0330](https://nvd.nist.gov/vuln/detail/CVE-2023-0330),  [CVE-2023-2861](https://nvd.nist.gov/vuln/detail/CVE-2023-2861))\n- SDK: re2c ([CVE-2022-23901](https://nvd.nist.gov/vuln/detail/CVE-2022-23901))\n- SDK: Rust ([CVE-2023-38497](https://nvd.nist.gov/vuln/detail/CVE-2023-38497))\n- VMware: open-vm-tools ([CVE-2023-34058](https://nvd.nist.gov/vuln/detail/CVE-2023-34058),  [CVE-2023-34059](https://nvd.nist.gov/vuln/detail/CVE-2023-34059),  [CVE-2023-20867](https://nvd.nist.gov/vuln/detail/CVE-2023-20867))\n- bash ([CVE-2022-3715](https://nvd.nist.gov/vuln/detail/CVE-2022-3715))\n- binutils ([CVE-2022-38533](https://nvd.nist.gov/vuln/detail/CVE-2022-38533),  [CVE-2022-4285](https://nvd.nist.gov/vuln/detail/CVE-2022-4285),  [CVE-2023-1579](https://nvd.nist.gov/vuln/detail/CVE-2023-1579),  [CVE-2023-2222](https://nvd.nist.gov/vuln/detail/CVE-2023-2222), [CVE-2023-1972](https://nvd.nist.gov/vuln/detail/CVE-2023-1972))\n- c-ares ([CVE-2022-4904](https://nvd.nist.gov/vuln/detail/CVE-2022-4904), [CVE-2023-31124](https://nvd.nist.gov/vuln/detail/CVE-2023-31124),  [CVE-2023-31130](https://nvd.nist.gov/vuln/detail/CVE-2023-31130),  [CVE-2023-31147](https://nvd.nist.gov/vuln/detail/CVE-2023-31147),  [CVE-2023-32067](https://nvd.nist.gov/vuln/detail/CVE-2023-32067), [CVE-2024-25629](https://nvd.nist.gov/vuln/detail/CVE-2024-25629))\n- containerd ([CVE-2023-25153](https://nvd.nist.gov/vuln/detail/CVE-2023-25153),  [CVE-2023-25173](https://nvd.nist.gov/vuln/detail/CVE-2023-25173))\n- coreutils ([coreutils-2024-03-28](https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html), [CVE-2024-0684](https://nvd.nist.gov/vuln/detail/CVE-2024-0684))\n- curl ([CVE-2023-23914](https://nvd.nist.gov/vuln/detail/CVE-2023-23914),  [CVE-2023-23915](https://nvd.nist.gov/vuln/detail/CVE-2023-23915), [CVE-2023-23916](https://nvd.nist.gov/vuln/detail/CVE-2023-23916), [CVE-2023-27533](https://nvd.nist.gov/vuln/detail/CVE-2023-27533),  [CVE-2023-27534](https://nvd.nist.gov/vuln/detail/CVE-2023-27534),  [CVE-2023-27535](https://nvd.nist.gov/vuln/detail/CVE-2023-27535),  [CVE-2023-27536](https://nvd.nist.gov/vuln/detail/CVE-2023-27536),  [CVE-2023-27537](https://nvd.nist.gov/vuln/detail/CVE-2023-27537),  [CVE-2023-27538](https://nvd.nist.gov/vuln/detail/CVE-2023-27538), [CVE-2023-28319](https://nvd.nist.gov/vuln/detail/CVE-2023-28319),  [CVE-2023-28320](https://nvd.nist.gov/vuln/detail/CVE-2023-28320),  [CVE-2023-28321](https://nvd.nist.gov/vuln/detail/CVE-2023-28321),  [CVE-2023-28322](https://nvd.nist.gov/vuln/detail/CVE-2023-28322), [CVE-2023-32001](https://nvd.nist.gov/vuln/detail/CVE-2023-32001), [CVE-2023-38039](https://nvd.nist.gov/vuln/detail/CVE-2023-38039), [CVE-2023-38545](https://nvd.nist.gov/vuln/detail/CVE-2023-38545),  [CVE-2023-38546](https://nvd.nist.gov/vuln/detail/CVE-2023-38546), [CVE-2023-46218](https://nvd.nist.gov/vuln/detail/CVE-2023-46218),  [CVE-2023-46219](https://nvd.nist.gov/vuln/detail/CVE-2023-46219), [CVE-2024-2004](https://nvd.nist.gov/vuln/detail/CVE-2024-2004),  [CVE-2024-2379](https://nvd.nist.gov/vuln/detail/CVE-2024-2379),  [CVE-2024-2398](https://nvd.nist.gov/vuln/detail/CVE-2024-2398),  [CVE-2024-2466](https://nvd.nist.gov/vuln/detail/CVE-2024-2466), [CVE-2024-6197](https://nvd.nist.gov/vuln/detail/CVE-2024-6197),  [CVE-2024-6874](https://nvd.nist.gov/vuln/detail/CVE-2024-6874), [CVE-2024-7264](https://nvd.nist.gov/vuln/detail/CVE-2024-7264))\n- dnsmasq ([CVE-2023-28450](https://nvd.nist.gov/vuln/detail/CVE-2023-28450),  [CVE-2023-50387](https://nvd.nist.gov/vuln/detail/CVE-2023-50387),  [CVE-2023-50868](https://nvd.nist.gov/vuln/detail/CVE-2023-50868))\n- e2fsprogs ([CVE-2022-1304](https://nvd.nist.gov/vuln/detail/CVE-2022-1304))\n- expat ([CVE-2023-52425](https://nvd.nist.gov/vuln/detail/CVE-2023-52425),  [CVE-2024-28757](https://nvd.nist.gov/vuln/detail/CVE-2024-28757), [CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490))\n- gcc ([CVE-2023-4039](https://nvd.nist.gov/vuln/detail/CVE-2023-4039))\n- git ([CVE-2023-22490](https://nvd.nist.gov/vuln/detail/CVE-2023-22490),  [CVE-2023-23946](https://nvd.nist.gov/vuln/detail/CVE-2023-23946), [CVE-2023-25652](https://nvd.nist.gov/vuln/detail/CVE-2023-25652),  [CVE-2023-25815](https://nvd.nist.gov/vuln/detail/CVE-2023-25815),  [CVE-2023-29007](https://nvd.nist.gov/vuln/detail/CVE-2023-29007), [CVE-2024-32002](https://nvd.nist.gov/vuln/detail/CVE-2024-32002),  [CVE-2024-32004](https://nvd.nist.gov/vuln/detail/CVE-2024-32004),  [CVE-2024-32020](https://nvd.nist.gov/vuln/detail/CVE-2024-32020),  [CVE-2024-32021](https://nvd.nist.gov/vuln/detail/CVE-2024-32021),  [CVE-2024-32465](https://nvd.nist.gov/vuln/detail/CVE-2024-32465))\n- glib ([CVE-2024-34397](https://nvd.nist.gov/vuln/detail/CVE-2024-34397))\n- glibc ([CVE-2023-4527](https://nvd.nist.gov/vuln/detail/CVE-2023-4527),  [CVE-2023-4806](https://nvd.nist.gov/vuln/detail/CVE-2023-4806), [CVE-2023-4911](https://nvd.nist.gov/vuln/detail/CVE-2023-4911), [CVE-2023-5156](https://nvd.nist.gov/vuln/detail/CVE-2023-5156),  [CVE-2023-6246](https://nvd.nist.gov/vuln/detail/CVE-2023-6246),  [CVE-2023-6779](https://nvd.nist.gov/vuln/detail/CVE-2023-6779),  [CVE-2023-6780](https://nvd.nist.gov/vuln/detail/CVE-2023-6780), [CVE-2024-2961](https://nvd.nist.gov/vuln/detail/CVE-2024-2961),  [CVE-2024-33599](https://nvd.nist.gov/vuln/detail/CVE-2024-33599),  [CVE-2024-33600](https://nvd.nist.gov/vuln/detail/CVE-2024-33600),  [CVE-2024-33601](https://nvd.nist.gov/vuln/detail/CVE-2024-33601),  [CVE-2024-33602](https://nvd.nist.gov/vuln/detail/CVE-2024-33602))\n- gnupg ([gnupg-2024-01-25](https://gnupg.org/blog/20240125-smartcard-backup-key.html))\n- gnutls ([CVE-2023-0361](https://nvd.nist.gov/vuln/detail/CVE-2023-0361), [CVE-2023-5981](https://nvd.nist.gov/vuln/detail/CVE-2023-5981), [CVE-2024-0567](https://nvd.nist.gov/vuln/detail/CVE-2024-0567),  [CVE-2024-0553](https://nvd.nist.gov/vuln/detail/CVE-2024-0553), [CVE-2024-28834](https://nvd.nist.gov/vuln/detail/CVE-2024-28834),  [CVE-2024-28835](https://nvd.nist.gov/vuln/detail/CVE-2024-28835))\n- grub ([CVE-2020-10713](https://nvd.nist.gov/vuln/detail/CVE-2020-10713),  [CVE-2020-14372](https://nvd.nist.gov/vuln/detail/CVE-2020-14372),  [CVE-2020-25632](https://nvd.nist.gov/vuln/detail/CVE-2020-25632),  [CVE-2020-25647](https://nvd.nist.gov/vuln/detail/CVE-2020-25647),  [CVE-2020-27749](https://nvd.nist.gov/vuln/detail/CVE-2020-27749),  [CVE-2020-27779](https://nvd.nist.gov/vuln/detail/CVE-2020-27779),  [CVE-2021-20225](https://nvd.nist.gov/vuln/detail/CVE-2021-20225),  [CVE-2021-20233](https://nvd.nist.gov/vuln/detail/CVE-2021-20233),  [CVE-2021-3981](https://nvd.nist.gov/vuln/detail/CVE-2021-3981),  [CVE-2021-3695](https://nvd.nist.gov/vuln/detail/CVE-2021-3695),  [CVE-2021-3696](https://nvd.nist.gov/vuln/detail/CVE-2021-3696),  [CVE-2021-3697](https://nvd.nist.gov/vuln/detail/CVE-2021-3697),  [CVE-2022-28733](https://nvd.nist.gov/vuln/detail/CVE-2022-28733),  [CVE-2022-28734](https://nvd.nist.gov/vuln/detail/CVE-2022-28734),  [CVE-2022-28735](https://nvd.nist.gov/vuln/detail/CVE-2022-28735),  [CVE-2022-28736](https://nvd.nist.gov/vuln/detail/CVE-2022-28736),  [CVE-2022-28737](https://nvd.nist.gov/vuln/detail/CVE-2022-28737),  [CVE-2022-2601](https://nvd.nist.gov/vuln/detail/CVE-2022-2601),  [CVE-2022-3775](https://nvd.nist.gov/vuln/detail/CVE-2022-3775), [CVE-2023-4692](https://nvd.nist.gov/vuln/detail/CVE-2023-4692),  [CVE-2023-4693](https://nvd.nist.gov/vuln/detail/CVE-2023-4693))\n- intel-microcode ([CVE-2022-21216](https://nvd.nist.gov/vuln/detail/CVE-2022-21216),  [CVE-2022-33196](https://nvd.nist.gov/vuln/detail/CVE-2022-33196),  [CVE-2022-38090](https://nvd.nist.gov/vuln/detail/CVE-2022-38090), [CVE-2022-40982](https://nvd.nist.gov/vuln/detail/CVE-2022-40982),  [CVE-2022-41804](https://nvd.nist.gov/vuln/detail/CVE-2022-41804),  [CVE-2023-23908](https://nvd.nist.gov/vuln/detail/CVE-2023-23908), [CVE-2023-22655](https://nvd.nist.gov/vuln/detail/CVE-2023-22655),  [CVE-2023-28746](https://nvd.nist.gov/vuln/detail/CVE-2023-28746),  [CVE-2023-38575](https://nvd.nist.gov/vuln/detail/CVE-2023-38575),  [CVE-2023-39368](https://nvd.nist.gov/vuln/detail/CVE-2023-39368),  [CVE-2023-43490](https://nvd.nist.gov/vuln/detail/CVE-2023-43490), [CVE-2023-23583](https://nvd.nist.gov/vuln/detail/CVE-2023-23583), [CVE-2023-45733](https://nvd.nist.gov/vuln/detail/CVE-2023-45733),  [CVE-2023-45745](https://nvd.nist.gov/vuln/detail/CVE-2023-45745),  [CVE-2023-46103](https://nvd.nist.gov/vuln/detail/CVE-2023-46103),  [CVE-2023-47855](https://nvd.nist.gov/vuln/detail/CVE-2023-47855))\n- less ([CVE-2022-46663](https://nvd.nist.gov/vuln/detail/CVE-2022-46663), [CVE-2024-32487](https://nvd.nist.gov/vuln/detail/CVE-2024-32487))\n- libarchive ([CVE-2024-26256](https://nvd.nist.gov/vuln/detail/CVE-2024-26256),  [CVE-2024-37407](https://nvd.nist.gov/vuln/detail/CVE-2024-37407), [libarchive-20230729](https://github.com/libarchive/libarchive/releases/tag/v3.7.1))\n- libcap ([CVE-2023-2602](https://nvd.nist.gov/vuln/detail/CVE-2023-2602),  [CVE-2023-2603](https://nvd.nist.gov/vuln/detail/CVE-2023-2603))\n- libmicrohttpd ([CVE-2023-27371](https://nvd.nist.gov/vuln/detail/CVE-2023-27371))\n- libtirpc ([libtirpc-rhbg-2138317](http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=4a2d85c64110ee9e21a8c4f9dafd6b0ae621506d),  [libtirpc-rhbg-2150611](http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=f7f0abdf267698de3f74a0285405b1b01f40893b),  [libtirpc-rhbg-2224666](http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1d2e10afb2ffc35cb3623f57a15f712359f18e75))\n- libuv ([CVE-2024-24806](https://nvd.nist.gov/vuln/detail/CVE-2024-24806))\n- libxml2 ([CVE-2023-28484](https://nvd.nist.gov/vuln/detail/CVE-2023-28484),  [CVE-2023-29469](https://nvd.nist.gov/vuln/detail/CVE-2023-29469), [CVE-2023-45322](https://nvd.nist.gov/vuln/detail/CVE-2023-45322), [CVE-2024-25062](https://nvd.nist.gov/vuln/detail/CVE-2024-25062), [CVE-2024-34459](https://nvd.nist.gov/vuln/detail/CVE-2024-34459), [libxml2-20230428](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4))\n- lua ([CVE-2022-33099](https://nvd.nist.gov/vuln/detail/CVE-2022-33099))\n- mit-krb5 ([CVE-2023-36054](https://nvd.nist.gov/vuln/detail/CVE-2023-36054),  [CVE-2024-26461](https://nvd.nist.gov/vuln/detail/CVE-2024-26461),  [CVE-2024-26462](https://nvd.nist.gov/vuln/detail/CVE-2024-26462),  [CVE-2024-37370](https://nvd.nist.gov/vuln/detail/CVE-2024-37370),  [CVE-2024-37371](https://nvd.nist.gov/vuln/detail/CVE-2024-37371))\n- ncurses ([CVE-2023-29491](https://nvd.nist.gov/vuln/detail/CVE-2023-29491))\n- nghttp2 ([CVE-2023-44487](https://nvd.nist.gov/vuln/detail/CVE-2023-44487),  [CVE-2024-28182](https://nvd.nist.gov/vuln/detail/CVE-2024-28182))\n- nvidia-drivers ([CVE-2023-25515](https://nvd.nist.gov/vuln/detail/CVE-2023-25515),  [CVE-2023-25516](https://nvd.nist.gov/vuln/detail/CVE-2023-25516))\n- openldap ([CVE-2023-2953](https://nvd.nist.gov/vuln/detail/CVE-2023-2953))\n- openssh ([CVE-2023-25136](https://nvd.nist.gov/vuln/detail/CVE-2023-25136), [CVE-2024-6387](https://nvd.nist.gov/vuln/detail/CVE-2024-6387),  [CVE-2023-38408](https://nvd.nist.gov/vuln/detail/CVE-2023-38408),  [CVE-2023-28531](https://nvd.nist.gov/vuln/detail/CVE-2023-28531),  [CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795),  [CVE-2023-51384](https://nvd.nist.gov/vuln/detail/CVE-2023-51384),  [CVE-2023-51385](https://nvd.nist.gov/vuln/detail/CVE-2023-51385))\n- openssl ([CVE-2022-4203](https://nvd.nist.gov/vuln/detail/CVE-2022-4203),  [CVE-2022-4304](https://nvd.nist.gov/vuln/detail/CVE-2022-4304),  [CVE-2022-4450](https://nvd.nist.gov/vuln/detail/CVE-2022-4450),  [CVE-2023-0215](https://nvd.nist.gov/vuln/detail/CVE-2023-0215),  [CVE-2023-0216](https://nvd.nist.gov/vuln/detail/CVE-2023-0216),  [CVE-2023-0217](https://nvd.nist.gov/vuln/detail/CVE-2023-0217),  [CVE-2023-0286](https://nvd.nist.gov/vuln/detail/CVE-2023-0286),  [CVE-2023-0401](https://nvd.nist.gov/vuln/detail/CVE-2023-0401), [CVE-2023-3817](https://nvd.nist.gov/vuln/detail/CVE-2023-3817),  [CVE-2023-5363](https://nvd.nist.gov/vuln/detail/CVE-2023-5363),  [CVE-2023-5678](https://nvd.nist.gov/vuln/detail/CVE-2023-5678),  [CVE-2023-5678](https://nvd.nist.gov/vuln/detail/CVE-2023-5678),  [CVE-2023-6129](https://nvd.nist.gov/vuln/detail/CVE-2023-6129),  [CVE-2023-6237](https://nvd.nist.gov/vuln/detail/CVE-2023-6237),  [CVE-2024-0727](https://nvd.nist.gov/vuln/detail/CVE-2024-0727),  [CVE-2023-0464](https://nvd.nist.gov/vuln/detail/CVE-2023-0464),  [CVE-2023-0465](https://nvd.nist.gov/vuln/detail/CVE-2023-0465),  [CVE-2023-0466](https://nvd.nist.gov/vuln/detail/CVE-2023-0466),  [CVE-2023-1255](https://nvd.nist.gov/vuln/detail/CVE-2023-1255),  [CVE-2023-2650](https://nvd.nist.gov/vuln/detail/CVE-2023-2650)),  [CVE-2023-2975](https://nvd.nist.gov/vuln/detail/CVE-2023-2975),  [CVE-2023-3446](https://nvd.nist.gov/vuln/detail/CVE-2023-3446))\n- procps ([CVE-2023-4016](https://nvd.nist.gov/vuln/detail/CVE-2023-4016))\n- protobuf ([CVE-2022-1941](https://nvd.nist.gov/vuln/detail/CVE-2022-1941))\n- runc ([CVE-2023-25809](https://nvd.nist.gov/vuln/detail/CVE-2023-25809),  [CVE-2023-27561](https://nvd.nist.gov/vuln/detail/CVE-2023-27561),  [CVE-2023-28642](https://nvd.nist.gov/vuln/detail/CVE-2023-28642), [CVE-2024-21626](https://nvd.nist.gov/vuln/detail/CVE-2024-21626))\n- samba ([CVE-2021-44142](https://nvd.nist.gov/vuln/detail/CVE-2021-44142),  [CVE-2022-1615](https://nvd.nist.gov/vuln/detail/CVE-2022-1615),  [CVE-2023-4091](https://nvd.nist.gov/vuln/detail/CVE-2023-4091))\n- shadow ([CVE-2023-29383](https://nvd.nist.gov/vuln/detail/CVE-2023-29383))\n- sudo ([CVE-2023-27320](https://nvd.nist.gov/vuln/detail/CVE-2023-27320),  [CVE-2023-28486](https://nvd.nist.gov/vuln/detail/CVE-2023-28486),  [CVE-2023-28487](https://nvd.nist.gov/vuln/detail/CVE-2023-28487),  [CVE-2023-42465](https://nvd.nist.gov/vuln/detail/CVE-2023-42465))\n- sysext-docker: Docker ([CVE-2023-28840](https://nvd.nist.gov/vuln/detail/CVE-2023-28840),  [CVE-2023-28841](https://nvd.nist.gov/vuln/detail/CVE-2023-28841),  [CVE-2023-28842](https://nvd.nist.gov/vuln/detail/CVE-2023-28842), [CVE-2024-24557](https://nvd.nist.gov/vuln/detail/CVE-2024-24557), [CVE-2024-29018](https://nvd.nist.gov/vuln/detail/CVE-2024-29018))\n- sysext-podman: podman ([CVE-2024-3727](https://nvd.nist.gov/vuln/detail/CVE-2024-3727))\n- tar ([CVE-2022-48303](https://nvd.nist.gov/vuln/detail/CVE-2022-48303))\n- torcx ([CVE-2022-32149](https://nvd.nist.gov/vuln/detail/CVE-2022-32149), [CVE-2022-28948](https://nvd.nist.gov/vuln/detail/CVE-2022-28948))\n- tpm2-tools ([CVE-2024-29038](https://nvd.nist.gov/vuln/detail/CVE-2024-29038),  [CVE-2024-29039](https://nvd.nist.gov/vuln/detail/CVE-2024-29039),  [CVE-2024-29040](https://nvd.nist.gov/vuln/detail/CVE-2024-29040))\n- traceroute ([CVE-2023-46316](https://nvd.nist.gov/vuln/detail/CVE-2023-46316))\n- vim ([CVE-2023-0288](https://nvd.nist.gov/vuln/detail/CVE-2023-0288),  [CVE-2023-0433](https://nvd.nist.gov/vuln/detail/CVE-2023-0433), [CVE-2023-1127](https://nvd.nist.gov/vuln/detail/CVE-2023-1127),  [CVE-2023-1175](https://nvd.nist.gov/vuln/detail/CVE-2023-1175),  [CVE-2023-1170](https://nvd.nist.gov/vuln/detail/CVE-2023-1170), [CVE-2023-2609](https://nvd.nist.gov/vuln/detail/CVE-2023-2609),  [CVE-2023-2610](https://nvd.nist.gov/vuln/detail/CVE-2023-2610),  [CVE-2023-2426](https://nvd.nist.gov/vuln/detail/CVE-2023-2426),  [CVE-2023-48231](https://nvd.nist.gov/vuln/detail/CVE-2023-48231),  [CVE-2023-48232](https://nvd.nist.gov/vuln/detail/CVE-2023-48232),  [CVE-2023-48233](https://nvd.nist.gov/vuln/detail/CVE-2023-48233),  [CVE-2023-48234](https://nvd.nist.gov/vuln/detail/CVE-2023-48234),  [CVE-2023-48235](https://nvd.nist.gov/vuln/detail/CVE-2023-48235),  [CVE-2023-48236](https://nvd.nist.gov/vuln/detail/CVE-2023-48236),  [CVE-2023-48237](https://nvd.nist.gov/vuln/detail/CVE-2023-48237),  [CVE-2023-48706](https://nvd.nist.gov/vuln/detail/CVE-2023-48706),  [CVE-2023-5344](https://nvd.nist.gov/vuln/detail/CVE-2023-5344),  [CVE-2023-5441](https://nvd.nist.gov/vuln/detail/CVE-2023-5441),  [CVE-2023-5535](https://nvd.nist.gov/vuln/detail/CVE-2023-5535),  [CVE-2023-46246](https://nvd.nist.gov/vuln/detail/CVE-2023-46246))\n- zlib ([CVE-2023-45853](https://nvd.nist.gov/vuln/detail/CVE-2023-45853),  [CVE-2023-20900](https://nvd.nist.gov/vuln/detail/CVE-2023-20900))\n\n#### Bug fixes:\n\n- Ensured that `/var/log/journal/` is created early enough for systemd-journald to persist the logs on first boot ([bootengine#60](https://github.com/flatcar/bootengine/pull/60), [baselayout#29](https://github.com/flatcar/baselayout/pull/29))\n- Fixed `journalctl --user` permission issue ([Flatcar#989](https://github.com/flatcar/Flatcar/issues/989))\n- Added a workaround for old airgapped/proxied update-engine clients to be able to update to this release ([Flatcar#1332](https://github.com/flatcar/Flatcar/issues/1332), [update_engine#38](https://github.com/flatcar/update_engine/pull/38))\n- Added AWS EKS support for versions 1.24-1.28. Fixed `/usr/share/amazon/eks/download-kubelet.sh` to include download paths for these versions. ([scripts#1210](https://github.com/flatcar/scripts/pull/1210))\n- Added qemu-guest-agent to ARM64 images ([flatcar/flatcar#1593](https://github.com/flatcar/Flatcar/issues/1593))\n- AWS: Fixed the Amazon SSM agent that was crashing. ([Flatcar#1307](https://github.com/flatcar/Flatcar/issues/1307))\n- CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: ([flatcar/scripts#2016](https://github.com/flatcar/scripts/pull/2016))- Fixed issue file generation from '/etc/issue.d' ([scripts#2018](https://github.com/flatcar/scripts/pull/2018))\n- Deleted files in `/etc` that have a tmpfiles rule that normally would recreate them will now show up again through the `/etc` lowerdir ([Flatcar#1265](https://github.com/flatcar/Flatcar/issues/1265), [bootengine#79](https://github.com/flatcar/bootengine/pull/79))\n- Disabled user-configdrive.service on OpenStack when config drive is used, which caused the hostname to be overwritten. The coreos-cloudinit.service unit already runs on OpenStack if the system is not configured via ignition. ([Flatcar#1385](https://github.com/flatcar/Flatcar/issues/1385))\n- Ensured that the folder `/var/log/sssd` is created if it doesn't exist, required for `sssd.service` ([Flatcar#1096](https://github.com/flatcar/Flatcar/issues/1096))\n- Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found ([coreos-cloudinit#25](https://github.com/flatcar/coreos-cloudinit/pull/25))\n- Fixed a miscompilation of getfacl causing it to dump core when executed ([scripts#809](https://github.com/flatcar/scripts/pull/809))\n- Fixed bad usage of gpg that prevented flatcar-install from being used with custom signing keys ([Flatcar#1471](https://github.com/flatcar/flatcar/pull/1471))\n- Fixed bug in handling renamed network interfaces when generating login issue ([init#102](https://github.com/flatcar/init/pull/102))\n- Fixed iterating over the OEM update payload signatures which prevented the AWS OEM update to 3745.x.y ([update-engine#31](https://github.com/flatcar/update_engine/pull/31))\n- Fixed oem-cloudinit.service on Equinix Metal. The availability check now uses the https://metadata.platformequinix.com/metadata endpoint. ([scripts#2222](https://github.com/flatcar/scripts/pull/2222))\n- Fixed quotes handling for update-engine ([Flatcar#1209](https://github.com/flatcar/Flatcar/issues/1209))\n- Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. ([Flatcar#1514](https://github.com/flatcar/flatcar/pull/1514))\n- Fixed supplying extension update payloads with a custom base URL in Nebraska ([Flatcar#1281](https://github.com/flatcar/Flatcar/issues/1281))\n- Fixed that systemd-sysext images can extend directories where Flatcar extensions are also shipping files, e.g., that the sysext-bakery Kubernetes extension works when OEM extensions are present ([sysext-bakery#50](https://github.com/flatcar/sysext-bakery/issues/50))\n- Fixed the handling of OEM update payloads in a Nebraska response with self-hosted packages ([ue-rs#49](https://github.com/flatcar/ue-rs/pull/49))\n- Fixed the initrd option in the QEMU launcher script. It was -R, but this was already taken by the read-only pflash option, so use -r instead. ([scripts#2239](https://github.com/flatcar/scripts/pull/2239))\n- Fixed the missing `/etc/extensions/` symlinks for the inbuilt Docker/containerd systemd-sysext images on update from Beta 3760.1.0 ([update_engine#32](https://github.com/flatcar/update_engine/pull/32))\n- Fixed the postinstall hook failure when updating from Azure instances without OEM systemd-sysext images to Flatcar Alpha 3745.x.y ([update_engine#29](https://github.com/flatcar/update_engine/pull/29))\n- Fixes kubevirt vm creation by ensuring that /dev/vhost-net exists ([Flatcar#1336](https://github.com/flatcar/Flatcar/issues/1336))\n- Fix ownership of systemd units shipped with built-in docker/containerd sysexts. The files shipped on production images were accidentally owned by 1000:1000 instead of 0:0. This uid/gid is not present on Flatcar images but would be assigned to the first created user. Due to contents of sysexts and /usr being readonly on Flatcar, the invalid permissions can't be used to escalate privileges. ([scripts#2266](https://github.com/flatcar/scripts/pull/2266))\n- Fix the RemainAfterExit clause in nvidia.service ([Flatcar#1169](https://github.com/flatcar/Flatcar/issues/1169))\n- GCP: Fixed OS Login enabling ([scripts#1445](https://github.com/flatcar/scripts/pull/1445))\n- Hetzner: Fixed duplicated prefix in the Afterburn metadata ([scripts#2141](https://github.com/flatcar/scripts/pull/2141))\n- Made `sshkeys.service` more robust to only run `coreos-metadata-sshkeys@core.service` when not masked and also retry on failure ([init#112](https://github.com/flatcar/init/pull/112))\n- Removed custom CloudSigma coreos-cloudinit service configuration since it will be called with the cloudsigma oem anyway. The restart of the service can also cause the serial port to be stuck in an nondeterministic state which breaks future runs.\n- Resolved kmod static nodes creation in bootengine ([bootengine#85](https://github.com/flatcar/bootengine/pull/85))\n- Restored support for custom OEMs supplied in the PXE boot where `/usr/share/oem` brings the OEM partition contents ([Flatcar#1376](https://github.com/flatcar/Flatcar/issues/1376))\n- Restored the reboot warning and delay for non-SSH console sessions ([locksmith#21](https://github.com/flatcar/locksmith/pull/21))\n- Set TTY used for fetching server_context to RAW mode before running cloudinit on cloudsigma ([scripts#1280](https://github.com/flatcar/scripts/pull/1280))\n- Worked around a bash regression in `flatcar-install` and added error reporting for disk write failures ([Flatcar#1059](https://github.com/flatcar/Flatcar/issues/1059))\n\n#### Changes:\n\n- Added a new `flatcar-reset` tool and boot logic for selective OS resets to reconfigure the system with Ignition while avoiding config drift ([bootengine#55](https://github.com/flatcar/bootengine/pull/55), [init#91](https://github.com/flatcar/init/pull/91))\n- Added `pigz` to the image, a parallel gzip implementation, which is useful to speed up the (de)compression for large container image imports/exports ([coreos-overlay#2504](https://github.com/flatcar/coreos-overlay/pull/2504))\n- Enabled elfutils support in systemd-coredump. A backtrace will now appear in the journal for any program that dumps core ([coreos-overlay#2489](https://github.com/flatcar/coreos-overlay/pull/2489))\n- `/etc` is now set up as overlayfs with the original `/etc` folder being the store for changed files/directories and `/usr/share/flatcar/etc` providing the lower default directory tree ([bootengine#53](https://github.com/flatcar/bootengine/pull/53), [scripts#666](https://github.com/flatcar/scripts/pull/666))\n- Improved the OS reset tool to offer preview, backup and restore ([init#94](https://github.com/flatcar/init/pull/94))\n- On boot any files in `/etc` that are the same as provided by the booted `/usr/share/flatcar/etc` default for the overlay mount on `/etc` are deleted to ensure that future updates of `/usr/share/flatcar/etc` are propagated - to opt out create `/etc/.no-dup-update` in case you want to keep an unmodified config file as is or because you fear that a future Flatcar version may use the same file as you at which point your copy is cleaned up and any other future Flatcar changes would be applied ([bootengine#54](https://github.com/flatcar/bootengine/pull/54))\n- Switched systemd log reporting to the combined format of both unit description, as before, and now the unit name to easily find the unit ([coreos-overlay#2436](https://github.com/flatcar/coreos-overlay/pull/2436))\n- Added zram-generator package to the image ([scripts#1772](https://github.com/flatcar/scripts/pull/1772))\n- Added Akamai / Linode images ([flatcar/scripts#1806](https://github.com/flatcar/scripts/pull/1806))\n- Added azure-nvme-utils to the image, which is used by udev to create symlinks for NVMe disks on Azure v6 instances under /dev/disk/azure/. ([scripts#1950](https://github.com/flatcar/scripts/pull/1950))\n- Added Hetzner images ([flatcar/scripts#1880](https://github.com/flatcar/scripts/pull/1880))\n- Added Hyper-V VHDX image ([flatcar/scripts#1791](https://github.com/flatcar/scripts/pull/1791))\n- Added Ignition Clevis support for encrypted disks unlocked with a TPM2 device or a Tang server ([scripts#1560](https://github.com/flatcar/scripts/pull/1560))\n- Added KubeVirt qcow2 image for amd64/arm64 ([flatcar/scripts#1962](https://github.com/flatcar/scripts/pull/1962))\n- Added Scaleway images ([flatcar/scripts#1683](https://github.com/flatcar/scripts/pull/1683))\n- Added support for multipart MIME userdata in coreos-cloudinit. Ignition now detects multipart userdata and delegates execution to coreos-cloudinit. (scripts#873)\n- Added support for unlocking the rootfs with a TPM set up by systemd-cryptenroll ([bootengine#93](https://github.com/flatcar/bootengine/pull/93))\n- Added TLS Kernel module ([scripts#865](https://github.com/flatcar/scripts/pull/865))\n- Add Intel igc driver to support I225/I226 family NICs. ([flatcar/scripts#1786](https://github.com/flatcar/scripts/pull/1786))\n- A new format `qemu_uefi_secure` is introduced to test Flatcar for SecureBoot-enabled features. The format will be later merged into `qemu_uefi`.\n- As part of the update to Catalyst 4 (used to build the SDK), the coreos package repository has been renamed to coreos-overlay to match its directory name. This will be reflected in package listings and package manager output. ([flatcar/scripts#2115](https://github.com/flatcar/scripts/pull/2115))\n- AWS OEM images now use a systemd-sysext image for layering additional platform-specific software on top of `/usr`\n- Azure and QEMU OEM images now use systemd-sysext images for layering additional platform-specific software on top of `/usr`. For Azure images this also means that the image has a normal Python installation available through the sysext image. The OEM software is still not updated but this will be added soon.\n- Azure, HyperV: Added daemons `kvp`, `vss`, and `fcopy` for better HyperV hypervisor integration with Flatcar guests ([scripts#2309](https://github.com/flatcar/scripts/pull/2309)).\n- Backported systemd-sysext mutable overlays functionality from yet-unreleased systemd v256. ([flatcar/scripts#1753](https://github.com/flatcar/scripts/pull/1753))\n- Changed coreos-cloudinit to now set the short hostname instead of the FQDN when fetched from the metadata service ([coreos-cloudinit#19](https://github.com/flatcar/coreos-cloudinit/pull/19))\n    ([changelog](https://docs.docker.com/engine/release-notes/23.0/#bug-fixes-and-enhancements-6), [upstream pr](https://github.com/moby/moby/pull/42661)).\n- Change nvidia.service to type oneshot (from the default \"simple\") so the subsequent services (configured with \"Requires/After\") are executed after the driver installation is successfully finished (flatcar/Flatcar#1136)\n  - Consequently, `update_engine` will not perform torcx sanity checks post-update anymore.\n- cri-tools, runc, containerd, docker, and docker-cli are now built from Gentoo upstream ebuilds. Docker received a major version upgrade - it was updated to Docker 24 (from Docker 20; see \u201cupdates\u201d).\n- Disabled real-time priority for multipathd as it prevents the cgroups2 cpu controller from working. ([flatcar/scripts#1771](https://github.com/flatcar/scripts/pull/1771))\n    - **Docker will remove the `btrfs` driver entirely in a future version. Please consider migrating your deployments to the `overlay2` driver.**\n- Enabled amd-pstate,amd-pstate-epp cpufreq drivers for some AMD CPUs in the kernel. ([flatcar/scripts#1770](https://github.com/flatcar/scripts/pull/1770))\n- Enabled ntpd by default on AWS & GCP, enabled chronyd by default on Azure. The native time sync source is used on each cloud. ([scripts#1792](https://github.com/flatcar/scripts/pull/1792))\n- Enabled the GRUB TPM2 module to measure the boot code path and files into PCR 8+9 in UEFI ([scripts#1861](https://github.com/flatcar/scripts/pull/1861))\n- Enabled the ptp_vmw module in the kernel.\n- Enabled the virtio GPU driver ([scripts#830](https://github.com/flatcar/scripts/pull/830))\n- Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers ([flatcar/scripts#2355](https://github.com/flatcar/scripts/pull/2355))\n- GCP OEM images now use a systemd-sysext image for layering additional platform-specific software on top of `/usr` and being part of the OEM A/B updates ([flatcar#1146](https://github.com/flatcar/Flatcar/issues/1146))\n- Hetzner: Added `COREOS_HETZNER_PRIVATE_IPV4_0` Afterburn attribute for Hetzner private IPs ([scripts#2141](https://github.com/flatcar/scripts/pull/2141))\n- Hyper-V images, both .vhd and .vhdx files are available as `zip` compressed, switching from `bzip2` to a built-in available Windows compression - `zip` ([scripts#1878](https://github.com/flatcar/scripts/pull/1878))\n- libcrypt is now provided by the libxcrypt library instead of glibc. Glibc libcrypt was deprecated long time ago.\n- Migrated the NVIDIA installer from the Azure/AWS OEM partition to `/usr` to make it available on all platforms ([scripts#932](https://github.com/flatcar/scripts/pull/932/), [Flatcar#1077](https://github.com/flatcar/Flatcar/issues/1077))\n- Migrate to Type=notify in containerd.service. Changed the unit to Type=notify, utilizing the existing containerd support for sd_notify call after socket setup.\n- Moved a mountpoint of the OEM partition from `/usr/share/oem` to `/oem`. `/usr/share/oem` became a symlink to `/oem` for backward compatibility. Despite the move, the initrd images providing files through `/usr/share/oem` should keep using `/usr/share/oem`. The move was done to enable activating the OEM sysext images that are placed in the OEM partition.\n  - **NOTE** that if you are already using btrfs-backed Docker storage and are upgrading to this new version, Docker will automatically use the `btrfs` storage driver for backwards-compatibility with your deployment.\n  - **NOTE** The docker btrfs storage driver has been de-prioritised; BTRFS backed storage will now default to the `overlay2` driver\n- OEM vendor tools are now A/B updated if they are shipped as systemd-sysext images, the migration happens when both partitions require a systemd-sysext OEM image - note that this will delete the `nvidia.service` from `/etc` on Azure because it's now part of `/usr` ([Flatcar#60](https://github.com/flatcar/Flatcar/issues/60))\n- OpenStack, Brightbox: Added the `flatcar.autologin` kernel cmdline parameter by default as the hypervisor manages access to the console ([scripts#1866](https://github.com/flatcar/scripts/pull/1866))\n- Provided a Podman Flatcar extension as optional systemd-sysext image with the release. Write 'podman' to `/etc/flatcar/enabled-sysext.conf` through Ignition and the sysext will be installed during provisioning ([scripts#1964](https://github.com/flatcar/scripts/pull/1964))\n- Provided a Python Flatcar extension as optional systemd-sysext image with the release. Write 'python' to `/etc/flatcar/enabled-sysext.conf` through Ignition and the sysext will be installed during provisioning ([scripts#1979](https://github.com/flatcar/scripts/pull/1979))\n- OpenStack: Changed metadata hostname source order. The service first tries with the config drive then fallback on the metadata service. ([bootengine#96](https://github.com/flatcar/bootengine/pull/96))\n- Provided a ZFS-2.2.2 Flatcar extension as optional systemd-sysext image with the release. Write 'zfs' to `/etc/flatcar/enabled-sysext.conf` through Ignition and the sysext will be installed during provisioning. ZFS support is experimental and ZFS is not supported for the root partition. ([flatcar/scripts#1742](https://github.com/flatcar/scripts/pull/1742))\n  - Relevant changes: [scripts#1216](https://github.com/flatcar/scripts/pull/1216), [update_engine#30](https://github.com/flatcar/update_engine/pull/30), [Mantle#466](https://github.com/flatcar/mantle/pull/466), [Mantle#465](https://github.com/flatcar/mantle/pull/465).\n- Removed `actool` from the image and `acbuild` from the SDK as these tools are deprecated and not used ([scripts#1817](https://github.com/flatcar/scripts/pull/1817))\n- \u26a0 Removed coreos-cloudinit support for automatic keys conversion (e.g `reboot-strategy` -> `reboot_strategy`) ([scripts#1687](https://github.com/flatcar/scripts/pull/1687))\n- Removed Linux drivers for Mellanox Technologies Switch ASICs family and Spectrum/Spectrum-2/Spectrum-3/Spectrum-4 Ethernet Switch ASICs to reduce the initrd size on AMD64 by ~5MB ([flatcar/scripts#1734](https://github.com/flatcar/scripts/pull/1734)). This change is part of the effort to reduce the initrd size ([flatcar#1381](https://github.com/flatcar/Flatcar/issues/1381)).\n- Removed unused grub executable duplicate files and removed grub modules that are already assembled in the grub executable ([scripts#1955](https://github.com/flatcar/scripts/pull/1955)).\n- Replace nmap netcat with openbsd variant. The license didn't get an exception from CNCF. Something about the definition of \"derivative works\" being too broad.\n- Reworked the VMware OEM software to be shipped as A/B updated systemd-sysext image\n- Scaleway: images are now provided directly as `.qcow2` to ease the import on Scaleway ([scripts#1953](https://github.com/flatcar/scripts/pull/1953))\n- SDK: Experimental support for [prefix builds](https://github.com/flatcar/scripts/blob/main/PREFIX.md) to create distro independent, portable, self-contained applications w/ all dependencies included. With contributions from [chewi](https://github.com/chewi) and [HappyTobi](https://github.com/HappyTobi).\n- Started shipping default ssh client and ssh daemon configs in `/etc/ssh/ssh_config` and `/etc/ssh/sshd_config` which include config snippets in `/etc/ssh/ssh_config.d` and `/etc/ssh/sshd_config.d`, respectively.\n- Switched ptp_kvm from kernel builtin to module.\n- The default VM memory was bumped to 2 GB in the Qemu script and for VMware OVFs\n- The `docker build` command will now use buildx as its backend as the old one became deprecated and a loud \"DEPRECATED\" information is printed every time it's used.\n- The kernel security module Landlock is now enabled for programs to sandbox themselves ([flatcar/scripts#2158](https://github.com/flatcar/scripts/pull/2158))\n- The open-vm-tools package in VMware OEM now comes with vmhgfs-fuse, udev rules, pam and vgauth\n  - Torcx entered deprecation 2 years ago in favour of [deploying plain Docker binaries](https://www.flatcar.org/docs/latest/container-runtimes/use-a-custom-docker-or-containerd-version/)\n  - Torcx has been removed entirely; if you use torcx to extend the Flatcar base OS image, please refer to our [conversion script](https://www.flatcar.org/docs/latest/provisioning/sysext/#torcx-deprecation) and to the sysext documentation mentioned above for migrating.\n- **torcx was replaced by systemd-sysext in the OS image**. Learn more about sysext and how to customise OS images [here](https://www.flatcar.org/docs/latest/provisioning/sysext/).\n- Updated locksmith to use non-deprecated resource control options in the systemd unit ([Locksmith#20](https://github.com/flatcar/locksmith/pull/20))\n- Update generation SLSA provenance info from v0.2 to v1.0.\n    Using the btrfs driver can still be enforced by creating a respective [docker config](https://docs.docker.com/storage/storagedriver/btrfs-driver/#configure-docker-to-use-the-btrfs-storage-driver) at `/etc/docker/daemon.json`.\n- :warning: Dropped support for niftycloud and interoute. For interoute we haven't been generating the images for some time already. (TODO) :warning:\n    (which is now also a legacy option because systemd-sysext offers a more robust and better structured way of customisation, including OS independent updates).\n\n#### Updates\n- AWS: amazon-ssm-agent ([3.2.985.0](https://github.com/aws/amazon-ssm-agent/releases/tag/3.2.985.0))\n- Azure: WALinuxAgent ([2.9.1.1](https://github.com/Azure/WALinuxAgent/releases/tag/2.9.1.1))\n- Go ([1.21.13](https://go.dev/doc/devel/release#go1.21.13) (includes [1.20.14](https://go.dev/doc/devel/release#go1.20.14), [1.20.13](https://go.dev/doc/devel/release#go1.20.13), [1.20.12](https://go.dev/doc/devel/release#go1.20.12), [1.20.11](https://go.dev/doc/devel/release#go1.20.11), [1.20.10](https://go.dev/doc/devel/release#go1.20.10), [1.20.9](https://go.dev/doc/devel/release#go1.20.9), [1.20.8](https://go.dev/doc/devel/release#go1.20.8), [1.20.7](https://go.dev/doc/devel/release#go1.20.7), [1.20.6](https://go.dev/doc/devel/release#go1.20.6), [1.20.5](https://go.dev/doc/devel/release#go1.20.5), [1.20.4](https://go.dev/doc/devel/release#go1.20.4), [1.19.13](https://go.dev/doc/devel/release#go1.19.13), [1.19.12](https://go.dev/doc/devel/release#go1.19.12), [1.19.11](https://go.dev/doc/devel/release#go1.19.11), [1.19.10](https://go.dev/doc/devel/release#go1.19.10), [1.19.9](https://go.dev/doc/devel/release#go1.19.9), [1.19.8](https://go.dev/doc/devel/release#go1.19.8), [1.19.7](https://go.dev/doc/devel/release#go1.19.7), [1.19.6](https://go.dev/doc/devel/release#go1.19.6)))\n- Ignition ([2.19.0](https://coreos.github.io/ignition/release-notes/#ignition-2190-2024-06-05) (includes [2.18.0](https://coreos.github.io/ignition/release-notes/#ignition-2180-2024-03-01), [2.17.0](https://coreos.github.io/ignition/release-notes/#ignition-2170-2023-11-20), [2.16.2](https://coreos.github.io/ignition/release-notes/#ignition-2162-2023-07-12), [2.16.1](https://coreos.github.io/ignition/release-notes/#ignition-2161-2023-07-10), [2.16.0](https://coreos.github.io/ignition/release-notes/#ignition-2160-2023-06-29)))\n- Linux ([6.6.74](https://lwn.net/Articles/1006010) (includes [6.6.73](https://lwn.net/Articles/1005709), [6.6.72](https://lwn.net/Articles/1005383), [6.6.71](https://lwn.net/Articles/1004703), [6.6.70](https://lwn.net/Articles/1004551), [6.6.69](https://lwn.net/Articles/1003986), [6.6.68](https://lwn.net/Articles/1003609), [6.6.67](https://lwn.net/Articles/1002919), [6.6.66](https://lwn.net/Articles/1002177), [6.6.65](https://lwn.net/Articles/1001739), [6.6.64](https://lwn.net/Articles/1001438), [6.6.63](https://lwn.net/Articles/999110), [6.6.62](https://lwn.net/Articles/998450), [6.6.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.61), [6.6.60](https://lwn.net/Articles/997527), [6.6.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.59), [6.6.58](https://lwn.net/Articles/995132), [6.6.57](https://lwn.net/Articles/994634), [6.6.56](https://lwn.net/Articles/993600), [6.6.55](https://lwn.net/Articles/993599), [6.6.54](https://lwn.net/Articles/992980), [6.6.53](https://lwn.net/Articles/992296), [6.6.52](https://lwn.net/Articles/990767/), [6.6.51](https://lwn.net/Articles/990045), [6.6.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.50), [6.6.49](https://lwn.net/Articles/988749), [6.6.48](https://lwn.net/Articles/987679), [6.6.47](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.47), [6.6.46](https://lwn.net/Articles/985672), [6.6.45](https://lwn.net/Articles/985200), [6.6.44](https://lwn.net/Articles/984450), [6.6.43](https://lwn.net/Articles/983655), [6.6.42](https://lwn.net/Articles/983333), [6.6.41](https://lwn.net/Articles/982381), [6.6.40](https://lwn.net/Articles/982050), [6.6.39](https://lwn.net/Articles/981719), [6.6.38](https://lwn.net/Articles/981255), [6.6.37](https://lwn.net/Articles/980860), [6.6.36](https://lwn.net/Articles/979850), [6.6.35](https://lwn.net/Articles/979262), [6.6.34](https://lwn.net/Articles/978593), [6.6.33](https://lwn.net/Articles/978141), [6.6.32](https://lwn.net/Articles/975075), [6.6.31](https://lwn.net/Articles/974072), [6.6.30](https://lwn.net/Articles/972211), [6.6.29](https://lwn.net/Articles/971363), [6.6.28](https://lwn.net/Articles/970172), [6.6.27](https://lwn.net/Articles/969734), [6.6.26](https://lwn.net/Articles/969352), [6.6.25](https://lwn.net/Articles/968470), [6.6.24](https://lwn.net/Articles/968253), [6.6.23](https://lwn.net/Articles/966758), [6.6.22](https://lwn.net/Articles/965606), [6.6.21](https://lwn.net/Articles/964561), [6.6.20](https://lwn.net/Articles/964307), [6.6.19](https://lwn.net/Articles/964173), [6.6.18](https://lwn.net/Articles/963357), [6.6.17](https://lwn.net/Articles/962558), [6.6.16](https://lwn.net/Articles/961011), [6.6.15](https://lwn.net/Articles/960441), [6.6.14](https://lwn.net/Articles/959512), [6.6.13](https://lwn.net/Articles/958862), [6.6.12](https://lwn.net/Articles/958342), [6.6.11](https://lwn.net/Articles/957375), [6.6.10](https://lwn.net/Articles/957008), [6.6.9](https://lwn.net/Articles/956525), [6.6.8](https://lwn.net/Articles/955813), [6.6.7](https://lwn.net/Articles/954990/), [6.6](https://kernelnewbies.org/Linux_6.6), [6.1.66](https://lwn.net/Articles/954112), [6.1.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.65), [6.1.64](https://lwn.net/Articles/953132), [6.1.63](https://lwn.net/Articles/952003), [6.1.62](https://lwn.net/Articles/950700), [6.1.61](https://lwn.net/Articles/949826), [6.1.60](https://lwn.net/Articles/948817), [6.1.59](https://lwn.net/Articles/948297), [6.1.58](https://lwn.net/Articles/947820), [6.1.57](https://lwn.net/Articles/947298), [6.1.56](https://lwn.net/Articles/946854), [6.1.55](https://lwn.net/Articles/945379), [6.1.54](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.54), [6.1.53](https://lwn.net/Articles/944358), [6.1.52](https://lwn.net/Articles/943754), [6.1.51](https://lwn.net/Articles/943403), [6.1.50](https://lwn.net/Articles/943112), [6.1.49](https://lwn.net/Articles/942880), [6.1.48](https://lwn.net/Articles/942865), [6.1.47](https://lwn.net/Articles/942531), [6.1.46](https://lwn.net/Articles/941774), [6.1.45](https://lwn.net/Articles/941273), [6.1.44](https://lwn.net/Articles/940800), [6.1.43](https://lwn.net/Articles/940338), [6.1.42](https://lwn.net/Articles/939423), [6.1.41](https://lwn.net/Articles/939103), [6.1.40](https://lwn.net/Articles/939015), [6.1.39](https://lwn.net/Articles/938619), [6.1.38](https://lwn.net/Articles/937403), [6.1.37](https://lwn.net/Articles/937082), [6.1.36](https://lwn.net/Articles/936674), [6.1.35](https://lwn.net/Articles/935588), [6.1.34](https://lwn.net/Articles/934623), [6.1.33](https://lwn.net/Articles/934319), [6.1.32](https://lwn.net/Articles/933908), [6.1.31](https://lwn.net/Articles/933281), [6.1.30](https://lwn.net/Articles/932882), [6.1.29](https://lwn.net/Articles/932133), [6.1.28](https://lwn.net/Articles/931651), [6.1.27](https://lwn.net/Articles/930597/), [6.1](https://kernelnewbies.org/Linux_6.1), [5.15.108](https://lwn.net/Articles/929679/), [5.15.107](https://lwn.net/Articles/929015/), [5.15.106](https://lwn.net/Articles/928343), [5.15.105](https://lwn.net/Articles/927860), [5.15.104](https://lwn.net/Articles/926873), [5.15.103](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.103), [5.15.102](https://lwn.net/Articles/925991), [5.15.101](https://lwn.net/Articles/925939), [5.15.100](https://lwn.net/Articles/925913), [5.15.99](https://lwn.net/Articles/925844)))\n- Linux Firmware ([20240811](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240811) (includes [20240709](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240709), [20240610](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240610), [20240513](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240513), [20240410](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240410), [20240312](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240312), [20240220](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240220), [20240115](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240115), [20231211](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231211), [20231111](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231111), [20231030](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231030), [20230919](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230919), [20230804](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230804), [20230625](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625), [20230515](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230515), [20230404](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230404), [20230310](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230310), [20230210](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230210)))\n- SDK: Rust ([1.80.1](https://github.com/rust-lang/rust/releases/tag/1.80.1) (includes [1.80.0](https://github.com/rust-lang/rust/releases/tag/1.80.0), [1.79.0](https://github.com/rust-lang/rust/releases/tag/1.79.0), [1.78.0](https://github.com/rust-lang/rust/releases/tag/1.78.0), [1.77.2](https://github.com/rust-lang/rust/releases/tag/1.77.2), [1.77.1](https://github.com/rust-lang/rust/releases/tag/1.77.1), [1.77.0](https://github.com/rust-lang/rust/releases/tag/1.77.0), [1.76.0](https://github.com/rust-lang/rust/releases/tag/1.76.0), [1.75.0](https://github.com/rust-lang/rust/releases/tag/1.75.0), [1.74.1](https://github.com/rust-lang/rust/releases/tag/1.74.1), [1.73.0](https://github.com/rust-lang/rust/releases/tag/1.73.0), [1.72.1](https://github.com/rust-lang/rust/releases/tag/1.72.1), [1.72.0](https://github.com/rust-lang/rust/releases/tag/1.72.0), [1.71.1](https://github.com/rust-lang/rust/releases/tag/1.71.1), [1.71.0](https://github.com/rust-lang/rust/releases/tag/1.71.0), [1.70.0](https://github.com/rust-lang/rust/releases/tag/1.70.0), [1.68.2](https://github.com/rust-lang/rust/releases/tag/1.68.2), [1.68.0](https://github.com/rust-lang/rust/releases/tag/1.68.0), [1.67.1](https://github.com/rust-lang/rust/releases/tag/1.67.1)))\n- SDK: cmake ([3.25.2](https://cmake.org/cmake/help/v3.25/release/3.25.html))\n- SDK: dnsmasq ([2.89](https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q1/016859.html))\n- SDK: go ([1.21.12](https://go.dev/doc/devel/release#go1.21.12) (includes [1.21](https://go.dev/doc/go1.21)))\n- SDK: make ([4.4.1](https://lists.gnu.org/archive/html/info-gnu/2023-02/msg00011.html) (includes [4.4](https://lists.gnu.org/archive/html/help-make/2022-10/msg00020.html)))\n- SDK: man-db ([2.11.2](https://gitlab.com/man-db/man-db/-/tags/2.11.2))\n- SDK: man-pages ([6.03](https://lore.kernel.org/lkml/d56662b2-538c-7252-9052-8afbf325f843@gmail.com/T/))\n- SDK: meson ([1.5.1](https://mesonbuild.com/Release-notes-for-1-5-0.html))\n- SDK: nano ([7.2](https://git.savannah.gnu.org/cgit/nano.git/tree/NEWS?h=v7.2))\n- SDK: nasm ([2.16.01](https://github.com/netwide-assembler/nasm/releases/tag/nasm-2.16.01))\n- SDK: pahole ([1.27](https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.27) (includes [1.25](https://github.com/acmel/dwarves/blob/master/changes-v1.25), [1.24](https://github.com/acmel/dwarves/releases/tag/v1.24)))\n- SDK: perf ([6.3](https://kernelnewbies.org/LinuxChanges#Linux_6.3.Tracing.2C_perf_and_BPF))\n- SDK: perl ([5.38.2](https://perldoc.perl.org/5.38.2/perldelta) (includes [5.36.1](https://perldoc.perl.org/perl5361delta)))\n- SDK: portage ([3.0.65](https://github.com/gentoo/portage/blob/f03998622e0960388e903de0d6d24bdf6881e567/NEWS#L9) (includes [3.0.63](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.63), [3.0.61](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.61), [3.0.59](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.59), [3.0.49](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.49), [3.0.46](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.46), [3.0.44](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.44)))\n- SDK: python ([3.11.9](https://www.get-python.org/downloads/release/python-3119/) (includes [3.11.8](https://www.get-python.org/downloads/release/python-3118/), [3.11.7](https://www.python.org/downloads/release/python-3117/), [3.11.6](https://docs.python.org/release/3.11.6/whatsnew/changelog.html#python-3-11-6), [3.11.5](https://www.python.org/downloads/release/python-3115/), [3.11.3](https://www.python.org/downloads/release/python-3113/), [3.10.12](https://www.python.org/downloads/release/python-31012/), [3.10.11](https://www.python.org/downloads/release/python-31011/), [3.10.10](https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-10-final), [3.10.9](https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-9-final), [3.10](https://www.python.org/downloads/release/python-3100/)))\n- SDK: python-packaging ([23.2](https://github.com/pypa/packaging/releases/tag/23.2))\n- SDK: python-platformdirs ([3.11.0](https://github.com/platformdirs/platformdirs/releases/tag/3.11.0))\n- SDK: qemu ([8.2.3](https://wiki.qemu.org/ChangeLog/8.2) (includes [8.0.4](https://wiki.qemu.org/ChangeLog/8.0), [8.1.5](https://wiki.qemu.org/ChangeLog/8.1), [8.0.3](https://wiki.qemu.org/ChangeLog/8.0), [7.2.3](https://wiki.qemu.org/ChangeLog/7.2)))\n- SDK: repo (2.37)\n- VMware: libdnet ([1.16.2](https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.2) (includes [1.16](https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16)))\n- VMware: open-vm-tools ([12.3.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.5) (includes [12.3.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0), [12.2.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.5)))\n- acl ([2.3.2](https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00012.html))\n- acpid ([2.0.34](https://sourceforge.net/p/acpid2/code/ci/2.0.34/tree/Changelog))\n- afterburn ([5.6.0](https://coreos.github.io/afterburn/release-notes/#afterburn-560) (includes [5.5.1](https://github.com/coreos/afterburn/releases/tag/v5.5.1), [5.5.0](https://github.com/coreos/afterburn/releases/tag/v5.5.0)))\n- attr ([2.5.2](https://lists.nongnu.org/archive/html/acl-devel/2024-01/msg00011.html))\n- audit ([3.1.2](https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.2) (includes [3.1.1](https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.1)))\n- azure: azure-nvme-utils ([0.2.0](https://github.com/Azure/azure-nvme-utils/releases/tag/v0.2.0))\n- bash ([5.2_p21](https://git.savannah.gnu.org/cgit/bash.git/log/?id=2bb3cbefdb8fd019765b1a9cc42ecf37ff22fec6) (includes [5.2](https://lists.gnu.org/archive/html/bash-announce/2022-09/msg00000.html)))\n- bind-tools ([9.16.48](https://bind9.readthedocs.io/en/v9.16.48/notes.html#notes-for-bind-9-16-48) (includes [9.16.42](https://bind9.readthedocs.io/en/v9.16.42/notes.html#notes-for-bind-9-16-42), [9.16.41](https://bind9.readthedocs.io/en/v9.16.41/notes.html#notes-for-bind-9-16-41), [9.16.37](https://bind9.readthedocs.io/en/v9_16_37/notes.html#notes-for-bind-9-16-37)))\n- binutils ([2.42](https://sourceware.org/pipermail/binutils/2024-January/132213.html) (includes [2.41](https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00009.html), [2.40](https://lists.gnu.org/archive/html/info-gnu/2023-01/msg00003.html)))\n- bpftool ([6.9.2](https://kernelnewbies.org/Linux_6.9#Tracing.2C_perf_and_BPF) (includes [6.8.2](https://kernelnewbies.org/Linux_6.8#Tracing.2C_perf_and_BPF), [6.7.6](https://kernelnewbies.org/Linux_6.7#Tracing.2C_probing_and_BPF), [6.5.7](https://kernelnewbies.org/Linux_6.5#Tracing.2C_perf_and_BPF), [6.3](https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/log/tools/bpf/bpftool?h=v6.3), [6.2.1](https://kernelnewbies.org/LinuxChanges#Linux_6.2.Tracing.2C_perf_and_BPF)))\n- btrfs-progs ([6.9.2](https://github.com/kdave/btrfs-progs/blob/v6.9.2/CHANGES) (includes [6.0.2](https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2-2022-11-24), [6.0](https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2022-10-11)))\n- c-ares ([1.29.0](https://github.com/c-ares/c-ares/releases/tag/cares-1_29_0) (includes [1.28.1](https://github.com/c-ares/c-ares/releases/tag/cares-1_28_1), [1.28.0](https://github.com/c-ares/c-ares/releases/tag/cares-1_28_0), [1.27.0](https://github.com/c-ares/c-ares/releases/tag/cares-1_27_0), [1.26.0](https://github.com/c-ares/c-ares/releases/tag/cares-1_26_0), [1.25.0](https://c-ares.org/changelog.html#1_25_0), [1.21.0](https://c-ares.org/changelog.html#1_21_0), [1.19.1](https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1), [1.19.0](https://c-ares.org/changelog.html#1_19_0)))\n- cJSON ([1.7.18](https://github.com/DaveGamble/cJSON/releases/tag/v1.7.18) (includes [1.7.17](https://github.com/DaveGamble/cJSON/releases/tag/v1.7.17), [1.7.16](https://github.com/DaveGamble/cJSON/releases/tag/v1.7.16)))\n- checkpolicy ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6) (includes [3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5)))\n- cifs-utils ([7.0](https://lists.samba.org/archive/samba-technical/2022-August/137528.html))\n- conntrack-tools ([1.4.8](https://lwn.net/Articles/945927/))\n- containerd ([1.7.21](https://github.com/containerd/containerd/releases/tag/v1.7.21) (includes [1.7.20](https://github.com/containerd/containerd/releases/tag/v1.7.20), [1.7.19](https://github.com/containerd/containerd/releases/tag/v1.7.19), [1.7.18](https://github.com/containerd/containerd/releases/tag/v1.7.18), [1.7.17](https://github.com/containerd/containerd/releases/tag/v1.7.17), [1.7.16](https://github.com/containerd/containerd/releases/tag/v1.7.16), [1.7.15](https://github.com/containerd/containerd/releases/tag/v1.7.15), [1.7.14](https://github.com/containerd/containerd/releases/tag/v1.7.14), [1.7.13](https://github.com/containerd/containerd/releases/tag/v1.7.13), [1.7.12](https://github.com/containerd/containerd/releases/tag/v1.7.12), [1.7.11](https://github.com/containerd/containerd/releases/tag/v1.7.11), [1.7.10](https://github.com/containerd/containerd/releases/tag/v1.7.10), [1.7.9](https://github.com/containerd/containerd/releases/tag/v1.7.9), [1.7.8](https://github.com/containerd/containerd/releases/tag/v1.7.8), [1.7.7](https://github.com/containerd/containerd/releases/tag/v1.7.7), [1.7.6](https://github.com/containerd/containerd/releases/tag/v1.7.6), [1.7.5](https://github.com/containerd/containerd/releases/tag/v1.7.5), [1.7.4](https://github.com/containerd/containerd/releases/tag/v1.7.4), [1.7.3](https://github.com/containerd/containerd/releases/tag/v1.7.3), [1.7.2](https://github.com/containerd/containerd/releases/tag/v1.7.2), [1.6.21](https://github.com/containerd/containerd/releases/tag/v1.6.21), [1.6.20](https://github.com/containerd/containerd/releases/tag/v1.6.20), [1.6.19](https://github.com/containerd/containerd/releases/tag/v1.6.19), [1.6.18](https://github.com/containerd/containerd/releases/tag/v1.6.18)))\n- coreutils ([9.5](https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00006.html) (includes [9.4](https://lists.gnu.org/archive/html/info-gnu/2023-08/msg00007.html), [9.3](https://lists.gnu.org/archive/html/info-gnu/2023-04/msg00006.html), [9.1](https://git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?h=v9.1)))\n- cri-tools ([1.27.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.0))\n- cryptsetup ([2.7.2](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.2/docs/v2.7.2-ReleaseNotes) (includes [2.7.1](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.1/docs/v2.7.1-ReleaseNotes), [2.7.0](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.0/docs/v2.7.0-ReleaseNotes), [2.6.1](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.1/docs/v2.6.1-ReleaseNotes), [2.6.0](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.0/docs/v2.6.0-ReleaseNotes), [2.5.0](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.5.0/docs/v2.5.0-ReleaseNotes)))\n- curl ([8.9.1](https://curl.se/ch/8.9.1.html) (includes [8.9.0](https://curl.se/ch/8.9.0.html), [8.8.0](https://curl.se/changes.html#8_8_0), [8.7.1](https://curl.se/changes.html#8_7_1), [8.7.0](https://curl.se/changes.html#8_7_0), [8.6.0](https://curl.se/changes.html#8_6_0), [8.5.0](https://curl.se/changes.html#8_5_0), [8.4.0](https://curl.se/changes.html#8_4_0), [8.3.0](https://curl.se/changes.html#8_3_0), [8.2.1](https://curl.se/changes.html#8_2_1), [8.2.0](https://curl.se/changes.html#8_2_0), [8.1.2](https://curl.se/changes.html#8_1_2), [8.1.0](https://curl.se/changes.html#8_1_0), [8.0.1](https://curl.se/changes.html#8_0_1), [7.88.1](https://curl.se/changes.html#7_88_1), [7.88.0](https://curl.se/changes.html#7_88_0)))\n- debianutils ([5.7](https://metadata.ftp-master.debian.org/changelogs//main/d/debianutils/debianutils_5.7-0.4_changelog))\n- dev: iperf ([3.15](https://github.com/esnet/iperf/releases/tag/3.15))\n- dev: minicom ([2.9](https://salsa.debian.org/minicom-team/minicom/-/releases/2.9))\n- dev: smartmontools ([7.4](https://www.smartmontools.org/browser/tags/RELEASE_7_4/smartmontools/NEWS))\n- diffutils ([3.10](https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00009.html) (includes [3.9](https://savannah.gnu.org/forum/forum.php?forum_id=10282)))\n- ding-libs ([0.6.2](https://github.com/SSSD/ding-libs/releases/tag/0.6.2))\n- e2fsprogs ([1.47.1](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.1) (includes [1.47.0](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html##1.47.0), [1.46.6](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.6)))\n- efibootmgr ([18](https://github.com/rhboot/efibootmgr/releases/tag/18))\n- efivar ([38](https://github.com/rhboot/efivar/releases/tag/38))\n- elfutils ([0.191](https://inbox.sourceware.org/elfutils-devel/CAJDtP-SJhJ8cjTpkNpi+F0nzVJ2pZsEai8Ewpp4yJmsO_H5-NA@mail.gmail.com/T/#u) (includes [0.190](https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=0420d3b8376877c1b11712f1aad90a2e2b6f6d06;hb=c1058da5a450e33e72b72abb53bc3ffd7f6b361b), [0.189](https://sourceware.org/pipermail/elfutils-devel/2023q1/006023.html)))\n- ethtool ([6.9](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.9) (includes [6.7](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.7), [6.6](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.6), [6.5](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.5), [6.4](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.4), [6.3](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=7bdf78f0d2a9ae1571fe9444e552490130e573fd), [6.2](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.2)))\n- expat ([2.6.3](https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes) (includes [2.6.2](https://github.com/libexpat/libexpat/blob/R_2_6_2/expat/Changes), [2.6.1](https://github.com/libexpat/libexpat/blob/R_2_6_1/expat/Changes), [2.6.0](https://github.com/libexpat/libexpat/blob/R_2_6_0/expat/Changes)))\n- file ([5.45](https://github.com/file/file/blob/FILE5_45/ChangeLog))\n- findutils ([4.10.0](https://git.savannah.gnu.org/cgit/findutils.git/tree/NEWS?h=v4.10.0) (includes [4.9.0](https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00003.html)))\n- gawk ([5.3.0](https://lwn.net/Articles/949829/) (includes [5.2.2](https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00008.html)))\n- gcc ([13.3.1_p20240614](https://gcc.gnu.org/gcc-13/changes.html) (includes [13.2](https://gcc.gnu.org/gcc-13/changes.html), [12.2.1](https://gcc.gnu.org/gcc-12/changes.html)))\n- gdb ([13.2](https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00011.html) (includes [13.1.90](https://lwn.net/Articles/923819/)))\n- gdbm ([1.23](https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00004.html))\n- gentoolkit ([0.6.3](https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.3))\n- gettext ([0.22.4](https://savannah.gnu.org/news/?id=10544))\n- gflags ([2.2.2](https://github.com/gflags/gflags/releases/tag/v2.2.2))\n- git ([2.44.2](https://github.com/git/git/blob/v2.44.2/Documentation/RelNotes/2.44.2.txt) (includes [2.44.1](https://github.com/git/git/blob/v2.44.1/Documentation/RelNotes/2.44.1.txt), [2.44.0](https://github.com/git/git/blob/v2.44.0/Documentation/RelNotes/2.44.0.txt), [2.43.2](https://github.com/git/git/blob/v2.43.2/Documentation/RelNotes/2.43.2.txt), [2.43.0](https://github.com/git/git/blob/v2.43.0/Documentation/RelNotes/2.43.0.txt), [2.42.0](https://github.com/git/git/blob/v2.42.0/Documentation/RelNotes/2.42.0.txt), [2.41.0](https://lore.kernel.org/git/xmqqleh3a3wm.fsf@gitster.g/), [2.39.3](https://github.com/git/git/blob/v2.39.3/Documentation/RelNotes/2.39.3.txt), [2.39.2](https://github.com/git/git/blob/v2.39.2/Documentation/RelNotes/2.39.2.txt)))\n- glib ([2.78.6](https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.6) (includes [2.78.5](https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.5), [2.78.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.4), [2.78.3](https://gitlab.gnome.org/GNOME/glib/-/blob/2.78.3/NEWS), [2.76.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.4), [2.76.3](https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.3), [2.76.2](https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.2), [2.74.6](https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.6), [2.74.5](https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.5)))\n- glibc ([2.38](https://sourceware.org/pipermail/libc-alpha/2023-July/150524.html) (includes [2.37](https://sourceware.org/git/?p=glibc.git;a=tag;h=refs/tags/glibc-2.37)))\n- glog ([0.6.0](https://github.com/google/glog/releases/tag/v0.6.0))\n- gmp ([6.3.0](https://gmplib.org/gmp6.3))\n- gnuconfig ([20230731](https://git.savannah.gnu.org/cgit/config.git/log/?id=d4e37b5868ef910e3e52744c34408084bb13051c))\n- gnupg ([2.4.5](https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000482.html) (includes [2.4.4](https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000481.html), [2.2.42](https://dev.gnupg.org/T6307)))\n- gnutls ([3.8.5](https://lists.gnupg.org/pipermail/gnutls-help/2024-April/004846.html) (includes [3.8.4](https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html), [3.8.2](https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html), [3.8.0](https://gitlab.com/gnutls/gnutls/-/blob/3.8.0/NEWS)))\n- gptfdisk ([1.0.9](https://sourceforge.net/p/gptfdisk/code/ci/1d46f3723bc25f5598266f7d9a3548af3cee0c77/tree/NEWS))\n- grep ([3.11](https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00004.html) (includes [3.8](http://savannah.gnu.org/forum/forum.php?forum_id=10227)))\n- groff ([1.23.0](https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00001.html))\n- grub ([2.06](https://lists.gnu.org/archive/html/grub-devel/2021-06/msg00022.html))\n- gzip ([1.13](https://savannah.gnu.org/news/?id=10501))\n- hwdata ([0.383](https://github.com/vcrhonek/hwdata/compare/v0.382...v0.383) (includes [0.382](https://github.com/vcrhonek/hwdata/commits/v0.382), [0.376](https://github.com/vcrhonek/hwdata/commits/v0.376), [0.375](https://github.com/vcrhonek/hwdata/releases/tag/v0.375), [0.374](https://github.com/vcrhonek/hwdata/commits/v0.374), [0.373](https://github.com/vcrhonek/hwdata/commits/v0.373), [0.372](https://github.com/vcrhonek/hwdata/commits/v0.372), [0.371](https://github.com/vcrhonek/hwdata/commits/v0.371), [0.367](https://github.com/vcrhonek/hwdata/releases/tag/v0.367)))\n- ignition ([2.15.0](https://coreos.github.io/ignition/release-notes/#ignition-2150-2023-02-21))\n- inih ([58](https://github.com/benhoyt/inih/releases/tag/r58) (includes [57](https://github.com/benhoyt/inih/releases/tag/r57), [56](https://github.com/benhoyt/inih/releases/tag/r56)))\n- intel-microcode ([20240514_p20240514](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514) (includes [20240312](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312), [20231114_p20231114](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114), [20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230808), [20230613](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230613), [20230512](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230512), [20230214](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214)))\n- iperf ([3.16](https://github.com/esnet/iperf/releases/tag/3.16) (includes [3.14](https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-314-2023-07-07), [3.13](https://github.com/esnet/iperf/blob/3.13/RELNOTES.md)))\n- iproute2 ([6.8.0](https://lwn.net/Articles/965125/) (includes [6.7.0](https://lwn.net/Articles/957171/), [6.6.0](https://marc.info/?l=linux-netdev&m=169929000929786&w=2), [6.5.0](https://marc.info/?l=linux-netdev&m=169401822317373&w=2), [6.4.0](https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/?h=v6.4.0), [6.3.0](https://lwn.net/Articles/930473/), [6.2.0](https://lwn.net/Articles/923952/)))\n- ipset ([7.22](https://ipset.netfilter.org/changelog.html) (includes [7.21](https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.21), [7.20](https://git.netfilter.org/ipset/tree/ChangeLog?h=v7.20), [7.19](https://git.netfilter.org/ipset/tree/ChangeLog?id=ce6db35a0ea950e850ebe7c50ce46908c1c3bb2b), [7.17](https://git.netfilter.org/ipset/tree/ChangeLog?id=186f9b57c60bb53aae5f6633eff1e9d5e9095c3e)))\n- iputils ([20240117](https://github.com/iputils/iputils/releases/tag/20240117) (includes [20231222](https://github.com/iputils/iputils/releases/tag/20231222), [20221126](https://github.com/iputils/iputils/releases/tag/20221126)))\n- ipvsadm ([1.31](https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.31) (includes [1.30](https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.30), [1.29](https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.29), [1.28](https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.28)))\n- jq ([1.7.1](https://github.com/jqlang/jq/releases/tag/jq-1.7.1) (includes [1.7](https://github.com/jqlang/jq/releases/tag/jq-1.7)))\n- json-c ([0.17](https://github.com/json-c/json-c/blob/json-c-0.17-20230812/ChangeLog))\n- kbd ([2.6.4](https://github.com/legionus/kbd/releases/tag/v2.6.4) (includes [2.6.1](https://github.com/legionus/kbd/releases/tag/v2.6.1), [2.6.0](https://github.com/legionus/kbd/releases/tag/v2.6.0), [2.5.1](https://github.com/legionus/kbd/releases/tag/v2.5.1)))\n- kexec-tools ([2.0.28](https://github.com/horms/kexec-tools/commits/v2.0.28/) (includes [2.0.24](https://github.com/horms/kexec-tools/releases/tag/v2.0.24)))\n- keyutils ([1.6.3](https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=cb3bb194cca88211cbfcdde2f10c0f43c3fb8ec3) (includes [1.6.2](https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git/commit/?id=454f80f537e5d1aad506599b6776e4cc1cf5f0f2)))\n- kmod ([32](https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/tree/NEWS?h=v32) (includes [31](https://github.com/kmod-project/kmod/blob/v31/NEWS), [30](https://lwn.net/Articles/899526/)))\n- ldb ([2.4.4](https://gitlab.com/samba-team/samba/-/commit/b686ef00da46d4a0c0aba0c61b1866cbc9b462b6) (includes [2.4.3](https://gitlab.com/samba-team/samba/-/commit/604f94704f30e90ef960aa2be62a14d2e614a002), [2.4.2](https://gitlab.com/samba-team/samba/-/commit/d93892d2e8ed69758c15ab18bc03bba09e715bc6)))\n- less ([643](https://www.greenwoodsoftware.com/less/news.643.html) (includes [633](http://www.greenwoodsoftware.com/less/news.633.html), [632](http://www.greenwoodsoftware.com/less/news.632.html), [608](http://www.greenwoodsoftware.com/less/news.608.html)))\n- libarchive ([3.7.4](https://github.com/libarchive/libarchive/releases/tag/v3.7.4) (includes [3.7.3](https://github.com/libarchive/libarchive/releases/tag/v3.7.3), [3.7.2](https://github.com/libarchive/libarchive/releases/tag/v3.7.2), [3.7.1](https://github.com/libarchive/libarchive/releases/tag/v3.7.1), [3.7.0](https://github.com/libarchive/libarchive/releases/tag/v3.7.0), [3.6.2](https://github.com/libarchive/libarchive/releases/tag/v3.6.2)))\n- libassuan ([2.5.7](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=047f12b7c3ee0c8c1718a2da8b5a6bb9dd541fd8;hb=cc2f776904e0b5e56e2b81b2672ca98d7787ed1b) (includes [2.5.6](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=e52bb5dd36ac93ea227e53e89f82af9ccf38f339;hb=6b50ee6bcdd6aa81bd7cc3fb2379864c3ed479b8)))\n- libbsd ([0.11.8](https://lists.freedesktop.org/archives/libbsd/2024-January/000377.html) (includes [0.11.7](https://lists.freedesktop.org/archives/libbsd/2022-October/000337.html)))\n- libcap ([2.70](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.hde102t8xd0v) (includes [2.69](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe)))\n- libcap-ng ([0.8.5](https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.5) (includes [0.8.4](https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.4)))\n- libdnet ([1.18.0](https://github.com/ofalk/libdnet/releases/tag/libdnet-1.18.0) (includes [1.16.4](https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.4)))\n- libffi ([3.4.4](https://github.com/libffi/libffi/releases/tag/v3.4.4) (includes [3.4.3](https://github.com/libffi/libffi/releases/tag/v3.4.3), [3.4.2](https://github.com/libffi/libffi/releases/tag/v3.4.2)))\n- libgcrypt ([1.10.3](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=b767dc1170eb479b9a311cca4074c58e4eedaf0b;hb=aa1610866f8e42bdc272584f0a717f32ee050a22) (includes [1.10.2](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=c9a239615f8070427a96688b1be40a81e59e9b8a;hb=1c5cbacf3d88dded5063e959ee68678ff7d0fa56), [1.10.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=03132c2a115e35783a782c64777cf5f5b1a2825f;hb=ae0e567820c37f9640440b3cff77d7c185aa6742)))\n- libgpg-error ([1.49](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=8ac4bf36113fe9254a361e2bc8d0ed52383839ce;hb=faed9c271ad22bbd2ed265d8e11badb53b7a2f32) (includes [1.47](https://dev.gnupg.org/T6231), [1.46](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=14b0ba97d6ba2b10b3178f2e4a3e24bfc2355bb3;hb=ea031873aa9642831017937fd33e9009d514ee07)))\n- libidn2 ([2.3.7](https://gitlab.com/libidn/libidn2/-/blob/v2.3.7/NEWS) (includes [2.3.4](https://gitlab.com/libidn/libidn2/-/releases/v2.3.4)))\n- libksba ([1.6.7](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=3d2d5a47688bb6214efaf02f5ab29f6e64433a97;hb=b14e68b97df754b2bb7a90bb904d143d8e896afb) (includes [1.6.6](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=48b42025773e88fbb78d015d1f154fef4c80ef9f;hb=5b220df6f8216a9d5f6139c7b17f075374a27480), [1.6.5](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=369cfb5d91bf232685a6c5b156453a624e11ed67;hb=7b3e4785e54280d1a13c5bc839bdc6722d898ac7), [1.6.4](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=f640523209c1c9ce9855040e53914a79d24d6a67;hb=557999424ebd13e70d6fc17e648a5dd2a06f440b)))\n- liblinear (246)\n- libmd ([1.1.0](https://git.hadrons.org/cgit/libmd.git/log/?h=1.1.0))\n- libmicrohttpd ([1.0.1](https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00005.html) (includes [1.0.0](https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00000.html), [0.9.77](https://gitlab.com/libmicrohttpd/libmicrohttpd/-/releases/v0.9.77), [0.9.76](https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html)))\n- libmnl ([1.0.5](https://git.netfilter.org/libmnl/log/?h=libmnl-1.0.5))\n- libnetfilter_conntrack ([1.0.9](https://git.netfilter.org/libnetfilter_conntrack/log/?h=libnetfilter_conntrack-1.0.9))\n- libnetfilter_cthelper ([1.0.1](https://git.netfilter.org/libnetfilter_cthelper/log/?id=8cee0347cc6969c39bb64000dfaa676a8f9e30f0))\n- libnetfilter_cttimeout ([1.0.1](https://git.netfilter.org/libnetfilter_cttimeout/log/?id=068d36d6291f53a0a609ab1f695aa06e94ce3d30))\n- libnfnetlink ([1.0.2](https://git.netfilter.org/libnfnetlink/log/?h=libnfnetlink-1.0.2))\n- libnftnl ([1.2.6](https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.6) (includes [1.2.5](https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.5)))\n- libnl ([3.9.0](http://lists.infradead.org/pipermail/libnl/2023-December/002436.html) (includes [3.8.0](https://github.com/thom311/libnl/compare/libnl3_7_0...libnl3_8_0)))\n- libnsl ([2.0.1](https://github.com/thkukuk/libnsl/releases/tag/v2.0.1))\n- libnvme ([1.9](https://github.com/linux-nvme/libnvme/releases/tag/v1.9) (includes [1.8](https://github.com/linux-nvme/libnvme/releases/tag/v1.8), [1.7.1](https://github.com/linux-nvme/libnvme/releases/tag/v1.7.1), [1.7](https://github.com/linux-nvme/libnvme/releases/tag/v1.7), [1.5](https://github.com/linux-nvme/libnvme/releases/tag/v1.5)))\n- libpcap ([1.10.4](https://github.com/the-tcpdump-group/libpcap/blob/24832dd2728bd95ed9b9464ef27b47a943c38003/CHANGES#L51) (includes [1.10.3](https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.3:/CHANGES), [1.10.2](https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.2:/CHANGES)))\n- libpcre (8.45)\n- libpcre2 ([10.43](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.43/NEWS) (includes [10.42](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.42/NEWS)))\n- libpipeline ([1.5.7](https://gitlab.com/libpipeline/libpipeline/-/tags/1.5.7))\n- libpng ([1.6.43](https://github.com/pnggroup/libpng/blob/v1.6.43/ANNOUNCE) (includes [1.6.42](https://github.com/pnggroup/libpng/blob/v1.6.42/ANNOUNCE), [1.6.41](https://github.com/pnggroup/libpng/blob/v1.6.41/ANNOUNCE)))\n- libpsl ([0.21.5](https://github.com/rockdaboot/libpsl/blob/0.21.5/NEWS))\n- libseccomp ([2.5.5](https://github.com/seccomp/libseccomp/releases/tag/v2.5.5))\n- libselinux ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6) (includes [3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5)))\n- libsemanage ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6) (includes [3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5)))\n- libsepol ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6) (includes [3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5)))\n- libsodium ([1.0.19](https://github.com/jedisct1/libsodium/releases/tag/1.0.19-RELEASE))\n- libtirpc ([1.3.4](https://marc.info/?l=linux-nfs&m=169667640909830&w=2))\n- libunistring ([1.2](https://savannah.gnu.org/news/?id=10599) (includes [1.1](https://git.savannah.gnu.org/gitweb/?p=libunistring.git;a=blob;f=NEWS;h=5a43ddd7011d62a952733f6c0b7ad52aa4f385c7;hb=8006860b710aae2e8442088c3ddc7d819dfa8ac7)))\n- libunwind ([1.8.1](https://github.com/libunwind/libunwind/releases/tag/v1.8.1) (includes [1.8.0](https://github.com/libunwind/libunwind/releases/tag/v1.8.0), [1.7.2](https://github.com/libunwind/libunwind/releases/tag/v1.7.2), [1.7.0](https://github.com/libunwind/libunwind/releases/tag/v1.7.0)))\n- liburing ([2.3](https://github.com/axboe/liburing/blob/liburing-2.3/CHANGELOG))\n- libusb ([1.0.27](https://github.com/libusb/libusb/blob/v1.0.27/ChangeLog) (includes [1.0.26](https://github.com/libusb/libusb/blob/v1.0.26/ChangeLog)))\n- libuv ([1.48.0](https://github.com/libuv/libuv/releases/tag/v1.48.0) (includes [1.47.0](https://github.com/libuv/libuv/releases/tag/v1.47.0), [1.46.0](https://github.com/libuv/libuv/releases/tag/v1.46.0), [1.45.0](https://github.com/libuv/libuv/releases/tag/v1.45.0)))\n- libverto ([0.3.2](https://github.com/latchset/libverto/releases/tag/0.3.2))\n- libxml2 ([2.12.7](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7) (includes [2.12.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.6), [2.12.5](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.5), [2.12.4](https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.12.4/NEWS), [2.11.5](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.5), [2.11.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4), [2.10.4](https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.4)))\n- libxslt ([1.1.39](https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.39) (includes [1.1.38](https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.38)))\n- linux-pam ([1.5.3](https://github.com/linux-pam/linux-pam/releases/tag/v1.5.3))\n- lshw ([02.20.2b](https://www.ezix.org/project/wiki/HardwareLiSter#Changes))\n- lsof ([4.99.3](https://github.com/lsof-org/lsof/releases/tag/4.99.3) (includes [4.99.2](https://github.com/lsof-org/lsof/releases/tag/4.99.2), [4.99.1](https://github.com/lsof-org/lsof/releases/tag/4.99.1), [4.99.0](https://github.com/lsof-org/lsof/blob/4.99.0/00DIST#L5523), [4.98.0](https://github.com/lsof-org/lsof/blob/4.98.0/00DIST#L5471)))\n- lua ([5.4.6](https://www.lua.org/manual/5.4/readme.html#changes) (includes [5.4.4](https://www.lua.org/manual/5.4/readme.html#changes)))\n- lz4 ([1.10.0](https://github.com/lz4/lz4/releases/tag/v1.10.0) (includes [1.9.4](https://github.com/lz4/lz4/releases/tag/v1.9.4)))\n- mime-types ([2.1.54](https://pagure.io/mailcap/blob/9699055a1b4dfb90f7594ee2e8dda705fa56d3b8/f/NEWS))\n- mit-krb5 ([1.21.3](https://web.mit.edu/kerberos/krb5-1.21/README-1.21.3.txt) (includes [1.21.2](http://web.mit.edu/kerberos/krb5-1.21/)))\n- mpc ([1.3.1](https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00049.html) (includes [1.3.0](https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00028.html)))\n- mpfr ([4.2.1](https://gitlab.inria.fr/mpfr/mpfr/-/blob/4.2.1/NEWS))\n- multipath-tools ([0.9.8](https://github.com/opensvc/multipath-tools/blob/0.9.8/NEWS.md) (includes [0.9.7](https://github.com/opensvc/multipath-tools/commits/0.9.7), [0.9.5](https://github.com/opensvc/multipath-tools/commits/0.9.5), [0.9.4](https://github.com/opensvc/multipath-tools/commits/0.9.4)))\n- ncurses ([6.4](https://invisible-island.net/ncurses/announce.html#h2-release-notes))\n- nettle ([3.9.1](https://git.lysator.liu.se/nettle/nettle/-/blob/nettle_3.9.1_release_20230601/ChangeLog))\n- nghttp2 ([1.62.1](https://github.com/nghttp2/nghttp2/releases/tag/v1.62.1) (includes [1.61.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.61.0), [1.60.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.60.0), [1.59.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.59.0), [1.58.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.58.0), [1.57.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0), [1.56.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.56.0), [1.55.1](https://github.com/nghttp2/nghttp2/releases/tag/v1.55.1), [1.55.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.55.0), [1.54.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.54.0), [1.53.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.53.0), [1.52.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0)))\n- nmap ([7.95](https://nmap.org/changelog.html#7.95) (includes [7.94](https://nmap.org/changelog.html#7.94)))\n- npth ([1.7](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=c1b631b4294eabfef29baefd60e1b0dfecce710d;hb=75c68399ef3bbb5d024f2a60474a7214fa479016))\n- nspr ([4.35](https://hg.mozilla.org/projects/nspr/log/b563bfc16c887c48b038b7b441fcc4e40a126d3b))\n- ntp ([4.2.8p17](https://www.ntp.org/support/securitynotice/4_2_8p17-release-announcement/))\n- nvidia-drivers ([535.104.05](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-104-05/index.html))\n- nvme-cli ([2.9.1](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9.1) (includes [2.9](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9), [2.8](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.8), [2.7.1](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7.1), [2.7](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.7), [2.6](https://github.com/linux-nvme/nvme-cli/releases/tag/2.6), [2.5](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.5), [2.3](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.3)))\n- open-iscsi ([2.1.10](https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.10))\n- open-isns ([0.102](https://github.com/open-iscsi/open-isns/blob/v0.102/ChangeLog))\n- openldap ([2.6.4](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_4/CHANGES) (includes [2.6.3](https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FQJM2JSSSOMLQH7XC7Q5IZJYOGCTV2LK/), [2.6](https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/IHS5V46H6NFNFUERMC6AWMPHTWRVNLFA/), [2.5.14](https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/TZQHR4SIWUA5BZTKDAKSFDOOGDVU4TU7/), [2.5](https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/BH3VDPG6IYYF5L5U6LZGHHKMJY5HFA3L/)))\n- openssh ([9.7_p1](https://www.openssh.com/txt/release-9.7) (includes [9.6p1](https://www.openssh.com/releasenotes.html#9.6p1), [9.5p1](https://www.openssh.com/releasenotes.html#9.5p1), [9.4p1](https://www.openssh.com/releasenotes.html#9.4p1), [9.3](http://www.openssh.com/releasenotes.html#9.3), [9.2](http://www.openssh.com/releasenotes.html#9.2)))\n- openssl ([3.2.3](https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32) (includes [3.2.1](https://github.com/openssl/openssl/blob/openssl-3.2.1/CHANGES.md), [3.0.12](https://github.com/openssl/openssl/blob/openssl-3.0.12/NEWS.md#major-changes-between-openssl-3011-and-openssl-3012-24-oct-2023), [3.0.9](https://github.com/openssl/openssl/blob/openssl-3.0.9/NEWS.md#major-changes-between-openssl-308-and-openssl-309-30-may-2023), [3.0.8](https://github.com/openssl/openssl/blob/openssl-3.0.8/NEWS.md#major-changes-between-openssl-307-and-openssl-308-7-feb-2023)))\n- parted ([3.6](https://git.savannah.gnu.org/gitweb/?p=parted.git;a=blob;f=NEWS;h=52bb11697039f70e55120c571750f9ee761a75aa;hb=3b5f327b213d21e9adb9ba933c78dd898fee5b1d))\n- pax-utils ([1.3.7](https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.7))\n- pciutils ([3.13.0](https://github.com/pciutils/pciutils/blob/v3.13.0/ChangeLog) (includes [3.12.0](https://github.com/pciutils/pciutils/blob/v3.12.0/ChangeLog), [3.10.0](https://github.com/pciutils/pciutils/blob/v3.10.0/ChangeLog), [3.9.0](https://github.com/pciutils/pciutils/releases/tag/v3.9.0)))\n- pigz ([2.8](https://zlib.net/pipermail/pigz-announce_zlib.net/2023-August/000018.html))\n- pinentry ([1.2.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=c080b34e57d01a6ccca9d2996d7096c42b1a3f84;hb=8ab1682e80a2b4185ee9ef66cbb44340245966fc))\n- policycoreutils ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6) (includes [3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5)))\n- popt ([1.19](https://github.com/rpm-software-management/popt/releases/tag/popt-1.19-release))\n- procps ([4.0.4](https://gitlab.com/procps-ng/procps/-/releases/v4.0.4) (includes [4.0.3](https://gitlab.com/procps-ng/procps/-/releases/v4.0.3), [4.0.0](https://gitlab.com/procps-ng/procps/-/releases/v4.0.0)))\n- protobuf ([21.12](https://github.com/protocolbuffers/protobuf/releases/tag/v21.12) (includes [21.11](https://github.com/protocolbuffers/protobuf/releases/tag/v21.11), [21.10](https://github.com/protocolbuffers/protobuf/releases/tag/v21.10), [21.9](https://github.com/protocolbuffers/protobuf/releases/tag/v21.9)))\n- psmisc ([23.6](https://gitlab.com/psmisc/psmisc/-/blob/v23.6/ChangeLog))\n- qemu-guest-agent ([8.2.0](https://wiki.qemu.org/ChangeLog/8.2#Guest_agent) (includes [8.0.3](https://wiki.qemu.org/ChangeLog/8.0#Guest_agent), [8.0.0](https://wiki.qemu.org/ChangeLog/8.0#Guest_agent), [7.1.0](https://wiki.qemu.org/ChangeLog/7.1#Guest_agent)))\n- quota ([4.09](https://sourceforge.net/p/linuxquota/code/ci/87d2fd7635e4bca54fa2a00b8d5b073ba9ca521b/tree/Changelog))\n- readline ([8.2_p7](https://git.savannah.gnu.org/cgit/readline.git/log/?id=bfe9c573a9e376323929c80b2b71c59727fab0cc) (includes [8.2](https://lists.gnu.org/archive/html/info-gnu/2022-09/msg00013.html)))\n- rpcsvc-proto ([1.4.4](https://github.com/thkukuk/rpcsvc-proto/releases/tag/v1.4.4))\n- rsync ([3.3.0](https://github.com/RsyncProject/rsync/blob/v3.3.0/NEWS.md))\n- runc ([1.1.13](https://github.com/opencontainers/runc/releases/tag/v1.1.13) (includes [1.1.12](https://github.com/opencontainers/runc/releases/tag/v1.1.12), [1.1.9](https://github.com/opencontainers/runc/releases/tag/v1.1.9), [1.1.8](https://github.com/opencontainers/runc/releases/tag/v1.1.8), [1.1.7](https://github.com/opencontainers/runc/releases/tag/v1.1.7), [1.1.5](https://github.com/opencontainers/runc/releases/tag/v1.1.5)))\n- samba ([4.18.9](https://www.samba.org/samba/history/samba-4.18.9.html) (includes [4.18.8](https://www.samba.org/samba/history/samba-4.18.8.html), [4.18.4](https://wiki.samba.org/index.php/Samba_4.18_Features_added/changed#Samba_4.18.4)))\n- sed ([4.9](https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html) (includes [4.9](https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html)))\n- selinux-base ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002) (includes [2.20221101](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101)))\n- selinux-base-policy ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002) (includes [2.20221101](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101)))\n- selinux-container ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002) (includes [2.20221101](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101)))\n- selinux-dbus ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002))\n- selinux-refpolicy ([2.20240226](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240226))\n- selinux-sssd ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002) (includes [2.20221101](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101)))\n- selinux-unconfined ([2.20231002](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002) (includes [2.20221101](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101)))\n- semodule-utils ([3.6](https://github.com/SELinuxProject/selinux/releases/tag/3.6) (includes [3.5](https://github.com/SELinuxProject/selinux/releases/tag/3.5)))\n- shim ([15.8](https://github.com/rhboot/shim/releases/tag/15.8))\n- smartmontools ([7.3](https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_3))\n- socat ([1.7.4.4](https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.4:/CHANGES))\n- sqlite ([3.46.0](https://www.sqlite.org/releaselog/3_46_0.html) (includes [3.45.3](https://www.sqlite.org/releaselog/3_45_3.html), [3.45.1](https://www.sqlite.org/releaselog/3_45_1.html), [3.44.2](https://www.sqlite.org/releaselog/3_44_2.html), [3.43.2](https://www.sqlite.org/releaselog/3_43_2.html), [3.42.0](https://sqlite.org/releaselog/3_42_0.html), [3.41.2](https://sqlite.org/releaselog/3_41_2.html)))\n- squashfs-tools ([4.6.1](https://github.com/plougher/squashfs-tools/releases/tag/4.6.1) (includes [4.6](https://github.com/plougher/squashfs-tools/releases/tag/4.6)))\n- strace ([6.9](https://github.com/strace/strace/releases/tag/v6.9) (includes [6.6](https://github.com/strace/strace/releases/tag/v6.6), [6.4](https://github.com/strace/strace/releases/tag/v6.4), [6.3](https://github.com/strace/strace/releases/tag/v6.3), [6.2](https://github.com/strace/strace/releases/tag/v6.2), [6.1](https://github.com/strace/strace/releases/tag/v6.1)))\n- sudo ([1.9.15p5](https://www.sudo.ws/releases/stable/#1.9.15p5) (includes [1.9.13p3](https://www.sudo.ws/releases/stable/#1.9.13p3)))\n- sysext-docker: docker ([26.1.0](https://docs.docker.com/engine/release-notes/26.1/#2610) (includes [25.0](https://docs.docker.com/engine/release-notes/25.0/), [24.0.9](https://github.com/moby/moby/releases/tag/v24.0.9), [24.0.6](https://docs.docker.com/engine/release-notes/24.0/), [23.0](https://docs.docker.com/engine/release-notes/23.0/), [20.10.24](https://docs.docker.com/engine/release-notes/20.10/#201024)))\n- sysext-podman: aardvark-dns ([1.11.0](https://github.com/containers/aardvark-dns/releases/tag/v1.11.0))\n- sysext-podman: containers-common ([0.59.1](https://github.com/containers/common/releases/tag/v0.59.1))\n- sysext-podman: podman ([5.0.3](https://github.com/containers/podman/releases/tag/v5.0.3))\n- sysext-python: jaraco-text ([3.12.1](https://github.com/jaraco/jaraco.text/compare/v3.12.0...v3.12.1))\n- sysext-python: more-itertools ([10.4.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.4.0))\n- sysext-python: pip ([24.2](https://github.com/pypa/pip/blob/24.2/NEWS.rst) (includes [24.1.2](https://github.com/pypa/pip/blob/24.1.2/NEWS.rst)))\n- sysext-python: setuptools ([72.1.0](https://github.com/pypa/setuptools/blob/v72.1.0/NEWS.rst) (includes [71.1.0](https://github.com/pypa/setuptools/blob/v71.1.0/NEWS.rst), [71.0.0](https://github.com/pypa/setuptools/blob/v71.0.0/NEWS.rst), [70.3.0](https://github.com/pypa/setuptools/blob/v70.3.0/NEWS.rst), [70.1.1](https://setuptools.pypa.io/en/stable/history.html#v70-1-1), [70.1.0](https://setuptools.pypa.io/en/stable/history.html#v70-1-0), [70.0.0](https://setuptools.pypa.io/en/stable/history.html#v70-0-0), [69.5.1](https://setuptools.pypa.io/en/stable/history.html#v69-5-1), [69.5.0](https://setuptools.pypa.io/en/stable/history.html#v69-5-0), [69.4.2](https://setuptools.pypa.io/en/stable/history.html#v69-4-2), [69.4.1](https://setuptools.pypa.io/en/stable/history.html#v69-4-1), [69.4.0](https://setuptools.pypa.io/en/stable/history.html#v69-4-0), [69.3.1](https://setuptools.pypa.io/en/stable/history.html#v69-3-1), [69.3.0](https://setuptools.pypa.io/en/stable/history.html#v69-3-0), [69.2.0](https://setuptools.pypa.io/en/stable/history.html#v69-2-0)))\n- sysext-python: trove-classifiers ([2024.7.2](https://github.com/pypa/trove-classifiers/compare/2024.5.22...2024.7.2))\n- sysext-python: wheel ([0.44.0](https://github.com/pypa/wheel/releases/tag/0.44.0))\n- sysext-zfs: zfs ([2.2.5](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.5) (includes [2.2.4](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.4)))\n- systemd ([255.8](https://github.com/systemd/systemd-stable/commits/v255.8/) (includes [255.4](https://github.com/systemd/systemd-stable/commits/v255.4/), [255.3](https://github.com/systemd/systemd-stable/releases/tag/v255.3)))\n- talloc ([2.4.1](https://gitlab.com/samba-team/samba/-/commit/791e2817e13182344447590313f7e372a27c1d48) (includes [2.4.0](https://gitlab.com/samba-team/samba/-/commit/5224ed98eeba43f22b5f5f87de5947fbb1c1c7c1), [2.3.4](https://gitlab.com/samba-team/samba/-/commit/0189ccf9fc3d2a77cc83cffe180e307bcdccebb4)))\n- tar ([1.35](https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html))\n- tcpdump ([4.99.4](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.4/CHANGES))\n- tdb ([1.4.9](https://gitlab.com/samba-team/samba/-/commit/b649c7d3c2b1e13e900c80ff7a20959a70b1c528) (includes [1.4.8](https://gitlab.com/samba-team/samba/-/commit/eab796a4f9172e602dc262f3c99ead35b35929e7), [1.4.7](https://gitlab.com/samba-team/samba/-/commit/27ceb1c3ad786386e746a5e2968780d791393b9e), [1.4.6](https://gitlab.com/samba-team/samba/-/commit/1c776e54cf33b46b2ed73263f093d596a0cdbb2f)))\n- tevent ([0.15.0](https://gitlab.com/samba-team/samba/-/commit/6a80d170bca0c938f78ab12e37481b52792a9d83) (includes [0.14.1](https://gitlab.com/samba-team/samba/-/commit/d80f28b081e515e32a480daf80b42cf782447a9c), [0.14.0](https://gitlab.com/samba-team/samba/-/commit/3c6d28ebae27dba8e40558ae37ae8138ea0b4bdc), [0.13.0](https://gitlab.com/samba-team/samba/-/commit/63d4db63feda920c8020f8484a8b31065b7f1380), [0.12.1](https://gitlab.com/samba-team/samba/-/commit/53692735c733d01acbd953641f831a1f5e0cf6c5)))\n- thin-provisioning-tools ([1.0.10](https://github.com/jthornber/thin-provisioning-tools/commits/v1.0.10/) (includes [1.0.6](https://github.com/jthornber/thin-provisioning-tools/blob/v1.0.6/CHANGES)))\n- tpm2-tools ([5.7](https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7) (includes [5.6.1](https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6.1), [5.6](https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6)))\n- tpm2-tss ([4.1.3](https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.3) (includes [4.0.2](https://github.com/tpm2-software/tpm2-tss/releases/tag/4.0.2)))\n- traceroute ([2.1.5](https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.5/) (includes [2.1.4](https://sourceforge.net/projects/traceroute/files/traceroute/traceroute%202.1.4/), [2.1.3](https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/), 2.1.1))\n- usbutils ([017](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v017) (includes [016](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v016), [015](https://github.com/gregkh/usbutils/blob/79b796f945ea7d5c2b0e2a74f9b8819cb7948680/NEWS)))\n- userspace-rcu ([0.14.0](https://github.com/urcu/userspace-rcu/blob/v0.13.2/ChangeLog))\n- util-linux ([2.39.4](https://github.com/util-linux/util-linux/blob/v2.39.4/Documentation/releases/v2.39.4-ReleaseNotes) (includes [2.39.3](https://github.com/util-linux/util-linux/blob/v2.39.3/Documentation/releases/v2.39.3-ReleaseNotes), [2.39.2](https://github.com/util-linux/util-linux/blob/v2.39.2/Documentation/releases/v2.39.2-ReleaseNotes), [2.38.1](https://github.com/util-linux/util-linux/releases/tag/v2.38.1)))\n- vim ([9.1.0366](https://github.com/vim/vim/commits/v9.1.0366/) (includes [9.1](https://www.vim.org/vim-9.1-released.php), [9.0.2167](https://github.com/vim/vim/commits/v9.0.2167/), [9.0.2092](https://github.com/vim/vim/commits/v9.0.2092/), [9.0.1678](https://github.com/vim/vim/commits/v9.0.1678), [9.0.1677](https://github.com/vim/vim/commits/v9.0.1677), [9.0.1503](https://github.com/vim/vim/commits/v9.0.1503), [9.0.1403](https://github.com/vim/vim/releases/tag/v9.0.1403), [9.0.1363](https://github.com/vim/vim/releases/tag/v9.0.1363)))\n- VMWare: open-vm-tools ([12.4.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.5) (includes [12.4.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.0), [12.2.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.0)))\n- wget ([1.24.5](https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00002.html) (includes [1.21.4](https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00003.html)))\n- whois ([5.5.21](https://github.com/rfc1036/whois/blob/v5.5.21/debian/changelog) (includes [5.5.20](https://github.com/rfc1036/whois/blob/v5.5.20/debian/changelog), [5.5.18](https://github.com/rfc1036/whois/blob/v5.5.18/debian/changelog), [5.5.17](https://github.com/rfc1036/whois/commit/bac7108b01cfd54c517444efa1239e10e6edd5a4)))\n- xfsprogs ([6.8.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.8.0) (includes [6.6.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.6.0), [6.4.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.4.0), [6.3.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.3.0)))\n- xmlsec ([1.3.3](https://github.com/lsh123/xmlsec/releases/tag/1.3.3) (includes [1.3.2](https://github.com/lsh123/xmlsec/releases/tag/xmlsec_1_3_2)))\n- xz-utils ([5.6.2](https://github.com/tukaani-project/xz/releases/tag/v5.6.2) (includes [5.4.6](https://github.com/tukaani-project/xz/releases/tag/v5.4.6), [5.4.5](https://github.com/tukaani-project/xz/releases/tag/v5.4.5), [5.4.3](https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=2f4d35adca6198671434d2988803cc9316ad1ec8;hb=dbb3a536ed9873ffa0870321f6873e564c6a9da8), [5.4.2](https://github.com/tukaani-project/xz/releases/tag/v5.4.2)))\n- zfs ([2.2.3](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.3))\n- zlib ([1.3.1](https://github.com/madler/zlib/releases/tag/v1.3.1) (includes [1.3](https://github.com/madler/zlib/releases/tag/v1.3)))\n- zstd ([1.5.6](https://github.com/facebook/zstd/releases/tag/v1.5.6) (includes [1.5.5](https://github.com/facebook/zstd/releases/tag/v1.5.5), [1.5.4](https://github.com/facebook/zstd/releases/tag/v1.5.4), [1.5.2](https://github.com/facebook/zstd/releases/tag/v1.5.2), [1.5.1](https://github.com/facebook/zstd/releases/tag/v1.5.1), [1.5.0](https://github.com/facebook/zstd/releases/tag/v1.5.0)))\n\n_Changes since **Stable 4081.2.1**_\n\n#### Security fixes:\n\n- Linux ([CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584), [CVE-2024-56565](https://nvd.nist.gov/vuln/detail/CVE-2024-56565), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-53196](https://nvd.nist.gov/vuln/detail/CVE-2024-53196), [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683), [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658), [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675), [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664), [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-49568](https://nvd.nist.gov/vuln/detail/CVE-2024-49568), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56372](https://nvd.nist.gov/vuln/detail/CVE-2024-56372), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2024-54680](https://nvd.nist.gov/vuln/detail/CVE-2024-54680), [CVE-2024-46896](https://nvd.nist.gov/vuln/detail/CVE-2024-46896), [CVE-2024-56719](https://nvd.nist.gov/vuln/detail/CVE-2024-56719), [CVE-2024-56718](https://nvd.nist.gov/vuln/detail/CVE-2024-56718), [CVE-2024-56717](https://nvd.nist.gov/vuln/detail/CVE-2024-56717), [CVE-2024-56716](https://nvd.nist.gov/vuln/detail/CVE-2024-56716), [CVE-2024-56715](https://nvd.nist.gov/vuln/detail/CVE-2024-56715), [CVE-2024-56709](https://nvd.nist.gov/vuln/detail/CVE-2024-56709), [CVE-2024-53164](https://nvd.nist.gov/vuln/detail/CVE-2024-53164), [CVE-2024-57946](https://nvd.nist.gov/vuln/detail/CVE-2024-57946), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57798](https://nvd.nist.gov/vuln/detail/CVE-2024-57798), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-56766](https://nvd.nist.gov/vuln/detail/CVE-2024-56766), [CVE-2024-56765](https://nvd.nist.gov/vuln/detail/CVE-2024-56765), [CVE-2024-56763](https://nvd.nist.gov/vuln/detail/CVE-2024-56763), [CVE-2024-56762](https://nvd.nist.gov/vuln/detail/CVE-2024-56762), [CVE-2024-56760](https://nvd.nist.gov/vuln/detail/CVE-2024-56760), [CVE-2024-56769](https://nvd.nist.gov/vuln/detail/CVE-2024-56769), [CVE-2024-56767](https://nvd.nist.gov/vuln/detail/CVE-2024-56767), [CVE-2023-52881](https://nvd.nist.gov/vuln/detail/CVE-2023-52881), [CVE-2023-52654](https://nvd.nist.gov/vuln/detail/CVE-2023-52654), [CVE-2024-57938](https://nvd.nist.gov/vuln/detail/CVE-2024-57938), [CVE-2024-57933](https://nvd.nist.gov/vuln/detail/CVE-2024-57933), [CVE-2024-57932](https://nvd.nist.gov/vuln/detail/CVE-2024-57932), [CVE-2024-57930](https://nvd.nist.gov/vuln/detail/CVE-2024-57930), [CVE-2024-57931](https://nvd.nist.gov/vuln/detail/CVE-2024-57931), [CVE-2024-57841](https://nvd.nist.gov/vuln/detail/CVE-2024-57841), [CVE-2024-57802](https://nvd.nist.gov/vuln/detail/CVE-2024-57802), [CVE-2024-57801](https://nvd.nist.gov/vuln/detail/CVE-2024-57801), [CVE-2024-54031](https://nvd.nist.gov/vuln/detail/CVE-2024-54031), [CVE-2024-39282](https://nvd.nist.gov/vuln/detail/CVE-2024-39282), [CVE-2024-36476](https://nvd.nist.gov/vuln/detail/CVE-2024-36476), [CVE-2024-57896](https://nvd.nist.gov/vuln/detail/CVE-2024-57896), [CVE-2025-21629](https://nvd.nist.gov/vuln/detail/CVE-2025-21629), [CVE-2024-57903](https://nvd.nist.gov/vuln/detail/CVE-2024-57903), [CVE-2024-57902](https://nvd.nist.gov/vuln/detail/CVE-2024-57902), [CVE-2024-57901](https://nvd.nist.gov/vuln/detail/CVE-2024-57901), [CVE-2024-57900](https://nvd.nist.gov/vuln/detail/CVE-2024-57900), [CVE-2024-57899](https://nvd.nist.gov/vuln/detail/CVE-2024-57899), [CVE-2024-57897](https://nvd.nist.gov/vuln/detail/CVE-2024-57897), [CVE-2024-57890](https://nvd.nist.gov/vuln/detail/CVE-2024-57890), [CVE-2024-57889](https://nvd.nist.gov/vuln/detail/CVE-2024-57889), [CVE-2024-57887](https://nvd.nist.gov/vuln/detail/CVE-2024-57887), [CVE-2024-57885](https://nvd.nist.gov/vuln/detail/CVE-2024-57885), [CVE-2024-57884](https://nvd.nist.gov/vuln/detail/CVE-2024-57884), [CVE-2024-57895](https://nvd.nist.gov/vuln/detail/CVE-2024-57895), [CVE-2024-57894](https://nvd.nist.gov/vuln/detail/CVE-2024-57894), [CVE-2024-57893](https://nvd.nist.gov/vuln/detail/CVE-2024-57893), [CVE-2024-57892](https://nvd.nist.gov/vuln/detail/CVE-2024-57892), [CVE-2024-57882](https://nvd.nist.gov/vuln/detail/CVE-2024-57882), [CVE-2024-53685](https://nvd.nist.gov/vuln/detail/CVE-2024-53685), [CVE-2025-21658](https://nvd.nist.gov/vuln/detail/CVE-2025-21658), [CVE-2025-21656](https://nvd.nist.gov/vuln/detail/CVE-2025-21656), [CVE-2024-57945](https://nvd.nist.gov/vuln/detail/CVE-2024-57945), [CVE-2025-21664](https://nvd.nist.gov/vuln/detail/CVE-2025-21664), [CVE-2025-21663](https://nvd.nist.gov/vuln/detail/CVE-2025-21663), [CVE-2025-21662](https://nvd.nist.gov/vuln/detail/CVE-2025-21662), [CVE-2025-21660](https://nvd.nist.gov/vuln/detail/CVE-2025-21660), [CVE-2024-57939](https://nvd.nist.gov/vuln/detail/CVE-2024-57939), [CVE-2024-57940](https://nvd.nist.gov/vuln/detail/CVE-2024-57940), [CVE-2025-21655](https://nvd.nist.gov/vuln/detail/CVE-2025-21655), [CVE-2024-57913](https://nvd.nist.gov/vuln/detail/CVE-2024-57913), [CVE-2024-57912](https://nvd.nist.gov/vuln/detail/CVE-2024-57912), [CVE-2024-57911](https://nvd.nist.gov/vuln/detail/CVE-2024-57911), [CVE-2024-57910](https://nvd.nist.gov/vuln/detail/CVE-2024-57910), [CVE-2024-57908](https://nvd.nist.gov/vuln/detail/CVE-2024-57908), [CVE-2024-57907](https://nvd.nist.gov/vuln/detail/CVE-2024-57907), [CVE-2024-57929](https://nvd.nist.gov/vuln/detail/CVE-2024-57929), [CVE-2024-57926](https://nvd.nist.gov/vuln/detail/CVE-2024-57926), [CVE-2024-57925](https://nvd.nist.gov/vuln/detail/CVE-2024-57925), [CVE-2024-57906](https://nvd.nist.gov/vuln/detail/CVE-2024-57906), [CVE-2024-57922](https://nvd.nist.gov/vuln/detail/CVE-2024-57922), [CVE-2024-57917](https://nvd.nist.gov/vuln/detail/CVE-2024-57917), [CVE-2024-57916](https://nvd.nist.gov/vuln/detail/CVE-2024-57916), [CVE-2024-57915](https://nvd.nist.gov/vuln/detail/CVE-2024-57915), [CVE-2024-57904](https://nvd.nist.gov/vuln/detail/CVE-2024-57904), [CVE-2025-21654](https://nvd.nist.gov/vuln/detail/CVE-2025-21654), [CVE-2025-21653](https://nvd.nist.gov/vuln/detail/CVE-2025-21653), [CVE-2025-21652](https://nvd.nist.gov/vuln/detail/CVE-2025-21652), [CVE-2025-21640](https://nvd.nist.gov/vuln/detail/CVE-2025-21640), [CVE-2025-21639](https://nvd.nist.gov/vuln/detail/CVE-2025-21639), [CVE-2025-21638](https://nvd.nist.gov/vuln/detail/CVE-2025-21638), [CVE-2025-21637](https://nvd.nist.gov/vuln/detail/CVE-2025-21637), [CVE-2025-21636](https://nvd.nist.gov/vuln/detail/CVE-2025-21636), [CVE-2025-21648](https://nvd.nist.gov/vuln/detail/CVE-2025-21648), [CVE-2025-21647](https://nvd.nist.gov/vuln/detail/CVE-2025-21647), [CVE-2025-21646](https://nvd.nist.gov/vuln/detail/CVE-2025-21646), [CVE-2025-21645](https://nvd.nist.gov/vuln/detail/CVE-2025-21645), [CVE-2025-21642](https://nvd.nist.gov/vuln/detail/CVE-2025-21642), [CVE-2025-21631](https://nvd.nist.gov/vuln/detail/CVE-2025-21631), [CVE-2025-21632](https://nvd.nist.gov/vuln/detail/CVE-2025-21632))\n\n#### Updates:\n\n- Linux ([6.6.74](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.74) (includes [6.6.73](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.73), [6.6.72](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.72), [6.6.71](https://lwn.net/Articles/1004703), [6.6.70](https://lwn.net/Articles/1004551), [6.6.69](https://lwn.net/Articles/1003986), [6.6.68](https://lwn.net/Articles/1003609), [6.6.67](https://lwn.net/Articles/1002919), [6.6.66](https://lwn.net/Articles/1002177)))"
  },
  "4081.3.1": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-02-18 15:13:00 +0000",
    "major_software": {
      "containerd": [
        "1.7.21"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.74"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "_Changes since **LTS 4081.3.0**_\n\n #### Security fixes:\n - openssh ([CVE-2025-26465](https://nvd.nist.gov/vuln/detail/CVE-2025-26465), [CVE-2025-26466](https://nvd.nist.gov/vuln/detail/CVE-2025-26466))\n \n #### Updates:\n - openssh(9.7_p1-r7)"
  },
  "4081.3.2": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-03-20 14:07:30 +0000",
    "major_software": {
      "containerd": [
        "1.7.21"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.83"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": " _Changes since **LTS 4081.3.1**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-21835](https://nvd.nist.gov/vuln/detail/CVE-2025-21835), [CVE-2025-21836](https://nvd.nist.gov/vuln/detail/CVE-2025-21836), [CVE-2024-58086](https://nvd.nist.gov/vuln/detail/CVE-2024-58086), [CVE-2025-21823](https://nvd.nist.gov/vuln/detail/CVE-2025-21823), [CVE-2025-21821](https://nvd.nist.gov/vuln/detail/CVE-2025-21821), [CVE-2025-21787](https://nvd.nist.gov/vuln/detail/CVE-2025-21787), [CVE-2025-21785](https://nvd.nist.gov/vuln/detail/CVE-2025-21785), [CVE-2025-21784](https://nvd.nist.gov/vuln/detail/CVE-2025-21784), [CVE-2025-21782](https://nvd.nist.gov/vuln/detail/CVE-2025-21782), [CVE-2025-21783](https://nvd.nist.gov/vuln/detail/CVE-2025-21783), [CVE-2025-21781](https://nvd.nist.gov/vuln/detail/CVE-2025-21781), [CVE-2025-21780](https://nvd.nist.gov/vuln/detail/CVE-2025-21780), [CVE-2025-21796](https://nvd.nist.gov/vuln/detail/CVE-2025-21796), [CVE-2025-21795](https://nvd.nist.gov/vuln/detail/CVE-2025-21795), [CVE-2025-21794](https://nvd.nist.gov/vuln/detail/CVE-2025-21794), [CVE-2025-21793](https://nvd.nist.gov/vuln/detail/CVE-2025-21793), [CVE-2025-21792](https://nvd.nist.gov/vuln/detail/CVE-2025-21792), [CVE-2025-21791](https://nvd.nist.gov/vuln/detail/CVE-2025-21791), [CVE-2025-21790](https://nvd.nist.gov/vuln/detail/CVE-2025-21790), [CVE-2025-21789](https://nvd.nist.gov/vuln/detail/CVE-2025-21789), [CVE-2025-21779](https://nvd.nist.gov/vuln/detail/CVE-2025-21779), [CVE-2024-58020](https://nvd.nist.gov/vuln/detail/CVE-2024-58020), [CVE-2024-57834](https://nvd.nist.gov/vuln/detail/CVE-2024-57834), [CVE-2024-54458](https://nvd.nist.gov/vuln/detail/CVE-2024-54458), [CVE-2024-54456](https://nvd.nist.gov/vuln/detail/CVE-2024-54456), [CVE-2025-21776](https://nvd.nist.gov/vuln/detail/CVE-2025-21776), [CVE-2025-21775](https://nvd.nist.gov/vuln/detail/CVE-2025-21775), [CVE-2025-21772](https://nvd.nist.gov/vuln/detail/CVE-2025-21772), [CVE-2025-21773](https://nvd.nist.gov/vuln/detail/CVE-2025-21773), [CVE-2025-21767](https://nvd.nist.gov/vuln/detail/CVE-2025-21767), [CVE-2025-21766](https://nvd.nist.gov/vuln/detail/CVE-2025-21766), [CVE-2025-21765](https://nvd.nist.gov/vuln/detail/CVE-2025-21765), [CVE-2025-21764](https://nvd.nist.gov/vuln/detail/CVE-2025-21764), [CVE-2025-21763](https://nvd.nist.gov/vuln/detail/CVE-2025-21763), [CVE-2025-21761](https://nvd.nist.gov/vuln/detail/CVE-2025-21761), [CVE-2025-21762](https://nvd.nist.gov/vuln/detail/CVE-2025-21762), [CVE-2025-21760](https://nvd.nist.gov/vuln/detail/CVE-2025-21760), [CVE-2025-21759](https://nvd.nist.gov/vuln/detail/CVE-2025-21759), [CVE-2025-21758](https://nvd.nist.gov/vuln/detail/CVE-2025-21758), [CVE-2025-21756](https://nvd.nist.gov/vuln/detail/CVE-2025-21756), [CVE-2025-21704](https://nvd.nist.gov/vuln/detail/CVE-2025-21704), [CVE-2023-52655](https://nvd.nist.gov/vuln/detail/CVE-2023-52655), [CVE-2023-52434](https://nvd.nist.gov/vuln/detail/CVE-2023-52434), [CVE-2025-21848](https://nvd.nist.gov/vuln/detail/CVE-2025-21848), [CVE-2025-21847](https://nvd.nist.gov/vuln/detail/CVE-2025-21847), [CVE-2025-21846](https://nvd.nist.gov/vuln/detail/CVE-2025-21846), [CVE-2025-21866](https://nvd.nist.gov/vuln/detail/CVE-2025-21866), [CVE-2025-21865](https://nvd.nist.gov/vuln/detail/CVE-2025-21865), [CVE-2025-21864](https://nvd.nist.gov/vuln/detail/CVE-2025-21864), [CVE-2025-21863](https://nvd.nist.gov/vuln/detail/CVE-2025-21863), [CVE-2025-21862](https://nvd.nist.gov/vuln/detail/CVE-2025-21862), [CVE-2025-21844](https://nvd.nist.gov/vuln/detail/CVE-2025-21844), [CVE-2025-21859](https://nvd.nist.gov/vuln/detail/CVE-2025-21859), [CVE-2025-21858](https://nvd.nist.gov/vuln/detail/CVE-2025-21858), [CVE-2025-21857](https://nvd.nist.gov/vuln/detail/CVE-2025-21857), [CVE-2025-21856](https://nvd.nist.gov/vuln/detail/CVE-2025-21856), [CVE-2025-21855](https://nvd.nist.gov/vuln/detail/CVE-2025-21855), [CVE-2025-21854](https://nvd.nist.gov/vuln/detail/CVE-2025-21854), [CVE-2025-21853](https://nvd.nist.gov/vuln/detail/CVE-2025-21853), [CVE-2024-58088](https://nvd.nist.gov/vuln/detail/CVE-2024-58088), [CVE-2025-21838](https://nvd.nist.gov/vuln/detail/CVE-2025-21838))\n \n #### Bug fixes:\n \n - Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. ([flatcar/scripts#2667](https://github.com/flatcar/scripts/pull/2667))\n \n #### Changes:\n \n - Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))\n \n #### Updates:\n \n- Linux ([6.6.83](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83) (includes [6.6.79](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79), [6.6.80](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80), [6.6.81](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81), [6.6.82](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82)))\n- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))\n"
  },
  "4081.3.3": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-05-06 11:36:40 +0000",
    "major_software": {
      "containerd": [
        "1.7.21"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.88"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": " _Changes since **LTS 4081.3.2**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-21993](https://nvd.nist.gov/vuln/detail/CVE-2025-21993), [CVE-2025-21992](https://nvd.nist.gov/vuln/detail/CVE-2025-21992), [CVE-2025-21991](https://nvd.nist.gov/vuln/detail/CVE-2025-21991), [CVE-2025-21967](https://nvd.nist.gov/vuln/detail/CVE-2025-21967), [CVE-2025-21975](https://nvd.nist.gov/vuln/detail/CVE-2025-21975), [CVE-2025-21971](https://nvd.nist.gov/vuln/detail/CVE-2025-21971), [CVE-2025-21970](https://nvd.nist.gov/vuln/detail/CVE-2025-21970), [CVE-2025-21969](https://nvd.nist.gov/vuln/detail/CVE-2025-21969), [CVE-2025-21986](https://nvd.nist.gov/vuln/detail/CVE-2025-21986), [CVE-2025-21981](https://nvd.nist.gov/vuln/detail/CVE-2025-21981), [CVE-2025-21980](https://nvd.nist.gov/vuln/detail/CVE-2025-21980), [CVE-2025-21979](https://nvd.nist.gov/vuln/detail/CVE-2025-21979), [CVE-2025-21978](https://nvd.nist.gov/vuln/detail/CVE-2025-21978), [CVE-2025-21968](https://nvd.nist.gov/vuln/detail/CVE-2025-21968), [CVE-2025-21962](https://nvd.nist.gov/vuln/detail/CVE-2025-21962), [CVE-2025-21960](https://nvd.nist.gov/vuln/detail/CVE-2025-21960), [CVE-2025-21959](https://nvd.nist.gov/vuln/detail/CVE-2025-21959), [CVE-2025-21957](https://nvd.nist.gov/vuln/detail/CVE-2025-21957), [CVE-2025-21956](https://nvd.nist.gov/vuln/detail/CVE-2025-21956), [CVE-2025-21955](https://nvd.nist.gov/vuln/detail/CVE-2025-21955), [CVE-2025-21966](https://nvd.nist.gov/vuln/detail/CVE-2025-21966), [CVE-2025-21964](https://nvd.nist.gov/vuln/detail/CVE-2025-21964), [CVE-2025-21963](https://nvd.nist.gov/vuln/detail/CVE-2025-21963), [CVE-2025-22015](https://nvd.nist.gov/vuln/detail/CVE-2025-22015), [CVE-2025-22014](https://nvd.nist.gov/vuln/detail/CVE-2025-22014), [CVE-2025-22013](https://nvd.nist.gov/vuln/detail/CVE-2025-22013), [CVE-2025-22010](https://nvd.nist.gov/vuln/detail/CVE-2025-22010), [CVE-2025-22008](https://nvd.nist.gov/vuln/detail/CVE-2025-22008), [CVE-2025-22009](https://nvd.nist.gov/vuln/detail/CVE-2025-22009), [CVE-2025-22004](https://nvd.nist.gov/vuln/detail/CVE-2025-22004), [CVE-2025-22003](https://nvd.nist.gov/vuln/detail/CVE-2025-22003), [CVE-2025-22001](https://nvd.nist.gov/vuln/detail/CVE-2025-22001), [CVE-2025-21999](https://nvd.nist.gov/vuln/detail/CVE-2025-21999), [CVE-2025-21997](https://nvd.nist.gov/vuln/detail/CVE-2025-21997), [CVE-2025-22007](https://nvd.nist.gov/vuln/detail/CVE-2025-22007), [CVE-2025-22005](https://nvd.nist.gov/vuln/detail/CVE-2025-22005), [CVE-2025-21995](https://nvd.nist.gov/vuln/detail/CVE-2025-21995), [CVE-2025-21996](https://nvd.nist.gov/vuln/detail/CVE-2025-21996), [CVE-2025-21994](https://nvd.nist.gov/vuln/detail/CVE-2025-21994), [CVE-2025-22021](https://nvd.nist.gov/vuln/detail/CVE-2025-22021), [CVE-2025-22020](https://nvd.nist.gov/vuln/detail/CVE-2025-22020), [CVE-2025-22018](https://nvd.nist.gov/vuln/detail/CVE-2025-22018), [CVE-2025-38575](https://nvd.nist.gov/vuln/detail/CVE-2025-38575), [CVE-2025-38240](https://nvd.nist.gov/vuln/detail/CVE-2025-38240), [CVE-2025-38152](https://nvd.nist.gov/vuln/detail/CVE-2025-38152), [CVE-2025-37893](https://nvd.nist.gov/vuln/detail/CVE-2025-37893), [CVE-2025-39735](https://nvd.nist.gov/vuln/detail/CVE-2025-39735), [CVE-2025-39728](https://nvd.nist.gov/vuln/detail/CVE-2025-39728), [CVE-2025-38637](https://nvd.nist.gov/vuln/detail/CVE-2025-38637), [CVE-2025-37785](https://nvd.nist.gov/vuln/detail/CVE-2025-37785), [CVE-2025-23138](https://nvd.nist.gov/vuln/detail/CVE-2025-23138), [CVE-2025-23136](https://nvd.nist.gov/vuln/detail/CVE-2025-23136), [CVE-2025-22066](https://nvd.nist.gov/vuln/detail/CVE-2025-22066), [CVE-2025-22075](https://nvd.nist.gov/vuln/detail/CVE-2025-22075), [CVE-2025-22074](https://nvd.nist.gov/vuln/detail/CVE-2025-22074), [CVE-2025-22073](https://nvd.nist.gov/vuln/detail/CVE-2025-22073), [CVE-2025-22072](https://nvd.nist.gov/vuln/detail/CVE-2025-22072), [CVE-2025-22071](https://nvd.nist.gov/vuln/detail/CVE-2025-22071), [CVE-2025-22097](https://nvd.nist.gov/vuln/detail/CVE-2025-22097), [CVE-2025-22095](https://nvd.nist.gov/vuln/detail/CVE-2025-22095), [CVE-2025-22093](https://nvd.nist.gov/vuln/detail/CVE-2025-22093), [CVE-2025-22090](https://nvd.nist.gov/vuln/detail/CVE-2025-22090), [CVE-2025-22089](https://nvd.nist.gov/vuln/detail/CVE-2025-22089), [CVE-2025-22088](https://nvd.nist.gov/vuln/detail/CVE-2025-22088), [CVE-2025-22086](https://nvd.nist.gov/vuln/detail/CVE-2025-22086), [CVE-2025-22083](https://nvd.nist.gov/vuln/detail/CVE-2025-22083), [CVE-2025-22081](https://nvd.nist.gov/vuln/detail/CVE-2025-22081), [CVE-2025-22080](https://nvd.nist.gov/vuln/detail/CVE-2025-22080), [CVE-2025-22079](https://nvd.nist.gov/vuln/detail/CVE-2025-22079), [CVE-2025-22077](https://nvd.nist.gov/vuln/detail/CVE-2025-22077), [CVE-2025-22033](https://nvd.nist.gov/vuln/detail/CVE-2025-22033), [CVE-2025-22042](https://nvd.nist.gov/vuln/detail/CVE-2025-22042), [CVE-2025-22041](https://nvd.nist.gov/vuln/detail/CVE-2025-22041), [CVE-2025-22040](https://nvd.nist.gov/vuln/detail/CVE-2025-22040), [CVE-2025-22038](https://nvd.nist.gov/vuln/detail/CVE-2025-22038), [CVE-2025-22064](https://nvd.nist.gov/vuln/detail/CVE-2025-22064), [CVE-2025-22063](https://nvd.nist.gov/vuln/detail/CVE-2025-22063), [CVE-2025-22060](https://nvd.nist.gov/vuln/detail/CVE-2025-22060), [CVE-2025-22058](https://nvd.nist.gov/vuln/detail/CVE-2025-22058), [CVE-2025-22057](https://nvd.nist.gov/vuln/detail/CVE-2025-22057), [CVE-2025-22056](https://nvd.nist.gov/vuln/detail/CVE-2025-22056), [CVE-2025-22055](https://nvd.nist.gov/vuln/detail/CVE-2025-22055), [CVE-2025-22054](https://nvd.nist.gov/vuln/detail/CVE-2025-22054), [CVE-2025-22053](https://nvd.nist.gov/vuln/detail/CVE-2025-22053), [CVE-2025-22035](https://nvd.nist.gov/vuln/detail/CVE-2025-22035), [CVE-2025-22050](https://nvd.nist.gov/vuln/detail/CVE-2025-22050), [CVE-2025-22049](https://nvd.nist.gov/vuln/detail/CVE-2025-22049), [CVE-2025-22048](https://nvd.nist.gov/vuln/detail/CVE-2025-22048), [CVE-2025-22047](https://nvd.nist.gov/vuln/detail/CVE-2025-22047), [CVE-2025-22045](https://nvd.nist.gov/vuln/detail/CVE-2025-22045), [CVE-2025-22044](https://nvd.nist.gov/vuln/detail/CVE-2025-22044), [CVE-2025-22043](https://nvd.nist.gov/vuln/detail/CVE-2025-22043), [CVE-2025-22027](https://nvd.nist.gov/vuln/detail/CVE-2025-22027), [CVE-2025-22025](https://nvd.nist.gov/vuln/detail/CVE-2025-22025), [CVE-2025-22029](https://nvd.nist.gov/vuln/detail/CVE-2025-22029), [CVE-2023-53034](https://nvd.nist.gov/vuln/detail/CVE-2023-53034))\n \n #### Updates:\n - Linux ([6.6.88](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.88) (includes [6.6.87](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.87), [6.6.86](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.86), [6.6.85](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.85), [6.6.84](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.84)))\n - ca-certificates ([3.110](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html))"
  },
  "4081.3.4": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-07-08 15:22:02 +0000",
    "major_software": {
      "containerd": [
        "1.7.21"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.95"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": " _Changes since **LTS 4081.3.3**_\n \n #### Security fixes:\n \n - Linux ([CVE-2025-37989](https://nvd.nist.gov/vuln/detail/CVE-2025-37989), [CVE-2025-37988](https://nvd.nist.gov/vuln/detail/CVE-2025-37988), [CVE-2025-37985](https://nvd.nist.gov/vuln/detail/CVE-2025-37985), [CVE-2025-37983](https://nvd.nist.gov/vuln/detail/CVE-2025-37983), [CVE-2025-37938](https://nvd.nist.gov/vuln/detail/CVE-2025-37938), [CVE-2025-37885](https://nvd.nist.gov/vuln/detail/CVE-2025-37885), [CVE-2025-37884](https://nvd.nist.gov/vuln/detail/CVE-2025-37884), [CVE-2025-37883](https://nvd.nist.gov/vuln/detail/CVE-2025-37883), [CVE-2025-37881](https://nvd.nist.gov/vuln/detail/CVE-2025-37881), [CVE-2025-37879](https://nvd.nist.gov/vuln/detail/CVE-2025-37879), [CVE-2025-37878](https://nvd.nist.gov/vuln/detail/CVE-2025-37878), [CVE-2025-37887](https://nvd.nist.gov/vuln/detail/CVE-2025-37887), [CVE-2025-37886](https://nvd.nist.gov/vuln/detail/CVE-2025-37886), [CVE-2025-37836](https://nvd.nist.gov/vuln/detail/CVE-2025-37836), [CVE-2025-37823](https://nvd.nist.gov/vuln/detail/CVE-2025-37823), [CVE-2025-37831](https://nvd.nist.gov/vuln/detail/CVE-2025-37831), [CVE-2025-37830](https://nvd.nist.gov/vuln/detail/CVE-2025-37830), [CVE-2025-37829](https://nvd.nist.gov/vuln/detail/CVE-2025-37829), [CVE-2025-37828](https://nvd.nist.gov/vuln/detail/CVE-2025-37828), [CVE-2025-37824](https://nvd.nist.gov/vuln/detail/CVE-2025-37824), [CVE-2025-37808](https://nvd.nist.gov/vuln/detail/CVE-2025-37808), [CVE-2025-37805](https://nvd.nist.gov/vuln/detail/CVE-2025-37805), [CVE-2025-37804](https://nvd.nist.gov/vuln/detail/CVE-2025-37804), [CVE-2025-37803](https://nvd.nist.gov/vuln/detail/CVE-2025-37803), [CVE-2025-37820](https://nvd.nist.gov/vuln/detail/CVE-2025-37820), [CVE-2025-37819](https://nvd.nist.gov/vuln/detail/CVE-2025-37819), [CVE-2025-37818](https://nvd.nist.gov/vuln/detail/CVE-2025-37818), [CVE-2025-37817](https://nvd.nist.gov/vuln/detail/CVE-2025-37817), [CVE-2025-37815](https://nvd.nist.gov/vuln/detail/CVE-2025-37815), [CVE-2025-37813](https://nvd.nist.gov/vuln/detail/CVE-2025-37813), [CVE-2025-37812](https://nvd.nist.gov/vuln/detail/CVE-2025-37812), [CVE-2025-37811](https://nvd.nist.gov/vuln/detail/CVE-2025-37811), [CVE-2025-37810](https://nvd.nist.gov/vuln/detail/CVE-2025-37810), [CVE-2025-37800](https://nvd.nist.gov/vuln/detail/CVE-2025-37800), [CVE-2025-37801](https://nvd.nist.gov/vuln/detail/CVE-2025-37801), [CVE-2025-37799](https://nvd.nist.gov/vuln/detail/CVE-2025-37799), [CVE-2025-37797](https://nvd.nist.gov/vuln/detail/CVE-2025-37797), [CVE-2025-38177](https://nvd.nist.gov/vuln/detail/CVE-2025-38177), [CVE-2025-37990](https://nvd.nist.gov/vuln/detail/CVE-2025-37990), [CVE-2025-37991](https://nvd.nist.gov/vuln/detail/CVE-2025-37991), [CVE-2025-37917](https://nvd.nist.gov/vuln/detail/CVE-2025-37917), [CVE-2025-37927](https://nvd.nist.gov/vuln/detail/CVE-2025-37927), [CVE-2025-37924](https://nvd.nist.gov/vuln/detail/CVE-2025-37924), [CVE-2025-37923](https://nvd.nist.gov/vuln/detail/CVE-2025-37923), [CVE-2025-37922](https://nvd.nist.gov/vuln/detail/CVE-2025-37922), [CVE-2025-37921](https://nvd.nist.gov/vuln/detail/CVE-2025-37921), [CVE-2025-37936](https://nvd.nist.gov/vuln/detail/CVE-2025-37936), [CVE-2025-37935](https://nvd.nist.gov/vuln/detail/CVE-2025-37935), [CVE-2025-37933](https://nvd.nist.gov/vuln/detail/CVE-2025-37933), [CVE-2025-37932](https://nvd.nist.gov/vuln/detail/CVE-2025-37932), [CVE-2025-37930](https://nvd.nist.gov/vuln/detail/CVE-2025-37930), [CVE-2025-37929](https://nvd.nist.gov/vuln/detail/CVE-2025-37929), [CVE-2025-37928](https://nvd.nist.gov/vuln/detail/CVE-2025-37928), [CVE-2025-37918](https://nvd.nist.gov/vuln/detail/CVE-2025-37918), [CVE-2025-37903](https://nvd.nist.gov/vuln/detail/CVE-2025-37903), [CVE-2025-37901](https://nvd.nist.gov/vuln/detail/CVE-2025-37901), [CVE-2025-37897](https://nvd.nist.gov/vuln/detail/CVE-2025-37897), [CVE-2025-37916](https://nvd.nist.gov/vuln/detail/CVE-2025-37916), [CVE-2025-37915](https://nvd.nist.gov/vuln/detail/CVE-2025-37915), [CVE-2025-37914](https://nvd.nist.gov/vuln/detail/CVE-2025-37914), [CVE-2025-37913](https://nvd.nist.gov/vuln/detail/CVE-2025-37913), [CVE-2025-37912](https://nvd.nist.gov/vuln/detail/CVE-2025-37912), [CVE-2025-37911](https://nvd.nist.gov/vuln/detail/CVE-2025-37911), [CVE-2025-37909](https://nvd.nist.gov/vuln/detail/CVE-2025-37909), [CVE-2025-37905](https://nvd.nist.gov/vuln/detail/CVE-2025-37905), [CVE-2025-37891](https://nvd.nist.gov/vuln/detail/CVE-2025-37891), [CVE-2025-37890](https://nvd.nist.gov/vuln/detail/CVE-2025-37890), [CVE-2025-37998](https://nvd.nist.gov/vuln/detail/CVE-2025-37998), [CVE-2025-37997](https://nvd.nist.gov/vuln/detail/CVE-2025-37997), [CVE-2025-37995](https://nvd.nist.gov/vuln/detail/CVE-2025-37995), [CVE-2025-37994](https://nvd.nist.gov/vuln/detail/CVE-2025-37994), [CVE-2025-37973](https://nvd.nist.gov/vuln/detail/CVE-2025-37973), [CVE-2025-37972](https://nvd.nist.gov/vuln/detail/CVE-2025-37972), [CVE-2025-37970](https://nvd.nist.gov/vuln/detail/CVE-2025-37970), [CVE-2025-37969](https://nvd.nist.gov/vuln/detail/CVE-2025-37969), [CVE-2025-37964](https://nvd.nist.gov/vuln/detail/CVE-2025-37964), [CVE-2025-37963](https://nvd.nist.gov/vuln/detail/CVE-2025-37963), [CVE-2025-37962](https://nvd.nist.gov/vuln/detail/CVE-2025-37962), [CVE-2025-37961](https://nvd.nist.gov/vuln/detail/CVE-2025-37961), [CVE-2025-37959](https://nvd.nist.gov/vuln/detail/CVE-2025-37959), [CVE-2025-37954](https://nvd.nist.gov/vuln/detail/CVE-2025-37954), [CVE-2025-37953](https://nvd.nist.gov/vuln/detail/CVE-2025-37953), [CVE-2025-37952](https://nvd.nist.gov/vuln/detail/CVE-2025-37952), [CVE-2025-37951](https://nvd.nist.gov/vuln/detail/CVE-2025-37951), [CVE-2025-37949](https://nvd.nist.gov/vuln/detail/CVE-2025-37949), [CVE-2025-37948](https://nvd.nist.gov/vuln/detail/CVE-2025-37948), [CVE-2025-37956](https://nvd.nist.gov/vuln/detail/CVE-2025-37956), [CVE-2025-37947](https://nvd.nist.gov/vuln/detail/CVE-2025-37947), [CVE-2025-38094](https://nvd.nist.gov/vuln/detail/CVE-2025-38094), [CVE-2025-38095](https://nvd.nist.gov/vuln/detail/CVE-2025-38095), [CVE-2025-38015](https://nvd.nist.gov/vuln/detail/CVE-2025-38015), [CVE-2025-38014](https://nvd.nist.gov/vuln/detail/CVE-2025-38014), [CVE-2025-38013](https://nvd.nist.gov/vuln/detail/CVE-2025-38013), [CVE-2025-38010](https://nvd.nist.gov/vuln/detail/CVE-2025-38010), [CVE-2025-38009](https://nvd.nist.gov/vuln/detail/CVE-2025-38009), [CVE-2025-38027](https://nvd.nist.gov/vuln/detail/CVE-2025-38027), [CVE-2025-38008](https://nvd.nist.gov/vuln/detail/CVE-2025-38008), [CVE-2025-38024](https://nvd.nist.gov/vuln/detail/CVE-2025-38024), [CVE-2025-38023](https://nvd.nist.gov/vuln/detail/CVE-2025-38023), [CVE-2025-38020](https://nvd.nist.gov/vuln/detail/CVE-2025-38020), [CVE-2025-38019](https://nvd.nist.gov/vuln/detail/CVE-2025-38019), [CVE-2025-38018](https://nvd.nist.gov/vuln/detail/CVE-2025-38018), [CVE-2025-38007](https://nvd.nist.gov/vuln/detail/CVE-2025-38007), [CVE-2025-38006](https://nvd.nist.gov/vuln/detail/CVE-2025-38006), [CVE-2025-38005](https://nvd.nist.gov/vuln/detail/CVE-2025-38005), [CVE-2025-37992](https://nvd.nist.gov/vuln/detail/CVE-2025-37992), [CVE-2025-38097](https://nvd.nist.gov/vuln/detail/CVE-2025-38097), [CVE-2025-38092](https://nvd.nist.gov/vuln/detail/CVE-2025-38092), [CVE-2025-38052](https://nvd.nist.gov/vuln/detail/CVE-2025-38052), [CVE-2025-38061](https://nvd.nist.gov/vuln/detail/CVE-2025-38061), [CVE-2025-38059](https://nvd.nist.gov/vuln/detail/CVE-2025-38059), [CVE-2025-38058](https://nvd.nist.gov/vuln/detail/CVE-2025-38058), [CVE-2025-38081](https://nvd.nist.gov/vuln/detail/CVE-2025-38081), [CVE-2025-38080](https://nvd.nist.gov/vuln/detail/CVE-2025-38080), [CVE-2025-38079](https://nvd.nist.gov/vuln/detail/CVE-2025-38079), [CVE-2025-38078](https://nvd.nist.gov/vuln/detail/CVE-2025-38078), [CVE-2025-38077](https://nvd.nist.gov/vuln/detail/CVE-2025-38077), [CVE-2025-38075](https://nvd.nist.gov/vuln/detail/CVE-2025-38075), [CVE-2025-38074](https://nvd.nist.gov/vuln/detail/CVE-2025-38074), [CVE-2025-38072](https://nvd.nist.gov/vuln/detail/CVE-2025-38072), [CVE-2025-38071](https://nvd.nist.gov/vuln/detail/CVE-2025-38071), [CVE-2025-38068](https://nvd.nist.gov/vuln/detail/CVE-2025-38068), [CVE-2025-38066](https://nvd.nist.gov/vuln/detail/CVE-2025-38066), [CVE-2025-38065](https://nvd.nist.gov/vuln/detail/CVE-2025-38065), [CVE-2025-38063](https://nvd.nist.gov/vuln/detail/CVE-2025-38063), [CVE-2025-38062](https://nvd.nist.gov/vuln/detail/CVE-2025-38062), [CVE-2025-38037](https://nvd.nist.gov/vuln/detail/CVE-2025-38037), [CVE-2025-38035](https://nvd.nist.gov/vuln/detail/CVE-2025-38035), [CVE-2025-38034](https://nvd.nist.gov/vuln/detail/CVE-2025-38034), [CVE-2025-38051](https://nvd.nist.gov/vuln/detail/CVE-2025-38051), [CVE-2025-38031](https://nvd.nist.gov/vuln/detail/CVE-2025-38031), [CVE-2025-38048](https://nvd.nist.gov/vuln/detail/CVE-2025-38048), [CVE-2025-38046](https://nvd.nist.gov/vuln/detail/CVE-2025-38046), [CVE-2025-38045](https://nvd.nist.gov/vuln/detail/CVE-2025-38045), [CVE-2025-38044](https://nvd.nist.gov/vuln/detail/CVE-2025-38044), [CVE-2025-38043](https://nvd.nist.gov/vuln/detail/CVE-2025-38043), [CVE-2025-38040](https://nvd.nist.gov/vuln/detail/CVE-2025-38040), [CVE-2025-38039](https://nvd.nist.gov/vuln/detail/CVE-2025-38039), [CVE-2025-38030](https://nvd.nist.gov/vuln/detail/CVE-2025-38030), [CVE-2025-38003](https://nvd.nist.gov/vuln/detail/CVE-2025-38003), [CVE-2025-38004](https://nvd.nist.gov/vuln/detail/CVE-2025-38004), [CVE-2025-38001](https://nvd.nist.gov/vuln/detail/CVE-2025-38001), [CVE-2025-38000](https://nvd.nist.gov/vuln/detail/CVE-2025-38000), [CVE-2025-38174](https://nvd.nist.gov/vuln/detail/CVE-2025-38174), [CVE-2025-38163](https://nvd.nist.gov/vuln/detail/CVE-2025-38163), [CVE-2025-38170](https://nvd.nist.gov/vuln/detail/CVE-2025-38170), [CVE-2025-38167](https://nvd.nist.gov/vuln/detail/CVE-2025-38167), [CVE-2025-38166](https://nvd.nist.gov/vuln/detail/CVE-2025-38166), [CVE-2025-38165](https://nvd.nist.gov/vuln/detail/CVE-2025-38165), [CVE-2025-38173](https://nvd.nist.gov/vuln/detail/CVE-2025-38173), [CVE-2025-38138](https://nvd.nist.gov/vuln/detail/CVE-2025-38138), [CVE-2025-38136](https://nvd.nist.gov/vuln/detail/CVE-2025-38136), [CVE-2025-38135](https://nvd.nist.gov/vuln/detail/CVE-2025-38135), [CVE-2025-38161](https://nvd.nist.gov/vuln/detail/CVE-2025-38161), [CVE-2025-38160](https://nvd.nist.gov/vuln/detail/CVE-2025-38160), [CVE-2025-38159](https://nvd.nist.gov/vuln/detail/CVE-2025-38159), [CVE-2025-38158](https://nvd.nist.gov/vuln/detail/CVE-2025-38158), [CVE-2025-38157](https://nvd.nist.gov/vuln/detail/CVE-2025-38157), [CVE-2025-38155](https://nvd.nist.gov/vuln/detail/CVE-2025-38155), [CVE-2025-38154](https://nvd.nist.gov/vuln/detail/CVE-2025-38154), [CVE-2025-38153](https://nvd.nist.gov/vuln/detail/CVE-2025-38153), [CVE-2025-38151](https://nvd.nist.gov/vuln/detail/CVE-2025-38151), [CVE-2025-38149](https://nvd.nist.gov/vuln/detail/CVE-2025-38149), [CVE-2025-38148](https://nvd.nist.gov/vuln/detail/CVE-2025-38148), [CVE-2025-38147](https://nvd.nist.gov/vuln/detail/CVE-2025-38147), [CVE-2025-38146](https://nvd.nist.gov/vuln/detail/CVE-2025-38146), [CVE-2025-38145](https://nvd.nist.gov/vuln/detail/CVE-2025-38145), [CVE-2025-38143](https://nvd.nist.gov/vuln/detail/CVE-2025-38143), [CVE-2025-38142](https://nvd.nist.gov/vuln/detail/CVE-2025-38142), [CVE-2025-38131](https://nvd.nist.gov/vuln/detail/CVE-2025-38131), [CVE-2025-38110](https://nvd.nist.gov/vuln/detail/CVE-2025-38110), [CVE-2025-38109](https://nvd.nist.gov/vuln/detail/CVE-2025-38109), [CVE-2025-38108](https://nvd.nist.gov/vuln/detail/CVE-2025-38108), [CVE-2025-38107](https://nvd.nist.gov/vuln/detail/CVE-2025-38107), [CVE-2025-38103](https://nvd.nist.gov/vuln/detail/CVE-2025-38103), [CVE-2025-38127](https://nvd.nist.gov/vuln/detail/CVE-2025-38127), [CVE-2025-38126](https://nvd.nist.gov/vuln/detail/CVE-2025-38126), [CVE-2025-38124](https://nvd.nist.gov/vuln/detail/CVE-2025-38124), [CVE-2025-38123](https://nvd.nist.gov/vuln/detail/CVE-2025-38123), [CVE-2025-38122](https://nvd.nist.gov/vuln/detail/CVE-2025-38122), [CVE-2025-38102](https://nvd.nist.gov/vuln/detail/CVE-2025-38102), [CVE-2025-38120](https://nvd.nist.gov/vuln/detail/CVE-2025-38120), [CVE-2025-38119](https://nvd.nist.gov/vuln/detail/CVE-2025-38119), [CVE-2025-38118](https://nvd.nist.gov/vuln/detail/CVE-2025-38118), [CVE-2025-38117](https://nvd.nist.gov/vuln/detail/CVE-2025-38117), [CVE-2025-38115](https://nvd.nist.gov/vuln/detail/CVE-2025-38115), [CVE-2025-38113](https://nvd.nist.gov/vuln/detail/CVE-2025-38113), [CVE-2025-38112](https://nvd.nist.gov/vuln/detail/CVE-2025-38112), [CVE-2025-38111](https://nvd.nist.gov/vuln/detail/CVE-2025-38111), [CVE-2025-38100](https://nvd.nist.gov/vuln/detail/CVE-2025-38100), [CVE-2025-38088](https://nvd.nist.gov/vuln/detail/CVE-2025-38088), [CVE-2025-38083](https://nvd.nist.gov/vuln/detail/CVE-2025-38083), [CVE-2025-38219](https://nvd.nist.gov/vuln/detail/CVE-2025-38219), [CVE-2025-38218](https://nvd.nist.gov/vuln/detail/CVE-2025-38218), [CVE-2025-38217](https://nvd.nist.gov/vuln/detail/CVE-2025-38217), [CVE-2025-38215](https://nvd.nist.gov/vuln/detail/CVE-2025-38215), [CVE-2025-38214](https://nvd.nist.gov/vuln/detail/CVE-2025-38214), [CVE-2025-38213](https://nvd.nist.gov/vuln/detail/CVE-2025-38213), [CVE-2025-38231](https://nvd.nist.gov/vuln/detail/CVE-2025-38231), [CVE-2025-38212](https://nvd.nist.gov/vuln/detail/CVE-2025-38212), [CVE-2025-38229](https://nvd.nist.gov/vuln/detail/CVE-2025-38229), [CVE-2025-38227](https://nvd.nist.gov/vuln/detail/CVE-2025-38227), [CVE-2025-38226](https://nvd.nist.gov/vuln/detail/CVE-2025-38226), [CVE-2025-38225](https://nvd.nist.gov/vuln/detail/CVE-2025-38225), [CVE-2025-38222](https://nvd.nist.gov/vuln/detail/CVE-2025-38222), [CVE-2025-38220](https://nvd.nist.gov/vuln/detail/CVE-2025-38220), [CVE-2025-38211](https://nvd.nist.gov/vuln/detail/CVE-2025-38211), [CVE-2025-38185](https://nvd.nist.gov/vuln/detail/CVE-2025-38185), [CVE-2025-38184](https://nvd.nist.gov/vuln/detail/CVE-2025-38184), [CVE-2025-38183](https://nvd.nist.gov/vuln/detail/CVE-2025-38183), [CVE-2025-38182](https://nvd.nist.gov/vuln/detail/CVE-2025-38182), [CVE-2025-38208](https://nvd.nist.gov/vuln/detail/CVE-2025-38208), [CVE-2025-38181](https://nvd.nist.gov/vuln/detail/CVE-2025-38181), [CVE-2025-38202](https://nvd.nist.gov/vuln/detail/CVE-2025-38202), [CVE-2025-38200](https://nvd.nist.gov/vuln/detail/CVE-2025-38200), [CVE-2025-38198](https://nvd.nist.gov/vuln/detail/CVE-2025-38198), [CVE-2025-38180](https://nvd.nist.gov/vuln/detail/CVE-2025-38180), [CVE-2025-38197](https://nvd.nist.gov/vuln/detail/CVE-2025-38197), [CVE-2025-38195](https://nvd.nist.gov/vuln/detail/CVE-2025-38195), [CVE-2025-38194](https://nvd.nist.gov/vuln/detail/CVE-2025-38194), [CVE-2025-38193](https://nvd.nist.gov/vuln/detail/CVE-2025-38193), [CVE-2025-38192](https://nvd.nist.gov/vuln/detail/CVE-2025-38192), [CVE-2025-38191](https://nvd.nist.gov/vuln/detail/CVE-2025-38191), [CVE-2025-38190](https://nvd.nist.gov/vuln/detail/CVE-2025-38190), [CVE-2025-38090](https://nvd.nist.gov/vuln/detail/CVE-2025-38090), [CVE-2025-38089](https://nvd.nist.gov/vuln/detail/CVE-2025-38089), [CVE-2025-38087](https://nvd.nist.gov/vuln/detail/CVE-2025-38087), [CVE-2025-38086](https://nvd.nist.gov/vuln/detail/CVE-2025-38086), [CVE-2025-38084](https://nvd.nist.gov/vuln/detail/CVE-2025-38084), [CVE-2025-38085](https://nvd.nist.gov/vuln/detail/CVE-2025-38085))\n - sudo ([CVE-2025-32462](https://www.cve.org/CVERecord?id=CVE-2025-32462), [CVE-2025-32463](https://www.cve.org/CVERecord?id=CVE-2025-32463))\n \n #### Bug fixes:\n \n - Added back some BCC tools ([scripts#2900](https://github.com/flatcar/scripts/pull/2900))\n \n #### Updates:\n \n - Linux ([6.6.95](https://lwn.net/Articles/1027279/) (includes [6.6.94](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.94), [6.6.93](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.93), [6.6.92](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.92), [6.6.91](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.91), [6.6.90](https://lwn.net/Articles/1020659/), [6.6.89](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.89)))\n - ca-certificates ([3.113](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html) (includes([3.112](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html), [3.111](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html)))\n - sudo ([1.9.17p1](https://www.sudo.ws/releases/stable/#1.9.17p1))\n"
  },
  "4081.3.5": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-08-19 13:10:36 +0000",
    "major_software": {
      "containerd": [
        "1.7.21"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.100"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "_Changes since **LTS 4081.3.4**_\n\n#### Updates:\n\n- Linux ([6.6.100](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.100) (includes [6.6.99](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.99), [6.6.98](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.98), [6.6.97](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.97), [6.6.96](https://lwn.net/Articles/1028829/))\n- ca-certificates ([3.114](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html) (includes [3.113.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html)))"
  },
  "4081.3.6": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-09-15 14:03:10 +0000",
    "major_software": {
      "containerd": [
        "1.7.21"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.106"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "_Changes since **LTS 4081.3.5**_\n\n#### Security fixes:\n\n- Linux ([CVE-2025-39726](https://nvd.nist.gov/vuln/detail/CVE-2025-39726), [CVE-2025-38670](https://nvd.nist.gov/vuln/detail/CVE-2025-38670), [CVE-2025-38668](https://nvd.nist.gov/vuln/detail/CVE-2025-38668), [CVE-2025-38666](https://nvd.nist.gov/vuln/detail/CVE-2025-38666), [CVE-2025-38665](https://nvd.nist.gov/vuln/detail/CVE-2025-38665), [CVE-2025-38664](https://nvd.nist.gov/vuln/detail/CVE-2025-38664), [CVE-2025-38663](https://nvd.nist.gov/vuln/detail/CVE-2025-38663), [CVE-2025-38671](https://nvd.nist.gov/vuln/detail/CVE-2025-38671), [CVE-2025-38552](https://nvd.nist.gov/vuln/detail/CVE-2025-38552), [CVE-2025-38520](https://nvd.nist.gov/vuln/detail/CVE-2025-38520), [CVE-2025-38500](https://nvd.nist.gov/vuln/detail/CVE-2025-38500), [CVE-2025-39734](https://nvd.nist.gov/vuln/detail/CVE-2025-39734), [CVE-2025-39731](https://nvd.nist.gov/vuln/detail/CVE-2025-39731), [CVE-2025-39730](https://nvd.nist.gov/vuln/detail/CVE-2025-39730), [CVE-2025-38650](https://nvd.nist.gov/vuln/detail/CVE-2025-38650), [CVE-2025-38648](https://nvd.nist.gov/vuln/detail/CVE-2025-38648), [CVE-2025-38646](https://nvd.nist.gov/vuln/detail/CVE-2025-38646), [CVE-2025-38645](https://nvd.nist.gov/vuln/detail/CVE-2025-38645), [CVE-2025-38644](https://nvd.nist.gov/vuln/detail/CVE-2025-38644), [CVE-2025-38659](https://nvd.nist.gov/vuln/detail/CVE-2025-38659), [CVE-2025-38653](https://nvd.nist.gov/vuln/detail/CVE-2025-38653), [CVE-2025-38652](https://nvd.nist.gov/vuln/detail/CVE-2025-38652), [CVE-2025-38626](https://nvd.nist.gov/vuln/detail/CVE-2025-38626), [CVE-2025-38625](https://nvd.nist.gov/vuln/detail/CVE-2025-38625), [CVE-2025-38624](https://nvd.nist.gov/vuln/detail/CVE-2025-38624), [CVE-2025-38623](https://nvd.nist.gov/vuln/detail/CVE-2025-38623), [CVE-2025-38622](https://nvd.nist.gov/vuln/detail/CVE-2025-38622), [CVE-2025-38640](https://nvd.nist.gov/vuln/detail/CVE-2025-38640), [CVE-2025-38639](https://nvd.nist.gov/vuln/detail/CVE-2025-38639), [CVE-2025-38635](https://nvd.nist.gov/vuln/detail/CVE-2025-38635), [CVE-2025-38634](https://nvd.nist.gov/vuln/detail/CVE-2025-38634), [CVE-2025-38632](https://nvd.nist.gov/vuln/detail/CVE-2025-38632), [CVE-2025-38630](https://nvd.nist.gov/vuln/detail/CVE-2025-38630), [CVE-2025-38618](https://nvd.nist.gov/vuln/detail/CVE-2025-38618), [CVE-2025-38617](https://nvd.nist.gov/vuln/detail/CVE-2025-38617), [CVE-2025-38611](https://nvd.nist.gov/vuln/detail/CVE-2025-38611), [CVE-2025-38615](https://nvd.nist.gov/vuln/detail/CVE-2025-38615), [CVE-2025-38612](https://nvd.nist.gov/vuln/detail/CVE-2025-38612), [CVE-2025-38577](https://nvd.nist.gov/vuln/detail/CVE-2025-38577), [CVE-2025-38583](https://nvd.nist.gov/vuln/detail/CVE-2025-38583), [CVE-2025-38581](https://nvd.nist.gov/vuln/detail/CVE-2025-38581), [CVE-2025-38610](https://nvd.nist.gov/vuln/detail/CVE-2025-38610), [CVE-2025-38609](https://nvd.nist.gov/vuln/detail/CVE-2025-38609), [CVE-2025-38608](https://nvd.nist.gov/vuln/detail/CVE-2025-38608), [CVE-2025-38604](https://nvd.nist.gov/vuln/detail/CVE-2025-38604), [CVE-2025-38602](https://nvd.nist.gov/vuln/detail/CVE-2025-38602), [CVE-2025-38601](https://nvd.nist.gov/vuln/detail/CVE-2025-38601), [CVE-2025-38579](https://nvd.nist.gov/vuln/detail/CVE-2025-38579), [CVE-2025-38590](https://nvd.nist.gov/vuln/detail/CVE-2025-38590), [CVE-2025-38588](https://nvd.nist.gov/vuln/detail/CVE-2025-38588), [CVE-2025-38587](https://nvd.nist.gov/vuln/detail/CVE-2025-38587), [CVE-2025-38578](https://nvd.nist.gov/vuln/detail/CVE-2025-38578), [CVE-2025-38563](https://nvd.nist.gov/vuln/detail/CVE-2025-38563), [CVE-2025-38562](https://nvd.nist.gov/vuln/detail/CVE-2025-38562), [CVE-2025-38561](https://nvd.nist.gov/vuln/detail/CVE-2025-38561), [CVE-2025-38560](https://nvd.nist.gov/vuln/detail/CVE-2025-38560), [CVE-2025-38576](https://nvd.nist.gov/vuln/detail/CVE-2025-38576), [CVE-2025-38574](https://nvd.nist.gov/vuln/detail/CVE-2025-38574), [CVE-2025-38572](https://nvd.nist.gov/vuln/detail/CVE-2025-38572), [CVE-2025-38571](https://nvd.nist.gov/vuln/detail/CVE-2025-38571), [CVE-2025-38569](https://nvd.nist.gov/vuln/detail/CVE-2025-38569), [CVE-2025-38568](https://nvd.nist.gov/vuln/detail/CVE-2025-38568), [CVE-2025-38566](https://nvd.nist.gov/vuln/detail/CVE-2025-38566), [CVE-2025-38565](https://nvd.nist.gov/vuln/detail/CVE-2025-38565), [CVE-2025-38555](https://nvd.nist.gov/vuln/detail/CVE-2025-38555), [CVE-2025-38553](https://nvd.nist.gov/vuln/detail/CVE-2025-38553), [CVE-2025-38501](https://nvd.nist.gov/vuln/detail/CVE-2025-38501), [CVE-2025-39798](https://nvd.nist.gov/vuln/detail/CVE-2025-39798), [CVE-2025-39797](https://nvd.nist.gov/vuln/detail/CVE-2025-39797), [CVE-2025-39795](https://nvd.nist.gov/vuln/detail/CVE-2025-39795), [CVE-2025-39794](https://nvd.nist.gov/vuln/detail/CVE-2025-39794), [CVE-2025-39773](https://nvd.nist.gov/vuln/detail/CVE-2025-39773), [CVE-2025-39772](https://nvd.nist.gov/vuln/detail/CVE-2025-39772), [CVE-2025-39770](https://nvd.nist.gov/vuln/detail/CVE-2025-39770), [CVE-2025-39790](https://nvd.nist.gov/vuln/detail/CVE-2025-39790), [CVE-2025-39788](https://nvd.nist.gov/vuln/detail/CVE-2025-39788), [CVE-2025-39787](https://nvd.nist.gov/vuln/detail/CVE-2025-39787), [CVE-2025-39767](https://nvd.nist.gov/vuln/detail/CVE-2025-39767), [CVE-2025-39783](https://nvd.nist.gov/vuln/detail/CVE-2025-39783), [CVE-2025-39782](https://nvd.nist.gov/vuln/detail/CVE-2025-39782), [CVE-2025-39781](https://nvd.nist.gov/vuln/detail/CVE-2025-39781), [CVE-2025-39776](https://nvd.nist.gov/vuln/detail/CVE-2025-39776), [CVE-2025-39766](https://nvd.nist.gov/vuln/detail/CVE-2025-39766), [CVE-2025-39750](https://nvd.nist.gov/vuln/detail/CVE-2025-39750), [CVE-2025-39760](https://nvd.nist.gov/vuln/detail/CVE-2025-39760), [CVE-2025-39759](https://nvd.nist.gov/vuln/detail/CVE-2025-39759), [CVE-2025-39758](https://nvd.nist.gov/vuln/detail/CVE-2025-39758), [CVE-2025-39757](https://nvd.nist.gov/vuln/detail/CVE-2025-39757), [CVE-2025-39756](https://nvd.nist.gov/vuln/detail/CVE-2025-39756), [CVE-2025-39753](https://nvd.nist.gov/vuln/detail/CVE-2025-39753), [CVE-2025-39752](https://nvd.nist.gov/vuln/detail/CVE-2025-39752), [CVE-2025-39763](https://nvd.nist.gov/vuln/detail/CVE-2025-39763), [CVE-2025-39761](https://nvd.nist.gov/vuln/detail/CVE-2025-39761), [CVE-2025-39751](https://nvd.nist.gov/vuln/detail/CVE-2025-39751), [CVE-2025-39744](https://nvd.nist.gov/vuln/detail/CVE-2025-39744), [CVE-2025-39743](https://nvd.nist.gov/vuln/detail/CVE-2025-39743), [CVE-2025-39742](https://nvd.nist.gov/vuln/detail/CVE-2025-39742), [CVE-2025-39739](https://nvd.nist.gov/vuln/detail/CVE-2025-39739), [CVE-2025-39738](https://nvd.nist.gov/vuln/detail/CVE-2025-39738), [CVE-2025-39749](https://nvd.nist.gov/vuln/detail/CVE-2025-39749), [CVE-2025-39736](https://nvd.nist.gov/vuln/detail/CVE-2025-39736), [CVE-2025-39737](https://nvd.nist.gov/vuln/detail/CVE-2025-39737), [CVE-2025-39711](https://nvd.nist.gov/vuln/detail/CVE-2025-39711), [CVE-2025-39720](https://nvd.nist.gov/vuln/detail/CVE-2025-39720), [CVE-2025-39719](https://nvd.nist.gov/vuln/detail/CVE-2025-39719), [CVE-2025-39718](https://nvd.nist.gov/vuln/detail/CVE-2025-39718), [CVE-2025-39716](https://nvd.nist.gov/vuln/detail/CVE-2025-39716), [CVE-2025-39715](https://nvd.nist.gov/vuln/detail/CVE-2025-39715), [CVE-2025-39714](https://nvd.nist.gov/vuln/detail/CVE-2025-39714), [CVE-2025-39713](https://nvd.nist.gov/vuln/detail/CVE-2025-39713), [CVE-2025-39724](https://nvd.nist.gov/vuln/detail/CVE-2025-39724), [CVE-2025-39721](https://nvd.nist.gov/vuln/detail/CVE-2025-39721), [CVE-2025-39675](https://nvd.nist.gov/vuln/detail/CVE-2025-39675), [CVE-2025-39673](https://nvd.nist.gov/vuln/detail/CVE-2025-39673), [CVE-2025-39710](https://nvd.nist.gov/vuln/detail/CVE-2025-39710), [CVE-2025-39709](https://nvd.nist.gov/vuln/detail/CVE-2025-39709), [CVE-2025-38735](https://nvd.nist.gov/vuln/detail/CVE-2025-38735), [CVE-2025-39706](https://nvd.nist.gov/vuln/detail/CVE-2025-39706), [CVE-2025-39703](https://nvd.nist.gov/vuln/detail/CVE-2025-39703), [CVE-2025-39702](https://nvd.nist.gov/vuln/detail/CVE-2025-39702), [CVE-2025-39701](https://nvd.nist.gov/vuln/detail/CVE-2025-39701), [CVE-2025-38734](https://nvd.nist.gov/vuln/detail/CVE-2025-38734), [CVE-2025-39694](https://nvd.nist.gov/vuln/detail/CVE-2025-39694), [CVE-2025-39693](https://nvd.nist.gov/vuln/detail/CVE-2025-39693), [CVE-2025-39692](https://nvd.nist.gov/vuln/detail/CVE-2025-39692), [CVE-2025-39691](https://nvd.nist.gov/vuln/detail/CVE-2025-39691), [CVE-2025-39689](https://nvd.nist.gov/vuln/detail/CVE-2025-39689), [CVE-2025-39687](https://nvd.nist.gov/vuln/detail/CVE-2025-39687), [CVE-2025-39686](https://nvd.nist.gov/vuln/detail/CVE-2025-39686), [CVE-2025-39685](https://nvd.nist.gov/vuln/detail/CVE-2025-39685), [CVE-2025-39684](https://nvd.nist.gov/vuln/detail/CVE-2025-39684), [CVE-2025-39683](https://nvd.nist.gov/vuln/detail/CVE-2025-39683), [CVE-2025-39682](https://nvd.nist.gov/vuln/detail/CVE-2025-39682), [CVE-2025-39681](https://nvd.nist.gov/vuln/detail/CVE-2025-39681), [CVE-2025-39679](https://nvd.nist.gov/vuln/detail/CVE-2025-39679), [CVE-2025-39676](https://nvd.nist.gov/vuln/detail/CVE-2025-39676), [CVE-2025-38732](https://nvd.nist.gov/vuln/detail/CVE-2025-38732), [CVE-2025-38727](https://nvd.nist.gov/vuln/detail/CVE-2025-38727), [CVE-2025-38730](https://nvd.nist.gov/vuln/detail/CVE-2025-38730), [CVE-2025-38729](https://nvd.nist.gov/vuln/detail/CVE-2025-38729), [CVE-2025-38728](https://nvd.nist.gov/vuln/detail/CVE-2025-38728), [CVE-2025-38694](https://nvd.nist.gov/vuln/detail/CVE-2025-38694), [CVE-2025-38702](https://nvd.nist.gov/vuln/detail/CVE-2025-38702), [CVE-2025-38701](https://nvd.nist.gov/vuln/detail/CVE-2025-38701), [CVE-2025-38700](https://nvd.nist.gov/vuln/detail/CVE-2025-38700), [CVE-2025-38699](https://nvd.nist.gov/vuln/detail/CVE-2025-38699), [CVE-2025-38698](https://nvd.nist.gov/vuln/detail/CVE-2025-38698), [CVE-2025-38725](https://nvd.nist.gov/vuln/detail/CVE-2025-38725), [CVE-2025-38724](https://nvd.nist.gov/vuln/detail/CVE-2025-38724), [CVE-2025-38697](https://nvd.nist.gov/vuln/detail/CVE-2025-38697), [CVE-2025-38723](https://nvd.nist.gov/vuln/detail/CVE-2025-38723), [CVE-2025-38721](https://nvd.nist.gov/vuln/detail/CVE-2025-38721), [CVE-2025-38718](https://nvd.nist.gov/vuln/detail/CVE-2025-38718), [CVE-2025-38716](https://nvd.nist.gov/vuln/detail/CVE-2025-38716), [CVE-2025-38715](https://nvd.nist.gov/vuln/detail/CVE-2025-38715), [CVE-2025-38714](https://nvd.nist.gov/vuln/detail/CVE-2025-38714), [CVE-2025-38696](https://nvd.nist.gov/vuln/detail/CVE-2025-38696), [CVE-2025-38713](https://nvd.nist.gov/vuln/detail/CVE-2025-38713), [CVE-2025-38712](https://nvd.nist.gov/vuln/detail/CVE-2025-38712), [CVE-2025-38711](https://nvd.nist.gov/vuln/detail/CVE-2025-38711), [CVE-2025-38709](https://nvd.nist.gov/vuln/detail/CVE-2025-38709), [CVE-2025-38708](https://nvd.nist.gov/vuln/detail/CVE-2025-38708), [CVE-2025-38707](https://nvd.nist.gov/vuln/detail/CVE-2025-38707), [CVE-2025-38706](https://nvd.nist.gov/vuln/detail/CVE-2025-38706), [CVE-2025-38695](https://nvd.nist.gov/vuln/detail/CVE-2025-38695), [CVE-2025-38688](https://nvd.nist.gov/vuln/detail/CVE-2025-38688), [CVE-2025-38687](https://nvd.nist.gov/vuln/detail/CVE-2025-38687), [CVE-2025-38685](https://nvd.nist.gov/vuln/detail/CVE-2025-38685), [CVE-2025-38684](https://nvd.nist.gov/vuln/detail/CVE-2025-38684), [CVE-2025-38683](https://nvd.nist.gov/vuln/detail/CVE-2025-38683), [CVE-2025-38681](https://nvd.nist.gov/vuln/detail/CVE-2025-38681), [CVE-2025-38693](https://nvd.nist.gov/vuln/detail/CVE-2025-38693), [CVE-2025-38692](https://nvd.nist.gov/vuln/detail/CVE-2025-38692), [CVE-2025-38691](https://nvd.nist.gov/vuln/detail/CVE-2025-38691), [CVE-2025-38679](https://nvd.nist.gov/vuln/detail/CVE-2025-38679), [CVE-2025-38680](https://nvd.nist.gov/vuln/detail/CVE-2025-38680), [CVE-2025-38677](https://nvd.nist.gov/vuln/detail/CVE-2025-38677), [CVE-2025-40300](https://nvd.nist.gov/vuln/detail/CVE-2025-40300))\n\n#### Updates:\n\n- Linux ([6.6.106](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.106) (includes [6.6.105](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.105), [6.6.104](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.104), [6.6.103](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.103), [6.6.102](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.102), [6.6.101](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.101)))\n- ca-certificates ([3.115.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115_1.html) (includes [3.115](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115.html)))"
  },
  "current-2021": {
    "channel": "lts",
    "architectures": [
      "amd64"
    ],
    "release_date": "2022-10-17 15:09:11 +0000",
    "major_software": {
      "docker": [
        "19.03.15"
      ],
      "ignition": [
        "0.34.0"
      ],
      "kernel": [
        "5.4.210"
      ],
      "systemd": [
        "246"
      ]
    },
    "release_notes": "_Changes since **LTS 2605.31.1**_\n\n#### Updates:\n\n- ca-certificates ([3.83](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_83.html))"
  },
  "current-2022": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2023-10-25 08:40:29 +0000",
    "major_software": {
      "docker": [
        "20.10.12"
      ],
      "ignition": [
        "0.36.1"
      ],
      "kernel": [
        "5.10.198"
      ],
      "systemd": [
        "249"
      ]
    },
    "release_notes": "_Changes since **LTS 3033.3.17**_\n\n#### Security fixes:\n\n- Linux ([CVE-2023-31085](https://nvd.nist.gov/vuln/detail/CVE-2023-31085), [CVE-2023-34324](https://nvd.nist.gov/vuln/detail/CVE-2023-34324), [CVE-2023-39189](https://nvd.nist.gov/vuln/detail/CVE-2023-39189), [CVE-2023-39192](https://nvd.nist.gov/vuln/detail/CVE-2023-39192), [CVE-2023-39193](https://nvd.nist.gov/vuln/detail/CVE-2023-39193), [CVE-2023-4244](https://nvd.nist.gov/vuln/detail/CVE-2023-4244), [CVE-2023-42752](https://nvd.nist.gov/vuln/detail/CVE-2023-42752), [CVE-2023-42753](https://nvd.nist.gov/vuln/detail/CVE-2023-42753), [CVE-2023-42754](https://nvd.nist.gov/vuln/detail/CVE-2023-42754), [CVE-2023-42755](https://nvd.nist.gov/vuln/detail/CVE-2023-42755), [CVE-2023-45871](https://nvd.nist.gov/vuln/detail/CVE-2023-45871), [CVE-2023-4623](https://nvd.nist.gov/vuln/detail/CVE-2023-4623), [CVE-2023-4921](https://nvd.nist.gov/vuln/detail/CVE-2023-4921), [CVE-2023-5197](https://nvd.nist.gov/vuln/detail/CVE-2023-5197))\n- curl ([CVE-2023-38545](https://nvd.nist.gov/vuln/detail/CVE-2023-38545), [CVE-2023-38546](https://nvd.nist.gov/vuln/detail/CVE-2023-38546))\n\n#### Bug fixes:\n\n\n#### Changes:\n\n- Add support for Microsoft Azure Network Adapter (MANA) NICs on Azure ([scripts#1131](https://github.com/flatcar/scripts/pull/1131))\n\n#### Updates:\n\n- ca-certificates ([3.94](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_94.html))\n- Linux ([5.10.198](https://lwn.net/Articles/947300) (includes [5.10.197](https://lwn.net/Articles/945381), [5.10.196](https://lwn.net/Articles/945131), [5.10.195](https://lwn.net/Articles/944878), [5.10.194](https://lwn.net/Articles/943405)))"
  },
  "current-2023": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-08-19 13:11:03 +0000",
    "major_software": {
      "containerd": [
        "1.6.16"
      ],
      "docker": [
        "20.10.23"
      ],
      "ignition": [
        "2.14.0"
      ],
      "kernel": [
        "5.15.189"
      ],
      "systemd": [
        "252"
      ]
    },
    "release_notes": "_Changes since **LTS 3510.3.7**_\n\n#### Security fixes:\n\n- Linux ([CVE-2022-48771](https://nvd.nist.gov/vuln/detail/CVE-2022-48771), [CVE-2025-37937](https://nvd.nist.gov/vuln/detail/CVE-2025-37937), [CVE-2025-37889](https://nvd.nist.gov/vuln/detail/CVE-2025-37889), [CVE-2025-38575](https://nvd.nist.gov/vuln/detail/CVE-2025-38575), [CVE-2025-38152](https://nvd.nist.gov/vuln/detail/CVE-2025-38152), [CVE-2025-39735](https://nvd.nist.gov/vuln/detail/CVE-2025-39735), [CVE-2025-39728](https://nvd.nist.gov/vuln/detail/CVE-2025-39728), [CVE-2025-38637](https://nvd.nist.gov/vuln/detail/CVE-2025-38637), [CVE-2025-37785](https://nvd.nist.gov/vuln/detail/CVE-2025-37785), [CVE-2025-23138](https://nvd.nist.gov/vuln/detail/CVE-2025-23138), [CVE-2025-23136](https://nvd.nist.gov/vuln/detail/CVE-2025-23136), [CVE-2025-22066](https://nvd.nist.gov/vuln/detail/CVE-2025-22066), [CVE-2025-22075](https://nvd.nist.gov/vuln/detail/CVE-2025-22075), [CVE-2025-22073](https://nvd.nist.gov/vuln/detail/CVE-2025-22073), [CVE-2025-22071](https://nvd.nist.gov/vuln/detail/CVE-2025-22071), [CVE-2025-22097](https://nvd.nist.gov/vuln/detail/CVE-2025-22097), [CVE-2025-22089](https://nvd.nist.gov/vuln/detail/CVE-2025-22089), [CVE-2025-22086](https://nvd.nist.gov/vuln/detail/CVE-2025-22086), [CVE-2025-22081](https://nvd.nist.gov/vuln/detail/CVE-2025-22081), [CVE-2025-22079](https://nvd.nist.gov/vuln/detail/CVE-2025-22079), [CVE-2025-22063](https://nvd.nist.gov/vuln/detail/CVE-2025-22063), [CVE-2025-22060](https://nvd.nist.gov/vuln/detail/CVE-2025-22060), [CVE-2025-22056](https://nvd.nist.gov/vuln/detail/CVE-2025-22056), [CVE-2025-22055](https://nvd.nist.gov/vuln/detail/CVE-2025-22055), [CVE-2025-22054](https://nvd.nist.gov/vuln/detail/CVE-2025-22054), [CVE-2025-22035](https://nvd.nist.gov/vuln/detail/CVE-2025-22035), [CVE-2025-22050](https://nvd.nist.gov/vuln/detail/CVE-2025-22050), [CVE-2025-22045](https://nvd.nist.gov/vuln/detail/CVE-2025-22045), [CVE-2025-22044](https://nvd.nist.gov/vuln/detail/CVE-2025-22044), [CVE-2025-22025](https://nvd.nist.gov/vuln/detail/CVE-2025-22025), [CVE-2023-53034](https://nvd.nist.gov/vuln/detail/CVE-2023-53034), [CVE-2025-22021](https://nvd.nist.gov/vuln/detail/CVE-2025-22021), [CVE-2025-22020](https://nvd.nist.gov/vuln/detail/CVE-2025-22020), [CVE-2025-22018](https://nvd.nist.gov/vuln/detail/CVE-2025-22018), [CVE-2025-37989](https://nvd.nist.gov/vuln/detail/CVE-2025-37989), [CVE-2025-37985](https://nvd.nist.gov/vuln/detail/CVE-2025-37985), [CVE-2025-37983](https://nvd.nist.gov/vuln/detail/CVE-2025-37983), [CVE-2025-37982](https://nvd.nist.gov/vuln/detail/CVE-2025-37982), [CVE-2025-37940](https://nvd.nist.gov/vuln/detail/CVE-2025-37940), [CVE-2025-37892](https://nvd.nist.gov/vuln/detail/CVE-2025-37892), [CVE-2025-37885](https://nvd.nist.gov/vuln/detail/CVE-2025-37885), [CVE-2025-37883](https://nvd.nist.gov/vuln/detail/CVE-2025-37883), [CVE-2025-37881](https://nvd.nist.gov/vuln/detail/CVE-2025-37881), [CVE-2025-37871](https://nvd.nist.gov/vuln/detail/CVE-2025-37871), [CVE-2025-37867](https://nvd.nist.gov/vuln/detail/CVE-2025-37867), [CVE-2025-37875](https://nvd.nist.gov/vuln/detail/CVE-2025-37875), [CVE-2025-37844](https://nvd.nist.gov/vuln/detail/CVE-2025-37844), [CVE-2025-37841](https://nvd.nist.gov/vuln/detail/CVE-2025-37841), [CVE-2025-37840](https://nvd.nist.gov/vuln/detail/CVE-2025-37840), [CVE-2025-37862](https://nvd.nist.gov/vuln/detail/CVE-2025-37862), [CVE-2025-37859](https://nvd.nist.gov/vuln/detail/CVE-2025-37859), [CVE-2025-37858](https://nvd.nist.gov/vuln/detail/CVE-2025-37858), [CVE-2025-37857](https://nvd.nist.gov/vuln/detail/CVE-2025-37857), [CVE-2025-37839](https://nvd.nist.gov/vuln/detail/CVE-2025-37839), [CVE-2025-37851](https://nvd.nist.gov/vuln/detail/CVE-2025-37851), [CVE-2025-37850](https://nvd.nist.gov/vuln/detail/CVE-2025-37850), [CVE-2025-37836](https://nvd.nist.gov/vuln/detail/CVE-2025-37836), [CVE-2025-37823](https://nvd.nist.gov/vuln/detail/CVE-2025-37823), [CVE-2025-37830](https://nvd.nist.gov/vuln/detail/CVE-2025-37830), [CVE-2025-37829](https://nvd.nist.gov/vuln/detail/CVE-2025-37829), [CVE-2025-37824](https://nvd.nist.gov/vuln/detail/CVE-2025-37824), [CVE-2025-37808](https://nvd.nist.gov/vuln/detail/CVE-2025-37808), [CVE-2025-37805](https://nvd.nist.gov/vuln/detail/CVE-2025-37805), [CVE-2025-37803](https://nvd.nist.gov/vuln/detail/CVE-2025-37803), [CVE-2025-37817](https://nvd.nist.gov/vuln/detail/CVE-2025-37817), [CVE-2025-37812](https://nvd.nist.gov/vuln/detail/CVE-2025-37812), [CVE-2025-37811](https://nvd.nist.gov/vuln/detail/CVE-2025-37811), [CVE-2025-37810](https://nvd.nist.gov/vuln/detail/CVE-2025-37810), [CVE-2025-37797](https://nvd.nist.gov/vuln/detail/CVE-2025-37797), [CVE-2025-37990](https://nvd.nist.gov/vuln/detail/CVE-2025-37990), [CVE-2025-37991](https://nvd.nist.gov/vuln/detail/CVE-2025-37991), [CVE-2025-37927](https://nvd.nist.gov/vuln/detail/CVE-2025-37927), [CVE-2025-37923](https://nvd.nist.gov/vuln/detail/CVE-2025-37923), [CVE-2025-37930](https://nvd.nist.gov/vuln/detail/CVE-2025-37930), [CVE-2025-37929](https://nvd.nist.gov/vuln/detail/CVE-2025-37929), [CVE-2025-37915](https://nvd.nist.gov/vuln/detail/CVE-2025-37915), [CVE-2025-37914](https://nvd.nist.gov/vuln/detail/CVE-2025-37914), [CVE-2025-37913](https://nvd.nist.gov/vuln/detail/CVE-2025-37913), [CVE-2025-37912](https://nvd.nist.gov/vuln/detail/CVE-2025-37912), [CVE-2025-37911](https://nvd.nist.gov/vuln/detail/CVE-2025-37911), [CVE-2025-37909](https://nvd.nist.gov/vuln/detail/CVE-2025-37909), [CVE-2025-37905](https://nvd.nist.gov/vuln/detail/CVE-2025-37905), [CVE-2025-37890](https://nvd.nist.gov/vuln/detail/CVE-2025-37890), [CVE-2025-37998](https://nvd.nist.gov/vuln/detail/CVE-2025-37998), [CVE-2025-37997](https://nvd.nist.gov/vuln/detail/CVE-2025-37997), [CVE-2025-37995](https://nvd.nist.gov/vuln/detail/CVE-2025-37995), [CVE-2025-37994](https://nvd.nist.gov/vuln/detail/CVE-2025-37994), [CVE-2025-37970](https://nvd.nist.gov/vuln/detail/CVE-2025-37970), [CVE-2025-37969](https://nvd.nist.gov/vuln/detail/CVE-2025-37969), [CVE-2025-37964](https://nvd.nist.gov/vuln/detail/CVE-2025-37964), [CVE-2025-37949](https://nvd.nist.gov/vuln/detail/CVE-2025-37949), [CVE-2025-38094](https://nvd.nist.gov/vuln/detail/CVE-2025-38094), [CVE-2025-38009](https://nvd.nist.gov/vuln/detail/CVE-2025-38009), [CVE-2025-38024](https://nvd.nist.gov/vuln/detail/CVE-2025-38024), [CVE-2025-38023](https://nvd.nist.gov/vuln/detail/CVE-2025-38023), [CVE-2025-38005](https://nvd.nist.gov/vuln/detail/CVE-2025-38005), [CVE-2025-37992](https://nvd.nist.gov/vuln/detail/CVE-2025-37992), [CVE-2025-38052](https://nvd.nist.gov/vuln/detail/CVE-2025-38052), [CVE-2025-38061](https://nvd.nist.gov/vuln/detail/CVE-2025-38061), [CVE-2025-38058](https://nvd.nist.gov/vuln/detail/CVE-2025-38058), [CVE-2025-38079](https://nvd.nist.gov/vuln/detail/CVE-2025-38079), [CVE-2025-38078](https://nvd.nist.gov/vuln/detail/CVE-2025-38078), [CVE-2025-38077](https://nvd.nist.gov/vuln/detail/CVE-2025-38077), [CVE-2025-38075](https://nvd.nist.gov/vuln/detail/CVE-2025-38075), [CVE-2025-38072](https://nvd.nist.gov/vuln/detail/CVE-2025-38072), [CVE-2025-38068](https://nvd.nist.gov/vuln/detail/CVE-2025-38068), [CVE-2025-38066](https://nvd.nist.gov/vuln/detail/CVE-2025-38066), [CVE-2025-38065](https://nvd.nist.gov/vuln/detail/CVE-2025-38065), [CVE-2025-38037](https://nvd.nist.gov/vuln/detail/CVE-2025-38037), [CVE-2025-38035](https://nvd.nist.gov/vuln/detail/CVE-2025-38035), [CVE-2025-38034](https://nvd.nist.gov/vuln/detail/CVE-2025-38034), [CVE-2025-38051](https://nvd.nist.gov/vuln/detail/CVE-2025-38051), [CVE-2025-38031](https://nvd.nist.gov/vuln/detail/CVE-2025-38031), [CVE-2025-38048](https://nvd.nist.gov/vuln/detail/CVE-2025-38048), [CVE-2025-38046](https://nvd.nist.gov/vuln/detail/CVE-2025-38046), [CVE-2025-38044](https://nvd.nist.gov/vuln/detail/CVE-2025-38044), [CVE-2025-38043](https://nvd.nist.gov/vuln/detail/CVE-2025-38043), [CVE-2025-38030](https://nvd.nist.gov/vuln/detail/CVE-2025-38030), [CVE-2025-38003](https://nvd.nist.gov/vuln/detail/CVE-2025-38003), [CVE-2025-38004](https://nvd.nist.gov/vuln/detail/CVE-2025-38004), [CVE-2025-38001](https://nvd.nist.gov/vuln/detail/CVE-2025-38001), [CVE-2025-38000](https://nvd.nist.gov/vuln/detail/CVE-2025-38000), [CVE-2025-38498](https://nvd.nist.gov/vuln/detail/CVE-2025-38498), [CVE-2025-38428](https://nvd.nist.gov/vuln/detail/CVE-2025-38428), [CVE-2025-38424](https://nvd.nist.gov/vuln/detail/CVE-2025-38424), [CVE-2025-38430](https://nvd.nist.gov/vuln/detail/CVE-2025-38430), [CVE-2025-38420](https://nvd.nist.gov/vuln/detail/CVE-2025-38420), [CVE-2025-38419](https://nvd.nist.gov/vuln/detail/CVE-2025-38419), [CVE-2025-38418](https://nvd.nist.gov/vuln/detail/CVE-2025-38418), [CVE-2025-38416](https://nvd.nist.gov/vuln/detail/CVE-2025-38416), [CVE-2025-38415](https://nvd.nist.gov/vuln/detail/CVE-2025-38415), [CVE-2025-38352](https://nvd.nist.gov/vuln/detail/CVE-2025-38352), [CVE-2025-38346](https://nvd.nist.gov/vuln/detail/CVE-2025-38346), [CVE-2025-38348](https://nvd.nist.gov/vuln/detail/CVE-2025-38348), [CVE-2025-38328](https://nvd.nist.gov/vuln/detail/CVE-2025-38328), [CVE-2025-38326](https://nvd.nist.gov/vuln/detail/CVE-2025-38326), [CVE-2025-38324](https://nvd.nist.gov/vuln/detail/CVE-2025-38324), [CVE-2025-38323](https://nvd.nist.gov/vuln/detail/CVE-2025-38323), [CVE-2025-38345](https://nvd.nist.gov/vuln/detail/CVE-2025-38345), [CVE-2025-38344](https://nvd.nist.gov/vuln/detail/CVE-2025-38344), [CVE-2025-38342](https://nvd.nist.gov/vuln/detail/CVE-2025-38342), [CVE-2025-38337](https://nvd.nist.gov/vuln/detail/CVE-2025-38337), [CVE-2025-38336](https://nvd.nist.gov/vuln/detail/CVE-2025-38336), [CVE-2025-38332](https://nvd.nist.gov/vuln/detail/CVE-2025-38332), [CVE-2025-38320](https://nvd.nist.gov/vuln/detail/CVE-2025-38320), [CVE-2025-38313](https://nvd.nist.gov/vuln/detail/CVE-2025-38313), [CVE-2025-38312](https://nvd.nist.gov/vuln/detail/CVE-2025-38312), [CVE-2025-38310](https://nvd.nist.gov/vuln/detail/CVE-2025-38310), [CVE-2025-38319](https://nvd.nist.gov/vuln/detail/CVE-2025-38319), [CVE-2025-38273](https://nvd.nist.gov/vuln/detail/CVE-2025-38273), [CVE-2025-38305](https://nvd.nist.gov/vuln/detail/CVE-2025-38305), [CVE-2025-38298](https://nvd.nist.gov/vuln/detail/CVE-2025-38298), [CVE-2025-38293](https://nvd.nist.gov/vuln/detail/CVE-2025-38293), [CVE-2025-38286](https://nvd.nist.gov/vuln/detail/CVE-2025-38286), [CVE-2025-38285](https://nvd.nist.gov/vuln/detail/CVE-2025-38285), [CVE-2025-38280](https://nvd.nist.gov/vuln/detail/CVE-2025-38280), [CVE-2025-38237](https://nvd.nist.gov/vuln/detail/CVE-2025-38237), [CVE-2025-38219](https://nvd.nist.gov/vuln/detail/CVE-2025-38219), [CVE-2025-38218](https://nvd.nist.gov/vuln/detail/CVE-2025-38218), [CVE-2025-38214](https://nvd.nist.gov/vuln/detail/CVE-2025-38214), [CVE-2025-38213](https://nvd.nist.gov/vuln/detail/CVE-2025-38213), [CVE-2025-38231](https://nvd.nist.gov/vuln/detail/CVE-2025-38231), [CVE-2025-38212](https://nvd.nist.gov/vuln/detail/CVE-2025-38212), [CVE-2025-38229](https://nvd.nist.gov/vuln/detail/CVE-2025-38229), [CVE-2025-38227](https://nvd.nist.gov/vuln/detail/CVE-2025-38227), [CVE-2025-38226](https://nvd.nist.gov/vuln/detail/CVE-2025-38226), [CVE-2025-38222](https://nvd.nist.gov/vuln/detail/CVE-2025-38222), [CVE-2025-38211](https://nvd.nist.gov/vuln/detail/CVE-2025-38211), [CVE-2025-38185](https://nvd.nist.gov/vuln/detail/CVE-2025-38185), [CVE-2025-38184](https://nvd.nist.gov/vuln/detail/CVE-2025-38184), [CVE-2025-38181](https://nvd.nist.gov/vuln/detail/CVE-2025-38181), [CVE-2025-38206](https://nvd.nist.gov/vuln/detail/CVE-2025-38206), [CVE-2025-38204](https://nvd.nist.gov/vuln/detail/CVE-2025-38204), [CVE-2025-38203](https://nvd.nist.gov/vuln/detail/CVE-2025-38203), [CVE-2025-38200](https://nvd.nist.gov/vuln/detail/CVE-2025-38200), [CVE-2025-38180](https://nvd.nist.gov/vuln/detail/CVE-2025-38180), [CVE-2025-38197](https://nvd.nist.gov/vuln/detail/CVE-2025-38197), [CVE-2025-38194](https://nvd.nist.gov/vuln/detail/CVE-2025-38194), [CVE-2025-38193](https://nvd.nist.gov/vuln/detail/CVE-2025-38193), [CVE-2025-38190](https://nvd.nist.gov/vuln/detail/CVE-2025-38190), [CVE-2025-38174](https://nvd.nist.gov/vuln/detail/CVE-2025-38174), [CVE-2025-38163](https://nvd.nist.gov/vuln/detail/CVE-2025-38163), [CVE-2025-38167](https://nvd.nist.gov/vuln/detail/CVE-2025-38167), [CVE-2025-38173](https://nvd.nist.gov/vuln/detail/CVE-2025-38173), [CVE-2025-38138](https://nvd.nist.gov/vuln/detail/CVE-2025-38138), [CVE-2025-38136](https://nvd.nist.gov/vuln/detail/CVE-2025-38136), [CVE-2025-38135](https://nvd.nist.gov/vuln/detail/CVE-2025-38135), [CVE-2025-38161](https://nvd.nist.gov/vuln/detail/CVE-2025-38161), [CVE-2025-38160](https://nvd.nist.gov/vuln/detail/CVE-2025-38160), [CVE-2025-38159](https://nvd.nist.gov/vuln/detail/CVE-2025-38159), [CVE-2025-38157](https://nvd.nist.gov/vuln/detail/CVE-2025-38157), [CVE-2025-38154](https://nvd.nist.gov/vuln/detail/CVE-2025-38154), [CVE-2025-38153](https://nvd.nist.gov/vuln/detail/CVE-2025-38153), [CVE-2025-38147](https://nvd.nist.gov/vuln/detail/CVE-2025-38147), [CVE-2025-38146](https://nvd.nist.gov/vuln/detail/CVE-2025-38146), [CVE-2025-38145](https://nvd.nist.gov/vuln/detail/CVE-2025-38145), [CVE-2025-38143](https://nvd.nist.gov/vuln/detail/CVE-2025-38143), [CVE-2025-38108](https://nvd.nist.gov/vuln/detail/CVE-2025-38108), [CVE-2025-38107](https://nvd.nist.gov/vuln/detail/CVE-2025-38107), [CVE-2025-38103](https://nvd.nist.gov/vuln/detail/CVE-2025-38103), [CVE-2025-38122](https://nvd.nist.gov/vuln/detail/CVE-2025-38122), [CVE-2025-38102](https://nvd.nist.gov/vuln/detail/CVE-2025-38102), [CVE-2025-38120](https://nvd.nist.gov/vuln/detail/CVE-2025-38120), [CVE-2025-38119](https://nvd.nist.gov/vuln/detail/CVE-2025-38119), [CVE-2025-38115](https://nvd.nist.gov/vuln/detail/CVE-2025-38115), [CVE-2025-38112](https://nvd.nist.gov/vuln/detail/CVE-2025-38112), [CVE-2025-38111](https://nvd.nist.gov/vuln/detail/CVE-2025-38111), [CVE-2025-38100](https://nvd.nist.gov/vuln/detail/CVE-2025-38100), [CVE-2025-38088](https://nvd.nist.gov/vuln/detail/CVE-2025-38088), [CVE-2025-38090](https://nvd.nist.gov/vuln/detail/CVE-2025-38090), [CVE-2025-38086](https://nvd.nist.gov/vuln/detail/CVE-2025-38086), [CVE-2025-38084](https://nvd.nist.gov/vuln/detail/CVE-2025-38084), [CVE-2025-38085](https://nvd.nist.gov/vuln/detail/CVE-2025-38085), [CVE-2025-38412](https://nvd.nist.gov/vuln/detail/CVE-2025-38412), [CVE-2025-38410](https://nvd.nist.gov/vuln/detail/CVE-2025-38410), [CVE-2025-38406](https://nvd.nist.gov/vuln/detail/CVE-2025-38406), [CVE-2025-38403](https://nvd.nist.gov/vuln/detail/CVE-2025-38403), [CVE-2025-38401](https://nvd.nist.gov/vuln/detail/CVE-2025-38401), [CVE-2025-38377](https://nvd.nist.gov/vuln/detail/CVE-2025-38377), [CVE-2025-38400](https://nvd.nist.gov/vuln/detail/CVE-2025-38400), [CVE-2025-38399](https://nvd.nist.gov/vuln/detail/CVE-2025-38399), [CVE-2025-38395](https://nvd.nist.gov/vuln/detail/CVE-2025-38395), [CVE-2025-38393](https://nvd.nist.gov/vuln/detail/CVE-2025-38393), [CVE-2025-38391](https://nvd.nist.gov/vuln/detail/CVE-2025-38391), [CVE-2025-38389](https://nvd.nist.gov/vuln/detail/CVE-2025-38389), [CVE-2025-38387](https://nvd.nist.gov/vuln/detail/CVE-2025-38387), [CVE-2025-38386](https://nvd.nist.gov/vuln/detail/CVE-2025-38386), [CVE-2025-38384](https://nvd.nist.gov/vuln/detail/CVE-2025-38384), [CVE-2025-38380](https://nvd.nist.gov/vuln/detail/CVE-2025-38380), [CVE-2025-38371](https://nvd.nist.gov/vuln/detail/CVE-2025-38371), [CVE-2025-38362](https://nvd.nist.gov/vuln/detail/CVE-2025-38362), [CVE-2025-38363](https://nvd.nist.gov/vuln/detail/CVE-2025-38363), [CVE-2025-38350](https://nvd.nist.gov/vuln/detail/CVE-2025-38350), [CVE-2025-38546](https://nvd.nist.gov/vuln/detail/CVE-2025-38546), [CVE-2025-38542](https://nvd.nist.gov/vuln/detail/CVE-2025-38542), [CVE-2025-38540](https://nvd.nist.gov/vuln/detail/CVE-2025-38540), [CVE-2025-38516](https://nvd.nist.gov/vuln/detail/CVE-2025-38516), [CVE-2025-38515](https://nvd.nist.gov/vuln/detail/CVE-2025-38515), [CVE-2025-38514](https://nvd.nist.gov/vuln/detail/CVE-2025-38514), [CVE-2025-38513](https://nvd.nist.gov/vuln/detail/CVE-2025-38513), [CVE-2025-38460](https://nvd.nist.gov/vuln/detail/CVE-2025-38460), [CVE-2025-38467](https://nvd.nist.gov/vuln/detail/CVE-2025-38467), [CVE-2025-38466](https://nvd.nist.gov/vuln/detail/CVE-2025-38466), [CVE-2025-38465](https://nvd.nist.gov/vuln/detail/CVE-2025-38465), [CVE-2025-38464](https://nvd.nist.gov/vuln/detail/CVE-2025-38464), [CVE-2025-38462](https://nvd.nist.gov/vuln/detail/CVE-2025-38462), [CVE-2025-38461](https://nvd.nist.gov/vuln/detail/CVE-2025-38461), [CVE-2025-38445](https://nvd.nist.gov/vuln/detail/CVE-2025-38445), [CVE-2025-38444](https://nvd.nist.gov/vuln/detail/CVE-2025-38444), [CVE-2025-38443](https://nvd.nist.gov/vuln/detail/CVE-2025-38443), [CVE-2025-38441](https://nvd.nist.gov/vuln/detail/CVE-2025-38441), [CVE-2025-38459](https://nvd.nist.gov/vuln/detail/CVE-2025-38459), [CVE-2025-38458](https://nvd.nist.gov/vuln/detail/CVE-2025-38458), [CVE-2025-38457](https://nvd.nist.gov/vuln/detail/CVE-2025-38457), [CVE-2025-38439](https://nvd.nist.gov/vuln/detail/CVE-2025-38439), [CVE-2025-38448](https://nvd.nist.gov/vuln/detail/CVE-2025-38448), [CVE-2025-38375](https://nvd.nist.gov/vuln/detail/CVE-2025-38375))\n\n#### Updates:\n\n- Linux ([5.15.189](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.189) includes ([5.15.188](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.188), [5.15.187](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.187), [5.15.186](https://lwn.net/Articles/1027283/), [5.15.185](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.185), [5.15.184](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.184), [5.15.183](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.183), [5.15.182](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.182), [5.15.181](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.181), [5.15.180](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.180)))\n- ca-certificates ([3.114](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_114.html) includes ([3.113](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113.html), [3.113.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_113_1.html), [3.112](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_112.html), [3.111](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_111.html), [3.110](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_110.html)))"
  },
  "current-2024": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-09-15 14:03:10 +0000",
    "major_software": {
      "containerd": [
        "1.7.21"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.106"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "_Changes since **LTS 4081.3.5**_\n\n#### Security fixes:\n\n- Linux ([CVE-2025-39726](https://nvd.nist.gov/vuln/detail/CVE-2025-39726), [CVE-2025-38670](https://nvd.nist.gov/vuln/detail/CVE-2025-38670), [CVE-2025-38668](https://nvd.nist.gov/vuln/detail/CVE-2025-38668), [CVE-2025-38666](https://nvd.nist.gov/vuln/detail/CVE-2025-38666), [CVE-2025-38665](https://nvd.nist.gov/vuln/detail/CVE-2025-38665), [CVE-2025-38664](https://nvd.nist.gov/vuln/detail/CVE-2025-38664), [CVE-2025-38663](https://nvd.nist.gov/vuln/detail/CVE-2025-38663), [CVE-2025-38671](https://nvd.nist.gov/vuln/detail/CVE-2025-38671), [CVE-2025-38552](https://nvd.nist.gov/vuln/detail/CVE-2025-38552), [CVE-2025-38520](https://nvd.nist.gov/vuln/detail/CVE-2025-38520), [CVE-2025-38500](https://nvd.nist.gov/vuln/detail/CVE-2025-38500), [CVE-2025-39734](https://nvd.nist.gov/vuln/detail/CVE-2025-39734), [CVE-2025-39731](https://nvd.nist.gov/vuln/detail/CVE-2025-39731), [CVE-2025-39730](https://nvd.nist.gov/vuln/detail/CVE-2025-39730), [CVE-2025-38650](https://nvd.nist.gov/vuln/detail/CVE-2025-38650), [CVE-2025-38648](https://nvd.nist.gov/vuln/detail/CVE-2025-38648), [CVE-2025-38646](https://nvd.nist.gov/vuln/detail/CVE-2025-38646), [CVE-2025-38645](https://nvd.nist.gov/vuln/detail/CVE-2025-38645), [CVE-2025-38644](https://nvd.nist.gov/vuln/detail/CVE-2025-38644), [CVE-2025-38659](https://nvd.nist.gov/vuln/detail/CVE-2025-38659), [CVE-2025-38653](https://nvd.nist.gov/vuln/detail/CVE-2025-38653), [CVE-2025-38652](https://nvd.nist.gov/vuln/detail/CVE-2025-38652), [CVE-2025-38626](https://nvd.nist.gov/vuln/detail/CVE-2025-38626), [CVE-2025-38625](https://nvd.nist.gov/vuln/detail/CVE-2025-38625), [CVE-2025-38624](https://nvd.nist.gov/vuln/detail/CVE-2025-38624), [CVE-2025-38623](https://nvd.nist.gov/vuln/detail/CVE-2025-38623), [CVE-2025-38622](https://nvd.nist.gov/vuln/detail/CVE-2025-38622), [CVE-2025-38640](https://nvd.nist.gov/vuln/detail/CVE-2025-38640), [CVE-2025-38639](https://nvd.nist.gov/vuln/detail/CVE-2025-38639), [CVE-2025-38635](https://nvd.nist.gov/vuln/detail/CVE-2025-38635), [CVE-2025-38634](https://nvd.nist.gov/vuln/detail/CVE-2025-38634), [CVE-2025-38632](https://nvd.nist.gov/vuln/detail/CVE-2025-38632), [CVE-2025-38630](https://nvd.nist.gov/vuln/detail/CVE-2025-38630), [CVE-2025-38618](https://nvd.nist.gov/vuln/detail/CVE-2025-38618), [CVE-2025-38617](https://nvd.nist.gov/vuln/detail/CVE-2025-38617), [CVE-2025-38611](https://nvd.nist.gov/vuln/detail/CVE-2025-38611), [CVE-2025-38615](https://nvd.nist.gov/vuln/detail/CVE-2025-38615), [CVE-2025-38612](https://nvd.nist.gov/vuln/detail/CVE-2025-38612), [CVE-2025-38577](https://nvd.nist.gov/vuln/detail/CVE-2025-38577), [CVE-2025-38583](https://nvd.nist.gov/vuln/detail/CVE-2025-38583), [CVE-2025-38581](https://nvd.nist.gov/vuln/detail/CVE-2025-38581), [CVE-2025-38610](https://nvd.nist.gov/vuln/detail/CVE-2025-38610), [CVE-2025-38609](https://nvd.nist.gov/vuln/detail/CVE-2025-38609), [CVE-2025-38608](https://nvd.nist.gov/vuln/detail/CVE-2025-38608), [CVE-2025-38604](https://nvd.nist.gov/vuln/detail/CVE-2025-38604), [CVE-2025-38602](https://nvd.nist.gov/vuln/detail/CVE-2025-38602), [CVE-2025-38601](https://nvd.nist.gov/vuln/detail/CVE-2025-38601), [CVE-2025-38579](https://nvd.nist.gov/vuln/detail/CVE-2025-38579), [CVE-2025-38590](https://nvd.nist.gov/vuln/detail/CVE-2025-38590), [CVE-2025-38588](https://nvd.nist.gov/vuln/detail/CVE-2025-38588), [CVE-2025-38587](https://nvd.nist.gov/vuln/detail/CVE-2025-38587), [CVE-2025-38578](https://nvd.nist.gov/vuln/detail/CVE-2025-38578), [CVE-2025-38563](https://nvd.nist.gov/vuln/detail/CVE-2025-38563), [CVE-2025-38562](https://nvd.nist.gov/vuln/detail/CVE-2025-38562), [CVE-2025-38561](https://nvd.nist.gov/vuln/detail/CVE-2025-38561), [CVE-2025-38560](https://nvd.nist.gov/vuln/detail/CVE-2025-38560), [CVE-2025-38576](https://nvd.nist.gov/vuln/detail/CVE-2025-38576), [CVE-2025-38574](https://nvd.nist.gov/vuln/detail/CVE-2025-38574), [CVE-2025-38572](https://nvd.nist.gov/vuln/detail/CVE-2025-38572), [CVE-2025-38571](https://nvd.nist.gov/vuln/detail/CVE-2025-38571), [CVE-2025-38569](https://nvd.nist.gov/vuln/detail/CVE-2025-38569), [CVE-2025-38568](https://nvd.nist.gov/vuln/detail/CVE-2025-38568), [CVE-2025-38566](https://nvd.nist.gov/vuln/detail/CVE-2025-38566), [CVE-2025-38565](https://nvd.nist.gov/vuln/detail/CVE-2025-38565), [CVE-2025-38555](https://nvd.nist.gov/vuln/detail/CVE-2025-38555), [CVE-2025-38553](https://nvd.nist.gov/vuln/detail/CVE-2025-38553), [CVE-2025-38501](https://nvd.nist.gov/vuln/detail/CVE-2025-38501), [CVE-2025-39798](https://nvd.nist.gov/vuln/detail/CVE-2025-39798), [CVE-2025-39797](https://nvd.nist.gov/vuln/detail/CVE-2025-39797), [CVE-2025-39795](https://nvd.nist.gov/vuln/detail/CVE-2025-39795), [CVE-2025-39794](https://nvd.nist.gov/vuln/detail/CVE-2025-39794), [CVE-2025-39773](https://nvd.nist.gov/vuln/detail/CVE-2025-39773), [CVE-2025-39772](https://nvd.nist.gov/vuln/detail/CVE-2025-39772), [CVE-2025-39770](https://nvd.nist.gov/vuln/detail/CVE-2025-39770), [CVE-2025-39790](https://nvd.nist.gov/vuln/detail/CVE-2025-39790), [CVE-2025-39788](https://nvd.nist.gov/vuln/detail/CVE-2025-39788), [CVE-2025-39787](https://nvd.nist.gov/vuln/detail/CVE-2025-39787), [CVE-2025-39767](https://nvd.nist.gov/vuln/detail/CVE-2025-39767), [CVE-2025-39783](https://nvd.nist.gov/vuln/detail/CVE-2025-39783), [CVE-2025-39782](https://nvd.nist.gov/vuln/detail/CVE-2025-39782), [CVE-2025-39781](https://nvd.nist.gov/vuln/detail/CVE-2025-39781), [CVE-2025-39776](https://nvd.nist.gov/vuln/detail/CVE-2025-39776), [CVE-2025-39766](https://nvd.nist.gov/vuln/detail/CVE-2025-39766), [CVE-2025-39750](https://nvd.nist.gov/vuln/detail/CVE-2025-39750), [CVE-2025-39760](https://nvd.nist.gov/vuln/detail/CVE-2025-39760), [CVE-2025-39759](https://nvd.nist.gov/vuln/detail/CVE-2025-39759), [CVE-2025-39758](https://nvd.nist.gov/vuln/detail/CVE-2025-39758), [CVE-2025-39757](https://nvd.nist.gov/vuln/detail/CVE-2025-39757), [CVE-2025-39756](https://nvd.nist.gov/vuln/detail/CVE-2025-39756), [CVE-2025-39753](https://nvd.nist.gov/vuln/detail/CVE-2025-39753), [CVE-2025-39752](https://nvd.nist.gov/vuln/detail/CVE-2025-39752), [CVE-2025-39763](https://nvd.nist.gov/vuln/detail/CVE-2025-39763), [CVE-2025-39761](https://nvd.nist.gov/vuln/detail/CVE-2025-39761), [CVE-2025-39751](https://nvd.nist.gov/vuln/detail/CVE-2025-39751), [CVE-2025-39744](https://nvd.nist.gov/vuln/detail/CVE-2025-39744), [CVE-2025-39743](https://nvd.nist.gov/vuln/detail/CVE-2025-39743), [CVE-2025-39742](https://nvd.nist.gov/vuln/detail/CVE-2025-39742), [CVE-2025-39739](https://nvd.nist.gov/vuln/detail/CVE-2025-39739), [CVE-2025-39738](https://nvd.nist.gov/vuln/detail/CVE-2025-39738), [CVE-2025-39749](https://nvd.nist.gov/vuln/detail/CVE-2025-39749), [CVE-2025-39736](https://nvd.nist.gov/vuln/detail/CVE-2025-39736), [CVE-2025-39737](https://nvd.nist.gov/vuln/detail/CVE-2025-39737), [CVE-2025-39711](https://nvd.nist.gov/vuln/detail/CVE-2025-39711), [CVE-2025-39720](https://nvd.nist.gov/vuln/detail/CVE-2025-39720), [CVE-2025-39719](https://nvd.nist.gov/vuln/detail/CVE-2025-39719), [CVE-2025-39718](https://nvd.nist.gov/vuln/detail/CVE-2025-39718), [CVE-2025-39716](https://nvd.nist.gov/vuln/detail/CVE-2025-39716), [CVE-2025-39715](https://nvd.nist.gov/vuln/detail/CVE-2025-39715), [CVE-2025-39714](https://nvd.nist.gov/vuln/detail/CVE-2025-39714), [CVE-2025-39713](https://nvd.nist.gov/vuln/detail/CVE-2025-39713), [CVE-2025-39724](https://nvd.nist.gov/vuln/detail/CVE-2025-39724), [CVE-2025-39721](https://nvd.nist.gov/vuln/detail/CVE-2025-39721), [CVE-2025-39675](https://nvd.nist.gov/vuln/detail/CVE-2025-39675), [CVE-2025-39673](https://nvd.nist.gov/vuln/detail/CVE-2025-39673), [CVE-2025-39710](https://nvd.nist.gov/vuln/detail/CVE-2025-39710), [CVE-2025-39709](https://nvd.nist.gov/vuln/detail/CVE-2025-39709), [CVE-2025-38735](https://nvd.nist.gov/vuln/detail/CVE-2025-38735), [CVE-2025-39706](https://nvd.nist.gov/vuln/detail/CVE-2025-39706), [CVE-2025-39703](https://nvd.nist.gov/vuln/detail/CVE-2025-39703), [CVE-2025-39702](https://nvd.nist.gov/vuln/detail/CVE-2025-39702), [CVE-2025-39701](https://nvd.nist.gov/vuln/detail/CVE-2025-39701), [CVE-2025-38734](https://nvd.nist.gov/vuln/detail/CVE-2025-38734), [CVE-2025-39694](https://nvd.nist.gov/vuln/detail/CVE-2025-39694), [CVE-2025-39693](https://nvd.nist.gov/vuln/detail/CVE-2025-39693), [CVE-2025-39692](https://nvd.nist.gov/vuln/detail/CVE-2025-39692), [CVE-2025-39691](https://nvd.nist.gov/vuln/detail/CVE-2025-39691), [CVE-2025-39689](https://nvd.nist.gov/vuln/detail/CVE-2025-39689), [CVE-2025-39687](https://nvd.nist.gov/vuln/detail/CVE-2025-39687), [CVE-2025-39686](https://nvd.nist.gov/vuln/detail/CVE-2025-39686), [CVE-2025-39685](https://nvd.nist.gov/vuln/detail/CVE-2025-39685), [CVE-2025-39684](https://nvd.nist.gov/vuln/detail/CVE-2025-39684), [CVE-2025-39683](https://nvd.nist.gov/vuln/detail/CVE-2025-39683), [CVE-2025-39682](https://nvd.nist.gov/vuln/detail/CVE-2025-39682), [CVE-2025-39681](https://nvd.nist.gov/vuln/detail/CVE-2025-39681), [CVE-2025-39679](https://nvd.nist.gov/vuln/detail/CVE-2025-39679), [CVE-2025-39676](https://nvd.nist.gov/vuln/detail/CVE-2025-39676), [CVE-2025-38732](https://nvd.nist.gov/vuln/detail/CVE-2025-38732), [CVE-2025-38727](https://nvd.nist.gov/vuln/detail/CVE-2025-38727), [CVE-2025-38730](https://nvd.nist.gov/vuln/detail/CVE-2025-38730), [CVE-2025-38729](https://nvd.nist.gov/vuln/detail/CVE-2025-38729), [CVE-2025-38728](https://nvd.nist.gov/vuln/detail/CVE-2025-38728), [CVE-2025-38694](https://nvd.nist.gov/vuln/detail/CVE-2025-38694), [CVE-2025-38702](https://nvd.nist.gov/vuln/detail/CVE-2025-38702), [CVE-2025-38701](https://nvd.nist.gov/vuln/detail/CVE-2025-38701), [CVE-2025-38700](https://nvd.nist.gov/vuln/detail/CVE-2025-38700), [CVE-2025-38699](https://nvd.nist.gov/vuln/detail/CVE-2025-38699), [CVE-2025-38698](https://nvd.nist.gov/vuln/detail/CVE-2025-38698), [CVE-2025-38725](https://nvd.nist.gov/vuln/detail/CVE-2025-38725), [CVE-2025-38724](https://nvd.nist.gov/vuln/detail/CVE-2025-38724), [CVE-2025-38697](https://nvd.nist.gov/vuln/detail/CVE-2025-38697), [CVE-2025-38723](https://nvd.nist.gov/vuln/detail/CVE-2025-38723), [CVE-2025-38721](https://nvd.nist.gov/vuln/detail/CVE-2025-38721), [CVE-2025-38718](https://nvd.nist.gov/vuln/detail/CVE-2025-38718), [CVE-2025-38716](https://nvd.nist.gov/vuln/detail/CVE-2025-38716), [CVE-2025-38715](https://nvd.nist.gov/vuln/detail/CVE-2025-38715), [CVE-2025-38714](https://nvd.nist.gov/vuln/detail/CVE-2025-38714), [CVE-2025-38696](https://nvd.nist.gov/vuln/detail/CVE-2025-38696), [CVE-2025-38713](https://nvd.nist.gov/vuln/detail/CVE-2025-38713), [CVE-2025-38712](https://nvd.nist.gov/vuln/detail/CVE-2025-38712), [CVE-2025-38711](https://nvd.nist.gov/vuln/detail/CVE-2025-38711), [CVE-2025-38709](https://nvd.nist.gov/vuln/detail/CVE-2025-38709), [CVE-2025-38708](https://nvd.nist.gov/vuln/detail/CVE-2025-38708), [CVE-2025-38707](https://nvd.nist.gov/vuln/detail/CVE-2025-38707), [CVE-2025-38706](https://nvd.nist.gov/vuln/detail/CVE-2025-38706), [CVE-2025-38695](https://nvd.nist.gov/vuln/detail/CVE-2025-38695), [CVE-2025-38688](https://nvd.nist.gov/vuln/detail/CVE-2025-38688), [CVE-2025-38687](https://nvd.nist.gov/vuln/detail/CVE-2025-38687), [CVE-2025-38685](https://nvd.nist.gov/vuln/detail/CVE-2025-38685), [CVE-2025-38684](https://nvd.nist.gov/vuln/detail/CVE-2025-38684), [CVE-2025-38683](https://nvd.nist.gov/vuln/detail/CVE-2025-38683), [CVE-2025-38681](https://nvd.nist.gov/vuln/detail/CVE-2025-38681), [CVE-2025-38693](https://nvd.nist.gov/vuln/detail/CVE-2025-38693), [CVE-2025-38692](https://nvd.nist.gov/vuln/detail/CVE-2025-38692), [CVE-2025-38691](https://nvd.nist.gov/vuln/detail/CVE-2025-38691), [CVE-2025-38679](https://nvd.nist.gov/vuln/detail/CVE-2025-38679), [CVE-2025-38680](https://nvd.nist.gov/vuln/detail/CVE-2025-38680), [CVE-2025-38677](https://nvd.nist.gov/vuln/detail/CVE-2025-38677), [CVE-2025-40300](https://nvd.nist.gov/vuln/detail/CVE-2025-40300))\n\n#### Updates:\n\n- Linux ([6.6.106](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.106) (includes [6.6.105](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.105), [6.6.104](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.104), [6.6.103](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.103), [6.6.102](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.102), [6.6.101](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.101)))\n- ca-certificates ([3.115.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115_1.html) (includes [3.115](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115.html)))"
  },
  "current": {
    "channel": "lts",
    "architectures": [
      "amd64",
      "arm64"
    ],
    "release_date": "2025-09-15 14:03:10 +0000",
    "major_software": {
      "containerd": [
        "1.7.21"
      ],
      "docker": [
        "26.1.0"
      ],
      "ignition": [
        "2.19.0"
      ],
      "kernel": [
        "6.6.106"
      ],
      "systemd": [
        "255"
      ]
    },
    "release_notes": "_Changes since **LTS 4081.3.5**_\n\n#### Security fixes:\n\n- Linux ([CVE-2025-39726](https://nvd.nist.gov/vuln/detail/CVE-2025-39726), [CVE-2025-38670](https://nvd.nist.gov/vuln/detail/CVE-2025-38670), [CVE-2025-38668](https://nvd.nist.gov/vuln/detail/CVE-2025-38668), [CVE-2025-38666](https://nvd.nist.gov/vuln/detail/CVE-2025-38666), [CVE-2025-38665](https://nvd.nist.gov/vuln/detail/CVE-2025-38665), [CVE-2025-38664](https://nvd.nist.gov/vuln/detail/CVE-2025-38664), [CVE-2025-38663](https://nvd.nist.gov/vuln/detail/CVE-2025-38663), [CVE-2025-38671](https://nvd.nist.gov/vuln/detail/CVE-2025-38671), [CVE-2025-38552](https://nvd.nist.gov/vuln/detail/CVE-2025-38552), [CVE-2025-38520](https://nvd.nist.gov/vuln/detail/CVE-2025-38520), [CVE-2025-38500](https://nvd.nist.gov/vuln/detail/CVE-2025-38500), [CVE-2025-39734](https://nvd.nist.gov/vuln/detail/CVE-2025-39734), [CVE-2025-39731](https://nvd.nist.gov/vuln/detail/CVE-2025-39731), [CVE-2025-39730](https://nvd.nist.gov/vuln/detail/CVE-2025-39730), [CVE-2025-38650](https://nvd.nist.gov/vuln/detail/CVE-2025-38650), [CVE-2025-38648](https://nvd.nist.gov/vuln/detail/CVE-2025-38648), [CVE-2025-38646](https://nvd.nist.gov/vuln/detail/CVE-2025-38646), [CVE-2025-38645](https://nvd.nist.gov/vuln/detail/CVE-2025-38645), [CVE-2025-38644](https://nvd.nist.gov/vuln/detail/CVE-2025-38644), [CVE-2025-38659](https://nvd.nist.gov/vuln/detail/CVE-2025-38659), [CVE-2025-38653](https://nvd.nist.gov/vuln/detail/CVE-2025-38653), [CVE-2025-38652](https://nvd.nist.gov/vuln/detail/CVE-2025-38652), [CVE-2025-38626](https://nvd.nist.gov/vuln/detail/CVE-2025-38626), [CVE-2025-38625](https://nvd.nist.gov/vuln/detail/CVE-2025-38625), [CVE-2025-38624](https://nvd.nist.gov/vuln/detail/CVE-2025-38624), [CVE-2025-38623](https://nvd.nist.gov/vuln/detail/CVE-2025-38623), [CVE-2025-38622](https://nvd.nist.gov/vuln/detail/CVE-2025-38622), [CVE-2025-38640](https://nvd.nist.gov/vuln/detail/CVE-2025-38640), [CVE-2025-38639](https://nvd.nist.gov/vuln/detail/CVE-2025-38639), [CVE-2025-38635](https://nvd.nist.gov/vuln/detail/CVE-2025-38635), [CVE-2025-38634](https://nvd.nist.gov/vuln/detail/CVE-2025-38634), [CVE-2025-38632](https://nvd.nist.gov/vuln/detail/CVE-2025-38632), [CVE-2025-38630](https://nvd.nist.gov/vuln/detail/CVE-2025-38630), [CVE-2025-38618](https://nvd.nist.gov/vuln/detail/CVE-2025-38618), [CVE-2025-38617](https://nvd.nist.gov/vuln/detail/CVE-2025-38617), [CVE-2025-38611](https://nvd.nist.gov/vuln/detail/CVE-2025-38611), [CVE-2025-38615](https://nvd.nist.gov/vuln/detail/CVE-2025-38615), [CVE-2025-38612](https://nvd.nist.gov/vuln/detail/CVE-2025-38612), [CVE-2025-38577](https://nvd.nist.gov/vuln/detail/CVE-2025-38577), [CVE-2025-38583](https://nvd.nist.gov/vuln/detail/CVE-2025-38583), [CVE-2025-38581](https://nvd.nist.gov/vuln/detail/CVE-2025-38581), [CVE-2025-38610](https://nvd.nist.gov/vuln/detail/CVE-2025-38610), [CVE-2025-38609](https://nvd.nist.gov/vuln/detail/CVE-2025-38609), [CVE-2025-38608](https://nvd.nist.gov/vuln/detail/CVE-2025-38608), [CVE-2025-38604](https://nvd.nist.gov/vuln/detail/CVE-2025-38604), [CVE-2025-38602](https://nvd.nist.gov/vuln/detail/CVE-2025-38602), [CVE-2025-38601](https://nvd.nist.gov/vuln/detail/CVE-2025-38601), [CVE-2025-38579](https://nvd.nist.gov/vuln/detail/CVE-2025-38579), [CVE-2025-38590](https://nvd.nist.gov/vuln/detail/CVE-2025-38590), [CVE-2025-38588](https://nvd.nist.gov/vuln/detail/CVE-2025-38588), [CVE-2025-38587](https://nvd.nist.gov/vuln/detail/CVE-2025-38587), [CVE-2025-38578](https://nvd.nist.gov/vuln/detail/CVE-2025-38578), [CVE-2025-38563](https://nvd.nist.gov/vuln/detail/CVE-2025-38563), [CVE-2025-38562](https://nvd.nist.gov/vuln/detail/CVE-2025-38562), [CVE-2025-38561](https://nvd.nist.gov/vuln/detail/CVE-2025-38561), [CVE-2025-38560](https://nvd.nist.gov/vuln/detail/CVE-2025-38560), [CVE-2025-38576](https://nvd.nist.gov/vuln/detail/CVE-2025-38576), [CVE-2025-38574](https://nvd.nist.gov/vuln/detail/CVE-2025-38574), [CVE-2025-38572](https://nvd.nist.gov/vuln/detail/CVE-2025-38572), [CVE-2025-38571](https://nvd.nist.gov/vuln/detail/CVE-2025-38571), [CVE-2025-38569](https://nvd.nist.gov/vuln/detail/CVE-2025-38569), [CVE-2025-38568](https://nvd.nist.gov/vuln/detail/CVE-2025-38568), [CVE-2025-38566](https://nvd.nist.gov/vuln/detail/CVE-2025-38566), [CVE-2025-38565](https://nvd.nist.gov/vuln/detail/CVE-2025-38565), [CVE-2025-38555](https://nvd.nist.gov/vuln/detail/CVE-2025-38555), [CVE-2025-38553](https://nvd.nist.gov/vuln/detail/CVE-2025-38553), [CVE-2025-38501](https://nvd.nist.gov/vuln/detail/CVE-2025-38501), [CVE-2025-39798](https://nvd.nist.gov/vuln/detail/CVE-2025-39798), [CVE-2025-39797](https://nvd.nist.gov/vuln/detail/CVE-2025-39797), [CVE-2025-39795](https://nvd.nist.gov/vuln/detail/CVE-2025-39795), [CVE-2025-39794](https://nvd.nist.gov/vuln/detail/CVE-2025-39794), [CVE-2025-39773](https://nvd.nist.gov/vuln/detail/CVE-2025-39773), [CVE-2025-39772](https://nvd.nist.gov/vuln/detail/CVE-2025-39772), [CVE-2025-39770](https://nvd.nist.gov/vuln/detail/CVE-2025-39770), [CVE-2025-39790](https://nvd.nist.gov/vuln/detail/CVE-2025-39790), [CVE-2025-39788](https://nvd.nist.gov/vuln/detail/CVE-2025-39788), [CVE-2025-39787](https://nvd.nist.gov/vuln/detail/CVE-2025-39787), [CVE-2025-39767](https://nvd.nist.gov/vuln/detail/CVE-2025-39767), [CVE-2025-39783](https://nvd.nist.gov/vuln/detail/CVE-2025-39783), [CVE-2025-39782](https://nvd.nist.gov/vuln/detail/CVE-2025-39782), [CVE-2025-39781](https://nvd.nist.gov/vuln/detail/CVE-2025-39781), [CVE-2025-39776](https://nvd.nist.gov/vuln/detail/CVE-2025-39776), [CVE-2025-39766](https://nvd.nist.gov/vuln/detail/CVE-2025-39766), [CVE-2025-39750](https://nvd.nist.gov/vuln/detail/CVE-2025-39750), [CVE-2025-39760](https://nvd.nist.gov/vuln/detail/CVE-2025-39760), [CVE-2025-39759](https://nvd.nist.gov/vuln/detail/CVE-2025-39759), [CVE-2025-39758](https://nvd.nist.gov/vuln/detail/CVE-2025-39758), [CVE-2025-39757](https://nvd.nist.gov/vuln/detail/CVE-2025-39757), [CVE-2025-39756](https://nvd.nist.gov/vuln/detail/CVE-2025-39756), [CVE-2025-39753](https://nvd.nist.gov/vuln/detail/CVE-2025-39753), [CVE-2025-39752](https://nvd.nist.gov/vuln/detail/CVE-2025-39752), [CVE-2025-39763](https://nvd.nist.gov/vuln/detail/CVE-2025-39763), [CVE-2025-39761](https://nvd.nist.gov/vuln/detail/CVE-2025-39761), [CVE-2025-39751](https://nvd.nist.gov/vuln/detail/CVE-2025-39751), [CVE-2025-39744](https://nvd.nist.gov/vuln/detail/CVE-2025-39744), [CVE-2025-39743](https://nvd.nist.gov/vuln/detail/CVE-2025-39743), [CVE-2025-39742](https://nvd.nist.gov/vuln/detail/CVE-2025-39742), [CVE-2025-39739](https://nvd.nist.gov/vuln/detail/CVE-2025-39739), [CVE-2025-39738](https://nvd.nist.gov/vuln/detail/CVE-2025-39738), [CVE-2025-39749](https://nvd.nist.gov/vuln/detail/CVE-2025-39749), [CVE-2025-39736](https://nvd.nist.gov/vuln/detail/CVE-2025-39736), [CVE-2025-39737](https://nvd.nist.gov/vuln/detail/CVE-2025-39737), [CVE-2025-39711](https://nvd.nist.gov/vuln/detail/CVE-2025-39711), [CVE-2025-39720](https://nvd.nist.gov/vuln/detail/CVE-2025-39720), [CVE-2025-39719](https://nvd.nist.gov/vuln/detail/CVE-2025-39719), [CVE-2025-39718](https://nvd.nist.gov/vuln/detail/CVE-2025-39718), [CVE-2025-39716](https://nvd.nist.gov/vuln/detail/CVE-2025-39716), [CVE-2025-39715](https://nvd.nist.gov/vuln/detail/CVE-2025-39715), [CVE-2025-39714](https://nvd.nist.gov/vuln/detail/CVE-2025-39714), [CVE-2025-39713](https://nvd.nist.gov/vuln/detail/CVE-2025-39713), [CVE-2025-39724](https://nvd.nist.gov/vuln/detail/CVE-2025-39724), [CVE-2025-39721](https://nvd.nist.gov/vuln/detail/CVE-2025-39721), [CVE-2025-39675](https://nvd.nist.gov/vuln/detail/CVE-2025-39675), [CVE-2025-39673](https://nvd.nist.gov/vuln/detail/CVE-2025-39673), [CVE-2025-39710](https://nvd.nist.gov/vuln/detail/CVE-2025-39710), [CVE-2025-39709](https://nvd.nist.gov/vuln/detail/CVE-2025-39709), [CVE-2025-38735](https://nvd.nist.gov/vuln/detail/CVE-2025-38735), [CVE-2025-39706](https://nvd.nist.gov/vuln/detail/CVE-2025-39706), [CVE-2025-39703](https://nvd.nist.gov/vuln/detail/CVE-2025-39703), [CVE-2025-39702](https://nvd.nist.gov/vuln/detail/CVE-2025-39702), [CVE-2025-39701](https://nvd.nist.gov/vuln/detail/CVE-2025-39701), [CVE-2025-38734](https://nvd.nist.gov/vuln/detail/CVE-2025-38734), [CVE-2025-39694](https://nvd.nist.gov/vuln/detail/CVE-2025-39694), [CVE-2025-39693](https://nvd.nist.gov/vuln/detail/CVE-2025-39693), [CVE-2025-39692](https://nvd.nist.gov/vuln/detail/CVE-2025-39692), [CVE-2025-39691](https://nvd.nist.gov/vuln/detail/CVE-2025-39691), [CVE-2025-39689](https://nvd.nist.gov/vuln/detail/CVE-2025-39689), [CVE-2025-39687](https://nvd.nist.gov/vuln/detail/CVE-2025-39687), [CVE-2025-39686](https://nvd.nist.gov/vuln/detail/CVE-2025-39686), [CVE-2025-39685](https://nvd.nist.gov/vuln/detail/CVE-2025-39685), [CVE-2025-39684](https://nvd.nist.gov/vuln/detail/CVE-2025-39684), [CVE-2025-39683](https://nvd.nist.gov/vuln/detail/CVE-2025-39683), [CVE-2025-39682](https://nvd.nist.gov/vuln/detail/CVE-2025-39682), [CVE-2025-39681](https://nvd.nist.gov/vuln/detail/CVE-2025-39681), [CVE-2025-39679](https://nvd.nist.gov/vuln/detail/CVE-2025-39679), [CVE-2025-39676](https://nvd.nist.gov/vuln/detail/CVE-2025-39676), [CVE-2025-38732](https://nvd.nist.gov/vuln/detail/CVE-2025-38732), [CVE-2025-38727](https://nvd.nist.gov/vuln/detail/CVE-2025-38727), [CVE-2025-38730](https://nvd.nist.gov/vuln/detail/CVE-2025-38730), [CVE-2025-38729](https://nvd.nist.gov/vuln/detail/CVE-2025-38729), [CVE-2025-38728](https://nvd.nist.gov/vuln/detail/CVE-2025-38728), [CVE-2025-38694](https://nvd.nist.gov/vuln/detail/CVE-2025-38694), [CVE-2025-38702](https://nvd.nist.gov/vuln/detail/CVE-2025-38702), [CVE-2025-38701](https://nvd.nist.gov/vuln/detail/CVE-2025-38701), [CVE-2025-38700](https://nvd.nist.gov/vuln/detail/CVE-2025-38700), [CVE-2025-38699](https://nvd.nist.gov/vuln/detail/CVE-2025-38699), [CVE-2025-38698](https://nvd.nist.gov/vuln/detail/CVE-2025-38698), [CVE-2025-38725](https://nvd.nist.gov/vuln/detail/CVE-2025-38725), [CVE-2025-38724](https://nvd.nist.gov/vuln/detail/CVE-2025-38724), [CVE-2025-38697](https://nvd.nist.gov/vuln/detail/CVE-2025-38697), [CVE-2025-38723](https://nvd.nist.gov/vuln/detail/CVE-2025-38723), [CVE-2025-38721](https://nvd.nist.gov/vuln/detail/CVE-2025-38721), [CVE-2025-38718](https://nvd.nist.gov/vuln/detail/CVE-2025-38718), [CVE-2025-38716](https://nvd.nist.gov/vuln/detail/CVE-2025-38716), [CVE-2025-38715](https://nvd.nist.gov/vuln/detail/CVE-2025-38715), [CVE-2025-38714](https://nvd.nist.gov/vuln/detail/CVE-2025-38714), [CVE-2025-38696](https://nvd.nist.gov/vuln/detail/CVE-2025-38696), [CVE-2025-38713](https://nvd.nist.gov/vuln/detail/CVE-2025-38713), [CVE-2025-38712](https://nvd.nist.gov/vuln/detail/CVE-2025-38712), [CVE-2025-38711](https://nvd.nist.gov/vuln/detail/CVE-2025-38711), [CVE-2025-38709](https://nvd.nist.gov/vuln/detail/CVE-2025-38709), [CVE-2025-38708](https://nvd.nist.gov/vuln/detail/CVE-2025-38708), [CVE-2025-38707](https://nvd.nist.gov/vuln/detail/CVE-2025-38707), [CVE-2025-38706](https://nvd.nist.gov/vuln/detail/CVE-2025-38706), [CVE-2025-38695](https://nvd.nist.gov/vuln/detail/CVE-2025-38695), [CVE-2025-38688](https://nvd.nist.gov/vuln/detail/CVE-2025-38688), [CVE-2025-38687](https://nvd.nist.gov/vuln/detail/CVE-2025-38687), [CVE-2025-38685](https://nvd.nist.gov/vuln/detail/CVE-2025-38685), [CVE-2025-38684](https://nvd.nist.gov/vuln/detail/CVE-2025-38684), [CVE-2025-38683](https://nvd.nist.gov/vuln/detail/CVE-2025-38683), [CVE-2025-38681](https://nvd.nist.gov/vuln/detail/CVE-2025-38681), [CVE-2025-38693](https://nvd.nist.gov/vuln/detail/CVE-2025-38693), [CVE-2025-38692](https://nvd.nist.gov/vuln/detail/CVE-2025-38692), [CVE-2025-38691](https://nvd.nist.gov/vuln/detail/CVE-2025-38691), [CVE-2025-38679](https://nvd.nist.gov/vuln/detail/CVE-2025-38679), [CVE-2025-38680](https://nvd.nist.gov/vuln/detail/CVE-2025-38680), [CVE-2025-38677](https://nvd.nist.gov/vuln/detail/CVE-2025-38677), [CVE-2025-40300](https://nvd.nist.gov/vuln/detail/CVE-2025-40300))\n\n#### Updates:\n\n- Linux ([6.6.106](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.106) (includes [6.6.105](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.105), [6.6.104](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.104), [6.6.103](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.103), [6.6.102](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.102), [6.6.101](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.101)))\n- ca-certificates ([3.115.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115_1.html) (includes [3.115](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115.html)))"
  }
}
