Releases: flatcar/scripts
Releases · flatcar/scripts
stable-4459.2.0
Changes since Stable 4230.2.4
Security fixes:
- VMWare: open-vm-tools (CVE-2025-22247)
- afterburn (CVE-2025-0977, CVE-2025-3416)
- bind (CVE-2024-11187, CVE-2024-12705)
- binutils (CVE-2024-53589, CVE-2025-1176, CVE-2025-1178, CVE-2025-1179, CVE-2025-1180, CVE-2025-1181, CVE-2025-1182)
- c-ares (CVE-2025-31498)
- cifs-utils (CVE-2025-2312)
- containerd (CVE-2024-25621, CVE-2025-64329, CVE-2024-40635, CVE-2025-47291)
- crun (CVE-2025-24965)
- curl (CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, curl-20250205)
- expat (CVE-2024-8176)
- git (CVE-2024-50349, CVE-2024-52005, CVE-2024-52006, CVE-2025-48384, CVE-2025-48385, CVE-2025-48386)
- glib (CVE-2024-52533, CVE-2025-4373, (CVE-2025-7039)
- glibc (CVE-2025-0395, CVE-2025-8058)
- gnutls (CVE-2024-12243, CVE-2025-32988, CVE-2025-32989, CVE-2025-32990, CVE-2025-6395)
- go (CVE-2025-22871, CVE-2025-22873, CVE-2025-4673, CVE-2025-0913, CVE-2025-22874, CVE-2025-4674, CVE-2025-47906, CVE-2025-47907)
- intel-microcode (CVE-2023-34440, CVE-2023-43758, CVE-2024-24582, CVE-2024-28047, CVE-2024-28127, CVE-2024-29214, CVE-2024-31157, CVE-2024-39279, CVE-2024-31068, CVE-2024-36293, CVE-2024-37020, CVE-2024-39355)
- iperf (CVE-2024-53580, CVE-2025-54349, CVE-2025-54350, CVE-2025-54351)
- jq (CVE-2024-23337, CVE-2024-53427, CVE-2025-48060)
- libarchive (CVE-2024-57970, CVE-2025-25724)
- libcap (CVE-2025-1390)
- libtasn1 (CVE-2024-12133)
- libxml2 (CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2025-32414, CVE-2025-32415, CVE-2025-49794, CVE-2025-49795, CVE-2025-49796)
- libxslt (CVE-2025-24855, CVE-2024-55549)
- mit-krb5 (CVE-2025-24528)
- nvidia-drivers (CVE-2025-23277, CVE-2025-23278, CVE-2025-23279, CVE-2025-23286)
- nvidia-drivers-service (CVE-2025-23244)
- openssh (CVE-2025-26465, CVE-2025-26466)
- openssl (CVE-2024-12797, CVE-2024-13176)
- perl (CVE-2024-56406)
- podman (CVE-2024-11218, CVE-2025-6032)
- python (CVE-2025-0938, CVE-2025-4516, CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, CVE-2025-4517, CVE-2025-6069, CVE-2025-8194)
- requests (CVE-2024-47081)
- rsync (CVE-2024-12084, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747)
- runc (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881)
- socat (CVE-2024-54661, socat-20250221)
- vim (CVE-2024-41957, CVE-2024-41965, CVE-2024-43374, CVE-2024-43790, CVE-2024-43802, CVE-2024-45306, CVE-2024-47814, CVE-2025-1215, CVE-2025-22134, CVE-2025-24014, GHSA-63p5-mwg2-787v, CVE-2025-27423, CVE-2025-29768, CVE-2025-53905, CVE-2025-53906, CVE-2025-9390)
- xz-utils (CVE-2025-31115)
Bug fixes:
- Enabled
CONFIG_CPUSETS_V1to mitigate cgroupsv1 removal (e.g JVM) (Flatcar#1884) - Enabled
CONFIG_MEMCG_V1to mitigate cgroupsv1 removal (e.g JVM) (Flatcar#1884) - Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them (Flatcar#1933)
- Fix non-conforming GPT partition table (Flatcar#1651)
- Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by s...
beta-4459.1.1
Changes since Beta 4459.1.0
Security fixes:
- Linux (CVE-2025-40109, CVE-2025-40107, CVE-2025-40028, CVE-2025-40027, CVE-2025-40026, CVE-2025-40000, CVE-2025-39995, CVE-2025-40052, CVE-2025-40061, CVE-2025-40060, CVE-2025-40059, CVE-2025-40058, CVE-2025-40057, CVE-2025-40056, CVE-2025-40055, CVE-2025-40081, CVE-2025-40080, CVE-2025-40079, CVE-2025-40078, CVE-2025-40071, CVE-2025-40070, CVE-2025-40068, CVE-2025-40067, CVE-2025-40062, CVE-2025-40053, CVE-2025-40029, CVE-2025-40038, CVE-2025-40037, CVE-2025-40036, CVE-2025-40035, CVE-2025-40033, CVE-2025-40051, CVE-2025-40049, CVE-2025-40031, CVE-2025-40048, CVE-2025-40047, CVE-2025-40045, CVE-2025-40044, CVE-2025-40043, CVE-2025-40039, CVE-2025-40030, CVE-2025-40018, CVE-2025-40004, CVE-2025-40032, CVE-2025-40042, CVE-2025-40019)
- containerd (CVE-2024-25621, CVE-2025-64329)
- runc (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881)
Bug fixes:
- Enabled
CONFIG_MEMCG_V1to mitigate cgroupsv1 removal (e.g JVM) (Flatcar#1884) - Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them (Flatcar#1933)
- Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by switching back to built-in extra firmware instead of early cpio inclusion (Flatcar#1909)
- Fixed that the needed Flatcar extensions don't get removed on update which caused a re-download (update_engine#51)
Changes:
- Scaleway: The Linux console is now attached to the correct console port. (scripts#3383)
Updates:
alpha-4515.0.0
Changes since Alpha 4487.0.1
Security fixes:
- containerd (CVE-2024-25621, CVE-2025-64329)
- expat (CVE-2025-59375)
- intel-microcode (CVE-2024-28956, CVE-2024-43420, CVE-2024-45332, CVE-2025-20012, CVE-2025-20054, CVE-2025-20103, CVE-2025-20623, CVE-2025-24495, CVE-2025-20053, CVE-2025-20109, CVE-2025-22839, CVE-2025-22840, CVE-2025-22889, CVE-2025-26403)
- nvidia-drivers (CVE-2025-23280, CVE-2025-23282, CVE-2025-23300, CVE-2025-23330, CVE-2025-23332, CVE-2025-23345)
- openssh (CVE-2025-61984, CVE-2025-61985)
- openssl (CVE-2025-9230, CVE-2025-9231, CVE-2025-9232)
- runc (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881)
Bug fixes:
- Alpha only: Added Fusion SCSI disk drivers back to the initrd after they got lost in the rework (Flatcar#1924)
- Configured the services in the overlaybd sysext to start automatically like the other sysexts. Note that the sysext must be enabled at boot time for this to happen, otherwise you need to call
systemd-tmpfiles --createandsystemctl daemon-reloadfirst.
Changes:
- Alpha only: Reduced Azure image size again to 30 GB as before by shrinking the root partition to compensate for the growth of the other partitions (scripts#3460)
- The way that files for building custom kernel modules are installed has changed from a Ubuntu-inspired method to the standard upstream kernel method. In the unlikely event that this breaks your module builds, please let the Flatcar team know immediately.
Updates:
- Linux Firmware (20251011, 20251021)
- SDK: cmake (3.31.9)
- SDK: go (1.25.1 (includes 1.25))
- SDK: qemu (10.0.5)
- azure, dev: inotify-tools (4.25.9.0)
- azure, stackit: chrony (4.8)
- base, dev: bind (9.18.38)
- base, dev: bpftool (7.6.0)
- base, dev: btrfs-progs (6.16.1)
- base, dev: expat (2.7.3)
- base, dev: gettext (0.23.2 (includes 0.23.1, 0.23.0))
- base, dev: git (2.51.0 (includes 2.50.0))
- base, dev: intel-microcode (20250812 (includes 20250512))
- base, dev: libxml2 (2.14.6 (includes 2.14.5, 2.14.4, 2.14.3, 2.14.2, 2.14.1, 2.14.0))
- base, dev: nftables (1.1.5)
- base, dev: nvidia-drivers-service (amd64) (535.274.02)
- base, dev: nvidia-drivers-service (arm64) (570.195.03)
- base, dev: openssh (10.2_p1 (includes 10.1))
- base, dev: openssl (3.4.3)
- base, dev: xfsprogs (6.16.0 (includes 6.15.0))
- sysext-containerd: containerd (2.1.5 (includes 2.1.4))
- sysext-containerd: runc (1.3.3 (includes 1.3.2, 1.3.1))
- sysext-nvidia-drivers-535, sysext-nvidia-drivers-535-open: nvidia-drivers (535.274.02)
- sysext-nvidia-drivers-570, sysext-nvidia-drivers-570-open: nvidia-drivers (570.195.03)
- sysext-podman: crun (1.21)
- sysext-podman: netavark (1.15.2 (includes 1.15.1, 1.15.0))
- sysext-podman: passt (2025.06.11)
- sysext-python: platformdirs (4.4.0)
- sysext-python: typing-extensions (4.15.0)
- systemd (257.9)
alpha-4487.0.1
Changes since Alpha 4487.0.0
Security fixes:
- Linux (CVE-2025-40107, CVE-2025-40028, CVE-2025-40027, CVE-2025-40026, CVE-2025-40000, CVE-2025-39995, CVE-2025-40052, CVE-2025-40061, CVE-2025-40060, CVE-2025-40059, CVE-2025-40058, CVE-2025-40057, CVE-2025-40056, CVE-2025-40055, CVE-2025-40081, CVE-2025-40080, CVE-2025-40079, CVE-2025-40078, CVE-2025-40071, CVE-2025-40070, CVE-2025-40068, CVE-2025-40067, CVE-2025-40062, CVE-2025-40053, CVE-2025-40029, CVE-2025-40038, CVE-2025-40037, CVE-2025-40036, CVE-2025-40035, CVE-2025-40033, CVE-2025-40051, CVE-2025-40049, CVE-2025-40031, CVE-2025-40048, CVE-2025-40047, CVE-2025-40045, CVE-2025-40044, CVE-2025-40043, CVE-2025-40039, CVE-2025-40030, CVE-2025-40018, CVE-2025-40004, CVE-2025-40032, CVE-2025-40042, CVE-2025-40019)
Bug fixes:
- Alpha only: Fixed systemd-sysext payload handling for air-gapped/self-hosted updates which was a known bug for 4487.0.0 (ue-rs#93)
- Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them (Flatcar#1933)
- Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by switching back to built-in extra firmware instead of early cpio inclusion (Flatcar#1909)
- Fixed a kernel boot warning when loading an explicit list of kernel modules in the minimal first-stage initrd (Flatcar#1934)
- Fixed that the needed Flatcar extensions don't get removed on update which caused a re-download (update_engine#51)
Changes:
- Added support for the kernel cmdline parameters
flatcar.release_file_server_urlandflatcar.dev_file_server_urlto specify custom servers where Flatcar extensions should be downloaded on boot (bootengine#112) - Alpha only: Reduced Azure image size again to 30 GB as before by shrinking the root partition to compensate for the growth of the other partitions (scripts#3460)
- Scaleway: The Linux console is now attached to the correct console port. (scripts#3383)
Updates:
stable-4230.2.4
Changes since Stable 4230.2.3
Security fixes:
- Linux (CVE-2025-39923, CVE-2025-39913, CVE-2025-39911, CVE-2025-39909, CVE-2025-39907, CVE-2025-39916, CVE-2025-39914, CVE-2025-39885, CVE-2025-39886, CVE-2025-39876, CVE-2025-39873, CVE-2025-39871, CVE-2025-39870, CVE-2025-39869, CVE-2025-39883, CVE-2025-39882, CVE-2025-39881, CVE-2025-39880, CVE-2025-39877, CVE-2025-39961, CVE-2025-39957, CVE-2025-39955, CVE-2025-39938, CVE-2025-39937, CVE-2025-39934, CVE-2025-39953, CVE-2025-39952, CVE-2025-39951, CVE-2025-39949, CVE-2025-39947, CVE-2025-39946, CVE-2025-39945, CVE-2025-39944, CVE-2025-39943, CVE-2025-39942, CVE-2025-39929, CVE-2025-39931, CVE-2023-52435)
Bug fixes:
- Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance (Flatcar#1901)
Changes:
- Scaleway: SSH keys are now fetched via Afterburn (scripts#3277)
- Scaleway: The hostname is now set via Afterburn (scripts#3277)
Updates:
beta-4459.1.0
Changes since Beta 4426.1.0
Security fixes:
- Linux (CVE-2025-39927, CVE-2025-39926, CVE-2025-39923, CVE-2025-39913, CVE-2025-39912, CVE-2025-39911, CVE-2025-39909, CVE-2025-39907, CVE-2025-39917, CVE-2025-39916, CVE-2025-39914, CVE-2025-39885, CVE-2025-39886, CVE-2025-39876, CVE-2025-39873, CVE-2025-39871, CVE-2025-39870, CVE-2025-39869, CVE-2025-39884, CVE-2025-39883, CVE-2025-39882, CVE-2025-39881, CVE-2025-39880, CVE-2025-39877, CVE-2025-39963, CVE-2025-39961, CVE-2025-39957, CVE-2025-39956, CVE-2025-39955, CVE-2025-39938, CVE-2025-39937, CVE-2025-39934, CVE-2025-39953, CVE-2025-39952, CVE-2025-39951, CVE-2025-39950, CVE-2025-39932, CVE-2025-39949, CVE-2025-39948, CVE-2025-39947, CVE-2025-39946, CVE-2025-39945, CVE-2025-39944, CVE-2025-39943, CVE-2025-39942, CVE-2025-39940, CVE-2025-39929, CVE-2025-39931, CVE-2024-57878, CVE-2024-57877, CVE-2024-57875, CVE-2024-57876, CVE-2024-57874, CVE-2025-23128, CVE-2025-23127, CVE-2025-23126, CVE-2025-23125, CVE-2025-23124, CVE-2024-57872, CVE-2024-57850, CVE-2024-57849, CVE-2024-57839, CVE-2024-57843, CVE-2024-48875, CVE-2024-48873, CVE-2024-47809, CVE-2024-47794, CVE-2024-47143, CVE-2024-47141, CVE-2024-45828, CVE-2024-43098, CVE-2024-53680, CVE-2024-52332, CVE-2024-50051, CVE-2024-49569, CVE-2024-48881, CVE-2024-48876, CVE-2024-41932, CVE-2024-41935, CVE-2024-56787, CVE-2024-56786, CVE-2024-56785, CVE-2024-56784, CVE-2024-56783, CVE-2024-56781, CVE-2024-56782, CVE-2024-56640, CVE-2024-56639, CVE-2024-56638, CVE-2024-56637, CVE-2024-56636, CVE-2024-56635, CVE-2024-56634, CVE-2024-56651, CVE-2024-56633, CVE-2024-56650, CVE-2024-56649, CVE-2024-56648, CVE-2024-56647, CVE-2024-56646, CVE-2024-56645, CVE-2024-56644, CVE-2024-56643, CVE-2024-56642, CVE-2024-56641, CVE-2024-56631, CVE-2024-56632, CVE-2024-56615, CVE-2024-56624, CVE-2024-56623, CVE-2024-56622, CVE-2024-56621, CVE-2024-56620, CVE-2024-56619, CVE-2024-56618, CVE-2024-56617, CVE-2024-56630, CVE-2024-56629, CVE-2024-56628, CVE-2024-56627, CVE-2024-56626, CVE-2024-56625, CVE-2024-56616, CVE-2024-56592, CVE-2024-56591, CVE-2024-56590, CVE-2024-56589, CVE-2024-56588, CVE-2024-56587, CVE-2024-56614, CVE-2024-56613, CVE-2024-56586, CVE-2024-56612, CVE-2024-56611, CVE-2024-56610, CVE-2024-56609, CVE-2024-56608, CVE-2024-56607, CVE-2024-56606, CVE-2024-56605, CVE-2024-56604, CVE-2024-56603, CVE-2024-56585, CVE-2024-56602, CVE-2024-56601, CVE-2024-56600, CVE-2024-56599, CVE-2024-56598, [CVE-2...
alpha-4487.0.0
Changes since Alpha 4459.0.0
Known bugs:
- Updating with OEM or Flatcar extensions is broken when ue-rs parses the Omaha response and thusfalls back to downloading from the release server or bincache which may fail for self-hosted Nebraska updates or payloads passed with flatcar-update (ue-rs#92)
Security fixes:
- Linux (CVE-2025-39927, CVE-2025-39926, CVE-2025-39923, CVE-2025-39913, CVE-2025-39912, CVE-2025-39911, CVE-2025-39909, CVE-2025-39907, CVE-2025-39917, CVE-2025-39916, CVE-2025-39914, CVE-2025-39885, CVE-2025-39886, CVE-2025-39876, CVE-2025-39873, CVE-2025-39871, CVE-2025-39870, CVE-2025-39869, CVE-2025-39884, CVE-2025-39883, CVE-2025-39882, CVE-2025-39881, CVE-2025-39880, CVE-2025-39877, CVE-2025-39963, CVE-2025-39961, CVE-2025-39957, CVE-2025-39956, CVE-2025-39955, CVE-2025-39938, CVE-2025-39937, CVE-2025-39934, CVE-2025-39953, CVE-2025-39952, CVE-2025-39951, CVE-2025-39950, CVE-2025-39932, CVE-2025-39949, CVE-2025-39948, CVE-2025-39947, CVE-2025-39946, CVE-2025-39945, CVE-2025-39944, CVE-2025-39943, CVE-2025-39942, CVE-2025-39940, CVE-2025-39929, CVE-2025-39931, CVE-2024-57878, CVE-2024-57877, CVE-2024-57875, CVE-2024-57876, CVE-2024-57874, CVE-2025-23128, CVE-2025-23127, CVE-2025-23126, CVE-2025-23125, CVE-2025-23124, CVE-2024-57872, CVE-2024-57850, CVE-2024-57849, CVE-2024-57839, CVE-2024-57843, CVE-2024-48875, CVE-2024-48873, CVE-2024-47809, CVE-2024-47794, CVE-2024-47143, CVE-2024-47141, CVE-2024-45828, CVE-2024-43098, CVE-2024-53680, CVE-2024-52332, CVE-2024-50051, CVE-2024-49569, CVE-2024-48881, CVE-2024-48876, CVE-2024-41932, CVE-2024-41935, CVE-2024-56787, CVE-2024-56786, CVE-2024-56785, CVE-2024-56784, CVE-2024-56783, CVE-2024-56781, CVE-2024-56782, CVE-2024-56640, CVE-2024-56639, CVE-2024-56638, CVE-2024-56637, CVE-2024-56636, CVE-2024-56635, CVE-2024-56634, CVE-2024-56651, CVE-2024-56633, CVE-2024-56650, CVE-2024-56649, CVE-2024-56648, CVE-2024-56647, CVE-2024-56646, CVE-2024-56645, CVE-2024-56644, CVE-2024-56643, CVE-2024-56642, CVE-2024-56641, CVE-2024-56631, CVE-2024-56632, CVE-2024-56615, CVE-2024-56624, CVE-2024-56623, CVE-2024-56622, CVE-2024-56621, CVE-2024-56620, CVE-2024-56619, CVE-2024-56618, CVE-2024-56617, CVE-2024-56630, CVE-2024-56629, CVE-2024-56628, CVE-2024-56627, CVE-2024-56626, CVE-2024-56625, CVE-2024-56616, CVE-2024-56592, CVE-2024-56591, CVE-2024-56590, CVE-2024-56589, CVE-2024-56588, CVE-2024-56587, CVE-2024-56614, CVE-2024-56613, CVE-2024-56586, CVE-2024-56612, CVE-2024-56611, CVE-2024-56610, CVE-2024-56609, CVE-2024-56608, CVE-2024-56607, CVE-2024-56606, CVE-2024-56605, CVE-2024-56604, CVE-2024-56603, CVE-2024-56585, [CVE-2024-566...
stable-4230.2.3
Changes since Stable 4230.2.2
Security fixes:
- Linux (CVE-2025-39726, CVE-2025-38670, CVE-2025-38668, CVE-2025-38666, CVE-2025-38665, CVE-2025-38664, CVE-2025-38663, CVE-2025-38671, CVE-2025-38552, CVE-2025-38520, CVE-2025-38500, CVE-2025-39734, CVE-2025-39731, CVE-2025-39730, CVE-2025-38650, CVE-2025-38648, CVE-2025-38646, CVE-2025-38645, CVE-2025-38644, CVE-2025-38659, CVE-2025-38653, CVE-2025-38652, CVE-2025-38626, CVE-2025-38625, CVE-2025-38624, CVE-2025-38623, CVE-2025-38622, CVE-2025-38640, CVE-2025-38639, CVE-2025-38635, CVE-2025-38634, CVE-2025-38632, CVE-2025-38630, CVE-2025-38618, CVE-2025-38617, CVE-2025-38611, CVE-2025-38615, CVE-2025-38612, CVE-2025-38577, CVE-2025-38583, CVE-2025-38581, CVE-2025-38610, CVE-2025-38609, CVE-2025-38608, CVE-2025-38604, CVE-2025-38602, CVE-2025-38601, CVE-2025-38579, CVE-2025-38590, CVE-2025-38588, CVE-2025-38587, CVE-2025-38578, CVE-2025-38563, CVE-2025-38562, CVE-2025-38561, CVE-2025-38560, CVE-2025-38576, CVE-2025-38574, CVE-2025-38572, CVE-2025-38571, CVE-2025-38569, CVE-2025-38568, CVE-2025-38566, CVE-2025-38565, CVE-2025-38555, CVE-2025-38553, CVE-2025-38501, CVE-2025-39798, CVE-2025-39797, CVE-2025-39795, CVE-2025-39794, CVE-2025-39773, CVE-2025-39772, CVE-2025-39770, CVE-2025-39790, CVE-2025-39788, CVE-2025-39787, CVE-2025-39767, CVE-2025-39783, CVE-2025-39782, CVE-2025-39781, CVE-2025-39776, CVE-2025-39766, CVE-2025-39750, CVE-2025-39760, CVE-2025-39759, CVE-2025-39758, CVE-2025-39757, CVE-2025-39756, CVE-2025-39753, CVE-2025-39752, CVE-2025-39763, CVE-2025-39761, CVE-2025-39751, CVE-2025-39744, CVE-2025-39743, CVE-2025-39742, CVE-2025-39739, CVE-2025-39738, CVE-2025-39749, CVE-2025-39736, CVE-2025-39737, CVE-2025-39711, CVE-2025-39720, CVE-2025-39719, CVE-2025-39718, CVE-2025-39716, CVE-2025-39715, CVE-2025-39714, CVE-2025-39713, CVE-2025-39724, CVE-2025-39721, CVE-2025-39675, CVE-2025-39673, CVE-2025-39710, CVE-2025-39709, CVE-2025-38735, CVE-2025-39706, CVE-2025-39703, CVE-2025-39702, CVE-2025-39701, CVE-2025-38734, CVE-2025-39694, CVE-2025-39693, CVE-2025-39692, CVE-2025-39691, CVE-2025-39689, CVE-2025-39687, CVE-2025-39686, CVE-2025-39685, CVE-2025-39684, CVE-2025-39683, CVE-2025-39682, CVE-2025-39681, CVE-2025-39679, CVE-2025-39676, CVE-2025-38732, CVE-2025-38727, CVE-2025-38730, CVE-2025-38729, CVE-2025-38728, CVE-2025-38694, CVE-2025-38702, CVE-2025-38701, CVE-2025-38700, CVE-2025-38699, CVE-2025-38698, CVE-2025-38725, [CVE-2025...
lts-4081.3.6
Changes since LTS 4081.3.5
Security fixes:
- Linux (CVE-2025-39726, CVE-2025-38670, CVE-2025-38668, CVE-2025-38666, CVE-2025-38665, CVE-2025-38664, CVE-2025-38663, CVE-2025-38671, CVE-2025-38552, CVE-2025-38520, CVE-2025-38500, CVE-2025-39734, CVE-2025-39731, CVE-2025-39730, CVE-2025-38650, CVE-2025-38648, CVE-2025-38646, CVE-2025-38645, CVE-2025-38644, CVE-2025-38659, CVE-2025-38653, CVE-2025-38652, CVE-2025-38626, CVE-2025-38625, CVE-2025-38624, CVE-2025-38623, CVE-2025-38622, CVE-2025-38640, CVE-2025-38639, CVE-2025-38635, CVE-2025-38634, CVE-2025-38632, CVE-2025-38630, CVE-2025-38618, CVE-2025-38617, CVE-2025-38611, CVE-2025-38615, CVE-2025-38612, CVE-2025-38577, CVE-2025-38583, CVE-2025-38581, CVE-2025-38610, CVE-2025-38609, CVE-2025-38608, CVE-2025-38604, CVE-2025-38602, CVE-2025-38601, CVE-2025-38579, CVE-2025-38590, CVE-2025-38588, CVE-2025-38587, CVE-2025-38578, CVE-2025-38563, CVE-2025-38562, CVE-2025-38561, CVE-2025-38560, CVE-2025-38576, CVE-2025-38574, CVE-2025-38572, CVE-2025-38571, CVE-2025-38569, CVE-2025-38568, CVE-2025-38566, CVE-2025-38565, CVE-2025-38555, CVE-2025-38553, CVE-2025-38501, CVE-2025-39798, CVE-2025-39797, CVE-2025-39795, CVE-2025-39794, CVE-2025-39773, CVE-2025-39772, CVE-2025-39770, CVE-2025-39790, CVE-2025-39788, CVE-2025-39787, CVE-2025-39767, CVE-2025-39783, CVE-2025-39782, CVE-2025-39781, CVE-2025-39776, CVE-2025-39766, CVE-2025-39750, CVE-2025-39760, CVE-2025-39759, CVE-2025-39758, CVE-2025-39757, CVE-2025-39756, CVE-2025-39753, CVE-2025-39752, CVE-2025-39763, CVE-2025-39761, CVE-2025-39751, CVE-2025-39744, CVE-2025-39743, CVE-2025-39742, CVE-2025-39739, CVE-2025-39738, CVE-2025-39749, CVE-2025-39736, CVE-2025-39737, CVE-2025-39711, CVE-2025-39720, CVE-2025-39719, CVE-2025-39718, CVE-2025-39716, CVE-2025-39715, CVE-2025-39714, CVE-2025-39713, CVE-2025-39724, CVE-2025-39721, CVE-2025-39675, CVE-2025-39673, CVE-2025-39710, CVE-2025-39709, CVE-2025-38735, CVE-2025-39706, CVE-2025-39703, CVE-2025-39702, CVE-2025-39701, CVE-2025-38734, CVE-2025-39694, CVE-2025-39693, CVE-2025-39692, CVE-2025-39691, CVE-2025-39689, CVE-2025-39687, CVE-2025-39686, CVE-2025-39685, CVE-2025-39684, CVE-2025-39683, CVE-2025-39682, CVE-2025-39681, CVE-2025-39679, CVE-2025-39676, CVE-2025-38732, CVE-2025-38727, CVE-2025-38730, CVE-2025-38729, CVE-2025-38728, CVE-2025-38694, CVE-2025-38702, CVE-2025-38701, CVE-2025-38700, CVE-2025-38699, CVE-2025-38698, CVE-2025-38725, [CVE-2025-38...
beta-4426.1.0
Changes since Beta 4372.1.0
Security fixes:
- Linux (CVE-2025-39725, CVE-2025-39726, CVE-2025-38675, CVE-2025-38670, CVE-2025-38668, CVE-2025-38666, CVE-2025-38665, CVE-2025-38664, CVE-2025-38663, CVE-2025-38671, CVE-2025-38662, CVE-2025-38500, CVE-2025-39734, CVE-2025-39732, CVE-2025-39731, CVE-2025-39730, CVE-2025-39727, CVE-2025-38650, CVE-2025-38648, CVE-2025-38646, CVE-2025-38645, CVE-2025-38644, CVE-2025-38660, CVE-2025-38659, CVE-2025-38653, CVE-2025-38652, CVE-2025-38628, CVE-2025-38626, CVE-2025-38625, CVE-2025-38624, CVE-2025-38623, CVE-2025-38622, CVE-2025-38640, CVE-2025-38639, CVE-2025-38635, CVE-2025-38634, CVE-2025-38632, CVE-2025-38631, CVE-2025-38630, CVE-2025-38619, CVE-2025-38618, CVE-2025-38617, CVE-2025-38611, CVE-2025-38615, CVE-2025-38612, CVE-2025-38577, CVE-2025-38586, CVE-2025-38585, CVE-2025-38583, CVE-2025-38582, CVE-2025-38581, CVE-2025-38610, CVE-2025-38609, CVE-2025-38608, CVE-2025-38604, CVE-2025-38602, CVE-2025-38601, CVE-2025-38579, CVE-2025-38595, CVE-2025-38593, CVE-2025-38590, CVE-2025-38588, CVE-2025-38587, CVE-2025-38578, CVE-2025-38563, CVE-2025-38562, CVE-2025-38561, CVE-2025-38560, CVE-2025-38559, CVE-2025-38557, CVE-2025-38576, CVE-2025-38574, CVE-2025-38573, CVE-2025-38572, CVE-2025-38571, CVE-2025-38569, CVE-2025-38568, CVE-2025-38566, CVE-2025-38565, CVE-2025-38555, CVE-2025-38553, CVE-2025-38501, CVE-2025-39798, CVE-2025-39797, CVE-2025-39795, CVE-2025-39794, CVE-2025-39792, CVE-2025-39750, CVE-2025-39760, CVE-2025-39758, CVE-2025-39757, CVE-2025-39756, CVE-2025-39754, CVE-2025-39753, CVE-2025-39752, CVE-2025-39763, CVE-2025-39761, CVE-2025-39751, CVE-2025-39744, CVE-2025-39743, CVE-2025-39742, CVE-2025-39739, CVE-2025-39738, CVE-2025-39749, CVE-2025-39748, CVE-2025-39747, CVE-2025-39746, CVE-2025-39736, CVE-2025-39737, CVE-2025-38727, CVE-2025-38729, CVE-2025-38728, CVE-2025-38694, CVE-2025-38703, CVE-2025-38702, CVE-2025-38701, CVE-2025-38700, CVE-2025-38699, CVE-2025-38698, CVE-2025-38726, CVE-2025-38725, CVE-2025-38724, CVE-2025-38697, CVE-2025-38723, CVE-2025-38722, CVE-2025-38721, CVE-2025-38718, CVE-2025-38717, CVE-2025-38716, CVE-2025-38715, CVE-2025-38714, CVE-2025-38696, CVE-2025-38713, CVE-2025-38712, CVE-2025-38711, CVE-2025-38710, CVE-2025-38709, CVE-2025-38708, CVE-2025-38707, CVE-2025-38706, CVE-2025-38705, CVE-2025-38704, CVE-2025-38695, CVE-2025-38688, CVE-2025-38687, CVE-2025-38686, CVE-2025-38685, CVE-2025-38684, [CVE-2025-3...