Releases: flatcar/scripts
Releases · flatcar/scripts
lts-3510.3.6
Changes since LTS 3510.3.5
Security fixes:
- Linux (CVE-2024-42098, CVE-2024-42097, CVE-2024-42096, CVE-2024-42095, CVE-2024-42093, CVE-2024-42094, CVE-2024-42092, CVE-2024-42090, CVE-2024-42089, CVE-2024-42087, CVE-2024-42086, CVE-2024-42084, CVE-2024-42085, CVE-2024-42070, CVE-2024-42068, CVE-2024-42082, CVE-2024-42080, CVE-2024-42077, CVE-2024-42076, CVE-2023-52887, CVE-2024-41093, CVE-2024-41092, CVE-2024-41089, CVE-2024-41087, CVE-2024-41097, CVE-2024-41095, CVE-2024-41006, CVE-2024-41005, CVE-2024-41004, CVE-2024-41002, CVE-2024-41000, CVE-2024-40994, CVE-2024-40990, CVE-2024-40988, CVE-2024-40987, CVE-2024-40995, CVE-2024-40983, CVE-2024-40984, CVE-2024-40970, CVE-2024-40978, CVE-2024-40976, CVE-2024-40974, CVE-2024-40981, CVE-2024-40980, CVE-2024-40971, CVE-2024-40954, CVE-2024-40968, CVE-2024-40967, CVE-2024-40963, CVE-2024-40961, CVE-2024-40960, CVE-2024-40959, CVE-2024-40958, CVE-2024-40957, CVE-2024-40956, CVE-2024-40929, CVE-2024-40937, CVE-2024-40934, CVE-2024-40932, CVE-2024-40931, CVE-2024-40945, CVE-2024-40943, CVE-2024-40942, CVE-2024-40941, CVE-2024-40916, CVE-2024-40927, CVE-2024-40914, CVE-2024-40912, CVE-2024-39503, CVE-2024-39502, CVE-2024-39501, CVE-2024-39500, CVE-2024-39499, CVE-2024-40911, CVE-2024-40908, CVE-2024-40905, CVE-2024-40904, CVE-2024-40902, CVE-2024-40901, CVE-2024-39509, CVE-2024-39507, CVE-2024-39506, CVE-2024-39505, CVE-2024-39495, CVE-2024-42247, CVE-2024-42244, CVE-2024-42232, CVE-2024-42240, CVE-2024-42236, CVE-2024-42145, CVE-2024-42154, CVE-2024-42153, CVE-2024-42152, CVE-2024-42148, CVE-2024-42229, CVE-2024-42225, CVE-2024-42224, CVE-2024-42223, CVE-2024-42161, CVE-2024-42157, CVE-2024-42119, CVE-2024-42116, CVE-2024-42115, CVE-2024-42143, CVE-2024-42140, CVE-2024-42137, CVE-2024-42131, CVE-2024-42130, CVE-2024-42127, CVE-2024-42124, CVE-2024-42121, CVE-2024-42120, CVE-2024-42106, CVE-2024-42105, CVE-2024-42104, CVE-2024-42103, CVE-2024-42102, CVE-2024-42101, CVE-2024-42109, CVE-2024-41055, CVE-2024-41027, CVE-2024-41049, CVE-2024-41048, CVE-2024-41047, CVE-2024-41046, CVE-2024-41044, CVE-2024-41041, CVE-2024-41040, CVE-2024-41035, CVE-2024-41034, CVE-2024-41081, CVE-2024-41078, CVE-2024-41073, CVE-2024-41072, CVE-2024-41070, CVE-2024-41077, CVE-2024-41068, CVE-2024-41065, CVE-2024-41064, CVE-2024-41063, CVE-2024-41060, CVE-2024-41059, CVE-2024-41022, CVE-2024-41020, CVE-2024-41019, CVE-2024-41017, CVE-2024-41015, CVE-2024-41090, [CVE-2024-41...
alpha-4186.0.0
Changes since Alpha 4152.0.0
Security fixes:
- Linux (CVE-2024-53103, CVE-2024-53104, CVE-2024-53088, CVE-2024-53082, CVE-2024-53083, CVE-2024-53081, CVE-2024-53060, CVE-2024-53068, CVE-2024-53066, CVE-2024-53063, CVE-2024-53072, CVE-2024-53070, CVE-2024-53061, CVE-2024-50302, CVE-2024-50301, CVE-2024-50296, CVE-2024-50295, CVE-2024-50294, CVE-2024-50292, CVE-2024-50290, CVE-2024-50300, CVE-2024-50299, CVE-2024-50298, CVE-2024-50275, CVE-2024-50284, CVE-2024-50283, CVE-2024-50282, CVE-2024-50280, CVE-2024-50279, CVE-2024-50278, CVE-2024-50287, CVE-2024-50286, CVE-2024-50285, CVE-2024-50276, CVE-2024-50273, CVE-2024-50272, CVE-2024-50271, CVE-2024-50269, CVE-2024-50268, CVE-2024-50267, CVE-2024-50264, CVE-2024-50265, CVE-2024-53102, CVE-2024-53101, CVE-2024-53100, CVE-2024-53099, CVE-2024-53097, CVE-2024-53095, CVE-2024-53094, CVE-2024-53093, CVE-2024-53091, CVE-2024-53079, CVE-2024-53135, CVE-2024-53134, CVE-2024-53131, CVE-2024-53130, CVE-2024-53129, CVE-2024-53140, CVE-2024-53139, CVE-2024-53138, CVE-2024-53136, CVE-2024-53126, CVE-2024-53127, CVE-2024-53113, CVE-2024-53112, CVE-2024-53110, CVE-2024-53109, CVE-2024-53108, CVE-2024-53123, CVE-2024-53122, CVE-2024-53121, CVE-2024-53120, CVE-2024-53119, CVE-2024-53106)
- OpenSSL (CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535, CVE-2024-6119, CVE-2024-9143)
- expat (CVE-2024-50602)
- sssd (CVE-2023-3758)
- wget (CVE-2024-10524)
Bug fixes:
- Added qemu-guest-agent to ARM64 images (flatcar/flatcar#1593)
Changes:
- Additional GRUB modules are no longer installed for UEFI platforms to save space and also because they cannot be loaded with Secure Boot enabled. This does not affect existing installations.
- The GRUB modules on non-UEFI platforms are now compressed with xz rather than gzip to save even more space. This does not affect existing installations.
- The VFIO kernel modules are now also available in ARM64 builds. (flatcar/scripts#2484)
- Enabled the gtp kernel module. This is the GPRS Tunneling Protocol datapath for usage in telecoms scenarios. (flatcar/scripts#2504)
Updates:
- Linux (6.6.65 (includes 6.6.64, 6.6.63, 6.6.62, 6.6.61))
- Linux Firmware (20241210 (includes 20241110))
- OpenSSL (3.2.3)
- SDK: autoconf (2.72)
- SDK: cmake (3.30.5)
- SDK: libpng (1.6.44)
- SDK: perf (6.11.7)
- SDK: pkgcheck (0.10.32)
- SDK: portage (3.0.66.1)
- SDK: Go (1.22.10)
- azure: chrony (4.6.1)
- base, dev: azure-vm-utils (0.4.0)
- base, dev: bind (9.18.29)
- base, dev: bpftool (7.4.0)
- base, dev: btrfs-progs (6.11)
- base, dev: checkpolicy (3.7)
- base, dev: expat (2.6.4)
- base, dev: gawk (5.3.1)
- base, dev: gcc (14.2.1_p20241116)
- base, dev: iproute2 (6.11.0 (includes 6.10.0))
- base, dev: iputils (20240905)
- base, dev: json-c (0.18)
- base, dev: kexec-tools (2.0.29)
- base, dev: less (668)
- base, dev: libarchive (3.7.7)
- base, dev: libnetfilter_conntrack (1.1.0)
- base, dev: libnftnl (1.2.8)
- base, dev: libselinux (3.7)
- base, dev: libsepol (3.7)
- base, dev: libuv (1.49.2 (includes 1.49.1, 1.49.0))
- base, dev: libxml2 (2.12.8)
- base, dev: mokutil (0.7.2)
- b...
stable-4081.2.1
Changes since Stable 4081.2.0
Security fixes:
- Linux (CVE-2024-53103, CVE-2024-53104, CVE-2024-53088, CVE-2024-53082, CVE-2024-53083, CVE-2024-53081, CVE-2024-53060, CVE-2024-53068, CVE-2024-53066, CVE-2024-53063, CVE-2024-53072, CVE-2024-53070, CVE-2024-53061, CVE-2024-50302, CVE-2024-50301, CVE-2024-50296, CVE-2024-50295, CVE-2024-50294, CVE-2024-50292, CVE-2024-50290, CVE-2024-50300, CVE-2024-50299, CVE-2024-50298, CVE-2024-50275, CVE-2024-50284, CVE-2024-50283, CVE-2024-50282, CVE-2024-50280, CVE-2024-50279, CVE-2024-50278, CVE-2024-50287, CVE-2024-50286, CVE-2024-50285, CVE-2024-50276, CVE-2024-50273, CVE-2024-50272, CVE-2024-50271, CVE-2024-50269, CVE-2024-50268, CVE-2024-50267, CVE-2024-50264, CVE-2024-50265, CVE-2024-53102, CVE-2024-53101, CVE-2024-53100, CVE-2024-53099, CVE-2024-53097, CVE-2024-53095, CVE-2024-53094, CVE-2024-53093, CVE-2024-53091, CVE-2024-53079, CVE-2024-53135, CVE-2024-53134, CVE-2024-53131, CVE-2024-53130, CVE-2024-53129, CVE-2024-53140, CVE-2024-53139, CVE-2024-53138, CVE-2024-53136, CVE-2024-53126, CVE-2024-53127, CVE-2024-53113, CVE-2024-53112, CVE-2024-53110, CVE-2024-53109, CVE-2024-53108, CVE-2024-53123, CVE-2024-53122, CVE-2024-53121, CVE-2024-53120, CVE-2024-53119, CVE-2024-53106)
- OpenSSL (CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535, CVE-2024-6119, CVE-2024-9143)
Bug fixes:
- Added qemu-guest-agent to ARM64 images (flatcar/flatcar#1593)
Updates:
beta-4152.1.0
Changes since Beta 4116.1.0
Security fixes:
- Linux (CVE-2024-53103, CVE-2024-53104, CVE-2024-53088, CVE-2024-53082, CVE-2024-53083, CVE-2024-53081, CVE-2024-53060, CVE-2024-53068, CVE-2024-53066, CVE-2024-53063, CVE-2024-53072, CVE-2024-53070, CVE-2024-53061, CVE-2024-50302, CVE-2024-50301, CVE-2024-50296, CVE-2024-50295, CVE-2024-50294, CVE-2024-50292, CVE-2024-50290, CVE-2024-50300, CVE-2024-50299, CVE-2024-50298, CVE-2024-50275, CVE-2024-50284, CVE-2024-50283, CVE-2024-50282, CVE-2024-50280, CVE-2024-50279, CVE-2024-50278, CVE-2024-50287, CVE-2024-50286, CVE-2024-50285, CVE-2024-50276, CVE-2024-50273, CVE-2024-50272, CVE-2024-50271, CVE-2024-50269, CVE-2024-50268, CVE-2024-50267, CVE-2024-50264, CVE-2024-50265, CVE-2024-53102, CVE-2024-53101, CVE-2024-53100, CVE-2024-53099, CVE-2024-53097, CVE-2024-53095, CVE-2024-53094, CVE-2024-53093, CVE-2024-53091, CVE-2024-53079, CVE-2024-53135, CVE-2024-53134, CVE-2024-53131, CVE-2024-53130, CVE-2024-53129, CVE-2024-53140, CVE-2024-53139, CVE-2024-53138, CVE-2024-53136, CVE-2024-53126, CVE-2024-53127, CVE-2024-53113, CVE-2024-53112, CVE-2024-53110, CVE-2024-53109, CVE-2024-53108, CVE-2024-53123, CVE-2024-53122, CVE-2024-53121, CVE-2024-53120, CVE-2024-53119, CVE-2024-53106)
- OpenSSL (CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535, CVE-2024-6119, CVE-2024-9143)
- curl (CVE-2024-8096)
- libarchive (CVE-2024-26256, CVE-2024-48957, CVE-2024-48958)
- nvidia-drivers (CVE-2023-31022, CVE-2024-0074, CVE-2024-0075, CVE-2024-0078, CVE-2024-0126)
- openssh (CVE-2024-39894)
- sysext-podman: containers-common (CVE-2024-9341)
- sysext-podman: containers-image (CVE-2024-3727)
- sysext-podman: podman (CVE-2024-9407)
Bug fixes:
- Added qemu-guest-agent to ARM64 images (flatcar/flatcar#1593)
Changes:
- Added Proxmox Virtual Environment images (scripts#1783)
- The UEFI firmware has changed from raw (.fd) format to QCOW2 format. In addition, the amd64 firmware variables are now held in a 4MB image rather than a 2MB image. Note that this firmware is only intended for testing with QEMU. Do not use it in production. (scripts#2434)
- The arm64 UEFI firmware now supports Secure Boot. Be aware that this is not considered secure due to the lack of an SMM implementation, which is needed to protect the variable store. As above, this firmware should not be used in production anyway. (scripts#2434)
- grub 2.12-flatcar3: GRUB now includes many patches from Red Hat to support Secure Boot, as well as Flatcar's own patches. The version string includes a numbered "flatcar" suffix to track changes to these additional patches. This string can be seen in the GRUB menu. (scripts#2431)
Updates:
- Ignition (2.20.0)
- Linux (6.6.65 (includes 6.6.64, 6.6.63, 6.6.62, 6.6.61))
- Linux Firmware (20241017)
- OpenSSL (3.2.3)
- SDK: Go (1.22.9)
- SDK: catalyst (4.0.0)
- SDK: crossdev (20240921)
- SDK: edk2-bin (202408 (includes 202405, 202402, 202311, 202308, 202305, 202302, 202211, 202208, 202205))
- SDK: meson (1.5.2)
- SDK: rust (1.81.0)
- azure: chrony (4.6)
- base, dev: azure-vm-utils (0.3.0)
- base, dev: binutils-config (5.5.2)
- base, dev: btrfs-progs (6.10.1 (includes 6.10))
- base, dev: c-ares (1.33.1 (includes [1.33.0](htt...
stable-4081.2.0
Changes since Stable 3975.2.2
Security fixes:
- Linux (CVE-2024-50179, CVE-2024-50176, CVE-2024-50175, CVE-2024-50012, CVE-2024-50008, CVE-2024-50007, CVE-2024-50006, CVE-2024-50005, CVE-2024-50016, CVE-2024-50015, CVE-2024-50013, CVE-2024-50003, CVE-2024-50002, CVE-2024-50001, CVE-2024-50000, CVE-2024-49997, CVE-2024-49996, CVE-2024-49995, CVE-2024-49955, CVE-2024-49963, CVE-2024-49962, CVE-2024-49961, CVE-2024-49960, CVE-2024-49959, CVE-2024-49993, CVE-2024-49992, CVE-2024-49991, CVE-2024-49989, CVE-2024-49988, CVE-2024-49987, CVE-2024-49986, CVE-2024-49985, CVE-2024-49958, CVE-2024-49983, CVE-2024-49982, CVE-2024-49981, CVE-2024-49980, CVE-2024-49978, CVE-2024-49977, CVE-2024-49976, CVE-2024-49975, CVE-2024-49957, CVE-2024-49973, CVE-2024-49969, CVE-2024-49967, CVE-2024-49966, CVE-2024-49965, CVE-2024-49924, CVE-2024-49954, CVE-2024-49953, CVE-2024-49952, CVE-2024-49951, CVE-2024-49950, CVE-2024-49949, CVE-2024-49948, CVE-2024-49947, CVE-2024-49946, CVE-2024-49944, CVE-2024-49939, CVE-2024-49938, CVE-2024-49937, CVE-2024-49936, CVE-2024-49935, CVE-2024-49933, CVE-2024-49931, CVE-2024-49930, CVE-2024-49929, CVE-2024-49927, CVE-2024-49925, CVE-2024-49875, CVE-2024-49884, CVE-2024-49883, CVE-2024-49882, CVE-2024-49881, CVE-2024-49879, CVE-2024-49913, CVE-2024-49912, CVE-2024-49907, CVE-2024-49905, CVE-2024-49878, CVE-2024-49903, CVE-2024-49902, CVE-2024-49901, CVE-2024-49900, CVE-2024-49896, CVE-2024-49895, CVE-2024-49877, CVE-2024-49894, CVE-2024-49892, CVE-2024-49890, CVE-2024-49889, CVE-2024-49886, CVE-2024-49863, CVE-2024-49871, CVE-2024-49870, CVE-2024-49868, CVE-2024-49867, CVE-2024-49866, CVE-2024-49874, CVE-2024-49864, CVE-2024-47704, CVE-2024-50191, CVE-2024-50189, CVE-2024-50188, CVE-2024-50187, CVE-2024-50186, CVE-2024-50185, CVE-2024-50184, CVE-2024-50183, CVE-2024-50182, CVE-2024-50180, CVE-2024-50181, CVE-2024-50097, CVE-2024-50096, CVE-2024-50095, CVE-2024-50093, CVE-2024-50089, CVE-2024-50058, CVE-2024-50065, CVE-2024-50064, CVE-2024-50063, CVE-2024-50062, CVE-2024-50061, CVE-2024-50060, CVE-2024-50059, CVE-2024-50026, CVE-2024-50024, CVE-2024-50023, CVE-2024-50057, CVE-2024-50055, CVE-2024-50049, CVE-2024-50022, CVE-2024-50048, CVE-2024-50047, CVE-2024-50046, CVE-2024-50045, CVE-2024-50044, CVE-2024-50041, CVE-2024-50040, CVE-2024-50039, CVE-2024-50038, CVE-2024-50036, CVE-2024-50035, CVE-2024-50033, CVE-2024-50032, CVE-2024-50031, CVE-2024-50029, CVE-2024-50019, [CVE...
beta-4116.1.0
Changes since Beta 4081.1.0
Security fixes:
- Linux (CVE-2024-50179, CVE-2024-50176, CVE-2024-50175, CVE-2024-50012, CVE-2024-50008, CVE-2024-50007, CVE-2024-50006, CVE-2024-50005, CVE-2024-50016, CVE-2024-50015, CVE-2024-50013, CVE-2024-50003, CVE-2024-50002, CVE-2024-50001, CVE-2024-50000, CVE-2024-49997, CVE-2024-49996, CVE-2024-49995, CVE-2024-49955, CVE-2024-49963, CVE-2024-49962, CVE-2024-49961, CVE-2024-49960, CVE-2024-49959, CVE-2024-49993, CVE-2024-49992, CVE-2024-49991, CVE-2024-49989, CVE-2024-49988, CVE-2024-49987, CVE-2024-49986, CVE-2024-49985, CVE-2024-49958, CVE-2024-49983, CVE-2024-49982, CVE-2024-49981, CVE-2024-49980, CVE-2024-49978, CVE-2024-49977, CVE-2024-49976, CVE-2024-49975, CVE-2024-49957, CVE-2024-49973, CVE-2024-49969, CVE-2024-49967, CVE-2024-49966, CVE-2024-49965, CVE-2024-49924, CVE-2024-49954, CVE-2024-49953, CVE-2024-49952, CVE-2024-49951, CVE-2024-49950, CVE-2024-49949, CVE-2024-49948, CVE-2024-49947, CVE-2024-49946, CVE-2024-49944, CVE-2024-49939, CVE-2024-49938, CVE-2024-49937, CVE-2024-49936, CVE-2024-49935, CVE-2024-49933, CVE-2024-49931, CVE-2024-49930, CVE-2024-49929, CVE-2024-49927, CVE-2024-49925, CVE-2024-49875, CVE-2024-49884, CVE-2024-49883, CVE-2024-49882, CVE-2024-49881, CVE-2024-49879, CVE-2024-49913, CVE-2024-49912, CVE-2024-49907, CVE-2024-49905, CVE-2024-49878, CVE-2024-49903, CVE-2024-49902, CVE-2024-49901, CVE-2024-49900, CVE-2024-49896, CVE-2024-49895, CVE-2024-49877, CVE-2024-49894, CVE-2024-49892, CVE-2024-49890, CVE-2024-49889, CVE-2024-49886, CVE-2024-49863, CVE-2024-49871, CVE-2024-49870, CVE-2024-49868, CVE-2024-49867, CVE-2024-49866, CVE-2024-49874, CVE-2024-49864, CVE-2024-47704, CVE-2024-50191, CVE-2024-50189, CVE-2024-50188, CVE-2024-50187, CVE-2024-50186, CVE-2024-50185, CVE-2024-50184, CVE-2024-50183, CVE-2024-50182, CVE-2024-50180, CVE-2024-50181, CVE-2024-50097, CVE-2024-50096, CVE-2024-50095, CVE-2024-50093, CVE-2024-50089, CVE-2024-50058, CVE-2024-50065, CVE-2024-50064, CVE-2024-50063, CVE-2024-50062, CVE-2024-50061, CVE-2024-50060, CVE-2024-50059, CVE-2024-50026, CVE-2024-50024, CVE-2024-50023, CVE-2024-50057, CVE-2024-50055, CVE-2024-50049, CVE-2024-50022, CVE-2024-50048, CVE-2024-50047, CVE-2024-50046, CVE-2024-50045, CVE-2024-50044, CVE-2024-50041, CVE-2024-50040, CVE-2024-50039, CVE-2024-50038, CVE-2024-50036, CVE-2024-50035, CVE-2024-50033, CVE-2024-50032, CVE-2024-50031, CVE-2024-50029, CVE-2024-50019, [CVE-20...
alpha-4152.0.0
Changes since Alpha 4116.0.0
Security fixes:
- Linux (CVE-2024-50179, CVE-2024-50176, CVE-2024-50175, CVE-2024-50012, CVE-2024-50008, CVE-2024-50007, CVE-2024-50006, CVE-2024-50005, CVE-2024-50016, CVE-2024-50015, CVE-2024-50013, CVE-2024-50003, CVE-2024-50002, CVE-2024-50001, CVE-2024-50000, CVE-2024-49997, CVE-2024-49996, CVE-2024-49995, CVE-2024-49955, CVE-2024-49963, CVE-2024-49962, CVE-2024-49961, CVE-2024-49960, CVE-2024-49959, CVE-2024-49993, CVE-2024-49992, CVE-2024-49991, CVE-2024-49989, CVE-2024-49988, CVE-2024-49987, CVE-2024-49986, CVE-2024-49985, CVE-2024-49958, CVE-2024-49983, CVE-2024-49982, CVE-2024-49981, CVE-2024-49980, CVE-2024-49978, CVE-2024-49977, CVE-2024-49976, CVE-2024-49975, CVE-2024-49957, CVE-2024-49973, CVE-2024-49969, CVE-2024-49967, CVE-2024-49966, CVE-2024-49965, CVE-2024-49924, CVE-2024-49954, CVE-2024-49953, CVE-2024-49952, CVE-2024-49951, CVE-2024-49950, CVE-2024-49949, CVE-2024-49948, CVE-2024-49947, CVE-2024-49946, CVE-2024-49944, CVE-2024-49939, CVE-2024-49938, CVE-2024-49937, CVE-2024-49936, CVE-2024-49935, CVE-2024-49933, CVE-2024-49931, CVE-2024-49930, CVE-2024-49929, CVE-2024-49927, CVE-2024-49925, CVE-2024-49875, CVE-2024-49884, CVE-2024-49883, CVE-2024-49882, CVE-2024-49881, CVE-2024-49879, CVE-2024-49913, CVE-2024-49912, CVE-2024-49907, CVE-2024-49905, CVE-2024-49878, CVE-2024-49903, CVE-2024-49902, CVE-2024-49901, CVE-2024-49900, CVE-2024-49896, CVE-2024-49895, CVE-2024-49877, CVE-2024-49894, CVE-2024-49892, CVE-2024-49890, CVE-2024-49889, CVE-2024-49886, CVE-2024-49863, CVE-2024-49871, CVE-2024-49870, CVE-2024-49868, CVE-2024-49867, CVE-2024-49866, CVE-2024-49874, CVE-2024-49864, CVE-2024-47704, CVE-2024-50191, CVE-2024-50189, CVE-2024-50188, CVE-2024-50187, CVE-2024-50186, CVE-2024-50185, CVE-2024-50184, CVE-2024-50183, CVE-2024-50182, CVE-2024-50180, CVE-2024-50181, CVE-2024-50097, CVE-2024-50096, CVE-2024-50095, CVE-2024-50093, CVE-2024-50089, CVE-2024-50058, CVE-2024-50065, CVE-2024-50064, CVE-2024-50063, CVE-2024-50062, CVE-2024-50061, CVE-2024-50060, CVE-2024-50059, CVE-2024-50026, CVE-2024-50024, CVE-2024-50023, CVE-2024-50057, CVE-2024-50055, CVE-2024-50049, CVE-2024-50022, CVE-2024-50048, CVE-2024-50047, CVE-2024-50046, CVE-2024-50045, CVE-2024-50044, CVE-2024-50041, CVE-2024-50040, CVE-2024-50039, CVE-2024-50038, CVE-2024-50036, CVE-2024-50035, CVE-2024-50033, CVE-2024-50032, CVE-2024-50031, CVE-2024-50029, CVE-2024-50019, [CVE-2...
stable-3975.2.2
Changes since Stable 3975.2.1
Security fixes:
- Linux (CVE-2024-46711, CVE-2024-46709, CVE-2024-46680, CVE-2024-46679, CVE-2024-46678, CVE-2024-46677, CVE-2024-46676, CVE-2024-46695, CVE-2024-46694, CVE-2024-46693, CVE-2024-46675, CVE-2024-46692, CVE-2024-46689, CVE-2024-46687, CVE-2024-46686, CVE-2024-46685, CVE-2024-46673, CVE-2024-46674, CVE-2024-46811, CVE-2024-46810, CVE-2024-46809, CVE-2024-46807, CVE-2024-46806, CVE-2024-46805, CVE-2024-46804, CVE-2024-46821, CVE-2024-46819, CVE-2024-46818, CVE-2024-46817, CVE-2024-46815, CVE-2024-46814, CVE-2024-46812, CVE-2024-46802, CVE-2024-46803, CVE-2024-46724, CVE-2024-46732, CVE-2024-46731, CVE-2024-46728, CVE-2024-46726, CVE-2024-46725, CVE-2024-46723, CVE-2024-46722, CVE-2024-46721, CVE-2024-46720, CVE-2024-46719, CVE-2024-46717, CVE-2024-46716, CVE-2024-46714, CVE-2024-46715, CVE-2024-46831, CVE-2024-46840, CVE-2024-46839, CVE-2024-46838, CVE-2024-46836, CVE-2024-46835, CVE-2024-46848, CVE-2024-46847, CVE-2024-46846, CVE-2024-46845, CVE-2024-46844, CVE-2024-46843, CVE-2024-46832, CVE-2024-46830, CVE-2024-46829, CVE-2024-46828, CVE-2024-46827, CVE-2024-46826, CVE-2024-46825, CVE-2024-46822, CVE-2024-46788, CVE-2024-46797, CVE-2024-46796, CVE-2024-46795, CVE-2024-46794, CVE-2024-46791, CVE-2024-46800, CVE-2024-46798, CVE-2024-46760, CVE-2024-46768, CVE-2024-46767, CVE-2024-46765, CVE-2024-46763, CVE-2024-46787, CVE-2024-46786, CVE-2024-46785, CVE-2024-46784, CVE-2024-46783, CVE-2024-46782, CVE-2024-46781, CVE-2024-46780, CVE-2024-46762, CVE-2024-46777, CVE-2024-46776, CVE-2024-46773, CVE-2024-46771, CVE-2024-46770, CVE-2024-46761, CVE-2024-46743, CVE-2024-46742, CVE-2024-46741, CVE-2024-46740, CVE-2024-46739, CVE-2024-46738, CVE-2024-46737, CVE-2024-46759, CVE-2024-46758, CVE-2024-46757, CVE-2024-46756, CVE-2024-46755, CVE-2024-46736, CVE-2024-46752, CVE-2024-46750, CVE-2024-46749, CVE-2024-46747, CVE-2024-46746, CVE-2024-46745, CVE-2024-46744, CVE-2024-46734, CVE-2024-46735, CVE-2024-46713, CVE-2024-46858, CVE-2024-46857, CVE-2024-46855, CVE-2024-46854, CVE-2024-46853, CVE-2024-46852, CVE-2024-46865, CVE-2024-46864, CVE-2024-46861, CVE-2024-46860, CVE-2024-46859, CVE-2024-46849)
- expat (CVE-2024-45490)
Bug fixes:
- Equinix Metal: fixed race condition on 'mount' Ignition stage (scripts#2308)
- Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. (Flatcar#1514)
Changes:
- Azure, HyperV: Added daemons
kvp,vss, andfcopyfor better HyperV hypervisor integration with Flatcar guests (scripts#2309). - Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers (flatcar/scripts#2355)
Updates:
beta-4081.1.0
Changes since Beta 4054.1.0
Security fixes:
- Linux (CVE-2024-46711, CVE-2024-46709, CVE-2024-46680, CVE-2024-46679, CVE-2024-46678, CVE-2024-46677, CVE-2024-46676, CVE-2024-46695, CVE-2024-46694, CVE-2024-46693, CVE-2024-46675, CVE-2024-46692, CVE-2024-46689, CVE-2024-46687, CVE-2024-46686, CVE-2024-46685, CVE-2024-46673, CVE-2024-46674, CVE-2024-46811, CVE-2024-46810, CVE-2024-46809, CVE-2024-46807, CVE-2024-46806, CVE-2024-46805, CVE-2024-46804, CVE-2024-46821, CVE-2024-46819, CVE-2024-46818, CVE-2024-46817, CVE-2024-46815, CVE-2024-46814, CVE-2024-46812, CVE-2024-46802, CVE-2024-46803, CVE-2024-46724, CVE-2024-46732, CVE-2024-46731, CVE-2024-46728, CVE-2024-46726, CVE-2024-46725, CVE-2024-46723, CVE-2024-46722, CVE-2024-46721, CVE-2024-46720, CVE-2024-46719, CVE-2024-46717, CVE-2024-46716, CVE-2024-46714, CVE-2024-46715, CVE-2024-46831, CVE-2024-46840, CVE-2024-46839, CVE-2024-46838, CVE-2024-46836, CVE-2024-46835, CVE-2024-46848, CVE-2024-46847, CVE-2024-46846, CVE-2024-46845, CVE-2024-46844, CVE-2024-46843, CVE-2024-46832, CVE-2024-46830, CVE-2024-46829, CVE-2024-46828, CVE-2024-46827, CVE-2024-46826, CVE-2024-46825, CVE-2024-46822, CVE-2024-46788, CVE-2024-46797, CVE-2024-46796, CVE-2024-46795, CVE-2024-46794, CVE-2024-46791, CVE-2024-46800, CVE-2024-46798, CVE-2024-46760, CVE-2024-46768, CVE-2024-46767, CVE-2024-46765, CVE-2024-46763, CVE-2024-46787, CVE-2024-46786, CVE-2024-46785, CVE-2024-46784, CVE-2024-46783, CVE-2024-46782, CVE-2024-46781, CVE-2024-46780, CVE-2024-46762, CVE-2024-46777, CVE-2024-46776, CVE-2024-46773, CVE-2024-46771, CVE-2024-46770, CVE-2024-46761, CVE-2024-46743, CVE-2024-46742, CVE-2024-46741, CVE-2024-46740, CVE-2024-46739, CVE-2024-46738, CVE-2024-46737, CVE-2024-46759, CVE-2024-46758, CVE-2024-46757, CVE-2024-46756, CVE-2024-46755, CVE-2024-46736, CVE-2024-46752, CVE-2024-46750, CVE-2024-46749, CVE-2024-46747, CVE-2024-46746, CVE-2024-46745, CVE-2024-46744, CVE-2024-46734, CVE-2024-46735, CVE-2024-46713, CVE-2024-46858, CVE-2024-46857, CVE-2024-46855, CVE-2024-46854, CVE-2024-46853, CVE-2024-46852, CVE-2024-46865, CVE-2024-46864, CVE-2024-46861, CVE-2024-46860, CVE-2024-46859, CVE-2024-46849)
- curl (CVE-2024-7264)
- expat (CVE-2024-45490)
- linux-firmware (CVE-2023-31315)
- SDK: re2c (CVE-2022-23901)
Bug fixes:
- CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: (flatcar/scripts#2016)
- Fixed the initrd option in the QEMU launcher script. It was -R, but this was already taken by the read-only pflash option, so use -r instead. (scripts#2239)
- Equinix Metal: fixed race condition on 'mount' Ignition stage (scripts#2308)
- Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. ([#1514](https...
alpha-4116.0.0
Changes since Alpha 4081.0.0
Security fixes:
- Linux (CVE-2024-46711, CVE-2024-46709, CVE-2024-46680, CVE-2024-46679, CVE-2024-46678, CVE-2024-46677, CVE-2024-46676, CVE-2024-46695, CVE-2024-46694, CVE-2024-46693, CVE-2024-46675, CVE-2024-46692, CVE-2024-46689, CVE-2024-46687, CVE-2024-46686, CVE-2024-46685, CVE-2024-46673, CVE-2024-46674, CVE-2024-46811, CVE-2024-46810, CVE-2024-46809, CVE-2024-46807, CVE-2024-46806, CVE-2024-46805, CVE-2024-46804, CVE-2024-46821, CVE-2024-46819, CVE-2024-46818, CVE-2024-46817, CVE-2024-46815, CVE-2024-46814, CVE-2024-46812, CVE-2024-46802, CVE-2024-46803, CVE-2024-46724, CVE-2024-46732, CVE-2024-46731, CVE-2024-46728, CVE-2024-46726, CVE-2024-46725, CVE-2024-46723, CVE-2024-46722, CVE-2024-46721, CVE-2024-46720, CVE-2024-46719, CVE-2024-46717, CVE-2024-46716, CVE-2024-46714, CVE-2024-46715, CVE-2024-46831, CVE-2024-46840, CVE-2024-46839, CVE-2024-46838, CVE-2024-46836, CVE-2024-46835, CVE-2024-46848, CVE-2024-46847, CVE-2024-46846, CVE-2024-46845, CVE-2024-46844, CVE-2024-46843, CVE-2024-46832, CVE-2024-46830, CVE-2024-46829, CVE-2024-46828, CVE-2024-46827, CVE-2024-46826, CVE-2024-46825, CVE-2024-46822, CVE-2024-46788, CVE-2024-46797, CVE-2024-46796, CVE-2024-46795, CVE-2024-46794, CVE-2024-46791, CVE-2024-46800, CVE-2024-46798, CVE-2024-46760, CVE-2024-46768, CVE-2024-46767, CVE-2024-46765, CVE-2024-46763, CVE-2024-46787, CVE-2024-46786, CVE-2024-46785, CVE-2024-46784, CVE-2024-46783, CVE-2024-46782, CVE-2024-46781, CVE-2024-46780, CVE-2024-46762, CVE-2024-46777, CVE-2024-46776, CVE-2024-46773, CVE-2024-46771, CVE-2024-46770, CVE-2024-46761, CVE-2024-46743, CVE-2024-46742, CVE-2024-46741, CVE-2024-46740, CVE-2024-46739, CVE-2024-46738, CVE-2024-46737, CVE-2024-46759, CVE-2024-46758, CVE-2024-46757, CVE-2024-46756, CVE-2024-46755, CVE-2024-46736, CVE-2024-46752, CVE-2024-46750, CVE-2024-46749, CVE-2024-46747, CVE-2024-46746, CVE-2024-46745, CVE-2024-46744, CVE-2024-46734, CVE-2024-46735, CVE-2024-46713, CVE-2024-46858, CVE-2024-46857, CVE-2024-46855, CVE-2024-46854, CVE-2024-46853, CVE-2024-46852, CVE-2024-46865, CVE-2024-46864, CVE-2024-46861, CVE-2024-46860, CVE-2024-46859, CVE-2024-46849)
- Go (CVE-2024-34155, CVE-2024-34156, CVE-2024-34158)
- docker (CVE-2024-41110)
- etcd (CVE-2023-32082)
- expat (CVE-2024-45490)
- intel-microcode (CVE-2023-42667, CVE-2023-49141, CVE-2024-24853, CVE-2024-24980, CVE-2024-25939)
- libpcap (CVE-2023-7256, CVE-2024-8006)
- runc (CVE-2024-45310)
Bug fixes:
- CloudSigma: Disabled the new D...