Releases: flatcar/scripts
Releases · flatcar/scripts
lts-3510.3.6
Changes since LTS 3510.3.5
Security fixes:
- Linux (CVE-2024-42098, CVE-2024-42097, CVE-2024-42096, CVE-2024-42095, CVE-2024-42093, CVE-2024-42094, CVE-2024-42092, CVE-2024-42090, CVE-2024-42089, CVE-2024-42087, CVE-2024-42086, CVE-2024-42084, CVE-2024-42085, CVE-2024-42070, CVE-2024-42068, CVE-2024-42082, CVE-2024-42080, CVE-2024-42077, CVE-2024-42076, CVE-2023-52887, CVE-2024-41093, CVE-2024-41092, CVE-2024-41089, CVE-2024-41087, CVE-2024-41097, CVE-2024-41095, CVE-2024-41006, CVE-2024-41005, CVE-2024-41004, CVE-2024-41002, CVE-2024-41000, CVE-2024-40994, CVE-2024-40990, CVE-2024-40988, CVE-2024-40987, CVE-2024-40995, CVE-2024-40983, CVE-2024-40984, CVE-2024-40970, CVE-2024-40978, CVE-2024-40976, CVE-2024-40974, CVE-2024-40981, CVE-2024-40980, CVE-2024-40971, CVE-2024-40954, CVE-2024-40968, CVE-2024-40967, CVE-2024-40963, CVE-2024-40961, CVE-2024-40960, CVE-2024-40959, CVE-2024-40958, CVE-2024-40957, CVE-2024-40956, CVE-2024-40929, CVE-2024-40937, CVE-2024-40934, CVE-2024-40932, CVE-2024-40931, CVE-2024-40945, CVE-2024-40943, CVE-2024-40942, CVE-2024-40941, CVE-2024-40916, CVE-2024-40927, CVE-2024-40914, CVE-2024-40912, CVE-2024-39503, CVE-2024-39502, CVE-2024-39501, CVE-2024-39500, CVE-2024-39499, CVE-2024-40911, CVE-2024-40908, CVE-2024-40905, CVE-2024-40904, CVE-2024-40902, CVE-2024-40901, CVE-2024-39509, CVE-2024-39507, CVE-2024-39506, CVE-2024-39505, CVE-2024-39495, CVE-2024-42247, CVE-2024-42244, CVE-2024-42232, CVE-2024-42240, CVE-2024-42236, CVE-2024-42145, CVE-2024-42154, CVE-2024-42153, CVE-2024-42152, CVE-2024-42148, CVE-2024-42229, CVE-2024-42225, CVE-2024-42224, CVE-2024-42223, CVE-2024-42161, CVE-2024-42157, CVE-2024-42119, CVE-2024-42116, CVE-2024-42115, CVE-2024-42143, CVE-2024-42140, CVE-2024-42137, CVE-2024-42131, CVE-2024-42130, CVE-2024-42127, CVE-2024-42124, CVE-2024-42121, CVE-2024-42120, CVE-2024-42106, CVE-2024-42105, CVE-2024-42104, CVE-2024-42103, CVE-2024-42102, CVE-2024-42101, CVE-2024-42109, CVE-2024-41055, CVE-2024-41027, CVE-2024-41049, CVE-2024-41048, CVE-2024-41047, CVE-2024-41046, CVE-2024-41044, CVE-2024-41041, CVE-2024-41040, CVE-2024-41035, CVE-2024-41034, CVE-2024-41081, CVE-2024-41078, CVE-2024-41073, CVE-2024-41072, CVE-2024-41070, CVE-2024-41077, CVE-2024-41068, CVE-2024-41065, CVE-2024-41064, CVE-2024-41063, CVE-2024-41060, CVE-2024-41059, CVE-2024-41022, CVE-2024-41020, CVE-2024-41019, CVE-2024-41017, CVE-2024-41015, CVE-2024-41090, [CVE-2024-41...
alpha-4186.0.0
Changes since Alpha 4152.0.0
Security fixes:
- Linux (CVE-2024-53103, CVE-2024-53104, CVE-2024-53088, CVE-2024-53082, CVE-2024-53083, CVE-2024-53081, CVE-2024-53060, CVE-2024-53068, CVE-2024-53066, CVE-2024-53063, CVE-2024-53072, CVE-2024-53070, CVE-2024-53061, CVE-2024-50302, CVE-2024-50301, CVE-2024-50296, CVE-2024-50295, CVE-2024-50294, CVE-2024-50292, CVE-2024-50290, CVE-2024-50300, CVE-2024-50299, CVE-2024-50298, CVE-2024-50275, CVE-2024-50284, CVE-2024-50283, CVE-2024-50282, CVE-2024-50280, CVE-2024-50279, CVE-2024-50278, CVE-2024-50287, CVE-2024-50286, CVE-2024-50285, CVE-2024-50276, CVE-2024-50273, CVE-2024-50272, CVE-2024-50271, CVE-2024-50269, CVE-2024-50268, CVE-2024-50267, CVE-2024-50264, CVE-2024-50265, CVE-2024-53102, CVE-2024-53101, CVE-2024-53100, CVE-2024-53099, CVE-2024-53097, CVE-2024-53095, CVE-2024-53094, CVE-2024-53093, CVE-2024-53091, CVE-2024-53079, CVE-2024-53135, CVE-2024-53134, CVE-2024-53131, CVE-2024-53130, CVE-2024-53129, CVE-2024-53140, CVE-2024-53139, CVE-2024-53138, CVE-2024-53136, CVE-2024-53126, CVE-2024-53127, CVE-2024-53113, CVE-2024-53112, CVE-2024-53110, CVE-2024-53109, CVE-2024-53108, CVE-2024-53123, CVE-2024-53122, CVE-2024-53121, CVE-2024-53120, CVE-2024-53119, CVE-2024-53106)
- OpenSSL (CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535, CVE-2024-6119, CVE-2024-9143)
- expat (CVE-2024-50602)
- sssd (CVE-2023-3758)
- wget (CVE-2024-10524)
Bug fixes:
- Added qemu-guest-agent to ARM64 images (flatcar/flatcar#1593)
Changes:
- Additional GRUB modules are no longer installed for UEFI platforms to save space and also because they cannot be loaded with Secure Boot enabled. This does not affect existing installations.
- The GRUB modules on non-UEFI platforms are now compressed with xz rather than gzip to save even more space. This does not affect existing installations.
- The VFIO kernel modules are now also available in ARM64 builds. (flatcar/scripts#2484)
- Enabled the gtp kernel module. This is the GPRS Tunneling Protocol datapath for usage in telecoms scenarios. (flatcar/scripts#2504)
Updates:
- Linux (6.6.65 (includes 6.6.64, 6.6.63, 6.6.62, 6.6.61))
- Linux Firmware (20241210 (includes 20241110))
- OpenSSL (3.2.3)
- SDK: autoconf (2.72)
- SDK: cmake (3.30.5)
- SDK: libpng (1.6.44)
- SDK: perf (6.11.7)
- SDK: pkgcheck (0.10.32)
- SDK: portage (3.0.66.1)
- SDK: Go (1.22.10)
- azure: chrony (4.6.1)
- base, dev: azure-vm-utils (0.4.0)
- base, dev: bind (9.18.29)
- base, dev: bpftool (7.4.0)
- base, dev: btrfs-progs (6.11)
- base, dev: checkpolicy (3.7)
- base, dev: expat (2.6.4)
- base, dev: gawk (5.3.1)
- base, dev: gcc (14.2.1_p20241116)
- base, dev: iproute2 (6.11.0 (includes 6.10.0))
- base, dev: iputils (20240905)
- base, dev: json-c (0.18)
- base, dev: kexec-tools (2.0.29)
- base, dev: less (668)
- base, dev: libarchive (3.7.7)
- base, dev: libnetfilter_conntrack (1.1.0)
- base, dev: libnftnl (1.2.8)
- base, dev: libselinux (3.7)
- base, dev: libsepol (3.7)
- base, dev: libuv (1.49.2 (includes 1.49.1, 1.49.0))
- base, dev: libxml2 (2.12.8)
- base, dev: mokutil (0.7.2)
- b...
stable-4081.2.1
Changes since Stable 4081.2.0
Security fixes:
- Linux (CVE-2024-53103, CVE-2024-53104, CVE-2024-53088, CVE-2024-53082, CVE-2024-53083, CVE-2024-53081, CVE-2024-53060, CVE-2024-53068, CVE-2024-53066, CVE-2024-53063, CVE-2024-53072, CVE-2024-53070, CVE-2024-53061, CVE-2024-50302, CVE-2024-50301, CVE-2024-50296, CVE-2024-50295, CVE-2024-50294, CVE-2024-50292, CVE-2024-50290, CVE-2024-50300, CVE-2024-50299, CVE-2024-50298, CVE-2024-50275, CVE-2024-50284, CVE-2024-50283, CVE-2024-50282, CVE-2024-50280, CVE-2024-50279, CVE-2024-50278, CVE-2024-50287, CVE-2024-50286, CVE-2024-50285, CVE-2024-50276, CVE-2024-50273, CVE-2024-50272, CVE-2024-50271, CVE-2024-50269, CVE-2024-50268, CVE-2024-50267, CVE-2024-50264, CVE-2024-50265, CVE-2024-53102, CVE-2024-53101, CVE-2024-53100, CVE-2024-53099, CVE-2024-53097, CVE-2024-53095, CVE-2024-53094, CVE-2024-53093, CVE-2024-53091, CVE-2024-53079, CVE-2024-53135, CVE-2024-53134, CVE-2024-53131, CVE-2024-53130, CVE-2024-53129, CVE-2024-53140, CVE-2024-53139, CVE-2024-53138, CVE-2024-53136, CVE-2024-53126, CVE-2024-53127, CVE-2024-53113, CVE-2024-53112, CVE-2024-53110, CVE-2024-53109, CVE-2024-53108, CVE-2024-53123, CVE-2024-53122, CVE-2024-53121, CVE-2024-53120, CVE-2024-53119, CVE-2024-53106)
- OpenSSL (CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535, CVE-2024-6119, CVE-2024-9143)
Bug fixes:
- Added qemu-guest-agent to ARM64 images (flatcar/flatcar#1593)
Updates:
beta-4152.1.0
Changes since Beta 4116.1.0
Security fixes:
- Linux (CVE-2024-53103, CVE-2024-53104, CVE-2024-53088, CVE-2024-53082, CVE-2024-53083, CVE-2024-53081, CVE-2024-53060, CVE-2024-53068, CVE-2024-53066, CVE-2024-53063, CVE-2024-53072, CVE-2024-53070, CVE-2024-53061, CVE-2024-50302, CVE-2024-50301, CVE-2024-50296, CVE-2024-50295, CVE-2024-50294, CVE-2024-50292, CVE-2024-50290, CVE-2024-50300, CVE-2024-50299, CVE-2024-50298, CVE-2024-50275, CVE-2024-50284, CVE-2024-50283, CVE-2024-50282, CVE-2024-50280, CVE-2024-50279, CVE-2024-50278, CVE-2024-50287, CVE-2024-50286, CVE-2024-50285, CVE-2024-50276, CVE-2024-50273, CVE-2024-50272, CVE-2024-50271, CVE-2024-50269, CVE-2024-50268, CVE-2024-50267, CVE-2024-50264, CVE-2024-50265, CVE-2024-53102, CVE-2024-53101, CVE-2024-53100, CVE-2024-53099, CVE-2024-53097, CVE-2024-53095, CVE-2024-53094, CVE-2024-53093, CVE-2024-53091, CVE-2024-53079, CVE-2024-53135, CVE-2024-53134, CVE-2024-53131, CVE-2024-53130, CVE-2024-53129, CVE-2024-53140, CVE-2024-53139, CVE-2024-53138, CVE-2024-53136, CVE-2024-53126, CVE-2024-53127, CVE-2024-53113, CVE-2024-53112, CVE-2024-53110, CVE-2024-53109, CVE-2024-53108, CVE-2024-53123, CVE-2024-53122, CVE-2024-53121, CVE-2024-53120, CVE-2024-53119, CVE-2024-53106)
- OpenSSL (CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535, CVE-2024-6119, CVE-2024-9143)
- curl (CVE-2024-8096)
- libarchive (CVE-2024-26256, CVE-2024-48957, CVE-2024-48958)
- nvidia-drivers (CVE-2023-31022, CVE-2024-0074, CVE-2024-0075, CVE-2024-0078, CVE-2024-0126)
- openssh (CVE-2024-39894)
- sysext-podman: containers-common (CVE-2024-9341)
- sysext-podman: containers-image (CVE-2024-3727)
- sysext-podman: podman (CVE-2024-9407)
Bug fixes:
- Added qemu-guest-agent to ARM64 images (flatcar/flatcar#1593)
Changes:
- Added Proxmox Virtual Environment images (scripts#1783)
- The UEFI firmware has changed from raw (.fd) format to QCOW2 format. In addition, the amd64 firmware variables are now held in a 4MB image rather than a 2MB image. Note that this firmware is only intended for testing with QEMU. Do not use it in production. (scripts#2434)
- The arm64 UEFI firmware now supports Secure Boot. Be aware that this is not considered secure due to the lack of an SMM implementation, which is needed to protect the variable store. As above, this firmware should not be used in production anyway. (scripts#2434)
- grub 2.12-flatcar3: GRUB now includes many patches from Red Hat to support Secure Boot, as well as Flatcar's own patches. The version string includes a numbered "flatcar" suffix to track changes to these additional patches. This string can be seen in the GRUB menu. (scripts#2431)
Updates:
- Ignition (2.20.0)
- Linux (6.6.65 (includes 6.6.64, 6.6.63, 6.6.62, 6.6.61))
- Linux Firmware (20241017)
- OpenSSL (3.2.3)
- SDK: Go (1.22.9)
- SDK: catalyst (4.0.0)
- SDK: crossdev (20240921)
- SDK: edk2-bin (202408 (includes 202405, 202402, 202311, 202308, 202305, 202302, 202211, 202208, 202205))
- SDK: meson (1.5.2)
- SDK: rust (1.81.0)
- azure: chrony (4.6)
- base, dev: azure-vm-utils (0.3.0)
- base, dev: binutils-config (5.5.2)
- base, dev: btrfs-progs (6.10.1 (includes 6.10))
- base, dev: c-ares (1.33.1 (includes [1.33.0](htt...
stable-4081.2.0
Changes since Stable 3975.2.2
Security fixes:
- Linux (CVE-2024-50179, CVE-2024-50176, CVE-2024-50175, CVE-2024-50012, CVE-2024-50008, CVE-2024-50007, CVE-2024-50006, CVE-2024-50005, CVE-2024-50016, CVE-2024-50015, CVE-2024-50013, CVE-2024-50003, CVE-2024-50002, CVE-2024-50001, CVE-2024-50000, CVE-2024-49997, CVE-2024-49996, CVE-2024-49995, CVE-2024-49955, CVE-2024-49963, CVE-2024-49962, CVE-2024-49961, CVE-2024-49960, CVE-2024-49959, CVE-2024-49993, CVE-2024-49992, CVE-2024-49991, CVE-2024-49989, CVE-2024-49988, CVE-2024-49987, CVE-2024-49986, CVE-2024-49985, CVE-2024-49958, CVE-2024-49983, CVE-2024-49982, CVE-2024-49981, CVE-2024-49980, CVE-2024-49978, CVE-2024-49977, CVE-2024-49976, CVE-2024-49975, CVE-2024-49957, CVE-2024-49973, CVE-2024-49969, CVE-2024-49967, CVE-2024-49966, CVE-2024-49965, CVE-2024-49924, CVE-2024-49954, CVE-2024-49953, CVE-2024-49952, CVE-2024-49951, CVE-2024-49950, CVE-2024-49949, CVE-2024-49948, CVE-2024-49947, CVE-2024-49946, CVE-2024-49944, CVE-2024-49939, CVE-2024-49938, CVE-2024-49937, CVE-2024-49936, CVE-2024-49935, CVE-2024-49933, CVE-2024-49931, CVE-2024-49930, CVE-2024-49929, CVE-2024-49927, CVE-2024-49925, CVE-2024-49875, CVE-2024-49884, CVE-2024-49883, CVE-2024-49882, CVE-2024-49881, CVE-2024-49879, CVE-2024-49913, CVE-2024-49912, CVE-2024-49907, CVE-2024-49905, CVE-2024-49878, CVE-2024-49903, CVE-2024-49902, CVE-2024-49901, CVE-2024-49900, CVE-2024-49896, CVE-2024-49895, CVE-2024-49877, CVE-2024-49894, CVE-2024-49892, CVE-2024-49890, CVE-2024-49889, CVE-2024-49886, CVE-2024-49863, CVE-2024-49871, CVE-2024-49870, CVE-2024-49868, CVE-2024-49867, CVE-2024-49866, CVE-2024-49874, CVE-2024-49864, CVE-2024-47704, CVE-2024-50191, CVE-2024-50189, CVE-2024-50188, CVE-2024-50187, CVE-2024-50186, CVE-2024-50185, CVE-2024-50184, CVE-2024-50183, CVE-2024-50182, CVE-2024-50180, CVE-2024-50181, CVE-2024-50097, CVE-2024-50096, CVE-2024-50095, CVE-2024-50093, CVE-2024-50089, CVE-2024-50058, CVE-2024-50065, CVE-2024-50064, CVE-2024-50063, CVE-2024-50062, CVE-2024-50061, CVE-2024-50060, CVE-2024-50059, CVE-2024-50026, CVE-2024-50024, CVE-2024-50023, CVE-2024-50057, CVE-2024-50055, CVE-2024-50049, CVE-2024-50022, CVE-2024-50048, CVE-2024-50047, CVE-2024-50046, CVE-2024-50045, CVE-2024-50044, CVE-2024-50041, CVE-2024-50040, CVE-2024-50039, CVE-2024-50038, CVE-2024-50036, CVE-2024-50035, CVE-2024-50033, CVE-2024-50032, CVE-2024-50031, CVE-2024-50029, CVE-2024-50019, [CVE...
beta-4116.1.0
Changes since Beta 4081.1.0
Security fixes:
- Linux (CVE-2024-50179, CVE-2024-50176, CVE-2024-50175, CVE-2024-50012, CVE-2024-50008, CVE-2024-50007, CVE-2024-50006, CVE-2024-50005, CVE-2024-50016, CVE-2024-50015, CVE-2024-50013, CVE-2024-50003, CVE-2024-50002, CVE-2024-50001, CVE-2024-50000, CVE-2024-49997, CVE-2024-49996, CVE-2024-49995, CVE-2024-49955, CVE-2024-49963, CVE-2024-49962, CVE-2024-49961, CVE-2024-49960, CVE-2024-49959, CVE-2024-49993, CVE-2024-49992, CVE-2024-49991, CVE-2024-49989, CVE-2024-49988, CVE-2024-49987, CVE-2024-49986, CVE-2024-49985, CVE-2024-49958, CVE-2024-49983, CVE-2024-49982, CVE-2024-49981, CVE-2024-49980, CVE-2024-49978, CVE-2024-49977, CVE-2024-49976, CVE-2024-49975, CVE-2024-49957, CVE-2024-49973, CVE-2024-49969, CVE-2024-49967, CVE-2024-49966, CVE-2024-49965, CVE-2024-49924, CVE-2024-49954, CVE-2024-49953, CVE-2024-49952, CVE-2024-49951, CVE-2024-49950, CVE-2024-49949, CVE-2024-49948, CVE-2024-49947, CVE-2024-49946, CVE-2024-49944, CVE-2024-49939, CVE-2024-49938, CVE-2024-49937, CVE-2024-49936, CVE-2024-49935, CVE-2024-49933, CVE-2024-49931, CVE-2024-49930, CVE-2024-49929, CVE-2024-49927, CVE-2024-49925, CVE-2024-49875, CVE-2024-49884, CVE-2024-49883, CVE-2024-49882, CVE-2024-49881, CVE-2024-49879, CVE-2024-49913, CVE-2024-49912, CVE-2024-49907, CVE-2024-49905, CVE-2024-49878, CVE-2024-49903, CVE-2024-49902, CVE-2024-49901, CVE-2024-49900, CVE-2024-49896, CVE-2024-49895, CVE-2024-49877, CVE-2024-49894, CVE-2024-49892, CVE-2024-49890, CVE-2024-49889, CVE-2024-49886, CVE-2024-49863, CVE-2024-49871, CVE-2024-49870, CVE-2024-49868, CVE-2024-49867, CVE-2024-49866, CVE-2024-49874, CVE-2024-49864, CVE-2024-47704, CVE-2024-50191, CVE-2024-50189, CVE-2024-50188, CVE-2024-50187, CVE-2024-50186, CVE-2024-50185, CVE-2024-50184, CVE-2024-50183, CVE-2024-50182, CVE-2024-50180, CVE-2024-50181, CVE-2024-50097, CVE-2024-50096, CVE-2024-50095, CVE-2024-50093, CVE-2024-50089, CVE-2024-50058, CVE-2024-50065, CVE-2024-50064, CVE-2024-50063, CVE-2024-50062, CVE-2024-50061, CVE-2024-50060, CVE-2024-50059, CVE-2024-50026, CVE-2024-50024, CVE-2024-50023, CVE-2024-50057, CVE-2024-50055, CVE-2024-50049, CVE-2024-50022, CVE-2024-50048, CVE-2024-50047, CVE-2024-50046, CVE-2024-50045, CVE-2024-50044, CVE-2024-50041, CVE-2024-50040, CVE-2024-50039, CVE-2024-50038, CVE-2024-50036, CVE-2024-50035, CVE-2024-50033, CVE-2024-50032, CVE-2024-50031, CVE-2024-50029, CVE-2024-50019, [CVE-20...
alpha-4152.0.0
Changes since Alpha 4116.0.0
Security fixes:
- Linux (CVE-2024-50179, CVE-2024-50176, CVE-2024-50175, CVE-2024-50012, CVE-2024-50008, CVE-2024-50007, CVE-2024-50006, CVE-2024-50005, CVE-2024-50016, CVE-2024-50015, CVE-2024-50013, CVE-2024-50003, CVE-2024-50002, CVE-2024-50001, CVE-2024-50000, CVE-2024-49997, CVE-2024-49996, CVE-2024-49995, CVE-2024-49955, CVE-2024-49963, CVE-2024-49962, CVE-2024-49961, CVE-2024-49960, CVE-2024-49959, CVE-2024-49993, CVE-2024-49992, CVE-2024-49991, CVE-2024-49989, CVE-2024-49988, CVE-2024-49987, CVE-2024-49986, CVE-2024-49985, CVE-2024-49958, CVE-2024-49983, CVE-2024-49982, CVE-2024-49981, CVE-2024-49980, CVE-2024-49978, CVE-2024-49977, CVE-2024-49976, CVE-2024-49975, CVE-2024-49957, CVE-2024-49973, CVE-2024-49969, CVE-2024-49967, CVE-2024-49966, CVE-2024-49965, CVE-2024-49924, CVE-2024-49954, CVE-2024-49953, CVE-2024-49952, CVE-2024-49951, CVE-2024-49950, CVE-2024-49949, CVE-2024-49948, CVE-2024-49947, CVE-2024-49946, CVE-2024-49944, CVE-2024-49939, CVE-2024-49938, CVE-2024-49937, CVE-2024-49936, CVE-2024-49935, CVE-2024-49933, CVE-2024-49931, CVE-2024-49930, CVE-2024-49929, CVE-2024-49927, CVE-2024-49925, CVE-2024-49875, CVE-2024-49884, CVE-2024-49883, CVE-2024-49882, CVE-2024-49881, CVE-2024-49879, CVE-2024-49913, CVE-2024-49912, CVE-2024-49907, CVE-2024-49905, CVE-2024-49878, CVE-2024-49903, CVE-2024-49902, CVE-2024-49901, CVE-2024-49900, CVE-2024-49896, CVE-2024-49895, CVE-2024-49877, CVE-2024-49894, CVE-2024-49892, CVE-2024-49890, CVE-2024-49889, CVE-2024-49886, CVE-2024-49863, CVE-2024-49871, CVE-2024-49870, CVE-2024-49868, CVE-2024-49867, CVE-2024-49866, CVE-2024-49874, CVE-2024-49864, CVE-2024-47704, CVE-2024-50191, CVE-2024-50189, CVE-2024-50188, CVE-2024-50187, CVE-2024-50186, CVE-2024-50185, CVE-2024-50184, CVE-2024-50183, CVE-2024-50182, CVE-2024-50180, CVE-2024-50181, CVE-2024-50097, CVE-2024-50096, CVE-2024-50095, CVE-2024-50093, CVE-2024-50089, CVE-2024-50058, CVE-2024-50065, CVE-2024-50064, CVE-2024-50063, CVE-2024-50062, CVE-2024-50061, CVE-2024-50060, CVE-2024-50059, CVE-2024-50026, CVE-2024-50024, CVE-2024-50023, CVE-2024-50057, CVE-2024-50055, CVE-2024-50049, CVE-2024-50022, CVE-2024-50048, CVE-2024-50047, CVE-2024-50046, CVE-2024-50045, CVE-2024-50044, CVE-2024-50041, CVE-2024-50040, CVE-2024-50039, CVE-2024-50038, CVE-2024-50036, CVE-2024-50035, CVE-2024-50033, CVE-2024-50032, CVE-2024-50031, CVE-2024-50029, CVE-2024-50019, [CVE-2...
stable-3975.2.2
Changes since Stable 3975.2.1
Security fixes:
- Linux (CVE-2024-46711, CVE-2024-46709, CVE-2024-46680, CVE-2024-46679, CVE-2024-46678, CVE-2024-46677, CVE-2024-46676, CVE-2024-46695, CVE-2024-46694, CVE-2024-46693, CVE-2024-46675, CVE-2024-46692, CVE-2024-46689, CVE-2024-46687, CVE-2024-46686, CVE-2024-46685, CVE-2024-46673, CVE-2024-46674, CVE-2024-46811, CVE-2024-46810, CVE-2024-46809, CVE-2024-46807, CVE-2024-46806, CVE-2024-46805, CVE-2024-46804, CVE-2024-46821, CVE-2024-46819, CVE-2024-46818, CVE-2024-46817, CVE-2024-46815, CVE-2024-46814, CVE-2024-46812, CVE-2024-46802, CVE-2024-46803, CVE-2024-46724, CVE-2024-46732, CVE-2024-46731, CVE-2024-46728, CVE-2024-46726, CVE-2024-46725, CVE-2024-46723, CVE-2024-46722, CVE-2024-46721, CVE-2024-46720, CVE-2024-46719, CVE-2024-46717, CVE-2024-46716, CVE-2024-46714, CVE-2024-46715, CVE-2024-46831, CVE-2024-46840, CVE-2024-46839, CVE-2024-46838, CVE-2024-46836, CVE-2024-46835, CVE-2024-46848, CVE-2024-46847, CVE-2024-46846, CVE-2024-46845, CVE-2024-46844, CVE-2024-46843, CVE-2024-46832, CVE-2024-46830, CVE-2024-46829, CVE-2024-46828, CVE-2024-46827, CVE-2024-46826, CVE-2024-46825, CVE-2024-46822, CVE-2024-46788, CVE-2024-46797, CVE-2024-46796, CVE-2024-46795, CVE-2024-46794, CVE-2024-46791, CVE-2024-46800, CVE-2024-46798, CVE-2024-46760, CVE-2024-46768, CVE-2024-46767, CVE-2024-46765, CVE-2024-46763, CVE-2024-46787, CVE-2024-46786, CVE-2024-46785, CVE-2024-46784, CVE-2024-46783, CVE-2024-46782, CVE-2024-46781, CVE-2024-46780, CVE-2024-46762, CVE-2024-46777, CVE-2024-46776, CVE-2024-46773, CVE-2024-46771, CVE-2024-46770, CVE-2024-46761, CVE-2024-46743, CVE-2024-46742, CVE-2024-46741, CVE-2024-46740, CVE-2024-46739, CVE-2024-46738, CVE-2024-46737, CVE-2024-46759, CVE-2024-46758, CVE-2024-46757, CVE-2024-46756, CVE-2024-46755, CVE-2024-46736, CVE-2024-46752, CVE-2024-46750, CVE-2024-46749, CVE-2024-46747, CVE-2024-46746, CVE-2024-46745, CVE-2024-46744, CVE-2024-46734, CVE-2024-46735, CVE-2024-46713, CVE-2024-46858, CVE-2024-46857, CVE-2024-46855, CVE-2024-46854, CVE-2024-46853, CVE-2024-46852, CVE-2024-46865, CVE-2024-46864, CVE-2024-46861, CVE-2024-46860, CVE-2024-46859, CVE-2024-46849)
- expat (CVE-2024-45490)
Bug fixes:
- Equinix Metal: fixed race condition on 'mount' Ignition stage (scripts#2308)
- Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. (Flatcar#1514)
Changes:
- Azure, HyperV: Added daemons
kvp
,vss
, andfcopy
for better HyperV hypervisor integration with Flatcar guests (scripts#2309). - Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers (flatcar/scripts#2355)
Updates:
beta-4081.1.0
Changes since Beta 4054.1.0
Security fixes:
- Linux (CVE-2024-46711, CVE-2024-46709, CVE-2024-46680, CVE-2024-46679, CVE-2024-46678, CVE-2024-46677, CVE-2024-46676, CVE-2024-46695, CVE-2024-46694, CVE-2024-46693, CVE-2024-46675, CVE-2024-46692, CVE-2024-46689, CVE-2024-46687, CVE-2024-46686, CVE-2024-46685, CVE-2024-46673, CVE-2024-46674, CVE-2024-46811, CVE-2024-46810, CVE-2024-46809, CVE-2024-46807, CVE-2024-46806, CVE-2024-46805, CVE-2024-46804, CVE-2024-46821, CVE-2024-46819, CVE-2024-46818, CVE-2024-46817, CVE-2024-46815, CVE-2024-46814, CVE-2024-46812, CVE-2024-46802, CVE-2024-46803, CVE-2024-46724, CVE-2024-46732, CVE-2024-46731, CVE-2024-46728, CVE-2024-46726, CVE-2024-46725, CVE-2024-46723, CVE-2024-46722, CVE-2024-46721, CVE-2024-46720, CVE-2024-46719, CVE-2024-46717, CVE-2024-46716, CVE-2024-46714, CVE-2024-46715, CVE-2024-46831, CVE-2024-46840, CVE-2024-46839, CVE-2024-46838, CVE-2024-46836, CVE-2024-46835, CVE-2024-46848, CVE-2024-46847, CVE-2024-46846, CVE-2024-46845, CVE-2024-46844, CVE-2024-46843, CVE-2024-46832, CVE-2024-46830, CVE-2024-46829, CVE-2024-46828, CVE-2024-46827, CVE-2024-46826, CVE-2024-46825, CVE-2024-46822, CVE-2024-46788, CVE-2024-46797, CVE-2024-46796, CVE-2024-46795, CVE-2024-46794, CVE-2024-46791, CVE-2024-46800, CVE-2024-46798, CVE-2024-46760, CVE-2024-46768, CVE-2024-46767, CVE-2024-46765, CVE-2024-46763, CVE-2024-46787, CVE-2024-46786, CVE-2024-46785, CVE-2024-46784, CVE-2024-46783, CVE-2024-46782, CVE-2024-46781, CVE-2024-46780, CVE-2024-46762, CVE-2024-46777, CVE-2024-46776, CVE-2024-46773, CVE-2024-46771, CVE-2024-46770, CVE-2024-46761, CVE-2024-46743, CVE-2024-46742, CVE-2024-46741, CVE-2024-46740, CVE-2024-46739, CVE-2024-46738, CVE-2024-46737, CVE-2024-46759, CVE-2024-46758, CVE-2024-46757, CVE-2024-46756, CVE-2024-46755, CVE-2024-46736, CVE-2024-46752, CVE-2024-46750, CVE-2024-46749, CVE-2024-46747, CVE-2024-46746, CVE-2024-46745, CVE-2024-46744, CVE-2024-46734, CVE-2024-46735, CVE-2024-46713, CVE-2024-46858, CVE-2024-46857, CVE-2024-46855, CVE-2024-46854, CVE-2024-46853, CVE-2024-46852, CVE-2024-46865, CVE-2024-46864, CVE-2024-46861, CVE-2024-46860, CVE-2024-46859, CVE-2024-46849)
- curl (CVE-2024-7264)
- expat (CVE-2024-45490)
- linux-firmware (CVE-2023-31315)
- SDK: re2c (CVE-2022-23901)
Bug fixes:
- CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: (flatcar/scripts#2016)
- Fixed the initrd option in the QEMU launcher script. It was -R, but this was already taken by the read-only pflash option, so use -r instead. (scripts#2239)
- Equinix Metal: fixed race condition on 'mount' Ignition stage (scripts#2308)
- Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. ([#1514](https...
alpha-4116.0.0
Changes since Alpha 4081.0.0
Security fixes:
- Linux (CVE-2024-46711, CVE-2024-46709, CVE-2024-46680, CVE-2024-46679, CVE-2024-46678, CVE-2024-46677, CVE-2024-46676, CVE-2024-46695, CVE-2024-46694, CVE-2024-46693, CVE-2024-46675, CVE-2024-46692, CVE-2024-46689, CVE-2024-46687, CVE-2024-46686, CVE-2024-46685, CVE-2024-46673, CVE-2024-46674, CVE-2024-46811, CVE-2024-46810, CVE-2024-46809, CVE-2024-46807, CVE-2024-46806, CVE-2024-46805, CVE-2024-46804, CVE-2024-46821, CVE-2024-46819, CVE-2024-46818, CVE-2024-46817, CVE-2024-46815, CVE-2024-46814, CVE-2024-46812, CVE-2024-46802, CVE-2024-46803, CVE-2024-46724, CVE-2024-46732, CVE-2024-46731, CVE-2024-46728, CVE-2024-46726, CVE-2024-46725, CVE-2024-46723, CVE-2024-46722, CVE-2024-46721, CVE-2024-46720, CVE-2024-46719, CVE-2024-46717, CVE-2024-46716, CVE-2024-46714, CVE-2024-46715, CVE-2024-46831, CVE-2024-46840, CVE-2024-46839, CVE-2024-46838, CVE-2024-46836, CVE-2024-46835, CVE-2024-46848, CVE-2024-46847, CVE-2024-46846, CVE-2024-46845, CVE-2024-46844, CVE-2024-46843, CVE-2024-46832, CVE-2024-46830, CVE-2024-46829, CVE-2024-46828, CVE-2024-46827, CVE-2024-46826, CVE-2024-46825, CVE-2024-46822, CVE-2024-46788, CVE-2024-46797, CVE-2024-46796, CVE-2024-46795, CVE-2024-46794, CVE-2024-46791, CVE-2024-46800, CVE-2024-46798, CVE-2024-46760, CVE-2024-46768, CVE-2024-46767, CVE-2024-46765, CVE-2024-46763, CVE-2024-46787, CVE-2024-46786, CVE-2024-46785, CVE-2024-46784, CVE-2024-46783, CVE-2024-46782, CVE-2024-46781, CVE-2024-46780, CVE-2024-46762, CVE-2024-46777, CVE-2024-46776, CVE-2024-46773, CVE-2024-46771, CVE-2024-46770, CVE-2024-46761, CVE-2024-46743, CVE-2024-46742, CVE-2024-46741, CVE-2024-46740, CVE-2024-46739, CVE-2024-46738, CVE-2024-46737, CVE-2024-46759, CVE-2024-46758, CVE-2024-46757, CVE-2024-46756, CVE-2024-46755, CVE-2024-46736, CVE-2024-46752, CVE-2024-46750, CVE-2024-46749, CVE-2024-46747, CVE-2024-46746, CVE-2024-46745, CVE-2024-46744, CVE-2024-46734, CVE-2024-46735, CVE-2024-46713, CVE-2024-46858, CVE-2024-46857, CVE-2024-46855, CVE-2024-46854, CVE-2024-46853, CVE-2024-46852, CVE-2024-46865, CVE-2024-46864, CVE-2024-46861, CVE-2024-46860, CVE-2024-46859, CVE-2024-46849)
- Go (CVE-2024-34155, CVE-2024-34156, CVE-2024-34158)
- docker (CVE-2024-41110)
- etcd (CVE-2023-32082)
- expat (CVE-2024-45490)
- intel-microcode (CVE-2023-42667, CVE-2023-49141, CVE-2024-24853, CVE-2024-24980, CVE-2024-25939)
- libpcap (CVE-2023-7256, CVE-2024-8006)
- runc (CVE-2024-45310)
Bug fixes:
- CloudSigma: Disabled the new D...