diff --git a/data/releases/alpha/4593.0.0.yml b/data/releases/alpha/4593.0.0.yml new file mode 100644 index 00000000..bed49259 --- /dev/null +++ b/data/releases/alpha/4593.0.0.yml @@ -0,0 +1,186 @@ +architectures: +- amd64 +- arm64 +channel: alpha +github_release: + assets: [] + assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330007/assets + author: + avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4 + events_url: https://api.github.com/users/tormath1/events{/privacy} + followers_url: https://api.github.com/users/tormath1/followers + following_url: https://api.github.com/users/tormath1/following{/other_user} + gists_url: https://api.github.com/users/tormath1/gists{/gist_id} + gravatar_id: '' + html_url: https://github.com/tormath1 + id: 28657343 + login: tormath1 + node_id: MDQ6VXNlcjI4NjU3MzQz + organizations_url: https://api.github.com/users/tormath1/orgs + received_events_url: https://api.github.com/users/tormath1/received_events + repos_url: https://api.github.com/users/tormath1/repos + site_admin: false + starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo} + subscriptions_url: https://api.github.com/users/tormath1/subscriptions + type: User + url: https://api.github.com/users/tormath1 + user_view_type: public + body: "_Changes since **Alpha 4547.0.0**_\r\n\r\n#### Security fixes:\r\n\r\n- Linux\ + \ ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\ + \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\ + \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\ + \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\ + \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\ + \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\ + \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\ + \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\ + \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\ + \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\ + \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\ + \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\ + \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\ + \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\ + \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\ + \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\ + \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\ + \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\ + \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\ + \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\ + \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\ + \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\ + \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\ + \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\ + \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\ + \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\ + \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\ + \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\ + \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\ + \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\ + \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\ + \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\ + \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\ + \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\ + \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\ + \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\ + \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\ + \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\ + \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\ + \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\ + \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\ + \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\ + \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\ + \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\ + \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\ + \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\ + \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\ + \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\ + \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\ + \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\ + \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\ + \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\ + \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\ + \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\ + \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\ + \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\ + \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\ + \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\ + \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\ + \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\ + \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\ + \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\ + \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\ + \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\ + \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\ + \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\ + \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\ + \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\ + \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\ + \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\ + \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\ + \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\ + \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\ + \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\ + \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\ + \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\ + \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\ + \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\ + \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\ + \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\ + \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\ + \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\ + \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\ + \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\ + \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\ + \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\ + \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\ + \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\ + \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\ + \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\ + \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\ + \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\ + \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\ + \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\ + \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\ + \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\ + \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\ + \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\ + \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- gnupg\ + \ ([CVE-2025-68972](https://www.cve.org/CVERecord/?id=CVE-2025-68972), [CVE-2025-68973](https://www.cve.org/CVERecord/?id=CVE-2025-68973),\ + \ [gnupg-20251228-notdash](https://gpg.fail/notdash))\r\n- openssl ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\ + \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\ + \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\ + \ [CVE-2025-15469](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469),\ + \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\ + \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\ + \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\ + \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\ + \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\ + \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\ + \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\ + \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\ + \n\r\n\r\n#### Changes:\r\n\r\n- Dropped Ciphers, MACs, and KexAlgorithms from\ + \ the sshd configuration so that the OpenSSH upstream defaults are used. This\ + \ introduces post-quantum key exchange algorithms for better security. ([Flatcar#1921](https://github.com/flatcar/Flatcar/issues/1921)).\ + \ Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable\ + \ this by deploying a custom drop-in config to `/etc/ssh/sshd_config.d/`.\r\n\ + - Enabled netkit module ([scripts#3524](https://github.com/flatcar/scripts/pull/3524))\r\ + \n\r\n#### Updates:\r\n\r\n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\ + \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\ + \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\ + \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\ + \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62)))\r\ + \n- base, dev: gnupg ([2.5.16](https://lists.gnupg.org/pipermail/gnupg-announce/2025q4/000500.html)\ + \ (includes [2.5](https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00005.html)))\r\ + \n- base, dev: libgpg-error ([1.57](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob_plain;f=NEWS;h=52ac1464a0c0af091a3d69e8c5f2f3afa2cc3c9f;hb=39d7b85a7d69975f1dfec5a0add10b4d57dcfc9e))\r\ + \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\ + \n- dracut ([109](https://github.com/dracut-ng/dracut-ng/releases/tag/109) (includes\ + \ [108](https://github.com/dracut-ng/dracut-ng/releases/tag/108), [107](https://github.com/dracut-ng/dracut-ng/releases/tag/107)))\r\ + \n- etcdctl ([3.5.18](https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md#v3518-2025-01-24))\r\ + \n- sysext-podman: gpgme ([2.0.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=1fd34dbd9143829e9163d402ab0191a9fc6adab2;hb=e4adebe020b07bc47e583817576ce98ca93e9711))\r\ + \n- openssl ([3.5.5](https://github.com/openssl/openssl/releases/tag/openssl-3.5.5))\r\ + \n- sysext-python: python ([3.12.12](https://www.python.org/downloads/release/python-31212/)\ + \ (includes [3.12.0](https://www.python.org/downloads/release/python-3120/)))" + created_at: '2026-01-23T13:53:51Z' + draft: false + html_url: https://github.com/flatcar/scripts/releases/tag/alpha-4593.0.0 + id: 280330007 + immutable: false + name: '' + node_id: RE_kwDOB2MTHs4QtX8X + prerelease: false + published_at: '2026-01-27T14:41:25Z' + tag_name: alpha-4593.0.0 + tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/alpha-4593.0.0 + target_commitish: main + updated_at: '2026-01-27T14:41:25Z' + upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330007/assets{?name,label} + url: https://api.github.com/repos/flatcar/scripts/releases/280330007 + zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/alpha-4593.0.0 +image_packages: + containerd: 2.1.5 + docker: 28.0.4 + ignition: 2.24.0 + kernel: 6.12.66 + systemd: '257' +release: 4593.0.0 +version: 4593.0.0 diff --git a/data/releases/alpha/current.yml b/data/releases/alpha/current.yml index b8e1fce1..4e82fb1f 100644 --- a/data/releases/alpha/current.yml +++ b/data/releases/alpha/current.yml @@ -4,167 +4,183 @@ architectures: channel: alpha github_release: assets: [] - assets_url: https://api.github.com/repos/flatcar/scripts/releases/271479737/assets + assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330007/assets author: - avatar_url: https://avatars.githubusercontent.com/u/1449761?v=4 - events_url: https://api.github.com/users/danzatt/events{/privacy} - followers_url: https://api.github.com/users/danzatt/followers - following_url: https://api.github.com/users/danzatt/following{/other_user} - gists_url: https://api.github.com/users/danzatt/gists{/gist_id} + avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4 + events_url: https://api.github.com/users/tormath1/events{/privacy} + followers_url: https://api.github.com/users/tormath1/followers + following_url: https://api.github.com/users/tormath1/following{/other_user} + gists_url: https://api.github.com/users/tormath1/gists{/gist_id} gravatar_id: '' - html_url: https://github.com/danzatt - id: 1449761 - login: danzatt - node_id: MDQ6VXNlcjE0NDk3NjE= - organizations_url: https://api.github.com/users/danzatt/orgs - received_events_url: https://api.github.com/users/danzatt/received_events - repos_url: https://api.github.com/users/danzatt/repos + html_url: https://github.com/tormath1 + id: 28657343 + login: tormath1 + node_id: MDQ6VXNlcjI4NjU3MzQz + organizations_url: https://api.github.com/users/tormath1/orgs + received_events_url: https://api.github.com/users/tormath1/received_events + repos_url: https://api.github.com/users/tormath1/repos site_admin: false - starred_url: https://api.github.com/users/danzatt/starred{/owner}{/repo} - subscriptions_url: https://api.github.com/users/danzatt/subscriptions + starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo} + subscriptions_url: https://api.github.com/users/tormath1/subscriptions type: User - url: https://api.github.com/users/danzatt + url: https://api.github.com/users/tormath1 user_view_type: public - body: "_Changes since **Alpha 4515.0.1**_\r\n \r\n #### Security fixes:\r\n \r\n\ - \ - Linux ([CVE-2025-40275](https://nvd.nist.gov/vuln/detail/CVE-2025-40275),\ - \ [CVE-2025-40274](https://nvd.nist.gov/vuln/detail/CVE-2025-40274), [CVE-2025-40273](https://nvd.nist.gov/vuln/detail/CVE-2025-40273),\ - \ [CVE-2025-40272](https://nvd.nist.gov/vuln/detail/CVE-2025-40272), [CVE-2025-40271](https://nvd.nist.gov/vuln/detail/CVE-2025-40271),\ - \ [CVE-2025-40289](https://nvd.nist.gov/vuln/detail/CVE-2025-40289), [CVE-2025-40288](https://nvd.nist.gov/vuln/detail/CVE-2025-40288),\ - \ [CVE-2025-40287](https://nvd.nist.gov/vuln/detail/CVE-2025-40287), [CVE-2025-40269](https://nvd.nist.gov/vuln/detail/CVE-2025-40269),\ - \ [CVE-2025-40286](https://nvd.nist.gov/vuln/detail/CVE-2025-40286), [CVE-2025-40285](https://nvd.nist.gov/vuln/detail/CVE-2025-40285),\ - \ [CVE-2025-40284](https://nvd.nist.gov/vuln/detail/CVE-2025-40284), [CVE-2025-40283](https://nvd.nist.gov/vuln/detail/CVE-2025-40283),\ - \ [CVE-2025-40282](https://nvd.nist.gov/vuln/detail/CVE-2025-40282), [CVE-2025-40281](https://nvd.nist.gov/vuln/detail/CVE-2025-40281),\ - \ [CVE-2025-40280](https://nvd.nist.gov/vuln/detail/CVE-2025-40280), [CVE-2025-40279](https://nvd.nist.gov/vuln/detail/CVE-2025-40279),\ - \ [CVE-2025-40278](https://nvd.nist.gov/vuln/detail/CVE-2025-40278), [CVE-2025-40277](https://nvd.nist.gov/vuln/detail/CVE-2025-40277),\ - \ [CVE-2025-40268](https://nvd.nist.gov/vuln/detail/CVE-2025-40268), [CVE-2025-40214](https://nvd.nist.gov/vuln/detail/CVE-2025-40214),\ - \ [CVE-2025-40212](https://nvd.nist.gov/vuln/detail/CVE-2025-40212), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087),\ - \ [CVE-2024-57879](https://nvd.nist.gov/vuln/detail/CVE-2024-57879), [CVE-2024-57880](https://nvd.nist.gov/vuln/detail/CVE-2024-57880),\ - \ [CVE-2024-55642](https://nvd.nist.gov/vuln/detail/CVE-2024-55642), [CVE-2024-55641](https://nvd.nist.gov/vuln/detail/CVE-2024-55641),\ - \ [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683),\ - \ [CVE-2024-54460](https://nvd.nist.gov/vuln/detail/CVE-2024-54460), [CVE-2024-54191](https://nvd.nist.gov/vuln/detail/CVE-2024-54191),\ - \ [CVE-2024-53689](https://nvd.nist.gov/vuln/detail/CVE-2024-53689), [CVE-2024-53682](https://nvd.nist.gov/vuln/detail/CVE-2024-53682),\ - \ [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770),\ - \ [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660),\ - \ [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658),\ - \ [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56656](https://nvd.nist.gov/vuln/detail/CVE-2024-56656),\ - \ [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675),\ - \ [CVE-2024-56674](https://nvd.nist.gov/vuln/detail/CVE-2024-56674), [CVE-2024-56673](https://nvd.nist.gov/vuln/detail/CVE-2024-56673),\ - \ [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654),\ - \ [CVE-2024-56671](https://nvd.nist.gov/vuln/detail/CVE-2024-56671), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670),\ - \ [CVE-2024-56669](https://nvd.nist.gov/vuln/detail/CVE-2024-56669), [CVE-2024-56668](https://nvd.nist.gov/vuln/detail/CVE-2024-56668),\ - \ [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56666](https://nvd.nist.gov/vuln/detail/CVE-2024-56666),\ - \ [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664),\ - \ [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662),\ - \ [CVE-2024-56652](https://nvd.nist.gov/vuln/detail/CVE-2024-56652), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653),\ - \ [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240),\ - \ [CVE-2025-40261](https://nvd.nist.gov/vuln/detail/CVE-2025-40261), [CVE-2025-40266](https://nvd.nist.gov/vuln/detail/CVE-2025-40266),\ - \ [CVE-2025-40264](https://nvd.nist.gov/vuln/detail/CVE-2025-40264), [CVE-2025-40263](https://nvd.nist.gov/vuln/detail/CVE-2025-40263),\ - \ [CVE-2025-40262](https://nvd.nist.gov/vuln/detail/CVE-2025-40262), [CVE-2025-40254](https://nvd.nist.gov/vuln/detail/CVE-2025-40254),\ - \ [CVE-2025-40253](https://nvd.nist.gov/vuln/detail/CVE-2025-40253), [CVE-2025-40252](https://nvd.nist.gov/vuln/detail/CVE-2025-40252),\ - \ [CVE-2025-40251](https://nvd.nist.gov/vuln/detail/CVE-2025-40251), [CVE-2025-40250](https://nvd.nist.gov/vuln/detail/CVE-2025-40250),\ - \ [CVE-2025-40259](https://nvd.nist.gov/vuln/detail/CVE-2025-40259), [CVE-2025-40258](https://nvd.nist.gov/vuln/detail/CVE-2025-40258),\ - \ [CVE-2025-40257](https://nvd.nist.gov/vuln/detail/CVE-2025-40257), [CVE-2025-40246](https://nvd.nist.gov/vuln/detail/CVE-2025-40246),\ - \ [CVE-2025-40248](https://nvd.nist.gov/vuln/detail/CVE-2025-40248), [CVE-2025-40345](https://nvd.nist.gov/vuln/detail/CVE-2025-40345))\r\ - \n - coreutils ([CVE-2025-5278](https://www.cve.org/CVERecord?id=CVE-2025-5278))\r\ - \n - go ([CVE-2025-47912](https://www.cve.org/CVERecord?id=CVE-2025-47912), [CVE-2025-58183](https://www.cve.org/CVERecord?id=CVE-2025-58183),\ - \ [CVE-2025-58185](https://www.cve.org/CVERecord?id=CVE-2025-58185), [CVE-2025-58186](https://www.cve.org/CVERecord?id=CVE-2025-58186),\ - \ [CVE-2025-58187](https://www.cve.org/CVERecord?id=CVE-2025-58187), [CVE-2025-58188](https://www.cve.org/CVERecord?id=CVE-2025-58188),\ - \ [CVE-2025-58189](https://www.cve.org/CVERecord?id=CVE-2025-58189), [CVE-2025-61723](https://www.cve.org/CVERecord?id=CVE-2025-61723),\ - \ [CVE-2025-61724](https://www.cve.org/CVERecord?id=CVE-2025-61724), [CVE-2025-61725](https://www.cve.org/CVERecord?id=CVE-2025-61725))\r\ - \n - pam ([CVE-2024-22365](https://nvd.nist.gov/vuln/detail/CVE-2024-22365), [CVE-2024-10041](https://nvd.nist.gov/vuln/detail/CVE-2024-10041),\ - \ [CVE-2024-10963](https://nvd.nist.gov/vuln/detail/CVE-2024-10963), [CVE-2025-6020](https://nvd.nist.gov/vuln/detail/CVE-2025-6020))\r\ - \n \r\n #### Bug fixes:\r\n \r\n - Dropped debug symbols from containerd, incus,\ - \ and overlaybd system extensions to reduce download size.\r\n \r\n #### Changes:\r\ - \n \r\n - `/etc/shadow`, `/etc/gshadow` are now owned by the `shadow` group, `/usr/bin/unix_chkpwd`,\ - \ `/usr/bin/chage` and `/usr/bin/expiry` are now also owned by the `shadow` group\ - \ with a sticky bit enabled.\r\n \r\n #### Updates:\r\n \r\n- Linux ([6.12.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61)\ - \ (includes [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59),\ - \ [6.12.60](https://lwn.net/Articles/1048757)))\r\n- Linux firmware ([20251125](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251125)\ - \ (includes [20251111](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251111)))\r\ - \n- base, dev: btrfs-progs ([6.17](https://github.com/kdave/btrfs-progs/releases/tag/v6.17))\r\ - \n- base, dev: cifs-utils ([7.4](https://lwn.net/Articles/1024956/))\r\n- base,\ - \ dev: coreutils ([9.8](https://lists.gnu.org/archive/html/info-gnu/2025-09/msg00005.html))\r\ - \n- base, dev: hwdata ([0.400](https://github.com/vcrhonek/hwdata/releases/tag/v0.400)\ - \ (includes [0.399](https://github.com/vcrhonek/hwdata/releases/tag/v0.399)))\r\ - \n- base, dev: inih ([62](https://github.com/benhoyt/inih/releases/tag/r62) (includes\ - \ [61](https://github.com/benhoyt/inih/releases/tag/r61)))\r\n- base, dev: intel-microcode\ - \ ([20251111_p20251112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111))\r\ - \n- base, dev: iproute2 ([6.17.0](https://lore.kernel.org/all/20250929095042.48200315@hermes.local/))\r\ - \n- base, dev: jose ([14](https://github.com/latchset/jose/releases/tag/v14) (includes\ - \ [13](https://github.com/latchset/jose/releases/tag/v13)))\r\n- base, dev: kbd\ - \ ([2.9.0](https://github.com/legionus/kbd/releases/tag/v2.9.0))\r\n- base, dev:\ - \ less ([685](https://greenwoodsoftware.com/less/news.685.html))\r\n- base, dev:\ - \ libgpg-error ([1.56](https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.56))\r\ - \n- base, dev: libtirpc ([1.3.7](https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-7))\r\ - \n- base, dev: openssl ([3.5.4](https://github.com/openssl/openssl/releases/tag/openssl-3.5.4)\ - \ (includes [3.5.0](https://github.com/openssl/openssl/releases/tag/openssl-3.5.0),\ - \ [3.5.1](https://github.com/openssl/openssl/releases/tag/openssl-3.5.1), [3.5.2](https://github.com/openssl/openssl/releases/tag/openssl-3.5.2),\ - \ [3.5.3](https://github.com/openssl/openssl/releases/tag/openssl-3.5.3)))\r\n\ - - base, dev: pam ([1.7.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.1)\ - \ (includes [1.6.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0),\ - \ [1.6.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.1), [1.7.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.0)))\r\ - \n- base, dev: pambase ([20251013](https://gitweb.gentoo.org/proj/pambase.git/log/?h=pambase-20251013))\r\ - \n- base, dev: samba ([4.22.5](https://www.samba.org/samba/history/samba-4.22.5.html)\ - \ (includes [4.22.4](https://www.samba.org/samba/history/samba-4.22.4.html)))\r\ - \n- base, dev: strace ([6.17](https://github.com/strace/strace/releases/tag/v6.17))\r\ - \n- base, dev: thin-provisioning-tools ([1.3.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.3.0/CHANGES)\ - \ (includes [1.0.11](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.11/CHANGES),\ - \ [1.0.12](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.12/CHANGES),\ - \ [1.0.13](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.13/CHANGES),\ - \ [1.0.14](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.14/CHANGES),\ - \ [1.1.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.1.0/CHANGES),\ - \ [1.2.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.0/CHANGES),\ - \ [1.2.1](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.1/CHANGES),\ - \ [1.2.2](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.2/CHANGES)))\r\ - \n- base, dev: util-linux ([2.41.2](https://github.com/util-linux/util-linux/blob/v2.41.2/Documentation/releases/v2.41.2-ReleaseNotes))\r\ - \n- ca-certificates ([3.119](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html)\ - \ (includes [3.118.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html)))\r\ - \n- dev: portage ([3.0.69.3](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.3)\ - \ (includes [3.0.69](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69),\ - \ [3.0.69.1](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.1),\ - \ [3.0.69.2](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.2)))\r\ - \n- ignition ([2.24.0](https://coreos.github.io/ignition/release-notes/#ignition-2240-2024-10-14))\r\ - \n- sdk: cmake ([4.1.2](https://cmake.org/cmake/help/v4.1/release/4.1.html#id22)\ - \ (includes [4.0](https://cmake.org/cmake/help/v4.0/release/4.0.html), [4.1](https://cmake.org/cmake/help/v4.1/release/4.1.html),\ - \ [4.1.1](https://cmake.org/cmake/help/v4.1/release/4.1.html#id21)))\r\n- sdk:\ - \ go ([1.25.3](https://go.dev/doc/devel/release#go1.25.minor))\r\n- sdk: meson\ - \ ([1.9.1](https://mesonbuild.com/Release-notes-for-1-9-0.html) (includes [1.8.0](https://mesonbuild.com/Release-notes-for-1-8-0.html)))\r\ - \n- sdk: nasm ([3.01](https://www.nasm.us/docs/3.01/nasmac.html) (includes [3.00](https://www.nasm.us/docs/3.00/nasmac.html)))\r\ - \n- sysext-overlaybd: overlaybd ([1.0.16](https://github.com/containerd/overlaybd/releases/tag/v1.0.16))\r\ - \n- sysext-podman: aardvark-dns ([1.15.0](https://github.com/containers/aardvark-dns/releases/tag/v1.15.0))\r\ - \n- sysext-podman: netavark ([1.16.1](https://github.com/containers/netavark/releases/tag/v1.16.1)\ - \ (includes [1.16.0](https://github.com/containers/netavark/releases/tag/v1.16.0)))\r\ - \n- sysext-python: more-itertools ([10.8.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.8.0))\r\ - \n- sysext-python: platformdirs ([4.5.0](https://github.com/tox-dev/platformdirs/releases/tag/4.5.0))\r\ - \n- sysext-python: resolvelib ([1.2.1](https://raw.githubusercontent.com/sarugaku/resolvelib/refs/tags/1.2.1/CHANGELOG.rst))\r\ - \n- sysext-python: rich ([14.2.0](https://github.com/Textualize/rich/releases/tag/v14.2.0))\r\ - \n- sysext-python: setuptools-scm ([9.2.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.2.0)\ - \ (includes [9.0.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.0.0),\ - \ [9.1.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.1.0)))\r\n- sysext-python:\ - \ trove-classifiers ([2025.9.11.17](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.11.17)\ - \ (includes [2025.9.8.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.8.13),\ - \ 2025.9.9.12))" - created_at: '2025-12-15T17:45:26Z' + body: "_Changes since **Alpha 4547.0.0**_\r\n\r\n#### Security fixes:\r\n\r\n- Linux\ + \ ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\ + \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\ + \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\ + \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\ + \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\ + \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\ + \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\ + \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\ + \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\ + \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\ + \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\ + \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\ + \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\ + \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\ + \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\ + \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\ + \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\ + \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\ + \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\ + \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\ + \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\ + \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\ + \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\ + \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\ + \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\ + \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\ + \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\ + \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\ + \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\ + \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\ + \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\ + \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\ + \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\ + \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\ + \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\ + \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\ + \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\ + \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\ + \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\ + \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\ + \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\ + \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\ + \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\ + \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\ + \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\ + \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\ + \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\ + \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\ + \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\ + \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\ + \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\ + \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\ + \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\ + \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\ + \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\ + \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\ + \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\ + \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\ + \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\ + \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\ + \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\ + \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\ + \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\ + \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\ + \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\ + \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\ + \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\ + \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\ + \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\ + \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\ + \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\ + \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\ + \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\ + \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\ + \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\ + \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\ + \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\ + \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\ + \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\ + \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\ + \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\ + \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\ + \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\ + \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\ + \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\ + \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\ + \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\ + \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\ + \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\ + \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\ + \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\ + \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\ + \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\ + \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\ + \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\ + \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\ + \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\ + \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\ + \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- gnupg\ + \ ([CVE-2025-68972](https://www.cve.org/CVERecord/?id=CVE-2025-68972), [CVE-2025-68973](https://www.cve.org/CVERecord/?id=CVE-2025-68973),\ + \ [gnupg-20251228-notdash](https://gpg.fail/notdash))\r\n- openssl ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\ + \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\ + \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\ + \ [CVE-2025-15469](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469),\ + \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\ + \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\ + \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\ + \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\ + \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\ + \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\ + \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\ + \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\ + \n\r\n\r\n#### Changes:\r\n\r\n- Dropped Ciphers, MACs, and KexAlgorithms from\ + \ the sshd configuration so that the OpenSSH upstream defaults are used. This\ + \ introduces post-quantum key exchange algorithms for better security. ([Flatcar#1921](https://github.com/flatcar/Flatcar/issues/1921)).\ + \ Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable\ + \ this by deploying a custom drop-in config to `/etc/ssh/sshd_config.d/`.\r\n\ + - Enabled netkit module ([scripts#3524](https://github.com/flatcar/scripts/pull/3524))\r\ + \n\r\n#### Updates:\r\n\r\n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\ + \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\ + \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\ + \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\ + \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62)))\r\ + \n- base, dev: gnupg ([2.5.16](https://lists.gnupg.org/pipermail/gnupg-announce/2025q4/000500.html)\ + \ (includes [2.5](https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00005.html)))\r\ + \n- base, dev: libgpg-error ([1.57](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob_plain;f=NEWS;h=52ac1464a0c0af091a3d69e8c5f2f3afa2cc3c9f;hb=39d7b85a7d69975f1dfec5a0add10b4d57dcfc9e))\r\ + \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\ + \n- dracut ([109](https://github.com/dracut-ng/dracut-ng/releases/tag/109) (includes\ + \ [108](https://github.com/dracut-ng/dracut-ng/releases/tag/108), [107](https://github.com/dracut-ng/dracut-ng/releases/tag/107)))\r\ + \n- etcdctl ([3.5.18](https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md#v3518-2025-01-24))\r\ + \n- sysext-podman: gpgme ([2.0.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=1fd34dbd9143829e9163d402ab0191a9fc6adab2;hb=e4adebe020b07bc47e583817576ce98ca93e9711))\r\ + \n- openssl ([3.5.5](https://github.com/openssl/openssl/releases/tag/openssl-3.5.5))\r\ + \n- sysext-python: python ([3.12.12](https://www.python.org/downloads/release/python-31212/)\ + \ (includes [3.12.0](https://www.python.org/downloads/release/python-3120/)))" + created_at: '2026-01-23T13:53:51Z' draft: false - html_url: https://github.com/flatcar/scripts/releases/tag/alpha-4547.0.0 - id: 271479737 + html_url: https://github.com/flatcar/scripts/releases/tag/alpha-4593.0.0 + id: 280330007 immutable: false - name: alpha-4547.0.0 - node_id: RE_kwDOB2MTHs4QLnO5 + name: '' + node_id: RE_kwDOB2MTHs4QtX8X prerelease: false - published_at: '2025-12-18T15:22:47Z' - tag_name: alpha-4547.0.0 - tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/alpha-4547.0.0 + published_at: '2026-01-27T14:41:25Z' + tag_name: alpha-4593.0.0 + tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/alpha-4593.0.0 target_commitish: main - updated_at: '2025-12-18T15:22:47Z' - upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/271479737/assets{?name,label} - url: https://api.github.com/repos/flatcar/scripts/releases/271479737 - zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/alpha-4547.0.0 + updated_at: '2026-01-27T14:41:25Z' + upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330007/assets{?name,label} + url: https://api.github.com/repos/flatcar/scripts/releases/280330007 + zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/alpha-4593.0.0 image_packages: containerd: 2.1.5 docker: 28.0.4 ignition: 2.24.0 - kernel: 6.12.61 + kernel: 6.12.66 systemd: '257' release: current -version: 4547.0.0 +version: 4593.0.0 diff --git a/data/releases/beta/4547.1.0.yml b/data/releases/beta/4547.1.0.yml new file mode 100644 index 00000000..e6a40f45 --- /dev/null +++ b/data/releases/beta/4547.1.0.yml @@ -0,0 +1,248 @@ +architectures: +- amd64 +- arm64 +channel: beta +github_release: + assets: [] + assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330266/assets + author: + avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4 + events_url: https://api.github.com/users/tormath1/events{/privacy} + followers_url: https://api.github.com/users/tormath1/followers + following_url: https://api.github.com/users/tormath1/following{/other_user} + gists_url: https://api.github.com/users/tormath1/gists{/gist_id} + gravatar_id: '' + html_url: https://github.com/tormath1 + id: 28657343 + login: tormath1 + node_id: MDQ6VXNlcjI4NjU3MzQz + organizations_url: https://api.github.com/users/tormath1/orgs + received_events_url: https://api.github.com/users/tormath1/received_events + repos_url: https://api.github.com/users/tormath1/repos + site_admin: false + starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo} + subscriptions_url: https://api.github.com/users/tormath1/subscriptions + type: User + url: https://api.github.com/users/tormath1 + user_view_type: public + body: "_Changes since **Beta 4515.1.0**_\r\n\r\n#### Security fixes:\r\n\r\n- Linux\ + \ ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\ + \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\ + \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\ + \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\ + \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\ + \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\ + \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\ + \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\ + \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\ + \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\ + \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\ + \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\ + \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\ + \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\ + \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\ + \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\ + \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\ + \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\ + \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\ + \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\ + \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\ + \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\ + \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\ + \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\ + \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\ + \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\ + \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\ + \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\ + \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\ + \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\ + \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\ + \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\ + \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\ + \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\ + \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\ + \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\ + \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\ + \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\ + \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\ + \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\ + \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\ + \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\ + \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\ + \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\ + \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\ + \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\ + \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\ + \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\ + \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\ + \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\ + \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\ + \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\ + \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\ + \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\ + \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\ + \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\ + \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\ + \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\ + \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\ + \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\ + \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\ + \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\ + \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\ + \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\ + \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\ + \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\ + \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\ + \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\ + \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\ + \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\ + \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\ + \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\ + \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\ + \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\ + \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\ + \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\ + \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\ + \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\ + \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\ + \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\ + \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\ + \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\ + \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\ + \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\ + \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\ + \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\ + \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\ + \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\ + \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\ + \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\ + \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\ + \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\ + \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\ + \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\ + \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\ + \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\ + \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\ + \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\ + \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- coreutils\ + \ ([CVE-2025-5278](https://www.cve.org/CVERecord?id=CVE-2025-5278))\r\n- go ([CVE-2025-47912](https://www.cve.org/CVERecord?id=CVE-2025-47912),\ + \ [CVE-2025-58183](https://www.cve.org/CVERecord?id=CVE-2025-58183), [CVE-2025-58185](https://www.cve.org/CVERecord?id=CVE-2025-58185),\ + \ [CVE-2025-58186](https://www.cve.org/CVERecord?id=CVE-2025-58186), [CVE-2025-58187](https://www.cve.org/CVERecord?id=CVE-2025-58187),\ + \ [CVE-2025-58188](https://www.cve.org/CVERecord?id=CVE-2025-58188), [CVE-2025-58189](https://www.cve.org/CVERecord?id=CVE-2025-58189),\ + \ [CVE-2025-61723](https://www.cve.org/CVERecord?id=CVE-2025-61723), [CVE-2025-61724](https://www.cve.org/CVERecord?id=CVE-2025-61724),\ + \ [CVE-2025-61725](https://www.cve.org/CVERecord?id=CVE-2025-61725))\r\n- pam\ + \ ([CVE-2024-22365](https://nvd.nist.gov/vuln/detail/CVE-2024-22365), [CVE-2024-10041](https://nvd.nist.gov/vuln/detail/CVE-2024-10041),\ + \ [CVE-2024-10963](https://nvd.nist.gov/vuln/detail/CVE-2024-10963), [CVE-2025-6020](https://nvd.nist.gov/vuln/detail/CVE-2025-6020))\r\ + \n- openssl ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\ + \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\ + \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\ + \ [CVE-2025-15469](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469),\ + \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\ + \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\ + \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\ + \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\ + \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\ + \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\ + \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\ + \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\ + \n\r\n\r\n#### Bug fixes:\r\n\r\n- Dropped debug symbols from containerd, incus,\ + \ and overlaybd system extensions to reduce download size.\r\n\r\n#### Changes:\r\ + \n\r\n- Dropped Ciphers, MACs, and KexAlgorithms from the sshd configuration so\ + \ that the OpenSSH upstream defaults are used. This introduces post-quantum key\ + \ exchange algorithms for better security. ([Flatcar#1921](https://github.com/flatcar/Flatcar/issues/1921)).\ + \ Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable\ + \ this by deploying a custom drop-in config to `/etc/ssh/sshd_config.d/`.\r\n\ + - `/etc/shadow`, `/etc/gshadow` are now owned by the `shadow` group, `/usr/bin/unix_chkpwd`,\ + \ `/usr/bin/chage` and `/usr/bin/expiry` are now also owned by the `shadow` group\ + \ with a sticky bit enabled.\r\n\r\n#### Updates:\r\n\r\n- Ignition ([2.24.0](https://coreos.github.io/ignition/release-notes/#ignition-2240-2024-10-14))\r\ + \n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\ + \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\ + \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\ + \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\ + \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62),\ + \ [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59)))\r\ + \n- Linux Firmware ([20251125](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251125)\ + \ (includes [20251111](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251111)))\r\ + \n- SDK: cmake ([4.1.2](https://cmake.org/cmake/help/v4.1/release/4.1.html#id22)\ + \ (includes [4.1.1](https://cmake.org/cmake/help/v4.1/release/4.1.html#id21),\ + \ [4.1](https://cmake.org/cmake/help/v4.1/release/4.1.html), [4.0](https://cmake.org/cmake/help/v4.0/release/4.0.html)))\r\ + \n- SDK: go ([1.25.3](https://go.dev/doc/devel/release#go1.25.minor))\r\n- SDK:\ + \ meson ([1.9.1](https://mesonbuild.com/Release-notes-for-1-9-0.html) (includes\ + \ [1.8.0](https://mesonbuild.com/Release-notes-for-1-8-0.html)))\r\n- SDK: nasm\ + \ ([3.01](https://www.nasm.us/docs/3.01/nasmac.html) (includes [3.00](https://www.nasm.us/docs/3.00/nasmac.html)))\r\ + \n- base, dev: btrfs-progs ([6.17](https://github.com/kdave/btrfs-progs/releases/tag/v6.17))\r\ + \n- base, dev: cifs-utils ([7.4](https://lwn.net/Articles/1024956/))\r\n- base,\ + \ dev: coreutils ([9.8](https://lists.gnu.org/archive/html/info-gnu/2025-09/msg00005.html))\r\ + \n- base, dev: hwdata ([0.400](https://github.com/vcrhonek/hwdata/releases/tag/v0.400)\ + \ (includes [0.399](https://github.com/vcrhonek/hwdata/releases/tag/v0.399)))\r\ + \n- base, dev: inih ([62](https://github.com/benhoyt/inih/releases/tag/r62) (includes\ + \ [61](https://github.com/benhoyt/inih/releases/tag/r61)))\r\n- base, dev: intel-microcode\ + \ ([20251111_p20251112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111))\r\ + \n- base, dev: iproute2 ([6.17.0](https://lore.kernel.org/all/20250929095042.48200315@hermes.local/))\r\ + \n- base, dev: jose ([14](https://github.com/latchset/jose/releases/tag/v14) (includes\ + \ [13](https://github.com/latchset/jose/releases/tag/v13)))\r\n- base, dev: kbd\ + \ ([2.9.0](https://github.com/legionus/kbd/releases/tag/v2.9.0))\r\n- base, dev:\ + \ less ([685](https://greenwoodsoftware.com/less/news.685.html))\r\n- base, dev:\ + \ libgpg-error ([1.56](https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.56))\r\ + \n- base, dev: libtirpc ([1.3.7](https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-7))\r\ + \n- base, dev: pam ([1.7.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.1)\ + \ (includes [1.7.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.0),\ + \ [1.6.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.1), [1.6.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0)))\r\ + \n- base, dev: pambase ([20251013](https://gitweb.gentoo.org/proj/pambase.git/log/?h=pambase-20251013))\r\ + \n- base, dev: samba ([4.22.5](https://www.samba.org/samba/history/samba-4.22.5.html)\ + \ (includes [4.22.4](https://www.samba.org/samba/history/samba-4.22.4.html)))\r\ + \n- base, dev: strace ([6.17](https://github.com/strace/strace/releases/tag/v6.17))\r\ + \n- base, dev: thin-provisioning-tools ([1.3.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.3.0/CHANGES)\ + \ (includes [1.2.2](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.2/CHANGES),\ + \ [1.2.1](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.1/CHANGES),\ + \ [1.2.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.0/CHANGES),\ + \ [1.1.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.1.0/CHANGES),\ + \ [1.0.14](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.14/CHANGES),\ + \ [1.0.13](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.13/CHANGES),\ + \ [1.0.12](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.12/CHANGES),\ + \ [1.0.11](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.11/CHANGES)))\r\ + \n- base, dev: util-linux ([2.41.2](https://github.com/util-linux/util-linux/blob/v2.41.2/Documentation/releases/v2.41.2-ReleaseNotes))\r\ + \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\ + \n- dev: portage ([3.0.69.3](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.3)\ + \ (includes [3.0.69.2](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.2),\ + \ [3.0.69.1](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.1),\ + \ [3.0.69](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69)))\r\ + \n- sysext-overlaybd: overlaybd ([1.0.16](https://github.com/containerd/overlaybd/releases/tag/v1.0.16))\r\ + \n- sysext-podman: aardvark-dns ([1.15.0](https://github.com/containers/aardvark-dns/releases/tag/v1.15.0))\r\ + \n- sysext-podman: netavark ([1.16.1](https://github.com/containers/netavark/releases/tag/v1.16.1)\ + \ (includes [1.16.0](https://github.com/containers/netavark/releases/tag/v1.16.0)))\r\ + \n- sysext-python: more-itertools ([10.8.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.8.0))\r\ + \n- sysext-python: platformdirs ([4.5.0](https://github.com/tox-dev/platformdirs/releases/tag/4.5.0))\r\ + \n- sysext-python: resolvelib ([1.2.1](https://raw.githubusercontent.com/sarugaku/resolvelib/refs/tags/1.2.1/CHANGELOG.rst))\r\ + \n- sysext-python: rich ([14.2.0](https://github.com/Textualize/rich/releases/tag/v14.2.0))\r\ + \n- sysext-python: setuptools-scm ([9.2.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.2.0)\ + \ (includes [9.1.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.1.0),\ + \ [9.0.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.0.0)))\r\n- sysext-python:\ + \ trove-classifiers ([2025.9.11.17](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.11.17)\ + \ (includes [2025.9.9.12](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.9.12),\ + \ [2025.9.8.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.8.13)))\r\ + \n- openssl ([3.5.5](https://github.com/openssl/openssl/releases/tag/openssl-3.5.5))" + created_at: '2026-01-23T13:55:34Z' + draft: false + html_url: https://github.com/flatcar/scripts/releases/tag/beta-4547.1.0 + id: 280330266 + immutable: false + name: '' + node_id: RE_kwDOB2MTHs4QtYAa + prerelease: false + published_at: '2026-01-27T14:42:03Z' + tag_name: beta-4547.1.0 + tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/beta-4547.1.0 + target_commitish: main + updated_at: '2026-01-27T14:42:03Z' + upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330266/assets{?name,label} + url: https://api.github.com/repos/flatcar/scripts/releases/280330266 + zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/beta-4547.1.0 +image_packages: + containerd: 2.1.5 + docker: 28.0.4 + ignition: 2.24.0 + kernel: 6.12.66 + systemd: '257' +release: 4547.1.0 +version: 4547.1.0 diff --git a/data/releases/beta/current.yml b/data/releases/beta/current.yml index 64d3a8e4..9e8efc95 100644 --- a/data/releases/beta/current.yml +++ b/data/releases/beta/current.yml @@ -4,279 +4,245 @@ architectures: channel: beta github_release: assets: [] - assets_url: https://api.github.com/repos/flatcar/scripts/releases/271478085/assets + assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330266/assets author: - avatar_url: https://avatars.githubusercontent.com/u/1449761?v=4 - events_url: https://api.github.com/users/danzatt/events{/privacy} - followers_url: https://api.github.com/users/danzatt/followers - following_url: https://api.github.com/users/danzatt/following{/other_user} - gists_url: https://api.github.com/users/danzatt/gists{/gist_id} + avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4 + events_url: https://api.github.com/users/tormath1/events{/privacy} + followers_url: https://api.github.com/users/tormath1/followers + following_url: https://api.github.com/users/tormath1/following{/other_user} + gists_url: https://api.github.com/users/tormath1/gists{/gist_id} gravatar_id: '' - html_url: https://github.com/danzatt - id: 1449761 - login: danzatt - node_id: MDQ6VXNlcjE0NDk3NjE= - organizations_url: https://api.github.com/users/danzatt/orgs - received_events_url: https://api.github.com/users/danzatt/received_events - repos_url: https://api.github.com/users/danzatt/repos + html_url: https://github.com/tormath1 + id: 28657343 + login: tormath1 + node_id: MDQ6VXNlcjI4NjU3MzQz + organizations_url: https://api.github.com/users/tormath1/orgs + received_events_url: https://api.github.com/users/tormath1/received_events + repos_url: https://api.github.com/users/tormath1/repos site_admin: false - starred_url: https://api.github.com/users/danzatt/starred{/owner}{/repo} - subscriptions_url: https://api.github.com/users/danzatt/subscriptions + starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo} + subscriptions_url: https://api.github.com/users/tormath1/subscriptions type: User - url: https://api.github.com/users/danzatt + url: https://api.github.com/users/tormath1 user_view_type: public - body: "_Changes since **Alpha 4515.0.1**_\r\n \r\n #### Security fixes:\r\n \r\n\ - \ - Linux ([CVE-2025-40275](https://nvd.nist.gov/vuln/detail/CVE-2025-40275),\ - \ [CVE-2025-40274](https://nvd.nist.gov/vuln/detail/CVE-2025-40274), [CVE-2025-40273](https://nvd.nist.gov/vuln/detail/CVE-2025-40273),\ - \ [CVE-2025-40272](https://nvd.nist.gov/vuln/detail/CVE-2025-40272), [CVE-2025-40271](https://nvd.nist.gov/vuln/detail/CVE-2025-40271),\ - \ [CVE-2025-40289](https://nvd.nist.gov/vuln/detail/CVE-2025-40289), [CVE-2025-40288](https://nvd.nist.gov/vuln/detail/CVE-2025-40288),\ - \ [CVE-2025-40287](https://nvd.nist.gov/vuln/detail/CVE-2025-40287), [CVE-2025-40269](https://nvd.nist.gov/vuln/detail/CVE-2025-40269),\ - \ [CVE-2025-40286](https://nvd.nist.gov/vuln/detail/CVE-2025-40286), [CVE-2025-40285](https://nvd.nist.gov/vuln/detail/CVE-2025-40285),\ - \ [CVE-2025-40284](https://nvd.nist.gov/vuln/detail/CVE-2025-40284), [CVE-2025-40283](https://nvd.nist.gov/vuln/detail/CVE-2025-40283),\ - \ [CVE-2025-40282](https://nvd.nist.gov/vuln/detail/CVE-2025-40282), [CVE-2025-40281](https://nvd.nist.gov/vuln/detail/CVE-2025-40281),\ - \ [CVE-2025-40280](https://nvd.nist.gov/vuln/detail/CVE-2025-40280), [CVE-2025-40279](https://nvd.nist.gov/vuln/detail/CVE-2025-40279),\ - \ [CVE-2025-40278](https://nvd.nist.gov/vuln/detail/CVE-2025-40278), [CVE-2025-40277](https://nvd.nist.gov/vuln/detail/CVE-2025-40277),\ - \ [CVE-2025-40268](https://nvd.nist.gov/vuln/detail/CVE-2025-40268), [CVE-2025-40214](https://nvd.nist.gov/vuln/detail/CVE-2025-40214),\ - \ [CVE-2025-40212](https://nvd.nist.gov/vuln/detail/CVE-2025-40212), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087),\ - \ [CVE-2024-57879](https://nvd.nist.gov/vuln/detail/CVE-2024-57879), [CVE-2024-57880](https://nvd.nist.gov/vuln/detail/CVE-2024-57880),\ - \ [CVE-2024-55642](https://nvd.nist.gov/vuln/detail/CVE-2024-55642), [CVE-2024-55641](https://nvd.nist.gov/vuln/detail/CVE-2024-55641),\ - \ [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683),\ - \ [CVE-2024-54460](https://nvd.nist.gov/vuln/detail/CVE-2024-54460), [CVE-2024-54191](https://nvd.nist.gov/vuln/detail/CVE-2024-54191),\ - \ [CVE-2024-53689](https://nvd.nist.gov/vuln/detail/CVE-2024-53689), [CVE-2024-53682](https://nvd.nist.gov/vuln/detail/CVE-2024-53682),\ - \ [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770),\ - \ [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660),\ - \ [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658),\ - \ [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56656](https://nvd.nist.gov/vuln/detail/CVE-2024-56656),\ - \ [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675),\ - \ [CVE-2024-56674](https://nvd.nist.gov/vuln/detail/CVE-2024-56674), [CVE-2024-56673](https://nvd.nist.gov/vuln/detail/CVE-2024-56673),\ - \ [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654),\ - \ [CVE-2024-56671](https://nvd.nist.gov/vuln/detail/CVE-2024-56671), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670),\ - \ [CVE-2024-56669](https://nvd.nist.gov/vuln/detail/CVE-2024-56669), [CVE-2024-56668](https://nvd.nist.gov/vuln/detail/CVE-2024-56668),\ - \ [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56666](https://nvd.nist.gov/vuln/detail/CVE-2024-56666),\ - \ [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664),\ - \ [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662),\ - \ [CVE-2024-56652](https://nvd.nist.gov/vuln/detail/CVE-2024-56652), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653),\ - \ [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240),\ - \ [CVE-2025-40261](https://nvd.nist.gov/vuln/detail/CVE-2025-40261), [CVE-2025-40266](https://nvd.nist.gov/vuln/detail/CVE-2025-40266),\ - \ [CVE-2025-40264](https://nvd.nist.gov/vuln/detail/CVE-2025-40264), [CVE-2025-40263](https://nvd.nist.gov/vuln/detail/CVE-2025-40263),\ - \ [CVE-2025-40262](https://nvd.nist.gov/vuln/detail/CVE-2025-40262), [CVE-2025-40254](https://nvd.nist.gov/vuln/detail/CVE-2025-40254),\ - \ [CVE-2025-40253](https://nvd.nist.gov/vuln/detail/CVE-2025-40253), [CVE-2025-40252](https://nvd.nist.gov/vuln/detail/CVE-2025-40252),\ - \ [CVE-2025-40251](https://nvd.nist.gov/vuln/detail/CVE-2025-40251), [CVE-2025-40250](https://nvd.nist.gov/vuln/detail/CVE-2025-40250),\ - \ [CVE-2025-40259](https://nvd.nist.gov/vuln/detail/CVE-2025-40259), [CVE-2025-40258](https://nvd.nist.gov/vuln/detail/CVE-2025-40258),\ - \ [CVE-2025-40257](https://nvd.nist.gov/vuln/detail/CVE-2025-40257), [CVE-2025-40246](https://nvd.nist.gov/vuln/detail/CVE-2025-40246),\ - \ [CVE-2025-40248](https://nvd.nist.gov/vuln/detail/CVE-2025-40248), [CVE-2025-40345](https://nvd.nist.gov/vuln/detail/CVE-2025-40345))\r\ - \n \r\n \r\n #### Updates:\r\n\r\n- Linux ([6.12.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61)\ - \ (includes [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59),\ - \ [6.12.60](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60)))\r\ - \n- ca-certificates ([3.119](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html)\ - \ (includes [3.118.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html)))\r\ - \n\r\n _Changes since **Beta 4459.1.2**_\r\n \r\n #### Security fixes:\r\n \r\n\ - \ - Linux ([CVE-2025-40275](https://nvd.nist.gov/vuln/detail/CVE-2025-40275),\ - \ [CVE-2025-40274](https://nvd.nist.gov/vuln/detail/CVE-2025-40274), [CVE-2025-40273](https://nvd.nist.gov/vuln/detail/CVE-2025-40273),\ - \ [CVE-2025-40272](https://nvd.nist.gov/vuln/detail/CVE-2025-40272), [CVE-2025-40271](https://nvd.nist.gov/vuln/detail/CVE-2025-40271),\ - \ [CVE-2025-40289](https://nvd.nist.gov/vuln/detail/CVE-2025-40289), [CVE-2025-40288](https://nvd.nist.gov/vuln/detail/CVE-2025-40288),\ - \ [CVE-2025-40287](https://nvd.nist.gov/vuln/detail/CVE-2025-40287), [CVE-2025-40269](https://nvd.nist.gov/vuln/detail/CVE-2025-40269),\ - \ [CVE-2025-40286](https://nvd.nist.gov/vuln/detail/CVE-2025-40286), [CVE-2025-40285](https://nvd.nist.gov/vuln/detail/CVE-2025-40285),\ - \ [CVE-2025-40284](https://nvd.nist.gov/vuln/detail/CVE-2025-40284), [CVE-2025-40283](https://nvd.nist.gov/vuln/detail/CVE-2025-40283),\ - \ [CVE-2025-40282](https://nvd.nist.gov/vuln/detail/CVE-2025-40282), [CVE-2025-40281](https://nvd.nist.gov/vuln/detail/CVE-2025-40281),\ - \ [CVE-2025-40280](https://nvd.nist.gov/vuln/detail/CVE-2025-40280), [CVE-2025-40279](https://nvd.nist.gov/vuln/detail/CVE-2025-40279),\ - \ [CVE-2025-40278](https://nvd.nist.gov/vuln/detail/CVE-2025-40278), [CVE-2025-40277](https://nvd.nist.gov/vuln/detail/CVE-2025-40277),\ - \ [CVE-2025-40268](https://nvd.nist.gov/vuln/detail/CVE-2025-40268), [CVE-2025-40214](https://nvd.nist.gov/vuln/detail/CVE-2025-40214),\ - \ [CVE-2025-40212](https://nvd.nist.gov/vuln/detail/CVE-2025-40212), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087),\ - \ [CVE-2024-57879](https://nvd.nist.gov/vuln/detail/CVE-2024-57879), [CVE-2024-57880](https://nvd.nist.gov/vuln/detail/CVE-2024-57880),\ - \ [CVE-2024-55642](https://nvd.nist.gov/vuln/detail/CVE-2024-55642), [CVE-2024-55641](https://nvd.nist.gov/vuln/detail/CVE-2024-55641),\ - \ [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683),\ - \ [CVE-2024-54460](https://nvd.nist.gov/vuln/detail/CVE-2024-54460), [CVE-2024-54191](https://nvd.nist.gov/vuln/detail/CVE-2024-54191),\ - \ [CVE-2024-53689](https://nvd.nist.gov/vuln/detail/CVE-2024-53689), [CVE-2024-53682](https://nvd.nist.gov/vuln/detail/CVE-2024-53682),\ - \ [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770),\ - \ [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660),\ - \ [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658),\ - \ [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56656](https://nvd.nist.gov/vuln/detail/CVE-2024-56656),\ - \ [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675),\ - \ [CVE-2024-56674](https://nvd.nist.gov/vuln/detail/CVE-2024-56674), [CVE-2024-56673](https://nvd.nist.gov/vuln/detail/CVE-2024-56673),\ - \ [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654),\ - \ [CVE-2024-56671](https://nvd.nist.gov/vuln/detail/CVE-2024-56671), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670),\ - \ [CVE-2024-56669](https://nvd.nist.gov/vuln/detail/CVE-2024-56669), [CVE-2024-56668](https://nvd.nist.gov/vuln/detail/CVE-2024-56668),\ - \ [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56666](https://nvd.nist.gov/vuln/detail/CVE-2024-56666),\ - \ [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664),\ - \ [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662),\ - \ [CVE-2024-56652](https://nvd.nist.gov/vuln/detail/CVE-2024-56652), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653),\ - \ [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240),\ - \ [CVE-2025-40261](https://nvd.nist.gov/vuln/detail/CVE-2025-40261), [CVE-2025-40266](https://nvd.nist.gov/vuln/detail/CVE-2025-40266),\ - \ [CVE-2025-40264](https://nvd.nist.gov/vuln/detail/CVE-2025-40264), [CVE-2025-40263](https://nvd.nist.gov/vuln/detail/CVE-2025-40263),\ - \ [CVE-2025-40262](https://nvd.nist.gov/vuln/detail/CVE-2025-40262), [CVE-2025-40254](https://nvd.nist.gov/vuln/detail/CVE-2025-40254),\ - \ [CVE-2025-40253](https://nvd.nist.gov/vuln/detail/CVE-2025-40253), [CVE-2025-40252](https://nvd.nist.gov/vuln/detail/CVE-2025-40252),\ - \ [CVE-2025-40251](https://nvd.nist.gov/vuln/detail/CVE-2025-40251), [CVE-2025-40250](https://nvd.nist.gov/vuln/detail/CVE-2025-40250),\ - \ [CVE-2025-40259](https://nvd.nist.gov/vuln/detail/CVE-2025-40259), [CVE-2025-40258](https://nvd.nist.gov/vuln/detail/CVE-2025-40258),\ - \ [CVE-2025-40257](https://nvd.nist.gov/vuln/detail/CVE-2025-40257), [CVE-2025-40246](https://nvd.nist.gov/vuln/detail/CVE-2025-40246),\ - \ [CVE-2025-40248](https://nvd.nist.gov/vuln/detail/CVE-2025-40248), [CVE-2025-40345](https://nvd.nist.gov/vuln/detail/CVE-2025-40345))\r\ - \n - binutils ([CVE-2025-5244](https://www.cve.org/CVERecord?id=CVE-2025-5244),\ - \ [CVE-2025-5245](https://www.cve.org/CVERecord?id=CVE-2025-5245) [CVE-2025-8225](https://www.cve.org/CVERecord?id=CVE-2025-8225))\r\ - \n - curl ([CVE-2025-9086](https://www.cve.org/CVERecord?id=CVE-2025-9086), [CVE-2025-10148](https://www.cve.org/CVERecord?id=CVE-2025-10148))\r\ - \n - expat ([CVE-2025-59375](https://www.cve.org/CVERecord?id=CVE-2025-59375))\r\ - \n - go ([CVE-2025-47910](https://www.cve.org/CVERecord?id=CVE-2025-47910))\r\n\ - \ - intel-microcode ([CVE-2024-28956](https://www.cve.org/CVERecord?id=CVE-2024-28956),\ - \ [CVE-2024-43420](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420),\ - \ [CVE-2024-45332](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332),\ - \ [CVE-2025-20012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012),\ - \ [CVE-2025-20054](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054),\ - \ [CVE-2025-20103](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103),\ - \ [CVE-2025-20623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623),\ - \ [CVE-2025-24495](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495),\ - \ [CVE-2025-20053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053),\ - \ [CVE-2025-20109](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109),\ - \ [CVE-2025-22839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839),\ - \ [CVE-2025-22840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840),\ - \ [CVE-2025-22889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889),\ - \ [CVE-2025-26403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403))\r\ - \n - libpcre2 ([CVE-2025-58050](https://www.cve.org/CVERecord?id=CVE-2025-58050))\r\ - \n - libxml2 ([libxml2-20250908](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9))\r\ - \n - libxslt ([CVE-2025-7424](https://www.cve.org/CVERecord?id=CVE-2025-7424),\ - \ [CVE-2025-7425](https://www.cve.org/CVERecord?id=CVE-2025-7425))\r\n - net-tools\ - \ ([CVE-2025-46836](https://www.cve.org/CVERecord?id=CVE-2025-46836))\r\n - nvidia-drivers\ - \ ([CVE-2025-23280](https://www.cve.org/CVERecord?id=CVE-2025-23280), [CVE-2025-23282](https://www.cve.org/CVERecord?id=CVE-2025-23282),\ - \ [CVE-2025-23300](https://www.cve.org/CVERecord?id=CVE-2025-23300), [CVE-2025-23330](https://www.cve.org/CVERecord?id=CVE-2025-23330),\ - \ [CVE-2025-23332](https://www.cve.org/CVERecord?id=CVE-2025-23332), [CVE-2025-23345](https://www.cve.org/CVERecord?id=CVE-2025-23345))\r\ - \n - openssh ([CVE-2025-61984](https://www.cve.org/CVERecord?id=CVE-2025-61984),\ - \ [CVE-2025-61985](https://www.cve.org/CVERecord?id=CVE-2025-61985))\r\n - openssl\ - \ ([CVE-2025-9230](https://www.cve.org/CVERecord?id=CVE-2025-9230), [CVE-2025-9231](https://www.cve.org/CVERecord?id=CVE-2025-9231),\ - \ [CVE-2025-9232](https://www.cve.org/CVERecord?id=CVE-2025-9232))\r\n \r\n ####\ - \ Bug fixes:\r\n \r\n - Alpha only: Added Fusion SCSI disk drivers back to the\ - \ initrd after they got lost in the rework ([Flatcar#1924](https://github.com/flatcar/Flatcar/issues/1924))\r\ - \n - Alpha only: Fixed systemd-sysext payload handling for air-gapped/self-hosted\ - \ updates which was a known bug for 4487.0.0 ([ue-rs#93](https://github.com/flatcar/ue-rs/pull/93))\r\ - \n - Configured the services in the overlaybd sysext to start automatically like\ - \ the other sysexts. Note that the sysext must be enabled at boot time for this\ - \ to happen, otherwise you need to call `systemd-tmpfiles --create` and `systemctl\ - \ daemon-reload` first.\r\n - Fixed SSSD startup failure by adding back LDB modules\ - \ into the image, which got lost after a Samba update ([Flatcar#1919](https://github.com/flatcar/Flatcar/issues/1919))\r\ - \n - Fixed a kernel boot warning when loading an explicit list of kernel modules\ - \ in the minimal first-stage initrd ([Flatcar#1934](https://github.com/flatcar/Flatcar/issues/1934))\r\ - \n \r\n #### Changes:\r\n \r\n - Added support for the kernel cmdline parameters\ - \ `flatcar.release_file_server_url` and `flatcar.dev_file_server_url` to specify\ - \ custom servers where Flatcar extensions should be downloaded on boot ([bootengine#112](https://github.com/flatcar/bootengine/pull/112))\r\ - \n - Alpha only: Reduced Azure image size again to 30 GB as before by shrinking\ - \ the root partition to compensate for the growth of the other partitions ([scripts#3460](https://github.com/flatcar/scripts/pull/3460))\r\ - \n - Increased all partition sizes: `/boot` to 1 GB, the two `/usr` partitions\ - \ to 2 GB, `/oem` to 1 GB so that we can use more space in a few years when we\ - \ can assume that most nodes run the new partition layout - existing nodes can\ - \ still update for the next years ([scripts#3027](https://github.com/flatcar/scripts/pull/3027))\r\ - \n - Reduced the kernel+initrd size on `/boot` by half. Flatcar now uses a minimal\ - \ first stage initrd just to access the `/usr` partition and then switches to\ - \ the full initrd that does the full system preparation as before. Since this\ - \ means that the set of kernel modules available in the first initrd is reduced,\ - \ please report any impact.\r\n - The way that files for building custom kernel\ - \ modules are installed has changed from a Ubuntu-inspired method to the standard\ - \ upstream kernel method. In the unlikely event that this breaks your module builds,\ - \ please let the Flatcar team know immediately.\r\n \r\n #### Updates:\r\n \r\n\ - - Linux ([6.12.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61)\ - \ (includes [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49),\ - \ [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50),\ - \ [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59),\ - \ [6.12.60](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60)))\r\ - \n- Linux firmware ([20251021](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251021)\ - \ (includes [20250917](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250917),\ - \ [20251011](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251011)))\r\ - \n- Afterburn ([5.10.0](https://coreos.github.io/afterburn/release-notes/#afterburn-5100))\r\ - \n- azure, dev: inotify-tools ([4.25.9.0](https://github.com/inotify-tools/inotify-tools/releases/tag/4.25.9.0))\r\ - \n- azure, stackit: chrony ([4.8](https://gitlab.com/chrony/chrony/-/raw/4.8/NEWS))\r\ - \n- base, dev: bash ([5.3_p3](https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html))\r\ - \n- base, dev: bind ([9.18.38](https://bind9.readthedocs.io/en/v9.18.38/notes.html#notes-for-bind-9-18-38))\r\ - \n- base, dev: bpftool ([7.6.0](https://github.com/libbpf/bpftool/releases/tag/v7.6.0))\r\ - \n- base, dev: btrfs-progs ([6.16.1](https://github.com/kdave/btrfs-progs/releases/tag/v6.16.1)\ - \ (includes [6.16](https://github.com/kdave/btrfs-progs/releases/tag/v6.16)))\r\ - \n- base, dev: coreutils ([9.7](https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00006.html)\ - \ (includes [9.6](https://savannah.gnu.org/news/?id=10715)))\r\n- base, dev: cryptsetup\ - \ ([2.8.1](https://gitlab.com/cryptsetup/cryptsetup/-/raw/v2.8.1/docs/v2.8.1-ReleaseNotes))\r\ - \n- base, dev: curl ([8.16.0](https://curl.se/ch/8.16.0.html))\r\n- base, dev:\ - \ expat ([2.7.3](https://raw.githubusercontent.com/libexpat/libexpat/refs/tags/R_2_7_3/expat/Changes)\ - \ (includes [2.7.2](https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes)))\r\ - \n- base, dev: gcc ([14.3.1_p20250801](https://gcc.gnu.org/pipermail/gcc/2025-May/246078.html))\r\ - \n- base, dev: gettext ([0.23.2](https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=a5cc8a63eb4f06e4a1171afda862812feb67d693;hb=e8e6cb71aec0de1f5758ac21327bb8cd69e33731)\ - \ (includes [0.23.0](https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=9d87d45408f510d15856a1dda8a9376573f0a9c5;hb=c12b25dc82104691ca80c4da1cbc538fcab42bf5),\ - \ [0.23.1](https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=4aafedf9b10a66891838e1f35c7af020c6124ee0;hb=d9b0432a825bfe3fc72f9a081d295a9528cd8aac)))\r\ - \n- base, dev: git ([2.51.0](https://github.com/git/git/blob/v2.51.0/Documentation/RelNotes/2.51.0.adoc)\ - \ (includes [2.50.0](https://github.com/git/git/blob/v2.50.0/Documentation/RelNotes/2.50.0.adoc)))\r\ - \n- base, dev: hwdata ([0.398](https://github.com/vcrhonek/hwdata/releases/tag/v0.398))\r\ - \n- base, dev: intel-microcode ([20250812](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250812)\ - \ (includes [20250512](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250512)))\r\ - \n- base, dev: libffi ([3.5.2](https://github.com/libffi/libffi/releases/tag/v3.5.2))\r\ - \n- base, dev: libnftnl ([1.3.0](https://lwn.net/Articles/1032725/))\r\n- base,\ - \ dev: libxml2 ([2.14.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.6)\ - \ (includes [2.13.9](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9),\ - \ [2.14.0](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.0), [2.14.1](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.1),\ - \ [2.14.2](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.2), [2.14.3](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.3),\ - \ [2.14.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.4), [2.14.5](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.5)))\r\ - \n- base, dev: ncurses ([6.5_p20250802](https://invisible-island.net/ncurses/NEWS.html#t20250802))\r\ - \n- base, dev: nftables ([1.1.5](https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.5.txt)\ - \ (includes [1.1.4](https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.4.txt)))\r\ - \n- base, dev: nvidia-drivers-service ([570.195.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-195-03/index.html)\ - \ (includes [535.274.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-274-02/index.html)))\r\ - \n- base, dev: openssh ([10.2_p1](https://www.openssh.com/txt/release-10.2) (includes\ - \ [10.1](https://www.openssh.com/txt/release-10.1)))\r\n- base, dev: openssl ([3.4.3](https://github.com/openssl/openssl/releases/tag/openssl-3.4.3))\r\ - \n- base, dev: readline ([8.3_p1](https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html))\r\ - \n- base, dev: samba ([4.22.3](https://www.samba.org/samba/history/samba-4.22.3.html)\ - \ (includes [4.21.0](https://www.samba.org/samba/history/samba-4.21.0.html), [4.22.0](https://www.samba.org/samba/history/samba-4.22.0.html),\ - \ [4.22.1](https://www.samba.org/samba/history/samba-4.22.1.html), [4.22.2](https://www.samba.org/samba/history/samba-4.22.2.html)))\r\ - \n- base, dev: talloc ([2.4.3](https://gitlab.com/samba-team/samba/-/commit/77229f73c20af69ab0f3c96efbb229ff64a9dfe4))\r\ - \n- base, dev: tdb ([1.4.13](https://gitlab.com/samba-team/samba/-/commit/70a8c7a89a6d62d2ff172d79b5f4e6439300b88d))\r\ - \n- base, dev: tevent ([0.16.2](https://gitlab.com/samba-team/samba/-/commit/8d398acbbb7fdc0ff50fe6ba80433deaf92515c6))\r\ - \n- base, dev: xfsprogs ([6.16.0](https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.16.0)\ - \ (includes [6.15.0](https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.15.0)))\r\ - \n- ca-certificates ([3.119](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html)\ - \ (includes [3.118.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html)))\r\ - \n- dev, sysext-incus: squashfs-tools ([4.7.2](https://github.com/plougher/squashfs-tools/releases/tag/4.7.2)\ - \ (includes [4.7.1](https://github.com/plougher/squashfs-tools/releases/tag/4.7.1)))\r\ - \n- dev: binutils ([2.45](https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00009.html))\r\ - \n- sdk: azure-core ([1.16.1](https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-core_1.16.1))\r\ - \n- sdk: azure-identity ([1.13.1](https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-identity_1.13.1))\r\ - \n- sdk: cmake ([3.31.9](https://cmake.org/cmake/help/v3.31/release/3.31.html#id1))\r\ - \n- sdk: go ([1.25.1](https://go.dev/doc/devel/release#go1.25.minor) (includes\ - \ [1.24.7](https://go.dev/doc/devel/release#go1.24.minor), [1.25](https://go.dev/doc/go1.25)))\r\ - \n- sdk: pkgcheck ([0.10.37](https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.37))\r\ - \n- sdk: qemu ([10.0.5](https://wiki.qemu.org/ChangeLog/10.0))\r\n- sdk: rust\ - \ ([1.89.0](https://blog.rust-lang.org/2025/08/07/Rust-1.89.0/))\r\n- sysext-containerd:\ - \ containerd ([2.1.4](https://github.com/containerd/containerd/releases/tag/v2.1.4))\r\ - \n- sysext-containerd: runc ([1.3.1](https://github.com/opencontainers/runc/releases/tag/v1.3.1))\r\ - \n- sysext-incus, sysext-podman, vmware: fuse ([3.17.4](https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.4))\r\ - \n- sysext-nvidia-drivers-535: nvidia-drivers ([535.274.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-274-02/index.html))\r\ - \n- sysext-nvidia-drivers-570: nvidia-drivers ([570.195.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-195-03/index.html)\ - \ (includes 570.190))\r\n- sysext-podman: crun ([1.21](https://github.com/containers/crun/releases/tag/1.21))\r\ - \n- sysext-podman: gpgme ([2.0.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=cd0e093bf83fe47b6773fb478fced07d8409fbe0;hb=e17ba578861905857da0a514b4fc9b88a57f7346))\r\ - \n- sysext-podman: netavark ([1.15.2](https://github.com/containers/netavark/releases/tag/v1.15.2)\ - \ (includes [1.15.0](https://github.com/containers/netavark/releases/tag/v1.15.0),\ - \ [1.15.1](https://github.com/containers/netavark/releases/tag/v1.15.1)))\r\n\ - - sysext-podman: passt ([2025.06.11](https://archives.passt.top/passt-user/20250611175947.7d540ddc@elisabeth/T/#u))\r\ - \n- sysext-python: charset-normalizer ([3.4.3](https://github.com/jawah/charset_normalizer/releases/tag/3.4.3))\r\ - \n- sysext-python: jaraco-functools ([4.3.0](https://raw.githubusercontent.com/jaraco/jaraco.functools/refs/tags/v4.3.0/NEWS.rst))\r\ - \n- sysext-python: markdown-it-py ([4.0.0](https://github.com/executablebooks/markdown-it-py/releases/tag/v4.0.0))\r\ - \n- sysext-python: pip ([25.2](https://raw.githubusercontent.com/pypa/pip/refs/tags/25.2/NEWS.rst))\r\ - \n- sysext-python: platformdirs ([4.4.0](https://github.com/tox-dev/platformdirs/releases/tag/4.4.0))\r\ - \n- sysext-python: requests ([2.32.5](https://github.com/psf/requests/releases/tag/v2.32.5))\r\ - \n- sysext-python: typing-extensions ([4.15.0](https://raw.githubusercontent.com/python/typing_extensions/refs/tags/4.15.0/CHANGELOG.md))\r\ - \n- systemd (257.9)\r\n- vmware: open-vm-tools ([13.0.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-13.0.5))\r\ - \n" - created_at: '2025-12-12T13:53:18Z' + body: "_Changes since **Beta 4515.1.0**_\r\n\r\n#### Security fixes:\r\n\r\n- Linux\ + \ ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\ + \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\ + \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\ + \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\ + \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\ + \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\ + \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\ + \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\ + \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\ + \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\ + \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\ + \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\ + \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\ + \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\ + \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\ + \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\ + \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\ + \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\ + \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\ + \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\ + \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\ + \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\ + \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\ + \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\ + \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\ + \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\ + \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\ + \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\ + \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\ + \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\ + \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\ + \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\ + \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\ + \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\ + \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\ + \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\ + \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\ + \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\ + \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\ + \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\ + \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\ + \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\ + \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\ + \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\ + \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\ + \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\ + \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\ + \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\ + \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\ + \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\ + \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\ + \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\ + \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\ + \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\ + \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\ + \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\ + \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\ + \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\ + \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\ + \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\ + \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\ + \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\ + \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\ + \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\ + \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\ + \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\ + \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\ + \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\ + \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\ + \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\ + \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\ + \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\ + \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\ + \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\ + \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\ + \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\ + \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\ + \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\ + \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\ + \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\ + \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\ + \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\ + \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\ + \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\ + \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\ + \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\ + \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\ + \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\ + \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\ + \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\ + \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\ + \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\ + \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\ + \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\ + \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\ + \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\ + \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\ + \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\ + \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- coreutils\ + \ ([CVE-2025-5278](https://www.cve.org/CVERecord?id=CVE-2025-5278))\r\n- go ([CVE-2025-47912](https://www.cve.org/CVERecord?id=CVE-2025-47912),\ + \ [CVE-2025-58183](https://www.cve.org/CVERecord?id=CVE-2025-58183), [CVE-2025-58185](https://www.cve.org/CVERecord?id=CVE-2025-58185),\ + \ [CVE-2025-58186](https://www.cve.org/CVERecord?id=CVE-2025-58186), [CVE-2025-58187](https://www.cve.org/CVERecord?id=CVE-2025-58187),\ + \ [CVE-2025-58188](https://www.cve.org/CVERecord?id=CVE-2025-58188), [CVE-2025-58189](https://www.cve.org/CVERecord?id=CVE-2025-58189),\ + \ [CVE-2025-61723](https://www.cve.org/CVERecord?id=CVE-2025-61723), [CVE-2025-61724](https://www.cve.org/CVERecord?id=CVE-2025-61724),\ + \ [CVE-2025-61725](https://www.cve.org/CVERecord?id=CVE-2025-61725))\r\n- pam\ + \ ([CVE-2024-22365](https://nvd.nist.gov/vuln/detail/CVE-2024-22365), [CVE-2024-10041](https://nvd.nist.gov/vuln/detail/CVE-2024-10041),\ + \ [CVE-2024-10963](https://nvd.nist.gov/vuln/detail/CVE-2024-10963), [CVE-2025-6020](https://nvd.nist.gov/vuln/detail/CVE-2025-6020))\r\ + \n- openssl ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\ + \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\ + \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\ + \ [CVE-2025-15469](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469),\ + \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\ + \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\ + \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\ + \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\ + \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\ + \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\ + \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\ + \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\ + \n\r\n\r\n#### Bug fixes:\r\n\r\n- Dropped debug symbols from containerd, incus,\ + \ and overlaybd system extensions to reduce download size.\r\n\r\n#### Changes:\r\ + \n\r\n- Dropped Ciphers, MACs, and KexAlgorithms from the sshd configuration so\ + \ that the OpenSSH upstream defaults are used. This introduces post-quantum key\ + \ exchange algorithms for better security. ([Flatcar#1921](https://github.com/flatcar/Flatcar/issues/1921)).\ + \ Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable\ + \ this by deploying a custom drop-in config to `/etc/ssh/sshd_config.d/`.\r\n\ + - `/etc/shadow`, `/etc/gshadow` are now owned by the `shadow` group, `/usr/bin/unix_chkpwd`,\ + \ `/usr/bin/chage` and `/usr/bin/expiry` are now also owned by the `shadow` group\ + \ with a sticky bit enabled.\r\n\r\n#### Updates:\r\n\r\n- Ignition ([2.24.0](https://coreos.github.io/ignition/release-notes/#ignition-2240-2024-10-14))\r\ + \n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\ + \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\ + \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\ + \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\ + \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62),\ + \ [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59)))\r\ + \n- Linux Firmware ([20251125](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251125)\ + \ (includes [20251111](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251111)))\r\ + \n- SDK: cmake ([4.1.2](https://cmake.org/cmake/help/v4.1/release/4.1.html#id22)\ + \ (includes [4.1.1](https://cmake.org/cmake/help/v4.1/release/4.1.html#id21),\ + \ [4.1](https://cmake.org/cmake/help/v4.1/release/4.1.html), [4.0](https://cmake.org/cmake/help/v4.0/release/4.0.html)))\r\ + \n- SDK: go ([1.25.3](https://go.dev/doc/devel/release#go1.25.minor))\r\n- SDK:\ + \ meson ([1.9.1](https://mesonbuild.com/Release-notes-for-1-9-0.html) (includes\ + \ [1.8.0](https://mesonbuild.com/Release-notes-for-1-8-0.html)))\r\n- SDK: nasm\ + \ ([3.01](https://www.nasm.us/docs/3.01/nasmac.html) (includes [3.00](https://www.nasm.us/docs/3.00/nasmac.html)))\r\ + \n- base, dev: btrfs-progs ([6.17](https://github.com/kdave/btrfs-progs/releases/tag/v6.17))\r\ + \n- base, dev: cifs-utils ([7.4](https://lwn.net/Articles/1024956/))\r\n- base,\ + \ dev: coreutils ([9.8](https://lists.gnu.org/archive/html/info-gnu/2025-09/msg00005.html))\r\ + \n- base, dev: hwdata ([0.400](https://github.com/vcrhonek/hwdata/releases/tag/v0.400)\ + \ (includes [0.399](https://github.com/vcrhonek/hwdata/releases/tag/v0.399)))\r\ + \n- base, dev: inih ([62](https://github.com/benhoyt/inih/releases/tag/r62) (includes\ + \ [61](https://github.com/benhoyt/inih/releases/tag/r61)))\r\n- base, dev: intel-microcode\ + \ ([20251111_p20251112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111))\r\ + \n- base, dev: iproute2 ([6.17.0](https://lore.kernel.org/all/20250929095042.48200315@hermes.local/))\r\ + \n- base, dev: jose ([14](https://github.com/latchset/jose/releases/tag/v14) (includes\ + \ [13](https://github.com/latchset/jose/releases/tag/v13)))\r\n- base, dev: kbd\ + \ ([2.9.0](https://github.com/legionus/kbd/releases/tag/v2.9.0))\r\n- base, dev:\ + \ less ([685](https://greenwoodsoftware.com/less/news.685.html))\r\n- base, dev:\ + \ libgpg-error ([1.56](https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.56))\r\ + \n- base, dev: libtirpc ([1.3.7](https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-7))\r\ + \n- base, dev: pam ([1.7.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.1)\ + \ (includes [1.7.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.0),\ + \ [1.6.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.1), [1.6.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0)))\r\ + \n- base, dev: pambase ([20251013](https://gitweb.gentoo.org/proj/pambase.git/log/?h=pambase-20251013))\r\ + \n- base, dev: samba ([4.22.5](https://www.samba.org/samba/history/samba-4.22.5.html)\ + \ (includes [4.22.4](https://www.samba.org/samba/history/samba-4.22.4.html)))\r\ + \n- base, dev: strace ([6.17](https://github.com/strace/strace/releases/tag/v6.17))\r\ + \n- base, dev: thin-provisioning-tools ([1.3.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.3.0/CHANGES)\ + \ (includes [1.2.2](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.2/CHANGES),\ + \ [1.2.1](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.1/CHANGES),\ + \ [1.2.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.0/CHANGES),\ + \ [1.1.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.1.0/CHANGES),\ + \ [1.0.14](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.14/CHANGES),\ + \ [1.0.13](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.13/CHANGES),\ + \ [1.0.12](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.12/CHANGES),\ + \ [1.0.11](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.11/CHANGES)))\r\ + \n- base, dev: util-linux ([2.41.2](https://github.com/util-linux/util-linux/blob/v2.41.2/Documentation/releases/v2.41.2-ReleaseNotes))\r\ + \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\ + \n- dev: portage ([3.0.69.3](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.3)\ + \ (includes [3.0.69.2](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.2),\ + \ [3.0.69.1](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.1),\ + \ [3.0.69](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69)))\r\ + \n- sysext-overlaybd: overlaybd ([1.0.16](https://github.com/containerd/overlaybd/releases/tag/v1.0.16))\r\ + \n- sysext-podman: aardvark-dns ([1.15.0](https://github.com/containers/aardvark-dns/releases/tag/v1.15.0))\r\ + \n- sysext-podman: netavark ([1.16.1](https://github.com/containers/netavark/releases/tag/v1.16.1)\ + \ (includes [1.16.0](https://github.com/containers/netavark/releases/tag/v1.16.0)))\r\ + \n- sysext-python: more-itertools ([10.8.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.8.0))\r\ + \n- sysext-python: platformdirs ([4.5.0](https://github.com/tox-dev/platformdirs/releases/tag/4.5.0))\r\ + \n- sysext-python: resolvelib ([1.2.1](https://raw.githubusercontent.com/sarugaku/resolvelib/refs/tags/1.2.1/CHANGELOG.rst))\r\ + \n- sysext-python: rich ([14.2.0](https://github.com/Textualize/rich/releases/tag/v14.2.0))\r\ + \n- sysext-python: setuptools-scm ([9.2.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.2.0)\ + \ (includes [9.1.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.1.0),\ + \ [9.0.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.0.0)))\r\n- sysext-python:\ + \ trove-classifiers ([2025.9.11.17](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.11.17)\ + \ (includes [2025.9.9.12](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.9.12),\ + \ [2025.9.8.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.8.13)))\r\ + \n- openssl ([3.5.5](https://github.com/openssl/openssl/releases/tag/openssl-3.5.5))" + created_at: '2026-01-23T13:55:34Z' draft: false - html_url: https://github.com/flatcar/scripts/releases/tag/beta-4515.1.0 - id: 271478085 + html_url: https://github.com/flatcar/scripts/releases/tag/beta-4547.1.0 + id: 280330266 immutable: false - name: beta-4515.1.0 - node_id: RE_kwDOB2MTHs4QLm1F + name: '' + node_id: RE_kwDOB2MTHs4QtYAa prerelease: false - published_at: '2025-12-18T15:18:34Z' - tag_name: beta-4515.1.0 - tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/beta-4515.1.0 + published_at: '2026-01-27T14:42:03Z' + tag_name: beta-4547.1.0 + tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/beta-4547.1.0 target_commitish: main - updated_at: '2025-12-18T15:24:44Z' - upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/271478085/assets{?name,label} - url: https://api.github.com/repos/flatcar/scripts/releases/271478085 - zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/beta-4515.1.0 + updated_at: '2026-01-27T14:42:03Z' + upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330266/assets{?name,label} + url: https://api.github.com/repos/flatcar/scripts/releases/280330266 + zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/beta-4547.1.0 image_packages: containerd: 2.1.5 docker: 28.0.4 - ignition: 2.22.0 - kernel: 6.12.61 + ignition: 2.24.0 + kernel: 6.12.66 systemd: '257' release: current -version: 4515.1.0 +version: 4547.1.0 diff --git a/data/releases/stable/4459.2.3.yml b/data/releases/stable/4459.2.3.yml new file mode 100644 index 00000000..fb25e57a --- /dev/null +++ b/data/releases/stable/4459.2.3.yml @@ -0,0 +1,169 @@ +architectures: +- amd64 +- arm64 +channel: stable +github_release: + assets: [] + assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330500/assets + author: + avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4 + events_url: https://api.github.com/users/tormath1/events{/privacy} + followers_url: https://api.github.com/users/tormath1/followers + following_url: https://api.github.com/users/tormath1/following{/other_user} + gists_url: https://api.github.com/users/tormath1/gists{/gist_id} + gravatar_id: '' + html_url: https://github.com/tormath1 + id: 28657343 + login: tormath1 + node_id: MDQ6VXNlcjI4NjU3MzQz + organizations_url: https://api.github.com/users/tormath1/orgs + received_events_url: https://api.github.com/users/tormath1/received_events + repos_url: https://api.github.com/users/tormath1/repos + site_admin: false + starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo} + subscriptions_url: https://api.github.com/users/tormath1/subscriptions + type: User + url: https://api.github.com/users/tormath1 + user_view_type: public + body: "_Changes since **Stable 4459.2.2**_\r\n\r\n#### Security fixes:\r\n\r\n-\ + \ Linux ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\ + \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\ + \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\ + \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\ + \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\ + \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\ + \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\ + \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\ + \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\ + \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\ + \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\ + \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\ + \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\ + \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\ + \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\ + \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\ + \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\ + \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\ + \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\ + \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\ + \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\ + \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\ + \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\ + \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\ + \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\ + \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\ + \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\ + \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\ + \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\ + \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\ + \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\ + \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\ + \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\ + \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\ + \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\ + \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\ + \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\ + \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\ + \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\ + \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\ + \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\ + \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\ + \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\ + \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\ + \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\ + \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\ + \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\ + \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\ + \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\ + \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\ + \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\ + \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\ + \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\ + \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\ + \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\ + \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\ + \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\ + \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\ + \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\ + \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\ + \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\ + \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\ + \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\ + \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\ + \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\ + \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\ + \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\ + \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\ + \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\ + \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\ + \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\ + \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\ + \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\ + \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\ + \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\ + \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\ + \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\ + \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\ + \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\ + \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\ + \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\ + \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\ + \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\ + \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\ + \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\ + \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\ + \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\ + \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\ + \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\ + \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\ + \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\ + \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\ + \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\ + \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\ + \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\ + \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\ + \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\ + \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\ + \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- openssl\ + \ ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\ + \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\ + \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\ + \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\ + \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\ + \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\ + \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\ + \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\ + \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\ + \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\ + \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\ + \n\r\n\r\n#### Updates:\r\n\r\n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\ + \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\ + \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\ + \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\ + \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62)))\r\ + \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\ + \n- openssl ([3.4.4](https://github.com/openssl/openssl/releases/tag/openssl-3.4.4))" + created_at: '2026-01-23T13:56:37Z' + draft: false + html_url: https://github.com/flatcar/scripts/releases/tag/stable-4459.2.3 + id: 280330500 + immutable: false + name: '' + node_id: RE_kwDOB2MTHs4QtYEE + prerelease: false + published_at: '2026-01-27T14:42:39Z' + tag_name: stable-4459.2.3 + tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/stable-4459.2.3 + target_commitish: main + updated_at: '2026-01-27T14:42:39Z' + upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330500/assets{?name,label} + url: https://api.github.com/repos/flatcar/scripts/releases/280330500 + zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/stable-4459.2.3 +image_packages: + containerd: 2.0.7 + docker: 28.0.4 + ignition: 2.22.0 + kernel: 6.12.66 + systemd: '256' +release: 4459.2.3 +version: 4459.2.3 diff --git a/data/releases/stable/current.yml b/data/releases/stable/current.yml index 83476cdb..cd0fdde1 100644 --- a/data/releases/stable/current.yml +++ b/data/releases/stable/current.yml @@ -4,93 +4,166 @@ architectures: channel: stable github_release: assets: [] - assets_url: https://api.github.com/repos/flatcar/scripts/releases/271479989/assets + assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330500/assets author: - avatar_url: https://avatars.githubusercontent.com/u/1449761?v=4 - events_url: https://api.github.com/users/danzatt/events{/privacy} - followers_url: https://api.github.com/users/danzatt/followers - following_url: https://api.github.com/users/danzatt/following{/other_user} - gists_url: https://api.github.com/users/danzatt/gists{/gist_id} + avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4 + events_url: https://api.github.com/users/tormath1/events{/privacy} + followers_url: https://api.github.com/users/tormath1/followers + following_url: https://api.github.com/users/tormath1/following{/other_user} + gists_url: https://api.github.com/users/tormath1/gists{/gist_id} gravatar_id: '' - html_url: https://github.com/danzatt - id: 1449761 - login: danzatt - node_id: MDQ6VXNlcjE0NDk3NjE= - organizations_url: https://api.github.com/users/danzatt/orgs - received_events_url: https://api.github.com/users/danzatt/received_events - repos_url: https://api.github.com/users/danzatt/repos + html_url: https://github.com/tormath1 + id: 28657343 + login: tormath1 + node_id: MDQ6VXNlcjI4NjU3MzQz + organizations_url: https://api.github.com/users/tormath1/orgs + received_events_url: https://api.github.com/users/tormath1/received_events + repos_url: https://api.github.com/users/tormath1/repos site_admin: false - starred_url: https://api.github.com/users/danzatt/starred{/owner}{/repo} - subscriptions_url: https://api.github.com/users/danzatt/subscriptions + starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo} + subscriptions_url: https://api.github.com/users/tormath1/subscriptions type: User - url: https://api.github.com/users/danzatt + url: https://api.github.com/users/tormath1 user_view_type: public - body: "_Changes since **Stable 4459.2.1**_\r\n \r\n #### Security fixes:\r\n \r\n\ - \ - Linux ([CVE-2025-40275](https://nvd.nist.gov/vuln/detail/CVE-2025-40275),\ - \ [CVE-2025-40274](https://nvd.nist.gov/vuln/detail/CVE-2025-40274), [CVE-2025-40273](https://nvd.nist.gov/vuln/detail/CVE-2025-40273),\ - \ [CVE-2025-40272](https://nvd.nist.gov/vuln/detail/CVE-2025-40272), [CVE-2025-40271](https://nvd.nist.gov/vuln/detail/CVE-2025-40271),\ - \ [CVE-2025-40289](https://nvd.nist.gov/vuln/detail/CVE-2025-40289), [CVE-2025-40288](https://nvd.nist.gov/vuln/detail/CVE-2025-40288),\ - \ [CVE-2025-40287](https://nvd.nist.gov/vuln/detail/CVE-2025-40287), [CVE-2025-40269](https://nvd.nist.gov/vuln/detail/CVE-2025-40269),\ - \ [CVE-2025-40286](https://nvd.nist.gov/vuln/detail/CVE-2025-40286), [CVE-2025-40285](https://nvd.nist.gov/vuln/detail/CVE-2025-40285),\ - \ [CVE-2025-40284](https://nvd.nist.gov/vuln/detail/CVE-2025-40284), [CVE-2025-40283](https://nvd.nist.gov/vuln/detail/CVE-2025-40283),\ - \ [CVE-2025-40282](https://nvd.nist.gov/vuln/detail/CVE-2025-40282), [CVE-2025-40281](https://nvd.nist.gov/vuln/detail/CVE-2025-40281),\ - \ [CVE-2025-40280](https://nvd.nist.gov/vuln/detail/CVE-2025-40280), [CVE-2025-40279](https://nvd.nist.gov/vuln/detail/CVE-2025-40279),\ - \ [CVE-2025-40278](https://nvd.nist.gov/vuln/detail/CVE-2025-40278), [CVE-2025-40277](https://nvd.nist.gov/vuln/detail/CVE-2025-40277),\ - \ [CVE-2025-40268](https://nvd.nist.gov/vuln/detail/CVE-2025-40268), [CVE-2025-40214](https://nvd.nist.gov/vuln/detail/CVE-2025-40214),\ - \ [CVE-2025-40212](https://nvd.nist.gov/vuln/detail/CVE-2025-40212), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087),\ - \ [CVE-2024-57879](https://nvd.nist.gov/vuln/detail/CVE-2024-57879), [CVE-2024-57880](https://nvd.nist.gov/vuln/detail/CVE-2024-57880),\ - \ [CVE-2024-55642](https://nvd.nist.gov/vuln/detail/CVE-2024-55642), [CVE-2024-55641](https://nvd.nist.gov/vuln/detail/CVE-2024-55641),\ - \ [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683),\ - \ [CVE-2024-54460](https://nvd.nist.gov/vuln/detail/CVE-2024-54460), [CVE-2024-54191](https://nvd.nist.gov/vuln/detail/CVE-2024-54191),\ - \ [CVE-2024-53689](https://nvd.nist.gov/vuln/detail/CVE-2024-53689), [CVE-2024-53682](https://nvd.nist.gov/vuln/detail/CVE-2024-53682),\ - \ [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770),\ - \ [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660),\ - \ [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658),\ - \ [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56656](https://nvd.nist.gov/vuln/detail/CVE-2024-56656),\ - \ [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675),\ - \ [CVE-2024-56674](https://nvd.nist.gov/vuln/detail/CVE-2024-56674), [CVE-2024-56673](https://nvd.nist.gov/vuln/detail/CVE-2024-56673),\ - \ [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654),\ - \ [CVE-2024-56671](https://nvd.nist.gov/vuln/detail/CVE-2024-56671), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670),\ - \ [CVE-2024-56669](https://nvd.nist.gov/vuln/detail/CVE-2024-56669), [CVE-2024-56668](https://nvd.nist.gov/vuln/detail/CVE-2024-56668),\ - \ [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56666](https://nvd.nist.gov/vuln/detail/CVE-2024-56666),\ - \ [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664),\ - \ [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662),\ - \ [CVE-2024-56652](https://nvd.nist.gov/vuln/detail/CVE-2024-56652), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653),\ - \ [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240),\ - \ [CVE-2025-40261](https://nvd.nist.gov/vuln/detail/CVE-2025-40261), [CVE-2025-40266](https://nvd.nist.gov/vuln/detail/CVE-2025-40266),\ - \ [CVE-2025-40264](https://nvd.nist.gov/vuln/detail/CVE-2025-40264), [CVE-2025-40263](https://nvd.nist.gov/vuln/detail/CVE-2025-40263),\ - \ [CVE-2025-40262](https://nvd.nist.gov/vuln/detail/CVE-2025-40262), [CVE-2025-40254](https://nvd.nist.gov/vuln/detail/CVE-2025-40254),\ - \ [CVE-2025-40253](https://nvd.nist.gov/vuln/detail/CVE-2025-40253), [CVE-2025-40252](https://nvd.nist.gov/vuln/detail/CVE-2025-40252),\ - \ [CVE-2025-40251](https://nvd.nist.gov/vuln/detail/CVE-2025-40251), [CVE-2025-40250](https://nvd.nist.gov/vuln/detail/CVE-2025-40250),\ - \ [CVE-2025-40259](https://nvd.nist.gov/vuln/detail/CVE-2025-40259), [CVE-2025-40258](https://nvd.nist.gov/vuln/detail/CVE-2025-40258),\ - \ [CVE-2025-40257](https://nvd.nist.gov/vuln/detail/CVE-2025-40257), [CVE-2025-40246](https://nvd.nist.gov/vuln/detail/CVE-2025-40246),\ - \ [CVE-2025-40248](https://nvd.nist.gov/vuln/detail/CVE-2025-40248), [CVE-2025-40345](https://nvd.nist.gov/vuln/detail/CVE-2025-40345))\r\ - \n \r\n \r\n #### Updates:\r\n \r\n - Linux ([6.12.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61)\ - \ (includes ([6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59),\ - \ [6.12.60](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60))))\r\ - \n - ca-certificates ([3.119](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html)\ - \ (includes [3.118.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html)))" - created_at: '2025-12-12T13:54:22Z' + body: "_Changes since **Stable 4459.2.2**_\r\n\r\n#### Security fixes:\r\n\r\n-\ + \ Linux ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\ + \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\ + \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\ + \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\ + \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\ + \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\ + \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\ + \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\ + \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\ + \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\ + \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\ + \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\ + \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\ + \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\ + \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\ + \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\ + \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\ + \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\ + \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\ + \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\ + \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\ + \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\ + \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\ + \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\ + \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\ + \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\ + \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\ + \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\ + \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\ + \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\ + \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\ + \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\ + \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\ + \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\ + \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\ + \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\ + \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\ + \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\ + \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\ + \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\ + \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\ + \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\ + \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\ + \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\ + \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\ + \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\ + \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\ + \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\ + \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\ + \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\ + \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\ + \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\ + \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\ + \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\ + \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\ + \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\ + \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\ + \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\ + \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\ + \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\ + \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\ + \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\ + \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\ + \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\ + \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\ + \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\ + \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\ + \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\ + \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\ + \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\ + \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\ + \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\ + \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\ + \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\ + \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\ + \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\ + \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\ + \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\ + \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\ + \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\ + \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\ + \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\ + \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\ + \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\ + \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\ + \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\ + \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\ + \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\ + \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\ + \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\ + \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\ + \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\ + \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\ + \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\ + \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\ + \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\ + \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\ + \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\ + \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- openssl\ + \ ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\ + \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\ + \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\ + \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\ + \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\ + \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\ + \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\ + \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\ + \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\ + \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\ + \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\ + \n\r\n\r\n#### Updates:\r\n\r\n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\ + \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\ + \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\ + \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\ + \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62)))\r\ + \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\ + \n- openssl ([3.4.4](https://github.com/openssl/openssl/releases/tag/openssl-3.4.4))" + created_at: '2026-01-23T13:56:37Z' draft: false - html_url: https://github.com/flatcar/scripts/releases/tag/stable-4459.2.2 - id: 271479989 + html_url: https://github.com/flatcar/scripts/releases/tag/stable-4459.2.3 + id: 280330500 immutable: false - name: stable-4459.2.2 - node_id: RE_kwDOB2MTHs4QLnS1 + name: '' + node_id: RE_kwDOB2MTHs4QtYEE prerelease: false - published_at: '2025-12-18T15:25:15Z' - tag_name: stable-4459.2.2 - tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/stable-4459.2.2 + published_at: '2026-01-27T14:42:39Z' + tag_name: stable-4459.2.3 + tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/stable-4459.2.3 target_commitish: main - updated_at: '2025-12-18T15:25:15Z' - upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/271479989/assets{?name,label} - url: https://api.github.com/repos/flatcar/scripts/releases/271479989 - zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/stable-4459.2.2 + updated_at: '2026-01-27T14:42:39Z' + upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330500/assets{?name,label} + url: https://api.github.com/repos/flatcar/scripts/releases/280330500 + zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/stable-4459.2.3 image_packages: containerd: 2.0.7 docker: 28.0.4 ignition: 2.22.0 - kernel: 6.12.61 + kernel: 6.12.66 systemd: '256' release: current -version: 4459.2.2 +version: 4459.2.3 diff --git a/static/releases-feed/releases-alpha.xml b/static/releases-feed/releases-alpha.xml index 3a2f3482..6e7db9cc 100644 --- a/static/releases-feed/releases-alpha.xml +++ b/static/releases-feed/releases-alpha.xml @@ -2,7 +2,7 @@ https://www.flatcar.org/ Flatcar :: alpha - 2025-12-18T15:36:06.451062+00:00 + 2026-01-27T14:46:33.030766+00:00 Flatcar Container Linux maintainers@flatcar-linux.org @@ -11,10 +11,55 @@ python-feedgen https://www.flatcar.org/media/brand-logo.svg Flatcar Container Linux release feed + + https://github.com/flatcar/scripts/releases/tag/alpha-4593.0.0 + 4593.0.0 + 2026-01-27T14:46:34.453860+00:00 + Changes since Alpha 4547.0.0

+

Security fixes:

+ +

Changes:

+
    +
  • Dropped Ciphers, MACs, and KexAlgorithms from the sshd configuration so that the OpenSSH upstream defaults are used. This introduces post-quantum key exchange algorithms for better security. (Flatcar#1921). Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable this by deploying a custom drop-in config to /etc/ssh/sshd_config.d/.
  • +
  • Enabled netkit module (scripts#3524)
  • +
+

Updates:

+ +

Packages:

+
    +
  • containerd 2.1.5
  • +
  • docker 28.0.4
  • +
  • ignition 2.24.0
  • +
  • kernel 6.12.66
  • +
  • systemd 257
  • +
+

Architectures:

+
    +
  • amd64
  • +
  • arm64
  • +
+]]>
+ + 2026-01-27T14:41:25+00:00 +
https://github.com/flatcar/scripts/releases/tag/alpha-4547.0.0 4547.0.0 - 2025-12-18T15:36:07.867404+00:00 + 2026-01-27T14:46:34.432140+00:00 Changes since Alpha 4515.0.1

Security fixes: