diff --git a/data/releases/alpha/4593.0.0.yml b/data/releases/alpha/4593.0.0.yml
new file mode 100644
index 00000000..bed49259
--- /dev/null
+++ b/data/releases/alpha/4593.0.0.yml
@@ -0,0 +1,186 @@
+architectures:
+- amd64
+- arm64
+channel: alpha
+github_release:
+ assets: []
+ assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330007/assets
+ author:
+ avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4
+ events_url: https://api.github.com/users/tormath1/events{/privacy}
+ followers_url: https://api.github.com/users/tormath1/followers
+ following_url: https://api.github.com/users/tormath1/following{/other_user}
+ gists_url: https://api.github.com/users/tormath1/gists{/gist_id}
+ gravatar_id: ''
+ html_url: https://github.com/tormath1
+ id: 28657343
+ login: tormath1
+ node_id: MDQ6VXNlcjI4NjU3MzQz
+ organizations_url: https://api.github.com/users/tormath1/orgs
+ received_events_url: https://api.github.com/users/tormath1/received_events
+ repos_url: https://api.github.com/users/tormath1/repos
+ site_admin: false
+ starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo}
+ subscriptions_url: https://api.github.com/users/tormath1/subscriptions
+ type: User
+ url: https://api.github.com/users/tormath1
+ user_view_type: public
+ body: "_Changes since **Alpha 4547.0.0**_\r\n\r\n#### Security fixes:\r\n\r\n- Linux\
+ \ ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\
+ \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\
+ \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\
+ \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\
+ \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\
+ \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\
+ \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\
+ \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\
+ \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\
+ \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\
+ \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\
+ \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\
+ \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\
+ \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\
+ \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\
+ \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\
+ \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\
+ \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\
+ \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\
+ \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\
+ \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\
+ \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\
+ \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\
+ \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\
+ \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\
+ \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\
+ \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\
+ \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\
+ \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\
+ \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\
+ \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\
+ \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\
+ \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\
+ \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\
+ \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\
+ \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\
+ \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\
+ \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\
+ \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\
+ \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\
+ \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\
+ \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\
+ \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\
+ \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\
+ \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\
+ \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\
+ \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\
+ \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\
+ \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\
+ \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\
+ \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\
+ \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\
+ \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\
+ \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\
+ \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\
+ \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\
+ \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\
+ \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\
+ \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\
+ \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\
+ \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\
+ \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\
+ \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\
+ \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\
+ \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\
+ \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\
+ \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\
+ \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\
+ \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\
+ \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\
+ \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\
+ \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\
+ \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\
+ \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\
+ \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\
+ \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\
+ \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\
+ \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\
+ \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\
+ \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\
+ \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\
+ \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\
+ \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\
+ \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\
+ \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\
+ \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\
+ \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\
+ \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\
+ \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\
+ \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\
+ \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\
+ \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\
+ \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\
+ \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\
+ \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\
+ \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\
+ \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\
+ \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\
+ \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- gnupg\
+ \ ([CVE-2025-68972](https://www.cve.org/CVERecord/?id=CVE-2025-68972), [CVE-2025-68973](https://www.cve.org/CVERecord/?id=CVE-2025-68973),\
+ \ [gnupg-20251228-notdash](https://gpg.fail/notdash))\r\n- openssl ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\
+ \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\
+ \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\
+ \ [CVE-2025-15469](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469),\
+ \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\
+ \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\
+ \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\
+ \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\
+ \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\
+ \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\
+ \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\
+ \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\
+ \n\r\n\r\n#### Changes:\r\n\r\n- Dropped Ciphers, MACs, and KexAlgorithms from\
+ \ the sshd configuration so that the OpenSSH upstream defaults are used. This\
+ \ introduces post-quantum key exchange algorithms for better security. ([Flatcar#1921](https://github.com/flatcar/Flatcar/issues/1921)).\
+ \ Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable\
+ \ this by deploying a custom drop-in config to `/etc/ssh/sshd_config.d/`.\r\n\
+ - Enabled netkit module ([scripts#3524](https://github.com/flatcar/scripts/pull/3524))\r\
+ \n\r\n#### Updates:\r\n\r\n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\
+ \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\
+ \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\
+ \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\
+ \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62)))\r\
+ \n- base, dev: gnupg ([2.5.16](https://lists.gnupg.org/pipermail/gnupg-announce/2025q4/000500.html)\
+ \ (includes [2.5](https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00005.html)))\r\
+ \n- base, dev: libgpg-error ([1.57](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob_plain;f=NEWS;h=52ac1464a0c0af091a3d69e8c5f2f3afa2cc3c9f;hb=39d7b85a7d69975f1dfec5a0add10b4d57dcfc9e))\r\
+ \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\
+ \n- dracut ([109](https://github.com/dracut-ng/dracut-ng/releases/tag/109) (includes\
+ \ [108](https://github.com/dracut-ng/dracut-ng/releases/tag/108), [107](https://github.com/dracut-ng/dracut-ng/releases/tag/107)))\r\
+ \n- etcdctl ([3.5.18](https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md#v3518-2025-01-24))\r\
+ \n- sysext-podman: gpgme ([2.0.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=1fd34dbd9143829e9163d402ab0191a9fc6adab2;hb=e4adebe020b07bc47e583817576ce98ca93e9711))\r\
+ \n- openssl ([3.5.5](https://github.com/openssl/openssl/releases/tag/openssl-3.5.5))\r\
+ \n- sysext-python: python ([3.12.12](https://www.python.org/downloads/release/python-31212/)\
+ \ (includes [3.12.0](https://www.python.org/downloads/release/python-3120/)))"
+ created_at: '2026-01-23T13:53:51Z'
+ draft: false
+ html_url: https://github.com/flatcar/scripts/releases/tag/alpha-4593.0.0
+ id: 280330007
+ immutable: false
+ name: ''
+ node_id: RE_kwDOB2MTHs4QtX8X
+ prerelease: false
+ published_at: '2026-01-27T14:41:25Z'
+ tag_name: alpha-4593.0.0
+ tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/alpha-4593.0.0
+ target_commitish: main
+ updated_at: '2026-01-27T14:41:25Z'
+ upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330007/assets{?name,label}
+ url: https://api.github.com/repos/flatcar/scripts/releases/280330007
+ zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/alpha-4593.0.0
+image_packages:
+ containerd: 2.1.5
+ docker: 28.0.4
+ ignition: 2.24.0
+ kernel: 6.12.66
+ systemd: '257'
+release: 4593.0.0
+version: 4593.0.0
diff --git a/data/releases/alpha/current.yml b/data/releases/alpha/current.yml
index b8e1fce1..4e82fb1f 100644
--- a/data/releases/alpha/current.yml
+++ b/data/releases/alpha/current.yml
@@ -4,167 +4,183 @@ architectures:
channel: alpha
github_release:
assets: []
- assets_url: https://api.github.com/repos/flatcar/scripts/releases/271479737/assets
+ assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330007/assets
author:
- avatar_url: https://avatars.githubusercontent.com/u/1449761?v=4
- events_url: https://api.github.com/users/danzatt/events{/privacy}
- followers_url: https://api.github.com/users/danzatt/followers
- following_url: https://api.github.com/users/danzatt/following{/other_user}
- gists_url: https://api.github.com/users/danzatt/gists{/gist_id}
+ avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4
+ events_url: https://api.github.com/users/tormath1/events{/privacy}
+ followers_url: https://api.github.com/users/tormath1/followers
+ following_url: https://api.github.com/users/tormath1/following{/other_user}
+ gists_url: https://api.github.com/users/tormath1/gists{/gist_id}
gravatar_id: ''
- html_url: https://github.com/danzatt
- id: 1449761
- login: danzatt
- node_id: MDQ6VXNlcjE0NDk3NjE=
- organizations_url: https://api.github.com/users/danzatt/orgs
- received_events_url: https://api.github.com/users/danzatt/received_events
- repos_url: https://api.github.com/users/danzatt/repos
+ html_url: https://github.com/tormath1
+ id: 28657343
+ login: tormath1
+ node_id: MDQ6VXNlcjI4NjU3MzQz
+ organizations_url: https://api.github.com/users/tormath1/orgs
+ received_events_url: https://api.github.com/users/tormath1/received_events
+ repos_url: https://api.github.com/users/tormath1/repos
site_admin: false
- starred_url: https://api.github.com/users/danzatt/starred{/owner}{/repo}
- subscriptions_url: https://api.github.com/users/danzatt/subscriptions
+ starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo}
+ subscriptions_url: https://api.github.com/users/tormath1/subscriptions
type: User
- url: https://api.github.com/users/danzatt
+ url: https://api.github.com/users/tormath1
user_view_type: public
- body: "_Changes since **Alpha 4515.0.1**_\r\n \r\n #### Security fixes:\r\n \r\n\
- \ - Linux ([CVE-2025-40275](https://nvd.nist.gov/vuln/detail/CVE-2025-40275),\
- \ [CVE-2025-40274](https://nvd.nist.gov/vuln/detail/CVE-2025-40274), [CVE-2025-40273](https://nvd.nist.gov/vuln/detail/CVE-2025-40273),\
- \ [CVE-2025-40272](https://nvd.nist.gov/vuln/detail/CVE-2025-40272), [CVE-2025-40271](https://nvd.nist.gov/vuln/detail/CVE-2025-40271),\
- \ [CVE-2025-40289](https://nvd.nist.gov/vuln/detail/CVE-2025-40289), [CVE-2025-40288](https://nvd.nist.gov/vuln/detail/CVE-2025-40288),\
- \ [CVE-2025-40287](https://nvd.nist.gov/vuln/detail/CVE-2025-40287), [CVE-2025-40269](https://nvd.nist.gov/vuln/detail/CVE-2025-40269),\
- \ [CVE-2025-40286](https://nvd.nist.gov/vuln/detail/CVE-2025-40286), [CVE-2025-40285](https://nvd.nist.gov/vuln/detail/CVE-2025-40285),\
- \ [CVE-2025-40284](https://nvd.nist.gov/vuln/detail/CVE-2025-40284), [CVE-2025-40283](https://nvd.nist.gov/vuln/detail/CVE-2025-40283),\
- \ [CVE-2025-40282](https://nvd.nist.gov/vuln/detail/CVE-2025-40282), [CVE-2025-40281](https://nvd.nist.gov/vuln/detail/CVE-2025-40281),\
- \ [CVE-2025-40280](https://nvd.nist.gov/vuln/detail/CVE-2025-40280), [CVE-2025-40279](https://nvd.nist.gov/vuln/detail/CVE-2025-40279),\
- \ [CVE-2025-40278](https://nvd.nist.gov/vuln/detail/CVE-2025-40278), [CVE-2025-40277](https://nvd.nist.gov/vuln/detail/CVE-2025-40277),\
- \ [CVE-2025-40268](https://nvd.nist.gov/vuln/detail/CVE-2025-40268), [CVE-2025-40214](https://nvd.nist.gov/vuln/detail/CVE-2025-40214),\
- \ [CVE-2025-40212](https://nvd.nist.gov/vuln/detail/CVE-2025-40212), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087),\
- \ [CVE-2024-57879](https://nvd.nist.gov/vuln/detail/CVE-2024-57879), [CVE-2024-57880](https://nvd.nist.gov/vuln/detail/CVE-2024-57880),\
- \ [CVE-2024-55642](https://nvd.nist.gov/vuln/detail/CVE-2024-55642), [CVE-2024-55641](https://nvd.nist.gov/vuln/detail/CVE-2024-55641),\
- \ [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683),\
- \ [CVE-2024-54460](https://nvd.nist.gov/vuln/detail/CVE-2024-54460), [CVE-2024-54191](https://nvd.nist.gov/vuln/detail/CVE-2024-54191),\
- \ [CVE-2024-53689](https://nvd.nist.gov/vuln/detail/CVE-2024-53689), [CVE-2024-53682](https://nvd.nist.gov/vuln/detail/CVE-2024-53682),\
- \ [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770),\
- \ [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660),\
- \ [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658),\
- \ [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56656](https://nvd.nist.gov/vuln/detail/CVE-2024-56656),\
- \ [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675),\
- \ [CVE-2024-56674](https://nvd.nist.gov/vuln/detail/CVE-2024-56674), [CVE-2024-56673](https://nvd.nist.gov/vuln/detail/CVE-2024-56673),\
- \ [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654),\
- \ [CVE-2024-56671](https://nvd.nist.gov/vuln/detail/CVE-2024-56671), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670),\
- \ [CVE-2024-56669](https://nvd.nist.gov/vuln/detail/CVE-2024-56669), [CVE-2024-56668](https://nvd.nist.gov/vuln/detail/CVE-2024-56668),\
- \ [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56666](https://nvd.nist.gov/vuln/detail/CVE-2024-56666),\
- \ [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664),\
- \ [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662),\
- \ [CVE-2024-56652](https://nvd.nist.gov/vuln/detail/CVE-2024-56652), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653),\
- \ [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240),\
- \ [CVE-2025-40261](https://nvd.nist.gov/vuln/detail/CVE-2025-40261), [CVE-2025-40266](https://nvd.nist.gov/vuln/detail/CVE-2025-40266),\
- \ [CVE-2025-40264](https://nvd.nist.gov/vuln/detail/CVE-2025-40264), [CVE-2025-40263](https://nvd.nist.gov/vuln/detail/CVE-2025-40263),\
- \ [CVE-2025-40262](https://nvd.nist.gov/vuln/detail/CVE-2025-40262), [CVE-2025-40254](https://nvd.nist.gov/vuln/detail/CVE-2025-40254),\
- \ [CVE-2025-40253](https://nvd.nist.gov/vuln/detail/CVE-2025-40253), [CVE-2025-40252](https://nvd.nist.gov/vuln/detail/CVE-2025-40252),\
- \ [CVE-2025-40251](https://nvd.nist.gov/vuln/detail/CVE-2025-40251), [CVE-2025-40250](https://nvd.nist.gov/vuln/detail/CVE-2025-40250),\
- \ [CVE-2025-40259](https://nvd.nist.gov/vuln/detail/CVE-2025-40259), [CVE-2025-40258](https://nvd.nist.gov/vuln/detail/CVE-2025-40258),\
- \ [CVE-2025-40257](https://nvd.nist.gov/vuln/detail/CVE-2025-40257), [CVE-2025-40246](https://nvd.nist.gov/vuln/detail/CVE-2025-40246),\
- \ [CVE-2025-40248](https://nvd.nist.gov/vuln/detail/CVE-2025-40248), [CVE-2025-40345](https://nvd.nist.gov/vuln/detail/CVE-2025-40345))\r\
- \n - coreutils ([CVE-2025-5278](https://www.cve.org/CVERecord?id=CVE-2025-5278))\r\
- \n - go ([CVE-2025-47912](https://www.cve.org/CVERecord?id=CVE-2025-47912), [CVE-2025-58183](https://www.cve.org/CVERecord?id=CVE-2025-58183),\
- \ [CVE-2025-58185](https://www.cve.org/CVERecord?id=CVE-2025-58185), [CVE-2025-58186](https://www.cve.org/CVERecord?id=CVE-2025-58186),\
- \ [CVE-2025-58187](https://www.cve.org/CVERecord?id=CVE-2025-58187), [CVE-2025-58188](https://www.cve.org/CVERecord?id=CVE-2025-58188),\
- \ [CVE-2025-58189](https://www.cve.org/CVERecord?id=CVE-2025-58189), [CVE-2025-61723](https://www.cve.org/CVERecord?id=CVE-2025-61723),\
- \ [CVE-2025-61724](https://www.cve.org/CVERecord?id=CVE-2025-61724), [CVE-2025-61725](https://www.cve.org/CVERecord?id=CVE-2025-61725))\r\
- \n - pam ([CVE-2024-22365](https://nvd.nist.gov/vuln/detail/CVE-2024-22365), [CVE-2024-10041](https://nvd.nist.gov/vuln/detail/CVE-2024-10041),\
- \ [CVE-2024-10963](https://nvd.nist.gov/vuln/detail/CVE-2024-10963), [CVE-2025-6020](https://nvd.nist.gov/vuln/detail/CVE-2025-6020))\r\
- \n \r\n #### Bug fixes:\r\n \r\n - Dropped debug symbols from containerd, incus,\
- \ and overlaybd system extensions to reduce download size.\r\n \r\n #### Changes:\r\
- \n \r\n - `/etc/shadow`, `/etc/gshadow` are now owned by the `shadow` group, `/usr/bin/unix_chkpwd`,\
- \ `/usr/bin/chage` and `/usr/bin/expiry` are now also owned by the `shadow` group\
- \ with a sticky bit enabled.\r\n \r\n #### Updates:\r\n \r\n- Linux ([6.12.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61)\
- \ (includes [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59),\
- \ [6.12.60](https://lwn.net/Articles/1048757)))\r\n- Linux firmware ([20251125](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251125)\
- \ (includes [20251111](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251111)))\r\
- \n- base, dev: btrfs-progs ([6.17](https://github.com/kdave/btrfs-progs/releases/tag/v6.17))\r\
- \n- base, dev: cifs-utils ([7.4](https://lwn.net/Articles/1024956/))\r\n- base,\
- \ dev: coreutils ([9.8](https://lists.gnu.org/archive/html/info-gnu/2025-09/msg00005.html))\r\
- \n- base, dev: hwdata ([0.400](https://github.com/vcrhonek/hwdata/releases/tag/v0.400)\
- \ (includes [0.399](https://github.com/vcrhonek/hwdata/releases/tag/v0.399)))\r\
- \n- base, dev: inih ([62](https://github.com/benhoyt/inih/releases/tag/r62) (includes\
- \ [61](https://github.com/benhoyt/inih/releases/tag/r61)))\r\n- base, dev: intel-microcode\
- \ ([20251111_p20251112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111))\r\
- \n- base, dev: iproute2 ([6.17.0](https://lore.kernel.org/all/20250929095042.48200315@hermes.local/))\r\
- \n- base, dev: jose ([14](https://github.com/latchset/jose/releases/tag/v14) (includes\
- \ [13](https://github.com/latchset/jose/releases/tag/v13)))\r\n- base, dev: kbd\
- \ ([2.9.0](https://github.com/legionus/kbd/releases/tag/v2.9.0))\r\n- base, dev:\
- \ less ([685](https://greenwoodsoftware.com/less/news.685.html))\r\n- base, dev:\
- \ libgpg-error ([1.56](https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.56))\r\
- \n- base, dev: libtirpc ([1.3.7](https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-7))\r\
- \n- base, dev: openssl ([3.5.4](https://github.com/openssl/openssl/releases/tag/openssl-3.5.4)\
- \ (includes [3.5.0](https://github.com/openssl/openssl/releases/tag/openssl-3.5.0),\
- \ [3.5.1](https://github.com/openssl/openssl/releases/tag/openssl-3.5.1), [3.5.2](https://github.com/openssl/openssl/releases/tag/openssl-3.5.2),\
- \ [3.5.3](https://github.com/openssl/openssl/releases/tag/openssl-3.5.3)))\r\n\
- - base, dev: pam ([1.7.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.1)\
- \ (includes [1.6.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0),\
- \ [1.6.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.1), [1.7.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.0)))\r\
- \n- base, dev: pambase ([20251013](https://gitweb.gentoo.org/proj/pambase.git/log/?h=pambase-20251013))\r\
- \n- base, dev: samba ([4.22.5](https://www.samba.org/samba/history/samba-4.22.5.html)\
- \ (includes [4.22.4](https://www.samba.org/samba/history/samba-4.22.4.html)))\r\
- \n- base, dev: strace ([6.17](https://github.com/strace/strace/releases/tag/v6.17))\r\
- \n- base, dev: thin-provisioning-tools ([1.3.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.3.0/CHANGES)\
- \ (includes [1.0.11](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.11/CHANGES),\
- \ [1.0.12](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.12/CHANGES),\
- \ [1.0.13](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.13/CHANGES),\
- \ [1.0.14](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.14/CHANGES),\
- \ [1.1.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.1.0/CHANGES),\
- \ [1.2.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.0/CHANGES),\
- \ [1.2.1](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.1/CHANGES),\
- \ [1.2.2](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.2/CHANGES)))\r\
- \n- base, dev: util-linux ([2.41.2](https://github.com/util-linux/util-linux/blob/v2.41.2/Documentation/releases/v2.41.2-ReleaseNotes))\r\
- \n- ca-certificates ([3.119](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html)\
- \ (includes [3.118.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html)))\r\
- \n- dev: portage ([3.0.69.3](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.3)\
- \ (includes [3.0.69](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69),\
- \ [3.0.69.1](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.1),\
- \ [3.0.69.2](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.2)))\r\
- \n- ignition ([2.24.0](https://coreos.github.io/ignition/release-notes/#ignition-2240-2024-10-14))\r\
- \n- sdk: cmake ([4.1.2](https://cmake.org/cmake/help/v4.1/release/4.1.html#id22)\
- \ (includes [4.0](https://cmake.org/cmake/help/v4.0/release/4.0.html), [4.1](https://cmake.org/cmake/help/v4.1/release/4.1.html),\
- \ [4.1.1](https://cmake.org/cmake/help/v4.1/release/4.1.html#id21)))\r\n- sdk:\
- \ go ([1.25.3](https://go.dev/doc/devel/release#go1.25.minor))\r\n- sdk: meson\
- \ ([1.9.1](https://mesonbuild.com/Release-notes-for-1-9-0.html) (includes [1.8.0](https://mesonbuild.com/Release-notes-for-1-8-0.html)))\r\
- \n- sdk: nasm ([3.01](https://www.nasm.us/docs/3.01/nasmac.html) (includes [3.00](https://www.nasm.us/docs/3.00/nasmac.html)))\r\
- \n- sysext-overlaybd: overlaybd ([1.0.16](https://github.com/containerd/overlaybd/releases/tag/v1.0.16))\r\
- \n- sysext-podman: aardvark-dns ([1.15.0](https://github.com/containers/aardvark-dns/releases/tag/v1.15.0))\r\
- \n- sysext-podman: netavark ([1.16.1](https://github.com/containers/netavark/releases/tag/v1.16.1)\
- \ (includes [1.16.0](https://github.com/containers/netavark/releases/tag/v1.16.0)))\r\
- \n- sysext-python: more-itertools ([10.8.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.8.0))\r\
- \n- sysext-python: platformdirs ([4.5.0](https://github.com/tox-dev/platformdirs/releases/tag/4.5.0))\r\
- \n- sysext-python: resolvelib ([1.2.1](https://raw.githubusercontent.com/sarugaku/resolvelib/refs/tags/1.2.1/CHANGELOG.rst))\r\
- \n- sysext-python: rich ([14.2.0](https://github.com/Textualize/rich/releases/tag/v14.2.0))\r\
- \n- sysext-python: setuptools-scm ([9.2.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.2.0)\
- \ (includes [9.0.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.0.0),\
- \ [9.1.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.1.0)))\r\n- sysext-python:\
- \ trove-classifiers ([2025.9.11.17](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.11.17)\
- \ (includes [2025.9.8.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.8.13),\
- \ 2025.9.9.12))"
- created_at: '2025-12-15T17:45:26Z'
+ body: "_Changes since **Alpha 4547.0.0**_\r\n\r\n#### Security fixes:\r\n\r\n- Linux\
+ \ ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\
+ \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\
+ \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\
+ \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\
+ \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\
+ \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\
+ \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\
+ \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\
+ \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\
+ \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\
+ \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\
+ \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\
+ \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\
+ \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\
+ \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\
+ \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\
+ \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\
+ \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\
+ \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\
+ \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\
+ \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\
+ \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\
+ \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\
+ \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\
+ \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\
+ \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\
+ \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\
+ \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\
+ \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\
+ \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\
+ \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\
+ \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\
+ \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\
+ \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\
+ \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\
+ \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\
+ \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\
+ \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\
+ \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\
+ \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\
+ \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\
+ \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\
+ \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\
+ \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\
+ \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\
+ \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\
+ \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\
+ \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\
+ \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\
+ \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\
+ \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\
+ \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\
+ \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\
+ \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\
+ \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\
+ \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\
+ \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\
+ \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\
+ \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\
+ \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\
+ \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\
+ \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\
+ \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\
+ \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\
+ \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\
+ \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\
+ \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\
+ \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\
+ \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\
+ \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\
+ \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\
+ \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\
+ \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\
+ \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\
+ \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\
+ \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\
+ \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\
+ \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\
+ \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\
+ \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\
+ \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\
+ \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\
+ \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\
+ \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\
+ \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\
+ \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\
+ \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\
+ \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\
+ \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\
+ \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\
+ \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\
+ \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\
+ \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\
+ \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\
+ \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\
+ \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\
+ \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\
+ \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\
+ \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- gnupg\
+ \ ([CVE-2025-68972](https://www.cve.org/CVERecord/?id=CVE-2025-68972), [CVE-2025-68973](https://www.cve.org/CVERecord/?id=CVE-2025-68973),\
+ \ [gnupg-20251228-notdash](https://gpg.fail/notdash))\r\n- openssl ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\
+ \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\
+ \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\
+ \ [CVE-2025-15469](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469),\
+ \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\
+ \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\
+ \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\
+ \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\
+ \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\
+ \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\
+ \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\
+ \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\
+ \n\r\n\r\n#### Changes:\r\n\r\n- Dropped Ciphers, MACs, and KexAlgorithms from\
+ \ the sshd configuration so that the OpenSSH upstream defaults are used. This\
+ \ introduces post-quantum key exchange algorithms for better security. ([Flatcar#1921](https://github.com/flatcar/Flatcar/issues/1921)).\
+ \ Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable\
+ \ this by deploying a custom drop-in config to `/etc/ssh/sshd_config.d/`.\r\n\
+ - Enabled netkit module ([scripts#3524](https://github.com/flatcar/scripts/pull/3524))\r\
+ \n\r\n#### Updates:\r\n\r\n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\
+ \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\
+ \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\
+ \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\
+ \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62)))\r\
+ \n- base, dev: gnupg ([2.5.16](https://lists.gnupg.org/pipermail/gnupg-announce/2025q4/000500.html)\
+ \ (includes [2.5](https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00005.html)))\r\
+ \n- base, dev: libgpg-error ([1.57](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob_plain;f=NEWS;h=52ac1464a0c0af091a3d69e8c5f2f3afa2cc3c9f;hb=39d7b85a7d69975f1dfec5a0add10b4d57dcfc9e))\r\
+ \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\
+ \n- dracut ([109](https://github.com/dracut-ng/dracut-ng/releases/tag/109) (includes\
+ \ [108](https://github.com/dracut-ng/dracut-ng/releases/tag/108), [107](https://github.com/dracut-ng/dracut-ng/releases/tag/107)))\r\
+ \n- etcdctl ([3.5.18](https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md#v3518-2025-01-24))\r\
+ \n- sysext-podman: gpgme ([2.0.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=1fd34dbd9143829e9163d402ab0191a9fc6adab2;hb=e4adebe020b07bc47e583817576ce98ca93e9711))\r\
+ \n- openssl ([3.5.5](https://github.com/openssl/openssl/releases/tag/openssl-3.5.5))\r\
+ \n- sysext-python: python ([3.12.12](https://www.python.org/downloads/release/python-31212/)\
+ \ (includes [3.12.0](https://www.python.org/downloads/release/python-3120/)))"
+ created_at: '2026-01-23T13:53:51Z'
draft: false
- html_url: https://github.com/flatcar/scripts/releases/tag/alpha-4547.0.0
- id: 271479737
+ html_url: https://github.com/flatcar/scripts/releases/tag/alpha-4593.0.0
+ id: 280330007
immutable: false
- name: alpha-4547.0.0
- node_id: RE_kwDOB2MTHs4QLnO5
+ name: ''
+ node_id: RE_kwDOB2MTHs4QtX8X
prerelease: false
- published_at: '2025-12-18T15:22:47Z'
- tag_name: alpha-4547.0.0
- tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/alpha-4547.0.0
+ published_at: '2026-01-27T14:41:25Z'
+ tag_name: alpha-4593.0.0
+ tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/alpha-4593.0.0
target_commitish: main
- updated_at: '2025-12-18T15:22:47Z'
- upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/271479737/assets{?name,label}
- url: https://api.github.com/repos/flatcar/scripts/releases/271479737
- zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/alpha-4547.0.0
+ updated_at: '2026-01-27T14:41:25Z'
+ upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330007/assets{?name,label}
+ url: https://api.github.com/repos/flatcar/scripts/releases/280330007
+ zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/alpha-4593.0.0
image_packages:
containerd: 2.1.5
docker: 28.0.4
ignition: 2.24.0
- kernel: 6.12.61
+ kernel: 6.12.66
systemd: '257'
release: current
-version: 4547.0.0
+version: 4593.0.0
diff --git a/data/releases/beta/4547.1.0.yml b/data/releases/beta/4547.1.0.yml
new file mode 100644
index 00000000..e6a40f45
--- /dev/null
+++ b/data/releases/beta/4547.1.0.yml
@@ -0,0 +1,248 @@
+architectures:
+- amd64
+- arm64
+channel: beta
+github_release:
+ assets: []
+ assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330266/assets
+ author:
+ avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4
+ events_url: https://api.github.com/users/tormath1/events{/privacy}
+ followers_url: https://api.github.com/users/tormath1/followers
+ following_url: https://api.github.com/users/tormath1/following{/other_user}
+ gists_url: https://api.github.com/users/tormath1/gists{/gist_id}
+ gravatar_id: ''
+ html_url: https://github.com/tormath1
+ id: 28657343
+ login: tormath1
+ node_id: MDQ6VXNlcjI4NjU3MzQz
+ organizations_url: https://api.github.com/users/tormath1/orgs
+ received_events_url: https://api.github.com/users/tormath1/received_events
+ repos_url: https://api.github.com/users/tormath1/repos
+ site_admin: false
+ starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo}
+ subscriptions_url: https://api.github.com/users/tormath1/subscriptions
+ type: User
+ url: https://api.github.com/users/tormath1
+ user_view_type: public
+ body: "_Changes since **Beta 4515.1.0**_\r\n\r\n#### Security fixes:\r\n\r\n- Linux\
+ \ ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\
+ \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\
+ \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\
+ \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\
+ \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\
+ \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\
+ \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\
+ \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\
+ \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\
+ \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\
+ \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\
+ \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\
+ \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\
+ \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\
+ \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\
+ \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\
+ \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\
+ \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\
+ \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\
+ \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\
+ \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\
+ \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\
+ \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\
+ \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\
+ \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\
+ \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\
+ \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\
+ \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\
+ \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\
+ \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\
+ \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\
+ \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\
+ \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\
+ \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\
+ \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\
+ \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\
+ \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\
+ \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\
+ \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\
+ \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\
+ \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\
+ \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\
+ \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\
+ \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\
+ \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\
+ \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\
+ \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\
+ \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\
+ \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\
+ \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\
+ \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\
+ \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\
+ \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\
+ \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\
+ \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\
+ \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\
+ \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\
+ \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\
+ \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\
+ \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\
+ \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\
+ \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\
+ \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\
+ \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\
+ \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\
+ \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\
+ \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\
+ \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\
+ \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\
+ \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\
+ \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\
+ \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\
+ \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\
+ \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\
+ \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\
+ \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\
+ \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\
+ \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\
+ \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\
+ \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\
+ \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\
+ \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\
+ \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\
+ \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\
+ \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\
+ \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\
+ \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\
+ \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\
+ \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\
+ \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\
+ \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\
+ \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\
+ \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\
+ \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\
+ \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\
+ \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\
+ \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\
+ \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\
+ \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- coreutils\
+ \ ([CVE-2025-5278](https://www.cve.org/CVERecord?id=CVE-2025-5278))\r\n- go ([CVE-2025-47912](https://www.cve.org/CVERecord?id=CVE-2025-47912),\
+ \ [CVE-2025-58183](https://www.cve.org/CVERecord?id=CVE-2025-58183), [CVE-2025-58185](https://www.cve.org/CVERecord?id=CVE-2025-58185),\
+ \ [CVE-2025-58186](https://www.cve.org/CVERecord?id=CVE-2025-58186), [CVE-2025-58187](https://www.cve.org/CVERecord?id=CVE-2025-58187),\
+ \ [CVE-2025-58188](https://www.cve.org/CVERecord?id=CVE-2025-58188), [CVE-2025-58189](https://www.cve.org/CVERecord?id=CVE-2025-58189),\
+ \ [CVE-2025-61723](https://www.cve.org/CVERecord?id=CVE-2025-61723), [CVE-2025-61724](https://www.cve.org/CVERecord?id=CVE-2025-61724),\
+ \ [CVE-2025-61725](https://www.cve.org/CVERecord?id=CVE-2025-61725))\r\n- pam\
+ \ ([CVE-2024-22365](https://nvd.nist.gov/vuln/detail/CVE-2024-22365), [CVE-2024-10041](https://nvd.nist.gov/vuln/detail/CVE-2024-10041),\
+ \ [CVE-2024-10963](https://nvd.nist.gov/vuln/detail/CVE-2024-10963), [CVE-2025-6020](https://nvd.nist.gov/vuln/detail/CVE-2025-6020))\r\
+ \n- openssl ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\
+ \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\
+ \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\
+ \ [CVE-2025-15469](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469),\
+ \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\
+ \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\
+ \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\
+ \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\
+ \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\
+ \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\
+ \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\
+ \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\
+ \n\r\n\r\n#### Bug fixes:\r\n\r\n- Dropped debug symbols from containerd, incus,\
+ \ and overlaybd system extensions to reduce download size.\r\n\r\n#### Changes:\r\
+ \n\r\n- Dropped Ciphers, MACs, and KexAlgorithms from the sshd configuration so\
+ \ that the OpenSSH upstream defaults are used. This introduces post-quantum key\
+ \ exchange algorithms for better security. ([Flatcar#1921](https://github.com/flatcar/Flatcar/issues/1921)).\
+ \ Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable\
+ \ this by deploying a custom drop-in config to `/etc/ssh/sshd_config.d/`.\r\n\
+ - `/etc/shadow`, `/etc/gshadow` are now owned by the `shadow` group, `/usr/bin/unix_chkpwd`,\
+ \ `/usr/bin/chage` and `/usr/bin/expiry` are now also owned by the `shadow` group\
+ \ with a sticky bit enabled.\r\n\r\n#### Updates:\r\n\r\n- Ignition ([2.24.0](https://coreos.github.io/ignition/release-notes/#ignition-2240-2024-10-14))\r\
+ \n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\
+ \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\
+ \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\
+ \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\
+ \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62),\
+ \ [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59)))\r\
+ \n- Linux Firmware ([20251125](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251125)\
+ \ (includes [20251111](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251111)))\r\
+ \n- SDK: cmake ([4.1.2](https://cmake.org/cmake/help/v4.1/release/4.1.html#id22)\
+ \ (includes [4.1.1](https://cmake.org/cmake/help/v4.1/release/4.1.html#id21),\
+ \ [4.1](https://cmake.org/cmake/help/v4.1/release/4.1.html), [4.0](https://cmake.org/cmake/help/v4.0/release/4.0.html)))\r\
+ \n- SDK: go ([1.25.3](https://go.dev/doc/devel/release#go1.25.minor))\r\n- SDK:\
+ \ meson ([1.9.1](https://mesonbuild.com/Release-notes-for-1-9-0.html) (includes\
+ \ [1.8.0](https://mesonbuild.com/Release-notes-for-1-8-0.html)))\r\n- SDK: nasm\
+ \ ([3.01](https://www.nasm.us/docs/3.01/nasmac.html) (includes [3.00](https://www.nasm.us/docs/3.00/nasmac.html)))\r\
+ \n- base, dev: btrfs-progs ([6.17](https://github.com/kdave/btrfs-progs/releases/tag/v6.17))\r\
+ \n- base, dev: cifs-utils ([7.4](https://lwn.net/Articles/1024956/))\r\n- base,\
+ \ dev: coreutils ([9.8](https://lists.gnu.org/archive/html/info-gnu/2025-09/msg00005.html))\r\
+ \n- base, dev: hwdata ([0.400](https://github.com/vcrhonek/hwdata/releases/tag/v0.400)\
+ \ (includes [0.399](https://github.com/vcrhonek/hwdata/releases/tag/v0.399)))\r\
+ \n- base, dev: inih ([62](https://github.com/benhoyt/inih/releases/tag/r62) (includes\
+ \ [61](https://github.com/benhoyt/inih/releases/tag/r61)))\r\n- base, dev: intel-microcode\
+ \ ([20251111_p20251112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111))\r\
+ \n- base, dev: iproute2 ([6.17.0](https://lore.kernel.org/all/20250929095042.48200315@hermes.local/))\r\
+ \n- base, dev: jose ([14](https://github.com/latchset/jose/releases/tag/v14) (includes\
+ \ [13](https://github.com/latchset/jose/releases/tag/v13)))\r\n- base, dev: kbd\
+ \ ([2.9.0](https://github.com/legionus/kbd/releases/tag/v2.9.0))\r\n- base, dev:\
+ \ less ([685](https://greenwoodsoftware.com/less/news.685.html))\r\n- base, dev:\
+ \ libgpg-error ([1.56](https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.56))\r\
+ \n- base, dev: libtirpc ([1.3.7](https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-7))\r\
+ \n- base, dev: pam ([1.7.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.1)\
+ \ (includes [1.7.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.0),\
+ \ [1.6.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.1), [1.6.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0)))\r\
+ \n- base, dev: pambase ([20251013](https://gitweb.gentoo.org/proj/pambase.git/log/?h=pambase-20251013))\r\
+ \n- base, dev: samba ([4.22.5](https://www.samba.org/samba/history/samba-4.22.5.html)\
+ \ (includes [4.22.4](https://www.samba.org/samba/history/samba-4.22.4.html)))\r\
+ \n- base, dev: strace ([6.17](https://github.com/strace/strace/releases/tag/v6.17))\r\
+ \n- base, dev: thin-provisioning-tools ([1.3.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.3.0/CHANGES)\
+ \ (includes [1.2.2](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.2/CHANGES),\
+ \ [1.2.1](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.1/CHANGES),\
+ \ [1.2.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.0/CHANGES),\
+ \ [1.1.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.1.0/CHANGES),\
+ \ [1.0.14](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.14/CHANGES),\
+ \ [1.0.13](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.13/CHANGES),\
+ \ [1.0.12](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.12/CHANGES),\
+ \ [1.0.11](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.11/CHANGES)))\r\
+ \n- base, dev: util-linux ([2.41.2](https://github.com/util-linux/util-linux/blob/v2.41.2/Documentation/releases/v2.41.2-ReleaseNotes))\r\
+ \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\
+ \n- dev: portage ([3.0.69.3](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.3)\
+ \ (includes [3.0.69.2](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.2),\
+ \ [3.0.69.1](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.1),\
+ \ [3.0.69](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69)))\r\
+ \n- sysext-overlaybd: overlaybd ([1.0.16](https://github.com/containerd/overlaybd/releases/tag/v1.0.16))\r\
+ \n- sysext-podman: aardvark-dns ([1.15.0](https://github.com/containers/aardvark-dns/releases/tag/v1.15.0))\r\
+ \n- sysext-podman: netavark ([1.16.1](https://github.com/containers/netavark/releases/tag/v1.16.1)\
+ \ (includes [1.16.0](https://github.com/containers/netavark/releases/tag/v1.16.0)))\r\
+ \n- sysext-python: more-itertools ([10.8.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.8.0))\r\
+ \n- sysext-python: platformdirs ([4.5.0](https://github.com/tox-dev/platformdirs/releases/tag/4.5.0))\r\
+ \n- sysext-python: resolvelib ([1.2.1](https://raw.githubusercontent.com/sarugaku/resolvelib/refs/tags/1.2.1/CHANGELOG.rst))\r\
+ \n- sysext-python: rich ([14.2.0](https://github.com/Textualize/rich/releases/tag/v14.2.0))\r\
+ \n- sysext-python: setuptools-scm ([9.2.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.2.0)\
+ \ (includes [9.1.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.1.0),\
+ \ [9.0.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.0.0)))\r\n- sysext-python:\
+ \ trove-classifiers ([2025.9.11.17](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.11.17)\
+ \ (includes [2025.9.9.12](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.9.12),\
+ \ [2025.9.8.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.8.13)))\r\
+ \n- openssl ([3.5.5](https://github.com/openssl/openssl/releases/tag/openssl-3.5.5))"
+ created_at: '2026-01-23T13:55:34Z'
+ draft: false
+ html_url: https://github.com/flatcar/scripts/releases/tag/beta-4547.1.0
+ id: 280330266
+ immutable: false
+ name: ''
+ node_id: RE_kwDOB2MTHs4QtYAa
+ prerelease: false
+ published_at: '2026-01-27T14:42:03Z'
+ tag_name: beta-4547.1.0
+ tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/beta-4547.1.0
+ target_commitish: main
+ updated_at: '2026-01-27T14:42:03Z'
+ upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330266/assets{?name,label}
+ url: https://api.github.com/repos/flatcar/scripts/releases/280330266
+ zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/beta-4547.1.0
+image_packages:
+ containerd: 2.1.5
+ docker: 28.0.4
+ ignition: 2.24.0
+ kernel: 6.12.66
+ systemd: '257'
+release: 4547.1.0
+version: 4547.1.0
diff --git a/data/releases/beta/current.yml b/data/releases/beta/current.yml
index 64d3a8e4..9e8efc95 100644
--- a/data/releases/beta/current.yml
+++ b/data/releases/beta/current.yml
@@ -4,279 +4,245 @@ architectures:
channel: beta
github_release:
assets: []
- assets_url: https://api.github.com/repos/flatcar/scripts/releases/271478085/assets
+ assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330266/assets
author:
- avatar_url: https://avatars.githubusercontent.com/u/1449761?v=4
- events_url: https://api.github.com/users/danzatt/events{/privacy}
- followers_url: https://api.github.com/users/danzatt/followers
- following_url: https://api.github.com/users/danzatt/following{/other_user}
- gists_url: https://api.github.com/users/danzatt/gists{/gist_id}
+ avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4
+ events_url: https://api.github.com/users/tormath1/events{/privacy}
+ followers_url: https://api.github.com/users/tormath1/followers
+ following_url: https://api.github.com/users/tormath1/following{/other_user}
+ gists_url: https://api.github.com/users/tormath1/gists{/gist_id}
gravatar_id: ''
- html_url: https://github.com/danzatt
- id: 1449761
- login: danzatt
- node_id: MDQ6VXNlcjE0NDk3NjE=
- organizations_url: https://api.github.com/users/danzatt/orgs
- received_events_url: https://api.github.com/users/danzatt/received_events
- repos_url: https://api.github.com/users/danzatt/repos
+ html_url: https://github.com/tormath1
+ id: 28657343
+ login: tormath1
+ node_id: MDQ6VXNlcjI4NjU3MzQz
+ organizations_url: https://api.github.com/users/tormath1/orgs
+ received_events_url: https://api.github.com/users/tormath1/received_events
+ repos_url: https://api.github.com/users/tormath1/repos
site_admin: false
- starred_url: https://api.github.com/users/danzatt/starred{/owner}{/repo}
- subscriptions_url: https://api.github.com/users/danzatt/subscriptions
+ starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo}
+ subscriptions_url: https://api.github.com/users/tormath1/subscriptions
type: User
- url: https://api.github.com/users/danzatt
+ url: https://api.github.com/users/tormath1
user_view_type: public
- body: "_Changes since **Alpha 4515.0.1**_\r\n \r\n #### Security fixes:\r\n \r\n\
- \ - Linux ([CVE-2025-40275](https://nvd.nist.gov/vuln/detail/CVE-2025-40275),\
- \ [CVE-2025-40274](https://nvd.nist.gov/vuln/detail/CVE-2025-40274), [CVE-2025-40273](https://nvd.nist.gov/vuln/detail/CVE-2025-40273),\
- \ [CVE-2025-40272](https://nvd.nist.gov/vuln/detail/CVE-2025-40272), [CVE-2025-40271](https://nvd.nist.gov/vuln/detail/CVE-2025-40271),\
- \ [CVE-2025-40289](https://nvd.nist.gov/vuln/detail/CVE-2025-40289), [CVE-2025-40288](https://nvd.nist.gov/vuln/detail/CVE-2025-40288),\
- \ [CVE-2025-40287](https://nvd.nist.gov/vuln/detail/CVE-2025-40287), [CVE-2025-40269](https://nvd.nist.gov/vuln/detail/CVE-2025-40269),\
- \ [CVE-2025-40286](https://nvd.nist.gov/vuln/detail/CVE-2025-40286), [CVE-2025-40285](https://nvd.nist.gov/vuln/detail/CVE-2025-40285),\
- \ [CVE-2025-40284](https://nvd.nist.gov/vuln/detail/CVE-2025-40284), [CVE-2025-40283](https://nvd.nist.gov/vuln/detail/CVE-2025-40283),\
- \ [CVE-2025-40282](https://nvd.nist.gov/vuln/detail/CVE-2025-40282), [CVE-2025-40281](https://nvd.nist.gov/vuln/detail/CVE-2025-40281),\
- \ [CVE-2025-40280](https://nvd.nist.gov/vuln/detail/CVE-2025-40280), [CVE-2025-40279](https://nvd.nist.gov/vuln/detail/CVE-2025-40279),\
- \ [CVE-2025-40278](https://nvd.nist.gov/vuln/detail/CVE-2025-40278), [CVE-2025-40277](https://nvd.nist.gov/vuln/detail/CVE-2025-40277),\
- \ [CVE-2025-40268](https://nvd.nist.gov/vuln/detail/CVE-2025-40268), [CVE-2025-40214](https://nvd.nist.gov/vuln/detail/CVE-2025-40214),\
- \ [CVE-2025-40212](https://nvd.nist.gov/vuln/detail/CVE-2025-40212), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087),\
- \ [CVE-2024-57879](https://nvd.nist.gov/vuln/detail/CVE-2024-57879), [CVE-2024-57880](https://nvd.nist.gov/vuln/detail/CVE-2024-57880),\
- \ [CVE-2024-55642](https://nvd.nist.gov/vuln/detail/CVE-2024-55642), [CVE-2024-55641](https://nvd.nist.gov/vuln/detail/CVE-2024-55641),\
- \ [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683),\
- \ [CVE-2024-54460](https://nvd.nist.gov/vuln/detail/CVE-2024-54460), [CVE-2024-54191](https://nvd.nist.gov/vuln/detail/CVE-2024-54191),\
- \ [CVE-2024-53689](https://nvd.nist.gov/vuln/detail/CVE-2024-53689), [CVE-2024-53682](https://nvd.nist.gov/vuln/detail/CVE-2024-53682),\
- \ [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770),\
- \ [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660),\
- \ [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658),\
- \ [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56656](https://nvd.nist.gov/vuln/detail/CVE-2024-56656),\
- \ [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675),\
- \ [CVE-2024-56674](https://nvd.nist.gov/vuln/detail/CVE-2024-56674), [CVE-2024-56673](https://nvd.nist.gov/vuln/detail/CVE-2024-56673),\
- \ [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654),\
- \ [CVE-2024-56671](https://nvd.nist.gov/vuln/detail/CVE-2024-56671), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670),\
- \ [CVE-2024-56669](https://nvd.nist.gov/vuln/detail/CVE-2024-56669), [CVE-2024-56668](https://nvd.nist.gov/vuln/detail/CVE-2024-56668),\
- \ [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56666](https://nvd.nist.gov/vuln/detail/CVE-2024-56666),\
- \ [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664),\
- \ [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662),\
- \ [CVE-2024-56652](https://nvd.nist.gov/vuln/detail/CVE-2024-56652), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653),\
- \ [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240),\
- \ [CVE-2025-40261](https://nvd.nist.gov/vuln/detail/CVE-2025-40261), [CVE-2025-40266](https://nvd.nist.gov/vuln/detail/CVE-2025-40266),\
- \ [CVE-2025-40264](https://nvd.nist.gov/vuln/detail/CVE-2025-40264), [CVE-2025-40263](https://nvd.nist.gov/vuln/detail/CVE-2025-40263),\
- \ [CVE-2025-40262](https://nvd.nist.gov/vuln/detail/CVE-2025-40262), [CVE-2025-40254](https://nvd.nist.gov/vuln/detail/CVE-2025-40254),\
- \ [CVE-2025-40253](https://nvd.nist.gov/vuln/detail/CVE-2025-40253), [CVE-2025-40252](https://nvd.nist.gov/vuln/detail/CVE-2025-40252),\
- \ [CVE-2025-40251](https://nvd.nist.gov/vuln/detail/CVE-2025-40251), [CVE-2025-40250](https://nvd.nist.gov/vuln/detail/CVE-2025-40250),\
- \ [CVE-2025-40259](https://nvd.nist.gov/vuln/detail/CVE-2025-40259), [CVE-2025-40258](https://nvd.nist.gov/vuln/detail/CVE-2025-40258),\
- \ [CVE-2025-40257](https://nvd.nist.gov/vuln/detail/CVE-2025-40257), [CVE-2025-40246](https://nvd.nist.gov/vuln/detail/CVE-2025-40246),\
- \ [CVE-2025-40248](https://nvd.nist.gov/vuln/detail/CVE-2025-40248), [CVE-2025-40345](https://nvd.nist.gov/vuln/detail/CVE-2025-40345))\r\
- \n \r\n \r\n #### Updates:\r\n\r\n- Linux ([6.12.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61)\
- \ (includes [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59),\
- \ [6.12.60](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60)))\r\
- \n- ca-certificates ([3.119](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html)\
- \ (includes [3.118.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html)))\r\
- \n\r\n _Changes since **Beta 4459.1.2**_\r\n \r\n #### Security fixes:\r\n \r\n\
- \ - Linux ([CVE-2025-40275](https://nvd.nist.gov/vuln/detail/CVE-2025-40275),\
- \ [CVE-2025-40274](https://nvd.nist.gov/vuln/detail/CVE-2025-40274), [CVE-2025-40273](https://nvd.nist.gov/vuln/detail/CVE-2025-40273),\
- \ [CVE-2025-40272](https://nvd.nist.gov/vuln/detail/CVE-2025-40272), [CVE-2025-40271](https://nvd.nist.gov/vuln/detail/CVE-2025-40271),\
- \ [CVE-2025-40289](https://nvd.nist.gov/vuln/detail/CVE-2025-40289), [CVE-2025-40288](https://nvd.nist.gov/vuln/detail/CVE-2025-40288),\
- \ [CVE-2025-40287](https://nvd.nist.gov/vuln/detail/CVE-2025-40287), [CVE-2025-40269](https://nvd.nist.gov/vuln/detail/CVE-2025-40269),\
- \ [CVE-2025-40286](https://nvd.nist.gov/vuln/detail/CVE-2025-40286), [CVE-2025-40285](https://nvd.nist.gov/vuln/detail/CVE-2025-40285),\
- \ [CVE-2025-40284](https://nvd.nist.gov/vuln/detail/CVE-2025-40284), [CVE-2025-40283](https://nvd.nist.gov/vuln/detail/CVE-2025-40283),\
- \ [CVE-2025-40282](https://nvd.nist.gov/vuln/detail/CVE-2025-40282), [CVE-2025-40281](https://nvd.nist.gov/vuln/detail/CVE-2025-40281),\
- \ [CVE-2025-40280](https://nvd.nist.gov/vuln/detail/CVE-2025-40280), [CVE-2025-40279](https://nvd.nist.gov/vuln/detail/CVE-2025-40279),\
- \ [CVE-2025-40278](https://nvd.nist.gov/vuln/detail/CVE-2025-40278), [CVE-2025-40277](https://nvd.nist.gov/vuln/detail/CVE-2025-40277),\
- \ [CVE-2025-40268](https://nvd.nist.gov/vuln/detail/CVE-2025-40268), [CVE-2025-40214](https://nvd.nist.gov/vuln/detail/CVE-2025-40214),\
- \ [CVE-2025-40212](https://nvd.nist.gov/vuln/detail/CVE-2025-40212), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087),\
- \ [CVE-2024-57879](https://nvd.nist.gov/vuln/detail/CVE-2024-57879), [CVE-2024-57880](https://nvd.nist.gov/vuln/detail/CVE-2024-57880),\
- \ [CVE-2024-55642](https://nvd.nist.gov/vuln/detail/CVE-2024-55642), [CVE-2024-55641](https://nvd.nist.gov/vuln/detail/CVE-2024-55641),\
- \ [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683),\
- \ [CVE-2024-54460](https://nvd.nist.gov/vuln/detail/CVE-2024-54460), [CVE-2024-54191](https://nvd.nist.gov/vuln/detail/CVE-2024-54191),\
- \ [CVE-2024-53689](https://nvd.nist.gov/vuln/detail/CVE-2024-53689), [CVE-2024-53682](https://nvd.nist.gov/vuln/detail/CVE-2024-53682),\
- \ [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770),\
- \ [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660),\
- \ [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658),\
- \ [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56656](https://nvd.nist.gov/vuln/detail/CVE-2024-56656),\
- \ [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675),\
- \ [CVE-2024-56674](https://nvd.nist.gov/vuln/detail/CVE-2024-56674), [CVE-2024-56673](https://nvd.nist.gov/vuln/detail/CVE-2024-56673),\
- \ [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654),\
- \ [CVE-2024-56671](https://nvd.nist.gov/vuln/detail/CVE-2024-56671), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670),\
- \ [CVE-2024-56669](https://nvd.nist.gov/vuln/detail/CVE-2024-56669), [CVE-2024-56668](https://nvd.nist.gov/vuln/detail/CVE-2024-56668),\
- \ [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56666](https://nvd.nist.gov/vuln/detail/CVE-2024-56666),\
- \ [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664),\
- \ [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662),\
- \ [CVE-2024-56652](https://nvd.nist.gov/vuln/detail/CVE-2024-56652), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653),\
- \ [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240),\
- \ [CVE-2025-40261](https://nvd.nist.gov/vuln/detail/CVE-2025-40261), [CVE-2025-40266](https://nvd.nist.gov/vuln/detail/CVE-2025-40266),\
- \ [CVE-2025-40264](https://nvd.nist.gov/vuln/detail/CVE-2025-40264), [CVE-2025-40263](https://nvd.nist.gov/vuln/detail/CVE-2025-40263),\
- \ [CVE-2025-40262](https://nvd.nist.gov/vuln/detail/CVE-2025-40262), [CVE-2025-40254](https://nvd.nist.gov/vuln/detail/CVE-2025-40254),\
- \ [CVE-2025-40253](https://nvd.nist.gov/vuln/detail/CVE-2025-40253), [CVE-2025-40252](https://nvd.nist.gov/vuln/detail/CVE-2025-40252),\
- \ [CVE-2025-40251](https://nvd.nist.gov/vuln/detail/CVE-2025-40251), [CVE-2025-40250](https://nvd.nist.gov/vuln/detail/CVE-2025-40250),\
- \ [CVE-2025-40259](https://nvd.nist.gov/vuln/detail/CVE-2025-40259), [CVE-2025-40258](https://nvd.nist.gov/vuln/detail/CVE-2025-40258),\
- \ [CVE-2025-40257](https://nvd.nist.gov/vuln/detail/CVE-2025-40257), [CVE-2025-40246](https://nvd.nist.gov/vuln/detail/CVE-2025-40246),\
- \ [CVE-2025-40248](https://nvd.nist.gov/vuln/detail/CVE-2025-40248), [CVE-2025-40345](https://nvd.nist.gov/vuln/detail/CVE-2025-40345))\r\
- \n - binutils ([CVE-2025-5244](https://www.cve.org/CVERecord?id=CVE-2025-5244),\
- \ [CVE-2025-5245](https://www.cve.org/CVERecord?id=CVE-2025-5245) [CVE-2025-8225](https://www.cve.org/CVERecord?id=CVE-2025-8225))\r\
- \n - curl ([CVE-2025-9086](https://www.cve.org/CVERecord?id=CVE-2025-9086), [CVE-2025-10148](https://www.cve.org/CVERecord?id=CVE-2025-10148))\r\
- \n - expat ([CVE-2025-59375](https://www.cve.org/CVERecord?id=CVE-2025-59375))\r\
- \n - go ([CVE-2025-47910](https://www.cve.org/CVERecord?id=CVE-2025-47910))\r\n\
- \ - intel-microcode ([CVE-2024-28956](https://www.cve.org/CVERecord?id=CVE-2024-28956),\
- \ [CVE-2024-43420](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420),\
- \ [CVE-2024-45332](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332),\
- \ [CVE-2025-20012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012),\
- \ [CVE-2025-20054](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054),\
- \ [CVE-2025-20103](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103),\
- \ [CVE-2025-20623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623),\
- \ [CVE-2025-24495](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495),\
- \ [CVE-2025-20053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053),\
- \ [CVE-2025-20109](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109),\
- \ [CVE-2025-22839](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839),\
- \ [CVE-2025-22840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840),\
- \ [CVE-2025-22889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889),\
- \ [CVE-2025-26403](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403))\r\
- \n - libpcre2 ([CVE-2025-58050](https://www.cve.org/CVERecord?id=CVE-2025-58050))\r\
- \n - libxml2 ([libxml2-20250908](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9))\r\
- \n - libxslt ([CVE-2025-7424](https://www.cve.org/CVERecord?id=CVE-2025-7424),\
- \ [CVE-2025-7425](https://www.cve.org/CVERecord?id=CVE-2025-7425))\r\n - net-tools\
- \ ([CVE-2025-46836](https://www.cve.org/CVERecord?id=CVE-2025-46836))\r\n - nvidia-drivers\
- \ ([CVE-2025-23280](https://www.cve.org/CVERecord?id=CVE-2025-23280), [CVE-2025-23282](https://www.cve.org/CVERecord?id=CVE-2025-23282),\
- \ [CVE-2025-23300](https://www.cve.org/CVERecord?id=CVE-2025-23300), [CVE-2025-23330](https://www.cve.org/CVERecord?id=CVE-2025-23330),\
- \ [CVE-2025-23332](https://www.cve.org/CVERecord?id=CVE-2025-23332), [CVE-2025-23345](https://www.cve.org/CVERecord?id=CVE-2025-23345))\r\
- \n - openssh ([CVE-2025-61984](https://www.cve.org/CVERecord?id=CVE-2025-61984),\
- \ [CVE-2025-61985](https://www.cve.org/CVERecord?id=CVE-2025-61985))\r\n - openssl\
- \ ([CVE-2025-9230](https://www.cve.org/CVERecord?id=CVE-2025-9230), [CVE-2025-9231](https://www.cve.org/CVERecord?id=CVE-2025-9231),\
- \ [CVE-2025-9232](https://www.cve.org/CVERecord?id=CVE-2025-9232))\r\n \r\n ####\
- \ Bug fixes:\r\n \r\n - Alpha only: Added Fusion SCSI disk drivers back to the\
- \ initrd after they got lost in the rework ([Flatcar#1924](https://github.com/flatcar/Flatcar/issues/1924))\r\
- \n - Alpha only: Fixed systemd-sysext payload handling for air-gapped/self-hosted\
- \ updates which was a known bug for 4487.0.0 ([ue-rs#93](https://github.com/flatcar/ue-rs/pull/93))\r\
- \n - Configured the services in the overlaybd sysext to start automatically like\
- \ the other sysexts. Note that the sysext must be enabled at boot time for this\
- \ to happen, otherwise you need to call `systemd-tmpfiles --create` and `systemctl\
- \ daemon-reload` first.\r\n - Fixed SSSD startup failure by adding back LDB modules\
- \ into the image, which got lost after a Samba update ([Flatcar#1919](https://github.com/flatcar/Flatcar/issues/1919))\r\
- \n - Fixed a kernel boot warning when loading an explicit list of kernel modules\
- \ in the minimal first-stage initrd ([Flatcar#1934](https://github.com/flatcar/Flatcar/issues/1934))\r\
- \n \r\n #### Changes:\r\n \r\n - Added support for the kernel cmdline parameters\
- \ `flatcar.release_file_server_url` and `flatcar.dev_file_server_url` to specify\
- \ custom servers where Flatcar extensions should be downloaded on boot ([bootengine#112](https://github.com/flatcar/bootengine/pull/112))\r\
- \n - Alpha only: Reduced Azure image size again to 30 GB as before by shrinking\
- \ the root partition to compensate for the growth of the other partitions ([scripts#3460](https://github.com/flatcar/scripts/pull/3460))\r\
- \n - Increased all partition sizes: `/boot` to 1 GB, the two `/usr` partitions\
- \ to 2 GB, `/oem` to 1 GB so that we can use more space in a few years when we\
- \ can assume that most nodes run the new partition layout - existing nodes can\
- \ still update for the next years ([scripts#3027](https://github.com/flatcar/scripts/pull/3027))\r\
- \n - Reduced the kernel+initrd size on `/boot` by half. Flatcar now uses a minimal\
- \ first stage initrd just to access the `/usr` partition and then switches to\
- \ the full initrd that does the full system preparation as before. Since this\
- \ means that the set of kernel modules available in the first initrd is reduced,\
- \ please report any impact.\r\n - The way that files for building custom kernel\
- \ modules are installed has changed from a Ubuntu-inspired method to the standard\
- \ upstream kernel method. In the unlikely event that this breaks your module builds,\
- \ please let the Flatcar team know immediately.\r\n \r\n #### Updates:\r\n \r\n\
- - Linux ([6.12.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61)\
- \ (includes [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49),\
- \ [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50),\
- \ [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59),\
- \ [6.12.60](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60)))\r\
- \n- Linux firmware ([20251021](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251021)\
- \ (includes [20250917](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250917),\
- \ [20251011](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251011)))\r\
- \n- Afterburn ([5.10.0](https://coreos.github.io/afterburn/release-notes/#afterburn-5100))\r\
- \n- azure, dev: inotify-tools ([4.25.9.0](https://github.com/inotify-tools/inotify-tools/releases/tag/4.25.9.0))\r\
- \n- azure, stackit: chrony ([4.8](https://gitlab.com/chrony/chrony/-/raw/4.8/NEWS))\r\
- \n- base, dev: bash ([5.3_p3](https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html))\r\
- \n- base, dev: bind ([9.18.38](https://bind9.readthedocs.io/en/v9.18.38/notes.html#notes-for-bind-9-18-38))\r\
- \n- base, dev: bpftool ([7.6.0](https://github.com/libbpf/bpftool/releases/tag/v7.6.0))\r\
- \n- base, dev: btrfs-progs ([6.16.1](https://github.com/kdave/btrfs-progs/releases/tag/v6.16.1)\
- \ (includes [6.16](https://github.com/kdave/btrfs-progs/releases/tag/v6.16)))\r\
- \n- base, dev: coreutils ([9.7](https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00006.html)\
- \ (includes [9.6](https://savannah.gnu.org/news/?id=10715)))\r\n- base, dev: cryptsetup\
- \ ([2.8.1](https://gitlab.com/cryptsetup/cryptsetup/-/raw/v2.8.1/docs/v2.8.1-ReleaseNotes))\r\
- \n- base, dev: curl ([8.16.0](https://curl.se/ch/8.16.0.html))\r\n- base, dev:\
- \ expat ([2.7.3](https://raw.githubusercontent.com/libexpat/libexpat/refs/tags/R_2_7_3/expat/Changes)\
- \ (includes [2.7.2](https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes)))\r\
- \n- base, dev: gcc ([14.3.1_p20250801](https://gcc.gnu.org/pipermail/gcc/2025-May/246078.html))\r\
- \n- base, dev: gettext ([0.23.2](https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=a5cc8a63eb4f06e4a1171afda862812feb67d693;hb=e8e6cb71aec0de1f5758ac21327bb8cd69e33731)\
- \ (includes [0.23.0](https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=9d87d45408f510d15856a1dda8a9376573f0a9c5;hb=c12b25dc82104691ca80c4da1cbc538fcab42bf5),\
- \ [0.23.1](https://gitweb.git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob_plain;f=NEWS;h=4aafedf9b10a66891838e1f35c7af020c6124ee0;hb=d9b0432a825bfe3fc72f9a081d295a9528cd8aac)))\r\
- \n- base, dev: git ([2.51.0](https://github.com/git/git/blob/v2.51.0/Documentation/RelNotes/2.51.0.adoc)\
- \ (includes [2.50.0](https://github.com/git/git/blob/v2.50.0/Documentation/RelNotes/2.50.0.adoc)))\r\
- \n- base, dev: hwdata ([0.398](https://github.com/vcrhonek/hwdata/releases/tag/v0.398))\r\
- \n- base, dev: intel-microcode ([20250812](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250812)\
- \ (includes [20250512](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250512)))\r\
- \n- base, dev: libffi ([3.5.2](https://github.com/libffi/libffi/releases/tag/v3.5.2))\r\
- \n- base, dev: libnftnl ([1.3.0](https://lwn.net/Articles/1032725/))\r\n- base,\
- \ dev: libxml2 ([2.14.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.6)\
- \ (includes [2.13.9](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9),\
- \ [2.14.0](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.0), [2.14.1](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.1),\
- \ [2.14.2](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.2), [2.14.3](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.3),\
- \ [2.14.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.4), [2.14.5](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.14.5)))\r\
- \n- base, dev: ncurses ([6.5_p20250802](https://invisible-island.net/ncurses/NEWS.html#t20250802))\r\
- \n- base, dev: nftables ([1.1.5](https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.5.txt)\
- \ (includes [1.1.4](https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.4.txt)))\r\
- \n- base, dev: nvidia-drivers-service ([570.195.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-195-03/index.html)\
- \ (includes [535.274.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-274-02/index.html)))\r\
- \n- base, dev: openssh ([10.2_p1](https://www.openssh.com/txt/release-10.2) (includes\
- \ [10.1](https://www.openssh.com/txt/release-10.1)))\r\n- base, dev: openssl ([3.4.3](https://github.com/openssl/openssl/releases/tag/openssl-3.4.3))\r\
- \n- base, dev: readline ([8.3_p1](https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html))\r\
- \n- base, dev: samba ([4.22.3](https://www.samba.org/samba/history/samba-4.22.3.html)\
- \ (includes [4.21.0](https://www.samba.org/samba/history/samba-4.21.0.html), [4.22.0](https://www.samba.org/samba/history/samba-4.22.0.html),\
- \ [4.22.1](https://www.samba.org/samba/history/samba-4.22.1.html), [4.22.2](https://www.samba.org/samba/history/samba-4.22.2.html)))\r\
- \n- base, dev: talloc ([2.4.3](https://gitlab.com/samba-team/samba/-/commit/77229f73c20af69ab0f3c96efbb229ff64a9dfe4))\r\
- \n- base, dev: tdb ([1.4.13](https://gitlab.com/samba-team/samba/-/commit/70a8c7a89a6d62d2ff172d79b5f4e6439300b88d))\r\
- \n- base, dev: tevent ([0.16.2](https://gitlab.com/samba-team/samba/-/commit/8d398acbbb7fdc0ff50fe6ba80433deaf92515c6))\r\
- \n- base, dev: xfsprogs ([6.16.0](https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.16.0)\
- \ (includes [6.15.0](https://web.git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.15.0)))\r\
- \n- ca-certificates ([3.119](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html)\
- \ (includes [3.118.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html)))\r\
- \n- dev, sysext-incus: squashfs-tools ([4.7.2](https://github.com/plougher/squashfs-tools/releases/tag/4.7.2)\
- \ (includes [4.7.1](https://github.com/plougher/squashfs-tools/releases/tag/4.7.1)))\r\
- \n- dev: binutils ([2.45](https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00009.html))\r\
- \n- sdk: azure-core ([1.16.1](https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-core_1.16.1))\r\
- \n- sdk: azure-identity ([1.13.1](https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-identity_1.13.1))\r\
- \n- sdk: cmake ([3.31.9](https://cmake.org/cmake/help/v3.31/release/3.31.html#id1))\r\
- \n- sdk: go ([1.25.1](https://go.dev/doc/devel/release#go1.25.minor) (includes\
- \ [1.24.7](https://go.dev/doc/devel/release#go1.24.minor), [1.25](https://go.dev/doc/go1.25)))\r\
- \n- sdk: pkgcheck ([0.10.37](https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.37))\r\
- \n- sdk: qemu ([10.0.5](https://wiki.qemu.org/ChangeLog/10.0))\r\n- sdk: rust\
- \ ([1.89.0](https://blog.rust-lang.org/2025/08/07/Rust-1.89.0/))\r\n- sysext-containerd:\
- \ containerd ([2.1.4](https://github.com/containerd/containerd/releases/tag/v2.1.4))\r\
- \n- sysext-containerd: runc ([1.3.1](https://github.com/opencontainers/runc/releases/tag/v1.3.1))\r\
- \n- sysext-incus, sysext-podman, vmware: fuse ([3.17.4](https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.4))\r\
- \n- sysext-nvidia-drivers-535: nvidia-drivers ([535.274.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-274-02/index.html))\r\
- \n- sysext-nvidia-drivers-570: nvidia-drivers ([570.195.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-195-03/index.html)\
- \ (includes 570.190))\r\n- sysext-podman: crun ([1.21](https://github.com/containers/crun/releases/tag/1.21))\r\
- \n- sysext-podman: gpgme ([2.0.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=cd0e093bf83fe47b6773fb478fced07d8409fbe0;hb=e17ba578861905857da0a514b4fc9b88a57f7346))\r\
- \n- sysext-podman: netavark ([1.15.2](https://github.com/containers/netavark/releases/tag/v1.15.2)\
- \ (includes [1.15.0](https://github.com/containers/netavark/releases/tag/v1.15.0),\
- \ [1.15.1](https://github.com/containers/netavark/releases/tag/v1.15.1)))\r\n\
- - sysext-podman: passt ([2025.06.11](https://archives.passt.top/passt-user/20250611175947.7d540ddc@elisabeth/T/#u))\r\
- \n- sysext-python: charset-normalizer ([3.4.3](https://github.com/jawah/charset_normalizer/releases/tag/3.4.3))\r\
- \n- sysext-python: jaraco-functools ([4.3.0](https://raw.githubusercontent.com/jaraco/jaraco.functools/refs/tags/v4.3.0/NEWS.rst))\r\
- \n- sysext-python: markdown-it-py ([4.0.0](https://github.com/executablebooks/markdown-it-py/releases/tag/v4.0.0))\r\
- \n- sysext-python: pip ([25.2](https://raw.githubusercontent.com/pypa/pip/refs/tags/25.2/NEWS.rst))\r\
- \n- sysext-python: platformdirs ([4.4.0](https://github.com/tox-dev/platformdirs/releases/tag/4.4.0))\r\
- \n- sysext-python: requests ([2.32.5](https://github.com/psf/requests/releases/tag/v2.32.5))\r\
- \n- sysext-python: typing-extensions ([4.15.0](https://raw.githubusercontent.com/python/typing_extensions/refs/tags/4.15.0/CHANGELOG.md))\r\
- \n- systemd (257.9)\r\n- vmware: open-vm-tools ([13.0.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-13.0.5))\r\
- \n"
- created_at: '2025-12-12T13:53:18Z'
+ body: "_Changes since **Beta 4515.1.0**_\r\n\r\n#### Security fixes:\r\n\r\n- Linux\
+ \ ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\
+ \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\
+ \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\
+ \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\
+ \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\
+ \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\
+ \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\
+ \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\
+ \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\
+ \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\
+ \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\
+ \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\
+ \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\
+ \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\
+ \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\
+ \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\
+ \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\
+ \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\
+ \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\
+ \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\
+ \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\
+ \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\
+ \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\
+ \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\
+ \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\
+ \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\
+ \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\
+ \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\
+ \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\
+ \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\
+ \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\
+ \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\
+ \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\
+ \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\
+ \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\
+ \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\
+ \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\
+ \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\
+ \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\
+ \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\
+ \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\
+ \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\
+ \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\
+ \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\
+ \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\
+ \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\
+ \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\
+ \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\
+ \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\
+ \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\
+ \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\
+ \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\
+ \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\
+ \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\
+ \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\
+ \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\
+ \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\
+ \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\
+ \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\
+ \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\
+ \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\
+ \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\
+ \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\
+ \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\
+ \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\
+ \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\
+ \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\
+ \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\
+ \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\
+ \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\
+ \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\
+ \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\
+ \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\
+ \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\
+ \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\
+ \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\
+ \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\
+ \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\
+ \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\
+ \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\
+ \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\
+ \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\
+ \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\
+ \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\
+ \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\
+ \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\
+ \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\
+ \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\
+ \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\
+ \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\
+ \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\
+ \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\
+ \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\
+ \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\
+ \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\
+ \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\
+ \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\
+ \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\
+ \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- coreutils\
+ \ ([CVE-2025-5278](https://www.cve.org/CVERecord?id=CVE-2025-5278))\r\n- go ([CVE-2025-47912](https://www.cve.org/CVERecord?id=CVE-2025-47912),\
+ \ [CVE-2025-58183](https://www.cve.org/CVERecord?id=CVE-2025-58183), [CVE-2025-58185](https://www.cve.org/CVERecord?id=CVE-2025-58185),\
+ \ [CVE-2025-58186](https://www.cve.org/CVERecord?id=CVE-2025-58186), [CVE-2025-58187](https://www.cve.org/CVERecord?id=CVE-2025-58187),\
+ \ [CVE-2025-58188](https://www.cve.org/CVERecord?id=CVE-2025-58188), [CVE-2025-58189](https://www.cve.org/CVERecord?id=CVE-2025-58189),\
+ \ [CVE-2025-61723](https://www.cve.org/CVERecord?id=CVE-2025-61723), [CVE-2025-61724](https://www.cve.org/CVERecord?id=CVE-2025-61724),\
+ \ [CVE-2025-61725](https://www.cve.org/CVERecord?id=CVE-2025-61725))\r\n- pam\
+ \ ([CVE-2024-22365](https://nvd.nist.gov/vuln/detail/CVE-2024-22365), [CVE-2024-10041](https://nvd.nist.gov/vuln/detail/CVE-2024-10041),\
+ \ [CVE-2024-10963](https://nvd.nist.gov/vuln/detail/CVE-2024-10963), [CVE-2025-6020](https://nvd.nist.gov/vuln/detail/CVE-2025-6020))\r\
+ \n- openssl ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\
+ \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\
+ \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\
+ \ [CVE-2025-15469](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469),\
+ \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\
+ \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\
+ \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\
+ \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\
+ \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\
+ \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\
+ \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\
+ \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\
+ \n\r\n\r\n#### Bug fixes:\r\n\r\n- Dropped debug symbols from containerd, incus,\
+ \ and overlaybd system extensions to reduce download size.\r\n\r\n#### Changes:\r\
+ \n\r\n- Dropped Ciphers, MACs, and KexAlgorithms from the sshd configuration so\
+ \ that the OpenSSH upstream defaults are used. This introduces post-quantum key\
+ \ exchange algorithms for better security. ([Flatcar#1921](https://github.com/flatcar/Flatcar/issues/1921)).\
+ \ Users requiring legacy Ciphers, MACs, and/or KexAlgos can override / re-enable\
+ \ this by deploying a custom drop-in config to `/etc/ssh/sshd_config.d/`.\r\n\
+ - `/etc/shadow`, `/etc/gshadow` are now owned by the `shadow` group, `/usr/bin/unix_chkpwd`,\
+ \ `/usr/bin/chage` and `/usr/bin/expiry` are now also owned by the `shadow` group\
+ \ with a sticky bit enabled.\r\n\r\n#### Updates:\r\n\r\n- Ignition ([2.24.0](https://coreos.github.io/ignition/release-notes/#ignition-2240-2024-10-14))\r\
+ \n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\
+ \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\
+ \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\
+ \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\
+ \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62),\
+ \ [6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59)))\r\
+ \n- Linux Firmware ([20251125](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251125)\
+ \ (includes [20251111](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20251111)))\r\
+ \n- SDK: cmake ([4.1.2](https://cmake.org/cmake/help/v4.1/release/4.1.html#id22)\
+ \ (includes [4.1.1](https://cmake.org/cmake/help/v4.1/release/4.1.html#id21),\
+ \ [4.1](https://cmake.org/cmake/help/v4.1/release/4.1.html), [4.0](https://cmake.org/cmake/help/v4.0/release/4.0.html)))\r\
+ \n- SDK: go ([1.25.3](https://go.dev/doc/devel/release#go1.25.minor))\r\n- SDK:\
+ \ meson ([1.9.1](https://mesonbuild.com/Release-notes-for-1-9-0.html) (includes\
+ \ [1.8.0](https://mesonbuild.com/Release-notes-for-1-8-0.html)))\r\n- SDK: nasm\
+ \ ([3.01](https://www.nasm.us/docs/3.01/nasmac.html) (includes [3.00](https://www.nasm.us/docs/3.00/nasmac.html)))\r\
+ \n- base, dev: btrfs-progs ([6.17](https://github.com/kdave/btrfs-progs/releases/tag/v6.17))\r\
+ \n- base, dev: cifs-utils ([7.4](https://lwn.net/Articles/1024956/))\r\n- base,\
+ \ dev: coreutils ([9.8](https://lists.gnu.org/archive/html/info-gnu/2025-09/msg00005.html))\r\
+ \n- base, dev: hwdata ([0.400](https://github.com/vcrhonek/hwdata/releases/tag/v0.400)\
+ \ (includes [0.399](https://github.com/vcrhonek/hwdata/releases/tag/v0.399)))\r\
+ \n- base, dev: inih ([62](https://github.com/benhoyt/inih/releases/tag/r62) (includes\
+ \ [61](https://github.com/benhoyt/inih/releases/tag/r61)))\r\n- base, dev: intel-microcode\
+ \ ([20251111_p20251112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111))\r\
+ \n- base, dev: iproute2 ([6.17.0](https://lore.kernel.org/all/20250929095042.48200315@hermes.local/))\r\
+ \n- base, dev: jose ([14](https://github.com/latchset/jose/releases/tag/v14) (includes\
+ \ [13](https://github.com/latchset/jose/releases/tag/v13)))\r\n- base, dev: kbd\
+ \ ([2.9.0](https://github.com/legionus/kbd/releases/tag/v2.9.0))\r\n- base, dev:\
+ \ less ([685](https://greenwoodsoftware.com/less/news.685.html))\r\n- base, dev:\
+ \ libgpg-error ([1.56](https://github.com/gpg/libgpg-error/releases/tag/libgpg-error-1.56))\r\
+ \n- base, dev: libtirpc ([1.3.7](https://git.linux-nfs.org/?p=steved/libtirpc.git;a=log;h=refs/tags/libtirpc-1-3-7))\r\
+ \n- base, dev: pam ([1.7.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.1)\
+ \ (includes [1.7.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.7.0),\
+ \ [1.6.1](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.1), [1.6.0](https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0)))\r\
+ \n- base, dev: pambase ([20251013](https://gitweb.gentoo.org/proj/pambase.git/log/?h=pambase-20251013))\r\
+ \n- base, dev: samba ([4.22.5](https://www.samba.org/samba/history/samba-4.22.5.html)\
+ \ (includes [4.22.4](https://www.samba.org/samba/history/samba-4.22.4.html)))\r\
+ \n- base, dev: strace ([6.17](https://github.com/strace/strace/releases/tag/v6.17))\r\
+ \n- base, dev: thin-provisioning-tools ([1.3.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.3.0/CHANGES)\
+ \ (includes [1.2.2](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.2/CHANGES),\
+ \ [1.2.1](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.1/CHANGES),\
+ \ [1.2.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.2.0/CHANGES),\
+ \ [1.1.0](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.1.0/CHANGES),\
+ \ [1.0.14](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.14/CHANGES),\
+ \ [1.0.13](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.13/CHANGES),\
+ \ [1.0.12](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.12/CHANGES),\
+ \ [1.0.11](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/refs/tags/v1.0.11/CHANGES)))\r\
+ \n- base, dev: util-linux ([2.41.2](https://github.com/util-linux/util-linux/blob/v2.41.2/Documentation/releases/v2.41.2-ReleaseNotes))\r\
+ \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\
+ \n- dev: portage ([3.0.69.3](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.3)\
+ \ (includes [3.0.69.2](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.2),\
+ \ [3.0.69.1](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69.1),\
+ \ [3.0.69](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.69)))\r\
+ \n- sysext-overlaybd: overlaybd ([1.0.16](https://github.com/containerd/overlaybd/releases/tag/v1.0.16))\r\
+ \n- sysext-podman: aardvark-dns ([1.15.0](https://github.com/containers/aardvark-dns/releases/tag/v1.15.0))\r\
+ \n- sysext-podman: netavark ([1.16.1](https://github.com/containers/netavark/releases/tag/v1.16.1)\
+ \ (includes [1.16.0](https://github.com/containers/netavark/releases/tag/v1.16.0)))\r\
+ \n- sysext-python: more-itertools ([10.8.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.8.0))\r\
+ \n- sysext-python: platformdirs ([4.5.0](https://github.com/tox-dev/platformdirs/releases/tag/4.5.0))\r\
+ \n- sysext-python: resolvelib ([1.2.1](https://raw.githubusercontent.com/sarugaku/resolvelib/refs/tags/1.2.1/CHANGELOG.rst))\r\
+ \n- sysext-python: rich ([14.2.0](https://github.com/Textualize/rich/releases/tag/v14.2.0))\r\
+ \n- sysext-python: setuptools-scm ([9.2.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.2.0)\
+ \ (includes [9.1.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.1.0),\
+ \ [9.0.0](https://github.com/pypa/setuptools-scm/releases/tag/v9.0.0)))\r\n- sysext-python:\
+ \ trove-classifiers ([2025.9.11.17](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.11.17)\
+ \ (includes [2025.9.9.12](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.9.12),\
+ \ [2025.9.8.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.9.8.13)))\r\
+ \n- openssl ([3.5.5](https://github.com/openssl/openssl/releases/tag/openssl-3.5.5))"
+ created_at: '2026-01-23T13:55:34Z'
draft: false
- html_url: https://github.com/flatcar/scripts/releases/tag/beta-4515.1.0
- id: 271478085
+ html_url: https://github.com/flatcar/scripts/releases/tag/beta-4547.1.0
+ id: 280330266
immutable: false
- name: beta-4515.1.0
- node_id: RE_kwDOB2MTHs4QLm1F
+ name: ''
+ node_id: RE_kwDOB2MTHs4QtYAa
prerelease: false
- published_at: '2025-12-18T15:18:34Z'
- tag_name: beta-4515.1.0
- tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/beta-4515.1.0
+ published_at: '2026-01-27T14:42:03Z'
+ tag_name: beta-4547.1.0
+ tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/beta-4547.1.0
target_commitish: main
- updated_at: '2025-12-18T15:24:44Z'
- upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/271478085/assets{?name,label}
- url: https://api.github.com/repos/flatcar/scripts/releases/271478085
- zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/beta-4515.1.0
+ updated_at: '2026-01-27T14:42:03Z'
+ upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330266/assets{?name,label}
+ url: https://api.github.com/repos/flatcar/scripts/releases/280330266
+ zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/beta-4547.1.0
image_packages:
containerd: 2.1.5
docker: 28.0.4
- ignition: 2.22.0
- kernel: 6.12.61
+ ignition: 2.24.0
+ kernel: 6.12.66
systemd: '257'
release: current
-version: 4515.1.0
+version: 4547.1.0
diff --git a/data/releases/stable/4459.2.3.yml b/data/releases/stable/4459.2.3.yml
new file mode 100644
index 00000000..fb25e57a
--- /dev/null
+++ b/data/releases/stable/4459.2.3.yml
@@ -0,0 +1,169 @@
+architectures:
+- amd64
+- arm64
+channel: stable
+github_release:
+ assets: []
+ assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330500/assets
+ author:
+ avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4
+ events_url: https://api.github.com/users/tormath1/events{/privacy}
+ followers_url: https://api.github.com/users/tormath1/followers
+ following_url: https://api.github.com/users/tormath1/following{/other_user}
+ gists_url: https://api.github.com/users/tormath1/gists{/gist_id}
+ gravatar_id: ''
+ html_url: https://github.com/tormath1
+ id: 28657343
+ login: tormath1
+ node_id: MDQ6VXNlcjI4NjU3MzQz
+ organizations_url: https://api.github.com/users/tormath1/orgs
+ received_events_url: https://api.github.com/users/tormath1/received_events
+ repos_url: https://api.github.com/users/tormath1/repos
+ site_admin: false
+ starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo}
+ subscriptions_url: https://api.github.com/users/tormath1/subscriptions
+ type: User
+ url: https://api.github.com/users/tormath1
+ user_view_type: public
+ body: "_Changes since **Stable 4459.2.2**_\r\n\r\n#### Security fixes:\r\n\r\n-\
+ \ Linux ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\
+ \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\
+ \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\
+ \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\
+ \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\
+ \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\
+ \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\
+ \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\
+ \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\
+ \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\
+ \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\
+ \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\
+ \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\
+ \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\
+ \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\
+ \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\
+ \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\
+ \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\
+ \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\
+ \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\
+ \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\
+ \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\
+ \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\
+ \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\
+ \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\
+ \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\
+ \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\
+ \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\
+ \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\
+ \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\
+ \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\
+ \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\
+ \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\
+ \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\
+ \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\
+ \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\
+ \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\
+ \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\
+ \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\
+ \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\
+ \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\
+ \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\
+ \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\
+ \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\
+ \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\
+ \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\
+ \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\
+ \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\
+ \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\
+ \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\
+ \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\
+ \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\
+ \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\
+ \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\
+ \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\
+ \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\
+ \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\
+ \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\
+ \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\
+ \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\
+ \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\
+ \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\
+ \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\
+ \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\
+ \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\
+ \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\
+ \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\
+ \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\
+ \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\
+ \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\
+ \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\
+ \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\
+ \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\
+ \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\
+ \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\
+ \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\
+ \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\
+ \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\
+ \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\
+ \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\
+ \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\
+ \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\
+ \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\
+ \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\
+ \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\
+ \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\
+ \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\
+ \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\
+ \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\
+ \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\
+ \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\
+ \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\
+ \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\
+ \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\
+ \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\
+ \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\
+ \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\
+ \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\
+ \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- openssl\
+ \ ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\
+ \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\
+ \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\
+ \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\
+ \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\
+ \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\
+ \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\
+ \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\
+ \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\
+ \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\
+ \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\
+ \n\r\n\r\n#### Updates:\r\n\r\n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\
+ \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\
+ \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\
+ \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\
+ \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62)))\r\
+ \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\
+ \n- openssl ([3.4.4](https://github.com/openssl/openssl/releases/tag/openssl-3.4.4))"
+ created_at: '2026-01-23T13:56:37Z'
+ draft: false
+ html_url: https://github.com/flatcar/scripts/releases/tag/stable-4459.2.3
+ id: 280330500
+ immutable: false
+ name: ''
+ node_id: RE_kwDOB2MTHs4QtYEE
+ prerelease: false
+ published_at: '2026-01-27T14:42:39Z'
+ tag_name: stable-4459.2.3
+ tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/stable-4459.2.3
+ target_commitish: main
+ updated_at: '2026-01-27T14:42:39Z'
+ upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330500/assets{?name,label}
+ url: https://api.github.com/repos/flatcar/scripts/releases/280330500
+ zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/stable-4459.2.3
+image_packages:
+ containerd: 2.0.7
+ docker: 28.0.4
+ ignition: 2.22.0
+ kernel: 6.12.66
+ systemd: '256'
+release: 4459.2.3
+version: 4459.2.3
diff --git a/data/releases/stable/current.yml b/data/releases/stable/current.yml
index 83476cdb..cd0fdde1 100644
--- a/data/releases/stable/current.yml
+++ b/data/releases/stable/current.yml
@@ -4,93 +4,166 @@ architectures:
channel: stable
github_release:
assets: []
- assets_url: https://api.github.com/repos/flatcar/scripts/releases/271479989/assets
+ assets_url: https://api.github.com/repos/flatcar/scripts/releases/280330500/assets
author:
- avatar_url: https://avatars.githubusercontent.com/u/1449761?v=4
- events_url: https://api.github.com/users/danzatt/events{/privacy}
- followers_url: https://api.github.com/users/danzatt/followers
- following_url: https://api.github.com/users/danzatt/following{/other_user}
- gists_url: https://api.github.com/users/danzatt/gists{/gist_id}
+ avatar_url: https://avatars.githubusercontent.com/u/28657343?v=4
+ events_url: https://api.github.com/users/tormath1/events{/privacy}
+ followers_url: https://api.github.com/users/tormath1/followers
+ following_url: https://api.github.com/users/tormath1/following{/other_user}
+ gists_url: https://api.github.com/users/tormath1/gists{/gist_id}
gravatar_id: ''
- html_url: https://github.com/danzatt
- id: 1449761
- login: danzatt
- node_id: MDQ6VXNlcjE0NDk3NjE=
- organizations_url: https://api.github.com/users/danzatt/orgs
- received_events_url: https://api.github.com/users/danzatt/received_events
- repos_url: https://api.github.com/users/danzatt/repos
+ html_url: https://github.com/tormath1
+ id: 28657343
+ login: tormath1
+ node_id: MDQ6VXNlcjI4NjU3MzQz
+ organizations_url: https://api.github.com/users/tormath1/orgs
+ received_events_url: https://api.github.com/users/tormath1/received_events
+ repos_url: https://api.github.com/users/tormath1/repos
site_admin: false
- starred_url: https://api.github.com/users/danzatt/starred{/owner}{/repo}
- subscriptions_url: https://api.github.com/users/danzatt/subscriptions
+ starred_url: https://api.github.com/users/tormath1/starred{/owner}{/repo}
+ subscriptions_url: https://api.github.com/users/tormath1/subscriptions
type: User
- url: https://api.github.com/users/danzatt
+ url: https://api.github.com/users/tormath1
user_view_type: public
- body: "_Changes since **Stable 4459.2.1**_\r\n \r\n #### Security fixes:\r\n \r\n\
- \ - Linux ([CVE-2025-40275](https://nvd.nist.gov/vuln/detail/CVE-2025-40275),\
- \ [CVE-2025-40274](https://nvd.nist.gov/vuln/detail/CVE-2025-40274), [CVE-2025-40273](https://nvd.nist.gov/vuln/detail/CVE-2025-40273),\
- \ [CVE-2025-40272](https://nvd.nist.gov/vuln/detail/CVE-2025-40272), [CVE-2025-40271](https://nvd.nist.gov/vuln/detail/CVE-2025-40271),\
- \ [CVE-2025-40289](https://nvd.nist.gov/vuln/detail/CVE-2025-40289), [CVE-2025-40288](https://nvd.nist.gov/vuln/detail/CVE-2025-40288),\
- \ [CVE-2025-40287](https://nvd.nist.gov/vuln/detail/CVE-2025-40287), [CVE-2025-40269](https://nvd.nist.gov/vuln/detail/CVE-2025-40269),\
- \ [CVE-2025-40286](https://nvd.nist.gov/vuln/detail/CVE-2025-40286), [CVE-2025-40285](https://nvd.nist.gov/vuln/detail/CVE-2025-40285),\
- \ [CVE-2025-40284](https://nvd.nist.gov/vuln/detail/CVE-2025-40284), [CVE-2025-40283](https://nvd.nist.gov/vuln/detail/CVE-2025-40283),\
- \ [CVE-2025-40282](https://nvd.nist.gov/vuln/detail/CVE-2025-40282), [CVE-2025-40281](https://nvd.nist.gov/vuln/detail/CVE-2025-40281),\
- \ [CVE-2025-40280](https://nvd.nist.gov/vuln/detail/CVE-2025-40280), [CVE-2025-40279](https://nvd.nist.gov/vuln/detail/CVE-2025-40279),\
- \ [CVE-2025-40278](https://nvd.nist.gov/vuln/detail/CVE-2025-40278), [CVE-2025-40277](https://nvd.nist.gov/vuln/detail/CVE-2025-40277),\
- \ [CVE-2025-40268](https://nvd.nist.gov/vuln/detail/CVE-2025-40268), [CVE-2025-40214](https://nvd.nist.gov/vuln/detail/CVE-2025-40214),\
- \ [CVE-2025-40212](https://nvd.nist.gov/vuln/detail/CVE-2025-40212), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087),\
- \ [CVE-2024-57879](https://nvd.nist.gov/vuln/detail/CVE-2024-57879), [CVE-2024-57880](https://nvd.nist.gov/vuln/detail/CVE-2024-57880),\
- \ [CVE-2024-55642](https://nvd.nist.gov/vuln/detail/CVE-2024-55642), [CVE-2024-55641](https://nvd.nist.gov/vuln/detail/CVE-2024-55641),\
- \ [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683),\
- \ [CVE-2024-54460](https://nvd.nist.gov/vuln/detail/CVE-2024-54460), [CVE-2024-54191](https://nvd.nist.gov/vuln/detail/CVE-2024-54191),\
- \ [CVE-2024-53689](https://nvd.nist.gov/vuln/detail/CVE-2024-53689), [CVE-2024-53682](https://nvd.nist.gov/vuln/detail/CVE-2024-53682),\
- \ [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770),\
- \ [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660),\
- \ [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658),\
- \ [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56656](https://nvd.nist.gov/vuln/detail/CVE-2024-56656),\
- \ [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675),\
- \ [CVE-2024-56674](https://nvd.nist.gov/vuln/detail/CVE-2024-56674), [CVE-2024-56673](https://nvd.nist.gov/vuln/detail/CVE-2024-56673),\
- \ [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654),\
- \ [CVE-2024-56671](https://nvd.nist.gov/vuln/detail/CVE-2024-56671), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670),\
- \ [CVE-2024-56669](https://nvd.nist.gov/vuln/detail/CVE-2024-56669), [CVE-2024-56668](https://nvd.nist.gov/vuln/detail/CVE-2024-56668),\
- \ [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56666](https://nvd.nist.gov/vuln/detail/CVE-2024-56666),\
- \ [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664),\
- \ [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662),\
- \ [CVE-2024-56652](https://nvd.nist.gov/vuln/detail/CVE-2024-56652), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653),\
- \ [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240),\
- \ [CVE-2025-40261](https://nvd.nist.gov/vuln/detail/CVE-2025-40261), [CVE-2025-40266](https://nvd.nist.gov/vuln/detail/CVE-2025-40266),\
- \ [CVE-2025-40264](https://nvd.nist.gov/vuln/detail/CVE-2025-40264), [CVE-2025-40263](https://nvd.nist.gov/vuln/detail/CVE-2025-40263),\
- \ [CVE-2025-40262](https://nvd.nist.gov/vuln/detail/CVE-2025-40262), [CVE-2025-40254](https://nvd.nist.gov/vuln/detail/CVE-2025-40254),\
- \ [CVE-2025-40253](https://nvd.nist.gov/vuln/detail/CVE-2025-40253), [CVE-2025-40252](https://nvd.nist.gov/vuln/detail/CVE-2025-40252),\
- \ [CVE-2025-40251](https://nvd.nist.gov/vuln/detail/CVE-2025-40251), [CVE-2025-40250](https://nvd.nist.gov/vuln/detail/CVE-2025-40250),\
- \ [CVE-2025-40259](https://nvd.nist.gov/vuln/detail/CVE-2025-40259), [CVE-2025-40258](https://nvd.nist.gov/vuln/detail/CVE-2025-40258),\
- \ [CVE-2025-40257](https://nvd.nist.gov/vuln/detail/CVE-2025-40257), [CVE-2025-40246](https://nvd.nist.gov/vuln/detail/CVE-2025-40246),\
- \ [CVE-2025-40248](https://nvd.nist.gov/vuln/detail/CVE-2025-40248), [CVE-2025-40345](https://nvd.nist.gov/vuln/detail/CVE-2025-40345))\r\
- \n \r\n \r\n #### Updates:\r\n \r\n - Linux ([6.12.61](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.61)\
- \ (includes ([6.12.59](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.59),\
- \ [6.12.60](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.60))))\r\
- \n - ca-certificates ([3.119](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_119.html)\
- \ (includes [3.118.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_118_1.html)))"
- created_at: '2025-12-12T13:54:22Z'
+ body: "_Changes since **Stable 4459.2.2**_\r\n\r\n#### Security fixes:\r\n\r\n-\
+ \ Linux ([CVE-2025-68335](https://nvd.nist.gov/vuln/detail/CVE-2025-68335), [CVE-2025-68332](https://nvd.nist.gov/vuln/detail/CVE-2025-68332),\
+ \ [CVE-2025-68337](https://nvd.nist.gov/vuln/detail/CVE-2025-68337), [CVE-2025-68336](https://nvd.nist.gov/vuln/detail/CVE-2025-68336),\
+ \ [CVE-2025-68265](https://nvd.nist.gov/vuln/detail/CVE-2025-68265), [CVE-2025-68266](https://nvd.nist.gov/vuln/detail/CVE-2025-68266),\
+ \ [CVE-2025-68263](https://nvd.nist.gov/vuln/detail/CVE-2025-68263), [CVE-2025-68261](https://nvd.nist.gov/vuln/detail/CVE-2025-68261),\
+ \ [CVE-2025-68259](https://nvd.nist.gov/vuln/detail/CVE-2025-68259), [CVE-2025-68258](https://nvd.nist.gov/vuln/detail/CVE-2025-68258),\
+ \ [CVE-2025-68257](https://nvd.nist.gov/vuln/detail/CVE-2025-68257), [CVE-2025-68256](https://nvd.nist.gov/vuln/detail/CVE-2025-68256),\
+ \ [CVE-2025-68264](https://nvd.nist.gov/vuln/detail/CVE-2025-68264), [CVE-2025-68254](https://nvd.nist.gov/vuln/detail/CVE-2025-68254),\
+ \ [CVE-2025-68255](https://nvd.nist.gov/vuln/detail/CVE-2025-68255), [CVE-2025-68764](https://nvd.nist.gov/vuln/detail/CVE-2025-68764),\
+ \ [CVE-2025-68766](https://nvd.nist.gov/vuln/detail/CVE-2025-68766), [CVE-2025-68765](https://nvd.nist.gov/vuln/detail/CVE-2025-68765),\
+ \ [CVE-2025-68759](https://nvd.nist.gov/vuln/detail/CVE-2025-68759), [CVE-2025-68758](https://nvd.nist.gov/vuln/detail/CVE-2025-68758),\
+ \ [CVE-2025-68757](https://nvd.nist.gov/vuln/detail/CVE-2025-68757), [CVE-2025-68756](https://nvd.nist.gov/vuln/detail/CVE-2025-68756),\
+ \ [CVE-2025-68753](https://nvd.nist.gov/vuln/detail/CVE-2025-68753), [CVE-2025-68763](https://nvd.nist.gov/vuln/detail/CVE-2025-68763),\
+ \ [CVE-2025-68744](https://nvd.nist.gov/vuln/detail/CVE-2025-68744), [CVE-2025-68742](https://nvd.nist.gov/vuln/detail/CVE-2025-68742),\
+ \ [CVE-2025-68741](https://nvd.nist.gov/vuln/detail/CVE-2025-68741), [CVE-2025-68740](https://nvd.nist.gov/vuln/detail/CVE-2025-68740),\
+ \ [CVE-2025-68748](https://nvd.nist.gov/vuln/detail/CVE-2025-68748), [CVE-2025-68747](https://nvd.nist.gov/vuln/detail/CVE-2025-68747),\
+ \ [CVE-2025-68746](https://nvd.nist.gov/vuln/detail/CVE-2025-68746), [CVE-2025-68724](https://nvd.nist.gov/vuln/detail/CVE-2025-68724),\
+ \ [CVE-2025-68380](https://nvd.nist.gov/vuln/detail/CVE-2025-68380), [CVE-2025-68379](https://nvd.nist.gov/vuln/detail/CVE-2025-68379),\
+ \ [CVE-2025-68378](https://nvd.nist.gov/vuln/detail/CVE-2025-68378), [CVE-2025-68733](https://nvd.nist.gov/vuln/detail/CVE-2025-68733),\
+ \ [CVE-2025-68732](https://nvd.nist.gov/vuln/detail/CVE-2025-68732), [CVE-2025-68728](https://nvd.nist.gov/vuln/detail/CVE-2025-68728),\
+ \ [CVE-2025-68727](https://nvd.nist.gov/vuln/detail/CVE-2025-68727), [CVE-2025-68374](https://nvd.nist.gov/vuln/detail/CVE-2025-68374),\
+ \ [CVE-2025-68352](https://nvd.nist.gov/vuln/detail/CVE-2025-68352), [CVE-2025-68349](https://nvd.nist.gov/vuln/detail/CVE-2025-68349),\
+ \ [CVE-2025-68348](https://nvd.nist.gov/vuln/detail/CVE-2025-68348), [CVE-2025-68347](https://nvd.nist.gov/vuln/detail/CVE-2025-68347),\
+ \ [CVE-2025-68372](https://nvd.nist.gov/vuln/detail/CVE-2025-68372), [CVE-2025-68371](https://nvd.nist.gov/vuln/detail/CVE-2025-68371),\
+ \ [CVE-2025-68369](https://nvd.nist.gov/vuln/detail/CVE-2025-68369), [CVE-2025-68367](https://nvd.nist.gov/vuln/detail/CVE-2025-68367),\
+ \ [CVE-2025-68366](https://nvd.nist.gov/vuln/detail/CVE-2025-68366), [CVE-2025-68364](https://nvd.nist.gov/vuln/detail/CVE-2025-68364),\
+ \ [CVE-2025-68346](https://nvd.nist.gov/vuln/detail/CVE-2025-68346), [CVE-2025-68363](https://nvd.nist.gov/vuln/detail/CVE-2025-68363),\
+ \ [CVE-2025-68362](https://nvd.nist.gov/vuln/detail/CVE-2025-68362), [CVE-2025-68361](https://nvd.nist.gov/vuln/detail/CVE-2025-68361),\
+ \ [CVE-2025-68356](https://nvd.nist.gov/vuln/detail/CVE-2025-68356), [CVE-2025-68354](https://nvd.nist.gov/vuln/detail/CVE-2025-68354),\
+ \ [CVE-2025-68344](https://nvd.nist.gov/vuln/detail/CVE-2025-68344), [CVE-2025-68325](https://nvd.nist.gov/vuln/detail/CVE-2025-68325),\
+ \ [CVE-2025-68324](https://nvd.nist.gov/vuln/detail/CVE-2025-68324), [CVE-2025-71157](https://nvd.nist.gov/vuln/detail/CVE-2025-71157),\
+ \ [CVE-2025-71156](https://nvd.nist.gov/vuln/detail/CVE-2025-71156), [CVE-2025-71154](https://nvd.nist.gov/vuln/detail/CVE-2025-71154),\
+ \ [CVE-2025-71153](https://nvd.nist.gov/vuln/detail/CVE-2025-71153), [CVE-2025-71151](https://nvd.nist.gov/vuln/detail/CVE-2025-71151),\
+ \ [CVE-2025-71150](https://nvd.nist.gov/vuln/detail/CVE-2025-71150), [CVE-2025-71149](https://nvd.nist.gov/vuln/detail/CVE-2025-71149),\
+ \ [CVE-2025-71148](https://nvd.nist.gov/vuln/detail/CVE-2025-71148), [CVE-2025-71146](https://nvd.nist.gov/vuln/detail/CVE-2025-71146),\
+ \ [CVE-2025-71147](https://nvd.nist.gov/vuln/detail/CVE-2025-71147), [CVE-2025-71143](https://nvd.nist.gov/vuln/detail/CVE-2025-71143),\
+ \ [CVE-2025-71140](https://nvd.nist.gov/vuln/detail/CVE-2025-71140), [CVE-2025-71138](https://nvd.nist.gov/vuln/detail/CVE-2025-71138),\
+ \ [CVE-2025-71137](https://nvd.nist.gov/vuln/detail/CVE-2025-71137), [CVE-2025-71136](https://nvd.nist.gov/vuln/detail/CVE-2025-71136),\
+ \ [CVE-2025-71135](https://nvd.nist.gov/vuln/detail/CVE-2025-71135), [CVE-2025-71133](https://nvd.nist.gov/vuln/detail/CVE-2025-71133),\
+ \ [CVE-2025-71132](https://nvd.nist.gov/vuln/detail/CVE-2025-71132), [CVE-2025-71131](https://nvd.nist.gov/vuln/detail/CVE-2025-71131),\
+ \ [CVE-2025-71130](https://nvd.nist.gov/vuln/detail/CVE-2025-71130), [CVE-2025-71129](https://nvd.nist.gov/vuln/detail/CVE-2025-71129),\
+ \ [CVE-2025-71111](https://nvd.nist.gov/vuln/detail/CVE-2025-71111), [CVE-2025-71109](https://nvd.nist.gov/vuln/detail/CVE-2025-71109),\
+ \ [CVE-2025-71108](https://nvd.nist.gov/vuln/detail/CVE-2025-71108), [CVE-2025-71107](https://nvd.nist.gov/vuln/detail/CVE-2025-71107),\
+ \ [CVE-2025-71105](https://nvd.nist.gov/vuln/detail/CVE-2025-71105), [CVE-2025-71126](https://nvd.nist.gov/vuln/detail/CVE-2025-71126),\
+ \ [CVE-2025-71125](https://nvd.nist.gov/vuln/detail/CVE-2025-71125), [CVE-2025-71123](https://nvd.nist.gov/vuln/detail/CVE-2025-71123),\
+ \ [CVE-2025-71122](https://nvd.nist.gov/vuln/detail/CVE-2025-71122), [CVE-2025-71104](https://nvd.nist.gov/vuln/detail/CVE-2025-71104),\
+ \ [CVE-2025-71121](https://nvd.nist.gov/vuln/detail/CVE-2025-71121), [CVE-2025-71120](https://nvd.nist.gov/vuln/detail/CVE-2025-71120),\
+ \ [CVE-2025-71119](https://nvd.nist.gov/vuln/detail/CVE-2025-71119), [CVE-2025-71118](https://nvd.nist.gov/vuln/detail/CVE-2025-71118),\
+ \ [CVE-2025-71116](https://nvd.nist.gov/vuln/detail/CVE-2025-71116), [CVE-2025-71114](https://nvd.nist.gov/vuln/detail/CVE-2025-71114),\
+ \ [CVE-2025-71113](https://nvd.nist.gov/vuln/detail/CVE-2025-71113), [CVE-2025-71112](https://nvd.nist.gov/vuln/detail/CVE-2025-71112),\
+ \ [CVE-2025-71102](https://nvd.nist.gov/vuln/detail/CVE-2025-71102), [CVE-2025-71079](https://nvd.nist.gov/vuln/detail/CVE-2025-71079),\
+ \ [CVE-2025-71087](https://nvd.nist.gov/vuln/detail/CVE-2025-71087), [CVE-2025-71086](https://nvd.nist.gov/vuln/detail/CVE-2025-71086),\
+ \ [CVE-2025-71085](https://nvd.nist.gov/vuln/detail/CVE-2025-71085), [CVE-2025-71084](https://nvd.nist.gov/vuln/detail/CVE-2025-71084),\
+ \ [CVE-2025-71083](https://nvd.nist.gov/vuln/detail/CVE-2025-71083), [CVE-2025-71082](https://nvd.nist.gov/vuln/detail/CVE-2025-71082),\
+ \ [CVE-2025-71101](https://nvd.nist.gov/vuln/detail/CVE-2025-71101), [CVE-2025-71100](https://nvd.nist.gov/vuln/detail/CVE-2025-71100),\
+ \ [CVE-2025-71099](https://nvd.nist.gov/vuln/detail/CVE-2025-71099), [CVE-2025-71081](https://nvd.nist.gov/vuln/detail/CVE-2025-71081),\
+ \ [CVE-2025-71098](https://nvd.nist.gov/vuln/detail/CVE-2025-71098), [CVE-2025-71097](https://nvd.nist.gov/vuln/detail/CVE-2025-71097),\
+ \ [CVE-2025-71096](https://nvd.nist.gov/vuln/detail/CVE-2025-71096), [CVE-2025-71095](https://nvd.nist.gov/vuln/detail/CVE-2025-71095),\
+ \ [CVE-2025-71094](https://nvd.nist.gov/vuln/detail/CVE-2025-71094), [CVE-2025-71093](https://nvd.nist.gov/vuln/detail/CVE-2025-71093),\
+ \ [CVE-2025-71091](https://nvd.nist.gov/vuln/detail/CVE-2025-71091), [CVE-2025-71089](https://nvd.nist.gov/vuln/detail/CVE-2025-71089),\
+ \ [CVE-2025-71080](https://nvd.nist.gov/vuln/detail/CVE-2025-71080), [CVE-2025-71078](https://nvd.nist.gov/vuln/detail/CVE-2025-71078),\
+ \ [CVE-2025-71064](https://nvd.nist.gov/vuln/detail/CVE-2025-71064), [CVE-2025-71073](https://nvd.nist.gov/vuln/detail/CVE-2025-71073),\
+ \ [CVE-2025-71072](https://nvd.nist.gov/vuln/detail/CVE-2025-71072), [CVE-2025-71071](https://nvd.nist.gov/vuln/detail/CVE-2025-71071),\
+ \ [CVE-2025-71069](https://nvd.nist.gov/vuln/detail/CVE-2025-71069), [CVE-2025-71068](https://nvd.nist.gov/vuln/detail/CVE-2025-71068),\
+ \ [CVE-2025-71067](https://nvd.nist.gov/vuln/detail/CVE-2025-71067), [CVE-2025-71066](https://nvd.nist.gov/vuln/detail/CVE-2025-71066),\
+ \ [CVE-2025-71077](https://nvd.nist.gov/vuln/detail/CVE-2025-71077), [CVE-2025-71076](https://nvd.nist.gov/vuln/detail/CVE-2025-71076),\
+ \ [CVE-2025-71075](https://nvd.nist.gov/vuln/detail/CVE-2025-71075), [CVE-2025-71065](https://nvd.nist.gov/vuln/detail/CVE-2025-71065),\
+ \ [CVE-2025-68820](https://nvd.nist.gov/vuln/detail/CVE-2025-68820), [CVE-2025-68822](https://nvd.nist.gov/vuln/detail/CVE-2025-68822),\
+ \ [CVE-2025-68821](https://nvd.nist.gov/vuln/detail/CVE-2025-68821), [CVE-2025-68785](https://nvd.nist.gov/vuln/detail/CVE-2025-68785),\
+ \ [CVE-2025-68794](https://nvd.nist.gov/vuln/detail/CVE-2025-68794), [CVE-2025-68789](https://nvd.nist.gov/vuln/detail/CVE-2025-68789),\
+ \ [CVE-2025-68819](https://nvd.nist.gov/vuln/detail/CVE-2025-68819), [CVE-2025-68818](https://nvd.nist.gov/vuln/detail/CVE-2025-68818),\
+ \ [CVE-2025-68817](https://nvd.nist.gov/vuln/detail/CVE-2025-68817), [CVE-2025-68816](https://nvd.nist.gov/vuln/detail/CVE-2025-68816),\
+ \ [CVE-2025-68815](https://nvd.nist.gov/vuln/detail/CVE-2025-68815), [CVE-2025-68788](https://nvd.nist.gov/vuln/detail/CVE-2025-68788),\
+ \ [CVE-2025-68814](https://nvd.nist.gov/vuln/detail/CVE-2025-68814), [CVE-2025-68813](https://nvd.nist.gov/vuln/detail/CVE-2025-68813),\
+ \ [CVE-2025-68811](https://nvd.nist.gov/vuln/detail/CVE-2025-68811), [CVE-2025-68810](https://nvd.nist.gov/vuln/detail/CVE-2025-68810),\
+ \ [CVE-2025-68809](https://nvd.nist.gov/vuln/detail/CVE-2025-68809), [CVE-2025-68808](https://nvd.nist.gov/vuln/detail/CVE-2025-68808),\
+ \ [CVE-2025-68806](https://nvd.nist.gov/vuln/detail/CVE-2025-68806), [CVE-2025-68787](https://nvd.nist.gov/vuln/detail/CVE-2025-68787),\
+ \ [CVE-2025-68804](https://nvd.nist.gov/vuln/detail/CVE-2025-68804), [CVE-2025-68803](https://nvd.nist.gov/vuln/detail/CVE-2025-68803),\
+ \ [CVE-2025-68802](https://nvd.nist.gov/vuln/detail/CVE-2025-68802), [CVE-2025-68801](https://nvd.nist.gov/vuln/detail/CVE-2025-68801),\
+ \ [CVE-2025-68800](https://nvd.nist.gov/vuln/detail/CVE-2025-68800), [CVE-2025-68799](https://nvd.nist.gov/vuln/detail/CVE-2025-68799),\
+ \ [CVE-2025-68798](https://nvd.nist.gov/vuln/detail/CVE-2025-68798), [CVE-2025-68797](https://nvd.nist.gov/vuln/detail/CVE-2025-68797),\
+ \ [CVE-2025-68796](https://nvd.nist.gov/vuln/detail/CVE-2025-68796), [CVE-2025-68795](https://nvd.nist.gov/vuln/detail/CVE-2025-68795),\
+ \ [CVE-2025-68786](https://nvd.nist.gov/vuln/detail/CVE-2025-68786), [CVE-2025-68776](https://nvd.nist.gov/vuln/detail/CVE-2025-68776),\
+ \ [CVE-2025-68775](https://nvd.nist.gov/vuln/detail/CVE-2025-68775), [CVE-2025-68774](https://nvd.nist.gov/vuln/detail/CVE-2025-68774),\
+ \ [CVE-2025-68773](https://nvd.nist.gov/vuln/detail/CVE-2025-68773), [CVE-2025-68772](https://nvd.nist.gov/vuln/detail/CVE-2025-68772),\
+ \ [CVE-2025-68771](https://nvd.nist.gov/vuln/detail/CVE-2025-68771), [CVE-2025-68770](https://nvd.nist.gov/vuln/detail/CVE-2025-68770),\
+ \ [CVE-2025-68769](https://nvd.nist.gov/vuln/detail/CVE-2025-68769), [CVE-2025-68784](https://nvd.nist.gov/vuln/detail/CVE-2025-68784),\
+ \ [CVE-2025-68783](https://nvd.nist.gov/vuln/detail/CVE-2025-68783), [CVE-2025-68782](https://nvd.nist.gov/vuln/detail/CVE-2025-68782),\
+ \ [CVE-2025-68781](https://nvd.nist.gov/vuln/detail/CVE-2025-68781), [CVE-2025-68780](https://nvd.nist.gov/vuln/detail/CVE-2025-68780),\
+ \ [CVE-2025-68778](https://nvd.nist.gov/vuln/detail/CVE-2025-68778), [CVE-2025-68777](https://nvd.nist.gov/vuln/detail/CVE-2025-68777),\
+ \ [CVE-2025-68767](https://nvd.nist.gov/vuln/detail/CVE-2025-68767), [CVE-2025-71144](https://nvd.nist.gov/vuln/detail/CVE-2025-71144),\
+ \ [CVE-2025-71134](https://nvd.nist.gov/vuln/detail/CVE-2025-71134), [CVE-2025-71127](https://nvd.nist.gov/vuln/detail/CVE-2025-71127),\
+ \ [CVE-2025-71088](https://nvd.nist.gov/vuln/detail/CVE-2025-71088), [CVE-2026-22982](https://nvd.nist.gov/vuln/detail/CVE-2026-22982),\
+ \ [CVE-2026-22980](https://nvd.nist.gov/vuln/detail/CVE-2026-22980), [CVE-2026-22979](https://nvd.nist.gov/vuln/detail/CVE-2026-22979),\
+ \ [CVE-2026-22978](https://nvd.nist.gov/vuln/detail/CVE-2026-22978), [CVE-2026-22994](https://nvd.nist.gov/vuln/detail/CVE-2026-22994),\
+ \ [CVE-2025-71160](https://nvd.nist.gov/vuln/detail/CVE-2025-71160), [CVE-2026-22992](https://nvd.nist.gov/vuln/detail/CVE-2026-22992),\
+ \ [CVE-2026-22991](https://nvd.nist.gov/vuln/detail/CVE-2026-22991), [CVE-2026-22990](https://nvd.nist.gov/vuln/detail/CVE-2026-22990),\
+ \ [CVE-2026-22989](https://nvd.nist.gov/vuln/detail/CVE-2026-22989), [CVE-2026-22988](https://nvd.nist.gov/vuln/detail/CVE-2026-22988),\
+ \ [CVE-2026-22984](https://nvd.nist.gov/vuln/detail/CVE-2026-22984), [CVE-2026-22977](https://nvd.nist.gov/vuln/detail/CVE-2026-22977),\
+ \ [CVE-2026-22976](https://nvd.nist.gov/vuln/detail/CVE-2026-22976))\r\n- openssl\
+ \ ([CVE-2025-11187](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187),\
+ \ [CVE-2025-15467](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467),\
+ \ [CVE-2025-15468](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468),\
+ \ [CVE-2025-66199](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199),\
+ \ [CVE-2025-68160](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160),\
+ \ [CVE-2025-69418](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418),\
+ \ [CVE-2025-69419](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419),\
+ \ [CVE-2025-69420](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420),\
+ \ [CVE-2025-69421](https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421),\
+ \ [CVE-2026-22795](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795),\
+ \ [CVE-2026-22796](https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796))\r\
+ \n\r\n\r\n#### Updates:\r\n\r\n- Linux ([6.12.66](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.66)\
+ \ (includes [6.12.65](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.65),\
+ \ [6.12.64](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.64),\
+ \ [6.12.63](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.63),\
+ \ [6.12.62](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.62)))\r\
+ \n- ca-certificates ([3.120](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html))\r\
+ \n- openssl ([3.4.4](https://github.com/openssl/openssl/releases/tag/openssl-3.4.4))"
+ created_at: '2026-01-23T13:56:37Z'
draft: false
- html_url: https://github.com/flatcar/scripts/releases/tag/stable-4459.2.2
- id: 271479989
+ html_url: https://github.com/flatcar/scripts/releases/tag/stable-4459.2.3
+ id: 280330500
immutable: false
- name: stable-4459.2.2
- node_id: RE_kwDOB2MTHs4QLnS1
+ name: ''
+ node_id: RE_kwDOB2MTHs4QtYEE
prerelease: false
- published_at: '2025-12-18T15:25:15Z'
- tag_name: stable-4459.2.2
- tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/stable-4459.2.2
+ published_at: '2026-01-27T14:42:39Z'
+ tag_name: stable-4459.2.3
+ tarball_url: https://api.github.com/repos/flatcar/scripts/tarball/stable-4459.2.3
target_commitish: main
- updated_at: '2025-12-18T15:25:15Z'
- upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/271479989/assets{?name,label}
- url: https://api.github.com/repos/flatcar/scripts/releases/271479989
- zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/stable-4459.2.2
+ updated_at: '2026-01-27T14:42:39Z'
+ upload_url: https://uploads.github.com/repos/flatcar/scripts/releases/280330500/assets{?name,label}
+ url: https://api.github.com/repos/flatcar/scripts/releases/280330500
+ zipball_url: https://api.github.com/repos/flatcar/scripts/zipball/stable-4459.2.3
image_packages:
containerd: 2.0.7
docker: 28.0.4
ignition: 2.22.0
- kernel: 6.12.61
+ kernel: 6.12.66
systemd: '256'
release: current
-version: 4459.2.2
+version: 4459.2.3
diff --git a/static/releases-feed/releases-alpha.xml b/static/releases-feed/releases-alpha.xml
index 3a2f3482..6e7db9cc 100644
--- a/static/releases-feed/releases-alpha.xml
+++ b/static/releases-feed/releases-alpha.xml
@@ -2,7 +2,7 @@
/etc/ssh/sshd_config.d/.This release ships a major Docker update: Docker was upgraded to version 24 (from version 20 in the previous release). Please see the "Changes" section below for details.
Changes since Alpha 3760.0.0
@@ -2230,7 +2275,7 @@ Using the btrfs driver can still be enforced by creating a respective Changes since Alpha 3745.0.0Changes since Alpha 3602.0.0
Changes since Alpha 3374.0.0
Changes since Alpha 3305.0.0
Changes since Alpha 3277.0.0
Changes since Alpha 3255.0.0
Changes since Alpha 3227.0.0
Changes since Alpha 3200.0.0
Changes since Alpha 3185.0.0
Changes since Alpha-3165.0.0
Changes since Alpha 3139.0.0
Changes since Alpha 3127.0.0
Changes since Alpha 3115.0.0
Changes since Alpha 3066.0.0
Changes since Alpha 3033.0.0
Security fixes
@@ -4455,7 +4500,7 @@ Using the btrfs driver can still be enforced by creating a respective New Alpha release 3046.0.0Changes since Alpha 3033.0.0
Security fixes
@@ -4512,7 +4557,7 @@ Using the btrfs driver can still be enforced by creating a respective Update to CGroupsV2As of Alpha version 2969.0.0, Flatcar Container Linux migrates to the unified cgroup hierarchy (aka CGroupsV2)! New nodes will utilize CGroupsV2 by default. Existing nodes remain on CGroupsV1 and need to be manually migrated to CGroupsV2. To learn more about CGroupsV2 on Flatcar Container Linux and the migration guide, please refer to https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/
New Alpha release 3033.0.0
@@ -4594,7 +4639,7 @@ Using the btrfs driver can still be enforced by creating a respective Update to CGroupsV2As of Alpha version 2969.0.0, Flatcar Container Linux migrates to the unified cgroup hierarchy (aka CGroupsV2)! New nodes will utilize CGroupsV2 by default. Existing nodes remain on CGroupsV1 and need to be manually migrated to CGroupsV2. To learn more about CGroupsV2 on Flatcar Container Linux and the migration guide, please refer to https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/
New Alpha release 3005.0.1
@@ -4631,7 +4676,7 @@ Using the btrfs driver can still be enforced by creating a respective Update to CGroupsV2As of Alpha version 2969.0.0, Flatcar Container Linux migrates to the unified cgroup hierarchy (aka CGroupsV2)! New nodes will utilize CGroupsV2 by default. Existing nodes remain on CGroupsV1 and need to be manually migrated to CGroupsV2. To learn more about CGroupsV2 on Flatcar Container Linux and the migration guide, please refer to https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/
New Alpha release 3005.0.0
@@ -4692,7 +4737,7 @@ Using the btrfs driver can still be enforced by creating a respective New Alpha release 2983.0.0Update to CGroupsV2
As of Alpha version 2969.0.0, Flatcar Container Linux migrates to the unified cgroup hierarchy (aka CGroupsV2)! New nodes will utilize CGroupsV2 by default. Existing nodes remain on CGroupsV1 and need to be manually migrated to CGroupsV2. To learn more about CGroupsV2 on Flatcar Container Linux and the migration guide, please refer to https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/
@@ -4756,7 +4801,7 @@ Using the btrfs driver can still be enforced by creating a respective Update to CGroupsV2Flatcar Container Linux migrates to the unified cgroup hierarchy (aka cgroups v2)! New nodes will utilize cgroups v2 by default. Existing nodes remain on cgroups v1 and need to be manually migrated to cgroups v2. To learn more about the cgroups v2 on Flatcar Container Linux and the migration guide, please refer to https://flatcar-linux.org/docs/latest/container-runtimes/switching-to-unified-cgroups/
Security fixes
@@ -4828,7 +4873,7 @@ Using the btrfs driver can still be enforced by creating a respective Security fixesSecurity fixes:
Security fixes:
Bug fixes:
Bug fixes:
Bug fixes:
Security fixes:
Security fixes:
Security fixes:
It is the first release done for both amd64 and arm64.
Bug fixes:
@@ -6411,7 +6456,7 @@ Using the btrfs driver can still be enforced by creating a respective Flatcar updatesSecurity fixes:
Security fixes:
Bug fixes:
Changes:
Security fixes:
Bug fixes:
Security fixes:
Security fixes:
Security fixes:
Security fixes:
Security fixes:
Security fixes:
Bug fixes:
Bug fixes:
Security fixes:
Bug fixes:
Security fixes:
Bug fixes:
Security fixes:
Updates:
Security fixes:
Security fixes:
Security fixes:
Security fixes:
Security fixes:
Security fixes:
Security fixes:
Security fixes:
Security fixes:
Security fixes:
Bug fixes:
Security fixes:
Updates:
Security fixes:
Security fixes:
Security fixes:
Changes:
Bug fixes:
Bug fixes:
Changes:
Security fixes:
Security fixes:
Changes:
Changes:
Security fixes:
Bug fixes:
Bug fixes:
Security fixes:
Security fixes:
Bug fixes:
Security fixes:
Bug fixes:
Security fixes:
Initial Flatcar release.
Notes:
diff --git a/static/releases-feed/releases-beta.xml b/static/releases-feed/releases-beta.xml index 1744bba1..6f2c679b 100644 --- a/static/releases-feed/releases-beta.xml +++ b/static/releases-feed/releases-beta.xml @@ -2,7 +2,7 @@/etc/ssh/sshd_config.d/./etc/shadow, /etc/gshadow are now owned by the shadow group, /usr/bin/unix_chkpwd, /usr/bin/chage and /usr/bin/expiry are now also owned by the shadow group with a sticky bit enabled.