# Flatcar Container Linux Release - January 30th, 2025 ## Alpha 4230.0.0 - AMD64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: EM - ARM64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: EM ## Beta 4186.1.0 - AMD64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: EM - ARM64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: EM ## Stable 4152.2.0 - AMD64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: EM, partial DO - ARM64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: EM ## LTS 4081.3.0 - AMD64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: EM - ARM64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: EM VERDICT: _GO_ ## Notes: DigitalOean had been hitting droplet limit issue so a couple of tests had issues ``` coreos.ignition.once cl.ignition.v2.btrfsroot kubeadm.v1.30.1.flannel.base docker.network-openbsd-nc kubeadm.v1.32.0.flannel.base kubeadm.v1.30.1.calico.base ``` ## Communication --- #### Guidelines / Things to Remember - Release notes are used in a PR and will appear on https://www.flatcar.org/releases/ - [Announcement Message](#Announcement-Message) is posted in [Flatcar-Linux-user](https://groups.google.com/g/flatcar-linux-user). Make sure to post as “Flatcar Container Linux User”, not with your personal user (this can be selected when drafting the post). - Make sure the the LTS is referred to as `LTS-2021`, and not `LTS-2605` --- ### Announcement Message Subject: Announcing new releases Alpha 4230.0.0, Beta 4186.1.0, Stable 4152.2.0, LTS 4081.3.0 Hello, We are pleased to announce a new Flatcar Container Linux release for the Alpha, Beta, Stable and LTS-2024 channel. ### New Alpha Release 4230.0.0 _Changes since **Alpha 4186.0.0**_ #### Security fixes: - Linux ([CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584), [CVE-2024-56565](https://nvd.nist.gov/vuln/detail/CVE-2024-56565), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-53196](https://nvd.nist.gov/vuln/detail/CVE-2024-53196), [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683), [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658), [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675), [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664), [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-49568](https://nvd.nist.gov/vuln/detail/CVE-2024-49568), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56372](https://nvd.nist.gov/vuln/detail/CVE-2024-56372), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2024-54680](https://nvd.nist.gov/vuln/detail/CVE-2024-54680), [CVE-2024-46896](https://nvd.nist.gov/vuln/detail/CVE-2024-46896), [CVE-2024-56719](https://nvd.nist.gov/vuln/detail/CVE-2024-56719), [CVE-2024-56718](https://nvd.nist.gov/vuln/detail/CVE-2024-56718), [CVE-2024-56717](https://nvd.nist.gov/vuln/detail/CVE-2024-56717), [CVE-2024-56716](https://nvd.nist.gov/vuln/detail/CVE-2024-56716), [CVE-2024-56715](https://nvd.nist.gov/vuln/detail/CVE-2024-56715), [CVE-2024-56709](https://nvd.nist.gov/vuln/detail/CVE-2024-56709), [CVE-2024-53164](https://nvd.nist.gov/vuln/detail/CVE-2024-53164), [CVE-2024-57946](https://nvd.nist.gov/vuln/detail/CVE-2024-57946), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57798](https://nvd.nist.gov/vuln/detail/CVE-2024-57798), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-56766](https://nvd.nist.gov/vuln/detail/CVE-2024-56766), [CVE-2024-56765](https://nvd.nist.gov/vuln/detail/CVE-2024-56765), [CVE-2024-56763](https://nvd.nist.gov/vuln/detail/CVE-2024-56763), [CVE-2024-56762](https://nvd.nist.gov/vuln/detail/CVE-2024-56762), [CVE-2024-56760](https://nvd.nist.gov/vuln/detail/CVE-2024-56760), [CVE-2024-56769](https://nvd.nist.gov/vuln/detail/CVE-2024-56769), [CVE-2024-56767](https://nvd.nist.gov/vuln/detail/CVE-2024-56767), [CVE-2023-52881](https://nvd.nist.gov/vuln/detail/CVE-2023-52881), [CVE-2023-52654](https://nvd.nist.gov/vuln/detail/CVE-2023-52654), [CVE-2024-57938](https://nvd.nist.gov/vuln/detail/CVE-2024-57938), [CVE-2024-57933](https://nvd.nist.gov/vuln/detail/CVE-2024-57933), [CVE-2024-57932](https://nvd.nist.gov/vuln/detail/CVE-2024-57932), [CVE-2024-57930](https://nvd.nist.gov/vuln/detail/CVE-2024-57930), [CVE-2024-57931](https://nvd.nist.gov/vuln/detail/CVE-2024-57931), [CVE-2024-57841](https://nvd.nist.gov/vuln/detail/CVE-2024-57841), [CVE-2024-57802](https://nvd.nist.gov/vuln/detail/CVE-2024-57802), [CVE-2024-57801](https://nvd.nist.gov/vuln/detail/CVE-2024-57801), [CVE-2024-54031](https://nvd.nist.gov/vuln/detail/CVE-2024-54031), [CVE-2024-39282](https://nvd.nist.gov/vuln/detail/CVE-2024-39282), [CVE-2024-36476](https://nvd.nist.gov/vuln/detail/CVE-2024-36476), [CVE-2024-57896](https://nvd.nist.gov/vuln/detail/CVE-2024-57896), [CVE-2025-21629](https://nvd.nist.gov/vuln/detail/CVE-2025-21629), [CVE-2024-57903](https://nvd.nist.gov/vuln/detail/CVE-2024-57903), [CVE-2024-57902](https://nvd.nist.gov/vuln/detail/CVE-2024-57902), [CVE-2024-57901](https://nvd.nist.gov/vuln/detail/CVE-2024-57901), [CVE-2024-57900](https://nvd.nist.gov/vuln/detail/CVE-2024-57900), [CVE-2024-57899](https://nvd.nist.gov/vuln/detail/CVE-2024-57899), [CVE-2024-57897](https://nvd.nist.gov/vuln/detail/CVE-2024-57897), [CVE-2024-57890](https://nvd.nist.gov/vuln/detail/CVE-2024-57890), [CVE-2024-57889](https://nvd.nist.gov/vuln/detail/CVE-2024-57889), [CVE-2024-57887](https://nvd.nist.gov/vuln/detail/CVE-2024-57887), [CVE-2024-57885](https://nvd.nist.gov/vuln/detail/CVE-2024-57885), [CVE-2024-57884](https://nvd.nist.gov/vuln/detail/CVE-2024-57884), [CVE-2024-57895](https://nvd.nist.gov/vuln/detail/CVE-2024-57895), [CVE-2024-57894](https://nvd.nist.gov/vuln/detail/CVE-2024-57894), [CVE-2024-57893](https://nvd.nist.gov/vuln/detail/CVE-2024-57893), [CVE-2024-57892](https://nvd.nist.gov/vuln/detail/CVE-2024-57892), [CVE-2024-57882](https://nvd.nist.gov/vuln/detail/CVE-2024-57882), [CVE-2024-53685](https://nvd.nist.gov/vuln/detail/CVE-2024-53685), [CVE-2025-21658](https://nvd.nist.gov/vuln/detail/CVE-2025-21658), [CVE-2025-21656](https://nvd.nist.gov/vuln/detail/CVE-2025-21656), [CVE-2024-57945](https://nvd.nist.gov/vuln/detail/CVE-2024-57945), [CVE-2025-21664](https://nvd.nist.gov/vuln/detail/CVE-2025-21664), [CVE-2025-21663](https://nvd.nist.gov/vuln/detail/CVE-2025-21663), [CVE-2025-21662](https://nvd.nist.gov/vuln/detail/CVE-2025-21662), [CVE-2025-21660](https://nvd.nist.gov/vuln/detail/CVE-2025-21660), [CVE-2024-57939](https://nvd.nist.gov/vuln/detail/CVE-2024-57939), [CVE-2024-57940](https://nvd.nist.gov/vuln/detail/CVE-2024-57940), [CVE-2025-21655](https://nvd.nist.gov/vuln/detail/CVE-2025-21655), [CVE-2024-57913](https://nvd.nist.gov/vuln/detail/CVE-2024-57913), [CVE-2024-57912](https://nvd.nist.gov/vuln/detail/CVE-2024-57912), [CVE-2024-57911](https://nvd.nist.gov/vuln/detail/CVE-2024-57911), [CVE-2024-57910](https://nvd.nist.gov/vuln/detail/CVE-2024-57910), [CVE-2024-57908](https://nvd.nist.gov/vuln/detail/CVE-2024-57908), [CVE-2024-57907](https://nvd.nist.gov/vuln/detail/CVE-2024-57907), [CVE-2024-57929](https://nvd.nist.gov/vuln/detail/CVE-2024-57929), [CVE-2024-57926](https://nvd.nist.gov/vuln/detail/CVE-2024-57926), [CVE-2024-57925](https://nvd.nist.gov/vuln/detail/CVE-2024-57925), [CVE-2024-57906](https://nvd.nist.gov/vuln/detail/CVE-2024-57906), [CVE-2024-57922](https://nvd.nist.gov/vuln/detail/CVE-2024-57922), [CVE-2024-57917](https://nvd.nist.gov/vuln/detail/CVE-2024-57917), [CVE-2024-57916](https://nvd.nist.gov/vuln/detail/CVE-2024-57916), [CVE-2024-57915](https://nvd.nist.gov/vuln/detail/CVE-2024-57915), [CVE-2024-57904](https://nvd.nist.gov/vuln/detail/CVE-2024-57904), [CVE-2025-21654](https://nvd.nist.gov/vuln/detail/CVE-2025-21654), [CVE-2025-21653](https://nvd.nist.gov/vuln/detail/CVE-2025-21653), [CVE-2025-21652](https://nvd.nist.gov/vuln/detail/CVE-2025-21652), [CVE-2025-21640](https://nvd.nist.gov/vuln/detail/CVE-2025-21640), [CVE-2025-21639](https://nvd.nist.gov/vuln/detail/CVE-2025-21639), [CVE-2025-21638](https://nvd.nist.gov/vuln/detail/CVE-2025-21638), [CVE-2025-21637](https://nvd.nist.gov/vuln/detail/CVE-2025-21637), [CVE-2025-21636](https://nvd.nist.gov/vuln/detail/CVE-2025-21636), [CVE-2025-21648](https://nvd.nist.gov/vuln/detail/CVE-2025-21648), [CVE-2025-21647](https://nvd.nist.gov/vuln/detail/CVE-2025-21647), [CVE-2025-21646](https://nvd.nist.gov/vuln/detail/CVE-2025-21646), [CVE-2025-21645](https://nvd.nist.gov/vuln/detail/CVE-2025-21645), [CVE-2025-21642](https://nvd.nist.gov/vuln/detail/CVE-2025-21642), [CVE-2025-21631](https://nvd.nist.gov/vuln/detail/CVE-2025-21631), [CVE-2025-21632](https://nvd.nist.gov/vuln/detail/CVE-2025-21632)) - curl ([CVE-2024-11053](https://nvd.nist.gov/vuln/detail/CVE-2024-11053), [CVE-2024-9681](https://nvd.nist.gov/vuln/detail/CVE-2024-9681)) - sysext-podman: containers-storage, podman ([CVE-2024-9676](https://nvd.nist.gov/vuln/detail/CVE-2024-9676)) #### Bug fixes: - Fixed creating netdev arguments to correctly include commas when no port forwards are passed ([flatcar/scripts#2581](https://github.com/flatcar/scripts/pull/2581)) #### Changes: - Added support for multiple port forwarding parameters in the QEMU startup script. Users can now specify multiple port forwards using the `-f` option. ([flatcar/scripts#2575](https://github.com/flatcar/scripts/pull/2575)) #### Updates: - Go ([1.22.11](https://go.dev/doc/devel/release#go1.22.11)) - Linux ([6.6.74](https://lwn.net/Articles/1006010) (includes [6.6.73](https://lwn.net/Articles/1005709), [6.6.72](https://lwn.net/Articles/1005383), [6.6.71](https://lwn.net/Articles/1004703), [6.6.70](https://lwn.net/Articles/1004551), [6.6.69](https://lwn.net/Articles/1003986), [6.6.68](https://lwn.net/Articles/1003609), [6.6.67](https://lwn.net/Articles/1002919), [6.6.66](https://lwn.net/Articles/1002177))) - Linux Firmware ([20250109](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250109)) - SDK: qemu ([8.2.7](https://lists.gnu.org/archive/html/qemu-devel/2024-09/msg03900.html)) - azure, dev, gce, sysext-python: python ([3.11.11_p1](https://www.python.org/downloads/release/python-31111/)) - base, dev: audit ([4.0.2](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.2)) - base, dev: bpftool ([7.5.0](https://github.com/libbpf/bpftool/releases/tag/v7.5.0)) - base, dev: btrfs-progs ([6.12](https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.12/CHANGES)) - base, dev: c-ares ([1.34.3](https://github.com/c-ares/c-ares/releases/tag/v1.34.3) (includes [1.34.2](https://github.com/c-ares/c-ares/releases/tag/v1.34.2), [1.34.1](https://github.com/c-ares/c-ares/releases/tag/v1.34.1), [1.34.0](https://github.com/c-ares/c-ares/releases/tag/v1.34.0))) - base, dev: ethtool ([6.10](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.10)) - base, dev: glib ([2.80.5](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.5) (includes [2.80.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.4), [2.80.3](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.3), [2.80.2](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.2), [2.80.1](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.1), [2.80.0](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.0))) - base, dev: gnupg ([2.4.6](https://lists.gnupg.org/pipermail/gnupg-announce/2024q4/000486.html)) - base, dev: hwdata ([0.390](https://github.com/vcrhonek/hwdata/releases/tag/v0.390)) - base, dev: intel-microcode ([20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112) (includes [20241029](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241029))) - base, dev: iproute2 ([6.12.0](https://lore.kernel.org/netdev/20241119092743.6a1bdcb7@hermes.local/)) - base, dev: kexec-tools ([2.0.30](https://github.com/horms/kexec-tools/commits/v2.0.30/)) - base, dev: libcap ([2.71](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.oq9dsdhihxp5)) - base, dev: libgpg-error ([1.51](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=75f2b2d220de4e4f53252d3367950ecb2ab85079;hb=b0bb9266010d84b30fa2dc6a2127b7e40dc03660)) - base, dev: libnvme ([1.11.1](https://github.com/linux-nvme/libnvme/releases/tag/v1.11.1) (includes [1.11](https://github.com/linux-nvme/libnvme/releases/tag/v1.11))) - base, dev: libxml2 ([2.12.9](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.9)) - base, dev: lsof ([4.99.4](https://github.com/lsof-org/lsof/releases/tag/4.99.4)) - base, dev: npth ([1.8](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=0f8d78958d8059de95e363a977051995e05dc691;hb=64905e765aad9de6054ef70a97fc30bd992ce999)) - base, dev: nvme-cli ([2.11](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.11)) - base, dev: openldap ([2.6.8](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_8/CHANGES) (includes [2.6.7](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_7/CHANGES))) - base, dev: strace ([6.12](https://github.com/strace/strace/releases/tag/v6.12) (includes [6.11](https://github.com/strace/strace/releases/tag/v6.11), [6.10](https://github.com/strace/strace/releases/tag/v6.10))) - base, dev: usbutils ([018](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v018)) - base, dev: xfsprogs ([6.11.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.11.0)) - dev: bash-completion ([2.15.0](https://github.com/scop/bash-completion/releases/tag/2.15.0)) - dev: binutils ([2.43](https://lists.gnu.org/archive/html/info-gnu/2024-08/msg00001.html)) github.com/docker/buildx/releases/tag/v0.13.0), [0.12.0](https://github.com/docker/buildx/releases/tag/v0.12.0), [0.11.0](https://github.com/docker/buildx/releases/tag/v0.11.0))) - gce: six ([1.17.0](https://github.com/benjaminp/six/blob/1.17.0/CHANGES)) - sysext-docker: docker-buildx ([0.14.0](https://github.com/docker/buildx/releases/tag/v0.14.0) (includes [0.13.0](https://- sysext-podman: containers-storage ([1.55.1](https://github.com/containers/storage/releases/tag/v1.55.1)) - sysext-podman: gpgme ([1.24.1](https://dev.gnupg.org/T7440) (includes [1.24.0](https://dev.gnupg.org/T7376))) - sysext-podman: podman ([5.3.0](https://github.com/containers/podman/releases/tag/v5.3.0)) - sysext-python: charset-normalizer ([3.4.1](https://github.com/jawah/charset_normalizer/releases/tag/3.4.1)) - sysext-python: pip ([24.3.1](https://github.com/pypa/pip/blob/24.3.1/NEWS.rst) (includes [24.3](https://github.com/pypa/pip/blob/24.3/NEWS.rst))) - sysext-python: setuptools ([75.6.0](https://github.com/pypa/setuptools/blob/v75.6.0/NEWS.rst) (includes [75.5.0](https://github.com/pypa/setuptools/blob/75.5.0/NEWS.rst), [75.4.0](https://github.com/pypa/setuptools/blob/75.4.0/NEWS.rst), [75.3.0](https://github.com/pypa/setuptools/blob/75.3.0/NEWS.rst), [75.2.0](https://github.com/pypa/setuptools/blob/75.2.0/NEWS.rst), [75.1.1](https://github.com/pypa/setuptools/blob/75.1.1/NEWS.rst), [75.1.0](https://github.com/pypa/setuptools/blob/75.1.0/NEWS.rst), [75.0.0](https://github.com/pypa/setuptools/blob/75.0.0/NEWS.rst))) - sysext-python: urllib3 ([2.3.0](https://github.com/urllib3/urllib3/releases/tag/2.3.0)) - sysext-python: wheel ([0.45.1](https://github.com/pypa/wheel/releases/tag/0.45.1) (includes [0.45.0](https://github.com/pypa/wheel/releases/tag/0.45.0))) - sysext-zfs: zfs ([2.2.7](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.7) (includes [2.2.6](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.6))) - systemd ([256.9](https://github.com/systemd/system/releases/tag/v256.9)) - VMware: libltdl ([2.5.4](https://savannah.gnu.org/news/?id=10693) (includes [2.5.3](https://savannah.gnu.org/news/?id=10676), [2.5.2](https://savannah.gnu.org/news/?id=10669), [2.5.1](https://savannah.gnu.org/news/?id=10660), [2.5.0](https://savannah.gnu.org/news/?id=10631))) ### New Beta Release 4186.1.0 _Changes since **Beta 4152.1.0**_ #### Security fixes: - Linux ([CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584), [CVE-2024-56565](https://nvd.nist.gov/vuln/detail/CVE-2024-56565), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-53196](https://nvd.nist.gov/vuln/detail/CVE-2024-53196), [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683), [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658), [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675), [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664), [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-49568](https://nvd.nist.gov/vuln/detail/CVE-2024-49568), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56372](https://nvd.nist.gov/vuln/detail/CVE-2024-56372), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2024-54680](https://nvd.nist.gov/vuln/detail/CVE-2024-54680), [CVE-2024-46896](https://nvd.nist.gov/vuln/detail/CVE-2024-46896), [CVE-2024-56719](https://nvd.nist.gov/vuln/detail/CVE-2024-56719), [CVE-2024-56718](https://nvd.nist.gov/vuln/detail/CVE-2024-56718), [CVE-2024-56717](https://nvd.nist.gov/vuln/detail/CVE-2024-56717), [CVE-2024-56716](https://nvd.nist.gov/vuln/detail/CVE-2024-56716), [CVE-2024-56715](https://nvd.nist.gov/vuln/detail/CVE-2024-56715), [CVE-2024-56709](https://nvd.nist.gov/vuln/detail/CVE-2024-56709), [CVE-2024-53164](https://nvd.nist.gov/vuln/detail/CVE-2024-53164), [CVE-2024-57946](https://nvd.nist.gov/vuln/detail/CVE-2024-57946), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57798](https://nvd.nist.gov/vuln/detail/CVE-2024-57798), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-56766](https://nvd.nist.gov/vuln/detail/CVE-2024-56766), [CVE-2024-56765](https://nvd.nist.gov/vuln/detail/CVE-2024-56765), [CVE-2024-56763](https://nvd.nist.gov/vuln/detail/CVE-2024-56763), [CVE-2024-56762](https://nvd.nist.gov/vuln/detail/CVE-2024-56762), [CVE-2024-56760](https://nvd.nist.gov/vuln/detail/CVE-2024-56760), [CVE-2024-56769](https://nvd.nist.gov/vuln/detail/CVE-2024-56769), [CVE-2024-56767](https://nvd.nist.gov/vuln/detail/CVE-2024-56767), [CVE-2023-52881](https://nvd.nist.gov/vuln/detail/CVE-2023-52881), [CVE-2023-52654](https://nvd.nist.gov/vuln/detail/CVE-2023-52654), [CVE-2024-57938](https://nvd.nist.gov/vuln/detail/CVE-2024-57938), [CVE-2024-57933](https://nvd.nist.gov/vuln/detail/CVE-2024-57933), [CVE-2024-57932](https://nvd.nist.gov/vuln/detail/CVE-2024-57932), [CVE-2024-57930](https://nvd.nist.gov/vuln/detail/CVE-2024-57930), [CVE-2024-57931](https://nvd.nist.gov/vuln/detail/CVE-2024-57931), [CVE-2024-57841](https://nvd.nist.gov/vuln/detail/CVE-2024-57841), [CVE-2024-57802](https://nvd.nist.gov/vuln/detail/CVE-2024-57802), [CVE-2024-57801](https://nvd.nist.gov/vuln/detail/CVE-2024-57801), [CVE-2024-54031](https://nvd.nist.gov/vuln/detail/CVE-2024-54031), [CVE-2024-39282](https://nvd.nist.gov/vuln/detail/CVE-2024-39282), [CVE-2024-36476](https://nvd.nist.gov/vuln/detail/CVE-2024-36476), [CVE-2024-57896](https://nvd.nist.gov/vuln/detail/CVE-2024-57896), [CVE-2025-21629](https://nvd.nist.gov/vuln/detail/CVE-2025-21629), [CVE-2024-57903](https://nvd.nist.gov/vuln/detail/CVE-2024-57903), [CVE-2024-57902](https://nvd.nist.gov/vuln/detail/CVE-2024-57902), [CVE-2024-57901](https://nvd.nist.gov/vuln/detail/CVE-2024-57901), [CVE-2024-57900](https://nvd.nist.gov/vuln/detail/CVE-2024-57900), [CVE-2024-57899](https://nvd.nist.gov/vuln/detail/CVE-2024-57899), [CVE-2024-57897](https://nvd.nist.gov/vuln/detail/CVE-2024-57897), [CVE-2024-57890](https://nvd.nist.gov/vuln/detail/CVE-2024-57890), [CVE-2024-57889](https://nvd.nist.gov/vuln/detail/CVE-2024-57889), [CVE-2024-57887](https://nvd.nist.gov/vuln/detail/CVE-2024-57887), [CVE-2024-57885](https://nvd.nist.gov/vuln/detail/CVE-2024-57885), [CVE-2024-57884](https://nvd.nist.gov/vuln/detail/CVE-2024-57884), [CVE-2024-57895](https://nvd.nist.gov/vuln/detail/CVE-2024-57895), [CVE-2024-57894](https://nvd.nist.gov/vuln/detail/CVE-2024-57894), [CVE-2024-57893](https://nvd.nist.gov/vuln/detail/CVE-2024-57893), [CVE-2024-57892](https://nvd.nist.gov/vuln/detail/CVE-2024-57892), [CVE-2024-57882](https://nvd.nist.gov/vuln/detail/CVE-2024-57882), [CVE-2024-53685](https://nvd.nist.gov/vuln/detail/CVE-2024-53685), [CVE-2025-21658](https://nvd.nist.gov/vuln/detail/CVE-2025-21658), [CVE-2025-21656](https://nvd.nist.gov/vuln/detail/CVE-2025-21656), [CVE-2024-57945](https://nvd.nist.gov/vuln/detail/CVE-2024-57945), [CVE-2025-21664](https://nvd.nist.gov/vuln/detail/CVE-2025-21664), [CVE-2025-21663](https://nvd.nist.gov/vuln/detail/CVE-2025-21663), [CVE-2025-21662](https://nvd.nist.gov/vuln/detail/CVE-2025-21662), [CVE-2025-21660](https://nvd.nist.gov/vuln/detail/CVE-2025-21660), [CVE-2024-57939](https://nvd.nist.gov/vuln/detail/CVE-2024-57939), [CVE-2024-57940](https://nvd.nist.gov/vuln/detail/CVE-2024-57940), [CVE-2025-21655](https://nvd.nist.gov/vuln/detail/CVE-2025-21655), [CVE-2024-57913](https://nvd.nist.gov/vuln/detail/CVE-2024-57913), [CVE-2024-57912](https://nvd.nist.gov/vuln/detail/CVE-2024-57912), [CVE-2024-57911](https://nvd.nist.gov/vuln/detail/CVE-2024-57911), [CVE-2024-57910](https://nvd.nist.gov/vuln/detail/CVE-2024-57910), [CVE-2024-57908](https://nvd.nist.gov/vuln/detail/CVE-2024-57908), [CVE-2024-57907](https://nvd.nist.gov/vuln/detail/CVE-2024-57907), [CVE-2024-57929](https://nvd.nist.gov/vuln/detail/CVE-2024-57929), [CVE-2024-57926](https://nvd.nist.gov/vuln/detail/CVE-2024-57926), [CVE-2024-57925](https://nvd.nist.gov/vuln/detail/CVE-2024-57925), [CVE-2024-57906](https://nvd.nist.gov/vuln/detail/CVE-2024-57906), [CVE-2024-57922](https://nvd.nist.gov/vuln/detail/CVE-2024-57922), [CVE-2024-57917](https://nvd.nist.gov/vuln/detail/CVE-2024-57917), [CVE-2024-57916](https://nvd.nist.gov/vuln/detail/CVE-2024-57916), [CVE-2024-57915](https://nvd.nist.gov/vuln/detail/CVE-2024-57915), [CVE-2024-57904](https://nvd.nist.gov/vuln/detail/CVE-2024-57904), [CVE-2025-21654](https://nvd.nist.gov/vuln/detail/CVE-2025-21654), [CVE-2025-21653](https://nvd.nist.gov/vuln/detail/CVE-2025-21653), [CVE-2025-21652](https://nvd.nist.gov/vuln/detail/CVE-2025-21652), [CVE-2025-21640](https://nvd.nist.gov/vuln/detail/CVE-2025-21640), [CVE-2025-21639](https://nvd.nist.gov/vuln/detail/CVE-2025-21639), [CVE-2025-21638](https://nvd.nist.gov/vuln/detail/CVE-2025-21638), [CVE-2025-21637](https://nvd.nist.gov/vuln/detail/CVE-2025-21637), [CVE-2025-21636](https://nvd.nist.gov/vuln/detail/CVE-2025-21636), [CVE-2025-21648](https://nvd.nist.gov/vuln/detail/CVE-2025-21648), [CVE-2025-21647](https://nvd.nist.gov/vuln/detail/CVE-2025-21647), [CVE-2025-21646](https://nvd.nist.gov/vuln/detail/CVE-2025-21646), [CVE-2025-21645](https://nvd.nist.gov/vuln/detail/CVE-2025-21645), [CVE-2025-21642](https://nvd.nist.gov/vuln/detail/CVE-2025-21642), [CVE-2025-21631](https://nvd.nist.gov/vuln/detail/CVE-2025-21631), [CVE-2025-21632](https://nvd.nist.gov/vuln/detail/CVE-2025-21632)) - expat ([CVE-2024-50602](https://nvd.nist.gov/vuln/detail/CVE-2024-50602)) - sssd ([CVE-2023-3758](https://nvd.nist.gov/vuln/detail/CVE-2023-3758)) - wget ([CVE-2024-10524](https://nvd.nist.gov/vuln/detail/CVE-2024-10524)) #### Changes: - Additional GRUB modules are no longer installed for UEFI platforms to save space and also because they cannot be loaded with Secure Boot enabled. This does not affect existing installations. - The GRUB modules on non-UEFI platforms are now compressed with xz rather than gzip to save even more space. This does not affect existing installations. - The VFIO kernel modules are now also available in ARM64 builds. ([flatcar/scripts#2484](https://github.com/flatcar/scripts/pull/2484))- Enabled the gtp kernel module. This is the GPRS Tunneling Protocol datapath for usage in telecoms scenarios. ([flatcar/scripts#2504](https://github.com/flatcar/scripts/pull/2504)) #### Updates: - Go ([1.22.10](https://go.dev/doc/devel/release#go1.22.10)) - Linux ([6.6.74](https://lwn.net/Articles/1006010) (includes [6.6.73](https://lwn.net/Articles/1005709), [6.6.72](https://lwn.net/Articles/1005383), [6.6.71](https://lwn.net/Articles/1004703), [6.6.70](https://lwn.net/Articles/1004551), [6.6.69](https://lwn.net/Articles/1003986), [6.6.68](https://lwn.net/Articles/1003609), [6.6.67](https://lwn.net/Articles/1002919), [6.6.66](https://lwn.net/Articles/1002177), [6.6.65](https://lwn.net/Articles/1001732))) - Linux Firmware ([20241210](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241210) (includes [20241110](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241110))) - SDK: autoconf ([2.72](https://lists.gnu.org/archive/html/autotools-announce/2023-12/msg00003.html)) - SDK: cmake ([3.30.5](https://cmake.org/cmake/help/v3.30/release/3.30.html#id5)) - SDK: libpng ([1.6.44](https://github.com/pnggroup/libpng/blob/v1.6.44/CHANGES#L6199)) - SDK: perf ([6.11.7](https://kernelnewbies.org/Linux_6.11#Tracing.2C_perf_and_BPF)) - SDK: pkgcheck ([0.10.32](https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.32)) - SDK: portage ([3.0.66.1](https://github.com/gentoo/portage/blob/portage-3.0.66.1/NEWS#L9)) - azure: chrony ([4.6.1](https://gitlab.com/chrony/chrony/-/blob/4.6.1/NEWS)) - base, dev: azure-vm-utils ([0.4.0](https://github.com/Azure/azure-vm-utils/commits/v0.4.0/)) - base, dev: bind ([9.18.29](https://bind9.readthedocs.io/en/v9.18.29/notes.html#notes-for-bind-9-18-29)) - base, dev: bpftool ([7.4.0](https://github.com/libbpf/bpftool/releases/tag/v7.4.0)) - base, dev: btrfs-progs ([6.11](https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.11/CHANGES)) - base, dev: checkpolicy ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7)) - base, dev: expat ([2.6.4](https://github.com/libexpat/libexpat/blob/R_2_6_4/expat/Changes)) - base, dev: gawk ([5.3.1](https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00008.html)) - base, dev: gcc ([14.2.1_p20241116](https://gcc.gnu.org/gcc-14/changes.html)) - base, dev: iproute2 ([6.11.0](https://lore.kernel.org/netdev/20240915201831.164de47e@hermes.local/) (includes [6.10.0](https://lore.kernel.org/netdev/20240717090601.20b2871f@hermes.local/))) - base, dev: iputils ([20240905](https://github.com/iputils/iputils/releases/tag/20240905)) - base, dev: json-c ([0.18](https://github.com/json-c/json-c/blob/json-c-0.18-20240915/ChangeLog)) - base, dev: kexec-tools ([2.0.29](https://github.com/horms/kexec-tools/commits/v2.0.29/)) - base, dev: less ([668](https://www.greenwoodsoftware.com/less/news.668.html)) - base, dev: libarchive ([3.7.7](https://github.com/libarchive/libarchive/releases/tag/v3.7.7)) - base, dev: libnetfilter_conntrack ([1.1.0](https://lists.netfilter.org/pipermail/netfilter-announce/2024/000260.html)) - base, dev: libnftnl ([1.2.8](https://lists.netfilter.org/pipermail/netfilter-announce/2024/000261.html)) - base, dev: libselinux ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7)) - base, dev: libsepol ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7)) - base, dev: libuv ([1.49.2](https://github.com/libuv/libuv/releases/tag/v1.49.2) (includes [1.49.1](https://github.com/libuv/libuv/releases/tag/v1.49.1), [1.49.0](https://github.com/libuv/libuv/releases/tag/v1.49.0))) - base, dev: libxml2 ([2.12.8](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.8)) - base, dev: mokutil ([0.7.2](https://github.com/lcp/mokutil/commits/0.7.2/)) - base, dev: openldap ([2.6.6](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_6/CHANGES) (includes [2.6.5](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_5/CHANGES))) - base, dev: pax-utils ([1.3.8](https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.8)) - base, dev: util-linux ([2.40.2](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.2/Documentation/releases/v2.40.2-ReleaseNotes) (includes [2.40.1](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.1/Documentation/releases/v2.40.1-ReleaseNotes), [2.40.0](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40/Documentation/releases/v2.40-ReleaseNotes))) - base, dev: wget ([1.25.0](https://lists.gnu.org/archive/html/info-gnu/2024-11/msg00000.html)) - base, dev: xfsprogs ([6.10.1](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.10.1) (includes [6.10.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.10.0), [6.9.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.9.0))) - base, dev: xz-utils ([5.6.3](https://github.com/tukaani-project/xz/releases/tag/v5.6.3)) - dev: gentoolkit ([0.6.8](https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.8)) - sssd ([2.9.5](https://sssd.io/release-notes/sssd-2.9.5.html) (includes [2.9.4](https://sssd.io/release-notes/sssd-2.9.4.html), [2.9.3](https://sssd.io/release-notes/sssd-2.9.3.html), [2.9.2](https://sssd.io/release-notes/sssd-2.9.2.html), [2.9.1](https://sssd.io/release-notes/sssd-2.9.1.html), [2.9.0](https://sssd.io/release-notes/sssd-2.9.0.html), [2.8.0](https://sssd.io/release-notes/sssd-2.8.0.html), [2.7.0](https://sssd.io/release-notes/sssd-2.7.0.html), [2.6.0](https://sssd.io/release-notes/sssd-2.6.0.html), [2.5.0](https://sssd.io/release-notes/sssd-2.5.0.html), [2.4.0](https://sssd.io/release-notes/sssd-2.4.0.html))) - sysext-docker: docker ([27.3.1](https://github.com/moby/moby/releases/tag/v27.3.1)) - sysext-docker: docker-cli ([27.3.1](https://github.com/moby/moby/releases/tag/v27.3.1)) - sysext-python: cachecontrol ([0.14.1](https://github.com/psf/cachecontrol/releases/tag/v0.14.1)) - sysext-python: charset-normalizer ([3.4.0](https://github.com/jawah/charset_normalizer/releases/tag/3.4.0)) - sysext-python: distlib ([0.3.9](https://github.com/pypa/distlib/blob/0.3.9/CHANGES.rst)) - sysext-python: jaraco-functools ([4.1.0](https://github.com/jaraco/jaraco.functools/blob/v4.1.0/NEWS.rsto)) - sysext-python: packaging ([24.2](https://github.com/pypa/packaging/releases/tag/24.2)) - sysext-python: pyproject-hooks ([1.2.0](https://github.com/pypa/pyproject-hooks/blob/v1.2.0/docs/changelog.rst)) - sysext-python: resolvelib ([1.1.0](https://github.com/sarugaku/resolvelib/blob/1.1.0/CHANGELOG.rst)) - sysext-python: rich ([13.9.3](https://github.com/Textualize/rich/releases/tag/v13.9.3)) - sysext-python: trove-classifiers ([2024.10.21.16](https://github.com/pypa/trove-classifiers/commits/2024.10.21.16/)) - sysext-python: truststore ([0.10.0](https://github.com/sethmlarson/truststore/blob/v0.10.0/CHANGELOG.md)) - vmware: libmspack ([1.11](https://github.com/kyz/libmspack/commits/v1.11/libmspack)) - vmware: xmlsec ([1.3.5](https://github.com/lsh123/xmlsec/releases/tag/1.3.5)) _Changes since **Alpha 4186.0.0**_ #### Security fixes: - Linux ([CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584), [CVE-2024-56565](https://nvd.nist.gov/vuln/detail/CVE-2024-56565), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-53196](https://nvd.nist.gov/vuln/detail/CVE-2024-53196), [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683), [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658), [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675), [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664), [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-49568](https://nvd.nist.gov/vuln/detail/CVE-2024-49568), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56372](https://nvd.nist.gov/vuln/detail/CVE-2024-56372), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2024-54680](https://nvd.nist.gov/vuln/detail/CVE-2024-54680), [CVE-2024-46896](https://nvd.nist.gov/vuln/detail/CVE-2024-46896), [CVE-2024-56719](https://nvd.nist.gov/vuln/detail/CVE-2024-56719), [CVE-2024-56718](https://nvd.nist.gov/vuln/detail/CVE-2024-56718), [CVE-2024-56717](https://nvd.nist.gov/vuln/detail/CVE-2024-56717), [CVE-2024-56716](https://nvd.nist.gov/vuln/detail/CVE-2024-56716), [CVE-2024-56715](https://nvd.nist.gov/vuln/detail/CVE-2024-56715), [CVE-2024-56709](https://nvd.nist.gov/vuln/detail/CVE-2024-56709), [CVE-2024-53164](https://nvd.nist.gov/vuln/detail/CVE-2024-53164), [CVE-2024-57946](https://nvd.nist.gov/vuln/detail/CVE-2024-57946), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57798](https://nvd.nist.gov/vuln/detail/CVE-2024-57798), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-56766](https://nvd.nist.gov/vuln/detail/CVE-2024-56766), [CVE-2024-56765](https://nvd.nist.gov/vuln/detail/CVE-2024-56765), [CVE-2024-56763](https://nvd.nist.gov/vuln/detail/CVE-2024-56763), [CVE-2024-56762](https://nvd.nist.gov/vuln/detail/CVE-2024-56762), [CVE-2024-56760](https://nvd.nist.gov/vuln/detail/CVE-2024-56760), [CVE-2024-56769](https://nvd.nist.gov/vuln/detail/CVE-2024-56769), [CVE-2024-56767](https://nvd.nist.gov/vuln/detail/CVE-2024-56767), [CVE-2023-52881](https://nvd.nist.gov/vuln/detail/CVE-2023-52881), [CVE-2023-52654](https://nvd.nist.gov/vuln/detail/CVE-2023-52654), [CVE-2024-57938](https://nvd.nist.gov/vuln/detail/CVE-2024-57938), [CVE-2024-57933](https://nvd.nist.gov/vuln/detail/CVE-2024-57933), [CVE-2024-57932](https://nvd.nist.gov/vuln/detail/CVE-2024-57932), [CVE-2024-57930](https://nvd.nist.gov/vuln/detail/CVE-2024-57930), [CVE-2024-57931](https://nvd.nist.gov/vuln/detail/CVE-2024-57931), [CVE-2024-57841](https://nvd.nist.gov/vuln/detail/CVE-2024-57841), [CVE-2024-57802](https://nvd.nist.gov/vuln/detail/CVE-2024-57802), [CVE-2024-57801](https://nvd.nist.gov/vuln/detail/CVE-2024-57801), [CVE-2024-54031](https://nvd.nist.gov/vuln/detail/CVE-2024-54031), [CVE-2024-39282](https://nvd.nist.gov/vuln/detail/CVE-2024-39282), [CVE-2024-36476](https://nvd.nist.gov/vuln/detail/CVE-2024-36476), [CVE-2024-57896](https://nvd.nist.gov/vuln/detail/CVE-2024-57896), [CVE-2025-21629](https://nvd.nist.gov/vuln/detail/CVE-2025-21629), [CVE-2024-57903](https://nvd.nist.gov/vuln/detail/CVE-2024-57903), [CVE-2024-57902](https://nvd.nist.gov/vuln/detail/CVE-2024-57902), [CVE-2024-57901](https://nvd.nist.gov/vuln/detail/CVE-2024-57901), [CVE-2024-57900](https://nvd.nist.gov/vuln/detail/CVE-2024-57900), [CVE-2024-57899](https://nvd.nist.gov/vuln/detail/CVE-2024-57899), [CVE-2024-57897](https://nvd.nist.gov/vuln/detail/CVE-2024-57897), [CVE-2024-57890](https://nvd.nist.gov/vuln/detail/CVE-2024-57890), [CVE-2024-57889](https://nvd.nist.gov/vuln/detail/CVE-2024-57889), [CVE-2024-57887](https://nvd.nist.gov/vuln/detail/CVE-2024-57887), [CVE-2024-57885](https://nvd.nist.gov/vuln/detail/CVE-2024-57885), [CVE-2024-57884](https://nvd.nist.gov/vuln/detail/CVE-2024-57884), [CVE-2024-57895](https://nvd.nist.gov/vuln/detail/CVE-2024-57895), [CVE-2024-57894](https://nvd.nist.gov/vuln/detail/CVE-2024-57894), [CVE-2024-57893](https://nvd.nist.gov/vuln/detail/CVE-2024-57893), [CVE-2024-57892](https://nvd.nist.gov/vuln/detail/CVE-2024-57892), [CVE-2024-57882](https://nvd.nist.gov/vuln/detail/CVE-2024-57882), [CVE-2024-53685](https://nvd.nist.gov/vuln/detail/CVE-2024-53685), [CVE-2025-21658](https://nvd.nist.gov/vuln/detail/CVE-2025-21658), [CVE-2025-21656](https://nvd.nist.gov/vuln/detail/CVE-2025-21656), [CVE-2024-57945](https://nvd.nist.gov/vuln/detail/CVE-2024-57945), [CVE-2025-21664](https://nvd.nist.gov/vuln/detail/CVE-2025-21664), [CVE-2025-21663](https://nvd.nist.gov/vuln/detail/CVE-2025-21663), [CVE-2025-21662](https://nvd.nist.gov/vuln/detail/CVE-2025-21662), [CVE-2025-21660](https://nvd.nist.gov/vuln/detail/CVE-2025-21660), [CVE-2024-57939](https://nvd.nist.gov/vuln/detail/CVE-2024-57939), [CVE-2024-57940](https://nvd.nist.gov/vuln/detail/CVE-2024-57940), [CVE-2025-21655](https://nvd.nist.gov/vuln/detail/CVE-2025-21655), [CVE-2024-57913](https://nvd.nist.gov/vuln/detail/CVE-2024-57913), [CVE-2024-57912](https://nvd.nist.gov/vuln/detail/CVE-2024-57912), [CVE-2024-57911](https://nvd.nist.gov/vuln/detail/CVE-2024-57911), [CVE-2024-57910](https://nvd.nist.gov/vuln/detail/CVE-2024-57910), [CVE-2024-57908](https://nvd.nist.gov/vuln/detail/CVE-2024-57908), [CVE-2024-57907](https://nvd.nist.gov/vuln/detail/CVE-2024-57907), [CVE-2024-57929](https://nvd.nist.gov/vuln/detail/CVE-2024-57929), [CVE-2024-57926](https://nvd.nist.gov/vuln/detail/CVE-2024-57926), [CVE-2024-57925](https://nvd.nist.gov/vuln/detail/CVE-2024-57925), [CVE-2024-57906](https://nvd.nist.gov/vuln/detail/CVE-2024-57906), [CVE-2024-57922](https://nvd.nist.gov/vuln/detail/CVE-2024-57922), [CVE-2024-57917](https://nvd.nist.gov/vuln/detail/CVE-2024-57917), [CVE-2024-57916](https://nvd.nist.gov/vuln/detail/CVE-2024-57916), [CVE-2024-57915](https://nvd.nist.gov/vuln/detail/CVE-2024-57915), [CVE-2024-57904](https://nvd.nist.gov/vuln/detail/CVE-2024-57904), [CVE-2025-21654](https://nvd.nist.gov/vuln/detail/CVE-2025-21654), [CVE-2025-21653](https://nvd.nist.gov/vuln/detail/CVE-2025-21653), [CVE-2025-21652](https://nvd.nist.gov/vuln/detail/CVE-2025-21652), [CVE-2025-21640](https://nvd.nist.gov/vuln/detail/CVE-2025-21640), [CVE-2025-21639](https://nvd.nist.gov/vuln/detail/CVE-2025-21639), [CVE-2025-21638](https://nvd.nist.gov/vuln/detail/CVE-2025-21638), [CVE-2025-21637](https://nvd.nist.gov/vuln/detail/CVE-2025-21637), [CVE-2025-21636](https://nvd.nist.gov/vuln/detail/CVE-2025-21636), [CVE-2025-21648](https://nvd.nist.gov/vuln/detail/CVE-2025-21648), [CVE-2025-21647](https://nvd.nist.gov/vuln/detail/CVE-2025-21647), [CVE-2025-21646](https://nvd.nist.gov/vuln/detail/CVE-2025-21646), [CVE-2025-21645](https://nvd.nist.gov/vuln/detail/CVE-2025-21645), [CVE-2025-21642](https://nvd.nist.gov/vuln/detail/CVE-2025-21642), [CVE-2025-21631](https://nvd.nist.gov/vuln/detail/CVE-2025-21631), [CVE-2025-21632](https://nvd.nist.gov/vuln/detail/CVE-2025-21632)) #### Updates: - Linux ([6.6.74](https://lwn.net/Articles/1006010) (includes [6.6.73](https://lwn.net/Articles/1005709), [6.6.72](https://lwn.net/Articles/1005383), [6.6.71](https://lwn.net/Articles/1004703), [6.6.70](https://lwn.net/Articles/1004551), [6.6.69](https://lwn.net/Articles/1003986), [6.6.68](https://lwn.net/Articles/1003609), [6.6.67](https://lwn.net/Articles/1002919), [6.6.66](https://lwn.net/Articles/1002177))) ### New Stable Release 4152.2.0 _Changes since **Stable 4081.2.1**_ #### Security fixes: - Linux ([CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584), [CVE-2024-56565](https://nvd.nist.gov/vuln/detail/CVE-2024-56565), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-53196](https://nvd.nist.gov/vuln/detail/CVE-2024-53196), [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683), [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658), [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675), [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664), [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-49568](https://nvd.nist.gov/vuln/detail/CVE-2024-49568), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56372](https://nvd.nist.gov/vuln/detail/CVE-2024-56372), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2024-54680](https://nvd.nist.gov/vuln/detail/CVE-2024-54680), [CVE-2024-46896](https://nvd.nist.gov/vuln/detail/CVE-2024-46896), [CVE-2024-56719](https://nvd.nist.gov/vuln/detail/CVE-2024-56719), [CVE-2024-56718](https://nvd.nist.gov/vuln/detail/CVE-2024-56718), [CVE-2024-56717](https://nvd.nist.gov/vuln/detail/CVE-2024-56717), [CVE-2024-56716](https://nvd.nist.gov/vuln/detail/CVE-2024-56716), [CVE-2024-56715](https://nvd.nist.gov/vuln/detail/CVE-2024-56715), [CVE-2024-56709](https://nvd.nist.gov/vuln/detail/CVE-2024-56709), [CVE-2024-53164](https://nvd.nist.gov/vuln/detail/CVE-2024-53164), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57798](https://nvd.nist.gov/vuln/detail/CVE-2024-57798), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-56766](https://nvd.nist.gov/vuln/detail/CVE-2024-56766), [CVE-2024-56765](https://nvd.nist.gov/vuln/detail/CVE-2024-56765), [CVE-2024-56763](https://nvd.nist.gov/vuln/detail/CVE-2024-56763), [CVE-2024-56762](https://nvd.nist.gov/vuln/detail/CVE-2024-56762), [CVE-2024-56760](https://nvd.nist.gov/vuln/detail/CVE-2024-56760), [CVE-2024-56769](https://nvd.nist.gov/vuln/detail/CVE-2024-56769), [CVE-2024-56767](https://nvd.nist.gov/vuln/detail/CVE-2024-56767), [CVE-2023-52881](https://nvd.nist.gov/vuln/detail/CVE-2023-52881), [CVE-2023-52654](https://nvd.nist.gov/vuln/detail/CVE-2023-52654), [CVE-2024-53685](https://nvd.nist.gov/vuln/detail/CVE-2024-53685)) - Go ([CVE-2024-34155](https://nvd.nist.gov/vuln/detail/CVE-2024-34155), [CVE-2024-34156](https://nvd.nist.gov/vuln/detail/CVE-2024-34156), [CVE-2024-34158](https://nvd.nist.gov/vuln/detail/CVE-2024-34158)) - curl ([CVE-2024-8096](https://nvd.nist.gov/vuln/detail/CVE-2024-8096)) - etcd ([CVE-2023-32082](https://nvd.nist.gov/vuln/detail/CVE-2023-32082)) - expat ([CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490)) - intel-microcode ([CVE-2023-42667](https://nvd.nist.gov/vuln/detail/CVE-2023-42667), [CVE-2023-49141](https://nvd.nist.gov/vuln/detail/CVE-2023-49141), [CVE-2024-24853](https://nvd.nist.gov/vuln/detail/CVE-2024-24853), [CVE-2024-24980](https://nvd.nist.gov/vuln/detail/CVE-2024-24980), [CVE-2024-25939](https://nvd.nist.gov/vuln/detail/CVE-2024-25939)) - libarchive ([CVE-2024-26256](https://nvd.nist.gov/vuln/detail/CVE-2024-26256), [CVE-2024-48957](https://nvd.nist.gov/vuln/detail/CVE-2024-48957), [CVE-2024-48958](https://nvd.nist.gov/vuln/detail/CVE-2024-48958)) - libpcap ([CVE-2023-7256](https://nvd.nist.gov/vuln/detail/CVE-2023-7256), [CVE-2024-8006](https://nvd.nist.gov/vuln/detail/CVE-2024-8006)) - nvidia-drivers ([CVE-2023-31022](https://nvd.nist.gov/vuln/detail/CVE-2023-31022), [CVE-2024-0074](https://nvd.nist.gov/vuln/detail/CVE-2024-0074), [CVE-2024-0075](https://nvd.nist.gov/vuln/detail/CVE-2024-0075), [CVE-2024-0078](https://nvd.nist.gov/vuln/detail/CVE-2024-0078), [CVE-2024-0126](https://nvd.nist.gov/vuln/detail/CVE-2024-0126)) - openssh ([CVE-2024-39894](https://nvd.nist.gov/vuln/detail/CVE-2024-39894)) - runc ([CVE-2024-45310](https://nvd.nist.gov/vuln/detail/CVE-2024-45310)) - sysext-docker: docker ([CVE-2024-41110](https://nvd.nist.gov/vuln/detail/CVE-2024-41110)) - sysext-podman: containers-common ([CVE-2024-9341](https://nvd.nist.gov/vuln/detail/CVE-2024-9341)) - sysext-podman: containers-image ([CVE-2024-3727](https://nvd.nist.gov/vuln/detail/CVE-2024-3727)) - sysext-podman: podman ([CVE-2024-9407](https://nvd.nist.gov/vuln/detail/CVE-2024-9407)) #### Changes: - Added Proxmox Virtual Environment images ([scripts#1783](https://github.com/flatcar/scripts/pull/1783)) - Kernel lockdown in integrity mode is now enabled when secure boot is enabled. This prevents loading unsigned kernel modules and matches the behavior of all major distros. ([scripts#2299](https://github.com/flatcar/scripts/pull/2299)) - The UEFI firmware has changed from raw (.fd) format to QCOW2 format. In addition, the amd64 firmware variables are now held in a 4MB image rather than a 2MB image. Note that this firmware is only intended for testing with QEMU. Do not use it in production. ([scripts#2434](https://github.com/flatcar/scripts/pull/2434)) - The `/usr/sbin` directory is now merged into `/usr/bin`, so the former became a symlink to the latter. The SDK now has the same base layout as the generic images. ([flatcar/scripts#2068](https://github.com/flatcar/scripts/pull/2068)) - The arm64 UEFI firmware now supports Secure Boot. Be aware that this is not considered secure due to the lack of an SMM implementation, which is needed to protect the variable store. As above, this firmware should not be used in production anyway. ([scripts#2434](https://github.com/flatcar/scripts/pull/2434)) - grub 2.12-flatcar3: GRUB now includes many patches from Red Hat to support Secure Boot, as well as Flatcar's own patches. The version string includes a numbered "flatcar" suffix to track changes to these additional patches. This string can be seen in the GRUB menu. ([scripts#2431](https://github.com/flatcar/scripts/pull/2431)) #### Updates: - Ignition ([2.20.0](https://coreos.github.io/ignition/release-notes/#ignition-2200-2024-10-22)) - Linux ([6.6.71](https://lwn.net/Articles/1004703) (includes [6.6.70](https://lwn.net/Articles/1004551), [6.6.69](https://lwn.net/Articles/1003986), [6.6.68](https://lwn.net/Articles/1003609), [6.6.67](https://lwn.net/Articles/1002919), [6.6.66](https://lwn.net/Articles/1002177))) - Linux Firmware ([20241210](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241210) (includes [20241110](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241110))) - SDK: Go ([1.22.9](https://go.dev/doc/devel/release#go1.22.9) (includes [1.22.8](https://go.dev/doc/devel/release#go1.22.8), [1.22.7](https://go.dev/doc/devel/release#go1.22.7))) - SDK: catalyst ([4.0.0](https://gitweb.gentoo.org/proj/catalyst.git/log/?h=4.0.0)) - SDK: cmake ([3.30.2](https://cmake.org/cmake/help/v3.30/release/3.30.html#id2)) - SDK: crossdev ([20240921](https://gitweb.gentoo.org/proj/crossdev.git/log/?h=20240921)) - SDK: edk2-bin ([202408](https://github.com/tianocore/edk2/releases/tag/edk2-stable202408) (includes [202405](https://github.com/tianocore/edk2/releases/tag/edk2-stable202405), [202402](https://github.com/tianocore/edk2/releases/tag/edk2-stable202402), [202311](https://github.com/tianocore/edk2/releases/tag/edk2-stable202311), [202308](https://github.com/tianocore/edk2/releases/tag/edk2-stable202308), [202305](https://github.com/tianocore/edk2/releases/tag/edk2-stable202305), [202302](https://github.com/tianocore/edk2/releases/tag/edk2-stable202302), [202211](https://github.com/tianocore/edk2/releases/tag/edk2-stable202211), [202208](https://github.com/tianocore/edk2/releases/tag/edk2-stable202208), [202205](https://github.com/tianocore/edk2/releases/tag/edk2-stable202205))) - SDK: meson ([1.5.2](https://github.com/mesonbuild/meson/commits/1.5.2/)) - SDK: perl ([5.40.0](https://perldoc.perl.org/5.40.0/perldelta)) - SDK: rust ([1.81.0](https://blog.rust-lang.org/2024/09/05/Rust-1.81.0.html)) - afterburn ([5.7.0](https://coreos.github.io/afterburn/release-notes/#afterburn-570)) - audit ([4.0.1](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.1) (includes [4.0](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0))) - azure, gce, sysext-python: gdbm ([1.24](https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00001.html)) - azure, gce, sysext-python: python ([3.11.10](https://docs.python.org/3.11/whatsnew/3.11.html#notable-changes-in-3-11-10)) - azure: chrony ([4.6](https://gitlab.com/chrony/chrony/-/blob/4.6/NEWS)) - base, dev: azure-vm-utils ([0.3.0](https://github.com/Azure/azure-vm-utils/releases/tag/v0.3.0)) - base, dev: binutils-config ([5.5.2](https://gitweb.gentoo.org/proj/binutils-config.git/log/?h=v5.5.2)) - base, dev: btrfs-progs ([6.10.1](https://github.com/kdave/btrfs-progs/blob/v6.10.1/CHANGES#L26-L38) (includes [6.10](https://github.com/kdave/btrfs-progs/blob/v6.10/CHANGES))) - base, dev: c-ares ([1.33.1](https://github.com/c-ares/c-ares/releases/tag/v1.33.1) (includes [1.33.0](https://github.com/c-ares/c-ares/releases/tag/v1.33.0), [1.32.3](https://github.com/c-ares/c-ares/releases/tag/v1.32.3), [1.32.2](https://github.com/c-ares/c-ares/releases/tag/v1.32.2), [1.32.1](https://github.com/c-ares/c-ares/releases/tag/v1.32.1), [1.32.0](https://github.com/c-ares/c-ares/releases/tag/v1.32.0), [1.31.0](https://github.com/c-ares/c-ares/releases/tag/v1.31.0), [1.30.0](https://github.com/c-ares/c-ares/releases/tag/v1.30.0))) - base, dev: cracklib ([2.10.2](https://github.com/cracklib/cracklib/releases/tag/v2.10.2) (includes [2.10.1](https://github.com/cracklib/cracklib/releases/tag/v2.10.1), [2.10.0](https://github.com/cracklib/cracklib/releases/tag/v2.10.0))) - base, dev: cryptsetup ([2.7.5](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.5/docs/v2.7.5-ReleaseNotes) (includes [2.7.4](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.4/docs/v2.7.4-ReleaseNotes), [2.7.3](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.3/docs/v2.7.3-ReleaseNotes))) - base, dev: curl ([8.10.1](https://curl.se/ch/8.10.1.html) (includes [8.10.0](https://curl.se/ch/8.10.0.html))) - base, dev: efivar ([39](https://github.com/rhboot/efivar/releases/tag/39)) - base, dev: gettext ([0.22.5](https://savannah.gnu.org/news/?id=10597)) - base, dev: git ([2.45.2](https://github.com/git/git/blob/v2.45.2/Documentation/RelNotes/2.45.2.txt) (includes [2.45.1](https://github.com/git/git/blob/v2.45.1/Documentation/RelNotes/2.45.1.txt), [2.45.0](https://github.com/git/git/blob/v2.45.0/Documentation/RelNotes/2.45.0.txt))) - base, dev: gnutls ([3.8.7.1](https://gitlab.com/gnutls/gnutls/-/blob/3.8.7/NEWS) (includes [3.8.6](https://gitlab.com/gnutls/gnutls/-/blob/3.8.6/NEWS))) - base, dev: gptfdisk ([1.0.10](https://sourceforge.net/p/gptfdisk/code/ci/53ac725a88a616b9f3395500d6e520aa04742fa5/tree/NEWS)) - base, dev: intel-microcode ([20240910_p20240915](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910)) - base, dev: kmod ([33](https://github.com/kmod-project/kmod/blob/v33/NEWS)) - base, dev: ldb ([2.8.1](https://gitlab.com/samba-team/samba/-/commit/6ca4df6374136d1d205de689618dc8fce5177d14) (includes [2.8.0](https://gitlab.com/samba-team/samba/-/commit/94f11c3c21bc3b8a34d376ab99becd2c6260af62))) - base, dev: libarchive ([3.7.6](https://github.com/libarchive/libarchive/releases/tag/v3.7.6) (includes [3.7.5](https://github.com/libarchive/libarchive/releases/tag/v3.7.5))) - base, dev: libassuan ([3.0.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=48ece8b1cf8b81bdf835db00079ae247742cd398;hb=0351ecfa4f35ad44684075abec153574986b11bd)) - base, dev: libgcrypt ([1.11.0](https://dev.gnupg.org/T7165)) - base, dev: libgpg-error ([1.50](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=b865ecc7197a4f60b1530958fbb25a92bdfdc3de;hb=bb732615daad9bba9026354ae90f0f5292ea4908)) - base, dev: libnl ([3.10.0](https://lists.infradead.org/pipermail/libnl/2024-July/002440.html)) - base, dev: libnvme ([1.10](https://github.com/linux-nvme/libnvme/releases/tag/v1.10)) - base, dev: liburing ([2.7](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.7) (includes [2.6](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.6), [2.5](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.5), [2.4](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.4))) - base, dev: nvme-cli ([2.10.2](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.2) (includes [2.10.1](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.1), [2.10](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10))) - base, dev: oniguruma ([6.9.9](https://github.com/kkos/oniguruma/releases/tag/v6.9.9)) - base, dev: openssh ([9.8_p1](https://www.openssh.com/txt/release-9.8)) - base, dev: pinentry ([1.3.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=a07d18953341a4eb65c9873e64c06bc7c642606d;hb=dd8894fa60c1f1c08ecc50ba4657580abc348347)) - base, dev: pkgconf ([2.3.0](https://github.com/pkgconf/pkgconf/blob/pkgconf-2.3.0/NEWS)) - base, dev: samba ([4.19.7](https://gitlab.com/samba-team/samba/-/blob/bce5c475d12fb75619bc85d176bfd40420b4fce8/WHATSNEW.txt)) - base, dev: selinux-base ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-base-policy ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-container ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-dbus ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-policykit ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-sssd ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-unconfined ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: socat ([1.8.0.0](https://repo.or.cz/socat.git/blob/2da070164d454971d5c970b5278e645051f0d0f7:/CHANGES)) - base, dev: sqlite ([3.46.1](https://www.sqlite.org/releaselog/3_46_1.html)) - base, dev: talloc ([2.4.2](https://gitlab.com/samba-team/samba/-/commit/f28966c1638806a5af1fa4e451b668af638491ce)) - base, dev: tcpdump ([4.99.5](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.5/CHANGES)) - base, dev: tdb ([1.4.10](https://gitlab.com/samba-team/samba/-/commit/5032ab712c6e9d6562cd10b1d840d2ee052d1d16)) - base, dev: tevent ([0.16.1](https://gitlab.com/samba-team/samba/-/commit/0ba05d5bbb1788b0b8cee26748bcda0c90c48baa) (includes [0.16.0](https://gitlab.com/samba-team/samba/-/commit/acd9248b13cba06d5b748f17aa9bc5d62079d9cc))) - base, dev: userspace-rcu ([0.14.1](https://lists.lttng.org/pipermail/lttng-dev/2024-August/030860.html)) - bind-tools ([9.16.50](https://bind9.readthedocs.io/en/v9.16.50/notes.html#notes-for-bind-9-16-50) (includes [9.16.49](https://bind9.readthedocs.io/en/v9.16.49/notes.html#notes-for-bind-9-16-49))) - bpftool ([7.4.0](https://github.com/libbpf/bpftool/releases/tag/v7.4.0) (includes [7.3.0](https://github.com/libbpf/bpftool/releases/tag/v7.3.0), [7.2.0](https://github.com/libbpf/bpftool/releases/tag/v7.2.0), [7.1.0](https://github.com/libbpf/bpftool/releases/tag/v7.1.0), [7.0.0](https://github.com/libbpf/bpftool/releases/tag/v7.0.0))) - containerd ([1.7.23](https://github.com/containerd/containerd/releases/tag/v1.7.23) (includes [1.7.22](https://github.com/containerd/containerd/releases/tag/v1.7.22))) - dev: gdb ([15.2](https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00011.html)) - dev: gentoolkit ([0.6.7](https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.7)) - dev: gnuconfig ([20240728](https://git.savannah.gnu.org/cgit/config.git/log/?id=00b15927496058d23e6258a28d8996f87cf1f191)) - dev: iperf ([3.17.1](https://github.com/esnet/iperf/releases/tag/3.17.1) (includes [3.17](https://github.com/esnet/iperf/releases/tag/3.17))) - dev: libpipeline ([1.5.8](https://gitlab.com/libpipeline/libpipeline/-/blob/dd37cf76496b4b999509bd133657c1fc021e3a5f/NEWS.md)) - dev: man-db ([2.13.0](https://gitlab.com/man-db/man-db/-/releases/2.13.0)) - etcd ([3.5.16](https://github.com/etcd-io/etcd/blob/96e17d38e244ef18756a55d33066f2893402794b/CHANGELOG/CHANGELOG-3.5.md#v3516-2024-09-10)) - expat ([2.6.3](https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes)) - grub ([2.12](https://lists.gnu.org/archive/html/grub-devel/2023-12/msg00052.html)) - intel-microcode ([20240531_p20240526](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813)) - iproute2 ([6.9.0](https://lkml.org/lkml/2024/5/13/860)) - libffi ([3.4.6](https://github.com/libffi/libffi/releases/tag/v3.4.6) (includes [3.4.5](https://github.com/libffi/libffi/releases/tag/v3.4.5))) - libnftnl ([1.2.7](https://www.mail-archive.com/netfilter-announce@lists.netfilter.org/msg00264.html)) - libpcap ([1.10.5](https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.10.5/CHANGES)) - libpcre2 ([10.44](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.44/NEWS)) - libsodium ([1.0.20](https://github.com/jedisct1/libsodium/releases/tag/1.0.20-RELEASE)) - nettle ([3.10](https://git.lysator.liu.se/nettle/nettle/-/blob/b8c841dc3278dec0812365f02370b41ea9d4ddee/NEWS)) - nvidia-drivers ([535.216.01](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-216-01/index.html)) - pinentry ([1.3.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=1ea7e76f836fe15fe7c59b954d7aab768bd090e6;hb=24833c9ef2bf93d9f6c0583a9ecfefa6747473bc)) - runc ([1.1.14](https://github.com/opencontainers/runc/releases/tag/v1.1.14)) - sysext-docker: docker ([27.2.1](https://docs.docker.com/engine/release-notes/27/#2721) (includes [26.1.0](https://docs.docker.com/engine/release-notes/26.1/#2610))) - sysext-podman: aardvark-dns ([1.12.2](https://github.com/containers/aardvark-dns/releases/tag/v1.12.2) (includes [1.12.1](https://github.com/containers/aardvark-dns/releases/tag/v1.12.1), [1.12.0](https://github.com/containers/aardvark-dns/releases/tag/v1.12.0))) - sysext-podman: containers-common ([0.60.4](https://github.com/containers/common/releases/tag/v0.60.4) (includes [0.60.3](https://github.com/containers/common/releases/tag/v0.60.3), [0.60.2](https://github.com/containers/common/releases/tag/v0.60.2), [0.60.1](https://github.com/containers/common/releases/tag/v0.60.1), [0.60.0](https://github.com/containers/common/releases/tag/v0.60.0), [0.59.2](https://github.com/containers/common/releases/tag/v0.59.2))) - sysext-podman: containers-image ([5.32.2](https://github.com/containers/image/releases/tag/v5.32.2) (includes [5.32.1](https://github.com/containers/image/releases/tag/v5.32.1), [5.32.0](https://github.com/containers/image/releases/tag/v5.32.0), [5.31.0](https://github.com/containers/image/releases/tag/v5.31.0), [5.30.2](https://github.com/containers/image/releases/tag/v5.30.2), [5.30.1](https://github.com/containers/image/releases/tag/v5.30.1))) - sysext-podman: containers-storage ([1.55.0](https://github.com/containers/storage/releases/tag/v1.55.0) (includes [1.54.0](https://github.com/containers/storage/releases/tag/v1.54.0))) - sysext-podman: crun ([1.17](https://github.com/containers/crun/releases/tag/1.17) (includes [1.16.1](https://github.com/containers/crun/releases/tag/1.16.1), [1.16](https://github.com/containers/crun/releases/tag/1.16), [1.15](https://github.com/containers/crun/releases/tag/1.15), [1.14.4](https://github.com/containers/crun/releases/tag/1.14.4))) - sysext-podman: fuse-overlayfs ([1.14](https://github.com/containers/fuse-overlayfs/releases/tag/v1.14)) - sysext-podman: netavark ([1.12.2](https://github.com/containers/netavark/releases/tag/v1.12.2) (includes [1.12.1](https://github.com/containers/netavark/releases/tag/v1.12.1), [1.12.0](https://github.com/containers/netavark/releases/tag/v1.12.0), [1.11.0](https://github.com/containers/netavark/releases/tag/v1.11.0))) - sysext-podman: passt ([2024.09.06](https://archives.passt.top/passt-user/20240906171530.763b3179@elisabeth/T/#u)) - sysext-podman: podman ([5.2.4](https://github.com/containers/podman/releases/tag/v5.2.4) (includes [5.2.3](https://github.com/containers/podman/releases/tag/v5.2.3), [5.2.2](https://github.com/containers/podman/releases/tag/v5.2.2), [5.2.1](https://github.com/containers/podman/releases/tag/v5.2.1), [5.2.0](https://github.com/containers/podman/releases/tag/v5.2.0), [5.1.2](https://github.com/containers/podman/releases/tag/v5.1.2), [5.1.1](https://github.com/containers/podman/releases/tag/v5.1.1), [5.1.0](https://github.com/containers/podman/releases/tag/v5.1.0))) - sysext-python: idna ([3.10](https://github.com/kjd/idna/blob/v3.10/HISTORY.rst) (includes [3.8](https://github.com/kjd/idna/releases/tag/v3.8))) - sysext-python: jaraco-context ([6.0.1](https://github.com/jaraco/jaraco.context/blob/v6.0.1/NEWS.rst)) - sysext-python: more-itertools ([10.5.0](https://github.com/more-itertools/more-itertools/blob/v10.5.0/docs/versions.rst#1050)) - sysext-python: msgpack ([1.1.0](https://github.com/msgpack/msgpack-python/blob/v1.1.0/ChangeLog.rst#110)) - sysext-python: platformdirs ([4.3.6](https://github.com/tox-dev/platformdirs/releases/tag/4.3.6)) - sysext-python: rich ([13.8.1](https://github.com/Textualize/rich/releases/tag/v13.8.1)) - sysext-python: setuptools ([74.1.3](https://github.com/pypa/setuptools/blob/v74.1.3/NEWS.rst) (includes [73.0.1](https://github.com/pypa/setuptools/blob/v73.0.1/NEWS.rst), [72.2.0](https://github.com/pypa/setuptools/blob/v72.2.0/NEWS.rst))) - sysext-python: trove-classifiers ([2024.9.12](https://github.com/pypa/trove-classifiers/releases/tag/2024.9.12)) - sysext-python: truststore ([0.9.2](https://github.com/sethmlarson/truststore/blob/v0.9.2/CHANGELOG.md)) - sysext-python: urllib3 ([2.2.3](https://github.com/urllib3/urllib3/releases/tag/2.2.3)) - vmware: open-vm-tools ([12.5.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.5.0)) - vmware: xmlsec ([1.3.4](https://github.com/lsh123/xmlsec/releases/tag/1.3.4)) - whois ([5.5.23](https://github.com/rfc1036/whois/blob/v5.5.23/debian/changelog) (includes [5.5.22](https://github.com/rfc1036/whois/blob/v5.5.22/debian/changelog))) _Changes since **Beta 4152.1.0**_ #### Security fixes: - Linux ([CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584), [CVE-2024-56565](https://nvd.nist.gov/vuln/detail/CVE-2024-56565), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-53196](https://nvd.nist.gov/vuln/detail/CVE-2024-53196), [CVE-2024-55639](https://nvd.nist.gov/vuln/detail/CVE-2024-55639), [CVE-2024-54683](https://nvd.nist.gov/vuln/detail/CVE-2024-54683), [CVE-2024-53687](https://nvd.nist.gov/vuln/detail/CVE-2024-53687), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56660](https://nvd.nist.gov/vuln/detail/CVE-2024-56660), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56658](https://nvd.nist.gov/vuln/detail/CVE-2024-56658), [CVE-2024-56657](https://nvd.nist.gov/vuln/detail/CVE-2024-56657), [CVE-2024-56655](https://nvd.nist.gov/vuln/detail/CVE-2024-56655), [CVE-2024-56675](https://nvd.nist.gov/vuln/detail/CVE-2024-56675), [CVE-2024-56672](https://nvd.nist.gov/vuln/detail/CVE-2024-56672), [CVE-2024-56654](https://nvd.nist.gov/vuln/detail/CVE-2024-56654), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56667](https://nvd.nist.gov/vuln/detail/CVE-2024-56667), [CVE-2024-56665](https://nvd.nist.gov/vuln/detail/CVE-2024-56665), [CVE-2024-56664](https://nvd.nist.gov/vuln/detail/CVE-2024-56664), [CVE-2024-56663](https://nvd.nist.gov/vuln/detail/CVE-2024-56663), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-56653](https://nvd.nist.gov/vuln/detail/CVE-2024-56653), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-49568](https://nvd.nist.gov/vuln/detail/CVE-2024-49568), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56372](https://nvd.nist.gov/vuln/detail/CVE-2024-56372), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2024-54680](https://nvd.nist.gov/vuln/detail/CVE-2024-54680), [CVE-2024-46896](https://nvd.nist.gov/vuln/detail/CVE-2024-46896), [CVE-2024-56719](https://nvd.nist.gov/vuln/detail/CVE-2024-56719), [CVE-2024-56718](https://nvd.nist.gov/vuln/detail/CVE-2024-56718), [CVE-2024-56717](https://nvd.nist.gov/vuln/detail/CVE-2024-56717), [CVE-2024-56716](https://nvd.nist.gov/vuln/detail/CVE-2024-56716), [CVE-2024-56715](https://nvd.nist.gov/vuln/detail/CVE-2024-56715), [CVE-2024-56709](https://nvd.nist.gov/vuln/detail/CVE-2024-56709), [CVE-2024-53164](https://nvd.nist.gov/vuln/detail/CVE-2024-53164), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57798](https://nvd.nist.gov/vuln/detail/CVE-2024-57798), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-56766](https://nvd.nist.gov/vuln/detail/CVE-2024-56766), [CVE-2024-56765](https://nvd.nist.gov/vuln/detail/CVE-2024-56765), [CVE-2024-56763](https://nvd.nist.gov/vuln/detail/CVE-2024-56763), [CVE-2024-56762](https://nvd.nist.gov/vuln/detail/CVE-2024-56762), [CVE-2024-56760](https://nvd.nist.gov/vuln/detail/CVE-2024-56760), [CVE-2024-56769](https://nvd.nist.gov/vuln/detail/CVE-2024-56769), [CVE-2024-56767](https://nvd.nist.gov/vuln/detail/CVE-2024-56767), [CVE-2023-52881](https://nvd.nist.gov/vuln/detail/CVE-2023-52881), [CVE-2023-52654](https://nvd.nist.gov/vuln/detail/CVE-2023-52654), [CVE-2024-53685](https://nvd.nist.gov/vuln/detail/CVE-2024-53685)) #### Updates: - Linux ([6.6.74](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.74) (includes [6.6.73](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.73), [6.6.72](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.72), [6.6.71](https://lwn.net/Articles/1004703), [6.6.70](https://lwn.net/Articles/1004551), [6.6.69](https://lwn.net/Articles/1003986), [6.6.68](https://lwn.net/Articles/1003609), [6.6.67](https://lwn.net/Articles/1002919), [6.6.66](https://lwn.net/Articles/1002177)))