# Flatcar Container Linux Release - October 13th, 2025 ## Alpha 4487.0.0 - AMD64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: None - ARM64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: None VERDICT: _GO_ ## Beta 4459.1.0 - AMD64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: None - ARM64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: None VERDICT: _GO_ ## Stable 4230.2.4 - AMD64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: None - ARM64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: None VERDICT: _GO_ ## Communication --- #### Guidelines / Things to Remember - Release notes are used in a PR and will appear on https://www.flatcar.org/releases/ - [Announcement Message](#Announcement-Message) is posted in [Flatcar-Linux-user](https://groups.google.com/g/flatcar-linux-user). Make sure to post as β€œFlatcar Container Linux User”, not with your personal user (this can be selected when drafting the post). - Make sure the the LTS is referred to as `LTS-2021`, and not `LTS-2605` --- ### Announcement Message Subject: Announcing new releases Alpha 4487.0.0, Beta 4459.1.0, Stable 4230.2.4 Hello, We are pleased to announce a new Flatcar Container Linux release for the Alpha, Beta, and Stable channels. #### Alpha 4487.0.0 release _Changes since **Alpha 4459.0.0**_ #### Known bugs: - Updating with OEM or Flatcar extensions is broken when ue-rs parses the Omaha response and thusfalls back to downloading from the release server or bincache which may fail for self-hosted Nebraska updates or payloads passed with flatcar-update ([ue-rs#92](https://github.com/flatcar/ue-rs/issues/92)) #### Security fixes: - Linux ([CVE-2025-39927](https://nvd.nist.gov/vuln/detail/CVE-2025-39927), [CVE-2025-39926](https://nvd.nist.gov/vuln/detail/CVE-2025-39926), [CVE-2025-39923](https://nvd.nist.gov/vuln/detail/CVE-2025-39923), [CVE-2025-39913](https://nvd.nist.gov/vuln/detail/CVE-2025-39913), [CVE-2025-39912](https://nvd.nist.gov/vuln/detail/CVE-2025-39912), [CVE-2025-39911](https://nvd.nist.gov/vuln/detail/CVE-2025-39911), [CVE-2025-39909](https://nvd.nist.gov/vuln/detail/CVE-2025-39909), [CVE-2025-39907](https://nvd.nist.gov/vuln/detail/CVE-2025-39907), [CVE-2025-39917](https://nvd.nist.gov/vuln/detail/CVE-2025-39917), [CVE-2025-39916](https://nvd.nist.gov/vuln/detail/CVE-2025-39916), [CVE-2025-39914](https://nvd.nist.gov/vuln/detail/CVE-2025-39914), [CVE-2025-39885](https://nvd.nist.gov/vuln/detail/CVE-2025-39885), [CVE-2025-39886](https://nvd.nist.gov/vuln/detail/CVE-2025-39886), [CVE-2025-39876](https://nvd.nist.gov/vuln/detail/CVE-2025-39876), [CVE-2025-39873](https://nvd.nist.gov/vuln/detail/CVE-2025-39873), [CVE-2025-39871](https://nvd.nist.gov/vuln/detail/CVE-2025-39871), [CVE-2025-39870](https://nvd.nist.gov/vuln/detail/CVE-2025-39870), [CVE-2025-39869](https://nvd.nist.gov/vuln/detail/CVE-2025-39869), [CVE-2025-39884](https://nvd.nist.gov/vuln/detail/CVE-2025-39884), [CVE-2025-39883](https://nvd.nist.gov/vuln/detail/CVE-2025-39883), [CVE-2025-39882](https://nvd.nist.gov/vuln/detail/CVE-2025-39882), [CVE-2025-39881](https://nvd.nist.gov/vuln/detail/CVE-2025-39881), [CVE-2025-39880](https://nvd.nist.gov/vuln/detail/CVE-2025-39880), [CVE-2025-39877](https://nvd.nist.gov/vuln/detail/CVE-2025-39877), [CVE-2025-39963](https://nvd.nist.gov/vuln/detail/CVE-2025-39963), [CVE-2025-39961](https://nvd.nist.gov/vuln/detail/CVE-2025-39961), [CVE-2025-39957](https://nvd.nist.gov/vuln/detail/CVE-2025-39957), [CVE-2025-39956](https://nvd.nist.gov/vuln/detail/CVE-2025-39956), [CVE-2025-39955](https://nvd.nist.gov/vuln/detail/CVE-2025-39955), [CVE-2025-39938](https://nvd.nist.gov/vuln/detail/CVE-2025-39938), [CVE-2025-39937](https://nvd.nist.gov/vuln/detail/CVE-2025-39937), [CVE-2025-39934](https://nvd.nist.gov/vuln/detail/CVE-2025-39934), [CVE-2025-39953](https://nvd.nist.gov/vuln/detail/CVE-2025-39953), [CVE-2025-39952](https://nvd.nist.gov/vuln/detail/CVE-2025-39952), [CVE-2025-39951](https://nvd.nist.gov/vuln/detail/CVE-2025-39951), [CVE-2025-39950](https://nvd.nist.gov/vuln/detail/CVE-2025-39950), [CVE-2025-39932](https://nvd.nist.gov/vuln/detail/CVE-2025-39932), [CVE-2025-39949](https://nvd.nist.gov/vuln/detail/CVE-2025-39949), [CVE-2025-39948](https://nvd.nist.gov/vuln/detail/CVE-2025-39948), [CVE-2025-39947](https://nvd.nist.gov/vuln/detail/CVE-2025-39947), [CVE-2025-39946](https://nvd.nist.gov/vuln/detail/CVE-2025-39946), [CVE-2025-39945](https://nvd.nist.gov/vuln/detail/CVE-2025-39945), [CVE-2025-39944](https://nvd.nist.gov/vuln/detail/CVE-2025-39944), [CVE-2025-39943](https://nvd.nist.gov/vuln/detail/CVE-2025-39943), [CVE-2025-39942](https://nvd.nist.gov/vuln/detail/CVE-2025-39942), [CVE-2025-39940](https://nvd.nist.gov/vuln/detail/CVE-2025-39940), [CVE-2025-39929](https://nvd.nist.gov/vuln/detail/CVE-2025-39929), [CVE-2025-39931](https://nvd.nist.gov/vuln/detail/CVE-2025-39931), [CVE-2024-57878](https://nvd.nist.gov/vuln/detail/CVE-2024-57878), [CVE-2024-57877](https://nvd.nist.gov/vuln/detail/CVE-2024-57877), [CVE-2024-57875](https://nvd.nist.gov/vuln/detail/CVE-2024-57875), [CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23127](https://nvd.nist.gov/vuln/detail/CVE-2025-23127), [CVE-2025-23126](https://nvd.nist.gov/vuln/detail/CVE-2025-23126), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2025-23124](https://nvd.nist.gov/vuln/detail/CVE-2025-23124), [CVE-2024-57872](https://nvd.nist.gov/vuln/detail/CVE-2024-57872), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57839](https://nvd.nist.gov/vuln/detail/CVE-2024-57839), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47794](https://nvd.nist.gov/vuln/detail/CVE-2024-47794), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-49569](https://nvd.nist.gov/vuln/detail/CVE-2024-49569), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-48876](https://nvd.nist.gov/vuln/detail/CVE-2024-48876), [CVE-2024-41932](https://nvd.nist.gov/vuln/detail/CVE-2024-41932), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56784](https://nvd.nist.gov/vuln/detail/CVE-2024-56784), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56782](https://nvd.nist.gov/vuln/detail/CVE-2024-56782), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56639](https://nvd.nist.gov/vuln/detail/CVE-2024-56639), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56647](https://nvd.nist.gov/vuln/detail/CVE-2024-56647), [CVE-2024-56646](https://nvd.nist.gov/vuln/detail/CVE-2024-56646), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56632](https://nvd.nist.gov/vuln/detail/CVE-2024-56632), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56624](https://nvd.nist.gov/vuln/detail/CVE-2024-56624), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56621](https://nvd.nist.gov/vuln/detail/CVE-2024-56621), [CVE-2024-56620](https://nvd.nist.gov/vuln/detail/CVE-2024-56620), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56618](https://nvd.nist.gov/vuln/detail/CVE-2024-56618), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56591](https://nvd.nist.gov/vuln/detail/CVE-2024-56591), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56588](https://nvd.nist.gov/vuln/detail/CVE-2024-56588), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56612](https://nvd.nist.gov/vuln/detail/CVE-2024-56612), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56609](https://nvd.nist.gov/vuln/detail/CVE-2024-56609), [CVE-2024-56608](https://nvd.nist.gov/vuln/detail/CVE-2024-56608), [CVE-2024-56607](https://nvd.nist.gov/vuln/detail/CVE-2024-56607), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56599](https://nvd.nist.gov/vuln/detail/CVE-2024-56599), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584)) - binutils ([CVE-2025-5244](https://www.cve.org/CVERecord?id=CVE-2025-5244), [CVE-2025-5245](https://www.cve.org/CVERecord?id=CVE-2025-5245), [CVE-2025-8225](https://www.cve.org/CVERecord?id=CVE-2025-8225)) - curl ([CVE-2025-9086](https://www.cve.org/CVERecord?id=CVE-2025-9086), [CVE-2025-10148](https://www.cve.org/CVERecord?id=CVE-2025-10148)) - go ([CVE-2025-47910](https://www.cve.org/CVERecord?id=CVE-2025-47910)) - libpcre2 ([CVE-2025-58050](https://www.cve.org/CVERecord?id=CVE-2025-58050)) - libxml2 ([libxml2-20250908](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9)) - libxslt ([CVE-2025-7424](https://www.cve.org/CVERecord?id=CVE-2025-7424), [CVE-2025-7425](https://www.cve.org/CVERecord?id=CVE-2025-7425)) - net-tools ([CVE-2025-46836](https://www.cve.org/CVERecord?id=CVE-2025-46836)) #### Bug fixes: - Enabled `CONFIG_MEMCG_V1` to mitigate cgroupsv1 removal (e.g JVM) ([Flatcar#1884](https://github.com/flatcar/Flatcar/issues/1884)) - Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance ([Flatcar#1901](https://github.com/flatcar/Flatcar/issues/1901)) #### Changes: - Increased all partition sizes: `/boot` to 1 GB, the two `/usr` partitions to 2 GB, `/oem` to 1 GB so that we can use more space in a few years when we can assume that most nodes run the new partition layout - existing nodes can still update for the next years ([scripts#3027](https://github.com/flatcar/scripts/pull/3027)) - Reduced the kernel+initrd size on `/boot` by half. Flatcar now uses a minimal first stage initrd just to access the `/usr` partition and then switches to the full initrd that does the full system preparation as before. Since this means that the set of kernel modules available in the first initrd is reduced, please report any impact. - Scaleway: SSH keys are now fetched _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277)) - Scaleway: The hostname is now set _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277)) #### Updates: - Afterburn ([5.10.0](https://coreos.github.io/afterburn/release-notes/#afterburn-5100)) - Linux ([6.12.51](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51) (includes [6.12.48](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48), [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49), [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50))) - Linux Firmware ([20250917](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250917)) - SDK: azure-core ([1.16.1](https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-core_1.16.1)) - SDK: azure-identity ([1.13.1](https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-identity_1.13.1)) - SDK: go ([1.24.7](https://go.dev/doc/devel/release#go1.24.minor)) - SDK: pkgcheck ([0.10.37](https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.37)) - SDK: rust ([1.89.0](https://blog.rust-lang.org/2025/08/07/Rust-1.89.0/)) - base, dev: bash ([5.3_p3](https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html)) - base, dev: btrfs-progs ([6.16](https://github.com/kdave/btrfs-progs/releases/tag/v6.16)) - base, dev: coreutils ([9.7](https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00006.html) (includes [9.6](https://savannah.gnu.org/news/?id=10715))) - base, dev: cryptsetup ([2.8.1](https://gitlab.com/cryptsetup/cryptsetup/-/raw/v2.8.1/docs/v2.8.1-ReleaseNotes)) - base, dev: curl ([8.16.0](https://curl.se/ch/8.16.0.html)) - base, dev: expat ([2.7.2](https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes)) - base, dev: gcc ([14.3.1_p20250801](https://gcc.gnu.org/pipermail/gcc/2025-May/246078.html)) - base, dev: hwdata ([0.398](https://github.com/vcrhonek/hwdata/releases/tag/v0.398)) - base, dev: libffi ([3.5.2](https://github.com/libffi/libffi/releases/tag/v3.5.2)) - base, dev: libnftnl ([1.3.0](https://lwn.net/Articles/1032725/)) - base, dev: libxml2 ([2.13.9](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9)) - base, dev: ncurses ([6.5_p20250802](https://invisible-island.net/ncurses/NEWS.html#t20250802)) - base, dev: nftables ([1.1.4](https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.4.txt)) - base, dev: readline ([8.3_p1](https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html)) - base, dev: samba ([4.22.3](https://www.samba.org/samba/history/samba-4.22.3.html) (includes [4.21.0](https://www.samba.org/samba/history/samba-4.21.0.html), [4.22.0](https://www.samba.org/samba/history/samba-4.22.0.html), [4.22.1](https://www.samba.org/samba/history/samba-4.22.1.html), [4.22.2](https://www.samba.org/samba/history/samba-4.22.2.html))) - base, dev: talloc ([2.4.3](https://gitlab.com/samba-team/samba/-/commit/77229f73c20af69ab0f3c96efbb229ff64a9dfe4)) - base, dev: tdb ([1.4.13](https://gitlab.com/samba-team/samba/-/commit/70a8c7a89a6d62d2ff172d79b5f4e6439300b88d)) - base, dev: tevent ([0.16.2](https://gitlab.com/samba-team/samba/-/commit/8d398acbbb7fdc0ff50fe6ba80433deaf92515c6)) - ca-certificates ([3.117](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html) (includes [3.116](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html))) - dev, sysext-incus: squashfs-tools ([4.7.2](https://github.com/plougher/squashfs-tools/releases/tag/4.7.2) (includes [4.7.1](https://github.com/plougher/squashfs-tools/releases/tag/4.7.1))) - dev: binutils ([2.45](https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00009.html)) - open-vm-tools ([13.0.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-13.0.5)) - sysext-incus, sysext-podman, vmware: fuse ([3.17.4](https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.4)) - sysext-nvidia-drivers-570, sysext-nvidia-drivers-570-open: nvidia-drivers (570.190) - sysext-podman: gpgme ([2.0.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=cd0e093bf83fe47b6773fb478fced07d8409fbe0;hb=e17ba578861905857da0a514b4fc9b88a57f7346)) - sysext-python: charset-normalizer ([3.4.3](https://github.com/jawah/charset_normalizer/releases/tag/3.4.3)) - sysext-python: jaraco-functools ([4.3.0](https://raw.githubusercontent.com/jaraco/jaraco.functools/refs/tags/v4.3.0/NEWS.rst)) - sysext-python: markdown-it-py ([4.0.0](https://github.com/executablebooks/markdown-it-py/releases/tag/v4.0.0)) - sysext-python: pip ([25.2](https://raw.githubusercontent.com/pypa/pip/refs/tags/25.2/NEWS.rst)) - sysext-python: requests ([2.32.5](https://github.com/psf/requests/releases/tag/v2.32.5)) #### Beta 4459.1.0 Release _Changes since **Beta 4426.1.0**_ #### Security fixes: - Linux ([CVE-2025-39927](https://nvd.nist.gov/vuln/detail/CVE-2025-39927), [CVE-2025-39926](https://nvd.nist.gov/vuln/detail/CVE-2025-39926), [CVE-2025-39923](https://nvd.nist.gov/vuln/detail/CVE-2025-39923), [CVE-2025-39913](https://nvd.nist.gov/vuln/detail/CVE-2025-39913), [CVE-2025-39912](https://nvd.nist.gov/vuln/detail/CVE-2025-39912), [CVE-2025-39911](https://nvd.nist.gov/vuln/detail/CVE-2025-39911), [CVE-2025-39909](https://nvd.nist.gov/vuln/detail/CVE-2025-39909), [CVE-2025-39907](https://nvd.nist.gov/vuln/detail/CVE-2025-39907), [CVE-2025-39917](https://nvd.nist.gov/vuln/detail/CVE-2025-39917), [CVE-2025-39916](https://nvd.nist.gov/vuln/detail/CVE-2025-39916), [CVE-2025-39914](https://nvd.nist.gov/vuln/detail/CVE-2025-39914), [CVE-2025-39885](https://nvd.nist.gov/vuln/detail/CVE-2025-39885), [CVE-2025-39886](https://nvd.nist.gov/vuln/detail/CVE-2025-39886), [CVE-2025-39876](https://nvd.nist.gov/vuln/detail/CVE-2025-39876), [CVE-2025-39873](https://nvd.nist.gov/vuln/detail/CVE-2025-39873), [CVE-2025-39871](https://nvd.nist.gov/vuln/detail/CVE-2025-39871), [CVE-2025-39870](https://nvd.nist.gov/vuln/detail/CVE-2025-39870), [CVE-2025-39869](https://nvd.nist.gov/vuln/detail/CVE-2025-39869), [CVE-2025-39884](https://nvd.nist.gov/vuln/detail/CVE-2025-39884), [CVE-2025-39883](https://nvd.nist.gov/vuln/detail/CVE-2025-39883), [CVE-2025-39882](https://nvd.nist.gov/vuln/detail/CVE-2025-39882), [CVE-2025-39881](https://nvd.nist.gov/vuln/detail/CVE-2025-39881), [CVE-2025-39880](https://nvd.nist.gov/vuln/detail/CVE-2025-39880), [CVE-2025-39877](https://nvd.nist.gov/vuln/detail/CVE-2025-39877), [CVE-2025-39963](https://nvd.nist.gov/vuln/detail/CVE-2025-39963), [CVE-2025-39961](https://nvd.nist.gov/vuln/detail/CVE-2025-39961), [CVE-2025-39957](https://nvd.nist.gov/vuln/detail/CVE-2025-39957), [CVE-2025-39956](https://nvd.nist.gov/vuln/detail/CVE-2025-39956), [CVE-2025-39955](https://nvd.nist.gov/vuln/detail/CVE-2025-39955), [CVE-2025-39938](https://nvd.nist.gov/vuln/detail/CVE-2025-39938), [CVE-2025-39937](https://nvd.nist.gov/vuln/detail/CVE-2025-39937), [CVE-2025-39934](https://nvd.nist.gov/vuln/detail/CVE-2025-39934), [CVE-2025-39953](https://nvd.nist.gov/vuln/detail/CVE-2025-39953), [CVE-2025-39952](https://nvd.nist.gov/vuln/detail/CVE-2025-39952), [CVE-2025-39951](https://nvd.nist.gov/vuln/detail/CVE-2025-39951), [CVE-2025-39950](https://nvd.nist.gov/vuln/detail/CVE-2025-39950), [CVE-2025-39932](https://nvd.nist.gov/vuln/detail/CVE-2025-39932), [CVE-2025-39949](https://nvd.nist.gov/vuln/detail/CVE-2025-39949), [CVE-2025-39948](https://nvd.nist.gov/vuln/detail/CVE-2025-39948), [CVE-2025-39947](https://nvd.nist.gov/vuln/detail/CVE-2025-39947), [CVE-2025-39946](https://nvd.nist.gov/vuln/detail/CVE-2025-39946), [CVE-2025-39945](https://nvd.nist.gov/vuln/detail/CVE-2025-39945), [CVE-2025-39944](https://nvd.nist.gov/vuln/detail/CVE-2025-39944), [CVE-2025-39943](https://nvd.nist.gov/vuln/detail/CVE-2025-39943), [CVE-2025-39942](https://nvd.nist.gov/vuln/detail/CVE-2025-39942), [CVE-2025-39940](https://nvd.nist.gov/vuln/detail/CVE-2025-39940), [CVE-2025-39929](https://nvd.nist.gov/vuln/detail/CVE-2025-39929), [CVE-2025-39931](https://nvd.nist.gov/vuln/detail/CVE-2025-39931), [CVE-2024-57878](https://nvd.nist.gov/vuln/detail/CVE-2024-57878), [CVE-2024-57877](https://nvd.nist.gov/vuln/detail/CVE-2024-57877), [CVE-2024-57875](https://nvd.nist.gov/vuln/detail/CVE-2024-57875), [CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23127](https://nvd.nist.gov/vuln/detail/CVE-2025-23127), [CVE-2025-23126](https://nvd.nist.gov/vuln/detail/CVE-2025-23126), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2025-23124](https://nvd.nist.gov/vuln/detail/CVE-2025-23124), [CVE-2024-57872](https://nvd.nist.gov/vuln/detail/CVE-2024-57872), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57839](https://nvd.nist.gov/vuln/detail/CVE-2024-57839), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47794](https://nvd.nist.gov/vuln/detail/CVE-2024-47794), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-49569](https://nvd.nist.gov/vuln/detail/CVE-2024-49569), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-48876](https://nvd.nist.gov/vuln/detail/CVE-2024-48876), [CVE-2024-41932](https://nvd.nist.gov/vuln/detail/CVE-2024-41932), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56784](https://nvd.nist.gov/vuln/detail/CVE-2024-56784), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56782](https://nvd.nist.gov/vuln/detail/CVE-2024-56782), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56639](https://nvd.nist.gov/vuln/detail/CVE-2024-56639), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56647](https://nvd.nist.gov/vuln/detail/CVE-2024-56647), [CVE-2024-56646](https://nvd.nist.gov/vuln/detail/CVE-2024-56646), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56632](https://nvd.nist.gov/vuln/detail/CVE-2024-56632), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56624](https://nvd.nist.gov/vuln/detail/CVE-2024-56624), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56621](https://nvd.nist.gov/vuln/detail/CVE-2024-56621), [CVE-2024-56620](https://nvd.nist.gov/vuln/detail/CVE-2024-56620), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56618](https://nvd.nist.gov/vuln/detail/CVE-2024-56618), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56591](https://nvd.nist.gov/vuln/detail/CVE-2024-56591), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56588](https://nvd.nist.gov/vuln/detail/CVE-2024-56588), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56612](https://nvd.nist.gov/vuln/detail/CVE-2024-56612), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56609](https://nvd.nist.gov/vuln/detail/CVE-2024-56609), [CVE-2024-56608](https://nvd.nist.gov/vuln/detail/CVE-2024-56608), [CVE-2024-56607](https://nvd.nist.gov/vuln/detail/CVE-2024-56607), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56599](https://nvd.nist.gov/vuln/detail/CVE-2024-56599), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584)) - glib ([CVE-2025-7039](https://www.cve.org/CVERecord?id=CVE-2025-7039)) - glibc ([CVE-2025-8058](https://www.cve.org/CVERecord?id=CVE-2025-8058)) - gnutls ([CVE-2025-32988](https://www.cve.org/CVERecord?id=CVE-2025-32988), [CVE-2025-32989](https://www.cve.org/CVERecord?id=CVE-2025-32989), [CVE-2025-32990](https://www.cve.org/CVERecord?id=CVE-2025-32990), [CVE-2025-6395](https://www.cve.org/CVERecord?id=CVE-2025-6395)) - go ([CVE-2025-47906](https://www.cve.org/CVERecord?id=CVE-2025-47906), [CVE-2025-47907](https://www.cve.org/CVERecord?id=CVE-2025-47907)) - iperf ([CVE-2025-54349](https://www.cve.org/CVERecord?id=CVE-2025-54349), [CVE-2025-54350](https://www.cve.org/CVERecord?id=CVE-2025-54350), [CVE-2025-54351](https://www.cve.org/CVERecord?id=CVE-2025-54351)) - nvidia-drivers ([CVE-2025-23277](https://www.cve.org/CVERecord?id=CVE-2025-23277), [CVE-2025-23278](https://www.cve.org/CVERecord?id=CVE-2025-23278), [CVE-2025-23279](https://www.cve.org/CVERecord?id=CVE-2025-23279), [CVE-2025-23286](https://www.cve.org/CVERecord?id=CVE-2025-23286)) - python ([CVE-2025-6069](https://www.cve.org/CVERecord?id=CVE-2025-6069), [CVE-2025-8194](https://www.cve.org/CVERecord?id=CVE-2025-8194)) - vim ([CVE-2025-53905](https://www.cve.org/CVERecord?id=CVE-2025-53905), [CVE-2025-53906](https://www.cve.org/CVERecord?id=CVE-2025-53906), [CVE-2025-9390](https://www.cve.org/CVERecord?id=CVE-2025-9390)) #### Bug fixes: - Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance ([Flatcar#1901](https://github.com/flatcar/Flatcar/issues/1901)) #### Changes: - Enable CONFIG_INET_DIAG_DESTROY in kernel options ([flatcar/scripts#3176](https://github.com/flatcar/scripts/pull/3176)) - Hyper-V images now use a systemd-sysext image for layering additional platform-specific software on top of `/usr` - Scaleway: SSH keys are now fetched _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277)) - Scaleway: The hostname is now set _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277)) #### Updates: - Ignition ([2.22.0](https://coreos.github.io/ignition/release-notes/#ignition-2220-2025-07-08)) - Linux ([6.12.51](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51) (includes [6.12.42](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.42), [6.12.43](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.43), [6.12.48](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48), [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49), [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50))) - Linux Firmware ([20250808](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250808)) - SDK: gnu-efi ([4.0.2](https://github.com/ncroxon/gnu-efi/releases/tag/4.0.2)) - SDK: go ([1.24.6](https://go.dev/doc/devel/release#go1.24.minor)) - SDK: rust ([1.88.0](https://blog.rust-lang.org/2025/06/26/Rust-1.88.0/)) - SDK: sbsigntools ([0.9.5](https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/commit/?h=v0.9.5&id=9cfca9fe7aa7a8e29b92fe33ce8433e212c9a8ba)) - azure, dev, gce, sysext-python: gdbm ([1.26](https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00012.html)) - azure, dev, gce, sysext-python: python (3.11.13_p1) - base, dev: azure-vm-utils ([0.7.0](https://github.com/Azure/azure-vm-utils/releases/tag/v0.7.0)) - base, dev: btrfs-progs ([6.15](https://github.com/kdave/btrfs-progs/releases/tag/v6.15)) - base, dev: cryptsetup ([2.8.0](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.8.0/docs/v2.8.0-ReleaseNotes)) - base, dev: curl ([8.15.0](https://curl.se/ch/8.15.0.html) (includes [8.14.0](https://curl.se/ch/8.14.0.html), [8.14.1](https://curl.se/ch/8.14.1.html))) - base, dev: e2fsprogs ([1.47.3](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.3)) - base, dev: ethtool ([6.15](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/plain/NEWS?h=v6.15)) - base, dev: glib ([2.84.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.4)) - base, dev: gnutls ([3.8.10](https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html)) - base, dev: iproute2 ([6.16.0](https://www.spinics.net/lists/netdev/msg1112693.html)) - base, dev: kmod ([34.2](https://lwn.net/Articles/1011365/)) - base, dev: libgcrypt ([1.11.2](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS;h=3add9aad0cf6dc5a70ce6cb3983a46e585a630b3;hb=737cc63600146f196738a6768679eb016cf866e9)) - base, dev: libnvme ([1.15](https://github.com/linux-nvme/libnvme/releases/tag/v1.15)) - base, dev: libsodium ([1.0.20_p20250606](https://raw.githubusercontent.com/jedisct1/libsodium/7e024fbf096c84bef866b21f521c516591908bef/ChangeLog)) - base, dev: libusb ([1.0.29](https://raw.githubusercontent.com/libusb/libusb/refs/tags/v1.0.29/ChangeLog)) - base, dev: lsof ([4.99.5](https://github.com/lsof-org/lsof/releases/tag/4.99.5)) - base, dev: ncurses ([6.5_p20250531](https://invisible-island.net/ncurses/NEWS.html#t20250531)) - base, dev: nettle ([3.10.2](https://git.lysator.liu.se/nettle/nettle/-/raw/nettle_3.10.2_release_20250626/ChangeLog)) - base, dev: ntp ([4.2.8_p18](https://www.ntp.org/support/securitynotice/4_2_8p18-release-announcement/)) - base, dev: nvidia-drivers-service ([570.172.08](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-172-08/index.html) (includes [535.261.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-261-03/index.html), 570.172.08)) - base, dev: nvme-cli ([2.15](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.15)) - base, dev: openssl ([3.4.2](https://github.com/openssl/openssl/releases/tag/openssl-3.4.2)) - base, dev: pciutils ([3.14.0](https://git.kernel.org/pub/scm/utils/pciutils/pciutils.git/plain/ChangeLog?h=v3.14.0)) - base, dev: pinentry ([1.3.2](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob_plain;f=NEWS;h=8bf192539fed9104a1ff431c6dcc3add7fb6771c;hb=d7660807593067d5cd7150b7d4d987d60957b5cb)) - base, dev: pkgconf ([2.5.1](https://raw.githubusercontent.com/pkgconf/pkgconf/refs/tags/pkgconf-2.5.1/NEWS) (includes [2.5.0](https://raw.githubusercontent.com/pkgconf/pkgconf/refs/tags/pkgconf-2.5.0/NEWS))) - base, dev: rpcbind ([1.2.8](https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_8)) - base, dev: selinux ([2.20250213](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20250213)) - base, dev: sqlite ([3.50.4](https://sqlite.org/releaselog/3_50_4.html) (includes [3.50.3](https://sqlite.org/releaselog/3_50_3.html))) - base, dev: strace ([6.16](https://github.com/strace/strace/releases/tag/v6.16)) - base, dev: sudo ([1.9.17_p2](https://github.com/sudo-project/sudo/releases/tag/v1.9.17p2)) - base, dev: vim ([9.1.1652](https://github.com/vim/vim/commits/v9.1.1652/)) - ca-certificates ([3.117](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html) (includes [3.115](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115.html), [3.116](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html))) - dev: gnuconfig ([20250710](https://cgit.git.savannah.gnu.org/cgit/config.git/log/?id=a2287c3041a3f2a204eb942e09c015eab00dc7dd)) - dev: iperf ([3.19.1](https://github.com/esnet/iperf/releases/tag/3.19.1)) - sysext-incus, sysext-podman, vmware: fuse ([3.17.3](https://raw.githubusercontent.com/libfuse/libfuse/refs/tags/fuse-3.17.3/ChangeLog.rst)) - sysext-incus: cowsql ([1.15.9](https://github.com/cowsql/cowsql/commits/v1.15.9/)) - sysext-nvidia-drivers-535, sysext-nvidia-drivers-535-open: nvidia-drivers ([535.261.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-261-03/index.html)) - sysext-nvidia-drivers-570, sysext-nvidia-drivers-570-open: nvidia-drivers (570.181 (includes [570.172.08](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-172-08/index.html))) - sysext-python: distlib ([0.4.0](https://github.com/pypa/distlib/blob/0.4.0/CHANGES.rst#040)) - sysext-python: rich ([14.1.0](https://github.com/Textualize/rich/releases/tag/v14.1.0)) - sysext-python: trove-classifiers ([2025.8.26.11](https://github.com/pypa/trove-classifiers/releases/tag/2025.8.26.11) (includes [2025.8.6.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.8.6.13))) - sysext-python: truststore ([0.10.4](https://raw.githubusercontent.com/sethmlarson/truststore/refs/tags/v0.10.4/CHANGELOG.md)) _Changes since **Alpha 4459.0.0**_ #### Security fixes: - Linux ([CVE-2025-39927](https://nvd.nist.gov/vuln/detail/CVE-2025-39927), [CVE-2025-39926](https://nvd.nist.gov/vuln/detail/CVE-2025-39926), [CVE-2025-39923](https://nvd.nist.gov/vuln/detail/CVE-2025-39923), [CVE-2025-39913](https://nvd.nist.gov/vuln/detail/CVE-2025-39913), [CVE-2025-39912](https://nvd.nist.gov/vuln/detail/CVE-2025-39912), [CVE-2025-39911](https://nvd.nist.gov/vuln/detail/CVE-2025-39911), [CVE-2025-39909](https://nvd.nist.gov/vuln/detail/CVE-2025-39909), [CVE-2025-39907](https://nvd.nist.gov/vuln/detail/CVE-2025-39907), [CVE-2025-39917](https://nvd.nist.gov/vuln/detail/CVE-2025-39917), [CVE-2025-39916](https://nvd.nist.gov/vuln/detail/CVE-2025-39916), [CVE-2025-39914](https://nvd.nist.gov/vuln/detail/CVE-2025-39914), [CVE-2025-39885](https://nvd.nist.gov/vuln/detail/CVE-2025-39885), [CVE-2025-39886](https://nvd.nist.gov/vuln/detail/CVE-2025-39886), [CVE-2025-39876](https://nvd.nist.gov/vuln/detail/CVE-2025-39876), [CVE-2025-39873](https://nvd.nist.gov/vuln/detail/CVE-2025-39873), [CVE-2025-39871](https://nvd.nist.gov/vuln/detail/CVE-2025-39871), [CVE-2025-39870](https://nvd.nist.gov/vuln/detail/CVE-2025-39870), [CVE-2025-39869](https://nvd.nist.gov/vuln/detail/CVE-2025-39869), [CVE-2025-39884](https://nvd.nist.gov/vuln/detail/CVE-2025-39884), [CVE-2025-39883](https://nvd.nist.gov/vuln/detail/CVE-2025-39883), [CVE-2025-39882](https://nvd.nist.gov/vuln/detail/CVE-2025-39882), [CVE-2025-39881](https://nvd.nist.gov/vuln/detail/CVE-2025-39881), [CVE-2025-39880](https://nvd.nist.gov/vuln/detail/CVE-2025-39880), [CVE-2025-39877](https://nvd.nist.gov/vuln/detail/CVE-2025-39877), [CVE-2025-39963](https://nvd.nist.gov/vuln/detail/CVE-2025-39963), [CVE-2025-39961](https://nvd.nist.gov/vuln/detail/CVE-2025-39961), [CVE-2025-39957](https://nvd.nist.gov/vuln/detail/CVE-2025-39957), [CVE-2025-39956](https://nvd.nist.gov/vuln/detail/CVE-2025-39956), [CVE-2025-39955](https://nvd.nist.gov/vuln/detail/CVE-2025-39955), [CVE-2025-39938](https://nvd.nist.gov/vuln/detail/CVE-2025-39938), [CVE-2025-39937](https://nvd.nist.gov/vuln/detail/CVE-2025-39937), [CVE-2025-39934](https://nvd.nist.gov/vuln/detail/CVE-2025-39934), [CVE-2025-39953](https://nvd.nist.gov/vuln/detail/CVE-2025-39953), [CVE-2025-39952](https://nvd.nist.gov/vuln/detail/CVE-2025-39952), [CVE-2025-39951](https://nvd.nist.gov/vuln/detail/CVE-2025-39951), [CVE-2025-39950](https://nvd.nist.gov/vuln/detail/CVE-2025-39950), [CVE-2025-39932](https://nvd.nist.gov/vuln/detail/CVE-2025-39932), [CVE-2025-39949](https://nvd.nist.gov/vuln/detail/CVE-2025-39949), [CVE-2025-39948](https://nvd.nist.gov/vuln/detail/CVE-2025-39948), [CVE-2025-39947](https://nvd.nist.gov/vuln/detail/CVE-2025-39947), [CVE-2025-39946](https://nvd.nist.gov/vuln/detail/CVE-2025-39946), [CVE-2025-39945](https://nvd.nist.gov/vuln/detail/CVE-2025-39945), [CVE-2025-39944](https://nvd.nist.gov/vuln/detail/CVE-2025-39944), [CVE-2025-39943](https://nvd.nist.gov/vuln/detail/CVE-2025-39943), [CVE-2025-39942](https://nvd.nist.gov/vuln/detail/CVE-2025-39942), [CVE-2025-39940](https://nvd.nist.gov/vuln/detail/CVE-2025-39940), [CVE-2025-39929](https://nvd.nist.gov/vuln/detail/CVE-2025-39929), [CVE-2025-39931](https://nvd.nist.gov/vuln/detail/CVE-2025-39931), [CVE-2024-57878](https://nvd.nist.gov/vuln/detail/CVE-2024-57878), [CVE-2024-57877](https://nvd.nist.gov/vuln/detail/CVE-2024-57877), [CVE-2024-57875](https://nvd.nist.gov/vuln/detail/CVE-2024-57875), [CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23127](https://nvd.nist.gov/vuln/detail/CVE-2025-23127), [CVE-2025-23126](https://nvd.nist.gov/vuln/detail/CVE-2025-23126), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2025-23124](https://nvd.nist.gov/vuln/detail/CVE-2025-23124), [CVE-2024-57872](https://nvd.nist.gov/vuln/detail/CVE-2024-57872), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57839](https://nvd.nist.gov/vuln/detail/CVE-2024-57839), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47794](https://nvd.nist.gov/vuln/detail/CVE-2024-47794), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-49569](https://nvd.nist.gov/vuln/detail/CVE-2024-49569), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-48876](https://nvd.nist.gov/vuln/detail/CVE-2024-48876), [CVE-2024-41932](https://nvd.nist.gov/vuln/detail/CVE-2024-41932), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56784](https://nvd.nist.gov/vuln/detail/CVE-2024-56784), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56782](https://nvd.nist.gov/vuln/detail/CVE-2024-56782), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56639](https://nvd.nist.gov/vuln/detail/CVE-2024-56639), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56647](https://nvd.nist.gov/vuln/detail/CVE-2024-56647), [CVE-2024-56646](https://nvd.nist.gov/vuln/detail/CVE-2024-56646), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56632](https://nvd.nist.gov/vuln/detail/CVE-2024-56632), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56624](https://nvd.nist.gov/vuln/detail/CVE-2024-56624), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56621](https://nvd.nist.gov/vuln/detail/CVE-2024-56621), [CVE-2024-56620](https://nvd.nist.gov/vuln/detail/CVE-2024-56620), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56618](https://nvd.nist.gov/vuln/detail/CVE-2024-56618), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56591](https://nvd.nist.gov/vuln/detail/CVE-2024-56591), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56588](https://nvd.nist.gov/vuln/detail/CVE-2024-56588), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56612](https://nvd.nist.gov/vuln/detail/CVE-2024-56612), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56609](https://nvd.nist.gov/vuln/detail/CVE-2024-56609), [CVE-2024-56608](https://nvd.nist.gov/vuln/detail/CVE-2024-56608), [CVE-2024-56607](https://nvd.nist.gov/vuln/detail/CVE-2024-56607), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56599](https://nvd.nist.gov/vuln/detail/CVE-2024-56599), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584)) #### Bug fixes: - Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance ([Flatcar#1901](https://github.com/flatcar/Flatcar/issues/1901)) #### Changes: - Scaleway: SSH keys are now fetched _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277)) - Scaleway: The hostname is now set _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277)) #### Updates: - Linux ([6.12.51](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51) (includes [6.12.48](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48), [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49), [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50))) - ca-certificates ([3.117](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html) (includes [3.116](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html))) #### Stable 4230.2.4 Release _Changes since **Stable 4230.2.3**_ #### Security fixes: - Linux ([CVE-2025-39923](https://nvd.nist.gov/vuln/detail/CVE-2025-39923), [CVE-2025-39913](https://nvd.nist.gov/vuln/detail/CVE-2025-39913), [CVE-2025-39911](https://nvd.nist.gov/vuln/detail/CVE-2025-39911), [CVE-2025-39909](https://nvd.nist.gov/vuln/detail/CVE-2025-39909), [CVE-2025-39907](https://nvd.nist.gov/vuln/detail/CVE-2025-39907), [CVE-2025-39916](https://nvd.nist.gov/vuln/detail/CVE-2025-39916), [CVE-2025-39914](https://nvd.nist.gov/vuln/detail/CVE-2025-39914), [CVE-2025-39885](https://nvd.nist.gov/vuln/detail/CVE-2025-39885), [CVE-2025-39886](https://nvd.nist.gov/vuln/detail/CVE-2025-39886), [CVE-2025-39876](https://nvd.nist.gov/vuln/detail/CVE-2025-39876), [CVE-2025-39873](https://nvd.nist.gov/vuln/detail/CVE-2025-39873), [CVE-2025-39871](https://nvd.nist.gov/vuln/detail/CVE-2025-39871), [CVE-2025-39870](https://nvd.nist.gov/vuln/detail/CVE-2025-39870), [CVE-2025-39869](https://nvd.nist.gov/vuln/detail/CVE-2025-39869), [CVE-2025-39883](https://nvd.nist.gov/vuln/detail/CVE-2025-39883), [CVE-2025-39882](https://nvd.nist.gov/vuln/detail/CVE-2025-39882), [CVE-2025-39881](https://nvd.nist.gov/vuln/detail/CVE-2025-39881), [CVE-2025-39880](https://nvd.nist.gov/vuln/detail/CVE-2025-39880), [CVE-2025-39877](https://nvd.nist.gov/vuln/detail/CVE-2025-39877), [CVE-2025-39961](https://nvd.nist.gov/vuln/detail/CVE-2025-39961), [CVE-2025-39957](https://nvd.nist.gov/vuln/detail/CVE-2025-39957), [CVE-2025-39955](https://nvd.nist.gov/vuln/detail/CVE-2025-39955), [CVE-2025-39938](https://nvd.nist.gov/vuln/detail/CVE-2025-39938), [CVE-2025-39937](https://nvd.nist.gov/vuln/detail/CVE-2025-39937), [CVE-2025-39934](https://nvd.nist.gov/vuln/detail/CVE-2025-39934), [CVE-2025-39953](https://nvd.nist.gov/vuln/detail/CVE-2025-39953), [CVE-2025-39952](https://nvd.nist.gov/vuln/detail/CVE-2025-39952), [CVE-2025-39951](https://nvd.nist.gov/vuln/detail/CVE-2025-39951), [CVE-2025-39949](https://nvd.nist.gov/vuln/detail/CVE-2025-39949), [CVE-2025-39947](https://nvd.nist.gov/vuln/detail/CVE-2025-39947), [CVE-2025-39946](https://nvd.nist.gov/vuln/detail/CVE-2025-39946), [CVE-2025-39945](https://nvd.nist.gov/vuln/detail/CVE-2025-39945), [CVE-2025-39944](https://nvd.nist.gov/vuln/detail/CVE-2025-39944), [CVE-2025-39943](https://nvd.nist.gov/vuln/detail/CVE-2025-39943), [CVE-2025-39942](https://nvd.nist.gov/vuln/detail/CVE-2025-39942), [CVE-2025-39929](https://nvd.nist.gov/vuln/detail/CVE-2025-39929), [CVE-2025-39931](https://nvd.nist.gov/vuln/detail/CVE-2025-39931), [CVE-2023-52435](https://nvd.nist.gov/vuln/detail/CVE-2023-52435)) #### Bug fixes: - Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance ([Flatcar#1901](https://github.com/flatcar/Flatcar/issues/1901)) #### Changes: - Scaleway: SSH keys are now fetched _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277)) - Scaleway: The hostname is now set _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277)) #### Updates: - Linux ([6.6.110](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.110) (includes [6.6.107](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.107), [6.6.108](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.108), [6.6.109](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.109))) - ca-certificates ([3.117](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html) (includes [3.116](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html))) - open-iscsi ([2.1.11](https://raw.githubusercontent.com/open-iscsi/open-iscsi/refs/tags/2.1.11/Changelog)) Best, The Flatcar Container Linux Maintainers --- ### Communication #### Go/No-Go message for Matrix/Slack Go/No-Go Meeting for Alpha 4487.0.0, Beta 4459.1.0, Stable 4230.2.4 Pre-view images are available in https://bincache.flatcar-linux.net/images/amd64/$VERSION/ Tracking issue: https://github.com/flatcar/Flatcar/issues/1918 The Go/No-Go document is in our HackMD @flatcar namespace Link: https://hackmd.io/rhvFhYOJSyuXYz74t1c9-Q Please give your Go/No-Go vote with πŸ’š for Go, ❌ for No-Go, and βœ‹ for Wait. Contributors & community feel free to put your suggestions, thoughts or comments on the document or here in the chat. @MAINTAINER @MAINTAINER @MAINTAINER #### Mastodon _The toot (from [@flatcar](https://hachyderm.io/@flatcar)) goes out after the changelog update has been published; it includes a link to the web changelog._ πŸš€ Fresh Flatcar Linux releases are here! Alpha 4487.0.0 β€’ Beta 4459.1.0 β€’ Stable 4230.2.4 New kernels, major CVE fixes, faster boots, and smarter partitions across all channels. Let’s see what’s inside πŸ‘‡ #Flatcar #opensource #linux ~ πŸ”§ Alpha (4487.0.0): β€’ Linux 6.12.51 / Ignition 2.22.0 / Afterburn 5.10.0 β€’ Initrd split -> ~50% smaller /boot β€’ HVF accel on arm64 Macs ~ 🧱 Beta and Stable catch up with: β€’ Linux 6.12.51 (Beta) / 6.6.110 (Stable) β€’ Updated ca-certs 3.117 & Ignition 2.22.0 β€’ Security and performance improvements throughout ⚑ ~ Thanks to our contributors and testers πŸ’™ Explore the full changelog & download builds β†’ πŸ”— https://www.flatcar.org/releases/ #Flatcar #opensource #linux #cloudnative #### Kubernetes Slack _This goes in the #flatcar channel_ Please welcome the Flatcar Linux releases for October! πŸŽ‰ - **Alpha 4487.0.0** (major release) - **Beta 4459.1.0** (major release) - **Stable 4230.2.4** (maintenance release) These releases include: πŸš€ New features & improvements: β€’ Future-proofed partitions and an initrd split β†’ ~50% smaller /boot β€’ Faster QEMU on Apple Silicon (HVF acceleration) β€’ Scaleway now managed via Afterburn for SSH keys & hostnames 🩹 Fixes & updates: β€’ Major Linux CVE patches across all channels β€’ Improved stability and security hardening β€’ Ignition 2.22.0 / Afterburn 5.10.0 updates πŸ“¦ Package & component refresh: β€’ Linux 6.12.51 (Alpha/Beta) / 6.6.110 (Stable) β€’ Updated ca-certs 3.117 β€’ Toolchain and SDK upgrades πŸ“œ Release notes in the usual spot: πŸ”— https://www.flatcar.org/releases/ πŸ’™ Thanks to everyone contributing, testing, and reporting issues to keep Flatcar rolling strong!