# Flatcar Container Linux Release - 10th of October 2024
## Alpha 4116.0.0
- AMD64-usr
- Platforms succeeded: all except Brightbox, qemu_uefi_secure
- Platforms failed: Brightbox, qemu_uefi_secure
- Brightbox: flaky tests with message "Error: creating an image: getting image active: time limit exceeded"
- qemu_uefi_secure: test failure with message "kola: creating new machine for semver check: machine "2a862c57-9045-4add-a441-7459d823cd33" failed to start: ssh journalctl failed: time limit exceeded: dial tcp 10.0.0.2:22: connect: no route to host"
- Platforms not tested: none
- ARM64-usr
- Platforms succeeded: all
- Platforms failed: none
- Platforms not tested: none
VERDICT: **GO**
## Beta 4081.1.0
- AMD64-usr
- Platforms succeeded: all except Brightbox, qemu_uefi_secure
- Platforms failed: Brightbox, qemu_uefi_secure
- Brightbox: flaky tests with message "Error: creating an image: getting image active: time limit exceeded"
- qemu_uefi_secure: test failure with message "kola: creating new machine for semver check: machine "2a862c57-9045-4add-a441-7459d823cd33" failed to start: ssh journalctl failed: time limit exceeded: dial tcp 10.0.0.2:22: connect: no route to host"
- Platforms not tested: none
- ARM64-usr
- Platforms succeeded: all
- Platforms failed: none
- Platforms not tested: none
VERDICT: **GO**
## Stable 3975.2.2
- AMD64-usr
- Platforms succeeded: all except qemu_uefi_secure
- Platforms failed: qemu_uefi_secure
- qemu_uefi_secure: test failure with message "kola: creating new machine for semver check: machine "2a862c57-9045-4add-a441-7459d823cd33" failed to start: ssh journalctl failed: time limit exceeded: dial tcp 10.0.0.2:22: connect: no route to host"
- Platforms not tested: none
- ARM64-usr
- Platforms succeeded: all
- Platforms failed: none
- Platforms not tested: none
VERDICT: **GO**
## Communication
---
#### Guidelines / Things to Remember
- Release notes are used in a PR and will appear on https://www.flatcar.org/releases/
- [Announcement Message](#Announcement-Message) is posted in [Flatcar-Linux-user](https://groups.google.com/g/flatcar-linux-user). Make sure to post as βFlatcar Container Linux Userβ, not with your personal user (this can be selected when drafting the post).
---
### Announcement Message
Subject: Announcing new releases Alpha 4116.0.0, Beta 4081.1.0, Stable 3975.2.2
Hello,
We are pleased to announce a new Flatcar Container Linux release for the Alpha, Beta, Stable channel.
#### Alpha 4116.0.0
_Changes since **Alpha 4081.0.0**_
#### Security fixes:
- Linux ([CVE-2024-46711](https://nvd.nist.gov/vuln/detail/CVE-2024-46711), [CVE-2024-46709](https://nvd.nist.gov/vuln/detail/CVE-2024-46709), [CVE-2024-46680](https://nvd.nist.gov/vuln/detail/CVE-2024-46680), [CVE-2024-46679](https://nvd.nist.gov/vuln/detail/CVE-2024-46679), [CVE-2024-46678](https://nvd.nist.gov/vuln/detail/CVE-2024-46678), [CVE-2024-46677](https://nvd.nist.gov/vuln/detail/CVE-2024-46677), [CVE-2024-46676](https://nvd.nist.gov/vuln/detail/CVE-2024-46676), [CVE-2024-46695](https://nvd.nist.gov/vuln/detail/CVE-2024-46695), [CVE-2024-46694](https://nvd.nist.gov/vuln/detail/CVE-2024-46694), [CVE-2024-46693](https://nvd.nist.gov/vuln/detail/CVE-2024-46693), [CVE-2024-46675](https://nvd.nist.gov/vuln/detail/CVE-2024-46675), [CVE-2024-46692](https://nvd.nist.gov/vuln/detail/CVE-2024-46692), [CVE-2024-46689](https://nvd.nist.gov/vuln/detail/CVE-2024-46689), [CVE-2024-46687](https://nvd.nist.gov/vuln/detail/CVE-2024-46687), [CVE-2024-46686](https://nvd.nist.gov/vuln/detail/CVE-2024-46686), [CVE-2024-46685](https://nvd.nist.gov/vuln/detail/CVE-2024-46685), [CVE-2024-46673](https://nvd.nist.gov/vuln/detail/CVE-2024-46673), [CVE-2024-46674](https://nvd.nist.gov/vuln/detail/CVE-2024-46674), [CVE-2024-46811](https://nvd.nist.gov/vuln/detail/CVE-2024-46811), [CVE-2024-46810](https://nvd.nist.gov/vuln/detail/CVE-2024-46810), [CVE-2024-46809](https://nvd.nist.gov/vuln/detail/CVE-2024-46809), [CVE-2024-46807](https://nvd.nist.gov/vuln/detail/CVE-2024-46807), [CVE-2024-46806](https://nvd.nist.gov/vuln/detail/CVE-2024-46806), [CVE-2024-46805](https://nvd.nist.gov/vuln/detail/CVE-2024-46805), [CVE-2024-46804](https://nvd.nist.gov/vuln/detail/CVE-2024-46804), [CVE-2024-46821](https://nvd.nist.gov/vuln/detail/CVE-2024-46821), [CVE-2024-46819](https://nvd.nist.gov/vuln/detail/CVE-2024-46819), [CVE-2024-46818](https://nvd.nist.gov/vuln/detail/CVE-2024-46818), [CVE-2024-46817](https://nvd.nist.gov/vuln/detail/CVE-2024-46817), [CVE-2024-46815](https://nvd.nist.gov/vuln/detail/CVE-2024-46815), [CVE-2024-46814](https://nvd.nist.gov/vuln/detail/CVE-2024-46814), [CVE-2024-46812](https://nvd.nist.gov/vuln/detail/CVE-2024-46812), [CVE-2024-46802](https://nvd.nist.gov/vuln/detail/CVE-2024-46802), [CVE-2024-46803](https://nvd.nist.gov/vuln/detail/CVE-2024-46803), [CVE-2024-46724](https://nvd.nist.gov/vuln/detail/CVE-2024-46724), [CVE-2024-46732](https://nvd.nist.gov/vuln/detail/CVE-2024-46732), [CVE-2024-46731](https://nvd.nist.gov/vuln/detail/CVE-2024-46731), [CVE-2024-46728](https://nvd.nist.gov/vuln/detail/CVE-2024-46728), [CVE-2024-46726](https://nvd.nist.gov/vuln/detail/CVE-2024-46726), [CVE-2024-46725](https://nvd.nist.gov/vuln/detail/CVE-2024-46725), [CVE-2024-46723](https://nvd.nist.gov/vuln/detail/CVE-2024-46723), [CVE-2024-46722](https://nvd.nist.gov/vuln/detail/CVE-2024-46722), [CVE-2024-46721](https://nvd.nist.gov/vuln/detail/CVE-2024-46721), [CVE-2024-46720](https://nvd.nist.gov/vuln/detail/CVE-2024-46720), [CVE-2024-46719](https://nvd.nist.gov/vuln/detail/CVE-2024-46719), [CVE-2024-46717](https://nvd.nist.gov/vuln/detail/CVE-2024-46717), [CVE-2024-46716](https://nvd.nist.gov/vuln/detail/CVE-2024-46716), [CVE-2024-46714](https://nvd.nist.gov/vuln/detail/CVE-2024-46714), [CVE-2024-46715](https://nvd.nist.gov/vuln/detail/CVE-2024-46715), [CVE-2024-46831](https://nvd.nist.gov/vuln/detail/CVE-2024-46831), [CVE-2024-46840](https://nvd.nist.gov/vuln/detail/CVE-2024-46840), [CVE-2024-46839](https://nvd.nist.gov/vuln/detail/CVE-2024-46839), [CVE-2024-46838](https://nvd.nist.gov/vuln/detail/CVE-2024-46838), [CVE-2024-46836](https://nvd.nist.gov/vuln/detail/CVE-2024-46836), [CVE-2024-46835](https://nvd.nist.gov/vuln/detail/CVE-2024-46835), [CVE-2024-46848](https://nvd.nist.gov/vuln/detail/CVE-2024-46848), [CVE-2024-46847](https://nvd.nist.gov/vuln/detail/CVE-2024-46847), [CVE-2024-46846](https://nvd.nist.gov/vuln/detail/CVE-2024-46846), [CVE-2024-46845](https://nvd.nist.gov/vuln/detail/CVE-2024-46845), [CVE-2024-46844](https://nvd.nist.gov/vuln/detail/CVE-2024-46844), [CVE-2024-46843](https://nvd.nist.gov/vuln/detail/CVE-2024-46843), [CVE-2024-46832](https://nvd.nist.gov/vuln/detail/CVE-2024-46832), [CVE-2024-46830](https://nvd.nist.gov/vuln/detail/CVE-2024-46830), [CVE-2024-46829](https://nvd.nist.gov/vuln/detail/CVE-2024-46829), [CVE-2024-46828](https://nvd.nist.gov/vuln/detail/CVE-2024-46828), [CVE-2024-46827](https://nvd.nist.gov/vuln/detail/CVE-2024-46827), [CVE-2024-46826](https://nvd.nist.gov/vuln/detail/CVE-2024-46826), [CVE-2024-46825](https://nvd.nist.gov/vuln/detail/CVE-2024-46825), [CVE-2024-46822](https://nvd.nist.gov/vuln/detail/CVE-2024-46822), [CVE-2024-46788](https://nvd.nist.gov/vuln/detail/CVE-2024-46788), [CVE-2024-46797](https://nvd.nist.gov/vuln/detail/CVE-2024-46797), [CVE-2024-46796](https://nvd.nist.gov/vuln/detail/CVE-2024-46796), [CVE-2024-46795](https://nvd.nist.gov/vuln/detail/CVE-2024-46795), [CVE-2024-46794](https://nvd.nist.gov/vuln/detail/CVE-2024-46794), [CVE-2024-46791](https://nvd.nist.gov/vuln/detail/CVE-2024-46791), [CVE-2024-46800](https://nvd.nist.gov/vuln/detail/CVE-2024-46800), [CVE-2024-46798](https://nvd.nist.gov/vuln/detail/CVE-2024-46798), [CVE-2024-46760](https://nvd.nist.gov/vuln/detail/CVE-2024-46760), [CVE-2024-46768](https://nvd.nist.gov/vuln/detail/CVE-2024-46768), [CVE-2024-46767](https://nvd.nist.gov/vuln/detail/CVE-2024-46767), [CVE-2024-46765](https://nvd.nist.gov/vuln/detail/CVE-2024-46765), [CVE-2024-46763](https://nvd.nist.gov/vuln/detail/CVE-2024-46763), [CVE-2024-46787](https://nvd.nist.gov/vuln/detail/CVE-2024-46787), [CVE-2024-46786](https://nvd.nist.gov/vuln/detail/CVE-2024-46786), [CVE-2024-46785](https://nvd.nist.gov/vuln/detail/CVE-2024-46785), [CVE-2024-46784](https://nvd.nist.gov/vuln/detail/CVE-2024-46784), [CVE-2024-46783](https://nvd.nist.gov/vuln/detail/CVE-2024-46783), [CVE-2024-46782](https://nvd.nist.gov/vuln/detail/CVE-2024-46782), [CVE-2024-46781](https://nvd.nist.gov/vuln/detail/CVE-2024-46781), [CVE-2024-46780](https://nvd.nist.gov/vuln/detail/CVE-2024-46780), [CVE-2024-46762](https://nvd.nist.gov/vuln/detail/CVE-2024-46762), [CVE-2024-46777](https://nvd.nist.gov/vuln/detail/CVE-2024-46777), [CVE-2024-46776](https://nvd.nist.gov/vuln/detail/CVE-2024-46776), [CVE-2024-46773](https://nvd.nist.gov/vuln/detail/CVE-2024-46773), [CVE-2024-46771](https://nvd.nist.gov/vuln/detail/CVE-2024-46771), [CVE-2024-46770](https://nvd.nist.gov/vuln/detail/CVE-2024-46770), [CVE-2024-46761](https://nvd.nist.gov/vuln/detail/CVE-2024-46761), [CVE-2024-46743](https://nvd.nist.gov/vuln/detail/CVE-2024-46743), [CVE-2024-46742](https://nvd.nist.gov/vuln/detail/CVE-2024-46742), [CVE-2024-46741](https://nvd.nist.gov/vuln/detail/CVE-2024-46741), [CVE-2024-46740](https://nvd.nist.gov/vuln/detail/CVE-2024-46740), [CVE-2024-46739](https://nvd.nist.gov/vuln/detail/CVE-2024-46739), [CVE-2024-46738](https://nvd.nist.gov/vuln/detail/CVE-2024-46738), [CVE-2024-46737](https://nvd.nist.gov/vuln/detail/CVE-2024-46737), [CVE-2024-46759](https://nvd.nist.gov/vuln/detail/CVE-2024-46759), [CVE-2024-46758](https://nvd.nist.gov/vuln/detail/CVE-2024-46758), [CVE-2024-46757](https://nvd.nist.gov/vuln/detail/CVE-2024-46757), [CVE-2024-46756](https://nvd.nist.gov/vuln/detail/CVE-2024-46756), [CVE-2024-46755](https://nvd.nist.gov/vuln/detail/CVE-2024-46755), [CVE-2024-46736](https://nvd.nist.gov/vuln/detail/CVE-2024-46736), [CVE-2024-46752](https://nvd.nist.gov/vuln/detail/CVE-2024-46752), [CVE-2024-46750](https://nvd.nist.gov/vuln/detail/CVE-2024-46750), [CVE-2024-46749](https://nvd.nist.gov/vuln/detail/CVE-2024-46749), [CVE-2024-46747](https://nvd.nist.gov/vuln/detail/CVE-2024-46747), [CVE-2024-46746](https://nvd.nist.gov/vuln/detail/CVE-2024-46746), [CVE-2024-46745](https://nvd.nist.gov/vuln/detail/CVE-2024-46745), [CVE-2024-46744](https://nvd.nist.gov/vuln/detail/CVE-2024-46744), [CVE-2024-46734](https://nvd.nist.gov/vuln/detail/CVE-2024-46734), [CVE-2024-46735](https://nvd.nist.gov/vuln/detail/CVE-2024-46735), [CVE-2024-46713](https://nvd.nist.gov/vuln/detail/CVE-2024-46713), [CVE-2024-46858](https://nvd.nist.gov/vuln/detail/CVE-2024-46858), [CVE-2024-46857](https://nvd.nist.gov/vuln/detail/CVE-2024-46857), [CVE-2024-46855](https://nvd.nist.gov/vuln/detail/CVE-2024-46855), [CVE-2024-46854](https://nvd.nist.gov/vuln/detail/CVE-2024-46854), [CVE-2024-46853](https://nvd.nist.gov/vuln/detail/CVE-2024-46853), [CVE-2024-46852](https://nvd.nist.gov/vuln/detail/CVE-2024-46852), [CVE-2024-46865](https://nvd.nist.gov/vuln/detail/CVE-2024-46865), [CVE-2024-46864](https://nvd.nist.gov/vuln/detail/CVE-2024-46864), [CVE-2024-46861](https://nvd.nist.gov/vuln/detail/CVE-2024-46861), [CVE-2024-46860](https://nvd.nist.gov/vuln/detail/CVE-2024-46860), [CVE-2024-46859](https://nvd.nist.gov/vuln/detail/CVE-2024-46859), [CVE-2024-46849](https://nvd.nist.gov/vuln/detail/CVE-2024-46849))
- Go ([CVE-2024-34155](https://nvd.nist.gov/vuln/detail/CVE-2024-34155), [CVE-2024-34156](https://nvd.nist.gov/vuln/detail/CVE-2024-34156), [CVE-2024-34158](https://nvd.nist.gov/vuln/detail/CVE-2024-34158))
- docker ([CVE-2024-41110](https://nvd.nist.gov/vuln/detail/CVE-2024-41110))
- etcd ([CVE-2023-32082](https://nvd.nist.gov/vuln/detail/CVE-2023-32082))
- expat ([CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490))
- intel-microcode ([CVE-2023-42667](https://nvd.nist.gov/vuln/detail/CVE-2023-42667), [CVE-2023-49141](https://nvd.nist.gov/vuln/detail/CVE-2023-49141), [CVE-2024-24853](https://nvd.nist.gov/vuln/detail/CVE-2024-24853), [CVE-2024-24980](https://nvd.nist.gov/vuln/detail/CVE-2024-24980), [CVE-2024-25939](https://nvd.nist.gov/vuln/detail/CVE-2024-25939))
- libpcap ([CVE-2023-7256](https://nvd.nist.gov/vuln/detail/CVE-2023-7256), [CVE-2024-8006](https://nvd.nist.gov/vuln/detail/CVE-2024-8006))
- runc ([CVE-2024-45310](https://nvd.nist.gov/vuln/detail/CVE-2024-45310))
#### Bug fixes:
- CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: ([flatcar/scripts#2016](https://github.com/flatcar/scripts/pull/2016))
- Equinix Metal: fixed race condition on 'mount' Ignition stage ([scripts#2308](https://github.com/flatcar/scripts/pull/2308))
#### Changes:
- Azure, HyperV: Added daemons `kvp`, `vss`, and `fcopy` for better HyperV hypervisor integration with Flatcar guests ([scripts#2309](https://github.com/flatcar/scripts/pull/2309)).
- Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers ([flatcar/scripts#2355](https://github.com/flatcar/scripts/pull/2355))
- Kernel lockdown in integrity mode is now enabled when secure boot is enabled. This prevents loading unsigned kernel modules and matches the behavior of all major distros. ([scripts#2299](https://github.com/flatcar/scripts/pull/2299))
- The `/usr/sbin` directory is now merged into `/usr/bin`, so the former became a symlink to the latter. The SDK now has the same base layout as the generic images. ([flatcar/scripts#2068](https://github.com/flatcar/scripts/pull/2068))
#### Updates:
- Go ([1.22.8](https://go.dev/doc/devel/release#go1.22.8) (includes [1.22.7](https://go.dev/doc/devel/release#go1.22.7)))
- Linux ([6.6.54](https://lwn.net/Articles/992980) (includes [6.6.53](https://lwn.net/Articles/992296), [6.6.52](https://lwn.net/Articles/990767/), [6.6.51](https://lwn.net/Articles/990045), [6.6.50](https://lwn.net/Articles/989411/), [6.6.49](https://lwn.net/Articles/988749)))
- Linux Firmware ([20240909](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240909))
- afterburn ([5.7.0](https://coreos.github.io/afterburn/release-notes/#afterburn-570))
- audit ([4.0.1](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.1) (includes [4.0](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0)))
- azure, gce, sysext-python: gdbm ([1.24](https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00001.html))
- azure, gce, sysext-python: python ([3.11.10](https://docs.python.org/3.11/whatsnew/3.11.html#notable-changes-in-3-11-10))
- bind-tools ([9.16.50](https://bind9.readthedocs.io/en/v9.16.50/notes.html#notes-for-bind-9-16-50) (includes [9.16.49](https://bind9.readthedocs.io/en/v9.16.49/notes.html#notes-for-bind-9-16-49)))
- bpftool (7.5.0 (includes [7.4.0](https://github.com/libbpf/bpftool/releases/tag/v7.4.0), [7.3.0](https://github.com/libbpf/bpftool/releases/tag/v7.3.0), [7.2.0](https://github.com/libbpf/bpftool/releases/tag/v7.2.0), [7.1.0](https://github.com/libbpf/bpftool/releases/tag/v7.1.0), [7.0.0](https://github.com/libbpf/bpftool/releases/tag/v7.0.0)))
- ca-certificates ([3.105](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html))
- containerd ([1.7.22](https://github.com/containerd/containerd/releases/tag/v1.7.22))
- dev: gentoolkit ([0.6.7](https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.7))
- docker ([27.2.1](https://docs.docker.com/engine/release-notes/27/#2721), includes changes from [26.1.0](https://docs.docker.com/engine/release-notes/26.1/#2610)))
- etcd ([3.5.16](https://github.com/etcd-io/etcd/blob/96e17d38e244ef18756a55d33066f2893402794b/CHANGELOG/CHANGELOG-3.5.md#v3516-2024-09-10))
- expat ([2.6.3](https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes))
- grub ([2.12](https://lists.gnu.org/archive/html/grub-devel/2023-12/msg00052.html))
- intel-microcode ([20240531_p20240526](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813))
- iproute2 ([6.9.0](https://lkml.org/lkml/2024/5/13/860))
- libffi ([3.4.6](https://github.com/libffi/libffi/releases/tag/v3.4.6) (includes [3.4.5](https://github.com/libffi/libffi/releases/tag/v3.4.5)))
- libnftnl ([1.2.7](https://www.mail-archive.com/netfilter-announce@lists.netfilter.org/msg00264.html))
- libpcap ([1.10.5](https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.10.5/CHANGES))
- libpcre2 ([10.44](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.44/NEWS))
- libsodium ([1.0.20](https://github.com/jedisct1/libsodium/releases/tag/1.0.20-RELEASE))
- nettle ([3.10](https://git.lysator.liu.se/nettle/nettle/-/blob/b8c841dc3278dec0812365f02370b41ea9d4ddee/NEWS))
- pinentry ([1.3.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=1ea7e76f836fe15fe7c59b954d7aab768bd090e6;hb=24833c9ef2bf93d9f6c0583a9ecfefa6747473bc))
- runc ([1.1.14](https://github.com/opencontainers/runc/releases/tag/v1.1.14))
- whois ([5.5.23](https://github.com/rfc1036/whois/blob/v5.5.23/debian/changelog) (includes [5.5.22](https://github.com/rfc1036/whois/blob/v5.5.22/debian/changelog)))
- SDK: cmake ([3.30.2](https://cmake.org/cmake/help/v3.30/release/3.30.html#id2))
- SDK: perl ([5.40.0](https://perldoc.perl.org/5.40.0/perldelta))
- sysext-python: idna ([3.8](https://github.com/kjd/idna/releases/tag/v3.8))
- sysext-python: jaraco-context ([6.0.1](https://github.com/jaraco/jaraco.context/blob/v6.0.1/NEWS.rst))
- sysext-python: setuptools ([72.2.0](https://github.com/pypa/setuptools/blob/v72.2.0/NEWS.rst))
- sysext-python: setuptools ([73.0.1](https://github.com/pypa/setuptools/blob/v73.0.1/NEWS.rst))
- sysext-python: truststore ([0.9.2](https://github.com/sethmlarson/truststore/blob/v0.9.2/CHANGELOG.md))
#### Beta 4081.1.0
_Changes since **Beta 4054.1.0**_
#### Security fixes:
- Linux ([CVE-2024-46711](https://nvd.nist.gov/vuln/detail/CVE-2024-46711), [CVE-2024-46709](https://nvd.nist.gov/vuln/detail/CVE-2024-46709), [CVE-2024-46680](https://nvd.nist.gov/vuln/detail/CVE-2024-46680), [CVE-2024-46679](https://nvd.nist.gov/vuln/detail/CVE-2024-46679), [CVE-2024-46678](https://nvd.nist.gov/vuln/detail/CVE-2024-46678), [CVE-2024-46677](https://nvd.nist.gov/vuln/detail/CVE-2024-46677), [CVE-2024-46676](https://nvd.nist.gov/vuln/detail/CVE-2024-46676), [CVE-2024-46695](https://nvd.nist.gov/vuln/detail/CVE-2024-46695), [CVE-2024-46694](https://nvd.nist.gov/vuln/detail/CVE-2024-46694), [CVE-2024-46693](https://nvd.nist.gov/vuln/detail/CVE-2024-46693), [CVE-2024-46675](https://nvd.nist.gov/vuln/detail/CVE-2024-46675), [CVE-2024-46692](https://nvd.nist.gov/vuln/detail/CVE-2024-46692), [CVE-2024-46689](https://nvd.nist.gov/vuln/detail/CVE-2024-46689), [CVE-2024-46687](https://nvd.nist.gov/vuln/detail/CVE-2024-46687), [CVE-2024-46686](https://nvd.nist.gov/vuln/detail/CVE-2024-46686), [CVE-2024-46685](https://nvd.nist.gov/vuln/detail/CVE-2024-46685), [CVE-2024-46673](https://nvd.nist.gov/vuln/detail/CVE-2024-46673), [CVE-2024-46674](https://nvd.nist.gov/vuln/detail/CVE-2024-46674), [CVE-2024-46811](https://nvd.nist.gov/vuln/detail/CVE-2024-46811), [CVE-2024-46810](https://nvd.nist.gov/vuln/detail/CVE-2024-46810), [CVE-2024-46809](https://nvd.nist.gov/vuln/detail/CVE-2024-46809), [CVE-2024-46807](https://nvd.nist.gov/vuln/detail/CVE-2024-46807), [CVE-2024-46806](https://nvd.nist.gov/vuln/detail/CVE-2024-46806), [CVE-2024-46805](https://nvd.nist.gov/vuln/detail/CVE-2024-46805), [CVE-2024-46804](https://nvd.nist.gov/vuln/detail/CVE-2024-46804), [CVE-2024-46821](https://nvd.nist.gov/vuln/detail/CVE-2024-46821), [CVE-2024-46819](https://nvd.nist.gov/vuln/detail/CVE-2024-46819), [CVE-2024-46818](https://nvd.nist.gov/vuln/detail/CVE-2024-46818), [CVE-2024-46817](https://nvd.nist.gov/vuln/detail/CVE-2024-46817), [CVE-2024-46815](https://nvd.nist.gov/vuln/detail/CVE-2024-46815), [CVE-2024-46814](https://nvd.nist.gov/vuln/detail/CVE-2024-46814), [CVE-2024-46812](https://nvd.nist.gov/vuln/detail/CVE-2024-46812), [CVE-2024-46802](https://nvd.nist.gov/vuln/detail/CVE-2024-46802), [CVE-2024-46803](https://nvd.nist.gov/vuln/detail/CVE-2024-46803), [CVE-2024-46724](https://nvd.nist.gov/vuln/detail/CVE-2024-46724), [CVE-2024-46732](https://nvd.nist.gov/vuln/detail/CVE-2024-46732), [CVE-2024-46731](https://nvd.nist.gov/vuln/detail/CVE-2024-46731), [CVE-2024-46728](https://nvd.nist.gov/vuln/detail/CVE-2024-46728), [CVE-2024-46726](https://nvd.nist.gov/vuln/detail/CVE-2024-46726), [CVE-2024-46725](https://nvd.nist.gov/vuln/detail/CVE-2024-46725), [CVE-2024-46723](https://nvd.nist.gov/vuln/detail/CVE-2024-46723), [CVE-2024-46722](https://nvd.nist.gov/vuln/detail/CVE-2024-46722), [CVE-2024-46721](https://nvd.nist.gov/vuln/detail/CVE-2024-46721), [CVE-2024-46720](https://nvd.nist.gov/vuln/detail/CVE-2024-46720), [CVE-2024-46719](https://nvd.nist.gov/vuln/detail/CVE-2024-46719), [CVE-2024-46717](https://nvd.nist.gov/vuln/detail/CVE-2024-46717), [CVE-2024-46716](https://nvd.nist.gov/vuln/detail/CVE-2024-46716), [CVE-2024-46714](https://nvd.nist.gov/vuln/detail/CVE-2024-46714), [CVE-2024-46715](https://nvd.nist.gov/vuln/detail/CVE-2024-46715), [CVE-2024-46831](https://nvd.nist.gov/vuln/detail/CVE-2024-46831), [CVE-2024-46840](https://nvd.nist.gov/vuln/detail/CVE-2024-46840), [CVE-2024-46839](https://nvd.nist.gov/vuln/detail/CVE-2024-46839), [CVE-2024-46838](https://nvd.nist.gov/vuln/detail/CVE-2024-46838), [CVE-2024-46836](https://nvd.nist.gov/vuln/detail/CVE-2024-46836), [CVE-2024-46835](https://nvd.nist.gov/vuln/detail/CVE-2024-46835), [CVE-2024-46848](https://nvd.nist.gov/vuln/detail/CVE-2024-46848), [CVE-2024-46847](https://nvd.nist.gov/vuln/detail/CVE-2024-46847), [CVE-2024-46846](https://nvd.nist.gov/vuln/detail/CVE-2024-46846), [CVE-2024-46845](https://nvd.nist.gov/vuln/detail/CVE-2024-46845), [CVE-2024-46844](https://nvd.nist.gov/vuln/detail/CVE-2024-46844), [CVE-2024-46843](https://nvd.nist.gov/vuln/detail/CVE-2024-46843), [CVE-2024-46832](https://nvd.nist.gov/vuln/detail/CVE-2024-46832), [CVE-2024-46830](https://nvd.nist.gov/vuln/detail/CVE-2024-46830), [CVE-2024-46829](https://nvd.nist.gov/vuln/detail/CVE-2024-46829), [CVE-2024-46828](https://nvd.nist.gov/vuln/detail/CVE-2024-46828), [CVE-2024-46827](https://nvd.nist.gov/vuln/detail/CVE-2024-46827), [CVE-2024-46826](https://nvd.nist.gov/vuln/detail/CVE-2024-46826), [CVE-2024-46825](https://nvd.nist.gov/vuln/detail/CVE-2024-46825), [CVE-2024-46822](https://nvd.nist.gov/vuln/detail/CVE-2024-46822), [CVE-2024-46788](https://nvd.nist.gov/vuln/detail/CVE-2024-46788), [CVE-2024-46797](https://nvd.nist.gov/vuln/detail/CVE-2024-46797), [CVE-2024-46796](https://nvd.nist.gov/vuln/detail/CVE-2024-46796), [CVE-2024-46795](https://nvd.nist.gov/vuln/detail/CVE-2024-46795), [CVE-2024-46794](https://nvd.nist.gov/vuln/detail/CVE-2024-46794), [CVE-2024-46791](https://nvd.nist.gov/vuln/detail/CVE-2024-46791), [CVE-2024-46800](https://nvd.nist.gov/vuln/detail/CVE-2024-46800), [CVE-2024-46798](https://nvd.nist.gov/vuln/detail/CVE-2024-46798), [CVE-2024-46760](https://nvd.nist.gov/vuln/detail/CVE-2024-46760), [CVE-2024-46768](https://nvd.nist.gov/vuln/detail/CVE-2024-46768), [CVE-2024-46767](https://nvd.nist.gov/vuln/detail/CVE-2024-46767), [CVE-2024-46765](https://nvd.nist.gov/vuln/detail/CVE-2024-46765), [CVE-2024-46763](https://nvd.nist.gov/vuln/detail/CVE-2024-46763), [CVE-2024-46787](https://nvd.nist.gov/vuln/detail/CVE-2024-46787), [CVE-2024-46786](https://nvd.nist.gov/vuln/detail/CVE-2024-46786), [CVE-2024-46785](https://nvd.nist.gov/vuln/detail/CVE-2024-46785), [CVE-2024-46784](https://nvd.nist.gov/vuln/detail/CVE-2024-46784), [CVE-2024-46783](https://nvd.nist.gov/vuln/detail/CVE-2024-46783), [CVE-2024-46782](https://nvd.nist.gov/vuln/detail/CVE-2024-46782), [CVE-2024-46781](https://nvd.nist.gov/vuln/detail/CVE-2024-46781), [CVE-2024-46780](https://nvd.nist.gov/vuln/detail/CVE-2024-46780), [CVE-2024-46762](https://nvd.nist.gov/vuln/detail/CVE-2024-46762), [CVE-2024-46777](https://nvd.nist.gov/vuln/detail/CVE-2024-46777), [CVE-2024-46776](https://nvd.nist.gov/vuln/detail/CVE-2024-46776), [CVE-2024-46773](https://nvd.nist.gov/vuln/detail/CVE-2024-46773), [CVE-2024-46771](https://nvd.nist.gov/vuln/detail/CVE-2024-46771), [CVE-2024-46770](https://nvd.nist.gov/vuln/detail/CVE-2024-46770), [CVE-2024-46761](https://nvd.nist.gov/vuln/detail/CVE-2024-46761), [CVE-2024-46743](https://nvd.nist.gov/vuln/detail/CVE-2024-46743), [CVE-2024-46742](https://nvd.nist.gov/vuln/detail/CVE-2024-46742), [CVE-2024-46741](https://nvd.nist.gov/vuln/detail/CVE-2024-46741), [CVE-2024-46740](https://nvd.nist.gov/vuln/detail/CVE-2024-46740), [CVE-2024-46739](https://nvd.nist.gov/vuln/detail/CVE-2024-46739), [CVE-2024-46738](https://nvd.nist.gov/vuln/detail/CVE-2024-46738), [CVE-2024-46737](https://nvd.nist.gov/vuln/detail/CVE-2024-46737), [CVE-2024-46759](https://nvd.nist.gov/vuln/detail/CVE-2024-46759), [CVE-2024-46758](https://nvd.nist.gov/vuln/detail/CVE-2024-46758), [CVE-2024-46757](https://nvd.nist.gov/vuln/detail/CVE-2024-46757), [CVE-2024-46756](https://nvd.nist.gov/vuln/detail/CVE-2024-46756), [CVE-2024-46755](https://nvd.nist.gov/vuln/detail/CVE-2024-46755), [CVE-2024-46736](https://nvd.nist.gov/vuln/detail/CVE-2024-46736), [CVE-2024-46752](https://nvd.nist.gov/vuln/detail/CVE-2024-46752), [CVE-2024-46750](https://nvd.nist.gov/vuln/detail/CVE-2024-46750), [CVE-2024-46749](https://nvd.nist.gov/vuln/detail/CVE-2024-46749), [CVE-2024-46747](https://nvd.nist.gov/vuln/detail/CVE-2024-46747), [CVE-2024-46746](https://nvd.nist.gov/vuln/detail/CVE-2024-46746), [CVE-2024-46745](https://nvd.nist.gov/vuln/detail/CVE-2024-46745), [CVE-2024-46744](https://nvd.nist.gov/vuln/detail/CVE-2024-46744), [CVE-2024-46734](https://nvd.nist.gov/vuln/detail/CVE-2024-46734), [CVE-2024-46735](https://nvd.nist.gov/vuln/detail/CVE-2024-46735), [CVE-2024-46713](https://nvd.nist.gov/vuln/detail/CVE-2024-46713), [CVE-2024-46858](https://nvd.nist.gov/vuln/detail/CVE-2024-46858), [CVE-2024-46857](https://nvd.nist.gov/vuln/detail/CVE-2024-46857), [CVE-2024-46855](https://nvd.nist.gov/vuln/detail/CVE-2024-46855), [CVE-2024-46854](https://nvd.nist.gov/vuln/detail/CVE-2024-46854), [CVE-2024-46853](https://nvd.nist.gov/vuln/detail/CVE-2024-46853), [CVE-2024-46852](https://nvd.nist.gov/vuln/detail/CVE-2024-46852), [CVE-2024-46865](https://nvd.nist.gov/vuln/detail/CVE-2024-46865), [CVE-2024-46864](https://nvd.nist.gov/vuln/detail/CVE-2024-46864), [CVE-2024-46861](https://nvd.nist.gov/vuln/detail/CVE-2024-46861), [CVE-2024-46860](https://nvd.nist.gov/vuln/detail/CVE-2024-46860), [CVE-2024-46859](https://nvd.nist.gov/vuln/detail/CVE-2024-46859), [CVE-2024-46849](https://nvd.nist.gov/vuln/detail/CVE-2024-46849))
- curl ([CVE-2024-7264](https://nvd.nist.gov/vuln/detail/CVE-2024-7264))
- expat ([CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490))
- linux-firmware ([CVE-2023-31315](https://nvd.nist.gov/vuln/detail/CVE-2023-31315))
- SDK: re2c ([CVE-2022-23901](https://nvd.nist.gov/vuln/detail/CVE-2022-23901))
#### Bug fixes:
- CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: ([flatcar/scripts#2016](https://github.com/flatcar/scripts/pull/2016))
- Fixed the initrd option in the QEMU launcher script. It was -R, but this was already taken by the read-only pflash option, so use -r instead. ([scripts#2239](https://github.com/flatcar/scripts/pull/2239))
- Equinix Metal: fixed race condition on 'mount' Ignition stage ([scripts#2308](https://github.com/flatcar/scripts/pull/2308))
- Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. ([Flatcar#1514](https://github.com/flatcar/flatcar/pull/1514))
#### Changes:
- Azure, HyperV: Added daemons `kvp`, `vss`, and `fcopy` for better HyperV hypervisor integration with Flatcar guests ([scripts#2309](https://github.com/flatcar/scripts/pull/2309)).
- Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers ([flatcar/scripts#2355](https://github.com/flatcar/scripts/pull/2355))
- Replace nmap netcat with openbsd variant. The license didn't get an exception from CNCF. Something about the definition of "derivative works" being too broad.
- The `docker build` command will now use buildx as its backend as the old one became deprecated and a loud "DEPRECATED" information is printed every time it's used.
#### Updates:
- Go ([1.21.13](https://go.dev/doc/devel/release#go1.21.13))
- Linux ([6.6.54](https://lwn.net/Articles/992980) (includes [6.6.53](https://lwn.net/Articles/992296), [6.6.52](https://lwn.net/Articles/990767/), [6.6.51](https://lwn.net/Articles/990045), [6.6.50](https://lwn.net/Articles/989411/), [6.6.49](https://lwn.net/Articles/988749)))
- Linux Firmware ([20240811](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240811))
- Open-iSCSI ([2.1.10](https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.10))
- azure: azure-nvme-utils ([0.2.0](https://github.com/Azure/azure-nvme-utils/releases/tag/v0.2.0))
- ca-certificates ([3.105](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html))
- conntrack-tools ([1.4.8](https://lwn.net/Articles/945927/))
- containerd ([1.7.21](https://github.com/containerd/containerd/releases/tag/v1.7.21))
- curl ([8.9.1](https://curl.se/ch/8.9.1.html))
- dev: minicom ([2.9](https://salsa.debian.org/minicom-team/minicom/-/releases/2.9))
- elfutils ([0.191](https://inbox.sourceware.org/elfutils-devel/CAJDtP-SJhJ8cjTpkNpi+F0nzVJ2pZsEai8Ewpp4yJmsO_H5-NA@mail.gmail.com/T/#u))
- expat ([2.6.3](https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes))
- gce, sysext-python: setuptools ([71.1.0](https://github.com/pypa/setuptools/blob/v71.1.0/NEWS.rst) (includes [71.0.0](https://github.com/pypa/setuptools/blob/v71.0.0/NEWS.rst)))
- gce, sysext-python: setuptools ([72.1.0](https://github.com/pypa/setuptools/blob/v72.1.0/NEWS.rst))
- gflags ([2.2.2](https://github.com/gflags/gflags/releases/tag/v2.2.2))
- glog ([0.6.0](https://github.com/google/glog/releases/tag/v0.6.0))
- libmicrohttpd ([1.0.1](https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00005.html) (inlcudes [1.0.0](https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00000.html)))
- lz4 ([1.10.0](https://github.com/lz4/lz4/releases/tag/v1.10.0))
- nghttp2 ([1.62.1](https://github.com/nghttp2/nghttp2/releases/tag/v1.62.1))
- npth ([1.7](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=c1b631b4294eabfef29baefd60e1b0dfecce710d;hb=75c68399ef3bbb5d024f2a60474a7214fa479016))
- pahole ([1.27](https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.27))
- SDK: Rust ([1.80.1](https://github.com/rust-lang/rust/releases/tag/1.80.1))
- SDK: meson ([1.5.1](https://mesonbuild.com/Release-notes-for-1-5-0.html))
- sysext-python: more-itertools ([10.4.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.4.0))
- sysext-python: pip ([24.1.2](https://github.com/pypa/pip/blob/24.1.2/NEWS.rst))
- sysext-python: pip ([24.2](https://github.com/pypa/pip/blob/24.2/NEWS.rst))
- sysext-python: wheel ([0.44.0](https://github.com/pypa/wheel/releases/tag/0.44.0))
- sysext-zfs: zfs ([2.2.5](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.5) (includes [2.2.4](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.4)))
- tcpdump ([4.99.4](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.4/CHANGES))
_Changes since **Alpha 4081.0.0**_
#### Security fixes:
- Linux ([CVE-2024-46711](https://nvd.nist.gov/vuln/detail/CVE-2024-46711), [CVE-2024-46709](https://nvd.nist.gov/vuln/detail/CVE-2024-46709), [CVE-2024-46680](https://nvd.nist.gov/vuln/detail/CVE-2024-46680), [CVE-2024-46679](https://nvd.nist.gov/vuln/detail/CVE-2024-46679), [CVE-2024-46678](https://nvd.nist.gov/vuln/detail/CVE-2024-46678), [CVE-2024-46677](https://nvd.nist.gov/vuln/detail/CVE-2024-46677), [CVE-2024-46676](https://nvd.nist.gov/vuln/detail/CVE-2024-46676), [CVE-2024-46695](https://nvd.nist.gov/vuln/detail/CVE-2024-46695), [CVE-2024-46694](https://nvd.nist.gov/vuln/detail/CVE-2024-46694), [CVE-2024-46693](https://nvd.nist.gov/vuln/detail/CVE-2024-46693), [CVE-2024-46675](https://nvd.nist.gov/vuln/detail/CVE-2024-46675), [CVE-2024-46692](https://nvd.nist.gov/vuln/detail/CVE-2024-46692), [CVE-2024-46689](https://nvd.nist.gov/vuln/detail/CVE-2024-46689), [CVE-2024-46687](https://nvd.nist.gov/vuln/detail/CVE-2024-46687), [CVE-2024-46686](https://nvd.nist.gov/vuln/detail/CVE-2024-46686), [CVE-2024-46685](https://nvd.nist.gov/vuln/detail/CVE-2024-46685), [CVE-2024-46673](https://nvd.nist.gov/vuln/detail/CVE-2024-46673), [CVE-2024-46674](https://nvd.nist.gov/vuln/detail/CVE-2024-46674), [CVE-2024-46811](https://nvd.nist.gov/vuln/detail/CVE-2024-46811), [CVE-2024-46810](https://nvd.nist.gov/vuln/detail/CVE-2024-46810), [CVE-2024-46809](https://nvd.nist.gov/vuln/detail/CVE-2024-46809), [CVE-2024-46807](https://nvd.nist.gov/vuln/detail/CVE-2024-46807), [CVE-2024-46806](https://nvd.nist.gov/vuln/detail/CVE-2024-46806), [CVE-2024-46805](https://nvd.nist.gov/vuln/detail/CVE-2024-46805), [CVE-2024-46804](https://nvd.nist.gov/vuln/detail/CVE-2024-46804), [CVE-2024-46821](https://nvd.nist.gov/vuln/detail/CVE-2024-46821), [CVE-2024-46819](https://nvd.nist.gov/vuln/detail/CVE-2024-46819), [CVE-2024-46818](https://nvd.nist.gov/vuln/detail/CVE-2024-46818), [CVE-2024-46817](https://nvd.nist.gov/vuln/detail/CVE-2024-46817), [CVE-2024-46815](https://nvd.nist.gov/vuln/detail/CVE-2024-46815), [CVE-2024-46814](https://nvd.nist.gov/vuln/detail/CVE-2024-46814), [CVE-2024-46812](https://nvd.nist.gov/vuln/detail/CVE-2024-46812), [CVE-2024-46802](https://nvd.nist.gov/vuln/detail/CVE-2024-46802), [CVE-2024-46803](https://nvd.nist.gov/vuln/detail/CVE-2024-46803), [CVE-2024-46724](https://nvd.nist.gov/vuln/detail/CVE-2024-46724), [CVE-2024-46732](https://nvd.nist.gov/vuln/detail/CVE-2024-46732), [CVE-2024-46731](https://nvd.nist.gov/vuln/detail/CVE-2024-46731), [CVE-2024-46728](https://nvd.nist.gov/vuln/detail/CVE-2024-46728), [CVE-2024-46726](https://nvd.nist.gov/vuln/detail/CVE-2024-46726), [CVE-2024-46725](https://nvd.nist.gov/vuln/detail/CVE-2024-46725), [CVE-2024-46723](https://nvd.nist.gov/vuln/detail/CVE-2024-46723), [CVE-2024-46722](https://nvd.nist.gov/vuln/detail/CVE-2024-46722), [CVE-2024-46721](https://nvd.nist.gov/vuln/detail/CVE-2024-46721), [CVE-2024-46720](https://nvd.nist.gov/vuln/detail/CVE-2024-46720), [CVE-2024-46719](https://nvd.nist.gov/vuln/detail/CVE-2024-46719), [CVE-2024-46717](https://nvd.nist.gov/vuln/detail/CVE-2024-46717), [CVE-2024-46716](https://nvd.nist.gov/vuln/detail/CVE-2024-46716), [CVE-2024-46714](https://nvd.nist.gov/vuln/detail/CVE-2024-46714), [CVE-2024-46715](https://nvd.nist.gov/vuln/detail/CVE-2024-46715), [CVE-2024-46831](https://nvd.nist.gov/vuln/detail/CVE-2024-46831), [CVE-2024-46840](https://nvd.nist.gov/vuln/detail/CVE-2024-46840), [CVE-2024-46839](https://nvd.nist.gov/vuln/detail/CVE-2024-46839), [CVE-2024-46838](https://nvd.nist.gov/vuln/detail/CVE-2024-46838), [CVE-2024-46836](https://nvd.nist.gov/vuln/detail/CVE-2024-46836), [CVE-2024-46835](https://nvd.nist.gov/vuln/detail/CVE-2024-46835), [CVE-2024-46848](https://nvd.nist.gov/vuln/detail/CVE-2024-46848), [CVE-2024-46847](https://nvd.nist.gov/vuln/detail/CVE-2024-46847), [CVE-2024-46846](https://nvd.nist.gov/vuln/detail/CVE-2024-46846), [CVE-2024-46845](https://nvd.nist.gov/vuln/detail/CVE-2024-46845), [CVE-2024-46844](https://nvd.nist.gov/vuln/detail/CVE-2024-46844), [CVE-2024-46843](https://nvd.nist.gov/vuln/detail/CVE-2024-46843), [CVE-2024-46832](https://nvd.nist.gov/vuln/detail/CVE-2024-46832), [CVE-2024-46830](https://nvd.nist.gov/vuln/detail/CVE-2024-46830), [CVE-2024-46829](https://nvd.nist.gov/vuln/detail/CVE-2024-46829), [CVE-2024-46828](https://nvd.nist.gov/vuln/detail/CVE-2024-46828), [CVE-2024-46827](https://nvd.nist.gov/vuln/detail/CVE-2024-46827), [CVE-2024-46826](https://nvd.nist.gov/vuln/detail/CVE-2024-46826), [CVE-2024-46825](https://nvd.nist.gov/vuln/detail/CVE-2024-46825), [CVE-2024-46822](https://nvd.nist.gov/vuln/detail/CVE-2024-46822), [CVE-2024-46788](https://nvd.nist.gov/vuln/detail/CVE-2024-46788), [CVE-2024-46797](https://nvd.nist.gov/vuln/detail/CVE-2024-46797), [CVE-2024-46796](https://nvd.nist.gov/vuln/detail/CVE-2024-46796), [CVE-2024-46795](https://nvd.nist.gov/vuln/detail/CVE-2024-46795), [CVE-2024-46794](https://nvd.nist.gov/vuln/detail/CVE-2024-46794), [CVE-2024-46791](https://nvd.nist.gov/vuln/detail/CVE-2024-46791), [CVE-2024-46800](https://nvd.nist.gov/vuln/detail/CVE-2024-46800), [CVE-2024-46798](https://nvd.nist.gov/vuln/detail/CVE-2024-46798), [CVE-2024-46760](https://nvd.nist.gov/vuln/detail/CVE-2024-46760), [CVE-2024-46768](https://nvd.nist.gov/vuln/detail/CVE-2024-46768), [CVE-2024-46767](https://nvd.nist.gov/vuln/detail/CVE-2024-46767), [CVE-2024-46765](https://nvd.nist.gov/vuln/detail/CVE-2024-46765), [CVE-2024-46763](https://nvd.nist.gov/vuln/detail/CVE-2024-46763), [CVE-2024-46787](https://nvd.nist.gov/vuln/detail/CVE-2024-46787), [CVE-2024-46786](https://nvd.nist.gov/vuln/detail/CVE-2024-46786), [CVE-2024-46785](https://nvd.nist.gov/vuln/detail/CVE-2024-46785), [CVE-2024-46784](https://nvd.nist.gov/vuln/detail/CVE-2024-46784), [CVE-2024-46783](https://nvd.nist.gov/vuln/detail/CVE-2024-46783), [CVE-2024-46782](https://nvd.nist.gov/vuln/detail/CVE-2024-46782), [CVE-2024-46781](https://nvd.nist.gov/vuln/detail/CVE-2024-46781), [CVE-2024-46780](https://nvd.nist.gov/vuln/detail/CVE-2024-46780), [CVE-2024-46762](https://nvd.nist.gov/vuln/detail/CVE-2024-46762), [CVE-2024-46777](https://nvd.nist.gov/vuln/detail/CVE-2024-46777), [CVE-2024-46776](https://nvd.nist.gov/vuln/detail/CVE-2024-46776), [CVE-2024-46773](https://nvd.nist.gov/vuln/detail/CVE-2024-46773), [CVE-2024-46771](https://nvd.nist.gov/vuln/detail/CVE-2024-46771), [CVE-2024-46770](https://nvd.nist.gov/vuln/detail/CVE-2024-46770), [CVE-2024-46761](https://nvd.nist.gov/vuln/detail/CVE-2024-46761), [CVE-2024-46743](https://nvd.nist.gov/vuln/detail/CVE-2024-46743), [CVE-2024-46742](https://nvd.nist.gov/vuln/detail/CVE-2024-46742), [CVE-2024-46741](https://nvd.nist.gov/vuln/detail/CVE-2024-46741), [CVE-2024-46740](https://nvd.nist.gov/vuln/detail/CVE-2024-46740), [CVE-2024-46739](https://nvd.nist.gov/vuln/detail/CVE-2024-46739), [CVE-2024-46738](https://nvd.nist.gov/vuln/detail/CVE-2024-46738), [CVE-2024-46737](https://nvd.nist.gov/vuln/detail/CVE-2024-46737), [CVE-2024-46759](https://nvd.nist.gov/vuln/detail/CVE-2024-46759), [CVE-2024-46758](https://nvd.nist.gov/vuln/detail/CVE-2024-46758), [CVE-2024-46757](https://nvd.nist.gov/vuln/detail/CVE-2024-46757), [CVE-2024-46756](https://nvd.nist.gov/vuln/detail/CVE-2024-46756), [CVE-2024-46755](https://nvd.nist.gov/vuln/detail/CVE-2024-46755), [CVE-2024-46736](https://nvd.nist.gov/vuln/detail/CVE-2024-46736), [CVE-2024-46752](https://nvd.nist.gov/vuln/detail/CVE-2024-46752), [CVE-2024-46750](https://nvd.nist.gov/vuln/detail/CVE-2024-46750), [CVE-2024-46749](https://nvd.nist.gov/vuln/detail/CVE-2024-46749), [CVE-2024-46747](https://nvd.nist.gov/vuln/detail/CVE-2024-46747), [CVE-2024-46746](https://nvd.nist.gov/vuln/detail/CVE-2024-46746), [CVE-2024-46745](https://nvd.nist.gov/vuln/detail/CVE-2024-46745), [CVE-2024-46744](https://nvd.nist.gov/vuln/detail/CVE-2024-46744), [CVE-2024-46734](https://nvd.nist.gov/vuln/detail/CVE-2024-46734), [CVE-2024-46735](https://nvd.nist.gov/vuln/detail/CVE-2024-46735), [CVE-2024-46713](https://nvd.nist.gov/vuln/detail/CVE-2024-46713), [CVE-2024-46858](https://nvd.nist.gov/vuln/detail/CVE-2024-46858), [CVE-2024-46857](https://nvd.nist.gov/vuln/detail/CVE-2024-46857), [CVE-2024-46855](https://nvd.nist.gov/vuln/detail/CVE-2024-46855), [CVE-2024-46854](https://nvd.nist.gov/vuln/detail/CVE-2024-46854), [CVE-2024-46853](https://nvd.nist.gov/vuln/detail/CVE-2024-46853), [CVE-2024-46852](https://nvd.nist.gov/vuln/detail/CVE-2024-46852), [CVE-2024-46865](https://nvd.nist.gov/vuln/detail/CVE-2024-46865), [CVE-2024-46864](https://nvd.nist.gov/vuln/detail/CVE-2024-46864), [CVE-2024-46861](https://nvd.nist.gov/vuln/detail/CVE-2024-46861), [CVE-2024-46860](https://nvd.nist.gov/vuln/detail/CVE-2024-46860), [CVE-2024-46859](https://nvd.nist.gov/vuln/detail/CVE-2024-46859), [CVE-2024-46849](https://nvd.nist.gov/vuln/detail/CVE-2024-46849))
- expat ([CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490))
#### Bug fixes:
- CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: ([flatcar/scripts#2016](https://github.com/flatcar/scripts/pull/2016))
- Equinix Metal: fixed race condition on 'mount' Ignition stage ([scripts#2308](https://github.com/flatcar/scripts/pull/2308))
#### Changes:
- Azure, HyperV: Added daemons `kvp`, `vss`, and `fcopy` for better HyperV hypervisor integration with Flatcar guests ([scripts#2309](https://github.com/flatcar/scripts/pull/2309)).
- Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers ([flatcar/scripts#2355](https://github.com/flatcar/scripts/pull/2355))
#### Updates:
- Linux ([6.6.54](https://lwn.net/Articles/992980) (includes [6.6.53](https://lwn.net/Articles/992296), [6.6.52](https://lwn.net/Articles/990767/), [6.6.51](https://lwn.net/Articles/990045), [6.6.50](https://lwn.net/Articles/989411/), [6.6.49](https://lwn.net/Articles/988749)))
- ca-certificates ([3.105](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html))
- expat ([2.6.3](https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes))
#### Stable 3975.2.2
_Changes since **Stable 3975.2.1**_
#### Security fixes:
- Linux ([CVE-2024-46711](https://nvd.nist.gov/vuln/detail/CVE-2024-46711), [CVE-2024-46709](https://nvd.nist.gov/vuln/detail/CVE-2024-46709), [CVE-2024-46680](https://nvd.nist.gov/vuln/detail/CVE-2024-46680), [CVE-2024-46679](https://nvd.nist.gov/vuln/detail/CVE-2024-46679), [CVE-2024-46678](https://nvd.nist.gov/vuln/detail/CVE-2024-46678), [CVE-2024-46677](https://nvd.nist.gov/vuln/detail/CVE-2024-46677), [CVE-2024-46676](https://nvd.nist.gov/vuln/detail/CVE-2024-46676), [CVE-2024-46695](https://nvd.nist.gov/vuln/detail/CVE-2024-46695), [CVE-2024-46694](https://nvd.nist.gov/vuln/detail/CVE-2024-46694), [CVE-2024-46693](https://nvd.nist.gov/vuln/detail/CVE-2024-46693), [CVE-2024-46675](https://nvd.nist.gov/vuln/detail/CVE-2024-46675), [CVE-2024-46692](https://nvd.nist.gov/vuln/detail/CVE-2024-46692), [CVE-2024-46689](https://nvd.nist.gov/vuln/detail/CVE-2024-46689), [CVE-2024-46687](https://nvd.nist.gov/vuln/detail/CVE-2024-46687), [CVE-2024-46686](https://nvd.nist.gov/vuln/detail/CVE-2024-46686), [CVE-2024-46685](https://nvd.nist.gov/vuln/detail/CVE-2024-46685), [CVE-2024-46673](https://nvd.nist.gov/vuln/detail/CVE-2024-46673), [CVE-2024-46674](https://nvd.nist.gov/vuln/detail/CVE-2024-46674), [CVE-2024-46811](https://nvd.nist.gov/vuln/detail/CVE-2024-46811), [CVE-2024-46810](https://nvd.nist.gov/vuln/detail/CVE-2024-46810), [CVE-2024-46809](https://nvd.nist.gov/vuln/detail/CVE-2024-46809), [CVE-2024-46807](https://nvd.nist.gov/vuln/detail/CVE-2024-46807), [CVE-2024-46806](https://nvd.nist.gov/vuln/detail/CVE-2024-46806), [CVE-2024-46805](https://nvd.nist.gov/vuln/detail/CVE-2024-46805), [CVE-2024-46804](https://nvd.nist.gov/vuln/detail/CVE-2024-46804), [CVE-2024-46821](https://nvd.nist.gov/vuln/detail/CVE-2024-46821), [CVE-2024-46819](https://nvd.nist.gov/vuln/detail/CVE-2024-46819), [CVE-2024-46818](https://nvd.nist.gov/vuln/detail/CVE-2024-46818), [CVE-2024-46817](https://nvd.nist.gov/vuln/detail/CVE-2024-46817), [CVE-2024-46815](https://nvd.nist.gov/vuln/detail/CVE-2024-46815), [CVE-2024-46814](https://nvd.nist.gov/vuln/detail/CVE-2024-46814), [CVE-2024-46812](https://nvd.nist.gov/vuln/detail/CVE-2024-46812), [CVE-2024-46802](https://nvd.nist.gov/vuln/detail/CVE-2024-46802), [CVE-2024-46803](https://nvd.nist.gov/vuln/detail/CVE-2024-46803), [CVE-2024-46724](https://nvd.nist.gov/vuln/detail/CVE-2024-46724), [CVE-2024-46732](https://nvd.nist.gov/vuln/detail/CVE-2024-46732), [CVE-2024-46731](https://nvd.nist.gov/vuln/detail/CVE-2024-46731), [CVE-2024-46728](https://nvd.nist.gov/vuln/detail/CVE-2024-46728), [CVE-2024-46726](https://nvd.nist.gov/vuln/detail/CVE-2024-46726), [CVE-2024-46725](https://nvd.nist.gov/vuln/detail/CVE-2024-46725), [CVE-2024-46723](https://nvd.nist.gov/vuln/detail/CVE-2024-46723), [CVE-2024-46722](https://nvd.nist.gov/vuln/detail/CVE-2024-46722), [CVE-2024-46721](https://nvd.nist.gov/vuln/detail/CVE-2024-46721), [CVE-2024-46720](https://nvd.nist.gov/vuln/detail/CVE-2024-46720), [CVE-2024-46719](https://nvd.nist.gov/vuln/detail/CVE-2024-46719), [CVE-2024-46717](https://nvd.nist.gov/vuln/detail/CVE-2024-46717), [CVE-2024-46716](https://nvd.nist.gov/vuln/detail/CVE-2024-46716), [CVE-2024-46714](https://nvd.nist.gov/vuln/detail/CVE-2024-46714), [CVE-2024-46715](https://nvd.nist.gov/vuln/detail/CVE-2024-46715), [CVE-2024-46831](https://nvd.nist.gov/vuln/detail/CVE-2024-46831), [CVE-2024-46840](https://nvd.nist.gov/vuln/detail/CVE-2024-46840), [CVE-2024-46839](https://nvd.nist.gov/vuln/detail/CVE-2024-46839), [CVE-2024-46838](https://nvd.nist.gov/vuln/detail/CVE-2024-46838), [CVE-2024-46836](https://nvd.nist.gov/vuln/detail/CVE-2024-46836), [CVE-2024-46835](https://nvd.nist.gov/vuln/detail/CVE-2024-46835), [CVE-2024-46848](https://nvd.nist.gov/vuln/detail/CVE-2024-46848), [CVE-2024-46847](https://nvd.nist.gov/vuln/detail/CVE-2024-46847), [CVE-2024-46846](https://nvd.nist.gov/vuln/detail/CVE-2024-46846), [CVE-2024-46845](https://nvd.nist.gov/vuln/detail/CVE-2024-46845), [CVE-2024-46844](https://nvd.nist.gov/vuln/detail/CVE-2024-46844), [CVE-2024-46843](https://nvd.nist.gov/vuln/detail/CVE-2024-46843), [CVE-2024-46832](https://nvd.nist.gov/vuln/detail/CVE-2024-46832), [CVE-2024-46830](https://nvd.nist.gov/vuln/detail/CVE-2024-46830), [CVE-2024-46829](https://nvd.nist.gov/vuln/detail/CVE-2024-46829), [CVE-2024-46828](https://nvd.nist.gov/vuln/detail/CVE-2024-46828), [CVE-2024-46827](https://nvd.nist.gov/vuln/detail/CVE-2024-46827), [CVE-2024-46826](https://nvd.nist.gov/vuln/detail/CVE-2024-46826), [CVE-2024-46825](https://nvd.nist.gov/vuln/detail/CVE-2024-46825), [CVE-2024-46822](https://nvd.nist.gov/vuln/detail/CVE-2024-46822), [CVE-2024-46788](https://nvd.nist.gov/vuln/detail/CVE-2024-46788), [CVE-2024-46797](https://nvd.nist.gov/vuln/detail/CVE-2024-46797), [CVE-2024-46796](https://nvd.nist.gov/vuln/detail/CVE-2024-46796), [CVE-2024-46795](https://nvd.nist.gov/vuln/detail/CVE-2024-46795), [CVE-2024-46794](https://nvd.nist.gov/vuln/detail/CVE-2024-46794), [CVE-2024-46791](https://nvd.nist.gov/vuln/detail/CVE-2024-46791), [CVE-2024-46800](https://nvd.nist.gov/vuln/detail/CVE-2024-46800), [CVE-2024-46798](https://nvd.nist.gov/vuln/detail/CVE-2024-46798), [CVE-2024-46760](https://nvd.nist.gov/vuln/detail/CVE-2024-46760), [CVE-2024-46768](https://nvd.nist.gov/vuln/detail/CVE-2024-46768), [CVE-2024-46767](https://nvd.nist.gov/vuln/detail/CVE-2024-46767), [CVE-2024-46765](https://nvd.nist.gov/vuln/detail/CVE-2024-46765), [CVE-2024-46763](https://nvd.nist.gov/vuln/detail/CVE-2024-46763), [CVE-2024-46787](https://nvd.nist.gov/vuln/detail/CVE-2024-46787), [CVE-2024-46786](https://nvd.nist.gov/vuln/detail/CVE-2024-46786), [CVE-2024-46785](https://nvd.nist.gov/vuln/detail/CVE-2024-46785), [CVE-2024-46784](https://nvd.nist.gov/vuln/detail/CVE-2024-46784), [CVE-2024-46783](https://nvd.nist.gov/vuln/detail/CVE-2024-46783), [CVE-2024-46782](https://nvd.nist.gov/vuln/detail/CVE-2024-46782), [CVE-2024-46781](https://nvd.nist.gov/vuln/detail/CVE-2024-46781), [CVE-2024-46780](https://nvd.nist.gov/vuln/detail/CVE-2024-46780), [CVE-2024-46762](https://nvd.nist.gov/vuln/detail/CVE-2024-46762), [CVE-2024-46777](https://nvd.nist.gov/vuln/detail/CVE-2024-46777), [CVE-2024-46776](https://nvd.nist.gov/vuln/detail/CVE-2024-46776), [CVE-2024-46773](https://nvd.nist.gov/vuln/detail/CVE-2024-46773), [CVE-2024-46771](https://nvd.nist.gov/vuln/detail/CVE-2024-46771), [CVE-2024-46770](https://nvd.nist.gov/vuln/detail/CVE-2024-46770), [CVE-2024-46761](https://nvd.nist.gov/vuln/detail/CVE-2024-46761), [CVE-2024-46743](https://nvd.nist.gov/vuln/detail/CVE-2024-46743), [CVE-2024-46742](https://nvd.nist.gov/vuln/detail/CVE-2024-46742), [CVE-2024-46741](https://nvd.nist.gov/vuln/detail/CVE-2024-46741), [CVE-2024-46740](https://nvd.nist.gov/vuln/detail/CVE-2024-46740), [CVE-2024-46739](https://nvd.nist.gov/vuln/detail/CVE-2024-46739), [CVE-2024-46738](https://nvd.nist.gov/vuln/detail/CVE-2024-46738), [CVE-2024-46737](https://nvd.nist.gov/vuln/detail/CVE-2024-46737), [CVE-2024-46759](https://nvd.nist.gov/vuln/detail/CVE-2024-46759), [CVE-2024-46758](https://nvd.nist.gov/vuln/detail/CVE-2024-46758), [CVE-2024-46757](https://nvd.nist.gov/vuln/detail/CVE-2024-46757), [CVE-2024-46756](https://nvd.nist.gov/vuln/detail/CVE-2024-46756), [CVE-2024-46755](https://nvd.nist.gov/vuln/detail/CVE-2024-46755), [CVE-2024-46736](https://nvd.nist.gov/vuln/detail/CVE-2024-46736), [CVE-2024-46752](https://nvd.nist.gov/vuln/detail/CVE-2024-46752), [CVE-2024-46750](https://nvd.nist.gov/vuln/detail/CVE-2024-46750), [CVE-2024-46749](https://nvd.nist.gov/vuln/detail/CVE-2024-46749), [CVE-2024-46747](https://nvd.nist.gov/vuln/detail/CVE-2024-46747), [CVE-2024-46746](https://nvd.nist.gov/vuln/detail/CVE-2024-46746), [CVE-2024-46745](https://nvd.nist.gov/vuln/detail/CVE-2024-46745), [CVE-2024-46744](https://nvd.nist.gov/vuln/detail/CVE-2024-46744), [CVE-2024-46734](https://nvd.nist.gov/vuln/detail/CVE-2024-46734), [CVE-2024-46735](https://nvd.nist.gov/vuln/detail/CVE-2024-46735), [CVE-2024-46713](https://nvd.nist.gov/vuln/detail/CVE-2024-46713), [CVE-2024-46858](https://nvd.nist.gov/vuln/detail/CVE-2024-46858), [CVE-2024-46857](https://nvd.nist.gov/vuln/detail/CVE-2024-46857), [CVE-2024-46855](https://nvd.nist.gov/vuln/detail/CVE-2024-46855), [CVE-2024-46854](https://nvd.nist.gov/vuln/detail/CVE-2024-46854), [CVE-2024-46853](https://nvd.nist.gov/vuln/detail/CVE-2024-46853), [CVE-2024-46852](https://nvd.nist.gov/vuln/detail/CVE-2024-46852), [CVE-2024-46865](https://nvd.nist.gov/vuln/detail/CVE-2024-46865), [CVE-2024-46864](https://nvd.nist.gov/vuln/detail/CVE-2024-46864), [CVE-2024-46861](https://nvd.nist.gov/vuln/detail/CVE-2024-46861), [CVE-2024-46860](https://nvd.nist.gov/vuln/detail/CVE-2024-46860), [CVE-2024-46859](https://nvd.nist.gov/vuln/detail/CVE-2024-46859), [CVE-2024-46849](https://nvd.nist.gov/vuln/detail/CVE-2024-46849))
- expat ([CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490))
#### Bug fixes:
- Equinix Metal: fixed race condition on 'mount' Ignition stage ([scripts#2308](https://github.com/flatcar/scripts/pull/2308))
- Fixed slow boots PXE and ISO boots caused by the decrypt-root.service. ([Flatcar#1514](https://github.com/flatcar/flatcar/pull/1514))
#### Changes:
- Azure, HyperV: Added daemons `kvp`, `vss`, and `fcopy` for better HyperV hypervisor integration with Flatcar guests ([scripts#2309](https://github.com/flatcar/scripts/pull/2309)).
- Enable mpi3mr kernel module for Broadcom Storage/RAID-Controllers ([flatcar/scripts#2355](https://github.com/flatcar/scripts/pull/2355))
#### Updates:
- Linux ([6.6.54](https://lwn.net/Articles/992980) (includes [6.6.53](https://lwn.net/Articles/992296), [6.6.52](https://lwn.net/Articles/990767/), [6.6.51](https://lwn.net/Articles/990045), [6.6.50](https://lwn.net/Articles/989411/), [6.6.49](https://lwn.net/Articles/988749)))
- ca-certificates ([3.105](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html))
- expat ([2.6.3](https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes))
Best,
The Flatcar Container Linux Maintainers
---
### Communication
#### Go/No-Go message for Matrix/Slack
Go/No-Go Meeting for Alpha 4116.0.0, Beta 4081.1.0, Stable 3975.2.2
Pre-view images are available in https://bincache.flatcar-linux.net/images/amd64/$VERSION/
Tracking issue: https://github.com/flatcar/Flatcar/issues/1559
The Go/No-Go document is in our HackMD @flatcar namespace
Link: https://hackmd.io/CLDLX-ntRTmvn6RKWk16OA?view
Please give your Go/No-Go vote with π for Go, β for No-Go, and β for Wait.
Contributors & community feel free to put your suggestions, thoughts or comments on the document or here in the chat.
@MAINTAINER @MAINTAINER @MAINTAINER
#### Mastodon
_The toot (from [@flatcar](https://hachyderm.io/@flatcar)) goes out after the changelog update has been published; it includes a link to the web changelog._
New Flatcar Alpha, Beta, Stable releases now available!
π¦ Many package updates: expat, afterburn, Go, docker, containerd
π Enable kernel module for Broadcom storage controllers
π©Ή Fix slow boots of PXE and ISO
π CVE fixes & security patches: CVE-2024-45490 for expat
π Release notes at the usual spot: https://www.flatcar.org/releases/
#### X
New Flatcar releases now available!
π¦ Package updates: expat, afterburn, Go, docker, containerd
π Kernel module for Broadcom storage controllers
π©Ή Fix slow boots of PXE & ISO
π CVE fixes & security patches: CVE-2024-45490 for expat
π Release notes: https://www.flatcar.org/releases/
#### Kubernetes Slack
_This goes in the #flatcar channel_
Please welcome Flatcar releases of this month:
- Alpha 4116.0.0 (new major)
- Beta 4081.1.0 (maintenance release)
- Stable 3975.2.2 (maintenance release)
These releases include:
π¦ Many package updates: expat, afterburn, Go, docker, containerd
π Enable kernel module for Broadcom storage controllers
π©Ή Fix slow boots of PXE and ISO
π CVE fixes & security patches: CVE-2024-45490 for expat
π Release notes in usual spot: https://www.flatcar.org/releases/