# Flatcar Container Linux Release - 2022-05-05
## Flatcar-linux-3227.0.0-alpha
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
VERDICT: _GO_ / _WAIT_ / _NO-GO_
## Flatcar-linux-3185.1.1-beta
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
VERDICT: _GO_ / _WAIT_ / _NO-GO_
## Flatcar-linux-3139.2.1-stable
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
VERDICT: _GO_ / _WAIT_ / _NO-GO_
## Communication
---
#### Guidelines / Things to Remember
- Release notes are used in a PR and will appear on https://www.flatcar-linux.org/releases/
- [Announcement Message](#Announcement-Message) is posted in [Flatcar-Linux-user](https://groups.google.com/g/flatcar-linux-user). Make sure to post as “Flatcar Container Linux User”, not with your personal user (this can be selected when drafting the post).
- Make sure the the LTS is referred to as `LTS-2021`, and not `LTS-2605`
---
### Announcement Message
Subject: Announcing new Alpha release 3227.0.0, Beta release 3185.1.1, Stable release 3139.2.1
Hello,
We are pleased to announce a new Flatcar Container Linux release for the Alpha, Beta and Stable channel.
New **Alpha** Release **3227.0.0**
_Changes since **Alpha 3200.0.0**_
#### Security fixes:
- Linux ([CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390), [CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168), [CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158), [CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353), [CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198), [CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389), [CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388), [CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516), [CVE-2022-1263](https://nvd.nist.gov/vuln/detail/CVE-2022-1263), [CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582), [CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204), [CVE-2022-1205](https://nvd.nist.gov/vuln/detail/CVE-2022-1205), [CVE-2022-0500](https://nvd.nist.gov/vuln/detail/CVE-2022-0500), [CVE-2022-23222](https://nvd.nist.gov/vuln/detail/CVE-2022-23222))
- Go ([CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675))
- libarchive ([CVE-2022-26280](https://nvd.nist.gov/vuln/detail/CVE-2022-26280))
- gzip,xz-utils ([CVE-2022-1271](https://nvd.nist.gov/vuln/detail/CVE-2022-1271))
#### Bug fixes:
- GCE: Restored oem-gce.service functionality on GCP ([coreos-overlay#1813](https://github.com/flatcar-linux/coreos-overlay/pull/1813))
- Skipped starting `ensure-sysext.service` if `systemd-sysext.service` won't be started, to prevent reporting a dependency failure ([Flatcar#710](https://github.com/flatcar-linux/Flatcar/issues/710))
- Added a remount action as `systemd-sysext.service` drop-in unit to restore the OEM partition mount after the overlay mounts in `/usr` are done ([init#69](https://github.com/flatcar-linux/init/pull/69))
- Added pahole to developer container, without it kernel modules built against /usr/src/linux may fail to probe with an 'invalid relocation target' error ([coreos-overlay#1839](https://github.com/flatcar-linux/coreos-overlay/pull/1839))
#### Changes:
- GCE: Enabled GVE kernel driver, which adds support for Google Virtual NIC on GCP ([coreos-overlay#1802](https://github.com/flatcar-linux/coreos-overlay/pull/1802))
- Enabled `CONFIG_INTEL_RAPL` on AMD64 Kernel config to compile `intel_rapl_common` module in order to allow power monitoring on modern Intel processors ([coreos-overlay#1801](https://github.com/flatcar-linux/coreos-overlay/pull/1801))
- Azure: Set up `/etc/hostname` from instance metadata with Afterburn
- AWS EC2: Removed the setup of `/etc/hostname` from the instance metadata because it used a long FQDN but we can just use use the hostname set via DHCP ([Flatcar#707](https://github.com/flatcar-linux/Flatcar/issues/707))
- SDK: Dropped the mantle binaries (kola, ore, etc.) from the SDK, they are now provided by the `ghcr.io/flatcar-linux/mantle` image ([coreos-overlay#1827](https://github.com/flatcar-linux/coreos-overlay/pull/1827), [scripts#275](https://github.com/flatcar-linux/scripts/pull/275))
#### Updates:
- Linux ([5.15.37](https://lwn.net/Articles/893264) (includes [5.15.36](https://lwn.net/Articles/892812), [5.15.35](https://lwn.net/Articles/892002), [5.15.34](https://lwn.net/Articles/891251), [5.15.33](https://lwn.net/Articles/890722)))
- Linux Firmware ([20220411](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220411))
- Go ([1.17.9](https://go.googlesource.com/go/+/refs/tags/go1.17.9))
- afterburn ([5.2.0](https://github.com/coreos/afterburn/releases/tag/v5.2.0))
- ca-certificates ([3.78](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html))
- containerd ([1.6.3](https://github.com/containerd/containerd/releases/tag/v1.6.3))
- gzip ([1.12](https://savannah.gnu.org/forum/forum.php?forum_id=10157))
- libarchive ([3.6.1](https://github.com/libarchive/libarchive/releases/tag/v3.6.1))
- GCE: google compute-image-packages ([20190124](https://github.com/GoogleCloudPlatform/compute-image-packages/releases/tag/20190124))
- SDK: Rust ([1.60.0](https://github.com/rust-lang/rust/releases/tag/1.60.0))
New **Beta** Release **3185.1.1**
_Changes since **Beta 3185.1.0**_
#### Security fixes:
- Linux ([CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390), [CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168), [CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158), [CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353), [CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198), [CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389), [CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388), [CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516), [CVE-2022-1263](https://nvd.nist.gov/vuln/detail/CVE-2022-1263), [CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582), [CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204), [CVE-2022-1205](https://nvd.nist.gov/vuln/detail/CVE-2022-1205), [CVE-2022-0500](https://nvd.nist.gov/vuln/detail/CVE-2022-0500), [CVE-2022-23222](https://nvd.nist.gov/vuln/detail/CVE-2022-23222))
- Go ([CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675))
#### Bug fixes:
- GCE: Restored oem-gce.service functionality on GCP ([coreos-overlay#1813](https://github.com/flatcar-linux/coreos-overlay/pull/1813))
- Skipped starting `ensure-sysext.service` if `systemd-sysext.service` won't be started, to prevent reporting a dependency failure ([Flatcar#710](https://github.com/flatcar-linux/Flatcar/issues/710))
- Added a remount action as `systemd-sysext.service` drop-in unit to restore the OEM partition mount after the overlay mounts in `/usr` are done ([init#69](https://github.com/flatcar-linux/init/pull/69))
- Added pahole to developer container, without it kernel modules built against /usr/src/linux may fail to probe with an 'invalid relocation target' error ([coreos-overlay#1839](https://github.com/flatcar-linux/coreos-overlay/pull/1839))
#### Changes:
- GCE: Enabled GVE kernel driver, which adds support for Google Virtual NIC on GCP ([coreos-overlay#1802](https://github.com/flatcar-linux/coreos-overlay/pull/1802))
- Azure: Set up `/etc/hostname` from instance metadata with Afterburn
- AWS EC2: Removed the setup of `/etc/hostname` from the instance metadata because it used a long FQDN but we can just use use the hostname set via DHCP ([Flatcar#707](https://github.com/flatcar-linux/Flatcar/issues/707))
- SDK: Dropped the mantle binaries (kola, ore, etc.) from the SDK, they are now provided by the `ghcr.io/flatcar-linux/mantle` image ([coreos-overlay#1827](https://github.com/flatcar-linux/coreos-overlay/pull/1827), [scripts#275](https://github.com/flatcar-linux/scripts/pull/275))
#### Updates:
- Linux ([5.15.37](https://lwn.net/Articles/893264) (includes [5.15.36](https://lwn.net/Articles/892812), [5.15.35](https://lwn.net/Articles/892002), [5.15.34](https://lwn.net/Articles/891251), [5.15.33](https://lwn.net/Articles/890722)))
- Go ([1.17.9](https://go.googlesource.com/go/+/refs/tags/go1.17.9))
- ca-certificates ([3.78](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html))
- GCE: google compute-image-packages ([20190124](https://github.com/GoogleCloudPlatform/compute-image-packages/releases/tag/20190124))
New **Stable** Release **3139.2.1**
_Changes since **Stable 3139.2.0**_
#### Security fixes:
- Linux ([CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390), [CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168), [CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158), [CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353), [CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198), [CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389), [CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388), [CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516), [CVE-2022-1263](https://nvd.nist.gov/vuln/detail/CVE-2022-1263), [CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582), [CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204), [CVE-2022-1205](https://nvd.nist.gov/vuln/detail/CVE-2022-1205), [CVE-2022-0500](https://nvd.nist.gov/vuln/detail/CVE-2022-0500), [CVE-2022-23222](https://nvd.nist.gov/vuln/detail/CVE-2022-23222))
- nvidia-drivers ([CVE-2022-21814](https://nvd.nist.gov/vuln/detail/CVE-2022-21814), [CVE-2022-21813](https://nvd.nist.gov/vuln/detail/CVE-2022-21813))
- Go ([CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675))
#### Bug fixes:
- AWS: specify correct console (ttyS0) on kernel command line for ARM64 instances ([coreos-overlay#1628](https://github.com/flatcar-linux/coreos-overlay/pull/1628))
- GCE: Restored oem-gce.service functionality on GCP ([coreos-overlay#1813](https://github.com/flatcar-linux/coreos-overlay/pull/1813))
- Added pahole to developer container, without it kernel modules built against /usr/src/linux may fail to probe with an 'invalid relocation target' error ([coreos-overlay#1839](https://github.com/flatcar-linux/coreos-overlay/pull/1839))
#### Changes:
- Merge the Flatcar Pro features into the regular Flatcar images ([coreos-overlay#1679](https://github.com/flatcar-linux/coreos-overlay/pull/1679))
- GCE: Enabled GVE kernel driver, which adds support for Google Virtual NIC on GCP ([coreos-overlay#1802](https://github.com/flatcar-linux/coreos-overlay/pull/1802))
- SDK: Dropped the mantle binaries (kola, ore, etc.) from the SDK, they are now provided by the `ghcr.io/flatcar-linux/mantle` image ([coreos-overlay#1827](https://github.com/flatcar-linux/coreos-overlay/pull/1827), [scripts#275](https://github.com/flatcar-linux/scripts/pull/275))
#### Updates:
- Linux ([5.15.37](https://lwn.net/Articles/893264) (includes [5.15.36](https://lwn.net/Articles/892812), [5.15.35](https://lwn.net/Articles/892002), [5.15.34](https://lwn.net/Articles/891251), [5.15.33](https://lwn.net/Articles/890722)))
- Go ([1.17.9](https://go.googlesource.com/go/+/refs/tags/go1.17.9))
- ca-certificates ([3.78](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html))
- nvidia-drivers ([510.47.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-47-03/index.html))
- GCE: google compute-image-packages ([20190124](https://github.com/GoogleCloudPlatform/compute-image-packages/releases/tag/20190124))
Best,
The Flatcar Container Linux Maintainers
---
### Security
**Subject**: Security issues fixed with the latest Alpha 3227.0.0, Beta 3185.1.1, Stable 3139.2.1 releases
**Security fix**: With the Alpha 3227.0.0, Beta 3185.1.1, Stable 3139.2.1 releases we ship a fix for the CVEs listed below.
#### Alpha
* Go
* [CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675) CVSSv3 score: 7.5(High)
encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.
* Linux
* [CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390) CVSSv3 score: 7.8(High)
ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
* [CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168) CVSSv3 score: n/a
* [CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158) CVSSv3 score: n/a
* [CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353) CVSSv3 score: n/a
A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.
* [CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198) CVSSv3 score: n/a
* [CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389) CVSSv3 score: 7.8(High)
mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.
* [CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388) CVSSv3 score: 7.8(High)
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
* [CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516) CVSSv3 score: n/a
A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.
* [CVE-2022-1263](https://nvd.nist.gov/vuln/detail/CVE-2022-1263) CVSSv3 score: n/a
* [CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582) CVSSv3 score: 7(High)
In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.
* [CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204) CVSSv3 score: n/a
* [CVE-2022-1205](https://nvd.nist.gov/vuln/detail/CVE-2022-1205) CVSSv3 score: n/a
* [CVE-2022-0500](https://nvd.nist.gov/vuln/detail/CVE-2022-0500) CVSSv3 score: 7.8(High)
A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.
* [CVE-2022-23222](https://nvd.nist.gov/vuln/detail/CVE-2022-23222) CVSSv3 score: 7.8(High)
kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.
* gzip,xz-utils
* [CVE-2022-1271](https://nvd.nist.gov/vuln/detail/CVE-2022-1271) CVSSv3 score: n/a
* libarchive
* [CVE-2022-26280](https://nvd.nist.gov/vuln/detail/CVE-2022-26280) CVSSv3 score: 9.1(Critical)
Libarchive v3.6.0 was discovered to contain an out-of-bounds read via the component zipx_lzma_alone_init.
#### Beta
* Go
* [CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675) CVSSv3 score: 7.5(High)
encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.
* Linux
* [CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390) CVSSv3 score: 7.8(High)
ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
* [CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168) CVSSv3 score: n/a
* [CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158) CVSSv3 score: n/a
* [CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353) CVSSv3 score: n/a
A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.
* [CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198) CVSSv3 score: n/a
* [CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389) CVSSv3 score: 7.8(High)
mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.
* [CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388) CVSSv3 score: 7.8(High)
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
* [CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516) CVSSv3 score: n/a
A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.
* [CVE-2022-1263](https://nvd.nist.gov/vuln/detail/CVE-2022-1263) CVSSv3 score: n/a
* [CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582) CVSSv3 score: 7(High)
In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.
* [CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204) CVSSv3 score: n/a
* [CVE-2022-1205](https://nvd.nist.gov/vuln/detail/CVE-2022-1205) CVSSv3 score: n/a
* [CVE-2022-0500](https://nvd.nist.gov/vuln/detail/CVE-2022-0500) CVSSv3 score: 7.8(High)
A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.
* [CVE-2022-23222](https://nvd.nist.gov/vuln/detail/CVE-2022-23222) CVSSv3 score: 7.8(High)
kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.
#### Stable
* Go
* [CVE-2022-24675](https://nvd.nist.gov/vuln/detail/CVE-2022-24675) CVSSv3 score: 7.5(High)
encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.
* Linux
* [CVE-2022-28390](https://nvd.nist.gov/vuln/detail/CVE-2022-28390) CVSSv3 score: 7.8(High)
ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
* [CVE-2022-0168](https://nvd.nist.gov/vuln/detail/CVE-2022-0168) CVSSv3 score: n/a
* [CVE-2022-1158](https://nvd.nist.gov/vuln/detail/CVE-2022-1158) CVSSv3 score: n/a
* [CVE-2022-1353](https://nvd.nist.gov/vuln/detail/CVE-2022-1353) CVSSv3 score: n/a
A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.
* [CVE-2022-1198](https://nvd.nist.gov/vuln/detail/CVE-2022-1198) CVSSv3 score: n/a
* [CVE-2022-28389](https://nvd.nist.gov/vuln/detail/CVE-2022-28389) CVSSv3 score: 7.8(High)
mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.
* [CVE-2022-28388](https://nvd.nist.gov/vuln/detail/CVE-2022-28388) CVSSv3 score: 7.8(High)
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
* [CVE-2022-1516](https://nvd.nist.gov/vuln/detail/CVE-2022-1516) CVSSv3 score: n/a
A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.
* [CVE-2022-1263](https://nvd.nist.gov/vuln/detail/CVE-2022-1263) CVSSv3 score: n/a
* [CVE-2022-29582](https://nvd.nist.gov/vuln/detail/CVE-2022-29582) CVSSv3 score: 7(High)
In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.
* [CVE-2022-1204](https://nvd.nist.gov/vuln/detail/CVE-2022-1204) CVSSv3 score: n/a
* [CVE-2022-1205](https://nvd.nist.gov/vuln/detail/CVE-2022-1205) CVSSv3 score: n/a
* [CVE-2022-0500](https://nvd.nist.gov/vuln/detail/CVE-2022-0500) CVSSv3 score: 7.8(High)
A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.
* [CVE-2022-23222](https://nvd.nist.gov/vuln/detail/CVE-2022-23222) CVSSv3 score: 7.8(High)
kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.
---
### Twitter
_The tweet (from [@flatcar](https://twitter.com/flatcar)) goes out after the changelog update has been published; it includes a link to the web changelog._
New Flatcar releases now available for Alpha, Beta, Stable
📦 Package updates for Linux, Go, nvidia-drivers with security fixes
🚀 Flatcar Pro features now shipped in Flatcar stable images
📜 Release notes at the usual spot: https://www.flatcar.org/releases/