_Changes since **Alpha 4116.0.0**_ #### Security fixes: - Linux ([CVE-2024-50179](https://nvd.nist.gov/vuln/detail/CVE-2024-50179), [CVE-2024-50176](https://nvd.nist.gov/vuln/detail/CVE-2024-50176), [CVE-2024-50175](https://nvd.nist.gov/vuln/detail/CVE-2024-50175), [CVE-2024-50012](https://nvd.nist.gov/vuln/detail/CVE-2024-50012), [CVE-2024-50008](https://nvd.nist.gov/vuln/detail/CVE-2024-50008), [CVE-2024-50007](https://nvd.nist.gov/vuln/detail/CVE-2024-50007), [CVE-2024-50006](https://nvd.nist.gov/vuln/detail/CVE-2024-50006), [CVE-2024-50005](https://nvd.nist.gov/vuln/detail/CVE-2024-50005), [CVE-2024-50016](https://nvd.nist.gov/vuln/detail/CVE-2024-50016), [CVE-2024-50015](https://nvd.nist.gov/vuln/detail/CVE-2024-50015), [CVE-2024-50013](https://nvd.nist.gov/vuln/detail/CVE-2024-50013), [CVE-2024-50003](https://nvd.nist.gov/vuln/detail/CVE-2024-50003), [CVE-2024-50002](https://nvd.nist.gov/vuln/detail/CVE-2024-50002), [CVE-2024-50001](https://nvd.nist.gov/vuln/detail/CVE-2024-50001), [CVE-2024-50000](https://nvd.nist.gov/vuln/detail/CVE-2024-50000), [CVE-2024-49997](https://nvd.nist.gov/vuln/detail/CVE-2024-49997), [CVE-2024-49996](https://nvd.nist.gov/vuln/detail/CVE-2024-49996), [CVE-2024-49995](https://nvd.nist.gov/vuln/detail/CVE-2024-49995), [CVE-2024-49955](https://nvd.nist.gov/vuln/detail/CVE-2024-49955), [CVE-2024-49963](https://nvd.nist.gov/vuln/detail/CVE-2024-49963), [CVE-2024-49962](https://nvd.nist.gov/vuln/detail/CVE-2024-49962), [CVE-2024-49961](https://nvd.nist.gov/vuln/detail/CVE-2024-49961), [CVE-2024-49960](https://nvd.nist.gov/vuln/detail/CVE-2024-49960), [CVE-2024-49959](https://nvd.nist.gov/vuln/detail/CVE-2024-49959), [CVE-2024-49993](https://nvd.nist.gov/vuln/detail/CVE-2024-49993), [CVE-2024-49992](https://nvd.nist.gov/vuln/detail/CVE-2024-49992), [CVE-2024-49991](https://nvd.nist.gov/vuln/detail/CVE-2024-49991), [CVE-2024-49989](https://nvd.nist.gov/vuln/detail/CVE-2024-49989), [CVE-2024-49988](https://nvd.nist.gov/vuln/detail/CVE-2024-49988), [CVE-2024-49987](https://nvd.nist.gov/vuln/detail/CVE-2024-49987), [CVE-2024-49986](https://nvd.nist.gov/vuln/detail/CVE-2024-49986), [CVE-2024-49985](https://nvd.nist.gov/vuln/detail/CVE-2024-49985), [CVE-2024-49958](https://nvd.nist.gov/vuln/detail/CVE-2024-49958), [CVE-2024-49983](https://nvd.nist.gov/vuln/detail/CVE-2024-49983), [CVE-2024-49982](https://nvd.nist.gov/vuln/detail/CVE-2024-49982), [CVE-2024-49981](https://nvd.nist.gov/vuln/detail/CVE-2024-49981), [CVE-2024-49980](https://nvd.nist.gov/vuln/detail/CVE-2024-49980), [CVE-2024-49978](https://nvd.nist.gov/vuln/detail/CVE-2024-49978), [CVE-2024-49977](https://nvd.nist.gov/vuln/detail/CVE-2024-49977), [CVE-2024-49976](https://nvd.nist.gov/vuln/detail/CVE-2024-49976), [CVE-2024-49975](https://nvd.nist.gov/vuln/detail/CVE-2024-49975), [CVE-2024-49957](https://nvd.nist.gov/vuln/detail/CVE-2024-49957), [CVE-2024-49973](https://nvd.nist.gov/vuln/detail/CVE-2024-49973), [CVE-2024-49969](https://nvd.nist.gov/vuln/detail/CVE-2024-49969), [CVE-2024-49967](https://nvd.nist.gov/vuln/detail/CVE-2024-49967), [CVE-2024-49966](https://nvd.nist.gov/vuln/detail/CVE-2024-49966), [CVE-2024-49965](https://nvd.nist.gov/vuln/detail/CVE-2024-49965), [CVE-2024-49924](https://nvd.nist.gov/vuln/detail/CVE-2024-49924), [CVE-2024-49954](https://nvd.nist.gov/vuln/detail/CVE-2024-49954), [CVE-2024-49953](https://nvd.nist.gov/vuln/detail/CVE-2024-49953), [CVE-2024-49952](https://nvd.nist.gov/vuln/detail/CVE-2024-49952), [CVE-2024-49951](https://nvd.nist.gov/vuln/detail/CVE-2024-49951), [CVE-2024-49950](https://nvd.nist.gov/vuln/detail/CVE-2024-49950), [CVE-2024-49949](https://nvd.nist.gov/vuln/detail/CVE-2024-49949), [CVE-2024-49948](https://nvd.nist.gov/vuln/detail/CVE-2024-49948), [CVE-2024-49947](https://nvd.nist.gov/vuln/detail/CVE-2024-49947), [CVE-2024-49946](https://nvd.nist.gov/vuln/detail/CVE-2024-49946), [CVE-2024-49944](https://nvd.nist.gov/vuln/detail/CVE-2024-49944), [CVE-2024-49939](https://nvd.nist.gov/vuln/detail/CVE-2024-49939), [CVE-2024-49938](https://nvd.nist.gov/vuln/detail/CVE-2024-49938), [CVE-2024-49937](https://nvd.nist.gov/vuln/detail/CVE-2024-49937), [CVE-2024-49936](https://nvd.nist.gov/vuln/detail/CVE-2024-49936), [CVE-2024-49935](https://nvd.nist.gov/vuln/detail/CVE-2024-49935), [CVE-2024-49933](https://nvd.nist.gov/vuln/detail/CVE-2024-49933), [CVE-2024-49931](https://nvd.nist.gov/vuln/detail/CVE-2024-49931), [CVE-2024-49930](https://nvd.nist.gov/vuln/detail/CVE-2024-49930), [CVE-2024-49929](https://nvd.nist.gov/vuln/detail/CVE-2024-49929), [CVE-2024-49927](https://nvd.nist.gov/vuln/detail/CVE-2024-49927), [CVE-2024-49925](https://nvd.nist.gov/vuln/detail/CVE-2024-49925), [CVE-2024-49875](https://nvd.nist.gov/vuln/detail/CVE-2024-49875), [CVE-2024-49884](https://nvd.nist.gov/vuln/detail/CVE-2024-49884), [CVE-2024-49883](https://nvd.nist.gov/vuln/detail/CVE-2024-49883), [CVE-2024-49882](https://nvd.nist.gov/vuln/detail/CVE-2024-49882), [CVE-2024-49881](https://nvd.nist.gov/vuln/detail/CVE-2024-49881), [CVE-2024-49879](https://nvd.nist.gov/vuln/detail/CVE-2024-49879), [CVE-2024-49913](https://nvd.nist.gov/vuln/detail/CVE-2024-49913), [CVE-2024-49912](https://nvd.nist.gov/vuln/detail/CVE-2024-49912), [CVE-2024-49907](https://nvd.nist.gov/vuln/detail/CVE-2024-49907), [CVE-2024-49905](https://nvd.nist.gov/vuln/detail/CVE-2024-49905), [CVE-2024-49878](https://nvd.nist.gov/vuln/detail/CVE-2024-49878), [CVE-2024-49903](https://nvd.nist.gov/vuln/detail/CVE-2024-49903), [CVE-2024-49902](https://nvd.nist.gov/vuln/detail/CVE-2024-49902), [CVE-2024-49901](https://nvd.nist.gov/vuln/detail/CVE-2024-49901), [CVE-2024-49900](https://nvd.nist.gov/vuln/detail/CVE-2024-49900), [CVE-2024-49896](https://nvd.nist.gov/vuln/detail/CVE-2024-49896), [CVE-2024-49895](https://nvd.nist.gov/vuln/detail/CVE-2024-49895), [CVE-2024-49877](https://nvd.nist.gov/vuln/detail/CVE-2024-49877), [CVE-2024-49894](https://nvd.nist.gov/vuln/detail/CVE-2024-49894), [CVE-2024-49892](https://nvd.nist.gov/vuln/detail/CVE-2024-49892), [CVE-2024-49890](https://nvd.nist.gov/vuln/detail/CVE-2024-49890), [CVE-2024-49889](https://nvd.nist.gov/vuln/detail/CVE-2024-49889), [CVE-2024-49886](https://nvd.nist.gov/vuln/detail/CVE-2024-49886), [CVE-2024-49863](https://nvd.nist.gov/vuln/detail/CVE-2024-49863), [CVE-2024-49871](https://nvd.nist.gov/vuln/detail/CVE-2024-49871), [CVE-2024-49870](https://nvd.nist.gov/vuln/detail/CVE-2024-49870), [CVE-2024-49868](https://nvd.nist.gov/vuln/detail/CVE-2024-49868), [CVE-2024-49867](https://nvd.nist.gov/vuln/detail/CVE-2024-49867), [CVE-2024-49866](https://nvd.nist.gov/vuln/detail/CVE-2024-49866), [CVE-2024-49874](https://nvd.nist.gov/vuln/detail/CVE-2024-49874), [CVE-2024-49864](https://nvd.nist.gov/vuln/detail/CVE-2024-49864), [CVE-2024-47704](https://nvd.nist.gov/vuln/detail/CVE-2024-47704), [CVE-2024-50191](https://nvd.nist.gov/vuln/detail/CVE-2024-50191), [CVE-2024-50189](https://nvd.nist.gov/vuln/detail/CVE-2024-50189), [CVE-2024-50188](https://nvd.nist.gov/vuln/detail/CVE-2024-50188), [CVE-2024-50187](https://nvd.nist.gov/vuln/detail/CVE-2024-50187), [CVE-2024-50186](https://nvd.nist.gov/vuln/detail/CVE-2024-50186), [CVE-2024-50185](https://nvd.nist.gov/vuln/detail/CVE-2024-50185), [CVE-2024-50184](https://nvd.nist.gov/vuln/detail/CVE-2024-50184), [CVE-2024-50183](https://nvd.nist.gov/vuln/detail/CVE-2024-50183), [CVE-2024-50182](https://nvd.nist.gov/vuln/detail/CVE-2024-50182), [CVE-2024-50180](https://nvd.nist.gov/vuln/detail/CVE-2024-50180), [CVE-2024-50181](https://nvd.nist.gov/vuln/detail/CVE-2024-50181), [CVE-2024-50097](https://nvd.nist.gov/vuln/detail/CVE-2024-50097), [CVE-2024-50096](https://nvd.nist.gov/vuln/detail/CVE-2024-50096), [CVE-2024-50095](https://nvd.nist.gov/vuln/detail/CVE-2024-50095), [CVE-2024-50093](https://nvd.nist.gov/vuln/detail/CVE-2024-50093), [CVE-2024-50089](https://nvd.nist.gov/vuln/detail/CVE-2024-50089), [CVE-2024-50058](https://nvd.nist.gov/vuln/detail/CVE-2024-50058), [CVE-2024-50065](https://nvd.nist.gov/vuln/detail/CVE-2024-50065), [CVE-2024-50064](https://nvd.nist.gov/vuln/detail/CVE-2024-50064), [CVE-2024-50063](https://nvd.nist.gov/vuln/detail/CVE-2024-50063), [CVE-2024-50062](https://nvd.nist.gov/vuln/detail/CVE-2024-50062), [CVE-2024-50061](https://nvd.nist.gov/vuln/detail/CVE-2024-50061), [CVE-2024-50060](https://nvd.nist.gov/vuln/detail/CVE-2024-50060), [CVE-2024-50059](https://nvd.nist.gov/vuln/detail/CVE-2024-50059), [CVE-2024-50026](https://nvd.nist.gov/vuln/detail/CVE-2024-50026), [CVE-2024-50024](https://nvd.nist.gov/vuln/detail/CVE-2024-50024), [CVE-2024-50023](https://nvd.nist.gov/vuln/detail/CVE-2024-50023), [CVE-2024-50057](https://nvd.nist.gov/vuln/detail/CVE-2024-50057), [CVE-2024-50055](https://nvd.nist.gov/vuln/detail/CVE-2024-50055), [CVE-2024-50049](https://nvd.nist.gov/vuln/detail/CVE-2024-50049), [CVE-2024-50022](https://nvd.nist.gov/vuln/detail/CVE-2024-50022), [CVE-2024-50048](https://nvd.nist.gov/vuln/detail/CVE-2024-50048), [CVE-2024-50047](https://nvd.nist.gov/vuln/detail/CVE-2024-50047), [CVE-2024-50046](https://nvd.nist.gov/vuln/detail/CVE-2024-50046), [CVE-2024-50045](https://nvd.nist.gov/vuln/detail/CVE-2024-50045), [CVE-2024-50044](https://nvd.nist.gov/vuln/detail/CVE-2024-50044), [CVE-2024-50041](https://nvd.nist.gov/vuln/detail/CVE-2024-50041), [CVE-2024-50040](https://nvd.nist.gov/vuln/detail/CVE-2024-50040), [CVE-2024-50039](https://nvd.nist.gov/vuln/detail/CVE-2024-50039), [CVE-2024-50038](https://nvd.nist.gov/vuln/detail/CVE-2024-50038), [CVE-2024-50036](https://nvd.nist.gov/vuln/detail/CVE-2024-50036), [CVE-2024-50035](https://nvd.nist.gov/vuln/detail/CVE-2024-50035), [CVE-2024-50033](https://nvd.nist.gov/vuln/detail/CVE-2024-50033), [CVE-2024-50032](https://nvd.nist.gov/vuln/detail/CVE-2024-50032), [CVE-2024-50031](https://nvd.nist.gov/vuln/detail/CVE-2024-50031), [CVE-2024-50029](https://nvd.nist.gov/vuln/detail/CVE-2024-50029), [CVE-2024-50019](https://nvd.nist.gov/vuln/detail/CVE-2024-50019), [CVE-2024-50201](https://nvd.nist.gov/vuln/detail/CVE-2024-50201), [CVE-2024-50202](https://nvd.nist.gov/vuln/detail/CVE-2024-50202), [CVE-2024-50101](https://nvd.nist.gov/vuln/detail/CVE-2024-50101), [CVE-2024-50098](https://nvd.nist.gov/vuln/detail/CVE-2024-50098), [CVE-2024-50099](https://nvd.nist.gov/vuln/detail/CVE-2024-50099), [CVE-2024-50088](https://nvd.nist.gov/vuln/detail/CVE-2024-50088), [CVE-2024-50087](https://nvd.nist.gov/vuln/detail/CVE-2024-50087), [CVE-2024-50086](https://nvd.nist.gov/vuln/detail/CVE-2024-50086), [CVE-2024-50085](https://nvd.nist.gov/vuln/detail/CVE-2024-50085), [CVE-2024-50084](https://nvd.nist.gov/vuln/detail/CVE-2024-50084), [CVE-2024-50083](https://nvd.nist.gov/vuln/detail/CVE-2024-50083), [CVE-2024-50082](https://nvd.nist.gov/vuln/detail/CVE-2024-50082), [CVE-2024-50080](https://nvd.nist.gov/vuln/detail/CVE-2024-50080), [CVE-2024-50077](https://nvd.nist.gov/vuln/detail/CVE-2024-50077), [CVE-2024-50076](https://nvd.nist.gov/vuln/detail/CVE-2024-50076), [CVE-2024-50075](https://nvd.nist.gov/vuln/detail/CVE-2024-50075), [CVE-2024-50074](https://nvd.nist.gov/vuln/detail/CVE-2024-50074), [CVE-2024-50073](https://nvd.nist.gov/vuln/detail/CVE-2024-50073), [CVE-2024-50072](https://nvd.nist.gov/vuln/detail/CVE-2024-50072), [CVE-2024-50070](https://nvd.nist.gov/vuln/detail/CVE-2024-50070), [CVE-2024-50078](https://nvd.nist.gov/vuln/detail/CVE-2024-50078), [CVE-2024-50069](https://nvd.nist.gov/vuln/detail/CVE-2024-50069), [CVE-2024-50066](https://nvd.nist.gov/vuln/detail/CVE-2024-50066), [CVE-2024-50211](https://nvd.nist.gov/vuln/detail/CVE-2024-50211), [CVE-2024-50210](https://nvd.nist.gov/vuln/detail/CVE-2024-50210), [CVE-2024-50209](https://nvd.nist.gov/vuln/detail/CVE-2024-50209), [CVE-2024-50208](https://nvd.nist.gov/vuln/detail/CVE-2024-50208), [CVE-2024-50205](https://nvd.nist.gov/vuln/detail/CVE-2024-50205), [CVE-2024-50155](https://nvd.nist.gov/vuln/detail/CVE-2024-50155), [CVE-2024-50164](https://nvd.nist.gov/vuln/detail/CVE-2024-50164), [CVE-2024-50163](https://nvd.nist.gov/vuln/detail/CVE-2024-50163), [CVE-2024-50162](https://nvd.nist.gov/vuln/detail/CVE-2024-50162), [CVE-2024-50160](https://nvd.nist.gov/vuln/detail/CVE-2024-50160), [CVE-2024-50159](https://nvd.nist.gov/vuln/detail/CVE-2024-50159), [CVE-2024-50158](https://nvd.nist.gov/vuln/detail/CVE-2024-50158), [CVE-2024-50172](https://nvd.nist.gov/vuln/detail/CVE-2024-50172), [CVE-2024-50171](https://nvd.nist.gov/vuln/detail/CVE-2024-50171), [CVE-2024-50170](https://nvd.nist.gov/vuln/detail/CVE-2024-50170), [CVE-2024-50169](https://nvd.nist.gov/vuln/detail/CVE-2024-50169), [CVE-2024-50168](https://nvd.nist.gov/vuln/detail/CVE-2024-50168), [CVE-2024-50167](https://nvd.nist.gov/vuln/detail/CVE-2024-50167), [CVE-2024-50166](https://nvd.nist.gov/vuln/detail/CVE-2024-50166), [CVE-2024-50156](https://nvd.nist.gov/vuln/detail/CVE-2024-50156), [CVE-2024-50148](https://nvd.nist.gov/vuln/detail/CVE-2024-50148), [CVE-2024-50147](https://nvd.nist.gov/vuln/detail/CVE-2024-50147), [CVE-2024-50145](https://nvd.nist.gov/vuln/detail/CVE-2024-50145), [CVE-2024-50143](https://nvd.nist.gov/vuln/detail/CVE-2024-50143), [CVE-2024-50142](https://nvd.nist.gov/vuln/detail/CVE-2024-50142), [CVE-2024-50141](https://nvd.nist.gov/vuln/detail/CVE-2024-50141), [CVE-2024-50154](https://nvd.nist.gov/vuln/detail/CVE-2024-50154), [CVE-2024-50153](https://nvd.nist.gov/vuln/detail/CVE-2024-50153), [CVE-2024-50152](https://nvd.nist.gov/vuln/detail/CVE-2024-50152), [CVE-2024-50151](https://nvd.nist.gov/vuln/detail/CVE-2024-50151), [CVE-2024-50150](https://nvd.nist.gov/vuln/detail/CVE-2024-50150), [CVE-2024-50139](https://nvd.nist.gov/vuln/detail/CVE-2024-50139), [CVE-2024-50140](https://nvd.nist.gov/vuln/detail/CVE-2024-50140), [CVE-2024-50128](https://nvd.nist.gov/vuln/detail/CVE-2024-50128), [CVE-2024-50136](https://nvd.nist.gov/vuln/detail/CVE-2024-50136), [CVE-2024-50135](https://nvd.nist.gov/vuln/detail/CVE-2024-50135), [CVE-2024-50134](https://nvd.nist.gov/vuln/detail/CVE-2024-50134), [CVE-2024-50133](https://nvd.nist.gov/vuln/detail/CVE-2024-50133), [CVE-2024-50131](https://nvd.nist.gov/vuln/detail/CVE-2024-50131), [CVE-2024-50130](https://nvd.nist.gov/vuln/detail/CVE-2024-50130), [CVE-2024-50111](https://nvd.nist.gov/vuln/detail/CVE-2024-50111), [CVE-2024-50110](https://nvd.nist.gov/vuln/detail/CVE-2024-50110), [CVE-2024-50108](https://nvd.nist.gov/vuln/detail/CVE-2024-50108), [CVE-2024-50127](https://nvd.nist.gov/vuln/detail/CVE-2024-50127), [CVE-2024-50126](https://nvd.nist.gov/vuln/detail/CVE-2024-50126), [CVE-2024-50125](https://nvd.nist.gov/vuln/detail/CVE-2024-50125), [CVE-2024-50124](https://nvd.nist.gov/vuln/detail/CVE-2024-50124), [CVE-2024-50121](https://nvd.nist.gov/vuln/detail/CVE-2024-50121), [CVE-2024-50120](https://nvd.nist.gov/vuln/detail/CVE-2024-50120), [CVE-2024-50117](https://nvd.nist.gov/vuln/detail/CVE-2024-50117), [CVE-2024-50116](https://nvd.nist.gov/vuln/detail/CVE-2024-50116), [CVE-2024-50115](https://nvd.nist.gov/vuln/detail/CVE-2024-50115), [CVE-2024-50112](https://nvd.nist.gov/vuln/detail/CVE-2024-50112), [CVE-2024-50103](https://nvd.nist.gov/vuln/detail/CVE-2024-50103), [CVE-2024-50262](https://nvd.nist.gov/vuln/detail/CVE-2024-50262), [CVE-2024-50259](https://nvd.nist.gov/vuln/detail/CVE-2024-50259), [CVE-2024-50261](https://nvd.nist.gov/vuln/detail/CVE-2024-50261), [CVE-2024-50226](https://nvd.nist.gov/vuln/detail/CVE-2024-50226), [CVE-2024-50235](https://nvd.nist.gov/vuln/detail/CVE-2024-50235), [CVE-2024-50234](https://nvd.nist.gov/vuln/detail/CVE-2024-50234), [CVE-2024-50233](https://nvd.nist.gov/vuln/detail/CVE-2024-50233), [CVE-2024-50232](https://nvd.nist.gov/vuln/detail/CVE-2024-50232), [CVE-2024-50231](https://nvd.nist.gov/vuln/detail/CVE-2024-50231), [CVE-2024-50230](https://nvd.nist.gov/vuln/detail/CVE-2024-50230), [CVE-2024-50258](https://nvd.nist.gov/vuln/detail/CVE-2024-50258), [CVE-2024-50257](https://nvd.nist.gov/vuln/detail/CVE-2024-50257), [CVE-2024-50256](https://nvd.nist.gov/vuln/detail/CVE-2024-50256), [CVE-2024-50229](https://nvd.nist.gov/vuln/detail/CVE-2024-50229), [CVE-2024-50255](https://nvd.nist.gov/vuln/detail/CVE-2024-50255), [CVE-2024-50252](https://nvd.nist.gov/vuln/detail/CVE-2024-50252), [CVE-2024-50251](https://nvd.nist.gov/vuln/detail/CVE-2024-50251), [CVE-2024-50250](https://nvd.nist.gov/vuln/detail/CVE-2024-50250), [CVE-2024-50249](https://nvd.nist.gov/vuln/detail/CVE-2024-50249), [CVE-2024-50248](https://nvd.nist.gov/vuln/detail/CVE-2024-50248), [CVE-2024-50247](https://nvd.nist.gov/vuln/detail/CVE-2024-50247), [CVE-2024-50246](https://nvd.nist.gov/vuln/detail/CVE-2024-50246), [CVE-2024-50228](https://nvd.nist.gov/vuln/detail/CVE-2024-50228), [CVE-2024-50245](https://nvd.nist.gov/vuln/detail/CVE-2024-50245), [CVE-2024-50244](https://nvd.nist.gov/vuln/detail/CVE-2024-50244), [CVE-2024-50243](https://nvd.nist.gov/vuln/detail/CVE-2024-50243), [CVE-2024-50242](https://nvd.nist.gov/vuln/detail/CVE-2024-50242), [CVE-2024-50240](https://nvd.nist.gov/vuln/detail/CVE-2024-50240), [CVE-2024-50239](https://nvd.nist.gov/vuln/detail/CVE-2024-50239), [CVE-2024-50237](https://nvd.nist.gov/vuln/detail/CVE-2024-50237), [CVE-2024-50236](https://nvd.nist.gov/vuln/detail/CVE-2024-50236), [CVE-2024-50219](https://nvd.nist.gov/vuln/detail/CVE-2024-50219), [CVE-2024-50218](https://nvd.nist.gov/vuln/detail/CVE-2024-50218), [CVE-2024-50216](https://nvd.nist.gov/vuln/detail/CVE-2024-50216), [CVE-2024-50215](https://nvd.nist.gov/vuln/detail/CVE-2024-50215), [CVE-2024-50224](https://nvd.nist.gov/vuln/detail/CVE-2024-50224), [CVE-2024-50223](https://nvd.nist.gov/vuln/detail/CVE-2024-50223), [CVE-2024-50222](https://nvd.nist.gov/vuln/detail/CVE-2024-50222)) #### Changes: - Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha ([flatcar/scripts#2390](https://github.com/flatcar/scripts/pull/2390)) #### Updates: - ca-certificates ([3.106](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html)) - Linux ([6.6.60](https://lwn.net/Articles/997527) (includes [6.6.59](https://lwn.net/Articles/996689), [6.6.58](https://lwn.net/Articles/995132), [6.6.57](https://lwn.net/Articles/994634), [6.6.56](https://lwn.net/Articles/993600), [6.6.55](https://lwn.net/Articles/993599))) ### Alpha 4152.0.0 _Changes since **Alpha 4116.0.0**_ #### Security fixes: - Linux ([CVE-2024-50179](https://nvd.nist.gov/vuln/detail/CVE-2024-50179), [CVE-2024-50176](https://nvd.nist.gov/vuln/detail/CVE-2024-50176), [CVE-2024-50175](https://nvd.nist.gov/vuln/detail/CVE-2024-50175), [CVE-2024-50012](https://nvd.nist.gov/vuln/detail/CVE-2024-50012), [CVE-2024-50008](https://nvd.nist.gov/vuln/detail/CVE-2024-50008), [CVE-2024-50007](https://nvd.nist.gov/vuln/detail/CVE-2024-50007), [CVE-2024-50006](https://nvd.nist.gov/vuln/detail/CVE-2024-50006), [CVE-2024-50005](https://nvd.nist.gov/vuln/detail/CVE-2024-50005), [CVE-2024-50016](https://nvd.nist.gov/vuln/detail/CVE-2024-50016), [CVE-2024-50015](https://nvd.nist.gov/vuln/detail/CVE-2024-50015), [CVE-2024-50013](https://nvd.nist.gov/vuln/detail/CVE-2024-50013), [CVE-2024-50003](https://nvd.nist.gov/vuln/detail/CVE-2024-50003), [CVE-2024-50002](https://nvd.nist.gov/vuln/detail/CVE-2024-50002), [CVE-2024-50001](https://nvd.nist.gov/vuln/detail/CVE-2024-50001), [CVE-2024-50000](https://nvd.nist.gov/vuln/detail/CVE-2024-50000), [CVE-2024-49997](https://nvd.nist.gov/vuln/detail/CVE-2024-49997), [CVE-2024-49996](https://nvd.nist.gov/vuln/detail/CVE-2024-49996), [CVE-2024-49995](https://nvd.nist.gov/vuln/detail/CVE-2024-49995), [CVE-2024-49955](https://nvd.nist.gov/vuln/detail/CVE-2024-49955), [CVE-2024-49963](https://nvd.nist.gov/vuln/detail/CVE-2024-49963), [CVE-2024-49962](https://nvd.nist.gov/vuln/detail/CVE-2024-49962), [CVE-2024-49961](https://nvd.nist.gov/vuln/detail/CVE-2024-49961), [CVE-2024-49960](https://nvd.nist.gov/vuln/detail/CVE-2024-49960), [CVE-2024-49959](https://nvd.nist.gov/vuln/detail/CVE-2024-49959), [CVE-2024-49993](https://nvd.nist.gov/vuln/detail/CVE-2024-49993), [CVE-2024-49992](https://nvd.nist.gov/vuln/detail/CVE-2024-49992), [CVE-2024-49991](https://nvd.nist.gov/vuln/detail/CVE-2024-49991), [CVE-2024-49989](https://nvd.nist.gov/vuln/detail/CVE-2024-49989), [CVE-2024-49988](https://nvd.nist.gov/vuln/detail/CVE-2024-49988), [CVE-2024-49987](https://nvd.nist.gov/vuln/detail/CVE-2024-49987), [CVE-2024-49986](https://nvd.nist.gov/vuln/detail/CVE-2024-49986), [CVE-2024-49985](https://nvd.nist.gov/vuln/detail/CVE-2024-49985), [CVE-2024-49958](https://nvd.nist.gov/vuln/detail/CVE-2024-49958), [CVE-2024-49983](https://nvd.nist.gov/vuln/detail/CVE-2024-49983), [CVE-2024-49982](https://nvd.nist.gov/vuln/detail/CVE-2024-49982), [CVE-2024-49981](https://nvd.nist.gov/vuln/detail/CVE-2024-49981), [CVE-2024-49980](https://nvd.nist.gov/vuln/detail/CVE-2024-49980), [CVE-2024-49978](https://nvd.nist.gov/vuln/detail/CVE-2024-49978), [CVE-2024-49977](https://nvd.nist.gov/vuln/detail/CVE-2024-49977), [CVE-2024-49976](https://nvd.nist.gov/vuln/detail/CVE-2024-49976), [CVE-2024-49975](https://nvd.nist.gov/vuln/detail/CVE-2024-49975), [CVE-2024-49957](https://nvd.nist.gov/vuln/detail/CVE-2024-49957), [CVE-2024-49973](https://nvd.nist.gov/vuln/detail/CVE-2024-49973), [CVE-2024-49969](https://nvd.nist.gov/vuln/detail/CVE-2024-49969), [CVE-2024-49967](https://nvd.nist.gov/vuln/detail/CVE-2024-49967), [CVE-2024-49966](https://nvd.nist.gov/vuln/detail/CVE-2024-49966), [CVE-2024-49965](https://nvd.nist.gov/vuln/detail/CVE-2024-49965), [CVE-2024-49924](https://nvd.nist.gov/vuln/detail/CVE-2024-49924), [CVE-2024-49954](https://nvd.nist.gov/vuln/detail/CVE-2024-49954), [CVE-2024-49953](https://nvd.nist.gov/vuln/detail/CVE-2024-49953), [CVE-2024-49952](https://nvd.nist.gov/vuln/detail/CVE-2024-49952), [CVE-2024-49951](https://nvd.nist.gov/vuln/detail/CVE-2024-49951), [CVE-2024-49950](https://nvd.nist.gov/vuln/detail/CVE-2024-49950), [CVE-2024-49949](https://nvd.nist.gov/vuln/detail/CVE-2024-49949), [CVE-2024-49948](https://nvd.nist.gov/vuln/detail/CVE-2024-49948), [CVE-2024-49947](https://nvd.nist.gov/vuln/detail/CVE-2024-49947), [CVE-2024-49946](https://nvd.nist.gov/vuln/detail/CVE-2024-49946), [CVE-2024-49944](https://nvd.nist.gov/vuln/detail/CVE-2024-49944), [CVE-2024-49939](https://nvd.nist.gov/vuln/detail/CVE-2024-49939), [CVE-2024-49938](https://nvd.nist.gov/vuln/detail/CVE-2024-49938), [CVE-2024-49937](https://nvd.nist.gov/vuln/detail/CVE-2024-49937), [CVE-2024-49936](https://nvd.nist.gov/vuln/detail/CVE-2024-49936), [CVE-2024-49935](https://nvd.nist.gov/vuln/detail/CVE-2024-49935), [CVE-2024-49933](https://nvd.nist.gov/vuln/detail/CVE-2024-49933), [CVE-2024-49931](https://nvd.nist.gov/vuln/detail/CVE-2024-49931), [CVE-2024-49930](https://nvd.nist.gov/vuln/detail/CVE-2024-49930), [CVE-2024-49929](https://nvd.nist.gov/vuln/detail/CVE-2024-49929), [CVE-2024-49927](https://nvd.nist.gov/vuln/detail/CVE-2024-49927), [CVE-2024-49925](https://nvd.nist.gov/vuln/detail/CVE-2024-49925), [CVE-2024-49875](https://nvd.nist.gov/vuln/detail/CVE-2024-49875), [CVE-2024-49884](https://nvd.nist.gov/vuln/detail/CVE-2024-49884), [CVE-2024-49883](https://nvd.nist.gov/vuln/detail/CVE-2024-49883), [CVE-2024-49882](https://nvd.nist.gov/vuln/detail/CVE-2024-49882), [CVE-2024-49881](https://nvd.nist.gov/vuln/detail/CVE-2024-49881), [CVE-2024-49879](https://nvd.nist.gov/vuln/detail/CVE-2024-49879), [CVE-2024-49913](https://nvd.nist.gov/vuln/detail/CVE-2024-49913), [CVE-2024-49912](https://nvd.nist.gov/vuln/detail/CVE-2024-49912), [CVE-2024-49907](https://nvd.nist.gov/vuln/detail/CVE-2024-49907), [CVE-2024-49905](https://nvd.nist.gov/vuln/detail/CVE-2024-49905), [CVE-2024-49878](https://nvd.nist.gov/vuln/detail/CVE-2024-49878), [CVE-2024-49903](https://nvd.nist.gov/vuln/detail/CVE-2024-49903), [CVE-2024-49902](https://nvd.nist.gov/vuln/detail/CVE-2024-49902), [CVE-2024-49901](https://nvd.nist.gov/vuln/detail/CVE-2024-49901), [CVE-2024-49900](https://nvd.nist.gov/vuln/detail/CVE-2024-49900), [CVE-2024-49896](https://nvd.nist.gov/vuln/detail/CVE-2024-49896), [CVE-2024-49895](https://nvd.nist.gov/vuln/detail/CVE-2024-49895), [CVE-2024-49877](https://nvd.nist.gov/vuln/detail/CVE-2024-49877), [CVE-2024-49894](https://nvd.nist.gov/vuln/detail/CVE-2024-49894), [CVE-2024-49892](https://nvd.nist.gov/vuln/detail/CVE-2024-49892), [CVE-2024-49890](https://nvd.nist.gov/vuln/detail/CVE-2024-49890), [CVE-2024-49889](https://nvd.nist.gov/vuln/detail/CVE-2024-49889), [CVE-2024-49886](https://nvd.nist.gov/vuln/detail/CVE-2024-49886), [CVE-2024-49863](https://nvd.nist.gov/vuln/detail/CVE-2024-49863), [CVE-2024-49871](https://nvd.nist.gov/vuln/detail/CVE-2024-49871), [CVE-2024-49870](https://nvd.nist.gov/vuln/detail/CVE-2024-49870), [CVE-2024-49868](https://nvd.nist.gov/vuln/detail/CVE-2024-49868), [CVE-2024-49867](https://nvd.nist.gov/vuln/detail/CVE-2024-49867), [CVE-2024-49866](https://nvd.nist.gov/vuln/detail/CVE-2024-49866), [CVE-2024-49874](https://nvd.nist.gov/vuln/detail/CVE-2024-49874), [CVE-2024-49864](https://nvd.nist.gov/vuln/detail/CVE-2024-49864), [CVE-2024-47704](https://nvd.nist.gov/vuln/detail/CVE-2024-47704), [CVE-2024-50191](https://nvd.nist.gov/vuln/detail/CVE-2024-50191), [CVE-2024-50189](https://nvd.nist.gov/vuln/detail/CVE-2024-50189), [CVE-2024-50188](https://nvd.nist.gov/vuln/detail/CVE-2024-50188), [CVE-2024-50187](https://nvd.nist.gov/vuln/detail/CVE-2024-50187), [CVE-2024-50186](https://nvd.nist.gov/vuln/detail/CVE-2024-50186), [CVE-2024-50185](https://nvd.nist.gov/vuln/detail/CVE-2024-50185), [CVE-2024-50184](https://nvd.nist.gov/vuln/detail/CVE-2024-50184), [CVE-2024-50183](https://nvd.nist.gov/vuln/detail/CVE-2024-50183), [CVE-2024-50182](https://nvd.nist.gov/vuln/detail/CVE-2024-50182), [CVE-2024-50180](https://nvd.nist.gov/vuln/detail/CVE-2024-50180), [CVE-2024-50181](https://nvd.nist.gov/vuln/detail/CVE-2024-50181), [CVE-2024-50097](https://nvd.nist.gov/vuln/detail/CVE-2024-50097), [CVE-2024-50096](https://nvd.nist.gov/vuln/detail/CVE-2024-50096), [CVE-2024-50095](https://nvd.nist.gov/vuln/detail/CVE-2024-50095), [CVE-2024-50093](https://nvd.nist.gov/vuln/detail/CVE-2024-50093), [CVE-2024-50089](https://nvd.nist.gov/vuln/detail/CVE-2024-50089), [CVE-2024-50058](https://nvd.nist.gov/vuln/detail/CVE-2024-50058), [CVE-2024-50065](https://nvd.nist.gov/vuln/detail/CVE-2024-50065), [CVE-2024-50064](https://nvd.nist.gov/vuln/detail/CVE-2024-50064), [CVE-2024-50063](https://nvd.nist.gov/vuln/detail/CVE-2024-50063), [CVE-2024-50062](https://nvd.nist.gov/vuln/detail/CVE-2024-50062), [CVE-2024-50061](https://nvd.nist.gov/vuln/detail/CVE-2024-50061), [CVE-2024-50060](https://nvd.nist.gov/vuln/detail/CVE-2024-50060), [CVE-2024-50059](https://nvd.nist.gov/vuln/detail/CVE-2024-50059), [CVE-2024-50026](https://nvd.nist.gov/vuln/detail/CVE-2024-50026), [CVE-2024-50024](https://nvd.nist.gov/vuln/detail/CVE-2024-50024), [CVE-2024-50023](https://nvd.nist.gov/vuln/detail/CVE-2024-50023), [CVE-2024-50057](https://nvd.nist.gov/vuln/detail/CVE-2024-50057), [CVE-2024-50055](https://nvd.nist.gov/vuln/detail/CVE-2024-50055), [CVE-2024-50049](https://nvd.nist.gov/vuln/detail/CVE-2024-50049), [CVE-2024-50022](https://nvd.nist.gov/vuln/detail/CVE-2024-50022), [CVE-2024-50048](https://nvd.nist.gov/vuln/detail/CVE-2024-50048), [CVE-2024-50047](https://nvd.nist.gov/vuln/detail/CVE-2024-50047), [CVE-2024-50046](https://nvd.nist.gov/vuln/detail/CVE-2024-50046), [CVE-2024-50045](https://nvd.nist.gov/vuln/detail/CVE-2024-50045), [CVE-2024-50044](https://nvd.nist.gov/vuln/detail/CVE-2024-50044), [CVE-2024-50041](https://nvd.nist.gov/vuln/detail/CVE-2024-50041), [CVE-2024-50040](https://nvd.nist.gov/vuln/detail/CVE-2024-50040), [CVE-2024-50039](https://nvd.nist.gov/vuln/detail/CVE-2024-50039), [CVE-2024-50038](https://nvd.nist.gov/vuln/detail/CVE-2024-50038), [CVE-2024-50036](https://nvd.nist.gov/vuln/detail/CVE-2024-50036), [CVE-2024-50035](https://nvd.nist.gov/vuln/detail/CVE-2024-50035), [CVE-2024-50033](https://nvd.nist.gov/vuln/detail/CVE-2024-50033), [CVE-2024-50032](https://nvd.nist.gov/vuln/detail/CVE-2024-50032), [CVE-2024-50031](https://nvd.nist.gov/vuln/detail/CVE-2024-50031), [CVE-2024-50029](https://nvd.nist.gov/vuln/detail/CVE-2024-50029), [CVE-2024-50019](https://nvd.nist.gov/vuln/detail/CVE-2024-50019), [CVE-2024-50201](https://nvd.nist.gov/vuln/detail/CVE-2024-50201), [CVE-2024-50202](https://nvd.nist.gov/vuln/detail/CVE-2024-50202), [CVE-2024-50101](https://nvd.nist.gov/vuln/detail/CVE-2024-50101), [CVE-2024-50098](https://nvd.nist.gov/vuln/detail/CVE-2024-50098), [CVE-2024-50099](https://nvd.nist.gov/vuln/detail/CVE-2024-50099), [CVE-2024-50088](https://nvd.nist.gov/vuln/detail/CVE-2024-50088), [CVE-2024-50087](https://nvd.nist.gov/vuln/detail/CVE-2024-50087), [CVE-2024-50086](https://nvd.nist.gov/vuln/detail/CVE-2024-50086), [CVE-2024-50085](https://nvd.nist.gov/vuln/detail/CVE-2024-50085), [CVE-2024-50084](https://nvd.nist.gov/vuln/detail/CVE-2024-50084), [CVE-2024-50083](https://nvd.nist.gov/vuln/detail/CVE-2024-50083), [CVE-2024-50082](https://nvd.nist.gov/vuln/detail/CVE-2024-50082), [CVE-2024-50080](https://nvd.nist.gov/vuln/detail/CVE-2024-50080), [CVE-2024-50077](https://nvd.nist.gov/vuln/detail/CVE-2024-50077), [CVE-2024-50076](https://nvd.nist.gov/vuln/detail/CVE-2024-50076), [CVE-2024-50075](https://nvd.nist.gov/vuln/detail/CVE-2024-50075), [CVE-2024-50074](https://nvd.nist.gov/vuln/detail/CVE-2024-50074), [CVE-2024-50073](https://nvd.nist.gov/vuln/detail/CVE-2024-50073), [CVE-2024-50072](https://nvd.nist.gov/vuln/detail/CVE-2024-50072), [CVE-2024-50070](https://nvd.nist.gov/vuln/detail/CVE-2024-50070), [CVE-2024-50078](https://nvd.nist.gov/vuln/detail/CVE-2024-50078), [CVE-2024-50069](https://nvd.nist.gov/vuln/detail/CVE-2024-50069), [CVE-2024-50066](https://nvd.nist.gov/vuln/detail/CVE-2024-50066), [CVE-2024-50211](https://nvd.nist.gov/vuln/detail/CVE-2024-50211), [CVE-2024-50210](https://nvd.nist.gov/vuln/detail/CVE-2024-50210), [CVE-2024-50209](https://nvd.nist.gov/vuln/detail/CVE-2024-50209), [CVE-2024-50208](https://nvd.nist.gov/vuln/detail/CVE-2024-50208), [CVE-2024-50205](https://nvd.nist.gov/vuln/detail/CVE-2024-50205), [CVE-2024-50155](https://nvd.nist.gov/vuln/detail/CVE-2024-50155), [CVE-2024-50164](https://nvd.nist.gov/vuln/detail/CVE-2024-50164), [CVE-2024-50163](https://nvd.nist.gov/vuln/detail/CVE-2024-50163), [CVE-2024-50162](https://nvd.nist.gov/vuln/detail/CVE-2024-50162), [CVE-2024-50160](https://nvd.nist.gov/vuln/detail/CVE-2024-50160), [CVE-2024-50159](https://nvd.nist.gov/vuln/detail/CVE-2024-50159), [CVE-2024-50158](https://nvd.nist.gov/vuln/detail/CVE-2024-50158), [CVE-2024-50172](https://nvd.nist.gov/vuln/detail/CVE-2024-50172), [CVE-2024-50171](https://nvd.nist.gov/vuln/detail/CVE-2024-50171), [CVE-2024-50170](https://nvd.nist.gov/vuln/detail/CVE-2024-50170), [CVE-2024-50169](https://nvd.nist.gov/vuln/detail/CVE-2024-50169), [CVE-2024-50168](https://nvd.nist.gov/vuln/detail/CVE-2024-50168), [CVE-2024-50167](https://nvd.nist.gov/vuln/detail/CVE-2024-50167), [CVE-2024-50166](https://nvd.nist.gov/vuln/detail/CVE-2024-50166), [CVE-2024-50156](https://nvd.nist.gov/vuln/detail/CVE-2024-50156), [CVE-2024-50148](https://nvd.nist.gov/vuln/detail/CVE-2024-50148), [CVE-2024-50147](https://nvd.nist.gov/vuln/detail/CVE-2024-50147), [CVE-2024-50145](https://nvd.nist.gov/vuln/detail/CVE-2024-50145), [CVE-2024-50143](https://nvd.nist.gov/vuln/detail/CVE-2024-50143), [CVE-2024-50142](https://nvd.nist.gov/vuln/detail/CVE-2024-50142), [CVE-2024-50141](https://nvd.nist.gov/vuln/detail/CVE-2024-50141), [CVE-2024-50154](https://nvd.nist.gov/vuln/detail/CVE-2024-50154), [CVE-2024-50153](https://nvd.nist.gov/vuln/detail/CVE-2024-50153), [CVE-2024-50152](https://nvd.nist.gov/vuln/detail/CVE-2024-50152), [CVE-2024-50151](https://nvd.nist.gov/vuln/detail/CVE-2024-50151), [CVE-2024-50150](https://nvd.nist.gov/vuln/detail/CVE-2024-50150), [CVE-2024-50139](https://nvd.nist.gov/vuln/detail/CVE-2024-50139), [CVE-2024-50140](https://nvd.nist.gov/vuln/detail/CVE-2024-50140), [CVE-2024-50128](https://nvd.nist.gov/vuln/detail/CVE-2024-50128), [CVE-2024-50136](https://nvd.nist.gov/vuln/detail/CVE-2024-50136), [CVE-2024-50135](https://nvd.nist.gov/vuln/detail/CVE-2024-50135), [CVE-2024-50134](https://nvd.nist.gov/vuln/detail/CVE-2024-50134), [CVE-2024-50133](https://nvd.nist.gov/vuln/detail/CVE-2024-50133), [CVE-2024-50131](https://nvd.nist.gov/vuln/detail/CVE-2024-50131), [CVE-2024-50130](https://nvd.nist.gov/vuln/detail/CVE-2024-50130), [CVE-2024-50111](https://nvd.nist.gov/vuln/detail/CVE-2024-50111), [CVE-2024-50110](https://nvd.nist.gov/vuln/detail/CVE-2024-50110), [CVE-2024-50108](https://nvd.nist.gov/vuln/detail/CVE-2024-50108), [CVE-2024-50127](https://nvd.nist.gov/vuln/detail/CVE-2024-50127), [CVE-2024-50126](https://nvd.nist.gov/vuln/detail/CVE-2024-50126), [CVE-2024-50125](https://nvd.nist.gov/vuln/detail/CVE-2024-50125), [CVE-2024-50124](https://nvd.nist.gov/vuln/detail/CVE-2024-50124), [CVE-2024-50121](https://nvd.nist.gov/vuln/detail/CVE-2024-50121), [CVE-2024-50120](https://nvd.nist.gov/vuln/detail/CVE-2024-50120), [CVE-2024-50117](https://nvd.nist.gov/vuln/detail/CVE-2024-50117), [CVE-2024-50116](https://nvd.nist.gov/vuln/detail/CVE-2024-50116), [CVE-2024-50115](https://nvd.nist.gov/vuln/detail/CVE-2024-50115), [CVE-2024-50112](https://nvd.nist.gov/vuln/detail/CVE-2024-50112), [CVE-2024-50103](https://nvd.nist.gov/vuln/detail/CVE-2024-50103), [CVE-2024-50262](https://nvd.nist.gov/vuln/detail/CVE-2024-50262), [CVE-2024-50259](https://nvd.nist.gov/vuln/detail/CVE-2024-50259), [CVE-2024-50261](https://nvd.nist.gov/vuln/detail/CVE-2024-50261), [CVE-2024-50226](https://nvd.nist.gov/vuln/detail/CVE-2024-50226), [CVE-2024-50235](https://nvd.nist.gov/vuln/detail/CVE-2024-50235), [CVE-2024-50234](https://nvd.nist.gov/vuln/detail/CVE-2024-50234), [CVE-2024-50233](https://nvd.nist.gov/vuln/detail/CVE-2024-50233), [CVE-2024-50232](https://nvd.nist.gov/vuln/detail/CVE-2024-50232), [CVE-2024-50231](https://nvd.nist.gov/vuln/detail/CVE-2024-50231), [CVE-2024-50230](https://nvd.nist.gov/vuln/detail/CVE-2024-50230), [CVE-2024-50258](https://nvd.nist.gov/vuln/detail/CVE-2024-50258), [CVE-2024-50257](https://nvd.nist.gov/vuln/detail/CVE-2024-50257), [CVE-2024-50256](https://nvd.nist.gov/vuln/detail/CVE-2024-50256), [CVE-2024-50229](https://nvd.nist.gov/vuln/detail/CVE-2024-50229), [CVE-2024-50255](https://nvd.nist.gov/vuln/detail/CVE-2024-50255), [CVE-2024-50252](https://nvd.nist.gov/vuln/detail/CVE-2024-50252), [CVE-2024-50251](https://nvd.nist.gov/vuln/detail/CVE-2024-50251), [CVE-2024-50250](https://nvd.nist.gov/vuln/detail/CVE-2024-50250), [CVE-2024-50249](https://nvd.nist.gov/vuln/detail/CVE-2024-50249), [CVE-2024-50248](https://nvd.nist.gov/vuln/detail/CVE-2024-50248), [CVE-2024-50247](https://nvd.nist.gov/vuln/detail/CVE-2024-50247), [CVE-2024-50246](https://nvd.nist.gov/vuln/detail/CVE-2024-50246), [CVE-2024-50228](https://nvd.nist.gov/vuln/detail/CVE-2024-50228), [CVE-2024-50245](https://nvd.nist.gov/vuln/detail/CVE-2024-50245), [CVE-2024-50244](https://nvd.nist.gov/vuln/detail/CVE-2024-50244), [CVE-2024-50243](https://nvd.nist.gov/vuln/detail/CVE-2024-50243), [CVE-2024-50242](https://nvd.nist.gov/vuln/detail/CVE-2024-50242), [CVE-2024-50240](https://nvd.nist.gov/vuln/detail/CVE-2024-50240), [CVE-2024-50239](https://nvd.nist.gov/vuln/detail/CVE-2024-50239), [CVE-2024-50237](https://nvd.nist.gov/vuln/detail/CVE-2024-50237), [CVE-2024-50236](https://nvd.nist.gov/vuln/detail/CVE-2024-50236), [CVE-2024-50219](https://nvd.nist.gov/vuln/detail/CVE-2024-50219), [CVE-2024-50218](https://nvd.nist.gov/vuln/detail/CVE-2024-50218), [CVE-2024-50216](https://nvd.nist.gov/vuln/detail/CVE-2024-50216), [CVE-2024-50215](https://nvd.nist.gov/vuln/detail/CVE-2024-50215), [CVE-2024-50224](https://nvd.nist.gov/vuln/detail/CVE-2024-50224), [CVE-2024-50223](https://nvd.nist.gov/vuln/detail/CVE-2024-50223), [CVE-2024-50222](https://nvd.nist.gov/vuln/detail/CVE-2024-50222)) - curl ([CVE-2024-8096](https://nvd.nist.gov/vuln/detail/CVE-2024-8096)) - libarchive ([CVE-2024-26256](https://nvd.nist.gov/vuln/detail/CVE-2024-26256), [CVE-2024-48957](https://nvd.nist.gov/vuln/detail/CVE-2024-48957), [CVE-2024-48958](https://nvd.nist.gov/vuln/detail/CVE-2024-48958)) - nvidia-drivers ([CVE-2023-31022](https://nvd.nist.gov/vuln/detail/CVE-2023-31022), [CVE-2024-0074](https://nvd.nist.gov/vuln/detail/CVE-2024-0074), [CVE-2024-0075](https://nvd.nist.gov/vuln/detail/CVE-2024-0075), [CVE-2024-0078](https://nvd.nist.gov/vuln/detail/CVE-2024-0078), [CVE-2024-0126](https://nvd.nist.gov/vuln/detail/CVE-2024-0126)) - openssh ([CVE-2024-39894](https://nvd.nist.gov/vuln/detail/CVE-2024-39894)) - sysext-podman: containers-common ([CVE-2024-9341](https://nvd.nist.gov/vuln/detail/CVE-2024-9341)) - sysext-podman: containers-image ([CVE-2024-3727](https://nvd.nist.gov/vuln/detail/CVE-2024-3727)) - sysext-podman: podman ([CVE-2024-9407](https://nvd.nist.gov/vuln/detail/CVE-2024-9407)) #### Changes: - Added Proxmox Virtual Environment images ([scripts#1783](https://github.com/flatcar/scripts/pull/1783)) - The UEFI firmware has changed from raw (.fd) format to QCOW2 format. In addition, the amd64 firmware variables are now held in a 4MB image rather than a 2MB image. Note that this firmware is only intended for testing with QEMU. Do not use it in production. ([scripts#2434](https://github.com/flatcar/scripts/pull/2434)) - The arm64 UEFI firmware now supports Secure Boot. Be aware that this is not considered secure due to the lack of an SMM implementation, which is needed to protect the variable store. As above, this firmware should not be used in production anyway. ([scripts#2434](https://github.com/flatcar/scripts/pull/2434)) - grub 2.12-flatcar3: GRUB now includes many patches from Red Hat to support Secure Boot, as well as Flatcar's own patches. The version string includes a numbered "flatcar" suffix to track changes to these additional patches. This string can be seen in the GRUB menu. ([scripts#2431](https://github.com/flatcar/scripts/pull/2431)) - Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha ([flatcar/scripts#2390](https://github.com/flatcar/scripts/pull/2390)) #### Updates: - Ignition ([2.20.0](https://coreos.github.io/ignition/release-notes/#ignition-2200-2024-10-22)) - Linux ([6.6.60](https://lwn.net/Articles/997527) (includes [6.6.59](https://lwn.net/Articles/996689), [6.6.58](https://lwn.net/Articles/995132), [6.6.57](https://lwn.net/Articles/994634), [6.6.56](https://lwn.net/Articles/993600), [6.6.55](https://lwn.net/Articles/993599))) - Linux Firmware ([20241017](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241017)) - SDK: Go ([1.22.9](https://go.dev/doc/devel/release#go1.22.9)) - SDK: catalyst ([4.0.0](https://gitweb.gentoo.org/proj/catalyst.git/log/?h=4.0.0)) - SDK: crossdev ([20240921](https://gitweb.gentoo.org/proj/crossdev.git/log/?h=20240921)) - SDK: edk2-bin ([202408](https://github.com/tianocore/edk2/releases/tag/edk2-stable202408) (includes [202405](https://github.com/tianocore/edk2/releases/tag/edk2-stable202405), [202402](https://github.com/tianocore/edk2/releases/tag/edk2-stable202402), [202311](https://github.com/tianocore/edk2/releases/tag/edk2-stable202311), [202308](https://github.com/tianocore/edk2/releases/tag/edk2-stable202308), [202305](https://github.com/tianocore/edk2/releases/tag/edk2-stable202305), [202302](https://github.com/tianocore/edk2/releases/tag/edk2-stable202302), [202211](https://github.com/tianocore/edk2/releases/tag/edk2-stable202211), [202208](https://github.com/tianocore/edk2/releases/tag/edk2-stable202208), [202205](https://github.com/tianocore/edk2/releases/tag/edk2-stable202205))) - SDK: meson ([1.5.2](https://github.com/mesonbuild/meson/commits/1.5.2/)) - SDK: rust ([1.81.0](https://blog.rust-lang.org/2024/09/05/Rust-1.81.0.html)) - azure: chrony ([4.6](https://gitlab.com/chrony/chrony/-/blob/4.6/NEWS)) - base, dev: azure-vm-utils ([0.3.0](https://github.com/Azure/azure-vm-utils/releases/tag/v0.3.0)) - base, dev: binutils-config ([5.5.2](https://gitweb.gentoo.org/proj/binutils-config.git/log/?h=v5.5.2)) - base, dev: btrfs-progs ([6.10.1](https://github.com/kdave/btrfs-progs/blob/v6.10.1/CHANGES#L26-L38) (includes [6.10](https://github.com/kdave/btrfs-progs/blob/v6.10/CHANGES))) - base, dev: c-ares ([1.33.1](https://github.com/c-ares/c-ares/releases/tag/v1.33.1) (includes [1.33.0](https://github.com/c-ares/c-ares/releases/tag/v1.33.0), [1.32.3](https://github.com/c-ares/c-ares/releases/tag/v1.32.3), [1.32.2](https://github.com/c-ares/c-ares/releases/tag/v1.32.2), [1.32.1](https://github.com/c-ares/c-ares/releases/tag/v1.32.1), [1.32.0](https://github.com/c-ares/c-ares/releases/tag/v1.32.0), [1.31.0](https://github.com/c-ares/c-ares/releases/tag/v1.31.0), [1.30.0](https://github.com/c-ares/c-ares/releases/tag/v1.30.0))) - base, dev: cracklib ([2.10.2](https://github.com/cracklib/cracklib/releases/tag/v2.10.2) (includes [2.10.1](https://github.com/cracklib/cracklib/releases/tag/v2.10.1), [2.10.0](https://github.com/cracklib/cracklib/releases/tag/v2.10.0))) - base, dev: cryptsetup ([2.7.5](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.5/docs/v2.7.5-ReleaseNotes) (includes [2.7.4](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.4/docs/v2.7.4-ReleaseNotes), [2.7.3](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.3/docs/v2.7.3-ReleaseNotes))) - base, dev: curl ([8.10.1](https://curl.se/ch/8.10.1.html) (includes [8.10.0](https://curl.se/ch/8.10.0.html))) - base, dev: efivar ([39](https://github.com/rhboot/efivar/releases/tag/39)) - base, dev: gettext ([0.22.5](https://savannah.gnu.org/news/?id=10597)) - base, dev: git ([2.45.2](https://github.com/git/git/blob/v2.45.2/Documentation/RelNotes/2.45.2.txt) (includes [2.45.1](https://github.com/git/git/blob/v2.45.1/Documentation/RelNotes/2.45.1.txt), [2.45.0](https://github.com/git/git/blob/v2.45.0/Documentation/RelNotes/2.45.0.txt))) - base, dev: gnutls ([3.8.7.1](https://gitlab.com/gnutls/gnutls/-/blob/3.8.7/NEWS) (includes [3.8.6](https://gitlab.com/gnutls/gnutls/-/blob/3.8.6/NEWS))) - base, dev: gptfdisk ([1.0.10](https://sourceforge.net/p/gptfdisk/code/ci/53ac725a88a616b9f3395500d6e520aa04742fa5/tree/NEWS)) - base, dev: intel-microcode ([20240910_p20240915](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910)) - base, dev: kmod ([33](https://github.com/kmod-project/kmod/blob/v33/NEWS)) - base, dev: ldb ([2.8.1](https://gitlab.com/samba-team/samba/-/commit/6ca4df6374136d1d205de689618dc8fce5177d14) (includes [2.8.0](https://gitlab.com/samba-team/samba/-/commit/94f11c3c21bc3b8a34d376ab99becd2c6260af62))) - base, dev: libarchive ([3.7.6](https://github.com/libarchive/libarchive/releases/tag/v3.7.6) (includes [3.7.5](https://github.com/libarchive/libarchive/releases/tag/v3.7.5))) - base, dev: libassuan ([3.0.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=48ece8b1cf8b81bdf835db00079ae247742cd398;hb=0351ecfa4f35ad44684075abec153574986b11bd)) - base, dev: libgcrypt ([1.11.0](https://dev.gnupg.org/T7165)) - base, dev: libgpg-error ([1.50](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=b865ecc7197a4f60b1530958fbb25a92bdfdc3de;hb=bb732615daad9bba9026354ae90f0f5292ea4908)) - base, dev: libnl ([3.10.0](https://lists.infradead.org/pipermail/libnl/2024-July/002440.html)) - base, dev: libnvme ([1.10](https://github.com/linux-nvme/libnvme/releases/tag/v1.10)) - base, dev: liburing ([2.7](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.7) (includes [2.6](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.6), [2.5](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.5), [2.4](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.4))) - base, dev: nvme-cli ([2.10.2](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.2) (includes [2.10.1](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.1), [2.10](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10))) - base, dev: oniguruma ([6.9.9](https://github.com/kkos/oniguruma/releases/tag/v6.9.9)) - base, dev: openssh ([9.8_p1](https://www.openssh.com/txt/release-9.8)) - base, dev: pinentry ([1.3.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=a07d18953341a4eb65c9873e64c06bc7c642606d;hb=dd8894fa60c1f1c08ecc50ba4657580abc348347)) - base, dev: pkgconf ([2.3.0](https://github.com/pkgconf/pkgconf/blob/pkgconf-2.3.0/NEWS)) - base, dev: samba ([4.19.7](https://gitlab.com/samba-team/samba/-/blob/bce5c475d12fb75619bc85d176bfd40420b4fce8/WHATSNEW.txt)) - base, dev: selinux-base ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-base-policy ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-container ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-dbus ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-policykit ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-sssd ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-unconfined ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: socat ([1.8.0.0](https://repo.or.cz/socat.git/blob/2da070164d454971d5c970b5278e645051f0d0f7:/CHANGES)) - base, dev: sqlite ([3.46.1](https://www.sqlite.org/releaselog/3_46_1.html)) - base, dev: talloc ([2.4.2](https://gitlab.com/samba-team/samba/-/commit/f28966c1638806a5af1fa4e451b668af638491ce)) - base, dev: tcpdump ([4.99.5](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.5/CHANGES)) - base, dev: tdb ([1.4.10](https://gitlab.com/samba-team/samba/-/commit/5032ab712c6e9d6562cd10b1d840d2ee052d1d16)) - base, dev: tevent ([0.16.1](https://gitlab.com/samba-team/samba/-/commit/0ba05d5bbb1788b0b8cee26748bcda0c90c48baa) (includes [0.16.0](https://gitlab.com/samba-team/samba/-/commit/acd9248b13cba06d5b748f17aa9bc5d62079d9cc))) - base, dev: userspace-rcu ([0.14.1](https://lists.lttng.org/pipermail/lttng-dev/2024-August/030860.html)) - ca-certificates ([3.106](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html)) - containerd ([1.7.23](https://github.com/containerd/containerd/releases/tag/v1.7.23)) - dev: gdb ([15.2](https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00011.html)) - dev: gnuconfig ([20240728](https://git.savannah.gnu.org/cgit/config.git/log/?id=00b15927496058d23e6258a28d8996f87cf1f191)) - dev: iperf ([3.17.1](https://github.com/esnet/iperf/releases/tag/3.17.1) (includes [3.17](https://github.com/esnet/iperf/releases/tag/3.17))) - dev: libpipeline ([1.5.8](https://gitlab.com/libpipeline/libpipeline/-/blob/dd37cf76496b4b999509bd133657c1fc021e3a5f/NEWS.md)) - dev: man-db ([2.13.0](https://gitlab.com/man-db/man-db/-/releases/2.13.0)) - nvidia-drivers ([535.216.01](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-216-01/index.html)) - sysext-podman: aardvark-dns ([1.12.2](https://github.com/containers/aardvark-dns/releases/tag/v1.12.2) (includes [1.12.1](https://github.com/containers/aardvark-dns/releases/tag/v1.12.1), [1.12.0](https://github.com/containers/aardvark-dns/releases/tag/v1.12.0))) - sysext-podman: containers-common ([0.60.4](https://github.com/containers/common/releases/tag/v0.60.4) (includes [0.60.3](https://github.com/containers/common/releases/tag/v0.60.3), [0.60.2](https://github.com/containers/common/releases/tag/v0.60.2), [0.60.1](https://github.com/containers/common/releases/tag/v0.60.1), [0.60.0](https://github.com/containers/common/releases/tag/v0.60.0), [0.59.2](https://github.com/containers/common/releases/tag/v0.59.2))) - sysext-podman: containers-image ([5.32.2](https://github.com/containers/image/releases/tag/v5.32.2) (includes [5.32.1](https://github.com/containers/image/releases/tag/v5.32.1), [5.32.0](https://github.com/containers/image/releases/tag/v5.32.0), [5.31.0](https://github.com/containers/image/releases/tag/v5.31.0), [5.30.2](https://github.com/containers/image/releases/tag/v5.30.2), [5.30.1](https://github.com/containers/image/releases/tag/v5.30.1))) - sysext-podman: containers-storage ([1.55.0](https://github.com/containers/storage/releases/tag/v1.55.0) (includes [1.54.0](https://github.com/containers/storage/releases/tag/v1.54.0))) - sysext-podman: crun ([1.17](https://github.com/containers/crun/releases/tag/1.17) (includes [1.16.1](https://github.com/containers/crun/releases/tag/1.16.1), [1.16](https://github.com/containers/crun/releases/tag/1.16), [1.15](https://github.com/containers/crun/releases/tag/1.15), [1.14.4](https://github.com/containers/crun/releases/tag/1.14.4))) - sysext-podman: fuse-overlayfs ([1.14](https://github.com/containers/fuse-overlayfs/releases/tag/v1.14)) - sysext-podman: netavark ([1.12.2](https://github.com/containers/netavark/releases/tag/v1.12.2) (includes [1.12.1](https://github.com/containers/netavark/releases/tag/v1.12.1), [1.12.0](https://github.com/containers/netavark/releases/tag/v1.12.0), [1.11.0](https://github.com/containers/netavark/releases/tag/v1.11.0))) - sysext-podman: passt ([2024.09.06](https://archives.passt.top/passt-user/20240906171530.763b3179@elisabeth/T/#u)) - sysext-podman: podman ([5.2.4](https://github.com/containers/podman/releases/tag/v5.2.4) (includes [5.2.3](https://github.com/containers/podman/releases/tag/v5.2.3), [5.2.2](https://github.com/containers/podman/releases/tag/v5.2.2), [5.2.1](https://github.com/containers/podman/releases/tag/v5.2.1), [5.2.0](https://github.com/containers/podman/releases/tag/v5.2.0), [5.1.2](https://github.com/containers/podman/releases/tag/v5.1.2), [5.1.1](https://github.com/containers/podman/releases/tag/v5.1.1), [5.1.0](https://github.com/containers/podman/releases/tag/v5.1.0))) - sysext-python: idna ([3.10](https://github.com/kjd/idna/blob/v3.10/HISTORY.rst)) - sysext-python: more-itertools ([10.5.0](https://github.com/more-itertools/more-itertools/blob/v10.5.0/docs/versions.rst#1050)) - sysext-python: msgpack ([1.1.0](https://github.com/msgpack/msgpack-python/blob/v1.1.0/ChangeLog.rst#110)) - sysext-python: platformdirs ([4.3.6](https://github.com/tox-dev/platformdirs/releases/tag/4.3.6)) - sysext-python: rich ([13.8.1](https://github.com/Textualize/rich/releases/tag/v13.8.1)) - sysext-python: setuptools ([74.1.3](https://github.com/pypa/setuptools/blob/v74.1.3/NEWS.rst)) - sysext-python: trove-classifiers ([2024.9.12](https://github.com/pypa/trove-classifiers/releases/tag/2024.9.12)) - sysext-python: urllib3 ([2.2.3](https://github.com/urllib3/urllib3/releases/tag/2.2.3)) - vmware: open-vm-tools ([12.5.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.5.0)) - vmware: xmlsec ([1.3.4](https://github.com/lsh123/xmlsec/releases/tag/1.3.4)) Best, The Flatcar Container Linux Maintainers --- ### Communication #### Go/No-Go message for Matrix/Slack Go/No-Go Meeting for Alpha 4152.0.0, Beta 4116.1.0, Stable 4081.2.0 Pre-view images are available in https://bincache.flatcar-linux.net/images/amd64/$VERSION/ Tracking issue: https://github.com/flatcar/Flatcar/issues/1579 The Go/No-Go document is in our HackMD @flatcar namespace Link: https://hackmd.io/pM4_kk8fTFC9m9Yoj5tPOg?view Please give your Go/No-Go vote with 💚 for Go, ❌ for No-Go, and ✋ for Wait. Contributors & community feel free to put your suggestions, thoughts or comments on the document or here in the chat. @MAINTAINER @MAINTAINER @MAINTAINER #### Mastodon _The toot (from [@flatcar](https://hachyderm.io/@flatcar)) goes out after the changelog update has been published; it includes a link to the web changelog._ New Flatcar Alpha, Beta and Stable major releases now available! 📦 Many package updates: Docker 26, Curl, Podman sysext 🚀 New features: Proxmox support on Alpha 🔒 CVE fixes & security patches: Docker, Kernel, Curl 📜 Release notes at the usual spot: https://www.flatcar.org/releases/ #### Kubernetes Slack _This goes in the #flatcar channel_ Please welcome Flatcar releases of this month: - Alpha 4152.0.0 (new major) - Beta 4116.1.0 (major release) - Stable 4081.2.0 (major release) These releases include: 📦 Many package updates: Docker 26, Curl, Podman sysext 🚀 New features: Proxmox support on Alpha 🔒 CVE fixes & security patches: Docker, Kernel, Curl 📜 Release notes at the usual spot: https://www.flatcar.org/releases/