# Flatcar Container Linux Release - 16th of December 2024 ## Alpha 4186.0.0 - AMD64-usr - Platforms succeeded: all - Platforms failed: none - Platforms not tested: hetzner (capacity issue) - ARM64-usr - Platforms succeeded: all - Platforms failed: none - Platforms not tested: none VERDICT: _GO_ / _WAIT_ / _NO-GO_ ## Beta 4152.1.0 - AMD64-usr - Platforms succeeded: all - Platforms failed: none - Platforms not tested: none - ARM64-usr - Platforms succeeded: all - Platforms failed: none - Platforms not tested: Equinix Metal (capacity issue) VERDICT: _GO_ / _WAIT_ / _NO-GO_ ## Stable 4081.2.1 - AMD64-usr - Platforms succeeded: all - Platforms failed: none - Platforms not tested: none - ARM64-usr - Platforms succeeded: all - Platforms failed: none - Platforms not tested: Equinix Metal (capacity issue) VERDICT: _GO_ / _WAIT_ / _NO-GO_ ## LTS 3510.3.6 - AMD64-usr - Platforms succeeded: all but EM - Platforms failed: Equinix Metal on `cl.ignition.empty`: expected https://github.com/flatcar/scripts/pull/2222 - Platforms not tested: none - ARM64-usr - Platforms succeeded: all - Platforms failed: none - Platforms not tested: Equinix Metal (capacity issue) VERDICT: _GO_ / _WAIT_ / _NO-GO_ ## Communication --- #### Guidelines / Things to Remember - Release notes are used in a PR and will appear on https://www.flatcar.org/releases/ - [Announcement Message](#Announcement-Message) is posted in [Flatcar-Linux-user](https://groups.google.com/g/flatcar-linux-user). Make sure to post as “Flatcar Container Linux User”, not with your personal user (this can be selected when drafting the post). - Make sure the the LTS is referred to as `LTS-2021`, and not `LTS-2605` --- ### Announcement Message Subject: Announcing new releases Alpha 4186.0.0, Beta 4152.1.0, Stable 4081.2.1 and LTS 3510.3.6 Hello, We are pleased to announce a new Flatcar Container Linux release for all channels. #### Alpha 4186.0.0 _Changes since **Alpha 4152.0.0**_ #### Security fixes: - Linux ([CVE-2024-53103](https://nvd.nist.gov/vuln/detail/CVE-2024-53103), [CVE-2024-53104](https://nvd.nist.gov/vuln/detail/CVE-2024-53104), [CVE-2024-53088](https://nvd.nist.gov/vuln/detail/CVE-2024-53088), [CVE-2024-53082](https://nvd.nist.gov/vuln/detail/CVE-2024-53082), [CVE-2024-53083](https://nvd.nist.gov/vuln/detail/CVE-2024-53083), [CVE-2024-53081](https://nvd.nist.gov/vuln/detail/CVE-2024-53081), [CVE-2024-53060](https://nvd.nist.gov/vuln/detail/CVE-2024-53060), [CVE-2024-53068](https://nvd.nist.gov/vuln/detail/CVE-2024-53068), [CVE-2024-53066](https://nvd.nist.gov/vuln/detail/CVE-2024-53066), [CVE-2024-53063](https://nvd.nist.gov/vuln/detail/CVE-2024-53063), [CVE-2024-53072](https://nvd.nist.gov/vuln/detail/CVE-2024-53072), [CVE-2024-53070](https://nvd.nist.gov/vuln/detail/CVE-2024-53070), [CVE-2024-53061](https://nvd.nist.gov/vuln/detail/CVE-2024-53061), [CVE-2024-50302](https://nvd.nist.gov/vuln/detail/CVE-2024-50302), [CVE-2024-50301](https://nvd.nist.gov/vuln/detail/CVE-2024-50301), [CVE-2024-50296](https://nvd.nist.gov/vuln/detail/CVE-2024-50296), [CVE-2024-50295](https://nvd.nist.gov/vuln/detail/CVE-2024-50295), [CVE-2024-50294](https://nvd.nist.gov/vuln/detail/CVE-2024-50294), [CVE-2024-50292](https://nvd.nist.gov/vuln/detail/CVE-2024-50292), [CVE-2024-50290](https://nvd.nist.gov/vuln/detail/CVE-2024-50290), [CVE-2024-50300](https://nvd.nist.gov/vuln/detail/CVE-2024-50300), [CVE-2024-50299](https://nvd.nist.gov/vuln/detail/CVE-2024-50299), [CVE-2024-50298](https://nvd.nist.gov/vuln/detail/CVE-2024-50298), [CVE-2024-50275](https://nvd.nist.gov/vuln/detail/CVE-2024-50275), [CVE-2024-50284](https://nvd.nist.gov/vuln/detail/CVE-2024-50284), [CVE-2024-50283](https://nvd.nist.gov/vuln/detail/CVE-2024-50283), [CVE-2024-50282](https://nvd.nist.gov/vuln/detail/CVE-2024-50282), [CVE-2024-50280](https://nvd.nist.gov/vuln/detail/CVE-2024-50280), [CVE-2024-50279](https://nvd.nist.gov/vuln/detail/CVE-2024-50279), [CVE-2024-50278](https://nvd.nist.gov/vuln/detail/CVE-2024-50278), [CVE-2024-50287](https://nvd.nist.gov/vuln/detail/CVE-2024-50287), [CVE-2024-50286](https://nvd.nist.gov/vuln/detail/CVE-2024-50286), [CVE-2024-50285](https://nvd.nist.gov/vuln/detail/CVE-2024-50285), [CVE-2024-50276](https://nvd.nist.gov/vuln/detail/CVE-2024-50276), [CVE-2024-50273](https://nvd.nist.gov/vuln/detail/CVE-2024-50273), [CVE-2024-50272](https://nvd.nist.gov/vuln/detail/CVE-2024-50272), [CVE-2024-50271](https://nvd.nist.gov/vuln/detail/CVE-2024-50271), [CVE-2024-50269](https://nvd.nist.gov/vuln/detail/CVE-2024-50269), [CVE-2024-50268](https://nvd.nist.gov/vuln/detail/CVE-2024-50268), [CVE-2024-50267](https://nvd.nist.gov/vuln/detail/CVE-2024-50267), [CVE-2024-50264](https://nvd.nist.gov/vuln/detail/CVE-2024-50264), [CVE-2024-50265](https://nvd.nist.gov/vuln/detail/CVE-2024-50265), [CVE-2024-53102](https://nvd.nist.gov/vuln/detail/CVE-2024-53102), [CVE-2024-53101](https://nvd.nist.gov/vuln/detail/CVE-2024-53101), [CVE-2024-53100](https://nvd.nist.gov/vuln/detail/CVE-2024-53100), [CVE-2024-53099](https://nvd.nist.gov/vuln/detail/CVE-2024-53099), [CVE-2024-53097](https://nvd.nist.gov/vuln/detail/CVE-2024-53097), [CVE-2024-53095](https://nvd.nist.gov/vuln/detail/CVE-2024-53095), [CVE-2024-53094](https://nvd.nist.gov/vuln/detail/CVE-2024-53094), [CVE-2024-53093](https://nvd.nist.gov/vuln/detail/CVE-2024-53093), [CVE-2024-53091](https://nvd.nist.gov/vuln/detail/CVE-2024-53091), [CVE-2024-53079](https://nvd.nist.gov/vuln/detail/CVE-2024-53079), [CVE-2024-53135](https://nvd.nist.gov/vuln/detail/CVE-2024-53135), [CVE-2024-53134](https://nvd.nist.gov/vuln/detail/CVE-2024-53134), [CVE-2024-53131](https://nvd.nist.gov/vuln/detail/CVE-2024-53131), [CVE-2024-53130](https://nvd.nist.gov/vuln/detail/CVE-2024-53130), [CVE-2024-53129](https://nvd.nist.gov/vuln/detail/CVE-2024-53129), [CVE-2024-53140](https://nvd.nist.gov/vuln/detail/CVE-2024-53140), [CVE-2024-53139](https://nvd.nist.gov/vuln/detail/CVE-2024-53139), [CVE-2024-53138](https://nvd.nist.gov/vuln/detail/CVE-2024-53138), [CVE-2024-53136](https://nvd.nist.gov/vuln/detail/CVE-2024-53136), [CVE-2024-53126](https://nvd.nist.gov/vuln/detail/CVE-2024-53126), [CVE-2024-53127](https://nvd.nist.gov/vuln/detail/CVE-2024-53127), [CVE-2024-53113](https://nvd.nist.gov/vuln/detail/CVE-2024-53113), [CVE-2024-53112](https://nvd.nist.gov/vuln/detail/CVE-2024-53112), [CVE-2024-53110](https://nvd.nist.gov/vuln/detail/CVE-2024-53110), [CVE-2024-53109](https://nvd.nist.gov/vuln/detail/CVE-2024-53109), [CVE-2024-53108](https://nvd.nist.gov/vuln/detail/CVE-2024-53108), [CVE-2024-53123](https://nvd.nist.gov/vuln/detail/CVE-2024-53123), [CVE-2024-53122](https://nvd.nist.gov/vuln/detail/CVE-2024-53122), [CVE-2024-53121](https://nvd.nist.gov/vuln/detail/CVE-2024-53121), [CVE-2024-53120](https://nvd.nist.gov/vuln/detail/CVE-2024-53120), [CVE-2024-53119](https://nvd.nist.gov/vuln/detail/CVE-2024-53119), [CVE-2024-53106](https://nvd.nist.gov/vuln/detail/CVE-2024-53106)) - OpenSSL ([CVE-2024-2511](https://nvd.nist.gov/vuln/detail/CVE-2024-2511), [CVE-2024-4603](https://nvd.nist.gov/vuln/detail/CVE-2024-4603), [CVE-2024-4741](https://nvd.nist.gov/vuln/detail/CVE-2024-4741), [CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535), [CVE-2024-6119](https://nvd.nist.gov/vuln/detail/CVE-2024-6119), [CVE-2024-9143](https://nvd.nist.gov/vuln/detail/CVE-2024-9143)) - expat ([CVE-2024-50602](https://nvd.nist.gov/vuln/detail/CVE-2024-50602)) - sssd ([CVE-2023-3758](https://nvd.nist.gov/vuln/detail/CVE-2023-3758)) - wget ([CVE-2024-10524](https://nvd.nist.gov/vuln/detail/CVE-2024-10524)) #### Bug fixes: - Added qemu-guest-agent to ARM64 images ([flatcar/flatcar#1593](https://github.com/flatcar/Flatcar/issues/1593)) #### Changes: - Additional GRUB modules are no longer installed for UEFI platforms to save space and also because they cannot be loaded with Secure Boot enabled. This does not affect existing installations. - The GRUB modules on non-UEFI platforms are now compressed with xz rather than gzip to save even more space. This does not affect existing installations. - The VFIO kernel modules are now also available in ARM64 builds. ([flatcar/scripts#2484](https://github.com/flatcar/scripts/pull/2484)) - Enabled the gtp kernel module. This is the GPRS Tunneling Protocol datapath for usage in telecoms scenarios. ([flatcar/scripts#2504](https://github.com/flatcar/scripts/pull/2504)) #### Updates: - Linux ([6.6.65](https://lwn.net/Articles/1001739) (includes [6.6.64](https://lwn.net/Articles/1001438), [6.6.63](https://lwn.net/Articles/999110), [6.6.62](https://lwn.net/Articles/998450), [6.6.61](https://lwn.net/Articles/998150))) - Linux Firmware ([20241210](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241210) (includes [20241110](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241110))) - OpenSSL ([3.2.3](https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32)) - SDK: autoconf ([2.72](https://lists.gnu.org/archive/html/autotools-announce/2023-12/msg00003.html)) - SDK: cmake ([3.30.5](https://cmake.org/cmake/help/v3.30/release/3.30.html#id5)) - SDK: libpng ([1.6.44](https://github.com/pnggroup/libpng/blob/v1.6.44/CHANGES#L6199)) - SDK: perf ([6.11.7](https://kernelnewbies.org/Linux_6.11#Tracing.2C_perf_and_BPF)) - SDK: pkgcheck ([0.10.32](https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.32)) - SDK: portage ([3.0.66.1](https://github.com/gentoo/portage/blob/portage-3.0.66.1/NEWS#L9)) - SDK: Go ([1.22.10](https://go.dev/doc/devel/release#go1.22.10)) - azure: chrony ([4.6.1](https://gitlab.com/chrony/chrony/-/blob/4.6.1/NEWS)) - base, dev: azure-vm-utils ([0.4.0](https://github.com/Azure/azure-vm-utils/commits/v0.4.0/)) - base, dev: bind ([9.18.29](https://bind9.readthedocs.io/en/v9.18.29/notes.html#notes-for-bind-9-18-29)) - base, dev: bpftool ([7.4.0](https://github.com/libbpf/bpftool/releases/tag/v7.4.0)) - base, dev: btrfs-progs ([6.11](https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.11/CHANGES)) - base, dev: checkpolicy ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7)) - base, dev: expat ([2.6.4](https://github.com/libexpat/libexpat/blob/R_2_6_4/expat/Changes)) - base, dev: gawk ([5.3.1](https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00008.html)) - base, dev: gcc ([14.2.1_p20241116](https://gcc.gnu.org/gcc-14/changes.html)) - base, dev: iproute2 ([6.11.0](https://lore.kernel.org/netdev/20240915201831.164de47e@hermes.local/) (includes [6.10.0](https://lore.kernel.org/netdev/20240717090601.20b2871f@hermes.local/))) - base, dev: iputils ([20240905](https://github.com/iputils/iputils/releases/tag/20240905)) - base, dev: json-c ([0.18](https://github.com/json-c/json-c/blob/json-c-0.18-20240915/ChangeLog)) - base, dev: kexec-tools ([2.0.29](https://github.com/horms/kexec-tools/commits/v2.0.29/)) - base, dev: less ([668](https://www.greenwoodsoftware.com/less/news.668.html)) - base, dev: libarchive ([3.7.7](https://github.com/libarchive/libarchive/releases/tag/v3.7.7)) - base, dev: libnetfilter_conntrack ([1.1.0](https://lists.netfilter.org/pipermail/netfilter-announce/2024/000260.html)) - base, dev: libnftnl ([1.2.8](https://lists.netfilter.org/pipermail/netfilter-announce/2024/000261.html)) - base, dev: libselinux ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7)) - base, dev: libsepol ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7)) - base, dev: libuv ([1.49.2](https://github.com/libuv/libuv/releases/tag/v1.49.2) (includes [1.49.1](https://github.com/libuv/libuv/releases/tag/v1.49.1), [1.49.0](https://github.com/libuv/libuv/releases/tag/v1.49.0))) - base, dev: libxml2 ([2.12.8](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.8)) - base, dev: mokutil ([0.7.2](https://github.com/lcp/mokutil/commits/0.7.2/)) - base, dev: openldap ([2.6.6](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_6/CHANGES) (includes [2.6.5](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_5/CHANGES))) - base, dev: pax-utils ([1.3.8](https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.8)) - base, dev: util-linux ([2.40.2](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.2/Documentation/releases/v2.40.2-ReleaseNotes) (includes [2.40.1](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.1/Documentation/releases/v2.40.1-ReleaseNotes), [2.40.0](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40/Documentation/releases/v2.40-ReleaseNotes))) - base, dev: wget ([1.25.0](https://lists.gnu.org/archive/html/info-gnu/2024-11/msg00000.html)) - base, dev: xfsprogs ([6.10.1](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.10.1) (includes [6.10.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.10.0), [6.9.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.9.0))) - base, dev: xz-utils ([5.6.3](https://github.com/tukaani-project/xz/releases/tag/v5.6.3)) - ca-certificates ([3.107](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html)) - dev: gentoolkit ([0.6.8](https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.8)) - docker: docker ([27.3.1](https://github.com/moby/moby/releases/tag/v27.3.1)) - docker: docker-cli ([27.3.1](https://github.com/moby/moby/releases/tag/v27.3.1)) - sssd ([2.9.5](https://sssd.io/release-notes/sssd-2.9.5.html) (includes [2.9.4](https://sssd.io/release-notes/sssd-2.9.4.html), [2.9.3](https://sssd.io/release-notes/sssd-2.9.3.html), [2.9.2](https://sssd.io/release-notes/sssd-2.9.2.html), [2.9.1](https://sssd.io/release-notes/sssd-2.9.1.html), [2.9.0](https://sssd.io/release-notes/sssd-2.9.0.html), [2.8.0](https://sssd.io/release-notes/sssd-2.8.0.html), [2.7.0](https://sssd.io/release-notes/sssd-2.7.0.html), [2.6.0](https://sssd.io/release-notes/sssd-2.6.0.html), [2.5.0](https://sssd.io/release-notes/sssd-2.5.0.html), [2.4.0](https://sssd.io/release-notes/sssd-2.4.0.html)) - sysext-python: cachecontrol ([0.14.1](https://github.com/psf/cachecontrol/releases/tag/v0.14.1)) - sysext-python: charset-normalizer ([3.4.0](https://github.com/jawah/charset_normalizer/releases/tag/3.4.0)) - sysext-python: distlib ([0.3.9](https://github.com/pypa/distlib/blob/0.3.9/CHANGES.rst)) - sysext-python: jaraco-functools ([4.1.0](https://github.com/jaraco/jaraco.functools/blob/v4.1.0/NEWS.rsto)) - sysext-python: packaging ([24.2](https://github.com/pypa/packaging/releases/tag/24.2)) - sysext-python: pyproject-hooks ([1.2.0](https://github.com/pypa/pyproject-hooks/blob/v1.2.0/docs/changelog.rst)) - sysext-python: resolvelib ([1.1.0](https://github.com/sarugaku/resolvelib/blob/1.1.0/CHANGELOG.rst)) - sysext-python: rich ([13.9.3](https://github.com/Textualize/rich/releases/tag/v13.9.3)) - sysext-python: trove-classifiers ([2024.10.21.16](https://github.com/pypa/trove-classifiers/commits/2024.10.21.16/)) - sysext-python: truststore ([0.10.0](https://github.com/sethmlarson/truststore/blob/v0.10.0/CHANGELOG.md)) - vmware: libmspack ([1.11](https://github.com/kyz/libmspack/commits/v1.11/libmspack)) - vmware: xmlsec ([1.3.5](https://github.com/lsh123/xmlsec/releases/tag/1.3.5)) #### Beta 4152.1.0 _Changes since **Beta 4116.1.0**_ #### Security fixes: - Linux ([CVE-2024-53103](https://nvd.nist.gov/vuln/detail/CVE-2024-53103), [CVE-2024-53104](https://nvd.nist.gov/vuln/detail/CVE-2024-53104), [CVE-2024-53088](https://nvd.nist.gov/vuln/detail/CVE-2024-53088), [CVE-2024-53082](https://nvd.nist.gov/vuln/detail/CVE-2024-53082), [CVE-2024-53083](https://nvd.nist.gov/vuln/detail/CVE-2024-53083), [CVE-2024-53081](https://nvd.nist.gov/vuln/detail/CVE-2024-53081), [CVE-2024-53060](https://nvd.nist.gov/vuln/detail/CVE-2024-53060), [CVE-2024-53068](https://nvd.nist.gov/vuln/detail/CVE-2024-53068), [CVE-2024-53066](https://nvd.nist.gov/vuln/detail/CVE-2024-53066), [CVE-2024-53063](https://nvd.nist.gov/vuln/detail/CVE-2024-53063), [CVE-2024-53072](https://nvd.nist.gov/vuln/detail/CVE-2024-53072), [CVE-2024-53070](https://nvd.nist.gov/vuln/detail/CVE-2024-53070), [CVE-2024-53061](https://nvd.nist.gov/vuln/detail/CVE-2024-53061), [CVE-2024-50302](https://nvd.nist.gov/vuln/detail/CVE-2024-50302), [CVE-2024-50301](https://nvd.nist.gov/vuln/detail/CVE-2024-50301), [CVE-2024-50296](https://nvd.nist.gov/vuln/detail/CVE-2024-50296), [CVE-2024-50295](https://nvd.nist.gov/vuln/detail/CVE-2024-50295), [CVE-2024-50294](https://nvd.nist.gov/vuln/detail/CVE-2024-50294), [CVE-2024-50292](https://nvd.nist.gov/vuln/detail/CVE-2024-50292), [CVE-2024-50290](https://nvd.nist.gov/vuln/detail/CVE-2024-50290), [CVE-2024-50300](https://nvd.nist.gov/vuln/detail/CVE-2024-50300), [CVE-2024-50299](https://nvd.nist.gov/vuln/detail/CVE-2024-50299), [CVE-2024-50298](https://nvd.nist.gov/vuln/detail/CVE-2024-50298), [CVE-2024-50275](https://nvd.nist.gov/vuln/detail/CVE-2024-50275), [CVE-2024-50284](https://nvd.nist.gov/vuln/detail/CVE-2024-50284), [CVE-2024-50283](https://nvd.nist.gov/vuln/detail/CVE-2024-50283), [CVE-2024-50282](https://nvd.nist.gov/vuln/detail/CVE-2024-50282), [CVE-2024-50280](https://nvd.nist.gov/vuln/detail/CVE-2024-50280), [CVE-2024-50279](https://nvd.nist.gov/vuln/detail/CVE-2024-50279), [CVE-2024-50278](https://nvd.nist.gov/vuln/detail/CVE-2024-50278), [CVE-2024-50287](https://nvd.nist.gov/vuln/detail/CVE-2024-50287), [CVE-2024-50286](https://nvd.nist.gov/vuln/detail/CVE-2024-50286), [CVE-2024-50285](https://nvd.nist.gov/vuln/detail/CVE-2024-50285), [CVE-2024-50276](https://nvd.nist.gov/vuln/detail/CVE-2024-50276), [CVE-2024-50273](https://nvd.nist.gov/vuln/detail/CVE-2024-50273), [CVE-2024-50272](https://nvd.nist.gov/vuln/detail/CVE-2024-50272), [CVE-2024-50271](https://nvd.nist.gov/vuln/detail/CVE-2024-50271), [CVE-2024-50269](https://nvd.nist.gov/vuln/detail/CVE-2024-50269), [CVE-2024-50268](https://nvd.nist.gov/vuln/detail/CVE-2024-50268), [CVE-2024-50267](https://nvd.nist.gov/vuln/detail/CVE-2024-50267), [CVE-2024-50264](https://nvd.nist.gov/vuln/detail/CVE-2024-50264), [CVE-2024-50265](https://nvd.nist.gov/vuln/detail/CVE-2024-50265), [CVE-2024-53102](https://nvd.nist.gov/vuln/detail/CVE-2024-53102), [CVE-2024-53101](https://nvd.nist.gov/vuln/detail/CVE-2024-53101), [CVE-2024-53100](https://nvd.nist.gov/vuln/detail/CVE-2024-53100), [CVE-2024-53099](https://nvd.nist.gov/vuln/detail/CVE-2024-53099), [CVE-2024-53097](https://nvd.nist.gov/vuln/detail/CVE-2024-53097), [CVE-2024-53095](https://nvd.nist.gov/vuln/detail/CVE-2024-53095), [CVE-2024-53094](https://nvd.nist.gov/vuln/detail/CVE-2024-53094), [CVE-2024-53093](https://nvd.nist.gov/vuln/detail/CVE-2024-53093), [CVE-2024-53091](https://nvd.nist.gov/vuln/detail/CVE-2024-53091), [CVE-2024-53079](https://nvd.nist.gov/vuln/detail/CVE-2024-53079), [CVE-2024-53135](https://nvd.nist.gov/vuln/detail/CVE-2024-53135), [CVE-2024-53134](https://nvd.nist.gov/vuln/detail/CVE-2024-53134), [CVE-2024-53131](https://nvd.nist.gov/vuln/detail/CVE-2024-53131), [CVE-2024-53130](https://nvd.nist.gov/vuln/detail/CVE-2024-53130), [CVE-2024-53129](https://nvd.nist.gov/vuln/detail/CVE-2024-53129), [CVE-2024-53140](https://nvd.nist.gov/vuln/detail/CVE-2024-53140), [CVE-2024-53139](https://nvd.nist.gov/vuln/detail/CVE-2024-53139), [CVE-2024-53138](https://nvd.nist.gov/vuln/detail/CVE-2024-53138), [CVE-2024-53136](https://nvd.nist.gov/vuln/detail/CVE-2024-53136), [CVE-2024-53126](https://nvd.nist.gov/vuln/detail/CVE-2024-53126), [CVE-2024-53127](https://nvd.nist.gov/vuln/detail/CVE-2024-53127), [CVE-2024-53113](https://nvd.nist.gov/vuln/detail/CVE-2024-53113), [CVE-2024-53112](https://nvd.nist.gov/vuln/detail/CVE-2024-53112), [CVE-2024-53110](https://nvd.nist.gov/vuln/detail/CVE-2024-53110), [CVE-2024-53109](https://nvd.nist.gov/vuln/detail/CVE-2024-53109), [CVE-2024-53108](https://nvd.nist.gov/vuln/detail/CVE-2024-53108), [CVE-2024-53123](https://nvd.nist.gov/vuln/detail/CVE-2024-53123), [CVE-2024-53122](https://nvd.nist.gov/vuln/detail/CVE-2024-53122), [CVE-2024-53121](https://nvd.nist.gov/vuln/detail/CVE-2024-53121), [CVE-2024-53120](https://nvd.nist.gov/vuln/detail/CVE-2024-53120), [CVE-2024-53119](https://nvd.nist.gov/vuln/detail/CVE-2024-53119), [CVE-2024-53106](https://nvd.nist.gov/vuln/detail/CVE-2024-53106)) - OpenSSL ([CVE-2024-2511](https://nvd.nist.gov/vuln/detail/CVE-2024-2511), [CVE-2024-4603](https://nvd.nist.gov/vuln/detail/CVE-2024-4603), [CVE-2024-4741](https://nvd.nist.gov/vuln/detail/CVE-2024-4741), [CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535), [CVE-2024-6119](https://nvd.nist.gov/vuln/detail/CVE-2024-6119), [CVE-2024-9143](https://nvd.nist.gov/vuln/detail/CVE-2024-9143)) - curl ([CVE-2024-8096](https://nvd.nist.gov/vuln/detail/CVE-2024-8096)) - libarchive ([CVE-2024-26256](https://nvd.nist.gov/vuln/detail/CVE-2024-26256), [CVE-2024-48957](https://nvd.nist.gov/vuln/detail/CVE-2024-48957), [CVE-2024-48958](https://nvd.nist.gov/vuln/detail/CVE-2024-48958)) - nvidia-drivers ([CVE-2023-31022](https://nvd.nist.gov/vuln/detail/CVE-2023-31022), [CVE-2024-0074](https://nvd.nist.gov/vuln/detail/CVE-2024-0074), [CVE-2024-0075](https://nvd.nist.gov/vuln/detail/CVE-2024-0075), [CVE-2024-0078](https://nvd.nist.gov/vuln/detail/CVE-2024-0078), [CVE-2024-0126](https://nvd.nist.gov/vuln/detail/CVE-2024-0126)) - openssh ([CVE-2024-39894](https://nvd.nist.gov/vuln/detail/CVE-2024-39894)) - sysext-podman: containers-common ([CVE-2024-9341](https://nvd.nist.gov/vuln/detail/CVE-2024-9341)) - sysext-podman: containers-image ([CVE-2024-3727](https://nvd.nist.gov/vuln/detail/CVE-2024-3727)) - sysext-podman: podman ([CVE-2024-9407](https://nvd.nist.gov/vuln/detail/CVE-2024-9407)) #### Bug fixes: - Added qemu-guest-agent to ARM64 images ([flatcar/flatcar#1593](https://github.com/flatcar/Flatcar/issues/1593)) #### Changes: - Added Proxmox Virtual Environment images ([scripts#1783](https://github.com/flatcar/scripts/pull/1783)) - The UEFI firmware has changed from raw (.fd) format to QCOW2 format. In addition, the amd64 firmware variables are now held in a 4MB image rather than a 2MB image. Note that this firmware is only intended for testing with QEMU. Do not use it in production. ([scripts#2434](https://github.com/flatcar/scripts/pull/2434)) - The arm64 UEFI firmware now supports Secure Boot. Be aware that this is not considered secure due to the lack of an SMM implementation, which is needed to protect the variable store. As above, this firmware should not be used in production anyway. ([scripts#2434](https://github.com/flatcar/scripts/pull/2434)) - grub 2.12-flatcar3: GRUB now includes many patches from Red Hat to support Secure Boot, as well as Flatcar's own patches. The version string includes a numbered "flatcar" suffix to track changes to these additional patches. This string can be seen in the GRUB menu. ([scripts#2431](https://github.com/flatcar/scripts/pull/2431)) #### Updates: - Ignition ([2.20.0](https://coreos.github.io/ignition/release-notes/#ignition-2200-2024-10-22)) - Linux ([6.6.65](https://lwn.net/Articles/1001739) (includes [6.6.64](https://lwn.net/Articles/1001438), [6.6.63](https://lwn.net/Articles/999110), [6.6.62](https://lwn.net/Articles/998450), [6.6.61](https://lwn.net/Articles/998150))) - Linux Firmware ([20241017](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20241017)) - OpenSSL ([3.2.3](https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32)) - SDK: Go ([1.22.9](https://go.dev/doc/devel/release#go1.22.9)) - SDK: catalyst ([4.0.0](https://gitweb.gentoo.org/proj/catalyst.git/log/?h=4.0.0)) - SDK: crossdev ([20240921](https://gitweb.gentoo.org/proj/crossdev.git/log/?h=20240921)) - SDK: edk2-bin ([202408](https://github.com/tianocore/edk2/releases/tag/edk2-stable202408) (includes [202405](https://github.com/tianocore/edk2/releases/tag/edk2-stable202405), [202402](https://github.com/tianocore/edk2/releases/tag/edk2-stable202402), [202311](https://github.com/tianocore/edk2/releases/tag/edk2-stable202311), [202308](https://github.com/tianocore/edk2/releases/tag/edk2-stable202308), [202305](https://github.com/tianocore/edk2/releases/tag/edk2-stable202305), [202302](https://github.com/tianocore/edk2/releases/tag/edk2-stable202302), [202211](https://github.com/tianocore/edk2/releases/tag/edk2-stable202211), [202208](https://github.com/tianocore/edk2/releases/tag/edk2-stable202208), [202205](https://github.com/tianocore/edk2/releases/tag/edk2-stable202205))) - SDK: meson ([1.5.2](https://github.com/mesonbuild/meson/commits/1.5.2/)) - SDK: rust ([1.81.0](https://blog.rust-lang.org/2024/09/05/Rust-1.81.0.html)) - azure: chrony ([4.6](https://gitlab.com/chrony/chrony/-/blob/4.6/NEWS)) - base, dev: azure-vm-utils ([0.3.0](https://github.com/Azure/azure-vm-utils/releases/tag/v0.3.0)) - base, dev: binutils-config ([5.5.2](https://gitweb.gentoo.org/proj/binutils-config.git/log/?h=v5.5.2)) - base, dev: btrfs-progs ([6.10.1](https://github.com/kdave/btrfs-progs/blob/v6.10.1/CHANGES#L26-L38) (includes [6.10](https://github.com/kdave/btrfs-progs/blob/v6.10/CHANGES))) - base, dev: c-ares ([1.33.1](https://github.com/c-ares/c-ares/releases/tag/v1.33.1) (includes [1.33.0](https://github.com/c-ares/c-ares/releases/tag/v1.33.0), [1.32.3](https://github.com/c-ares/c-ares/releases/tag/v1.32.3), [1.32.2](https://github.com/c-ares/c-ares/releases/tag/v1.32.2), [1.32.1](https://github.com/c-ares/c-ares/releases/tag/v1.32.1), [1.32.0](https://github.com/c-ares/c-ares/releases/tag/v1.32.0), [1.31.0](https://github.com/c-ares/c-ares/releases/tag/v1.31.0), [1.30.0](https://github.com/c-ares/c-ares/releases/tag/v1.30.0))) - base, dev: cracklib ([2.10.2](https://github.com/cracklib/cracklib/releases/tag/v2.10.2) (includes [2.10.1](https://github.com/cracklib/cracklib/releases/tag/v2.10.1), [2.10.0](https://github.com/cracklib/cracklib/releases/tag/v2.10.0))) - base, dev: cryptsetup ([2.7.5](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.5/docs/v2.7.5-ReleaseNotes) (includes [2.7.4](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.4/docs/v2.7.4-ReleaseNotes), [2.7.3](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.3/docs/v2.7.3-ReleaseNotes))) - base, dev: curl ([8.10.1](https://curl.se/ch/8.10.1.html) (includes [8.10.0](https://curl.se/ch/8.10.0.html))) - base, dev: efivar ([39](https://github.com/rhboot/efivar/releases/tag/39)) - base, dev: gettext ([0.22.5](https://savannah.gnu.org/news/?id=10597)) - base, dev: git ([2.45.2](https://github.com/git/git/blob/v2.45.2/Documentation/RelNotes/2.45.2.txt) (includes [2.45.1](https://github.com/git/git/blob/v2.45.1/Documentation/RelNotes/2.45.1.txt), [2.45.0](https://github.com/git/git/blob/v2.45.0/Documentation/RelNotes/2.45.0.txt))) - base, dev: gnutls ([3.8.7.1](https://gitlab.com/gnutls/gnutls/-/blob/3.8.7/NEWS) (includes [3.8.6](https://gitlab.com/gnutls/gnutls/-/blob/3.8.6/NEWS))) - base, dev: gptfdisk ([1.0.10](https://sourceforge.net/p/gptfdisk/code/ci/53ac725a88a616b9f3395500d6e520aa04742fa5/tree/NEWS)) - base, dev: intel-microcode ([20240910_p20240915](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910)) - base, dev: kmod ([33](https://github.com/kmod-project/kmod/blob/v33/NEWS)) - base, dev: ldb ([2.8.1](https://gitlab.com/samba-team/samba/-/commit/6ca4df6374136d1d205de689618dc8fce5177d14) (includes [2.8.0](https://gitlab.com/samba-team/samba/-/commit/94f11c3c21bc3b8a34d376ab99becd2c6260af62))) - base, dev: libarchive ([3.7.6](https://github.com/libarchive/libarchive/releases/tag/v3.7.6) (includes [3.7.5](https://github.com/libarchive/libarchive/releases/tag/v3.7.5))) - base, dev: libassuan ([3.0.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=48ece8b1cf8b81bdf835db00079ae247742cd398;hb=0351ecfa4f35ad44684075abec153574986b11bd)) - base, dev: libgcrypt ([1.11.0](https://dev.gnupg.org/T7165)) - base, dev: libgpg-error ([1.50](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=b865ecc7197a4f60b1530958fbb25a92bdfdc3de;hb=bb732615daad9bba9026354ae90f0f5292ea4908)) - base, dev: libnl ([3.10.0](https://lists.infradead.org/pipermail/libnl/2024-July/002440.html)) - base, dev: libnvme ([1.10](https://github.com/linux-nvme/libnvme/releases/tag/v1.10)) - base, dev: liburing ([2.7](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.7) (includes [2.6](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.6), [2.5](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.5), [2.4](https://git.kernel.dk/cgit/liburing/tree/CHANGELOG?h=liburing-2.4))) - base, dev: nvme-cli ([2.10.2](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.2) (includes [2.10.1](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10.1), [2.10](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.10))) - base, dev: oniguruma ([6.9.9](https://github.com/kkos/oniguruma/releases/tag/v6.9.9)) - base, dev: openssh ([9.8_p1](https://www.openssh.com/txt/release-9.8)) - base, dev: pinentry ([1.3.1](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=a07d18953341a4eb65c9873e64c06bc7c642606d;hb=dd8894fa60c1f1c08ecc50ba4657580abc348347)) - base, dev: pkgconf ([2.3.0](https://github.com/pkgconf/pkgconf/blob/pkgconf-2.3.0/NEWS)) - base, dev: samba ([4.19.7](https://gitlab.com/samba-team/samba/-/blob/bce5c475d12fb75619bc85d176bfd40420b4fce8/WHATSNEW.txt)) - base, dev: selinux-base ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-base-policy ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-container ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-dbus ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-policykit ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-sssd ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: selinux-unconfined ([2.20240916](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20240916)) - base, dev: socat ([1.8.0.0](https://repo.or.cz/socat.git/blob/2da070164d454971d5c970b5278e645051f0d0f7:/CHANGES)) - base, dev: sqlite ([3.46.1](https://www.sqlite.org/releaselog/3_46_1.html)) - base, dev: talloc ([2.4.2](https://gitlab.com/samba-team/samba/-/commit/f28966c1638806a5af1fa4e451b668af638491ce)) - base, dev: tcpdump ([4.99.5](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.5/CHANGES)) - base, dev: tdb ([1.4.10](https://gitlab.com/samba-team/samba/-/commit/5032ab712c6e9d6562cd10b1d840d2ee052d1d16)) - base, dev: tevent ([0.16.1](https://gitlab.com/samba-team/samba/-/commit/0ba05d5bbb1788b0b8cee26748bcda0c90c48baa) (includes [0.16.0](https://gitlab.com/samba-team/samba/-/commit/acd9248b13cba06d5b748f17aa9bc5d62079d9cc))) - base, dev: userspace-rcu ([0.14.1](https://lists.lttng.org/pipermail/lttng-dev/2024-August/030860.html)) - ca-certificates ([3.107](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html)) - containerd ([1.7.23](https://github.com/containerd/containerd/releases/tag/v1.7.23)) - dev: gdb ([15.2](https://lists.gnu.org/archive/html/info-gnu/2024-09/msg00011.html)) - dev: gnuconfig ([20240728](https://git.savannah.gnu.org/cgit/config.git/log/?id=00b15927496058d23e6258a28d8996f87cf1f191)) - dev: iperf ([3.17.1](https://github.com/esnet/iperf/releases/tag/3.17.1) (includes [3.17](https://github.com/esnet/iperf/releases/tag/3.17))) - dev: libpipeline ([1.5.8](https://gitlab.com/libpipeline/libpipeline/-/blob/dd37cf76496b4b999509bd133657c1fc021e3a5f/NEWS.md)) - dev: man-db ([2.13.0](https://gitlab.com/man-db/man-db/-/releases/2.13.0)) - nvidia-drivers ([535.216.01](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-216-01/index.html)) - sysext-podman: aardvark-dns ([1.12.2](https://github.com/containers/aardvark-dns/releases/tag/v1.12.2) (includes [1.12.1](https://github.com/containers/aardvark-dns/releases/tag/v1.12.1), [1.12.0](https://github.com/containers/aardvark-dns/releases/tag/v1.12.0))) - sysext-podman: containers-common ([0.60.4](https://github.com/containers/common/releases/tag/v0.60.4) (includes [0.60.3](https://github.com/containers/common/releases/tag/v0.60.3), [0.60.2](https://github.com/containers/common/releases/tag/v0.60.2), [0.60.1](https://github.com/containers/common/releases/tag/v0.60.1), [0.60.0](https://github.com/containers/common/releases/tag/v0.60.0), [0.59.2](https://github.com/containers/common/releases/tag/v0.59.2))) - sysext-podman: containers-image ([5.32.2](https://github.com/containers/image/releases/tag/v5.32.2) (includes [5.32.1](https://github.com/containers/image/releases/tag/v5.32.1), [5.32.0](https://github.com/containers/image/releases/tag/v5.32.0), [5.31.0](https://github.com/containers/image/releases/tag/v5.31.0), [5.30.2](https://github.com/containers/image/releases/tag/v5.30.2), [5.30.1](https://github.com/containers/image/releases/tag/v5.30.1))) - sysext-podman: containers-storage ([1.55.0](https://github.com/containers/storage/releases/tag/v1.55.0) (includes [1.54.0](https://github.com/containers/storage/releases/tag/v1.54.0))) - sysext-podman: crun ([1.17](https://github.com/containers/crun/releases/tag/1.17) (includes [1.16.1](https://github.com/containers/crun/releases/tag/1.16.1), [1.16](https://github.com/containers/crun/releases/tag/1.16), [1.15](https://github.com/containers/crun/releases/tag/1.15), [1.14.4](https://github.com/containers/crun/releases/tag/1.14.4))) - sysext-podman: fuse-overlayfs ([1.14](https://github.com/containers/fuse-overlayfs/releases/tag/v1.14)) - sysext-podman: netavark ([1.12.2](https://github.com/containers/netavark/releases/tag/v1.12.2) (includes [1.12.1](https://github.com/containers/netavark/releases/tag/v1.12.1), [1.12.0](https://github.com/containers/netavark/releases/tag/v1.12.0), [1.11.0](https://github.com/containers/netavark/releases/tag/v1.11.0))) - sysext-podman: passt ([2024.09.06](https://archives.passt.top/passt-user/20240906171530.763b3179@elisabeth/T/#u)) - sysext-podman: podman ([5.2.4](https://github.com/containers/podman/releases/tag/v5.2.4) (includes [5.2.3](https://github.com/containers/podman/releases/tag/v5.2.3), [5.2.2](https://github.com/containers/podman/releases/tag/v5.2.2), [5.2.1](https://github.com/containers/podman/releases/tag/v5.2.1), [5.2.0](https://github.com/containers/podman/releases/tag/v5.2.0), [5.1.2](https://github.com/containers/podman/releases/tag/v5.1.2), [5.1.1](https://github.com/containers/podman/releases/tag/v5.1.1), [5.1.0](https://github.com/containers/podman/releases/tag/v5.1.0))) - sysext-python: idna ([3.10](https://github.com/kjd/idna/blob/v3.10/HISTORY.rst)) - sysext-python: more-itertools ([10.5.0](https://github.com/more-itertools/more-itertools/blob/v10.5.0/docs/versions.rst#1050)) - sysext-python: msgpack ([1.1.0](https://github.com/msgpack/msgpack-python/blob/v1.1.0/ChangeLog.rst#110)) - sysext-python: platformdirs ([4.3.6](https://github.com/tox-dev/platformdirs/releases/tag/4.3.6)) - sysext-python: rich ([13.8.1](https://github.com/Textualize/rich/releases/tag/v13.8.1)) - sysext-python: setuptools ([74.1.3](https://github.com/pypa/setuptools/blob/v74.1.3/NEWS.rst)) - sysext-python: trove-classifiers ([2024.9.12](https://github.com/pypa/trove-classifiers/releases/tag/2024.9.12)) - sysext-python: urllib3 ([2.2.3](https://github.com/urllib3/urllib3/releases/tag/2.2.3)) - vmware: open-vm-tools ([12.5.0](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.5.0)) - vmware: xmlsec ([1.3.4](https://github.com/lsh123/xmlsec/releases/tag/1.3.4)) _Changes since **Alpha 4152.0.0**_ #### Security fixes: - Linux ([CVE-2024-53103](https://nvd.nist.gov/vuln/detail/CVE-2024-53103), [CVE-2024-53104](https://nvd.nist.gov/vuln/detail/CVE-2024-53104), [CVE-2024-53088](https://nvd.nist.gov/vuln/detail/CVE-2024-53088), [CVE-2024-53082](https://nvd.nist.gov/vuln/detail/CVE-2024-53082), [CVE-2024-53083](https://nvd.nist.gov/vuln/detail/CVE-2024-53083), [CVE-2024-53081](https://nvd.nist.gov/vuln/detail/CVE-2024-53081), [CVE-2024-53060](https://nvd.nist.gov/vuln/detail/CVE-2024-53060), [CVE-2024-53068](https://nvd.nist.gov/vuln/detail/CVE-2024-53068), [CVE-2024-53066](https://nvd.nist.gov/vuln/detail/CVE-2024-53066), [CVE-2024-53063](https://nvd.nist.gov/vuln/detail/CVE-2024-53063), [CVE-2024-53072](https://nvd.nist.gov/vuln/detail/CVE-2024-53072), [CVE-2024-53070](https://nvd.nist.gov/vuln/detail/CVE-2024-53070), [CVE-2024-53061](https://nvd.nist.gov/vuln/detail/CVE-2024-53061), [CVE-2024-50302](https://nvd.nist.gov/vuln/detail/CVE-2024-50302), [CVE-2024-50301](https://nvd.nist.gov/vuln/detail/CVE-2024-50301), [CVE-2024-50296](https://nvd.nist.gov/vuln/detail/CVE-2024-50296), [CVE-2024-50295](https://nvd.nist.gov/vuln/detail/CVE-2024-50295), [CVE-2024-50294](https://nvd.nist.gov/vuln/detail/CVE-2024-50294), [CVE-2024-50292](https://nvd.nist.gov/vuln/detail/CVE-2024-50292), [CVE-2024-50290](https://nvd.nist.gov/vuln/detail/CVE-2024-50290), [CVE-2024-50300](https://nvd.nist.gov/vuln/detail/CVE-2024-50300), [CVE-2024-50299](https://nvd.nist.gov/vuln/detail/CVE-2024-50299), [CVE-2024-50298](https://nvd.nist.gov/vuln/detail/CVE-2024-50298), [CVE-2024-50275](https://nvd.nist.gov/vuln/detail/CVE-2024-50275), [CVE-2024-50284](https://nvd.nist.gov/vuln/detail/CVE-2024-50284), [CVE-2024-50283](https://nvd.nist.gov/vuln/detail/CVE-2024-50283), [CVE-2024-50282](https://nvd.nist.gov/vuln/detail/CVE-2024-50282), [CVE-2024-50280](https://nvd.nist.gov/vuln/detail/CVE-2024-50280), [CVE-2024-50279](https://nvd.nist.gov/vuln/detail/CVE-2024-50279), [CVE-2024-50278](https://nvd.nist.gov/vuln/detail/CVE-2024-50278), [CVE-2024-50287](https://nvd.nist.gov/vuln/detail/CVE-2024-50287), [CVE-2024-50286](https://nvd.nist.gov/vuln/detail/CVE-2024-50286), [CVE-2024-50285](https://nvd.nist.gov/vuln/detail/CVE-2024-50285), [CVE-2024-50276](https://nvd.nist.gov/vuln/detail/CVE-2024-50276), [CVE-2024-50273](https://nvd.nist.gov/vuln/detail/CVE-2024-50273), [CVE-2024-50272](https://nvd.nist.gov/vuln/detail/CVE-2024-50272), [CVE-2024-50271](https://nvd.nist.gov/vuln/detail/CVE-2024-50271), [CVE-2024-50269](https://nvd.nist.gov/vuln/detail/CVE-2024-50269), [CVE-2024-50268](https://nvd.nist.gov/vuln/detail/CVE-2024-50268), [CVE-2024-50267](https://nvd.nist.gov/vuln/detail/CVE-2024-50267), [CVE-2024-50264](https://nvd.nist.gov/vuln/detail/CVE-2024-50264), [CVE-2024-50265](https://nvd.nist.gov/vuln/detail/CVE-2024-50265), [CVE-2024-53102](https://nvd.nist.gov/vuln/detail/CVE-2024-53102), [CVE-2024-53101](https://nvd.nist.gov/vuln/detail/CVE-2024-53101), [CVE-2024-53100](https://nvd.nist.gov/vuln/detail/CVE-2024-53100), [CVE-2024-53099](https://nvd.nist.gov/vuln/detail/CVE-2024-53099), [CVE-2024-53097](https://nvd.nist.gov/vuln/detail/CVE-2024-53097), [CVE-2024-53095](https://nvd.nist.gov/vuln/detail/CVE-2024-53095), [CVE-2024-53094](https://nvd.nist.gov/vuln/detail/CVE-2024-53094), [CVE-2024-53093](https://nvd.nist.gov/vuln/detail/CVE-2024-53093), [CVE-2024-53091](https://nvd.nist.gov/vuln/detail/CVE-2024-53091), [CVE-2024-53079](https://nvd.nist.gov/vuln/detail/CVE-2024-53079), [CVE-2024-53135](https://nvd.nist.gov/vuln/detail/CVE-2024-53135), [CVE-2024-53134](https://nvd.nist.gov/vuln/detail/CVE-2024-53134), [CVE-2024-53131](https://nvd.nist.gov/vuln/detail/CVE-2024-53131), [CVE-2024-53130](https://nvd.nist.gov/vuln/detail/CVE-2024-53130), [CVE-2024-53129](https://nvd.nist.gov/vuln/detail/CVE-2024-53129), [CVE-2024-53140](https://nvd.nist.gov/vuln/detail/CVE-2024-53140), [CVE-2024-53139](https://nvd.nist.gov/vuln/detail/CVE-2024-53139), [CVE-2024-53138](https://nvd.nist.gov/vuln/detail/CVE-2024-53138), [CVE-2024-53136](https://nvd.nist.gov/vuln/detail/CVE-2024-53136), [CVE-2024-53126](https://nvd.nist.gov/vuln/detail/CVE-2024-53126), [CVE-2024-53127](https://nvd.nist.gov/vuln/detail/CVE-2024-53127), [CVE-2024-53113](https://nvd.nist.gov/vuln/detail/CVE-2024-53113), [CVE-2024-53112](https://nvd.nist.gov/vuln/detail/CVE-2024-53112), [CVE-2024-53110](https://nvd.nist.gov/vuln/detail/CVE-2024-53110), [CVE-2024-53109](https://nvd.nist.gov/vuln/detail/CVE-2024-53109), [CVE-2024-53108](https://nvd.nist.gov/vuln/detail/CVE-2024-53108), [CVE-2024-53123](https://nvd.nist.gov/vuln/detail/CVE-2024-53123), [CVE-2024-53122](https://nvd.nist.gov/vuln/detail/CVE-2024-53122), [CVE-2024-53121](https://nvd.nist.gov/vuln/detail/CVE-2024-53121), [CVE-2024-53120](https://nvd.nist.gov/vuln/detail/CVE-2024-53120), [CVE-2024-53119](https://nvd.nist.gov/vuln/detail/CVE-2024-53119), [CVE-2024-53106](https://nvd.nist.gov/vuln/detail/CVE-2024-53106)) - OpenSSL ([CVE-2024-2511](https://nvd.nist.gov/vuln/detail/CVE-2024-2511), [CVE-2024-4603](https://nvd.nist.gov/vuln/detail/CVE-2024-4603), [CVE-2024-4741](https://nvd.nist.gov/vuln/detail/CVE-2024-4741), [CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535), [CVE-2024-6119](https://nvd.nist.gov/vuln/detail/CVE-2024-6119), [CVE-2024-9143](https://nvd.nist.gov/vuln/detail/CVE-2024-9143)) #### Bug fixes: - Added qemu-guest-agent to ARM64 images ([flatcar/flatcar#1593](https://github.com/flatcar/Flatcar/issues/1593)) #### Updates: - Linux ([6.6.65](https://lwn.net/Articles/1001739) (includes [6.6.64](https://lwn.net/Articles/1001438), [6.6.63](https://lwn.net/Articles/999110), [6.6.62](https://lwn.net/Articles/998450), [6.6.61](https://lwn.net/Articles/998150))) - OpenSSL ([3.2.3](https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32)) - ca-certificates ([3.107](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html)) #### Stable 4081.2.1 _Changes since **Stable 4081.2.0**_ #### Security fixes: - Linux ([CVE-2024-53103](https://nvd.nist.gov/vuln/detail/CVE-2024-53103), [CVE-2024-53104](https://nvd.nist.gov/vuln/detail/CVE-2024-53104), [CVE-2024-53088](https://nvd.nist.gov/vuln/detail/CVE-2024-53088), [CVE-2024-53082](https://nvd.nist.gov/vuln/detail/CVE-2024-53082), [CVE-2024-53083](https://nvd.nist.gov/vuln/detail/CVE-2024-53083), [CVE-2024-53081](https://nvd.nist.gov/vuln/detail/CVE-2024-53081), [CVE-2024-53060](https://nvd.nist.gov/vuln/detail/CVE-2024-53060), [CVE-2024-53068](https://nvd.nist.gov/vuln/detail/CVE-2024-53068), [CVE-2024-53066](https://nvd.nist.gov/vuln/detail/CVE-2024-53066), [CVE-2024-53063](https://nvd.nist.gov/vuln/detail/CVE-2024-53063), [CVE-2024-53072](https://nvd.nist.gov/vuln/detail/CVE-2024-53072), [CVE-2024-53070](https://nvd.nist.gov/vuln/detail/CVE-2024-53070), [CVE-2024-53061](https://nvd.nist.gov/vuln/detail/CVE-2024-53061), [CVE-2024-50302](https://nvd.nist.gov/vuln/detail/CVE-2024-50302), [CVE-2024-50301](https://nvd.nist.gov/vuln/detail/CVE-2024-50301), [CVE-2024-50296](https://nvd.nist.gov/vuln/detail/CVE-2024-50296), [CVE-2024-50295](https://nvd.nist.gov/vuln/detail/CVE-2024-50295), [CVE-2024-50294](https://nvd.nist.gov/vuln/detail/CVE-2024-50294), [CVE-2024-50292](https://nvd.nist.gov/vuln/detail/CVE-2024-50292), [CVE-2024-50290](https://nvd.nist.gov/vuln/detail/CVE-2024-50290), [CVE-2024-50300](https://nvd.nist.gov/vuln/detail/CVE-2024-50300), [CVE-2024-50299](https://nvd.nist.gov/vuln/detail/CVE-2024-50299), [CVE-2024-50298](https://nvd.nist.gov/vuln/detail/CVE-2024-50298), [CVE-2024-50275](https://nvd.nist.gov/vuln/detail/CVE-2024-50275), [CVE-2024-50284](https://nvd.nist.gov/vuln/detail/CVE-2024-50284), [CVE-2024-50283](https://nvd.nist.gov/vuln/detail/CVE-2024-50283), [CVE-2024-50282](https://nvd.nist.gov/vuln/detail/CVE-2024-50282), [CVE-2024-50280](https://nvd.nist.gov/vuln/detail/CVE-2024-50280), [CVE-2024-50279](https://nvd.nist.gov/vuln/detail/CVE-2024-50279), [CVE-2024-50278](https://nvd.nist.gov/vuln/detail/CVE-2024-50278), [CVE-2024-50287](https://nvd.nist.gov/vuln/detail/CVE-2024-50287), [CVE-2024-50286](https://nvd.nist.gov/vuln/detail/CVE-2024-50286), [CVE-2024-50285](https://nvd.nist.gov/vuln/detail/CVE-2024-50285), [CVE-2024-50276](https://nvd.nist.gov/vuln/detail/CVE-2024-50276), [CVE-2024-50273](https://nvd.nist.gov/vuln/detail/CVE-2024-50273), [CVE-2024-50272](https://nvd.nist.gov/vuln/detail/CVE-2024-50272), [CVE-2024-50271](https://nvd.nist.gov/vuln/detail/CVE-2024-50271), [CVE-2024-50269](https://nvd.nist.gov/vuln/detail/CVE-2024-50269), [CVE-2024-50268](https://nvd.nist.gov/vuln/detail/CVE-2024-50268), [CVE-2024-50267](https://nvd.nist.gov/vuln/detail/CVE-2024-50267), [CVE-2024-50264](https://nvd.nist.gov/vuln/detail/CVE-2024-50264), [CVE-2024-50265](https://nvd.nist.gov/vuln/detail/CVE-2024-50265), [CVE-2024-53102](https://nvd.nist.gov/vuln/detail/CVE-2024-53102), [CVE-2024-53101](https://nvd.nist.gov/vuln/detail/CVE-2024-53101), [CVE-2024-53100](https://nvd.nist.gov/vuln/detail/CVE-2024-53100), [CVE-2024-53099](https://nvd.nist.gov/vuln/detail/CVE-2024-53099), [CVE-2024-53097](https://nvd.nist.gov/vuln/detail/CVE-2024-53097), [CVE-2024-53095](https://nvd.nist.gov/vuln/detail/CVE-2024-53095), [CVE-2024-53094](https://nvd.nist.gov/vuln/detail/CVE-2024-53094), [CVE-2024-53093](https://nvd.nist.gov/vuln/detail/CVE-2024-53093), [CVE-2024-53091](https://nvd.nist.gov/vuln/detail/CVE-2024-53091), [CVE-2024-53079](https://nvd.nist.gov/vuln/detail/CVE-2024-53079), [CVE-2024-53135](https://nvd.nist.gov/vuln/detail/CVE-2024-53135), [CVE-2024-53134](https://nvd.nist.gov/vuln/detail/CVE-2024-53134), [CVE-2024-53131](https://nvd.nist.gov/vuln/detail/CVE-2024-53131), [CVE-2024-53130](https://nvd.nist.gov/vuln/detail/CVE-2024-53130), [CVE-2024-53129](https://nvd.nist.gov/vuln/detail/CVE-2024-53129), [CVE-2024-53140](https://nvd.nist.gov/vuln/detail/CVE-2024-53140), [CVE-2024-53139](https://nvd.nist.gov/vuln/detail/CVE-2024-53139), [CVE-2024-53138](https://nvd.nist.gov/vuln/detail/CVE-2024-53138), [CVE-2024-53136](https://nvd.nist.gov/vuln/detail/CVE-2024-53136), [CVE-2024-53126](https://nvd.nist.gov/vuln/detail/CVE-2024-53126), [CVE-2024-53127](https://nvd.nist.gov/vuln/detail/CVE-2024-53127), [CVE-2024-53113](https://nvd.nist.gov/vuln/detail/CVE-2024-53113), [CVE-2024-53112](https://nvd.nist.gov/vuln/detail/CVE-2024-53112), [CVE-2024-53110](https://nvd.nist.gov/vuln/detail/CVE-2024-53110), [CVE-2024-53109](https://nvd.nist.gov/vuln/detail/CVE-2024-53109), [CVE-2024-53108](https://nvd.nist.gov/vuln/detail/CVE-2024-53108), [CVE-2024-53123](https://nvd.nist.gov/vuln/detail/CVE-2024-53123), [CVE-2024-53122](https://nvd.nist.gov/vuln/detail/CVE-2024-53122), [CVE-2024-53121](https://nvd.nist.gov/vuln/detail/CVE-2024-53121), [CVE-2024-53120](https://nvd.nist.gov/vuln/detail/CVE-2024-53120), [CVE-2024-53119](https://nvd.nist.gov/vuln/detail/CVE-2024-53119), [CVE-2024-53106](https://nvd.nist.gov/vuln/detail/CVE-2024-53106)) - OpenSSL ([CVE-2024-2511](https://nvd.nist.gov/vuln/detail/CVE-2024-2511), [CVE-2024-4603](https://nvd.nist.gov/vuln/detail/CVE-2024-4603), [CVE-2024-4741](https://nvd.nist.gov/vuln/detail/CVE-2024-4741), [CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535), [CVE-2024-6119](https://nvd.nist.gov/vuln/detail/CVE-2024-6119), [CVE-2024-9143](https://nvd.nist.gov/vuln/detail/CVE-2024-9143)) #### Bug fixes: - Added qemu-guest-agent to ARM64 images ([flatcar/flatcar#1593](https://github.com/flatcar/Flatcar/issues/1593)) #### Updates: - Linux ([6.6.65](https://lwn.net/Articles/1001739) (includes [6.6.64](https://lwn.net/Articles/1001438), [6.6.63](https://lwn.net/Articles/999110), [6.6.62](https://lwn.net/Articles/998450), [6.6.61](https://lwn.net/Articles/998150))) - OpenSSL ([3.2.3](https://github.com/openssl/openssl/blob/openssl-3.2/CHANGES.md#openssl-32)) - ca-certificates ([3.107](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html)) #### LTS 3510.3.6 _Changes since **LTS 3510.3.5**_ #### Security fixes: - Linux ([CVE-2024-42098](https://nvd.nist.gov/vuln/detail/CVE-2024-42098), [CVE-2024-42097](https://nvd.nist.gov/vuln/detail/CVE-2024-42097), [CVE-2024-42096](https://nvd.nist.gov/vuln/detail/CVE-2024-42096), [CVE-2024-42095](https://nvd.nist.gov/vuln/detail/CVE-2024-42095), [CVE-2024-42093](https://nvd.nist.gov/vuln/detail/CVE-2024-42093), [CVE-2024-42094](https://nvd.nist.gov/vuln/detail/CVE-2024-42094), [CVE-2024-42092](https://nvd.nist.gov/vuln/detail/CVE-2024-42092), [CVE-2024-42090](https://nvd.nist.gov/vuln/detail/CVE-2024-42090), [CVE-2024-42089](https://nvd.nist.gov/vuln/detail/CVE-2024-42089), [CVE-2024-42087](https://nvd.nist.gov/vuln/detail/CVE-2024-42087), [CVE-2024-42086](https://nvd.nist.gov/vuln/detail/CVE-2024-42086), [CVE-2024-42084](https://nvd.nist.gov/vuln/detail/CVE-2024-42084), [CVE-2024-42085](https://nvd.nist.gov/vuln/detail/CVE-2024-42085), [CVE-2024-42070](https://nvd.nist.gov/vuln/detail/CVE-2024-42070), [CVE-2024-42068](https://nvd.nist.gov/vuln/detail/CVE-2024-42068), [CVE-2024-42082](https://nvd.nist.gov/vuln/detail/CVE-2024-42082), [CVE-2024-42080](https://nvd.nist.gov/vuln/detail/CVE-2024-42080), [CVE-2024-42077](https://nvd.nist.gov/vuln/detail/CVE-2024-42077), [CVE-2024-42076](https://nvd.nist.gov/vuln/detail/CVE-2024-42076), [CVE-2023-52887](https://nvd.nist.gov/vuln/detail/CVE-2023-52887), [CVE-2024-41093](https://nvd.nist.gov/vuln/detail/CVE-2024-41093), [CVE-2024-41092](https://nvd.nist.gov/vuln/detail/CVE-2024-41092), [CVE-2024-41089](https://nvd.nist.gov/vuln/detail/CVE-2024-41089), [CVE-2024-41087](https://nvd.nist.gov/vuln/detail/CVE-2024-41087), [CVE-2024-41097](https://nvd.nist.gov/vuln/detail/CVE-2024-41097), [CVE-2024-41095](https://nvd.nist.gov/vuln/detail/CVE-2024-41095), [CVE-2024-41006](https://nvd.nist.gov/vuln/detail/CVE-2024-41006), [CVE-2024-41005](https://nvd.nist.gov/vuln/detail/CVE-2024-41005), [CVE-2024-41004](https://nvd.nist.gov/vuln/detail/CVE-2024-41004), [CVE-2024-41002](https://nvd.nist.gov/vuln/detail/CVE-2024-41002), [CVE-2024-41000](https://nvd.nist.gov/vuln/detail/CVE-2024-41000), [CVE-2024-40994](https://nvd.nist.gov/vuln/detail/CVE-2024-40994), [CVE-2024-40990](https://nvd.nist.gov/vuln/detail/CVE-2024-40990), [CVE-2024-40988](https://nvd.nist.gov/vuln/detail/CVE-2024-40988), [CVE-2024-40987](https://nvd.nist.gov/vuln/detail/CVE-2024-40987), [CVE-2024-40995](https://nvd.nist.gov/vuln/detail/CVE-2024-40995), [CVE-2024-40983](https://nvd.nist.gov/vuln/detail/CVE-2024-40983), [CVE-2024-40984](https://nvd.nist.gov/vuln/detail/CVE-2024-40984), [CVE-2024-40970](https://nvd.nist.gov/vuln/detail/CVE-2024-40970), [CVE-2024-40978](https://nvd.nist.gov/vuln/detail/CVE-2024-40978), [CVE-2024-40976](https://nvd.nist.gov/vuln/detail/CVE-2024-40976), [CVE-2024-40974](https://nvd.nist.gov/vuln/detail/CVE-2024-40974), [CVE-2024-40981](https://nvd.nist.gov/vuln/detail/CVE-2024-40981), [CVE-2024-40980](https://nvd.nist.gov/vuln/detail/CVE-2024-40980), [CVE-2024-40971](https://nvd.nist.gov/vuln/detail/CVE-2024-40971), [CVE-2024-40954](https://nvd.nist.gov/vuln/detail/CVE-2024-40954), [CVE-2024-40968](https://nvd.nist.gov/vuln/detail/CVE-2024-40968), [CVE-2024-40967](https://nvd.nist.gov/vuln/detail/CVE-2024-40967), [CVE-2024-40963](https://nvd.nist.gov/vuln/detail/CVE-2024-40963), [CVE-2024-40961](https://nvd.nist.gov/vuln/detail/CVE-2024-40961), [CVE-2024-40960](https://nvd.nist.gov/vuln/detail/CVE-2024-40960), [CVE-2024-40959](https://nvd.nist.gov/vuln/detail/CVE-2024-40959), [CVE-2024-40958](https://nvd.nist.gov/vuln/detail/CVE-2024-40958), [CVE-2024-40957](https://nvd.nist.gov/vuln/detail/CVE-2024-40957), [CVE-2024-40956](https://nvd.nist.gov/vuln/detail/CVE-2024-40956), [CVE-2024-40929](https://nvd.nist.gov/vuln/detail/CVE-2024-40929), [CVE-2024-40937](https://nvd.nist.gov/vuln/detail/CVE-2024-40937), [CVE-2024-40934](https://nvd.nist.gov/vuln/detail/CVE-2024-40934), [CVE-2024-40932](https://nvd.nist.gov/vuln/detail/CVE-2024-40932), [CVE-2024-40931](https://nvd.nist.gov/vuln/detail/CVE-2024-40931), [CVE-2024-40945](https://nvd.nist.gov/vuln/detail/CVE-2024-40945), [CVE-2024-40943](https://nvd.nist.gov/vuln/detail/CVE-2024-40943), [CVE-2024-40942](https://nvd.nist.gov/vuln/detail/CVE-2024-40942), [CVE-2024-40941](https://nvd.nist.gov/vuln/detail/CVE-2024-40941), [CVE-2024-40916](https://nvd.nist.gov/vuln/detail/CVE-2024-40916), [CVE-2024-40927](https://nvd.nist.gov/vuln/detail/CVE-2024-40927), [CVE-2024-40914](https://nvd.nist.gov/vuln/detail/CVE-2024-40914), [CVE-2024-40912](https://nvd.nist.gov/vuln/detail/CVE-2024-40912), [CVE-2024-39503](https://nvd.nist.gov/vuln/detail/CVE-2024-39503), [CVE-2024-39502](https://nvd.nist.gov/vuln/detail/CVE-2024-39502), [CVE-2024-39501](https://nvd.nist.gov/vuln/detail/CVE-2024-39501), [CVE-2024-39500](https://nvd.nist.gov/vuln/detail/CVE-2024-39500), [CVE-2024-39499](https://nvd.nist.gov/vuln/detail/CVE-2024-39499), [CVE-2024-40911](https://nvd.nist.gov/vuln/detail/CVE-2024-40911), [CVE-2024-40908](https://nvd.nist.gov/vuln/detail/CVE-2024-40908), [CVE-2024-40905](https://nvd.nist.gov/vuln/detail/CVE-2024-40905), [CVE-2024-40904](https://nvd.nist.gov/vuln/detail/CVE-2024-40904), [CVE-2024-40902](https://nvd.nist.gov/vuln/detail/CVE-2024-40902), [CVE-2024-40901](https://nvd.nist.gov/vuln/detail/CVE-2024-40901), [CVE-2024-39509](https://nvd.nist.gov/vuln/detail/CVE-2024-39509), [CVE-2024-39507](https://nvd.nist.gov/vuln/detail/CVE-2024-39507), [CVE-2024-39506](https://nvd.nist.gov/vuln/detail/CVE-2024-39506), [CVE-2024-39505](https://nvd.nist.gov/vuln/detail/CVE-2024-39505), [CVE-2024-39495](https://nvd.nist.gov/vuln/detail/CVE-2024-39495), [CVE-2024-42247](https://nvd.nist.gov/vuln/detail/CVE-2024-42247), [CVE-2024-42244](https://nvd.nist.gov/vuln/detail/CVE-2024-42244), [CVE-2024-42232](https://nvd.nist.gov/vuln/detail/CVE-2024-42232), [CVE-2024-42240](https://nvd.nist.gov/vuln/detail/CVE-2024-42240), [CVE-2024-42236](https://nvd.nist.gov/vuln/detail/CVE-2024-42236), [CVE-2024-42145](https://nvd.nist.gov/vuln/detail/CVE-2024-42145), [CVE-2024-42154](https://nvd.nist.gov/vuln/detail/CVE-2024-42154), [CVE-2024-42153](https://nvd.nist.gov/vuln/detail/CVE-2024-42153), [CVE-2024-42152](https://nvd.nist.gov/vuln/detail/CVE-2024-42152), [CVE-2024-42148](https://nvd.nist.gov/vuln/detail/CVE-2024-42148), [CVE-2024-42229](https://nvd.nist.gov/vuln/detail/CVE-2024-42229), [CVE-2024-42225](https://nvd.nist.gov/vuln/detail/CVE-2024-42225), [CVE-2024-42224](https://nvd.nist.gov/vuln/detail/CVE-2024-42224), [CVE-2024-42223](https://nvd.nist.gov/vuln/detail/CVE-2024-42223), [CVE-2024-42161](https://nvd.nist.gov/vuln/detail/CVE-2024-42161), [CVE-2024-42157](https://nvd.nist.gov/vuln/detail/CVE-2024-42157), [CVE-2024-42119](https://nvd.nist.gov/vuln/detail/CVE-2024-42119), [CVE-2024-42116](https://nvd.nist.gov/vuln/detail/CVE-2024-42116), [CVE-2024-42115](https://nvd.nist.gov/vuln/detail/CVE-2024-42115), [CVE-2024-42143](https://nvd.nist.gov/vuln/detail/CVE-2024-42143), [CVE-2024-42140](https://nvd.nist.gov/vuln/detail/CVE-2024-42140), [CVE-2024-42137](https://nvd.nist.gov/vuln/detail/CVE-2024-42137), [CVE-2024-42131](https://nvd.nist.gov/vuln/detail/CVE-2024-42131), [CVE-2024-42130](https://nvd.nist.gov/vuln/detail/CVE-2024-42130), [CVE-2024-42127](https://nvd.nist.gov/vuln/detail/CVE-2024-42127), [CVE-2024-42124](https://nvd.nist.gov/vuln/detail/CVE-2024-42124), [CVE-2024-42121](https://nvd.nist.gov/vuln/detail/CVE-2024-42121), [CVE-2024-42120](https://nvd.nist.gov/vuln/detail/CVE-2024-42120), [CVE-2024-42106](https://nvd.nist.gov/vuln/detail/CVE-2024-42106), [CVE-2024-42105](https://nvd.nist.gov/vuln/detail/CVE-2024-42105), [CVE-2024-42104](https://nvd.nist.gov/vuln/detail/CVE-2024-42104), [CVE-2024-42103](https://nvd.nist.gov/vuln/detail/CVE-2024-42103), [CVE-2024-42102](https://nvd.nist.gov/vuln/detail/CVE-2024-42102), [CVE-2024-42101](https://nvd.nist.gov/vuln/detail/CVE-2024-42101), [CVE-2024-42109](https://nvd.nist.gov/vuln/detail/CVE-2024-42109), [CVE-2024-41055](https://nvd.nist.gov/vuln/detail/CVE-2024-41055), [CVE-2024-41027](https://nvd.nist.gov/vuln/detail/CVE-2024-41027), [CVE-2024-41049](https://nvd.nist.gov/vuln/detail/CVE-2024-41049), [CVE-2024-41048](https://nvd.nist.gov/vuln/detail/CVE-2024-41048), [CVE-2024-41047](https://nvd.nist.gov/vuln/detail/CVE-2024-41047), [CVE-2024-41046](https://nvd.nist.gov/vuln/detail/CVE-2024-41046), [CVE-2024-41044](https://nvd.nist.gov/vuln/detail/CVE-2024-41044), [CVE-2024-41041](https://nvd.nist.gov/vuln/detail/CVE-2024-41041), [CVE-2024-41040](https://nvd.nist.gov/vuln/detail/CVE-2024-41040), [CVE-2024-41035](https://nvd.nist.gov/vuln/detail/CVE-2024-41035), [CVE-2024-41034](https://nvd.nist.gov/vuln/detail/CVE-2024-41034), [CVE-2024-41081](https://nvd.nist.gov/vuln/detail/CVE-2024-41081), [CVE-2024-41078](https://nvd.nist.gov/vuln/detail/CVE-2024-41078), [CVE-2024-41073](https://nvd.nist.gov/vuln/detail/CVE-2024-41073), [CVE-2024-41072](https://nvd.nist.gov/vuln/detail/CVE-2024-41072), [CVE-2024-41070](https://nvd.nist.gov/vuln/detail/CVE-2024-41070), [CVE-2024-41077](https://nvd.nist.gov/vuln/detail/CVE-2024-41077), [CVE-2024-41068](https://nvd.nist.gov/vuln/detail/CVE-2024-41068), [CVE-2024-41065](https://nvd.nist.gov/vuln/detail/CVE-2024-41065), [CVE-2024-41064](https://nvd.nist.gov/vuln/detail/CVE-2024-41064), [CVE-2024-41063](https://nvd.nist.gov/vuln/detail/CVE-2024-41063), [CVE-2024-41060](https://nvd.nist.gov/vuln/detail/CVE-2024-41060), [CVE-2024-41059](https://nvd.nist.gov/vuln/detail/CVE-2024-41059), [CVE-2024-41022](https://nvd.nist.gov/vuln/detail/CVE-2024-41022), [CVE-2024-41020](https://nvd.nist.gov/vuln/detail/CVE-2024-41020), [CVE-2024-41019](https://nvd.nist.gov/vuln/detail/CVE-2024-41019), [CVE-2024-41017](https://nvd.nist.gov/vuln/detail/CVE-2024-41017), [CVE-2024-41015](https://nvd.nist.gov/vuln/detail/CVE-2024-41015), [CVE-2024-41090](https://nvd.nist.gov/vuln/detail/CVE-2024-41090), [CVE-2024-41091](https://nvd.nist.gov/vuln/detail/CVE-2024-41091), [CVE-2024-44971](https://nvd.nist.gov/vuln/detail/CVE-2024-44971), [CVE-2024-44969](https://nvd.nist.gov/vuln/detail/CVE-2024-44969), [CVE-2024-44966](https://nvd.nist.gov/vuln/detail/CVE-2024-44966), [CVE-2024-44954](https://nvd.nist.gov/vuln/detail/CVE-2024-44954), [CVE-2024-44952](https://nvd.nist.gov/vuln/detail/CVE-2024-44952), [CVE-2024-44965](https://nvd.nist.gov/vuln/detail/CVE-2024-44965), [CVE-2024-44960](https://nvd.nist.gov/vuln/detail/CVE-2024-44960), [CVE-2024-44958](https://nvd.nist.gov/vuln/detail/CVE-2024-44958), [CVE-2024-44948](https://nvd.nist.gov/vuln/detail/CVE-2024-44948), [CVE-2024-44944](https://nvd.nist.gov/vuln/detail/CVE-2024-44944), [CVE-2024-43908](https://nvd.nist.gov/vuln/detail/CVE-2024-43908), [CVE-2024-43914](https://nvd.nist.gov/vuln/detail/CVE-2024-43914), [CVE-2024-44935](https://nvd.nist.gov/vuln/detail/CVE-2024-44935), [CVE-2024-44934](https://nvd.nist.gov/vuln/detail/CVE-2024-44934), [CVE-2024-43909](https://nvd.nist.gov/vuln/detail/CVE-2024-43909), [CVE-2024-43902](https://nvd.nist.gov/vuln/detail/CVE-2024-43902), [CVE-2024-43907](https://nvd.nist.gov/vuln/detail/CVE-2024-43907), [CVE-2024-43894](https://nvd.nist.gov/vuln/detail/CVE-2024-43894), [CVE-2024-43893](https://nvd.nist.gov/vuln/detail/CVE-2024-43893), [CVE-2024-43890](https://nvd.nist.gov/vuln/detail/CVE-2024-43890), [CVE-2024-43889](https://nvd.nist.gov/vuln/detail/CVE-2024-43889), [CVE-2024-43883](https://nvd.nist.gov/vuln/detail/CVE-2024-43883), [CVE-2024-43882](https://nvd.nist.gov/vuln/detail/CVE-2024-43882), [CVE-2024-43875](https://nvd.nist.gov/vuln/detail/CVE-2024-43875), [CVE-2024-43873](https://nvd.nist.gov/vuln/detail/CVE-2024-43873), [CVE-2024-43871](https://nvd.nist.gov/vuln/detail/CVE-2024-43871), [CVE-2024-43880](https://nvd.nist.gov/vuln/detail/CVE-2024-43880), [CVE-2024-43879](https://nvd.nist.gov/vuln/detail/CVE-2024-43879), [CVE-2024-43869](https://nvd.nist.gov/vuln/detail/CVE-2024-43869), [CVE-2024-43870](https://nvd.nist.gov/vuln/detail/CVE-2024-43870), [CVE-2024-43867](https://nvd.nist.gov/vuln/detail/CVE-2024-43867), [CVE-2024-43863](https://nvd.nist.gov/vuln/detail/CVE-2024-43863), [CVE-2024-43861](https://nvd.nist.gov/vuln/detail/CVE-2024-43861), [CVE-2023-52918](https://nvd.nist.gov/vuln/detail/CVE-2023-52918), [CVE-2024-46707](https://nvd.nist.gov/vuln/detail/CVE-2024-46707), [CVE-2024-46702](https://nvd.nist.gov/vuln/detail/CVE-2024-46702), [CVE-2024-46679](https://nvd.nist.gov/vuln/detail/CVE-2024-46679), [CVE-2024-46677](https://nvd.nist.gov/vuln/detail/CVE-2024-46677), [CVE-2024-46676](https://nvd.nist.gov/vuln/detail/CVE-2024-46676), [CVE-2024-46675](https://nvd.nist.gov/vuln/detail/CVE-2024-46675), [CVE-2024-46689](https://nvd.nist.gov/vuln/detail/CVE-2024-46689), [CVE-2024-46685](https://nvd.nist.gov/vuln/detail/CVE-2024-46685), [CVE-2024-46673](https://nvd.nist.gov/vuln/detail/CVE-2024-46673), [CVE-2024-46674](https://nvd.nist.gov/vuln/detail/CVE-2024-46674), [CVE-2024-45026](https://nvd.nist.gov/vuln/detail/CVE-2024-45026), [CVE-2024-45028](https://nvd.nist.gov/vuln/detail/CVE-2024-45028), [CVE-2024-45018](https://nvd.nist.gov/vuln/detail/CVE-2024-45018), [CVE-2024-45016](https://nvd.nist.gov/vuln/detail/CVE-2024-45016), [CVE-2024-45011](https://nvd.nist.gov/vuln/detail/CVE-2024-45011), [CVE-2024-45025](https://nvd.nist.gov/vuln/detail/CVE-2024-45025), [CVE-2024-45021](https://nvd.nist.gov/vuln/detail/CVE-2024-45021), [CVE-2024-44999](https://nvd.nist.gov/vuln/detail/CVE-2024-44999), [CVE-2024-44998](https://nvd.nist.gov/vuln/detail/CVE-2024-44998), [CVE-2024-44995](https://nvd.nist.gov/vuln/detail/CVE-2024-44995), [CVE-2024-45008](https://nvd.nist.gov/vuln/detail/CVE-2024-45008), [CVE-2024-45007](https://nvd.nist.gov/vuln/detail/CVE-2024-45007), [CVE-2024-45006](https://nvd.nist.gov/vuln/detail/CVE-2024-45006), [CVE-2024-45003](https://nvd.nist.gov/vuln/detail/CVE-2024-45003), [CVE-2024-44983](https://nvd.nist.gov/vuln/detail/CVE-2024-44983), [CVE-2024-44982](https://nvd.nist.gov/vuln/detail/CVE-2024-44982), [CVE-2024-44990](https://nvd.nist.gov/vuln/detail/CVE-2024-44990), [CVE-2024-44989](https://nvd.nist.gov/vuln/detail/CVE-2024-44989), [CVE-2024-44988](https://nvd.nist.gov/vuln/detail/CVE-2024-44988), [CVE-2024-44987](https://nvd.nist.gov/vuln/detail/CVE-2024-44987), [CVE-2024-44986](https://nvd.nist.gov/vuln/detail/CVE-2024-44986), [CVE-2024-44985](https://nvd.nist.gov/vuln/detail/CVE-2024-44985), [CVE-2024-47669](https://nvd.nist.gov/vuln/detail/CVE-2024-47669), [CVE-2024-47668](https://nvd.nist.gov/vuln/detail/CVE-2024-47668), [CVE-2024-47667](https://nvd.nist.gov/vuln/detail/CVE-2024-47667), [CVE-2024-47665](https://nvd.nist.gov/vuln/detail/CVE-2024-47665), [CVE-2024-47663](https://nvd.nist.gov/vuln/detail/CVE-2024-47663), [CVE-2024-47660](https://nvd.nist.gov/vuln/detail/CVE-2024-47660), [CVE-2024-47659](https://nvd.nist.gov/vuln/detail/CVE-2024-47659), [CVE-2024-46840](https://nvd.nist.gov/vuln/detail/CVE-2024-46840), [CVE-2024-46839](https://nvd.nist.gov/vuln/detail/CVE-2024-46839), [CVE-2024-46844](https://nvd.nist.gov/vuln/detail/CVE-2024-46844), [CVE-2024-46832](https://nvd.nist.gov/vuln/detail/CVE-2024-46832), [CVE-2024-46829](https://nvd.nist.gov/vuln/detail/CVE-2024-46829), [CVE-2024-46828](https://nvd.nist.gov/vuln/detail/CVE-2024-46828), [CVE-2024-46822](https://nvd.nist.gov/vuln/detail/CVE-2024-46822), [CVE-2024-46810](https://nvd.nist.gov/vuln/detail/CVE-2024-46810), [CVE-2024-46807](https://nvd.nist.gov/vuln/detail/CVE-2024-46807), [CVE-2024-46805](https://nvd.nist.gov/vuln/detail/CVE-2024-46805), [CVE-2024-46804](https://nvd.nist.gov/vuln/detail/CVE-2024-46804), [CVE-2024-46819](https://nvd.nist.gov/vuln/detail/CVE-2024-46819), [CVE-2024-46818](https://nvd.nist.gov/vuln/detail/CVE-2024-46818), [CVE-2024-46817](https://nvd.nist.gov/vuln/detail/CVE-2024-46817), [CVE-2024-46815](https://nvd.nist.gov/vuln/detail/CVE-2024-46815), [CVE-2024-46814](https://nvd.nist.gov/vuln/detail/CVE-2024-46814), [CVE-2024-46795](https://nvd.nist.gov/vuln/detail/CVE-2024-46795), [CVE-2024-46791](https://nvd.nist.gov/vuln/detail/CVE-2024-46791), [CVE-2024-46800](https://nvd.nist.gov/vuln/detail/CVE-2024-46800), [CVE-2024-46798](https://nvd.nist.gov/vuln/detail/CVE-2024-46798), [CVE-2024-46763](https://nvd.nist.gov/vuln/detail/CVE-2024-46763), [CVE-2024-46783](https://nvd.nist.gov/vuln/detail/CVE-2024-46783), [CVE-2024-46782](https://nvd.nist.gov/vuln/detail/CVE-2024-46782), [CVE-2024-46781](https://nvd.nist.gov/vuln/detail/CVE-2024-46781), [CVE-2024-46780](https://nvd.nist.gov/vuln/detail/CVE-2024-46780), [CVE-2024-46777](https://nvd.nist.gov/vuln/detail/CVE-2024-46777), [CVE-2024-46771](https://nvd.nist.gov/vuln/detail/CVE-2024-46771), [CVE-2024-46761](https://nvd.nist.gov/vuln/detail/CVE-2024-46761), [CVE-2024-46743](https://nvd.nist.gov/vuln/detail/CVE-2024-46743), [CVE-2024-46740](https://nvd.nist.gov/vuln/detail/CVE-2024-46740), [CVE-2024-46739](https://nvd.nist.gov/vuln/detail/CVE-2024-46739), [CVE-2024-46738](https://nvd.nist.gov/vuln/detail/CVE-2024-46738), [CVE-2024-46737](https://nvd.nist.gov/vuln/detail/CVE-2024-46737), [CVE-2024-46759](https://nvd.nist.gov/vuln/detail/CVE-2024-46759), [CVE-2024-46758](https://nvd.nist.gov/vuln/detail/CVE-2024-46758), [CVE-2024-46757](https://nvd.nist.gov/vuln/detail/CVE-2024-46757), [CVE-2024-46756](https://nvd.nist.gov/vuln/detail/CVE-2024-46756), [CVE-2024-46755](https://nvd.nist.gov/vuln/detail/CVE-2024-46755), [CVE-2024-46752](https://nvd.nist.gov/vuln/detail/CVE-2024-46752), [CVE-2024-46750](https://nvd.nist.gov/vuln/detail/CVE-2024-46750), [CVE-2024-46747](https://nvd.nist.gov/vuln/detail/CVE-2024-46747), [CVE-2024-46746](https://nvd.nist.gov/vuln/detail/CVE-2024-46746), [CVE-2024-46745](https://nvd.nist.gov/vuln/detail/CVE-2024-46745), [CVE-2024-46744](https://nvd.nist.gov/vuln/detail/CVE-2024-46744), [CVE-2024-46734](https://nvd.nist.gov/vuln/detail/CVE-2024-46734), [CVE-2024-46724](https://nvd.nist.gov/vuln/detail/CVE-2024-46724), [CVE-2024-46732](https://nvd.nist.gov/vuln/detail/CVE-2024-46732), [CVE-2024-46731](https://nvd.nist.gov/vuln/detail/CVE-2024-46731), [CVE-2024-46725](https://nvd.nist.gov/vuln/detail/CVE-2024-46725), [CVE-2024-46723](https://nvd.nist.gov/vuln/detail/CVE-2024-46723), [CVE-2024-46722](https://nvd.nist.gov/vuln/detail/CVE-2024-46722), [CVE-2024-46721](https://nvd.nist.gov/vuln/detail/CVE-2024-46721), [CVE-2024-46719](https://nvd.nist.gov/vuln/detail/CVE-2024-46719), [CVE-2024-46714](https://nvd.nist.gov/vuln/detail/CVE-2024-46714), [CVE-2024-46713](https://nvd.nist.gov/vuln/detail/CVE-2024-46713), [CVE-2024-50191](https://nvd.nist.gov/vuln/detail/CVE-2024-50191), [CVE-2024-50189](https://nvd.nist.gov/vuln/detail/CVE-2024-50189), [CVE-2024-50188](https://nvd.nist.gov/vuln/detail/CVE-2024-50188), [CVE-2024-50186](https://nvd.nist.gov/vuln/detail/CVE-2024-50186), [CVE-2024-50184](https://nvd.nist.gov/vuln/detail/CVE-2024-50184), [CVE-2024-50180](https://nvd.nist.gov/vuln/detail/CVE-2024-50180), [CVE-2024-50181](https://nvd.nist.gov/vuln/detail/CVE-2024-50181), [CVE-2024-50179](https://nvd.nist.gov/vuln/detail/CVE-2024-50179), [CVE-2024-50096](https://nvd.nist.gov/vuln/detail/CVE-2024-50096), [CVE-2024-50095](https://nvd.nist.gov/vuln/detail/CVE-2024-50095), [CVE-2024-50093](https://nvd.nist.gov/vuln/detail/CVE-2024-50093), [CVE-2024-50089](https://nvd.nist.gov/vuln/detail/CVE-2024-50089), [CVE-2024-50062](https://nvd.nist.gov/vuln/detail/CVE-2024-50062), [CVE-2024-50059](https://nvd.nist.gov/vuln/detail/CVE-2024-50059), [CVE-2024-50024](https://nvd.nist.gov/vuln/detail/CVE-2024-50024), [CVE-2024-50049](https://nvd.nist.gov/vuln/detail/CVE-2024-50049), [CVE-2024-50046](https://nvd.nist.gov/vuln/detail/CVE-2024-50046), [CVE-2024-50045](https://nvd.nist.gov/vuln/detail/CVE-2024-50045), [CVE-2024-50044](https://nvd.nist.gov/vuln/detail/CVE-2024-50044), [CVE-2024-50041](https://nvd.nist.gov/vuln/detail/CVE-2024-50041), [CVE-2024-50040](https://nvd.nist.gov/vuln/detail/CVE-2024-50040), [CVE-2024-50039](https://nvd.nist.gov/vuln/detail/CVE-2024-50039), [CVE-2024-50038](https://nvd.nist.gov/vuln/detail/CVE-2024-50038), [CVE-2024-50035](https://nvd.nist.gov/vuln/detail/CVE-2024-50035), [CVE-2024-50033](https://nvd.nist.gov/vuln/detail/CVE-2024-50033), [CVE-2024-50031](https://nvd.nist.gov/vuln/detail/CVE-2024-50031), [CVE-2024-50019](https://nvd.nist.gov/vuln/detail/CVE-2024-50019), [CVE-2024-50008](https://nvd.nist.gov/vuln/detail/CVE-2024-50008), [CVE-2024-50007](https://nvd.nist.gov/vuln/detail/CVE-2024-50007), [CVE-2024-50006](https://nvd.nist.gov/vuln/detail/CVE-2024-50006), [CVE-2024-50015](https://nvd.nist.gov/vuln/detail/CVE-2024-50015), [CVE-2024-50013](https://nvd.nist.gov/vuln/detail/CVE-2024-50013), [CVE-2024-50003](https://nvd.nist.gov/vuln/detail/CVE-2024-50003), [CVE-2024-50002](https://nvd.nist.gov/vuln/detail/CVE-2024-50002), [CVE-2024-50001](https://nvd.nist.gov/vuln/detail/CVE-2024-50001), [CVE-2024-50000](https://nvd.nist.gov/vuln/detail/CVE-2024-50000), [CVE-2024-49997](https://nvd.nist.gov/vuln/detail/CVE-2024-49997), [CVE-2024-49995](https://nvd.nist.gov/vuln/detail/CVE-2024-49995), [CVE-2024-49955](https://nvd.nist.gov/vuln/detail/CVE-2024-49955), [CVE-2024-49963](https://nvd.nist.gov/vuln/detail/CVE-2024-49963), [CVE-2024-49962](https://nvd.nist.gov/vuln/detail/CVE-2024-49962), [CVE-2024-49959](https://nvd.nist.gov/vuln/detail/CVE-2024-49959), [CVE-2024-49993](https://nvd.nist.gov/vuln/detail/CVE-2024-49993), [CVE-2024-49985](https://nvd.nist.gov/vuln/detail/CVE-2024-49985), [CVE-2024-49958](https://nvd.nist.gov/vuln/detail/CVE-2024-49958), [CVE-2024-49983](https://nvd.nist.gov/vuln/detail/CVE-2024-49983), [CVE-2024-49982](https://nvd.nist.gov/vuln/detail/CVE-2024-49982), [CVE-2024-49981](https://nvd.nist.gov/vuln/detail/CVE-2024-49981), [CVE-2024-49977](https://nvd.nist.gov/vuln/detail/CVE-2024-49977), [CVE-2024-49975](https://nvd.nist.gov/vuln/detail/CVE-2024-49975), [CVE-2024-49957](https://nvd.nist.gov/vuln/detail/CVE-2024-49957), [CVE-2024-49973](https://nvd.nist.gov/vuln/detail/CVE-2024-49973), [CVE-2024-49969](https://nvd.nist.gov/vuln/detail/CVE-2024-49969), [CVE-2024-49967](https://nvd.nist.gov/vuln/detail/CVE-2024-49967), [CVE-2024-49966](https://nvd.nist.gov/vuln/detail/CVE-2024-49966), [CVE-2024-49965](https://nvd.nist.gov/vuln/detail/CVE-2024-49965), [CVE-2024-49924](https://nvd.nist.gov/vuln/detail/CVE-2024-49924), [CVE-2024-49954](https://nvd.nist.gov/vuln/detail/CVE-2024-49954), [CVE-2024-49952](https://nvd.nist.gov/vuln/detail/CVE-2024-49952), [CVE-2024-49949](https://nvd.nist.gov/vuln/detail/CVE-2024-49949), [CVE-2024-49948](https://nvd.nist.gov/vuln/detail/CVE-2024-49948), [CVE-2024-49946](https://nvd.nist.gov/vuln/detail/CVE-2024-49946), [CVE-2024-49944](https://nvd.nist.gov/vuln/detail/CVE-2024-49944), [CVE-2024-49938](https://nvd.nist.gov/vuln/detail/CVE-2024-49938), [CVE-2024-49936](https://nvd.nist.gov/vuln/detail/CVE-2024-49936), [CVE-2024-49935](https://nvd.nist.gov/vuln/detail/CVE-2024-49935), [CVE-2024-49933](https://nvd.nist.gov/vuln/detail/CVE-2024-49933), [CVE-2024-49930](https://nvd.nist.gov/vuln/detail/CVE-2024-49930), [CVE-2024-49927](https://nvd.nist.gov/vuln/detail/CVE-2024-49927), [CVE-2024-49875](https://nvd.nist.gov/vuln/detail/CVE-2024-49875), [CVE-2024-49884](https://nvd.nist.gov/vuln/detail/CVE-2024-49884), [CVE-2024-49883](https://nvd.nist.gov/vuln/detail/CVE-2024-49883), [CVE-2024-49882](https://nvd.nist.gov/vuln/detail/CVE-2024-49882), [CVE-2024-49881](https://nvd.nist.gov/vuln/detail/CVE-2024-49881), [CVE-2024-49879](https://nvd.nist.gov/vuln/detail/CVE-2024-49879), [CVE-2024-49913](https://nvd.nist.gov/vuln/detail/CVE-2024-49913), [CVE-2024-49907](https://nvd.nist.gov/vuln/detail/CVE-2024-49907), [CVE-2024-49878](https://nvd.nist.gov/vuln/detail/CVE-2024-49878), [CVE-2024-49903](https://nvd.nist.gov/vuln/detail/CVE-2024-49903), [CVE-2024-49902](https://nvd.nist.gov/vuln/detail/CVE-2024-49902), [CVE-2024-49900](https://nvd.nist.gov/vuln/detail/CVE-2024-49900), [CVE-2024-49896](https://nvd.nist.gov/vuln/detail/CVE-2024-49896), [CVE-2024-49895](https://nvd.nist.gov/vuln/detail/CVE-2024-49895), [CVE-2024-49877](https://nvd.nist.gov/vuln/detail/CVE-2024-49877), [CVE-2024-49894](https://nvd.nist.gov/vuln/detail/CVE-2024-49894), [CVE-2024-49892](https://nvd.nist.gov/vuln/detail/CVE-2024-49892), [CVE-2024-49890](https://nvd.nist.gov/vuln/detail/CVE-2024-49890), [CVE-2024-49889](https://nvd.nist.gov/vuln/detail/CVE-2024-49889), [CVE-2024-49886](https://nvd.nist.gov/vuln/detail/CVE-2024-49886), [CVE-2024-49863](https://nvd.nist.gov/vuln/detail/CVE-2024-49863), [CVE-2024-49871](https://nvd.nist.gov/vuln/detail/CVE-2024-49871), [CVE-2024-49868](https://nvd.nist.gov/vuln/detail/CVE-2024-49868), [CVE-2024-49867](https://nvd.nist.gov/vuln/detail/CVE-2024-49867), [CVE-2024-49866](https://nvd.nist.gov/vuln/detail/CVE-2024-49866), [CVE-2024-49860](https://nvd.nist.gov/vuln/detail/CVE-2024-49860), [CVE-2024-49858](https://nvd.nist.gov/vuln/detail/CVE-2024-49858), [CVE-2024-49856](https://nvd.nist.gov/vuln/detail/CVE-2024-49856), [CVE-2024-49852](https://nvd.nist.gov/vuln/detail/CVE-2024-49852), [CVE-2024-49851](https://nvd.nist.gov/vuln/detail/CVE-2024-49851), [CVE-2024-47735](https://nvd.nist.gov/vuln/detail/CVE-2024-47735), [CVE-2024-47734](https://nvd.nist.gov/vuln/detail/CVE-2024-47734), [CVE-2024-47757](https://nvd.nist.gov/vuln/detail/CVE-2024-47757), [CVE-2024-47756](https://nvd.nist.gov/vuln/detail/CVE-2024-47756), [CVE-2024-47749](https://nvd.nist.gov/vuln/detail/CVE-2024-47749), [CVE-2024-47748](https://nvd.nist.gov/vuln/detail/CVE-2024-47748), [CVE-2024-47747](https://nvd.nist.gov/vuln/detail/CVE-2024-47747), [CVE-2024-47742](https://nvd.nist.gov/vuln/detail/CVE-2024-47742), [CVE-2024-47740](https://nvd.nist.gov/vuln/detail/CVE-2024-47740), [CVE-2024-47739](https://nvd.nist.gov/vuln/detail/CVE-2024-47739), [CVE-2024-47737](https://nvd.nist.gov/vuln/detail/CVE-2024-47737), [CVE-2024-47723](https://nvd.nist.gov/vuln/detail/CVE-2024-47723), [CVE-2023-52917](https://nvd.nist.gov/vuln/detail/CVE-2023-52917), [CVE-2024-47722](https://nvd.nist.gov/vuln/detail/CVE-2024-47722), [CVE-2024-47712](https://nvd.nist.gov/vuln/detail/CVE-2024-47712), [CVE-2024-47710](https://nvd.nist.gov/vuln/detail/CVE-2024-47710), [CVE-2024-47709](https://nvd.nist.gov/vuln/detail/CVE-2024-47709), [CVE-2024-47706](https://nvd.nist.gov/vuln/detail/CVE-2024-47706), [CVE-2024-47705](https://nvd.nist.gov/vuln/detail/CVE-2024-47705), [CVE-2024-47720](https://nvd.nist.gov/vuln/detail/CVE-2024-47720), [CVE-2024-47718](https://nvd.nist.gov/vuln/detail/CVE-2024-47718), [CVE-2024-47713](https://nvd.nist.gov/vuln/detail/CVE-2024-47713), [CVE-2024-47684](https://nvd.nist.gov/vuln/detail/CVE-2024-47684), [CVE-2024-47679](https://nvd.nist.gov/vuln/detail/CVE-2024-47679), [CVE-2024-47701](https://nvd.nist.gov/vuln/detail/CVE-2024-47701), [CVE-2024-47699](https://nvd.nist.gov/vuln/detail/CVE-2024-47699), [CVE-2024-47698](https://nvd.nist.gov/vuln/detail/CVE-2024-47698), [CVE-2024-47697](https://nvd.nist.gov/vuln/detail/CVE-2024-47697), [CVE-2024-47696](https://nvd.nist.gov/vuln/detail/CVE-2024-47696), [CVE-2024-47695](https://nvd.nist.gov/vuln/detail/CVE-2024-47695), [CVE-2024-47693](https://nvd.nist.gov/vuln/detail/CVE-2024-47693), [CVE-2024-47692](https://nvd.nist.gov/vuln/detail/CVE-2024-47692), [CVE-2024-47690](https://nvd.nist.gov/vuln/detail/CVE-2024-47690), [CVE-2024-47685](https://nvd.nist.gov/vuln/detail/CVE-2024-47685), [CVE-2024-50201](https://nvd.nist.gov/vuln/detail/CVE-2024-50201), [CVE-2024-50202](https://nvd.nist.gov/vuln/detail/CVE-2024-50202), [CVE-2024-50185](https://nvd.nist.gov/vuln/detail/CVE-2024-50185), [CVE-2024-50182](https://nvd.nist.gov/vuln/detail/CVE-2024-50182), [CVE-2024-50101](https://nvd.nist.gov/vuln/detail/CVE-2024-50101), [CVE-2024-50099](https://nvd.nist.gov/vuln/detail/CVE-2024-50099), [CVE-2024-50085](https://nvd.nist.gov/vuln/detail/CVE-2024-50085), [CVE-2024-50083](https://nvd.nist.gov/vuln/detail/CVE-2024-50083), [CVE-2024-50082](https://nvd.nist.gov/vuln/detail/CVE-2024-50082), [CVE-2024-50074](https://nvd.nist.gov/vuln/detail/CVE-2024-50074), [CVE-2024-50210](https://nvd.nist.gov/vuln/detail/CVE-2024-50210), [CVE-2024-50209](https://nvd.nist.gov/vuln/detail/CVE-2024-50209), [CVE-2024-50208](https://nvd.nist.gov/vuln/detail/CVE-2024-50208), [CVE-2024-50205](https://nvd.nist.gov/vuln/detail/CVE-2024-50205), [CVE-2024-50163](https://nvd.nist.gov/vuln/detail/CVE-2024-50163), [CVE-2024-50162](https://nvd.nist.gov/vuln/detail/CVE-2024-50162), [CVE-2024-50160](https://nvd.nist.gov/vuln/detail/CVE-2024-50160), [CVE-2024-50171](https://nvd.nist.gov/vuln/detail/CVE-2024-50171), [CVE-2024-50168](https://nvd.nist.gov/vuln/detail/CVE-2024-50168), [CVE-2024-50167](https://nvd.nist.gov/vuln/detail/CVE-2024-50167), [CVE-2024-50156](https://nvd.nist.gov/vuln/detail/CVE-2024-50156), [CVE-2024-50148](https://nvd.nist.gov/vuln/detail/CVE-2024-50148), [CVE-2024-50143](https://nvd.nist.gov/vuln/detail/CVE-2024-50143), [CVE-2024-50142](https://nvd.nist.gov/vuln/detail/CVE-2024-50142), [CVE-2024-50154](https://nvd.nist.gov/vuln/detail/CVE-2024-50154), [CVE-2024-50153](https://nvd.nist.gov/vuln/detail/CVE-2024-50153), [CVE-2024-50151](https://nvd.nist.gov/vuln/detail/CVE-2024-50151), [CVE-2024-50150](https://nvd.nist.gov/vuln/detail/CVE-2024-50150), [CVE-2024-50128](https://nvd.nist.gov/vuln/detail/CVE-2024-50128), [CVE-2024-50134](https://nvd.nist.gov/vuln/detail/CVE-2024-50134), [CVE-2024-50131](https://nvd.nist.gov/vuln/detail/CVE-2024-50131), [CVE-2024-50110](https://nvd.nist.gov/vuln/detail/CVE-2024-50110), [CVE-2024-50127](https://nvd.nist.gov/vuln/detail/CVE-2024-50127), [CVE-2024-50117](https://nvd.nist.gov/vuln/detail/CVE-2024-50117), [CVE-2024-50116](https://nvd.nist.gov/vuln/detail/CVE-2024-50116), [CVE-2024-50115](https://nvd.nist.gov/vuln/detail/CVE-2024-50115), [CVE-2024-50103](https://nvd.nist.gov/vuln/detail/CVE-2024-50103), [CVE-2024-53042](https://nvd.nist.gov/vuln/detail/CVE-2024-53042), [CVE-2024-53059](https://nvd.nist.gov/vuln/detail/CVE-2024-53059), [CVE-2024-53057](https://nvd.nist.gov/vuln/detail/CVE-2024-53057), [CVE-2024-53058](https://nvd.nist.gov/vuln/detail/CVE-2024-53058), [CVE-2024-53055](https://nvd.nist.gov/vuln/detail/CVE-2024-53055), [CVE-2024-50262](https://nvd.nist.gov/vuln/detail/CVE-2024-50262), [CVE-2024-50259](https://nvd.nist.gov/vuln/detail/CVE-2024-50259), [CVE-2024-50234](https://nvd.nist.gov/vuln/detail/CVE-2024-50234), [CVE-2024-50233](https://nvd.nist.gov/vuln/detail/CVE-2024-50233), [CVE-2024-50232](https://nvd.nist.gov/vuln/detail/CVE-2024-50232), [CVE-2024-50230](https://nvd.nist.gov/vuln/detail/CVE-2024-50230), [CVE-2024-50257](https://nvd.nist.gov/vuln/detail/CVE-2024-50257), [CVE-2024-50229](https://nvd.nist.gov/vuln/detail/CVE-2024-50229), [CVE-2024-50251](https://nvd.nist.gov/vuln/detail/CVE-2024-50251), [CVE-2024-50249](https://nvd.nist.gov/vuln/detail/CVE-2024-50249), [CVE-2024-50247](https://nvd.nist.gov/vuln/detail/CVE-2024-50247), [CVE-2024-50228](https://nvd.nist.gov/vuln/detail/CVE-2024-50228), [CVE-2024-50245](https://nvd.nist.gov/vuln/detail/CVE-2024-50245), [CVE-2024-50244](https://nvd.nist.gov/vuln/detail/CVE-2024-50244), [CVE-2024-50237](https://nvd.nist.gov/vuln/detail/CVE-2024-50237), [CVE-2024-50236](https://nvd.nist.gov/vuln/detail/CVE-2024-50236), [CVE-2024-50219](https://nvd.nist.gov/vuln/detail/CVE-2024-50219), [CVE-2024-50218](https://nvd.nist.gov/vuln/detail/CVE-2024-50218), [CVE-2024-53103](https://nvd.nist.gov/vuln/detail/CVE-2024-53103), [CVE-2024-53104](https://nvd.nist.gov/vuln/detail/CVE-2024-53104), [CVE-2024-53088](https://nvd.nist.gov/vuln/detail/CVE-2024-53088), [CVE-2024-53060](https://nvd.nist.gov/vuln/detail/CVE-2024-53060), [CVE-2024-53066](https://nvd.nist.gov/vuln/detail/CVE-2024-53066), [CVE-2024-53063](https://nvd.nist.gov/vuln/detail/CVE-2024-53063), [CVE-2024-53070](https://nvd.nist.gov/vuln/detail/CVE-2024-53070), [CVE-2024-53061](https://nvd.nist.gov/vuln/detail/CVE-2024-53061), [CVE-2024-53052](https://nvd.nist.gov/vuln/detail/CVE-2024-53052), [CVE-2024-50302](https://nvd.nist.gov/vuln/detail/CVE-2024-50302), [CVE-2024-50301](https://nvd.nist.gov/vuln/detail/CVE-2024-50301), [CVE-2024-50296](https://nvd.nist.gov/vuln/detail/CVE-2024-50296), [CVE-2024-50295](https://nvd.nist.gov/vuln/detail/CVE-2024-50295), [CVE-2024-50292](https://nvd.nist.gov/vuln/detail/CVE-2024-50292), [CVE-2024-50290](https://nvd.nist.gov/vuln/detail/CVE-2024-50290), [CVE-2024-50299](https://nvd.nist.gov/vuln/detail/CVE-2024-50299), [CVE-2024-50282](https://nvd.nist.gov/vuln/detail/CVE-2024-50282), [CVE-2024-50279](https://nvd.nist.gov/vuln/detail/CVE-2024-50279), [CVE-2024-50278](https://nvd.nist.gov/vuln/detail/CVE-2024-50278), [CVE-2024-50287](https://nvd.nist.gov/vuln/detail/CVE-2024-50287), [CVE-2024-50273](https://nvd.nist.gov/vuln/detail/CVE-2024-50273), [CVE-2024-50269](https://nvd.nist.gov/vuln/detail/CVE-2024-50269), [CVE-2024-50268](https://nvd.nist.gov/vuln/detail/CVE-2024-50268), [CVE-2024-50267](https://nvd.nist.gov/vuln/detail/CVE-2024-50267), [CVE-2024-50264](https://nvd.nist.gov/vuln/detail/CVE-2024-50264), [CVE-2024-50265](https://nvd.nist.gov/vuln/detail/CVE-2024-50265), [CVE-2024-53101](https://nvd.nist.gov/vuln/detail/CVE-2024-53101), [CVE-2024-53097](https://nvd.nist.gov/vuln/detail/CVE-2024-53097)) - OpenSSL ([CVE-2024-2511](https://nvd.nist.gov/vuln/detail/CVE-2024-2511), [CVE-2024-4603](https://nvd.nist.gov/vuln/detail/CVE-2024-4603), [CVE-2024-4741](https://nvd.nist.gov/vuln/detail/CVE-2024-4741), [CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535), [CVE-2024-6119](https://nvd.nist.gov/vuln/detail/CVE-2024-6119), [CVE-2024-9143](https://nvd.nist.gov/vuln/detail/CVE-2024-9143)) #### Bug fixes: - Equinix Metal: fixed race condition on 'mount' Ignition stage ([scripts#2308](https://github.com/flatcar/scripts/pull/2308)) #### Updates: - Linux ([5.15.173](https://lwn.net/Articles/998452) (includes [5.15.172](https://lwn.net/Articles/998152), [5.15.171](https://lwn.net/Articles/997530), [5.15.170](https://lwn.net/Articles/996691), [5.15.169](https://lwn.net/Articles/995134), [5.15.168](https://lwn.net/Articles/994636), [5.15.167](https://lwn.net/Articles/990047), [5.15.166](https://lwn.net/Articles/988751), [5.15.165](https://lwn.net/Articles/986233), [5.15.164](https://lwn.net/Articles/983657), [5.15.163](https://lwn.net/Articles/982384), [5.15.162](https://lwn.net/Articles/980862))) - OpenSSL ([3.0.15](https://github.com/openssl/openssl/blob/openssl-3.0/CHANGES.md#openssl-30)) - ca-certificates ([3.107](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_107.html) (includes [3.106](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html), [3.105](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_105.html), [3.104](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_104.html), [3.103](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_103.html), [3.102](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102.html), [3.102.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_102_1.html), [3.101.1](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_101_1.html))) Best, The Flatcar Container Linux Maintainers --- ### Communication #### Go/No-Go message for Matrix/Slack Go/No-Go Meeting for Alpha 4186.0.0, Beta 4152.1.0, Stable 4081.2.1 and LTS 3510.3.6 Pre-view images are available in https://bincache.flatcar-linux.net/images/amd64/$VERSION/ Tracking issue: https://github.com/flatcar/Flatcar/issues/1599 The Go/No-Go document is in our HackMD @flatcar namespace Link: https://hackmd.io/LINKHERE?view Please give your Go/No-Go vote with 💚 for Go, ❌ for No-Go, and ✋ for Wait. Contributors & community feel free to put your suggestions, thoughts or comments on the document or here in the chat. @MAINTAINER @MAINTAINER @MAINTAINER #### Mastodon _The toot (from [@flatcar](https://hachyderm.io/@flatcar)) goes out after the changelog update has been published; it includes a link to the web changelog._ New releases out now! đŸ“Ļ Many updates: Podman, Kernel, OpenSSL 🔒 CVE fixes: OpenSSL, Kernel đŸĒŠ Stable will graduate to LTS in 2025! 📜 More here: https://www.flatcar.org/releases/ #### Kubernetes Slack _This goes in the #flatcar channel_ Please welcome Flatcar releases of this month: - Alpha 4186.0.0 (new major) - Beta 4152.1.0 (maintenance release) - Stable 4081.2.1 (maintenance release) - LTS-2023 3510.3.6 (maintenance release) These releases include: 🚀 new features: ProxmoxVE support comes on Beta 🩹 Fix bugs: Missing qemu-guest-agent on Arm64 đŸ“Ļ Many package updates: Podman, Kernel, OpenSSL đŸĒŠ Stable release will graduate to LTS in 2025! 📜 Release notes in usual spot: https://www.flatcar.org/releases/