# Flatcar Container Linux Release - 12th of November 2024
## Alpha 4152.0.0
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: qemu_uefi_secure
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
VERDICT: _GO_
## Beta 4116.1.0
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: qemu_uefi_secure
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
VERDICT: _GO_
## Stable 4081.2.0
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All except Equinix Metal
- Platforms failed: Equinix Metal (not enough capacity to deploy requested instances)
- Platforms not tested: None
VERDICT: _GO_
## Communication
---
#### Guidelines / Things to Remember
- Release notes are used in a PR and will appear on https://www.flatcar.org/releases/
- [Announcement Message](#Announcement-Message) is posted in [Flatcar-Linux-user](https://groups.google.com/g/flatcar-linux-user). Make sure to post as “Flatcar Container Linux User”, not with your personal user (this can be selected when drafting the post).
---
### Announcement Message
Subject: Announcing new releases Alpha 4152.0.0, Beta 4116.1.0 and Stable 4081.2.0
Hello,
We are pleased to announce a new Flatcar Container Linux major release for the Alpha, Beta and Stable channel.
### ⚠️⚠️⚠️ End of support for CGroupsV1 in early 2025 ⚠️⚠️⚠️
> Flatcar will stop supporting the cgroups v1 backwards compatibility mode in Q1 2025.
> With our adoption of systemd-256, support for legacy CGroupsV1 will end in Alpha, Beta, and eventually Stable.
> [Enabling legacy CGroupsV1 during deployment](https://www.flatcar.org/docs/latest/container-runtimes/switching-to-unified-cgroups/#starting-new-nodes-with-legacy-cgroups) will not be supported anymore.
> Nodes that use CGroupsV1 legacy mode will fail to update. This ensures your workloads will not be disrupted. Enable CGroupsV2 on your legacy CGroupsV1 nodes in order to successfully update.
>
> LTS-2024 will support CGroupsV1 until late 2025.
### Stable 4081.2.0
_Changes since **Stable 3975.2.2**_
#### Security fixes:
- Linux ([CVE-2024-50179](https://nvd.nist.gov/vuln/detail/CVE-2024-50179), [CVE-2024-50176](https://nvd.nist.gov/vuln/detail/CVE-2024-50176), [CVE-2024-50175](https://nvd.nist.gov/vuln/detail/CVE-2024-50175), [CVE-2024-50012](https://nvd.nist.gov/vuln/detail/CVE-2024-50012), [CVE-2024-50008](https://nvd.nist.gov/vuln/detail/CVE-2024-50008), [CVE-2024-50007](https://nvd.nist.gov/vuln/detail/CVE-2024-50007), [CVE-2024-50006](https://nvd.nist.gov/vuln/detail/CVE-2024-50006), [CVE-2024-50005](https://nvd.nist.gov/vuln/detail/CVE-2024-50005), [CVE-2024-50016](https://nvd.nist.gov/vuln/detail/CVE-2024-50016), [CVE-2024-50015](https://nvd.nist.gov/vuln/detail/CVE-2024-50015), [CVE-2024-50013](https://nvd.nist.gov/vuln/detail/CVE-2024-50013), [CVE-2024-50003](https://nvd.nist.gov/vuln/detail/CVE-2024-50003), [CVE-2024-50002](https://nvd.nist.gov/vuln/detail/CVE-2024-50002), [CVE-2024-50001](https://nvd.nist.gov/vuln/detail/CVE-2024-50001), [CVE-2024-50000](https://nvd.nist.gov/vuln/detail/CVE-2024-50000), [CVE-2024-49997](https://nvd.nist.gov/vuln/detail/CVE-2024-49997), [CVE-2024-49996](https://nvd.nist.gov/vuln/detail/CVE-2024-49996), [CVE-2024-49995](https://nvd.nist.gov/vuln/detail/CVE-2024-49995), [CVE-2024-49955](https://nvd.nist.gov/vuln/detail/CVE-2024-49955), [CVE-2024-49963](https://nvd.nist.gov/vuln/detail/CVE-2024-49963), [CVE-2024-49962](https://nvd.nist.gov/vuln/detail/CVE-2024-49962), [CVE-2024-49961](https://nvd.nist.gov/vuln/detail/CVE-2024-49961), [CVE-2024-49960](https://nvd.nist.gov/vuln/detail/CVE-2024-49960), [CVE-2024-49959](https://nvd.nist.gov/vuln/detail/CVE-2024-49959), [CVE-2024-49993](https://nvd.nist.gov/vuln/detail/CVE-2024-49993), [CVE-2024-49992](https://nvd.nist.gov/vuln/detail/CVE-2024-49992), [CVE-2024-49991](https://nvd.nist.gov/vuln/detail/CVE-2024-49991), [CVE-2024-49989](https://nvd.nist.gov/vuln/detail/CVE-2024-49989), [CVE-2024-49988](https://nvd.nist.gov/vuln/detail/CVE-2024-49988), [CVE-2024-49987](https://nvd.nist.gov/vuln/detail/CVE-2024-49987), [CVE-2024-49986](https://nvd.nist.gov/vuln/detail/CVE-2024-49986), [CVE-2024-49985](https://nvd.nist.gov/vuln/detail/CVE-2024-49985), [CVE-2024-49958](https://nvd.nist.gov/vuln/detail/CVE-2024-49958), [CVE-2024-49983](https://nvd.nist.gov/vuln/detail/CVE-2024-49983), [CVE-2024-49982](https://nvd.nist.gov/vuln/detail/CVE-2024-49982), [CVE-2024-49981](https://nvd.nist.gov/vuln/detail/CVE-2024-49981), [CVE-2024-49980](https://nvd.nist.gov/vuln/detail/CVE-2024-49980), [CVE-2024-49978](https://nvd.nist.gov/vuln/detail/CVE-2024-49978), [CVE-2024-49977](https://nvd.nist.gov/vuln/detail/CVE-2024-49977), [CVE-2024-49976](https://nvd.nist.gov/vuln/detail/CVE-2024-49976), [CVE-2024-49975](https://nvd.nist.gov/vuln/detail/CVE-2024-49975), [CVE-2024-49957](https://nvd.nist.gov/vuln/detail/CVE-2024-49957), [CVE-2024-49973](https://nvd.nist.gov/vuln/detail/CVE-2024-49973), [CVE-2024-49969](https://nvd.nist.gov/vuln/detail/CVE-2024-49969), [CVE-2024-49967](https://nvd.nist.gov/vuln/detail/CVE-2024-49967), [CVE-2024-49966](https://nvd.nist.gov/vuln/detail/CVE-2024-49966), [CVE-2024-49965](https://nvd.nist.gov/vuln/detail/CVE-2024-49965), [CVE-2024-49924](https://nvd.nist.gov/vuln/detail/CVE-2024-49924), [CVE-2024-49954](https://nvd.nist.gov/vuln/detail/CVE-2024-49954), [CVE-2024-49953](https://nvd.nist.gov/vuln/detail/CVE-2024-49953), [CVE-2024-49952](https://nvd.nist.gov/vuln/detail/CVE-2024-49952), [CVE-2024-49951](https://nvd.nist.gov/vuln/detail/CVE-2024-49951), [CVE-2024-49950](https://nvd.nist.gov/vuln/detail/CVE-2024-49950), [CVE-2024-49949](https://nvd.nist.gov/vuln/detail/CVE-2024-49949), [CVE-2024-49948](https://nvd.nist.gov/vuln/detail/CVE-2024-49948), [CVE-2024-49947](https://nvd.nist.gov/vuln/detail/CVE-2024-49947), [CVE-2024-49946](https://nvd.nist.gov/vuln/detail/CVE-2024-49946), [CVE-2024-49944](https://nvd.nist.gov/vuln/detail/CVE-2024-49944), [CVE-2024-49939](https://nvd.nist.gov/vuln/detail/CVE-2024-49939), [CVE-2024-49938](https://nvd.nist.gov/vuln/detail/CVE-2024-49938), [CVE-2024-49937](https://nvd.nist.gov/vuln/detail/CVE-2024-49937), [CVE-2024-49936](https://nvd.nist.gov/vuln/detail/CVE-2024-49936), [CVE-2024-49935](https://nvd.nist.gov/vuln/detail/CVE-2024-49935), [CVE-2024-49933](https://nvd.nist.gov/vuln/detail/CVE-2024-49933), [CVE-2024-49931](https://nvd.nist.gov/vuln/detail/CVE-2024-49931), [CVE-2024-49930](https://nvd.nist.gov/vuln/detail/CVE-2024-49930), [CVE-2024-49929](https://nvd.nist.gov/vuln/detail/CVE-2024-49929), [CVE-2024-49927](https://nvd.nist.gov/vuln/detail/CVE-2024-49927), [CVE-2024-49925](https://nvd.nist.gov/vuln/detail/CVE-2024-49925), [CVE-2024-49875](https://nvd.nist.gov/vuln/detail/CVE-2024-49875), [CVE-2024-49884](https://nvd.nist.gov/vuln/detail/CVE-2024-49884), [CVE-2024-49883](https://nvd.nist.gov/vuln/detail/CVE-2024-49883), [CVE-2024-49882](https://nvd.nist.gov/vuln/detail/CVE-2024-49882), [CVE-2024-49881](https://nvd.nist.gov/vuln/detail/CVE-2024-49881), [CVE-2024-49879](https://nvd.nist.gov/vuln/detail/CVE-2024-49879), [CVE-2024-49913](https://nvd.nist.gov/vuln/detail/CVE-2024-49913), [CVE-2024-49912](https://nvd.nist.gov/vuln/detail/CVE-2024-49912), [CVE-2024-49907](https://nvd.nist.gov/vuln/detail/CVE-2024-49907), [CVE-2024-49905](https://nvd.nist.gov/vuln/detail/CVE-2024-49905), [CVE-2024-49878](https://nvd.nist.gov/vuln/detail/CVE-2024-49878), [CVE-2024-49903](https://nvd.nist.gov/vuln/detail/CVE-2024-49903), [CVE-2024-49902](https://nvd.nist.gov/vuln/detail/CVE-2024-49902), [CVE-2024-49901](https://nvd.nist.gov/vuln/detail/CVE-2024-49901), [CVE-2024-49900](https://nvd.nist.gov/vuln/detail/CVE-2024-49900), [CVE-2024-49896](https://nvd.nist.gov/vuln/detail/CVE-2024-49896), [CVE-2024-49895](https://nvd.nist.gov/vuln/detail/CVE-2024-49895), [CVE-2024-49877](https://nvd.nist.gov/vuln/detail/CVE-2024-49877), [CVE-2024-49894](https://nvd.nist.gov/vuln/detail/CVE-2024-49894), [CVE-2024-49892](https://nvd.nist.gov/vuln/detail/CVE-2024-49892), [CVE-2024-49890](https://nvd.nist.gov/vuln/detail/CVE-2024-49890), [CVE-2024-49889](https://nvd.nist.gov/vuln/detail/CVE-2024-49889), [CVE-2024-49886](https://nvd.nist.gov/vuln/detail/CVE-2024-49886), [CVE-2024-49863](https://nvd.nist.gov/vuln/detail/CVE-2024-49863), [CVE-2024-49871](https://nvd.nist.gov/vuln/detail/CVE-2024-49871), [CVE-2024-49870](https://nvd.nist.gov/vuln/detail/CVE-2024-49870), [CVE-2024-49868](https://nvd.nist.gov/vuln/detail/CVE-2024-49868), [CVE-2024-49867](https://nvd.nist.gov/vuln/detail/CVE-2024-49867), [CVE-2024-49866](https://nvd.nist.gov/vuln/detail/CVE-2024-49866), [CVE-2024-49874](https://nvd.nist.gov/vuln/detail/CVE-2024-49874), [CVE-2024-49864](https://nvd.nist.gov/vuln/detail/CVE-2024-49864), [CVE-2024-47704](https://nvd.nist.gov/vuln/detail/CVE-2024-47704), [CVE-2024-50191](https://nvd.nist.gov/vuln/detail/CVE-2024-50191), [CVE-2024-50189](https://nvd.nist.gov/vuln/detail/CVE-2024-50189), [CVE-2024-50188](https://nvd.nist.gov/vuln/detail/CVE-2024-50188), [CVE-2024-50187](https://nvd.nist.gov/vuln/detail/CVE-2024-50187), [CVE-2024-50186](https://nvd.nist.gov/vuln/detail/CVE-2024-50186), [CVE-2024-50185](https://nvd.nist.gov/vuln/detail/CVE-2024-50185), [CVE-2024-50184](https://nvd.nist.gov/vuln/detail/CVE-2024-50184), [CVE-2024-50183](https://nvd.nist.gov/vuln/detail/CVE-2024-50183), [CVE-2024-50182](https://nvd.nist.gov/vuln/detail/CVE-2024-50182), [CVE-2024-50180](https://nvd.nist.gov/vuln/detail/CVE-2024-50180), [CVE-2024-50181](https://nvd.nist.gov/vuln/detail/CVE-2024-50181), [CVE-2024-50097](https://nvd.nist.gov/vuln/detail/CVE-2024-50097), [CVE-2024-50096](https://nvd.nist.gov/vuln/detail/CVE-2024-50096), [CVE-2024-50095](https://nvd.nist.gov/vuln/detail/CVE-2024-50095), [CVE-2024-50093](https://nvd.nist.gov/vuln/detail/CVE-2024-50093), [CVE-2024-50089](https://nvd.nist.gov/vuln/detail/CVE-2024-50089), [CVE-2024-50058](https://nvd.nist.gov/vuln/detail/CVE-2024-50058), [CVE-2024-50065](https://nvd.nist.gov/vuln/detail/CVE-2024-50065), [CVE-2024-50064](https://nvd.nist.gov/vuln/detail/CVE-2024-50064), [CVE-2024-50063](https://nvd.nist.gov/vuln/detail/CVE-2024-50063), [CVE-2024-50062](https://nvd.nist.gov/vuln/detail/CVE-2024-50062), [CVE-2024-50061](https://nvd.nist.gov/vuln/detail/CVE-2024-50061), [CVE-2024-50060](https://nvd.nist.gov/vuln/detail/CVE-2024-50060), [CVE-2024-50059](https://nvd.nist.gov/vuln/detail/CVE-2024-50059), [CVE-2024-50026](https://nvd.nist.gov/vuln/detail/CVE-2024-50026), [CVE-2024-50024](https://nvd.nist.gov/vuln/detail/CVE-2024-50024), [CVE-2024-50023](https://nvd.nist.gov/vuln/detail/CVE-2024-50023), [CVE-2024-50057](https://nvd.nist.gov/vuln/detail/CVE-2024-50057), [CVE-2024-50055](https://nvd.nist.gov/vuln/detail/CVE-2024-50055), [CVE-2024-50049](https://nvd.nist.gov/vuln/detail/CVE-2024-50049), [CVE-2024-50022](https://nvd.nist.gov/vuln/detail/CVE-2024-50022), [CVE-2024-50048](https://nvd.nist.gov/vuln/detail/CVE-2024-50048), [CVE-2024-50047](https://nvd.nist.gov/vuln/detail/CVE-2024-50047), [CVE-2024-50046](https://nvd.nist.gov/vuln/detail/CVE-2024-50046), [CVE-2024-50045](https://nvd.nist.gov/vuln/detail/CVE-2024-50045), [CVE-2024-50044](https://nvd.nist.gov/vuln/detail/CVE-2024-50044), [CVE-2024-50041](https://nvd.nist.gov/vuln/detail/CVE-2024-50041), [CVE-2024-50040](https://nvd.nist.gov/vuln/detail/CVE-2024-50040), [CVE-2024-50039](https://nvd.nist.gov/vuln/detail/CVE-2024-50039), [CVE-2024-50038](https://nvd.nist.gov/vuln/detail/CVE-2024-50038), [CVE-2024-50036](https://nvd.nist.gov/vuln/detail/CVE-2024-50036), [CVE-2024-50035](https://nvd.nist.gov/vuln/detail/CVE-2024-50035), [CVE-2024-50033](https://nvd.nist.gov/vuln/detail/CVE-2024-50033), [CVE-2024-50032](https://nvd.nist.gov/vuln/detail/CVE-2024-50032), [CVE-2024-50031](https://nvd.nist.gov/vuln/detail/CVE-2024-50031), [CVE-2024-50029](https://nvd.nist.gov/vuln/detail/CVE-2024-50029), [CVE-2024-50019](https://nvd.nist.gov/vuln/detail/CVE-2024-50019), [CVE-2024-50201](https://nvd.nist.gov/vuln/detail/CVE-2024-50201), [CVE-2024-50202](https://nvd.nist.gov/vuln/detail/CVE-2024-50202), [CVE-2024-50101](https://nvd.nist.gov/vuln/detail/CVE-2024-50101), [CVE-2024-50098](https://nvd.nist.gov/vuln/detail/CVE-2024-50098), [CVE-2024-50099](https://nvd.nist.gov/vuln/detail/CVE-2024-50099), [CVE-2024-50088](https://nvd.nist.gov/vuln/detail/CVE-2024-50088), [CVE-2024-50087](https://nvd.nist.gov/vuln/detail/CVE-2024-50087), [CVE-2024-50086](https://nvd.nist.gov/vuln/detail/CVE-2024-50086), [CVE-2024-50085](https://nvd.nist.gov/vuln/detail/CVE-2024-50085), [CVE-2024-50084](https://nvd.nist.gov/vuln/detail/CVE-2024-50084), [CVE-2024-50083](https://nvd.nist.gov/vuln/detail/CVE-2024-50083), [CVE-2024-50082](https://nvd.nist.gov/vuln/detail/CVE-2024-50082), [CVE-2024-50080](https://nvd.nist.gov/vuln/detail/CVE-2024-50080), [CVE-2024-50077](https://nvd.nist.gov/vuln/detail/CVE-2024-50077), [CVE-2024-50076](https://nvd.nist.gov/vuln/detail/CVE-2024-50076), [CVE-2024-50075](https://nvd.nist.gov/vuln/detail/CVE-2024-50075), [CVE-2024-50074](https://nvd.nist.gov/vuln/detail/CVE-2024-50074), [CVE-2024-50073](https://nvd.nist.gov/vuln/detail/CVE-2024-50073), [CVE-2024-50072](https://nvd.nist.gov/vuln/detail/CVE-2024-50072), [CVE-2024-50070](https://nvd.nist.gov/vuln/detail/CVE-2024-50070), [CVE-2024-50078](https://nvd.nist.gov/vuln/detail/CVE-2024-50078), [CVE-2024-50069](https://nvd.nist.gov/vuln/detail/CVE-2024-50069), [CVE-2024-50066](https://nvd.nist.gov/vuln/detail/CVE-2024-50066), [CVE-2024-50211](https://nvd.nist.gov/vuln/detail/CVE-2024-50211), [CVE-2024-50210](https://nvd.nist.gov/vuln/detail/CVE-2024-50210), [CVE-2024-50209](https://nvd.nist.gov/vuln/detail/CVE-2024-50209), [CVE-2024-50208](https://nvd.nist.gov/vuln/detail/CVE-2024-50208), [CVE-2024-50205](https://nvd.nist.gov/vuln/detail/CVE-2024-50205), [CVE-2024-50155](https://nvd.nist.gov/vuln/detail/CVE-2024-50155), [CVE-2024-50164](https://nvd.nist.gov/vuln/detail/CVE-2024-50164), [CVE-2024-50163](https://nvd.nist.gov/vuln/detail/CVE-2024-50163), [CVE-2024-50162](https://nvd.nist.gov/vuln/detail/CVE-2024-50162), [CVE-2024-50160](https://nvd.nist.gov/vuln/detail/CVE-2024-50160), [CVE-2024-50159](https://nvd.nist.gov/vuln/detail/CVE-2024-50159), [CVE-2024-50158](https://nvd.nist.gov/vuln/detail/CVE-2024-50158), [CVE-2024-50172](https://nvd.nist.gov/vuln/detail/CVE-2024-50172), [CVE-2024-50171](https://nvd.nist.gov/vuln/detail/CVE-2024-50171), [CVE-2024-50170](https://nvd.nist.gov/vuln/detail/CVE-2024-50170), [CVE-2024-50169](https://nvd.nist.gov/vuln/detail/CVE-2024-50169), [CVE-2024-50168](https://nvd.nist.gov/vuln/detail/CVE-2024-50168), [CVE-2024-50167](https://nvd.nist.gov/vuln/detail/CVE-2024-50167), [CVE-2024-50166](https://nvd.nist.gov/vuln/detail/CVE-2024-50166), [CVE-2024-50156](https://nvd.nist.gov/vuln/detail/CVE-2024-50156), [CVE-2024-50148](https://nvd.nist.gov/vuln/detail/CVE-2024-50148), [CVE-2024-50147](https://nvd.nist.gov/vuln/detail/CVE-2024-50147), [CVE-2024-50145](https://nvd.nist.gov/vuln/detail/CVE-2024-50145), [CVE-2024-50143](https://nvd.nist.gov/vuln/detail/CVE-2024-50143), [CVE-2024-50142](https://nvd.nist.gov/vuln/detail/CVE-2024-50142), [CVE-2024-50141](https://nvd.nist.gov/vuln/detail/CVE-2024-50141), [CVE-2024-50154](https://nvd.nist.gov/vuln/detail/CVE-2024-50154), [CVE-2024-50153](https://nvd.nist.gov/vuln/detail/CVE-2024-50153), [CVE-2024-50152](https://nvd.nist.gov/vuln/detail/CVE-2024-50152), [CVE-2024-50151](https://nvd.nist.gov/vuln/detail/CVE-2024-50151), [CVE-2024-50150](https://nvd.nist.gov/vuln/detail/CVE-2024-50150), [CVE-2024-50139](https://nvd.nist.gov/vuln/detail/CVE-2024-50139), [CVE-2024-50140](https://nvd.nist.gov/vuln/detail/CVE-2024-50140), [CVE-2024-50128](https://nvd.nist.gov/vuln/detail/CVE-2024-50128), [CVE-2024-50136](https://nvd.nist.gov/vuln/detail/CVE-2024-50136), [CVE-2024-50135](https://nvd.nist.gov/vuln/detail/CVE-2024-50135), [CVE-2024-50134](https://nvd.nist.gov/vuln/detail/CVE-2024-50134), [CVE-2024-50133](https://nvd.nist.gov/vuln/detail/CVE-2024-50133), [CVE-2024-50131](https://nvd.nist.gov/vuln/detail/CVE-2024-50131), [CVE-2024-50130](https://nvd.nist.gov/vuln/detail/CVE-2024-50130), [CVE-2024-50111](https://nvd.nist.gov/vuln/detail/CVE-2024-50111), [CVE-2024-50110](https://nvd.nist.gov/vuln/detail/CVE-2024-50110), [CVE-2024-50108](https://nvd.nist.gov/vuln/detail/CVE-2024-50108), [CVE-2024-50127](https://nvd.nist.gov/vuln/detail/CVE-2024-50127), [CVE-2024-50126](https://nvd.nist.gov/vuln/detail/CVE-2024-50126), [CVE-2024-50125](https://nvd.nist.gov/vuln/detail/CVE-2024-50125), [CVE-2024-50124](https://nvd.nist.gov/vuln/detail/CVE-2024-50124), [CVE-2024-50121](https://nvd.nist.gov/vuln/detail/CVE-2024-50121), [CVE-2024-50120](https://nvd.nist.gov/vuln/detail/CVE-2024-50120), [CVE-2024-50117](https://nvd.nist.gov/vuln/detail/CVE-2024-50117), [CVE-2024-50116](https://nvd.nist.gov/vuln/detail/CVE-2024-50116), [CVE-2024-50115](https://nvd.nist.gov/vuln/detail/CVE-2024-50115), [CVE-2024-50112](https://nvd.nist.gov/vuln/detail/CVE-2024-50112), [CVE-2024-50103](https://nvd.nist.gov/vuln/detail/CVE-2024-50103), [CVE-2024-50262](https://nvd.nist.gov/vuln/detail/CVE-2024-50262), [CVE-2024-50259](https://nvd.nist.gov/vuln/detail/CVE-2024-50259), [CVE-2024-50261](https://nvd.nist.gov/vuln/detail/CVE-2024-50261), [CVE-2024-50226](https://nvd.nist.gov/vuln/detail/CVE-2024-50226), [CVE-2024-50235](https://nvd.nist.gov/vuln/detail/CVE-2024-50235), [CVE-2024-50234](https://nvd.nist.gov/vuln/detail/CVE-2024-50234), [CVE-2024-50233](https://nvd.nist.gov/vuln/detail/CVE-2024-50233), [CVE-2024-50232](https://nvd.nist.gov/vuln/detail/CVE-2024-50232), [CVE-2024-50231](https://nvd.nist.gov/vuln/detail/CVE-2024-50231), [CVE-2024-50230](https://nvd.nist.gov/vuln/detail/CVE-2024-50230), [CVE-2024-50258](https://nvd.nist.gov/vuln/detail/CVE-2024-50258), [CVE-2024-50257](https://nvd.nist.gov/vuln/detail/CVE-2024-50257), [CVE-2024-50256](https://nvd.nist.gov/vuln/detail/CVE-2024-50256), [CVE-2024-50229](https://nvd.nist.gov/vuln/detail/CVE-2024-50229), [CVE-2024-50255](https://nvd.nist.gov/vuln/detail/CVE-2024-50255), [CVE-2024-50252](https://nvd.nist.gov/vuln/detail/CVE-2024-50252), [CVE-2024-50251](https://nvd.nist.gov/vuln/detail/CVE-2024-50251), [CVE-2024-50250](https://nvd.nist.gov/vuln/detail/CVE-2024-50250), [CVE-2024-50249](https://nvd.nist.gov/vuln/detail/CVE-2024-50249), [CVE-2024-50248](https://nvd.nist.gov/vuln/detail/CVE-2024-50248), [CVE-2024-50247](https://nvd.nist.gov/vuln/detail/CVE-2024-50247), [CVE-2024-50246](https://nvd.nist.gov/vuln/detail/CVE-2024-50246), [CVE-2024-50228](https://nvd.nist.gov/vuln/detail/CVE-2024-50228), [CVE-2024-50245](https://nvd.nist.gov/vuln/detail/CVE-2024-50245), [CVE-2024-50244](https://nvd.nist.gov/vuln/detail/CVE-2024-50244), [CVE-2024-50243](https://nvd.nist.gov/vuln/detail/CVE-2024-50243), [CVE-2024-50242](https://nvd.nist.gov/vuln/detail/CVE-2024-50242), [CVE-2024-50240](https://nvd.nist.gov/vuln/detail/CVE-2024-50240), [CVE-2024-50239](https://nvd.nist.gov/vuln/detail/CVE-2024-50239), [CVE-2024-50237](https://nvd.nist.gov/vuln/detail/CVE-2024-50237), [CVE-2024-50236](https://nvd.nist.gov/vuln/detail/CVE-2024-50236), [CVE-2024-50219](https://nvd.nist.gov/vuln/detail/CVE-2024-50219), [CVE-2024-50218](https://nvd.nist.gov/vuln/detail/CVE-2024-50218), [CVE-2024-50216](https://nvd.nist.gov/vuln/detail/CVE-2024-50216), [CVE-2024-50215](https://nvd.nist.gov/vuln/detail/CVE-2024-50215), [CVE-2024-50224](https://nvd.nist.gov/vuln/detail/CVE-2024-50224), [CVE-2024-50223](https://nvd.nist.gov/vuln/detail/CVE-2024-50223), [CVE-2024-50222](https://nvd.nist.gov/vuln/detail/CVE-2024-50222))
- curl ([CVE-2024-6197](https://nvd.nist.gov/vuln/detail/CVE-2024-6197), [CVE-2024-6874](https://nvd.nist.gov/vuln/detail/CVE-2024-6874), [CVE-2024-7264](https://nvd.nist.gov/vuln/detail/CVE-2024-7264))
- docker ([CVE-2024-29018](https://nvd.nist.gov/vuln/detail/CVE-2024-29018))
- git ([CVE-2024-32002](https://nvd.nist.gov/vuln/detail/CVE-2024-32002), [CVE-2024-32004](https://nvd.nist.gov/vuln/detail/CVE-2024-32004), [CVE-2024-32020](https://nvd.nist.gov/vuln/detail/CVE-2024-32020), [CVE-2024-32021](https://nvd.nist.gov/vuln/detail/CVE-2024-32021), [CVE-2024-32465](https://nvd.nist.gov/vuln/detail/CVE-2024-32465))
- glib ([CVE-2024-34397](https://nvd.nist.gov/vuln/detail/CVE-2024-34397))
- intel-microcode ([CVE-2023-45733](https://nvd.nist.gov/vuln/detail/CVE-2023-45733), [CVE-2023-45745](https://nvd.nist.gov/vuln/detail/CVE-2023-45745), [CVE-2023-46103](https://nvd.nist.gov/vuln/detail/CVE-2023-46103), [CVE-2023-47855](https://nvd.nist.gov/vuln/detail/CVE-2023-47855))
- libarchive ([CVE-2024-26256](https://nvd.nist.gov/vuln/detail/CVE-2024-26256), [CVE-2024-37407](https://nvd.nist.gov/vuln/detail/CVE-2024-37407))
- libxml2 ([CVE-2024-34459](https://nvd.nist.gov/vuln/detail/CVE-2024-34459))
- linux-firmware ([CVE-2023-31315](https://nvd.nist.gov/vuln/detail/CVE-2023-31315))
- mit-krb5 ([CVE-2024-26461](https://nvd.nist.gov/vuln/detail/CVE-2024-26461), [CVE-2024-26462](https://nvd.nist.gov/vuln/detail/CVE-2024-26462), [CVE-2024-37370](https://nvd.nist.gov/vuln/detail/CVE-2024-37370), [CVE-2024-37371](https://nvd.nist.gov/vuln/detail/CVE-2024-37371))
- sysext-podman: podman ([CVE-2024-3727](https://nvd.nist.gov/vuln/detail/CVE-2024-3727))
- tpm2-tools ([CVE-2024-29038](https://nvd.nist.gov/vuln/detail/CVE-2024-29038), [CVE-2024-29039](https://nvd.nist.gov/vuln/detail/CVE-2024-29039), [CVE-2024-29040](https://nvd.nist.gov/vuln/detail/CVE-2024-29040))
- SDK: go ([CVE-2023-45288](https://nvd.nist.gov/vuln/detail/CVE-2023-45288), [CVE-2023-45289](https://nvd.nist.gov/vuln/detail/CVE-2023-45289), [CVE-2023-45290](https://nvd.nist.gov/vuln/detail/CVE-2023-45290), [CVE-2024-24783](https://nvd.nist.gov/vuln/detail/CVE-2024-24783), [CVE-2024-24784](https://nvd.nist.gov/vuln/detail/CVE-2024-24784), [CVE-2024-24785](https://nvd.nist.gov/vuln/detail/CVE-2024-24785), [CVE-2024-24788](https://nvd.nist.gov/vuln/detail/CVE-2024-24788), [CVE-2024-24789](https://nvd.nist.gov/vuln/detail/CVE-2024-24789), [CVE-2024-24790](https://nvd.nist.gov/vuln/detail/CVE-2024-24790), [CVE-2024-24791](https://nvd.nist.gov/vuln/detail/CVE-2024-24791))
- SDK: nasm ([CVE-2019-6290](https://nvd.nist.gov/vuln/detail/CVE-2019-6290), [CVE-2019-6291](https://nvd.nist.gov/vuln/detail/CVE-2019-6291), [CVE-2019-8343](https://nvd.nist.gov/vuln/detail/CVE-2019-8343), [CVE-2020-21528](https://nvd.nist.gov/vuln/detail/CVE-2020-21528), [CVE-2021-33450](https://nvd.nist.gov/vuln/detail/CVE-2021-33450), [CVE-2021-33452](https://nvd.nist.gov/vuln/detail/CVE-2021-33452), [CVE-2022-44368](https://nvd.nist.gov/vuln/detail/CVE-2022-44368), [CVE-2022-44369](https://nvd.nist.gov/vuln/detail/CVE-2022-44369), [CVE-2022-44370](https://nvd.nist.gov/vuln/detail/CVE-2022-44370))
- SDK: re2c ([CVE-2022-23901](https://nvd.nist.gov/vuln/detail/CVE-2022-23901))
#### Bug fixes:
- CloudSigma: Disabled the new DHCP RapidCommit feature which is enabled by default since systemd 255. CloudSigma provides an incompatible implementation which results in cloud-init not being applied as no IP is issued. See: ([flatcar/scripts#2016](https://github.com/flatcar/scripts/pull/2016))
- Fixed bad usage of gpg that prevented flatcar-install from being used with custom signing keys ([Flatcar#1471](https://github.com/flatcar/flatcar/pull/1471))
- Fixed the initrd option in the QEMU launcher script. It was -R, but this was already taken by the read-only pflash option, so use -r instead. ([scripts#2239](https://github.com/flatcar/scripts/pull/2239))
#### Changes:
- As part of the update to Catalyst 4 (used to build the SDK), the coreos package repository has been renamed to coreos-overlay to match its directory name. This will be reflected in package listings and package manager output. ([flatcar/scripts#2115](https://github.com/flatcar/scripts/pull/2115))
- Provided a Python Flatcar extension as optional systemd-sysext image with the release. Write 'python' to `/etc/flatcar/enabled-sysext.conf` through Ignition and the sysext will be installed during provisioning ([scripts#1979](https://github.com/flatcar/scripts/pull/1979))
- Added Akamai / Linode images ([flatcar/scripts#1806](https://github.com/flatcar/scripts/pull/1806))
- Removed unused grub executable duplicate files and removed grub modules that are already assembled in the grub executable ([flatcar/scripts#1955](https://github.com/flatcar/scripts/pull/1955)).
- Replace nmap netcat with openbsd variant. The license didn't get an exception from CNCF. Something about the definition of "derivative works" being too broad.
- The `docker build` command will now use buildx as its backend as the old one became deprecated and a loud "DEPRECATED" information is printed every time it's used.
- The kernel security module Landlock is now enabled for programs to sandbox themselves ([flatcar/scripts#2158](https://github.com/flatcar/scripts/pull/2158))
- libcrypt is now provided by the libxcrypt library instead of glibc. Glibc libcrypt was deprecated long time ago.
- Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha ([flatcar/scripts#2390](https://github.com/flatcar/scripts/pull/2390))
#### Updates:
- Ignition ([2.19.0](https://coreos.github.io/ignition/release-notes/#ignition-2190-2024-06-05))
- Linux ([6.6.60](https://lwn.net/Articles/997527) (includes [6.6.59](https://lwn.net/Articles/996689), [6.6.58](https://lwn.net/Articles/995132), [6.6.57](https://lwn.net/Articles/994634), [6.6.56](https://lwn.net/Articles/993600), [6.6.55](https://lwn.net/Articles/993599), [6.6.52](https://lwn.net/Articles/990767/), [6.6.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.50),[6.6.49](https://lwn.net/Articles/988749), [6.6.47](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.47), [6.6.46](https://lwn.net/Articles/985672), [6.6.45](https://lwn.net/Articles/985200), [6.6.44](https://lwn.net/Articles/984450), [6.6.32](https://lwn.net/Articles/975075), [6.6.31](https://lwn.net/Articles/974072)))
- Linux Firmware ([20240811](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240811) (includes [20240709](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240709), [20240610](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240610)))
- Open-iSCSI ([2.1.10](https://github.com/open-iscsi/open-iscsi/releases/tag/2.1.10))
- SDK: Go ([1.21.13](https://go.dev/doc/devel/release#go1.21.13) (includes [1.21.12](https://go.dev/doc/devel/release#go1.21.12) includes changes from [1.21](https://go.dev/doc/go1.21)))
- SDK: Rust ([1.80.1](https://github.com/rust-lang/rust/releases/tag/1.80.1) (includes [1.80.0](https://github.com/rust-lang/rust/releases/tag/1.80.0), [1.79.0](https://github.com/rust-lang/rust/releases/tag/1.79.0), [1.78.0](https://github.com/rust-lang/rust/releases/tag/1.78.0)))
- SDK: meson ([1.5.1](https://mesonbuild.com/Release-notes-for-1-5-0.html))
- SDK: nasm ([2.16.01](https://github.com/netwide-assembler/nasm/releases/tag/nasm-2.16.01))
- SDK: portage ([3.0.65](https://github.com/gentoo/portage/blob/f03998622e0960388e903de0d6d24bdf6881e567/NEWS#L9) (includes [3.0.63](https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.63)))
- SDK: qemu ([8.2.3](https://wiki.qemu.org/ChangeLog/8.2))
- afterburn ([5.6.0](https://coreos.github.io/afterburn/release-notes/#afterburn-560))
- audit ([3.1.2](https://github.com/linux-audit/audit-userspace/releases/tag/v3.1.2))
- azure-nvme-utils ([0.2.0](https://github.com/Azure/azure-nvme-utils/releases/tag/v0.2.0))
- binutils ([2.42](https://sourceware.org/pipermail/binutils/2024-January/132213.html))
- bpftool ([6.9.2](https://kernelnewbies.org/Linux_6.9#Tracing.2C_perf_and_BPF) (includes [6.8.2](https://kernelnewbies.org/Linux_6.8#Tracing.2C_perf_and_BPF)))
- btrfs-progs ([6.9.2](https://github.com/kdave/btrfs-progs/blob/v6.9.2/CHANGES))
- c-ares ([1.29.0](https://github.com/c-ares/c-ares/releases/tag/cares-1_29_0) (includes [1.28.1](https://github.com/c-ares/c-ares/releases/tag/cares-1_28_1), [1.28.0](https://github.com/c-ares/c-ares/releases/tag/cares-1_28_0)))
- cJSON ([1.7.18](https://github.com/DaveGamble/cJSON/releases/tag/v1.7.18))
- ca-certificates ([3.106](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html))
- conntrack-tools ([1.4.8](https://lwn.net/Articles/945927/))
- containerd ([1.7.21](https://github.com/containerd/containerd/releases/tag/v1.7.21) (includes [1.7.20](https://github.com/containerd/containerd/releases/tag/v1.7.20), [1.7.19](https://github.com/containerd/containerd/releases/tag/v1.7.19), [1.7.18](https://github.com/containerd/containerd/releases/tag/v1.7.18)))
- cryptsetup ([2.7.2](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.2/docs/v2.7.2-ReleaseNotes) (includes [2.7.1](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.1/docs/v2.7.1-ReleaseNotes) and [2.7.0](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.7.0/docs/v2.7.0-ReleaseNotes)))
- curl ([8.9.1](https://curl.se/ch/8.9.1.html) (includes [8.9.0](https://curl.se/ch/8.9.0.html), [8.8.0](https://curl.se/changes.html#8_8_0)))
- dev: minicom ([2.9](https://salsa.debian.org/minicom-team/minicom/-/releases/2.9))
- docker ([26.1.0](https://docs.docker.com/engine/release-notes/26.1/#2610), includes changes from [25.0](https://docs.docker.com/engine/release-notes/25.0/))
- e2fsprogs ([1.47.1](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.1))
- elfutils ([0.191](https://inbox.sourceware.org/elfutils-devel/CAJDtP-SJhJ8cjTpkNpi+F0nzVJ2pZsEai8Ewpp4yJmsO_H5-NA@mail.gmail.com/T/#u))
- ethtool ([6.9](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.9))
- findutils ([4.10.0](https://git.savannah.gnu.org/cgit/findutils.git/tree/NEWS?h=v4.10.0))
- gcc ([13.3.1_p20240614](https://gcc.gnu.org/gcc-13/changes.html))
- gce, sysext-python: setuptools ([72.1.0](https://github.com/pypa/setuptools/blob/v72.1.0/NEWS.rst) (includes [71.1.0](https://github.com/pypa/setuptools/blob/v71.1.0/NEWS.rst), [71.0.0](https://github.com/pypa/setuptools/blob/v71.0.0/NEWS.rst)))
- gflags ([2.2.2](https://github.com/gflags/gflags/releases/tag/v2.2.2))
- git ([2.44.2](https://github.com/git/git/blob/v2.44.2/Documentation/RelNotes/2.44.2.txt) (includes [2.44.1](https://github.com/git/git/blob/v2.44.1/Documentation/RelNotes/2.44.1.txt), [2.44.0](https://github.com/git/git/blob/v2.44.0/Documentation/RelNotes/2.44.0.txt)))
- glib ([2.78.6](https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.6) (includes [2.78.5](https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.5), [2.78.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.78.4)))
- glog ([0.6.0](https://github.com/google/glog/releases/tag/v0.6.0))
- gnupg ([2.4.5](https://lists.gnupg.org/pipermail/gnupg-announce/2024q1/000482.html))
- hwdata ([0.383](https://github.com/vcrhonek/hwdata/compare/v0.382...v0.383) (includes [0.382](https://github.com/vcrhonek/hwdata/commits/v0.382)))
- intel-microcode ([20240514_p20240514](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240514))
- iproute2 ([6.8.0](https://lwn.net/Articles/965125/) (includes [6.7.0](https://lwn.net/Articles/957171/)))
- ipset ([7.22](https://ipset.netfilter.org/changelog.html))
- kexec-tools ([2.0.28](https://github.com/horms/kexec-tools/commits/v2.0.28/))
- kmod ([32](https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/tree/NEWS?h=v32))
- libarchive ([3.7.4](https://github.com/libarchive/libarchive/releases/tag/v3.7.4) (includes [3.7.3](https://github.com/libarchive/libarchive/releases/tag/v3.7.3)))
- libassuan ([2.5.7](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=047f12b7c3ee0c8c1718a2da8b5a6bb9dd541fd8;hb=cc2f776904e0b5e56e2b81b2672ca98d7787ed1b))
- libcap ([2.70](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.hde102t8xd0v))
- libcap-ng ([0.8.5](https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.5))
- libdnet ([1.18.0](https://github.com/ofalk/libdnet/releases/tag/libdnet-1.18.0))
- libgpg-error ([1.49](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=8ac4bf36113fe9254a361e2bc8d0ed52383839ce;hb=faed9c271ad22bbd2ed265d8e11badb53b7a2f32))
- libksba ([1.6.7](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=3d2d5a47688bb6214efaf02f5ab29f6e64433a97;hb=b14e68b97df754b2bb7a90bb904d143d8e896afb))
- libmicrohttpd ([1.0.1](https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00005.html) (inlcudes [1.0.0](https://lists.gnu.org/archive/html/libmicrohttpd/2024-02/msg00000.html)))
- libnl ([3.9.0](http://lists.infradead.org/pipermail/libnl/2023-December/002436.html))
- libnvme ([1.9](https://github.com/linux-nvme/libnvme/releases/tag/v1.9))
- libpcre2 ([10.43](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.43/NEWS))
- libunwind ([1.8.1](https://github.com/libunwind/libunwind/releases/tag/v1.8.1) (includes [1.8.0](https://github.com/libunwind/libunwind/releases/tag/v1.8.0)))
- libusb ([1.0.27](https://github.com/libusb/libusb/blob/v1.0.27/ChangeLog))
- libxml2 ([2.12.7](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7) (includes [2.12.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.6)))
- linux-pam ([1.5.3](https://github.com/linux-pam/linux-pam/releases/tag/v1.5.3))
- lshw ([02.20.2b](https://www.ezix.org/project/wiki/HardwareLiSter#Changes))
- lz4 ([1.10.0](https://github.com/lz4/lz4/releases/tag/v1.10.0))
- mit-krb5 ([1.21.3](https://web.mit.edu/kerberos/krb5-1.21/README-1.21.3.txt))
- multipath-tools ([0.9.8](https://github.com/opensvc/multipath-tools/blob/0.9.8/NEWS.md))
- nghttp2 ([1.62.1](https://github.com/nghttp2/nghttp2/releases/tag/v1.62.1))
- nmap ([7.95](https://nmap.org/changelog.html#7.95))
- npth ([1.7](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=c1b631b4294eabfef29baefd60e1b0dfecce710d;hb=75c68399ef3bbb5d024f2a60474a7214fa479016))
- nvme-cli ([2.9.1](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9.1) (includes [2.9](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.9)))
- pahole ([1.27](https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.27))
- pciutils ([3.13.0](https://github.com/pciutils/pciutils/blob/v3.13.0/ChangeLog) (includes [3.12.0](https://github.com/pciutils/pciutils/blob/v3.12.0/ChangeLog)))
- qemu-guest-agent ([8.2.0](https://wiki.qemu.org/ChangeLog/8.2#Guest_agent))
- rsync ([3.3.0](https://github.com/RsyncProject/rsync/blob/v3.3.0/NEWS.md))
- runc ([1.1.13](https://github.com/opencontainers/runc/releases/tag/v1.1.13))
- sqlite ([3.46.0](https://www.sqlite.org/releaselog/3_46_0.html) (includes [3.45.3](https://www.sqlite.org/releaselog/3_45_3.html)))
- strace ([6.9](https://github.com/strace/strace/releases/tag/v6.9))
- sysext-podman: aardvark-dns ([1.11.0](https://github.com/containers/aardvark-dns/releases/tag/v1.11.0))
- sysext-podman: containers-common ([0.59.1](https://github.com/containers/common/releases/tag/v0.59.1))
- sysext-podman: podman ([5.0.3](https://github.com/containers/podman/releases/tag/v5.0.3))
- sysext-python: jaraco-text ([3.12.1](https://github.com/jaraco/jaraco.text/compare/v3.12.0...v3.12.1))
- sysext-python: more-itertools ([10.4.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.4.0))
- sysext-python: pip ([24.2](https://github.com/pypa/pip/blob/24.2/NEWS.rst) (includes [24.1.2](https://github.com/pypa/pip/blob/24.1.2/NEWS.rst)))
- sysext-python: setuptools([70.3.0](https://github.com/pypa/setuptools/blob/v70.3.0/NEWS.rst) (includes [70.1.1](https://setuptools.pypa.io/en/stable/history.html#v70-1-1), [70.1.0](https://setuptools.pypa.io/en/stable/history.html#v70-1-0), [70.0.0](https://setuptools.pypa.io/en/stable/history.html#v70-0-0), [69.5.1](https://setuptools.pypa.io/en/stable/history.html#v69-5-1), [69.5.0](https://setuptools.pypa.io/en/stable/history.html#v69-5-0), [69.4.2](https://setuptools.pypa.io/en/stable/history.html#v69-4-2), [69.4.1](https://setuptools.pypa.io/en/stable/history.html#v69-4-1), [69.4.0](https://setuptools.pypa.io/en/stable/history.html#v69-4-0), [69.3.1](https://setuptools.pypa.io/en/stable/history.html#v69-3-1), [69.3.0](https://setuptools.pypa.io/en/stable/history.html#v69-3-0), [69.2.0](https://setuptools.pypa.io/en/stable/history.html#v69-2-0)))
- sysext-python: trove-classifiers ([2024.7.2](https://github.com/pypa/trove-classifiers/compare/2024.5.22...2024.7.2))
- sysext-python: wheel ([0.44.0](https://github.com/pypa/wheel/releases/tag/0.44.0))
- sysext-zfs: zfs ([2.2.5](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.5) (includes [2.2.4](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.4), [2.2.3](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.3)))
- systemd ([255.8](https://github.com/systemd/systemd-stable/commits/v255.8/))
- talloc ([2.4.1](https://gitlab.com/samba-team/samba/-/commit/791e2817e13182344447590313f7e372a27c1d48))
- tcpdump ([4.99.4](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.99.4/CHANGES))
- tdb ([1.4.9](https://gitlab.com/samba-team/samba/-/commit/b649c7d3c2b1e13e900c80ff7a20959a70b1c528))
- tevent ([0.15.0](https://gitlab.com/samba-team/samba/-/commit/6a80d170bca0c938f78ab12e37481b52792a9d83))
- tpm2-tools ([5.7](https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7) (includes [5.6.1](https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6.1), [5.6](https://github.com/tpm2-software/tpm2-tools/releases/tag/5.6)))
- tpm2-tss ([4.1.3](https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.3) (includes [4.0.2](https://github.com/tpm2-software/tpm2-tss/releases/tag/4.0.2)))
- util-linux ([2.39.4](https://github.com/util-linux/util-linux/blob/v2.39.4/Documentation/releases/v2.39.4-ReleaseNotes))
- vim ([9.1.0366](https://github.com/vim/vim/commits/v9.1.0366/) (includes [9.1](https://www.vim.org/vim-9.1-released.php)))
- wget ([1.24.5](https://lists.gnu.org/archive/html/info-gnu/2024-03/msg00002.html))
- whois ([5.5.21](https://github.com/rfc1036/whois/blob/v5.5.21/debian/changelog))
- xfsprogs ([6.8.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.8.0) (includes [6.6.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.6.0)))
- xz-utils ([5.6.2](https://github.com/tukaani-project/xz/releases/tag/v5.6.2))
- zlib ([1.3.1](https://github.com/madler/zlib/releases/tag/v1.3.1))
- zstd ([1.5.6](https://github.com/facebook/zstd/releases/tag/v1.5.6))
- vmware: open-vm-tools ([12.4.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-12.4.5))
_Changes since **Beta 4081.1.0**_
#### Security fixes:
- Linux ([CVE-2024-50179](https://nvd.nist.gov/vuln/detail/CVE-2024-50179), [CVE-2024-50176](https://nvd.nist.gov/vuln/detail/CVE-2024-50176), [CVE-2024-50175](https://nvd.nist.gov/vuln/detail/CVE-2024-50175), [CVE-2024-50012](https://nvd.nist.gov/vuln/detail/CVE-2024-50012), [CVE-2024-50008](https://nvd.nist.gov/vuln/detail/CVE-2024-50008), [CVE-2024-50007](https://nvd.nist.gov/vuln/detail/CVE-2024-50007), [CVE-2024-50006](https://nvd.nist.gov/vuln/detail/CVE-2024-50006), [CVE-2024-50005](https://nvd.nist.gov/vuln/detail/CVE-2024-50005), [CVE-2024-50016](https://nvd.nist.gov/vuln/detail/CVE-2024-50016), [CVE-2024-50015](https://nvd.nist.gov/vuln/detail/CVE-2024-50015), [CVE-2024-50013](https://nvd.nist.gov/vuln/detail/CVE-2024-50013), [CVE-2024-50003](https://nvd.nist.gov/vuln/detail/CVE-2024-50003), [CVE-2024-50002](https://nvd.nist.gov/vuln/detail/CVE-2024-50002), [CVE-2024-50001](https://nvd.nist.gov/vuln/detail/CVE-2024-50001), [CVE-2024-50000](https://nvd.nist.gov/vuln/detail/CVE-2024-50000), [CVE-2024-49997](https://nvd.nist.gov/vuln/detail/CVE-2024-49997), [CVE-2024-49996](https://nvd.nist.gov/vuln/detail/CVE-2024-49996), [CVE-2024-49995](https://nvd.nist.gov/vuln/detail/CVE-2024-49995), [CVE-2024-49955](https://nvd.nist.gov/vuln/detail/CVE-2024-49955), [CVE-2024-49963](https://nvd.nist.gov/vuln/detail/CVE-2024-49963), [CVE-2024-49962](https://nvd.nist.gov/vuln/detail/CVE-2024-49962), [CVE-2024-49961](https://nvd.nist.gov/vuln/detail/CVE-2024-49961), [CVE-2024-49960](https://nvd.nist.gov/vuln/detail/CVE-2024-49960), [CVE-2024-49959](https://nvd.nist.gov/vuln/detail/CVE-2024-49959), [CVE-2024-49993](https://nvd.nist.gov/vuln/detail/CVE-2024-49993), [CVE-2024-49992](https://nvd.nist.gov/vuln/detail/CVE-2024-49992), [CVE-2024-49991](https://nvd.nist.gov/vuln/detail/CVE-2024-49991), [CVE-2024-49989](https://nvd.nist.gov/vuln/detail/CVE-2024-49989), [CVE-2024-49988](https://nvd.nist.gov/vuln/detail/CVE-2024-49988), [CVE-2024-49987](https://nvd.nist.gov/vuln/detail/CVE-2024-49987), [CVE-2024-49986](https://nvd.nist.gov/vuln/detail/CVE-2024-49986), [CVE-2024-49985](https://nvd.nist.gov/vuln/detail/CVE-2024-49985), [CVE-2024-49958](https://nvd.nist.gov/vuln/detail/CVE-2024-49958), [CVE-2024-49983](https://nvd.nist.gov/vuln/detail/CVE-2024-49983), [CVE-2024-49982](https://nvd.nist.gov/vuln/detail/CVE-2024-49982), [CVE-2024-49981](https://nvd.nist.gov/vuln/detail/CVE-2024-49981), [CVE-2024-49980](https://nvd.nist.gov/vuln/detail/CVE-2024-49980), [CVE-2024-49978](https://nvd.nist.gov/vuln/detail/CVE-2024-49978), [CVE-2024-49977](https://nvd.nist.gov/vuln/detail/CVE-2024-49977), [CVE-2024-49976](https://nvd.nist.gov/vuln/detail/CVE-2024-49976), [CVE-2024-49975](https://nvd.nist.gov/vuln/detail/CVE-2024-49975), [CVE-2024-49957](https://nvd.nist.gov/vuln/detail/CVE-2024-49957), [CVE-2024-49973](https://nvd.nist.gov/vuln/detail/CVE-2024-49973), [CVE-2024-49969](https://nvd.nist.gov/vuln/detail/CVE-2024-49969), [CVE-2024-49967](https://nvd.nist.gov/vuln/detail/CVE-2024-49967), [CVE-2024-49966](https://nvd.nist.gov/vuln/detail/CVE-2024-49966), [CVE-2024-49965](https://nvd.nist.gov/vuln/detail/CVE-2024-49965), [CVE-2024-49924](https://nvd.nist.gov/vuln/detail/CVE-2024-49924), [CVE-2024-49954](https://nvd.nist.gov/vuln/detail/CVE-2024-49954), [CVE-2024-49953](https://nvd.nist.gov/vuln/detail/CVE-2024-49953), [CVE-2024-49952](https://nvd.nist.gov/vuln/detail/CVE-2024-49952), [CVE-2024-49951](https://nvd.nist.gov/vuln/detail/CVE-2024-49951), [CVE-2024-49950](https://nvd.nist.gov/vuln/detail/CVE-2024-49950), [CVE-2024-49949](https://nvd.nist.gov/vuln/detail/CVE-2024-49949), [CVE-2024-49948](https://nvd.nist.gov/vuln/detail/CVE-2024-49948), [CVE-2024-49947](https://nvd.nist.gov/vuln/detail/CVE-2024-49947), [CVE-2024-49946](https://nvd.nist.gov/vuln/detail/CVE-2024-49946), [CVE-2024-49944](https://nvd.nist.gov/vuln/detail/CVE-2024-49944), [CVE-2024-49939](https://nvd.nist.gov/vuln/detail/CVE-2024-49939), [CVE-2024-49938](https://nvd.nist.gov/vuln/detail/CVE-2024-49938), [CVE-2024-49937](https://nvd.nist.gov/vuln/detail/CVE-2024-49937), [CVE-2024-49936](https://nvd.nist.gov/vuln/detail/CVE-2024-49936), [CVE-2024-49935](https://nvd.nist.gov/vuln/detail/CVE-2024-49935), [CVE-2024-49933](https://nvd.nist.gov/vuln/detail/CVE-2024-49933), [CVE-2024-49931](https://nvd.nist.gov/vuln/detail/CVE-2024-49931), [CVE-2024-49930](https://nvd.nist.gov/vuln/detail/CVE-2024-49930), [CVE-2024-49929](https://nvd.nist.gov/vuln/detail/CVE-2024-49929), [CVE-2024-49927](https://nvd.nist.gov/vuln/detail/CVE-2024-49927), [CVE-2024-49925](https://nvd.nist.gov/vuln/detail/CVE-2024-49925), [CVE-2024-49875](https://nvd.nist.gov/vuln/detail/CVE-2024-49875), [CVE-2024-49884](https://nvd.nist.gov/vuln/detail/CVE-2024-49884), [CVE-2024-49883](https://nvd.nist.gov/vuln/detail/CVE-2024-49883), [CVE-2024-49882](https://nvd.nist.gov/vuln/detail/CVE-2024-49882), [CVE-2024-49881](https://nvd.nist.gov/vuln/detail/CVE-2024-49881), [CVE-2024-49879](https://nvd.nist.gov/vuln/detail/CVE-2024-49879), [CVE-2024-49913](https://nvd.nist.gov/vuln/detail/CVE-2024-49913), [CVE-2024-49912](https://nvd.nist.gov/vuln/detail/CVE-2024-49912), [CVE-2024-49907](https://nvd.nist.gov/vuln/detail/CVE-2024-49907), [CVE-2024-49905](https://nvd.nist.gov/vuln/detail/CVE-2024-49905), [CVE-2024-49878](https://nvd.nist.gov/vuln/detail/CVE-2024-49878), [CVE-2024-49903](https://nvd.nist.gov/vuln/detail/CVE-2024-49903), [CVE-2024-49902](https://nvd.nist.gov/vuln/detail/CVE-2024-49902), [CVE-2024-49901](https://nvd.nist.gov/vuln/detail/CVE-2024-49901), [CVE-2024-49900](https://nvd.nist.gov/vuln/detail/CVE-2024-49900), [CVE-2024-49896](https://nvd.nist.gov/vuln/detail/CVE-2024-49896), [CVE-2024-49895](https://nvd.nist.gov/vuln/detail/CVE-2024-49895), [CVE-2024-49877](https://nvd.nist.gov/vuln/detail/CVE-2024-49877), [CVE-2024-49894](https://nvd.nist.gov/vuln/detail/CVE-2024-49894), [CVE-2024-49892](https://nvd.nist.gov/vuln/detail/CVE-2024-49892), [CVE-2024-49890](https://nvd.nist.gov/vuln/detail/CVE-2024-49890), [CVE-2024-49889](https://nvd.nist.gov/vuln/detail/CVE-2024-49889), [CVE-2024-49886](https://nvd.nist.gov/vuln/detail/CVE-2024-49886), [CVE-2024-49863](https://nvd.nist.gov/vuln/detail/CVE-2024-49863), [CVE-2024-49871](https://nvd.nist.gov/vuln/detail/CVE-2024-49871), [CVE-2024-49870](https://nvd.nist.gov/vuln/detail/CVE-2024-49870), [CVE-2024-49868](https://nvd.nist.gov/vuln/detail/CVE-2024-49868), [CVE-2024-49867](https://nvd.nist.gov/vuln/detail/CVE-2024-49867), [CVE-2024-49866](https://nvd.nist.gov/vuln/detail/CVE-2024-49866), [CVE-2024-49874](https://nvd.nist.gov/vuln/detail/CVE-2024-49874), [CVE-2024-49864](https://nvd.nist.gov/vuln/detail/CVE-2024-49864), [CVE-2024-47704](https://nvd.nist.gov/vuln/detail/CVE-2024-47704), [CVE-2024-50191](https://nvd.nist.gov/vuln/detail/CVE-2024-50191), [CVE-2024-50189](https://nvd.nist.gov/vuln/detail/CVE-2024-50189), [CVE-2024-50188](https://nvd.nist.gov/vuln/detail/CVE-2024-50188), [CVE-2024-50187](https://nvd.nist.gov/vuln/detail/CVE-2024-50187), [CVE-2024-50186](https://nvd.nist.gov/vuln/detail/CVE-2024-50186), [CVE-2024-50185](https://nvd.nist.gov/vuln/detail/CVE-2024-50185), [CVE-2024-50184](https://nvd.nist.gov/vuln/detail/CVE-2024-50184), [CVE-2024-50183](https://nvd.nist.gov/vuln/detail/CVE-2024-50183), [CVE-2024-50182](https://nvd.nist.gov/vuln/detail/CVE-2024-50182), [CVE-2024-50180](https://nvd.nist.gov/vuln/detail/CVE-2024-50180), [CVE-2024-50181](https://nvd.nist.gov/vuln/detail/CVE-2024-50181), [CVE-2024-50097](https://nvd.nist.gov/vuln/detail/CVE-2024-50097), [CVE-2024-50096](https://nvd.nist.gov/vuln/detail/CVE-2024-50096), [CVE-2024-50095](https://nvd.nist.gov/vuln/detail/CVE-2024-50095), [CVE-2024-50093](https://nvd.nist.gov/vuln/detail/CVE-2024-50093), [CVE-2024-50089](https://nvd.nist.gov/vuln/detail/CVE-2024-50089), [CVE-2024-50058](https://nvd.nist.gov/vuln/detail/CVE-2024-50058), [CVE-2024-50065](https://nvd.nist.gov/vuln/detail/CVE-2024-50065), [CVE-2024-50064](https://nvd.nist.gov/vuln/detail/CVE-2024-50064), [CVE-2024-50063](https://nvd.nist.gov/vuln/detail/CVE-2024-50063), [CVE-2024-50062](https://nvd.nist.gov/vuln/detail/CVE-2024-50062), [CVE-2024-50061](https://nvd.nist.gov/vuln/detail/CVE-2024-50061), [CVE-2024-50060](https://nvd.nist.gov/vuln/detail/CVE-2024-50060), [CVE-2024-50059](https://nvd.nist.gov/vuln/detail/CVE-2024-50059), [CVE-2024-50026](https://nvd.nist.gov/vuln/detail/CVE-2024-50026), [CVE-2024-50024](https://nvd.nist.gov/vuln/detail/CVE-2024-50024), [CVE-2024-50023](https://nvd.nist.gov/vuln/detail/CVE-2024-50023), [CVE-2024-50057](https://nvd.nist.gov/vuln/detail/CVE-2024-50057), [CVE-2024-50055](https://nvd.nist.gov/vuln/detail/CVE-2024-50055), [CVE-2024-50049](https://nvd.nist.gov/vuln/detail/CVE-2024-50049), [CVE-2024-50022](https://nvd.nist.gov/vuln/detail/CVE-2024-50022), [CVE-2024-50048](https://nvd.nist.gov/vuln/detail/CVE-2024-50048), [CVE-2024-50047](https://nvd.nist.gov/vuln/detail/CVE-2024-50047), [CVE-2024-50046](https://nvd.nist.gov/vuln/detail/CVE-2024-50046), [CVE-2024-50045](https://nvd.nist.gov/vuln/detail/CVE-2024-50045), [CVE-2024-50044](https://nvd.nist.gov/vuln/detail/CVE-2024-50044), [CVE-2024-50041](https://nvd.nist.gov/vuln/detail/CVE-2024-50041), [CVE-2024-50040](https://nvd.nist.gov/vuln/detail/CVE-2024-50040), [CVE-2024-50039](https://nvd.nist.gov/vuln/detail/CVE-2024-50039), [CVE-2024-50038](https://nvd.nist.gov/vuln/detail/CVE-2024-50038), [CVE-2024-50036](https://nvd.nist.gov/vuln/detail/CVE-2024-50036), [CVE-2024-50035](https://nvd.nist.gov/vuln/detail/CVE-2024-50035), [CVE-2024-50033](https://nvd.nist.gov/vuln/detail/CVE-2024-50033), [CVE-2024-50032](https://nvd.nist.gov/vuln/detail/CVE-2024-50032), [CVE-2024-50031](https://nvd.nist.gov/vuln/detail/CVE-2024-50031), [CVE-2024-50029](https://nvd.nist.gov/vuln/detail/CVE-2024-50029), [CVE-2024-50019](https://nvd.nist.gov/vuln/detail/CVE-2024-50019), [CVE-2024-50201](https://nvd.nist.gov/vuln/detail/CVE-2024-50201), [CVE-2024-50202](https://nvd.nist.gov/vuln/detail/CVE-2024-50202), [CVE-2024-50101](https://nvd.nist.gov/vuln/detail/CVE-2024-50101), [CVE-2024-50098](https://nvd.nist.gov/vuln/detail/CVE-2024-50098), [CVE-2024-50099](https://nvd.nist.gov/vuln/detail/CVE-2024-50099), [CVE-2024-50088](https://nvd.nist.gov/vuln/detail/CVE-2024-50088), [CVE-2024-50087](https://nvd.nist.gov/vuln/detail/CVE-2024-50087), [CVE-2024-50086](https://nvd.nist.gov/vuln/detail/CVE-2024-50086), [CVE-2024-50085](https://nvd.nist.gov/vuln/detail/CVE-2024-50085), [CVE-2024-50084](https://nvd.nist.gov/vuln/detail/CVE-2024-50084), [CVE-2024-50083](https://nvd.nist.gov/vuln/detail/CVE-2024-50083), [CVE-2024-50082](https://nvd.nist.gov/vuln/detail/CVE-2024-50082), [CVE-2024-50080](https://nvd.nist.gov/vuln/detail/CVE-2024-50080), [CVE-2024-50077](https://nvd.nist.gov/vuln/detail/CVE-2024-50077), [CVE-2024-50076](https://nvd.nist.gov/vuln/detail/CVE-2024-50076), [CVE-2024-50075](https://nvd.nist.gov/vuln/detail/CVE-2024-50075), [CVE-2024-50074](https://nvd.nist.gov/vuln/detail/CVE-2024-50074), [CVE-2024-50073](https://nvd.nist.gov/vuln/detail/CVE-2024-50073), [CVE-2024-50072](https://nvd.nist.gov/vuln/detail/CVE-2024-50072), [CVE-2024-50070](https://nvd.nist.gov/vuln/detail/CVE-2024-50070), [CVE-2024-50078](https://nvd.nist.gov/vuln/detail/CVE-2024-50078), [CVE-2024-50069](https://nvd.nist.gov/vuln/detail/CVE-2024-50069), [CVE-2024-50066](https://nvd.nist.gov/vuln/detail/CVE-2024-50066), [CVE-2024-50211](https://nvd.nist.gov/vuln/detail/CVE-2024-50211), [CVE-2024-50210](https://nvd.nist.gov/vuln/detail/CVE-2024-50210), [CVE-2024-50209](https://nvd.nist.gov/vuln/detail/CVE-2024-50209), [CVE-2024-50208](https://nvd.nist.gov/vuln/detail/CVE-2024-50208), [CVE-2024-50205](https://nvd.nist.gov/vuln/detail/CVE-2024-50205), [CVE-2024-50155](https://nvd.nist.gov/vuln/detail/CVE-2024-50155), [CVE-2024-50164](https://nvd.nist.gov/vuln/detail/CVE-2024-50164), [CVE-2024-50163](https://nvd.nist.gov/vuln/detail/CVE-2024-50163), [CVE-2024-50162](https://nvd.nist.gov/vuln/detail/CVE-2024-50162), [CVE-2024-50160](https://nvd.nist.gov/vuln/detail/CVE-2024-50160), [CVE-2024-50159](https://nvd.nist.gov/vuln/detail/CVE-2024-50159), [CVE-2024-50158](https://nvd.nist.gov/vuln/detail/CVE-2024-50158), [CVE-2024-50172](https://nvd.nist.gov/vuln/detail/CVE-2024-50172), [CVE-2024-50171](https://nvd.nist.gov/vuln/detail/CVE-2024-50171), [CVE-2024-50170](https://nvd.nist.gov/vuln/detail/CVE-2024-50170), [CVE-2024-50169](https://nvd.nist.gov/vuln/detail/CVE-2024-50169), [CVE-2024-50168](https://nvd.nist.gov/vuln/detail/CVE-2024-50168), [CVE-2024-50167](https://nvd.nist.gov/vuln/detail/CVE-2024-50167), [CVE-2024-50166](https://nvd.nist.gov/vuln/detail/CVE-2024-50166), [CVE-2024-50156](https://nvd.nist.gov/vuln/detail/CVE-2024-50156), [CVE-2024-50148](https://nvd.nist.gov/vuln/detail/CVE-2024-50148), [CVE-2024-50147](https://nvd.nist.gov/vuln/detail/CVE-2024-50147), [CVE-2024-50145](https://nvd.nist.gov/vuln/detail/CVE-2024-50145), [CVE-2024-50143](https://nvd.nist.gov/vuln/detail/CVE-2024-50143), [CVE-2024-50142](https://nvd.nist.gov/vuln/detail/CVE-2024-50142), [CVE-2024-50141](https://nvd.nist.gov/vuln/detail/CVE-2024-50141), [CVE-2024-50154](https://nvd.nist.gov/vuln/detail/CVE-2024-50154), [CVE-2024-50153](https://nvd.nist.gov/vuln/detail/CVE-2024-50153), [CVE-2024-50152](https://nvd.nist.gov/vuln/detail/CVE-2024-50152), [CVE-2024-50151](https://nvd.nist.gov/vuln/detail/CVE-2024-50151), [CVE-2024-50150](https://nvd.nist.gov/vuln/detail/CVE-2024-50150), [CVE-2024-50139](https://nvd.nist.gov/vuln/detail/CVE-2024-50139), [CVE-2024-50140](https://nvd.nist.gov/vuln/detail/CVE-2024-50140), [CVE-2024-50128](https://nvd.nist.gov/vuln/detail/CVE-2024-50128), [CVE-2024-50136](https://nvd.nist.gov/vuln/detail/CVE-2024-50136), [CVE-2024-50135](https://nvd.nist.gov/vuln/detail/CVE-2024-50135), [CVE-2024-50134](https://nvd.nist.gov/vuln/detail/CVE-2024-50134), [CVE-2024-50133](https://nvd.nist.gov/vuln/detail/CVE-2024-50133), [CVE-2024-50131](https://nvd.nist.gov/vuln/detail/CVE-2024-50131), [CVE-2024-50130](https://nvd.nist.gov/vuln/detail/CVE-2024-50130), [CVE-2024-50111](https://nvd.nist.gov/vuln/detail/CVE-2024-50111), [CVE-2024-50110](https://nvd.nist.gov/vuln/detail/CVE-2024-50110), [CVE-2024-50108](https://nvd.nist.gov/vuln/detail/CVE-2024-50108), [CVE-2024-50127](https://nvd.nist.gov/vuln/detail/CVE-2024-50127), [CVE-2024-50126](https://nvd.nist.gov/vuln/detail/CVE-2024-50126), [CVE-2024-50125](https://nvd.nist.gov/vuln/detail/CVE-2024-50125), [CVE-2024-50124](https://nvd.nist.gov/vuln/detail/CVE-2024-50124), [CVE-2024-50121](https://nvd.nist.gov/vuln/detail/CVE-2024-50121), [CVE-2024-50120](https://nvd.nist.gov/vuln/detail/CVE-2024-50120), [CVE-2024-50117](https://nvd.nist.gov/vuln/detail/CVE-2024-50117), [CVE-2024-50116](https://nvd.nist.gov/vuln/detail/CVE-2024-50116), [CVE-2024-50115](https://nvd.nist.gov/vuln/detail/CVE-2024-50115), [CVE-2024-50112](https://nvd.nist.gov/vuln/detail/CVE-2024-50112), [CVE-2024-50103](https://nvd.nist.gov/vuln/detail/CVE-2024-50103), [CVE-2024-50262](https://nvd.nist.gov/vuln/detail/CVE-2024-50262), [CVE-2024-50259](https://nvd.nist.gov/vuln/detail/CVE-2024-50259), [CVE-2024-50261](https://nvd.nist.gov/vuln/detail/CVE-2024-50261), [CVE-2024-50226](https://nvd.nist.gov/vuln/detail/CVE-2024-50226), [CVE-2024-50235](https://nvd.nist.gov/vuln/detail/CVE-2024-50235), [CVE-2024-50234](https://nvd.nist.gov/vuln/detail/CVE-2024-50234), [CVE-2024-50233](https://nvd.nist.gov/vuln/detail/CVE-2024-50233), [CVE-2024-50232](https://nvd.nist.gov/vuln/detail/CVE-2024-50232), [CVE-2024-50231](https://nvd.nist.gov/vuln/detail/CVE-2024-50231), [CVE-2024-50230](https://nvd.nist.gov/vuln/detail/CVE-2024-50230), [CVE-2024-50258](https://nvd.nist.gov/vuln/detail/CVE-2024-50258), [CVE-2024-50257](https://nvd.nist.gov/vuln/detail/CVE-2024-50257), [CVE-2024-50256](https://nvd.nist.gov/vuln/detail/CVE-2024-50256), [CVE-2024-50229](https://nvd.nist.gov/vuln/detail/CVE-2024-50229), [CVE-2024-50255](https://nvd.nist.gov/vuln/detail/CVE-2024-50255), [CVE-2024-50252](https://nvd.nist.gov/vuln/detail/CVE-2024-50252), [CVE-2024-50251](https://nvd.nist.gov/vuln/detail/CVE-2024-50251), [CVE-2024-50250](https://nvd.nist.gov/vuln/detail/CVE-2024-50250), [CVE-2024-50249](https://nvd.nist.gov/vuln/detail/CVE-2024-50249), [CVE-2024-50248](https://nvd.nist.gov/vuln/detail/CVE-2024-50248), [CVE-2024-50247](https://nvd.nist.gov/vuln/detail/CVE-2024-50247), [CVE-2024-50246](https://nvd.nist.gov/vuln/detail/CVE-2024-50246), [CVE-2024-50228](https://nvd.nist.gov/vuln/detail/CVE-2024-50228), [CVE-2024-50245](https://nvd.nist.gov/vuln/detail/CVE-2024-50245), [CVE-2024-50244](https://nvd.nist.gov/vuln/detail/CVE-2024-50244), [CVE-2024-50243](https://nvd.nist.gov/vuln/detail/CVE-2024-50243), [CVE-2024-50242](https://nvd.nist.gov/vuln/detail/CVE-2024-50242), [CVE-2024-50240](https://nvd.nist.gov/vuln/detail/CVE-2024-50240), [CVE-2024-50239](https://nvd.nist.gov/vuln/detail/CVE-2024-50239), [CVE-2024-50237](https://nvd.nist.gov/vuln/detail/CVE-2024-50237), [CVE-2024-50236](https://nvd.nist.gov/vuln/detail/CVE-2024-50236), [CVE-2024-50219](https://nvd.nist.gov/vuln/detail/CVE-2024-50219), [CVE-2024-50218](https://nvd.nist.gov/vuln/detail/CVE-2024-50218), [CVE-2024-50216](https://nvd.nist.gov/vuln/detail/CVE-2024-50216), [CVE-2024-50215](https://nvd.nist.gov/vuln/detail/CVE-2024-50215), [CVE-2024-50224](https://nvd.nist.gov/vuln/detail/CVE-2024-50224), [CVE-2024-50223](https://nvd.nist.gov/vuln/detail/CVE-2024-50223), [CVE-2024-50222](https://nvd.nist.gov/vuln/detail/CVE-2024-50222))
#### Changes:
- Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha ([flatcar/scripts#2390](https://github.com/flatcar/scripts/pull/2390))
#### Updates:
- ca-certificates ([3.106](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html))
- Linux ([6.6.60](https://lwn.net/Articles/997527) (includes [6.6.59](https://lwn.net/Articles/996689), [6.6.58](https://lwn.net/Articles/995132), [6.6.57](https://lwn.net/Articles/994634), [6.6.56](https://lwn.net/Articles/993600)))
### Beta 4116.1.0
_Changes since **Beta 4081.1.0**_
#### Security fixes:
- Linux ([CVE-2024-50179](https://nvd.nist.gov/vuln/detail/CVE-2024-50179), [CVE-2024-50176](https://nvd.nist.gov/vuln/detail/CVE-2024-50176), [CVE-2024-50175](https://nvd.nist.gov/vuln/detail/CVE-2024-50175), [CVE-2024-50012](https://nvd.nist.gov/vuln/detail/CVE-2024-50012), [CVE-2024-50008](https://nvd.nist.gov/vuln/detail/CVE-2024-50008), [CVE-2024-50007](https://nvd.nist.gov/vuln/detail/CVE-2024-50007), [CVE-2024-50006](https://nvd.nist.gov/vuln/detail/CVE-2024-50006), [CVE-2024-50005](https://nvd.nist.gov/vuln/detail/CVE-2024-50005), [CVE-2024-50016](https://nvd.nist.gov/vuln/detail/CVE-2024-50016), [CVE-2024-50015](https://nvd.nist.gov/vuln/detail/CVE-2024-50015), [CVE-2024-50013](https://nvd.nist.gov/vuln/detail/CVE-2024-50013), [CVE-2024-50003](https://nvd.nist.gov/vuln/detail/CVE-2024-50003), [CVE-2024-50002](https://nvd.nist.gov/vuln/detail/CVE-2024-50002), [CVE-2024-50001](https://nvd.nist.gov/vuln/detail/CVE-2024-50001), [CVE-2024-50000](https://nvd.nist.gov/vuln/detail/CVE-2024-50000), [CVE-2024-49997](https://nvd.nist.gov/vuln/detail/CVE-2024-49997), [CVE-2024-49996](https://nvd.nist.gov/vuln/detail/CVE-2024-49996), [CVE-2024-49995](https://nvd.nist.gov/vuln/detail/CVE-2024-49995), [CVE-2024-49955](https://nvd.nist.gov/vuln/detail/CVE-2024-49955), [CVE-2024-49963](https://nvd.nist.gov/vuln/detail/CVE-2024-49963), [CVE-2024-49962](https://nvd.nist.gov/vuln/detail/CVE-2024-49962), [CVE-2024-49961](https://nvd.nist.gov/vuln/detail/CVE-2024-49961), [CVE-2024-49960](https://nvd.nist.gov/vuln/detail/CVE-2024-49960), [CVE-2024-49959](https://nvd.nist.gov/vuln/detail/CVE-2024-49959), [CVE-2024-49993](https://nvd.nist.gov/vuln/detail/CVE-2024-49993), [CVE-2024-49992](https://nvd.nist.gov/vuln/detail/CVE-2024-49992), [CVE-2024-49991](https://nvd.nist.gov/vuln/detail/CVE-2024-49991), [CVE-2024-49989](https://nvd.nist.gov/vuln/detail/CVE-2024-49989), [CVE-2024-49988](https://nvd.nist.gov/vuln/detail/CVE-2024-49988), [CVE-2024-49987](https://nvd.nist.gov/vuln/detail/CVE-2024-49987), [CVE-2024-49986](https://nvd.nist.gov/vuln/detail/CVE-2024-49986), [CVE-2024-49985](https://nvd.nist.gov/vuln/detail/CVE-2024-49985), [CVE-2024-49958](https://nvd.nist.gov/vuln/detail/CVE-2024-49958), [CVE-2024-49983](https://nvd.nist.gov/vuln/detail/CVE-2024-49983), [CVE-2024-49982](https://nvd.nist.gov/vuln/detail/CVE-2024-49982), [CVE-2024-49981](https://nvd.nist.gov/vuln/detail/CVE-2024-49981), [CVE-2024-49980](https://nvd.nist.gov/vuln/detail/CVE-2024-49980), [CVE-2024-49978](https://nvd.nist.gov/vuln/detail/CVE-2024-49978), [CVE-2024-49977](https://nvd.nist.gov/vuln/detail/CVE-2024-49977), [CVE-2024-49976](https://nvd.nist.gov/vuln/detail/CVE-2024-49976), [CVE-2024-49975](https://nvd.nist.gov/vuln/detail/CVE-2024-49975), [CVE-2024-49957](https://nvd.nist.gov/vuln/detail/CVE-2024-49957), [CVE-2024-49973](https://nvd.nist.gov/vuln/detail/CVE-2024-49973), [CVE-2024-49969](https://nvd.nist.gov/vuln/detail/CVE-2024-49969), [CVE-2024-49967](https://nvd.nist.gov/vuln/detail/CVE-2024-49967), [CVE-2024-49966](https://nvd.nist.gov/vuln/detail/CVE-2024-49966), [CVE-2024-49965](https://nvd.nist.gov/vuln/detail/CVE-2024-49965), [CVE-2024-49924](https://nvd.nist.gov/vuln/detail/CVE-2024-49924), [CVE-2024-49954](https://nvd.nist.gov/vuln/detail/CVE-2024-49954), [CVE-2024-49953](https://nvd.nist.gov/vuln/detail/CVE-2024-49953), [CVE-2024-49952](https://nvd.nist.gov/vuln/detail/CVE-2024-49952), [CVE-2024-49951](https://nvd.nist.gov/vuln/detail/CVE-2024-49951), [CVE-2024-49950](https://nvd.nist.gov/vuln/detail/CVE-2024-49950), [CVE-2024-49949](https://nvd.nist.gov/vuln/detail/CVE-2024-49949), [CVE-2024-49948](https://nvd.nist.gov/vuln/detail/CVE-2024-49948), [CVE-2024-49947](https://nvd.nist.gov/vuln/detail/CVE-2024-49947), [CVE-2024-49946](https://nvd.nist.gov/vuln/detail/CVE-2024-49946), [CVE-2024-49944](https://nvd.nist.gov/vuln/detail/CVE-2024-49944), [CVE-2024-49939](https://nvd.nist.gov/vuln/detail/CVE-2024-49939), [CVE-2024-49938](https://nvd.nist.gov/vuln/detail/CVE-2024-49938), [CVE-2024-49937](https://nvd.nist.gov/vuln/detail/CVE-2024-49937), [CVE-2024-49936](https://nvd.nist.gov/vuln/detail/CVE-2024-49936), [CVE-2024-49935](https://nvd.nist.gov/vuln/detail/CVE-2024-49935), [CVE-2024-49933](https://nvd.nist.gov/vuln/detail/CVE-2024-49933), [CVE-2024-49931](https://nvd.nist.gov/vuln/detail/CVE-2024-49931), [CVE-2024-49930](https://nvd.nist.gov/vuln/detail/CVE-2024-49930), [CVE-2024-49929](https://nvd.nist.gov/vuln/detail/CVE-2024-49929), [CVE-2024-49927](https://nvd.nist.gov/vuln/detail/CVE-2024-49927), [CVE-2024-49925](https://nvd.nist.gov/vuln/detail/CVE-2024-49925), [CVE-2024-49875](https://nvd.nist.gov/vuln/detail/CVE-2024-49875), [CVE-2024-49884](https://nvd.nist.gov/vuln/detail/CVE-2024-49884), [CVE-2024-49883](https://nvd.nist.gov/vuln/detail/CVE-2024-49883), [CVE-2024-49882](https://nvd.nist.gov/vuln/detail/CVE-2024-49882), [CVE-2024-49881](https://nvd.nist.gov/vuln/detail/CVE-2024-49881), [CVE-2024-49879](https://nvd.nist.gov/vuln/detail/CVE-2024-49879), [CVE-2024-49913](https://nvd.nist.gov/vuln/detail/CVE-2024-49913), [CVE-2024-49912](https://nvd.nist.gov/vuln/detail/CVE-2024-49912), [CVE-2024-49907](https://nvd.nist.gov/vuln/detail/CVE-2024-49907), [CVE-2024-49905](https://nvd.nist.gov/vuln/detail/CVE-2024-49905), [CVE-2024-49878](https://nvd.nist.gov/vuln/detail/CVE-2024-49878), [CVE-2024-49903](https://nvd.nist.gov/vuln/detail/CVE-2024-49903), [CVE-2024-49902](https://nvd.nist.gov/vuln/detail/CVE-2024-49902), [CVE-2024-49901](https://nvd.nist.gov/vuln/detail/CVE-2024-49901), [CVE-2024-49900](https://nvd.nist.gov/vuln/detail/CVE-2024-49900), [CVE-2024-49896](https://nvd.nist.gov/vuln/detail/CVE-2024-49896), [CVE-2024-49895](https://nvd.nist.gov/vuln/detail/CVE-2024-49895), [CVE-2024-49877](https://nvd.nist.gov/vuln/detail/CVE-2024-49877), [CVE-2024-49894](https://nvd.nist.gov/vuln/detail/CVE-2024-49894), [CVE-2024-49892](https://nvd.nist.gov/vuln/detail/CVE-2024-49892), [CVE-2024-49890](https://nvd.nist.gov/vuln/detail/CVE-2024-49890), [CVE-2024-49889](https://nvd.nist.gov/vuln/detail/CVE-2024-49889), [CVE-2024-49886](https://nvd.nist.gov/vuln/detail/CVE-2024-49886), [CVE-2024-49863](https://nvd.nist.gov/vuln/detail/CVE-2024-49863), [CVE-2024-49871](https://nvd.nist.gov/vuln/detail/CVE-2024-49871), [CVE-2024-49870](https://nvd.nist.gov/vuln/detail/CVE-2024-49870), [CVE-2024-49868](https://nvd.nist.gov/vuln/detail/CVE-2024-49868), [CVE-2024-49867](https://nvd.nist.gov/vuln/detail/CVE-2024-49867), [CVE-2024-49866](https://nvd.nist.gov/vuln/detail/CVE-2024-49866), [CVE-2024-49874](https://nvd.nist.gov/vuln/detail/CVE-2024-49874), [CVE-2024-49864](https://nvd.nist.gov/vuln/detail/CVE-2024-49864), [CVE-2024-47704](https://nvd.nist.gov/vuln/detail/CVE-2024-47704), [CVE-2024-50191](https://nvd.nist.gov/vuln/detail/CVE-2024-50191), [CVE-2024-50189](https://nvd.nist.gov/vuln/detail/CVE-2024-50189), [CVE-2024-50188](https://nvd.nist.gov/vuln/detail/CVE-2024-50188), [CVE-2024-50187](https://nvd.nist.gov/vuln/detail/CVE-2024-50187), [CVE-2024-50186](https://nvd.nist.gov/vuln/detail/CVE-2024-50186), [CVE-2024-50185](https://nvd.nist.gov/vuln/detail/CVE-2024-50185), [CVE-2024-50184](https://nvd.nist.gov/vuln/detail/CVE-2024-50184), [CVE-2024-50183](https://nvd.nist.gov/vuln/detail/CVE-2024-50183), [CVE-2024-50182](https://nvd.nist.gov/vuln/detail/CVE-2024-50182), [CVE-2024-50180](https://nvd.nist.gov/vuln/detail/CVE-2024-50180), [CVE-2024-50181](https://nvd.nist.gov/vuln/detail/CVE-2024-50181), [CVE-2024-50097](https://nvd.nist.gov/vuln/detail/CVE-2024-50097), [CVE-2024-50096](https://nvd.nist.gov/vuln/detail/CVE-2024-50096), [CVE-2024-50095](https://nvd.nist.gov/vuln/detail/CVE-2024-50095), [CVE-2024-50093](https://nvd.nist.gov/vuln/detail/CVE-2024-50093), [CVE-2024-50089](https://nvd.nist.gov/vuln/detail/CVE-2024-50089), [CVE-2024-50058](https://nvd.nist.gov/vuln/detail/CVE-2024-50058), [CVE-2024-50065](https://nvd.nist.gov/vuln/detail/CVE-2024-50065), [CVE-2024-50064](https://nvd.nist.gov/vuln/detail/CVE-2024-50064), [CVE-2024-50063](https://nvd.nist.gov/vuln/detail/CVE-2024-50063), [CVE-2024-50062](https://nvd.nist.gov/vuln/detail/CVE-2024-50062), [CVE-2024-50061](https://nvd.nist.gov/vuln/detail/CVE-2024-50061), [CVE-2024-50060](https://nvd.nist.gov/vuln/detail/CVE-2024-50060), [CVE-2024-50059](https://nvd.nist.gov/vuln/detail/CVE-2024-50059), [CVE-2024-50026](https://nvd.nist.gov/vuln/detail/CVE-2024-50026), [CVE-2024-50024](https://nvd.nist.gov/vuln/detail/CVE-2024-50024), [CVE-2024-50023](https://nvd.nist.gov/vuln/detail/CVE-2024-50023), [CVE-2024-50057](https://nvd.nist.gov/vuln/detail/CVE-2024-50057), [CVE-2024-50055](https://nvd.nist.gov/vuln/detail/CVE-2024-50055), [CVE-2024-50049](https://nvd.nist.gov/vuln/detail/CVE-2024-50049), [CVE-2024-50022](https://nvd.nist.gov/vuln/detail/CVE-2024-50022), [CVE-2024-50048](https://nvd.nist.gov/vuln/detail/CVE-2024-50048), [CVE-2024-50047](https://nvd.nist.gov/vuln/detail/CVE-2024-50047), [CVE-2024-50046](https://nvd.nist.gov/vuln/detail/CVE-2024-50046), [CVE-2024-50045](https://nvd.nist.gov/vuln/detail/CVE-2024-50045), [CVE-2024-50044](https://nvd.nist.gov/vuln/detail/CVE-2024-50044), [CVE-2024-50041](https://nvd.nist.gov/vuln/detail/CVE-2024-50041), [CVE-2024-50040](https://nvd.nist.gov/vuln/detail/CVE-2024-50040), [CVE-2024-50039](https://nvd.nist.gov/vuln/detail/CVE-2024-50039), [CVE-2024-50038](https://nvd.nist.gov/vuln/detail/CVE-2024-50038), [CVE-2024-50036](https://nvd.nist.gov/vuln/detail/CVE-2024-50036), [CVE-2024-50035](https://nvd.nist.gov/vuln/detail/CVE-2024-50035), [CVE-2024-50033](https://nvd.nist.gov/vuln/detail/CVE-2024-50033), [CVE-2024-50032](https://nvd.nist.gov/vuln/detail/CVE-2024-50032), [CVE-2024-50031](https://nvd.nist.gov/vuln/detail/CVE-2024-50031), [CVE-2024-50029](https://nvd.nist.gov/vuln/detail/CVE-2024-50029), [CVE-2024-50019](https://nvd.nist.gov/vuln/detail/CVE-2024-50019), [CVE-2024-50201](https://nvd.nist.gov/vuln/detail/CVE-2024-50201), [CVE-2024-50202](https://nvd.nist.gov/vuln/detail/CVE-2024-50202), [CVE-2024-50101](https://nvd.nist.gov/vuln/detail/CVE-2024-50101), [CVE-2024-50098](https://nvd.nist.gov/vuln/detail/CVE-2024-50098), [CVE-2024-50099](https://nvd.nist.gov/vuln/detail/CVE-2024-50099), [CVE-2024-50088](https://nvd.nist.gov/vuln/detail/CVE-2024-50088), [CVE-2024-50087](https://nvd.nist.gov/vuln/detail/CVE-2024-50087), [CVE-2024-50086](https://nvd.nist.gov/vuln/detail/CVE-2024-50086), [CVE-2024-50085](https://nvd.nist.gov/vuln/detail/CVE-2024-50085), [CVE-2024-50084](https://nvd.nist.gov/vuln/detail/CVE-2024-50084), [CVE-2024-50083](https://nvd.nist.gov/vuln/detail/CVE-2024-50083), [CVE-2024-50082](https://nvd.nist.gov/vuln/detail/CVE-2024-50082), [CVE-2024-50080](https://nvd.nist.gov/vuln/detail/CVE-2024-50080), [CVE-2024-50077](https://nvd.nist.gov/vuln/detail/CVE-2024-50077), [CVE-2024-50076](https://nvd.nist.gov/vuln/detail/CVE-2024-50076), [CVE-2024-50075](https://nvd.nist.gov/vuln/detail/CVE-2024-50075), [CVE-2024-50074](https://nvd.nist.gov/vuln/detail/CVE-2024-50074), [CVE-2024-50073](https://nvd.nist.gov/vuln/detail/CVE-2024-50073), [CVE-2024-50072](https://nvd.nist.gov/vuln/detail/CVE-2024-50072), [CVE-2024-50070](https://nvd.nist.gov/vuln/detail/CVE-2024-50070), [CVE-2024-50078](https://nvd.nist.gov/vuln/detail/CVE-2024-50078), [CVE-2024-50069](https://nvd.nist.gov/vuln/detail/CVE-2024-50069), [CVE-2024-50066](https://nvd.nist.gov/vuln/detail/CVE-2024-50066), [CVE-2024-50211](https://nvd.nist.gov/vuln/detail/CVE-2024-50211), [CVE-2024-50210](https://nvd.nist.gov/vuln/detail/CVE-2024-50210), [CVE-2024-50209](https://nvd.nist.gov/vuln/detail/CVE-2024-50209), [CVE-2024-50208](https://nvd.nist.gov/vuln/detail/CVE-2024-50208), [CVE-2024-50205](https://nvd.nist.gov/vuln/detail/CVE-2024-50205), [CVE-2024-50155](https://nvd.nist.gov/vuln/detail/CVE-2024-50155), [CVE-2024-50164](https://nvd.nist.gov/vuln/detail/CVE-2024-50164), [CVE-2024-50163](https://nvd.nist.gov/vuln/detail/CVE-2024-50163), [CVE-2024-50162](https://nvd.nist.gov/vuln/detail/CVE-2024-50162), [CVE-2024-50160](https://nvd.nist.gov/vuln/detail/CVE-2024-50160), [CVE-2024-50159](https://nvd.nist.gov/vuln/detail/CVE-2024-50159), [CVE-2024-50158](https://nvd.nist.gov/vuln/detail/CVE-2024-50158), [CVE-2024-50172](https://nvd.nist.gov/vuln/detail/CVE-2024-50172), [CVE-2024-50171](https://nvd.nist.gov/vuln/detail/CVE-2024-50171), [CVE-2024-50170](https://nvd.nist.gov/vuln/detail/CVE-2024-50170), [CVE-2024-50169](https://nvd.nist.gov/vuln/detail/CVE-2024-50169), [CVE-2024-50168](https://nvd.nist.gov/vuln/detail/CVE-2024-50168), [CVE-2024-50167](https://nvd.nist.gov/vuln/detail/CVE-2024-50167), [CVE-2024-50166](https://nvd.nist.gov/vuln/detail/CVE-2024-50166), [CVE-2024-50156](https://nvd.nist.gov/vuln/detail/CVE-2024-50156), [CVE-2024-50148](https://nvd.nist.gov/vuln/detail/CVE-2024-50148), [CVE-2024-50147](https://nvd.nist.gov/vuln/detail/CVE-2024-50147), [CVE-2024-50145](https://nvd.nist.gov/vuln/detail/CVE-2024-50145), [CVE-2024-50143](https://nvd.nist.gov/vuln/detail/CVE-2024-50143), [CVE-2024-50142](https://nvd.nist.gov/vuln/detail/CVE-2024-50142), [CVE-2024-50141](https://nvd.nist.gov/vuln/detail/CVE-2024-50141), [CVE-2024-50154](https://nvd.nist.gov/vuln/detail/CVE-2024-50154), [CVE-2024-50153](https://nvd.nist.gov/vuln/detail/CVE-2024-50153), [CVE-2024-50152](https://nvd.nist.gov/vuln/detail/CVE-2024-50152), [CVE-2024-50151](https://nvd.nist.gov/vuln/detail/CVE-2024-50151), [CVE-2024-50150](https://nvd.nist.gov/vuln/detail/CVE-2024-50150), [CVE-2024-50139](https://nvd.nist.gov/vuln/detail/CVE-2024-50139), [CVE-2024-50140](https://nvd.nist.gov/vuln/detail/CVE-2024-50140), [CVE-2024-50128](https://nvd.nist.gov/vuln/detail/CVE-2024-50128), [CVE-2024-50136](https://nvd.nist.gov/vuln/detail/CVE-2024-50136), [CVE-2024-50135](https://nvd.nist.gov/vuln/detail/CVE-2024-50135), [CVE-2024-50134](https://nvd.nist.gov/vuln/detail/CVE-2024-50134), [CVE-2024-50133](https://nvd.nist.gov/vuln/detail/CVE-2024-50133), [CVE-2024-50131](https://nvd.nist.gov/vuln/detail/CVE-2024-50131), [CVE-2024-50130](https://nvd.nist.gov/vuln/detail/CVE-2024-50130), [CVE-2024-50111](https://nvd.nist.gov/vuln/detail/CVE-2024-50111), [CVE-2024-50110](https://nvd.nist.gov/vuln/detail/CVE-2024-50110), [CVE-2024-50108](https://nvd.nist.gov/vuln/detail/CVE-2024-50108), [CVE-2024-50127](https://nvd.nist.gov/vuln/detail/CVE-2024-50127), [CVE-2024-50126](https://nvd.nist.gov/vuln/detail/CVE-2024-50126), [CVE-2024-50125](https://nvd.nist.gov/vuln/detail/CVE-2024-50125), [CVE-2024-50124](https://nvd.nist.gov/vuln/detail/CVE-2024-50124), [CVE-2024-50121](https://nvd.nist.gov/vuln/detail/CVE-2024-50121), [CVE-2024-50120](https://nvd.nist.gov/vuln/detail/CVE-2024-50120), [CVE-2024-50117](https://nvd.nist.gov/vuln/detail/CVE-2024-50117), [CVE-2024-50116](https://nvd.nist.gov/vuln/detail/CVE-2024-50116), [CVE-2024-50115](https://nvd.nist.gov/vuln/detail/CVE-2024-50115), [CVE-2024-50112](https://nvd.nist.gov/vuln/detail/CVE-2024-50112), [CVE-2024-50103](https://nvd.nist.gov/vuln/detail/CVE-2024-50103), [CVE-2024-50262](https://nvd.nist.gov/vuln/detail/CVE-2024-50262), [CVE-2024-50259](https://nvd.nist.gov/vuln/detail/CVE-2024-50259), [CVE-2024-50261](https://nvd.nist.gov/vuln/detail/CVE-2024-50261), [CVE-2024-50226](https://nvd.nist.gov/vuln/detail/CVE-2024-50226), [CVE-2024-50235](https://nvd.nist.gov/vuln/detail/CVE-2024-50235), [CVE-2024-50234](https://nvd.nist.gov/vuln/detail/CVE-2024-50234), [CVE-2024-50233](https://nvd.nist.gov/vuln/detail/CVE-2024-50233), [CVE-2024-50232](https://nvd.nist.gov/vuln/detail/CVE-2024-50232), [CVE-2024-50231](https://nvd.nist.gov/vuln/detail/CVE-2024-50231), [CVE-2024-50230](https://nvd.nist.gov/vuln/detail/CVE-2024-50230), [CVE-2024-50258](https://nvd.nist.gov/vuln/detail/CVE-2024-50258), [CVE-2024-50257](https://nvd.nist.gov/vuln/detail/CVE-2024-50257), [CVE-2024-50256](https://nvd.nist.gov/vuln/detail/CVE-2024-50256), [CVE-2024-50229](https://nvd.nist.gov/vuln/detail/CVE-2024-50229), [CVE-2024-50255](https://nvd.nist.gov/vuln/detail/CVE-2024-50255), [CVE-2024-50252](https://nvd.nist.gov/vuln/detail/CVE-2024-50252), [CVE-2024-50251](https://nvd.nist.gov/vuln/detail/CVE-2024-50251), [CVE-2024-50250](https://nvd.nist.gov/vuln/detail/CVE-2024-50250), [CVE-2024-50249](https://nvd.nist.gov/vuln/detail/CVE-2024-50249), [CVE-2024-50248](https://nvd.nist.gov/vuln/detail/CVE-2024-50248), [CVE-2024-50247](https://nvd.nist.gov/vuln/detail/CVE-2024-50247), [CVE-2024-50246](https://nvd.nist.gov/vuln/detail/CVE-2024-50246), [CVE-2024-50228](https://nvd.nist.gov/vuln/detail/CVE-2024-50228), [CVE-2024-50245](https://nvd.nist.gov/vuln/detail/CVE-2024-50245), [CVE-2024-50244](https://nvd.nist.gov/vuln/detail/CVE-2024-50244), [CVE-2024-50243](https://nvd.nist.gov/vuln/detail/CVE-2024-50243), [CVE-2024-50242](https://nvd.nist.gov/vuln/detail/CVE-2024-50242), [CVE-2024-50240](https://nvd.nist.gov/vuln/detail/CVE-2024-50240), [CVE-2024-50239](https://nvd.nist.gov/vuln/detail/CVE-2024-50239), [CVE-2024-50237](https://nvd.nist.gov/vuln/detail/CVE-2024-50237), [CVE-2024-50236](https://nvd.nist.gov/vuln/detail/CVE-2024-50236), [CVE-2024-50219](https://nvd.nist.gov/vuln/detail/CVE-2024-50219), [CVE-2024-50218](https://nvd.nist.gov/vuln/detail/CVE-2024-50218), [CVE-2024-50216](https://nvd.nist.gov/vuln/detail/CVE-2024-50216), [CVE-2024-50215](https://nvd.nist.gov/vuln/detail/CVE-2024-50215), [CVE-2024-50224](https://nvd.nist.gov/vuln/detail/CVE-2024-50224), [CVE-2024-50223](https://nvd.nist.gov/vuln/detail/CVE-2024-50223), [CVE-2024-50222](https://nvd.nist.gov/vuln/detail/CVE-2024-50222))
- docker ([CVE-2024-41110](https://nvd.nist.gov/vuln/detail/CVE-2024-41110))
- etcd ([CVE-2023-32082](https://nvd.nist.gov/vuln/detail/CVE-2023-32082))
- expat ([CVE-2024-45490](https://nvd.nist.gov/vuln/detail/CVE-2024-45490))
- intel-microcode ([CVE-2023-42667](https://nvd.nist.gov/vuln/detail/CVE-2023-42667), [CVE-2023-49141](https://nvd.nist.gov/vuln/detail/CVE-2023-49141), [CVE-2024-24853](https://nvd.nist.gov/vuln/detail/CVE-2024-24853), [CVE-2024-24980](https://nvd.nist.gov/vuln/detail/CVE-2024-24980), [CVE-2024-25939](https://nvd.nist.gov/vuln/detail/CVE-2024-25939))
- libpcap ([CVE-2023-7256](https://nvd.nist.gov/vuln/detail/CVE-2023-7256), [CVE-2024-8006](https://nvd.nist.gov/vuln/detail/CVE-2024-8006))
- runc ([CVE-2024-45310](https://nvd.nist.gov/vuln/detail/CVE-2024-45310))
- SDK: Go ([CVE-2024-34155](https://nvd.nist.gov/vuln/detail/CVE-2024-34155), [CVE-2024-34156](https://nvd.nist.gov/vuln/detail/CVE-2024-34156), [CVE-2024-34158](https://nvd.nist.gov/vuln/detail/CVE-2024-34158))
#### Changes:
- Kernel lockdown in integrity mode is now enabled when secure boot is enabled. This prevents loading unsigned kernel modules and matches the behavior of all major distros. ([scripts#2299](https://github.com/flatcar/scripts/pull/2299))
- The `/usr/sbin` directory is now merged into `/usr/bin`, so the former became a symlink to the latter. The SDK now has the same base layout as the generic images. ([flatcar/scripts#2068](https://github.com/flatcar/scripts/pull/2068))
- Disable CONFIG_NFS_V4_2_READ_PLUS kernel config to fix nfs-ganesha ([flatcar/scripts#2390](https://github.com/flatcar/scripts/pull/2390))
#### Updates:
- Linux ([6.6.60](https://lwn.net/Articles/997527) (includes [6.6.59](https://lwn.net/Articles/996689), [6.6.58](https://lwn.net/Articles/995132), [6.6.57](https://lwn.net/Articles/994634), [6.6.56](https://lwn.net/Articles/993600), [6.6.55](https://lwn.net/Articles/993599), [6.6.50](https://lwn.net/Articles/970172), [6.6.49](https://lwn.net/Articles/988749)))
- Linux Firmware ([20240909](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20240909))
- SDK: Go ([1.22.8](https://go.dev/doc/devel/release#go1.22.8) (includes [1.22.7](https://go.dev/doc/devel/release#go1.22.7)))
- SDK: cmake ([3.30.2](https://cmake.org/cmake/help/v3.30/release/3.30.html#id2))
- SDK: perl ([5.40.0](https://perldoc.perl.org/5.40.0/perldelta))
- afterburn ([5.7.0](https://coreos.github.io/afterburn/release-notes/#afterburn-570))
- audit ([4.0.1](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.1) (includes [4.0](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0)))
- azure, gce, sysext-python: gdbm ([1.24](https://lists.gnu.org/archive/html/info-gnu/2024-07/msg00001.html))
- azure, gce, sysext-python: python ([3.11.10](https://docs.python.org/3.11/whatsnew/3.11.html#notable-changes-in-3-11-10))
- bind-tools ([9.16.50](https://bind9.readthedocs.io/en/v9.16.50/notes.html#notes-for-bind-9-16-50) (includes [9.16.49](https://bind9.readthedocs.io/en/v9.16.49/notes.html#notes-for-bind-9-16-49)))
- bpftool ([7.5.0](https://github.com/libbpf/bpftool/releases/tag/v7.5.0) (includes [7.4.0](https://github.com/libbpf/bpftool/releases/tag/v7.4.0), [7.3.0](https://github.com/libbpf/bpftool/releases/tag/v7.3.0), [7.2.0](https://github.com/libbpf/bpftool/releases/tag/v7.2.0), [7.1.0](https://github.com/libbpf/bpftool/releases/tag/v7.1.0), [7.0.0](https://github.com/libbpf/bpftool/releases/tag/v7.0.0)))
- ca-certificates ([3.106](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_106.html))
- containerd ([1.7.22](https://github.com/containerd/containerd/releases/tag/v1.7.22))
- dev: gentoolkit ([0.6.7](https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.7))
- docker ([27.2.1](https://docs.docker.com/engine/release-notes/27/#2721), includes changes from [26.1.0](https://docs.docker.com/engine/release-notes/26.1/#2610)))
- etcd ([3.5.16](https://github.com/etcd-io/etcd/blob/96e17d38e244ef18756a55d33066f2893402794b/CHANGELOG/CHANGELOG-3.5.md#v3516-2024-09-10))
- expat ([2.6.3](https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes))
- grub ([2.12](https://lists.gnu.org/archive/html/grub-devel/2023-12/msg00052.html))
- intel-microcode ([20240531_p20240526](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813))
- iproute2 ([6.9.0](https://lkml.org/lkml/2024/5/13/860))
- libffi ([3.4.6](https://github.com/libffi/libffi/releases/tag/v3.4.6) (includes [3.4.5](https://github.com/libffi/libffi/releases/tag/v3.4.5)))
- libnftnl ([1.2.7](https://www.mail-archive.com/netfilter-announce@lists.netfilter.org/msg00264.html))
- libpcap ([1.10.5](https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.10.5/CHANGES))
- libpcre2 ([10.44](https://github.com/PCRE2Project/pcre2/blob/pcre2-10.44/NEWS))
- libsodium ([1.0.20](https://github.com/jedisct1/libsodium/releases/tag/1.0.20-RELEASE))
- nettle ([3.10](https://git.lysator.liu.se/nettle/nettle/-/blob/b8c841dc3278dec0812365f02370b41ea9d4ddee/NEWS))
- pinentry ([1.3.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=1ea7e76f836fe15fe7c59b954d7aab768bd090e6;hb=24833c9ef2bf93d9f6c0583a9ecfefa6747473bc))
- runc ([1.1.14](https://github.com/opencontainers/runc/releases/tag/v1.1.14))
- sysext-python: idna ([3.8](https://github.com/kjd/idna/releases/tag/v3.8))
- sysext-python: jaraco-context ([6.0.1](https://github.com/jaraco/jaraco.context/blob/v6.0.1/NEWS.rst))
- sysext-python: setuptools ([73.0.1](https://github.com/pypa/setuptools/blob/v73.0.1/NEWS.rst) (includes [72.2.0](https://github.com/pypa/setuptools/blob/v72.2.0/NEWS.rst)))
- sysext-python: truststore ([0.9.2](https://github.com/sethmlarson/truststore/blob/v0.9.2/CHANGELOG.md))
- whois ([5.5.23](https://github.com/rfc1036/whois/blob/v5.5.23/debian/changelog) (includes [5.5.22](https://github.com/rfc1036/whois/blob/v5.5.22/debian/changelog)))
Next (2/2): https://hackmd.io/6lDbuBgZSKuHuAwp7GWg9Q?view