# Flatcar Container Linux Release - October 13th, 2025 ## Alpha 4487.0.1 - AMD64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: None - ARM64-usr - Platforms succeeded: All - Platforms failed: None - Platforms not tested: None VERDICT: _NO_GO_ / _GO_ / _WAIT_ ## Communication --- #### Guidelines / Things to Remember - Release notes are used in a PR and will appear on https://www.flatcar.org/releases/ - [Announcement Message](#Announcement-Message) is posted in [Flatcar-Linux-user](https://groups.google.com/g/flatcar-linux-user). Make sure to post as “Flatcar Container Linux User”, not with your personal user (this can be selected when drafting the post). - Make sure the the LTS is referred to as `LTS-2021`, and not `LTS-2605` --- ### Announcement Message Subject: Announcing new releases Alpha 4487.0.1 Hello, We are pleased to announce a new Flatcar Container Linux release for the Alpha channel. #### Alpha 4487.0.1 release _Changes since **Alpha 4487.0.0**_ #### Security fixes: - Linux ([CVE-2025-40107](https://nvd.nist.gov/vuln/detail/CVE-2025-40107), [CVE-2025-40028](https://nvd.nist.gov/vuln/detail/CVE-2025-40028), [CVE-2025-40027](https://nvd.nist.gov/vuln/detail/CVE-2025-40027), [CVE-2025-40026](https://nvd.nist.gov/vuln/detail/CVE-2025-40026), [CVE-2025-40000](https://nvd.nist.gov/vuln/detail/CVE-2025-40000), [CVE-2025-39995](https://nvd.nist.gov/vuln/detail/CVE-2025-39995), [CVE-2025-40052](https://nvd.nist.gov/vuln/detail/CVE-2025-40052), [CVE-2025-40061](https://nvd.nist.gov/vuln/detail/CVE-2025-40061), [CVE-2025-40060](https://nvd.nist.gov/vuln/detail/CVE-2025-40060), [CVE-2025-40059](https://nvd.nist.gov/vuln/detail/CVE-2025-40059), [CVE-2025-40058](https://nvd.nist.gov/vuln/detail/CVE-2025-40058), [CVE-2025-40057](https://nvd.nist.gov/vuln/detail/CVE-2025-40057), [CVE-2025-40056](https://nvd.nist.gov/vuln/detail/CVE-2025-40056), [CVE-2025-40055](https://nvd.nist.gov/vuln/detail/CVE-2025-40055), [CVE-2025-40081](https://nvd.nist.gov/vuln/detail/CVE-2025-40081), [CVE-2025-40080](https://nvd.nist.gov/vuln/detail/CVE-2025-40080), [CVE-2025-40079](https://nvd.nist.gov/vuln/detail/CVE-2025-40079), [CVE-2025-40078](https://nvd.nist.gov/vuln/detail/CVE-2025-40078), [CVE-2025-40071](https://nvd.nist.gov/vuln/detail/CVE-2025-40071), [CVE-2025-40070](https://nvd.nist.gov/vuln/detail/CVE-2025-40070), [CVE-2025-40068](https://nvd.nist.gov/vuln/detail/CVE-2025-40068), [CVE-2025-40067](https://nvd.nist.gov/vuln/detail/CVE-2025-40067), [CVE-2025-40062](https://nvd.nist.gov/vuln/detail/CVE-2025-40062), [CVE-2025-40053](https://nvd.nist.gov/vuln/detail/CVE-2025-40053), [CVE-2025-40029](https://nvd.nist.gov/vuln/detail/CVE-2025-40029), [CVE-2025-40038](https://nvd.nist.gov/vuln/detail/CVE-2025-40038), [CVE-2025-40037](https://nvd.nist.gov/vuln/detail/CVE-2025-40037), [CVE-2025-40036](https://nvd.nist.gov/vuln/detail/CVE-2025-40036), [CVE-2025-40035](https://nvd.nist.gov/vuln/detail/CVE-2025-40035), [CVE-2025-40033](https://nvd.nist.gov/vuln/detail/CVE-2025-40033), [CVE-2025-40051](https://nvd.nist.gov/vuln/detail/CVE-2025-40051), [CVE-2025-40049](https://nvd.nist.gov/vuln/detail/CVE-2025-40049), [CVE-2025-40031](https://nvd.nist.gov/vuln/detail/CVE-2025-40031), [CVE-2025-40048](https://nvd.nist.gov/vuln/detail/CVE-2025-40048), [CVE-2025-40047](https://nvd.nist.gov/vuln/detail/CVE-2025-40047), [CVE-2025-40045](https://nvd.nist.gov/vuln/detail/CVE-2025-40045), [CVE-2025-40044](https://nvd.nist.gov/vuln/detail/CVE-2025-40044), [CVE-2025-40043](https://nvd.nist.gov/vuln/detail/CVE-2025-40043), [CVE-2025-40039](https://nvd.nist.gov/vuln/detail/CVE-2025-40039), [CVE-2025-40030](https://nvd.nist.gov/vuln/detail/CVE-2025-40030), [CVE-2025-40018](https://nvd.nist.gov/vuln/detail/CVE-2025-40018), [CVE-2025-40004](https://nvd.nist.gov/vuln/detail/CVE-2025-40004), [CVE-2025-40032](https://nvd.nist.gov/vuln/detail/CVE-2025-40032), [CVE-2025-40042](https://nvd.nist.gov/vuln/detail/CVE-2025-40042), [CVE-2025-40019](https://nvd.nist.gov/vuln/detail/CVE-2025-40019)) #### Bug fixes: - Alpha only: Fixed systemd-sysext payload handling for air-gapped/self-hosted updates which was a known bug for 4487.0.0 ([ue-rs#93](https://github.com/flatcar/ue-rs/pull/93)) - Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them ([Flatcar#1933](https://github.com/flatcar/Flatcar/issues/1933)) - Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by switching back to built-in extra firmware instead of early cpio inclusion ([Flatcar#1909](https://github.com/flatcar/Flatcar/issues/1909)) - Fixed a kernel boot warning when loading an explicit list of kernel modules in the minimal first-stage initrd ([Flatcar#1934](https://github.com/flatcar/Flatcar/issues/1934)) - Fixed that the needed Flatcar extensions don't get removed on update which caused a re-download ([update_engine#51](https://github.com/flatcar/update_engine/pull/51)) #### Changes: - Added support for the kernel cmdline parameters `flatcar.release_file_server_url` and `flatcar.dev_file_server_url` to specify custom servers where Flatcar extensions should be downloaded on boot ([bootengine#112](https://github.com/flatcar/bootengine/pull/112)) - Alpha only: Reduced Azure image size again to 30 GB as before by shrinking the root partition to compensate for the growth of the other partitions ([scripts#3460](https://github.com/flatcar/scripts/pull/3460)) - Scaleway: The Linux console is now attached to the correct console port. ([scripts#3383](https://github.com/flatcar/scripts/pull/3383)) #### Updates: - Linux ([6.12.54](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.54) (includes [6.12.53](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.53), [6.12.52](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.52))) Best, The Flatcar Container Linux Maintainers --- ### Communication #### Go/No-Go message for Matrix/Slack Go/No-Go Meeting for Alpha 4487.0.1 Pre-view images are available in https://bincache.flatcar-linux.net/images/amd64/$VERSION/ Tracking issue: https://github.com/flatcar/Flatcar/issues/1936 The Go/No-Go document is in our HackMD @flatcar namespace Link: https://hackmd.io/SMMJukplQAGaA19au5b5wQ Please give your Go/No-Go vote with 💚 for Go, ❌ for No-Go, and ✋ for Wait. Contributors & community feel free to put your suggestions, thoughts or comments on the document or here in the chat. @MAINTAINER @MAINTAINER @MAINTAINER #### Mastodon _The toot (from [@flatcar](https://hachyderm.io/@flatcar)) goes out after the changelog update has been published; it includes a link to the web changelog._ 🚀 Flatcar Alpha Release Update! This release fixes key issues around updates, networking, and firmware — especially for self-hosted setups. Let’s dive into what’s new 👇 #Flatcar #Linux #ContainerLinux Tweet 2 🛠️ Fixes & Changes sysext payloads fixed for offline updates, excluded TUN/TAP from DHCP, restored Intel microcode, resolved kernel boot warn, stopped sysext re-downloads, added custom server cmdline params, Azure img back to 30 GB + Scaleway console fix. Tweet 3 ⬆️ Updates • Linux kernel bumped to v6.12.54 🧠 https://lwn.net/Articles/1042571/ Follow @flatcar for regular updates! #### Kubernetes Slack _This goes in the #flatcar channel_ Please welcome the Flatcar Linux releases for October! 🎉 - **Alpha 4487.0.1** (maintenance release) These releases include: 🩹 Fixes & updates: • Fixed `systemd-sysext` payloads for offline/air-gapped updates [ue-rs#93] • Excluded TUN/TAP from default DHCP config to avoid conflicts • Restored Intel microcode updates in Alpha/Beta • Resolved kernel boot warning during initrd module load • Prevented unnecessary re-downloads of required sysexts ⚙️ Changes & improvements: • Added kernel cmdline params `flatcar.release_file_server_url` & `flatcar.dev_file_server_url` for custom extension servers • Azure image size reduced back to 30 GB • Scaleway console now attached to the correct port 📦 Component updates: • Linux 6.12.54 (includes .53 and .52) 📜 Full release notes at the usual spot: 🔗 https://www.flatcar.org/releases/ 💙 Thanks to everyone contributing, testing, and reporting issues to keep Flatcar rolling strong!