owned this note
owned this note
Published
Linked with GitHub
# Flatcar Container Linux Release - March 25, 2025
## Alpha - 4284.0.0
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None (except cl.misc.nvidia)
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
VERDICT: _GO_
Note: `cl.misc.nvidia` is failing on Azure, which is known and can be skipped
## Communication
---
#### Guidelines / Things to Remember
- Release notes are used in a PR and will appear on https://www.flatcar.org/releases/
- [Announcement Message](#Announcement-Message) is posted in [Flatcar-Linux-user](https://groups.google.com/g/flatcar-linux-user). Make sure to post as “Flatcar Container Linux User”, not with your personal user (this can be selected when drafting the post).
- Make sure the the LTS is referred to as `LTS-2021`, and not `LTS-2605`
---
### Announcement Message
Subject: Announcing new releases Alpha 4284.0.0
Hello,
We are pleased to announce a new Flatcar Container Linux release for the Alpha.
#### New Alpha Release 4284.0.0
_Changes since **Alpha 4230.0.1**_
#### Security fixes:
- Linux ([CVE-2025-21835](https://nvd.nist.gov/vuln/detail/CVE-2025-21835), [CVE-2025-21836](https://nvd.nist.gov/vuln/detail/CVE-2025-21836), [CVE-2024-58086](https://nvd.nist.gov/vuln/detail/CVE-2024-58086), [CVE-2025-21823](https://nvd.nist.gov/vuln/detail/CVE-2025-21823), [CVE-2025-21821](https://nvd.nist.gov/vuln/detail/CVE-2025-21821), [CVE-2025-21787](https://nvd.nist.gov/vuln/detail/CVE-2025-21787), [CVE-2025-21785](https://nvd.nist.gov/vuln/detail/CVE-2025-21785), [CVE-2025-21784](https://nvd.nist.gov/vuln/detail/CVE-2025-21784), [CVE-2025-21782](https://nvd.nist.gov/vuln/detail/CVE-2025-21782), [CVE-2025-21783](https://nvd.nist.gov/vuln/detail/CVE-2025-21783), [CVE-2025-21781](https://nvd.nist.gov/vuln/detail/CVE-2025-21781), [CVE-2025-21780](https://nvd.nist.gov/vuln/detail/CVE-2025-21780), [CVE-2025-21796](https://nvd.nist.gov/vuln/detail/CVE-2025-21796), [CVE-2025-21795](https://nvd.nist.gov/vuln/detail/CVE-2025-21795), [CVE-2025-21794](https://nvd.nist.gov/vuln/detail/CVE-2025-21794), [CVE-2025-21793](https://nvd.nist.gov/vuln/detail/CVE-2025-21793), [CVE-2025-21792](https://nvd.nist.gov/vuln/detail/CVE-2025-21792), [CVE-2025-21791](https://nvd.nist.gov/vuln/detail/CVE-2025-21791), [CVE-2025-21790](https://nvd.nist.gov/vuln/detail/CVE-2025-21790), [CVE-2025-21789](https://nvd.nist.gov/vuln/detail/CVE-2025-21789), [CVE-2025-21779](https://nvd.nist.gov/vuln/detail/CVE-2025-21779), [CVE-2024-58020](https://nvd.nist.gov/vuln/detail/CVE-2024-58020), [CVE-2024-57834](https://nvd.nist.gov/vuln/detail/CVE-2024-57834), [CVE-2024-54458](https://nvd.nist.gov/vuln/detail/CVE-2024-54458), [CVE-2024-54456](https://nvd.nist.gov/vuln/detail/CVE-2024-54456), [CVE-2025-21776](https://nvd.nist.gov/vuln/detail/CVE-2025-21776), [CVE-2025-21775](https://nvd.nist.gov/vuln/detail/CVE-2025-21775), [CVE-2025-21772](https://nvd.nist.gov/vuln/detail/CVE-2025-21772), [CVE-2025-21773](https://nvd.nist.gov/vuln/detail/CVE-2025-21773), [CVE-2025-21767](https://nvd.nist.gov/vuln/detail/CVE-2025-21767), [CVE-2025-21766](https://nvd.nist.gov/vuln/detail/CVE-2025-21766), [CVE-2025-21765](https://nvd.nist.gov/vuln/detail/CVE-2025-21765), [CVE-2025-21764](https://nvd.nist.gov/vuln/detail/CVE-2025-21764), [CVE-2025-21763](https://nvd.nist.gov/vuln/detail/CVE-2025-21763), [CVE-2025-21761](https://nvd.nist.gov/vuln/detail/CVE-2025-21761), [CVE-2025-21762](https://nvd.nist.gov/vuln/detail/CVE-2025-21762), [CVE-2025-21760](https://nvd.nist.gov/vuln/detail/CVE-2025-21760), [CVE-2025-21759](https://nvd.nist.gov/vuln/detail/CVE-2025-21759), [CVE-2025-21758](https://nvd.nist.gov/vuln/detail/CVE-2025-21758), [CVE-2025-21756](https://nvd.nist.gov/vuln/detail/CVE-2025-21756), [CVE-2025-21704](https://nvd.nist.gov/vuln/detail/CVE-2025-21704), [CVE-2023-52655](https://nvd.nist.gov/vuln/detail/CVE-2023-52655), [CVE-2023-52434](https://nvd.nist.gov/vuln/detail/CVE-2023-52434), [CVE-2025-21848](https://nvd.nist.gov/vuln/detail/CVE-2025-21848), [CVE-2025-21847](https://nvd.nist.gov/vuln/detail/CVE-2025-21847), [CVE-2025-21846](https://nvd.nist.gov/vuln/detail/CVE-2025-21846), [CVE-2025-21866](https://nvd.nist.gov/vuln/detail/CVE-2025-21866), [CVE-2025-21865](https://nvd.nist.gov/vuln/detail/CVE-2025-21865), [CVE-2025-21864](https://nvd.nist.gov/vuln/detail/CVE-2025-21864), [CVE-2025-21863](https://nvd.nist.gov/vuln/detail/CVE-2025-21863), [CVE-2025-21862](https://nvd.nist.gov/vuln/detail/CVE-2025-21862), [CVE-2025-21844](https://nvd.nist.gov/vuln/detail/CVE-2025-21844), [CVE-2025-21859](https://nvd.nist.gov/vuln/detail/CVE-2025-21859), [CVE-2025-21858](https://nvd.nist.gov/vuln/detail/CVE-2025-21858), [CVE-2025-21857](https://nvd.nist.gov/vuln/detail/CVE-2025-21857), [CVE-2025-21856](https://nvd.nist.gov/vuln/detail/CVE-2025-21856), [CVE-2025-21855](https://nvd.nist.gov/vuln/detail/CVE-2025-21855), [CVE-2025-21854](https://nvd.nist.gov/vuln/detail/CVE-2025-21854), [CVE-2025-21853](https://nvd.nist.gov/vuln/detail/CVE-2025-21853), [CVE-2024-58088](https://nvd.nist.gov/vuln/detail/CVE-2024-58088), [CVE-2025-21838](https://nvd.nist.gov/vuln/detail/CVE-2025-21838))
- afterburn ([CVE-2025-0977](https://www.cve.org/CVERecord/?id=CVE-2025-0977))
- binutils ([CVE-2024-53589](https://nvd.nist.gov/vuln/detail/CVE-2024-53589), [CVE-2025-1176](https://nvd.nist.gov/vuln/detail/CVE-2025-1176), [CVE-2025-1178](https://nvd.nist.gov/vuln/detail/CVE-2025-1178), [CVE-2025-1179](https://nvd.nist.gov/vuln/detail/CVE-2025-1179), [CVE-2025-1180](https://nvd.nist.gov/vuln/detail/CVE-2025-1180), [CVE-2025-1181](https://nvd.nist.gov/vuln/detail/CVE-2025-1181), [CVE-2025-1182](https://nvd.nist.gov/vuln/detail/CVE-2025-1182))
- curl ([CVE-2025-0167](https://nvd.nist.gov/vuln/detail/CVE-2025-0167), [CVE-2025-0665](https://nvd.nist.gov/vuln/detail/CVE-2025-0665), [CVE-2025-0725](https://nvd.nist.gov/vuln/detail/CVE-2025-0725))
- git ([CVE-2024-50349](https://nvd.nist.gov/vuln/detail/CVE-2024-50349), [CVE-2024-52005](https://nvd.nist.gov/vuln/detail/CVE-2024-52005), [CVE-2024-52006](https://nvd.nist.gov/vuln/detail/CVE-2024-52006))
- glib ([CVE-2024-52533](https://nvd.nist.gov/vuln/detail/CVE-2024-52533))
- glibc ([CVE-2025-0395](https://nvd.nist.gov/vuln/detail/CVE-2025-0395))
- gnutls ([CVE-2024-12243](https://nvd.nist.gov/vuln/detail/CVE-2024-12243))
- intel-microcode ([CVE-2023-34440](https://nvd.nist.gov/vuln/detail/CVE-2023-34440), [CVE-2023-43758](https://nvd.nist.gov/vuln/detail/CVE-2023-43758), [CVE-2024-24582](https://nvd.nist.gov/vuln/detail/CVE-2024-24582), [CVE-2024-28047](https://nvd.nist.gov/vuln/detail/CVE-2024-28047), [CVE-2024-28127](https://nvd.nist.gov/vuln/detail/CVE-2024-28127), [CVE-2024-29214](https://nvd.nist.gov/vuln/detail/CVE-2024-29214), [CVE-2024-31157](https://nvd.nist.gov/vuln/detail/CVE-2024-31157), [CVE-2024-39279](https://nvd.nist.gov/vuln/detail/CVE-2024-39279), [CVE-2024-31068](https://nvd.nist.gov/vuln/detail/CVE-2024-31068), [CVE-2024-36293](https://nvd.nist.gov/vuln/detail/CVE-2024-36293), [CVE-2024-37020](https://nvd.nist.gov/vuln/detail/CVE-2024-37020), [CVE-2024-39355](https://nvd.nist.gov/vuln/detail/CVE-2024-39355))
- libarchive ([CVE-2024-57970](https://nvd.nist.gov/vuln/detail/CVE-2024-57970))
- libcap ([CVE-2025-1390](https://nvd.nist.gov/vuln/detail/CVE-2025-1390))
- libtasn1 ([CVE-2024-12133](https://nvd.nist.gov/vuln/detail/CVE-2024-12133))
- mit-krb5 ([CVE-2025-24528](https://nvd.nist.gov/vuln/detail/CVE-2025-24528))
- openssh ([CVE-2025-26465](https://nvd.nist.gov/vuln/detail/CVE-2025-26465), [CVE-2025-26466](https://nvd.nist.gov/vuln/detail/CVE-2025-26466))
- openssl ([CVE-2024-12797](https://nvd.nist.gov/vuln/detail/CVE-2024-12797), [CVE-2024-13176](https://nvd.nist.gov/vuln/detail/CVE-2024-13176))
- podman ([CVE-2024-11218](https://nvd.nist.gov/vuln/detail/CVE-2024-11218))
- rsync ([CVE-2024-12084](https://nvd.nist.gov/vuln/detail/CVE-2024-12084), [CVE-2024-12085](https://nvd.nist.gov/vuln/detail/CVE-2024-12085), [CVE-2024-12086](https://nvd.nist.gov/vuln/detail/CVE-2024-12086), [CVE-2024-12087](https://nvd.nist.gov/vuln/detail/CVE-2024-12087), [CVE-2024-12088](https://nvd.nist.gov/vuln/detail/CVE-2024-12088), [CVE-2024-12747](https://nvd.nist.gov/vuln/detail/CVE-2024-12747))
- socat ([CVE-2024-54661](https://nvd.nist.gov/vuln/detail/CVE-2024-54661))
- vim ([CVE-2024-41957](https://nvd.nist.gov/vuln/detail/CVE-2024-41957), [CVE-2024-41965](https://nvd.nist.gov/vuln/detail/CVE-2024-41965), [CVE-2024-43374](https://nvd.nist.gov/vuln/detail/CVE-2024-43374), [CVE-2024-43790](https://nvd.nist.gov/vuln/detail/CVE-2024-43790), [CVE-2024-43802](https://nvd.nist.gov/vuln/detail/CVE-2024-43802), [CVE-2024-45306](https://nvd.nist.gov/vuln/detail/CVE-2024-45306), [CVE-2024-47814](https://nvd.nist.gov/vuln/detail/CVE-2024-47814))
#### Bug fixes:
- Fix non-conforming GPT partition table ([flatcar/Flatcar#1651](https://github.com/flatcar/Flatcar/issues/1651))
- Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. ([flatcar/scripts#2667](https://github.com/flatcar/scripts/pull/2667))
- Fixed PXE boot failures that arose since upgrading to systemd v256. Users were dumped to an emergency shell. ([flatcar/bootengine#103](https://github.com/flatcar/bootengine/pull/103))
- The kernel module build directory now contains native binaries in arm64 images instead of the previous amd64 binaries ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))
- Nvidia driver installer service now supports the 570 driver branch by forcing the use of the proprietary kernel module. The 570 branch defaults to the kernel-open driver which requires loading firmware, which is not yet supported on Flatcar. ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))
- azure: Fixed issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning ([flatcar/Flatcar#1661](https://github.com/flatcar/Flatcar/issues/1661))
#### Changes:
- Add changes for our secureboot signed images with our signed release process until the official shim signing ([scripts#2754](https://github.com/flatcar/scripts/pull/2754/))
- Added support for ARM64 architecture in the NVIDIA driver installer service ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))
- Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))
- Build Intel iGPU i915 driver as module ([scripts#2349](https://github.com/flatcar/scripts/pull/2349))
- Enabled EROFS module with XATTR support ([Flatcar#1659](https://github.com/flatcar/Flatcar/issues/1659))
#### Updates:
- AMD64: nvidia-drivers ([535.230.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-230-02/index.html))
- ARM64: nvidia-drivers ([570.86.15](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-86-15/index.html))
- Linux ([6.6.83](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83) (includes [6.6.79](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79), [6.6.80](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80), [6.6.81](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81), [6.6.82](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82)))
- Linux Firmware ([20250311](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250311) (includes [20250211](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250211)))
- SDK: cmake ([3.31.5](https://cmake.org/cmake/help/v3.31/release/3.31.html))
- SDK: go ([1.23.6](https://go.dev/doc/devel/release#go1.23.6) (includes [1.23.5](https://go.dev/doc/go1.23)))
- SDK: meson ([1.6.1](https://mesonbuild.com/Release-notes-for-1-6-0.html))
- SDK: qemu ([9.1.2](https://wiki.qemu.org/ChangeLog/9.1) (includes [9.0](https://wiki.qemu.org/ChangeLog/9.0)))
- SDK: rust ([1.84.1](https://releases.rs/docs/1.84.1/) (includes [1.83.0](https://blog.rust-lang.org/2024/11/28/Rust-1.83.0.html), [1.84.0](https://releases.rs/docs/1.84.0/)))
- azure: wa-linux-agent ([2.12.0.4](https://github.com/Azure/WALinuxAgent/releases/tag/v2.12.0.4))
- base, dev: binutils ([2.44](https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00001.html))
- base, dev: c-ares ([1.34.4](https://github.com/c-ares/c-ares/releases/tag/v1.34.4))
- base, dev: cracklib ([2.10.3](https://github.com/cracklib/cracklib/releases/tag/v2.10.3))
- base, dev: cri-tools ([1.32.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.32.0) (includes [1.27.1](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.1), [1.28.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.28.0), [1.29.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.29.0), [1.30.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.30.0), [1.30.1](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.30.1), [1.31.0](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.31.0), [1.31.1](https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.31.1)))
- base, dev: curl ([8.12.1](https://curl.se/ch/8.12.1.html) (includes [8.12.0](https://curl.se/ch/8.12.0.html)))
- base, dev: e2fsprogs ([1.47.2](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.2))
- base, dev: git ([2.45.3](https://github.com/git/git/blob/v2.45.3/Documentation/RelNotes/2.45.3.txt))
- base, dev: glib ([2.82.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.4) (includes [2.82.0](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.0), [2.82.1](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1), [2.82.2](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.2), [2.82.3](https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.3)))
- base, dev: gnupg ([2.4.7](https://dev.gnupg.org/T7353))
- base, dev: gnutls ([3.8.9](https://lists.gnupg.org/pipermail/gnutls-help/2025-February/004875.html) (includes [3.8.8](https://gitlab.com/gnutls/gnutls/-/blob/3.8.8/NEWS)))
- base, dev: hwdata ([0.391](https://github.com/vcrhonek/hwdata/releases/tag/v0.391))
- base, dev: intel-microcode ([20250211_p20250211](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211))
- base, dev: ipset ([7.23](https://ipset.netfilter.org/changelog.html))
- base, dev: kbd ([2.7.1](https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7.1) (includes [2.7](https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7), [2.7-rc1](https://git.kernel.org/pub/scm/linux/kernel/git/legion/kbd.git/tag/?h=v2.7-rc1)))
- base, dev: libsemanage ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7))
- base, dev: libtasn1 ([4.20.0](https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00004.html))
- base, dev: linux-headers ([6.12](https://kernelnewbies.org/Linux_6.12))
- base, dev: nettle ([3.10.1](https://lists.gnu.org/archive/html/info-gnu/2024-12/msg00008.html))
- base, dev: nghttp2 ([1.64.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.64.0) (includes [1.63.0](https://github.com/nghttp2/nghttp2/releases/tag/v1.63.0)))
- base, dev: openssh ([9.9_p2](https://www.openssh.com/txt/release-9.9p2) (includes [9.9_p1](https://www.openssh.com/txt/release-9.9)))
- base, dev: openssl ([3.3.3](https://github.com/openssl/openssl/releases/tag/openssl-3.3.3))
- base, dev: policycoreutils ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7))
- base, dev: semodule-utils ([3.7](https://github.com/SELinuxProject/selinux/releases/tag/3.7))
- base, dev: socat ([1.8.0.2](https://repo.or.cz/socat.git/blob/refs/tags/tag-1.8.0.2:/CHANGES) (includes [1.8.0.1](https://repo.or.cz/socat.git/blob/6ff391324d2d3b9f6bfb58e7d16a20be43b47af7:/CHANGES)))
- base, dev: sqlite ([3.47.2](https://sqlite.org/releaselog/3_47_2.html))
- base, dev: sssd ([2.9.6](https://sssd.io/release-notes/sssd-2.9.6.html))
- base, dev: util-linux ([2.40.4](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.4/Documentation/releases/v2.40.4-ReleaseNotes) (includes [2.40.3](https://raw.githubusercontent.com/util-linux/util-linux/refs/tags/v2.40.3/Documentation/releases/v2.40.3-ReleaseNotes)))
- base, dev: vim ([9.1.0794](https://github.com/vim/vim/commits/v9.1.0794/))
- base, dev: zram-generator ([1.2.1](https://github.com/systemd/zram-generator/releases/tag/v1.2.1) (includes [1.2.0](https://github.com/systemd/zram-generator/releases/tag/v1.2.0)))
- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))
- dev: gcc-config ([2.12.1](https://gitweb.gentoo.org/proj/gcc-config.git/log/?h=v2.12.1))
- sysext-containerd: runc ([1.2.4](https://github.com/opencontainers/runc/releases/tag/v1.2.4) (includes [1.1.15](https://github.com/opencontainers/runc/releases/tag/v1.1.15), [1.2.0](https://github.com/opencontainers/runc/releases/tag/v1.2.0), [1.2.1](https://github.com/opencontainers/runc/releases/tag/v1.2.1), [1.2.2](https://github.com/opencontainers/runc/releases/tag/v1.2.2), [1.2.3](https://github.com/opencontainers/runc/releases/tag/v1.2.3)))
- sysext-docker: docker ([27.4.1](https://docs.docker.com/engine/release-notes/27/#2741) (includes [27.4.0](https://docs.docker.com/engine/release-notes/27/#2740)))
- sysext-docker: docker-buildx ([0.19.1](https://github.com/docker/buildx/releases/tag/v0.19.1) (includes [0.14.1](https://github.com/docker/buildx/releases/tag/v0.14.1), [0.15.0](https://github.com/docker/buildx/releases/tag/v0.15.0), [0.15.1](https://github.com/docker/buildx/releases/tag/v0.15.1), [0.16.0](https://github.com/docker/buildx/releases/tag/v0.16.0), [0.16.1](https://github.com/docker/buildx/releases/tag/v0.16.1), [0.16.2](https://github.com/docker/buildx/releases/tag/v0.16.2), [0.17.0](https://github.com/docker/buildx/releases/tag/v0.17.0), [0.17.1](https://github.com/docker/buildx/releases/tag/v0.17.1), [0.18.0](https://github.com/docker/buildx/releases/tag/v0.18.0), [0.19.0](https://github.com/docker/buildx/releases/tag/v0.19.0)))
- sysext-podman: passt ([2025.01.21](https://archives.passt.top/passt-user/20250121182827.652400c8@elisabeth/T/#u))
- sysext-podman: podman ([5.3.2](https://github.com/containers/podman/releases/tag/v5.3.2))
- sysext-python: more-itertools ([10.6.0](https://github.com/more-itertools/more-itertools/releases/tag/v10.6.0))
- sysext-python: pip ([25.0.1](https://github.com/pypa/pip/blob/25.0.1/NEWS.rst) (includes [25.0](https://github.com/pypa/pip/blob/25.0/NEWS.rst)))
- sysext-python: setuptools ([75.8.0](https://github.com/pypa/setuptools/blob/v75.8.0/NEWS.rst#v7580) (includes [75.7.0](https://github.com/pypa/setuptools/blob/v75.7.0/NEWS.rst#v7570)))
- sysext-python: truststore ([0.10.1](https://github.com/sethmlarson/truststore/blob/v0.10.1/CHANGELOG.md))
- vmware: xmlsec ([1.3.6](https://github.com/lsh123/xmlsec/releases/tag/1.3.6))
Best,
The Flatcar Container Linux Maintainers
---
### Communication
#### Go/No-Go message for Matrix/Slack
Go/No-Go Meeting for Alpha 4284.0.0
Pre-view images are available in https://bincache.flatcar-linux.net/images/amd64/$VERSION/
Tracking issue: https://github.com/flatcar/Flatcar/issues/1698
The Go/No-Go document is in our HackMD @flatcar namespace
Link: https://hackmd.io/YAHnXE7OTb6UnNvCzuoFFg
Please give your Go/No-Go vote with 💚 for Go, ❌ for No-Go, and ✋ for Wait.
Contributors & community feel free to put your suggestions, thoughts or comments on the document or here in the chat.
@MAINTAINER @MAINTAINER @MAINTAINER
#### Mastodon
_The toot (from [@flatcar](https://hachyderm.io/@flatcar)) goes out after the changelog update has been published; it includes a link to the web changelog._
New Flatcar Alpha release now available!
📦 Many package updates: Linux, Linux Firware, Rust & more
🚀 New features: EROFS support for systemd-sysext, experimental secure boot
🔒 CVE fixes & security patches: Linux, intel-microcode, curl & more
📜 Release notes at the usual spot: https://www.flatcar.org/releases/
#linux #cloudnative #containers #updates
#### Kubernetes Slack
_This goes in the #flatcar channel_
Please welcome Flatcar releases of this month:
- Alpha 4284.0.0 (new major)
These releases include:
📦 Many package updates: Linux, Linux Firmware, Rust & more
🚀 New features: EROFS support for systemd-sysext, experimental secure boot
🔒 CVE fixes & security patches: Linux, intel-microcode, curl & more
📜 Release notes at the usual spot: https://www.flatcar.org/releases/