owned this note
owned this note
Published
Linked with GitHub
# Flatcar Container Linux Release - March 17th, 2025
## Beta 4230.1.0
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
## Stable 4152.2.2
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
## LTS 4081.3.2
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
## LTS 3510.3.7
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
VERDICT: _GO_
#### Notes:
## Communication
---
#### Guidelines / Things to Remember
- Release notes are used in a PR and will appear on https://www.flatcar.org/releases/
- [Announcement Message](#Announcement-Message) is posted in [Flatcar-Linux-user](https://groups.google.com/g/flatcar-linux-user). Make sure to post as “Flatcar Container Linux User”, not with your personal user (this can be selected when drafting the post).
- Make sure the the LTS is referred to as `LTS-2021`, and not `LTS-2605`
---
### Announcement Message
Subject: Announcing new releases Beta 4230.1.0, Stable 4152.2.2, LTS-2024 4081.3.2, LTS-2023 3510.3.7
Hello,
We are pleased to announce a new Flatcar Container Linux maintenance release for the Beta, Stable and LTS-2024, LTS-2023 channel.
#### New Beta Release 4230.1.0
_Changes since **Beta 4186.1.1**_
#### Security fixes:
- Linux ([CVE-2025-21835](https://nvd.nist.gov/vuln/detail/CVE-2025-21835), [CVE-2025-21836](https://nvd.nist.gov/vuln/detail/CVE-2025-21836), [CVE-2024-58086](https://nvd.nist.gov/vuln/detail/CVE-2024-58086), [CVE-2025-21823](https://nvd.nist.gov/vuln/detail/CVE-2025-21823), [CVE-2025-21821](https://nvd.nist.gov/vuln/detail/CVE-2025-21821), [CVE-2025-21787](https://nvd.nist.gov/vuln/detail/CVE-2025-21787), [CVE-2025-21785](https://nvd.nist.gov/vuln/detail/CVE-2025-21785), [CVE-2025-21784](https://nvd.nist.gov/vuln/detail/CVE-2025-21784), [CVE-2025-21782](https://nvd.nist.gov/vuln/detail/CVE-2025-21782), [CVE-2025-21783](https://nvd.nist.gov/vuln/detail/CVE-2025-21783), [CVE-2025-21781](https://nvd.nist.gov/vuln/detail/CVE-2025-21781), [CVE-2025-21780](https://nvd.nist.gov/vuln/detail/CVE-2025-21780), [CVE-2025-21796](https://nvd.nist.gov/vuln/detail/CVE-2025-21796), [CVE-2025-21795](https://nvd.nist.gov/vuln/detail/CVE-2025-21795), [CVE-2025-21794](https://nvd.nist.gov/vuln/detail/CVE-2025-21794), [CVE-2025-21793](https://nvd.nist.gov/vuln/detail/CVE-2025-21793), [CVE-2025-21792](https://nvd.nist.gov/vuln/detail/CVE-2025-21792), [CVE-2025-21791](https://nvd.nist.gov/vuln/detail/CVE-2025-21791), [CVE-2025-21790](https://nvd.nist.gov/vuln/detail/CVE-2025-21790), [CVE-2025-21789](https://nvd.nist.gov/vuln/detail/CVE-2025-21789), [CVE-2025-21779](https://nvd.nist.gov/vuln/detail/CVE-2025-21779), [CVE-2024-58020](https://nvd.nist.gov/vuln/detail/CVE-2024-58020), [CVE-2024-57834](https://nvd.nist.gov/vuln/detail/CVE-2024-57834), [CVE-2024-54458](https://nvd.nist.gov/vuln/detail/CVE-2024-54458), [CVE-2024-54456](https://nvd.nist.gov/vuln/detail/CVE-2024-54456), [CVE-2025-21776](https://nvd.nist.gov/vuln/detail/CVE-2025-21776), [CVE-2025-21775](https://nvd.nist.gov/vuln/detail/CVE-2025-21775), [CVE-2025-21772](https://nvd.nist.gov/vuln/detail/CVE-2025-21772), [CVE-2025-21773](https://nvd.nist.gov/vuln/detail/CVE-2025-21773), [CVE-2025-21767](https://nvd.nist.gov/vuln/detail/CVE-2025-21767), [CVE-2025-21766](https://nvd.nist.gov/vuln/detail/CVE-2025-21766), [CVE-2025-21765](https://nvd.nist.gov/vuln/detail/CVE-2025-21765), [CVE-2025-21764](https://nvd.nist.gov/vuln/detail/CVE-2025-21764), [CVE-2025-21763](https://nvd.nist.gov/vuln/detail/CVE-2025-21763), [CVE-2025-21761](https://nvd.nist.gov/vuln/detail/CVE-2025-21761), [CVE-2025-21762](https://nvd.nist.gov/vuln/detail/CVE-2025-21762), [CVE-2025-21760](https://nvd.nist.gov/vuln/detail/CVE-2025-21760), [CVE-2025-21759](https://nvd.nist.gov/vuln/detail/CVE-2025-21759), [CVE-2025-21758](https://nvd.nist.gov/vuln/detail/CVE-2025-21758), [CVE-2025-21756](https://nvd.nist.gov/vuln/detail/CVE-2025-21756), [CVE-2025-21704](https://nvd.nist.gov/vuln/detail/CVE-2025-21704), [CVE-2023-52655](https://nvd.nist.gov/vuln/detail/CVE-2023-52655), [CVE-2023-52434](https://nvd.nist.gov/vuln/detail/CVE-2023-52434), [CVE-2025-21848](https://nvd.nist.gov/vuln/detail/CVE-2025-21848), [CVE-2025-21847](https://nvd.nist.gov/vuln/detail/CVE-2025-21847), [CVE-2025-21846](https://nvd.nist.gov/vuln/detail/CVE-2025-21846), [CVE-2025-21866](https://nvd.nist.gov/vuln/detail/CVE-2025-21866), [CVE-2025-21865](https://nvd.nist.gov/vuln/detail/CVE-2025-21865), [CVE-2025-21864](https://nvd.nist.gov/vuln/detail/CVE-2025-21864), [CVE-2025-21863](https://nvd.nist.gov/vuln/detail/CVE-2025-21863), [CVE-2025-21862](https://nvd.nist.gov/vuln/detail/CVE-2025-21862), [CVE-2025-21844](https://nvd.nist.gov/vuln/detail/CVE-2025-21844), [CVE-2025-21859](https://nvd.nist.gov/vuln/detail/CVE-2025-21859), [CVE-2025-21858](https://nvd.nist.gov/vuln/detail/CVE-2025-21858), [CVE-2025-21857](https://nvd.nist.gov/vuln/detail/CVE-2025-21857), [CVE-2025-21856](https://nvd.nist.gov/vuln/detail/CVE-2025-21856), [CVE-2025-21855](https://nvd.nist.gov/vuln/detail/CVE-2025-21855), [CVE-2025-21854](https://nvd.nist.gov/vuln/detail/CVE-2025-21854), [CVE-2025-21853](https://nvd.nist.gov/vuln/detail/CVE-2025-21853), [CVE-2024-58088](https://nvd.nist.gov/vuln/detail/CVE-2024-58088), [CVE-2025-21838](https://nvd.nist.gov/vuln/detail/CVE-2025-21838))
- curl ([CVE-2024-11053](https://nvd.nist.gov/vuln/detail/CVE-2024-11053), [CVE-2024-9681](https://nvd.nist.gov/vuln/detail/CVE-2024-9681))
- sysext-podman: containers-storage, podman ([CVE-2024-9676](https://nvd.nist.gov/vuln/detail/CVE-2024-9676))
- amd64: nvidia-drivers ([CVE-2024-0131](https://nvd.nist.gov/vuln/detail/CVE-2024-0131), [CVE-2024-0147](https://nvd.nist.gov/vuln/detail/CVE-2024-0147), [CVE-2024-0149](https://nvd.nist.gov/vuln/detail/CVE-2024-0149), [CVE-2024-0150](https://nvd.nist.gov/vuln/detail/CVE-2024-0150), [CVE-2024-53869](https://nvd.nist.gov/vuln/detail/CVE-2024-53869))
#### Bug fixes:
- azure: Fix issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning ([flatcar/Flatcar#1661](https://github.com/flatcar/Flatcar/issues/1661))
- Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. ([flatcar/scripts#2667](https://github.com/flatcar/scripts/pull/2667))
- Fixed creating netdev arguments to correctly include commas when no port forwards are passed ([flatcar/scripts#2581](https://github.com/flatcar/scripts/pull/2581))
- The kernel module build directory now contains native binaries in arm64 images instead of the previous amd64 binaries ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))
- Nvidia driver installer service now supports the 570 driver branch by forcing the use of the proprietary kernel module. The 570 branch defaults to the kernel-open driver which requires loading firmware, which is not yet supported on Flatcar. ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))
#### Changes:
- Added support for ARM64 architecture in the NVIDIA driver installer service ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))
- Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))
- Added support for multiple port forwarding parameters in the QEMU startup script. Users can now specify multiple port forwards using the `-f` option. ([flatcar/scripts#2575](https://github.com/flatcar/scripts/pull/2575))
#### Updates:
- AMD64: nvidia-drivers ([535.230.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-230-02/index.html))
- ARM64: nvidia-drivers ([570.86.15](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-86-15/index.html))
- Go ([1.22.11](https://go.dev/doc/devel/release#go1.22.11))
- Linux ([6.6.83](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83) (includes [6.6.79](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79), [6.6.80](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80), [6.6.81](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81), [6.6.82](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82)))
- Linux Firmware ([20250109](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250109))
- SDK: qemu ([8.2.7](https://lists.gnu.org/archive/html/qemu-devel/2024-09/msg03900.html))
- base, dev: audit ([4.0.2](https://github.com/linux-audit/audit-userspace/releases/tag/v4.0.2))
- base, dev: bpftool ([7.5.0](https://github.com/libbpf/bpftool/releases/tag/v7.5.0))
- base, dev: btrfs-progs ([6.12](https://raw.githubusercontent.com/kdave/btrfs-progs/refs/tags/v6.12/CHANGES))
- base, dev: c-ares ([1.34.3](https://github.com/c-ares/c-ares/releases/tag/v1.34.3) (includes [1.34.0](https://github.com/c-ares/c-ares/releases/tag/v1.34.0), [1.34.1](https://github.com/c-ares/c-ares/releases/tag/v1.34.1), [1.34.2](https://github.com/c-ares/c-ares/releases/tag/v1.34.2)))
- base, dev: ethtool ([6.10](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.10))
- base, dev: glib ([2.80.5](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.5) (includes [2.80.0](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.0), [2.80.1](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.1), [2.80.2](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.2), [2.80.3](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.3), [2.80.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.80.4)))
- base, dev: gnupg ([2.4.6](https://lists.gnupg.org/pipermail/gnupg-announce/2024q4/000486.html))
- base, dev: hwdata ([0.390](https://github.com/vcrhonek/hwdata/releases/tag/v0.390))
- base, dev: intel-microcode ([20241112](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112) (includes [20241029](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241029)))
- base, dev: iproute2 ([6.12.0](https://lore.kernel.org/netdev/20241119092743.6a1bdcb7@hermes.local/))
- base, dev: kexec-tools ([2.0.30](https://github.com/horms/kexec-tools/commits/v2.0.30/))
- base, dev: libcap ([2.71](https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.oq9dsdhihxp5))
- base, dev: libgpg-error ([1.51](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=75f2b2d220de4e4f53252d3367950ecb2ab85079;hb=b0bb9266010d84b30fa2dc6a2127b7e40dc03660))
- base, dev: libnvme ([1.11.1](https://github.com/linux-nvme/libnvme/releases/tag/v1.11.1) (includes [1.11](https://github.com/linux-nvme/libnvme/releases/tag/v1.11)))
- base, dev: libxml2 ([2.12.9](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.9))
- base, dev: lsof ([4.99.4](https://github.com/lsof-org/lsof/releases/tag/4.99.4))
- base, dev: npth ([1.8](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=npth.git;a=blob;f=NEWS;h=0f8d78958d8059de95e363a977051995e05dc691;hb=64905e765aad9de6054ef70a97fc30bd992ce999))
- base, dev: nvme-cli ([2.11](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.11))
- base, dev: openldap ([2.6.8](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_8/CHANGES) (includes [2.6.7](https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_7/CHANGES)))
- base, dev: strace ([6.12](https://github.com/strace/strace/releases/tag/v6.12) (includes [6.10](https://github.com/strace/strace/releases/tag/v6.10), [6.11](https://github.com/strace/strace/releases/tag/v6.11)))
- base, dev: usbutils ([018](https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v018))
- base, dev: xfsprogs ([6.11.0](https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.11.0))
- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))
- dev: bash-completion ([2.15.0](https://github.com/scop/bash-completion/releases/tag/2.15.0))
- dev: binutils ([2.43](https://lists.gnu.org/archive/html/info-gnu/2024-08/msg00001.html))
- docker: docker-buildx ([0.14.0](https://github.com/docker/buildx/releases/tag/v0.14.0) (includes [0.11.0](https://github.com/docker/buildx/releases/tag/v0.11.0), [0.12.0](https://github.com/docker/buildx/releases/tag/v0.12.0), [0.13.0](https://github.com/docker/buildx/releases/tag/v0.13.0)))
- gce: six ([1.17.0](https://github.com/benjaminp/six/blob/1.17.0/CHANGES))
- sysext-podman: containers-storage ([1.55.1](https://github.com/containers/storage/releases/tag/v1.55.1))
- sysext-podman: gpgme ([1.24.1](https://dev.gnupg.org/T7440) (includes [1.24.0](https://dev.gnupg.org/T7376)))
- sysext-podman: podman ([5.3.0](https://github.com/containers/podman/releases/tag/v5.3.0))
- sysext-python: charset-normalizer ([3.4.1](https://github.com/jawah/charset_normalizer/releases/tag/3.4.1))
- sysext-python: pip ([24.3.1](https://github.com/pypa/pip/blob/24.3.1/NEWS.rst) (includes [24.3](https://github.com/pypa/pip/blob/24.3/NEWS.rst)))
- sysext-python: python ([3.11.11_p1](https://www.python.org/downloads/release/python-31111/))
- sysext-python: setuptools ([75.6.0](https://github.com/pypa/setuptools/blob/v75.6.0/NEWS.rst) (includes [75.0.0](https://github.com/pypa/setuptools/blob/75.0.0/NEWS.rst), [75.1.0](https://github.com/pypa/setuptools/blob/75.1.0/NEWS.rst), [75.1.1](https://github.com/pypa/setuptools/blob/75.1.1/NEWS.rst), [75.2.0](https://github.com/pypa/setuptools/blob/75.2.0/NEWS.rst), [75.3.0](https://github.com/pypa/setuptools/blob/75.3.0/NEWS.rst), [75.4.0](https://github.com/pypa/setuptools/blob/75.4.0/NEWS.rst), [75.5.0](https://github.com/pypa/setuptools/blob/75.5.0/NEWS.rst)))
- sysext-python: urllib3 ([2.3.0](https://github.com/urllib3/urllib3/releases/tag/2.3.0))
- sysext-python: wheel ([0.45.1](https://github.com/pypa/wheel/releases/tag/0.45.1) (includes [0.45.0](https://github.com/pypa/wheel/releases/tag/0.45.0)))
- sysext-zfs: zfs ([2.2.7](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.7) (includes [2.2.6](https://github.com/openzfs/zfs/releases/tag/zfs-2.2.6)))
- systemd ([256.9](https://github.com/systemd/system/releases/tag/v256.9))
- vmware: libltdl ([2.5.4](https://savannah.gnu.org/news/?id=10693) (includes [2.5.0](https://savannah.gnu.org/news/?id=10631), [2.5.1](https://savannah.gnu.org/news/?id=10660), [2.5.2](https://savannah.gnu.org/news/?id=10669), [2.5.3](https://savannah.gnu.org/news/?id=10676)))
_Changes since **Alpha 4230.0.1**_
#### Security fixes:
- Linux ([CVE-2025-21835](https://nvd.nist.gov/vuln/detail/CVE-2025-21835), [CVE-2025-21836](https://nvd.nist.gov/vuln/detail/CVE-2025-21836), [CVE-2024-58086](https://nvd.nist.gov/vuln/detail/CVE-2024-58086), [CVE-2025-21823](https://nvd.nist.gov/vuln/detail/CVE-2025-21823), [CVE-2025-21821](https://nvd.nist.gov/vuln/detail/CVE-2025-21821), [CVE-2025-21787](https://nvd.nist.gov/vuln/detail/CVE-2025-21787), [CVE-2025-21785](https://nvd.nist.gov/vuln/detail/CVE-2025-21785), [CVE-2025-21784](https://nvd.nist.gov/vuln/detail/CVE-2025-21784), [CVE-2025-21782](https://nvd.nist.gov/vuln/detail/CVE-2025-21782), [CVE-2025-21783](https://nvd.nist.gov/vuln/detail/CVE-2025-21783), [CVE-2025-21781](https://nvd.nist.gov/vuln/detail/CVE-2025-21781), [CVE-2025-21780](https://nvd.nist.gov/vuln/detail/CVE-2025-21780), [CVE-2025-21796](https://nvd.nist.gov/vuln/detail/CVE-2025-21796), [CVE-2025-21795](https://nvd.nist.gov/vuln/detail/CVE-2025-21795), [CVE-2025-21794](https://nvd.nist.gov/vuln/detail/CVE-2025-21794), [CVE-2025-21793](https://nvd.nist.gov/vuln/detail/CVE-2025-21793), [CVE-2025-21792](https://nvd.nist.gov/vuln/detail/CVE-2025-21792), [CVE-2025-21791](https://nvd.nist.gov/vuln/detail/CVE-2025-21791), [CVE-2025-21790](https://nvd.nist.gov/vuln/detail/CVE-2025-21790), [CVE-2025-21789](https://nvd.nist.gov/vuln/detail/CVE-2025-21789), [CVE-2025-21779](https://nvd.nist.gov/vuln/detail/CVE-2025-21779), [CVE-2024-58020](https://nvd.nist.gov/vuln/detail/CVE-2024-58020), [CVE-2024-57834](https://nvd.nist.gov/vuln/detail/CVE-2024-57834), [CVE-2024-54458](https://nvd.nist.gov/vuln/detail/CVE-2024-54458), [CVE-2024-54456](https://nvd.nist.gov/vuln/detail/CVE-2024-54456), [CVE-2025-21776](https://nvd.nist.gov/vuln/detail/CVE-2025-21776), [CVE-2025-21775](https://nvd.nist.gov/vuln/detail/CVE-2025-21775), [CVE-2025-21772](https://nvd.nist.gov/vuln/detail/CVE-2025-21772), [CVE-2025-21773](https://nvd.nist.gov/vuln/detail/CVE-2025-21773), [CVE-2025-21767](https://nvd.nist.gov/vuln/detail/CVE-2025-21767), [CVE-2025-21766](https://nvd.nist.gov/vuln/detail/CVE-2025-21766), [CVE-2025-21765](https://nvd.nist.gov/vuln/detail/CVE-2025-21765), [CVE-2025-21764](https://nvd.nist.gov/vuln/detail/CVE-2025-21764), [CVE-2025-21763](https://nvd.nist.gov/vuln/detail/CVE-2025-21763), [CVE-2025-21761](https://nvd.nist.gov/vuln/detail/CVE-2025-21761), [CVE-2025-21762](https://nvd.nist.gov/vuln/detail/CVE-2025-21762), [CVE-2025-21760](https://nvd.nist.gov/vuln/detail/CVE-2025-21760), [CVE-2025-21759](https://nvd.nist.gov/vuln/detail/CVE-2025-21759), [CVE-2025-21758](https://nvd.nist.gov/vuln/detail/CVE-2025-21758), [CVE-2025-21756](https://nvd.nist.gov/vuln/detail/CVE-2025-21756), [CVE-2025-21704](https://nvd.nist.gov/vuln/detail/CVE-2025-21704), [CVE-2023-52655](https://nvd.nist.gov/vuln/detail/CVE-2023-52655), [CVE-2023-52434](https://nvd.nist.gov/vuln/detail/CVE-2023-52434), [CVE-2025-21848](https://nvd.nist.gov/vuln/detail/CVE-2025-21848), [CVE-2025-21847](https://nvd.nist.gov/vuln/detail/CVE-2025-21847), [CVE-2025-21846](https://nvd.nist.gov/vuln/detail/CVE-2025-21846), [CVE-2025-21866](https://nvd.nist.gov/vuln/detail/CVE-2025-21866), [CVE-2025-21865](https://nvd.nist.gov/vuln/detail/CVE-2025-21865), [CVE-2025-21864](https://nvd.nist.gov/vuln/detail/CVE-2025-21864), [CVE-2025-21863](https://nvd.nist.gov/vuln/detail/CVE-2025-21863), [CVE-2025-21862](https://nvd.nist.gov/vuln/detail/CVE-2025-21862), [CVE-2025-21844](https://nvd.nist.gov/vuln/detail/CVE-2025-21844), [CVE-2025-21859](https://nvd.nist.gov/vuln/detail/CVE-2025-21859), [CVE-2025-21858](https://nvd.nist.gov/vuln/detail/CVE-2025-21858), [CVE-2025-21857](https://nvd.nist.gov/vuln/detail/CVE-2025-21857), [CVE-2025-21856](https://nvd.nist.gov/vuln/detail/CVE-2025-21856), [CVE-2025-21855](https://nvd.nist.gov/vuln/detail/CVE-2025-21855), [CVE-2025-21854](https://nvd.nist.gov/vuln/detail/CVE-2025-21854), [CVE-2025-21853](https://nvd.nist.gov/vuln/detail/CVE-2025-21853), [CVE-2024-58088](https://nvd.nist.gov/vuln/detail/CVE-2024-58088), [CVE-2025-21838](https://nvd.nist.gov/vuln/detail/CVE-2025-21838))
- amd64: nvidia-drivers ([CVE-2024-0131](https://nvd.nist.gov/vuln/detail/CVE-2024-0131), [CVE-2024-0147](https://nvd.nist.gov/vuln/detail/CVE-2024-0147), [CVE-2024-0149](https://nvd.nist.gov/vuln/detail/CVE-2024-0149), [CVE-2024-0150](https://nvd.nist.gov/vuln/detail/CVE-2024-0150), [CVE-2024-53869](https://nvd.nist.gov/vuln/detail/CVE-2024-53869))
#### Bug fixes:
- azure: Fix issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning ([flatcar/Flatcar#1661](https://github.com/flatcar/Flatcar/issues/1661))
- Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. ([flatcar/scripts#2667](https://github.com/flatcar/scripts/pull/2667))
- The kernel module build directory now contains native binaries in arm64 images instead of the previous amd64 binaries ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))
- Nvidia driver installer service now supports the 570 driver branch by forcing the use of the proprietary kernel module. The 570 branch defaults to the kernel-open driver which requires loading firmware, which is not yet supported on Flatcar. ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))
#### Changes:
- Added support for ARM64 architecture in the NVIDIA driver installer service ([scripts#2694](https://github.com/flatcar/scripts/pull/2694))
- Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))
#### Updates:
- AMD64: nvidia-drivers ([535.230.02](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-230-02/index.html))
- ARM64: nvidia-drivers ([570.86.15](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-86-15/index.html))
- Linux ([6.6.83](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83) (includes [6.6.79](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79), [6.6.80](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80), [6.6.81](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81), [6.6.82](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82)))
- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))
#### New Stable Release 4152.2.2
_Changes since **Stable 4152.2.1**_
#### Security fixes:
- Linux ([CVE-2025-21835](https://nvd.nist.gov/vuln/detail/CVE-2025-21835), [CVE-2025-21836](https://nvd.nist.gov/vuln/detail/CVE-2025-21836), [CVE-2024-58086](https://nvd.nist.gov/vuln/detail/CVE-2024-58086), [CVE-2025-21823](https://nvd.nist.gov/vuln/detail/CVE-2025-21823), [CVE-2025-21821](https://nvd.nist.gov/vuln/detail/CVE-2025-21821), [CVE-2025-21787](https://nvd.nist.gov/vuln/detail/CVE-2025-21787), [CVE-2025-21785](https://nvd.nist.gov/vuln/detail/CVE-2025-21785), [CVE-2025-21784](https://nvd.nist.gov/vuln/detail/CVE-2025-21784), [CVE-2025-21782](https://nvd.nist.gov/vuln/detail/CVE-2025-21782), [CVE-2025-21783](https://nvd.nist.gov/vuln/detail/CVE-2025-21783), [CVE-2025-21781](https://nvd.nist.gov/vuln/detail/CVE-2025-21781), [CVE-2025-21780](https://nvd.nist.gov/vuln/detail/CVE-2025-21780), [CVE-2025-21796](https://nvd.nist.gov/vuln/detail/CVE-2025-21796), [CVE-2025-21795](https://nvd.nist.gov/vuln/detail/CVE-2025-21795), [CVE-2025-21794](https://nvd.nist.gov/vuln/detail/CVE-2025-21794), [CVE-2025-21793](https://nvd.nist.gov/vuln/detail/CVE-2025-21793), [CVE-2025-21792](https://nvd.nist.gov/vuln/detail/CVE-2025-21792), [CVE-2025-21791](https://nvd.nist.gov/vuln/detail/CVE-2025-21791), [CVE-2025-21790](https://nvd.nist.gov/vuln/detail/CVE-2025-21790), [CVE-2025-21789](https://nvd.nist.gov/vuln/detail/CVE-2025-21789), [CVE-2025-21779](https://nvd.nist.gov/vuln/detail/CVE-2025-21779), [CVE-2024-58020](https://nvd.nist.gov/vuln/detail/CVE-2024-58020), [CVE-2024-57834](https://nvd.nist.gov/vuln/detail/CVE-2024-57834), [CVE-2024-54458](https://nvd.nist.gov/vuln/detail/CVE-2024-54458), [CVE-2024-54456](https://nvd.nist.gov/vuln/detail/CVE-2024-54456), [CVE-2025-21776](https://nvd.nist.gov/vuln/detail/CVE-2025-21776), [CVE-2025-21775](https://nvd.nist.gov/vuln/detail/CVE-2025-21775), [CVE-2025-21772](https://nvd.nist.gov/vuln/detail/CVE-2025-21772), [CVE-2025-21773](https://nvd.nist.gov/vuln/detail/CVE-2025-21773), [CVE-2025-21767](https://nvd.nist.gov/vuln/detail/CVE-2025-21767), [CVE-2025-21766](https://nvd.nist.gov/vuln/detail/CVE-2025-21766), [CVE-2025-21765](https://nvd.nist.gov/vuln/detail/CVE-2025-21765), [CVE-2025-21764](https://nvd.nist.gov/vuln/detail/CVE-2025-21764), [CVE-2025-21763](https://nvd.nist.gov/vuln/detail/CVE-2025-21763), [CVE-2025-21761](https://nvd.nist.gov/vuln/detail/CVE-2025-21761), [CVE-2025-21762](https://nvd.nist.gov/vuln/detail/CVE-2025-21762), [CVE-2025-21760](https://nvd.nist.gov/vuln/detail/CVE-2025-21760), [CVE-2025-21759](https://nvd.nist.gov/vuln/detail/CVE-2025-21759), [CVE-2025-21758](https://nvd.nist.gov/vuln/detail/CVE-2025-21758), [CVE-2025-21756](https://nvd.nist.gov/vuln/detail/CVE-2025-21756), [CVE-2025-21704](https://nvd.nist.gov/vuln/detail/CVE-2025-21704), [CVE-2023-52655](https://nvd.nist.gov/vuln/detail/CVE-2023-52655), [CVE-2023-52434](https://nvd.nist.gov/vuln/detail/CVE-2023-52434), [CVE-2025-21848](https://nvd.nist.gov/vuln/detail/CVE-2025-21848), [CVE-2025-21847](https://nvd.nist.gov/vuln/detail/CVE-2025-21847), [CVE-2025-21846](https://nvd.nist.gov/vuln/detail/CVE-2025-21846), [CVE-2025-21866](https://nvd.nist.gov/vuln/detail/CVE-2025-21866), [CVE-2025-21865](https://nvd.nist.gov/vuln/detail/CVE-2025-21865), [CVE-2025-21864](https://nvd.nist.gov/vuln/detail/CVE-2025-21864), [CVE-2025-21863](https://nvd.nist.gov/vuln/detail/CVE-2025-21863), [CVE-2025-21862](https://nvd.nist.gov/vuln/detail/CVE-2025-21862), [CVE-2025-21844](https://nvd.nist.gov/vuln/detail/CVE-2025-21844), [CVE-2025-21859](https://nvd.nist.gov/vuln/detail/CVE-2025-21859), [CVE-2025-21858](https://nvd.nist.gov/vuln/detail/CVE-2025-21858), [CVE-2025-21857](https://nvd.nist.gov/vuln/detail/CVE-2025-21857), [CVE-2025-21856](https://nvd.nist.gov/vuln/detail/CVE-2025-21856), [CVE-2025-21855](https://nvd.nist.gov/vuln/detail/CVE-2025-21855), [CVE-2025-21854](https://nvd.nist.gov/vuln/detail/CVE-2025-21854), [CVE-2025-21853](https://nvd.nist.gov/vuln/detail/CVE-2025-21853), [CVE-2024-58088](https://nvd.nist.gov/vuln/detail/CVE-2024-58088), [CVE-2025-21838](https://nvd.nist.gov/vuln/detail/CVE-2025-21838))
#### Bug fixes:
- azure: Fix issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning ([flatcar/Flatcar#1661](https://github.com/flatcar/Flatcar/issues/1661))
- Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. ([flatcar/scripts#2667](https://github.com/flatcar/scripts/pull/2667))
#### Changes:
- Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))
#### Updates:
- Linux ([6.6.83](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83) (includes [6.6.79](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79), [6.6.80](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80), [6.6.81](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81), [6.6.82](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82)))
- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))
#### New LTS-2024 Release 40181.3.2
_Changes since **LTS 4081.3.1**_
#### Security fixes:
- Linux ([CVE-2025-21835](https://nvd.nist.gov/vuln/detail/CVE-2025-21835), [CVE-2025-21836](https://nvd.nist.gov/vuln/detail/CVE-2025-21836), [CVE-2024-58086](https://nvd.nist.gov/vuln/detail/CVE-2024-58086), [CVE-2025-21823](https://nvd.nist.gov/vuln/detail/CVE-2025-21823), [CVE-2025-21821](https://nvd.nist.gov/vuln/detail/CVE-2025-21821), [CVE-2025-21787](https://nvd.nist.gov/vuln/detail/CVE-2025-21787), [CVE-2025-21785](https://nvd.nist.gov/vuln/detail/CVE-2025-21785), [CVE-2025-21784](https://nvd.nist.gov/vuln/detail/CVE-2025-21784), [CVE-2025-21782](https://nvd.nist.gov/vuln/detail/CVE-2025-21782), [CVE-2025-21783](https://nvd.nist.gov/vuln/detail/CVE-2025-21783), [CVE-2025-21781](https://nvd.nist.gov/vuln/detail/CVE-2025-21781), [CVE-2025-21780](https://nvd.nist.gov/vuln/detail/CVE-2025-21780), [CVE-2025-21796](https://nvd.nist.gov/vuln/detail/CVE-2025-21796), [CVE-2025-21795](https://nvd.nist.gov/vuln/detail/CVE-2025-21795), [CVE-2025-21794](https://nvd.nist.gov/vuln/detail/CVE-2025-21794), [CVE-2025-21793](https://nvd.nist.gov/vuln/detail/CVE-2025-21793), [CVE-2025-21792](https://nvd.nist.gov/vuln/detail/CVE-2025-21792), [CVE-2025-21791](https://nvd.nist.gov/vuln/detail/CVE-2025-21791), [CVE-2025-21790](https://nvd.nist.gov/vuln/detail/CVE-2025-21790), [CVE-2025-21789](https://nvd.nist.gov/vuln/detail/CVE-2025-21789), [CVE-2025-21779](https://nvd.nist.gov/vuln/detail/CVE-2025-21779), [CVE-2024-58020](https://nvd.nist.gov/vuln/detail/CVE-2024-58020), [CVE-2024-57834](https://nvd.nist.gov/vuln/detail/CVE-2024-57834), [CVE-2024-54458](https://nvd.nist.gov/vuln/detail/CVE-2024-54458), [CVE-2024-54456](https://nvd.nist.gov/vuln/detail/CVE-2024-54456), [CVE-2025-21776](https://nvd.nist.gov/vuln/detail/CVE-2025-21776), [CVE-2025-21775](https://nvd.nist.gov/vuln/detail/CVE-2025-21775), [CVE-2025-21772](https://nvd.nist.gov/vuln/detail/CVE-2025-21772), [CVE-2025-21773](https://nvd.nist.gov/vuln/detail/CVE-2025-21773), [CVE-2025-21767](https://nvd.nist.gov/vuln/detail/CVE-2025-21767), [CVE-2025-21766](https://nvd.nist.gov/vuln/detail/CVE-2025-21766), [CVE-2025-21765](https://nvd.nist.gov/vuln/detail/CVE-2025-21765), [CVE-2025-21764](https://nvd.nist.gov/vuln/detail/CVE-2025-21764), [CVE-2025-21763](https://nvd.nist.gov/vuln/detail/CVE-2025-21763), [CVE-2025-21761](https://nvd.nist.gov/vuln/detail/CVE-2025-21761), [CVE-2025-21762](https://nvd.nist.gov/vuln/detail/CVE-2025-21762), [CVE-2025-21760](https://nvd.nist.gov/vuln/detail/CVE-2025-21760), [CVE-2025-21759](https://nvd.nist.gov/vuln/detail/CVE-2025-21759), [CVE-2025-21758](https://nvd.nist.gov/vuln/detail/CVE-2025-21758), [CVE-2025-21756](https://nvd.nist.gov/vuln/detail/CVE-2025-21756), [CVE-2025-21704](https://nvd.nist.gov/vuln/detail/CVE-2025-21704), [CVE-2023-52655](https://nvd.nist.gov/vuln/detail/CVE-2023-52655), [CVE-2023-52434](https://nvd.nist.gov/vuln/detail/CVE-2023-52434), [CVE-2025-21848](https://nvd.nist.gov/vuln/detail/CVE-2025-21848), [CVE-2025-21847](https://nvd.nist.gov/vuln/detail/CVE-2025-21847), [CVE-2025-21846](https://nvd.nist.gov/vuln/detail/CVE-2025-21846), [CVE-2025-21866](https://nvd.nist.gov/vuln/detail/CVE-2025-21866), [CVE-2025-21865](https://nvd.nist.gov/vuln/detail/CVE-2025-21865), [CVE-2025-21864](https://nvd.nist.gov/vuln/detail/CVE-2025-21864), [CVE-2025-21863](https://nvd.nist.gov/vuln/detail/CVE-2025-21863), [CVE-2025-21862](https://nvd.nist.gov/vuln/detail/CVE-2025-21862), [CVE-2025-21844](https://nvd.nist.gov/vuln/detail/CVE-2025-21844), [CVE-2025-21859](https://nvd.nist.gov/vuln/detail/CVE-2025-21859), [CVE-2025-21858](https://nvd.nist.gov/vuln/detail/CVE-2025-21858), [CVE-2025-21857](https://nvd.nist.gov/vuln/detail/CVE-2025-21857), [CVE-2025-21856](https://nvd.nist.gov/vuln/detail/CVE-2025-21856), [CVE-2025-21855](https://nvd.nist.gov/vuln/detail/CVE-2025-21855), [CVE-2025-21854](https://nvd.nist.gov/vuln/detail/CVE-2025-21854), [CVE-2025-21853](https://nvd.nist.gov/vuln/detail/CVE-2025-21853), [CVE-2024-58088](https://nvd.nist.gov/vuln/detail/CVE-2024-58088), [CVE-2025-21838](https://nvd.nist.gov/vuln/detail/CVE-2025-21838))
#### Bug fixes:
- Fix update-ca-certificates behavior when concatenating certificates with missing trailing newlines. ([flatcar/scripts#2667](https://github.com/flatcar/scripts/pull/2667))
#### Changes:
- Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))
#### Updates:
- Linux ([6.6.83](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.83) (includes [6.6.79](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.79), [6.6.80](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.80), [6.6.81](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.81), [6.6.82](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.82)))
- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))
#### New LTS-2023 Release 3510.3.7
_Changes since **LTS 3510.3.6**_
#### Security fixes:
- Linux ([CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57838](https://nvd.nist.gov/vuln/detail/CVE-2024-57838), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56780](https://nvd.nist.gov/vuln/detail/CVE-2024-56780), [CVE-2024-56779](https://nvd.nist.gov/vuln/detail/CVE-2024-56779), [CVE-2024-56778](https://nvd.nist.gov/vuln/detail/CVE-2024-56778), [CVE-2024-56777](https://nvd.nist.gov/vuln/detail/CVE-2024-56777), [CVE-2024-56776](https://nvd.nist.gov/vuln/detail/CVE-2024-56776), [CVE-2024-56774](https://nvd.nist.gov/vuln/detail/CVE-2024-56774), [CVE-2024-56754](https://nvd.nist.gov/vuln/detail/CVE-2024-56754), [CVE-2024-56756](https://nvd.nist.gov/vuln/detail/CVE-2024-56756), [CVE-2024-56728](https://nvd.nist.gov/vuln/detail/CVE-2024-56728), [CVE-2024-56726](https://nvd.nist.gov/vuln/detail/CVE-2024-56726), [CVE-2024-56724](https://nvd.nist.gov/vuln/detail/CVE-2024-56724), [CVE-2024-56723](https://nvd.nist.gov/vuln/detail/CVE-2024-56723), [CVE-2024-56748](https://nvd.nist.gov/vuln/detail/CVE-2024-56748), [CVE-2024-56747](https://nvd.nist.gov/vuln/detail/CVE-2024-56747), [CVE-2024-56746](https://nvd.nist.gov/vuln/detail/CVE-2024-56746), [CVE-2024-56745](https://nvd.nist.gov/vuln/detail/CVE-2024-56745), [CVE-2024-56741](https://nvd.nist.gov/vuln/detail/CVE-2024-56741), [CVE-2024-56739](https://nvd.nist.gov/vuln/detail/CVE-2024-56739), [CVE-2024-56720](https://nvd.nist.gov/vuln/detail/CVE-2024-56720), [CVE-2024-56694](https://nvd.nist.gov/vuln/detail/CVE-2024-56694), [CVE-2024-56701](https://nvd.nist.gov/vuln/detail/CVE-2024-56701), [CVE-2024-56700](https://nvd.nist.gov/vuln/detail/CVE-2024-56700), [CVE-2024-56698](https://nvd.nist.gov/vuln/detail/CVE-2024-56698), [CVE-2024-56708](https://nvd.nist.gov/vuln/detail/CVE-2024-56708), [CVE-2024-56705](https://nvd.nist.gov/vuln/detail/CVE-2024-56705), [CVE-2024-56704](https://nvd.nist.gov/vuln/detail/CVE-2024-56704), [CVE-2024-56681](https://nvd.nist.gov/vuln/detail/CVE-2024-56681), [CVE-2024-56679](https://nvd.nist.gov/vuln/detail/CVE-2024-56679), [CVE-2024-56678](https://nvd.nist.gov/vuln/detail/CVE-2024-56678), [CVE-2024-56693](https://nvd.nist.gov/vuln/detail/CVE-2024-56693), [CVE-2024-56691](https://nvd.nist.gov/vuln/detail/CVE-2024-56691), [CVE-2024-56690](https://nvd.nist.gov/vuln/detail/CVE-2024-56690), [CVE-2024-56688](https://nvd.nist.gov/vuln/detail/CVE-2024-56688), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56562](https://nvd.nist.gov/vuln/detail/CVE-2024-56562), [CVE-2024-56581](https://nvd.nist.gov/vuln/detail/CVE-2024-56581), [CVE-2024-56578](https://nvd.nist.gov/vuln/detail/CVE-2024-56578), [CVE-2024-56576](https://nvd.nist.gov/vuln/detail/CVE-2024-56576), [CVE-2024-56558](https://nvd.nist.gov/vuln/detail/CVE-2024-56558), [CVE-2024-56575](https://nvd.nist.gov/vuln/detail/CVE-2024-56575), [CVE-2024-56574](https://nvd.nist.gov/vuln/detail/CVE-2024-56574), [CVE-2024-56572](https://nvd.nist.gov/vuln/detail/CVE-2024-56572), [CVE-2024-56571](https://nvd.nist.gov/vuln/detail/CVE-2024-56571), [CVE-2024-56570](https://nvd.nist.gov/vuln/detail/CVE-2024-56570), [CVE-2024-56569](https://nvd.nist.gov/vuln/detail/CVE-2024-56569), [CVE-2024-56568](https://nvd.nist.gov/vuln/detail/CVE-2024-56568), [CVE-2024-56567](https://nvd.nist.gov/vuln/detail/CVE-2024-56567), [CVE-2024-56539](https://nvd.nist.gov/vuln/detail/CVE-2024-56539), [CVE-2024-56533](https://nvd.nist.gov/vuln/detail/CVE-2024-56533), [CVE-2024-56548](https://nvd.nist.gov/vuln/detail/CVE-2024-56548), [CVE-2024-56531](https://nvd.nist.gov/vuln/detail/CVE-2024-56531), [CVE-2024-56532](https://nvd.nist.gov/vuln/detail/CVE-2024-56532), [CVE-2024-53217](https://nvd.nist.gov/vuln/detail/CVE-2024-53217), [CVE-2024-53215](https://nvd.nist.gov/vuln/detail/CVE-2024-53215), [CVE-2024-53239](https://nvd.nist.gov/vuln/detail/CVE-2024-53239), [CVE-2024-53237](https://nvd.nist.gov/vuln/detail/CVE-2024-53237), [CVE-2024-53214](https://nvd.nist.gov/vuln/detail/CVE-2024-53214), [CVE-2024-53227](https://nvd.nist.gov/vuln/detail/CVE-2024-53227), [CVE-2024-53226](https://nvd.nist.gov/vuln/detail/CVE-2024-53226), [CVE-2024-53180](https://nvd.nist.gov/vuln/detail/CVE-2024-53180), [CVE-2024-53184](https://nvd.nist.gov/vuln/detail/CVE-2024-53184), [CVE-2024-53183](https://nvd.nist.gov/vuln/detail/CVE-2024-53183), [CVE-2024-53206](https://nvd.nist.gov/vuln/detail/CVE-2024-53206), [CVE-2024-53198](https://nvd.nist.gov/vuln/detail/CVE-2024-53198), [CVE-2024-53197](https://nvd.nist.gov/vuln/detail/CVE-2024-53197), [CVE-2024-53194](https://nvd.nist.gov/vuln/detail/CVE-2024-53194), [CVE-2024-53181](https://nvd.nist.gov/vuln/detail/CVE-2024-53181), [CVE-2024-53173](https://nvd.nist.gov/vuln/detail/CVE-2024-53173), [CVE-2024-53172](https://nvd.nist.gov/vuln/detail/CVE-2024-53172), [CVE-2024-53171](https://nvd.nist.gov/vuln/detail/CVE-2024-53171), [CVE-2024-53174](https://nvd.nist.gov/vuln/detail/CVE-2024-53174), [CVE-2022-49034](https://nvd.nist.gov/vuln/detail/CVE-2022-49034), [CVE-2024-53165](https://nvd.nist.gov/vuln/detail/CVE-2024-53165), [CVE-2024-53151](https://nvd.nist.gov/vuln/detail/CVE-2024-53151), [CVE-2024-53150](https://nvd.nist.gov/vuln/detail/CVE-2024-53150), [CVE-2024-53148](https://nvd.nist.gov/vuln/detail/CVE-2024-53148), [CVE-2024-53161](https://nvd.nist.gov/vuln/detail/CVE-2024-53161), [CVE-2024-53158](https://nvd.nist.gov/vuln/detail/CVE-2024-53158), [CVE-2024-53157](https://nvd.nist.gov/vuln/detail/CVE-2024-53157), [CVE-2024-53156](https://nvd.nist.gov/vuln/detail/CVE-2024-53156), [CVE-2024-53155](https://nvd.nist.gov/vuln/detail/CVE-2024-53155), [CVE-2024-53145](https://nvd.nist.gov/vuln/detail/CVE-2024-53145), [CVE-2024-53146](https://nvd.nist.gov/vuln/detail/CVE-2024-53146), [CVE-2024-56770](https://nvd.nist.gov/vuln/detail/CVE-2024-56770), [CVE-2024-56661](https://nvd.nist.gov/vuln/detail/CVE-2024-56661), [CVE-2024-56659](https://nvd.nist.gov/vuln/detail/CVE-2024-56659), [CVE-2024-56670](https://nvd.nist.gov/vuln/detail/CVE-2024-56670), [CVE-2024-56662](https://nvd.nist.gov/vuln/detail/CVE-2024-56662), [CVE-2024-53241](https://nvd.nist.gov/vuln/detail/CVE-2024-53241), [CVE-2024-53240](https://nvd.nist.gov/vuln/detail/CVE-2024-53240), [CVE-2024-58087](https://nvd.nist.gov/vuln/detail/CVE-2024-58087), [CVE-2024-57946](https://nvd.nist.gov/vuln/detail/CVE-2024-57946), [CVE-2024-57938](https://nvd.nist.gov/vuln/detail/CVE-2024-57938), [CVE-2024-57931](https://nvd.nist.gov/vuln/detail/CVE-2024-57931), [CVE-2024-57841](https://nvd.nist.gov/vuln/detail/CVE-2024-57841), [CVE-2024-57802](https://nvd.nist.gov/vuln/detail/CVE-2024-57802), [CVE-2024-54031](https://nvd.nist.gov/vuln/detail/CVE-2024-54031), [CVE-2024-36476](https://nvd.nist.gov/vuln/detail/CVE-2024-36476), [CVE-2024-57896](https://nvd.nist.gov/vuln/detail/CVE-2024-57896), [CVE-2024-57903](https://nvd.nist.gov/vuln/detail/CVE-2024-57903), [CVE-2024-57902](https://nvd.nist.gov/vuln/detail/CVE-2024-57902), [CVE-2024-57901](https://nvd.nist.gov/vuln/detail/CVE-2024-57901), [CVE-2024-57900](https://nvd.nist.gov/vuln/detail/CVE-2024-57900), [CVE-2024-57897](https://nvd.nist.gov/vuln/detail/CVE-2024-57897), [CVE-2024-57890](https://nvd.nist.gov/vuln/detail/CVE-2024-57890), [CVE-2024-57889](https://nvd.nist.gov/vuln/detail/CVE-2024-57889), [CVE-2024-57884](https://nvd.nist.gov/vuln/detail/CVE-2024-57884), [CVE-2024-57807](https://nvd.nist.gov/vuln/detail/CVE-2024-57807), [CVE-2024-57792](https://nvd.nist.gov/vuln/detail/CVE-2024-57792), [CVE-2024-53690](https://nvd.nist.gov/vuln/detail/CVE-2024-53690), [CVE-2024-49571](https://nvd.nist.gov/vuln/detail/CVE-2024-49571), [CVE-2024-47408](https://nvd.nist.gov/vuln/detail/CVE-2024-47408), [CVE-2024-57791](https://nvd.nist.gov/vuln/detail/CVE-2024-57791), [CVE-2024-56369](https://nvd.nist.gov/vuln/detail/CVE-2024-56369), [CVE-2024-55916](https://nvd.nist.gov/vuln/detail/CVE-2024-55916), [CVE-2024-55881](https://nvd.nist.gov/vuln/detail/CVE-2024-55881), [CVE-2025-21697](https://nvd.nist.gov/vuln/detail/CVE-2025-21697), [CVE-2024-57951](https://nvd.nist.gov/vuln/detail/CVE-2024-57951), [CVE-2025-21694](https://nvd.nist.gov/vuln/detail/CVE-2025-21694), [CVE-2025-21669](https://nvd.nist.gov/vuln/detail/CVE-2025-21669), [CVE-2025-21666](https://nvd.nist.gov/vuln/detail/CVE-2025-21666), [CVE-2025-21683](https://nvd.nist.gov/vuln/detail/CVE-2025-21683), [CVE-2025-21680](https://nvd.nist.gov/vuln/detail/CVE-2025-21680), [CVE-2025-21678](https://nvd.nist.gov/vuln/detail/CVE-2025-21678), [CVE-2024-57948](https://nvd.nist.gov/vuln/detail/CVE-2024-57948), [CVE-2025-21665](https://nvd.nist.gov/vuln/detail/CVE-2025-21665), [CVE-2025-21699](https://nvd.nist.gov/vuln/detail/CVE-2025-21699), [CVE-2025-21698](https://nvd.nist.gov/vuln/detail/CVE-2025-21698), [CVE-2025-21687](https://nvd.nist.gov/vuln/detail/CVE-2025-21687), [CVE-2025-21692](https://nvd.nist.gov/vuln/detail/CVE-2025-21692), [CVE-2025-21690](https://nvd.nist.gov/vuln/detail/CVE-2025-21690), [CVE-2025-21689](https://nvd.nist.gov/vuln/detail/CVE-2025-21689), [CVE-2025-21688](https://nvd.nist.gov/vuln/detail/CVE-2025-21688)
#### Bug fixes:
#### Changes:
- Added new image signing pub key to `flatcar-install`, needed for download verification of releases built from March 2025 onwards, if you have copies of `flatcar-install` or the image signing pub key, you need to update them as well ([init#129](https://github.com/flatcar/init/pull/129))
#### Updates:
- Linux ([5.15.179](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.179) (includes [5.15.174](https://lwn.net/Articles/1002179), [5.15.175](https://lwn.net/Articles/1002921), [5.15.176](https://lwn.net/Articles/1004553), [5.15.177](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.177), [5.15.178](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v5.15.178)))
- ca-certificates ([3.109](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_109.html))
Best,
The Flatcar Container Linux Maintainers
---
### Communication
#### Go/No-Go message for Matrix/Slack
Go/No-Go Meeting for Beta 4230.1.0, Stable 4152.2.2, LTS-2024 4081.3.2, LTS-2023 3510.3.7
Pre-view images are available in https://bincache.flatcar-linux.net/images/amd64/$VERSION/
Tracking issue: https://github.com/flatcar/Flatcar/issues/1689
The Go/No-Go document is in our HackMD @flatcar namespace
Link: https://hackmd.io/k_CiQ835QXG6xr2FN52wBQ
Please give your Go/No-Go vote with 💚 for Go, ❌ for No-Go, and ✋ for Wait.
Contributors & community feel free to put your suggestions, thoughts or comments on the document or here in the chat.
@MAINTAINER @MAINTAINER @MAINTAINER
#### Mastodon
_The toot (from [@flatcar](https://hachyderm.io/@flatcar)) goes out after the changelog update has been published; it includes a link to the web changelog._
Announcing new Flatcar Beta, Stable, LTS-2024, LTS-2023 releases!
📦 Many package updates: Linux, nvidia-drivers and others
🔒 CVE fixes & security patches: Linux
📜 Release notes at the usual spot: https://www.flatcar.org/releases/
#### Kubernetes Slack
_This goes in the #flatcar channel_
Please welcome Flatcar releases of this month:
- Beta 4230.1.0 (major release)
- Stable 4152.2.2 (maintenance release)
- LTS-2024 4081.3.2 (maintenance release)
- LTS-2023 3510.3.7 (maintenance release)
Announcing new Flatcar Beta, Stable, LTS-2024, LTS-2023 releases!
📦 Many package updates: Linux, nvidia-drivers and others
🔒 CVE fixes & security patches: Linux
📜 Release notes at the usual spot: https://www.flatcar.org/releases/