owned this note
owned this note
Published
Linked with GitHub
# Flatcar Container Linux Release - October 13th, 2025
## Alpha 4487.0.0
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
VERDICT: _GO_
## Beta 4459.1.0
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
VERDICT: _GO_
## Stable 4230.2.4
- AMD64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
- ARM64-usr
- Platforms succeeded: All
- Platforms failed: None
- Platforms not tested: None
VERDICT: _GO_
## Communication
---
#### Guidelines / Things to Remember
- Release notes are used in a PR and will appear on https://www.flatcar.org/releases/
- [Announcement Message](#Announcement-Message) is posted in [Flatcar-Linux-user](https://groups.google.com/g/flatcar-linux-user). Make sure to post as “Flatcar Container Linux User”, not with your personal user (this can be selected when drafting the post).
- Make sure the the LTS is referred to as `LTS-2021`, and not `LTS-2605`
---
### Announcement Message
Subject: Announcing new releases Alpha 4487.0.0, Beta 4459.1.0, Stable 4230.2.4
Hello,
We are pleased to announce a new Flatcar Container Linux release for the Alpha, Beta, and Stable channels.
#### Alpha 4487.0.0 release
_Changes since **Alpha 4459.0.0**_
#### Known bugs:
- Updating with OEM or Flatcar extensions is broken when ue-rs parses the Omaha response and thusfalls back to downloading from the release server or bincache which may fail for self-hosted Nebraska updates or payloads passed with flatcar-update ([ue-rs#92](https://github.com/flatcar/ue-rs/issues/92))
#### Security fixes:
- Linux ([CVE-2025-39927](https://nvd.nist.gov/vuln/detail/CVE-2025-39927), [CVE-2025-39926](https://nvd.nist.gov/vuln/detail/CVE-2025-39926), [CVE-2025-39923](https://nvd.nist.gov/vuln/detail/CVE-2025-39923), [CVE-2025-39913](https://nvd.nist.gov/vuln/detail/CVE-2025-39913), [CVE-2025-39912](https://nvd.nist.gov/vuln/detail/CVE-2025-39912), [CVE-2025-39911](https://nvd.nist.gov/vuln/detail/CVE-2025-39911), [CVE-2025-39909](https://nvd.nist.gov/vuln/detail/CVE-2025-39909), [CVE-2025-39907](https://nvd.nist.gov/vuln/detail/CVE-2025-39907), [CVE-2025-39917](https://nvd.nist.gov/vuln/detail/CVE-2025-39917), [CVE-2025-39916](https://nvd.nist.gov/vuln/detail/CVE-2025-39916), [CVE-2025-39914](https://nvd.nist.gov/vuln/detail/CVE-2025-39914), [CVE-2025-39885](https://nvd.nist.gov/vuln/detail/CVE-2025-39885), [CVE-2025-39886](https://nvd.nist.gov/vuln/detail/CVE-2025-39886), [CVE-2025-39876](https://nvd.nist.gov/vuln/detail/CVE-2025-39876), [CVE-2025-39873](https://nvd.nist.gov/vuln/detail/CVE-2025-39873), [CVE-2025-39871](https://nvd.nist.gov/vuln/detail/CVE-2025-39871), [CVE-2025-39870](https://nvd.nist.gov/vuln/detail/CVE-2025-39870), [CVE-2025-39869](https://nvd.nist.gov/vuln/detail/CVE-2025-39869), [CVE-2025-39884](https://nvd.nist.gov/vuln/detail/CVE-2025-39884), [CVE-2025-39883](https://nvd.nist.gov/vuln/detail/CVE-2025-39883), [CVE-2025-39882](https://nvd.nist.gov/vuln/detail/CVE-2025-39882), [CVE-2025-39881](https://nvd.nist.gov/vuln/detail/CVE-2025-39881), [CVE-2025-39880](https://nvd.nist.gov/vuln/detail/CVE-2025-39880), [CVE-2025-39877](https://nvd.nist.gov/vuln/detail/CVE-2025-39877), [CVE-2025-39963](https://nvd.nist.gov/vuln/detail/CVE-2025-39963), [CVE-2025-39961](https://nvd.nist.gov/vuln/detail/CVE-2025-39961), [CVE-2025-39957](https://nvd.nist.gov/vuln/detail/CVE-2025-39957), [CVE-2025-39956](https://nvd.nist.gov/vuln/detail/CVE-2025-39956), [CVE-2025-39955](https://nvd.nist.gov/vuln/detail/CVE-2025-39955), [CVE-2025-39938](https://nvd.nist.gov/vuln/detail/CVE-2025-39938), [CVE-2025-39937](https://nvd.nist.gov/vuln/detail/CVE-2025-39937), [CVE-2025-39934](https://nvd.nist.gov/vuln/detail/CVE-2025-39934), [CVE-2025-39953](https://nvd.nist.gov/vuln/detail/CVE-2025-39953), [CVE-2025-39952](https://nvd.nist.gov/vuln/detail/CVE-2025-39952), [CVE-2025-39951](https://nvd.nist.gov/vuln/detail/CVE-2025-39951), [CVE-2025-39950](https://nvd.nist.gov/vuln/detail/CVE-2025-39950), [CVE-2025-39932](https://nvd.nist.gov/vuln/detail/CVE-2025-39932), [CVE-2025-39949](https://nvd.nist.gov/vuln/detail/CVE-2025-39949), [CVE-2025-39948](https://nvd.nist.gov/vuln/detail/CVE-2025-39948), [CVE-2025-39947](https://nvd.nist.gov/vuln/detail/CVE-2025-39947), [CVE-2025-39946](https://nvd.nist.gov/vuln/detail/CVE-2025-39946), [CVE-2025-39945](https://nvd.nist.gov/vuln/detail/CVE-2025-39945), [CVE-2025-39944](https://nvd.nist.gov/vuln/detail/CVE-2025-39944), [CVE-2025-39943](https://nvd.nist.gov/vuln/detail/CVE-2025-39943), [CVE-2025-39942](https://nvd.nist.gov/vuln/detail/CVE-2025-39942), [CVE-2025-39940](https://nvd.nist.gov/vuln/detail/CVE-2025-39940), [CVE-2025-39929](https://nvd.nist.gov/vuln/detail/CVE-2025-39929), [CVE-2025-39931](https://nvd.nist.gov/vuln/detail/CVE-2025-39931), [CVE-2024-57878](https://nvd.nist.gov/vuln/detail/CVE-2024-57878), [CVE-2024-57877](https://nvd.nist.gov/vuln/detail/CVE-2024-57877), [CVE-2024-57875](https://nvd.nist.gov/vuln/detail/CVE-2024-57875), [CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23127](https://nvd.nist.gov/vuln/detail/CVE-2025-23127), [CVE-2025-23126](https://nvd.nist.gov/vuln/detail/CVE-2025-23126), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2025-23124](https://nvd.nist.gov/vuln/detail/CVE-2025-23124), [CVE-2024-57872](https://nvd.nist.gov/vuln/detail/CVE-2024-57872), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57839](https://nvd.nist.gov/vuln/detail/CVE-2024-57839), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47794](https://nvd.nist.gov/vuln/detail/CVE-2024-47794), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-49569](https://nvd.nist.gov/vuln/detail/CVE-2024-49569), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-48876](https://nvd.nist.gov/vuln/detail/CVE-2024-48876), [CVE-2024-41932](https://nvd.nist.gov/vuln/detail/CVE-2024-41932), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56784](https://nvd.nist.gov/vuln/detail/CVE-2024-56784), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56782](https://nvd.nist.gov/vuln/detail/CVE-2024-56782), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56639](https://nvd.nist.gov/vuln/detail/CVE-2024-56639), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56647](https://nvd.nist.gov/vuln/detail/CVE-2024-56647), [CVE-2024-56646](https://nvd.nist.gov/vuln/detail/CVE-2024-56646), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56632](https://nvd.nist.gov/vuln/detail/CVE-2024-56632), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56624](https://nvd.nist.gov/vuln/detail/CVE-2024-56624), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56621](https://nvd.nist.gov/vuln/detail/CVE-2024-56621), [CVE-2024-56620](https://nvd.nist.gov/vuln/detail/CVE-2024-56620), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56618](https://nvd.nist.gov/vuln/detail/CVE-2024-56618), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56591](https://nvd.nist.gov/vuln/detail/CVE-2024-56591), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56588](https://nvd.nist.gov/vuln/detail/CVE-2024-56588), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56612](https://nvd.nist.gov/vuln/detail/CVE-2024-56612), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56609](https://nvd.nist.gov/vuln/detail/CVE-2024-56609), [CVE-2024-56608](https://nvd.nist.gov/vuln/detail/CVE-2024-56608), [CVE-2024-56607](https://nvd.nist.gov/vuln/detail/CVE-2024-56607), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56599](https://nvd.nist.gov/vuln/detail/CVE-2024-56599), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584))
- binutils ([CVE-2025-5244](https://www.cve.org/CVERecord?id=CVE-2025-5244), [CVE-2025-5245](https://www.cve.org/CVERecord?id=CVE-2025-5245), [CVE-2025-8225](https://www.cve.org/CVERecord?id=CVE-2025-8225))
- curl ([CVE-2025-9086](https://www.cve.org/CVERecord?id=CVE-2025-9086), [CVE-2025-10148](https://www.cve.org/CVERecord?id=CVE-2025-10148))
- go ([CVE-2025-47910](https://www.cve.org/CVERecord?id=CVE-2025-47910))
- libpcre2 ([CVE-2025-58050](https://www.cve.org/CVERecord?id=CVE-2025-58050))
- libxml2 ([libxml2-20250908](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9))
- libxslt ([CVE-2025-7424](https://www.cve.org/CVERecord?id=CVE-2025-7424), [CVE-2025-7425](https://www.cve.org/CVERecord?id=CVE-2025-7425))
- net-tools ([CVE-2025-46836](https://www.cve.org/CVERecord?id=CVE-2025-46836))
#### Bug fixes:
- Enabled `CONFIG_MEMCG_V1` to mitigate cgroupsv1 removal (e.g JVM) ([Flatcar#1884](https://github.com/flatcar/Flatcar/issues/1884))
- Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance ([Flatcar#1901](https://github.com/flatcar/Flatcar/issues/1901))
#### Changes:
- Increased all partition sizes: `/boot` to 1 GB, the two `/usr` partitions to 2 GB, `/oem` to 1 GB so that we can use more space in a few years when we can assume that most nodes run the new partition layout - existing nodes can still update for the next years ([scripts#3027](https://github.com/flatcar/scripts/pull/3027))
- Reduced the kernel+initrd size on `/boot` by half. Flatcar now uses a minimal first stage initrd just to access the `/usr` partition and then switches to the full initrd that does the full system preparation as before. Since this means that the set of kernel modules available in the first initrd is reduced, please report any impact.
- Scaleway: SSH keys are now fetched _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))
- Scaleway: The hostname is now set _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))
#### Updates:
- Afterburn ([5.10.0](https://coreos.github.io/afterburn/release-notes/#afterburn-5100))
- Linux ([6.12.51](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51) (includes [6.12.48](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48), [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49), [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50)))
- Linux Firmware ([20250917](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250917))
- SDK: azure-core ([1.16.1](https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-core_1.16.1))
- SDK: azure-identity ([1.13.1](https://github.com/Azure/azure-sdk-for-cpp/releases/tag/azure-identity_1.13.1))
- SDK: go ([1.24.7](https://go.dev/doc/devel/release#go1.24.minor))
- SDK: pkgcheck ([0.10.37](https://github.com/pkgcore/pkgcheck/releases/tag/v0.10.37))
- SDK: rust ([1.89.0](https://blog.rust-lang.org/2025/08/07/Rust-1.89.0/))
- base, dev: bash ([5.3_p3](https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html))
- base, dev: btrfs-progs ([6.16](https://github.com/kdave/btrfs-progs/releases/tag/v6.16))
- base, dev: coreutils ([9.7](https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00006.html) (includes [9.6](https://savannah.gnu.org/news/?id=10715)))
- base, dev: cryptsetup ([2.8.1](https://gitlab.com/cryptsetup/cryptsetup/-/raw/v2.8.1/docs/v2.8.1-ReleaseNotes))
- base, dev: curl ([8.16.0](https://curl.se/ch/8.16.0.html))
- base, dev: expat ([2.7.2](https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes))
- base, dev: gcc ([14.3.1_p20250801](https://gcc.gnu.org/pipermail/gcc/2025-May/246078.html))
- base, dev: hwdata ([0.398](https://github.com/vcrhonek/hwdata/releases/tag/v0.398))
- base, dev: libffi ([3.5.2](https://github.com/libffi/libffi/releases/tag/v3.5.2))
- base, dev: libnftnl ([1.3.0](https://lwn.net/Articles/1032725/))
- base, dev: libxml2 ([2.13.9](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.9))
- base, dev: ncurses ([6.5_p20250802](https://invisible-island.net/ncurses/NEWS.html#t20250802))
- base, dev: nftables ([1.1.4](https://www.netfilter.org/projects/nftables/files/changes-nftables-1.1.4.txt))
- base, dev: readline ([8.3_p1](https://lists.gnu.org/archive/html/bug-bash/2025-07/msg00005.html))
- base, dev: samba ([4.22.3](https://www.samba.org/samba/history/samba-4.22.3.html) (includes [4.21.0](https://www.samba.org/samba/history/samba-4.21.0.html), [4.22.0](https://www.samba.org/samba/history/samba-4.22.0.html), [4.22.1](https://www.samba.org/samba/history/samba-4.22.1.html), [4.22.2](https://www.samba.org/samba/history/samba-4.22.2.html)))
- base, dev: talloc ([2.4.3](https://gitlab.com/samba-team/samba/-/commit/77229f73c20af69ab0f3c96efbb229ff64a9dfe4))
- base, dev: tdb ([1.4.13](https://gitlab.com/samba-team/samba/-/commit/70a8c7a89a6d62d2ff172d79b5f4e6439300b88d))
- base, dev: tevent ([0.16.2](https://gitlab.com/samba-team/samba/-/commit/8d398acbbb7fdc0ff50fe6ba80433deaf92515c6))
- ca-certificates ([3.117](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html) (includes [3.116](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html)))
- dev, sysext-incus: squashfs-tools ([4.7.2](https://github.com/plougher/squashfs-tools/releases/tag/4.7.2) (includes [4.7.1](https://github.com/plougher/squashfs-tools/releases/tag/4.7.1)))
- dev: binutils ([2.45](https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00009.html))
- open-vm-tools ([13.0.5](https://github.com/vmware/open-vm-tools/releases/tag/stable-13.0.5))
- sysext-incus, sysext-podman, vmware: fuse ([3.17.4](https://github.com/libfuse/libfuse/releases/tag/fuse-3.17.4))
- sysext-nvidia-drivers-570, sysext-nvidia-drivers-570-open: nvidia-drivers (570.190)
- sysext-podman: gpgme ([2.0.0](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob_plain;f=NEWS;h=cd0e093bf83fe47b6773fb478fced07d8409fbe0;hb=e17ba578861905857da0a514b4fc9b88a57f7346))
- sysext-python: charset-normalizer ([3.4.3](https://github.com/jawah/charset_normalizer/releases/tag/3.4.3))
- sysext-python: jaraco-functools ([4.3.0](https://raw.githubusercontent.com/jaraco/jaraco.functools/refs/tags/v4.3.0/NEWS.rst))
- sysext-python: markdown-it-py ([4.0.0](https://github.com/executablebooks/markdown-it-py/releases/tag/v4.0.0))
- sysext-python: pip ([25.2](https://raw.githubusercontent.com/pypa/pip/refs/tags/25.2/NEWS.rst))
- sysext-python: requests ([2.32.5](https://github.com/psf/requests/releases/tag/v2.32.5))
#### Beta 4459.1.0 Release
_Changes since **Beta 4426.1.0**_
#### Security fixes:
- Linux ([CVE-2025-39927](https://nvd.nist.gov/vuln/detail/CVE-2025-39927), [CVE-2025-39926](https://nvd.nist.gov/vuln/detail/CVE-2025-39926), [CVE-2025-39923](https://nvd.nist.gov/vuln/detail/CVE-2025-39923), [CVE-2025-39913](https://nvd.nist.gov/vuln/detail/CVE-2025-39913), [CVE-2025-39912](https://nvd.nist.gov/vuln/detail/CVE-2025-39912), [CVE-2025-39911](https://nvd.nist.gov/vuln/detail/CVE-2025-39911), [CVE-2025-39909](https://nvd.nist.gov/vuln/detail/CVE-2025-39909), [CVE-2025-39907](https://nvd.nist.gov/vuln/detail/CVE-2025-39907), [CVE-2025-39917](https://nvd.nist.gov/vuln/detail/CVE-2025-39917), [CVE-2025-39916](https://nvd.nist.gov/vuln/detail/CVE-2025-39916), [CVE-2025-39914](https://nvd.nist.gov/vuln/detail/CVE-2025-39914), [CVE-2025-39885](https://nvd.nist.gov/vuln/detail/CVE-2025-39885), [CVE-2025-39886](https://nvd.nist.gov/vuln/detail/CVE-2025-39886), [CVE-2025-39876](https://nvd.nist.gov/vuln/detail/CVE-2025-39876), [CVE-2025-39873](https://nvd.nist.gov/vuln/detail/CVE-2025-39873), [CVE-2025-39871](https://nvd.nist.gov/vuln/detail/CVE-2025-39871), [CVE-2025-39870](https://nvd.nist.gov/vuln/detail/CVE-2025-39870), [CVE-2025-39869](https://nvd.nist.gov/vuln/detail/CVE-2025-39869), [CVE-2025-39884](https://nvd.nist.gov/vuln/detail/CVE-2025-39884), [CVE-2025-39883](https://nvd.nist.gov/vuln/detail/CVE-2025-39883), [CVE-2025-39882](https://nvd.nist.gov/vuln/detail/CVE-2025-39882), [CVE-2025-39881](https://nvd.nist.gov/vuln/detail/CVE-2025-39881), [CVE-2025-39880](https://nvd.nist.gov/vuln/detail/CVE-2025-39880), [CVE-2025-39877](https://nvd.nist.gov/vuln/detail/CVE-2025-39877), [CVE-2025-39963](https://nvd.nist.gov/vuln/detail/CVE-2025-39963), [CVE-2025-39961](https://nvd.nist.gov/vuln/detail/CVE-2025-39961), [CVE-2025-39957](https://nvd.nist.gov/vuln/detail/CVE-2025-39957), [CVE-2025-39956](https://nvd.nist.gov/vuln/detail/CVE-2025-39956), [CVE-2025-39955](https://nvd.nist.gov/vuln/detail/CVE-2025-39955), [CVE-2025-39938](https://nvd.nist.gov/vuln/detail/CVE-2025-39938), [CVE-2025-39937](https://nvd.nist.gov/vuln/detail/CVE-2025-39937), [CVE-2025-39934](https://nvd.nist.gov/vuln/detail/CVE-2025-39934), [CVE-2025-39953](https://nvd.nist.gov/vuln/detail/CVE-2025-39953), [CVE-2025-39952](https://nvd.nist.gov/vuln/detail/CVE-2025-39952), [CVE-2025-39951](https://nvd.nist.gov/vuln/detail/CVE-2025-39951), [CVE-2025-39950](https://nvd.nist.gov/vuln/detail/CVE-2025-39950), [CVE-2025-39932](https://nvd.nist.gov/vuln/detail/CVE-2025-39932), [CVE-2025-39949](https://nvd.nist.gov/vuln/detail/CVE-2025-39949), [CVE-2025-39948](https://nvd.nist.gov/vuln/detail/CVE-2025-39948), [CVE-2025-39947](https://nvd.nist.gov/vuln/detail/CVE-2025-39947), [CVE-2025-39946](https://nvd.nist.gov/vuln/detail/CVE-2025-39946), [CVE-2025-39945](https://nvd.nist.gov/vuln/detail/CVE-2025-39945), [CVE-2025-39944](https://nvd.nist.gov/vuln/detail/CVE-2025-39944), [CVE-2025-39943](https://nvd.nist.gov/vuln/detail/CVE-2025-39943), [CVE-2025-39942](https://nvd.nist.gov/vuln/detail/CVE-2025-39942), [CVE-2025-39940](https://nvd.nist.gov/vuln/detail/CVE-2025-39940), [CVE-2025-39929](https://nvd.nist.gov/vuln/detail/CVE-2025-39929), [CVE-2025-39931](https://nvd.nist.gov/vuln/detail/CVE-2025-39931), [CVE-2024-57878](https://nvd.nist.gov/vuln/detail/CVE-2024-57878), [CVE-2024-57877](https://nvd.nist.gov/vuln/detail/CVE-2024-57877), [CVE-2024-57875](https://nvd.nist.gov/vuln/detail/CVE-2024-57875), [CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23127](https://nvd.nist.gov/vuln/detail/CVE-2025-23127), [CVE-2025-23126](https://nvd.nist.gov/vuln/detail/CVE-2025-23126), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2025-23124](https://nvd.nist.gov/vuln/detail/CVE-2025-23124), [CVE-2024-57872](https://nvd.nist.gov/vuln/detail/CVE-2024-57872), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57839](https://nvd.nist.gov/vuln/detail/CVE-2024-57839), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47794](https://nvd.nist.gov/vuln/detail/CVE-2024-47794), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-49569](https://nvd.nist.gov/vuln/detail/CVE-2024-49569), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-48876](https://nvd.nist.gov/vuln/detail/CVE-2024-48876), [CVE-2024-41932](https://nvd.nist.gov/vuln/detail/CVE-2024-41932), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56784](https://nvd.nist.gov/vuln/detail/CVE-2024-56784), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56782](https://nvd.nist.gov/vuln/detail/CVE-2024-56782), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56639](https://nvd.nist.gov/vuln/detail/CVE-2024-56639), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56647](https://nvd.nist.gov/vuln/detail/CVE-2024-56647), [CVE-2024-56646](https://nvd.nist.gov/vuln/detail/CVE-2024-56646), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56632](https://nvd.nist.gov/vuln/detail/CVE-2024-56632), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56624](https://nvd.nist.gov/vuln/detail/CVE-2024-56624), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56621](https://nvd.nist.gov/vuln/detail/CVE-2024-56621), [CVE-2024-56620](https://nvd.nist.gov/vuln/detail/CVE-2024-56620), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56618](https://nvd.nist.gov/vuln/detail/CVE-2024-56618), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56591](https://nvd.nist.gov/vuln/detail/CVE-2024-56591), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56588](https://nvd.nist.gov/vuln/detail/CVE-2024-56588), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56612](https://nvd.nist.gov/vuln/detail/CVE-2024-56612), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56609](https://nvd.nist.gov/vuln/detail/CVE-2024-56609), [CVE-2024-56608](https://nvd.nist.gov/vuln/detail/CVE-2024-56608), [CVE-2024-56607](https://nvd.nist.gov/vuln/detail/CVE-2024-56607), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56599](https://nvd.nist.gov/vuln/detail/CVE-2024-56599), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584))
- glib ([CVE-2025-7039](https://www.cve.org/CVERecord?id=CVE-2025-7039))
- glibc ([CVE-2025-8058](https://www.cve.org/CVERecord?id=CVE-2025-8058))
- gnutls ([CVE-2025-32988](https://www.cve.org/CVERecord?id=CVE-2025-32988), [CVE-2025-32989](https://www.cve.org/CVERecord?id=CVE-2025-32989), [CVE-2025-32990](https://www.cve.org/CVERecord?id=CVE-2025-32990), [CVE-2025-6395](https://www.cve.org/CVERecord?id=CVE-2025-6395))
- go ([CVE-2025-47906](https://www.cve.org/CVERecord?id=CVE-2025-47906), [CVE-2025-47907](https://www.cve.org/CVERecord?id=CVE-2025-47907))
- iperf ([CVE-2025-54349](https://www.cve.org/CVERecord?id=CVE-2025-54349), [CVE-2025-54350](https://www.cve.org/CVERecord?id=CVE-2025-54350), [CVE-2025-54351](https://www.cve.org/CVERecord?id=CVE-2025-54351))
- nvidia-drivers ([CVE-2025-23277](https://www.cve.org/CVERecord?id=CVE-2025-23277), [CVE-2025-23278](https://www.cve.org/CVERecord?id=CVE-2025-23278), [CVE-2025-23279](https://www.cve.org/CVERecord?id=CVE-2025-23279), [CVE-2025-23286](https://www.cve.org/CVERecord?id=CVE-2025-23286))
- python ([CVE-2025-6069](https://www.cve.org/CVERecord?id=CVE-2025-6069), [CVE-2025-8194](https://www.cve.org/CVERecord?id=CVE-2025-8194))
- vim ([CVE-2025-53905](https://www.cve.org/CVERecord?id=CVE-2025-53905), [CVE-2025-53906](https://www.cve.org/CVERecord?id=CVE-2025-53906), [CVE-2025-9390](https://www.cve.org/CVERecord?id=CVE-2025-9390))
#### Bug fixes:
- Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance ([Flatcar#1901](https://github.com/flatcar/Flatcar/issues/1901))
#### Changes:
- Enable CONFIG_INET_DIAG_DESTROY in kernel options ([flatcar/scripts#3176](https://github.com/flatcar/scripts/pull/3176))
- Hyper-V images now use a systemd-sysext image for layering additional platform-specific software on top of `/usr`
- Scaleway: SSH keys are now fetched _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))
- Scaleway: The hostname is now set _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))
#### Updates:
- Ignition ([2.22.0](https://coreos.github.io/ignition/release-notes/#ignition-2220-2025-07-08))
- Linux ([6.12.51](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51) (includes [6.12.42](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.42), [6.12.43](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.43), [6.12.48](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48), [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49), [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50)))
- Linux Firmware ([20250808](https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20250808))
- SDK: gnu-efi ([4.0.2](https://github.com/ncroxon/gnu-efi/releases/tag/4.0.2))
- SDK: go ([1.24.6](https://go.dev/doc/devel/release#go1.24.minor))
- SDK: rust ([1.88.0](https://blog.rust-lang.org/2025/06/26/Rust-1.88.0/))
- SDK: sbsigntools ([0.9.5](https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/commit/?h=v0.9.5&id=9cfca9fe7aa7a8e29b92fe33ce8433e212c9a8ba))
- azure, dev, gce, sysext-python: gdbm ([1.26](https://lists.gnu.org/archive/html/info-gnu/2025-07/msg00012.html))
- azure, dev, gce, sysext-python: python (3.11.13_p1)
- base, dev: azure-vm-utils ([0.7.0](https://github.com/Azure/azure-vm-utils/releases/tag/v0.7.0))
- base, dev: btrfs-progs ([6.15](https://github.com/kdave/btrfs-progs/releases/tag/v6.15))
- base, dev: cryptsetup ([2.8.0](https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.8.0/docs/v2.8.0-ReleaseNotes))
- base, dev: curl ([8.15.0](https://curl.se/ch/8.15.0.html) (includes [8.14.0](https://curl.se/ch/8.14.0.html), [8.14.1](https://curl.se/ch/8.14.1.html)))
- base, dev: e2fsprogs ([1.47.3](https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.3))
- base, dev: ethtool ([6.15](https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/plain/NEWS?h=v6.15))
- base, dev: glib ([2.84.4](https://gitlab.gnome.org/GNOME/glib/-/releases/2.84.4))
- base, dev: gnutls ([3.8.10](https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html))
- base, dev: iproute2 ([6.16.0](https://www.spinics.net/lists/netdev/msg1112693.html))
- base, dev: kmod ([34.2](https://lwn.net/Articles/1011365/))
- base, dev: libgcrypt ([1.11.2](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob_plain;f=NEWS;h=3add9aad0cf6dc5a70ce6cb3983a46e585a630b3;hb=737cc63600146f196738a6768679eb016cf866e9))
- base, dev: libnvme ([1.15](https://github.com/linux-nvme/libnvme/releases/tag/v1.15))
- base, dev: libsodium ([1.0.20_p20250606](https://raw.githubusercontent.com/jedisct1/libsodium/7e024fbf096c84bef866b21f521c516591908bef/ChangeLog))
- base, dev: libusb ([1.0.29](https://raw.githubusercontent.com/libusb/libusb/refs/tags/v1.0.29/ChangeLog))
- base, dev: lsof ([4.99.5](https://github.com/lsof-org/lsof/releases/tag/4.99.5))
- base, dev: ncurses ([6.5_p20250531](https://invisible-island.net/ncurses/NEWS.html#t20250531))
- base, dev: nettle ([3.10.2](https://git.lysator.liu.se/nettle/nettle/-/raw/nettle_3.10.2_release_20250626/ChangeLog))
- base, dev: ntp ([4.2.8_p18](https://www.ntp.org/support/securitynotice/4_2_8p18-release-announcement/))
- base, dev: nvidia-drivers-service ([570.172.08](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-172-08/index.html) (includes [535.261.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-261-03/index.html), 570.172.08))
- base, dev: nvme-cli ([2.15](https://github.com/linux-nvme/nvme-cli/releases/tag/v2.15))
- base, dev: openssl ([3.4.2](https://github.com/openssl/openssl/releases/tag/openssl-3.4.2))
- base, dev: pciutils ([3.14.0](https://git.kernel.org/pub/scm/utils/pciutils/pciutils.git/plain/ChangeLog?h=v3.14.0))
- base, dev: pinentry ([1.3.2](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob_plain;f=NEWS;h=8bf192539fed9104a1ff431c6dcc3add7fb6771c;hb=d7660807593067d5cd7150b7d4d987d60957b5cb))
- base, dev: pkgconf ([2.5.1](https://raw.githubusercontent.com/pkgconf/pkgconf/refs/tags/pkgconf-2.5.1/NEWS) (includes [2.5.0](https://raw.githubusercontent.com/pkgconf/pkgconf/refs/tags/pkgconf-2.5.0/NEWS)))
- base, dev: rpcbind ([1.2.8](https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_8))
- base, dev: selinux ([2.20250213](https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20250213))
- base, dev: sqlite ([3.50.4](https://sqlite.org/releaselog/3_50_4.html) (includes [3.50.3](https://sqlite.org/releaselog/3_50_3.html)))
- base, dev: strace ([6.16](https://github.com/strace/strace/releases/tag/v6.16))
- base, dev: sudo ([1.9.17_p2](https://github.com/sudo-project/sudo/releases/tag/v1.9.17p2))
- base, dev: vim ([9.1.1652](https://github.com/vim/vim/commits/v9.1.1652/))
- ca-certificates ([3.117](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html) (includes [3.115](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_115.html), [3.116](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html)))
- dev: gnuconfig ([20250710](https://cgit.git.savannah.gnu.org/cgit/config.git/log/?id=a2287c3041a3f2a204eb942e09c015eab00dc7dd))
- dev: iperf ([3.19.1](https://github.com/esnet/iperf/releases/tag/3.19.1))
- sysext-incus, sysext-podman, vmware: fuse ([3.17.3](https://raw.githubusercontent.com/libfuse/libfuse/refs/tags/fuse-3.17.3/ChangeLog.rst))
- sysext-incus: cowsql ([1.15.9](https://github.com/cowsql/cowsql/commits/v1.15.9/))
- sysext-nvidia-drivers-535, sysext-nvidia-drivers-535-open: nvidia-drivers ([535.261.03](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-261-03/index.html))
- sysext-nvidia-drivers-570, sysext-nvidia-drivers-570-open: nvidia-drivers (570.181 (includes [570.172.08](https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-570-172-08/index.html)))
- sysext-python: distlib ([0.4.0](https://github.com/pypa/distlib/blob/0.4.0/CHANGES.rst#040))
- sysext-python: rich ([14.1.0](https://github.com/Textualize/rich/releases/tag/v14.1.0))
- sysext-python: trove-classifiers ([2025.8.26.11](https://github.com/pypa/trove-classifiers/releases/tag/2025.8.26.11) (includes [2025.8.6.13](https://github.com/pypa/trove-classifiers/releases/tag/2025.8.6.13)))
- sysext-python: truststore ([0.10.4](https://raw.githubusercontent.com/sethmlarson/truststore/refs/tags/v0.10.4/CHANGELOG.md))
_Changes since **Alpha 4459.0.0**_
#### Security fixes:
- Linux ([CVE-2025-39927](https://nvd.nist.gov/vuln/detail/CVE-2025-39927), [CVE-2025-39926](https://nvd.nist.gov/vuln/detail/CVE-2025-39926), [CVE-2025-39923](https://nvd.nist.gov/vuln/detail/CVE-2025-39923), [CVE-2025-39913](https://nvd.nist.gov/vuln/detail/CVE-2025-39913), [CVE-2025-39912](https://nvd.nist.gov/vuln/detail/CVE-2025-39912), [CVE-2025-39911](https://nvd.nist.gov/vuln/detail/CVE-2025-39911), [CVE-2025-39909](https://nvd.nist.gov/vuln/detail/CVE-2025-39909), [CVE-2025-39907](https://nvd.nist.gov/vuln/detail/CVE-2025-39907), [CVE-2025-39917](https://nvd.nist.gov/vuln/detail/CVE-2025-39917), [CVE-2025-39916](https://nvd.nist.gov/vuln/detail/CVE-2025-39916), [CVE-2025-39914](https://nvd.nist.gov/vuln/detail/CVE-2025-39914), [CVE-2025-39885](https://nvd.nist.gov/vuln/detail/CVE-2025-39885), [CVE-2025-39886](https://nvd.nist.gov/vuln/detail/CVE-2025-39886), [CVE-2025-39876](https://nvd.nist.gov/vuln/detail/CVE-2025-39876), [CVE-2025-39873](https://nvd.nist.gov/vuln/detail/CVE-2025-39873), [CVE-2025-39871](https://nvd.nist.gov/vuln/detail/CVE-2025-39871), [CVE-2025-39870](https://nvd.nist.gov/vuln/detail/CVE-2025-39870), [CVE-2025-39869](https://nvd.nist.gov/vuln/detail/CVE-2025-39869), [CVE-2025-39884](https://nvd.nist.gov/vuln/detail/CVE-2025-39884), [CVE-2025-39883](https://nvd.nist.gov/vuln/detail/CVE-2025-39883), [CVE-2025-39882](https://nvd.nist.gov/vuln/detail/CVE-2025-39882), [CVE-2025-39881](https://nvd.nist.gov/vuln/detail/CVE-2025-39881), [CVE-2025-39880](https://nvd.nist.gov/vuln/detail/CVE-2025-39880), [CVE-2025-39877](https://nvd.nist.gov/vuln/detail/CVE-2025-39877), [CVE-2025-39963](https://nvd.nist.gov/vuln/detail/CVE-2025-39963), [CVE-2025-39961](https://nvd.nist.gov/vuln/detail/CVE-2025-39961), [CVE-2025-39957](https://nvd.nist.gov/vuln/detail/CVE-2025-39957), [CVE-2025-39956](https://nvd.nist.gov/vuln/detail/CVE-2025-39956), [CVE-2025-39955](https://nvd.nist.gov/vuln/detail/CVE-2025-39955), [CVE-2025-39938](https://nvd.nist.gov/vuln/detail/CVE-2025-39938), [CVE-2025-39937](https://nvd.nist.gov/vuln/detail/CVE-2025-39937), [CVE-2025-39934](https://nvd.nist.gov/vuln/detail/CVE-2025-39934), [CVE-2025-39953](https://nvd.nist.gov/vuln/detail/CVE-2025-39953), [CVE-2025-39952](https://nvd.nist.gov/vuln/detail/CVE-2025-39952), [CVE-2025-39951](https://nvd.nist.gov/vuln/detail/CVE-2025-39951), [CVE-2025-39950](https://nvd.nist.gov/vuln/detail/CVE-2025-39950), [CVE-2025-39932](https://nvd.nist.gov/vuln/detail/CVE-2025-39932), [CVE-2025-39949](https://nvd.nist.gov/vuln/detail/CVE-2025-39949), [CVE-2025-39948](https://nvd.nist.gov/vuln/detail/CVE-2025-39948), [CVE-2025-39947](https://nvd.nist.gov/vuln/detail/CVE-2025-39947), [CVE-2025-39946](https://nvd.nist.gov/vuln/detail/CVE-2025-39946), [CVE-2025-39945](https://nvd.nist.gov/vuln/detail/CVE-2025-39945), [CVE-2025-39944](https://nvd.nist.gov/vuln/detail/CVE-2025-39944), [CVE-2025-39943](https://nvd.nist.gov/vuln/detail/CVE-2025-39943), [CVE-2025-39942](https://nvd.nist.gov/vuln/detail/CVE-2025-39942), [CVE-2025-39940](https://nvd.nist.gov/vuln/detail/CVE-2025-39940), [CVE-2025-39929](https://nvd.nist.gov/vuln/detail/CVE-2025-39929), [CVE-2025-39931](https://nvd.nist.gov/vuln/detail/CVE-2025-39931), [CVE-2024-57878](https://nvd.nist.gov/vuln/detail/CVE-2024-57878), [CVE-2024-57877](https://nvd.nist.gov/vuln/detail/CVE-2024-57877), [CVE-2024-57875](https://nvd.nist.gov/vuln/detail/CVE-2024-57875), [CVE-2024-57876](https://nvd.nist.gov/vuln/detail/CVE-2024-57876), [CVE-2024-57874](https://nvd.nist.gov/vuln/detail/CVE-2024-57874), [CVE-2025-23128](https://nvd.nist.gov/vuln/detail/CVE-2025-23128), [CVE-2025-23127](https://nvd.nist.gov/vuln/detail/CVE-2025-23127), [CVE-2025-23126](https://nvd.nist.gov/vuln/detail/CVE-2025-23126), [CVE-2025-23125](https://nvd.nist.gov/vuln/detail/CVE-2025-23125), [CVE-2025-23124](https://nvd.nist.gov/vuln/detail/CVE-2025-23124), [CVE-2024-57872](https://nvd.nist.gov/vuln/detail/CVE-2024-57872), [CVE-2024-57850](https://nvd.nist.gov/vuln/detail/CVE-2024-57850), [CVE-2024-57849](https://nvd.nist.gov/vuln/detail/CVE-2024-57849), [CVE-2024-57839](https://nvd.nist.gov/vuln/detail/CVE-2024-57839), [CVE-2024-57843](https://nvd.nist.gov/vuln/detail/CVE-2024-57843), [CVE-2024-48875](https://nvd.nist.gov/vuln/detail/CVE-2024-48875), [CVE-2024-48873](https://nvd.nist.gov/vuln/detail/CVE-2024-48873), [CVE-2024-47809](https://nvd.nist.gov/vuln/detail/CVE-2024-47809), [CVE-2024-47794](https://nvd.nist.gov/vuln/detail/CVE-2024-47794), [CVE-2024-47143](https://nvd.nist.gov/vuln/detail/CVE-2024-47143), [CVE-2024-47141](https://nvd.nist.gov/vuln/detail/CVE-2024-47141), [CVE-2024-45828](https://nvd.nist.gov/vuln/detail/CVE-2024-45828), [CVE-2024-43098](https://nvd.nist.gov/vuln/detail/CVE-2024-43098), [CVE-2024-53680](https://nvd.nist.gov/vuln/detail/CVE-2024-53680), [CVE-2024-52332](https://nvd.nist.gov/vuln/detail/CVE-2024-52332), [CVE-2024-50051](https://nvd.nist.gov/vuln/detail/CVE-2024-50051), [CVE-2024-49569](https://nvd.nist.gov/vuln/detail/CVE-2024-49569), [CVE-2024-48881](https://nvd.nist.gov/vuln/detail/CVE-2024-48881), [CVE-2024-48876](https://nvd.nist.gov/vuln/detail/CVE-2024-48876), [CVE-2024-41932](https://nvd.nist.gov/vuln/detail/CVE-2024-41932), [CVE-2024-41935](https://nvd.nist.gov/vuln/detail/CVE-2024-41935), [CVE-2024-56787](https://nvd.nist.gov/vuln/detail/CVE-2024-56787), [CVE-2024-56786](https://nvd.nist.gov/vuln/detail/CVE-2024-56786), [CVE-2024-56785](https://nvd.nist.gov/vuln/detail/CVE-2024-56785), [CVE-2024-56784](https://nvd.nist.gov/vuln/detail/CVE-2024-56784), [CVE-2024-56783](https://nvd.nist.gov/vuln/detail/CVE-2024-56783), [CVE-2024-56781](https://nvd.nist.gov/vuln/detail/CVE-2024-56781), [CVE-2024-56782](https://nvd.nist.gov/vuln/detail/CVE-2024-56782), [CVE-2024-56640](https://nvd.nist.gov/vuln/detail/CVE-2024-56640), [CVE-2024-56639](https://nvd.nist.gov/vuln/detail/CVE-2024-56639), [CVE-2024-56638](https://nvd.nist.gov/vuln/detail/CVE-2024-56638), [CVE-2024-56637](https://nvd.nist.gov/vuln/detail/CVE-2024-56637), [CVE-2024-56636](https://nvd.nist.gov/vuln/detail/CVE-2024-56636), [CVE-2024-56635](https://nvd.nist.gov/vuln/detail/CVE-2024-56635), [CVE-2024-56634](https://nvd.nist.gov/vuln/detail/CVE-2024-56634), [CVE-2024-56651](https://nvd.nist.gov/vuln/detail/CVE-2024-56651), [CVE-2024-56633](https://nvd.nist.gov/vuln/detail/CVE-2024-56633), [CVE-2024-56650](https://nvd.nist.gov/vuln/detail/CVE-2024-56650), [CVE-2024-56649](https://nvd.nist.gov/vuln/detail/CVE-2024-56649), [CVE-2024-56648](https://nvd.nist.gov/vuln/detail/CVE-2024-56648), [CVE-2024-56647](https://nvd.nist.gov/vuln/detail/CVE-2024-56647), [CVE-2024-56646](https://nvd.nist.gov/vuln/detail/CVE-2024-56646), [CVE-2024-56645](https://nvd.nist.gov/vuln/detail/CVE-2024-56645), [CVE-2024-56644](https://nvd.nist.gov/vuln/detail/CVE-2024-56644), [CVE-2024-56643](https://nvd.nist.gov/vuln/detail/CVE-2024-56643), [CVE-2024-56642](https://nvd.nist.gov/vuln/detail/CVE-2024-56642), [CVE-2024-56641](https://nvd.nist.gov/vuln/detail/CVE-2024-56641), [CVE-2024-56631](https://nvd.nist.gov/vuln/detail/CVE-2024-56631), [CVE-2024-56632](https://nvd.nist.gov/vuln/detail/CVE-2024-56632), [CVE-2024-56615](https://nvd.nist.gov/vuln/detail/CVE-2024-56615), [CVE-2024-56624](https://nvd.nist.gov/vuln/detail/CVE-2024-56624), [CVE-2024-56623](https://nvd.nist.gov/vuln/detail/CVE-2024-56623), [CVE-2024-56622](https://nvd.nist.gov/vuln/detail/CVE-2024-56622), [CVE-2024-56621](https://nvd.nist.gov/vuln/detail/CVE-2024-56621), [CVE-2024-56620](https://nvd.nist.gov/vuln/detail/CVE-2024-56620), [CVE-2024-56619](https://nvd.nist.gov/vuln/detail/CVE-2024-56619), [CVE-2024-56618](https://nvd.nist.gov/vuln/detail/CVE-2024-56618), [CVE-2024-56617](https://nvd.nist.gov/vuln/detail/CVE-2024-56617), [CVE-2024-56630](https://nvd.nist.gov/vuln/detail/CVE-2024-56630), [CVE-2024-56629](https://nvd.nist.gov/vuln/detail/CVE-2024-56629), [CVE-2024-56628](https://nvd.nist.gov/vuln/detail/CVE-2024-56628), [CVE-2024-56627](https://nvd.nist.gov/vuln/detail/CVE-2024-56627), [CVE-2024-56626](https://nvd.nist.gov/vuln/detail/CVE-2024-56626), [CVE-2024-56625](https://nvd.nist.gov/vuln/detail/CVE-2024-56625), [CVE-2024-56616](https://nvd.nist.gov/vuln/detail/CVE-2024-56616), [CVE-2024-56592](https://nvd.nist.gov/vuln/detail/CVE-2024-56592), [CVE-2024-56591](https://nvd.nist.gov/vuln/detail/CVE-2024-56591), [CVE-2024-56590](https://nvd.nist.gov/vuln/detail/CVE-2024-56590), [CVE-2024-56589](https://nvd.nist.gov/vuln/detail/CVE-2024-56589), [CVE-2024-56588](https://nvd.nist.gov/vuln/detail/CVE-2024-56588), [CVE-2024-56587](https://nvd.nist.gov/vuln/detail/CVE-2024-56587), [CVE-2024-56614](https://nvd.nist.gov/vuln/detail/CVE-2024-56614), [CVE-2024-56613](https://nvd.nist.gov/vuln/detail/CVE-2024-56613), [CVE-2024-56586](https://nvd.nist.gov/vuln/detail/CVE-2024-56586), [CVE-2024-56612](https://nvd.nist.gov/vuln/detail/CVE-2024-56612), [CVE-2024-56611](https://nvd.nist.gov/vuln/detail/CVE-2024-56611), [CVE-2024-56610](https://nvd.nist.gov/vuln/detail/CVE-2024-56610), [CVE-2024-56609](https://nvd.nist.gov/vuln/detail/CVE-2024-56609), [CVE-2024-56608](https://nvd.nist.gov/vuln/detail/CVE-2024-56608), [CVE-2024-56607](https://nvd.nist.gov/vuln/detail/CVE-2024-56607), [CVE-2024-56606](https://nvd.nist.gov/vuln/detail/CVE-2024-56606), [CVE-2024-56605](https://nvd.nist.gov/vuln/detail/CVE-2024-56605), [CVE-2024-56604](https://nvd.nist.gov/vuln/detail/CVE-2024-56604), [CVE-2024-56603](https://nvd.nist.gov/vuln/detail/CVE-2024-56603), [CVE-2024-56585](https://nvd.nist.gov/vuln/detail/CVE-2024-56585), [CVE-2024-56602](https://nvd.nist.gov/vuln/detail/CVE-2024-56602), [CVE-2024-56601](https://nvd.nist.gov/vuln/detail/CVE-2024-56601), [CVE-2024-56600](https://nvd.nist.gov/vuln/detail/CVE-2024-56600), [CVE-2024-56599](https://nvd.nist.gov/vuln/detail/CVE-2024-56599), [CVE-2024-56598](https://nvd.nist.gov/vuln/detail/CVE-2024-56598), [CVE-2024-56597](https://nvd.nist.gov/vuln/detail/CVE-2024-56597), [CVE-2024-56596](https://nvd.nist.gov/vuln/detail/CVE-2024-56596), [CVE-2024-56595](https://nvd.nist.gov/vuln/detail/CVE-2024-56595), [CVE-2024-56594](https://nvd.nist.gov/vuln/detail/CVE-2024-56594), [CVE-2024-56593](https://nvd.nist.gov/vuln/detail/CVE-2024-56593), [CVE-2024-56583](https://nvd.nist.gov/vuln/detail/CVE-2024-56583), [CVE-2024-56584](https://nvd.nist.gov/vuln/detail/CVE-2024-56584))
#### Bug fixes:
- Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance ([Flatcar#1901](https://github.com/flatcar/Flatcar/issues/1901))
#### Changes:
- Scaleway: SSH keys are now fetched _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))
- Scaleway: The hostname is now set _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))
#### Updates:
- Linux ([6.12.51](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.51) (includes [6.12.48](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.48), [6.12.49](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.49), [6.12.50](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.12.50)))
- ca-certificates ([3.117](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html) (includes [3.116](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html)))
#### Stable 4230.2.4 Release
_Changes since **Stable 4230.2.3**_
#### Security fixes:
- Linux ([CVE-2025-39923](https://nvd.nist.gov/vuln/detail/CVE-2025-39923), [CVE-2025-39913](https://nvd.nist.gov/vuln/detail/CVE-2025-39913), [CVE-2025-39911](https://nvd.nist.gov/vuln/detail/CVE-2025-39911), [CVE-2025-39909](https://nvd.nist.gov/vuln/detail/CVE-2025-39909), [CVE-2025-39907](https://nvd.nist.gov/vuln/detail/CVE-2025-39907), [CVE-2025-39916](https://nvd.nist.gov/vuln/detail/CVE-2025-39916), [CVE-2025-39914](https://nvd.nist.gov/vuln/detail/CVE-2025-39914), [CVE-2025-39885](https://nvd.nist.gov/vuln/detail/CVE-2025-39885), [CVE-2025-39886](https://nvd.nist.gov/vuln/detail/CVE-2025-39886), [CVE-2025-39876](https://nvd.nist.gov/vuln/detail/CVE-2025-39876), [CVE-2025-39873](https://nvd.nist.gov/vuln/detail/CVE-2025-39873), [CVE-2025-39871](https://nvd.nist.gov/vuln/detail/CVE-2025-39871), [CVE-2025-39870](https://nvd.nist.gov/vuln/detail/CVE-2025-39870), [CVE-2025-39869](https://nvd.nist.gov/vuln/detail/CVE-2025-39869), [CVE-2025-39883](https://nvd.nist.gov/vuln/detail/CVE-2025-39883), [CVE-2025-39882](https://nvd.nist.gov/vuln/detail/CVE-2025-39882), [CVE-2025-39881](https://nvd.nist.gov/vuln/detail/CVE-2025-39881), [CVE-2025-39880](https://nvd.nist.gov/vuln/detail/CVE-2025-39880), [CVE-2025-39877](https://nvd.nist.gov/vuln/detail/CVE-2025-39877), [CVE-2025-39961](https://nvd.nist.gov/vuln/detail/CVE-2025-39961), [CVE-2025-39957](https://nvd.nist.gov/vuln/detail/CVE-2025-39957), [CVE-2025-39955](https://nvd.nist.gov/vuln/detail/CVE-2025-39955), [CVE-2025-39938](https://nvd.nist.gov/vuln/detail/CVE-2025-39938), [CVE-2025-39937](https://nvd.nist.gov/vuln/detail/CVE-2025-39937), [CVE-2025-39934](https://nvd.nist.gov/vuln/detail/CVE-2025-39934), [CVE-2025-39953](https://nvd.nist.gov/vuln/detail/CVE-2025-39953), [CVE-2025-39952](https://nvd.nist.gov/vuln/detail/CVE-2025-39952), [CVE-2025-39951](https://nvd.nist.gov/vuln/detail/CVE-2025-39951), [CVE-2025-39949](https://nvd.nist.gov/vuln/detail/CVE-2025-39949), [CVE-2025-39947](https://nvd.nist.gov/vuln/detail/CVE-2025-39947), [CVE-2025-39946](https://nvd.nist.gov/vuln/detail/CVE-2025-39946), [CVE-2025-39945](https://nvd.nist.gov/vuln/detail/CVE-2025-39945), [CVE-2025-39944](https://nvd.nist.gov/vuln/detail/CVE-2025-39944), [CVE-2025-39943](https://nvd.nist.gov/vuln/detail/CVE-2025-39943), [CVE-2025-39942](https://nvd.nist.gov/vuln/detail/CVE-2025-39942), [CVE-2025-39929](https://nvd.nist.gov/vuln/detail/CVE-2025-39929), [CVE-2025-39931](https://nvd.nist.gov/vuln/detail/CVE-2025-39931), [CVE-2023-52435](https://nvd.nist.gov/vuln/detail/CVE-2023-52435))
#### Bug fixes:
- Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance ([Flatcar#1901](https://github.com/flatcar/Flatcar/issues/1901))
#### Changes:
- Scaleway: SSH keys are now fetched _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))
- Scaleway: The hostname is now set _via_ Afterburn ([scripts#3277](https://github.com/flatcar/scripts/pull/3277))
#### Updates:
- Linux ([6.6.110](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.110) (includes [6.6.107](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.107), [6.6.108](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.108), [6.6.109](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.6.109)))
- ca-certificates ([3.117](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html) (includes [3.116](https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html)))
- open-iscsi ([2.1.11](https://raw.githubusercontent.com/open-iscsi/open-iscsi/refs/tags/2.1.11/Changelog))
Best,
The Flatcar Container Linux Maintainers
---
### Communication
#### Go/No-Go message for Matrix/Slack
Go/No-Go Meeting for Alpha 4487.0.0, Beta 4459.1.0, Stable 4230.2.4
Pre-view images are available in https://bincache.flatcar-linux.net/images/amd64/$VERSION/
Tracking issue: https://github.com/flatcar/Flatcar/issues/1918
The Go/No-Go document is in our HackMD @flatcar namespace
Link: https://hackmd.io/rhvFhYOJSyuXYz74t1c9-Q
Please give your Go/No-Go vote with 💚 for Go, ❌ for No-Go, and ✋ for Wait.
Contributors & community feel free to put your suggestions, thoughts or comments on the document or here in the chat.
@MAINTAINER @MAINTAINER @MAINTAINER
#### Mastodon
_The toot (from [@flatcar](https://hachyderm.io/@flatcar)) goes out after the changelog update has been published; it includes a link to the web changelog._
🚀 Fresh Flatcar Linux releases are here!
Alpha 4487.0.0 • Beta 4459.1.0 • Stable 4230.2.4
New kernels, major CVE fixes, faster boots, and smarter partitions across all channels.
Let’s see what’s inside 👇
#Flatcar #opensource #linux
~
🔧 Alpha (4487.0.0):
• Linux 6.12.51 / Ignition 2.22.0 / Afterburn 5.10.0
• Initrd split -> ~50% smaller /boot
• HVF accel on arm64 Macs
~
🧱 Beta and Stable catch up with:
• Linux 6.12.51 (Beta) / 6.6.110 (Stable)
• Updated ca-certs 3.117 & Ignition 2.22.0
• Security and performance improvements throughout ⚡
~
Thanks to our contributors and testers 💙
Explore the full changelog & download builds → 🔗 https://www.flatcar.org/releases/
#Flatcar #opensource #linux #cloudnative
#### Kubernetes Slack
_This goes in the #flatcar channel_
Please welcome the Flatcar Linux releases for October! 🎉
- **Alpha 4487.0.0** (major release)
- **Beta 4459.1.0** (major release)
- **Stable 4230.2.4** (maintenance release)
These releases include:
🚀 New features & improvements:
• Future-proofed partitions and an initrd split → ~50% smaller /boot
• Faster QEMU on Apple Silicon (HVF acceleration)
• Scaleway now managed via Afterburn for SSH keys & hostnames
🩹 Fixes & updates:
• Major Linux CVE patches across all channels
• Improved stability and security hardening
• Ignition 2.22.0 / Afterburn 5.10.0 updates
📦 Package & component refresh:
• Linux 6.12.51 (Alpha/Beta) / 6.6.110 (Stable)
• Updated ca-certs 3.117
• Toolchain and SDK upgrades
📜 Release notes in the usual spot:
🔗 https://www.flatcar.org/releases/
💙 Thanks to everyone contributing, testing, and reporting issues to keep Flatcar rolling strong!