Releases: flatcar/scripts
Releases · flatcar/scripts
lts-4081.3.4
Changes since LTS 4081.3.3
Security fixes:
- Linux (CVE-2025-37989, CVE-2025-37988, CVE-2025-37985, CVE-2025-37983, CVE-2025-37938, CVE-2025-37885, CVE-2025-37884, CVE-2025-37883, CVE-2025-37881, CVE-2025-37879, CVE-2025-37878, CVE-2025-37887, CVE-2025-37886, CVE-2025-37836, CVE-2025-37823, CVE-2025-37831, CVE-2025-37830, CVE-2025-37829, CVE-2025-37828, CVE-2025-37824, CVE-2025-37808, CVE-2025-37805, CVE-2025-37804, CVE-2025-37803, CVE-2025-37820, CVE-2025-37819, CVE-2025-37818, CVE-2025-37817, CVE-2025-37815, CVE-2025-37813, CVE-2025-37812, CVE-2025-37811, CVE-2025-37810, CVE-2025-37800, CVE-2025-37801, CVE-2025-37799, CVE-2025-37797, CVE-2025-38177, CVE-2025-37990, CVE-2025-37991, CVE-2025-37917, CVE-2025-37927, CVE-2025-37924, CVE-2025-37923, CVE-2025-37922, CVE-2025-37921, CVE-2025-37936, CVE-2025-37935, CVE-2025-37933, CVE-2025-37932, CVE-2025-37930, CVE-2025-37929, CVE-2025-37928, CVE-2025-37918, CVE-2025-37903, CVE-2025-37901, CVE-2025-37897, CVE-2025-37916, CVE-2025-37915, CVE-2025-37914, CVE-2025-37913, CVE-2025-37912, CVE-2025-37911, CVE-2025-37909, CVE-2025-37905, CVE-2025-37891, CVE-2025-37890, CVE-2025-37998, CVE-2025-37997, CVE-2025-37995, CVE-2025-37994, CVE-2025-37973, CVE-2025-37972, CVE-2025-37970, CVE-2025-37969, CVE-2025-37964, CVE-2025-37963, CVE-2025-37962, CVE-2025-37961, CVE-2025-37959, CVE-2025-37954, CVE-2025-37953, CVE-2025-37952, CVE-2025-37951, CVE-2025-37949, CVE-2025-37948, CVE-2025-37956, CVE-2025-37947, CVE-2025-38094, CVE-2025-38095, CVE-2025-38015, CVE-2025-38014, CVE-2025-38013, CVE-2025-38010, CVE-2025-38009, CVE-2025-38027, CVE-2025-38008, CVE-2025-38024, CVE-2025-38023, CVE-2025-38020, CVE-2025-38019, CVE-2025-38018, CVE-2025-38007, CVE-2025-38006, CVE-2025-38005, CVE-2025-37992, CVE-2025-38097, CVE-2025-38092, CVE-2025-38052, CVE-2025-38061, CVE-2025-38059, CVE-2025-38058, CVE-2025-38081, CVE-2025-38080, CVE-2025-38079, CVE-2025-38078, CVE-2025-38077, CVE-2025-38075, CVE-2025-38074, CVE-2025-38072, CVE-2025-38071, CVE-2025-38068, CVE-2025-38066, CVE-2025-38065, CVE-2025-38063, CVE-2025-38062, CVE-2025-38037, CVE-2025-38035, CVE-2025-38034, CVE-2025-38051, CVE-2025-38031, CVE-2025-38048, CVE-2025-38046, CVE-2025-38045, CVE-2025-38044, CVE-2025-38043, CVE-2025-38040, CVE-2025-38039, CVE-2025-38030, CVE-2025-38003, CVE-2025-38004, CVE-2025-38001, CVE-2025-38000, CVE-2025-38174, CVE-2025-38163, CVE-2025-38170, CVE-2025-38167, CVE-2025-38166, [CVE-20...
beta-4344.1.1
Changes since Beta 4344.1.0
Security fixes:
- Linux (CVE-2025-38210, CVE-2025-38219, CVE-2025-38218, CVE-2025-38217, CVE-2025-38216, CVE-2025-38215, CVE-2025-38214, CVE-2025-38213, CVE-2025-38232, CVE-2025-38231, CVE-2025-38212, CVE-2025-38229, CVE-2025-38228, CVE-2025-38227, CVE-2025-38226, CVE-2025-38225, CVE-2025-38224, CVE-2025-38223, CVE-2025-38222, CVE-2025-38220, CVE-2025-38211, CVE-2025-38186, CVE-2025-38185, CVE-2025-38184, CVE-2025-38183, CVE-2025-38182, CVE-2025-38208, CVE-2025-38181, CVE-2025-38202, CVE-2025-38201, CVE-2025-38200, CVE-2025-38198, CVE-2025-38180, CVE-2025-38197, CVE-2025-38195, CVE-2025-38194, CVE-2025-38193, CVE-2025-38192, CVE-2025-38191, CVE-2025-38190, CVE-2025-38189, CVE-2025-38188, CVE-2025-38179, CVE-2025-38090, CVE-2025-38089, CVE-2025-38087, CVE-2025-38086, CVE-2025-38084, CVE-2025-38085)
- sudo (CVE-2025-32462, CVE-2025-32463)
Changes:
- Added STACKIT images (flatcar/scripts#3018)
- ftrace syscalls also available in ARM64 builds. (Enables syscall tracepoints) (flatcar/scripts#2600)
Updates:
alpha-4372.0.1
Changes since Alpha 4372.0.0
Security fixes:
- Linux (CVE-2025-38210, CVE-2025-38219, CVE-2025-38218, CVE-2025-38217, CVE-2025-38216, CVE-2025-38215, CVE-2025-38214, CVE-2025-38213, CVE-2025-38232, CVE-2025-38231, CVE-2025-38212, CVE-2025-38229, CVE-2025-38228, CVE-2025-38227, CVE-2025-38226, CVE-2025-38225, CVE-2025-38224, CVE-2025-38223, CVE-2025-38222, CVE-2025-38220, CVE-2025-38211, CVE-2025-38186, CVE-2025-38185, CVE-2025-38184, CVE-2025-38183, CVE-2025-38182, CVE-2025-38208, CVE-2025-38181, CVE-2025-38202, CVE-2025-38201, CVE-2025-38200, CVE-2025-38198, CVE-2025-38180, CVE-2025-38197, CVE-2025-38195, CVE-2025-38194, CVE-2025-38193, CVE-2025-38192, CVE-2025-38191, CVE-2025-38190, CVE-2025-38189, CVE-2025-38188, CVE-2025-38179, CVE-2025-38090, CVE-2025-38089, CVE-2025-38087, CVE-2025-38086, CVE-2025-38084, CVE-2025-38085)
- sudo (CVE-2025-32462, CVE-2025-32463)
Changes:
- Added STACKIT images (flatcar/scripts#3018)
- ftrace syscalls also available in ARM64 builds. (Enables syscall tracepoints) (flatcar/scripts#2600)
Updates:
stable-4230.2.0
Changes since Stable 4152.2.3
Security fixes:
- Linux (CVE-2025-37989, CVE-2025-37988, CVE-2025-37985, CVE-2025-37983, CVE-2025-37938, CVE-2025-37885, CVE-2025-37884, CVE-2025-37883, CVE-2025-37881, CVE-2025-37879, CVE-2025-37878, CVE-2025-37887, CVE-2025-37886, CVE-2025-37836, CVE-2025-37823, CVE-2025-37831, CVE-2025-37830, CVE-2025-37829, CVE-2025-37828, CVE-2025-37824, CVE-2025-37808, CVE-2025-37805, CVE-2025-37804, CVE-2025-37803, CVE-2025-37820, CVE-2025-37819, CVE-2025-37818, CVE-2025-37817, CVE-2025-37815, CVE-2025-37813, CVE-2025-37812, CVE-2025-37811, CVE-2025-37810, CVE-2025-37800, CVE-2025-37801, CVE-2025-37799, CVE-2025-37797, CVE-2025-37990, CVE-2025-37991, CVE-2025-37917, CVE-2025-37927, CVE-2025-37924, CVE-2025-37923, CVE-2025-37922, CVE-2025-37921, CVE-2025-37936, CVE-2025-37935, CVE-2025-37933, CVE-2025-37932, CVE-2025-37930, CVE-2025-37929, CVE-2025-37928, CVE-2025-37918, CVE-2025-37903, CVE-2025-37901, CVE-2025-37897, CVE-2025-37916, CVE-2025-37915, CVE-2025-37914, CVE-2025-37913, CVE-2025-37912, CVE-2025-37911, CVE-2025-37909, CVE-2025-37905, CVE-2025-37891, CVE-2025-37890, CVE-2025-37998, CVE-2025-37997, CVE-2025-37995, CVE-2025-37994, CVE-2025-37973, CVE-2025-37972, CVE-2025-37970, CVE-2025-37969, CVE-2025-37964, CVE-2025-37963, CVE-2025-37962, CVE-2025-37961, CVE-2025-37959, CVE-2025-37954, CVE-2025-37953, CVE-2025-37952, CVE-2025-37951, CVE-2025-37949, CVE-2025-37948, CVE-2025-37956, CVE-2025-37947, CVE-2025-38015, CVE-2025-38014, CVE-2025-38013, CVE-2025-38010, CVE-2025-38009, CVE-2025-38027, CVE-2025-38008, CVE-2025-38024, CVE-2025-38023, CVE-2025-38020, CVE-2025-38019, CVE-2025-38018, CVE-2025-38007, CVE-2025-38006, CVE-2025-38005, CVE-2025-37992, CVE-2025-38052, CVE-2025-38061, CVE-2025-38059, CVE-2025-38058, CVE-2025-38081, CVE-2025-38080, CVE-2025-38079, CVE-2025-38078, CVE-2025-38077, CVE-2025-38075, CVE-2025-38074, CVE-2025-38072, CVE-2025-38071, CVE-2025-38068, CVE-2025-38066, CVE-2025-38065, CVE-2025-38063, CVE-2025-38062, CVE-2025-38037, CVE-2025-38035, CVE-2025-38034, CVE-2025-38051, CVE-2025-38031, CVE-2025-38048, CVE-2025-38046, CVE-2025-38045, CVE-2025-38044, CVE-2025-38043, CVE-2025-38040, CVE-2025-38039, CVE-2025-38030, CVE-2025-38003, CVE-2025-38004, CVE-2025-38001, CVE-2025-38000, CVE-2025-38083)
- containers-storage, podman (CVE-2024-9676)
- curl (CVE-2024-11053, CVE-2024-9681)
- expat (CVE-2024-50602)
- sssd (CVE-2023-3758)
- wget (CVE-2024-10524)
Bug fixes:
- Fixed PXE boot failures that arose since upgrading to systemd v256. Users were dumped to an emergency shell. (...
beta-4344.1.0
Changes since Beta 4230.1.1
Security fixes:
- VMWare: open-vm-tools (CVE-2025-22247)
- afterburn (CVE-2025-3416, CVE-2025-0977)
- binutils (CVE-2024-53589, CVE-2025-1176, CVE-2025-1178, CVE-2025-1179, CVE-2025-1180, CVE-2025-1181, CVE-2025-1182)
- c-ares (CVE-2025-31498)
- cifs-utils (CVE-2025-2312)
- containerd (CVE-2024-40635)
- crun (CVE-2025-24965)
- curl (CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, curl-20250205)
- expat (CVE-2024-8176)
- git (CVE-2024-50349, CVE-2024-52005, CVE-2024-52006)
- glib (CVE-2024-52533)
- glibc (CVE-2025-0395)
- gnutls (CVE-2024-12243)
- go (CVE-2025-22871)
- intel-microcode (CVE-2023-34440, CVE-2023-43758, CVE-2024-24582, CVE-2024-28047, CVE-2024-28127, CVE-2024-29214, CVE-2024-31157, CVE-2024-39279, CVE-2024-31068, CVE-2024-36293, CVE-2024-37020, CVE-2024-39355)
- iperf (CVE-2024-53580)
- libarchive (CVE-2024-57970, CVE-2025-25724)
- libcap (CVE-2025-1390)
- libtasn1 (CVE-2024-12133)
- libxml2 (CVE-2024-56171, CVE-2025-24928, CVE-2025-27113)
- libxslt (CVE-2025-24855, CVE-2024-55549)
- mit-krb5 (CVE-2025-24528)
- openssh (CVE-2025-26465, CVE-2025-26466)
- openssl (CVE-2024-13176, CVE-2024-12797)
- perl (CVE-2024-56406)
- podman (CVE-2024-11218)
- python (CVE-2025-0938)
- rsync (CVE-2024-12084, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747)
- socat (CVE-2024-54661, socat-20250221)
- vim (CVE-2024-41957, CVE-2024-41965, CVE-2024-43374, CVE-2024-43790, CVE-2024-43802, CVE-2024-45306, CVE-2024-47814)
- xz-utils (CVE-2025-31115)
Bug fixes:
- Added back some BCC tools (scripts#2900)
- Fix non-conforming GPT partition table (flatcar/Flatcar#1651)
- Fixed path handling in the QEMU .sh launcher scripts. Given paths now are relative to the current directory and absolute paths work as you would expect.
- Fixed race condition in the script that grows the root partition to fill the disk. This bug sometimes caused the operation to not occur. (init#132)
- Fixed the inclusion of Intel and AMD CPU microcode in the initrd. This was accidentally dropped some time ago.
- azure: Fixed issue of wa-linux-agent overriding ssh public key from ignition configuration during provisioning (flatcar/Flatcar#1661)
- update-ssh-keys: More intuitive --help text and the -n (no-replace) option has been fixed. (flatcar/Flatcar#1554)
Changes:
- Add changes for our secureboot signed images with our signed release process until the official shim signing (scripts#2754)
- Added
nftables-load.serviceandnftables-store.serviceservices to load/store rules from/in/var/lib/nftables/rules-save(Flatcar#900) - Added support for podman in
toolbox(toolbox#11) - Allow per-sysext USE flags and architecture-specific sysexts. (scripts#2798)
- Always truncate hostnames on the first occurrence of
.(cloud-init#32) - Build Intel iGPU i915 driver as module (scripts#2349)
- Compile OS-dependent NVIDIA kernel module sysexts signed for secure boot. (scripts#2798)
- Enabled EROFS module with XATTR support (Flatcar#1659)
- Enabled virtiofs and fuse-dax modules in the kernel for advaned Qemu usecases. Thank you @aaronk6! (Flatcar#2825)
- Ensure hostnames never exceeds 63 characters, regardless of the metadata provider (cloud-init#31)
- Provided an Incus Flatcar extension as optional systemd-sysext image with the release. Write 'incus' to
/etc/flatcar/enabled-sysext.confthrough Ignition and the sysext will be installed during provisioning. (scripts#1655) - Sign out-of-tree kernel modules using the ephemeral signing key so that ZFS and NVIDIA sysexts can work with secure boot. (scripts#2636)
- The kernel image and its embedded initrd are now compressed with xz rather than zstd. This gives greater compression at the cost of decompression performance. Systems may therefore now be ever so slightly slower to boot, but this was necessary to avoid running out of space in the /boot partition. Further measures to address the space issue are planned, and perhaps we can switch back to zstd in a later release.
- The qemu script (
flatcar_production_qemu*.sh) received two new options.-D(or-image-disk-opts) can be used to add extra options to thevirtio-blk-pcidevice for primary disk.-d(or-disk) can be used to add extra disks to the machine - this one takes a path to a raw or qcow2 image file and, after a comma,virtio-blk-pcioptions. To learn what disk options can be passed to-Dor-d, callqemu-system-x86_64 -device virtio-blk-pci,help(qemu-system-aarch64can be used too). /bootis now only accessible by the root user for better security. (Flatcar#296)- sysext-incus: removed
/etc/subuidand/etc/subgidgeneration forrootuser, it has to be created through initial provisioning. (scripts#3028) - systemd now uses OpenSSL instead of gcrypt for cryptography to reduce the size of the initrd. This change disables systemd-journal's Forward Secure Sealing feature, but it is generally not useful for Flatcar.
Updates:
- AWS: Amazon SSM Agent (3.3.2299.0)
- Ignition (2.21.0)
- Linux ([6.12.34](https://git.kernel.org/pub/scm/l...
alpha-4372.0.0
Changes since Alpha 4344.0.0
Security fixes:
- Linux (CVE-2025-38052, CVE-2025-38061, CVE-2025-38060, CVE-2025-38059, CVE-2025-38058, CVE-2025-38057, CVE-2025-38056, CVE-2025-38055, CVE-2025-38081, CVE-2025-38080, CVE-2025-38079, CVE-2025-38078, CVE-2025-38077, CVE-2025-38075, CVE-2025-38074, CVE-2025-38073, CVE-2025-38072, CVE-2025-38054, CVE-2025-38071, CVE-2025-38069, CVE-2025-38068, CVE-2025-38066, CVE-2025-38065, CVE-2025-38063, CVE-2025-38062, CVE-2025-38053, CVE-2025-38038, CVE-2025-38037, CVE-2025-38035, CVE-2025-38034, CVE-2025-38033, CVE-2025-38051, CVE-2025-38031, CVE-2025-38048, CVE-2025-38047, CVE-2025-38046, CVE-2025-38045, CVE-2025-38044, CVE-2025-38043, CVE-2025-38040, CVE-2025-38039, CVE-2025-38030, CVE-2025-38003, CVE-2025-38004, CVE-2025-38000, CVE-2025-38082, CVE-2025-38001, CVE-2025-38083)
Bug fixes:
- Fixed race condition in the script that grows the root partition to fill the disk. This bug sometimes caused the operation to not occur. (init#132)
Changes:
- Added support for podman in
toolbox(toolbox#11) /bootis now only accessible by the root user for better security. (Flatcar#296)- sysext-incus: removed
/etc/subuidand/etc/subgidgeneration forrootuser, it has to be created through initial provisioning. (scripts#3028)
Updates:
alpha-4344.0.0
Changes since Alpha 4284.0.0
Breaking changes
- Azure:
hv_fcopy_daemonbinary and its servicehv_fcopy_daemon.servicehave been renamed to respectivelyhv_fcopy_uio_daemonandhv_fcopy_uio_daemon.servicefollowing 6.12 Kernel update
Security fixes:
- afterburn (CVE-2025-3416)
- azure, dev, gce, sysext-python: python (CVE-2025-0938)
- c-ares (CVE-2025-31498)
- cifs-utils (CVE-2025-2312)
- containerd (CVE-2024-40635)
- curl (curl-20250205)
- dev: iperf (CVE-2024-53580)
- expat (CVE-2024-8176)
- go (CVE-2025-22871)
- libarchive (CVE-2025-25724)
- libxml2 (CVE-2024-56171, CVE-2025-24928, CVE-2025-27113)
- SDK: perl (CVE-2024-56406)
- socat (socat-20250221)
- sysext-podman: crun (CVE-2025-24965)
- vmware: libxslt (CVE-2025-24855, CVE-2024-55549)
- vmware: open-vm-tools (CVE-2025-22247)
- xz-utils (CVE-2025-31115)
Bug fixes:
- Added back some BCC tools (scripts#2900)
- Fixed path handling in the QEMU .sh launcher scripts. Given paths now are relative to the current directory and absolute paths work as you would expect. (scripts#2808)
- Fixed the inclusion of Intel and AMD CPU microcode in the initrd. This was accidentally dropped some time ago. (scripts#2837)
- update-ssh-keys: More intuitive --help text and the -n (no-replace) option has been fixed. (flatcar/Flatcar#1554)
Changes:
- Added
nftables-load.serviceandnftables-store.serviceservices to load/store rules from/in/var/lib/nftables/rules-save(Flatcar#900) - Allow per-sysext USE flags and architecture-specific sysexts. (scripts#2798)
- Always truncate hostnames on the first occurrence of
.(cloud-init#32) - Compile OS-dependent NVIDIA kernel module sysexts signed for secure boot. (scripts#2798)
- Enabled virtiofs and fuse-dax modules in the kernel for advaned Qemu usecases. Thank you @aaronk6! (Flatcar#2825)
- Ensure hostnames never exceeds 63 characters, regardless of the metadata provider (cloud-init#31)
- Provided an Incus Flatcar extension as optional systemd-sysext image with the release. Write 'incus' to
/etc/flatcar/enabled-sysext.confthrough Ignition and the sysext will be installed during provisioning. (scripts#1655) - Sign out-of-tree kernel modules using the ephemeral signing key so that ZFS and NVIDIA sysexts can work with secure boot. (scripts#2636)
- The kernel image and its embedded initrd are now compressed with xz rather than zstd. This gives greater compression at the cost of decompression performance. Systems may therefore now be ever so slightly slower to boot, but this was necessary to avoid running out of space in the /boot partition. Further measures to address the space issue are planned, and perhaps we can switch back to zstd in a later release. (scripts#2835)
- The qemu script (
flatcar_production_qemu*.sh) received two new options.-D(or-image-disk-opts) can be used to add extra options to thevirtio-blk-pcidevice for primary disk.-d(or-disk) can be used to add extra disks to the machine - this one takes a path to a raw or qcow2 image file and, after a comma,virtio-blk-pcioptions. To learn what disk options can be passed to-Dor-d, callqemu-system-x86_64 -device virtio-blk-pci,help(qemu-system-aarch64can be used too). (scripts#2847) - systemd now uses OpenSSL instead of gcrypt for cryptography to reduce the size of the initrd. This change disables systemd-journal's Forward Secure Sealing feature, but it is generally not useful for Flatcar. (scripts#2837)
Updates:
- AWS: Amazon SSM Agent (3.3.2299.0)
- Ignition (2.21.0)
- Linux (6.12.30 (includes 6.12.29, 6.12.28, 6.12.27, 6.12.26, 6.12.25, 6.12.24, 6.12.23, 6.12.22, 6.12.21, 6.12.20, 6.12.19, 6.12.18, 6.12.17, 6.12.16, 6.12.15, 6.12.14, 6.12.13, 6.12.12, 6.12.11, 6.12.10, 6.12.9, 6.12.8, 6.12.7, 6.12.6, 6.12.5, 6.12.4, 6.12.3, 6.12.2, 6.12.1, 6.12, 6.6.89, 6.6.88, 6.6.87, 6.6.86, 6.6.85, 6.6.84))
- Linux Firmware (20250509 (includes 20250410))
- SDK: go (1.24.2 (includes 1.24.1))
- SDK: perl (5.40.2 (includes 5.40.1))
- SDK: pkgcheck (0.10.34))
- SDK: rust (1.85.1 (includes 1.85.0))
- afterburn (5.8.2)
- azure, dev, gce, sysext-python: gdbm (1.25)
- azure, dev, gce, sysext-python: python (3.11.12)
- base, dev: azure-vm-utils (0.6.0 (includes 0.5.2, 0.5.1, 0.5.0))
- base, dev: bind (9.18.31 (includes 9.18.30))
- base, dev: btrfs-progs (6.13)
- base, dev: cifs-utils (7.3 (includes 7.2, 7.1))
- base, dev: curl (8.13.0)
- base, dev: dbus (1.16.2 (includes [1.16.0](https://gi...
stable-4152.2.3
Changes since Stable 4152.2.2
Security fixes:
- Linux (CVE-2025-21993, CVE-2025-21992, CVE-2025-21991, CVE-2025-21967, CVE-2025-21975, CVE-2025-21971, CVE-2025-21970, CVE-2025-21969, CVE-2025-21986, CVE-2025-21981, CVE-2025-21980, CVE-2025-21979, CVE-2025-21978, CVE-2025-21968, CVE-2025-21962, CVE-2025-21960, CVE-2025-21959, CVE-2025-21957, CVE-2025-21956, CVE-2025-21955, CVE-2025-21966, CVE-2025-21964, CVE-2025-21963, CVE-2025-22015, CVE-2025-22014, CVE-2025-22013, CVE-2025-22010, CVE-2025-22008, CVE-2025-22009, CVE-2025-22004, CVE-2025-22003, CVE-2025-22001, CVE-2025-21999, CVE-2025-21997, CVE-2025-22007, CVE-2025-22005, CVE-2025-21995, CVE-2025-21996, CVE-2025-21994, CVE-2025-22021, CVE-2025-22020, CVE-2025-22018, CVE-2025-38575, CVE-2025-38240, CVE-2025-38152, CVE-2025-37893, CVE-2025-39735, CVE-2025-39728, CVE-2025-38637, CVE-2025-37785, CVE-2025-23138, CVE-2025-23136, CVE-2025-22066, CVE-2025-22075, CVE-2025-22074, CVE-2025-22073, CVE-2025-22072, CVE-2025-22071, CVE-2025-22097, CVE-2025-22095, CVE-2025-22093, CVE-2025-22090, CVE-2025-22089, CVE-2025-22088, CVE-2025-22086, CVE-2025-22083, CVE-2025-22081, CVE-2025-22080, CVE-2025-22079, CVE-2025-22077, CVE-2025-22033, CVE-2025-22042, CVE-2025-22041, CVE-2025-22040, CVE-2025-22038, CVE-2025-22064, CVE-2025-22063, CVE-2025-22060, CVE-2025-22058, CVE-2025-22057, CVE-2025-22056, CVE-2025-22055, CVE-2025-22054, CVE-2025-22053, CVE-2025-22035, CVE-2025-22050, CVE-2025-22049, CVE-2025-22048, CVE-2025-22047, CVE-2025-22045, CVE-2025-22044, CVE-2025-22043, CVE-2025-22027, CVE-2025-22025, CVE-2025-22029, CVE-2023-53034)
Updates:
lts-4081.3.3
Changes since LTS 4081.3.2
Security fixes:
- Linux (CVE-2025-21993, CVE-2025-21992, CVE-2025-21991, CVE-2025-21967, CVE-2025-21975, CVE-2025-21971, CVE-2025-21970, CVE-2025-21969, CVE-2025-21986, CVE-2025-21981, CVE-2025-21980, CVE-2025-21979, CVE-2025-21978, CVE-2025-21968, CVE-2025-21962, CVE-2025-21960, CVE-2025-21959, CVE-2025-21957, CVE-2025-21956, CVE-2025-21955, CVE-2025-21966, CVE-2025-21964, CVE-2025-21963, CVE-2025-22015, CVE-2025-22014, CVE-2025-22013, CVE-2025-22010, CVE-2025-22008, CVE-2025-22009, CVE-2025-22004, CVE-2025-22003, CVE-2025-22001, CVE-2025-21999, CVE-2025-21997, CVE-2025-22007, CVE-2025-22005, CVE-2025-21995, CVE-2025-21996, CVE-2025-21994, CVE-2025-22021, CVE-2025-22020, CVE-2025-22018, CVE-2025-38575, CVE-2025-38240, CVE-2025-38152, CVE-2025-37893, CVE-2025-39735, CVE-2025-39728, CVE-2025-38637, CVE-2025-37785, CVE-2025-23138, CVE-2025-23136, CVE-2025-22066, CVE-2025-22075, CVE-2025-22074, CVE-2025-22073, CVE-2025-22072, CVE-2025-22071, CVE-2025-22097, CVE-2025-22095, CVE-2025-22093, CVE-2025-22090, CVE-2025-22089, CVE-2025-22088, CVE-2025-22086, CVE-2025-22083, CVE-2025-22081, CVE-2025-22080, CVE-2025-22079, CVE-2025-22077, CVE-2025-22033, CVE-2025-22042, CVE-2025-22041, CVE-2025-22040, CVE-2025-22038, CVE-2025-22064, CVE-2025-22063, CVE-2025-22060, CVE-2025-22058, CVE-2025-22057, CVE-2025-22056, CVE-2025-22055, CVE-2025-22054, CVE-2025-22053, CVE-2025-22035, CVE-2025-22050, CVE-2025-22049, CVE-2025-22048, CVE-2025-22047, CVE-2025-22045, CVE-2025-22044, CVE-2025-22043, CVE-2025-22027, CVE-2025-22025, CVE-2025-22029, CVE-2023-53034)
Updates:
beta-4230.1.1
Changes since Beta 4230.1.0
Security fixes:
- Linux (CVE-2025-21993, CVE-2025-21992, CVE-2025-21991, CVE-2025-21967, CVE-2025-21975, CVE-2025-21971, CVE-2025-21970, CVE-2025-21969, CVE-2025-21986, CVE-2025-21981, CVE-2025-21980, CVE-2025-21979, CVE-2025-21978, CVE-2025-21968, CVE-2025-21962, CVE-2025-21960, CVE-2025-21959, CVE-2025-21957, CVE-2025-21956, CVE-2025-21955, CVE-2025-21966, CVE-2025-21964, CVE-2025-21963, CVE-2025-22015, CVE-2025-22014, CVE-2025-22013, CVE-2025-22010, CVE-2025-22008, CVE-2025-22009, CVE-2025-22004, CVE-2025-22003, CVE-2025-22001, CVE-2025-21999, CVE-2025-21997, CVE-2025-22007, CVE-2025-22005, CVE-2025-21995, CVE-2025-21996, CVE-2025-21994, CVE-2025-22021, CVE-2025-22020, CVE-2025-22018, CVE-2025-38575, CVE-2025-38240, CVE-2025-38152, CVE-2025-37893, CVE-2025-39735, CVE-2025-39728, CVE-2025-38637, CVE-2025-37785, CVE-2025-23138, CVE-2025-23136, CVE-2025-22066, CVE-2025-22075, CVE-2025-22074, CVE-2025-22073, CVE-2025-22072, CVE-2025-22071, CVE-2025-22097, CVE-2025-22095, CVE-2025-22093, CVE-2025-22090, CVE-2025-22089, CVE-2025-22088, CVE-2025-22086, CVE-2025-22083, CVE-2025-22081, CVE-2025-22080, CVE-2025-22079, CVE-2025-22077, CVE-2025-22033, CVE-2025-22042, CVE-2025-22041, CVE-2025-22040, CVE-2025-22038, CVE-2025-22064, CVE-2025-22063, CVE-2025-22060, CVE-2025-22058, CVE-2025-22057, CVE-2025-22056, CVE-2025-22055, CVE-2025-22054, CVE-2025-22053, CVE-2025-22035, CVE-2025-22050, CVE-2025-22049, CVE-2025-22048, CVE-2025-22047, CVE-2025-22045, CVE-2025-22044, CVE-2025-22043, CVE-2025-22027, CVE-2025-22025, CVE-2025-22029, CVE-2023-53034)
Bug fixes:
- Fixed PXE boot failures that arose since upgrading to systemd v256. Users were dumped to an emergency shell. (flatcar/bootengine#103)