Releases: flatcar/scripts
Releases · flatcar/scripts
alpha-4547.0.0
Changes since Alpha 4515.0.1
Security fixes:
- Linux (CVE-2025-40275, CVE-2025-40274, CVE-2025-40273, CVE-2025-40272, CVE-2025-40271, CVE-2025-40289, CVE-2025-40288, CVE-2025-40287, CVE-2025-40269, CVE-2025-40286, CVE-2025-40285, CVE-2025-40284, CVE-2025-40283, CVE-2025-40282, CVE-2025-40281, CVE-2025-40280, CVE-2025-40279, CVE-2025-40278, CVE-2025-40277, CVE-2025-40268, CVE-2025-40214, CVE-2025-40212, CVE-2024-58087, CVE-2024-57879, CVE-2024-57880, CVE-2024-55642, CVE-2024-55641, CVE-2024-55639, CVE-2024-54683, CVE-2024-54460, CVE-2024-54191, CVE-2024-53689, CVE-2024-53682, CVE-2024-53687, CVE-2024-56770, CVE-2024-56661, CVE-2024-56660, CVE-2024-56659, CVE-2024-56658, CVE-2024-56657, CVE-2024-56656, CVE-2024-56655, CVE-2024-56675, CVE-2024-56674, CVE-2024-56673, CVE-2024-56672, CVE-2024-56654, CVE-2024-56671, CVE-2024-56670, CVE-2024-56669, CVE-2024-56668, CVE-2024-56667, CVE-2024-56666, CVE-2024-56665, CVE-2024-56664, CVE-2024-56663, CVE-2024-56662, CVE-2024-56652, CVE-2024-56653, CVE-2024-53241, CVE-2024-53240, CVE-2025-40261, CVE-2025-40266, CVE-2025-40264, CVE-2025-40263, CVE-2025-40262, CVE-2025-40254, CVE-2025-40253, CVE-2025-40252, CVE-2025-40251, CVE-2025-40250, CVE-2025-40259, CVE-2025-40258, CVE-2025-40257, CVE-2025-40246, CVE-2025-40248, CVE-2025-40345)
- coreutils (CVE-2025-5278)
- go (CVE-2025-47912, CVE-2025-58183, CVE-2025-58185, CVE-2025-58186, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725)
- pam (CVE-2024-22365, CVE-2024-10041, CVE-2024-10963, CVE-2025-6020)
Bug fixes:
- Dropped debug symbols from containerd, incus, and overlaybd system extensions to reduce download size.
Changes:
/etc/shadow,/etc/gshadoware now owned by theshadowgroup,/usr/bin/unix_chkpwd,/usr/bin/chageand/usr/bin/expiryare now also owned by theshadowgroup with a sticky bit enabled.
Updates:
- Linux (6.12.61 (includes 6.12.59, 6.12.60))
- Linux firmware (20251125 (includes 20251111))
- base, dev: btrfs-progs (6.17)
- base, dev: cifs-utils (7.4)
- base, dev: coreutils (9.8)
- base, dev: hwdata (0.400 (includes 0.399))
- base, dev: inih (62 (includes 61))
- base, dev: intel-microcode (20251111_p20251112)
- base, dev: iproute2 (6.17.0)
- base, dev: jose (14 (includes 13))
- base, dev: kbd (2.9.0)
- base, dev: less (685)
- base, dev: libgpg-error (1.56)
- base, dev: libtirpc (1.3.7)
- base, dev: openssl (3.5.4 (includes 3.5.0, 3.5.1, 3.5.2, 3.5.3))
- base, dev: pam (1.7.1 (includes 1.6.0, 1.6.1, 1.7.0))
- base, dev: pambase (20251013)
- base, dev: samba (4.22.5 (includes 4.22.4))
- base, dev: strace (6.17)
- base, dev: thin-provisioning-tools (1.3.0 (includes 1.0.11, 1.0.12, [1.0.13](https://raw.githubusercontent.com/device-mapper-utils/thin-provisioning-tools/...
stable-4459.2.2
Changes since Stable 4459.2.1
Security fixes:
- Linux (CVE-2025-40275, CVE-2025-40274, CVE-2025-40273, CVE-2025-40272, CVE-2025-40271, CVE-2025-40289, CVE-2025-40288, CVE-2025-40287, CVE-2025-40269, CVE-2025-40286, CVE-2025-40285, CVE-2025-40284, CVE-2025-40283, CVE-2025-40282, CVE-2025-40281, CVE-2025-40280, CVE-2025-40279, CVE-2025-40278, CVE-2025-40277, CVE-2025-40268, CVE-2025-40214, CVE-2025-40212, CVE-2024-58087, CVE-2024-57879, CVE-2024-57880, CVE-2024-55642, CVE-2024-55641, CVE-2024-55639, CVE-2024-54683, CVE-2024-54460, CVE-2024-54191, CVE-2024-53689, CVE-2024-53682, CVE-2024-53687, CVE-2024-56770, CVE-2024-56661, CVE-2024-56660, CVE-2024-56659, CVE-2024-56658, CVE-2024-56657, CVE-2024-56656, CVE-2024-56655, CVE-2024-56675, CVE-2024-56674, CVE-2024-56673, CVE-2024-56672, CVE-2024-56654, CVE-2024-56671, CVE-2024-56670, CVE-2024-56669, CVE-2024-56668, CVE-2024-56667, CVE-2024-56666, CVE-2024-56665, CVE-2024-56664, CVE-2024-56663, CVE-2024-56662, CVE-2024-56652, CVE-2024-56653, CVE-2024-53241, CVE-2024-53240, CVE-2025-40261, CVE-2025-40266, CVE-2025-40264, CVE-2025-40263, CVE-2025-40262, CVE-2025-40254, CVE-2025-40253, CVE-2025-40252, CVE-2025-40251, CVE-2025-40250, CVE-2025-40259, CVE-2025-40258, CVE-2025-40257, CVE-2025-40246, CVE-2025-40248, CVE-2025-40345)
Updates:
beta-4515.1.0
Changes since Alpha 4515.0.1
Security fixes:
- Linux (CVE-2025-40275, CVE-2025-40274, CVE-2025-40273, CVE-2025-40272, CVE-2025-40271, CVE-2025-40289, CVE-2025-40288, CVE-2025-40287, CVE-2025-40269, CVE-2025-40286, CVE-2025-40285, CVE-2025-40284, CVE-2025-40283, CVE-2025-40282, CVE-2025-40281, CVE-2025-40280, CVE-2025-40279, CVE-2025-40278, CVE-2025-40277, CVE-2025-40268, CVE-2025-40214, CVE-2025-40212, CVE-2024-58087, CVE-2024-57879, CVE-2024-57880, CVE-2024-55642, CVE-2024-55641, CVE-2024-55639, CVE-2024-54683, CVE-2024-54460, CVE-2024-54191, CVE-2024-53689, CVE-2024-53682, CVE-2024-53687, CVE-2024-56770, CVE-2024-56661, CVE-2024-56660, CVE-2024-56659, CVE-2024-56658, CVE-2024-56657, CVE-2024-56656, CVE-2024-56655, CVE-2024-56675, CVE-2024-56674, CVE-2024-56673, CVE-2024-56672, CVE-2024-56654, CVE-2024-56671, CVE-2024-56670, CVE-2024-56669, CVE-2024-56668, CVE-2024-56667, CVE-2024-56666, CVE-2024-56665, CVE-2024-56664, CVE-2024-56663, CVE-2024-56662, CVE-2024-56652, CVE-2024-56653, CVE-2024-53241, CVE-2024-53240, CVE-2025-40261, CVE-2025-40266, CVE-2025-40264, CVE-2025-40263, CVE-2025-40262, CVE-2025-40254, CVE-2025-40253, CVE-2025-40252, CVE-2025-40251, CVE-2025-40250, CVE-2025-40259, CVE-2025-40258, CVE-2025-40257, CVE-2025-40246, CVE-2025-40248, CVE-2025-40345)
Updates:
Changes since Beta 4459.1.2
Security fixes:
- Linux (CVE-2025-40275, CVE-2025-40274, CVE-2025-40273, CVE-2025-40272, CVE-2025-40271, CVE-2025-40289, CVE-2025-40288, CVE-2025-40287, CVE-2025-40269, CVE-2025-40286, CVE-2025-40285, CVE-2025-40284, CVE-2025-40283, CVE-2025-40282, CVE-2025-40281, CVE-2025-40280, CVE-2025-40279, CVE-2025-40278, CVE-2025-40277, CVE-2025-40268, CVE-2025-40214, CVE-2025-40212, CVE-2024-58087, CVE-2024-57879, CVE-2024-57880, CVE-2024-55642, CVE-2024-55641, CVE-2024-55639, CVE-2024-54683, CVE-2024-54460, CVE-2024-54191, CVE-2024-53689, CVE-2024-53682, CVE-2024-53687, CVE-2024-56770, CVE-2024-56661, CVE-2024-56660, CVE-2024-56659, CVE-2024-56658, CVE-2024-56657, CVE-2024-56656, CVE-2024-56655, CVE-2024-56675, CVE-2024-56674, CVE-2024-56673, CVE-2024-56672, CVE-2024-56654, CVE-2024-56671, CVE-2024-56670, CVE-2024-56669, CVE-2024-56668, CVE-2024-56667, CVE-2024-56666, CVE-2024-56665, CVE-2024-56664, CVE-2024-56663, CVE-2024-56662, CVE-2024-56652, CVE-2024-56653, CVE-2024-53241, CVE-2024-53240, CVE-2025-40261, ...
stable-4459.2.1
Changes since Stable 4459.2.0
Security fixes:
- Linux (CVE-2025-40177, CVE-2025-40176, CVE-2025-40172, CVE-2025-40173, CVE-2025-40166, CVE-2025-40167, CVE-2025-40165, CVE-2025-40162, CVE-2025-40133, CVE-2025-40095, CVE-2025-40094, CVE-2025-40093, CVE-2025-40092, CVE-2025-40090, CVE-2025-40088, CVE-2025-40105, CVE-2025-40104, CVE-2025-40103, CVE-2025-40101, CVE-2025-40100, CVE-2025-40099, CVE-2025-40096, CVE-2025-40087, CVE-2025-40085, CVE-2025-40040, CVE-2025-40106, CVE-2025-40084, CVE-2025-40211, CVE-2025-40209)
Bug fixes:
- Fixed the loading of kernel modules from system extensions via udev (e.g. at boot time). (flatcar/scripts#3367)
Changes:
- Added Nutanix images (flatcar/scripts#3311)
Updates:
beta-4459.1.2
Changes since Beta 4459.1.1
Security fixes:
- Linux (CVE-2025-40177, CVE-2025-40176, CVE-2025-40172, CVE-2025-40173, CVE-2025-40166, CVE-2025-40167, CVE-2025-40165, CVE-2025-40162, CVE-2025-40133, CVE-2025-40095, CVE-2025-40094, CVE-2025-40093, CVE-2025-40092, CVE-2025-40090, CVE-2025-40088, CVE-2025-40105, CVE-2025-40104, CVE-2025-40103, CVE-2025-40101, CVE-2025-40100, CVE-2025-40099, CVE-2025-40096, CVE-2025-40087, CVE-2025-40085, CVE-2025-40040, CVE-2025-40106, CVE-2025-40084, CVE-2025-40211, CVE-2025-40209)
Bug fixes:
- Fixed the loading of kernel modules from system extensions via udev (e.g. at boot time).(flatcar/scripts#3367)
Changes:
- Added Nutanix images (flatcar/scripts#3311)
Updates:
alpha-4515.0.1
Changes since Alpha 4515.0.0
Security fixes:
- Linux (CVE-2025-40177, CVE-2025-40176, CVE-2025-40172, CVE-2025-40173, CVE-2025-40166, CVE-2025-40167, CVE-2025-40165, CVE-2025-40162, CVE-2025-40133, CVE-2025-40095, CVE-2025-40094, CVE-2025-40093, CVE-2025-40092, CVE-2025-40090, CVE-2025-40088, CVE-2025-40105, CVE-2025-40104, CVE-2025-40103, CVE-2025-40101, CVE-2025-40100, CVE-2025-40099, CVE-2025-40096, CVE-2025-40087, CVE-2025-40085, CVE-2025-40040, CVE-2025-40106, CVE-2025-40084, CVE-2025-40211, CVE-2025-40209)
Bug fixes:
- Fixed SSSD startup failure by adding back LDB modules into the image, which got lost after a Samba update (Flatcar#1919)
- Fixed the loading of kernel modules from system extensions via udev (e.g. at boot time).(flatcar/scripts#3367)
Changes:
- Added Nutanix images (flatcar/scripts#3311)
Updates:
stable-4459.2.0
Changes since Stable 4230.2.4
Security fixes:
- VMWare: open-vm-tools (CVE-2025-22247)
- afterburn (CVE-2025-0977, CVE-2025-3416)
- bind (CVE-2024-11187, CVE-2024-12705)
- binutils (CVE-2024-53589, CVE-2025-1176, CVE-2025-1178, CVE-2025-1179, CVE-2025-1180, CVE-2025-1181, CVE-2025-1182)
- c-ares (CVE-2025-31498)
- cifs-utils (CVE-2025-2312)
- containerd (CVE-2024-25621, CVE-2025-64329, CVE-2024-40635, CVE-2025-47291)
- crun (CVE-2025-24965)
- curl (CVE-2025-0167, CVE-2025-0665, CVE-2025-0725, curl-20250205)
- expat (CVE-2024-8176)
- git (CVE-2024-50349, CVE-2024-52005, CVE-2024-52006, CVE-2025-48384, CVE-2025-48385, CVE-2025-48386)
- glib (CVE-2024-52533, CVE-2025-4373, (CVE-2025-7039)
- glibc (CVE-2025-0395, CVE-2025-8058)
- gnutls (CVE-2024-12243, CVE-2025-32988, CVE-2025-32989, CVE-2025-32990, CVE-2025-6395)
- go (CVE-2025-22871, CVE-2025-22873, CVE-2025-4673, CVE-2025-0913, CVE-2025-22874, CVE-2025-4674, CVE-2025-47906, CVE-2025-47907)
- intel-microcode (CVE-2023-34440, CVE-2023-43758, CVE-2024-24582, CVE-2024-28047, CVE-2024-28127, CVE-2024-29214, CVE-2024-31157, CVE-2024-39279, CVE-2024-31068, CVE-2024-36293, CVE-2024-37020, CVE-2024-39355)
- iperf (CVE-2024-53580, CVE-2025-54349, CVE-2025-54350, CVE-2025-54351)
- jq (CVE-2024-23337, CVE-2024-53427, CVE-2025-48060)
- libarchive (CVE-2024-57970, CVE-2025-25724)
- libcap (CVE-2025-1390)
- libtasn1 (CVE-2024-12133)
- libxml2 (CVE-2024-56171, CVE-2025-24928, CVE-2025-27113, CVE-2025-32414, CVE-2025-32415, CVE-2025-49794, CVE-2025-49795, CVE-2025-49796)
- libxslt (CVE-2025-24855, CVE-2024-55549)
- mit-krb5 (CVE-2025-24528)
- nvidia-drivers (CVE-2025-23277, CVE-2025-23278, CVE-2025-23279, CVE-2025-23286)
- nvidia-drivers-service (CVE-2025-23244)
- openssh (CVE-2025-26465, CVE-2025-26466)
- openssl (CVE-2024-12797, CVE-2024-13176)
- perl (CVE-2024-56406)
- podman (CVE-2024-11218, CVE-2025-6032)
- python (CVE-2025-0938, CVE-2025-4516, CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, CVE-2025-4517, CVE-2025-6069, CVE-2025-8194)
- requests (CVE-2024-47081)
- rsync (CVE-2024-12084, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747)
- runc (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881)
- socat (CVE-2024-54661, socat-20250221)
- vim (CVE-2024-41957, CVE-2024-41965, CVE-2024-43374, CVE-2024-43790, CVE-2024-43802, CVE-2024-45306, CVE-2024-47814, CVE-2025-1215, CVE-2025-22134, CVE-2025-24014, GHSA-63p5-mwg2-787v, CVE-2025-27423, CVE-2025-29768, CVE-2025-53905, CVE-2025-53906, CVE-2025-9390)
- xz-utils (CVE-2025-31115)
Bug fixes:
- Enabled
CONFIG_CPUSETS_V1to mitigate cgroupsv1 removal (e.g JVM) (Flatcar#1884) - Enabled
CONFIG_MEMCG_V1to mitigate cgroupsv1 removal (e.g JVM) (Flatcar#1884) - Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them (Flatcar#1933)
- Fix non-conforming GPT partition table (Flatcar#1651)
- Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by s...
beta-4459.1.1
Changes since Beta 4459.1.0
Security fixes:
- Linux (CVE-2025-40109, CVE-2025-40107, CVE-2025-40028, CVE-2025-40027, CVE-2025-40026, CVE-2025-40000, CVE-2025-39995, CVE-2025-40052, CVE-2025-40061, CVE-2025-40060, CVE-2025-40059, CVE-2025-40058, CVE-2025-40057, CVE-2025-40056, CVE-2025-40055, CVE-2025-40081, CVE-2025-40080, CVE-2025-40079, CVE-2025-40078, CVE-2025-40071, CVE-2025-40070, CVE-2025-40068, CVE-2025-40067, CVE-2025-40062, CVE-2025-40053, CVE-2025-40029, CVE-2025-40038, CVE-2025-40037, CVE-2025-40036, CVE-2025-40035, CVE-2025-40033, CVE-2025-40051, CVE-2025-40049, CVE-2025-40031, CVE-2025-40048, CVE-2025-40047, CVE-2025-40045, CVE-2025-40044, CVE-2025-40043, CVE-2025-40039, CVE-2025-40030, CVE-2025-40018, CVE-2025-40004, CVE-2025-40032, CVE-2025-40042, CVE-2025-40019)
- containerd (CVE-2024-25621, CVE-2025-64329)
- runc (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881)
Bug fixes:
- Enabled
CONFIG_MEMCG_V1to mitigate cgroupsv1 removal (e.g JVM) (Flatcar#1884) - Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them (Flatcar#1933)
- Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by switching back to built-in extra firmware instead of early cpio inclusion (Flatcar#1909)
- Fixed that the needed Flatcar extensions don't get removed on update which caused a re-download (update_engine#51)
Changes:
- Scaleway: The Linux console is now attached to the correct console port. (scripts#3383)
Updates:
alpha-4515.0.0
Changes since Alpha 4487.0.1
Security fixes:
- containerd (CVE-2024-25621, CVE-2025-64329)
- expat (CVE-2025-59375)
- intel-microcode (CVE-2024-28956, CVE-2024-43420, CVE-2024-45332, CVE-2025-20012, CVE-2025-20054, CVE-2025-20103, CVE-2025-20623, CVE-2025-24495, CVE-2025-20053, CVE-2025-20109, CVE-2025-22839, CVE-2025-22840, CVE-2025-22889, CVE-2025-26403)
- nvidia-drivers (CVE-2025-23280, CVE-2025-23282, CVE-2025-23300, CVE-2025-23330, CVE-2025-23332, CVE-2025-23345)
- openssh (CVE-2025-61984, CVE-2025-61985)
- openssl (CVE-2025-9230, CVE-2025-9231, CVE-2025-9232)
- runc (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881)
Bug fixes:
- Alpha only: Added Fusion SCSI disk drivers back to the initrd after they got lost in the rework (Flatcar#1924)
- Configured the services in the overlaybd sysext to start automatically like the other sysexts. Note that the sysext must be enabled at boot time for this to happen, otherwise you need to call
systemd-tmpfiles --createandsystemctl daemon-reloadfirst.
Changes:
- Alpha only: Reduced Azure image size again to 30 GB as before by shrinking the root partition to compensate for the growth of the other partitions (scripts#3460)
- The way that files for building custom kernel modules are installed has changed from a Ubuntu-inspired method to the standard upstream kernel method. In the unlikely event that this breaks your module builds, please let the Flatcar team know immediately.
Updates:
- Linux Firmware (20251011, 20251021)
- SDK: cmake (3.31.9)
- SDK: go (1.25.1 (includes 1.25))
- SDK: qemu (10.0.5)
- azure, dev: inotify-tools (4.25.9.0)
- azure, stackit: chrony (4.8)
- base, dev: bind (9.18.38)
- base, dev: bpftool (7.6.0)
- base, dev: btrfs-progs (6.16.1)
- base, dev: expat (2.7.3)
- base, dev: gettext (0.23.2 (includes 0.23.1, 0.23.0))
- base, dev: git (2.51.0 (includes 2.50.0))
- base, dev: intel-microcode (20250812 (includes 20250512))
- base, dev: libxml2 (2.14.6 (includes 2.14.5, 2.14.4, 2.14.3, 2.14.2, 2.14.1, 2.14.0))
- base, dev: nftables (1.1.5)
- base, dev: nvidia-drivers-service (amd64) (535.274.02)
- base, dev: nvidia-drivers-service (arm64) (570.195.03)
- base, dev: openssh (10.2_p1 (includes 10.1))
- base, dev: openssl (3.4.3)
- base, dev: xfsprogs (6.16.0 (includes 6.15.0))
- sysext-containerd: containerd (2.1.5 (includes 2.1.4))
- sysext-containerd: runc (1.3.3 (includes 1.3.2, 1.3.1))
- sysext-nvidia-drivers-535, sysext-nvidia-drivers-535-open: nvidia-drivers (535.274.02)
- sysext-nvidia-drivers-570, sysext-nvidia-drivers-570-open: nvidia-drivers (570.195.03)
- sysext-podman: crun (1.21)
- sysext-podman: netavark (1.15.2 (includes 1.15.1, 1.15.0))
- sysext-podman: passt (2025.06.11)
- sysext-python: platformdirs (4.4.0)
- sysext-python: typing-extensions (4.15.0)
- systemd (257.9)
alpha-4487.0.1
Changes since Alpha 4487.0.0
Security fixes:
- Linux (CVE-2025-40107, CVE-2025-40028, CVE-2025-40027, CVE-2025-40026, CVE-2025-40000, CVE-2025-39995, CVE-2025-40052, CVE-2025-40061, CVE-2025-40060, CVE-2025-40059, CVE-2025-40058, CVE-2025-40057, CVE-2025-40056, CVE-2025-40055, CVE-2025-40081, CVE-2025-40080, CVE-2025-40079, CVE-2025-40078, CVE-2025-40071, CVE-2025-40070, CVE-2025-40068, CVE-2025-40067, CVE-2025-40062, CVE-2025-40053, CVE-2025-40029, CVE-2025-40038, CVE-2025-40037, CVE-2025-40036, CVE-2025-40035, CVE-2025-40033, CVE-2025-40051, CVE-2025-40049, CVE-2025-40031, CVE-2025-40048, CVE-2025-40047, CVE-2025-40045, CVE-2025-40044, CVE-2025-40043, CVE-2025-40039, CVE-2025-40030, CVE-2025-40018, CVE-2025-40004, CVE-2025-40032, CVE-2025-40042, CVE-2025-40019)
Bug fixes:
- Alpha only: Fixed systemd-sysext payload handling for air-gapped/self-hosted updates which was a known bug for 4487.0.0 (ue-rs#93)
- Excluded TUN/TAP interfaces from the default DHCP network configuration to solve conflicts with the programs that created them (Flatcar#1933)
- Fixed Intel microcode updates which were broken in recent Alpha and Beta releases by switching back to built-in extra firmware instead of early cpio inclusion (Flatcar#1909)
- Fixed a kernel boot warning when loading an explicit list of kernel modules in the minimal first-stage initrd (Flatcar#1934)
- Fixed that the needed Flatcar extensions don't get removed on update which caused a re-download (update_engine#51)
Changes:
- Added support for the kernel cmdline parameters
flatcar.release_file_server_urlandflatcar.dev_file_server_urlto specify custom servers where Flatcar extensions should be downloaded on boot (bootengine#112) - Alpha only: Reduced Azure image size again to 30 GB as before by shrinking the root partition to compensate for the growth of the other partitions (scripts#3460)
- Scaleway: The Linux console is now attached to the correct console port. (scripts#3383)