Groups keyboard shortcuts have been updated
Dismiss
See shortcuts

Announcing new releases Alpha 3850.0.0, Beta 3815.1.0, Stable 3760.2.0

25 views
Skip to first unread message

Flatcar Container Linux User

unread,
Jan 18, 2024, 12:36:05 PM1/18/24
to Flatcar Container Linux User


Hello,
We are pleased to announce a new Flatcar Container Linux release for the
Alpha, Beta, Stable channel.

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Alpha-3850001>Alpha 3850.0.0

*Changes since Alpha 3815.0.0*

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Security-fixes>Security
fixes:

- Linux (CVE-2022-27672 <https://nvd.nist.gov/vuln/detail/CVE-2022-27672>
, CVE-2022-40982 <https://nvd.nist.gov/vuln/detail/CVE-2022-40982>,
CVE-2022-4269 <https://nvd.nist.gov/vuln/detail/CVE-2022-4269>,
CVE-2022-45886 <https://nvd.nist.gov/vuln/detail/CVE-2022-45886>,
CVE-2022-45887 <https://nvd.nist.gov/vuln/detail/CVE-2022-45887>,
CVE-2022-45919 <https://nvd.nist.gov/vuln/detail/CVE-2022-45919>,
CVE-2022-48425 <https://nvd.nist.gov/vuln/detail/CVE-2022-48425>,
CVE-2023-0160 <https://nvd.nist.gov/vuln/detail/CVE-2023-0160>,
CVE-2023-0459 <https://nvd.nist.gov/vuln/detail/CVE-2023-0459>,
CVE-2023-1032 <https://nvd.nist.gov/vuln/detail/CVE-2023-1032>,
CVE-2023-1076 <https://nvd.nist.gov/vuln/detail/CVE-2023-1076>,
CVE-2023-1077 <https://nvd.nist.gov/vuln/detail/CVE-2023-1077>,
CVE-2023-1079 <https://nvd.nist.gov/vuln/detail/CVE-2023-1079>,
CVE-2023-1118 <https://nvd.nist.gov/vuln/detail/CVE-2023-1118>,
CVE-2023-1192 <https://nvd.nist.gov/vuln/detail/CVE-2023-1192>,
CVE-2023-1193 <https://nvd.nist.gov/vuln/detail/CVE-2023-1193>,
CVE-2023-1194 <https://nvd.nist.gov/vuln/detail/CVE-2023-1194>,
CVE-2023-1206 <https://nvd.nist.gov/vuln/detail/CVE-2023-1206>,
CVE-2023-1281 <https://nvd.nist.gov/vuln/detail/CVE-2023-1281>,
CVE-2023-1380 <https://nvd.nist.gov/vuln/detail/CVE-2023-1380>,
CVE-2023-1513 <https://nvd.nist.gov/vuln/detail/CVE-2023-1513>,
CVE-2023-1583 <https://nvd.nist.gov/vuln/detail/CVE-2023-1583>,
CVE-2023-1611 <https://nvd.nist.gov/vuln/detail/CVE-2023-1611>,
CVE-2023-1670 <https://nvd.nist.gov/vuln/detail/CVE-2023-1670>,
CVE-2023-1829 <https://nvd.nist.gov/vuln/detail/CVE-2023-1829>,
CVE-2023-1855 <https://nvd.nist.gov/vuln/detail/CVE-2023-1855>,
CVE-2023-1859 <https://nvd.nist.gov/vuln/detail/CVE-2023-1859>,
CVE-2023-1989 <https://nvd.nist.gov/vuln/detail/CVE-2023-1989>,
CVE-2023-1990 <https://nvd.nist.gov/vuln/detail/CVE-2023-1990>,
CVE-2023-1998 <https://nvd.nist.gov/vuln/detail/CVE-2023-1998>,
CVE-2023-2002 <https://nvd.nist.gov/vuln/detail/CVE-2023-2002>,
CVE-2023-20569 <https://nvd.nist.gov/vuln/detail/CVE-2023-20569>,
CVE-2023-20588 <https://nvd.nist.gov/vuln/detail/CVE-2023-20588>,
CVE-2023-20593 <https://nvd.nist.gov/vuln/detail/CVE-2023-20593>,
CVE-2023-2124 <https://nvd.nist.gov/vuln/detail/CVE-2023-2124>,
CVE-2023-21255 <https://nvd.nist.gov/vuln/detail/CVE-2023-21255>,
CVE-2023-21264 <https://nvd.nist.gov/vuln/detail/CVE-2023-21264>,
CVE-2023-2156 <https://nvd.nist.gov/vuln/detail/CVE-2023-2156>,
CVE-2023-2163 <https://nvd.nist.gov/vuln/detail/CVE-2023-2163>,
CVE-2023-2194 <https://nvd.nist.gov/vuln/detail/CVE-2023-2194>,
CVE-2023-2235 <https://nvd.nist.gov/vuln/detail/CVE-2023-2235>,
CVE-2023-2269 <https://nvd.nist.gov/vuln/detail/CVE-2023-2269>,
CVE-2023-25012 <https://nvd.nist.gov/vuln/detail/CVE-2023-25012>,
CVE-2023-25775 <https://nvd.nist.gov/vuln/detail/CVE-2023-25775>,
CVE-2023-2598 <https://nvd.nist.gov/vuln/detail/CVE-2023-2598>,
CVE-2023-26545 <https://nvd.nist.gov/vuln/detail/CVE-2023-26545>,
CVE-2023-28466 <https://nvd.nist.gov/vuln/detail/CVE-2023-28466>,
CVE-2023-28866 <https://nvd.nist.gov/vuln/detail/CVE-2023-28866>,
CVE-2023-2898 <https://nvd.nist.gov/vuln/detail/CVE-2023-2898>,
CVE-2023-2985 <https://nvd.nist.gov/vuln/detail/CVE-2023-2985>,
CVE-2023-30456 <https://nvd.nist.gov/vuln/detail/CVE-2023-30456>,
CVE-2023-30772 <https://nvd.nist.gov/vuln/detail/CVE-2023-30772>,
CVE-2023-3090 <https://nvd.nist.gov/vuln/detail/CVE-2023-3090>,
CVE-2023-31085 <https://nvd.nist.gov/vuln/detail/CVE-2023-31085>,
CVE-2023-31248 <https://nvd.nist.gov/vuln/detail/CVE-2023-31248>,
CVE-2023-3141 <https://nvd.nist.gov/vuln/detail/CVE-2023-3141>,
CVE-2023-31436 <https://nvd.nist.gov/vuln/detail/CVE-2023-31436>,
CVE-2023-3212 <https://nvd.nist.gov/vuln/detail/CVE-2023-3212>,
CVE-2023-3220 <https://nvd.nist.gov/vuln/detail/CVE-2023-3220>,
CVE-2023-32233 <https://nvd.nist.gov/vuln/detail/CVE-2023-32233>,
CVE-2023-32233 <https://nvd.nist.gov/vuln/detail/CVE-2023-32233>,
CVE-2023-32247 <https://nvd.nist.gov/vuln/detail/CVE-2023-32247>,
CVE-2023-32248 <https://nvd.nist.gov/vuln/detail/CVE-2023-32248>,
CVE-2023-32250 <https://nvd.nist.gov/vuln/detail/CVE-2023-32250>,
CVE-2023-32252 <https://nvd.nist.gov/vuln/detail/CVE-2023-32252>,
CVE-2023-32254 <https://nvd.nist.gov/vuln/detail/CVE-2023-32254>,
CVE-2023-32257 <https://nvd.nist.gov/vuln/detail/CVE-2023-32257>,
CVE-2023-32258 <https://nvd.nist.gov/vuln/detail/CVE-2023-32258>,
CVE-2023-3268 <https://nvd.nist.gov/vuln/detail/CVE-2023-3268>,
CVE-2023-3269 <https://nvd.nist.gov/vuln/detail/CVE-2023-3269>,
CVE-2023-3312 <https://nvd.nist.gov/vuln/detail/CVE-2023-3312>,
CVE-2023-3317 <https://nvd.nist.gov/vuln/detail/CVE-2023-3317>,
CVE-2023-33203 <https://nvd.nist.gov/vuln/detail/CVE-2023-33203>,
CVE-2023-33250 <https://nvd.nist.gov/vuln/detail/CVE-2023-33250>,
CVE-2023-33288 <https://nvd.nist.gov/vuln/detail/CVE-2023-33288>,
CVE-2023-3355 <https://nvd.nist.gov/vuln/detail/CVE-2023-3355>,
CVE-2023-3390 <https://nvd.nist.gov/vuln/detail/CVE-2023-3390>,
CVE-2023-33951 <https://nvd.nist.gov/vuln/detail/CVE-2023-33951>,
CVE-2023-33951 <https://nvd.nist.gov/vuln/detail/CVE-2023-33951>,
CVE-2023-33952 <https://nvd.nist.gov/vuln/detail/CVE-2023-33952>,
CVE-2023-34256 <https://nvd.nist.gov/vuln/detail/CVE-2023-34256>,
CVE-2023-34319 <https://nvd.nist.gov/vuln/detail/CVE-2023-34319>,
CVE-2023-34324 <https://nvd.nist.gov/vuln/detail/CVE-2023-34324>,
CVE-2023-35001 <https://nvd.nist.gov/vuln/detail/CVE-2023-35001>,
CVE-2023-35788 <https://nvd.nist.gov/vuln/detail/CVE-2023-35788>,
CVE-2023-35823 <https://nvd.nist.gov/vuln/detail/CVE-2023-35823>,
CVE-2023-35824 <https://nvd.nist.gov/vuln/detail/CVE-2023-35824>,
CVE-2023-35826 <https://nvd.nist.gov/vuln/detail/CVE-2023-35826>,
CVE-2023-35826 <https://nvd.nist.gov/vuln/detail/CVE-2023-35826>,
CVE-2023-35827 <https://nvd.nist.gov/vuln/detail/CVE-2023-35827>,
CVE-2023-35828 <https://nvd.nist.gov/vuln/detail/CVE-2023-35828>,
CVE-2023-35829 <https://nvd.nist.gov/vuln/detail/CVE-2023-35829>,
CVE-2023-3609 <https://nvd.nist.gov/vuln/detail/CVE-2023-3609>,
CVE-2023-3610 <https://nvd.nist.gov/vuln/detail/CVE-2023-3610>,
CVE-2023-3611 <https://nvd.nist.gov/vuln/detail/CVE-2023-3611>,
CVE-2023-37453 <https://nvd.nist.gov/vuln/detail/CVE-2023-37453>,
CVE-2023-3772 <https://nvd.nist.gov/vuln/detail/CVE-2023-3772>,
CVE-2023-3773 <https://nvd.nist.gov/vuln/detail/CVE-2023-3773>,
CVE-2023-3776 <https://nvd.nist.gov/vuln/detail/CVE-2023-3776>,
CVE-2023-3777 <https://nvd.nist.gov/vuln/detail/CVE-2023-3777>,
CVE-2023-38409 <https://nvd.nist.gov/vuln/detail/CVE-2023-38409>,
CVE-2023-38426 <https://nvd.nist.gov/vuln/detail/CVE-2023-38426>,
CVE-2023-38427 <https://nvd.nist.gov/vuln/detail/CVE-2023-38427>,
CVE-2023-38428 <https://nvd.nist.gov/vuln/detail/CVE-2023-38428>,
CVE-2023-38429 <https://nvd.nist.gov/vuln/detail/CVE-2023-38429>,
CVE-2023-38430 <https://nvd.nist.gov/vuln/detail/CVE-2023-38430>,
CVE-2023-38431 <https://nvd.nist.gov/vuln/detail/CVE-2023-38431>,
CVE-2023-38432 <https://nvd.nist.gov/vuln/detail/CVE-2023-38432>,
CVE-2023-3863 <https://nvd.nist.gov/vuln/detail/CVE-2023-3863>,
CVE-2023-3865 <https://nvd.nist.gov/vuln/detail/CVE-2023-3865>,
CVE-2023-3866 <https://nvd.nist.gov/vuln/detail/CVE-2023-3866>,
CVE-2023-3867 <https://nvd.nist.gov/vuln/detail/CVE-2023-3867>,
CVE-2023-39189 <https://nvd.nist.gov/vuln/detail/CVE-2023-39189>,
CVE-2023-39191 <https://nvd.nist.gov/vuln/detail/CVE-2023-39191>,
CVE-2023-39192 <https://nvd.nist.gov/vuln/detail/CVE-2023-39192>,
CVE-2023-39192 <https://nvd.nist.gov/vuln/detail/CVE-2023-39192>,
CVE-2023-39193 <https://nvd.nist.gov/vuln/detail/CVE-2023-39193>,
CVE-2023-39194 <https://nvd.nist.gov/vuln/detail/CVE-2023-39194>,
CVE-2023-39197 <https://nvd.nist.gov/vuln/detail/CVE-2023-39197>,
CVE-2023-39198 <https://nvd.nist.gov/vuln/detail/CVE-2023-39198>,
CVE-2023-4004 <https://nvd.nist.gov/vuln/detail/CVE-2023-4004>,
CVE-2023-4015 <https://nvd.nist.gov/vuln/detail/CVE-2023-4015>,
CVE-2023-40283 <https://nvd.nist.gov/vuln/detail/CVE-2023-40283>,
CVE-2023-40791 <https://nvd.nist.gov/vuln/detail/CVE-2023-40791>,
CVE-2023-4132 <https://nvd.nist.gov/vuln/detail/CVE-2023-4132>,
CVE-2023-4133 <https://nvd.nist.gov/vuln/detail/CVE-2023-4133>,
CVE-2023-4134 <https://nvd.nist.gov/vuln/detail/CVE-2023-4134>,
CVE-2023-4147 <https://nvd.nist.gov/vuln/detail/CVE-2023-4147>,
CVE-2023-4155 <https://nvd.nist.gov/vuln/detail/CVE-2023-4155>,
CVE-2023-4194 <https://nvd.nist.gov/vuln/detail/CVE-2023-4194>,
CVE-2023-4206 <https://nvd.nist.gov/vuln/detail/CVE-2023-4206>,
CVE-2023-4207 <https://nvd.nist.gov/vuln/detail/CVE-2023-4207>,
CVE-2023-4208 <https://nvd.nist.gov/vuln/detail/CVE-2023-4208>,
CVE-2023-4244 <https://nvd.nist.gov/vuln/detail/CVE-2023-4244>,
CVE-2023-4273 <https://nvd.nist.gov/vuln/detail/CVE-2023-4273>,
CVE-2023-42752 <https://nvd.nist.gov/vuln/detail/CVE-2023-42752>,
CVE-2023-42752 <https://nvd.nist.gov/vuln/detail/CVE-2023-42752>,
CVE-2023-42753 <https://nvd.nist.gov/vuln/detail/CVE-2023-42753>,
CVE-2023-42754 <https://nvd.nist.gov/vuln/detail/CVE-2023-42754>,
CVE-2023-42756 <https://nvd.nist.gov/vuln/detail/CVE-2023-42756>,
CVE-2023-44466 <https://nvd.nist.gov/vuln/detail/CVE-2023-44466>,
CVE-2023-4569 <https://nvd.nist.gov/vuln/detail/CVE-2023-4569>,
CVE-2023-45862 <https://nvd.nist.gov/vuln/detail/CVE-2023-45862>,
CVE-2023-45863 <https://nvd.nist.gov/vuln/detail/CVE-2023-45863>,
CVE-2023-45871 <https://nvd.nist.gov/vuln/detail/CVE-2023-45871>,
CVE-2023-45871 <https://nvd.nist.gov/vuln/detail/CVE-2023-45871>,
CVE-2023-45898 <https://nvd.nist.gov/vuln/detail/CVE-2023-45898>,
CVE-2023-4611 <https://nvd.nist.gov/vuln/detail/CVE-2023-4611>,
CVE-2023-4623 <https://nvd.nist.gov/vuln/detail/CVE-2023-4623>,
CVE-2023-46813 <https://nvd.nist.gov/vuln/detail/CVE-2023-46813>,
CVE-2023-46862 <https://nvd.nist.gov/vuln/detail/CVE-2023-46862>,
CVE-2023-4921 <https://nvd.nist.gov/vuln/detail/CVE-2023-4921>,
CVE-2023-5090 <https://nvd.nist.gov/vuln/detail/CVE-2023-5090>,
CVE-2023-5158 <https://nvd.nist.gov/vuln/detail/CVE-2023-5158>,
CVE-2023-51779 <https://nvd.nist.gov/vuln/detail/CVE-2023-51779>,
CVE-2023-51780 <https://nvd.nist.gov/vuln/detail/CVE-2023-51780>,
CVE-2023-51781 <https://nvd.nist.gov/vuln/detail/CVE-2023-51781>,
CVE-2023-51782 <https://nvd.nist.gov/vuln/detail/CVE-2023-51782>,
CVE-2023-5197 <https://nvd.nist.gov/vuln/detail/CVE-2023-5197>,
CVE-2023-5345 <https://nvd.nist.gov/vuln/detail/CVE-2023-5345>,
CVE-2023-5633 <https://nvd.nist.gov/vuln/detail/CVE-2023-5633>,
CVE-2023-5717 <https://nvd.nist.gov/vuln/detail/CVE-2023-5717>,
CVE-2023-5972 <https://nvd.nist.gov/vuln/detail/CVE-2023-5972>,
CVE-2023-6039 <https://nvd.nist.gov/vuln/detail/CVE-2023-6039>,
CVE-2023-6111 <https://nvd.nist.gov/vuln/detail/CVE-2023-6111>,
CVE-2023-6121 <https://nvd.nist.gov/vuln/detail/CVE-2023-6121>,
CVE-2023-6176 <https://nvd.nist.gov/vuln/detail/CVE-2023-6176>,
CVE-2023-6531 <https://nvd.nist.gov/vuln/detail/CVE-2023-6531>,
CVE-2023-6546 <https://nvd.nist.gov/vuln/detail/CVE-2023-6546>,
CVE-2023-6560 <https://nvd.nist.gov/vuln/detail/CVE-2023-6560>,
CVE-2023-6606 <https://nvd.nist.gov/vuln/detail/CVE-2023-6606>,
CVE-2023-6622 <https://nvd.nist.gov/vuln/detail/CVE-2023-6622>,
CVE-2023-6817 <https://nvd.nist.gov/vuln/detail/CVE-2023-6817>,
CVE-2023-6931 <https://nvd.nist.gov/vuln/detail/CVE-2023-6931>,
CVE-2023-6932 <https://nvd.nist.gov/vuln/detail/CVE-2023-6932>,
CVE-2023-7192 <https://nvd.nist.gov/vuln/detail/CVE-2023-7192>,
CVE-2024-0193 <https://nvd.nist.gov/vuln/detail/CVE-2024-0193>,
CVE-2024-0443 <https://nvd.nist.gov/vuln/detail/CVE-2024-0443>)
- binutils (CVE-2023-1972
<https://nvd.nist.gov/vuln/detail/CVE-2023-1972>)
- curl (CVE-2023-46218 <https://nvd.nist.gov/vuln/detail/CVE-2023-46218>
, CVE-2023-46219 <https://nvd.nist.gov/vuln/detail/CVE-2023-46219>)
- gnutls (CVE-2023-5981 <https://nvd.nist.gov/vuln/detail/CVE-2023-5981>)
- intel-microcode (CVE-2023-23583
<https://nvd.nist.gov/vuln/detail/CVE-2023-23583>)
- libxml2 (CVE-2023-45322
<https://nvd.nist.gov/vuln/detail/CVE-2023-45322>)
- openssh (CVE-2023-48795
<https://nvd.nist.gov/vuln/detail/CVE-2023-48795>, CVE-2023-51384
<https://nvd.nist.gov/vuln/detail/CVE-2023-51384>, CVE-2023-51385
<https://nvd.nist.gov/vuln/detail/CVE-2023-51385>)
- openssl (CVE-2023-3817 <https://nvd.nist.gov/vuln/detail/CVE-2023-3817>
, CVE-2023-5363 <https://nvd.nist.gov/vuln/detail/CVE-2023-5363>,
CVE-2023-5678 <https://nvd.nist.gov/vuln/detail/CVE-2023-5678>)
- perl (CVE-2023-47038 <https://nvd.nist.gov/vuln/detail/CVE-2023-47038>)
- traceroute (CVE-2023-46316
<https://nvd.nist.gov/vuln/detail/CVE-2023-46316>)
- vim (CVE-2023-5344 <https://nvd.nist.gov/vuln/detail/CVE-2023-5344>,
CVE-2023-5441 <https://nvd.nist.gov/vuln/detail/CVE-2023-5441>,
CVE-2023-5535 <https://nvd.nist.gov/vuln/detail/CVE-2023-5535>,
CVE-2023-46246 <https://nvd.nist.gov/vuln/detail/CVE-2023-46246>)

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Bug-fixes>Bug fixes:

- AWS: Fixed the Amazon SSM agent that was crashing. (Flatcar#1307
<https://github.com/flatcar/Flatcar/issues/1307>)
- Fixed a bug resulting in coreos-cloudinit resetting the instance
hostname to ‘localhost’ if no metadata could be found (
coreos-cloudinit#25 <https://github.com/flatcar/coreos-cloudinit/pull/25>
, Flatcar#1262 <https://github.com/flatcar/Flatcar/issues/1262>), with
contributions from MichaelEischer <https://github.com/MichaelEischer>
- Fixed supplying extension update payloads with a custom base URL in
Nebraska (Flatcar#1281 <https://github.com/flatcar/Flatcar/issues/1281>)

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Changes>Changes:

- Update generation SLSA provenance info from v0.2 to v1.0.

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Updates>Updates:

- Go (1.20.13 <https://go.dev/doc/devel/release#go1.20.13>)
- Linux (6.6.12 <https://lwn.net/Articles/958342> (includes 6.6.11
<https://lwn.net/Articles/957375>, 6.6.10
<https://lwn.net/Articles/957008>, 6.6.9
<https://lwn.net/Articles/956525>, 6.6.8
<https://lwn.net/Articles/955813>, 6.6.7
<https://lwn.net/Articles/954990/> and 6.6
<https://kernelnewbies.org/Linux_6.6>)
- Linux Firmware (20231211
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231211>
)
- bash (5.2_p21
<https://git.savannah.gnu.org/cgit/bash.git/log/?id=2bb3cbefdb8fd019765b1a9cc42ecf37ff22fec6>
)
- binutils (2.41
<https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00009.html>)
- bpftool (6.5.7
<https://kernelnewbies.org/Linux_6.5#Tracing.2C_perf_and_BPF>)
- c-ares (1.21.0 <https://c-ares.org/changelog.html#1_21_0>)
- ca-certificates (3.96.1
<https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html>
(includes 3.96
<https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html>
))
- containerd (1.7.11
<https://github.com/containerd/containerd/releases/tag/v1.7.11>)
- coreutils (9.4
<https://lists.gnu.org/archive/html/info-gnu/2023-08/msg00007.html>)
- curl (8.5.0 <https://curl.se/changes.html#8_5_0>)
- elfutils (0.190
<https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=0420d3b8376877c1b11712f1aad90a2e2b6f6d06;hb=c1058da5a450e33e72b72abb53bc3ffd7f6b361b>
)
- gawk (5.3.0 <https://lwn.net/Articles/949829/>)
- gettext (0.22.4 <https://savannah.gnu.org/news/?id=10544>)
- glib (2.78.3 <https://gitlab.gnome.org/GNOME/glib/-/blob/2.78.3/NEWS>)
- gnutls (3.8.2
<https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html>
)
- groff (1.23.0
<https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00001.html>)
- hwdata (0.376 <https://github.com/vcrhonek/hwdata/commits/v0.376>)
- intel-microcode (20231114_p20231114
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114>
)
- iproute2 (6.6.0
<https://marc.info/?l=linux-netdev&m=169929000929786&w=2>)
- ipset (7.19
<https://git.netfilter.org/ipset/tree/ChangeLog?id=ce6db35a0ea950e850ebe7c50ce46908c1c3bb2b>
)
- jq (1.7.1 <https://github.com/jqlang/jq/releases/tag/jq-1.7.1>
(includes 1.7 <https://github.com/jqlang/jq/releases/tag/jq-1.7>))
- kbd (2.6.4 <https://github.com/legionus/kbd/releases/tag/v2.6.4>)
- kmod (31 <https://github.com/kmod-project/kmod/blob/v31/NEWS>)
- libarchive (3.7.2
<https://github.com/libarchive/libarchive/releases/tag/v3.7.2>)
- libdnet (1.16.4
<https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.4>)
- libksba (1.6.5
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=369cfb5d91bf232685a6c5b156453a624e11ed67;hb=7b3e4785e54280d1a13c5bc839bdc6722d898ac7>
)
- libnsl (2.0.1 <https://github.com/thkukuk/libnsl/releases/tag/v2.0.1>)
- lsof (4.99.0
<https://github.com/lsof-org/lsof/blob/4.99.0/00DIST#L5523>)
- lz4 (1.9.4 <https://github.com/lz4/lz4/releases/tag/v1.9.4>)
- openssh (9.6p1 <https://www.openssh.com/releasenotes.html#9.6p1>)
- openssl (3.0.12
<https://github.com/openssl/openssl/blob/openssl-3.0.12/NEWS.md#major-changes-between-openssl-3011-and-openssl-3012-24-oct-2023>
)
- readline (8.2_p7
<https://git.savannah.gnu.org/cgit/readline.git/log/?id=bfe9c573a9e376323929c80b2b71c59727fab0cc>
)
- selinux-base (2.20231002
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- selinux-base-policy (2.20231002
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- selinux-container (2.20231002
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- selinux-dbus (2.20231002
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- selinux-sssd (2.20231002
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- selinux-unconfined (2.20231002
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- sqlite (3.44.2 <https://www.sqlite.org/releaselog/3_44_2.html>)
- strace (6.6 <https://github.com/strace/strace/releases/tag/v6.6>)
- traceroute (2.1.3
<https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/>
)
- usbutils (016
<https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v016>
)
- util-linux (2.39.2
<https://github.com/util-linux/util-linux/blob/v2.39.2/Documentation/releases/v2.39.2-ReleaseNotes>
)
- vim (9.0.2092 <https://github.com/vim/vim/commits/v9.0.2092/>)
- whois (5.5.20
<https://github.com/rfc1036/whois/blob/v5.5.20/debian/changelog>)
- xmlsec (1.3.2
<https://github.com/lsh123/xmlsec/releases/tag/xmlsec_1_3_2>)
- xz-utils (5.4.5
<https://github.com/tukaani-project/xz/releases/tag/v5.4.5>)
- zlib (1.3 <https://github.com/madler/zlib/releases/tag/v1.3>)
- SDK: gentoolkit (0.6.3
<https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.3>)
- SDK: libxslt (1.1.39
<https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.39>)
- SDK: perl (5.38.2 <https://perldoc.perl.org/5.38.2/perldelta>)
- SDK: portage (3.0.59
<https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.59>)
- SDK: python (3.11.7
<https://www.python.org/downloads/release/python-3117/>)
- SDK: repo (2.37)
- SDK: Rust (1.75.0
<https://github.com/rust-lang/rust/releases/tag/1.75.0> (includes 1.74.1
<https://github.com/rust-lang/rust/releases/tag/1.74.1>))

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Beta-3815101>Beta 3815.1.0

*Changes since Beta 3760.1.1*

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Security-fixes1>Security
fixes:

- Linux (CVE-2023-1193 <https://nvd.nist.gov/vuln/detail/CVE-2023-1193>,
CVE-2023-51779 <https://nvd.nist.gov/vuln/detail/CVE-2023-51779>,
CVE-2023-51780 <https://nvd.nist.gov/vuln/detail/CVE-2023-51780>,
CVE-2023-51781 <https://nvd.nist.gov/vuln/detail/CVE-2023-51781>,
CVE-2023-51782 <https://nvd.nist.gov/vuln/detail/CVE-2023-51782>,
CVE-2023-6531 <https://nvd.nist.gov/vuln/detail/CVE-2023-6531>,
CVE-2023-6606 <https://nvd.nist.gov/vuln/detail/CVE-2023-6606>,
CVE-2023-6622 <https://nvd.nist.gov/vuln/detail/CVE-2023-6622>,
CVE-2023-6817 <https://nvd.nist.gov/vuln/detail/CVE-2023-6817>,
CVE-2023-6931 <https://nvd.nist.gov/vuln/detail/CVE-2023-6931>)
- Go (CVE-2023-39326 <https://nvd.nist.gov/vuln/detail/CVE-2023-39326>,
CVE-2023-45285 <https://nvd.nist.gov/vuln/detail/CVE-2023-45285>)
- VMWare: open-vm-tools (CVE-2023-34058
<https://nvd.nist.gov/vuln/detail/CVE-2023-34058>, CVE-2023-34059
<https://nvd.nist.gov/vuln/detail/CVE-2023-34059>)
- nghttp2 (CVE-2023-44487
<https://nvd.nist.gov/vuln/detail/CVE-2023-44487>)
- samba (CVE-2023-4091 <https://nvd.nist.gov/vuln/detail/CVE-2023-4091>)
- zlib (CVE-2023-45853 <https://nvd.nist.gov/vuln/detail/CVE-2023-45853>)

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Bug-fixes1>Bug fixes:

- AWS: Fixed the Amazon SSM agent that was crashing. (Flatcar#1307
<https://github.com/flatcar/Flatcar/issues/1307>)
- Fixed a bug resulting in coreos-cloudinit resetting the instance
hostname to ‘localhost’ if no metadata could be found (
coreos-cloudinit#25 <https://github.com/flatcar/coreos-cloudinit/pull/25>
, Flatcar#1262 <https://github.com/flatcar/Flatcar/issues/1262>), with
contributions from MichaelEischer <https://github.com/MichaelEischer>
- Fixed supplying extension update payloads with a custom base URL in
Nebraska (Flatcar#1281 <https://github.com/flatcar/Flatcar/issues/1281>)
- Set TTY used for fetching server_context to RAW mode before running
cloudinit on cloudsigma (scripts#1280
<https://github.com/flatcar/scripts/pull/1280>)

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Changes1>Changes:

- Torcx, the mechanism to provide a custom Docker version, was replaced
by systemd-sysext in the OS image. Learn more about sysext and how to
customise OS images here
<https://www.flatcar.org/docs/latest/provisioning/sysext/> and read the
blogpost about the replacement here
<https://www.flatcar.org/blog/2023/12/extending-flatcar-say-goodbye-to-torcx-and-hello-to-systemd-sysext/>
.
- Torcx entered deprecation 2 years ago in favour of deploying plain
Docker binaries
<https://www.flatcar.org/docs/latest/container-runtimes/use-a-custom-docker-or-containerd-version/>
(which is now also a legacy option because systemd-sysext offers a
more robust and better structured way of customisation, including OS
independent updates).
- Torcx has been removed entirely; if you use Torcx to extend the
Flatcar base OS image, please refer to our conversion script
<https://www.flatcar.org/docs/latest/provisioning/sysext/#torcx-deprecation> and
to the sysext documentation mentioned above for migrating.
- Consequently, update_engine will not perform torcx sanity checks
post-update anymore.
- Relevant changes: scripts#1216
<https://github.com/flatcar/scripts/pull/1216>, update_engine#30
<https://github.com/flatcar/update_engine/pull/30>, Mantle#466
<https://github.com/flatcar/mantle/pull/466>, Mantle#465
<https://github.com/flatcar/mantle/pull/465>.
- cri-tools, runc, containerd, docker, and docker-cli are now built from
Gentoo upstream ebuilds. Docker received a major version upgrade - it was
updated to Docker 24 (from Docker 20; see “updates”).
- NOTE: The docker btrfs storage driver has been de-prioritised;
BTRFS backed storage will now default to the overlay2 driver
(changelog
<https://docs.docker.com/engine/release-notes/23.0/#bug-fixes-and-enhancements-6>
, upstream pr <https://github.com/moby/moby/pull/42661>).
Using the btrfs driver can still be enforced by creating a respective docker
config
<https://docs.docker.com/storage/storagedriver/btrfs-driver/#configure-docker-to-use-the-btrfs-storage-driver>
at /etc/docker/daemon.json.
- NOTE: If you are already using btrfs-backed Docker storage and are
upgrading to this new version, Docker will automatically use the btrfs storage
driver for backwards-compatibility with your deployment.
- Docker will remove the btrfs driver entirely in a future
version. Please consider migrating your deployments to the overlay2
driver.
- GCP OEM images now use a systemd-sysext image for layering
additional platform-specific software on top of /usr and being part of
the OEM A/B updates (flatcar#1146
<https://github.com/flatcar/Flatcar/issues/1146>)

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Updates1>Updates:

- Azure: WALinuxAgent (v2.9.1.1
<https://github.com/Azure/WALinuxAgent/releases/tag/v2.9.1.1>)
- DEV, AZURE: python (3.11.6
<https://docs.python.org/release/3.11.6/whatsnew/changelog.html#python-3-11-6>
)
- DEV: iperf (3.15 <https://github.com/esnet/iperf/releases/tag/3.15>)
- DEV: smartmontools (7.4
<https://www.smartmontools.org/browser/tags/RELEASE_7_4/smartmontools/NEWS>
)
- Go (1.20.12 <https://go.dev/doc/devel/release#go1.20.12> (includes
1.20.11 <https://go.dev/doc/devel/release#go1.20.11>))
- Linux (6.1.73 <https://lwn.net/Articles/958343> (includes 6.1.72
<https://lwn.net/Articles/957376>, 6.1.71
<https://lwn.net/Articles/957009>, 6.1.70
<https://lwn.net/Articles/956526>, 6.1.69
<https://lwn.net/Articles/955814>, 6.1.68
<https://lwn.net/Articles/954989/>, 6.1.67
<https://lwn.net/Articles/954455>, 6.1.60
<https://lwn.net/Articles/948817> and 6.1.59
<https://lwn.net/Articles/948297>))
- Linux Firmware (20231111
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231111>
(includes 20231030
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231030>
))
- SDK: Rust (1.73.0
<https://github.com/rust-lang/rust/releases/tag/1.73.0>)
- SDK: python packaging (23.2
<https://github.com/pypa/packaging/releases/tag/23.2>), platformdirs (
3.11.0 <https://github.com/platformdirs/platformdirs/releases/tag/3.11.0>
)
- VMWare: open-vm-tools (12.3.5
<https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.5>)
- acpid (2.0.34
<https://sourceforge.net/p/acpid2/code/ci/2.0.34/tree/Changelog>)
- ca-certificates (3.96.1
<https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html>
(includes 3.96
<https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html>
))
- containerd (1.7.10
<https://github.com/containerd/containerd/releases/tag/v1.7.10> includes
(1.7.9 <https://github.com/containerd/containerd/releases/tag/v1.7.9>
and 1.7.8 <https://github.com/containerd/containerd/releases/tag/v1.7.8>
))
- cri-tools (1.27.0
<https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.0>)
- ding-libs (0.6.2 <https://github.com/SSSD/ding-libs/releases/tag/0.6.2>
)
- docker (24.0.6 <https://docs.docker.com/engine/release-notes/24.0/>,
includes changes from 23.0
<https://docs.docker.com/engine/release-notes/23.0/>)
- efibootmgr (18 <https://github.com/rhboot/efibootmgr/releases/tag/18>)
- efivar (38 <https://github.com/rhboot/efivar/releases/tag/38>)
- ethtool (6.5
<https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.5>
)
- hwdata (0.375 <https://github.com/vcrhonek/hwdata/releases/tag/v0.375> includes
(0.374 <https://github.com/vcrhonek/hwdata/commits/v0.374>))
- iproute2 (6.5.0
<https://marc.info/?l=linux-netdev&m=169401822317373&w=2>)
- ipvsadm (1.31
<https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.31>
(includes 1.28
<https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.28>
, 1.29
<https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.29>
and 1.30
<https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.30>
))
- json-c (0.17
<https://github.com/json-c/json-c/blob/json-c-0.17-20230812/ChangeLog>)
- libffi (3.4.4 <https://github.com/libffi/libffi/releases/tag/v3.4.4>
(includes 3.4.2 <https://github.com/libffi/libffi/releases/tag/v3.4.2>
and 3.4.3 <https://github.com/libffi/libffi/releases/tag/v3.4.3>))
- liblinear (246)
- libmnl (1.0.5 <https://git.netfilter.org/libmnl/log/?h=libmnl-1.0.5>)
- libnetfilter_conntrack (1.0.9
<https://git.netfilter.org/libnetfilter_conntrack/log/?h=libnetfilter_conntrack-1.0.9>
)
- libnetfilter_cthelper (1.0.1
<https://git.netfilter.org/libnetfilter_cthelper/log/?id=8cee0347cc6969c39bb64000dfaa676a8f9e30f0>
)
- libnetfilter_cttimeout (1.0.1
<https://git.netfilter.org/libnetfilter_cttimeout/log/?id=068d36d6291f53a0a609ab1f695aa06e94ce3d30>
)
- libnfnetlink (1.0.2
<https://git.netfilter.org/libnfnetlink/log/?h=libnfnetlink-1.0.2>)
- libsodium (1.0.19
<https://github.com/jedisct1/libsodium/releases/tag/1.0.19-RELEASE>)
- libunistring (1.1
<https://git.savannah.gnu.org/gitweb/?p=libunistring.git;a=blob;f=NEWS;h=5a43ddd7011d62a952733f6c0b7ad52aa4f385c7;hb=8006860b710aae2e8442088c3ddc7d819dfa8ac7>
)
- libunwind (1.7.2
<https://github.com/libunwind/libunwind/releases/tag/v1.7.2> (includes
1.7.0 <https://github.com/libunwind/libunwind/releases/tag/v1.7.0>))
- liburing (2.3
<https://github.com/axboe/liburing/blob/liburing-2.3/CHANGELOG>)
- mpc (1.3.1
<https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00049.html>
(includes 1.3.0
<https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00028.html>)
- mpfr (4.2.1 <https://gitlab.inria.fr/mpfr/mpfr/-/blob/4.2.1/NEWS>)
- nghttp2 (1.57.0
<https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0> (includes
1.52.0 <https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0>, 1.53.0
<https://github.com/nghttp2/nghttp2/releases/tag/v1.53.0>, 1.54.0
<https://github.com/nghttp2/nghttp2/releases/tag/v1.54.0>, 1.55.0
<https://github.com/nghttp2/nghttp2/releases/tag/v1.55.0>, 1.55.1
<https://github.com/nghttp2/nghttp2/releases/tag/v1.55.1> and 1.56.0
<https://github.com/nghttp2/nghttp2/releases/tag/v1.56.0>))
- nspr (4.35
<https://hg.mozilla.org/projects/nspr/log/b563bfc16c887c48b038b7b441fcc4e40a126d3b>
)
- ntp (4.2.8p17
<https://www.ntp.org/support/securitynotice/4_2_8p17-release-announcement/>
)
- nvme-cli (v2.6
<https://github.com/linux-nvme/nvme-cli/releases/tag/v2.6>, libnvme v1.6
<https://github.com/linux-nvme/libnvme/releases/tag/v1.6>)
- protobuf (21.12
<https://github.com/protocolbuffers/protobuf/releases/tag/v21.12>
(includes 21.10
<https://github.com/protocolbuffers/protobuf/releases/tag/v21.10> and
21.11 <https://github.com/protocolbuffers/protobuf/releases/tag/v21.11>))
- samba (4.18.8 <https://www.samba.org/samba/history/samba-4.18.8.html>)
- sqlite (3.43.2 <https://www.sqlite.org/releaselog/3_43_2.html>)
- squashfs-tools (4.6.1
<https://github.com/plougher/squashfs-tools/releases/tag/4.6.1>
(includes 4.6
<https://github.com/plougher/squashfs-tools/releases/tag/4.6>))
- thin-provisioning-tools (1.0.6
<https://github.com/jthornber/thin-provisioning-tools/blob/v1.0.6/CHANGES>
)

*Changes since Alpha 3815.0.0*

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Security-fixes2>Security
fixes:

- Linux (CVE-2023-1193 <https://nvd.nist.gov/vuln/detail/CVE-2023-1193>,
CVE-2023-51779 <https://nvd.nist.gov/vuln/detail/CVE-2023-51779>,
CVE-2023-51780 <https://nvd.nist.gov/vuln/detail/CVE-2023-51780>,
CVE-2023-51781 <https://nvd.nist.gov/vuln/detail/CVE-2023-51781>,
CVE-2023-51782 <https://nvd.nist.gov/vuln/detail/CVE-2023-51782>,
CVE-2023-6531 <https://nvd.nist.gov/vuln/detail/CVE-2023-6531>,
CVE-2023-6606 <https://nvd.nist.gov/vuln/detail/CVE-2023-6606>,
CVE-2023-6622 <https://nvd.nist.gov/vuln/detail/CVE-2023-6622>,
CVE-2023-6817 <https://nvd.nist.gov/vuln/detail/CVE-2023-6817>,
CVE-2023-6931 <https://nvd.nist.gov/vuln/detail/CVE-2023-6931>)

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Bug-fixes2>Bug fixes:

- AWS: Fixed the Amazon SSM agent that was crashing. (Flatcar#1307
<https://github.com/flatcar/Flatcar/issues/1307>)
- Fixed a bug resulting in coreos-cloudinit resetting the instance
hostname to ‘localhost’ if no metadata could be found (
coreos-cloudinit#25 <https://github.com/flatcar/coreos-cloudinit/pull/25>
, Flatcar#1262 <https://github.com/flatcar/Flatcar/issues/1262>), with
contributions from MichaelEischer <https://github.com/MichaelEischer>
- Fixed supplying extension update payloads with a custom base URL in
Nebraska (Flatcar#1281 <https://github.com/flatcar/Flatcar/issues/1281>)

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Updates2>Updates:

- Linux (6.1.73 <https://lwn.net/Articles/958343> (includes 6.1.72
<https://lwn.net/Articles/957376>, 6.1.71
<https://lwn.net/Articles/957009>, 6.1.70
<https://lwn.net/Articles/956526>, 6.1.69
<https://lwn.net/Articles/955814>, 6.1.68
<https://lwn.net/Articles/954989/> and 6.1.67
<https://lwn.net/Articles/954455>))
- ca-certificates (3.96.1
<https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html>
(includes 3.96
<https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html>
))

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Stable-3760201>Stable
3760.2.0

⚠️ From Alpha 3794.0.0 Torcx has been removed - please assert that you
don’t rely on specific Torcx mechanism but now use systemd-sysext. See here
<https://www.flatcar.org/docs/latest/provisioning/sysext/> for more
information.

Changes since Stable-3602.2.3

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Security-fixes3>Security
fixes

- Linux (CVE-2023-7192 <https://nvd.nist.gov/vuln/detail/CVE-2023-7192>
(includes CVE-2023-6932 <https://nvd.nist.gov/vuln/detail/CVE-2023-6932>
, CVE-2023-6931 <https://nvd.nist.gov/vuln/detail/CVE-2023-6931>,
CVE-2023-6817 <https://nvd.nist.gov/vuln/detail/CVE-2023-6817>,
CVE-2023-6622 <https://nvd.nist.gov/vuln/detail/CVE-2023-6622>,
CVE-2023-6606 <https://nvd.nist.gov/vuln/detail/CVE-2023-6606>,
CVE-2023-6546 <https://nvd.nist.gov/vuln/detail/CVE-2023-6546>,
CVE-2023-6531 <https://nvd.nist.gov/vuln/detail/CVE-2023-6531>,
CVE-2023-6176 <https://nvd.nist.gov/vuln/detail/CVE-2023-6176>,
CVE-2023-6121 <https://nvd.nist.gov/vuln/detail/CVE-2023-6121>,
CVE-2023-5717 <https://nvd.nist.gov/vuln/detail/CVE-2023-5717>,
CVE-2023-5345 <https://nvd.nist.gov/vuln/detail/CVE-2023-5345>,
CVE-2023-5197 <https://nvd.nist.gov/vuln/detail/CVE-2023-5197>,
CVE-2023-51782 <https://nvd.nist.gov/vuln/detail/CVE-2023-51782>,
CVE-2023-51781 <https://nvd.nist.gov/vuln/detail/CVE-2023-51781>,
CVE-2023-51780 <https://nvd.nist.gov/vuln/detail/CVE-2023-51780>,
CVE-2023-51779 <https://nvd.nist.gov/vuln/detail/CVE-2023-51779>,
CVE-2023-5158 <https://nvd.nist.gov/vuln/detail/CVE-2023-5158>,
CVE-2023-5090 <https://nvd.nist.gov/vuln/detail/CVE-2023-5090>,
CVE-2023-4921 <https://nvd.nist.gov/vuln/detail/CVE-2023-4921>,
CVE-2023-46862 <https://nvd.nist.gov/vuln/detail/CVE-2023-46862>,
CVE-2023-46813 <https://nvd.nist.gov/vuln/detail/CVE-2023-46813>,
CVE-2023-4623 <https://nvd.nist.gov/vuln/detail/CVE-2023-4623>,
CVE-2023-45871 <https://nvd.nist.gov/vuln/detail/CVE-2023-45871>,
CVE-2023-45863 <https://nvd.nist.gov/vuln/detail/CVE-2023-45863>,
CVE-2023-45862 <https://nvd.nist.gov/vuln/detail/CVE-2023-45862>,
CVE-2023-4569 <https://nvd.nist.gov/vuln/detail/CVE-2023-4569>,
CVE-2023-4459 <https://nvd.nist.gov/vuln/detail/CVE-2023-4459>,
CVE-2023-44466 <https://nvd.nist.gov/vuln/detail/CVE-2023-44466>,
CVE-2023-4394 <https://nvd.nist.gov/vuln/detail/CVE-2023-4394>,
CVE-2023-4389 <https://nvd.nist.gov/vuln/detail/CVE-2023-4389>,
CVE-2023-4387 <https://nvd.nist.gov/vuln/detail/CVE-2023-4387>,
CVE-2023-4385 <https://nvd.nist.gov/vuln/detail/CVE-2023-4385>,
CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>,
CVE-2023-42754 <https://nvd.nist.gov/vuln/detail/CVE-2023-42754>,
CVE-2023-42753 <https://nvd.nist.gov/vuln/detail/CVE-2023-42753>,
CVE-2023-42752 <https://nvd.nist.gov/vuln/detail/CVE-2023-42752>,
CVE-2023-4273 <https://nvd.nist.gov/vuln/detail/CVE-2023-4273>,
CVE-2023-4244 <https://nvd.nist.gov/vuln/detail/CVE-2023-4244>,
CVE-2023-4208 <https://nvd.nist.gov/vuln/detail/CVE-2023-4208>,
CVE-2023-4207 <https://nvd.nist.gov/vuln/detail/CVE-2023-4207>,
CVE-2023-4206 <https://nvd.nist.gov/vuln/detail/CVE-2023-4206>,
CVE-2023-4155 <https://nvd.nist.gov/vuln/detail/CVE-2023-4155>,
CVE-2023-4147 <https://nvd.nist.gov/vuln/detail/CVE-2023-4147>,
CVE-2023-4132 <https://nvd.nist.gov/vuln/detail/CVE-2023-4132>,
CVE-2023-40283 <https://nvd.nist.gov/vuln/detail/CVE-2023-40283>,
CVE-2023-4015 <https://nvd.nist.gov/vuln/detail/CVE-2023-4015>,
CVE-2023-4004 <https://nvd.nist.gov/vuln/detail/CVE-2023-4004>,
CVE-2023-39198 <https://nvd.nist.gov/vuln/detail/CVE-2023-39198>,
CVE-2023-39197 <https://nvd.nist.gov/vuln/detail/CVE-2023-39197>,
CVE-2023-39194 <https://nvd.nist.gov/vuln/detail/CVE-2023-39194>,
CVE-2023-39193 <https://nvd.nist.gov/vuln/detail/CVE-2023-39193>,
CVE-2023-39192 <https://nvd.nist.gov/vuln/detail/CVE-2023-39192>,
CVE-2023-39189 <https://nvd.nist.gov/vuln/detail/CVE-2023-39189>,
CVE-2023-3867 <https://nvd.nist.gov/vuln/detail/CVE-2023-3867>,
CVE-2023-3866 <https://nvd.nist.gov/vuln/detail/CVE-2023-3866>,
CVE-2023-3865 <https://nvd.nist.gov/vuln/detail/CVE-2023-3865>,
CVE-2023-3863 <https://nvd.nist.gov/vuln/detail/CVE-2023-3863>,
CVE-2023-38432 <https://nvd.nist.gov/vuln/detail/CVE-2023-38432>,
CVE-2023-38431 <https://nvd.nist.gov/vuln/detail/CVE-2023-38431>,
CVE-2023-38430 <https://nvd.nist.gov/vuln/detail/CVE-2023-38430>,
CVE-2023-38429 <https://nvd.nist.gov/vuln/detail/CVE-2023-38429>,
CVE-2023-38428 <https://nvd.nist.gov/vuln/detail/CVE-2023-38428>,
CVE-2023-38427 <https://nvd.nist.gov/vuln/detail/CVE-2023-38427>,
CVE-2023-38426 <https://nvd.nist.gov/vuln/detail/CVE-2023-38426>,
CVE-2023-38409 <https://nvd.nist.gov/vuln/detail/CVE-2023-38409>,
CVE-2023-3812 <https://nvd.nist.gov/vuln/detail/CVE-2023-3812>,
CVE-2023-3777 <https://nvd.nist.gov/vuln/detail/CVE-2023-3777>,
CVE-2023-3776 <https://nvd.nist.gov/vuln/detail/CVE-2023-3776>,
CVE-2023-3773 <https://nvd.nist.gov/vuln/detail/CVE-2023-3773>,
CVE-2023-3772 <https://nvd.nist.gov/vuln/detail/CVE-2023-3772>,
CVE-2023-3611 <https://nvd.nist.gov/vuln/detail/CVE-2023-3611>,
CVE-2023-3610 <https://nvd.nist.gov/vuln/detail/CVE-2023-3610>,
CVE-2023-3609 <https://nvd.nist.gov/vuln/detail/CVE-2023-3609>,
CVE-2023-35829 <https://nvd.nist.gov/vuln/detail/CVE-2023-35829>,
CVE-2023-35828 <https://nvd.nist.gov/vuln/detail/CVE-2023-35828>,
CVE-2023-35827 <https://nvd.nist.gov/vuln/detail/CVE-2023-35827>,
CVE-2023-35826 <https://nvd.nist.gov/vuln/detail/CVE-2023-35826>,
CVE-2023-35824 <https://nvd.nist.gov/vuln/detail/CVE-2023-35824>,
CVE-2023-35823 <https://nvd.nist.gov/vuln/detail/CVE-2023-35823>,
CVE-2023-35788 <https://nvd.nist.gov/vuln/detail/CVE-2023-35788>,
CVE-2023-3567 <https://nvd.nist.gov/vuln/detail/CVE-2023-3567>,
CVE-2023-35001 <https://nvd.nist.gov/vuln/detail/CVE-2023-35001>,
CVE-2023-3439 <https://nvd.nist.gov/vuln/detail/CVE-2023-3439>,
CVE-2023-34324 <https://nvd.nist.gov/vuln/detail/CVE-2023-34324>,
CVE-2023-34319 <https://nvd.nist.gov/vuln/detail/CVE-2023-34319>,
CVE-2023-34256 <https://nvd.nist.gov/vuln/detail/CVE-2023-34256>,
CVE-2023-33952 <https://nvd.nist.gov/vuln/detail/CVE-2023-33952>,
CVE-2023-33951 <https://nvd.nist.gov/vuln/detail/CVE-2023-33951>,
CVE-2023-3390 <https://nvd.nist.gov/vuln/detail/CVE-2023-3390>,
CVE-2023-3359 <https://nvd.nist.gov/vuln/detail/CVE-2023-3359>,
CVE-2023-3358 <https://nvd.nist.gov/vuln/detail/CVE-2023-3358>,
CVE-2023-3357 <https://nvd.nist.gov/vuln/detail/CVE-2023-3357>,
CVE-2023-3355 <https://nvd.nist.gov/vuln/detail/CVE-2023-3355>,
CVE-2023-33288 <https://nvd.nist.gov/vuln/detail/CVE-2023-33288>,
CVE-2023-33203 <https://nvd.nist.gov/vuln/detail/CVE-2023-33203>,
CVE-2023-3269 <https://nvd.nist.gov/vuln/detail/CVE-2023-3269>,
CVE-2023-3268 <https://nvd.nist.gov/vuln/detail/CVE-2023-3268>,
CVE-2023-32269 <https://nvd.nist.gov/vuln/detail/CVE-2023-32269>,
CVE-2023-32258 <https://nvd.nist.gov/vuln/detail/CVE-2023-32258>,
CVE-2023-32257 <https://nvd.nist.gov/vuln/detail/CVE-2023-32257>,
CVE-2023-32254 <https://nvd.nist.gov/vuln/detail/CVE-2023-32254>,
CVE-2023-32252 <https://nvd.nist.gov/vuln/detail/CVE-2023-32252>,
CVE-2023-32250 <https://nvd.nist.gov/vuln/detail/CVE-2023-32250>,
CVE-2023-32248 <https://nvd.nist.gov/vuln/detail/CVE-2023-32248>,
CVE-2023-32247 <https://nvd.nist.gov/vuln/detail/CVE-2023-32247>,
CVE-2023-32233 <https://nvd.nist.gov/vuln/detail/CVE-2023-32233>,
CVE-2023-3220 <https://nvd.nist.gov/vuln/detail/CVE-2023-3220>,
CVE-2023-3212 <https://nvd.nist.gov/vuln/detail/CVE-2023-3212>,
CVE-2023-3161 <https://nvd.nist.gov/vuln/detail/CVE-2023-3161>,
CVE-2023-3159 <https://nvd.nist.gov/vuln/detail/CVE-2023-3159>,
CVE-2023-31436 <https://nvd.nist.gov/vuln/detail/CVE-2023-31436>,
CVE-2023-3141 <https://nvd.nist.gov/vuln/detail/CVE-2023-3141>,
CVE-2023-31248 <https://nvd.nist.gov/vuln/detail/CVE-2023-31248>,
CVE-2023-3111 <https://nvd.nist.gov/vuln/detail/CVE-2023-3111>,
CVE-2023-31085 <https://nvd.nist.gov/vuln/detail/CVE-2023-31085>,
CVE-2023-3090 <https://nvd.nist.gov/vuln/detail/CVE-2023-3090>,
CVE-2023-30772 <https://nvd.nist.gov/vuln/detail/CVE-2023-30772>,
CVE-2023-30456 <https://nvd.nist.gov/vuln/detail/CVE-2023-30456>,
CVE-2023-3006 <https://nvd.nist.gov/vuln/detail/CVE-2023-3006>,
CVE-2023-2985 <https://nvd.nist.gov/vuln/detail/CVE-2023-2985>,
CVE-2023-2898 <https://nvd.nist.gov/vuln/detail/CVE-2023-2898>,
CVE-2023-28866 <https://nvd.nist.gov/vuln/detail/CVE-2023-28866>,
CVE-2023-28466 <https://nvd.nist.gov/vuln/detail/CVE-2023-28466>,
CVE-2023-28410 <https://nvd.nist.gov/vuln/detail/CVE-2023-28410>,
CVE-2023-28328 <https://nvd.nist.gov/vuln/detail/CVE-2023-28328>,
CVE-2023-28327 <https://nvd.nist.gov/vuln/detail/CVE-2023-28327>,
CVE-2023-26607 <https://nvd.nist.gov/vuln/detail/CVE-2023-26607>,
CVE-2023-26606 <https://nvd.nist.gov/vuln/detail/CVE-2023-26606>,
CVE-2023-26545 <https://nvd.nist.gov/vuln/detail/CVE-2023-26545>,
CVE-2023-26544 <https://nvd.nist.gov/vuln/detail/CVE-2023-26544>,
CVE-2023-25775 <https://nvd.nist.gov/vuln/detail/CVE-2023-25775>,
CVE-2023-2513 <https://nvd.nist.gov/vuln/detail/CVE-2023-2513>,
CVE-2023-25012 <https://nvd.nist.gov/vuln/detail/CVE-2023-25012>,
CVE-2023-2430 <https://nvd.nist.gov/vuln/detail/CVE-2023-2430>,
CVE-2023-23559 <https://nvd.nist.gov/vuln/detail/CVE-2023-23559>,
CVE-2023-23455 <https://nvd.nist.gov/vuln/detail/CVE-2023-23455>,
CVE-2023-23454 <https://nvd.nist.gov/vuln/detail/CVE-2023-23454>,
CVE-2023-23002 <https://nvd.nist.gov/vuln/detail/CVE-2023-23002>,
CVE-2023-23001 <https://nvd.nist.gov/vuln/detail/CVE-2023-23001>,
CVE-2023-22999 <https://nvd.nist.gov/vuln/detail/CVE-2023-22999>,
CVE-2023-22998 <https://nvd.nist.gov/vuln/detail/CVE-2023-22998>,
CVE-2023-22997 <https://nvd.nist.gov/vuln/detail/CVE-2023-22997>,
CVE-2023-22996 <https://nvd.nist.gov/vuln/detail/CVE-2023-22996>,
CVE-2023-2269 <https://nvd.nist.gov/vuln/detail/CVE-2023-2269>,
CVE-2023-2236 <https://nvd.nist.gov/vuln/detail/CVE-2023-2236>,
CVE-2023-2235 <https://nvd.nist.gov/vuln/detail/CVE-2023-2235>,
CVE-2023-2194 <https://nvd.nist.gov/vuln/detail/CVE-2023-2194>,
CVE-2023-2177 <https://nvd.nist.gov/vuln/detail/CVE-2023-2177>,
CVE-2023-2166 <https://nvd.nist.gov/vuln/detail/CVE-2023-2166>,
CVE-2023-2163 <https://nvd.nist.gov/vuln/detail/CVE-2023-2163>,
CVE-2023-2162 <https://nvd.nist.gov/vuln/detail/CVE-2023-2162>,
CVE-2023-2156 <https://nvd.nist.gov/vuln/detail/CVE-2023-2156>,
CVE-2023-21255 <https://nvd.nist.gov/vuln/detail/CVE-2023-21255>,
CVE-2023-2124 <https://nvd.nist.gov/vuln/detail/CVE-2023-2124>,
CVE-2023-21106 <https://nvd.nist.gov/vuln/detail/CVE-2023-21106>,
CVE-2023-21102 <https://nvd.nist.gov/vuln/detail/CVE-2023-21102>,
CVE-2023-20938 <https://nvd.nist.gov/vuln/detail/CVE-2023-20938>,
CVE-2023-20928 <https://nvd.nist.gov/vuln/detail/CVE-2023-20928>,
CVE-2023-20593 <https://nvd.nist.gov/vuln/detail/CVE-2023-20593>,
CVE-2023-20588 <https://nvd.nist.gov/vuln/detail/CVE-2023-20588>,
CVE-2023-20569 <https://nvd.nist.gov/vuln/detail/CVE-2023-20569>,
CVE-2023-2019 <https://nvd.nist.gov/vuln/detail/CVE-2023-2019>,
CVE-2023-2008 <https://nvd.nist.gov/vuln/detail/CVE-2023-2008>,
CVE-2023-2006 <https://nvd.nist.gov/vuln/detail/CVE-2023-2006>,
CVE-2023-2002 <https://nvd.nist.gov/vuln/detail/CVE-2023-2002>,
CVE-2023-1998 <https://nvd.nist.gov/vuln/detail/CVE-2023-1998>,
CVE-2023-1990 <https://nvd.nist.gov/vuln/detail/CVE-2023-1990>,
CVE-2023-1989 <https://nvd.nist.gov/vuln/detail/CVE-2023-1989>,
CVE-2023-1872 <https://nvd.nist.gov/vuln/detail/CVE-2023-1872>,
CVE-2023-1859 <https://nvd.nist.gov/vuln/detail/CVE-2023-1859>,
CVE-2023-1855 <https://nvd.nist.gov/vuln/detail/CVE-2023-1855>,
CVE-2023-1838 <https://nvd.nist.gov/vuln/detail/CVE-2023-1838>,
CVE-2023-1829 <https://nvd.nist.gov/vuln/detail/CVE-2023-1829>,
CVE-2023-1670 <https://nvd.nist.gov/vuln/detail/CVE-2023-1670>,
CVE-2023-1652 <https://nvd.nist.gov/vuln/detail/CVE-2023-1652>,
CVE-2023-1637 <https://nvd.nist.gov/vuln/detail/CVE-2023-1637>,
CVE-2023-1611 <https://nvd.nist.gov/vuln/detail/CVE-2023-1611>,
CVE-2023-1583 <https://nvd.nist.gov/vuln/detail/CVE-2023-1583>,
CVE-2023-1582 <https://nvd.nist.gov/vuln/detail/CVE-2023-1582>,
CVE-2023-1513 <https://nvd.nist.gov/vuln/detail/CVE-2023-1513>,
CVE-2023-1382 <https://nvd.nist.gov/vuln/detail/CVE-2023-1382>,
CVE-2023-1380 <https://nvd.nist.gov/vuln/detail/CVE-2023-1380>,
CVE-2023-1281 <https://nvd.nist.gov/vuln/detail/CVE-2023-1281>,
CVE-2023-1249 <https://nvd.nist.gov/vuln/detail/CVE-2023-1249>,
CVE-2023-1206 <https://nvd.nist.gov/vuln/detail/CVE-2023-1206>,
CVE-2023-1194 <https://nvd.nist.gov/vuln/detail/CVE-2023-1194>,
CVE-2023-1193 <https://nvd.nist.gov/vuln/detail/CVE-2023-1193>,
CVE-2023-1192 <https://nvd.nist.gov/vuln/detail/CVE-2023-1192>,
CVE-2023-1118 <https://nvd.nist.gov/vuln/detail/CVE-2023-1118>,
CVE-2023-1095 <https://nvd.nist.gov/vuln/detail/CVE-2023-1095>,
CVE-2023-1079 <https://nvd.nist.gov/vuln/detail/CVE-2023-1079>,
CVE-2023-1078 <https://nvd.nist.gov/vuln/detail/CVE-2023-1078>,
CVE-2023-1077 <https://nvd.nist.gov/vuln/detail/CVE-2023-1077>,
CVE-2023-1076 <https://nvd.nist.gov/vuln/detail/CVE-2023-1076>,
CVE-2023-1075 <https://nvd.nist.gov/vuln/detail/CVE-2023-1075>,
CVE-2023-1074 <https://nvd.nist.gov/vuln/detail/CVE-2023-1074>,
CVE-2023-1073 <https://nvd.nist.gov/vuln/detail/CVE-2023-1073>,
CVE-2023-1032 <https://nvd.nist.gov/vuln/detail/CVE-2023-1032>,
CVE-2023-0615 <https://nvd.nist.gov/vuln/detail/CVE-2023-0615>,
CVE-2023-0590 <https://nvd.nist.gov/vuln/detail/CVE-2023-0590>,
CVE-2023-0469 <https://nvd.nist.gov/vuln/detail/CVE-2023-0469>,
CVE-2023-0468 <https://nvd.nist.gov/vuln/detail/CVE-2023-0468>,
CVE-2023-0461 <https://nvd.nist.gov/vuln/detail/CVE-2023-0461>,
CVE-2023-0459 <https://nvd.nist.gov/vuln/detail/CVE-2023-0459>,
CVE-2023-0458 <https://nvd.nist.gov/vuln/detail/CVE-2023-0458>,
CVE-2023-0394 <https://nvd.nist.gov/vuln/detail/CVE-2023-0394>,
CVE-2023-0386 <https://nvd.nist.gov/vuln/detail/CVE-2023-0386>,
CVE-2023-0266 <https://nvd.nist.gov/vuln/detail/CVE-2023-0266>,
CVE-2023-0210 <https://nvd.nist.gov/vuln/detail/CVE-2023-0210>,
CVE-2023-0179 <https://nvd.nist.gov/vuln/detail/CVE-2023-0179>,
CVE-2023-0160 <https://nvd.nist.gov/vuln/detail/CVE-2023-0160>,
CVE-2023-0045 <https://nvd.nist.gov/vuln/detail/CVE-2023-0045>,
CVE-2022-48619 <https://nvd.nist.gov/vuln/detail/CVE-2022-48619>,
CVE-2022-48502 <https://nvd.nist.gov/vuln/detail/CVE-2022-48502>,
CVE-2022-48425 <https://nvd.nist.gov/vuln/detail/CVE-2022-48425>,
CVE-2022-48424 <https://nvd.nist.gov/vuln/detail/CVE-2022-48424>,
CVE-2022-48423 <https://nvd.nist.gov/vuln/detail/CVE-2022-48423>,
CVE-2022-4842 <https://nvd.nist.gov/vuln/detail/CVE-2022-4842>,
CVE-2022-47943 <https://nvd.nist.gov/vuln/detail/CVE-2022-47943>,
CVE-2022-47942 <https://nvd.nist.gov/vuln/detail/CVE-2022-47942>,
CVE-2022-47941 <https://nvd.nist.gov/vuln/detail/CVE-2022-47941>,
CVE-2022-47940 <https://nvd.nist.gov/vuln/detail/CVE-2022-47940>,
CVE-2022-47939 <https://nvd.nist.gov/vuln/detail/CVE-2022-47939>,
CVE-2022-47938 <https://nvd.nist.gov/vuln/detail/CVE-2022-47938>,
CVE-2022-47929 <https://nvd.nist.gov/vuln/detail/CVE-2022-47929>,
CVE-2022-47521 <https://nvd.nist.gov/vuln/detail/CVE-2022-47521>,
CVE-2022-47520 <https://nvd.nist.gov/vuln/detail/CVE-2022-47520>,
CVE-2022-47519 <https://nvd.nist.gov/vuln/detail/CVE-2022-47519>,
CVE-2022-47518 <https://nvd.nist.gov/vuln/detail/CVE-2022-47518>,
CVE-2022-4662 <https://nvd.nist.gov/vuln/detail/CVE-2022-4662>,
CVE-2022-45934 <https://nvd.nist.gov/vuln/detail/CVE-2022-45934>,
CVE-2022-45919 <https://nvd.nist.gov/vuln/detail/CVE-2022-45919>,
CVE-2022-45887 <https://nvd.nist.gov/vuln/detail/CVE-2022-45887>,
CVE-2022-45886 <https://nvd.nist.gov/vuln/detail/CVE-2022-45886>,
CVE-2022-45869 <https://nvd.nist.gov/vuln/detail/CVE-2022-45869>,
CVE-2022-43945 <https://nvd.nist.gov/vuln/detail/CVE-2022-43945>,
CVE-2022-4382 <https://nvd.nist.gov/vuln/detail/CVE-2022-4382>,
CVE-2022-4379 <https://nvd.nist.gov/vuln/detail/CVE-2022-4379>,
CVE-2022-4378 <https://nvd.nist.gov/vuln/detail/CVE-2022-4378>,
CVE-2022-43750 <https://nvd.nist.gov/vuln/detail/CVE-2022-43750>,
CVE-2022-42896 <https://nvd.nist.gov/vuln/detail/CVE-2022-42896>,
CVE-2022-42895 <https://nvd.nist.gov/vuln/detail/CVE-2022-42895>,
CVE-2022-42722 <https://nvd.nist.gov/vuln/detail/CVE-2022-42722>,
CVE-2022-42721 <https://nvd.nist.gov/vuln/detail/CVE-2022-42721>,
CVE-2022-42720 <https://nvd.nist.gov/vuln/detail/CVE-2022-42720>,
CVE-2022-42719 <https://nvd.nist.gov/vuln/detail/CVE-2022-42719>,
CVE-2022-42703 <https://nvd.nist.gov/vuln/detail/CVE-2022-42703>,
CVE-2022-4269 <https://nvd.nist.gov/vuln/detail/CVE-2022-4269>,
CVE-2022-42432 <https://nvd.nist.gov/vuln/detail/CVE-2022-42432>,
CVE-2022-42329 <https://nvd.nist.gov/vuln/detail/CVE-2022-42329>,
CVE-2022-42328 <https://nvd.nist.gov/vuln/detail/CVE-2022-42328>,
CVE-2022-41858 <https://nvd.nist.gov/vuln/detail/CVE-2022-41858>,
CVE-2022-41850 <https://nvd.nist.gov/vuln/detail/CVE-2022-41850>,
CVE-2022-41849 <https://nvd.nist.gov/vuln/detail/CVE-2022-41849>,
CVE-2022-41674 <https://nvd.nist.gov/vuln/detail/CVE-2022-41674>,
CVE-2022-4139 <https://nvd.nist.gov/vuln/detail/CVE-2022-4139>,
CVE-2022-4128 <https://nvd.nist.gov/vuln/detail/CVE-2022-4128>,
CVE-2022-41218 <https://nvd.nist.gov/vuln/detail/CVE-2022-41218>,
CVE-2022-40982 <https://nvd.nist.gov/vuln/detail/CVE-2022-40982>,
CVE-2022-4095 <https://nvd.nist.gov/vuln/detail/CVE-2022-4095>,
CVE-2022-40768 <https://nvd.nist.gov/vuln/detail/CVE-2022-40768>,
CVE-2022-40307 <https://nvd.nist.gov/vuln/detail/CVE-2022-40307>,
CVE-2022-40133 <https://nvd.nist.gov/vuln/detail/CVE-2022-40133>,
CVE-2022-3977 <https://nvd.nist.gov/vuln/detail/CVE-2022-3977>,
CVE-2022-39190 <https://nvd.nist.gov/vuln/detail/CVE-2022-39190>,
CVE-2022-39189 <https://nvd.nist.gov/vuln/detail/CVE-2022-39189>,
CVE-2022-3910 <https://nvd.nist.gov/vuln/detail/CVE-2022-3910>,
CVE-2022-38457 <https://nvd.nist.gov/vuln/detail/CVE-2022-38457>,
CVE-2022-3707 <https://nvd.nist.gov/vuln/detail/CVE-2022-3707>,
CVE-2022-36946 <https://nvd.nist.gov/vuln/detail/CVE-2022-36946>,
CVE-2022-36879 <https://nvd.nist.gov/vuln/detail/CVE-2022-36879>,
CVE-2022-3649 <https://nvd.nist.gov/vuln/detail/CVE-2022-3649>,
CVE-2022-3646 <https://nvd.nist.gov/vuln/detail/CVE-2022-3646>,
CVE-2022-3643 <https://nvd.nist.gov/vuln/detail/CVE-2022-3643>,
CVE-2022-3640 <https://nvd.nist.gov/vuln/detail/CVE-2022-3640>,
CVE-2022-3635 <https://nvd.nist.gov/vuln/detail/CVE-2022-3635>,
CVE-2022-3630 <https://nvd.nist.gov/vuln/detail/CVE-2022-3630>,
CVE-2022-3629 <https://nvd.nist.gov/vuln/detail/CVE-2022-3629>,
CVE-2022-36280 <https://nvd.nist.gov/vuln/detail/CVE-2022-36280>,
CVE-2022-3628 <https://nvd.nist.gov/vuln/detail/CVE-2022-3628>,
CVE-2022-3625 <https://nvd.nist.gov/vuln/detail/CVE-2022-3625>,
CVE-2022-3623 <https://nvd.nist.gov/vuln/detail/CVE-2022-3623>,
CVE-2022-3621 <https://nvd.nist.gov/vuln/detail/CVE-2022-3621>,
CVE-2022-3619 <https://nvd.nist.gov/vuln/detail/CVE-2022-3619>,
CVE-2022-36123 <https://nvd.nist.gov/vuln/detail/CVE-2022-36123>,
CVE-2022-3595 <https://nvd.nist.gov/vuln/detail/CVE-2022-3595>,
CVE-2022-3594 <https://nvd.nist.gov/vuln/detail/CVE-2022-3594>,
CVE-2022-3586 <https://nvd.nist.gov/vuln/detail/CVE-2022-3586>,
CVE-2022-3577 <https://nvd.nist.gov/vuln/detail/CVE-2022-3577>,
CVE-2022-3565 <https://nvd.nist.gov/vuln/detail/CVE-2022-3565>,
CVE-2022-3564 <https://nvd.nist.gov/vuln/detail/CVE-2022-3564>,
CVE-2022-3543 <https://nvd.nist.gov/vuln/detail/CVE-2022-3543>,
CVE-2022-3541 <https://nvd.nist.gov/vuln/detail/CVE-2022-3541>,
CVE-2022-3534 <https://nvd.nist.gov/vuln/detail/CVE-2022-3534>,
CVE-2022-3526 <https://nvd.nist.gov/vuln/detail/CVE-2022-3526>,
CVE-2022-3524 <https://nvd.nist.gov/vuln/detail/CVE-2022-3524>,
CVE-2022-3521 <https://nvd.nist.gov/vuln/detail/CVE-2022-3521>,
CVE-2022-34918 <https://nvd.nist.gov/vuln/detail/CVE-2022-34918>,
CVE-2022-34495 <https://nvd.nist.gov/vuln/detail/CVE-2022-34495>,
CVE-2022-34494 <https://nvd.nist.gov/vuln/detail/CVE-2022-34494>,
CVE-2022-3435 <https://nvd.nist.gov/vuln/detail/CVE-2022-3435>,
CVE-2022-3424 <https://nvd.nist.gov/vuln/detail/CVE-2022-3424>,
CVE-2022-33981 <https://nvd.nist.gov/vuln/detail/CVE-2022-33981>,
CVE-2022-33744 <https://nvd.nist.gov/vuln/detail/CVE-2022-33744>,
CVE-2022-33743 <https://nvd.nist.gov/vuln/detail/CVE-2022-33743>,
CVE-2022-33742 <https://nvd.nist.gov/vuln/detail/CVE-2022-33742>,
CVE-2022-33741 <https://nvd.nist.gov/vuln/detail/CVE-2022-33741>,
CVE-2022-33740 <https://nvd.nist.gov/vuln/detail/CVE-2022-33740>,
CVE-2022-3344 <https://nvd.nist.gov/vuln/detail/CVE-2022-3344>,
CVE-2022-3303 <https://nvd.nist.gov/vuln/detail/CVE-2022-3303>,
CVE-2022-32981 <https://nvd.nist.gov/vuln/detail/CVE-2022-32981>,
CVE-2022-3239 <https://nvd.nist.gov/vuln/detail/CVE-2022-3239>,
CVE-2022-32296 <https://nvd.nist.gov/vuln/detail/CVE-2022-32296>,
CVE-2022-32250 <https://nvd.nist.gov/vuln/detail/CVE-2022-32250>,
CVE-2022-3202 <https://nvd.nist.gov/vuln/detail/CVE-2022-3202>,
CVE-2022-3169 <https://nvd.nist.gov/vuln/detail/CVE-2022-3169>,
CVE-2022-3115 <https://nvd.nist.gov/vuln/detail/CVE-2022-3115>,
CVE-2022-3113 <https://nvd.nist.gov/vuln/detail/CVE-2022-3113>,
CVE-2022-3112 <https://nvd.nist.gov/vuln/detail/CVE-2022-3112>,
CVE-2022-3111 <https://nvd.nist.gov/vuln/detail/CVE-2022-3111>,
CVE-2022-3110 <https://nvd.nist.gov/vuln/detail/CVE-2022-3110>,
CVE-2022-3108 <https://nvd.nist.gov/vuln/detail/CVE-2022-3108>,
CVE-2022-3107 <https://nvd.nist.gov/vuln/detail/CVE-2022-3107>,
CVE-2022-3105 <https://nvd.nist.gov/vuln/detail/CVE-2022-3105>,
CVE-2022-3104 <https://nvd.nist.gov/vuln/detail/CVE-2022-3104>,
CVE-2022-3078 <https://nvd.nist.gov/vuln/detail/CVE-2022-3078>,
CVE-2022-3077 <https://nvd.nist.gov/vuln/detail/CVE-2022-3077>,
CVE-2022-30594 <https://nvd.nist.gov/vuln/detail/CVE-2022-30594>,
CVE-2022-3028 <https://nvd.nist.gov/vuln/detail/CVE-2022-3028>,
CVE-2022-29968 <https://nvd.nist.gov/vuln/detail/CVE-2022-29968>,
CVE-2022-29901 <https://nvd.nist.gov/vuln/detail/CVE-2022-29901>,
CVE-2022-29900 <https://nvd.nist.gov/vuln/detail/CVE-2022-29900>,
CVE-2022-2978 <https://nvd.nist.gov/vuln/detail/CVE-2022-2978>,
CVE-2022-2977 <https://nvd.nist.gov/vuln/detail/CVE-2022-2977>,
CVE-2022-2964 <https://nvd.nist.gov/vuln/detail/CVE-2022-2964>,
CVE-2022-2959 <https://nvd.nist.gov/vuln/detail/CVE-2022-2959>,
CVE-2022-29582 <https://nvd.nist.gov/vuln/detail/CVE-2022-29582>,
CVE-2022-29581 <https://nvd.nist.gov/vuln/detail/CVE-2022-29581>,
CVE-2022-2938 <https://nvd.nist.gov/vuln/detail/CVE-2022-2938>,
CVE-2022-29156 <https://nvd.nist.gov/vuln/detail/CVE-2022-29156>,
CVE-2022-2905 <https://nvd.nist.gov/vuln/detail/CVE-2022-2905>,
CVE-2022-28893 <https://nvd.nist.gov/vuln/detail/CVE-2022-28893>,
CVE-2022-28796 <https://nvd.nist.gov/vuln/detail/CVE-2022-28796>,
CVE-2022-2873 <https://nvd.nist.gov/vuln/detail/CVE-2022-2873>,
CVE-2022-28390 <https://nvd.nist.gov/vuln/detail/CVE-2022-28390>,
CVE-2022-28389 <https://nvd.nist.gov/vuln/detail/CVE-2022-28389>,
CVE-2022-28388 <https://nvd.nist.gov/vuln/detail/CVE-2022-28388>,
CVE-2022-28356 <https://nvd.nist.gov/vuln/detail/CVE-2022-28356>,
CVE-2022-27950 <https://nvd.nist.gov/vuln/detail/CVE-2022-27950>,
CVE-2022-2785 <https://nvd.nist.gov/vuln/detail/CVE-2022-2785>,
CVE-2022-27672 <https://nvd.nist.gov/vuln/detail/CVE-2022-27672>,
CVE-2022-27666 <https://nvd.nist.gov/vuln/detail/CVE-2022-27666>,
CVE-2022-27223 <https://nvd.nist.gov/vuln/detail/CVE-2022-27223>,
CVE-2022-26966 <https://nvd.nist.gov/vuln/detail/CVE-2022-26966>,
CVE-2022-2663 <https://nvd.nist.gov/vuln/detail/CVE-2022-2663>,
CVE-2022-26490 <https://nvd.nist.gov/vuln/detail/CVE-2022-26490>,
CVE-2022-2639 <https://nvd.nist.gov/vuln/detail/CVE-2022-2639>,
CVE-2022-26373 <https://nvd.nist.gov/vuln/detail/CVE-2022-26373>,
CVE-2022-26365 <https://nvd.nist.gov/vuln/detail/CVE-2022-26365>,
CVE-2022-2602 <https://nvd.nist.gov/vuln/detail/CVE-2022-2602>,
CVE-2022-2590 <https://nvd.nist.gov/vuln/detail/CVE-2022-2590>,
CVE-2022-2588 <https://nvd.nist.gov/vuln/detail/CVE-2022-2588>,
CVE-2022-2586 <https://nvd.nist.gov/vuln/detail/CVE-2022-2586>,
CVE-2022-2585 <https://nvd.nist.gov/vuln/detail/CVE-2022-2585>,
CVE-2022-25636 <https://nvd.nist.gov/vuln/detail/CVE-2022-25636>,
CVE-2022-25375 <https://nvd.nist.gov/vuln/detail/CVE-2022-25375>,
CVE-2022-25258 <https://nvd.nist.gov/vuln/detail/CVE-2022-25258>,
CVE-2022-2503 <https://nvd.nist.gov/vuln/detail/CVE-2022-2503>,
CVE-2022-24959 <https://nvd.nist.gov/vuln/detail/CVE-2022-24959>,
CVE-2022-24958 <https://nvd.nist.gov/vuln/detail/CVE-2022-24958>,
CVE-2022-24448 <https://nvd.nist.gov/vuln/detail/CVE-2022-24448>,
CVE-2022-23960 <https://nvd.nist.gov/vuln/detail/CVE-2022-23960>,
CVE-2022-2380 <https://nvd.nist.gov/vuln/detail/CVE-2022-2380>,
CVE-2022-23222 <https://nvd.nist.gov/vuln/detail/CVE-2022-23222>,
CVE-2022-2318 <https://nvd.nist.gov/vuln/detail/CVE-2022-2318>,
CVE-2022-2308 <https://nvd.nist.gov/vuln/detail/CVE-2022-2308>,
CVE-2022-23042 <https://nvd.nist.gov/vuln/detail/CVE-2022-23042>,
CVE-2022-23041 <https://nvd.nist.gov/vuln/detail/CVE-2022-23041>,
CVE-2022-23040 <https://nvd.nist.gov/vuln/detail/CVE-2022-23040>,
CVE-2022-23039 <https://nvd.nist.gov/vuln/detail/CVE-2022-23039>,
CVE-2022-23038 <https://nvd.nist.gov/vuln/detail/CVE-2022-23038>,
CVE-2022-23037 <https://nvd.nist.gov/vuln/detail/CVE-2022-23037>,
CVE-2022-23036 <https://nvd.nist.gov/vuln/detail/CVE-2022-23036>,
CVE-2022-22942 <https://nvd.nist.gov/vuln/detail/CVE-2022-22942>,
CVE-2022-2196 <https://nvd.nist.gov/vuln/detail/CVE-2022-2196>,
CVE-2022-2153 <https://nvd.nist.gov/vuln/detail/CVE-2022-2153>,
CVE-2022-21505 <https://nvd.nist.gov/vuln/detail/CVE-2022-21505>,
CVE-2022-21499 <https://nvd.nist.gov/vuln/detail/CVE-2022-21499>,
CVE-2022-21166 <https://nvd.nist.gov/vuln/detail/CVE-2022-21166>,
CVE-2022-21125 <https://nvd.nist.gov/vuln/detail/CVE-2022-21125>,
CVE-2022-21123 <https://nvd.nist.gov/vuln/detail/CVE-2022-21123>,
CVE-2022-2078 <https://nvd.nist.gov/vuln/detail/CVE-2022-2078>,
CVE-2022-20572 <https://nvd.nist.gov/vuln/detail/CVE-2022-20572>,
CVE-2022-20566 <https://nvd.nist.gov/vuln/detail/CVE-2022-20566>,
CVE-2022-20423 <https://nvd.nist.gov/vuln/detail/CVE-2022-20423>,
CVE-2022-20422 <https://nvd.nist.gov/vuln/detail/CVE-2022-20422>,
CVE-2022-20421 <https://nvd.nist.gov/vuln/detail/CVE-2022-20421>,
CVE-2022-20369 <https://nvd.nist.gov/vuln/detail/CVE-2022-20369>,
CVE-2022-20368 <https://nvd.nist.gov/vuln/detail/CVE-2022-20368>,
CVE-2022-20158 <https://nvd.nist.gov/vuln/detail/CVE-2022-20158>,
CVE-2022-20008 <https://nvd.nist.gov/vuln/detail/CVE-2022-20008>,
CVE-2022-1998 <https://nvd.nist.gov/vuln/detail/CVE-2022-1998>,
CVE-2022-1976 <https://nvd.nist.gov/vuln/detail/CVE-2022-1976>,
CVE-2022-1975 <https://nvd.nist.gov/vuln/detail/CVE-2022-1975>,
CVE-2022-1974 <https://nvd.nist.gov/vuln/detail/CVE-2022-1974>,
CVE-2022-1973 <https://nvd.nist.gov/vuln/detail/CVE-2022-1973>,
CVE-2022-1943 <https://nvd.nist.gov/vuln/detail/CVE-2022-1943>,
CVE-2022-1882 <https://nvd.nist.gov/vuln/detail/CVE-2022-1882>,
CVE-2022-1852 <https://nvd.nist.gov/vuln/detail/CVE-2022-1852>,
CVE-2022-1789 <https://nvd.nist.gov/vuln/detail/CVE-2022-1789>,
CVE-2022-1734 <https://nvd.nist.gov/vuln/detail/CVE-2022-1734>,
CVE-2022-1729 <https://nvd.nist.gov/vuln/detail/CVE-2022-1729>,
CVE-2022-1679 <https://nvd.nist.gov/vuln/detail/CVE-2022-1679>,
CVE-2022-1671 <https://nvd.nist.gov/vuln/detail/CVE-2022-1671>,
CVE-2022-1652 <https://nvd.nist.gov/vuln/detail/CVE-2022-1652>,
CVE-2022-1651 <https://nvd.nist.gov/vuln/detail/CVE-2022-1651>,
CVE-2022-1516 <https://nvd.nist.gov/vuln/detail/CVE-2022-1516>,
CVE-2022-1462 <https://nvd.nist.gov/vuln/detail/CVE-2022-1462>,
CVE-2022-1353 <https://nvd.nist.gov/vuln/detail/CVE-2022-1353>,
CVE-2022-1263 <https://nvd.nist.gov/vuln/detail/CVE-2022-1263>,
CVE-2022-1205 <https://nvd.nist.gov/vuln/detail/CVE-2022-1205>,
CVE-2022-1204 <https://nvd.nist.gov/vuln/detail/CVE-2022-1204>,
CVE-2022-1199 <https://nvd.nist.gov/vuln/detail/CVE-2022-1199>,
CVE-2022-1198 <https://nvd.nist.gov/vuln/detail/CVE-2022-1198>,
CVE-2022-1184 <https://nvd.nist.gov/vuln/detail/CVE-2022-1184>,
CVE-2022-1158 <https://nvd.nist.gov/vuln/detail/CVE-2022-1158>,
CVE-2022-1055 <https://nvd.nist.gov/vuln/detail/CVE-2022-1055>,
CVE-2022-1048 <https://nvd.nist.gov/vuln/detail/CVE-2022-1048>,
CVE-2022-1016 <https://nvd.nist.gov/vuln/detail/CVE-2022-1016>,
CVE-2022-1015 <https://nvd.nist.gov/vuln/detail/CVE-2022-1015>,
CVE-2022-1012 <https://nvd.nist.gov/vuln/detail/CVE-2022-1012>,
CVE-2022-1011 <https://nvd.nist.gov/vuln/detail/CVE-2022-1011>,
CVE-2022-0995 <https://nvd.nist.gov/vuln/detail/CVE-2022-0995>,
CVE-2022-0847 <https://nvd.nist.gov/vuln/detail/CVE-2022-0847>,
CVE-2022-0742 <https://nvd.nist.gov/vuln/detail/CVE-2022-0742>,
CVE-2022-0617 <https://nvd.nist.gov/vuln/detail/CVE-2022-0617>,
CVE-2022-0516 <https://nvd.nist.gov/vuln/detail/CVE-2022-0516>,
CVE-2022-0500 <https://nvd.nist.gov/vuln/detail/CVE-2022-0500>,
CVE-2022-0494 <https://nvd.nist.gov/vuln/detail/CVE-2022-0494>,
CVE-2022-0492 <https://nvd.nist.gov/vuln/detail/CVE-2022-0492>,
CVE-2022-0487 <https://nvd.nist.gov/vuln/detail/CVE-2022-0487>,
CVE-2022-0435 <https://nvd.nist.gov/vuln/detail/CVE-2022-0435>,
CVE-2022-0433 <https://nvd.nist.gov/vuln/detail/CVE-2022-0433>,
CVE-2022-0382 <https://nvd.nist.gov/vuln/detail/CVE-2022-0382>,
CVE-2022-0330 <https://nvd.nist.gov/vuln/detail/CVE-2022-0330>,
CVE-2022-0185 <https://nvd.nist.gov/vuln/detail/CVE-2022-0185>,
CVE-2022-0168 <https://nvd.nist.gov/vuln/detail/CVE-2022-0168>,
CVE-2022-0002 <https://nvd.nist.gov/vuln/detail/CVE-2022-0002>,
CVE-2022-0001 <https://nvd.nist.gov/vuln/detail/CVE-2022-0001>,
CVE-2021-45469 <https://nvd.nist.gov/vuln/detail/CVE-2021-45469>,
CVE-2021-44879 <https://nvd.nist.gov/vuln/detail/CVE-2021-44879>,
CVE-2021-43976 <https://nvd.nist.gov/vuln/detail/CVE-2021-43976>,
CVE-2021-4197 <https://nvd.nist.gov/vuln/detail/CVE-2021-4197>,
CVE-2021-4155 <https://nvd.nist.gov/vuln/detail/CVE-2021-4155>,
CVE-2021-3923 <https://nvd.nist.gov/vuln/detail/CVE-2021-3923>,
CVE-2021-33655 <https://nvd.nist.gov/vuln/detail/CVE-2021-33655>,
CVE-2021-33135 <https://nvd.nist.gov/vuln/detail/CVE-2021-33135>,
CVE-2021-26401 <https://nvd.nist.gov/vuln/detail/CVE-2021-26401>,
CVE-2020-36516 <https://nvd.nist.gov/vuln/detail/CVE-2020-36516>))
- Go (CVE-2023-39323 <https://nvd.nist.gov/vuln/detail/CVE-2023-39323>,
CVE-2023-39322 <https://nvd.nist.gov/vuln/detail/CVE-2023-39322>,
CVE-2023-39321 <https://nvd.nist.gov/vuln/detail/CVE-2023-39321>,
CVE-2023-39320 <https://nvd.nist.gov/vuln/detail/CVE-2023-39320>,
CVE-2023-39319 <https://nvd.nist.gov/vuln/detail/CVE-2023-39319>,
CVE-2023-39318 <https://nvd.nist.gov/vuln/detail/CVE-2023-39318>,
CVE-2023-29409 <https://nvd.nist.gov/vuln/detail/CVE-2023-29409>,
CVE-2023-29406 <https://nvd.nist.gov/vuln/detail/CVE-2023-29406>,
CVE-2023-29405 <https://nvd.nist.gov/vuln/detail/CVE-2023-29405>,
CVE-2023-29404 <https://nvd.nist.gov/vuln/detail/CVE-2023-29404>,
CVE-2023-29403 <https://nvd.nist.gov/vuln/detail/CVE-2023-29403>,
CVE-2023-29402 <https://nvd.nist.gov/vuln/detail/CVE-2023-29402>)
- OpenSSL (CVE-2023-3446 <https://nvd.nist.gov/vuln/detail/CVE-2023-3446>
, CVE-2023-2975 <https://nvd.nist.gov/vuln/detail/CVE-2023-2975>,
CVE-2023-2650 <https://nvd.nist.gov/vuln/detail/CVE-2023-2650>)
- Python (CVE-2023-41105
<https://nvd.nist.gov/vuln/detail/CVE-2023-41105>, CVE-2023-40217
<https://nvd.nist.gov/vuln/detail/CVE-2023-40217>)
- SDK: Rust (CVE-2023-38497
<https://nvd.nist.gov/vuln/detail/CVE-2023-38497>)
- VMware: open-vm-tools (CVE-2023-20900
<https://nvd.nist.gov/vuln/detail/CVE-2023-20900>, CVE-2023-20867
<https://nvd.nist.gov/vuln/detail/CVE-2023-20867>)
- binutils (CVE-2023-1579
<https://nvd.nist.gov/vuln/detail/CVE-2023-1579>, CVE-2022-4285
<https://nvd.nist.gov/vuln/detail/CVE-2022-4285>, CVE-2022-38533
<https://nvd.nist.gov/vuln/detail/CVE-2022-38533>)
- c-ares (CVE-2023-32067
<https://nvd.nist.gov/vuln/detail/CVE-2023-32067>, CVE-2023-31147
<https://nvd.nist.gov/vuln/detail/CVE-2023-31147>, CVE-2023-31130
<https://nvd.nist.gov/vuln/detail/CVE-2023-31130>, CVE-2023-31124
<https://nvd.nist.gov/vuln/detail/CVE-2023-31124>)
- curl (CVE-2023-38546 <https://nvd.nist.gov/vuln/detail/CVE-2023-38546>
, CVE-2023-38545 <https://nvd.nist.gov/vuln/detail/CVE-2023-38545>,
CVE-2023-38039 <https://nvd.nist.gov/vuln/detail/CVE-2023-38039>,
CVE-2023-28322 <https://nvd.nist.gov/vuln/detail/CVE-2023-28322>,
CVE-2023-28321 <https://nvd.nist.gov/vuln/detail/CVE-2023-28321>,
CVE-2023-28320 <https://nvd.nist.gov/vuln/detail/CVE-2023-28320>,
CVE-2023-28319 <https://nvd.nist.gov/vuln/detail/CVE-2023-28319>)
- git (CVE-2023-29007 <https://nvd.nist.gov/vuln/detail/CVE-2023-29007>,
CVE-2023-25815 <https://nvd.nist.gov/vuln/detail/CVE-2023-25815>,
CVE-2023-25652 <https://nvd.nist.gov/vuln/detail/CVE-2023-25652>)
- glibc (CVE-2023-4911 <https://nvd.nist.gov/vuln/detail/CVE-2023-4911>,
CVE-2023-4806 <https://nvd.nist.gov/vuln/detail/CVE-2023-4806>,
CVE-2023-4527 <https://nvd.nist.gov/vuln/detail/CVE-2023-4527>)
- go (CVE-2023-39325 <https://nvd.nist.gov/vuln/detail/CVE-2023-39325>)
- grub (CVE-2023-4693 <https://nvd.nist.gov/vuln/detail/CVE-2023-4693>,
CVE-2023-4692 <https://nvd.nist.gov/vuln/detail/CVE-2023-4692>,
CVE-2022-3775 <https://nvd.nist.gov/vuln/detail/CVE-2022-3775>,
CVE-2022-28737 <https://nvd.nist.gov/vuln/detail/CVE-2022-28737>,
CVE-2022-28736 <https://nvd.nist.gov/vuln/detail/CVE-2022-28736>,
CVE-2022-28735 <https://nvd.nist.gov/vuln/detail/CVE-2022-28735>,
CVE-2022-28734 <https://nvd.nist.gov/vuln/detail/CVE-2022-28734>,
CVE-2022-28733 <https://nvd.nist.gov/vuln/detail/CVE-2022-28733>,
CVE-2022-2601 <https://nvd.nist.gov/vuln/detail/CVE-2022-2601>,
CVE-2021-3981 <https://nvd.nist.gov/vuln/detail/CVE-2021-3981>,
CVE-2021-3697 <https://nvd.nist.gov/vuln/detail/CVE-2021-3697>,
CVE-2021-3696 <https://nvd.nist.gov/vuln/detail/CVE-2021-3696>,
CVE-2021-3695 <https://nvd.nist.gov/vuln/detail/CVE-2021-3695>,
CVE-2021-20233 <https://nvd.nist.gov/vuln/detail/CVE-2021-20233>,
CVE-2021-20225 <https://nvd.nist.gov/vuln/detail/CVE-2021-20225>,
CVE-2020-27779 <https://nvd.nist.gov/vuln/detail/CVE-2020-27779>,
CVE-2020-27749 <https://nvd.nist.gov/vuln/detail/CVE-2020-27749>,
CVE-2020-25647 <https://nvd.nist.gov/vuln/detail/CVE-2020-25647>,
CVE-2020-25632 <https://nvd.nist.gov/vuln/detail/CVE-2020-25632>,
CVE-2020-14372 <https://nvd.nist.gov/vuln/detail/CVE-2020-14372>,
CVE-2020-10713 <https://nvd.nist.gov/vuln/detail/CVE-2020-10713>)
- intel-microcode (CVE-2023-23908
<https://nvd.nist.gov/vuln/detail/CVE-2023-23908>, CVE-2022-41804
<https://nvd.nist.gov/vuln/detail/CVE-2022-41804>, CVE-2022-40982
<https://nvd.nist.gov/vuln/detail/CVE-2022-40982>)
- libarchive (libarchive-20230729
<https://github.com/libarchive/libarchive/releases/tag/v3.7.1>)
- libcap (CVE-2023-2603 <https://nvd.nist.gov/vuln/detail/CVE-2023-2603>
, CVE-2023-2602 <https://nvd.nist.gov/vuln/detail/CVE-2023-2602>)
- libmicrohttpd (CVE-2023-27371
<https://nvd.nist.gov/vuln/detail/CVE-2023-27371>)
- libtirpc (libtirpc-rhbg-2224666
<http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1d2e10afb2ffc35cb3623f57a15f712359f18e75>
, libtirpc-rhbg-2150611
<http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=f7f0abdf267698de3f74a0285405b1b01f40893b>
, libtirpc-rhbg-2138317
<http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=4a2d85c64110ee9e21a8c4f9dafd6b0ae621506d>
)
- libxml2 (libxml2-20230428
<https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4>)
- lua (CVE-2022-33099 <https://nvd.nist.gov/vuln/detail/CVE-2022-33099>)
- mit-krb5 (CVE-2023-36054
<https://nvd.nist.gov/vuln/detail/CVE-2023-36054>)
- ncurses (CVE-2023-29491
<https://nvd.nist.gov/vuln/detail/CVE-2023-29491>)
- nvidia-drivers (CVE-2023-25516
<https://nvd.nist.gov/vuln/detail/CVE-2023-25516>, CVE-2023-25515
<https://nvd.nist.gov/vuln/detail/CVE-2023-25515>)
- openldap (CVE-2023-2953
<https://nvd.nist.gov/vuln/detail/CVE-2023-2953>)
- procps (CVE-2023-4016 <https://nvd.nist.gov/vuln/detail/CVE-2023-4016>)
- protobuf (CVE-2022-1941
<https://nvd.nist.gov/vuln/detail/CVE-2022-1941>)
- qemu (CVE-2023-2861 <https://nvd.nist.gov/vuln/detail/CVE-2023-2861>,
CVE-2023-0330 <https://nvd.nist.gov/vuln/detail/CVE-2023-0330>)
- samba (CVE-2022-1615 <https://nvd.nist.gov/vuln/detail/CVE-2022-1615>,
CVE-2021-44142 <https://nvd.nist.gov/vuln/detail/CVE-2021-44142>)
- shadow (CVE-2023-29383
<https://nvd.nist.gov/vuln/detail/CVE-2023-29383>)
- sudo (CVE-2023-28487 <https://nvd.nist.gov/vuln/detail/CVE-2023-28487>
, CVE-2023-28486 <https://nvd.nist.gov/vuln/detail/CVE-2023-28486>,
CVE-2023-27320 <https://nvd.nist.gov/vuln/detail/CVE-2023-27320>)
- torcx (CVE-2022-28948 <https://nvd.nist.gov/vuln/detail/CVE-2022-28948>
)
- vim (CVE-2023-2610 <https://nvd.nist.gov/vuln/detail/CVE-2023-2610>,
CVE-2023-2609 <https://nvd.nist.gov/vuln/detail/CVE-2023-2609>,
CVE-2023-2426 <https://nvd.nist.gov/vuln/detail/CVE-2023-2426>)

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Bug-fixes3>Bug fixes

- AWS: Fixed the Amazon SSM agent that was crashing. (Flatcar#1307
<https://github.com/flatcar/Flatcar/issues/1307>)
- Added AWS EKS support for versions 1.24-1.28. Fixed
/usr/share/amazon/eks/download-kubelet.sh to include download paths for
these versions. (scripts#1210
<https://github.com/flatcar/scripts/pull/1210>)
- Fix the RemainAfterExit clause in nvidia.service (Flatcar#1169
<https://github.com/flatcar/Flatcar/issues/1169>)
- Fixed a bug resulting in coreos-cloudinit resetting the instance
hostname to ‘localhost’ if no metadata could be found (
coreos-cloudinit#25 <https://github.com/flatcar/coreos-cloudinit/pull/25>
, Flatcar#1262 <https://github.com/flatcar/Flatcar/issues/1262>), with
contributions from MichaelEischer <https://github.com/MichaelEischer>
- Fixed bug in handling renamed network interfaces when generating login
issue (init#102 <https://github.com/flatcar/init/pull/102>)
- Fixed iterating over the OEM update payload signatures which prevented
the AWS OEM update to 3745.x.y (update-engine#31
<https://github.com/flatcar/update_engine/pull/31>)
- Fixed quotes handling for update-engine (Flatcar#1209
<https://github.com/flatcar/Flatcar/issues/1209>)
- Fixed supplying extension update payloads with a custom base URL in
Nebraska (Flatcar#1281 <https://github.com/flatcar/Flatcar/issues/1281>)
- Fixed the missing /etc/extensions/ symlinks for the inbuilt
Docker/containerd systemd-sysext images on update from Beta 3760.1.0 (
update_engine#32 <https://github.com/flatcar/update_engine/pull/32>)
- Fixed the postinstall hook failure when updating from Azure instances
without OEM systemd-sysext images to Flatcar Alpha 3745.x.y (
update_engine#29 <https://github.com/flatcar/update_engine/pull/29>)
- GCP: Fixed OS Login enabling (scripts#1445
<https://github.com/flatcar/scripts/pull/1445>)
- Made sshkeys.service more robust to only run
coreos-meta...@core.service when not masked and also retry on
failure (init#112 <https://github.com/flatcar/init/pull/112>)

<https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Changes2>Changes

- [image: :warning:] Dropped support for niftycloud and interoute. For
interoute we haven’t been generating the images for some time already. (
scripts#971 <https://github.com/flatcar/scripts/pull/971>) [image:
:warning:]
- AWS OEM images now use a systemd-sysext image for layering additional
platform-specific software on top of /usr
- Added TLS Kernel module (scripts#865
<https://github.com/flatcar/scripts/pull/865>)
- Added support for multipart MIME userdata in coreos-cloudinit.
Ignition now detects multipart userdata and delegates execution to
coreos-cloudinit. (scripts#873)
- Azure and QEMU OEM images now use systemd-sysext images for layering
additional platform-specific software on top of /usr. For Azure images
this also means that the image has a normal Python installation available
through the sysext image. The OEM software is still not updated but this
will be added soon.
- Change nvidia.service to type oneshot (from the default “simple”) so
the subsequent services (configured with “Requires/After”) are executed
after the driver installation is successfully finished
(flatcar/Flatcar#1136)
- Enabled the virtio GPU driver (scripts#830
<https://github.com/flatcar/scripts/pull/830>)
- Migrate to Type=notify in containerd.service. Changed the unit to
Type=notify, utilizing the existing containerd support for sd_notify call
after socket setup.
- Migrated the NVIDIA installer from the Azure/AWS OEM partition to /usr to
make it available on all platforms (scripts#932
<https://github.com/flatcar/scripts/pull/932/>, Flatcar#1077
<https://github.com/flatcar/Flatcar/issues/1077>)
- Moved a mountpoint of the OEM partition from /usr/share/oem to /oem.
/usr/share/oem became a symlink to /oem for backward compatibility.
Despite the move, the initrd images providing files through
/usr/share/oem should keep using /usr/share/oem. The move was done to
enable activating the OEM sysext images that are placed in the OEM
partition.
- OEM vendor tools are now A/B updated if they are shipped as
systemd-sysext images, the migration happens when both partitions require a
systemd-sysext OEM image - note that this will delete the nvidia.service
from /etc on Azure because it’s now part of /usr (Flatcar#60
<