Hello,
We are pleased to announce a new Flatcar Container Linux release for the
Alpha, Beta, Stable channel.
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Alpha-3850001>Alpha 3850.0.0
*Changes since Alpha 3815.0.0*
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Security-fixes>Security
fixes:
- Linux (CVE-2022-27672 <
https://nvd.nist.gov/vuln/detail/CVE-2022-27672>
, CVE-2022-40982 <
https://nvd.nist.gov/vuln/detail/CVE-2022-40982>,
CVE-2022-4269 <
https://nvd.nist.gov/vuln/detail/CVE-2022-4269>,
CVE-2022-45886 <
https://nvd.nist.gov/vuln/detail/CVE-2022-45886>,
CVE-2022-45887 <
https://nvd.nist.gov/vuln/detail/CVE-2022-45887>,
CVE-2022-45919 <
https://nvd.nist.gov/vuln/detail/CVE-2022-45919>,
CVE-2022-48425 <
https://nvd.nist.gov/vuln/detail/CVE-2022-48425>,
CVE-2023-0160 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0160>,
CVE-2023-0459 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0459>,
CVE-2023-1032 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1032>,
CVE-2023-1076 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1076>,
CVE-2023-1077 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1077>,
CVE-2023-1079 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1079>,
CVE-2023-1118 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1118>,
CVE-2023-1192 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1192>,
CVE-2023-1193 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1193>,
CVE-2023-1194 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1194>,
CVE-2023-1206 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1206>,
CVE-2023-1281 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1281>,
CVE-2023-1380 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1380>,
CVE-2023-1513 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1513>,
CVE-2023-1583 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1583>,
CVE-2023-1611 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1611>,
CVE-2023-1670 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1670>,
CVE-2023-1829 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1829>,
CVE-2023-1855 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1855>,
CVE-2023-1859 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1859>,
CVE-2023-1989 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1989>,
CVE-2023-1990 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1990>,
CVE-2023-1998 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1998>,
CVE-2023-2002 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2002>,
CVE-2023-20569 <
https://nvd.nist.gov/vuln/detail/CVE-2023-20569>,
CVE-2023-20588 <
https://nvd.nist.gov/vuln/detail/CVE-2023-20588>,
CVE-2023-20593 <
https://nvd.nist.gov/vuln/detail/CVE-2023-20593>,
CVE-2023-2124 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2124>,
CVE-2023-21255 <
https://nvd.nist.gov/vuln/detail/CVE-2023-21255>,
CVE-2023-21264 <
https://nvd.nist.gov/vuln/detail/CVE-2023-21264>,
CVE-2023-2156 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2156>,
CVE-2023-2163 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2163>,
CVE-2023-2194 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2194>,
CVE-2023-2235 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2235>,
CVE-2023-2269 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2269>,
CVE-2023-25012 <
https://nvd.nist.gov/vuln/detail/CVE-2023-25012>,
CVE-2023-25775 <
https://nvd.nist.gov/vuln/detail/CVE-2023-25775>,
CVE-2023-2598 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2598>,
CVE-2023-26545 <
https://nvd.nist.gov/vuln/detail/CVE-2023-26545>,
CVE-2023-28466 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28466>,
CVE-2023-28866 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28866>,
CVE-2023-2898 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2898>,
CVE-2023-2985 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2985>,
CVE-2023-30456 <
https://nvd.nist.gov/vuln/detail/CVE-2023-30456>,
CVE-2023-30772 <
https://nvd.nist.gov/vuln/detail/CVE-2023-30772>,
CVE-2023-3090 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3090>,
CVE-2023-31085 <
https://nvd.nist.gov/vuln/detail/CVE-2023-31085>,
CVE-2023-31248 <
https://nvd.nist.gov/vuln/detail/CVE-2023-31248>,
CVE-2023-3141 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3141>,
CVE-2023-31436 <
https://nvd.nist.gov/vuln/detail/CVE-2023-31436>,
CVE-2023-3212 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3212>,
CVE-2023-3220 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3220>,
CVE-2023-32233 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32233>,
CVE-2023-32233 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32233>,
CVE-2023-32247 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32247>,
CVE-2023-32248 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32248>,
CVE-2023-32250 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32250>,
CVE-2023-32252 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32252>,
CVE-2023-32254 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32254>,
CVE-2023-32257 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32257>,
CVE-2023-32258 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32258>,
CVE-2023-3268 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3268>,
CVE-2023-3269 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3269>,
CVE-2023-3312 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3312>,
CVE-2023-3317 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3317>,
CVE-2023-33203 <
https://nvd.nist.gov/vuln/detail/CVE-2023-33203>,
CVE-2023-33250 <
https://nvd.nist.gov/vuln/detail/CVE-2023-33250>,
CVE-2023-33288 <
https://nvd.nist.gov/vuln/detail/CVE-2023-33288>,
CVE-2023-3355 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3355>,
CVE-2023-3390 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3390>,
CVE-2023-33951 <
https://nvd.nist.gov/vuln/detail/CVE-2023-33951>,
CVE-2023-33951 <
https://nvd.nist.gov/vuln/detail/CVE-2023-33951>,
CVE-2023-33952 <
https://nvd.nist.gov/vuln/detail/CVE-2023-33952>,
CVE-2023-34256 <
https://nvd.nist.gov/vuln/detail/CVE-2023-34256>,
CVE-2023-34319 <
https://nvd.nist.gov/vuln/detail/CVE-2023-34319>,
CVE-2023-34324 <
https://nvd.nist.gov/vuln/detail/CVE-2023-34324>,
CVE-2023-35001 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35001>,
CVE-2023-35788 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35788>,
CVE-2023-35823 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35823>,
CVE-2023-35824 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35824>,
CVE-2023-35826 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35826>,
CVE-2023-35826 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35826>,
CVE-2023-35827 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35827>,
CVE-2023-35828 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35828>,
CVE-2023-35829 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35829>,
CVE-2023-3609 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3609>,
CVE-2023-3610 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3610>,
CVE-2023-3611 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3611>,
CVE-2023-37453 <
https://nvd.nist.gov/vuln/detail/CVE-2023-37453>,
CVE-2023-3772 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3772>,
CVE-2023-3773 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3773>,
CVE-2023-3776 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3776>,
CVE-2023-3777 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3777>,
CVE-2023-38409 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38409>,
CVE-2023-38426 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38426>,
CVE-2023-38427 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38427>,
CVE-2023-38428 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38428>,
CVE-2023-38429 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38429>,
CVE-2023-38430 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38430>,
CVE-2023-38431 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38431>,
CVE-2023-38432 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38432>,
CVE-2023-3863 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3863>,
CVE-2023-3865 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3865>,
CVE-2023-3866 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3866>,
CVE-2023-3867 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3867>,
CVE-2023-39189 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39189>,
CVE-2023-39191 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39191>,
CVE-2023-39192 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39192>,
CVE-2023-39192 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39192>,
CVE-2023-39193 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39193>,
CVE-2023-39194 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39194>,
CVE-2023-39197 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39197>,
CVE-2023-39198 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39198>,
CVE-2023-4004 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4004>,
CVE-2023-4015 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4015>,
CVE-2023-40283 <
https://nvd.nist.gov/vuln/detail/CVE-2023-40283>,
CVE-2023-40791 <
https://nvd.nist.gov/vuln/detail/CVE-2023-40791>,
CVE-2023-4132 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4132>,
CVE-2023-4133 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4133>,
CVE-2023-4134 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4134>,
CVE-2023-4147 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4147>,
CVE-2023-4155 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4155>,
CVE-2023-4194 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4194>,
CVE-2023-4206 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4206>,
CVE-2023-4207 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4207>,
CVE-2023-4208 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4208>,
CVE-2023-4244 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4244>,
CVE-2023-4273 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4273>,
CVE-2023-42752 <
https://nvd.nist.gov/vuln/detail/CVE-2023-42752>,
CVE-2023-42752 <
https://nvd.nist.gov/vuln/detail/CVE-2023-42752>,
CVE-2023-42753 <
https://nvd.nist.gov/vuln/detail/CVE-2023-42753>,
CVE-2023-42754 <
https://nvd.nist.gov/vuln/detail/CVE-2023-42754>,
CVE-2023-42756 <
https://nvd.nist.gov/vuln/detail/CVE-2023-42756>,
CVE-2023-44466 <
https://nvd.nist.gov/vuln/detail/CVE-2023-44466>,
CVE-2023-4569 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4569>,
CVE-2023-45862 <
https://nvd.nist.gov/vuln/detail/CVE-2023-45862>,
CVE-2023-45863 <
https://nvd.nist.gov/vuln/detail/CVE-2023-45863>,
CVE-2023-45871 <
https://nvd.nist.gov/vuln/detail/CVE-2023-45871>,
CVE-2023-45871 <
https://nvd.nist.gov/vuln/detail/CVE-2023-45871>,
CVE-2023-45898 <
https://nvd.nist.gov/vuln/detail/CVE-2023-45898>,
CVE-2023-4611 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4611>,
CVE-2023-4623 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4623>,
CVE-2023-46813 <
https://nvd.nist.gov/vuln/detail/CVE-2023-46813>,
CVE-2023-46862 <
https://nvd.nist.gov/vuln/detail/CVE-2023-46862>,
CVE-2023-4921 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4921>,
CVE-2023-5090 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5090>,
CVE-2023-5158 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5158>,
CVE-2023-51779 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51779>,
CVE-2023-51780 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51780>,
CVE-2023-51781 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51781>,
CVE-2023-51782 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51782>,
CVE-2023-5197 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5197>,
CVE-2023-5345 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5345>,
CVE-2023-5633 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5633>,
CVE-2023-5717 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5717>,
CVE-2023-5972 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5972>,
CVE-2023-6039 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6039>,
CVE-2023-6111 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6111>,
CVE-2023-6121 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6121>,
CVE-2023-6176 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6176>,
CVE-2023-6531 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6531>,
CVE-2023-6546 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6546>,
CVE-2023-6560 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6560>,
CVE-2023-6606 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6606>,
CVE-2023-6622 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6622>,
CVE-2023-6817 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6817>,
CVE-2023-6931 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6931>,
CVE-2023-6932 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6932>,
CVE-2023-7192 <
https://nvd.nist.gov/vuln/detail/CVE-2023-7192>,
CVE-2024-0193 <
https://nvd.nist.gov/vuln/detail/CVE-2024-0193>,
CVE-2024-0443 <
https://nvd.nist.gov/vuln/detail/CVE-2024-0443>)
- binutils (CVE-2023-1972
<
https://nvd.nist.gov/vuln/detail/CVE-2023-1972>)
- curl (CVE-2023-46218 <
https://nvd.nist.gov/vuln/detail/CVE-2023-46218>
, CVE-2023-46219 <
https://nvd.nist.gov/vuln/detail/CVE-2023-46219>)
- gnutls (CVE-2023-5981 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5981>)
- intel-microcode (CVE-2023-23583
<
https://nvd.nist.gov/vuln/detail/CVE-2023-23583>)
- libxml2 (CVE-2023-45322
<
https://nvd.nist.gov/vuln/detail/CVE-2023-45322>)
- openssh (CVE-2023-48795
<
https://nvd.nist.gov/vuln/detail/CVE-2023-48795>, CVE-2023-51384
<
https://nvd.nist.gov/vuln/detail/CVE-2023-51384>, CVE-2023-51385
<
https://nvd.nist.gov/vuln/detail/CVE-2023-51385>)
- openssl (CVE-2023-3817 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3817>
, CVE-2023-5363 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5363>,
CVE-2023-5678 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5678>)
- perl (CVE-2023-47038 <
https://nvd.nist.gov/vuln/detail/CVE-2023-47038>)
- traceroute (CVE-2023-46316
<
https://nvd.nist.gov/vuln/detail/CVE-2023-46316>)
- vim (CVE-2023-5344 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5344>,
CVE-2023-5441 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5441>,
CVE-2023-5535 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5535>,
CVE-2023-46246 <
https://nvd.nist.gov/vuln/detail/CVE-2023-46246>)
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Bug-fixes>Bug fixes:
- AWS: Fixed the Amazon SSM agent that was crashing. (Flatcar#1307
<
https://github.com/flatcar/Flatcar/issues/1307>)
- Fixed a bug resulting in coreos-cloudinit resetting the instance
hostname to ‘localhost’ if no metadata could be found (
coreos-cloudinit#25 <
https://github.com/flatcar/coreos-cloudinit/pull/25>
, Flatcar#1262 <
https://github.com/flatcar/Flatcar/issues/1262>), with
contributions from MichaelEischer <
https://github.com/MichaelEischer>
- Fixed supplying extension update payloads with a custom base URL in
Nebraska (Flatcar#1281 <
https://github.com/flatcar/Flatcar/issues/1281>)
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Changes>Changes:
- Update generation SLSA provenance info from v0.2 to v1.0.
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Updates>Updates:
- Go (1.20.13 <
https://go.dev/doc/devel/release#go1.20.13>)
- Linux (6.6.12 <
https://lwn.net/Articles/958342> (includes 6.6.11
<
https://lwn.net/Articles/957375>, 6.6.10
<
https://lwn.net/Articles/957008>, 6.6.9
<
https://lwn.net/Articles/956525>, 6.6.8
<
https://lwn.net/Articles/955813>, 6.6.7
<
https://lwn.net/Articles/954990/> and 6.6
<
https://kernelnewbies.org/Linux_6.6>)
- Linux Firmware (20231211
<
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231211>
)
- bash (5.2_p21
<
https://git.savannah.gnu.org/cgit/bash.git/log/?id=2bb3cbefdb8fd019765b1a9cc42ecf37ff22fec6>
)
- binutils (2.41
<
https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00009.html>)
- bpftool (6.5.7
<
https://kernelnewbies.org/Linux_6.5#Tracing.2C_perf_and_BPF>)
- c-ares (1.21.0 <
https://c-ares.org/changelog.html#1_21_0>)
- ca-certificates (3.96.1
<
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html>
(includes 3.96
<
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html>
))
- containerd (1.7.11
<
https://github.com/containerd/containerd/releases/tag/v1.7.11>)
- coreutils (9.4
<
https://lists.gnu.org/archive/html/info-gnu/2023-08/msg00007.html>)
- curl (8.5.0 <
https://curl.se/changes.html#8_5_0>)
- elfutils (0.190
<
https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=0420d3b8376877c1b11712f1aad90a2e2b6f6d06;hb=c1058da5a450e33e72b72abb53bc3ffd7f6b361b>
)
- gawk (5.3.0 <
https://lwn.net/Articles/949829/>)
- gettext (0.22.4 <
https://savannah.gnu.org/news/?id=10544>)
- glib (2.78.3 <
https://gitlab.gnome.org/GNOME/glib/-/blob/2.78.3/NEWS>)
- gnutls (3.8.2
<
https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html>
)
- groff (1.23.0
<
https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00001.html>)
- hwdata (0.376 <
https://github.com/vcrhonek/hwdata/commits/v0.376>)
- intel-microcode (20231114_p20231114
<
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20231114>
)
- iproute2 (6.6.0
<
https://marc.info/?l=linux-netdev&m=169929000929786&w=2>)
- ipset (7.19
<
https://git.netfilter.org/ipset/tree/ChangeLog?id=ce6db35a0ea950e850ebe7c50ce46908c1c3bb2b>
)
- jq (1.7.1 <
https://github.com/jqlang/jq/releases/tag/jq-1.7.1>
(includes 1.7 <
https://github.com/jqlang/jq/releases/tag/jq-1.7>))
- kbd (2.6.4 <
https://github.com/legionus/kbd/releases/tag/v2.6.4>)
- kmod (31 <
https://github.com/kmod-project/kmod/blob/v31/NEWS>)
- libarchive (3.7.2
<
https://github.com/libarchive/libarchive/releases/tag/v3.7.2>)
- libdnet (1.16.4
<
https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.4>)
- libksba (1.6.5
<
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=369cfb5d91bf232685a6c5b156453a624e11ed67;hb=7b3e4785e54280d1a13c5bc839bdc6722d898ac7>
)
- libnsl (2.0.1 <
https://github.com/thkukuk/libnsl/releases/tag/v2.0.1>)
- lsof (4.99.0
<
https://github.com/lsof-org/lsof/blob/4.99.0/00DIST#L5523>)
- lz4 (1.9.4 <
https://github.com/lz4/lz4/releases/tag/v1.9.4>)
- openssh (9.6p1 <
https://www.openssh.com/releasenotes.html#9.6p1>)
- openssl (3.0.12
<
https://github.com/openssl/openssl/blob/openssl-3.0.12/NEWS.md#major-changes-between-openssl-3011-and-openssl-3012-24-oct-2023>
)
- readline (8.2_p7
<
https://git.savannah.gnu.org/cgit/readline.git/log/?id=bfe9c573a9e376323929c80b2b71c59727fab0cc>
)
- selinux-base (2.20231002
<
https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- selinux-base-policy (2.20231002
<
https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- selinux-container (2.20231002
<
https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- selinux-dbus (2.20231002
<
https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- selinux-sssd (2.20231002
<
https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- selinux-unconfined (2.20231002
<
https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20231002>
)
- sqlite (3.44.2 <
https://www.sqlite.org/releaselog/3_44_2.html>)
- strace (6.6 <
https://github.com/strace/strace/releases/tag/v6.6>)
- traceroute (2.1.3
<
https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/>
)
- usbutils (016
<
https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/tree/NEWS?h=v016>
)
- util-linux (2.39.2
<
https://github.com/util-linux/util-linux/blob/v2.39.2/Documentation/releases/v2.39.2-ReleaseNotes>
)
- vim (9.0.2092 <
https://github.com/vim/vim/commits/v9.0.2092/>)
- whois (5.5.20
<
https://github.com/rfc1036/whois/blob/v5.5.20/debian/changelog>)
- xmlsec (1.3.2
<
https://github.com/lsh123/xmlsec/releases/tag/xmlsec_1_3_2>)
- xz-utils (5.4.5
<
https://github.com/tukaani-project/xz/releases/tag/v5.4.5>)
- zlib (1.3 <
https://github.com/madler/zlib/releases/tag/v1.3>)
- SDK: gentoolkit (0.6.3
<
https://gitweb.gentoo.org/proj/gentoolkit.git/log/?h=gentoolkit-0.6.3>)
- SDK: libxslt (1.1.39
<
https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.39>)
- SDK: perl (5.38.2 <
https://perldoc.perl.org/5.38.2/perldelta>)
- SDK: portage (3.0.59
<
https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.59>)
- SDK: python (3.11.7
<
https://www.python.org/downloads/release/python-3117/>)
- SDK: repo (2.37)
- SDK: Rust (1.75.0
<
https://github.com/rust-lang/rust/releases/tag/1.75.0> (includes 1.74.1
<
https://github.com/rust-lang/rust/releases/tag/1.74.1>))
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Beta-3815101>Beta 3815.1.0
*Changes since Beta 3760.1.1*
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Security-fixes1>Security
fixes:
- Linux (CVE-2023-1193 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1193>,
CVE-2023-51779 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51779>,
CVE-2023-51780 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51780>,
CVE-2023-51781 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51781>,
CVE-2023-51782 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51782>,
CVE-2023-6531 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6531>,
CVE-2023-6606 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6606>,
CVE-2023-6622 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6622>,
CVE-2023-6817 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6817>,
CVE-2023-6931 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6931>)
- Go (CVE-2023-39326 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39326>,
CVE-2023-45285 <
https://nvd.nist.gov/vuln/detail/CVE-2023-45285>)
- VMWare: open-vm-tools (CVE-2023-34058
<
https://nvd.nist.gov/vuln/detail/CVE-2023-34058>, CVE-2023-34059
<
https://nvd.nist.gov/vuln/detail/CVE-2023-34059>)
- nghttp2 (CVE-2023-44487
<
https://nvd.nist.gov/vuln/detail/CVE-2023-44487>)
- samba (CVE-2023-4091 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4091>)
- zlib (CVE-2023-45853 <
https://nvd.nist.gov/vuln/detail/CVE-2023-45853>)
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Bug-fixes1>Bug fixes:
- AWS: Fixed the Amazon SSM agent that was crashing. (Flatcar#1307
<
https://github.com/flatcar/Flatcar/issues/1307>)
- Fixed a bug resulting in coreos-cloudinit resetting the instance
hostname to ‘localhost’ if no metadata could be found (
coreos-cloudinit#25 <
https://github.com/flatcar/coreos-cloudinit/pull/25>
, Flatcar#1262 <
https://github.com/flatcar/Flatcar/issues/1262>), with
contributions from MichaelEischer <
https://github.com/MichaelEischer>
- Fixed supplying extension update payloads with a custom base URL in
Nebraska (Flatcar#1281 <
https://github.com/flatcar/Flatcar/issues/1281>)
- Set TTY used for fetching server_context to RAW mode before running
cloudinit on cloudsigma (scripts#1280
<
https://github.com/flatcar/scripts/pull/1280>)
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Changes1>Changes:
- Torcx, the mechanism to provide a custom Docker version, was replaced
by systemd-sysext in the OS image. Learn more about sysext and how to
customise OS images here
<
https://www.flatcar.org/docs/latest/provisioning/sysext/> and read the
blogpost about the replacement here
<
https://www.flatcar.org/blog/2023/12/extending-flatcar-say-goodbye-to-torcx-and-hello-to-systemd-sysext/>
.
- Torcx entered deprecation 2 years ago in favour of deploying plain
Docker binaries
<
https://www.flatcar.org/docs/latest/container-runtimes/use-a-custom-docker-or-containerd-version/>
(which is now also a legacy option because systemd-sysext offers a
more robust and better structured way of customisation, including OS
independent updates).
- Torcx has been removed entirely; if you use Torcx to extend the
Flatcar base OS image, please refer to our conversion script
<
https://www.flatcar.org/docs/latest/provisioning/sysext/#torcx-deprecation> and
to the sysext documentation mentioned above for migrating.
- Consequently, update_engine will not perform torcx sanity checks
post-update anymore.
- Relevant changes: scripts#1216
<
https://github.com/flatcar/scripts/pull/1216>, update_engine#30
<
https://github.com/flatcar/update_engine/pull/30>, Mantle#466
<
https://github.com/flatcar/mantle/pull/466>, Mantle#465
<
https://github.com/flatcar/mantle/pull/465>.
- cri-tools, runc, containerd, docker, and docker-cli are now built from
Gentoo upstream ebuilds. Docker received a major version upgrade - it was
updated to Docker 24 (from Docker 20; see “updates”).
- NOTE: The docker btrfs storage driver has been de-prioritised;
BTRFS backed storage will now default to the overlay2 driver
(changelog
<
https://docs.docker.com/engine/release-notes/23.0/#bug-fixes-and-enhancements-6>
, upstream pr <
https://github.com/moby/moby/pull/42661>).
Using the btrfs driver can still be enforced by creating a respective docker
config
<
https://docs.docker.com/storage/storagedriver/btrfs-driver/#configure-docker-to-use-the-btrfs-storage-driver>
at /etc/docker/daemon.json.
- NOTE: If you are already using btrfs-backed Docker storage and are
upgrading to this new version, Docker will automatically use the btrfs storage
driver for backwards-compatibility with your deployment.
- Docker will remove the btrfs driver entirely in a future
version. Please consider migrating your deployments to the overlay2
driver.
- GCP OEM images now use a systemd-sysext image for layering
additional platform-specific software on top of /usr and being part of
the OEM A/B updates (flatcar#1146
<
https://github.com/flatcar/Flatcar/issues/1146>)
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Updates1>Updates:
- Azure: WALinuxAgent (v2.9.1.1
<
https://github.com/Azure/WALinuxAgent/releases/tag/v2.9.1.1>)
- DEV, AZURE: python (3.11.6
<
https://docs.python.org/release/3.11.6/whatsnew/changelog.html#python-3-11-6>
)
- DEV: iperf (3.15 <
https://github.com/esnet/iperf/releases/tag/3.15>)
- DEV: smartmontools (7.4
<
https://www.smartmontools.org/browser/tags/RELEASE_7_4/smartmontools/NEWS>
)
- Go (1.20.12 <
https://go.dev/doc/devel/release#go1.20.12> (includes
1.20.11 <
https://go.dev/doc/devel/release#go1.20.11>))
- Linux (6.1.73 <
https://lwn.net/Articles/958343> (includes 6.1.72
<
https://lwn.net/Articles/957376>, 6.1.71
<
https://lwn.net/Articles/957009>, 6.1.70
<
https://lwn.net/Articles/956526>, 6.1.69
<
https://lwn.net/Articles/955814>, 6.1.68
<
https://lwn.net/Articles/954989/>, 6.1.67
<
https://lwn.net/Articles/954455>, 6.1.60
<
https://lwn.net/Articles/948817> and 6.1.59
<
https://lwn.net/Articles/948297>))
- Linux Firmware (20231111
<
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231111>
(includes 20231030
<
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20231030>
))
- SDK: Rust (1.73.0
<
https://github.com/rust-lang/rust/releases/tag/1.73.0>)
- SDK: python packaging (23.2
<
https://github.com/pypa/packaging/releases/tag/23.2>), platformdirs (
3.11.0 <
https://github.com/platformdirs/platformdirs/releases/tag/3.11.0>
)
- VMWare: open-vm-tools (12.3.5
<
https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.5>)
- acpid (2.0.34
<
https://sourceforge.net/p/acpid2/code/ci/2.0.34/tree/Changelog>)
- ca-certificates (3.96.1
<
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html>
(includes 3.96
<
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html>
))
- containerd (1.7.10
<
https://github.com/containerd/containerd/releases/tag/v1.7.10> includes
(1.7.9 <
https://github.com/containerd/containerd/releases/tag/v1.7.9>
and 1.7.8 <
https://github.com/containerd/containerd/releases/tag/v1.7.8>
))
- cri-tools (1.27.0
<
https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.27.0>)
- ding-libs (0.6.2 <
https://github.com/SSSD/ding-libs/releases/tag/0.6.2>
)
- docker (24.0.6 <
https://docs.docker.com/engine/release-notes/24.0/>,
includes changes from 23.0
<
https://docs.docker.com/engine/release-notes/23.0/>)
- efibootmgr (18 <
https://github.com/rhboot/efibootmgr/releases/tag/18>)
- efivar (38 <
https://github.com/rhboot/efivar/releases/tag/38>)
- ethtool (6.5
<
https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.5>
)
- hwdata (0.375 <
https://github.com/vcrhonek/hwdata/releases/tag/v0.375> includes
(0.374 <
https://github.com/vcrhonek/hwdata/commits/v0.374>))
- iproute2 (6.5.0
<
https://marc.info/?l=linux-netdev&m=169401822317373&w=2>)
- ipvsadm (1.31
<
https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.31>
(includes 1.28
<
https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.28>
, 1.29
<
https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.29>
and 1.30
<
https://git.kernel.org/pub/scm/utils/kernel/ipvsadm/ipvsadm.git/tag/?h=v1.30>
))
- json-c (0.17
<
https://github.com/json-c/json-c/blob/json-c-0.17-20230812/ChangeLog>)
- libffi (3.4.4 <
https://github.com/libffi/libffi/releases/tag/v3.4.4>
(includes 3.4.2 <
https://github.com/libffi/libffi/releases/tag/v3.4.2>
and 3.4.3 <
https://github.com/libffi/libffi/releases/tag/v3.4.3>))
- liblinear (246)
- libmnl (1.0.5 <
https://git.netfilter.org/libmnl/log/?h=libmnl-1.0.5>)
- libnetfilter_conntrack (1.0.9
<
https://git.netfilter.org/libnetfilter_conntrack/log/?h=libnetfilter_conntrack-1.0.9>
)
- libnetfilter_cthelper (1.0.1
<
https://git.netfilter.org/libnetfilter_cthelper/log/?id=8cee0347cc6969c39bb64000dfaa676a8f9e30f0>
)
- libnetfilter_cttimeout (1.0.1
<
https://git.netfilter.org/libnetfilter_cttimeout/log/?id=068d36d6291f53a0a609ab1f695aa06e94ce3d30>
)
- libnfnetlink (1.0.2
<
https://git.netfilter.org/libnfnetlink/log/?h=libnfnetlink-1.0.2>)
- libsodium (1.0.19
<
https://github.com/jedisct1/libsodium/releases/tag/1.0.19-RELEASE>)
- libunistring (1.1
<
https://git.savannah.gnu.org/gitweb/?p=libunistring.git;a=blob;f=NEWS;h=5a43ddd7011d62a952733f6c0b7ad52aa4f385c7;hb=8006860b710aae2e8442088c3ddc7d819dfa8ac7>
)
- libunwind (1.7.2
<
https://github.com/libunwind/libunwind/releases/tag/v1.7.2> (includes
1.7.0 <
https://github.com/libunwind/libunwind/releases/tag/v1.7.0>))
- liburing (2.3
<
https://github.com/axboe/liburing/blob/liburing-2.3/CHANGELOG>)
- mpc (1.3.1
<
https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00049.html>
(includes 1.3.0
<
https://sympa.inria.fr/sympa/arc/mpc-discuss/2022-12/msg00028.html>)
- mpfr (4.2.1 <
https://gitlab.inria.fr/mpfr/mpfr/-/blob/4.2.1/NEWS>)
- nghttp2 (1.57.0
<
https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0> (includes
1.52.0 <
https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0>, 1.53.0
<
https://github.com/nghttp2/nghttp2/releases/tag/v1.53.0>, 1.54.0
<
https://github.com/nghttp2/nghttp2/releases/tag/v1.54.0>, 1.55.0
<
https://github.com/nghttp2/nghttp2/releases/tag/v1.55.0>, 1.55.1
<
https://github.com/nghttp2/nghttp2/releases/tag/v1.55.1> and 1.56.0
<
https://github.com/nghttp2/nghttp2/releases/tag/v1.56.0>))
- nspr (4.35
<
https://hg.mozilla.org/projects/nspr/log/b563bfc16c887c48b038b7b441fcc4e40a126d3b>
)
- ntp (4.2.8p17
<
https://www.ntp.org/support/securitynotice/4_2_8p17-release-announcement/>
)
- nvme-cli (v2.6
<
https://github.com/linux-nvme/nvme-cli/releases/tag/v2.6>, libnvme v1.6
<
https://github.com/linux-nvme/libnvme/releases/tag/v1.6>)
- protobuf (21.12
<
https://github.com/protocolbuffers/protobuf/releases/tag/v21.12>
(includes 21.10
<
https://github.com/protocolbuffers/protobuf/releases/tag/v21.10> and
21.11 <
https://github.com/protocolbuffers/protobuf/releases/tag/v21.11>))
- samba (4.18.8 <
https://www.samba.org/samba/history/samba-4.18.8.html>)
- sqlite (3.43.2 <
https://www.sqlite.org/releaselog/3_43_2.html>)
- squashfs-tools (4.6.1
<
https://github.com/plougher/squashfs-tools/releases/tag/4.6.1>
(includes 4.6
<
https://github.com/plougher/squashfs-tools/releases/tag/4.6>))
- thin-provisioning-tools (1.0.6
<
https://github.com/jthornber/thin-provisioning-tools/blob/v1.0.6/CHANGES>
)
*Changes since Alpha 3815.0.0*
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Security-fixes2>Security
fixes:
- Linux (CVE-2023-1193 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1193>,
CVE-2023-51779 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51779>,
CVE-2023-51780 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51780>,
CVE-2023-51781 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51781>,
CVE-2023-51782 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51782>,
CVE-2023-6531 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6531>,
CVE-2023-6606 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6606>,
CVE-2023-6622 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6622>,
CVE-2023-6817 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6817>,
CVE-2023-6931 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6931>)
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Bug-fixes2>Bug fixes:
- AWS: Fixed the Amazon SSM agent that was crashing. (Flatcar#1307
<
https://github.com/flatcar/Flatcar/issues/1307>)
- Fixed a bug resulting in coreos-cloudinit resetting the instance
hostname to ‘localhost’ if no metadata could be found (
coreos-cloudinit#25 <
https://github.com/flatcar/coreos-cloudinit/pull/25>
, Flatcar#1262 <
https://github.com/flatcar/Flatcar/issues/1262>), with
contributions from MichaelEischer <
https://github.com/MichaelEischer>
- Fixed supplying extension update payloads with a custom base URL in
Nebraska (Flatcar#1281 <
https://github.com/flatcar/Flatcar/issues/1281>)
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Updates2>Updates:
- Linux (6.1.73 <
https://lwn.net/Articles/958343> (includes 6.1.72
<
https://lwn.net/Articles/957376>, 6.1.71
<
https://lwn.net/Articles/957009>, 6.1.70
<
https://lwn.net/Articles/956526>, 6.1.69
<
https://lwn.net/Articles/955814>, 6.1.68
<
https://lwn.net/Articles/954989/> and 6.1.67
<
https://lwn.net/Articles/954455>))
- ca-certificates (3.96.1
<
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96_1.html>
(includes 3.96
<
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_96.html>
))
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Stable-3760201>Stable
3760.2.0
⚠️ From Alpha 3794.0.0 Torcx has been removed - please assert that you
don’t rely on specific Torcx mechanism but now use systemd-sysext. See here
<
https://www.flatcar.org/docs/latest/provisioning/sysext/> for more
information.
Changes since Stable-3602.2.3
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Security-fixes3>Security
fixes
- Linux (CVE-2023-7192 <
https://nvd.nist.gov/vuln/detail/CVE-2023-7192>
(includes CVE-2023-6932 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6932>
, CVE-2023-6931 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6931>,
CVE-2023-6817 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6817>,
CVE-2023-6622 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6622>,
CVE-2023-6606 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6606>,
CVE-2023-6546 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6546>,
CVE-2023-6531 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6531>,
CVE-2023-6176 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6176>,
CVE-2023-6121 <
https://nvd.nist.gov/vuln/detail/CVE-2023-6121>,
CVE-2023-5717 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5717>,
CVE-2023-5345 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5345>,
CVE-2023-5197 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5197>,
CVE-2023-51782 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51782>,
CVE-2023-51781 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51781>,
CVE-2023-51780 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51780>,
CVE-2023-51779 <
https://nvd.nist.gov/vuln/detail/CVE-2023-51779>,
CVE-2023-5158 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5158>,
CVE-2023-5090 <
https://nvd.nist.gov/vuln/detail/CVE-2023-5090>,
CVE-2023-4921 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4921>,
CVE-2023-46862 <
https://nvd.nist.gov/vuln/detail/CVE-2023-46862>,
CVE-2023-46813 <
https://nvd.nist.gov/vuln/detail/CVE-2023-46813>,
CVE-2023-4623 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4623>,
CVE-2023-45871 <
https://nvd.nist.gov/vuln/detail/CVE-2023-45871>,
CVE-2023-45863 <
https://nvd.nist.gov/vuln/detail/CVE-2023-45863>,
CVE-2023-45862 <
https://nvd.nist.gov/vuln/detail/CVE-2023-45862>,
CVE-2023-4569 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4569>,
CVE-2023-4459 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4459>,
CVE-2023-44466 <
https://nvd.nist.gov/vuln/detail/CVE-2023-44466>,
CVE-2023-4394 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4394>,
CVE-2023-4389 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4389>,
CVE-2023-4387 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4387>,
CVE-2023-4385 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4385>,
CVE-2023-42755 <
https://nvd.nist.gov/vuln/detail/CVE-2023-42755>,
CVE-2023-42754 <
https://nvd.nist.gov/vuln/detail/CVE-2023-42754>,
CVE-2023-42753 <
https://nvd.nist.gov/vuln/detail/CVE-2023-42753>,
CVE-2023-42752 <
https://nvd.nist.gov/vuln/detail/CVE-2023-42752>,
CVE-2023-4273 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4273>,
CVE-2023-4244 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4244>,
CVE-2023-4208 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4208>,
CVE-2023-4207 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4207>,
CVE-2023-4206 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4206>,
CVE-2023-4155 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4155>,
CVE-2023-4147 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4147>,
CVE-2023-4132 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4132>,
CVE-2023-40283 <
https://nvd.nist.gov/vuln/detail/CVE-2023-40283>,
CVE-2023-4015 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4015>,
CVE-2023-4004 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4004>,
CVE-2023-39198 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39198>,
CVE-2023-39197 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39197>,
CVE-2023-39194 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39194>,
CVE-2023-39193 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39193>,
CVE-2023-39192 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39192>,
CVE-2023-39189 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39189>,
CVE-2023-3867 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3867>,
CVE-2023-3866 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3866>,
CVE-2023-3865 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3865>,
CVE-2023-3863 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3863>,
CVE-2023-38432 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38432>,
CVE-2023-38431 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38431>,
CVE-2023-38430 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38430>,
CVE-2023-38429 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38429>,
CVE-2023-38428 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38428>,
CVE-2023-38427 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38427>,
CVE-2023-38426 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38426>,
CVE-2023-38409 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38409>,
CVE-2023-3812 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3812>,
CVE-2023-3777 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3777>,
CVE-2023-3776 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3776>,
CVE-2023-3773 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3773>,
CVE-2023-3772 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3772>,
CVE-2023-3611 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3611>,
CVE-2023-3610 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3610>,
CVE-2023-3609 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3609>,
CVE-2023-35829 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35829>,
CVE-2023-35828 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35828>,
CVE-2023-35827 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35827>,
CVE-2023-35826 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35826>,
CVE-2023-35824 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35824>,
CVE-2023-35823 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35823>,
CVE-2023-35788 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35788>,
CVE-2023-3567 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3567>,
CVE-2023-35001 <
https://nvd.nist.gov/vuln/detail/CVE-2023-35001>,
CVE-2023-3439 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3439>,
CVE-2023-34324 <
https://nvd.nist.gov/vuln/detail/CVE-2023-34324>,
CVE-2023-34319 <
https://nvd.nist.gov/vuln/detail/CVE-2023-34319>,
CVE-2023-34256 <
https://nvd.nist.gov/vuln/detail/CVE-2023-34256>,
CVE-2023-33952 <
https://nvd.nist.gov/vuln/detail/CVE-2023-33952>,
CVE-2023-33951 <
https://nvd.nist.gov/vuln/detail/CVE-2023-33951>,
CVE-2023-3390 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3390>,
CVE-2023-3359 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3359>,
CVE-2023-3358 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3358>,
CVE-2023-3357 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3357>,
CVE-2023-3355 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3355>,
CVE-2023-33288 <
https://nvd.nist.gov/vuln/detail/CVE-2023-33288>,
CVE-2023-33203 <
https://nvd.nist.gov/vuln/detail/CVE-2023-33203>,
CVE-2023-3269 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3269>,
CVE-2023-3268 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3268>,
CVE-2023-32269 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32269>,
CVE-2023-32258 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32258>,
CVE-2023-32257 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32257>,
CVE-2023-32254 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32254>,
CVE-2023-32252 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32252>,
CVE-2023-32250 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32250>,
CVE-2023-32248 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32248>,
CVE-2023-32247 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32247>,
CVE-2023-32233 <
https://nvd.nist.gov/vuln/detail/CVE-2023-32233>,
CVE-2023-3220 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3220>,
CVE-2023-3212 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3212>,
CVE-2023-3161 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3161>,
CVE-2023-3159 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3159>,
CVE-2023-31436 <
https://nvd.nist.gov/vuln/detail/CVE-2023-31436>,
CVE-2023-3141 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3141>,
CVE-2023-31248 <
https://nvd.nist.gov/vuln/detail/CVE-2023-31248>,
CVE-2023-3111 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3111>,
CVE-2023-31085 <
https://nvd.nist.gov/vuln/detail/CVE-2023-31085>,
CVE-2023-3090 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3090>,
CVE-2023-30772 <
https://nvd.nist.gov/vuln/detail/CVE-2023-30772>,
CVE-2023-30456 <
https://nvd.nist.gov/vuln/detail/CVE-2023-30456>,
CVE-2023-3006 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3006>,
CVE-2023-2985 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2985>,
CVE-2023-2898 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2898>,
CVE-2023-28866 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28866>,
CVE-2023-28466 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28466>,
CVE-2023-28410 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28410>,
CVE-2023-28328 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28328>,
CVE-2023-28327 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28327>,
CVE-2023-26607 <
https://nvd.nist.gov/vuln/detail/CVE-2023-26607>,
CVE-2023-26606 <
https://nvd.nist.gov/vuln/detail/CVE-2023-26606>,
CVE-2023-26545 <
https://nvd.nist.gov/vuln/detail/CVE-2023-26545>,
CVE-2023-26544 <
https://nvd.nist.gov/vuln/detail/CVE-2023-26544>,
CVE-2023-25775 <
https://nvd.nist.gov/vuln/detail/CVE-2023-25775>,
CVE-2023-2513 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2513>,
CVE-2023-25012 <
https://nvd.nist.gov/vuln/detail/CVE-2023-25012>,
CVE-2023-2430 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2430>,
CVE-2023-23559 <
https://nvd.nist.gov/vuln/detail/CVE-2023-23559>,
CVE-2023-23455 <
https://nvd.nist.gov/vuln/detail/CVE-2023-23455>,
CVE-2023-23454 <
https://nvd.nist.gov/vuln/detail/CVE-2023-23454>,
CVE-2023-23002 <
https://nvd.nist.gov/vuln/detail/CVE-2023-23002>,
CVE-2023-23001 <
https://nvd.nist.gov/vuln/detail/CVE-2023-23001>,
CVE-2023-22999 <
https://nvd.nist.gov/vuln/detail/CVE-2023-22999>,
CVE-2023-22998 <
https://nvd.nist.gov/vuln/detail/CVE-2023-22998>,
CVE-2023-22997 <
https://nvd.nist.gov/vuln/detail/CVE-2023-22997>,
CVE-2023-22996 <
https://nvd.nist.gov/vuln/detail/CVE-2023-22996>,
CVE-2023-2269 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2269>,
CVE-2023-2236 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2236>,
CVE-2023-2235 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2235>,
CVE-2023-2194 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2194>,
CVE-2023-2177 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2177>,
CVE-2023-2166 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2166>,
CVE-2023-2163 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2163>,
CVE-2023-2162 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2162>,
CVE-2023-2156 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2156>,
CVE-2023-21255 <
https://nvd.nist.gov/vuln/detail/CVE-2023-21255>,
CVE-2023-2124 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2124>,
CVE-2023-21106 <
https://nvd.nist.gov/vuln/detail/CVE-2023-21106>,
CVE-2023-21102 <
https://nvd.nist.gov/vuln/detail/CVE-2023-21102>,
CVE-2023-20938 <
https://nvd.nist.gov/vuln/detail/CVE-2023-20938>,
CVE-2023-20928 <
https://nvd.nist.gov/vuln/detail/CVE-2023-20928>,
CVE-2023-20593 <
https://nvd.nist.gov/vuln/detail/CVE-2023-20593>,
CVE-2023-20588 <
https://nvd.nist.gov/vuln/detail/CVE-2023-20588>,
CVE-2023-20569 <
https://nvd.nist.gov/vuln/detail/CVE-2023-20569>,
CVE-2023-2019 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2019>,
CVE-2023-2008 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2008>,
CVE-2023-2006 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2006>,
CVE-2023-2002 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2002>,
CVE-2023-1998 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1998>,
CVE-2023-1990 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1990>,
CVE-2023-1989 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1989>,
CVE-2023-1872 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1872>,
CVE-2023-1859 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1859>,
CVE-2023-1855 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1855>,
CVE-2023-1838 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1838>,
CVE-2023-1829 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1829>,
CVE-2023-1670 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1670>,
CVE-2023-1652 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1652>,
CVE-2023-1637 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1637>,
CVE-2023-1611 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1611>,
CVE-2023-1583 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1583>,
CVE-2023-1582 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1582>,
CVE-2023-1513 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1513>,
CVE-2023-1382 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1382>,
CVE-2023-1380 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1380>,
CVE-2023-1281 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1281>,
CVE-2023-1249 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1249>,
CVE-2023-1206 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1206>,
CVE-2023-1194 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1194>,
CVE-2023-1193 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1193>,
CVE-2023-1192 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1192>,
CVE-2023-1118 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1118>,
CVE-2023-1095 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1095>,
CVE-2023-1079 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1079>,
CVE-2023-1078 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1078>,
CVE-2023-1077 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1077>,
CVE-2023-1076 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1076>,
CVE-2023-1075 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1075>,
CVE-2023-1074 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1074>,
CVE-2023-1073 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1073>,
CVE-2023-1032 <
https://nvd.nist.gov/vuln/detail/CVE-2023-1032>,
CVE-2023-0615 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0615>,
CVE-2023-0590 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0590>,
CVE-2023-0469 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0469>,
CVE-2023-0468 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0468>,
CVE-2023-0461 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0461>,
CVE-2023-0459 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0459>,
CVE-2023-0458 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0458>,
CVE-2023-0394 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0394>,
CVE-2023-0386 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0386>,
CVE-2023-0266 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0266>,
CVE-2023-0210 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0210>,
CVE-2023-0179 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0179>,
CVE-2023-0160 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0160>,
CVE-2023-0045 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0045>,
CVE-2022-48619 <
https://nvd.nist.gov/vuln/detail/CVE-2022-48619>,
CVE-2022-48502 <
https://nvd.nist.gov/vuln/detail/CVE-2022-48502>,
CVE-2022-48425 <
https://nvd.nist.gov/vuln/detail/CVE-2022-48425>,
CVE-2022-48424 <
https://nvd.nist.gov/vuln/detail/CVE-2022-48424>,
CVE-2022-48423 <
https://nvd.nist.gov/vuln/detail/CVE-2022-48423>,
CVE-2022-4842 <
https://nvd.nist.gov/vuln/detail/CVE-2022-4842>,
CVE-2022-47943 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47943>,
CVE-2022-47942 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47942>,
CVE-2022-47941 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47941>,
CVE-2022-47940 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47940>,
CVE-2022-47939 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47939>,
CVE-2022-47938 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47938>,
CVE-2022-47929 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47929>,
CVE-2022-47521 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47521>,
CVE-2022-47520 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47520>,
CVE-2022-47519 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47519>,
CVE-2022-47518 <
https://nvd.nist.gov/vuln/detail/CVE-2022-47518>,
CVE-2022-4662 <
https://nvd.nist.gov/vuln/detail/CVE-2022-4662>,
CVE-2022-45934 <
https://nvd.nist.gov/vuln/detail/CVE-2022-45934>,
CVE-2022-45919 <
https://nvd.nist.gov/vuln/detail/CVE-2022-45919>,
CVE-2022-45887 <
https://nvd.nist.gov/vuln/detail/CVE-2022-45887>,
CVE-2022-45886 <
https://nvd.nist.gov/vuln/detail/CVE-2022-45886>,
CVE-2022-45869 <
https://nvd.nist.gov/vuln/detail/CVE-2022-45869>,
CVE-2022-43945 <
https://nvd.nist.gov/vuln/detail/CVE-2022-43945>,
CVE-2022-4382 <
https://nvd.nist.gov/vuln/detail/CVE-2022-4382>,
CVE-2022-4379 <
https://nvd.nist.gov/vuln/detail/CVE-2022-4379>,
CVE-2022-4378 <
https://nvd.nist.gov/vuln/detail/CVE-2022-4378>,
CVE-2022-43750 <
https://nvd.nist.gov/vuln/detail/CVE-2022-43750>,
CVE-2022-42896 <
https://nvd.nist.gov/vuln/detail/CVE-2022-42896>,
CVE-2022-42895 <
https://nvd.nist.gov/vuln/detail/CVE-2022-42895>,
CVE-2022-42722 <
https://nvd.nist.gov/vuln/detail/CVE-2022-42722>,
CVE-2022-42721 <
https://nvd.nist.gov/vuln/detail/CVE-2022-42721>,
CVE-2022-42720 <
https://nvd.nist.gov/vuln/detail/CVE-2022-42720>,
CVE-2022-42719 <
https://nvd.nist.gov/vuln/detail/CVE-2022-42719>,
CVE-2022-42703 <
https://nvd.nist.gov/vuln/detail/CVE-2022-42703>,
CVE-2022-4269 <
https://nvd.nist.gov/vuln/detail/CVE-2022-4269>,
CVE-2022-42432 <
https://nvd.nist.gov/vuln/detail/CVE-2022-42432>,
CVE-2022-42329 <
https://nvd.nist.gov/vuln/detail/CVE-2022-42329>,
CVE-2022-42328 <
https://nvd.nist.gov/vuln/detail/CVE-2022-42328>,
CVE-2022-41858 <
https://nvd.nist.gov/vuln/detail/CVE-2022-41858>,
CVE-2022-41850 <
https://nvd.nist.gov/vuln/detail/CVE-2022-41850>,
CVE-2022-41849 <
https://nvd.nist.gov/vuln/detail/CVE-2022-41849>,
CVE-2022-41674 <
https://nvd.nist.gov/vuln/detail/CVE-2022-41674>,
CVE-2022-4139 <
https://nvd.nist.gov/vuln/detail/CVE-2022-4139>,
CVE-2022-4128 <
https://nvd.nist.gov/vuln/detail/CVE-2022-4128>,
CVE-2022-41218 <
https://nvd.nist.gov/vuln/detail/CVE-2022-41218>,
CVE-2022-40982 <
https://nvd.nist.gov/vuln/detail/CVE-2022-40982>,
CVE-2022-4095 <
https://nvd.nist.gov/vuln/detail/CVE-2022-4095>,
CVE-2022-40768 <
https://nvd.nist.gov/vuln/detail/CVE-2022-40768>,
CVE-2022-40307 <
https://nvd.nist.gov/vuln/detail/CVE-2022-40307>,
CVE-2022-40133 <
https://nvd.nist.gov/vuln/detail/CVE-2022-40133>,
CVE-2022-3977 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3977>,
CVE-2022-39190 <
https://nvd.nist.gov/vuln/detail/CVE-2022-39190>,
CVE-2022-39189 <
https://nvd.nist.gov/vuln/detail/CVE-2022-39189>,
CVE-2022-3910 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3910>,
CVE-2022-38457 <
https://nvd.nist.gov/vuln/detail/CVE-2022-38457>,
CVE-2022-3707 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3707>,
CVE-2022-36946 <
https://nvd.nist.gov/vuln/detail/CVE-2022-36946>,
CVE-2022-36879 <
https://nvd.nist.gov/vuln/detail/CVE-2022-36879>,
CVE-2022-3649 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3649>,
CVE-2022-3646 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3646>,
CVE-2022-3643 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3643>,
CVE-2022-3640 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3640>,
CVE-2022-3635 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3635>,
CVE-2022-3630 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3630>,
CVE-2022-3629 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3629>,
CVE-2022-36280 <
https://nvd.nist.gov/vuln/detail/CVE-2022-36280>,
CVE-2022-3628 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3628>,
CVE-2022-3625 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3625>,
CVE-2022-3623 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3623>,
CVE-2022-3621 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3621>,
CVE-2022-3619 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3619>,
CVE-2022-36123 <
https://nvd.nist.gov/vuln/detail/CVE-2022-36123>,
CVE-2022-3595 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3595>,
CVE-2022-3594 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3594>,
CVE-2022-3586 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3586>,
CVE-2022-3577 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3577>,
CVE-2022-3565 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3565>,
CVE-2022-3564 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3564>,
CVE-2022-3543 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3543>,
CVE-2022-3541 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3541>,
CVE-2022-3534 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3534>,
CVE-2022-3526 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3526>,
CVE-2022-3524 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3524>,
CVE-2022-3521 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3521>,
CVE-2022-34918 <
https://nvd.nist.gov/vuln/detail/CVE-2022-34918>,
CVE-2022-34495 <
https://nvd.nist.gov/vuln/detail/CVE-2022-34495>,
CVE-2022-34494 <
https://nvd.nist.gov/vuln/detail/CVE-2022-34494>,
CVE-2022-3435 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3435>,
CVE-2022-3424 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3424>,
CVE-2022-33981 <
https://nvd.nist.gov/vuln/detail/CVE-2022-33981>,
CVE-2022-33744 <
https://nvd.nist.gov/vuln/detail/CVE-2022-33744>,
CVE-2022-33743 <
https://nvd.nist.gov/vuln/detail/CVE-2022-33743>,
CVE-2022-33742 <
https://nvd.nist.gov/vuln/detail/CVE-2022-33742>,
CVE-2022-33741 <
https://nvd.nist.gov/vuln/detail/CVE-2022-33741>,
CVE-2022-33740 <
https://nvd.nist.gov/vuln/detail/CVE-2022-33740>,
CVE-2022-3344 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3344>,
CVE-2022-3303 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3303>,
CVE-2022-32981 <
https://nvd.nist.gov/vuln/detail/CVE-2022-32981>,
CVE-2022-3239 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3239>,
CVE-2022-32296 <
https://nvd.nist.gov/vuln/detail/CVE-2022-32296>,
CVE-2022-32250 <
https://nvd.nist.gov/vuln/detail/CVE-2022-32250>,
CVE-2022-3202 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3202>,
CVE-2022-3169 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3169>,
CVE-2022-3115 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3115>,
CVE-2022-3113 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3113>,
CVE-2022-3112 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3112>,
CVE-2022-3111 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3111>,
CVE-2022-3110 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3110>,
CVE-2022-3108 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3108>,
CVE-2022-3107 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3107>,
CVE-2022-3105 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3105>,
CVE-2022-3104 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3104>,
CVE-2022-3078 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3078>,
CVE-2022-3077 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3077>,
CVE-2022-30594 <
https://nvd.nist.gov/vuln/detail/CVE-2022-30594>,
CVE-2022-3028 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3028>,
CVE-2022-29968 <
https://nvd.nist.gov/vuln/detail/CVE-2022-29968>,
CVE-2022-29901 <
https://nvd.nist.gov/vuln/detail/CVE-2022-29901>,
CVE-2022-29900 <
https://nvd.nist.gov/vuln/detail/CVE-2022-29900>,
CVE-2022-2978 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2978>,
CVE-2022-2977 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2977>,
CVE-2022-2964 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2964>,
CVE-2022-2959 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2959>,
CVE-2022-29582 <
https://nvd.nist.gov/vuln/detail/CVE-2022-29582>,
CVE-2022-29581 <
https://nvd.nist.gov/vuln/detail/CVE-2022-29581>,
CVE-2022-2938 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2938>,
CVE-2022-29156 <
https://nvd.nist.gov/vuln/detail/CVE-2022-29156>,
CVE-2022-2905 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2905>,
CVE-2022-28893 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28893>,
CVE-2022-28796 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28796>,
CVE-2022-2873 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2873>,
CVE-2022-28390 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28390>,
CVE-2022-28389 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28389>,
CVE-2022-28388 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28388>,
CVE-2022-28356 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28356>,
CVE-2022-27950 <
https://nvd.nist.gov/vuln/detail/CVE-2022-27950>,
CVE-2022-2785 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2785>,
CVE-2022-27672 <
https://nvd.nist.gov/vuln/detail/CVE-2022-27672>,
CVE-2022-27666 <
https://nvd.nist.gov/vuln/detail/CVE-2022-27666>,
CVE-2022-27223 <
https://nvd.nist.gov/vuln/detail/CVE-2022-27223>,
CVE-2022-26966 <
https://nvd.nist.gov/vuln/detail/CVE-2022-26966>,
CVE-2022-2663 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2663>,
CVE-2022-26490 <
https://nvd.nist.gov/vuln/detail/CVE-2022-26490>,
CVE-2022-2639 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2639>,
CVE-2022-26373 <
https://nvd.nist.gov/vuln/detail/CVE-2022-26373>,
CVE-2022-26365 <
https://nvd.nist.gov/vuln/detail/CVE-2022-26365>,
CVE-2022-2602 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2602>,
CVE-2022-2590 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2590>,
CVE-2022-2588 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2588>,
CVE-2022-2586 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2586>,
CVE-2022-2585 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2585>,
CVE-2022-25636 <
https://nvd.nist.gov/vuln/detail/CVE-2022-25636>,
CVE-2022-25375 <
https://nvd.nist.gov/vuln/detail/CVE-2022-25375>,
CVE-2022-25258 <
https://nvd.nist.gov/vuln/detail/CVE-2022-25258>,
CVE-2022-2503 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2503>,
CVE-2022-24959 <
https://nvd.nist.gov/vuln/detail/CVE-2022-24959>,
CVE-2022-24958 <
https://nvd.nist.gov/vuln/detail/CVE-2022-24958>,
CVE-2022-24448 <
https://nvd.nist.gov/vuln/detail/CVE-2022-24448>,
CVE-2022-23960 <
https://nvd.nist.gov/vuln/detail/CVE-2022-23960>,
CVE-2022-2380 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2380>,
CVE-2022-23222 <
https://nvd.nist.gov/vuln/detail/CVE-2022-23222>,
CVE-2022-2318 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2318>,
CVE-2022-2308 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2308>,
CVE-2022-23042 <
https://nvd.nist.gov/vuln/detail/CVE-2022-23042>,
CVE-2022-23041 <
https://nvd.nist.gov/vuln/detail/CVE-2022-23041>,
CVE-2022-23040 <
https://nvd.nist.gov/vuln/detail/CVE-2022-23040>,
CVE-2022-23039 <
https://nvd.nist.gov/vuln/detail/CVE-2022-23039>,
CVE-2022-23038 <
https://nvd.nist.gov/vuln/detail/CVE-2022-23038>,
CVE-2022-23037 <
https://nvd.nist.gov/vuln/detail/CVE-2022-23037>,
CVE-2022-23036 <
https://nvd.nist.gov/vuln/detail/CVE-2022-23036>,
CVE-2022-22942 <
https://nvd.nist.gov/vuln/detail/CVE-2022-22942>,
CVE-2022-2196 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2196>,
CVE-2022-2153 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2153>,
CVE-2022-21505 <
https://nvd.nist.gov/vuln/detail/CVE-2022-21505>,
CVE-2022-21499 <
https://nvd.nist.gov/vuln/detail/CVE-2022-21499>,
CVE-2022-21166 <
https://nvd.nist.gov/vuln/detail/CVE-2022-21166>,
CVE-2022-21125 <
https://nvd.nist.gov/vuln/detail/CVE-2022-21125>,
CVE-2022-21123 <
https://nvd.nist.gov/vuln/detail/CVE-2022-21123>,
CVE-2022-2078 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2078>,
CVE-2022-20572 <
https://nvd.nist.gov/vuln/detail/CVE-2022-20572>,
CVE-2022-20566 <
https://nvd.nist.gov/vuln/detail/CVE-2022-20566>,
CVE-2022-20423 <
https://nvd.nist.gov/vuln/detail/CVE-2022-20423>,
CVE-2022-20422 <
https://nvd.nist.gov/vuln/detail/CVE-2022-20422>,
CVE-2022-20421 <
https://nvd.nist.gov/vuln/detail/CVE-2022-20421>,
CVE-2022-20369 <
https://nvd.nist.gov/vuln/detail/CVE-2022-20369>,
CVE-2022-20368 <
https://nvd.nist.gov/vuln/detail/CVE-2022-20368>,
CVE-2022-20158 <
https://nvd.nist.gov/vuln/detail/CVE-2022-20158>,
CVE-2022-20008 <
https://nvd.nist.gov/vuln/detail/CVE-2022-20008>,
CVE-2022-1998 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1998>,
CVE-2022-1976 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1976>,
CVE-2022-1975 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1975>,
CVE-2022-1974 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1974>,
CVE-2022-1973 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1973>,
CVE-2022-1943 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1943>,
CVE-2022-1882 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1882>,
CVE-2022-1852 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1852>,
CVE-2022-1789 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1789>,
CVE-2022-1734 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1734>,
CVE-2022-1729 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1729>,
CVE-2022-1679 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1679>,
CVE-2022-1671 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1671>,
CVE-2022-1652 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1652>,
CVE-2022-1651 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1651>,
CVE-2022-1516 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1516>,
CVE-2022-1462 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1462>,
CVE-2022-1353 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1353>,
CVE-2022-1263 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1263>,
CVE-2022-1205 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1205>,
CVE-2022-1204 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1204>,
CVE-2022-1199 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1199>,
CVE-2022-1198 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1198>,
CVE-2022-1184 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1184>,
CVE-2022-1158 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1158>,
CVE-2022-1055 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1055>,
CVE-2022-1048 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1048>,
CVE-2022-1016 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1016>,
CVE-2022-1015 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1015>,
CVE-2022-1012 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1012>,
CVE-2022-1011 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1011>,
CVE-2022-0995 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0995>,
CVE-2022-0847 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0847>,
CVE-2022-0742 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0742>,
CVE-2022-0617 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0617>,
CVE-2022-0516 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0516>,
CVE-2022-0500 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0500>,
CVE-2022-0494 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0494>,
CVE-2022-0492 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0492>,
CVE-2022-0487 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0487>,
CVE-2022-0435 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0435>,
CVE-2022-0433 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0433>,
CVE-2022-0382 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0382>,
CVE-2022-0330 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0330>,
CVE-2022-0185 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0185>,
CVE-2022-0168 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0168>,
CVE-2022-0002 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0002>,
CVE-2022-0001 <
https://nvd.nist.gov/vuln/detail/CVE-2022-0001>,
CVE-2021-45469 <
https://nvd.nist.gov/vuln/detail/CVE-2021-45469>,
CVE-2021-44879 <
https://nvd.nist.gov/vuln/detail/CVE-2021-44879>,
CVE-2021-43976 <
https://nvd.nist.gov/vuln/detail/CVE-2021-43976>,
CVE-2021-4197 <
https://nvd.nist.gov/vuln/detail/CVE-2021-4197>,
CVE-2021-4155 <
https://nvd.nist.gov/vuln/detail/CVE-2021-4155>,
CVE-2021-3923 <
https://nvd.nist.gov/vuln/detail/CVE-2021-3923>,
CVE-2021-33655 <
https://nvd.nist.gov/vuln/detail/CVE-2021-33655>,
CVE-2021-33135 <
https://nvd.nist.gov/vuln/detail/CVE-2021-33135>,
CVE-2021-26401 <
https://nvd.nist.gov/vuln/detail/CVE-2021-26401>,
CVE-2020-36516 <
https://nvd.nist.gov/vuln/detail/CVE-2020-36516>))
- Go (CVE-2023-39323 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39323>,
CVE-2023-39322 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39322>,
CVE-2023-39321 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39321>,
CVE-2023-39320 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39320>,
CVE-2023-39319 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39319>,
CVE-2023-39318 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39318>,
CVE-2023-29409 <
https://nvd.nist.gov/vuln/detail/CVE-2023-29409>,
CVE-2023-29406 <
https://nvd.nist.gov/vuln/detail/CVE-2023-29406>,
CVE-2023-29405 <
https://nvd.nist.gov/vuln/detail/CVE-2023-29405>,
CVE-2023-29404 <
https://nvd.nist.gov/vuln/detail/CVE-2023-29404>,
CVE-2023-29403 <
https://nvd.nist.gov/vuln/detail/CVE-2023-29403>,
CVE-2023-29402 <
https://nvd.nist.gov/vuln/detail/CVE-2023-29402>)
- OpenSSL (CVE-2023-3446 <
https://nvd.nist.gov/vuln/detail/CVE-2023-3446>
, CVE-2023-2975 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2975>,
CVE-2023-2650 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2650>)
- Python (CVE-2023-41105
<
https://nvd.nist.gov/vuln/detail/CVE-2023-41105>, CVE-2023-40217
<
https://nvd.nist.gov/vuln/detail/CVE-2023-40217>)
- SDK: Rust (CVE-2023-38497
<
https://nvd.nist.gov/vuln/detail/CVE-2023-38497>)
- VMware: open-vm-tools (CVE-2023-20900
<
https://nvd.nist.gov/vuln/detail/CVE-2023-20900>, CVE-2023-20867
<
https://nvd.nist.gov/vuln/detail/CVE-2023-20867>)
- binutils (CVE-2023-1579
<
https://nvd.nist.gov/vuln/detail/CVE-2023-1579>, CVE-2022-4285
<
https://nvd.nist.gov/vuln/detail/CVE-2022-4285>, CVE-2022-38533
<
https://nvd.nist.gov/vuln/detail/CVE-2022-38533>)
- c-ares (CVE-2023-32067
<
https://nvd.nist.gov/vuln/detail/CVE-2023-32067>, CVE-2023-31147
<
https://nvd.nist.gov/vuln/detail/CVE-2023-31147>, CVE-2023-31130
<
https://nvd.nist.gov/vuln/detail/CVE-2023-31130>, CVE-2023-31124
<
https://nvd.nist.gov/vuln/detail/CVE-2023-31124>)
- curl (CVE-2023-38546 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38546>
, CVE-2023-38545 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38545>,
CVE-2023-38039 <
https://nvd.nist.gov/vuln/detail/CVE-2023-38039>,
CVE-2023-28322 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28322>,
CVE-2023-28321 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28321>,
CVE-2023-28320 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28320>,
CVE-2023-28319 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28319>)
- git (CVE-2023-29007 <
https://nvd.nist.gov/vuln/detail/CVE-2023-29007>,
CVE-2023-25815 <
https://nvd.nist.gov/vuln/detail/CVE-2023-25815>,
CVE-2023-25652 <
https://nvd.nist.gov/vuln/detail/CVE-2023-25652>)
- glibc (CVE-2023-4911 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4911>,
CVE-2023-4806 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4806>,
CVE-2023-4527 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4527>)
- go (CVE-2023-39325 <
https://nvd.nist.gov/vuln/detail/CVE-2023-39325>)
- grub (CVE-2023-4693 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4693>,
CVE-2023-4692 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4692>,
CVE-2022-3775 <
https://nvd.nist.gov/vuln/detail/CVE-2022-3775>,
CVE-2022-28737 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28737>,
CVE-2022-28736 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28736>,
CVE-2022-28735 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28735>,
CVE-2022-28734 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28734>,
CVE-2022-28733 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28733>,
CVE-2022-2601 <
https://nvd.nist.gov/vuln/detail/CVE-2022-2601>,
CVE-2021-3981 <
https://nvd.nist.gov/vuln/detail/CVE-2021-3981>,
CVE-2021-3697 <
https://nvd.nist.gov/vuln/detail/CVE-2021-3697>,
CVE-2021-3696 <
https://nvd.nist.gov/vuln/detail/CVE-2021-3696>,
CVE-2021-3695 <
https://nvd.nist.gov/vuln/detail/CVE-2021-3695>,
CVE-2021-20233 <
https://nvd.nist.gov/vuln/detail/CVE-2021-20233>,
CVE-2021-20225 <
https://nvd.nist.gov/vuln/detail/CVE-2021-20225>,
CVE-2020-27779 <
https://nvd.nist.gov/vuln/detail/CVE-2020-27779>,
CVE-2020-27749 <
https://nvd.nist.gov/vuln/detail/CVE-2020-27749>,
CVE-2020-25647 <
https://nvd.nist.gov/vuln/detail/CVE-2020-25647>,
CVE-2020-25632 <
https://nvd.nist.gov/vuln/detail/CVE-2020-25632>,
CVE-2020-14372 <
https://nvd.nist.gov/vuln/detail/CVE-2020-14372>,
CVE-2020-10713 <
https://nvd.nist.gov/vuln/detail/CVE-2020-10713>)
- intel-microcode (CVE-2023-23908
<
https://nvd.nist.gov/vuln/detail/CVE-2023-23908>, CVE-2022-41804
<
https://nvd.nist.gov/vuln/detail/CVE-2022-41804>, CVE-2022-40982
<
https://nvd.nist.gov/vuln/detail/CVE-2022-40982>)
- libarchive (libarchive-20230729
<
https://github.com/libarchive/libarchive/releases/tag/v3.7.1>)
- libcap (CVE-2023-2603 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2603>
, CVE-2023-2602 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2602>)
- libmicrohttpd (CVE-2023-27371
<
https://nvd.nist.gov/vuln/detail/CVE-2023-27371>)
- libtirpc (libtirpc-rhbg-2224666
<
http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1d2e10afb2ffc35cb3623f57a15f712359f18e75>
, libtirpc-rhbg-2150611
<
http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=f7f0abdf267698de3f74a0285405b1b01f40893b>
, libtirpc-rhbg-2138317
<
http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=4a2d85c64110ee9e21a8c4f9dafd6b0ae621506d>
)
- libxml2 (libxml2-20230428
<
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4>)
- lua (CVE-2022-33099 <
https://nvd.nist.gov/vuln/detail/CVE-2022-33099>)
- mit-krb5 (CVE-2023-36054
<
https://nvd.nist.gov/vuln/detail/CVE-2023-36054>)
- ncurses (CVE-2023-29491
<
https://nvd.nist.gov/vuln/detail/CVE-2023-29491>)
- nvidia-drivers (CVE-2023-25516
<
https://nvd.nist.gov/vuln/detail/CVE-2023-25516>, CVE-2023-25515
<
https://nvd.nist.gov/vuln/detail/CVE-2023-25515>)
- openldap (CVE-2023-2953
<
https://nvd.nist.gov/vuln/detail/CVE-2023-2953>)
- procps (CVE-2023-4016 <
https://nvd.nist.gov/vuln/detail/CVE-2023-4016>)
- protobuf (CVE-2022-1941
<
https://nvd.nist.gov/vuln/detail/CVE-2022-1941>)
- qemu (CVE-2023-2861 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2861>,
CVE-2023-0330 <
https://nvd.nist.gov/vuln/detail/CVE-2023-0330>)
- samba (CVE-2022-1615 <
https://nvd.nist.gov/vuln/detail/CVE-2022-1615>,
CVE-2021-44142 <
https://nvd.nist.gov/vuln/detail/CVE-2021-44142>)
- shadow (CVE-2023-29383
<
https://nvd.nist.gov/vuln/detail/CVE-2023-29383>)
- sudo (CVE-2023-28487 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28487>
, CVE-2023-28486 <
https://nvd.nist.gov/vuln/detail/CVE-2023-28486>,
CVE-2023-27320 <
https://nvd.nist.gov/vuln/detail/CVE-2023-27320>)
- torcx (CVE-2022-28948 <
https://nvd.nist.gov/vuln/detail/CVE-2022-28948>
)
- vim (CVE-2023-2610 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2610>,
CVE-2023-2609 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2609>,
CVE-2023-2426 <
https://nvd.nist.gov/vuln/detail/CVE-2023-2426>)
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Bug-fixes3>Bug fixes
- AWS: Fixed the Amazon SSM agent that was crashing. (Flatcar#1307
<
https://github.com/flatcar/Flatcar/issues/1307>)
- Added AWS EKS support for versions 1.24-1.28. Fixed
/usr/share/amazon/eks/download-kubelet.sh to include download paths for
these versions. (scripts#1210
<
https://github.com/flatcar/scripts/pull/1210>)
- Fix the RemainAfterExit clause in nvidia.service (Flatcar#1169
<
https://github.com/flatcar/Flatcar/issues/1169>)
- Fixed a bug resulting in coreos-cloudinit resetting the instance
hostname to ‘localhost’ if no metadata could be found (
coreos-cloudinit#25 <
https://github.com/flatcar/coreos-cloudinit/pull/25>
, Flatcar#1262 <
https://github.com/flatcar/Flatcar/issues/1262>), with
contributions from MichaelEischer <
https://github.com/MichaelEischer>
- Fixed bug in handling renamed network interfaces when generating login
issue (init#102 <
https://github.com/flatcar/init/pull/102>)
- Fixed iterating over the OEM update payload signatures which prevented
the AWS OEM update to 3745.x.y (update-engine#31
<
https://github.com/flatcar/update_engine/pull/31>)
- Fixed quotes handling for update-engine (Flatcar#1209
<
https://github.com/flatcar/Flatcar/issues/1209>)
- Fixed supplying extension update payloads with a custom base URL in
Nebraska (Flatcar#1281 <
https://github.com/flatcar/Flatcar/issues/1281>)
- Fixed the missing /etc/extensions/ symlinks for the inbuilt
Docker/containerd systemd-sysext images on update from Beta 3760.1.0 (
update_engine#32 <
https://github.com/flatcar/update_engine/pull/32>)
- Fixed the postinstall hook failure when updating from Azure instances
without OEM systemd-sysext images to Flatcar Alpha 3745.x.y (
update_engine#29 <
https://github.com/flatcar/update_engine/pull/29>)
- GCP: Fixed OS Login enabling (scripts#1445
<
https://github.com/flatcar/scripts/pull/1445>)
- Made sshkeys.service more robust to only run
coreos-meta...@core.service when not masked and also retry on
failure (init#112 <
https://github.com/flatcar/init/pull/112>)
<
https://hackmd.io/stjMbwGHQqyH8_PNPoCafQ?both#Changes2>Changes
- [image: :warning:] Dropped support for niftycloud and interoute. For
interoute we haven’t been generating the images for some time already. (
scripts#971 <
https://github.com/flatcar/scripts/pull/971>) [image:
:warning:]
- AWS OEM images now use a systemd-sysext image for layering additional
platform-specific software on top of /usr
- Added TLS Kernel module (scripts#865
<
https://github.com/flatcar/scripts/pull/865>)
- Added support for multipart MIME userdata in coreos-cloudinit.
Ignition now detects multipart userdata and delegates execution to
coreos-cloudinit. (scripts#873)
- Azure and QEMU OEM images now use systemd-sysext images for layering
additional platform-specific software on top of /usr. For Azure images
this also means that the image has a normal Python installation available
through the sysext image. The OEM software is still not updated but this
will be added soon.
- Change nvidia.service to type oneshot (from the default “simple”) so
the subsequent services (configured with “Requires/After”) are executed
after the driver installation is successfully finished
(flatcar/Flatcar#1136)
- Enabled the virtio GPU driver (scripts#830
<
https://github.com/flatcar/scripts/pull/830>)
- Migrate to Type=notify in containerd.service. Changed the unit to
Type=notify, utilizing the existing containerd support for sd_notify call
after socket setup.
- Migrated the NVIDIA installer from the Azure/AWS OEM partition to /usr to
make it available on all platforms (scripts#932
<
https://github.com/flatcar/scripts/pull/932/>, Flatcar#1077
<
https://github.com/flatcar/Flatcar/issues/1077>)
- Moved a mountpoint of the OEM partition from /usr/share/oem to /oem.
/usr/share/oem became a symlink to /oem for backward compatibility.
Despite the move, the initrd images providing files through
/usr/share/oem should keep using /usr/share/oem. The move was done to
enable activating the OEM sysext images that are placed in the OEM
partition.
- OEM vendor tools are now A/B updated if they are shipped as
systemd-sysext images, the migration happens when both partitions require a
systemd-sysext OEM image - note that this will delete the nvidia.service
from /etc on Azure because it’s now part of /usr (Flatcar#60
<