Announcing new releases Alpha 3745.0.0, Beta 3732.1.0, Stable 3602.2.0, LTS-2023 3510.3.0

23 views
Skip to first unread message

Flatcar Container Linux User

unread,
Oct 6, 2023, 5:45:19 AM10/6/23
to Flatcar Container Linux User


Hello,
We are pleased to announce a new Flatcar Container Linux release for the
Alpha, Beta, Stable, LTS-2023 channel.

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#New-Alpha-Release-374500>New
Alpha Release 3745.0.0

*Changes since Alpha 3732.0.0*
<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Security-fixes>Security fixes:

- Linux (CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>
)
- curl (CVE-2023-38039 <https://nvd.nist.gov/vuln/detail/CVE-2023-38039>)
- glibc (CVE-2023-4527 <https://nvd.nist.gov/vuln/detail/CVE-2023-4527>,
CVE-2023-4806 <https://nvd.nist.gov/vuln/detail/CVE-2023-4806>)
- lua (CVE-2022-33099 <https://nvd.nist.gov/vuln/detail/CVE-2022-33099>)
- mit-krb5 (CVE-2023-36054
<https://nvd.nist.gov/vuln/detail/CVE-2023-36054>)
- procps (CVE-2023-4016 <https://nvd.nist.gov/vuln/detail/CVE-2023-4016>)
- samba (CVE-2021-44142 <https://nvd.nist.gov/vuln/detail/CVE-2021-44142>
, CVE-2022-1615 <https://nvd.nist.gov/vuln/detail/CVE-2022-1615>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Bug-fixes>Bug fixes:

- Triggered re-reading of partition table to fix adding partitions to
the boot disk (scripts#1202
<https://github.com/flatcar/scripts/pull/1202>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Changes>Changes:

- Reworked the VMware OEM software to be shipped as A/B updated
systemd-sysext image
- Started shipping default ssh client and ssh daemon configs in
/etc/ssh/ssh_config and /etc/ssh/sshd_config which include config
snippets in /etc/ssh/ssh_config.d and /etc/ssh/sshd_config.d,
respectively.
- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)
- AWS: AWS OEM images now use a systemd-sysext image for layering
additional platform-specific software on top of /usr
- SDK: Experimental support for prefix builds
<https://github.com/flatcar/scripts/blob/main/PREFIX.md> to create
distro independent, portable, self-contained applications w/ all
dependencies included. With contributions from chewi
<https://github.com/chewi> and HappyTobi <https://github.com/HappyTobi>.
- VMware: The open-vm-tools package in VMware OEM now comes with
vmhgfs-fuse, udev rules, pam and vgauth

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Updates>Updates:

- Linux (6.1.55 <https://lwn.net/Articles/945379>)
- Linux Firmware (20230919
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230919>
)
- bind-tools (9.16.42
<https://bind9.readthedocs.io/en/v9.16.42/notes.html#notes-for-bind-9-16-42>
)
- checkpolicy (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- curl (8.3.0 <https://curl.se/changes.html#8_3_0>)
- gcc (13.2 <https://gcc.gnu.org/gcc-13/changes.html>)
- gzip (1.13 <https://savannah.gnu.org/news/?id=10501>)
- libgcrypt (1.10.2
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=c9a239615f8070427a96688b1be40a81e59e9b8a;hb=1c5cbacf3d88dded5063e959ee68678ff7d0fa56>
)
- libselinux (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- libsemanage (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- libsepol (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- lua (5.4.6 <https://www.lua.org/manual/5.4/readme.html#changes>)
- mit-krb5 (1.21.2 <http://web.mit.edu/kerberos/krb5-1.21/>)
- openssh (9.4p1 <https://www.openssh.com/releasenotes.html#9.4p1>)
- policycoreutils (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- procps (4.0.4 <https://gitlab.com/procps-ng/procps/-/releases/v4.0.4>
(includes 4.0.3 <https://gitlab.com/procps-ng/procps/-/releases/v4.0.3>
and 4.0.0 <https://gitlab.com/procps-ng/procps/-/releases/v4.0.0>))
- rpcsvc-proto (1.4.4
<https://github.com/thkukuk/rpcsvc-proto/releases/tag/v1.4.4>)
- samba (4.18.4
<https://wiki.samba.org/index.php/Samba_4.18_Features_added/changed#Samba_4.18.4>
)
- selinux-base (2.20221101
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101>
)
- selinux-base-policy (2.20221101
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101>
)
- selinux-container (2.20221101
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101>
)
- selinux-sssd (2.20221101
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101>
)
- selinux-unconfined (2.20221101
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101>
)
- semodule-utils (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- SDK: Rust (1.72.1
<https://github.com/rust-lang/rust/releases/tag/1.72.1>)
- VMWARE: libdnet (1.16.2
<https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.2> (includes
1.16 <https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16>))

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#New-Beta-Release-373210>New Beta
Release 3732.1.0

*Changes since Alpha 3732.0.0*
<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Security-fixes1>Security fixes:

- Linux (CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>
)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Bug-fixes1>Bug fixes:

- Triggered re-reading of partition table to fix adding partitions to
the boot disk (scripts#1202
<https://github.com/flatcar/scripts/pull/1202>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Changes1>Changes:

- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Updates1>Updates:

- Linux (6.1.55 <https://lwn.net/Articles/945379>)

Changes compared to Beta 3602.1.6
<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Security-fixes2>Security fixes:

- Linux (CVE-2020-36516 <https://nvd.nist.gov/vuln/detail/CVE-2020-36516>
,CVE-2021-26401 <https://nvd.nist.gov/vuln/detail/CVE-2021-26401>,
CVE-2021-33135 <https://nvd.nist.gov/vuln/detail/CVE-2021-33135>,
CVE-2021-33655 <https://nvd.nist.gov/vuln/detail/CVE-2021-33655>,
CVE-2021-3923 <https://nvd.nist.gov/vuln/detail/CVE-2021-3923>,
CVE-2021-4155 <https://nvd.nist.gov/vuln/detail/CVE-2021-4155>,
CVE-2021-4197 <https://nvd.nist.gov/vuln/detail/CVE-2021-4197>,
CVE-2021-43976 <https://nvd.nist.gov/vuln/detail/CVE-2021-43976>,
CVE-2021-44879 <https://nvd.nist.gov/vuln/detail/CVE-2021-44879>,
CVE-2021-45469 <https://nvd.nist.gov/vuln/detail/CVE-2021-45469>,
CVE-2022-0001 <https://nvd.nist.gov/vuln/detail/CVE-2022-0001>,
CVE-2022-0002 <https://nvd.nist.gov/vuln/detail/CVE-2022-0002>,
CVE-2022-0168 <https://nvd.nist.gov/vuln/detail/CVE-2022-0168>,
CVE-2022-0185 <https://nvd.nist.gov/vuln/detail/CVE-2022-0185>,
CVE-2022-0330 <https://nvd.nist.gov/vuln/detail/CVE-2022-0330>,
CVE-2022-0382 <https://nvd.nist.gov/vuln/detail/CVE-2022-0382>,
CVE-2022-0433 <https://nvd.nist.gov/vuln/detail/CVE-2022-0433>,
CVE-2022-0435 <https://nvd.nist.gov/vuln/detail/CVE-2022-0435>,
CVE-2022-0487 <https://nvd.nist.gov/vuln/detail/CVE-2022-0487>,
CVE-2022-0492 <https://nvd.nist.gov/vuln/detail/CVE-2022-0492>,
CVE-2022-0494 <https://nvd.nist.gov/vuln/detail/CVE-2022-0494>,
CVE-2022-0500 <https://nvd.nist.gov/vuln/detail/CVE-2022-0500>,
CVE-2022-0516 <https://nvd.nist.gov/vuln/detail/CVE-2022-0516>,
CVE-2022-0617 <https://nvd.nist.gov/vuln/detail/CVE-2022-0617>,
CVE-2022-0742 <https://nvd.nist.gov/vuln/detail/CVE-2022-0742>,
CVE-2022-0847 <https://nvd.nist.gov/vuln/detail/CVE-2022-0847>,
CVE-2022-0995 <https://nvd.nist.gov/vuln/detail/CVE-2022-0995>,
CVE-2022-1011 <https://nvd.nist.gov/vuln/detail/CVE-2022-1011>,
CVE-2022-1012 <https://nvd.nist.gov/vuln/detail/CVE-2022-1012>,
CVE-2022-1015 <https://nvd.nist.gov/vuln/detail/CVE-2022-1015>,
CVE-2022-1016 <https://nvd.nist.gov/vuln/detail/CVE-2022-1016>,
CVE-2022-1048 <https://nvd.nist.gov/vuln/detail/CVE-2022-1048>,
CVE-2022-1055 <https://nvd.nist.gov/vuln/detail/CVE-2022-1055>,
CVE-2022-1158 <https://nvd.nist.gov/vuln/detail/CVE-2022-1158>,
CVE-2022-1184 <https://nvd.nist.gov/vuln/detail/CVE-2022-1184>,
CVE-2022-1198 <https://nvd.nist.gov/vuln/detail/CVE-2022-1198>,
CVE-2022-1199 <https://nvd.nist.gov/vuln/detail/CVE-2022-1199>,
CVE-2022-1204 <https://nvd.nist.gov/vuln/detail/CVE-2022-1204>,
CVE-2022-1205 <https://nvd.nist.gov/vuln/detail/CVE-2022-1205>,
CVE-2022-1263 <https://nvd.nist.gov/vuln/detail/CVE-2022-1263>,
CVE-2022-1353 <https://nvd.nist.gov/vuln/detail/CVE-2022-1353>,
CVE-2022-1462 <https://nvd.nist.gov/vuln/detail/CVE-2022-1462>,
CVE-2022-1516 <https://nvd.nist.gov/vuln/detail/CVE-2022-1516>,
CVE-2022-1651 <https://nvd.nist.gov/vuln/detail/CVE-2022-1651>,
CVE-2022-1652 <https://nvd.nist.gov/vuln/detail/CVE-2022-1652>,
CVE-2022-1671 <https://nvd.nist.gov/vuln/detail/CVE-2022-1671>,
CVE-2022-1679 <https://nvd.nist.gov/vuln/detail/CVE-2022-1679>,
CVE-2022-1729 <https://nvd.nist.gov/vuln/detail/CVE-2022-1729>,
CVE-2022-1734 <https://nvd.nist.gov/vuln/detail/CVE-2022-1734>,
CVE-2022-1789 <https://nvd.nist.gov/vuln/detail/CVE-2022-1789>,
CVE-2022-1852 <https://nvd.nist.gov/vuln/detail/CVE-2022-1852>,
CVE-2022-1882 <https://nvd.nist.gov/vuln/detail/CVE-2022-1882>,
CVE-2022-1943 <https://nvd.nist.gov/vuln/detail/CVE-2022-1943>,
CVE-2022-1973 <https://nvd.nist.gov/vuln/detail/CVE-2022-1973>,
CVE-2022-1974 <https://nvd.nist.gov/vuln/detail/CVE-2022-1974>,
CVE-2022-1975 <https://nvd.nist.gov/vuln/detail/CVE-2022-1975>,
CVE-2022-1976 <https://nvd.nist.gov/vuln/detail/CVE-2022-1976>,
CVE-2022-1998 <https://nvd.nist.gov/vuln/detail/CVE-2022-1998>,
CVE-2022-20008 <https://nvd.nist.gov/vuln/detail/CVE-2022-20008>,
CVE-2022-20158 <https://nvd.nist.gov/vuln/detail/CVE-2022-20158>,
CVE-2022-20368 <https://nvd.nist.gov/vuln/detail/CVE-2022-20368>,
CVE-2022-20369 <https://nvd.nist.gov/vuln/detail/CVE-2022-20369>,
CVE-2022-20421 <https://nvd.nist.gov/vuln/detail/CVE-2022-20421>,
CVE-2022-20422 <https://nvd.nist.gov/vuln/detail/CVE-2022-20422>,
CVE-2022-20423 <https://nvd.nist.gov/vuln/detail/CVE-2022-20423>,
CVE-2022-20566 <https://nvd.nist.gov/vuln/detail/CVE-2022-20566>,
CVE-2022-20572 <https://nvd.nist.gov/vuln/detail/CVE-2022-20572>,
CVE-2022-2078 <https://nvd.nist.gov/vuln/detail/CVE-2022-2078>,
CVE-2022-21123 <https://nvd.nist.gov/vuln/detail/CVE-2022-21123>,
CVE-2022-21125 <https://nvd.nist.gov/vuln/detail/CVE-2022-21125>,
CVE-2022-21166 <https://nvd.nist.gov/vuln/detail/CVE-2022-21166>,
CVE-2022-21499 <https://nvd.nist.gov/vuln/detail/CVE-2022-21499>,
CVE-2022-21505 <https://nvd.nist.gov/vuln/detail/CVE-2022-21505>,
CVE-2022-2153 <https://nvd.nist.gov/vuln/detail/CVE-2022-2153>,
CVE-2022-2196 <https://nvd.nist.gov/vuln/detail/CVE-2022-2196>,
CVE-2022-22942 <https://nvd.nist.gov/vuln/detail/CVE-2022-22942>,
CVE-2022-23036 <https://nvd.nist.gov/vuln/detail/CVE-2022-23036>,
CVE-2022-23037 <https://nvd.nist.gov/vuln/detail/CVE-2022-23037>,
CVE-2022-23038 <https://nvd.nist.gov/vuln/detail/CVE-2022-23038>,
CVE-2022-23039 <https://nvd.nist.gov/vuln/detail/CVE-2022-23039>,
CVE-2022-23040 <https://nvd.nist.gov/vuln/detail/CVE-2022-23040>,
CVE-2022-23041 <https://nvd.nist.gov/vuln/detail/CVE-2022-23041>,
CVE-2022-23042 <https://nvd.nist.gov/vuln/detail/CVE-2022-23042>,
CVE-2022-2308 <https://nvd.nist.gov/vuln/detail/CVE-2022-2308>,
CVE-2022-2318 <https://nvd.nist.gov/vuln/detail/CVE-2022-2318>,
CVE-2022-23222 <https://nvd.nist.gov/vuln/detail/CVE-2022-23222>,
CVE-2022-2380 <https://nvd.nist.gov/vuln/detail/CVE-2022-2380>,
CVE-2022-23960 <https://nvd.nist.gov/vuln/detail/CVE-2022-23960>,
CVE-2022-24448 <https://nvd.nist.gov/vuln/detail/CVE-2022-24448>,
CVE-2022-24958 <https://nvd.nist.gov/vuln/detail/CVE-2022-24958>,
CVE-2022-24959 <https://nvd.nist.gov/vuln/detail/CVE-2022-24959>,
CVE-2022-2503 <https://nvd.nist.gov/vuln/detail/CVE-2022-2503>,
CVE-2022-25258 <https://nvd.nist.gov/vuln/detail/CVE-2022-25258>,
CVE-2022-25375 <https://nvd.nist.gov/vuln/detail/CVE-2022-25375>,
CVE-2022-25636 <https://nvd.nist.gov/vuln/detail/CVE-2022-25636>,
CVE-2022-2585 <https://nvd.nist.gov/vuln/detail/CVE-2022-2585>,
CVE-2022-2586 <https://nvd.nist.gov/vuln/detail/CVE-2022-2586>,
CVE-2022-2588 <https://nvd.nist.gov/vuln/detail/CVE-2022-2588>,
CVE-2022-2590 <https://nvd.nist.gov/vuln/detail/CVE-2022-2590>,
CVE-2022-2602 <https://nvd.nist.gov/vuln/detail/CVE-2022-2602>,
CVE-2022-26365 <https://nvd.nist.gov/vuln/detail/CVE-2022-26365>,
CVE-2022-26373 <https://nvd.nist.gov/vuln/detail/CVE-2022-26373>,
CVE-2022-2639 <https://nvd.nist.gov/vuln/detail/CVE-2022-2639>,
CVE-2022-26490 <https://nvd.nist.gov/vuln/detail/CVE-2022-26490>,
CVE-2022-2663 <https://nvd.nist.gov/vuln/detail/CVE-2022-2663>,
CVE-2022-26966 <https://nvd.nist.gov/vuln/detail/CVE-2022-26966>,
CVE-2022-27223 <https://nvd.nist.gov/vuln/detail/CVE-2022-27223>,
CVE-2022-27666 <https://nvd.nist.gov/vuln/detail/CVE-2022-27666>,
CVE-2022-27672 <https://nvd.nist.gov/vuln/detail/CVE-2022-27672>,
CVE-2022-2785 <https://nvd.nist.gov/vuln/detail/CVE-2022-2785>,
CVE-2022-27950 <https://nvd.nist.gov/vuln/detail/CVE-2022-27950>,
CVE-2022-28356 <https://nvd.nist.gov/vuln/detail/CVE-2022-28356>,
CVE-2022-28388 <https://nvd.nist.gov/vuln/detail/CVE-2022-28388>,
CVE-2022-28389 <https://nvd.nist.gov/vuln/detail/CVE-2022-28389>,
CVE-2022-28390 <https://nvd.nist.gov/vuln/detail/CVE-2022-28390>,
CVE-2022-2873 <https://nvd.nist.gov/vuln/detail/CVE-2022-2873>,
CVE-2022-28796 <https://nvd.nist.gov/vuln/detail/CVE-2022-28796>,
CVE-2022-28893 <https://nvd.nist.gov/vuln/detail/CVE-2022-28893>,
CVE-2022-2905 <https://nvd.nist.gov/vuln/detail/CVE-2022-2905>,
CVE-2022-29156 <https://nvd.nist.gov/vuln/detail/CVE-2022-29156>,
CVE-2022-2938 <https://nvd.nist.gov/vuln/detail/CVE-2022-2938>,
CVE-2022-29581 <https://nvd.nist.gov/vuln/detail/CVE-2022-29581>,
CVE-2022-29582 <https://nvd.nist.gov/vuln/detail/CVE-2022-29582>,
CVE-2022-2959 <https://nvd.nist.gov/vuln/detail/CVE-2022-2959>,
CVE-2022-2964 <https://nvd.nist.gov/vuln/detail/CVE-2022-2964>,
CVE-2022-2977 <https://nvd.nist.gov/vuln/detail/CVE-2022-2977>,
CVE-2022-2978 <https://nvd.nist.gov/vuln/detail/CVE-2022-2978>,
CVE-2022-29900 <https://nvd.nist.gov/vuln/detail/CVE-2022-29900>,
CVE-2022-29901 <https://nvd.nist.gov/vuln/detail/CVE-2022-29901>,
CVE-2022-29968 <https://nvd.nist.gov/vuln/detail/CVE-2022-29968>,
CVE-2022-3028 <https://nvd.nist.gov/vuln/detail/CVE-2022-3028>,
CVE-2022-30594 <https://nvd.nist.gov/vuln/detail/CVE-2022-30594>,
CVE-2022-3077 <https://nvd.nist.gov/vuln/detail/CVE-2022-3077>,
CVE-2022-3078 <https://nvd.nist.gov/vuln/detail/CVE-2022-3078>,
CVE-2022-3104 <https://nvd.nist.gov/vuln/detail/CVE-2022-3104>,
CVE-2022-3105 <https://nvd.nist.gov/vuln/detail/CVE-2022-3105>,
CVE-2022-3107 <https://nvd.nist.gov/vuln/detail/CVE-2022-3107>,
CVE-2022-3108 <https://nvd.nist.gov/vuln/detail/CVE-2022-3108>,
CVE-2022-3110 <https://nvd.nist.gov/vuln/detail/CVE-2022-3110>,
CVE-2022-3111 <https://nvd.nist.gov/vuln/detail/CVE-2022-3111>,
CVE-2022-3112 <https://nvd.nist.gov/vuln/detail/CVE-2022-3112>,
CVE-2022-3113 <https://nvd.nist.gov/vuln/detail/CVE-2022-3113>,
CVE-2022-3115 <https://nvd.nist.gov/vuln/detail/CVE-2022-3115>,
CVE-2022-3169 <https://nvd.nist.gov/vuln/detail/CVE-2022-3169>,
CVE-2022-3202 <https://nvd.nist.gov/vuln/detail/CVE-2022-3202>,
CVE-2022-32250 <https://nvd.nist.gov/vuln/detail/CVE-2022-32250>,
CVE-2022-32296 <https://nvd.nist.gov/vuln/detail/CVE-2022-32296>,
CVE-2022-3239 <https://nvd.nist.gov/vuln/detail/CVE-2022-3239>,
CVE-2022-32981 <https://nvd.nist.gov/vuln/detail/CVE-2022-32981>,
CVE-2022-3303 <https://nvd.nist.gov/vuln/detail/CVE-2022-3303>,
CVE-2022-3344 <https://nvd.nist.gov/vuln/detail/CVE-2022-3344>,
CVE-2022-33740 <https://nvd.nist.gov/vuln/detail/CVE-2022-33740>,
CVE-2022-33741 <https://nvd.nist.gov/vuln/detail/CVE-2022-33741>,
CVE-2022-33742 <https://nvd.nist.gov/vuln/detail/CVE-2022-33742>,
CVE-2022-33743 <https://nvd.nist.gov/vuln/detail/CVE-2022-33743>,
CVE-2022-33744 <https://nvd.nist.gov/vuln/detail/CVE-2022-33744>,
CVE-2022-33981 <https://nvd.nist.gov/vuln/detail/CVE-2022-33981>,
CVE-2022-3424 <https://nvd.nist.gov/vuln/detail/CVE-2022-3424>,
CVE-2022-3435 <https://nvd.nist.gov/vuln/detail/CVE-2022-3435>,
CVE-2022-34494 <https://nvd.nist.gov/vuln/detail/CVE-2022-34494>,
CVE-2022-34495 <https://nvd.nist.gov/vuln/detail/CVE-2022-34495>,
CVE-2022-34918 <https://nvd.nist.gov/vuln/detail/CVE-2022-34918>,
CVE-2022-3521 <https://nvd.nist.gov/vuln/detail/CVE-2022-3521>,
CVE-2022-3524 <https://nvd.nist.gov/vuln/detail/CVE-2022-3524>,
CVE-2022-3526 <https://nvd.nist.gov/vuln/detail/CVE-2022-3526>,
CVE-2022-3534 <https://nvd.nist.gov/vuln/detail/CVE-2022-3534>,
CVE-2022-3541 <https://nvd.nist.gov/vuln/detail/CVE-2022-3541>,
CVE-2022-3543 <https://nvd.nist.gov/vuln/detail/CVE-2022-3543>,
CVE-2022-3564 <https://nvd.nist.gov/vuln/detail/CVE-2022-3564>,
CVE-2022-3565 <https://nvd.nist.gov/vuln/detail/CVE-2022-3565>,
CVE-2022-3577 <https://nvd.nist.gov/vuln/detail/CVE-2022-3577>,
CVE-2022-3586 <https://nvd.nist.gov/vuln/detail/CVE-2022-3586>,
CVE-2022-3594 <https://nvd.nist.gov/vuln/detail/CVE-2022-3594>,
CVE-2022-3595 <https://nvd.nist.gov/vuln/detail/CVE-2022-3595>,
CVE-2022-36123 <https://nvd.nist.gov/vuln/detail/CVE-2022-36123>,
CVE-2022-3619 <https://nvd.nist.gov/vuln/detail/CVE-2022-3619>,
CVE-2022-3621 <https://nvd.nist.gov/vuln/detail/CVE-2022-3621>,
CVE-2022-3623 <https://nvd.nist.gov/vuln/detail/CVE-2022-3623>,
CVE-2022-3625 <https://nvd.nist.gov/vuln/detail/CVE-2022-3625>,
CVE-2022-3628 <https://nvd.nist.gov/vuln/detail/CVE-2022-3628>,
CVE-2022-36280 <https://nvd.nist.gov/vuln/detail/CVE-2022-36280>,
CVE-2022-3635 <https://nvd.nist.gov/vuln/detail/CVE-2022-3635>,
CVE-2022-3640 <https://nvd.nist.gov/vuln/detail/CVE-2022-3640>,
CVE-2022-3643 <https://nvd.nist.gov/vuln/detail/CVE-2022-3643>,
CVE-2022-3646 <https://nvd.nist.gov/vuln/detail/CVE-2022-3646>,
CVE-2022-3649 <https://nvd.nist.gov/vuln/detail/CVE-2022-3649>,
CVE-2022-36879 <https://nvd.nist.gov/vuln/detail/CVE-2022-36879>,
CVE-2022-36946 <https://nvd.nist.gov/vuln/detail/CVE-2022-36946>,
CVE-2022-3707 <https://nvd.nist.gov/vuln/detail/CVE-2022-3707>,
CVE-2022-38457 <https://nvd.nist.gov/vuln/detail/CVE-2022-38457>,
CVE-2022-3910 <https://nvd.nist.gov/vuln/detail/CVE-2022-3910>,
CVE-2022-39189 <https://nvd.nist.gov/vuln/detail/CVE-2022-39189>,
CVE-2022-39190 <https://nvd.nist.gov/vuln/detail/CVE-2022-39190>,
CVE-2022-3977 <https://nvd.nist.gov/vuln/detail/CVE-2022-3977>,
CVE-2022-40133 <https://nvd.nist.gov/vuln/detail/CVE-2022-40133>,
CVE-2022-40307 <https://nvd.nist.gov/vuln/detail/CVE-2022-40307>,
CVE-2022-40768 <https://nvd.nist.gov/vuln/detail/CVE-2022-40768>,
CVE-2022-4095 <https://nvd.nist.gov/vuln/detail/CVE-2022-4095>,
CVE-2022-40982 <https://nvd.nist.gov/vuln/detail/CVE-2022-40982>,
CVE-2022-41218 <https://nvd.nist.gov/vuln/detail/CVE-2022-41218>,
CVE-2022-4128 <https://nvd.nist.gov/vuln/detail/CVE-2022-4128>,
CVE-2022-4139 <https://nvd.nist.gov/vuln/detail/CVE-2022-4139>,
CVE-2022-41674 <https://nvd.nist.gov/vuln/detail/CVE-2022-41674>,
CVE-2022-41849 <https://nvd.nist.gov/vuln/detail/CVE-2022-41849>,
CVE-2022-41850 <https://nvd.nist.gov/vuln/detail/CVE-2022-41850>,
CVE-2022-41858 <https://nvd.nist.gov/vuln/detail/CVE-2022-41858>,
CVE-2022-42328 <https://nvd.nist.gov/vuln/detail/CVE-2022-42328>,
CVE-2022-42329 <https://nvd.nist.gov/vuln/detail/CVE-2022-42329>,
CVE-2022-42432 <https://nvd.nist.gov/vuln/detail/CVE-2022-42432>,
CVE-2022-4269 <https://nvd.nist.gov/vuln/detail/CVE-2022-4269>,
CVE-2022-42703 <https://nvd.nist.gov/vuln/detail/CVE-2022-42703>,
CVE-2022-42719 <https://nvd.nist.gov/vuln/detail/CVE-2022-42719>,
CVE-2022-42720 <https://nvd.nist.gov/vuln/detail/CVE-2022-42720>,
CVE-2022-42721 <https://nvd.nist.gov/vuln/detail/CVE-2022-42721>,
CVE-2022-42722 <https://nvd.nist.gov/vuln/detail/CVE-2022-42722>,
CVE-2022-42895 <https://nvd.nist.gov/vuln/detail/CVE-2022-42895>,
CVE-2022-42896 <https://nvd.nist.gov/vuln/detail/CVE-2022-42896>,
CVE-2022-43750 <https://nvd.nist.gov/vuln/detail/CVE-2022-43750>,
CVE-2022-4378 <https://nvd.nist.gov/vuln/detail/CVE-2022-4378>,
CVE-2022-4379 <https://nvd.nist.gov/vuln/detail/CVE-2022-4379>,
CVE-2022-4382 <https://nvd.nist.gov/vuln/detail/CVE-2022-4382>,
CVE-2022-43945 <https://nvd.nist.gov/vuln/detail/CVE-2022-43945>,
CVE-2022-45869 <https://nvd.nist.gov/vuln/detail/CVE-2022-45869>,
CVE-2022-45886 <https://nvd.nist.gov/vuln/detail/CVE-2022-45886>,
CVE-2022-45887 <https://nvd.nist.gov/vuln/detail/CVE-2022-45887>,
CVE-2022-45919 <https://nvd.nist.gov/vuln/detail/CVE-2022-45919>,
CVE-2022-45934 <https://nvd.nist.gov/vuln/detail/CVE-2022-45934>,
CVE-2022-4662 <https://nvd.nist.gov/vuln/detail/CVE-2022-4662>,
CVE-2022-47518 <https://nvd.nist.gov/vuln/detail/CVE-2022-47518>,
CVE-2022-47519 <https://nvd.nist.gov/vuln/detail/CVE-2022-47519>,
CVE-2022-47520 <https://nvd.nist.gov/vuln/detail/CVE-2022-47520>,
CVE-2022-47521 <https://nvd.nist.gov/vuln/detail/CVE-2022-47521>,
CVE-2022-47929 <https://nvd.nist.gov/vuln/detail/CVE-2022-47929>,
CVE-2022-47938 <https://nvd.nist.gov/vuln/detail/CVE-2022-47938>,
CVE-2022-47939 <https://nvd.nist.gov/vuln/detail/CVE-2022-47939>,
CVE-2022-47940 <https://nvd.nist.gov/vuln/detail/CVE-2022-47940>,
CVE-2022-47941 <https://nvd.nist.gov/vuln/detail/CVE-2022-47941>,
CVE-2022-47942 <https://nvd.nist.gov/vuln/detail/CVE-2022-47942>,
CVE-2022-47943 <https://nvd.nist.gov/vuln/detail/CVE-2022-47943>,
CVE-2022-4842 <https://nvd.nist.gov/vuln/detail/CVE-2022-4842>,
CVE-2022-48423 <https://nvd.nist.gov/vuln/detail/CVE-2022-48423>,
CVE-2022-48424 <https://nvd.nist.gov/vuln/detail/CVE-2022-48424>,
CVE-2022-48425 <https://nvd.nist.gov/vuln/detail/CVE-2022-48425>,
CVE-2022-48502 <https://nvd.nist.gov/vuln/detail/CVE-2022-48502>,
CVE-2023-0045 <https://nvd.nist.gov/vuln/detail/CVE-2023-0045>,
CVE-2023-0160 <https://nvd.nist.gov/vuln/detail/CVE-2023-0160>,
CVE-2023-0179 <https://nvd.nist.gov/vuln/detail/CVE-2023-0179>,
CVE-2023-0210 <https://nvd.nist.gov/vuln/detail/CVE-2023-0210>,
CVE-2023-0266 <https://nvd.nist.gov/vuln/detail/CVE-2023-0266>,
CVE-2023-0386 <https://nvd.nist.gov/vuln/detail/CVE-2023-0386>,
CVE-2023-0394 <https://nvd.nist.gov/vuln/detail/CVE-2023-0394>,
CVE-2023-0458 <https://nvd.nist.gov/vuln/detail/CVE-2023-0458>,
CVE-2023-0459 <https://nvd.nist.gov/vuln/detail/CVE-2023-0459>,
CVE-2023-0461 <https://nvd.nist.gov/vuln/detail/CVE-2023-0461>,
CVE-2023-0468 <https://nvd.nist.gov/vuln/detail/CVE-2023-0468>,
CVE-2023-0469 <https://nvd.nist.gov/vuln/detail/CVE-2023-0469>,
CVE-2023-0590 <https://nvd.nist.gov/vuln/detail/CVE-2023-0590>,
CVE-2023-0615 <https://nvd.nist.gov/vuln/detail/CVE-2023-0615>,
CVE-2023-1032 <https://nvd.nist.gov/vuln/detail/CVE-2023-1032>,
CVE-2023-1073 <https://nvd.nist.gov/vuln/detail/CVE-2023-1073>,
CVE-2023-1074 <https://nvd.nist.gov/vuln/detail/CVE-2023-1074>,
CVE-2023-1075 <https://nvd.nist.gov/vuln/detail/CVE-2023-1075>,
CVE-2023-1076 <https://nvd.nist.gov/vuln/detail/CVE-2023-1076>,
CVE-2023-1077 <https://nvd.nist.gov/vuln/detail/CVE-2023-1077>,
CVE-2023-1078 <https://nvd.nist.gov/vuln/detail/CVE-2023-1078>,
CVE-2023-1079 <https://nvd.nist.gov/vuln/detail/CVE-2023-1079>,
CVE-2023-1095 <https://nvd.nist.gov/vuln/detail/CVE-2023-1095>,
CVE-2023-1118 <https://nvd.nist.gov/vuln/detail/CVE-2023-1118>,
CVE-2023-1192 <https://nvd.nist.gov/vuln/detail/CVE-2023-1192>,
CVE-2023-1194 <https://nvd.nist.gov/vuln/detail/CVE-2023-1194>,
CVE-2023-1206 <https://nvd.nist.gov/vuln/detail/CVE-2023-1206>,
CVE-2023-1249 <https://nvd.nist.gov/vuln/detail/CVE-2023-1249>,
CVE-2023-1281 <https://nvd.nist.gov/vuln/detail/CVE-2023-1281>,
CVE-2023-1380 <https://nvd.nist.gov/vuln/detail/CVE-2023-1380>,
CVE-2023-1382 <https://nvd.nist.gov/vuln/detail/CVE-2023-1382>,
CVE-2023-1513 <https://nvd.nist.gov/vuln/detail/CVE-2023-1513>,
CVE-2023-1582 <https://nvd.nist.gov/vuln/detail/CVE-2023-1582>,
CVE-2023-1583 <https://nvd.nist.gov/vuln/detail/CVE-2023-1583>,
CVE-2023-1611 <https://nvd.nist.gov/vuln/detail/CVE-2023-1611>,
CVE-2023-1637 <https://nvd.nist.gov/vuln/detail/CVE-2023-1637>,
CVE-2023-1652 <https://nvd.nist.gov/vuln/detail/CVE-2023-1652>,
CVE-2023-1670 <https://nvd.nist.gov/vuln/detail/CVE-2023-1670>,
CVE-2023-1829 <https://nvd.nist.gov/vuln/detail/CVE-2023-1829>,
CVE-2023-1838 <https://nvd.nist.gov/vuln/detail/CVE-2023-1838>,
CVE-2023-1855 <https://nvd.nist.gov/vuln/detail/CVE-2023-1855>,
CVE-2023-1859 <https://nvd.nist.gov/vuln/detail/CVE-2023-1859>,
CVE-2023-1872 <https://nvd.nist.gov/vuln/detail/CVE-2023-1872>,
CVE-2023-1989 <https://nvd.nist.gov/vuln/detail/CVE-2023-1989>,
CVE-2023-1990 <https://nvd.nist.gov/vuln/detail/CVE-2023-1990>,
CVE-2023-1998 <https://nvd.nist.gov/vuln/detail/CVE-2023-1998>,
CVE-2023-2002 <https://nvd.nist.gov/vuln/detail/CVE-2023-2002>,
CVE-2023-2006 <https://nvd.nist.gov/vuln/detail/CVE-2023-2006>,
CVE-2023-2008 <https://nvd.nist.gov/vuln/detail/CVE-2023-2008>,
CVE-2023-2019 <https://nvd.nist.gov/vuln/detail/CVE-2023-2019>,
CVE-2023-20569 <https://nvd.nist.gov/vuln/detail/CVE-2023-20569>,
CVE-2023-20588 <https://nvd.nist.gov/vuln/detail/CVE-2023-20588>,
CVE-2023-20593 <https://nvd.nist.gov/vuln/detail/CVE-2023-20593>,
CVE-2023-20928 <https://nvd.nist.gov/vuln/detail/CVE-2023-20928>,
CVE-2023-20938 <https://nvd.nist.gov/vuln/detail/CVE-2023-20938>,
CVE-2023-21102 <https://nvd.nist.gov/vuln/detail/CVE-2023-21102>,
CVE-2023-21106 <https://nvd.nist.gov/vuln/detail/CVE-2023-21106>,
CVE-2023-2124 <https://nvd.nist.gov/vuln/detail/CVE-2023-2124>,
CVE-2023-21255 <https://nvd.nist.gov/vuln/detail/CVE-2023-21255>,
CVE-2023-2156 <https://nvd.nist.gov/vuln/detail/CVE-2023-2156>,
CVE-2023-2162 <https://nvd.nist.gov/vuln/detail/CVE-2023-2162>,
CVE-2023-2163 <https://nvd.nist.gov/vuln/detail/CVE-2023-2163>,
CVE-2023-2166 <https://nvd.nist.gov/vuln/detail/CVE-2023-2166>,
CVE-2023-2177 <https://nvd.nist.gov/vuln/detail/CVE-2023-2177>,
CVE-2023-2194 <https://nvd.nist.gov/vuln/detail/CVE-2023-2194>,
CVE-2023-2235 <https://nvd.nist.gov/vuln/detail/CVE-2023-2235>,
CVE-2023-2236 <https://nvd.nist.gov/vuln/detail/CVE-2023-2236>,
CVE-2023-2269 <https://nvd.nist.gov/vuln/detail/CVE-2023-2269>,
CVE-2023-22996 <https://nvd.nist.gov/vuln/detail/CVE-2023-22996>,
CVE-2023-22997 <https://nvd.nist.gov/vuln/detail/CVE-2023-22997>,
CVE-2023-22998 <https://nvd.nist.gov/vuln/detail/CVE-2023-22998>,
CVE-2023-22999 <https://nvd.nist.gov/vuln/detail/CVE-2023-22999>,
CVE-2023-23001 <https://nvd.nist.gov/vuln/detail/CVE-2023-23001>,
CVE-2023-23002 <https://nvd.nist.gov/vuln/detail/CVE-2023-23002>,
CVE-2023-23454 <https://nvd.nist.gov/vuln/detail/CVE-2023-23454>,
CVE-2023-23455 <https://nvd.nist.gov/vuln/detail/CVE-2023-23455>,
CVE-2023-23559 <https://nvd.nist.gov/vuln/detail/CVE-2023-23559>,
CVE-2023-2430 <https://nvd.nist.gov/vuln/detail/CVE-2023-2430>,
CVE-2023-25012 <https://nvd.nist.gov/vuln/detail/CVE-2023-25012>,
CVE-2023-2513 <https://nvd.nist.gov/vuln/detail/CVE-2023-2513>,
CVE-2023-25775 <https://nvd.nist.gov/vuln/detail/CVE-2023-25775>,
CVE-2023-26544 <https://nvd.nist.gov/vuln/detail/CVE-2023-26544>,
CVE-2023-26545 <https://nvd.nist.gov/vuln/detail/CVE-2023-26545>,
CVE-2023-26606 <https://nvd.nist.gov/vuln/detail/CVE-2023-26606>,
CVE-2023-26607 <https://nvd.nist.gov/vuln/detail/CVE-2023-26607>,
CVE-2023-28327 <https://nvd.nist.gov/vuln/detail/CVE-2023-28327>,
CVE-2023-28328 <https://nvd.nist.gov/vuln/detail/CVE-2023-28328>,
CVE-2023-28410 <https://nvd.nist.gov/vuln/detail/CVE-2023-28410>,
CVE-2023-28466 <https://nvd.nist.gov/vuln/detail/CVE-2023-28466>,
CVE-2023-28866 <https://nvd.nist.gov/vuln/detail/CVE-2023-28866>,
CVE-2023-2898 <https://nvd.nist.gov/vuln/detail/CVE-2023-2898>,
CVE-2023-2985 <https://nvd.nist.gov/vuln/detail/CVE-2023-2985>,
CVE-2023-3006 <https://nvd.nist.gov/vuln/detail/CVE-2023-3006>,
CVE-2023-30456 <https://nvd.nist.gov/vuln/detail/CVE-2023-30456>,
CVE-2023-30772 <https://nvd.nist.gov/vuln/detail/CVE-2023-30772>,
CVE-2023-3090 <https://nvd.nist.gov/vuln/detail/CVE-2023-3090>,
CVE-2023-3111 <https://nvd.nist.gov/vuln/detail/CVE-2023-3111>,
CVE-2023-31248 <https://nvd.nist.gov/vuln/detail/CVE-2023-31248>,
CVE-2023-3141 <https://nvd.nist.gov/vuln/detail/CVE-2023-3141>,
CVE-2023-31436 <https://nvd.nist.gov/vuln/detail/CVE-2023-31436>,
CVE-2023-3159 <https://nvd.nist.gov/vuln/detail/CVE-2023-3159>,
CVE-2023-3161 <https://nvd.nist.gov/vuln/detail/CVE-2023-3161>,
CVE-2023-3212 <https://nvd.nist.gov/vuln/detail/CVE-2023-3212>,
CVE-2023-3220 <https://nvd.nist.gov/vuln/detail/CVE-2023-3220>,
CVE-2023-32233 <https://nvd.nist.gov/vuln/detail/CVE-2023-32233>,
CVE-2023-32247 <https://nvd.nist.gov/vuln/detail/CVE-2023-32247>,
CVE-2023-32248 <https://nvd.nist.gov/vuln/detail/CVE-2023-32248>,
CVE-2023-32250 <https://nvd.nist.gov/vuln/detail/CVE-2023-32250>,
CVE-2023-32252 <https://nvd.nist.gov/vuln/detail/CVE-2023-32252>,
CVE-2023-32254 <https://nvd.nist.gov/vuln/detail/CVE-2023-32254>,
CVE-2023-32257 <https://nvd.nist.gov/vuln/detail/CVE-2023-32257>,
CVE-2023-32258 <https://nvd.nist.gov/vuln/detail/CVE-2023-32258>,
CVE-2023-32269 <https://nvd.nist.gov/vuln/detail/CVE-2023-32269>,
CVE-2023-3268 <https://nvd.nist.gov/vuln/detail/CVE-2023-3268>,
CVE-2023-3269 <https://nvd.nist.gov/vuln/detail/CVE-2023-3269>,
CVE-2023-33203 <https://nvd.nist.gov/vuln/detail/CVE-2023-33203>,
CVE-2023-33288 <https://nvd.nist.gov/vuln/detail/CVE-2023-33288>,
CVE-2023-3355 <https://nvd.nist.gov/vuln/detail/CVE-2023-3355>,
CVE-2023-3357 <https://nvd.nist.gov/vuln/detail/CVE-2023-3357>,
CVE-2023-3358 <https://nvd.nist.gov/vuln/detail/CVE-2023-3358>,
CVE-2023-3359 <https://nvd.nist.gov/vuln/detail/CVE-2023-3359>,
CVE-2023-3390 <https://nvd.nist.gov/vuln/detail/CVE-2023-3390>,
CVE-2023-33951 <https://nvd.nist.gov/vuln/detail/CVE-2023-33951>,
CVE-2023-33952 <https://nvd.nist.gov/vuln/detail/CVE-2023-33952>,
CVE-2023-34319 <https://nvd.nist.gov/vuln/detail/CVE-2023-34319>,
CVE-2023-3439 <https://nvd.nist.gov/vuln/detail/CVE-2023-3439>,
CVE-2023-35001 <https://nvd.nist.gov/vuln/detail/CVE-2023-35001>,
CVE-2023-3567 <https://nvd.nist.gov/vuln/detail/CVE-2023-3567>,
CVE-2023-35788 <https://nvd.nist.gov/vuln/detail/CVE-2023-35788>,
CVE-2023-35823 <https://nvd.nist.gov/vuln/detail/CVE-2023-35823>,
CVE-2023-35824 <https://nvd.nist.gov/vuln/detail/CVE-2023-35824>,
CVE-2023-35826 <https://nvd.nist.gov/vuln/detail/CVE-2023-35826>,
CVE-2023-35828 <https://nvd.nist.gov/vuln/detail/CVE-2023-35828>,
CVE-2023-35829 <https://nvd.nist.gov/vuln/detail/CVE-2023-35829>,
CVE-2023-3609 <https://nvd.nist.gov/vuln/detail/CVE-2023-3609>,
CVE-2023-3610 <https://nvd.nist.gov/vuln/detail/CVE-2023-3610>,
CVE-2023-3611 <https://nvd.nist.gov/vuln/detail/CVE-2023-3611>,
CVE-2023-3772 <https://nvd.nist.gov/vuln/detail/CVE-2023-3772>,
CVE-2023-3773 <https://nvd.nist.gov/vuln/detail/CVE-2023-3773>,
CVE-2023-3776 <https://nvd.nist.gov/vuln/detail/CVE-2023-3776>,
CVE-2023-3777 <https://nvd.nist.gov/vuln/detail/CVE-2023-3777>,
CVE-2023-3812 <https://nvd.nist.gov/vuln/detail/CVE-2023-3812>,
CVE-2023-38409 <https://nvd.nist.gov/vuln/detail/CVE-2023-38409>,
CVE-2023-38426 <https://nvd.nist.gov/vuln/detail/CVE-2023-38426>,
CVE-2023-38427 <https://nvd.nist.gov/vuln/detail/CVE-2023-38427>,
CVE-2023-38428 <https://nvd.nist.gov/vuln/detail/CVE-2023-38428>,
CVE-2023-38429 <https://nvd.nist.gov/vuln/detail/CVE-2023-38429>,
CVE-2023-38430 <https://nvd.nist.gov/vuln/detail/CVE-2023-38430>,
CVE-2023-38431 <https://nvd.nist.gov/vuln/detail/CVE-2023-38431>,
CVE-2023-38432 <https://nvd.nist.gov/vuln/detail/CVE-2023-38432>,
CVE-2023-3863 <https://nvd.nist.gov/vuln/detail/CVE-2023-3863>,
CVE-2023-3865 <https://nvd.nist.gov/vuln/detail/CVE-2023-3865>,
CVE-2023-3866 <https://nvd.nist.gov/vuln/detail/CVE-2023-3866>,
CVE-2023-3867 <https://nvd.nist.gov/vuln/detail/CVE-2023-3867>,
CVE-2023-4004 <https://nvd.nist.gov/vuln/detail/CVE-2023-4004>,
CVE-2023-4015 <https://nvd.nist.gov/vuln/detail/CVE-2023-4015>,
CVE-2023-40283 <https://nvd.nist.gov/vuln/detail/CVE-2023-40283>,
CVE-2023-4128 <https://nvd.nist.gov/vuln/detail/CVE-2023-4128>,
CVE-2023-4132 <https://nvd.nist.gov/vuln/detail/CVE-2023-4132>,
CVE-2023-4147 <https://nvd.nist.gov/vuln/detail/CVE-2023-4147>,
CVE-2023-4155 <https://nvd.nist.gov/vuln/detail/CVE-2023-4155>,
CVE-2023-4206 <https://nvd.nist.gov/vuln/detail/CVE-2023-4206>,
CVE-2023-4207 <https://nvd.nist.gov/vuln/detail/CVE-2023-4207>,
CVE-2023-4208 <https://nvd.nist.gov/vuln/detail/CVE-2023-4208>,
CVE-2023-4273 <https://nvd.nist.gov/vuln/detail/CVE-2023-4273>,
CVE-2023-42752 <https://nvd.nist.gov/vuln/detail/CVE-2023-42752>,
CVE-2023-42753 <https://nvd.nist.gov/vuln/detail/CVE-2023-42753>,
CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>,
CVE-2023-4385 <https://nvd.nist.gov/vuln/detail/CVE-2023-4385>,
CVE-2023-4387 <https://nvd.nist.gov/vuln/detail/CVE-2023-4387>,
CVE-2023-4389 <https://nvd.nist.gov/vuln/detail/CVE-2023-4389>,
CVE-2023-4394 <https://nvd.nist.gov/vuln/detail/CVE-2023-4394>,
CVE-2023-4459 <https://nvd.nist.gov/vuln/detail/CVE-2023-4459>,
CVE-2023-4569 <https://nvd.nist.gov/vuln/detail/CVE-2023-4569>,
CVE-2023-4623 <https://nvd.nist.gov/vuln/detail/CVE-2023-4623>,
CVE-2023-4921 <https://nvd.nist.gov/vuln/detail/CVE-2023-4921>,
CVE-2022-40982 <https://nvd.nist.gov/vuln/detail/CVE-2022-40982>,
CVE-2022-41804 <https://nvd.nist.gov/vuln/detail/CVE-2022-41804>,
CVE-2023-20569 <https://nvd.nist.gov/vuln/detail/CVE-2023-20569>,
CVE-2023-23908 <https://nvd.nist.gov/vuln/detail/CVE-2023-23908>)
- Go (CVE-2023-29402 <https://nvd.nist.gov/vuln/detail/CVE-2023-29402>,
CVE-2023-29403 <https://nvd.nist.gov/vuln/detail/CVE-2023-29403>,
CVE-2023-29404 <https://nvd.nist.gov/vuln/detail/CVE-2023-29404>,
CVE-2023-29405 <https://nvd.nist.gov/vuln/detail/CVE-2023-29405>,
CVE-2023-29406 <https://nvd.nist.gov/vuln/detail/CVE-2023-29406>,
CVE-2023-29409 <https://nvd.nist.gov/vuln/detail/CVE-2023-29409>,
CVE-2023-39318 <https://nvd.nist.gov/vuln/detail/CVE-2023-39318>,
CVE-2023-39319 <https://nvd.nist.gov/vuln/detail/CVE-2023-39319>,
CVE-2023-39320 <https://nvd.nist.gov/vuln/detail/CVE-2023-39320>,
CVE-2023-39321 <https://nvd.nist.gov/vuln/detail/CVE-2023-39321>,
CVE-2023-39322 <https://nvd.nist.gov/vuln/detail/CVE-2023-39322>)
- binutils (CVE-2022-38533
<https://nvd.nist.gov/vuln/detail/CVE-2022-38533>, CVE-2022-4285
<https://nvd.nist.gov/vuln/detail/CVE-2022-4285>, CVE-2023-1579
<https://nvd.nist.gov/vuln/detail/CVE-2023-1579>)
- c-ares (CVE-2023-31124
<https://nvd.nist.gov/vuln/detail/CVE-2023-31124>, CVE-2023-31130
<https://nvd.nist.gov/vuln/detail/CVE-2023-31130>, CVE-2023-31147
<https://nvd.nist.gov/vuln/detail/CVE-2023-31147>, CVE-2023-32067
<https://nvd.nist.gov/vuln/detail/CVE-2023-32067>)
- curl (CVE-2023-28319 <https://nvd.nist.gov/vuln/detail/CVE-2023-28319>
, CVE-2023-28320 <https://nvd.nist.gov/vuln/detail/CVE-2023-28320>,
CVE-2023-28321 <https://nvd.nist.gov/vuln/detail/CVE-2023-28321>,
CVE-2023-28322 <https://nvd.nist.gov/vuln/detail/CVE-2023-28322>)
- git (CVE-2023-25652 <https://nvd.nist.gov/vuln/detail/CVE-2023-25652>,
CVE-2023-25815 <https://nvd.nist.gov/vuln/detail/CVE-2023-25815>,
CVE-2023-29007 <https://nvd.nist.gov/vuln/detail/CVE-2023-29007>)
- grub (CVE-2020-10713 <https://nvd.nist.gov/vuln/detail/CVE-2020-10713>
, CVE-2020-14372 <https://nvd.nist.gov/vuln/detail/CVE-2020-14372>,
CVE-2020-25632 <https://nvd.nist.gov/vuln/detail/CVE-2020-25632>,
CVE-2020-25647 <https://nvd.nist.gov/vuln/detail/CVE-2020-25647>,
CVE-2020-27749 <https://nvd.nist.gov/vuln/detail/CVE-2020-27749>,
CVE-2020-27779 <https://nvd.nist.gov/vuln/detail/CVE-2020-27779>,
CVE-2021-20225 <https://nvd.nist.gov/vuln/detail/CVE-2021-20225>,
CVE-2021-20233 <https://nvd.nist.gov/vuln/detail/CVE-2021-20233>,
CVE-2021-3981 <https://nvd.nist.gov/vuln/detail/CVE-2021-3981>,
CVE-2021-3695 <https://nvd.nist.gov/vuln/detail/CVE-2021-3695>,
CVE-2021-3696 <https://nvd.nist.gov/vuln/detail/CVE-2021-3696>,
CVE-2021-3697 <https://nvd.nist.gov/vuln/detail/CVE-2021-3697>,
CVE-2022-28733 <https://nvd.nist.gov/vuln/detail/CVE-2022-28733>,
CVE-2022-28734 <https://nvd.nist.gov/vuln/detail/CVE-2022-28734>,
CVE-2022-28735 <https://nvd.nist.gov/vuln/detail/CVE-2022-28735>,
CVE-2022-28736 <https://nvd.nist.gov/vuln/detail/CVE-2022-28736>,
CVE-2022-28737 <https://nvd.nist.gov/vuln/detail/CVE-2022-28737>,
CVE-2022-2601 <https://nvd.nist.gov/vuln/detail/CVE-2022-2601>,
CVE-2022-3775 <https://nvd.nist.gov/vuln/detail/CVE-2022-3775>)
- intel-microcode (CVE-2022-40982
<https://nvd.nist.gov/vuln/detail/CVE-2022-40982>, CVE-2022-41804
<https://nvd.nist.gov/vuln/detail/CVE-2022-41804>, CVE-2023-23908
<https://nvd.nist.gov/vuln/detail/CVE-2023-23908>)
- libarchive (libarchive-20230729
<https://github.com/libarchive/libarchive/releases/tag/v3.7.1>)
- libcap (CVE-2023-2602 <https://nvd.nist.gov/vuln/detail/CVE-2023-2602>
, CVE-2023-2603 <https://nvd.nist.gov/vuln/detail/CVE-2023-2603>)
- libmicrohttpd (CVE-2023-27371
<https://nvd.nist.gov/vuln/detail/CVE-2023-27371>)
- libxml2 (libxml2-20230428
<https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4>)
- ncurses (CVE-2023-29491
<https://nvd.nist.gov/vuln/detail/CVE-2023-29491>)
- nvidia-drivers (CVE-2023-25515
<https://nvd.nist.gov/vuln/detail/CVE-2023-25515>, CVE-2023-25516
<https://nvd.nist.gov/vuln/detail/CVE-2023-25516>)
- openldap (CVE-2023-2953
<https://nvd.nist.gov/vuln/detail/CVE-2023-2953>)
- OpenSSL (CVE-2023-2650 <https://nvd.nist.gov/vuln/detail/CVE-2023-2650>
, CVE-2023-2975 <https://nvd.nist.gov/vuln/detail/CVE-2023-2975>,
CVE-2023-3446 <https://nvd.nist.gov/vuln/detail/CVE-2023-3446>)
- protobuf (CVE-2022-1941
<https://nvd.nist.gov/vuln/detail/CVE-2022-1941>)
- shadow (CVE-2023-29383
<https://nvd.nist.gov/vuln/detail/CVE-2023-29383>)
- sudo (CVE-2023-27320 <https://nvd.nist.gov/vuln/detail/CVE-2023-27320>
, CVE-2023-28486 <https://nvd.nist.gov/vuln/detail/CVE-2023-28486>,
CVE-2023-28487 <https://nvd.nist.gov/vuln/detail/CVE-2023-28487>)
- torcx (CVE-2022-28948 <https://nvd.nist.gov/vuln/detail/CVE-2022-28948>
)
- vim (CVE-2023-2609 <https://nvd.nist.gov/vuln/detail/CVE-2023-2609>,
CVE-2023-2610 <https://nvd.nist.gov/vuln/detail/CVE-2023-2610>,
CVE-2023-2426 <https://nvd.nist.gov/vuln/detail/CVE-2023-2426>)
- SDK: Python (CVE-2023-40217
<https://nvd.nist.gov/vuln/detail/CVE-2023-40217>, CVE-2023-41105
<https://nvd.nist.gov/vuln/detail/CVE-2023-41105>)
- SDK: qemu (CVE-2023-0330
<https://nvd.nist.gov/vuln/detail/CVE-2023-0330>, CVE-2023-2861
<https://nvd.nist.gov/vuln/detail/CVE-2023-2861>)
- SDK: Rust (CVE-2023-38497
<https://nvd.nist.gov/vuln/detail/CVE-2023-38497>)
- VMware: open-vm-tools (CVE-2023-20867
<https://nvd.nist.gov/vuln/detail/CVE-2023-20867>, CVE-2023-20900
<https://nvd.nist.gov/vuln/detail/CVE-2023-20900>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Bug-fixes2>Bug fixes:

- Fix the RemainAfterExit clause in nvidia.service (Flatcar#1169
<https://github.com/flatcar/Flatcar/issues/1169>)
- Fixed bug in handling renamed network interfaces when generating login
issue (init#102 <https://github.com/flatcar/init/pull/102>)
- Triggered re-reading of partition table to fix adding partitions to
the boot disk (scripts#1202
<https://github.com/flatcar/scripts/pull/1202>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Changes2>Changes:

- [image: :warning:] Dropped support for niftycloud and interoute. For
interoute we haven’t been generating the images for some time already. (
scripts#971 <https://github.com/flatcar/scripts/pull/971>) [image:
:warning:]
- Added TLS Kernel module (scripts#865
<https://github.com/flatcar/scripts/pull/865>)
- Added support for multipart MIME userdata in coreos-cloudinit.
Ignition now detects multipart userdata and delegates execution to
coreos-cloudinit. (scripts#873
<https://github.com/flatcar/scripts/pull/873>)
- Azure and QEMU OEM images now use systemd-sysext images for layering
additional platform-specific software on top of /usr. For Azure images
this also means that the image has a normal Python installation available
through the sysext image. The OEM software is still not updated but this
will be added soon.
- Change nvidia.service to type oneshot (from the default “simple”) so
the subsequent services (configured with “Requires/After”) are executed
after the driver installation is successfully finished (
flatcar/Flatcar#1136 <https://github.com/flatcar/Flatcar/issues/1136>)
- Enabled the virtio GPU driver (scripts#830
<https://github.com/flatcar/scripts/pull/830>)
- Migrate to Type=notify in containerd.service. Changed the unit to
Type=notify, utilizing the existing containerd support for sd_notify call
after socket setup.
- Migrated the NVIDIA installer from the Azure/AWS OEM partition to /usr to
make it available on all platforms (scripts#932
<https://github.com/flatcar/scripts/pull/932/>, Flatcar#1077
<https://github.com/flatcar/Flatcar/issues/1077>)
- Moved a mountpoint of the OEM partition from /usr/share/oem to /oem.
/usr/share/oem became a symlink to /oem for backward compatibility.
Despite the move, the initrd images providing files through
/usr/share/oem should keep using /usr/share/oem. The move was done to
enable activating the OEM sysext images that are placed in the OEM
partition.
- OEM vendor tools are now A/B updated if they are shipped as
systemd-sysext images, the migration happens when both partitions require a
systemd-sysext OEM image - note that this will delete the nvidia.service
from /etc on Azure because it’s now part of /usr (Flatcar#60
<https://github.com/flatcar/Flatcar/issues/60>)
- Updated locksmith to use non-deprecated resource control options in
the systemd unit (Locksmith#20
<https://github.com/flatcar/locksmith/pull/20>)
- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Updates2>Updates:

- Linux (6.1.55 <https://lwn.net/Articles/945379> (includes 6.1.54
<https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.54>
, 6.1.53 <https://lwn.net/Articles/944358>,6.1.52
<https://lwn.net/Articles/943754>, 6.1.51
<https://lwn.net/Articles/943403>, 6.1.50
<https://lwn.net/Articles/943112>, 6.1.49
<https://lwn.net/Articles/942880>, 6.1.48
<https://lwn.net/Articles/942865>, 6.1.47
<https://lwn.net/Articles/942531>, 6.1.46
<https://lwn.net/Articles/941774>, 6.1.45
<https://lwn.net/Articles/941273>, 6.1.44
<https://lwn.net/Articles/940800>, 6.1.43
<https://lwn.net/Articles/940338>, 6.1.42
<https://lwn.net/Articles/939423>, 6.1.41
<https://lwn.net/Articles/939103>, 6.1.40
<https://lwn.net/Articles/939015>, 6.1.39
<https://lwn.net/Articles/938619>, 6.1.38
<https://lwn.net/Articles/937403>, 6.1.37
<https://lwn.net/Articles/937082>, 6.1.36
<https://lwn.net/Articles/936674>, 6.1.35
<https://lwn.net/Articles/935588>, 6.1.34
<https://lwn.net/Articles/934623>, 6.1.33
<https://lwn.net/Articles/934319>, 6.1.32
<https://lwn.net/Articles/933908>, 6.1.31
<https://lwn.net/Articles/933281>, 6.1.30
<https://lwn.net/Articles/932882>, 6.1.29
<https://lwn.net/Articles/932133>, 6.1.28
<https://lwn.net/Articles/931651>, 6.1.27
<https://lwn.net/Articles/930597/>, 6.1
<https://kernelnewbies.org/Linux_6.1>))
- Linux Firmware (20230804
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230804>
(includes 20230625
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625>
, 20230515
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230515>
))
- Go (1.20.8 <https://go.dev/doc/devel/release#go1.20.8> (includes 1.20.7
<https://go.dev/doc/devel/release#go1.20.7>, 1.20.6
<https://go.dev/doc/devel/release#go1.20.6>, 1.20.5
<https://go.dev/doc/devel/release#go1.20.5>, 1.20.4
<https://go.dev/doc/devel/release#go1.20.4>, 1.19.13
<https://go.dev/doc/devel/release#go1.19.13>, 1.19.12
<https://go.dev/doc/devel/release#go1.19.12>, 1.19.11
<https://go.dev/doc/devel/release#go1.19.11>, 1.19.10
<https://go.dev/doc/devel/release#go1.19.10>))
- bind tools (9.16.41
<https://bind9.readthedocs.io/en/v9.16.41/notes.html#notes-for-bind-9-16-41>
)
- binutils (2.40
<https://lists.gnu.org/archive/html/info-gnu/2023-01/msg00003.html>)
- bpftool (6.3
<https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/log/tools/bpf/bpftool?h=v6.3>
)
- c-ares (1.19.1
<https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1>)
- cJSON (1.7.16
<https://github.com/DaveGamble/cJSON/releases/tag/v1.7.16>)
- cifs-utils (7.0
<https://lists.samba.org/archive/samba-technical/2022-August/137528.html>
)
- containerd (1.7.6
<https://github.com/containerd/containerd/releases/tag/v1.7.6> (includes
1.7.5 <https://github.com/containerd/containerd/releases/tag/v1.7.5>,
1.7.4 <https://github.com/containerd/containerd/releases/tag/v1.7.4>,
1.7.3 <https://github.com/containerd/containerd/releases/tag/v1.7.3>,
1.7.2 <https://github.com/containerd/containerd/releases/tag/v1.7.2>))
- coreutils (9.3
<https://lists.gnu.org/archive/html/info-gnu/2023-04/msg00006.html>
(includes 9.1
<https://git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?h=v9.1>))
- cryptsetup (2.6.1
<https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.1/docs/v2.6.1-ReleaseNotes>
(includes 2.6.0
<https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.0/docs/v2.6.0-ReleaseNotes>
and 2.5.0
<https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.5.0/docs/v2.5.0-ReleaseNotes>
))
- curl (8.2.1 <https://curl.se/changes.html#8_2_1> (includes 8.2.0
<https://curl.se/changes.html#8_2_0>, 8.1.2
<https://curl.se/changes.html#8_1_2>, 8.1.0
<https://curl.se/changes.html#8_1_0>))
- debianutils (5.7
<https://metadata.ftp-master.debian.org/changelogs//main/d/debianutils/debianutils_5.7-0.4_changelog>
)
- diffutils (3.10
<https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00009.html>)
- elfutils (0.189
<https://sourceware.org/pipermail/elfutils-devel/2023q1/006023.html>)
- ethtool (6.4
<https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.4>
(includes 6.3
<https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=7bdf78f0d2a9ae1571fe9444e552490130e573fd>
, 6.2
<https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.2>
))
- gawk (5.2.2
<https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00008.html>)
- gdb (13.2
<https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00011.html>)
- gdbm (1.23
<https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00004.html>)
- git (2.41.0 <https://lore.kernel.org/git/xmqqleh3a3wm.fsf@gitster.g/>
(includes 2.39.3
<https://github.com/git/git/blob/v2.39.3/Documentation/RelNotes/2.39.3.txt>
))
- glib (2.76.4 <https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.4>
(includes 2.76.3 <https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.3>
, 2.76.2 <https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.2>))
- glibc (2.37
<https://sourceware.org/git/?p=glibc.git;a=tag;h=refs/tags/glibc-2.37>)
- gmp (6.3.0 <https://gmplib.org/gmp6.3>)
- gptfdisk (1.0.9
<https://sourceforge.net/p/gptfdisk/code/ci/1d46f3723bc25f5598266f7d9a3548af3cee0c77/tree/NEWS>
)
- grep (3.11
<https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00004.html>
(includes 3.8 <http://savannah.gnu.org/forum/forum.php?forum_id=10227>))
- grub (2.06
<https://lists.gnu.org/archive/html/grub-devel/2021-06/msg00022.html>)
- hwdata (0.373 <https://github.com/vcrhonek/hwdata/commits/v0.373>
(includes 0.372 <https://github.com/vcrhonek/hwdata/commits/v0.372>,
0.371 <https://github.com/vcrhonek/hwdata/commits/v0.371>, 0.367
<https://github.com/vcrhonek/hwdata/releases/tag/v0.367>))
- inih (57 <https://github.com/benhoyt/inih/releases/tag/r57> (includes
56 <https://github.com/benhoyt/inih/releases/tag/r56>))
- intel-microcode (20230808
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230808>
(includes 20230613
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230613>
, 20230512
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230512>
))
- iperf (3.14
<https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-314-2023-07-07>
)
- iproute2 (6.4.0
<https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/?h=v6.4.0>
(includes 6.3.0 <https://lwn.net/Articles/930473/>, 6.2
<https://lwn.net/Articles/923952/>))
- ipset (7.17
<https://git.netfilter.org/ipset/tree/ChangeLog?id=186f9b57c60bb53aae5f6633eff1e9d5e9095c3e>
)
- kbd (2.6.1 <https://github.com/legionus/kbd/releases/tag/v2.6.1>
(includes 2.6.0 <https://github.com/legionus/kbd/releases/tag/v2.6.0>,
2.5.1 <https://github.com/legionus/kbd/releases/tag/v2.5.1>))
- kmod (30 <https://lwn.net/Articles/899526/>)
- ldb (2.4.4
<https://gitlab.com/samba-team/samba/-/commit/b686ef00da46d4a0c0aba0c61b1866cbc9b462b6>
(includes 2.4.3
<https://gitlab.com/samba-team/samba/-/commit/604f94704f30e90ef960aa2be62a14d2e614a002>
, 2.4.2
<https://gitlab.com/samba-team/samba/-/commit/d93892d2e8ed69758c15ab18bc03bba09e715bc6>
))
- less (633 <http://www.greenwoodsoftware.com/less/news.633.html>
(includes 632 <http://www.greenwoodsoftware.com/less/news.632.html>))
- libarchive (3.7.1
<https://github.com/libarchive/libarchive/releases/tag/v3.7.1> (includes
3.7.0 <https://github.com/libarchive/libarchive/releases/tag/v3.7.0>))
- libassuan (2.5.6
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=e52bb5dd36ac93ea227e53e89f82af9ccf38f339;hb=6b50ee6bcdd6aa81bd7cc3fb2379864c3ed479b8>
)
- libbsd (0.11.7
<https://lists.freedesktop.org/archives/libbsd/2022-October/000337.html>)
- libcap (2.69
<https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe>
)
- libgcrypt (1.10.1
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=03132c2a115e35783a782c64777cf5f5b1a2825f;hb=ae0e567820c37f9640440b3cff77d7c185aa6742>
)
- libgpg-error (1.47 <https://dev.gnupg.org/T6231> (includes 1.46
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=14b0ba97d6ba2b10b3178f2e4a3e24bfc2355bb3;hb=ea031873aa9642831017937fd33e9009d514ee07>
))
- libksba (1.6.4
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=f640523209c1c9ce9855040e53914a79d24d6a67;hb=557999424ebd13e70d6fc17e648a5dd2a06f440b>
)
- libmd (1.1.0 <https://git.hadrons.org/cgit/libmd.git/log/?h=1.1.0>)
- libmicrohttpd (0.9.77
<https://gitlab.com/libmicrohttpd/libmicrohttpd/-/releases/v0.9.77>
(includes 0.9.76
<https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html>
))
- libnftnl (1.2.6
<https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.6> (includes
1.2.5 <https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.5>))
- libnvme (1.5 <https://github.com/linux-nvme/libnvme/releases/tag/v1.5>)
- libpcap (1.10.4
<https://github.com/the-tcpdump-group/libpcap/blob/24832dd2728bd95ed9b9464ef27b47a943c38003/CHANGES#L51>
)
- libpcre (8.45)
- libpipeline (1.5.7
<https://gitlab.com/libpipeline/libpipeline/-/tags/1.5.7>)
- libusb (1.0.26
<https://github.com/libusb/libusb/blob/v1.0.26/ChangeLog>)
- libuv (1.46.0 <https://github.com/libuv/libuv/releases/tag/v1.46.0>
(includes 1.45.0 <https://github.com/libuv/libuv/releases/tag/v1.45.0>))
- libxml2 (2.11.4
<https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4>)
- libxslt (1.1.38
<https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.38>)
- lsof (4.98.0
<https://github.com/lsof-org/lsof/blob/4.98.0/00DIST#L5471>)
- lua (5.4.4 <https://www.lua.org/manual/5.4/readme.html#changes>)
- multipath-tools (0.9.5
<https://github.com/opensvc/multipath-tools/commits/0.9.5>)
- ncurses (6.4
<https://invisible-island.net/ncurses/announce.html#h2-release-notes>)
- nettle (3.9.1
<https://git.lysator.liu.se/nettle/nettle/-/blob/nettle_3.9.1_release_20230601/ChangeLog>
)
- nmap (7.94 <https://nmap.org/changelog.html#7.94>)
- nvidia-drivers (535.104.05
<https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-104-05/index.html>
)
- nvme-cli (2.5
<https://github.com/linux-nvme/nvme-cli/releases/tag/v2.5> (includes 2.3
<https://github.com/linux-nvme/nvme-cli/releases/tag/v2.3>))
- open-isns (0.102
<https://github.com/open-iscsi/open-isns/blob/v0.102/ChangeLog>)
- openldap (2.6.4
<https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_4/CHANGES>
(includes 2.6.3
<https://lists.openldap.org/hyperkitty/list/openldap...@openldap.org/thread/FQJM2JSSSOMLQH7XC7Q5IZJYOGCTV2LK/>
, 2.6
<https://lists.openldap.org/hyperkitty/list/openldap...@openldap.org/thread/IHS5V46H6NFNFUERMC6AWMPHTWRVNLFA/>
, 2.5.14
<https://lists.openldap.org/hyperkitty/list/openldap...@openldap.org/thread/TZQHR4SIWUA5BZTKDAKSFDOOGDVU4TU7/>
, 2.5
<https://lists.openldap.org/hyperkitty/list/openldap...@openldap.org/thread/BH3VDPG6IYYF5L5U6LZGHHKMJY5HFA3L/>
))
- OpenSSL (3.0.9
<https://github.com/openssl/openssl/blob/openssl-3.0.9/NEWS.md#major-changes-between-openssl-308-and-openssl-309-30-may-2023>
)
- parted (3.6
<https://git.savannah.gnu.org/gitweb/?p=parted.git;a=blob;f=NEWS;h=52bb11697039f70e55120c571750f9ee761a75aa;hb=3b5f327b213d21e9adb9ba933c78dd898fee5b1d>
)
- pax-utils (1.3.7
<https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.7>)
- pciutils (3.10.0
<https://github.com/pciutils/pciutils/blob/v3.10.0/ChangeLog> (includes
3.9.0 <https://github.com/pciutils/pciutils/releases/tag/v3.9.0>))
- popt (1.19
<https://github.com/rpm-software-management/popt/releases/tag/popt-1.19-release>
)
- protobuf (21.9
<https://github.com/protocolbuffers/protobuf/releases/tag/v21.9>)
- psmisc (23.6 <https://gitlab.com/psmisc/psmisc/-/blob/v23.6/ChangeLog>)
- qemu guest agent (8.0.3
<https://wiki.qemu.org/ChangeLog/8.0#Guest_agent> (includes 8.0.0
<https://wiki.qemu.org/ChangeLog/8.0#Guest_agent>))
- quota (4.09
<https://sourceforge.net/p/linuxquota/code/ci/87d2fd7635e4bca54fa2a00b8d5b073ba9ca521b/tree/Changelog>
)
- runc (1.1.9
<https://github.com/opencontainers/runc/releases/tag/v1.1.9> (includes
1.1.8 <https://github.com/opencontainers/runc/releases/tag/v1.1.8>))
- sed (4.9
<https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html>)
- smartmontools (7.3
<https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_3>
)
- sqlite (3.42.0 <https://sqlite.org/releaselog/3_42_0.html>)
- strace (6.3 <https://github.com/strace/strace/releases/tag/v6.3>
(includes 6.2 <https://github.com/strace/strace/releases/tag/v6.2>))
- sudo (1.9.13p3 <https://www.sudo.ws/releases/stable/#1.9.13p3>)
- talloc (2.4.0
<https://gitlab.com/samba-team/samba/-/commit/5224ed98eeba43f22b5f5f87de5947fbb1c1c7c1>
(includes 2.3.4
<https://gitlab.com/samba-team/samba/-/commit/0189ccf9fc3d2a77cc83cffe180e307bcdccebb4>
))
- tar (1.35
<https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html>)
- tdb (1.4.8
<https://gitlab.com/samba-team/samba/-/commit/eab796a4f9172e602dc262f3c99ead35b35929e7>
(includes 1.4.7
<https://gitlab.com/samba-team/samba/-/commit/27ceb1c3ad786386e746a5e2968780d791393b9e>
, 1.4.6
<https://gitlab.com/samba-team/samba/-/commit/1c776e54cf33b46b2ed73263f093d596a0cdbb2f>
))
- tevent (0.14.1
<https://gitlab.com/samba-team/samba/-/commit/d80f28b081e515e32a480daf80b42cf782447a9c>
(includes 0.14.0
<https://gitlab.com/samba-team/samba/-/commit/3c6d28ebae27dba8e40558ae37ae8138ea0b4bdc>
, 0.13.0
<https://gitlab.com/samba-team/samba/-/commit/63d4db63feda920c8020f8484a8b31065b7f1380>
, 0.12.1
<https://gitlab.com/samba-team/samba/-/commit/53692735c733d01acbd953641f831a1f5e0cf6c5>,
0.12.0))
- usbutils (015
<https://github.com/gregkh/usbutils/blob/79b796f945ea7d5c2b0e2a74f9b8819cb7948680/NEWS>
)
- userspace-rcu (0.14.0
<https://github.com/urcu/userspace-rcu/blob/v0.13.2/ChangeLog>)
- util-linux (2.38.1
<https://github.com/util-linux/util-linux/releases/tag/v2.38.1>)
- vim (9.0.1678 <https://github.com/vim/vim/commits/v9.0.1678> includes (
9.0.1677 <https://github.com/vim/vim/commits/v9.0.1677>, 9.0.1503
<https://github.com/vim/vim/commits/v9.0.1503>))
- wget (1.21.4
<https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00003.html>)
- whois (5.5.17
<https://github.com/rfc1036/whois/commit/bac7108b01cfd54c517444efa1239e10e6edd5a4>
)
- xfsprogs (6.4.0
<https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.4.0> (includes
(6.3.0
<https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.3.0>
))
- XZ utils (5.4.3
<https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=2f4d35adca6198671434d2988803cc9316ad1ec8;hb=dbb3a536ed9873ffa0870321f6873e564c6a9da8>
)
- zstandard (1.5.5 <https://github.com/facebook/zstd/releases/tag/v1.5.5>
)
- AWS: amazon-ssm-agent (3.2.985.0
<https://github.com/aws/amazon-ssm-agent/releases/tag/3.2.985.0>)
- SDK: file (5.45 <https://github.com/file/file/blob/FILE5_45/ChangeLog>)
- SDK: gnuconfig (20230731
<https://git.savannah.gnu.org/cgit/config.git/log/?id=d4e37b5868ef910e3e52744c34408084bb13051c>
)
- SDK: kexec-tools (2.0.24
<https://github.com/horms/kexec-tools/releases/tag/v2.0.24>)
- SDK: man-db (2.11.2 <https://gitlab.com/man-db/man-db/-/tags/2.11.2>)
- SDK: man-pages (6.03
<https://lore.kernel.org/lkml/d56662b2-538c-7252...@gmail.com/T/>
)
- SDK: pahole (1.25
<https://github.com/acmel/dwarves/blob/master/changes-v1.25>)
- SDK: perf (6.3
<https://kernelnewbies.org/LinuxChanges#Linux_6.3.Tracing.2C_perf_and_BPF>
)
- SDK: perl (5.36.1 <https://perldoc.perl.org/perl5361delta>)
- SDK: portage (3.0.49
<https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.49>
(includes 3.0.46
<https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.46>))
- SDK: python (3.11.5
<https://www.python.org/downloads/release/python-3115/> (includes 3.11.3
<https://www.python.org/downloads/release/python-3113/>, 3.10.12
<https://www.python.org/downloads/release/python-31012/>, 3.10.11
<https://www.python.org/downloads/release/python-31011/>))
- SDK: qemu (8.0.4 <https://wiki.qemu.org/ChangeLog/8.0> (includes 8.0.3
<https://wiki.qemu.org/ChangeLog/8.0>, 7.2.3
<https://wiki.qemu.org/ChangeLog/7.2>))
- SDK: Rust (1.72.0
<https://github.com/rust-lang/rust/releases/tag/1.72.0> (includes (1.71.1
<https://github.com/rust-lang/rust/releases/tag/1.71.1>, 1.71.0
<https://github.com/rust-lang/rust/releases/tag/1.71.0>, 1.70.0
<https://github.com/rust-lang/rust/releases/tag/1.70.0>))
- VMware: open-vm-tools (12.3.0
<https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0>
(includes 12.2.5
<https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.5>))

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#New-Stable-Release-360220>New
Stable Release 3602.2.0

*Changes since Beta 3602.1.6*
<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Security-fixes3>Security fixes:

- Linux (CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>
)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Bug-fixes3>Bug fixes:

- Triggered re-reading of partition table to fix adding partitions to
the boot disk (scripts#1202
<https://github.com/flatcar/scripts/pull/1202>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Changes3>Changes:

- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Updates3>Updates:

- Linux (5.15.133 <https://lwn.net/Articles/945380>)

Changes compared to Stable 3510.2.8
<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Security-fixes4>Security fixes:

- Linux (CVE-2023-42752 <https://nvd.nist.gov/vuln/detail/CVE-2023-42752>
, CVE-2023-42753 <https://nvd.nist.gov/vuln/detail/CVE-2023-42753>,
CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>,
CVE-2023-4623 <https://nvd.nist.gov/vuln/detail/CVE-2023-4623>,
CVE-2023-4921 <https://nvd.nist.gov/vuln/detail/CVE-2023-4921>)
- Go (CVE-2023-24532 <https://nvd.nist.gov/vuln/detail/CVE-2023-24532>,
CVE-2023-24534 <https://nvd.nist.gov/vuln/detail/CVE-2023-24534>,
CVE-2023-24536 <https://nvd.nist.gov/vuln/detail/CVE-2023-24536>,
CVE-2023-24537 <https://nvd.nist.gov/vuln/detail/CVE-2023-24537>,
CVE-2023-24538 <https://nvd.nist.gov/vuln/detail/CVE-2023-24538>,
CVE-2023-24539 <https://nvd.nist.gov/vuln/detail/CVE-2023-24539>,
CVE-2023-24540 <https://nvd.nist.gov/vuln/detail/CVE-2023-24540>,
CVE-2023-29400 <https://nvd.nist.gov/vuln/detail/CVE-2023-29400>,
CVE-2022-41723 <https://nvd.nist.gov/vuln/detail/CVE-2022-41723>,
CVE-2022-41724 <https://nvd.nist.gov/vuln/detail/CVE-2022-41724>,
CVE-2022-41725 <https://nvd.nist.gov/vuln/detail/CVE-2022-41725>)
- bash (CVE-2022-3715 <https://nvd.nist.gov/vuln/detail/CVE-2022-3715>)
- c-ares (CVE-2022-4904 <https://nvd.nist.gov/vuln/detail/CVE-2022-4904>)
- containerd (CVE-2023-25153
<https://nvd.nist.gov/vuln/detail/CVE-2023-25153>, CVE-2023-25173
<https://nvd.nist.gov/vuln/detail/CVE-2023-25173>)
- curl (CVE-2023-23914 <https://nvd.nist.gov/vuln/detail/CVE-2023-23914>
, CVE-2023-23915 <https://nvd.nist.gov/vuln/detail/CVE-2023-23915> and
CVE-2023-23916 <https://nvd.nist.gov/vuln/detail/CVE-2023-23916>,
CVE-2023-27533 <https://nvd.nist.gov/vuln/detail/CVE-2023-27533>,
CVE-2023-27534 <https://nvd.nist.gov/vuln/detail/CVE-2023-27534>,
CVE-2023-27535 <https://nvd.nist.gov/vuln/detail/CVE-2023-27535>,
CVE-2023-27536 <https://nvd.nist.gov/vuln/detail/CVE-2023-27536>,
CVE-2023-27537 <https://nvd.nist.gov/vuln/detail/CVE-2023-27537>,
CVE-2023-27538 <https://nvd.nist.gov/vuln/detail/CVE-2023-27538>)
- Docker (CVE-2023-28840
<https://nvd.nist.gov/vuln/detail/CVE-2023-28840>, CVE-2023-28841
<https://nvd.nist.gov/vuln/detail/CVE-2023-28841>, CVE-2023-28842
<https://nvd.nist.gov/vuln/detail/CVE-2023-28842>)
- e2fsprogs (CVE-2022-1304
<https://nvd.nist.gov/vuln/detail/CVE-2022-1304>)
- git (CVE-2023-22490 <https://nvd.nist.gov/vuln/detail/CVE-2023-22490>,
CVE-2023-23946 <https://nvd.nist.gov/vuln/detail/CVE-2023-23946>)
- GnuTLS (CVE-2023-0361 <https://nvd.nist.gov/vuln/detail/CVE-2023-0361>)
- intel-microcode (CVE-2022-21216
<https://nvd.nist.gov/vuln/detail/CVE-2022-21216>, CVE-2022-33196
<https://nvd.nist.gov/vuln/detail/CVE-2022-33196>, CVE-2022-38090
<https://nvd.nist.gov/vuln/detail/CVE-2022-38090>)
- less (CVE-2022-46663 <https://nvd.nist.gov/vuln/detail/CVE-2022-46663>)
- libxml2 (CVE-2023-28484
<https://nvd.nist.gov/vuln/detail/CVE-2023-28484>, CVE-2023-29469
<https://nvd.nist.gov/vuln/detail/CVE-2023-29469>)
- OpenSSH (CVE-2023-25136
<https://nvd.nist.gov/vuln/detail/CVE-2023-25136>, CVE-2023-28531
<https://nvd.nist.gov/vuln/detail/CVE-2023-28531>, CVE-2023-38408
<https://nvd.nist.gov/vuln/detail/CVE-2023-38408>)
- OpenSSL (CVE-2022-4203 <https://nvd.nist.gov/vuln/detail/CVE-2022-4203>
, CVE-2022-4304 <https://nvd.nist.gov/vuln/detail/CVE-2022-4304>,
CVE-2022-4450 <https://nvd.nist.gov/vuln/detail/CVE-2022-4450>,
CVE-2023-0215 <https://nvd.nist.gov/vuln/detail/CVE-2023-0215>,
CVE-2023-0216 <https://nvd.nist.gov/vuln/detail/CVE-2023-0216>,
CVE-2023-0217 <https://nvd.nist.gov/vuln/detail/CVE-2023-0217>,
CVE-2023-0286 <https://nvd.nist.gov/vuln/detail/CVE-2023-0286>,
CVE-2023-0401 <https://nvd.nist.gov/vuln/detail/CVE-2023-0401>,
CVE-2023-0464 <https://nvd.nist.gov/vuln/detail/CVE-2023-0464>,
CVE-2023-0465 <https://nvd.nist.gov/vuln/detail/CVE-2023-0465>,
CVE-2023-0466 <https://nvd.nist.gov/vuln/detail/CVE-2023-0466>,
CVE-2023-1255 <https://nvd.nist.gov/vuln/detail/CVE-2023-1255>)
- runc (CVE-2023-25809 <https://nvd.nist.gov/vuln/detail/CVE-2023-25809>
, CVE-2023-27561 <https://nvd.nist.gov/vuln/detail/CVE-2023-27561>,
CVE-2023-28642 <https://nvd.nist.gov/vuln/detail/CVE-2023-28642>)
- tar (CVE-2022-48303 <https://nvd.nist.gov/vuln/detail/CVE-2022-48303>)
- torcx (CVE-2022-32149 <https://nvd.nist.gov/vuln/detail/CVE-2022-32149>
)
- vim (CVE-2023-0288 <https://nvd.nist.gov/vuln/detail/CVE-2023-0288>,
CVE-2023-0433 <https://nvd.nist.gov/vuln/detail/CVE-2023-0433>,
CVE-2023-1127 <https://nvd.nist.gov/vuln/detail/CVE-2023-1127>,
CVE-2023-1175 <https://nvd.nist.gov/vuln/detail/CVE-2023-1175>,
CVE-2023-1170 <https://nvd.nist.gov/vuln/detail/CVE-2023-1170>)
- SDK: dnsmasq (CVE-2022-0934
<https://nvd.nist.gov/vuln/detail/CVE-2022-0934>)
- SDK: pkgconf (CVE-2023-24056
<https://nvd.nist.gov/vuln/detail/CVE-2023-24056>)
- SDK: python (CVE-2023-24329
<https://nvd.nist.gov/vuln/detail/CVE-2023-24329>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Bug-fixes4>Bug fixes:

- Ensured that /var/log/journal/ is created early enough for
systemd-journald to persist the logs on first boot (bootengine#60
<https://github.com/flatcar/bootengine/pull/60>, baselayout#29
<https://github.com/flatcar/baselayout/pull/29>)
- Fixed journalctl --user permission issue (Flatcar#989
<https://github.com/flatcar/Flatcar/issues/989>)
- Ensured that the folder /var/log/sssd is created if it doesn’t exist,
required for sssd.service (Flatcar#1096
<https://github.com/flatcar/Flatcar/issues/1096>)
- Fixed a miscompilation of getfacl causing it to dump core when
executed (scripts#809 <https://github.com/flatcar/scripts/pull/809>)
- Restored the reboot warning and delay for non-SSH console sessions (
locksmith#21 <https://github.com/flatcar/locksmith/pull/21>)
- Triggered re-reading of partition table to fix adding partitions to
the boot disk (scripts#1202
<https://github.com/flatcar/scripts/pull/1202>)
- Worked around a bash regression in flatcar-install and added error
reporting for disk write failures (Flatcar#1059
<https://github.com/flatcar/Flatcar/issues/1059>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Changes4>Changes:

- Added pigz to the image, a parallel gzip implementation, which is
useful to speed up the (de)compression for large container image
imports/exports (coreos-overlay#2504
<https://github.com/flatcar/coreos-overlay/pull/2504>)
- Added a new flatcar-reset tool and boot logic for selective OS resets
to reconfigure the system with Ignition while avoiding config drift (
bootengine#55 <https://github.com/flatcar/bootengine/pull/55>, init#91
<https://github.com/flatcar/init/pull/91>)
- Enabled elfutils support in systemd-coredump. A backtrace will now
appear in the journal for any program that dumps core (
coreos-overlay#2489 <https://github.com/flatcar/coreos-overlay/pull/2489>
)
- Improved the OS reset tool to offer preview, backup and restore (
init#94 <https://github.com/flatcar/init/pull/94>)
- On boot any files in /etc that are the same as provided by the booted
/usr/share/flatcar/etc default for the overlay mount on /etc are deleted
to ensure that future updates of /usr/share/flatcar/etc are propagated -
to opt out create /etc/.no-dup-update in case you want to keep an
unmodified config file as is or because you fear that a future Flatcar
version may use the same file as you at which point your copy is cleaned up
and any other future Flatcar changes would be applied (bootengine#54
<https://github.com/flatcar/bootengine/pull/54>)
- Switched systemd log reporting to the combined format of both unit
description, as before, and now the unit name to easily find the unit (
coreos-overlay#2436 <https://github.com/flatcar/coreos-overlay/pull/2436>
)
- /etc is now set up as overlayfs with the original /etc folder being
the store for changed files/directories and /usr/share/flatcar/etc providing
the lower default directory tree (bootengine#53
<https://github.com/flatcar/bootengine/pull/53>, scripts#666
<https://github.com/flatcar/scripts/pull/666>)
- Changed coreos-cloudinit to now set the short hostname instead of the
FQDN when fetched from the metadata service (coreos-cloudinit#19
<https://github.com/flatcar/coreos-cloudinit/pull/19>)
- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Updates4>Updates:

- Linux (5.15.133 <https://lwn.net/Articles/945380> (includes 5.15.132
<https://lwn.net/Articles/944877>, 5.15.131
<https://lwn.net/Articles/943755>, 5.15.130
<https://lwn.net/Articles/943404>, 5.15.129
<https://lwn.net/Articles/943113>, 5.15.128
<https://lwn.net/Articles/942866>, 5.15.127
<https://lwn.net/Articles/941775>, 5.15.126
<https://lwn.net/Articles/941273>, 5.15.125
<https://lwn.net/Articles/940798>, 5.15.124
<https://lwn.net/Articles/940339>, 5.15.123
<https://lwn.net/Articles/939424>, 5.15.122
<https://lwn.net/Articles/939104>, 5.15.121
<https://lwn.net/Articles/939016>, 5.15.120
<https://lwn.net/Articles/937404>, 5.15.119
<https://lwn.net/Articles/936675>, 5.15.118
<https://lwn.net/Articles/935584>, 5.15.117
<https://lwn.net/Articles/934622>, 5.15.116
<https://lwn.net/Articles/934320>, 5.15.115
<https://lwn.net/Articles/933909>, 5.15.114
<https://lwn.net/Articles/933280>, 5.15.113
<https://lwn.net/Articles/932883>, 5.15.112
<https://lwn.net/Articles/932134>, 5.15.111
<https://lwn.net/Articles/931652>, 5.15.110
<https://lwn.net/Articles/930600>, 5.15.109
<https://lwn.net/Articles/930263>, 5.15.108
<https://lwn.net/Articles/929679>, 5.15.107
<https://lwn.net/Articles/929015/>, 5.15.106
<https://lwn.net/Articles/928343>, 5.15.105
<https://lwn.net/Articles/927860>, 5.15.104
<https://lwn.net/Articles/926873>, 5.15.103
<https://lwn.net/Articles/926415>, 5.15.102
<https://lwn.net/Articles/925991>, 5.15.101
<https://lwn.net/Articles/925939>, 5.15.100
<https://lwn.net/Articles/925913>, 5.15.99
<https://lwn.net/Articles/925844>))
- Linux Firmware (20230404
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230404>
(includes 20230310
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230310>
, 20230210
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230210>
))
- Go (1.19.9 <https://go.dev/doc/devel/release#go1.19.9> (includes 1.19.8
<https://go.dev/doc/devel/release#go1.19.8>, 1.19.7
<https://go.dev/doc/devel/release#go1.19.7>, 1.19.6
<https://go.dev/doc/devel/release#go1.19.6>))
- bash (5.2
<https://lists.gnu.org/archive/html/bash-announce/2022-09/msg00000.html>)
- bind tools (9.16.37
<https://bind9.readthedocs.io/en/v9_16_37/notes.html#notes-for-bind-9-16-37>
)
- bpftool (6.2.1
<https://kernelnewbies.org/LinuxChanges#Linux_6.2.Tracing.2C_perf_and_BPF>
)
- btrfs-progs (6.0.2
<https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2-2022-11-24>,
includes 6.0
<https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2022-10-11>
)
- c-ares (1.19.0 <https://c-ares.org/changelog.html#1_19_0>)
- containerd (1.6.21
<https://github.com/containerd/containerd/releases/tag/v1.6.21>
(includes 1.6.20
<https://github.com/containerd/containerd/releases/tag/v1.6.20>, 1.6.19
<https://github.com/containerd/containerd/releases/tag/v1.6.19> 1.6.18
<https://github.com/containerd/containerd/releases/tag/v1.6.18>)
- curl (8.0.1 <https://curl.se/changes.html#8_0_1> (includes 7.88.1
<https://curl.se/changes.html#7_88_1>, 7.88.0
<https://curl.se/changes.html#7_88_0>))
- diffutils (3.9
<https://savannah.gnu.org/forum/forum.php?forum_id=10282>)
- Docker (20.10.24
<https://docs.docker.com/engine/release-notes/20.10/#201024>)
- e2fsprogs (1.47.0
<https://e2fsprogs.sourceforge.net/e2fsprogs-release.html##1.47.0>
(includes 1.46.6
<https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.6>))
- findutils (4.9.0
<https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00003.html>)
- gcc (12.2.1 <https://gcc.gnu.org/gcc-12/changes.html>)
- gdb (13.1.90 <https://lwn.net/Articles/923819/>)
- git (2.39.2
<https://github.com/git/git/blob/v2.39.2/Documentation/RelNotes/2.39.2.txt>
)
- GLib (2.74.6 <https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.6>
(includes 2.74.5 <https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.5>))
- GnuTLS (3.8.0 <https://gitlab.com/gnutls/gnutls/-/blob/3.8.0/NEWS>)
- ignition (2.15.0
<https://coreos.github.io/ignition/release-notes/#ignition-2150-2023-02-21>
)
- intel-microcode (20230214
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214>
)
- iperf (3.13 <https://github.com/esnet/iperf/blob/3.13/RELNOTES.md>)
- iputils (20221126
<https://github.com/iputils/iputils/releases/tag/20221126>)
- less (608 <http://www.greenwoodsoftware.com/less/news.608.html>)
- libarchive (3.6.2
<https://github.com/libarchive/libarchive/releases/tag/v3.6.2>)
- libpcap (1.10.3
<https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.3:/CHANGES>
(includes 1.10.2
<https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.2:/CHANGES>
))
- libpcre2 (10.42
<https://github.com/PCRE2Project/pcre2/blob/pcre2-10.42/NEWS>)
- libxml2 (2.10.4 <https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.4>
)
- multipath-tools (0.9.4
<https://github.com/opensvc/multipath-tools/commits/0.9.4>)
- OpenSSH (9.3 <http://www.openssh.com/releasenotes.html#9.3> (includes
9.2 <http://www.openssh.com/releasenotes.html#9.2>))
- OpenSSL (3.0.8
<https://github.com/openssl/openssl/blob/openssl-3.0.8/NEWS.md#major-changes-between-openssl-307-and-openssl-308-7-feb-2023>
)
- pinentry (1.2.1
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=c080b34e57d01a6ccca9d2996d7096c42b1a3f84;hb=8ab1682e80a2b4185ee9ef66cbb44340245966fc>
)
- qemu guest agent (7.1.0
<https://wiki.qemu.org/ChangeLog/7.1#Guest_agent>)
- readline (8.2
<https://lists.gnu.org/archive/html/info-gnu/2022-09/msg00013.html>)
- runc (1.1.7
<https://github.com/opencontainers/runc/releases/tag/v1.1.7> (includes
1.1.6 <https://github.com/opencontainers/runc/releases/tag/v1.1.6>, 1.1.5
<https://github.com/opencontainers/runc/releases/tag/v1.1.5>))
- socat (1.7.4.4
<https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.4:/CHANGES>)
- sqlite (3.41.2 <https://sqlite.org/releaselog/3_41_2.html>)
- strace (6.1 <https://github.com/strace/strace/releases/tag/v6.1>)
- traceroute (2.1.1)
- vim (9.0.1403 <https://github.com/vim/vim/releases/tag/v9.0.1403>
(includes 9.0.1363 <https://github.com/vim/vim/releases/tag/v9.0.1363>))
- XZ utils (5.4.2
<https://github.com/tukaani-project/xz/releases/tag/v5.4.2>)
- Zstandard (1.5.4 <https://github.com/facebook/zstd/releases/tag/v1.5.4>
(includes 1.5.2 <https://github.com/facebook/zstd/releases/tag/v1.5.2>,
1.5.1 <https://github.com/facebook/zstd/releases/tag/v1.5.1> and 1.5.0
<https://github.com/facebook/zstd/releases/tag/v1.5.0>))
- SDK: cmake (3.25.2
<https://cmake.org/cmake/help/v3.25/release/3.25.html>)
- SDK: dnsmasq (2.89
<https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q1/016859.html>
)
- SDK: pahole (1.24 <https://github.com/acmel/dwarves/releases/tag/v1.24>
)
- SDK: portage (3.0.44
<https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.44>)
- SDK: python (3.10.10
<https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-10-final>
(includes 3.10.9
<https://docs.python.org/3.10/whatsnew/changelog.html#python-3-10-9-final>
, 3.10 <https://www.python.org/downloads/release/python-3100/>))
- SDK: Rust (1.68.2
<https://github.com/rust-lang/rust/releases/tag/1.68.2> (includes 1.68.0
<https://github.com/rust-lang/rust/releases/tag/1.68.0>, 1.67.1
<https://github.com/rust-lang/rust/releases/tag/1.67.1>))
- SDK: nano (7.2
<https://git.savannah.gnu.org/cgit/nano.git/tree/NEWS?h=v7.2>)
- VMware: open-vm-tools (12.2.0
<https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.0>)

New LTS-2023 Release 3510.3.0

*Changes since Stable 3510.2.8*
<https://hackmd.io/d2G9WGULTnyOaZ4MViy2Pw#Security-fixes>Security fixes:

- Linux (CVE-2023-42752 <https://nvd.nist.gov/vuln/detail/CVE-2023-42752>
, CVE-2023-42753 <https://nvd.nist.gov/vuln/detail/CVE-2023-42753>,
CVE-2023-4623 <https://nvd.nist.gov/vuln/detail/CVE-2023-4623>,
CVE-2023-4921 <https://nvd.nist.gov/vuln/detail/CVE-2023-4921>)

<https://hackmd.io/d2G9WGULTnyOaZ4MViy2Pw#Bug-fixes>Bug fixes:
<https://hackmd.io/d2G9WGULTnyOaZ4MViy2Pw#Changes>Changes:

- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)

<https://hackmd.io/d2G9WGULTnyOaZ4MViy2Pw#Updates>Updates:

- Linux (5.15.132 <https://lwn.net/Articles/944877> (includes 5.15.131
<https://lwn.net/Articles/943755>, 5.15.130
<https://lwn.net/Articles/943404>))

Changes compared to LTS-2022 3033.3.17
<https://hackmd.io/d2G9WGULTnyOaZ4MViy2Pw#Security-fixes1>Security fixes:

- Linux (CVE-2019-15794 <https://nvd.nist.gov/vuln/detail/CVE-2019-15794>
,CVE-2020-16119 <https://nvd.nist.gov/vuln/detail/CVE-2020-16119>,
CVE-2020-24586 <https://nvd.nist.gov/vuln/detail/CVE-2020-24586>,
CVE-2020-24587 <https://nvd.nist.gov/vuln/detail/CVE-2020-24587>,
CVE-2020-24588 <https://nvd.nist.gov/vuln/detail/CVE-2020-24588>,
CVE-2020-25639 <https://nvd.nist.gov/vuln/detail/CVE-2020-25639>,
CVE-2020-25670 <https://nvd.nist.gov/vuln/detail/CVE-2020-25670>,
CVE-2020-25671 <https://nvd.nist.gov/vuln/detail/CVE-2020-25671>,
CVE-2020-25672 <https://nvd.nist.gov/vuln/detail/CVE-2020-25672>,
CVE-2020-25673 <https://nvd.nist.gov/vuln/detail/CVE-2020-25673>,
CVE-2020-26139 <https://nvd.nist.gov/vuln/detail/CVE-2020-26139>,
CVE-2020-26141 <https://nvd.nist.gov/vuln/detail/CVE-2020-26141>,
CVE-2020-26145 <https://nvd.nist.gov/vuln/detail/CVE-2020-26145>,
CVE-2020-26147 <https://nvd.nist.gov/vuln/detail/CVE-2020-26147>,
CVE-2020-26541 <https://nvd.nist.gov/vuln/detail/CVE-2020-26541>,
CVE-2020-26555 <https://nvd.nist.gov/vuln/detail/CVE-2020-26555>,
CVE-2020-26558 <https://nvd.nist.gov/vuln/detail/CVE-2020-26558>,
CVE-2020-27170 <https://nvd.nist.gov/vuln/detail/CVE-2020-27170>,
CVE-2020-27171 <https://nvd.nist.gov/vuln/detail/CVE-2020-27171>,
CVE-2020-27820 <https://nvd.nist.gov/vuln/detail/CVE-2020-27820>,
CVE-2020-36516 <https://nvd.nist.gov/vuln/detail/CVE-2020-36516>,
CVE-2021-0129 <https://nvd.nist.gov/vuln/detail/CVE-2021-0129>,
CVE-2021-0512 <https://nvd.nist.gov/vuln/detail/CVE-2021-0512>,
CVE-2021-0920 <https://nvd.nist.gov/vuln/detail/CVE-2021-0920>,
CVE-2021-0937 <https://nvd.nist.gov/vuln/detail/CVE-2021-0937>,
CVE-2021-0941 <https://nvd.nist.gov/vuln/detail/CVE-2021-0941>,
CVE-2021-20320 <https://nvd.nist.gov/vuln/detail/CVE-2021-20320>,
CVE-2021-20321 <https://nvd.nist.gov/vuln/detail/CVE-2021-20321>,
CVE-2021-20322 <https://nvd.nist.gov/vuln/detail/CVE-2021-20322>,
CVE-2021-22543 <https://nvd.nist.gov/vuln/detail/CVE-2021-22543>,
CVE-2021-22555 <https://nvd.nist.gov/vuln/detail/CVE-2021-22555>,
CVE-2021-22600 <https://nvd.nist.gov/vuln/detail/CVE-2021-22600>,
CVE-2021-23133 <https://nvd.nist.gov/vuln/detail/CVE-2021-23133>,
CVE-2021-23134 <https://nvd.nist.gov/vuln/detail/CVE-2021-23134>,
CVE-2021-26401 <https://nvd.nist.gov/vuln/detail/CVE-2021-26401>,
CVE-2021-26930 <https://nvd.nist.gov/vuln/detail/CVE-2021-26930>,
CVE-2021-26931 <https://nvd.nist.gov/vuln/detail/CVE-2021-26931>,
CVE-2021-26932 <https://nvd.nist.gov/vuln/detail/CVE-2021-26932>,
CVE-2021-27363 <https://nvd.nist.gov/vuln/detail/CVE-2021-27363>,
CVE-2021-27364 <https://nvd.nist.gov/vuln/detail/CVE-2021-27364>,
CVE-2021-27365 <https://nvd.nist.gov/vuln/detail/CVE-2021-27365>,
CVE-2021-28038 <https://nvd.nist.gov/vuln/detail/CVE-2021-28038>,
CVE-2021-28039 <https://nvd.nist.gov/vuln/detail/CVE-2021-28039>,
CVE-2021-28375 <https://nvd.nist.gov/vuln/detail/CVE-2021-28375>,
CVE-2021-28660 <https://nvd.nist.gov/vuln/detail/CVE-2021-28660>,
CVE-2021-28688 <https://nvd.nist.gov/vuln/detail/CVE-2021-28688>,
CVE-2021-28691 <https://nvd.nist.gov/vuln/detail/CVE-2021-28691>,
CVE-2021-28711 <https://nvd.nist.gov/vuln/detail/CVE-2021-28711>,
CVE-2021-28712 <https://nvd.nist.gov/vuln/detail/CVE-2021-28712>,
CVE-2021-28713 <https://nvd.nist.gov/vuln/detail/CVE-2021-28713>,
CVE-2021-28714 <https://nvd.nist.gov/vuln/detail/CVE-2021-28714>,
CVE-2021-28715 <https://nvd.nist.gov/vuln/detail/CVE-2021-28715>,
CVE-2021-28950 <https://nvd.nist.gov/vuln/detail/CVE-2021-28950>,
CVE-2021-28951 <https://nvd.nist.gov/vuln/detail/CVE-2021-28951>,
CVE-2021-28952 <https://nvd.nist.gov/vuln/detail/CVE-2021-28952>,
CVE-2021-28964 <https://nvd.nist.gov/vuln/detail/CVE-2021-28964>,
CVE-2021-28971 <https://nvd.nist.gov/vuln/detail/CVE-2021-28971>,
CVE-2021-28972 <https://nvd.nist.gov/vuln/detail/CVE-2021-28972>,
CVE-2021-29154 <https://nvd.nist.gov/vuln/detail/CVE-2021-29154>,
CVE-2021-29155 <https://nvd.nist.gov/vuln/detail/CVE-2021-29155>,
CVE-2021-29264 <https://nvd.nist.gov/vuln/detail/CVE-2021-29264>,
CVE-2021-29265 <https://nvd.nist.gov/vuln/detail/CVE-2021-29265>,
CVE-2021-29266 <https://nvd.nist.gov/vuln/detail/CVE-2021-29266>,
CVE-2021-29646 <https://nvd.nist.gov/vuln/detail/CVE-2021-29646>,
CVE-2021-29647 <https://nvd.nist.gov/vuln/detail/CVE-2021-29647>,
CVE-2021-29648 <https://nvd.nist.gov/vuln/detail/CVE-2021-29648>,
CVE-2021-29649 <https://nvd.nist.gov/vuln/detail/CVE-2021-29649>,
CVE-2021-29650 <https://nvd.nist.gov/vuln/detail/CVE-2021-29650>,
CVE-2021-29657 <https://nvd.nist.gov/vuln/detail/CVE-2021-29657>,
CVE-2021-30002 <https://nvd.nist.gov/vuln/detail/CVE-2021-30002>,
CVE-2021-31440 <https://nvd.nist.gov/vuln/detail/CVE-2021-31440>,
CVE-2021-31829 <https://nvd.nist.gov/vuln/detail/CVE-2021-31829>,
CVE-2021-31916 <https://nvd.nist.gov/vuln/detail/CVE-2021-31916>,
CVE-2021-32399 <https://nvd.nist.gov/vuln/detail/CVE-2021-32399>,
CVE-2021-32606 <https://nvd.nist.gov/vuln/detail/CVE-2021-32606>,
CVE-2021-33033 <https://nvd.nist.gov/vuln/detail/CVE-2021-33033>,
CVE-2021-33034 <https://nvd.nist.gov/vuln/detail/CVE-2021-33034>,
CVE-2021-33098 <https://nvd.nist.gov/vuln/detail/CVE-2021-33098>,
CVE-2021-33135 <https://nvd.nist.gov/vuln/detail/CVE-2021-33135>,
CVE-2021-33200 <https://nvd.nist.gov/vuln/detail/CVE-2021-33200>,
CVE-2021-33624 <https://nvd.nist.gov/vuln/detail/CVE-2021-33624>,
CVE-2021-33655 <https://nvd.nist.gov/vuln/detail/CVE-2021-33655>,
CVE-2021-33909 <https://nvd.nist.gov/vuln/detail/CVE-2021-33909>,
CVE-2021-3444 <https://nvd.nist.gov/vuln/detail/CVE-2021-3444>,
CVE-2021-34556 <https://nvd.nist.gov/vuln/detail/CVE-2021-34556>,
CVE-2021-34693 <https://nvd.nist.gov/vuln/detail/CVE-2021-34693>,
CVE-2021-3483 <https://nvd.nist.gov/vuln/detail/CVE-2021-3483>,
CVE-2021-34866 <https://nvd.nist.gov/vuln/detail/CVE-2021-34866>,
CVE-2021-3489 <https://nvd.nist.gov/vuln/detail/CVE-2021-3489>,
CVE-2021-3490 <https://nvd.nist.gov/vuln/detail/CVE-2021-3490>,
CVE-2021-3491 <https://nvd.nist.gov/vuln/detail/CVE-2021-3491>,
CVE-2021-34981 <https://nvd.nist.gov/vuln/detail/CVE-2021-34981>,
CVE-2021-3501 <https://nvd.nist.gov/vuln/detail/CVE-2021-3501>,
CVE-2021-35039 <https://nvd.nist.gov/vuln/detail/CVE-2021-35039>,
CVE-2021-3506 <https://nvd.nist.gov/vuln/detail/CVE-2021-3506>,
CVE-2021-3543 <https://nvd.nist.gov/vuln/detail/CVE-2021-3543>,
CVE-2021-35477 <https://nvd.nist.gov/vuln/detail/CVE-2021-35477>,
CVE-2021-3564 <https://nvd.nist.gov/vuln/detail/CVE-2021-3564>,
CVE-2021-3573 <https://nvd.nist.gov/vuln/detail/CVE-2021-3573>,
CVE-2021-3600 <https://nvd.nist.gov/vuln/detail/CVE-2021-3600>,
CVE-2021-3609 <https://nvd.nist.gov/vuln/detail/CVE-2021-3609>,
CVE-2021-3612 <https://nvd.nist.gov/vuln/detail/CVE-2021-3612>,
CVE-2021-3640 <https://nvd.nist.gov/vuln/detail/CVE-2021-3640>,
CVE-2021-3653 <https://nvd.nist.gov/vuln/detail/CVE-2021-3653>,
CVE-2021-3655 <https://nvd.nist.gov/vuln/detail/CVE-2021-3655>,
CVE-2021-3656 <https://nvd.nist.gov/vuln/detail/CVE-2021-3656>,
CVE-2021-3659 <https://nvd.nist.gov/vuln/detail/CVE-2021-3659>,
CVE-2021-3679 <https://nvd.nist.gov/vuln/detail/CVE-2021-3679>,
CVE-2021-37159 <https://nvd.nist.gov/vuln/detail/CVE-2021-37159>,
CVE-2021-3732 <https://nvd.nist.gov/vuln/detail/CVE-2021-3732>,
CVE-2021-3736 <https://nvd.nist.gov/vuln/detail/CVE-2021-3736>,
CVE-2021-3739 <https://nvd.nist.gov/vuln/detail/CVE-2021-3739>,
CVE-2021-3743 <https://nvd.nist.gov/vuln/detail/CVE-2021-3743>,
CVE-2021-3744 <https://nvd.nist.gov/vuln/detail/CVE-2021-3744>,
CVE-2021-3752 <https://nvd.nist.gov/vuln/detail/CVE-2021-3752>,
CVE-2021-3753 <https://nvd.nist.gov/vuln/detail/CVE-2021-3753>,
CVE-2021-37576 <https://nvd.nist.gov/vuln/detail/CVE-2021-37576>,
CVE-2021-3760 <https://nvd.nist.gov/vuln/detail/CVE-2021-3760>,
CVE-2021-3764 <https://nvd.nist.gov/vuln/detail/CVE-2021-3764>,
CVE-2021-3772 <https://nvd.nist.gov/vuln/detail/CVE-2021-3772>,
CVE-2021-38166 <https://nvd.nist.gov/vuln/detail/CVE-2021-38166>,
CVE-2021-38198 <https://nvd.nist.gov/vuln/detail/CVE-2021-38198>,
CVE-2021-38199 <https://nvd.nist.gov/vuln/detail/CVE-2021-38199>,
CVE-2021-38200 <https://nvd.nist.gov/vuln/detail/CVE-2021-38200>,
CVE-2021-38201 <https://nvd.nist.gov/vuln/detail/CVE-2021-38201>,
CVE-2021-38202 <https://nvd.nist.gov/vuln/detail/CVE-2021-38202>,
CVE-2021-38203 <https://nvd.nist.gov/vuln/detail/CVE-2021-38203>,
CVE-2021-38204 <https://nvd.nist.gov/vuln/detail/CVE-2021-38204>,
CVE-2021-38205 <https://nvd.nist.gov/vuln/detail/CVE-2021-38205>,
CVE-2021-38206 <https://nvd.nist.gov/vuln/detail/CVE-2021-38206>,
CVE-2021-38207 <https://nvd.nist.gov/vuln/detail/CVE-2021-38207>,
CVE-2021-38208 <https://nvd.nist.gov/vuln/detail/CVE-2021-38208>,
CVE-2021-38209 <https://nvd.nist.gov/vuln/detail/CVE-2021-38209>,
CVE-2021-38300 <https://nvd.nist.gov/vuln/detail/CVE-2021-38300>,
CVE-2021-3923 <https://nvd.nist.gov/vuln/detail/CVE-2021-3923>,
CVE-2021-39633 <https://nvd.nist.gov/vuln/detail/CVE-2021-39633>,
CVE-2021-39656 <https://nvd.nist.gov/vuln/detail/CVE-2021-39656>,
CVE-2021-39685 <https://nvd.nist.gov/vuln/detail/CVE-2021-39685>,
CVE-2021-39686 <https://nvd.nist.gov/vuln/detail/CVE-2021-39686>,
CVE-2021-39698 <https://nvd.nist.gov/vuln/detail/CVE-2021-39698>,
CVE-2021-4001 <https://nvd.nist.gov/vuln/detail/CVE-2021-4001>,
CVE-2021-4002 <https://nvd.nist.gov/vuln/detail/CVE-2021-4002>,
CVE-2021-4028 <https://nvd.nist.gov/vuln/detail/CVE-2021-4028>,
CVE-2021-40490 <https://nvd.nist.gov/vuln/detail/CVE-2021-40490>,
CVE-2021-4083 <https://nvd.nist.gov/vuln/detail/CVE-2021-4083>,
CVE-2021-4090 <https://nvd.nist.gov/vuln/detail/CVE-2021-4090>,
CVE-2021-4093 <https://nvd.nist.gov/vuln/detail/CVE-2021-4093>,
CVE-2021-41073 <https://nvd.nist.gov/vuln/detail/CVE-2021-41073>,
CVE-2021-4135 <https://nvd.nist.gov/vuln/detail/CVE-2021-4135>,
CVE-2021-4148 <https://nvd.nist.gov/vuln/detail/CVE-2021-4148>,
CVE-2021-4149 <https://nvd.nist.gov/vuln/detail/CVE-2021-4149>,
CVE-2021-4154 <https://nvd.nist.gov/vuln/detail/CVE-2021-4154>,
CVE-2021-4155 <https://nvd.nist.gov/vuln/detail/CVE-2021-4155>,
CVE-2021-4157 <https://nvd.nist.gov/vuln/detail/CVE-2021-4157>,
CVE-2021-41864 <https://nvd.nist.gov/vuln/detail/CVE-2021-41864>,
CVE-2021-4197 <https://nvd.nist.gov/vuln/detail/CVE-2021-4197>,
CVE-2021-42008 <https://nvd.nist.gov/vuln/detail/CVE-2021-42008>,
CVE-2021-4202 <https://nvd.nist.gov/vuln/detail/CVE-2021-4202>,
CVE-2021-4203 <https://nvd.nist.gov/vuln/detail/CVE-2021-4203>,
CVE-2021-42252 <https://nvd.nist.gov/vuln/detail/CVE-2021-42252>,
CVE-2021-42327 <https://nvd.nist.gov/vuln/detail/CVE-2021-42327>,
CVE-2021-42739 <https://nvd.nist.gov/vuln/detail/CVE-2021-42739>,
CVE-2021-43056 <https://nvd.nist.gov/vuln/detail/CVE-2021-43056>,
CVE-2021-43057 <https://nvd.nist.gov/vuln/detail/CVE-2021-43057>,
CVE-2021-43267 <https://nvd.nist.gov/vuln/detail/CVE-2021-43267>,
CVE-2021-43389 <https://nvd.nist.gov/vuln/detail/CVE-2021-43389>,
CVE-2021-43975 <https://nvd.nist.gov/vuln/detail/CVE-2021-43975>,
CVE-2021-43976 <https://nvd.nist.gov/vuln/detail/CVE-2021-43976>,
CVE-2021-44733 <https://nvd.nist.gov/vuln/detail/CVE-2021-44733>,
CVE-2021-44879 <https://nvd.nist.gov/vuln/detail/CVE-2021-44879>,
CVE-2021-45095 <https://nvd.nist.gov/vuln/detail/CVE-2021-45095>,
CVE-2021-45100 <https://nvd.nist.gov/vuln/detail/CVE-2021-45100>,
CVE-2021-45402 <https://nvd.nist.gov/vuln/detail/CVE-2021-45402>,
CVE-2021-45469 <https://nvd.nist.gov/vuln/detail/CVE-2021-45469>,
CVE-2021-45480 <https://nvd.nist.gov/vuln/detail/CVE-2021-45480>,
CVE-2021-45485 <https://nvd.nist.gov/vuln/detail/CVE-2021-45485>,
CVE-2021-45486 <https://nvd.nist.gov/vuln/detail/CVE-2021-45486>,
CVE-2021-45868 <https://nvd.nist.gov/vuln/detail/CVE-2021-45868>,
CVE-2021-46283 <https://nvd.nist.gov/vuln/detail/CVE-2021-46283>,
CVE-2022-0001 <https://nvd.nist.gov/vuln/detail/CVE-2022-0001>,
CVE-2022-0002 <https://nvd.nist.gov/vuln/detail/CVE-2022-0002>,
CVE-2022-0168 <https://nvd.nist.gov/vuln/detail/CVE-2022-0168>,
CVE-2022-0171 <https://nvd.nist.gov/vuln/detail/CVE-2022-0171>,
CVE-2022-0185 <https://nvd.nist.gov/vuln/detail/CVE-2022-0185>,
CVE-2022-0264 <https://nvd.nist.gov/vuln/detail/CVE-2022-0264>,
CVE-2022-0286 <https://nvd.nist.gov/vuln/detail/CVE-2022-0286>,
CVE-2022-0322 <https://nvd.nist.gov/vuln/detail/CVE-2022-0322>,
CVE-2022-0330 <https://nvd.nist.gov/vuln/detail/CVE-2022-0330>,
CVE-2022-0382 <https://nvd.nist.gov/vuln/detail/CVE-2022-0382>,
CVE-2022-0435 <https://nvd.nist.gov/vuln/detail/CVE-2022-0435>,
CVE-2022-0487 <https://nvd.nist.gov/vuln/detail/CVE-2022-0487>,
CVE-2022-0492 <https://nvd.nist.gov/vuln/detail/CVE-2022-0492>,
CVE-2022-0494 <https://nvd.nist.gov/vuln/detail/CVE-2022-0494>,
CVE-2022-0500 <https://nvd.nist.gov/vuln/detail/CVE-2022-0500>,
CVE-2022-0516 <https://nvd.nist.gov/vuln/detail/CVE-2022-0516>,
CVE-2022-0617 <https://nvd.nist.gov/vuln/detail/CVE-2022-0617>,
CVE-2022-0742 <https://nvd.nist.gov/vuln/detail/CVE-2022-0742>,
CVE-2022-0847 <https://nvd.nist.gov/vuln/detail/CVE-2022-0847>,
CVE-2022-0850 <https://nvd.nist.gov/vuln/detail/CVE-2022-0850>,
CVE-2022-0995 <https://nvd.nist.gov/vuln/detail/CVE-2022-0995>,
CVE-2022-1011 <https://nvd.nist.gov/vuln/detail/CVE-2022-1011>,
CVE-2022-1012 <https://nvd.nist.gov/vuln/detail/CVE-2022-1012>,
CVE-2022-1015 <https://nvd.nist.gov/vuln/detail/CVE-2022-1015>,
CVE-2022-1016 <https://nvd.nist.gov/vuln/detail/CVE-2022-1016>,
CVE-2022-1043 <https://nvd.nist.gov/vuln/detail/CVE-2022-1043>,
CVE-2022-1048 <https://nvd.nist.gov/vuln/detail/CVE-2022-1048>,
CVE-2022-1055 <https://nvd.nist.gov/vuln/detail/CVE-2022-1055>,
CVE-2022-1158 <https://nvd.nist.gov/vuln/detail/CVE-2022-1158>,
CVE-2022-1184 <https://nvd.nist.gov/vuln/detail/CVE-2022-1184>,
CVE-2022-1195 <https://nvd.nist.gov/vuln/detail/CVE-2022-1195>,
CVE-2022-1198 <https://nvd.nist.gov/vuln/detail/CVE-2022-1198>,
CVE-2022-1199 <https://nvd.nist.gov/vuln/detail/CVE-2022-1199>,
CVE-2022-1204 <https://nvd.nist.gov/vuln/detail/CVE-2022-1204>,
CVE-2022-1263 <https://nvd.nist.gov/vuln/detail/CVE-2022-1263>,
CVE-2022-1353 <https://nvd.nist.gov/vuln/detail/CVE-2022-1353>,
CVE-2022-1462 <https://nvd.nist.gov/vuln/detail/CVE-2022-1462>,
CVE-2022-1516 <https://nvd.nist.gov/vuln/detail/CVE-2022-1516>,
CVE-2022-1651 <https://nvd.nist.gov/vuln/detail/CVE-2022-1651>,
CVE-2022-1652 <https://nvd.nist.gov/vuln/detail/CVE-2022-1652>,
CVE-2022-1671 <https://nvd.nist.gov/vuln/detail/CVE-2022-1671>,
CVE-2022-1679 <https://nvd.nist.gov/vuln/detail/CVE-2022-1679>,
CVE-2022-1729 <https://nvd.nist.gov/vuln/detail/CVE-2022-1729>,
CVE-2022-1734 <https://nvd.nist.gov/vuln/detail/CVE-2022-1734>,
CVE-2022-1789 <https://nvd.nist.gov/vuln/detail/CVE-2022-1789>,
CVE-2022-1852 <https://nvd.nist.gov/vuln/detail/CVE-2022-1852>,
CVE-2022-1943 <https://nvd.nist.gov/vuln/detail/CVE-2022-1943>,
CVE-2022-1973 <https://nvd.nist.gov/vuln/detail/CVE-2022-1973>,
CVE-2022-1974 <https://nvd.nist.gov/vuln/detail/CVE-2022-1974>,
CVE-2022-1975 <https://nvd.nist.gov/vuln/detail/CVE-2022-1975>,
CVE-2022-1998 <https://nvd.nist.gov/vuln/detail/CVE-2022-1998>,
CVE-2022-20008 <https://nvd.nist.gov/vuln/detail/CVE-2022-20008>,
CVE-2022-20132 <https://nvd.nist.gov/vuln/detail/CVE-2022-20132>,
CVE-2022-20141 <https://nvd.nist.gov/vuln/detail/CVE-2022-20141>,
CVE-2022-20148 <https://nvd.nist.gov/vuln/detail/CVE-2022-20148>,
CVE-2022-20154 <https://nvd.nist.gov/vuln/detail/CVE-2022-20154>,
CVE-2022-20158 <https://nvd.nist.gov/vuln/detail/CVE-2022-20158>,
CVE-2022-20368 <https://nvd.nist.gov/vuln/detail/CVE-2022-20368>,
CVE-2022-20369 <https://nvd.nist.gov/vuln/detail/CVE-2022-20369>,
CVE-2022-20421 <https://nvd.nist.gov/vuln/detail/CVE-2022-20421>,
CVE-2022-20422 <https://nvd.nist.gov/vuln/detail/CVE-2022-20422>,
CVE-2022-20566 <https://nvd.nist.gov/vuln/detail/CVE-2022-20566>,
CVE-2022-20572 <https://nvd.nist.gov/vuln/detail/CVE-2022-20572>,
CVE-2022-2078 <https://nvd.nist.gov/vuln/detail/CVE-2022-2078>,
CVE-2022-21123 <https://nvd.nist.gov/vuln/detail/CVE-2022-21123>,
CVE-2022-21125 <https://nvd.nist.gov/vuln/detail/CVE-2022-21125>,
CVE-2022-21166 <https://nvd.nist.gov/vuln/detail/CVE-2022-21166>,
CVE-2022-21499 <https://nvd.nist.gov/vuln/detail/CVE-2022-21499>,
CVE-2022-21505 <https://nvd.nist.gov/vuln/detail/CVE-2022-21505>,
CVE-2022-2153 <https://nvd.nist.gov/vuln/detail/CVE-2022-2153>,
CVE-2022-2196 <https://nvd.nist.gov/vuln/detail/CVE-2022-2196>,
CVE-2022-22942 <https://nvd.nist.gov/vuln/detail/CVE-2022-22942>,
CVE-2022-23036 <https://nvd.nist.gov/vuln/detail/CVE-2022-23036>,
CVE-2022-23037 <https://nvd.nist.gov/vuln/detail/CVE-2022-23037>,
CVE-2022-23038 <https://nvd.nist.gov/vuln/detail/CVE-2022-23038>,
CVE-2022-23039 <https://nvd.nist.gov/vuln/detail/CVE-2022-23039>,
CVE-2022-23040 <https://nvd.nist.gov/vuln/detail/CVE-2022-23040>,
CVE-2022-23041 <https://nvd.nist.gov/vuln/detail/CVE-2022-23041>,
CVE-2022-23042 <https://nvd.nist.gov/vuln/detail/CVE-2022-23042>,
CVE-2022-2308 <https://nvd.nist.gov/vuln/detail/CVE-2022-2308>,
CVE-2022-2318 <https://nvd.nist.gov/vuln/detail/CVE-2022-2318>,
CVE-2022-23222 <https://nvd.nist.gov/vuln/detail/CVE-2022-23222>,
CVE-2022-2380 <https://nvd.nist.gov/vuln/detail/CVE-2022-2380>,
CVE-2022-23960 <https://nvd.nist.gov/vuln/detail/CVE-2022-23960>,
CVE-2022-24122 <https://nvd.nist.gov/vuln/detail/CVE-2022-24122>,
CVE-2022-24448 <https://nvd.nist.gov/vuln/detail/CVE-2022-24448>,
CVE-2022-24958 <https://nvd.nist.gov/vuln/detail/CVE-2022-24958>,
CVE-2022-24959 <https://nvd.nist.gov/vuln/detail/CVE-2022-24959>,
CVE-2022-2503 <https://nvd.nist.gov/vuln/detail/CVE-2022-2503>,
CVE-2022-25258 <https://nvd.nist.gov/vuln/detail/CVE-2022-25258>,
CVE-2022-25375 <https://nvd.nist.gov/vuln/detail/CVE-2022-25375>,
CVE-2022-25636 <https://nvd.nist.gov/vuln/detail/CVE-2022-25636>,
CVE-2022-2585 <https://nvd.nist.gov/vuln/detail/CVE-2022-2585>,
CVE-2022-2586 <https://nvd.nist.gov/vuln/detail/CVE-2022-2586>,
CVE-2022-2588 <https://nvd.nist.gov/vuln/detail/CVE-2022-2588>,
CVE-2022-2602 <https://nvd.nist.gov/vuln/detail/CVE-2022-2602>,
CVE-2022-26365 <https://nvd.nist.gov/vuln/detail/CVE-2022-26365>,
CVE-2022-26373 <https://nvd.nist.gov/vuln/detail/CVE-2022-26373>,
CVE-2022-2639 <https://nvd.nist.gov/vuln/detail/CVE-2022-2639>,
CVE-2022-26490 <https://nvd.nist.gov/vuln/detail/CVE-2022-26490>,
CVE-2022-2663 <https://nvd.nist.gov/vuln/detail/CVE-2022-2663>,
CVE-2022-26966 <https://nvd.nist.gov/vuln/detail/CVE-2022-26966>,
CVE-2022-27223 <https://nvd.nist.gov/vuln/detail/CVE-2022-27223>,
CVE-2022-27666 <https://nvd.nist.gov/vuln/detail/CVE-2022-27666>,
CVE-2022-27672 <https://nvd.nist.gov/vuln/detail/CVE-2022-27672>,
CVE-2022-27950 <https://nvd.nist.gov/vuln/detail/CVE-2022-27950>,
CVE-2022-28356 <https://nvd.nist.gov/vuln/detail/CVE-2022-28356>,
CVE-2022-28388 <https://nvd.nist.gov/vuln/detail/CVE-2022-28388>,
CVE-2022-28389 <https://nvd.nist.gov/vuln/detail/CVE-2022-28389>,
CVE-2022-28390 <https://nvd.nist.gov/vuln/detail/CVE-2022-28390>,
CVE-2022-2873 <https://nvd.nist.gov/vuln/detail/CVE-2022-2873>,
CVE-2022-28893 <https://nvd.nist.gov/vuln/detail/CVE-2022-28893>,
CVE-2022-2905 <https://nvd.nist.gov/vuln/detail/CVE-2022-2905>,
CVE-2022-29156 <https://nvd.nist.gov/vuln/detail/CVE-2022-29156>,
CVE-2022-2938 <https://nvd.nist.gov/vuln/detail/CVE-2022-2938>,
CVE-2022-29581 <https://nvd.nist.gov/vuln/detail/CVE-2022-29581>,
CVE-2022-29582 <https://nvd.nist.gov/vuln/detail/CVE-2022-29582>,
CVE-2022-2959 <https://nvd.nist.gov/vuln/detail/CVE-2022-2959>,
CVE-2022-2964 <https://nvd.nist.gov/vuln/detail/CVE-2022-2964>,
CVE-2022-2977 <https://nvd.nist.gov/vuln/detail/CVE-2022-2977>,
CVE-2022-2978 <https://nvd.nist.gov/vuln/detail/CVE-2022-2978>,
CVE-2022-29900 <https://nvd.nist.gov/vuln/detail/CVE-2022-29900>,
CVE-2022-29901 <https://nvd.nist.gov/vuln/detail/CVE-2022-29901>,
CVE-2022-3028 <https://nvd.nist.gov/vuln/detail/CVE-2022-3028>,
CVE-2022-30594 <https://nvd.nist.gov/vuln/detail/CVE-2022-30594>,
CVE-2022-3061 <https://nvd.nist.gov/vuln/detail/CVE-2022-3061>,
CVE-2022-3077 <https://nvd.nist.gov/vuln/detail/CVE-2022-3077>,
CVE-2022-3078 <https://nvd.nist.gov/vuln/detail/CVE-2022-3078>,
CVE-2022-3104 <https://nvd.nist.gov/vuln/detail/CVE-2022-3104>,
CVE-2022-3105 <https://nvd.nist.gov/vuln/detail/CVE-2022-3105>,
CVE-2022-3106 <https://nvd.nist.gov/vuln/detail/CVE-2022-3106>,
CVE-2022-3107 <https://nvd.nist.gov/vuln/detail/CVE-2022-3107>,
CVE-2022-3108 <https://nvd.nist.gov/vuln/detail/CVE-2022-3108>,
CVE-2022-3110 <https://nvd.nist.gov/vuln/detail/CVE-2022-3110>,
CVE-2022-3111 <https://nvd.nist.gov/vuln/detail/CVE-2022-3111>,
CVE-2022-3112 <https://nvd.nist.gov/vuln/detail/CVE-2022-3112>,
CVE-2022-3113 <https://nvd.nist.gov/vuln/detail/CVE-2022-3113>,
CVE-2022-3115 <https://nvd.nist.gov/vuln/detail/CVE-2022-3115>,
CVE-2022-3169 <https://nvd.nist.gov/vuln/detail/CVE-2022-3169>,
CVE-2022-3176 <https://nvd.nist.gov/vuln/detail/CVE-2022-3176>,
CVE-2022-3202 <https://nvd.nist.gov/vuln/detail/CVE-2022-3202>,
CVE-2022-32250 <https://nvd.nist.gov/vuln/detail/CVE-2022-32250>,
CVE-2022-32296 <https://nvd.nist.gov/vuln/detail/CVE-2022-32296>,
CVE-2022-3239 <https://nvd.nist.gov/vuln/detail/CVE-2022-3239>,
CVE-2022-32981 <https://nvd.nist.gov/vuln/detail/CVE-2022-32981>,
CVE-2022-3303 <https://nvd.nist.gov/vuln/detail/CVE-2022-3303>,
CVE-2022-3344 <https://nvd.nist.gov/vuln/detail/CVE-2022-3344>,
CVE-2022-33740 <https://nvd.nist.gov/vuln/detail/CVE-2022-33740>,
CVE-2022-33741 <https://nvd.nist.gov/vuln/detail/CVE-2022-33741>,
CVE-2022-33742 <https://nvd.nist.gov/vuln/detail/CVE-2022-33742>,
CVE-2022-33743 <https://nvd.nist.gov/vuln/detail/CVE-2022-33743>,
CVE-2022-33744 <https://nvd.nist.gov/vuln/detail/CVE-2022-33744>,
CVE-2022-33981 <https://nvd.nist.gov/vuln/detail/CVE-2022-33981>,
CVE-2022-3424 <https://nvd.nist.gov/vuln/detail/CVE-2022-3424>,
CVE-2022-34494 <https://nvd.nist.gov/vuln/detail/CVE-2022-34494>,
CVE-2022-34495 <https://nvd.nist.gov/vuln/detail/CVE-2022-34495>,
CVE-2022-34918 <https://nvd.nist.gov/vuln/detail/CVE-2022-34918>,
CVE-2022-3521 <https://nvd.nist.gov/vuln/detail/CVE-2022-3521>,
CVE-2022-3524 <https://nvd.nist.gov/vuln/detail/CVE-2022-3524>,
CVE-2022-3526 <https://nvd.nist.gov/vuln/detail/CVE-2022-3526>,
CVE-2022-3534 <https://nvd.nist.gov/vuln/detail/CVE-2022-3534>,
CVE-2022-3543 <https://nvd.nist.gov/vuln/detail/CVE-2022-3543>,
CVE-2022-3545 <https://nvd.nist.gov/vuln/detail/CVE-2022-3545>,
CVE-2022-3564 <https://nvd.nist.gov/vuln/detail/CVE-2022-3564>,
CVE-2022-3565 <https://nvd.nist.gov/vuln/detail/CVE-2022-3565>,
CVE-2022-3577 <https://nvd.nist.gov/vuln/detail/CVE-2022-3577>,
CVE-2022-3586 <https://nvd.nist.gov/vuln/detail/CVE-2022-3586>,
CVE-2022-3594 <https://nvd.nist.gov/vuln/detail/CVE-2022-3594>,
CVE-2022-36123 <https://nvd.nist.gov/vuln/detail/CVE-2022-36123>,
CVE-2022-3619 <https://nvd.nist.gov/vuln/detail/CVE-2022-3619>,
CVE-2022-3621 <https://nvd.nist.gov/vuln/detail/CVE-2022-3621>,
CVE-2022-3623 <https://nvd.nist.gov/vuln/detail/CVE-2022-3623>,
CVE-2022-3625 <https://nvd.nist.gov/vuln/detail/CVE-2022-3625>,
CVE-2022-3628 <https://nvd.nist.gov/vuln/detail/CVE-2022-3628>,
CVE-2022-36280 <https://nvd.nist.gov/vuln/detail/CVE-2022-36280>,
CVE-2022-3629 <https://nvd.nist.gov/vuln/detail/CVE-2022-3629>,
CVE-2022-3633 <https://nvd.nist.gov/vuln/detail/CVE-2022-3633>,
CVE-2022-3635 <https://nvd.nist.gov/vuln/detail/CVE-2022-3635>,
CVE-2022-3643 <https://nvd.nist.gov/vuln/detail/CVE-2022-3643>,
CVE-2022-3646 <https://nvd.nist.gov/vuln/detail/CVE-2022-3646>,
CVE-2022-3649 <https://nvd.nist.gov/vuln/detail/CVE-2022-3649>,
CVE-2022-36879 <https://nvd.nist.gov/vuln/detail/CVE-2022-36879>,
CVE-2022-36946 <https://nvd.nist.gov/vuln/detail/CVE-2022-36946>,
CVE-2022-3707 <https://nvd.nist.gov/vuln/detail/CVE-2022-3707>,
CVE-2022-39189 <https://nvd.nist.gov/vuln/detail/CVE-2022-39189>,
CVE-2022-39190 <https://nvd.nist.gov/vuln/detail/CVE-2022-39190>,
CVE-2022-40307 <https://nvd.nist.gov/vuln/detail/CVE-2022-40307>,
CVE-2022-40768 <https://nvd.nist.gov/vuln/detail/CVE-2022-40768>,
CVE-2022-4095 <https://nvd.nist.gov/vuln/detail/CVE-2022-4095>,
CVE-2022-40982 <https://nvd.nist.gov/vuln/detail/CVE-2022-40982>,
CVE-2022-41218 <https://nvd.nist.gov/vuln/detail/CVE-2022-41218>,
CVE-2022-41222 <https://nvd.nist.gov/vuln/detail/CVE-2022-41222>,
CVE-2022-4129 <https://nvd.nist.gov/vuln/detail/CVE-2022-4129>,
CVE-2022-41674 <https://nvd.nist.gov/vuln/detail/CVE-2022-41674>,
CVE-2022-41849 <https://nvd.nist.gov/vuln/detail/CVE-2022-41849>,
CVE-2022-41850 <https://nvd.nist.gov/vuln/detail/CVE-2022-41850>,
CVE-2022-41858 <https://nvd.nist.gov/vuln/detail/CVE-2022-41858>,
CVE-2022-42432 <https://nvd.nist.gov/vuln/detail/CVE-2022-42432>,
CVE-2022-4269 <https://nvd.nist.gov/vuln/detail/CVE-2022-4269>,
CVE-2022-42703 <https://nvd.nist.gov/vuln/detail/CVE-2022-42703>,
CVE-2022-42719 <https://nvd.nist.gov/vuln/detail/CVE-2022-42719>,
CVE-2022-42720 <https://nvd.nist.gov/vuln/detail/CVE-2022-42720>,
CVE-2022-42721 <https://nvd.nist.gov/vuln/detail/CVE-2022-42721>,
CVE-2022-42722 <https://nvd.nist.gov/vuln/detail/CVE-2022-42722>,
CVE-2022-42895 <https://nvd.nist.gov/vuln/detail/CVE-2022-42895>,
CVE-2022-42896 <https://nvd.nist.gov/vuln/detail/CVE-2022-42896>,
CVE-2022-43750 <https://nvd.nist.gov/vuln/detail/CVE-2022-43750>,
CVE-2022-4378 <https://nvd.nist.gov/vuln/detail/CVE-2022-4378>,
CVE-2022-4379 <https://nvd.nist.gov/vuln/detail/CVE-2022-4379>,
CVE-2022-4382 <https://nvd.nist.gov/vuln/detail/CVE-2022-4382>,
CVE-2022-43945 <https://nvd.nist.gov/vuln/detail/CVE-2022-43945>,
CVE-2022-45869 <https://nvd.nist.gov/vuln/detail/CVE-2022-45869>,
CVE-2022-45886 <https://nvd.nist.gov/vuln/detail/CVE-2022-45886>,
CVE-2022-45887 <https://nvd.nist.gov/vuln/detail/CVE-2022-45887>,
CVE-2022-45919 <https://nvd.nist.gov/vuln/detail/CVE-2022-45919>,
CVE-2022-45934 <https://nvd.nist.gov/vuln/detail/CVE-2022-45934>,
CVE-2022-4662 <https://nvd.nist.gov/vuln/detail/CVE-2022-4662>,
CVE-2022-4744 <https://nvd.nist.gov/vuln/detail/CVE-2022-4744>,
CVE-2022-47518 <https://nvd.nist.gov/vuln/detail/CVE-2022-47518>,
CVE-2022-47519 <https://nvd.nist.gov/vuln/detail/CVE-2022-47519>,
CVE-2022-47520 <https://nvd.nist.gov/vuln/detail/CVE-2022-47520>,
CVE-2022-47521 <https://nvd.nist.gov/vuln/detail/CVE-2022-47521>,
CVE-2022-47929 <https://nvd.nist.gov/vuln/detail/CVE-2022-47929>,
CVE-2022-47938 <https://nvd.nist.gov/vuln/detail/CVE-2022-47938>,
CVE-2022-47939 <https://nvd.nist.gov/vuln/detail/CVE-2022-47939>,
CVE-2022-47941 <https://nvd.nist.gov/vuln/detail/CVE-2022-47941>,
CVE-2022-47942 <https://nvd.nist.gov/vuln/detail/CVE-2022-47942>,
CVE-2022-47943 <https://nvd.nist.gov/vuln/detail/CVE-2022-47943>,
CVE-2022-4842 <https://nvd.nist.gov/vuln/detail/CVE-2022-4842>,
CVE-2022-48423 <https://nvd.nist.gov/vuln/detail/CVE-2022-48423>,
CVE-2022-48424 <https://nvd.nist.gov/vuln/detail/CVE-2022-48424>,
CVE-2022-48425 <https://nvd.nist.gov/vuln/detail/CVE-2022-48425>,
CVE-2022-48502 <https://nvd.nist.gov/vuln/detail/CVE-2022-48502>,
CVE-2023-0045 <https://nvd.nist.gov/vuln/detail/CVE-2023-0045>,
CVE-2023-0160 <https://nvd.nist.gov/vuln/detail/CVE-2023-0160>,
CVE-2023-0179 <https://nvd.nist.gov/vuln/detail/CVE-2023-0179>,
CVE-2023-0210 <https://nvd.nist.gov/vuln/detail/CVE-2023-0210>,
CVE-2023-0266 <https://nvd.nist.gov/vuln/detail/CVE-2023-0266>,
CVE-2023-0386 <https://nvd.nist.gov/vuln/detail/CVE-2023-0386>,
CVE-2023-0394 <https://nvd.nist.gov/vuln/detail/CVE-2023-0394>,
CVE-2023-0458 <https://nvd.nist.gov/vuln/detail/CVE-2023-0458>,
CVE-2023-0459 <https://nvd.nist.gov/vuln/detail/CVE-2023-0459>,
CVE-2023-0461 <https://nvd.nist.gov/vuln/detail/CVE-2023-0461>,
CVE-2023-0590 <https://nvd.nist.gov/vuln/detail/CVE-2023-0590>,
CVE-2023-0615 <https://nvd.nist.gov/vuln/detail/CVE-2023-0615>,
CVE-2023-1073 <https://nvd.nist.gov/vuln/detail/CVE-2023-1073>,
CVE-2023-1074 <https://nvd.nist.gov/vuln/detail/CVE-2023-1074>,
CVE-2023-1076 <https://nvd.nist.gov/vuln/detail/CVE-2023-1076>,
CVE-2023-1077 <https://nvd.nist.gov/vuln/detail/CVE-2023-1077>,
CVE-2023-1078 <https://nvd.nist.gov/vuln/detail/CVE-2023-1078>,
CVE-2023-1079 <https://nvd.nist.gov/vuln/detail/CVE-2023-1079>,
CVE-2023-1095 <https://nvd.nist.gov/vuln/detail/CVE-2023-1095>,
CVE-2023-1118 <https://nvd.nist.gov/vuln/detail/CVE-2023-1118>,
CVE-2023-1192 <https://nvd.nist.gov/vuln/detail/CVE-2023-1192>,
CVE-2023-1206 <https://nvd.nist.gov/vuln/detail/CVE-2023-1206>,
CVE-2023-1249 <https://nvd.nist.gov/vuln/detail/CVE-2023-1249>,
CVE-2023-1252 <https://nvd.nist.gov/vuln/detail/CVE-2023-1252>,
CVE-2023-1281 <https://nvd.nist.gov/vuln/detail/CVE-2023-1281>,
CVE-2023-1295 <https://nvd.nist.gov/vuln/detail/CVE-2023-1295>,
CVE-2023-1380 <https://nvd.nist.gov/vuln/detail/CVE-2023-1380>,
CVE-2023-1382 <https://nvd.nist.gov/vuln/detail/CVE-2023-1382>,
CVE-2023-1513 <https://nvd.nist.gov/vuln/detail/CVE-2023-1513>,
CVE-2023-1582 <https://nvd.nist.gov/vuln/detail/CVE-2023-1582>,
CVE-2023-1611 <https://nvd.nist.gov/vuln/detail/CVE-2023-1611>,
CVE-2023-1637 <https://nvd.nist.gov/vuln/detail/CVE-2023-1637>,
CVE-2023-1652 <https://nvd.nist.gov/vuln/detail/CVE-2023-1652>,
CVE-2023-1670 <https://nvd.nist.gov/vuln/detail/CVE-2023-1670>,
CVE-2023-1829 <https://nvd.nist.gov/vuln/detail/CVE-2023-1829>,
CVE-2023-1838 <https://nvd.nist.gov/vuln/detail/CVE-2023-1838>,
CVE-2023-1855 <https://nvd.nist.gov/vuln/detail/CVE-2023-1855>,
CVE-2023-1859 <https://nvd.nist.gov/vuln/detail/CVE-2023-1859>,
CVE-2023-1989 <https://nvd.nist.gov/vuln/detail/CVE-2023-1989>,
CVE-2023-1990 <https://nvd.nist.gov/vuln/detail/CVE-2023-1990>,
CVE-2023-2002 <https://nvd.nist.gov/vuln/detail/CVE-2023-2002>,
CVE-2023-2006 <https://nvd.nist.gov/vuln/detail/CVE-2023-2006>,
CVE-2023-2008 <https://nvd.nist.gov/vuln/detail/CVE-2023-2008>,
CVE-2023-2019 <https://nvd.nist.gov/vuln/detail/CVE-2023-2019>,
CVE-2023-20569 <https://nvd.nist.gov/vuln/detail/CVE-2023-20569>,
CVE-2023-20588 <https://nvd.nist.gov/vuln/detail/CVE-2023-20588>,
CVE-2023-20593 <https://nvd.nist.gov/vuln/detail/CVE-2023-20593>,
CVE-2023-20928 <https://nvd.nist.gov/vuln/detail/CVE-2023-20928>,
CVE-2023-21102 <https://nvd.nist.gov/vuln/detail/CVE-2023-21102>,
CVE-2023-2124 <https://nvd.nist.gov/vuln/detail/CVE-2023-2124>,
CVE-2023-2156 <https://nvd.nist.gov/vuln/detail/CVE-2023-2156>,
CVE-2023-2162 <https://nvd.nist.gov/vuln/detail/CVE-2023-2162>,
CVE-2023-2163 <https://nvd.nist.gov/vuln/detail/CVE-2023-2163>,
CVE-2023-2166 <https://nvd.nist.gov/vuln/detail/CVE-2023-2166>,
CVE-2023-2177 <https://nvd.nist.gov/vuln/detail/CVE-2023-2177>,
CVE-2023-2194 <https://nvd.nist.gov/vuln/detail/CVE-2023-2194>,
CVE-2023-2235 <https://nvd.nist.gov/vuln/detail/CVE-2023-2235>,
CVE-2023-2269 <https://nvd.nist.gov/vuln/detail/CVE-2023-2269>,
CVE-2023-22998 <https://nvd.nist.gov/vuln/detail/CVE-2023-22998>,
CVE-2023-22999 <https://nvd.nist.gov/vuln/detail/CVE-2023-22999>,
CVE-2023-23001 <https://nvd.nist.gov/vuln/detail/CVE-2023-23001>,
CVE-2023-23002 <https://nvd.nist.gov/vuln/detail/CVE-2023-23002>,
CVE-2023-23004 <https://nvd.nist.gov/vuln/detail/CVE-2023-23004>,
CVE-2023-23006 <https://nvd.nist.gov/vuln/detail/CVE-2023-23006>,
CVE-2023-23454 <https://nvd.nist.gov/vuln/detail/CVE-2023-23454>,
CVE-2023-23455 <https://nvd.nist.gov/vuln/detail/CVE-2023-23455>,
CVE-2023-23559 <https://nvd.nist.gov/vuln/detail/CVE-2023-23559>,
CVE-2023-25012 <https://nvd.nist.gov/vuln/detail/CVE-2023-25012>,
CVE-2023-2513 <https://nvd.nist.gov/vuln/detail/CVE-2023-2513>,
CVE-2023-26544 <https://nvd.nist.gov/vuln/detail/CVE-2023-26544>,
CVE-2023-26545 <https://nvd.nist.gov/vuln/detail/CVE-2023-26545>,
CVE-2023-26606 <https://nvd.nist.gov/vuln/detail/CVE-2023-26606>,
CVE-2023-26607 <https://nvd.nist.gov/vuln/detail/CVE-2023-26607>,
CVE-2023-28327 <https://nvd.nist.gov/vuln/detail/CVE-2023-28327>,
CVE-2023-28328 <https://nvd.nist.gov/vuln/detail/CVE-2023-28328>,
CVE-2023-28410 <https://nvd.nist.gov/vuln/detail/CVE-2023-28410>,
CVE-2023-28466 <https://nvd.nist.gov/vuln/detail/CVE-2023-28466>,
CVE-2023-2860 <https://nvd.nist.gov/vuln/detail/CVE-2023-2860>,
CVE-2023-28772 <https://nvd.nist.gov/vuln/detail/CVE-2023-28772>,
CVE-2023-2898 <https://nvd.nist.gov/vuln/detail/CVE-2023-2898>,
CVE-2023-2985 <https://nvd.nist.gov/vuln/detail/CVE-2023-2985>,
CVE-2023-3006 <https://nvd.nist.gov/vuln/detail/CVE-2023-3006>,
CVE-2023-30456 <https://nvd.nist.gov/vuln/detail/CVE-2023-30456>,
CVE-2023-30772 <https://nvd.nist.gov/vuln/detail/CVE-2023-30772>,
CVE-2023-3090 <https://nvd.nist.gov/vuln/detail/CVE-2023-3090>,
CVE-2023-3111 <https://nvd.nist.gov/vuln/detail/CVE-2023-3111>,
CVE-2023-31248 <https://nvd.nist.gov/vuln/detail/CVE-2023-31248>,
CVE-2023-3141 <https://nvd.nist.gov/vuln/detail/CVE-2023-3141>,
CVE-2023-31436 <https://nvd.nist.gov/vuln/detail/CVE-2023-31436>,
CVE-2023-3159 <https://nvd.nist.gov/vuln/detail/CVE-2023-3159>,
CVE-2023-3161 <https://nvd.nist.gov/vuln/detail/CVE-2023-3161>,
CVE-2023-3212 <https://nvd.nist.gov/vuln/detail/CVE-2023-3212>,
CVE-2023-3220 <https://nvd.nist.gov/vuln/detail/CVE-2023-3220>,
CVE-2023-32233 <https://nvd.nist.gov/vuln/detail/CVE-2023-32233>,
CVE-2023-32248 <https://nvd.nist.gov/vuln/detail/CVE-2023-32248>,
CVE-2023-32269 <https://nvd.nist.gov/vuln/detail/CVE-2023-32269>,
CVE-2023-3268 <https://nvd.nist.gov/vuln/detail/CVE-2023-3268>,
CVE-2023-33203 <https://nvd.nist.gov/vuln/detail/CVE-2023-33203>,
CVE-2023-33288 <https://nvd.nist.gov/vuln/detail/CVE-2023-33288>,
CVE-2023-3338 <https://nvd.nist.gov/vuln/detail/CVE-2023-3338>,
CVE-2023-3355 <https://nvd.nist.gov/vuln/detail/CVE-2023-3355>,
CVE-2023-3357 <https://nvd.nist.gov/vuln/detail/CVE-2023-3357>,
CVE-2023-3358 <https://nvd.nist.gov/vuln/detail/CVE-2023-3358>,
CVE-2023-3390 <https://nvd.nist.gov/vuln/detail/CVE-2023-3390>,
CVE-2023-35001 <https://nvd.nist.gov/vuln/detail/CVE-2023-35001>,
CVE-2023-3567 <https://nvd.nist.gov/vuln/detail/CVE-2023-3567>,
CVE-2023-35788 <https://nvd.nist.gov/vuln/detail/CVE-2023-35788>,
CVE-2023-35823 <https://nvd.nist.gov/vuln/detail/CVE-2023-35823>,
CVE-2023-35824 <https://nvd.nist.gov/vuln/detail/CVE-2023-35824>,
CVE-2023-35828 <https://nvd.nist.gov/vuln/detail/CVE-2023-35828>,
CVE-2023-35829 <https://nvd.nist.gov/vuln/detail/CVE-2023-35829>,
CVE-2023-3609 <https://nvd.nist.gov/vuln/detail/CVE-2023-3609>,
CVE-2023-3610 <https://nvd.nist.gov/vuln/detail/CVE-2023-3610>,
CVE-2023-3611 <https://nvd.nist.gov/vuln/detail/CVE-2023-3611>,
CVE-2023-3772 <https://nvd.nist.gov/vuln/detail/CVE-2023-3772>,
CVE-2023-3776 <https://nvd.nist.gov/vuln/detail/CVE-2023-3776>,
CVE-2023-3777 <https://nvd.nist.gov/vuln/detail/CVE-2023-3777>,
CVE-2023-3812 <https://nvd.nist.gov/vuln/detail/CVE-2023-3812>,
CVE-2023-38426 <https://nvd.nist.gov/vuln/detail/CVE-2023-38426>,
CVE-2023-38428 <https://nvd.nist.gov/vuln/detail/CVE-2023-38428>,
CVE-2023-38429 <https://nvd.nist.gov/vuln/detail/CVE-2023-38429>,
CVE-2023-38432 <https://nvd.nist.gov/vuln/detail/CVE-2023-38432>,
CVE-2023-3863 <https://nvd.nist.gov/vuln/detail/CVE-2023-3863>,
CVE-2023-3865 <https://nvd.nist.gov/vuln/detail/CVE-2023-3865>,
CVE-2023-3866 <https://nvd.nist.gov/vuln/detail/CVE-2023-3866>,
CVE-2023-4004 <https://nvd.nist.gov/vuln/detail/CVE-2023-4004>,
CVE-2023-4015 <https://nvd.nist.gov/vuln/detail/CVE-2023-4015>,
CVE-2023-40283 <https://nvd.nist.gov/vuln/detail/CVE-2023-40283>,
CVE-2023-4128 <https://nvd.nist.gov/vuln/detail/CVE-2023-4128>,
CVE-2023-4132 <https://nvd.nist.gov/vuln/detail/CVE-2023-4132>,
CVE-2023-4147 <https://nvd.nist.gov/vuln/detail/CVE-2023-4147>,
CVE-2023-4206 <https://nvd.nist.gov/vuln/detail/CVE-2023-4206>,
CVE-2023-4207 <https://nvd.nist.gov/vuln/detail/CVE-2023-4207>,
CVE-2023-4208 <https://nvd.nist.gov/vuln/detail/CVE-2023-4208>,
CVE-2023-4273 <https://nvd.nist.gov/vuln/detail/CVE-2023-4273>,
CVE-2023-42752 <https://nvd.nist.gov/vuln/detail/CVE-2023-42752>,
CVE-2023-42753 <https://nvd.nist.gov/vuln/detail/CVE-2023-42753>,
CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>,
CVE-2023-4385 <https://nvd.nist.gov/vuln/detail/CVE-2023-4385>,
CVE-2023-4387 <https://nvd.nist.gov/vuln/detail/CVE-2023-4387>,
CVE-2023-4389 <https://nvd.nist.gov/vuln/detail/CVE-2023-4389>,
CVE-2023-4459 <https://nvd.nist.gov/vuln/detail/CVE-2023-4459>,
CVE-2023-4569 <https://nvd.nist.gov/vuln/detail/CVE-2023-4569>,
CVE-2023-4623 <https://nvd.nist.gov/vuln/detail/CVE-2023-4623>,
CVE-2023-4921 <https://nvd.nist.gov/vuln/detail/CVE-2023-4921>,
CVE-2022-40982 <https://nvd.nist.gov/vuln/detail/CVE-2022-40982>,
CVE-2022-41804 <https://nvd.nist.gov/vuln/detail/CVE-2022-41804>,
CVE-2023-20569 <https://nvd.nist.gov/vuln/detail/CVE-2023-20569>,
CVE-2023-23908 <https://nvd.nist.gov/vuln/detail/CVE-2023-23908>)
- Docker (CVE-2022-36109
<https://nvd.nist.gov/vuln/detail/CVE-2022-36109>, CVE-2022-29526
<https://nvd.nist.gov/vuln/detail/CVE-2022-29526>)
- Go (CVE-2021-44716 <https://nvd.nist.gov/vuln/detail/CVE-2021-44716>,
CVE-2021-44717 <https://nvd.nist.gov/vuln/detail/CVE-2021-44717>,
CVE-2022-1705 <https://nvd.nist.gov/vuln/detail/CVE-2022-1705>,
CVE-2022-1962 <https://nvd.nist.gov/vuln/detail/CVE-2022-1962>,
CVE-2022-2879
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879>,
CVE-2022-2880
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880>,
CVE-2022-24675 <https://nvd.nist.gov/vuln/detail/CVE-2022-24675>,
CVE-2022-27664 <https://nvd.nist.gov/vuln/detail/CVE-2022-27664>,
CVE-2022-28131 <https://nvd.nist.gov/vuln/detail/CVE-2022-28131>,
CVE-2022-29526 <https://nvd.nist.gov/vuln/detail/CVE-2022-29526>,
CVE-2022-30630 <https://nvd.nist.gov/vuln/detail/CVE-2022-30630>,
CVE-2022-30631 <https://nvd.nist.gov/vuln/detail/CVE-2022-30631>,
CVE-2022-30632 <https://nvd.nist.gov/vuln/detail/CVE-2022-30632>,
CVE-2022-30633 <https://nvd.nist.gov/vuln/detail/CVE-2022-30633>,
CVE-2022-30635 <https://nvd.nist.gov/vuln/detail/CVE-2022-30635>,
CVE-2022-32148 <https://nvd.nist.gov/vuln/detail/CVE-2022-32148>,
CVE-2022-32189 <https://nvd.nist.gov/vuln/detail/CVE-2022-32189>,
CVE-2022-32190 <https://nvd.nist.gov/vuln/detail/CVE-2022-32190>,
CVE-2022-41715
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715>,
CVE-2022-41717 <https://nvd.nist.gov/vuln/detail/CVE-2022-41717>)
- bind tools (CVE-2022-2795
<https://nvd.nist.gov/vuln/detail/CVE-2022-2795>, CVE-2022-2881
<https://nvd.nist.gov/vuln/detail/CVE-2022-2881>, CVE-2022-2906
<https://nvd.nist.gov/vuln/detail/CVE-2022-2906>, CVE-2022-3080
<https://nvd.nist.gov/vuln/detail/CVE-2022-3080>, CVE-2022-38177
<https://nvd.nist.gov/vuln/detail/CVE-2022-38177>, CVE-2022-38178
<https://nvd.nist.gov/vuln/detail/CVE-2022-38178>)
- binutils (CVE-2021-45078
<https://nvd.nist.gov/vuln/detail/CVE-2021-45078>)
- cifs-utils (CVE-2021-20208
<https://nvd.nist.gov/vuln/detail/CVE-2021-20208>, CVE-2022-27239
<https://nvd.nist.gov/vuln/detail/CVE-2022-27239>, CVE-2022-29869
<https://nvd.nist.gov/vuln/detail/CVE-2022-29869>)
- containerd (CVE-2021-43816
<https://nvd.nist.gov/vuln/detail/CVE-2021-43816>, CVE-2022-23471
<https://nvd.nist.gov/vuln/detail/CVE-2022-23471>, CVE-2022-23648
<https://nvd.nist.gov/vuln/detail/CVE-2022-23648>, CVE-2022-24769
<https://nvd.nist.gov/vuln/detail/CVE-2022-24769>, CVE-2022-31030
<https://nvd.nist.gov/vuln/detail/CVE-2022-31030>)
- cpio (CVE-2021-38185 <https://nvd.nist.gov/vuln/detail/CVE-2021-38185>)
- cryptsetup (CVE-2021-4122
<https://nvd.nist.gov/vuln/detail/CVE-2021-4122>)
- curl (CVE-2022-22576 <https://nvd.nist.gov/vuln/detail/CVE-2022-22576>
, CVE-2022-27774 <https://nvd.nist.gov/vuln/detail/CVE-2022-27774>,
CVE-2022-27775 <https://nvd.nist.gov/vuln/detail/CVE-2022-27775>,
CVE-2022-27776 <https://nvd.nist.gov/vuln/detail/CVE-2022-27776>,
CVE-2022-27778 <https://nvd.nist.gov/vuln/detail/CVE-2022-27778>,
CVE-2022-27779 <https://nvd.nist.gov/vuln/detail/CVE-2022-27779>,
CVE-2022-27780 <https://nvd.nist.gov/vuln/detail/CVE-2022-27780>,
CVE-2022-27781 <https://nvd.nist.gov/vuln/detail/CVE-2022-27781>,
CVE-2022-27782 <https://nvd.nist.gov/vuln/detail/CVE-2022-27782>,
CVE-2022-30115 <https://nvd.nist.gov/vuln/detail/CVE-2022-30115>,
CVE-2022-32205 <https://nvd.nist.gov/vuln/detail/CVE-2022-32205>,
CVE-2022-32206 <https://nvd.nist.gov/vuln/detail/CVE-2022-32206>,
CVE-2022-32207 <https://nvd.nist.gov/vuln/detail/CVE-2022-32207>,
CVE-2022-32208 <https://nvd.nist.gov/vuln/detail/CVE-2022-32208>,
CVE-2022-32221 <https://nvd.nist.gov/vuln/detail/CVE-2022-32221>,
CVE-2022-35260 <https://nvd.nist.gov/vuln/detail/CVE-2022-32221>,
CVE-2022-42915 <https://nvd.nist.gov/vuln/detail/CVE-2022-32221>,
CVE-2022-42916 <https://nvd.nist.gov/vuln/detail/CVE-2022-32221>,
CVE-2022-35252 <https://nvd.nist.gov/vuln/detail/CVE-2022-35252>,
CVE-2022-43551 <https://nvd.nist.gov/vuln/detail/CVE-2022-43551>,
CVE-2022-43552 <https://nvd.nist.gov/vuln/detail/CVE-2022-43552>)
- dbus (CVE-2022-42010 <https://nvd.nist.gov/vuln/detail/CVE-2022-42010>
, CVE-2022-42011 <https://nvd.nist.gov/vuln/detail/CVE-2022-42011>,
CVE-2022-42012 <https://nvd.nist.gov/vuln/detail/CVE-2022-42012>)
- duktape (CVE-2021-46322
<https://nvd.nist.gov/vuln/detail/CVE-2021-46322>)
- expat (CVE-2022-40674 <https://nvd.nist.gov/vuln/detail/CVE-2022-40674>
, CVE-2022-43680 <https://nvd.nist.gov/vuln/detail/CVE-2022-43680>)
- gcc (CVE-2020-13844 <https://nvd.nist.gov/vuln/detail/CVE-2020-13844>)
- git (CVE-2022-23521 <https://nvd.nist.gov/vuln/detail/CVE-2022-23521>,
CVE-2022-24765 <https://nvd.nist.gov/vuln/detail/CVE-2022-24765>,
CVE-2022-29187 <https://nvd.nist.gov/vuln/detail/CVE-2022-29187>,
CVE-2022-39253 <https://nvd.nist.gov/vuln/detail/CVE-2022-39253>,
CVE-2022-39260 <https://nvd.nist.gov/vuln/detail/CVE-2022-39260>,
CVE-2022-41903 <https://nvd.nist.gov/vuln/detail/CVE-2022-41903>)
- glib (fixes to normal form handling in GVariant
<https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835>
)
- gnupg (CVE-2022-34903 <https://nvd.nist.gov/vuln/detail/CVE-2022-34903>
)
- gnutls (CVE-2021-4209 <https://nvd.nist.gov/vuln/detail/CVE-2021-4209>
, GNUTLS-SA-2022-01-17 <https://gitlab.com/gnutls/gnutls/-/issues/1277>,
CVE-2022-2509 <https://nvd.nist.gov/vuln/detail/CVE-2022-2509>)
- gzip,xz-utils (CVE-2022-1271
<https://nvd.nist.gov/vuln/detail/CVE-2022-1271>)
- ignition (CVE-2020-14040
<https://nvd.nist.gov/vuln/detail/CVE-2020-14040>, CVE-2021-38561
<https://nvd.nist.gov/vuln/detail/CVE-2021-38561>, CVE-2022-1706
<https://nvd.nist.gov/vuln/detail/CVE-2022-1706>)
- intel-microcode (CVE-2021-0127
<https://nvd.nist.gov/vuln/detail/CVE-2021-0127>, CVE-2021-0146
<https://nvd.nist.gov/vuln/detail/CVE-2021-0146>, CVE-2022-21151
<https://nvd.nist.gov/vuln/detail/CVE-2022-21151>, CVE-2022-21233
<https://nvd.nist.gov/vuln/detail/CVE-2022-21233>)
- krb5 (CVE-2021-37750 <https://nvd.nist.gov/vuln/detail/CVE-2021-37750>)
- libarchive (CVE-2021-31566
<https://nvd.nist.gov/vuln/detail/CVE-2021-31566>, CVE-2021-36976
<https://nvd.nist.gov/vuln/detail/CVE-2021-36976>, CVE-2022-26280
<https://nvd.nist.gov/vuln/detail/CVE-2022-26280>, CVE-2022-36227
<https://nvd.nist.gov/vuln/detail/CVE-2022-36227>, libarchive-1565
<https://github.com/libarchive/libarchive/issues/1565>, libarchive-1566
<https://github.com/libarchive/libarchive/issues/1566>)
- libksba (CVE-2022-3515 <https://nvd.nist.gov/vuln/detail/CVE-2022-3515>
, CVE-2022-47629 <https://nvd.nist.gov/vuln/detail/CVE-2022-47629>)
- GNU Libtasn1 (Gentoo#866237 <https://bugs.gentoo.org/866237>)
- libtirpc (CVE-2021-46828
<https://nvd.nist.gov/vuln/detail/CVE-2021-46828>)
- libxml2 (CVE-2016-3709 <https://nvd.nist.gov/vuln/detail/CVE-2016-3709>
, CVE-2022-2309 <https://nvd.nist.gov/vuln/detail/CVE-2022-2309>,
CVE-2022-23308 <https://nvd.nist.gov/vuln/detail/CVE-2022-23308>,
CVE-2022-29824 <https://nvd.nist.gov/vuln/detail/CVE-2022-29824>,
CVE-2022-40303 <https://nvd.nist.gov/vuln/detail/CVE-2022-40303>,
CVE-2022-40304 <https://nvd.nist.gov/vuln/detail/CVE-2022-40304>)
- logrotate (CVE-2022-1348
<https://nvd.nist.gov/vuln/detail/CVE-2022-1348>)
- multipath-tools (CVE-2022-41973
<https://nvd.nist.gov/vuln/detail/CVE-2022-41973>, CVE-2022-41974
<https://nvd.nist.gov/vuln/detail/CVE-2022-41974>)
- ncurses (CVE-2022-29458
<https://nvd.nist.gov/vuln/detail/CVE-2022-29458>)
- nvidia-drivers (CVE-2022-28181
<https://nvd.nist.gov/vuln/detail/CVE-2022-28181>, CVE-2022-28183
<https://nvd.nist.gov/vuln/detail/CVE-2022-28183>, CVE-2022-28184
<https://nvd.nist.gov/vuln/detail/CVE-2022-28184>, CVE-2022-28185
<https://nvd.nist.gov/vuln/detail/CVE-2022-28185>)
- oniguruma (oniguruma-20220430 <https://bugs.gentoo.org/841893>)
- OpenSSH (CVE-2021-41617
<https://nvd.nist.gov/vuln/detail/CVE-2021-41617>)
- OpenSSL (CVE-2021-4044 <https://nvd.nist.gov/vuln/detail/CVE-2021-4044>
, CVE-2022-1292 <https://nvd.nist.gov/vuln/detail/CVE-2022-1292>,
CVE-2022-1343 <https://nvd.nist.gov/vuln/detail/CVE-2022-1343>,
CVE-2022-1434 <https://nvd.nist.gov/vuln/detail/CVE-2022-1434>,
CVE-2022-1473 <https://nvd.nist.gov/vuln/detail/CVE-2022-1473>,
CVE-2022-3602 <https://nvd.nist.gov/vuln/detail/CVE-2022-3602>,
CVE-2022-3786 <https://nvd.nist.gov/vuln/detail/CVE-2022-3786>)
- polkit (CVE-2021-4115 <https://nvd.nist.gov/vuln/detail/CVE-2021-4115>)
- rsync (CVE-2018-25032 <https://nvd.nist.gov/vuln/detail/CVE-2018-25032>
, CVE-2022-29154 <https://nvd.nist.gov/vuln/detail/CVE-2022-29154>)
- runc (CVE-2022-29162 <https://nvd.nist.gov/vuln/detail/CVE-2022-29162>)
- shadow (CVE-2013-4235 <https://nvd.nist.gov/vuln/detail/CVE-2013-4235>)
- sudo (CVE-2022-43995 <https://nvd.nist.gov/vuln/detail/CVE-2022-43995>
, CVE-2023-22809 <https://nvd.nist.gov/vuln/detail/CVE-2023-22809>)
- systemd (CVE-2021-3997 <https://nvd.nist.gov/vuln/detail/CVE-2021-3997>
, CVE-2022-3821 <https://nvd.nist.gov/vuln/detail/CVE-2022-3821>,
CVE-2022-4415 <https://nvd.nist.gov/vuln/detail/CVE-2022-4415>)
- unzip (CVE-2022-0529 <https://nvd.nist.gov/vuln/detail/CVE-2022-0529>,
CVE-2022-0530 <https://nvd.nist.gov/vuln/detail/CVE-2022-0530>,
CVE-2021-4217 <https://nvd.nist.gov/vuln/detail/CVE-2021-4217>)
- util-linux (CVE-2021-3995
<https://nvd.nist.gov/vuln/detail/CVE-2021-3995>, CVE-2021-3996
<https://nvd.nist.gov/vuln/detail/CVE-2021-3996>, CVE-2022-0563
<https://nvd.nist.gov/vuln/detail/CVE-2022-0563>)
- vim (CVE-2021-3872 <https://nvd.nist.gov/vuln/detail/CVE-2021-3872>,
CVE-2021-3875 <https://nvd.nist.gov/vuln/detail/CVE-2021-3875>,
CVE-2021-3903 <https://nvd.nist.gov/vuln/detail/CVE-2021-3903>,
CVE-2021-3927 <https://nvd.nist.gov/vuln/detail/CVE-2021-3927>,
CVE-2021-3928 <https://nvd.nist.gov/vuln/detail/CVE-2021-3928>,
CVE-2021-3968 <https://nvd.nist.gov/vuln/detail/CVE-2021-3968>,
CVE-2021-3973 <https://nvd.nist.gov/vuln/detail/CVE-2021-3973>,
CVE-2021-3974 <https://nvd.nist.gov/vuln/detail/CVE-2021-3974>,
CVE-2021-3984 <https://nvd.nist.gov/vuln/detail/CVE-2021-3984>,
CVE-2021-4019 <https://nvd.nist.gov/vuln/detail/CVE-2021-4019>,
CVE-2021-4069 <https://nvd.nist.gov/vuln/detail/CVE-2021-4069>,
CVE-2021-4136 <https://nvd.nist.gov/vuln/detail/CVE-2021-4136>,
CVE-2021-4173 <https://nvd.nist.gov/vuln/detail/CVE-2021-4173>,
CVE-2021-4166 <https://nvd.nist.gov/vuln/detail/CVE-2021-4166>,
CVE-2021-4187 <https://nvd.nist.gov/vuln/detail/CVE-2021-4187>,
CVE-2021-4192 <https://nvd.nist.gov/vuln/detail/CVE-2021-4192>,
CVE-2021-4193 <https://nvd.nist.gov/vuln/detail/CVE-2021-4193>,
CVE-2022-0128 <https://nvd.nist.gov/vuln/detail/CVE-2022-0128>,
CVE-2022-0156 <https://nvd.nist.gov/vuln/detail/CVE-2022-0156>,
CVE-2022-0158 <https://nvd.nist.gov/vuln/detail/CVE-2022-0158>,
CVE-2022-0213 <https://nvd.nist.gov/vuln/detail/CVE-2022-0213>,
CVE-2022-0261 <https://nvd.nist.gov/vuln/detail/CVE-2022-0261>,
CVE-2022-0318 <https://nvd.nist.gov/vuln/detail/CVE-2022-0318>,
CVE-2022-0319 <https://nvd.nist.gov/vuln/detail/CVE-2022-0319>,
CVE-2022-0351 <https://nvd.nist.gov/vuln/detail/CVE-2022-0351>,
CVE-2022-0359 <https://nvd.nist.gov/vuln/detail/CVE-2022-0359>,
CVE-2022-0361 <https://nvd.nist.gov/vuln/detail/CVE-2022-0361>,
CVE-2022-0368 <https://nvd.nist.gov/vuln/detail/CVE-2022-0368>,
CVE-2022-0392 <https://nvd.nist.gov/vuln/detail/CVE-2022-0392>,
CVE-2022-0393 <https://nvd.nist.gov/vuln/detail/CVE-2022-0393>,
CVE-2022-0407 <https://nvd.nist.gov/vuln/detail/CVE-2022-0407>,
CVE-2022-0408 <https://nvd.nist.gov/vuln/detail/CVE-2022-0408>,
CVE-2022-0413 <https://nvd.nist.gov/vuln/detail/CVE-2022-0413>,
CVE-2022-0417 <https://nvd.nist.gov/vuln/detail/CVE-2022-0417>,
CVE-2022-0443 <https://nvd.nist.gov/vuln/detail/CVE-2022-0443>,
CVE-2022-0629 <https://nvd.nist.gov/vuln/detail/CVE-2022-0629>,
CVE-2022-0685 <https://nvd.nist.gov/vuln/detail/CVE-2022-0685>,
CVE-2022-0714 <https://nvd.nist.gov/vuln/detail/CVE-2022-0714>,
CVE-2022-0729 <https://nvd.nist.gov/vuln/detail/CVE-2022-0729>,
CVE-2022-0943 <https://nvd.nist.gov/vuln/detail/CVE-2022-0943>,
CVE-2022-1154 <https://nvd.nist.gov/vuln/detail/CVE-2022-1154>,
CVE-2022-1160 <https://nvd.nist.gov/vuln/detail/CVE-2022-1160>,
CVE-2022-1381 <https://nvd.nist.gov/vuln/detail/CVE-2022-1381>,
CVE-2022-1420 <https://nvd.nist.gov/vuln/detail/CVE-2022-1420>,
CVE-2022-1616 <https://nvd.nist.gov/vuln/detail/CVE-2022-1616>,
CVE-2022-1619 <https://nvd.nist.gov/vuln/detail/CVE-2022-1619>,
CVE-2022-1620 <https://nvd.nist.gov/vuln/detail/CVE-2022-1620>,
CVE-2022-1621 <https://nvd.nist.gov/vuln/detail/CVE-2022-1621>,
CVE-2022-1629 <https://nvd.nist.gov/vuln/detail/CVE-2022-1629>,
CVE-2022-1674 <https://nvd.nist.gov/vuln/detail/CVE-2022-1674>,
CVE-2022-1725 <https://nvd.nist.gov/vuln/detail/CVE-2022-1725>,
CVE-2022-1733 <https://nvd.nist.gov/vuln/detail/CVE-2022-1733>,
CVE-2022-1735 <https://nvd.nist.gov/vuln/detail/CVE-2022-1735>,
CVE-2022-1769 <https://nvd.nist.gov/vuln/detail/CVE-2022-1769>,
CVE-2022-1771 <https://nvd.nist.gov/vuln/detail/CVE-2022-1771>,
CVE-2022-1785 <https://nvd.nist.gov/vuln/detail/CVE-2022-1785>,
CVE-2022-1796 <https://nvd.nist.gov/vuln/detail/CVE-2022-1796>,
CVE-2022-1897 <https://nvd.nist.gov/vuln/detail/CVE-2022-1897>,
CVE-2022-1898 <https://nvd.nist.gov/vuln/detail/CVE-2022-1898>,
CVE-2022-1886 <https://nvd.nist.gov/vuln/detail/CVE-2022-1886>,
CVE-2022-1851 <https://nvd.nist.gov/vuln/detail/CVE-2022-1851>,
CVE-2022-1927 <https://nvd.nist.gov/vuln/detail/CVE-2022-1927>,
CVE-2022-1942 <https://nvd.nist.gov/vuln/detail/CVE-2022-1942>,
CVE-2022-1968 <https://nvd.nist.gov/vuln/detail/CVE-2022-1968>,
CVE-2022-2000 <https://nvd.nist.gov/vuln/detail/CVE-2022-2000>,
CVE-2022-2042 <https://nvd.nist.gov/vuln/detail/CVE-2022-2042>,
CVE-2022-2124 <https://nvd.nist.gov/vuln/detail/CVE-2022-2124>,
CVE-2022-2125 <https://nvd.nist.gov/vuln/detail/CVE-2022-2125>,
CVE-2022-2126 <https://nvd.nist.gov/vuln/detail/CVE-2022-2126>,
CVE-2022-2129 <https://nvd.nist.gov/vuln/detail/CVE-2022-2129>,
CVE-2022-2175 <https://nvd.nist.gov/vuln/detail/CVE-2022-2175>,
CVE-2022-2182 <https://nvd.nist.gov/vuln/detail/CVE-2022-2182>,
CVE-2022-2183 <https://nvd.nist.gov/vuln/detail/CVE-2022-2183>,
CVE-2022-2206 <https://nvd.nist.gov/vuln/detail/CVE-2022-2206>,
CVE-2022-2207 <https://nvd.nist.gov/vuln/detail/CVE-2022-2207>,
CVE-2022-2208 <https://nvd.nist.gov/vuln/detail/CVE-2022-2208>,
CVE-2022-2210 <https://nvd.nist.gov/vuln/detail/CVE-2022-2210>,
CVE-2022-2231 <https://nvd.nist.gov/vuln/detail/CVE-2022-2231>,
CVE-2022-2257 <https://nvd.nist.gov/vuln/detail/CVE-2022-2257>,
CVE-2022-2264 <https://nvd.nist.gov/vuln/detail/CVE-2022-2264>,
CVE-2022-2284 <https://nvd.nist.gov/vuln/detail/CVE-2022-2284>,
CVE-2022-2285 <https://nvd.nist.gov/vuln/detail/CVE-2022-2285>,
CVE-2022-2286 <https://nvd.nist.gov/vuln/detail/CVE-2022-2286>,
CVE-2022-2287 <https://nvd.nist.gov/vuln/detail/CVE-2022-2287>,
CVE-2022-2288 <https://nvd.nist.gov/vuln/detail/CVE-2022-2288>,
CVE-2022-2289 <https://nvd.nist.gov/vuln/detail/CVE-2022-2289>,
CVE-2022-2304 <https://nvd.nist.gov/vuln/detail/CVE-2022-2304>,
CVE-2022-2343 <https://nvd.nist.gov/vuln/detail/CVE-2022-2343>,
CVE-2022-2344 <https://nvd.nist.gov/vuln/detail/CVE-2022-2344>,
CVE-2022-2345 <https://nvd.nist.gov/vuln/detail/CVE-2022-2345>,
CVE-2022-2522 <https://nvd.nist.gov/vuln/detail/CVE-2022-2522>,
CVE-2022-2816 <https://nvd.nist.gov/vuln/detail/CVE-2022-2816>,
CVE-2022-2817 <https://nvd.nist.gov/vuln/detail/CVE-2022-2817>,
CVE-2022-2819 <https://nvd.nist.gov/vuln/detail/CVE-2022-2819>,
CVE-2022-2845 <https://nvd.nist.gov/vuln/detail/CVE-2022-2845>,
CVE-2022-2849 <https://nvd.nist.gov/vuln/detail/CVE-2022-2849>,
CVE-2022-2862 <https://nvd.nist.gov/vuln/detail/CVE-2022-2862>,
CVE-2022-2874 <https://nvd.nist.gov/vuln/detail/CVE-2022-2874>,
CVE-2022-2889 <https://nvd.nist.gov/vuln/detail/CVE-2022-2889>,
CVE-2022-2923 <https://nvd.nist.gov/vuln/detail/CVE-2022-2923>,
CVE-2022-2946 <https://nvd.nist.gov/vuln/detail/CVE-2022-2946>,
CVE-2022-2980 <https://nvd.nist.gov/vuln/detail/CVE-2022-2980>,
CVE-2022-2982 <https://nvd.nist.gov/vuln/detail/CVE-2022-2982>,
CVE-2022-3016 <https://nvd.nist.gov/vuln/detail/CVE-2022-3016>,
CVE-2022-3099 <https://nvd.nist.gov/vuln/detail/CVE-2022-3099>,
CVE-2022-3134 <https://nvd.nist.gov/vuln/detail/CVE-2022-3134>,
CVE-2022-3153 <https://nvd.nist.gov/vuln/detail/CVE-2022-3153>,
CVE-2022-3234 <https://nvd.nist.gov/vuln/detail/CVE-2022-3234>,
CVE-2022-3235 <https://nvd.nist.gov/vuln/detail/CVE-2022-3235>,
CVE-2022-3278 <https://nvd.nist.gov/vuln/detail/CVE-2022-3278>,
CVE-2022-3256 <https://nvd.nist.gov/vuln/detail/CVE-2022-3256>,
CVE-2022-3296 <https://nvd.nist.gov/vuln/detail/CVE-2022-3296>,
CVE-2022-3297 <https://nvd.nist.gov/vuln/detail/CVE-2022-3297>,
CVE-2022-3324 <https://nvd.nist.gov/vuln/detail/CVE-2022-3324>,
CVE-2022-3352 <https://nvd.nist.gov/vuln/detail/CVE-2022-3352>,
CVE-2022-3491 <https://nvd.nist.gov/vuln/detail/CVE-2022-3491>,
CVE-2022-3520 <https://nvd.nist.gov/vuln/detail/CVE-2022-3520>,
CVE-2022-3591 <https://nvd.nist.gov/vuln/detail/CVE-2022-3591>,
CVE-2022-3705 <https://nvd.nist.gov/vuln/detail/CVE-2022-3705>,
CVE-2022-4141 <https://nvd.nist.gov/vuln/detail/CVE-2022-4141>,
CVE-2022-4292 <https://nvd.nist.gov/vuln/detail/CVE-2022-4292>,
CVE-2022-4293 <https://nvd.nist.gov/vuln/detail/CVE-2022-4293>,
CVE-2023-0049 <https://nvd.nist.gov/vuln/detail/CVE-2023-0049>,
CVE-2023-0051 <https://nvd.nist.gov/vuln/detail/CVE-2023-0051>,
CVE-2023-0054 <https://nvd.nist.gov/vuln/detail/CVE-2023-0054>)
- zlib (CVE-2018-25032 <https://nvd.nist.gov/vuln/detail/CVE-2018-25032>
, CVE-2022-37434 <https://nvd.nist.gov/vuln/detail/CVE-2022-37434>)
- SDK: edk2-ovmf (CVE-2019-14584
<https://nvd.nist.gov/vuln/detail/CVE-2019-14584>, CVE-2021-28210
<https://nvd.nist.gov/vuln/detail/CVE-2021-28210>, CVE-2021-28211
<https://nvd.nist.gov/vuln/detail/CVE-2021-28211>, CVE-2021-28213
<https://nvd.nist.gov/vuln/detail/CVE-2021-28213>)
- SDK: libxslt (CVE-2021-30560
<https://nvd.nist.gov/vuln/detail/CVE-2021-30560>)
- SDK: mantle (CVE-2021-3121
<https://nvd.nist.gov/vuln/detail/CVE-2021-3121>, CVE-2021-38561
<https://nvd.nist.gov/vuln/detail/CVE-2021-38561>, CVE-2021-43565
<https://nvd.nist.gov/vuln/detail/CVE-2021-43565>)
- SDK: Python (CVE-2015-20107
<https://nvd.nist.gov/vuln/detail/CVE-2015-20107>, CVE-2020-10735
<https://nvd.nist.gov/vuln/detail/CVE-2020-10735>, CVE-2021-3654
<https://nvd.nist.gov/vuln/detail/CVE-2021-3654>, CVE-2022-37454
<https://nvd.nist.gov/vuln/detail/CVE-2022-37454>, CVE-2022-42919
<https://nvd.nist.gov/vuln/detail/CVE-2022-42919>, CVE-2022-45061
<https://nvd.nist.gov/vuln/detail/CVE-2022-45061>)
- SDK: QEMU (CVE-2020-14394
<https://nvd.nist.gov/vuln/detail/CVE-2020-14394>, CVE-2020-35504
<https://nvd.nist.gov/vuln/detail/CVE-2020-35504>, CVE-2020-35505
<https://nvd.nist.gov/vuln/detail/CVE-2020-35505>, CVE-2020-35506
<https://nvd.nist.gov/vuln/detail/CVE-2020-35506>, CVE-2020-35517
<https://nvd.nist.gov/vuln/detail/CVE-2020-35517>, CVE-2021-20203
<https://nvd.nist.gov/vuln/detail/CVE-2021-20203>, CVE-2021-20255
<https://nvd.nist.gov/vuln/detail/CVE-2021-20255>, CVE-2021-20257
<https://nvd.nist.gov/vuln/detail/CVE-2021-20257>, CVE-2021-20263
<https://nvd.nist.gov/vuln/detail/CVE-2021-20263>, CVE-2021-3409
<https://nvd.nist.gov/vuln/detail/CVE-2021-3409>, CVE-2021-3416
<https://nvd.nist.gov/vuln/detail/CVE-2021-3416>, CVE-2021-3527
<https://nvd.nist.gov/vuln/detail/CVE-2021-3527>, CVE-2021-3544
<https://nvd.nist.gov/vuln/detail/CVE-2021-3544>, CVE-2021-3545
<https://nvd.nist.gov/vuln/detail/CVE-2021-3545>, CVE-2021-3546
<https://nvd.nist.gov/vuln/detail/CVE-2021-3546>, CVE-2021-3582
<https://nvd.nist.gov/vuln/detail/CVE-2021-3582>, CVE-2021-3607
<https://nvd.nist.gov/vuln/detail/CVE-2021-3607>, CVE-2021-3608
<https://nvd.nist.gov/vuln/detail/CVE-2021-3608>, CVE-2021-3682
<https://nvd.nist.gov/vuln/detail/CVE-2021-3682>, CVE-2021-20203
<https://nvd.nist.gov/vuln/detail/CVE-2021-20203>, CVE-2021-3713
<https://nvd.nist.gov/vuln/detail/CVE-2021-3713>, CVE-2021-3930
<https://nvd.nist.gov/vuln/detail/CVE-2021-3930>, CVE-2021-3947
<https://nvd.nist.gov/vuln/detail/CVE-2021-3947>, CVE-2021-4145
<https://nvd.nist.gov/vuln/detail/CVE-2021-4145>, CVE-2022-0216
<https://nvd.nist.gov/vuln/detail/CVE-2022-0216>, CVE-2022-26353
<https://nvd.nist.gov/vuln/detail/CVE-2022-26353>, CVE-2022-26354
<https://nvd.nist.gov/vuln/detail/CVE-2022-26354>, CVE-2022-3872
<https://nvd.nist.gov/vuln/detail/CVE-2022-3872>, CVE-2022-4172
<https://nvd.nist.gov/vuln/detail/CVE-2022-4172>)
- SDK: Rust (CVE-2022-21658
<https://nvd.nist.gov/vuln/detail/CVE-2022-21658>, CVE-2022-36113
<https://nvd.nist.gov/vuln/detail/CVE-2022-36113>, CVE-2022-36114
<https://nvd.nist.gov/vuln/detail/CVE-2022-36114>, CVE-2022-46176
<https://nvd.nist.gov/vuln/detail/CVE-2022-46176>)
- SDK: squashfs-tools (CVE-2021-40153
<https://nvd.nist.gov/vuln/detail/CVE-2021-40153>, CVE-2021-41072
<https://nvd.nist.gov/vuln/detail/CVE-2021-41072>)
- VMware: open-vm-tools (CVE-2022-31676
<https://nvd.nist.gov/vuln/detail/CVE-2022-31676>)

<https://hackmd.io/d2G9WGULTnyOaZ4MViy2Pw#Bug-fixes1>Bug fixes:

- Added networkd translation to files section when converting from
Ignition 2.x to Ignition 3.x (coreos-overlay#1910
<https://github.com/flatcar-linux/coreos-overlay/pull/1910>, flatcar#741
<https://github.com/flatcar-linux/Flatcar/issues/741>)
- Added a remount action as systemd-sysext.service drop-in unit to
restore the OEM partition mount after the overlay mounts in /usr are
done (init#69 <https://github.com/flatcar-linux/init/pull/69>)
- Added back Ignition support for Vagrant (coreos-overlay#2351
<https://github.com/flatcar/coreos-overlay/pull/2351>)
- Added back gettext to the OS (Flatcar#849
<https://github.com/flatcar-linux/Flatcar/issues/849>)
- Added merging of Ignition systemd duplicated units when
auto-translating from Ignition 2 to Ignition 3. (coreos-overlay#2187
<https://github.com/flatcar/coreos-overlay/pull/2187>)
- Added support for Openstack for cloud-init activation (
flatcar-linux/init#76 <https://github.com/flatcar-linux/init/pull/76>)
- Added support for hardware security keys in update-ssh-keys (
update-ssh-keys#7 <https://github.com/flatcar/update-ssh-keys/pull/7>)
- Enabled IOMMU on arm64 kernels, the lack of which prevented some
systems from booting (coreos-overlay#2235
<https://github.com/flatcar/coreos-overlay/pull/2235>)
- Excluded Wireguard interface from systemd-networkd default management (
Flatcar#808 <https://github.com/flatcar-linux/Flatcar/issues/808>)
- Excluded the Kubenet cbr0 interface from networkd’s DHCP config and
set it to Unmanaged to prevent interference and ensure that it is not part
of the network online check (init#55
<https://github.com/flatcar-linux/init/pull/55>)
- Excluded the special Kubernetes network interfaces nodelocaldns and
kube-ipvs0 from being managed with systemd-networkd which interfered
with the setup (init#89 <https://github.com/flatcar/init/pull/89>).
- Fix “ext4 deadlock under heavy I/O load” kernel issue. The patch for
this is included provisionally while we wait for it to be merged upstream (
Flatcar#847 <https://github.com/flatcar/Flatcar/issues/847>,
coreos-overlay#2315 <https://github.com/flatcar/coreos-overlay/pull/2315>
)
- Fixed Ignition btrfs forced formatting for OEM partition (
coreos-overlay#2277 <https://github.com/flatcar/coreos-overlay/pull/2277>
)
- Fixed Ignition’s OEM ID to be metal to follow the Ignition upstream
change which otherwise resulted in a broken boot when the Flatcar OEM ID
pxe was used (bootengine#45
<https://github.com/flatcar-linux/bootengine/pull/45>)
- Fixed /etc/resolv.conf symlink by pointing it at resolv.conf instead
of stub-resolv.conf. This bug was present since the update to systemd
v250 (coreos-overlay#2057
<https://github.com/flatcar-linux/coreos-overlay/pull/2057>)
- Fixed a regression (in Alpha/Beta) where machines failed to boot if
they didn’t have the core user or group in /etc/passwd or /etc/group (
baselayout#26 <https://github.com/flatcar/baselayout/pull/26>)
- Fixed excluded interface type from default systemd-networkd
configuration (flatcar-linux/init#78
<https://github.com/flatcar-linux/init/pull/78>)
- Fixed space escaping in the networkd Ignition translation (Flatcar#812
<https://github.com/flatcar-linux/Flatcar/issues/812>)
- Fixed the dracut emergency Ignition log printing that had a scripting
error causing the cat command to fail (bootengine#33
<https://github.com/flatcar-linux/bootengine/pull/33>)
- Made Ignition write the SSH keys into a file under
authorized_keys.d/ignition again and added a call to update-ssh-keys after
Ignition ran to create the merged authorized_keys file, which fixes the
problem that keys added by Ignition get lost when update-ssh-keys runs (
init#66 <https://github.com/flatcar-linux/init/pull/66>)
- Re-added the brd drbd nbd rbd xen-blkfront zram libarc4 lru_cache
zsmalloc kernel modules to the initramfs since they were missing
compared to the Flatcar 3033.2.x releases where the 5.10 kernel is used (
bootengine#40 <https://github.com/flatcar-linux/bootengine/pull/40>)
- Restored the support to specify OEM partition files in Ignition when
/usr/share/oem is given as initrd mount point (bootengine#58
<https://github.com/flatcar/bootengine/pull/58>)
- Reverted the Linux kernel commit which broke networking on AWS
instances which use Intel 82559 NIC (c4/m4) (Flatcar#665
<https://github.com/flatcar-linux/Flatcar/issues/665>,
coreos-overlay#1723
<https://github.com/flatcar-linux/coreos-overlay/pull/1723>)
- Skipped starting ensure-sysext.service if systemd-sysext.service won’t
be started, to prevent reporting a dependency failure (Flatcar#710
<https://github.com/flatcar-linux/Flatcar/issues/710>)
- The Ignition v3 kargs directive failed before when used with the
generic image where no grub.cfg exists, this was fixed by creating it
first (bootengine#47
<https://github.com/flatcar-linux/bootengine/pull/47>)
- The rootfs setup in the initrd now runs systemd-tmpfiles on every
boot, not only when Ignition runs, to fix a dbus failure due to missing
files (Flatcar#944 <https://github.com/flatcar/Flatcar/issues/944>)
- flatcar-update: Stopped checking for the USER environment variable
which may not be set in all environments, causing the script to fail unless
a workaround was used like prepending an additional sudo invocation (
init#58 <https://github.com/flatcar-linux/init/pull/58>)
- network: Accept ICMPv6 Router Advertisements to fix IPv6 address
assignment in the default DHCP setting (init#51
<https://github.com/flatcar-linux/init/pull/51>, coreos-cloudinit#12
<https://github.com/flatcar-linux/coreos-cloudinit/pull/12>,
bootengine#30 <https://github.com/flatcar-linux/bootengine/pull/30>)
- Fixed the restart of Systemd services when the main process is being
killed by a SIGHUP signal (flatcar#1157
<https://github.com/flatcar/Flatcar/issues/1157>)
- Resolved the conflicting FD usage of libselinux and systemd which
caused, e.g., a systemd crash on certain watchdog interaction during
shutdown (patch in systemd 252.11)
- AWS: added EKS support for version 1.22 and 1.23. (coreos-overlay#2110
<https://github.com/flatcar-linux/coreos-overlay/pull/2110>, Flatcar#829
<https://github.com/flatcar-linux/Flatcar/issues/829>)- VMWare: excluded
wireguard (and others) from systemd-networkd management. (init#80
<https://github.com/flatcar-linux/init/pull/80>)
- GCP: Restored oem-gce.service functionality on GCP (coreos-overlay#1813
<https://github.com/flatcar-linux/coreos-overlay/pull/1813>)
- GCP: Fixed shutdown script execution (coreos-overlay#1912
<https://github.com/flatcar-linux/coreos-overlay/pull/1912>, flatcar#743
<https://github.com/flatcar-linux/Flatcar/issues/743>)

<https://hackmd.io/d2G9WGULTnyOaZ4MViy2Pw#Changes1>Changes:

- ARM64: Added cifs-utils
<https://wiki.samba.org/index.php/LinuxCIFS_utils> for ARM64
- ARM64: Added sssd <https://sssd.io/>, adcli
<https://www.freedesktop.org/software/realmd/adcli/adcli.html> and
realmd for ARM64
- Added CONFIG_NF_CT_NETLINK_HELPER (for libnetfilter_cthelper),
CONFIG_NET_VRF (for virtual routing and forwarding) and
CONFIG_KEY_DH_OPERATIONS (for keyutils) to the kernel config (
coreos-overlay#1524
<https://github.com/flatcar-linux/coreos-overlay/pull/1524>)
- Added VMware networking configuration in the initramfs via guestinfo
settings (bootengine#44
<https://github.com/flatcar-linux/bootengine/pull/44>, flatcar#717
<https://github.com/flatcar-linux/Flatcar/issues/717>)
- Added CONFIG_NF_CONNTRACK_BRIDGE (for nf_conntrack_bridge) and
CONFIG_NFT_BRIDGE_META (for nft_meta_bridge) to the kernel config to
allow using conntrack rules for bridges in nftables and to match on bridge
interface names (coreos-overlay#2207
<https://github.com/flatcar/coreos-overlay/pull/2207>)
- Added auditd.service but left it disabled by default, a custom
configuration can be created by removing /etc/audit/auditd.conf and
replacing it with an own file (coreos-overlay#1636
<https://github.com/flatcar-linux/coreos-overlay/pull/1636>)
- Added cryptsetup to the initramfs for the Ignition luks directive (
flatcar-linux/coreos-overlay#1760
<https://github.com/flatcar-linux/coreos-overlay/pull/1760>)
- Added a new flatcar-update tool to the image to ease manual updates,
rollbacks, channel/release jumping, and airgapped updates (init#53
<https://github.com/flatcar-linux/init/pull/53>)
- Added efibootmgr binary to the image (coreos-overlay#1955
<https://github.com/flatcar-linux/coreos-overlay/pull/1955>)
- Added symlink from nc to ncat. -q option is not yet supported
<https://github.com/nmap/nmap/issues/2422> (flatcar#545
<https://github.com/flatcar-linux/Flatcar/issues/545>)
- Besides Ignition v1 and v2 configurations, Ignition configurations
with specification v3 (up to 3.3.0) are now supported, see the docs
section for details
<https://www.flatcar.org/docs/latest/provisioning/ignition/specification/#ignition-v3>
- Bring in dependencies for NFS4 with Kerberos both in kernel and
userspace. Tested against NFS4.1 server. (coreos-overlay#1664
<https://github.com/flatcar-linux/coreos-overlay/pull/1664>)
- Change CONFIG_WIREGUARD kernel option to module to save space on boot
partition (coreos-overlay#2239
<https://github.com/flatcar/coreos-overlay/pull/2239>)
- Disable several arch specific arm64 kernel config options for
unsupported platforms to save space on boot partition (
coreos-overlay#2239 <https://github.com/flatcar/coreos-overlay/pull/2239>
)
- Enabled CONFIG_INTEL_RAPL on AMD64 Kernel config to compile
intel_rapl_common module in order to allow power monitoring on modern
Intel processors (coreos-overlay#1801
<https://github.com/flatcar-linux/coreos-overlay/pull/1801>)
- Enabled systemd-sysext.service to activate systemd-sysext images on
boot, to disable you will need to mask it. Also added a helper service
ensure-sysext.service which reloads the systemd units to reevaluate the
sockets, timers, and multi-user targets when systemd-sysext.service is
(re)started, making it possible to enable units that are part of a sysext
image (init#65 <https://github.com/flatcar-linux/init/pull/65>)
- Excluded special network interface devices like bridge, tunnel, vxlan,
and veth devices from the default DHCP configuration to prevent networkd
interference (init#56 <https://github.com/flatcar-linux/init/pull/56>)
- For amd64 /usr/lib used to be a symlink to /usr/lib64 but now they
became two separate folders as common in other distributions (and was the
case for arm64 already). Compatibility symlinks exist in case /usr/lib64 was
used to access, e.g., the modules folder or the systemd folder (
coreos-overlay#1713
<https://github.com/flatcar-linux/coreos-overlay/pull/1713>, scripts#255
<https://github.com/flatcar-linux/scripts/pull/255>)
- Made SELinux enabled by default in default containerd configuration
file. (coreos-overlay#1699
<https://github.com/flatcar-linux/coreos-overlay/pull/1699>)
- Removed rngd.service because it is not essential anymore for the
kernel to boot fast in VM environments (coreos-overlay#1700
<https://github.com/flatcar-linux/coreos-overlay/pull/1700>)
- Specifying the OEM filesystem in Ignition to write files to
/usr/share/oem is not needed anymore (bootengine#58
<https://github.com/flatcar/bootengine/pull/58>)
- Switched from --strip-unneeded to --strip-debug when installing kernel
modules, which makes kernel stacktraces more accurate and makes debugging
issues easier (coreos-overlay#2196
<https://github.com/flatcar/coreos-overlay/pull/2196>)
- The flatcar-update tool got two new flags to customize ports used on
the host while updating flatcar (init#81
<https://github.com/flatcar/init/pull/81>)
- Toolbox now uses containerd to download and mount the image (toolbox#7
<https://github.com/flatcar/toolbox/pull/7>)
- Update-engine now creates the /run/reboot-required flag file for kured
<https://github.com/weaveworks/kured> (update_engine#15
<https://github.com/flatcar-linux/update_engine/pull/15>)
- flatcar-install: Added option to create UEFI boot entry (init#74
<https://github.com/flatcar-linux/init/pull/74>)
- Add qemu-guest-agent to all amd64 images, it will be automatically
enabled when qemu-ga virtio-port is detected (coreos-overlay#2240
<https://github.com/flatcar/coreos-overlay/pull/2240>, portage-stable#373
<https://github.com/flatcar/portage-stable/pull/373>)
- Add a way to remove packages that are hard-blockers for update. A
hard-blocker means that the package needs to be removed (for example with emerge
-C) before an update can happen.
- Add support for Microsoft Azure Network Adapter (MANA) NICs on Azure (
scripts#1131 <https://github.com/flatcar/scripts/pull/1131>)
- Defined a systemd-sysext level that sysext images can match for
instead of the OS version when they don’t have a strong coupling, meaning
the only metadata required is SYSEXT_LEVEL=1.0 and ID=flatcar (
Flatcar#643 <https://github.com/flatcar-linux/Flatcar/issues/643>)
- Removed the pre-shipped /etc/flatcar/update.conf file, leaving it
totally to the user to define the contents as it was unnecessarily
overwriting the /use/share/flatcar/update.conf (scripts#212
<https://github.com/flatcar-linux/scripts/pull/212>)
- Rework the way we set up the default python intepreter in SDK - it is
now without specifying a version. This should work fine as long as we keep
having one version of python in SDK.
- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)
- AWS: Added AWS IMDSv2 support to coreos-cloudinit (
flatcar-linux/coreos-cloudinit#13
<https://github.com/flatcar-linux/coreos-cloudinit/pull/13>)
- AWS EC2: Removed the setup of /etc/hostname from the instance metadata
because it used a long FQDN but we can just use use the hostname set via
DHCP (Flatcar#707 <https://github.com/flatcar-linux/Flatcar/issues/707>)
- Azure: Azure VHD disks are now created using subformat=fixed, which
makes them suitable for immediate upload to Azure using any tool.
- Azure: Set up /etc/hostname from instance metadata with Afterburn
- OpenStack: enabled coreos-metadata-sshkeys@.service to provision SSH
keys from metadata. (Flatcar#817
<https://github.com/flatcar/Flatcar/issues/817>, coreos-overlay#2246
<https://github.com/flatcar/coreos-overlay/pull/2246>)
- VMWare: Added ignition-delete-config.service to remove Ignition config
from VM metadata, see also here
<https://coreos.github.io/ignition/operator-notes/#automatic-config-deletion>
(coreos-overlay#1948
<https://github.com/flatcar-linux/coreos-overlay/pull/1948>)
- SDK / ARM64: Added go-tspi
<https://pkg.go.dev/github.com/coreos/go-tspi> bindings for ARM64

<https://hackmd.io/d2G9WGULTnyOaZ4MViy2Pw#Updates1>Updates:

- Linux (5.15.132 <https://lwn.net/Articles/944877> (includes 5.15.131
<https://lwn.net/Articles/943755>, 5.15.130
<https://lwn.net/Articles/943404>, 5.15.129
<https://lwn.net/Articles/943113>, 5.15.128
<https://lwn.net/Articles/942866>, 5.15.127
<https://lwn.net/Articles/941775>, 5.15.126
<https://lwn.net/Articles/941296>, 5.15.125
<https://lwn.net/Articles/940798>, 5.15.124
<https://lwn.net/Articles/940339>, 5.15.123
<https://lwn.net/Articles/939424>, 5.15.122
<https://lwn.net/Articles/939104>, 5.15.121
<https://lwn.net/Articles/939016>, 5.15.120
<https://lwn.net/Articles/937404>, 5.15.119
<https://lwn.net/Articles/936675>, 5.15.118
<https://lwn.net/Articles/935584>, 5.15.117
<https://lwn.net/Articles/934622>, 5.15.116
<https://lwn.net/Articles/934320>, 5.15.115
<https://lwn.net/Articles/933909>, 5.15.114
<https://lwn.net/Articles/933280>, 5.15.113
<https://lwn.net/Articles/932883>, 5.15.112
<https://lwn.net/Articles/932134>, 5.15.111
<https://lwn.net/Articles/931680>, 5.15.110
<https://lwn.net/Articles/930600>, 5.15.109
<https://lwn.net/Articles/930263>, 5.15.108
<https://lwn.net/Articles/929679>, 5.15.107
<https://lwn.net/Articles/929015>, 5.15.106
<https://lwn.net/Articles/928343>, 5.15.105
<https://lwn.net/Articles/927860>, 5.15.104
<https://lwn.net/Articles/926873>, 5.15.103
<https://lwn.net/Articles/926415>, 5.15.102
<https://lwn.net/Articles/925991>, 5.15.101
<https://lwn.net/Articles/925939>, 5.15.100
<https://lwn.net/Articles/925913>, 5.15.99
<https://lwn.net/Articles/925844>, 5.15.98
<https://lwn.net/Articles/925080>, 5.15.97
<https://lwn.net/Articles/925064>, 5.15.96
<https://lwn.net/Articles/924441>, 5.15.95
<https://lwn.net/Articles/924073>, 5.15.94
<https://lwn.net/Articles/923308>, 5.15.93
<https://lwn.net/Articles/922814>, 5.15.92
<https://lwn.net/Articles/922340>, 5.15.91
<https://lwn.net/Articles/921851>, 5.15.90
<https://lwn.net/Articles/921029>, 5.15.89
<https://lwn.net/Articles/920321>, 5.15.88
<https://lwn.net/Articles/920012>, 5.15.87
<https://lwn.net/Articles/919793>, 5.15.86
<https://lwn.net/Articles/918808>, 5.15.85
<https://lwn.net/Articles/918329>, 5.15.84
<https://lwn.net/Articles/918206>, 5.15.83
<https://lwn.net/Articles/917896>, 5.15.82
<https://lwn.net/Articles/917400>, 5.15.81
<https://lwn.net/Articles/916763>, 5.15.80
<https://lwn.net/Articles/916003>, 5.15.79
<https://lwn.net/Articles/915100>, 5.15.78
<https://lwn.net/Articles/914423>, 5.15.77
<https://lwn.net/Articles/913681>, 5.15.76
<https://lwn.net/Articles/912997>, 5.15.75
<https://lwn.net/Articles/912500>, 5.15.74
<https://lwn.net/Articles/911275>, 5.15.73
<https://lwn.net/Articles/910957>, 5.15.72
<https://lwn.net/Articles/910398>, 5.15.71
<https://lwn.net/Articles/909679>, 5.15.70
<https://lwn.net/Articles/909212>, 5.15.69
<https://lwn.net/Articles/908782>, 5.15.68
<https://lwn.net/Articles/908140>, 5.15.67
<https://lwn.net/Articles/907526>, 5.15.66
<https://lwn.net/Articles/907524>, 5.15.65
<https://lwn.net/Articles/907204>, 5.15.64
<https://lwn.net/Articles/906630>, 5.15.63
<https://lwn.net/Articles/906059>, 5.15.62
<https://lwn.net/Articles/905533>, 5.15.61
<https://lwn.net/Articles/904959>, 5.15.60
<https://lwn.net/Articles/904461>, 5.15.59
<https://lwn.net/Articles/903688>, 5.15.58
<https://lwn.net/Articles/902917>, 5.15.57
<https://lwn.net/Articles/902317>, 5.15.56
<https://lwn.net/Articles/902101>, 5.15.55
<https://lwn.net/Articles/901380>, 5.15.54
<https://lwn.net/Articles/900911>, 5.15.53
<https://lwn.net/Articles/900321>, 5.15.52
<https://lwn.net/Articles/899788>, 5.15.51
<https://lwn.net/Articles/899370>, 5.15.50
<https://lwn.net/Articles/899091>, 5.15.49
<https://lwn.net/Articles/898622>, 5.15.48
<https://lwn.net/Articles/898124>, 5.15.47
<https://lwn.net/Articles/897904>, 5.15.46
<https://lwn.net/Articles/897377>, 5.15.45
<https://lwn.net/Articles/897167>, 5.15.44
<https://lwn.net/Articles/896647>, 5.15.43
<https://lwn.net/Articles/896220>, 5.15.42
<https://lwn.net/Articles/896226>, 5.15.41
<https://lwn.net/Articles/895645>, 5.15.40
<https://lwn.net/Articles/895318>, 5.15.39
<https://lwn.net/Articles/895070>, 5.15.38
<https://lwn.net/Articles/894357>, 5.15.37
<https://lwn.net/Articles/893264>, 5.15.36
<https://lwn.net/Articles/892812>, 5.15.35
<https://lwn.net/Articles/892002>, 5.15.34
<https://lwn.net/Articles/891251>, 5.15.33
<https://lwn.net/Articles/890722>, 5.15.32
<https://lwn.net/Articles/889438>, 5.15.31
<https://lwn.net/Articles/889001>, 5.15.30
<https://lwn.net/Articles/888521>, 5.15.29
<https://lwn.net/Articles/888116>, 5.15.28
<https://lwn.net/Articles/887638>, 5.15.27
<https://lwn.net/Articles/887219>, 5.15.26
<https://lwn.net/Articles/886569>, 5.15.25
<https://lwn.net/Articles/885895>, 5.15.24
<https://lwn.net/Articles/884973>, 5.15.23
<https://lwn.net/Articles/884527>, 5.15.22
<https://lwn.net/Articles/884107>, 5.15.21
<https://lwn.net/Articles/883958>, 5.15.20
<https://lwn.net/Articles/883951>, 5.15.19
<https://lwn.net/Articles/883441>, 5.15.18
<https://lwn.net/Articles/883326>, 5.15.17
<https://lwn.net/Articles/882911>, 5.15.16
<https://lwn.net/Articles/881963>, 5.15.15
<https://lwn.net/Articles/881548>, 5.15.14
<https://lwn.net/Articles/881018>, 5.15.13
<https://lwn.net/Articles/880469>, 5.15.12
<https://lwn.net/Articles/879997>, 5.15.11
<https://lwn.net/Articles/879496>, 5.15.10
<https://lwn.net/Articles/879023>, 5.15.9
<https://lwn.net/Articles/878898>, 5.15.8
<https://lwn.net/Articles/878631>, 5.15.7
<https://lwn.net/Articles/878040>, 5.15.6
<https://lwn.net/Articles/877286>, 5.15.5
<https://lwn.net/Articles/876860>, 5.15.4
<https://lwn.net/Articles/876611>))
- Linux Firmware (20230117
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230117>
(includes 20221214
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221214>
, 20221109
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221109>
, 20221012
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20221012>
, 20220913
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220913>
, 20220815
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220815>
, 20220708
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220708>
, 20220610
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220610>
, 20220509
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220509>
, 20220411
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220411>
, 20220310
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220310>
, 20220209
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20220209>
))
- Linux Headers (5.15 <https://lwn.net/Articles/876611/>)
- Go (1.19.5 <https://go.dev/doc/devel/release#go1.19.5> (includes 1.19.4
<https://go.dev/doc/devel/release#go1.19.4>, 1.19.3
<https://go.dev/doc/devel/release#go1.19.3>, 1.18.10
<https://go.dev/doc/devel/release#go1.18.10>, 1.18.9
<https://go.dev/doc/devel/release#go1.18.9>, 1.18.7
<https://go.dev/doc/devel/release#1.18.7>, 1.18.6
<https://go.dev/doc/devel/release#go1.18.6>, 1.18.4
<https://go.dev/doc/devel/release#go1.18.4>, 1.18.2
<https://go.googlesource.com/go/+/refs/tags/go1.18.2>, 1.17.9
<https://go.googlesource.com/go/+/refs/tags/go1.17.9>))
- Docker (20.10.23 <https://docs.docker.com/engine/release-notes/#201023>
(includes 20.10.22
<https://docs.docker.com/engine/release-notes/#201022>, 20.10.21
<https://docs.docker.com/engine/release-notes/#201021>, 20.10.20
<https://docs.docker.com/engine/release-notes/#201020>, 20.10.18
<https://docs.docker.com/engine/release-notes/#201018>, 20.10.17
<https://docs.docker.com/engine/release-notes/#201017>, 20.10.16
<https://docs.docker.com/engine/release-notes/#201016>, 20.10.15
<https://docs.docker.com/engine/release-notes/#201015>, 20.10.14
<https://docs.docker.com/engine/release-notes/#201014>, 20.10.13
<https://docs.docker.com/engine/release-notes/#201013>))
- acl (2.3.1 <https://git.savannah.nongnu.org/cgit/acl.git/log/?h=v2.3.1>
)
- new: acpid (2.0.33
<https://sourceforge.net/p/acpid2/code/ci/2.0.33/tree/Changelog>)
- adcli (0.9.2
<https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.2> (includes
0.9.1 <https://gitlab.freedesktop.org/realmd/adcli/-/releases#0.9.1>))
- afterburn (5.2.0
<https://github.com/coreos/afterburn/releases/tag/v5.2.0>)
- attr (2.5.1
<https://git.savannah.nongnu.org/cgit/attr.git/log/?h=v2.5.1>)
- audit (3.0.6
<https://listman.redhat.com/archives/linux-audit/2021-October/msg00000.html>
)
- automake (1.16.5
<https://savannah.gnu.org/forum/forum.php?forum_id=10055>)
- bind tools (9.16.36
<https://bind9.readthedocs.io/en/v9_16_36/notes.html#notes-for-bind-9-16-36>
(includes 9.16.35
<https://bind9.readthedocs.io/en/v9_16_34/notes.html#notes-for-bind-9-16-35>
, 9.16.34
<https://bind9.readthedocs.io/en/v9_16_35/notes.html#notes-for-bind-9-16-34>
, 9.16.33
<https://gitlab.isc.org/isc-projects/bind9/-/raw/v9_16_33/CHANGES>,
9.16.27
<https://gitlab.isc.org/isc-projects/bind9/-/blob/v9_16_27/CHANGES>))
- binutils (2.39
<https://sourceware.org/pipermail/binutils/2022-August/122246.html>
(includes 2.38 <https://lwn.net/Articles/884264>))
- boost (1.79 <https://www.boost.org/users/history/version_1_79_0.html>
(includes 1.76.0
<https://www.boost.org/users/history/version_1_76_0.html>))
- bpftool (5.19.12 <https://lwn.net/Articles/909678/> (includes 5.19.8
<https://lwn.net/Articles/907523/>, 5.19.2
<https://lwn.net/Articles/904957/>, 5.18.11
<https://lwn.net/Articles/900912/>, 5.15.8
<https://lwn.net/Articles/878631/>))
- bridge-utils (1.7.1
<https://git.kernel.org/pub/scm/network/bridge/bridge-utils.git/log/?h=v1.7.1>
)
- btrfs-progs (5.15.1
<https://btrfs.wiki.kernel.org/index.php/Changelog#btrfs-progs_v5.15_.28Nov_2021.29>
)
- ca-certificates (3.93
<https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_93.html>
(includes 3.90
<https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90.html>
, 3.78
<https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_78.html>
))
- cifs-utils (6.15
<https://lists.samba.org/archive/samba-technical/2022-April/137335.html>
(includes 6.13
<https://lkml.kernel.org/linux-cifs/CAKywueSqRGSFmeDHQacyu831...@mail.gmail.com/T/>
))
- conntrack-tools (1.4.6
<https://lists.netfilter.org/pipermail/netfilter-announce/2020/000240.html>
)
- containerd (1.6.16
<https://github.com/containerd/containerd/releases/tag/v1.6.16>
(includes 1.6.15
<https://github.com/containerd/containerd/releases/tag/v1.6.15>, 1.6.14
<https://github.com/containerd/containerd/releases/tag/v1.6.14>, 1.6.13
<https://github.com/containerd/containerd/releases/tag/v1.6.13>, 1.6.12
<https://github.com/containerd/containerd/releases/tag/v1.6.12>, 1.6.10
<https://github.com/containerd/containerd/releases/tag/v1.6.10>, 1.6.9
<https://github.com/containerd/containerd/releases/tag/v1.6.9>, 1.6.8
<https://github.com/containerd/containerd/releases/tag/v1.6.8>, 1.6.7
<https://github.com/containerd/containerd/releases/tag/v1.6.7>, 1.6.6
<https://github.com/containerd/containerd/releases/tag/v1.6.6>, 1.6.4
<https://github.com/containerd/containerd/releases/tag/v1.6.4>, 1.6.3
<https://github.com/containerd/containerd/releases/tag/v1.6.3>, 1.6.2
<https://github.com/containerd/containerd/releases/tag/v1.6.2>, 1.6.1
<https://github.com/containerd/containerd/releases/tag/v1.6.1>, 1.6.0
<https://github.com/containerd/containerd/releases/tag/v1.6.0>))
- coreutils (8.32
<https://lists.gnu.org/archive/html/coreutils-announce/2020-03/msg00000.html>
)
- cpio (2.13
<https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html>)
- cri-tools (1.24.2
<https://github.com/kubernetes-sigs/cri-tools/releases/tag/v1.24.2>)
- cryptsetup (2.4.3
<https://lore.kernel.org/all/572c18a7bf60cb1b0f67c3a...@scientia.net/T/>
)
- curl (7.87.0 <https://curl.se/changes.html#7_87_0> (includes 7.86
<https://curl.se/changes.html#7_86_0>, 7.85
<https://curl.se/mail/archive-2022-08/0012.html>, 7.84.0
<https://github.com/curl/curl/releases/tag/curl-7_84_0>, 7.83.1
<https://curl.se/mail/lib-2022-05/0010.html>))
- Cyrus SASL (2.1.28
<https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28>
)
- dbus (1.14.4
<https://gitlab.freedesktop.org/dbus/dbus/-/raw/dbus-1.14.4/NEWS>
(includes 1.12.22
<https://gitlab.freedesktop.org/dbus/dbus/-/blob/177ab044bc87cbc4ded75d21b900795a6fefef76/NEWS>
))
- diffutils (3.8
<https://lists.gnu.org/archive/html/info-gnu/2021-08/msg00000.html>)
- dosfstools (4.2
<https://github.com/dosfstools/dosfstools/releases/tag/v4.2>)
- duktape (2.7.0
<https://github.com/svaarala/duktape/releases/tag/v2.7.0>)
- e2fsprogs (1.46.5
<http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.5>
(includes 1.46.4
<http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.4>))
- elfutils (0.188
<https://sourceware.org/pipermail/elfutils-devel/2022q4/005561.html>
(includes 0.187
<https://sourceware.org/pipermail/elfutils-devel/2022q2/004978.html>,
0.186
<https://sourceware.org/git/?p=elfutils.git;a=blob;f=NEWS;h=490932ae4ef9b5a3af01d2c8c616f14d57586046;hb=983e86fd89e8bf02f2d27ba5dce5bf078af4ceda>
))
- ethtool (5.10
<https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v5.10>
)
- expat (2.5.0
<https://github.com/libexpat/libexpat/blob/R_2_5_0/expat/Changes>
(includes 2.4.9
<https://github.com/libexpat/libexpat/blob/R_2_4_9/expat/Changes>))
- findutils (4.8.0
<https://savannah.gnu.org/forum/forum.php?forum_id=9914>)
- gawk (5.2.1
<https://lists.gnu.org/archive/html/help-gawk/2022-11/msg00008.html>
(contains 5.2.0
<https://lists.gnu.org/archive/html/help-gawk/2022-09/msg00000.html>))
- gcc (11.3.0 <https://gcc.gnu.org/gcc-11/changes.html> (includes 10.3.0
<https://gcc.gnu.org/gcc-10/changes.html>, 9.4.0
<https://lists.gnu.org/archive/html/info-gnu/2021-06/msg00000.html>))
- gdb (11.2
<https://lists.gnu.org/archive/html/info-gnu/2022-01/msg00009.html>)
- gdbm (1.22
<https://lists.gnu.org/archive/html/info-gnu/2021-10/msg00006.html>)
- gettext (0.21.1
<https://git.savannah.gnu.org/gitweb/?p=gettext.git;a=blob;f=NEWS;h=cdbb16746c23555e70bb1e16917f5c349ce92d9e;hb=8b38ee827251cadbb90cb6cb576ae98702566288>
(includes 0.21 <https://www.gnu.org/software/gettext/>))
- git (2.39.1
<https://github.com/git/git/blob/v2.39.1/Documentation/RelNotes/2.39.1.txt>
(includes 2.39.0
<https://github.com/git/git/blob/v2.39.0/Documentation/RelNotes/2.39.0.txt>
, 2.38.3
<https://github.com/git/git/blob/v2.38.3/Documentation/RelNotes/2.38.3.txt>
, 2.37.4
<https://github.com/git/git/blob/master/Documentation/RelNotes/2.37.4.txt>
, 2.37.3
<https://github.com/git/git/blob/v2.37.3/Documentation/RelNotes/2.37.3.txt>
, 2.37.1
<https://github.com/git/git/blob/v2.37.1/Documentation/RelNotes/2.37.1.txt>
, 2.35.3
<https://github.com/git/git/blob/v2.35.3/Documentation/RelNotes/2.35.3.txt>
))
- glib (2.74.4 <https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.4>
(includes 2.74.1 <https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.1>,
2.72.3 <https://gitlab.gnome.org/GNOME/glib/-/tags/2.73.3>, 2.68.4
<https://gitlab.gnome.org/GNOME/glib/-/releases/2.68.4>))
- glibc (2.36
<https://sourceware.org/pipermail/libc-alpha/2022-August/141193.html>
(includes 2.35 <https://savannah.gnu.org/forum/forum.php?forum_id=10111>
, 2.34
<https://sourceware.org/pipermail/libc-alpha/2021-August/129718.html>))
- gnupg (2.2.35 <https://dev.gnupg.org/T5928>)
- gnutls (3.7.8
<https://lists.gnupg.org/pipermail/gnutls-help/2022-September/004765.html>
(includes 3.7.7 <https://gitlab.com/gnutls/gnutls/-/tags/3.7.7>, 3.7.3
<https://gitlab.com/gnutls/gnutls/-/merge_requests/1517>))
- grep (3.7 <https://savannah.gnu.org/forum/forum.php?forum_id=10037>)
- gzip (1.12 <https://savannah.gnu.org/forum/forum.php?forum_id=10157>
(includes 1.11
<https://lists.gnu.org/archive/html/info-gnu/2021-09/msg00002.html>))
- i2c-tools (4.3
<https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/tree/CHANGES?id=d8bc1f1ff4b00a6bd988aa114100ae9b787f50d8>
(includes 4.2
<https://git.kernel.org/pub/scm/utils/i2c-tools/i2c-tools.git/log/?h=v4.2>
))
- ignition (2.14.0
<https://github.com/coreos/ignition/releases/tag/v2.14.0> (includes
2.13.0 <https://github.com/coreos/ignition/releases/tag/v2.13.0>))
- intel-microcode (20220809
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220809>
(includes 20220510
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220510>
, 20220207_p20220207
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220207>
, 20221108
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20221108>
))
- iperf (3.10.1
<https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-3101-2021-06-03>
)
- iproute2 (5.15
<https://lwn.net/ml/linux-kernel/20211101164705.6f4f2e41%40hermes.local/>
)
- ipset (7.11 <https://ipset.netfilter.org/changelog.html>)
- iptables (1.8.8
<https://www.netfilter.org/projects/iptables/files/changes-iptables-1.8.8.txt>
)
- iputils (20211215
<https://github.com/iputils/iputils/releases/tag/20211215> (includes
20210722 <https://github.com/iputils/iputils/releases/tag/20210722>))
- ipvsadm (1.27
<http://archive.linuxvirtualserver.org/html/lvs-devel/2013-09/msg00011.html>
)
- jansson (2.14 <https://github.com/akheron/jansson/blob/v2.14/CHANGES>)
- kmod (29
<https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/commit/?id=b6ecfc916a17eab8f93be5b09f4e4f845aabd3d1>
)
- ldb (2.4.1
<https://gitlab.com/samba-team/samba/-/commit/a795e0c84597aa045d011e663dbad3cdabf0f1e6>
)
- less (590 <https://www.greenwoodsoftware.com/less/news.590.html>)
- libarchive (3.6.1
<https://github.com/libarchive/libarchive/releases/tag/v3.6.1> (includes
3.5.3 <https://github.com/libarchive/libarchive/releases/tag/v3.5.3>,
3.5.2 <https://github.com/libarchive/libarchive/releases/tag/v3.5.2>))
- libbsd (0.11.3
<https://gitlab.freedesktop.org/libbsd/libbsd/-/commits/0.11.3/>)
- libcap (2.66
<https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.d9ygdose5kw>
(includes 2.65
<https://sites.google.com/site/fullycapable/release-notes-for-libcap?authuser=0#h.wfblevfzkj0>
))
- libcap-ng (0.8.3 <https://people.redhat.com/sgrubb/libcap-ng/ChangeLog>
(includes 0.8.2
<https://github.com/stevegrubb/libcap-ng/releases/tag/v0.8.2>))
- libksba (1.6.3 <https://dev.gnupg.org/T6304> (includes 1.6.2
<https://dev.gnupg.org/T6230>))
- libnetfilter_queue (1.0.5
<https://git.netfilter.org/libnetfilter_queue/log/?h=libnetfilter_queue-1.0.5>
)
- libpcap (1.10.1
<https://git.tcpdump.org/libpcap/blob/c7642e2cc0c5bd65754685b160d25dc23c76c6bd:/CHANGES>
)
- libseccomp (2.5.4
<https://github.com/seccomp/libseccomp/releases/tag/v2.5.4> (contains
2.5.3 <https://github.com/seccomp/libseccomp/releases/tag/v2.5.3>, 2.5.2
<https://github.com/seccomp/libseccomp/releases/tag/v2.5.2>, 2.5.1
<https://github.com/seccomp/libseccomp/releases/tag/v2.5.1>))
- libtasn1 (4.19.0
<https://lists.gnu.org/archive/html/help-libtasn1/2022-08/msg00001.html>
(includes 4.17.0
<https://gitlab.com/gnutls/libtasn1/-/blob/v4.17.0/NEWS>))
- liburing (2.1 <https://github.com/axboe/liburing/commits/liburing-2.1>)
- libxml2 (2.10.3 <https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3>
(includes 2.10.2 <https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.2>
, 2.9.14 <https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14>,
2.9.13 <http://www.xmlsoft.org/news.html>))
- logrotate (3.20.1
<https://github.com/logrotate/logrotate/releases/tag/3.20.1>)
- lshw (02.19.2b_p20210121
<https://www.ezix.org/project/wiki/HardwareLiSter#Changes>)
- lsof (4.94.0 <https://github.com/lsof-org/lsof/releases/tag/4.94.0>)
- lsscsi (0.32 <https://sg.danny.cz/scsi/lsscsi.ChangeLog>)
- mantle (0.18.0
<https://github.com/flatcar-linux/mantle/releases/tag/v0.18.0> (includes
0.17.0 <https://github.com/flatcar-linux/mantle/releases/tag/v0.17.0>))
- mdadm (4.2
<https://lore.kernel.org/all/28fdbc45-96ca-7cdb...@trained-monkey.org/T/>
)
- MIT Kerberos V (1.20.1
<https://web.mit.edu/kerberos/krb5-1.20/krb5-1.20.1.html>)
- multipath-tools (0.9.3
<https://github.com/opensvc/multipath-tools/releases/tag/0.9.3>
(includes 0.8.7
<https://github.com/opensvc/multipath-tools/commits/0.8.7>))
- ncurses (6.3_p20220423
<https://lists.gnu.org/archive/html/info-gnu/2021-11/msg00001.html>)
- nettle (3.8.1
<https://git.lysator.liu.se/nettle/nettle/-/blob/990abad16ceacd070747dcc76ed16a39c129321e/ChangeLog>
)
- nfs-utils (2.5.4
<https://lore.kernel.org/linux-fsdevel/c8795653-7728-18a4...@redhat.com/>
)
- nghttp2 (1.45.1
<https://github.com/nghttp2/nghttp2/releases/tag/v1.45.1>)
- nmap (7.93 <https://nmap.org/changelog.html#7.93>)
- nvidia-drivers (510.73.05
<https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-510-73-05/index.html>
)
- nvme-cli (1.16
<https://github.com/linux-nvme/nvme-cli/commits/deee9cae1ac94760deebd71f8e5449061338666c>
)
- oniguruma (6.9.8
<https://github.com/kkos/oniguruma/releases/tag/v6.9.8> (includes 6.9.7.1
<https://github.com/kkos/oniguruma/releases/tag/v6.9.7.1>))
- open-isns (0.101
<https://github.com/open-iscsi/open-isns/blob/v0.101/ChangeLog>)
- openssh (9.1 <http://www.openssh.com/releasenotes.html#9.1> (includes
8.8 <http://www.openssh.com/txt/release-8.8>))
- openssl (3.0.7 <https://www.openssl.org/news/openssl-3.0-notes.html>
(includes 3.0.3 <https://www.openssl.org/news/changelog.html#openssl-30>
, 3.0.2 <https://www.openssl.org/news/changelog.html#openssl-30>, 3.0.1
<https://www.openssl.org/news/changelog.html#openssl-30>))
- pam (1.5.1_p20210622
<https://github.com/linux-pam/linux-pam/commit/fe1307512fb8892b5ceb3d884c793af8dbd4c16a>
)
- pambase (20220214)
- parted (3.4 <https://savannah.gnu.org/forum/forum.php?forum_id=9924>
(includes 3.3 <https://savannah.gnu.org/forum/forum.php?forum_id=9569>))
- pciutils (3.7.0
<https://github.com/pciutils/pciutils/commit/864aecdea9c7db626856d8d452f6c784316a878c>
)
- pcre2 (10.39
<https://github.com/PhilipHazel/pcre2/blob/pcre2-10.39/NEWS>)
- pinentry (1.2.0 <https://dev.gnupg.org/T5566>)
- polkit (121
<https://gitlab.freedesktop.org/polkit/polkit/-/commit/827b0ddac5b1ef00a47fca4526fcf057bee5f1db>
(includes 0.120
<https://gitlab.freedesktop.org/polkit/polkit/-/blob/0.120/NEWS>))
- quota (4.06
<https://sourceforge.net/p/linuxquota/code/ci/0acd4cc6275122fd9864cb7b5d349e65a2622920/>
)
- rpcbind (1.2.6
<https://git.linux-nfs.org/?p=steved/rpcbind.git;a=shortlog;h=refs/tags/rpcbind-1_2_6>
)
- rsync (3.2.7 <https://download.samba.org/pub/rsync/NEWS#3.2.7>
(includes 3.2.6 <https://github.com/WayneD/rsync/releases/tag/v3.2.6>,
3.2.4 <https://download.samba.org/pub/rsync/NEWS.html#3.2.4>))
- runc (1.1.4
<https://github.com/opencontainers/runc/releases/tag/v1.1.4> (includes
1.1.3 <https://github.com/opencontainers/runc/releases/tag/v1.1.3>, 1.1.2
<https://github.com/opencontainers/runc/releases/tag/v1.1.2>, 1.1.1
<https://github.com/opencontainers/runc/releases/tag/v1.1.1>, 1.1.0
<https://github.com/opencontainers/runc/releases/tag/v1.1.0>))
- samba (4.15.4 <https://www.samba.org/samba/history/samba-4.15.4.html>)
- sed (4.8 <https://savannah.gnu.org/forum/forum.php?forum_id=9647>)
- shadow (4.13 <https://github.com/shadow-maint/shadow/releases/tag/4.13>
(includes 4.12.3
<https://github.com/shadow-maint/shadow/releases/tag/4.12.3>, 4.11.1
<https://github.com/shadow-maint/shadow/releases/tag/v4.11.1>))
- socat (1.7.4.3
<https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.3:/CHANGES>)
- sqlite (3.40.1 <https://www.sqlite.org/releaselog/3_40_1.html>
(contains 3.40.0 <https://www.sqlite.org/releaselog/3_40_0.html>, 3.39.4
<https://sqlite.org/releaselog/3_39_4.html>, 3.38.1
<https://www.sqlite.org/releaselog/3_38_1.html>))
- strace (5.19 <https://github.com/strace/strace/releases/tag/v5.19>)
- sudo (1.9.12_p2
<https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p2>
(includes 1.9.12_p1
<https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_12p1>, 1.9.10
<https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_10>))
- systemd (252.11
<https://github.com/systemd/systemd-stable/releases/tag/v252.11>
(includes 252.5
<https://github.com/systemd/systemd-stable/releases/tag/v252.5>, 252
<https://github.com/systemd/systemd/releases/tag/v252>, 251.10
<https://github.com/systemd/systemd-stable/commits/v251.10>, 251
<https://github.com/systemd/systemd/releases/tag/v251>, 250.7
<https://github.com/systemd/systemd-stable/releases/tag/v250.7>, 250.3
<https://github.com/systemd/systemd-stable/releases/tag/v250.3>, 249.7
<https://github.com/systemd/systemd-stable/blob/v249.7/NEWS>))
- talloc (2.3.3
<https://gitlab.com/samba-team/samba/-/commit/bc1ee7ca0640f0136e5af7dcc4ca8ed0a5893053>
)
- tcpdump (4.99.1
<https://git.tcpdump.org/tcpdump/blob/5f552b5e6e9fe05f7ad9681d51d0303233daba6a:/CHANGES>
)
- tevent (0.11.0
<https://gitlab.com/samba-team/samba/-/commit/de4e8a1af9564f6056f9af90867c2f013449051c>
)
- thin-provisioning-tools (0.9.0
<https://github.com/jthornber/thin-provisioning-tools/blob/d6d93c3157631b242a13a81d30f75453e576c55a/CHANGES#L1-L9>
)
- timezone-data (2021a
<https://mm.icann.org/pipermail/tz-announce/2021-January/000065.html>)
- unzip (6.0_p27
<https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-27_changelog>
(includes 6.0_p26
<https://metadata.ftp-master.debian.org/changelogs//main/u/unzip/unzip_6.0-26_changelog>
))
- usbutils (014
<https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usbutils.git/commit/?id=57fb18e59cce31a50a1ca62d1e192512c905ba00>
)
- util-linux (2.37.4
<https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.4-ChangeLog>
)
- vim (9.0.1157 <https://github.com/vim/vim/releases/tag/v9.0.1157>
(includes 9.0.1000 <https://github.com/vim/vim/releases/tag/v9.0.1000>,
9.0.0828 <https://github.com/vim/vim/releases/tag/v9.0.0828>, 9.0.0655
<https://github.com/vim/vim/releases/tag/v9.0.0655>, 9.0.0469
<https://github.com/vim/vim/releases/tag/v9.0.0469>, 8.2.5066
<https://github.com/vim/vim/releases/tag/v8.2.5066>, 8.2.4328
<https://github.com/vim/vim/releases/tag/v8.2.4328>, 8.2.3582
<https://github.com/vim/vim/releases/tag/v8.2.3582>))
- wget (1.21.3
<https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00017.html>)
- whois (5.5.14
<https://github.com/rfc1036/whois/commit/ab10466cf2e1ec4887f6a44375c3e29c1720157f>
(includes 5.5.13
<https://github.com/rfc1036/whois/blob/v5.5.13/debian/changelog>, 5.5.11
<https://github.com/rfc1036/whois/commit/5f5ba8312c04a759dad05723c035549273d07461>
))
- wireguard-tools (1.0.20210914
<https://github.com/WireGuard/wireguard-tools/releases/tag/v1.0.20210914>
)
- xfsprogs (5.14.2 <https://marc.info/?l=linux-xfs&m=163883318025390&w=2>
)
- xz-utils (5.4.1
<https://github.com/tukaani-project/xz/releases/tag/v5.4.1> (includes
5.4.0 <https://github.com/tukaani-project/xz/releases/tag/v5.4.0>, 5.2.10
<https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=d92fa88a835180af5d6ff22ad0e240d6468f81af;hb=f7c2cc55618b9af3318f0c908cf8db0df1e28e7c>
, 5.2.9
<https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=ebb303084403445088ec97dfedf0461a6e5b5077;hb=d8a898eb9974683bc725c49ec76722f9a8758f48>
, 5.2.8
<https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=c244b42a6771a6e8af206318dfc500d78929fd6f;hb=5476089d9c42b9b04e92b80e1800b384a98265cb>
, 5.2.7
<https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=0205423e79ce8297102096b0fc8b030ddf5b2023;hb=d24a57b7fc7e5e9267b84367cb0788d3acf7f569>
, 5.2.6
<https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=4c79b18ff26a1c479a920b21f07d050599c04c9e;hb=8dfed05bdaa4873833ba24279f02ad2db25effea>
))
- zlib (1.2.13 <https://github.com/madler/zlib/releases/tag/v1.2.13>
(includes 1.2.12
<https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/ChangeLog#L4>
))
- GCE: google-compute-image-packages (20190124
<https://github.com/GoogleCloudPlatform/compute-image-packages/releases/tag/20190124>
)
- OEM: distro (1.7.0
<https://github.com/python-distro/distro/releases/tag/v1.7.0>)
- OEM: libmspack (0.10.1_alpha
<https://github.com/kyz/libmspack/blob/v0.10.1alpha/libmspack/ChangeLog>)
- OEM: python (3.9.16
<https://www.python.org/downloads/release/python-3916/> (includes 3.9.12
<https://www.python.org/downloads/release/python-3912/>, 3.9.8
<https://www.python.org/downloads/release/python-398/>))
- SDK: bison (3.8.2
<https://lists.gnu.org/archive/html/bug-bison/2021-09/msg00056.html>)
- SDK: boost (1.81.0
<https://www.boost.org/users/history/version_1_81_0.html>)
- SDK: catalyst (3.0.21
<https://gitweb.gentoo.org/proj/catalyst.git/log/?h=3.0.21>)
- SDK: cmake (3.23.3
<https://cmake.org/cmake/help/v3.23/release/3.23.html>)
- SDK: edk2-ovmf (202105
<https://github.com/tianocore/edk2/releases/tag/edk2-stable202105>)
- SDK: file (5.44 <https://github.com/file/file/blob/FILE5_44/ChangeLog>
(includes 5.43
<https://mailman.astron.com/pipermail/file/2022-September/000857.html>,
5.40 <https://mailman.astron.com/pipermail/file/2021-March/000478.html>))
- SDK: gcc-config (2.5
<https://gitweb.gentoo.org/proj/gcc-config.git/tag/?h=v2.5>)
- SDK: iasl (20200717 <https://www.acpica.org/node/183>)
- SDK: ipxe (1.21.1 <https://github.com/ipxe/ipxe/releases/tag/v1.21.1>)
- SDK: kexec-tools (2.0.22
<https://www.spinics.net/lists/kexec/msg26864.html>)
- SDK: libpng (1.6.39
<http://www.libpng.org/pub/png/src/libpng-1.6.39-README.txt> (includes
1.6.38 <http://www.libpng.org/pub/png/src/libpng-1.6.38-README.txt>))
- SDK: libtool (2.4.7
<https://savannah.gnu.org/forum/forum.php?forum_id=10139>)
- SDK: libxslt (1.1.37
<https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.37> (includes 1.1.35
<https://gitlab.gnome.org/GNOME/libxslt/-/tags/v1.1.35>))
- SDK: man-db (2.9.4 <https://gitlab.com/cjwatson/man-db/-/tags/2.9.4>)
- SDK: man-pages (5.12-r2
<https://man7.org/linux/man-pages/changelog.html#release_5.12>)
- SDK: meson (0.62.2
<https://mesonbuild.com/Release-notes-for-0-62-0.html>)
- SDK: netperf (2.7.0
<https://github.com/HewlettPackard/netperf/blob/netperf-2.7.0/Release_Notes>
)
- SDK: ninja (1.11.0
<https://groups.google.com/g/ninja-build/c/R2oCyDctDf8/m/-U94Y5I8AgAJ?pli=1>
)
- SDK: pahole (1.23
<https://git.kernel.org/pub/scm/devel/pahole/pahole.git/tag/?h=v1.23>)
- SDK: perl (5.36.0 <https://perldoc.perl.org/5.36.0/perldelta>
(includes 5.34.1 <https://perldoc.perl.org/5.34.1/perldelta>, 5.15
<https://kernelnewbies.org/LinuxChanges#Linux_5.15.Tracing.2C_perf_and_BPF>
))
- SDK: pkgconf (1.8.0
<https://gitea.treehouse.systems/ariadne/pkgconf/src/tag/pkgconf-1.8.0/NEWS>
)
- SDK: portage (3.0.43
<https://github.com/gentoo/portage/blob/portage-3.0.43/NEWS> (includes
3.0.42 <https://github.com/gentoo/portage/blob/portage-3.0.42/NEWS>,
3.0.41
<https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.41>))
- SDK: Python (3.9.12
<https://www.python.org/downloads/release/python-3912/> (includes 3.9.8
<https://www.python.org/downloads/release/python-398/>))
- SDK: qemu (7.2.0 <https://wiki.qemu.org/ChangeLog/7.2> (includes 7.1.0
<https://wiki.qemu.org/ChangeLog/7.1>, 7.0.0
<https://wiki.qemu.org/ChangeLog/7.0>, 6.1.0
<https://wiki.qemu.org/ChangeLog/6.1>))
- SDK: Rust (1.67.0
<https://github.com/rust-lang/rust/releases/tag/1.67.0> (includes 1.66.1
<https://github.com/rust-lang/rust/releases/tag/1.66.1>, 1.66.0
<https://github.com/rust-lang/rust/releases/tag/1.66.0>, 1.65.0
<https://github.com/rust-lang/rust/releases/tag/1.65.0>, 1.64.0
<https://github.com/rust-lang/rust/releases/tag/1.64.0>, 1.63.0
<https://github.com/rust-lang/rust/releases/tag/1.63.0>, 1.62.1
<https://github.com/rust-lang/rust/releases/tag/1.62.1>, 1.62.0
<https://github.com/rust-lang/rust/releases/tag/1.62.0>, 1.61.0
<https://github.com/rust-lang/rust/releases/tag/1.61.0>, 1.60.0
<https://github.com/rust-lang/rust/releases/tag/1.60.0>, 1.59.0
<https://github.com/rust-lang/rust/releases/tag/1.59.0>, 1.58.1
<https://github.com/rust-lang/rust/releases/tag/1.58.1>, 1.57.0
<https://github.com/rust-lang/rust/releases/tag/1.57.0>))
- SDK: sbsigntools (0.9.4
<https://git.kernel.org/pub/scm/linux/kernel/git/jejb/sbsigntools.git/tag/?h=v0.9.4>
)
- SDK: seabios (1.14.0 <https://seabios.org/Releases#SeaBIOS_1.14.0>)
- SDK: sgabios (0.1_pre10
<https://git.qemu.org/?p=sgabios.git;a=tree;h=a85446adb0e0>)
- SDK: squashfs-tools (4.5_p20210914
<https://lore.kernel.org/lkml/CAB3woddJss+ziGp-RjJ-yiax...@mail.gmail.com/>
)
- VMware: open-vm-tools (12.1.5
<https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.5>
(includes 12.1.0
<https://github.com/vmware/open-vm-tools/releases/tag/stable-12.1.0>,
12.0.5
<https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.5>,
12.0.0
<https://github.com/vmware/open-vm-tools/releases/tag/stable-12.0.0>))



Best,
The Flatcar Container Linux Maintainers

<https://hackmd.io/BdSKtBwYQRy2AFdw8y15Ag#Detailed-Security-Report>

Reply all
Reply to author
Forward
0 new messages