Groups keyboard shortcuts have been updated
Dismiss
See shortcuts

Announcing new releases Alpha 3745.0.0, Beta 3732.1.0, Stable 3602.2.0, LTS-2023 3510.3.0

24 views
Skip to first unread message

Flatcar Container Linux User

unread,
Oct 6, 2023, 5:45:19 AM10/6/23
to Flatcar Container Linux User


Hello,
We are pleased to announce a new Flatcar Container Linux release for the
Alpha, Beta, Stable, LTS-2023 channel.

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#New-Alpha-Release-374500>New
Alpha Release 3745.0.0

*Changes since Alpha 3732.0.0*
<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Security-fixes>Security fixes:

- Linux (CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>
)
- curl (CVE-2023-38039 <https://nvd.nist.gov/vuln/detail/CVE-2023-38039>)
- glibc (CVE-2023-4527 <https://nvd.nist.gov/vuln/detail/CVE-2023-4527>,
CVE-2023-4806 <https://nvd.nist.gov/vuln/detail/CVE-2023-4806>)
- lua (CVE-2022-33099 <https://nvd.nist.gov/vuln/detail/CVE-2022-33099>)
- mit-krb5 (CVE-2023-36054
<https://nvd.nist.gov/vuln/detail/CVE-2023-36054>)
- procps (CVE-2023-4016 <https://nvd.nist.gov/vuln/detail/CVE-2023-4016>)
- samba (CVE-2021-44142 <https://nvd.nist.gov/vuln/detail/CVE-2021-44142>
, CVE-2022-1615 <https://nvd.nist.gov/vuln/detail/CVE-2022-1615>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Bug-fixes>Bug fixes:

- Triggered re-reading of partition table to fix adding partitions to
the boot disk (scripts#1202
<https://github.com/flatcar/scripts/pull/1202>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Changes>Changes:

- Reworked the VMware OEM software to be shipped as A/B updated
systemd-sysext image
- Started shipping default ssh client and ssh daemon configs in
/etc/ssh/ssh_config and /etc/ssh/sshd_config which include config
snippets in /etc/ssh/ssh_config.d and /etc/ssh/sshd_config.d,
respectively.
- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)
- AWS: AWS OEM images now use a systemd-sysext image for layering
additional platform-specific software on top of /usr
- SDK: Experimental support for prefix builds
<https://github.com/flatcar/scripts/blob/main/PREFIX.md> to create
distro independent, portable, self-contained applications w/ all
dependencies included. With contributions from chewi
<https://github.com/chewi> and HappyTobi <https://github.com/HappyTobi>.
- VMware: The open-vm-tools package in VMware OEM now comes with
vmhgfs-fuse, udev rules, pam and vgauth

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Updates>Updates:

- Linux (6.1.55 <https://lwn.net/Articles/945379>)
- Linux Firmware (20230919
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230919>
)
- bind-tools (9.16.42
<https://bind9.readthedocs.io/en/v9.16.42/notes.html#notes-for-bind-9-16-42>
)
- checkpolicy (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- curl (8.3.0 <https://curl.se/changes.html#8_3_0>)
- gcc (13.2 <https://gcc.gnu.org/gcc-13/changes.html>)
- gzip (1.13 <https://savannah.gnu.org/news/?id=10501>)
- libgcrypt (1.10.2
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=c9a239615f8070427a96688b1be40a81e59e9b8a;hb=1c5cbacf3d88dded5063e959ee68678ff7d0fa56>
)
- libselinux (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- libsemanage (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- libsepol (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- lua (5.4.6 <https://www.lua.org/manual/5.4/readme.html#changes>)
- mit-krb5 (1.21.2 <http://web.mit.edu/kerberos/krb5-1.21/>)
- openssh (9.4p1 <https://www.openssh.com/releasenotes.html#9.4p1>)
- policycoreutils (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- procps (4.0.4 <https://gitlab.com/procps-ng/procps/-/releases/v4.0.4>
(includes 4.0.3 <https://gitlab.com/procps-ng/procps/-/releases/v4.0.3>
and 4.0.0 <https://gitlab.com/procps-ng/procps/-/releases/v4.0.0>))
- rpcsvc-proto (1.4.4
<https://github.com/thkukuk/rpcsvc-proto/releases/tag/v1.4.4>)
- samba (4.18.4
<https://wiki.samba.org/index.php/Samba_4.18_Features_added/changed#Samba_4.18.4>
)
- selinux-base (2.20221101
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101>
)
- selinux-base-policy (2.20221101
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101>
)
- selinux-container (2.20221101
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101>
)
- selinux-sssd (2.20221101
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101>
)
- selinux-unconfined (2.20221101
<https://github.com/SELinuxProject/refpolicy/releases/tag/RELEASE_2_20221101>
)
- semodule-utils (3.5
<https://github.com/SELinuxProject/selinux/releases/tag/3.5>)
- SDK: Rust (1.72.1
<https://github.com/rust-lang/rust/releases/tag/1.72.1>)
- VMWARE: libdnet (1.16.2
<https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16.2> (includes
1.16 <https://github.com/ofalk/libdnet/releases/tag/libdnet-1.16>))

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#New-Beta-Release-373210>New Beta
Release 3732.1.0

*Changes since Alpha 3732.0.0*
<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Security-fixes1>Security fixes:

- Linux (CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>
)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Bug-fixes1>Bug fixes:

- Triggered re-reading of partition table to fix adding partitions to
the boot disk (scripts#1202
<https://github.com/flatcar/scripts/pull/1202>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Changes1>Changes:

- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Updates1>Updates:

- Linux (6.1.55 <https://lwn.net/Articles/945379>)

Changes compared to Beta 3602.1.6
<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Security-fixes2>Security fixes:

- Linux (CVE-2020-36516 <https://nvd.nist.gov/vuln/detail/CVE-2020-36516>
,CVE-2021-26401 <https://nvd.nist.gov/vuln/detail/CVE-2021-26401>,
CVE-2021-33135 <https://nvd.nist.gov/vuln/detail/CVE-2021-33135>,
CVE-2021-33655 <https://nvd.nist.gov/vuln/detail/CVE-2021-33655>,
CVE-2021-3923 <https://nvd.nist.gov/vuln/detail/CVE-2021-3923>,
CVE-2021-4155 <https://nvd.nist.gov/vuln/detail/CVE-2021-4155>,
CVE-2021-4197 <https://nvd.nist.gov/vuln/detail/CVE-2021-4197>,
CVE-2021-43976 <https://nvd.nist.gov/vuln/detail/CVE-2021-43976>,
CVE-2021-44879 <https://nvd.nist.gov/vuln/detail/CVE-2021-44879>,
CVE-2021-45469 <https://nvd.nist.gov/vuln/detail/CVE-2021-45469>,
CVE-2022-0001 <https://nvd.nist.gov/vuln/detail/CVE-2022-0001>,
CVE-2022-0002 <https://nvd.nist.gov/vuln/detail/CVE-2022-0002>,
CVE-2022-0168 <https://nvd.nist.gov/vuln/detail/CVE-2022-0168>,
CVE-2022-0185 <https://nvd.nist.gov/vuln/detail/CVE-2022-0185>,
CVE-2022-0330 <https://nvd.nist.gov/vuln/detail/CVE-2022-0330>,
CVE-2022-0382 <https://nvd.nist.gov/vuln/detail/CVE-2022-0382>,
CVE-2022-0433 <https://nvd.nist.gov/vuln/detail/CVE-2022-0433>,
CVE-2022-0435 <https://nvd.nist.gov/vuln/detail/CVE-2022-0435>,
CVE-2022-0487 <https://nvd.nist.gov/vuln/detail/CVE-2022-0487>,
CVE-2022-0492 <https://nvd.nist.gov/vuln/detail/CVE-2022-0492>,
CVE-2022-0494 <https://nvd.nist.gov/vuln/detail/CVE-2022-0494>,
CVE-2022-0500 <https://nvd.nist.gov/vuln/detail/CVE-2022-0500>,
CVE-2022-0516 <https://nvd.nist.gov/vuln/detail/CVE-2022-0516>,
CVE-2022-0617 <https://nvd.nist.gov/vuln/detail/CVE-2022-0617>,
CVE-2022-0742 <https://nvd.nist.gov/vuln/detail/CVE-2022-0742>,
CVE-2022-0847 <https://nvd.nist.gov/vuln/detail/CVE-2022-0847>,
CVE-2022-0995 <https://nvd.nist.gov/vuln/detail/CVE-2022-0995>,
CVE-2022-1011 <https://nvd.nist.gov/vuln/detail/CVE-2022-1011>,
CVE-2022-1012 <https://nvd.nist.gov/vuln/detail/CVE-2022-1012>,
CVE-2022-1015 <https://nvd.nist.gov/vuln/detail/CVE-2022-1015>,
CVE-2022-1016 <https://nvd.nist.gov/vuln/detail/CVE-2022-1016>,
CVE-2022-1048 <https://nvd.nist.gov/vuln/detail/CVE-2022-1048>,
CVE-2022-1055 <https://nvd.nist.gov/vuln/detail/CVE-2022-1055>,
CVE-2022-1158 <https://nvd.nist.gov/vuln/detail/CVE-2022-1158>,
CVE-2022-1184 <https://nvd.nist.gov/vuln/detail/CVE-2022-1184>,
CVE-2022-1198 <https://nvd.nist.gov/vuln/detail/CVE-2022-1198>,
CVE-2022-1199 <https://nvd.nist.gov/vuln/detail/CVE-2022-1199>,
CVE-2022-1204 <https://nvd.nist.gov/vuln/detail/CVE-2022-1204>,
CVE-2022-1205 <https://nvd.nist.gov/vuln/detail/CVE-2022-1205>,
CVE-2022-1263 <https://nvd.nist.gov/vuln/detail/CVE-2022-1263>,
CVE-2022-1353 <https://nvd.nist.gov/vuln/detail/CVE-2022-1353>,
CVE-2022-1462 <https://nvd.nist.gov/vuln/detail/CVE-2022-1462>,
CVE-2022-1516 <https://nvd.nist.gov/vuln/detail/CVE-2022-1516>,
CVE-2022-1651 <https://nvd.nist.gov/vuln/detail/CVE-2022-1651>,
CVE-2022-1652 <https://nvd.nist.gov/vuln/detail/CVE-2022-1652>,
CVE-2022-1671 <https://nvd.nist.gov/vuln/detail/CVE-2022-1671>,
CVE-2022-1679 <https://nvd.nist.gov/vuln/detail/CVE-2022-1679>,
CVE-2022-1729 <https://nvd.nist.gov/vuln/detail/CVE-2022-1729>,
CVE-2022-1734 <https://nvd.nist.gov/vuln/detail/CVE-2022-1734>,
CVE-2022-1789 <https://nvd.nist.gov/vuln/detail/CVE-2022-1789>,
CVE-2022-1852 <https://nvd.nist.gov/vuln/detail/CVE-2022-1852>,
CVE-2022-1882 <https://nvd.nist.gov/vuln/detail/CVE-2022-1882>,
CVE-2022-1943 <https://nvd.nist.gov/vuln/detail/CVE-2022-1943>,
CVE-2022-1973 <https://nvd.nist.gov/vuln/detail/CVE-2022-1973>,
CVE-2022-1974 <https://nvd.nist.gov/vuln/detail/CVE-2022-1974>,
CVE-2022-1975 <https://nvd.nist.gov/vuln/detail/CVE-2022-1975>,
CVE-2022-1976 <https://nvd.nist.gov/vuln/detail/CVE-2022-1976>,
CVE-2022-1998 <https://nvd.nist.gov/vuln/detail/CVE-2022-1998>,
CVE-2022-20008 <https://nvd.nist.gov/vuln/detail/CVE-2022-20008>,
CVE-2022-20158 <https://nvd.nist.gov/vuln/detail/CVE-2022-20158>,
CVE-2022-20368 <https://nvd.nist.gov/vuln/detail/CVE-2022-20368>,
CVE-2022-20369 <https://nvd.nist.gov/vuln/detail/CVE-2022-20369>,
CVE-2022-20421 <https://nvd.nist.gov/vuln/detail/CVE-2022-20421>,
CVE-2022-20422 <https://nvd.nist.gov/vuln/detail/CVE-2022-20422>,
CVE-2022-20423 <https://nvd.nist.gov/vuln/detail/CVE-2022-20423>,
CVE-2022-20566 <https://nvd.nist.gov/vuln/detail/CVE-2022-20566>,
CVE-2022-20572 <https://nvd.nist.gov/vuln/detail/CVE-2022-20572>,
CVE-2022-2078 <https://nvd.nist.gov/vuln/detail/CVE-2022-2078>,
CVE-2022-21123 <https://nvd.nist.gov/vuln/detail/CVE-2022-21123>,
CVE-2022-21125 <https://nvd.nist.gov/vuln/detail/CVE-2022-21125>,
CVE-2022-21166 <https://nvd.nist.gov/vuln/detail/CVE-2022-21166>,
CVE-2022-21499 <https://nvd.nist.gov/vuln/detail/CVE-2022-21499>,
CVE-2022-21505 <https://nvd.nist.gov/vuln/detail/CVE-2022-21505>,
CVE-2022-2153 <https://nvd.nist.gov/vuln/detail/CVE-2022-2153>,
CVE-2022-2196 <https://nvd.nist.gov/vuln/detail/CVE-2022-2196>,
CVE-2022-22942 <https://nvd.nist.gov/vuln/detail/CVE-2022-22942>,
CVE-2022-23036 <https://nvd.nist.gov/vuln/detail/CVE-2022-23036>,
CVE-2022-23037 <https://nvd.nist.gov/vuln/detail/CVE-2022-23037>,
CVE-2022-23038 <https://nvd.nist.gov/vuln/detail/CVE-2022-23038>,
CVE-2022-23039 <https://nvd.nist.gov/vuln/detail/CVE-2022-23039>,
CVE-2022-23040 <https://nvd.nist.gov/vuln/detail/CVE-2022-23040>,
CVE-2022-23041 <https://nvd.nist.gov/vuln/detail/CVE-2022-23041>,
CVE-2022-23042 <https://nvd.nist.gov/vuln/detail/CVE-2022-23042>,
CVE-2022-2308 <https://nvd.nist.gov/vuln/detail/CVE-2022-2308>,
CVE-2022-2318 <https://nvd.nist.gov/vuln/detail/CVE-2022-2318>,
CVE-2022-23222 <https://nvd.nist.gov/vuln/detail/CVE-2022-23222>,
CVE-2022-2380 <https://nvd.nist.gov/vuln/detail/CVE-2022-2380>,
CVE-2022-23960 <https://nvd.nist.gov/vuln/detail/CVE-2022-23960>,
CVE-2022-24448 <https://nvd.nist.gov/vuln/detail/CVE-2022-24448>,
CVE-2022-24958 <https://nvd.nist.gov/vuln/detail/CVE-2022-24958>,
CVE-2022-24959 <https://nvd.nist.gov/vuln/detail/CVE-2022-24959>,
CVE-2022-2503 <https://nvd.nist.gov/vuln/detail/CVE-2022-2503>,
CVE-2022-25258 <https://nvd.nist.gov/vuln/detail/CVE-2022-25258>,
CVE-2022-25375 <https://nvd.nist.gov/vuln/detail/CVE-2022-25375>,
CVE-2022-25636 <https://nvd.nist.gov/vuln/detail/CVE-2022-25636>,
CVE-2022-2585 <https://nvd.nist.gov/vuln/detail/CVE-2022-2585>,
CVE-2022-2586 <https://nvd.nist.gov/vuln/detail/CVE-2022-2586>,
CVE-2022-2588 <https://nvd.nist.gov/vuln/detail/CVE-2022-2588>,
CVE-2022-2590 <https://nvd.nist.gov/vuln/detail/CVE-2022-2590>,
CVE-2022-2602 <https://nvd.nist.gov/vuln/detail/CVE-2022-2602>,
CVE-2022-26365 <https://nvd.nist.gov/vuln/detail/CVE-2022-26365>,
CVE-2022-26373 <https://nvd.nist.gov/vuln/detail/CVE-2022-26373>,
CVE-2022-2639 <https://nvd.nist.gov/vuln/detail/CVE-2022-2639>,
CVE-2022-26490 <https://nvd.nist.gov/vuln/detail/CVE-2022-26490>,
CVE-2022-2663 <https://nvd.nist.gov/vuln/detail/CVE-2022-2663>,
CVE-2022-26966 <https://nvd.nist.gov/vuln/detail/CVE-2022-26966>,
CVE-2022-27223 <https://nvd.nist.gov/vuln/detail/CVE-2022-27223>,
CVE-2022-27666 <https://nvd.nist.gov/vuln/detail/CVE-2022-27666>,
CVE-2022-27672 <https://nvd.nist.gov/vuln/detail/CVE-2022-27672>,
CVE-2022-2785 <https://nvd.nist.gov/vuln/detail/CVE-2022-2785>,
CVE-2022-27950 <https://nvd.nist.gov/vuln/detail/CVE-2022-27950>,
CVE-2022-28356 <https://nvd.nist.gov/vuln/detail/CVE-2022-28356>,
CVE-2022-28388 <https://nvd.nist.gov/vuln/detail/CVE-2022-28388>,
CVE-2022-28389 <https://nvd.nist.gov/vuln/detail/CVE-2022-28389>,
CVE-2022-28390 <https://nvd.nist.gov/vuln/detail/CVE-2022-28390>,
CVE-2022-2873 <https://nvd.nist.gov/vuln/detail/CVE-2022-2873>,
CVE-2022-28796 <https://nvd.nist.gov/vuln/detail/CVE-2022-28796>,
CVE-2022-28893 <https://nvd.nist.gov/vuln/detail/CVE-2022-28893>,
CVE-2022-2905 <https://nvd.nist.gov/vuln/detail/CVE-2022-2905>,
CVE-2022-29156 <https://nvd.nist.gov/vuln/detail/CVE-2022-29156>,
CVE-2022-2938 <https://nvd.nist.gov/vuln/detail/CVE-2022-2938>,
CVE-2022-29581 <https://nvd.nist.gov/vuln/detail/CVE-2022-29581>,
CVE-2022-29582 <https://nvd.nist.gov/vuln/detail/CVE-2022-29582>,
CVE-2022-2959 <https://nvd.nist.gov/vuln/detail/CVE-2022-2959>,
CVE-2022-2964 <https://nvd.nist.gov/vuln/detail/CVE-2022-2964>,
CVE-2022-2977 <https://nvd.nist.gov/vuln/detail/CVE-2022-2977>,
CVE-2022-2978 <https://nvd.nist.gov/vuln/detail/CVE-2022-2978>,
CVE-2022-29900 <https://nvd.nist.gov/vuln/detail/CVE-2022-29900>,
CVE-2022-29901 <https://nvd.nist.gov/vuln/detail/CVE-2022-29901>,
CVE-2022-29968 <https://nvd.nist.gov/vuln/detail/CVE-2022-29968>,
CVE-2022-3028 <https://nvd.nist.gov/vuln/detail/CVE-2022-3028>,
CVE-2022-30594 <https://nvd.nist.gov/vuln/detail/CVE-2022-30594>,
CVE-2022-3077 <https://nvd.nist.gov/vuln/detail/CVE-2022-3077>,
CVE-2022-3078 <https://nvd.nist.gov/vuln/detail/CVE-2022-3078>,
CVE-2022-3104 <https://nvd.nist.gov/vuln/detail/CVE-2022-3104>,
CVE-2022-3105 <https://nvd.nist.gov/vuln/detail/CVE-2022-3105>,
CVE-2022-3107 <https://nvd.nist.gov/vuln/detail/CVE-2022-3107>,
CVE-2022-3108 <https://nvd.nist.gov/vuln/detail/CVE-2022-3108>,
CVE-2022-3110 <https://nvd.nist.gov/vuln/detail/CVE-2022-3110>,
CVE-2022-3111 <https://nvd.nist.gov/vuln/detail/CVE-2022-3111>,
CVE-2022-3112 <https://nvd.nist.gov/vuln/detail/CVE-2022-3112>,
CVE-2022-3113 <https://nvd.nist.gov/vuln/detail/CVE-2022-3113>,
CVE-2022-3115 <https://nvd.nist.gov/vuln/detail/CVE-2022-3115>,
CVE-2022-3169 <https://nvd.nist.gov/vuln/detail/CVE-2022-3169>,
CVE-2022-3202 <https://nvd.nist.gov/vuln/detail/CVE-2022-3202>,
CVE-2022-32250 <https://nvd.nist.gov/vuln/detail/CVE-2022-32250>,
CVE-2022-32296 <https://nvd.nist.gov/vuln/detail/CVE-2022-32296>,
CVE-2022-3239 <https://nvd.nist.gov/vuln/detail/CVE-2022-3239>,
CVE-2022-32981 <https://nvd.nist.gov/vuln/detail/CVE-2022-32981>,
CVE-2022-3303 <https://nvd.nist.gov/vuln/detail/CVE-2022-3303>,
CVE-2022-3344 <https://nvd.nist.gov/vuln/detail/CVE-2022-3344>,
CVE-2022-33740 <https://nvd.nist.gov/vuln/detail/CVE-2022-33740>,
CVE-2022-33741 <https://nvd.nist.gov/vuln/detail/CVE-2022-33741>,
CVE-2022-33742 <https://nvd.nist.gov/vuln/detail/CVE-2022-33742>,
CVE-2022-33743 <https://nvd.nist.gov/vuln/detail/CVE-2022-33743>,
CVE-2022-33744 <https://nvd.nist.gov/vuln/detail/CVE-2022-33744>,
CVE-2022-33981 <https://nvd.nist.gov/vuln/detail/CVE-2022-33981>,
CVE-2022-3424 <https://nvd.nist.gov/vuln/detail/CVE-2022-3424>,
CVE-2022-3435 <https://nvd.nist.gov/vuln/detail/CVE-2022-3435>,
CVE-2022-34494 <https://nvd.nist.gov/vuln/detail/CVE-2022-34494>,
CVE-2022-34495 <https://nvd.nist.gov/vuln/detail/CVE-2022-34495>,
CVE-2022-34918 <https://nvd.nist.gov/vuln/detail/CVE-2022-34918>,
CVE-2022-3521 <https://nvd.nist.gov/vuln/detail/CVE-2022-3521>,
CVE-2022-3524 <https://nvd.nist.gov/vuln/detail/CVE-2022-3524>,
CVE-2022-3526 <https://nvd.nist.gov/vuln/detail/CVE-2022-3526>,
CVE-2022-3534 <https://nvd.nist.gov/vuln/detail/CVE-2022-3534>,
CVE-2022-3541 <https://nvd.nist.gov/vuln/detail/CVE-2022-3541>,
CVE-2022-3543 <https://nvd.nist.gov/vuln/detail/CVE-2022-3543>,
CVE-2022-3564 <https://nvd.nist.gov/vuln/detail/CVE-2022-3564>,
CVE-2022-3565 <https://nvd.nist.gov/vuln/detail/CVE-2022-3565>,
CVE-2022-3577 <https://nvd.nist.gov/vuln/detail/CVE-2022-3577>,
CVE-2022-3586 <https://nvd.nist.gov/vuln/detail/CVE-2022-3586>,
CVE-2022-3594 <https://nvd.nist.gov/vuln/detail/CVE-2022-3594>,
CVE-2022-3595 <https://nvd.nist.gov/vuln/detail/CVE-2022-3595>,
CVE-2022-36123 <https://nvd.nist.gov/vuln/detail/CVE-2022-36123>,
CVE-2022-3619 <https://nvd.nist.gov/vuln/detail/CVE-2022-3619>,
CVE-2022-3621 <https://nvd.nist.gov/vuln/detail/CVE-2022-3621>,
CVE-2022-3623 <https://nvd.nist.gov/vuln/detail/CVE-2022-3623>,
CVE-2022-3625 <https://nvd.nist.gov/vuln/detail/CVE-2022-3625>,
CVE-2022-3628 <https://nvd.nist.gov/vuln/detail/CVE-2022-3628>,
CVE-2022-36280 <https://nvd.nist.gov/vuln/detail/CVE-2022-36280>,
CVE-2022-3635 <https://nvd.nist.gov/vuln/detail/CVE-2022-3635>,
CVE-2022-3640 <https://nvd.nist.gov/vuln/detail/CVE-2022-3640>,
CVE-2022-3643 <https://nvd.nist.gov/vuln/detail/CVE-2022-3643>,
CVE-2022-3646 <https://nvd.nist.gov/vuln/detail/CVE-2022-3646>,
CVE-2022-3649 <https://nvd.nist.gov/vuln/detail/CVE-2022-3649>,
CVE-2022-36879 <https://nvd.nist.gov/vuln/detail/CVE-2022-36879>,
CVE-2022-36946 <https://nvd.nist.gov/vuln/detail/CVE-2022-36946>,
CVE-2022-3707 <https://nvd.nist.gov/vuln/detail/CVE-2022-3707>,
CVE-2022-38457 <https://nvd.nist.gov/vuln/detail/CVE-2022-38457>,
CVE-2022-3910 <https://nvd.nist.gov/vuln/detail/CVE-2022-3910>,
CVE-2022-39189 <https://nvd.nist.gov/vuln/detail/CVE-2022-39189>,
CVE-2022-39190 <https://nvd.nist.gov/vuln/detail/CVE-2022-39190>,
CVE-2022-3977 <https://nvd.nist.gov/vuln/detail/CVE-2022-3977>,
CVE-2022-40133 <https://nvd.nist.gov/vuln/detail/CVE-2022-40133>,
CVE-2022-40307 <https://nvd.nist.gov/vuln/detail/CVE-2022-40307>,
CVE-2022-40768 <https://nvd.nist.gov/vuln/detail/CVE-2022-40768>,
CVE-2022-4095 <https://nvd.nist.gov/vuln/detail/CVE-2022-4095>,
CVE-2022-40982 <https://nvd.nist.gov/vuln/detail/CVE-2022-40982>,
CVE-2022-41218 <https://nvd.nist.gov/vuln/detail/CVE-2022-41218>,
CVE-2022-4128 <https://nvd.nist.gov/vuln/detail/CVE-2022-4128>,
CVE-2022-4139 <https://nvd.nist.gov/vuln/detail/CVE-2022-4139>,
CVE-2022-41674 <https://nvd.nist.gov/vuln/detail/CVE-2022-41674>,
CVE-2022-41849 <https://nvd.nist.gov/vuln/detail/CVE-2022-41849>,
CVE-2022-41850 <https://nvd.nist.gov/vuln/detail/CVE-2022-41850>,
CVE-2022-41858 <https://nvd.nist.gov/vuln/detail/CVE-2022-41858>,
CVE-2022-42328 <https://nvd.nist.gov/vuln/detail/CVE-2022-42328>,
CVE-2022-42329 <https://nvd.nist.gov/vuln/detail/CVE-2022-42329>,
CVE-2022-42432 <https://nvd.nist.gov/vuln/detail/CVE-2022-42432>,
CVE-2022-4269 <https://nvd.nist.gov/vuln/detail/CVE-2022-4269>,
CVE-2022-42703 <https://nvd.nist.gov/vuln/detail/CVE-2022-42703>,
CVE-2022-42719 <https://nvd.nist.gov/vuln/detail/CVE-2022-42719>,
CVE-2022-42720 <https://nvd.nist.gov/vuln/detail/CVE-2022-42720>,
CVE-2022-42721 <https://nvd.nist.gov/vuln/detail/CVE-2022-42721>,
CVE-2022-42722 <https://nvd.nist.gov/vuln/detail/CVE-2022-42722>,
CVE-2022-42895 <https://nvd.nist.gov/vuln/detail/CVE-2022-42895>,
CVE-2022-42896 <https://nvd.nist.gov/vuln/detail/CVE-2022-42896>,
CVE-2022-43750 <https://nvd.nist.gov/vuln/detail/CVE-2022-43750>,
CVE-2022-4378 <https://nvd.nist.gov/vuln/detail/CVE-2022-4378>,
CVE-2022-4379 <https://nvd.nist.gov/vuln/detail/CVE-2022-4379>,
CVE-2022-4382 <https://nvd.nist.gov/vuln/detail/CVE-2022-4382>,
CVE-2022-43945 <https://nvd.nist.gov/vuln/detail/CVE-2022-43945>,
CVE-2022-45869 <https://nvd.nist.gov/vuln/detail/CVE-2022-45869>,
CVE-2022-45886 <https://nvd.nist.gov/vuln/detail/CVE-2022-45886>,
CVE-2022-45887 <https://nvd.nist.gov/vuln/detail/CVE-2022-45887>,
CVE-2022-45919 <https://nvd.nist.gov/vuln/detail/CVE-2022-45919>,
CVE-2022-45934 <https://nvd.nist.gov/vuln/detail/CVE-2022-45934>,
CVE-2022-4662 <https://nvd.nist.gov/vuln/detail/CVE-2022-4662>,
CVE-2022-47518 <https://nvd.nist.gov/vuln/detail/CVE-2022-47518>,
CVE-2022-47519 <https://nvd.nist.gov/vuln/detail/CVE-2022-47519>,
CVE-2022-47520 <https://nvd.nist.gov/vuln/detail/CVE-2022-47520>,
CVE-2022-47521 <https://nvd.nist.gov/vuln/detail/CVE-2022-47521>,
CVE-2022-47929 <https://nvd.nist.gov/vuln/detail/CVE-2022-47929>,
CVE-2022-47938 <https://nvd.nist.gov/vuln/detail/CVE-2022-47938>,
CVE-2022-47939 <https://nvd.nist.gov/vuln/detail/CVE-2022-47939>,
CVE-2022-47940 <https://nvd.nist.gov/vuln/detail/CVE-2022-47940>,
CVE-2022-47941 <https://nvd.nist.gov/vuln/detail/CVE-2022-47941>,
CVE-2022-47942 <https://nvd.nist.gov/vuln/detail/CVE-2022-47942>,
CVE-2022-47943 <https://nvd.nist.gov/vuln/detail/CVE-2022-47943>,
CVE-2022-4842 <https://nvd.nist.gov/vuln/detail/CVE-2022-4842>,
CVE-2022-48423 <https://nvd.nist.gov/vuln/detail/CVE-2022-48423>,
CVE-2022-48424 <https://nvd.nist.gov/vuln/detail/CVE-2022-48424>,
CVE-2022-48425 <https://nvd.nist.gov/vuln/detail/CVE-2022-48425>,
CVE-2022-48502 <https://nvd.nist.gov/vuln/detail/CVE-2022-48502>,
CVE-2023-0045 <https://nvd.nist.gov/vuln/detail/CVE-2023-0045>,
CVE-2023-0160 <https://nvd.nist.gov/vuln/detail/CVE-2023-0160>,
CVE-2023-0179 <https://nvd.nist.gov/vuln/detail/CVE-2023-0179>,
CVE-2023-0210 <https://nvd.nist.gov/vuln/detail/CVE-2023-0210>,
CVE-2023-0266 <https://nvd.nist.gov/vuln/detail/CVE-2023-0266>,
CVE-2023-0386 <https://nvd.nist.gov/vuln/detail/CVE-2023-0386>,
CVE-2023-0394 <https://nvd.nist.gov/vuln/detail/CVE-2023-0394>,
CVE-2023-0458 <https://nvd.nist.gov/vuln/detail/CVE-2023-0458>,
CVE-2023-0459 <https://nvd.nist.gov/vuln/detail/CVE-2023-0459>,
CVE-2023-0461 <https://nvd.nist.gov/vuln/detail/CVE-2023-0461>,
CVE-2023-0468 <https://nvd.nist.gov/vuln/detail/CVE-2023-0468>,
CVE-2023-0469 <https://nvd.nist.gov/vuln/detail/CVE-2023-0469>,
CVE-2023-0590 <https://nvd.nist.gov/vuln/detail/CVE-2023-0590>,
CVE-2023-0615 <https://nvd.nist.gov/vuln/detail/CVE-2023-0615>,
CVE-2023-1032 <https://nvd.nist.gov/vuln/detail/CVE-2023-1032>,
CVE-2023-1073 <https://nvd.nist.gov/vuln/detail/CVE-2023-1073>,
CVE-2023-1074 <https://nvd.nist.gov/vuln/detail/CVE-2023-1074>,
CVE-2023-1075 <https://nvd.nist.gov/vuln/detail/CVE-2023-1075>,
CVE-2023-1076 <https://nvd.nist.gov/vuln/detail/CVE-2023-1076>,
CVE-2023-1077 <https://nvd.nist.gov/vuln/detail/CVE-2023-1077>,
CVE-2023-1078 <https://nvd.nist.gov/vuln/detail/CVE-2023-1078>,
CVE-2023-1079 <https://nvd.nist.gov/vuln/detail/CVE-2023-1079>,
CVE-2023-1095 <https://nvd.nist.gov/vuln/detail/CVE-2023-1095>,
CVE-2023-1118 <https://nvd.nist.gov/vuln/detail/CVE-2023-1118>,
CVE-2023-1192 <https://nvd.nist.gov/vuln/detail/CVE-2023-1192>,
CVE-2023-1194 <https://nvd.nist.gov/vuln/detail/CVE-2023-1194>,
CVE-2023-1206 <https://nvd.nist.gov/vuln/detail/CVE-2023-1206>,
CVE-2023-1249 <https://nvd.nist.gov/vuln/detail/CVE-2023-1249>,
CVE-2023-1281 <https://nvd.nist.gov/vuln/detail/CVE-2023-1281>,
CVE-2023-1380 <https://nvd.nist.gov/vuln/detail/CVE-2023-1380>,
CVE-2023-1382 <https://nvd.nist.gov/vuln/detail/CVE-2023-1382>,
CVE-2023-1513 <https://nvd.nist.gov/vuln/detail/CVE-2023-1513>,
CVE-2023-1582 <https://nvd.nist.gov/vuln/detail/CVE-2023-1582>,
CVE-2023-1583 <https://nvd.nist.gov/vuln/detail/CVE-2023-1583>,
CVE-2023-1611 <https://nvd.nist.gov/vuln/detail/CVE-2023-1611>,
CVE-2023-1637 <https://nvd.nist.gov/vuln/detail/CVE-2023-1637>,
CVE-2023-1652 <https://nvd.nist.gov/vuln/detail/CVE-2023-1652>,
CVE-2023-1670 <https://nvd.nist.gov/vuln/detail/CVE-2023-1670>,
CVE-2023-1829 <https://nvd.nist.gov/vuln/detail/CVE-2023-1829>,
CVE-2023-1838 <https://nvd.nist.gov/vuln/detail/CVE-2023-1838>,
CVE-2023-1855 <https://nvd.nist.gov/vuln/detail/CVE-2023-1855>,
CVE-2023-1859 <https://nvd.nist.gov/vuln/detail/CVE-2023-1859>,
CVE-2023-1872 <https://nvd.nist.gov/vuln/detail/CVE-2023-1872>,
CVE-2023-1989 <https://nvd.nist.gov/vuln/detail/CVE-2023-1989>,
CVE-2023-1990 <https://nvd.nist.gov/vuln/detail/CVE-2023-1990>,
CVE-2023-1998 <https://nvd.nist.gov/vuln/detail/CVE-2023-1998>,
CVE-2023-2002 <https://nvd.nist.gov/vuln/detail/CVE-2023-2002>,
CVE-2023-2006 <https://nvd.nist.gov/vuln/detail/CVE-2023-2006>,
CVE-2023-2008 <https://nvd.nist.gov/vuln/detail/CVE-2023-2008>,
CVE-2023-2019 <https://nvd.nist.gov/vuln/detail/CVE-2023-2019>,
CVE-2023-20569 <https://nvd.nist.gov/vuln/detail/CVE-2023-20569>,
CVE-2023-20588 <https://nvd.nist.gov/vuln/detail/CVE-2023-20588>,
CVE-2023-20593 <https://nvd.nist.gov/vuln/detail/CVE-2023-20593>,
CVE-2023-20928 <https://nvd.nist.gov/vuln/detail/CVE-2023-20928>,
CVE-2023-20938 <https://nvd.nist.gov/vuln/detail/CVE-2023-20938>,
CVE-2023-21102 <https://nvd.nist.gov/vuln/detail/CVE-2023-21102>,
CVE-2023-21106 <https://nvd.nist.gov/vuln/detail/CVE-2023-21106>,
CVE-2023-2124 <https://nvd.nist.gov/vuln/detail/CVE-2023-2124>,
CVE-2023-21255 <https://nvd.nist.gov/vuln/detail/CVE-2023-21255>,
CVE-2023-2156 <https://nvd.nist.gov/vuln/detail/CVE-2023-2156>,
CVE-2023-2162 <https://nvd.nist.gov/vuln/detail/CVE-2023-2162>,
CVE-2023-2163 <https://nvd.nist.gov/vuln/detail/CVE-2023-2163>,
CVE-2023-2166 <https://nvd.nist.gov/vuln/detail/CVE-2023-2166>,
CVE-2023-2177 <https://nvd.nist.gov/vuln/detail/CVE-2023-2177>,
CVE-2023-2194 <https://nvd.nist.gov/vuln/detail/CVE-2023-2194>,
CVE-2023-2235 <https://nvd.nist.gov/vuln/detail/CVE-2023-2235>,
CVE-2023-2236 <https://nvd.nist.gov/vuln/detail/CVE-2023-2236>,
CVE-2023-2269 <https://nvd.nist.gov/vuln/detail/CVE-2023-2269>,
CVE-2023-22996 <https://nvd.nist.gov/vuln/detail/CVE-2023-22996>,
CVE-2023-22997 <https://nvd.nist.gov/vuln/detail/CVE-2023-22997>,
CVE-2023-22998 <https://nvd.nist.gov/vuln/detail/CVE-2023-22998>,
CVE-2023-22999 <https://nvd.nist.gov/vuln/detail/CVE-2023-22999>,
CVE-2023-23001 <https://nvd.nist.gov/vuln/detail/CVE-2023-23001>,
CVE-2023-23002 <https://nvd.nist.gov/vuln/detail/CVE-2023-23002>,
CVE-2023-23454 <https://nvd.nist.gov/vuln/detail/CVE-2023-23454>,
CVE-2023-23455 <https://nvd.nist.gov/vuln/detail/CVE-2023-23455>,
CVE-2023-23559 <https://nvd.nist.gov/vuln/detail/CVE-2023-23559>,
CVE-2023-2430 <https://nvd.nist.gov/vuln/detail/CVE-2023-2430>,
CVE-2023-25012 <https://nvd.nist.gov/vuln/detail/CVE-2023-25012>,
CVE-2023-2513 <https://nvd.nist.gov/vuln/detail/CVE-2023-2513>,
CVE-2023-25775 <https://nvd.nist.gov/vuln/detail/CVE-2023-25775>,
CVE-2023-26544 <https://nvd.nist.gov/vuln/detail/CVE-2023-26544>,
CVE-2023-26545 <https://nvd.nist.gov/vuln/detail/CVE-2023-26545>,
CVE-2023-26606 <https://nvd.nist.gov/vuln/detail/CVE-2023-26606>,
CVE-2023-26607 <https://nvd.nist.gov/vuln/detail/CVE-2023-26607>,
CVE-2023-28327 <https://nvd.nist.gov/vuln/detail/CVE-2023-28327>,
CVE-2023-28328 <https://nvd.nist.gov/vuln/detail/CVE-2023-28328>,
CVE-2023-28410 <https://nvd.nist.gov/vuln/detail/CVE-2023-28410>,
CVE-2023-28466 <https://nvd.nist.gov/vuln/detail/CVE-2023-28466>,
CVE-2023-28866 <https://nvd.nist.gov/vuln/detail/CVE-2023-28866>,
CVE-2023-2898 <https://nvd.nist.gov/vuln/detail/CVE-2023-2898>,
CVE-2023-2985 <https://nvd.nist.gov/vuln/detail/CVE-2023-2985>,
CVE-2023-3006 <https://nvd.nist.gov/vuln/detail/CVE-2023-3006>,
CVE-2023-30456 <https://nvd.nist.gov/vuln/detail/CVE-2023-30456>,
CVE-2023-30772 <https://nvd.nist.gov/vuln/detail/CVE-2023-30772>,
CVE-2023-3090 <https://nvd.nist.gov/vuln/detail/CVE-2023-3090>,
CVE-2023-3111 <https://nvd.nist.gov/vuln/detail/CVE-2023-3111>,
CVE-2023-31248 <https://nvd.nist.gov/vuln/detail/CVE-2023-31248>,
CVE-2023-3141 <https://nvd.nist.gov/vuln/detail/CVE-2023-3141>,
CVE-2023-31436 <https://nvd.nist.gov/vuln/detail/CVE-2023-31436>,
CVE-2023-3159 <https://nvd.nist.gov/vuln/detail/CVE-2023-3159>,
CVE-2023-3161 <https://nvd.nist.gov/vuln/detail/CVE-2023-3161>,
CVE-2023-3212 <https://nvd.nist.gov/vuln/detail/CVE-2023-3212>,
CVE-2023-3220 <https://nvd.nist.gov/vuln/detail/CVE-2023-3220>,
CVE-2023-32233 <https://nvd.nist.gov/vuln/detail/CVE-2023-32233>,
CVE-2023-32247 <https://nvd.nist.gov/vuln/detail/CVE-2023-32247>,
CVE-2023-32248 <https://nvd.nist.gov/vuln/detail/CVE-2023-32248>,
CVE-2023-32250 <https://nvd.nist.gov/vuln/detail/CVE-2023-32250>,
CVE-2023-32252 <https://nvd.nist.gov/vuln/detail/CVE-2023-32252>,
CVE-2023-32254 <https://nvd.nist.gov/vuln/detail/CVE-2023-32254>,
CVE-2023-32257 <https://nvd.nist.gov/vuln/detail/CVE-2023-32257>,
CVE-2023-32258 <https://nvd.nist.gov/vuln/detail/CVE-2023-32258>,
CVE-2023-32269 <https://nvd.nist.gov/vuln/detail/CVE-2023-32269>,
CVE-2023-3268 <https://nvd.nist.gov/vuln/detail/CVE-2023-3268>,
CVE-2023-3269 <https://nvd.nist.gov/vuln/detail/CVE-2023-3269>,
CVE-2023-33203 <https://nvd.nist.gov/vuln/detail/CVE-2023-33203>,
CVE-2023-33288 <https://nvd.nist.gov/vuln/detail/CVE-2023-33288>,
CVE-2023-3355 <https://nvd.nist.gov/vuln/detail/CVE-2023-3355>,
CVE-2023-3357 <https://nvd.nist.gov/vuln/detail/CVE-2023-3357>,
CVE-2023-3358 <https://nvd.nist.gov/vuln/detail/CVE-2023-3358>,
CVE-2023-3359 <https://nvd.nist.gov/vuln/detail/CVE-2023-3359>,
CVE-2023-3390 <https://nvd.nist.gov/vuln/detail/CVE-2023-3390>,
CVE-2023-33951 <https://nvd.nist.gov/vuln/detail/CVE-2023-33951>,
CVE-2023-33952 <https://nvd.nist.gov/vuln/detail/CVE-2023-33952>,
CVE-2023-34319 <https://nvd.nist.gov/vuln/detail/CVE-2023-34319>,
CVE-2023-3439 <https://nvd.nist.gov/vuln/detail/CVE-2023-3439>,
CVE-2023-35001 <https://nvd.nist.gov/vuln/detail/CVE-2023-35001>,
CVE-2023-3567 <https://nvd.nist.gov/vuln/detail/CVE-2023-3567>,
CVE-2023-35788 <https://nvd.nist.gov/vuln/detail/CVE-2023-35788>,
CVE-2023-35823 <https://nvd.nist.gov/vuln/detail/CVE-2023-35823>,
CVE-2023-35824 <https://nvd.nist.gov/vuln/detail/CVE-2023-35824>,
CVE-2023-35826 <https://nvd.nist.gov/vuln/detail/CVE-2023-35826>,
CVE-2023-35828 <https://nvd.nist.gov/vuln/detail/CVE-2023-35828>,
CVE-2023-35829 <https://nvd.nist.gov/vuln/detail/CVE-2023-35829>,
CVE-2023-3609 <https://nvd.nist.gov/vuln/detail/CVE-2023-3609>,
CVE-2023-3610 <https://nvd.nist.gov/vuln/detail/CVE-2023-3610>,
CVE-2023-3611 <https://nvd.nist.gov/vuln/detail/CVE-2023-3611>,
CVE-2023-3772 <https://nvd.nist.gov/vuln/detail/CVE-2023-3772>,
CVE-2023-3773 <https://nvd.nist.gov/vuln/detail/CVE-2023-3773>,
CVE-2023-3776 <https://nvd.nist.gov/vuln/detail/CVE-2023-3776>,
CVE-2023-3777 <https://nvd.nist.gov/vuln/detail/CVE-2023-3777>,
CVE-2023-3812 <https://nvd.nist.gov/vuln/detail/CVE-2023-3812>,
CVE-2023-38409 <https://nvd.nist.gov/vuln/detail/CVE-2023-38409>,
CVE-2023-38426 <https://nvd.nist.gov/vuln/detail/CVE-2023-38426>,
CVE-2023-38427 <https://nvd.nist.gov/vuln/detail/CVE-2023-38427>,
CVE-2023-38428 <https://nvd.nist.gov/vuln/detail/CVE-2023-38428>,
CVE-2023-38429 <https://nvd.nist.gov/vuln/detail/CVE-2023-38429>,
CVE-2023-38430 <https://nvd.nist.gov/vuln/detail/CVE-2023-38430>,
CVE-2023-38431 <https://nvd.nist.gov/vuln/detail/CVE-2023-38431>,
CVE-2023-38432 <https://nvd.nist.gov/vuln/detail/CVE-2023-38432>,
CVE-2023-3863 <https://nvd.nist.gov/vuln/detail/CVE-2023-3863>,
CVE-2023-3865 <https://nvd.nist.gov/vuln/detail/CVE-2023-3865>,
CVE-2023-3866 <https://nvd.nist.gov/vuln/detail/CVE-2023-3866>,
CVE-2023-3867 <https://nvd.nist.gov/vuln/detail/CVE-2023-3867>,
CVE-2023-4004 <https://nvd.nist.gov/vuln/detail/CVE-2023-4004>,
CVE-2023-4015 <https://nvd.nist.gov/vuln/detail/CVE-2023-4015>,
CVE-2023-40283 <https://nvd.nist.gov/vuln/detail/CVE-2023-40283>,
CVE-2023-4128 <https://nvd.nist.gov/vuln/detail/CVE-2023-4128>,
CVE-2023-4132 <https://nvd.nist.gov/vuln/detail/CVE-2023-4132>,
CVE-2023-4147 <https://nvd.nist.gov/vuln/detail/CVE-2023-4147>,
CVE-2023-4155 <https://nvd.nist.gov/vuln/detail/CVE-2023-4155>,
CVE-2023-4206 <https://nvd.nist.gov/vuln/detail/CVE-2023-4206>,
CVE-2023-4207 <https://nvd.nist.gov/vuln/detail/CVE-2023-4207>,
CVE-2023-4208 <https://nvd.nist.gov/vuln/detail/CVE-2023-4208>,
CVE-2023-4273 <https://nvd.nist.gov/vuln/detail/CVE-2023-4273>,
CVE-2023-42752 <https://nvd.nist.gov/vuln/detail/CVE-2023-42752>,
CVE-2023-42753 <https://nvd.nist.gov/vuln/detail/CVE-2023-42753>,
CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>,
CVE-2023-4385 <https://nvd.nist.gov/vuln/detail/CVE-2023-4385>,
CVE-2023-4387 <https://nvd.nist.gov/vuln/detail/CVE-2023-4387>,
CVE-2023-4389 <https://nvd.nist.gov/vuln/detail/CVE-2023-4389>,
CVE-2023-4394 <https://nvd.nist.gov/vuln/detail/CVE-2023-4394>,
CVE-2023-4459 <https://nvd.nist.gov/vuln/detail/CVE-2023-4459>,
CVE-2023-4569 <https://nvd.nist.gov/vuln/detail/CVE-2023-4569>,
CVE-2023-4623 <https://nvd.nist.gov/vuln/detail/CVE-2023-4623>,
CVE-2023-4921 <https://nvd.nist.gov/vuln/detail/CVE-2023-4921>,
CVE-2022-40982 <https://nvd.nist.gov/vuln/detail/CVE-2022-40982>,
CVE-2022-41804 <https://nvd.nist.gov/vuln/detail/CVE-2022-41804>,
CVE-2023-20569 <https://nvd.nist.gov/vuln/detail/CVE-2023-20569>,
CVE-2023-23908 <https://nvd.nist.gov/vuln/detail/CVE-2023-23908>)
- Go (CVE-2023-29402 <https://nvd.nist.gov/vuln/detail/CVE-2023-29402>,
CVE-2023-29403 <https://nvd.nist.gov/vuln/detail/CVE-2023-29403>,
CVE-2023-29404 <https://nvd.nist.gov/vuln/detail/CVE-2023-29404>,
CVE-2023-29405 <https://nvd.nist.gov/vuln/detail/CVE-2023-29405>,
CVE-2023-29406 <https://nvd.nist.gov/vuln/detail/CVE-2023-29406>,
CVE-2023-29409 <https://nvd.nist.gov/vuln/detail/CVE-2023-29409>,
CVE-2023-39318 <https://nvd.nist.gov/vuln/detail/CVE-2023-39318>,
CVE-2023-39319 <https://nvd.nist.gov/vuln/detail/CVE-2023-39319>,
CVE-2023-39320 <https://nvd.nist.gov/vuln/detail/CVE-2023-39320>,
CVE-2023-39321 <https://nvd.nist.gov/vuln/detail/CVE-2023-39321>,
CVE-2023-39322 <https://nvd.nist.gov/vuln/detail/CVE-2023-39322>)
- binutils (CVE-2022-38533
<https://nvd.nist.gov/vuln/detail/CVE-2022-38533>, CVE-2022-4285
<https://nvd.nist.gov/vuln/detail/CVE-2022-4285>, CVE-2023-1579
<https://nvd.nist.gov/vuln/detail/CVE-2023-1579>)
- c-ares (CVE-2023-31124
<https://nvd.nist.gov/vuln/detail/CVE-2023-31124>, CVE-2023-31130
<https://nvd.nist.gov/vuln/detail/CVE-2023-31130>, CVE-2023-31147
<https://nvd.nist.gov/vuln/detail/CVE-2023-31147>, CVE-2023-32067
<https://nvd.nist.gov/vuln/detail/CVE-2023-32067>)
- curl (CVE-2023-28319 <https://nvd.nist.gov/vuln/detail/CVE-2023-28319>
, CVE-2023-28320 <https://nvd.nist.gov/vuln/detail/CVE-2023-28320>,
CVE-2023-28321 <https://nvd.nist.gov/vuln/detail/CVE-2023-28321>,
CVE-2023-28322 <https://nvd.nist.gov/vuln/detail/CVE-2023-28322>)
- git (CVE-2023-25652 <https://nvd.nist.gov/vuln/detail/CVE-2023-25652>,
CVE-2023-25815 <https://nvd.nist.gov/vuln/detail/CVE-2023-25815>,
CVE-2023-29007 <https://nvd.nist.gov/vuln/detail/CVE-2023-29007>)
- grub (CVE-2020-10713 <https://nvd.nist.gov/vuln/detail/CVE-2020-10713>
, CVE-2020-14372 <https://nvd.nist.gov/vuln/detail/CVE-2020-14372>,
CVE-2020-25632 <https://nvd.nist.gov/vuln/detail/CVE-2020-25632>,
CVE-2020-25647 <https://nvd.nist.gov/vuln/detail/CVE-2020-25647>,
CVE-2020-27749 <https://nvd.nist.gov/vuln/detail/CVE-2020-27749>,
CVE-2020-27779 <https://nvd.nist.gov/vuln/detail/CVE-2020-27779>,
CVE-2021-20225 <https://nvd.nist.gov/vuln/detail/CVE-2021-20225>,
CVE-2021-20233 <https://nvd.nist.gov/vuln/detail/CVE-2021-20233>,
CVE-2021-3981 <https://nvd.nist.gov/vuln/detail/CVE-2021-3981>,
CVE-2021-3695 <https://nvd.nist.gov/vuln/detail/CVE-2021-3695>,
CVE-2021-3696 <https://nvd.nist.gov/vuln/detail/CVE-2021-3696>,
CVE-2021-3697 <https://nvd.nist.gov/vuln/detail/CVE-2021-3697>,
CVE-2022-28733 <https://nvd.nist.gov/vuln/detail/CVE-2022-28733>,
CVE-2022-28734 <https://nvd.nist.gov/vuln/detail/CVE-2022-28734>,
CVE-2022-28735 <https://nvd.nist.gov/vuln/detail/CVE-2022-28735>,
CVE-2022-28736 <https://nvd.nist.gov/vuln/detail/CVE-2022-28736>,
CVE-2022-28737 <https://nvd.nist.gov/vuln/detail/CVE-2022-28737>,
CVE-2022-2601 <https://nvd.nist.gov/vuln/detail/CVE-2022-2601>,
CVE-2022-3775 <https://nvd.nist.gov/vuln/detail/CVE-2022-3775>)
- intel-microcode (CVE-2022-40982
<https://nvd.nist.gov/vuln/detail/CVE-2022-40982>, CVE-2022-41804
<https://nvd.nist.gov/vuln/detail/CVE-2022-41804>, CVE-2023-23908
<https://nvd.nist.gov/vuln/detail/CVE-2023-23908>)
- libarchive (libarchive-20230729
<https://github.com/libarchive/libarchive/releases/tag/v3.7.1>)
- libcap (CVE-2023-2602 <https://nvd.nist.gov/vuln/detail/CVE-2023-2602>
, CVE-2023-2603 <https://nvd.nist.gov/vuln/detail/CVE-2023-2603>)
- libmicrohttpd (CVE-2023-27371
<https://nvd.nist.gov/vuln/detail/CVE-2023-27371>)
- libxml2 (libxml2-20230428
<https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4>)
- ncurses (CVE-2023-29491
<https://nvd.nist.gov/vuln/detail/CVE-2023-29491>)
- nvidia-drivers (CVE-2023-25515
<https://nvd.nist.gov/vuln/detail/CVE-2023-25515>, CVE-2023-25516
<https://nvd.nist.gov/vuln/detail/CVE-2023-25516>)
- openldap (CVE-2023-2953
<https://nvd.nist.gov/vuln/detail/CVE-2023-2953>)
- OpenSSL (CVE-2023-2650 <https://nvd.nist.gov/vuln/detail/CVE-2023-2650>
, CVE-2023-2975 <https://nvd.nist.gov/vuln/detail/CVE-2023-2975>,
CVE-2023-3446 <https://nvd.nist.gov/vuln/detail/CVE-2023-3446>)
- protobuf (CVE-2022-1941
<https://nvd.nist.gov/vuln/detail/CVE-2022-1941>)
- shadow (CVE-2023-29383
<https://nvd.nist.gov/vuln/detail/CVE-2023-29383>)
- sudo (CVE-2023-27320 <https://nvd.nist.gov/vuln/detail/CVE-2023-27320>
, CVE-2023-28486 <https://nvd.nist.gov/vuln/detail/CVE-2023-28486>,
CVE-2023-28487 <https://nvd.nist.gov/vuln/detail/CVE-2023-28487>)
- torcx (CVE-2022-28948 <https://nvd.nist.gov/vuln/detail/CVE-2022-28948>
)
- vim (CVE-2023-2609 <https://nvd.nist.gov/vuln/detail/CVE-2023-2609>,
CVE-2023-2610 <https://nvd.nist.gov/vuln/detail/CVE-2023-2610>,
CVE-2023-2426 <https://nvd.nist.gov/vuln/detail/CVE-2023-2426>)
- SDK: Python (CVE-2023-40217
<https://nvd.nist.gov/vuln/detail/CVE-2023-40217>, CVE-2023-41105
<https://nvd.nist.gov/vuln/detail/CVE-2023-41105>)
- SDK: qemu (CVE-2023-0330
<https://nvd.nist.gov/vuln/detail/CVE-2023-0330>, CVE-2023-2861
<https://nvd.nist.gov/vuln/detail/CVE-2023-2861>)
- SDK: Rust (CVE-2023-38497
<https://nvd.nist.gov/vuln/detail/CVE-2023-38497>)
- VMware: open-vm-tools (CVE-2023-20867
<https://nvd.nist.gov/vuln/detail/CVE-2023-20867>, CVE-2023-20900
<https://nvd.nist.gov/vuln/detail/CVE-2023-20900>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Bug-fixes2>Bug fixes:

- Fix the RemainAfterExit clause in nvidia.service (Flatcar#1169
<https://github.com/flatcar/Flatcar/issues/1169>)
- Fixed bug in handling renamed network interfaces when generating login
issue (init#102 <https://github.com/flatcar/init/pull/102>)
- Triggered re-reading of partition table to fix adding partitions to
the boot disk (scripts#1202
<https://github.com/flatcar/scripts/pull/1202>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Changes2>Changes:

- [image: :warning:] Dropped support for niftycloud and interoute. For
interoute we haven’t been generating the images for some time already. (
scripts#971 <https://github.com/flatcar/scripts/pull/971>) [image:
:warning:]
- Added TLS Kernel module (scripts#865
<https://github.com/flatcar/scripts/pull/865>)
- Added support for multipart MIME userdata in coreos-cloudinit.
Ignition now detects multipart userdata and delegates execution to
coreos-cloudinit. (scripts#873
<https://github.com/flatcar/scripts/pull/873>)
- Azure and QEMU OEM images now use systemd-sysext images for layering
additional platform-specific software on top of /usr. For Azure images
this also means that the image has a normal Python installation available
through the sysext image. The OEM software is still not updated but this
will be added soon.
- Change nvidia.service to type oneshot (from the default “simple”) so
the subsequent services (configured with “Requires/After”) are executed
after the driver installation is successfully finished (
flatcar/Flatcar#1136 <https://github.com/flatcar/Flatcar/issues/1136>)
- Enabled the virtio GPU driver (scripts#830
<https://github.com/flatcar/scripts/pull/830>)
- Migrate to Type=notify in containerd.service. Changed the unit to
Type=notify, utilizing the existing containerd support for sd_notify call
after socket setup.
- Migrated the NVIDIA installer from the Azure/AWS OEM partition to /usr to
make it available on all platforms (scripts#932
<https://github.com/flatcar/scripts/pull/932/>, Flatcar#1077
<https://github.com/flatcar/Flatcar/issues/1077>)
- Moved a mountpoint of the OEM partition from /usr/share/oem to /oem.
/usr/share/oem became a symlink to /oem for backward compatibility.
Despite the move, the initrd images providing files through
/usr/share/oem should keep using /usr/share/oem. The move was done to
enable activating the OEM sysext images that are placed in the OEM
partition.
- OEM vendor tools are now A/B updated if they are shipped as
systemd-sysext images, the migration happens when both partitions require a
systemd-sysext OEM image - note that this will delete the nvidia.service
from /etc on Azure because it’s now part of /usr (Flatcar#60
<https://github.com/flatcar/Flatcar/issues/60>)
- Updated locksmith to use non-deprecated resource control options in
the systemd unit (Locksmith#20
<https://github.com/flatcar/locksmith/pull/20>)
- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Updates2>Updates:

- Linux (6.1.55 <https://lwn.net/Articles/945379> (includes 6.1.54
<https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tag/?h=v6.1.54>
, 6.1.53 <https://lwn.net/Articles/944358>,6.1.52
<https://lwn.net/Articles/943754>, 6.1.51
<https://lwn.net/Articles/943403>, 6.1.50
<https://lwn.net/Articles/943112>, 6.1.49
<https://lwn.net/Articles/942880>, 6.1.48
<https://lwn.net/Articles/942865>, 6.1.47
<https://lwn.net/Articles/942531>, 6.1.46
<https://lwn.net/Articles/941774>, 6.1.45
<https://lwn.net/Articles/941273>, 6.1.44
<https://lwn.net/Articles/940800>, 6.1.43
<https://lwn.net/Articles/940338>, 6.1.42
<https://lwn.net/Articles/939423>, 6.1.41
<https://lwn.net/Articles/939103>, 6.1.40
<https://lwn.net/Articles/939015>, 6.1.39
<https://lwn.net/Articles/938619>, 6.1.38
<https://lwn.net/Articles/937403>, 6.1.37
<https://lwn.net/Articles/937082>, 6.1.36
<https://lwn.net/Articles/936674>, 6.1.35
<https://lwn.net/Articles/935588>, 6.1.34
<https://lwn.net/Articles/934623>, 6.1.33
<https://lwn.net/Articles/934319>, 6.1.32
<https://lwn.net/Articles/933908>, 6.1.31
<https://lwn.net/Articles/933281>, 6.1.30
<https://lwn.net/Articles/932882>, 6.1.29
<https://lwn.net/Articles/932133>, 6.1.28
<https://lwn.net/Articles/931651>, 6.1.27
<https://lwn.net/Articles/930597/>, 6.1
<https://kernelnewbies.org/Linux_6.1>))
- Linux Firmware (20230804
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230804>
(includes 20230625
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230625>
, 20230515
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230515>
))
- Go (1.20.8 <https://go.dev/doc/devel/release#go1.20.8> (includes 1.20.7
<https://go.dev/doc/devel/release#go1.20.7>, 1.20.6
<https://go.dev/doc/devel/release#go1.20.6>, 1.20.5
<https://go.dev/doc/devel/release#go1.20.5>, 1.20.4
<https://go.dev/doc/devel/release#go1.20.4>, 1.19.13
<https://go.dev/doc/devel/release#go1.19.13>, 1.19.12
<https://go.dev/doc/devel/release#go1.19.12>, 1.19.11
<https://go.dev/doc/devel/release#go1.19.11>, 1.19.10
<https://go.dev/doc/devel/release#go1.19.10>))
- bind tools (9.16.41
<https://bind9.readthedocs.io/en/v9.16.41/notes.html#notes-for-bind-9-16-41>
)
- binutils (2.40
<https://lists.gnu.org/archive/html/info-gnu/2023-01/msg00003.html>)
- bpftool (6.3
<https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/log/tools/bpf/bpftool?h=v6.3>
)
- c-ares (1.19.1
<https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1>)
- cJSON (1.7.16
<https://github.com/DaveGamble/cJSON/releases/tag/v1.7.16>)
- cifs-utils (7.0
<https://lists.samba.org/archive/samba-technical/2022-August/137528.html>
)
- containerd (1.7.6
<https://github.com/containerd/containerd/releases/tag/v1.7.6> (includes
1.7.5 <https://github.com/containerd/containerd/releases/tag/v1.7.5>,
1.7.4 <https://github.com/containerd/containerd/releases/tag/v1.7.4>,
1.7.3 <https://github.com/containerd/containerd/releases/tag/v1.7.3>,
1.7.2 <https://github.com/containerd/containerd/releases/tag/v1.7.2>))
- coreutils (9.3
<https://lists.gnu.org/archive/html/info-gnu/2023-04/msg00006.html>
(includes 9.1
<https://git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?h=v9.1>))
- cryptsetup (2.6.1
<https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.1/docs/v2.6.1-ReleaseNotes>
(includes 2.6.0
<https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.6.0/docs/v2.6.0-ReleaseNotes>
and 2.5.0
<https://gitlab.com/cryptsetup/cryptsetup/-/blob/v2.5.0/docs/v2.5.0-ReleaseNotes>
))
- curl (8.2.1 <https://curl.se/changes.html#8_2_1> (includes 8.2.0
<https://curl.se/changes.html#8_2_0>, 8.1.2
<https://curl.se/changes.html#8_1_2>, 8.1.0
<https://curl.se/changes.html#8_1_0>))
- debianutils (5.7
<https://metadata.ftp-master.debian.org/changelogs//main/d/debianutils/debianutils_5.7-0.4_changelog>
)
- diffutils (3.10
<https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00009.html>)
- elfutils (0.189
<https://sourceware.org/pipermail/elfutils-devel/2023q1/006023.html>)
- ethtool (6.4
<https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.4>
(includes 6.3
<https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/commit/?id=7bdf78f0d2a9ae1571fe9444e552490130e573fd>
, 6.2
<https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/tree/NEWS?h=v6.2>
))
- gawk (5.2.2
<https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00008.html>)
- gdb (13.2
<https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00011.html>)
- gdbm (1.23
<https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00004.html>)
- git (2.41.0 <https://lore.kernel.org/git/xmqqleh3a3wm.fsf@gitster.g/>
(includes 2.39.3
<https://github.com/git/git/blob/v2.39.3/Documentation/RelNotes/2.39.3.txt>
))
- glib (2.76.4 <https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.4>
(includes 2.76.3 <https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.3>
, 2.76.2 <https://gitlab.gnome.org/GNOME/glib/-/releases/2.76.2>))
- glibc (2.37
<https://sourceware.org/git/?p=glibc.git;a=tag;h=refs/tags/glibc-2.37>)
- gmp (6.3.0 <https://gmplib.org/gmp6.3>)
- gptfdisk (1.0.9
<https://sourceforge.net/p/gptfdisk/code/ci/1d46f3723bc25f5598266f7d9a3548af3cee0c77/tree/NEWS>
)
- grep (3.11
<https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00004.html>
(includes 3.8 <http://savannah.gnu.org/forum/forum.php?forum_id=10227>))
- grub (2.06
<https://lists.gnu.org/archive/html/grub-devel/2021-06/msg00022.html>)
- hwdata (0.373 <https://github.com/vcrhonek/hwdata/commits/v0.373>
(includes 0.372 <https://github.com/vcrhonek/hwdata/commits/v0.372>,
0.371 <https://github.com/vcrhonek/hwdata/commits/v0.371>, 0.367
<https://github.com/vcrhonek/hwdata/releases/tag/v0.367>))
- inih (57 <https://github.com/benhoyt/inih/releases/tag/r57> (includes
56 <https://github.com/benhoyt/inih/releases/tag/r56>))
- intel-microcode (20230808
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230808>
(includes 20230613
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230613>
, 20230512
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230512>
))
- iperf (3.14
<https://github.com/esnet/iperf/blob/master/RELNOTES.md#iperf-314-2023-07-07>
)
- iproute2 (6.4.0
<https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/?h=v6.4.0>
(includes 6.3.0 <https://lwn.net/Articles/930473/>, 6.2
<https://lwn.net/Articles/923952/>))
- ipset (7.17
<https://git.netfilter.org/ipset/tree/ChangeLog?id=186f9b57c60bb53aae5f6633eff1e9d5e9095c3e>
)
- kbd (2.6.1 <https://github.com/legionus/kbd/releases/tag/v2.6.1>
(includes 2.6.0 <https://github.com/legionus/kbd/releases/tag/v2.6.0>,
2.5.1 <https://github.com/legionus/kbd/releases/tag/v2.5.1>))
- kmod (30 <https://lwn.net/Articles/899526/>)
- ldb (2.4.4
<https://gitlab.com/samba-team/samba/-/commit/b686ef00da46d4a0c0aba0c61b1866cbc9b462b6>
(includes 2.4.3
<https://gitlab.com/samba-team/samba/-/commit/604f94704f30e90ef960aa2be62a14d2e614a002>
, 2.4.2
<https://gitlab.com/samba-team/samba/-/commit/d93892d2e8ed69758c15ab18bc03bba09e715bc6>
))
- less (633 <http://www.greenwoodsoftware.com/less/news.633.html>
(includes 632 <http://www.greenwoodsoftware.com/less/news.632.html>))
- libarchive (3.7.1
<https://github.com/libarchive/libarchive/releases/tag/v3.7.1> (includes
3.7.0 <https://github.com/libarchive/libarchive/releases/tag/v3.7.0>))
- libassuan (2.5.6
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libassuan.git;a=blob;f=NEWS;h=e52bb5dd36ac93ea227e53e89f82af9ccf38f339;hb=6b50ee6bcdd6aa81bd7cc3fb2379864c3ed479b8>
)
- libbsd (0.11.7
<https://lists.freedesktop.org/archives/libbsd/2022-October/000337.html>)
- libcap (2.69
<https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe>
)
- libgcrypt (1.10.1
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=blob;f=NEWS;h=03132c2a115e35783a782c64777cf5f5b1a2825f;hb=ae0e567820c37f9640440b3cff77d7c185aa6742>
)
- libgpg-error (1.47 <https://dev.gnupg.org/T6231> (includes 1.46
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgpg-error.git;a=blob;f=NEWS;h=14b0ba97d6ba2b10b3178f2e4a3e24bfc2355bb3;hb=ea031873aa9642831017937fd33e9009d514ee07>
))
- libksba (1.6.4
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=blob;f=NEWS;h=f640523209c1c9ce9855040e53914a79d24d6a67;hb=557999424ebd13e70d6fc17e648a5dd2a06f440b>
)
- libmd (1.1.0 <https://git.hadrons.org/cgit/libmd.git/log/?h=1.1.0>)
- libmicrohttpd (0.9.77
<https://gitlab.com/libmicrohttpd/libmicrohttpd/-/releases/v0.9.77>
(includes 0.9.76
<https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html>
))
- libnftnl (1.2.6
<https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.6> (includes
1.2.5 <https://git.netfilter.org/libnftnl/log/?h=libnftnl-1.2.5>))
- libnvme (1.5 <https://github.com/linux-nvme/libnvme/releases/tag/v1.5>)
- libpcap (1.10.4
<https://github.com/the-tcpdump-group/libpcap/blob/24832dd2728bd95ed9b9464ef27b47a943c38003/CHANGES#L51>
)
- libpcre (8.45)
- libpipeline (1.5.7
<https://gitlab.com/libpipeline/libpipeline/-/tags/1.5.7>)
- libusb (1.0.26
<https://github.com/libusb/libusb/blob/v1.0.26/ChangeLog>)
- libuv (1.46.0 <https://github.com/libuv/libuv/releases/tag/v1.46.0>
(includes 1.45.0 <https://github.com/libuv/libuv/releases/tag/v1.45.0>))
- libxml2 (2.11.4
<https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.4>)
- libxslt (1.1.38
<https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.38>)
- lsof (4.98.0
<https://github.com/lsof-org/lsof/blob/4.98.0/00DIST#L5471>)
- lua (5.4.4 <https://www.lua.org/manual/5.4/readme.html#changes>)
- multipath-tools (0.9.5
<https://github.com/opensvc/multipath-tools/commits/0.9.5>)
- ncurses (6.4
<https://invisible-island.net/ncurses/announce.html#h2-release-notes>)
- nettle (3.9.1
<https://git.lysator.liu.se/nettle/nettle/-/blob/nettle_3.9.1_release_20230601/ChangeLog>
)
- nmap (7.94 <https://nmap.org/changelog.html#7.94>)
- nvidia-drivers (535.104.05
<https://docs.nvidia.com/datacenter/tesla/tesla-release-notes-535-104-05/index.html>
)
- nvme-cli (2.5
<https://github.com/linux-nvme/nvme-cli/releases/tag/v2.5> (includes 2.3
<https://github.com/linux-nvme/nvme-cli/releases/tag/v2.3>))
- open-isns (0.102
<https://github.com/open-iscsi/open-isns/blob/v0.102/ChangeLog>)
- openldap (2.6.4
<https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_4/CHANGES>
(includes 2.6.3
<https://lists.openldap.org/hyperkitty/list/openldap...@openldap.org/thread/FQJM2JSSSOMLQH7XC7Q5IZJYOGCTV2LK/>
, 2.6
<https://lists.openldap.org/hyperkitty/list/openldap...@openldap.org/thread/IHS5V46H6NFNFUERMC6AWMPHTWRVNLFA/>
, 2.5.14
<https://lists.openldap.org/hyperkitty/list/openldap...@openldap.org/thread/TZQHR4SIWUA5BZTKDAKSFDOOGDVU4TU7/>
, 2.5
<https://lists.openldap.org/hyperkitty/list/openldap...@openldap.org/thread/BH3VDPG6IYYF5L5U6LZGHHKMJY5HFA3L/>
))
- OpenSSL (3.0.9
<https://github.com/openssl/openssl/blob/openssl-3.0.9/NEWS.md#major-changes-between-openssl-308-and-openssl-309-30-may-2023>
)
- parted (3.6
<https://git.savannah.gnu.org/gitweb/?p=parted.git;a=blob;f=NEWS;h=52bb11697039f70e55120c571750f9ee761a75aa;hb=3b5f327b213d21e9adb9ba933c78dd898fee5b1d>
)
- pax-utils (1.3.7
<https://gitweb.gentoo.org/proj/pax-utils.git/log/?h=v1.3.7>)
- pciutils (3.10.0
<https://github.com/pciutils/pciutils/blob/v3.10.0/ChangeLog> (includes
3.9.0 <https://github.com/pciutils/pciutils/releases/tag/v3.9.0>))
- popt (1.19
<https://github.com/rpm-software-management/popt/releases/tag/popt-1.19-release>
)
- protobuf (21.9
<https://github.com/protocolbuffers/protobuf/releases/tag/v21.9>)
- psmisc (23.6 <https://gitlab.com/psmisc/psmisc/-/blob/v23.6/ChangeLog>)
- qemu guest agent (8.0.3
<https://wiki.qemu.org/ChangeLog/8.0#Guest_agent> (includes 8.0.0
<https://wiki.qemu.org/ChangeLog/8.0#Guest_agent>))
- quota (4.09
<https://sourceforge.net/p/linuxquota/code/ci/87d2fd7635e4bca54fa2a00b8d5b073ba9ca521b/tree/Changelog>
)
- runc (1.1.9
<https://github.com/opencontainers/runc/releases/tag/v1.1.9> (includes
1.1.8 <https://github.com/opencontainers/runc/releases/tag/v1.1.8>))
- sed (4.9
<https://lists.gnu.org/archive/html/info-gnu/2022-11/msg00001.html>)
- smartmontools (7.3
<https://github.com/smartmontools/smartmontools/releases/tag/RELEASE_7_3>
)
- sqlite (3.42.0 <https://sqlite.org/releaselog/3_42_0.html>)
- strace (6.3 <https://github.com/strace/strace/releases/tag/v6.3>
(includes 6.2 <https://github.com/strace/strace/releases/tag/v6.2>))
- sudo (1.9.13p3 <https://www.sudo.ws/releases/stable/#1.9.13p3>)
- talloc (2.4.0
<https://gitlab.com/samba-team/samba/-/commit/5224ed98eeba43f22b5f5f87de5947fbb1c1c7c1>
(includes 2.3.4
<https://gitlab.com/samba-team/samba/-/commit/0189ccf9fc3d2a77cc83cffe180e307bcdccebb4>
))
- tar (1.35
<https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html>)
- tdb (1.4.8
<https://gitlab.com/samba-team/samba/-/commit/eab796a4f9172e602dc262f3c99ead35b35929e7>
(includes 1.4.7
<https://gitlab.com/samba-team/samba/-/commit/27ceb1c3ad786386e746a5e2968780d791393b9e>
, 1.4.6
<https://gitlab.com/samba-team/samba/-/commit/1c776e54cf33b46b2ed73263f093d596a0cdbb2f>
))
- tevent (0.14.1
<https://gitlab.com/samba-team/samba/-/commit/d80f28b081e515e32a480daf80b42cf782447a9c>
(includes 0.14.0
<https://gitlab.com/samba-team/samba/-/commit/3c6d28ebae27dba8e40558ae37ae8138ea0b4bdc>
, 0.13.0
<https://gitlab.com/samba-team/samba/-/commit/63d4db63feda920c8020f8484a8b31065b7f1380>
, 0.12.1
<https://gitlab.com/samba-team/samba/-/commit/53692735c733d01acbd953641f831a1f5e0cf6c5>,
0.12.0))
- usbutils (015
<https://github.com/gregkh/usbutils/blob/79b796f945ea7d5c2b0e2a74f9b8819cb7948680/NEWS>
)
- userspace-rcu (0.14.0
<https://github.com/urcu/userspace-rcu/blob/v0.13.2/ChangeLog>)
- util-linux (2.38.1
<https://github.com/util-linux/util-linux/releases/tag/v2.38.1>)
- vim (9.0.1678 <https://github.com/vim/vim/commits/v9.0.1678> includes (
9.0.1677 <https://github.com/vim/vim/commits/v9.0.1677>, 9.0.1503
<https://github.com/vim/vim/commits/v9.0.1503>))
- wget (1.21.4
<https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00003.html>)
- whois (5.5.17
<https://github.com/rfc1036/whois/commit/bac7108b01cfd54c517444efa1239e10e6edd5a4>
)
- xfsprogs (6.4.0
<https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.4.0> (includes
(6.3.0
<https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/tree/doc/CHANGES?h=v6.3.0>
))
- XZ utils (5.4.3
<https://git.tukaani.org/?p=xz.git;a=blob;f=NEWS;h=2f4d35adca6198671434d2988803cc9316ad1ec8;hb=dbb3a536ed9873ffa0870321f6873e564c6a9da8>
)
- zstandard (1.5.5 <https://github.com/facebook/zstd/releases/tag/v1.5.5>
)
- AWS: amazon-ssm-agent (3.2.985.0
<https://github.com/aws/amazon-ssm-agent/releases/tag/3.2.985.0>)
- SDK: file (5.45 <https://github.com/file/file/blob/FILE5_45/ChangeLog>)
- SDK: gnuconfig (20230731
<https://git.savannah.gnu.org/cgit/config.git/log/?id=d4e37b5868ef910e3e52744c34408084bb13051c>
)
- SDK: kexec-tools (2.0.24
<https://github.com/horms/kexec-tools/releases/tag/v2.0.24>)
- SDK: man-db (2.11.2 <https://gitlab.com/man-db/man-db/-/tags/2.11.2>)
- SDK: man-pages (6.03
<https://lore.kernel.org/lkml/d56662b2-538c-7252...@gmail.com/T/>
)
- SDK: pahole (1.25
<https://github.com/acmel/dwarves/blob/master/changes-v1.25>)
- SDK: perf (6.3
<https://kernelnewbies.org/LinuxChanges#Linux_6.3.Tracing.2C_perf_and_BPF>
)
- SDK: perl (5.36.1 <https://perldoc.perl.org/perl5361delta>)
- SDK: portage (3.0.49
<https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.49>
(includes 3.0.46
<https://gitweb.gentoo.org/proj/portage.git/tree/NEWS?h=portage-3.0.46>))
- SDK: python (3.11.5
<https://www.python.org/downloads/release/python-3115/> (includes 3.11.3
<https://www.python.org/downloads/release/python-3113/>, 3.10.12
<https://www.python.org/downloads/release/python-31012/>, 3.10.11
<https://www.python.org/downloads/release/python-31011/>))
- SDK: qemu (8.0.4 <https://wiki.qemu.org/ChangeLog/8.0> (includes 8.0.3
<https://wiki.qemu.org/ChangeLog/8.0>, 7.2.3
<https://wiki.qemu.org/ChangeLog/7.2>))
- SDK: Rust (1.72.0
<https://github.com/rust-lang/rust/releases/tag/1.72.0> (includes (1.71.1
<https://github.com/rust-lang/rust/releases/tag/1.71.1>, 1.71.0
<https://github.com/rust-lang/rust/releases/tag/1.71.0>, 1.70.0
<https://github.com/rust-lang/rust/releases/tag/1.70.0>))
- VMware: open-vm-tools (12.3.0
<https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0>
(includes 12.2.5
<https://github.com/vmware/open-vm-tools/releases/tag/stable-12.2.5>))

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#New-Stable-Release-360220>New
Stable Release 3602.2.0

*Changes since Beta 3602.1.6*
<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Security-fixes3>Security fixes:

- Linux (CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>
)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Bug-fixes3>Bug fixes:

- Triggered re-reading of partition table to fix adding partitions to
the boot disk (scripts#1202
<https://github.com/flatcar/scripts/pull/1202>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Changes3>Changes:

- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Updates3>Updates:

- Linux (5.15.133 <https://lwn.net/Articles/945380>)

Changes compared to Stable 3510.2.8
<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Security-fixes4>Security fixes:

- Linux (CVE-2023-42752 <https://nvd.nist.gov/vuln/detail/CVE-2023-42752>
, CVE-2023-42753 <https://nvd.nist.gov/vuln/detail/CVE-2023-42753>,
CVE-2023-42755 <https://nvd.nist.gov/vuln/detail/CVE-2023-42755>,
CVE-2023-4623 <https://nvd.nist.gov/vuln/detail/CVE-2023-4623>,
CVE-2023-4921 <https://nvd.nist.gov/vuln/detail/CVE-2023-4921>)
- Go (CVE-2023-24532 <https://nvd.nist.gov/vuln/detail/CVE-2023-24532>,
CVE-2023-24534 <https://nvd.nist.gov/vuln/detail/CVE-2023-24534>,
CVE-2023-24536 <https://nvd.nist.gov/vuln/detail/CVE-2023-24536>,
CVE-2023-24537 <https://nvd.nist.gov/vuln/detail/CVE-2023-24537>,
CVE-2023-24538 <https://nvd.nist.gov/vuln/detail/CVE-2023-24538>,
CVE-2023-24539 <https://nvd.nist.gov/vuln/detail/CVE-2023-24539>,
CVE-2023-24540 <https://nvd.nist.gov/vuln/detail/CVE-2023-24540>,
CVE-2023-29400 <https://nvd.nist.gov/vuln/detail/CVE-2023-29400>,
CVE-2022-41723 <https://nvd.nist.gov/vuln/detail/CVE-2022-41723>,
CVE-2022-41724 <https://nvd.nist.gov/vuln/detail/CVE-2022-41724>,
CVE-2022-41725 <https://nvd.nist.gov/vuln/detail/CVE-2022-41725>)
- bash (CVE-2022-3715 <https://nvd.nist.gov/vuln/detail/CVE-2022-3715>)
- c-ares (CVE-2022-4904 <https://nvd.nist.gov/vuln/detail/CVE-2022-4904>)
- containerd (CVE-2023-25153
<https://nvd.nist.gov/vuln/detail/CVE-2023-25153>, CVE-2023-25173
<https://nvd.nist.gov/vuln/detail/CVE-2023-25173>)
- curl (CVE-2023-23914 <https://nvd.nist.gov/vuln/detail/CVE-2023-23914>
, CVE-2023-23915 <https://nvd.nist.gov/vuln/detail/CVE-2023-23915> and
CVE-2023-23916 <https://nvd.nist.gov/vuln/detail/CVE-2023-23916>,
CVE-2023-27533 <https://nvd.nist.gov/vuln/detail/CVE-2023-27533>,
CVE-2023-27534 <https://nvd.nist.gov/vuln/detail/CVE-2023-27534>,
CVE-2023-27535 <https://nvd.nist.gov/vuln/detail/CVE-2023-27535>,
CVE-2023-27536 <https://nvd.nist.gov/vuln/detail/CVE-2023-27536>,
CVE-2023-27537 <https://nvd.nist.gov/vuln/detail/CVE-2023-27537>,
CVE-2023-27538 <https://nvd.nist.gov/vuln/detail/CVE-2023-27538>)
- Docker (CVE-2023-28840
<https://nvd.nist.gov/vuln/detail/CVE-2023-28840>, CVE-2023-28841
<https://nvd.nist.gov/vuln/detail/CVE-2023-28841>, CVE-2023-28842
<https://nvd.nist.gov/vuln/detail/CVE-2023-28842>)
- e2fsprogs (CVE-2022-1304
<https://nvd.nist.gov/vuln/detail/CVE-2022-1304>)
- git (CVE-2023-22490 <https://nvd.nist.gov/vuln/detail/CVE-2023-22490>,
CVE-2023-23946 <https://nvd.nist.gov/vuln/detail/CVE-2023-23946>)
- GnuTLS (CVE-2023-0361 <https://nvd.nist.gov/vuln/detail/CVE-2023-0361>)
- intel-microcode (CVE-2022-21216
<https://nvd.nist.gov/vuln/detail/CVE-2022-21216>, CVE-2022-33196
<https://nvd.nist.gov/vuln/detail/CVE-2022-33196>, CVE-2022-38090
<https://nvd.nist.gov/vuln/detail/CVE-2022-38090>)
- less (CVE-2022-46663 <https://nvd.nist.gov/vuln/detail/CVE-2022-46663>)
- libxml2 (CVE-2023-28484
<https://nvd.nist.gov/vuln/detail/CVE-2023-28484>, CVE-2023-29469
<https://nvd.nist.gov/vuln/detail/CVE-2023-29469>)
- OpenSSH (CVE-2023-25136
<https://nvd.nist.gov/vuln/detail/CVE-2023-25136>, CVE-2023-28531
<https://nvd.nist.gov/vuln/detail/CVE-2023-28531>, CVE-2023-38408
<https://nvd.nist.gov/vuln/detail/CVE-2023-38408>)
- OpenSSL (CVE-2022-4203 <https://nvd.nist.gov/vuln/detail/CVE-2022-4203>
, CVE-2022-4304 <https://nvd.nist.gov/vuln/detail/CVE-2022-4304>,
CVE-2022-4450 <https://nvd.nist.gov/vuln/detail/CVE-2022-4450>,
CVE-2023-0215 <https://nvd.nist.gov/vuln/detail/CVE-2023-0215>,
CVE-2023-0216 <https://nvd.nist.gov/vuln/detail/CVE-2023-0216>,
CVE-2023-0217 <https://nvd.nist.gov/vuln/detail/CVE-2023-0217>,
CVE-2023-0286 <https://nvd.nist.gov/vuln/detail/CVE-2023-0286>,
CVE-2023-0401 <https://nvd.nist.gov/vuln/detail/CVE-2023-0401>,
CVE-2023-0464 <https://nvd.nist.gov/vuln/detail/CVE-2023-0464>,
CVE-2023-0465 <https://nvd.nist.gov/vuln/detail/CVE-2023-0465>,
CVE-2023-0466 <https://nvd.nist.gov/vuln/detail/CVE-2023-0466>,
CVE-2023-1255 <https://nvd.nist.gov/vuln/detail/CVE-2023-1255>)
- runc (CVE-2023-25809 <https://nvd.nist.gov/vuln/detail/CVE-2023-25809>
, CVE-2023-27561 <https://nvd.nist.gov/vuln/detail/CVE-2023-27561>,
CVE-2023-28642 <https://nvd.nist.gov/vuln/detail/CVE-2023-28642>)
- tar (CVE-2022-48303 <https://nvd.nist.gov/vuln/detail/CVE-2022-48303>)
- torcx (CVE-2022-32149 <https://nvd.nist.gov/vuln/detail/CVE-2022-32149>
)
- vim (CVE-2023-0288 <https://nvd.nist.gov/vuln/detail/CVE-2023-0288>,
CVE-2023-0433 <https://nvd.nist.gov/vuln/detail/CVE-2023-0433>,
CVE-2023-1127 <https://nvd.nist.gov/vuln/detail/CVE-2023-1127>,
CVE-2023-1175 <https://nvd.nist.gov/vuln/detail/CVE-2023-1175>,
CVE-2023-1170 <https://nvd.nist.gov/vuln/detail/CVE-2023-1170>)
- SDK: dnsmasq (CVE-2022-0934
<https://nvd.nist.gov/vuln/detail/CVE-2022-0934>)
- SDK: pkgconf (CVE-2023-24056
<https://nvd.nist.gov/vuln/detail/CVE-2023-24056>)
- SDK: python (CVE-2023-24329
<https://nvd.nist.gov/vuln/detail/CVE-2023-24329>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Bug-fixes4>Bug fixes:

- Ensured that /var/log/journal/ is created early enough for
systemd-journald to persist the logs on first boot (bootengine#60
<https://github.com/flatcar/bootengine/pull/60>, baselayout#29
<https://github.com/flatcar/baselayout/pull/29>)
- Fixed journalctl --user permission issue (Flatcar#989
<https://github.com/flatcar/Flatcar/issues/989>)
- Ensured that the folder /var/log/sssd is created if it doesn’t exist,
required for sssd.service (Flatcar#1096
<https://github.com/flatcar/Flatcar/issues/1096>)
- Fixed a miscompilation of getfacl causing it to dump core when
executed (scripts#809 <https://github.com/flatcar/scripts/pull/809>)
- Restored the reboot warning and delay for non-SSH console sessions (
locksmith#21 <https://github.com/flatcar/locksmith/pull/21>)
- Triggered re-reading of partition table to fix adding partitions to
the boot disk (scripts#1202
<https://github.com/flatcar/scripts/pull/1202>)
- Worked around a bash regression in flatcar-install and added error
reporting for disk write failures (Flatcar#1059
<https://github.com/flatcar/Flatcar/issues/1059>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Changes4>Changes:

- Added pigz to the image, a parallel gzip implementation, which is
useful to speed up the (de)compression for large container image
imports/exports (coreos-overlay#2504
<https://github.com/flatcar/coreos-overlay/pull/2504>)
- Added a new flatcar-reset tool and boot logic for selective OS resets
to reconfigure the system with Ignition while avoiding config drift (
bootengine#55 <https://github.com/flatcar/bootengine/pull/55>, init#91
<https://github.com/flatcar/init/pull/91>)
- Enabled elfutils support in systemd-coredump. A backtrace will now
appear in the journal for any program that dumps core (
coreos-overlay#2489 <https://github.com/flatcar/coreos-overlay/pull/2489>
)
- Improved the OS reset tool to offer preview, backup and restore (
init#94 <https://github.com/flatcar/init/pull/94>)
- On boot any files in /etc that are the same as provided by the booted
/usr/share/flatcar/etc default for the overlay mount on /etc are deleted
to ensure that future updates of /usr/share/flatcar/etc are propagated -
to opt out create /etc/.no-dup-update in case you want to keep an
unmodified config file as is or because you fear that a future Flatcar
version may use the same file as you at which point your copy is cleaned up
and any other future Flatcar changes would be applied (bootengine#54
<https://github.com/flatcar/bootengine/pull/54>)
- Switched systemd log reporting to the combined format of both unit
description, as before, and now the unit name to easily find the unit (
coreos-overlay#2436 <https://github.com/flatcar/coreos-overlay/pull/2436>
)
- /etc is now set up as overlayfs with the original /etc folder being
the store for changed files/directories and /usr/share/flatcar/etc providing
the lower default directory tree (bootengine#53
<https://github.com/flatcar/bootengine/pull/53>, scripts#666
<https://github.com/flatcar/scripts/pull/666>)
- Changed coreos-cloudinit to now set the short hostname instead of the
FQDN when fetched from the metadata service (coreos-cloudinit#19
<https://github.com/flatcar/coreos-cloudinit/pull/19>)
- Use qcow2 compressed format instead of additional compression layer in
Qemu images (Flatcar#1135
<https://github.com/flatcar/Flatcar/issues/1135>, scripts#1132
<https://github.com/flatcar/scripts/pull/1132>)

<https://hackmd.io/XnuvS255RVyq0VgVboxxVw#Updates4>Updates:

- Linux (5.15.133 <https://lwn.net/Articles/945380> (includes 5.15.132
<https://lwn.net/Articles/944877>, 5.15.131
<https://lwn.net/Articles/943755>, 5.15.130
<https://lwn.net/Articles/943404>, 5.15.129
<https://lwn.net/Articles/943113>, 5.15.128
<https://lwn.net/Articles/942866>, 5.15.127
<https://lwn.net/Articles/941775>, 5.15.126
<https://lwn.net/Articles/941273>, 5.15.125
<https://lwn.net/Articles/940798>, 5.15.124
<https://lwn.net/Articles/940339>, 5.15.123
<https://lwn.net/Articles/939424>, 5.15.122
<https://lwn.net/Articles/939104>, 5.15.121
<https://lwn.net/Articles/939016>, 5.15.120
<https://lwn.net/Articles/937404>, 5.15.119
<https://lwn.net/Articles/936675>, 5.15.118
<https://lwn.net/Articles/935584>, 5.15.117
<https://lwn.net/Articles/934622>, 5.15.116
<https://lwn.net/Articles/934320>, 5.15.115
<https://lwn.net/Articles/933909>, 5.15.114
<https://lwn.net/Articles/933280>, 5.15.113
<https://lwn.net/Articles/932883>, 5.15.112
<https://lwn.net/Articles/932134>, 5.15.111
<https://lwn.net/Articles/931652>, 5.15.110
<https://lwn.net/Articles/930600>, 5.15.109
<https://lwn.net/Articles/930263>, 5.15.108
<https://lwn.net/Articles/929679>, 5.15.107
<https://lwn.net/Articles/929015/>, 5.15.106
<https://lwn.net/Articles/928343>, 5.15.105
<https://lwn.net/Articles/927860>, 5.15.104
<https://lwn.net/Articles/926873>, 5.15.103
<https://lwn.net/Articles/926415>, 5.15.102
<https://lwn.net/Articles/925991>, 5.15.101
<https://lwn.net/Articles/925939>, 5.15.100
<https://lwn.net/Articles/925913>, 5.15.99
<https://lwn.net/Articles/925844>))
- Linux Firmware (20230404
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230404>
(includes 20230310
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230310>
, 20230210
<https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tag/?h=20230210>
))
- Go (1.19.9 <https://go.dev/doc/devel/release#go1.19.9> (includes 1.19.8
<https://go.dev/doc/devel/release#go1.19.8>, 1.19.7
<https://go.dev/doc/devel/release#go1.19.7>, 1.19.6
<https://go.dev/doc/devel/release#go1.19.6>))
- bash (5.2
<https://lists.gnu.org/archive/html/bash-announce/2022-09/msg00000.html>)
- bind tools (9.16.37
<https://bind9.readthedocs.io/en/v9_16_37/notes.html#notes-for-bind-9-16-37>
)
- bpftool (6.2.1
<https://kernelnewbies.org/LinuxChanges#Linux_6.2.Tracing.2C_perf_and_BPF>
)
- btrfs-progs (6.0.2
<https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2-2022-11-24>,
includes 6.0
<https://btrfs.readthedocs.io/en/latest/CHANGES.html#btrfs-progs-6-0-2022-10-11>
)
- c-ares (1.19.0 <https://c-ares.org/changelog.html#1_19_0>)
- containerd (1.6.21
<https://github.com/containerd/containerd/releases/tag/v1.6.21>
(includes 1.6.20
<https://github.com/containerd/containerd/releases/tag/v1.6.20>, 1.6.19
<https://github.com/containerd/containerd/releases/tag/v1.6.19> 1.6.18
<https://github.com/containerd/containerd/releases/tag/v1.6.18>)
- curl (8.0.1 <https://curl.se/changes.html#8_0_1> (includes 7.88.1
<https://curl.se/changes.html#7_88_1>, 7.88.0
<https://curl.se/changes.html#7_88_0>))
- diffutils (3.9
<https://savannah.gnu.org/forum/forum.php?forum_id=10282>)
- Docker (20.10.24
<https://docs.docker.com/engine/release-notes/20.10/#201024>)
- e2fsprogs (1.47.0
<https://e2fsprogs.sourceforge.net/e2fsprogs-release.html##1.47.0>
(includes 1.46.6
<https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.6>))
- findutils (4.9.0
<https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00003.html>)
- gcc (12.2.1 <https://gcc.gnu.org/gcc-12/changes.html>)
- gdb (13.1.90 <https://lwn.net/Articles/923819/>)
- git (2.39.2
<https://github.com/git/git/blob/v2.39.2/Documentation/RelNotes/2.39.2.txt>
)
- GLib (2.74.6 <https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.6>
(includes 2.74.5 <https://gitlab.gnome.org/GNOME/glib/-/tags/2.74.5>))
- GnuTLS (3.8.0 <https://gitlab.com/gnutls/gnutls/-/blob/3.8.0/NEWS>)
- ignition (2.15.0
<https://coreos.github.io/ignition/release-notes/#ignition-2150-2023-02-21>
)
- intel-microcode (20230214
<https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214>
)
- iperf (3.13 <https://github.com/esnet/iperf/blob/3.13/RELNOTES.md>)
- iputils (20221126
<https://github.com/iputils/iputils/releases/tag/20221126>)
- less (608 <http://www.greenwoodsoftware.com/less/news.608.html>)
- libarchive (3.6.2
<https://github.com/libarchive/libarchive/releases/tag/v3.6.2>)
- libpcap (1.10.3
<https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.3:/CHANGES>
(includes 1.10.2
<https://git.tcpdump.org/libpcap/blob/refs/tags/libpcap-1.10.2:/CHANGES>
))
- libpcre2 (10.42
<https://github.com/PCRE2Project/pcre2/blob/pcre2-10.42/NEWS>)
- libxml2 (2.10.4 <https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.4>
)
- multipath-tools (0.9.4
<https://github.com/opensvc/multipath-tools/commits/0.9.4>)
- OpenSSH (9.3 <http://www.openssh.com/releasenotes.html#9.3> (includes
9.2 <http://www.openssh.com/releasenotes.html#9.2>))
- OpenSSL (3.0.8
<https://github.com/openssl/openssl/blob/openssl-3.0.8/NEWS.md#major-changes-between-openssl-307-and-openssl-308-7-feb-2023>
)
- pinentry (1.2.1
<https://git.gnupg.org/cgi-bin/gitweb.cgi?p=pinentry.git;a=blob;f=NEWS;h=c080b34e57d01a6ccca9d2996d7096c42b1a3f84;hb=8ab1682e80a2b4185ee9ef66cbb44340245966fc>
)
- qemu guest agent (7.1.0
<https://wiki.qemu.org/ChangeLog/7.1#Guest_agent>)
- readline (8.2
<https://lists.gnu.org/archive/html/info-gnu/2022-09/msg00013.html>)
- runc (1.1.7
<https://github.com/opencontainers/runc/releases/tag/v1.1.7> (includes
1.1.6 <https://github.com/opencontainers/runc/releases/tag/v1.1.6>, 1.1.5
<https://github.com/opencontainers/runc/releases/tag/v1.1.5>))
- socat (1.7.4.4
<https://repo.or.cz/socat.git/blob/refs/tags/tag-1.7.4.4:/CHANGES>)
- sqlite (3.41.2 <https://sqlite.org/releaselog/3_41_2.html>)
- strace (6.1 <https://github.com/strace/strace/releases/tag/v6.1>)
- traceroute (2.1.1)
- vim (9.0.1403 <https://github.com/vim/vim/releases/tag/v9.0.1403>
(includes 9.0.1363 <https://github.com/vim/vim/releases/tag/v9.0.1363>))
- XZ utils (5.4.2
<https://github.com/tukaani-project/xz/releases/tag/v5.4.2>)
- Zstandard (1.5.4 <https://github.com/facebook/zstd/releases/tag/v1.5.4>
(includes 1.5.2 <