Changes since Alpha 3732.0.0
Security fixes:
- Linux (CVE-2023-42755)
Bug fixes:
- Triggered re-reading of partition table to fix adding partitions to the boot disk (scripts#1202)
Changes:
- Use qcow2 compressed format instead of additional compression layer in Qemu images (Flatcar#1135, scripts#1132)
Updates:
- Linux (6.1.55)
Changes compared to Beta 3602.1.6
Security fixes:
- Linux (CVE-2020-36516,CVE-2021-26401,CVE-2021-33135,CVE-2021-33655,CVE-2021-3923,CVE-2021-4155,CVE-2021-4197,CVE-2021-43976,CVE-2021-44879,CVE-2021-45469,CVE-2022-0001,CVE-2022-0002,CVE-2022-0168,CVE-2022-0185,CVE-2022-0330,CVE-2022-0382,CVE-2022-0433,CVE-2022-0435,CVE-2022-0487,CVE-2022-0492,CVE-2022-0494,CVE-2022-0500,CVE-2022-0516,CVE-2022-0617,CVE-2022-0742,CVE-2022-0847,CVE-2022-0995,CVE-2022-1011,CVE-2022-1012,CVE-2022-1015,CVE-2022-1016,CVE-2022-1048,CVE-2022-1055,CVE-2022-1158,CVE-2022-1184,CVE-2022-1198,CVE-2022-1199,CVE-2022-1204,CVE-2022-1205,CVE-2022-1263,CVE-2022-1353,CVE-2022-1462,CVE-2022-1516,CVE-2022-1651,CVE-2022-1652,CVE-2022-1671,CVE-2022-1679,CVE-2022-1729,CVE-2022-1734,CVE-2022-1789,CVE-2022-1852,CVE-2022-1882,CVE-2022-1943,CVE-2022-1973,CVE-2022-1974,CVE-2022-1975,CVE-2022-1976,CVE-2022-1998,CVE-2022-20008,CVE-2022-20158,CVE-2022-20368,CVE-2022-20369,CVE-2022-20421,CVE-2022-20422,CVE-2022-20423,CVE-2022-20566,CVE-2022-20572,CVE-2022-2078,CVE-2022-21123,CVE-2022-21125,CVE-2022-21166,CVE-2022-21499,CVE-2022-21505,CVE-2022-2153,CVE-2022-2196,CVE-2022-22942,CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042,CVE-2022-2308,CVE-2022-2318,CVE-2022-23222,CVE-2022-2380,CVE-2022-23960,CVE-2022-24448,CVE-2022-24958,CVE-2022-24959,CVE-2022-2503,CVE-2022-25258,CVE-2022-25375,CVE-2022-25636,CVE-2022-2585,CVE-2022-2586,CVE-2022-2588,CVE-2022-2590,CVE-2022-2602,CVE-2022-26365,CVE-2022-26373,CVE-2022-2639,CVE-2022-26490,CVE-2022-2663,CVE-2022-26966,CVE-2022-27223,CVE-2022-27666,CVE-2022-27672,CVE-2022-2785,CVE-2022-27950,CVE-2022-28356,CVE-2022-28388,CVE-2022-28389,CVE-2022-28390,CVE-2022-2873,CVE-2022-28796,CVE-2022-28893,CVE-2022-2905,CVE-2022-29156,CVE-2022-2938,CVE-2022-29581,CVE-2022-29582,CVE-2022-2959,CVE-2022-2964,CVE-2022-2977,CVE-2022-2978,CVE-2022-29900,CVE-2022-29901,CVE-2022-29968,CVE-2022-3028,CVE-2022-30594,CVE-2022-3077,CVE-2022-3078,CVE-2022-3104,CVE-2022-3105,CVE-2022-3107,CVE-2022-3108,CVE-2022-3110,CVE-2022-3111,CVE-2022-3112,CVE-2022-3113,CVE-2022-3115,CVE-2022-3169,CVE-2022-3202,CVE-2022-32250,CVE-2022-32296,CVE-2022-3239,CVE-2022-32981,CVE-2022-3303,CVE-2022-3344,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-33743,CVE-2022-33744,CVE-2022-33981,CVE-2022-3424,CVE-2022-3435,CVE-2022-34494,CVE-2022-34495,CVE-2022-34918,CVE-2022-3521,CVE-2022-3524,CVE-2022-3526,CVE-2022-3534,CVE-2022-3541,CVE-2022-3543,CVE-2022-3564,CVE-2022-3565,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3595,CVE-2022-36123,CVE-2022-3619,CVE-2022-3621,CVE-2022-3623,CVE-2022-3625,CVE-2022-3628,CVE-2022-36280,CVE-2022-3635,CVE-2022-3640,CVE-2022-3643,CVE-2022-3646,CVE-2022-3649,CVE-2022-36879,CVE-2022-36946,CVE-2022-3707,CVE-2022-38457,CVE-2022-3910,CVE-2022-39189,CVE-2022-39190,CVE-2022-3977,CVE-2022-40133,CVE-2022-40307,CVE-2022-40768,CVE-2022-4095,CVE-2022-40982,CVE-2022-41218,CVE-2022-4128,CVE-2022-4139,CVE-2022-41674,CVE-2022-41849,CVE-2022-41850,CVE-2022-41858,CVE-2022-42328,CVE-2022-42329,CVE-2022-42432,CVE-2022-4269,CVE-2022-42703,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722,CVE-2022-42895,CVE-2022-42896,CVE-2022-43750,CVE-2022-4378,CVE-2022-4379,CVE-2022-4382,CVE-2022-43945,CVE-2022-45869,CVE-2022-45886,CVE-2022-45887,CVE-2022-45919,CVE-2022-45934,CVE-2022-4662,CVE-2022-47518,CVE-2022-47519,CVE-2022-47520,CVE-2022-47521,CVE-2022-47929,CVE-2022-47938,CVE-2022-47939,CVE-2022-47940,CVE-2022-47941,CVE-2022-47942,CVE-2022-47943,CVE-2022-4842,CVE-2022-48423,CVE-2022-48424,CVE-2022-48425,CVE-2022-48502,CVE-2023-0045,CVE-2023-0160,CVE-2023-0179,CVE-2023-0210,CVE-2023-0266,CVE-2023-0386,CVE-2023-0394,CVE-2023-0458,CVE-2023-0459,CVE-2023-0461,CVE-2023-0468,CVE-2023-0469,CVE-2023-0590,CVE-2023-0615,CVE-2023-1032,CVE-2023-1073,CVE-2023-1074,CVE-2023-1075,CVE-2023-1076,CVE-2023-1077,CVE-2023-1078,CVE-2023-1079,CVE-2023-1095,CVE-2023-1118,CVE-2023-1192,CVE-2023-1194,CVE-2023-1206,CVE-2023-1249,CVE-2023-1281,CVE-2023-1380,CVE-2023-1382,CVE-2023-1513,CVE-2023-1582,CVE-2023-1583,CVE-2023-1611,CVE-2023-1637,CVE-2023-1652,CVE-2023-1670,CVE-2023-1829,CVE-2023-1838,CVE-2023-1855,CVE-2023-1859,CVE-2023-1872,CVE-2023-1989,CVE-2023-1990,CVE-2023-1998,CVE-2023-2002,CVE-2023-2006,CVE-2023-2008,CVE-2023-2019,CVE-2023-20569,CVE-2023-20588,CVE-2023-20593,CVE-2023-20928,CVE-2023-20938,CVE-2023-21102,CVE-2023-21106,CVE-2023-2124,CVE-2023-21255,CVE-2023-2156,CVE-2023-2162,CVE-2023-2163,CVE-2023-2166,CVE-2023-2177,CVE-2023-2194,CVE-2023-2235,CVE-2023-2236,CVE-2023-2269,CVE-2023-22996,CVE-2023-22997,CVE-2023-22998,CVE-2023-22999,CVE-2023-23001,CVE-2023-23002,CVE-2023-23454,CVE-2023-23455,CVE-2023-23559,CVE-2023-2430,CVE-2023-25012,CVE-2023-2513,CVE-2023-25775,CVE-2023-26544,CVE-2023-26545,CVE-2023-26606,CVE-2023-26607,CVE-2023-28327,CVE-2023-28328,CVE-2023-28410,CVE-2023-28466,CVE-2023-28866,CVE-2023-2898,CVE-2023-2985,CVE-2023-3006,CVE-2023-30456,CVE-2023-30772,CVE-2023-3090,CVE-2023-3111,CVE-2023-31248,CVE-2023-3141,CVE-2023-31436,CVE-2023-3159,CVE-2023-3161,CVE-2023-3212,CVE-2023-3220,CVE-2023-32233,CVE-2023-32247,CVE-2023-32248,CVE-2023-32250,CVE-2023-32252,CVE-2023-32254,CVE-2023-32257,CVE-2023-32258,CVE-2023-32269,CVE-2023-3268,CVE-2023-3269,CVE-2023-33203,CVE-2023-33288,CVE-2023-3355,CVE-2023-3357,CVE-2023-3358,CVE-2023-3359,CVE-2023-3390,CVE-2023-33951,CVE-2023-33952,CVE-2023-34319,CVE-2023-3439,CVE-2023-35001,CVE-2023-3567,CVE-2023-35788,CVE-2023-35823,CVE-2023-35824,CVE-2023-35826,CVE-2023-35828,CVE-2023-35829,CVE-2023-3609,CVE-2023-3610,CVE-2023-3611,CVE-2023-3772,CVE-2023-3773,CVE-2023-3776,CVE-2023-3777,CVE-2023-3812,CVE-2023-38409,CVE-2023-38426,CVE-2023-38427,CVE-2023-38428,CVE-2023-38429,CVE-2023-38430,CVE-2023-38431,CVE-2023-38432,CVE-2023-3863,CVE-2023-3865,CVE-2023-3866,CVE-2023-3867,CVE-2023-4004,CVE-2023-4015,CVE-2023-40283,CVE-2023-4128,CVE-2023-4132,CVE-2023-4147,CVE-2023-4155,CVE-2023-4206,CVE-2023-4207,CVE-2023-4208,CVE-2023-4273,CVE-2023-42752,CVE-2023-42753,CVE-2023-42755,CVE-2023-4385,CVE-2023-4387,CVE-2023-4389,CVE-2023-4394,CVE-2023-4459,CVE-2023-4569,CVE-2023-4623,CVE-2023-4921, CVE-2022-40982, CVE-2022-41804, CVE-2023-20569, CVE-2023-23908)
- Go (CVE-2023-29402, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405, CVE-2023-29406,CVE-2023-29409,CVE-2023-39318, CVE-2023-39319, CVE-2023-39320, CVE-2023-39321, CVE-2023-39322)
- binutils (CVE-2022-38533, CVE-2022-4285, CVE-2023-1579)
- c-ares (CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067)
- curl (CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322)
- git (CVE-2023-25652, CVE-2023-25815, CVE-2023-29007)
- grub (CVE-2020-10713, CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779, CVE-2021-20225, CVE-2021-20233, CVE-2021-3981, CVE-2021-3695, CVE-2021-3696, CVE-2021-3697, CVE-2022-28733, CVE-2022-28734, CVE-2022-28735, CVE-2022-28736, CVE-2022-28737, CVE-2022-2601, CVE-2022-3775)
- intel-microcode (CVE-2022-40982, CVE-2022-41804, CVE-2023-23908)
- libarchive (libarchive-20230729)
- libcap (CVE-2023-2602, CVE-2023-2603)
- libmicrohttpd (CVE-2023-27371)
- libxml2 (libxml2-20230428)
- ncurses (CVE-2023-29491)
- nvidia-drivers (CVE-2023-25515, CVE-2023-25516)
- openldap (CVE-2023-2953)
- OpenSSL (CVE-2023-2650, CVE-2023-2975, CVE-2023-3446)
- protobuf (CVE-2022-1941)
- shadow (CVE-2023-29383)
- sudo (CVE-2023-27320, CVE-2023-28486, CVE-2023-28487)
- torcx (CVE-2022-28948)
- vim (CVE-2023-2609, CVE-2023-2610, CVE-2023-2426)
- SDK: Python (CVE-2023-40217, CVE-2023-41105)
- SDK: qemu (CVE-2023-0330, CVE-2023-2861)
- SDK: Rust (CVE-2023-38497)
- VMware: open-vm-tools (CVE-2023-20867, CVE-2023-20900)
Bug fixes:
- Fix the RemainAfterExit clause in nvidia.service (Flatcar#1169)
- Fixed bug in handling renamed network interfaces when generating login issue (init#102)
- Triggered re-reading of partition table to fix adding partitions to the boot disk (scripts#1202)
Changes:
- ⚠️ Dropped support for niftycloud and interoute. For interoute we haven't been generating the images for some time already. (scripts#971) ⚠️
- Added TLS Kernel module (scripts#865)
- Added support for multipart MIME userdata in coreos-cloudinit. Ignition now detects multipart userdata and delegates execution to coreos-cloudinit. (scripts#873)
- Azure and QEMU OEM images now use systemd-sysext images for layering additional platform-specific software on top of
/usr
. For Azure images this also means that the image has a normal Python installation available through the sysext image. The OEM software is still not updated but this will be added soon. - Change nvidia.service to type oneshot (from the default "simple") so the subsequent services (configured with "Requires/After") are executed after the driver installation is successfully finished (flatcar/Flatcar#1136)
- Enabled the virtio GPU driver (scripts#830)
- Migrate to Type=notify in containerd.service. Changed the unit to Type=notify, utilizing the existing containerd support for sd_notify call after socket setup.
- Migrated the NVIDIA installer from the Azure/AWS OEM partition to
/usr
to make it available on all platforms (scripts#932, Flatcar#1077) - Moved a mountpoint of the OEM partition from
/usr/share/oem
to/oem
./usr/share/oem
became a symlink to/oem
for backward compatibility. Despite the move, the initrd images providing files through/usr/share/oem
should keep using/usr/share/oem
. The move was done to enable activating the OEM sysext images that are placed in the OEM partition. - OEM vendor tools are now A/B updated if they are shipped as systemd-sysext images, the migration happens when both partitions require a systemd-sysext OEM image - note that this will delete the
nvidia.service
from/etc
on Azure because it's now part of/usr
(Flatcar#60) - Updated locksmith to use non-deprecated resource control options in the systemd unit (Locksmith#20)
- Use qcow2 compressed format instead of additional compression layer in Qemu images (Flatcar#1135, scripts#1132)
Updates:
- Linux (6.1.55 (includes 6.1.54, 6.1.53,6.1.52, 6.1.51, 6.1.50, 6.1.49, 6.1.48, 6.1.47, 6.1.46, 6.1.45, 6.1.44, 6.1.43, 6.1.42, 6.1.41, 6.1.40, 6.1.39, 6.1.38, 6.1.37, 6.1.36, 6.1.35, 6.1.34, 6.1.33, 6.1.32, 6.1.31, 6.1.30, 6.1.29, 6.1.28, 6.1.27, 6.1))
- Linux Firmware (20230804 (includes 20230625, 20230515))
- Go (1.20.8 (includes 1.20.7, 1.20.6, 1.20.5, 1.20.4, 1.19.13, 1.19.12, 1.19.11, 1.19.10))
- bind tools (9.16.41)
- binutils (2.40)
- bpftool (6.3)
- c-ares (1.19.1)
- cJSON (1.7.16)
- cifs-utils (7.0)
- containerd (1.7.6 (includes 1.7.5,1.7.4, 1.7.3, 1.7.2))
- coreutils (9.3 (includes 9.1))
- cryptsetup (2.6.1 (includes 2.6.0 and 2.5.0))
- curl (8.2.1 (includes 8.2.0, 8.1.2, 8.1.0))
- debianutils (5.7)
- diffutils (3.10)
- elfutils (0.189)
- ethtool (6.4 (includes 6.3, 6.2))
- gawk (5.2.2)
- gdb (13.2)
- gdbm (1.23)
- git (2.41.0 (includes 2.39.3))
- glib (2.76.4 (includes 2.76.3, 2.76.2))
- glibc (2.37)
- gmp (6.3.0)
- gptfdisk (1.0.9)
- grep (3.11 (includes 3.8))
- grub (2.06)
- hwdata (0.373 (includes 0.372, 0.371, 0.367))
- inih (57 (includes 56))
- intel-microcode (20230808 (includes 20230613, 20230512))
- iperf (3.14)
- iproute2 (6.4.0 (includes 6.3.0, 6.2))
- ipset (7.17)
- kbd (2.6.1 (includes 2.6.0, 2.5.1))
- kmod (30)
- ldb (2.4.4 (includes 2.4.3, 2.4.2))
- less (633 (includes 632))
- libarchive (3.7.1 (includes 3.7.0))
- libassuan (2.5.6)
- libbsd (0.11.7)
- libcap (2.69)
- libgcrypt (1.10.1)
- libgpg-error (1.47 (includes 1.46))
- libksba (1.6.4)
- libmd (1.1.0)
- libmicrohttpd (0.9.77 (includes 0.9.76))
- libnftnl (1.2.6 (includes 1.2.5))
- libnvme (1.5)
- libpcap (1.10.4)
- libpcre (8.45)
- libpipeline (1.5.7)
- libusb (1.0.26)
- libuv (1.46.0 (includes 1.45.0))
- libxml2 (2.11.4)
- libxslt (1.1.38)
- lsof (4.98.0)
- lua (5.4.4)
- multipath-tools (0.9.5)
- ncurses (6.4)
- nettle (3.9.1)
- nmap (7.94)
- nvidia-drivers (535.104.05)
- nvme-cli (2.5 (includes 2.3))
- open-isns (0.102)
- openldap (2.6.4 (includes 2.6.3, 2.6, 2.5.14, 2.5))
- OpenSSL (3.0.9)
- parted (3.6)
- pax-utils (1.3.7)
- pciutils (3.10.0 (includes 3.9.0))
- popt (1.19)
- protobuf (21.9)
- psmisc (23.6)
- qemu guest agent (8.0.3 (includes 8.0.0))
- quota (4.09)
- runc (1.1.9 (includes 1.1.8))
- sed (4.9)
- smartmontools (7.3)
- sqlite (3.42.0)
- strace (6.3 (includes 6.2))
- sudo (1.9.13p3)
- talloc (2.4.0 (includes 2.3.4))
- tar (1.35)
- tdb (1.4.8 (includes 1.4.7, 1.4.6))
- tevent (0.14.1 (includes 0.14.0, 0.13.0, 0.12.1, 0.12.0))
- usbutils (015)
- userspace-rcu (0.14.0)
- util-linux (2.38.1)
- vim (9.0.1678 includes (9.0.1677, 9.0.1503))
- wget (1.21.4)
- whois (5.5.17)
- xfsprogs (6.4.0 (includes (6.3.0))
- XZ utils (5.4.3)
- zstandard (1.5.5)
- AWS: amazon-ssm-agent (3.2.985.0)
- SDK: file (5.45)
- SDK: gnuconfig (20230731)
- SDK: kexec-tools (2.0.24)
- SDK: man-db (2.11.2)
- SDK: man-pages (6.03)
- SDK: pahole (1.25)
- SDK: perf (6.3)
- SDK: perl (5.36.1)
- SDK: portage (3.0.49 (includes 3.0.46))
- SDK: python (3.11.5 (includes 3.11.3, 3.10.12, 3.10.11))
- SDK: qemu (8.0.4 (includes 8.0.3, 7.2.3))
- SDK: Rust (1.72.0 (includes (1.71.1, 1.71.0, 1.70.0))
- VMware: open-vm-tools (12.3.0 (includes 12.2.5))