Changes since Beta 4426.1.0
Security fixes:
- Linux (CVE-2025-39927, CVE-2025-39926, CVE-2025-39923, CVE-2025-39913, CVE-2025-39912, CVE-2025-39911, CVE-2025-39909, CVE-2025-39907, CVE-2025-39917, CVE-2025-39916, CVE-2025-39914, CVE-2025-39885, CVE-2025-39886, CVE-2025-39876, CVE-2025-39873, CVE-2025-39871, CVE-2025-39870, CVE-2025-39869, CVE-2025-39884, CVE-2025-39883, CVE-2025-39882, CVE-2025-39881, CVE-2025-39880, CVE-2025-39877, CVE-2025-39963, CVE-2025-39961, CVE-2025-39957, CVE-2025-39956, CVE-2025-39955, CVE-2025-39938, CVE-2025-39937, CVE-2025-39934, CVE-2025-39953, CVE-2025-39952, CVE-2025-39951, CVE-2025-39950, CVE-2025-39932, CVE-2025-39949, CVE-2025-39948, CVE-2025-39947, CVE-2025-39946, CVE-2025-39945, CVE-2025-39944, CVE-2025-39943, CVE-2025-39942, CVE-2025-39940, CVE-2025-39929, CVE-2025-39931, CVE-2024-57878, CVE-2024-57877, CVE-2024-57875, CVE-2024-57876, CVE-2024-57874, CVE-2025-23128, CVE-2025-23127, CVE-2025-23126, CVE-2025-23125, CVE-2025-23124, CVE-2024-57872, CVE-2024-57850, CVE-2024-57849, CVE-2024-57839, CVE-2024-57843, CVE-2024-48875, CVE-2024-48873, CVE-2024-47809, CVE-2024-47794, CVE-2024-47143, CVE-2024-47141, CVE-2024-45828, CVE-2024-43098, CVE-2024-53680, CVE-2024-52332, CVE-2024-50051, CVE-2024-49569, CVE-2024-48881, CVE-2024-48876, CVE-2024-41932, CVE-2024-41935, CVE-2024-56787, CVE-2024-56786, CVE-2024-56785, CVE-2024-56784, CVE-2024-56783, CVE-2024-56781, CVE-2024-56782, CVE-2024-56640, CVE-2024-56639, CVE-2024-56638, CVE-2024-56637, CVE-2024-56636, CVE-2024-56635, CVE-2024-56634, CVE-2024-56651, CVE-2024-56633, CVE-2024-56650, CVE-2024-56649, CVE-2024-56648, CVE-2024-56647, CVE-2024-56646, CVE-2024-56645, CVE-2024-56644, CVE-2024-56643, CVE-2024-56642, CVE-2024-56641, CVE-2024-56631, CVE-2024-56632, CVE-2024-56615, CVE-2024-56624, CVE-2024-56623, CVE-2024-56622, CVE-2024-56621, CVE-2024-56620, CVE-2024-56619, CVE-2024-56618, CVE-2024-56617, CVE-2024-56630, CVE-2024-56629, CVE-2024-56628, CVE-2024-56627, CVE-2024-56626, CVE-2024-56625, CVE-2024-56616, CVE-2024-56592, CVE-2024-56591, CVE-2024-56590, CVE-2024-56589, CVE-2024-56588, CVE-2024-56587, CVE-2024-56614, CVE-2024-56613, CVE-2024-56586, CVE-2024-56612, CVE-2024-56611, CVE-2024-56610, CVE-2024-56609, CVE-2024-56608, CVE-2024-56607, CVE-2024-56606, CVE-2024-56605, CVE-2024-56604, CVE-2024-56603, CVE-2024-56585, CVE-2024-56602, CVE-2024-56601, CVE-2024-56600, CVE-2024-56599, CVE-2024-56598, CVE-2024-56597, CVE-2024-56596, CVE-2024-56595, CVE-2024-56594, CVE-2024-56593, CVE-2024-56583, CVE-2024-56584)
- glib (CVE-2025-7039)
- glibc (CVE-2025-8058)
- gnutls (CVE-2025-32988, CVE-2025-32989, CVE-2025-32990, CVE-2025-6395)
- go (CVE-2025-47906, CVE-2025-47907)
- iperf (CVE-2025-54349, CVE-2025-54350, CVE-2025-54351)
- nvidia-drivers (CVE-2025-23277, CVE-2025-23278, CVE-2025-23279, CVE-2025-23286)
- python (CVE-2025-6069, CVE-2025-8194)
- vim (CVE-2025-53905, CVE-2025-53906, CVE-2025-9390)
Bug fixes:
- Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance (Flatcar#1901)
Changes:
- Enable CONFIG_INET_DIAG_DESTROY in kernel options (flatcar/scripts#3176)
- Hyper-V images now use a systemd-sysext image for layering additional platform-specific software on top of
/usr
- Scaleway: SSH keys are now fetched via Afterburn (scripts#3277)
- Scaleway: The hostname is now set via Afterburn (scripts#3277)
Updates:
- Ignition (2.22.0)
- Linux (6.12.51 (includes 6.12.42, 6.12.43, 6.12.48, 6.12.49, 6.12.50))
- Linux Firmware (20250808)
- SDK: gnu-efi (4.0.2)
- SDK: go (1.24.6)
- SDK: rust (1.88.0)
- SDK: sbsigntools (0.9.5)
- azure, dev, gce, sysext-python: gdbm (1.26)
- azure, dev, gce, sysext-python: python (3.11.13_p1)
- base, dev: azure-vm-utils (0.7.0)
- base, dev: btrfs-progs (6.15)
- base, dev: cryptsetup (2.8.0)
- base, dev: curl (8.15.0 (includes 8.14.0, 8.14.1))
- base, dev: e2fsprogs (1.47.3)
- base, dev: ethtool (6.15)
- base, dev: glib (2.84.4)
- base, dev: gnutls (3.8.10)
- base, dev: iproute2 (6.16.0)
- base, dev: kmod (34.2)
- base, dev: libgcrypt (1.11.2)
- base, dev: libnvme (1.15)
- base, dev: libsodium (1.0.20_p20250606)
- base, dev: libusb (1.0.29)
- base, dev: lsof (4.99.5)
- base, dev: ncurses (6.5_p20250531)
- base, dev: nettle (3.10.2)
- base, dev: ntp (4.2.8_p18)
- base, dev: nvidia-drivers-service (570.172.08 (includes 535.261.03, 570.172.08))
- base, dev: nvme-cli (2.15)
- base, dev: openssl (3.4.2)
- base, dev: pciutils (3.14.0)
- base, dev: pinentry (1.3.2)
- base, dev: pkgconf (2.5.1 (includes 2.5.0))
- base, dev: rpcbind (1.2.8)
- base, dev: selinux (2.20250213)
- base, dev: sqlite (3.50.4 (includes 3.50.3))
- base, dev: strace (6.16)
- base, dev: sudo (1.9.17_p2)
- base, dev: vim (9.1.1652)
- ca-certificates (3.117 (includes 3.115, 3.116))
- dev: gnuconfig (20250710)
- dev: iperf (3.19.1)
- sysext-incus, sysext-podman, vmware: fuse (3.17.3)
- sysext-incus: cowsql (1.15.9)
- sysext-nvidia-drivers-535, sysext-nvidia-drivers-535-open: nvidia-drivers (535.261.03)
- sysext-nvidia-drivers-570, sysext-nvidia-drivers-570-open: nvidia-drivers (570.181 (includes 570.172.08))
- sysext-python: distlib (0.4.0)
- sysext-python: rich (14.1.0)
- sysext-python: trove-classifiers (2025.8.26.11 (includes 2025.8.6.13))
- sysext-python: truststore (0.10.4)
Changes since Alpha 4459.0.0
Security fixes:
- Linux (CVE-2025-39927, CVE-2025-39926, CVE-2025-39923, CVE-2025-39913, CVE-2025-39912, CVE-2025-39911, CVE-2025-39909, CVE-2025-39907, CVE-2025-39917, CVE-2025-39916, CVE-2025-39914, CVE-2025-39885, CVE-2025-39886, CVE-2025-39876, CVE-2025-39873, CVE-2025-39871, CVE-2025-39870, CVE-2025-39869, CVE-2025-39884, CVE-2025-39883, CVE-2025-39882, CVE-2025-39881, CVE-2025-39880, CVE-2025-39877, CVE-2025-39963, CVE-2025-39961, CVE-2025-39957, CVE-2025-39956, CVE-2025-39955, CVE-2025-39938, CVE-2025-39937, CVE-2025-39934, CVE-2025-39953, CVE-2025-39952, CVE-2025-39951, CVE-2025-39950, CVE-2025-39932, CVE-2025-39949, CVE-2025-39948, CVE-2025-39947, CVE-2025-39946, CVE-2025-39945, CVE-2025-39944, CVE-2025-39943, CVE-2025-39942, CVE-2025-39940, CVE-2025-39929, CVE-2025-39931, CVE-2024-57878, CVE-2024-57877, CVE-2024-57875, CVE-2024-57876, CVE-2024-57874, CVE-2025-23128, CVE-2025-23127, CVE-2025-23126, CVE-2025-23125, CVE-2025-23124, CVE-2024-57872, CVE-2024-57850, CVE-2024-57849, CVE-2024-57839, CVE-2024-57843, CVE-2024-48875, CVE-2024-48873, CVE-2024-47809, CVE-2024-47794, CVE-2024-47143, CVE-2024-47141, CVE-2024-45828, CVE-2024-43098, CVE-2024-53680, CVE-2024-52332, CVE-2024-50051, CVE-2024-49569, CVE-2024-48881, CVE-2024-48876, CVE-2024-41932, CVE-2024-41935, CVE-2024-56787, CVE-2024-56786, CVE-2024-56785, CVE-2024-56784, CVE-2024-56783, CVE-2024-56781, CVE-2024-56782, CVE-2024-56640, CVE-2024-56639, CVE-2024-56638, CVE-2024-56637, CVE-2024-56636, CVE-2024-56635, CVE-2024-56634, CVE-2024-56651, CVE-2024-56633, CVE-2024-56650, CVE-2024-56649, CVE-2024-56648, CVE-2024-56647, CVE-2024-56646, CVE-2024-56645, CVE-2024-56644, CVE-2024-56643, CVE-2024-56642, CVE-2024-56641, CVE-2024-56631, CVE-2024-56632, CVE-2024-56615, CVE-2024-56624, CVE-2024-56623, CVE-2024-56622, CVE-2024-56621, CVE-2024-56620, CVE-2024-56619, CVE-2024-56618, CVE-2024-56617, CVE-2024-56630, CVE-2024-56629, CVE-2024-56628, CVE-2024-56627, CVE-2024-56626, CVE-2024-56625, CVE-2024-56616, CVE-2024-56592, CVE-2024-56591, CVE-2024-56590, CVE-2024-56589, CVE-2024-56588, CVE-2024-56587, CVE-2024-56614, CVE-2024-56613, CVE-2024-56586, CVE-2024-56612, CVE-2024-56611, CVE-2024-56610, CVE-2024-56609, CVE-2024-56608, CVE-2024-56607, CVE-2024-56606, CVE-2024-56605, CVE-2024-56604, CVE-2024-56603, CVE-2024-56585, CVE-2024-56602, CVE-2024-56601, CVE-2024-56600, CVE-2024-56599, CVE-2024-56598, CVE-2024-56597, CVE-2024-56596, CVE-2024-56595, CVE-2024-56594, CVE-2024-56593, CVE-2024-56583, CVE-2024-56584)
Bug fixes:
- Fixed the QEMU launcher script to include HVF acceleration on arm64-based Macs for faster performance (Flatcar#1901)
Changes:
- Scaleway: SSH keys are now fetched via Afterburn (scripts#3277)
- Scaleway: The hostname is now set via Afterburn (scripts#3277)