⚠️ From Alpha 3794.0.0 Torcx has been removed - please assert that you don’t rely on specific Torcx mechanism but now use systemd-sysext. See here for more information.
Changes since Stable-3602.2.3
Security fixes
- Linux (CVE-2023-7192 (includes CVE-2023-6932, CVE-2023-6931, CVE-2023-6817, CVE-2023-6622, CVE-2023-6606, CVE-2023-6546, CVE-2023-6531, CVE-2023-6176, CVE-2023-6121, CVE-2023-5717, CVE-2023-5345, CVE-2023-5197, CVE-2023-51782, CVE-2023-51781, CVE-2023-51780, CVE-2023-51779, CVE-2023-5158, CVE-2023-5090, CVE-2023-4921, CVE-2023-46862, CVE-2023-46813, CVE-2023-4623, CVE-2023-45871, CVE-2023-45863, CVE-2023-45862, CVE-2023-4569, CVE-2023-4459, CVE-2023-44466, CVE-2023-4394, CVE-2023-4389, CVE-2023-4387, CVE-2023-4385, CVE-2023-42755, CVE-2023-42754, CVE-2023-42753, CVE-2023-42752, CVE-2023-4273, CVE-2023-4244, CVE-2023-4208, CVE-2023-4207, CVE-2023-4206, CVE-2023-4155, CVE-2023-4147, CVE-2023-4132, CVE-2023-40283, CVE-2023-4015, CVE-2023-4004, CVE-2023-39198, CVE-2023-39197, CVE-2023-39194, CVE-2023-39193, CVE-2023-39192, CVE-2023-39189, CVE-2023-3867, CVE-2023-3866, CVE-2023-3865, CVE-2023-3863, CVE-2023-38432, CVE-2023-38431, CVE-2023-38430, CVE-2023-38429, CVE-2023-38428, CVE-2023-38427, CVE-2023-38426, CVE-2023-38409, CVE-2023-3812, CVE-2023-3777, CVE-2023-3776, CVE-2023-3773, CVE-2023-3772, CVE-2023-3611, CVE-2023-3610, CVE-2023-3609, CVE-2023-35829, CVE-2023-35828, CVE-2023-35827, CVE-2023-35826, CVE-2023-35824, CVE-2023-35823, CVE-2023-35788, CVE-2023-3567, CVE-2023-35001, CVE-2023-3439, CVE-2023-34324, CVE-2023-34319, CVE-2023-34256, CVE-2023-33952, CVE-2023-33951, CVE-2023-3390, CVE-2023-3359, CVE-2023-3358, CVE-2023-3357, CVE-2023-3355, CVE-2023-33288, CVE-2023-33203, CVE-2023-3269, CVE-2023-3268, CVE-2023-32269, CVE-2023-32258, CVE-2023-32257, CVE-2023-32254, CVE-2023-32252, CVE-2023-32250, CVE-2023-32248, CVE-2023-32247, CVE-2023-32233, CVE-2023-3220, CVE-2023-3212, CVE-2023-3161, CVE-2023-3159, CVE-2023-31436, CVE-2023-3141, CVE-2023-31248, CVE-2023-3111, CVE-2023-31085, CVE-2023-3090, CVE-2023-30772, CVE-2023-30456, CVE-2023-3006, CVE-2023-2985, CVE-2023-2898, CVE-2023-28866, CVE-2023-28466, CVE-2023-28410, CVE-2023-28328, CVE-2023-28327, CVE-2023-26607, CVE-2023-26606, CVE-2023-26545, CVE-2023-26544, CVE-2023-25775, CVE-2023-2513, CVE-2023-25012, CVE-2023-2430, CVE-2023-23559, CVE-2023-23455, CVE-2023-23454, CVE-2023-23002, CVE-2023-23001, CVE-2023-22999, CVE-2023-22998, CVE-2023-22997, CVE-2023-22996, CVE-2023-2269, CVE-2023-2236, CVE-2023-2235, CVE-2023-2194, CVE-2023-2177, CVE-2023-2166, CVE-2023-2163, CVE-2023-2162, CVE-2023-2156, CVE-2023-21255, CVE-2023-2124, CVE-2023-21106, CVE-2023-21102, CVE-2023-20938, CVE-2023-20928, CVE-2023-20593, CVE-2023-20588, CVE-2023-20569, CVE-2023-2019, CVE-2023-2008, CVE-2023-2006, CVE-2023-2002, CVE-2023-1998, CVE-2023-1990, CVE-2023-1989, CVE-2023-1872, CVE-2023-1859, CVE-2023-1855, CVE-2023-1838, CVE-2023-1829, CVE-2023-1670, CVE-2023-1652, CVE-2023-1637, CVE-2023-1611, CVE-2023-1583, CVE-2023-1582, CVE-2023-1513, CVE-2023-1382, CVE-2023-1380, CVE-2023-1281, CVE-2023-1249, CVE-2023-1206, CVE-2023-1194, CVE-2023-1193, CVE-2023-1192, CVE-2023-1118, CVE-2023-1095, CVE-2023-1079, CVE-2023-1078, CVE-2023-1077, CVE-2023-1076, CVE-2023-1075, CVE-2023-1074, CVE-2023-1073, CVE-2023-1032, CVE-2023-0615, CVE-2023-0590, CVE-2023-0469, CVE-2023-0468, CVE-2023-0461, CVE-2023-0459, CVE-2023-0458, CVE-2023-0394, CVE-2023-0386, CVE-2023-0266, CVE-2023-0210, CVE-2023-0179, CVE-2023-0160, CVE-2023-0045, CVE-2022-48619, CVE-2022-48502, CVE-2022-48425, CVE-2022-48424, CVE-2022-48423, CVE-2022-4842, CVE-2022-47943, CVE-2022-47942, CVE-2022-47941, CVE-2022-47940, CVE-2022-47939, CVE-2022-47938, CVE-2022-47929, CVE-2022-47521, CVE-2022-47520, CVE-2022-47519, CVE-2022-47518, CVE-2022-4662, CVE-2022-45934, CVE-2022-45919, CVE-2022-45887, CVE-2022-45886, CVE-2022-45869, CVE-2022-43945, CVE-2022-4382, CVE-2022-4379, CVE-2022-4378, CVE-2022-43750, CVE-2022-42896, CVE-2022-42895, CVE-2022-42722, CVE-2022-42721, CVE-2022-42720, CVE-2022-42719, CVE-2022-42703, CVE-2022-4269, CVE-2022-42432, CVE-2022-42329, CVE-2022-42328, CVE-2022-41858, CVE-2022-41850, CVE-2022-41849, CVE-2022-41674, CVE-2022-4139, CVE-2022-4128, CVE-2022-41218, CVE-2022-40982, CVE-2022-4095, CVE-2022-40768, CVE-2022-40307, CVE-2022-40133, CVE-2022-3977, CVE-2022-39190, CVE-2022-39189, CVE-2022-3910, CVE-2022-38457, CVE-2022-3707, CVE-2022-36946, CVE-2022-36879, CVE-2022-3649, CVE-2022-3646, CVE-2022-3643, CVE-2022-3640, CVE-2022-3635, CVE-2022-3630, CVE-2022-3629, CVE-2022-36280, CVE-2022-3628, CVE-2022-3625, CVE-2022-3623, CVE-2022-3621, CVE-2022-3619, CVE-2022-36123, CVE-2022-3595, CVE-2022-3594, CVE-2022-3586, CVE-2022-3577, CVE-2022-3565, CVE-2022-3564, CVE-2022-3543, CVE-2022-3541, CVE-2022-3534, CVE-2022-3526, CVE-2022-3524, CVE-2022-3521, CVE-2022-34918, CVE-2022-34495, CVE-2022-34494, CVE-2022-3435, CVE-2022-3424, CVE-2022-33981, CVE-2022-33744, CVE-2022-33743, CVE-2022-33742, CVE-2022-33741, CVE-2022-33740, CVE-2022-3344, CVE-2022-3303, CVE-2022-32981, CVE-2022-3239, CVE-2022-32296, CVE-2022-32250, CVE-2022-3202, CVE-2022-3169, CVE-2022-3115, CVE-2022-3113, CVE-2022-3112, CVE-2022-3111, CVE-2022-3110, CVE-2022-3108, CVE-2022-3107, CVE-2022-3105, CVE-2022-3104, CVE-2022-3078, CVE-2022-3077, CVE-2022-30594, CVE-2022-3028, CVE-2022-29968, CVE-2022-29901, CVE-2022-29900, CVE-2022-2978, CVE-2022-2977, CVE-2022-2964, CVE-2022-2959, CVE-2022-29582, CVE-2022-29581, CVE-2022-2938, CVE-2022-29156, CVE-2022-2905, CVE-2022-28893, CVE-2022-28796, CVE-2022-2873, CVE-2022-28390, CVE-2022-28389, CVE-2022-28388, CVE-2022-28356, CVE-2022-27950, CVE-2022-2785, CVE-2022-27672, CVE-2022-27666, CVE-2022-27223, CVE-2022-26966, CVE-2022-2663, CVE-2022-26490, CVE-2022-2639, CVE-2022-26373, CVE-2022-26365, CVE-2022-2602, CVE-2022-2590, CVE-2022-2588, CVE-2022-2586, CVE-2022-2585, CVE-2022-25636, CVE-2022-25375, CVE-2022-25258, CVE-2022-2503, CVE-2022-24959, CVE-2022-24958, CVE-2022-24448, CVE-2022-23960, CVE-2022-2380, CVE-2022-23222, CVE-2022-2318, CVE-2022-2308, CVE-2022-23042, CVE-2022-23041, CVE-2022-23040, CVE-2022-23039, CVE-2022-23038, CVE-2022-23037, CVE-2022-23036, CVE-2022-22942, CVE-2022-2196, CVE-2022-2153, CVE-2022-21505, CVE-2022-21499, CVE-2022-21166, CVE-2022-21125, CVE-2022-21123, CVE-2022-2078, CVE-2022-20572, CVE-2022-20566, CVE-2022-20423, CVE-2022-20422, CVE-2022-20421, CVE-2022-20369, CVE-2022-20368, CVE-2022-20158, CVE-2022-20008, CVE-2022-1998, CVE-2022-1976, CVE-2022-1975, CVE-2022-1974, CVE-2022-1973, CVE-2022-1943, CVE-2022-1882, CVE-2022-1852, CVE-2022-1789, CVE-2022-1734, CVE-2022-1729, CVE-2022-1679, CVE-2022-1671, CVE-2022-1652, CVE-2022-1651, CVE-2022-1516, CVE-2022-1462, CVE-2022-1353, CVE-2022-1263, CVE-2022-1205, CVE-2022-1204, CVE-2022-1199, CVE-2022-1198, CVE-2022-1184, CVE-2022-1158, CVE-2022-1055, CVE-2022-1048, CVE-2022-1016, CVE-2022-1015, CVE-2022-1012, CVE-2022-1011, CVE-2022-0995, CVE-2022-0847, CVE-2022-0742, CVE-2022-0617, CVE-2022-0516, CVE-2022-0500, CVE-2022-0494, CVE-2022-0492, CVE-2022-0487, CVE-2022-0435, CVE-2022-0433, CVE-2022-0382, CVE-2022-0330, CVE-2022-0185, CVE-2022-0168, CVE-2022-0002, CVE-2022-0001, CVE-2021-45469, CVE-2021-44879, CVE-2021-43976, CVE-2021-4197, CVE-2021-4155, CVE-2021-3923, CVE-2021-33655, CVE-2021-33135, CVE-2021-26401, CVE-2020-36516))
- Go (CVE-2023-39323, CVE-2023-39322, CVE-2023-39321, CVE-2023-39320, CVE-2023-39319, CVE-2023-39318, CVE-2023-29409, CVE-2023-29406, CVE-2023-29405, CVE-2023-29404, CVE-2023-29403, CVE-2023-29402)
- OpenSSL (CVE-2023-3446, CVE-2023-2975, CVE-2023-2650)
- Python (CVE-2023-41105, CVE-2023-40217)
- SDK: Rust (CVE-2023-38497)
- VMware: open-vm-tools (CVE-2023-20900, CVE-2023-20867)
- binutils (CVE-2023-1579, CVE-2022-4285, CVE-2022-38533)
- c-ares (CVE-2023-32067, CVE-2023-31147, CVE-2023-31130, CVE-2023-31124)
- curl (CVE-2023-38546, CVE-2023-38545, CVE-2023-38039, CVE-2023-28322, CVE-2023-28321, CVE-2023-28320, CVE-2023-28319)
- git (CVE-2023-29007, CVE-2023-25815, CVE-2023-25652)
- glibc (CVE-2023-4911, CVE-2023-4806, CVE-2023-4527)
- go (CVE-2023-39325)
- grub (CVE-2023-4693, CVE-2023-4692, CVE-2022-3775, CVE-2022-28737, CVE-2022-28736, CVE-2022-28735, CVE-2022-28734, CVE-2022-28733, CVE-2022-2601, CVE-2021-3981, CVE-2021-3697, CVE-2021-3696, CVE-2021-3695, CVE-2021-20233, CVE-2021-20225, CVE-2020-27779, CVE-2020-27749, CVE-2020-25647, CVE-2020-25632, CVE-2020-14372, CVE-2020-10713)
- intel-microcode (CVE-2023-23908, CVE-2022-41804, CVE-2022-40982)
- libarchive (libarchive-20230729)
- libcap (CVE-2023-2603, CVE-2023-2602)
- libmicrohttpd (CVE-2023-27371)
- libtirpc (libtirpc-rhbg-2224666, libtirpc-rhbg-2150611, libtirpc-rhbg-2138317)
- libxml2 (libxml2-20230428)
- lua (CVE-2022-33099)
- mit-krb5 (CVE-2023-36054)
- ncurses (CVE-2023-29491)
- nvidia-drivers (CVE-2023-25516, CVE-2023-25515)
- openldap (CVE-2023-2953)
- procps (CVE-2023-4016)
- protobuf (CVE-2022-1941)
- qemu (CVE-2023-2861, CVE-2023-0330)
- samba (CVE-2022-1615, CVE-2021-44142)
- shadow (CVE-2023-29383)
- sudo (CVE-2023-28487, CVE-2023-28486, CVE-2023-27320)
- torcx (CVE-2022-28948)
- vim (CVE-2023-2610, CVE-2023-2609, CVE-2023-2426)
Bug fixes
- AWS: Fixed the Amazon SSM agent that was crashing. (Flatcar#1307)
- Added AWS EKS support for versions 1.24-1.28. Fixed
/usr/share/amazon/eks/download-kubelet.sh
to include download paths for these versions. (scripts#1210) - Fix the RemainAfterExit clause in nvidia.service (Flatcar#1169)
- Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found (coreos-cloudinit#25, Flatcar#1262), with contributions from MichaelEischer
- Fixed bug in handling renamed network interfaces when generating login issue (init#102)
- Fixed iterating over the OEM update payload signatures which prevented the AWS OEM update to 3745.x.y (update-engine#31)
- Fixed quotes handling for update-engine (Flatcar#1209)
- Fixed supplying extension update payloads with a custom base URL in Nebraska (Flatcar#1281)
- Fixed the missing
/etc/extensions/
symlinks for the inbuilt Docker/containerd systemd-sysext images on update from Beta 3760.1.0 (update_engine#32) - Fixed the postinstall hook failure when updating from Azure instances without OEM systemd-sysext images to Flatcar Alpha 3745.x.y (update_engine#29)
- GCP: Fixed OS Login enabling (scripts#1445)
- Made
sshkeys.service
more robust to only runcoreos-metadata-sshkeys@core.service
when not masked and also retry on failure (init#112)
Changes
- ⚠️ Dropped support for niftycloud and interoute. For interoute we haven't been generating the images for some time already. (scripts#971) ⚠️
- AWS OEM images now use a systemd-sysext image for layering additional platform-specific software on top of
/usr
- Added TLS Kernel module (scripts#865)
- Added support for multipart MIME userdata in coreos-cloudinit. Ignition now detects multipart userdata and delegates execution to coreos-cloudinit. (scripts#873)
- Azure and QEMU OEM images now use systemd-sysext images for layering additional platform-specific software on top of
/usr
. For Azure images this also means that the image has a normal Python installation available through the sysext image. The OEM software is still not updated but this will be added soon. - Change nvidia.service to type oneshot (from the default "simple") so the subsequent services (configured with "Requires/After") are executed after the driver installation is successfully finished (flatcar/Flatcar#1136)
- Enabled the virtio GPU driver (scripts#830)
- Migrate to Type=notify in containerd.service. Changed the unit to Type=notify, utilizing the existing containerd support for sd_notify call after socket setup.
- Migrated the NVIDIA installer from the Azure/AWS OEM partition to
/usr
to make it available on all platforms (scripts#932, Flatcar#1077) - Moved a mountpoint of the OEM partition from
/usr/share/oem
to/oem
./usr/share/oem
became a symlink to/oem
for backward compatibility. Despite the move, the initrd images providing files through/usr/share/oem
should keep using/usr/share/oem
. The move was done to enable activating the OEM sysext images that are placed in the OEM partition. - OEM vendor tools are now A/B updated if they are shipped as systemd-sysext images, the migration happens when both partitions require a systemd-sysext OEM image - note that this will delete the
nvidia.service
from/etc
on Azure because it's now part of/usr
(Flatcar#60) - Reworked the VMware OEM software to be shipped as A/B updated systemd-sysext image
- SDK: Experimental support for prefix builds to create distro independent, portable, self-contained applications w/ all dependencies included. With contributions from chewi and HappyTobi.
- Started shipping default ssh client and ssh daemon configs in
/etc/ssh/ssh_config
and/etc/ssh/sshd_config
which include config snippets in/etc/ssh/ssh_config.d
and/etc/ssh/sshd_config.d
, respectively. - The open-vm-tools package in VMware OEM now comes with vmhgfs-fuse, udev rules, pam and vgauth
- Updated locksmith to use non-deprecated resource control options in the systemd unit (Locksmith#20)
Updates
- Linux (6.1.73 (includes 6.1.72, 6.1.71, 6.1.70, 6.1.69, 6.1.68, 6.1.67, 6.1.66, 6.1.65, 6.1.64, 6.1.63, 6.1.62, 6.1.61, 6.1.60, 6.1.59, 6.1.58, 6.1.57, 6.1.56, 6.1.55, 6.1.54, 6.1.53, 6.1.52, 6.1.51, 6.1.50, 6.1.49, 6.1.48, 6.1.47, 6.1.46, 6.1.45, 6.1.44, 6.1.43, 6.1.42, 6.1.41, 6.1.40, 6.1.39, 6.1.38, 6.1.37, 6.1.36, 6.1.35, 6.1.34, 6.1.33, 6.1.32, 6.1.31, 6.1.30, 6.1.29, 6.1.28, 6.1.27, 6.1))
- Linux Firmware (20230919 (includes 20230804, 20230625, 20230515))
- AWS: amazon-ssm-agent (3.2.985.0)
- Go (1.20.9 (includes 1.20.8, 1.20.7, 1.20.6, 1.20.5, 1.20.4, 1.20.10, 1.19.13, 1.19.12, 1.19.11, 1.19.10))
- OpenSSL (3.0.9)
- SDK: Rust (1.72.1 (includes 1.72.0, 1.71.1, 1.71.0, 1.70.0))
- SDK: file (5.45)
- SDK: gnuconfig (20230731)
- SDK: libxslt (1.1.38)
- SDK: man-db (2.11.2)
- SDK: man-pages (6.03)
- SDK: pahole (1.25)
- SDK: perf (6.3)
- SDK: perl (5.36.1)
- SDK: portage (3.0.49 (includes 3.0.49, 3.0.46))
- SDK: python (3.11.5 (includes 3.11.3, 3.10.12, 3.10.11))
- SDK: qemu (8.0.4 (includes 8.0.3, 7.2.3))
- SDK: qemu-guest-agent (8.0.3 (includes 8.0.0))
- VMWARE: libdnet (1.16.2 (includes 1.16))
- VMware: open-vm-tools (12.3.0 (includes 12.2.5))
- XZ Utils (5.4.3)
- afterburn (5.5.0)
- bind-tools (9.16.42 (includes 9.16.41))
- binutils (2.40)
- bpftool (6.3)
- c-ares (1.19.1)
- cJSON (1.7.16)
- ca-certificates (3.96.1 (includes 3.96))
- checkpolicy (3.5)
- cifs-utils (7.0)
- containerd (1.7.7 (includes 1.7.6, 1.7.5, 1.7.4, 1.7.3, 1.7.2))
- coreutils (9.3 (includes 9.1))
- cryptsetup (2.6.1 (includes 2.6.0, 2.5.0))
- curl (8.4.0 (includes 8.3.0, 8.2.1, 8.2.0, 8.1.2, 8.1.0))
- debianutils (5.7)
- diffutils (3.10)
- elfutils (0.189)
- ethtool (6.4 (includes 6.3, 6.2))
- gawk (5.2.2)
- gcc (13.2)
- gdb (13.2)
- gdbm (1.23)
- git (2.41.0 (includes 2.39.3))
- glib (2.76.4 (includes 2.76.3, 2.76.2))
- glibc (2.37)
- gmp (6.3.0)
- gptfdisk (1.0.9)
- grep (3.8 (includes 3.11))
- grub (2.06)
- gzip (1.13)
- hwdata (0.373 (includes 0.372, 0.371, 0.367))
- inih (57 (includes 56))
- intel-microcode (20230808 (includes 20230613, 20230512))
- iperf (3.14)
- iproute2 (6.4.0 (includes 6.3.0, 6.2))
- ipset (7.17)
- kbd (2.6.1 (includes 2.6.0, 2.5.1))
- kexec-tools (2.0.24)
- kmod (30)
- ldb (2.4.4 (includes 2.4.3, 2.4.2))
- less (633 (includes 632))
- libarchive (3.7.1 (includes 3.7.0))
- libassuan (2.5.6)
- libbsd (0.11.7)
- libcap (2.69)
- libgcrypt (1.10.2 (includes 1.10.1))
- libgpg-error (1.47 (includes 1.46))
- libksba (1.6.4)
- libmd (1.1.0)
- libmicrohttpd (0.9.77 (includes 0.9.76))
- libnftnl (1.2.6 (includes 1.2.5))
- libnl (3.8.0)
- libnvme (1.5)
- libpcap (1.10.4)
- libpcre (8.45)
- libpipeline (1.5.7)
- libselinux (3.5)
- libsemanage (3.5)
- libsepol (3.5)
- libtirpc (1.3.4)
- libusb (1.0.26)
- libuv (1.46.0 (includes 1.45.0))
- libxml2 (2.11.5 (includes 2.11.4))
- lsof (4.98.0)
- lua (5.4.6 (includes 5.4.4))
- mit-krb5 (1.21.2)
- multipath-tools (0.9.5)
- ncurses (6.4)
- nettle (3.9.1)
- nmap (7.94)
- nvidia-drivers (535.104.05)
- nvme-cli (2.5 (includes 2.3))
- open-isns (0.102)
- openldap (2.6.4 (includes 2.6.3, 2.6, 2.5.14, 2.5))
- openssh (9.5p1 (includes 9.4p1))
- parted (3.6)
- pax-utils (1.3.7)
- pciutils (3.9.0 (includes 3.10.0))
- pigz (2.8)
- policycoreutils (3.5)
- popt (1.19)
- procps (4.0.4 (includes 4.0.3, 4.0.0))
- protobuf (21.9)
- psmisc (23.6)
- quota (4.09)
- rpcsvc-proto (1.4.4)
- runc (1.1.9 (includes 1.1.8))
- samba (4.18.4)
- sed (4.9)
- selinux-base (2.20221101)
- selinux-base-policy (2.20221101)
- selinux-container (2.20221101)
- selinux-sssd (2.20221101)
- selinux-unconfined (2.20221101)
- semodule-utils (3.5)
- smartmontools (7.3)
- sqlite (3.42.0)
- strace (6.4 (includes 6.3, 6.2))
- sudo (1.9.13p3)
- talloc (2.4.0 (includes 2.3.4))
- tar (1.35)
- tdb (1.4.8 (includes 1.4.7, 1.4.6))
- tevent (0.14.1 (includes 0.14.0, 0.13.0, 0.12.1, 0.12.0))
- usbutils (015)
- userspace-rcu (0.14.0)
- util-linux (2.38.1)
- vim (9.0.1678 (includes 9.0.1677, 9.0.1503))
- wget (1.21.4)
- whois (5.5.18 (includes 5.5.17))
- xfsprogs (6.4.0 (includes 6.3.0))
- zstd (1.5.5)
Changes since Beta-3760.1.1
Security fixes:
- Linux (CVE-2023-1193, CVE-2023-51779, CVE-2023-51780, CVE-2023-51781, CVE-2023-51782, CVE-2023-6531, CVE-2023-6606, CVE-2023-6622, CVE-2023-6817, CVE-2023-6931)
Bug fixes:
- AWS: Fixed the Amazon SSM agent that was crashing. (Flatcar#1307)
- Fixed a bug resulting in coreos-cloudinit resetting the instance hostname to 'localhost' if no metadata could be found (coreos-cloudinit#25, Flatcar#1262), with contributions from MichaelEischer
- Fixed supplying extension update payloads with a custom base URL in Nebraska (Flatcar#1281)