smart_proxy_omaha 0.0.5 → 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -2,4 +2,5 @@
2
2
  :enabled: true
3
3
  :contentpath: '/var/lib/foreman-proxy/omaha/content'
4
4
  :sync_releases: 2
5
+ :distribution: coreos
5
6
  #:proxy: 'http://127.0.0.1:3128'
@@ -11,8 +11,8 @@ Gem::Specification.new do |s|
11
11
  s.extra_rdoc_files = ['README.md', 'LICENSE']
12
12
  s.files = `git ls-files`.split("\n") - ['.gitignore']
13
13
  s.executables = ['smart-proxy-omaha-sync']
14
- s.homepage = 'http://github.com/theforeman/smart_proxy_omaha'
15
- s.license = 'GPLv3'
14
+ s.homepage = 'https://github.com/theforeman/smart_proxy_omaha'
15
+ s.license = 'GPL-3.0'
16
16
 
17
17
  s.add_dependency('nokogiri', '>= 1.5.11')
18
18
  s.add_dependency('json')
@@ -0,0 +1,3 @@
1
+ -----BEGIN CERTIFICATE-----
2
+ THIS IS SUPPOSED TO BE A CERTIFICATE
3
+ -----END CERTIFICATE-----
@@ -0,0 +1,1077 @@
1
+ {
2
+ "1688.5.3": {
3
+ "channel": "stable",
4
+ "architectures": [
5
+ "amd64"
6
+ ],
7
+ "release_date": "2018-04-25 14:36:41 +0000",
8
+ "major_software": {
9
+ "docker": [
10
+ "17.12.1"
11
+ ],
12
+ "ignition": [
13
+ "0.22.0"
14
+ ],
15
+ "kernel": [
16
+ "4.14.32"
17
+ ],
18
+ "rkt": [
19
+ "1.29.0"
20
+ ],
21
+ "systemd": [
22
+ "237"
23
+ ]
24
+ },
25
+ "release_notes": "## Flatcar updates\n\nInitial Flatcar release.\n\nBug fixes:\n- Fix GRUB crash at boot ([#2284](https://github.com/coreos/bugs/issues/2284))\n- Fix [poweroff problems](https://groups.google.com/forum/#!topic/coreos-user/YcGkRHU9SvQ) ([#8080](https://github.com/systemd/systemd/pull/8080))\n\nNotes:\n- Previous test images have been removed from the release servers. This is due to a new update key being generated using our updated security policy which we [included](https://github.com/flatcar-linux/coreos-overlay/pull/6) in the first public image.\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1688.5.3):\n\nBug fixes:\n- ~~Avoid GRUB crash at boot ([#2284](https://github.com/coreos/bugs/issues/2284))~~ We've included the [real fix for this](https://github.com/flatcar-linux/grub/commit/8281b03be34552e744fd08aae78b38704e2562b5).\n- Fix kernel panic with vxlan ([#2382](https://github.com/coreos/bugs/issues/2382))"
26
+ },
27
+ "1745.3.1": {
28
+ "channel": "stable",
29
+ "architectures": [
30
+ "amd64"
31
+ ],
32
+ "release_date": "2018-05-26 15:29:48 +0000",
33
+ "major_software": {
34
+ "docker": [
35
+ "18.03.1"
36
+ ],
37
+ "ignition": [
38
+ "0.24.1"
39
+ ],
40
+ "kernel": [
41
+ "4.14.42"
42
+ ],
43
+ "rkt": [
44
+ "1.29.0"
45
+ ],
46
+ "systemd": [
47
+ "238"
48
+ ]
49
+ },
50
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.3.1):\n\nUpdates:\n- Ignition [0.24.1](https://github.com/coreos/ignition/releases/tag/v0.24.1)\n- Linux [4.14.42](https://lwn.net/Articles/754972/)"
51
+ },
52
+ "1745.4.0": {
53
+ "channel": "stable",
54
+ "architectures": [
55
+ "amd64"
56
+ ],
57
+ "release_date": "2018-05-27 09:02:48 +0000",
58
+ "major_software": {
59
+ "docker": [
60
+ "18.03.1"
61
+ ],
62
+ "ignition": [
63
+ "0.24.1"
64
+ ],
65
+ "kernel": [
66
+ "4.14.42"
67
+ ],
68
+ "rkt": [
69
+ "1.29.0"
70
+ ],
71
+ "systemd": [
72
+ "238"
73
+ ]
74
+ },
75
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.4.0):\n\nBug fixes:\n- Fix inadvertent change of network interface names ([#2437](https://github.com/coreos/bugs/issues/2437))"
76
+ },
77
+ "1745.5.0": {
78
+ "channel": "stable",
79
+ "architectures": [
80
+ "amd64"
81
+ ],
82
+ "release_date": "2018-06-01 13:23:44 +0000",
83
+ "major_software": {
84
+ "docker": [
85
+ "18.03.1"
86
+ ],
87
+ "ignition": [
88
+ "0.24.1"
89
+ ],
90
+ "kernel": [
91
+ "4.14.44"
92
+ ],
93
+ "rkt": [
94
+ "1.29.0"
95
+ ],
96
+ "systemd": [
97
+ "238"
98
+ ]
99
+ },
100
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.5.0):\n\nSecurity fixes:\n- Fix Git arbitrary code execution when cloning untrusted repositories ([CVE-2018-11235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235))\n\nBug fixes:\n- Fix failure to set network interface MTU ([#2443](https://github.com/coreos/bugs/issues/2443))\n\nUpdates:\n- Git [2.16.4](https://raw.githubusercontent.com/git/git/v2.16.4/Documentation/RelNotes/2.16.4.txt)\n- Linux [4.14.44](https://lwn.net/Articles/755717/)"
101
+ },
102
+ "1745.6.0": {
103
+ "channel": "stable",
104
+ "architectures": [
105
+ "amd64"
106
+ ],
107
+ "release_date": "2018-06-13 13:21:16 +0000",
108
+ "major_software": {
109
+ "docker": [
110
+ "18.03.1"
111
+ ],
112
+ "ignition": [
113
+ "0.24.1"
114
+ ],
115
+ "kernel": [
116
+ "4.14.48"
117
+ ],
118
+ "rkt": [
119
+ "1.29.0"
120
+ ],
121
+ "systemd": [
122
+ "238"
123
+ ]
124
+ },
125
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.6.0):\n\nBug fixes:\n- Fix Hyper-V network driver regression ([#2454](https://github.com/coreos/bugs/issues/2454))\n\nUpdates:\n- Linux [4.14.48](https://lwn.net/Articles/756652/)"
126
+ },
127
+ "1745.7.0": {
128
+ "channel": "stable",
129
+ "architectures": [
130
+ "amd64"
131
+ ],
132
+ "release_date": "2018-06-15 14:51:25 +0000",
133
+ "major_software": {
134
+ "docker": [
135
+ "18.03.1"
136
+ ],
137
+ "ignition": [
138
+ "0.24.1"
139
+ ],
140
+ "kernel": [
141
+ "4.14.48"
142
+ ],
143
+ "rkt": [
144
+ "1.29.0"
145
+ ],
146
+ "systemd": [
147
+ "238"
148
+ ]
149
+ },
150
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.7.0):\n\nBug fixes:\n- Fix TCP connection stalls ([#2457](https://github.com/coreos/bugs/issues/2457))"
151
+ },
152
+ "1800.4.0": {
153
+ "channel": "stable",
154
+ "architectures": [
155
+ "amd64"
156
+ ],
157
+ "release_date": "2018-07-26 09:38:46 +0000",
158
+ "major_software": {
159
+ "docker": [
160
+ "18.03.1"
161
+ ],
162
+ "ignition": [
163
+ "0.25.1"
164
+ ],
165
+ "kernel": [
166
+ "4.14.55"
167
+ ],
168
+ "rkt": [
169
+ "1.30.0"
170
+ ],
171
+ "systemd": [
172
+ "238"
173
+ ]
174
+ },
175
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1800.4.0):\n\nNo changes for stable promotion"
176
+ },
177
+ "1800.5.0": {
178
+ "channel": "stable",
179
+ "architectures": [
180
+ "amd64"
181
+ ],
182
+ "release_date": "2018-07-31 09:16:01 +0000",
183
+ "major_software": {
184
+ "docker": [
185
+ "18.03.1"
186
+ ],
187
+ "ignition": [
188
+ "0.25.1"
189
+ ],
190
+ "kernel": [
191
+ "4.14.59"
192
+ ],
193
+ "rkt": [
194
+ "1.30.0"
195
+ ],
196
+ "systemd": [
197
+ "238"
198
+ ]
199
+ },
200
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1800.5.0):\n\nBug fixes:\n- Fix kernel CIFS client ([#2480](https://github.com/coreos/bugs/issues/2480))\n\nUpdates:\n- Linux [4.14.59](https://lwn.net/Articles/761180/)"
201
+ },
202
+ "1800.6.0": {
203
+ "channel": "stable",
204
+ "architectures": [
205
+ "amd64"
206
+ ],
207
+ "release_date": "2018-08-08 10:49:51 +0000",
208
+ "major_software": {
209
+ "docker": [
210
+ "18.03.1"
211
+ ],
212
+ "ignition": [
213
+ "0.25.1"
214
+ ],
215
+ "kernel": [
216
+ "4.14.59"
217
+ ],
218
+ "rkt": [
219
+ "1.30.0"
220
+ ],
221
+ "systemd": [
222
+ "238"
223
+ ]
224
+ },
225
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1800.6.0):\n\nSecurity fixes:\n- Fix Linux local denial of service as Xen PV guest ([CVE-2018-14678](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678))\n\nBug fixes:\n- Fix failure to mount large ext4 filesystems ([#2485](https://github.com/coreos/bugs/issues/2485))"
226
+ },
227
+ "1800.7.0": {
228
+ "channel": "stable",
229
+ "architectures": [
230
+ "amd64"
231
+ ],
232
+ "release_date": "2018-08-17 12:07:54 +0000",
233
+ "major_software": {
234
+ "docker": [
235
+ "18.03.1"
236
+ ],
237
+ "ignition": [
238
+ "0.25.1"
239
+ ],
240
+ "kernel": [
241
+ "4.14.63"
242
+ ],
243
+ "rkt": [
244
+ "1.30.0"
245
+ ],
246
+ "systemd": [
247
+ "238"
248
+ ]
249
+ },
250
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1800.7.0):\n\nSecurity fixes:\n- Fix Linux remote denial of service ([FragmentSmack](https://access.redhat.com/security/cve/cve-2018-5391), [CVE-2018-5391](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391))\n- Fix Linux privileged memory access via speculative execution ([L1TF/Foreshadow](https://foreshadowattack.eu/), [CVE-2018-3620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620), [CVE-2018-3646](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646))\n\nUpdates:\n- intel-microcode [20180703](https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File)\n- Linux [4.14.63](https://lwn.net/Articles/762808/)"
251
+ },
252
+ "1855.4.0": {
253
+ "channel": "stable",
254
+ "architectures": [
255
+ "amd64"
256
+ ],
257
+ "release_date": "2018-09-14 09:59:47 +0000",
258
+ "major_software": {
259
+ "docker": [
260
+ "18.06.1"
261
+ ],
262
+ "ignition": [
263
+ "0.26.0"
264
+ ],
265
+ "kernel": [
266
+ "4.14.67"
267
+ ],
268
+ "rkt": [
269
+ "1.30.0"
270
+ ],
271
+ "systemd": [
272
+ "238"
273
+ ]
274
+ },
275
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1855.4.0):\n\nBug fixes:\n- Fix Docker mounting named volumes ([#2497](https://github.com/coreos/bugs/issues/2497))\n"
276
+ },
277
+ "1855.4.2": {
278
+ "channel": "stable",
279
+ "architectures": [
280
+ "amd64"
281
+ ],
282
+ "release_date": "2018-10-11 20:17:03 +0000",
283
+ "major_software": {
284
+ "docker": [
285
+ "18.06.1"
286
+ ],
287
+ "ignition": [
288
+ "0.26.0"
289
+ ],
290
+ "kernel": [
291
+ "4.14.67"
292
+ ],
293
+ "rkt": [
294
+ "1.30.0"
295
+ ],
296
+ "systemd": [
297
+ "238"
298
+ ]
299
+ },
300
+ "release_notes": "## Flatcar updates\n\nChanges:\n\n* Add new image signing subkey to `flatcar-install` ([flatcar-linux/init#4](https://github.com/flatcar-linux/init/pull/4))\n"
301
+ },
302
+ "1855.5.0": {
303
+ "channel": "stable",
304
+ "architectures": [
305
+ "amd64"
306
+ ],
307
+ "release_date": "2018-10-26 10:13:33 +0000",
308
+ "major_software": {
309
+ "docker": [
310
+ "18.06.1"
311
+ ],
312
+ "ignition": [
313
+ "0.26.0"
314
+ ],
315
+ "kernel": [
316
+ "4.14.74"
317
+ ],
318
+ "rkt": [
319
+ "1.30.0"
320
+ ],
321
+ "systemd": [
322
+ "238"
323
+ ]
324
+ },
325
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1855.5.0):\n\nSecurity fixes:\n- Fix Git remote code execution during recursive clone ([CVE-2018-17456](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456))\n\nUpdates:\n- Git [2.16.5](https://raw.githubusercontent.com/git/git/v2.16.5/Documentation/RelNotes/2.16.5.txt)\n- Linux [4.14.74](https://lwn.net/Articles/767628/)"
326
+ },
327
+ "1911.3.0": {
328
+ "channel": "stable",
329
+ "architectures": [
330
+ "amd64"
331
+ ],
332
+ "release_date": "2018-11-08 16:14:37 +0000",
333
+ "major_software": {
334
+ "docker": [
335
+ "18.06.1"
336
+ ],
337
+ "ignition": [
338
+ "0.28.0"
339
+ ],
340
+ "kernel": [
341
+ "4.14.78"
342
+ ],
343
+ "rkt": [
344
+ "1.30.0"
345
+ ],
346
+ "systemd": [
347
+ "238"
348
+ ]
349
+ },
350
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1911.3.0):\n\nSecurity fixes:\n- Fix systemd re-executing with arbitrary supplied state ([CVE-2018-15686](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686))\n- Fix systemd race allowing changing file permissions ([CVE-2018-15687](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687))\n- Fix systemd-networkd buffer overflow in the dhcp6 client ([CVE-2018-15688](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688))"
351
+ },
352
+ "1911.4.0": {
353
+ "channel": "stable",
354
+ "architectures": [
355
+ "amd64"
356
+ ],
357
+ "release_date": "2018-11-27 14:54:50 +0000",
358
+ "major_software": {
359
+ "docker": [
360
+ "18.06.1"
361
+ ],
362
+ "ignition": [
363
+ "0.28.0"
364
+ ],
365
+ "kernel": [
366
+ "4.14.81"
367
+ ],
368
+ "rkt": [
369
+ "1.30.0"
370
+ ],
371
+ "systemd": [
372
+ "238"
373
+ ]
374
+ },
375
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1911.4.0):\n\nSecurity fixes:\n- Disable containerd CRI plugin to stop it from listening on a TCP port ([#2524](https://github.com/coreos/bugs/issues/2524))\n\nUpdates:\n- Linux [4.14.81](https://lwn.net/Articles/771885/)"
376
+ },
377
+ "1911.5.0": {
378
+ "channel": "stable",
379
+ "architectures": [
380
+ "amd64"
381
+ ],
382
+ "release_date": "2018-12-21 09:08:00 +0000",
383
+ "major_software": {
384
+ "docker": [
385
+ "18.06.1"
386
+ ],
387
+ "ignition": [
388
+ "0.28.0"
389
+ ],
390
+ "kernel": [
391
+ "4.14.84"
392
+ ],
393
+ "rkt": [
394
+ "1.30.0"
395
+ ],
396
+ "systemd": [
397
+ "238"
398
+ ]
399
+ },
400
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1911.5.0):\n\nSecurity fixes:\n- Fix Go CPU denial of service in X.509 verification ([CVE-2018-16875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16875))\n- Fix PolicyKit always authorizing UIDs greater than `INT_MAX` ([CVE-2018-19788](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19788))\n\nUpdates:\n- Go [1.10.6](https://golang.org/doc/devel/release.html#go1.10.minor)\n- Go [1.11.3](https://golang.org/doc/devel/release.html#go1.11.minor)\n- Linux [4.14.84](https://lwn.net/Articles/773114/)"
401
+ },
402
+ "1967.3.0": {
403
+ "channel": "stable",
404
+ "architectures": [
405
+ "amd64"
406
+ ],
407
+ "release_date": "2019-01-28 11:05:20 +0000",
408
+ "major_software": {
409
+ "docker": [
410
+ "18.06.1"
411
+ ],
412
+ "ignition": [
413
+ "0.28.0"
414
+ ],
415
+ "kernel": [
416
+ "4.14.88"
417
+ ],
418
+ "rkt": [
419
+ "1.30.0"
420
+ ],
421
+ "systemd": [
422
+ "238"
423
+ ]
424
+ },
425
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.3.0):\n\nNo changes for stable promotion"
426
+ },
427
+ "1967.3.1": {
428
+ "channel": "stable",
429
+ "architectures": [
430
+ "amd64"
431
+ ],
432
+ "release_date": "2019-01-28 10:32:57 +0000",
433
+ "major_software": {
434
+ "docker": [
435
+ "18.06.1"
436
+ ],
437
+ "ignition": [
438
+ "0.28.0"
439
+ ],
440
+ "kernel": [
441
+ "4.14.88"
442
+ ],
443
+ "rkt": [
444
+ "1.30.0"
445
+ ],
446
+ "systemd": [
447
+ "238"
448
+ ]
449
+ },
450
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.3.0):\n\nNo changes for stable promotion\n\n## Flatcar updates\n\nChanges:\n- [Fix the previous update of Flatcar](https://github.com/flatcar-linux/coreos-overlay/blob/build-1967.3.1/coreos-base/coreos-init/coreos-init-9999.ebuild#L13) where instead of https://github.com/flatcar-linux/init the upstream coreos-init package was referenced and used accidentally."
451
+ },
452
+ "1967.4.0": {
453
+ "channel": "stable",
454
+ "architectures": [
455
+ "amd64"
456
+ ],
457
+ "release_date": "2019-01-30 13:45:29 +0000",
458
+ "major_software": {
459
+ "docker": [
460
+ "18.06.1"
461
+ ],
462
+ "ignition": [
463
+ "0.28.0"
464
+ ],
465
+ "kernel": [
466
+ "4.14.96"
467
+ ],
468
+ "rkt": [
469
+ "1.30.0"
470
+ ],
471
+ "systemd": [
472
+ "238"
473
+ ]
474
+ },
475
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.4.0):\n\nUpdates:\n- Linux [4.14.96](https://lwn.net/Articles/777581/)"
476
+ },
477
+ "1967.5.0": {
478
+ "channel": "stable",
479
+ "architectures": [
480
+ "amd64"
481
+ ],
482
+ "release_date": "2019-02-14 10:29:38 +0000",
483
+ "major_software": {
484
+ "docker": [
485
+ "18.06.1"
486
+ ],
487
+ "ignition": [
488
+ "0.28.0"
489
+ ],
490
+ "kernel": [
491
+ "4.14.96"
492
+ ],
493
+ "rkt": [
494
+ "1.30.0"
495
+ ],
496
+ "systemd": [
497
+ "238"
498
+ ]
499
+ },
500
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.5.0):\nSecurity fixes:\n - Fix runc container breakout ([CVE-2019-5736](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736))"
501
+ },
502
+ "1967.6.0": {
503
+ "channel": "stable",
504
+ "architectures": [
505
+ "amd64"
506
+ ],
507
+ "release_date": "2019-02-21 08:40:53 +0000",
508
+ "major_software": {
509
+ "docker": [
510
+ "18.06.1"
511
+ ],
512
+ "ignition": [
513
+ "0.28.0"
514
+ ],
515
+ "kernel": [
516
+ "4.14.96"
517
+ ],
518
+ "rkt": [
519
+ "1.30.0"
520
+ ],
521
+ "systemd": [
522
+ "238"
523
+ ]
524
+ },
525
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.6.0):\n\nBug fixes:\n- Fix kernel POSIX timer rearming ([#2549](https://github.com/coreos/bugs/issues/2549))"
526
+ },
527
+ "2023.4.0": {
528
+ "channel": "stable",
529
+ "architectures": [
530
+ "amd64"
531
+ ],
532
+ "release_date": "2019-02-27 08:52:33 +0000",
533
+ "major_software": {
534
+ "docker": [
535
+ "18.06.1"
536
+ ],
537
+ "ignition": [
538
+ "0.30.0"
539
+ ],
540
+ "kernel": [
541
+ "4.19.23"
542
+ ],
543
+ "rkt": [
544
+ "1.30.0"
545
+ ],
546
+ "systemd": [
547
+ "238"
548
+ ]
549
+ },
550
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2023.4.0):\n\nSecurity fixes:\n- Fix Linux use-after-free in `sockfs_setattr` ([CVE-2019-8912](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8912))"
551
+ },
552
+ "2023.5.0": {
553
+ "channel": "stable",
554
+ "architectures": [
555
+ "amd64"
556
+ ],
557
+ "release_date": "2019-03-12 14:35:58 +0000",
558
+ "major_software": {
559
+ "docker": [
560
+ "18.06.1"
561
+ ],
562
+ "ignition": [
563
+ "0.30.0"
564
+ ],
565
+ "kernel": [
566
+ "4.19.25"
567
+ ],
568
+ "rkt": [
569
+ "1.30.0"
570
+ ],
571
+ "systemd": [
572
+ "238"
573
+ ]
574
+ },
575
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2023.5.0):\n\nSecurity fixes:\n- Fix systemd crash from a specially-crafted D-Bus message ([CVE-2019-6454](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454))\n\nBug fixes:\n- Fix systemd-journald memory leak ([#2564](https://github.com/coreos/bugs/issues/2564))\n\nUpdates:\n- Linux [4.19.25](https://lwn.net/Articles/780611/)"
576
+ },
577
+ "2079.3.0": {
578
+ "channel": "stable",
579
+ "architectures": [
580
+ "amd64"
581
+ ],
582
+ "release_date": "2019-04-24 10:00:10 +0000",
583
+ "major_software": {
584
+ "docker": [
585
+ "18.06.3"
586
+ ],
587
+ "ignition": [
588
+ "0.31.0"
589
+ ],
590
+ "kernel": [
591
+ "4.19.34"
592
+ ],
593
+ "rkt": [
594
+ "1.30.0"
595
+ ],
596
+ "systemd": [
597
+ "241"
598
+ ]
599
+ },
600
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2079.3.0):\n\nNo changes for stable promotion"
601
+ },
602
+ "2079.3.1": {
603
+ "channel": "stable",
604
+ "architectures": [
605
+ "amd64"
606
+ ],
607
+ "release_date": "2019-04-25 10:05:40 +0000",
608
+ "major_software": {
609
+ "docker": [
610
+ "18.06.3"
611
+ ],
612
+ "ignition": [
613
+ "0.31.0"
614
+ ],
615
+ "kernel": [
616
+ "4.19.34"
617
+ ],
618
+ "rkt": [
619
+ "1.30.0"
620
+ ],
621
+ "systemd": [
622
+ "241"
623
+ ]
624
+ },
625
+ "release_notes": "## Flatcar updates\n\nBug fixes:\n\n* Fix a wrong vendor-specific string in [CMDLINE_OEM_FLAG](https://github.com/flatcar-linux/afterburn/blob/f4f0adc6a96a1ba77a0f87b612ecdf21782aa8c6/src/main.rs#L60) in [afterburn](https://github.com/flatcar-linux/afterburn) \n\n"
626
+ },
627
+ "2079.3.2": {
628
+ "channel": "stable",
629
+ "architectures": [
630
+ "amd64"
631
+ ],
632
+ "release_date": "2019-04-26 07:43:52 +0000",
633
+ "major_software": {
634
+ "docker": [
635
+ "18.06.3"
636
+ ],
637
+ "ignition": [
638
+ "0.31.0"
639
+ ],
640
+ "kernel": [
641
+ "4.19.34"
642
+ ],
643
+ "rkt": [
644
+ "1.30.0"
645
+ ],
646
+ "systemd": [
647
+ "241"
648
+ ]
649
+ },
650
+ "release_notes": "## Flatcar updates\n\nBug fixes:\n\n* Fix a regression from the latest hotfix builds, about [CROS_WORKON_COMMIT](https://github.com/flatcar-linux/coreos-overlay/blob/60e44f23a1a5527cfa6bcbc978b1ffdef74e2e3f/coreos-base/coreos-metadata/coreos-metadata-9999.ebuild#L13) in [coreos-overlay](https://github.com/flatcar-linux/coreos-overlay) \n"
651
+ },
652
+ "2079.4.0": {
653
+ "channel": "stable",
654
+ "architectures": [
655
+ "amd64"
656
+ ],
657
+ "release_date": "2019-05-16 10:57:17 +0000",
658
+ "major_software": {
659
+ "docker": [
660
+ "18.06.3"
661
+ ],
662
+ "ignition": [
663
+ "0.31.0"
664
+ ],
665
+ "kernel": [
666
+ "4.19.43"
667
+ ],
668
+ "rkt": [
669
+ "1.30.0"
670
+ ],
671
+ "systemd": [
672
+ "241"
673
+ ]
674
+ },
675
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2079.4.0):\n\nSecurity fixes:\n- Fix Intel CPU disclosure of memory to user process. Complete mitigation requires [manually disabling SMT](https://docs.flatcar-linux.org/os/disabling-smt/) on affected processors. ([CVE-2019-11091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091), [CVE-2018-12126](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126), [CVE-2018-12127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127), [CVE-2018-12130](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130), [MDS](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html))\n\nUpdates:\n- intel-microcode [20190514](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20190514/releasenote)\n- Linux [4.19.43](https://lwn.net/Articles/788388/)"
676
+ },
677
+ "2079.5.0": {
678
+ "channel": "stable",
679
+ "architectures": [
680
+ "amd64"
681
+ ],
682
+ "release_date": "2019-06-06 08:49:52 +0000",
683
+ "major_software": {
684
+ "docker": [
685
+ "18.06.3"
686
+ ],
687
+ "ignition": [
688
+ "0.31.0"
689
+ ],
690
+ "kernel": [
691
+ "4.19.43"
692
+ ],
693
+ "rkt": [
694
+ "1.30.0"
695
+ ],
696
+ "systemd": [
697
+ "241"
698
+ ]
699
+ },
700
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2079.5.0):\n\nBug fixes:\n- Fix systemd `MountFlags=shared` option ([#2579](https://github.com/coreos/bugs/issues/2579))\n\nChanges:\n- Pin network interface naming to systemd v238 scheme ([#2578](https://github.com/coreos/bugs/issues/2578))"
701
+ },
702
+ "2079.6.0": {
703
+ "channel": "stable",
704
+ "architectures": [
705
+ "amd64"
706
+ ],
707
+ "release_date": "2019-06-19 08:15:07 +0000",
708
+ "major_software": {
709
+ "docker": [
710
+ "18.06.3"
711
+ ],
712
+ "ignition": [
713
+ "0.31.0"
714
+ ],
715
+ "kernel": [
716
+ "4.19.43"
717
+ ],
718
+ "rkt": [
719
+ "1.30.0"
720
+ ],
721
+ "systemd": [
722
+ "241"
723
+ ]
724
+ },
725
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2079.6.0):\n\nSecurity fixes:\n\n- Fix Linux TCP remotely-triggerable kernel panic and excessive resource consumption ([CVE-2019-11477](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477), [CVE-2019-11478](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478), [CVE-2019-11479](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479))\n\nBug fixes:\n\n- Fix invalid bzip2 compression of Container Linux release images ([#2589](https://github.com/coreos/bugs/issues/2589))"
726
+ },
727
+ "2135.4.0": {
728
+ "channel": "stable",
729
+ "architectures": [
730
+ "amd64"
731
+ ],
732
+ "release_date": "2019-07-01 10:47:02 +0000",
733
+ "major_software": {
734
+ "docker": [
735
+ "18.06.3"
736
+ ],
737
+ "ignition": [
738
+ "0.32.0"
739
+ ],
740
+ "kernel": [
741
+ "4.19.50"
742
+ ],
743
+ "rkt": [
744
+ "1.30.0"
745
+ ],
746
+ "systemd": [
747
+ "241"
748
+ ]
749
+ },
750
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2135.4.0):\n\nNo changes for stable promotion\n"
751
+ },
752
+ "2135.5.0": {
753
+ "channel": "stable",
754
+ "architectures": [
755
+ "amd64"
756
+ ],
757
+ "release_date": "2019-07-03 08:01:54 +0000",
758
+ "major_software": {
759
+ "docker": [
760
+ "18.06.3"
761
+ ],
762
+ "ignition": [
763
+ "0.33.0"
764
+ ],
765
+ "kernel": [
766
+ "4.19.50"
767
+ ],
768
+ "rkt": [
769
+ "1.30.0"
770
+ ],
771
+ "systemd": [
772
+ "241"
773
+ ]
774
+ },
775
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2135.5.0):\n\nBug fixes:\n\n * Fix Ignition panic when no `guestinfo.(coreos|ignition).config` parameters are specified on VMware (coreos/ignition#821)\n\nUpdates:\n\n * Ignition [0.33.0](https://github.com/coreos/ignition/releases/tag/v0.33.0)\n"
776
+ },
777
+ "2135.6.0": {
778
+ "channel": "stable",
779
+ "architectures": [
780
+ "amd64"
781
+ ],
782
+ "release_date": "2019-08-01 09:14:26 +0000",
783
+ "major_software": {
784
+ "docker": [
785
+ "18.06.3"
786
+ ],
787
+ "ignition": [
788
+ "0.33.0"
789
+ ],
790
+ "kernel": [
791
+ "4.19.56"
792
+ ],
793
+ "rkt": [
794
+ "1.30.0"
795
+ ],
796
+ "systemd": [
797
+ "241"
798
+ ]
799
+ },
800
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2135.6.0):\n\n- intel-microcode [20190618](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20190618/releasenote)\n- Linux [4.19.56](https://lwn.net/Articles/792009/)"
801
+ },
802
+ "2191.4.0": {
803
+ "channel": "stable",
804
+ "architectures": [
805
+ "amd64"
806
+ ],
807
+ "release_date": "2019-08-16 09:42:56 +0000",
808
+ "major_software": {
809
+ "docker": [
810
+ "18.06.3"
811
+ ],
812
+ "ignition": [
813
+ "0.33.0"
814
+ ],
815
+ "kernel": [
816
+ "4.19.65"
817
+ ],
818
+ "rkt": [
819
+ "1.30.0"
820
+ ],
821
+ "systemd": [
822
+ "241"
823
+ ]
824
+ },
825
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2191.4.0):\n\nSecurity fixes:\n- Use secure_getenv to fix a vulnerability around XDG_SEAT in pam_systemd (https://github.com/coreos/systemd/pull/118) ([CVE-2019-3842](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842))\n\nUpdates:\n- Linux [4.19.65](https://lwn.net/Articles/795525/)\n\n## Flatcar updates\n\nBug fixes:\n- Fix wrong key name for fw_cfg in ignition with QEMU (https://github.com/flatcar-linux/ignition/issues/2)\n- Get SELinux context included in torcx tarballs (https://github.com/flatcar-linux/scripts/pull/16)\n- Enable XattrPrivileged for untar to fix SELinux issue (https://github.com/flatcar-linux/torcx/pull/1)\n\nChanges:\n- Add \"-s\" flag in flatcar-install to install to smallest disk (https://github.com/flatcar-linux/init/pull/7)"
826
+ },
827
+ "2191.4.1": {
828
+ "channel": "stable",
829
+ "architectures": [
830
+ "amd64"
831
+ ],
832
+ "release_date": "2019-08-30 07:36:13 +0000",
833
+ "major_software": {
834
+ "docker": [
835
+ "18.06.3"
836
+ ],
837
+ "ignition": [
838
+ "0.33.0"
839
+ ],
840
+ "kernel": [
841
+ "4.19.66"
842
+ ],
843
+ "rkt": [
844
+ "1.30.0"
845
+ ],
846
+ "systemd": [
847
+ "241"
848
+ ]
849
+ },
850
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2191.4.1):\n\nSecurity fixes:\n- Fix wget buffer overflow allowing arbitrary code execution ([CVE-2019-5953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953))\n\nUpdates:\n- Linux [4.19.66](https://lwn.net/Articles/795843/)\n- wget [1.20.3](http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS?h=v1.20.3&id=a220ead43505bc3e0ea8efb1572919111dbbf6dc#n8)"
851
+ },
852
+ "2191.5.0": {
853
+ "channel": "stable",
854
+ "architectures": [
855
+ "amd64"
856
+ ],
857
+ "release_date": "2019-09-05 08:52:34 +0000",
858
+ "major_software": {
859
+ "docker": [
860
+ "18.06.3"
861
+ ],
862
+ "ignition": [
863
+ "0.33.0"
864
+ ],
865
+ "kernel": [
866
+ "4.19.68"
867
+ ],
868
+ "rkt": [
869
+ "1.30.0"
870
+ ],
871
+ "systemd": [
872
+ "241"
873
+ ]
874
+ },
875
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2191.5.0):\n\nSecurity fixes:\n\n- Fix pam_systemd bug allowing authenticated remote users to perform polkit actions as if locally logged in ([CVE-2019-3842](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842))\n- Fix systemd-resolved bug allowing unprivileged users to change DNS settings ([CVE-2019-15718](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15718))\n\nBug fixes:\n\n- Fix GCE agent crash loop in new installs ([#2608](https://github.com/coreos/bugs/issues/2608))\n\nUpdates:\n\n- Linux [4.19.68](https://lwn.net/Articles/797250/)"
876
+ },
877
+ "2247.5.0": {
878
+ "channel": "stable",
879
+ "architectures": [
880
+ "amd64"
881
+ ],
882
+ "release_date": "2019-10-17 18:54:06 +0000",
883
+ "major_software": {
884
+ "docker": [
885
+ "18.06.3"
886
+ ],
887
+ "ignition": [
888
+ "0.33.0"
889
+ ],
890
+ "kernel": [
891
+ "4.19.78"
892
+ ],
893
+ "rkt": [
894
+ "1.30.0"
895
+ ],
896
+ "systemd": [
897
+ "241"
898
+ ]
899
+ },
900
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2247.5.0):\n\nNo changes for stable promotion"
901
+ },
902
+ "2247.6.0": {
903
+ "channel": "stable",
904
+ "architectures": [
905
+ "amd64"
906
+ ],
907
+ "release_date": "2019-11-11 14:11:52 +0000",
908
+ "major_software": {
909
+ "docker": [
910
+ "18.06.3"
911
+ ],
912
+ "ignition": [
913
+ "0.33.0"
914
+ ],
915
+ "kernel": [
916
+ "4.19.78"
917
+ ],
918
+ "rkt": [
919
+ "1.30.0"
920
+ ],
921
+ "systemd": [
922
+ "241"
923
+ ]
924
+ },
925
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2247.6.0):\n\nBug fixes:\n\n- Fix time zone for Brazil ([#2627](https://github.com/coreos/bugs/issues/2627))\n\nUpdates:\n\n- timezone-data [2019c](http://mm.icann.org/pipermail/tz-announce/2019-September/000057.html)"
926
+ },
927
+ "2247.7.0": {
928
+ "channel": "stable",
929
+ "architectures": [
930
+ "amd64"
931
+ ],
932
+ "release_date": "2019-11-21 09:27:14 +0000",
933
+ "major_software": {
934
+ "docker": [
935
+ "18.06.3"
936
+ ],
937
+ "ignition": [
938
+ "0.33.0"
939
+ ],
940
+ "kernel": [
941
+ "4.19.84"
942
+ ],
943
+ "rkt": [
944
+ "1.30.0"
945
+ ],
946
+ "systemd": [
947
+ "241"
948
+ ]
949
+ },
950
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2247.7.0):\n\nSecurity fixes:\n\n- Fix Intel CPU disclosure of memory to user process. Complete mitigation requires [manually disabling TSX or SMT](https://docs.flatcar-linux.org/os/disabling-smt/) on affected processors. ([CVE-2019-11135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135), [TAA](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html))\n- Fix Intel CPU denial of service by a malicious guest VM ([CVE-2018-12207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207))\n\nBug fixes:\n\n- Fix CFS scheduler throttling highly-threaded I/O-bound applications ([#2623](https://github.com/coreos/bugs/issues/2623))\n\nUpdates:\n\n- intel-microcode [20191115](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20191115/releasenote)\n- Linux [4.19.84](https://lwn.net/Articles/804465/)"
951
+ },
952
+ "2303.3.0": {
953
+ "channel": "stable",
954
+ "architectures": [
955
+ "amd64"
956
+ ],
957
+ "release_date": "2019-12-05 06:33:04 +0000",
958
+ "major_software": {
959
+ "docker": [
960
+ "18.06.3"
961
+ ],
962
+ "ignition": [
963
+ "0.33.0"
964
+ ],
965
+ "kernel": [
966
+ "4.19.86"
967
+ ],
968
+ "rkt": [
969
+ "1.30.0"
970
+ ],
971
+ "systemd": [
972
+ "241"
973
+ ]
974
+ },
975
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2303.3.0):\n\nUpdates:\n - Linux [4.19.86](https://lwn.net/Articles/805531/)"
976
+ },
977
+ "2303.3.1": {
978
+ "channel": "stable",
979
+ "architectures": [
980
+ "amd64"
981
+ ],
982
+ "release_date": "2019-12-18 09:49:23 +0000",
983
+ "major_software": {
984
+ "docker": [
985
+ "18.06.3"
986
+ ],
987
+ "ignition": [
988
+ "0.33.0"
989
+ ],
990
+ "kernel": [
991
+ "4.19.86"
992
+ ],
993
+ "rkt": [
994
+ "1.30.0"
995
+ ],
996
+ "systemd": [
997
+ "241"
998
+ ]
999
+ },
1000
+ "release_notes": "## Flatcar updates\n\nBug fixes:\n\n- Fix a bug when creating RAID0 arrays by setting the default layout (https://github.com/flatcar-linux/baselayout/pull/2)\n- Fix bug of unpacking tarballs failing when xattr is not supported (https://github.com/flatcar-linux/torcx/pull/2)\n\nUpdates:\n\n- ldb [1.3.6](https://gitlab.com/samba-team/samba/-/tags/ldb-1.3.6)\n- samba [4.8.6](https://gitlab.com/samba-team/samba/-/tags/samba-4.8.6)\n- talloc [2.1.11](https://gitlab.com/samba-team/samba/-/tags/talloc-2.1.11)\n- tdb [1.3.15](https://gitlab.com/samba-team/samba/-/tags/tdb-1.3.15)\n- tevent [0.9.37](https://gitlab.com/samba-team/samba/-/tags/tevent-0.9.37)"
1001
+ },
1002
+ "2303.4.0": {
1003
+ "channel": "stable",
1004
+ "architectures": [
1005
+ "amd64"
1006
+ ],
1007
+ "release_date": "2020-02-10 11:10:47 +0000",
1008
+ "major_software": {
1009
+ "docker": [
1010
+ "18.06.3"
1011
+ ],
1012
+ "ignition": [
1013
+ "0.33.0"
1014
+ ],
1015
+ "kernel": [
1016
+ "4.19.95"
1017
+ ],
1018
+ "rkt": [
1019
+ "1.30.0"
1020
+ ],
1021
+ "systemd": [
1022
+ "241"
1023
+ ]
1024
+ },
1025
+ "release_notes": "## Flatcar updates\n\nBug fixes:\n- Fix DNS resolution for the GCE metadata server (https://github.com/flatcar-linux/coreos-overlay/pull/160)\n- Create symlink for /run/metadata/coreos (https://github.com/flatcar-linux/coreos-overlay/pull/166)\n- Create symlink for flatcar-install (https://github.com/flatcar-linux/init/pull/14)\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2303.4.0):\n\nUpdates:\n- Linux [4.19.95](https://lwn.net/Articles/809258/)"
1026
+ },
1027
+ "2345.3.0": {
1028
+ "channel": "stable",
1029
+ "architectures": [
1030
+ "amd64"
1031
+ ],
1032
+ "release_date": "2020-03-02 14:03:06 +0000",
1033
+ "major_software": {
1034
+ "docker": [
1035
+ "18.06.3"
1036
+ ],
1037
+ "ignition": [
1038
+ "0.33.0"
1039
+ ],
1040
+ "kernel": [
1041
+ "4.19.106"
1042
+ ],
1043
+ "rkt": [
1044
+ "1.30.0"
1045
+ ],
1046
+ "systemd": [
1047
+ "241"
1048
+ ]
1049
+ },
1050
+ "release_notes": "## Flatcar updates\nBug fixes:\n- Enable persistent network interface names already in the initramfs to fix https://github.com/coreos/bugs/issues/1767\n- Fix backwards compatibility issues for users to migrate from CoreOS Container Linux. Support the kernel command line parameters `coreos.oem.*`, `coreos.autologin`, `coreos.first_boot`, and the QEMU firmware config path `opt/com.coreos/config` (https://github.com/flatcar-linux/Flatcar/issues/16 https://github.com/flatcar-linux/afterburn/pull/7 https://github.com/flatcar-linux/bootengine/pull/7 https://github.com/flatcar-linux/bootengine/pull/8 https://github.com/flatcar-linux/init/pull/16 https://github.com/flatcar-linux/init/pull/17 https://github.com/flatcar-linux/ignition/pull/8)\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2345.3.0)\nSecurity fixes:\n- Fix systemd use-after-free upon receiving crafted D-Bus message from local unprivileged attacker [CVE-2020-1712](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712)\n- Fix heap-based buffer over-read in libexpat ([CVE-2019-15903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903))\n- Fix multiple Git [vulnerabilities](https://marc.info/?l=git&m=157600115215285&w=2) ([CVE-2019-1348](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348), [CVE-2019-1349](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349), [CVE-2019-1350](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350), [CVE-2019-1351](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351), [CVE-2019-1352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352), [CVE-2019-1353](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353), [CVE-2019-1354](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354), [CVE-2019-1387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387), [CVE-2019-19604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604))\n- Fix curl Kerberos FTP double free ([CVE-2019-5481](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481))\n - Fix curl TFTP buffer overflow with non-default block size ([CVE-2019-5482](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482))\n - Fix OpenSSL key extraction attacks under non-default conditions ([CVE-2019-1563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563), [CVE-2019-1547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547))\n\nUpdates:\n\n- Git [2.24.1](https://github.com/git/git/blob/master/Documentation/RelNotes/2.24.1.txt)\n- Linux [4.19.106](https://lwn.net/Articles/813157/)\n- OpenSSL [1.0.2t](https://www.openssl.org/news/cl102.txt)\n- curl [7.66.0](https://curl.haxx.se/mail/archive-2019-09/0002.html)\n- etcd [3.3.18](https://github.com/etcd-io/etcd/releases/tag/v3.3.18)\n- expat [2.2.8](https://github.com/libexpat/libexpat/releases/tag/R_2_2_8)\n"
1051
+ },
1052
+ "current": {
1053
+ "channel": "stable",
1054
+ "architectures": [
1055
+ "amd64"
1056
+ ],
1057
+ "release_date": "2020-03-02 14:03:06 +0000",
1058
+ "major_software": {
1059
+ "docker": [
1060
+ "18.06.3"
1061
+ ],
1062
+ "ignition": [
1063
+ "0.33.0"
1064
+ ],
1065
+ "kernel": [
1066
+ "4.19.106"
1067
+ ],
1068
+ "rkt": [
1069
+ "1.30.0"
1070
+ ],
1071
+ "systemd": [
1072
+ "241"
1073
+ ]
1074
+ },
1075
+ "release_notes": "## Flatcar updates\nBug fixes:\n- Enable persistent network interface names already in the initramfs to fix https://github.com/coreos/bugs/issues/1767\n- Fix backwards compatibility issues for users to migrate from CoreOS Container Linux. Support the kernel command line parameters `coreos.oem.*`, `coreos.autologin`, `coreos.first_boot`, and the QEMU firmware config path `opt/com.coreos/config` (https://github.com/flatcar-linux/Flatcar/issues/16 https://github.com/flatcar-linux/afterburn/pull/7 https://github.com/flatcar-linux/bootengine/pull/7 https://github.com/flatcar-linux/bootengine/pull/8 https://github.com/flatcar-linux/init/pull/16 https://github.com/flatcar-linux/init/pull/17 https://github.com/flatcar-linux/ignition/pull/8)\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2345.3.0)\nSecurity fixes:\n- Fix systemd use-after-free upon receiving crafted D-Bus message from local unprivileged attacker [CVE-2020-1712](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712)\n- Fix heap-based buffer over-read in libexpat ([CVE-2019-15903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903))\n- Fix multiple Git [vulnerabilities](https://marc.info/?l=git&m=157600115215285&w=2) ([CVE-2019-1348](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348), [CVE-2019-1349](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349), [CVE-2019-1350](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350), [CVE-2019-1351](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351), [CVE-2019-1352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352), [CVE-2019-1353](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353), [CVE-2019-1354](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354), [CVE-2019-1387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387), [CVE-2019-19604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604))\n- Fix curl Kerberos FTP double free ([CVE-2019-5481](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481))\n - Fix curl TFTP buffer overflow with non-default block size ([CVE-2019-5482](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482))\n - Fix OpenSSL key extraction attacks under non-default conditions ([CVE-2019-1563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563), [CVE-2019-1547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547))\n\nUpdates:\n\n- Git [2.24.1](https://github.com/git/git/blob/master/Documentation/RelNotes/2.24.1.txt)\n- Linux [4.19.106](https://lwn.net/Articles/813157/)\n- OpenSSL [1.0.2t](https://www.openssl.org/news/cl102.txt)\n- curl [7.66.0](https://curl.haxx.se/mail/archive-2019-09/0002.html)\n- etcd [3.3.18](https://github.com/etcd-io/etcd/releases/tag/v3.3.18)\n- expat [2.2.8](https://github.com/libexpat/libexpat/releases/tag/R_2_2_8)\n"
1076
+ }
1077
+ }