smart_proxy_omaha 0.0.5 → 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2,4 +2,5 @@
2
2
  :enabled: true
3
3
  :contentpath: '/var/lib/foreman-proxy/omaha/content'
4
4
  :sync_releases: 2
5
+ :distribution: coreos
5
6
  #:proxy: 'http://127.0.0.1:3128'
@@ -11,8 +11,8 @@ Gem::Specification.new do |s|
11
11
  s.extra_rdoc_files = ['README.md', 'LICENSE']
12
12
  s.files = `git ls-files`.split("\n") - ['.gitignore']
13
13
  s.executables = ['smart-proxy-omaha-sync']
14
- s.homepage = 'http://github.com/theforeman/smart_proxy_omaha'
15
- s.license = 'GPLv3'
14
+ s.homepage = 'https://github.com/theforeman/smart_proxy_omaha'
15
+ s.license = 'GPL-3.0'
16
16
 
17
17
  s.add_dependency('nokogiri', '>= 1.5.11')
18
18
  s.add_dependency('json')
@@ -0,0 +1,3 @@
1
+ -----BEGIN CERTIFICATE-----
2
+ THIS IS SUPPOSED TO BE A CERTIFICATE
3
+ -----END CERTIFICATE-----
@@ -0,0 +1,1077 @@
1
+ {
2
+ "1688.5.3": {
3
+ "channel": "stable",
4
+ "architectures": [
5
+ "amd64"
6
+ ],
7
+ "release_date": "2018-04-25 14:36:41 +0000",
8
+ "major_software": {
9
+ "docker": [
10
+ "17.12.1"
11
+ ],
12
+ "ignition": [
13
+ "0.22.0"
14
+ ],
15
+ "kernel": [
16
+ "4.14.32"
17
+ ],
18
+ "rkt": [
19
+ "1.29.0"
20
+ ],
21
+ "systemd": [
22
+ "237"
23
+ ]
24
+ },
25
+ "release_notes": "## Flatcar updates\n\nInitial Flatcar release.\n\nBug fixes:\n- Fix GRUB crash at boot ([#2284](https://github.com/coreos/bugs/issues/2284))\n- Fix [poweroff problems](https://groups.google.com/forum/#!topic/coreos-user/YcGkRHU9SvQ) ([#8080](https://github.com/systemd/systemd/pull/8080))\n\nNotes:\n- Previous test images have been removed from the release servers. This is due to a new update key being generated using our updated security policy which we [included](https://github.com/flatcar-linux/coreos-overlay/pull/6) in the first public image.\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1688.5.3):\n\nBug fixes:\n- ~~Avoid GRUB crash at boot ([#2284](https://github.com/coreos/bugs/issues/2284))~~ We've included the [real fix for this](https://github.com/flatcar-linux/grub/commit/8281b03be34552e744fd08aae78b38704e2562b5).\n- Fix kernel panic with vxlan ([#2382](https://github.com/coreos/bugs/issues/2382))"
26
+ },
27
+ "1745.3.1": {
28
+ "channel": "stable",
29
+ "architectures": [
30
+ "amd64"
31
+ ],
32
+ "release_date": "2018-05-26 15:29:48 +0000",
33
+ "major_software": {
34
+ "docker": [
35
+ "18.03.1"
36
+ ],
37
+ "ignition": [
38
+ "0.24.1"
39
+ ],
40
+ "kernel": [
41
+ "4.14.42"
42
+ ],
43
+ "rkt": [
44
+ "1.29.0"
45
+ ],
46
+ "systemd": [
47
+ "238"
48
+ ]
49
+ },
50
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.3.1):\n\nUpdates:\n- Ignition [0.24.1](https://github.com/coreos/ignition/releases/tag/v0.24.1)\n- Linux [4.14.42](https://lwn.net/Articles/754972/)"
51
+ },
52
+ "1745.4.0": {
53
+ "channel": "stable",
54
+ "architectures": [
55
+ "amd64"
56
+ ],
57
+ "release_date": "2018-05-27 09:02:48 +0000",
58
+ "major_software": {
59
+ "docker": [
60
+ "18.03.1"
61
+ ],
62
+ "ignition": [
63
+ "0.24.1"
64
+ ],
65
+ "kernel": [
66
+ "4.14.42"
67
+ ],
68
+ "rkt": [
69
+ "1.29.0"
70
+ ],
71
+ "systemd": [
72
+ "238"
73
+ ]
74
+ },
75
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.4.0):\n\nBug fixes:\n- Fix inadvertent change of network interface names ([#2437](https://github.com/coreos/bugs/issues/2437))"
76
+ },
77
+ "1745.5.0": {
78
+ "channel": "stable",
79
+ "architectures": [
80
+ "amd64"
81
+ ],
82
+ "release_date": "2018-06-01 13:23:44 +0000",
83
+ "major_software": {
84
+ "docker": [
85
+ "18.03.1"
86
+ ],
87
+ "ignition": [
88
+ "0.24.1"
89
+ ],
90
+ "kernel": [
91
+ "4.14.44"
92
+ ],
93
+ "rkt": [
94
+ "1.29.0"
95
+ ],
96
+ "systemd": [
97
+ "238"
98
+ ]
99
+ },
100
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.5.0):\n\nSecurity fixes:\n- Fix Git arbitrary code execution when cloning untrusted repositories ([CVE-2018-11235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235))\n\nBug fixes:\n- Fix failure to set network interface MTU ([#2443](https://github.com/coreos/bugs/issues/2443))\n\nUpdates:\n- Git [2.16.4](https://raw.githubusercontent.com/git/git/v2.16.4/Documentation/RelNotes/2.16.4.txt)\n- Linux [4.14.44](https://lwn.net/Articles/755717/)"
101
+ },
102
+ "1745.6.0": {
103
+ "channel": "stable",
104
+ "architectures": [
105
+ "amd64"
106
+ ],
107
+ "release_date": "2018-06-13 13:21:16 +0000",
108
+ "major_software": {
109
+ "docker": [
110
+ "18.03.1"
111
+ ],
112
+ "ignition": [
113
+ "0.24.1"
114
+ ],
115
+ "kernel": [
116
+ "4.14.48"
117
+ ],
118
+ "rkt": [
119
+ "1.29.0"
120
+ ],
121
+ "systemd": [
122
+ "238"
123
+ ]
124
+ },
125
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.6.0):\n\nBug fixes:\n- Fix Hyper-V network driver regression ([#2454](https://github.com/coreos/bugs/issues/2454))\n\nUpdates:\n- Linux [4.14.48](https://lwn.net/Articles/756652/)"
126
+ },
127
+ "1745.7.0": {
128
+ "channel": "stable",
129
+ "architectures": [
130
+ "amd64"
131
+ ],
132
+ "release_date": "2018-06-15 14:51:25 +0000",
133
+ "major_software": {
134
+ "docker": [
135
+ "18.03.1"
136
+ ],
137
+ "ignition": [
138
+ "0.24.1"
139
+ ],
140
+ "kernel": [
141
+ "4.14.48"
142
+ ],
143
+ "rkt": [
144
+ "1.29.0"
145
+ ],
146
+ "systemd": [
147
+ "238"
148
+ ]
149
+ },
150
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1745.7.0):\n\nBug fixes:\n- Fix TCP connection stalls ([#2457](https://github.com/coreos/bugs/issues/2457))"
151
+ },
152
+ "1800.4.0": {
153
+ "channel": "stable",
154
+ "architectures": [
155
+ "amd64"
156
+ ],
157
+ "release_date": "2018-07-26 09:38:46 +0000",
158
+ "major_software": {
159
+ "docker": [
160
+ "18.03.1"
161
+ ],
162
+ "ignition": [
163
+ "0.25.1"
164
+ ],
165
+ "kernel": [
166
+ "4.14.55"
167
+ ],
168
+ "rkt": [
169
+ "1.30.0"
170
+ ],
171
+ "systemd": [
172
+ "238"
173
+ ]
174
+ },
175
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1800.4.0):\n\nNo changes for stable promotion"
176
+ },
177
+ "1800.5.0": {
178
+ "channel": "stable",
179
+ "architectures": [
180
+ "amd64"
181
+ ],
182
+ "release_date": "2018-07-31 09:16:01 +0000",
183
+ "major_software": {
184
+ "docker": [
185
+ "18.03.1"
186
+ ],
187
+ "ignition": [
188
+ "0.25.1"
189
+ ],
190
+ "kernel": [
191
+ "4.14.59"
192
+ ],
193
+ "rkt": [
194
+ "1.30.0"
195
+ ],
196
+ "systemd": [
197
+ "238"
198
+ ]
199
+ },
200
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1800.5.0):\n\nBug fixes:\n- Fix kernel CIFS client ([#2480](https://github.com/coreos/bugs/issues/2480))\n\nUpdates:\n- Linux [4.14.59](https://lwn.net/Articles/761180/)"
201
+ },
202
+ "1800.6.0": {
203
+ "channel": "stable",
204
+ "architectures": [
205
+ "amd64"
206
+ ],
207
+ "release_date": "2018-08-08 10:49:51 +0000",
208
+ "major_software": {
209
+ "docker": [
210
+ "18.03.1"
211
+ ],
212
+ "ignition": [
213
+ "0.25.1"
214
+ ],
215
+ "kernel": [
216
+ "4.14.59"
217
+ ],
218
+ "rkt": [
219
+ "1.30.0"
220
+ ],
221
+ "systemd": [
222
+ "238"
223
+ ]
224
+ },
225
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1800.6.0):\n\nSecurity fixes:\n- Fix Linux local denial of service as Xen PV guest ([CVE-2018-14678](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678))\n\nBug fixes:\n- Fix failure to mount large ext4 filesystems ([#2485](https://github.com/coreos/bugs/issues/2485))"
226
+ },
227
+ "1800.7.0": {
228
+ "channel": "stable",
229
+ "architectures": [
230
+ "amd64"
231
+ ],
232
+ "release_date": "2018-08-17 12:07:54 +0000",
233
+ "major_software": {
234
+ "docker": [
235
+ "18.03.1"
236
+ ],
237
+ "ignition": [
238
+ "0.25.1"
239
+ ],
240
+ "kernel": [
241
+ "4.14.63"
242
+ ],
243
+ "rkt": [
244
+ "1.30.0"
245
+ ],
246
+ "systemd": [
247
+ "238"
248
+ ]
249
+ },
250
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1800.7.0):\n\nSecurity fixes:\n- Fix Linux remote denial of service ([FragmentSmack](https://access.redhat.com/security/cve/cve-2018-5391), [CVE-2018-5391](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391))\n- Fix Linux privileged memory access via speculative execution ([L1TF/Foreshadow](https://foreshadowattack.eu/), [CVE-2018-3620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620), [CVE-2018-3646](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646))\n\nUpdates:\n- intel-microcode [20180703](https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File)\n- Linux [4.14.63](https://lwn.net/Articles/762808/)"
251
+ },
252
+ "1855.4.0": {
253
+ "channel": "stable",
254
+ "architectures": [
255
+ "amd64"
256
+ ],
257
+ "release_date": "2018-09-14 09:59:47 +0000",
258
+ "major_software": {
259
+ "docker": [
260
+ "18.06.1"
261
+ ],
262
+ "ignition": [
263
+ "0.26.0"
264
+ ],
265
+ "kernel": [
266
+ "4.14.67"
267
+ ],
268
+ "rkt": [
269
+ "1.30.0"
270
+ ],
271
+ "systemd": [
272
+ "238"
273
+ ]
274
+ },
275
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1855.4.0):\n\nBug fixes:\n- Fix Docker mounting named volumes ([#2497](https://github.com/coreos/bugs/issues/2497))\n"
276
+ },
277
+ "1855.4.2": {
278
+ "channel": "stable",
279
+ "architectures": [
280
+ "amd64"
281
+ ],
282
+ "release_date": "2018-10-11 20:17:03 +0000",
283
+ "major_software": {
284
+ "docker": [
285
+ "18.06.1"
286
+ ],
287
+ "ignition": [
288
+ "0.26.0"
289
+ ],
290
+ "kernel": [
291
+ "4.14.67"
292
+ ],
293
+ "rkt": [
294
+ "1.30.0"
295
+ ],
296
+ "systemd": [
297
+ "238"
298
+ ]
299
+ },
300
+ "release_notes": "## Flatcar updates\n\nChanges:\n\n* Add new image signing subkey to `flatcar-install` ([flatcar-linux/init#4](https://github.com/flatcar-linux/init/pull/4))\n"
301
+ },
302
+ "1855.5.0": {
303
+ "channel": "stable",
304
+ "architectures": [
305
+ "amd64"
306
+ ],
307
+ "release_date": "2018-10-26 10:13:33 +0000",
308
+ "major_software": {
309
+ "docker": [
310
+ "18.06.1"
311
+ ],
312
+ "ignition": [
313
+ "0.26.0"
314
+ ],
315
+ "kernel": [
316
+ "4.14.74"
317
+ ],
318
+ "rkt": [
319
+ "1.30.0"
320
+ ],
321
+ "systemd": [
322
+ "238"
323
+ ]
324
+ },
325
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1855.5.0):\n\nSecurity fixes:\n- Fix Git remote code execution during recursive clone ([CVE-2018-17456](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456))\n\nUpdates:\n- Git [2.16.5](https://raw.githubusercontent.com/git/git/v2.16.5/Documentation/RelNotes/2.16.5.txt)\n- Linux [4.14.74](https://lwn.net/Articles/767628/)"
326
+ },
327
+ "1911.3.0": {
328
+ "channel": "stable",
329
+ "architectures": [
330
+ "amd64"
331
+ ],
332
+ "release_date": "2018-11-08 16:14:37 +0000",
333
+ "major_software": {
334
+ "docker": [
335
+ "18.06.1"
336
+ ],
337
+ "ignition": [
338
+ "0.28.0"
339
+ ],
340
+ "kernel": [
341
+ "4.14.78"
342
+ ],
343
+ "rkt": [
344
+ "1.30.0"
345
+ ],
346
+ "systemd": [
347
+ "238"
348
+ ]
349
+ },
350
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1911.3.0):\n\nSecurity fixes:\n- Fix systemd re-executing with arbitrary supplied state ([CVE-2018-15686](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686))\n- Fix systemd race allowing changing file permissions ([CVE-2018-15687](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687))\n- Fix systemd-networkd buffer overflow in the dhcp6 client ([CVE-2018-15688](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688))"
351
+ },
352
+ "1911.4.0": {
353
+ "channel": "stable",
354
+ "architectures": [
355
+ "amd64"
356
+ ],
357
+ "release_date": "2018-11-27 14:54:50 +0000",
358
+ "major_software": {
359
+ "docker": [
360
+ "18.06.1"
361
+ ],
362
+ "ignition": [
363
+ "0.28.0"
364
+ ],
365
+ "kernel": [
366
+ "4.14.81"
367
+ ],
368
+ "rkt": [
369
+ "1.30.0"
370
+ ],
371
+ "systemd": [
372
+ "238"
373
+ ]
374
+ },
375
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1911.4.0):\n\nSecurity fixes:\n- Disable containerd CRI plugin to stop it from listening on a TCP port ([#2524](https://github.com/coreos/bugs/issues/2524))\n\nUpdates:\n- Linux [4.14.81](https://lwn.net/Articles/771885/)"
376
+ },
377
+ "1911.5.0": {
378
+ "channel": "stable",
379
+ "architectures": [
380
+ "amd64"
381
+ ],
382
+ "release_date": "2018-12-21 09:08:00 +0000",
383
+ "major_software": {
384
+ "docker": [
385
+ "18.06.1"
386
+ ],
387
+ "ignition": [
388
+ "0.28.0"
389
+ ],
390
+ "kernel": [
391
+ "4.14.84"
392
+ ],
393
+ "rkt": [
394
+ "1.30.0"
395
+ ],
396
+ "systemd": [
397
+ "238"
398
+ ]
399
+ },
400
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1911.5.0):\n\nSecurity fixes:\n- Fix Go CPU denial of service in X.509 verification ([CVE-2018-16875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16875))\n- Fix PolicyKit always authorizing UIDs greater than `INT_MAX` ([CVE-2018-19788](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19788))\n\nUpdates:\n- Go [1.10.6](https://golang.org/doc/devel/release.html#go1.10.minor)\n- Go [1.11.3](https://golang.org/doc/devel/release.html#go1.11.minor)\n- Linux [4.14.84](https://lwn.net/Articles/773114/)"
401
+ },
402
+ "1967.3.0": {
403
+ "channel": "stable",
404
+ "architectures": [
405
+ "amd64"
406
+ ],
407
+ "release_date": "2019-01-28 11:05:20 +0000",
408
+ "major_software": {
409
+ "docker": [
410
+ "18.06.1"
411
+ ],
412
+ "ignition": [
413
+ "0.28.0"
414
+ ],
415
+ "kernel": [
416
+ "4.14.88"
417
+ ],
418
+ "rkt": [
419
+ "1.30.0"
420
+ ],
421
+ "systemd": [
422
+ "238"
423
+ ]
424
+ },
425
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.3.0):\n\nNo changes for stable promotion"
426
+ },
427
+ "1967.3.1": {
428
+ "channel": "stable",
429
+ "architectures": [
430
+ "amd64"
431
+ ],
432
+ "release_date": "2019-01-28 10:32:57 +0000",
433
+ "major_software": {
434
+ "docker": [
435
+ "18.06.1"
436
+ ],
437
+ "ignition": [
438
+ "0.28.0"
439
+ ],
440
+ "kernel": [
441
+ "4.14.88"
442
+ ],
443
+ "rkt": [
444
+ "1.30.0"
445
+ ],
446
+ "systemd": [
447
+ "238"
448
+ ]
449
+ },
450
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.3.0):\n\nNo changes for stable promotion\n\n## Flatcar updates\n\nChanges:\n- [Fix the previous update of Flatcar](https://github.com/flatcar-linux/coreos-overlay/blob/build-1967.3.1/coreos-base/coreos-init/coreos-init-9999.ebuild#L13) where instead of https://github.com/flatcar-linux/init the upstream coreos-init package was referenced and used accidentally."
451
+ },
452
+ "1967.4.0": {
453
+ "channel": "stable",
454
+ "architectures": [
455
+ "amd64"
456
+ ],
457
+ "release_date": "2019-01-30 13:45:29 +0000",
458
+ "major_software": {
459
+ "docker": [
460
+ "18.06.1"
461
+ ],
462
+ "ignition": [
463
+ "0.28.0"
464
+ ],
465
+ "kernel": [
466
+ "4.14.96"
467
+ ],
468
+ "rkt": [
469
+ "1.30.0"
470
+ ],
471
+ "systemd": [
472
+ "238"
473
+ ]
474
+ },
475
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.4.0):\n\nUpdates:\n- Linux [4.14.96](https://lwn.net/Articles/777581/)"
476
+ },
477
+ "1967.5.0": {
478
+ "channel": "stable",
479
+ "architectures": [
480
+ "amd64"
481
+ ],
482
+ "release_date": "2019-02-14 10:29:38 +0000",
483
+ "major_software": {
484
+ "docker": [
485
+ "18.06.1"
486
+ ],
487
+ "ignition": [
488
+ "0.28.0"
489
+ ],
490
+ "kernel": [
491
+ "4.14.96"
492
+ ],
493
+ "rkt": [
494
+ "1.30.0"
495
+ ],
496
+ "systemd": [
497
+ "238"
498
+ ]
499
+ },
500
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.5.0):\nSecurity fixes:\n - Fix runc container breakout ([CVE-2019-5736](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736))"
501
+ },
502
+ "1967.6.0": {
503
+ "channel": "stable",
504
+ "architectures": [
505
+ "amd64"
506
+ ],
507
+ "release_date": "2019-02-21 08:40:53 +0000",
508
+ "major_software": {
509
+ "docker": [
510
+ "18.06.1"
511
+ ],
512
+ "ignition": [
513
+ "0.28.0"
514
+ ],
515
+ "kernel": [
516
+ "4.14.96"
517
+ ],
518
+ "rkt": [
519
+ "1.30.0"
520
+ ],
521
+ "systemd": [
522
+ "238"
523
+ ]
524
+ },
525
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v1967.6.0):\n\nBug fixes:\n- Fix kernel POSIX timer rearming ([#2549](https://github.com/coreos/bugs/issues/2549))"
526
+ },
527
+ "2023.4.0": {
528
+ "channel": "stable",
529
+ "architectures": [
530
+ "amd64"
531
+ ],
532
+ "release_date": "2019-02-27 08:52:33 +0000",
533
+ "major_software": {
534
+ "docker": [
535
+ "18.06.1"
536
+ ],
537
+ "ignition": [
538
+ "0.30.0"
539
+ ],
540
+ "kernel": [
541
+ "4.19.23"
542
+ ],
543
+ "rkt": [
544
+ "1.30.0"
545
+ ],
546
+ "systemd": [
547
+ "238"
548
+ ]
549
+ },
550
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2023.4.0):\n\nSecurity fixes:\n- Fix Linux use-after-free in `sockfs_setattr` ([CVE-2019-8912](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8912))"
551
+ },
552
+ "2023.5.0": {
553
+ "channel": "stable",
554
+ "architectures": [
555
+ "amd64"
556
+ ],
557
+ "release_date": "2019-03-12 14:35:58 +0000",
558
+ "major_software": {
559
+ "docker": [
560
+ "18.06.1"
561
+ ],
562
+ "ignition": [
563
+ "0.30.0"
564
+ ],
565
+ "kernel": [
566
+ "4.19.25"
567
+ ],
568
+ "rkt": [
569
+ "1.30.0"
570
+ ],
571
+ "systemd": [
572
+ "238"
573
+ ]
574
+ },
575
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2023.5.0):\n\nSecurity fixes:\n- Fix systemd crash from a specially-crafted D-Bus message ([CVE-2019-6454](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454))\n\nBug fixes:\n- Fix systemd-journald memory leak ([#2564](https://github.com/coreos/bugs/issues/2564))\n\nUpdates:\n- Linux [4.19.25](https://lwn.net/Articles/780611/)"
576
+ },
577
+ "2079.3.0": {
578
+ "channel": "stable",
579
+ "architectures": [
580
+ "amd64"
581
+ ],
582
+ "release_date": "2019-04-24 10:00:10 +0000",
583
+ "major_software": {
584
+ "docker": [
585
+ "18.06.3"
586
+ ],
587
+ "ignition": [
588
+ "0.31.0"
589
+ ],
590
+ "kernel": [
591
+ "4.19.34"
592
+ ],
593
+ "rkt": [
594
+ "1.30.0"
595
+ ],
596
+ "systemd": [
597
+ "241"
598
+ ]
599
+ },
600
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2079.3.0):\n\nNo changes for stable promotion"
601
+ },
602
+ "2079.3.1": {
603
+ "channel": "stable",
604
+ "architectures": [
605
+ "amd64"
606
+ ],
607
+ "release_date": "2019-04-25 10:05:40 +0000",
608
+ "major_software": {
609
+ "docker": [
610
+ "18.06.3"
611
+ ],
612
+ "ignition": [
613
+ "0.31.0"
614
+ ],
615
+ "kernel": [
616
+ "4.19.34"
617
+ ],
618
+ "rkt": [
619
+ "1.30.0"
620
+ ],
621
+ "systemd": [
622
+ "241"
623
+ ]
624
+ },
625
+ "release_notes": "## Flatcar updates\n\nBug fixes:\n\n* Fix a wrong vendor-specific string in [CMDLINE_OEM_FLAG](https://github.com/flatcar-linux/afterburn/blob/f4f0adc6a96a1ba77a0f87b612ecdf21782aa8c6/src/main.rs#L60) in [afterburn](https://github.com/flatcar-linux/afterburn) \n\n"
626
+ },
627
+ "2079.3.2": {
628
+ "channel": "stable",
629
+ "architectures": [
630
+ "amd64"
631
+ ],
632
+ "release_date": "2019-04-26 07:43:52 +0000",
633
+ "major_software": {
634
+ "docker": [
635
+ "18.06.3"
636
+ ],
637
+ "ignition": [
638
+ "0.31.0"
639
+ ],
640
+ "kernel": [
641
+ "4.19.34"
642
+ ],
643
+ "rkt": [
644
+ "1.30.0"
645
+ ],
646
+ "systemd": [
647
+ "241"
648
+ ]
649
+ },
650
+ "release_notes": "## Flatcar updates\n\nBug fixes:\n\n* Fix a regression from the latest hotfix builds, about [CROS_WORKON_COMMIT](https://github.com/flatcar-linux/coreos-overlay/blob/60e44f23a1a5527cfa6bcbc978b1ffdef74e2e3f/coreos-base/coreos-metadata/coreos-metadata-9999.ebuild#L13) in [coreos-overlay](https://github.com/flatcar-linux/coreos-overlay) \n"
651
+ },
652
+ "2079.4.0": {
653
+ "channel": "stable",
654
+ "architectures": [
655
+ "amd64"
656
+ ],
657
+ "release_date": "2019-05-16 10:57:17 +0000",
658
+ "major_software": {
659
+ "docker": [
660
+ "18.06.3"
661
+ ],
662
+ "ignition": [
663
+ "0.31.0"
664
+ ],
665
+ "kernel": [
666
+ "4.19.43"
667
+ ],
668
+ "rkt": [
669
+ "1.30.0"
670
+ ],
671
+ "systemd": [
672
+ "241"
673
+ ]
674
+ },
675
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2079.4.0):\n\nSecurity fixes:\n- Fix Intel CPU disclosure of memory to user process. Complete mitigation requires [manually disabling SMT](https://docs.flatcar-linux.org/os/disabling-smt/) on affected processors. ([CVE-2019-11091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091), [CVE-2018-12126](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126), [CVE-2018-12127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127), [CVE-2018-12130](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130), [MDS](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html))\n\nUpdates:\n- intel-microcode [20190514](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20190514/releasenote)\n- Linux [4.19.43](https://lwn.net/Articles/788388/)"
676
+ },
677
+ "2079.5.0": {
678
+ "channel": "stable",
679
+ "architectures": [
680
+ "amd64"
681
+ ],
682
+ "release_date": "2019-06-06 08:49:52 +0000",
683
+ "major_software": {
684
+ "docker": [
685
+ "18.06.3"
686
+ ],
687
+ "ignition": [
688
+ "0.31.0"
689
+ ],
690
+ "kernel": [
691
+ "4.19.43"
692
+ ],
693
+ "rkt": [
694
+ "1.30.0"
695
+ ],
696
+ "systemd": [
697
+ "241"
698
+ ]
699
+ },
700
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2079.5.0):\n\nBug fixes:\n- Fix systemd `MountFlags=shared` option ([#2579](https://github.com/coreos/bugs/issues/2579))\n\nChanges:\n- Pin network interface naming to systemd v238 scheme ([#2578](https://github.com/coreos/bugs/issues/2578))"
701
+ },
702
+ "2079.6.0": {
703
+ "channel": "stable",
704
+ "architectures": [
705
+ "amd64"
706
+ ],
707
+ "release_date": "2019-06-19 08:15:07 +0000",
708
+ "major_software": {
709
+ "docker": [
710
+ "18.06.3"
711
+ ],
712
+ "ignition": [
713
+ "0.31.0"
714
+ ],
715
+ "kernel": [
716
+ "4.19.43"
717
+ ],
718
+ "rkt": [
719
+ "1.30.0"
720
+ ],
721
+ "systemd": [
722
+ "241"
723
+ ]
724
+ },
725
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2079.6.0):\n\nSecurity fixes:\n\n- Fix Linux TCP remotely-triggerable kernel panic and excessive resource consumption ([CVE-2019-11477](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477), [CVE-2019-11478](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478), [CVE-2019-11479](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479))\n\nBug fixes:\n\n- Fix invalid bzip2 compression of Container Linux release images ([#2589](https://github.com/coreos/bugs/issues/2589))"
726
+ },
727
+ "2135.4.0": {
728
+ "channel": "stable",
729
+ "architectures": [
730
+ "amd64"
731
+ ],
732
+ "release_date": "2019-07-01 10:47:02 +0000",
733
+ "major_software": {
734
+ "docker": [
735
+ "18.06.3"
736
+ ],
737
+ "ignition": [
738
+ "0.32.0"
739
+ ],
740
+ "kernel": [
741
+ "4.19.50"
742
+ ],
743
+ "rkt": [
744
+ "1.30.0"
745
+ ],
746
+ "systemd": [
747
+ "241"
748
+ ]
749
+ },
750
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2135.4.0):\n\nNo changes for stable promotion\n"
751
+ },
752
+ "2135.5.0": {
753
+ "channel": "stable",
754
+ "architectures": [
755
+ "amd64"
756
+ ],
757
+ "release_date": "2019-07-03 08:01:54 +0000",
758
+ "major_software": {
759
+ "docker": [
760
+ "18.06.3"
761
+ ],
762
+ "ignition": [
763
+ "0.33.0"
764
+ ],
765
+ "kernel": [
766
+ "4.19.50"
767
+ ],
768
+ "rkt": [
769
+ "1.30.0"
770
+ ],
771
+ "systemd": [
772
+ "241"
773
+ ]
774
+ },
775
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2135.5.0):\n\nBug fixes:\n\n * Fix Ignition panic when no `guestinfo.(coreos|ignition).config` parameters are specified on VMware (coreos/ignition#821)\n\nUpdates:\n\n * Ignition [0.33.0](https://github.com/coreos/ignition/releases/tag/v0.33.0)\n"
776
+ },
777
+ "2135.6.0": {
778
+ "channel": "stable",
779
+ "architectures": [
780
+ "amd64"
781
+ ],
782
+ "release_date": "2019-08-01 09:14:26 +0000",
783
+ "major_software": {
784
+ "docker": [
785
+ "18.06.3"
786
+ ],
787
+ "ignition": [
788
+ "0.33.0"
789
+ ],
790
+ "kernel": [
791
+ "4.19.56"
792
+ ],
793
+ "rkt": [
794
+ "1.30.0"
795
+ ],
796
+ "systemd": [
797
+ "241"
798
+ ]
799
+ },
800
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2135.6.0):\n\n- intel-microcode [20190618](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20190618/releasenote)\n- Linux [4.19.56](https://lwn.net/Articles/792009/)"
801
+ },
802
+ "2191.4.0": {
803
+ "channel": "stable",
804
+ "architectures": [
805
+ "amd64"
806
+ ],
807
+ "release_date": "2019-08-16 09:42:56 +0000",
808
+ "major_software": {
809
+ "docker": [
810
+ "18.06.3"
811
+ ],
812
+ "ignition": [
813
+ "0.33.0"
814
+ ],
815
+ "kernel": [
816
+ "4.19.65"
817
+ ],
818
+ "rkt": [
819
+ "1.30.0"
820
+ ],
821
+ "systemd": [
822
+ "241"
823
+ ]
824
+ },
825
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2191.4.0):\n\nSecurity fixes:\n- Use secure_getenv to fix a vulnerability around XDG_SEAT in pam_systemd (https://github.com/coreos/systemd/pull/118) ([CVE-2019-3842](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842))\n\nUpdates:\n- Linux [4.19.65](https://lwn.net/Articles/795525/)\n\n## Flatcar updates\n\nBug fixes:\n- Fix wrong key name for fw_cfg in ignition with QEMU (https://github.com/flatcar-linux/ignition/issues/2)\n- Get SELinux context included in torcx tarballs (https://github.com/flatcar-linux/scripts/pull/16)\n- Enable XattrPrivileged for untar to fix SELinux issue (https://github.com/flatcar-linux/torcx/pull/1)\n\nChanges:\n- Add \"-s\" flag in flatcar-install to install to smallest disk (https://github.com/flatcar-linux/init/pull/7)"
826
+ },
827
+ "2191.4.1": {
828
+ "channel": "stable",
829
+ "architectures": [
830
+ "amd64"
831
+ ],
832
+ "release_date": "2019-08-30 07:36:13 +0000",
833
+ "major_software": {
834
+ "docker": [
835
+ "18.06.3"
836
+ ],
837
+ "ignition": [
838
+ "0.33.0"
839
+ ],
840
+ "kernel": [
841
+ "4.19.66"
842
+ ],
843
+ "rkt": [
844
+ "1.30.0"
845
+ ],
846
+ "systemd": [
847
+ "241"
848
+ ]
849
+ },
850
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2191.4.1):\n\nSecurity fixes:\n- Fix wget buffer overflow allowing arbitrary code execution ([CVE-2019-5953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953))\n\nUpdates:\n- Linux [4.19.66](https://lwn.net/Articles/795843/)\n- wget [1.20.3](http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS?h=v1.20.3&id=a220ead43505bc3e0ea8efb1572919111dbbf6dc#n8)"
851
+ },
852
+ "2191.5.0": {
853
+ "channel": "stable",
854
+ "architectures": [
855
+ "amd64"
856
+ ],
857
+ "release_date": "2019-09-05 08:52:34 +0000",
858
+ "major_software": {
859
+ "docker": [
860
+ "18.06.3"
861
+ ],
862
+ "ignition": [
863
+ "0.33.0"
864
+ ],
865
+ "kernel": [
866
+ "4.19.68"
867
+ ],
868
+ "rkt": [
869
+ "1.30.0"
870
+ ],
871
+ "systemd": [
872
+ "241"
873
+ ]
874
+ },
875
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2191.5.0):\n\nSecurity fixes:\n\n- Fix pam_systemd bug allowing authenticated remote users to perform polkit actions as if locally logged in ([CVE-2019-3842](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842))\n- Fix systemd-resolved bug allowing unprivileged users to change DNS settings ([CVE-2019-15718](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15718))\n\nBug fixes:\n\n- Fix GCE agent crash loop in new installs ([#2608](https://github.com/coreos/bugs/issues/2608))\n\nUpdates:\n\n- Linux [4.19.68](https://lwn.net/Articles/797250/)"
876
+ },
877
+ "2247.5.0": {
878
+ "channel": "stable",
879
+ "architectures": [
880
+ "amd64"
881
+ ],
882
+ "release_date": "2019-10-17 18:54:06 +0000",
883
+ "major_software": {
884
+ "docker": [
885
+ "18.06.3"
886
+ ],
887
+ "ignition": [
888
+ "0.33.0"
889
+ ],
890
+ "kernel": [
891
+ "4.19.78"
892
+ ],
893
+ "rkt": [
894
+ "1.30.0"
895
+ ],
896
+ "systemd": [
897
+ "241"
898
+ ]
899
+ },
900
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2247.5.0):\n\nNo changes for stable promotion"
901
+ },
902
+ "2247.6.0": {
903
+ "channel": "stable",
904
+ "architectures": [
905
+ "amd64"
906
+ ],
907
+ "release_date": "2019-11-11 14:11:52 +0000",
908
+ "major_software": {
909
+ "docker": [
910
+ "18.06.3"
911
+ ],
912
+ "ignition": [
913
+ "0.33.0"
914
+ ],
915
+ "kernel": [
916
+ "4.19.78"
917
+ ],
918
+ "rkt": [
919
+ "1.30.0"
920
+ ],
921
+ "systemd": [
922
+ "241"
923
+ ]
924
+ },
925
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2247.6.0):\n\nBug fixes:\n\n- Fix time zone for Brazil ([#2627](https://github.com/coreos/bugs/issues/2627))\n\nUpdates:\n\n- timezone-data [2019c](http://mm.icann.org/pipermail/tz-announce/2019-September/000057.html)"
926
+ },
927
+ "2247.7.0": {
928
+ "channel": "stable",
929
+ "architectures": [
930
+ "amd64"
931
+ ],
932
+ "release_date": "2019-11-21 09:27:14 +0000",
933
+ "major_software": {
934
+ "docker": [
935
+ "18.06.3"
936
+ ],
937
+ "ignition": [
938
+ "0.33.0"
939
+ ],
940
+ "kernel": [
941
+ "4.19.84"
942
+ ],
943
+ "rkt": [
944
+ "1.30.0"
945
+ ],
946
+ "systemd": [
947
+ "241"
948
+ ]
949
+ },
950
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2247.7.0):\n\nSecurity fixes:\n\n- Fix Intel CPU disclosure of memory to user process. Complete mitigation requires [manually disabling TSX or SMT](https://docs.flatcar-linux.org/os/disabling-smt/) on affected processors. ([CVE-2019-11135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135), [TAA](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html))\n- Fix Intel CPU denial of service by a malicious guest VM ([CVE-2018-12207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207))\n\nBug fixes:\n\n- Fix CFS scheduler throttling highly-threaded I/O-bound applications ([#2623](https://github.com/coreos/bugs/issues/2623))\n\nUpdates:\n\n- intel-microcode [20191115](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/microcode-20191115/releasenote)\n- Linux [4.19.84](https://lwn.net/Articles/804465/)"
951
+ },
952
+ "2303.3.0": {
953
+ "channel": "stable",
954
+ "architectures": [
955
+ "amd64"
956
+ ],
957
+ "release_date": "2019-12-05 06:33:04 +0000",
958
+ "major_software": {
959
+ "docker": [
960
+ "18.06.3"
961
+ ],
962
+ "ignition": [
963
+ "0.33.0"
964
+ ],
965
+ "kernel": [
966
+ "4.19.86"
967
+ ],
968
+ "rkt": [
969
+ "1.30.0"
970
+ ],
971
+ "systemd": [
972
+ "241"
973
+ ]
974
+ },
975
+ "release_notes": "## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2303.3.0):\n\nUpdates:\n - Linux [4.19.86](https://lwn.net/Articles/805531/)"
976
+ },
977
+ "2303.3.1": {
978
+ "channel": "stable",
979
+ "architectures": [
980
+ "amd64"
981
+ ],
982
+ "release_date": "2019-12-18 09:49:23 +0000",
983
+ "major_software": {
984
+ "docker": [
985
+ "18.06.3"
986
+ ],
987
+ "ignition": [
988
+ "0.33.0"
989
+ ],
990
+ "kernel": [
991
+ "4.19.86"
992
+ ],
993
+ "rkt": [
994
+ "1.30.0"
995
+ ],
996
+ "systemd": [
997
+ "241"
998
+ ]
999
+ },
1000
+ "release_notes": "## Flatcar updates\n\nBug fixes:\n\n- Fix a bug when creating RAID0 arrays by setting the default layout (https://github.com/flatcar-linux/baselayout/pull/2)\n- Fix bug of unpacking tarballs failing when xattr is not supported (https://github.com/flatcar-linux/torcx/pull/2)\n\nUpdates:\n\n- ldb [1.3.6](https://gitlab.com/samba-team/samba/-/tags/ldb-1.3.6)\n- samba [4.8.6](https://gitlab.com/samba-team/samba/-/tags/samba-4.8.6)\n- talloc [2.1.11](https://gitlab.com/samba-team/samba/-/tags/talloc-2.1.11)\n- tdb [1.3.15](https://gitlab.com/samba-team/samba/-/tags/tdb-1.3.15)\n- tevent [0.9.37](https://gitlab.com/samba-team/samba/-/tags/tevent-0.9.37)"
1001
+ },
1002
+ "2303.4.0": {
1003
+ "channel": "stable",
1004
+ "architectures": [
1005
+ "amd64"
1006
+ ],
1007
+ "release_date": "2020-02-10 11:10:47 +0000",
1008
+ "major_software": {
1009
+ "docker": [
1010
+ "18.06.3"
1011
+ ],
1012
+ "ignition": [
1013
+ "0.33.0"
1014
+ ],
1015
+ "kernel": [
1016
+ "4.19.95"
1017
+ ],
1018
+ "rkt": [
1019
+ "1.30.0"
1020
+ ],
1021
+ "systemd": [
1022
+ "241"
1023
+ ]
1024
+ },
1025
+ "release_notes": "## Flatcar updates\n\nBug fixes:\n- Fix DNS resolution for the GCE metadata server (https://github.com/flatcar-linux/coreos-overlay/pull/160)\n- Create symlink for /run/metadata/coreos (https://github.com/flatcar-linux/coreos-overlay/pull/166)\n- Create symlink for flatcar-install (https://github.com/flatcar-linux/init/pull/14)\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2303.4.0):\n\nUpdates:\n- Linux [4.19.95](https://lwn.net/Articles/809258/)"
1026
+ },
1027
+ "2345.3.0": {
1028
+ "channel": "stable",
1029
+ "architectures": [
1030
+ "amd64"
1031
+ ],
1032
+ "release_date": "2020-03-02 14:03:06 +0000",
1033
+ "major_software": {
1034
+ "docker": [
1035
+ "18.06.3"
1036
+ ],
1037
+ "ignition": [
1038
+ "0.33.0"
1039
+ ],
1040
+ "kernel": [
1041
+ "4.19.106"
1042
+ ],
1043
+ "rkt": [
1044
+ "1.30.0"
1045
+ ],
1046
+ "systemd": [
1047
+ "241"
1048
+ ]
1049
+ },
1050
+ "release_notes": "## Flatcar updates\nBug fixes:\n- Enable persistent network interface names already in the initramfs to fix https://github.com/coreos/bugs/issues/1767\n- Fix backwards compatibility issues for users to migrate from CoreOS Container Linux. Support the kernel command line parameters `coreos.oem.*`, `coreos.autologin`, `coreos.first_boot`, and the QEMU firmware config path `opt/com.coreos/config` (https://github.com/flatcar-linux/Flatcar/issues/16 https://github.com/flatcar-linux/afterburn/pull/7 https://github.com/flatcar-linux/bootengine/pull/7 https://github.com/flatcar-linux/bootengine/pull/8 https://github.com/flatcar-linux/init/pull/16 https://github.com/flatcar-linux/init/pull/17 https://github.com/flatcar-linux/ignition/pull/8)\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2345.3.0)\nSecurity fixes:\n- Fix systemd use-after-free upon receiving crafted D-Bus message from local unprivileged attacker [CVE-2020-1712](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712)\n- Fix heap-based buffer over-read in libexpat ([CVE-2019-15903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903))\n- Fix multiple Git [vulnerabilities](https://marc.info/?l=git&m=157600115215285&w=2) ([CVE-2019-1348](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348), [CVE-2019-1349](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349), [CVE-2019-1350](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350), [CVE-2019-1351](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351), [CVE-2019-1352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352), [CVE-2019-1353](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353), [CVE-2019-1354](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354), [CVE-2019-1387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387), [CVE-2019-19604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604))\n- Fix curl Kerberos FTP double free ([CVE-2019-5481](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481))\n - Fix curl TFTP buffer overflow with non-default block size ([CVE-2019-5482](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482))\n - Fix OpenSSL key extraction attacks under non-default conditions ([CVE-2019-1563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563), [CVE-2019-1547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547))\n\nUpdates:\n\n- Git [2.24.1](https://github.com/git/git/blob/master/Documentation/RelNotes/2.24.1.txt)\n- Linux [4.19.106](https://lwn.net/Articles/813157/)\n- OpenSSL [1.0.2t](https://www.openssl.org/news/cl102.txt)\n- curl [7.66.0](https://curl.haxx.se/mail/archive-2019-09/0002.html)\n- etcd [3.3.18](https://github.com/etcd-io/etcd/releases/tag/v3.3.18)\n- expat [2.2.8](https://github.com/libexpat/libexpat/releases/tag/R_2_2_8)\n"
1051
+ },
1052
+ "current": {
1053
+ "channel": "stable",
1054
+ "architectures": [
1055
+ "amd64"
1056
+ ],
1057
+ "release_date": "2020-03-02 14:03:06 +0000",
1058
+ "major_software": {
1059
+ "docker": [
1060
+ "18.06.3"
1061
+ ],
1062
+ "ignition": [
1063
+ "0.33.0"
1064
+ ],
1065
+ "kernel": [
1066
+ "4.19.106"
1067
+ ],
1068
+ "rkt": [
1069
+ "1.30.0"
1070
+ ],
1071
+ "systemd": [
1072
+ "241"
1073
+ ]
1074
+ },
1075
+ "release_notes": "## Flatcar updates\nBug fixes:\n- Enable persistent network interface names already in the initramfs to fix https://github.com/coreos/bugs/issues/1767\n- Fix backwards compatibility issues for users to migrate from CoreOS Container Linux. Support the kernel command line parameters `coreos.oem.*`, `coreos.autologin`, `coreos.first_boot`, and the QEMU firmware config path `opt/com.coreos/config` (https://github.com/flatcar-linux/Flatcar/issues/16 https://github.com/flatcar-linux/afterburn/pull/7 https://github.com/flatcar-linux/bootengine/pull/7 https://github.com/flatcar-linux/bootengine/pull/8 https://github.com/flatcar-linux/init/pull/16 https://github.com/flatcar-linux/init/pull/17 https://github.com/flatcar-linux/ignition/pull/8)\n\n## [Upstream Container Linux updates](https://github.com/coreos/manifest/releases/tag/v2345.3.0)\nSecurity fixes:\n- Fix systemd use-after-free upon receiving crafted D-Bus message from local unprivileged attacker [CVE-2020-1712](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712)\n- Fix heap-based buffer over-read in libexpat ([CVE-2019-15903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903))\n- Fix multiple Git [vulnerabilities](https://marc.info/?l=git&m=157600115215285&w=2) ([CVE-2019-1348](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348), [CVE-2019-1349](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349), [CVE-2019-1350](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350), [CVE-2019-1351](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351), [CVE-2019-1352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352), [CVE-2019-1353](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353), [CVE-2019-1354](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354), [CVE-2019-1387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387), [CVE-2019-19604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604))\n- Fix curl Kerberos FTP double free ([CVE-2019-5481](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481))\n - Fix curl TFTP buffer overflow with non-default block size ([CVE-2019-5482](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482))\n - Fix OpenSSL key extraction attacks under non-default conditions ([CVE-2019-1563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563), [CVE-2019-1547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547))\n\nUpdates:\n\n- Git [2.24.1](https://github.com/git/git/blob/master/Documentation/RelNotes/2.24.1.txt)\n- Linux [4.19.106](https://lwn.net/Articles/813157/)\n- OpenSSL [1.0.2t](https://www.openssl.org/news/cl102.txt)\n- curl [7.66.0](https://curl.haxx.se/mail/archive-2019-09/0002.html)\n- etcd [3.3.18](https://github.com/etcd-io/etcd/releases/tag/v3.3.18)\n- expat [2.2.8](https://github.com/libexpat/libexpat/releases/tag/R_2_2_8)\n"
1076
+ }
1077
+ }