You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/warp-releases/linux/ga/2025.6.1335.0.yaml
+9-8Lines changed: 9 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -4,17 +4,18 @@ releaseNotes: >-
4
4
5
5
**Changes and improvements**
6
6
7
-
- Fixed an issue preventing devices from reaching split-tunneled traffic even
8
-
when WARP was disconnected.
7
+
- Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected.
9
8
10
-
- Fix to prevent the firewall being re-enabled after user initiated client
11
-
disconnection.
9
+
- Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect.
12
10
13
-
- Improvement for faster client connectivity on high-latency captive portal
14
-
networks.
11
+
- Improvement for faster client connectivity on high-latency captive portal networks.
15
12
16
-
- Fixed an issue where recursive CNAME records could cause intermittent WARP
17
-
connectivity issues.
13
+
- Fixed an issue where recursive CNAME records could cause intermittent WARP connectivity issues.
14
+
15
+
16
+
**Known issues**
17
+
18
+
- Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server).
Copy file name to clipboardExpand all lines: src/content/warp-releases/macos/ga/2025.6.1335.0.yaml
+8-11Lines changed: 8 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -4,24 +4,21 @@ releaseNotes: >-
4
4
5
5
**Changes and improvements**
6
6
7
-
- Fixed an issue preventing devices from reaching split-tunneled traffic even
8
-
when WARP was disconnected.
7
+
- Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected.
9
8
10
-
- Fix to prevent the firewall being re-enabled after user initiated client
11
-
disconnection.
9
+
- Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect.
12
10
13
-
- Improvement for faster client connectivity on high-latency captive portal
14
-
networks.
11
+
- Improvement for faster client connectivity on high-latency captive portal networks.
15
12
16
-
- Fixed an issue where recursive CNAME records could cause intermittent WARP
17
-
connectivity issues.
13
+
- Fixed an issue where recursive CNAME records could cause intermittent WARP connectivity issues.
18
14
19
15
20
16
**Known issues**
21
17
22
-
- macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP
23
-
client may not behave as expected. Cloudflare recommends the use of macOS 15.4
24
-
or later.
18
+
- macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.
19
+
20
+
- Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server).
Copy file name to clipboardExpand all lines: src/content/warp-releases/windows/ga/2025.6.1335.0.yaml
+6-4Lines changed: 6 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -4,21 +4,23 @@ releaseNotes: |-
4
4
**Changes and improvements**
5
5
- Improvements to better manage multi-user pre-login registrations.
6
6
- Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected.
7
-
- Fix to prevent the firewall being re-enabled after user initiated client disconnection.
7
+
- Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect.
8
8
- Improvement for faster client connectivity on high-latency captive portal networks.
9
9
- Fixed an issue where recursive CNAME records could cause intermittent WARP connectivity issues.
10
10
11
11
**Known issues**
12
-
- Microsoft has confirmed a regression with Windows 11 starting around 24H2 that may cause performance issues for some users. These performance issues could manifest as mouse lag, audio cracking, or other slowdowns. Microsoft's recently released preview build, [Windows 11 24H2 KB5060829](https://support.microsoft.com/en-us/topic/june-26-2025-kb5060829-os-build-26100-4484-preview-e31ba7c2-ff65-4863-a462-a66e30840b1a), may resolve these issues.
12
+
- For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum [Windows 11 24H2 version KB5062553](https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd) or higher for resolution.
13
13
14
-
- Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to [version 1.429.19.0](https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0) or later.
14
+
- Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server).
15
+
16
+
- Devices with `KB5055523` installed may receive a warning about `Win32/ClickFix.ABA` being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to [version 1.429.19.0](https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0) or later.
15
17
16
18
- DNS resolution may be broken when the following conditions are all true:
17
19
- WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
18
20
- A custom DNS server address is configured on the primary network adapter.
19
21
- The custom DNS server address on the primary network adapter is changed while WARP is connected.
20
22
21
-
To work around this issue, please reconnect the WARP client by toggling off and back on.
23
+
To work around this issue, reconnect the WARP client by toggling off and back on.
0 commit comments