From fed8658393c9f7a91fe6c75fef44760359c8cf12 Mon Sep 17 00:00:00 2001 From: Ranbel Sun Date: Wed, 23 Jul 2025 18:19:18 -0400 Subject: [PATCH 1/7] raw notes --- .../linux/beta/2025.6.824.1.yaml | 34 +++++++++++++++++++ .../warp-releases/linux/ga/2025.5.943.0.yaml | 33 ++++++++++++++++++ .../warp-releases/macos/ga/2025.5.943.0.yaml | 17 ++++++++++ .../windows/ga/2025.5.943.0.yaml | 27 +++++++++++++++ 4 files changed, 111 insertions(+) create mode 100644 src/content/warp-releases/linux/beta/2025.6.824.1.yaml create mode 100644 src/content/warp-releases/linux/ga/2025.5.943.0.yaml create mode 100644 src/content/warp-releases/macos/ga/2025.5.943.0.yaml create mode 100644 src/content/warp-releases/windows/ga/2025.5.943.0.yaml diff --git a/src/content/warp-releases/linux/beta/2025.6.824.1.yaml b/src/content/warp-releases/linux/beta/2025.6.824.1.yaml new file mode 100644 index 000000000000000..097c8bbe3d35263 --- /dev/null +++ b/src/content/warp-releases/linux/beta/2025.6.824.1.yaml @@ -0,0 +1,34 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected. + - Fix to prevent the firewall being re-enabled after user initiated client disconnection. + - Improvement to managed network detection checks for faster switching between managed networks. + + **Known issues** + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To learn more about configuring a fallback server, please reference the [Zero Trust documentation](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). +version: 2025.6.824.1 +releaseDate: 2025-07-23T21:24:34.194Z +packageURL: https://downloads.cloudflareclient.com/v1/download/centos8-arm/version/2025.6.824.1 +packageSize: 52636230 +platformName: Linux +linuxPlatforms: + centos8-arm: 52636230 + noble-intel: 50974518 + bookworm-arm: 49841630 + focal-intel: 51493190 + centos8-intel: 53572222 + fedora35-arm: 52430708 + buster-arm: 50195866 + focal-arm: 50187524 + bullseye-intel: 51398148 + fedora34-intel: 54019369 + bookworm-intel: 51167848 + fedora34-arm: 52864538 + bullseye-arm: 50095998 + fedora35-intel: 53672865 + noble-arm: 50275664 + jammy-intel: 51175070 + jammy-arm: 49860826 + buster-intel: 51591844 diff --git a/src/content/warp-releases/linux/ga/2025.5.943.0.yaml b/src/content/warp-releases/linux/ga/2025.5.943.0.yaml new file mode 100644 index 000000000000000..752493fd5bf1181 --- /dev/null +++ b/src/content/warp-releases/linux/ga/2025.5.943.0.yaml @@ -0,0 +1,33 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - WARP proxy mode now uses the operating system’s DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. + - Fixed an issue affecting clients in Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. + + **Known issues** + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To learn more about configuring a fallback server, please reference the [Zero Trust documentation](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). +version: 2025.5.943.0 +releaseDate: 2025-07-23T19:17:49.673Z +packageURL: https://downloads.cloudflareclient.com/v1/download/jammy-arm/version/2025.5.943.0 +packageSize: 44271222 +platformName: Linux +linuxPlatforms: + jammy-arm: 44271222 + buster-intel: 45887702 + fedora34-arm: 47307473 + focal-intel: 45800128 + bullseye-arm: 44499920 + bullseye-intel: 45713170 + fedora35-arm: 46915674 + fedora35-intel: 48084438 + noble-arm: 44634472 + fedora34-intel: 48392374 + bookworm-arm: 44255560 + noble-intel: 45349534 + focal-arm: 44569124 + buster-arm: 44577190 + centos8-arm: 47092201 + jammy-intel: 45512998 + bookworm-intel: 45509306 + centos8-intel: 48001094 diff --git a/src/content/warp-releases/macos/ga/2025.5.943.0.yaml b/src/content/warp-releases/macos/ga/2025.5.943.0.yaml new file mode 100644 index 000000000000000..628e6ec89e64919 --- /dev/null +++ b/src/content/warp-releases/macos/ga/2025.5.943.0.yaml @@ -0,0 +1,17 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - WARP proxy mode now uses the operating system’s DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. + - Fixed an issue affecting clients in Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. + - For macOS deployments, the WARP Client can now be managed using an `mdm.xml` file placed in `/Library/Application Support/Cloudflare/mdm.xml`. This new configuration option offers an alternative to the still supported method of deploying a managed plist through an MDM solution. + + + **Known issues** + - macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later. + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To learn more about configuring a fallback server, please reference the [Zero Trust documentation](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). +version: 2025.5.943.0 +releaseDate: 2025-07-23T20:41:33.758Z +packageURL: https://downloads.cloudflareclient.com/v1/download/macos/version/2025.5.943.0 +packageSize: 96660802 +platformName: macOS diff --git a/src/content/warp-releases/windows/ga/2025.5.943.0.yaml b/src/content/warp-releases/windows/ga/2025.5.943.0.yaml new file mode 100644 index 000000000000000..6f5c1957c81a2ca --- /dev/null +++ b/src/content/warp-releases/windows/ga/2025.5.943.0.yaml @@ -0,0 +1,27 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - WARP proxy mode now uses the operating system's DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. + - Changes to the [SCCM VPN boundary support](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#sccm-vpn-boundary-support) feature to no longer restart the SMS Agent Host (ccmexec.exe) service. + - Fixed an issue affecting clients in Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. + + **Known issues** + - For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum [Windows 11 24H2 version KB5062553](https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd) or higher for resolution. + + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To learn more about configuring a fallback server, please reference the [Zero Trust documentation](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). + + - Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to version 1.429.19.0 or later. + + + - DNS resolution may be broken when the following conditions are all true: + - WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode. + - A custom DNS server address is configured on the primary network adapter. + - The custom DNS server address on the primary network adapter is changed while WARP is connected. + + To work around this issue, please reconnect the WARP client by toggling off and back on. +version: 2025.5.943.0 +releaseDate: 2025-07-23T20:41:54.836Z +packageURL: https://downloads.cloudflareclient.com/v1/download/windows/version/2025.5.943.0 +packageSize: 129724416 +platformName: Windows From c4741d01a6c2bf551f1623d315d2bb8743d1d82b Mon Sep 17 00:00:00 2001 From: Ranbel Sun Date: Wed, 23 Jul 2025 18:28:54 -0400 Subject: [PATCH 2/7] update Linux notes --- src/content/warp-releases/linux/beta/2025.6.824.1.yaml | 4 ++-- src/content/warp-releases/linux/ga/2025.5.943.0.yaml | 6 +++--- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/src/content/warp-releases/linux/beta/2025.6.824.1.yaml b/src/content/warp-releases/linux/beta/2025.6.824.1.yaml index 097c8bbe3d35263..4595054fa97dc68 100644 --- a/src/content/warp-releases/linux/beta/2025.6.824.1.yaml +++ b/src/content/warp-releases/linux/beta/2025.6.824.1.yaml @@ -3,11 +3,11 @@ releaseNotes: |- **Changes and improvements** - Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected. - - Fix to prevent the firewall being re-enabled after user initiated client disconnection. + - Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect. - Improvement to managed network detection checks for faster switching between managed networks. **Known issues** - - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To learn more about configuring a fallback server, please reference the [Zero Trust documentation](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). version: 2025.6.824.1 releaseDate: 2025-07-23T21:24:34.194Z packageURL: https://downloads.cloudflareclient.com/v1/download/centos8-arm/version/2025.6.824.1 diff --git a/src/content/warp-releases/linux/ga/2025.5.943.0.yaml b/src/content/warp-releases/linux/ga/2025.5.943.0.yaml index 752493fd5bf1181..3a1ec3f7914b6ac 100644 --- a/src/content/warp-releases/linux/ga/2025.5.943.0.yaml +++ b/src/content/warp-releases/linux/ga/2025.5.943.0.yaml @@ -2,11 +2,11 @@ releaseNotes: |- This release contains minor fixes and improvements. **Changes and improvements** - - WARP proxy mode now uses the operating system’s DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. - - Fixed an issue affecting clients in Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. + - WARP proxy mode now uses the operating system's DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. + - Fixed an issue affecting clients in Split Tunnel Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. **Known issues** - - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To learn more about configuring a fallback server, please reference the [Zero Trust documentation](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). version: 2025.5.943.0 releaseDate: 2025-07-23T19:17:49.673Z packageURL: https://downloads.cloudflareclient.com/v1/download/jammy-arm/version/2025.5.943.0 From 08973dcf2e41a5cce11a46ce76726592133de7ac Mon Sep 17 00:00:00 2001 From: Ranbel Sun Date: Wed, 23 Jul 2025 18:30:14 -0400 Subject: [PATCH 3/7] macOS notes --- src/content/warp-releases/macos/ga/2025.5.943.0.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/src/content/warp-releases/macos/ga/2025.5.943.0.yaml b/src/content/warp-releases/macos/ga/2025.5.943.0.yaml index 628e6ec89e64919..9d41b16d0191a22 100644 --- a/src/content/warp-releases/macos/ga/2025.5.943.0.yaml +++ b/src/content/warp-releases/macos/ga/2025.5.943.0.yaml @@ -2,14 +2,14 @@ releaseNotes: |- This release contains minor fixes and improvements. **Changes and improvements** - - WARP proxy mode now uses the operating system’s DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. - - Fixed an issue affecting clients in Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. - - For macOS deployments, the WARP Client can now be managed using an `mdm.xml` file placed in `/Library/Application Support/Cloudflare/mdm.xml`. This new configuration option offers an alternative to the still supported method of deploying a managed plist through an MDM solution. + - WARP proxy mode now uses the operating system's DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. + - Fixed an issue affecting clients in Split Tunnel Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. + - For macOS deployments, the WARP client can now be managed using an `mdm.xml` file placed in `/Library/Application Support/Cloudflare/mdm.xml`. This new configuration option offers an alternative to the still supported method of deploying a managed plist through an MDM solution. **Known issues** - macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later. - - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To learn more about configuring a fallback server, please reference the [Zero Trust documentation](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). version: 2025.5.943.0 releaseDate: 2025-07-23T20:41:33.758Z packageURL: https://downloads.cloudflareclient.com/v1/download/macos/version/2025.5.943.0 From 60c9ecc2e9424d76e02d01fb644339daa6689915 Mon Sep 17 00:00:00 2001 From: Ranbel Sun Date: Wed, 23 Jul 2025 18:33:12 -0400 Subject: [PATCH 4/7] update Windows notes --- src/content/warp-releases/windows/ga/2025.5.943.0.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/src/content/warp-releases/windows/ga/2025.5.943.0.yaml b/src/content/warp-releases/windows/ga/2025.5.943.0.yaml index 6f5c1957c81a2ca..4e61e6435d56dcc 100644 --- a/src/content/warp-releases/windows/ga/2025.5.943.0.yaml +++ b/src/content/warp-releases/windows/ga/2025.5.943.0.yaml @@ -3,15 +3,15 @@ releaseNotes: |- **Changes and improvements** - WARP proxy mode now uses the operating system's DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. - - Changes to the [SCCM VPN boundary support](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#sccm-vpn-boundary-support) feature to no longer restart the SMS Agent Host (ccmexec.exe) service. - - Fixed an issue affecting clients in Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. + - Changes to the [SCCM VPN boundary support](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#sccm-vpn-boundary-support) feature to no longer restart the SMS Agent Host (`ccmexec.exe`) service. + - Fixed an issue affecting clients in Split Tunnel Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. **Known issues** - For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum [Windows 11 24H2 version KB5062553](https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd) or higher for resolution. - - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To learn more about configuring a fallback server, please reference the [Zero Trust documentation](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). - - Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to version 1.429.19.0 or later. + - Devices with `KB5055523` installed may receive a warning about `Win32/ClickFix.ABA` being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to [version 1.429.19.0](https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0) or later. - DNS resolution may be broken when the following conditions are all true: @@ -19,7 +19,7 @@ releaseNotes: |- - A custom DNS server address is configured on the primary network adapter. - The custom DNS server address on the primary network adapter is changed while WARP is connected. - To work around this issue, please reconnect the WARP client by toggling off and back on. + To work around this issue, reconnect the WARP client by toggling off and back on. version: 2025.5.943.0 releaseDate: 2025-07-23T20:41:54.836Z packageURL: https://downloads.cloudflareclient.com/v1/download/windows/version/2025.5.943.0 From 21a67314250a978a22e5182c7743284ddc4e7713 Mon Sep 17 00:00:00 2001 From: Ranbel Sun Date: Wed, 23 Jul 2025 18:34:36 -0400 Subject: [PATCH 5/7] SMS agent host no longer restarts --- .../connect-devices/warp/configure-warp/warp-settings/index.mdx | 2 -- 1 file changed, 2 deletions(-) diff --git a/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx b/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx index 218fa56b98871f1..b13bcf088a9db25 100644 --- a/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx +++ b/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx @@ -404,8 +404,6 @@ Microsoft's [System Center Configuration Manager](https://learn.microsoft.com/en - `Enabled`: WARP network interface description is `(SCCM) Cloudflare WARP Interface Tunnel` for devices which have the [SCCM client](https://learn.microsoft.com/en-us/intune/configmgr/core/clients/deploy/deploy-clients-to-windows-computers) installed. Devices without the SCCM client will still use the default `Cloudflare WARP Interface Tunnel` description. WARP checks if the SCCM client is installed by looking for the SMS Agent Host (`ccmexec.exe`) Windows service. -After setting the network interface description, WARP will restart the SMS Agent Host (`ccmexec.exe`) so that changes can propagate to the SCCM server in a timely manner. - #### Example SCCM configuration Assume you want to push software updates from a cloud based [distribution point](https://learn.microsoft.com/en-us/intune/configmgr/core/servers/deploy/configure/boundary-groups-distribution-points) if the device is remote, but use on-prem servers if the device is on the office network. To set up these boundary groups: From ede72a0476671ce6c7c51bc66d03f63aef24c3fe Mon Sep 17 00:00:00 2001 From: Ranbel Sun Date: Thu, 24 Jul 2025 10:37:29 -0400 Subject: [PATCH 6/7] windows and macos beta --- .../macos/beta/2025.6.824.1.yaml | 16 +++++++++++ .../windows/beta/2025.6.824.1.yaml | 27 +++++++++++++++++++ .../windows/ga/2025.5.943.0.yaml | 1 - 3 files changed, 43 insertions(+), 1 deletion(-) create mode 100644 src/content/warp-releases/macos/beta/2025.6.824.1.yaml create mode 100644 src/content/warp-releases/windows/beta/2025.6.824.1.yaml diff --git a/src/content/warp-releases/macos/beta/2025.6.824.1.yaml b/src/content/warp-releases/macos/beta/2025.6.824.1.yaml new file mode 100644 index 000000000000000..a083d59fd1d7f45 --- /dev/null +++ b/src/content/warp-releases/macos/beta/2025.6.824.1.yaml @@ -0,0 +1,16 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected. + - Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect. + - Improvement to managed network detection checks for faster switching between managed networks. + + **Known issues** + - macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later. + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). +version: 2025.6.824.1 +releaseDate: 2025-07-24T12:28:40.940Z +packageURL: https://downloads.cloudflareclient.com/v1/download/macos/version/2025.6.824.1 +packageSize: 107463104 +platformName: macOS diff --git a/src/content/warp-releases/windows/beta/2025.6.824.1.yaml b/src/content/warp-releases/windows/beta/2025.6.824.1.yaml new file mode 100644 index 000000000000000..de8a1fa1010b86a --- /dev/null +++ b/src/content/warp-releases/windows/beta/2025.6.824.1.yaml @@ -0,0 +1,27 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - Improvements to better manage multi-user pre-login registrations. + - Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected. + - Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect. + - Improvement to managed network detection checks for faster switching between managed networks. + + **Known issues** + - For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum [Windows 11 24H2 version KB5062553](https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd) or higher for resolution. + + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). + + - Devices with `KB5055523` installed may receive a warning about `Win32/ClickFix.ABA` being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to [version 1.429.19.0](https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0) or later. + + - DNS resolution may be broken when the following conditions are all true: + - WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode. + - A custom DNS server address is configured on the primary network adapter. + - The custom DNS server address on the primary network adapter is changed while WARP is connected. + + To work around this issue, reconnect the WARP client by toggling off and back on. +version: 2025.6.824.1 +releaseDate: 2025-07-24T12:28:40.970Z +packageURL: https://downloads.cloudflareclient.com/v1/download/windows/version/2025.6.824.1 +packageSize: 133984256 +platformName: Windows diff --git a/src/content/warp-releases/windows/ga/2025.5.943.0.yaml b/src/content/warp-releases/windows/ga/2025.5.943.0.yaml index 4e61e6435d56dcc..90f60bf167153c4 100644 --- a/src/content/warp-releases/windows/ga/2025.5.943.0.yaml +++ b/src/content/warp-releases/windows/ga/2025.5.943.0.yaml @@ -13,7 +13,6 @@ releaseNotes: |- - Devices with `KB5055523` installed may receive a warning about `Win32/ClickFix.ABA` being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to [version 1.429.19.0](https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0) or later. - - DNS resolution may be broken when the following conditions are all true: - WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode. - A custom DNS server address is configured on the primary network adapter. From eca77743c359a67af97a3f22104d05031b0e7197 Mon Sep 17 00:00:00 2001 From: ranbel <101146722+ranbel@users.noreply.github.com> Date: Thu, 24 Jul 2025 12:32:52 -0400 Subject: [PATCH 7/7] Update src/content/warp-releases/macos/ga/2025.5.943.0.yaml Co-authored-by: marciocloudflare <83226960+marciocloudflare@users.noreply.github.com> --- src/content/warp-releases/macos/ga/2025.5.943.0.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/src/content/warp-releases/macos/ga/2025.5.943.0.yaml b/src/content/warp-releases/macos/ga/2025.5.943.0.yaml index 9d41b16d0191a22..a5fa17351cfb718 100644 --- a/src/content/warp-releases/macos/ga/2025.5.943.0.yaml +++ b/src/content/warp-releases/macos/ga/2025.5.943.0.yaml @@ -6,7 +6,6 @@ releaseNotes: |- - Fixed an issue affecting clients in Split Tunnel Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. - For macOS deployments, the WARP client can now be managed using an `mdm.xml` file placed in `/Library/Application Support/Cloudflare/mdm.xml`. This new configuration option offers an alternative to the still supported method of deploying a managed plist through an MDM solution. - **Known issues** - macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later. - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server).