mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 12:46:18 +01:00
Merge pull request #67906 from openshift-cherrypick-robot/cherry-pick-66585-to-enterprise-4.15
[enterprise-4.15] OSDOCS#8122: Release notes for 1.11.5 and 1.12.1
This commit is contained in:
@@ -12,6 +12,34 @@ These release notes track the development of {cert-manager-operator}.
|
||||
|
||||
For more information, see xref:../../security/cert_manager_operator/index.adoc#cert-manager-operator-about[About the {cert-manager-operator}].
|
||||
|
||||
[id="cert-manager-operator-release-notes-1.12.1"]
|
||||
== Release notes for {cert-manager-operator} 1.12.1
|
||||
|
||||
Issued: 2023-11-15
|
||||
|
||||
The following advisory is available for the {cert-manager-operator} 1.12.1:
|
||||
|
||||
* link:https://access.redhat.com/errata/RHSA-2023:6269-02[RHSA-2023:6269-02]
|
||||
|
||||
Version `1.12.1` of the {cert-manager-operator} is based on the upstream cert-manager version `v1.12.5`. For more information, see the link:https://cert-manager.io/docs/release-notes/release-notes-1.12/#v1125[cert-manager project release notes for v1.12.5].
|
||||
|
||||
[id="cert-manager-operator-1.12.1-bug-fixes"]
|
||||
=== Bug fixes
|
||||
|
||||
* Previously, in a multi-architecture environment, the cert-manager Operator pods were prone to failures because of the invalid node affinity configuration. With this fix, the cert-manager Operator pods run without any failures. (link:https://issues.redhat.com/browse/OCPBUGS-19446[*OCPBUGS-19446*])
|
||||
|
||||
[id="cert-manager-operator-1.12.1-CVEs"]
|
||||
=== CVEs
|
||||
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-44487[CVE-2023-44487]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-39325[CVE-2023-39325]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-4527[CVE-2023-4527]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-4806[CVE-2023-4806]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-4813[CVE-2023-4813]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-4911[CVE-2023-4911]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-38545[CVE-2023-38545]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-38546[CVE-2023-38546]
|
||||
|
||||
[id="cert-manager-operator-release-notes-1.12.0"]
|
||||
== Release notes for {cert-manager-operator} 1.12.0
|
||||
|
||||
@@ -24,6 +52,7 @@ The following advisories are available for the {cert-manager-operator} 1.12.0:
|
||||
|
||||
Version `1.12.0` of the {cert-manager-operator} is based on the upstream cert-manager version `v1.12.4`. For more information, see the link:https://cert-manager.io/docs/release-notes/release-notes-1.12/#v1124[cert-manager project release notes for v1.12.4].
|
||||
|
||||
|
||||
[id="cert-manager-operator-1.12.0-bug-fixes"]
|
||||
=== Bug fixes
|
||||
|
||||
@@ -35,6 +64,41 @@ Version `1.12.0` of the {cert-manager-operator} is based on the upstream cert-ma
|
||||
|
||||
* Previously, the {cert-manager-operator} could not pull the `jetstack-cert-manager-container-v1.12.4-1` image. The cert-manager controller, CA injector, and Webhook pods were stuck in the `ImagePullBackOff` state. Now, the {cert-manager-operator} pulls the `jetstack-cert-manager-container-v1.12.4-1` image to run the cert-manager controller, CA injector, and Webhook pods successfully. (link:https://issues.redhat.com/browse/OCPBUGS-19986[*OCPBUGS-19986*])
|
||||
|
||||
[id="cert-manager-operator-release-notes-1.11.5"]
|
||||
== Release notes for {cert-manager-operator} 1.11.5
|
||||
|
||||
Issued: 2023-11-15
|
||||
|
||||
The following advisory is available for the {cert-manager-operator} 1.11.5:
|
||||
|
||||
* link:https://access.redhat.com/errata/RHSA-2023:6279-03[RHSA-2023:6279-03]
|
||||
|
||||
The golang version is updated to the version `1.20.10` to fix Common Vulnerabilities and Exposures (CVEs). Version `1.11.5` of the {cert-manager-operator} is based on the upstream cert-manager version `v1.11.5`. For more information, see the link:https://cert-manager.io/docs/release-notes/release-notes-1.11/#v1115[cert-manager project release notes for v1.11.5].
|
||||
|
||||
[id="cert-manager-operator-1.11.5-bug-fixes"]
|
||||
=== Bug fixes
|
||||
|
||||
* Previously, in a multi-architecture environment, the cert-manager Operator pods were prone to failures because of the invalid node affinity configuration. With this fix, the cert-manager Operator pods run without any failures. (link:https://issues.redhat.com/browse/OCPBUGS-19446[*OCPBUGS-19446*])
|
||||
|
||||
[id="cert-manager-operator-1.11.5-CVEs"]
|
||||
=== CVEs
|
||||
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-44487[CVE-2023-44487]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-39325[CVE-2023-39325]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-29409[CVE-2023-29409]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-2602[CVE-2023-2602]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-2603[CVE-2023-2603]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-4527[CVE-2023-4527]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-4806[CVE-2023-4806]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-4813[CVE-2023-4813]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-4911[CVE-2023-4911]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-28484[CVE-2023-28484]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-29469[CVE-2023-29469]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-38545[CVE-2023-38545]
|
||||
* link:https://access.redhat.com/security/cve/CVE-2023-38546[CVE-2023-38546]
|
||||
|
||||
|
||||
|
||||
[id="cert-manager-operator-release-notes-1.11.4"]
|
||||
== Release notes for {cert-manager-operator} 1.11.4
|
||||
|
||||
|
||||
Reference in New Issue
Block a user