Skip to content

Commit a5c493b

Browse files
author
Shubha Narayanan
committed
Release notes for 1.11.5 and 1.12.1
1 parent 4ee2c3a commit a5c493b

File tree

1 file changed

+64
-0
lines changed

1 file changed

+64
-0
lines changed

security/cert_manager_operator/cert-manager-operator-release-notes.adoc

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,34 @@ These release notes track the development of {cert-manager-operator}.
1212

1313
For more information, see xref:../../security/cert_manager_operator/index.adoc#cert-manager-operator-about[About the {cert-manager-operator}].
1414

15+
[id="cert-manager-operator-release-notes-1.12.1"]
16+
== Release notes for {cert-manager-operator} 1.12.1
17+
18+
Issued: 2023-11-15
19+
20+
The following advisory is available for the {cert-manager-operator} 1.12.1:
21+
22+
* link:https://access.redhat.com/errata/RHSA-2023:6269-02[RHSA-2023:6269-02]
23+
24+
Version `1.12.1` of the {cert-manager-operator} is based on the upstream cert-manager version `v1.12.5`. For more information, see the link:https://cert-manager.io/docs/release-notes/release-notes-1.12/#v1125[cert-manager project release notes for v1.12.5].
25+
26+
[id="cert-manager-operator-1.12.1-bug-fixes"]
27+
=== Bug fixes
28+
29+
* Previously, in a multi-architecture environment, the cert-manager Operator pods were prone to failures because of the invalid node affinity configuration. With this fix, the cert-manager Operator pods run without any failures. (link:https://issues.redhat.com/browse/OCPBUGS-19446[*OCPBUGS-19446*])
30+
31+
[id="cert-manager-operator-1.12.1-CVEs"]
32+
=== CVEs
33+
34+
* link:https://access.redhat.com/security/cve/CVE-2023-44487[CVE-2023-44487]
35+
* link:https://access.redhat.com/security/cve/CVE-2023-39325[CVE-2023-39325]
36+
* link:https://access.redhat.com/security/cve/CVE-2023-4527[CVE-2023-4527]
37+
* link:https://access.redhat.com/security/cve/CVE-2023-4806[CVE-2023-4806]
38+
* link:https://access.redhat.com/security/cve/CVE-2023-4813[CVE-2023-4813]
39+
* link:https://access.redhat.com/security/cve/CVE-2023-4911[CVE-2023-4911]
40+
* link:https://access.redhat.com/security/cve/CVE-2023-38545[CVE-2023-38545]
41+
* link:https://access.redhat.com/security/cve/CVE-2023-38546[CVE-2023-38546]
42+
1543
[id="cert-manager-operator-release-notes-1.12.0"]
1644
== Release notes for {cert-manager-operator} 1.12.0
1745

@@ -24,6 +52,7 @@ The following advisories are available for the {cert-manager-operator} 1.12.0:
2452

2553
Version `1.12.0` of the {cert-manager-operator} is based on the upstream cert-manager version `v1.12.4`. For more information, see the link:https://cert-manager.io/docs/release-notes/release-notes-1.12/#v1124[cert-manager project release notes for v1.12.4].
2654

55+
2756
[id="cert-manager-operator-1.12.0-bug-fixes"]
2857
=== Bug fixes
2958

@@ -35,6 +64,41 @@ Version `1.12.0` of the {cert-manager-operator} is based on the upstream cert-ma
3564

3665
* Previously, the {cert-manager-operator} could not pull the `jetstack-cert-manager-container-v1.12.4-1` image. The cert-manager controller, CA injector, and Webhook pods were stuck in the `ImagePullBackOff` state. Now, the {cert-manager-operator} pulls the `jetstack-cert-manager-container-v1.12.4-1` image to run the cert-manager controller, CA injector, and Webhook pods successfully. (link:https://issues.redhat.com/browse/OCPBUGS-19986[*OCPBUGS-19986*])
3766

67+
[id="cert-manager-operator-release-notes-1.11.5"]
68+
== Release notes for {cert-manager-operator} 1.11.5
69+
70+
Issued: 2023-11-15
71+
72+
The following advisory is available for the {cert-manager-operator} 1.11.5:
73+
74+
* link:https://access.redhat.com/errata/RHSA-2023:6279-03[RHSA-2023:6279-03]
75+
76+
The golang version is updated to the version `1.20.10` to fix Common Vulnerabilities and Exposures (CVEs). Version `1.11.5` of the {cert-manager-operator} is based on the upstream cert-manager version `v1.11.5`. For more information, see the link:https://cert-manager.io/docs/release-notes/release-notes-1.11/#v1115[cert-manager project release notes for v1.11.5].
77+
78+
[id="cert-manager-operator-1.11.5-bug-fixes"]
79+
=== Bug fixes
80+
81+
* Previously, in a multi-architecture environment, the cert-manager Operator pods were prone to failures because of the invalid node affinity configuration. With this fix, the cert-manager Operator pods run without any failures. (link:https://issues.redhat.com/browse/OCPBUGS-19446[*OCPBUGS-19446*])
82+
83+
[id="cert-manager-operator-1.11.5-CVEs"]
84+
=== CVEs
85+
86+
* link:https://access.redhat.com/security/cve/CVE-2023-44487[CVE-2023-44487]
87+
* link:https://access.redhat.com/security/cve/CVE-2023-39325[CVE-2023-39325]
88+
* link:https://access.redhat.com/security/cve/CVE-2023-29409[CVE-2023-29409]
89+
* link:https://access.redhat.com/security/cve/CVE-2023-2602[CVE-2023-2602]
90+
* link:https://access.redhat.com/security/cve/CVE-2023-2603[CVE-2023-2603]
91+
* link:https://access.redhat.com/security/cve/CVE-2023-4527[CVE-2023-4527]
92+
* link:https://access.redhat.com/security/cve/CVE-2023-4806[CVE-2023-4806]
93+
* link:https://access.redhat.com/security/cve/CVE-2023-4813[CVE-2023-4813]
94+
* link:https://access.redhat.com/security/cve/CVE-2023-4911[CVE-2023-4911]
95+
* link:https://access.redhat.com/security/cve/CVE-2023-28484[CVE-2023-28484]
96+
* link:https://access.redhat.com/security/cve/CVE-2023-29469[CVE-2023-29469]
97+
* link:https://access.redhat.com/security/cve/CVE-2023-38545[CVE-2023-38545]
98+
* link:https://access.redhat.com/security/cve/CVE-2023-38546[CVE-2023-38546]
99+
100+
101+
38102
[id="cert-manager-operator-release-notes-1.11.4"]
39103
== Release notes for {cert-manager-operator} 1.11.4
40104

0 commit comments

Comments
 (0)