diff --git a/docs/RELEASE-NOTES.rst b/docs/RELEASE-NOTES.rst index 631fa9e04..1c45034aa 100644 --- a/docs/RELEASE-NOTES.rst +++ b/docs/RELEASE-NOTES.rst @@ -1,27 +1,44 @@ Release Notes for Container Ingress Services for Kubernetes & OpenShift ======================================================================= -Next Release +2.16.1 ------------- Added Functionality ``````````````````` **What's new:** - * Multi Cluster * CRD * `Issue 3329 `_: Add support for static ip configuration in annotation for service type LoadBalancer. Bug Fixes ```````````` -* `Issue 3324 `_: Fix for Service LoadBalancer with targetPort set to name of containerPort creates emtpy BIG-IP Pool -* `Issue 3326 `_: Multi-cluster: Services in blue-green deployments don´t get updated -* `Issue 3340 `_: Fix to post latest config in retrying a failing AS3 configuration -* `Issue 3335 `_: Authorization errors and unexpected 503 HTTP return code inside F5 BIGIP controller version 2.16-WIP +* `Issue 3324 https://github.com/F5Networks/k8s-bigip-ctlr/issues/3324`_: Fix for Service LoadBalancer with targetPort set to name of containerPort creates emtpy BIG-IP Pool +* `Issue 3326 https://github.com/F5Networks/k8s-bigip-ctlr/issues/3326`_: Multi-cluster: Services in blue-green deployments don´t get updated +* `Issue 3340 https://github.com/F5Networks/k8s-bigip-ctlr/issues/3340`_: Fix to post latest config in retrying a failing AS3 configuration +* `Issue 3335 https://github.com/F5Networks/k8s-bigip-ctlr/issues/3335`_: Authorization errors and unexpected 503 HTTP return code inside F5 BIGIP controller version 2.16-WIP +* `Issue 3322 https://github.com/F5Networks/k8s-bigip-ctlr/issues/3322`_: Ingress using single service backend with different paths and ports not create correctly f5 ingress object -Upgrade notes -`````````````` +Known Issues +````````````` +CVE-2024-2961 + + +F5 IPAM Controller v0.1.10 +`````````````````````````` + +Vulnerability Fixes +``````````````````` +CVE-2023-38545, CVE-2023-38546, CVE-2022-48337, CVE-2022-48338, CVE-2022-48339, CVE-2023-2491, CVE-2023-24329, +CVE-2023-40217, CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911, CVE-2023-44487, CVE-2023-28617, +CVE-2022-40897 + + +Known Issues +````````````` +CVE-2024-2961 + 2.16.0 ------------- diff --git a/docs/upgradeProcess.md b/docs/upgradeProcess.md index 984d92701..e25b486d0 100644 --- a/docs/upgradeProcess.md +++ b/docs/upgradeProcess.md @@ -43,7 +43,8 @@ Compatibility Matrix | v2.14.0 | v17.0 | v1.27 | v4.12.0* | Yes | Yes | v3.45 | v0.1.9 | v0.0.4 | v0.0.26 | Red Hat Enterprise Linux release 9.1 (Plow) | | v2.15.0 | v17.0 | v1.28 | v4.13.0* | Yes | Yes | v3.48 | v0.1.9 | v0.0.4 | v0.0.27 | Red Hat Enterprise Linux release 9.1 (Plow) | | v2.15.1 | v17.0 | v1.29 | v4.14.0* | Yes | Yes | v3.48 | v0.1.9 | v0.0.4 | v0.0.28 | Red Hat Enterprise Linux release 9.1 (Plow) | -| v2.16 | v17.0 | v1.29 | v4.14.0* | Yes | Yes | v3.50 | v0.1.9 | v0.0.4 | v0.0.29 | Red Hat Enterprise Linux release 9.1 (Plow) | +| v2.16.0 | v17.0 | v1.29 | v4.14.0* | Yes | Yes | v3.50 | v0.1.9 | v0.0.4 | v0.0.29 | Red Hat Enterprise Linux release 9.1 (Plow) | +| v2.16.1 | v17.0 | v1.29 | v4.14.0* | Yes | Yes | v3.50 | v0.1.10 | v0.0.4 | v0.0.29 | Red Hat Enterprise Linux release 9.1 (Plow) | Note: For OCP version 4.12, CIS is compatible with IPv4 and dual stack IPv4. @@ -372,3 +373,8 @@ Refer Release Notes for [CIS v2.15.1](https://github.com/F5Networks/k8s-bigip-ct * Its recommend to configure "trusted-certs-cfgmap". To disable default behaviour, explicitly set "--insecure=true" flag to true in CIS deployment. Refer Release Notes for [CIS v2.16.0](https://github.com/F5Networks/k8s-bigip-ctlr/blob/2.x-master/docs/RELEASE-NOTES.rst) + + +### **Upgrading from 2.16.0 to 2.16.1:** + +Refer Release Notes for [CIS v2.16.1](https://github.com/F5Networks/k8s-bigip-ctlr/blob/2.x-master/docs/RELEASE-NOTES.rst)