This the multi-page printable view of this section. Click here to print.
Release log
- 1: v1.28
- 1.1: v1.28.15-lts.0
- 2: v1.27
- 2.1: v1.27.16-lts.0
- 3: v1.26
- 3.1: v1.26.15-lts.0
- 4: v1.25
- 4.1: v1.25.16-lts.0
- 5: v1.24
- 5.1: v1.24.17-lts.0
- 6: v1.23
- 6.1: v1.23.17-lts.0
- 6.2: v1.23.5-lts.1
- 7: v1.22
- 7.1: v1.22.17-lts.0
- 7.2: v1.22.8-lts.1
- 8: v1.21
- 8.1: v1.21.11-lts.1
- 9: v1.20
- 9.1: v1.20.15-lts.2
- 10: v1.19
- 10.1: v1.19.16-lts.3
- 11: v1.18
- 11.1: v1.18.20-lts.1
- 11.2: v1.18.20-lts.2
- 12: v1.17
- 12.1: v1.17.17-lts.1
- 13: v1.16
- 13.1: v1.16.15-lts.1
- 14: v1.15
- 14.1: v1.15.12-lts.1
- 15: v1.14
- 15.1: v1.14.10-lts.1
- 16: v1.13
- 16.1: v1.13.12-lts.1
- 17: v1.12
- 17.1: v1.12.10-lts.1
- 18: v1.11
- 18.1: v1.11.10-lts.1
- 19: v1.10
- 19.1: v1.10.13-lts.1
1 - v1.28
1.1 - v1.28.15-lts.0
This is the first fixed release by KLTS for v1.28.15.
Patches
- There are no fixes just CI processes running
2 - v1.27
2.1 - v1.27.16-lts.0
This is the first fixed release by KLTS for v1.27.16.
Patches
- There are no fixes just CI processes running
3 - v1.26
3.1 - v1.26.15-lts.0
This is the first fixed release by KLTS for v1.26.15.
Patches
- There are no fixes just CI processes running
4 - v1.25
4.1 - v1.25.16-lts.0
This is the first fixed release by KLTS for v1.25.16.
Patches
- There are no fixes just CI processes running
5 - v1.24
5.1 - v1.24.17-lts.0
This is the first fixed release by KLTS for v1.24.17.
Patches
- There are no fixes just CI processes running
6 - v1.23
6.1 - v1.23.17-lts.0
This is the first fixed release by KLTS for v1.23.17.
Patches
- There are no fixes just CI processes running
6.2 - v1.23.5-lts.1
This is the first fixed release by KLTS for v1.23.5.
Patches
- There are no fixes just CI processes running
7 - v1.22
7.1 - v1.22.17-lts.0
This is the first fixed release by KLTS for v1.22.17.
Patches
- There are no fixes just CI processes running
7.2 - v1.22.8-lts.1
This is the first fixed release by KLTS for v1.22.8.
Patches
- There are no fixes just CI processes running
8 - v1.21
8.1 - v1.21.11-lts.1
This is the first fixed release by KLTS for v1.21.11.
Patches
- There are no fixes just CI processes running
9 - v1.20
9.1 - v1.20.15-lts.2
This is the second fixed release by KLTS for v1.20.15.
Patches
- nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
10 - v1.19
10.1 - v1.19.16-lts.3
This is the third fixed release by KLTS for v1.19.16.
Patches
- nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
- /docs/kubernetes/patches/cve-2020-8554/
11 - v1.18
11.1 - v1.18.20-lts.1
This is the first fixed release by KLTS for v1.18.20.
Patches
- nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
- CVE-2021-25741
This is a volume security issue related to permission access. A user can access files and directories outside the volume mounting directory, including the host’s file system, through the volume mounting method of
subpathin the created container.
11.2 - v1.18.20-lts.2
This is the second fixed release by KLTS for v1.18.20.
Patches
- Bugfix: reducing race risk in kubelet for missing KUBERNETES_SERVICE_HOST
12 - v1.17
12.1 - v1.17.17-lts.1
This is the first fixed release by KLTS for v1.17.17.
Patches
- CVE-2021-3121
A program with this vulnerability may crash because of processing some messages that contain malicious
Protobuf. If the version ofGogo Protobufyou are using is too low, this vulnerability may exist. - nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
13 - v1.16
13.1 - v1.16.15-lts.1
This is the first fixed release by KLTS for v1.16.15.
Patches
- CVE-2021-3121
A program with this vulnerability may crash because of processing some messages that contain malicious
Protobuf. If the version ofGogo Protobufyou are using is too low, this vulnerability may exist. - nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
14 - v1.15
14.1 - v1.15.12-lts.1
This is the first fixed release by KLTS for v1.15.12.
Patches
- CVE-2020-8558
The
kube-proxycomponent was found to set the kernel parameternet.ipv4.conf.all.route_localnet=1in bothiptablesandipvsmodes to allow local loopback access. An attacker may use the container sharing the host network, or bind and listen to the TCP/UDP service of the local127.0.0.1on the cluster node to access the same LAN or adjacent node under the second layer network to obtain interface information. If your service does not set the necessary security certification, it may cause the risk of information leakage. - CVE-2021-3121
A program with this vulnerability may crash because of processing some messages that contain malicious
Protobuf. If the version ofGogo Protobufyou are using is too low, this vulnerability may exist. - nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
15 - v1.14
15.1 - v1.14.10-lts.1
This is the first fixed release by KLTS for v1.14.10.
Patches
- CVE-2020-8552
This vulnerability may make the
API Servervulnerable to aDoS(Denial of Service) attack caused by successfulAPIrequests. - CVE-2020-8558
The
kube-proxycomponent was found to set the kernel parameternet.ipv4.conf.all.route_localnet=1in bothiptablesandipvsmodes to allow local loopback access. An attacker may use the container sharing the host network, or bind and listen to the TCP/UDP service of the local127.0.0.1on the cluster node to access the same LAN or adjacent node under the second layer network to obtain interface information. If your service does not set the necessary security certification, it may cause the risk of information leakage. - CVE-2020-8559
This is a security vulnerability of the
kube-apiservercomponent. An attacker can intercept certain upgrade requests sent to the nodekubelet, and forward the request to other target nodes through the original access credentials in the request that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. - CVE-2021-3121
A program with this vulnerability may crash because of processing some messages that contain malicious
Protobuf. If the version ofGogo Protobufyou are using is too low, this vulnerability may exist. - nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
16 - v1.13
16.1 - v1.13.12-lts.1
This is the first fixed release by KLTS for v1.13.12.
Patches
- CVE-2020-8552
This vulnerability may make the
API Servervulnerable to aDoS(Denial of Service) attack caused by successfulAPIrequests. - CVE-2020-8558
The
kube-proxycomponent was found to set the kernel parameternet.ipv4.conf.all.route_localnet=1in bothiptablesandipvsmodes to allow local loopback access. An attacker may use the container sharing the host network, or bind and listen to the TCP/UDP service of the local127.0.0.1on the cluster node to access the same LAN or adjacent node under the second layer network to obtain interface information. If your service does not set the necessary security certification, it may cause the risk of information leakage. - TODO CVE-2020-8559
This is a security vulnerability of the
kube-apiservercomponent. An attacker can intercept certain upgrade requests sent to the nodekubelet, and forward the request to other target nodes through the original access credentials in the request that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. - CVE-2021-3121
A program with this vulnerability may crash because of processing some messages that contain malicious
Protobuf. If the version ofGogo Protobufyou are using is too low, this vulnerability may exist. - nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
17 - v1.12
17.1 - v1.12.10-lts.1
This is the first fixed release by KLTS for v1.12.10.
Patches
- CVE-2019-11245
Containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node.
- CVE-2019-11247
API Servermistakenly allows access to a cluster-scoped custom resource. - CVE-2019-11249
This vulnerability may allow an attacker to use the
kubectl cpcommand to write malicious files in the containertarpackage to any path on the host using Path Traversal. This process is limited only by the system permissions of the local user. - CVE-2019-11251
This vulnerability may allow an attacker to use the
kubectl cpcommand to write malicious files in the containertarpackage to any path on the host using Path Traversal. This process is limited only by the system permissions of the local user. - CVE-2020-8552
This vulnerability may make the
API Servervulnerable to aDoS(Denial of Service) attack caused by successfulAPIrequests. - CVE-2020-8558
The
kube-proxycomponent was found to set the kernel parameternet.ipv4.conf.all.route_localnet=1in bothiptablesandipvsmodes to allow local loopback access. An attacker may use the container sharing the host network, or bind and listen to the TCP/UDP service of the local127.0.0.1on the cluster node to access the same LAN or adjacent node under the second layer network to obtain interface information. If your service does not set the necessary security certification, it may cause the risk of information leakage. - TODO CVE-2020-8559
This is a security vulnerability of the
kube-apiservercomponent. An attacker can intercept certain upgrade requests sent to the nodekubelet, and forward the request to other target nodes through the original access credentials in the request that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. - CVE-2021-3121
A program with this vulnerability may crash because of processing some messages that contain malicious
Protobuf. If the version ofGogo Protobufyou are using is too low, this vulnerability may exist. - nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
18 - v1.11
18.1 - v1.11.10-lts.1
This is the first fixed release by KLTS for v1.11.10.
Patches
- CVE-2019-11245
Containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node.
- CVE-2019-11246
This vulnerability may allow an attacker to use the
kubectl cpcommand to write malicious files in the containertarpackage to any path on the host using Path Traversal. This process is limited only by the system permissions of the local user. - CVE-2019-11247
API Servermistakenly allows access to a cluster-scoped custom resource. - CVE-2019-11248
The debugging endpoint
/debug/pprofis exposed over the unauthenticated Kubelet healthz port. - CVE-2019-11249
This vulnerability may allow an attacker to use the
kubectl cpcommand to write malicious files in the containertarpackage to any path on the host using Path Traversal. This process is limited only by the system permissions of the local user. - CVE-2019-11251
This vulnerability may allow an attacker to use the
kubectl cpcommand to write malicious files in the containertarpackage to any path on the host using Path Traversal. This process is limited only by the system permissions of the local user. - CVE-2020-8552
This vulnerability may make the
API Servervulnerable to aDoS(Denial of Service) attack caused by successfulAPIrequests. - CVE-2020-8558
The
kube-proxycomponent was found to set the kernel parameternet.ipv4.conf.all.route_localnet=1in bothiptablesandipvsmodes to allow local loopback access. An attacker may use the container sharing the host network, or bind and listen to the TCP/UDP service of the local127.0.0.1on the cluster node to access the same LAN or adjacent node under the second layer network to obtain interface information. If your service does not set the necessary security certification, it may cause the risk of information leakage. - TODO CVE-2020-8559
This is a security vulnerability of the
kube-apiservercomponent. An attacker can intercept certain upgrade requests sent to the nodekubelet, and forward the request to other target nodes through the original access credentials in the request that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. - CVE-2021-3121
A program with this vulnerability may crash because of processing some messages that contain malicious
Protobuf. If the version ofGogo Protobufyou are using is too low, this vulnerability may exist. - nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.
19 - v1.10
19.1 - v1.10.13-lts.1
This is the first fixed release by KLTS for v1.10.13.
Patches
- CVE-2019-11245
Containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node.
- CVE-2019-1002101
This vulnerability may allow an attacker to modify or monitor any file in the directory with the same name in the symbolic link header during the unpacking process of the
kubectl cpcommand, thereby causing damage. - CVE-2019-11246
This vulnerability may allow an attacker to use the
kubectl cpcommand to write malicious files in the containertarpackage to any path on the host using Path Traversal. This process is limited only by the system permissions of the local user. - TODO CVE-2019-11247
API Servermistakenly allows access to a cluster-scoped custom resource. - CVE-2019-11248
The debugging endpoint
/debug/pprofis exposed over the unauthenticated Kubelet healthz port. - CVE-2019-11249
This vulnerability may allow an attacker to use the
kubectl cpcommand to write malicious files in the containertarpackage to any path on the host using Path Traversal. This process is limited only by the system permissions of the local user. - CVE-2019-11251
This vulnerability may allow an attacker to use the
kubectl cpcommand to write malicious files in the containertarpackage to any path on the host using Path Traversal. This process is limited only by the system permissions of the local user. - CVE-2020-8552
This vulnerability may make the
API Servervulnerable to aDoS(Denial of Service) attack caused by successfulAPIrequests. - TODO CVE-2020-8558
The
kube-proxycomponent was found to set the kernel parameternet.ipv4.conf.all.route_localnet=1in bothiptablesandipvsmodes to allow local loopback access. An attacker may use the container sharing the host network, or bind and listen to the TCP/UDP service of the local127.0.0.1on the cluster node to access the same LAN or adjacent node under the second layer network to obtain interface information. If your service does not set the necessary security certification, it may cause the risk of information leakage. - TODO CVE-2020-8559
This is a security vulnerability of the
kube-apiservercomponent. An attacker can intercept certain upgrade requests sent to the nodekubelet, and forward the request to other target nodes through the original access credentials in the request that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. - CVE-2021-3121
A program with this vulnerability may crash because of processing some messages that contain malicious
Protobuf. If the version ofGogo Protobufyou are using is too low, this vulnerability may exist. - nokmem
The node has sufficient disks, but it keeps reporting that the disk is insufficient to create a Pod.