v1.24.X
Before upgrading from earlier releases, be sure to read the Kubernetes Urgent Upgrade Notes.
Release v1.24.17+k3s1
This release updates Kubernetes to v1.24.17, and fixes a number of issues.
This release includes support for remediating CVE-2023-32187, a potential Denial of Service attack vector on K3s servers. See https://github.com/k3s-io/k3s/security/advisories/GHSA-m4hf-6vgr-75r2 for more information, including mandatory steps necessary to harden clusters against this vulnerability.
For more details on what's new, see the Kubernetes release notes.
Changes since v1.24.16+k3s1:
- Update cni plugins version to v1.3.0 (#8087)
- Etcd snapshots retention when node name changes (#8124)
- August Test Backports (#8128)
- Backports for 2023-08 release (#8135)
- K3s's external apiserver listener now declines to add to its certificate any subject names not associated with the kubernetes apiserver service, server nodes, or values of the --tls-san option. This prevents the certificate's SAN list from being filled with unwanted entries.
- K3s no longer enables the apiserver's
enable-aggregator-routing
flag when the egress proxy is not being used to route connections to in-cluster endpoints. - Updated the embedded containerd to v1.7.3+k3s1
- Updated the embedded runc to v1.1.8
- User-provided containerd config templates may now use
{{ template "base" . }}
to include the default K3s template content. This makes it easier to maintain user configuration if the only need is to add additional sections to the file. - Bump docker/docker module version to fix issues with cri-dockerd caused by recent releases of golang rejecting invalid host headers sent by the docker client.
- Updated kine to v0.10.2
- K3s etcd-snapshot delete fail to delete local file when called with s3 flag (#8146)
- Fix for cluster-reset backup from s3 when etcd snapshots are disabled (#8168)
- Fixed the etcd retention to delete orphaned snapshots based on the date (#8191)
- Additional backports for 2023-08 release (#8214)
- The version of
helm
used by the bundled helm controller's job image has been updated to v3.12.3 - Bumped dynamiclistener to address an issue that could cause the apiserver/supervisor listener on 6443 to stop serving requests on etcd-only nodes.
- The K3s external apiserver/supervisor listener on 6443 now sends a complete certificate chain in the TLS handshake.
- The version of
- Fix runc version bump (#8243)
- Update to v1.24.17 (#8240)
- Add new CLI flag to enable TLS SAN CN filtering (#8260)
- Added a new
--tls-san-security
option. This flag defaults to false, but can be set to true to disable automatically adding SANs to the server's TLS certificate to satisfy any hostname requested by a client.
- Added a new
- Add RWMutex to address controller (#8276)
Release v1.24.16+k3s1
This release updates Kubernetes to v1.24.16, and fixes a number of issues.
For more details on what's new, see the Kubernetes release notes.
Changes since v1.24.14+k3s1:
- Fix code spell check (#7861)
- Remove file_windows.go (#7857)
- Allow k3s to customize apiServerPort on helm-controller (#7872)
- Fix rootless node password (#7899)
- Backports for 2023-07 release (#7910)
- Resolved an issue that caused agents joined with kubeadm-style bootstrap tokens to fail to rejoin the cluster when their node object is deleted.
- The
k3s certificate rotate-ca
command now supports the data-dir flag.
- Adding cli to custom klipper helm image (#7916)
- The default helm-controller job image can now be overridden with the --helm-job-image CLI flag
- Generation of certs and keys for etcd gated if etcd is disabled (#7946)
- Don't use zgrep in
check-config
if apparmor profile is enforced (#7955) - Fix image_scan.sh script and download trivy version (#7950) (#7970)
- Adjust default kubeconfig file permissions (#7985)
- Update to v1.24.16 (#8023)
Release v1.24.15+k3s1
This release updates Kubernetes to v1.24.15, and fixes a number of issues.
For more details on what's new, see the Kubernetes release notes.