Skip to content

Commit

Permalink
Created MTC 1.7.15 release notes
Browse files Browse the repository at this point in the history
  • Loading branch information
HagayVider1 authored and anarnold97 committed Apr 25, 2024
1 parent a3ab9c8 commit ea8c640
Show file tree
Hide file tree
Showing 2 changed files with 46 additions and 0 deletions.
1 change: 1 addition & 0 deletions migration_toolkit_for_containers/mtc-release-notes.adoc
Expand Up @@ -20,6 +20,7 @@ For information on the support policy for {mtc-short}, see link:https://access.r
include::modules/migration-mtc-release-notes-1-8-2.adoc[leveloffset=+1]
include::modules/migration-mtc-release-notes-1-8-1.adoc[leveloffset=+1]
include::modules/migration-mtc-release-notes-1-8.adoc[leveloffset=+1]
include::modules/migration-mtc-release-notes-1-7-15.adoc[leveloffset=+1]
include::modules/migration-mtc-release-notes-1-7-14.adoc[leveloffset=+1]
include::modules/migration-mtc-release-notes-1-7-13.adoc[leveloffset=+1]
include::modules/migration-mtc-release-notes-1-7-12.adoc[leveloffset=+1]
Expand Down
45 changes: 45 additions & 0 deletions modules/migration-mtc-release-notes-1-7-15.adoc
@@ -0,0 +1,45 @@
// Module included in the following assemblies:
//
// * migration_toolkit_for_containers/mtc-release-notes.adoc
:_mod-docs-content-type: REFERENCE
[id="migration-mtc-release-notes-1-7-15_{context}"]
= {mtc-full} 1.7.15 release notes

[id="resolved-issues-1-7-15_{context}"]
== Resolved issues

This release has the following resolved issues:

.CVE-2024-24786: A flaw was found in Golang's protobuf module, where the unmarshal function can enter an infinite loop

A flaw was found in the `protojson.Unmarshal` function, which could enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition could occur when unmarshaling into a message that contained a `google.protobuf.Any` value or when the `UnmarshalOptions.DiscardUnknown` option was set.

To resolve this issue, upgrade to {mtc-short} 1.7.15.

For more details, see link:https://access.redhat.com/security/cve/CVE-2024-24786[(CVE-2024-24786)].

.CVE-2024-28180: `jose-go` improper handling of highly compressed data

A vulnerability was found in Jose due to improper handling of highly compressed data. An attacker could send a JSON Web Encryption (JWE) containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. 

To resolve this issue, upgrade to {mtc-short} 1.7.15.

For more details, see link:https://access.redhat.com/security/cve/CVE-2024-28180[(CVE-2024-28180)].


[id="known-issues-1-7-15_{context}"]
== Known issues

This release has the following known issues:

.Direct Volume Migration is failing as the rsync pod on the source cluster goes into an `Error` state

On migrating any application with Persistent Volume Claim (PVC), Stage succeeds with warnings and Direct Volume Migration (DVM) fails with the `rsync` pod on the source namespace going into an `error` state. link:https://bugzilla.redhat.com/show_bug.cgi?id=2256141[(BZ#2256141)]

.The conflict condition is briefly cleared after it is created

When creating a new state migration plan that will result in a conflict error, that error is cleared shortly after it is displayed. link:https://bugzilla.redhat.com/show_bug.cgi?id=2144299[(BZ#2144299)]

.Migration fails when there are multiple Volume Snapshot Locations (VSLs) of different provider types configured in a cluster and no default VSL is set

When there are multiple VSLs in a cluster with different provider types, and none of them is set as default, Velero results in a validation error, making migrations fail. link:https://bugzilla.redhat.com/show_bug.cgi?id=2180565[(BZ#2180565)]

0 comments on commit ea8c640

Please sign in to comment.