Patch Releases

Schedule and team contact information for Kubernetes patch releases.

For general information about Kubernetes release cycle, see the release process description.

Cadence

Our typical patch release cadence is monthly. It is commonly a bit faster (1 to 2 weeks) for the earliest patch releases after a 1.X minor release. Critical bug fixes may cause a more immediate release outside of the normal cadence. We also aim to not make releases during major holiday periods.

Contact

See the Release Managers page for full contact details on the Patch Release Team.

Please give us a business day to respond - we may be in a different timezone!

In between releases the team is looking at incoming cherry pick requests on a weekly basis. The team will get in touch with submitters via GitHub PR, SIG channels in Slack, and direct messages in Slack and email if there are questions on the PR.

Cherry picks

Please follow the cherry pick process.

Cherry picks must be merge-ready in GitHub with proper labels (e.g., approved, lgtm, release-note) and passing CI tests ahead of the cherry pick deadline. This is typically two days before the target release, but may be more. Earlier PR readiness is better, as we need time to get CI signal after merging your cherry picks ahead of the actual release.

Cherry pick PRs which miss merge criteria will be carried over and tracked for the next patch release.

Support Period

In accordance with the yearly support KEP, the Kubernetes Community will support active patch release series for a period of roughly fourteen (14) months.

The first twelve months of this timeframe will be considered the standard period.

Towards the end of the twelve month, the following will happen:

  • Release Managers will cut a release
  • The patch release series will enter maintenance mode

During the two-month maintenance mode period, Release Managers may cut additional maintenance releases to resolve:

  • Vulnerabilities that have an assigned CVE ID (under the advisement of the Security Response Committee)
  • dependency issues (including base image updates)
  • critical core component issues

At the end of the two-month maintenance mode period, the patch release series will be considered EOL (end of life) and cherry picks to the associated branch are to be closed soon afterwards.

Note that the 28th of the month was chosen for maintenance mode and EOL target dates for simplicity (every month has it).

Upcoming Monthly Releases

Timelines may vary with the severity of bug fixes, but for easier planning we will target the following monthly release points. Unplanned, critical releases may also occur in between these.

Monthly Patch Release Cherry Pick Deadline Target Date
December 2024
January 2025
February 2025

Detailed Release History for Active Branches

1.31

Next patch release is 1.31.4.

Kubernetes 1.31 enters maintenance mode on ; the End of Life date for Kubernetes 1.31 is .

Patch Release Cherry Pick Deadline Target Date Note
1.31.3
1.31.2
1.31.1
1.31.0 -

1.30

Next patch release is 1.30.8.

Kubernetes 1.30 enters maintenance mode on ; the End of Life date for Kubernetes 1.30 is .

Patch Release Cherry Pick Deadline Target Date Note
1.30.7
1.30.6
1.30.5
1.30.4
1.30.3
1.30.2
1.30.1
1.30.0 -

1.29

Next patch release is 1.29.12.

Kubernetes 1.29 enters maintenance mode on ; the End of Life date for Kubernetes 1.29 is .

Patch Release Cherry Pick Deadline Target Date Note
1.29.11
1.29.10
1.29.9
1.29.8
1.29.7
1.29.6
1.29.5
1.29.4
1.29.3
1.29.2
1.29.1
1.29.0 -

Non-Active Branch history

These releases are no longer supported.

Minor Version Final Patch Release End Of Life Date Note
1.28 1.28.15
1.27 1.27.16
1.26 1.26.15 1.26.15 was released in March 2024 (after the EOL date) to pick up a new version of Go to address several Go CVEs
1.25 1.25.16 1.25.16 was released in November 2023 (after the EOL date) to fix CVE-2023-5528
1.24 1.24.17 1.24.17 was released in August 2023 (after the EOL date) to fix CVE-2023-3676 and CVE-2023-3955
1.23 1.23.17
1.22 1.22.17 1.22.17 was released in December 2022 (after the EOL date) to backport registry changes and fix two critical issues.
1.21 1.21.14
1.20 1.20.15
1.19 1.19.16
1.18 1.18.20 Created to solve regression introduced in 1.18.19
1.17 1.17.17
1.16 1.16.15
1.15 1.15.12
1.14 1.14.10
1.13 1.13.12
1.12 1.12.10
1.11 1.11.10
1.10 1.10.13
1.9 1.9.11
1.8 1.8.15
1.7 1.7.16
1.6 1.6.13
1.5 1.5.8
1.4 1.4.12
1.3 1.3.10
1.2 1.2.7
Last modified May 14, 2024 at 2:37 AM PST: Reword CVE trigger for patches (7b054e8a8a)