Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions logging/logging_release_notes/logging-5-6-release-notes.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@ include::snippets/logging-compatibility-snip.adoc[]

include::snippets/logging-stable-updates-snip.adoc[]

include::modules/logging-release-notes-5-6-14.adoc[leveloffset=+1]

include::modules/logging-release-notes-5-6-13.adoc[leveloffset=+1]

include::modules/logging-rn-5.6.12.adoc[leveloffset=+1]
Expand Down
82 changes: 82 additions & 0 deletions modules/logging-release-notes-5-6-14.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,82 @@
// Module included in the following assemblies:
// logging-5-6-release-notes.adoc
:_content-type: REFERENCE
[id="logging-release-notes-5-6-14_{context}"]
= Logging 5.6.14
This release includes link:https://access.redhat.com/errata/RHBA-2023:7719[OpenShift Logging Bug Fix Release 5.6.14].

[id="logging-release-notes-5-6-14-bug-fixes"]
== Bug fixes

* Before this update, during the process of creating index patterns, the default alias was missing from the initial index in each log output. As a result, Kibana users were unable to create index patterns by using {es-op}. This update adds the missing aliases to {es-op}, resolving the issue. Kibana users can now create index patterns that include the `{app,infra,audit}-000001` indexes. (link:https://issues.redhat.com/browse/LOG-4807[LOG-4807])

* Before this update, the {loki-op} did not mount a custom CA bundle to the ruler pods. As a result, during the process to evaluate alerting or recording rules, object storage access failed. With this update, the {loki-op} mounts the custom CA bundle to all ruler pods. The ruler pods can download logs from object storage to evaluate alerting or recording rules. (link:https://issues.redhat.com/browse/LOG-4838[LOG-4838])

[id="logging-release-notes-5-6-14-CVEs"]
== CVEs

* link:https://access.redhat.com/security/cve/CVE-2007-4559[CVE-2007-4559]
* link:https://access.redhat.com/security/cve/CVE-2021-43975[CVE-2021-43975]
* link:https://access.redhat.com/security/cve/CVE-2022-3594[CVE-2022-3594]
* link:https://access.redhat.com/security/cve/CVE-2022-3640[CVE-2022-3640]
* link:https://access.redhat.com/security/cve/CVE-2022-4744[CVE-2022-4744]
* link:https://access.redhat.com/security/cve/CVE-2022-28388[CVE-2022-28388]
* link:https://access.redhat.com/security/cve/CVE-2022-38457[CVE-2022-38457]
* link:https://access.redhat.com/security/cve/CVE-2022-40133[CVE-2022-40133]
* link:https://access.redhat.com/security/cve/CVE-2022-40982[CVE-2022-40982]
* link:https://access.redhat.com/security/cve/CVE-2022-41862[CVE-2022-41862]
* link:https://access.redhat.com/security/cve/CVE-2022-42895[CVE-2022-42895]
* link:https://access.redhat.com/security/cve/CVE-2022-45869[CVE-2022-45869]
* link:https://access.redhat.com/security/cve/CVE-2022-45887[CVE-2022-45887]
* link:https://access.redhat.com/security/cve/CVE-2022-48337[CVE-2022-48337]
* link:https://access.redhat.com/security/cve/CVE-2022-48339[CVE-2022-48339]
* link:https://access.redhat.com/security/cve/CVE-2023-0458[CVE-2023-0458]
* link:https://access.redhat.com/security/cve/CVE-2023-0590[CVE-2023-0590]
* link:https://access.redhat.com/security/cve/CVE-2023-0597[CVE-2023-0597]
* link:https://access.redhat.com/security/cve/CVE-2023-1073[CVE-2023-1073]
* link:https://access.redhat.com/security/cve/CVE-2023-1074[CVE-2023-1074]
* link:https://access.redhat.com/security/cve/CVE-2023-1075[CVE-2023-1075]
* link:https://access.redhat.com/security/cve/CVE-2023-1079[CVE-2023-1079]
* link:https://access.redhat.com/security/cve/CVE-2023-1118[CVE-2023-1118]
* link:https://access.redhat.com/security/cve/CVE-2023-1206[CVE-2023-1206]
* link:https://access.redhat.com/security/cve/CVE-2023-1252[CVE-2023-1252]
* link:https://access.redhat.com/security/cve/CVE-2023-1382[CVE-2023-1382]
* link:https://access.redhat.com/security/cve/CVE-2023-1855[CVE-2023-1855]
* link:https://access.redhat.com/security/cve/CVE-2023-1981[CVE-2023-1981]
* link:https://access.redhat.com/security/cve/CVE-2023-1989[CVE-2023-1989]
* link:https://access.redhat.com/security/cve/CVE-2023-1998[CVE-2023-1998]
* link:https://access.redhat.com/security/cve/CVE-2023-2513[CVE-2023-2513]
* link:https://access.redhat.com/security/cve/CVE-2023-3138[CVE-2023-3138]
* link:https://access.redhat.com/security/cve/CVE-2023-3141[CVE-2023-3141]
* link:https://access.redhat.com/security/cve/CVE-2023-3161[CVE-2023-3161]
* link:https://access.redhat.com/security/cve/CVE-2023-3212[CVE-2023-3212]
* link:https://access.redhat.com/security/cve/CVE-2023-3268[CVE-2023-3268]
* link:https://access.redhat.com/security/cve/CVE-2023-3609[CVE-2023-3609]
* link:https://access.redhat.com/security/cve/CVE-2023-3611[CVE-2023-3611]
* link:https://access.redhat.com/security/cve/CVE-2023-3772[CVE-2023-3772]
* link:https://access.redhat.com/security/cve/CVE-2023-4016[CVE-2023-4016]
* link:https://access.redhat.com/security/cve/CVE-2023-4128[CVE-2023-4128]
* link:https://access.redhat.com/security/cve/CVE-2023-4132[CVE-2023-4132]
* link:https://access.redhat.com/security/cve/CVE-2023-4155[CVE-2023-4155]
* link:https://access.redhat.com/security/cve/CVE-2023-4206[CVE-2023-4206]
* link:https://access.redhat.com/security/cve/CVE-2023-4207[CVE-2023-4207]
* link:https://access.redhat.com/security/cve/CVE-2023-4208[CVE-2023-4208]
* link:https://access.redhat.com/security/cve/CVE-2023-4641[CVE-2023-4641]
* link:https://access.redhat.com/security/cve/CVE-2023-4732[CVE-2023-4732]
* link:https://access.redhat.com/security/cve/CVE-2023-22745[CVE-2023-22745]
* link:https://access.redhat.com/security/cve/CVE-2023-23455[CVE-2023-23455]
* link:https://access.redhat.com/security/cve/CVE-2023-26545[CVE-2023-26545]
* link:https://access.redhat.com/security/cve/CVE-2023-28328[CVE-2023-28328]
* link:https://access.redhat.com/security/cve/CVE-2023-28772[CVE-2023-28772]
* link:https://access.redhat.com/security/cve/CVE-2023-30456[CVE-2023-30456]
* link:https://access.redhat.com/security/cve/CVE-2023-31084[CVE-2023-31084]
* link:https://access.redhat.com/security/cve/CVE-2023-31436[CVE-2023-31436]
* link:https://access.redhat.com/security/cve/CVE-2023-31486[CVE-2023-31486]
* link:https://access.redhat.com/security/cve/CVE-2023-32324[CVE-2023-32324]
* link:https://access.redhat.com/security/cve/CVE-2023-33203[CVE-2023-33203]
* link:https://access.redhat.com/security/cve/CVE-2023-33951[CVE-2023-33951]
* link:https://access.redhat.com/security/cve/CVE-2023-33952[CVE-2023-33952]
* link:https://access.redhat.com/security/cve/CVE-2023-34241[CVE-2023-34241]
* link:https://access.redhat.com/security/cve/CVE-2023-35823[CVE-2023-35823]
* link:https://access.redhat.com/security/cve/CVE-2023-35824[CVE-2023-35824]
* link:https://access.redhat.com/security/cve/CVE-2023-35825[CVE-2023-35825]