diff --git a/modules/logging-release-notes-5-7-15.adoc b/modules/logging-release-notes-5-7-15.adoc new file mode 100644 index 000000000000..646d499eba5b --- /dev/null +++ b/modules/logging-release-notes-5-7-15.adoc @@ -0,0 +1,94 @@ +// module included in logging/logging-5-7-release-notes +:_mod-docs-content-type: REFERENCE +[id="logging-release-notes-5-7-15_{context}"] += Logging 5.7.15 +This release includes link:https://access.redhat.com/errata/RHBA-2024:3739[OpenShift Logging Bug Fix 5.7.15]. + + +[id="logging-release-notes-5-7-15-bug-fixes"] +== Bug fixes + +* Before this update, there was a delay in restarting Ingesters when configuring `LokiStack`, because the {loki-op} sets the write-ahead log `replay_memory_ceiling` to zero bytes for the `1x.demo` size. With this update, the minimum value used for the `replay_memory_ceiling` has been increased to avoid delays. (link:https://issues.redhat.com/browse/LOG-5616[LOG-5616]) + +[id="logging-release-notes-5-7-15-CVEs"] +== CVEs + +* link:https://access.redhat.com/security/cve/CVE-2019-25162[CVE-2019-25162] +* link:https://access.redhat.com/security/cve/CVE-2020-15778[CVE-2020-15778] +* link:https://access.redhat.com/security/cve/CVE-2020-36777[CVE-2020-36777] +* link:https://access.redhat.com/security/cve/CVE-2021-43618[CVE-2021-43618] +* link:https://access.redhat.com/security/cve/CVE-2021-46934[CVE-2021-46934] +* link:https://access.redhat.com/security/cve/CVE-2021-47013[CVE-2021-47013] +* link:https://access.redhat.com/security/cve/CVE-2021-47055[CVE-2021-47055] +* link:https://access.redhat.com/security/cve/CVE-2021-47118[CVE-2021-47118] +* link:https://access.redhat.com/security/cve/CVE-2021-47153[CVE-2021-47153] +* link:https://access.redhat.com/security/cve/CVE-2021-47171[CVE-2021-47171] +* link:https://access.redhat.com/security/cve/CVE-2021-47185[CVE-2021-47185] +* link:https://access.redhat.com/security/cve/CVE-2022-4645[CVE-2022-4645] +* link:https://access.redhat.com/security/cve/CVE-2022-48627[CVE-2022-48627] +* link:https://access.redhat.com/security/cve/CVE-2022-48669[CVE-2022-48669] +* link:https://access.redhat.com/security/cve/CVE-2023-6004[CVE-2023-6004] +* link:https://access.redhat.com/security/cve/CVE-2023-6240[CVE-2023-6240] +* link:https://access.redhat.com/security/cve/CVE-2023-6597[CVE-2023-6597] +* link:https://access.redhat.com/security/cve/CVE-2023-6918[CVE-2023-6918] +* link:https://access.redhat.com/security/cve/CVE-2023-7008[CVE-2023-7008] +* link:https://access.redhat.com/security/cve/CVE-2023-43785[CVE-2023-43785] +* link:https://access.redhat.com/security/cve/CVE-2023-43786[CVE-2023-43786] +* link:https://access.redhat.com/security/cve/CVE-2023-43787[CVE-2023-43787] +* link:https://access.redhat.com/security/cve/CVE-2023-43788[CVE-2023-43788] +* link:https://access.redhat.com/security/cve/CVE-2023-43789[CVE-2023-43789] +* link:https://access.redhat.com/security/cve/CVE-2023-52439[CVE-2023-52439] +* link:https://access.redhat.com/security/cve/CVE-2023-52445[CVE-2023-52445] +* link:https://access.redhat.com/security/cve/CVE-2023-52477[CVE-2023-52477] +* link:https://access.redhat.com/security/cve/CVE-2023-52513[CVE-2023-52513] +* link:https://access.redhat.com/security/cve/CVE-2023-52520[CVE-2023-52520] +* link:https://access.redhat.com/security/cve/CVE-2023-52528[CVE-2023-52528] +* link:https://access.redhat.com/security/cve/CVE-2023-52565[CVE-2023-52565] +* link:https://access.redhat.com/security/cve/CVE-2023-52578[CVE-2023-52578] +* link:https://access.redhat.com/security/cve/CVE-2023-52594[CVE-2023-52594] +* link:https://access.redhat.com/security/cve/CVE-2023-52595[CVE-2023-52595] +* link:https://access.redhat.com/security/cve/CVE-2023-52598[CVE-2023-52598] +* link:https://access.redhat.com/security/cve/CVE-2023-52606[CVE-2023-52606] +* link:https://access.redhat.com/security/cve/CVE-2023-52607[CVE-2023-52607] +* link:https://access.redhat.com/security/cve/CVE-2023-52610[CVE-2023-52610] +* link:https://access.redhat.com/security/cve/CVE-2024-0340[CVE-2024-0340] +* link:https://access.redhat.com/security/cve/CVE-2024-0450[CVE-2024-0450] +* link:https://access.redhat.com/security/cve/CVE-2024-22365[CVE-2024-22365] +* link:https://access.redhat.com/security/cve/CVE-2024-23307[CVE-2024-23307] +* link:https://access.redhat.com/security/cve/CVE-2024-25062[CVE-2024-25062] +* link:https://access.redhat.com/security/cve/CVE-2024-25744[CVE-2024-25744] +* link:https://access.redhat.com/security/cve/CVE-2024-26458[CVE-2024-26458] +* link:https://access.redhat.com/security/cve/CVE-2024-26461[CVE-2024-26461] +* link:https://access.redhat.com/security/cve/CVE-2024-26593[CVE-2024-26593] +* link:https://access.redhat.com/security/cve/CVE-2024-26603[CVE-2024-26603] +* link:https://access.redhat.com/security/cve/CVE-2024-26610[CVE-2024-26610] +* link:https://access.redhat.com/security/cve/CVE-2024-26615[CVE-2024-26615] +* link:https://access.redhat.com/security/cve/CVE-2024-26642[CVE-2024-26642] +* link:https://access.redhat.com/security/cve/CVE-2024-26643[CVE-2024-26643] +* link:https://access.redhat.com/security/cve/CVE-2024-26659[CVE-2024-26659] +* link:https://access.redhat.com/security/cve/CVE-2024-26664[CVE-2024-26664] +* link:https://access.redhat.com/security/cve/CVE-2024-26693[CVE-2024-26693] +* link:https://access.redhat.com/security/cve/CVE-2024-26694[CVE-2024-26694] +* link:https://access.redhat.com/security/cve/CVE-2024-26743[CVE-2024-26743] +* link:https://access.redhat.com/security/cve/CVE-2024-26744[CVE-2024-26744] +* link:https://access.redhat.com/security/cve/CVE-2024-26779[CVE-2024-26779] +* link:https://access.redhat.com/security/cve/CVE-2024-26872[CVE-2024-26872] +* link:https://access.redhat.com/security/cve/CVE-2024-26892[CVE-2024-26892] +* link:https://access.redhat.com/security/cve/CVE-2024-26897[CVE-2024-26987] +* link:https://access.redhat.com/security/cve/CVE-2024-26901[CVE-2024-26901] +* link:https://access.redhat.com/security/cve/CVE-2024-26919[CVE-2024-26919] +* link:https://access.redhat.com/security/cve/CVE-2024-26933[CVE-2024-26933] +* link:https://access.redhat.com/security/cve/CVE-2024-26934[CVE-2024-26934] +* link:https://access.redhat.com/security/cve/CVE-2024-26964[CVE-2024-26964] +* link:https://access.redhat.com/security/cve/CVE-2024-26973[CVE-2024-26973] +* link:https://access.redhat.com/security/cve/CVE-2024-26993[CVE-2024-26993] +* link:https://access.redhat.com/security/cve/CVE-2024-27014[CVE-2024-27014] +* link:https://access.redhat.com/security/cve/CVE-2024-27048[CVE-2024-27048] +* link:https://access.redhat.com/security/cve/CVE-2024-27052[CVE-2024-27052] +* link:https://access.redhat.com/security/cve/CVE-2024-27056[CVE-2024-27056] +* link:https://access.redhat.com/security/cve/CVE-2024-27059[CVE-2024-27059] +* link:https://access.redhat.com/security/cve/CVE-2024-28834[CVE-2024-28834] +* link:https://access.redhat.com/security/cve/CVE-2024-33599[CVE-2024-33599] +* link:https://access.redhat.com/security/cve/CVE-2024-33600[CVE-2024-33600] +* link:https://access.redhat.com/security/cve/CVE-2024-33601[CVE-2024-33601] +* link:https://access.redhat.com/security/cve/CVE-2024-33602[CVE-2024-33602] \ No newline at end of file diff --git a/observability/logging/logging_release_notes/logging-5-7-release-notes.adoc b/observability/logging/logging_release_notes/logging-5-7-release-notes.adoc index 6d4a7f6baa7b..a028d09a8ed8 100644 --- a/observability/logging/logging_release_notes/logging-5-7-release-notes.adoc +++ b/observability/logging/logging_release_notes/logging-5-7-release-notes.adoc @@ -10,6 +10,8 @@ include::snippets/logging-compatibility-snip.adoc[] include::snippets/logging-stable-updates-snip.adoc[] +include::modules/logging-release-notes-5-7-15.adoc[leveloffset=+1] + include::modules/logging-release-notes-5-7-14.adoc[leveloffset=+1] include::modules/logging-release-notes-5-7-13.adoc[leveloffset=+1]