Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
94 changes: 94 additions & 0 deletions modules/logging-release-notes-5-7-15.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,94 @@
// module included in logging/logging-5-7-release-notes
:_mod-docs-content-type: REFERENCE
[id="logging-release-notes-5-7-15_{context}"]
= Logging 5.7.15
This release includes link:https://access.redhat.com/errata/RHBA-2024:3739[OpenShift Logging Bug Fix 5.7.15].


[id="logging-release-notes-5-7-15-bug-fixes"]
== Bug fixes

* Before this update, there was a delay in restarting Ingesters when configuring `LokiStack`, because the {loki-op} sets the write-ahead log `replay_memory_ceiling` to zero bytes for the `1x.demo` size. With this update, the minimum value used for the `replay_memory_ceiling` has been increased to avoid delays. (link:https://issues.redhat.com/browse/LOG-5616[LOG-5616])

[id="logging-release-notes-5-7-15-CVEs"]
== CVEs

* link:https://access.redhat.com/security/cve/CVE-2019-25162[CVE-2019-25162]
* link:https://access.redhat.com/security/cve/CVE-2020-15778[CVE-2020-15778]
* link:https://access.redhat.com/security/cve/CVE-2020-36777[CVE-2020-36777]
* link:https://access.redhat.com/security/cve/CVE-2021-43618[CVE-2021-43618]
* link:https://access.redhat.com/security/cve/CVE-2021-46934[CVE-2021-46934]
* link:https://access.redhat.com/security/cve/CVE-2021-47013[CVE-2021-47013]
* link:https://access.redhat.com/security/cve/CVE-2021-47055[CVE-2021-47055]
* link:https://access.redhat.com/security/cve/CVE-2021-47118[CVE-2021-47118]
* link:https://access.redhat.com/security/cve/CVE-2021-47153[CVE-2021-47153]
* link:https://access.redhat.com/security/cve/CVE-2021-47171[CVE-2021-47171]
* link:https://access.redhat.com/security/cve/CVE-2021-47185[CVE-2021-47185]
* link:https://access.redhat.com/security/cve/CVE-2022-4645[CVE-2022-4645]
* link:https://access.redhat.com/security/cve/CVE-2022-48627[CVE-2022-48627]
* link:https://access.redhat.com/security/cve/CVE-2022-48669[CVE-2022-48669]
* link:https://access.redhat.com/security/cve/CVE-2023-6004[CVE-2023-6004]
* link:https://access.redhat.com/security/cve/CVE-2023-6240[CVE-2023-6240]
* link:https://access.redhat.com/security/cve/CVE-2023-6597[CVE-2023-6597]
* link:https://access.redhat.com/security/cve/CVE-2023-6918[CVE-2023-6918]
* link:https://access.redhat.com/security/cve/CVE-2023-7008[CVE-2023-7008]
* link:https://access.redhat.com/security/cve/CVE-2023-43785[CVE-2023-43785]
* link:https://access.redhat.com/security/cve/CVE-2023-43786[CVE-2023-43786]
* link:https://access.redhat.com/security/cve/CVE-2023-43787[CVE-2023-43787]
* link:https://access.redhat.com/security/cve/CVE-2023-43788[CVE-2023-43788]
* link:https://access.redhat.com/security/cve/CVE-2023-43789[CVE-2023-43789]
* link:https://access.redhat.com/security/cve/CVE-2023-52439[CVE-2023-52439]
* link:https://access.redhat.com/security/cve/CVE-2023-52445[CVE-2023-52445]
* link:https://access.redhat.com/security/cve/CVE-2023-52477[CVE-2023-52477]
* link:https://access.redhat.com/security/cve/CVE-2023-52513[CVE-2023-52513]
* link:https://access.redhat.com/security/cve/CVE-2023-52520[CVE-2023-52520]
* link:https://access.redhat.com/security/cve/CVE-2023-52528[CVE-2023-52528]
* link:https://access.redhat.com/security/cve/CVE-2023-52565[CVE-2023-52565]
* link:https://access.redhat.com/security/cve/CVE-2023-52578[CVE-2023-52578]
* link:https://access.redhat.com/security/cve/CVE-2023-52594[CVE-2023-52594]
* link:https://access.redhat.com/security/cve/CVE-2023-52595[CVE-2023-52595]
* link:https://access.redhat.com/security/cve/CVE-2023-52598[CVE-2023-52598]
* link:https://access.redhat.com/security/cve/CVE-2023-52606[CVE-2023-52606]
* link:https://access.redhat.com/security/cve/CVE-2023-52607[CVE-2023-52607]
* link:https://access.redhat.com/security/cve/CVE-2023-52610[CVE-2023-52610]
* link:https://access.redhat.com/security/cve/CVE-2024-0340[CVE-2024-0340]
* link:https://access.redhat.com/security/cve/CVE-2024-0450[CVE-2024-0450]
* link:https://access.redhat.com/security/cve/CVE-2024-22365[CVE-2024-22365]
* link:https://access.redhat.com/security/cve/CVE-2024-23307[CVE-2024-23307]
* link:https://access.redhat.com/security/cve/CVE-2024-25062[CVE-2024-25062]
* link:https://access.redhat.com/security/cve/CVE-2024-25744[CVE-2024-25744]
* link:https://access.redhat.com/security/cve/CVE-2024-26458[CVE-2024-26458]
* link:https://access.redhat.com/security/cve/CVE-2024-26461[CVE-2024-26461]
* link:https://access.redhat.com/security/cve/CVE-2024-26593[CVE-2024-26593]
* link:https://access.redhat.com/security/cve/CVE-2024-26603[CVE-2024-26603]
* link:https://access.redhat.com/security/cve/CVE-2024-26610[CVE-2024-26610]
* link:https://access.redhat.com/security/cve/CVE-2024-26615[CVE-2024-26615]
* link:https://access.redhat.com/security/cve/CVE-2024-26642[CVE-2024-26642]
* link:https://access.redhat.com/security/cve/CVE-2024-26643[CVE-2024-26643]
* link:https://access.redhat.com/security/cve/CVE-2024-26659[CVE-2024-26659]
* link:https://access.redhat.com/security/cve/CVE-2024-26664[CVE-2024-26664]
* link:https://access.redhat.com/security/cve/CVE-2024-26693[CVE-2024-26693]
* link:https://access.redhat.com/security/cve/CVE-2024-26694[CVE-2024-26694]
* link:https://access.redhat.com/security/cve/CVE-2024-26743[CVE-2024-26743]
* link:https://access.redhat.com/security/cve/CVE-2024-26744[CVE-2024-26744]
* link:https://access.redhat.com/security/cve/CVE-2024-26779[CVE-2024-26779]
* link:https://access.redhat.com/security/cve/CVE-2024-26872[CVE-2024-26872]
* link:https://access.redhat.com/security/cve/CVE-2024-26892[CVE-2024-26892]
* link:https://access.redhat.com/security/cve/CVE-2024-26897[CVE-2024-26987]
* link:https://access.redhat.com/security/cve/CVE-2024-26901[CVE-2024-26901]
* link:https://access.redhat.com/security/cve/CVE-2024-26919[CVE-2024-26919]
* link:https://access.redhat.com/security/cve/CVE-2024-26933[CVE-2024-26933]
* link:https://access.redhat.com/security/cve/CVE-2024-26934[CVE-2024-26934]
* link:https://access.redhat.com/security/cve/CVE-2024-26964[CVE-2024-26964]
* link:https://access.redhat.com/security/cve/CVE-2024-26973[CVE-2024-26973]
* link:https://access.redhat.com/security/cve/CVE-2024-26993[CVE-2024-26993]
* link:https://access.redhat.com/security/cve/CVE-2024-27014[CVE-2024-27014]
* link:https://access.redhat.com/security/cve/CVE-2024-27048[CVE-2024-27048]
* link:https://access.redhat.com/security/cve/CVE-2024-27052[CVE-2024-27052]
* link:https://access.redhat.com/security/cve/CVE-2024-27056[CVE-2024-27056]
* link:https://access.redhat.com/security/cve/CVE-2024-27059[CVE-2024-27059]
* link:https://access.redhat.com/security/cve/CVE-2024-28834[CVE-2024-28834]
* link:https://access.redhat.com/security/cve/CVE-2024-33599[CVE-2024-33599]
* link:https://access.redhat.com/security/cve/CVE-2024-33600[CVE-2024-33600]
* link:https://access.redhat.com/security/cve/CVE-2024-33601[CVE-2024-33601]
* link:https://access.redhat.com/security/cve/CVE-2024-33602[CVE-2024-33602]
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@ include::snippets/logging-compatibility-snip.adoc[]

include::snippets/logging-stable-updates-snip.adoc[]

include::modules/logging-release-notes-5-7-15.adoc[leveloffset=+1]

include::modules/logging-release-notes-5-7-14.adoc[leveloffset=+1]

include::modules/logging-release-notes-5-7-13.adoc[leveloffset=+1]
Expand Down