diff --git a/modules/logging-release-notes-5-8-10.adoc b/modules/logging-release-notes-5-8-10.adoc index 643df716e14e..14ba95c62d8a 100644 --- a/modules/logging-release-notes-5-8-10.adoc +++ b/modules/logging-release-notes-5-8-10.adoc @@ -17,14 +17,14 @@ This release includes link:https://access.redhat.com/errata/RHBA-2024:4629[OpenS [id="logging-release-notes-5-8-10-CVEs"] == CVEs -*link:https://access.redhat.com/security/cve/CVE-2023-6597[CVE-2023-6597] -*link:https://access.redhat.com/security/cve/CVE-2024-0450[CVE-2024-0450] -*link:https://access.redhat.com/security/cve/CVE-2024-3651[CVE-2024-3651] -*link:https://access.redhat.com/security/cve/CVE-2024-6387[CVE-2024-6387] -*link:https://access.redhat.com/security/cve/CVE-2024-26735[CVE-2024-26735] -*link:https://access.redhat.com/security/cve/CVE-2024-26993[CVE-2024-26993] -*link:https://access.redhat.com/security/cve/CVE-2024-32002[CVE-2024-32002] -*link:https://access.redhat.com/security/cve/CVE-2024-32004[CVE-2024-32004] -*link:https://access.redhat.com/security/cve/CVE-2024-32020[CVE-2024-32020] -*link:https://access.redhat.com/security/cve/CVE-2024-32021[CVE-2024-32021] -*link:https://access.redhat.com/security/cve/CVE-2024-32465[CVE-2024-32465] \ No newline at end of file +* link:https://access.redhat.com/security/cve/CVE-2023-6597[CVE-2023-6597] +* link:https://access.redhat.com/security/cve/CVE-2024-0450[CVE-2024-0450] +* link:https://access.redhat.com/security/cve/CVE-2024-3651[CVE-2024-3651] +* link:https://access.redhat.com/security/cve/CVE-2024-6387[CVE-2024-6387] +* link:https://access.redhat.com/security/cve/CVE-2024-26735[CVE-2024-26735] +* link:https://access.redhat.com/security/cve/CVE-2024-26993[CVE-2024-26993] +* link:https://access.redhat.com/security/cve/CVE-2024-32002[CVE-2024-32002] +* link:https://access.redhat.com/security/cve/CVE-2024-32004[CVE-2024-32004] +* link:https://access.redhat.com/security/cve/CVE-2024-32020[CVE-2024-32020] +* link:https://access.redhat.com/security/cve/CVE-2024-32021[CVE-2024-32021] +* link:https://access.redhat.com/security/cve/CVE-2024-32465[CVE-2024-32465] \ No newline at end of file diff --git a/modules/logging-release-notes-5-8-11.adoc b/modules/logging-release-notes-5-8-11.adoc new file mode 100644 index 000000000000..d87e1cea7d60 --- /dev/null +++ b/modules/logging-release-notes-5-8-11.adoc @@ -0,0 +1,53 @@ +// module included in /logging/logging-5-8-release-notes +:_mod-docs-content-type: REFERENCE +[id="logging-release-notes-5-8-11_{context}"] += Logging 5.8.11 +This release includes link:https://access.redhat.com/errata/RHBA-2024:5124[OpenShift Logging Bug Fix Release 5.8.11] and link:https://access.redhat.com/errata/RHBA-2024:5123[OpenShift Logging Bug Fix Release 5.8.11]. + +[id="logging-release-notes-5-8-11-bug-fixes"] +== Bug fixes +* Before this update, the TLS section was added without verifying the broker URL schema, leading to SSL connection errors if the URLs did not start with `tls`. With this update, the TLS section is added only if broker URLs start with `tls`, preventing SSL connection errors. (link:https://issues.redhat.com/browse/LOG-5139[LOG-5139]) + +* Before this update, the Loki Operator did not trigger alerts when it dropped log events due to validation failures. With this update, the Loki Operator includes a new alert definition that triggers an alert if Loki drops log events due to validation failures. (link:https://issues.redhat.com/browse/LOG-5896[LOG-5896]) + +* Before this update, the 4.16 GA catalog did not include Elasticsearch Operator 5.8, preventing the installation of products like Service Mesh, Kiali, and Tracing. With this update, Elasticsearch Operator 5.8 is now available on 4.16, resolving the issue and providing support for Elasticsearch storage for these products only. (link:https://issues.redhat.com/browse/LOG-5911[LOG-5911]) + +* Before this update, duplicate conditions in the LokiStack resource status led to invalid metrics from the Loki Operator. With this update, the Operator removes duplicate conditions from the status. (link:https://issues.redhat.com/browse/LOG-5857[LOG-5857]) + +* Before this update, the Loki Operator overwrote user annotations on the LokiStack Route resource, causing customizations to drop. With this update, the Loki Operator no longer overwrites Route annotations, fixing the issue. (link:https://issues.redhat.com/browse/LOG-5946[LOG-5946]) + +[id="logging-release-notes-5-8-11-CVEs"] +== CVEs + +* link:https://access.redhat.com/security/cve/CVE-2021-47548[CVE-2021-47548] +* link:https://access.redhat.com/security/cve/CVE-2021-47596[CVE-2021-47596] +* link:https://access.redhat.com/security/cve/CVE-2022-48627[CVE-2022-48627] +* link:https://access.redhat.com/security/cve/CVE-2023-52638[CVE-2023-52638] +* link:https://access.redhat.com/security/cve/CVE-2024-4032[CVE-2024-4032] +* link:https://access.redhat.com/security/cve/CVE-2024-6409[CVE-2024-6409] +* link:https://access.redhat.com/security/cve/CVE-2024-21131[CVE-2024-21131] +* link:https://access.redhat.com/security/cve/CVE-2024-21138[CVE-2024-21138] +* link:https://access.redhat.com/security/cve/CVE-2024-21140[CVE-2024-21140] +* link:https://access.redhat.com/security/cve/CVE-2024-21144[CVE-2024-21144] +* link:https://access.redhat.com/security/cve/CVE-2024-21145[CVE-2024-21145] +* link:https://access.redhat.com/security/cve/CVE-2024-21147[CVE-2024-21147] +* link:https://access.redhat.com/security/cve/CVE-2024-24806[CVE-2024-24806] +* link:https://access.redhat.com/security/cve/CVE-2024-26783[CVE-2024-26783] +* link:https://access.redhat.com/security/cve/CVE-2024-26858[CVE-2024-26858] +* link:https://access.redhat.com/security/cve/CVE-2024-27397[CVE-2024-27397] +* link:https://access.redhat.com/security/cve/CVE-2024-27435[CVE-2024-27435] +* link:https://access.redhat.com/security/cve/CVE-2024-35235[CVE-2024-35235] +* link:https://access.redhat.com/security/cve/CVE-2024-35958[CVE-2024-35958] +* link:https://access.redhat.com/security/cve/CVE-2024-36270[CVE-2024-36270] +* link:https://access.redhat.com/security/cve/CVE-2024-36886[CVE-2024-36886] +* link:https://access.redhat.com/security/cve/CVE-2024-36904[CVE-2024-36904] +* link:https://access.redhat.com/security/cve/CVE-2024-36957[CVE-2024-36957] +* link:https://access.redhat.com/security/cve/CVE-2024-38473[CVE-2024-38473] +* link:https://access.redhat.com/security/cve/CVE-2024-38474[CVE-2024-38474] +* link:https://access.redhat.com/security/cve/CVE-2024-38475[CVE-2024-38475] +* link:https://access.redhat.com/security/cve/CVE-2024-38477[CVE-2024-38477] +* link:https://access.redhat.com/security/cve/CVE-2024-38543[CVE-2024-38543] +* link:https://access.redhat.com/security/cve/CVE-2024-38586[CVE-2024-38586] +* link:https://access.redhat.com/security/cve/CVE-2024-38593[CVE-2024-38593] +* link:https://access.redhat.com/security/cve/CVE-2024-38663[CVE-2024-38663] +* link:https://access.redhat.com/security/cve/CVE-2024-39573[CVE-2024-39573] \ No newline at end of file diff --git a/observability/logging/logging_release_notes/logging-5-8-release-notes.adoc b/observability/logging/logging_release_notes/logging-5-8-release-notes.adoc index 07d07f8d97f3..60246dc4d76c 100644 --- a/observability/logging/logging_release_notes/logging-5-8-release-notes.adoc +++ b/observability/logging/logging_release_notes/logging-5-8-release-notes.adoc @@ -10,6 +10,8 @@ include::snippets/logging-compatibility-snip.adoc[] include::snippets/logging-stable-updates-snip.adoc[] +include::modules/logging-release-notes-5-8-11.adoc[leveloffset=+1] + include::modules/logging-release-notes-5-8-10.adoc[leveloffset=+1] include::modules/logging-release-notes-5-8-9.adoc[leveloffset=+1]