- Issued:
- 2022-06-14
- Updated:
- 2022-06-14
RHBA-2022:4874 - Bug Fix Advisory
Synopsis
Logging Subsystem 5.4.2 - Red Hat OpenShift
Type/Severity
Bug Fix Advisory
Topic
Logging Subsystem 5.4.2 - Red Hat OpenShift
Description
Logging Subsystem 5.4.2 - Red Hat OpenShift
Solution
For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:
https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html
For Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:
https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html
Affected Products
- Logging Subsystem for Red Hat OpenShift for ARM 64 5 for RHEL 8 aarch64
- Logging Subsystem for Red Hat OpenShift 5 for RHEL 8 x86_64
- Logging Subsystem for Red Hat OpenShift for IBM Power, little endian 5 for RHEL 8 ppc64le
- Logging Subsystem for Red Hat OpenShift for IBM Z and LinuxONE 5 for RHEL 8 s390x
Fixes
- LOG-2033 - Supported values for level field don't match documentation
- LOG-2319 - [release-5.4] Fluent config format is hard to read via configmap
- LOG-2607 - [release-5.4] $labels.instance is empty in the message when firing FluentdNodeDown alert
- LOG-2136 - Getting Kibana UI Error (500 Internal Error,configmap "oauth-serving-cert" not found)
- LOG-2553 - [release-5.4] The infra logs are sent to app-xx indices
- LOG-2677 - [release-5.4] Level Critical should match the beginning of the line as the other levels
- LOG-2679 - Elasticsearch operator selects invalid image for Kibana oauth-proxy if no internal registry is available
CVEs
- CVE-2018-25032
- CVE-2020-0404
- CVE-2020-4788
- CVE-2020-13974
- CVE-2020-19131
- CVE-2020-27820
- CVE-2021-0941
- CVE-2021-3612
- CVE-2021-3634
- CVE-2021-3669
- CVE-2021-3737
- CVE-2021-3743
- CVE-2021-3744
- CVE-2021-3752
- CVE-2021-3759
- CVE-2021-3764
- CVE-2021-3772
- CVE-2021-3773
- CVE-2021-4002
- CVE-2021-4037
- CVE-2021-4083
- CVE-2021-4157
- CVE-2021-4189
- CVE-2021-4197
- CVE-2021-4203
- CVE-2021-20322
- CVE-2021-21781
- CVE-2021-23222
- CVE-2021-26401
- CVE-2021-29154
- CVE-2021-37159
- CVE-2021-41617
- CVE-2021-41864
- CVE-2021-42739
- CVE-2021-43056
- CVE-2021-43389
- CVE-2021-43976
- CVE-2021-44733
- CVE-2021-45485
- CVE-2021-45486
- CVE-2022-0001
- CVE-2022-0002
- CVE-2022-0286
- CVE-2022-0322
- CVE-2022-1011
- CVE-2022-1271
References
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.