|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * backup_and_restore/oadp-release-notes-1-2.adoc |
| 4 | + |
| 5 | +:_mod-docs-content-type: REFERENCE |
| 6 | +[id="migration-oadp-release-notes-1-2-5_{context}"] |
| 7 | += OADP 1.2.5 release notes |
| 8 | + |
| 9 | +{oadp-first} 1.2.5 is a Container Grade Only (CGO) release, released to refresh the health grades of the containers, with no changes to any code in the product itself compared to that of {oadp-short} 1.2.4. |
| 10 | + |
| 11 | +[id="resolved-issues-1-2-5_{context}"] |
| 12 | +== Resolved issues |
| 13 | + |
| 14 | +// There are no resolved issues in {oadp-short} 1.2.5. |
| 15 | + |
| 16 | +.CVE-2023-2431: `oadp-velero-plugin-for-microsoft-azure-container`: Bypass of seccomp profile enforcement |
| 17 | + |
| 18 | +A flaw was found in Kubernetes, which impacts earlier versions of {oadp-short}. This flaw arises when Kubernetes allows a local authenticated attacker to bypass security restrictions, caused by a flaw when using the localhost type for a `seccomp` profile but specifying an empty profile field. An attacker can bypass the `seccomp` profile enforcement by sending a specially crafted request. This flaw has been resolved in {oadp-short} 1.2.5. |
| 19 | + |
| 20 | +For more details, see link:https://access.redhat.com/security/cve/CVE-2023-2431[(CVE-2023-2431)]. |
| 21 | + |
| 22 | +.CSI restore ended with 'PartiallyFailed' status and PVCs not created |
| 23 | + |
| 24 | +CSI restore ended with `PartiallyFailed` status. PVCs are not created, pod are in `Pending` status. This issue has been resolved in {oadp-short} 1.2.5. |
| 25 | + |
| 26 | +link:https://issues.redhat.com/browse/OADP-1956[(OADP-1956)] |
| 27 | + |
| 28 | +.PodVolumeBackup fails on completed pod volumes |
| 29 | + |
| 30 | +In earlier versions of {oadp-short} 1.2, when there is a completed pod that mounted volumes in a namespace used by the Restic `podvolumebackup` or Velero backup, the backup does not complete successfully. This occurs when `defaultVolumesToFsBackup` is set to `true`. This issue has been resolved in {oadp-short} 1.2.5. |
| 31 | + |
| 32 | +link:https://issues.redhat.com/browse/OADP-1870[(OADP-1870)] |
| 33 | + |
| 34 | + |
| 35 | +[id="known-issues-1-2-5_{context}"] |
| 36 | +== Known issues |
| 37 | + |
| 38 | +// The {oadp-short} 1.2.5 has the following known issue: |
| 39 | + |
| 40 | +.Data Protection Application (DPA) does not reconcile when the credentials secret is updated |
| 41 | + |
| 42 | +Currently, the {oadp-short} Operator does not reconcile when you update the `cloud-credentials` secret. This occurs because there are no {oadp-short} specific labels or owner references on the `cloud-credentials` secret. If you create a `cloud-credentials` secret with incorrect credentials, such as empty data, the Operator reconciles and creates a backup storage location (BSL) and registry deployment with the empty data. As a result, when you update the `cloud-credentials` secret with the correct credentials, the {oadp-short} Operator does not immediately reconcile to catch the new credentials. |
| 43 | + |
| 44 | +Workaround: Update to {oadp-short} 1.3. |
| 45 | + |
| 46 | +link:https://issues.redhat.com/browse/OADP-3327[(OADP-3327)] |
| 47 | + |
0 commit comments