Monthly Release Notes - October 2023

Jump to:

 

Automate


Automate and Automate Desktop

Version 23.1.0

October 09, 2023

New Features
  • User Interface Enhancements

    • Automate Plus/Ultimate has been renamed to Automate.

    • Rebranded the Automate and Automate Desktop user interfaces and company logos from HelpSystems to Fortra.

    • The user interface for Automate has been updated to provide an improved user experience.

    • Automate Desktop now displays the Automate Desktop product name in the user interface.

    • The Dashboard feature has been removed from Automate.

  • Custom Actions

    • Automate only.

    • Allows you to create your own actions that look and function just like those created by Fortra. You can add your own action icon and controls such as text boxes, radio buttons, and drop-down lists to each action to provide the flexibility you need to execute your automated tasks.

  • Password Complexity Management

    • Automate only.

    • Allows you to set the password policy for Automate users by specifying the password length, required character types, password expiration, and password reuse.

Enhancements
  • Automate users can now opt in to using an SSL/TLS secured connection to their Active Directory/LDAP to validate credentials.

  • Automate users can now validate Active Directory/LDAP credentials across multiple domains.

  • Automate administrators can now manage RESTful API keys for each user.

  • The Automate RESTful API now supports Bearer authentication by way of API key tokens.

  • The Azure Storage action now supports the Credentials feature in Automate.

  • The Email action now supports the Credentials feature in Automate.

  • The Exchange action now supports the Credentials feature in Automate.

  • The Network action now supports the Credentials feature in Automate.

  • The Services action now supports the Credentials feature in Automate.

  • Automate users are now logged out of all active sessions when their password is changed by an administrator or another user. Changing your own password now logs you off all active sessions except your current session.

  • The Google Chrome driver update mechanism in Automate and Automate Desktop has been updated to support Chrome 115 or later.

Fixes
  • Running workflows or tasks on the server no longer causes excessive garbage collection to occur.

  • The Web Browser action now properly supports IE Mode in the Microsoft Edge web browser.

  • The performance of the Web Browser (Extract table) activity has been improved and no longer runs slow during a task.

  • The Web Browser (Extract table) activity now correctly formats datasets that contain nested tables.

  • The Web Browser (Extract table) activity now correctly identifies frame IDs.

  • The Web Browser (Set value) activity no longer appends new text to old text.

  • The Web Browser (Get value) activity now correctly gets the text of a value instead of the value attribute.

  • The Web Browser (Click) activity now correctly interacts with upload resource buttons.

  • The Web Browser (Click) activity now correctly interacts with button elements by simulating a mouse action instead of a programmatic mouse click.

  • The SQL Connections window no longer improperly encrypts SQL connection strings or other sensitive information in the server or agent's properties when buttons in the window are double-clicked, or other interactions are performed.

  • SQL columns with identical names are now uniquely renamed when joined and stored in a dataset.

  • Constants no longer display a numeric value larger than 15 characters as a math equation.

  • The Variable (Create) activity no longer displays a numeric value larger than 15 characters as an engineering notation.

  • Task Builder now correctly executes the Run Selected Steps option if only multiple region headers are selected.

  • The JSON Objects action is now properly scoped to the entire task versus function in Task Builder.

  • The If action no longer fails when comparing a null database value against a dataset.

  • The If action now evaluates negative numbers correctly.

  • The If action now displays the correct error message when evaluating an incorrect expression.

  • The Visual Basic vbCrLf command no longer displays the "Variable or function "vbCrLf" does not exist.” error in Automate.

  • The Visual Basic vbLf command no longer displays the "Variable or function "vbLf" does not exist.” error in Automate.

  • The IsDefined function now returns the correct results when checking the properties of a dataset.

  • The help pages for the GetVar and GetVarCount Extended Functions have been removed from the Automate and Automate Desktop User Guides. These Extended Functions are no longer available in either product.

  • Automate Runtime no longer reports "Not licensed" for valid Automate Desktop license keys.

  • Reports against logs with dates recorded in Gregorian format will now display properly.

  • The Database (Stored procedure) activity now correctly executes by way of ODBC using DSN or similar drivers.

  • The File System (CSV to dataset) activity now correctly compares custom column names with system default column names.

  • The File System (CSV to dataset) activity now correctly parses columns containing two or more values with double quotes.

  • The File System trigger now properly populates AMTrigger variables.

  • The XML (Save) activity now correctly writes out to local custom task function variables.

  • The SharePoint (Download file(s)) activity now correctly displays the correct code for the "No files were downloaded." Error Cause.

  • The Compression (Compress) activity now correctly zips files that contain special characters in the file name.

Back to Top

 

Cobalt Strike


Version: 4.9.1

October 10, 2023

Enhancements
  • Updated the console help for the execute-assembly, inline-execute, and data-store commands.
Fixes
  • Fixed issue where the Post-Ex obfuscate and cleanup settings were not applied correctly.

  • Fixed issue where the .NET assemblies stored in the Data Store were not used when Post-Ex obfuscate setting is true.

  • Fixed issue when applying UDRLs to Post-Ex DLLs (POSTEX_RDLL_GENERATE) would cause the dll to not initialize and fail.

Back to Top

 

Digital Defense


NIRV Scanner

Version 4.30.0

October 31, 2023

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 157574 Amazon Linux 2 Security Advisory: ALAS-2023-2287 (Low)

  • 157558 Amazon Linux 2 Security Advisory: ALAS-2023-2288 (Low)

  • 157571 Amazon Linux 2 Security Advisory: ALAS-2023-2289 (Low)

  • 157563 Amazon Linux 2 Security Advisory: ALAS-2023-2290 (Low)

  • 157553 Amazon Linux 2 Security Advisory: ALAS-2023-2291 (Low)

  • 157570 Amazon Linux 2 Security Advisory: ALAS-2023-2292 (Low)

  • 157552 Amazon Linux 2 Security Advisory: ALAS-2023-2293 (Low)

  • 157569 Amazon Linux 2 Security Advisory: ALAS-2023-2294 (Low)

  • 157549 Amazon Linux 2 Security Advisory: ALAS-2023-2295 (Low)

  • 157547 Amazon Linux 2 Security Advisory: ALAS-2023-2296 (Low)

  • 157551 Amazon Linux 2 Security Advisory: ALAS-2023-2297 (Low)

  • 157568 Amazon Linux 2 Security Advisory: ALAS-2023-2298 (Low)

  • 157546 Amazon Linux 2 Security Advisory: ALAS-2023-2299 (Low)

  • 157548 Amazon Linux 2 Security Advisory: ALAS-2023-2300 (Medium)

  • 157572 Amazon Linux 2 Security Advisory: ALAS-2023-2301 (Low)

  • 157554 Amazon Linux 2 Security Advisory: ALAS-2023-2302 (Low)

  • 157561 Amazon Linux 2 Security Advisory: ALAS-2023-2303 (Low)

  • 157555 Amazon Linux 2 Security Advisory: ALAS-2023-2304 (Low)

  • 157564 Amazon Linux 2 Security Advisory: ALAS-2023-2305 (Medium)

  • 157562 Amazon Linux 2 Security Advisory: ALAS-2023-2306 (Medium)

  • 157559 Amazon Linux 2 Security Advisory: ALAS-2023-2307 (Low)

  • 157545 Amazon Linux 2 Security Advisory: ALAS-2023-2308 (Medium)

  • 157567 Amazon Linux 2 Security Advisory: ALAS-2023-2309 (Medium)

  • 157550 Amazon Linux 2 Security Advisory: ALAS-2023-2310 (Medium)

  • 157573 Amazon Linux 2 Security Advisory: ALAS-2023-2311 (High)

  • 157557 Amazon Linux 2 Security Advisory: ALAS-2023-2312 (Low)

  • 157560 Amazon Linux 2 Security Advisory: ALAS-2023-2313 (Low)

  • 157556 Amazon Linux 2 Security Advisory: ALAS-2023-2314 (Low)

  • 157565 Amazon Linux 2 Security Advisory: ALAS-2023-2315 (Low)

  • 157566 Amazon Linux 2 Security Advisory: ALAS-2023-2316 (Medium)

  • 157532 Amazon Linux Security Advisory: ALAS-2023-1856 (Low)

  • 157533 Amazon Linux Security Advisory: ALAS-2023-1857 (Low)

  • 157541 Amazon Linux Security Advisory: ALAS-2023-1858 (Low)

  • 157537 Amazon Linux Security Advisory: ALAS-2023-1859 (Low)

  • 157531 Amazon Linux Security Advisory: ALAS-2023-1860 (Low)

  • 157542 Amazon Linux Security Advisory: ALAS-2023-1861 (Low)

  • 157539 Amazon Linux Security Advisory: ALAS-2023-1862 (Low)

  • 157543 Amazon Linux Security Advisory: ALAS-2023-1863 (Low)

  • 157538 Amazon Linux Security Advisory: ALAS-2023-1864 (Low)

  • 157534 Amazon Linux Security Advisory: ALAS-2023-1865 (Medium)

  • 157529 Amazon Linux Security Advisory: ALAS-2023-1866 (Low)

  • 157544 Amazon Linux Security Advisory: ALAS-2023-1867 (Medium)

  • 157535 Amazon Linux Security Advisory: ALAS-2023-1868 (Low)

  • 157540 Amazon Linux Security Advisory: ALAS-2023-1869 (Low)

  • 157536 Amazon Linux Security Advisory: ALAS-2023-1870 (Low)

  • 157530 Amazon Linux Security Advisory: ALAS-2023-1871 (Low)

  • 157636 Azul Zulu Critical Patch Update: OCTOBER-2023 (High)

  • 157633 Cisco Security Advisory: CISCO-SA-IOSXE-WEBUI-PRIVESC-J22SAA4Z (High)

  • 157519 Debian Security Advisory: DLA-3563-1 (Medium)

  • 157525 Debian Security Advisory: DLA-3572-1 (Medium)

  • 157515 Debian Security Advisory: DLA-3575-1 (Medium)

  • 157522 Debian Security Advisory: DLA-3585-1 (High)

  • 157528 Debian Security Advisory: DLA-3590-1 (Medium)

  • 157521 Debian Security Advisory: DLA-3593-1 (High)

  • 157517 Debian Security Advisory: DLA-3606-1 (Medium)

  • 157524 Debian Security Advisory: DLA-3610-1 (Medium)

  • 157526 Debian Security Advisory: DLA-3611-1 (Medium)

  • 157520 Debian Security Advisory: DLA-3619-1 (Medium)

  • 157523 Debian Security Advisory: DLA-3621-1 (Medium)

  • 157518 Debian Security Advisory: DLA-3629-1 (Medium)

  • 157516 Debian Security Advisory: DSA-5503-1 (Medium)

  • 157527 Debian Security Advisory: DSA-5511-1 (Medium)

  • 157607 ELSA-2023-0187: kernel security update (Low)

  • 157631 ELSA-2023-12872: glibc security update (Medium)

  • 157622 ELSA-2023-12873: glibc security update (Medium)

  • 157575 ELSA-2023-12874: Unbreakable Enterprise kernel security update (Medium)

  • 157605 ELSA-2023-12875: Unbreakable Enterprise kernel security update (Medium)

  • 157596 ELSA-2023-12910: Unbreakable Enterprise kernel-container security update (Medium)

  • 157599 ELSA-2023-12911: Unbreakable Enterprise kernel-container security update (Medium)

  • 157589 ELSA-2023-12914: Unbreakable Enterprise kernel-container security update (Medium)

  • 157621 ELSA-2023-12915: Unbreakable Enterprise kernel-container security update (Medium)

  • 157613 ELSA-2023-12924: kvm_utils2 security update (Medium)

  • 157603 ELSA-2023-12945: dnsmasq security update (Medium)

  • 157615 ELSA-2023-12946: dnsmasq security update (Medium)

  • 157590 ELSA-2023-5068: linux-firmware security update (Low)

  • 157602 ELSA-2023-5178: busybox security and bug fix update (Medium)

  • 157625 ELSA-2023-5456: python3.11 security update (Medium)

  • 157606 ELSA-2023-5462: python3.9 security update (Medium)

  • 157585 ELSA-2023-5463: python3.11 security update (Medium)

  • 157584 ELSA-2023-5475: thunderbird security update (Medium)

  • 157604 ELSA-2023-5477: firefox security update (Medium)

  • 157614 ELSA-2023-5537: libvpx security update (Medium)

  • 157583 ELSA-2023-5539: libvpx security update (Medium)

  • 157609 ELSA-2023-5615: libssh2 security update (Low)

  • 157592 ELSA-2023-5616: python-reportlab security update (Medium)

  • 157597 ELSA-2023-5622: kernel security and bug fix update (Medium)

  • 157630 ELSA-2023-5683: mariadb:10.5 security update (High)

  • 157578 ELSA-2023-5684: galera and mariadb security update (High)

  • 157624 ELSA-2023-5689: bind security update (Medium)

  • 157587 ELSA-2023-5691: bind security update (Medium)

  • 157623 ELSA-2023-5708: dotnet6.0 security update (Medium)

  • 157612 ELSA-2023-5709: dotnet7.0 security update (Medium)

  • 157611 ELSA-2023-5710: dotnet6.0 security update (Medium)

  • 157581 ELSA-2023-5711: nginx security update (Low)

  • 157626 ELSA-2023-5712: nginx:1.20 security update (Low)

  • 157591 ELSA-2023-5713: nginx:1.22 security update (Low)

  • 157600 ELSA-2023-5721: go-toolset:ol8 security update (Medium)

  • 157598 ELSA-2023-5736: java-11-openjdk security and bug fix update (Low)

  • 157617 ELSA-2023-5738: go-toolset and golang security and bug fix update (Medium)

  • 157580 ELSA-2023-5749: .NET 7.0 security update (Medium)

  • 157608 ELSA-2023-5761: java-1.8.0-openjdk security update (Low)

  • 157619 ELSA-2023-5763: curl security update (Medium)

  • 157628 ELSA-2023-5765: nodejs security update (Medium)

  • 157594 ELSA-2023-5790: python-reportlab security update (Medium)

  • 157582 ELSA-2023-5837: nghttp2 security update (Medium)

  • 157618 ELSA-2023-5838: nghttp2 security update (Medium)

  • 157579 ELSA-2023-5849: 18 security update (Medium)

  • 157586 ELSA-2023-5850: nodejs:16 security update (Medium)

  • 157620 ELSA-2023-5863: grafana security update (Low)

  • 157593 ELSA-2023-5867: grafana security update (Low)

  • 157629 ELSA-2023-5869: nodejs:18 security update (Medium)

  • 157616 ELSA-2023-5924: varnish security update (Medium)

  • 157627 ELSA-2023-5926: php security update (Medium)

  • 157610 ELSA-2023-5927: php:8.0 security update (Medium)

  • 157601 ELSA-2023-5928: tomcat security update (Medium)

  • 157577 ELSA-2023-5929: tomcat security update (Medium)

  • 157576 ELSA-2023-5989: varnish security update (Medium)

  • 157595 ELSA-2023-5994: python27:2.7 security update (Medium)

  • 157588 ELSA-2023-5997: python3 security update (Medium)

  • 157649 Google Chrome: Multiple Vulnerabilities in Versions Less Than 118.0.5993.117 (High)

  • 157451 Google Chrome: Multiple Vulnerabilities in Versions Less Than 118.0.5993.70 (High)

  • 157647 Java Critical Patch Update - CPU-JULY-2023 (High)

  • 157648 Java Critical Patch Update - CPU-OCTOBER-2023 (High)

  • 157452 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 118.0.2088.46 (High)

  • 157453 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 119 (High)

  • 157454 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 115.4 (High)

  • 157455 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 115.4.1 (High)

  • 157645 Oracle Database Critical Patch Update: July 2023 (High)

  • 157646 Oracle Database Critical Patch Update: October 2023 (High)

  • 157449 Progress WS_FTP Server Deserialization Vulnerability (High)

  • 157450 Progress WS_FTP Server Directory Traversal Vulnerability (High)

  • 157465 RHSA-2023:5683: mariadb:10.5 security update (Medium)

  • 157496 RHSA-2023:5684: galera and mariadb security update (Medium)

  • 157484 RHSA-2023:5689: bind security update (Medium)

  • 157456 RHSA-2023:5691: bind security update (Medium)

  • 157497 RHSA-2023:5708: dotnet6.0 security update (Medium)

  • 157467 RHSA-2023:5709: dotnet7.0 security update (Medium)

  • 157460 RHSA-2023:5710: dotnet6.0 security update (Medium)

  • 157483 RHSA-2023:5711: nginx security update (Low)

  • 157479 RHSA-2023:5712: nginx:1.20 security update (Low)

  • 157472 RHSA-2023:5713: nginx:1.22 security update (Low)

  • 157466 RHSA-2023:5721: go-toolset:rhel8 security update (Medium)

  • 157469 RHSA-2023:5731: java-1.8.0-openjdk security update (Low)

  • 157494 RHSA-2023:5733: java-1.8.0-openjdk security update (Low)

  • 157458 RHSA-2023:5736: java-11-openjdk security and bug fix update (Low)

  • 157489 RHSA-2023:5738: go-toolset and golang security and bug fix update (Medium)

  • 157468 RHSA-2023:5742: java-11-openjdk security and bug fix update (Low)

  • 157490 RHSA-2023:5744: java-11-openjdk security and bug fix update (Low)

  • 157487 RHSA-2023:5749: .NET 7.0 security update (Medium)

  • 157475 RHSA-2023:5751: java-17-openjdk security and bug fix update (Low)

  • 157492 RHSA-2023:5753: java-17-openjdk security and bug fix update (Low)

  • 157457 RHSA-2023:5761: java-1.8.0-openjdk security update (Low)

  • 157491 RHSA-2023:5763: curl security update (Medium)

  • 157495 RHSA-2023:5765: nodejs security update (Medium)

  • 157463 RHSA-2023:5790: python-reportlab security update (Medium)

  • 157459 RHSA-2023:5835: rhc-worker-script enhancement and security update (Medium)

  • 157462 RHSA-2023:5837: nghttp2 security update (Medium)

  • 157488 RHSA-2023:5838: nghttp2 security update (Medium)

  • 157493 RHSA-2023:5849: nodejs:18 security update (Medium)

  • 157474 RHSA-2023:5850: nodejs:16 security update (Medium)

  • 157461 RHSA-2023:5863: grafana security update (Low)

  • 157481 RHSA-2023:5867: grafana security update (Low)

  • 157476 RHSA-2023:5869: nodejs:18 security update (Medium)

  • 157485 RHSA-2023:5924: varnish security update (Medium)

  • 157486 RHSA-2023:5926: php security update (Medium)

  • 157471 RHSA-2023:5927: php:8.0 security update (Medium)

  • 157477 RHSA-2023:5928: tomcat security update (Medium)

  • 157482 RHSA-2023:5929: tomcat security update (Medium)

  • 157470 RHSA-2023:5989: varnish security update (Medium)

  • 157464 RHSA-2023:5994: python27:2.7 security update (Medium)

  • 157478 RHSA-2023:5997: python3 security update (Medium)

  • 157473 RHSA-2023:5998: python39:3.9 and python39-devel:3.9 security update (Medium)

  • 157480 RHSA-2023:6077: toolbox security update (Low)

  • 157510 Solaris Security Patch: (150383-32): SunOS 5.10: wanboot patch (Medium)

  • 157511 Solaris Security Patch: (151912-23): SunOS 5.10: OpenSSL 1.0.2 patch (Medium)

  • 157512 Solaris Security Patch: (151913-23): SunOS 5.10_x86: OpenSSL 1.0.2 patch (Medium)

  • 157513 Solaris Security Patch: (153264-91): JavaSE 8: update 391 patch (equivalent to JDK 8u391), 64bit (Medium)

  • 157514 Solaris Security Patch: (153265-91): JavaSE 8_x86: update 391 patch (equivalent to JDK 8u391), 64bit (Medium)

  • 157632 VMware Security Advisory: VMSA-2023-0023 (Low)

  • 157635 Zoom Improper Authentication Vulnerability (High)

  • 157634 Zoom Information Disclosure Vulnerability (High)

  • 157507 [USN-6288-2] MySQL vulnerability (Medium)

  • 157509 [USN-6362-2] .Net regressions (Medium)

  • 157503 [USN-6394-2] Python vulnerability (Medium)

  • 157505 [USN-6403-2] libvpx vulnerabilities (Medium)

  • 157499 [USN-6404-2] Firefox regressions (Medium)

  • 157506 [USN-6408-2] libXpm vulnerabilities (Medium)

  • 157498 [USN-6428-1] LibTIFF vulnerability (Medium)

  • 157500 [USN-6429-2] curl vulnerability (Medium)

  • 157501 [USN-6430-1] FFmpeg vulnerabilities (Medium)

  • 157502 [USN-6432-1] Quagga vulnerabilities (Medium)

  • 157504 [USN-6436-1] FRR vulnerabilities (Medium)

  • 157508 [USN-6438-2] .Net regressions (Medium)

Fixes

Updated Vulnerability Descriptions:

  • 156985 157182 Amazon Linux 2 Security Advisory: ALAS-2023-2247 (Low)
  • 157200 Amazon Linux 2 Security Advisory: ALAS-2023-2248 (Low)

  • 157179 Amazon Linux 2 Security Advisory: ALAS-2023-2249 (Low)

  • 157202 Amazon Linux 2 Security Advisory: ALAS-2023-2250 (Low)

  • 157183 Amazon Linux 2 Security Advisory: ALAS-2023-2251 (Low)

  • 157185 Amazon Linux 2 Security Advisory: ALAS-2023-2252 (Medium)

  • 157212 Amazon Linux 2 Security Advisory: ALAS-2023-2253 (Medium)

  • 157213 Amazon Linux 2 Security Advisory: ALAS-2023-2254 (Low)

  • 157209 Amazon Linux 2 Security Advisory: ALAS-2023-2255 (Low)

  • 157190 Amazon Linux 2 Security Advisory: ALAS-2023-2256 (Low)

  • 157205 Amazon Linux 2 Security Advisory: ALAS-2023-2257 (Low)

  • 157186 Amazon Linux 2 Security Advisory: ALAS-2023-2258 (Low)

  • 157208 Amazon Linux 2 Security Advisory: ALAS-2023-2259 (Low)

  • 157204 Amazon Linux 2 Security Advisory: ALAS-2023-2260 (Low)

  • 157184 Amazon Linux 2 Security Advisory: ALAS-2023-2261 (Medium)

  • 157181 Amazon Linux 2 Security Advisory: ALAS-2023-2262 (Medium)

  • 157216 Amazon Linux 2 Security Advisory: ALAS-2023-2263 (Medium)

  • 157215 Amazon Linux 2 Security Advisory: ALAS-2023-2264 (Low)

  • 157198 Amazon Linux 2 Security Advisory: ALAS-2023-2265 (Low)

  • 157197 Amazon Linux 2 Security Advisory: ALAS-2023-2266 (Low)

  • 157203 Amazon Linux 2 Security Advisory: ALAS-2023-2267 (Low)

  • 157178 Amazon Linux 2 Security Advisory: ALAS-2023-2268 (Low)

  • 157199 Amazon Linux 2 Security Advisory: ALAS-2023-2269 (Low)

  • 157196 Amazon Linux 2 Security Advisory: ALAS-2023-2270 (Low)

  • 157217 Amazon Linux 2 Security Advisory: ALAS-2023-2271 (Low)

  • 157210 Amazon Linux 2 Security Advisory: ALAS-2023-2272 (Low)

  • 157189 Amazon Linux 2 Security Advisory: ALAS-2023-2273 (Low)

  • 157188 Amazon Linux 2 Security Advisory: ALAS-2023-2274 (Low)

  • 157193 Amazon Linux 2 Security Advisory: ALAS-2023-2275 (Low)

  • 157207 Amazon Linux 2 Security Advisory: ALAS-2023-2276 (Low)

  • 157191 Amazon Linux 2 Security Advisory: ALAS-2023-2277 (Low)

  • 157214 Amazon Linux 2 Security Advisory: ALAS-2023-2278 (Low)

  • 157195 Amazon Linux 2 Security Advisory: ALAS-2023-2279 (Low)

  • 157180 Amazon Linux 2 Security Advisory: ALAS-2023-2280 (Medium)

  • 157201 Amazon Linux 2 Security Advisory: ALAS-2023-2281 (Low)

  • 157206 Amazon Linux 2 Security Advisory: ALAS-2023-2282 (Low)

  • 157194 Amazon Linux 2 Security Advisory: ALAS-2023-2283 (Low)

  • 157192 Amazon Linux 2 Security Advisory: ALAS-2023-2284 (Low)

  • 157187 Amazon Linux 2 Security Advisory: ALAS-2023-2285 (Low)

  • 157151 Amazon Linux Security Advisory: ALAS-2023-1826 (Low)

  • 157169 Amazon Linux Security Advisory: ALAS-2023-1827 (Low)

  • 157161 Amazon Linux Security Advisory: ALAS-2023-1828 (Low)

  • 157166 Amazon Linux Security Advisory: ALAS-2023-1829 (Low)

  • 157152 Amazon Linux Security Advisory: ALAS-2023-1830 (Low)

  • 157158 Amazon Linux Security Advisory: ALAS-2023-1831 (Low)

  • 157171 Amazon Linux Security Advisory: ALAS-2023-1832 (Low)

  • 157168 Amazon Linux Security Advisory: ALAS-2023-1833 (Low)

  • 157174 Amazon Linux Security Advisory: ALAS-2023-1834 (Low)

  • 157149 Amazon Linux Security Advisory: ALAS-2023-1835 (Low)

  • 157150 Amazon Linux Security Advisory: ALAS-2023-1836 (Low)

  • 157176 Amazon Linux Security Advisory: ALAS-2023-1837 (Low)

  • 157155 Amazon Linux Security Advisory: ALAS-2023-1838 (Low)

  • 157177 Amazon Linux Security Advisory: ALAS-2023-1839 (Low)

  • 157163 Amazon Linux Security Advisory: ALAS-2023-1840 (Low)

  • 157172 Amazon Linux Security Advisory: ALAS-2023-1841 (Low)

  • 157157 Amazon Linux Security Advisory: ALAS-2023-1842 (Low)

  • 157162 Amazon Linux Security Advisory: ALAS-2023-1843 (Low)

  • 157160 Amazon Linux Security Advisory: ALAS-2023-1844 (Low)

  • 157165 Amazon Linux Security Advisory: ALAS-2023-1845 (Low)

  • 157164 Amazon Linux Security Advisory: ALAS-2023-1846 (Low)

  • 157154 Amazon Linux Security Advisory: ALAS-2023-1847 (Low)

  • 157175 Amazon Linux Security Advisory: ALAS-2023-1848 (Low)

  • 157156 Amazon Linux Security Advisory: ALAS-2023-1849 (Low)

  • 157153 Amazon Linux Security Advisory: ALAS-2023-1850 (Low)

  • 157159 Amazon Linux Security Advisory: ALAS-2023-1851 (Low)

  • 157170 Amazon Linux Security Advisory: ALAS-2023-1852 (Low)

  • 157167 Amazon Linux Security Advisory: ALAS-2023-1853 (Low)

  • 157173 Amazon Linux Security Advisory: ALAS-2023-1854 (Medium)

  • 157148 Amazon Linux Security Advisory: ALAS-2023-1855 (Medium)

  • 157228 APSB23-51: Security Updates Available for Adobe Photoshop CC (High)

  • 157250 ELSA-2023-12798: Unbreakable Enterprise kernel security update (Medium)

  • 157247 ELSA-2023-12801: Unbreakable Enterprise kernel-container security update (Medium)

  • 157255 ELSA-2023-12802: Unbreakable Enterprise kernel-container security update (Medium)

  • 157237 ELSA-2023-12826: Unbreakable Enterprise kernel security update (Medium)

  • 157251 ELSA-2023-12842: Unbreakable Enterprise kernel security update (High)

  • 157253 ELSA-2023-12851: glibc security update (Medium)

  • 157241 ELSA-2023-12855: kvm_utils3 security update (Medium)

  • 157242 ELSA-2023-12858: Unbreakable Enterprise kernel security update (Medium)

  • 157235 ELSA-2023-5046: flac security update (Medium)

  • 157249 ELSA-2023-5069: kernel security, bug fix, and enhancement update (Medium)

  • 157238 ELSA-2023-5146: .NET 7.0 security update (Low)

  • 157244 ELSA-2023-5194: frr security update (Medium)

  • 157243 ELSA-2023-5197: firefox security update (Medium)

  • 157254 ELSA-2023-5200: firefox security update (Medium)

  • 157248 ELSA-2023-5244: kernel security, bug fix, and enhancement update (Medium)

  • 157239 ELSA-2023-5312: open-vm-tools security update (Medium)

  • 157236 ELSA-2023-5362: nodejs:18 security, bug fix, and enhancement update (Medium)

  • 157240 ELSA-2023-5453: glibc security update (Medium)

  • 157252 ELSA-2023-5459: ghostscript security update (Medium)

  • 157246 ELSA-2023-5461: ImageMagick security update (Medium)

  • 157245 ELSA-2023-5532: nodejs security and bug fix update (Medium)

  • 157147 Google Chrome: Multiple Vulnerabilities in Versions Less Than 117.0.5938.132 (High)

  • 157225 Google Chrome: Multiple Vulnerabilities in Versions Less Than 117.0.5938.149 (High)

  • 157226 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 117.0.2045.55 (High)

  • 157230 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 118.0.1 (High)

  • 157229 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 118 (High)

  • 157232 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 115.3.1 (High)

  • 157231 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 115.3 (High)

  • 157234 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 115.3.1 (High)

  • 157233 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 115.3 (High)

Version 4.29.0

October 12, 2023

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 157439 AIX Security Advisory: bind_advisory24 (High)

  • 157440 AIX Security Advisory: java_aug2023_advisory (High)

  • 157441 AIX Security Advisory: ntp_advisory14 (Medium)

  • 157442 AIX Security Advisory: openssl_advisory39 (High)

  • 157443 AIX Security Advisory: perl_advisory7 (Medium)

  • 157182 Amazon Linux 2 Security Advisory: ALAS-2023-2247 (Low)

  • 157200 Amazon Linux 2 Security Advisory: ALAS-2023-2248 (Low)

  • 157179 Amazon Linux 2 Security Advisory: ALAS-2023-2249 (Low)

  • 157202 Amazon Linux 2 Security Advisory: ALAS-2023-2250 (Low)

  • 157183 Amazon Linux 2 Security Advisory: ALAS-2023-2251 (Low)

  • 157185 Amazon Linux 2 Security Advisory: ALAS-2023-2252 (Medium)

  • 157212 Amazon Linux 2 Security Advisory: ALAS-2023-2253 (Medium)

  • 157213 Amazon Linux 2 Security Advisory: ALAS-2023-2254 (Low)

  • 157209 Amazon Linux 2 Security Advisory: ALAS-2023-2255 (Low)

  • 157190 Amazon Linux 2 Security Advisory: ALAS-2023-2256 (Low)

  • 157205 Amazon Linux 2 Security Advisory: ALAS-2023-2257 (Low)

  • 157186 Amazon Linux 2 Security Advisory: ALAS-2023-2258 (Low)

  • 157208 Amazon Linux 2 Security Advisory: ALAS-2023-2259 (Low)

  • 157204 Amazon Linux 2 Security Advisory: ALAS-2023-2260 (Low)

  • 157184 Amazon Linux 2 Security Advisory: ALAS-2023-2261 (Medium)

  • 157181 Amazon Linux 2 Security Advisory: ALAS-2023-2262 (Medium)

  • 157216 Amazon Linux 2 Security Advisory: ALAS-2023-2263 (Medium)

  • 157215 Amazon Linux 2 Security Advisory: ALAS-2023-2264 (Low)

  • 157198 Amazon Linux 2 Security Advisory: ALAS-2023-2265 (Low)

  • 157197 Amazon Linux 2 Security Advisory: ALAS-2023-2266 (Low)

  • 157203 Amazon Linux 2 Security Advisory: ALAS-2023-2267 (Low)

  • 157178 Amazon Linux 2 Security Advisory: ALAS-2023-2268 (Low)

  • 157199 Amazon Linux 2 Security Advisory: ALAS-2023-2269 (Low)

  • 157196 Amazon Linux 2 Security Advisory: ALAS-2023-2270 (Low)

  • 157217 Amazon Linux 2 Security Advisory: ALAS-2023-2271 (Low)

  • 157210 Amazon Linux 2 Security Advisory: ALAS-2023-2272 (Low)

  • 157189 Amazon Linux 2 Security Advisory: ALAS-2023-2273 (Low)

  • 157188 Amazon Linux 2 Security Advisory: ALAS-2023-2274 (Low)

  • 157193 Amazon Linux 2 Security Advisory: ALAS-2023-2275 (Low)

  • 157207 Amazon Linux 2 Security Advisory: ALAS-2023-2276 (Low)

  • 157191 Amazon Linux 2 Security Advisory: ALAS-2023-2277 (Low)

  • 157214 Amazon Linux 2 Security Advisory: ALAS-2023-2278 (Low)

  • 157195 Amazon Linux 2 Security Advisory: ALAS-2023-2279 (Low)

  • 157180 Amazon Linux 2 Security Advisory: ALAS-2023-2280 (Medium)

  • 157201 Amazon Linux 2 Security Advisory: ALAS-2023-2281 (Low)

  • 157206 Amazon Linux 2 Security Advisory: ALAS-2023-2282 (Low)

  • 157194 Amazon Linux 2 Security Advisory: ALAS-2023-2283 (Low)

  • 157192 Amazon Linux 2 Security Advisory: ALAS-2023-2284 (Low)

  • 157187 Amazon Linux 2 Security Advisory: ALAS-2023-2285 (Low)

  • 157151 Amazon Linux Security Advisory: ALAS-2023-1826 (Low)

  • 157169 Amazon Linux Security Advisory: ALAS-2023-1827 (Low)

  • 157161 Amazon Linux Security Advisory: ALAS-2023-1828 (Low)

  • 157166 Amazon Linux Security Advisory: ALAS-2023-1829 (Low)

  • 157152 Amazon Linux Security Advisory: ALAS-2023-1830 (Low)

  • 157158 Amazon Linux Security Advisory: ALAS-2023-1831 (Low)

  • 157171 Amazon Linux Security Advisory: ALAS-2023-1832 (Low)

  • 157168 Amazon Linux Security Advisory: ALAS-2023-1833 (Low)

  • 157174 Amazon Linux Security Advisory: ALAS-2023-1834 (Low)

  • 157149 Amazon Linux Security Advisory: ALAS-2023-1835 (Low)

  • 157150 Amazon Linux Security Advisory: ALAS-2023-1836 (Low)

  • 157176 Amazon Linux Security Advisory: ALAS-2023-1837 (Low)

  • 157155 Amazon Linux Security Advisory: ALAS-2023-1838 (Low)

  • 157177 Amazon Linux Security Advisory: ALAS-2023-1839 (Low)

  • 157163 Amazon Linux Security Advisory: ALAS-2023-1840 (Low)

  • 157172 Amazon Linux Security Advisory: ALAS-2023-1841 (Low)

  • 157157 Amazon Linux Security Advisory: ALAS-2023-1842 (Low)

  • 157162 Amazon Linux Security Advisory: ALAS-2023-1843 (Low)

  • 157160 Amazon Linux Security Advisory: ALAS-2023-1844 (Low)

  • 157165 Amazon Linux Security Advisory: ALAS-2023-1845 (Low)

  • 157164 Amazon Linux Security Advisory: ALAS-2023-1846 (Low)

  • 157154 Amazon Linux Security Advisory: ALAS-2023-1847 (Low)

  • 157175 Amazon Linux Security Advisory: ALAS-2023-1848 (Low)

  • 157156 Amazon Linux Security Advisory: ALAS-2023-1849 (Low)

  • 157153 Amazon Linux Security Advisory: ALAS-2023-1850 (Low)

  • 157159 Amazon Linux Security Advisory: ALAS-2023-1851 (Low)

  • 157170 Amazon Linux Security Advisory: ALAS-2023-1852 (Low)

  • 157167 Amazon Linux Security Advisory: ALAS-2023-1853 (Low)

  • 157173 Amazon Linux Security Advisory: ALAS-2023-1854 (Medium)

  • 157148 Amazon Linux Security Advisory: ALAS-2023-1855 (Medium)

  • 157228 APSB23-51: Security Updates Available for Adobe Photoshop CC (High)

  • 157431 Cisco Security Advisory: CISCO-SA-AAASCP-TYJ4FEJM (High)

  • 157438 Cisco Security Advisory: CISCO-SA-APPQOE-UTD-DOS-P8O57P5Y (High)

  • 157437 Cisco Security Advisory: CISCO-SA-CAT3K-DOS-ZZA4GB3R (High)

  • 157436 Cisco Security Advisory: CISCO-SA-GETVPN-RCE-G8QR68SX (Medium)

  • 157435 Cisco Security Advisory: CISCO-SA-IOS-XE-L2TP-DOS-EB5TUFMV (High)

  • 157434 Cisco Security Advisory: CISCO-SA-MLRE-H93FSWRZ (High)

  • 157430 Cisco Security Advisory: CISCO-SA-RDOCKER-UATBUKKN (Medium)

  • 157433 Cisco Security Advisory: CISCO-SA-WEBUI-CMDIJ-FZZAEXAY (High)

  • 157432 Cisco Security Advisory: CISCO-SA-WLC-WNCD-HFGMSFSD (Medium)

  • 157295 Citrix Security Advisory: CTX579459 (High)

  • 157250 ELSA-2023-12798: Unbreakable Enterprise kernel security update (Medium)

  • 157266 ELSA-2023-12799: Unbreakable Enterprise kernel security update (Medium)

  • 157267 ELSA-2023-12800: Unbreakable Enterprise kernel security update (Medium)

  • 157247 ELSA-2023-12801: Unbreakable Enterprise kernel-container security update (Medium)

  • 157255 ELSA-2023-12802: Unbreakable Enterprise kernel-container security update (Medium)

  • 157279 ELSA-2023-12803: Unbreakable Enterprise kernel security update (Medium)

  • 157263 ELSA-2023-12824: Unbreakable Enterprise kernel security update (Medium)

  • 157294 ELSA-2023-12825: Unbreakable Enterprise kernel security update (Medium)

  • 157237 ELSA-2023-12826: Unbreakable Enterprise kernel security update (Medium)

  • 157291 ELSA-2023-12834: qemu security update (Low)

  • 157260 ELSA-2023-12835: qemu security update (Low)

  • 157274 ELSA-2023-12836: kernel security update (Medium)

  • 157277 ELSA-2023-12839: kernel security update (Medium)

  • 157251 ELSA-2023-12842: Unbreakable Enterprise kernel security update (High)

  • 157289 ELSA-2023-12850: glibc security update (Medium)

  • 157253 ELSA-2023-12851: glibc security update (Medium)

  • 157286 ELSA-2023-12853: glibc security update (Medium)

  • 157276 ELSA-2023-12854: glibc security update (Medium)

  • 157241 ELSA-2023-12855: kvm_utils3 security update (Medium)

  • 157242 ELSA-2023-12858: Unbreakable Enterprise kernel security update (Medium)

  • 157235 ELSA-2023-5046: flac security update (Medium)

  • 157249 ELSA-2023-5069: kernel security, bug fix, and enhancement update (Medium)

  • 157281 ELSA-2023-5143: .NET 6.0 security update (Low)

  • 157268 ELSA-2023-5144: .NET 6.0 security update (Low)

  • 157293 ELSA-2023-5145: .NET 7.0 security update (Low)

  • 157238 ELSA-2023-5146: .NET 7.0 security update (Low)

  • 157271 ELSA-2023-5184: firefox security update (Medium)

  • 157287 ELSA-2023-5191: thunderbird security update (Medium)

  • 157244 ELSA-2023-5194: frr security update (Medium)

  • 157243 ELSA-2023-5197: firefox security update (Medium)

  • 157254 ELSA-2023-5200: firefox security update (Medium)

  • 157275 ELSA-2023-5201: thunderbird security update (Medium)

  • 157290 ELSA-2023-5214: libwebp security update (Medium)

  • 157292 ELSA-2023-5217: open-vm-tools security update (Medium)

  • 157270 ELSA-2023-5219: frr security and bug fix update (Medium)

  • 157283 ELSA-2023-5224: thunderbird security update (Medium)

  • 157248 ELSA-2023-5244: kernel security, bug fix, and enhancement update (Medium)

  • 157256 ELSA-2023-5249: ncurses security update (Low)

  • 157282 ELSA-2023-5252: dmidecode security update (Low)

  • 157261 ELSA-2023-5259: mariadb:10.3 security, bug fix, and enhancement update (Medium)

  • 157288 ELSA-2023-5264: virt:ol and virt-devel:rhel security and bug fix update (Medium)

  • 157269 ELSA-2023-5269: postgresql:15 security update (Low)

  • 157258 ELSA-2023-5309: libwebp security update (Medium)

  • 157239 ELSA-2023-5312: open-vm-tools security update (Medium)

  • 157272 ELSA-2023-5313: open-vm-tools security update (Medium)

  • 157259 ELSA-2023-5353: libtiff security update (Low)

  • 157280 ELSA-2023-5360: nodejs:16 security, bug fix, and enhancement update (Medium)

  • 157236 ELSA-2023-5362: nodejs:18 security, bug fix, and enhancement update (Medium)

  • 157273 ELSA-2023-5363: nodejs:18 security, bug fix, and enhancement update (Medium)

  • 157262 ELSA-2023-5428: thunderbird security update (Medium)

  • 157265 ELSA-2023-5433: firefox security update (Medium)

  • 157278 ELSA-2023-5434: firefox security update (Medium)

  • 157284 ELSA-2023-5435: thunderbird security update (Medium)

  • 157240 ELSA-2023-5453: glibc security update (Medium)

  • 157257 ELSA-2023-5455: glibc security update (Medium)

  • 157252 ELSA-2023-5459: ghostscript security update (Medium)

  • 157285 ELSA-2023-5460: bind9.16 security update (Medium)

  • 157246 ELSA-2023-5461: ImageMagick security update (Medium)

  • 157264 ELSA-2023-5474: bind security update (Medium)

  • 157245 ELSA-2023-5532: nodejs security and bug fix update (Medium)

  • 157218 File Upload Vulnerability (High)

  • 157225 Google Chrome: Multiple Vulnerabilities in Versions Less Than 117.0.5938.149 (High)

  • 157226 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 117.0.2045.55 (High)

  • 157230 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 118.0.1 (High)

  • 157229 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 118 (High)

  • 157232 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 115.3.1 (High)

  • 157231 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 115.3 (High)

  • 157234 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 115.3.1 (High)

  • 157233 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 115.3 (High)

  • 157448 MS23-OCT: Microsoft Exchange Server Security Update (High)

  • 157444 MS23-OCT: Microsoft Internet Explorer Security Update (High)

  • 157446 MS23-OCT: Microsoft Office Security Update (High)

  • 157447 MS23-OCT: Microsoft SQL Server Security Update (High)

  • 157445 MS23-OCT: Microsoft Windows Security Update (High)

  • 157224 Oracle Database Network Connections Allowed Without TLS (Trivial)

  • 157389 RHSA-2023:4347: libeconf security update (Low)

  • 157384 RHSA-2023:4349: libxml2 security update (Low)

  • 157394 RHSA-2023:4350: python-requests security update (Low)

  • 157388 RHSA-2023:4354: curl security update (Low)

  • 157378 RHSA-2023:4377: kernel security, bug fix, and enhancement update (Medium)

  • 157385 RHSA-2023:4378: kernel-rt security and bug fix update (Medium)

  • 157409 RHSA-2023:4380: kpatch-patch security update (Medium)

  • 157309 RHSA-2023:4382: openssh security update (Medium)

  • 157401 RHSA-2023:4411: cjose security update (Medium)

  • 157386 RHSA-2023:4412: openssh security update (Medium)

  • 157326 RHSA-2023:4418: mod_auth_openidc:2.3 security update (Medium)

  • 157369 RHSA-2023:4419: openssh security update (Medium)

  • 157313 RHSA-2023:4461: firefox security update (Medium)

  • 157411 RHSA-2023:4462: firefox security update (Medium)

  • 157344 RHSA-2023:4468: firefox security update (Medium)

  • 157314 RHSA-2023:4495: thunderbird security update (Medium)

  • 157354 RHSA-2023:4497: thunderbird security update (Medium)

  • 157367 RHSA-2023:4498: dbus security update (Low)

  • 157372 RHSA-2023:4499: thunderbird security update (Medium)

  • 157329 RHSA-2023:4517: kernel security and bug fix update (Medium)

  • 157363 RHSA-2023:4520: python-requests security update (Low)

  • 157331 RHSA-2023:4523: curl security update (Low)

  • 157348 RHSA-2023:4524: libcap security update (Low)

  • 157365 RHSA-2023:4527: postgresql:13 security update (Low)

  • 157350 RHSA-2023:4529: libxml2 security update (Low)

  • 157364 RHSA-2023:4531: kpatch-patch security update (Medium)

  • 157335 RHSA-2023:4535: postgresql:12 security update (Low)

  • 157362 RHSA-2023:4536: nodejs:18 security, bug fix, and enhancement update (Low)

  • 157359 RHSA-2023:4537: nodejs:16 security, bug fix, and enhancement update (Low)

  • 157339 RHSA-2023:4539: postgresql:10 security update (Low)

  • 157361 RHSA-2023:4541: kernel-rt security and bug fix update (Medium)

  • 157402 RHSA-2023:4569: dbus security update (Low)

  • 157323 RHSA-2023:4570: iperf3 security update (Medium)

  • 157373 RHSA-2023:4571: iperf3 security update (Medium)

  • 157375 RHSA-2023:4634: rust security update (Medium)

  • 157333 RHSA-2023:4635: rust-toolset:rhel8 security update (Medium)

  • 157396 RHSA-2023:4642: .NET 7.0 security, bug fix, and enhancement update (Medium)

  • 157349 RHSA-2023:4643: .NET 7.0 security, bug fix, and enhancement update (Medium)

  • 157371 RHSA-2023:4644: .NET 6.0 security, bug fix, and enhancement update (Medium)

  • 157332 RHSA-2023:4645: .NET 6.0 security, bug fix, and enhancement update (Medium)

  • 157310 RHSA-2023:4701: subscription-manager security update (Low)

  • 157328 RHSA-2023:4706: subscription-manager security update (Medium)

  • 157382 RHSA-2023:4708: subscription-manager security update (Medium)

  • 157306 RHSA-2023:4766: cups security update (Medium)

  • 157311 RHSA-2023:4819: kernel security and bug fix update (Medium)

  • 157301 RHSA-2023:4821: kernel-rt security and bug fix update (Medium)

  • 157299 RHSA-2023:4834: kpatch-patch security update (Medium)

  • 157407 RHSA-2023:4838: cups security update (Medium)

  • 157347 RHSA-2023:4864: cups security update (Medium)

  • 157360 RHSA-2023:4877: java-1.8.0-ibm security update (Low)

  • 157307 RHSA-2023:4945: thunderbird security update (Medium)

  • 157338 RHSA-2023:4952: firefox security update (Medium)

  • 157325 RHSA-2023:4954: thunderbird security update (Medium)

  • 157398 RHSA-2023:4955: thunderbird security update (Medium)

  • 157377 RHSA-2023:4958: firefox security update (Medium)

  • 157312 RHSA-2023:5019: firefox security update (Medium)

  • 157324 RHSA-2023:5046: flac security update (Medium)

  • 157405 RHSA-2023:5048: flac security update (Medium)

  • 157370 RHSA-2023:5050: httpd:2.4 security update (Low)

  • 157387 RHSA-2023:5061: dmidecode security update (Low)

  • 157391 RHSA-2023:5068: linux-firmware security update (Low)

  • 157403 RHSA-2023:5069: kernel security, bug fix, and enhancement update (Medium)

  • 157380 RHSA-2023:5071: libcap security update (Low)

  • 157395 RHSA-2023:5080: keylime security update (Low)

  • 157381 RHSA-2023:5081: librsvg2 security update (Low)

  • 157379 RHSA-2023:5091: kernel-rt security and bug fix update (Medium)

  • 157413 RHSA-2023:5093: kpatch-patch security update (Medium)

  • 157408 RHSA-2023:5094: qemu-kvm security and bug fix update (Medium)

  • 157416 RHSA-2023:5143: .NET 6.0 security update (Low)

  • 157341 RHSA-2023:5144: .NET 6.0 security update (Low)

  • 157342 RHSA-2023:5145: .NET 7.0 security update (Low)

  • 157392 RHSA-2023:5146: .NET 7.0 security update (Low)

  • 157357 RHSA-2023:5184: firefox security update (Medium)

  • 157296 RHSA-2023:5191: thunderbird security update (Medium)

  • 157376 RHSA-2023:5194: frr security update (Medium)

  • 157305 RHSA-2023:5197: firefox security update (Medium)

  • 157393 RHSA-2023:5200: firefox security update (Medium)

  • 157318 RHSA-2023:5201: thunderbird security update (Medium)

  • 157414 RHSA-2023:5214: libwebp security update (Medium)

  • 157308 RHSA-2023:5217: open-vm-tools security update (Medium)

  • 157356 RHSA-2023:5219: frr security and bug fix update (Medium)

  • 157336 RHSA-2023:5221: kpatch-patch security update (Medium)

  • 157406 RHSA-2023:5224: thunderbird security update (Medium)

  • 157353 RHSA-2023:5244: kernel security, bug fix, and enhancement update (Medium)

  • 157346 RHSA-2023:5245: linux-firmware security update (Low)

  • 157368 RHSA-2023:5249: ncurses security update (Low)

  • 157351 RHSA-2023:5252: dmidecode security update (Low)

  • 157337 RHSA-2023:5255: kernel-rt security and bug fix update (Medium)

  • 157321 RHSA-2023:5259: mariadb:10.3 security, bug fix, and enhancement update (Low)

  • 157358 RHSA-2023:5264: virt:rhel and virt-devel:rhel security and bug fix update (Medium)

  • 157317 RHSA-2023:5269: postgresql:15 security update (Low)

  • 157345 RHSA-2023:5309: libwebp security update (Medium)

  • 157322 RHSA-2023:5312: open-vm-tools security update (Medium)

  • 157410 RHSA-2023:5313: open-vm-tools security update (Medium)

  • 157330 RHSA-2023:5353: libtiff security update (Low)

  • 157352 RHSA-2023:5360: nodejs:16 security, bug fix, and enhancement update (Medium)

  • 157319 RHSA-2023:5362: nodejs:18 security, bug fix, and enhancement update (Medium)

  • 157412 RHSA-2023:5363: nodejs:18 security, bug fix, and enhancement update (Medium)

  • 157343 RHSA-2023:5428: thunderbird security update (Medium)

  • 157340 RHSA-2023:5433: firefox security update (Medium)

  • 157415 RHSA-2023:5434: firefox security update (Medium)

  • 157390 RHSA-2023:5435: thunderbird security update (Medium)

  • 157383 RHSA-2023:5453: glibc security update (Medium)

  • 157355 RHSA-2023:5455: glibc security update (Medium)

  • 157397 RHSA-2023:5456: python3.11 security update (Medium)

  • 157404 RHSA-2023:5459: ghostscript security update (Medium)

  • 157366 RHSA-2023:5460: bind9.16 security update (Medium)

  • 157302 RHSA-2023:5461: ImageMagick security update (Medium)

  • 157374 RHSA-2023:5462: python3.9 security update (Medium)

  • 157334 RHSA-2023:5463: python3.11 security update (Medium)

  • 157327 RHSA-2023:5474: bind security update (Medium)

  • 157298 RHSA-2023:5475: thunderbird security update (Medium)

  • 157315 RHSA-2023:5477: firefox security update (Medium)

  • 157400 RHSA-2023:5532: nodejs security and bug fix update (Medium)

  • 157320 RHSA-2023:5537: libvpx security update (Medium)

  • 157399 RHSA-2023:5539: libvpx security update (Medium)

  • 157304 RHSA-2023:5574: kpatch-patch security update (Medium)

  • 157297 RHSA-2023:5615: libssh2 security update (Low)

  • 157303 RHSA-2023:5616: python-reportlab security update (Medium)

  • 157300 RHSA-2023:5621: kernel-rt security and bug fix update (Medium)

  • 157316 RHSA-2023:5622: kernel security and bug fix update (Medium)

  • 156932 Server-Side Request Forgery (High)

  • 157219 Visual Studio Code Remote Code Execution Vulnerability (High)

  • 157220 Zoom Escalation of Privilege Vulnerability (High)

  • 157221 Zoom Information Disclosure Vulnerability (High)

  • 157222 Zoom Information Disclosure Vulnerability (Medium)

  • 157223 Zoom Information Disclosure Vulnerability (Medium)

  • 157417 [USN-6367-1] Firefox vulnerability (Medium)

  • 157418 [USN-6368-1] Thunderbird vulnerabilities (Medium)

  • 157422 [USN-6369-2] libwebp vulnerability (Medium)

  • 157419 [USN-6382-1] Memcached vulnerability (Medium)

  • 157420 [USN-6391-2] CUPS vulnerability (Medium)

  • 157421 [USN-6394-1] Python vulnerability (Medium)

  • 157423 [USN-6402-1] LibTomMath vulnerability (Medium)

  • 157424 [USN-6404-1] Firefox vulnerabilities (Medium)

  • 157429 [USN-6407-2] libx11 vulnerabilities (Medium)

  • 157425 [USN-6414-2] Django vulnerabilities (Medium)

  • 157426 [USN-6419-1] jQuery UI vulnerabilities (Medium)

  • 157427 [USN-6420-1] Vim vulnerabilities (Medium)

  • 157428 [USN-6423-1] CUE vulnerability (Medium)

Fixes

Updated Vulnerability Descriptions:

  • 156985 Amazon Linux Security Advisory: ALAS-2023-1801 (Low)
  • 156986 Amazon Linux Security Advisory: ALAS-2023-1805 (Low)

  • 156984 Amazon Linux Security Advisory: ALAS-2023-1808 (High)

  • 149002 Apache HTTP Server 2.4.54 Security Release (Critical)

  • 151446 Apache HTTP Server 2.4.55 Security Release (High)

  • 151961 Apache HTTP Server 2.4.56 Security Release (High)

  • 152709 Apache Tomcat Denial Of Service Vulnerability (High)

  • 152711 Apache Tomcat Denial Of Service Vulnerability (High)

  • 152710 Apache Tomcat Information Disclosure Vulnerability (Medium)

  • 152712 Apache Tomcat Information Disclosure Vulnerability (High)

  • 150797 Apache Tomcat Injection Vulnerability (High)

  • 149001 Apache Tomcat Security Advisory: February 2022 (High)

  • 149423 Apache Tomcat Security Advisory: June 2022 (Medium)

  • 149000 Apache Tomcat Security Advisory: May 2022 (High)

  • 150241 Apache Tomcat Security Advisory: October 2022 (High)

  • 156937 APSB23-30: Security Updates Available for Adobe Acrobat and Reader (High)

  • 149005 Drupal Core Security Advisory: SA-CORE-2022-008 (Medium)

  • 149006 Drupal Core Security Advisory: SA-CORE-2022-009 (Medium)

  • 152713 Drupal Core Security Advisory: SA-CORE-2023-005 (Medium)

  • 149852 Drupal Security Advisory SA-CORE-2022-016 (High)

  • 149424 Drupal Security Advisory: SA-CORE-2022-010 (Medium)

  • 149425 Drupal Security Advisory: SA-CORE-2022-011 (Medium)

  • 149426 Drupal Security Advisory: SA-CORE-2022-012 (Medium)

  • 149427 Drupal Security Advisory: SA-CORE-2022-013 (High)

  • 149428 Drupal Security Advisory: SA-CORE-2022-014 (High)

  • 149429 Drupal Security Advisory: SA-CORE-2022-015 (Medium)

  • 156946 ELSA-2023-12711: openssh security update (High)

  • 156938 ELSA-2023-12712: linux-firmware security update (Medium)

  • 156963 ELSA-2023-12713: linux-firmware security update (Medium)

  • 156957 ELSA-2023-12714: linux-firmware security update (Medium)

  • 156956 ELSA-2023-12715: linux-firmware security update (Medium)

  • 156964 ELSA-2023-12722: microcode_ctl security update (Low)

  • 156940 ELSA-2023-12723: microcode_ctl security update (Low)

  • 156951 ELSA-2023-12724: microcode_ctl security update (Low)

  • 156947 ELSA-2023-1822: kernel security update (Medium)

  • 156960 ELSA-2023-4151: kernel security and bug fix update (Medium)

  • 156941 ELSA-2023-4428: openssh security update (Medium)

  • 156950 ELSA-2023-4497: thunderbird security update (Medium)

  • 156953 ELSA-2023-4517: kernel security and bug fix update (Medium)

  • 156948 ELSA-2023-4520: python-requests security update (Low)

  • 156955 ELSA-2023-4523: curl security update (Low)

  • 156968 ELSA-2023-4524: libcap security update (Low)

  • 156944 ELSA-2023-4527: postgresql:13 security update (Low)

  • 156939 ELSA-2023-4529: libxml2 security update (Low)

  • 156961 ELSA-2023-4535: postgresql:12 security update (Low)

  • 156954 ELSA-2023-4536: nodejs:18 security, bug fix, and enhancement update (Low)

  • 156966 ELSA-2023-4537: nodejs:16 security, bug fix, and enhancement update (Low)

  • 156967 ELSA-2023-4539: postgresql:10 security update (Low)

  • 156943 ELSA-2023-4569: dbus security update (Low)

  • 156945 ELSA-2023-4570: iperf3 security update (Medium)

  • 156958 ELSA-2023-4571: iperf3 security update (Medium)

  • 156949 ELSA-2023-4634: rust security update (Medium)

  • 156965 ELSA-2023-4635: rust-toolset:ol8 security update (Medium)

  • 156952 ELSA-2023-4642: .NET 7.0 security, bug fix, and enhancement update (Medium)

  • 156962 ELSA-2023-4643: .NET 7.0 security, bug fix, and enhancement update (Medium)

  • 156959 ELSA-2023-4644: .NET 6.0 security, bug fix, and enhancement update (Medium)

  • 156942 ELSA-2023-4645: .NET 6.0 security, bug fix, and enhancement update (Medium)

  • 156934 Google Chrome: Multiple Vulnerabilities in Versions Less Than 116.0.5845.96 (High)

  • 151448 Joomla Security Advisory: February 2023 (Low)

  • 149014 Joomla! Core Security Advisory: Multiple Vulnerabilities in Versions 2.5.0-3.10.6 and 4.0.0-4.1.0 (Low)

  • 151965 Joomla! Improper Access Control Vulnerability (High)

  • 150243 Joomla! Information Disclosure vulnerability (Medium)

  • 152718 Joomla! MFA Brute Force Vulnerability (High)

  • 152717 Joomla! MFA Selection XSS Vulnerability (Medium)

  • 150242 Joomla! XSS vulnerability (Medium)

  • 156936 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 116.0.1938.54 (High)

  • 156935 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 116.0.1938.62 (High)

  • 156923 MS23-AUG: Microsoft Office Security Update (High)

  • 150798 Nginx Denial of Service (DoS) Vulnerability (Medium)

  • 149860 PHP Cookie Integrity Vulnerability (Medium)

  • 149859 PHP Denial of Service (DoS) Vulnerability (Medium)

  • 151452 PHP Denial of Service Vulnerability (Medium)

  • 149634 PHP Heap Corruption Vulneraibility (High)

  • 149421 PHP Remote Code Execution (RCE) Vulnerability (High)

  • 149422 PHP Remote Code Execution (RCE) Vulnerability (High)

  • 151451 PHP Remote Code Execution Vulnerability (High)

  • 151967 PHP Security Update February 2023 (High)

  • 151968 PHP Security Update March 2023 (Medium)

  • 152725 PHP SOAP HTTP Digest Authentication Vulnerability (Low)

  • 152726 Wordpress Core Directory Traversal Vulnerability (Medium)

  • 150803 Wordpress Cross-site scripting (XSS) Vulnerability (Medium)

  • 151453 Wordpress Denial of Service Vulnerability (Medium)

  • 150247 Wordpress Header Data Manipulation Vulnerability (High)

  • 150804 Wordpress Improper Authentication Vulnerability (Medium)

  • 150805 Wordpress Unauthenticated SSRF Vulnerability (Medium)

  • 156971 [USN-4336-3] GNU binutils vulnerabilities (Medium)

  • 156973 [USN-4897-2] Pygments vulnerabilities (Medium)

  • 156976 [USN-6267-3] Firefox regressions (Medium)

  • 156969 [USN-6276-1] unixODBC vulnerability (Medium)

  • 156970 [USN-6279-1] OpenSSH update (Medium)

  • 156972 [USN-6286-1] Intel Microcode vulnerabilities (Medium)

  • 156974 [USN-6291-1] GStreamer vulnerability (Medium)

  • 156975 [USN-6295-1] Podman vulnerability (Medium)

  • 156977 [USN-6302-1] Vim vulnerabilities (Medium)

  • 156978 [USN-6303-2] ClamAV vulnerability (Medium)

  • 156979 [USN-6304-1] Inetutils vulnerabilities (Medium)

  • 156980 [USN-6305-1] PHP vulnerabilities (Medium)

  • 156981 [USN-6306-1] Fast DDS vulnerabilities (Medium)

  • 156982 [USN-6307-1] JOSE for C/C++ vulnerability (Medium)

  • 156983 [USN-6308-1] Libqb vulnerability (Medium)

WAS Scanner

Version 2.1.1

October 4, 2023

Enhancements
  • Includes several fixes and enhancements to the scanning engine and existing vulnerability checks.
    • 149002 Apache HTTP Server 2.4.54 Security Release (Critical)

    • 151446 Apache HTTP Server 2.4.55 Security Release (High)

    • 151961 Apache HTTP Server 2.4.56 Security Release (High)

    • 152709 Apache Tomcat Denial Of Service Vulnerability (High)

    • 152711 Apache Tomcat Denial Of Service Vulnerability (High)

    • 152710 Apache Tomcat Information Disclosure Vulnerability (Medium)

    • 152712 Apache Tomcat Information Disclosure Vulnerability (High)

    • 150797 Apache Tomcat Injection Vulnerability (High)

    • 149001 Apache Tomcat Security Advisory: February 2022 (High)

    • 149423 Apache Tomcat Security Advisory: June 2022 (Medium)

    • 149000 Apache Tomcat Security Advisory: May 2022 (High)

    • 150241 Apache Tomcat Security Advisory: October 2022 (High)

    • 149005 Drupal Core Security Advisory: SA-CORE-2022-008 (Medium)

    • 149006 Drupal Core Security Advisory: SA-CORE-2022-009 (Medium)

    • 152713 Drupal Core Security Advisory: SA-CORE-2023-005 (Medium)

    • 149852 Drupal Security Advisory SA-CORE-2022-016 (High)

    • 149424 Drupal Security Advisory: SA-CORE-2022-010 (Medium)

    • 149425 Drupal Security Advisory: SA-CORE-2022-011 (Medium)

    • 149426 Drupal Security Advisory: SA-CORE-2022-012 (Medium)

    • 149427 Drupal Security Advisory: SA-CORE-2022-013 (High)

    • 149428 Drupal Security Advisory: SA-CORE-2022-014 (High)

    • 149429 Drupal Security Advisory: SA-CORE-2022-015 (Medium)

    • 151448 Joomla Security Advisory: February 2023 (Low)

    • 149014 Joomla! Core Security Advisory: Multiple Vulnerabilities in Versions 2.5.0-3.10.6 and 4.0.0-4.1.0 (Low)

    • 151965 Joomla! Improper Access Control Vulnerability (High)

    • 150243 Joomla! Information Disclosure vulnerability (Medium)

    • 152718 Joomla! MFA Brute Force Vulnerability (High)

    • 152717 Joomla! MFA Selection XSS Vulnerability (Medium)

    • 150242 Joomla! XSS vulnerability (Medium)

    • 150798 Nginx Denial of Service (DoS) Vulnerability (Medium)

    • 149860 PHP Cookie Integrity Vulnerability (Medium)

    • 149859 PHP Denial of Service (DoS) Vulnerability (Medium)

    • 151452 PHP Denial of Service Vulnerability (Medium)

    • 149634 PHP Heap Corruption Vulneraibility (High)

    • 149421 PHP Remote Code Execution (RCE) Vulnerability (High)

    • 149422 PHP Remote Code Execution (RCE) Vulnerability (High)

    • 151451 PHP Remote Code Execution Vulnerability (High)

    • 151967 PHP Security Update February 2023 (High)

    • 151968 PHP Security Update March 2023 (Medium)

    • 152725 PHP SOAP HTTP Digest Authentication Vulnerability (Low)

    • 156932 Server-Side Request Forgery (High)

    • 151793 Vulnerable Javascript Library Detected (Low)

    • 152726 Wordpress Core Directory Traversal Vulnerability (Medium)

    • 150803 Wordpress Cross-site scripting (XSS) Vulnerability (Medium)

    • 151453 Wordpress Denial of Service Vulnerability (Medium)

    • 150247 Wordpress Header Data Manipulation Vulnerability (High)

    • 150804 Wordpress Improper Authentication Vulnerability (Medium)

    • 150805 Wordpress Unauthenticated SSRF Vulnerability (Medium)

Fixes
  • Updated Vulnerability Descriptions:
    • 145498 Apache HTTP Server Security Update 2.4.48 (High)
    • 145502 Drupal Core Security Advisory: SA-CORE-2021-003 (Medium)

    • 145633 Drupal Core Security Advisory: SA-CORE-2021-004 (Medium)

    • 146102 Drupal Core Security Advisory: SA-CORE-2021-005 (High)

    • 146407 Drupal Core Security Advisory: SA-CORE-2021-006 (Low)

    • 146408 Drupal Core Security Advisory: SA-CORE-2021-007 (Medium)

    • 146409 Drupal Core Security Advisory: SA-CORE-2021-008 (Medium)

    • 146410 Drupal Core Security Advisory: SA-CORE-2021-009 (Medium)

    • 146958 Drupal Core Security Advisory: SA-CORE-2021-010 (Medium)

    • 147294 Drupal Core Security Advisory: SA-CORE-2021-011 (Medium)

    • 147935 Drupal Core Security Advisory: SA-CORE-2022-001 (Medium)

    • 147936 Drupal Core Security Advisory: SA-CORE-2022-002 (Medium)

    • 147937 Drupal Core Security Advisory: SA-CORE-2022-003 (Medium)

    • 147938 Drupal Core Security Advisory: SA-CORE-2022-004 (Medium)

    • 104152 Insecure Cookie Parameters (Trivial)

    • 117573 JspWebShell Detected (Critical)

    • 116642 Microsoft Windows Tilde Character File Name Information Disclosure (Low)

    • 104022 SSL Certificate: Chain Contains Weak RSA Keys (Trivial)

Back to Top

 

FileCatalyst


FileCatalyst Direct

Version 3.8.9 - Build 30

October 25, 2023

Added
  • All - Multiple security fixes

  • All - Modernized look and feel

  • Server - Ability to modulate read timeout for Swift3 EFS driver

  • HotFolder - Ability to install HotFolder as a non-admin user

  • Central - Ability to search transfer history by Task ID or Task Name, through REST

Fixes
  • All - Various UI fixes

  • All - Insufficient database connection pool could lead to performance degradation

  • Central - Stale connections were holding on to locks, preventing refresh of new connections

  • HotFolder - Removed the "Test Access Rate" button when creating a new HotFolder through the HTML admin

  • HotFolder - Undefined task would break HTML Scheduler UI

  • HotFolder - Time entries were incorrectly parsed when importing bandwith reports from older versions

  • Reverse Proxy - Enabling SSL was causing the diagnostic command to fail

  • Reverse Proxy - Reverse Proxy was improperly handling certain errors

  • Server - Problems navigating Google cloud file system

  • Server - Large report files may cause IO Exceptions

  • Server - S3 transfers would only use SSE-S3 encryption

  • Server - Disabling remote admin through HTML UI was not possible

Back to Top

 

IBM Partnership


Backup, Recovery, and Media Services (BRMS)

Version: PTF 7.5 SI84643, 7.4 SI84629, 7.3 SI84640

October 6, 2023

Enhancements

In version 7.4 and later:

  • BRMS has been enhanced to support software data compression for tape and virtual tape.

In versions 7.4:

  • BRMS support for ZLIB compression option for save files added.

Fixes

In version 7.3 and later:

  • Corrective action for CVE-2023-40377.

 

Back to Top

 

Outflank Security Tooling (OST)


Outflank

10 October 2023
Command & Control
  • New Tool Release: Cobalt Strike Integrations on Evasive Sleep Mask
3 October 2023
Internal Recon
  • New tool release: regcertipy - identifying certificate templates via registry Updates
  • Updated Kerneltool with additional supported kernel/OS versions

Back to Top

 

Powertech


BoKS SSH Client for Windows

Version 8.1.0

October 9, 2023

New Features
  • Updated to be based on PuTTY0.78 to use OpenSSL 1.1.1t

Enhancements
  • Added the ability for Bageant to automatically refresh its memory with newly added / removed certificates keys from the Personal Windows Certificate Store. With this enhancement Bageant do not need to be restarted anymore to be up-to-date with the certificate keys held in Personal Certificate Store.
Fixes
  • Fixed an issue when BoKS SFTP graphical interface failed to create local folders at download when MIcrosoft Windows' cmd.exe is blocked by a third-party application.

  • Fixed an issue when changing settings (e.g., font) for an active SSH connection, which caused that SSH connection to crash.

Back to Top

Powertech RSA SecurID Agent for IBM i

Version 9.13

October 25, 2023

New Features
  • When signed on to the IBM i and maintaining an IP address that is associated with a user profile, for Remote Authentication, an IPv6 style address may now be entered. Previously, only IPv4 style addresses could be maintained.

  • RSA SecurID Agent for IBM i has been enhanced to provide SecurID Agent authentication for IBM i systems within an IPv6 network. This latest version can be used for IPv4 and IPv6 networks.

Enhancements
  • The end user license agreement now appears in a screen accessible from the SecurID Agent License Setup panel (by pressing F8 "License Agreement").

  • Work with profiles now displays true SecurID activated status.

  • The ability to set the logging level has been added to the Settings page , with values of INFO, DEBUG, TRACE.

  • When using the latest version of Native Authentication, additional jobs may be observed within related subsystems. For example, two additional jobs will appear in the subsystem in which the interactive job runs.

  • In order to allow successful SecurID Agent authentication within an IPv6 network, the ownership of some program objects has changed. A client running integrity verification software over SecurID Agent may see changes from previous integrity results.

  • When using the latest version of Remote Authentication, additional jobs may be observed within related subsystems. For example, if authenticating FTP access, two additional jobs will appear in the subsystem that runs the IBM i FTP server jobs.

  • The RSA SecurID Agent for IBM i configuration menu option 3 has been changed to allow access to the additional configuration required within an IPv6 network.

Fixes
  • An issue that caused the graphical synchronization process to loop while attempting to use over thirty registered systems has been resolved.

  • An issue that caused an RNQ0202 error while attempting to activate SecurID Agent against a user profile has been resolved.

  • Customers on IBM i release 7.5 , using *FILESRV exit point to control enrolled users need to use exit point format PWFS0200 instead of PWFS0100.

  • For non-secured communications (for example, via the General Server), a timeout value is now processed within the child processes that are initiated from the main server job.

  • DSPSIDCFG command: When *ALL is specified for Configuration Data with *OUTFILE selected, an error message now appears that indicates *ALL with *OUTFILE is invalid.

  • F3 key selection within the PIN change procedure has been corrected to work as prior to version 9.0. Selecting F3 to end the PIN procedure now results with the "Access denied" text being displayed.

  • The Country ID configured for each server job is now validated when entered by the administrator.

  • After choosing F6=Add from the Message Action Item panel, F3=Exit no longer erroneously appears among the function key options.

  • For Message MLT0502, a superfluous single quote has been removed from the end of reason code 2.

  • An issue where details are not deleted when F 23=Delete is used within Maintain TCP/IP address for profile, has been resolved.

Robot


Robot HA

Version 13.08

October 16, 2023

New Features
  • Added Robot GUIDE to simplify setup process for new installs. See installation guide for more information on Robot GUIDE.

  • Enhanced product to add the ability to hold/release a library, IFS and Group sync attribute. When an attribute is held:

    • Sync job will not run.

    • Apply job will not start.

    • Swap Audit will not pass since we are not swap ready if on hold.

    • Compares will not check the held attribute (CHKLIBRSF, CHGGRPRSF, CHKIFSRSF).

    • CHKCDN process will not check the held attribute.

    • Swap will not start if an attribute is on hold. It can be manually started.

    • Reports will reflect if an attribute is on hold.

    • Held status indicated on main Work with Sync Attributes panel.

    • Option 9 - sync authorities will not process when attribute is on hold.

    • Clean will not process for an attribute on hold.

  • Simplified manual synchronization process with built-in operations to reduce the chances of user error during the process with new begin tape (BT) and end tape (ET) processes.

  • Added new RHACHGDDM command to allow changes to your DDM security settings.

Enhancements
  • Improved usability of group attribute definitions by removing server field on the 'libraries to include' parameter.

  • Improved product support for data in ASPs 2-32.

  • Improved journal receiver handling to fix issue causing receivers to be resent more often than necessary when there is an unexpected error.

  • Improved ability to locate remote jobs.

  • Added ability to disable triggers and constraints for QS36F library.

  • Improved trigger and constraint handling for QS36F library.

  • Reduced number of messages sent in Journal apply log when refreshes occur.

  • Improved usability for Group sync attributes by preventing invalid setup of journals.

  • Enhanced security for storing saved credentials.

  • Improved accuracy of data transfer rates displayed.

  • Improved recommendations for DDM connection security.

  • Added intelligent QAUDJRN management and retention that adapts seamlessly to unique system configurations, ensuring maximum functionality and requiring minimum user input for audit journal management.

  • RDB entries are now created based on CHGDDMTCPA 'Lowest authentication method' parameter.

  • Changed default value from *NO to *YES for OMITRUN parameter on SYNCATTRSF command. *YES helps limit duplicate sync jobs from being submitted when starting sync jobs from the menu or startup programs.

  • Improved support for the command RGZPFM where Allow Cancel *YES is specified.

  • Improved install and update process.

Fixes
  • Fixed issue where positioning cursor to certain areas of the Audit History panel caused errors.

  • INZRSFHA will retain *AUTL and *USRPRF sync attribute settings if it has been previously run.

  • *JOBQ type objects are no longer incorrectly flagged as needing to be refreshed on a library compare.

  • Fixed issue where the journal name on the sync attribute setup were not retained correctly when rolling through setup panels.

  • Fixed error handling when a manual sync point is run in batch so error messages are now reported correctly.

  • Group Synchronization Attributes report now reflects the ‘Days to keep receiver’ parameter correctly.

  • Improved usability of include and omit definitions on sync attributes.

  • Fixed issue with IFS syncing when a file starts with special characters. We now support files starting with the following special characters: single quote, double quote, asterisk, question mark, and tilde.

  • Improved performance by preventing the ability to cancel a refresh of a file by sending RSF7110 as an informational message, instead of an inquiry.

  • Fixed issue with unexpected errors causing job to continue to have elevated authority.

  • Fixed issue with clearing standby journals.

  • Fixed issue where library or group journal apply jobs receive object lock errors when refreshing files.

  • Fixed issue with F4 prompting when cursor is on 'position to' field on Work with Sync Attributes panel.

Back to Top

 

TeamQuest


Administration Console

Version 11.4.7

October 31, 2023

Enhancements
  • Upgraded to OpenSSL 3.1.3 (Linux only)

Automated Analytics

Version 11.3.35

October 31, 2023

New Features
  • Automated Analytics is supported on RedHat Enterprise Linux version 9

  • Automated Analytics is supported on Microsoft Windows Server 2022

Enhancements
  • Upgraded Apache Tomcat to version 9.0.82

  • Upgraded Apache HTTP to version 2.4.58

  • Updated Apache Spark to version 3.4.1

TeamQuest Manager

Version 11.4.13

October 31, 2023

New Features
  • Manager is supported on Windows 11

Enhancements
  • Upgraded to OpenSSL 3.1.3

  • Upgraded Apache HTTP to version 2.4.58

Fixes
  • Decreased self-signed certificate validity

Vityl Monitor

Version 11.4.8

October 31, 2023

New Features
  • Vityl Monitor is supported on RedHet Enterprise Linux 9

Enhancements
  • Upgraded Apache Tomcat to version 9.0.82

Fixes
  • Hide close text on Close dialog in pop-up dialogs

 

Back to Top

 

Titus


DCS Analytics Collector

Version 2023.0

October 24, 2023

New Features
  • Updated product name from the Titus Reporting Audit Collector to the Data Classification Suite (DCS) Analytics Collector. This is part of a larger initiative to update from a Titus Classification Suite (TCS) to a Data Classification Suite (DCS) product naming convention.

    NOTE: You can continue to use the Titus Reporting Audit Collector as you upgrade your collector machines.
  • Removed the use of Microsoft Message Queuing (MSMQ) to allow the DCS Analytics Collector to directly send audit events to the SQL database.

    NOTE: Ensure that the Microsoft Message Queuing is empty before uninstalling the Titus Reporting Audit Collector and installing the DCS Analytics Collector. See the “Upgrade from a previous version” section in the Data Classification Suite Analytics Collector Deployment Guide for more information.
Enhancements
  • Updated sizing guidelines based on testing.

  • Updated installer to allow you to select a destination folder.

  • Provided option to edit the location of audit log files. The audit files can be stored on a single machine or a shared folder with a Universal Naming Convention (UNC) path.

Policy Manager

Version 2023.10

October 20, 2023

New Features
  • Added Date Schema Field support for TCS for M365 and TCS for Windows. Configuration options include allowing users to pick any date from a calendar, or defining time periods that users select from a dropdown.

    NOTE: TCS for Windows will support this Policy Manager update in a future release. Refer to the TCS for Windows release notes to confirm when this new feature is supported.
Enhancements
  • Enhanced the Schema Mapping page to display dropdown lists with the names of Schema Fields and Values that you created in the Policy Manager. This change is for Titus Metadata information only. You still need to manually enter the metadata names of the Schema Fields and Values for External Metadata.

    NOTE: TCS for Windows will support this Policy Manager update in a future release. Refer to the TCS for Windows release notes to confirm when this new feature is supported.
  • Added new App Setting (under User Settings) to allow you to enable interoperability with Microsoft sensitivity labels when configured through Schema Mapping.

    NOTE: TCS for Windows will support this Policy Manager update in a future release. Refer to the TCS for Windows release notes to confirm when this new feature is supported.
  • Added Namespace App Setting (under TCS System Settings) to enable the proper interchange between different Schemas. The Namespace distinguishes your metadata from the metadata being stored by another organization, group, or department when you use Schema Mappings.

    NOTE: TCS for Windows will support this Policy Manager update in a future release. Refer to the TCS for Windows release notes to confirm when this new feature is supported.
  • Added the following TCS for Windows configuration options:

    • Option buttons: allows you to display radio buttons for up to four single selection Schema Field Values in the Classification Selector. If you have more than four Values, the Classification Selector display defaults to a dropdown list.

    • Include Embedded Images in Attachment Checks: this new App Setting (under Email Add-In Settings) allows embedded images that are pasted into emails or appear in email signatures to be included when performing any type of attachment check.

    • More Favorites Menu Text: this new App Setting (under Favorites) allows you to customize the text that users see when they add more than eight Favorites in the Classification Selector.

    NOTE: TCS for Windows will support this Policy Manager update in a future release. Refer to the TCS for Windows release notes to confirm when this new feature is supported.
  • Improved user experience for entering numeric values in textboxes, using the scrollbars, and creating alternate text groups for a Schema Field Value.

  • Added the HTML Editor to more Action parameters. The HTML Editor lets you add color, formatting, and links to content.

  • Improved licensed-based filtering for Actions and Custom Conditions.

  • Added error messages to provide clearer instructions. For example, you will see an error message if your Configuration is too large to publish.

TCS for M365

Version 2023.10

October 20, 2023

New Features
  • Added Date Schema Field support. Configuration options include allowing users to pick any date from a calendar, or defining time periods that users select from a dropdown.

Titus Data Detection Engine (on-premises)

Version 2023.0 HF1

October 6, 2023

Fixes

This release fixed the Data Detection Engine (DDE) client extension installer to work with the currently shipping version of TCS for Windows and the next release of Illuminate. The release package includes two versions of the DDE client extension installer (2023.0 and 2023.0 HF1).

If you use Titus Classification Suite (TCS) for Windows:

  • For TCS for Windows 2023.0 HF1 or a later version, install DDE client extension 2023.0 HF1.
  • For TCS for Windows 2022.0 HF3 or an earlier version, install DDE client extension 2023.0.

NOTE: DDE will not work with TCS for Windows 2023.0.

If you use Illuminate:

  • For Illuminate 2023.0 HF1 or an earlier version, install DDE client extension 2023.0.

  • The next release of Illuminate will include a fix to work with DDE client extension 2023.0 HF1.

If you use TCS for Windows and Illuminate:

  • For now, install TCS for Windows and Illuminate on separate computers. Review the instructions above.

  • After Illuminate is enhanced to work with DDE client extension 2023.0 HF1, you can install all products on the same computer.

Back to Top