Monthly Release Notes - April 2023

Jump to:

 

Automate


Automate Desktop and Automate Plus/Ultimate

Version 22.1.1

April 14, 2023

Enhancements
  • Numeric-type variables are now handled and stored in decimals to provide higher precision.

  • The default Email Server Setting SMTP port number for Explicit TLS/SSL in Automate Plus/Ultimate has been changed from 25 to 587.

Fixes
  • Installations of Automate Plus/Ultimate that were upgraded from version 11 to version 2022 will no longer write task execution results to the Automate Agent 11 Logs folder.

  • Large memory leaks no longer occur on an agent computer.

  • The SQL Connections window will no longer improperly encrypt SQL connection strings or other sensitive information in the server or agent's properties when buttons in the window are double-clicked, or other interactions are performed.

  • Writing a value to a dataset no longer always updates row 1 instead of the row specified.

  • All permutations of the strings True and False are now properly recognized.

  • A variable in a called function will no longer overwrite the value of an identically named variable in the calling function.

  • Tasks no longer only return dates in US format.

  • The Email Server Setting SMTP Port parameter in Automate Plus/Ultimate no longer reverts back to its default value after being changed.

Back to Top

 

Digital Defense


Frontline Agent

Version 1.57.0

April 18, 2023

Current Windows agent version: 1.53.0

Current macOS agent version: 1.55.0

Enhancements
  • Implemented the following new vulnerability checks:

    • 151975 Apple Security Update: macOS Big Sur 11.7.5 (High) - Mac
    • 151977 Apple Security Update: macOS Big Sur 11.7.6 (High) - Mac

    • 151971 Apple Security Update: macOS Monterey 12.6.4 (High) - Mac

    • 151979 Apple Security Update: macOS Monterey 12.6.5 (High) - Mac

    • 151972 Apple Security Update: macOS Ventura 13.3.1 (High) - Mac

    • 151973 Apple Security Update: macOS Ventura 13.3 (High) - Mac

    • 151976 Apple Security Update: Safari 16.4.1 (High) - Mac

    • 151978 Apple Security Update: Safari 16.4 (High) - Mac

    • 151974 Apple Security Update: Xcode 14.3 (High) - Mac

    • 151799 APSB23-04: Security Updates Available for Adobe Digital Editions (High) - Windows

    • 151800 APSB23-24: Security Updates Available for Adobe Acrobat and Reader (High) - Windows, Mac

    • 151794 Google Chrome: Multiple Vulnerabilities in Versions Less Than 111.0.5563.110 (High) - Windows,

    • Mac

    • 151795 Google Chrome: Multiple Vulnerabilities in Versions Less Than 112.0.5615.49 (High) - Windows,

    • Mac

    • 151796 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 110.0.1587.78 (High) -

    • Windows

    • 151798 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 111.0.1661.54 (High) -

    • Windows

    • 151797 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 112.0.1722.34 (High) -

    • Windows

    • 151801 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 112 (High) - Windows, Mac

    • 151802 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.10 (High) -

    • Windows, Mac

    • 151803 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.10 (High) -

    • Windows

    • 151804 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.9.1 (High) -

    • Windows

    • 150586 MS22-DEC: Microsoft .NET Security Update (High) - Windows

    • 151842 MS23-APR: Microsoft Office Security Update (High) - Windows, Mac

    • 151844 MS23-APR: Microsoft Sharepoint Server Security Update (Medium) - Windows

    • 151843 MS23-APR: Microsoft SQL Server Security Update (High) - Windows

    • 151841 MS23-APR: Microsoft Windows Security Update (High) - Windows

    • 151566 MS23-FEB: Microsoft .NET Security Update (High) - Windows

    • 151980 Zoom Improper Trust Boundary Vulnerability (Medium) - Mac

Fixes
  • Updated Vulnerability Descriptions:
    • 151433 Visual Studio Code Remote Execution Vulnerability (High)

Frontline Vulnerability Manager

Version 6.5.2.5

April 7, 2023

Enhancements
  • Internal improvements for tracking metrics and maintaining stability in Frontline.
Version 6.5.2.4

April 3, 2023

Enhancements
  • Internal improvements for tracking metrics and maintaining stability in Frontline.

Frontline Web Application Scanner

Version 6.5.2.5

April 7, 2023

Enhancements
  • Internal improvements for tracking metrics and maintaining stability in Frontline.
Version 6.5.2.4

April 3, 2023

Enhancements
  • Internal improvements for tracking metrics and maintaining stability in Frontline.

Frontline NIRV Scanner

Version 4.19.0

April 19, 2023

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 152192 Amazon Linux 2 Security Advisory: ALAS-2023-2012 (Low)
  • 152195 Amazon Linux 2 Security Advisory: ALAS-2023-2013 (Low)

  • 152196 Amazon Linux 2 Security Advisory: ALAS-2023-2014 (Low)

  • 152191 Amazon Linux 2 Security Advisory: ALAS-2023-2015 (Low)

  • 152194 Amazon Linux 2 Security Advisory: ALAS-2023-2016 (Low)

  • 152193 Amazon Linux 2 Security Advisory: ALAS-2023-2017 (Medium)

  • 152190 Amazon Linux 2 Security Advisory: ALAS-2023-2018 (Medium)

  • 152188 Amazon Linux Security Advisory: ALAS-2023-1727 (Low)

  • 152187 Amazon Linux Security Advisory: ALAS-2023-1729 (Low)

  • 152186 Amazon Linux Security Advisory: ALAS-2023-1730 (Low)

  • 152189 Amazon Linux Security Advisory: ALAS-2023-1731 (Low)

  • 152185 Amazon Linux Security Advisory: ALAS-2023-1732 (Low)

  • 152184 Amazon Linux Security Advisory: ALAS-2023-1733 (Medium)

  • 151961 Apache HTTP Server 2.4.56 Security Release (High)

  • 152228 Azul Zulu Critical Patch Update: APRIL-2023 (High)

  • 152227 Cisco Security Advisory: CISCO-SA-ASAFTDIOS-DHCPV6-CLI-ZF3ZTV (Medium)

  • 152226 Cisco Security Advisory: CISCO-SA-C9800-APJOIN-DOS-NXRHKT5 (Medium)

  • 152225 Cisco Security Advisory: CISCO-SA-EWLC-DOS-WFUJBHKW (High)

  • 152224 Cisco Security Advisory: CISCO-SA-IOS-DHCPV6-DOS-44CMVDDK (High)

  • 152223 Cisco Security Advisory: CISCO-SA-IOS-GRE-CRASH-P6NE5SQ5 (High)

  • 152222 Cisco Security Advisory: CISCO-SA-IOS-XE-SDWAN-VQAHEJYW (High)

  • 152221 Cisco Security Advisory: CISCO-SA-IOSXE-PRIV-ESC-SABD8HCU (Medium)

  • 152220 Cisco Security Advisory: CISCO-SA-IOX-PRIV-ESCALATE-XG8ZKYPK (High)

  • 152219 Cisco Security Advisory: CISCO-SA-IPV4-VFR-DOS-CXXTFACB (High)

  • 152218 Cisco Security Advisory: CISCO-SA-WEBUI-PTHTRV-ES7GSB9V (Medium)

  • 152182 Debian Security Advisory: DLA-3388-1 (Medium)

  • 152183 Debian Security Advisory: DLA-3393-1 (Medium)

  • 152180 Debian Security Advisory: DLA-3395-1 (High)

  • 152181 Debian Security Advisory: DLA-3399-1 (Medium)

  • 152209 ELSA-2023-12255: Unbreakable Enterprise kernel security update (Medium)

  • 152200 ELSA-2023-12256: Unbreakable Enterprise kernel-container security update (Medium)

  • 152215 ELSA-2023-12297: openssl security update (Medium)

  • 152198 ELSA-2023-1786: firefox security update (Medium)

  • 152197 ELSA-2023-1787: firefox security update (Medium)

  • 152212 ELSA-2023-1791: firefox security update (Medium)

  • 152214 ELSA-2023-1802: thunderbird security update (Medium)

  • 152217 ELSA-2023-1806: thunderbird security update (Medium)

  • 152205 ELSA-2023-1809: thunderbird security update (Medium)

  • 152216 ELSA-2023-1875: java-11-openjdk security update (Medium)

  • 152199 ELSA-2023-1879: java-17-openjdk security and bug fix update (Medium)

  • 152203 ELSA-2023-1880: java-11-openjdk security update (Medium)

  • 152211 ELSA-2023-1895: java-11-openjdk security update (Medium)

  • 152210 ELSA-2023-1898: java-17-openjdk security and bug fix update (Medium)

  • 152207 ELSA-2023-1904: java-1.8.0-openjdk security and bug fix update (Medium)

  • 152202 ELSA-2023-1908: java-1.8.0-openjdk security update (Medium)

  • 152208 ELSA-2023-1909: java-1.8.0-openjdk security and bug fix update (Medium)

  • 152204 ELSA-2023-1918: webkit2gtk3 security update (Medium)

  • 152213 ELSA-2023-1919: webkit2gtk3 security update (Medium)

  • 152206 ELSA-2023-1930: emacs security update (Medium)

  • 152201 ELSA-2023-1987: kernel security and bug fix update (Low)

  • 152157 Google Chrome: Multiple Vulnerabilities in Versions Less Than 112.0.5615.121 (High)

  • 152158 Google Chrome: Multiple Vulnerabilities in Versions Less Than 112.0.5615.137 (High)

  • 152230 Java Critical Patch Update - CPU-APRIL-2023 (High)

  • 151965 Joomla! Improper Access Control Vulnerability (High)

  • 152160 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 109.0.1518.100 (High)

  • 152161 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 112.0.1722.48 (High)

  • 152159 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 112.0.1722.58 (High)

  • 151966 OpenSSH Security Advisory (High)

  • 151963 OpenSSL Certificate Policy Check Vulnerability (Low)

  • 151962 OpenSSL Certificate Policy Verification Vulnerability (Low)

  • 151964 OpenSSL Denial of Service (DoS) Vulnerability (Low)

  • 152231 Oracle Database Critical Patch Update: April 2023 (High)

  • 149634 PHP Heap Corruption Vulneraibility (High)

  • 151967 PHP Security Update February 2023 (High)

  • 151968 PHP Security Update March 2023 (Medium)

  • 151969 phpMyAdmin XSS Vulnerability (Medium)

  • 151970 Samba Security Advisory March 2023 (High)

  • 152171 Solaris Security Patch: (150383-31): SunOS 5.10: wanboot patch (Medium)

  • 152172 Solaris Security Patch: (151912-22): SunOS 5.10: OpenSSL 1.0.2 patch (Medium)

  • 152173 Solaris Security Patch: (151913-22): SunOS 5.10_x86: OpenSSL 1.0.2 patch (Medium)

  • 152174 Solaris Security Patch: (153060-02): CDE 1.6: patch dtprintinfo patch (Medium)

  • 152175 Solaris Security Patch: (153061-02): CDE 1.6_x86: patch dtprintinfo patch (Medium)

  • 152176 Solaris Security Patch: (153153-07): SunOS 5.10: kernel patch (Medium)

  • 152177 Solaris Security Patch: (153154-07): SunOS 5.10_x86: kernel patch (Medium)

  • 152178 Solaris Security Patch: (153264-71): JavaSE 8: update 371 patch (equivalent to JDK 8u371), 64bit (Medium)

  • 152179 Solaris Security Patch: (153265-71): JavaSE 8_x86: update 371 patch (equivalent to JDK 8u371), 64bit (Medium)

  • 152229 Visual Studio Code Remote Code Execution Vulnerability (Medium)

  • 151980 Zoom Improper Trust Boundary Vulnerability (Medium)

  • 152165 [USN-6010-2] Firefox regressions (Medium)

  • 152170 [USN-6010-3] Firefox regressions (Medium)

  • 152162 [USN-6019-1] Flask-CORS vulnerability (Medium)

  • 152164 [USN-6022-1] Kamailio vulnerabilities (Medium)

  • 152163 [USN-6023-1] LibreOffice vulnerability (Medium)

  • 152166 [USN-6026-1] Vim vulnerabilities (Medium)

  • 152167 [USN-6028-1] libxml2 vulnerabilities (Medium)

  • 152168 [USN-6035-1] KAuth vulnerability (Medium)

  • 152169 [USN-6038-1] Go vulnerabilities (Medium)

Fixes

Updated Vulnerability Descriptions:

  • 148562 Amazon Linux 2 Security Advisory: ALAS-2022-1775 (Medium)
  • 148571 Amazon Linux 2 Security Advisory: ALAS-2022-1776 (High)

  • 148556 Amazon Linux 2 Security Advisory: ALAS-2022-1778 (Medium)

  • 148568 Amazon Linux 2 Security Advisory: ALAS-2022-1779 (High)

  • 148555 Amazon Linux 2 Security Advisory: ALAS-2022-1780 (Medium)

  • 148561 Amazon Linux 2 Security Advisory: ALAS-2022-1782 (Low)

  • 148565 Amazon Linux 2 Security Advisory: ALAS-2022-1783 (High)

  • 148567 Amazon Linux 2 Security Advisory: ALAS-2022-1784 (Medium)

  • 148560 Amazon Linux 2 Security Advisory: ALAS-2022-1786 (High)

  • 148558 Amazon Linux 2 Security Advisory: ALAS-2022-1787 (Low)

  • 148559 Amazon Linux 2 Security Advisory: ALAS-2022-1788 (High)

  • 148564 Amazon Linux 2 Security Advisory: ALAS-2022-1789 (Medium)

  • 148557 Amazon Linux 2 Security Advisory: ALAS-2022-1790 (Medium)

  • 148570 Amazon Linux 2 Security Advisory: ALAS-2022-1791 (Medium)

  • 148566 Amazon Linux 2 Security Advisory: ALAS-2022-1792 (Low)

  • 148569 Amazon Linux 2 Security Advisory: ALAS-2022-1793 (Medium)

  • 148563 Amazon Linux 2 Security Advisory: ALAS-2022-1794 (Low)

  • 148552 Amazon Linux Security Advisory: ALAS-2022-1582 (Medium)

  • 148553 Amazon Linux Security Advisory: ALAS-2022-1583 (High)

  • 148554 Amazon Linux Security Advisory: ALAS-2022-1584 (High)

  • 148496 ELSA-2022-1537: gzip security update (Medium)

  • 148491 ELSA-2022-1541: maven-shared-utils security update (Medium)

  • 148486 ELSA-2022-1546: polkit security update (Low)

  • 148488 ELSA-2022-1550: kernel security and bug fix update (Medium)

  • 148495 ELSA-2022-1552: vim security update (High)

  • 148499 ELSA-2022-1556: mariadb:10.3 security and bug fix update (High)

  • 148503 ELSA-2022-1557: mariadb:10.5 security, bug fix, and enhancement update (High)

  • 148497 ELSA-2022-1565: container-tools:3.0 security and bug fix update (Medium)

  • 148483 ELSA-2022-1566: container-tools:2.0 security update (Medium)

  • 148489 ELSA-2022-1642: zlib security update (Medium)

  • 148498 ELSA-2022-1643: xmlrpc-c security update (High)

  • 148487 ELSA-2022-1703: firefox security update (Medium)

  • 148492 ELSA-2022-1705: firefox security update (Medium)

  • 148501 ELSA-2022-1725: thunderbird security update (Medium)

  • 148494 ELSA-2022-1730: thunderbird security update (Medium)

  • 148602 ELSA-2022-1766: libreoffice security, bug fix, and enhancement update (Medium)

  • 148594 ELSA-2022-1796: qt5-qtbase security update (Medium)

  • 148592 ELSA-2022-1810: libtiff security update (Medium)

  • 148597 ELSA-2022-1819: go-toolset:ol8 security and bug fix update (High)

  • 148585 ELSA-2022-1823: mod_auth_openidc:2.3 security update (Medium)

  • 148588 ELSA-2022-1842: exiv2 security, bug fix, and enhancement update (Medium)

  • 148589 ELSA-2022-1851: pki-core:10.6 security and bug fix update (Low)

  • 148600 ELSA-2022-1917: xorg-x11-server and xorg-x11-server-Xwayland security update (High)

  • 148606 ELSA-2022-1935: php:7.4 security update (Medium)

  • 148586 ELSA-2022-1991: cpio security update (Medium)

  • 148596 ELSA-2022-2013: openssh security, bug fix, and enhancement update (Medium)

  • 148605 ELSA-2022-2031: libssh security, bug fix, and enhancement update (Medium)

  • 148591 ELSA-2022-2074: samba security, bug fix, and enhancement update (Low)

  • 148603 ELSA-2022-2120: zsh security update (Medium)

  • 148595 ELSA-2022-2191: gzip security update (Medium)

  • 148593 ELSA-2022-2201: rsync security update (Medium)

  • 148587 ELSA-2022-2234: subversion:1.10 security update (Medium)

  • 148590 ELSA-2022-4642: kernel security and bug fix update (Medium)

  • 148482 ELSA-2022-9172: kvm_utils security update (Medium)

  • 148481 ELSA-2022-9341: ol-automation-manager security update (High)

  • 148493 ELSA-2022-9344: qemu security update (Medium)

  • 148490 ELSA-2022-9348: Unbreakable Enterprise kernel security update (High)

  • 148500 ELSA-2022-9359: expat security update (High)

  • 148485 ELSA-2022-9362: olcne istio istio security update (Medium)

  • 148502 ELSA-2022-9363: olcne istio istio security update (Medium)

  • 148484 ELSA-2022-9364: virt:kvm_utils security update (Medium)

  • 148584 ELSA-2022-9366: Unbreakable Enterprise kernel-container security update (Medium)

  • 148604 ELSA-2022-9412: Unbreakable Enterprise kernel-container security update (Medium)

  • 148599 ELSA-2022-9413: Unbreakable Enterprise kernel-container security update (Medium)

  • 148598 ELSA-2022-9421: glibc security update (High)

  • 148601 ELSA-2022-9426: Unbreakable Enterprise kernel-container security update (Medium)

  • 148513 RHSA-2022:1487: java-1.8.0-openjdk security, bug fix, and enhancement update (Medium)

  • 148508 RHSA-2022:1491: java-1.8.0-openjdk security update (Medium)

  • 148505 RHSA-2022:1535: kpatch-patch security update (Medium)

  • 148514 RHSA-2022:1537: gzip security update (Medium)

  • 148518 RHSA-2022:1541: maven-shared-utils security update (Medium)

  • 148515 RHSA-2022:1546: polkit security update (Low)

  • 148516 RHSA-2022:1550: kernel security and bug fix update (Medium)

  • 148506 RHSA-2022:1552: vim security update (Low)

  • 148519 RHSA-2022:1555: kernel-rt security and bug fix update (Medium)

  • 148510 RHSA-2022:1556: mariadb:10.3 security and bug fix update (Low)

  • 148522 RHSA-2022:1557: mariadb:10.5 security, bug fix, and enhancement update (Low)

  • 148507 RHSA-2022:1565: container-tools:3.0 security and bug fix update (Low)

  • 148509 RHSA-2022:1566: container-tools:2.0 security update (Low)

  • 148504 RHSA-2022:1642: zlib security update (Medium)

  • 148517 RHSA-2022:1643: xmlrpc-c security update (Medium)

  • 148521 RHSA-2022:1703: firefox security update (Medium)

  • 148520 RHSA-2022:1705: firefox security update (Medium)

  • 148512 RHSA-2022:1725: thunderbird security update (Medium)

  • 148511 RHSA-2022:1730: thunderbird security update (Medium)

  • 148523 [USN-5376-3] Git regression (Medium)

  • 148530 [USN-5382-2] libinput vulnerability (Medium)

  • 148524 [USN-5390-1] Linux kernel vulnerabilities (Medium)

  • 148533 [USN-5390-2] Linux kernel (Raspberry Pi) vulnerabilities (Medium)

  • 148527 [USN-5392-1] Mutt vulnerabilities (Medium)

  • 148525 [USN-5393-1] Thunderbird vulnerabilities (Medium)

  • 148526 [USN-5394-1] WebKitGTK vulnerabilities (Medium)

  • 148528 [USN-5396-1] Ghostscript vulnerability (Medium)

  • 148529 [USN-5397-1] curl vulnerabilities (Medium)

  • 148531 [USN-5399-1] libvirt vulnerabilities (Medium)

  • 148532 [USN-5400-1] MySQL vulnerabilities (Medium)

  • 148534 [USN-5400-2] MySQL vulnerabilities (Medium)

  • 148536 [USN-5401-1] DPDK vulnerabilities (Medium)

  • 148535 [USN-5402-1] OpenSSL vulnerabilities (Medium)

  • 148537 [USN-5404-1] Rsyslog vulnerability (Medium)

Version 4.18.0

April 14, 2023

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 151915 Amazon Linux 2 Security Advisory: ALAS-2023-1987 (Low)
  • 151917 Amazon Linux 2 Security Advisory: ALAS-2023-1988 (Low)
  • 151918 Amazon Linux 2 Security Advisory: ALAS-2023-1989 (Low)
  • 151909 Amazon Linux 2 Security Advisory: ALAS-2023-1990 (Low)
  • 151910 Amazon Linux 2 Security Advisory: ALAS-2023-1991 (Low)
  • 151911 Amazon Linux 2 Security Advisory: ALAS-2023-1992 (Low)
  • 151912 Amazon Linux 2 Security Advisory: ALAS-2023-1994 (Low)
  • 151913 Amazon Linux 2 Security Advisory: ALAS-2023-1995 (Low)
  • 151901 Amazon Linux 2 Security Advisory: ALAS-2023-1996 (Low)
  • 151904 Amazon Linux 2 Security Advisory: ALAS-2023-1997 (Medium)
  • 151902 Amazon Linux 2 Security Advisory: ALAS-2023-1998 (Medium)
  • 151903 Amazon Linux 2 Security Advisory: ALAS-2023-1999 (Medium)
  • 151916 Amazon Linux 2 Security Advisory: ALAS-2023-2000 (Medium)
  • 151920 Amazon Linux 2 Security Advisory: ALAS-2023-2001 (Medium)
  • 151919 Amazon Linux 2 Security Advisory: ALAS-2023-2002 (Medium)
  • 151921 Amazon Linux 2 Security Advisory: ALAS-2023-2003 (Medium)
  • 151922 Amazon Linux 2 Security Advisory: ALAS-2023-2004 (Low)
  • 151924 Amazon Linux 2 Security Advisory: ALAS-2023-2005 (Low)
  • 151905 Amazon Linux 2 Security Advisory: ALAS-2023-2006 (Low)
  • 151908 Amazon Linux 2 Security Advisory: ALAS-2023-2007 (Low)
  • 151907 Amazon Linux 2 Security Advisory: ALAS-2023-2008 (Low)
  • 151906 Amazon Linux 2 Security Advisory: ALAS-2023-2009 (Low)
  • 151923 Amazon Linux 2 Security Advisory: ALAS-2023-2010 (High)
  • 151914 Amazon Linux 2 Security Advisory: ALAS-2023-2011 (Medium)
  • 151883 Amazon Linux Security Advisory: ALAS-2020-1458 (Medium)
  • 151879 Amazon Linux Security Advisory: ALAS-2023-1701 (Low)
  • 151897 Amazon Linux Security Advisory: ALAS-2023-1702 (Low)
  • 151895 Amazon Linux Security Advisory: ALAS-2023-1703 (Low)
  • 151884 Amazon Linux Security Advisory: ALAS-2023-1704 (Low)
  • 151888 Amazon Linux Security Advisory: ALAS-2023-1705 (Low)
  • 151898 Amazon Linux Security Advisory: ALAS-2023-1706 (Low)
  • 151886 Amazon Linux Security Advisory: ALAS-2023-1707 (Low)
  • 151893 Amazon Linux Security Advisory: ALAS-2023-1709 (Medium)
  • 151882 Amazon Linux Security Advisory: ALAS-2023-1711 (Low)
  • 151889 Amazon Linux Security Advisory: ALAS-2023-1712 (Low)
  • 151899 Amazon Linux Security Advisory: ALAS-2023-1713 (Low)
  • 151877 Amazon Linux Security Advisory: ALAS-2023-1714 (Low)
  • 151881 Amazon Linux Security Advisory: ALAS-2023-1715 (Low)
  • 151892 Amazon Linux Security Advisory: ALAS-2023-1716 (Low)
  • 151880 Amazon Linux Security Advisory: ALAS-2023-1717 (Medium)
  • 151891 Amazon Linux Security Advisory: ALAS-2023-1718 (High)
  • 151900 Amazon Linux Security Advisory: ALAS-2023-1719 (High)
  • 151885 Amazon Linux Security Advisory: ALAS-2023-1720 (High)
  • 151896 Amazon Linux Security Advisory: ALAS-2023-1721 (Medium)
  • 151876 Amazon Linux Security Advisory: ALAS-2023-1722 (Medium)
  • 151887 Amazon Linux Security Advisory: ALAS-2023-1723 (High)
  • 151890 Amazon Linux Security Advisory: ALAS-2023-1724 (Low)
  • 151894 Amazon Linux Security Advisory: ALAS-2023-1725 (Low)
  • 151878 Amazon Linux Security Advisory: ALAS-2023-1726 (Medium)
  • 151799 APSB23-04: Security Updates Available for Adobe Digital Editions (High)
  • 151800 APSB23-24: Security Updates Available for Adobe Acrobat and Reader (High)
  • 151864 Debian Security Advisory: DLA-3131-1 (High)
  • 151859 Debian Security Advisory: DLA-3322-1 (Medium)
  • 151850 Debian Security Advisory: DLA-3325-1 (Medium)
  • 151874 Debian Security Advisory: DLA-3327-1 (Medium)
  • 151855 Debian Security Advisory: DLA-3335-1 (Medium)
  • 151858 Debian Security Advisory: DLA-3336-1 (High)
  • 151846 Debian Security Advisory: DLA-3340-1 (High)
  • 151860 Debian Security Advisory: DLA-3350-1 (Medium)
  • 151873 Debian Security Advisory: DLA-3351-1 (Medium)
  • 151875 Debian Security Advisory: DLA-3354-1 (High)
  • 151847 Debian Security Advisory: DLA-3357-1 (Medium)
  • 151865 Debian Security Advisory: DLA-3359-1 (Medium)
  • 151856 Debian Security Advisory: DLA-3360-1 (Medium)
  • 151867 Debian Security Advisory: DLA-3362-1 (Medium)
  • 151866 Debian Security Advisory: DLA-3363-1 (Medium)
  • 151863 Debian Security Advisory: DLA-3368-1 (Medium)
  • 151862 Debian Security Advisory: DLA-3369-1 (Medium)
  • 151861 Debian Security Advisory: DLA-3371-1 (Low)
  • 151870 Debian Security Advisory: DLA-3373-1 (Medium)
  • 151869 Debian Security Advisory: DLA-3376-1 (Medium)
  • 151872 Debian Security Advisory: DLA-3378-1 (Medium)
  • 151868 Debian Security Advisory: DLA-3380-1 (Medium)
  • 151854 Debian Security Advisory: DLA-3383-1 (Medium)
  • 151851 Debian Security Advisory: DLA-3386-1 (Low)
  • 151871 Debian Security Advisory: DLA-3387-1 (Medium)
  • 151857 Debian Security Advisory: DLA-3389-1 (High)
  • 151852 Debian Security Advisory: DLA-3390-1 (Medium)
  • 151848 Debian Security Advisory: DSA-5354-1 (High)
  • 151849 Debian Security Advisory: DSA-5356-1 (Medium)
  • 151853 Debian Security Advisory: DSA-5358-1 (Medium)
  • 151845 Debian Security Advisory: DSA-5372-1 (Medium)
  • 151927 ELSA-2023-12205: openssl security update (Medium)
  • 151935 ELSA-2023-12206: Unbreakable Enterprise kernel security update (Medium)
  • 151928 ELSA-2023-12207: Unbreakable Enterprise kernel-container security update (Medium)
  • 151936 ELSA-2023-12210: openssl security update (Medium)
  • 151950 ELSA-2023-12213: openssl security update (Medium)
  • 151956 ELSA-2023-12226: Unbreakable Enterprise kernel security update (Medium)
  • 151953 ELSA-2023-12232: Unbreakable Enterprise kernel security update (Medium)
  • 151939 ELSA-2023-12235: pcs security update (Medium)
  • 151954 ELSA-2023-12238: nss security update (Medium)
  • 151945 ELSA-2023-12242: Unbreakable Enterprise kernel security update (Medium)
  • 151931 ELSA-2023-12243: Unbreakable Enterprise kernel-container security update (Medium)
  • 151944 ELSA-2023-1368: nss security and bug fix update (Medium)
  • 151934 ELSA-2023-1401: thunderbird security update (Medium)
  • 151946 ELSA-2023-1403: thunderbird security update (Medium)
  • 151955 ELSA-2023-1405: openssl security update (Medium)
  • 151929 ELSA-2023-1407: thunderbird security update (Medium)
  • 151952 ELSA-2023-1470: kernel security, bug fix, and enhancement update (Medium)
  • 151943 ELSA-2023-1551: tigervnc security update (Medium)
  • 151959 ELSA-2023-1566: kernel security, bug fix, and enhancement update (Medium)
  • 151941 ELSA-2023-1569: gnutls security and bug fix update (Low)
  • 151940 ELSA-2023-1572: pesign security update (Medium)
  • 151933 ELSA-2023-1576: postgresql:13 security update (Low)
  • 151957 ELSA-2023-1582: nodejs:16 security, bug fix, and enhancement update (Low)
  • 151947 ELSA-2023-1583: nodejs:18 security, bug fix, and enhancement update (Low)
  • 151932 ELSA-2023-1592: tigervnc security update (Medium)
  • 151948 ELSA-2023-1593: httpd security update (Medium)
  • 151937 ELSA-2023-1594: tigervnc and xorg-x11-server security update (Medium)
  • 151951 ELSA-2023-1670: httpd and mod_http2 security update (Medium)
  • 151960 ELSA-2023-1673: httpd:2.4 security update (Medium)
  • 151949 ELSA-2023-1693: postgresql security update (Low)
  • 151938 ELSA-2023-1696: haproxy security update (Low)
  • 151930 ELSA-2023-1701: curl security update (Low)
  • 151942 ELSA-2023-1703: kernel security and bug fix update (Medium)
  • 151958 ELSA-2023-1743: nodejs:14 security, bug fix, and enhancement update (Medium)
  • 151599 FortiNet FortiNac Device Detected (Info)
  • 151600 FortiNet FortiNac Remote Code Execution Vulnerability (Critical)
  • 151794 Google Chrome: Multiple Vulnerabilities in Versions Less Than 111.0.5563.110 (High)
  • 151795 Google Chrome: Multiple Vulnerabilities in Versions Less Than 112.0.5615.49 (High)
  • 151796 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 110.0.1587.78 (High)
  • 151798 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 111.0.1661.54 (High)
  • 151797 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 112.0.1722.34 (High)
  • 151801 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 112 (High)
  • 151802 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.10 (High)
  • 151803 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.10 (High)
  • 151804 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.9.1 (High)
  • 150586 MS22-DEC: Microsoft .NET Security Update (High)
  • 151842 MS23-APR: Microsoft Office Security Update (High)
  • 151844 MS23-APR: Microsoft Sharepoint Server Security Update (Medium)
  • 151843 MS23-APR: Microsoft SQL Server Security Update (High)
  • 151841 MS23-APR: Microsoft Windows Security Update (High)
  • 151566 MS23-FEB: Microsoft .NET Security Update (High)
  • 151925 Palo Alto PAN-OS Security Advisory: PAN-171625 (Medium)
  • 151926 Palo Alto PAN-OS Security Advisory: PAN-198986 (Medium)
  • 151823 RHSA-2023:1366: nss security update (Medium)
  • 151811 RHSA-2023:1368: nss security and bug fix update (Medium)
  • 151824 RHSA-2023:1401: thunderbird security update (Medium)
  • 151805 RHSA-2023:1403: thunderbird security update (Medium)
  • 151806 RHSA-2023:1405: openssl security update (Medium)
  • 151815 RHSA-2023:1407: thunderbird security update (Medium)
  • 151812 RHSA-2023:1438: openssl security update (Medium)
  • 151819 RHSA-2023:1469: kernel-rt security and bug fix update (Medium)
  • 151810 RHSA-2023:1470: kernel security, bug fix, and enhancement update (Medium)
  • 151818 RHSA-2023:1471: kpatch-patch security update (Medium)
  • 151814 RHSA-2023:1566: kernel security, bug fix, and enhancement update (Medium)
  • 151820 RHSA-2023:1569: gnutls security and bug fix update (Low)
  • 151817 RHSA-2023:1572: pesign security update (Medium)
  • 151822 RHSA-2023:1576: postgresql:13 security update (Low)
  • 151813 RHSA-2023:1584: kernel-rt security and bug fix update (Medium)
  • 151821 RHSA-2023:1591: pcs security update (Medium)
  • 151809 RHSA-2023:1592: tigervnc security update (Medium)
  • 151807 RHSA-2023:1593: httpd security update (Medium)
  • 151816 RHSA-2023:1594: tigervnc and xorg-x11-server security update (Medium)
  • 151808 RHSA-2023:1659: kpatch-patch security update (Medium)
  • 151791 VMware Security Advisory: VMSA-2022-0020 (Medium)
  • 151792 VMware Security Advisory: VMSA-2022-0025 (High)
  • 151790 VMware Security Advisory: VMSA-2022-0030 (High)
  • 151789 VMware Security Advisory: VMSA-2022-0033 (Medium)
  • 151832 [USN-5855-3] ImageMagick regression (Medium)
  • 151828 [USN-5954-2] Firefox regressions (Medium)
  • 151826 [USN-5966-2] amanda regression (Medium)
  • 151825 [USN-5967-1] object-path vulnerabilities (Medium)
  • 151827 [USN-5969-1] gif2apng vulnerabilities (Medium)
  • 151829 [USN-5972-1] Thunderbird vulnerabilities (Medium)
  • 151830 [USN-5988-1] Xcftools vulnerabilities (Medium)
  • 151831 [USN-5995-1] Vim vulnerabilities (Medium)
  • 151835 [USN-5996-1] Liblouis vulnerabilities (Medium)
  • 151833 [USN-5997-1] IPMItool vulnerability (Medium)
  • 151834 [USN-5998-1] Apache Log4j vulnerabilities (Medium
  • 151836 [USN-6002-1] Irssi vulnerability (Medium)
  • 151838 [USN-6008-1] Exo vulnerability (Medium)
  • 151837 [USN-6010-1] Firefox vulnerabilities (Medium)
  • 151840 [USN-6012-1] Smarty vulnerability (Medium)
  • 151839 [USN-6015-1] Thunderbird vulnerabilities (Medium)
Fixes

Updated Vulnerability Descriptions:

  • 1151604 APSB23-23: Security Updates Available for Adobe Photoshop CC (High)
  • 151603 APSB23-25: Security Updates Available for Adobe ColdFusion (High)
  • 151782 Foxit PDF Editor: Multiple Vulnerabilities in Version 12.1.0.15250 and Earlier (Low)
  • 151781 Foxit PDF Reader: Multiple Vulnerabilities in Version 12.1.0.15250 and Earlier (Low)
  • 151780 Foxit PhantomPDF: Multiple Vulnerabilities in Version 10.1.10.37854 and Earlier (Low)
  • 151596 Google Chrome: Multiple Vulnerabilities in Versions Less Than 110.0.5481.177 (High)
  • 151601 Google Chrome: Multiple Vulnerabilities in Versions Less Than 111.0.5563.64 (High)
  • 151597 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 110.0.1587.57 (High)
  • 151602 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 110.0.1587.69 (High)
  • 151605 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 111 (High)
  • 151606 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.9 (High)
  • 151598 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.8 (High)
  • 151607 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.9 (High)
  • 151787 MS23-MAR: Microsoft Office Security Update (High)
  • 151788 MS23-MAR: Microsoft Sharepoint Server Security Update (Medium)
  • 151786 MS23-MAR: Microsoft Windows Security Update (High)
  • 101203 TCP Sequence Number Window RST Denial Of Service (Low)
  • 151433 Visual Studio Code Remote Execution Vulnerability (High)

Back to Top

 

Digital Guardian


nDLP Appliance

Version: 11.8.1

April, 2023

New Features
  • The feature to display CC addresses and SMTP message is now available in both the incident list view and the incident detailed view.

  • New filtering options for SMTP message ID and CC address have been added to the DIM Incident List view.

  • Email CC addresses are now reported to DGMC/ARC.

  • A new configuration parameter called "dgsync_job.event.reporting.use_unique_count" has been included in the "scheduler.conf" file located at "/var/lib/tomcat/webapps/ROOT/WEB-INF/classes/". The default value of this parameter is set to false. The appliance utilizes this configuration to decide whether to send the total match count or the unique match count when sending events to DGMC/ARC. An additional option has been added to prevent the sending of duplicate email events in DGMC/ARC. Please note that this feature only works when the policy has copy retention enabled. Parameter name for added new configuration is dgsync_job.event.reporting.collate_email_events.The default value of this parameter is set to false.

Back to Top

 

Document Management (RJS)


Webdocs Forms Management

Version: 11.0.08

April 10, 2023

Enhancements
  • Turned Dashboard feature on by default.
Fixes
  • v10.1--> v11.0.7 Upgrade: After the upgrade, the admin gets application errors when trying to log in to or edit any LDAP tenant.

  • Styles: Custom style changes are not reflected on forms after updating and saving.

  • v10 → v11 Upgrade (SQL Server): After the upgrade, the index (Refresh Searchable Items) process shows the status "Unknown."

  • A selection control with a Comment that has a default value set causes a Form Save Failed error when saving.

  • Control validation does not update when changing control type (e.g. after changing a number control to a text, the control still only accepts numbers).

  • Previously rejected task fails to route to the next step and remains in a read-only state.

  • CSS Class f-page-break adds a blank page in between each break.

  • Scaling a repeat control through Business Rules causes task to close unexpectedly.

SignHere

Version: 1.6.1

April 20, 2023

Fixes
  • Updated installer to point to new downloads site for prerequisites.

Back to Top

 

Globalscape


v8.1.0.14

April 5, 2023

Fixes
EFT Cloud Connector
  • Fixed an issue where AWS cloud transfers were slower.

  • Fixed an issue where under certain conditions AWS uploads could cause EFT to crash.

  • Fixed an issue where under certain conditions Azure uploads could cause EFT to crash.

EFT Event Rules
  • Fixed an issue where after upgrade File Rename actions in certain conditions would not rename files.

  • Fixed an issue where certain optional custom parameters were not passed to AWE from an Event Rule.

  • Fixed an issue where Folder Monitor Event Rules would not move files with filenames that started with a period.

  • Fixed an issue where under certain conditions the Overwrite option would not always overwrite an existing file.

  • Fixed an issue where Event Rules with AWE actions were incorrectly using virtual paths in context variables.

  • Fixed an issue where %FS.PATH% context variable was not being updated after a move offload action.

  • Fixed an issue where Overwrite in a download action was not working as expected on a destination virtual path.

EFT Help Updates
  • Updated several help topics and broken links.

EFT Logging
  • Cleaned up user details on the Workspace log.

EFT Web Transfer Client (WTC)
  • Fixed an issue where EFT was not returning the proper error code on invalid username and email in the Forgot Password WTC.

  • Fixed an issue where Uploads per Session configuration was not being properly enforced.

EFT Security Updates
  • Updated OpenSSL library used in OpenSAML to version 1.1.1t, other features are still using 1.1.1o.

Back to Top

 

GoAnywhere


GoAnywhere Agents

Version 2.1.0

April 28, 2023

Updates
  • Updated Attributions file.

  • Updated the PostgresSQL JDBC library from 42.4.2 to version 42.4.3.

  • Updated the License agreement.

  • Updated Netty from version 4.1.82.Final to 4.1.89.Final.

Fixes
  • Fixed the default rotation strategy of the Agent log files name for log4j.

Version 2.0.0

April 28, 2023

Updates
  • Updated the following BouncyCastle FIPS APIs:

    • FIPS from 1.0.2 to 1.0.2.3

    • Mail from 1.0.3 to 1.0.4

    • PGP from 1.0.5 to 1.0.7.1

    • PKIX from 1.0.4 to 1.0.7

    • TLS from 1.0.10.3 to 1.0.14

Fixes
  • Fixed an issue where GoFast transfers failed when transferring files across machines.

GoAnywhere MFT

Version 7.2.0

April 27, 2023

New Features
  • Added the ability to rotate an Agent's authentication key.

  • Added the ability to define a global file buffer size.

  • Added the ability to override the global file buffer size in Network Shares.

Enhancements
  • Enhanced the Admin Client to work with the Gateway HTTP/SOCKS proxy.

  • Enhanced the performance of Resource List pages.

  • Enhanced the importation of certificates within the Key Management System to ensure users are notified when an error occurs.

  • Increased the number of characters allowed for a project name from 50 to 200.

  • Renamed and versioned the lib/ga_classes.jar to gamft-[MFT version].jar.

  • Replaced the itext-2.1.7.jar with openpdf-1.3.30.jar.

Updates
  • Updated Completed Jobs information to always include the system name in all configurations.

  • Updated the Software Library and Online Catalog to add support for minimum version requirements.

  • Updated the mina-core.jar to version 2.1.5.

  • Updated Netty from version 4.1.82.Final to 4.1.89.Final.

  • Updated Tomcat from 9.0.68 to 9.0.73.

  • Updated the PostgreSQL JDBC driver library from 42.4.2 to version 42.4.3.

  • Updated the AWS SDK from 1.12.272 to 1.12.405.

  • Updated the commons-fileupload from 1.4 to 1.5.

  • Updated error handling for the IBMi IMPPROJECT command.

Fixes
  • Fixed an issue that prevented users from adding a Domain when SysLog is enabled.

  • Fixed an issue where Secure Folders within the Desktop Client would not show Group Virtual Folders until users clicked the refresh button.

  • Fixed an issue where importing CA responses failed when looking up an existing CA.

  • Fixed the typo for 'Completed Job Statistics' in the Component Library list under the Reports section.

  • Fixed an issue with the 'AES256' option value when creating a file-based SSH certificate.

  • Fixed issue with Agent Alerts when many agents disconnect at the same time past their configured threshold.

  • Fixed an issue in the GoAnywhere upgrader where upgrade resources moved locations and therefore could not be read if upgrading before 6.1.0.

  • Fixed an issue with the IBMi command DSPPRDINF not displaying the product version number.

  • Fixed an incorrect French translation on the change password page.

GoAnywhere Desktop Client for Windows

Version 3.2.0

April 26, 2023

  • Enhanced the performance of virtual file system with a stronger cryptography algorithm.

  • Integrated the Dokan interface to work with virtual hard drive.

  • Migrated legacy GoDrive data to the new Dokan supported file system.

  • Updated the Fortra License agreement.

  • Removed the Log4Net library.

  • Updated Newtonsoft from version 12.0.2 to 13.0.1.

  • Updated the system.net.security library from 4.3.0 to version 4.6.2.

  • Improved cache file creation during upload.

Back to Top

 

IBM Partnership


Rational Developer for IBM i (RDi)

Version: 9.8.0.0

April 23, 2023

New Features
  • Added a template for new ILE RPG free-form members and set as the DEFAULT. To edit the DEFAULT template or to add new templates in the product Preferences open the section, access: Remote Systems > Remote Systems LPEX Editor > ILE RPG > Templates.

  • Support for P2 installs:

    • Video of Windows install

    • Video of macOS install

    • Video of application of Authorized User License

  • New connections to default secure mode added.

  • RPG Fall 2022 Currency. For details, see: https://www.ibm.com/support/pages/rpg-cafe.

  • RPG Spring 2023 Currency. For details, see: https://www.ibm.com/support/pages/rpg-cafe.

Enhancements
  • Eclipse base updated to version 4.23.

  • Updated to Access Client Solutions version 1.1.9.2.

  • Shows fully qualified member name in member comparison. (RFE 152247)

  • Added reset action for editor zoom in/out. To access right-click in a source member and select Zoom to see options.

  • Allow copy member name and text from the Object Table view using control keys added.

  • CTRL+A in Object Table cell editor should select text not all table records

  • Remote Edit History View lists recently changed members and files in QSYS and IFS. To access the view, click Window > Show View > Other and enter Remote Edit History in the filter field. Select the view and click Open.

  • Improved Error List setting default to 'Show messages as annotations' and 'Automatically insert into open members and files'.

  • Option to position the Outline view to an ILE RPG field definition. To use, select a field in your source and press CTRL + F3 or right-click and select Source > Show in Outline.

Fixes
  • RDI 9.6.0.9 Copy or move of files or folders in the ifs does not preserve authorization list settings on the target (SE75044)

  • RDI 9.6.0.12 CL Prompt for CRTOUTQ command fails with parameter mismatch error (SE79302)

  • RDI 9.6.0.12 LPEX Cursor may be incorrectly positioned (SE79474)

  • Create Procedure with empty *DATE type fails to generate the procedure has been fixed.

  • DS printer default template is same as display type and is unusable issue fixed.

  • Fixed issue where the New Source Member wizard incorrectly populates Member field with name of existing member.

  • User unable to create custom zoom in/out editor key bindings defect has been fixed.

  • Problem when SSL/TLS certificates removed in preferences are not cleared from the JRE jssecacerts file has been fixed.

Back to Top

 

Intermapper


Version 6.6.1

April 27, 2023

Enhancements
  • Added password policy in Server Settings to enforce password minimum and maximum lengths. Refer to the User Guide for more information.

  • Updated libraries to address vulnerabilities on Windows, Linux, and Mac systems

  • You can authenticate LDAP on port 389 with or without SSL and on port 636 which is an encrypted connection by default. See the Intermapper User Guide for more information.

Fixes
  • Resolved Chart Data Upper and Lower bounds showing incorrect numbers

  • Upgraded OpenJDK to address Java Vulnerabilities: Windows, Linux, and MacOS

  • Resolved notification emails truncating links

  • Resolved Email notifier crashes when list of emails is too long

  • Buffer overrun Assertion in NT\_Services Probe Code \(IM Server\)

  • Resolved SNMP users no longer able to accept dashes \('-'\) for the username

  • Resolved issues with Host Resources Probe

  • Resolved Email notification with Office 365

Back to Top

 

Powertech


BoKS Manager

Version 8.1 (version update)

April 20, 2023

New Features
  • The adgroup prefixes are configurable. New configuration settings ad/adgroup/hostgroup_prefix and ad/adgroup/userclass_prefix to set the prefixes used by adgroup when creating groups in AD.

Enhancements
  • Curl library upgrade to 8.0.1.

  • CVE list: CVE-2023-27538, CVE-2023-27536, CVE-2023-27535, CVE-2023-27534, CVE-2023-27533, CVE-2023-23916, CVE-2023-23915, CVE-2023-23914

Fixes
  • Fixed the adsync was not removing BoKS users from userclasses to mirror changes made in AD.
  • Fixed support for symlinks as programs in SUDO rules. Sudo now supports symlinks and real binaries as programs.

BoKS Reporting Services

Version 8.1.0.5

April 17, 2023

Enhancements
  • The brs rpm package no longer has a dependency to java-11-openjdk.

  • The following dependencies were upgraded for security:

    Upgraded H2 database to 2.1.214.

    Upgraded Spring Framework to 5.3.27.

    Upgraded Spring Boot to 2.7.10.

Fixes
  • Fixed import fails with java.util.ConcurrentModificationException in H2 database.

Version 8.0.0.10

April 17, 2023

Enhancements
  • The following dependencies were upgraded for security:

    Upgraded H2 database to 2.1.214.

    Upgraded Spring Framework to 5.3.27.

    Upgraded Spring Boot to 2.7.10.

Fixes
  • A fix was implemented to correct import fails with java.util.ConcurrentModificationException in H2 database.

Back to Top

 

Titus


Policy Manager

Version 2023.04

April 21, 2023

New Features
  • Added multiple selection Schema Field support for Titus Office Add-in.

  • Added Field tabs support for Titus Classification Suite (TCS) for Windows. Field tabs lets you organize your Schema Fields into separate tabs on the Classification Selector.

  • Added Data Detection Engine on-premises Custom Condition for TCS Windows in Policy Manager. This new Custom Condition functions the same as the Dynamic Property (Titus.DataDetectionOnPrem.Extensibility.DDConnectorOnPrem) in the Administration Console. An on-premises Data Detection Engine Server is required.

  • Added new “Filter values” setting for TCS Windows for single selection and multiple selection Schema Fields.

  • Added “Undo Record Menu Text” App Setting under “Office Add-in Settings” for Word Windows.

Enhancements
  • Updated Policy Manager and Documentation pages to meet Fortra branding standards.

  • Updated default Events and Properties selections for TCS Audit Settings.

  • Added tooltips for Custom Conditions and Actions.

  • Added HTML Editor support for the “Content” parameter of the “Apply document markings” action for TCS Windows.

  • Clarified that the “Enable justification” parameter is only supported for the Outlook Windows “On send” policy event for the “Alert” and “Alert-attachment classification” actions.

  • Clarified that the “Force remediate attachments” parameter is only supported for the Outlook Windows “On send” policy event for the “Alert-attachment classification” action.

  • Clarified that the “Get text from file” Custom Condition is also supported for the Windows Desktop “On examine file” policy event.

Fixes
  • Custom Property is not published when it is set in the ELSE branch of a rule without actions.

  • Fixed dropdown list UI issue on the Target Configurations page.

  • Message.Attachment property was missing in published TCPG files for TCS Windows.

Titus Console

Version 2023.04

April 21, 2023

Enhancements
  • Fortra rebranding for Titus Console pages.

Titus Data Detection Engine

Version 2023.04

April 21, 2023

New Features
  • Added Data Detection Engine on-premises Custom Condition for TCS Windows in Policy Manager. This new Custom Condition functions the same as the Dynamic Property (Titus.DataDetectionOnPrem.Extensibility.DDConnectorOnPrem) in the Administration Console. An on-premises Data Detection Engine Server is required.

Titus Office Add-in

Version 2023.04

April 21, 2023

New Features
  • Added multiple selection Schema Field support for Titus Office Add-in.

Enhancements
  • Fortra rebranding for icons and the Classification Selector.

Titus Classification Suite for Windows

Version 2022.0 HF3

April 21, 2023

Fixes
  • Microsoft Outlook fails to launch when not connected to an Exchange server.

  • Updated digital certificates. See the Titus Classification Suite for Windows Deployment Guide.

Version 2022.0 HF2

April 12, 2023

Enhancements
  • TitusCertGenerator.exe has been deprecated. You can no longer generate a signing key pair to sign Configurations published by the Titus Administration Console. For more information, contact Support.

Fixes
  • Titus Message Classification - Improved performance when reading items in Microsoft Outlook when operating in online mode.

Titus Classification for OWA

Version 2022.2 HF1

April 6, 2023

Fixes
  • Resolved issue of Titus Classification for OWA not being able to communicate with Titus Services in Microsoft 365 environments.

Titus Services

Version 2022.0 HF1

April 6, 2023

Fixes
  • Updated installer to fix the issue with multi-server installer script.

Back to Top

 

Vera


Version 3.21.6

April 2023

Updates
  • (Windows Client) Customers running 3.21.3 and 3.21.4 versions can successfully upgrade to 3.21.5 via regular or silent upgrade methods. Version 3.21.5 is signed with Vera Security, Inc. certificate.

  • (Windows Client) Customers running 3.21.5 and 3.21.2 or lower versions can successfully upgrade to 3.21.6 via regular or silent upgrade methods. Version 3.21.6 is signed with Vera’s certificate.

Version 3.21.5

April 2023

Fixes
  • (Windows Client) Fixed an issue where the silent update to 3.21.4 for Windows clients was failing because the VeraSetup.msi certificate expired, and it has been signed by a new certificate.

Back to Top