Monthly Release Notes - April 2022

Jump to:

 

Beyond Security


beSTORM

Version 12.4.19

April 19, 2022

Enhancements
  • Migrated support from Python2 to Python3.

  • Updated progress to the user's UI to show what it is doing.

Fixes
  • Fixed a PCAP issue related to VLAN.

  • Fixed an issue where an endless loop occurred when a module is too complex to calculate (for example, EDSA v2).

Back to Top

 

Boldon James


Email and Office Classifier 3.16.5

April 2022

Fixes
  • Opening and closing the 'File' tab causes corruption to the Classifier Ribbon UI

  • Ensure “Send Response Now” meeting requests trigger Policy Checks if the parent appointment is not labeled

Classifier Administration Server 3.19.1
Version 3.19.1

April 29, 2022

New Features
  • Support “Message Body Length” condition type for the Classifier Mail Add-in for OWA.

Mail and Office Add-in Manifest 3.13.1
Version 3.13.1

April 29, 2022

New Features
  • Support “Message Body Length” condition type for the Classifier Mail Add-in for OWA.
Mail and Office Add-in Website 3.13.1
Version 3.13.1

April 29, 2022

New Features
  • Support “Message Body Length” condition type for the Classifier Mail Add-in for OWA.

Back to Top

 

Cobalt Strike


Version: 4.6

April 20, 2022

New Features
  • Combined all kits in the Cobalt Strike arsenal into a single kit. Available via the Cobalt Strike -> Help -> Arsenal menu option.
Enhancements
  • Improved product security:

    • The Cobalt Strike teamserver now runs from a Executable image (TeamServerImage), rather than a standard Java application.

    • The Cobalt Strike client now runs from a new jar file ('cobaltstrike-client.jar' rather than 'cobaltstrike.jar').

    • The 'TeamServerImage' and 'cobaltstrike-client.jar' files are extracted from the 'cobaltstrike.jar' as needed.

  • Increased 1MB size limit for execute-assembly (also used by dllinject and other tasks). The maximum size can now be controlled via three new Malleable C2 profile settings.

Fixes
  • Added a warning message if the host parameter to the teamserver is not a known network interface on the server when connecting.

  • Fixed an issue that caused service binaries to use rundll32 rather than the spawnto value. Note that the fix for this is located in the new arsenal kit rather than the core product.

  • Fixed an issue that caused Cobalt Strike's http listener to be vulnerable when URLs start with "/" as outlined in CVE-2022-23317.

  • Fixed an issue that caused metadata of a .NET assembly load to be generated when running the powerpick command.

  • Fixed an issue that was preventing an x86 foreign listener from being spawned.

  • Fixed an issue that was preventing Beacon from cleaning up the loader when the cleanup flag is used on Windows 7 SP1.

  • Fixed an issue that erroneously required an address for the string length to be passed when calling BeaconFormatToString in a BOF.

  • Fixed an issue that was causing "Net View" in the GUI to return an error while the command line "net view" worked fine.

  • Fixed an issue where a Beacon would not properly clean up memory for the loader in some cases.

Back to Top

 

Digital Defense


Frontline Vulnerability Manager

Version 6.4.3.4

April 22, 2022

Fixes
  • Fix incorrect vulnerability count when using asset labels.

Frontline Agent Scanner

Version 1.38.1

April 19, 2022

Enhancements
  • Implemented the following new vulnerability checks:

    • 148272 Apple iTunes: Multiple Vulnerabilities in Versions Less Than 12.12.3 (High) - Windows

    • 148376 APSB22-14: Security Updates Available for Adobe Photoshop CC (High) - Windows

    • 148374 APSB22-16: Security Updates Available for Adobe Acrobat and Reader (High) - Windows, Mac

    • 148375 APSB22-20: Security Updates Available for Adobe Photoshop CC (High) - Windows

    • 148263 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.60 (High) - Windows, Mac

    • 148262 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.75 (High) - Windows, Mac

    • 148264 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.88 (High) - Windows, Mac

    • 148268 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 100.0.1185.29 (High) - Windows

    • 148266 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 100.0.1185.36 (High) - Windows

    • 148265 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 99.0.1150.46 (High) - Windows

    • 148267 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 99.0.1150.55 (High) - Windows

    • 148269 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 99 (High) - Windows, Mac

    • 148270 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 97.8 (High) - Windows, Mac

    • 148271 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 91.8 (High) - Windows

    • 148321 MS22-APR: Microsoft .NET Security Update (Medium) - Windows

    • 148320 MS22-APR: Microsoft Office Security Update (High) - Windows, Mac

    • 148322 MS22-APR: Microsoft Sharepoint Server Security Update (Medium) - Windows

    • 148319 MS22-APR: Microsoft Windows Security Update (High) - Windows

NIRV Scanner

Version 3.0.96.0

April 15, 2022

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 148280 Amazon Linux 2 Security Advisory: ALAS-2022-1767 (High)

  • 148282 Amazon Linux 2 Security Advisory: ALAS-2022-1768 (Low)

  • 148279 Amazon Linux 2 Security Advisory: ALAS-2022-1769 (Medium)

  • 148277 Amazon Linux 2 Security Advisory: ALAS-2022-1770 (Medium)

  • 148281 Amazon Linux 2 Security Advisory: ALAS-2022-1771 (Medium)

  • 148278 Amazon Linux 2 Security Advisory: ALAS-2022-1772 (Medium)

  • 148273 Amazon Linux Security Advisory: ALAS-2022-1576 (High)

  • 148274 Amazon Linux Security Advisory: ALAS-2022-1577 (Low)

  • 148275 Amazon Linux Security Advisory: ALAS-2022-1578 (Medium)

  • 148276 Amazon Linux Security Advisory: ALAS-2022-1579 (Medium)

  • 148272 Apple iTunes: Multiple Vulnerabilities in Versions Less Than 12.12.3 (High)

  • 148376 APSB22-14: Security Updates Available for Adobe Photoshop CC (High)

  • 148374 APSB22-16: Security Updates Available for Adobe Acrobat and Reader (High)

  • 148375 APSB22-20: Security Updates Available for Adobe Photoshop CC (High)

  • 148043 Content Security Policy Missing (Trivial)

  • 148360 Debian Security Advisory: DLA-2936-1 (High)

  • 148336 Debian Security Advisory: DLA-2940-1 (High)

  • 148323 Debian Security Advisory: DLA-2941-1 (High)

  • 148372 Debian Security Advisory: DLA-2943-1 (Medium)

  • 148345 Debian Security Advisory: DLA-2944-1 (High)

  • 148329 Debian Security Advisory: DLA-2945-1 (Medium)

  • 148327 Debian Security Advisory: DLA-2946-1 (Medium)

  • 148353 Debian Security Advisory: DLA-2947-1 (High)

  • 148359 Debian Security Advisory: DLA-2949-1 (Medium)

  • 148340 Debian Security Advisory: DLA-2950-1 (Medium)

  • 148326 Debian Security Advisory: DLA-2951-1 (Low)

  • 148339 Debian Security Advisory: DLA-2952-1 (Medium)

  • 148367 Debian Security Advisory: DLA-2953-1 (Medium)

  • 148348 Debian Security Advisory: DLA-2954-1 (Medium)

  • 148331 Debian Security Advisory: DLA-2955-1 (Medium)

  • 148349 Debian Security Advisory: DLA-2957-1 (Medium)

  • 148366 Debian Security Advisory: DLA-2958-1 (Medium)

  • 148358 Debian Security Advisory: DLA-2959-1 (Medium)

  • 148333 Debian Security Advisory: DLA-2960-1 (High)

  • 148332 Debian Security Advisory: DLA-2962-1 (High)

  • 148338 Debian Security Advisory: DLA-2965-1 (Medium)

  • 148346 Debian Security Advisory: DLA-2966-1 (High)

  • 148365 Debian Security Advisory: DLA-2967-1 (High)

  • 148350 Debian Security Advisory: DLA-2968-1 (Medium)

  • 148354 Debian Security Advisory: DLA-2969-1 (High)

  • 148373 Debian Security Advisory: DLA-2970-1 (High)

  • 148356 Debian Security Advisory: DLA-2971-1 (Medium)

  • 148371 Debian Security Advisory: DLA-2972-1 (Medium)

  • 148335 Debian Security Advisory: DLA-2973-1 (Medium)

  • 148351 Debian Security Advisory: DLA-2975-1 (High)

  • 148337 Debian Security Advisory: DLA-2978-1 (Medium)

  • 148347 Debian Security Advisory: DLA-2979-1 (Medium)

  • 148368 Debian Security Advisory: DSA-5068-1 (Medium)

  • 148325 Debian Security Advisory: DSA-5079-1 (Medium)

  • 148364 Debian Security Advisory: DSA-5083-1 (Medium)

  • 148334 Debian Security Advisory: DSA-5084-1 (Medium)

  • 148370 Debian Security Advisory: DSA-5089-1 (Medium)

  • 148342 Debian Security Advisory: DSA-5095-1 (Medium)

  • 148341 Debian Security Advisory: DSA-5096-1 (High)

  • 148357 Debian Security Advisory: DSA-5098-1 (Medium)

  • 148352 Debian Security Advisory: DSA-5099-1 (Medium)

  • 148344 Debian Security Advisory: DSA-5100-1 (High)

  • 148328 Debian Security Advisory: DSA-5101-1 (Medium)

  • 148343 Debian Security Advisory: DSA-5102-1 (Medium)

  • 148363 Debian Security Advisory: DSA-5103-1 (Medium)

  • 148324 Debian Security Advisory: DSA-5105-1 (Medium)

  • 148355 Debian Security Advisory: DSA-5107-1 (High)

  • 148362 Debian Security Advisory: DSA-5108-1 (Medium)

  • 148369 Debian Security Advisory: DSA-5109-1 (Medium)

  • 148361 Debian Security Advisory: DSA-5111-1 (Medium)

  • 148330 Debian Security Advisory: DSA-5113-1 (Medium)

  • 148286 ELSA-2022-1045: httpd security update (High)

  • 148294 ELSA-2022-1049: httpd:2.4 security update (High)

  • 148297 ELSA-2022-1065: openssl security update (Medium)

  • 148310 ELSA-2022-1066: openssl security update (Medium)

  • 148285 ELSA-2022-1069: expat security update (High)

  • 148295 ELSA-2022-1198: kernel security, bug fix, and enhancement update (Medium)

  • 148299 ELSA-2022-1284: firefox security update (Medium)

  • 148290 ELSA-2022-1287: firefox security update (Medium)

  • 148291 ELSA-2022-1301: thunderbird security update (Medium)

  • 148298 ELSA-2022-1302: thunderbird security update (Medium)

  • 148287 ELSA-2022-9225: openssl security update (Medium)

  • 148301 ELSA-2022-9233: openssl security update (Medium)

  • 148305 ELSA-2022-9237: openssl security update (Medium)

  • 148312 ELSA-2022-9239: cyrus-sasl security update (Medium)

  • 148289 ELSA-2022-9240: libtpms security update (Medium)

  • 148317 ELSA-2022-9243: openssl security update (Medium)

  • 148311 ELSA-2022-9244: Unbreakable Enterprise kernel security update (High)

  • 148313 ELSA-2022-9245: Unbreakable Enterprise kernel-container security update (High)

  • 148288 ELSA-2022-9246: openssl security update (Medium)

  • 148308 ELSA-2022-9249: openssl security update (Medium)

  • 148314 ELSA-2022-9255: openssl security update (Medium)

  • 148318 ELSA-2022-9257: httpd security update (High)

  • 148296 ELSA-2022-9258: openssl security update (Medium)

  • 148292 ELSA-2022-9260: Unbreakable Enterprise kernel security update (Medium)

  • 148303 ELSA-2022-9263: libgcrypt security update (Medium)

  • 148315 ELSA-2022-9264: Unbreakable Enterprise kernel security update (Medium)

  • 148309 ELSA-2022-9265: Unbreakable Enterprise kernel-container security update (Medium)

  • 148300 ELSA-2022-9266: Unbreakable Enterprise kernel security update (Medium)

  • 148306 ELSA-2022-9267: Unbreakable Enterprise kernel-container security update (Medium)

  • 148293 ELSA-2022-9270: Unbreakable Enterprise kernel security update (Medium)

  • 148307 ELSA-2022-9271: Unbreakable Enterprise kernel-container security update (Medium)

  • 148304 ELSA-2022-9272: openssl security update (Medium)

  • 148302 ELSA-2022-9273: Unbreakable Enterprise kernel security update (High)

  • 148316 ELSA-2022-9274: Unbreakable Enterprise kernel-container security update (High)

  • 148263 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.60 (High)

  • 148262 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.75 (High)

  • 148264 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.88 (High)

  • 148149 HTTP Strict-Transport-Security Detected (Info)

  • 123536 jQuery Framework Detected (Info)

  • 148268 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 100.0.1185.29 (High)

  • 148266 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 100.0.1185.36 (High)

  • 148265 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 99.0.1150.46 (High)

  • 148267 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 99.0.1150.55 (High)

  • 148269 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 99 (High)

  • 148270 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 97.8 (High)

  • 148271 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 91.8 (High)

  • 148321 MS22-APR: Microsoft .NET Security Update (Medium)

  • 148320 MS22-APR: Microsoft Office Security Update (High)

  • 148322 MS22-APR: Microsoft Sharepoint Server Security Update (Medium)

  • 148319 MS22-APR: Microsoft Windows Security Update (High)

  • 148150 Non-Compliant HTTP Strict-Transport-Security Detected (Info)

  • 148283 Palo Alto PAN-OS Security Advisory: PAN-190175 (Medium)

  • 148221 RHSA-2022:0970: java-1.8.0-ibm security update (Low)

  • 148224 RHSA-2022:1045: httpd security update (Medium)

  • 148219 RHSA-2022:1049: httpd:2.4 security update (Medium)

  • 148227 RHSA-2022:1065: openssl security update (Medium)

  • 148223 RHSA-2022:1066: openssl security update (Medium)

  • 148229 RHSA-2022:1069: expat security update (Medium)

  • 148222 RHSA-2022:1073: openssl security update (Medium)

  • 148220 RHSA-2022:1173: httpd security update (Medium)

  • 148225 RHSA-2022:1185: kpatch-patch security update (Medium)

  • 148218 RHSA-2022:1198: kernel security, bug fix, and enhancement update (Medium)

  • 148228 RHSA-2022:1199: kernel-rt security and bug fix update (Medium)

  • 148230 RHSA-2022:1284: firefox security update (Medium)

  • 148226 RHSA-2022:1287: firefox security update (Medium)

  • 148379 RHSA-2022:1301: thunderbird security update (Medium)

  • 148378 RHSA-2022:1302: thunderbird security update (Medium)

  • 148377 RHSA-2022:1309: expat security update (Medium)

  • 148151 Spring Core Remote Code Execution (Spring4Shell) (High)

  • 148212 VMware Security Advisory: VMSA-2021-0014 (Medium)

  • 148213 VMware Security Advisory: VMSA-2021-0027 (Medium)

  • 148214 VMware Security Advisory: VMSA-2021-0028 (Low)

  • 148215 VMware Security Advisory: VMSA-2022-0001 (Medium)

  • 148216 VMware Security Advisory: VMSA-2022-0004 (Medium)

  • 148217 VMware Security Advisory: VMSA-2022-0009 (Medium)

  • 148243 [USN-5313-2] OpenJDK 11 regression (Medium)

  • 148239 [USN-5321-3] Firefox regressions (Medium)

  • 148231 [USN-5335-1] ImageMagick vulnerabilities (Medium)

  • 148232 [USN-5337-1] Linux kernel vulnerabilities (Medium)

  • 148233 [USN-5338-1] Linux kernel vulnerabilities (Medium)

  • 148234 [USN-5339-1] Linux kernel vulnerabilities (Medium)

  • 148240 [USN-5342-1] Python vulnerabilities (Medium)

  • 148235 [USN-5343-1] Linux kernel vulnerabilities (Medium)

  • 148236 [USN-5345-1] Thunderbird vulnerabilities (Medium)

  • 148237 [USN-5346-1] Linux kernel (OEM) vulnerability (Medium)

  • 148238 [USN-5347-1] OpenVPN vulnerability (Medium)

  • 148244 [USN-5350-1] Chromium vulnerability (Medium)

  • 148241 [USN-5351-1] Paramiko vulnerability (Medium)

  • 148242 [USN-5353-1] Linux kernel (OEM) vulnerability (Medium)

  • 148245 [USN-5355-1] zlib vulnerability (Medium)

  • 148246 [USN-5355-2] zlib vulnerability (Medium)

  • 148247 [USN-5357-1] Linux kernel vulnerability (Medium)

  • 148251 [USN-5357-2] Linux kernel vulnerability (Medium)

  • 148248 [USN-5358-1] Linux kernel vulnerabilities (Medium)

  • 148252 [USN-5358-2] Linux kernel vulnerabilities (Medium)

  • 148249 [USN-5359-1] rsync vulnerability (Medium)

  • 148250 [USN-5360-1] Tomcat vulnerabilities (Medium)

  • 148253 [USN-5361-1] Linux kernel vulnerabilities (Medium)

  • 148254 [USN-5362-1] Linux kernel (Intel IOTG) vulnerabilities (Medium)

  • 148255 [USN-5364-1] Waitress vulnerability (Medium)

  • 148256 [USN-5368-1] Linux kernel vulnerabilities (Medium)

  • 148257 [USN-5369-1] oslo.utils vulnerability (Medium)

  • 148258 [USN-5370-1] Firefox vulnerabilities (Medium)

  • 148380 [USN-5372-1] Subversion vulnerabilities (Medium)

  • 148259 [USN-5373-1] Django vulnerabilities (Medium)

  • 148260 [USN-5373-2] Django vulnerabilities (Medium)

  • 148261 [USN-5374-1] libarchive vulnerability (Medium)

  • 148381 [USN-5376-1] Git vulnerability (Medium)

  • 148382 [USN-5377-1] Linux kernel (BlueField) vulnerabilities (Medium)

  • 148383 [USN-5378-1] Gzip vulnerability (Medium)

  • 148384 [USN-5378-2] XZ Utils vulnerability (Medium)

  • 148385 [USN-5378-3] XZ Utils vulnerability (Medium)

  • 148386 [USN-5378-4] Gzip vulnerability (Medium)

Fixes
  • Updated Vulnerability Descriptions:
    • 147826 Amazon Linux 2 Security Advisory: ALAS-2022-1746 (Low)

    • 147824 Amazon Linux 2 Security Advisory: ALAS-2022-1747 (Medium)

    • 147827 Amazon Linux 2 Security Advisory: ALAS-2022-1748 (Medium)

    • 147822 Amazon Linux 2 Security Advisory: ALAS-2022-1750 (High)

    • 147823 Amazon Linux 2 Security Advisory: ALAS-2022-1751 (High)

    • 147821 Amazon Linux 2 Security Advisory: ALAS-2022-1752 (Medium)

    • 147825 Amazon Linux 2 Security Advisory: ALAS-2022-1753 (Medium)

    • 147818 Amazon Linux Security Advisory: ALAS-2021-1555 (Low)

    • 147819 Amazon Linux Security Advisory: ALAS-2021-1556 (Medium)

    • 147815 Amazon Linux Security Advisory: ALAS-2022-1564 (Medium)

    • 147817 Amazon Linux Security Advisory: ALAS-2022-1565 (Medium)

    • 147816 Amazon Linux Security Advisory: ALAS-2022-1566 (High)

    • 147820 Amazon Linux Security Advisory: ALAS-2022-1567 (High)

    • 147774 Debian Security Advisory: DSA-5054-1 (Medium)

    • 147885 ELSA-2022-0003: xorg-x11-server security update (Medium)

    • 147886 ELSA-2022-0059: webkitgtk4 security update (Medium)

    • 147898 ELSA-2022-0064: openssl security update (Medium)

    • 147860 ELSA-2022-0124: firefox security update (Medium)

    • 147858 ELSA-2022-0127: thunderbird security update (Medium)

    • 147895 ELSA-2022-0129: thunderbird security update (Medium)

    • 147868 ELSA-2022-0130: firefox security update (Medium)

    • 147867 ELSA-2022-0143: httpd security update (High)

    • 147891 ELSA-2022-0162: gegl security update (Medium)

    • 147896 ELSA-2022-0177: gegl04 security update (Medium)

    • 147890 ELSA-2022-0204: java-11-openjdk security update (Medium)

    • 147871 ELSA-2022-0258: httpd:2.4 security update (High)

    • 147899 ELSA-2022-0267: polkit security update (High)

    • 147863 ELSA-2022-0274: polkit security update (High)

    • 147861 ELSA-2022-0290: parfait:0.5 security update (High)

    • 147894 ELSA-2022-0306: java-1.8.0-openjdk security update (Medium)

    • 147889 ELSA-2022-0307: java-1.8.0-openjdk security and bug fix update (Medium)

    • 147887 ELSA-2022-0323: nginx:1.20 security update (Medium)

    • 147877 ELSA-2022-0328: samba security and bug fix update (High)

    • 147900 ELSA-2022-0332: samba security and bug fix update (High)

    • 147881 ELSA-2022-0350: nodejs:14 security, bug fix, and enhancement update (High)

    • 147902 ELSA-2022-0370: cryptsetup security update (Low)

    • 147873 ELSA-2022-0418: varnish:6 security update (Medium)

    • 147872 ELSA-2022-0441: aide security update (High)

    • 147880 ELSA-2022-0442: log4j security update (High)

    • 147901 ELSA-2022-0495: .NET 5.0 security and bugfix update (Medium)

    • 147855 ELSA-2022-0510: firefox security update (Medium)

    • 147862 ELSA-2022-0535: thunderbird security update (Medium)

    • 147893 ELSA-2022-0538: thunderbird security update (Medium)

    • 147897 ELSA-2022-0545: ruby:2.5 security update (High)

    • 147870 ELSA-2022-0609: python-pillow security update (High)

    • 147888 ELSA-2022-0621: openldap security update (Medium)

    • 147875 ELSA-2022-0628: 389-ds-base security and bug fix update (Low)

    • 147866 ELSA-2022-0643: python-pillow security update (High)

    • 147856 ELSA-2022-9005: httpd:2.4 security update (High)

    • 147883 ELSA-2022-9012: Unbreakable Enterprise kernel security update (Medium)

    • 147879 ELSA-2022-9013: Unbreakable Enterprise kernel-container security update (Medium)

    • 147869 ELSA-2022-9023: openssl security update (Medium)

    • 147865 ELSA-2022-9028: Unbreakable Enterprise kernel security update (High)

    • 147859 ELSA-2022-9029: Unbreakable Enterprise kernel-container security update (High)

    • 147874 ELSA-2022-9056: log4j security update (Medium)

    • 147884 ELSA-2022-9088: Unbreakable Enterprise kernel security update (High)

    • 147892 ELSA-2022-9123: qemu security update (Low)

    • 147882 ELSA-2022-9141: Unbreakable Enterprise kernel security update (Medium)

    • 147878 ELSA-2022-9142: Unbreakable Enterprise kernel-container security update (Medium)

    • 147864 ELSA-2022-9147: Unbreakable Enterprise kernel security update (High)

    • 147876 ELSA-2022-9148: Unbreakable Enterprise kernel-container security update (High)

    • 147857 ELSA-2022-9165: aide security update (High)

    • 117573 JspWebShell Detected (Critical)

    • 147778 RHSA-2022:0472: aide security update (Medium)

    • 147775 RHSA-2022:0473: aide security update (Medium)

    • 147782 RHSA-2022:0495: .NET 5.0 security and bugfix update (Medium)

    • 147785 RHSA-2022:0496: .NET 6.0 security and bugfix update (Medium)

    • 147781 RHSA-2022:0510: firefox security update (Medium)

    • 147789 RHSA-2022:0514: firefox security update (Medium)

    • 147780 RHSA-2022:0535: thunderbird security update (Medium)

    • 147776 RHSA-2022:0538: thunderbird security update (Medium)

    • 147791 RHSA-2022:0543: ruby:2.6 security update (Medium)

    • 147787 RHSA-2022:0545: ruby:2.5 security update (Medium)

    • 147786 RHSA-2022:0592: kpatch-patch security update (Medium)

    • 147788 RHSA-2022:0609: python-pillow security update (Medium)

    • 147779 RHSA-2022:0620: kernel security and bug fix update (Medium)

    • 147783 RHSA-2022:0621: openldap security update (Low)

    • 147777 RHSA-2022:0622: kernel-rt security and bug fix update (Medium)

    • 147784 RHSA-2022:0628: 389-ds-base security and bug fix update (Low)

    • 147790 RHSA-2022:0643: python-pillow security update (Medium)

    • 147792 [USN-5267-2] Linux kernel regression (Medium)

    • 147796 [USN-5267-3] Linux kernel (Raspberry Pi) vulnerabilities (Medium)

    • 147793 [USN-5279-1] util-linux vulnerabilities (Medium)

    • 147794 [USN-5280-1] Speex vulnerability (Medium)

    • 147795 [USN-5286-1] cryptsetup vulnerability (Medium)

    • 147802 [USN-5288-1] Expat vulnerabilities (Medium)

    • 147797 [USN-5291-1] libarchive vulnerabilities (Medium)

    • 147798 [USN-5292-1] snapd vulnerabilities (Medium)

    • 147801 [USN-5292-3] snapd vulnerabilities (Medium)

    • 147803 [USN-5293-1] c3p0 vulnerability (Medium)

    • 147799 [USN-5294-1] Linux kernel vulnerabilities (Medium)

    • 147806 [USN-5294-2] Linux kernel vulnerabilities (Medium)

    • 147800 [USN-5295-1] Linux kernel (HWE) vulnerabilities (Medium)

    • 147804 [USN-5295-2] Linux kernel vulnerabilities (Medium)

    • 147805 [USN-5297-1] Linux kernel (GKE) vulnerabilities (Medium)

    • 147807 [USN-5298-1] Linux kernel vulnerabilities (Medium)

    • 147808 [USN-5299-1] Linux kernel vulnerabilities (Medium)

    • 147809 [USN-5301-1] Cyrus SASL vulnerability (Medium)

    • 147810 [USN-5301-2] Cyrus SASL vulnerability (Medium)

    • 147811 [USN-5302-1] Linux kernel (OEM) vulnerabilities (Medium)

Frontline Agent Scanner

Version 1.37.3

April 8, 2022

Enhancements
  • Implemented several fixes and enhancements to the scanning engine and existing vulnerability checks.

Fixes
  • Updated Vulnerability Descriptions:
    • 148145 Apple Security Update: 2022-003 Catalina (High)
    • 148147 Apple Security Update: macOS Big Sur 11.6.5 (High)
    • 148148 Apple Security Update: macOS Monterey 12.3 (Medium)
    • 148146 Apple Security Update: Safari 15.4 (High)
    • 148144 Apple Security Update: Xcode 13.3 (High)
    • 148134 Google Chrome: Multiple Vulnerabilities in Versions Less Than Thunderbird 91.7 (High)
    • 148040 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 91.7 (High)
    • 148038 MS22-MAR: Microsoft Security Update (High)

Frontline Container Scanner

Version 1.8.0

April 6, 2022

Enhancements
  • Frontline Container Scanner contains the following new vulnerability checks: 
    • 148176 Alpine Linux: Multiple Vulnerabilities in 'apache2' in Versions Less Than 2.4.53-r0 (High)

    • 148168 Alpine Linux: Multiple Vulnerabilities in 'bind' in Versions Less Than 9.16.27-r0 (Medium)

    • 148201 Alpine Linux: Multiple Vulnerabilities in 'expat' in Versions Less Than 2.2.10-r4 (High)

    • 148190 Alpine Linux: Multiple Vulnerabilities in 'expat' in Versions Less Than 2.4.5-r0 (High)

    • 148152 Alpine Linux: Multiple Vulnerabilities in 'hostapd' in Versions Less Than 2.10-r0 (Medium)

    • 148193 Alpine Linux: Multiple Vulnerabilities in 'hostapd' in Versions Less Than 2.9-r4 (Medium)

    • 148164 Alpine Linux: Multiple Vulnerabilities in 'intel-ucode' in Versions Less Than 20190514a-r0 (Medium)

    • 148155 Alpine Linux: Multiple Vulnerabilities in 'intel-ucode' in Versions Less Than 20191112-r0 (Medium)

    • 148157 Alpine Linux: Multiple Vulnerabilities in 'intel-ucode' in Versions Less Than 20201110-r0 (Low)

    • 148160 Alpine Linux: Multiple Vulnerabilities in 'intel-ucode' in Versions Less Than 20201112-r0 (Low)

    • 148162 Alpine Linux: Multiple Vulnerabilities in 'intel-ucode' in Versions Less Than 20210608-r0 (Medium)

    • 148159 Alpine Linux: Multiple Vulnerabilities in 'intel-ucode' in Versions Less Than 20220207-r0 (Medium)

    • 148205 Alpine Linux: Multiple Vulnerabilities in 'mariadb' in Versions Less Than 10.4.24-r0 (Medium)

    • 148191 Alpine Linux: Multiple Vulnerabilities in 'mariadb' in Versions Less Than 10.5.15-r0 (Medium)

    • 148172 Alpine Linux: Multiple Vulnerabilities in 'mariadb' in Versions Less Than 10.6.7-r0 (Medium)

    • 148192 Alpine Linux: Multiple Vulnerabilities in 'nodejs' in Versions Less Than 14.19.0-r0 (Medium)

    • 148173 Alpine Linux: Multiple Vulnerabilities in 'nodejs' in Versions Less Than 16.13.2-r0 (Medium)

    • 148189 Alpine Linux: Multiple Vulnerabilities in 'openssl3' in Versions Less Than 3.0.2-r0 (Medium)

    • 148204 Alpine Linux: Multiple Vulnerabilities in 'postgresql' in Versions Less Than 12.9-r0 (Medium)

    • 148196 Alpine Linux: Multiple Vulnerabilities in 'postgresql' in Versions Less Than 13.5-r0 (Medium)

    • 148181 Alpine Linux: Multiple Vulnerabilities in 'postgresql13' in Versions Less Than 13.5-r0 (Medium)

    • 148174 Alpine Linux: Multiple Vulnerabilities in 'postgresql14' in Versions Less Than 14.1-r0 (Medium)

    • 148180 Alpine Linux: Multiple Vulnerabilities in 'py3-pillow' in Versions Less Than 8.4.0-r3 (High)

    • 148199 Alpine Linux: Multiple Vulnerabilities in 'samba' in Versions Less Than 4.14.12-r0 (High)

    • 148187 Alpine Linux: Multiple Vulnerabilities in 'samba' in Versions Less Than 4.15.2-r0 (High)

    • 148188 Alpine Linux: Multiple Vulnerabilities in 'vim' in Versions Less Than 8.2.4619-r0 (Medium)

    • 148170 Alpine Linux: Vulnerability in 'cyrus-sasl' in Versions Less Than 2.1.28-r0 (Medium)

    • 148177 Alpine Linux: Vulnerability in 'fail2ban' in Versions Less Than 0.11.2-r1 (Medium)

    • 148200 Alpine Linux: Vulnerability in 'ghostscript' in Versions Less Than 9.53.3-r1 (High)

    • 148178 Alpine Linux: Vulnerability in 'ghostscript' in Versions Less Than 9.54-r1 (High)

    • 148207 Alpine Linux: Vulnerability in 'git' in Versions Less Than 2.26.3-r1 (Medium)

    • 148202 Alpine Linux: Vulnerability in 'haproxy' in Versions Less Than 2.2.21-r0 (Medium)

    • 148154 Alpine Linux: Vulnerability in 'intel-ucode' in Versions Less Than 20190618-r0 (Medium)

    • 148156 Alpine Linux: Vulnerability in 'intel-ucode' in Versions Less Than 20190918-r0 (Low)

    • 148158 Alpine Linux: Vulnerability in 'intel-ucode' in Versions Less Than 20191113-r0 (Low)

    • 148163 Alpine Linux: Vulnerability in 'intel-ucode' in Versions Less Than 20200609-r0 (Low)

    • 148161 Alpine Linux: Vulnerability in 'intel-ucode' in Versions Less Than 20210216-r0 (Low)

    • 148197 Alpine Linux: Vulnerability in 'krb5' in Versions Less Than 1.18.5-r0 (Medium)

    • 148185 Alpine Linux: Vulnerability in 'krb5' in Versions Less Than 1.19.3-r0 (Medium)

    • 148194 Alpine Linux: Vulnerability in 'libretls' in Versions Less Than 3.3.3p1-r3 (Medium)

    • 148166 Alpine Linux: Vulnerability in 'libretls' in Versions Less Than 3.3.4-r3 (Medium)

    • 148183 Alpine Linux: Vulnerability in 'libxml2' in Versions Less Than 2.9.13-r0 (Medium)

    • 148169 Alpine Linux: Vulnerability in 'libxslt' in Versions Less Than 1.1.35-r0 (Medium)

    • 148165 Alpine Linux: Vulnerability in 'openssl' in Versions Less Than 1.1.1n-r0 (Medium)

    • 148206 Alpine Linux: Vulnerability in 'openvpn' in Versions Less Than 2.4.12-r0 (High)

    • 148153 Alpine Linux: Vulnerability in 'openvpn' in Versions Less Than 2.5.6-r0 (High)

    • 148203 Alpine Linux: Vulnerability in 'postgresql' in Versions Less Than 12.8-r0 (Medium)

    • 148195 Alpine Linux: Vulnerability in 'postgresql' in Versions Less Than 13.4-r0 (Medium)

    • 148182 Alpine Linux: Vulnerability in 'postgresql13' in Versions Less Than 13.4-r0 (Medium)

    • 148175 Alpine Linux: Vulnerability in 'postgresql14' in Versions Less Than 13.4-r0 (Medium)

    • 148179 Alpine Linux: Vulnerability in 'ruby-bundler' in Versions Less Than 2.2.33-r0 (High)

    • 148186 Alpine Linux: Vulnerability in 'samba' in Versions Less Than 4.15.5-r0 (Low)

    • 148167 Alpine Linux: Vulnerability in 'snort' in Versions Less Than 2.9.18-r0 (High)

    • 148171 Alpine Linux: Vulnerability in 'util-linux' in Versions Less Than 2.37.4-r0 (Low)

    • 148198 Alpine Linux: Vulnerability in 'varnish' in Versions Less Than 6.6.2-r0 (Medium)

    • 148184 Alpine Linux: Vulnerability in 'zlib' in Versions Less Than 1.2.12-r0 (Medium)

    • 147826 Amazon Linux 2 Security Advisory: ALAS-2022-1746 (Low)

    • 147824 Amazon Linux 2 Security Advisory: ALAS-2022-1747 (Medium)

    • 147827 Amazon Linux 2 Security Advisory: ALAS-2022-1748 (Medium)

    • 147822 Amazon Linux 2 Security Advisory: ALAS-2022-1750 (High)

    • 147823 Amazon Linux 2 Security Advisory: ALAS-2022-1751 (High)

    • 147821 Amazon Linux 2 Security Advisory: ALAS-2022-1752 (Medium)

    • 147825 Amazon Linux 2 Security Advisory: ALAS-2022-1753 (Medium)

    • 148067 Amazon Linux 2 Security Advisory: ALAS-2022-1754 (High)

    • 148062 Amazon Linux 2 Security Advisory: ALAS-2022-1755 (Medium)

    • 148065 Amazon Linux 2 Security Advisory: ALAS-2022-1757 (Medium)

    • 148059 Amazon Linux 2 Security Advisory: ALAS-2022-1758 (Medium)

    • 148060 Amazon Linux 2 Security Advisory: ALAS-2022-1759 (High)

    • 148061 Amazon Linux 2 Security Advisory: ALAS-2022-1761 (High)

    • 148066 Amazon Linux 2 Security Advisory: ALAS-2022-1762 (Medium)

    • 148064 Amazon Linux 2 Security Advisory: ALAS-2022-1763 (Low)

    • 148068 Amazon Linux 2 Security Advisory: ALAS-2022-1764 (High)

    • 148063 Amazon Linux 2 Security Advisory: ALAS-2022-1766 (Low)

    • 147818 Amazon Linux Security Advisory: ALAS-2021-1555 (Low)

    • 147819 Amazon Linux Security Advisory: ALAS-2021-1556 (Medium)

    • 147815 Amazon Linux Security Advisory: ALAS-2022-1564 (Medium)

    • 147817 Amazon Linux Security Advisory: ALAS-2022-1565 (Medium)

    • 147816 Amazon Linux Security Advisory: ALAS-2022-1566 (High)

    • 147820 Amazon Linux Security Advisory: ALAS-2022-1567 (High)

    • 148058 Amazon Linux Security Advisory: ALAS-2022-1568 (Medium)

    • 148052 Amazon Linux Security Advisory: ALAS-2022-1569 (High)

    • 148054 Amazon Linux Security Advisory: ALAS-2022-1570 (High)

    • 148057 Amazon Linux Security Advisory: ALAS-2022-1571 (High)

    • 148053 Amazon Linux Security Advisory: ALAS-2022-1572 (Medium)

    • 148051 Amazon Linux Security Advisory: ALAS-2022-1573 (High)

    • 148056 Amazon Linux Security Advisory: ALAS-2022-1574 (Medium)

    • 148055 Amazon Linux Security Advisory: ALAS-2022-1575 (Low)

    • 148046 Debian Security Advisory: DLA-2817-1 (Medium)

    • 147963 Debian Security Advisory: DLA-2903-1 (High)

    • 147965 Debian Security Advisory: DLA-2914-1 (Medium)

    • 147958 Debian Security Advisory: DLA-2915-1 (High)

    • 147971 Debian Security Advisory: DLA-2917-1 (Medium)

    • 147961 Debian Security Advisory: DLA-2918-1 (High)

    • 147977 Debian Security Advisory: DLA-2919-1 (High)

    • 147974 Debian Security Advisory: DLA-2920-1 (Medium)

    • 147973 Debian Security Advisory: DLA-2922-1 (Medium)

    • 147975 Debian Security Advisory: DLA-2923-1 (High)

    • 147954 Debian Security Advisory: DLA-2924-1 (Medium)

    • 147956 Debian Security Advisory: DLA-2926-1 (Medium)

    • 147960 Debian Security Advisory: DLA-2927-1 (High)

    • 147972 Debian Security Advisory: DLA-2928-1 (Medium)

    • 147950 Debian Security Advisory: DLA-2929-1 (Medium)

    • 147976 Debian Security Advisory: DLA-2931-1 (Medium)

    • 147957 Debian Security Advisory: DLA-2932-1 (Medium)

    • 147970 Debian Security Advisory: DLA-2934-1 (High)

    • 147955 Debian Security Advisory: DLA-2935-1 (High)

    • 147964 Debian Security Advisory: DLA-2937-1 (Medium)

    • 148050 Debian Security Advisory: DLA-2938-1 (Medium)

    • 147983 Debian Security Advisory: DSA-5003-1 (High)

    • 148047 Debian Security Advisory: DSA-5006-1 (Medium)

    • 148048 Debian Security Advisory: DSA-5007-1 (Medium)

    • 147982 Debian Security Advisory: DSA-5015-1 (High)

    • 148044 Debian Security Advisory: DSA-5025-1 (Medium)

    • 147774 Debian Security Advisory: DSA-5054-1 (Medium)

    • 147951 Debian Security Advisory: DSA-5071-1 (High)

    • 147969 Debian Security Advisory: DSA-5072-1 (High)

    • 147968 Debian Security Advisory: DSA-5073-1 (High)

    • 147967 Debian Security Advisory: DSA-5075-1 (High)

    • 147962 Debian Security Advisory: DSA-5076-1 (High)

    • 147953 Debian Security Advisory: DSA-5077-1 (High)

    • 147966 Debian Security Advisory: DSA-5078-1 (Medium)

    • 147978 Debian Security Advisory: DSA-5080-1 (Medium)

    • 148045 Debian Security Advisory: DSA-5081-1 (High)

    • 147979 Debian Security Advisory: DSA-5082-1 (Medium)

    • 147980 Debian Security Advisory: DSA-5085-1 (High)

    • 147952 Debian Security Advisory: DSA-5087-1 (Medium)

    • 147981 Debian Security Advisory: DSA-5088-1 (Medium)

    • 148049 Debian Security Advisory: DSA-5091-1 (Medium)

    • 147959 Debian Security Advisory: DSA-5092-1 (Medium)

    • 147906 ELSA-2022-0001: grafana security update (Medium)

    • 147885 ELSA-2022-0003: xorg-x11-server security update (Medium)

    • 147886 ELSA-2022-0059: webkitgtk4 security update (Medium)

    • 147911 ELSA-2022-0063: kernel security and bug fix update (Medium)

    • 147898 ELSA-2022-0064: openssl security update (Medium)

    • 147860 ELSA-2022-0124: firefox security update (Medium)

    • 147858 ELSA-2022-0127: thunderbird security update (Medium)

    • 147895 ELSA-2022-0129: thunderbird security update (Medium)

    • 147868 ELSA-2022-0130: firefox security update (Medium)

    • 147867 ELSA-2022-0143: httpd security update (High)

    • 147918 ELSA-2022-0161: java-17-openjdk security update (Medium)

    • 147891 ELSA-2022-0162: gegl security update (Medium)

    • 147896 ELSA-2022-0177: gegl04 security update (Medium)

    • 147914 ELSA-2022-0185: java-11-openjdk security update (Medium)

    • 147909 ELSA-2022-0188: kernel security and bug fix update (High)

    • 147904 ELSA-2022-0199: libreswan security update (Medium)

    • 147890 ELSA-2022-0204: java-11-openjdk security update (Medium)

    • 147871 ELSA-2022-0258: httpd:2.4 security update (High)

    • 147899 ELSA-2022-0267: polkit security update (High)

    • 147863 ELSA-2022-0274: polkit security update (High)

    • 147861 ELSA-2022-0290: parfait:0.5 security update (High)

    • 147894 ELSA-2022-0306: java-1.8.0-openjdk security update (Medium)

    • 147889 ELSA-2022-0307: java-1.8.0-openjdk security and bug fix update (Medium)

    • 147887 ELSA-2022-0323: nginx:1.20 security update (Medium)

    • 147877 ELSA-2022-0328: samba security and bug fix update (High)

    • 147900 ELSA-2022-0332: samba security and bug fix update (High)

    • 147881 ELSA-2022-0350: nodejs:14 security, bug fix, and enhancement update (High)

    • 147920 ELSA-2022-0366: vim security update (Medium)

    • 147912 ELSA-2022-0368: rpm security update (Low)

    • 147902 ELSA-2022-0370: cryptsetup security update (Low)

    • 147873 ELSA-2022-0418: varnish:6 security update (Medium)

    • 147872 ELSA-2022-0441: aide security update (High)

    • 147880 ELSA-2022-0442: log4j security update (High)

    • 147919 ELSA-2022-0473: aide security update (High)

    • 147901 ELSA-2022-0495: .NET 5.0 security and bugfix update (Medium)

    • 148131 ELSA-2022-0496: .NET 6.0 security and bugfix update (Medium)

    • 147855 ELSA-2022-0510: firefox security update (Medium)

    • 147915 ELSA-2022-0514: firefox security update (Medium)

    • 147862 ELSA-2022-0535: thunderbird security update (Medium)

    • 147893 ELSA-2022-0538: thunderbird security update (Medium)

    • 147903 ELSA-2022-0543: ruby:2.6 security update (High)

    • 147897 ELSA-2022-0545: ruby:2.5 security update (High)

    • 147870 ELSA-2022-0609: python-pillow security update (High)

    • 147907 ELSA-2022-0620: kernel security and bug fix update (High)

    • 147888 ELSA-2022-0621: openldap security update (Medium)

    • 147875 ELSA-2022-0628: 389-ds-base security and bug fix update (Low)

    • 147866 ELSA-2022-0643: python-pillow security update (High)

    • 147913 ELSA-2022-0658: cyrus-sasl security update (Medium)

    • 148030 ELSA-2022-0666: cyrus-sasl security update (Medium)

    • 148119 ELSA-2022-0672-1: ruby:2.5 security update (Medium)

    • 148029 ELSA-2022-0672: ruby:2.5 security update (Medium)

    • 148111 ELSA-2022-0818: firefox security update (High)

    • 148110 ELSA-2022-0824: firefox security and bug fix update (High)

    • 148108 ELSA-2022-0825: kernel security, bug fix, and enhancement update (High)

    • 148114 ELSA-2022-0826: .NET 6.0 security and bugfix update (Medium)

    • 148122 ELSA-2022-0827: .NET Core 3.1 security and bugfix update (Medium)

    • 148118 ELSA-2022-0830: .NET 5.0 security and bugfix update (Medium)

    • 148123 ELSA-2022-0845: thunderbird security update (High)

    • 148107 ELSA-2022-0850: thunderbird security update (High)

    • 148130 ELSA-2022-0886: virt:ol and virt-devel:rhel security update (Low)

    • 148109 ELSA-2022-0889: 389-ds:1.4 security and bug fix update (Medium)

    • 148129 ELSA-2022-0891: httpd:2.4 security update (High)

    • 148106 ELSA-2022-0892: libarchive security update (Low)

    • 148113 ELSA-2022-0894: vim security update (High)

    • 148112 ELSA-2022-0896: glibc security update (High)

    • 148128 ELSA-2022-0899: libxml2 security update (Medium)

    • 148105 ELSA-2022-0951: expat security update (High)

    • 147856 ELSA-2022-9005: httpd:2.4 security update (High)

    • 147917 ELSA-2022-9010: Unbreakable Enterprise kernel security update (Medium)

    • 147921 ELSA-2022-9011: Unbreakable Enterprise kernel-container security update (Medium)

    • 147883 ELSA-2022-9012: Unbreakable Enterprise kernel security update (Medium)

    • 147879 ELSA-2022-9013: Unbreakable Enterprise kernel-container security update (Medium)

    • 147916 ELSA-2022-9014: Unbreakable Enterprise kernel security update (High)

    • 147908 ELSA-2022-9017: openssl security update (Medium)

    • 147869 ELSA-2022-9023: openssl security update (Medium)

    • 147865 ELSA-2022-9028: Unbreakable Enterprise kernel security update (High)

    • 147859 ELSA-2022-9029: Unbreakable Enterprise kernel-container security update (High)

    • 147874 ELSA-2022-9056: log4j security update (Medium)

    • 147905 ELSA-2022-9073: polkit security update (High)

    • 147884 ELSA-2022-9088: Unbreakable Enterprise kernel security update (High)

    • 147910 ELSA-2022-9117: bind security update (Medium)

    • 147892 ELSA-2022-9123: qemu security update (Low)

    • 147882 ELSA-2022-9141: Unbreakable Enterprise kernel security update (Medium)

    • 147878 ELSA-2022-9142: Unbreakable Enterprise kernel-container security update (Medium)

    • 147864 ELSA-2022-9147: Unbreakable Enterprise kernel security update (High)

    • 147876 ELSA-2022-9148: Unbreakable Enterprise kernel-container security update (High)

    • 147857 ELSA-2022-9165: aide security update (High)

    • 148027 ELSA-2022-9177: jquery-ui security update (Medium)

    • 148028 ELSA-2022-9179: Unbreakable Enterprise kernel security update (Medium)

    • 148034 ELSA-2022-9180: Unbreakable Enterprise kernel-container security update (Medium)

    • 148031 ELSA-2022-9181: Unbreakable Enterprise kernel security update (Medium)

    • 148035 ELSA-2022-9182: Unbreakable Enterprise kernel-container security update (Medium)

    • 148103 ELSA-2022-9198: Unbreakable Enterprise kernel security update (Medium)

    • 148033 ELSA-2022-9199: Unbreakable Enterprise kernel security update (Medium)

    • 148032 ELSA-2022-9200: Unbreakable Enterprise kernel-container security update (Medium)

    • 148115 ELSA-2022-9201: Unbreakable Enterprise kernel-container security update (Medium)

    • 148125 ELSA-2022-9204: python-pip security update (Medium)

    • 148117 ELSA-2022-9210: Unbreakable Enterprise kernel security update (High)

    • 148104 ELSA-2022-9211: Unbreakable Enterprise kernel security update (High)

    • 148127 ELSA-2022-9212: Unbreakable Enterprise kernel-container security update (High)

    • 148132 ELSA-2022-9213: Unbreakable Enterprise kernel-container security update (High)

    • 148126 ELSA-2022-9221: gnutls security update (High)

    • 148116 ELSA-2022-9224: openssl security update (Medium)

    • 148120 ELSA-2022-9227: expat security update (High)

    • 148121 ELSA-2022-9228: cri-o security update (Medium)

    • 148124 ELSA-2022-9229: cri-o security update (Medium)

    • 148133 ELSA-2022-9232: expat security update (High)

    • 147778 RHSA-2022:0472: aide security update (Medium)

    • 147775 RHSA-2022:0473: aide security update (Medium)

    • 147782 RHSA-2022:0495: .NET 5.0 security and bugfix update (Medium)

    • 147785 RHSA-2022:0496: .NET 6.0 security and bugfix update (Medium)

    • 147781 RHSA-2022:0510: firefox security update (Medium)

    • 147789 RHSA-2022:0514: firefox security update (Medium)

    • 147780 RHSA-2022:0535: thunderbird security update (Medium)

    • 147776 RHSA-2022:0538: thunderbird security update (Medium)

    • 147791 RHSA-2022:0543: ruby:2.6 security update (Medium)

    • 147787 RHSA-2022:0545: ruby:2.5 security update (Medium)

    • 147786 RHSA-2022:0592: kpatch-patch security update (Medium)

    • 147788 RHSA-2022:0609: python-pillow security update (Medium)

    • 147779 RHSA-2022:0620: kernel security and bug fix update (Medium)

    • 147783 RHSA-2022:0621: openldap security update (Low)

    • 147777 RHSA-2022:0622: kernel-rt security and bug fix update (Medium)

    • 147784 RHSA-2022:0628: 389-ds-base security and bug fix update (Low)

    • 147790 RHSA-2022:0643: python-pillow security update (Medium)

    • 147995 RHSA-2022:0658: cyrus-sasl security update (Medium)

    • 147996 RHSA-2022:0666: cyrus-sasl security update (Medium)

    • 147994 RHSA-2022:0672: ruby:2.5 security update (Low)

    • 148077 RHSA-2022:0780: cyrus-sasl security update (Medium)

    • 148072 RHSA-2022:0818: firefox security update (High)

    • 148078 RHSA-2022:0819: kernel-rt security and bug fix update (Medium)

    • 148087 RHSA-2022:0824: firefox security and bug fix update (High)

    • 148076 RHSA-2022:0825: kernel security, bug fix, and enhancement update (Medium)

    • 148073 RHSA-2022:0826: .NET 6.0 security and bugfix update (Medium)

    • 148074 RHSA-2022:0827: .NET Core 3.1 security and bugfix update (Medium)

    • 148084 RHSA-2022:0830: .NET 5.0 security and bugfix update (Medium)

    • 148085 RHSA-2022:0845: thunderbird security update (Medium)

    • 148083 RHSA-2022:0849: kpatch-patch security update (Medium)

    • 148088 RHSA-2022:0850: thunderbird security update (Medium)

    • 148081 RHSA-2022:0886: virt:rhel and virt-devel:rhel security update (Low)

    • 148079 RHSA-2022:0889: 389-ds:1.4 security and bug fix update (Low)

    • 148071 RHSA-2022:0891: httpd:2.4 security update (Low)

    • 148082 RHSA-2022:0892: libarchive security update (Low)

    • 148075 RHSA-2022:0894: vim security update (Low)

    • 148070 RHSA-2022:0896: glibc security update (Low)

    • 148086 RHSA-2022:0899: libxml2 security update (Low)

    • 148080 RHSA-2022:0951: expat security update (Medium)

    • 147792 [USN-5267-2] Linux kernel regression (Medium)

    • 147796 [USN-5267-3] Linux kernel (Raspberry Pi) vulnerabilities (Medium)

    • 147793 [USN-5279-1] util-linux vulnerabilities (Medium)

    • 147794 [USN-5280-1] Speex vulnerability (Medium)

    • 147795 [USN-5286-1] cryptsetup vulnerability (Medium)

    • 147802 [USN-5288-1] Expat vulnerabilities (Medium)

    • 147797 [USN-5291-1] libarchive vulnerabilities (Medium)

    • 147798 [USN-5292-1] snapd vulnerabilities (Medium)

    • 147801 [USN-5292-3] snapd vulnerabilities (Medium)

    • 147997 [USN-5292-4] snapd regression (Medium)

    • 147803 [USN-5293-1] c3p0 vulnerability (Medium)

    • 147799 [USN-5294-1] Linux kernel vulnerabilities (Medium)

    • 147806 [USN-5294-2] Linux kernel vulnerabilities (Medium)

    • 147800 [USN-5295-1] Linux kernel (HWE) vulnerabilities (Medium)

    • 147804 [USN-5295-2] Linux kernel vulnerabilities (Medium)

    • 147805 [USN-5297-1] Linux kernel (GKE) vulnerabilities (Medium)

    • 147807 [USN-5298-1] Linux kernel vulnerabilities (Medium)

    • 147808 [USN-5299-1] Linux kernel vulnerabilities (Medium)

    • 148005 [USN-5300-2] PHP vulnerabilities (Medium)

    • 148007 [USN-5300-3] PHP vulnerabilities (Medium)

    • 147809 [USN-5301-1] Cyrus SASL vulnerability (Medium)

    • 147810 [USN-5301-2] Cyrus SASL vulnerability (Medium)

    • 147811 [USN-5302-1] Linux kernel (OEM) vulnerabilities (Medium)

    • 147998 [USN-5304-1] PolicyKit vulnerability (Medium)

    • 147999 [USN-5305-1] MariaDB vulnerabilities (Medium)

    • 148001 [USN-5306-1] WebKitGTK vulnerabilities (Medium)

    • 148000 [USN-5307-1] QEMU vulnerabilities (Medium)

    • 148002 [USN-5309-1] virglrenderer vulnerabilities (Medium)

    • 148003 [USN-5310-1] GNU C Library vulnerabilities (Medium)

    • 148009 [USN-5310-2] GNU C Library vulnerabilities (Medium)

    • 148006 [USN-5311-1] containerd vulnerability (Medium)

    • 148004 [USN-5312-1] HAProxy vulnerability (Medium)

    • 148008 [USN-5313-1] OpenJDK vulnerabilities (Medium)

    • 148010 [USN-5316-1] Redis vulnerability (Medium)

    • 148089 [USN-5317-1] Linux kernel vulnerabilities (Medium)

    • 148090 [USN-5318-1] Linux kernel vulnerabilities (Medium)

    • 148091 [USN-5319-1] Linux kernel vulnerabilities (Medium)

    • 148092 [USN-5320-1] Expat vulnerabilities and regression (Medium)

    • 148093 [USN-5322-1] Subversion vulnerability (Medium)

    • 148094 [USN-5323-1] NBD vulnerabilities (Medium)

    • 148095 [USN-5324-1] libxml2 vulnerability (Medium)

    • 148096 [USN-5328-1] OpenSSL vulnerability (Medium)

    • 148097 [USN-5328-2] OpenSSL vulnerability (Medium)

    • 148098 [USN-5330-1] LibreOffice vulnerability (Medium)

    • 148100 [USN-5332-1] Bind vulnerabilities (Medium)

    • 148101 [USN-5332-2] Bind vulnerability (Medium)

    • 148099 [USN-5333-1] Apache HTTP Server vulnerabilities (Medium)

    • 148102 [USN-5333-2] Apache HTTP Server vulnerabilities (Medium)

  • Includes several fixes and enhancements to the scanning engine and existing vulnerability checks.

Back to Top

 

Digital Guardian


Agent for macOS

Version: 8.2

April, 2022

New Features
  • DG Agent for macOS now supports macOS 12.3 (Monterey).

  • DG Agent now supports Application Data Exchange (ADE), an optional feature that provides control over copy, paste, and native screen-capture actions.

  • Digital Guardian web inspection proxy's (DG WIP) Auto Skip feature automatically skips inspecting websites that use technologies that are incompatible with DG WIP. Currently, DG WIP can automatically skip websites that are hosted by Cloudflare and trigger either a block or a CAPTCHA challenge. You can enable the Auto Skip feature by adding the following entry to your custom configuration resource: <wipAutoSkipEnable>1</wipAutoSkipEnable>

  • If you want to have DG WIP inspect an Auto Skip website, you should manually add a domain flag entry that will take precedence over the auto-skip entry for that site. You must use a valid domain flag. DG recommends using CACHE, which allows inspection.

  • DG Agent generates DG WIP Auto Skip Domain Detected operational alerts with a code that identifies the reason the website is eligible for getting skipped. The possible reason codes are:

    • mtls – Site attempted to use mTLS client certificate authentication.

    • tls-reneg – Site attempted to use TLS renegotiation.

    • imp – Site access was blocked by Imperva content delivery network (CDN) or web application firewall (WAF) security rules.

    • cf – Site access was blocked by CloudFlare content delivery network (CDN) or web application firewall (WAF) security rules.

  • This release includes the ability to capture files to network storage. For instructions on how to configure and use this feature, refer to "Capturing Files to Network Storage" in Digital Guardian Management Console User's Guide and "DG File Extractor Utility" in Digital Guardian Utilities Guide.

Fixes
  • DG Web Inspection Proxy (DG WIP) now expedites the propagation of connection closes initiated by a web server to the paired browser connection, preventing authentication failures.

  • Rules containing the evtDestFilePath parameter now operate as designed.

Agent for Windows

Version: 7.7.5

April, 2022

Fixes
  • When the DG Agent and the SentinelOne anti-virus application were both running, the anti-virus code accessed a file the Agent was performing content inspection on, causing Microsoft Office applications to slow down, effectively making them unusable. The fix to "AG-43419 " on helped resolve this issue (refer to DigitalGuardian_Agent_for_Windows_7.7.5_Release_Notes). The Agent now uses specific flags when processing a file to notify other applications to wait for the Agent to finish processing

  • The httpProxySupportFlags configuration option, which allows you to specify a PAC URL of a proxy server, instead of a direct proxy for communication with other servers and websites, did not work with the 7.7.3 Agent. Although the new option was set correctly in the administrator's custom configuration file, a variable within the Agent code was not returned properly, and consequently the Agent did not attempt to look up the configured proxy PAC site. This was resolved with code changes to the Agent.

  • Websites protected by Incapsula did not work when DG WIP is enabled.

  • Files were getting translated without any NTU events being detected when Google Translate introduced a new feature identified by "Powered By Google Cloud." This happened on Google Chrome, Mozilla Firefox, and Microsoft Edge and was addressed with a change to the Script Pack (proxyscripts.zip) in the 7.7.5 Agent. If you distributed the Script Pack resource from the DGMC to some or all of your Agent computers, you will need to import the new script pack into the DGMC and push it to those computers. This is necessary because the version distributed from the DGMC overrides whatever version may have been shipped with the release. The new script pack works with older Agent releases and fixes the Google translate issue for them as well.

  • An SSL certificate error would occur when users were browsing with Google Chrome or Microsoft Edge if the optional Windows registry setting RequireOnlineRevocationChecksForLocalAnchors" was enabled. This issue was addressed by modifying DG WIP to provide a TLS Certificate Status Request extension ("OCSP staple") on every SSL certificate that it issues.

  • An interoperability problem between DG WIP and Palo Alto GlobalProtect app 5.2.8 on Windows causes network browsing failure to sites whose domains are configured for Global Protect domain-based split tunneling. Palo Alto has provided a fix for this issue in GlobalProtect app 5.2.11, which is expected to be available at the end of March, 2022.

  • A defect in the DG Agent prevented the Seclore third-party plugin from being loaded in Microsoft Office applications. DG has fixed the issue.

  • When a user had multiple Microsoft Excel files open, performed edits on them and saved the edits, but did not close the files, the DG Agent prevented Excel from saving the files. Consequently, when the user closed a file and then re-opened that file, the edits were missing. To resolve this, the Agent now uses specific file attribute flags that prevent applications such as Excel from accessing the same file while the Agent is actively processing it. This forces Excel to wait for the Agent to finish processing the file before performing a Save operation.

  • Customers using a certain content delivery network (CDN) or web application firewall (WAF) were blocked from accessing some websites with DG WIP. DG WIP can now automatically skip websites when it detects that a certain CDN or WAP has decided to block access to the websites due to the security rules it applied.

  • Windows Task Manager (taskmgr.exe) failed to open due to DG injection. Task Manager is a Microsoft Universal Platform app (formerly Metro), and DG does not support UWP DLLs used in Task Manager. To resolve this issue, DG no longer loads UWP-sensitive DLLs into taskmgr.exe.

  • A rule that evaluates a file operation could not use the rule properties evtSrcEncryptionType and evtDestEncrytionType. DG made a code change to address the issue.

  • When a request to capture a file to the DGMC was made, the Agent did not check the file's size and disallow capture requests for files larger than the configured value for the Max Capture File Size setting in the DGMC. This was resolved with a change to the Agent code.

  • Saving a file from a Microsoft Office application to a network share took an unusually long time. This occurred because when the detectPathChangesForClassifiedFile configuration setting was in the off state (0 - Disabled), it failed to prevent the Agent from reinspecting a file after the Save operation was completed. The DG Agent has been fixed so that detectPathChangesForClassifiedFile works properly when set to 0 (disabled).

  • A fatal error occurred on a single DG Agent-equipped computer due to a reference counting issue that destroyed an object before the call to the Windows registry hive unload post handler was invoked. An additional add reference on the objects has been added to extend their lifespan across this call.

  • When you ran the Microsoft System Configuration Utility (MSConfig) with the DG Agent in stealth mode, the DG services were displayed, despite the Agent being in stealth mode. DG addressed the issues with a code change.

  • DG Agent computers shut down unexpectedly due to an invalid config.xml file that was not replaced with a valid backup due to the backup functionality not operating. This issue was addressed with a code change that reenabled the backup functionality.

nDLP Appliance

Version: 11.6

April, 2022

New Features
  • DG Appliance now uses an improved method to connect to Microsoft OneDrive and SharePoint Online. For details, see "Using Microsoft Cloud Services After Upgrading to 11.6 or Later" on page 1.

  • You can now check for unstructured registered data by percentage match in a data policy.

  • DG Appliance now supports the SNMP-v3 security protocol in addition to the SNMP-v2 protocol. These protocols are useful for debugging and monitoring.

  • Now you can apply a MIP (Microsoft Information Protection) sensitivity label that was created as a data attribute to files as a remediation action to discovery incidents.

  • Now you can send DG Appliance events and incidents to DG Analytics & Reporting Cloud (DG ARC) through the DGMC in JSON format. A new check box called JSON Incident Format appears in the General System Settings when DG Appliance is connected to a DG Analytics & Reporting Cloud (DG ARC) server.

Fixes
  • DG Appliance now uses an updated version of Red Hat's polkit, which fixes a known vulnerability in Linux's system-wide privileges. For details about the vulnerability, see Red Hat's website.

  • Manager databases now run maintenance scripts to prevent issues with receiving incidents from Inspectors.

Back to Top

 

Document Management (RJS)


Webdocs Forms Management

Version: 10.1.15

April 24, 2022

Fixes
  • Tomcat Upgraded to v9.0.62 to address CVE-2022-22965 Java Spring Vulnerability.
  • After upgrade from v9.0.x to v10.1.14, forms are not saving to Sharepoint and logs show the error java.lang.IllegalArgumentException: org.json.JSONException: JSONObject["Snapshot"] not found.
  • Sharepoint Connector - "Send Snapshot" cannot be disabled and always sends a snapshot; this causes an error if Sharepoint is not configured to allow attachments.
  • Setting the frevvo.forms.server.external.url property causes errors. This property will now be ignored by frevvo if set.
  • Manage Sessions page shows "processing" and never loads; error in logs "Session already invalidated".
  • PDF Generator fails with error in logs "java.lang.IllegalArgumentException: Hook previously registered".
  • PDF Generator fails with error in logs "Error in call to extension function" and submissions are not saved.
  • In a workflow with 2 consecutive steps assigned to different emails, the former step is able to perform task for the later step by clicking on task email link again.
  • Slow performance after upgrade from v9 → v10.1.
  • Upgrade (v7 -> v7.4 -> v9.0.25→v10.1.9) failed with error in logs "Could not getOrCreateUser: UserKey".
  • Remove Java Image IO jars (jai-codec-1.1.3, jai-core-1.1.3) from our distribution
  • Task notification emails not sent if the default subject and message are used. Please see the v10.1 Planning page for details.
  • Security: A user logged into one tenant can edit user with the same user ID in another tenant's Space.
  • PDF Snapshot displays control data in bold when Print Font is set to Tahoma.
  • Mitigation applied to Address Critical RCE (log4j / solr) Vulnerability Under Exploitation
  • Error loading tenant is seen after frevvo restart.
  • Upgrade (v7 -> v7.4 -> v9.0.25→v10.1.9) failed with error "Exception sending context initialized event to listener instance of class".
  • Quick Approval is not working and giving an unknown error when used with snapshot generation.
  • Comments for checkbox (when you select 'other') are clearing when saving to task list or going to next step. Please see the v10.1 Planning page for details.
  • After hitting max users reached, the session monitor page hangs and "Session already invalidated" error is shown in the logs.
  • After upgrade to v10.1.8, Azure SM login does not work and shows Application Error "Oops. Something went wrong. . .".
  • Upgrade to frevvo v10 fails when using non default owner/schema for frevvo database.
  • In rare cases, upload-replace can delete all project submissions.

There are currently no updates.

Back to Top

FileCatalyst


Version 3.8.5 - Build 78

April 8, 2022

Updates
  • All - Update Amazon Corretto to version 1.8.0_282.

  • All - Multiple security fixes.

  • Central - Ability to generate a CSV for Central report data.

  • Central - New report in Central provides data transferred per Node.

  • HotFolder - Bandwidth blackout cancellation.

  • Load Balancer - Origin Affinity for Load balancer.

  • Reverse Proxy - Run time Diagnostics generation.

  • Server - New upload SSL certificate button for Server HTML admin.

  • Server - Support for authenticating against an OpenID service (Beta feature, support limited to certain UIs).

  • Server, HotFolder - Checksum now included in select Server and HotFolder CSV reports.

  • Server, HotFolder - New Read/Write speed test tool for testing I/O speeds.

Fixes
  • TransferAgent - Weblink page intermittently getting Connection Refused.

  • Server - Error when downloading from Weblink using SSL.

  • Server - Renaming an Amazon S3 folder creates a 0B file instead.

  • HotFolder - Intermittent hang on startup, with CPU spiking to 100%.

Back to Top

 

GoAnywhere


Version 7.0.0

April 7, 2022

New Features
  • Added new FileCatalyst Task and Resource.

    • Secure and rapid transfers.

    • Utilizes a patented UDP-based file transfer technology.

  • Added support for Java 11.

  • Added a new Read EDI X12 Envelope task.

  • Introduced new header and navigation to user interface.

  • The Admin Log now produces records for the creation, deletion, and modification of Admin User API Keys. API Keys now have change history.

  • Added support for antivirus integration into GoAnywhere Services.

  • Added support for HelpSystems One integration.

  • Added a new diagnostics page that allows admins to generate logs, system reports, and thread dumps quickly.

  • Added Documents to Partners, simplifying configuration for the reading and writing of EDI X12 documents.

  • Added the ability to create an agent using GACMD CLI/Rest/SOAP.

  • Added the ability to delete an agent using GACMD CLI/Rest/SOAP.

Enhancements
  • Enhanced GoFast file transfer performance utilizing FileCatalyst architecture.

  • Added licensed feature quantity support for FTP, FTPS, GoAnywhere HTTPS, HTTP, HTTPS, REST, SOAP and SSH (SFTP/SCP/SSH) resources when created or used in appropriate workflow tasks.

  • Added support multiple domains in MFTaaS.

  • Enhanced the PeSIT Client and Server so that the Record Length is negotiated and no longer needs to be an exact match.

  • Added save detection to prompt users to save before navigating away from the Audit Log Rule configuration page.

  • Added Save Detection to File Based Certificates.

  • Added Save Detection to File Based SSH Keys.

  • Added Save Detection to File Based PGP Key pages.

  • Domains are now listed alphabetically on the Domains and Projects pages, and in dropdown and dual list menus across the Admin Client.

  • Enhanced support for Java 11 by removing the use of the Endorsed Standards Override Mechanism.

  • Added the ability to sort log files on the Server Log page by last modified date.

  • Added Save Detection to the Edit Database Configuration page.

  • Added Save Detection to Job Queue Manager.

  • Enhanced support for Java 11 by removing the VM Option UseVMInterruptibleIO.

  • Enhanced support for Java 11 by replacing VM option MaxPermSize with MaxMetaspaceSize and adding a Metaspace Usage section under About GoAnywhere's System Resources tab.

  • Enhanced two factor login page logging and error message accuracy.

  • Replaced all customer facing references of the terms "blacklist" and "whitelist" to "block list" and "allow list" to better adhere to HelpSystems DEI standards.

  • Enhanced the Read JSON Task with a new Parse Type field that resets fields based upon order found(new) vs depth of field(existing).

  • Enhanced validation for Web Client Brand configurations.

  • Enhanced validation for Log Settings configurations.

  • Added the ability for Gateway proxies to start and stop dynamically when the associated service listener starts and stops.

  • Enhanced the Triggers page to include filtering, pagination, and column selection. Moved the Reordering of triggers to its own page.

  • The System Name/Environment label on the Admin login page no longer wraps in certain languages.

  • Enhanced the UI to provide a processing dialog while LDAP Groups are loaded when creating Admin or Web Group LDAP associations.

  • Added option to add the file delimiter to the end of the last file in the Merge File task.

  • Enhanced the processing around agents connecting/disconnecting to ensure large scale deployments don't exhaust the database connection pool.

  • Added Save Detection to the Add IP Filter page.

  • Added Save Detection when adding Automatic IP Block Exemptions.

  • Added restrictions to prevent the deletion of addon documents when they are being used for a partner document.

  • Added the ability to export and import EDI Addons.

  • Added 3 new functions: PadLeft, PadRight, and PadCenter. These functions add spaces or a character to the sides of text, to return text of a specified total length.

  • Added additional fields to Partner Objects to assist in writing X12 documents.

  • Added the ability to configure a partner on the Write X12 task which will use partner information to assist in writing the data.

  • Added a validation flag to the Read X12 Envelope Task that will verify there are Partner Documents created in MFT that are associated to every GS envelope in the X12 file.

  • Added the HelpSystems One logging component to the Admin User Activity Details report task.

  • Added support to the Read X12 Envelope task to validate that incoming document control numbers are not reused within a configurable time period.

  • Updated user interfaces to utilize the latest corporate branding.

  • Added Save Detection to Gateway Manager page.

  • Enhanced the processing efficiency used to rebuild the cache that stores user permissions.

Updates
  • Updated Tomcat configuration to limit HTTP/S methods allowed by the server.

  • Updated Help Center and Getting Started Widget with HelpSystems Insiders link and description.

  • Updated the agent and agent group name columns and filters to match and only display when appropriate in the agent and agent group console.

  • Updated page names to consistently match menu names .

  • Updated the Japanese version of the software with the latest translations from Solpac.

  • Removed prettyfacesfaces-jsf2-3.3.0.jar to address a security issue within that Jar.

  • Removed some button icons on admin client pop-up screens to align with UI design standards.

  • Updated alignment of the 'ok' button on the file chooser error dialog.

  • Updated Network Resources to show a warning when creating or editing Network Shares with Client Type of 'SMBv1'. This client type is deprecated and will be removed in a future release.

  • Updated the Spring Framework jars from version 5.2.9 to 5.3.18.

  • Replaced the existing folder containing third party license documentation with a single open source attributions file.

  • Updated Apache Santuario jar from version 2.1.4 to 2.1.7.

  • Updated JNQ from version 1.3.6 to 1.4.1.

  • Update PeSIT File Templates to no longer allow misconfiguring of Binary Data Encoding with Variable Text or Fixed Text File Structures.

  • Deprecated support for 32-bit operating systems.

Fixes
  • Added ability to close a socket immediately if Gateway forward proxy connection times out.

  • Fixed an issue with the error messages pertaining to required fields in PeSIT Send/Receive Tasks not referencing the correct task to complete a required field.

  • Fixed an issue where the PeSIT client and server would fail to run if the remote partner was not supplying default PI values.

  • Fixed issue where OnError Panel is not expanded when Project Editor is first loaded.

  • Fixed an issue with file name comparisons in PeSIT Receive Triggers.

  • Fixed an issue where an unexpected ICAP exception didn't propagate correctly.

  • Fixed error within Write X12 Task that was incorrectly referencing the Sender ID Qualifier field when excess characters were added in the Sender ID Field.

  • Fixed an issue where renaming or deleting a saved filter on the List Partners page was not reflected after navigating from the Manage Filters page.

  • On the Agent Permissions pages, scrollbars now appear on Admin and Admin Group dropdown menus when there are more elements than can comfortably fit on the screen.

  • Updated the AS4 asynchronous push mode message reply connection timeout from 6 seconds to 60 seconds.

  • Fixed a language translation issue on the Add-ons page by externalizing the Column Header.

  • Fixed an issue with Agent/Agent Group Schedules defined with a non-existent run user would fail to reset its next fire time.

  • Enhanced the Agent/Agent Group Schedule process to be more efficient.

  • Fixed rare issue in GHTTPS/AS2/AS4 Services related to active sessions management.

  • Fixed an issue with the ICAP task where the Preview header was not being applied when needed.

  • Fixed an issue in the FTPS Service that caused certificate authentication to be disabled when non-default cipher suites were enabled.

  • Fixed the project category change history navigation when within Agent/Agent Group Consoles.

  • Fixed the logic in the v2 Send Email task to ensure certificate trust checks run properly.

  • Fixed an issue where the Save Handler prompt would arbitrarily pop up on header links.

  • Fixed issue where folders defined on a Web User Group could only be shared by a single user.

  • Fixed an issue where Web Users still had access to virtual folders that were defined on a Web User Group after the group was deleted.

  • Fixed an issue where adding trailing space to a username when logging in with LDAP caused the user to be disabled.

  • Increased Time-based One Time Password secret length to resolve an issue with BC FIPS mode.

  • Fixed a dynamic tooltip styling issue associated with text fields.

  • Fixed an issue where Admin Users could see API keys they did not have permissions for.

  • Fixed an issue that would cause Resource lookup failures within jobs due to a timing issue. Timing is no longer relevant to the Resource lookup.

  • Fixed an issue that would prevent the Gateway Manager page from loading if the configuration was enabled but not set to autostart.

  • Fixed a null pointer exception that occurred when importing a project or cloud connector with an invalid xml file.

  • Removed an additional, unnecessary MDN Receipt "Date" header.

  • Fixed issue where the PeSIT server is now properly shutdown as part of the switch database process.

  • Fixed an issue where a Secure Form Drop Down Component would not always show the drop down options when a Web User Variable was used as a database query parameter.

  • Fixed improperly escaped characters in French messages.

Version 6.8.7

April 19, 2022

  • Added configuration for amount of entropy required by GoAnywhere MFT from the Operating System for cryptographic random number generation.

  • Upgraded the Postgres JDBC Driver from version 42.2.14 to version 42.3.3.

  • Updated Spring Framework from 5.2.9 to 5.3.18.

  • Updated Apache Log4j from version 2.16.0 to 2.17.1.

  • Fixed an issue where the toolbar in Secure Folders would not properly refresh when navigating to virtual folders with different permissions. Breadcrumb navigation was also updated to refresh the toolbar.

GoAnywhere Agents

Version 1.7.0

April 12, 2022

New Features
  • Added support for Java 11.

  • Added new FileCatalyst Task and Resource.

    • Secure and rapid transfers.

    • Utilizes a patented UDP-based file transfer technology.

Enhancements
  • Enhanced GoFast file transfer performance utilizing FileCatalyst architecture.

Updates
  • Updated Apache Log4j from version 2.16.0 to 2.17.1.

  • Updated JNQ from version 1.3.6 to 1.4.1.

  • Upgraded the Postgres JDBC Driver from version 42.2.14 to version 42.3.3.

  • Replaced the existing folder containing third party license documentation with a single open source attributions file.

  • Deprecated support for 32-bit operating systems.

Fixes
  • Fixed SAX parser errors when upgrading Agent on IBM i.

GoAnywhere Gateway

Version 2.9.0

April 8, 2022

  • Added the ability for Gateway proxies to start and stop dynamically when the associated service listener starts and stops.

  • Improved the performance and memory usage when using SSL (Control, Termination and Rewrap).

  • Replaced the existing folder containing third party license documentation with a single open source attributions file.

  • Updated Apache Log4j from version 2.16.0 to 2.17.1.

Back to Top

 

Powertech


Powertech Antivirus

Version 6.02

April 27, 2022

Updated the Spring Framework to 5.2.21.RELEASE to address the RCE (CVE-2022-22965) and Data Binding Rules (CVE-2022-22968) vulnerabilities.

BoKS Control Center

Version: 8.1.0.2

April 20, 2022

  • Added CSRF (Cross Site Request Forgery) attack protection.

  • Updated Spring Framework dependency (CVE-2022-22965).

Version: 8.0.0.5

April 20, 2022

  • Added CSRF (Cross Site Request Forgery) attack protection.

  • Updated Spring Framework dependency (CVE-2022-22965).

Version: 7.2.0.4

April 20, 2022

  • Added CSRF (Cross Site Request Forgery) attack protection.

  • Updated Spring Framework dependency (CVE-2022-22965).

BoKS Reporting Services

Version: 8.1.0.3

April 13, 2022

  • Security fix for CVE-2022-22965. Updated dependency for Spring Framework.

Version: 8.0.0.8

April 13, 2022

  • Security fix for CVE-2022-22965. Updated dependency for Spring Framework.

BoKS SSH Client for Windows

Version: 8.0.2.1

April 19, 2022

  • Updated OpenSSL to version 1.1.1n to include a fix for CVE-2022-0778.

Powertech Compliance Monitor

Version 4.2

April 13, 2022

  • Fixed issue with profile scorecard display failing on systems with recent versions of Java.

  • Updated to Log4j 2.17.1.

  • Java SE 8 32 is now required.

Powertech SIEM Agent for IBM i

Version 4.6

April 6, 2022

Enhancements
  • Added extension functions %extract and %int to now support EPOCH format.

  • JSON data type override provides ability for JSON to treat the outcome of a value as character or numeric versus its original field data type.

  • Updated to Log4j 2.17.

Fixes
  • Fixed issue with CEF listing job user as DUSER instead of *CURUSER.

  • Output now correctly shows HOST name instead of system name.

  • Fixed issue with update failing on error VLD40A4.

  • We now verify that *STREAM output configuration is pointing to an STMF, and notify the user if it points to a directory.

  • Fixed issue with Rule Conditions using Fields *RMTADDR or *RMTADDR(1–14).

  • Fixed issue with rule output field being input capable.

  • In Event output, the value of the application name ("APP-NAME") field changed from "Interact" to "SIEM Agent" in Release 4. To ensure compatibility with SIEMs that do not accept blank application names, users can now change the application name to "SIEM_Agent" with an underscore instead of the blank, by executing the SQL statement INSERT INTO PTSALIB/PSASYP values('ProductBlank', 'N').

Back to Top

 

Robot

Robot HA

Version 13.05

April 27, 2022

Enhancements
  • Improved efficiency of check lag.

  • Role swap process now always creates a joblog.

  • INZRSFHA command now sets RSFCHKLIB job to run CHKATTRSF command with *RLS and *JRN.

  • Improved spool and transfer lag for groups process.

  • Default sync interval for RBTHALIB is now every 10 minutes.

  • Improved the check library process:

    • New field added to output that indicates if objects will be refreshed.

    • Journal and journal receivers will no longer be compared.

    • Now identifies when a LF is mismatched.

    • Compare for *USRSPC type no longer updates last used date on object.

    • CHKATTRSF for libraries now processes attributes with multiple sets correctly .

    • NULL error corrected for BLOB/CLOB field.

    • Compare handling for locked objects improved.

Fixes
  • Fixed issue with errors in group sync job during role swap.

  • Fixed issue with IFS sync errors when setting authority on directories and files that have been omitted.

  • Fixed issue with group journal apply job receiving error ‘CPF7054- FROM and TO values not valid’.

  • Logical files members are now removed correctly.

  • Fixed issue with swap audit failing with error 'Cannot check secondary startup program'.

  • CLRLIBRSF override now specifies QTEMP. Change to: Fixed CLRLIBRSF override issue.

  • Fixed issue with iASP RDB entries removed during swap with *SWAPIP.


Back to Top

 

Titus


Titus Classification Suite for Mac

Version 2021.1

April 14, 2022

New Features
  • This release adds support for macOS 12 (Monterey).

  • This product can be used on client machines with the Apple M1 Processor.

Fixes
  • Customers can now include URL hyperlinks in policy alert messages (except links that attempt to access localhost).

  • Titus Classification Suite for Mac and Titus Classification Suite for Windows users can now maintain classification labels in email conversations. Windows machines were not capturing classification labels in emails that came from a Mac due to a custom x-header issue.

 

Titus Classification Suite for Windows

Version 2021.4

April 2022

New Features
  • Support for Microsoft Outlook 2021 and Microsoft Office 2021 has been added. For Outlook 2021, switch to the classic ribbon view (simplified ribbon view is not supported).

  • The Select dialog has been updated to allow a user to manually enter multiple Classifications, select multiple Classifications, or both. If a Classification, that is also in the list, has been manually entered or deleted, its checkbox is automatically selected or cleared, respectively. See the Titus Administration Console User Guide for more information.

  • Titus Classification Suite now integrates with Harmon.ie (a PulsePoint COM add-in with Microsoft Outlook) to provide a smoother user experience when using both products.

Fixes
  • Scroll bars are not consistent for multi-select fields in the Select dialog between versions.

Back to Top

Vera

Version 3.19.3

April 2022

Fixes
  • Resolved an issue where Save Policy was not enforced in View-in-Browser (VIB) (Server Only).

Back to Top