Monthly Release Notes - May 2022

Jump to:

 

Boldon James


Mac Classifier

Version 3.12.7

May 27, 2022

Fixes
  • This release addresses Office maintenance updates impacting the functionality of the Mac Classifier product.

Back to Top

 

Digital Defense


Frontline Agent

Version 1.40.1

May 18, 2022

Enhancements
  • Implemented the following new vulnerability checks:

    • 148582 Apple Security Update: 2022-004 Catalina (High) - Mac
    • 148581 Apple Security Update: macOS Big Sur 11.6.6 (High) - Mac

    • 148580 Apple Security Update: macOS Monterey 12.4 (High) - Mac

    • 148579 Apple Security Update: Safari 15.5 (High) - Mac

    • 148583 Apple Security Update: Xcode 13.4 (Medium) - Mac

    • 148577 Google Chrome: Multiple Vulnerabilities in Versions Less Than 101.0.4951.64 (High) - Windows, Mac

    • 148544 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 101.0.1210.32 (High) - Windows

    • 148546 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 100 (High) - Windows, Mac

    • 148549 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 91.9 (High) - Windows, Mac

    • 148551 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 91.9 (High) - Windows

    • 148574 MS22-MAY: Microsoft .NET Security Update (Low) - Windows

    • 148575 MS22-MAY: Microsoft Exchange Server Security Update (Medium) - Windows

    • 148573 MS22-MAY: Microsoft Office Security Update (High) - Windows, Mac

    • 148576 MS22-MAY: Microsoft Sharepoint Server Security Update (High) - Windows

    • 148572 MS22-MAY: Microsoft Windows Security Update (High) - Windows

Fixes
  • Updated Vulnerability Descriptions:
    • 148387 Apple Security Update: macOS Monterey 12.3.1 (High)
    • 148466 Azul Zulu Critical Patch Update: APRIL-2022 (High)

    • 148438 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.127 (High)

    • 148468 Google Chrome: Multiple Vulnerabilities in Versions Less Than 101.0.4951.41 (High)

    • 148465 Java Critical Patch Update - CPU-APRIL-2022 (High)

    • 148439 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 100.0.1185.44 (High)

    • 148270 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 91.8 (High)

    • 148444 wnpa-sec-2022-01: Security Update Available for Wireshark (High)

    • 148443 wnpa-sec-2022-02: Security Update Available for Wireshark (Medium)

    • 148442 wnpa-sec-2022-03: Security Update Available for Wireshark (Medium)

    • 148441 wnpa-sec-2022-04: Security Update Available for Wireshark (High)

    • 148440 wnpa-sec-2022-05: Security Update Available for Wireshark (Medium)

    • 148464 Zoom Client Zip Bombing Vulnerability (High)

Version 1.39.0

May 2, 2022

Enhancements
  • Implemented the following new vulnerability checks:

    • 148387 Apple Security Update: macOS Monterey 12.3.1 (High) - Mac
    • 148466 Azul Zulu Critical Patch Update: APRIL-2022 (High) - Windows
    • 148438 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.127 (High) - Windows, Mac

    • 148468 Google Chrome: Multiple Vulnerabilities in Versions Less Than 101.0.4951.41 (High) - Windows, Mac

    • 148465 Java Critical Patch Update - CPU-APRIL-2022 (High) - Windows, Mac

    • 148439 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 100.0.1185.44 (High) - Windows

    • 148444 wnpa-sec-2022-01: Security Update Available for Wireshark (High) - Windows, Mac

    • 148443 wnpa-sec-2022-02: Security Update Available for Wireshark (Medium) - Windows, Mac

    • 148442 wnpa-sec-2022-03: Security Update Available for Wireshark (Medium) - Windows, Mac

    • 148441 wnpa-sec-2022-04: Security Update Available for Wireshark (High) - Windows, Mac

    • 148440 wnpa-sec-2022-05: Security Update Available for Wireshark (Medium) - Windows, Mac

    • 148464 Zoom Client Zip Bombing Vulnerability (High) - Windows

Frontline Container Scanner

Version 1.9.0

May 10, 2022

Enhancements
  • Frontline Container Scanner contains the following new vulnerability checks: 
    • 148479 Alpine Linux: Multiple Vulnerabilities in 'libarchive' in Versions Less Than 3.5.3-r0 (Medium)
    • 148480 Alpine Linux: Multiple Vulnerabilities in 'tiff' in Versions Less Than 4.3.0-r0 (Medium)
    • 148474 Alpine Linux: Multiple Vulnerabilities in 'tiff' in Versions Less Than 4.3.0-r1 (Medium)
    • 148472 Alpine Linux: Multiple Vulnerabilities in 'vim' in Versions Less Than 8.2.4708-r0 (High)
    • 148473 Alpine Linux: Multiple Vulnerabilities in 'xen' in Versions Less Than 4.13.4-r3 (High)
    • 148478 Alpine Linux: Multiple Vulnerabilities in 'xen' in Versions Less Than 4.14.5-r0 (High)
    • 148476 Alpine Linux: Multiple Vulnerabilities in 'xen' in Versions Less Than 4.15.2-r0 (High)
    • 148475 Alpine Linux: Vulnerability in 'gdk-pixbuf' in Versions Less Than 2.42.8-r0 (Medium)
    • 148477 Alpine Linux: Vulnerability in 'nginx' in Versions Less Than 1.20.1-r1 (Medium)
    • 148280 Amazon Linux 2 Security Advisory: ALAS-2022-1767 (High)
    • 148282 Amazon Linux 2 Security Advisory: ALAS-2022-1768 (Low)
    • 148279 Amazon Linux 2 Security Advisory: ALAS-2022-1769 (Medium)
    • 148277 Amazon Linux 2 Security Advisory: ALAS-2022-1770 (Medium)
    • 148281 Amazon Linux 2 Security Advisory: ALAS-2022-1771 (Medium)
    • 148278 Amazon Linux 2 Security Advisory: ALAS-2022-1772 (Medium)
    • 148448 Amazon Linux 2 Security Advisory: ALAS-2022-1773 (Low)
    • 148447 Amazon Linux 2 Security Advisory: ALAS-2022-1774 (Medium)
    • 148273 Amazon Linux Security Advisory: ALAS-2022-1576 (High)
    • 148274 Amazon Linux Security Advisory: ALAS-2022-1577 (Low)
    • 148275 Amazon Linux Security Advisory: ALAS-2022-1578 (Medium)
    • 148276 Amazon Linux Security Advisory: ALAS-2022-1579 (Medium)
    • 148446 Amazon Linux Security Advisory: ALAS-2022-1580 (Low)
    • 148445 Amazon Linux Security Advisory: ALAS-2022-1581 (Medium)
    • 148360 Debian Security Advisory: DLA-2936-1 (High)
    • 148336 Debian Security Advisory: DLA-2940-1 (High)
    • 148323 Debian Security Advisory: DLA-2941-1 (High)
    • 148372 Debian Security Advisory: DLA-2943-1 (Medium)
    • 148345 Debian Security Advisory: DLA-2944-1 (High)
    • 148329 Debian Security Advisory: DLA-2945-1 (Medium)
    • 148327 Debian Security Advisory: DLA-2946-1 (Medium)
    • 148353 Debian Security Advisory: DLA-2947-1 (High)
    • 148359 Debian Security Advisory: DLA-2949-1 (Medium)
    • 148340 Debian Security Advisory: DLA-2950-1 (Medium)
    • 148326 Debian Security Advisory: DLA-2951-1 (Low)
    • 148339 Debian Security Advisory: DLA-2952-1 (Medium)
    • 148367 Debian Security Advisory: DLA-2953-1 (Medium)
    • 148348 Debian Security Advisory: DLA-2954-1 (Medium)
    • 148331 Debian Security Advisory: DLA-2955-1 (Medium)
    • 148349 Debian Security Advisory: DLA-2957-1 (Medium)
    • 148366 Debian Security Advisory: DLA-2958-1 (Medium)
    • 148358 Debian Security Advisory: DLA-2959-1 (Medium)
    • 148333 Debian Security Advisory: DLA-2960-1 (High)
    • 148332 Debian Security Advisory: DLA-2962-1 (High)
    • 148338 Debian Security Advisory: DLA-2965-1 (Medium)
    • 148346 Debian Security Advisory: DLA-2966-1 (High)
    • 148365 Debian Security Advisory: DLA-2967-1 (High)
    • 148350 Debian Security Advisory: DLA-2968-1 (Medium)
    • 148354 Debian Security Advisory: DLA-2969-1 (High)
    • 148373 Debian Security Advisory: DLA-2970-1 (High)
    • 148356 Debian Security Advisory: DLA-2971-1 (Medium)
    • 148371 Debian Security Advisory: DLA-2972-1 (Medium)
    • 148335 Debian Security Advisory: DLA-2973-1 (Medium)
    • 148351 Debian Security Advisory: DLA-2975-1 (High)
    • 148337 Debian Security Advisory: DLA-2978-1 (Medium)
    • 148347 Debian Security Advisory: DLA-2979-1 (Medium)
    • 148368 Debian Security Advisory: DSA-5068-1 (Medium)
    • 148325 Debian Security Advisory: DSA-5079-1 (Medium)
    • 148364 Debian Security Advisory: DSA-5083-1 (Medium)
    • 148334 Debian Security Advisory: DSA-5084-1 (Medium)
    • 148370 Debian Security Advisory: DSA-5089-1 (Medium)
    • 148342 Debian Security Advisory: DSA-5095-1 (Medium)
    • 148341 Debian Security Advisory: DSA-5096-1 (High)
    • 148357 Debian Security Advisory: DSA-5098-1 (Medium)
    • 148352 Debian Security Advisory: DSA-5099-1 (Medium)
    • 148344 Debian Security Advisory: DSA-5100-1 (High)
    • 148328 Debian Security Advisory: DSA-5101-1 (Medium)
    • 148343 Debian Security Advisory: DSA-5102-1 (Medium)
    • 148363 Debian Security Advisory: DSA-5103-1 (Medium)
    • 148324 Debian Security Advisory: DSA-5105-1 (Medium)
    • 148355 Debian Security Advisory: DSA-5107-1 (High)
    • 148362 Debian Security Advisory: DSA-5108-1 (Medium)
    • 148369 Debian Security Advisory: DSA-5109-1 (Medium)
    • 148361 Debian Security Advisory: DSA-5111-1 (Medium)
    • 148330 Debian Security Advisory: DSA-5113-1 (Medium)
    • 148413 ELSA-2021-4153: dnsmasq security and bug fix update (Medium)
    • 148286 ELSA-2022-1045: httpd security update (High)
    • 148294 ELSA-2022-1049: httpd:2.4 security update (High)
    • 148297 ELSA-2022-1065: openssl security update (Medium)
    • 148310 ELSA-2022-1066: openssl security update (Medium)
    • 148285 ELSA-2022-1069: expat security update (High)
    • 148295 ELSA-2022-1198: kernel security, bug fix, and enhancement update (Medium)
    • 148299 ELSA-2022-1284: firefox security update (Medium)
    • 148290 ELSA-2022-1287: firefox security update (Medium)
    • 148291 ELSA-2022-1301: thunderbird security update (Medium)
    • 148298 ELSA-2022-1302: thunderbird security update (Medium)
    • 148411 ELSA-2022-1440: java-11-openjdk security, bug fix, and enhancement update (Medium)
    • 148407 ELSA-2022-1442: java-11-openjdk security update (Medium)
    • 148410 ELSA-2022-1445: java-17-openjdk security and bug fix update (Medium)
    • 148412 ELSA-2022-1487: java-1.8.0-openjdk security, bug fix, and enhancement update (Medium)
    • 148414 ELSA-2022-1491: java-1.8.0-openjdk security update (Medium)
    • 148287 ELSA-2022-9225: openssl security update (Medium)
    • 148301 ELSA-2022-9233: openssl security update (Medium)
    • 148305 ELSA-2022-9237: openssl security update (Medium)
    • 148312 ELSA-2022-9239: cyrus-sasl security update (Medium)
    • 148289 ELSA-2022-9240: libtpms security update (Medium)
    • 148317 ELSA-2022-9243: openssl security update (Medium)
    • 148311 ELSA-2022-9244: Unbreakable Enterprise kernel security update (High)
    • 148313 ELSA-2022-9245: Unbreakable Enterprise kernel-container security update (High)
    • 148288 ELSA-2022-9246: openssl security update (Medium)
    • 148308 ELSA-2022-9249: openssl security update (Medium)
    • 148314 ELSA-2022-9255: openssl security update (Medium)
    • 148318 ELSA-2022-9257: httpd security update (High)
    • 148296 ELSA-2022-9258: openssl security update (Medium)
    • 148292 ELSA-2022-9260: Unbreakable Enterprise kernel security update (Medium)
    • 148303 ELSA-2022-9263: libgcrypt security update (Medium)
    • 148315 ELSA-2022-9264: Unbreakable Enterprise kernel security update (Medium)
    • 148309 ELSA-2022-9265: Unbreakable Enterprise kernel-container security update (Medium)
    • 148300 ELSA-2022-9266: Unbreakable Enterprise kernel security update (Medium)
    • 148306 ELSA-2022-9267: Unbreakable Enterprise kernel-container security update (Medium)
    • 148293 ELSA-2022-9270: Unbreakable Enterprise kernel security update (Medium)
    • 148307 ELSA-2022-9271: Unbreakable Enterprise kernel-container security update (Medium)
    • 148304 ELSA-2022-9272: openssl security update (Medium)
    • 148302 ELSA-2022-9273: Unbreakable Enterprise kernel security update (High)
    • 148316 ELSA-2022-9274: Unbreakable Enterprise kernel-container security update (High)
    • 148408 ELSA-2022-9276: httpd:2.4 security update (Medium)
    • 148409 ELSA-2022-9313: Unbreakable Enterprise kernel security update (High)
    • 148406 ELSA-2022-9314: Unbreakable Enterprise kernel-container security update (High)
    • 148221 RHSA-2022:0970: java-1.8.0-ibm security update (Low)
    • 148224 RHSA-2022:1045: httpd security update (Medium)
    • 148219 RHSA-2022:1049: httpd:2.4 security update (Medium)
    • 148227 RHSA-2022:1065: openssl security update (Medium)
    • 148223 RHSA-2022:1066: openssl security update (Medium)
    • 148229 RHSA-2022:1069: expat security update (Medium)
    • 148222 RHSA-2022:1073: openssl security update (Medium)
    • 148220 RHSA-2022:1173: httpd security update (Medium)
    • 148225 RHSA-2022:1185: kpatch-patch security update (Medium)
    • 148218 RHSA-2022:1198: kernel security, bug fix, and enhancement update (Medium)
    • 148228 RHSA-2022:1199: kernel-rt security and bug fix update (Medium)
    • 148230 RHSA-2022:1284: firefox security update (Medium)
    • 148226 RHSA-2022:1287: firefox security update (Medium)
    • 148379 RHSA-2022:1301: thunderbird security update (Medium)
    • 148378 RHSA-2022:1302: thunderbird security update (Medium)
    • 148377 RHSA-2022:1309: expat security update (Medium)
    • 148417 RHSA-2022:1417: kernel security update (Medium)
    • 148416 RHSA-2022:1440: java-11-openjdk security, bug fix, and enhancement update (Medium)
    • 148415 RHSA-2022:1442: java-11-openjdk security update (Medium)
    • 148418 RHSA-2022:1445: java-17-openjdk security and bug fix update (Medium)
    • 148243 [USN-5313-2] OpenJDK 11 regression (Medium)
    • 148239 [USN-5321-3] Firefox regressions (Medium)
    • 148231 [USN-5335-1] ImageMagick vulnerabilities (Medium)
    • 148232 [USN-5337-1] Linux kernel vulnerabilities (Medium)
    • 148233 [USN-5338-1] Linux kernel vulnerabilities (Medium)
    • 148234 [USN-5339-1] Linux kernel vulnerabilities (Medium)
    • 148240 [USN-5342-1] Python vulnerabilities (Medium)
    • 148235 [USN-5343-1] Linux kernel vulnerabilities (Medium)
    • 148236 [USN-5345-1] Thunderbird vulnerabilities (Medium)
    • 148237 [USN-5346-1] Linux kernel (OEM) vulnerability (Medium)
    • 148238 [USN-5347-1] OpenVPN vulnerability (Medium)
    • 148244 [USN-5350-1] Chromium vulnerability (Medium)
    • 148241 [USN-5351-1] Paramiko vulnerability (Medium)
    • 148242 [USN-5353-1] Linux kernel (OEM) vulnerability (Medium)
    • 148245 [USN-5355-1] zlib vulnerability (Medium)
    • 148246 [USN-5355-2] zlib vulnerability (Medium)
    • 148247 [USN-5357-1] Linux kernel vulnerability (Medium)
    • 148251 [USN-5357-2] Linux kernel vulnerability (Medium)
    • 148248 [USN-5358-1] Linux kernel vulnerabilities (Medium)
    • 148252 [USN-5358-2] Linux kernel vulnerabilities (Medium)
    • 148249 [USN-5359-1] rsync vulnerability (Medium)
    • 148250 [USN-5360-1] Tomcat vulnerabilities (Medium)
    • 148253 [USN-5361-1] Linux kernel vulnerabilities (Medium)
    • 148254 [USN-5362-1] Linux kernel (Intel IOTG) vulnerabilities (Medium)
    • 148255 [USN-5364-1] Waitress vulnerability (Medium)
    • 148256 [USN-5368-1] Linux kernel vulnerabilities (Medium)
    • 148257 [USN-5369-1] oslo.utils vulnerability (Medium)
    • 148258 [USN-5370-1] Firefox vulnerabilities (Medium)
    • 148380 [USN-5372-1] Subversion vulnerabilities (Medium)
    • 148259 [USN-5373-1] Django vulnerabilities (Medium)
    • 148260 [USN-5373-2] Django vulnerabilities (Medium)
    • 148261 [USN-5374-1] libarchive vulnerability (Medium)
    • 148381 [USN-5376-1] Git vulnerability (Medium)
    • 148424 [USN-5376-2] Git vulnerability (Medium)
    • 148382 [USN-5377-1] Linux kernel (BlueField) vulnerabilities (Medium)
    • 148383 [USN-5378-1] Gzip vulnerability (Medium)
    • 148384 [USN-5378-2] XZ Utils vulnerability (Medium)
    • 148385 [USN-5378-3] XZ Utils vulnerability (Medium)
    • 148386 [USN-5378-4] Gzip vulnerability (Medium)
    • 148420 [USN-5381-1] Linux kernel (OEM) vulnerabilities (Medium)
    • 148419 [USN-5382-1] libinput vulnerability (Medium)
    • 148421 [USN-5383-1] Linux kernel vulnerabilities (Medium)
    • 148422 [USN-5384-1] Linux kernel vulnerabilities (Medium)
    • 148423 [USN-5385-1] Linux kernel vulnerabilities (Medium)
    • 148426 [USN-5388-1] OpenJDK vulnerabilities (Medium)
    • 148425 [USN-5388-2] OpenJDK vulnerabilities (Medium)
  • Includes several fixes and enhancements to the scanning engine and existing vulnerability checks.

Frontline NIRV Scanner

Version 3.0.97.1

May 4, 2022

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 148448 Amazon Linux 2 Security Advisory: ALAS-2022-1773 (Low)
  • 148447 Amazon Linux 2 Security Advisory: ALAS-2022-1774 (Medium)
  • 148446 Amazon Linux Security Advisory: ALAS-2022-1580 (Low)
  • 148445 Amazon Linux Security Advisory: ALAS-2022-1581 (Medium)
  • 148390 Apache HTTP Server 2.4.53 Security Release (High)
  • 148392 Atlassian Jira Remote Code Execution (RCE) Vulnerability (Medium)
  • 148391 Atlassian Jira Stored Cross-Site Scripting (SXSS) Vulnerability (Low)
  • 148466 Azul Zulu Critical Patch Update: APRIL-2022 (High)
  • 148457 Cisco Security Advisory: CISCO-SA-APPNAV-XE-DOS-J5MXTR4 (High)
  • 148456 Cisco Security Advisory: CISCO-SA-C9800-CAPWAP-MDNS-6PSN7GKU (High)
  • 148455 Cisco Security Advisory: CISCO-SA-C9800-FNF-DOS-BOL5VLGE (High)
  • 148454 Cisco Security Advisory: CISCO-SA-C9800-SNMP-TRAP-DOS-MJENT3EY (High)
  • 148463 Cisco Security Advisory: CISCO-SA-CDB-CMICR-VULNS-KJJFTNB (Medium)
  • 148453 Cisco Security Advisory: CISCO-SA-CGR1K-AP-DOS-MSZR4QVH (Medium)
  • 148462 Cisco Security Advisory: CISCO-SA-EWLC-PRIV-ESC-YBVHKO5 (High)
  • 148461 Cisco Security Advisory: CISCO-SA-HTTP-DOS-SVODKDBS (High)
  • 148452 Cisco Security Advisory: CISCO-SA-IOSXE-PRIV-ESC-GRBTUBU (High)
  • 148460 Cisco Security Advisory: CISCO-SA-IOSXE-RPKI-DOS-2EGCNEKE (Medium)
  • 148451 Cisco Security Advisory: CISCO-SA-IOX-YUXQ6HFJ (High)
  • 148459 Cisco Security Advisory: CISCO-SA-NCOSSH-DOS-ZAKFODQ8 (High)
  • 148450 Cisco Security Advisory: CISCO-SA-QFP-IPSEC-GQMQVTQV (Medium)
  • 148458 Cisco Security Advisory: CISCO-SA-WEBUIAPI-INJ-NYRQ92OD (High)
  • 148400 DNS Forwarders - Cache Poisoning Vulnerability (Medium)
  • 148393 Drupal Security Advisory SA-CORE-2022-005 (Medium)
  • 148394 Drupal Security Advisory SA-CORE-2022-006 (Medium)
  • 148413 ELSA-2021-4153: dnsmasq security and bug fix update (Medium)
  • 148411 ELSA-2022-1440: java-11-openjdk security, bug fix, and enhancement update (Medium)
  • 148407 ELSA-2022-1442: java-11-openjdk security update (Medium)
  • 148410 ELSA-2022-1445: java-17-openjdk security and bug fix update (Medium)
  • 148412 ELSA-2022-1487: java-1.8.0-openjdk security, bug fix, and enhancement update (Medium)
  • 148414 ELSA-2022-1491: java-1.8.0-openjdk security update (Medium)
  • 148408 ELSA-2022-9276: httpd:2.4 security update (Medium)
  • 148409 ELSA-2022-9313: Unbreakable Enterprise kernel security update (High)
  • 148406 ELSA-2022-9314: Unbreakable Enterprise kernel-container security update (High)
  • 148438 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.127 (High)
  • 148468 Google Chrome: Multiple Vulnerabilities in Versions Less Than 101.0.4951.41 (High)
  • 148402 ISC BIND Security Advisory March 2022 (Medium)
  • 148465 Java Critical Patch Update - CPU-APRIL-2022 (High)
  • 148404 Joomla! Core Security Advisory March 2022: Multiple Vulnerabilities in Versions 2.5.0-3.10.6 and 4.0.0-4.1.0 (High)
  • 148405 Joomla! Core Security Advisory March 2022: Multiple Vulnerabilities in Versions 3.7.0-3.10.6 (Medium)
  • 148403 Joomla! Core Security Advisory March 2022: Multiple Vulnerabilities in Versions 4.0.0-4.1.0 (Medium)
  • 148439 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 100.0.1185.44 (High)
  • 148388 Netgear Router Authentication Bypass (High)
  • 148395 OpenSSH Security Advisory (Low)
  • 148396 OpenSSL Security Advisory March 2022 (High)
  • 148397 Oracle Database Critical Patch Update: April 2022 (High)
  • 148399 Oracle MySQL Critical Patch Update: April 2022 (High)
  • 148398 Oracle WebLogic Critical Patch Update: April 2022 (High)
  • 148449 Palo Alto PAN-OS Security Advisory: PAN-164264 (Medium)
  • 148417 RHSA-2022:1417: kernel security update (Medium)
  • 148416 RHSA-2022:1440: java-11-openjdk security, bug fix, and enhancement update (Medium)
  • 148415 RHSA-2022:1442: java-11-openjdk security update (Medium)
  • 148418 RHSA-2022:1445: java-17-openjdk security and bug fix update (Medium)
  • 148427 Solaris Security Patch: (150383-29): SunOS 5.10: wanboot patch (Medium)
  • 148428 Solaris Security Patch: (151912-20): SunOS 5.10: OpenSSL 1.0.2 patch (Medium)
  • 148429 Solaris Security Patch: (151913-20): SunOS 5.10_x86: OpenSSL 1.0.2 patch (Medium)
  • 148430 Solaris Security Patch: (152643-13): SunOS 5.10: Apache 2.4 Patch (Medium)
  • 148431 Solaris Security Patch: (152644-13): SunOS 5.10_x86: Apache 2.4 Patch (Medium)
  • 148432 Solaris Security Patch: (153260-41): JavaSE 7: update 341 patch (equivalent to JDK 7u341) (Medium)
  • 148433 Solaris Security Patch: (153261-41): JavaSE 7: update 341 patch (equivalent to JDK 7u341), 64bit (Medium)
  • 148434 Solaris Security Patch: (153262-41): JavaSE 7_x86: update 341 patch (equivalent to JDK 7u341) (Medium)
  • 148435 Solaris Security Patch: (153263-41): JavaSE 7_x86: update 341 patch (equivalent to JDK 7u341), 64bit (Medium)
  • 148436 Solaris Security Patch: (153264-31): JavaSE 8: update 331 patch (equivalent to JDK 8u331), 64bit (Medium)
  • 148437 Solaris Security Patch: (153265-31): JavaSE 8_x86: update 331 patch (equivalent to JDK 8u331), 64bit (Medium)
  • 148401 TCP/IP DoS Vulnerability From Specifically Crafted Packets (High)
  • 148444 wnpa-sec-2022-01: Security Update Available for Wireshark (High)
  • 148443 wnpa-sec-2022-02: Security Update Available for Wireshark (Medium)
  • 148442 wnpa-sec-2022-03: Security Update Available for Wireshark (Medium)
  • 148441 wnpa-sec-2022-04: Security Update Available for Wireshark (High)
  • 148440 wnpa-sec-2022-05: Security Update Available for Wireshark (Medium)
  • 148464 Zoom Client Zip Bombing Vulnerability (High)
  • 148424 [USN-5376-2] Git vulnerability (Medium)
  • 148420 [USN-5381-1] Linux kernel (OEM) vulnerabilities (Medium)
  • 148419 [USN-5382-1] libinput vulnerability (Medium)
  • 148421 [USN-5383-1] Linux kernel vulnerabilities (Medium)
  • 148422 [USN-5384-1] Linux kernel vulnerabilities (Medium)
  • 148423 [USN-5385-1] Linux kernel vulnerabilities (Medium)
  • 148426 [USN-5388-1] OpenJDK vulnerabilities (Medium)
  • 148425 [USN-5388-2] OpenJDK vulnerabilities (Medium)
Fixes
  • Updated Vulnerability Descriptions:
    • 148272 Apple iTunes: Multiple Vulnerabilities in Versions Less Than 12.12.3 (High)
    • 148376 APSB22-14: Security Updates Available for Adobe Photoshop CC (High)
    • 148374 APSB22-16: Security Updates Available for Adobe Acrobat and Reader (High)
    • 148375 APSB22-20: Security Updates Available for Adobe Photoshop CC (High)
    • 148263 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.60 (High)
    • 148262 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.75 (High)
    • 148264 Google Chrome: Multiple Vulnerabilities in Versions Less Than 100.0.4896.88 (High)
    • 148268 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 100.0.1185.29 (High)
    • 148266 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 100.0.1185.36 (High)
    • 148265 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 99.0.1150.46 (High)
    • 148267 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 99.0.1150.55 (High)
    • 148269 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 99 (High)
    • 148270 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 97.8 (High)
    • 148271 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 91.8 (High)
    • 148321 MS22-APR: Microsoft .NET Security Update (Medium)
    • 148320 MS22-APR: Microsoft Office Security Update (High)
    • 148322 MS22-APR: Microsoft Sharepoint Server Security Update (Medium)
    • 148319 MS22-APR: Microsoft Windows Security Update (High)
    • 102095 Wordpress Detected (Info)

Back to Top

 

Digital Guardian


Agent for Windows

Version: 7.7.6

May, 2022

Fixes
  • DG failed to detect an NTU when a file greater than 1MB was uploaded to Google Drive. The DG WIP proxy script pack has been updated so that NTU actions are detected when large files are uploaded to Google Drive.

  • A timing issue around when a process acquires or creates an item to monitor in the Windows Registry cause certain rule evaluation to fail when acquiring that registry item. DG resolved the timing issue.

  • Changes were made to the DG Web Inspection Proxy (DG WIP) to expedite the processing of a serverinitiated connection close. This fixed an issue with some authenticated web connections when the web server was configured to close the initial connection that did not start the authentication negotiation.

  • When a customer used drag and drop to move some text from a classified file to the body of a Microsoft Outlook email message and then sent the email, the Send Mail event does not show that the message body was classified. DG resolved this so that in the drag and drop scenario, a Send Mail event is shown in the Local Forensic report with the permanent classified tag that was applied to the file the text was dragged from.

  • When DG Agent monitored connections originating from a third-party proxy using the wipThirdPartyProxyExec configuration setting, the Agent did not fall back to the standard monitoring

  • mechanism of monitoring browser-originated connections when the proxy process was stopped, resulting in loss of web visibility. DG now provides a fallback mechanism when wipThirdPartyProxyExec is configured and the third-party proxy process is stopped.

  • In an environment using roaming profiles, a customer wanted document properties for MIP support to be processed on network shares and consequently enabled the option to "Classify files on network shares" — <classifyFileOnNetworkShare<1>/classifyFileOnNetworkshare> — in a custom configuration resource file. When attempting to perform a Save or Save As operation from a Microsoft Office application, the customer encountered a very long delay before the operation was completed. DG resolved this issue with changes to the DG Agent code.

  • If you cut and pasted text from a classified file to a draft email in Microsoft Outlook and then attempted to print the draft, any control rules set up to block the print operation based on the classification tags failed to trigger. DG Agent code has been altered so that rules trigger and the print operation gets blocked based on the classification tags.

  • Internal websites using an IP address to reference a server that had a proxy in front of it were prevented from loading even though domain flags had been applied to the IP addresses of the sites so DG WIP would bypass them. This occurred on Google Chrome, Microsoft Edge, and Mozilla Firefox. DG resolved this issue with changes to the DG Agent code.

  • In a very few cases, DGMCs managed by DG MSP showed orphan tags, policies, and rules as unknown. To assist the affected customers, DG implemented a utility MSP can use to remove unknown tags so they do not get shown in the DGMC.

  • When copying and pasting files to local desktop computers from VDI machines running DG on VMware Horizon, file transfer worked properly on DG connections to VMware Horizon using RDP, but hangs occurred before copying the file on DG connections using VMware Blast or PCoIP. DG now optimizes requests during close to reduce overhead in VMware Blast or PCoIP.

  • If a user attempted to modify the Implicit Filter XML file when Tamper Resistant Mode was active, the change would not be completed. Specifically, the new impflt.xml file would be downloaded to the DG Agent, but the new impflt.bin file would not be generated. The issue was resolved with a code change.

  • A computer running the DG Agent shut down unexpectedly when a signaled event was missed due to a race condition that occurred during an unmount of a removable volume. The issue would occur when the system monitor (sysmon) driver was running and monitoring any deletes on the removable volume. This was addressed with changes to the DG Agent driver.

Version: 7.8.0

May, 2022

New Features
  • MIP Enhancements:

    DG Agent for Windows 7.8 extends the Digital Guardian Microsoft Information Protection (MIP) feature toenable the Agent to apply MIP labels when file operations such as file copy, file move, and network transfer download violate (trigger) control rules on files transferred to or from sensitive locations. This pertains to files sourced from a known sensitive location and moved onto the local system and files sourced from the local system and moved to a sensitive network location. This enhancement helps ensure appropriate controls can be applied to documents kept in sensitive locations. You can enable DLP rules from the MIP Policy Pack or create control rules for this purpose in the DGMC or manually.

    For details about applying MIP labels, refer to "User Classification With MIP" in Digital Guardian Management Console User's Guide.

  • MIP SDK Version Update:

    DG has updated its MIP SDK version to 1.11.72.

  • Core DLP Support for IPv6 Traffic:

    The DG Agent for Windows 7.8 release adds core DLP support for IPv6 traffic as it is added to the customer's network. Currently, support is provided in DG WIP, including domain flag support for IPv6 addresses and domains resolving to them, and visibility and control of NTUs and NTDs resolving to IPv6. In both cases, DG support for IPv4 has been maintained.

    In addition, the constOpNetworkEx symbolic constant is supported in rules targeting URL-based activities, but support is not provided yet for using IPv6 addresses in rules and component lists or in URL-based network operation events (events that block access to IPv6 addresses). IPv6 reporting is now included in the DG ARC and DGMC consoles.

  • DG WIP Auto-Skip Enhancements

    DG added support for new types of DG WIP auto-skip websites to the 7.8 Agent for Windows and the 8.2 Agent for macOS to resolve website incompatibilities. (The DG WIP auto-skip feature will be supported in a future release of the Agent for Linux.) These Agents generate WIP Auto Skip Domain Detected operational alerts with a code that identifies the reason the website is eligible to be auto-skipped. If auto-skip is enabled, DG WIP automatically skips the inspection of those websites. The currently supported reason codes are:

    • "mtls" — Indicates sites that attempt to use mTLS client certification authentication

    • "tls-reneg — Indicates sites that attempt to use TLS renegotiation

    • "imp"— Indicates sites where access is blocked by CDN or WAF security rules (since 7.7.4 Agent for Windows)

    • "cf" — Indicates sites where access is blocked by CDN or WAF security rules (since 7.7.3 Agent for Windows)

    The following example shows the "mtls" reason code used in op alerts generated when a website attempts to use mTLS client certificate authentication:

    wip automatic skip eligible domain detected: "example.com" reason:"mtls"

    For more information, refer to "Digital Guardian Web Inspection Proxy" in Digital Guardian Installation and Upgrade Guide.

  • Auto-Detection of NTUs and NTDs for Certain Non-Browser Applications

    DG WIP can now auto-detect NTUs and NTDs for applications that use different process IDs to perform network operations and file operations. The MPO_USE_CASSINI (CASS) process flag forces an application’s network traffic to go through DG WIP. When applied in conjunction with other DG flags and settings, the CASS flag enables DG WIP to generate NTUs and NTDs for certain non-browser applications. This has been validated with Microsoft Teams and Slack.

    You must apply configuration changes to enable DG WIP to generate NTUs and NTDs for these applications. For details, refer to "Generating NTUs and NTDs for Non-Browser Apps" in Digital Guardian Installation and Upgrade Guide.

Fixes
  • DG failed to detect an NTU when a file greater than 1MB was uploaded to Google Drive. The DG WIP proxy script pack has been updated so that NTU actions are detected when large files are uploaded to Google Drive.

  • A timing issue around when a process acquires or creates an item to monitor in the Windows Registry cause certain rule evaluation to fail when acquiring that registry item. DG resolved the timing issue.

  • Changes were made to the DG Web Inspection Proxy (DG WIP) to expedite the propagation of a connection close initiated by a web server to the paired browser connection. This fixed an issue with some authenticated web connections when the web server was configured to close the initial connection that did not start the authentication negotiation.

  • When a customer used drag and drop to move some text from a classified file to the body of a Microsoft Outlook email message and then sent the email, the Send Mail event does not show that the message body was classified. DG resolved this so that in the drag and drop scenario, a Send Mail event is shown in the Local Forensic report with the permanent classified tag that was applied to the file the text was dragged from.

  • When DG Agent monitored connections originating from a third-party proxy using the wipThirdPartyProxyExec configuration setting, the Agent did not fall back to the standard monitoring mechanism of monitoring browser-originated connections when the proxy process was stopped, resulting in loss of web visibility. DG now provides a fallback mechanism when wipThirdPartyProxyExec is configured and the third-party proxy process is stopped.

  • In an environment using roaming profiles, a customer wanted document properties for MIP support to be processed on network shares and consequently enabled the option to "Classify files on network shares" — <classifyFileOnNetworkShare<1>/classifyFileOnNetworkshare> — in a custom configuration resource file. When attempting to perform a Save or Save As operation from a Microsoft Office application, the customer encountered a very long delay before the operation was completed. DG resolved this issue with changes to the DG Agent code.

  • If you cut and pasted text from a classified file to a draft email in Microsoft Outlook and then attempted to print the draft, any control rules set up to block the print operation based on the classification tags failed to trigger. DG Agent code has been altered so that rules trigger and the print operation gets blocked based on the classification tags.

  • Internal websites using an IP address to reference a server that had a proxy in front of it were prevented from loading even though domain flags had been applied to the IP addresses of the sites so DG WIP would bypass them. This occurred on Google Chrome, Microsoft Edge, and Mozilla Firefox. DG resolved this issue with changes to the DG Agent code.

  • Attempts to access websites that engage in TLS renegotiation fail because DG intentionally disabled support for TLS renegotiation due to security vulnerabilities. (Note that TLS 1.3 standards no longer support TLS renegotiation.) DG will fail user attempts to access such sites and will generate WIP Auto Skip Domain Detected operational alerts with the "tls-reneg" reason code. Upon noticing this operational alert and based on data egress risk, you can either add a SK domain flag for sites using TLS renegotiation or enable autoskip so the sites will work.

  • DG WIP logging (dgwip.log) was reporting some errors that were not true errors. The logging has been changed to report certain errors as informational.

  • In a very few cases, DGMCs managed by DG MSP showed orphan tags, policies, and rules as unknown. To assist the affected customers, DG implemented a utility MSP can use to remove unknown tags so they do not get shown in the DGMC.

  • DG WIP logging (dgwip.log) was reporting some errors that were not true errors. The logging has been changed to report certain errors as informational.

  • When copying and pasting files to local desktop computers from VDI machines running DG on VMware Horizon, file transfer worked properly on DG connections to VMware Horizon using RDP, but hangs occurred before copying the file on DG connections using VMware Blast or PCoIP. DG now optimizes requests during close to reduce overhead in VMware Blast or PCoIP.

  • DG has resolved a known issue where NTDs of MIP-labeled .pdf files and some other file types were downloaded despite a block control rule because the Agent could not detect the file extension added by the browser. This caused MIP labeling reading to fail, thereby preventing the rule from being triggered.

  • If a user attempted to modify the Implicit Filter XML file when Tamper Resistant Mode was active, the change would not be completed. Specifically, the new impflt.xml file would be downloaded to the DG Agent, but the new impflt.bin file would not be generated. The issue was resolved with a code change.

  • A computer running the DG Agent shut down unexpectedly when a signaled event was missed due to a race condition that occurred during an unmount of a removable volume. The issue would occur when the system monitor (sysmon) driver was running and monitoring any deletes on the removable volume.This was addressed with changes to the DG Agent driver.

Back to Top

 

Document Management (RJS)


SignHere

Version: 1.6.0

May 16, 2022

Enhancements
  • Upgraded Annotation controls.
Fixes
  • Fixed issue where Webdocs Login button would not work unless AutoLogin was on and SignHere was restarted.
  • Fixed issue where annotations were not correctly saved to PDF files when using the Burn feature.

Back to Top

 

IBM Partnership


Backup, Recovery, and Media Service (BRMS)

Version: PTF 7.5 SI78291, 7.4 SI78290, 7.3 SI78289

June 16, 2022

Enhancements

In version 7.3 and later:

  • BRMS recovery report has been enhanced to provide improved reporting for H/A environments. This support will provide a way to generate a single BRMS recovery report using tapes from your backup and production systems in an H/A environment.

  • BRMS using IBM Cloud Storage for i has been enhanced to improve BRMS network support. The purpose of this support is to ensure duplicate volume names are not generated when any system in the BRMS network is in restricted state or when the BRMS network synchronization job is not working.

  • BRMS has been enhanced with new SQL services for the BRMS log, media library management, and backup control group information.

  • Enhancements have been made in BRMS to change the GUI only control group attributes for Allow activity overrides, Allow retention overrides, Lotus servers, Integrated Windows servers, and Guest partitions. See the BRMS wiki for more information.

  • BRMS can migrate control groups that contained GUI-generated omits to use object list omits. This function is not the default behavior but can be enabled before using the WRKCTLGBRM *BKU option 3 (Copy). See the BRMS wiki for more information

Fixes

In version 7.3 and later:

  • Issue where parallel backups may report message MSGMCH0601 fixed.

  • Issue where a RSTOBJBRM(*ALL) operation may not restore all the objects which were backed up beginning with the valid naming character $ fixed.

  • DLTLICPGM 5770BR1 fails with message MSGCPF2407 issue fixed.

  • Fixed problem with Control groups QNFSIPLFUL and QNFSIPLINC failing to backup the image catalog directories correctly using the control group attribute IPL after backup *YES.

  • Fixed the function to force an IPL when the control group ended with MSGCPF1099 using data area Q1AIPLSUB and did not IPL when using the control group attribute IPL after backup *NO.

  • Control group backup with IFS (*LINK or link lists) fails with MSGBRM2330 Error number RC3525 issue fixed.

  • Issue with the missed object policy generating an invalid missed objects link list when more than 300 IFS objects fail during the backup fixed.

Version 7.5

May 12, 2022

New Features
  • IBM i implemented changes to improve the consistency with the underlying authority required for operational functionality. With respect to BRMS, these changes include:

    • The default authority for BRMS shipped functional usage is changing from default authority *ALLOWED to *DENIED. Use the SETUSRBRM command as a starting point to grant system operators and administrators access to BRMS functions and components. Then use the functional usage model to customize access by user.

    • The default assigned to the database shipped with BRMS is changing from *PUBLIC *USE authority to *PUBLIC *EXCLUDE.

    • The data authority for BRMS shipped flight recording is changing from data authority *RWX to *WX.

  • BRMS is introducing SQL Service interfaces as a new way to view, order, and subset BRMS information.

  • VTL iSCSI attached device support.

  • New support for Ultrium 9 (LTO9) tape drives and media.

Enhancements
  • Enhancements to Backup and Restore include:
    • The default for the Save Object using BRM (SAVBRM) command parameter Asynchronous bring (ASYNCBRING) is changing from *NO to *YES to match the SAV command default.

    • Backup control group support for IFS backups using SAVACTOPT(*ALWCHKPWRT)and SAVACTOPT(*ALL).

    • Backup control group entry support for Save active message queue library.

    • RSTLIBBRM has been enhanced with the STRJRN() and SELECT() parameters.

    • RSTOBJBRM has been enhanced with the STRJRN() parameter.

  • Media Service enhancements include:

    • WRKMEDBRM has been enhanced to select multiple From locations and multiple Media class names.

    • WRKMEDBRM has been enhanced to support OUTPUT(*OUTFILE)and OUTPUT(*OUTSTMF).

    • The Work with Media using BRM (WRKMEDBRM) parameter Select volumes(TYPE) special value *BOTH has been removed and is replaced by special value *ALL.

  • Reporting and Logging enhancements:

    • Recovery report (QP1ARCY) steps have been enhanced to include cloud recovery support for Network Install Using Network File System(NFS) and using DSI VTL iSCSI attached devices.

    • PRTRPTBRM has been enhanced with an EXPDATE() parameter to select which records to include in the report.

    • DSPLOGBRM has been enhanced to support OUTPUT(*OUTFILE)and OUTPUT(*OUTSTMF).

  • Enhancements to BRMS Policies:

    • WRKPCYBRM *SYS option for BRMS to include all messages that occur during BRMS command processing in the BRMS log.

    • WRKPCYBRM *RCY option for check the size of the restore.

    • WRKPCYBRM *BKU option for automatic virtual volume attributes.

    • The Work with Policies using BRM (WRKPCYBRM) TYPE(*BKU) default value for Asynchronous bring is changing from *NO to *YES to match the Save Object (SAV) command.

  • API and Exit Program enhancements include:

    • Reclaim Media (Q1ARCLMED) API gives users the ability to programmatically reclaim a single tape volume.

    • Change Control Group Attributes (Q1ACHGCGA) API enables users to change programmatically the control group attributes.

    • Control Group exit program support for new format BKUI0200.

    • APIs have a default assigned functional authority of *DENIED.

       


IBM PowerHA SystemMirror for IBM i

Version 7.5 HA 5.0.1, PTF SI78996 (plus Language PTFs)
Included in PTF Group SF99676 750 High Availability for IBM i - level 1

May 12, 2022

Enhancements
  • The PowerHA SystemMirror for i offering is simplified to have a single edition containing all functionality. When upgrading from a prior release, if 5770HAS option 1 was not installed, the manual installation of 5770HAS Option 1 will be required either before or after the upgrade.

  • PowerHA has been enhanced so that planned switchovers or unplanned failovers will always use the QSYSNOMAX job queue for IASP vary on and off operations regardless of the user initiating the operation.

Fixes
  • Improved the update speed of the CRG recovery domain eligibility after a switchover or failover where replication is not reversed.

  • Resolved an issue where the global status for admin domain attributes shows as unknown instead of the correct value.

  • Improved the QHASM.CLUSTER_NODES SQL service to return 0 rather than null, for a node that has a potential mod level of 0.

  • Resolved an issue in CSM Global Mirror environments where an administrative switchover may not contain data from recent writes resulting in a higher than expected RPO.

  • Resolved an issue where some PowerHA exit programs were left registered when uninstalling PowerHA. These exit programs are now removed as part of uninstalling PowerHA.

  • Resolved an issue where ANZCADPRF may give escape message CPF9801 when user profiles have been removed from the system.

  • Simplified problem determination in a DS8000 environment with improved logging of DSCLI errors.

  • Improved error message when an incorrect node name is given on CRTCRG or ADDCRGNODE.

  • The public authority for several PowerHA programs has changed from *USE to *EXCLUDE. Any users without *ALLOBJ authority may need additional authority to perform PowerHA operations.

  • To improve consistency with the underlying authority required for the functionality, the public authority of the following commands has been changed from *USE to *EXCLUDE:

    • Retrieve Cluster (RTVCLU)

    • Retrieve CRG (RTVCRG)

    • Wrk with Cluster (WRKCLU)

    • Print Admin Dmain MRE (PRTCADMRE)

    • Retrieve ASP Cpy Descriptin (RTVASPCPYD)

    • Retrieve ASP Sessin (RTVASPSSN)

    • Retrieve CSM Sessin (RTVCSMSSN)

    • Retrieve SVC Cpy Descriptin (RTVSVCCPYD)

    • Retrieve SVC Sessin (RTVSVCSSN)

NOTE: PTF update SI78996 requires one or more associated language PTFs. To determine if additional languages you have installed in your environment require a requisite MRI PTF, consult the table of language PTFs in the release cover letter at IBM Support.

Back to Top

 

Insite


Version 3.07

May 3, 2022

  • Updated to log4j 2.17.1 to resolve vulnerabilities.

  • Updated to jQuery 3.5.0 to resolve vulnerabilities

  • Updated to handlebars 4.7.7 to resolve vulnerabilities.

  • Fixed issue with certificate expiration.

  • Openssl version 1.0.2n replaced with version 1.1.1n.

  • Corrupted toml config files are repaired upon upgrade.

Back to Top

 

JAMS


Version: 7.4.462

May 26, 2022

NOTE: The AWSSDK.dll is no longer included with JAMS. Install the AWS SDK if you require this .dll.
New Features
  • Desktop Client
    • Added a new Diagram tab to give a visual representation of all dependencies and preconditions for a Job. It also provides a view of all related Entries, including live updates on the current status.
Enhancements
  • Agents
    • Improved the connection logging for Jobs that run on Agents and resolved connection issues. Also, improved the behavior when canceling a Job on an Agent that has disconnected.
    • Added a new Connect On Demand property to Outgoing Agents to create a connection to the Agent only when Jobs are actively running on it.
    • Added caching to improve performance of the Agent Monitor view. The JAMS Scheduler, Server, and Desktop Client must be updated.
  • Desktop Client
    • Added a new Command Script Sequence Task to run Windows commands in a Sequence Jobs.
    • Enhanced the labels and appearance of the Parameter editor in a Sequence Job for the Submit Job Task, SQL Stored Procedure Task, and Oracle Stored Procedure Task.
    • Added zoom in, zoom out, fit, fill, and overview options in the Sequence Editor and Viewer for better visibility.
    • Added new Skip and Hold options to the right-click menu for the Failure Action Task container in Sequence Job. When one of these options is selected, JAMS will skip/hold all tasks inside the container that can be moved to that new state.
    • Improved the error message when attempting to pass an encrypted parameter from a Sequence Job to a child Job.
  • Installer
    • Updated the requirement from .NET Framework 4.7.2 to 4.8. The JAMS installer will now attempt to install .NET Framework 4.8 if it is not found.
  • Integrations
    • Added a Refresh button to the SQL Stored Procedure, Oracle Stored Procedure, and Banner Procedure Sequence Tasks to refresh the list of parameters on-demand.
    • Updated the integration with Automate Desktop. JAMS 7.4 supports only Automate Desktop 11.6.
    • Added support for SSIS, SSRS, and SQL Agent in SQL Server 2019.
  • Scheduler
    • Updated to the latest version of Rebex (5.5) for improved cryptographic support.
    • Improved system monitoring and management to log when client/server connections reach 75 percent threshold of the configured limit and increased the default limit of concurrent sessions from 100 to 800.
    • Added a security warning in the log for Jobs that run on Agents with unsecure connections.
Fixes
  • Agent
    • Resolved an issue that caused long running Jobs to have Activity Timeout errors.
  • API
    • Improved the api/entry endpoint to avoid "500 Internal Server Error" messages.
    • Resolved an issue that may occur when submitting multiple requests to get the Scheduler status.

  • Desktop Client
    • Resolved issues with encrypted parameters and variables on the History and Monitor views. Also updated encrypted values in the Audit Trail and in Job logs for legacy Agents.

    • Added the Restrict ACL on Export and Restrict ACL on Import configuration settings for improved control of ACL information.
    • Resolved an issue that prevented holding or skipping future Sequence Tasks within a Sequence Job.
    • Improved validation for the S3Download, S3Upload, and S3Session activities in a Workflow Job.

    • Updated the S3 Secret Key, S3 Access Key, and S3 Bucket properties in a Workflow Job to allow using variables instead of hard-coded values.

    • Resolved an issue in the connection settings for connecting to an Azure database.

    • Resolved an issue where a Retry Interval was not applied after a retry attempt when the Retry Count property was set.

    • Resolved an issue where an exception was displayed when overriding a child Job parameter value and submitting a Sequence Job.

  • Integrations
    • Resolved an issue when loading the Banner integration from JAMSDBA.
    • Updated to retain the folder structure when files are recursively uploaded to S3 using Send-JFSItem.
    • Added support for canceling a package with the SSISDirect execution method. This is only supported for packages running the SSIS Catalog.
    • Resolved an issue where SAP Jobs could fail after upgrading. XBP version 3.0 is now used when a version is not specified.
    • Resolved an issue with canceling an SAP Job that had not yet started.
    • Resolved an issue with the GoAnywhere Sequence Integration that could cause the Task to incorrectly report an error.
  • PowerShell

    • Resolved an issue with the Submit-JAMSEntry option where an entry may not be removed from the Monitor view.

  • Scheduler
    • Resolved an issue where an "Agent not found" message was displayed when executing a Job after the Executor service was restarted.
    • Resolved an issue where a Job with a runaway status would not be canceled after failover to a secondary JAMS Scheduler.

    • Resolved an issue where the JAMS Scheduler may become unresponsive when releasing Prerequisite Jobs from within Workflow Jobs.

    • Resolved token errors with long-running Sequence Jobs by automatically refreshing tokens.

    • Resolved an error that could cause the Scheduler service to fail when looking up a parent entry.

  • Web Client
    • Resolved an issue where a template update was not saved for Command Execution Methods.
    • Resolved an issue where a server error may appear when a user tries to log in without Configuration access.
    • Resolved an issue with the contents of the Source tab that may occur when copying Jobs.
    • Updated the Active Directory login to support TLS 1.2.

    • Resolved the parameter display when set through variables.

Back to Top

 

Powertech


BoKS Manager

Version: 8.1 (version update)

May 20, 2022

New Features
  • Support is added for Ubuntu 22.04 (Server Agent only).

Back to Top

 

Robot

Robot HA

Version 13.06

May 23, 2022

  • Robot HA now supports IBM i 7.5.

  • Additional PTFs are needed if syncing from OS 7.5 to 7.4 or 7.3.

    • 7.4=SI76821

    • 7.3=SI76822

  • Clarified messaging when sync jobs cannot save objects.


Back to Top

 

Titus


Titus Classification for Google Workspace (on-premises)

Version 2020.0 SP1 HF9

May 30, 2022

Fixes
  • Resolved an issue where the "on send" event was not working due to an update from Google.

Titus Data Detection Engine

Version 2022.05

May 27, 2022

Version 2022.05

May 27, 2022

New Features
  • Changed name of "GDPR" Catalogue to the "Privacy" Catalogue.

  • Changed CatalogueID to "privacy." Enter privacy for the CatalogueID value when creating a Data Detection Engine Custom Condition.

    • Note: For this release, existing Configurations that use the GDPR CatalogueID of "catalogue_id_gdpr" will be routed to the Privacy Catalogue.

  • The Privacy Catalogue can detect additional data types compared to the previous GDPR Catalogue. New data types include:

    • AddressCount: detects the number of addresses.

    • HealthCount: detects health information such as patient names, diagnosis, medications, and World Health Organization ICD-10 codes.

    • IpCount and Ipv6Count: two new data types to detect IPv4 and IPv6 addresses.

Titus Classification for Outlook Web App (OWA)

Version 2022.1

May 18, 2022

New Features
  • Added Portion Marking feature to enable users to apply classifications to individual portions of an email. This feature is only for customers who purchased a Titus Military License for the Administration Console.

  • This release supports Exchange Server (2016 or 2019) and Exchange Online (Office 365).

Back to Top

Vera

Version 3.20.0

May 2022

New Features
  • Manage access for files that are shared widely to allow one or more other users to be Co-Owners of the file in the SaaS Windows Client and MacOS Client. File Co-Owners are people and/or groups that can receive and grant access requests, share the file and edit it but cannot change the ownership or remove privileges from the owner. Please see the new File Co-Owners section in the Admin Guide.

  • Windows Client - Box Drive - Vera-secured files showing Vera icon

    For Box Drive, the icons of Vera-secured files will show the native application icon (Vera icon) when the Vera Client is installed in the machine.

  • Windows Client - Enable the Keyboard Enter Button on Vera Client Login

    If you are not signed into the Vera client and try to open a Vera-protected document, it prompts you to sign in. While signing in, if you press Enter on the keyboard it will sign you in.

Updates
  • Vera announces end of support for the following applications/versions on MacOS:

    • AutoCAD, AutoCADLT, Reader and Adobe Illustrator version 2019 in the 3.20.0 release.

    • Office 365 version 15.41.0 and earlier in the upcoming 3.20.0 release.

NOTE: For viewing secured PDF files on MacOS, users can use Vera Preview.
  • Vera announces the end-of-life support for OS X Mojave in the upcoming 3.21.0 release.

  • Outlook shim for MacOS in the upcoming 3.21.0 release.

NOTE: For Outlook support, users must upgrade to the Vera JS add-in to continue using Vera with Outlook on a Mac.
Fixes
  • Fixed an issue where MacOS users with Vera Client installed cannot open and edit unsecured PPT files in SharePoint online.

  • Fixed an issue where after installing the SharePoint add-in application, Vera considered normal HTML files (not Vera-secured files) as Vera-secured files and displayed an error when opening the file.

  • Fixed an issue where the Vera icon may not display for Dropbox under certain special conditions.

  • Fixed an issue where there is a discrepancy in the file name when the file is opened in a browser and in a default application. Vera improved the handling of renamed files when viewing in the browser. Files that have been renamed in the local file system or in SharePoint and subsequently opened using the browser will be noted as such in the file details page.

  • Fixed a bug where in some situations, users with privileges to modify the access of multiple files were not able to do so.

Back to Top