| Version | 5.10.0 |
|---|---|
| Release date | 21 May 2024 |
| Scope | Focused feature enhancement, security enhancement and other product stability bug fixes. |
Making sure to check out the Known Limitations
New Features, Improvements and Enhancements
| Details | |
|---|---|
| Continuous support for My OPSWAT and Central Management v8 integration | MetaDefender Core is now manageable on My OPSWAT / Central Management v8 for following product functionalities:
|
| Sandbox engine technology name updates |
|
| Workflow rule name change | The default workflow rule for “MetaDefender for Secure Storage” is now renamed to "MetaDefender Storage Security". |
| Export/import supported for YARA rules setting | Managing and sharing Yara rules has never been easier with new export and import functionality. |
| Security improvements |
|
| Base64 decoding improvement | Significantly improved the base64 decoding performance. |
| Usability enhancements / changes |
|
| Performance improvements |
|
| Containerization improvements |
|
| Logging improvements |
|
| UI updates |
|
Bug Fixes
| Details | |
|---|---|
| Addressed leftover temporary file issue in certain circumstances under high load |
|
| Fixes on product stability issues |
|
| Other minor bug fixes | Some UI cosmetics and minor bugs are addressed. |
Known Limitations
| Details | |
|---|---|
| Reuse processing result by hash might be slow in high load situation | Since introduced in v5.8.0, this feature helps improve overall performance and reduce considerable load when processing similar files. However, we have realized this feature might run slowly in high load against large DB size. Working on improving the feature. Stay tuned for next update. |
| Reject importing non-empty required_engines setting in containerized environment | Only happen to containerized environments. If config zip file include non-empty Workaround:
|
| Button "Revert to Default" in Workflow Rule might not work properly | When modifying settings in Workflow Rule, sometimes button "Revert to Default" disappears and cannot work properly. This behavior might be encountered in version 5.5.0. This issue is addressed and resolved in version 5.6.0. |
| Engine Update feature sometimes does not work properly in particular environment | We have observed that the Engine Update feature may not work properly in an environment that is protected by a [Palo Alto firewall](Palo Alto firewall). In log file, you might find this message "SslHandshakeFailedError". In case that upgrading to the latest version of MetaDefender Core does not help, please consider setting up MetaDefender Update Downloader product. This product is responsible for downloading engines, and MetaDefender Core will pick and update its engines from there. |
| UI inconvenience on small resolution screen | MetaDefender Core 5.5.0 introduces a lot of changes for supporting UI accessibility. Unfortunately, this leads to an inconvenience issue when displaying Workflow Rule on small/zoomed-in resolution screen. Some tabs at the bottom of the list will not be displayed properly. Workaround: zooming out a little bit on the browser. This issue is addressed and resolved in version 5.5.1. |
| Performance degradation against big archive files | This issue is addressed and resolved in MD Core v5.5.0 and Archive v6.2.1.
|
| Stability issue when encountering malformed data created by FileType engine | FileType version 6.0.2 sometimes created malformed data. After being written into PostgreSQL database, those malformed data cause negative impacts to MetaDefender Core v5.4.0 or older:
If you encounter similar symptoms, please find the following troubleshooting to resolve the issue: Rectify malformed FileType data in PostgreSQL database This issue is addressed and resolved in version 5.4.1. |
| Stability issues on Red Hat / CentOS with its kernel version 372.13 | MetaDefender Core 5.2.1 or above might not be able to work properly with Red Hat /Cent OS with its kernel 372.13. The vendor Red Hat seems to be fixing the issues with the kernel. Please try upgrading to kernel version 372.26. |
| PostgreSQL and MetaDefender Core services cannot initialize in specific containerized environment | In containerized environment, MetaDefender Core 5.2.0 or newer cannot work properly when:
Workarounds:
|
| MetaDefender Core's NGINX web server will not start if using weak cipher suites for HTTPS | On MetaDefender Core 5.2.0 or newer, OpenSSL 1.x is replaced by OpenSSL 3.x within the product and other dependencies (PostgreSQL, NGINX) as a security improvement, and prevent known vulnerabilities found on OpenSSL 1.x NGINX's OpenSSL 3.x on MetaDefender Core has the enforcement in place to reject all weak cipher suites. It only accepts "HIGH" encryption cipher suites https://www.openssl.org/docs/man1.1.1/man1/ciphers.html (MD5 and SHA1 hashing based will not be accepted as well). As a result, if you already configured MetaDefender Core for HTTPS connection, but using a weak SSL cipher with your certificate, then MetaDefender Core will not be able to start due to NGINX's OpenSSL 3.x enforcement. For prevention and remediation before upgrading MetaDefender Core, learn more at HTTPS Failure on MetaDefender Core 5.2.0 (or newer) |
