Release notes
| Version | 5.10.1 |
|---|---|
| Release date | 27 June 2024 |
| Scope | Focused security enhancement and other product stability bug fixes. |
Making sure to check out the Known Limitations
New Features, Improvements and Enhancements
| Details | |
|---|---|
| Upgrade data at-rest encryption algorithm | Improved security by upgrading the at-rest encryption algorithm to AES (Advanced Encryption Standard). Sensitive data stored in the system will now be protected using AES encryption algorithm, enhancing the confidentiality and integrity. |
| New OS support | Add support for Ubuntu 22.04 |
| New SBOM detection mechanism | SBOM technology introduces enhanced capabilities for analyzing and detecting license issues to gain deeper insights into the licensing status of the software components they use, ensuring compliance and minimizing legal risks. It offers an improved interface describing the license analyzing and detailed reports. |
| Usability enhancements / changes |
|
| Performance improvements |
|
| Able to set External Scanner as mandatory engine | Introduced the capability to make External Scanners a mandatory engine for scanning processes. Users can now tailor their scanning process by designating External Scanner as a required engine. |
| New default workflow rule | Introducing a new workflow rule for streamlining the integration with the product MetaDefender Software Supply Chain. |
| Security improvements | Upgraded to OpenLDAP v2.5.17 for vulnerability fix. |
| Docker environment: Able to upgrade the application with a database password containing specific characters | Users will not encounter difficulty when attempting to upgrade MD Core on Docker even if their database password contained specific characters:
|
| Cloud K8S environment: Skip checking available disk space on database instance when lacking of super-user permission | Previously, MD Core performed an upgrade process that required verifying the available disk space before proceeding. However, in Azure PostgreSQL and RDS environments, lacking super-user permissions prevented MD Core from performing this upgrade process, causing unnecessary delays and complications. Since disk space can be automatically scaled when necessary in these cloud environments, it is no longer necessary to verify available disk space beforehand. |
| Logging improvements | Reducing size of engineprocess logs. |
| UI updates | Some minor UI changes. |
Bug Fixes
| Details | |
|---|---|
| Improved feature Reuse Processing Result by Hash | Since its introduction in v5.8.0, the "Reuse processing result by hash" feature has provided performance improvement and reduced the processing load for similar files. However, we have identified that this feature may experience slow performance when operating under high load with large database size. This issue is now fixed, and the feature is more stable in v5.10.1. |
| Fixed task release issue upon engine-side timeouts | Addressed an issue where tasks were not being released properly when they timed out on engine side. |
| Addressed leftover temporary file issue in certain circumstances under high load |
|
| Fixes on product stability issues |
|
| Memory leak when request timed out in the queue | Identified a memory leak issue where abandoned resources were not cleaned up when a request timed out in the queue. This issue has been addressed, ensuring that resources are appropriately cleaned up and preventing memory leaks. |
| Fixes on My OPSWAT integration |
|
| Fixes on Non-Persistent mode |
|
| Central Hub: Unabled to create batch | Fixed an issue that client could not create batch to Central Hub |
| Other minor bug fixes | Some UI cosmetics and minor bugs are addressed. |
Known Limitations
| Details | |
|---|---|
| Reuse processing result by hash might be slow in high load situation | Since introduced in v5.8.0, this feature helps improve overall performance and reduce considerable load when processing similar files. However, we have realized this feature might run slowly in high load against large DB size. This issue is addressed in version 5.10.1. |
| Reject importing non-empty required_engines setting in containerized environment | Only happen to containerized environments. If config zip file include non-empty Workaround:
|
| Button "Revert to Default" in Workflow Rule might not work properly | When modifying settings in Workflow Rule, sometimes button "Revert to Default" disappears and cannot work properly. This behavior might be encountered in version 5.5.0. This issue is addressed and resolved in version 5.6.0. |
| Engine Update feature sometimes does not work properly in particular environment | We have observed that the Engine Update feature may not work properly in an environment that is protected by a [Palo Alto firewall](Palo Alto firewall). In log file, you might find this message "SslHandshakeFailedError". In case that upgrading to the latest version of MetaDefender Core does not help, please consider setting up MetaDefender Update Downloader product. This product is responsible for downloading engines, and MetaDefender Core will pick and update its engines from there. |
| UI inconvenience on small resolution screen | MetaDefender Core 5.5.0 introduces a lot of changes for supporting UI accessibility. Unfortunately, this leads to an inconvenience issue when displaying Workflow Rule on small/zoomed-in resolution screen. Some tabs at the bottom of the list will not be displayed properly. Workaround: zooming out a little bit on the browser. This issue is addressed and resolved in version 5.5.1. |
| Performance degradation against big archive files | This issue is addressed and resolved in MD Core v5.5.0 and Archive v6.2.1.
|
| Stability issue when encountering malformed data created by FileType engine | FileType version 6.0.2 sometimes created malformed data. After being written into PostgreSQL database, those malformed data cause negative impacts to MetaDefender Core v5.4.0 or older:
If you encounter similar symptoms, please find the following troubleshooting to resolve the issue: Rectify malformed FileType data in PostgreSQL database This issue is addressed and resolved in version 5.4.1. |
| Stability issues on Red Hat / CentOS with its kernel version 372.13 | MetaDefender Core 5.2.1 or above might not be able to work properly with Red Hat /Cent OS with its kernel 372.13. The vendor Red Hat seems to be fixing the issues with the kernel. Please try upgrading to kernel version 372.26. |
| PostgreSQL and MetaDefender Core services cannot initialize in specific containerized environment | In containerized environment, MetaDefender Core 5.2.0 or newer cannot work properly when:
Workarounds:
|
| MetaDefender Core's NGINX web server will not start if using weak cipher suites for HTTPS | On MetaDefender Core 5.2.0 or newer, OpenSSL 1.x is replaced by OpenSSL 3.x within the product and other dependencies (PostgreSQL, NGINX) as a security improvement, and prevent known vulnerabilities found on OpenSSL 1.x NGINX's OpenSSL 3.x on MetaDefender Core has the enforcement in place to reject all weak cipher suites. It only accepts "HIGH" encryption cipher suites https://www.openssl.org/docs/man1.1.1/man1/ciphers.html (MD5 and SHA1 hashing based will not be accepted as well). As a result, if you already configured MetaDefender Core for HTTPS connection, but using a weak SSL cipher with your certificate, then MetaDefender Core will not be able to start due to NGINX's OpenSSL 3.x enforcement. For prevention and remediation before upgrading MetaDefender Core, learn more at HTTPS Failure on MetaDefender Core 5.2.0 (or newer) |
| The temporary files in the resource folder may not be properly cleaned up if the Archive Extraction engine crashes | Starting from MetaDefender Core version 5.10.1 and onward, when the Archive Extraction engine crashes, MetaDefender Core might not handle this edge case effectively. This could result in temporary files from specific extraction transactions remaining in the resource folder without proper cleanup. However, the likelihood of this issue occurring is relatively low. |
