Release notes
| Version | 5.11.0 |
|---|---|
| Release date | 31 July 2024 |
| Scope | A major version focusing on new features, security enhancement and stability bug fixes. |
Making sure to check out the Known Limitations
New Features, Improvements and Enhancements
| Details | |
|---|---|
| Multipart uploading support | This feature enhances upload efficiency and reliability for large data transfer.
Multipart uploading support can work with Standalone mode and Shared mode. For Shared mode, client needs to ensure that parts of a file must be sent to 1 MetaDefender Core instance. This mechanism is only compatible with Asynchronous scan, Batch scan and Webhook functionality. REST APIs:
Users can enable this mechanism in Workflow Rule and set a time-to-live for received parts.
|
| Continuous support for My OPSWAT integration | Module Update settings and Data Retention settings are now managed in My OPSWAT product inventory. After enrolled, these settings will be locked on MetaDefender Core management console, and users can only make changes on My OPSWAT console. |
| My OPSWAT integration: PIN code required for configuration edit | Now a PIN code is required for any configuration changes of MetaDefender Core on My OPSWAT console. |
| Central Hub introduces file cancellation | Now Central Hub offers the ability for client to cancel their scan requests submitted to MetaDefender Core instances behind it.
|
| Queue size configuration | Size of the product queue (processing slots) now can be adjusted and defined on management console. Note: setting this size too high could end up a potential risk of overloading MetaDefender Core and affecting the entire scanning service. |
| New hash type: SHA-512 | Introducing support for SHA-512 hash type for enhanced security. You can toggle a new option in Workflow Rule to enable this new hash calculation. |
| Definition age threshold rejection | This release introduces new settings for Metascan thresholds. MetaDefender Core will reject file submission when there are too many outdated AV engines. Error message in this case: "Failed to request scan. Insufficient number of up-to-date anti-malware engines" You can find the settings in Workflow Rule > Metascan, and configure definition age (days) and number of outdated engines.
|
| Login banner | Ability to display a custom notice during login process. You can find and customize the notice in Settings > General. |
| Usability enhancements / changes |
|
| Performance improvements |
|
| Security improvements |
|
| PostgreSQL 15 support (remotely) | MetaDefender Core starts supporting remote PostgreSQL database v15, and now can work with PostgreSQL either v14 or v15. Product does not perform any version upgrade on customer's remote PostgreSQL. Note: The bundled PostgreSQL version remains at v14.11 in this release. |
| Docker enhancements | Prepared v15.7 PostgreSQL CLI tools. |
| Logging improvements |
|
| UI updates |
|
Bug Fixes
| Details | |
|---|---|
| Addressed leftover temporary file issue in certain circumstances under high load | Resolved an issue where temporary files were not cleaned up when the Archive Extraction crashed before MetaDefender Core could send a stop task. |
| Fixes on product stability issues |
|
| Other minor bug fixes | Implemented UI enhancements and resolved minor bugs. |
Known Limitations
| Details | |
|---|---|
| Database connection failure in a particular circumstance after upgrading to v5.11.0 | This issue does not affect all cases when upgrading to v5.11.0. After applying authentication method scram-sha-256 to enhance security for bundled PostgreSQL, a database connection issue starts occurring after upgrade, in a particular circumstance.
We prepare a KB for troubleshooting the issue and bring the system back to work: How to Troubleshoot an Error related to Connection to Database Failing after an Upgrade to v5.11.0? In the following cases, users will not experience the issue:
This issue will be resolved in version 5.11.1. |
| Reuse processing result by hash might be slow in high load situation | Since introduced in v5.8.0, this feature helps improve overall performance and reduce considerable load when processing similar files. However, we have realized this feature might run slowly in high load against large DB size. This issue is addressed in version 5.10.1. |
| Reject importing non-empty required_engines setting in containerized environment | Occurs only in containerized environments. If the config zip file includes non-empty required_engines setting, MetaDefender Core will reject the import. Workaround:
|
| Button "Revert to Default" in Workflow Rule might not work properly | When modifying settings in Workflow Rule, sometimes button "Revert to Default" disappears and cannot work properly. This behavior might be encountered in version 5.5.0. This issue is addressed and resolved in version 5.6.0. |
| Engine Update feature sometimes does not work properly in particular environment | We have observed that the Engine Update feature may not work properly in an environment that is protected by a [Palo Alto firewall](Palo Alto firewall). In log file, you might find this message "SslHandshakeFailedError". In case that upgrading to the latest version of MetaDefender Core does not help, please consider setting up MetaDefender Update Downloader product. This product is responsible for downloading engines, and MetaDefender Core will pick and update its engines from there. |
| UI inconvenience on small resolution screen | MetaDefender Core 5.5.0 introduces a lot of changes for supporting UI accessibility. Unfortunately, this leads to an inconvenience issue when displaying Workflow Rule on small/zoomed-in resolution screen. Some tabs at the bottom of the list will not be displayed properly. Workaround: zooming out a little bit on the browser. This issue is addressed and resolved in version 5.5.1. |
| Performance degradation against big archive files | This issue is addressed and resolved in MD Core v5.5.0 and Archive v6.2.1.
|
| Stability issue when encountering malformed data created by FileType engine | FileType version 6.0.2 sometimes created malformed data. After being written into PostgreSQL database, those malformed data cause negative impacts to MetaDefender Core v5.4.0 or older:
If you encounter similar symptoms, please find the following troubleshooting to resolve the issue: Rectify malformed FileType data in PostgreSQL database This issue is addressed and resolved in version 5.4.1. |
| Stability issues on Red Hat / CentOS with its kernel version 372.13 | MetaDefender Core 5.2.1 or above might not be able to work properly with Red Hat /Cent OS with its kernel 372.13. The vendor Red Hat seems to be fixing the issues with the kernel. Please try upgrading to kernel version 372.26. |
| PostgreSQL and MetaDefender Core services cannot initialize in specific containerized environment | In containerized environment, MetaDefender Core 5.2.0 or newer cannot work properly when:
Workarounds:
|
| MetaDefender Core's NGINX web server will not start if using weak cipher suites for HTTPS | On MetaDefender Core 5.2.0 and later versions, OpenSSL 1.x has been replaced by OpenSSL 3.x within the product and its dependencies (PostgreSQL, NGINX) to enhance security and address known vulnerabilities in OpenSSL 1.x. However, NGINX's implementation of OpenSSL 3.x in MetaDefender Core enforces strong encryption by rejecting all weak cipher suites. It only accepts "HIGH" encryption cipher suites as defined by OpenSSL https://www.openssl.org/docs/man1.1.1/man1/ciphers.html. This means ciphers based on MD5 and SHA1 hashing are no longer supported. Consequently, if you previously configured MetaDefender Core for HTTPS connections using a weak SSL cipher with your certificate, the service will not start due to NGINX's OpenSSL 3.x security enforcement. For prevention and remediation before upgrading MetaDefender Core, learn more at HTTPS Failure on MetaDefender Core 5.2.0 (or newer) |
| The temporary files in the resource folder may not be properly cleaned up if the Archive Extraction engine crashes | Starting from MetaDefender Core version 5.10.1 and onward, when the Archive Extraction engine crashes, MetaDefender Core might not handle this edge case effectively. This could result in temporary files from specific extraction transactions remaining in the resource folder without proper cleanup. However, the likelihood of this issue occurring is relatively low. |
