Release notes
| Version | 5.11.1 |
|---|---|
| Release date | 28 August 2024 |
| Scope | A minor version focused on security enhancements, usability improvements, stability bug fixes, and new features. |
Making sure to check out the Known Limitations
New Features, Improvements and Enhancements
| Details | |
|---|---|
| SBOM generation formats | Now supports two standard formats for SBOM generation:
|
| New statistics in Executive Report | Introduces new settings to filter data by workflow, by user, by source in Executive Report. There is an ability to switch statistics display on file or object.
|
| New visualization for scan queue and allocation | Introduces an updated system health dashboard that offers a new way to visualize scan queue and allocation.
|
| New scan-from-link settings | Introduces Max download queue setting which you can modify number of file downloads at a time for your use case and network. Also introduces pattern validation setting which users define blocklist and allowlist based on link pattern. You can find these in Settings\Security tab. For more details: Scan from link settings |
| Usability enhancements / changes |
|
| Adaptive Sandbox's supported archive file types | The Adaptive Sandbox engine now scans only supported archive file types that are selected by users in Workflow Rules. Nested files within supported archive file types will no longer be scanned by the Adaptive Sandbox engine. This enhancement helps ensure that the Adaptive Sandbox engine focuses on processing relevant files, improving performance and overall system efficiency. |
| Security improvements | Implemented additional validations for administrative configurations and the scan-from-link feature. Addressed vulnerabilities:
|
| Docker enhancements | Allows users to add license comments during activation.
Provides new settings for the On-Premises License Management Server (OLMS) proxy.
|
| Logging improvements |
|
| UI updates |
|
Bug Fixes
| Details | |
|---|---|
| Database connection failure | Resolved a database connection issue that occurred after users upgraded to version 5.11.0. This issue did not affect all cases when upgrading to version 5.11.0. If the application was previously upgraded from version 5.5.1 (or older) to version 5.6.0 (or newer), this issue would occur when users upgraded to version 5.11.0. |
| Fixes on product stability issues |
|
| Other minor bug fixes | Implemented UI enhancements and resolved minor bugs. |
Known Limitations
| Details | |
|---|---|
| Database connection failure in a particular circumstance after upgrading to v5.11.0 | This issue is resolved in version 5.11.1. This issue does not affect all cases when upgrading to v5.11.0. After applying authentication method scram-sha-256 to enhance security for bundled PostgreSQL, a database connection issue starts occurring after upgrade, in a particular circumstance.
We prepare a KB for troubleshooting the issue and bring the system back to work: How to Troubleshoot an Error related to Connection to Database Failing after an Upgrade to v5.11.0? In the following cases, users will not experience the issue:
|
| Reuse processing result by hash might be slow in high load situation | This issue is resolved in version 5.10.1. Since introduced in v5.8.0, this feature helps improve overall performance and reduce considerable load when processing similar files. However, we have realized this feature might run slowly in high load against large DB size. |
| Reject importing non-empty required_engines setting in containerized environment | Occurs only in containerized environments. If the config zip file includes non-empty required_engines setting, MetaDefender Core will reject the import. Workaround:
|
| Button "Revert to Default" in Workflow Rule might not work properly | This issue is resolved in version 5.6.0. When modifying settings in Workflow Rule, sometimes button "Revert to Default" disappears and cannot work properly. This behavior might be encountered in version 5.5.0. |
| Engine Update feature sometimes does not work properly in particular environment | We have observed that the Engine Update feature may not work properly in an environment that is protected by a [Palo Alto firewall](Palo Alto firewall). In log file, you might find this message "SslHandshakeFailedError". In case that upgrading to the latest version of MetaDefender Core does not help, please consider setting up MetaDefender Update Downloader product. This product is responsible for downloading engines, and MetaDefender Core will pick and update its engines from there. |
| UI inconvenience on small resolution screen | This issue is resolved in version 5.5.1. MetaDefender Core 5.5.0 introduces a lot of changes for supporting UI accessibility. Unfortunately, this leads to an inconvenience issue when displaying Workflow Rule on small/zoomed-in resolution screen. Some tabs at the bottom of the list will not be displayed properly. Workaround: zooming out a little bit on the browser. |
| Performance degradation against big archive files | This issue is resolved in MD Core v5.5.0 and Archive v6.2.1.
|
| Stability issue when encountering malformed data created by FileType engine | This issue is resolved in version 5.4.1. FileType version 6.0.2 sometimes created malformed data. After being written into PostgreSQL database, those malformed data cause negative impacts to MetaDefender Core v5.4.0 or older:
If you encounter similar symptoms, please find the following troubleshooting to resolve the issue: Rectify malformed FileType data in PostgreSQL database |
| Stability issues on Red Hat / CentOS with its kernel version 372.13 | MetaDefender Core 5.2.1 or later versions might not function correctly with Red Hat or CentOS operating systems using kernel 372.13. Red Hat appears to be addressing the kernel issues. Please try upgrading to kernel version 372.26. |
| PostgreSQL and MetaDefender Core services cannot initialize in specific containerized environment | In containerized environment, MetaDefender Core 5.2.0 or newer cannot work properly when:
Workarounds:
|
| MetaDefender Core's NGINX web server will not start if using weak cipher suites for HTTPS | On MetaDefender Core 5.2.0 and later versions, OpenSSL 1.x has been replaced by OpenSSL 3.x within the product and its dependencies (PostgreSQL, NGINX) to enhance security and address known vulnerabilities in OpenSSL 1.x. However, NGINX's implementation of OpenSSL 3.x in MetaDefender Core enforces strong encryption by rejecting all weak cipher suites. It only accepts "HIGH" encryption cipher suites as defined by OpenSSL https://www.openssl.org/docs/man1.1.1/man1/ciphers.html. This means ciphers based on MD5 and SHA1 hashing are no longer supported. Consequently, if you previously configured MetaDefender Core for HTTPS connections using a weak SSL cipher with your certificate, the service will not start due to NGINX's OpenSSL 3.x security enforcement. For prevention and remediation before upgrading MetaDefender Core, learn more at HTTPS Failure on MetaDefender Core 5.2.0 (or newer) |
| The temporary files in the resource folder may not be properly cleaned up if the Archive Extraction engine crashes | Starting from MetaDefender Core version 5.10.1 and onward, when the Archive Extraction engine crashes, MetaDefender Core might not handle this edge case effectively. This could result in temporary files from specific extraction transactions remaining in the resource folder without proper cleanup. However, the likelihood of this issue occurring is relatively low. |



