ExtremeSecurity V7.7.2.5 Patch 5 Release Notes
Extreme Networks is pleased to introduce the ExtremeSecurity V7.7.2.5 Patch 5.
Note
We recommend that you review this document prior to installing or upgrading this product.Important
ExtremeSecurity V7.7.2.5 Patch 5 is no longer available for download, so these release notes are available only as a reference. New features and resolved issues from this patch have been incorporated into Patch 6.If your deployment is installed with ExtremeSecurity 7.7.2.5, you can install fix pack 7.7.2.5 Build 20151027201330.
Because ExtremeSecurity V7.7.2.5 Patch 5 is a cumulative release, the release notes listed below include fixes assigned to V7.7.2.5 and the issues resolved in V7.7.2.5 Patch 5.
Note
This fix pack can upgrade ExtremeSecurity 7.7.2.4 and above to the latest software version. However, this document does not cover all of the installation messages and requirements. For information on upgrading from ExtremeSecurity 7.7.2.4 to 7.7.2.5, see the .Issues Resolved in 7.7.2.5 Patch 5
Product | Number | Description |
---|---|---|
ExtremeSecurity | IV54720 | Managed hosts with an ha secondary might experience a postgres rpm or diskmaint error after a hostservices restart. |
ExtremeSecurity | IV67212 | Hostcontext service does not automatically restart after daylight savings time change |
ExtremeSecurity | IV72003 | Configuration backup restores fail on ExtremeSecurity 7.2.4.x installations with 128gb of ram |
ExtremeSecurity | IV72734 | ExtremeSecurity user interface can become unresponsive in environments with a hundreds of protocol based log sources |
ExtremeSecurity | IV73179 | Security apar cve-2011-3389: cbc ciphers require modification |
FORENSICS | IV73478 | ExtremeSecurity incident forensics does not log or audit searches performed by users |
ExtremeSecurity | IV73482 | Varied process 'out of memory' messages can occur in ExtremeSecurity setups containing many reference sets/maps/tables |
ExtremeSecurity | IV73671 | Real time streaming of events or flows can intermittently pause for multiple seconds |
ExtremeSecurity | IV74082 | Restoring a configuration backup that was taken from a ExtremeSecurity nat environment to a non-nat environment fails |
ExtremeSecurity | IV74112 | Using reference sets as an event filter when creating routing rules is not an available option |
ExtremeSecurity | IV74130 | Offense reports for generated offenses within a specified time range do not honor the time range |
ExtremeSecurity | IV74149 | Modifying an scp or sftp log source configured to use an ssh key file can generate an error upon save |
ExtremeSecurity | IV74340 | The ExtremeSecurity user interface can become unresponsive or unavailable when using the asset_model api |
ExtremeSecurity | IV74474 | Accumulator 'out of memory' system notifications can occur when using anomaly and behavioral rules |
ExtremeSecurity | IV74563 | 'Top source ip' reports can cause a tx sentry and/or report_runner to run out of memory |
ExtremeSecurity | IV74613 | An error occurs when attempting to drill down into ExtremeSecurity advanced search results that contain 'assetproperty' |
ExtremeSecurity | IV74687 | 'Include detected events/flows by rule from this point forward...' rule action is not working as expected |
ExtremeSecurity | IV74776 | Drilling down into the results of a large advanced search query generates a 'bad request...' error message |
ExtremeSecurity | IV74997 | Improperly formatted advanced search is allowed to run and generates error 'the server encountered an error reading..' |
ExtremeSecurity | IV75097 | An exception occurs exporting visibile columns from network activity |
ExtremeSecurity | IV75830 | Frequent tx sentry system notifications related to 'saf_history' can be observed in large ExtremeSecurity deplo |
ExtremeSecurity | IV75832 | Deploy function for one or more ExtremeSecurity managed hosts can fail |
Vulnerability Manager | IV75941 | Vulnerability Manager - ExtremeSecurity dashboard rss feeds not working when encryption is enabled on the console and VM processor |
ExtremeSecurity | IV75945 | Legacy script exists in crontab of high availability secondaries that have been patched up |
ExtremeSecurity | IV75993 | 'Top offenses' report output does not match the corresponding search result output |
ExtremeSecurity | IV75998 | 'An error occurred. An exception has occurred' pop up message navigating the aggregated data management window |
Risk Manager | IV76023 | Risk Manager - 'an error occurred. An exception has occurred' when selecting configuration monitor on the risks tab |
ExtremeSecurity | IV76025 | Patching a standalone high availability secondary console to ExtremeSecurity 7.2.5.3 fails during license check |
ExtremeSecurity | IV76224 | Error 'patch aborted' when patching ExtremeSecurity managed hosts from the console using the patch all option |
ExtremeSecurity | IV76232 | Rule response limiter is not working when it is limited by anything but the default setting of rule |
Vulnerability Manager | IV76405 | Vulnerability Manager - 'clean vulnerabilities' action does not work for non-admin ExtremeSecurity users |
ExtremeSecurity | IV76603 | The '/' partition can exceed disk maintenance thresholds after patching to ExtremeSecurity 7.2.5.x on xx24 and xx28 appliances |
ExtremeSecurity | IV76728 | Unable to add a log source to 'lack of log source' or 'log source detected' rule test |
ExtremeSecurity | IV77107 | Expected asset updates might not get applied to the asset model |
ExtremeSecurity | IV77141 | Unable to add an encrypted managed host to a ExtremeSecurity deployment when port 443 is blocked by firewall rule(s) |
FORENSICS | IV77152 | Clicking forensics tab gives error '...occurred while parsing the server response:syntax error:unexpected token <' |
ExtremeSecurity | IV77440 | The 'kipmi0' process can cause 100% cpu usage on some ibm system x series appliances |
ExtremeSecurity | IV77603 | Users are unable to successfully login to the ExtremeSecurity user interface after correct credentials are entered |
ExtremeSecurity | IV77620 | Forwarding in json format or forwarding payloads terminated with null characters is not working as intended |
ExtremeSecurity | Security Bulletin | Tomcat denial of service |
ExtremeSecurity | Security Bulletin | Tomcat security manager bypass |
FORENSICS | Security Bulletin | Incident forensics is vulnerable to a sql injection attack |
FORENSICS | Security Bulletin | Incident forensics is vulnerable to a cross-site scripting attack |
FORENSICS | Security Bulletin | Incident forensics is vulnerable to a session highjack attack |
FORENSICS | Security Bulletin | Incident forensics is vulnerable to a man in the middle attack |
FORENSICS | Security Bulletin | Incident forensics is vulnerable to a man in the middle attack |