ExtremeSecurity V7.7.2.5 Patch 5 Release Notes

Extreme Networks is pleased to introduce the ExtremeSecurity V7.7.2.5 Patch 5.

Note

Note

We recommend that you review this document prior to installing or upgrading this product.

Important

ExtremeSecurity V7.7.2.5 Patch 5 is no longer available for download, so these release notes are available only as a reference. New features and resolved issues from this patch have been incorporated into Patch 6.

If your deployment is installed with ExtremeSecurity 7.7.2.5, you can install fix pack 7.7.2.5 Build 20151027201330.

Because ExtremeSecurity V7.7.2.5 Patch 5 is a cumulative release, the release notes listed below include fixes assigned to V7.7.2.5 and the issues resolved in V7.7.2.5 Patch 5.

Note

Note

This fix pack can upgrade ExtremeSecurity 7.7.2.4 and above to the latest software version. However, this document does not cover all of the installation messages and requirements. For information on upgrading from ExtremeSecurity 7.7.2.4 to 7.7.2.5, see the .

Issues Resolved in 7.7.2.5 Patch 5

Product Number Description
ExtremeSecurity IV54720 Managed hosts with an ha secondary might experience a postgres rpm or diskmaint error after a hostservices restart.
ExtremeSecurity IV67212 Hostcontext service does not automatically restart after daylight savings time change
ExtremeSecurity IV72003 Configuration backup restores fail on ExtremeSecurity 7.2.4.x installations with 128gb of ram
ExtremeSecurity IV72734 ExtremeSecurity user interface can become unresponsive in environments with a hundreds of protocol based log sources
ExtremeSecurity IV73179 Security apar cve-2011-3389: cbc ciphers require modification
FORENSICS IV73478 ExtremeSecurity incident forensics does not log or audit searches performed by users
ExtremeSecurity IV73482 Varied process 'out of memory' messages can occur in ExtremeSecurity setups containing many reference sets/maps/tables
ExtremeSecurity IV73671 Real time streaming of events or flows can intermittently pause for multiple seconds
ExtremeSecurity IV74082 Restoring a configuration backup that was taken from a ExtremeSecurity nat environment to a non-nat environment fails
ExtremeSecurity IV74112 Using reference sets as an event filter when creating routing rules is not an available option
ExtremeSecurity IV74130 Offense reports for generated offenses within a specified time range do not honor the time range
ExtremeSecurity IV74149 Modifying an scp or sftp log source configured to use an ssh key file can generate an error upon save
ExtremeSecurity IV74340 The ExtremeSecurity user interface can become unresponsive or unavailable when using the asset_model api
ExtremeSecurity IV74474 Accumulator 'out of memory' system notifications can occur when using anomaly and behavioral rules
ExtremeSecurity IV74563 'Top source ip' reports can cause a tx sentry and/or report_runner to run out of memory
ExtremeSecurity IV74613 An error occurs when attempting to drill down into ExtremeSecurity advanced search results that contain 'assetproperty'
ExtremeSecurity IV74687 'Include detected events/flows by rule from this point forward...' rule action is not working as expected
ExtremeSecurity IV74776 Drilling down into the results of a large advanced search query generates a 'bad request...' error message
ExtremeSecurity IV74997 Improperly formatted advanced search is allowed to run and generates error 'the server encountered an error reading..'
ExtremeSecurity IV75097 An exception occurs exporting visibile columns from network activity
ExtremeSecurity IV75830 Frequent tx sentry system notifications related to 'saf_history' can be observed in large ExtremeSecurity deplo
ExtremeSecurity IV75832 Deploy function for one or more ExtremeSecurity managed hosts can fail
Vulnerability Manager IV75941 Vulnerability Manager - ExtremeSecurity dashboard rss feeds not working when encryption is enabled on the console and VM processor
ExtremeSecurity IV75945 Legacy script exists in crontab of high availability secondaries that have been patched up
ExtremeSecurity IV75993 'Top offenses' report output does not match the corresponding search result output
ExtremeSecurity IV75998 'An error occurred. An exception has occurred' pop up message navigating the aggregated data management window
Risk Manager IV76023 Risk Manager - 'an error occurred. An exception has occurred' when selecting configuration monitor on the risks tab
ExtremeSecurity IV76025 Patching a standalone high availability secondary console to ExtremeSecurity 7.2.5.3 fails during license check
ExtremeSecurity IV76224 Error 'patch aborted' when patching ExtremeSecurity managed hosts from the console using the patch all option
ExtremeSecurity IV76232 Rule response limiter is not working when it is limited by anything but the default setting of rule
Vulnerability Manager IV76405 Vulnerability Manager - 'clean vulnerabilities' action does not work for non-admin ExtremeSecurity users
ExtremeSecurity IV76603 The '/' partition can exceed disk maintenance thresholds after patching to ExtremeSecurity 7.2.5.x on xx24 and xx28 appliances
ExtremeSecurity IV76728 Unable to add a log source to 'lack of log source' or 'log source detected' rule test
ExtremeSecurity IV77107 Expected asset updates might not get applied to the asset model
ExtremeSecurity IV77141 Unable to add an encrypted managed host to a ExtremeSecurity deployment when port 443 is blocked by firewall rule(s)
FORENSICS IV77152 Clicking forensics tab gives error '...occurred while parsing the server response:syntax error:unexpected token <'
ExtremeSecurity IV77440 The 'kipmi0' process can cause 100% cpu usage on some ibm system x series appliances
ExtremeSecurity IV77603 Users are unable to successfully login to the ExtremeSecurity user interface after correct credentials are entered
ExtremeSecurity IV77620 Forwarding in json format or forwarding payloads terminated with null characters is not working as intended
ExtremeSecurity Security Bulletin Tomcat denial of service
ExtremeSecurity Security Bulletin Tomcat security manager bypass
FORENSICS Security Bulletin Incident forensics is vulnerable to a sql injection attack
FORENSICS Security Bulletin Incident forensics is vulnerable to a cross-site scripting attack
FORENSICS Security Bulletin Incident forensics is vulnerable to a session highjack attack
FORENSICS Security Bulletin Incident forensics is vulnerable to a man in the middle attack
FORENSICS Security Bulletin Incident forensics is vulnerable to a man in the middle attack