まっちゃだいふくの日記

セキュリティのこと、ITの気になった記事をリンクしています。

Trend Micro Deep Security 12.0 Update 7 公開のお知らせ:サポート情報 : トレンドマイクロ@ 累積修正対応、SQLiteセキュリティアップデート対応

Trend Micro Deep Security 12.0 Update 7 公開のお知らせ:サポート情報 : トレンドマイクロ

Deep Security 12.0 Update 7 のモジュールを公開いたしました。
■ 公開開始日

2020 年 3 月 2 日 (月)

■ 対象モジュール

Deep Security Manager
Linux 版 Deep Security Agent
Unix 版 Deep Security Agent
Windows 版 Deep Security Agent
Windows 版 Deep Security Notifier
■ 追加機能/修正内容

追加機能や修正内容は付属の Readme をご覧ください。
※日本語のReadmeは一か月以内を目安に公開いたします。

サポート情報 : トレンドマイクロ

Deep Security Manager - 12.0 update 7

Enhancements

  • Added a progress bar to Administration> User Management > Roles > New > Computer Rights > Selected Computers to indicate when the page is still loading. (SEG-61331/DSSEG-4941)
  • Improved performance when image files are repeatedly downloaded to the browser. (SEG-64280/DSSEG-5141)

Resolved issues

  • When the "Untagged" filter was selected on the dashboard, some widgets continued to display tagged items. (SEG-63290/SF02585007/DSSEG-4910)
  • The computers list did not search for "Software Update Status" correctly. This affected the computers list and the "out-of-date" computer reports and widgets that used it for displaying affected computers. (SEG-62740/DSSEG-4840)
  • The Firewall status for virtual machines did not update if PortScan was not allowed to run on the tenant. (SEG-63713/SF02554452/DSSEG-5041)
  • Tenants in a multi-tenant setup could move their relays to the primary tenant relay group. This would cause the relays to disappear from their 'Relay Management' page. Tenants are now prevented from moving their relays to the primary tenant relay group. (SEG-57715/02322762/DSSEG-5240)
  • Deep Security Manager with PostgreSQL sometimes stopped forwarding events to AWS SNS. (SEG-67362/SF02798561/DSSEG-5077)
  • The Scan for Integrity and Rebuild Baseline buttons were grayed out and disabled on Computers > Computer Details > Integrity Monitoring > General even after the corresponding operation was completed. (SEG-69921/02932025/DSSEG-5229)
  • When Intrusion Prevention rules were assigned or unassigned based on the recommendations, the policy editor's performance was poor and the recommendations were not applied. (SEG-63540/SF02573474/DSSEG-4965)
  • Deep Security Manager sometimes failed to generate a summary report. (SEG-68840/SF02850674/DSSEG-5165)
  • Adding a vCloud connector failed on vCloud Director version 9.7 or later because the SDK was not supported. (DSSEG-5185)
  • Agentless protection did not work on vCloud Director version 9.5 or later. (DSSEG-5185)

Security Updates

Security updates are included in this release. For more information about how we protect against vulnerabilities, visit -Vulnerability Response. (DSSEG-5230/DSSEG-5140/DSSEG-5171)

Updated JRE to the latest Bundled Patch Release (8.0.241/8.43.0.6). (DSSEG-5180)

Linux 版 Deep Security Agent

Enhancements

  • Increased the scan engine's URI path length limitation. (SEG-61309/DSSEG-5245)

Resolved issues

  • Deep Security Agent real-time Anti-Malware scans didn't work correctly with Linux kernel 5.5. (DSSEG-5209)
  • Deep Security Agent real-time Anti-Malware scans didn't work correctly with Debian 10 kernel 5.4. (DSSEG-5153)
  • The displayed packet header data contained redundant payload data. (DSSEG-4762)
  • After applying rule 1006540, "Enable X-Forwarded-For HTTP Header Logging", Deep Security would extract the X-Forwarded-For header for Intrusion Prevention events correctly. However, a URL intrusion like "Invalid Traversal" would be detected in the HTTP request string before the header was parsed. The Intrusion Prevention engine has been enhanced to search X-Forwarded-For header after the header is parsed. (DSSEG-5156)
  • Deep Security Virtual Appliance sometimes went offline. (DSSEG-5184)
  • Deep Security Agent Anti-Malware would attempt to get container information with an invalid container ID in Anti-Malware Event. (SEG-69502/SF02915821/DSSEG-5186)
  • Memory leaked during SSL decryption because of a flaw in the SSL processing. (DSSEG-5142)
  • Deep Security Agent real-time Anti-Malware scans didn't work correctly with Debian 10 kernel 5.3.0-0.bpo.2-amd64. (DSSEG-5135)
  • Log Inspection event processing caused the Deep Security Agent to restart abnormally. (DSSEG-5228)
  • On specific Deep Security Agent servers the CPU usage spiked to 100% and pattern merges failed during the active update process. (SEG-66210/02711299/DSSEG-5152)

Security Updates

Security updates are included in this release. For more information about how we protect against vulnerabilities, visit Vulnerability Response.

  • Updated SQLite to 3.30.1. (DSSEG-5103)

Unix 版 Deep Security Agent

Enhancements

  • Increased the scan engine's URI path length limitation. (SEG-61309/DSSEG-5245)

Resolved issues

  • The displayed packet header data contained redundant payload data. (DSSEG-4762)
  • After applying rule 1006540, "Enable X-Forwarded-For HTTP Header Logging", Deep Security would extract the X-Forwarded-For header for Intrusion Prevention events correctly. However, a URL intrusion like "Invalid Traversal" would be detected in the HTTP request string before the header was parsed. The Intrusion Prevention engine has been enhanced to search X-Forwarded-For header after the header is parsed. (DSSEG-5156)
  • Memory leaked during SSL decryption because of a flaw in the SSL processing. (DSSEG-5142)
  • Log Inspection event processing caused the Deep Security Agent to restart abnormally. (DSSEG-5228)
  • On specific Deep Security Agent servers the CPU usage spiked to 100% and pattern merges failed during the active update process. (SEG-66210/02711299/DSSEG-5152)
  • After upgrading to Deep Security Agent 12.0.0.817, Solaris systems crashed. (SF02871943/SEG-68654/DSSEG-5139)

Security Updates

Security updates are included in this release. For more information about how we protect against vulnerabilities, visit Vulnerability Response.

  • Updated SQLite to 3.30.1. (DSSEG-5103)

Windows 版 Deep Security Agent
Windows 版 Deep Security Notifier

Enhancements

  • Increased the scan engine's URI path length limitation. (SEG-61309/DSSEG-5245)

Resolved issues

  • When Application Control was enabled, there were too many software changes due to distributed file system replication. (SEG-60169/DSSEG-5031)
  • The displayed packet header data contained redundant payload data. (DSSEG-4762)
  • Using Octupus Deploy with Application Control resulted in Powershell execution errors. (SEG-67037/02655196/DSSEG-5084)
  • Deep Security Agent Anti-Malware would attempt to get container information with an invalid container ID in Anti-Malware Event. (SEG-69502/SF02915821/DSSEG-5186)
  • Log Inspection event processing caused the Deep Security Agent to restart abnormally. (DSSEG-5228)
  • On specific Deep Security Agent servers the CPU usage spiked to 100% and pattern merges failed during the active update process. (SEG-66210/02711299/DSSEG-5152)
  • When Application Control was enabled, there were too many software changes due to distributed file system replication. (SEG-60169/DSSEG-5031)

Security Updates

Security updates are included in this release. For more information about how we protect against vulnerabilities, visit Vulnerability Response.

  • Updated SQLite to 3.30.1. (DSSEG-5103)