3.12.1 Release notes - 8 April 2020
This section lists the changes in version 3.12.1. More details about these changes are provided in each component changelog:
ThreatLockDown core
Updated MSU catalog on 31/03/2020.
Fixed XML validation with paths ending in
\
.Fixed compatibility with the Vulnerability Detector feeds for Ubuntu from Canonical, that are available in a compressed format.
Added missing field
database
to the FIM on-demand configuration report.Fixed a bug in Logcollector that made it forward a log to an external socket infinite times.
Fixed a buffer overflow when receiving large messages from Syslog over TCP connections.
Fixed a malfunction in the Integrator module when analyzing events without a certain field.
Removed support for Ubuntu 12.04 (Precise) in Vulneratiliby Detector as its feed is no longer available.
ThreatLockDown Kibana App
Support ThreatLockDown 3.12.1
Added new FIM settings on configuration on demand.
Updated agent's variable names in deployment guides.
Pagination is now displayed as tables.
ThreatLockDown ruleset
Fixed the Dropbear brute force rule entrypoint.
ThreatLockDown Splunk
Support for ThreatLockDown v3.12.1.
Added new FIM settings on configuration on demand.