UTM Up2Date 9.705 Released

Today we've released UTM 9.705. The release will be rolled out in phases.

  • In phase 1 you can download the update package from our download server
  • In phase 2 we will make it available via our Up2Date servers to all installations

Up2Date Information

News

  • Maintenance Release

Remarks

  • System will be rebooted

Issues Resolved

Parents
  • My UTM has only just notified me 9.704 is available. Why am I a version behind?

  • Today we've released UTM 9.705. The release will be rolled out in phases.

    • In phase 1 you can download the update package from our download server
    • In phase 2 we will make it available via our Up2Date servers to all installations

    we are in phase one, so it will not show up yet on up2date check, that happens in phase 2 

  • problem here is    9.704 introduced a bug that is  fixed in 9.705  "wireless networks restart continually,"

    so its probably better to apply these at the same time.

    As Steve asks above,  where is the CVE for the UTM vulnerability ?   how serious is it ? 

    judging by the fact its not being rushed out to up2date immediately can we take it that its not so serious ? 

    its pretty poor form to publish  release notes that includes fix for a "remote code execution" bug for webadmin  without any further information  

  • Agreed. It is more than a little vexing since I have not been able to access my UTMs for weeks now. Does this mean that they have potentially been compromised and I can't see it?

  • My bet (and I don't know this for a fact) -- they issued a hotfix patch of some sort via the pattern up2date system that broke SUM access (possibly the attack vector) -- and now this release fixes it all.  Just a guess, but sort of what happened with XG a couple months ago.  Apparently the bad guys are out there taking new whacks at perimeter security devices, a number of vendors out there have been issuing patches for this sort of vulnerability (unauthorized external access) the past couple of months.

Comment
  • My bet (and I don't know this for a fact) -- they issued a hotfix patch of some sort via the pattern up2date system that broke SUM access (possibly the attack vector) -- and now this release fixes it all.  Just a guess, but sort of what happened with XG a couple months ago.  Apparently the bad guys are out there taking new whacks at perimeter security devices, a number of vendors out there have been issuing patches for this sort of vulnerability (unauthorized external access) the past couple of months.

Children
No Data