R80.40 Jumbo Hotfix Take 131
|
Note - This Take contains all fixes from all earlier Takes. |
ID |
Product |
Description |
---|---|---|
Take 131 Released on 1 November 2021 |
||
PRJ-29442, |
Security Gateway |
UPDATE: The default value for kiss_kthread_allow_resched kernel parameter is changed to 1. Refer to sk170560. |
PRJ-30373, |
Security Gateway |
Optimized packet dispatching in User Space Firewall (USFW) mode. |
PRJ-28872, |
Security Gateway |
In a rare scenario, when using ICAP client, Security Gateway may crash. |
PRJ-30214, |
Security Gateway |
In some scenarios, policy installation may take longer or fail when GEO Updatable Objects are used in the policy. |
PRJ-29622 |
Security Gateway |
Improved User-Space Firewall (USFW) mode memory allocation. |
PRJ-29742, |
Security Gateway |
In a rare scenario, due to TCP connection reuse, a TCP connection may not be initiated. Refer to sk11088. |
PRJ-31369, |
Security Gateway |
Improved the handling of a large number of sessions per single HTTP/S connection. |
PRJ-26392, |
Security Gateway |
In some scenarios, the WSDNSD process unexpectedly exits and creates a core dump file. Refer to sk173627. |
PRJ-25868, |
Threat Prevention |
In a rare scenario, the FWD process may unexpectedly exit after an upgrade. |
PRJ-26496 |
Threat Prevention |
In rare scenarios, IOC feed loading fails due to hash parsing errors. |
PRJ-32353, |
Identity Awareness |
UPDATE: The default threshold value for Identity Collector Service Accounts exclusion was changed from 10 to 100. Refer to sk174266. |
PRJ-31693, |
IPS |
Improved the handling of decoded HTTP/S traffic. |
PRJ-23570, |
Anti-Virus |
Security Gateway may crash when transferring the HTTP multipart traffic if the Anti-Virus Deep Scanning, Threat Extraction, or Threat Emulation is enabled. |
PRJ-30868, |
VPN |
A memory leak may occur in the VPND process. |
PRJ-29282, |
VPN |
In rare scenarios, re-configuring a trusted CA bundle may cause a memory leak in the VPND process. |