Cisco Cisco Firepower Management Center 2000 Notas de publicación
Version 5.3.0.5
Sourcefire 3D System Release Notes
18
Resolved Issues
4. At the prompt, type the following on a single line and press Enter:
install_update.pl
/var/sf/updates/Sourcefire_3D_XOS_Device_Patch_Uninstaller-
5.3.0.5-18.sh
/var/sf/updates/Sourcefire_3D_XOS_Device_Patch_Uninstaller-
5.3.0.5-18.sh
The update is removed and the VAP reloads. If your Sourcefire Software for
X-Series is deployed inline, traffic to that VAP is interrupted while the VAP
reloads. Note, however, that if there are other VAPs in the VAP group, traffic
is load balanced among the other VAPs.
5. On the managing Defense Center, select Devices > Device Management and
confirm that the software version is listed correctly: Version 5.3.0.4.
6. Verify that the Sourcefire Software for X-Series is successfully
communicating with the Defense Center.
7. Repeat steps 1 through 6 for each VAP in the VAP group.
Resolved Issues
Cisco recently changed caveat tracking systems and issues addressed in Version
5.3.0.2 and forward are tracked via
https://tools.cisco.com/bugsearch/
. A Cisco
account is required. To view bugs addressed in older versions, refer to the
previous caveat tracking system. The following resolved issues are reported in
Version 5.3.0.5:
•
Security Issue
Addressed multiple cross-site scripting (XSS) vulnerabilities.
(CSCus07858, CSCus07875)
•
Security Issue
Addressed multiple vulnerabilities in SSLv3 that allowed
external attacks on client connections, as described in CVE-2014-3569,
CVE-2014-3570, CVE-2014-3572, CVE-2015-0204, CVE-2015-0286,
CVE-2015-0287, CVE-2015-0289, CVE-2015-0292, CVE-2015-0293.
CVE-2015-0287, CVE-2015-0289, CVE-2015-0292, CVE-2015-0293.
•
If you enable bypass on inline sets on your Series 3 device, you may lose
connectivity for up to 25 seconds during device reboot. (CSCur64678)
•
Resolved an issue where the system does not recognize which IP address
is the primary address and does not establish an Open Shortest Path First
(OSPF) connection if you configured the router interface of your clustered
Series 3 managed devices to both a private IP address and a Cisco
Redundancy Protocol (SFRP) IP address. (CSCur86355)
•
Improved the stability of network processing firmware. (CSCut80043)
•
Resolved an issue where certain high availability packets caused traffic
inspection to stop while components restarted. (CSCuu10871)
inspection to stop while components restarted. (CSCuu10871)
Issues Resolved in Previous Updates
You can track defects resolved in this release using the Cisco Bug Search Tool
(
https://tools.cisco.com/bugsearch/
). A Cisco account is required. To view defects