- Update for: m25, m35, m50, m70, r45, r90, r1000, v35, CMP, and NMP
Update for: m25, m35, m50, m70, r45, r90, r1000, v35, CMP, and NMP
Release notes for Enterprise Monitoring Point version 13.0.0.
|MP-4018||Software update||We fixed an issue where a software update could fail with the error “300 General error: quote_from_bytes() expected bytes”|
|MP-4017||Security||We have updated the software to protect against several “dnsmasq” related vulnerabilities.|
|MP-3285||Security||We have included fixes for a Monitoring Point vulnerability: CVE-2019-16275|
|MP-3284||Security||We have included fixes for a Monitoring Point vulnerability: CVE-2020-15861|
|MP-3283||Security||We have included fixes for a Monitoring Point vulnerability: CVE-2020-12049.|
|MP-969||Delivery||We fixed an issue where the Latency metric could be larger than the corresponding Round Trip Time (RTT).|
|APM-9160||Restart||We fixed an issue where a Monitoring Point could not be restarted after a web app targeting a download link for a very large file could fill the disk.|
|APM-7785||PathTest||We fixed an issue where PathTest results were unavailable if the test was run for 60 minutes.|
Changes to be aware of
- In previous releases, the DHCP unique ID (DUID) sent with DHCP requests was the Monitoring Point’s MAC address. It is now changed to a randomly generated UUID. In the next release the DUID generated will be deterministic and persistent.