Version 1.28.8 (October 2024)
Version 1.28.8 (October 2024)
Welcome to the Zowe Version 1.28.8 release!
See Bug fixes for a list of issues addressed in this release.
Download v1.28.8 build: Want to try new features as soon as possible? You can download the v1.28.8 build from Zowe.org.
Bug fixes
Zowe Version 1.28.8 contains the bug fixes that are described in the following topics.
Zowe CLI
Zowe CLI (Core)
- Updated
micromatch
dependency for technical currency. (#2242)
DB2 Plug-in for Zowe CLI
- Updated Axios transitive dependency to resolve technical debt. (#155)
Zowe Explorer
Zowe Explorer (Core)
- See the Zowe Explorer changelog for updates included in this release.
Zowe Explorer API
- See the Zowe Explorer API changelog for updates included in this release.
Zowe Explorer FTP Extension
- See the Zowe Explorer FTP Extension changelog for updates included in this release.
Zowe Explorer ESLint Plug-in
- See the Zowe Explorer ESLint Plug-in changelog for updates included in this release.
Vulnerabilities fixed
Zowe discloses fixed vulnerabilities in a timely manner giving you sufficient time to plan your upgrades. Zowe does not disclose the vulnerabilities fixed in the latest release as we respect the need for at least 45 days to decide when and how you upgrade Zowe. When a new release is published, Zowe publishes the vulnerabilities fixed in the previous release. For more information about the Zowe security policy, see the Security page on the Zowe website.
The following security issues were fixed by the Zowe security group in version 1.28.7.
- CVE-2023-46589 (BDSA-2023-3298)
- BDSA-2024-0396
- CVE-2024-24549 (BDSA-2024-0623)
- BDSA-2024-0622
- BDSA-2021-2621
- BDSA-2023-2855
- CVE-2023-46234
- CVE-2023-26159 (BDSA-2023-3572)
- CVE-2024-28849 (BDSA-2024-0638)
- CVE-2023-43646 (BDSA-2023-2805)
- CVE-2020-28469 (BDSA-2021-1936)
- BDSA-2022-3396
- CVE-2023-34062 (BDSA-2023-3159)
- CVE-2023-34054 (BDSA-2023-3281)
- BDSA-2023-2433
- BDSA-2023-2552
- BDSA-2023-2553
- CVE-2024-21634
- BDSA-2022-4307
- CVE-2023-35116 (BDSA-2023-1491)
- CVE-2023-44487 (BDSA-2023-2732)
- CVE-2023-36478 (BDSA-2023-2721)
- BDSA-2024-0452
- BDSA-2021-3651
- CVE-2022-46175 (BDSA-2022-4019)
- CVE-2023-6378 (BDSA-2023-3307)
- BDSA-2023-3341
- CVE-2023-6481 (BDSA-2023-3341)
- CVE-2018-1109 (BDSA-2018-4975)
- CVE-2022-3517 (BDSA-2022-2922)
- CVE-2021-23566 (BDSA-2022-0242)
- CVE-2023-52428 (BDSA-2023-3666)
- CVE-2022-25883 (BDSA-2023-2207)
- CVE-2020-7751 (BDSA-2020-2994)
- CVE-2021-23382 (BDSA-2021-2285)
- CVE-2023-44270 (BDSA-2023-2602)
- CVE-2022-24999 (BDSA-2022-3375)
- CVE-2023-34055 (BDSA-2023-3275)
- BDSA-2024-0625
- CVE-2023-34042 (BDSA-2023-2481)
- CVE-2024-22257 (BDSA-2024-0647)
- CVE-2022-25858 (BDSA-2022-2526)
- CVE-2023-26136 (BDSA-2023-1661)
- CVE-2022-37599 (BDSA-2022-3811)
- CVE-2022-37601 (BDSA-2022-3814)
- CVE-2022-37603 (BDSA-2022-3812)
- CVE-2021-21366 (BDSA-2021-2314)
- CVE-2021-32796 (BDSA-2021-2903)
- CVE-2022-37616 (BDSA-2022-3398)
- CVE-2022-39353 (BDSA-2022-3404)