Skip to main content
Version: v1.28.x

Version 1.28.8 (October 2024)

Version 1.28.8 (October 2024)

Welcome to the Zowe Version 1.28.8 release!

See Bug fixes for a list of issues addressed in this release.

Download v1.28.8 build: Want to try new features as soon as possible? You can download the v1.28.8 build from Zowe.org.

Bug fixes

Zowe Version 1.28.8 contains the bug fixes that are described in the following topics.

Zowe CLI

Zowe CLI (Core)

  • Updated micromatch dependency for technical currency. (#2242)

DB2 Plug-in for Zowe CLI

  • Updated Axios transitive dependency to resolve technical debt. (#155)

Zowe Explorer

Zowe Explorer (Core)

  • See the Zowe Explorer changelog for updates included in this release.

Zowe Explorer API

Zowe Explorer FTP Extension

Zowe Explorer ESLint Plug-in

Vulnerabilities fixed

Zowe discloses fixed vulnerabilities in a timely manner giving you sufficient time to plan your upgrades. Zowe does not disclose the vulnerabilities fixed in the latest release as we respect the need for at least 45 days to decide when and how you upgrade Zowe. When a new release is published, Zowe publishes the vulnerabilities fixed in the previous release. For more information about the Zowe security policy, see the Security page on the Zowe website.

The following security issues were fixed by the Zowe security group in version 1.28.7.

  • CVE-2023-46589 (BDSA-2023-3298)
  • BDSA-2024-0396
  • CVE-2024-24549 (BDSA-2024-0623)
  • BDSA-2024-0622
  • BDSA-2021-2621
  • BDSA-2023-2855
  • CVE-2023-46234
  • CVE-2023-26159 (BDSA-2023-3572)
  • CVE-2024-28849 (BDSA-2024-0638)
  • CVE-2023-43646 (BDSA-2023-2805)
  • CVE-2020-28469 (BDSA-2021-1936)
  • BDSA-2022-3396
  • CVE-2023-34062 (BDSA-2023-3159)
  • CVE-2023-34054 (BDSA-2023-3281)
  • BDSA-2023-2433
  • BDSA-2023-2552
  • BDSA-2023-2553
  • CVE-2024-21634
  • BDSA-2022-4307
  • CVE-2023-35116 (BDSA-2023-1491)
  • CVE-2023-44487 (BDSA-2023-2732)
  • CVE-2023-36478 (BDSA-2023-2721)
  • BDSA-2024-0452
  • BDSA-2021-3651
  • CVE-2022-46175 (BDSA-2022-4019)
  • CVE-2023-6378 (BDSA-2023-3307)
  • BDSA-2023-3341
  • CVE-2023-6481 (BDSA-2023-3341)
  • CVE-2018-1109 (BDSA-2018-4975)
  • CVE-2022-3517 (BDSA-2022-2922)
  • CVE-2021-23566 (BDSA-2022-0242)
  • CVE-2023-52428 (BDSA-2023-3666)
  • CVE-2022-25883 (BDSA-2023-2207)
  • CVE-2020-7751 (BDSA-2020-2994)
  • CVE-2021-23382 (BDSA-2021-2285)
  • CVE-2023-44270 (BDSA-2023-2602)
  • CVE-2022-24999 (BDSA-2022-3375)
  • CVE-2023-34055 (BDSA-2023-3275)
  • BDSA-2024-0625
  • CVE-2023-34042 (BDSA-2023-2481)
  • CVE-2024-22257 (BDSA-2024-0647)
  • CVE-2022-25858 (BDSA-2022-2526)
  • CVE-2023-26136 (BDSA-2023-1661)
  • CVE-2022-37599 (BDSA-2022-3811)
  • CVE-2022-37601 (BDSA-2022-3814)
  • CVE-2022-37603 (BDSA-2022-3812)
  • CVE-2021-21366 (BDSA-2021-2314)
  • CVE-2021-32796 (BDSA-2021-2903)
  • CVE-2022-37616 (BDSA-2022-3398)
  • CVE-2022-39353 (BDSA-2022-3404)