SolarWinds Platform 2023.3.1 release notes
Release date: September 12, 2023
SolarWinds Platform (self-hosted) 2023.3.1 is a service release providing bug and security fixes for release 2023.3. For information about the 2023.3 release, including EOL notices and upgrade information, see SolarWinds Platform (self-hosted) 2023.3 Release Notes.
Fixes
Case number | Description |
---|---|
01245979, 01313243, 01407384 |
The SolarWinds Platform no longer fails periodically with errors like the following:
|
01423536 | When you run database maintenance manually, the swdebugMaintenanceExecutionHistory.log shows the time the job started as well as the time it completed. |
1359087 | The FreeICMP SWQL query has been optimized to prevent it from timing out in certain environments. The query now runs successfully and returns the correct number of licensed nodes. |
1417513 | The nfs2 and nfs3 volume types available for AIX systems are now correctly classified as NetworkDisks. |
1337918 |
PerfStack updates: the metadata query was optimized, caching results for PerfStack metrics was optimized. |
1221457, 1293288, 1354612, 1395445, 1427582, 1430113 |
In environments with HA pools, the SolarWinds Agent configuration was improved so that the Agents do not experience connection issues or do not connect to an incorrect polling engine. The issues were caused by incorrectly assigned engine IP addresses. |
CVEs
SolarWinds would like to thank our Security Researchers below for reporting on the issue in a responsible manner and working with our security, product, and engineering teams to fix the vulnerability.
SolarWinds CVEs
CVE-ID | Vulnerability Title | Description | Severity | Credit |
---|---|---|---|---|
CVE-2023-23840 | SolarWinds Platform Exposed Dangerous Method Vulnerability | The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with NETWORK SERVICE privileges. | 6.8 Medium | Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative |
CVE-2023-23845 | SolarWinds Platform Exposed Dangerous Method Vulnerability | The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with NETWORK SERVICE privileges. | 6.8 Medium | Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative |
Legal notices
© 2023 SolarWinds Worldwide, LLC. All rights reserved.
This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors.
SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.