What's new in 3.2.0
minorLatest Production Version
January 30 2025
Welcome to ASI 3.2.0! This is a minor release and it contains a number of enhancements and fixes which are detailed below.
Bug Fixes
- ASIPLAT-895 - SSL/TLS: In the 'enableAsiSsl' util, ensure that we are checking to see if authenticator is live before changes to the SSL configuration can be made
- ASIPLAT-974 - Authorization Providers: Authorization Providers table is not refreshed to show the real-time state after enabling / disabling an authorization provider
- ASIPLAT-1048 - Theme: '413 - Request Entity too large' error when attempting to upload a background image
- ASIPLAT-1289 - Service Lens: Service Lens rendering incorrectly when a new service is added
- ASIPLAT-1290 - Events (Automation): Typo on 'Create Action' form when creating an Automation Policy
- ASIPLAT-1291 - Events (Automation): When creating an Automation Policy, the dropdown list for the Query Builder does not select the correct field when clicked
- ASIPLAT-1292 - Events (Query Builder): Selecting fields beginning with an uppercase or underscore does not allow the user to set a valid field
- ASIPLAT-1294 - Events (Automation): Query dropdown list does not refresh after adding a new condition query
- ASIPLAT-1295 - Events (Automation): Creating a new Automation Policy fails with a 500 error
- ASIPLAT-1300 - Management Console: Update asi-dashboards icon to match the Dashboards menu icon
- ASIPLAT-1347 - Management Console: Address circular logic bug during ASI startup caused if the asi-core-service secret is incorrect
- ASIPLAT-1368 - Utilities: asi-cli fails to run on el8 systems due to an outdated glibc version
- ASIPLAT-1385 - Management Service: Extend management-service startup time in systemctl to stop it from being killed if it takes longer than expected to come alive
- ASIPLAT-1402 - Management Service: Management Service fails to start due to changes in logback
- ASIPLAT-1409 - Management Console: 'No BES instances found' even though BES has been registered and nnBES-asi is running
- ASIPLAT-1412 - OTP Policy: Success toast has dark grey background instead of the standard green
- ASIPLAT-1413 - OTP Policy: Enabling the OTP Policy globally doesn't actually enable it
- ASIPLAT-1414 - OTP Policy: Supported OTP applications list has default names
- ASIPLAT-1420 - Roles: Edit button is visible on the User Administration page for users who only have the read-only 'access-users-user-role'
- ASIPLAT-1421 - Roles: The 'access-users-admin-role' composite does not inherit the 'access-users-helpdesk-role', making it impossible for a user to update passwords for other users
- ASIPLAT-1422 - Roles: Edit button is visible on the Group Administration page for users who only have the read-only 'access-group-user-role'
- ASIPLAT-1423 - Roles: The 'access-group-admin-role' composite does not inherit the 'access-users-user-role' & 'access-roles-user-role' making it impossible for a user to add users and roles to a group
- ASIPLAT-1424 - Roles: Users with only the read-only 'access-policies-user-role' are able to edit the OTP Policy configuration
- ASIPLAT-1426 - Roles: Edit button is visible on the Configuration page for users who only have the read-only 'system-config-user-role'
- ASIPLAT-1427 - Roles: The 'system-config-admin-role' composite does not inherit the 'system-plugins-user-role' & 'system-packages-user-role' making it impossible for a user to create new configuration entries
- ASIPLAT-1428 - Roles: The 'system-connections-user-role' composite does not inherit the 'system-plugins-user-role' making it impossible for a user to view the details of a connection
- ASIPLAT-1430 - Roles: The 'system-theme-editor-role' should not allow a user to upload a logo or background image
- ASIPLAT-1435 - Events (Automation): User is not prompted for confirmation when deleting an automation policy
- ASIPLAT-1436 - Service Modelling: Service Modelling UI is using a hard-coded api endpoint, leading to failures when loading the model
- ASIPLAT-1438 - User Administration: User Administration table does not refresh after deleting a user
- ASIPLAT-1439 - Theme: When uploading a logo, the preview for the background image also changes
- ASIPLAT-1441 - Events (Automation): Create button styling is incorrect and commands section is not required
- ASIPLAT-1443 - Installation: Default dashboards fail to be added on fresh installs
- ASIPLAT-1444 - Events (Query Builder): HTTP 400 errors returned from queries due to an invalid character in the URL
- ASIPLAT-1445 - Automation: Unable to create a Command Action due to an incorrect redirect to the Message Channels page
- ASIPLAT-1447 - Service Modelling: HTTP 405 Method not allowed error when attempting to delete a branch or upload a CSV
- ASIPLAT-1450 - Core: 'spring.cloud.gateway.routes' configuration does not get added to the asi-core config file if it doesn't exist, which leads to the service-engine proxy not being created when registering events with ASI
- ASIPLAT-1452 - Service Modelling: No feedback from the backend when committing a branch's changes
- ASIPLAT-1454 - Service Modelling: No feedback in the UI when a merge fails
- ASIPLAT-1456 - Service Modelling (Events): DataBufferLimitExceeded error when attempting to upload a large model from CSV
- ASIPLAT-1457 - Service Modelling: 'Make Live' button not very obvious to the user
- ASIPLAT-1458 - Service Modelling: 'Make Live' not working due to an incorrect table being used in the findAllPolicies method
- ASIPLAT-1460 - Installation: Add guard to upgrade scripts to ensure that they can only run as the ppadmin user
- ASIPLAT-1461 - Events (Query Builder): Incorrect URL gets built when using multiple sorts
- ASIPLAT-1466 - Dashboards: .org.chromium.Chromium directories not being cleaned up
Enhancements
- ASIPLAT-781 - Authenticator: Bump the keycloak version from 25.0.6 to 26.0.7
- ASIPLAT-802 - Service Modelling: Introduce Service Modelling functionality as part of Event Management
- ASIPLAT-1101 - Event Management: Allow command-line options to be fed to the 'registerEventsWithAsi' script to allow for unattended configuration
- ASIPLAT-1195 - Platform: Bump spring-boot to version 3.3.6
- ASIPLAT-1213 - ASI DataHub: Introduce the DataHub ASI Platform Module
- ASIPLAT-1216 - Authorization Providers: Add 'Principal Type' and 'NameID policy format' fields to the SAML definition page
- ASIPLAT-1228 - Authenticator: Rename authenticator's 'realm_access.roles' to 'roles' to allow DataHub connectivity via OIDC
- ASIPLAT-1354 - Platform: Drop Python 2 Dependency
- ASIPLAT-1403 - Management Service: Introduce a management-service-startup.log file
- ASIPLAT-1407 - Events (Field Definitions): Add more meaningful error messages to the Field Definitions page to help debug issues when pulling back field definitions
Known Issues
- ASIPLAT-494 - Dashboard: Edit Dashboard Properties window no longer has the button to view All Widgets
- ASIPLAT-1036 - Management Console: Management Console clustered instances inconsistencies
- ASIPLAT-1256 - User Administration: Users who have never logged on should have a default value set for the 'Last Login' field instead of '1970-01-01T01:00:00.000+01:00'
- ASIPLAT-1373 - User Federation (LDAP): All AD Groups and Users get imported into ASI, leading to peformance issues when loading both Group and User pages
- ASIPLAT-1374 - Performance: Long load times on User/Group admin pages on systems with large volumes of records
- ASIPLAT-1448 - User Sessions: Session expiry issues whilst multiple tabs are open
- ASIPLAT-1465 - Dashboards: Chrome/Selenium writing files to '/tmp'
Resolved CVE's
Known CVE's
- CVE-2015-5211 CRITICAL
- CVE-2016-1000027 CRITICAL
- CVE-2016-1000031 CRITICAL
- CVE-2016-8735 CRITICAL
- CVE-2017-17485 CRITICAL
- CVE-2017-5929 CRITICAL
- CVE-2017-8046 CRITICAL
- CVE-2018-11307 CRITICAL
- CVE-2018-1270 CRITICAL
- CVE-2018-1275 CRITICAL
- CVE-2018-14718 CRITICAL
- CVE-2018-14719 CRITICAL
- CVE-2018-14720 CRITICAL
- CVE-2018-14721 CRITICAL
- CVE-2018-19360 CRITICAL
- CVE-2018-19361 CRITICAL
- CVE-2018-19362 CRITICAL
- CVE-2018-7489 CRITICAL
- CVE-2019-14379 CRITICAL
- CVE-2019-14540 CRITICAL
- CVE-2019-14892 CRITICAL
- CVE-2019-14893 CRITICAL
- CVE-2019-16335 CRITICAL
- CVE-2019-16942 CRITICAL
- CVE-2019-16943 CRITICAL
- CVE-2019-17267 CRITICAL
- CVE-2019-17531 CRITICAL
- CVE-2019-20330 CRITICAL
- CVE-2020-10683 CRITICAL
- CVE-2020-8840 CRITICAL
- CVE-2020-9546 CRITICAL
- CVE-2020-9547 CRITICAL
- CVE-2020-9548 CRITICAL
- CVE-2021-21342 CRITICAL
- CVE-2021-21344 CRITICAL
- CVE-2021-21345 CRITICAL
- CVE-2021-21346 CRITICAL
- CVE-2021-21347 CRITICAL
- CVE-2021-21350 CRITICAL
- CVE-2021-21351 CRITICAL
- CVE-2021-23463 CRITICAL
- CVE-2021-42392 CRITICAL
- CVE-2022-0839 CRITICAL
- CVE-2022-1471 CRITICAL
- CVE-2022-21724 CRITICAL
- CVE-2022-22965 CRITICAL
- CVE-2022-23221 CRITICAL
- CVE-2022-36437 CRITICAL
- CVE-2023-20873 CRITICAL
- CVE-2024-1597 CRITICAL
- CVE-2024-50379 CRITICAL
- CVE-2024-52316 CRITICAL
- CVE-2024-56337 CRITICAL
- CVE-2024-52046 CRITICAL
- CVE-2024-52577 CRITICAL
- CVE-2024-12225 CRITICAL
- CVE-2025-24813 CRITICAL
- CVE-2025-31651 CRITICAL
- CVE-2002-0493 HIGH
- CVE-2002-1394 HIGH
- CVE-2002-2272 HIGH
- CVE-2009-3548 HIGH
- CVE-2013-2185 HIGH
- CVE-2014-0107 HIGH
- CVE-2014-0225 HIGH
- CVE-2016-1000338 HIGH
- CVE-2016-10750 HIGH
- CVE-2016-5007 HIGH
- CVE-2016-9878 HIGH
- CVE-2017-18640 HIGH
- CVE-2017-7536 HIGH
- CVE-2017-7957 HIGH
- CVE-2018-1000817 HIGH
- CVE-2018-11040 HIGH
- CVE-2018-12022 HIGH
- CVE-2018-12023 HIGH
- CVE-2018-1258 HIGH
- CVE-2018-1272 HIGH
- CVE-2018-15756 HIGH
- CVE-2018-17605 HIGH
- CVE-2018-5968 HIGH
- CVE-2019-10086 HIGH
- CVE-2019-12086 HIGH
- CVE-2019-12728 HIGH
- CVE-2019-14439 HIGH
- CVE-2020-10650 HIGH
- CVE-2020-10969 HIGH
- CVE-2020-11979 HIGH
- CVE-2020-17527 HIGH
- CVE-2020-24616 HIGH
- CVE-2020-24750 HIGH
- CVE-2020-25638 HIGH
- CVE-2020-25649 HIGH
- CVE-2020-26217 HIGH
- CVE-2020-26258 HIGH
- CVE-2020-35490 HIGH
- CVE-2020-35491 HIGH
- CVE-2020-36179 HIGH
- CVE-2020-36180 HIGH
- CVE-2020-36181 HIGH
- CVE-2020-36182 HIGH
- CVE-2020-36183 HIGH
- CVE-2020-36184 HIGH
- CVE-2020-36185 HIGH
- CVE-2020-36186 HIGH
- CVE-2020-36187 HIGH
- CVE-2020-36188 HIGH
- CVE-2020-36189 HIGH
- CVE-2020-36518 HIGH
- CVE-2020-8022 HIGH
- CVE-2020-9484 HIGH
- CVE-2020-10718 HIGH
- CVE-2020-10740 HIGH
- CVE-2021-20190 HIGH
- CVE-2021-21341 HIGH
- CVE-2021-21343 HIGH
- CVE-2021-21348 HIGH
- CVE-2021-21349 HIGH
- CVE-2021-22112 HIGH
- CVE-2021-22118 HIGH
- CVE-2021-25122 HIGH
- CVE-2021-25329 HIGH
- CVE-2021-29505 HIGH
- CVE-2021-35515 HIGH
- CVE-2021-35516 HIGH
- CVE-2021-35517 HIGH
- CVE-2021-36090 HIGH
- CVE-2021-37136 HIGH
- CVE-2021-37137 HIGH
- CVE-2021-39139 HIGH
- CVE-2021-39141 HIGH
- CVE-2021-39144 HIGH
- CVE-2021-39145 HIGH
- CVE-2021-39146 HIGH
- CVE-2021-39147 HIGH
- CVE-2021-39148 HIGH
- CVE-2021-39149 HIGH
- CVE-2021-39150 HIGH
- CVE-2021-39151 HIGH
- CVE-2021-39152 HIGH
- CVE-2021-39153 HIGH
- CVE-2021-39154 HIGH
- CVE-2021-41079 HIGH
- CVE-2021-43859 HIGH
- CVE-2021-46877 HIGH
- CVE-2022-23181 HIGH
- CVE-2022-24839 HIGH
- CVE-2022-25857 HIGH
- CVE-2022-27772 HIGH
- CVE-2022-29885 HIGH
- CVE-2022-31197 HIGH
- CVE-2022-34169 HIGH
- CVE-2022-40151 HIGH
- CVE-2022-40152 HIGH
- CVE-2022-41881 HIGH
- CVE-2022-41966 HIGH
- CVE-2022-42003 HIGH
- CVE-2022-42004 HIGH
- CVE-2022-42252 HIGH
- CVE-2022-45868 HIGH
- CVE-2022-1278 HIGH
- CVE-2023-1370 HIGH
- CVE-2023-20883 HIGH
- CVE-2023-24998 HIGH
- CVE-2023-2976 HIGH
- CVE-2023-44487 HIGH
- CVE-2023-45859 HIGH
- CVE-2023-46131 HIGH
- CVE-2023-46589 HIGH
- CVE-2023-6378 HIGH
- CVE-2024-22259 HIGH
- CVE-2024-24549 HIGH
- CVE-2024-34750 HIGH
- CVE-2024-38286 HIGH
- CVE-2024-45394 HIGH
- CVE-2024-7254 HIGH
- CVE-2025-31650 HIGH
- CVE-2025-46701 HIGH
- CVE-2025-48734 HIGH
- CVE-2025-48976 HIGH
- CVE-2025-48988 HIGH
- CVE-2025-48989 HIGH
- CVE-2025-49124 HIGH
- CVE-2025-49125 HIGH
- CVE-2025-52434 HIGH
- CVE-2025-52520 HIGH
- CVE-2025-53506 HIGH
- CVE-2025-55163 HIGH
- CVE-2025-24970 HIGH
- CVE-2000-0672 MEDIUM
- CVE-2000-0760 MEDIUM
- CVE-2000-1210 MEDIUM
- CVE-2001-0590 MEDIUM
- CVE-2002-1148 MEDIUM
- CVE-2002-2006 MEDIUM
- CVE-2003-0042 MEDIUM
- CVE-2003-0043 MEDIUM
- CVE-2003-0044 MEDIUM
- CVE-2003-0045 MEDIUM
- CVE-2003-0866 MEDIUM
- CVE-2005-0808 MEDIUM
- CVE-2005-4838 MEDIUM
- CVE-2006-7196 MEDIUM
- CVE-2007-1355 MEDIUM
- CVE-2007-2449 MEDIUM
- CVE-2007-3383 MEDIUM
- CVE-2008-0128 MEDIUM
- CVE-2008-2938 MEDIUM
- CVE-2009-2696 MEDIUM
- CVE-2013-4152 MEDIUM
- CVE-2013-4286 MEDIUM
- CVE-2013-4322 MEDIUM
- CVE-2013-4444 MEDIUM
- CVE-2013-4590 MEDIUM
- CVE-2013-6357 MEDIUM
- CVE-2013-6429 MEDIUM
- CVE-2013-7315 MEDIUM
- CVE-2014-0054 MEDIUM
- CVE-2014-0075 MEDIUM
- CVE-2014-0096 MEDIUM
- CVE-2014-0099 MEDIUM
- CVE-2014-0119 MEDIUM
- CVE-2014-1904 MEDIUM
- CVE-2014-3578 MEDIUM
- CVE-2014-3625 MEDIUM
- CVE-2015-0886 MEDIUM
- CVE-2015-3192 MEDIUM
- CVE-2018-1000873 MEDIUM
- CVE-2018-10237 MEDIUM
- CVE-2018-11039 MEDIUM
- CVE-2018-1196 MEDIUM
- CVE-2018-1199 MEDIUM
- CVE-2018-1257 MEDIUM
- CVE-2018-1271 MEDIUM
- CVE-2018-2799 MEDIUM
- CVE-2018-14627 MEDIUM
- CVE-2019-10219 MEDIUM
- CVE-2019-12384 MEDIUM
- CVE-2019-12814 MEDIUM
- CVE-2019-14900 MEDIUM
- CVE-2019-3805 MEDIUM
- CVE-2020-10693 MEDIUM
- CVE-2020-13956 MEDIUM
- CVE-2020-15250 MEDIUM
- CVE-2020-15522 MEDIUM
- CVE-2020-17521 MEDIUM
- CVE-2020-26259 MEDIUM
- CVE-2020-26939 MEDIUM
- CVE-2020-5421 MEDIUM
- CVE-2020-1719 MEDIUM
- CVE-2020-25640 MEDIUM
- CVE-2020-25689 MEDIUM
- CVE-2021-21290 MEDIUM
- CVE-2021-21295 MEDIUM
- CVE-2021-21409 MEDIUM
- CVE-2021-22060 MEDIUM
- CVE-2021-22096 MEDIUM
- CVE-2021-24122 MEDIUM
- CVE-2021-27568 MEDIUM
- CVE-2021-28170 MEDIUM
- CVE-2021-29425 MEDIUM
- CVE-2021-30640 MEDIUM
- CVE-2021-33037 MEDIUM
- CVE-2021-36373 MEDIUM
- CVE-2021-36374 MEDIUM
- CVE-2021-39140 MEDIUM
- CVE-2021-42550 MEDIUM
- CVE-2021-43797 MEDIUM
- CVE-2021-3503 MEDIUM
- CVE-2021-3536 MEDIUM
- CVE-2022-22950 MEDIUM
- CVE-2022-22968 MEDIUM
- CVE-2022-22970 MEDIUM
- CVE-2022-22971 MEDIUM
- CVE-2022-23437 MEDIUM
- CVE-2022-24823 MEDIUM
- CVE-2022-34305 MEDIUM
- CVE-2022-38749 MEDIUM
- CVE-2022-38750 MEDIUM
- CVE-2022-38751 MEDIUM
- CVE-2022-38752 MEDIUM
- CVE-2022-41854 MEDIUM
- CVE-2022-41946 MEDIUM
- CVE-2022-40159 MEDIUM
- CVE-2022-40160 MEDIUM
- CVE-2023-1932 MEDIUM
- CVE-2023-20861 MEDIUM
- CVE-2023-20863 MEDIUM
- CVE-2023-28708 MEDIUM
- CVE-2023-33202 MEDIUM
- CVE-2023-33264 MEDIUM
- CVE-2023-34462 MEDIUM
- CVE-2023-35116 MEDIUM
- CVE-2023-41080 MEDIUM
- CVE-2023-42795 MEDIUM
- CVE-2023-45648 MEDIUM
- CVE-2023-45860 MEDIUM
- CVE-2023-50572 MEDIUM
- CVE-2023-51074 MEDIUM
- CVE-2023-51775 MEDIUM
- CVE-2023-48795 MEDIUM
- CVE-2024-21733 MEDIUM
- CVE-2024-23672 MEDIUM
- CVE-2024-25710 MEDIUM
- CVE-2024-29025 MEDIUM
- CVE-2024-47535 MEDIUM
- CVE-2024-47554 MEDIUM
- CVE-2024-54677 MEDIUM
- CVE-2024-11407 MEDIUM
- CVE-2024-7246 MEDIUM
- CVE-2024-8391 MEDIUM
- CVE-2024-38820 MEDIUM
- CVE-2025-25193 MEDIUM
- CVE-2025-35036 MEDIUM
- CVE-2025-48924 MEDIUM
- CVE-2025-55668 MEDIUM
- CVE-2025-58057 MEDIUM
- CVE-2025-46392 MEDIUM
- CVE-2025-4949 MEDIUM
- CVE-2007-1358 LOW
- CVE-2007-2450 LOW
- CVE-2007-5461 LOW
- CVE-2008-5519 LOW
- CVE-2020-8908 LOW
- CVE-2021-43980 LOW
- CVE-2025-58056 LOW