Support Center > Search Results > SecureKnowledge Details
Threat Extraction Engine Release Updates Technical Level
Solution

Availability | List of Resolved Issues | Revision History

 

Introduction

This article lists all released automatic updates for the Threat Extraction Engine. 

The latest updates will be installed automatically on all relevant Check Point machines, if the user chose to allow the Automatic updates download per sk94508. Note that automatic installations are applied only on machines with either Data Loss Prevention or Threat Extraction or Content Awareness active.  

To check which Engine version is installed, in the WebUI, go to Overview (see the below screenshot for the example):

Note that the Engine version will change with every installed update.

Alternatively, via CLI directly on the machine, run:
"/opt/AutoUpdater/latest/bin/autoupdatercli show"  - product-name: tex
 


Availability

Release Version Update Release Date Package Download
R81 Update 2 - Take 14 15 February 2021 (TAR)
R80.40 Update 4 - Take 20 15 February 2021 (TAR)

 

Manual installation (Offline)

Threat Extraction Engine is installed automatically on all relevant Check Point devices if the user allows the Automatic updates download per sk94508.
For users who do not allow automatic updates, Threat Extraction Engine can be installed as described below.

Prerequisite: Install the latest Take of AutoUpdater.


Instructions

To install the release manually, follow the instructions below:
  1. Download the autoupdateIntegralPackageInstall.tgz script and copy it to the /home/admin directory on the Security gateway.
  2. Download the package from the Availability section above.
    Copy this package to the /home/admin directory on the Security gateway.
  3. Connect to the Security Gateway via SSH and run the following command:
    # mkdir -p installer;tar xzf autoupdateIntegralPackageInstall.tgz -C installer
  4. Run: # installer/autoupdateIntegralPackageInstall.sh /home/admin/<package file>
  5. Follow the onscreen instructions.
  6. Wait 5 minutes and run:
    # autoupdatercli show json | jq '.products[] | select(."product-name" == "tex")| ."product-components"[]."repository-packages"[] | select(."package-installed" == "true")'
  7. Validate that the "package-version" in the output is the take you've installed.
Note: The installation does not require cpstop;cpstart or a reboot. Once installed, no further action is required, the update will be applied immediately.


List of Resolved Issues and New Features per Update Take

The lists below describe all resolved issues and and new features and provides the Take number that includes the fix. A resolved issue is included in the incremental Hotfix starting from the Take number listed in this table (inclusive). In addition, the table includes the date the Take was published.


What's New?

R81 Release

ID Description
R81 Update 2 - Take 14 (15 February 2021)
TEX-1932 NEW: Added ability to preserve Threat Extraction's user defined localization during Engine update. For instructions, refer to sk171625.
TEX-2012 Header with a link to original file is now supported for RTF files on HTTP flow.
TEX-1886 Updated IBM Java version to 8.0_6.15.
- Added various code improvements.


R80.40 Release

ID Description
R80.40 Update 4 - Take 20 (15 February 2021)
TEX-1932 NEW: Added ability to preserve Threat Extraction's user defined localization during Engine update. For instructions, refer to sk171625.
TEX-2012 Header with a link to original file is now supported for RTF files on HTTP flow. 
TEX-1886 Updated IBM Java version to 8.0_6.15.
- Added various code improvements.



Previous Updates

R81 Releases

ID Description
R81 Update 1 - Take 12 (8 November 2020)
TEX-1441 Threat Extraction engine falsely detected some types of password-protected documents as unsupported files.
- Added various security enhancements.

R80.40 Releases

ID Description
R80.40 Update 3 - Take 18 (8 November 2020)
TEX-1441 Threat Extraction engine falsely detected some types of password-protected documents as unsupported files.
- Added various security enhancements.
R80.40 Update 2 - Take 15 (June 22, 2020)
TEX-1621,
TEX-1507
UPDATE: The following picture file types are now sanitized (cleaned) when embedded inside Microsoft Excel and Word documents: EMF, WMF, SVG, JPEG2000, EPS.
TEX-1438,
TEX-1306
UPDATE: Added the ability to clean RTF files and not only convert them to PDF.
To configure the cleaning RTF files, refer to sk167337.
TEX-1631,
TEX-1437
In some scenarios, the supported files are not cleaned and a false log is generated stating they are not supported.
- Various security enhancements.
R80.40 Update 1 - Take 10 (May 17, 2020)
- Automatic Updates - Starting from R80.40, Threat Extraction updates will be released periodically, allowing better agility and responsiveness to issues arising from the field.
TEX-1348 In some scenarios, the Picture files attached to emails are not converted to PDF, even though the MTA gateway is configured to do so.
TEX-1699,
TEX-1671
In some scenarios, Threat Extraction may stop working for Web downloads and email attachments after a Jumbo Hotfix update.
TEX-1622 In some scenarios, the title of a cleaned PDF file may be corrupted.
TEX-1348 Added various minor fixes and stability improvements.

Revision History

Show / Hide revision history

Date Description
28 Apr 2021 Updated the Installation instructions
15 Feb 2020
  • Released R80.40 Update 4 - Take 20
  • Released R81 Update 2 - Take 14
08 Nov 2020
  • Released R80.40 Update 3 - Take 18
  • Released R81 Update 1 - Take 12
22 Jun 2020 Released R80.40 Update 2 - Take 15
14 Jun 2020 Released R80.40 Take Update 2 - 13
17 May 2020 First release of this document: R80.40 Update 1 - Take 10

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment