Release Notes - 14.1 CP 02
This 14.1 CP 02 cumulative patch provides fixes for Windows and Linux endpoints only. It also includes several new operating system certifications
capamsc141
This 14.1 CP 02 cumulative patch provides fixes for Windows and Linux endpoints only. It also includes several new operating system certifications
Defect Fixes
The following defects have been fixed in this cumulative patch:
Case Number | Internal Defect ID | Resolved Issue |
01228715 | DE391799 | dhost field in the EventForwarder output did not display the FQDN of the ReportAgent-host (the source of the audit message) when this host is on Windows. |
01320880 | DE409363 | The warning log of TCP(Inbound) shows as permit by -format 80SP1. |
01347041 | DE415076 | Behavior of tfinstall.exe issue. |
1372962 | DE420524 | Try not to execute seosd if seosd is still up. |
01360477 | DE417701 | Exporting config commands to the selang script does not put neutral quotation marks around token values that contain a comma. |
20007637 | DE421237 | Unable to Start the PMDB, resulting in PMDB Protocol error. |
01261381 | DE407447 | Analysis for OS crash dump by PIM. |
01308465 | DE409291 | RHEL Server 7.6 is in a hung state, with deadlock between seos module and seosd process |
01245552 | DE396205 | System crashing on restarting the 3rd party application Imperva / SecureSphere agent on the PIM machine |
01319590 | DE409570 | Access denied by stage code 995 |
01293006 | DE404523 | After upgrade with DE390109, kbl log shows incorrect information. It does not show the access host column. |
01300233 | DE405456 | Comma and brackets characters do not work in sepass while passwd_distribution_encryption_mode = 3 and passwd_local_encryption_method = sha512 |
01333247 | DE411984 | sesu is crashing for AD users logged on via sss and while 'UseInvokerPassword = yes' in seos.ini |
01280371 | DE403885 | After the endpoint is configured to passwd_distribution_encryption_mode = 3 passwd_local_encryption_method = sha512, policyfetcher fails to retrieve the policy from the DS with error |
01346287 | DE414560 | Log for KMODULE class for appears only for unload. |
01345423 | DE419760 | Denied access but job starts |
01345761 | DE417632 | Uninstalling eTAC impacts config files in /etc/pam.d |
1339341 | DE420762 | Deny appears on inode/device for restricted user with ksh shell |
20000960 | DE420288 | Cannot change KBL debug log directory in seos.ini. |
20025592 | DE424443 | Core dumps for UNAB. |
20021949 | DE423949 | loginflags(NOGRACE) with so class-(TCP). |
00000000 | DE416505 | Endpoint: Solaris 11.4: Authorization for TCP class is not working |
01323014 | DE409932 | 01323014-Compatibility inquiry for PIM 12.8 SP1. |
01156510 | DE378787 | 01156510-A-AUTO failed to start with kernel error of seos |
01262568 | DE398138 | Make brutal trunate if there is 0 offset can be truncated. Out of Sync of DMS and DH. |
20022448 | DE423962 | PAMSC(EP) r14.1CP01: [FCA1905161] Fatal Error while installation and startup |
01364963 | DE418380 | PAMSC(EP) r14.1: ETAC_QA(ASIS 733488): Error message in syslog at executing su: customer tried to change user from non-root user to root by su or sudo generated an output error in syslog |
01311743 | DE409030 | PAMSC 14.10 - sesudo issue |
01328815 | DE410816 | ReportAgent is installed by upgrading to 14.1 CP1 |
01119865 | DE370657 | CRONJOB_ appears at the end of incoming TCP audit log |
01295056 | DE404654 | When passwd_local_encryption_method is set to SHA512, passwords changed locally through selang are encrypted properly, but passwords changed through PUPM are not being encrypted. |
01287555 | DE404514 | Registry differences between 14.0 and 14.1 |
Operating System Certifications
The following operating systems are certified in 14.1 CP 02:
Windows 2019:
Currently, in this version, our product does not support either Microsoft Windows Secure Boot or Windows Device Guard features. Enabling any of these features prevents our drivers from booting up, thus our product will not run.OS Name | Kernel Version |
SOLARIS 11.4 | 11.4.0.15.0 |
OEL 7.6 UEK | 4.14.35-1818.3.3.el7uek.x86_64 |
RHEL 7.7 | 3.10.0-1062.el7.x86_64 |
Windows 2019 | See the previous Note. |
Apply the 14.1 CP 02 Cumulative Patch
To apply post GA fixes and enhancements in your environment, see the product documentation:
- For new installations, see Install CA Privileged Access Manager Server Control Windows Endpoint or Install UNIX Endpoint.
- For upgrades and migrations, see Upgrade or Migrate an Endpoint.