Release Notes - 14.1 CP 02

This 14.1 CP 02 cumulative patch provides fixes for Windows and Linux endpoints only. It also includes several new operating system certifications
capamsc141
This 14.1 CP 02 cumulative patch provides fixes for Windows and Linux endpoints only. It also includes several new operating system certifications
 
 
Defect Fixes
The following defects have been fixed in this cumulative patch:
Case Number
Internal Defect ID
 
Resolved Issue
 
01228715
DE391799
dhost field in the EventForwarder output did not display the FQDN of the ReportAgent-host (the source of the audit message) when this host is on Windows.
01320880
DE409363
The warning log of TCP(Inbound) shows as permit by -format 80SP1.
01347041
DE415076
Behavior of tfinstall.exe issue.
1372962
DE420524
Try not to execute seosd if seosd is still up.
01360477
DE417701
Exporting config commands to the selang script does not put neutral quotation marks around token values that contain a comma.
20007637
DE421237
Unable to Start the PMDB, resulting in PMDB Protocol error.
01261381
DE407447
Analysis for OS crash dump by PIM.
01308465
DE409291
RHEL Server 7.6 is in a hung state, with deadlock between seos module and seosd process
01245552
DE396205
System crashing on restarting the 3rd party application Imperva / SecureSphere agent on the PIM machine
01319590
DE409570
Access denied by stage code 995 
01293006
DE404523
After upgrade with DE390109, kbl log shows incorrect information. It does not show the access host column. 
01300233
DE405456
Comma and brackets characters do not work in sepass while passwd_distribution_encryption_mode = 3 and passwd_local_encryption_method = sha512
01333247
DE411984 
sesu is crashing for AD users logged on via sss and while 'UseInvokerPassword = yes' in seos.ini
01280371
DE403885
After the endpoint is configured to passwd_distribution_encryption_mode = 3 passwd_local_encryption_method = sha512, policyfetcher fails to retrieve the policy from the DS with error
01346287
DE414560
Log for KMODULE class for appears only for unload.
01345423
DE419760
Denied access but job starts
01345761
DE417632
Uninstalling eTAC impacts config files in /etc/pam.d
1339341
DE420762
Deny appears on inode/device for restricted user with ksh shell
20000960
DE420288
Cannot change KBL debug log directory in seos.ini.
20025592
DE424443 
Core dumps for UNAB.
20021949
DE423949 
loginflags(NOGRACE) with so class-(TCP).
00000000
DE416505
Endpoint: Solaris 11.4: Authorization for TCP class is not working
01323014
DE409932
01323014-Compatibility inquiry for PIM 12.8 SP1. 
01156510
DE378787
01156510-A-AUTO failed to start with kernel error of seos
01262568
DE398138
Make brutal trunate if there is 0 offset can be truncated. Out of Sync of DMS and DH.
20022448
DE423962
PAMSC(EP) r14.1CP01: [FCA1905161] Fatal Error while installation and startup
01364963
DE418380
PAMSC(EP) r14.1: ETAC_QA(ASIS 733488): Error message in syslog at executing su: customer tried to change user from non-root user to root by su or sudo generated an output error in syslog
01311743
DE409030 
PAMSC 14.10 - sesudo issue
01328815
DE410816
ReportAgent is installed by upgrading to 14.1 CP1
01119865
DE370657
CRONJOB_ appears at the end of incoming TCP audit log
01295056
DE404654
When passwd_local_encryption_method is set to SHA512, passwords changed locally through selang are encrypted properly, but passwords changed through PUPM are not being encrypted. 
01287555
DE404514
Registry differences between 14.0 and 14.1
Operating System Certifications
The following operating systems are certified in 14.1 CP 02:
Windows 2019: 
Currently, in this version, our product does not support either Microsoft Windows Secure Boot or Windows Device Guard features. Enabling any of these features prevents our drivers from booting up, thus our product will not run.
 
OS Name
 
 
Kernel Version
 
SOLARIS 11.4
11.4.0.15.0
OEL 7.6 UEK
4.14.35-1818.3.3.el7uek.x86_64
RHEL 7.7
3.10.0-1062.el7.x86_64
Windows 2019
See the previous Note.
Apply the 14.1 CP 02 Cumulative Patch
To apply post GA fixes and enhancements in your environment, see the product documentation: