========================================================== Maintenance for IBM Sterling Connect:Direct for UNIX 4.3.0 ========================================================== This maintenance archive includes module replacements for the C:D UNIX 4.3.0 code base. It is applicable to C:D UNIX version 4.3.0, and contains all the new functionality and fixes as described in the C:D UNIX 4.3.0 Release notes, as well as fixes for the issues listed below. This release implements IBM's standard V.R.M.F method of identifying software. V, R, M and F are Version, Release, Modification and Fix Pack respectively. In general, V.R.M imply new functionality, while F is an accumulation of fixes called a Fix Pack. The term Fix Pack will be used going forward in place of Cumulative Maintenance. Individual fixes also have a new name, Interim Fixes, or iFixes for short. iFixes are numbered sequentially from one starting with any increment to V, R, M or F. Please see IBM's website for further details regarding this methodology. After applying the maintenance, the CLI banner will report that your C:D version is 4.3.0.x, where x is the current Fix Pack. It will also display the date that the maintenance was created. For more information, please refer to the C:D UNIX 4.3.0 Release Notes. ================================================= iFixes listed below apply to C:D for UNIX 4.3.0.0 ================================================= 001) RTC523522 / APAR IT18957 commit date: 26 Apr 2018 -------------------------------------------------------- In rare circumstances, a text file sent to a destination file with fixed block record format on z/OS may be padded with ASCII blanks instead of EBCDIC. 002) RTC552947 / APAR IT24014 commit date: 30 Apr 2018 -------------------------------------------------------- When Secure+ security mode is disabled, session establishment can be expected to take less time than when a security mode, FIPS 140-2, for example, is enabled. However, session establishment with security mode disabled takes the same amount of time as when enabled. Session establishment times may also be increased if cdpmgr inherits a large maximum file descriptor system resource limit. 003) RTC564598 / APAR IT25140 commit date: 24 May 2018 -------------------------------------------------------- Incoming Secure+ session incorrectly allowed when the .Local node has Secure+ enabled and there is no Secure+ entry for the remote node. 004) RTC561582 / APAR IT24339 commit date: 25 May 2018 -------------------------------------------------------- Copy send performance to C:D Z/OS can be degraded when the UNIX source file sysopts includes "datatype=binary", and the Z/OS destination file record format is VB or FB. 005) RTC561515 commit date: 22 June 2018 ------------------------------------------ When alt.comm.outbound is configured on a remote node, traverse the alt.comm.outbound list on each process retry until we have a successful connection to the remote node. 006) RTC568699 commit date: 05 July 2018 ------------------------------------------ Customization fails with a syntax error during installation of C:D UNIX 4.3 on Solaris. 007) MFT-9886 commit date: 15 Aug 2018 ---------------------------------------- Connect:Direct for UNIX Secure+ uses IBM Java Runtime, which is vulnerable to the following issue: CVE-2018-2602: An unspecified vulnerability related to the Java SE I18n component could allow an unauthenticated attacker to cause low confidentiality impact, low integrity impact, and low availability impact. 008) MFT-9824 commit date: 16 Aug 2018 ---------------------------------------- A process may terminate abruptly with statistics reporting "SMGR terminated by signal". A known manifestation of this issue is likely to occur when a run job on a C:D z/OS node is attempted. 009) RTC562386 / APAR IT24362 commit date: 04 Sep 2018 -------------------------------------------------------- Parser error XPAE003I may be generated when submitting a process that has an snodeid coded with a 'Y' or 'N' character for the password. 010) RTC565352 / APAR IT24904 commit date: 04 Sep 2018 -------------------------------------------------------- There are three possible issues that may occur when sending a text file a to a z/OS destination that uses VB format with LRECL=BLKSIZE+4: . If the first record is within four bytes of the block size, the transfer will fail with an SVSJ045I message. . If the first record is four bytes or more smaller than the block size, and a subsequent record fills an entire block exactly, the z/OS destination file will be corrupted. . If the first record is four bytes or more smaller than the block size, and a subsequent record is up to four bytes longer than the maximum record size, this error condition will not be detected, and the z/OS destination file will be corrupted. 011) RTC567101 / APAR IT24905 commit date: 04 Sep 2018 -------------------------------------------------------- When sending a file to C:D z/OS and specifying the SYSOUT SYSOPTS parameter, CDU may inappropriately set the destination record format (RECFM) to VB. 012) RTC564088 / APAR IT25329 commit date: 04 Sep 2018 -------------------------------------------------------- If a process is submitted that runs a job or task on a node with a pmgr trace running, anything written to stdout by the job or task may also appear in the pmgr trace output. This might occur even after the pmgr trace is turned back off. 013) RTC565959 commit date: 04 Sep 2018 ----------------------------------------- In some circumstances, an attempt to update the .Local node record via the Secure+ Admin Tool will fail reporting something similar to "Error #6 - Remote Node file not found." 014) RTC566602 / MFT-9446 / APAR IT26480 commit date: 04 Sep 2018 ------------------------------------------------------------------- On AIX systems, C:D UNIX executables will inappropriately prefer run time libraries in /usr/vac/lib and /usr/vacpp/lib directories instead of the standard /usr/lib /lib directories. The /usr/vac/lib and /usr/vacpp/lib directories may be populated if an IBM compiler is installed on the system, for example. If the libraries in /usr/vac/lib and /usr/vacpp/lib are old or otherwise incompatible with the C:D UNIX executables, various errors may occur, including XSMG609I, SMGR (pnode) failed to convert FMH68 to network format. 015) RTC571051 commit date: 04 Sep 2018 ----------------------------------------- In rare circumstances, a process may fail to start, reporting an XSCM006E error, all users are denied access to CD from the SACL, even though the Strong Access Control (SACL) directory and file appear to have correct ownership and permissions set. Enhanced error messages to provide greater detail when this happens. 016) MFT-9613 / APAR IT26158 commit date: 10 Sep 2018 ------------------------------------------------------- The Connect:Direct for Unix UI will fail when opening ndmapi.cfg if the local file system has assigned to the file an inode number greater than 32 bits in size. 017) CDUA-1102 commit date: 16 Aug 2018 ----------------------------------------- An update proxy command issued from a KQV client, such as C:D Browser or IBM Control Center, may fail indicating "The variable proxy name was out of bounds", even though the proxy name is valid. 018) MFT-10001 / APAR IT26905 commit date: 14 Nov 2018 -------------------------------------------------------- IBM Sterling Connect:Direct for UNIX uses IBM(R) Runtime Environment Java(TM) (JRE) Versions 8.0.5.15 and 7.0.10.25. These JREs are vulnerable to the following issues, disclosed as part of the IBM Java SDK updates in July 2018: CVE-2018-12539: Eclipse OpenJ9 could allow a local attacker to gain elevated privileges on the system, caused by the failure to restrict the use of Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations to only the process owner. An attacker could exploit this vulnerability to execute untrusted native code and gain elevated privileges on the system. CVE-2018-1656: The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) does not protect against path traversal attacks when extracting compressed dump files. 019) MFT-9969 / APAR IT27224 commit date: 07 Dec 2018 ------------------------------------------------------- Using the Amazon S3 file IO exit to receive a zero byte file fails, reporting message FIOX044E. 020) MFT-9996 / APAR IT27673 commit date: 09 Jan 2019 ------------------------------------------------------ A backup created when running the interactive script may incur permission errors when writing to the installation directory's parent folder. Instead, create the backup in the installation directory. 021) MFT-10047 / APAR IT27442 commit date: 10 Jan 2019 -------------------------------------------------------- When upgrading a C:D UNIX node with an existing keystore, a keystore password is not required. However, the automated install script, cdinstall_a, fails reporting CDAI003E when the cdai_installCmd is set to "upgrade" and no cdai_keystorePassword parameter is coded. 022) MFT-9526 / APAR IT26469 commit date: 14 Jan 2019 ------------------------------------------------------- To run C:D UNIX on Solaris 10 requires Update 10 or greater. Updates may be applied as a full release or as a patchset. cdinstall correctly recognizes a full release Update, but wasn't recognizing a patchset update and failed the install. 023) MFT-10026 / APAR IT27933 commit date: 30 Jan 2019 -------------------------------------------------------- After installing or upgrading to C:D UNIX 4.3.0.0.iFix018, the banners of the Secure+ administration tools, SPAdmin and SPCli, refer to C:D UNIX 4.2.0.4. 024) MFT-9523 / APAR IT26470 commit date: 04 Feb 2019 ------------------------------------------------------- Control Center not reading CDU Secure+ presence correctly. 025) MFT-10143 / APAR IT28061 commit date: 12Feb 2019 ------------------------------------------------------- A proxy update issued by a KQV client does not complete successfully if the user name or node name contains a period. 026) MFT-9917 / APAR IT27019 commit date: 13 Feb 2019 ------------------------------------------------------- An ICC select process command submitted to C:D UNIX may occasionally fail with CNCD058E message. 027) MFT-9967 / APAR IT26865 commit date: 07 Mar 2019 ------------------------------------------------------- CD UNIX may allow a user with sudo access restricted to certain CD UNIX executable files to expand access beyond the restriction, as indicated in the following issue: CVE-2018-1903: IBM Sterling Connect:Direct for UNIX could allow a user with restricted sudo access on a system to manipulate CD UNIX to gain full sudo access. 028) MFT-10116 / APAR IT27777 commit date: 20 Mar 2019 -------------------------------------------------------- A COPY to the local destination file /dev/null fails with error XSQF006I, feedback code 22. 029) MFT-10016 / APAR IT28408 commit date: 25 mar 2019 -------------------------------------------------------- Transfer rate to AWS S3 needs improvement. This fix also adds support for direct access to S3 from an on-premises node The following new properties are available and can be used in initparm.cfg file or sysopts: s3.endPointUrl IP or hostname to access S3 services. Amazon S3 endpoint is the default. Example: s3.endpointUrl=my.s3provider.com s3.endPointPort Port to use if any. No default value. Example: s3.endpointPort=8080 s3.endPointSecure Secure or non secure access. HTTPS or HTTP requests. YES is the default. Example: s3.endpointSecure=NO s3.profilePath Credential file to use. Amazon credentials search order is the default. Example: s3.profilePath='/opt/some path/credentials' s3.profileName Profile name to use from credential file. default is the amazon S3 default [default] Example: s3.profileName=otherprofile s3.executorQueue Parallel transfer upload queue size. Default is 5. s3.executorMinPool Parallel upload. Initial number of transfer upload threads to use. Default is 10. s3.executorMaxPool Parallel upload. Maximum number of transfer upload threads to use. Default is 30. Max value is AmazonS3 max connections (50). 030) MFT-10212 / APAR IT28704 commit date: 10 Apr 2019 -------------------------------------------------------- A protocol violation and session failure occur after a remote RUNTASK step executed in C:D Unix fails due to a user permissions error. 031) MFT-9971 / APAR IT28761 commit date: 12 Apr 2019 ------------------------------------------------------- In the statistics log entry recording maximum achieved parallel sessions (RECI=SCNT), the LCNT001I message text does not display the maximum sessions or time achieved. 032) MFT-4757 / APAR IT28892 commit date: 24 Apr 2019 ------------------------------------------------------- Restarted copy steps fail with XCPR011I if the snode was cold started (work directory cleared) between the initial session and the restarted session. 033) MFT-10273 / APAR IT28898 commit date: 25 Apr 2019 ------------------------------------------------------- Restarted copy steps fail with XCPR011I if the destination file was deleted between the initial session and the restarted session. 034) CDUA-1399 commit date: 16 May 2019 ----------------------------------------- snode work directory file names are not unique enough for high stress scenarios. 035) CDUA-1429 commit date: 06 May 2019 ----------------------------------------- cfgcheck takes lot of time to validate thousands of netmap entries. 036) MFT-9588 / APAR IT26481 commit date: 22 May 2019 ------------------------------------------------------- In rare circumstances, a process may fail to start, reporting an XSCM006E error, all users are denied access to CD from the SACL, even though the Strong Access Control (SACL) directory and file appear to have correct ownership and permissions set. 037) MFT-10147 / APAR IT29097 commit date: 22 May 2019 -------------------------------------------------------- When multiple copy processes are in session to a C:D snode running in a load balanced cluster and that node is abruptly killed, the pnode will restart the processes and the copies will complete successfully on another snode in the cluster. However, in rare cases, the copy termination record of some of the restarted processes is not logged on the snode side, and temporary work files may be left in the shared snode work directory. 038) MFT-10282 / APAR IT29243 commit date: 24 May 2019 -------------------------------------------------------- During FASP transfer at Pnode, API command select process with details times out. 039) MFT-10277 / APAR IT28732 commit date: 28 May 2019 -------------------------------------------------------- Supersedes MFT-9969(IT27224) Using the Amazon S3 file IO exit to receive a zero byte file fails, reporting message FIOX044E. 040) MFT-10328 commit date: 28 May 2019 ----------------------------------------- AWS S3 Messages too long for statistics 041) CDUA-1448 commit date: 28 May 2019 ----------------------------------------- S3 Write checkpoint functionality broken 042) MFT-10389 / APAR IT29296 commit date: 29 May 2019 -------------------------------------------------------- IBM Sterling Connect:Direct for UNIX uses IBM(R) Runtime Environment Java(TM) (JRE) Versions 8.0.5.25, 8.0.5.20, and 7.0.10.30. These JREs are vulnerable to the following issues, disclosed as part of the IBM Java SDK updates in January 2019: CVE-2018-12547: Eclipse OpenJ9 is vulnerable to a buffer overflow, caused by improper bounds checking by the jio_snprintf() and jio_vsnprintf() functions. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVE-2018-1890: IBM SDK, Java Technology Edition Version 8 on the AIX platform uses absolute RPATHs which may facilitate code injection and privilege elevation by local users. 043) CDUA-1520 commit date: 30 May 2019 ----------------------------------------- Multiple vulnerabilities in IBM Java Runtime affect IBM Sterling Connect:Direct File Agent (CVE-2018-1890, CVE-2018-12547), which is bundled with Connect:Direct for UNIX. Also, the File Agent installer may fail on some UNIX systems with error "Installer User Interface Mode Not Supported". 044) CDUA-1542 / APAR IT29487 commit date: 20 Jun 2019 -------------------------------------------------------- A restarted process may log an inappropriate XSQF009I message referring to a file that ends with ".savedCTRstatLog". Also, the direct CLI output of a detailed select statistics command may include a message id and a Short Text description of the message. The Short Text description might be truncated if the text is very long. Note: It's remotely possible that a restarted process may fail on the snode side with an XSMG235I or XSMG239I message that refers to a file ending with .savedCTRstatLog. This indicates that there may be a copy step of the indicated process that is missing its CTRC record on the snode side. If user investigates and determines the CTRC record is logged, or is not necessary, then they may get past these errors by removing the indicated file that ends with .savedCTRstatLog and then releasing the process again. 045) CDUA-1529 commit date: 21 Jun 2019 ----------------------------------------- Cfgcheck does not accept more than one file.ioexit entry in initparm.cfg 046) MFT-10416 commit date: 03 Jul 2019 ----------------------------------------- On some systems, cdpmgr may fail to start, reporting an XRIA010I message. cfgcheck may also report the same error attempting to validate configuration files. 047) MFT-10398 / APAR IT29723 commit date: 15 Jul 2019 -------------------------------------------------------- A CD Plex redirection is logged with SCPA007I, RC=8. The completion code has been changed to RC=0. 048) CDUA-1611 commit date: 26 Jul 2019 ----------------------------------------- SPAFileWriteException on spcli.sh stat() when fully qualified directory name is provided. 049) MFT-6817 / APAR IT09719 commit date: 08 Aug 2019 ------------------------------------------------------- During certain stress situations, cdpmgr may become unresponsive for some minutes. During this time, select statistics will show multiple XLKL004I messages in sequence. 050) MFT-10391 / APAR IT29954 commit date: 09 Aug 2019 -------------------------------------------------------- IBM License Metric Tool (ILMT) fails to discover CD UNIX because the ILMT tag file extension is incorrect. 051) CDUA-1690 commit date: 23 Aug 2019 ----------------------------------------- Added support in CD Unix for Control Center Director and License governance. ----------------------------------------------------------- iFixes listed above are accumulated in C:D for UNIX 4.3.0.1 NOTICE: Previous maintenance packages delivered on Fix Central consisted of compressed CPIO files. After a downloaded CPIO file was uncompressed, the installation scripts would then need to be extracted from it in order to apply the maintenance. All future maintenance, including this Fix Pack, will be packaged as uncompressed tar balls containing the uncompressed CPIO installation file and the installation scripts. Please refer to the Maintenance Installation Instructions that accompany maintenance downloads for more details. ----------------------------------------------------------- ================================================= iFixes listed below apply to C:D for UNIX 4.3.0.1 ================================================= 001) MFT-10562 / APAR IT30282 commit date: 13 Sep 2019 -------------------------------------------------------- A run task step executing a command that should normally take less than a second to run may take a full second to complete. 002) MFT-6320 / APAR IT30283 commit date: 17 Sep 2019 ------------------------------------------------------- cdinstall_a executing an upgrade from a fresh deployment directory (i.e., there are no artifacts left from a previous upgrade) will display a rm command error indicating the upgradersps.txt file does not exist. 003) MFT-7909 / APAR IT30318 commit date: 18 Sep 2019 ------------------------------------------------------- When the sending side of a HSAO (FASP) copy step has tcp.max.time.to.wait=0, the step may fail with FASP022E reported on the sending side and FASP009E on the receiving side. 004) CDUA-1721 commit date: 20 Sep 2019 ----------------------------------------- Corrections made to the scripts for CCD support. a. Added support for upgrade from 6.0.0.1 to higher versions via manual installer. The upgrade support was present but it did not upgrade the install agent component. b. When upgrading from an older version to 6.0.0.1, the agent related parameters should automatically get added to userfile.cfg and initparm.cfg. 005) MFT-10192 / APAR IT28399 commit date: 12 Mar 2019 -------------------------------------------------------- Copy fails with error XIPT019E when CRC check is enabled. 006) CDUA-1477/CDUA-1461 commit date: 15 Jul 2019 --------------------------------------------------- Any process submitted using any C:D client with restart parameter set to some valid value in runtask for validation, then the process is validated without showing any detail about restart paramater in response from C:D server. 007) CDUA-1287/CDUA-1291 commit date: 15 Jan 2019 --------------------------------------------------- CDUA-1287-cfgcheck crash is observed.Due to cfgcheck crash, silent installation/upgrade procedure fails with rc=22 CDUA-1291-cdpmgr crash observed if process started with root.Process runs normal with user account. 008) CDUA-1378 commit date: 18 Jul 2019 ----------------------------------------- After setting non-existing trace file path for cdpmgr, new CLI/other clients fail to connect with CDU. 009) MFT-9816 / APAR IT27957 / CVE-2019-4529 commit date: 30 Sep 2019 ----------------------------------------------------------------------- IBM Sterling Connect:Direct for UNIX could allow a user who is authorized for limited CD privileges to attack through a custom application written using the CD UNIX C/C++ API by replacing the system implementation of getuid() with a malicious implementation and gain unauthorized privilege to access to the CD UNIX Server. 010) CDUA-1749 commit date: 08 Oct 2019 ----------------------------------------- On Solaris systems, the cdinstall_a script may fail, reporting "test: argument expected." Also, the cdcust script may insert extra install.agent records in the initparm.cfg file, or extra client.cert_auth parameters in the admin local user record in the userfile.cfg file. 011) MFT-10626 commit date: 09 Oct 2019 ----------------------------------------- On S3, when bucket ACL does not allow write and object sent to this bucket is empty, error from S3 is not returned to CD and copy step terminates with RC=0. 012) MFT-10211 commit date: 10 Oct 2019 ----------------------------------------- Destination file can be corrupted if the file is received to a CDU cluster that is not configured with a shared work area (snode.work.path). 013) CDUA-1578 commit date: 21 Oct 2019 ----------------------------------------- If checkpoint value in a process is incorrect or disabled either implicitly or explicitly, and the connection gets restarted, the transfer never completes. 014) MFT-10324 / APAR IT29156 commit date: 21 Oct 2019 -------------------------------------------------------- When CD Unix performs a COPY RECEIVE, a restart of the COPY may fail with a Signal 11. 015) MFT-7394 commit date: 28 Oct 2019 ---------------------------------------- The cdcustrpt script executed by a user other than root will display "Permission denied" in reference to several files. 016) MFT-10606 / APAR IT30399 commit date: 04 Nov 2019 -------------------------------------------------------- IBM Sterling Connect:Direct for UNIX running on AIX uses IBM(R) Runtime Environment Java(TM) (JRE) Version 8.0.5.30. This JRE is vulnerable to the following issues, disclosed as part of the IBM Java SDK updates in July 2019: CVE-2019-4473: Multiple binaries in IBM SDK, Java Technology Edition on the AIX platform use insecure absolute RPATHs, which may facilitate code injection and privilege elevation by local users. CVE-2019-11771: Eclipse OpenJ9 could allow a local attacker to gain elevated privileges on the system, caused by the inclusion of unused RPATHS in AIX builds. An attacker could exploit this vulnerability to inject code and gain elevated privileges on the system. 017) MFT-10710 / APAR IT30961 commit date: 20 Nov 2019 -------------------------------------------------------- A process coded with a copy step that correctly uses pipe I/O function (sysopts parameter pipe=yes) for the source may fail to produce a data stream. I.E., the step will complete successfully, but will show zero bytes read. 018) MFT-10721 / APAR IT31162 commit date: 04 Dec 2019 -------------------------------------------------------- In a rare circumstance, when using cdinstall_a script to upgrade or uninstall a node, the value of the cdai_adminUserid parameter may be incorrectly determined. 019) MFT-10668 / APAR IT31157 commit date: 10 Dec 2019 -------------------------------------------------------- If netmap checking is on, and the incoming connection's IP address to check is specified in alternate.comminfo and listed past the 256th character in that field, the session will fail with a netmap check error. Fix extends the alternate.comminfo field length to 1023. If the field maximum length is exceeded, a new message, XCFM001I, will be generated and provide specific information about the error condition. 020) MFT-10727 / APAR IT31176 commit date: 10 Dec 2019 -------------------------------------------------------- An inappropriate XCPZ007I message is returned after a copy step writing to an S3 bucket completes successfully. 021) MFT-10783 / APAR IT31279 commit date: 13 Dec 2019 -------------------------------------------------------- Silent upgrade fails when traces are disabled. 022) MFT-10786 commit date: 16 Dec 2019 ----------------------------------------- The Connect:Direct Agent may fail to start. Investigation of the Agent log file shows "java.lang.UnsatisfiedLinkError: cdsp (Not found in java.library.path)". 023) MFT-10754 / APAR IT31304 commit date: 16 Dec 2019 -------------------------------------------------------- If the strong password encryption (SPE) feature is in a bad state, a submit process command can fail with no error message indicating the reason for the failure. SPE will be in a bad state, for example, if the base product without Secure+ is running when Secure+ is installed. 024) MFT-10771 / APAR IT31319 commit date: 18 Dec 2019 -------------------------------------------------------- CDU opens a UDP socket on the same port used to listen for incoming API connections on TCP. 025) MFT-10694 commit date: 19 Dec 2019 ----------------------------------------- The XSTL006W message regarding recent slow stat log write times provided limited information. In addition to a slow stat log write count, fix adds slow write time average and longest slow write time. 026) MFT-10726 / APAR IT31361 commit date: 20 Dec 2019 -------------------------------------------------------- An installation or upgrade of C:D Unix sets the installation directory permissions to 700, instead of the expected 755. 027) MFT-10810 commit date: 07 Jan 2020 ----------------------------------------- The Secure+ CLI help command output does not list the "display keystore" command. "help display keystore" generates an SPCL010E error message. 028) MFT-10759 / APAR IT31456 commit date: 08 Jan 2020 -------------------------------------------------------- Netmap file with incorrect record crashes CDU at UTC zero hour. 029) MFT-10796 / APAR IT31480 commit date: 10 Jan 2020 -------------------------------------------------------- C:D Unix rejects proxy updates received from IBM Control Center if the proxy string contains character '!', '$', or '#'. 030) MFT-10758 commit date: 14 Jan 2020 ----------------------------------------- Message JGIS049E missing from message file. 031) MFT-10314 / APAR IT29530 commit date: 28 Jun 2020 -------------------------------------------------------- The C:D Unix cust report generates error XRIA002I "unknown field name" when parameter 'udp.src.ports.list.iterations' is included in the initparms.cfg file. 032) MFT-10716 / APAR IT31781 commit date: 10 Feb 2020 -------------------------------------------------------- Upgrade to C:D Unix 4.3.0.1 from older versions fails, when "install" directory is present inside the C:D Unix installation. 033) MFT-10666 / APAR IT31047 commit date: 27 Nov 2019 -------------------------------------------------------- During upgrade, ownership of userfile.cfg changes to root. 034) MFT-10767 / APAR IT31550 commit date: 16 Jan 2020 -------------------------------------------------------- A new parameter "agent.enable" has been added into record "install.agent" of initparm.cfg to start/stop install agent. Default value of the parameter is set to y(Enabled). To stop install agent, change value of agent.enable to n(Disabled). It takes upto 5 mins to start/stop install agent. 035) MFT-10884 commit date: 06 Feb 2020 ----------------------------------------- CD Agent doesn't start after upgrade from CCD. 036) MFT-10718 / APAR IT31764 commit date: 05 Feb 2020 -------------------------------------------------------- cdcustrpt generated report cascades errors of initparm.cfg into other configuration files 037) CDUA-1897 commit date: 28 Feb 2020 ----------------------------------------- The *all keyword value is not always accepted by some C:D AIJ commands. To be understood the value has to be specified in uppercase which is not what the documentation specifies. 038) CDUA-1764 commit date: 03 Mar 2020 ----------------------------------------- The default values for the silent installer arguments serverPort (1364) and clientPort (1363) are not working contrary to what the documentation says. 039) CDUA-1945 commit date: 05 Mar 2020 ----------------------------------------- Record CDIA001I gets logged into stats every 5 minutes if CD agent fails to start. 040) MFT-10902 / APAR IT32092 commit date: 11 Mar 2020 -------------------------------------------------------- Under some circumstances, a submit process statement (not the submit command, but the submit statement coded within a process script) may generate an inappropriate CSPE007E message. When this happens, it is also possible that the ndmsmgr may terminate unexpectedly with a signal 11 (segmentation violation). 041) CDUA-1883 commit date: 13 Mar 2020 ----------------------------------------- Crash of cdpmgr when initparm.cfg is modified and pmgr trace level is 4. 042) CDUA-1838 commit date: 20 Mar 2020 ----------------------------------------- Various C:D UNIX executable modules, including cdpmgr, may fail to run on RHEL 8 systems, indicating "error while loading shared libraries: libnsl.so.1". 043) MFT-10926 / APAR IT32306 commit date: 26 Mar 2020 -------------------------------------------------------- CDU can't read a Statistics log file with a 4-digit extension. 044) MFT-10938 commit date: 06 Apr 2020 ----------------------------------------- cdpmgr may continue to execute after an apparently successful stop command was issued. 045) MFT-10917 / APAR IT32026 commit date: 10 Apr 2020 -------------------------------------------------------- cdinstall_a failed to override the options in the Options File. 046) MFT-10918 / APAR IT32508 commit date: 13 Apr 2020 -------------------------------------------------------- If a netmap entry has sess.pnode.max=0 (no outgoing sessions allowed) and sess.default=1 or more, incoming sessions fail with an XNMP007E message. 047) MFT-10900 / APAR IT32064 commit date: 25 Sep 2020 -------------------------------------------------------- On systems where /tmp is mounted with the noexec option enabled, C:D Install Agent or File Agent installation may fail, indicating "JRE libraries are missing or not compatible". There may also be an indication that a security file or directory is missing. 048) CDUA-1560 commit date: 21 Apr 2020 ----------------------------------------- Silent installation fails in case an invalid .crt,.cer,.pem file is in deployment directory. 049) MFT-10851 / APAR IT32402 commit date: 28 Apr 2020 -------------------------------------------------------- When a process that has established a session and is executing fails with a retriable error, it is placed in the Timer queue to be executed again after a wait period. Due to the intelligent session retry facility, it's possible that this process could immediately be placed back into execution without a delay. However, there are some scenarios where executing again too soon after being placed in Timer could cause resynchronization issues at the snode. 050) CDUA-2050 commit date: 07 May 2020 ----------------------------------------- On HP-UX silent install/upgrade displays "cdinstall_a[41]: ==: A test command parameter is not valid." at completion. 051) CDUA-2047 commit date: 12 May 2020 ----------------------------------------- If install/agent/bin/install-agent.jar is not present than a)back up is not created for agent b)restore doesn't happen if upgrade fails c)Agent stop/start doesn't happen during upgrade. 052) CDUA-1801 commit date: 22 May 2020 ----------------------------------------- On RHEL 8 and SLES 15 systems, cdinstall_a execution may fail indicating a command was not found referring to ifconfig or netstat. 053) CDUA-2107 commit date: 28 May 2020 ----------------------------------------- Message file was missing a number of messages, including Sterling Secure Proxy messages added for its antivirus scanning support. 054) CDUA-2089 commit date: 11 Jun 2020 ----------------------------------------- Install Agent logs are owned by and can only be read by root. 055) CDUA-2110 commit date: 10 Jun 2020 ----------------------------------------- Wrong formatted message logged in case of invalid field value or field not found. 056) MFT-11014 / APAR IT32981 commit date: 17 Jun 2020 -------------------------------------------------------- CCD License Data Collector not working properly.The issue occurs around daylight savings time changes. 057) CDUA-1435 commit date: 18 Jun 2020 ----------------------------------------- Connect:Direct for UNIX Installer does not prompt for password verify for the Keystore password. 058) MFT-11178 / APAR IT33144 commit date: 17 Aug 2020 -------------------------------------------------------- Eliminate creation of the obsolete STS folders 'import' and 'export' in the secure+ folder when installing the Secure+ feature. 059) MFT-11245 / APAR IT33344 commit date: 06 Oct 2020 -------------------------------------------------------- The cdinstall script fails with a scripting error when executed on Solaris. 060) MFT-11236 / APAR IT33402 commit date: 21 Jul 2020 -------------------------------------------------------- Incoming session requests fail with netmap check error XSMG016I following an IP address mismatch even when alternate.comminfo=*. 061) MFT-11260 / APAR IT33773 commit date: 04 Aug 2020 -------------------------------------------------------- SMGR terminated by Signal=11 due to a malformed proxy record in file userfile.cfg. 062) MFT-11320 / APAR IT33840 commit date: 14 Aug 2020 -------------------------------------------------------- IBM Connect:Direct for UNIX could allow a user to manipulate CD UNIX to gain root privilege, as indicated in the following issue: CVE-2020-4587: IBM Connect:Direct for UNIX is vulnerable to a stack based buffer overflow, caused by improper bounds checking. A local attacker could manipulate CD UNIX to obtain root privileges. 063) MFT-11334 / APAR IT33867 commit date: 17 Aug 2020 -------------------------------------------------------- Superseded by 4.3.0.1.iFix073. 064) MFT-11369 commit date: 28 Aug 2020 ----------------------------------------- posInfo array length in s3FileReader may be wrong and positioning on object stream may fail or may be wrong on a process restart. 065) MFT-11088 commit date: 28 Aug 2020 ----------------------------------------- Enable S3 Server Side Encryption (SSE-S3) using new parameter s3.sseS3=YES/NO 066) CDUA-2026 commit date: 28 Aug 2020 ----------------------------------------- vulnerability on LOG4J V1 on S3 IOexit - replaced by LOG4J V2 067) MFT-11398 / APAR IT34160 commit date: 25 Sep 2020 -------------------------------------------------------- If the username portion of a proxy record contains one or more '@' characters, some clients may have trouble displaying the proxy record correctly. 068) MFT-11502 / APAR IT34639 commit date: 06 Nov 2020 -------------------------------------------------------- If the source side of a copy step is pipe IO (a data stream invoked with the pipe=yes sysopts) and the stream is ended abnormally (bad command, terminated by signal, etc.), the abnormal termination is not detected. The copy step will complete as though the pipe IO data stream was received and ended normally. 069) MFT-11520 / APAR IT35189 commit date: 12 Nov 2020 -------------------------------------------------------- IBM Connect:Direct for UNIX could allow a non-authorized user to gain application privileges, as described in the vulnerability below. CVE-2020-4747: IBM Connect:Direct for UNIX can allow a local or remote user to obtain an authenticated CLI session due to improper authentication methods. 070) CDUA-2386 / APAR IT35188 commit date: 11 Dec 2020 -------------------------------------------------------- The CLI/Server authentication can fail if the local DNS returns the peer's host name in upper or mixed case. 071) MFT-11457 / APAR IT35091 commit date: 28 Dec 2020 -------------------------------------------------------- In case the default Install Agent port is busy and an upgrade of CDU instance is performed from an older version without Install Agent to a newer version with Install Agent, the IA service fails to start due to unavailability of the port. The upgrade fails but without indicating the correct reason for failure. Also, in such a case as a part of rollback process restore to the previous Install Agent version is attempted, which never existed. 072) MFT-11763 / APAR IT35945 commit date: 18 Feb 2021 -------------------------------------------------------- Added the support of agent enable silent installation parameter. This parameter can be specified at fresh installation to start/not start the Install Agent after installation. Usage in silent installation options file: cdai_agentEnable= Corresponding to this option, agent.enable field is added to Install Agent record in initparm.cfg file. Default value of this field is 'y'. 073) MFT-11905 / APAR IT36111 commit date: 16 Mar 2021 -------------------------------------------------------- IBM Sterling Connect:Direct for UNIX (CDU) on Linux and AIX platforms use IBM(R) Runtime Environment Java(TM) (JRE) Versions 8.0.6.15 and 8.0.5.40. CDU on Solaris platform uses JRE Versions 7.0.10.70 and 7.0.10.40. These JREs are vulnerable to the following issues, disclosed as part of recent IBM Java SDK updates: CVE-2020-27221: Eclipse OpenJ9 is vulnerable to a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. By sending an overly long string, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. CVE-2020-14782: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause no confidentiality impact, low integrity impact, and no availability impact. CVE-2020-14579: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVE-2020-14578: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVE-2020-14577: An unspecified vulnerability in Java SE related to the JSSE component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors. CVE-2019-17639: Eclipse OpenJ9 could allow a remote attacker to obtain sensitive information, caused by the premature return of the current method with an undefined return value. By invoking the System.arraycopy method with a length longer than the length of the source or destination array can, an attacker could exploit this vulnerability to obtain sensitive information. CVE-2020-2781: An unspecified vulnerability in Java SE related to the Java SE JSSE component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. CVE-2020-2654: An unspecified vulnerability in Java SE related to the Java SE Libraries component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors.