Fix Readme
Abstract
The following document lists APAR fixes included in IBM Cloud Pak for Business Automation 22.0.1.
Content
Readme file for: | IBM Cloud Pak® for Business Automation |
---|---|
Product Release: | 22.0.1 |
Publication Date: | 24 June 2022 |
Contents
Install or update
To benefit from all the fixes listed in this document, install or update to IBM Cloud Pak for Business Automation 22.0.1 . Refer to IBM Cloud Pak for Automation download documents for more information.
List of Fixes
APARs are listed in tables, columns are defined as follow:
Colunm title | Column description |
APAR | The defect number |
Title | A short description of the defect |
Sec. | A mark indicates a defect related to security |
Cont. | A mark indicates a defect specific to the Cloud Pak integration of the component |
B.I. | A mark indicates the fix has a business impact. Details is found in the title column or the APAR document |
- General
- Cloud Pak for Automation Operator
- Business Automation Application
- Automation Decision Services
- Automation Document Processing
- Business Automation Insights
- Business Automation Navigator
- Business Automation Studio
- Business Automation Workflow including Automation Workstream Services
- Enterprise Records
- FileNet Content Manager
- Operational Decision Management
- User Management Service
- Workflow Process Service
General
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
N/A | This release contains IBM Automation Foundation 1.3.7 and IBM Cloud Pak Foundational Services 3.19 (LTSR) | X | X | |
N/A |
Cloud Pak for Business Automation delivers container images that include operating system level and other open source libraries. Vulnerabilities (CVEs) for these libraries are published regularly.
This interim fix includes fixes for these libraries to address:
CVE-2020-7919, CVE-2021-39031, CVE-2021-39038, CVE-2022-21271, CVE-2021-42576, PRISMA-2022-0163, CVE-2020-9283, CVE-2021-41092, CVE-2018-1296, CVE-2018-8029, CVE-2020-9492, CVE-2021-33036, CVE-2020-9493, CVE-2021-4104, CVE-2022-23302, CVE-2022-23305, CVE-2021-44228, CVE-2021-44832, CVE-2021-45046, CVE-2021-45105, CVE-2021-40690, CVE-2022-20612, CVE-2022-26336, CVE-2022-25878, CVE-2022-1365, PRISMA-2021-0103, CVE-2022-24434, CVE-2021-23555, CVE-2022-24785, PRISMA-2021-0041, CVE-2021-33880, CVE-2020-13249, CVE-2020-14765, CVE-2020-14776, CVE-2020-14789, CVE-2020-14812, CVE-2020-15180, CVE-2020-2752, CVE-2020-2760, CVE-2020-2812, CVE-2020-2814, CVE-2021-2022, CVE-2021-2154, CVE-2021-2166, CVE-2021-2194, CVE-2021-2372, CVE-2021-2389, CVE-2021-27928, CVE-2021-35604, CVE-2021-46657, CVE-2021-46658, CVE-2021-46659, CVE-2021-46661, CVE-2021-46662, CVE-2021-46663, CVE-2021-46664, CVE-2021-46665, CVE-2021-46666, CVE-2021-46667, CVE-2021-46668, CVE-2022-24048, CVE-2022-24050, CVE-2022-24051, CVE-2022-24052, CVE-2022-31621, CVE-2022-31622, CVE-2022-31623, CVE-2022-31624, CVE-2017-7189, CVE-2017-7272, CVE-2019-11045, CVE-2019-11046, CVE-2019-11047, CVE-2019-11048, CVE-2019-11050, CVE-2020-7059, CVE-2020-7060, CVE-2020-7062, CVE-2020-7063, CVE-2020-7064, CVE-2020-7065, CVE-2020-7066, CVE-2020-7067, CVE-2020-7068, CVE-2020-7069, CVE-2020-7070, CVE-2020-7071, CVE-2021-21702, CVE-2021-21703, CVE-2021-21704, CVE-2021-21705, CVE-2021-21707, CVE-2022-31625, CVE-2022-31626, CVE-2020-35452, CVE-2021-33193, CVE-2021-34798, CVE-2021-36160, CVE-2021-39275, CVE-2021-44224, CVE-2021-44790, CVE-2022-22720, CVE-2015-9261, CVE-2018-1000500, CVE-2018-1000517, CVE-2018-20679, CVE-2019-5747, CVE-2021-28831, CVE-2021-42374, CVE-2021-42376, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386, CVE-2022-28391, CVE-2019-5481, CVE-2019-5482, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2021-22890, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-22926, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2022-27775, CVE-2019-16168, CVE-2019-19923, CVE-2019-19925, CVE-2019-19959, CVE-2019-20218, CVE-2020-13434, CVE-2020-13630, CVE-2020-13632, CVE-2020-15358, CVE-2020-12243, CVE-2020-25692, CVE-2020-25709, CVE-2020-25710, CVE-2020-36221, CVE-2020-36222, CVE-2020-36223, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226, CVE-2020-36227, CVE-2020-36228, CVE-2020-36229, CVE-2020-36230, CVE-2021-27212, CVE-2019-10160, CVE-2019-16056, CVE-2019-16935, CVE-2019-20907, CVE-2019-9740, CVE-2019-9947, CVE-2019-9948, CVE-2020-14422, CVE-2020-26116, CVE-2020-8492, CVE-2021-3177, CVE-2019-6477, CVE-2020-8616, CVE-2020-8617, CVE-2020-8619, CVE-2020-8622, CVE-2020-8623, CVE-2020-8624, CVE-2020-8625, CVE-2021-25214, CVE-2021-25215, CVE-2021-25216, CVE-2020-14349, CVE-2020-14350, CVE-2020-25694, CVE-2020-25695, CVE-2020-25696, CVE-2021-32027, CVE-2021-32028, CVE-2021-32029, CVE-2021-3393, CVE-2021-3677, CVE-2022-1552, CVE-2019-19956, CVE-2019-20388, CVE-2020-24977, CVE-2020-7595, CVE-2021-3516, CVE-2021-3517, CVE-2021-3518, CVE-2021-3537, CVE-2021-3541, CVE-2019-1547, CVE-2019-1549, CVE-2019-1551, CVE-2019-1563, CVE-2020-1967, CVE-2020-1971, CVE-2021-23839, CVE-2021-3449, CVE-2021-3450, CVE-2021-4160, CVE-2020-29562, CVE-2020-11984, CVE-2020-11993, CVE-2020-1927, CVE-2020-1934, CVE-2020-9490, CVE-2021-26690, CVE-2021-30641, CVE-2021-31618, CVE-2019-15718, CVE-2020-1712, CVE-2021-33910, CVE-2020-28196, CVE-2020-11501, CVE-2020-13777, CVE-2020-24659, CVE-2020-14145, CVE-2021-41617, CVE-2020-29361, CVE-2020-29362, CVE-2020-29363, CVE-2020-11080, CVE-2019-18224, CVE-2018-12434, CVE-2021-41581, CVE-2021-27218, CVE-2021-27219, CVE-2020-10531, CVE-2020-21913, CVE-2020-27350, CVE-2020-3810, CVE-2019-14697, CVE-2020-28928, CVE-2019-13115, CVE-2019-17498, CVE-2019-5094, CVE-2019-5188, CVE-2019-20454, CVE-2019-15903, CVE-2022-23990, CVE-2021-30139, CVE-2021-36159, CVE-2021-24031, CVE-2016-1585, CVE-2022-0563, CVE-2019-18197, CVE-2020-11656, CVE-2021-43519, CVE-2022-21449, CVE-2020-8927, CVE-2021-20305, CVE-2019-20367, CVE-2022-24975, CVE-2021-3520, CVE-2019-19906, CVE-2021-3872, CVE-2021-3984, CVE-2021-4019, CVE-2021-4192, CVE-2021-4193, CVE-2022-0261, CVE-2022-0318, CVE-2022-0359, CVE-2022-0361, CVE-2022-0392, CVE-2022-0413, CVE-2022-1154, CVE-2021-45960, CVE-2021-46143, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-23852, CVE-2022-25235, CVE-2022-25236, CVE-2022-25315, CVE-2021-22876, CVE-2021-22898, CVE-2021-22925, CVE-2021-23177, CVE-2021-31566, CVE-2021-3521, CVE-2021-3712, CVE-2021-25219, CVE-2019-17594, CVE-2019-17595, CVE-2021-20231, CVE-2021-20232, CVE-2021-23840, CVE-2021-23841, CVE-2020-13435, CVE-2022-23308, CVE-2021-28153, CVE-2021-4122, CVE-2021-3580, CVE-2020-12762, CVE-2021-23222, CVE-2022-24407, CVE-2018-25032, CVE-2021-37692, CVE-2021-41202, CVE-2021-41206, CVE-2021-41207, CVE-2021-41208, CVE-2021-41209, CVE-2021-41213, CVE-2021-41216, CVE-2021-41218, CVE-2021-41221, CVE-2021-41222, CVE-2021-41225, CVE-2021-41227, CVE-2021-41228, CVE-2022-21248, CVE-2022-21277, CVE-2022-21282, CVE-2022-21283, CVE-2022-21291, CVE-2022-21293, CVE-2022-21294, CVE-2022-21296, CVE-2022-21299, CVE-2022-21305, CVE-2022-21340, CVE-2022-21341, CVE-2022-21360, CVE-2022-21365, CVE-2022-21366, CVE-2022-21426, CVE-2022-21434, CVE-2022-21443, CVE-2022-21476, CVE-2022-21496, CVE-2016-3086, CVE-2016-5001, CVE-2016-5393, CVE-2016-6811, CVE-2017-15713, CVE-2017-3161, CVE-2017-3162, CVE-2019-16869, CVE-2020-11612, CVE-2021-23437, PRISMA-2021-0134, CVE-2021-37701, CVE-2021-37712, CVE-2021-43616, CVE-2019-20444, CVE-2019-20445, CVE-2021-21290, CVE-2020-15257, CVE-2021-21334, CVE-2021-21295, CVE-2021-21409, CVE-2021-37713, CVE-2022-0155, CVE-2022-0536, CVE-2021-26691, CVE-2021-40438, CVE-2019-17571, CVE-2022-23307, CVE-2018-14404, CVE-2018-14567, PRISMA-2022-0039, CVE-2020-26160, CVE-2020-1953, CVE-2020-19131, CVE-2019-10086, CVE-2022-24329, PRISMA-2021-0099, CVE-2021-46708, CVE-2021-44906, CVE-2021-3711, CVE-2021-34429, PRISMA-2021-0131, CVE-2020-35492, CVE-2022-29078, CVE-2021-43138, CVE-2019-18276, CVE-2021-43859
|
X | ||
JR64614 | BUSINESS TEAMS SERVICE TEAMSERVER FAILS TO MIRROR EDB POSTGRESQL IMAGES IN AN AIRGAP DEPLOYMENT | |||
JR64615 | BUSINESS TEAMS SERVICE TEAMSERVER CASE FAILS TO INSTALL PREREQUISITE CATALOGS IN AN AIRGAP DEPLOYMENT | |||
JR64461 | BUSINESS TEAM SERVICE (BTS) FAILS WITH AN IMAGE PULL ERROR WHEN DEPLOYING CLOUD PAK FOR BUSINESS AUTOMATION | |||
JR64566 | BUSINESS TEAMS SERVICE USER INTERFACE INACCESSIBLE AND API CALLS RETURN "NOT AUTHORIZED TO PERFORM THE REQUEST." | |||
JR64609 | BUSINESS TEAMS SERVICE IN CLOUDPAK FOR BUSINESS AUTOMATION BLOCKS OPENSHIFT MAINTENANCE | |||
JR64617 | UMS TEAMS CANNOT BE SUCCESSFULLY MIGRATED FROM ORACLE TO BTS IF UMS IS CONFIGURED TO USE ORACLE USE SERVICE NAME. | |||
JR64927 | Business Teams Service (BTS) creates a large amount of OAuthClient resources |
Cloud Pak for Automation Operator
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
N/A | N/A |
Business Automation Application
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
JR64620 | VIEW VISIBILITY MIGHT NOT FUNCTION CORRECTLY WHEN USING THE NO CODE VIEW VALIDATION | |||
JR64622 | WORKFLOW AUTHORING STARTER PATTERN WOULD BE MISSING CONTRIBUTIONS FOR BUSINESS AUTOMATION WORKFLOW TOOLKITS | |||
JR64881 | BUSINESS AUTOMATION APPLICATION MIGHT NOT FUNCTION CORRECTLY WHEN USING THE NO CODE DATA VALIDATION | |||
JR64885 | DISABLING WALKME PLUGIN MADE WORKPLACE NOT WORKING |
Automation Decision Services
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
N/A | N/A |
Automation Document Processing
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
JR65057 | PROCESSING EXTRACTION LOG SHOWS SENSITIVE INFORMATION | X | X | |
JR65058 | ADP RUNTIME TEXT EDIT BOX NOT TRIMMING TRAILING SPACES | X | X |
Business Automation Insights
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
N/A | N/A |
Business Automation Navigator
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
N/A | N/A |
Business Automation Studio
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
JR64327 | SECURITY APAR - MULTIPLE SECURITY VULNERABILITIES IN JAVASCRIPT LIBRARIES | X | ||
JR64497 | SECURITY APAR - LUCENE-9981 DENIAL OF SERVICE VULNERABILITY MAY AFFECT IBM BAW | X | ||
JR64319 | SLOW SAVE DUE TO MANY LSW_PARAMETER_MAPPING QUERIES IN THE WEB IBM PROCESS DESIGNER | |||
JR64498 | DOC - INFORMATION ABOUT THE MAX-CACHED-OBJECTS-DURING-REFACTORING SETTING IS MISSING | |||
JR64504 | UCA EVENT MESSAGE FIELD CHANGE IN WEB IBM PROCESS DESIGNER IS NOT SAVED | |||
JR64519 | EXPOSED AUTOMATION SERVICES ARE NOT SHOWN IN REFERENCES IN IBM PROCESS DESIGNER | |||
JR64540 | UNABLE TO SAVE A CASE SOLUTION IN IBM CASE MANAGER | |||
JR64606 | BUSINESS OBJECTS SHOWING UNAVAILABLE IN THE IBM PROCESS DESIGNER | |||
JR64608 | EXPOSED AUTOMATION SERVICE IS NOT LISTED IN A NEW WORKFLOW PROJECT | |||
JR64616 | PROJECT CONVERSION TAB IS MISSING IN PROCESS DESIGNER FOR WORKFLOW APPS IMPORTED INTO IBM BUSINESS AUTOMATION STUDIO | |||
JR64656 | TRANSACTION ROLLBACK WHEN REMOVING AN USER FROM THE PROJECT AREA ON BAW SERVER. | |||
JR64717 | BUSINESS AUTOMATION WORKFLOW SCIM CALLS FAIL DUE TO INCORRECTLY ENCODED WHITESPACE | |||
JR64738 | PROCESS DESIGNER INSPECTOR DOES NOT MATCH PROCESS ADMIN CONSOLE INSPECTOR'S "CLOSED BY" FIELD FOR A TASK | |||
JR64753 | PAGINATION DOESN'T WORK IN IBM BUSINESS AUTOMATION STUDIO WHEN RETURNING FROM WEB PROCESS DESIGNER | |||
JR64759 | DOC - THE WORKFLOW_CENTER CONFIGURATION NEEDED TO SET UP ONLINE CONNECTIVITY IS MISSING A PARAMETER IN THE DOCUMENTATION | |||
JR64789 | AN UNAUTHORIZED USERS HAVE ACCESS TO EDIT PUBLISHED AUTOMATION SERVICES PERMISSIONS IN IBM BUSINESS AUTOMATION STUDIO | |||
JR64797 | BPMUPDATESYSTEMAPP COMMAND IS NOT IMPORTING THE NEW THEMES AFTER UPGRADE | |||
JR64805 | YOU CAN'T OPEN TABLE-BASED RULE WITH CASE BUILDER IN CP4BA V21.0.3 ENVIRONMENT | |||
JR64808 | CAN'T EDIT PERMISSIONS OF PUBLISHED AUTOMATION SERVICE IN IBM BUSINESS AUTOMATION STUDIO | |||
JR64815 | SELECTING A DECISION AUTOMATION SERVICE FAILS WITH 404 IN IBM BUSINESS AUTOMATION STUDIO | |||
JR64817 | CANNOT PUBLISH DECISION AUTOMATION SERVICES FROM IBM BUSINESS AUTOMATION STUDIO | |||
JR64823 | AN UNAUTHORIZED USER CAN SEE THE LIST OF PUBLISHED AUTOMATION SERVICES IN IBM IBM BUSINESS AUTOMATION STUDIO | |||
JR64833 | WORKFLOW APPLICATIONS ARE NOT SORTED CORRECTLY IN IBM BUSINESS AUTOMATION STUDIO | |||
JR64842 | NULLPOINTEREXCEPTION IS GENERATED WHEN OPENING A CASE THAT HAS A CUSTOM CLIENT SIDE HUMAN SERVICE VIEW | |||
JR64849 | THE EXPOSED PROCESS DISAPPEARS FROM THE PROCESS PORTAL AFTER RUNNING AN UNNAMED SNAPSHOT CLEANUP SERVICE | |||
JR64852 | PORTION OF A VARIABLE PICKER MAY BE COVERED BY IBM PROCESS DESIGNER TOOLBAR HEADER | |||
JR64871 | SNAPSHOT DEPLOYMENT FAILS WITH THE 'CASEPROJECTAREA IN CLASS PROCESSAPPINSTALLATION IS NOT DECLARED' ERROR IN IBM BAW 21.0.3. | |||
JR64875 | BPMUPDATESYSTEMAPP COMMAND FAILS TO IMPORT A TWX WHEN ITS FILE PATH HAS A "." IN IT | |||
JR64883 | UMS WLPTAI AND UMS JAASLOGINMODULE FAIL TO DECODE SOME JWT TOKENS | |||
JR64917 | TYPE MISMATCH ERROR OCCURS WHEN RUNNING UNDERCOVER AGENT IMPLEMENTED AS BUSINESS OBJECT WITH LIST PARAMETERS | |||
JR64926 | DOC - ORDER FOR IMPORTING THE TOOLKITS AND THE PROCESS APPLICATIONS IS UNCLEAR | |||
JR64943 | A 403 ERROR APPEARS IN THE BROWSER CONSOLE WHEN ACCESSING PROCESS DESIGNER | |||
JR64963 | TEMP DIR FILLS UP WITH MANAGED ASSET RELATED FILES RESULTING IN JAVA IOEXCEPTION | |||
JR64977 | UNEXPECTED ICONS AND SCRIPT TEXT APPEAR ON BUSINESS AUTOMATION OR BUSINESS APPLICATION PAGE IN IBM BUSINESS AUTOMATION STUDIO | |||
JR65012 | BPMN EXPORT IS NOT AVAILABLE IN IBM BUSINESS AUTOMATION STUDIO OR WORKFLOW CENTER IN IBM BUSINESS AUTOMATION WORKFLOW | |||
DT215669 | ADDING AN OPEN API AUTOMATION SERVICE FAILS WITH 500 INTERNAL SERVER ERROR | |||
DT397999 | Synchronrize users REST API with ALL_USERS parameter does not work |
Business Automation Workflow including Automation Workstream Services
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
N/A | For fix information about Business Automation Workflow see "List of Fixes" in Fix list for Business Automation Workflow on Containers 22.0.1. |
Enterprise Records
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
N/A
|
N/A
|
FileNet Content Manager
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
N/A | For fix information about FileNet Content Manager see APAR fixes provided with the General Availability (GA) releases of FileNet Content Manager (FNCM) products FileNet Content Platform Engine (CPE) and FileNet Content Search Services (CSS) and IBM FileNet GraphQL API (GQL) |
Operational Decision Management
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
RS03927 | HYPERLINK IN TEAMSERVER TASK / RULE REPORT WRONGLY FORMATTED | |||
RS03926 | DECISION ENGINE DOES NOT SUPPORT STATIC METHODS ON INTERFACES | |||
RS03925 | MISSING STEPS TO DEPLOY SIMULATION AND TESTING ARCHIVE MANUALLY IN WEBSPHERE | |||
RS03923 | FOR HTDS/JSON USAGE, NO DEFAULT CONFIG OPTION SET IN PRODUCT, CAN CAUSE OOM AND NODE CRASH BY DEFAULT | |||
RS03918 | HBRDCGSQ.SQL DELIVERED FOR DC SETUP WITH ZDB2 DOES NOT CONTAIN GRANT STATEMENTS FOR SIBLING TABLES | |||
RS03917 | ENABLING TRACES IN HTDS SLOWS DOWN REST JSON EXECUTIONS | |||
RS03915 | DEFAULT ROW ORDERING FOR DECISION TABLES NOT WORKING | |||
RS03914 | CLASSCASTEXCEPTION GENERATING RULEAPP FROM DEPLOYMENT SNAPSHOT USING REST API | |||
RS03911 | IMPORTING COBOL SOLUTION IN RULE DESIGNER FAILS WITH A STACKOVEFLOW | |||
RS03910 | LIBRARY TAB LISTING ALL SERVICES AFTER CLOSING DEPLOY DIALOG BOX | |||
RS03908 | METERING NOT RELIABLE IN CASE OF CONNECTION ISSUES | |||
RS03907 | ORG.XML.SAX.SAXPARSEEXCEPTION: THE ENTITY NAME MUST IMMEDIATELY FOLLOW THE '&' IN THE ENTITY REFERENCE | |||
RS03905 | DECISION CENTER ORACLE TRIGGER DEFINITION BREAKS REPOSITORY CREATION | |||
RS03904 | ELEMENTNOTFOUND EXCEPTION WHEN TRYING TO MERGE TWO BRANCHES | |||
RS03902 | AFTER AN EXECUTION FAILED WITH A NPE, ALL SUBSEQUENT EXECUTIONS MAY FAIL AS WELL | |||
RS03901 | BUSINESS CONSOLE LAYOUT ISSUE WHEN DECISION ARTIFACTS VERTICAL SCROLLBAR IS VISIBLE | |||
RS03900 | DELETE BUTTON VISIBLE IN ENTERPRISE CONSOLE RECYCLE BIN | |||
RS03897 | BRANCH MERGE ERROR "THE SPECIFIED ACTION RULE WAS NOT FOUND" IN DECISION CENTER | |||
RS03896 | CANNOT SAVE USING QUICK EDIT MODE IN ENTERPRISE CONSOLE | |||
RS03895 | OUT OF MEMORY RUNNING TEST SUITE | |||
RS03894 | UNABLE TO EDIT A DECISION TABLE IN BUSINESS CONSOLE | |||
RS03891 | THE OWNER OF A RELEASE MAY FAIL TO CLOSE IT | |||
RS03890 | IN RULE DESIGNER ON MACOS, USER CANNOT CHANGE THE TYPE OF A PACKAGE VARIABLE | |||
RS03909 | BUSINESS CONSOLE UI IMPORT PROJECT/ANT TOOL/APIS SHOULD SUPPORT IMPORTING INDIVIDUAL STANDARD DS PROJECTS | |||
RS03889 | RES CONSOLE MAY NEVER BE INITIALIZED SUCCESSFULLY | |||
RS03888 | "IS MORE THAN" METHOD RETURNS TRUE USING DOUBLE.NAN |
User Management Service
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
JR64252 | WHEN CHANGING IAM ROUTE CERTIFICATES , UMS SSO PODS FAIL TO CONNECT |
Workflow Process Service
APAR | Title | Sec. | Cont. | B.I. |
---|---|---|---|---|
JR64280 | SECURITY APAR CVE-2021-39046 STORES USER CREDENTIALS IN PLAIN CLEAR TEXT WHICH CAN BE READ BY A PRIVILEGED USER | X | ||
JR64596 | SECURITY APAR - CVE-2022-22361 - CROSS SITE REQUEST FORGERY VULNERABILITY IN PROCESS ADMIN CONSOLE | X | ||
JR64453 | DOC - CHROME ON MACOS DOES NOT ALLOW CONNECTION TO CERTAIN IBM CLOUD PAK FOR BUSINESS AUTOMATION ENDPOINTS | |||
JR64717 | BUSINESS AUTOMATION WORKFLOW SCIM CALLS FAIL DUE TO INCORRECTLY ENCODED WHITESPACE | |||
JR64764 | COMPLETE/FINISH REST API FAILS TO COMPLETE/FINISH STANDALONE USER TASK | |||
JR64804 | CASE INSTANCE ALWAYS HAS A STATUS OF "WORKING", NEVER "COMPLETE", EVEN WHEN THERE IS NO STEP UNDER THE "WORK" TAG | |||
JR64862 | EVENT MANAGER DOES NOT RECOVER AUTOMATICALLY FROM A DATABASE CONNECTION FAILURE | |||
JR64883 | UMS WLPTAI AND UMS JAASLOGINMODULE FAIL TO DECODE SOME JWT TOKENS | |||
JR64892 | SERVICE TASKS OR NON-USER TASKS ARE VISIBLE IN IBM PROCESS PORTAL THOUGH USER CAN NOT TAKE ACTION ON THAT | |||
JR64894 | SYSTEM TASKS ARE VISIBLE IN PROCESS PORTAL DESPITE NOT BEING ACTIONABLE BY USERS | |||
JR64895 | SYSTEM TASKS ARE VISIBLE IN PROCESS PORTAL THOUGH USER CANNOT TAKE ACTION ON THAT | |||
JR64931 | ERROR OCCURS WHEN DEBUGGING A HUMAN SERVICE IN DESKTOP PROCESS DESIGNER INSPECTOR | |||
DT397999 | Synchronrize users REST API with ALL_USERS parameter does not work |
Document change history
Related Information
[{"Type":"MASTER","Line of Business":{"code":"LOB10","label":"Data and AI"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SS2JQC","label":"IBM Cloud Pak for Automation"},"ARM Category":[{"code":"a8m0z0000001gWWAAY","label":"CloudPak4Automation Platform"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Versions"}]
Was this topic helpful?
Document Information
Modified date:
20 December 2024
UID
ibm16596995