Kofax RPA 11.2.0 Fix Pack 10
Build Date: September 21, 2022
© 2022 Kofax. All rights reserved.
Use is subject to license terms.
Introduction
You can install Kofax RPA 11.2.0.10 to resolve the issues listed below.
Issues Resolved in This Fix Pack
1848862: A critical error in 11.2.0.9 could potentially corrupt robot files when editing basic robots and cause constant re-execution.
1842553: Roboserver authenticated against LDAP every time a robot was downloaded.
1841391: Synchronizer did not work with Github after a Github upgrade.
1840446: Upgraded commons-configuration due to high severity vulnerability CVE-2022-33980.
1838032: Synchronizer failed to start.
1826622: Missing support for some client certificates algorithms caused error message in CEF.
1826173: Fixed valued inputs were not restored as hidden from Kapplets backup.
1825143: Management Console restore backup failed if it contained a Password Store client role.
1821107: Design Studio used excessive KTA licenses when running robots.
1817112: Robot references were not always updated when importing a Management Console project.
1805582: SOAP wsdl page was not shown for robots in the Management Console.
1805553: Upgraded url-parse due to high severity vulnerability CVE-2022-0691.
1805383: Upgraded log4net due to high severity vulnerability CVE-2018-1285.
1805381: Upgraded Tomcat due to high severity vulnerability CVE-2022-23181.
1805374: Upgraded Liquibase due to high severity vulnerability CVE-2022-0839.
Issues Resolved in Previous Fix Packs
Issues Resolved in Fix Pack 9
1809867: Process Discovery Analyzer could produce an Out of memory error when processing large data sets.
1809761: Management Console could produce an Out of memory error when creating a backup.
1809760: Fixed Kapplet value inputs were not restored when restoring backup.
1806315: Process Discovery Analyzer now enforces Java 11 to avoid memory issues.
1806310: Process Discovery can now be used with previous versions of Management Console when there are no API changes.
1806305: The same processes discovered in Linux and Windows were slightly different.
1805555: Upgraded Gson due to high severity vulnerability WS-2021-0419.
1805543: Upgraded lxml due to high severity vulnerability CVE-2018-9466.
1805538: Upgraded ESAPI due to high severity vulnerability CVE-2022-23457.
1805385: Upgraded XStream due to high severity vulnerability CVE-2021-43859.
1805382: Upgraded h2 due to high severity vulnerability CVE-2021-23463.
1805384: Upgraded activeMQ due to high severity vulnerability CVE-2021-26117.
1805001: Robots could produce errors when loading favicons on specific sites.
1802937: Design Studio made changes to snippets when opening robots from previous versions.
1800748: Upgraded NodeJS due to high severity vulnerability CVE-2021-22930.
1796351: Explicitly specified OAuth parameters did not work in Kapplets.
1796357: Dates in Management Console did not use locale settings for unsupported languages.
1795902: Default port numbers were removed when sending URIRequest CONNECT.
Issues Resolved in Fix Pack 8
1793157: Upgraded spring due to high severity vulnerability CVE-2022-22965.
1793147: Upgraded OpenSSL due to high severity vulnerability CVE-2022-0778.
1787953: Opening 11.1.x Robot containing Document Transformation step failed.
1787926: Queuing on Management Console could fail when reserving DAS.
1783886: PressKey step did not work after page navigation.
1783659: Users could not see running robots in some situations.
1780907: Quartz parameter in docker compose file for Kapplets was missing.
1776146: "Password Store Client" permission was not restored from backup.
1775178: Cluster profile settings were not restored from Japanese backup.
1766869: Design Studio became unresponsive after right-clicking in Recorder View when working with local DAS.
1761576: It was not possible to save Kapplet schedule with monthly trigger.
Issues Resolved in Fix Pack 7
1761673: Robots containing conditionals could fail with validation errors when running in debugger.
1761571: Kapplet user could not save edited schedule if Stop Date field was empty.
1761546: Kapplet schedule "Start at" field displayed time incorrectly.
1761542: Kapplets Schedules could not be paused or resumed.
1761488: Dates in Management Console did not use locale settings.
1759582: CEF failed if web page asked for optional certificate, and it was not provided.
1750328: Offscreen elements caused issues when building application tree and taking screenshots.
1736323: Upgraded log4j due to medium severity vulnerabilities CVE-2021-44832 and CVE-2021-45105.
1734426: Kapplets always returned "completed" instead of correct status.
1733812: Incorrect localization was used instead of default English text.
1732543: Improved performance for O365 IMAP Email triggers.
Issues Resolved in Fix Pack 6
1731403: Updated log4j due to critical vulnerabilities CVE-2021-44228 and CVE-2021-45046.
1730511: Thread leak in RoboServer when running Robots.
1729862: RoboServer failed refreshing non-Azure token for single tenant OAuth.
1729680: Added additional cipher suites to WebKit.
1728802: Process Discovery analysis results varied when using cached images.
1718261: DB connection in Process Discovery timed out when using % or ? in passwords.
1717034: When restoring a backup, previously made clusters were lost.
1716925: Dummy plugin was added to CEF to avoid empty plugin list that could cause JS issues.
1714086: Updated Mariadb java client in Process Discovery to eliminate performance issues.
Issues Resolved in Fix Pack 5
1716019: Design Studio became unresponsive when using fuzzy image search in ISA mode.
1714294: Upgraded Gson due to high severity vulnerability WS-2021-0419.
1707607: Terminal step did not work with ipv6.
1706328: Device reset in Design Studio.
1705539: Fixed possible connection starvation in JavaAPI.
1705516: Fixed Docker-compose file for Kofax Analytics for RPA.
Issues Resolved in Fix Pack 4
1700387: Removed SQL Server from Windows Docker-compose examples.
1699092: Fixed empty projects list for LDAP user.
1698367: Fixed incorrect cluster name in project settings.
1696958: Could not refresh access token for single tenant applications.
1696528: Upgraded axios due to high severity vulnerability CVE-2021-3749.
1696432: vc_redist files were missing from the Windows Docker image.
1690952: Upgraded xmlsec due to high severity vulnerability CVE-2021-40690.
1690477: Could not open page with personal certificate.
1690233: Upgraded openssl due to high severity vulnerability CVE-2021-3712.
1689924: OCR setting to recognize screen contents did not work.
1682699: Removed velocity-tools and upgraded velocity due to medium severity vulnerability CVE-2020-13959.
1682692: Upgraded commons-compress due to high severity vulnerability CVE-2021-35517.
1682688: Upgraded Jetty due to medium severity vulnerability CVE-2021-34429.
1682687: Upgraded antisamy due to medium severity vulnerability CVE-2021-35043.
1682686: Removed jakarta.el due to medium severity vulnerability CVE-2021-28170.
1682685: Upgraded jsoup due to high severity vulnerability CVE-2021-37714.
1682684: Upgraded bouncycastle due to medium severity vulnerability CVE-2020-15522.
1682682: Upgraded Xstream due to high severity vulnerability CVE-2021-39149.
Note: 1696958 - Could not refresh access token for single tenant applications. Robot execution with single tenant OAuth user input will fail on RoboServer version lower than 11.2.0.4. Such Robots must be upgraded to 11.2.0.4 to be forced to run on RoboServer version 11.2.0.4 or higher.
Issues Resolved in Fix Pack 3
1685621: Send Email step never timed out.
1683754: It was not possible to select different OAuth users for multiple input OAuth variables.
1683169: Previous references for device finders did not work when previous finders were of application or component type.
1682749: Migrated from log4j to log4j2 due to high severity vulnerability CVE-2019-17571.
1682700: Upgraded json-smart due to medium severity vulnerability CVE-2021-31684.
1682085: Cyberark configuration did not work correctly.
1681511: Upgraded harfbuzz due to high severity vulnerability WS-2020-0392.
1681293: DB host name can now be up to 1024 characters instead of 255.
1677246: Corrected path to SSH keys in dockerfile for synchronizer.
1677003: WebKit stopped if windows.close() was called in Execute JavaScript or Click steps.
1675195: Process Discovery Analyzer could run out of memory when min count of process instance was set to 1.
1674303: It was not possible to map smallint to integer with query database.
1660659: Insufficient Authorization Control allowed users to retrieve project information.
1660721: Authentication for REST endpoints was not required by default when creating new project.
1649146: Email stayed in Processing folder if execution task expired.
1634051: Robot became unresponsive after entering empty text in CEF.
Features Implemented in Fix Pack 3
1676826: Added support for OAuth single tenant mode with Azure AD.
A Tenant ID field now appears in the authorization request form when adding a user to an Azure AD 2.0 application.
1680226: The .NET API now supports queuing in Management Console.
A new extension to the Request object "QueuedRequest" is introduced with two additional properties, Timeout and Priority. "Timeout" is measured in seconds and "Priority" has five values (MAXIMUM, HIGH, MEDIUM, LOW, MINIMUM).
Example:
QueuedRequest request = new QueuedRequest("[robotname]") request.Timeout = 60 request.Priority = QueuedRequestPriority.LOW ...
1679440: SAML single signout - log out from Management Console will log out from IDP.
To configure single signout, do either of the following:
- Add the configuration option useSamlSingleLogout in saml.xml.
- Add the SAML_IDP_USESINGLELOGOUT environment variable for Docker.
Issues Resolved in Fix Pack 2
1670876: Synchronizer did not work in 11.2.0.1.
1670571: Updated French and Japanese offline documentation to match online documentation.
1667263: Process Discovery Analyzer did not always start analysis when scheduled.
1665694: Previous references after Try Catch only worked if finder was defined in finally.
1662473: Browser view could become unresponsive when executing Browse step if text nodes were updated on page.
1662185: Swagger displayed all internal controllers.
1661599: JVM could cause DAS to become unresponsive during Java application shutdown.
1661535: Manually started robots could not be stopped when using browser with Japanese locale.
1661318: Changed UI dialogs behavior led to regression issues in production.
1661229: Japanese documentation did not contain final corrections.
1661227: Updated copyright year in About boxes.
1660485: WebKit became unresponsive when restoring cssRule without cssRuleList or parent stylesheet.
1660159: Schedule triggers were not properly restored when importing backup.
1658933: AuditLog logged "admin login from" every time Robot runs.
1650195: Corrected Docker scripts to correctly identify Tomcat version.
Issues Resolved in Fix Pack 1
1659198: Verification of RoboServer Certificates did not work properly.
1658430: .NET API could become unresponsive on RegisterCluster.
1654384: Upgraded node.js due to security vulnerability.
1654347: Step out executed Robot twice when in loop.
1653679: Sorting schedules by Next Run prevented loading Schedules view.
1651388: Incorrect permission check was performed when deleting robot.
1650263: Incorrect permission check was performed for editing Device Mappings.
1647935: Updated Jetty due to security vulnerability.
1647514: Thread leak in ChunkedArrayProxy when downloading large file could cause RoboServer to run out of memory.
1644997: Internal IDs for schedules, OAuth Users, DB mappings, Password and CyberArk entries could be outside the safe integer range causing issues when restoring backups.
1644775: Superfluous x32 was removed from text in Process Discovery installers.
1644757: Unable to save cluster setting changes if Management Console deployed in Oracle database.
1644753: Kapplets could not start if they contained empty non-required input parameters.
1642468: Slider could not be moved by Move Mouse and Press/Release.
1640143: Updated spring-web due to security vulnerability.
1617570: Data view performance was slow and could cause Management Console to become unresponsive.
Applies To
This fix pack is a full installation. It is accumulative and includes the resolved issues released in previous Kofax RPA 11.2.0 fix packs.
You can apply this fix pack to replace any of the following versions:
- Kofax RPA 11.2.0 Fix Pack 9
- Kofax RPA 11.2.0 Fix Pack 8
- Kofax RPA 11.2.0 Fix Pack 7
- Kofax RPA 11.2.0 Fix Pack 6
- Kofax RPA 11.2.0 Fix Pack 5
- Kofax RPA 11.2.0 Fix Pack 4
- Kofax RPA 11.2.0 Fix Pack 3
- Kofax RPA 11.2.0 Fix Pack 2
- Kofax RPA 11.2.0 Fix Pack 1
- Kofax RPA 11.2.0
Files Included
This fix pack includes the following files:
File name | Version |
---|---|
KofaxAnalyticsforRPA-2.5.0.zip | 2.5.0 |
KofaxRPA-11.2.0.10_Trial.zip | 11.2.0.10 |
KofaxRPADocumentation-11.2.0.10_EN.zip | 11.2.0.10 |
KofaxRPADocumentation-11.2.0.10_FR.zip | 11.2.0.10 |
KofaxRPADocumentation-11.2.0.10_JA.zip | 11.2.0.10 |
KofaxRPAProcessDiscoveryAnalyzer-11.2.0.10.zip | 11.2.0.10 |
KofaxRPA-11.2.0.10.tar.gz | 11.2.0.10 |
KofaxRPA-11.2.0.10.msi | 11.2.0.10 |
KofaxRPADesignStudio-11.2.0.10.msi | 11.2.0.10 |
KofaxRPADesktopAutomationService-11.2.0.10.msi | 11.2.0.10 |
KofaxRPADocumentTransformationService-11.2.0.10.msi | 11.2.0.10 |
KofaxRPAProcessDiscoveryAgent-11.2.0.10.msi | 11.2.0.10 |
KofaxRPARoboServer-11.2.0.10.msi | 11.2.0.10 |
Install This Fix Pack
Use the following procedure to install the fix pack.
- Back up your existing installation by creating a Management Console backup.
- Install the needed components. For details, see the Kofax RPA 11.2.0 Installation Guide.
- Restore the backup in the new Management Console.
Remove This Fix Pack
This fix pack is a full installation. Follow the standard uninstallation procedure for Windows or Linux applications.