================================================================================
Introduction
Hotfixes are cumulative. This hotfix includes all previous generally available
hotfixes for TIBCO Runtime Agent 5.8.0.
================================================================================
Installation
All Platforms:
1. Shut down all running TIBCO applications.
2. Back up the contents in the {TIBCO_HOME}\tra\5.8\hotfix\lib directory.
3. Unzip the hotfix zip file to a temporary directory.
For example, c:\tibco\trahotfix.
4. Copy TIBCOUniversalInstaller from {TIBCO_HOME}/tools/universal_installer
to the temporary directory.
5. Launch the TIBCOUniversalInstaller{.exe,bin} executable from this
temporary directory and install the hotfix into the {TIBCO_HOME}
of the base product.
6. Edit catalina.properties located in
{TIBCO_HOME}\administrator\domain\domain_name\tomcat\conf and
{TIBCO_HOME}\administrator\5.8\tomcat\conf
and add the below lines
#The comma-separated list of additional filenames of JARs that
#Tomcat will not scan for Servlet 3.0 pluggability features.
#The coded default is that no JARs are skipped however the
#system property is set in a default Tomcat installation
#via the $CATALINA_BASE/conf/catalina.properties file.
org.apache.catalina.startup.ContextConfig.jarsToSkip=*.jar
7. Restart TIBCO applications.
Note:To install hotfix on AIX platform, you need to either restart the machine
or move the [TIBCO_HOME}\tibcojre directory to any temporary location.
================================================================================
Uninstallation
1. Navigate to the <TIBCO_HOME>\tools\universal_installer.
2. Run the TIBCO Universal Installer and uninstall the hotfix using the wizard.
For more details, contact TIBCO Support.
Note:The uninstallation does not revert the updates made within
the {TIBCO_HOME}\tibcojre folder.
================================================================================
Affected Files for 5.8.0_HF-011
The following files are installed by this hotfix. Note that some
files are platform-specific and are installed only on that platform.
All Platforms:
This hotfix is applied to TIBCO Runtime Agent 5.8.0 version.
{TIBCO_HOME}\release_notes directory:
- TIB_TRA_5.8.0_HF-011_readme.txt
{TIBCO_HOME}\tra\5.8\hotfix\lib directory:
- TIBCOxml.jar
- enttoolkit.jar
- TIBCOrt.jar
- TIBCrypt.jar
- Domainutility.jar
- TIBCOAppDeployment.jar
- AppManage.jar
- Deployment.jar
- TIBCOSecurityTomcat.jar
- TIBCOtsm.jar
{TIBCO_HOME}\tibcojre64\1.7.0 directory
- all the files in this directory
{tibco_home}\tra\5.8\template\domainutility\cmdline
- ModifyDBConfiguration.xml
{TIBCO_HOME}\tpcl\5.8\tomcat\7 directory:
- all the files in this directory
{TIBCO_HOME}\tpcl\5.8\lib directory:
- commons-beanutils.jar
- commons-collections.jar
- commons-dbcp.jar
- commons-digester.jar
- commons-fileupload-1.0.jar
- commons-logging-api.jar
- jaas.jar
- jakarta-regexp-1.2.jar
- jdbc2_0-stdext.jar
- jndi.jar
- jta.jar
- naming-common.jar
- servlet.jar
- servlets-common.jar
- servlets-manager.jar
- tomcat-http11.jar
- tomcat-jk.jar
- tomcat-jk2.jar
- tomcat-warp.jar
Microsoft Windows:
- libwrap.lib
- maverick57.dll
- maverick57d.dll
Solaris:
- libwrap.a
- libwrap64.a (This is applicable for 64 bit platform)
- libmaverick57.so
- libmaverick5764.so
Linux:
- libwrap.a
- libwrap64.a (This is applicable for 64 bit platform)
- libmaverick57.so
- libmaverick5764.so
HP-UX IA-64:
- libwrap.a
- libwrap64.a (This is applicable for 64 bit platform)
- libmaverick57.so
- libmaverick5764.so
AIX:
- libwrap.a
- libwrap64.a (This is applicable for 64 bit platform)
- libmaverick57.so
- libmaverick5764.so
================================================================================
Closed Issues in 5.8.0_HF-011 (This Release)
TRA-3949
Restore the optional setting for enabling the SSLv3 for backward compatibility
for the Entrust Security Provider.
TRA-3932
TIBCO Runtime Agent now includes TLS_EMPTY_RENEGOTIATION_INFO_SCSV cipher suite
for JSSE implementation; relevant when communicating with old SSL Servers
which do not have complete support for renegotiation.
TRA-3931
TIBCO Runtime Agent now supports properties to disable TLS protocol which
are enabled by default.
For backward compatibility, you can disable the following TLS and SSLv protocols:
To disable TLS v1.0, set com.tibco.security.ssl.client/server.EnableTLSv1 to
false.
To disable TLS v1.1, set com.tibco.security.ssl.client/server.EnableTLSv11 to
false.
To disable TLS v1.2, set com.tibco.security.ssl.client/server.EnableTLSv12 to
false.
To disable SSLv2Hello, set com.tibco.security.ssl.server.EnableSSLv2Hello to
false.
SSLv3 is set to false by default. To enable SSLv3, set
com.tibco.security.ssl.client/server.EnableSSLv3 to true.
TRA-3875
TIBCO Runtime Agent now bundles TIBCrypt 2.18.304.001.
TRA-3868
Oracle JRE 7 has been upgraded with patch u101 for Linux, Solaris, Solaris Sparc,
Windows and AIX platforms, and patch u16 for HP platform.
================================================================================
Closed Issues in 5.8.0_HF-010
TRA-3790
HTTP basic authentication failed randomly for the first request.
================================================================================
Closed Issues in 5.8.0_HF-009
TRA-3796
When a .mar file is deployed from the TIBCO Administrator GUI, rulebases can
be loaded automatically. Rulebases can also be loaded automatically when the
process is stopped from the TIBCO Administrator GUI and re-started. However,
if a configuration parameter is changed using TIBCO Administrator and the
component is re-deployed, Hawk rules are not loaded after the component
starts.
================================================================================
Closed Issues in 5.8.0_HF-008
TCRT-64
For Unlimited Jurisdiction Policy (UJP) and j2se provider, the following
exception was thrown:
"unsupported cipher type: 106"
TRA-3740
In the ModifyDBConfiguration.xml file, there was no placeholder for the
domain's username and password when domainutilitycmd was used (unlike
the Domain Utility of the GUI).
================================================================================
Closed Issues in 5.8.0_HF-007
TCRT-56
To protect from the POODLE SSLv3 vulnerability (CVE-2014-3566), the SSLv3
protocol is by default no longer supported for TLS/SSL connections. By default
only version 1.0 or higher of TLS will be negotiated.
For backward compatibility with software that supports only SSLv3, you can
enable the SSLv3 protocol by setting any of the following system-wide properties
for client-side and server-side connections in the .tra file:
java.property.com.tibco.security.ssl.client.EnableSSLv3=true
java.property.com.tibco.security.ssl.server.EnableSSLv3=true
TXML-184
(Linux) Runtime validation failed for Complex Schema.
================================================================================
Closed Issues in 5.8.0_HF-006
TRA-3485
Tomcat release 7.0.54 is now supported.
TRA-3496
Even after maximum revision history was enabled, domain data increased
with each revision of the .ear file.
TRA-3507
CertChainVerifier confused self-issued certificates for self-signed ones.
TRA-3524
Even after the message encoding was set to UTF-8 in the project, the
default encoding of AppManage in the exported deployment configuration
XML file of an EAR was ISO8859-1.
================================================================================
Closed Issues in 5.8.0_HF-005
TXML-174
Whitespaces were deleted from the original XML input and output data
when the activity validation was turned on.
================================================================================
Closed Issues in 5.8.0_HF-004
TXML-170
The com.tibco.xml.serialization.impl.XmlContentWriter class was passed to
XMLStringUtilities. This was an incorrect implementation as per the JRE docs.
TXML-172
TRA property based ability to set lenient validation of date parameter in
parse-date function.
Set com.tibco.xml.xpath.function.datetime.parse.lenient system property to true.
================================================================================
Closed Issues in 5.8.0_HF-003
WRAP-145
The wrapper behavior was changed while supporting C++ application.
The Customer was getting 'Core Dump' error in SDK 5.8.0.
================================================================================
Closed Issues in 5.8.0_HF-002
TRA-3206
The acceptance of certificates with 'postalCode' attribute caused
'IllegalArgumentException' error. This happened when Entrust 8.0 patch prior to
184269 was used with TIBCO Runtime Agent 5.8.
================================================================================
Closed Issues in 5.8.0_HF-001
TRA-3085
The time zone information in the log file was not correct.
================================================================================
TIBCO Product Support
- For an overview of TIBCO Support Services, and information about
getting started with TIBCO Product Support, visit this site:
http://www.tibco.com/services/support/default.jsp
- If you already have a valid maintenance or support contract,
visit the TIBCO Product Support site: https://support.tibco.com
Entry to this site requires a username and password. If you do
not have a username, you can request for one.
- Check the TIBCO Product Support site "Late Breaking News" page
for product information that was not available at release time.
================================================================================
Copyright
Copyright (C) 1997-2015 TIBCO Software Inc. ALL RIGHTS RESERVED.
TIBCO Software Inc. Confidential Information.