INC-199679 · Issue 688736
Handling added to email encoding for ISO-8859-8-i charset
Resolved in Pega Version 8.5.6
After update, cases were intermittently not getting created from inbound email and the process became stuck. This has been resolved by adding handling to replace the ISO-8859-8-i charset with ISO-8859-8 for encoding the mail content.
INC-199749 · Issue 695536
Updated use of declarative processing during performance testing
Resolved in Pega Version 8.5.6
After update, the performance test script build was not working. A stack overflow indicated an issue with the load activity for the D_InteractionHistory data page referenced by expressions/properties. This has been resolved by disabling declarative processing during the estimation of data size.
INC-200029 · Issue 690168
Service Email handling updated for MSGraph "From" address
Resolved in Pega Version 8.5.6
While creating cases via email listener, the "From" address was not shown when using MSGraph. This was an issue with extracting the display name when MSGraph is used, and has been resolved by adding double quotes to display the name unconditionally.
INC-200167 · Issue 689087
Performance improvement for char and Integers arrays
Resolved in Pega Version 8.5.6
In order to improve performance with locking pools for char and Integers arrays, the old usage of pooled arrays has been removed and replaced with a more efficient object creation array.
INC-201991 · Issue 692859
Explicit connectivity close added to Queue Manager error handling
Resolved in Pega Version 8.5.6
Performing a connectivity test on the MQ Connector page with an invalid queue name aborts the test connectivity but the MQ connection was not closing. This can become an issue when using IBM MQaaS (MQ as a service) where only a limited number of connections are allowed. This has been resolved by adding an explicit Queue Manager close in the error handling block.
INC-202183 · Issue 699681
ClusterAndDBCleaner updated to with with Oracle query limits
Resolved in Pega Version 8.5.6
The pzClusterAndDBCleaner job scheduler was not able to cleanup data in pr_op_data session table due to the delete query formed to clean up this table throwing "ora-01795 maximum number of expressions in a list is 1000 oracle 19c" exception. This has been resolved by splitting requestor IDs into batches of 1000.
INC-202743 · Issue 697113
Cleanup added for disabled/deleted operator passivation data
Resolved in Pega Version 8.5.6
In some scenarios, a passivated session for a non-active operator was able to be resumed after cluster restart. This has been resolved by adding a check for disabled or deleted operators which will then delete any lingering passivated data.
INC-204998 · Issue 705631
Data page definition reload made more robust
Resolved in Pega Version 8.5.6
The data page was intermittently being removed from the cache. This was traced to the use of a thread from ThreadContainer to reload the data page definition: a null thread could be returned if the request came from a master agent, which would then cause the definition reload to fail. This has been resolved by updating the system to use the current thread in context to reload the data page definition.
INC-210059 · Issue 706892
Log4j file security vulnerability issue addressed
Resolved in Pega Version 8.5.6
A zero-day vulnerability was identified in the Apache Log4j logging software which could potentially allow malicious actors to take control of organizational networks. Pega has immediately and thoroughly addressed this issue. More information can be found at https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability .
INC-211132 · Issue 706901
Log4j file security vulnerability issue addressed
Resolved in Pega Version 8.5.6
A zero-day vulnerability was identified in the Apache Log4j logging software which could potentially allow malicious actors to take control of organizational networks. Pega has immediately and thoroughly addressed this issue. More information can be found at https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability .