$TXT Created by KRN.FO-OAKLAND.DOMAIN.EXT (KIDS) on Friday, 04/03/20 at 10:49 ============================================================================= Run Date: JUN 30, 2020 Designation: XU*8*707 Package : XU - KERNEL Priority: Mandatory Version : 8 SEQ #569 Status: Released Compliance Date: JUL 31, 2020 ============================================================================= Subject: KERNEL FILE ACCESS SECURITY SUPPORT AUDIT FILE Category: - Data Dictionary - Routine Description: ============ This patch fixes a bug in the screening logic in New Person file (#200), Accessible File field (#32), multiple #200.032, Accessible File (#.01) field. Non-Programmer FileMan users cannot inquire, print, or search for the Audit file (#1.1) post implementation of Kernel File Security aka KP3 or file (#1.1) post implementation of Kernel File Security aka KP3 or KFS w/o being allocated the @ sign - which requires elevated privileges that cannot be approved for non-OIT staff. Also, routine XUFILE is modified to fix bug. Patch Components: ----------------- Files & Fields Associated: File Name (#) Field Name (#) New/Modified/Deleted ------------- -------------- -------------------- NEW PERSON (#200) ACCESSIBLE FILE (#32) Modified SUB-FILE (#200.032) ACCESSIBLE FILE (#.01) Modified Forms Associated: Form Name File # New/Modified/Deleted --------- ------ -------------------- N/A Mail Groups Associated: Mail Group Name New/Modified/Deleted --------------- -------------------- N/A Options Associated: Option Name Type New/Modified/Deleted ----------- ---- -------------------- N/A Protocols Associated: Protocol Name New/Modified/Deleted ------------- -------------------- N/A Security Keys Associated: Security Key Name ----------------- N/A Templates Associated: Template Name Type File Name (Number) New/Modified/Deleted ------------- ---- ------------------ -------------------- N/A Additional Information: ----------------------- N/A New Service Requests (NSRs): ---------------------------- N/A Patient Safety Issues (PSIs): ----------------------------- N/A ITSM Service Now Defect Tickets: -------------------------------------------- INC4877945 Problem #1: ---------- This issue is in the Kernel File Access Security. There is screening logic in the ACCESSIBLE FILE multiple that only allows files greater than 1.1 to be selected. File #200.032, field #.01 S DIC("S")="I $D(^VA(200,DUZ,""FOF"",+Y,0)),$P(^(0),U,2)" S:DUZ(0)["@" DIC("S")="I Y>1.1" === Resolution: ---------- Modify the screen logic in the Accessible File multiple field #32 of the New Person file #200 to allow the selection of file Audit file #1.1. S DIC("S")="I $D(^VA(200,DUZ,""FOF"",+Y,0)),$P(^(0),U,2)" S:DUZ(0)["@" DIC("S")="I Y>1.0" === Problem #2: ---------- Routine XUFILE DIR(0) range is "2::5" not allowing to choose 1.1 RD K DIR S DIR(0)="LCOA^2::5",DIR("??")="^D H1^XUFILE" Resolution: ---------- Modify XUFILE routine DIR(0) logic to include "1.1" RD K DIR S DIR(0)="LCOA^1.1::5",DIR("??")="^D H1^XUFILE" Blood Bank Clearance: --------------------- Clearance Date: 5/28/2019 EFFECT ON BLOOD BANK FUNCTIONAL REQUIREMENTS: Patch XU*8.0*707 contains changes to a package referenced in ProPath standard titled: BBM Team Review of VistA Patches. This patch does not alter or modify any VistA Blood Bank software design safeguards or safety critical elements functions. RISK ANALYSIS: Changes made by patch XU*8.0*707 have no adverse effect on Blood Bank software functionality, therefore RISK is none. Test Sites: ----------- Tampa, Fl Bay Pines, Fl Software and Documentation Retrieval Instructions: -------------------------------------------------- The software for this patch is being released in a PackMan messge. Documentation describing the new functionality is not included in this release. Documentation Title File Name ----------------------------------------------------------------- N/A Patch Installation: Pre-Installation Instructions: ------------------------------ This patch may be installed with users on the system although it is recommended that it be installed during non-peak hours to minimize potential disruption to users. This patch should take less than 5 minutes to install. Installation Instructions: -------------------------- 1. Choose the PackMan message containing this patch. 2. Choose the INSTALL/CHECK MESSAGE PackMan option. 3. From the Kernel Installation and Distribution System Menu, select the Installation Menu. From this menu, you may elect to use the following options. When prompted for the INSTALL NAME enter the patch XU*8*707: a. Backup a Transport Global - This option will create a backup message of any routines exported with this patch. It will not backup any other changes such as DDs or templates. b. Compare Transport Global to Current System - This option will allow you to view all changes that will be made when this patch is installed. It compares all components of this patch routines, DDs, templates, etc.). c. Verify Checksums in Transport Global - This option will allow you to ensure the integrity of the routines that are in the transport global is installed. It compares all components of this patch (routines, DDs, templates, etc.). d. Verify Checksums in Transport Global - This option will allow you to ensure the integrity of the routines that are in the transport global. 4. From the Installation Menu, select the Install Package(s) option and When prompted for the INSTALL NAME, enter XU*8.0*707. 5. When prompted "Want KIDS to INHIBIT LOGONs during the install? NO// No 6. If prompted "Want to DISABLE Scheduled Options, Menu Options, and Protocols? NO// No Post-Installation Instructions: ------------------------------- None Backout and Rollback Procedure: ------------------------------- This patch consists modification to screen logic of existing field. If assistance is needed to rollback/backout the patch, then please open a ServiceNow ticket so the development team can assist in this process. Routine Information: ==================== The second line of each of these routines now looks like: ;;8.0;KERNEL;**[Patch List]**;Jul 05, 1995;Build 7 The checksums below are new checksums, and can be checked with CHECK1^XTSUMBLD. Routine Name: XUFILE Before: B12785269 After: B13327449 **1,707** Routine list of preceding patches: 1 ============================================================================= User Information: Entered By : Date Entered : JAN 30, 2019 Completed By: Date Completed: JUN 30, 2020 Released By : Date Released : JUN 30, 2020 ============================================================================= Packman Mail Message: ===================== $END TXT