TCP/IP for VM Secure Socket Layer (SSL) Server
Level 520 Service Update Information

Note: Support for TCP/IP Level 520 ended on 30 April, 2009.

   SSL Server - Service Updates

The table that follows lists recommended APAR service that is available (or pending) for supported levels of the z/VM SSL server.

In general, most of these APARs are (or will be) included on an RSU for a given level of TCP/IP for VM. Thus, it is strongly recommended that current RSU maintenance be applied to Linux-supportive systems.

Note that additional APAR maintenance (not listed here) may be required to address specific problems. Please contact the TCP/IP for z/VM support group for additional information and assistance for any suspect problem that does not appear to be addressed by the maintenance listed here.

Notes:

  • This information was last updated on: 13 Jul 2009

  • Complete APAR descriptions can be obtained by clicking on the various APAR numbers listed in the tables that follow.

  • A "PTF Number" entry of N/A indicates that a PTF is not yet available.

  • Pre-requisite, Co-requisite and Supersede PTFs are not listed in the tables that follow. When an order is placed for any listed PTF, check for and obtain any applicable requisite service.

TCP/IP Service Updates

APAR PTF Number
(and Level)
On RSU? Abstract
 
Level 520 Service Updates
 
PK51954 UK46023 (530)
UK46022 (520)
No Multiple Connections Cause the SSL Server to Abend
PK52404 UK38331 (530)
UK38330 (520)
Yes
Yes
Socket Connection Attempt Receives EAFNOSUPPORT Error
PK21241 UK28018 (520) Yes
SSLADMIN Log Command Yields No Data for Redhat-based SSL System
PK34158 UK20416 (520)
UK20415 (510)
Yes
Yes
Vulnerability Scans Cause TCPIP to Loop
PK16654 UK11187 (520) UK11186 (510) Yes
Yes
AMPX036I Assertion Failure Checking Error Running SSL