TCP/IP for VM Secure Socket Layer (SSL) Server
Level 520 Service Update Information
Note: Support for TCP/IP Level 520 ended on 30 April, 2009.
SSL Server - Service Updates |
The table that follows lists recommended APAR service that is available (or pending) for supported levels of the z/VM SSL server.
In general, most of these APARs are (or will be) included on an RSU for a given level of TCP/IP for VM. Thus, it is strongly recommended that current RSU maintenance be applied to Linux-supportive systems.
Note that additional APAR maintenance (not listed here) may be required to address specific problems. Please contact the TCP/IP for z/VM support group for additional information and assistance for any suspect problem that does not appear to be addressed by the maintenance listed here.
Notes:
-
This information was last updated on: 13 Jul 2009
-
Complete APAR descriptions can be obtained by clicking on the
various APAR numbers listed in the tables that follow.
-
A "PTF Number" entry of N/A indicates that a PTF is not yet
available.
-
Pre-requisite, Co-requisite and Supersede PTFs are
not listed in the tables that follow. When an order is placed
for any listed PTF, check for and obtain any applicable
requisite service.
TCP/IP Service Updates
APAR |
PTF Number (and Level) |
On RSU? | Abstract |
---|---|---|---|
Level 520 Service Updates |
|||
PK51954 |
UK46023 (530) UK46022 (520) |
No | Multiple Connections Cause the SSL Server to Abend |
PK52404 |
UK38331 (530) UK38330 (520) |
Yes Yes |
Socket Connection Attempt Receives EAFNOSUPPORT Error |
PK21241 | UK28018 (520) |
Yes |
SSLADMIN Log Command Yields No Data for Redhat-based SSL System |
PK34158 |
UK20416 (520) UK20415 (510) |
Yes Yes |
Vulnerability Scans Cause TCPIP to Loop |
PK16654 | UK11187 (520) UK11186 (510) |
Yes Yes |
AMPX036I Assertion Failure Checking Error Running SSL |