IBM Support

OA67396: ALERT 1402 TRIGGERED FOR COMMS SERVER API USAGE OF AF_UNIX SOCKETS

A fix is available

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • Alert 1402 triggered for Comms Server API usage of AF_UNIX
    sockets.
    
    Alert 1402 can be triggered for the following AF_UNIX socket
    files used by Communication Server IP:
    
    /var/sock/nss
    /var/sock/SYSTCPCN.TCPIP
    /var/sock/SYSTCPDA.TCPIP
    /var/sock/SYSTCPER.TCPIP
    /var/sock/SYSTCPSM.TCPIP
    

Local fix

  • N/A
    

Problem summary

  • ****************************************************************
    * USERS AFFECTED: Users of zSecure Alert exploiting predefined *
    *                 alert ID 1402 and running the Alert started  *
    *                 task as SUB=MSTR.                            *
    ****************************************************************
    * PROBLEM DESCRIPTION: zSecure Alert ID 1402 (Global write     *
    *                      specified when altering file mode) is   *
    *                      triggered for IBM z/OS Communications   *
    *                      Server API usage of AF_UNIX sockets     *
    *                      events.                                 *
    ****************************************************************
    * RECOMMENDATION: Apply the PTF provided.                      *
    ****************************************************************
    zSecure Alert ID 1402 (Global write specified when altering file
    mode) is triggered for IBM z/OS Communications Server API usage
    of AF_UNIX sockets events, when the Alert started task is
    running as SUB=MSTR. This is expected behavior and should
    therefore not trigger alert 1402.
    

Problem conclusion

  • zSecure Alert has been modified, so that the alert ID 1402 is
    not triggered for the access events for following AF_UNIX
    sockets used by IBM z/OS Communications Server API usage:
    
    /dev/log
    /var/sock/nss
    /var/sock/SYSTCPCN.TCPIP
    /var/sock/SYSTCPDA.TCPIP
    /var/sock/SYSTCPER.TCPIP
    /var/sock/SYSTCPSM.TCPIP
    

Temporary fix

Comments

APAR Information

  • APAR number

    OA67396

  • Reported component name

    ZSEC BASE,ADMIN

  • Reported component ID

    5655T0100

  • Reported release

    310

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2025-01-14

  • Closed date

    2025-03-03

  • Last modified date

    2025-04-02

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

    UJ96743

Modules/Macros

  • C2PS1402
    

Fix information

  • Fixed component name

    ZSEC BASE,ADMIN

  • Fixed component ID

    5655T0100

Applicable component levels

  • R310 PSY UJ96743

       UP25/03/04 P F503

Fix is available

  • Select the PTF appropriate for your component level. You will be required to sign in. Distribution on physical media is not available in all countries.

[{"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSPQTM","label":"IBM Security zSecure Admin"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"310","Line of Business":{"code":"LOB70","label":"Z TPS"}}]

Document Information

Modified date:
02 April 2025