IBM Support

MF68212 - LIC-COM-TLS gsk_secure_soc_read() fails to receive queued da

PTF Cover Letter


PTF ( Program Temporary Fixes ) Cover letter


Order this fix

Abstract

LIC-COM-TLS gsk_secure_soc_read() fails to receive queued da


Pre/Co-Requisite PTF / Fix List

REQ  LICENSED           PTF/FIX  LEVEL

TYPE PROGRAM  RELEASE   NUMBER   MIN/MAX  OPTION
---- -------- --------- -------  -------  ------
PRE  5770999  V7R2M0    MF58685   00/00    0000



NOTICE:
-------
Application of this PTF may disable or render ineffective programs that
use system memory addresses not generated by the IBM translator,
including programs that circumvent control technology designed to limit
interactive capacity to purchased levels.  This PTF may be a prerequisite
for future PTFs.  By applying this PTF you authorize and agree to the
foregoing.

This PTF is subject to the terms of the 'IBM License Agreement for Machine
Code', the terms of which were provided in a printed document that was
delivered with the machine.

SUBJECT TO ANY WARRANTIES WHICH CAN NOT BE EXCLUDED OR EXCEPT AS EXPLICITLY
AGREED TO IN THE APPLICABLE LICENSE AGREEMENT OR AN APPLICABLE SUPPORT
AGREEMENT, IBM MAKES NO WARRANTIES OR CONDITIONS EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON INFRINGEMENT,
REGARDING THE PTF.





APAR Error Description / Circumvention

-----------------------------------------------
After the remote side of a secure connection closes and the
local secure socket issues a secure send that fails with
GSK_ERROR_IO and errno value of EPIPE, secure receives fail with
GSK_ERROR_IO and errno value of ECONNRESET even if there is
valid secure data queued.

CORRECTION FOR APAR MA48762 :
-----------------------------
The secure receive code path was updated so that any valid
secure data queued is returned after the remote side is closed.
After all data is received, the next secure receive gets a
return code of 0 indicating end of file.  Additional receives
after that point fail with GSK_INVALID_STATE. If there is a
partial secure record queued and the remote side closed the
connection, a secure receive fails with GSK_ERROR_IO and errno
value of ECONNRESET.

CIRCUMVENTION FOR APAR MA48762 :
--------------------------------
None.


Activation Instructions


None.




Special Instructions


None.


Default Instructions

THIS PTF CAN BE APPLIED IMMEDIATE OR DELAYED.



Supersedes

PTF/FIX NO(S).  APAR TITLE LINE
--------------  ------------------------------------------------------------
   MF67594      LIC-COMM-TCPIP VL2C00C800 SECURE EXCEPTION TLSV1.2 HANDSHAKE
   MF67594      LIC-COMM-TLS Expired DCM certificate causes process to run o
   MF67381      Heap Trap caused MSD due to DST referencing storage after so
   MF67176      LIC-SSL System TLS Cipher Suite Connection Count Support
   MF67176      LIC-COMM System TLS Retrieve TLS Attributes (QsoRtvTLSA) API
   MF67009      SP/CONSOLE-CONSOLECIPHER CONSOLE SPECIFIC TLS CODE TO BE REM
   MF64536      LIC-SSL System TLS ROBOT attack VU#144389
   MF64137      LIC-SSL SYSTEM TLS CLIENTHELLO DOES NOT INCLUDE EC_POINT_FOR
   MF63206      OSP-F/QSYEVTNT-RCX'0005'-MSGCPI22AA MSGCPI22AA, DETECTION PO
   MF62778      LIC-SSL Remove 3DES from System SSL/TLS default
   MF62787      LIC-SSL TLS Alert Record Leaked
   MF62317      OSP-WAIT SOCKET OBJECT GARBAGE COLLECTION TAKES TOO LONG TO
   MF61243      LIC-SSL Remove RSA_MD5 from System SSL/TLS default sig alg l
   MF60432      LIC-SSL Default cipher suite list empty
   MF60368      LIC-COMM-SSL Send SCSV instead of RI Extension when possible
   MF60333      LIC-SSL Remove SSLv3 and RC4 from System SSL default
   MF59777      LIC-SSL LEAK WHEN SOCKET CLOSED IN 2ND THREAD
   MF59777      LIC-COMM-TCPIP-INCORROUT FTPS PROBLEMS WITH SSL REHANDSHAKE
   MF58557      LIC-SSL Certificate Verify Message Signature Error
   MF58230      LIC-SSL ECDHE Processing Location
   MF57990      LIC-SSL SNI JKS
   MF57910      LIC-COMM-SSL OCSP not working as expected
   MF57818      LIC-SSL SNI mixed case
   MF57694      LIC-COMM-SSL Cipher Selection Enhancement
   MF57694      LIC-SSL SNI match not found
   MF59677      LIC-SSL Control Block Leak In Error Path
   MF59644      JVA-RUN Java Secure Socket Extension (JSSE) Support
   MF57909      LIC-SSL GSKit GSK_SSL_EXTN_SERVERNAME_REQUEST on session
   MF60334      LIC-SSL Remove SSLv3 and RC4 from System SSL default
   MF60156      LIC-SSL System SSL Object Garbage Collection
   MF60139      LIC-SOCKETS AUDIT RECORD SK SUBTYPE A TELNET

Summary Information

System..............................i
Models..............................
Release.............................V7R2M0
Licensed Program...............5770999
APAR Fixed..........................View details for APAR MA48762
Superseded by:......................
Recompile...........................N
Library.............................QSYS
MRI Feature ........................NONE
Cum Level...........................C1084720


IBM i Support

IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information.

[{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.2","Product":{"code":"SG15V","label":"PTF Cover Letters - OS\/400 General"},"Component":"5770999","Edition":""},{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.2","Product":{"code":"SG16F","label":"PTF Cover Letters - IBM i 7.2 environment"},"Component":"5770999","Edition":""}]

Document Information

Modified date:
17 April 2021