PTF Cover Letter
PTF ( Program Temporary Fixes ) Cover letter
OSP-MSGHTP8081HTTPTHREADFAILED,APACHEBUG HTP8081 HTTP THREAD
Pre/Co-Requisite PTF / Fix List
REQ LICENSED PTF/FIX LEVEL
TYPE PROGRAM RELEASE NUMBER MIN/MAX OPTION
---- -------- --------- ------- ------- ------
PRE 5770DG1 V7R2M0 SI56221 NONE 0000
PRE 5770DG1 V7R2M0 SI56231 NONE 0000
CO 5770DG1 V7R2M0 SI62791 NONE 0000
NOTICE:
-------
Application of this PTF may disable or render ineffective programs that
use system memory addresses not generated by the IBM translator,
including programs that circumvent control technology designed to limit
interactive capacity to purchased levels. This PTF may be a prerequisite
for future PTFs. By applying this PTF you authorize and agree to the
foregoing.
This PTF is subject to the terms of the license agreement which
accompanied, or was contained in, the Program for which you are obtaining
the PTF. You are not authorized to install or use the PTF except as part
of a Program for which you have a valid Proof of Entitlement.
SUBJECT TO ANY WARRANTIES WHICH CAN NOT BE EXCLUDED OR EXCEPT AS EXPLICITLY
AGREED TO IN THE APPLICABLE LICENSE AGREEMENT OR AN APPLICABLE SUPPORT
AGREEMENT, IBM MAKES NO WARRANTIES OR CONDITIONS EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON INFRINGEMENT,
REGARDING THE PTF.
The applicable license agreement may have been provided to you in printed
form and/or may be viewed using the Work with Software Agreements (WRKSFWAGR)
CL command.
APAR Error Description / Circumvention
-----------------------------------------------
HTP8081 HTTP thread failed during Qualys scan
The Apache CVE has this bug but they have fixed it in their
latest code
CORRECTION FOR APAR SE71781 :
-----------------------------
Problem has been fixed.
CIRCUMVENTION FOR APAR SE71781 :
--------------------------------
None.
Activation Instructions
None.
Special Instructions
This PTF will be activated for a HTTP server when that server instance
is ended and started, or at the next IPL. If an HTTP server is already
active at the time this PTF is applied, the HTTP server must be ended
and started in order to activate this PTF for that HTTP server
instance.
Do the following to activate this PTF for all HTTP server
instances.
1. ENDTCPSVR SERVER(*HTTP) HTTPSVR(*ALL)
2. Start the HTTP server(s) using:
STRTCPSVR SERVER(*HTTP) HTTPSVR(<server name>)
Default Instructions
THIS PTF CAN BE APPLIED IMMEDIATE OR DELAYED.
Supersedes
PTF/FIX NO(S). APAR TITLE LINE
-------------- ------------------------------------------------------------
SI69901 HTTPSVR - Patch Apache Vulnerability CVE-2019-0220
SI69055 HTTPSVR-F/QZSRCORE-T/QZSRCORE-MSGMCH3601 HTTP PROXYBLOCK DIR
SI68116 OSP-MSGHTP8047RC4 HTP8047 RC4
SI67736 HTTPSVR CGI PGM WITH SSI VIRTUAL INCLUDE GIVES ERROR WHEN US
SI67510 OSP CGI PROGRAM WITH SSI VIRTUAL INCLUDE GIVES ERROR WHEN US
SI67357 HTTPSVR - Patch for CVE-2018-1301 and CVE-2017-15715
SI67092 OSP-MSGCCSID4971SUPPORT ADDING SUPPORT FOR CCSID 4971
SI66551 HTTPSVR - HTTP Server for i update
SI66345 HTTPSVR - Patch Apache Vulnerability CVE-2017-12613
SI65915 HTTPSVR - Patch Apache Vulnerability CVE-2017-9798
SI65279 HTTPSVR - Patch Apache Vulnerability CVE-2017-3167, CVE-2017
SI64140 HTTPSVR - Patch Apache Vulnerability CVE-2016-8743
SI62792 HTTPSVR - Upgrade HTTP Server to Apache 2.4.20
SI62159 HTTPSVR - Patch Apache Vulnerability CVE-2016-5387
SI61393 HTTPSVR DDS ERROR LOG FORMAT FOR APACHE SERVER
SI59286 HTTPSVR-MSGMCH1210-F/QPMDHTTP CRTPFRDTA fails
SI58157 HTTPSVR - Upgrade HTTP Server to Apache 2.4.12
SI57806 HTTPSVR - Patch Apache Vulnerability CVE-2015-3185
SI57806 HTTPSVR - Patch Apache Vulnerability CVE-2015-3183
SI57335 HTTPSVR - HTTP Server for i update
SI56598 HTTPSVR - HTTP Server for i updates
SI55722 HTTPSVR - Add IASP support to StartCGI directive
SI55722 HTTPSVR - Patch Apache Vulnerability CVE-2013-5704
SI55722 HTTPSVR - Add CCSID 1377 support
SI55552 HTTPSVR - Patch Apache Vulnerabilitys CVE-2014-3581
SI55411 HTTPSVR-INCORROUT HTTP_AS_AUTH_PROFILETKN ENVIRONMENT VARIAB
SI54676 HTTPSVR-INCORROUT HTTP APACHE NOT PROCESSING 100-CONTINUE CO
SI54023 HTTPSVR - Patch Apache Vulnerability CVE-2014-0118
SI54023 HTTPSVR - HTTP Server for i update
SI53637 HTTPSVR - HTTP Server for i update
SI53545 HTTPSVR - HTTP Server for i update
SI52811 HTTPSVR - HTTP Server for i 2.4 support
SI51962 HTTPSVR - HTTP Server for i 2.4 support
SI51625 HTTPSVR - HTTP Server for i 2.4 support
SI51122 HTTPSVR - HTTP Server for i update
SI52587 HTTPSVR - HTTP Server for i update
SI51520 HTTPSVR - HTTP Server for i update
SI51108 HTTPSVR - HTTP Server for i update
Summary Information
System.............................. i
Models..............................
Release............................. V7R2M0
Licensed Program.................... 5770DG1
APAR Fixed.......................... View details for APAR SE71781
Superseded by:...................... View fix details for PTF SI85833
Recompile........................... N
Library............................. QHTTPSVR
MRI Feature ........................ NONE
Cum Level........................... C9297720
IBM disclaims all warranties, whether express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. By furnishing this document, IBM grants no licenses to any related patents or copyrights. Copyright © 1996,1997,1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021, 2022, 2023, 2024 IBM Corporation. Any trademarks and product or brand names referenced in this document are the property of their respective owners. Consult the Terms of use link for trademark information.
Was this topic helpful?
Document Information
Modified date:
16 February 2024