========================================================== Maintenance for IBM Sterling Connect:Direct for UNIX 4.1.0 ========================================================== This maintenance archive includes module replacements for the C:D UNIX 4.1.0 code base. It is applicable to C:D UNIX version 4.1.0, and contains all the new functionality and fixes as described in the C:D UNIX 4.1.0 Release notes, as well as fixes for the issues listed below. This release implements IBM's standard V.R.M.F method of identifying software. V, R, M and F are Version, Release, Modification and Fix Pack respectively. In general, V.R.M imply new functionality, while F is an accumulation of fixes called a Fix Pack. The term Fix Pack will be used going forward in place of Cumulative Maintenance. Individual fixes also have a new name, Interim Fixes, or iFixes for short. iFixes are numbered sequentially from one starting with any increment to V, R, M or F. Please see IBM's website for further details regarding this methodology. After applying the maintenance, the CLI banner will report that your C:D version is 4.1.0.x, where x is the current Fix Pack. It will also display the date that the maintenance was created. For more information, please refer to the C:D UNIX 4.1.0 Release Notes. ============================== iFixes to C:D for UNIX 4.1.0.0 ============================== 001) QC18588 commit date: 18 Apr 2011 --------------------------------------- Stack overflow exploit potential in ndmsmgr. 002) QC18587 commit date: 25 Apr 2011 --------------------------------------- Null pointer dereference vulnerability in ndmsmgr. 003) QC18972 commit date: 26 Apr 2011 --------------------------------------- Added "daily" keyword that when specified with an elapsed time in the startt parameter of a submit command will schedule the process for the next day at the specified time. 004) QC19021 commit date: 26 Apr 2011 --------------------------------------- Trailing blanks are not stripped from first record of a text file received with strip.blanks=yes and codepage conversion. 005) QC18999 commit date: 06 May 2011 --------------------------------------- XIPT011I error when Control Center attempts to import a large (greater than 16k) trusted certificate file. 006) QC19050 commit date: 22 Jun 2011 --------------------------------------- Added functionality to allow server connections to strongly secure sensitive information in session overhead and leave data which may not be sensitive unencrypted to enhance performance. Documentation for this feature and how to use it is available on our IBM Sterling Support Center website. ----------------------------------------------------------- iFixes listed above are accumulated in C:D for UNIX 4.1.0.1 ----------------------------------------------------------- ============================== iFixes to C:D for UNIX 4.1.0.1 ============================== 001) QC19079 commit date: 29 Jul 2011 --------------------------------------- XSMG271I error on restarted wildcard copy step when local user on sending node is other than the C:D installer. 002) QC19299 commit date: 29 Jul 2011 --------------------------------------- SVSJ032I error sending a binary file to a z/OS destination file with V or VB record format. 003) QC19065 commit date: 01 Aug 2011 --------------------------------------- XSMG605I error when copy step to OS/400 node fails and connection is via Secure+ STS with digital signatures enabled. 004) QC19324 commit date: 05 Aug 2011 --------------------------------------- Scheduled process fails with XSQF009I error if cdpmgr is recycled before the scheduled process start time. 005) QC19435 commit date: 08 Aug 2011 --------------------------------------- Files written and closed by C:D on NFS destination may not be immediately ready for processing due to NFS delayed writes. Added initparm to optionally call fsync function to attempt to flush all data to disk before closing file. New initparm is "fsync.after.receive" and is part of the "copy.parms" record of initparm.cfg. It takes a value of 'y' or 'n', with 'y' indicating to call fsync before closing a data file that was received. Default value is 'n'. 006) QC19414 commit date: 09 Aug 2011 --------------------------------------- cdcust option to run "Configurations requiring root privilege" is ineffective when root user is configured with a nologin shell. 007) QC19633 commit date: 15 Aug 2011 --------------------------------------- cdinstall fails to detect and provide notice when the installed C:D version is newer than the installing version. ----------------------------------------------------------- iFixes listed above are accumulated in C:D for UNIX 4.1.0.2 ----------------------------------------------------------- ============================== iFixes to C:D for UNIX 4.1.0.2 ============================== 001) QC19725 commit date: 27 Sep 2011 --------------------------------------- Process with snodeid override specified submitted on C:D UNIX node via a submit statement within another C:D process may fail to pass snode security. NOTE: The previous designation of 'QC' for a product issue will be transitioned to 'RTC' due to the migration to the IBM Rational tool tracking system. Also, most fixes will also refer to an APAR number pursuant to implementing IBM defect description terminology. 002) RTC303677 / APAR IC81358 commit date: 03 Feb 2012 -------------------------------------------------------- Statistics archive files may be owned by root. 003) QC20035 commit date: 02 Mar 2012 --------------------------------------- An LCCA082I error is generated after cdpmgr has been started by root and a Secure+ configuration command is issued from a KQV client, like Sterling Control Center. 004) QC20157 commit date: 06 Apr 2012 --------------------------------------- Null pointer dereference vulnerability in ndmsmgr for Secure+ connections. Vulnerability could enable denial of service attack. 005) QC20403 commit date: 06 Apr 2012 --------------------------------------- Potential for XPMR018I error when client such as Sterling Control Center attempts to update the initparm.cfg file. 006) QC20041 commit date: 09 Apr 2012 --------------------------------------- Possible denial of service if attacker can play back multiple simulated sessions that include large malformed session control packets that generate lots of errors. 007) QC20473 commit date: 10 Apr 2012 --------------------------------------- Some records on z/OS VB destination file are not filled to LRECL specification when sending a UNIX file with datatype=binary and codepage conversion specified. 008) QC19832 commit date: 10 Apr 2012 --------------------------------------- On AIX systems, temporary work files are created in /tmp instead of {C:D install dir}/work/{C:D node name} directory for processes submitted by a user without write permission in the {C:D install dir}/work/{C:D node name} directory. 009) QC19857 commit date: 12 Apr 2012 --------------------------------------- View process command may hang and generate many XUPC023I errors when viewing a submitted process that includes a submit step with an snodeid or pnodeid override. 010) QC20043 commit date: 18 Apr 2012 --------------------------------------- Stack overflow vulnerability in ndmauthc. An attacker could exploit the vulnerability to execute commands with CDU installer authority. 011) QC20044 commit date: 19 Apr 2012 --------------------------------------- Stack overflow vulnerability in modules that read the initparm.cfg file, like cdpmgr and ndmsmgr. 012) QC20158 commit date: 25 Apr 2012 --------------------------------------- ndmsmgr segmentation violation during S+ connection attempt using a malicious certficate with an inordinately long subject. Possible denial of service. 013) QC20638 commit date: 25 Apr 2012 --------------------------------------- ndmcmgr may be terminated by segmentation violation (signal 11 in most cases) when a client such as C:D Browser or Control Center adds a Functional Authority (new user). 014) RTC140725 / APAR IC82150 commit date: 27 Apr 2012 -------------------------------------------------------- Improved safe initialization procedures for suid files ndmauthc, ndmauths, and cdpmgr. 015) RTC315406 commit date: 27 Apr 2012 ----------------------------------------- cdinstall indication of disk space requirement to install File Agent is too low. 016) QC19758 commit date: 27 Apr 2012 --------------------------------------- C:D HP NonStop reports an invalid feedback code in the completion status for a run task step submitted to C:D UNIX. 017) RTC328127 / APAR IC83593 commit date: 21 May 2012 -------------------------------------------------------- On exit, cdcust may give an inappropriate warning about incomplete root authority configurations. 018) RTC103045 commit date: 24 May 2012 ----------------------------------------- When Secure+ is installed on a node for the first time, it must be initialized. The initialization procedure requires the Connect:Direct node name, but it is not offered by default. 019) RTC326139 commit date: 30 May 2012 ----------------------------------------- When SSL/TLS is enabled, updating the .SEAServer entry in Secure+ would fail even when External Authentication is disabled: "Error: The .SEAServer host name must be specified." 020) RTC140646 commit date: 31 May 2012 ----------------------------------------- Clients like Sterling Control Center or Connect:Direct Browser are able to set an invalid tcp.api value in the local.node netmap entry causing future api connections to be rejected. 021) RTC328994 / APAR IC84027 commit date: 08 Jun 2012 -------------------------------------------------------- spcli may display resolved symbolic link values for pathnames entered with symbolic links specified 022) RTC333723 / APAR IC84003 commit date: 08 Jun 2012 -------------------------------------------------------- When Connect:Direct UNIX (CDU) receives a redirect message, SCPA007I, from Connect:Direct z/OS Plex environment, CDU inappropriately records a non- zero completion code. Plex redirection is a normal operational flow. ----------------------------------------------------------- iFixes listed above are accumulated in C:D for UNIX 4.1.0.3 ----------------------------------------------------------- In addition, C:D for UNIX 4.1.0.3 adds certification for AIX 7.1 on IBM pSeries, and Red Hat Enterprise Linux (RHEL) version 6.2 on Intel and AMD x86/x86-64. Please note the following list of system libraries that are required to run on RHEL 6.2: libXtst-1.0.99.2-3.el6.i686 libXmu-1.0.5-1.el6.i686 libXt-1.0.7-1.el6.i686 libXft-2.1.13-4.1.el6.i686 libX11-1.3-2.el6.i686 libXi-1.3-3.el6.i686 libXext-1.1-3.el6.i686 libXau-1.0.5-1.el6.i686 libXrender-0.9.5-1.el6.i686 ============================== iFixes to C:D for UNIX 4.1.0.3 ============================== 001) RTC336221 / APAR IC85214 commit date: 09 Aug 2012 -------------------------------------------------------- If multiple comm.info fields are defined in a netmap entry (valid for some SNA connections), cdpmgr will leak memory whenever the netmap entry is referenced. 002) RTC336094 / APAR IC84762 commit date: 17 Aug 2012 -------------------------------------------------------- comm.bufsize value defaults to 4096 when it's not specified in either the remote node record or the local.node record of the netmap.cfg file. Documented default is 65536. 003) RTC345214 / APAR IC86456 commit date: 13 Sep 2012 -------------------------------------------------------- Improper upgrade procedure resulting in mismatched Secure+ libraries causes cdpmgr to hang on start up. 004) RTC350216 / APAR IC86881 commit date: 03 Oct 2012 -------------------------------------------------------- Secure cdpmgr initialization procedure to sanitize inherited environment variables, added for APAR IC82150, may prevent run task steps that depend on one or more of the inherited environment variables from working properly. Solution adds initparm record ndm.env_vars:sanitize=[y|n] to allow user option to prevent cdpmgr from sanitizing inherited environment variables. Default value is 'y'. NOTE: This new initparm is added for convenience. IBM recommends coding run task steps so that they don't rely on inherited environment variables. 005) RTC336848 / APAR IC85987 commit date: 31 Oct 2012 -------------------------------------------------------- cdpmgr server is killed when command logging is turned on and a client, such as Sterling Control Center, attempts to import a large Secure+ trusted certificates file. 006) RTC356606 / APAR IC88093 commit date: 09 Nov 2012 -------------------------------------------------------- Certain business scenarios may require the need to specify a non-standard record delimiter for UNIX text files. Added new copy step sysopt called RECDL. The value of this sysopt is specified as x{hex value of character to be used as the text file record delimiter}, and will cause C:D to use the indicated character as the text file record delimiter instead of the traditional ASCII LF. For example, if the source file is in EBCDIC and using the EBCDIC NL (new line character) as the record delimiter, the source file sysopts would include ":RECDL=x15:". 007) RTC341549 / APAR IC86449 commit date: 24 Jan 2013 -------------------------------------------------------- On AIX 6.1 and above, a copy step that overwrites a local file to which the local user has no write permission is successful. 008) RTC349446 / APAR IC87996 commit date: 28 Jan 2013 -------------------------------------------------------- The Partitioned Data Set (PDS) member name, key word PPMN, is listed twice in the Copy Termination Record (record id CTRC) that is logged to statistics when copying a file to or from a zSeries PDS member. 009) RTC355425 / APAR IC89092 commit date: 28 Jan 2013 -------------------------------------------------------- Upgrading to 4.1.0 from a release previous to 4.1.0 configured with Secure+ generates some inappropriate messages indicating that the initialize Secure+ operation failed. 010) RTC363760 / APAR IC89667 commit date: 09 May 2013 -------------------------------------------------------- Secure+ SSL connection initiated to Connect:Direct for z/OS uses a 16k buffer even when both sides have larger buffer sizes specified. 011) RTC363064 / APAR IC89513 commit date: 09 May 2013 -------------------------------------------------------- On some Solaris systems, CLI may fail to connect, reporting XSEC016I message. ndmauthc or ndmauths may also generate a core file when this happens. 012) RTC374346 / APAR IC91973 commit date: 09 May 2013 -------------------------------------------------------- Greater than two gig file transfers fail with XSQF006I on Linux systems with kernel version 3.x. 013) RTC373823 / APAR IC91661 commit date: 09 May 2013 -------------------------------------------------------- Custom program using the Connect:Direct UNIX API may generate XCMG000I errors when submitting a command. Server may show an XSEC012I error concurrently. 014) RTC371183 / APAR IC92400 commit date: 09 May 2013 -------------------------------------------------------- Run task steps that rely on a LANG environment variable setting other than the system default value execute incorrectly. ----------------------------------------------------------- iFixes listed above are accumulated in C:D for UNIX 4.1.0.4 ----------------------------------------------------------- ============================== iFixes to C:D for UNIX 4.1.0.4 ============================== 001) RTC380719 / APAR IC93901 commit date: 03 Jul 2013 -------------------------------------------------------- XUTL003I error generated when non default CLI configuration file name is used. 002) RTC382658 / APAR IC93913 commit date: 08 Jul 2013 -------------------------------------------------------- Automated install fails with CDAI019E message when the target installation directory already exists. Solution adds installation variable named cdai_ignoreExistingInstallDir (--ignoreExistingInstallDir from the command line) with a default value of "n". Setting the variable to "y" causes cdinstall_a to ignore an existing target installation directory and proceed with the installation. Use this variable with caution when engaging in automated deployment across multiple systems. 003) RTC387381 / APAR IC94090 commit date: 12 Jul 2013 -------------------------------------------------------- DBCS converted data received from a FB record format source file is corrupted. 004) RTC383178 / APAR IC94423 commit date: 26 Jul 2013 -------------------------------------------------------- Copy step sending a file to a new data set on Connect:Direct for z/OS fails and reports SVSH018I message when the block size for the new file is specified as or defaulted to zero. 005) RTC390618 / APAR IC94780 commit date: 09 Aug 2013 -------------------------------------------------------- Copy step receiving a file in binary mode may fail and report XCPR001I message. 006) RTC391980 / APAR IC94963 commit date: 16 Aug 2013 -------------------------------------------------------- Copy step sending a zero byte source file to a z/OS destination file with VB record format fails and reports various error messages, including SVSJ013I and SVS5018I. 007) RTC383156 / APAR IC95144 commit date: 26 Aug 2013 -------------------------------------------------------- Connect:Direct for UNIX configured to use PAM authentication fails to reject a user with an invalid account, for example, an account with an expired password. 008) RTC395446 / APAR IC95766 commit date: 05 Sep 2013 -------------------------------------------------------- Session establishment and run task processing may slow down with high session concurrency, particularly running on AIX with system auditing turned on. 009) RTC391741 / APAR IC95823 commit date: 10 Sep 2013 -------------------------------------------------------- spadmin.sh or spcli.sh can fail to execute, reporting java error StringIndexOutOfBoundsException. 010) RTC391977 / APAR IC95830 commit date: 13 Sep 2013 -------------------------------------------------------- Copy to Connect:Direct for z/OS with disp=old specification may result in altered destination file allocation DCB specifications. Copy step may also fail with errors similar to SVSJ032I. 011) RTC390415 / APAR IC96647 commit date: 14 Oct 2013 -------------------------------------------------------- cfgcheck doesn't generate a warning when a configuration file contains duplicate record names. 012) RTC383962 / APAR IC93810 commit date: 14 Oct 2013 -------------------------------------------------------- cfgcheck reports XRIA002I for validly configured initparm.cfg records ndm.env_vars and secure+ and the copy.parms record parameter fsync.after.receive. 013) RTC401300 / APAR IC97377 commit date: 01 Nov 2013 -------------------------------------------------------- Copy step sending a file to a new data set on Connect:Direct for z/OS fails and reports SVSH018I message when the record format for the new file is specified as Fixed Block (FB) and no other DCB attributes are specified. 014) RTC396978 / APAR IC97870 commit date: 21 Nov 2013 -------------------------------------------------------- SPCli doesn't support updating the Base Record of the .Local node. Solution adds following syntax to the update localnode command: BaseName=. 015) RTC397838 / APAR IC98425 commit date: 19 Dec 2013 -------------------------------------------------------- Automated installation script, cdinstall_a, hangs if the trace command line option is specified as yes and there is no options file specified. 016) RTC405133 / APAR IC98685 commit date: 13 Jan 2014 -------------------------------------------------------- Excessive statistics generated causing performance degradation when the sess.default value for a remote node is set to some value greater than one, and multiple processes get queued up for that remote node. 017) RTC409075 / APAR IC98932 commit date: 23 Jan 2014 -------------------------------------------------------- Auditing processes on AIX 6.1 and greater may consume significant CPU resources during and after a Connect:Direct for UNIX high load scenario. 018) RTC409808 / APAR IC99214 commit date: 06 Feb 2014 -------------------------------------------------------- Multiple concurrent API connections submitting processes for execution may occasionally confuse two C:D processes, such that the one process is submitted twice, running once with the correct process name and number, and again with an incorrect process name and number, and the other process not running at all. Alternatively, the issue might manifest as occasional XSQF009I and XSMG405I event messages with fdbk=2 referring to temporary files in the Connect:Direct for UNIX work directory. 019) RTC411883 / APAR IC99434 commit date: 12 Feb 2014 -------------------------------------------------------- IBM Sterling Connect:Direct for UNIX is affected by a vulnerability in the IBM Runtime Environment, Java(TM) Technology Edition (CVE-2013-1500). NOTE: This fix ends Connect:Direct for UNIX support for SLES 9, as the updated JRE required doesn't run on that version. SuSE ended support for SLES 9 in 2011. 020) RTC402862 / APAR IC99558 commit date: 21 Feb 2014 -------------------------------------------------------- Automated install script cdinstall_a will fail reporting CDAI025E if the default umask setting for the adminUserid is more restrictive than 22. Solution adds installation variable named cdai_allowUmaskReset (-- allowUmaskReset from the command line) with a default value of "y". Variable has no effect if the default umask of the adminUserid is 22 or less. If the default umask of the adminUserid is greater than 22, "y" causes cdinstall_a to reset the umask of the adminUserid to 22. Setting the variable to "n" in that case causes cdinstall_a to proceed with the more restrictive than recommended umask setting. Caution: If the installation procedure proceeds with a umask setting that is more restrictive than the recommended value, some users may not have the necessary permissions to use Connect:Direct for UNIX. 021) RTC406237 / APAR IC99599 commit date: 26 Feb 2014 -------------------------------------------------------- cdcust may generate a false warning that Connect:Direct configurations requiring root authority were not completed when run on a system with SELinux ACL implemented. 022) RTC400200 / APAR IT00471 commit date: 20 Mar 2014 -------------------------------------------------------- On some Linux systems, run task steps will generate system log messages indicating ndmsmgr attempted an unknown command via ioctl32. 023) RTC420670 / APAR IT01040 commit date: 16 Apr 2014 -------------------------------------------------------- Processes may fail reporting XSQF009I, "Get step return code file failed" when a step return code file with the same name exists. Step return code files are temporary files used by Connect:Direct to capture state information of a running process. Compounding the problem, the error for this scenario does not get propagated to the PRED statistic record, causing a client that submitted the process programmatically and waited on the result to conclude the process succeeded. 024) RTC423881 / APAR IT01701 commit date: 09 May 2014 -------------------------------------------------------- z/OS file allocation attributes specified in a type defaults file (typekey) may not be honored. Copy step may also fail with errors similar to SVSJ032I. 025) RTC418516 / APAR IT02062 commit date: 03 Jun 2014 -------------------------------------------------------- The first several characters of the file name specification are cut off when received by 64 bit File Open Exits on Linux or Solaris x86 platforms. WARNING: All File Open Exits, including 32 bit versions, must be recompiled after applying this fix. 026) RTC423131 / APAR IT02518 commit date: 12 Jun 2014 -------------------------------------------------------- An XPAE003I message is generated for a select statistics command issued with a destfile or srcfile parameter value enclosed in double quotes, which are required if the value contains spaces, equal signs or other reserved characters. 027) RTC429551 / APAR IT02558 / CVE-2014-0224 commit date: 30 Jun 2014 ------------------------------------------------------------------------ Connect:Direct for UNIX Secure+ Option uses OpenSSL, which is vulnerable to a man-in-the-middle attack, caused by the use of weak keying material in SSL/TLS clients and servers. A remote attacker could exploit this vulnerability using a specially-crafted handshake to conduct man-in-the-middle attacks to decrypt and modify traffic. WARNING: FIPS mode is no longer supported in this release for HP-UX! This applies to both PA-RISC and Itanium. BEFORE applying this fix, HP-UX customers MUST disable all FIPS mode for all nodes. If HP-UX customers do not disable FIPS mode before applying this fix, all FIPS mode sessions will fail, and FIPS mode cannot be disabled once the fix has been applied. HP-UX customers that require FIPS mode support must upgrade to Connect:Direct for UNIX 4.2.0 to remediate this issue. NOTE: Key certificates using the PKCS5 1.5 PBE-MD5-DES algorithm to encrypt the private key need to be converted manually. See http://www.ibm.com/support/docview.wss?uid=swg21676660 for details. 028) RTC433224 / APAR IT03227 commit date: 17 Jul 2014 -------------------------------------------------------- The fsync.after.receive initparm option, used to make sure files written and closed by C:D on an NFS destination are immediately ready for processing, doesn't detect when the NFS resource is out of space. Note, the fix for this issue changes the fsync.after.receive default value to "Y". 029) RTC392436 / APAR IT03077 commit date: 18 Jul 2014 -------------------------------------------------------- An upgrade command performed by the automated installation script (cdinstall_a) will fail if pre-existing configuration files don't pass the configuration check, or if the sample.cd process fails to complete successfully, even when the configuration errors or sample.cd operation failure is considered tolerable. Fix adds a variable to cdinstall_a called cdai_verifyUpgrade. This variable allows users to choose whether to verify an upgrade or not. Valid values are "y" (the default) and "n". 030) RTC431679 / APAR IT03078 commit date: 18 Jul 2014 -------------------------------------------------------- The automated installation script, cdinstall_a, doesn't provide an option to deploy a custom trusted root certificate file. Fix adds a variable, cdai_trustedRootCertFile, that allows users to deploy a custom trusted root certificate file. If cdai_trustedRootCertFile is specified, then the automated installation will arbitrarily use this file as the trusted root certificate file. If cdai_trustedRootCertFile is not specified, then the automated installation procedure will customize and use the default trusted root certificate file that is included in the Connect:Direct for UNIX installation file. The default trusted root certificate file will be customized by adding the certificate portion of the deployed keycert file and any other deployed certificates to it. 031) RTC431680 / APAR IT03079 commit date: 18 Jul 2014 -------------------------------------------------------- Some Secure+ certificate files deployed during an automated installation (cdinstall_a) end up owned by root. 032) RTC102568 / APAR IT03815 commit date: 20 Aug 2014 -------------------------------------------------------- An interrupted snode process goes into WAIT/WS state until pnode resumes the process. If pnode never resumes the process, the snode process will remain in the TCQ in WAIT/WS indefinitely. Fix adds a new parameter to the tcq record of the initparm.cfg, ckpt.max.age. This parameter specifies the number of days that an snode process will remain in WAIT/WS state waiting for the pnode to resume the process before it is automatically deleted. The default value is 8. 033) RTC438479 / APAR IT04033 commit date: 28 Aug 2014 -------------------------------------------------------- Connect:Direct for UNIX Secure+ Option uses OpenSSL, which is vulnerable to the following two issues: CVE-2014-3508: OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error in OBJ_obj2txt. If applications echo pretty printing output, an attacker could exploit this vulnerability to read information from the stack. CVE-2014-3511: OpenSSL could allow a remote attacker to bypass security restrictions, caused by the negotiation of TLS 1.0 instead of higher protocol versions by the OpenSSL SSL/TLS server code when handling a badly fragmented ClientHello message. An attacker could exploit this vulnerability using man-in-the-middle techniques to force a downgrade to TLS 1.0. 034) RTC433169 / APAR IT04106 commit date: 04 Sep 2014 -------------------------------------------------------- If a connection attempt to a remote node fails for some reason, the session start statistics record (SSTR) will log a completion code (CC) of 0, improperly indicating that the session attempt succeeded. 035) RTC438326 / APAR IT04205 commit date: 05 Sep 2014 -------------------------------------------------------- On occasion, the statistics archive utility won't run on a day when it should run, causing two days worth of statistics log files to be contained in the archive file when it runs the next day. 036) RTC442224 / APAR IT04683 commit date: 30 Oct 2014 -------------------------------------------------------- In some circumstances, CDU will mistake a new incoming process for a restarted process, generating an XSMG251I message and process failure. 037) RTC443927 / APAR IT04686 commit date: 30 Oct 2014 -------------------------------------------------------- When C:D is doing work, temporary files are created in the d_dir/work/cd_node directory. After certain error scenarios, some of these temporary files are not removed. 038) RTC442941 / APAR IT05409 commit date: 07 Nov 2014 -------------------------------------------------------- In some circumstances, CDU will inappropriately synchronize a new incoming run task process with a previously interrupted run task process, and immediately return the status of the interrupted process with an XSMG417I message instead of running the new task. 039) RTC448795 / APAR IT05619 commit date: 17 Nov 2014 -------------------------------------------------------- The SSLv3 protocol contains a number of weaknesses including POODLE (Padding Oracle On Downgraded Legacy Encryption, CVE-2014-3566). IBM Sterling Connect:Direct (CD) for UNIX is therefore also vulnerable when the SSLv3 protocol is used. When CD for UNIX is operating as the SSL server (snode in CD terms) and is configured for TLS connections, and a CD operating as the SSL client (pnode in CD terms) attempts an SSLv3 connection, it's possible that CD for UNIX will allow the connection to be made and negotiated to SSLv3. Fix prevents the possible negotiation to SSLv3 when TLS is configured. NOTICE: SSLv3 is an obsolete and insecure protocol. IBM recommends to use the TLS protocol instead. To fully disable SSLv3 and use TLS instead, ensure that all secure connections are configured to 'Enable TLS Protocol' and 'Disable Override'. 040) RTC448618 / APAR IT06145 commit date: 11 Dec 2014 -------------------------------------------------------- Under specific stress situations, "direct" will trigger a segmentation fault. 041) RTC445816 / APAR IT06148 commit date: 17 Dec 2014 -------------------------------------------------------- A fresh C:D install will include the unused "syslog.logd" initparm. 042) RTC450094 / APAR IT06686 commit date: 22 Jan 2015 -------------------------------------------------------- cdpmgr may fail to start on Solaris x86, reporting an error attempting to load libcdspssl.so. 043) RTC452439 / APAR IT06692 commit date: 23 Jan 2015 -------------------------------------------------------- After a process is submitted that refers to a netmap entry with comm.transport equal to tcp or udt33 and that has two or more comm.info specifications, which is an invalid configuration, further process submissions that refer to other valid netmap entries will not run and stay in WAIT/WC state. 044) RTC454367 / APAR IT06869 commit date: 05 Feb 2015 -------------------------------------------------------- A client which has submitted a maxdelay process that lasts longer than one minute may get an error return code with message XCMM044I returned after exactly one minute. 045) RTC460297 / APAR IT07894 commit date: 23 Mar 2015 -------------------------------------------------------- Connect:Direct for UNIX Secure+ Option uses IBM Java Runtime, which is vulnerable to the following issues: CVE-2014-3065: IBM Java SDK contains a vulnerability in which the default configuration for the shared classes feature potentially allows arbitrary code to be injected into the shared classes cache, which may subsequently be executed by other local users. CVE-2014-6468: An unspecified vulnerability related to the Hotspot component has complete confidentiality impact, complete integrity impact, and complete availability impact. 046) RTC460301 / APAR IT07895 commit date: 23 Mar 2015 -------------------------------------------------------- Connect:Direct for UNIX Secure+ Option uses OpenSSL, which is vulnerable to the following issues: CVE-2014-3570: An unspecified error in OpenSSL related to the production of incorrect results on some platforms by Bignum squaring (BN_sqr) has an unknown attack vector and impact. CVE-2015-0204: A vulnerability in the OpenSSL ssl3_get_key_exchange function could allow a remote attacker to downgrade the security of certain TLS connections. An OpenSSL client accepts the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers. CVE-2015-0205: OpenSSL could allow a remote authenticated attacker to bypass security restrictions, caused by the acceptance of a DH certificate for client authentication without verification. An attacker could exploit this vulnerability to authenticate without the use of a private key. CVE-2015-0209: OpenSSL could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free error in the d2i_ECPrivateKey or EVP_PKCS82PKEY function. An attacker could exploit this vulnerability to corrupt memory and execute arbitrary code on the system and cause a denial of service. CVE-2015-0286: OpenSSL is vulnerable to a denial of service, caused by an error in the ASN1_TYPE_cmp function when attempting to compare ASN.1 boolean types. An attacker could exploit this vulnerability to crash any certificate verification operation and cause a denial of service. CVE-2015-0287: OpenSSL could allow a remote attacker to execute arbitrary code on the system, caused by an error related to the reuse of a structure in ASN.1 parsing. An attacker could exploit this vulnerability using an invalid write to corrupt memory and execute arbitrary code on the system. CVE-2015-0288: OpenSSL is vulnerable to a denial of service, caused by an error in the X509_to_X509_REQ function. An attacker could exploit this vulnerability to trigger a NULL pointer dereference. CVE-2015-0289: OpenSSL is vulnerable to a denial of service, caused by the failure to properly handle missing outer ContentInfo by the PKCS#7 parsing code. An attacker could exploit this vulnerability using a malformed ASN.1-encoded PKCS#7 blob to trigger a NULL pointer dereference. CVE-2015-0292: OpenSSL could allow a remote attacker to execute arbitrary code on the system, caused by an error when processing base64 encoded data. An attacker could exploit this vulnerability using specially-crafted base 64 data to corrupt memory and execute arbitrary code on the system and cause a denial of service. CVE-2015-0293: OpenSSL is vulnerable to a denial of service. By sending a specially-crafted SSLv2 CLIENT-MASTER-KEY message, a remote attacker could exploit this vulnerability to trigger an assertion. 047) RTC456772 / APAR IT08173 commit date: 02 Apr 2015 -------------------------------------------------------- SPCli.sh fails to display a remotenode name that was added with trailing spaces. 048) RTC462260 / APAR IT08276 commit date: 13 Apr 2015 -------------------------------------------------------- CBC ciphers are vulnerable to CVE-2011-3389 (BEAST Attack). Previous recommendation to mitigate CVE-2011-3389 was to not use CBC ciphers. RC4 ciphers are vulnerable to CVE-2015-2808 (Bar Mitzvah Attack). Current recommendation to mitigate CVE-2015-2808 is to discontinue use of RC4 ciphers. However, the remaining available ciphers are generally CBC ciphers. Accordingly, code is fixed to mitigate CVE-2011-3389. Note: Connect:Direct for UNIX by default disables the RC4 stream cipher. If you enabled the RC4 stream cipher you are exposed to the RC4 "Bar Mitzvah" Attack for SSL/TLS. IBM recommends that you review your entire environment to identify other areas where you have enabled the RC4 stream cipher and take appropriate mitigation and remediation actions. 049) RTC457011 commit date: 05 May 2015 ----------------------------------------- Messages XCMM028I and XTRA000I missing from msgfile.cfg. 050) RTC462223 / APAR IT08954 commit date: 14 May 2015 -------------------------------------------------------- CDU nodes configured to run behind a load balancer will have the same node name. When these nodes act as pnodes and initiate processes to the same snode at the same time, it's possible that the snode will not be able to distinguish between the processes, generating XLKL004I messages and possibly corrupting the TCQ. Fix adds a new parameter to the ndm.node initparm record called instance.id. The parameter value is initialized with a universally unique identifier (UUID). 051) RTC458466 / APAR IT09079 commit date: 26 May 2015 -------------------------------------------------------- Statistics archive script failure messages are not captured and displayed in the XSTA004E message. 052) RTC460416 / APAR IT09238 commit date: 02 Jun 2015 -------------------------------------------------------- Installations and upgrades that include File Agent on AIX 5.3 or Solaris 9 fail, producing several system errors and then indicating "cdfa -p command failed." Fix provides a bundled File Agent that will install or upgrade successfully on AIX 5.3 or Solaris 9. NOTICE: This iFix marks the end of support for Connect:Direct for UNIX 4.1.0 on AIX 5.3, Solaris 9, RHEL 4 and SLES 9 operating systems. 053) RTC469550 / APAR IT09564 commit date: 18 Jun 2015 -------------------------------------------------------- Connect:Direct for UNIX Secure+ and File Agent Options use IBM Java Runtime, which is vulnerable to the following issue on HP-UX and Solaris platforms: CVE-2015-0383: An unspecified vulnerability in Oracle Java SE and JRockit related to the Hotspot component has no confidentiality impact, partial integrity impact, and complete availability impact. 054) RTC459466 / APAR IT09719 commit date: 25 Jun 2015 -------------------------------------------------------- During certain stress situations, cdpmgr may become unresponsive for some minutes. During this time, select statistics will show multiple XLKL004I messages in sequence. 055) RTC458884 / APAR IT09904 commit date: 07 Jul 2015 -------------------------------------------------------- cdpmgr may occasionally crash. The crash is more likely when cdpmgr is idle. A possible symptom of the issue is the Session Count statistics records (RECI=SCNT) logged with either negative or unrealistically large positive values indicated. 056) RTC463108 / APAR IT10120 commit date: 16 Jul 2015 -------------------------------------------------------- A process copy step sending to an invalid destination, such as a nonexistent path, will log an XCPS003I on the source side and then XIPT016I and go into TIMER/RETRY. On the destination side, an XCPR010I is logged and then "SMGR terminated by signal 11". 057) RTC470882 / APAR IT10377 commit date: 28 Jul 2015 -------------------------------------------------------- Connect:Direct for UNIX Secure+ will fail to send data when the negotiated RU size is less than 16K on systems that use the SSL BEAST mitigation. The error is "The SSL library failed, reason=SSL_write failed Message ID CSPA309E". The issue occurs between nodes where an older version of Secure+ is used, that does not support buffer sizes larger than 16K for SSL sessions. 058) RTC471695 / APAR IT10717 commit date: 31 Jul 2015 ------------------------------------------------------- Connect:Direct API commands over a secure connection fail after upgrading the JRE in Connect:Direct Browser, Sterling Control Center or other application using the Application Interface for Java (AIJ). 059) RTC454740 / APAR IT08220 commit date: 08 Sep 2015 -------------------------------------------------------- In the copy termination statistics record, process name, process number and snode name fields are duplicated. 060) RTC476357 / APAR IT11308 commit date: 18 Sep 2015 -------------------------------------------------------- A run task step that exceeds the runstep.max.time.to.wait specification may not time out if a client issues a number of select process detail=yes commands while the step is executing. This would be the case if the C:D node is monitored by Control Center, for example. 061) RTC476992 / APAR IT11187 commit date: 22 Sep 2015 -------------------------------------------------------- ndmcmgr may hang and consume significant CPU resources after a disconnect from a securely connected Java client, such as IBM Control Center or Connect:Direct Browser UI. 062) RTC456874 / APAR IT08958 commit date: 23 Sep 2015 -------------------------------------------------------- After a system reboot, cdpmgr may fail to start, reporting XPMD006I message. 063) RTC457220 / APAR IT07339 commit date: 23 Sep 2015 -------------------------------------------------------- A wildcard copy with the source specification on AIX may occasionally fail to find any files matching the wildcard pattern when matching files in fact exist. 064) RTC462479 / APAR IT10090 commit date: 25 Sep 2015 -------------------------------------------------------- Connect:Direct for UNIX did not report snodeid value utilized. 065) RTC474638 / APAR IT10817 commit date: 28 Sep 2015 -------------------------------------------------------- Copy receive performance from C:D Z/OS can be degraded when the UNIX destination file sysopts includes "datatype=binary", and the Z/OS source file record format is VB or FB. 066) RTC478504 / APAR IT11951 commit date: 23 Oct 2015 -------------------------------------------------------- cdpmgr responsiveness can be degraded when installed on a slow file system due to increased time needed to log stat records. XSTL005W and XSTL006W messages to warn when increased time is needed to log stat records. There was also a minor inefficiency in cdstatm that may begin occurring the day after cdpmgr is initialized. 067) RTC480100 / APAR IT12148 commit date: 06 Nov 2015 -------------------------------------------------------- Consecutive pipe characters ('|') are not translated to EBCDIC after a copy step sending a file to Connect:Direct for z/OS and using standard compression is interrupted and restarted. 068) RTC488564 / APAR IT13224 commit date: 18 Jan 2016 -------------------------------------------------------- When copying text files to or from an EBCDIC remote node, C:D UNIX translates ASCII data to EBCDIC and vice versa as needed. In some cases, an alternative to the default ASCII to EBCDIC translation provided by C:D UNIX is desired. While the product includes options for users to create their own custom xlate tables or to use codepage translation, for convenience, new xlate tables are provided that convert ISO-8859-1 ASCII text to IBM-037 EBCDIC and back. These xlate tables are located in {C:D UNIX install dir}/ndm/xlate directory. They may be specified in copy step sysopts, or be made the default translation by specifying them in the global copy record of the initparm.cfg file. 069) RTC476574 / APAR IT14034 commit date: 29 Feb 2016 -------------------------------------------------------- If the cdpmgr process is killed while C:D processes are being executed, when cdpmgr is restarted, these processes may fail, reporting XSQF009I referring to a temporary work file in the C:D work directory, and XSMG405I. 070) RTC462517 / APAR IT13623 commit date: 04 Mar 2016 -------------------------------------------------------- A long running ndmsmgr doing a series of run job steps may eventually begin producing erratic results. This scenario might come about if there are many processes stacked up in the TCQ for an adjacent node that only allows one or two sessions. In this case ndmsmgr would likely piggy back the stacked processes one after another. One example of the possible erratic results involves CDU sending a series of processes to CDW that include a binary copy step and a run job step. The copy steps may eventually begin to fail with CDW reporting LCPR001I, "record length in comm buffer bigger than IO buffer size." 071) RTC495302 / APAR IT14517 commit date: 29 Mar 2016 -------------------------------------------------------- Copy steps to C:D z/OS with LRECL and BLKSIZE set to the same value and RECFM set to FB may fail with XCPS009I. 072) RTC498204 / APAR IT14769 commit date: 14 Apr 2016 -------------------------------------------------------- When receiving a new data file, C:D UNIX uses create mode 664 by default. These permission settings may not be appropriate in some scenarios. Fix adds two new initparms to the copy.parms record in initparm.cfg: recv.file.open.perm=nnn, where nnn is an octal integer describing the desired default permissions for new files received. It's the same as the value documented for the copy sysopt "permiss". recv.file.open.ovrd=x, where x is one of the following three values: 'Y' - Allow copy step sysopt "permiss" value to override recv.file.open.perm value when receiving a new file. This is the default. 'N' - Disallow copy step sysopt "permiss" value to override recv.file.open.perm value when receiving a new file. 'P' - Allow copy step sysopt "permiss" value to override recv.file.open.perm value when pnode is receiving a new file. 073) RTC500286 / APAR IT15028 commit date: 29 Apr 2016 -------------------------------------------------------- Connect:Direct for UNIX Secure+ Option uses OpenSSL, which is vulnerable to the following issues: CVE-2015-3194: OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference when verifying certificates via a malformed routine. An attacker could exploit this vulnerability using signature verification routines with an absent PSS parameter to cause any certificate verification operation to crash. CVE-2015-3195: OpenSSL could allow a remote attacker to obtain sensitive information, caused by a memory leak in a malformed X509_ATTRIBUTE structure. An attacker could exploit this vulnerability to obtain CMS data and other sensitive information. CVE-2016-0799: OpenSSL could allow a remote attacker to obtain sensitive information, caused by a memory error in the BIO_*printf() functions. An attacker could exploit this vulnerability using specially crafted data to trigger an out-of-bounds read. CVE-2016-0702: OpenSSL could allow a local attacker to obtain sensitive information, caused by a side-channel attack against a system based on the Intel Sandy-Bridge microarchitecture. An attacker could exploit this vulnerability to recover RSA keys. 074) RTC488870 / APAR IT15015 commit date: 29 Apr 2016 -------------------------------------------------------- A wildcard copy step that has completed copying several files and is interrupted and restarted may start the wildcard copy over again from the beginning, instead of picking up at the last completed copy. 075) RTC489941 / APAR IT15012 commit date: 29 Apr 2016 -------------------------------------------------------- A process script coded with a valid string that contains a tilde character ('~') may fail inappropriately with a syntax error. An example of this would be a process with an snodeid coded with a password that includes a tilde character. 076) RTC483171 / APAR IT12761 commit date: 12 May 2016 -------------------------------------------------------- Secure+ install script may hang after indicating "Initializing the Secure+ Parmfile." 077) RTC483323 / APAR IT12844 commit date: 12 May 2016 -------------------------------------------------------- Statistics log file archive script fails to capture log files with extensions greater than three digits. 078) RTC483784 / APAR IT12356 commit date: 20 May 2016 -------------------------------------------------------- XSQF006I error generated when a copy step destination uses pipe I/O, and fsync.after.receive initparm is set to 'y'. 079) RTC484160 / APAR IT12867 commit date: 25 May 2016 -------------------------------------------------------- In a high stress scenario where an snode has less session capacity than the pnode, some processes may become stuck in the TIMER queue and require a manual release. 080) RTC487482 / APAR IT12868 commit date: 27 May 2016 -------------------------------------------------------- When analyzing stat logs that capture a high load scenario, it can be difficult to identify all stat records logged by a particular ndmsmgr process. Fix adds a new stat log field called OSID. OSID value is set to the UNIX pid of the process that logged it. 081) RTC503678 / APAR IT15554 commit date: 02 Jun 2016 -------------------------------------------------------- Connect:Direct for UNIX Secure+ Option uses OpenSSL, which is vulnerable to the following issues: CVE-2016-2108: OpenSSL could allow a remote attacker to execute arbitrary code on the system, caused by a buffer underflow when deserializing untrusted ASN.1 structures and later reserializes them. An attacker could exploit this vulnerability to corrupt memory and trigger an out-of- bounds write and execute arbitrary code on the system. CVE-2016-2107: OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error when the connection uses an AES CBC cipher and the server support AES-NI. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt traffic. 082) RTC497560 / APAR IT15270 commit date: 15 Aug 2016 -------------------------------------------------------- In some scenarios, an inappropriate XDFD001I message referring to a file in the C:D work directory may be logged after an otherwise successful process completes. The issue may also manifest as an XCFF002I followed by XNMP005E referring to the netmap.cfg file at the start of a copy step. 083) RTC505339 / APAR IT16787 commit date: 31 Aug 2016 -------------------------------------------------------- To remove a keycert from a Secure+ node, SPCli and Java API (AIJ) clients, such as Sterling Control Center, must update the node with the keycert and keycert password fields specified as the key word "null". This specification works as expected for SPCli, but fails with SPCL112E when attempted by an AIJ client. 084) RTC517695 / APAR IT18040 commit date: 09 Dec 2016 -------------------------------------------------------- C:D Unix can generate segmentation faults if an abnormally large ndm.path:path value is coded in initparm.cfg. 085) RTC524895 / APAR IT18697 commit date: 06 Jan 2017 -------------------------------------------------------- Connect:Direct for UNIX Secure+ Option uses OpenSSL, which is vulnerable to the following issue: CVE-2016-8610: SSL/TLS protocol is vulnerable to a denial of service, caused by an error when processing ALERT packets during a SSL handshake. By sending specially-crafted packets, a remote attacker could exploit this vulnerability to cause the application to stop responding. CVE-2016-2177: OpenSSL is vulnerable to a denial of service, caused by the incorrect use of pointer arithmetic for heap-buffer boundary checks. By leveraging unexpected malloc behavior, a remote attacker could exploit this vulnerability to trigger an integer overflow and cause the application to crash. CVE-2016-6306: OpenSSL is vulnerable to a denial of service, caused by missing message length checks when parsing certificates. A remote authenticated attacker could exploit this vulnerability to trigger an out-of-bounds read and cause a denial of service. CVE-2016-2183: OpenSSL could allow a remote attacker to obtain sensitive information, caused by an error in the in the Triple-DES on 64-bit block cipher, used as a part of the SSL/TLS protocol. By capturing large amounts of encrypted traffic between the SSL/TLS server and the client, a remote attacker able to conduct a man-in-the-middle attack could exploit this vulnerability to recover the plaintext data and obtain sensitive information. This vulnerability is known as the SWEET32 Birthday attack. Notice: Fix is unavailable for C:D UNIX on HP-UX PA_RISC platform. 086) RTC523369 / APAR IT19015 commit date: 31 Jan 2017 -------------------------------------------------------- C:D UNIX will sometimes display an invalid snode user ID in the process start record (PSTR) details of a select stat command. Also, the snode user ID field is applicable only to the PSTR record, and the field name was inappropriately being displayed on other statistics records. 087) RTC523522 / APAR IT18957 commit date: 01 Feb 2017 -------------------------------------------------------- In rare circumstances, a text file sent to a destination file with fixed block record format on z/OS may be padded with ASCII blanks instead of EBCDIC. 088) RTC494236 / APAR IT14215 commit date: 03 Feb 2017 -------------------------------------------------------- Processes submitted with a start time specified (startt parameter) may not run as scheduled. 089) RTC495655 / APAR IT15275 commit date: 03 Feb 2017 -------------------------------------------------------- A process that fails due to a problem creating a valid local user profile should report an XSMG242I message. However, if the process has generated other error messages before encountering the problem creating a valid local user profile, one of the previously generated messages may be inappropriately reported with the XSMG242I message text. 090) RTC497577 / APAR IT14861 commit date: 24 Mar 2017 -------------------------------------------------------- Send of a text file to C:D z/OS may fail with SCPA024I, if C:D UNIX is doing codepage conversion and the destination file uses FB records. 091) RTC478359 / APAR IT19985 commit date: 14 Apr 2017 -------------------------------------------------------- The initparm.cfg parameter instance.id value generated on Solaris may include non-ASCII characters. 092) RTC490859 / APAR IT19961 commit date: 14 Apr 2017 -------------------------------------------------------- In some restart scenarios, it's possible that the pnode ndmsmgr will be abruptly terminated with a signal 11 (SIGSEGV, segmentation violation). 093) RTC490860 / APAR IT19919 commit date: 14 Apr 2017 -------------------------------------------------------- In some restart scenarios, C:D UNIX snode may report an XCPK004I message. When this happens, it's possible that the restarted session will hang. 094) RTC533544 / APAR IT20320 commit date: 21 Apr 2017 -------------------------------------------------------- In some scenarios, inappropriate XSMG276I messages are generated for a copy step using a wildcard specification to send files to another node. 095) RTC510530 / APAR IT17600 commit date: 26 Apr 2017 -------------------------------------------------------- cdpmgr response time can be slowed if the TCQ becomes loaded with many processes. This can result in increased time needed to execute processes and to accept incoming client or server connections. 096) RTC536028 / APAR IT20394 commit date: 27 Apr 2017 -------------------------------------------------------- In some scenarios, an inappropriate XSQF009I message is generated for a copy step that specifies an unqualified (no directory prefix) source or destination file name. 097) RTC533253 / APAR IT20668 commit date: 24 May 2017 -------------------------------------------------------- On some AIX systems, cdpmgr may fail to initialize, reporting "cdpmgr failed to load Secure+ library {C:D installation directory}/ndm/lib/libcdspssl.so". 098) RTC544573 / APAR IT21370 commit date: 10 Jul 2017 -------------------------------------------------------- Connect:Direct for UNIX uses zlib, which is vulnerable to the following issues: CVE-2016-9840: zlib is vulnerable to a denial of service, caused by an out-of-bounds pointer arithmetic in inftrees.c. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service. CVE-2016-9841: zlib is vulnerable to a denial of service, caused by an out-of-bounds pointer arithmetic in inftrees.c. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service. CVE-2016-9843: zlib is vulnerable to a denial of service, caused by a big- endian out-of-bounds pointer. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to cause a denial of service. 099) RTC544736 / APAR IT21414 commit date: 13 Jul 2017 -------------------------------------------------------- Connect:Direct for UNIX Secure+ Option uses OpenSSL, which is vulnerable to the following issue: CVE-2017-3731: OpenSSL is vulnerable to a denial of service, caused by an out-of-bounds read when using a specific cipher. By sending specially crafted truncated packets, a remote attacker could exploit this vulnerability using CHACHA20/POLY1305 to cause the application to crash.