• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM i PTF Guide, Volume 23, Number 39

    September 29, 2021 Doug Bidwell

    Yet another week, and yet another batch of security vulnerabilities that IBM i shops need to deal with. None of the patches in the table below are in the latest Security Group for the various operating system releases. So this table summarizes it all:

    					7.1	7.2	7.3	7.4
    OpenSSL for IBM i	CVE-2021-3711	SI77181	SI77182	SI77182	SI77182
    			CVE-2021-3712				
    Apache HTTP Server 	CVE-2021-31618		SI77099	SI76820	SI76700
    			CVE-2020-13950			SI76831	SI76706
    			CVE-2019-17567				
    			CVE-2021-30641				
    			CVE-2021-33193				
    IAS & IWS for IBM i	CVE-2021-35517		SI77226	SI77225	SI77224
    			CVE-2021-36090				
    

    One more reminder to everyone to participate in POWERUp 2021, and an update. POWERUp 2021 runs from October 4 through 7, but it is no longer going to have an in-person option. You must participate virtually. Visit the COMMON user group website to find out the particulars. And we will see you there – virtually, at least!

    Let’s get started this week with the rundown of PTF Groups by IBM i release level:

    PTF Groups 7.4:

    • HIPERs (High Impact/Pervasive)
    • Security
    • Backup Recovery Solutions

    PTF Groups 7.3:

    • HIPERs (High Impact/Pervasive)
    • Security
    • Backup Recovery Solutions

    PTF Groups 7.2:

    • HIPERs (High Impact/Pervasive)
    • Security
    • Backup Recovery Solutions

    PTF Groups 7.1:

    • HIPERs (High Impact/Pervasive)
    • Security

    New (or Updated) Links for this week:

    • QMGTOOLS: Java HTTPS Test Client (HTTPSCLT), 872648
    • JAVA: Download, Installation, and Usage of Java 11 on the IBM i OS
    • TLS: How To Enable the TLSv1.3 Protocol for a WebSphere Application Server v8.5 and v9.0 Profile on IBM i OS
    • WSCST: Instructions for Modifying a Workstation Customizing Object (WSCST)
    • JAVA/TLS/SSL: How do I change the default SSL/TLS protocol my Java™ application will use?

    Tips/Definitions: Enjoy the autumn or the fall, depending on what dialect of English or American you speak, because who knows what the winter will bring.

    The Guide at a glance: There are no new defectives this week (09/25/21). Here is the defective PTF rundown, which is the last defective for each release:

    	Defect		Defective	APAR	Fixing
    	Date		PTF			PTF
    	--------	--------	-------	-------
    7.4	08/11/21	SI73464		SE75867	SI76761	(Read defect cover letter!)
    7.3	08/11/21	SI73463		SE75867	SI76760	(Read defect cover letter!)
    7.2	08/11/21	SI73462		SE75867	SI76759	(Read defect cover letter!)
    7.1	07/29/19	SI69653		SE71807	SI70603 (5733SC1, OpenSSH, available!)
    

    Be sure to access the link in the Guide for further details.

    Below is the usual archive of the IBM i PTF Guide to help you work through the PTFs in chronological order:

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: IBM i, IBM i PTF Guide, PTF

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS.  Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

    800.211.8798 | info@ucgtechnologies.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    What IBM i Shops Want From Cloud, And How To Do It Right Four Hundred Monitor, September 29

    One thought on “IBM i PTF Guide, Volume 23, Number 39”

    • M. Mayer says:
      September 29, 2021 at 8:33 am

      The Excel SS of the PTF guide is not available for download. It is missing.

      Reply

    Leave a Reply Cancel reply

TFH Volume: 31 Issue: 63

This Issue Sponsored By

  • Maxava
  • Eradani
  • ASNA
  • LANSA
  • UCG Technologies

Table of Contents

  • Rocket Maps IBM i Apps for Modernization Ventures
  • IBM Patches Nine Security Flaws in IBM i
  • The IBM i And Its RPG Decade Of Crisis
  • Four Hundred Monitor, September 29
  • IBM i PTF Guide, Volume 23, Number 39

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i 7.3 TR12: The Non-TR Tech Refresh
  • IBM i Integration Elevates Operational Query and Analytics
  • Simplified IBM i Stack Bundling Ahead Of Subscription Pricing
  • More Price Hikes From IBM, Now For High End Storage
  • Big Blue Readies Power10 And IBM i 7.5 Training for Partners
  • IBM Delivers More Out-of-the-Box Security with IBM i 7.5
  • Groundhog Day For Malware
  • IBM i Community Reacts to IBM i 7.5
  • Four Hundred Monitor, May 11
  • IBM i PTF Guide, Volume 24, Number 19

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.